A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science

Size: px
Start display at page:

Download "A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science"

Transcription

1 A Cost Model for Distributed Sared Memory Using Competitive Update Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, Texas, , USA Abstract Tis paper presents a new \cost" analysis model for distributed sared memory (DSM) using competitive update protocol. Te cost metric of interest ere is te overead of message passing necessary to implement DSM. Tis approac is based on segment model proposed previously [1, 11]. Input parameter for te cost analysis model proposed ere is te probability density function of te number of remote updates in a segment. Tis distribution can quite accurately caracterize many applications. Te proposed model is validated by comparing analytical results obtained using te model to experimental results. Te competitive update protocol for sared memory is dened using a parameter called \update limit" (or tresold). Using te proposed model, we compute te optimal update limit for competitive update protocol. 1 Introduction Software distributed sared memory (DSM) systems ave many advantages over message passing systems [12, 15]. Since DSM provides a user a simple sared memory abstraction, te user does not ave to be concerned wit data movement between osts. (Users can use te DSM as if te sared memory is available locally.) Many applications programmed for a multiprocessor system wit sared memory can be executed on a software DSM system witout significant modications. Software DSM is often implemented on a workstation cluster. Software DSMs typically maintain consistency at te granularity of a page. Tis allows software DSM implementations to use paging ardware typically available in modern workstations. Many dierent protocols ave been proposed for maintaining consistency. Typically, DSMs are based on variations of write- Tis work is supported in part by te National Science Foundation under grant MIP invalidate and/or write-update protocols. A writeinvalidate protocol is similar to read-replication described in [15]. Page replication is allowed for read operation. However, only single copy is allowed for write operation. A write-update protocol is te same as te full-replication described in [15]. Page replication is allowed for bot read and write operations. Te competitive update protocol [7, 6] is dened using a parameter called \update limit" or \tresold". Wen using te competitive update protocol wit limit L, a node A invalidates te local copy of a page P if and wen (L + 1)-t update to te page by oter nodes occurs since te previous access of page P by node A. Te traditional update protocol can be obtained by coosing L = 1. Te protocol obtained wen L = is similar to te traditional invalidate protocol. Tus, selecting appropriate limit L is important in te competitive update protocol. Tis paper presents a new cost analysis model for te competitive update protocol. Tis model is based on probability density function (pdf) for number of updates in a \segment" [1, 11] { a segment for page P is dened as te sequence of remote updates to page P between two consecutive local access of page P by a node. More accurately, a new segment begins wit te rst local access by a node following an update to te page by anoter node. Segments are dened from te point of view of eac node. Terefore, for te same page, dierent nodes may observe dierent segments. Figure 1 illustrates segments for page P observed at node A wit an example: Segment 1 for page P at node A starts at time 1 wen node A reads page P. Copy of page P on node A is ten updated by nodes B, C, and D. After tat, node A starts segment 2 by a local access at time 6. Similarly, node A starts segment 3 by local access at time 11 following remote updates by nodes B and C at time 9 and 1, respectively.

2 remote writes by oter nodes B write C write D write B write C write B write Page P time local access A read A write A read A read by node A A write A write A read A write segments Segment 1 Segment 2 Segment 3 Figure 1: Segments If competitive update protocol wit limit L = 1 is being used, ten page P at node A (refer Figure 1) will be invalidated wen te update by node C occurs in segment 1. Once te page is invalidated, ideally, subsequent updates (for instance, by node D) to page P will not be sent to node A, as it does not ave a valid copy of P anymore. In tis case, wen node A accesses page P at te beginning of segment 2, a page fault will occur (as node A's copy of page P is invalidated). Wen te page fault occurs, node A will send a request for page P to some oter node. Tis request may be forwarded a few times before it reaces a node tat as page P. Tis node will send page P to node A, and node A will ten send an acknowledgement for page P. 2 Related Work Many cost analysis models are presented by oter researcers. Most existing models use read/write ratio and/or memory access fault ratio as input parameters [3, 2, 8, 15, 16, 14]. References [3, 2] present modeling to predict te number of cace misses. Stumm and Zou [15] compare te performance of four basic protocols. Tey compute te average memory access cost based on parameters: te cost of sending packet, te cost of sending page, te number of nodes, read/write ratio, and probability of fault. Srbljic et al. [14] present similar performance analysis based on data access type: single/multiple-reader single/multiple-writer. Kessler and Livny [8] compare te performance DSM algoritms by varying a syntetic memory access pattern caracterized by several parameters. Brorsson and Stenstrom [2] classify sared memory access pattern as read-only/read-write exclusive/sared-by-few/sared-by-many. Tey caracterize producer-consumer and migratory access pattern using tis classication, and compute cace miss ratio. Tey also apply similar metod to stationary access pattern [3]. Eggers [5] presents a write-run model to predict te cace coerency overead for te bus based multiprocessor system. write-run is a sequence of local writes between two consecutive remote accesses. Tis model measures te overead by te number of sequences of single processor writes to an individual sared address, and te lengt of tese sequences. Anderson and Karlin [1] use te write-run model to design adaptive sceme for bus-based systems. (Our model applies to distributed systems.) Raynaud et al. [13] present an update distance model for adaptive update protocol, wic is similar to te segment model. In teir approac, a directory records te update patterns observed and ten uses tem to selectively send updates and invalidations to processors. Selecting appropriate update limit L is important for te competitive update protocol. However, no study as been done for analytically determining appropriate update limit. Previous approaces include selecting update limit by guesswork, or experimental evaluation of te application for many dierent update limits. [6] presents simulation results by varying te update limit for te competitive update protocol. Tey conclude tat te best update limit is dicult or impossible to predict. 3 Cost Analysis Te cost of a message of size m is denoted as c(m). For instance, c(m) may be 1 { tis means tat te cost metric simply counts te number of messages. Anoter possibility is c(m) = m, wic would mean tat te total amount of data sent by messages is used as te cost metric. In general, any suitable function of m may be used as te cost. For instance, c(m) = K 1 + K 2 m, were K 1 and K 2 are some constants. Now we analyze te cost of messages during eac segment, wen using te competitive update protocol wit update limit L. In our analysis, we ignore te messages required to perform syncronization operations for obtaining access to a set of sared memory locations (i.e., acquire operation), as te cost of tese syncronization operations is typically independent of te update limit. As te nal goal of our analysis is to determine te optimal update limit, it is reasonable to exclude te syncronization costs. Let us assume te following notation: X denotes te average value of X. p update denotes size of an update message. p control denotes te size of a control message, suc as page request or acknowledgement. p page denotes te size of a message tat includes a page. Note tat p control and p page are constants, wile p update may be dierent for eac update. At rst, we consider message cost in a segment in wic te number of updates is U. A copy of te page is updated until it receives L update messages from oter nodes (between two consecutive local accesses). Upon receiving (L + 1)-t update message, local copy of te page is invalidated.

3 If te number of update messages (U) received during te segment is at most L (U L), ten te page is not invalidated. Terefore, te message cost of suc a segment is te cost of U update messages, and te U control messages acknowledging tese updates. Now consider te case wen te number of updates in te segment is at least L + 1. In tis case, te page will be invalidated on te (L + 1)-t update in te segment. Tis invalidation will result in a page fault wen a local access is attempted at te beginning of te next segment. Tus, a segment containing at least (L + 1) remote updates include two costs: (a) cost of L + 1 update messages and L + 1 control messages acknowledging tese updates, and (b) cost of serving a page fault. Cost of a page fault includes te following: (i) te request message, wic may be forwarded a few times before it reaces a node tat as te requested page, (ii) message to send te page to requesting node, and (iii) a control message to acknowledge receipt of te page. Te average cost, denoted C(L; U), of a segment wit U updates wen using competitive update protocol wit limit L is: i U c(p update ) + c(p control ), wen U L (L + 1) i c(p update ) + c(p control ) + (F + 1) c(p control ) + c(p page ), wen U > L. Note tat c(p control ) and c(p page ) are constants, wile c(p update ) depends on size of te update message, and F is te average number of ops a request message takes before reacing a node tat as te requested page. Terefore, te above expression uses average value of c(p update ). Now, let p(x) denote te probability density function (pdf) of te number of updates x in a segment for a given application. Based on te above cost analysis for a segment wit U updates and limit L, average cost per segment for te application, denoted C avg (L; p(x)), can be obtained as: C avg (L; p(x)) PL = c(p update ) + c(p control )i x=1 x p(x) + (L + 1) (c(p update ) + c(p control )) + (F + 1) c(p control ) + c(p page ) P 1 p(x) x=l+1 Using te average cost per segment for a particular limit L, optimal update limit, L optimal, can be obtained as te value of L tat minimizes te above expression for C avg (L; p(x)). More formally, L optimal = fl j min L C avg (L; p(x)) = C avg (l; p(x))g Now, in Section 4, we compares analytical results wit experimental measurements to validate te proposed model. 4 Validation of te Proposed Model To verify te accuracy of our cost analysis model, we compare te average cost estimated by our model wit tat obtained by experimental measurements. For tis validation study, we assume tat cost of a message of size m is m, tat is, c(m) = m. We implemented te competitive update protocol by modifying Quarks DSM (Beta release.8) [4, 9]. For tis study, we used several real applications (named Floyd-Warsall, Isort, Jacobi, SOR) as well as syntetic applications (named qtest5 and qtest1). qtest5 and qtest1 are simple sared memory applications based on a program available wit te Quarks release. All nodes access te sared data concurrently wit read ratio 5% and 1%, respectively. Floyd- Warsall is all-pair-sortest-pat algoritm. (We use 128 vertices as input.) Isort is Integer Sorting algoritm. (We use 3, keys of 1 range.) Jacobi is a linear system solver by using iteration metod. (We solve a linear system of size 128.) SOR is Successive Over-Relaxation algoritm wic executes simple iterative relaxation algoritm. (We use grid.) Floyd-Warsall, Isort, and Jacobi applications used in te experiments were written at Texas A&M University. SOR is available wit te Quarks release. Te experiments were used to determine: (a) te experimental cost for eac update limit L, and (b) te probability density function p(x) of te number of updates in a segment. All applications are executed on a 8-node workstation cluster. Using te p(x) measured by experiments, we ten computed te average cost per segment analytically. (We use F = 4 in tis analysis.) Te objective ere is to compare tis analytical result wit te cost measured experimentally. In Figures 2 troug 7, te curve labeled pdf plots p(x) 1, were p(x) is obtained via experimental measurements. For te pdf, te orizontal axis corresponds to number of updates x, and vertical axis corresponds to p(x) 1. p(x) is obtained by keeping track of te number of updates per segment for all pages at all nodes. Te cost.analysis curves in Figures 2 troug 7 plot te analytical values of average cost per segment, as obtained by using our model. Te cost.exp curve plots te average cost per segment as measured during te experiments. Te average is taken over all segments for all pages at all nodes. In our analysis, we did not consider te messages required for syncronization, initialization (wen te

4 pdf (%) or Cost (X 1^5 bytes) pdf (%) or Cost (X 1^2 bytes) Figure 2: qtest (read ratio = 5%) Figure 5: Isort (size = 3) pdf (%) or Cost (X 1^5 bytes) pdf (%) or Cost (X 1^4 bytes) Figure 3: qtest (read ratio = 1%) Figure 6: Jacobi (size = 128) pdf (%) or Cost (X 1^5 bytes) pdf (%) or Cost (X 1^5 bytes) Figure 4: Floyd-Warsall (size = 128) Figure 7: SOR (size = 512)

5 program starts executing), and false updates (sending update message to a node wose local copy as been already invalidated). Terefore, one would expect a mismatc between cost.exp and corresponding cost.analysis. However, te dierence between tese two curves would be relatively independent of te value of L. Te cost.adj (adjusted) curves in Figures 2 troug 7 are obtained by subtracting te unaccounted costs from cost.exp. Figures 2 troug 7 sow tat cost estimated by analytical model,cost.analysis, is typically close to te adjusted cost obtained by experimentation results, cost.adj. In fact, cost.analysis and cost.exp are also typically close. However, tere are signicant differences between cost.analysis and cost.exp, especially in te Figures 6 and 7. As noted before, tese dierences are due to unaccounted messages, for instance, for syncronization, initialization, and false updates. In case of Jacobi and SOR, many messages are sent initially to initialize te sared data. Tese messages form a large fraction of all messages sent. Terefore, te error in our model is muc more pronounced for tese applications, as compared to oter applications. To determine weter te probability density function varies muc wit te update limit, we measured p(x) by executing tree applications (qtest wit 5% read ratio, Jacobi, and SOR) for dierent update limits. Figure 8 troug 1 sow tat p(x) of qtest is relatively stable, p(x) of SOR is very stable, and te p(x) of Jacobi is relatively unstable (owever, in general, p(x) of Jacobi is decreasing as update limit increases). All 8 nodes sare some sared memory space in qtest and Jacobi applications. Te order of sared memory access may be dierent for eac loop in qtest application, and te order of nodes reacing te barrier may be dierent for eac loop of Jacobi application, wic causes p(x) to be unstable. However, only 2 nodes sare te sared memory space in SOR application wic causes p(x) to be stable. One may expect tat te probability density functions will be dierent wen using dierent input data for some applications. To verify, we measured te probability density functions of te number of updates in a segments wit dierent input data for Floyd- Warsall application. We coose Floyd-Warsall because memory access pattern is dierent on dierent inputs. (Te degree of saring increases if te input matrix is more dense.) Figure 11 sows te probability density functions of dierent input data for Floyd- Warsall application. Tere is only a little dierence for eac input data. pdf (%) pdf (%) pdf (%) pdf:l= pdf:l=2 pdf:l=4 pdf:l=6 pdf:l= Figure 8: pdf (qtest: read ratio = 5 %) pdf:l= pdf:l=2 pdf:l=4 pdf:l=6 pdf:l= Figure 9: pdf (Jacobi: size = 128) pdf:l= pdf:l=2 pdf:l=4 pdf:l=6 pdf:l= Figure 1: pdf (SOR: size = 512)

6 pdf (%) pdf:dense pdf:moderate pdf:sparse Figure 11: pdf (Floyd-Warsall: size = 128) Te above measurements sow tat for some applications, te probability density function p(x) is relatively independent of te update limit and input data. Of course, it sould be empasized tat, tis is not true for all applications. 5 Conclusion and Future Work Tis paper presents a new cost analysis model for competitive update protocol for software distributed sared memory (DSM). Tis model can be used to compute optimal update limit for te competitive update protocol. Te optimal limit is cosen suc tat te cost metric is minimized for te given application (as caracterized by its probability density function p(x) of number of updates x in a segment). We validated te proposed model by comparing analytical results from te model to experimental results obtained from an experimental DSM implementation. Te analytical results often closely matc te experimental results. We conclude tat te proposed model can, terefore, be used to estimate te optimal update limit for an application. Future work includes application of tis model to estimate costs of dierent scemes for recoverable DSM systems. Acknowledgments We tank te referees for teir detailed comments. We also tank Jon Carter and D. Kandekar at te University of Uta for making Quarks source code available in public domain, Akiles Kumar for te Floyd-Warsall source code, and Puneeta Rajan for Jacobi source code. References [1] C. Anderson and A. Karlin, \Two adaptive ybrid cace coerency protocols," in Proc. of te International Symposium on Hig-Performance Computer Arcitecture, pp. 33{313, Feb [2] M. Brorsson and P. Stenstrom, \Modeling accesses to migratory and producer-consumer caracterized data in a sared memory multiprocessor," in Proc. of IEEE Symposium on Parallel and Distributed Processing, pp. 612{619, Oct [3] M. Brorsson and P. Stenstrom, \Modeling accesses to stationary data in a sared memory multiprocessor," in Proc. of International Conference on Parallel and Distributed Computing Systems, pp. 82{87, Oct [4] J. Carter, D. Kandekar, and L. Kamb, \Distributed sared memory: Were we are and were we sould be eaded," in Proc. of te Fift Worksop on Hot Topics in Operating Systems, pp. 119{122, May [5] S. J. Eggers, \Simplicity versus accuracy in a model of cace coerency overead," IEEE Transactions on Computers, vol. 4, pp. 893{96, Aug [6] H. Gran, P. Stenstrom, and M. Dubois, \Implementation and evaluation of update-based cace protocols under relaxed memory consistency models," Future Generation Computer Systems, vol. 11, pp. 247{271, June [7] A. Karlin, M. Manasse, L. Rudolp, and D. Sleator, \Competitive snoopy cacing," in Proc. of te 27't Annual Symposium on Foundations of Computer Science, pp. 244{254, Oct [8] R. Kessler and M. Livny, \An analysis of distributed sared memory algoritms," in Proc. of te 9t International Conference on Distributed Computing Systems, pp. 498{55, June [9] D. Kandekar, \Quarks: Portable dsm on unix," Dept. of Computer Science, University of Uta (manuscript). [1] J.-H. Kim and N. H. Vaidya, \A cost-comparison approac for adaptive distributed sared memory," in Proc. of 1996 International Conference on Supercomputing, pp. 44{51, May [11] J.-H. Kim, Performance and Recoverability of Distributed Sared Memory Systems Using Competitive Update. P.D. dissertation, Texas A&M University, Aug [12] B. Nitzberg and V. Lo, \Distributed sared memory: A survey of issues and algoritms," IEEE Computer, vol. 24, pp. 52{6, Aug [13] A. Raynaud, Z. Zang, and J. Torrellas, \Distanceadaptive update protocols for scalable sared-memory multiprocessors," in Proc. of te International Symposium on Hig-Performance Computer Arcitecture, pp. 323{334, Feb [14] S. Srbljic, Z. Vranesic, and L. Budin, \Performance prediction for dierent consistency scemes in distributed sared memory systems," in Proc. of te International Symposium on Hig Performance Distributed Computing, pp. 295{32, Apr [15] M. Stumm and S. Zou, \Algoritms implementing distributed sared memory," IEEE Computer, vol. 23, pp. 54{64, May 199. [16] O. Teel and B. Fleisc, \Design and analysis of igly available and scalable coerence protocols for distributed sared memory systems using stocastic modeling," in Proc. of te International Conference on Parallel Processing, vol. I, pp. 126{13, Aug

Adaptive Migratory Scheme for Distributed Shared Memory 1. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science. Texas A&M University

Adaptive Migratory Scheme for Distributed Shared Memory 1. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science. Texas A&M University Adaptive Migratory Scheme for Distributed Shared Memory 1 Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX 77843-3112 E-mail: fjhkim,vaidyag@cs.tamu.edu

More information

(Preliminary Version 2 ) Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science. Texas A&M University. College Station, TX

(Preliminary Version 2 ) Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science. Texas A&M University. College Station, TX Towards an Adaptive Distributed Shared Memory (Preliminary Version ) Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX 77843-3 E-mail: fjhkim,vaidyag@cs.tamu.edu

More information

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically 2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use

More information

Symmetric Tree Replication Protocol for Efficient Distributed Storage System*

Symmetric Tree Replication Protocol for Efficient Distributed Storage System* ymmetric Tree Replication Protocol for Efficient Distributed torage ystem* ung Cune Coi 1, Hee Yong Youn 1, and Joong up Coi 2 1 cool of Information and Communications Engineering ungkyunkwan University

More information

4.1 Tangent Lines. y 2 y 1 = y 2 y 1

4.1 Tangent Lines. y 2 y 1 = y 2 y 1 41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange

More information

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer

More information

Section 2.3: Calculating Limits using the Limit Laws

Section 2.3: Calculating Limits using the Limit Laws Section 2.3: Calculating Limits using te Limit Laws In previous sections, we used graps and numerics to approimate te value of a it if it eists. Te problem wit tis owever is tat it does not always give

More information

More on Functions and Their Graphs

More on Functions and Their Graphs More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in

More information

George Xylomenos and George C. Polyzos. with existing protocols and their eæciency in terms of

George Xylomenos and George C. Polyzos. with existing protocols and their eæciency in terms of IP MULTICASTING FOR WIRELESS MOBILE OSTS George Xylomenos and George C. Polyzos fxgeorge,polyzosg@cs.ucsd.edu Computer Systems Laboratory Department of Computer Science and Engineering University of California,

More information

4.2 The Derivative. f(x + h) f(x) lim

4.2 The Derivative. f(x + h) f(x) lim 4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially

More information

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various

More information

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks An Algoritm for Loopless Deflection in Potonic Packet-Switced Networks Jason P. Jue Center for Advanced Telecommunications Systems and Services Te University of Texas at Dallas Ricardson, TX 75083-0688

More information

13.5 DIRECTIONAL DERIVATIVES and the GRADIENT VECTOR

13.5 DIRECTIONAL DERIVATIVES and the GRADIENT VECTOR 13.5 Directional Derivatives and te Gradient Vector Contemporary Calculus 1 13.5 DIRECTIONAL DERIVATIVES and te GRADIENT VECTOR Directional Derivatives In Section 13.3 te partial derivatives f x and f

More information

Multi-Stack Boundary Labeling Problems

Multi-Stack Boundary Labeling Problems Multi-Stack Boundary Labeling Problems Micael A. Bekos 1, Micael Kaufmann 2, Katerina Potika 1 Antonios Symvonis 1 1 National Tecnical University of Atens, Scool of Applied Matematical & Pysical Sciences,

More information

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 Note: Tere will be a very sort online reading quiz (WebWork) on eac reading assignment due one our before class on its due date. Due dates can be found

More information

An Anchor Chain Scheme for IP Mobility Management

An Anchor Chain Scheme for IP Mobility Management An Ancor Cain Sceme for IP Mobility Management Yigal Bejerano and Israel Cidon Department of Electrical Engineering Tecnion - Israel Institute of Tecnology Haifa 32000, Israel E-mail: bej@tx.tecnion.ac.il.

More information

Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs

Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs Per Ostlund Department of Computer and Information Science Linkoping University SE-58183 Linkoping, Sweden per.ostlund@liu.se Kristian

More information

SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS. Hewlett-Packard Company East Mission Avenue. Bogazici University

SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS. Hewlett-Packard Company East Mission Avenue. Bogazici University SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS Sanuj V. Sarin 1, Hakan Delic 2 and Jung H. Kim 3 1 Hewlett-Packard Company 24001 East Mission Avenue Spokane, Wasington 99109, USA 2 Signal

More information

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry Our Calibrated Model as No Predictive Value: An Example from te Petroleum Industry J.N. Carter a, P.J. Ballester a, Z. Tavassoli a and P.R. King a a Department of Eart Sciences and Engineering, Imperial

More information

MULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS

MULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS ULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS Nimmagadda Calamaia æ Dept. of CSE JNTU College of Engineering Kakinada, India 533 003. calm@cse.iitkgp.ernet.in Badrinat Ramamurty y Dept.

More information

Packet Switching Networks. Jonathan S. Turner. Computer and Communications Research Center. the result of user connections that pass through the

Packet Switching Networks. Jonathan S. Turner. Computer and Communications Research Center. the result of user connections that pass through the Fluid Flow Loading Analysis of Packet Switcing Networks Jonatan S. Turner Computer and Communications Researc Center Wasington University, St. Louis, MO 63130 Abstract Recent researc in switcing as concentrated

More information

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation P R E P R N T CPWS XV Berlin, September 8, 008 Fast Calculation of Termodynamic Properties of Water and Steam in Process Modelling using Spline nterpolation Mattias Kunick a, Hans-Joacim Kretzscmar a,

More information

Investigating an automated method for the sensitivity analysis of functions

Investigating an automated method for the sensitivity analysis of functions Investigating an automated metod for te sensitivity analysis of functions Sibel EKER s.eker@student.tudelft.nl Jill SLINGER j..slinger@tudelft.nl Delft University of Tecnology 2628 BX, Delft, te Neterlands

More information

wrobot k wwrobot hrobot (a) Observation area Horopter h(θ) (Virtual) horopters h(θ+ θ lim) U r U l h(θ+ θ) Base line Left camera Optical axis

wrobot k wwrobot hrobot (a) Observation area Horopter h(θ) (Virtual) horopters h(θ+ θ lim) U r U l h(θ+ θ) Base line Left camera Optical axis Selective Acquisition of 3-D Information Enoug for Finding Passable Free Spaces Using an Active Stereo Vision System Atsusi Nisikawa, Atsusi Okubo, and Fumio Miyazaki Department of Systems and Human Science

More information

Asynchronous Power Flow on Graphic Processing Units

Asynchronous Power Flow on Graphic Processing Units 1 Asyncronous Power Flow on Grapic Processing Units Manuel Marin, Student Member, IEEE, David Defour, and Federico Milano, Senior Member, IEEE Abstract Asyncronous iterations can be used to implement fixed-point

More information

Section 1.2 The Slope of a Tangent

Section 1.2 The Slope of a Tangent Section 1.2 Te Slope of a Tangent You are familiar wit te concept of a tangent to a curve. Wat geometric interpretation can be given to a tangent to te grap of a function at a point? A tangent is te straigt

More information

Linear Interpolating Splines

Linear Interpolating Splines Jim Lambers MAT 772 Fall Semester 2010-11 Lecture 17 Notes Tese notes correspond to Sections 112, 11, and 114 in te text Linear Interpolating Splines We ave seen tat ig-degree polynomial interpolation

More information

An Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks

An Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks Tis paper was presented as part of te main tecnical program at IEEE INFOCOM 20 An Analytical Approac to Real-Time Misbeavior Detection in IEEE 802. Based Wireless Networks Jin Tang, Yu Ceng Electrical

More information

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness 1 Optimal In-etwork Packet Aggregation Policy for Maimum Information Fresness Alper Sinan Akyurek, Tajana Simunic Rosing Electrical and Computer Engineering, University of California, San Diego aakyurek@ucsd.edu,

More information

3.6 Directional Derivatives and the Gradient Vector

3.6 Directional Derivatives and the Gradient Vector 288 CHAPTER 3. FUNCTIONS OF SEVERAL VARIABLES 3.6 Directional Derivatives and te Gradient Vector 3.6.1 Functions of two Variables Directional Derivatives Let us first quickly review, one more time, te

More information

Fault Localization Using Tarantula

Fault Localization Using Tarantula Class 20 Fault localization (cont d) Test-data generation Exam review: Nov 3, after class to :30 Responsible for all material up troug Nov 3 (troug test-data generation) Send questions beforeand so all

More information

MAPI Computer Vision

MAPI Computer Vision MAPI Computer Vision Multiple View Geometry In tis module we intend to present several tecniques in te domain of te 3D vision Manuel Joao University of Mino Dep Industrial Electronics - Applications -

More information

Density Estimation Over Data Stream

Density Estimation Over Data Stream Density Estimation Over Data Stream Aoying Zou Dept. of Computer Science, Fudan University 22 Handan Rd. Sangai, 2433, P.R. Cina ayzou@fudan.edu.cn Ziyuan Cai Dept. of Computer Science, Fudan University

More information

Minimizing Memory Access By Improving Register Usage Through High-level Transformations

Minimizing Memory Access By Improving Register Usage Through High-level Transformations Minimizing Memory Access By Improving Register Usage Troug Hig-level Transformations San Li Scool of Computer Engineering anyang Tecnological University anyang Avenue, SIGAPORE 639798 Email: p144102711@ntu.edu.sg

More information

Asynchronous Power Flow on Graphic Processing Units

Asynchronous Power Flow on Graphic Processing Units Asyncronous Power Flow on Grapic Processing Units Manuel Marin, David Defour, Federico Milano To cite tis version: Manuel Marin, David Defour, Federico Milano. Asyncronous Power Flow on Grapic Processing

More information

A Novel QC-LDPC Code with Flexible Construction and Low Error Floor

A Novel QC-LDPC Code with Flexible Construction and Low Error Floor A Novel QC-LDPC Code wit Flexile Construction and Low Error Floor Hanxin WANG,2, Saoping CHEN,2,CuitaoZHU,2 and Kaiyou SU Department of Electronics and Information Engineering, Sout-Central University

More information

Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks

Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks Peyman Faizian, Md Safayat Raman, Md Atiqul Molla, Xin Yuan Department of Computer Science Florida State University

More information

Computing geodesic paths on manifolds

Computing geodesic paths on manifolds Proc. Natl. Acad. Sci. USA Vol. 95, pp. 8431 8435, July 1998 Applied Matematics Computing geodesic pats on manifolds R. Kimmel* and J. A. Setian Department of Matematics and Lawrence Berkeley National

More information

The Euler and trapezoidal stencils to solve d d x y x = f x, y x

The Euler and trapezoidal stencils to solve d d x y x = f x, y x restart; Te Euler and trapezoidal stencils to solve d d x y x = y x Te purpose of tis workseet is to derive te tree simplest numerical stencils to solve te first order d equation y x d x = y x, and study

More information

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes Coarticulation: An Approac for Generating Concurrent Plans in Markov Decision Processes Kasayar Roanimanes kas@cs.umass.edu Sridar Maadevan maadeva@cs.umass.edu Department of Computer Science, University

More information

On the Use of Radio Resource Tests in Wireless ad hoc Networks

On the Use of Radio Resource Tests in Wireless ad hoc Networks Tecnical Report RT/29/2009 On te Use of Radio Resource Tests in Wireless ad oc Networks Diogo Mónica diogo.monica@gsd.inesc-id.pt João Leitão jleitao@gsd.inesc-id.pt Luis Rodrigues ler@ist.utl.pt Carlos

More information

Cubic smoothing spline

Cubic smoothing spline Cubic smooting spline Menu: QCExpert Regression Cubic spline e module Cubic Spline is used to fit any functional regression curve troug data wit one independent variable x and one dependent random variable

More information

Protecting Storage Location Privacy in Sensor Networks

Protecting Storage Location Privacy in Sensor Networks Protecting Storage Location Privacy in Sensor Networks Jianming Zou, Wenseng Zang, and Daji Qiao Iowa State University Ames, IA 511 Email: {jmzou,wzang,daji}@iastate.edu ASTAT Numerous scemes ave been

More information

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks Downloaded from vbn.aau.dk on: April 7, 09 Aalborg Universitet etwork Coding to Enance Standard Routing Protocols in Wireless Mes etworks Palevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank;

More information

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method International Journal of Statistics and Applications 0, (): -0 DOI: 0.9/j.statistics.000.0 Comparison of te Efficiency of te Various Algoritms in Stratified Sampling wen te Initial Solutions are Determined

More information

Author's personal copy

Author's personal copy Autor's personal copy Information Processing Letters 09 (009) 868 875 Contents lists available at ScienceDirect Information Processing Letters www.elsevier.com/locate/ipl Elastic tresold-based admission

More information

ANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS

ANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS NTNN SPHRICL COORDINT SSTMS ND THIR PPLICTION IN COMBINING RSULTS FROM DIFFRNT NTNN ORINTTIONS llen C. Newell, Greg Hindman Nearfield Systems Incorporated 133. 223 rd St. Bldg. 524 Carson, C 9745 US BSTRCT

More information

Communicator for Mac Quick Start Guide

Communicator for Mac Quick Start Guide Communicator for Mac Quick Start Guide 503-968-8908 sterling.net training@sterling.net Pone Support 503.968.8908, option 2 pone-support@sterling.net For te most effective support, please provide your main

More information

A UPnP-based Decentralized Service Discovery Improved Algorithm

A UPnP-based Decentralized Service Discovery Improved Algorithm Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol.1, No.1, Marc 2013, pp. 21~26 ISSN: 2089-3272 21 A UPnP-based Decentralized Service Discovery Improved Algoritm Yu Si-cai*, Wu Yan-zi,

More information

Recoverable Distributed Shared Memory Using the Competitive Update Protocol

Recoverable Distributed Shared Memory Using the Competitive Update Protocol Recoverable Distributed Shared Memory Using the Competitive Update Protocol Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX, 77843-32 E-mail: fjhkim,vaidyag@cs.tamu.edu

More information

Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks

Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Okan Yilmaz and Ing-Ray Cen Computer Science Department Virginia Tec {oyilmaz, ircen}@vt.edu

More information

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring Has-Based Indexes Capter 11 Comp 521 Files and Databases Spring 2010 1 Introduction As for any index, 3 alternatives for data entries k*: Data record wit key value k

More information

CHAPTER 7: TRANSCENDENTAL FUNCTIONS

CHAPTER 7: TRANSCENDENTAL FUNCTIONS 7.0 Introduction and One to one Functions Contemporary Calculus 1 CHAPTER 7: TRANSCENDENTAL FUNCTIONS Introduction In te previous capters we saw ow to calculate and use te derivatives and integrals of

More information

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result RT. Complex Fractions Wen working wit algebraic expressions, sometimes we come across needing to simplify expressions like tese: xx 9 xx +, xx + xx + xx, yy xx + xx + +, aa Simplifying Complex Fractions

More information

You should be able to visually approximate the slope of a graph. The slope m of the graph of f at the point x, f x is given by

You should be able to visually approximate the slope of a graph. The slope m of the graph of f at the point x, f x is given by Section. Te Tangent Line Problem 89 87. r 5 sin, e, 88. r sin sin Parabola 9 9 Hperbola e 9 9 9 89. 7,,,, 5 7 8 5 ortogonal 9. 5, 5,, 5, 5. Not multiples of eac oter; neiter parallel nor ortogonal 9.,,,

More information

Test Generation for Acyclic Sequential Circuits with Hold Registers

Test Generation for Acyclic Sequential Circuits with Hold Registers Test Generation for Acyclic Sequential Circuits wit Hold Registers Tomoo Inoue, Debes Kumar Das, Ciio Sano, Takairo Miara, and Hideo Fujiwara Faculty of Information Sciences Computer Science and Engineering

More information

Extended Synchronization Signals for Eliminating PCI Confusion in Heterogeneous LTE

Extended Synchronization Signals for Eliminating PCI Confusion in Heterogeneous LTE 1 Extended Syncronization Signals for Eliminating PCI Confusion in Heterogeneous LTE Amed H. Zaran Department of Electronics and Electrical Communications Cairo University Egypt. azaran@eecu.cu.edu.eg

More information

Intra- and Inter-Session Network Coding in Wireless Networks

Intra- and Inter-Session Network Coding in Wireless Networks Intra- and Inter-Session Network Coding in Wireless Networks Hulya Seferoglu, Member, IEEE, Atina Markopoulou, Member, IEEE, K K Ramakrisnan, Fellow, IEEE arxiv:857v [csni] 3 Feb Abstract In tis paper,

More information

Software Fault Prediction using Machine Learning Algorithm Pooja Garg 1 Mr. Bhushan Dua 2

Software Fault Prediction using Machine Learning Algorithm Pooja Garg 1 Mr. Bhushan Dua 2 IJSRD - International Journal for Scientific Researc & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Software Fault Prediction using Macine Learning Algoritm Pooja Garg 1 Mr. Busan Dua 2

More information

Design of PSO-based Fuzzy Classification Systems

Design of PSO-based Fuzzy Classification Systems Tamkang Journal of Science and Engineering, Vol. 9, No 1, pp. 6370 (006) 63 Design of PSO-based Fuzzy Classification Systems Cia-Cong Cen Department of Electronics Engineering, Wufeng Institute of Tecnology,

More information

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall Has-Based Indexes Capter 11 Comp 521 Files and Databases Fall 2012 1 Introduction Hasing maps a searc key directly to te pid of te containing page/page-overflow cain Doesn t require intermediate page fetces

More information

PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION

PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION Martin Kraus Computer Grapics and Visualization Group, Tecnisce Universität Müncen, Germany krausma@in.tum.de Magnus Strengert Visualization and Interactive

More information

Vector Processing Contours

Vector Processing Contours Vector Processing Contours Andrey Kirsanov Department of Automation and Control Processes MAMI Moscow State Tecnical University Moscow, Russia AndKirsanov@yandex.ru A.Vavilin and K-H. Jo Department of

More information

An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng

An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng An ffective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Ciming Huang and ei-heng Ceng 5 De c e mbe r0 International Journal of Advanced Information Tecnologies (IJAIT),

More information

Announcements SORTING. Prelim 1. Announcements. A3 Comments 9/26/17. This semester s event is on Saturday, November 4 Apply to be a teacher!

Announcements SORTING. Prelim 1. Announcements. A3 Comments 9/26/17. This semester s event is on Saturday, November 4 Apply to be a teacher! Announcements 2 "Organizing is wat you do efore you do someting, so tat wen you do it, it is not all mixed up." ~ A. A. Milne SORTING Lecture 11 CS2110 Fall 2017 is a program wit a teac anyting, learn

More information

Haar Transform CS 430 Denbigh Starkey

Haar Transform CS 430 Denbigh Starkey Haar Transform CS Denbig Starkey. Background. Computing te transform. Restoring te original image from te transform 7. Producing te transform matrix 8 5. Using Haar for lossless compression 6. Using Haar

More information

Proceedings of the 8th WSEAS International Conference on Neural Networks, Vancouver, British Columbia, Canada, June 19-21,

Proceedings of the 8th WSEAS International Conference on Neural Networks, Vancouver, British Columbia, Canada, June 19-21, Proceedings of te 8t WSEAS International Conference on Neural Networks, Vancouver, Britis Columbia, Canada, June 9-2, 2007 3 Neural Network Structures wit Constant Weigts to Implement Dis-Jointly Removed

More information

Real-Time Wireless Routing for Industrial Internet of Things

Real-Time Wireless Routing for Industrial Internet of Things Real-Time Wireless Routing for Industrial Internet of Tings Cengjie Wu, Dolvara Gunatilaka, Mo Sa, Cenyang Lu Cyber-Pysical Systems Laboratory, Wasington University in St. Louis Department of Computer

More information

An experimental framework to investigate context-aware schemes for content delivery

An experimental framework to investigate context-aware schemes for content delivery An experimental framework to investigate context-aware scemes for content delivery Pietro Lungaro +, Cristobal Viedma +, Zary Segall + and Pavan Kumar + Mobile Service Lab, Royal Institute of Tecnology

More information

12.2 Techniques for Evaluating Limits

12.2 Techniques for Evaluating Limits 335_qd /4/5 :5 PM Page 863 Section Tecniques for Evaluating Limits 863 Tecniques for Evaluating Limits Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing

More information

Piecewise Polynomial Interpolation, cont d

Piecewise Polynomial Interpolation, cont d Jim Lambers MAT 460/560 Fall Semester 2009-0 Lecture 2 Notes Tese notes correspond to Section 4 in te text Piecewise Polynomial Interpolation, cont d Constructing Cubic Splines, cont d Having determined

More information

Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks

Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks Hulya Seferoglu, Atina Markopoulou EECS Dept, University of California, Irvine {seferog, atina}@uci.edu Abstract We

More information

Parallel Program Performance Debugging with the Pandore II Environment

Parallel Program Performance Debugging with the Pandore II Environment Parallel Program Performance Deugging wit te Pandore II Environment Cyrille Bareau, Yves Maéo, Jean-Louis Pazat To cite tis version: Cyrille Bareau, Yves Maéo, Jean-Louis Pazat. Parallel Program Performance

More information

Numerical Derivatives

Numerical Derivatives Lab 15 Numerical Derivatives Lab Objective: Understand and implement finite difference approximations of te derivative in single and multiple dimensions. Evaluate te accuracy of tese approximations. Ten

More information

12.2 TECHNIQUES FOR EVALUATING LIMITS

12.2 TECHNIQUES FOR EVALUATING LIMITS Section Tecniques for Evaluating Limits 86 TECHNIQUES FOR EVALUATING LIMITS Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing tecnique to evaluate its of

More information

SORTING 9/26/18. Prelim 1. Prelim 1. Why Sorting? InsertionSort. Some Sorting Algorithms. Tonight!!!! Two Sessions:

SORTING 9/26/18. Prelim 1. Prelim 1. Why Sorting? InsertionSort. Some Sorting Algorithms. Tonight!!!! Two Sessions: Prelim 1 2 "Organizing is wat you do efore you do someting, so tat wen you do it, it is not all mixed up." ~ A. A. Milne SORTING Tonigt!!!! Two Sessions: You sould now y now wat room to tae te final. Jenna

More information

Energy efficient temporal load aware resource allocation in cloud computing datacenters

Energy efficient temporal load aware resource allocation in cloud computing datacenters Vakilinia Journal of Cloud Computing: Advances, Systems and Applications (2018) 7:2 DOI 10.1186/s13677-017-0103-2 Journal of Cloud Computing: Advances, Systems and Applications RESEARCH Energy efficient

More information

Search-aware Conditions for Probably Approximately Correct Heuristic Search

Search-aware Conditions for Probably Approximately Correct Heuristic Search Searc-aware Conditions for Probably Approximately Correct Heuristic Searc Roni Stern Ariel Felner Information Systems Engineering Ben Gurion University Beer-Seva, Israel 85104 roni.stern@gmail.com, felner@bgu.ac.il

More information

Abstract Application and System Model /DATE EDAA

Abstract Application and System Model /DATE EDAA Analysis and Optimization of Fault-Tolerant Embedded Systems wit Hardened Processors Viaceslav Izosimov, Ilia Polian, Paul Pop, Petru Eles, Zebo Peng {viaiz petel zebpe}@ida.liu.se Dept. of Computer and

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Researc in Computer Science and Software Engineering Researc Paper Available online at: www.ijarcsse.com Performance

More information

Analytical CHEMISTRY

Analytical CHEMISTRY ISSN : 974-749 Grap kernels and applications in protein classification Jiang Qiangrong*, Xiong Zikang, Zai Can Department of Computer Science, Beijing University of Tecnology, Beijing, (CHINA) E-mail:

More information

BRICK: A Novel Exact Active Statistics Counter Architecture

BRICK: A Novel Exact Active Statistics Counter Architecture BRICK: A ovel Exact Active Statistics Counter Arcitecture an Hua Bill Lin Jun (Jim) Xu Haiquan (Cuck) Zao College of Computing, Georgia Tec Dept of ECE, UCSD ABSTRACT In tis paper, we present an exact

More information

Generalizing Timing Predictions to Set-Associative Caches. Frank Mueller. Humboldt-Universitat zu Berlin. Institut fur Informatik

Generalizing Timing Predictions to Set-Associative Caches. Frank Mueller. Humboldt-Universitat zu Berlin. Institut fur Informatik Generalizing Timing Predictions to Set-Associative Caces Frank Mueller Humboldt-Universitat zu Berlin Institut fur Informatik 10099 Berlin (Germany) e-mail: mueller@informatik.u-berlin.de pone: (+49) (30)

More information

HW 2 Bench Table. Hash Indexes: Chap. 11. Table Bench is in tablespace setq. Loading table bench. Then a bulk load

HW 2 Bench Table. Hash Indexes: Chap. 11. Table Bench is in tablespace setq. Loading table bench. Then a bulk load Has Indexes: Cap. CS64 Lecture 6 HW Benc Table Table of M rows, Columns of different cardinalities CREATE TABLE BENCH ( KSEQ integer primary key, K5K integer not null, K5K integer not null, KK integer

More information

MAC-CPTM Situations Project

MAC-CPTM Situations Project raft o not use witout permission -P ituations Project ituation 20: rea of Plane Figures Prompt teacer in a geometry class introduces formulas for te areas of parallelograms, trapezoids, and romi. e removes

More information

Computer Physics Communications. Multi-GPU acceleration of direct pore-scale modeling of fluid flow in natural porous media

Computer Physics Communications. Multi-GPU acceleration of direct pore-scale modeling of fluid flow in natural porous media Computer Pysics Communications 183 (2012) 1890 1898 Contents lists available at SciVerse ScienceDirect Computer Pysics Communications ournal omepage: www.elsevier.com/locate/cpc Multi-GPU acceleration

More information

A Statistical Approach for Target Counting in Sensor-Based Surveillance Systems

A Statistical Approach for Target Counting in Sensor-Based Surveillance Systems Proceedings IEEE INFOCOM A Statistical Approac for Target Counting in Sensor-Based Surveillance Systems Dengyuan Wu, Decang Cen,aiXing, Xiuzen Ceng Department of Computer Science, Te George Wasington University,

More information

Brief Contributions. A Hybrid Flash File System Based on NOR and NAND Flash Memories for Embedded Devices 1 INTRODUCTION

Brief Contributions. A Hybrid Flash File System Based on NOR and NAND Flash Memories for Embedded Devices 1 INTRODUCTION 1002 IEEE TRANSACTIONS ON COMPUTERS, VOL. 57, NO. 7, JULY 2008 Brief Contributions A Hybrid Flas File System Based on NOR and NAND Flas Memories for Embedded Devices Cul Lee, Student Member, IEEE, Sung

More information

Sensor Data Collection with Expected Reliability Guarantees

Sensor Data Collection with Expected Reliability Guarantees Sensor Data Collection wit Expected Reliability Guarantees Qi Han, Iosif Lazaridis, Sarad Merotra, Nalini Venkatasubramanian Department of Computer Science, University of California, Irvine, CA 9697 qan,iosif,sarad,nalini

More information

Two-Level Iterative Queuing Modeling of Software Contention

Two-Level Iterative Queuing Modeling of Software Contention Two-Level Iterative Queuing Modeling of Software Contention Daniel A. Menascé Dept. of Computer Science George Mason University www.cs.gmu.edu/faculty/menasce.tml 2002 D. Menascé. All Rigts Reserved. 1

More information

Alternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method

Alternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method Te Open Plasma Pysics Journal, 2010, 3, 29-35 29 Open Access Alternating Direction Implicit Metods for FDTD Using te Dey-Mittra Embedded Boundary Metod T.M. Austin *, J.R. Cary, D.N. Smite C. Nieter Tec-X

More information

Tuning MAX MIN Ant System with off-line and on-line methods

Tuning MAX MIN Ant System with off-line and on-line methods Université Libre de Bruxelles Institut de Recerces Interdisciplinaires et de Développements en Intelligence Artificielle Tuning MAX MIN Ant System wit off-line and on-line metods Paola Pellegrini, Tomas

More information

You Try: A. Dilate the following figure using a scale factor of 2 with center of dilation at the origin.

You Try: A. Dilate the following figure using a scale factor of 2 with center of dilation at the origin. 1 G.SRT.1-Some Tings To Know Dilations affect te size of te pre-image. Te pre-image will enlarge or reduce by te ratio given by te scale factor. A dilation wit a scale factor of 1> x >1enlarges it. A dilation

More information

THANK YOU FOR YOUR PURCHASE!

THANK YOU FOR YOUR PURCHASE! THANK YOU FOR YOUR PURCHASE! Te resources included in tis purcase were designed and created by me. I ope tat you find tis resource elpful in your classroom. Please feel free to contact me wit any questions

More information

Notes: Dimensional Analysis / Conversions

Notes: Dimensional Analysis / Conversions Wat is a unit system? A unit system is a metod of taking a measurement. Simple as tat. We ave units for distance, time, temperature, pressure, energy, mass, and many more. Wy is it important to ave a standard?

More information

11. Transceiver Link Debugging Using the System Console

11. Transceiver Link Debugging Using the System Console November 2011 QII53029-11.1.0 11. Transceiver Link Debugging Using te System Console QII53029-11.1.0 Tis capter describes ow to use te Transceiver Toolkit in te Quartus II sotware. Te Transceiver Toolkit

More information

An Evaluation of Alternative Continuous Media Replication Techniques in Wireless Peer-to-Peer Networks

An Evaluation of Alternative Continuous Media Replication Techniques in Wireless Peer-to-Peer Networks An Evaluation of Alternative Continuous Media eplication Tecniques in Wireless Peer-to-Peer Networks Saram Gandearizade and Tooraj Helmi Department of Computer Science University of Soutern California

More information

UUV DEPTH MEASUREMENT USING CAMERA IMAGES

UUV DEPTH MEASUREMENT USING CAMERA IMAGES ABCM Symposium Series in Mecatronics - Vol. 3 - pp.292-299 Copyrigt c 2008 by ABCM UUV DEPTH MEASUREMENT USING CAMERA IMAGES Rogerio Yugo Takimoto Graduate Scool of Engineering Yokoama National University

More information

UNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING

UNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING UNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING Raffaele Gaetano, Giuseppe Scarpa, Giovanni Poggi, and Josiane Zerubia Dip. Ing. Elettronica e Telecomunicazioni,

More information

All truths are easy to understand once they are discovered; the point is to discover them. Galileo

All truths are easy to understand once they are discovered; the point is to discover them. Galileo Section 7. olume All truts are easy to understand once tey are discovered; te point is to discover tem. Galileo Te main topic of tis section is volume. You will specifically look at ow to find te volume

More information