Finite Automata Implementations Considering CPU Cache J. Holub
|
|
- Alyson Simon
- 5 years ago
- Views:
Transcription
1 Finite Automata Implementations Consiering CPU Cache J. Holub The finite automata are mathematical moels for finite state systems. More general finite automaton is the noneterministic finite automaton (NFA) that cannot be irectly use. It is usually transforme to the eterministic finite automaton (DFA) that then runs in time (n), where n is the size of the input text. We present two main approaches to practical implementation of DFA consiering CPU cache. The first approach (represente by Table Driven an Har Coe implementations) is suitable forautomata being run very frequently, typically having cycles. The other approach is suitable for a collection of automata from which various automata are retrieve an then run. This secon kin of automata are expecte to be cyclefree. Keywors: eterministic finite automaton, CPU cache, implementation. 1 Introuction The original formal stuy of finite state systems (neural nets) is from 193 by McCulloch an Pitts [1]. In 1956 Kleene [13] moele the neural nets of McCulloch an Pitts by finite automata. In that time similar moels were presente by Huffman [12], Moore [17], an Mealy [15]. In 1959, Rabin an Scott introuce noneterministic finite automata (NFA) in [21]. The finite automata theory is a well evelope theory. It eals with regular languages, regular expressions, regular grammars, NFAs, eterministic finite automata (DFAs), an various transformations among the previously liste formalisms. The final prouct of the theory towars practical implementation is a DFA. CPU Core L1 Cache L2 Cache RAM usage. Section 3 then escribes general techniques for DFA implementation. It is mostly suitable for DFA that is run most of the time. Since DFA has a finite set of states, this kin of DFA has to have cycles. Recent results in the implementation using CPU cache are iscusse in Section. On the other han we have a collection of DFAs each representing some ocument (e.g., in the form of complete inex in case of factor or suffix automata). Such DFA is use only when properties of the corresponing ocument are examine. Such automaton usually oes not have cycles. There are ifferent requirements for implementation of such DFA. Suitable implementations are escribe in Section 5. 2 Noneterministic finite automaton Noneterministic finite automaton (NFA)isaquintuple(Q,,, q 0, F), where Q is a finite set of states, is a set of input symbols, is a mapping Q ( ) ( Q), q0 Q is an initial state, an F Q is a set of final states. Deterministic finite automaton (DFA) is a special case of NFA, where is a mapping Q Q. a b c Fig. 1: Memory Cache Hierarchy DFA then runs theoretically in time (n), where n is the size of the input text. However, in practice we have to consier CPU cache that rapily influences the spee. CPU has two level caches isplaye in Fig. 1. The level 1 (L1) cache is locate on chip. It takes about 2 3 CPU cycles to access ata in L1 cache. The level 2 (L2) cache may be on chip or may be external. It has about 10 cycles access time. The main memory access takes cycles an har isc rive access takes even 10 6 times more time. Therefore it is obvious that CPU cache significantly influences DFA run. We cannot control the CPU cache use irectly, but knowing the CPU cache strategieswecanimplementthedfaruninawaysothat CPU cache woul be most likely efficiently use. We istinguish two kins of use of DFA. For each of them we escribe the most suitable implementation. In Section 2 we efine noneterministic finite automaton an iscuss its Fig. 2: A eterministic finite automaton In the previous efinition we talk about completely efine DFA, where there is for each source state an each input symbol exactly one estination state efine. However, there is also partially efine DFA, where there is for each source state an each input symbol at most one estination state efine. The partially efine DFA can be transforme to completely efine DFA introucing a new state (so calle sink state) which has a self loop for each symbol of an into which all non efine transitions of all states lea. There are also NFAs with more than one initial state. Such NFAs can be transforme to NFAs with one initial state introucing a new initial state from which transitions lea to all former initial states. Czech Technical University Publishing House 51 c
2 NFA accepts a given input string w * if there exists a path (a sequence of transitions) from the initial state to a final state spelling w. The problem occurs when for a pair (q, a), q Q, a (i.e., state q of NFA is active an a in the current input symbol) there are more possibilities how to continue: 1. There are more than one transitions labele by a outgoing from state q. Thatis ( qa, ) Thereisan transition in aition to other transitions outgoing from the same state. In such a case NFA cannot ecie, having only the knowlege of the current state an current input symbol, which transition to take. Due to this noneterminism NFA cannot be irectly use. There are two options: 1. We can transform NFA to the equivalent DFA using the stanar subset construction [21]. However, it may lea to an exponential increase of number of states (2 Q NFA states, where Q NFA is the number of states of the original NFA). The resulting DFA then runs in linear time with respect to the size of the input text. 2. We can simulate the run of NFA in a eterministic way. We can use Basic Simulation Metho [7, 6] usable for any NFA. For NFA with a regular structure (like in the exact an approximate pattern matching fiel) we can use Bit Parallelism [16,7,6,10] or Dynamic Programming [16, 8, 6] simulation methos which improve the running time of the Basic Simulation Metho in this special case. The simulation runs slower than DFA however the memory requirements are much smaller. Practical experiments weregivenin[11]. 3 Deterministic finite automaton implementation Further in the text we o not consier simulation techniques. We consier only DFA. DFA runs theoretically in time ( n ),wheren is the size of the input text. There are two main techniques for implementation of DFA: 1. Table Driven (TD): The mapping is implemente as a transition matrix of size Q (transition table). The current state number is hel in a variable q curr an the next state number is retrieve from the transitiontable from line q curr an column a,wherea is the current input symbol. 2. Har Coe (HC) [22]: The transition table is represente as a programming language coe. For each state there is a place starting with a statelabel. Then there is a sequence of conitional jumps, where base on the current input symbol the corresponing goto comman to the estination statelabel is performe. 3.1 Table Driven An example of TD implementation is shown in Fig. 3. For partially efine DFA one have to either transform it to a completely efine DFA or hanle the case when a unefine transition shoul be use. Obviously TD implementation is very efficient for completely efine DFA or DFAs with nonsparse transition table. It can be also very efficiently use in programs, where DFA is constructefromagiveninputanthenitisrun.insucha case it can be easily store into the transition matrix. The coe for the DFA run is then inepenent on the content of the transition matrix. TD implementation is also very convenient for a harware implementation, where the transition matrix is represente by a memory chip. 3.2 Har Coe An example of HC implementation is shown in Fig.. The implementation can work with partially efine DFA in this case. HC implementation may save some space when use for partially efine DFA, where the transition matrix woul be sparse. It cannot be use in programs, where DFA is constructe from the input. When DFA is constructe, a har coe part of the program has to be generate in a programming language, then compile an execute. This technique woul nee calls of several programs (compiler, linker, the DFA program itself) an woul be very inefficient. Note that we cannot use the recursive escent [1] approach from LL(k) topown parsing, where each state coul be represente by a function calling recursively a function representing the following state. In such a case the system stack woul overflow since DFA woul return from the function calls only at the en of the run. There woul be as many neste function calls as the size of the input text. However, Ngassam s implementation [18] uses a function for each state, but the function (with the current input symbol given as a parameter) returns an inex of the next state an then the next state function (with the next input symbol given as a parameter) is calle. transition_table: a b c int DFA_TD(){ int state=0,symbol; while((symbol= getchar())!= EOF ) { state = transition_table[state][symbol]; returnis_final[state]; Fig. 3: Table Driven implementation of DFA from Fig Czech Technical University Publishing House
3 int DFA_HC(){ int symbol; state0:if ((symbol= getchar())== EOF) return0; case a : goto state1; case : goto state; efault:return(1); state1:if ((symbol= getchar())== EOF) return0; case b : goto state2; case c : goto state3; efault:return(1); state2:if ((symbol= getchar())== EOF) return0; case c : goto state3; case : goto state; efault:return(1); state3:if ((symbol= getchar())== EOF) return0; case : goto state; efault:return(1); state:if ((symbol= getchar())== EOF) return1; return(1); Fig. : Har Coe implementation of DFA from Figure 2 DFA with cycles TD an HC implementations (an their combination calle MixeMoe MM) were heavily examine by Ngassam [20, 18]. His implementations use a ata structure that most likely will be store in CPU cache. For each of TD an HC implementationshe evelope three strategies to use CPU cache efficiently: Dynamic State Allocation (DSA), State pre orering (SpO), an Allocate Virtual Caching (AVC). DSA strategy has been suggeste in [19] an was prove to outperform TD when a largescale DFA is use to recognize very long strings that ten to repeately visit the same set of states. SpO relies on a egree of prior knowlege about the orerin which states are likely to be visite at runtime. It was shown that the associate algorithm outperforms its TD counterpart no matter the kin of string being processe. AVC strategy reorers the transition table at run time an also leas to better performance when processing strings that visit a limite number of states. Ngassam s approach can be efficiently exploite in DFA, where some states are frequently visite (like in DFA with cycles). In both TD an HC Ngassam s implementations the transition table is expecte to have the same number of items in each row (i.e., each state having the same number of outgoing transitions). Ngassam s implementation uses a fixe size structure for each row of the transition table. Therefore for sparse transition matrix the metho is not so memory efficient. 5 Acyclic DFA Another approach is use for acyclic DFA. In these automata each state is visite just once uring the DFA run. Suffix automaton an factor automaton (automaton recognizing all suffixes an factors of the given string, respectively) [3, ] are of such kin. Given a pattern they verify if the pattern is a suffix or a factor of the original string in time linear with the length of pattern regarless the size of the original string. An efficient implementation of the suffix automaton (also calle DAWG Direct Acyclic Wor Graph) was create by Balík [2]. An implementation of the compact version of the suffix automaton calle compact suffix automaton (also calle Compact DAWG) was presente by Crochemore an Holub in [9]. Both these implementations are very efficient in terms of memory use (about bytes per input string symbol). The factor an suffix automata are usually built over whole texts typically several megabytes long. Instea of storing the transition tableas a matrix like in TD implementation, whole automatonisuseinabitstream.thebitstreamcontainsa sequence of states each containing a list of all outgoing transitions (i.e., sparse matrix representation). Czech Technical University Publishing House 53
4 bitstream: state number: 0 a 0 b c 0 c Fig. 5: A sketch of bitstream implementation of DFA from Fig. 2 The key feature of both implementations is a topological orering of states. It ensures that we never get back in the bit stream when traversing the automaton. This minimizes main memory (or har isc rive) accesses. Balík s implementation is focuse on the smallest memory use. It uses some ata compression techniques. It also exploits the fact that both factor an suffix automata are homogeneous automata [5], where each state has all incoming transitions labele by the same symbol. Therefore the label of incoming transition is store in the estination state. The outgoing transition then only points to the estination state, where the corresponing transition label is store. On the other han Holub s implementation consiers also the spee of traversing. Each state contains all outgoing transitions together with their transition labels like in Fig. 5. (However, the DFA represente in Fig. 5 is neither suffix nor factor automaton.) It is not so memory efficient like Balík s implementation but it reuces main memory (or har isc rive) accesses. It exploits the locality of ata principle use by CPU cache. When a state isreache uring the DFA run, whole segment aroun the state is loae into CPU cache (from main memory or har isc rive). The ecision which transition to take is one base only on the information in the segment (in the CPU cache) an no other accessesto other segments (i.e., possible memory/hdd accesses) are neee. While in Balík s implementation one nees to access all the estination states to retrieve the transition labels of the corresponing transitions. Holub s implementation uses at most as many main memory/hdd accesses as many states are traverse. 6 Conclusion The paper presents two approaches to DFA implementation consiering CPU cache. The first approach is suitable for DFA with cycles where we expect some states are visite frequently. HC an TD implementations for DFA with nonsparse transition table were iscusse. On the other han the other approach is suitable for acyclic DFA with a sparse transition table. This approach saves memory use but it runs slower than the previous one instea of irect transition table access (coorinates given by the current state an the current input symbol) a linke list of outgoing transition of a given state is linearly traverse. However, reucing the memory use for the transition table increases the probability that the next state is alreay in the CPU cache which also increases the spee of DFA run. The first approach is suitable for the DFAs that are running all the time like for example an antivirus filter on a communication line. On the other han the secon approach is suitable for a collection of DFAs from which one is selecte an then it is run. That is for example a case of suffix or factor automata buil over a collection of ocuments store in har isk. The task is then for a given pattern fin all ocuments containing the pattern. Acknowlegment This research has been partially supporte by the Ministry of Eucation, Youth an Sports uner research program MSM an the Czech Science Founation as project No. 201/06/1039. References [1] Aho,A.V.,Sethi,R.,Ullman,J.D.:Compilers Principles, Techniques an Tools. AisonWesley, Reaing, MA, [2] Balík, M.: DAWG versus Suffix Array. In: J.M. Champarnau, D. Maurel (es.): Implementation an Application of Automata, number 2608 in Lecture Notes in Computer Science, p SpringerVerlag, Heielberg, [3] Blumer,A.,Blumer,J.,Ehrenfeucht,A.,Haussler,D., Chen, M. T., Seiferas, J.: The Smallest Automaton Recognizing the Subwors of a Text. Theor. Comput. Sci., Vol. 0 (1985), No. 1, p [] Blumer,A.,Blumer,J.,Ehrenfeucht,A.,Haussler,D., McConnel, R.: Complete Inverte Files for Efficient Text Retrieval an Analysis. J. Assoc. Comput. Mach., Vol. 3 (1987), No. 3, p [5] Champarnau, J.M.: Subset Construction Complexity for Homogeneous Automata, Position Automata an ZPCStructures. Theor. Comput. Sci., Vol. 267 (2001), No. 1 2, p [6] Holub, J.: Simulation of Noneterministic Finite Automata in Pattern Matching. Ph.D. Thesis, Czech Technical University in Prague, Czech Republic, [7] Holub, J.: Bit Parallelism NFA Simulation. In: B. W. Watson, D. Woo (es.): Implementation an Application of Automata, number 29 in Lecture Notes in Computer Science, p SpringerVerlag, Heielberg, [8] Holub, J.: Dynamic Programming NFA Simulation. In: J.M. Champarnau, D. Maurel (es.): Implementation an Application of Automata, number 2608 in Lecture Notes in Computer Science, p Springer Verlag, Heielberg, [9] Holub, J., Crochemore, M.: On the Implementation of Compact DAWG s. In: J.M. Champarnau, D. Maurel (es.): Implementation an Application of Automata,number 2608 in Lecture Notes in Computer Science, p SpringerVerlag, Heielberg, Czech Technical University Publishing House
5 [10] Holub, J., Iliopoulos, C. S., Melichar, B., Mouchar, L.: Distribute String Matching Using Finite Automata. In:R.Raman,J.Simpson(es.):Proceeings of the 10 th Australasian Workshop On Combinatorial Algorithms, p , Perth, WA, Australia, [11] Holub, J., Špiller, P.: Practical Experiments with NFA Simulation.In:L.Cleophas,B.W.Watson(es.):Proceeings of the Einhoven FASTAR Days 200, TU Einhoven, The Netherlans, 200, p [12] Huffman, D. A.: The Synthesis of Sequential Switching Circuits. J. Franklin Institute, Vol. 257 (195), p , [13] Kleene, S. C.: Representation of Events in Nerve Nets an Finite Automata. Automata Stuies, (1956), p [1]McCulloch,W.S.,Pitts,W.:ALogicalCalculusofthe Ieas Immanent in Nervous Activity. Bull. Math. Biophysics, Vol.5 (193), p [15] Mealy, G. H.: A Metho for Synthetizing Sequential Circuits. Bell System Technical J., Vol. 3 (1955), No. 5, p [16] Melichar, B.: Approximate String Matching by Finite Automata. In: V. Hlaváč, R. Šára (es.): Computer Analysis of Images an Patterns, number 970 in Lecture Notes in Computer Science, p SpringerVerlag, Berlin, [17] Moore, E. F.: Geanken Experiments on Sequential Machines. Automata Stuies, 1956, p [18] Ngassam, E. K.: Towars Cache Optimization in Finite Automata Implementations. Ph.D. Thesis, University of Pretoria, South Africa, [19] Ngassam, E. K., Kourie, D. G., Watson, B. W.: Reorering Finite Automatata States for Fast String Recognition. In:J.Holub,M.Šimánek(es.):Proceeings of the Prague Stringology Conference 05, Czech Technical University in Prague, Czech Republic, 2005, p [20] Ngassam, E. K., Kourie, D. G., Watson, B. W.: On Implementation an Performance of TableDriven DFA Base String Processors. In: J. Holub, J. Ž árek (es.): Proceeings of the Prague Stringology Conference 06, Czech Technical University in Prague, Czech Republic, 2006, p [21] Rabin, M. O., Scott, D.: Finite Automata an Their Decision Problems. IBM J. Res. Dev., Vol. 3 (1959), p [22] Thompson, K.: Regular Expression Search Algorithm. Commun. Assoc. Comput. Mach., Vol. 11 (1968), p Ing. Jan Holub, Ph.D. holub@fel.cvut.cz Department of Computer Science an Engineering Czech Technical University in Prague Faculty of Electrical Engineering Karlovo nám Prague 2, Czech Republic Czech Technical University Publishing House 55
Generalized Edge Coloring for Channel Assignment in Wireless Networks
Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science
More informationAdjacency Matrix Based Full-Text Indexing Models
1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,
More informationParticle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html
More informationAlmost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control
Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract
More informationTransient analysis of wave propagation in 3D soil by using the scaled boundary finite element method
Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite
More informationCoupling the User Interfaces of a Multiuser Program
Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces
More information6.823 Computer System Architecture. Problem Set #3 Spring 2002
6.823 Computer System Architecture Problem Set #3 Spring 2002 Stuents are strongly encourage to collaborate in groups of up to three people. A group shoul han in only one copy of the solution to the problem
More informationCS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics
CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,
More informationLab work #8. Congestion control
TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño
More informationMessage Transport With The User Datagram Protocol
Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer
More informationComputer Organization
Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.
More informationRecitation Caches and Blocking. 4 March 2019
15-213 Recitation Caches an Blocking 4 March 2019 Agena Reminers Revisiting Cache Lab Caching Review Blocking to reuce cache misses Cache alignment Reminers Due Dates Cache Lab (Thursay 3/7) Miterm Exam
More informationTHE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE
БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:
More informationShift-map Image Registration
Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.
More informationCompiler Optimisation
Compiler Optimisation Michael O Boyle mob@inf.e.ac.uk Room 1.06 January, 2014 1 Two recommene books for the course Recommene texts Engineering a Compiler Engineering a Compiler by K. D. Cooper an L. Torczon.
More informationIntensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2
This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar
More informationOnline Appendix to: Generalizing Database Forensics
Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that
More informationQueueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks
Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication
More informationNon-homogeneous Generalization in Privacy Preserving Data Publishing
Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h
More informationImage compression predicated on recurrent iterated function systems
2n International Conference on Mathematics & Statistics 16-19 June, 2008, Athens, Greece Image compression preicate on recurrent iterate function systems Chol-Hui Yun *, Metzler W. a an Barski M. a * Faculty
More informationShift-map Image Registration
Shift-map Image Registration Linus Svärm Petter Stranmark Centre for Mathematical Sciences, Lun University {linus,petter}@maths.lth.se Abstract Shift-map image processing is a new framework base on energy
More informationRandom Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation
DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,
More informationImproving Performance of Sparse Matrix-Vector Multiplication
Improving Performance of Sparse Matrix-Vector Multiplication Ali Pınar Michael T. Heath Department of Computer Science an Center of Simulation of Avance Rockets University of Illinois at Urbana-Champaign
More informationSURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH
SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway
More informationMORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks
: a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications
More informationChapter 9 Memory Management
Contents 1. Introuction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threas 6. CPU Scheuling 7. Process Synchronization 8. Dealocks 9. Memory Management 10.Virtual Memory
More informationSupporting Fully Adaptive Routing in InfiniBand Networks
XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar
More informationTable-based division by small integer constants
Table-base ivision by small integer constants Florent e Dinechin, Laurent-Stéphane Diier LIP, Université e Lyon (ENS-Lyon/CNRS/INRIA/UCBL) 46, allée Italie, 69364 Lyon Ceex 07 Florent.e.Dinechin@ens-lyon.fr
More informationPreamble. Singly linked lists. Collaboration policy and academic integrity. Getting help
CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure
More informationMultilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis
Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT
More informationPetri Nets with Time and Cost (Tutorial)
Petri Nets with Time an Cost (Tutorial) Parosh Aziz Abulla Department of Information Technology Uppsala University Sween parosh@it.uu.se Richar Mayr School of Informatics, LFCS University of Einburgh Unite
More informationComparison of Methods for Increasing the Performance of a DUA Computation
Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,
More informationClassifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means
Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu
More informationFast Fractal Image Compression using PSO Based Optimization Techniques
Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting
More informationDEVELOPMENT OF DamageCALC APPLICATION FOR AUTOMATIC CALCULATION OF THE DAMAGE INDICATOR
Mechanical Testing an Diagnosis ISSN 2247 9635, 2012 (II), Volume 4, 28-36 DEVELOPMENT OF DamageCALC APPLICATION FOR AUTOMATIC CALCULATION OF THE DAMAGE INDICATOR Valentina GOLUBOVIĆ-BUGARSKI, Branislav
More informationHere are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.
Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus
More informationSkyline Community Search in Multi-valued Networks
Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h
More informationModifying ROC Curves to Incorporate Predicted Probabilities
Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,
More informationLecture 1 September 4, 2013
CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the
More informationLoop Scheduling and Partitions for Hiding Memory Latencies
Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:
More informationA Plane Tracker for AEC-automation Applications
A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)
More informationStudy of Network Optimization Method Based on ACL
Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department
More informationFigure 1: 2D arm. Figure 2: 2D arm with labelled angles
2D Kinematics Consier a robotic arm. We can sen it commans like, move that joint so it bens at an angle θ. Once we ve set each joint, that s all well an goo. More interesting, though, is the question of
More informationOptimizing the quality of scalable video streams on P2P Networks
Optimizing the quality of scalable vieo streams on PP Networks Paper #7 ASTRACT The volume of multimeia ata, incluing vieo, serve through Peer-to-Peer (PP) networks is growing rapily Unfortunately, high
More informationLearning convex bodies is hard
Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples
More informationFrequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises
verview Frequent Pattern Mining comprises Frequent Pattern Mining hristian Borgelt School of omputer Science University of Konstanz Universitätsstraße, Konstanz, Germany christian.borgelt@uni-konstanz.e
More informationTHE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM
International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao
More informationA shortest path algorithm in multimodal networks: a case study with time varying costs
A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via
More informationAn Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique
International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech
More informationQuestions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!
EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an
More informationProving Vizing s Theorem with Rodin
Proving Vizing s Theorem with Roin Joachim Breitner March 25, 2011 Proofs for Vizing s Theorem t to be unwiely unless presente in form a constructive algorithm with a proof of its correctness an termination.
More informationOffloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization
1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24
More informationA Convex Clustering-based Regularizer for Image Segmentation
Vision, Moeling, an Visualization (2015) D. Bommes, T. Ritschel an T. Schultz (Es.) A Convex Clustering-base Regularizer for Image Segmentation Benjamin Hell (TU Braunschweig), Marcus Magnor (TU Braunschweig)
More informationACE: And/Or-parallel Copying-based Execution of Logic Programs
ACE: An/Or-parallel Copying-base Execution of Logic Programs Gopal GuptaJ Manuel Hermenegilo* Enrico PontelliJ an Vítor Santos Costa' Abstract In this paper we present a novel execution moel for parallel
More informationHandling missing values in kernel methods with application to microbiology data
an Machine Learning. Bruges (Belgium), 24-26 April 2013, i6oc.com publ., ISBN 978-2-87419-081-0. Available from http://www.i6oc.com/en/livre/?gcoi=28001100131010. Hanling missing values in kernel methos
More informationUsing Vector and Raster-Based Techniques in Categorical Map Generalization
Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department
More informationSecure Network Coding for Distributed Secret Sharing with Low Communication Cost
Secure Network Coing for Distribute Secret Sharing with Low Communication Cost Nihar B. Shah, K. V. Rashmi an Kannan Ramchanran, Fellow, IEEE Abstract Shamir s (n,k) threshol secret sharing is an important
More informationSolution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation
Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University
More informationCharacterizing Decoding Robustness under Parametric Channel Uncertainty
Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric
More informationAn Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources
An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract
More informationDemystifying Automata Processing: GPUs, FPGAs or Micron s AP?
Demystifying Automata Processing: GPUs, FPGAs or Micron s AP? Marziyeh Nourian 1,3, Xiang Wang 1, Xiaoong Yu 2, Wu-chun Feng 2, Michela Becchi 1,3 1,3 Department of Electrical an Computer Engineering,
More informationNavigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar
Navigation Aroun an nknown Obstacle for Autonomous Surface Vehicles sing a Forwar-Facing Sonar Patrick A. Plonski, Joshua Vaner Hook, Cheng Peng, Narges Noori, Volkan Isler Abstract A robotic boat is moving
More informationFeature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory
Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative
More informationDense Disparity Estimation in Ego-motion Reduced Search Space
Dense Disparity Estimation in Ego-motion Reuce Search Space Luka Fućek, Ivan Marković, Igor Cvišić, Ivan Petrović University of Zagreb, Faculty of Electrical Engineering an Computing, Croatia (e-mail:
More informationClassical Mechanics Examples (Lagrange Multipliers)
Classical Mechanics Examples (Lagrange Multipliers) Dipan Kumar Ghosh Physics Department, Inian Institute of Technology Bombay Powai, Mumbai 400076 September 3, 015 1 Introuction We have seen that the
More informationA Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition
ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural
More informationTechnical Report TR Navigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar
Technical Report Department of Computer Science an Engineering niversity of Minnesota 4-192 Keller Hall 2 nion Street SE Minneapolis, MN 55455-159 SA TR 15-5 Navigation Aroun an nknown Obstacle for Autonomous
More information1. What is a Map (or Function)? Maps. CITS2200 Data Structures and Algorithms. Some definitions... Topic 16
1. What is a Map (or Function)? CITS2200 Data Structures an Algorithms Topic 16 Maps Definitions what is a map (or function)? Specification List-base representation (singly linke) Sorte block representation
More informationDistributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs
IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,
More informationTop-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications
Top-own Connectivity Policy Framework for Mobile Peer-to-Peer Applications Otso Kassinen Mika Ylianttila Junzhao Sun Jussi Ala-Kurikka MeiaTeam Department of Electrical an Information Engineering University
More informationNAND flash memory is widely used as a storage
1 : Buffer-Aware Garbage Collection for Flash-Base Storage Systems Sungjin Lee, Dongkun Shin Member, IEEE, an Jihong Kim Member, IEEE Abstract NAND flash-base storage evice is becoming a viable storage
More informationBIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES
BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations
More informationLearning Subproblem Complexities in Distributed Branch and Bound
Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University
More informationEFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER
FFICINT ON-LIN TSTING MTHOD FOR A FLOATING-POINT ADDR A. Droz, M. Lobachev Department of Computer Systems, Oessa State Polytechnic University, Oessa, Ukraine Droz@ukr.net, Lobachev@ukr.net Abstract In
More informationCluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters
Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets
More informationYet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien
Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,
More informationTight Wavelet Frame Decomposition and Its Application in Image Processing
ITB J. Sci. Vol. 40 A, No., 008, 151-165 151 Tight Wavelet Frame Decomposition an Its Application in Image Processing Mahmu Yunus 1, & Henra Gunawan 1 1 Analysis an Geometry Group, FMIPA ITB, Banung Department
More informationCMSC 430 Introduction to Compilers. Spring Register Allocation
CMSC 430 Introuction to Compilers Spring 2016 Register Allocation Introuction Change coe that uses an unoune set of virtual registers to coe that uses a finite set of actual regs For ytecoe targets, can
More informationA Framework for Dialogue Detection in Movies
A Framework for Dialogue Detection in Movies Margarita Kotti, Constantine Kotropoulos, Bartosz Ziólko, Ioannis Pitas, an Vassiliki Moschou Department of Informatics, Aristotle University of Thessaloniki
More informationRough Set Approach for Classification of Breast Cancer Mammogram Images
Rough Set Approach for Classification of Breast Cancer Mammogram Images Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative Methos an Information Systems
More informationLearning Polynomial Functions. by Feature Construction
I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate
More information5th International Conference on Advanced Design and Manufacturing Engineering (ICADME 2015)
5th International Conference on Avance Design an Manufacturing Engineering (ICADME 25) Research on motion characteristics an application of multi egree of freeom mechanism base on R-W metho Xiao-guang
More informationFinite automata. We have looked at using Lex to build a scanner on the basis of regular expressions.
Finite automata We have looked at using Lex to build a scanner on the basis of regular expressions. Now we begin to consider the results from automata theory that make Lex possible. Recall: An alphabet
More informationLocal Path Planning with Proximity Sensing for Robot Arm Manipulators. 1. Introduction
Local Path Planning with Proximity Sensing for Robot Arm Manipulators Ewar Cheung an Vlaimir Lumelsky Yale University, Center for Systems Science Department of Electrical Engineering New Haven, Connecticut
More informationAPPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly
International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -
More informationPHOTOGRAMMETRIC MEASUREMENT OF LINEAR OBJECTS WITH CCD CAMERAS SUPER-ELASTIC WIRES IN ORTHODONTICS AS AN EXAMPLE
PHOTOGRAMMETRIC MEASUREMENT OF LINEAR OBJECTS WITH CCD CAMERAS SUPER-ELASTIC WIRES IN ORTHODONTICS AS AN EAMPLE Tim SUTHAU, Matthias HEMMLEB, Dietmar URAN, Paul-Georg JOST-BRINKMANN Technical Universit
More information+ E. Bit-Alignment for Retargetable Code Generators * 1 Introduction A D T A T A A T D A A. Keen Schoofs Gert Goossens Hugo De Mant
Bit-lignment for Retargetable Coe Generators * Keen Schoofs Gert Goossens Hugo e Mant IMEC, Kapelreef 75, B-3001 Leuven, Belgium bstract When builing a bit-true retargetable compiler, every signal type
More informationState Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway
State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle
More informationCS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing
CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which
More informationFault Simulation with Parallel Critical Path Tracing for Combinational Circuits Using Structurally Synthesized BDDs
Fault Simulation with Parallel Critical Path Tracing for Combinational Circuits Using Structurall Snthesize BDDs Sergei Devaze, Jaan Rai, Artur Jutman, Raimun Ubar Tallinn Universit of Technolog, Estonia
More informationOn Implementation and Performance of Table-Driven DFA-Based String Processors
On Implementation and Performance of Table-Driven DFA-Based String Processors Ernest Ketcha Ngassam 1, Derrick G. Kourie 2,3, and Bruce W. Watson 2,3 1 School of Computing, University of South Africa,
More informationEXACT SIMULATION OF A BOOLEAN MODEL
Original Research Paper oi:10.5566/ias.v32.p101-105 EXACT SIMULATION OF A BOOLEAN MODEL CHRISTIAN LANTUÉJOULB MinesParisTech 35 rue Saint-Honoré 77305 Fontainebleau France e-mail: christian.lantuejoul@mines-paristech.fr
More informationReal-time concepts for Software/Hardware Engineering
Real-time concepts for Software/Harware Engineering Master s thesis of M.C.W. Geilen Date: August 996 Coaches: ing.p.h.a. van er Putten ir.j.p.m. Voeten Supervisor: prof.ir.m.p.j. Stevens Section of Information
More informationPolitecnico di Torino. Porto Institutional Repository
Politecnico i Torino Porto Institutional Repository [Proceeing] Automatic March tests generation for multi-port SRAMs Original Citation: Benso A., Bosio A., i Carlo S., i Natale G., Prinetto P. (26). Automatic
More informationFrom an Abstract Object-Oriented Model to a Ready-to-Use Embedded System Controller
From an Abstract Object-Oriente Moel to a Reay-to-Use Embee System Controller Stanislav Chachkov, Diier Buchs Software Engineering Laboratory, Swiss Feeral Institute for Technology 1015 Lausanne, Switzerlan
More informationA Versatile Model-Based Visibility Measure for Geometric Primitives
A Versatile Moel-Base Visibility Measure for Geometric Primitives Marc M. Ellenrieer 1,LarsKrüger 1, Dirk Stößel 2, an Marc Hanheie 2 1 DaimlerChrysler AG, Research & Technology, 89013 Ulm, Germany 2 Faculty
More informationA Discrete Search Method for Multi-modal Non-Rigid Image Registration
A Discrete Search Metho for Multi-moal on-rigi Image Registration Alexaner Shekhovtsov Juan D. García-Arteaga Tomáš Werner Center for Machine Perception, Dept. of Cybernetics Faculty of Electrical Engineering,
More informationAnyTraffic Labeled Routing
AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,
More informationAdaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots
Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:
More information