Compact BDD Representations for Multiple-Output Functions and Their Application
|
|
- Alexis Copeland
- 5 years ago
- Views:
Transcription
1 8 6 IF? 8 IF 6 Compact BDD epresentations for MultipleOutput Functions an Their Application Tsutomu SASAO, Munehiro MATSUUA, Yuihiro IGUCHI, an Shinobu AGAYAMA Department of Computer Science an Electronics, Kyushu Institute of Technology Center for Microelectronic Systems, Kyushu Institute of Technology Department of Computer Science, Meiji University September 6, 001 Abstract This paper shows a new metho to represent a multipleoutput function: an encoe characteristic function for nonzero outputs ECF The ECF uses binary variables to represent an input output function, where The binary ecision iagrams BDDs for ECFs are never greater than corresponing SBDDs The size of a BDD epens on the encoing of the outputs as well as the orering of the variables We conjecture that there exists an input output function, where the optimal encoing prouces BDDs with noes, while the worst encoing prouces BDDs with!#"% noes We formulate an encoing problem an show a heuristic metho Experimental results using stanar benchmar functions show that the sizes of BDDs can be reuce significantly by consiering encoings Inex term: Multipleoutput function, encoing problem, BDD, SBDD, MTBDD, characteristic function 1 Introuction Logic networs usually have many outputs In most cases, inepenent representations of each output are inefficient Several methos exist to represent multipleoutput functions: '!+, /, :'!<=>!?, where In this paper, we consier methos to represent multipleoutput functions by using compact binary ecision iagrams BDDs There have been three previous methos to represent multipleoutput functions by BDDs The first metho is a multiterminal binary ecision iagram MTBDD [14] In an MTBDD, each terminal is a binary vector of bits For an input A B C+ output function, we can evaluate the function time Unfortunately, MTBDDs ten to be too large to construct The secon metho is a binary ecision iagram BDD for the characteristic function CF of the multipleoutput function The CF is a mapping 4+6 ED 6 1 GF, where H IF JK>!#,F iff H,,F H L/0,13,F H M3 The CF requires auxiliary binary variables O, //,, 13 that represent outputs shows the set of all the vali combinations of the inputs an the outputs For example, the CF of a 4output function is A 5 P, /!= /L!/L,, G S S= S/S! The size of a CF tens to be very large, since it involves binary variables The avantage of the CF is its small evaluation time: For an input A 5 output function, we can evaluate the function time by using a BDD for CF CFs are use in logic simulation [1], an multilevel logic optimization [6] The thir metho is a share binary ecision iagram SBDD [14] In many cases, SBDDs are smaller than corresponing MTBDDs an BDDs for CFs To evaluate the function using an SBDD, we time In this paper, we consier the fourth metho to represent a multipleoutput function, Encoe Characteristic Function for onzero outputs ECF It represents a mapping 4=6 ED 6 Z[\ ]M^,F H _`>, where a the binary vector function is b UT 5W, where U IF,F H IF XY> iff enotes the integer represente by For example, the ECF of a 4output c 5 5 S ECFs can be use in FPGA esign [10], logic emulation [], an embee systems [15] As shown in later, a BDD for an ECF is a generalization of an SBDD, an can be mae smaller than the corresponing SBDD So, it is useful for applications where the size is important ECF an Encoing Problem In this section, we efine encoe characteristic functions for nonzero outputs ECFs an formulate their encoing program [16] Definition 1 e, an f Definition <=>+/j For an ghai output function l > nonzero outputs ECF is 13 m ],olpq gn ],o p+r TT/Ts ]Mt g, an encoe characteristic function for
2 IF? Table 1: Encoing methos for fouroutput function where <u< < > S >v< S >u> S F I w I Encoing 1 Encoing Encoing 3 I /, I i b+ of an integer, an ote that,,, an is a binary representation Definition 3 The size of a ecision iagram DD is the number of noes in the DD, incluing the terminal noes, S are auxiliary variables that i represent outputs In the above efinition, the integer is encoe by a binary vector in a natural way However, by changing the encoing, we can often simplify the representation,, S '<, where,,, an Encoing 1 in Table 1 prouces the ECF: b /!x / 5 / 5 S Example 1 Consier the fouroutput function In this case, we have y <z { However, Encoing in Table 1 prouces the ECF: In this case, we have y y /!_ <z 5 } 5 5 /S75 %5 / ote that the minimum BDD using Encoing 1 requires 6 noes, while the minimum BDD using Encoing requires 7 noes En of Example Example Consier the 8output function KA!0 /,,!~/ <, where,, J! J, S,,! 3,,!~J In this case, we nee three auxiliary variables,, an to represent 8 outputs Encoing 1 in Table prouces the ECF: /!_c 75 / c! _5 / C! x} Table : Encoing methos for 8output function Thus, we have < <u< < < > ~ < >v< S < >u> S > <u<! > < > > >v< > >u>!~ Encoing 1 Encoing <zc c / } 5 However, Encoing in Table prouces the ECF: Thus, we have /!_ / 5 ~ 5 /S7c / 5 c C 5 } / _U / / / ote that the minimum BDD using Encoing 1 requires 8 noes, while the minimum BDD using Encoing requires 16 noes En of Example These two examples show the avantage of fining goo encoings For an output O, Cl+ function, //,, we nee U auxiliary variables to represent outputs So, the number of ifferent encoings is ˆ Š ˆ However, the size of the BDD is invariant uner the complementation an/or renaming of the auxiliary variables Thus, to fin the encoing for an ECF that has the smallest BDD, we have only to consier ˆ >/Lˆ Š Lˆ Œˆ Š Lˆ %ˆ ifferent encoings For b SŽ, we have, an we Ž Ž K nee only to consier ifferent encoings Table 1 shows these three encoings Thus, we can formulate 476 Problem 1 Encoing problem for an ECF Given a multipleoutput function 98, represent by using h+ auxiliary binary variables so that the resulting BDD has the fewest noes 6 1 Sƒ!~+
3 F S Table 3: Sizes of BDDs for ECFs in Theorem 1 Encoing Best Worst v 0 x 1 v 1 x v x3 v v 4 a S < goto else goto < goto S else goto S < goto S else goto : if : if : if : return0 : return1 b To the best of our nowlege, Problem 1 has not been previously formulate o goo algorithm except for the exhaustive search is nown Theorem 1 The input! g0f h output function n H g Aì u<=>+/j C > BDD for an ECF with noes, where /, an H F g W H g H g /M H g L a binary representation of the integer i is represente by a Example < 3 When, we have,, S,! z,! J,!~ ote that these functions are the same as those in Example The ECF that requires the fewest noes in the BDD is given by m gn /!Xc / zu! _5 5 U Lg g,! _5 /S7!~ is,, En of Example Table 3 shows the sizes of the BDDs for ECFs for the multipleoutput functions efine in Theorem 1 The BDDs heae Worst were foun among 100 ranom encoings From this table, we have Conjecture 1 An input output function exists that requires _ an!#"% noes in BDDs for the ECF with the encoing optimize an unoptimize, respectively 3 Application to Embee Systems 31 Branching Program Here, we consier the application to embee systems, where the size of the memory is very important [3] The branching program metho realizes a logic function by a sequential networ as follows: 1 epresent the given logic function by a BDD [4] Fig 31a, where otte lines show 0eges an soli line show 1eges Figure 31: Branching program metho Input eg MA Control Memory Output eg MB Figure 3: Architecture for Logic Simulator eplace each nonterminal noe of the BDD with an If then else statement, an erive the branching program to represent Fig 31b 3 Implement the program by a generalpurpose microprocessor To reuce the instruction fetch time, special sequential machines that traverse the BDD structure are propose [8, 9, 5] The branching program requires memory that is proportional to the number of noes in the BDD When constructing a BDD for an ECF, we can reuce the size of the BDD by fining the optimal orering of variables, as well as by fining the best encoing of the outputs As will be shown in the experimental results, the sizes of the BDDs obtaine in this way are, in many cases, smaller than other types of DDs When all the auxiliary variables are ajacent to the root noe, the BDD is equivalent to an orinary SBDD 3 Architecture for econfigurable Harware Multipleoutput functions can be evaluate by the architecture shown in Fig 3 In this architecture, the memory stores the ata for the BDD, while the control part a sequencer traverses the BDD Example 31 Consier the 4output function: 3
4 ª g > g g Auxiliary variables z 1 z 0 z 0 x 1 x 1 x 1 x 1 x x x x x x 3 x 3 Figure 33: Original variable orering for ECF Auxiliary variables v z 1 v z 0 4 v 0 x 1 x 3 v 3 v5 x 4 x v1 v 6 v Figure 34: Optimize variable orering for ECF Let the ECF be S /!_c } S_ / U /S,/ When the orering of the variables is, we have the BDD with 16 noes as shown in Fig 33 However, when the orering of the variables is 0 S 0 /, we have the BDD with only 8 noes as shown in Fig 34 Table 31 shows the BDD ata for Fig 34 Each noe has three basic attributes: an inex of the variables an a pointer for each of the 0ege an 1 ege Also, inex=0 enotes a terminal noe To evaluate the value j>+>+>+>/ of, we have to set the variables to 0 S 0 /š j>+>+,<=>+,<= > En of Example 4 Encoing Algorithm for ECF In this part, we show a heuristic algorithm to encoe outputs by using P + binary variables, so that the resulting BDD has the fewest noes It is similar to the S Table 31: BDD ata for Fig 34 aress inex 0ege 1ege ~ S S S ~ ~ ~ encoing metho that minimizes the number of proucts in sumofproucts expression SOP [16] Because of space limitations, we only show the outline An encoing for an ECF correspons to an assignment of output functions to the noes of the imensional cube Constraint matrix [6] is the output part of the minimize positional cubes [13] We use the Merit matrix to fin encoings The value of œ` ž i Ÿ/Aijs + ijs U, where œ š!<=>+ s an œ shoul be assigne to ajacent noes in the imensional cube >!? is large when g an Algorithm 41 Derivation of the Merit Matrix 1 From the minimize SOP of the CF, obtain the constraint matrix Ignore the rows with all 1 s Ignore the rows with single 1 s Let œ` ž i Ÿ/ +0 <= <!<=>+/M >!? +0, where œ an œ i 3 For each row in the constraint matrix, let g ª, =X be the number of elements in, o œ` /ž i Ÿ/ +, =x œ` ž i Ÿ/ +0 4 If œ` ž iÿ/ +0 =x < < +0 an 5 an œ` ž iÿ/ +0 =ƒ >_ L± be i the set of inexes of columns that have 1 s in the row Let For each pair ««, then let The following algorithm prouces a goo encoing for SOPs Algorithm 4 Encoing of an ECF for SOPs 1 As an initial solution, assign functions,, L 13, to istinct noes of the <=,<=/M,<+ imensional cube Let be assigne to the noe When ², assign ³ ummy functions to the remaining noes Gain œ` /ž i Ÿ/ +, = +, =, where the sum is obtaine for the ajacent noes in the imensional cube 3 Fix the function to the noe A<0<//j0< For the other functions, choose a pair of functions If Gain increases by the exchange of the functions in the 4
5 > pair, then exchange the functions Otherwise, o not exchange the functions epeat this operation while Gain increases 4 Fix the function to the noe <=,<=/M,<+ For other functions, choose a pair of functions If Gain oes not ecrease by the exchange of the functions in the pair, then exchange the functions Otherwise, o not exchange the functions epeat this operation while Gain increases 5 Do the same thing as Step 3 6 If Gain increase in Step 5, then go to Step 3 Otherwise stop Unfortunately, Algorithm 4 oes not always wor well for the minimization of BDDs So, we moifie it as follows: Algorithm 43 Encoing for ECFs for BDDs 1 Minimize the SBDD for the multipleoutput function! Mae an ECF for the natural encoing ie, is <+<ztt/t,>< is assigne to, etc, an minimize the BDD assigne to <<ztt/t <+<, is assigne to <<ztt/ts<=>, 3 Fin an encoing by Algorithm 4 an mae an ECF Minimize the BDD 4 eturn the smallest BDD among three prouce from steps 1,, an 3 Since we are using a heuristic algorithm [1] for BDD minimization, the minimize SBDD obtaine by 1 can be smaller than the BDD obtaine by or 3 5 Experimental esults 51 Benchmar esults We implemente Algorithm 43 an minimize BDDs for various benchmar functions Table 51 compares sizes of DDs, where ame enotes the function name In enotes the number of input variables Out enotes the number of output variables MTBDD, BDD for CF, SBDD, an BDD for ECF enote sizes of the corresponing DDs obtaine by Algorithm 43 entry shows a function in which the MTBDD or BDD size was too large to be constructe Table 51 shows that MTBDDs an BDDs for CF are often very large We optimize the BDD for ECF by mixing the input variables an auxiliary variables In the case of BDDs for CFs, to evaluate the logic function A X time, all the output variables must be locate after the input variables they epen on However, we roppe this restriction in the optimization of BDDs for CFs [17] Even if we rop this restriction, in some cases, BDDs for CF are too large to construct: the entry with shows such a DD For some functions such as seq, the size of the BDD for ECF is less than a half of the corresponing SBDD For Table 51: Sizes of various DDs MTBDD BDD SBDD BDD for ame In Out for CF ECF 5xp am apex apex b clip cps ue e e ex ex exep exps ibm intb jbp mainpla mar misex newtpla opa p p pc pope prom prom rcl risc seq shift spla t t t table table tms ts vg xparc other functions, such as b9, the sizes of the SBDDs are the same as those of BDDs for ECFs An SBDD is consiere as the ECF with the natural encoing Thus, the natural encoing is the optimum encoing for the function such as b9 We coul reuce the sizes of BDDs for 35 functions out of 43, or 81 percents of the functions The CPU time to obtain the encoings epens on the number of the outputs The most timeconsuming one was cps, which has 108 outputs Given a minimize SOP of a multipleoutput function, the time to obtain the encoing was about two minutes by a PC with an ITEL Pentium microprocessor 840MHz 5 Prototype of econfigurable Harware In orer to verify the performance of the architecture shown in Section 3, we evelope a reconfigurable harware using a commercially available FPGA boar 5
6 The specification of the FPGA boar is as follows: µ FPGA: Altera FLEX10K100 µ Cloc frequency: 0MHz µ AM: Static 4M Bits In this prototype, to process one noe of a BDD, we nee cloc cycles Thus, to evaluate the function for an input pattern, we nee _T T clocs, where is the number of input variables, an is the number of outputs of the function We use the Altera FPGA FLEX10K100, since it is reaily available However, we can use any logic circuit, eg, CPLDs, because the control part is very simple 6 Conclusion an Comments In this paper, we presente a new metho to represent a multipleoutput function: An encoing characteristic function for nonzero outputs ECF An ECF uses only binary variables, an its BDD can be simplifie by consiering the encoing as well as the orering of the variables BDDs for ECFs can be mae smaller than the corresponing SBDDs We formulate the encoing problem an presente a heuristic metho We also conjecture that there exists an input! output function that requires noes in a BDD for one encoing, an!#"% noes for other encoing We also evelope a reconfigurable harware consisting of a memory an a sequencer The harware is simple to implement, an the esign correspons to a minimization of a BDD for ECF Currently, we are improving the encoing algorithm for ECFs Acnowlegments This wor was supporte in part by a Grant in Ai for Scientific esearch of the Ministry of Eucation, Culture, Sports, Science an Technology of Japan Prof Jon T Butler s comments improve the English presentation eferences [1] P Ashar an S Mali, Fast functional simulation using branching programs, ICCAD 95, pp 40841, Oct 1995 [] J Babb, Tessier, M Dahl, S Hanono, D Hoi, an A Agarwal, Logic emulation with virtual wires, IEEE Transactions on Computer Aie Design, ol 16, o 6, pp 60966, June 1997 [3] F Balarin, M Chioo, P Giusto, H Hsieh, A Jurecsa, L Lavagno, A Sangiovanniincentelli, E M Sentovich, an K Suzui, Synthesis of software programs for embee control applications, IEEE Trans CAD, ol 18, o 6, pp834849, June 1999 [4] E Bryant, Graphbase algorithms for Boolean function manipulation, IEEE TC, ol C35, o 8, pp , Aug [5] M Davio, JP Deschamps, an A Thayse, Digital Systems with Algorithm Implementation, John Wiley an Sons, ew Yor, 1983 [6] G De Micheli, Synthesis an Optimization of Digital Circuits, McGrawHill, 1994 [7] W Gunther an Drechsler, Minimization of free BDDs, Proc of Asia an South Pacific Design Automation Conference, Jan 1999, pp 3336 [8] Y Iguchi, T Sasao, M Matsuura, an A Iseno A harware simulation engine base on ecision iagrams, Asia an South Pacific Design Automation Conference ASP DAC 000, Jan 68, Yoohama, Japan [9] Y Iguchi, T Sasao, M Matsuura, Implementation of multipleoutput functions using PMDDs, International Symposium on Multiplealue Logic, pp19905, May 000 [10] JH Jian, JY Jou, an JD Huang, Compatible class encoing in hyperfunction ecomposition for FPGA synthesis, Design Automation Conference, pp 71717, June 1998 [11] P C McGeer, K L McMillan, A Salanha, A L Sangiovanniincentelli, an P Scaglia, Fast iscrete function evaluation using ecision iagrams, ICCAD 95, pp 40407, ov 1995 [1] uell, Dynamic variable orering for orere binary ecision iagrams, Proceeings of the IEEE International Conference on ComputerAie Design, pp 447, Santa Clara, CA, ovember 1993 [13] T Sasao, Switching Theory for Logic Synthesis, Kluwer Acaemic Publishers, 1999 [14] T Sasao an M Fujita e, epresentations of Discrete Functions, Kluwer Acaemic Publishers 1996 [15] T Sasao, M Matsuura, an Y Iguchi, Cascae realization of multipleoutput function an its application to reconfigurable harware, International Worshop on Logic an Synthesis, Lae Tahoe, June 001, pp 530 [16] T Sasao, Compact SOP representations for multipleoutput functions: An encoing metho using multiplevalue logic, International Symposium on Multiplealue Logic, Warsaw, Polan, 001, pp 071 [17] C Scholl, Drechsler, an B Becer, Functional simulation using binary ecision iagrams, ICCAD 97, pp 81, ov 1997 [18] S Yang, Logic synthesis an optimization benchmar users guie version 30, MCC, Jan
Comparison of Decision Diagrams for Multiple-Output Logic Functions
Comparison of Decision Diagrams for Multiple-Output Logic Functions sutomu SASAO, Yukihiro IGUCHI, and Munehiro MASUURA Department of Computer Science and Electronics, Kyushu Institute of echnology Center
More informationBi-Partition of Shared Binary Decision Diagrams
Bi-Partition of Shared Binary Decision Diagrams Munehiro Matsuura, Tsutomu Sasao, on T Butler, and Yukihiro Iguchi Department of Computer Science and Electronics, Kyushu Institute of Technology Center
More informationA Parallel Branching Program Machine for Emulation of Sequential Circuits
A Parallel Branching Program Machine for Emulation of Sequential Circuits Hiroki Nakahara 1, Tsutomu Sasao 1 Munehiro Matsuura 1, and Yoshifumi Kawamura 2 1 Kyushu Institute of Technology, Japan 2 Renesas
More informationx 1 x 2 ( x 1, x 2 ) X 1 X 2 two-valued output function. f 0 f 1 f 2 f p-1 x 3 x 4
A Method to Represent Multiple- Switching Functions by Using Multi-Valued Decision Diagrams Tsutomu Sasao Department of Computer Science and Electronics Kyushu Institute of Technology Iizuka 8, Japan Jon
More informationA Quaternary Decision Diagram Machine and the Optimization of Its Code
39th International Symposium on Multiple-Valued Logic A Quaternary Decision Diagram Machine and the Optimization o Its Code Tsutomu Sasao, Hiroki Nakahara, Munehiro Matsuura Yoshiumi Kawamura 2, Jon T.
More informationOn Designs of Radix Converters Using Arithmetic Decompositions
On Designs of Radix Converters Using Arithmetic Decompositions Yukihiro Iguchi 1 Tsutomu Sasao Munehiro Matsuura 1 Dept. of Computer Science, Meiji University, Kawasaki 1-51, Japan Dept. of Computer Science
More informationBINARY decision diagrams (BDDs) [5] and multivalued
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 24, NO. 11, NOVEMBER 2005 1645 On the Optimization of Heterogeneous MDDs Shinobu Nagayama, Member, IEEE, and Tsutomu
More informationEFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER
FFICINT ON-LIN TSTING MTHOD FOR A FLOATING-POINT ADDR A. Droz, M. Lobachev Department of Computer Systems, Oessa State Polytechnic University, Oessa, Ukraine Droz@ukr.net, Lobachev@ukr.net Abstract In
More informationLab work #8. Congestion control
TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño
More information6.823 Computer System Architecture. Problem Set #3 Spring 2002
6.823 Computer System Architecture Problem Set #3 Spring 2002 Stuents are strongly encourage to collaborate in groups of up to three people. A group shoul han in only one copy of the solution to the problem
More informationImproving Performance of Sparse Matrix-Vector Multiplication
Improving Performance of Sparse Matrix-Vector Multiplication Ali Pınar Michael T. Heath Department of Computer Science an Center of Simulation of Avance Rockets University of Illinois at Urbana-Champaign
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html
More informationLoop Scheduling and Partitions for Hiding Memory Latencies
Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science
More informationDesign of Policy-Aware Differentially Private Algorithms
Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft
More informationRandom Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation
DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,
More informationA Quaternary Decision Diagram Machine: Optimization of Its Code
2026 IEICE TRANS. INF. & SYST., VOL.E93 D, NO.8 AUGUST 2010 INVITED PAPER Special Section on Multiple-Valued Logic and VLSI Computing A Quaternary Decision Diagram Machine: Optimization of Its Code Tsutomu
More informationBDD Representation for Incompletely Specified Multiple-Output Logic Functions and Its Applications to the Design of LUT Cascades
2762 IEICE TRANS. FUNDAMENTALS, VOL.E90 A, NO.12 DECEMBER 2007 PAPER Special Section on VLSI Design and CAD Algorithms BDD Representation for Incompletely Specified Multiple-Output Logic Functions and
More informationClassification and clustering methods for documents. by probabilistic latent semantic indexing model
A Short Course at amang University aipei, aiwan, R.O.C., March 7-9, 2006 Classification an clustering methos for ocuments by probabilistic latent semantic inexing moel Shigeichi Hirasawa Department of
More informationMultilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis
Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT
More informationSkyline Community Search in Multi-valued Networks
Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h
More informationarxiv:cs/ v1 [cs.lo] 15 Jun 2002
Sierpinski Gaskets or Logic Functions Representation arxiv:cs/2624v [cs.lo] 5 Jun 22 Denis V. Popel Department o Computer Science, Baker University, Balwin City, KS 666-65, U.S.A. Denis.Popel@bakeru.eu
More informationClassifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means
Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu
More informationNon-homogeneous Generalization in Privacy Preserving Data Publishing
Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h
More informationThe Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract
The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie
More informationTable-based division by small integer constants
Table-base ivision by small integer constants Florent e Dinechin, Laurent-Stéphane Diier LIP, Université e Lyon (ENS-Lyon/CNRS/INRIA/UCBL) 46, allée Italie, 69364 Lyon Ceex 07 Florent.e.Dinechin@ens-lyon.fr
More informationSURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH
SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway
More informationIntensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2
This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar
More informationA New Search Algorithm for Solving Symmetric Traveling Salesman Problem Based on Gravity
Worl Applie Sciences Journal 16 (10): 1387-1392, 2012 ISSN 1818-4952 IDOSI Publications, 2012 A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Base on Gravity Aliasghar Rahmani Hosseinabai,
More informationAn Algorithm for the Construction of Decision Diagram by Eliminating, Merging and Rearranging the Input Cube Set
An Algorithm for the Construction of Decision Diagram by Eliminating, Merging and Rearranging the Input Cube Set Prof. Sudha H Ayatti Department of Computer Science & Engineering KLS GIT, Belagavi, Karnataka,
More informationA shortest path algorithm in multimodal networks: a case study with time varying costs
A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via
More informationEfficient Computation of Canonical Form for Boolean Matching in Large Libraries
Efficient Computation of Canonical Form for Boolean Matching in Large Libraries Debatosh Debnath Dept. of Computer Science & Engineering Oakland University, Rochester Michigan 48309, U.S.A. debnath@oakland.edu
More information2-connected graphs with small 2-connected dominating sets
2-connecte graphs with small 2-connecte ominating sets Yair Caro, Raphael Yuster 1 Department of Mathematics, University of Haifa at Oranim, Tivon 36006, Israel Abstract Let G be a 2-connecte graph. A
More informationfiltering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember
107 IEICE TRANS INF & SYST, VOLE88 D, NO5 MAY 005 LETTER An Improve Neighbor Selection Algorithm in Collaborative Filtering Taek-Hun KIM a), Stuent Member an Sung-Bong YANG b), Nonmember SUMMARY Nowaays,
More informationTransient analysis of wave propagation in 3D soil by using the scaled boundary finite element method
Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite
More informationFault Simulation with Parallel Critical Path Tracing for Combinational Circuits Using Structurally Synthesized BDDs
Fault Simulation with Parallel Critical Path Tracing for Combinational Circuits Using Structurall Snthesize BDDs Sergei Devaze, Jaan Rai, Artur Jutman, Raimun Ubar Tallinn Universit of Technolog, Estonia
More informationFormal Verification using Probabilistic Techniques
Formal Verification using Probabilistic Techniques René Krenz Elena Dubrova Department of Microelectronic and Information Technology Royal Institute of Technology Stockholm, Sweden rene,elena @ele.kth.se
More informationAPPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly
International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -
More informationParticle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base
More informationShift-map Image Registration
Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.
More informationOnline Appendix to: Generalizing Database Forensics
Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that
More information1 Surprises in high dimensions
1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic
More informationWilliam S. Law. Erik K. Antonsson. Engineering Design Research Laboratory. California Institute of Technology. Abstract
Optimization Methos for Calculating Design Imprecision y William S. Law Eri K. Antonsson Engineering Design Research Laboratory Division of Engineering an Applie Science California Institute of Technology
More informationIndexing the Edges A simple and yet efficient approach to high-dimensional indexing
Inexing the Eges A simple an yet efficient approach to high-imensional inexing Beng Chin Ooi Kian-Lee Tan Cui Yu Stephane Bressan Department of Computer Science National University of Singapore 3 Science
More informationChapter 9 Memory Management
Contents 1. Introuction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threas 6. CPU Scheuling 7. Process Synchronization 8. Dealocks 9. Memory Management 10.Virtual Memory
More informationFast Fractal Image Compression using PSO Based Optimization Techniques
Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting
More informationOverlap Interval Partition Join
Overlap Interval Partition Join Anton Dignös Department of Computer Science University of Zürich, Switzerlan aignoes@ifi.uzh.ch Michael H. Böhlen Department of Computer Science University of Zürich, Switzerlan
More informationOptimizing the quality of scalable video streams on P2P Networks
Optimizing the quality of scalable vieo streams on PP Networks Paper #7 ASTRACT The volume of multimeia ata, incluing vieo, serve through Peer-to-Peer (PP) networks is growing rapily Unfortunately, high
More informationPART 2. Organization Of An Operating System
PART 2 Organization Of An Operating System CS 503 - PART 2 1 2010 Services An OS Supplies Support for concurrent execution Facilities for process synchronization Inter-process communication mechanisms
More informationImage compression predicated on recurrent iterated function systems
2n International Conference on Mathematics & Statistics 16-19 June, 2008, Athens, Greece Image compression preicate on recurrent iterate function systems Chol-Hui Yun *, Metzler W. a an Barski M. a * Faculty
More informationImplementation and Evaluation of NAS Parallel CG Benchmark on GPU Cluster with Proprietary Interconnect TCA
Implementation an Evaluation of AS Parallel CG Benchmark on GPU Cluster with Proprietary Interconnect TCA Kazuya Matsumoto 1, orihisa Fujita 2, Toshihiro Hanawa 3, an Taisuke Boku 1,2 1 Center for Computational
More informationBends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways
Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis
More informationDivide-and-Conquer Algorithms
Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:
More informationSolution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation
Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University
More informationUsing Vector and Raster-Based Techniques in Categorical Map Generalization
Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department
More informationQueueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks
Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication
More informationRobust Camera Calibration for an Autonomous Underwater Vehicle
obust Camera Calibration for an Autonomous Unerwater Vehicle Matthew Bryant, Davi Wettergreen *, Samer Aballah, Alexaner Zelinsky obotic Systems Laboratory Department of Engineering, FEIT Department of
More informationFunctional Decomposition of MVL Functions using Multi-Valued Decision Diagrams
Functional ecomposition of MVL Functions using Multi-Valued ecision iagrams Craig Files Rolf rechsler Marek A. Perkowski epartment of Electrical Engineering Institute of Computer Science Portland State
More informationNew Geometric Interpretation and Analytic Solution for Quadrilateral Reconstruction
New Geometric Interpretation an Analytic Solution for uarilateral Reconstruction Joo-Haeng Lee Convergence Technology Research Lab ETRI Daejeon, 305 777, KOREA Abstract A new geometric framework, calle
More informationPreamble. Singly linked lists. Collaboration policy and academic integrity. Getting help
CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure
More informationPolitecnico di Torino. Porto Institutional Repository
Politecnico i Torino Porto Institutional Repository [Proceeing] Automatic March tests generation for multi-port SRAMs Original Citation: Benso A., Bosio A., i Carlo S., i Natale G., Prinetto P. (26). Automatic
More informationSEPP: a New Compact Three-Level Logic Form
SEPP: a New Compact Three-Level Logic Form Valentina Ciriani Department of Information Technologies Università degli Studi di Milano, Italy valentina.ciriani@unimi.it Anna Bernasconi Department of Computer
More informationUninformed search methods
CS 1571 Introuction to AI Lecture 4 Uninforme search methos Milos Hauskrecht milos@cs.pitt.eu 539 Sennott Square Announcements Homework assignment 1 is out Due on Thursay, September 11, 014 before the
More informationTHE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE
БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:
More informationCluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters
Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets
More informationOn Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation
On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member
More informationOverview. Operating Systems I. Simple Memory Management. Simple Memory Management. Multiprocessing w/fixed Partitions.
Overview Operating Systems I Management Provie Services processes files Manage Devices processor memory isk Simple Management One process in memory, using it all each program nees I/O rivers until 96 I/O
More informationA Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition
ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural
More informationMORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks
: a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications
More informationAdditional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication
Aitional Divie an Conquer Algorithms Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Divie an Conquer Closest Pair Let s revisit the closest pair problem. Last
More informationPerformance Modelling of Necklace Hypercubes
erformance Moelling of ecklace ypercubes. Meraji,,. arbazi-aza,, A. atooghy, IM chool of Computer cience & harif University of Technology, Tehran, Iran {meraji, patooghy}@ce.sharif.eu, aza@ipm.ir a Abstract
More informationTracking and Regulation Control of a Mobile Robot System With Kinematic Disturbances: A Variable Structure-Like Approach
W. E. Dixon e-mail: wixon@ces.clemson.eu D. M. Dawson e-mail: awson@ces.clemson.eu E. Zergeroglu e-mail: ezerger@ces.clemson.eu Department of Electrical & Computer Engineering, Clemson University, Clemson,
More informationBinary Decision Diagram with Minimum Expected Path Length
Binary Decision Diagram with Minimum Expected Path Length Yi-Yu Liu Kuo-Hua Wang TingTing Hwang C. L. Liu Department of Computer Science, National Tsing Hua University, Hsinchu 300, Taiwan Dept. of Computer
More informationLearning convex bodies is hard
Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples
More informationA Classification of 3R Orthogonal Manipulators by the Topology of their Workspace
A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.
More informationData Mining: Clustering
Bi-Clustering COMP 790-90 Seminar Spring 011 Data Mining: Clustering k t 1 K-means clustering minimizes Where ist ( x, c i t i c t ) ist ( x m j 1 ( x ij i, c c t ) tj ) Clustering by Pattern Similarity
More informationPERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING
PERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING PAMELA RUSSELL ADVISOR: PAUL CULL OREGON STATE UNIVERSITY ABSTRACT. Birchall an Teor prove that
More informationAdjacency Matrix Based Full-Text Indexing Models
1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,
More informationNumerical Function Generators Using Edge-Valued Binary Decision Diagrams
Numerical Function Generators Using Edge-Valued Binary Decision Diagrams Shinobu Nagayama Tsutomu Sasao Jon T. Butler Dept. of Computer Engineering, Dept. of Computer Science Dept. of Electrical and Computer
More informationLearning Polynomial Functions. by Feature Construction
I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate
More informationDigital Logic Design. Midterm #1
The University of Toleo f7ms_il7.fm - EES: Digital Logic Design Stuent Name_ Digital Logic Design Miterm # Problems Points. 3. 4 3. 6 4. Total 5 Was the eam fair? yes no //7 The University of Toleo f7ms_il7.fm
More informationPrinciples of B-trees
CSE465, Fall 2009 February 25 1 Principles of B-trees Noes an binary search Anoe u has size size(u), keys k 1,..., k size(u) 1 chilren c 1,...,c size(u). Binary search property: for i = 1,..., size(u)
More informationImage Segmentation using K-means clustering and Thresholding
Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,
More informationOn the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems
On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,
More informationA New Decomposition of Boolean Functions
A New Decomposition of Boolean Functions Elena Dubrova Electronic System Design Lab Department of Electronics Royal Institute of Technology Kista, Sweden elena@ele.kth.se Abstract This paper introduces
More informationConsidering bounds for approximation of 2 M to 3 N
Consiering bouns for approximation of to (version. Abstract: Estimating bouns of best approximations of to is iscusse. In the first part I evelop a powerseries, which shoul give practicable limits for
More informationA Convex Clustering-based Regularizer for Image Segmentation
Vision, Moeling, an Visualization (2015) D. Bommes, T. Ritschel an T. Schultz (Es.) A Convex Clustering-base Regularizer for Image Segmentation Benjamin Hell (TU Braunschweig), Marcus Magnor (TU Braunschweig)
More informationParticle Swarm Optimization with Time-Varying Acceleration Coefficients Based on Cellular Neural Network for Color Image Noise Cancellation
Particle Swarm Optimization with Time-Varying Acceleration Coefficients Base on Cellular Neural Network for Color Image Noise Cancellation Te-Jen Su Jui-Chuan Cheng Yang-De Sun 3 College of Information
More informationPolitehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques
Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose
More informationA Stochastic Process on the Hypercube with Applications to Peer to Peer Networks
A Stochastic Process on the Hypercube with Applications to Peer to Peer Networs [Extene Abstract] Micah Aler Department of Computer Science, University of Massachusetts, Amherst, MA 0003 460, USA micah@cs.umass.eu
More informationVariable Independence and Resolution Paths for Quantified Boolean Formulas
Variable Inepenence an Resolution Paths for Quantifie Boolean Formulas Allen Van Geler http://www.cse.ucsc.eu/ avg University of California, Santa Cruz Abstract. Variable inepenence in quantifie boolean
More informationMore Raster Line Issues. Bresenham Circles. Once More: 8-Pt Symmetry. Only 1 Octant Needed. Spring 2013 CS5600
Spring 03 Lecture Set 3 Bresenham Circles Intro to Computer Graphics From Rich Riesenfel Spring 03 More Raster Line Issues Fat lines with multiple pixel with Symmetric lines n point geometry how shoul
More informationFrequency Domain Parameter Estimation of a Synchronous Generator Using Bi-objective Genetic Algorithms
Proceeings of the 7th WSEAS International Conference on Simulation, Moelling an Optimization, Beijing, China, September 15-17, 2007 429 Frequenc Domain Parameter Estimation of a Snchronous Generator Using
More informationThroughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem
Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple
More informationQuestions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!
EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an
More informationCS350 - Exam 4 (100 Points)
Fall 0 Name CS0 - Exam (00 Points).(0 points) Re-Black Trees For the Re-Black tree below, inicate where insert() woul initially occur before rebalancing/recoloring. Sketch the tree at ALL intermeiate steps
More informationState Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway
State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle
More informationControl of Scalable Wet SMA Actuator Arrays
Proceeings of the 2005 IEEE International Conference on Robotics an Automation Barcelona, Spain, April 2005 Control of Scalable Wet SMA Actuator Arrays eslie Flemming orth Dakota State University Mechanical
More informationNAND flash memory is widely used as a storage
1 : Buffer-Aware Garbage Collection for Flash-Base Storage Systems Sungjin Lee, Dongkun Shin Member, IEEE, an Jihong Kim Member, IEEE Abstract NAND flash-base storage evice is becoming a viable storage
More informationEFFICIENT STEREO MATCHING BASED ON A NEW CONFIDENCE METRIC. Won-Hee Lee, Yumi Kim, and Jong Beom Ra
th European Signal Processing Conference (EUSIPCO ) Bucharest, omania, August 7-3, EFFICIENT STEEO MATCHING BASED ON A NEW CONFIDENCE METIC Won-Hee Lee, Yumi Kim, an Jong Beom a Department of Electrical
More information