Finite Automata Implementations Considering CPU Cache J. Holub

Size: px
Start display at page:

Download "Finite Automata Implementations Considering CPU Cache J. Holub"

Transcription

1 Finite Automata Implementations Consiering CPU Cache J. Holub The finite automata are mathematical moels for finite state systems. More general finite automaton is the noneterministic finite automaton (NFA) that cannot be irectly use. It is usually transforme to the eterministic finite automaton (DFA) that then runs in time (n), where n is the size of the input text. We present two main approaches to practical implementation of DFA consiering CPU cache. The first approach (represente by Table Driven an Har Coe implementations) is suitable forautomata being run very frequently, typically having cycles. The other approach is suitable for a collection of automata from which various automata are retrieve an then run. This secon kin of automata are expecte to be cyclefree. Keywors: eterministic finite automaton, CPU cache, implementation. 1 Introuction The original formal stuy of finite state systems (neural nets) is from 193 by McCulloch an Pitts [1]. In 1956 Kleene [13] moele the neural nets of McCulloch an Pitts by finite automata. In that time similar moels were presente by Huffman [12], Moore [17], an Mealy [15]. In 1959, Rabin an Scott introuce noneterministic finite automata (NFA) in [21]. The finite automata theory is a well evelope theory. It eals with regular languages, regular expressions, regular grammars, NFAs, eterministic finite automata (DFAs), an various transformations among the previously liste formalisms. The final prouct of the theory towars practical implementation is a DFA. CPU Core L1 Cache L2 Cache RAM usage. Section 3 then escribes general techniques for DFA implementation. It is mostly suitable for DFA that is run most of the time. Since DFA has a finite set of states, this kin of DFA has to have cycles. Recent results in the implementation using CPU cache are iscusse in Section. On the other han we have a collection of DFAs each representing some ocument (e.g., in the form of complete inex in case of factor or suffix automata). Such DFA is use only when properties of the corresponing ocument are examine. Such automaton usually oes not have cycles. There are ifferent requirements for implementation of such DFA. Suitable implementations are escribe in Section 5. 2 Noneterministic finite automaton Noneterministic finite automaton (NFA)isaquintuple(Q,,, q 0, F), where Q is a finite set of states, is a set of input symbols, is a mapping Q ( ) ( Q), q0 Q is an initial state, an F Q is a set of final states. Deterministic finite automaton (DFA) is a special case of NFA, where is a mapping Q Q. a b c Fig. 1: Memory Cache Hierarchy DFA then runs theoretically in time (n), where n is the size of the input text. However, in practice we have to consier CPU cache that rapily influences the spee. CPU has two level caches isplaye in Fig. 1. The level 1 (L1) cache is locate on chip. It takes about 2 3 CPU cycles to access ata in L1 cache. The level 2 (L2) cache may be on chip or may be external. It has about 10 cycles access time. The main memory access takes cycles an har isc rive access takes even 10 6 times more time. Therefore it is obvious that CPU cache significantly influences DFA run. We cannot control the CPU cache use irectly, but knowing the CPU cache strategieswecanimplementthedfaruninawaysothat CPU cache woul be most likely efficiently use. We istinguish two kins of use of DFA. For each of them we escribe the most suitable implementation. In Section 2 we efine noneterministic finite automaton an iscuss its Fig. 2: A eterministic finite automaton In the previous efinition we talk about completely efine DFA, where there is for each source state an each input symbol exactly one estination state efine. However, there is also partially efine DFA, where there is for each source state an each input symbol at most one estination state efine. The partially efine DFA can be transforme to completely efine DFA introucing a new state (so calle sink state) which has a self loop for each symbol of an into which all non efine transitions of all states lea. There are also NFAs with more than one initial state. Such NFAs can be transforme to NFAs with one initial state introucing a new initial state from which transitions lea to all former initial states. Czech Technical University Publishing House 51 c

2 NFA accepts a given input string w * if there exists a path (a sequence of transitions) from the initial state to a final state spelling w. The problem occurs when for a pair (q, a), q Q, a (i.e., state q of NFA is active an a in the current input symbol) there are more possibilities how to continue: 1. There are more than one transitions labele by a outgoing from state q. Thatis ( qa, ) Thereisan transition in aition to other transitions outgoing from the same state. In such a case NFA cannot ecie, having only the knowlege of the current state an current input symbol, which transition to take. Due to this noneterminism NFA cannot be irectly use. There are two options: 1. We can transform NFA to the equivalent DFA using the stanar subset construction [21]. However, it may lea to an exponential increase of number of states (2 Q NFA states, where Q NFA is the number of states of the original NFA). The resulting DFA then runs in linear time with respect to the size of the input text. 2. We can simulate the run of NFA in a eterministic way. We can use Basic Simulation Metho [7, 6] usable for any NFA. For NFA with a regular structure (like in the exact an approximate pattern matching fiel) we can use Bit Parallelism [16,7,6,10] or Dynamic Programming [16, 8, 6] simulation methos which improve the running time of the Basic Simulation Metho in this special case. The simulation runs slower than DFA however the memory requirements are much smaller. Practical experiments weregivenin[11]. 3 Deterministic finite automaton implementation Further in the text we o not consier simulation techniques. We consier only DFA. DFA runs theoretically in time ( n ),wheren is the size of the input text. There are two main techniques for implementation of DFA: 1. Table Driven (TD): The mapping is implemente as a transition matrix of size Q (transition table). The current state number is hel in a variable q curr an the next state number is retrieve from the transitiontable from line q curr an column a,wherea is the current input symbol. 2. Har Coe (HC) [22]: The transition table is represente as a programming language coe. For each state there is a place starting with a statelabel. Then there is a sequence of conitional jumps, where base on the current input symbol the corresponing goto comman to the estination statelabel is performe. 3.1 Table Driven An example of TD implementation is shown in Fig. 3. For partially efine DFA one have to either transform it to a completely efine DFA or hanle the case when a unefine transition shoul be use. Obviously TD implementation is very efficient for completely efine DFA or DFAs with nonsparse transition table. It can be also very efficiently use in programs, where DFA is constructefromagiveninputanthenitisrun.insucha case it can be easily store into the transition matrix. The coe for the DFA run is then inepenent on the content of the transition matrix. TD implementation is also very convenient for a harware implementation, where the transition matrix is represente by a memory chip. 3.2 Har Coe An example of HC implementation is shown in Fig.. The implementation can work with partially efine DFA in this case. HC implementation may save some space when use for partially efine DFA, where the transition matrix woul be sparse. It cannot be use in programs, where DFA is constructe from the input. When DFA is constructe, a har coe part of the program has to be generate in a programming language, then compile an execute. This technique woul nee calls of several programs (compiler, linker, the DFA program itself) an woul be very inefficient. Note that we cannot use the recursive escent [1] approach from LL(k) topown parsing, where each state coul be represente by a function calling recursively a function representing the following state. In such a case the system stack woul overflow since DFA woul return from the function calls only at the en of the run. There woul be as many neste function calls as the size of the input text. However, Ngassam s implementation [18] uses a function for each state, but the function (with the current input symbol given as a parameter) returns an inex of the next state an then the next state function (with the next input symbol given as a parameter) is calle. transition_table: a b c int DFA_TD(){ int state=0,symbol; while((symbol= getchar())!= EOF ) { state = transition_table[state][symbol]; returnis_final[state]; Fig. 3: Table Driven implementation of DFA from Fig Czech Technical University Publishing House

3 int DFA_HC(){ int symbol; state0:if ((symbol= getchar())== EOF) return0; case a : goto state1; case : goto state; efault:return(1); state1:if ((symbol= getchar())== EOF) return0; case b : goto state2; case c : goto state3; efault:return(1); state2:if ((symbol= getchar())== EOF) return0; case c : goto state3; case : goto state; efault:return(1); state3:if ((symbol= getchar())== EOF) return0; case : goto state; efault:return(1); state:if ((symbol= getchar())== EOF) return1; return(1); Fig. : Har Coe implementation of DFA from Figure 2 DFA with cycles TD an HC implementations (an their combination calle MixeMoe MM) were heavily examine by Ngassam [20, 18]. His implementations use a ata structure that most likely will be store in CPU cache. For each of TD an HC implementationshe evelope three strategies to use CPU cache efficiently: Dynamic State Allocation (DSA), State pre orering (SpO), an Allocate Virtual Caching (AVC). DSA strategy has been suggeste in [19] an was prove to outperform TD when a largescale DFA is use to recognize very long strings that ten to repeately visit the same set of states. SpO relies on a egree of prior knowlege about the orerin which states are likely to be visite at runtime. It was shown that the associate algorithm outperforms its TD counterpart no matter the kin of string being processe. AVC strategy reorers the transition table at run time an also leas to better performance when processing strings that visit a limite number of states. Ngassam s approach can be efficiently exploite in DFA, where some states are frequently visite (like in DFA with cycles). In both TD an HC Ngassam s implementations the transition table is expecte to have the same number of items in each row (i.e., each state having the same number of outgoing transitions). Ngassam s implementation uses a fixe size structure for each row of the transition table. Therefore for sparse transition matrix the metho is not so memory efficient. 5 Acyclic DFA Another approach is use for acyclic DFA. In these automata each state is visite just once uring the DFA run. Suffix automaton an factor automaton (automaton recognizing all suffixes an factors of the given string, respectively) [3, ] are of such kin. Given a pattern they verify if the pattern is a suffix or a factor of the original string in time linear with the length of pattern regarless the size of the original string. An efficient implementation of the suffix automaton (also calle DAWG Direct Acyclic Wor Graph) was create by Balík [2]. An implementation of the compact version of the suffix automaton calle compact suffix automaton (also calle Compact DAWG) was presente by Crochemore an Holub in [9]. Both these implementations are very efficient in terms of memory use (about bytes per input string symbol). The factor an suffix automata are usually built over whole texts typically several megabytes long. Instea of storing the transition tableas a matrix like in TD implementation, whole automatonisuseinabitstream.thebitstreamcontainsa sequence of states each containing a list of all outgoing transitions (i.e., sparse matrix representation). Czech Technical University Publishing House 53

4 bitstream: state number: 0 a 0 b c 0 c Fig. 5: A sketch of bitstream implementation of DFA from Fig. 2 The key feature of both implementations is a topological orering of states. It ensures that we never get back in the bit stream when traversing the automaton. This minimizes main memory (or har isc rive) accesses. Balík s implementation is focuse on the smallest memory use. It uses some ata compression techniques. It also exploits the fact that both factor an suffix automata are homogeneous automata [5], where each state has all incoming transitions labele by the same symbol. Therefore the label of incoming transition is store in the estination state. The outgoing transition then only points to the estination state, where the corresponing transition label is store. On the other han Holub s implementation consiers also the spee of traversing. Each state contains all outgoing transitions together with their transition labels like in Fig. 5. (However, the DFA represente in Fig. 5 is neither suffix nor factor automaton.) It is not so memory efficient like Balík s implementation but it reuces main memory (or har isc rive) accesses. It exploits the locality of ata principle use by CPU cache. When a state isreache uring the DFA run, whole segment aroun the state is loae into CPU cache (from main memory or har isc rive). The ecision which transition to take is one base only on the information in the segment (in the CPU cache) an no other accessesto other segments (i.e., possible memory/hdd accesses) are neee. While in Balík s implementation one nees to access all the estination states to retrieve the transition labels of the corresponing transitions. Holub s implementation uses at most as many main memory/hdd accesses as many states are traverse. 6 Conclusion The paper presents two approaches to DFA implementation consiering CPU cache. The first approach is suitable for DFA with cycles where we expect some states are visite frequently. HC an TD implementations for DFA with nonsparse transition table were iscusse. On the other han the other approach is suitable for acyclic DFA with a sparse transition table. This approach saves memory use but it runs slower than the previous one instea of irect transition table access (coorinates given by the current state an the current input symbol) a linke list of outgoing transition of a given state is linearly traverse. However, reucing the memory use for the transition table increases the probability that the next state is alreay in the CPU cache which also increases the spee of DFA run. The first approach is suitable for the DFAs that are running all the time like for example an antivirus filter on a communication line. On the other han the secon approach is suitable for a collection of DFAs from which one is selecte an then it is run. That is for example a case of suffix or factor automata buil over a collection of ocuments store in har isk. The task is then for a given pattern fin all ocuments containing the pattern. Acknowlegment This research has been partially supporte by the Ministry of Eucation, Youth an Sports uner research program MSM an the Czech Science Founation as project No. 201/06/1039. References [1] Aho,A.V.,Sethi,R.,Ullman,J.D.:Compilers Principles, Techniques an Tools. AisonWesley, Reaing, MA, [2] Balík, M.: DAWG versus Suffix Array. In: J.M. Champarnau, D. Maurel (es.): Implementation an Application of Automata, number 2608 in Lecture Notes in Computer Science, p SpringerVerlag, Heielberg, [3] Blumer,A.,Blumer,J.,Ehrenfeucht,A.,Haussler,D., Chen, M. T., Seiferas, J.: The Smallest Automaton Recognizing the Subwors of a Text. Theor. Comput. Sci., Vol. 0 (1985), No. 1, p [] Blumer,A.,Blumer,J.,Ehrenfeucht,A.,Haussler,D., McConnel, R.: Complete Inverte Files for Efficient Text Retrieval an Analysis. J. Assoc. Comput. Mach., Vol. 3 (1987), No. 3, p [5] Champarnau, J.M.: Subset Construction Complexity for Homogeneous Automata, Position Automata an ZPCStructures. Theor. Comput. Sci., Vol. 267 (2001), No. 1 2, p [6] Holub, J.: Simulation of Noneterministic Finite Automata in Pattern Matching. Ph.D. Thesis, Czech Technical University in Prague, Czech Republic, [7] Holub, J.: Bit Parallelism NFA Simulation. In: B. W. Watson, D. Woo (es.): Implementation an Application of Automata, number 29 in Lecture Notes in Computer Science, p SpringerVerlag, Heielberg, [8] Holub, J.: Dynamic Programming NFA Simulation. In: J.M. Champarnau, D. Maurel (es.): Implementation an Application of Automata, number 2608 in Lecture Notes in Computer Science, p Springer Verlag, Heielberg, [9] Holub, J., Crochemore, M.: On the Implementation of Compact DAWG s. In: J.M. Champarnau, D. Maurel (es.): Implementation an Application of Automata,number 2608 in Lecture Notes in Computer Science, p SpringerVerlag, Heielberg, Czech Technical University Publishing House

5 [10] Holub, J., Iliopoulos, C. S., Melichar, B., Mouchar, L.: Distribute String Matching Using Finite Automata. In:R.Raman,J.Simpson(es.):Proceeings of the 10 th Australasian Workshop On Combinatorial Algorithms, p , Perth, WA, Australia, [11] Holub, J., Špiller, P.: Practical Experiments with NFA Simulation.In:L.Cleophas,B.W.Watson(es.):Proceeings of the Einhoven FASTAR Days 200, TU Einhoven, The Netherlans, 200, p [12] Huffman, D. A.: The Synthesis of Sequential Switching Circuits. J. Franklin Institute, Vol. 257 (195), p , [13] Kleene, S. C.: Representation of Events in Nerve Nets an Finite Automata. Automata Stuies, (1956), p [1]McCulloch,W.S.,Pitts,W.:ALogicalCalculusofthe Ieas Immanent in Nervous Activity. Bull. Math. Biophysics, Vol.5 (193), p [15] Mealy, G. H.: A Metho for Synthetizing Sequential Circuits. Bell System Technical J., Vol. 3 (1955), No. 5, p [16] Melichar, B.: Approximate String Matching by Finite Automata. In: V. Hlaváč, R. Šára (es.): Computer Analysis of Images an Patterns, number 970 in Lecture Notes in Computer Science, p SpringerVerlag, Berlin, [17] Moore, E. F.: Geanken Experiments on Sequential Machines. Automata Stuies, 1956, p [18] Ngassam, E. K.: Towars Cache Optimization in Finite Automata Implementations. Ph.D. Thesis, University of Pretoria, South Africa, [19] Ngassam, E. K., Kourie, D. G., Watson, B. W.: Reorering Finite Automatata States for Fast String Recognition. In:J.Holub,M.Šimánek(es.):Proceeings of the Prague Stringology Conference 05, Czech Technical University in Prague, Czech Republic, 2005, p [20] Ngassam, E. K., Kourie, D. G., Watson, B. W.: On Implementation an Performance of TableDriven DFA Base String Processors. In: J. Holub, J. Ž árek (es.): Proceeings of the Prague Stringology Conference 06, Czech Technical University in Prague, Czech Republic, 2006, p [21] Rabin, M. O., Scott, D.: Finite Automata an Their Decision Problems. IBM J. Res. Dev., Vol. 3 (1959), p [22] Thompson, K.: Regular Expression Search Algorithm. Commun. Assoc. Comput. Mach., Vol. 11 (1968), p Ing. Jan Holub, Ph.D. holub@fel.cvut.cz Department of Computer Science an Engineering Czech Technical University in Prague Faculty of Electrical Engineering Karlovo nám Prague 2, Czech Republic Czech Technical University Publishing House 55

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Adjacency Matrix Based Full-Text Indexing Models

Adjacency Matrix Based Full-Text Indexing Models 1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

6.823 Computer System Architecture. Problem Set #3 Spring 2002

6.823 Computer System Architecture. Problem Set #3 Spring 2002 6.823 Computer System Architecture Problem Set #3 Spring 2002 Stuents are strongly encourage to collaborate in groups of up to three people. A group shoul han in only one copy of the solution to the problem

More information

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

Recitation Caches and Blocking. 4 March 2019

Recitation Caches and Blocking. 4 March 2019 15-213 Recitation Caches an Blocking 4 March 2019 Agena Reminers Revisiting Cache Lab Caching Review Blocking to reuce cache misses Cache alignment Reminers Due Dates Cache Lab (Thursay 3/7) Miterm Exam

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.

More information

Compiler Optimisation

Compiler Optimisation Compiler Optimisation Michael O Boyle mob@inf.e.ac.uk Room 1.06 January, 2014 1 Two recommene books for the course Recommene texts Engineering a Compiler Engineering a Compiler by K. D. Cooper an L. Torczon.

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Image compression predicated on recurrent iterated function systems

Image compression predicated on recurrent iterated function systems 2n International Conference on Mathematics & Statistics 16-19 June, 2008, Athens, Greece Image compression preicate on recurrent iterate function systems Chol-Hui Yun *, Metzler W. a an Barski M. a * Faculty

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Linus Svärm Petter Stranmark Centre for Mathematical Sciences, Lun University {linus,petter}@maths.lth.se Abstract Shift-map image processing is a new framework base on energy

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

Improving Performance of Sparse Matrix-Vector Multiplication

Improving Performance of Sparse Matrix-Vector Multiplication Improving Performance of Sparse Matrix-Vector Multiplication Ali Pınar Michael T. Heath Department of Computer Science an Center of Simulation of Avance Rockets University of Illinois at Urbana-Champaign

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

Chapter 9 Memory Management

Chapter 9 Memory Management Contents 1. Introuction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threas 6. CPU Scheuling 7. Process Synchronization 8. Dealocks 9. Memory Management 10.Virtual Memory

More information

Supporting Fully Adaptive Routing in InfiniBand Networks

Supporting Fully Adaptive Routing in InfiniBand Networks XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar

More information

Table-based division by small integer constants

Table-based division by small integer constants Table-base ivision by small integer constants Florent e Dinechin, Laurent-Stéphane Diier LIP, Université e Lyon (ENS-Lyon/CNRS/INRIA/UCBL) 46, allée Italie, 69364 Lyon Ceex 07 Florent.e.Dinechin@ens-lyon.fr

More information

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure

More information

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT

More information

Petri Nets with Time and Cost (Tutorial)

Petri Nets with Time and Cost (Tutorial) Petri Nets with Time an Cost (Tutorial) Parosh Aziz Abulla Department of Information Technology Uppsala University Sween parosh@it.uu.se Richar Mayr School of Informatics, LFCS University of Einburgh Unite

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

Fast Fractal Image Compression using PSO Based Optimization Techniques

Fast Fractal Image Compression using PSO Based Optimization Techniques Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting

More information

DEVELOPMENT OF DamageCALC APPLICATION FOR AUTOMATIC CALCULATION OF THE DAMAGE INDICATOR

DEVELOPMENT OF DamageCALC APPLICATION FOR AUTOMATIC CALCULATION OF THE DAMAGE INDICATOR Mechanical Testing an Diagnosis ISSN 2247 9635, 2012 (II), Volume 4, 28-36 DEVELOPMENT OF DamageCALC APPLICATION FOR AUTOMATIC CALCULATION OF THE DAMAGE INDICATOR Valentina GOLUBOVIĆ-BUGARSKI, Branislav

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Modifying ROC Curves to Incorporate Predicted Probabilities

Modifying ROC Curves to Incorporate Predicted Probabilities Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

A Plane Tracker for AEC-automation Applications

A Plane Tracker for AEC-automation Applications A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

Figure 1: 2D arm. Figure 2: 2D arm with labelled angles

Figure 1: 2D arm. Figure 2: 2D arm with labelled angles 2D Kinematics Consier a robotic arm. We can sen it commans like, move that joint so it bens at an angle θ. Once we ve set each joint, that s all well an goo. More interesting, though, is the question of

More information

Optimizing the quality of scalable video streams on P2P Networks

Optimizing the quality of scalable video streams on P2P Networks Optimizing the quality of scalable vieo streams on PP Networks Paper #7 ASTRACT The volume of multimeia ata, incluing vieo, serve through Peer-to-Peer (PP) networks is growing rapily Unfortunately, high

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples

More information

Frequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises

Frequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises verview Frequent Pattern Mining comprises Frequent Pattern Mining hristian Borgelt School of omputer Science University of Konstanz Universitätsstraße, Konstanz, Germany christian.borgelt@uni-konstanz.e

More information

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Proving Vizing s Theorem with Rodin

Proving Vizing s Theorem with Rodin Proving Vizing s Theorem with Roin Joachim Breitner March 25, 2011 Proofs for Vizing s Theorem t to be unwiely unless presente in form a constructive algorithm with a proof of its correctness an termination.

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

A Convex Clustering-based Regularizer for Image Segmentation

A Convex Clustering-based Regularizer for Image Segmentation Vision, Moeling, an Visualization (2015) D. Bommes, T. Ritschel an T. Schultz (Es.) A Convex Clustering-base Regularizer for Image Segmentation Benjamin Hell (TU Braunschweig), Marcus Magnor (TU Braunschweig)

More information

ACE: And/Or-parallel Copying-based Execution of Logic Programs

ACE: And/Or-parallel Copying-based Execution of Logic Programs ACE: An/Or-parallel Copying-base Execution of Logic Programs Gopal GuptaJ Manuel Hermenegilo* Enrico PontelliJ an Vítor Santos Costa' Abstract In this paper we present a novel execution moel for parallel

More information

Handling missing values in kernel methods with application to microbiology data

Handling missing values in kernel methods with application to microbiology data an Machine Learning. Bruges (Belgium), 24-26 April 2013, i6oc.com publ., ISBN 978-2-87419-081-0. Available from http://www.i6oc.com/en/livre/?gcoi=28001100131010. Hanling missing values in kernel methos

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

Secure Network Coding for Distributed Secret Sharing with Low Communication Cost

Secure Network Coding for Distributed Secret Sharing with Low Communication Cost Secure Network Coing for Distribute Secret Sharing with Low Communication Cost Nihar B. Shah, K. V. Rashmi an Kannan Ramchanran, Fellow, IEEE Abstract Shamir s (n,k) threshol secret sharing is an important

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

Characterizing Decoding Robustness under Parametric Channel Uncertainty

Characterizing Decoding Robustness under Parametric Channel Uncertainty Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

Demystifying Automata Processing: GPUs, FPGAs or Micron s AP?

Demystifying Automata Processing: GPUs, FPGAs or Micron s AP? Demystifying Automata Processing: GPUs, FPGAs or Micron s AP? Marziyeh Nourian 1,3, Xiang Wang 1, Xiaoong Yu 2, Wu-chun Feng 2, Michela Becchi 1,3 1,3 Department of Electrical an Computer Engineering,

More information

Navigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar

Navigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar Navigation Aroun an nknown Obstacle for Autonomous Surface Vehicles sing a Forwar-Facing Sonar Patrick A. Plonski, Joshua Vaner Hook, Cheng Peng, Narges Noori, Volkan Isler Abstract A robotic boat is moving

More information

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative

More information

Dense Disparity Estimation in Ego-motion Reduced Search Space

Dense Disparity Estimation in Ego-motion Reduced Search Space Dense Disparity Estimation in Ego-motion Reuce Search Space Luka Fućek, Ivan Marković, Igor Cvišić, Ivan Petrović University of Zagreb, Faculty of Electrical Engineering an Computing, Croatia (e-mail:

More information

Classical Mechanics Examples (Lagrange Multipliers)

Classical Mechanics Examples (Lagrange Multipliers) Classical Mechanics Examples (Lagrange Multipliers) Dipan Kumar Ghosh Physics Department, Inian Institute of Technology Bombay Powai, Mumbai 400076 September 3, 015 1 Introuction We have seen that the

More information

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural

More information

Technical Report TR Navigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar

Technical Report TR Navigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar Technical Report Department of Computer Science an Engineering niversity of Minnesota 4-192 Keller Hall 2 nion Street SE Minneapolis, MN 55455-159 SA TR 15-5 Navigation Aroun an nknown Obstacle for Autonomous

More information

1. What is a Map (or Function)? Maps. CITS2200 Data Structures and Algorithms. Some definitions... Topic 16

1. What is a Map (or Function)? Maps. CITS2200 Data Structures and Algorithms. Some definitions... Topic 16 1. What is a Map (or Function)? CITS2200 Data Structures an Algorithms Topic 16 Maps Definitions what is a map (or function)? Specification List-base representation (singly linke) Sorte block representation

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Top-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications

Top-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications Top-own Connectivity Policy Framework for Mobile Peer-to-Peer Applications Otso Kassinen Mika Ylianttila Junzhao Sun Jussi Ala-Kurikka MeiaTeam Department of Electrical an Information Engineering University

More information

NAND flash memory is widely used as a storage

NAND flash memory is widely used as a storage 1 : Buffer-Aware Garbage Collection for Flash-Base Storage Systems Sungjin Lee, Dongkun Shin Member, IEEE, an Jihong Kim Member, IEEE Abstract NAND flash-base storage evice is becoming a viable storage

More information

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

EFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER

EFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER FFICINT ON-LIN TSTING MTHOD FOR A FLOATING-POINT ADDR A. Droz, M. Lobachev Department of Computer Systems, Oessa State Polytechnic University, Oessa, Ukraine Droz@ukr.net, Lobachev@ukr.net Abstract In

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Tight Wavelet Frame Decomposition and Its Application in Image Processing

Tight Wavelet Frame Decomposition and Its Application in Image Processing ITB J. Sci. Vol. 40 A, No., 008, 151-165 151 Tight Wavelet Frame Decomposition an Its Application in Image Processing Mahmu Yunus 1, & Henra Gunawan 1 1 Analysis an Geometry Group, FMIPA ITB, Banung Department

More information

CMSC 430 Introduction to Compilers. Spring Register Allocation

CMSC 430 Introduction to Compilers. Spring Register Allocation CMSC 430 Introuction to Compilers Spring 2016 Register Allocation Introuction Change coe that uses an unoune set of virtual registers to coe that uses a finite set of actual regs For ytecoe targets, can

More information

A Framework for Dialogue Detection in Movies

A Framework for Dialogue Detection in Movies A Framework for Dialogue Detection in Movies Margarita Kotti, Constantine Kotropoulos, Bartosz Ziólko, Ioannis Pitas, an Vassiliki Moschou Department of Informatics, Aristotle University of Thessaloniki

More information

Rough Set Approach for Classification of Breast Cancer Mammogram Images

Rough Set Approach for Classification of Breast Cancer Mammogram Images Rough Set Approach for Classification of Breast Cancer Mammogram Images Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative Methos an Information Systems

More information

Learning Polynomial Functions. by Feature Construction

Learning Polynomial Functions. by Feature Construction I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate

More information

5th International Conference on Advanced Design and Manufacturing Engineering (ICADME 2015)

5th International Conference on Advanced Design and Manufacturing Engineering (ICADME 2015) 5th International Conference on Avance Design an Manufacturing Engineering (ICADME 25) Research on motion characteristics an application of multi egree of freeom mechanism base on R-W metho Xiao-guang

More information

Finite automata. We have looked at using Lex to build a scanner on the basis of regular expressions.

Finite automata. We have looked at using Lex to build a scanner on the basis of regular expressions. Finite automata We have looked at using Lex to build a scanner on the basis of regular expressions. Now we begin to consider the results from automata theory that make Lex possible. Recall: An alphabet

More information

Local Path Planning with Proximity Sensing for Robot Arm Manipulators. 1. Introduction

Local Path Planning with Proximity Sensing for Robot Arm Manipulators. 1. Introduction Local Path Planning with Proximity Sensing for Robot Arm Manipulators Ewar Cheung an Vlaimir Lumelsky Yale University, Center for Systems Science Department of Electrical Engineering New Haven, Connecticut

More information

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -

More information

PHOTOGRAMMETRIC MEASUREMENT OF LINEAR OBJECTS WITH CCD CAMERAS SUPER-ELASTIC WIRES IN ORTHODONTICS AS AN EXAMPLE

PHOTOGRAMMETRIC MEASUREMENT OF LINEAR OBJECTS WITH CCD CAMERAS SUPER-ELASTIC WIRES IN ORTHODONTICS AS AN EXAMPLE PHOTOGRAMMETRIC MEASUREMENT OF LINEAR OBJECTS WITH CCD CAMERAS SUPER-ELASTIC WIRES IN ORTHODONTICS AS AN EAMPLE Tim SUTHAU, Matthias HEMMLEB, Dietmar URAN, Paul-Georg JOST-BRINKMANN Technical Universit

More information

+ E. Bit-Alignment for Retargetable Code Generators * 1 Introduction A D T A T A A T D A A. Keen Schoofs Gert Goossens Hugo De Mant

+ E. Bit-Alignment for Retargetable Code Generators * 1 Introduction A D T A T A A T D A A. Keen Schoofs Gert Goossens Hugo De Mant Bit-lignment for Retargetable Coe Generators * Keen Schoofs Gert Goossens Hugo e Mant IMEC, Kapelreef 75, B-3001 Leuven, Belgium bstract When builing a bit-true retargetable compiler, every signal type

More information

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle

More information

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which

More information

Fault Simulation with Parallel Critical Path Tracing for Combinational Circuits Using Structurally Synthesized BDDs

Fault Simulation with Parallel Critical Path Tracing for Combinational Circuits Using Structurally Synthesized BDDs Fault Simulation with Parallel Critical Path Tracing for Combinational Circuits Using Structurall Snthesize BDDs Sergei Devaze, Jaan Rai, Artur Jutman, Raimun Ubar Tallinn Universit of Technolog, Estonia

More information

On Implementation and Performance of Table-Driven DFA-Based String Processors

On Implementation and Performance of Table-Driven DFA-Based String Processors On Implementation and Performance of Table-Driven DFA-Based String Processors Ernest Ketcha Ngassam 1, Derrick G. Kourie 2,3, and Bruce W. Watson 2,3 1 School of Computing, University of South Africa,

More information

EXACT SIMULATION OF A BOOLEAN MODEL

EXACT SIMULATION OF A BOOLEAN MODEL Original Research Paper oi:10.5566/ias.v32.p101-105 EXACT SIMULATION OF A BOOLEAN MODEL CHRISTIAN LANTUÉJOULB MinesParisTech 35 rue Saint-Honoré 77305 Fontainebleau France e-mail: christian.lantuejoul@mines-paristech.fr

More information

Real-time concepts for Software/Hardware Engineering

Real-time concepts for Software/Hardware Engineering Real-time concepts for Software/Harware Engineering Master s thesis of M.C.W. Geilen Date: August 996 Coaches: ing.p.h.a. van er Putten ir.j.p.m. Voeten Supervisor: prof.ir.m.p.j. Stevens Section of Information

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Politecnico i Torino Porto Institutional Repository [Proceeing] Automatic March tests generation for multi-port SRAMs Original Citation: Benso A., Bosio A., i Carlo S., i Natale G., Prinetto P. (26). Automatic

More information

From an Abstract Object-Oriented Model to a Ready-to-Use Embedded System Controller

From an Abstract Object-Oriented Model to a Ready-to-Use Embedded System Controller From an Abstract Object-Oriente Moel to a Reay-to-Use Embee System Controller Stanislav Chachkov, Diier Buchs Software Engineering Laboratory, Swiss Feeral Institute for Technology 1015 Lausanne, Switzerlan

More information

A Versatile Model-Based Visibility Measure for Geometric Primitives

A Versatile Model-Based Visibility Measure for Geometric Primitives A Versatile Moel-Base Visibility Measure for Geometric Primitives Marc M. Ellenrieer 1,LarsKrüger 1, Dirk Stößel 2, an Marc Hanheie 2 1 DaimlerChrysler AG, Research & Technology, 89013 Ulm, Germany 2 Faculty

More information

A Discrete Search Method for Multi-modal Non-Rigid Image Registration

A Discrete Search Method for Multi-modal Non-Rigid Image Registration A Discrete Search Metho for Multi-moal on-rigi Image Registration Alexaner Shekhovtsov Juan D. García-Arteaga Tomáš Werner Center for Machine Perception, Dept. of Cybernetics Faculty of Electrical Engineering,

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:

More information