A Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems

Size: px
Start display at page:

Download "A Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems"

Transcription

1 A Low-cost Meory Architecture with XIP for Mobile Ebedded Systes Chanik Park, Jaeyu Seo, Sunghwan Bae, Hyojun Ki, Shinhan Ki and Busoo Ki Software Center, SAMSUNG Electronics, Co., Ltd. Seoul , KOREA {ci.park, pelican, sunghwan.bae, zartoven, shinhank, ABSTRACT flash eory has becoe an indispensable coponent in obile ebedded systes because of its versatile features such as non-volatility, solid-state reliability, low cost and high density. Even though flash eory is gaining popularity as data storage, it can be also exploited as code eory for XIP (execute-in-place). In this paper, we present a new eory architecture which incorporates flash eory into an existing eory hierarchy for code execution. The usefulness of the proposed approach is deonstrated with real ebedded workloads on a real prototyping board. Categories and Subject Descriptors B.3.2 [Meory Structures]: Design Styles Cache eories; D.4.2 [Operating Systes]: Storage Manageent Secondary storage; B.6.1 [Logic Design]: Design Styles Meory control and access. General Ters Algoriths, Measureent, Perforance, Design Keywords Meory architecture, XIP, Priority-based caching 1. INTRODUCTION A eory architecture design is a ain concern to ebedded syste engineers since it doinates the cost, power and perforance of obile ebedded systes. The typical eory architecture of obile ebedded systes consists of ROM for initial bootstrapping and code execution, RAM for working eory, and flash eory for peranent data storage. In particular, eerging eory technology, the flash eory, is becoing an indispensable coponent in obile ebedded systes due to its versatile features: non-volatility, solid-state reliability, low power consuption, etc. Perission to ake digital or hard copies of all or part of this work for personal or classroo use is granted without fee provided that copies are not ade or distributed for profit or coercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific perission and/or a fee. CODES+ISSS 3, October 1-3, 23, Newport Beach, California, USA Copyright 23 ACM /3/1 $5.. The ost popular flash eory types are NOR and. NOR flash is particularly well suited for code storage and execute-inplace (XIP) 1 applications, which require high-speed rando access. While flash provides high density and low-cost data storage, it is not applicable to XIP applications due to the sequential access architecture and long access latency Table 1 shows different characteristics of various eory devices. Mobile SDRAM has advantages in perforance but requires high power consuption over other eories. There is a tradeoff between low power SRAM and fast SRAM in ters of power consuption, perforance and cost. In non-volatile eories, NOR flash provides fast rando access speed and low power consuption, but the cost of NOR flash is high copared to flash. Even though flash shows long rando read latency, it has advantages in power consuption, storage capacity, and erase/write perforance in contrast to NOR flash. Table 1. Characteristics of various eory devices. The values in the table were calculated based on SAMSUNG 23 eory data sheets [1-2]. Current (A) Meory $/Gb idle active Mobile SDRAM Low power SRAM Fast SRAM NOR Rando Access (16bit) read write erase 9ns 55ns 1ns 2ns 1.1us 9ns N.A 55ns N.A 1ns N.A 21.5us 1.2 sec 2.5us 2 s Even though flash eory is widely used for data storage in obile ebedded systes, flash eory researches for code storage are hardly found in industry or acadeia. In this paper, we present a new eory architecture for flash eory to provide XIP functionality. With XIP functionality in flash, the cost of the eory syste can be reduced since the flash can be used not only as data storage but also as code storage for execution. As a result, we can obtain cost-efficient eory systes with reasonable perforance and power consuption. The basic idea of our approach is to exploit the locality of code access pattern and ipleent a cache controller for repeatedly accessed codes. The prefetching cache is used to hide eory latency resulting fro eory access. In this paper we concentrate on code execution even though data eory is also an iportant aspect of eory architecture. There are two ajor 1 XIP is the execution of an application directly fro the flash eory instead of having to download the code into the systes RAM before executing it. 138

2 contributions in this paper. First, we deonstrate that the XIP is feasible in real-life systes through a real hardware and coercial OS environent. Second, we apply highly optiized caching techniques geared toward the specific features of Flash. The rest of this paper is organized as follows. In the next section, we describe the trend of eory architecture in obile ebedded systes. Section 3 reviews related work in acadeia and industry. In Sections 4 and 5, we present our new eory architecture based on XIP. In Section 6, we deonstrate the proposed architecture with real workloads on a hardware prototyping board and evaluate cost, perforance and power consuption over existing eory architectures. Finally, our conclusions and future work are drawn in Section Motivational Systes: Mobile Systes Voice-centric 2G MCU Data-centric 2.5G MCU 3G & SartPhone MCU NOR SRAM OS NOR SRAM App 1 (data) (code) App 2 Data (a) (b) (c) OS App 1 App 2 DRAM Figure 1. The eory architectures for obile systes Figure 1 shows the trend in eory architecture of obile systes. The first approach is to use NOR for code storage and SRAM for working eory as shown in Figure 1(a). It is appropriate for low-end phones, which require ediu perforance and cost. However, as obile systes evolve into data centric and ultiedia-oriented applications, storage with high perforance and huge capacity has becoe necessary. The second architecture (Figure 1(b)) sees to eet the requireents in ters of storage capacity through flash eory, however its perforance is not enough to accoodate 3G applications which consist of real-tie ultiedia applications. In addition, the increased nuber of coponents increases syste cost. The third architecture (Figure 1(c)) eliinates NOR flash eory and uses only flash eory by using a shadowing 2 technique. Copying all code into RAM offers the best perforance possible, but contributes to the slow boot process. A large aount of DRAM is necessary to hold both the OS and the applications. The higher power consuption fro power hungry DRAM eory is another proble for battery-operated systes. Thus, it is iportant to investigate an efficient eory syste in ters of cost, perforance and power consuption. 3. RELATED WORK In the past, researchers have exploited NOR flash eory as caches for agnetic disks due to its low power consuption and high-speed characteristics. envy focused on developing a persistent storage architecture without agnetic disks [7]. Fred et al showed that NOR flash eory can reduce energy consuption by an order of agnitude, copared to agnetic disk, while providing good read perforance and acceptable write perforance [9]. B. Marsh et al exained the ipact of using NOR flash eory as a second-level file syste buffer cache to reduce power consuption and file access latency on a obile coputer [8]. Li-Pin et al investigated the perforance issue of flash eory storage subsystes with a striping architecture, which uses I/O parallelis [1]. In industry [5], XIP is ipleented using sall size of buffer and I/O interface conversion, but the XIP area is liited to boot code. The OS and application codes should be copied to syste eory at booting tie. In suary, even though several researches have been ade to obtain the axiu perforance and low power consuption fro data storage, few efforts to support XIP in flash are found in acadeia or industry. 4. XIP ARCHITECTURE In this section, we describe XIP architecture. First, we look into the structure of flash eory and illustrate the basic ipleentation of XIP based on caching echanis. 4.1 BACKGROUND A flash eory consists of a fixed nuber of blocks, where each block has 32 pages and each page consists of 512 bytes ain data and 16 bytes spare data as shown in Figure 2. Read/write operation is perfored on page basis. In order to read a page, coand and address are inputted to flash eory through I/O pins. After a fixed delay tie, selected page is loaded into data and spare registers. Spare data can be used to store auxiliary inforation such as bad block identification and error correction code (ECC) for associated ain data. flash eories are subject to a condition called bad block, in which a block cannot be copletely erased or cannot be written due to partial or 2-bit errors. Bad blocks ay exist in flash eory when shipped or ay occur during operation. The syste design ust be able to ask out the invalid blocks via address apping. For exaple, as shown in Figure 3, if block 2 and 5 are initially bad, the bad block nubers and the replaceent block nubers are recorded in a bad block ap table. The bad block ap table is anaged by hardware or software. 1 Block =32 pages I/O bus 512 bytes 16 bytes Main data Data register Spare data Spare register Figure 2. Structure of flash eory 2 During syste booting tie, entire code iage is copied fro peranent storage into systes RAM for execution. 139

3 In order to ipleent the XIP, we should consider the following points. Average eory access tie Worst case handling Bad block anageent The perforance of eory syste is easured by average access tie [3]. In order to ipleent XIP functionality, the average access tie of flash eory should be coparable to that of other eories such as NOR, SRAM and SDRAM. Though average eory access tie is a good etric for perforance evaluation, worst-case handling, or cache iss handling is another proble in practical view since ost obile systes such as cellular phones include tie-critical interrupt handling for call processing. For instance, if the tie-critical interrupt occurs during cache iss handling, the syste ay not satisfy the given deadline and to ake it worse, it ay lose data or connection. Another consideration in XIP is to anage bad blocks because bad blocks cause discontinuous eory space, which is intolerable for code execution. 4.2 BASIC IMPLEMENTATION DATA [:7] ADDR [:12] CE#,OE#,WE# BUSY# Syste interface Cache (SRAM) Boot Loader Prefetch Control logic Flash interface Figure 3. XIP controller The proposed architecture consists of a sall aount of SRAM for cache, interface conversion logic, the control logic and flash eory as shown in Figure 3. Interface conversion is necessary to connect the I/O interface of flash eory to eory bus. For cache echanis, direct ap cache with victi cache is adopted based on Jouppi s work in [4] with optiization for flash. In [4], the victi cache is accessed on a ain cache iss; if the address hits the victi cache, the data returned to the CPU and at the sae tie it is prooted to the ain cache; the replaced block in the ain cache is oved to the victi cache, therefore perforing a swap. If the victi cache iss also occurs, flash eory access is perfored; the incoing data fills the ain cache, and the replaced block will be oved to the victi cache. In next section, we odify the above swap algorith using syste eory and page address translation table (PAT). The prefetching cache is used to hide eory latency resulting fro eory access. Several hardware prefetching techniques can be found in literature [13]. In our case, prefetching inforation is analyzed through profiling process and the prefetching inforation is stored in spare data at code iage building tie. 5. INTELLIGENT CACHING: PRIORITY- BASED CACHING Though the basic ipleentation is suitable for application code which shows its spatial and teporal localities, it ay be less effective in systes code which has a coplex functionality, a large size, and interrupt-driven control transfers aong its procedures [14]. Torrellas et al. presented that the operating syste has the characteristics which large sections of its code are rarely accessed and suffers considerable interference within popular execution paths [14]. For exaple, periodic tier interrupt, rarely-executed special-case code and plenty of loopless code disrupt the localities. On the other hand, real-tie applications should be retained as long as possible to satisfy the tiing constraints 3. In this paper, we distinguish the different cache behavior between syste and application codes, and adapt it to the page-based architecture. We apply profile-guided static analysis of code access pattern. Main cache Victi A Page address translation table Control C A B C H L H B SRAM/SDRAM Data bus Address bus Figure 4. Priority-based cache architecture We can divide code pages into three categories depending on their access cost: high priority, id priority and low priority pages. Even though the priority can be deterined by various objectives, we set the priority to pages based on the nuber of references to pages and their criticality. For exaple, if a specific page is referenced ore frequently or has tie critical codes, it is classified as a high-priority page and should be cached or retained in cache to reduce the later access cost in case that the page is in flash eory. OS-related code, syste libraries and realtie applications have high-priority pages. On the other hand, id-priority page is defined to be noral application code which is handled by noral caching policy. Finally, low-priority page corresponds to sequential code such as initialization code, which is rarely executed. PAT is introduced to reap pages in bad blocks to pages in good blocks and to reap requested pages to swapped pages in syste eory. We illustrate the caching echanis in detail in Figure 4. First, when page A with highpriority is requested, it is cached fro flash to ain cache. Next, when page B is requested fro the CPU, it should be oved to ain cache or syste eory. Here assuing that page B is in conflict with page A, page B is oved to syste eory (SRAM/SDRAM) since page B is low priority page ( L in spare area of flash eory eans low-priority). At the sae tie, PAT is updated so that later access to page B is referred to syste eory. Again, when page C is requested and in conflict with page A, page C replaces page A and page A is discarded fro ain cache since C s priority is high. The evicted page A is 3 In this paper, real-tie applications indicate ultiedia applications with soft real-tie constraints. 14

4 oved to victi cache. In suary, on flash s page deand, the controller discards or swaps existing cache page according to the priority inforation stored in spare area data. The detail algorith is explained in Figure 5. Another usage of spare area data is to store prefetching inforation based on profiling inforation gathered during code execution. This static prefetching technique iproves eory latency hiding without iss penalty fro iss-prediction at run-tie. Cache Cache siulator cache paraeters Pattern analysis Meory Trace eory addresses Priority Caching (address) { page = convert(address); if (isinpat(page)) ain eory hit; else if(isinmaincache(page)) Cache hit; else if(isinvicticache(page)) Victi hit; else { // iss, fetch a page fro flash eory } } page_priority = [page].priority; if (cache[page%cache_size].priority ==HIGH) [page] ain eory; else if (cache[page%cache_size].priority == MID) { cache[page%cache_size] victi; [page] cache[page%cache_size]; } else [page] cache[page%cache_size]; Figure 5. Priority-based cache algorith 6. EXPERIMENTAL SETUP This section presents our experiental environent. Our environent consists of a prototyping board, our in-house cache siulator with pattern analysis and a real workload, or PocketPC[6]. The prototyping board has ARM9-based icrocontroller, SRAM, SDRAM, NOR flash and eories as shown in Figure 6. It is used not only to ipleent a real cache configuration on FPGA but also to gather eory address trace fro running applications for cache siulator. The specification of ain processor and flash eory is shown in Table 2. The cache siulator explores various paraeters such as iss rate, replaceent policy, associativity and cache size based on eory traces fro the prototyping board. The real ebedded workload, PocketPC supports XIP-enabled iage based on the existing ROMFS file systes in which each application can be directly executed without being loaded into RAM. Table 2. The specification of the prototyping board Paraeter Configuration CPU clock L1 Icache 2 MHz 64 way, 32byte line, 8KB Bus width 16 bit = 1 word read initial latency 1 us/512byte serial read tie 5 ns/word SRAM read tie 1 ns/word SDRAM read tie 12 ns/4word NOR read tie 21 ns/4word SRAM FPGA SDRAM ARM9-based Processor Figure 6. Prototyping board for XIP PocketPC 6.1 PERFORMANCE MODELING In general, the eory syste perforance is evaluated by the average access tie: Average eory access tie = hit tie + iss rate * iss penalty. (1) Hit tie is the tie to fill the L1 cache (32byte line) and the iss penalty is the tie to fill the L2 cache fro flash eory. The total energy consued by the syste is the su of energies consued by syste coponents such as processor, bus, eory and the DC-DC converter. In this paper, we concentrate on the energy consuption of the processor and eory syste: E syste = ECPU + Eeory. (2) The energy consuption of CPU is divided into two parts: E CPU = PCPU _ active TCPU _ active + PCPU _ idle TCPU _ idle. (3) T CPU_active is assued to be constant regardless of eory syste since the nuber and execution tie of instructions are fixed. Thus, we are concerned about T CPU_idle which is proportional to off-chip eory access tie. In eory case, the nuber of accesses to the eory is directly proportional to energy consuption. The unit access energy consuption can be estiated fro the active power specified in the data sheet [1-2]: E eory = Eaccess N access. (4) The cost of eory syste is coputed fro paraeters shown on Table 1: N Cost eory _ syste = density unit cost + Cost controller. (5) The Cost controller is coputed based on the synthesis result in Xilinx FPGA: totally 27, gates including 4KB and using offchip SRAM for TAG and cache eory. Finally, booting ties are easured using real-tie easureent tools. 141

5 6.2 EXPERIMENTAL RESULTS In Figure 7, we copare the iss ratio over various configuration paraeters such as associativity, replaceent policy and cache size. We collected address traces fro PocketPC while we were executing various applications such as Media Player and MP3 player since they are popular ebedded ultiedia applications which involve real-tie requireents. Note that the cache size is the ost iportant factor to affect iss ratio as shown in Figure 7. Miss Ratio( Direct ap FIFO LRU rando FIFO LRU rando FIFO LRU 2-w ay 4-w ay 8-w ay Replace ent/associativity Figure 7. Associativity with different replaceent policies and cache sizes versus iss ratio Miss Ratio ( Average Meory Access Ti (CPU cycles) rando Cache Line Size (Bytes) (a) Cache Line Size (Bytes) Energy (ns*w) Cache Line Size (B y te s ) (c) Figure 8. Cache line size versus (a) iss ratio, (b) access tie per 32-byte and (c) energy consuption To analyze the optial cache line size in XIP cache, siulation has been done with the eory trace which is gathered fro the prototyping board. The line size of 256-byte shows better nubers in average eory access tie and energy consuption over all other cache sizes as shown in Figure 8. Therefore, the line size of XIP controller is deterined to be 256-byte hereafter. Average Meory Access Ti e (cycle) Energy (ns* W ) XIP (basic) (a) XIP (priority) SDRAM shadowing ArchitecturalChoices XIP(basic) (b) XIP (priority) SDRAM shadow ing ArchitecturalChoices NOR XIP NOR XIP Figure 9. Overall perforance coparison of different eory architectures: (a) average eory access tie and (b) energy consuption. (b) 142

6 Architectural Choices NOR XIP SDRAM Shadowing XIP (basic) XIP (priority) Coponents NOR(64MB)+SDRAM(32MB) (64MB)+SDRAM(64MB) XIP(64MB)+SRAM(256KB) Controller+SDRAM(32MB) XIP(64MB)+SRAM(64KB) Controller+SDRAM(32MB) Booting Tie (sec) Cost ($) Figure 1. Overall booting tie and cost coparison of different eory architectures. Figure 9 and 1 show overall perforance coparison aong different eory architectures based on our prototyping results. NOR XIP architecture (NOR+SDRAM) shows fast boot tie and low power consuption at high cost. Even though SDRAM shadowing architecture ( + SDRAM) achieves high perforance, it suffers fro a relatively long booting tie and inefficient eory utilization. Finally, our approach XIP shows reasonable booting tie, perforance and power consuption with outstanding cost efficiency. Two ipleentations of XIP (basic and priority) are also copared. The XIP (basic) is coposed of 256KB cache and 4KB victi cache. On the other hand, the XIP (priority) has 64KB cache, 4KB victi and 2KB PAT. The XIP (priority) has advantage of cache size reduction with the assistance of syste eory and priority based caching. 6.3 Worst Case Handling Even though XIP offers an efficient eory syste, it ay suffer fro worst-case handling, naely cache iss handling. A straightforward solution is to hold the CPU until the requested eory page arrives. This can be ipleented using wait/ready signals handshaking ethod. However, the iss penalty, 35us 4 is not trivial tie especially in case that a fast processor is used. Besides CPU utilization proble, if the tiecritical interrupt request occurs to the syste, the interrupt ay be lost because the processor is waiting for eory s response. In order to solve this proble, a syste-wide approach is needed. First, OS should handle the cache iss as a page fault as in virtual eory anageent. The CPU also should supply abort function to restart the requested instruction after cache iss handling. In analytical approach view, task tiing analysis and schedulability test will be helpful in the doain of real-tie[12]. 7. CONCLUSIONS We presented the new low cost eory architecture with XIP functionality which enables flash eory to be used as code storage as well as data storage. In order to hide a long read access latency, we applied the priority-based caching echanis geared for specific features. As a result, we can accoplish cost and power efficient eory systes with reasonable perforance and booting tie. As future work, copiler s assistance will be helpful to iprove XIP in ebedded eory architectures. Code packing and positioning will be achieved in near future. 4 It is calculated as su of initial delay (1us) + page read (512 x 5ns) REFERENCES [1] Sasung Electronics Co., Flash Meory & SartMedia Data Book, 22. [2] [3] J.L. Hennessy and D.A. Patterson, Coputer Architecture: A Quantitative Approach, 2 nd edition, Morgan Kaufan Publishers, [4] N. Jouppi, Iproving Direct-Mapped Cache Perforance by the Addition of a Sall Fully-Associative Cache and Prefetch Buffers, ISCA-17:ACM/IEEE International Syposiu on Coputer Architecture, pp , May 199. [5] Mobile_DOC_G3_DS_Rev1..pdf [6] Microsoft Co., Pocket PC 22, [7] M. Wu, Willy Zwaenepoel, envy: A Non-Volatile, Main Meory Storage Syste, Proc. Sixth Int l Conf. On Architectural Support for Prograing Languages and Operating Sys. (ASPLOS VI), San Jose, CA, Oct. 1994, pp [8] B. Marsh, F. Douglis, and P. Krishnan, Flash eory file caching for obile coputers, Proc. 27 th Hawaii Conf. On Sys. Sciences, Wailea, HI, Jan. 1993, pp [9] F. Douglis et al., Storage Alternatives for Mobile Coputers, Proc. First USENIX Syp. On Operating Sys. Design and Ipleentation, Monterey, CA, pp 25-37, Nov [1] Li-Pin Chang, Tei-Wei Kuo, "An Adaptive Striping Architecture for Flash Meory Storage Systes of Ebedded Systes," The 8th IEEE Real-Tie and Ebedded Technology and Applications Syposiu (RTAS 22) Septeber, 22. San Jose, California. [11] J. R. Lorch and A. J. Sith, Software Strategies for Portable Coputer Energy Manageent, IEEE Personal Counications, June, [12] C.-G. Lee, K.-P. Lee, J. Hahn, Y.-M. Seo, S.L. Min, R. Ha, S. Hong, C.Y. Park, M. Lee, and C.S. Ki, Bounding Cache-related Preeption Delay for Real-tie Systes, IEEE Transaction on Software Engineering, vol 27, no 9, pp85-826, 21. [13] C. Young, E. Shekita, An Intelligent I-Cache Prefetch Mechanis, in Proceedings of the International Conferences on Coputer Design, pp , Oct [14] Josep Torrellas, Chun Xia, and Russell Daigle, Optiizing Instruction Cache Perforance for Operating Syste Intensive Workload, Proc. HPCA-1: 1st Intl. Syposiu on High-Perforance Coputer Architecture, p.36, January [15] Zhang Yi, Steve Haga and Rajeev Barua, Execution History Guided Instruction Prefetching, Proceedings of the Sixteenth ACM Int l Conference on Supercoputing (ICS), New York City, NY, June,

A Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems Chanik Park, Jaeyu Seo, Sunghwan Bae, Hyojun Kim, Shinhan Kim and Bumsoo Kim

A Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems Chanik Park, Jaeyu Seo, Sunghwan Bae, Hyojun Kim, Shinhan Kim and Bumsoo Kim A Low-cost Memory Architecture with NAND XP for Mobile Embedded Systems Chanik Park, Jaeyu Seo, Sunghwan Bae, Hyojun Kim, Shinhan Kim and Bumsoo Kim Software Center, SAMSUNG Electronics, Co., Ltd. Seoul

More information

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

Collaborative Web Caching Based on Proxy Affinities

Collaborative Web Caching Based on Proxy Affinities Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

Ascending order sort Descending order sort

Ascending order sort Descending order sort Scalable Binary Sorting Architecture Based on Rank Ordering With Linear Area-Tie Coplexity. Hatrnaz and Y. Leblebici Departent of Electrical and Coputer Engineering Worcester Polytechnic Institute Abstract

More information

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant

More information

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction Relocation of ateway for Enhanced Tieliness in Wireless Sensor Networks Keal Akkaya and Mohaed Younis Departent of oputer Science and Electrical Engineering University of Maryland, altiore ounty altiore,

More information

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

Closing The Performance Gap between Causal Consistency and Eventual Consistency

Closing The Performance Gap between Causal Consistency and Eventual Consistency Closing The Perforance Gap between Causal Consistency and Eventual Consistency Jiaqing Du Călin Iorgulescu Aitabha Roy Willy Zwaenepoel EPFL ABSTRACT It is well known that causal consistency is ore expensive

More information

Database Design on Mechanical Equipment Operation Management System Zheng Qiu1, Wu kaiyuan1, Wu Chengyan1, Liu Lei2

Database Design on Mechanical Equipment Operation Management System Zheng Qiu1, Wu kaiyuan1, Wu Chengyan1, Liu Lei2 2nd International Conference on Advances in Mechanical Engineering and Industrial Inforatics (AMEII 206) Database Design on Mechanical Equipent Manageent Syste Zheng Qiu, Wu kaiyuan, Wu Chengyan, Liu Lei2

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION

DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION www.arpnjournals.co DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION N. Snehalatha 1 and Paul Rodrigues 2 1 School of Coputing, SRM University, Chennai, Tail Nadu, India 2 Departent

More information

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

Grading Results Total 100

Grading Results Total 100 University of California, Berkeley College of Engineering Departent of Electrical Engineering and Coputer Sciences Fall 2003 Instructor: Dave Patterson 2003-11-19 v1.9 CS 152 Exa #2 Solutions Personal

More information

A wireless sensor network for visual detection and classification of intrusions

A wireless sensor network for visual detection and classification of intrusions A wireless sensor network for visual detection and classification of intrusions ANDRZEJ SLUZEK 1,3, PALANIAPPAN ANNAMALAI 2, MD SAIFUL ISLAM 1 1 School of Coputer Engineering, 2 IntelliSys Centre Nanyang

More information

Real-Time Detection of Invisible Spreaders

Real-Time Detection of Invisible Spreaders Real-Tie Detection of Invisible Spreaders MyungKeun Yoon Shigang Chen Departent of Coputer & Inforation Science & Engineering University of Florida, Gainesville, FL 3, USA {yoon, sgchen}@cise.ufl.edu Abstract

More information

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design A Fast Multi-Obective Genetic Algorith for Hardware-Software Partitioning In Ebedded Syste Design 1 M.Jagadeeswari, 2 M.C.Bhuvaneswari 1 Research Scholar, P.S.G College of Technology, Coibatore, India

More information

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University

More information

Using the KressArray for Reconfigurable Computing

Using the KressArray for Reconfigurable Computing Using the KressArray for econfigurable Coputing einer Hartenstein, Michael Herz, Thoas Hoffann, Ulrich Nageldinger University of Kaiserslautern, Erwin-Schroedinger-Strasse, D-67663 Kaiserslautern, Gerany

More information

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13 Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical

More information

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada

More information

A Periodic Dynamic Load Balancing Method

A Periodic Dynamic Load Balancing Method 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation

More information

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan

More information

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS AWNI ITRADAT Assistant Professor, Departent of Coputer Engineering, Faculty of Engineering, Hasheite University, P.O. Box 15459,

More information

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive and Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

ACNS: Adaptive Complementary Neighbor Selection in BitTorrent-like Applications

ACNS: Adaptive Complementary Neighbor Selection in BitTorrent-like Applications ACNS: Adaptive Copleentary Neighbor Selection in BitTorrent-like Applications Zhenbao Zhou 1, 2, Zhenyu Li 1, 2, Gaogang Xie 1 1 Institute of Coputing Technology, Chinese Acadey of Sciences, Beijing 100190,

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

Integrating fast mobility in the OLSR routing protocol

Integrating fast mobility in the OLSR routing protocol Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

1 P a g e. F x,x...,x,.,.' written as F D, is the same.

1 P a g e. F x,x...,x,.,.' written as F D, is the same. 11. The security syste at an IT office is coposed of 10 coputers of which exactly four are working. To check whether the syste is functional, the officials inspect four of the coputers picked at rando

More information

Implementing and Evaluating Various Response-Time Analyses for Mixed Messages in CAN using MPS-CAN Analyzer

Implementing and Evaluating Various Response-Time Analyses for Mixed Messages in CAN using MPS-CAN Analyzer Ipleenting and Evaluating Various Response-Tie Analyses for Mixed s in CAN using MPS-CAN Analyzer Saad Mubeen, Jukka Mäki-Turja and Mikael Sjödin Mälardalen Real-Tie Research Centre, Mälardalen University,

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

The Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network

The Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network The Flaw Attack to the RTS/CTS Handshake Mechanis in Cluster-based Battlefield Self-organizing Network Zeao Zhao College of Counication Engineering, Hangzhou Dianzi University, Hangzhou 310018, China National

More information

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage 216 IEEE 23rd International Conference on High Perforance Coputing A Low-Cost Multi-Failure Resilient Replication Schee for High Data Availability in Cloud Storage Jinwei Liu* and Haiying Shen *Departent

More information

Carving Differential Unit Test Cases from System Test Cases

Carving Differential Unit Test Cases from System Test Cases Carving Differential Unit Test Cases fro Syste Test Cases Sebastian Elbau, Hui Nee Chin, Matthew B. Dwyer, Jonathan Dokulil Departent of Coputer Science and Engineering University of Nebraska - Lincoln

More information

Data & Knowledge Engineering

Data & Knowledge Engineering Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI

More information

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions *

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 607-626 (2005) A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Mebership Functions * SHIH-HSU HUANG AND JIAN-YUAN LAI + Departent of

More information

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

A Soft Real-time Scheduling Server on the Windows NT

A Soft Real-time Scheduling Server on the Windows NT A Soft Real-tie Scheduling Server on the Windows NT Chih-han Lin, Hao-hua Chu, Klara Nahrstedt Departent of Coputer Science University of Illinois at Urbana Chapaign clin2, h-chu3, klara@cs.uiuc.edu Abstract

More information

Design and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design

Design and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design Design and Ipleentation of Business Logic Layer Object-Oriented Design versus Relational Design Ali Alharthy Faculty of Engineering and IT University of Technology, Sydney Sydney, Australia Eail: Ali.a.alharthy@student.uts.edu.au

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.5, Septeber 205 AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM Xie Yang and Cheng Wushan College of Mechanical Engineering,

More information

Computer Architecture A Quantitative Approach, Fifth Edition. Chapter 2. Memory Hierarchy Design. Copyright 2012, Elsevier Inc. All rights reserved.

Computer Architecture A Quantitative Approach, Fifth Edition. Chapter 2. Memory Hierarchy Design. Copyright 2012, Elsevier Inc. All rights reserved. Computer Architecture A Quantitative Approach, Fifth Edition Chapter 2 Memory Hierarchy Design 1 Introduction Programmers want unlimited amounts of memory with low latency Fast memory technology is more

More information

Virtual Memory. Reading. Sections 5.4, 5.5, 5.6, 5.8, 5.10 (2) Lecture notes from MKP and S. Yalamanchili

Virtual Memory. Reading. Sections 5.4, 5.5, 5.6, 5.8, 5.10 (2) Lecture notes from MKP and S. Yalamanchili Virtual Memory Lecture notes from MKP and S. Yalamanchili Sections 5.4, 5.5, 5.6, 5.8, 5.10 Reading (2) 1 The Memory Hierarchy ALU registers Cache Memory Memory Memory Managed by the compiler Memory Managed

More information

Knowledge Discovery Applied to Agriculture Economy Planning

Knowledge Discovery Applied to Agriculture Economy Planning Knowledge Discovery Applied to Agriculture Econoy Planning Bing-ru Yang and Shao-un Huang Inforation Engineering School University of Science and Technology, Beiing, China, 100083 Eail: bingru.yang@b.col.co.cn

More information

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute

More information

Vision Based Mobile Robot Navigation System

Vision Based Mobile Robot Navigation System International Journal of Control Science and Engineering 2012, 2(4): 83-87 DOI: 10.5923/j.control.20120204.05 Vision Based Mobile Robot Navigation Syste M. Saifizi *, D. Hazry, Rudzuan M.Nor School of

More information

Redundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network

Redundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network (IJACSA) International Journal of Advanced Coputer Science and Applications Vol. 8, No. 1, 217 Redundancy Level Ipact of the Mean Tie to Failure on Wireless Sensor Network Alaa E. S. Ahed 1 College of

More information

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones Advance Access publication on 24 February 2017 The British Coputer Society 2017. All rights reserved. For Perissions, please eail: journals.perissions@oup.co doi:10.1093/cojnl/bxx015 Fair Energy-Efficient

More information

A Network-based Seamless Handover Scheme for Multi-homed Devices

A Network-based Seamless Handover Scheme for Multi-homed Devices A Network-based Sealess Handover Schee for Multi-hoed Devices Md. Shohrab Hossain and Mohaed Atiquzzaan School of Coputer Science, University of Oklahoa, Noran, OK 7319 Eail: {shohrab, atiq}@ou.edu Abstract

More information

Implementation of fast motion estimation algorithms and comparison with full search method in H.264

Implementation of fast motion estimation algorithms and comparison with full search method in H.264 IJCSNS International Journal of Coputer Science and Network Security, VOL.8 No.3, March 2008 139 Ipleentation of fast otion estiation algoriths and coparison with full search ethod in H.264 A.Ahadi, M.M.Azadfar

More information

A Measurement-Based Model for Parallel Real-Time Tasks

A Measurement-Based Model for Parallel Real-Time Tasks A Measureent-Based Model for Parallel Real-Tie Tasks Kunal Agrawal 1 Washington University in St. Louis St. Louis, MO, USA kunal@wustl.edu https://orcid.org/0000-0001-5882-6647 Sanjoy Baruah 2 Washington

More information

Migration Based Page Caching Algorithm for a Hybrid Main Memory of DRAM and PRAM

Migration Based Page Caching Algorithm for a Hybrid Main Memory of DRAM and PRAM Migration Based Page Caching Algorithm for a Hybrid Main Memory of DRAM and PRAM Hyunchul Seok Daejeon, Korea hcseok@core.kaist.ac.kr Youngwoo Park Daejeon, Korea ywpark@core.kaist.ac.kr Kyu Ho Park Deajeon,

More information

Dynamical Topology Analysis of VANET Based on Complex Networks Theory

Dynamical Topology Analysis of VANET Based on Complex Networks Theory BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 14, Special Issue Sofia 014 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.478/cait-014-0053 Dynaical Topology Analysis

More information

A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER

A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER VIOLETA TOMAŠEVIĆ, SLOBODAN BOJANIĆ 2 and OCTAVIO NIETO-TALADRIZ 2 The Mihajlo Pupin Institute, Volgina 5, 000 Belgrade, SERBIA AND MONTENEGRO 2 Technical University

More information

(12) United States Patent Kumar et al.

(12) United States Patent Kumar et al. (12) United States Patent Kuar et al. US006795434B1 (10) Patent N0.: (45) Date of Patent: US 6,795,434 B1 Sep. 21, 2004 (54) REPLICATED SERVER DISCOVERY IN CLIENT-PROXY SERVERS (75) Inventors: Harlharan

More information

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm roceedings of the 7th International Conference on Innovation & Manageent 893 Research on a Kind of QoS-Sensitive Seantic Web Services Coposition Method Based on Genetic Algorith Cao Hongjiang, Nie Guihua,

More information

Data-driven Hybrid Caching in Hierarchical Edge Cache Networks

Data-driven Hybrid Caching in Hierarchical Edge Cache Networks Data-driven Hybrid Caching in Hierarchical Edge Cache Networks Abstract Hierarchical cache networks are increasingly deployed to facilitate high-throughput and low-latency content delivery to end users.

More information

Survivability Function A Measure of Disaster-Based Routing Performance

Survivability Function A Measure of Disaster-Based Routing Performance Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected

More information

A New Generic Model for Vision Based Tracking in Robotics Systems

A New Generic Model for Vision Based Tracking in Robotics Systems A New Generic Model for Vision Based Tracking in Robotics Systes Yanfei Liu, Ada Hoover, Ian Walker, Ben Judy, Mathew Joseph and Charly Heranson lectrical and Coputer ngineering Departent Cleson University

More information

A Model Free Automatic Tuning Method for a Restricted Structured Controller. by using Simultaneous Perturbation Stochastic Approximation

A Model Free Automatic Tuning Method for a Restricted Structured Controller. by using Simultaneous Perturbation Stochastic Approximation 28 Aerican Control Conference Westin Seattle Hotel, Seattle, Washington, USA June -3, 28 WeC9.5 A Model Free Autoatic Tuning Method for a Restricted Structured Controller by Using Siultaneous Perturbation

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

Flash Memory Based Storage System

Flash Memory Based Storage System Flash Memory Based Storage System References SmartSaver: Turning Flash Drive into a Disk Energy Saver for Mobile Computers, ISLPED 06 Energy-Aware Flash Memory Management in Virtual Memory System, islped

More information

IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE. Rafael García, Xevi Cufí and Lluís Pacheco

IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE. Rafael García, Xevi Cufí and Lluís Pacheco IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE Rafael García, Xevi Cufí and Lluís Pacheco Coputer Vision and Robotics Group Institute of Inforatics and Applications, University of

More information

UNIT-V MEMORY ORGANIZATION

UNIT-V MEMORY ORGANIZATION UNIT-V MEMORY ORGANIZATION 1 The main memory of a computer is semiconductor memory.the main memory unit is basically consists of two kinds of memory: RAM (RWM):Random access memory; which is volatile in

More information

Feature Selection to Relate Words and Images

Feature Selection to Relate Words and Images The Open Inforation Systes Journal, 2009, 3, 9-13 9 Feature Selection to Relate Words and Iages Wei-Chao Lin 1 and Chih-Fong Tsai*,2 Open Access 1 Departent of Coputing, Engineering and Technology, University

More information

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS Evaluation of the Tiing Properties of Two Control Networs: CAN and PROFIBUS Max Mauro Dias Santos 1, Marcelo Ricardo Steer 2 and Francisco Vasques 3 1 UnilesteMG, CEP 35170-056, Coronel Fabriciano MG Brasil.

More information

Deterministic Voting in Distributed Systems Using Error-Correcting Codes

Deterministic Voting in Distributed Systems Using Error-Correcting Codes IEEE TRASACTIOS O PARALLEL AD DISTRIBUTED SYSTEMS, VOL. 9, O. 8, AUGUST 1998 813 Deterinistic Voting in Distributed Systes Using Error-Correcting Codes Lihao Xu and Jehoshua Bruck, Senior Meber, IEEE Abstract

More information

Multipath Selection and Channel Assignment in Wireless Mesh Networks

Multipath Selection and Channel Assignment in Wireless Mesh Networks Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,

More information

Portland State University ECE 587/687. Caches and Memory-Level Parallelism

Portland State University ECE 587/687. Caches and Memory-Level Parallelism Portland State University ECE 587/687 Caches and Memory-Level Parallelism Revisiting Processor Performance Program Execution Time = (CPU clock cycles + Memory stall cycles) x clock cycle time For each

More information

FPL Implementation of a SIMD RISC RNS-Enabled DSP

FPL Implementation of a SIMD RISC RNS-Enabled DSP FPL Ipleentation of a SIMD RISC RNS-Enabled DSP J. RAMÍREZ (1), A. GARCÍA (1), P. G. FERNÁNDEZ (2), A. LLORIS (1) (1) Dpt. of Electronics and Coputer Technology (2) Dpt. of Electrical Engineering University

More information

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches Efficient Estiation of Inclusion Coefficient using HyperLogLog Sketches Azade Nazi, Bolin Ding, Vivek Narasayya, Surajit Chaudhuri Microsoft Research {aznazi, bolind, viveknar, surajitc}@icrosoft.co ABSTRACT

More information

Problem Solving of graph correspondence using Genetics Algorithm and ACO Algorithm

Problem Solving of graph correspondence using Genetics Algorithm and ACO Algorithm Proble Solving of graph correspondence using Genetics Algorith and ACO Algorith Alireza Rezaee, 1, Azizeh Ajalli 2 Assistant professor,departent of Mechatronics Engineering, Faculty of New Sciences and

More information

On the Accuracy of MANET Simulators

On the Accuracy of MANET Simulators On the ccuracy of MNT Siulators avid avin david.cavin@epfl.ch Yoav Sasson yoav.sasson@epfl.ch istributed Systes Laboratory cole Polytechnique Fédérale de Lausanne (PFL) H-115 Lausanne ndré Schiper andre.schiper@epfl.ch

More information

Identifying Converging Pairs of Nodes on a Budget

Identifying Converging Pairs of Nodes on a Budget Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering

More information

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer Departent of Coputer Science and Engineering University of South Florida Tapa, FL 33620 Abstract -- The

More information

Equation Based Congestion Control for Video Transmission over WCDMA Networks

Equation Based Congestion Control for Video Transmission over WCDMA Networks Equation Based Congestion Control for Video Transission over WCDMA Networks Antonios Alexiou, Diitrios Antonellis and Christos Bouras Research Acadeic Coputer Technology Institute, Greece and Coputer Engineering

More information

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH V. Atienza; J.M. Valiente and G. Andreu Departaento de Ingeniería de Sisteas, Coputadores y Autoática Universidad Politécnica de Valencia.

More information

arxiv: v1 [cs.dc] 3 Oct 2018

arxiv: v1 [cs.dc] 3 Oct 2018 Sparse Winograd Convolutional neural networks on sall-scale systolic arrays Feng Shi, Haochen Li, Yuhe Gao, Benjain Kuschner, Song-Chun Zhu University of California Los Angeles Los Angeles, USA {shi.feng,sczh}@cs.ucla.edu

More information

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium 1 A Distributed Multi-service Resource Allocation Algorith in Heterogeneous Wireless Access Mediu Muhaad Isail, Student Meber, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract In this paper, radio resource

More information

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networs F. Mousavi Madani Departent of coputer engineering Alzahra University Tehran, Iran, osavif@alzahra.ac.ir Received:

More information