An Efficient Video Program Delivery algorithm in Tree Networks*

Size: px
Start display at page:

Download "An Efficient Video Program Delivery algorithm in Tree Networks*"

Transcription

1 3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science, University of Science and Technology of China, China 2 School of Comuter Science, University of Adelaide, Australia yfh2008@mail.ustc.edu.cn, hongshen@ustc.edu.cn Abstract As the roortion of video rograms is exected to grow significantly, video services will require a huge amount of Internet bandwidth in the future. In this aer, we model the video rogram lacement (VPP roblem in tree networks which sends video rograms to the requesting (demand nodes using a broadcast method. The model considers the cost for both assigning rograms to nodes and broadcasting video rograms through links. The model is formulated as an integer rogram, and its objective is to minimize the total cost of VPP in a tree network. We develo a dynamic rogramming algorithm to solve this roblem with time comlexity ( where N is the number of nodes and P is the number of video rograms. 1. Introduction With an increase in the number of internet users, video services will become more and more oular. The roortion of video contents is exected to grow significantly in the future in Internet, making otimizing delivery of video services which requires a large amount of bandwidth an increasingly imortant roblem. In video services, video rograms are broadcast to assign or demand nodes. A large bandwidth is required when video rograms are broadcast through a link, and a large storage sace is required when video rograms are stored at a node. A simle model of VOD network is roosed in [1] which ays attention to server locations and rogram assignments. A VOD network is artitioned into several levels, and the model finds out otimal server locations and rogram assignments. In this model, servers installed and rograms assigned to a single level means each node in the selected level has a server and same subset of rograms. In [2][3] some heuristic *This work is suorted by National Science Foundation of China under its General Projects funding # and Chinese Academy of Science 100 Talents Project **Corresonding author. hongshen@ustc.edu.cn algorithms are roosed for lacing video rograms in tree networks to satisfy stochastic demands subject to the constraints of storage caacity and secified blocking robabilities. Some algorithms are also roosed to allocate limited bandwidth among multile video rograms in [4][5]. Some other VOD delivery technologies are discussed in [6][7][8]. Hanan et al.[9] roose a model of VOD network to determine the otimal location of servers and otimal assignment of rograms to each of these servers in a tree network. A video rogram may be stored in several servers. In this aer, we model the video rogram lacement (VPP roblem in tree networks. We assume the servers have been installed in some nodes in a tree network. The model considers the cost for both assigning rograms to nodes and broadcasting video rograms through links. Our objective is to minimize the sum of rogram assignment cost at nodes and bandwidth cost on links. This roblem has been solved with time comlexity ( where N is the number of nodes and P is the number of video rograms as a secial case of the model roosed in [9]. We roose a new dynamic rogramming algorithm insired by [10] to solve this roblem with time comlexity ( which outerforms the algorithm roosed in [9] significantly in large-scale networks. This aer is organized as follows: in Section 2, we formulate the roblem. And the dynamic rogramming algorithm is roosed in Section 3. In Section 4 an examle is given to demonstrate our algorithm. We conclude the aer in Section Problem formulation First of all, we resent the formulation of VPP roblem in tree networks which use the broadcasting method to send video rograms to the nodes which require the rogram. It is obvious that the roblem with P rograms to assign can be decomosed into P searate roblems, one er rogram. So we can solve the roblem with one rogram to assign firstly and then imlement it for each rogram. In this aer, we /10 $ IEEE DOI /PAAP

2 formulate the roblem with one rogram and then solve it by using a dynamic rogramming method. Consider a tree (,, where V is the set of nodes in a tree network and is the set of links. There are N+1 nodes in the network, i.e. +1=. For simlicity, we label the nodes as 0,1,2,, from to to bottom and left to right. Node 0 which is the root of the tree is the original server and stores the rogram. We also label link using the label of its end node. For examle, lin k 1 in Fig.1 is the lin k which connects node 0 and node 1. There are N links, ={1,2,,}. In the VPP roblem, servers have been installed in many nodes and the rogram can only be assigned to the nodes which have a server installed in it. We will use some notations as follows: whether node want to access the rogram or not. I.e. =1 if node wants to visit the rogram and 0 otherwise. cost of assigning the rogram to node.this cost includes storage and rocessing cost of the rogram at node. If there is no server installed in it, =. ( cost of the bandwidth required for transmitting the rogram on link. ( decision variable. =1 if the arent of node needs to broadcast the rogram through link, 0 otherwise. To ensure each node s requirement can be met, we will give a assignment strategy which is the set of nodes to which the rogram is assigned to determine value for each link. Because the value of is fixed, can only be determined by assignment strategy only. To avoid confusion, we use, as the decision variable to identify the link which should be or not be under the assignment strategy. The method to determine the value of, by using the assignment strategy will be given in theorem 1. Suose is the set of nodes which stores the rogram, the total cost of assigning and broadcasting the rogram as follows: ( = +, ( where the first art of equation is the assignment cost and the second is the broadcast cost. Our objective is to find an assignment strategy A subject to: ( = {(} \{} This roblem can be solved in olynomial time ( for an N-nodes tree as a secial case of SLPAM using the method roosed in [9]. In this aer we roose a new dynamic rogramming algorithm whose time comlexity is (. Figure 1. A tree network with nodes are labeled from to to bottom and left to right, and the bandwidth required for broadcasting rogram has been labeled near the link, and the nodes with shadow mean a server is not installed in it 3. Dynamic rogramming aroach We use a bottom-u dynamic rogramming aroach en-lightened by [10] to get a solution of a tree network. Let denote the subtree of whole network with as its root node and as the set of children nodes of, e.g. in Fig.2 is the subtree which is enclosed by dotted line and = {, }. is the arent node of and the rogram is assigned or broadcast to node. We use (, to denote the extended subtree including. For examle the tree shown in Fig.2 can be denoted as (,. Definition 1 (otimal solution of (, is a feasible solution, (,, = + \, ( is the total cost in (, under the lacement strategy. The otimal solution of (, is which satisfies (,, =(,, ={ +, ( } \ We denote the value of otimal solution as (, = (,,. Definition 2 (otimal solution of (, By changing the cost of link to, we get the extended tree (,. The otimal solution of (, is which satisfies (,, ={ (,,} =min { +, ( +, \( {} } 4

3 w1 w w Figure 2. Definition of (, where is the subtree with w as its root node and is the subtree with as its root node and has the same definition We denote the value of otimal solution of (, as (, = (,,. The link should not be used under the strategy in (, obviously. All of the feasible solutions of (, can be divided into two kinds: using link to broadcast the rogram or not. In next theorem, we will rove that the best solution which doesn't use link to broadcast the rogram is the otimal solution of (,. Theorem 1. For each, we definite (, = {, (,\{}} and (, = { (,\{}, (,} where (, is the set of nodes on the ath that connects nodes and and. We have ={ =0} (, which is equivalent to, =0 for each and the minimum total cost of solutions in is (, with the otimal solution. Proof: Assume, for each (,, all access request of nodes in can be satisfied by the nodes in and the rogram shouldn t be broadcasted to the trees { }. According to the definitions of (, and (,, we can conclude that (, = \( (,. Because (, =0which means that all of the nodes in (, don t want to access the rogram, the rogram shouldn t be broadcast to (,. And (, (, =, so the rogram shouldn t be broadcast to which means, =0. If a set F, we have (, 0which means there is at least a node in (, which wants to access the rogram, because there is no node that can satisfy it in, the rogram has to be broadcast into subtree using the link, so, =1. (,, = + ( +0 \( {} w2 = + ( +0 ( \( {} = + ( \ =(,, Based on the above analysis, (,, = (,, for each. We define =2 \. In (, (,, = +, ( +1 \ {} (,,, according this inequality, we know that, and (,, = (,, (,, = (,, which means the is the otimal solution in that the total cost of (, is (,. Thus the theorem is roved. Lemma 1. If and, then =,, we have. Proof: Firstly, we will rove that (, =(,. For each (,, we have (,,, (,\{}, (,\{} Because is a rerequisite,, (,\{}, ((, \{} {}, (,\{} where. And because (,, (,, (, \{}, (,\{}, (,\{} (, thus (, =(,. Then we rove (, =(,. (, (,\{}, (, Because for each,(, =, (, (,\{}, (, (,\{}, (, (, \{}, (, (, It is obvious that. Because (, (, and (, =0, (, =0. As mentioned above,. Hence, the lemma is roved. As reviously mentioned, the best solution in is the otimal solution of (,, according to the 5

4 next theorem, we can get the otimal solution of (,. Theorem 2. Let = (, + and B= (, +. For the otimal solution value of (,, we have (, ={,B} And {} B = Proof: Assume = { } and = { }. Clearly is the set of all feasible solutions of (,. Consider the value of : (1 If =0. When, and F, so, = 0. \ = ( \ = ( \ {} = (,, \(. then = +, ( +0 \ {} = +, ( \ = + \{} +, ( \ = + +, ( \( = + +, ( = + (,, + (, ( if = for each, (,, = + (,, meaning = { (,,, } with solution =( {} when, we can divide it into two cases: and \. If, then and, =0. We have (,, = (,, according to Lemma 1 and Theorem 1, (,, = (,,, so (,, = (,, (, = + (, (,, = + (, =B, if and only if = for each, If \, then and, =1. we have (,, =, + (,, (,, So the otimal solution among can be achieved when = and B={ (,,, } with solution = Hence when =0, if B, (, = with solution =, else if >, (, =B with solution =. (2 If =1. It is obvious that = (, + with solution =( {} if it just like in the case =0. When, because, (,and =. So, =1and for each, we have (,, =, + (,, = + (,, (, + We still define B = (, +. In this case, (, = with solution =. This is consistent with the fact that when =1 and, to guarantee node can access the rogram, node has two chooses: store the rogram in node or let node to broadcast the rogram to, because ( =, node should store the rogram in its own storage. Hence, the theorem is roven. According to Theorem 2, we notice that if node has a demand, the otimal solution of (, is ( {} which means the rogram must be assigned to node. 6

5 The otimal solution of (, can be achieved by comaring the otimal solution of (, and the solutions which must use link to broadcast the rogram. To rove theorem 3, we give Lemma 2 firstly. Lemma 2. =2 \ and = ( + (,, then there is a feasible solution =, such that (,, =if and only if =1,. Proof: for each, (,, =, ( + (,,, ( + (, ( + (, It is obvious that if and only if, =,,(,, =. Because = 2 \, we know that, =1. (1 If =1, to satisfy the requirement of node, we have to broadcast the rogram by link, so, =, =1. (2 If,, let =. By the roof of lemma 1, we know that (, = (, and (, = (,. Because there is at last one,, we conclude that (, 0. Then we can have and, =1=,,. (3 If,, we still let =, and by the same method we can have (, = 0 which means, so, =0. For (1(2(3, we know that (,, = in (1(2 and (,, in (3, which means this theorem is correct. Theorem 3. Let = ( + (,. The otimal solution of (, is (, = < (, and (, = { (,,}. Proof: we can div ide all feasible solutions of (, into two kinds: and, just like mentioned in theorem 1. (1 If (,, according to above discussion, we have (,, (,. Obviously (, = (, and the otimal solution of (, is. (2 If < (,. Let =. If,, and according to the roof of lemma 2, we know that, =0, so F and = ( + (, > (,. Because is a feasible solution and the total cost of is (,, we conclude that > (,, (,. But < (, and (,,, so (, which is contrary to >(,. Based on the above discussion, we know that, if < (,, and according to lemma 2, there is a feasible solution = whose total cost is. As a result, we conclude that (, = with as its otimal solution. For (1(2, The theorem is roved. According to theorem 3, we can conclude that, for the whole tree network, the minimum value of the total cost of assigning and broadcasting the rogram is (, and the otimal solution is where is the original server. According to the above theorems, we roose a dynamic rogramming algorithm as follows which runs in a bottom-u order. Algorithm 1: Ste 1. Initialization: = ; = ;, ( =0;, ( =0, for each \{}where (w is the arent of and s is the root of whole tree. Ste 2. Running the algorithm in ost-order traversal. For =, 1,,1do = +, (; B= +, (; = ( +, (; if Bthen =( {} ;, ( =; else = ;, ( =B; endif (,( +=, (; if, then = ;, ( = (, (; else = ; 7

6 , ( =; endif (,( +=, (; endfor = = ; return A ; Time Comlexity What we need to calculate is (, 0,, and the comlexity of our algorithm is ( where N is the number of nodes in a tree network. Because the algorithm is just for one rogram, we have to imlement it once for each rogram, and the total time comlexity is ( for rograms, which is significantly lower than O(N2P of algorithm in [9]. 4. Examle In this section, we give an examle to show the imlementation of our algorithm. The tree network of 13 nodes, labeled as 0-12, as shown in Fig. 1. Because the imlementation er rogram is similar, we just give the imlementation of rogram. Nodes that want to access rogram have been marked as P under it, for examle, in Fig. 2 nodes 2, 3, 5, 7, 8, 9, 11, 12 want to access rogram. The broadcast cost through link also is marked in this link. The cost of assigning rogram to any of the nodes is a =3 for i= 2,3,4,6,7,8,9,10,11. And a = for others because there is no server installed in them. We now demonstrate the imlementation of our algorithm for this examle. The algorithm runs in bottom-u order, so it starts with leaf nodes 7, 8, 9, 10, 11, 12. For node 12, =,B = and =4+ 0=4, so G (12,6 =min{, } =,B = {12}, G(12,6 =min{g (12,6,4} =4,A =. the results of nodes 7, 8, 9, 10, 11, 12 are resented in Table 1. Table 1. The results of leaf nodes 7, 8, 9, 10, 11, 12 Node (, ( (, ( labels Notice that the result of node 10 is secial comaring with other nodes, because node 10 doesn t want to access the rogram. Consider the node 6, =3+G(12,6 +G(11,6 +G(10,6 =10,B= G (12,6 +G (11,6 +G (10,6 = +3 =,=4+3+4=11, so G (6,2 =min{10, } = 10, B = {11,6},G(6,2 =min{10,11} =10,A = B ={6,11}. The results of second level nodes are shown in Table 2. Table 2. The results of 3, 4, 5, 6 Node (, ( (, ( labels , ,11 Then we will give the rocess details of nodes 1 and 2. For node 1, = +3+8=,B = 3+9 = 12,=4+3+8=15,so G (1,0 =min{,12} = 12, B = {3,4},G(1,0 =min{12,15} =12,A = B ={3,4}. And for node 2, =3+2+10= 15, B =, = =16,so G (2,0 = min{,15} =15,B = {2,6,11},G(2,0 = min{15,16} =15,A =B = {2,6,11}. So according to our algorithm, the otimal solution of the examle is {2, 3, 4, 6, 11}. 5. Conclusions The dynamic rogramming algorithm roosed in [9] solves the server location roblem in VOD networks with t ime co mle xity Ο(N 3. This cost is excessively high, making the network administrator unable to determine server locations and reassign rograms (requires time comlexity Ο(N P frequently In this aer, we roose a dynamic rogramming algorithm with time comlexity Ο(NP which allows more frequent rogram reassignment for otimizing erformance and hence is more suitable for solving the video rograms assignment roblem in large-scale networks. 6. References [1] D. Dammicco, U. Mocci, and F. U. Bordoni, Otimal server location in VOD networks, In Proc. IEEE GLOBECOM, Nov. 3-8, 1997, vol. 1, [2] R.H. Hwang and P.H. Chi, Fast otimal video lacement algorithms for hierarchical video-on-demand systems, IEEE Trans. Broadcast, vol.47, no.44, , Dec [3] J.D. Ryoo and S. S. Panwar, File distribution in networks with multimedia storage servers, Networks, vol.38, no.3, Oct.2001, [4] C. Y. Lee, Y. P. Moon and Y. J. Cho, A lexicograhically fair allocation of discrete bandwidth for multicast traffics, Comut. Oer. Res. vol.31, no.14, Dec.2004,

7 [5] H. Luss, An equitable bandwidth allocation model for video-on-demand networks, Netw. Satial Econ., vol.8, no.1, Mar. 2008, [6] K. A. Hua, M. A. Tantaoui, and W. Tavanaong, Video delivery technologies for large-scale deloyment of multimedia alications, Proc. IEEE, vol.92, no.9, Se. 2004, [7] B. Li and J. Liu, Multirate video multicast over the Internet: An overview, IEEE Netw., vol.17, no.1, Jan. 2003, [8] S. Ramesh, I. Rhee, and K. Guo, Multicast with cache (Mcache: An adative zero-delay video-on-demand service, IEEE Trans. Circuits Syst. Video Technol., vol.11, no.3, Mar. 2001, [9] H. Luss, Otimal content distribution in video-ondemand tree networks, IEEE Trans. ON SYSTEM, MAN, AND CYBERNETICS, vol.40, Jan. 2010, no.1. [10] Shihong Xu and Hong Shen, An O(nh Algorithm for Dual-Server Coordinated En-Route Caching in Tree Networks, PDCAT 2006:

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,

More information

Directed File Transfer Scheduling

Directed File Transfer Scheduling Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was

More information

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION Yugoslav Journal of Oerations Research (00), umber, 5- A BICRITERIO STEIER TREE PROBLEM O GRAPH Mirko VUJO[EVI], Milan STAOJEVI] Laboratory for Oerational Research, Faculty of Organizational Sciences University

More information

Swift Template Matching Based on Equivalent Histogram

Swift Template Matching Based on Equivalent Histogram Swift emlate Matching ased on Equivalent istogram Wangsheng Yu, Xiaohua ian, Zhiqiang ou * elecommunications Engineering Institute Air Force Engineering University Xi an, PR China *corresonding author:

More information

Extracting Optimal Paths from Roadmaps for Motion Planning

Extracting Optimal Paths from Roadmaps for Motion Planning Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu

More information

Source Coding and express these numbers in a binary system using M log

Source Coding and express these numbers in a binary system using M log Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is

More information

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China

More information

CMSC 425: Lecture 16 Motion Planning: Basic Concepts

CMSC 425: Lecture 16 Motion Planning: Basic Concepts : Lecture 16 Motion lanning: Basic Concets eading: Today s material comes from various sources, including AI Game rogramming Wisdom 2 by S. abin and lanning Algorithms by S. M. LaValle (Chats. 4 and 5).

More information

Introduction to Parallel Algorithms

Introduction to Parallel Algorithms CS 1762 Fall, 2011 1 Introduction to Parallel Algorithms Introduction to Parallel Algorithms ECE 1762 Algorithms and Data Structures Fall Semester, 2011 1 Preliminaries Since the early 1990s, there has

More information

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model Ad Hoc Networks (4) 5 68 Contents lists available at SciVerse ScienceDirect Ad Hoc Networks journal homeage: www.elsevier.com/locate/adhoc Latency-minimizing data aggregation in wireless sensor networks

More information

EE678 Application Presentation Content Based Image Retrieval Using Wavelets

EE678 Application Presentation Content Based Image Retrieval Using Wavelets EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective

More information

12) United States Patent 10) Patent No.: US 6,321,328 B1

12) United States Patent 10) Patent No.: US 6,321,328 B1 USOO6321328B1 12) United States Patent 10) Patent No.: 9 9 Kar et al. (45) Date of Patent: Nov. 20, 2001 (54) PROCESSOR HAVING DATA FOR 5,961,615 10/1999 Zaid... 710/54 SPECULATIVE LOADS 6,006,317 * 12/1999

More information

Equality-Based Translation Validator for LLVM

Equality-Based Translation Validator for LLVM Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented

More information

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical

More information

RST(0) RST(1) RST(2) RST(3) RST(4) RST(5) P4 RSR(0) RSR(1) RSR(2) RSR(3) RSR(4) RSR(5) Processor 1X2 Switch 2X1 Switch

RST(0) RST(1) RST(2) RST(3) RST(4) RST(5) P4 RSR(0) RSR(1) RSR(2) RSR(3) RSR(4) RSR(5) Processor 1X2 Switch 2X1 Switch Sub-logarithmic Deterministic Selection on Arrays with a Recongurable Otical Bus 1 Yijie Han Electronic Data Systems, Inc. 750 Tower Dr. CPS, Mail Sto 7121 Troy, MI 48098 Yi Pan Deartment of Comuter Science

More information

Lecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.)

Lecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.) Advanced Algorithms Fall 2015 Lecture 3: Geometric Algorithms(Convex sets, Divide & Conuer Algo.) Faculty: K.R. Chowdhary : Professor of CS Disclaimer: These notes have not been subjected to the usual

More information

Near-Optimal Routing Lookups with Bounded Worst Case Performance

Near-Optimal Routing Lookups with Bounded Worst Case Performance Near-Otimal Routing Lookus with Bounded Worst Case Performance Pankaj Guta Balaji Prabhakar Stehen Boyd Deartments of Electrical Engineering and Comuter Science Stanford University CA 9430 ankaj@stanfordedu

More information

Grouping of Patches in Progressive Radiosity

Grouping of Patches in Progressive Radiosity Grouing of Patches in Progressive Radiosity Arjan J.F. Kok * Abstract The radiosity method can be imroved by (adatively) grouing small neighboring atches into grous. Comutations normally done for searate

More information

Toward Optimal Network Fault Correction via End-to-End Inference

Toward Optimal Network Fault Correction via End-to-End Inference Toward Otimal Network Fault Correction via End-to-End Inference Patrick P. C. Lee, Vishal Misra, and Dan Rubenstein Abstract We consider an end-to-end aroach of inferring network faults that manifest in

More information

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Journal of Comuting and Information Technology - CIT 8, 2000, 1, 1 12 1 Comlexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Eunice E. Santos Deartment of Electrical

More information

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1 Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and

More information

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment

More information

AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS

AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS Philie LACOMME, Christian PRINS, Wahiba RAMDANE-CHERIF Université de Technologie de Troyes, Laboratoire d Otimisation des Systèmes Industriels (LOSI)

More information

Randomized algorithms: Two examples and Yao s Minimax Principle

Randomized algorithms: Two examples and Yao s Minimax Principle Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum

More information

Modeling Reliable Broadcast of Data Buffer over Wireless Networks

Modeling Reliable Broadcast of Data Buffer over Wireless Networks JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 3, 799-810 (016) Short Paer Modeling Reliable Broadcast of Data Buffer over Wireless Networs Deartment of Comuter Engineering Yeditee University Kayışdağı,

More information

COMP Parallel Computing. BSP (1) Bulk-Synchronous Processing Model

COMP Parallel Computing. BSP (1) Bulk-Synchronous Processing Model COMP 6 - Parallel Comuting Lecture 6 November, 8 Bulk-Synchronous essing Model Models of arallel comutation Shared-memory model Imlicit communication algorithm design and analysis relatively simle but

More information

Multicommodity Network Flow - Methods and Applications

Multicommodity Network Flow - Methods and Applications Multicommodity Network Flow - Methods and Alications Joe Lindström Linköing University joeli89@student.liu.se Abstract This survey describes the Multicommodity Network Flow roblem, a network flow roblem

More information

CASCH - a Scheduling Algorithm for "High Level"-Synthesis

CASCH - a Scheduling Algorithm for High Level-Synthesis CASCH a Scheduling Algorithm for "High Level"Synthesis P. Gutberlet H. Krämer W. Rosenstiel Comuter Science Research Center at the University of Karlsruhe (FZI) HaidundNeuStr. 1014, 7500 Karlsruhe, F.R.G.

More information

Applying the fuzzy preference relation to the software selection

Applying the fuzzy preference relation to the software selection Proceedings of the 007 WSEAS International Conference on Comuter Engineering and Alications, Gold Coast, Australia, January 17-19, 007 83 Alying the fuzzy reference relation to the software selection TIEN-CHIN

More information

A Method to Determine End-Points ofstraight Lines Detected Using the Hough Transform

A Method to Determine End-Points ofstraight Lines Detected Using the Hough Transform RESEARCH ARTICLE OPEN ACCESS A Method to Detere End-Points ofstraight Lines Detected Using the Hough Transform Gideon Kanji Damaryam Federal University, Lokoja, PMB 1154, Lokoja, Nigeria. Abstract The

More information

A GPU Heterogeneous Cluster Scheduling Model for Preventing Temperature Heat Island

A GPU Heterogeneous Cluster Scheduling Model for Preventing Temperature Heat Island A GPU Heterogeneous Cluster Scheduling Model for Preventing Temerature Heat Island Yun-Peng CAO 1,2,a and Hai-Feng WANG 1,2 1 School of Information Science and Engineering, Linyi University, Linyi Shandong,

More information

Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern

Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern Face Recognition Based on Wavelet Transform and Adative Local Binary Pattern Abdallah Mohamed 1,2, and Roman Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville, Louisville,

More information

A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems

A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems Cheng-Yuan Chang and I-Lun Tseng Deartment of Comuter Science and Engineering Yuan Ze University,

More information

Interactive Image Segmentation

Interactive Image Segmentation Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).

More information

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems Matlab Virtual Reality Simulations for otimizations and raid rototying of flexible lines systems VAMVU PETRE, BARBU CAMELIA, POP MARIA Deartment of Automation, Comuters, Electrical Engineering and Energetics

More information

split split (a) (b) split split (c) (d)

split split (a) (b) split split (c) (d) International Journal of Foundations of Comuter Science c World Scientic Publishing Comany ON COST-OPTIMAL MERGE OF TWO INTRANSITIVE SORTED SEQUENCES JIE WU Deartment of Comuter Science and Engineering

More information

To appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree

To appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree To aear in IEEE TKDE Title: Efficient Skyline and To-k Retrieval in Subsaces Keywords: Skyline, To-k, Subsace, B-tree Contact Author: Yufei Tao (taoyf@cse.cuhk.edu.hk) Deartment of Comuter Science and

More information

A Petri net-based Approach to QoS-aware Configuration for Web Services

A Petri net-based Approach to QoS-aware Configuration for Web Services A Petri net-based Aroach to QoS-aware Configuration for Web s PengCheng Xiong, YuShun Fan and MengChu Zhou, Fellow, IEEE Abstract With the develoment of enterrise-wide and cross-enterrise alication integration

More information

Efficient Parallel Hierarchical Clustering

Efficient Parallel Hierarchical Clustering Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore

More information

Selecting Discriminative Binary Patterns for a Local Feature

Selecting Discriminative Binary Patterns for a Local Feature BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 3 Sofia 015 rint ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-015-0044 Selecting Discriminative Binary atterns

More information

Computing the Convex Hull of. W. Hochstattler, S. Kromberg, C. Moll

Computing the Convex Hull of. W. Hochstattler, S. Kromberg, C. Moll Reort No. 94.60 A new Linear Time Algorithm for Comuting the Convex Hull of a Simle Polygon in the Plane by W. Hochstattler, S. Kromberg, C. Moll 994 W. Hochstattler, S. Kromberg, C. Moll Universitat zu

More information

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY Andrew Lam 1, Steven J.E. Wilton 1, Phili Leong 2, Wayne Luk 3 1 Elec. and Com. Engineering 2 Comuter Science

More information

The Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks

The Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks The Scalability and Performance of Common Vector Solution to Generalized abel Continuity Constraint in Hybrid Otical/Pacet etwors Shujia Gong and Ban Jabbari {sgong, bjabbari}@gmuedu George Mason University

More information

Randomized Selection on the Hypercube 1

Randomized Selection on the Hypercube 1 Randomized Selection on the Hyercube 1 Sanguthevar Rajasekaran Det. of Com. and Info. Science and Engg. University of Florida Gainesville, FL 32611 ABSTRACT In this aer we resent randomized algorithms

More information

Weighted Page Rank Algorithm based on In-Out Weight of Webpages

Weighted Page Rank Algorithm based on In-Out Weight of Webpages Indian Journal of Science and Technology, Vol 8(34), DOI: 10.17485/ijst/2015/v8i34/86120, December 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 eighted Page Rank Algorithm based on In-Out eight

More information

Theoretical Analysis of Graphcut Textures

Theoretical Analysis of Graphcut Textures Theoretical Analysis o Grahcut Textures Xuejie Qin Yee-Hong Yang {xu yang}@cs.ualberta.ca Deartment o omuting Science University o Alberta Abstract Since the aer was ublished in SIGGRAPH 2003 the grahcut

More information

Lecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model.

Lecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model. U.C. Berkeley CS273: Parallel and Distributed Theory Lecture 18 Professor Satish Rao Lecturer: Satish Rao Last revised Scribe so far: Satish Rao (following revious lecture notes quite closely. Lecture

More information

Efficient Sequence Generator Mining and its Application in Classification

Efficient Sequence Generator Mining and its Application in Classification Efficient Sequence Generator Mining and its Alication in Classification Chuancong Gao, Jianyong Wang 2, Yukai He 3 and Lizhu Zhou 4 Tsinghua University, Beijing 0084, China {gaocc07, heyk05 3 }@mails.tsinghua.edu.cn,

More information

Mining Association rules with Dynamic and Collective Support Thresholds

Mining Association rules with Dynamic and Collective Support Thresholds Mining Association rules with Dynamic and Collective Suort Thresholds C S Kanimozhi Selvi and A Tamilarasi Abstract Mining association rules is an imortant task in data mining. It discovers the hidden,

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Distrib. Comut. 71 (2011) 288 301 Contents lists available at ScienceDirect J. Parallel Distrib. Comut. journal homeage: www.elsevier.com/locate/jdc Quality of security adatation in arallel

More information

Tiling for Performance Tuning on Different Models of GPUs

Tiling for Performance Tuning on Different Models of GPUs Tiling for Performance Tuning on Different Models of GPUs Chang Xu Deartment of Information Engineering Zhejiang Business Technology Institute Ningbo, China colin.xu198@gmail.com Steven R. Kirk, Samantha

More information

Collective Communication: Theory, Practice, and Experience. FLAME Working Note #22

Collective Communication: Theory, Practice, and Experience. FLAME Working Note #22 Collective Communication: Theory, Practice, and Exerience FLAME Working Note # Ernie Chan Marcel Heimlich Avi Purkayastha Robert van de Geijn Setember, 6 Abstract We discuss the design and high-erformance

More information

TCP VON: Joint Congestion Control and Online Network Coding for Wireless Networks

TCP VON: Joint Congestion Control and Online Network Coding for Wireless Networks TCP VON: Joint Congestion Control and Online Network Coding for Wireless Networks Wei Bao, Vahid Shah-Mansouri, Vincent W.S. Wong, and Victor C.M. Leung Deartment of Electrical and Comuter Engineering

More information

RESEARCH ARTICLE. Simple Memory Machine Models for GPUs

RESEARCH ARTICLE. Simple Memory Machine Models for GPUs The International Journal of Parallel, Emergent and Distributed Systems Vol. 00, No. 00, Month 2011, 1 22 RESEARCH ARTICLE Simle Memory Machine Models for GPUs Koji Nakano a a Deartment of Information

More information

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics structure arises in many alications of geometry. The dual structure, called a Delaunay triangulation also has many interesting roerties. Figure 3: Voronoi diagram and Delaunay triangulation. Search: Geometric

More information

Simple Memory Machine Models for GPUs

Simple Memory Machine Models for GPUs 2012 IEEE 2012 26th IEEE International 26th International Parallel Parallel and Distributed and Distributed Processing Processing Symosium Symosium Workshos Workshos & PhD Forum Simle Memory Machine Models

More information

Skip List Based Authenticated Data Structure in DAS Paradigm

Skip List Based Authenticated Data Structure in DAS Paradigm 009 Eighth International Conference on Grid and Cooerative Comuting Ski List Based Authenticated Data Structure in DAS Paradigm Jieing Wang,, Xiaoyong Du,. Key Laboratory of Data Engineering and Knowledge

More information

Resource Allocation for QoS Provisioning in Wireless Ad Hoc Networks

Resource Allocation for QoS Provisioning in Wireless Ad Hoc Networks Resource Allocation for QoS Provisioning in Wireless Ad Hoc Networks Mung Chiang, Daniel ONeill, David Julian andstehenboyd Electrical Engineering Deartment Stanford University, CA 94305, USA Abstract-

More information

Stereo Disparity Estimation in Moment Space

Stereo Disparity Estimation in Moment Space Stereo Disarity Estimation in oment Sace Angeline Pang Faculty of Information Technology, ultimedia University, 63 Cyberjaya, alaysia. angeline.ang@mmu.edu.my R. ukundan Deartment of Comuter Science, University

More information

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions

More information

The Spatial Skyline Queries

The Spatial Skyline Queries The Satial Skyline Queries Mehdi Sharifzadeh Comuter Science Deartment University of Southern California Los Angeles, CA 90089-078 sharifza@usc.edu Cyrus Shahabi Comuter Science Deartment University of

More information

Distributed Estimation from Relative Measurements in Sensor Networks

Distributed Estimation from Relative Measurements in Sensor Networks Distributed Estimation from Relative Measurements in Sensor Networks #Prabir Barooah and João P. Hesanha Abstract We consider the roblem of estimating vectorvalued variables from noisy relative measurements.

More information

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Weimin Chen, Volker Turau TR-93-047 August, 1993 Abstract This aer introduces a new technique for source-to-source code

More information

Parallel Construction of Multidimensional Binary Search Trees. Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka

Parallel Construction of Multidimensional Binary Search Trees. Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka Parallel Construction of Multidimensional Binary Search Trees Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka School of CIS and School of CISE Northeast Parallel Architectures Center Syracuse

More information

Robust Motion Estimation for Video Sequences Based on Phase-Only Correlation

Robust Motion Estimation for Video Sequences Based on Phase-Only Correlation Robust Motion Estimation for Video Sequences Based on Phase-Only Correlation Loy Hui Chien and Takafumi Aoki Graduate School of Information Sciences Tohoku University Aoba-yama 5, Sendai, 98-8579, Jaan

More information

Short Papers. Symmetry Detection by Generalized Complex (GC) Moments: A Close-Form Solution 1 INTRODUCTION

Short Papers. Symmetry Detection by Generalized Complex (GC) Moments: A Close-Form Solution 1 INTRODUCTION 466 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE VOL 2 NO 5 MAY 999 Short Paers Symmetry Detection by Generalized Comlex (GC) Moments: A Close-Form Solution Dinggang Shen Horace HS I

More information

10. Multiprocessor Scheduling (Advanced)

10. Multiprocessor Scheduling (Advanced) 10. Multirocessor Scheduling (Advanced) Oerating System: Three Easy Pieces AOS@UC 1 Multirocessor Scheduling The rise of the multicore rocessor is the source of multirocessorscheduling roliferation. w

More information

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution Texture Maing with Vector Grahics: A Nested Mimaing Solution Wei Zhang Yonggao Yang Song Xing Det. of Comuter Science Det. of Comuter Science Det. of Information Systems Prairie View A&M University Prairie

More information

Cooperative Diversity Combined with Beamforming

Cooperative Diversity Combined with Beamforming Cooerative Diversity Combined with Beamforming Hyunwoo Choi and Jae Hong Lee School of Electrical Engineering and INMC Seoul National University Seoul, Korea Email: {novo28, jhlee}@snu.ac.kr Abstract In

More information

A Symmetric FHE Scheme Based on Linear Algebra

A Symmetric FHE Scheme Based on Linear Algebra A Symmetric FHE Scheme Based on Linear Algebra Iti Sharma University College of Engineering, Comuter Science Deartment. itisharma.uce@gmail.com Abstract FHE is considered to be Holy Grail of cloud comuting.

More information

Submission. Verifying Properties Using Sequential ATPG

Submission. Verifying Properties Using Sequential ATPG Verifying Proerties Using Sequential ATPG Jacob A. Abraham and Vivekananda M. Vedula Comuter Engineering Research Center The University of Texas at Austin Austin, TX 78712 jaa, vivek @cerc.utexas.edu Daniel

More information

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal International Journal of Information and Electronics Engineering, Vol. 1, No. 1, July 011 An Efficient VLSI Architecture for Adative Rank Order Filter for Image Noise Removal M. C Hanumantharaju, M. Ravishankar,

More information

Brief Contributions. A Geometric Theorem for Network Design 1 INTRODUCTION

Brief Contributions. A Geometric Theorem for Network Design 1 INTRODUCTION IEEE TRANSACTIONS ON COMPUTERS, VOL. 53, NO., APRIL 00 83 Brief Contributions A Geometric Theorem for Network Design Massimo Franceschetti, Member, IEEE, Matthew Cook, and Jehoshua Bruck, Fellow, IEEE

More information

Weight Co-occurrence based Integrated Color and Intensity Matrix for CBIR

Weight Co-occurrence based Integrated Color and Intensity Matrix for CBIR Weight Co-occurrence based Integrated Color and Intensity Matrix for CBIR Megha Agarwal, 2R.P. Maheshwari Indian Institute of Technology Roorkee 247667, Uttarakhand, India meghagarwal29@gmail.com, 2rmaheshwari@gmail.com

More information

Improving Trust Estimates in Planning Domains with Rare Failure Events

Improving Trust Estimates in Planning Domains with Rare Failure Events Imroving Trust Estimates in Planning Domains with Rare Failure Events Colin M. Potts and Kurt D. Krebsbach Det. of Mathematics and Comuter Science Lawrence University Aleton, Wisconsin 54911 USA {colin.m.otts,

More information

Improving Parallel-Disk Buffer Management using Randomized Writeback æ

Improving Parallel-Disk Buffer Management using Randomized Writeback æ Aears in Proceedings of ICPP 98 1 Imroving Parallel-Disk Buffer Management using Randomized Writeback æ Mahesh Kallahalla Peter J Varman Detartment of Electrical and Comuter Engineering Rice University

More information

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces Wavelet Based Statistical Adated Local Binary atterns for Recognizing Avatar Faces Abdallah A. Mohamed 1, 2 and Roman V. Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville,

More information

Building Better Nurse Scheduling Algorithms

Building Better Nurse Scheduling Algorithms Building Better Nurse Scheduling Algorithms Annals of Oerations Research, 128, 159-177, 2004. Dr Uwe Aickelin Dr Paul White School of Comuter Science University of the West of England University of Nottingham

More information

The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing

The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing Mikael Taveniku 2,3, Anders Åhlander 1,3, Magnus Jonsson 1 and Bertil Svensson 1,2

More information

Autonomic Physical Database Design - From Indexing to Multidimensional Clustering

Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Stehan Baumann, Kai-Uwe Sattler Databases and Information Systems Grou Technische Universität Ilmenau, Ilmenau, Germany

More information

An Indexing Framework for Structured P2P Systems

An Indexing Framework for Structured P2P Systems An Indexing Framework for Structured P2P Systems Adina Crainiceanu Prakash Linga Ashwin Machanavajjhala Johannes Gehrke Carl Lagoze Jayavel Shanmugasundaram Deartment of Comuter Science, Cornell University

More information

Power Savings in Embedded Processors through Decode Filter Cache

Power Savings in Embedded Processors through Decode Filter Cache Power Savings in Embedded Processors through Decode Filter Cache Weiyu Tang Rajesh Guta Alexandru Nicolau Deartment of Information and Comuter Science University of California, Irvine Irvine, CA 92697-3425

More information

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal

More information

Graph Cut Matching In Computer Vision

Graph Cut Matching In Computer Vision Grah Cut Matching In Comuter Vision Toby Collins (s0455374@sms.ed.ac.uk) February 2004 Introduction Many of the roblems that arise in early vision can be naturally exressed in terms of energy minimization.

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

Construction of Irregular QC-LDPC Codes in Near-Earth Communications

Construction of Irregular QC-LDPC Codes in Near-Earth Communications Journal of Communications Vol. 9, No. 7, July 24 Construction of Irregular QC-LDPC Codes in Near-Earth Communications Hui Zhao, Xiaoxiao Bao, Liang Qin, Ruyan Wang, and Hong Zhang Chongqing University

More information

AN early generation of unstructured P2P systems is

AN early generation of unstructured P2P systems is 1078 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 16, NO. 11, NOVEMBER 2005 Dynamic Layer Management in Suereer Architectures Li Xiao, Member, IEEE, Zhenyun Zhuang, and Yunhao Liu, Member,

More information

Parallel Algorithms for the Summed Area Table on the Asynchronous Hierarchical Memory Machine, with GPU implementations

Parallel Algorithms for the Summed Area Table on the Asynchronous Hierarchical Memory Machine, with GPU implementations Parallel Algorithms for the Summed Area Table on the Asynchronous Hierarchical Memory Machine, ith GPU imlementations Akihiko Kasagi, Koji Nakano, and Yasuaki Ito Deartment of Information Engineering Hiroshima

More information

2010 First International Conference on Networking and Computing

2010 First International Conference on Networking and Computing First International Conference on Networking and Comuting Imlementations of Parallel Comutation of Euclidean Distance Ma in Multicore Processors and GPUs Duhu Man, Kenji Uda, Hironobu Ueyama, Yasuaki Ito,

More information

Lecture 8: Orthogonal Range Searching

Lecture 8: Orthogonal Range Searching CPS234 Comutational Geometry Setember 22nd, 2005 Lecture 8: Orthogonal Range Searching Lecturer: Pankaj K. Agarwal Scribe: Mason F. Matthews 8.1 Range Searching The general roblem of range searching is

More information

SEARCH ENGINE MANAGEMENT

SEARCH ENGINE MANAGEMENT e-issn 2455 1392 Volume 2 Issue 5, May 2016. 254 259 Scientific Journal Imact Factor : 3.468 htt://www.ijcter.com SEARCH ENGINE MANAGEMENT Abhinav Sinha Kalinga Institute of Industrial Technology, Bhubaneswar,

More information

Continuous Visible k Nearest Neighbor Query on Moving Objects

Continuous Visible k Nearest Neighbor Query on Moving Objects Continuous Visible k Nearest Neighbor Query on Moving Objects Yaniu Wang a, Rui Zhang b, Chuanfei Xu a, Jianzhong Qi b, Yu Gu a, Ge Yu a, a Deartment of Comuter Software and Theory, Northeastern University,

More information

Signature File Hierarchies and Signature Graphs: a New Index Method for Object-Oriented Databases

Signature File Hierarchies and Signature Graphs: a New Index Method for Object-Oriented Databases Signature File Hierarchies and Signature Grahs: a New Index Method for Object-Oriented Databases Yangjun Chen* and Yibin Chen Det. of Business Comuting University of Winnieg, Manitoba, Canada R3B 2E9 ABSTRACT

More information

The Edge-flipping Distance of Triangulations

The Edge-flipping Distance of Triangulations The Edge-fliing Distance of Triangulations Sabine Hanke (Institut für Informatik, Universität Freiburg, Germany hanke@informatik.uni-freiburg.de) Thomas Ottmann (Institut für Informatik, Universität Freiburg,

More information

A Novel Iris Segmentation Method for Hand-Held Capture Device

A Novel Iris Segmentation Method for Hand-Held Capture Device A Novel Iris Segmentation Method for Hand-Held Cature Device XiaoFu He and PengFei Shi Institute of Image Processing and Pattern Recognition, Shanghai Jiao Tong University, Shanghai 200030, China {xfhe,

More information