Compact BDD Representations for Multiple-Output Functions and Their Application

Size: px
Start display at page:

Download "Compact BDD Representations for Multiple-Output Functions and Their Application"

Transcription

1 8 6 IF? 8 IF 6 Compact BDD epresentations for MultipleOutput Functions an Their Application Tsutomu SASAO, Munehiro MATSUUA, Yuihiro IGUCHI, an Shinobu AGAYAMA Department of Computer Science an Electronics, Kyushu Institute of Technology Center for Microelectronic Systems, Kyushu Institute of Technology Department of Computer Science, Meiji University September 6, 001 Abstract This paper shows a new metho to represent a multipleoutput function: an encoe characteristic function for nonzero outputs ECF The ECF uses binary variables to represent an input output function, where The binary ecision iagrams BDDs for ECFs are never greater than corresponing SBDDs The size of a BDD epens on the encoing of the outputs as well as the orering of the variables We conjecture that there exists an input output function, where the optimal encoing prouces BDDs with noes, while the worst encoing prouces BDDs with!#"% noes We formulate an encoing problem an show a heuristic metho Experimental results using stanar benchmar functions show that the sizes of BDDs can be reuce significantly by consiering encoings Inex term: Multipleoutput function, encoing problem, BDD, SBDD, MTBDD, characteristic function 1 Introuction Logic networs usually have many outputs In most cases, inepenent representations of each output are inefficient Several methos exist to represent multipleoutput functions: '!+, /, :'!<=>!?, where In this paper, we consier methos to represent multipleoutput functions by using compact binary ecision iagrams BDDs There have been three previous methos to represent multipleoutput functions by BDDs The first metho is a multiterminal binary ecision iagram MTBDD [14] In an MTBDD, each terminal is a binary vector of bits For an input A B C+ output function, we can evaluate the function time Unfortunately, MTBDDs ten to be too large to construct The secon metho is a binary ecision iagram BDD for the characteristic function CF of the multipleoutput function The CF is a mapping 4+6 ED 6 1 GF, where H IF JK>!#,F iff H,,F H L/0,13,F H M3 The CF requires auxiliary binary variables O, //,, 13 that represent outputs shows the set of all the vali combinations of the inputs an the outputs For example, the CF of a 4output function is A 5 P, /!= /L!/L,, G S S= S/S! The size of a CF tens to be very large, since it involves binary variables The avantage of the CF is its small evaluation time: For an input A 5 output function, we can evaluate the function time by using a BDD for CF CFs are use in logic simulation [1], an multilevel logic optimization [6] The thir metho is a share binary ecision iagram SBDD [14] In many cases, SBDDs are smaller than corresponing MTBDDs an BDDs for CFs To evaluate the function using an SBDD, we time In this paper, we consier the fourth metho to represent a multipleoutput function, Encoe Characteristic Function for onzero outputs ECF It represents a mapping 4=6 ED 6 Z[\ ]M^,F H _`>, where a the binary vector function is b UT 5W, where U IF,F H IF XY> iff enotes the integer represente by For example, the ECF of a 4output c 5 5 S ECFs can be use in FPGA esign [10], logic emulation [], an embee systems [15] As shown in later, a BDD for an ECF is a generalization of an SBDD, an can be mae smaller than the corresponing SBDD So, it is useful for applications where the size is important ECF an Encoing Problem In this section, we efine encoe characteristic functions for nonzero outputs ECFs an formulate their encoing program [16] Definition 1 e, an f Definition <=>+/j For an ghai output function l > nonzero outputs ECF is 13 m ],olpq gn ],o p+r TT/Ts ]Mt g, an encoe characteristic function for

2 IF? Table 1: Encoing methos for fouroutput function where <u< < > S >v< S >u> S F I w I Encoing 1 Encoing Encoing 3 I /, I i b+ of an integer, an ote that,,, an is a binary representation Definition 3 The size of a ecision iagram DD is the number of noes in the DD, incluing the terminal noes, S are auxiliary variables that i represent outputs In the above efinition, the integer is encoe by a binary vector in a natural way However, by changing the encoing, we can often simplify the representation,, S '<, where,,, an Encoing 1 in Table 1 prouces the ECF: b /!x / 5 / 5 S Example 1 Consier the fouroutput function In this case, we have y <z { However, Encoing in Table 1 prouces the ECF: In this case, we have y y /!_ <z 5 } 5 5 /S75 %5 / ote that the minimum BDD using Encoing 1 requires 6 noes, while the minimum BDD using Encoing requires 7 noes En of Example Example Consier the 8output function KA!0 /,,!~/ <, where,, J! J, S,,! 3,,!~J In this case, we nee three auxiliary variables,, an to represent 8 outputs Encoing 1 in Table prouces the ECF: /!_c 75 / c! _5 / C! x} Table : Encoing methos for 8output function Thus, we have < <u< < < > ~ < >v< S < >u> S > <u<! > < > > >v< > >u>!~ Encoing 1 Encoing <zc c / } 5 However, Encoing in Table prouces the ECF: Thus, we have /!_ / 5 ~ 5 /S7c / 5 c C 5 } / _U / / / ote that the minimum BDD using Encoing 1 requires 8 noes, while the minimum BDD using Encoing requires 16 noes En of Example These two examples show the avantage of fining goo encoings For an output O, Cl+ function, //,, we nee U auxiliary variables to represent outputs So, the number of ifferent encoings is ˆ Š ˆ However, the size of the BDD is invariant uner the complementation an/or renaming of the auxiliary variables Thus, to fin the encoing for an ECF that has the smallest BDD, we have only to consier ˆ >/Lˆ Š Lˆ Œˆ Š Lˆ %ˆ ifferent encoings For b SŽ, we have, an we Ž Ž K nee only to consier ifferent encoings Table 1 shows these three encoings Thus, we can formulate 476 Problem 1 Encoing problem for an ECF Given a multipleoutput function 98, represent by using h+ auxiliary binary variables so that the resulting BDD has the fewest noes 6 1 Sƒ!~+

3 F S Table 3: Sizes of BDDs for ECFs in Theorem 1 Encoing Best Worst v 0 x 1 v 1 x v x3 v v 4 a S < goto else goto < goto S else goto S < goto S else goto : if : if : if : return0 : return1 b To the best of our nowlege, Problem 1 has not been previously formulate o goo algorithm except for the exhaustive search is nown Theorem 1 The input! g0f h output function n H g Aì u<=>+/j C > BDD for an ECF with noes, where /, an H F g W H g H g /M H g L a binary representation of the integer i is represente by a Example < 3 When, we have,, S,! z,! J,!~ ote that these functions are the same as those in Example The ECF that requires the fewest noes in the BDD is given by m gn /!Xc / zu! _5 5 U Lg g,! _5 /S7!~ is,, En of Example Table 3 shows the sizes of the BDDs for ECFs for the multipleoutput functions efine in Theorem 1 The BDDs heae Worst were foun among 100 ranom encoings From this table, we have Conjecture 1 An input output function exists that requires _ an!#"% noes in BDDs for the ECF with the encoing optimize an unoptimize, respectively 3 Application to Embee Systems 31 Branching Program Here, we consier the application to embee systems, where the size of the memory is very important [3] The branching program metho realizes a logic function by a sequential networ as follows: 1 epresent the given logic function by a BDD [4] Fig 31a, where otte lines show 0eges an soli line show 1eges Figure 31: Branching program metho Input eg MA Control Memory Output eg MB Figure 3: Architecture for Logic Simulator eplace each nonterminal noe of the BDD with an If then else statement, an erive the branching program to represent Fig 31b 3 Implement the program by a generalpurpose microprocessor To reuce the instruction fetch time, special sequential machines that traverse the BDD structure are propose [8, 9, 5] The branching program requires memory that is proportional to the number of noes in the BDD When constructing a BDD for an ECF, we can reuce the size of the BDD by fining the optimal orering of variables, as well as by fining the best encoing of the outputs As will be shown in the experimental results, the sizes of the BDDs obtaine in this way are, in many cases, smaller than other types of DDs When all the auxiliary variables are ajacent to the root noe, the BDD is equivalent to an orinary SBDD 3 Architecture for econfigurable Harware Multipleoutput functions can be evaluate by the architecture shown in Fig 3 In this architecture, the memory stores the ata for the BDD, while the control part a sequencer traverses the BDD Example 31 Consier the 4output function: 3

4 ª g > g g Auxiliary variables z 1 z 0 z 0 x 1 x 1 x 1 x 1 x x x x x x 3 x 3 Figure 33: Original variable orering for ECF Auxiliary variables v z 1 v z 0 4 v 0 x 1 x 3 v 3 v5 x 4 x v1 v 6 v Figure 34: Optimize variable orering for ECF Let the ECF be S /!_c } S_ / U /S,/ When the orering of the variables is, we have the BDD with 16 noes as shown in Fig 33 However, when the orering of the variables is 0 S 0 /, we have the BDD with only 8 noes as shown in Fig 34 Table 31 shows the BDD ata for Fig 34 Each noe has three basic attributes: an inex of the variables an a pointer for each of the 0ege an 1 ege Also, inex=0 enotes a terminal noe To evaluate the value j>+>+>+>/ of, we have to set the variables to 0 S 0 /š j>+>+,<=>+,<= > En of Example 4 Encoing Algorithm for ECF In this part, we show a heuristic algorithm to encoe outputs by using P + binary variables, so that the resulting BDD has the fewest noes It is similar to the S Table 31: BDD ata for Fig 34 aress inex 0ege 1ege ~ S S S ~ ~ ~ encoing metho that minimizes the number of proucts in sumofproucts expression SOP [16] Because of space limitations, we only show the outline An encoing for an ECF correspons to an assignment of output functions to the noes of the imensional cube Constraint matrix [6] is the output part of the minimize positional cubes [13] We use the Merit matrix to fin encoings The value of œ` ž i Ÿ/Aijs + ijs U, where œ š!<=>+ s an œ shoul be assigne to ajacent noes in the imensional cube >!? is large when g an Algorithm 41 Derivation of the Merit Matrix 1 From the minimize SOP of the CF, obtain the constraint matrix Ignore the rows with all 1 s Ignore the rows with single 1 s Let œ` ž i Ÿ/ +0 <= <!<=>+/M >!? +0, where œ an œ i 3 For each row in the constraint matrix, let g ª, =X be the number of elements in, o œ` /ž i Ÿ/ +, =x œ` ž i Ÿ/ +0 4 If œ` ž iÿ/ +0 =x < < +0 an 5 an œ` ž iÿ/ +0 =ƒ >_ L± be i the set of inexes of columns that have 1 s in the row Let For each pair ««, then let The following algorithm prouces a goo encoing for SOPs Algorithm 4 Encoing of an ECF for SOPs 1 As an initial solution, assign functions,, L 13, to istinct noes of the <=,<=/M,<+ imensional cube Let be assigne to the noe When ², assign ³ ummy functions to the remaining noes Gain œ` /ž i Ÿ/ +, = +, =, where the sum is obtaine for the ajacent noes in the imensional cube 3 Fix the function to the noe A<0<//j0< For the other functions, choose a pair of functions If Gain increases by the exchange of the functions in the 4

5 > pair, then exchange the functions Otherwise, o not exchange the functions epeat this operation while Gain increases 4 Fix the function to the noe <=,<=/M,<+ For other functions, choose a pair of functions If Gain oes not ecrease by the exchange of the functions in the pair, then exchange the functions Otherwise, o not exchange the functions epeat this operation while Gain increases 5 Do the same thing as Step 3 6 If Gain increase in Step 5, then go to Step 3 Otherwise stop Unfortunately, Algorithm 4 oes not always wor well for the minimization of BDDs So, we moifie it as follows: Algorithm 43 Encoing for ECFs for BDDs 1 Minimize the SBDD for the multipleoutput function! Mae an ECF for the natural encoing ie, is <+<ztt/t,>< is assigne to, etc, an minimize the BDD assigne to <<ztt/t <+<, is assigne to <<ztt/ts<=>, 3 Fin an encoing by Algorithm 4 an mae an ECF Minimize the BDD 4 eturn the smallest BDD among three prouce from steps 1,, an 3 Since we are using a heuristic algorithm [1] for BDD minimization, the minimize SBDD obtaine by 1 can be smaller than the BDD obtaine by or 3 5 Experimental esults 51 Benchmar esults We implemente Algorithm 43 an minimize BDDs for various benchmar functions Table 51 compares sizes of DDs, where ame enotes the function name In enotes the number of input variables Out enotes the number of output variables MTBDD, BDD for CF, SBDD, an BDD for ECF enote sizes of the corresponing DDs obtaine by Algorithm 43 entry shows a function in which the MTBDD or BDD size was too large to be constructe Table 51 shows that MTBDDs an BDDs for CF are often very large We optimize the BDD for ECF by mixing the input variables an auxiliary variables In the case of BDDs for CFs, to evaluate the logic function A X time, all the output variables must be locate after the input variables they epen on However, we roppe this restriction in the optimization of BDDs for CFs [17] Even if we rop this restriction, in some cases, BDDs for CF are too large to construct: the entry with shows such a DD For some functions such as seq, the size of the BDD for ECF is less than a half of the corresponing SBDD For Table 51: Sizes of various DDs MTBDD BDD SBDD BDD for ame In Out for CF ECF 5xp am apex apex b clip cps ue e e ex ex exep exps ibm intb jbp mainpla mar misex newtpla opa p p pc pope prom prom rcl risc seq shift spla t t t table table tms ts vg xparc other functions, such as b9, the sizes of the SBDDs are the same as those of BDDs for ECFs An SBDD is consiere as the ECF with the natural encoing Thus, the natural encoing is the optimum encoing for the function such as b9 We coul reuce the sizes of BDDs for 35 functions out of 43, or 81 percents of the functions The CPU time to obtain the encoings epens on the number of the outputs The most timeconsuming one was cps, which has 108 outputs Given a minimize SOP of a multipleoutput function, the time to obtain the encoing was about two minutes by a PC with an ITEL Pentium microprocessor 840MHz 5 Prototype of econfigurable Harware In orer to verify the performance of the architecture shown in Section 3, we evelope a reconfigurable harware using a commercially available FPGA boar 5

6 The specification of the FPGA boar is as follows: µ FPGA: Altera FLEX10K100 µ Cloc frequency: 0MHz µ AM: Static 4M Bits In this prototype, to process one noe of a BDD, we nee cloc cycles Thus, to evaluate the function for an input pattern, we nee _T T clocs, where is the number of input variables, an is the number of outputs of the function We use the Altera FPGA FLEX10K100, since it is reaily available However, we can use any logic circuit, eg, CPLDs, because the control part is very simple 6 Conclusion an Comments In this paper, we presente a new metho to represent a multipleoutput function: An encoing characteristic function for nonzero outputs ECF An ECF uses only binary variables, an its BDD can be simplifie by consiering the encoing as well as the orering of the variables BDDs for ECFs can be mae smaller than the corresponing SBDDs We formulate the encoing problem an presente a heuristic metho We also conjecture that there exists an input! output function that requires noes in a BDD for one encoing, an!#"% noes for other encoing We also evelope a reconfigurable harware consisting of a memory an a sequencer The harware is simple to implement, an the esign correspons to a minimization of a BDD for ECF Currently, we are improving the encoing algorithm for ECFs Acnowlegments This wor was supporte in part by a Grant in Ai for Scientific esearch of the Ministry of Eucation, Culture, Sports, Science an Technology of Japan Prof Jon T Butler s comments improve the English presentation eferences [1] P Ashar an S Mali, Fast functional simulation using branching programs, ICCAD 95, pp 40841, Oct 1995 [] J Babb, Tessier, M Dahl, S Hanono, D Hoi, an A Agarwal, Logic emulation with virtual wires, IEEE Transactions on Computer Aie Design, ol 16, o 6, pp 60966, June 1997 [3] F Balarin, M Chioo, P Giusto, H Hsieh, A Jurecsa, L Lavagno, A Sangiovanniincentelli, E M Sentovich, an K Suzui, Synthesis of software programs for embee control applications, IEEE Trans CAD, ol 18, o 6, pp834849, June 1999 [4] E Bryant, Graphbase algorithms for Boolean function manipulation, IEEE TC, ol C35, o 8, pp , Aug [5] M Davio, JP Deschamps, an A Thayse, Digital Systems with Algorithm Implementation, John Wiley an Sons, ew Yor, 1983 [6] G De Micheli, Synthesis an Optimization of Digital Circuits, McGrawHill, 1994 [7] W Gunther an Drechsler, Minimization of free BDDs, Proc of Asia an South Pacific Design Automation Conference, Jan 1999, pp 3336 [8] Y Iguchi, T Sasao, M Matsuura, an A Iseno A harware simulation engine base on ecision iagrams, Asia an South Pacific Design Automation Conference ASP DAC 000, Jan 68, Yoohama, Japan [9] Y Iguchi, T Sasao, M Matsuura, Implementation of multipleoutput functions using PMDDs, International Symposium on Multiplealue Logic, pp19905, May 000 [10] JH Jian, JY Jou, an JD Huang, Compatible class encoing in hyperfunction ecomposition for FPGA synthesis, Design Automation Conference, pp 71717, June 1998 [11] P C McGeer, K L McMillan, A Salanha, A L Sangiovanniincentelli, an P Scaglia, Fast iscrete function evaluation using ecision iagrams, ICCAD 95, pp 40407, ov 1995 [1] uell, Dynamic variable orering for orere binary ecision iagrams, Proceeings of the IEEE International Conference on ComputerAie Design, pp 447, Santa Clara, CA, ovember 1993 [13] T Sasao, Switching Theory for Logic Synthesis, Kluwer Acaemic Publishers, 1999 [14] T Sasao an M Fujita e, epresentations of Discrete Functions, Kluwer Acaemic Publishers 1996 [15] T Sasao, M Matsuura, an Y Iguchi, Cascae realization of multipleoutput function an its application to reconfigurable harware, International Worshop on Logic an Synthesis, Lae Tahoe, June 001, pp 530 [16] T Sasao, Compact SOP representations for multipleoutput functions: An encoing metho using multiplevalue logic, International Symposium on Multiplealue Logic, Warsaw, Polan, 001, pp 071 [17] C Scholl, Drechsler, an B Becer, Functional simulation using binary ecision iagrams, ICCAD 97, pp 81, ov 1997 [18] S Yang, Logic synthesis an optimization benchmar users guie version 30, MCC, Jan

Comparison of Decision Diagrams for Multiple-Output Logic Functions

Comparison of Decision Diagrams for Multiple-Output Logic Functions Comparison of Decision Diagrams for Multiple-Output Logic Functions sutomu SASAO, Yukihiro IGUCHI, and Munehiro MASUURA Department of Computer Science and Electronics, Kyushu Institute of echnology Center

More information

Bi-Partition of Shared Binary Decision Diagrams

Bi-Partition of Shared Binary Decision Diagrams Bi-Partition of Shared Binary Decision Diagrams Munehiro Matsuura, Tsutomu Sasao, on T Butler, and Yukihiro Iguchi Department of Computer Science and Electronics, Kyushu Institute of Technology Center

More information

A Parallel Branching Program Machine for Emulation of Sequential Circuits

A Parallel Branching Program Machine for Emulation of Sequential Circuits A Parallel Branching Program Machine for Emulation of Sequential Circuits Hiroki Nakahara 1, Tsutomu Sasao 1 Munehiro Matsuura 1, and Yoshifumi Kawamura 2 1 Kyushu Institute of Technology, Japan 2 Renesas

More information

x 1 x 2 ( x 1, x 2 ) X 1 X 2 two-valued output function. f 0 f 1 f 2 f p-1 x 3 x 4

x 1 x 2 ( x 1, x 2 ) X 1 X 2 two-valued output function. f 0 f 1 f 2 f p-1 x 3 x 4 A Method to Represent Multiple- Switching Functions by Using Multi-Valued Decision Diagrams Tsutomu Sasao Department of Computer Science and Electronics Kyushu Institute of Technology Iizuka 8, Japan Jon

More information

A Quaternary Decision Diagram Machine and the Optimization of Its Code

A Quaternary Decision Diagram Machine and the Optimization of Its Code 39th International Symposium on Multiple-Valued Logic A Quaternary Decision Diagram Machine and the Optimization o Its Code Tsutomu Sasao, Hiroki Nakahara, Munehiro Matsuura Yoshiumi Kawamura 2, Jon T.

More information

On Designs of Radix Converters Using Arithmetic Decompositions

On Designs of Radix Converters Using Arithmetic Decompositions On Designs of Radix Converters Using Arithmetic Decompositions Yukihiro Iguchi 1 Tsutomu Sasao Munehiro Matsuura 1 Dept. of Computer Science, Meiji University, Kawasaki 1-51, Japan Dept. of Computer Science

More information

BINARY decision diagrams (BDDs) [5] and multivalued

BINARY decision diagrams (BDDs) [5] and multivalued IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 24, NO. 11, NOVEMBER 2005 1645 On the Optimization of Heterogeneous MDDs Shinobu Nagayama, Member, IEEE, and Tsutomu

More information

EFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER

EFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER FFICINT ON-LIN TSTING MTHOD FOR A FLOATING-POINT ADDR A. Droz, M. Lobachev Department of Computer Systems, Oessa State Polytechnic University, Oessa, Ukraine Droz@ukr.net, Lobachev@ukr.net Abstract In

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information

6.823 Computer System Architecture. Problem Set #3 Spring 2002

6.823 Computer System Architecture. Problem Set #3 Spring 2002 6.823 Computer System Architecture Problem Set #3 Spring 2002 Stuents are strongly encourage to collaborate in groups of up to three people. A group shoul han in only one copy of the solution to the problem

More information

Improving Performance of Sparse Matrix-Vector Multiplication

Improving Performance of Sparse Matrix-Vector Multiplication Improving Performance of Sparse Matrix-Vector Multiplication Ali Pınar Michael T. Heath Department of Computer Science an Center of Simulation of Avance Rockets University of Illinois at Urbana-Champaign

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Design of Policy-Aware Differentially Private Algorithms

Design of Policy-Aware Differentially Private Algorithms Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

A Quaternary Decision Diagram Machine: Optimization of Its Code

A Quaternary Decision Diagram Machine: Optimization of Its Code 2026 IEICE TRANS. INF. & SYST., VOL.E93 D, NO.8 AUGUST 2010 INVITED PAPER Special Section on Multiple-Valued Logic and VLSI Computing A Quaternary Decision Diagram Machine: Optimization of Its Code Tsutomu

More information

BDD Representation for Incompletely Specified Multiple-Output Logic Functions and Its Applications to the Design of LUT Cascades

BDD Representation for Incompletely Specified Multiple-Output Logic Functions and Its Applications to the Design of LUT Cascades 2762 IEICE TRANS. FUNDAMENTALS, VOL.E90 A, NO.12 DECEMBER 2007 PAPER Special Section on VLSI Design and CAD Algorithms BDD Representation for Incompletely Specified Multiple-Output Logic Functions and

More information

Classification and clustering methods for documents. by probabilistic latent semantic indexing model

Classification and clustering methods for documents. by probabilistic latent semantic indexing model A Short Course at amang University aipei, aiwan, R.O.C., March 7-9, 2006 Classification an clustering methos for ocuments by probabilistic latent semantic inexing moel Shigeichi Hirasawa Department of

More information

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

arxiv:cs/ v1 [cs.lo] 15 Jun 2002

arxiv:cs/ v1 [cs.lo] 15 Jun 2002 Sierpinski Gaskets or Logic Functions Representation arxiv:cs/2624v [cs.lo] 5 Jun 22 Denis V. Popel Department o Computer Science, Baker University, Balwin City, KS 666-65, U.S.A. Denis.Popel@bakeru.eu

More information

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

Table-based division by small integer constants

Table-based division by small integer constants Table-base ivision by small integer constants Florent e Dinechin, Laurent-Stéphane Diier LIP, Université e Lyon (ENS-Lyon/CNRS/INRIA/UCBL) 46, allée Italie, 69364 Lyon Ceex 07 Florent.e.Dinechin@ens-lyon.fr

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Based on Gravity

A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Based on Gravity Worl Applie Sciences Journal 16 (10): 1387-1392, 2012 ISSN 1818-4952 IDOSI Publications, 2012 A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Base on Gravity Aliasghar Rahmani Hosseinabai,

More information

An Algorithm for the Construction of Decision Diagram by Eliminating, Merging and Rearranging the Input Cube Set

An Algorithm for the Construction of Decision Diagram by Eliminating, Merging and Rearranging the Input Cube Set An Algorithm for the Construction of Decision Diagram by Eliminating, Merging and Rearranging the Input Cube Set Prof. Sudha H Ayatti Department of Computer Science & Engineering KLS GIT, Belagavi, Karnataka,

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

Efficient Computation of Canonical Form for Boolean Matching in Large Libraries

Efficient Computation of Canonical Form for Boolean Matching in Large Libraries Efficient Computation of Canonical Form for Boolean Matching in Large Libraries Debatosh Debnath Dept. of Computer Science & Engineering Oakland University, Rochester Michigan 48309, U.S.A. debnath@oakland.edu

More information

2-connected graphs with small 2-connected dominating sets

2-connected graphs with small 2-connected dominating sets 2-connecte graphs with small 2-connecte ominating sets Yair Caro, Raphael Yuster 1 Department of Mathematics, University of Haifa at Oranim, Tivon 36006, Israel Abstract Let G be a 2-connecte graph. A

More information

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember 107 IEICE TRANS INF & SYST, VOLE88 D, NO5 MAY 005 LETTER An Improve Neighbor Selection Algorithm in Collaborative Filtering Taek-Hun KIM a), Stuent Member an Sung-Bong YANG b), Nonmember SUMMARY Nowaays,

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Fault Simulation with Parallel Critical Path Tracing for Combinational Circuits Using Structurally Synthesized BDDs

Fault Simulation with Parallel Critical Path Tracing for Combinational Circuits Using Structurally Synthesized BDDs Fault Simulation with Parallel Critical Path Tracing for Combinational Circuits Using Structurall Snthesize BDDs Sergei Devaze, Jaan Rai, Artur Jutman, Raimun Ubar Tallinn Universit of Technolog, Estonia

More information

Formal Verification using Probabilistic Techniques

Formal Verification using Probabilistic Techniques Formal Verification using Probabilistic Techniques René Krenz Elena Dubrova Department of Microelectronic and Information Technology Royal Institute of Technology Stockholm, Sweden rene,elena @ele.kth.se

More information

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

1 Surprises in high dimensions

1 Surprises in high dimensions 1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic

More information

William S. Law. Erik K. Antonsson. Engineering Design Research Laboratory. California Institute of Technology. Abstract

William S. Law. Erik K. Antonsson. Engineering Design Research Laboratory. California Institute of Technology. Abstract Optimization Methos for Calculating Design Imprecision y William S. Law Eri K. Antonsson Engineering Design Research Laboratory Division of Engineering an Applie Science California Institute of Technology

More information

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing Inexing the Eges A simple an yet efficient approach to high-imensional inexing Beng Chin Ooi Kian-Lee Tan Cui Yu Stephane Bressan Department of Computer Science National University of Singapore 3 Science

More information

Chapter 9 Memory Management

Chapter 9 Memory Management Contents 1. Introuction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threas 6. CPU Scheuling 7. Process Synchronization 8. Dealocks 9. Memory Management 10.Virtual Memory

More information

Fast Fractal Image Compression using PSO Based Optimization Techniques

Fast Fractal Image Compression using PSO Based Optimization Techniques Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting

More information

Overlap Interval Partition Join

Overlap Interval Partition Join Overlap Interval Partition Join Anton Dignös Department of Computer Science University of Zürich, Switzerlan aignoes@ifi.uzh.ch Michael H. Böhlen Department of Computer Science University of Zürich, Switzerlan

More information

Optimizing the quality of scalable video streams on P2P Networks

Optimizing the quality of scalable video streams on P2P Networks Optimizing the quality of scalable vieo streams on PP Networks Paper #7 ASTRACT The volume of multimeia ata, incluing vieo, serve through Peer-to-Peer (PP) networks is growing rapily Unfortunately, high

More information

PART 2. Organization Of An Operating System

PART 2. Organization Of An Operating System PART 2 Organization Of An Operating System CS 503 - PART 2 1 2010 Services An OS Supplies Support for concurrent execution Facilities for process synchronization Inter-process communication mechanisms

More information

Image compression predicated on recurrent iterated function systems

Image compression predicated on recurrent iterated function systems 2n International Conference on Mathematics & Statistics 16-19 June, 2008, Athens, Greece Image compression preicate on recurrent iterate function systems Chol-Hui Yun *, Metzler W. a an Barski M. a * Faculty

More information

Implementation and Evaluation of NAS Parallel CG Benchmark on GPU Cluster with Proprietary Interconnect TCA

Implementation and Evaluation of NAS Parallel CG Benchmark on GPU Cluster with Proprietary Interconnect TCA Implementation an Evaluation of AS Parallel CG Benchmark on GPU Cluster with Proprietary Interconnect TCA Kazuya Matsumoto 1, orihisa Fujita 2, Toshihiro Hanawa 3, an Taisuke Boku 1,2 1 Center for Computational

More information

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis

More information

Divide-and-Conquer Algorithms

Divide-and-Conquer Algorithms Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Robust Camera Calibration for an Autonomous Underwater Vehicle

Robust Camera Calibration for an Autonomous Underwater Vehicle obust Camera Calibration for an Autonomous Unerwater Vehicle Matthew Bryant, Davi Wettergreen *, Samer Aballah, Alexaner Zelinsky obotic Systems Laboratory Department of Engineering, FEIT Department of

More information

Functional Decomposition of MVL Functions using Multi-Valued Decision Diagrams

Functional Decomposition of MVL Functions using Multi-Valued Decision Diagrams Functional ecomposition of MVL Functions using Multi-Valued ecision iagrams Craig Files Rolf rechsler Marek A. Perkowski epartment of Electrical Engineering Institute of Computer Science Portland State

More information

New Geometric Interpretation and Analytic Solution for Quadrilateral Reconstruction

New Geometric Interpretation and Analytic Solution for Quadrilateral Reconstruction New Geometric Interpretation an Analytic Solution for uarilateral Reconstruction Joo-Haeng Lee Convergence Technology Research Lab ETRI Daejeon, 305 777, KOREA Abstract A new geometric framework, calle

More information

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Politecnico i Torino Porto Institutional Repository [Proceeing] Automatic March tests generation for multi-port SRAMs Original Citation: Benso A., Bosio A., i Carlo S., i Natale G., Prinetto P. (26). Automatic

More information

SEPP: a New Compact Three-Level Logic Form

SEPP: a New Compact Three-Level Logic Form SEPP: a New Compact Three-Level Logic Form Valentina Ciriani Department of Information Technologies Università degli Studi di Milano, Italy valentina.ciriani@unimi.it Anna Bernasconi Department of Computer

More information

Uninformed search methods

Uninformed search methods CS 1571 Introuction to AI Lecture 4 Uninforme search methos Milos Hauskrecht milos@cs.pitt.eu 539 Sennott Square Announcements Homework assignment 1 is out Due on Thursay, September 11, 014 before the

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member

More information

Overview. Operating Systems I. Simple Memory Management. Simple Memory Management. Multiprocessing w/fixed Partitions.

Overview. Operating Systems I. Simple Memory Management. Simple Memory Management. Multiprocessing w/fixed Partitions. Overview Operating Systems I Management Provie Services processes files Manage Devices processor memory isk Simple Management One process in memory, using it all each program nees I/O rivers until 96 I/O

More information

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

Additional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication

Additional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Aitional Divie an Conquer Algorithms Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Divie an Conquer Closest Pair Let s revisit the closest pair problem. Last

More information

Performance Modelling of Necklace Hypercubes

Performance Modelling of Necklace Hypercubes erformance Moelling of ecklace ypercubes. Meraji,,. arbazi-aza,, A. atooghy, IM chool of Computer cience & harif University of Technology, Tehran, Iran {meraji, patooghy}@ce.sharif.eu, aza@ipm.ir a Abstract

More information

Tracking and Regulation Control of a Mobile Robot System With Kinematic Disturbances: A Variable Structure-Like Approach

Tracking and Regulation Control of a Mobile Robot System With Kinematic Disturbances: A Variable Structure-Like Approach W. E. Dixon e-mail: wixon@ces.clemson.eu D. M. Dawson e-mail: awson@ces.clemson.eu E. Zergeroglu e-mail: ezerger@ces.clemson.eu Department of Electrical & Computer Engineering, Clemson University, Clemson,

More information

Binary Decision Diagram with Minimum Expected Path Length

Binary Decision Diagram with Minimum Expected Path Length Binary Decision Diagram with Minimum Expected Path Length Yi-Yu Liu Kuo-Hua Wang TingTing Hwang C. L. Liu Department of Computer Science, National Tsing Hua University, Hsinchu 300, Taiwan Dept. of Computer

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples

More information

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.

More information

Data Mining: Clustering

Data Mining: Clustering Bi-Clustering COMP 790-90 Seminar Spring 011 Data Mining: Clustering k t 1 K-means clustering minimizes Where ist ( x, c i t i c t ) ist ( x m j 1 ( x ij i, c c t ) tj ) Clustering by Pattern Similarity

More information

PERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING

PERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING PERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING PAMELA RUSSELL ADVISOR: PAUL CULL OREGON STATE UNIVERSITY ABSTRACT. Birchall an Teor prove that

More information

Adjacency Matrix Based Full-Text Indexing Models

Adjacency Matrix Based Full-Text Indexing Models 1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,

More information

Numerical Function Generators Using Edge-Valued Binary Decision Diagrams

Numerical Function Generators Using Edge-Valued Binary Decision Diagrams Numerical Function Generators Using Edge-Valued Binary Decision Diagrams Shinobu Nagayama Tsutomu Sasao Jon T. Butler Dept. of Computer Engineering, Dept. of Computer Science Dept. of Electrical and Computer

More information

Learning Polynomial Functions. by Feature Construction

Learning Polynomial Functions. by Feature Construction I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate

More information

Digital Logic Design. Midterm #1

Digital Logic Design. Midterm #1 The University of Toleo f7ms_il7.fm - EES: Digital Logic Design Stuent Name_ Digital Logic Design Miterm # Problems Points. 3. 4 3. 6 4. Total 5 Was the eam fair? yes no //7 The University of Toleo f7ms_il7.fm

More information

Principles of B-trees

Principles of B-trees CSE465, Fall 2009 February 25 1 Principles of B-trees Noes an binary search Anoe u has size size(u), keys k 1,..., k size(u) 1 chilren c 1,...,c size(u). Binary search property: for i = 1,..., size(u)

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

A New Decomposition of Boolean Functions

A New Decomposition of Boolean Functions A New Decomposition of Boolean Functions Elena Dubrova Electronic System Design Lab Department of Electronics Royal Institute of Technology Kista, Sweden elena@ele.kth.se Abstract This paper introduces

More information

Considering bounds for approximation of 2 M to 3 N

Considering bounds for approximation of 2 M to 3 N Consiering bouns for approximation of to (version. Abstract: Estimating bouns of best approximations of to is iscusse. In the first part I evelop a powerseries, which shoul give practicable limits for

More information

A Convex Clustering-based Regularizer for Image Segmentation

A Convex Clustering-based Regularizer for Image Segmentation Vision, Moeling, an Visualization (2015) D. Bommes, T. Ritschel an T. Schultz (Es.) A Convex Clustering-base Regularizer for Image Segmentation Benjamin Hell (TU Braunschweig), Marcus Magnor (TU Braunschweig)

More information

Particle Swarm Optimization with Time-Varying Acceleration Coefficients Based on Cellular Neural Network for Color Image Noise Cancellation

Particle Swarm Optimization with Time-Varying Acceleration Coefficients Based on Cellular Neural Network for Color Image Noise Cancellation Particle Swarm Optimization with Time-Varying Acceleration Coefficients Base on Cellular Neural Network for Color Image Noise Cancellation Te-Jen Su Jui-Chuan Cheng Yang-De Sun 3 College of Information

More information

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose

More information

A Stochastic Process on the Hypercube with Applications to Peer to Peer Networks

A Stochastic Process on the Hypercube with Applications to Peer to Peer Networks A Stochastic Process on the Hypercube with Applications to Peer to Peer Networs [Extene Abstract] Micah Aler Department of Computer Science, University of Massachusetts, Amherst, MA 0003 460, USA micah@cs.umass.eu

More information

Variable Independence and Resolution Paths for Quantified Boolean Formulas

Variable Independence and Resolution Paths for Quantified Boolean Formulas Variable Inepenence an Resolution Paths for Quantifie Boolean Formulas Allen Van Geler http://www.cse.ucsc.eu/ avg University of California, Santa Cruz Abstract. Variable inepenence in quantifie boolean

More information

More Raster Line Issues. Bresenham Circles. Once More: 8-Pt Symmetry. Only 1 Octant Needed. Spring 2013 CS5600

More Raster Line Issues. Bresenham Circles. Once More: 8-Pt Symmetry. Only 1 Octant Needed. Spring 2013 CS5600 Spring 03 Lecture Set 3 Bresenham Circles Intro to Computer Graphics From Rich Riesenfel Spring 03 More Raster Line Issues Fat lines with multiple pixel with Symmetric lines n point geometry how shoul

More information

Frequency Domain Parameter Estimation of a Synchronous Generator Using Bi-objective Genetic Algorithms

Frequency Domain Parameter Estimation of a Synchronous Generator Using Bi-objective Genetic Algorithms Proceeings of the 7th WSEAS International Conference on Simulation, Moelling an Optimization, Beijing, China, September 15-17, 2007 429 Frequenc Domain Parameter Estimation of a Snchronous Generator Using

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

CS350 - Exam 4 (100 Points)

CS350 - Exam 4 (100 Points) Fall 0 Name CS0 - Exam (00 Points).(0 points) Re-Black Trees For the Re-Black tree below, inicate where insert() woul initially occur before rebalancing/recoloring. Sketch the tree at ALL intermeiate steps

More information

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle

More information

Control of Scalable Wet SMA Actuator Arrays

Control of Scalable Wet SMA Actuator Arrays Proceeings of the 2005 IEEE International Conference on Robotics an Automation Barcelona, Spain, April 2005 Control of Scalable Wet SMA Actuator Arrays eslie Flemming orth Dakota State University Mechanical

More information

NAND flash memory is widely used as a storage

NAND flash memory is widely used as a storage 1 : Buffer-Aware Garbage Collection for Flash-Base Storage Systems Sungjin Lee, Dongkun Shin Member, IEEE, an Jihong Kim Member, IEEE Abstract NAND flash-base storage evice is becoming a viable storage

More information

EFFICIENT STEREO MATCHING BASED ON A NEW CONFIDENCE METRIC. Won-Hee Lee, Yumi Kim, and Jong Beom Ra

EFFICIENT STEREO MATCHING BASED ON A NEW CONFIDENCE METRIC. Won-Hee Lee, Yumi Kim, and Jong Beom Ra th European Signal Processing Conference (EUSIPCO ) Bucharest, omania, August 7-3, EFFICIENT STEEO MATCHING BASED ON A NEW CONFIDENCE METIC Won-Hee Lee, Yumi Kim, an Jong Beom a Department of Electrical

More information