CACHE MEMORY DESIGN FOR INTERNET PROCESSORS

Size: px
Start display at page:

Download "CACHE MEMORY DESIGN FOR INTERNET PROCESSORS"

Transcription

1 CACHE MEMORY DESIGN FOR INTERNET PROCESSORS WE EVALUATE A SERIES OF THREE PROGRESSIVELY MORE AGGRESSIVE ROUTING-TABLE CACHE DESIGNS AND DEMONSTRATE THAT THE INCORPORATION OF HARDWARE CACHES INTO INTERNET PROCESSORS, COMBINED WITH EFFICIENT CACHING ALGORITHMS CAN SIGNIFICANTLY IMPROVE OVERALL PACKET FORWARDING PERFORMANCE. 2 Tz-cker Chueh Prashant Pradhan State Unversty of New York at Stony Brook As a result of the explodng bandwdth demand from the Internet, network router and swtch desgners are desgnng and fabrcatng a growng number of mcrochps specfcally for networkng devces rather than tradtonal computng applcatons. In partcular, a new breed of mcroprocessors, called Internet processors, has emerged that s desgned to effcently execute network protocols on varous types of nternetworkng devces ncludng swtches, routers, and applcaton-level gateways. One of the man tasks on the crtcal path of packet processng s route lookup. The routng lookup problem s equvalent to fndng the longest prefx of a packet s destnaton address n a table of address prefxes. 1 Although, effcent algorthms to solve ths problem exst, 2,3 the archtecture-level research queston s how to execute them at wre speed. For example, f the router s performance target s 10 mllon packets per second, the perpacket processng, ncludng longest prefx match, should be completed wthn 100 ns. Whle router desgners have made many attempts to buld specalzed hardware for clever packet routng and flterng algorthms, n ths work we chose a tme-tested archtectural dea, cachng, to attack ths problem. Ths s based on the belef that there s suffcent localty n the packet stream for reusng routng computaton results. However, cachng alone s not suffcent due to less localty n packet-address streams than the nstructon- and data-reference streams n program executon. Gven caches of a fxed confguraton, the only way to mprove the cache performance s to ncrease ther effectve coverage of the Internet protocol (IP) address space, that s, each cache entry must cover a larger porton of the IP address space. Toward ths end, our work develops a novel address-range-mergng technque by explotng the lmted number of outcomes for routng table lookup (the number of output nterfaces n a network devce) regardless of the sze of the IP address space. Our smulaton results demonstrate that address-range mergng mproves the cachng effcency by a factor of fve over generc IP host-address cachng, n terms of average routng tablelookup tme. Archtectural assumptons Because the major goal of our research s to explore the desgn space of cache /00/$ IEEE

2 subsystems for Internet processors, we dd not restrct ourselves to the conventonal CPU cache-hardware structures. Here, we explore three Internet processor cache desgns and ther detaled archtectural trade-offs usng trace-drven smulatons. (We use a packet trace collected from the egress router of a major natonal laboratory 4,5 and a routng table from the IPMA project. 6 Temporally spaced-apart peces of the trace were nterleaved to further reduce localty.) Note that the average routng table-lookup tme depends on both cache ht rato as well as cache mss penalty, whch s determned by the software algorthm used to perform routng-table lookup. Patrca tres 1 are very sutable data structures to match the longest prefx wthout backtrackng. Essentally, a tre s a bnary decson tree, whch can be populated wth a set of keys and can then used to search for a gven key or ts prefxes. The left and rght branches at an nternal node correspond to the value at a gven bt poston of the key beng 0 or 1 respectvely. Redundant nternal nodes that have only one branch may be collapsed together wthout loss of generalty. To fnd the longest matchng prefx of a key, the key s used to trace out a path n the tre, keepng track of the last key encountered along the path. However, they suffer from hgh worstcase lookup tmes, whch can equal as many accesses as the number of bts n the address, vz 32. In ths study, we chose the NART algorthm. 4 The NART data structure s essentally a three-level expanded tre that uses a tree of flat tables to encapsulate a tre. In the worst case, at most three flat table lookups are needed to perform a routng lookup. For the packet trace and routng table used n ths study, the average NART lookup tme s 120 CPU cycles on a Pentum-II 233- MHz machne. Baselne: Host address cache (HAC) Ths desgn s a generc CPU cache for routng table lookup, where the destnaton host address s treated as a address. Fgure 1 shows the baselne Internet processor cache archtecture, whch s dentcal to a conventonal CPU cache. We wanted to dentfy dfferences n localty characterstcs between network packet streams and program reference streams, and to establsh the Destnaton IP address Index Compare Match? baselne model aganst whch subsequent cache desgn alternatves are compared. So we performed generc cache smulatons on the trace by varyng the cache sze, cache block sze, and the degree of assocatvty. The results 5 show that the cache sze and degree of assocatvty have a smlar performance effect on the Internet processor cache as on the CPU cache. However, a dstnct dfference between network-packet streams and program-reference streams s that the former lacks spatal localty. Evdence of ths s that for a gven cache sze and degree of assocatvty, decreasng the block sze monotoncally decreases the cache mss rato. In fact, the performance dfference could be dramatc between cache confguratons that are dentcal except for the block sze. For example, the mss ratos of a four-way, set-assocatve, 8- Kbyte-entry cache wth a 32-entry block sze and one wth one-entry block sze are nearly an order of a magntude apart, 38.05% versus 3.29%. From ths study, we conclude that the block sze of a network processor cache should always be small, preferably one entry wde. Host address range cache (HARC) Ths desgn s an mprovement over HAC. Each routng table entry corresponds to a contguous range of the IP address space. Therefore, nstead of cachng ndvdual destnaton host addresses, an Internet processor cache can cover a larger porton of the IP address space f each cache entry corresponds to a host address range. Each routng table entry corresponds to a contguous range of the IP address Select Data JANUARY FEBRUARY 2000 Output Fgure 1. The baselne Internet processor cache archtecture, whch s dentcal to generc CPU caches. 3

3 CACHE DESIGN 4 Destnaton IP address Rght shfter Index IEEE MICRO Range sze Compare Match? Select Data Output Fgure 2. The Internet processor cache archtecture that caches host address ranges rather than ndvdual host addresses. space. If a network packet s destnaton address falls wthn a routng table entry s range, the Internet processor should route t to that entry s output nterface. A cache desgn could explot ths to ncrease the effectve coverage of a host address cache, by cachng host address ranges nstead of ndvdual addresses. Network addresses need to go through two addtonal processng steps before HARC can be put to practcal use. Wth the longest prefx match requrement, t s possble that the address range correspondng to a routng table entry covers the address range correspondng to some other routng table entry. The former s an encompassng routng table entry, whle the latter s an encompassed entry. An encompassng entry s network address s a prefx of those entres t encompasses. We need to cull the address range assocated wth each encompassed routng table entry away from the address ranges of all the entres that encompass t. Ths ensures that every address range n the IP address space s covered by exactly one routng table entry, and hence a packet whose destnaton address falls n an address range has a unque lookup result. Next, we merge adjacent address ranges that share the same output nterface nto larger ranges. Once ths mergng s done, these ranges are algned; that s, ranges are potentally splt to make all range szes powers of two and to make startng addresses of all ranges algned wth a multple of ther sze. Then, the mnmum of all resultng address range szes s calculated, gvng us the mnmum_range_granularty parameter of HARC. Range sze, whch s defned as log(mnmum_range_granularty), thus represents the number of least sgnfcant bts of an IP address that could be gnored durng routng table lookup, snce destnaton addresses wthn a mnmum address range sze are guaranteed to have the same lookup result. Fgure 2 shows the hardware archtecture of the HARC, whch s the baselne cache augmented wth a logcal shfter. The destnaton address of an ncomng packet s rght shfted by range sze before t s fed to the baselne cache. Because each address range corresponds to a cacheable tem, the sze of HARC s effectve coverage of the IP address space mproves by a factor of mnmum_range_granularty. We processed the routng table accordng to these steps, and calculated the range sze parameter, whch turned out to be 5. Ths means that each HARC entry now corresponds to a contguous range of 32 addresses, a factor of 32 ncrease n the cache s effectve coverage. Evaluatng ths desgn aganst HAC shows that HAC s mss rato s between 1.68 to 2.10 tmes hgher than that of HARC. In terms of average routng table-lookup tme, HARC s 58% to 78% faster than HAC, assumng that the ht access tme s one cycle and the mss penalty s 120 cycles. Intellgent host address range cache (IHARC) Ths desgn represents a further performance optmzaton and an mprovement over HARC. The number of dstnct outcomes of routng table lookups s equal to the number of output nterfaces n a router and s thus relatvely small. As a result, we could choose a dfferent hash functon than that used n generc CPUs to combne dsjont host address ranges that share the same routng table lookup result nto a larger logcal host address set. IHARC maps each such logcal host address to one cache entry. Ths technque thus further ncreases the Internet processor cache s coverage of the IP address space. A tradtonal CPU cache drectly takes the least sgnfcant bts of a gven address, and uses them to ndex nto the data and tag arrays. Therefore, the correspondng hash functon s a smple selector functon usng the least sgnfcant K

4 Output nterface Index bt x x x x Host address A C B Fgure 3. A routng table example that llustrates the usefulness of carefully choosng the ndex bts. The number of dstnct address ranges s reduced from 8 to 3 (labeled A, B, and C, and shown grouped usng dashed, sold, and dotted lnes respectvely). bts of the nput address, where 2 K s the number of cache sets. We show that t s possble to further ncrease every cache entry s coverage of the IP address space by choosng a more approprate hash functon for cache lookup. Consder, for example, the routng table n Fgure 3, where there are 16 four-bt host addresses wth three dstnct output nterfaces: 1, 2, and 3. The mergng algorthm used n calculatng the range sze of the HARC wll stop after t combnes all adjacent address ranges wth dentcal output nterfaces. In ths case, the total number of address ranges s eght, because the mnmum-range-granularty s two. To further grow the address range that a cache entry can cover, we could choose the ndex bts carefully so that when they are gnored, some of the dentcally labeled address ranges are now adjacent and thus could be combned. For example, f we choose the 1th bt as the ndex bt nto the data and tag array, we can merge the host addresses 0000, 0001, 0100, and 0101 nto an address range. Ths s because they have the same output nterface (1), and when the 1th bt s gnored, they form a contguous sequence, 000, 001, 010, and 011. Smlarly, we could also merge 1000, 1001, 1100, and 1101 nto an address range, as well as all the host addresses whose correspondng output nterface, as shown n Fgure 3, s 2. Wth ths choce of the ndex bt, the total number of address ranges to dstngush durng cache lookup s reduced from 8 to 3. IHARC selects a set of K ndex bts n the destnaton address that correspond to 2 K cache sets. Each cache set corresponds to a partton of the IP address space. In a partton, some address ranges that were not orgnally adjacent n the IP address space wll become adjacent. IHARC then merges any adjacent ranges that are dentcally labeled nto larger ranges. Thus, gven a set S contanng K bts, we get a set of dstnct address ranges for every partton (or cache set). The number of such ranges becomes the metrc M(S) of the set. Snce dstnct address ranges n a cache set need unque tags, the number of dstnct address ranges n a cache set represents the degree of contenton n the cache set. Thus, IHARC selects the ndex bts n such a way that after the mergng operaton, the total number of address ranges n the entre address space and the dfference between the number of address ranges across cache sets s mnmzed. The ndex bt selecton algorthm s a greedy algorthm that grows a set of bts to nclude n the ndex bt set from 0 to K. Gven a set S of bts that the algorthm has already ncluded n the ndex bt set, t computes the desrablty of ncludng bt j n the set by computng the metrc M (S {j}) for each partton nduced by the bt set S {j}. The algorthm then chooses the bt j that mnmzes M ( S { j}) + W M( S { j}) M ( S { j}) where M S,j s the mean of M (S {j}) over all parttons. W s a parameter that determnes the relatve weght of the two terms n the mnmzaton. Note that the second term of the weghted sum mnmzes the devaton of ndvdual sets metrc from the mean, and s ncluded to prevent the occurrence of hot-spot JANUARY FEBRUARY

5 CACHE DESIGN 6 Destnaton IP address Rght shfter Programmable hash engne Index IEEE MICRO Range sze Mask Compare Match? Select Data Output Fgure 4. The ntellgent host address range cache archtecture n whch a programmable hash engne provdes the flexblty needed to talor the hash functon to the network routng table. parttons, whch potentally could lead to excessve conflct msses n the IHARC cache sets. Fgure 4 shows the hardware archtecture of a host address range cache wth a programmable hash functon engne that lets us talor the choce of the ndex bt set to ndvdual routng tables. Gven an N-bt address, the K ndex bts select a partcular cache set, whch corresponds to one of the parttons nduced by IHARC. The remanng N K bts of the address form a value that falls wthn one of the address ranges n ths partton. Every cache entry holds a range that acts as the tag for the entry. Thus, a range check s requred to fgure out whether a lookup s a ht. Snce a general range check s too expensve to ncorporate nto cachng hardware, the algorthm guarantees that each resultng address range sze s a power of two and that the startng address of each range s algned wth a multple of ts sze durng the merge step. Hence, the range check s performed smply by a mask-and-compare operaton. Therefore, each tag entry n IHARC ncludes a tag feld as well as a mask feld. The prce of smplfyng cache lookup hardware s an ncrease n the number of resultng address ranges, as compared to the nstance when no such algnment requrement s mposed. In case of a mss, the algorthm can perform lookup of the NART data structure to populate the cache set wth the approprate address range as the tag. Compared to the generc HARC, IHARC reduces the number of dstnct address ranges that t needs to dstngush, by a careful choce of the ndex bts. In partcular, for the IPMA routng table, 6 the ndex bt set selecton algorthm effectvely reduces the number of dstnct address ranges from HARC to IHARC by three orders of magntude. In addton, ths number s only three to four tmes the number of entres n the orgnal routng table, even though conventonal cache lookup hardware can now look up the resultant address ranges. For the packet trace used n the study, Table 1 lsts the mss rato and lookup tme comparson between HAC, HARC, and IHARC, assumng that the block sze s one entry wde. In terms of average routng table-lookup tme, HARC s between 2.24 and 3.18 tmes slower than IHARC. Ths s because HARC s mss ratos are 2.91 to 7.09 tmes larger than IHARC s. In addton, the mss rato gap between HARC and IHARC ncreases wth the degree of assocatvty, because the degree of varaton n the address stream, as seen by IHARC, s lower than that seen by HARC. Hence, IHARC benefts more from elmnatng conflct msses through hgher assocatvty. Ths result conclusvely demonstrates that there s sgnfcant performance mprovement ganed from IHARC over HARC. Compared to HAC, IHARC reduces the average routng table lookup tme by up to a factor of fve. These results are one of the frst research efforts on cache desgns for emergng Internet processors. Based upon the trace used n our study, t seems that there s suffcent temporal localty n the packet stream to justfy the use of a routng table cache n Internet processors. However, due to weak spatal localty, the block sze should be as small as possble, preferably one-entry wde. Furthermore, cachng address ranges rather than ndvdual addresses greatly mproves the effectve coverage of caches of a gven sze and

6 therefore ther ht ratos. Fnally, a careful choce of the ndex bts durng cache lookup s crucal and can dramatcally reduce the number of address ranges that need dstngushng, and thus reduce the cache mss rato. The man applcaton of the cache desgn descrbed here s to edge routers, where the temporal localty of network packets s hgher than that n backbone routers. Because edge routers account for a majorty of commercal routers sold today, we beleve that the proposed cache desgn wll have sgnfcant practcal mpact on future network processor products. We are plannng to extend the dea of a network processor cache to attack the problem of packet classfcaton, whch requres examnaton of multple packet header felds and thus a longer lookup key. In addton, we are nvestgatng schemes to ncrementally update the network processor cache n the presence of frequent route updates wthout nvaldatng the entre cache. MICRO References 1. W. Doernger, G. Karjoth, and M. Nasseh, Routng on Longest Matchng Prefxes, IEEE/ACM Transactons on Networkng, Vol. 4, No.1, Feb. 1996, pp M. Waldvogel, et al., Scalable Hgh Speed IP Routng Lookups, Proc. ACM Sgcomm 97, ACM Press, New York, 1997, pp V. Srnvasan and G. Varghese, Faster IP Lookups Usng Controlled Prefx Expanson, Proc. ACM Sgmetrcs, ACM Press, 1998, pp T. Chueh and P. Pradhan, Hgh Performance IP Routng Table Lookup usng CPU Cachng, Proc. IEEE Infocom 99, IEEE, New York, 1999, pp T. Chueh and P. Pradhan, Cache Memory Desgn for Network Processors, Proc. IEEE HPCA-6, IEEE Computer Socety, Los Alamtos, Calf., Table 1. Mss rato and lookup tme comparson for the IHARC, HARC and HAC, assumng that the block sze s one entry wde.* Mss Mss Mss Lookup Lookup Lookup Cache rato rato rato tme tme tme sze Assocatvty IHARC HARC HAC IHARC HARC HAC 4K % 7.5% 12.71% % 4.58% 8.42% % 3.64% 6.86% K % 4.48% 7.57% % 2.20% 4.59% % 1.56% 3.29% * The nput to the cache smulator s a packet trace collected from the man router of Brookhaven Natonal Laboratory. The HARC s range sze s 5. Lookup tmes are reported n cycles. Ht access tme s one cycle, whereas mss penalty s 120 cycles. 6. Mchgan Unversty and Mert Network, Internet Performance Measurement and Analyss (IPMA) Project ; Tz-cker Chueh s an assocate professor n the Computer Scence Department of the State Unversty of New York at Stony Brook. Hs research nterests are 3D graphcs archtecture, scalable and secure network routers and gateways, and hgh-performance and storage systems. Chueh receved a BS n electrcal engneerng from Natonal Tawan Unversty, an MS n computer scence from Stanford Unversty, and a PhD n computer scence from the Unversty of Calforna, Berkeley. He receved a Natonal Scence Foundaton Career award n Prashant Pradhan s a PhD student n the Computer Scence Department of the State Unversty of New York at Stony Brook. He receved hs BTech n computer scence and engneerng from the Indan Insttute of Technology n Delh, Inda. Hs research nterests are hgh-speed networkng and operatng systems. Drect questons about ths artcle to Prashant Pradhan, State Unversty of New York at Stony Brook, Computer Scence Department, Stony Brook, NY ; prashant@cs.sunysb.edu. JANUARY FEBRUARY

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier Some materal adapted from Mohamed Youns, UMBC CMSC 611 Spr 2003 course sldes Some materal adapted from Hennessy & Patterson / 2003 Elsever Scence Performance = 1 Executon tme Speedup = Performance (B)

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Assembler. Building a Modern Computer From First Principles.

Assembler. Building a Modern Computer From First Principles. Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Cache Performance 3/28/17. Agenda. Cache Abstraction and Metrics. Direct-Mapped Cache: Placement and Access

Cache Performance 3/28/17. Agenda. Cache Abstraction and Metrics. Direct-Mapped Cache: Placement and Access Agenda Cache Performance Samra Khan March 28, 217 Revew from last lecture Cache access Assocatvty Replacement Cache Performance Cache Abstracton and Metrcs Address Tag Store (s the address n the cache?

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

ELEC 377 Operating Systems. Week 6 Class 3

ELEC 377 Operating Systems. Week 6 Class 3 ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Conditional Speculative Decimal Addition*

Conditional Speculative Decimal Addition* Condtonal Speculatve Decmal Addton Alvaro Vazquez and Elsardo Antelo Dep. of Electronc and Computer Engneerng Unv. of Santago de Compostela, Span Ths work was supported n part by Xunta de Galca under grant

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems S. J and D. Shn: An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems 2355 An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems Seunggu J and Dongkun Shn, Member,

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Today s Outline. Sorting: The Big Picture. Why Sort? Selection Sort: Idea. Insertion Sort: Idea. Sorting Chapter 7 in Weiss.

Today s Outline. Sorting: The Big Picture. Why Sort? Selection Sort: Idea. Insertion Sort: Idea. Sorting Chapter 7 in Weiss. Today s Outlne Sortng Chapter 7 n Wess CSE 26 Data Structures Ruth Anderson Announcements Wrtten Homework #6 due Frday 2/26 at the begnnng of lecture Proect Code due Mon March 1 by 11pm Today s Topcs:

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe CSCI 104 Sortng Algorthms Mark Redekopp Davd Kempe Algorthm Effcency SORTING 2 Sortng If we have an unordered lst, sequental search becomes our only choce If we wll perform a lot of searches t may be benefcal

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Sorting Review. Sorting. Comparison Sorting. CSE 680 Prof. Roger Crawfis. Assumptions

Sorting Review. Sorting. Comparison Sorting. CSE 680 Prof. Roger Crawfis. Assumptions Sortng Revew Introducton to Algorthms Qucksort CSE 680 Prof. Roger Crawfs Inserton Sort T(n) = Θ(n 2 ) In-place Merge Sort T(n) = Θ(n lg(n)) Not n-place Selecton Sort (from homework) T(n) = Θ(n 2 ) In-place

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

Insertion Sort. Divide and Conquer Sorting. Divide and Conquer. Mergesort. Mergesort Example. Auxiliary Array

Insertion Sort. Divide and Conquer Sorting. Divide and Conquer. Mergesort. Mergesort Example. Auxiliary Array Inserton Sort Dvde and Conquer Sortng CSE 6 Data Structures Lecture 18 What f frst k elements of array are already sorted? 4, 7, 1, 5, 1, 16 We can shft the tal of the sorted elements lst down and then

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL)

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL) Crcut Analyss I (ENG 405) Chapter Method of Analyss Nodal(KCL) and Mesh(KVL) Nodal Analyss If nstead of focusng on the oltages of the crcut elements, one looks at the oltages at the nodes of the crcut,

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Smoothing Spline ANOVA for variable screening

Smoothing Spline ANOVA for variable screening Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory

More information

CSE 326: Data Structures Quicksort Comparison Sorting Bound

CSE 326: Data Structures Quicksort Comparison Sorting Bound CSE 326: Data Structures Qucksort Comparson Sortng Bound Steve Setz Wnter 2009 Qucksort Qucksort uses a dvde and conquer strategy, but does not requre the O(N) extra space that MergeSort does. Here s the

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

4/11/17. Agenda. Princeton University Computer Science 217: Introduction to Programming Systems. Goals of this Lecture. Storage Management.

4/11/17. Agenda. Princeton University Computer Science 217: Introduction to Programming Systems. Goals of this Lecture. Storage Management. //7 Prnceton Unversty Computer Scence 7: Introducton to Programmng Systems Goals of ths Lecture Storage Management Help you learn about: Localty and cachng Typcal storage herarchy Vrtual memory How the

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

An Improved Image Segmentation Algorithm Based on the Otsu Method

An Improved Image Segmentation Algorithm Based on the Otsu Method 3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Configuration Management in Multi-Context Reconfigurable Systems for Simultaneous Performance and Power Optimizations*

Configuration Management in Multi-Context Reconfigurable Systems for Simultaneous Performance and Power Optimizations* Confguraton Management n Mult-Context Reconfgurable Systems for Smultaneous Performance and Power Optmzatons* Rafael Maestre, Mlagros Fernandez Departamento de Arqutectura de Computadores y Automátca Unversdad

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications 14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of

More information

y and the total sum of

y and the total sum of Lnear regresson Testng for non-lnearty In analytcal chemstry, lnear regresson s commonly used n the constructon of calbraton functons requred for analytcal technques such as gas chromatography, atomc absorpton

More information

CHAPTER 4 PARALLEL PREFIX ADDER

CHAPTER 4 PARALLEL PREFIX ADDER 93 CHAPTER 4 PARALLEL PREFIX ADDER 4.1 INTRODUCTION VLSI Integer adders fnd applcatons n Arthmetc and Logc Unts (ALUs), mcroprocessors and memory addressng unts. Speed of the adder often decdes the mnmum

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Sorting. Sorting. Why Sort? Consistent Ordering

Sorting. Sorting. Why Sort? Consistent Ordering Sortng CSE 6 Data Structures Unt 15 Readng: Sectons.1-. Bubble and Insert sort,.5 Heap sort, Secton..6 Radx sort, Secton.6 Mergesort, Secton. Qucksort, Secton.8 Lower bound Sortng Input an array A of data

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Run-Time Operator State Spilling for Memory Intensive Long-Running Queries

Run-Time Operator State Spilling for Memory Intensive Long-Running Queries Run-Tme Operator State Spllng for Memory Intensve Long-Runnng Queres Bn Lu, Yal Zhu, and lke A. Rundenstener epartment of Computer Scence, Worcester Polytechnc Insttute Worcester, Massachusetts, USA {bnlu,

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Classification Based Mode Decisions for Video over Networks

Classification Based Mode Decisions for Video over Networks Classfcaton Based Mode Decsons for Vdeo over Networks Deepak S. Turaga and Tsuhan Chen Advanced Multmeda Processng Lab Tranng data for Inter-Intra Decson Inter-Intra Decson Regons pdf 6 5 6 5 Energy 4

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Adaptive Load Shedding for Windowed Stream Joins

Adaptive Load Shedding for Windowed Stream Joins Adaptve Load Sheddng for Wndowed Stream Jons Buğra Gedk, Kun-Lung Wu, Phlp S. Yu, Lng Lu College of Computng, Georga Tech Atlanta GA 333 {bgedk,lnglu}@cc.gatech.edu IBM T. J. Watson Research Center Yorktown

More information

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT 3. - 5. 5., Brno, Czech Republc, EU APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT Abstract Josef TOŠENOVSKÝ ) Lenka MONSPORTOVÁ ) Flp TOŠENOVSKÝ

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information

Sample Solution. Advanced Computer Networks P 1 P 2 P 3 P 4 P 5. Module: IN2097 Date: Examiner: Prof. Dr.-Ing. Georg Carle Exam: Final exam

Sample Solution. Advanced Computer Networks P 1 P 2 P 3 P 4 P 5. Module: IN2097 Date: Examiner: Prof. Dr.-Ing. Georg Carle Exam: Final exam Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Decson surface s a hyperplane (lne n 2D) n feature space (smlar to the Perceptron) Arguably, the most mportant recent dscovery n machne learnng In a nutshell: map the data to a predetermned

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

A Fast IP Routing Lookup Scheme for Gigabit Switching Routers

A Fast IP Routing Lookup Scheme for Gigabit Switching Routers A Fast IP Routng Looup cheme for Ggabt wtchng Routers Nen-Fu Huang, h-mng Zhao, Jen-Y Pan, and Ch-An u Department of Computer cence, Natonal Tsng Hua Unversty Hsn-Chu, Tawan, 343, R.O.C. E-mal: {nfhuang,

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

BIN XIA et al: AN IMPROVED K-MEANS ALGORITHM BASED ON CLOUD PLATFORM FOR DATA MINING

BIN XIA et al: AN IMPROVED K-MEANS ALGORITHM BASED ON CLOUD PLATFORM FOR DATA MINING An Improved K-means Algorthm based on Cloud Platform for Data Mnng Bn Xa *, Yan Lu 2. School of nformaton and management scence, Henan Agrcultural Unversty, Zhengzhou, Henan 450002, P.R. Chna 2. College

More information

Self-tuning Histograms: Building Histograms Without Looking at Data

Self-tuning Histograms: Building Histograms Without Looking at Data Self-tunng Hstograms: Buldng Hstograms Wthout Lookng at Data Ashraf Aboulnaga Computer Scences Department Unversty of Wsconsn - Madson ashraf@cs.wsc.edu Surajt Chaudhur Mcrosoft Research surajtc@mcrosoft.com

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Cache Memories. Lecture 14 Cache Memories. Inserting an L1 Cache Between the CPU and Main Memory. General Org of a Cache Memory

Cache Memories. Lecture 14 Cache Memories. Inserting an L1 Cache Between the CPU and Main Memory. General Org of a Cache Memory Topcs Lecture 4 Cache Memores Generc cache memory organzaton Drect mapped caches Set assocate caches Impact of caches on performance Cache Memores Cache memores are small, fast SRAM-based memores managed

More information

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces Range mages For many structured lght scanners, the range data forms a hghly regular pattern known as a range mage. he samplng pattern s determned by the specfc scanner. Range mage regstraton 1 Examples

More information

Array transposition in CUDA shared memory

Array transposition in CUDA shared memory Array transposton n CUDA shared memory Mke Gles February 19, 2014 Abstract Ths short note s nspred by some code wrtten by Jeremy Appleyard for the transposton of data through shared memory. I had some

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Adaptive Load Shedding for Windowed Stream Joins

Adaptive Load Shedding for Windowed Stream Joins Adaptve Load Sheddng for Wndowed Stream Jons Bu gra Gedk College of Computng, GaTech bgedk@cc.gatech.edu Kun-Lung Wu, Phlp Yu T.J. Watson Research, IBM {klwu,psyu}@us.bm.com Lng Lu College of Computng,

More information

Research Article Energy Efficient Interest Forwarding in NDN-Based Wireless Sensor Networks

Research Article Energy Efficient Interest Forwarding in NDN-Based Wireless Sensor Networks Moble Informaton Systems Volume 2016, Artcle ID 3127029, 15 pages http://dx.do.org/10.1155/2016/3127029 Research Artcle Energy Effcent Interest Forwardng n NDN-Based Wreless Sensor Networks Shua Gao, 1

More information

Optimizing Document Scoring for Query Retrieval

Optimizing Document Scoring for Query Retrieval Optmzng Document Scorng for Query Retreval Brent Ellwen baellwe@cs.stanford.edu Abstract The goal of ths project was to automate the process of tunng a document query engne. Specfcally, I used machne learnng

More information

Sorting: The Big Picture. The steps of QuickSort. QuickSort Example. QuickSort Example. QuickSort Example. Recursive Quicksort

Sorting: The Big Picture. The steps of QuickSort. QuickSort Example. QuickSort Example. QuickSort Example. Recursive Quicksort Sortng: The Bg Pcture Gven n comparable elements n an array, sort them n an ncreasng (or decreasng) order. Smple algorthms: O(n ) Inserton sort Selecton sort Bubble sort Shell sort Fancer algorthms: O(n

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

CSE 326: Data Structures Quicksort Comparison Sorting Bound

CSE 326: Data Structures Quicksort Comparison Sorting Bound CSE 326: Data Structures Qucksort Comparson Sortng Bound Bran Curless Sprng 2008 Announcements (5/14/08) Homework due at begnnng of class on Frday. Secton tomorrow: Graded homeworks returned More dscusson

More information

Journal of Chemical and Pharmaceutical Research, 2014, 6(6): Research Article. A selective ensemble classification method on microarray data

Journal of Chemical and Pharmaceutical Research, 2014, 6(6): Research Article. A selective ensemble classification method on microarray data Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(6):2860-2866 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A selectve ensemble classfcaton method on mcroarray

More information

A fair buffer allocation scheme

A fair buffer allocation scheme A far buffer allocaton scheme Juha Henanen and Kalev Klkk Telecom Fnland P.O. Box 228, SF-330 Tampere, Fnland E-mal: juha.henanen@tele.f Abstract An approprate servce for data traffc n ATM networks requres

More information

Dynamic Voltage Scaling of Supply and Body Bias Exploiting Software Runtime Distribution

Dynamic Voltage Scaling of Supply and Body Bias Exploiting Software Runtime Distribution Dynamc Voltage Scalng of Supply and Body Bas Explotng Software Runtme Dstrbuton Sungpack Hong EE Department Stanford Unversty Sungjoo Yoo, Byeong Bn, Kyu-Myung Cho, Soo-Kwan Eo Samsung Electroncs Taehwan

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

Transaction-Consistent Global Checkpoints in a Distributed Database System

Transaction-Consistent Global Checkpoints in a Distributed Database System Proceedngs of the World Congress on Engneerng 2008 Vol I Transacton-Consstent Global Checkponts n a Dstrbuted Database System Jang Wu, D. Manvannan and Bhavan Thurasngham Abstract Checkpontng and rollback

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information