A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks

Size: px
Start display at page:

Download "A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks"

Transcription

1 A Dual-Hamiltonian-Path-Based Multiasting Strategy for Wormhole-Routed Star Graph Interonnetion Networks Nen-Chung Wang Department of Information and Communiation Engineering Chaoyang University of Tehnology, Taihung 413, Taiwan, R.O.C. Tel: Chih-Ping Chu Λ Department of Computer Siene and Information Engineering National Cheng Kung University, Tainan 701, Taiwan, R.O.C. Tel: Ext Tzung-Shi Chen Department of Information Management Chang Jung University, Tainan 711, Taiwan, R.O.C. Tel: Ext Abstrat Multiast is an important olletive ommuniation operation on multiomputer systems, in whih the same message is delivered from a soure node to an arbitrary number of destination nodes. The star graph interonnetion network has been reognized as an attrative alternative to the popular hyperube network. In this paper, we first address a dual-hamiltonian-path-based (DHPB) routing model with two virtual hannels based on two hamiltonian paths and a network partitioning strategy for wormholerouted star graph networks. Then, we propose three effiient multiast routing shemes on basis of suh a model. All of the three proposed shemes are proved deadlok-free. The first sheme, networkseletion-based dual-path routing, selets subnetworks that are onstruted either by the first hamiltonian path or by the seond hamiltonian path for dual-path routing. The seond one, optimum dualpath routing, selets subnetworks with optimum routing path for dual-path routing. The third sheme, two-phase optimum dual-path routing, inludes two phases, soure-to-relay and relay-to-destination. Finally, experimental results are given to show our proposed three routing shemes outperform the uniast-based, the hamiltonian-path, and the single-hamiltonian-path-based (SHPB) dual-path routing shemes signifiantly. Keywords: Multiast, path-based routing, star graphs, virtual hannels, wormhole routing. Λ To whom all orrespondene should be addressed 1

2 1 Introdution Multiast is an important olletive ommuniation operation on multiomputer systems, in whih the same message is delivered from a soure node to an arbitrary number of destination nodes. There are many efforts paid to designing multiasting algorithms on a variety of interonnetion networks suh as hyperube, mesh and torus networks, and those multiasting algorithms are based on the swithing tehniques ontaining store-and-forward, virtual ut-through, or wormhole routing methods [5, 10]. In general, the multiasting problem an be modeled by three routing shemes: tree-based, uniastbased, and path-based routing [9]. The tree-based multiasting relies on finding a tree from the underlied network arhiteture and the soure messages are sent to eah destination along the paths on the onstruted tree [6, 13]. The uniast-based multiasting sends the messages from soure node to destination nodes via intermediate nodes reursively [4, 8]. In the path-based routing, the soure node sends the message to all destination nodes based on the onstruted path [7, 1]. The star graph [1, ] interonnetion network has been reognized as an attrative alternative to the popular hyperube network. This may aount for that star graph is with symmetri and hierarhial struture, and lower degree and smaller diameter as opposed to the hyperube. In our previous work on wormhole star graph networks routing [3], we addressed a path-based routing model and proposed four effiient deadlokfree multiast routing shemes. In this paper, we first address a dual-hamiltonian-path-based (DHPB) routing model with two virtual hannels based on two hamiltonian paths and a network partitioning strategy for wormhole-routed star graph networks. Then, we propose three effiient multiast routing shemes on basis of suh a model. All of the three proposed shemes are deadlok-free. The first sheme, network-seletion-based dual-path routing, selets subnetworks that are onstruted either by the first hamiltonian path or by the seond hamiltonian path for dual-path routing. The seond one, optimum dual-path routing, selets subnetworks with optimum routing path for dual-path routing. The third sheme, two-phase optimum dual-path routing, inludes two phases, soure-to-relay and relay-to-destination. In soure-to-relay phase, the multiasting uses optimum dual-path routing, whereas, in relay-to-destination phase, the multiasting uses high-hannel routing (whih is a speial ase of the optimum dual-path routing). We will show that our proposed routing shemes are superior to the uniast-based, the hamiltonian-path, and the single-hamiltonian-path-based (SHPB) dualpath routing shemes by experimental results. The rest of this paper is organized as follows. Preliminaries are presented in Setion. In Setion 3, we propose three path-based multiast algorithms with two virtual hannels. Simulation results of these algorithms are presented in Setion 4. Finally, onluding remarks are drawn in Setion 5. Preliminaries.1 System Model In the following, we first introdue some definitions and notations related to the star graphs. A permutation of n distint symbols from the set f1; ; ;ng is represented as p = s 1 s s n, where s i ;s j f1; ; ;ng;s i 6= s j for i 6= j; 1» i; j» n. Given a permutation p = s 1 s s n, let the generator g i be the funtion of p that interhanges the symbol s i with the symbol s 1 in p for» i» n. Thus, g i (p) = s i s s i 1 s 1 s i+1 s n. An undireted star graph with dimension n is denoted as S n =(V n ;E n ), where the set of verties V n is defined as fvjv = s 1 s s n ;s i ;s j f1; ; ;ng;s i 6= s j for i 6= j; 1» i; j» ng

3 and the set of edges E n is defined as f(v p ;v q )jv p ;v q V n ;v p 6= v q ; suh that v q = g i (v p ) for» i» ng. In other words, any two nodes v p and v q are onneted by an undireted edge if and only if the orresponding permutation to the node v q an be obtained from that of v p by interhanging the symbol s i of v p with the symbol s 1 of v p for» i» n. We also use the notation S n to represent an n-dimensional star graph, alled n-star, in this paper. Notie that star graphs are edge and vertex symmetri. Moreover, S n is a regular graph with degree n 1, n! verties, and (n 1)n! edges. A 3-star and a 4-star are shown in Figure 1. a b d a d b (a) (b) Figure 1: The topology of star graphs: (a) 3-star; (b) 4-star. The interonnetion network system is omposed of nodes, eah node is a omputer with its own proessor, loal memory, and ommuniation links; eah link onnets two neighboring nodes through network [7]. A ommon omponent of nodes in a new-generation multiomputer is a router. It an handle the entering, leaving, and passing through the node of message. Figure shows the arhiteture of a generi node. A router is usually onneted to the loal proessor/memory by one or more pairs of internal hannels. One hannel of eah pair is for input, the other for output. Several pairs of external hannels onnet the router to neighboring routers. The interonnetion of external hannels among routers defines the network topology. Loal Proessor and Memory internal injetion hannels internal injetion hannels external hannels from neighbors... Router (Crossbar Swith)... external hannels to neighbors Figure : A generi node arhiteture. 3

4 . Path-Based Multiast Routing Model In our previous work on wormhole star graph networks routing [3], we addressed a path-based routing model, derived a node labeling formula based on a single hamiltonian path (HP), and proposed four effiient deadlok-free multiast routing shemes: dual-path, shortut-node-based dual-path, multipath, and proximity grouping. Generally, the dual-path sheme is simple and effiient. The multiasting in the dualpath routing inludes two independent paths (toward high label nodes and low label nodes, respetively) and the next traversed node is the neighboring node with the label nearest to that of the next unvisited target node. The onept of the path-based routing model is desribed below...1 Hamiltonian Paths and Channel Networks The path-based routing method for meshes developed by Lin et al. [7] is based on a HP. In [3], we used the strategy in [11] to define a HP on the star graph. Beause a star graph is embedded with more than one HP, the routing methods proposed in [3] is simply on basis of a partiular HP of all possible HPs. In an n-star, the number of nodes is N = n! and eah node s is with a label `(s), where 0» `(s)» N 1 and `() is the node labeling funtion [3]. The labeling of a 4-star based on a HP is shown in Figure 3. For example, in a 4-star, `(134) = 0, `(413) = 6, `(431) = 13, `(431) = 3, and so forth a b d a d b Figure 3: The labeling of a 4-star based on a hamiltonian path. Aording to the node labels, we an onstrut a HP, i.e., from the node with label 0, following the nodes with labels 1; ;, to the node with label N 1. When node labeling is ompleted, we an divide the network into two subnetworks, high-hannel network and low-hannel network. The high-hannel network ontains all diretional hannels with nodes labeled from the lower to the higher, and the low-hannel network ontains all diretional hannels with nodes labeled from the higher to the lower. Then, a message routing an be performed along two legal paths, one along high-hannel network and the other along lowhannel network... Hamiltonian-Path and Single-Hamiltonian-Path-Based (SHPB) Dual-Path Multiast Routing The uniast-based, the hamiltonian-path, and the dual-path routing strategies an be adopted in a lot of wormhole-routed interonnetion networks. The uniast-based routing sheme uses one-to-one ommuni- 4

5 ation to ahieve multiast, whih requires startup lateny in eah intermediate node [8]. The disadvantage of this approah lies in that signifiant transmission lateny is resulted from the required number of ommuniation startup steps for multiast. In the hamiltonian-path routing, the soure node sends the message to all destination nodes based on the onstruted hamiltonian path. In this sheme, the multiast is divided into two submultiasts and that an be ompleted in parallel by two independent routing paths (one for highhannel routing and the other for low-hannel routing). The disadvantage of this approah is that it always traverses nodes following the fixed path (hamiltonian-path) that requires more traverse links for multiast [7]. In the dual-path routing, the multiasting is similar to the hamiltomian-path routing exept eah router tries to find a shortut node (the node with label losest to that of the next unvisited target node) for routing to redue the average length of multiast paths [7]. A sample multiast is denoted as the multiasting set R = f134 3 ; ; ; ; ; ; g, where the first element of R is the soure node and the others are the destination nodes in arbitrary order. Notie that the soure node is underlined, the label `(u) of eah node u in R is shown as a supersript to the node representation. In the hamiltonian-path and the SHPB dual-path routing, the multiasting set R an be ompleted by two submultiasting sets, R h for high-hannel routing and R l for low-hannel routing, i.e., R h = f134 3 ; ; ; ; ; g and R l = f134 3 ; g,inr h and R l the first elements are soure nodes and the others are destination nodes with label values higher and lower than soure nodes and in asending and desending orders, respetively. If we use hamiltonian-path routing, the total number of hannels traversed is 18+=0, and the maximum distane is max(18,)=18. If we use SHPB dual-path routing, the total number of hannels traversed is 14+=16, and the maximum distane is max(14,)=14. The hold-and-wait property of wormhole routing is partiularly suseptible to deadlok, and thus most wormhole-routed systems avoid messages routing to reah yles of hannel dependeny. Deadlok an be eliminated by the routing algorithm. By ordering network resoures, suh as nodes, and aessing resoures aording to a stritly monotoni order irular wait for resoures will not our and deadlok an be avoided [7]. 3 Dual-Hamiltonian-Path-Based (DHPB) Multiast Routing For SHPB dual-path routing, the performane is unstable espeially for large multiast sizes. That is, if the traversed node number of high-hannel routing is nearly idential to that of low-hannel routing, then dualpath routing performs very well; otherwise the performane of dual-path routing depends on longer traversed node number of either high-hannel routing or low-hannel routing. Therefore, we use the property that a star graph always exists a hamiltonian yle (HC) to find better routing paths for both high-hannel and low-hannel routing. 3.1 Dual-Hamiltonian-Path-Based (DHPB) Multiast Routing Model We use the strategy in [11] to find a HC on the star graph. The HC is onstruted as follows. We first findahpinan-star, suppose HP = (y 0 ;y 1 ; ;y k ), where y j is a node, 0» j» k, and k = n! 1. In a HP of a star graph, the end node y k is always adjaeny to the start node y 0. Then, we an obtain HC = HP [ (y k ;y 0 ). That is HC =(y 0 ;y 1 ; ;y k ;y 0 ). In a star graph, there exist more than one HC, the method desribed in this paper is only for a partiular HC of all possible HCs. Aording to the HC, we an obtain two HPs, HP 1 = HP =(y 0 ;y 1 ; ;y k ) and HP =(y t ;y t+1 ; ;y k ;y 0 ; ;y t 1 ), where t = n!. For eah HP in an n-star the number of nodes is N = n! and the label (value) of a node ranged from 5

6 0toN 1 is dependent on its position in HP 1 or HP. Before we introdue the routing algorithms subsequently, two node labeling strategies are needed. The first node labeling strategy of a 4-star is based on HP 1 that starts at node 134 and ends at node 431 using the same method that is onstruted in Setion. The seond node labeling strategy of a 4-star is based on HP that starts at node 341 and ends at node 413. Those two labeling strategies are based on two node labeling funtions `1 and `. For eah node p in a star graph two labels `1(p) and `(p) are assigned, where `1() and `() are the node labeling funtions. `1() value an be obtained aording to the order in the HP desribed in Setion... (or using the formula derived in [3]). So, `1(p) =`(p) where p is a node. `() value an be obtained by `(p) = (`1(p) + N ) mod N. The two different labeling results of 4-stars are shown in Figure 4. For example, in a 4-star, `1(134) = 0, `(134) = 1, `1(431) = 13, `(431) = 1, and so forth. a a b d b d a a d b 134 d b (a) (b) Figure 4: The two different node labeling of a 4-star based on two hamiltonian paths: (a) the first node labeling strategy; (b) the seond node labeling strategy. Aording to the two node labeling strategies, we an onstrut two HPs respetively, i.e., from the nodes with label 0, following the nodes with labels 1; ;, to the node with label N 1. When node labeling is ompleted, we an divide the network into four subnetworks, first-high-hannel network N h, 1 first-low-hannel network N l, seond-high-hannel network 1 Nh, and seond-low-hannel network Nl. N h 1 ontains all diretional hannels with labeling nodes, based on first node labeling strategy, from the lower to the higher; N l 1 ontains all diretional hannels with labeling nodes, based on first node labeling strategy, from the higher to the lower; N h ontains all diretional hannels with labeling nodes, based on seond node labeling strategy, from the lower to the higher; N l ontains all diretional hannels with labeling nodes, based on seond node labeling strategy, from the higher to the lower. Then, a message routing an be performed along two legal paths, one along subnetwork N h (or subnetwork 1 Nh ) and the other along subnetwork N l (or subnetwork 1 Nl ). The routing is based on network partitioning strategy with two virtual hannels. The two virtual hannels are used to avoid deadlok. Before we introdue the proposed routing algorithms, let us first define two routing funtions RF 1 and RF. Definition 1 (The routing funtions RF 1 and RF ). Let V, p, q, and `() be the node set, the soure node, the destination node of a star graph, and the node labeling funtion [3], respetively. The routing funtion RF i, where 1» i», is defined to be RF i : V V! V and RF i (p; q) = x, and if `i(p) < `i(q), then `i(x) = maxf`i(u)j`i(p) < `i(u)» `i(q), and u is adjaent to pg; if`i(p) > `i(q), then `i(x) = 6

7 minf`i(u)j`i(p) >`i(u) `i(q), and u is adjaent to pg. 3. Dual-Hamiltonian-Path-Based (DHPB) Dual-Path Multiast Routing In this subsetion, we propose three effiient DHPB dual-path multiast routing shemes: network-seletionbased, optimum, and two-phase optimum shemes Network-Seletion-Based (NSB) Dual-Path Routing The NSB routing sheme selets subnetworks that are onstruted either from the first hamiltonian path or from the seond hamiltonian path for dual-path routing. The NSB dual-path sheme inludes three steps. First, by the following two ases, the destination node set is divided into two subsets and then the destination nodes in eah subset are sorted. Case 1 ( 1 N» 4 `1(s) < 3 N): The destination node set is divided into two 4 subsets, D 1 and D, where every node k in D 1 has a higher `1(k) value than that of the soure node s, and every node k 0 in D has a lower `1(k 0 ) value than that of s aording to the node labeling funtion. Then, the destination nodes in D 1 are sorted aording to their `1() values in asending order and the destination nodes in D are sorted aording to their `1() values in desending order, respetively. Case (`1(s) < 1 N 4 or `1(s) 3 N): The destination node set is divided into two subsets, D 4 1 and D, where every node k in D 1 has a higher `(k 0 ) value than that of the soure node s, and every node k 0 in D has a lower `(k 0 ) value than that of s aording to the node labeling funtion. Then, the destination nodes in D 1 are sorted aording to their `() values in asending order and the destination nodes in D are sorted aording to their `() values in desending order, respetively. Seond, we onstrut two messages, M 1 and M, where M 1 ontains D 1 as part of the header and M ontains D as part of the header. Finally, multiast messages from s will be sent to the destination nodes aording to the following two different ases. Case 1 ( 1 N» 4 `1(s) < 3 N): 4 The message is sent to the destination nodes in D 1 using the high-hannel network based on subnetwork N h, and to the destination nodes in 1 D using the low-hannel network based on subnetworks N l. Case 1 (`1(s) < 1 N or 4 `1(s) 3 N): The message is sent to the destination nodes in D 4 1 using the high-hannel network based on subnetwork N h, and to the destination nodes in D using the low-hannel network based on subnetwork N l. The next traversed nodes from the soure node for routing both messages M 1 and M are the nodes that have the nearest label to that of the next unvisited target nodes of their neighboring nodes, respetively. In the following, we use an example to demonstrate the better multiast performane of the NSB dualpath routing when ompared with the hamiltonian-path and the SHPB dual-path routing. The sample multiast is denoted as the multiasting set R = f134 (3;15) ; 134 (1;13) ; 143 (8;0) ; 341 (1;0) ; 143 (17;5) ; 341 (19;7) ; 341 (1;9) g, where the first element of R is the soure node and the others are the destination nodes in an arbitrary order. Notie that the soure node is underlined, the label `1(u) of eah node u in R is shown as the first omponent of the supersript to the node representation and the label `(u) of eah node u in R is shown as the seond omponent of the supersript to the node representation. In the sample multiast, beause `1(134) = 3 < 1 N =6, the multiasting selets the subnetworks 4 Nh and N l for routing. Thus, the multiasting set R an be ompleted by two submultiasting sets, R h and R l, where R h = f134 (3;15) ; 143 (8;0) g and R l = f134 (3;15) ; 134 (1;13) ; 341 (1;9) ; 341 (19;7) ; 143 (17;5) ; 341 (1;0) g.inr h and R l, the first elements are soure nodes and the others are destination nodes with higher and lower label values than soure nodes in asending `() and desending `() value orders, respetively. R h routes the message using high-hannel routing based on subnetwork N h. Rl routes the message using low-hannel routing based on subnetwork N l. Figure 5 shows the sample multiast example using NSB dual-path routing, the total number of hannels traversed is 5+11=16, and the maximum distane from the soure to a destination 7

8 a b d a soure node destination node routing hannel 134 d b Figure 5: The sample multiast using NSB dual-path routing. is max(5,11)=11. So, the total number of hannels traversed of NSB dual-path routing is smaller than that of hamiltonian-path routing and equal to that of dual-path routing. The maximum distane of NSB dual-path routing is smaller than that of hamiltonian-path and SHPB dual-path routing. Now, let us disuss the time omplexity of the NSB dual-path algorithm. Suppose n is the dimension of star graph, d is the number of destination nodes, and N = n! is the number of nodes of star graph. In the destination-nodes partition and sorting step, the time omplexity is O(d) + O(d log d) = O(d log d). In the message preparation step, the time omplexity is O(1). In the routing step, the time omplexity is O( 3 N 4 1) = O( 3 N ) in the worst ase. So, the total time omplexity of the NSB dual-path algorithm in the 4 worst ase is O(d log d)+o(1) +O( 3 N 4 )=O( 3 n!+d log d). For omparison, the total time omplexity of 4 the hamiltonian-path and the SHPB dual-path algorithms are O(d log d) + O(1) + O(N ) = O(n! + d log d) in the worst ase. To verify the orretness of the NSB dual-path routing algorithm, we derive the following lemmas and theorems. Lemma 1. For two arbitrary distint nodes p and q in a star graph with two HPs (HP 1 and HP ), the path from p to q seleted aording to the routing funtion RF i, where 1» i», always exists. Proof. Suppose p and q are two arbitrary nodes in a star graph, without loss of generality, it an be assumed that `i(p) < `i(q), where 1» i». Let the node represent the soure node or the intermediate node loated in between soure node p and destination node q on HP i. Assume the next traversed node is x, aording to the routing funtion RF i, x = RF i (; q), where `i(x) = maxf`i(u)j`i() < `i(u)» `i(q), and u is adjaent to g. So, x is on HP i from to q (inluding q) and adjaent (onneted) to. Then, the path from p to q seleted aording to the routing funtion RF i is (y 0 ;y 1 ; ;y k ), where y 0 = p, y j = RF i (y j 1 ;q) for 0 <j» k, and y k = q. So, the path from p to q seleted aording to the routing funtion RF i always exists. Lemma. The message routing using DHPB dual-path algorithm, based on subnetworks N h 1 (using RF 1 for high-hannel routing) and N l 1 (using RF 1 for low-hannel routing), in a star graph with two HPs (HP 1 and HP ) an always be ompleted. Proof. Based on Lemma 1, it is obvious. Lemma 3. The message routing using DHPB dual-path algorithm, based on subnetworks N h (using RF for high-hannel routing) and N l (using RF for low-hannel routing), in a star graph with two HPs (HP 1 8

9 and HP ) an always be ompleted. Proof. Based on Lemma 1, it is obvious. Theorem 1. The message routing using NSB dual-path algorithm in a star graph with two HPs (HP 1 and HP ) an always be ompleted. Proof. The message routing using NSB dual-path algorithm is proeeded via either (i) subnetworks N h and 1 N l or (ii) subnetworks 1 Nh and N l. Aording to Lemmas and 3, message routing on both subnetworks an be ompleted. So, the message routing using NSB dual-path algorithm an always be ompleted. Theorem. The NSB dual-path multiast routing is deadlok-free. Proof. Beause a yle dependeny among resoures is a neessary ondition for deadlok [5], the multiasting algorithm may be proven deadlok-free by showing that there annot exist suh a dependeny among the hannels. In NSB dual-path routing, at the soure node the multiasting is proeeded via either one of the following two ases: (1) the NSB dual-path algorithm divides the networks into two disjoint subnetworks N h and 1 N l; () the NSB dual-path algorithm divides the networks into two disjoint subnetworks 1 Nh and N l. Beause N h 1 N l 1 N h N l = ;, the NSB dual-path multiast routing is deadlok-free at eah of the four subnetworks. Then, let us prove that messages delivered in subnetwork N h 1 are deadlok-free. Messages delivered in N h an only take high-hannels in 1 Nh 1. Sine eah opy of the message is routed entirely within a single subnetwork and monotoni order of requested hannels is guaranteed, there annot exist a dependeny yle within subnetwork N h 1 and thus no yli dependeny an be reated among the hannels. Similar proofs an be applied to the subnetworks N l, 1 N h, and N l. This thus proves the theorem. 3.. Optimum Dual-Path Routing The optimum routing sheme selets subnetworks with optimum routing path for dual-path routing. This routing sheme inludes three steps. First, by the following two ases, the destination node set is divided into two subsets and then the destination nodes in eah subset are sorted. Case 1 (`1(s) < 1 N): The destination node set is divided into two subsets D 1 and D. D 1 ontains the destinations d i where `1(s)» `1(d i ) < `1(s) + 1 N;d i D; 1» i» num d, where num d is the number of destinations. D ontains the destinations d j where d j D D 1. Then, the destination nodes in D 1 are sorted aording to the `1() values in asending order and the destination nodes in D are sorted aording to the `() values in desending order, respetively. Case (`1(s) 1 N): The destination node set is divided into two subsets D 1 and D. D 1 ontains the destinations d i where `1(s) 1 N» `1(d i )» `1(s);d i D; 1» i» num d, where num d is the number of destinations. D ontains the destinations d j where d j D D 1. Then, the destination nodes in D 1 are sorted aording to the `1() values in asending order and the destination nodes in D are sorted aording to the `() values in desending order, respetively. Seond, we onstrut two messages, M 1 and M, where M 1 ontains D 1 as part of the header and M ontains D as part of the header. Finally, multiast messages from s will be sent to the destination nodes aording to the following two different ases. Case 1 (`1(s) < 1 N): The message is sent to the destination nodes in D 1 using the high-hannel network based on subnetwork N h, and to the destination nodes in 1 D using the low-hannel network based on subnetworks N l. Case (`1(s) 1 N): The message is sent to the destination nodes in D 1 using the low-hannel network based on subnetwork N l, and to the destination nodes in 1 D using the high-hannel network based on subnetwork N h. In the sample multiast, beause `1(134) =3< 1 N =1, the multiasting selets the subnetworks N h and 1 N l for routing. Thus, the sample multiasting set R an be ompleted by two submultiasting sets, R h and R l, where R h = f134 (3;15) ; 143 (8;0) ; 341 (1;0) g and R l = f134 (3;15) ; 134 (1;13) ; 341 (1;9) ; 9

10 a a b d b d soure node a a destination node d b 134 d b routing hannel (a) (b) Figure 6: The sample multiast using optimum dual-path routing: (a) the multiasting of D 1 using highhannel routing based on subnetwork N h 1 ; (b) the multiasting of D using low-hannel routing based on subnetwork N l. 341 (19;7) ; 143 (17;5) g. Figure 6 shows the same multiast example of Figure 5 using optimum dual-path routing, the total number of hannels traversed is 9+10=19, and the maximum distane is max(9,10)=10. So, the total number of hannels traversed of optimum dual-path routing is smaller than that of hamiltonianpath routing but larger than that of SHPB dual-path routing. The maximum distane of optimum dual-path routing is smaller than that of hamiltonian-path and SHPB dual-path routing. Now, let us analyze the time omplexity of the optimum dual-path algorithm. Suppose n is the dimension of star graph, d is the number of destination nodes, and N = n! is the number of nodes of star graph. The time omplexity of the first two steps of the optimum dual-path algorithm is the same as that of the NSB dual-path algorithm. In the routing step, the time omplexity is O( 1 N ) in the worst ase. The total time omplexity of the optimum dual-path algorithm in the worst ase is O(d log d) +O(1) + O( 1 N ) = O( 1 n!+dlog d). In the following, we first desribed two related lemmas, and then verify the optimum dual-path routing an always be ompleted and the routing is deadlok-free. Lemma 4. The message routing using DHPB dual-path algorithm, based on subnetworks N h 1 (using RF 1 for high-hannel routing) and N l (using RF for low-hannel routing), in a star graph with two HPs (HP 1 and HP ) an always be ompleted. Proof. Similar to Lemma. Lemma 5. The message routing using DHPB dual-path algorithm, based on subnetworks N l 1 (using RF 1 for low-hannel routing) and N h (using RF for high-hannel routing), in a star graph with two HPs (HP 1 and HP ) an always be ompleted. Proof. Similar to Lemma. Theorem 3. The message routing using optimum dual-path algorithm in a star graph with two HPs (HP 1 and HP ) an always be ompleted. Proof. Similar to Theorem 1. 10

11 Theorem 4. The optimum dual-path multiast routing is deadlok-free. Proof. Similar to Theorem Two-Phase Optimum Dual-Path Routing The two-phase optimum routing sheme inludes two phases, soure-to-relay and relay-to-destination. In soure-to-relay phase the optimum dual-path routing is used and in relay-to-destination phase the highhannel routing is used. This routing sheme inludes four steps. First, in an n-star S n, S n an be partitioned into n disjoint (n 1)-stars S n 1 (1), S n 1 (),, S n 1 (n) aording to the nth symbol (the last dimension) of the nodes in S n. The nodes in destination node set D are olleted into a set. is partitioned into n subsets 1,,, n aording to the nth symbol (the last dimension) of those destination nodes. In this way, the nodes of the same subset are loated on the same (n 1)-star. Seond, for eah subset i,we an find a relay node r i, that is seleted out of S n 1 (i), whih is the node with the smallest label value in the (n 1)-star S n 1 (i). Then, the message routing is proeeded by two phases: soure-to-relay and relay-to-destination. In the soure-to-relay phase, the message of the soure node s is sent to the relay nodes r i of i aording to the optimum dual-path routing. In the relay-to-destination phase, for eah subset i, the message reeived by relay node r i via high-hannel routing based on subnetwork N h 1 (whih is a speial ase of the optimum dual-path routing) is sent to all destination nodes in i. For the sample multiast, the two-phase optimum dual-path routing is proeeded as follows. In the destination-nodes partition step, we first define the destination node set as: = f134 (1;13) ; 143 (8;0) ; 341 (1;0) ; 143 (17;5) ; 341 (19;7) ; 341 (1;9) g. Then, is partitioned by the 4th symbol (the last dimension) of eah node into four subsets: 1 = f134 (1;13) g, = f143 (8;0) g, 3 = f341 (1;0) ; 143 (17;5) g, and 4 = f341 (19;7) ; 341 (1;9) g. In the relay-nodes finding step, for eah subset i we an find a relay node r i whih owns the smallest label in the 3-star S 3 (i). Thus, we obtain the relay nodes r 1 = 134 (0;1), r = 413 (6;18), r 3 = 341 (1;0), and r 4 = 431 (18;6), respetively. Then, the multiasting is proeeded by following two phases. In the soure-to-relay phase, the soure node s routes a message to eah of the relay nodes r i. That is, the soure node 134 (3;15) sends a multidestination message to the relay nodes 134 (0;1), 413 (6;18), 341 (1;0), and 431 (18;6). In this phase, the multiasting set is R 0 = f134 (3;15) ; 134 (0;1) ; 413 (6;18) ; 341 (1;0) ; 431 (18;6) g. In the multiasting set R 0, beause `1(134) = 3» 1 N = 1, the multiasting selets the subnetworks Nh and 1 N l for routing. Thus, R0 is ompleted by two submultiasting sets, R 0h and R 0l, where R 0h = f134 (3;15) ; 413 (6;18) ; 341 (1;0) g and R 0l = f134 (3;15) ; 134 (0;1) ; 431 (18;6) g.inr 0h the message is transmitted via high-hannel routing based on subnetwork N h, and in 1 R0l the message is sent through low-hannel routing based on subnetwork N l. In the relay-to-destination phase, eah relay node r i routes a message to destination nodes in the subset i. That is, the relay nodes 134 (0;1), 413 (6;18), 341 (1;0), and 431 (18;6) send a multidestination message to the destination nodes in eah respetive subset. In this phase, a multiasting set R 00 is divided into four multiasting subsets: R 00h 1 = f134 (0;1) ; 134 (1;13) g, R 00h = f413 (6;18) ; 143 (8;0) g, R 00h 3 = f341 (1;0) ; 143 (17;5) g, and R 00h 4 = f431 (18;6) ; 341 (19;7) ; 341 (1;9) g. For this multiast example, if we use two-phase optimum dual-path routing, the total number of hannels traversed is (5+6)+(1++1+3)=18, and the maximum distane is max(5,6)+max(1,,1,3)=9. So, the total number of hannels traversed of twophase optimum dual-path routing is smaller than that of hamiltonian-path routing but larger than that of SHPB dual-path routing. The maximum distane of two-phase optimum dual-path routing is smaller than that of hamiltonian-path and SHPB dual-path routing. Conerning the time omplexity of the two-phase optimum dual-path algorithm. Let n be the dimension of star graph, d be the number of destination nodes, and N = n! be the number of nodes of star graph. In destination-nodes partition step, the time omplexity is O(d). In relay-nodes finding step, the 11

12 time omplexity is O(n) in the worst ase. In soure-to-relay phase, in the worst ase the number of relay nodes is n, the time omplexity is O(n log n) +O(1) + O(n) =O(n log n) in the worst ase. In relay-todestination phase, the message is routed in the (n 1)-star, the time omplexity is O((n 1)! + d log d) in the worst ase. The total time omplexity of the two-phase optimum dual-path algorithm in the worst ase is O(d) +O(n) +O(n log n) +O((n 1)! + d log d) =O((n 1)! + d log d). In Theorem 5 and Theorem 6, we prove that multiasting based on the two-phase optimum dual-path algorithm an always be ompleted and the routing is deadlok-free. Theorem 5. The message routing using two-phase optimum dual-path algorithm in a star graph with two HPs (HP 1 and HP ) an always be ompleted. Proof. Based on Theorem 3, it is obvious. Theorem 6. The two-phase optimum dual-path multiast routing is deadlok-free. Proof. Based on Theorem 4, it is obvious. In all our proposed DHPB multiasting algorithms with two virtual hannels, we use the hannel subnetworks that have been desribed in previous subsetion. Beause the subnetworks are disjoint and ayli, no yli resoure dependeny an our [7]. Thus, the proposed routing algorithms developed based on those subnetworks are deadlok-free. 4 Simulation Results In this setion, the experimental results are presented and disussed. We ompare our proposed shemes with the uniast-based, the hamiltonian-path, and the SHPB dual-path shemes. To evaluate the performane of the multiast shemes in an interonnetion network, there are some parameters that must be onsidered: the multiast size, the message length, the startup lateny, the link lateny, and the router lateny. The multiast size d is the number of destination nodes, and the message length f is the number of flits in a message. The message startup lateny t s inludes the software overhead for buffers alloating, messages oping, router initializing, et. The link lateny t l is the propagation delay of message through a link of network. The router lateny t r is the delay inside the router for handling multidestination messages. We first give our assumptions to the parameters of system arhiteture in the simulations. All simulations were performed for a 70-node (6-dimension) star graph network. We examined the routing performane of our proposed shemes under various multiast sizes, startup latenies, and message lengths. The soure node and the destination nodes for eah multiasting were randomly generated. For all simulation experiments, we assumed system parameters representing the urrent simulation trend in tehnology [7, 1]. The large message startup lateny t s is set to be 10:0 miroseonds (5.5 miroseonds for message sending lateny, 4.5 miroseonds for message reeiving lateny), and the small message startup lateny t s is 1:0 miroseond (550 nanoseonds for message sending lateny, 450 nanoseonds for message reeiving lateny). The small message startup latenies were usually used for advaned network interfae to improve the effiieny of lateny time. The link propagation lateny t l is 5:0 nanoseonds. The router lateny for handling multidestination messages t r is 40:0 nanoseonds; however, it is set to 0:0 nanoseonds in uniast-based routing. For all of the multiasting, the message sizes of 6, 10, and 400 flits were simulated. 1

13 4.1 Performane under Different Multiast Sizes Figure 7 and Figure 8 present the performane of the various multiast shemes on a 6-star network with small and large message latenies, respetively. Results are shown for message lengths of 6,10, and 400 flits, respetively. It is observed that, the performane of all path-based algorithms is superior to that of the uniast-based algorithm. This is beause the uniast-based algorithm is a multiple-phase multiasting that needs more startup lateny for proessing Multiast lateny (in miroseonds) uniast-based hampath SHPB dualpath DHPB nsb_dualpath DHPB opt_dualpath DHPB tpo_dualpath Multiast lateny (in miroseonds) uniast-based hampath SHPB dualpath DHPB nsb_dualpath DHPB opt_dualpath DHPB tpo_dualpath Multiast lateny (in miroseonds) uniast-based hampath SHPB dualpath DHPB nsb_dualpath DHPB opt_dualpath DHPB tpo_dualpath Number of destinations Number of destinations Number of destinations (a) (b) () Figure 7: Multiast lateny in a 6-star network with small message startup lateny. (a) Message length = 6 flits. (b) Message length = 10 flits. () Message length = 400 flits Multiast lateny (in miroseonds) uniast-based hampath SHPB dualpath DHPB nsb_dualpath DHPB opt_dualpath DHPB tpo_dualpath Multiast lateny (in miroseonds) uniast-based hampath SHPB dualpath DHPB nsb_dualpath DHPB opt_dualpath DHPB tpo_dualpath Multiast lateny (in miroseonds) uniast-based hampath SHPB dualpath DHPB nsb_dualpath DHPB opt_dualpath DHPB tpo_dualpath Number of destinations Number of destinations Number of destinations (a) (b) () Figure 8: Multiast lateny in a 6-star network with large message startup lateny. (a) Message length = 6 flits. (b) Message length = 10 flits. () Message length = 400 flits. In Figure 7, with small message startup latenies the performane of our proposed DHPB algorithms is superior to that of uniast-based, hamiltonian-path, and SHPB dual-path algorithms exept for very long messages. The performane of the two-phase optimum dual-path algorithm is the best with short and medium message lengths. For long messages, the optimum dual-path algorithm performs the best. This is beause in the two-phase optimum dual-path algorithm the message lengths plays a determining role on the performane of message transmission and its impat to transmission lateny is larger for long messages, but smaller for short and medium messages. Figure 8 shows the performane with large message startup latenies. The performane of NSB dualpath and optimum dual-path algorithms is better than that of hamiltonian-path and SHPB dual-path algorithms. With short and medium messages, the performane of two-phase optimum dual-path algorithm is 13

14 better than that of SHPB dual-path algorithm for large number of destinations, but worse than that of SHPB dual-path algorithm for small number of destinations. For long messages, the performane of two-phase optimum dual-path algorithm is worse than that of hamiltonian-path and SHPB dual-path algorithms. The reason is the same as that desribed above. The optimum dual-path routing sheme performs very well for short, medium, and long messages. 4. Utilization of Network Traffi We then onsider the traffi (in links) of interonnetion networks. The network traffi may affet other ommuniation in the network. We simulated the network traffi by the total number of links visited. Eah link visited represents the use of one ommuniation link by one message. Figure 9 presents the link usage for a 6-star network over various multiast sizes. In Figure 9, the DHPB algorithms require fewer ommuniation links than that of the uniast-based algorithm. The network traffi of our proposed algorithms is superior to that of hamiltonian-path algorithm and almost equal to that of SHPB dual-path algorithm Network traffi (in links) uniast-based hampath SHPB dualpath DHPB nsb_dualpath DHPB opt_dualpath DHPB tpo_dualpath Number of destinations Figure 9: Network traffi in a 6-star network. 5 Conlusions In this paper, we first address a dual-hamiltonian-path-based (DHPB) routing model with two virtual hannels based on two hamiltonian paths and a network partitioning strategy for wormhole star graph networks. Then, we propose three effiient multiast routing shemes on basis of suh a model. All of the three proposed shemes are proved deadlok-free. The former two shemes, NSB dual-path and optimum dual-path routing shemes, have the advantage of reduing the number of traversed links to improve the ommuniation performane. The third sheme, two-phase optimum dual-path routing sheme, has the advantage of reduing both the number of traversed links and parallel transmission in the seond phase. Finally, experimental results are given to show our proposed three routing shemes outperform the uniast-based, the hamiltonian-path, and the single-hamiltonian-path-based (SHPB) dual-path routing shemes signifiantly. In general, the optimum dual-path algorithm is the best for a large message startup lateny, while the twophase optimum dual-path algorithm is the best for a small message startup lateny exept for very long messages. 14

15 Aknowledgements This work was supported by the National Siene Counil of Republi of China under grants NSC E and NSC P In addition, the authors would like to thank the anonymous referees for their ritial review and valuable omments and greatly improving the overall presentation of this paper. Referenes [1] S.B. Akers, D. Harel, and B. Krishnamurthy, The Star Graph : An Attrative Alternative to the n- Cube, Proeedings of the 1987 International Conferene on Parallel Proessing, pp , August [] S.B. Akers and B. Krishnamurthy, A Group-Theoreti Model for Symmetri Interonnetion Networks, IEEE Trans. on Computers, Vol. 38, No. 4, pp , April [3] T.-S. Chen, N.-C. Wang, and C.-P. Chu, Multiast Communiation in Wormhole-Routed Star Graph Interonnetion Networks, Parallel Computing, Vol. 6, No. 11, pp , Otober 000. [4] L.D. Coster, N. Dewulf, and C.T. Ho, Effiient Multi-Paket Multiast Algorithms on Meshes with Wormhole and Dimension-Ordered Routing, Proessdings of International Conferene on Parallel Proessing, Vol. III, pp , Augest [5] W.J. Dally and C.L. Seitz, Deadlok-Free Message Routing in Multiproessor Interonnetion Networks, IEEE Trans. on Computers, Vol. C-36, No. 5, pp , May [6] Y. Lan, A.H. Esfahanian and L.M. Ni, Multiast in Hyperube Multiproessors, Journal of Parallel and Distributed Computing, pp , [7] X. Lin, P.K. MKinley, and L.M. Ni, Deadlok-Free Multiast Wormhole Routing in D Mesh Multiomputers, IEEE Trans. on Parallel and Distributed Systems, Vol. 5, No. 8, pp , Otober [8] P.K. MKinley, H. Xu, A.H. Esfahanianm, and L.M. Ni, Uniast-Based Multiast Communiation in Wormhole-Routed Networks, IEEE Trans. on Parellel and Distributed Systems, Vol. 5, No 1, pp , Deember [9] P.K. MKinley, Y.J. Tsai, and D.F. Robinson, Colletive Communiation in Wormhole-Routed Massively Parallel Computers, Computer, Vol. 8, No. 1, pp , Deember [10] L.M. Ni and P.K. MKinley, A Survey of Wormhole Routing Tehniques in Diret Networks, Computer, Vol. 6, No., pp. 6-76, February [11] M. Nigam, S. Sahni, and B. Kirshnamurthy, Embedding Hamiltonians and Hyperubes in Star Interonnetion Graphs, Proeedings of International Conferene on Parallel Proessing, Vol. 3, pp , August [1] D.K. Panda, S. Singal, and R. Kesavan, Multidestination Message Passing in Wormhole k-ary n-ube Networks with Base Routing Conformed Path, IEEE Trans. on Parellel and Distributed Systems, Vol. 10, No. 1, pp , January [13] Y.-C. Tseng and J.-P. Sheu, Toward Optimal Broadast in a Star Graph Using Multiple Spanning Trees, IEEE Trans. on Computers, Vol. 46, No. 5, pp , May

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr

More information

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient

More information

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based

More information

Implementing Load-Balanced Switches With Fat-Tree Networks

Implementing Load-Balanced Switches With Fat-Tree Networks Implementing Load-Balaned Swithes With Fat-Tree Networks Hung-Shih Chueh, Ching-Min Lien, Cheng-Shang Chang, Jay Cheng, and Duan-Shin Lee Department of Eletrial Engineering & Institute of Communiations

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

Accommodations of QoS DiffServ Over IP and MPLS Networks

Accommodations of QoS DiffServ Over IP and MPLS Networks Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering

More information

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless

More information

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments Establishing Seure Ethernet LANs Using Intelligent Swithing Hubs in Internet Environments WOEIJIUNN TSAUR AND SHIJINN HORNG Department of Eletrial Engineering, National Taiwan University of Siene and Tehnology,

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

Exploring the Commonality in Feature Modeling Notations

Exploring the Commonality in Feature Modeling Notations Exploring the Commonality in Feature Modeling Notations Miloslav ŠÍPKA Slovak University of Tehnology Faulty of Informatis and Information Tehnologies Ilkovičova 3, 842 16 Bratislava, Slovakia miloslav.sipka@gmail.om

More information

Sparse Certificates for 2-Connectivity in Directed Graphs

Sparse Certificates for 2-Connectivity in Directed Graphs Sparse Certifiates for 2-Connetivity in Direted Graphs Loukas Georgiadis Giuseppe F. Italiano Aikaterini Karanasiou Charis Papadopoulos Nikos Parotsidis Abstrat Motivated by the emergene of large-sale

More information

mahines. HBSP enhanes the appliability of the BSP model by inorporating parameters that reet the relative speeds of the heterogeneous omputing omponen

mahines. HBSP enhanes the appliability of the BSP model by inorporating parameters that reet the relative speeds of the heterogeneous omputing omponen The Heterogeneous Bulk Synhronous Parallel Model Tiani L. Williams and Rebea J. Parsons Shool of Computer Siene University of Central Florida Orlando, FL 32816-2362 fwilliams,rebeag@s.uf.edu Abstrat. Trends

More information

Multi-Channel Wireless Networks: Capacity and Protocols

Multi-Channel Wireless Networks: Capacity and Protocols Multi-Channel Wireless Networks: Capaity and Protools Tehnial Report April 2005 Pradeep Kyasanur Dept. of Computer Siene, and Coordinated Siene Laboratory, University of Illinois at Urbana-Champaign Email:

More information

This fact makes it difficult to evaluate the cost function to be minimized

This fact makes it difficult to evaluate the cost function to be minimized RSOURC LLOCTION N SSINMNT In the resoure alloation step the amount of resoures required to exeute the different types of proesses is determined. We will refer to the time interval during whih a proess

More information

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method 3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr

More information

A {k, n}-secret Sharing Scheme for Color Images

A {k, n}-secret Sharing Scheme for Color Images A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University

More information

Gray Codes for Reflectable Languages

Gray Codes for Reflectable Languages Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings

More information

High-level synthesis under I/O Timing and Memory constraints

High-level synthesis under I/O Timing and Memory constraints Highlevel synthesis under I/O Timing and Memory onstraints Philippe Coussy, Gwenolé Corre, Pierre Bomel, Eri Senn, Eri Martin To ite this version: Philippe Coussy, Gwenolé Corre, Pierre Bomel, Eri Senn,

More information

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks 62 Uplink Channel Alloation Sheme and QoS Management Mehanism for Cognitive Cellular- Femtoell Networks Kien Du Nguyen 1, Hoang Nam Nguyen 1, Hiroaki Morino 2 and Iwao Sasase 3 1 University of Engineering

More information

Cluster-based Cooperative Communication with Network Coding in Wireless Networks

Cluster-based Cooperative Communication with Network Coding in Wireless Networks Cluster-based Cooperative Communiation with Network Coding in Wireless Networks Zygmunt J. Haas Shool of Eletrial and Computer Engineering Cornell University Ithaa, NY 4850, U.S.A. Email: haas@ee.ornell.edu

More information

Reduced-Complexity Column-Layered Decoding and. Implementation for LDPC Codes

Reduced-Complexity Column-Layered Decoding and. Implementation for LDPC Codes Redued-Complexity Column-Layered Deoding and Implementation for LDPC Codes Zhiqiang Cui 1, Zhongfeng Wang 2, Senior Member, IEEE, and Xinmiao Zhang 3 1 Qualomm In., San Diego, CA 92121, USA 2 Broadom Corp.,

More information

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Ho Wireless Networks Giorgio Quer, Federio Librino, Lua Canzian, Leonardo Badia, Mihele Zorzi, University of California San Diego La

More information

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,

More information

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

Constructing Transaction Serialization Order for Incremental. Data Warehouse Refresh. Ming-Ling Lo and Hui-I Hsiao. IBM T. J. Watson Research Center

Constructing Transaction Serialization Order for Incremental. Data Warehouse Refresh. Ming-Ling Lo and Hui-I Hsiao. IBM T. J. Watson Research Center Construting Transation Serialization Order for Inremental Data Warehouse Refresh Ming-Ling Lo and Hui-I Hsiao IBM T. J. Watson Researh Center July 11, 1997 Abstrat In typial pratie of data warehouse, the

More information

Graph-Based vs Depth-Based Data Representation for Multiview Images

Graph-Based vs Depth-Based Data Representation for Multiview Images Graph-Based vs Depth-Based Data Representation for Multiview Images Thomas Maugey, Antonio Ortega, Pasal Frossard Signal Proessing Laboratory (LTS), Eole Polytehnique Fédérale de Lausanne (EPFL) Email:

More information

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,

More information

CleanUp: Improving Quadrilateral Finite Element Meshes

CleanUp: Improving Quadrilateral Finite Element Meshes CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)

More information

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion

More information

Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis

Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis Journal of Computer Siene 4 (): 9-97, 008 ISSN 549-3636 008 Siene Publiations Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis Deepti Gaur, Aditya Shastri and Ranjit Biswas Department of Computer

More information

An Efficient and Scalable Approach to CNN Queries in a Road Network

An Efficient and Scalable Approach to CNN Queries in a Road Network An Effiient and Salable Approah to CNN Queries in a Road Network Hyung-Ju Cho Chin-Wan Chung Dept. of Eletrial Engineering & Computer Siene Korea Advaned Institute of Siene and Tehnology 373- Kusong-dong,

More information

New Channel Allocation Techniques for Power Efficient WiFi Networks

New Channel Allocation Techniques for Power Efficient WiFi Networks ew Channel Alloation Tehniques for Power Effiient WiFi etworks V. Miliotis, A. Apostolaras, T. Korakis, Z. Tao and L. Tassiulas Computer & Communiations Engineering Dept. University of Thessaly Centre

More information

HEXA: Compact Data Structures for Faster Packet Processing

HEXA: Compact Data Structures for Faster Packet Processing Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for

More information

Parallelizing Frequent Web Access Pattern Mining with Partial Enumeration for High Speedup

Parallelizing Frequent Web Access Pattern Mining with Partial Enumeration for High Speedup Parallelizing Frequent Web Aess Pattern Mining with Partial Enumeration for High Peiyi Tang Markus P. Turkia Department of Computer Siene Department of Computer Siene University of Arkansas at Little Rok

More information

Improved flooding of broadcast messages using extended multipoint relaying

Improved flooding of broadcast messages using extended multipoint relaying Improved flooding of broadast messages using extended multipoint relaying Pere Montolio Aranda a, Joaquin Garia-Alfaro a,b, David Megías a a Universitat Oberta de Catalunya, Estudis d Informàtia, Mulimèdia

More information

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1. Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,

More information

We don t need no generation - a practical approach to sliding window RLNC

We don t need no generation - a practical approach to sliding window RLNC We don t need no generation - a pratial approah to sliding window RLNC Simon Wunderlih, Frank Gabriel, Sreekrishna Pandi, Frank H.P. Fitzek Deutshe Telekom Chair of Communiation Networks, TU Dresden, Dresden,

More information

Detection and Recognition of Non-Occluded Objects using Signature Map

Detection and Recognition of Non-Occluded Objects using Signature Map 6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,

More information

Cluster-Based Cumulative Ensembles

Cluster-Based Cumulative Ensembles Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,

More information

Directed Rectangle-Visibility Graphs have. Abstract. Visibility representations of graphs map vertices to sets in Euclidean space and

Directed Rectangle-Visibility Graphs have. Abstract. Visibility representations of graphs map vertices to sets in Euclidean space and Direted Retangle-Visibility Graphs have Unbounded Dimension Kathleen Romanik DIMACS Center for Disrete Mathematis and Theoretial Computer Siene Rutgers, The State University of New Jersey P.O. Box 1179,

More information

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY Dileep P, Bhondarkor Texas Instruments Inorporated Dallas, Texas ABSTRACT Charge oupled devies (CCD's) hove been mentioned as potential fast auxiliary

More information

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis

More information

Space- and Time-Efficient BDD Construction via Working Set Control

Space- and Time-Efficient BDD Construction via Working Set Control Spae- and Time-Effiient BDD Constrution via Working Set Control Bwolen Yang Yirng-An Chen Randal E. Bryant David R. O Hallaron Computer Siene Department Carnegie Mellon University Pittsburgh, PA 15213.

More information

Performance Enhancement Techniques for InfiniBand TM Architecture

Performance Enhancement Techniques for InfiniBand TM Architecture Performane Enhanement Tehniques for InfiniBand TM Arhiteture Eun Jung Kim? Ki Hwan Yum y Chita R. Das? Mazin Yousif z JoséDuato x? Department of Computer Siene and Engineering The Pennsylvania State University

More information

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Arne Hamann, Razvan Rau, Rolf Ernst Institute of Computer and Communiation Network Engineering Tehnial University of Braunshweig,

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive

More information

Network Coding in Wireless Networks with Random Access

Network Coding in Wireless Networks with Random Access ISIT2007, Nie, Frane, June 24 - June 29, 200O Network Coding in Wireless Networks with Random Aess Danail Traskovt, Desmond S. Lun, Ralf Koettert, and Muriel Medardt Broad Institute MIT and Harvard Cambridge,

More information

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq Volume 4 Issue 6 June 014 ISSN: 77 18X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om Medial Image Compression using

More information

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department

More information

Multi-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks

Multi-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks Multi-hop Fast Conflit Resolution Algorithm for Ad Ho Networks Shengwei Wang 1, Jun Liu 2,*, Wei Cai 2, Minghao Yin 2, Lingyun Zhou 2, and Hui Hao 3 1 Power Emergeny Center, Sihuan Eletri Power Corporation,

More information

The Tofu Interconnect D

The Tofu Interconnect D 2018 IEEE International Conferene on Cluster Computing The Tofu Interonnet D Yuihiro Ajima, Takahiro Kawashima, Takayuki Okamoto, Naoyuki Shida, Kouihi Hirai, Toshiyuki Shimizu Next Generation Tehnial

More information

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer

More information

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks International Journal of Computer Theory and Engineering, Vol. 5, No. 2, April 213 A Multi-Head Clustering Algorithm in Vehiular Ad Ho Networks Shou-Chih Lo, Yi-Jen Lin, and Jhih-Siao Gao Abstrat Clustering

More information

COMBINATION OF INTERSECTION- AND SWEPT-BASED METHODS FOR SINGLE-MATERIAL REMAP

COMBINATION OF INTERSECTION- AND SWEPT-BASED METHODS FOR SINGLE-MATERIAL REMAP Combination of intersetion- and swept-based methods for single-material remap 11th World Congress on Computational Mehanis WCCM XI) 5th European Conferene on Computational Mehanis ECCM V) 6th European

More information

Colouring contact graphs of squares and rectilinear polygons de Berg, M.T.; Markovic, A.; Woeginger, G.

Colouring contact graphs of squares and rectilinear polygons de Berg, M.T.; Markovic, A.; Woeginger, G. Colouring ontat graphs of squares and retilinear polygons de Berg, M.T.; Markovi, A.; Woeginger, G. Published in: nd European Workshop on Computational Geometry (EuroCG 06), 0 Marh - April, Lugano, Switzerland

More information

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections SVC-DASH-M: Salable Video Coding Dynami Adaptive Streaming Over HTTP Using Multiple Connetions Samar Ibrahim, Ahmed H. Zahran and Mahmoud H. Ismail Department of Eletronis and Eletrial Communiations, Faulty

More information

Chapter 2: Introduction to Maple V

Chapter 2: Introduction to Maple V Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard

More information

Acoustic Links. Maximizing Channel Utilization for Underwater

Acoustic Links. Maximizing Channel Utilization for Underwater Maximizing Channel Utilization for Underwater Aousti Links Albert F Hairris III Davide G. B. Meneghetti Adihele Zorzi Department of Information Engineering University of Padova, Italy Email: {harris,davide.meneghetti,zorzi}@dei.unipd.it

More information

Dynamic Algorithms Multiple Choice Test

Dynamic Algorithms Multiple Choice Test 3226 Dynami Algorithms Multiple Choie Test Sample test: only 8 questions 32 minutes (Real test has 30 questions 120 minutes) Årskort Name Eah of the following 8 questions has 4 possible answers of whih

More information

References. December 1992, pp. 71 { 81. pp.457{467. Magazine, June for very large high throughput database systems,"

References. December 1992, pp. 71 { 81. pp.457{467. Magazine, June for very large high throughput database systems, the overall working time for other appliations. In ase, data ltering was the only appliation being run, then using distributed indexing, we an serve 00 times as many requests. 6 Conlusion We have explored

More information

COSSIM An Integrated Solution to Address the Simulator Gap for Parallel Heterogeneous Systems

COSSIM An Integrated Solution to Address the Simulator Gap for Parallel Heterogeneous Systems COSSIM An Integrated Solution to Address the Simulator Gap for Parallel Heterogeneous Systems Andreas Brokalakis Synelixis Solutions Ltd, Greee brokalakis@synelixis.om Nikolaos Tampouratzis Teleommuniation

More information

The recursive decoupling method for solving tridiagonal linear systems

The recursive decoupling method for solving tridiagonal linear systems Loughborough University Institutional Repository The reursive deoupling method for solving tridiagonal linear systems This item was submitted to Loughborough University's Institutional Repository by the/an

More information

Architecture and Performance of the Hitachi SR2201 Massively Parallel Processor System

Architecture and Performance of the Hitachi SR2201 Massively Parallel Processor System Arhiteture and Performane of the Hitahi SR221 Massively Parallel Proessor System Hiroaki Fujii, Yoshiko Yasuda, Hideya Akashi, Yasuhiro Inagami, Makoto Koga*, Osamu Ishihara*, Masamori Kashiyama*, Hideo

More information

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425) Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University

More information

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification erformane Improvement of TC on Wireless Cellular Networks by Adaptive Combined with Expliit Loss tifiation Masahiro Miyoshi, Masashi Sugano, Masayuki Murata Department of Infomatis and Mathematial Siene,

More information

1. Introduction. 2. The Probable Stope Algorithm

1. Introduction. 2. The Probable Stope Algorithm 1. Introdution Optimization in underground mine design has reeived less attention than that in open pit mines. This is mostly due to the diversity o underground mining methods and omplexity o underground

More information

THROUGHPUT EVALUATION OF AN ASYMMETRICAL FDDI TOKEN RING NETWORK WITH MULTIPLE CLASSES OF TRAFFIC

THROUGHPUT EVALUATION OF AN ASYMMETRICAL FDDI TOKEN RING NETWORK WITH MULTIPLE CLASSES OF TRAFFIC THROUGHPUT EVALUATION OF AN ASYMMETRICAL FDDI TOKEN RING NETWORK WITH MULTIPLE CLASSES OF TRAFFIC Priya N. Werahera and Anura P. Jayasumana Department of Eletrial Engineering Colorado State University

More information

The AMDREL Project in Retrospective

The AMDREL Project in Retrospective The AMDREL Projet in Retrospetive K. Siozios 1, G. Koutroumpezis 1, K. Tatas 1, N. Vassiliadis 2, V. Kalenteridis 2, H. Pournara 2, I. Pappas 2, D. Soudris 1, S. Nikolaidis 2, S. Siskos 2, and A. Thanailakis

More information

arxiv: v1 [cs.db] 13 Sep 2017

arxiv: v1 [cs.db] 13 Sep 2017 An effiient lustering algorithm from the measure of loal Gaussian distribution Yuan-Yen Tai (Dated: May 27, 2018) In this paper, I will introdue a fast and novel lustering algorithm based on Gaussian distribution

More information

Computing Pool: a Simplified and Practical Computational Grid Model

Computing Pool: a Simplified and Practical Computational Grid Model Computing Pool: a Simplified and Pratial Computational Grid Model Peng Liu, Yao Shi, San-li Li Institute of High Performane Computing, Department of Computer Siene and Tehnology, Tsinghua University, Beijing,

More information

Partial Character Decoding for Improved Regular Expression Matching in FPGAs

Partial Character Decoding for Improved Regular Expression Matching in FPGAs Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia

More information

Algorithmica 2002 Springer-Verlag New York Inc.

Algorithmica 2002 Springer-Verlag New York Inc. Algorithmia (2002) 33: 183 200 DOI: 10.1007/s00453-001-0109-4 Algorithmia 2002 Springer-Verlag New York In. Effiient Parallel Graph Algorithms for Coarse-Grained Multiomputers and BSP 1 F. Dehne, 2 A.

More information

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization Self-Adaptive Parent to Mean-Centri Reombination for Real-Parameter Optimization Kalyanmoy Deb and Himanshu Jain Department of Mehanial Engineering Indian Institute of Tehnology Kanpur Kanpur, PIN 86 {deb,hjain}@iitk.a.in

More information

Routing Protocols for Wireless Ad Hoc Networks Hybrid routing protocols Theofanis Kilinkaridis

Routing Protocols for Wireless Ad Hoc Networks Hybrid routing protocols Theofanis Kilinkaridis Routing Protools for Wireless Ad Ho Networks Hyrid routing protools Theofanis Kilinkaridis tkilinka@.hut.fi Astrat This paper presents a partiular group of routing protools that aim to omine the advantages

More information

Fast Distribution of Replicated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon

Fast Distribution of Replicated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon ACEEE Int. J. on Information Tehnology, Vol. 3, No. 2, June 2013 Fast Distribution of Repliated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon Email: mmalli@aou.edu.lb

More information

Outline. CS38 Introduction to Algorithms. Administrative Stuff. Administrative Stuff. Motivation/Overview. Administrative Stuff

Outline. CS38 Introduction to Algorithms. Administrative Stuff. Administrative Stuff. Motivation/Overview. Administrative Stuff Outline CS38 Introdution to Algorithms Leture 1 April 1, 2014 administrative stuff motivation and overview of the ourse stale mathings example graphs, representing graphs graph traversals (BFS, DFS) onnetivity,

More information

Parallel Block-Layered Nonbinary QC-LDPC Decoding on GPU

Parallel Block-Layered Nonbinary QC-LDPC Decoding on GPU Parallel Blok-Layered Nonbinary QC-LDPC Deoding on GPU Huyen Thi Pham, Sabooh Ajaz and Hanho Lee Department of Information and Communiation Engineering, Inha University, Inheon, 42-751, Korea Abstrat This

More information

Vertex Unfoldings of Orthogonal Polyhedra: Positive, Negative, and Inconclusive Results

Vertex Unfoldings of Orthogonal Polyhedra: Positive, Negative, and Inconclusive Results CCCG 2018, Winnipeg, Canada, August 8 10, 2018 Vertex Unfoldings of Orthogonal Polyhedra: Positive, Negative, and Inonlusive Results Luis A. Garia Andres Gutierrrez Isaa Ruiz Andrew Winslow Abstrat We

More information

On Optimal Total Cost and Optimal Order Quantity for Fuzzy Inventory Model without Shortage

On Optimal Total Cost and Optimal Order Quantity for Fuzzy Inventory Model without Shortage International Journal of Fuzzy Mathemat and Systems. ISSN 48-9940 Volume 4, Numer (014, pp. 193-01 Researh India Puliations http://www.ripuliation.om On Optimal Total Cost and Optimal Order Quantity for

More information

Batch Auditing for Multiclient Data in Multicloud Storage

Batch Auditing for Multiclient Data in Multicloud Storage Advaned Siene and Tehnology Letters, pp.67-73 http://dx.doi.org/0.4257/astl.204.50. Bath Auditing for Multilient Data in Multiloud Storage Zhihua Xia, Xinhui Wang, Xingming Sun, Yafeng Zhu, Peng Ji and

More information

Writing Libraries in MPI*

Writing Libraries in MPI* Writing Libraries in MPI* Anthony Skjellumt Nathan E. Doss Purushotham V. Bangaloret Computer Siene Departmentt & NSF Engineering Researh Center for Computational Field Simulation Mississippi State University

More information

A Coarse-to-Fine Classification Scheme for Facial Expression Recognition

A Coarse-to-Fine Classification Scheme for Facial Expression Recognition A Coarse-to-Fine Classifiation Sheme for Faial Expression Reognition Xiaoyi Feng 1,, Abdenour Hadid 1 and Matti Pietikäinen 1 1 Mahine Vision Group Infoteh Oulu and Dept. of Eletrial and Information Engineering

More information

Path Diversity for Overlay Multicast Streaming

Path Diversity for Overlay Multicast Streaming Path Diversity for Overlay Multiast Streaming Matulya Bansal and Avideh Zakhor Department of Eletrial Engineering and Computer Siene University of California, Berkeley Berkeley, CA 9472 {matulya, avz}@ees.berkeley.edu

More information

C 2 C 3 C 1 M S. f e. e f (3,0) (0,1) (2,0) (-1,1) (1,0) (-1,0) (1,-1) (0,-1) (-2,0) (-3,0) (0,-2)

C 2 C 3 C 1 M S. f e. e f (3,0) (0,1) (2,0) (-1,1) (1,0) (-1,0) (1,-1) (0,-1) (-2,0) (-3,0) (0,-2) SPECIAL ISSUE OF IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION: MULTI-ROBOT SSTEMS, 00 Distributed reonfiguration of hexagonal metamorphi robots Jennifer E. Walter, Jennifer L. Welh, and Nany M. Amato Abstrat

More information

13.1 Numerical Evaluation of Integrals Over One Dimension

13.1 Numerical Evaluation of Integrals Over One Dimension 13.1 Numerial Evaluation of Integrals Over One Dimension A. Purpose This olletion of subprograms estimates the value of the integral b a f(x) dx where the integrand f(x) and the limits a and b are supplied

More information

Plot-to-track correlation in A-SMGCS using the target images from a Surface Movement Radar

Plot-to-track correlation in A-SMGCS using the target images from a Surface Movement Radar Plot-to-trak orrelation in A-SMGCS using the target images from a Surfae Movement Radar G. Golino Radar & ehnology Division AMS, Italy ggolino@amsjv.it Abstrat he main topi of this paper is the formulation

More information

Australian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message

Australian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message ISSN:1991-8178 Australian Journal of Basi and Applied Sienes Journal home page: www.ajbasweb.om A new Divide and Shuffle Based algorithm of Enryption for Text Message Dr. S. Muthusundari R.M.D. Engineering

More information

DECODING OF ARRAY LDPC CODES USING ON-THE FLY COMPUTATION Kiran Gunnam, Weihuang Wang, Euncheol Kim, Gwan Choi, Mark Yeary *

DECODING OF ARRAY LDPC CODES USING ON-THE FLY COMPUTATION Kiran Gunnam, Weihuang Wang, Euncheol Kim, Gwan Choi, Mark Yeary * DECODING OF ARRAY LDPC CODES USING ON-THE FLY COMPUTATION Kiran Gunnam, Weihuang Wang, Eunheol Kim, Gwan Choi, Mark Yeary * Dept. of Eletrial Engineering, Texas A&M University, College Station, TX-77840

More information

A Lightweight Intrusion-Tolerant Overlay Network

A Lightweight Intrusion-Tolerant Overlay Network A Lightweight Intrusion-Tolerant Overlay Network Rafael R. Obelheiro and Joni da Silva Fraga Department of Automation and Systems Federal University of Santa Catarina, Brazil Email: rro@das.ufs.br, fraga@das.ufs.br

More information

Direct-Mapped Caches

Direct-Mapped Caches A Case for Diret-Mapped Cahes Mark D. Hill University of Wisonsin ahe is a small, fast buffer in whih a system keeps those parts, of the ontents of a larger, slower memory that are likely to be used soon.

More information

Interconnect Delay Minimization through Interlayer Via Placement in 3-D ICs

Interconnect Delay Minimization through Interlayer Via Placement in 3-D ICs Interonnet Delay Minimization through Interlayer Via Plaement in -D ICs Vasilis F. Pavlidis, Eby G. Friedman Department of Eletrial and Computer Engineering University of Rohester Rohester, New York 467,

More information

Boundary Correct Real-Time Soft Shadows

Boundary Correct Real-Time Soft Shadows Boundary Corret Real-Time Soft Shadows Bjarke Jakobsen Niels J. Christensen Bent D. Larsen Kim S. Petersen Informatis and Mathematial Modelling Tehnial University of Denmark {bj, nj, bdl}@imm.dtu.dk, kim@deadline.dk

More information

Automated System for the Study of Environmental Loads Applied to Production Risers Dustin M. Brandt 1, Celso K. Morooka 2, Ivan R.

Automated System for the Study of Environmental Loads Applied to Production Risers Dustin M. Brandt 1, Celso K. Morooka 2, Ivan R. EngOpt 2008 - International Conferene on Engineering Optimization Rio de Janeiro, Brazil, 01-05 June 2008. Automated System for the Study of Environmental Loads Applied to Prodution Risers Dustin M. Brandt

More information

Episode 12: TCP/IP & UbiComp

Episode 12: TCP/IP & UbiComp Episode 12: TCP/IP & UbiComp Hannes Frey and Peter Sturm University of Trier Outline Introdution Mobile IP TCP and Mobility Conlusion Referenes [1] James D. Solomon, Mobile IP: The Unplugged, Prentie Hall,

More information