Accurate and Efficient Traffic Monitoring Using Adaptive Non-linear Sampling Method

Size: px
Start display at page:

Download "Accurate and Efficient Traffic Monitoring Using Adaptive Non-linear Sampling Method"

Transcription

1 This full text paper was peer reviewed at the directio of IEEE Commuicatios Society subject matter experts for publicatio i the IEEE INFOCOM 8 proceedigs. Accurate ad Efficiet Traffic Moitorig Usig Adaptive No-liear Samplig Method Chegche Hu, Sheg Wag, Jia Tia, Bi Liu Tsighua Uiversity Beijig, Chia, 184 {hucc3,wags4,tiaj4}@mails.tsighua.edu.c liub@tsighua.edu.c Yu Cheg Illiois Istitute of Techology Chicago, IL USA, 6616 cheg@iit.edu Ya Che Northwester Uiversity Evasto, IL USA, 68 yche@orthwester.edu Abstract Samplig techology has bee widely deployed i measuremet systems to cotrol memory cosumptio ad processig overhead. However, most of the existig samplig methods suffer from large estimatio errors i aalyzig small-size flows. To address the problem, we propose a ovel adaptive o-liear samplig (ANLS) method for passive measuremet. Istead of statically cofigurig the samplig rate, ANLS dyamically adjusts the samplig rate for a flow depedig o the umber of packets havig bee couted. We provide the geeric priciples guidig the selectio of samplig fuctio for samplig rate adjustmet. Moreover, we derive the ubiased estimatio, the boud of the, ad the boud of required couter size for ANLS. The performace of ANLS is thoroughly studied through theoretic aalysis ad experimets uder sythetic/real etwork data traces, with compariso to several related samplig methods. The results demostrate that the proposed ANLS ca sigificatly improve the estimatio accuracy, particularly for small-size flows, while maitai a memory ad processig overhead comparable to existig methods. I. INTRODUCTION The Iteret has bee evolvig ito a commo commuicatio ifrastructure supportig a variety of applicatios, which at the same time requires dedicated etwork maagemet to ecessary quality of service provisio. Passive traffic measuremet is very importat to etwork maagemet, which ca provide various etwork status iformatio icludig traffic matrix, packet legth distributios, traffic volumes, sessio duratios, etc., to be exploited for chargig, egieerig, maagig, ad securig the commuicatio etworks [1] []. With the cotiuous icreasig of lie speed ad umber of flows, per-flow passive measuremet has become a challegig task due to the demadig requiremets o both memory size ad memory badwidth. Off-the-shelf memory is either high speed or high capacity. Large capacity DRAM ca hold more flow records but its low speed limits the samplig rate. Fast SRAM supports high speed samplig but is susceptible to overflow due to limited memory capacity. Thus, it is ecessary to develop a efficiet samplig method for This work is partly supported by NSFC (657311, 6651), Chia 973 program(7cb317),the Cultivatio Fud of the Key Scietific ad Techical Iovatio Project, MoE, Chia (753), the Specialized Research Fud for the Doctoral Program of Higher Educatio of Chia (6358), Tsighua Basic Research Foudatio(JCpy554). compromisig the above cotradictio [3] [4] [5] [6]. There are two geeric samplig approaches for passive measuremet: packet samplig ad flow samplig. The former samples each packet idepedetly with a certai probability, while the latter samples packets at the graularity of flows (i.e., packets i differet flows are sampled with differet samplig rates). The passive measuremet system/ifrastructure typically cosists of three compoets. A moitorig compoet tapped ito the etwork lik uses a samplig strategy to select packets ad forwards them to a reportig compoet. The reportig compoet aggregates the packet iformatio ito flow records ad exports them to a remote data ceter ad aalysis system compoet. The data ceter is equipped with high-desity data storage, which makes the measuremet results available to the aalysis system for differet applicatios. I this paper, we focus o the samplig strategy for the moitorig compoet ad study how to desig a efficiet samplig scheme that eables precise estimatios with a reasoable cost. A efficiet samplig method is expected to be applicable to differet types of applicatios, where differet sizes of flows may be of importace. For example, flow-level usage accoutig is essetial for maagemet applicatios [4] [5] [7], e.g., usage-based chargig/pricig, etwork plaig, ad traffic egieerig. For usage accoutig, the mai target is to catch the elephat flows (i.e., the flows of large size). For etwork security applicatios, the flow-level traffic patters ofte help reveal aomalies [8] [9] [1]. A typical sceario, a sharp icrease of 4 bytes TCP flows with oly oe packet is probably caused by SYN floodig attacks or flash crowds. Ulike the usage accoutig, etwork security applicatios require accurate estimatio o mice flows (i.e., the flows of small size). It is the diverse applicatio requiremets that motivate us to develop a ew samplig method, which should boud the estimatio error for both small ad large flows. The existig static samplig (SS) methods (as adopted by [3] [11] [1] [13]) selects packets with the same samplig rate/probability p. It ca be proved that the ubiased estimatio value of the is c/p ad the of this estimatio is (1/p 1)/, where p is the static samplig rate, c is the couter value for a sampled flow ad is the i terms of umber of packets (See the proof i Appedix). From the results, we ca see that the major problem of /8/$5. 8 IEEE

2 This full text paper was peer reviewed at the directio of IEEE Commuicatios Society subject matter experts for publicatio i the IEEE INFOCOM 8 proceedigs. employig the static samplig method is its itolerably high for small flows. For istace, the will be 3% with p =.1 ad = 1. Usig a larger p ca mitigate the but lead to higher memory cosumptio, which coflicts with the purpose of samplig. I this paper, we propose a adaptive o-liear samplig (ANLS) method for passive measuremet. Istead of statically cofigurig the samplig rate, ANLS dyamically tues the samplig rate for a flow depedig o the umber of packets havig bee samples, which is maitaied by a couter. The ituitio of ANLS is to use a large samplig rate for small flows ad a small samplig rate for large flows. Specifically, this paper cotributes i the followig three aspects: 1) We provide the geeral priciples guidig the selectio of samplig fuctio for samplig rate adjustmet. The samplig rate is adjusted accordig to the couter value. There is o eed to predict or estimate the distributio. ) We derive the ubiased estimatio, the boud of the, ad the boud of the required couter size for ANLS. 3) The performace of ANLS is thoroughly ivestigated through theoretic aalysis ad experimets uder sythetic/real etwork data traces, with compariso to several related samplig methods. The results demostrate that the proposed ANLS sigificatly improve the estimatio accuracy, particularly for small-size flows, while maitaiig a memory ad processig overhead comparable to those of existig methods. Furthermore, distributio has almost o impact o the estimatio accuracy. The rest of the paper is orgaized as follows. Sectio II reviews the related work. Sectio III presets the proposed ANLS method. Sectio IV demostrates the properties of ANLS. Sectio V evaluates the performace of ANLS. Sectio VI gives the cocludig remarks. II. RELATED WORK A pioeerig work o statistical traffic samplig was published i [3], which uses static samplig to estimate the packet size distributio i a backboe etwork. The primary flowlevel measuremet tool used by etwork operators owadays is NetFlow [14], which resorts to packet samplig (kow as sampled NetFlow [13]), to hadle the large traffic volume ad diversity i high speed liks. Cosiderig the multi-hop feature of most flows, the work [11] [1] deployed the samplig system i a distributed maer for the purpose of passive measuremet. The sample ad hold method was itroduced i [7], which uses a small ad fast memory to process every packet i a real-time maer. This method is used to capture large flows but ot for small flows. CATE was proposed i [15] which estimates the proportio of each flow by makig multiple comparisos for each arrival ad coutig the umber of coicideces. This method is accurate for media-size ad large-size flows but is ot accurate for small-size flows. I the cotext of adaptive samplig, several mechaisms are itroduced for differet purposes. Better NetFlow (BNF) was Notatios c c t p P (c) f(c) b ˆ Q i () k p f u TABLE I TABLE OF NOTATIONS Descriptios the couter value the couter value i time t the static samplig rate the samplig rate whe the couter value is c, usig ANLS the samplig fuctio which is used to calculate P (c) the parameter of ANLS defied i f(c) the actual the estimatio of the probability that c = i whe actual is the parameter of CATE method the fial samplig rate of BNF the parameter of the samplig fuctio defied i Sectio IV proposed i [6] to improve memory utilizatio by a adaptive liear samplig method. A relatively large samplig rate is cofigured at the begiig of the measuremet iterval ad will adaptively decrease whe possible memory overflow is detected. A size-depedet samplig (SDS) mechaism was preseted i [5]. A flow whose size is larger tha z is always selected, while the flow with size x < z is sampled with probability x/z. The authors i [16] provided a importat theorem specifyig the miimum umber of packet samples required to be sampled to guaratee the expected, ad they also proposed a adaptive radom samplig (ARS) method. However, to utilize their theorem, it is required to first estimate the total packet amout usig a liear auto-regressive (AR) predictio model. The accuracy ad the implemetatio complexity of ARS are greatly restricted by the determiatio of the AR model parameters. All the above methods optimize o either the memory size or accuracy for medium to large flows, while the i estimatig small flows is cosiderably large. May previous works estimated the origial distributio from sampled flow statistics [4] [17] [18], or usig a data stream algorithm with lossy data structure [19]. The distributio is oe of the most fudametal statistics from which we ca deduce may other statistics, such as the total umber of flows ad the average. However, the distributio ca ot idicate flow-specific properties, e.g., accurate size estimatio for a particular flow or a subpopulatio, which is to be addressed i this paper. III. ADAPTIVE NON-LINEAR SAMPLING METHOD For coveiece, we summarize the mai otatios used i this paper i Table I, where the couter value ad flow size are i terms of umber of packets. With static samplig method of rate p, the couter value c t will be refreshed upo a packet arrival after time iterval t, accordig to the followig expressio { c t+t = c t +1 with probability p; c t with probability 1 p. The ANLS is proposed to replace the static samplig rate p i (1) with a fuctio P (c) over the couter value c. It is expected that P (c) dimiishes with the icreasig of c. Specifically, P (c) (1)

3 This full text paper was peer reviewed at the directio of IEEE Commuicatios Society subject matter experts for publicatio i the IEEE INFOCOM 8 proceedigs. 1 P(c) f(c) 4 sample util the ed of the flow. Moreover, it is ot difficult to see that Q 1 (1) = 1 ad Q () =Q ( 1) =. Let F () deote the expectatio of ˆ(c) whe the actual is, wehave P(c).5 f(c) F () =E[ˆ(c)] = f(i)q i () (5) Based o (4) ad (5), we ca further have c Fig. 1. A example of f(c) ad P (c). for the proposed ANLS is calculated as P (c) =1/[f(c +1) f(c)], () where f(c) is a samplig fuctio to be selected accordig to the followig geeral priciples. Defiitio 1: Samplig fuctio f(c),c, is defied as a fuctio satisfyig the followig coditios: 1) a real icreasig covex fuctio; ) f() = ad f(1) = 1; 3) f(c) <f(c +1) bf(c)+1 with b>1 ad c>. Now, give a pre-defied f(c),c, we could adaptively tue the samplig rate depedig o the couter value. With the covexity, it is ot difficult to check that c [f(c + 1) f(c)] P (c). Namely, the samplig rate decreases as the couter value (as well as the ) icreases. A ice feature of ANLS compared to existig work is that the samplig rate is adjusted accordig to the couter value ad there is o eed to predict or estimate the distributio. I Fig. 1, we illustrate a example of f(c) ad P (c). IV. PROPERTIES OF ANLS I this sectio, we theoretically ivestigate the properties of adaptive o-liear samplig from the perspectives of accuracy, memory cosumptio ad processig overhead, with samplig fuctio selected accordig to Defiitio 1. A. Accuracy The accuracy i estimatig the ca be examied through two aspects: ubiased estimatio ad bouded relative error. 1) Ubiased estimatio: Theorem 1: Uder the ANLS method, ˆ(c) = f(c) is a ubiased estimatio of the. Proof: Let Q i () deote the probability that couter value c equals i whe curret actual is. Wehave, i 1 Q i () = P (j) (1 P ()) α...(1 P (i)) α i j= α +...+α i = i (3) Q i () =Q i 1 ( 1)P (i 1) + Q i ( 1)(1 P (i)). (4) where α j,j =,,i 1 represets the umber of usampled packets betwee the jth ad the (j +1)th sampled packets, ad α i represets the umber of usampled packets after the ith F () F ( 1) = f(i)[q i 1 ( 1)P (i 1) + Q i ( 1)(1 P (i))] f(i)q i ( 1)[P (i)+(1 P(i))] = f(i)q i 1 ( 1)P (i 1) f(i)q i ( 1)P (i) i= = f(i +1)Q i ( 1)P (i) f(i)q i ( 1)P (i) = [f(i +1) f(i)]q i ( 1)P (i). Accordig to (), f(i +1) f(i) =1/P (i). Thus, That is, F () F ( 1) = Q i ( 1) = 1. (6) F () = [F (i) F (i 1)] + F () =. (7) E[ˆ(c)] = E[f(c)] = F () =. (8) which represets a ubiased estimatio of the. ) Bouded : Theorem : Usig ˆ(c) =f(c) as the ubiased estimatio, b 1 the is upbouded by b 1. Proof: Let H() deote the expectatio of f (c) whe the is. Wehave H() =E[f (c)] = f (i)q i (). (9) Thus, from (4) ad (9), we get, H() H( 1) (1) = (f (i))[q i 1 ( 1)P (i 1) + Q i ( 1)(1 P (i))] (f (i))q i ( 1)[P (i)+(1 P(i))] = (f (i))q i 1 ( 1)P (i 1) (f (i))q i ( 1)P (i) i= = (f (i +1))Q i ( 1)P (i) (f (i))q i ( 1)P (i).

4 This full text paper was peer reviewed at the directio of IEEE Commuicatios Society subject matter experts for publicatio i the IEEE INFOCOM 8 proceedigs. Sice f(i +1) f(i) =1/P (i) ad Q ( 1) =, wehave H() H( 1) = Q i ( 1)[f(i +1)+f(i)]. (11) Applyig Defiitio 1 ad Theorem 1, we obtai, H() H( 1) (1 + b) Q i ( 1)f(i)+1 ad therefore H() = =(1+b)F ( 1) + 1 =(1+b)( 1) + 1 [H(i) H(i 1)] + H() (b +1) (b 1). (1) The variatio of adaptive o-liear samplig is the computed as, Var[ˆ(c)] = H() F (b 1) (b 1) (), (13) ad the of ANLS ca be upbouded by, Var[ˆ(c)] (b 1) (b 1). (14) Theorem tells that the is zero whe is oe. The icreases with the icremet of, but coverges to (b 1)/ whe. The decreases as b dimiishes, while b should be larger tha oe as described i Defiitio 1. To give a ituitive illustratio, we select oe specific samplig fuctio accordig to Defiitio 1 as f(c) =[(1+u) c 1]/u, <u<1, (15) where u is a costat parameter. It ca be easily proved that (15) satisfies Defiitio 1 by settig b =1+u. FromTheorem 1, it is kow that ˆ(c) = [(1 + u) c 1]/u is a ubiased estimatio with (15) adopted as the samplig fuctio. I this case, we ca further obtai the accurate istead of a upper boud. Theorem 3: whe the samplig fuctio is f(c) = [(1 + u) c 1]/u, the of the ubiased estimatio is (1 1/)u/. Proof: From (15), we have, f(i +1) f(i) 1 = 1 u u [(1 + u)i 1] = f(i). Cosequetly, (11) is equivalet to H() H( 1) = Q i ( 1){f(i)+1+[f(i +1) f(i) 1]} = Q i ( 1)(f(i)+1)+u Q i ( 1)f(i) = ( 1) u( 1) static samplig/bnf, p=.5 adaptive samplig, µ=.1 adaptive samplig, µ= Fig.. Theoretical results of. Therefore, H() = ( 1) + u, (16) ad the variatio ad ca be obtaied as, Var[ˆ(c)] = H() (F ()) ( 1) = u. (17) ( 1) Var[ˆ(c)] u (1 1/) = = u (18) With Theorem 3 ad Theorem 6 (see Appedix), we ca examie the of ANLS ad static samplig versus the, as show i Fig.. Better NetFlow (BNF) [6] adaptively adjusts the samplig rate, but it samples all the flows with the same samplig rate. BNF ca be viewed as adaptive liear samplig sice it adjusts samplig rate liearly. If the fial samplig rate of BNF i a samplig iterval is p f, the of BNF is the same as the of static samplig with samplig rate p f. I other words, i theory, the curve of BNF is the same as that of static samplig (as show i Fig. ) with samplig rate p f. The advatage of BNF over static samplig is that it could fid a proper samplig rate automatically to cotrol the memory cosumptio (this is the motivatio of BNF). From the figure, we observe that 1) for the static samplig method, the relative error is quite large for small as we demostrated before; ) For the ANLS method, the is almost the same for differet values of ; 3) The of ANLS decreases as parameter u dimiishes. From the Lemma 4 i [15], we ca calculate the theoretical of CATE as follows, (1 p f )(1 + (k 1)p f /(1 + p f )) p f Nk (19) The theoretical results of CATE ad ANLS are listed i Table II. Whe we compute the results, the parameter for CATE is set as k = 1, ad the parameter for ANLS is cofigured as u =.. I this compariso, N =1 6, ad the traffic proportios for large-size flows, medium-size flows, ad small-size flows are.1.,.1., ad 1 7, respectively. The results idicate that ANLS is more accurate

5 This full text paper was peer reviewed at the directio of IEEE Commuicatios Society subject matter experts for publicatio i the IEEE INFOCOM 8 proceedigs. tha CATE for medium-size ad small-size flows. It is a little bit less accurate for large-size flows for ANLS but the accuracy is reasoably acceptable. TABLE II THEORETICAL RELATIVE ERROR COMPARISON BETWEEN CATE WITH k = 1 AND ANLS WITH µ =.. Flow size Relative error of CATE Relative error of ANLS large-size medium-size small-size B. Memory cosumptio There are two parts of memory usage, the sample couters ad the precomputed mappig table for P (c) (equatio ), respectively. The former oe domiates the memory usage. 1) Memory for sample couters: Whe the actual is, the expected couter value i ANLS ca be calculated as E[c()] = Q i()i () for which we have the followig theorem. Theorem 4: The expected couter value E[c()] is upbouded by f 1 (), where f 1 () is the iverse fuctio of f(c). Proof: As idicated i Defiitio 1, f(c) is a covex fuctio, which satisfies f(x) f(y)+(x y)f r(y), x, y > (1) where f r( ) is the derivative of f( ) o the right. Now, let x = c ad y = E[c]. We get, f(c) f(e[c]) + (c E[c])f r(e[c]) () E[f(c)] E[f(E[c]) + (c E[c])f r(e[c])]. (3) Substitutig (8) ito (3), we obtai, E[f(c)] = f(e[c]) (4) Sice f(c) is a icreasig fuctio, we ca have E[c()] f 1 () (5) The samplig fuctio is specified i (15), ad the expected couter value of adaptive o-liear samplig method ca be accurately calculated by (3) ad (). We compare this calculated value with the boud idicated i Theorem 4 ad plot the gap betwee them i Fig. 3. The figure shows that the boud i Theorem 4 is a tight oe for the specific samplig fuctio defied i (15): the exact gap is very small ad the relative gap is approximately o the order of 1 4 or below. The couter values of the static samplig method ad ANLS are show i Fig. 4. Whe the is, the expected couter value for static samplig is obviously p. The couter value for adaptive o-liear samplig is larger tha the oe for static samplig whe is small, but it becomes much smaller tha the oe for static samplig whe grows. Please Gap betwee the boud ad the expected couter value # of couter bits Fig Gap betwee the boud ad the expected couter value. adaptive samplig, u=.1 adaptive samplig, u=. static samplig, u= Fig. 4. Couter bits required for differet samplig methods. ote that whe we desig the couter system, the width of the couter etry is determied by the largest couter value. Therefore, while keepig the same umber of etries, ANLS cosumes a smaller amout of memory tha static samplig. ) Memory for mappig tables: To avoid the high computatio overhead, we pre-compute the values of P (c) ad store it i a table. For o-lie operatio, we oly eed a sigle memory access to read out the required P (c). Cosiderig the worst case of a fully loaded OC-48 lik, which cotais oly oe flow with all 4-Byte packets. I this sceario, we could compute the flow legth i a oe-miute measuremet iterval, ad the the couter value will ot exceed f 1 () < 1 (actually it is about 999). We store a 16- bit for each P (c) where c 1. Therefore, the extra table to keep the mappig table P (c) is oly 16kb. Such amout of memory is ot large compared with that for couters ad i the evaluatios of Sectio V, we focus o the couter memory usage. C. Processig overhead The processig overhead is the computatio cost of processig each packet, icludig the memory accesses ad CPU operatios. There are five steps for the geeral samplig model. (i) the flow classificatio module picks up the flow ID from the icomig packet, (ii) the flow samplig module decides whether to sample the packet or ot. If yes, (iii) it fetches the couter address from the flow table, (iv) gets the couter value usig the address, ad (v) writes back the updated value to couter. Otherwise, drop the packet ad wait for the ext

6 This full text paper was peer reviewed at the directio of IEEE Commuicatios Society subject matter experts for publicatio i the IEEE INFOCOM 8 proceedigs. Flow classificatio Fig. 5. (i) Flow Table Flow Mappig (iv) (ii) (iii) (v) System processig model of ANLS method. Couter packet. The ANLS model is i Fig. 5. (ii) fetches the couter address from the flow table, (iii) uses the address to read out the couter value, (iv) based o the couter value, the flow samplig module decides whether to sample ad update the couter or ot. From the model it is clear that we ca implemet ANLS usig a five-stage pipelie. Thus the most time-cosumig stage determies the processig speed. We aalyze the processig overhead of these five stages below. Classificatio stage ((i) i Fig. 5). Before decidig whether to sample a packet or ot, the associated flow ID eeds to be idetified. Such a flow classificatio is also required by other flow samplig methods, like BNF ad SDS. As the flow classificatio issue has bee extesively discussed i the literature [], we here igore the detailed descriptios due to space limitatios. Address fetchig stage ((ii) i Fig. 5). The processig is a table lookup operatio o a o-chip SRAM. Samplig rate computatio stage ((iv) i Fig. 5). A cocer of ANLS is that the samplig rate eeds to be calculated o the arrival of each packet. However, the computatioal complexity of P (c) should ot be a big issue whe ANLS is implemeted i the real system by hardware. The value of P (c) could be precomputed ad stored i a table. Thus we oly eed a direct address lookup o a table maitaied by a small (o-chip) SRAM. Memory I/O stages ((iii) ad (v) i Fig. 5). Sice the samplig method is utilized, the statistical results ca be kept i a SRAM. The operatio speed i this stage is determied by the access time o SRAM. From the aalysis above, we fid that the processig bottleeck is maily due to SRAM operatios. Suppose the frequecy of SRAM is MHZ ad, i the worst case, that each packet is 4 bytes. The I/O throughput of SRAM could match up to a 3 Gbps lik speed. Actually, the processig overhead for samplig ca be reduced greatly if the measuremet fuctio is implemeted by hardware i a router. A ituitive explaatio is that the processig for flow measuremet should be much simpler tha all the other processig fuctios i the router. By comparig with the other tasks processig i a router, the measuremet processig module should ot be a big cocer. Note that the flow measuremet module ca be a by-pass/parallel uit with all other data-path compoets i a router. Therefore, we ca tur to pay more attetio to the estimatio accuracy ad memory cosumptio for flow measuremet. V. PERFORMANCE EVALUATIONS I this sectio, we compare ANLS with other existig approaches icludig SS, BNF [6], SDS [5], CATE [15], ad ARS [16] i terms of accuracy, memory cost, ad processig overhead by performig two sets of experimets i the evaluatio comparisos: 1) employig sythetic traces to test the differet methods ad ) utilizig real IP data traces from NLANR [1] to validate our observatios. All the results i this sectio are obtaied by cofigurig the samplig fuctio of ANLS as the specific form i (15). Furthermore, we discuss the processig overhead of each method ad the attack resiliece of ANLS i this sectio. A. Experimets ad results o sythetic data I order to examie the effects of distributio o ANLS, we geerate sythetic data for experimets. Suppose that we measure a fully loaded OC-48 (.5 Gbps) lik with a oe-miute measuremet iterval. The required memory is calculated as the umber of etries multiplied by the bit width of the etry, sice each etry is of same width i real implemetatio as we metioed before. The couter width is determied by the largest flow to avoid overflow. Please ote that differet samplig approaches vary i the umber of etries ad etry width. We first geerate the flows whose sizes follow Pareto distributio (the shape parameter is 1.53 ad the scale parameter is 4). We also sythesize data flows with a expoetially distributed size (the locatio parameter λ =5, i.e., the mea is 5), ad with uiformly distributed size betwee 1 ad 1. The detailed results uder differet distributios are depicted i Table III, Table IV ad Table V. From the tables we observe that ANLS provides the most accurate estimatio ad that differet distributios have almost o effect o the average (i fact, the average relative error of ANLS is oly determied by the parameter u as we demostrated i Sectio IV). TABLE III MEMORY AND RELATIVE ERROR COMPARISON UNDER SYNTHETIC DATA GENERATED FROM PARETO DISTRIBUTION. Methods Parameters Average Memory ANLS u = Mb SS p = Mb BNF M = 56k Mb SDS z = Mb TABLE IV MEMORY AND RELATIVE ERROR COMPARISON UNDER SYNTHETIC DATA GENERATED FROM EXPONENTIAL DISTRIBUTION. Methods Parameters Average Memory ANLS u = Mb ANLS u = Mb SS p = Mb BNF M = 56k Mb SDS z = Mb

7 This full text paper was peer reviewed at the directio of IEEE Commuicatios Society subject matter experts for publicatio i the IEEE INFOCOM 8 proceedigs. TABLE V MEMORY AND RELATIVE ERROR COMPARISON UNDER SYNTHETIC DATA GENERATED FROM UNIFORM DISTRIBUTION. Methods Parameters Average Memory ANLS u = kb SS p = kb BNF M = 56k kb SDS z = kb Fig. 7. BNF(M =k) or SS(p =1/) o NLANR trace. ANLS, µ=. Fig. 8. SDS with z = 1 o NLANR trace. Fig. 6. ANLS results o real NLANR trace. Table III demostrates the results for Pareto distributed flow size. Eve whe BNF (the M parameter i the table is the expected flow etry for BNF) is furished with a larger amout of memory comparable to ANLS, say 4.44Mb, its average is almost times worse tha ANLS. Table IV, for the experimets o expoetially distributed sythetic data, shows that ANLS eeds a slightly larger amout of memory tha BNF but will provide tes of times more accurate measuremet results. Whe a flow is geerated with a uiformly distributed size betwee 1 ad 1, ANLS has a average that is over 1 times better tha BNF at a cost of about two times as much memory as BNF, as showitablev. The average ad required memory size of SDS have o advatage over ANLS. Sice SDS optimizes the statistic of large flows, it requires a lot of memory to record large flows. Compared with BNF, SDS has more accurate results but requires a larger amout of memory. Sice CATE ad ARS deped o the packet arrival process, we do ot use sythetic data to evaluate these two methods. The comparisos with them will be preseted i Sectio V-B usig real traces. B. Experimets ad results o real traces Whe we use a OC-19 real trace published i [1] as the experimet iput, the results of ANLS are illustrated i Fig. 6, which shows the accuracy of ANLS for both small flows ad large flows. Fig. 6 also clearly validates Theorem 3, which claims that a smaller u is helpful to cotrol the. We also apply other samplig methods to aalyze the real trace ad depict the results i Fig. 7 to Fig. 1. All these methods demostrate a large for small flows. I [16], a perfect theoretical theorem is provided to guide the samplig method. However, to practically beefit from the theorem, we should have a pre-kowledge of the flow legth distributio. For this reaso ARS, which employs a AR model to predict flow legth distributio before decidig the samplig rate, is proposed. This method has the potetial flaw that the accuracy is greatly limited by the AR model. We test ARS o a real trace usig a AR(1) predictio model ad show the results i Fig. 1. Note that eve whe we use the actual data for the iitial iput to the AR(1) model, the for small flows is still larger tha ANLS as show i Fig. 6. Besides the compariso of accuracy, we further illustrate the memory sizes of all the approaches i Fig. 11. It is show that BNF cosumes the least amout of memory, while SDS requires the largest amout of memory due to its optimizatio o large flows. The memory requiremet for ANLS/ARS/CATE is similar. From the experimets o real traces, we foud that the memory cosumed by CATE is ot as small as expected i [15]. The differece probably comes from the assumptio i [15] that the packet arrival is uiform. I the experimet we observe may bursts of small flows, which will also make records i the coicidece cout table of CATE. Please ote that, the above memory expese correspods to differet samplig accuracy. The correspodig of s of BNF, ANLS, ARS, SDS ad CATE are 1.8,.1, 1.96, ad C. Processig overhead The processig overhead ca be measured by the umber of memory access ad CPU operatios, ad we summarize the results of differet methods i Table VI. As discussed i Sectio IV, for each packet, ANLS eeds oe read operatio, oe write operatio (update) o the couter, ad a further memory read operatio to get the pre-

8 This full text paper was peer reviewed at the directio of IEEE Commuicatios Society subject matter experts for publicatio i the IEEE INFOCOM 8 proceedigs. memory size (kb) Fig. 9. CATE with k = 1 o NLANR trace. BNF 1 ANLS ARS 3 CATE 4 SDS 5 Fig. 11. Memory compariso of differet approaches o NLANR trace. The correspodig of s of BNF, ANLS, ARS, SDS ad CATE are 1.8,.1, 1.96, ad 6.11 TABLE VI PROCESSING OPERATIONS PER PACKET OF DIFFERENT METHODS. Methods ANLS SS BNF SDS CATE ARS memory access CPU operatio 1 1 Fig. 1. ARS o NLANR trace. Actual data is used for iitial iput of AR predictio model. computed samplig rate. Cosiderig the implemetatio of BNF, it eeds a additioal CPU operatio for re-ormalizatio. Although reormalizatio will ot block the accoutig process, it may delay the report process to the remote data collector if the reormalizatio is ot completed at the ed of the measuremet iterval. Additioally, to determie the samplig rate, BNF eeds to keep several histogram bis, which also cosume memory. O the arrival of a packet, the related histogram should be updated, ad all the histograms must be refreshed whe a re-ormalizatio process is activated. If a packet is sampled, BNF eeds oe write ad oe read operatio ad whe the samplig is adjusted, BNF eed two more memory accesses. I most cases, a total of 4 memory accesses are required. SDS uses a miimum ad divisio computatio to decide the samplig rate ad employs a maximum computatio for re-ormalizatio. For each packet, SDS requires oe write operatio ad oe read operatio o the memory. To implemet CATE, k comparisos eed to be doe for each icomig packet. It ca be deployed with a CAM, which requires oe memory access. Two more memory accesses (oe write ad oe read) are eeded if there is a hittig i the compariso. ARS utilizes a AR(), ( > 1) model, which icreases the memory cosumptio liearly with. Furthermore, to determie the parameters of the AR() model, we eed to solve liear equatios, ad its computatioal complexity is a bit high if gets large. A ice feature of ANLS compared to ARS is that the samplig rate is adjusted accordig to the couter value ad that o pre-kowledge o the distributio is required. Two memory accesses (oe write ad oe read) are eeded to update the couter. D. Attack resiliece ANLS keeps records for small flows. Although few resources are eeded to record each flow, oe may be cocered with the performace of ANLS whe a attacker lauches DoS attacks towards ANLS system with large umber of small flows. We use a trace file collected by NLANR durig the spread of the Slammer worm i Jauary 3 to test the attack resiliece of ANLS. Sice the average traffic rate of the origial trace is ot very large, we scale dow the time stamp i each packet so that the flows will fully utilize the liks of 1Mbps ad 1 Gbps respectively. Whe the measuremet iterval is set as 5 secods, the required memory size is show i table VII, which implies that ANLS is resiliet to DoS attacks. TABLE VII RESILIENCE TO ATTACK TRACES. traffic load 1 Mbps 1 Gbps flow etries memory size 134 kb 441 kb E. Summary From the above results, the desig spaces of differet samplig methods ca be summarized i Table VIII, where A, B, C or D is used to idicate that the performace of a method is excellet, good, acceptable, orbad for a certai metric. ANLS bouds the error for both large ad small flows. The aalysis of the ad the upper boud for couter size, give i Sectio IV, ca also be exploited to tackle the tradeoff i case that the memory costrait or error costrait is give. I fact, from Fig. ad Fig. 4, we could fid out that, icreasig u will decrease memory requiremet relatively quickly while slightly icreasig the. For real implemetatio, u ca ot be arbitrarily large sice it is limited by the costraits of the implemetatio ad expected error.

9 This full text paper was peer reviewed at the directio of IEEE Commuicatios Society subject matter experts for publicatio i the IEEE INFOCOM 8 proceedigs. TABLE VIII DESIGN SPACES FOR DIFFERENT METHODS. Methods ANLS SS BNF SDS CATE ARS Accuracy for small flows A D D D D C Accuracy for media/large flows B B B A A B memory B B A C B B processig C A B C C C VI. CONCLUSION We have proposed a adaptive o-liear samplig method (ANLS) for passive measuremet with the purpose of mitigatig the high for small evets itroduced by static samplig. The basic idea is to sample a small flow with a large samplig rate ad to sample a large flow with a small samplig rate. ANLS has ubiased estimatio ad bouded for the estimatio, ad bouded couter size which implies small memory cosumptio. I particular, ANLS sigificatly improves the estimatio accuracy for small flows compared to existig methods, while maitaiig similar memory size ad processig overhead. ANLS tues the samplig rate accordig to the couter value, ad o predictio or estimatio of the distributio is required. The experimetal results show that the proposed samplig method obtais a better tradeoff betwee ad memory size cosumptio, i compariso to existig samplig methods. I additio, distributio has almost o effect o the estimatio accuracy. APPENDIX ESTIMATION AND ERROR OF STATIC SAMPLING Theorem 5: ˆ(c) = c/p is a ubiased estimatio of the uder the static samplig method. Proof: From the defiitio of the expected value of ˆ(c), we have, E[ˆ(c)] = ( ) p i (1 p) i i i p = ( 1)! (i 1)!( i)! pi 1 (1 p) i = (p +1 p) 1 =. Theorem 6: (1/p 1)/ is the of ubiased estimatio uder the static samplig method. Proof: E[ˆ (c)] = ( = p i ) p i (1 p) i ( i p ) i( 1)! (i 1)!( i)! pi 1 (1 p) i From the defiitio, we have the Var[ˆ(c)] = (1/p 1)/. REFERENCES [1] K. Claffy ad S. McCreary. Iteret measuremet ad data aalysis: Passive ad active measuremet. [Olie]. Available: org/outreach/papers/1999/nae4hase/nae4hase.html [] G. Varghese ad C. Esta, The measuremet maifesto, ACM SIG- COMM Computer Commuicatio Review, vol. 34, pp. 9 14, 4. [3] K. C. Claffy, G. C. Polyzos, ad H.-W. Brau, Applicatio of samplig methodologies to etwork traffic characterizatio, i ACM SIGCOMM 1993, 1993, pp [4] N. Duffield, C. Lud, ad M. Thorup, Estimatig flow distributios from sampled flow statistics, i ACM SIGCOMM 3, 3, pp [5], Lear more, sample less: Cotrol of volume ad variace i etwork measuremet, IEEE Tras. Iform. Theory, vol. 51, pp , 5. [6] C. Esta, K. Keys, D. Moore, ad G. Varghese, Buildig a better etflow, i ACM SIGCOMM 4, 4, pp [7] C. Esta ad G. Varghese, New directios i traffic measuremet ad accoutig, i ACM SIGCOMM,, pp [8] D. Brauckhoff, B. Tellebach, A. Wager, A. Lakhia, ad M. May, Impact of traffic samplig o aomaly detectio metrics, i ACM SIGCOMM IMC 6, 6, pp [9] J. Mai, C.-N. Chuah, A. Sridhara, T. Ye, ad H. Zag, Is sampled data sufficiet for aomaly detectio? i ACM SIGCOMM IMC 6, 6, pp [1] K. Ishibashi, R. Kawahara, T. Mori, T. Kodoh, ad S. Asao, Effect of samplig rate ad moitorig graularity o aomaly detectability, i 1th IEEE Global Iteret Symposium, 7. [11] C. Hu, B. Liu, Z. Liu, S. Gao, ad D. O. Wu, Optimal deploymet of distributed passive measuremet moitors, i ICC 6, vol., 6, pp [1] K. Suh, Y. Guoy, J. Kurose, ad D. Towsley, Locatig etwork moitors: Complexity, heuristics, ad coverage, i INFOCOM 5, vol. 1, 5, pp [13] Cisco. Sampled etflow data sheet. [Olie]. Available: data sheet9186a8811.html [14]. Cisco ios etflow data sheet. [Olie]. Available: data sheet9aecd8173f71.html [15] H. Fag, M. Kodialam, T. V. Lakshma, ad Z. Hui, Fast, memoryefficiet traffic estimatio by coicidece coutig, i INFOCOM 5, vol. 3, 5, pp [16] B.-Y. Choi, J. Park, ad Z.-L. Zhag, Adaptive packet samplig for flow volume measuremet, Uiversity of Miesota, MA, Tech. Rep. TR -4, Dec.. [17] N. Hoh ad D. Veitch, Ivertig sampled traffic, i ACM SIGCOMM IMC 3, vol. 14, 3, pp [18] L. Yag ad G. Michailidis, Sampled based estimatio of etwork traffic flow characteristics, i INFOCOM 7, 7. [19] A. Kumar, M. S. amd J. J. Xu, ad J. Wag, Data streamig algorithms for efficiet ad accurate estimatio of distributio, i ACM SIGMETRICS 4, 4, pp [] K. Zheg, H. Che, Z. Wag, B. Liu, ad X. Zhag, Dppc-re: Tcambased distributed parallel packet classificatio with rage ecodig, IEEE Tras. Comput., vol. 55, pp , 6. [1] NLANR. Passive measuremet ad aalysis (pma). [Olie]. Available: = 1 (i +1)( 1)! p i (1 p) i 1 p i!( i)! = p [( 1)p +1]= + (1/p 1).

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time. Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects. The

More information

Data Structures and Algorithms. Analysis of Algorithms

Data Structures and Algorithms. Analysis of Algorithms Data Structures ad Algorithms Aalysis of Algorithms Outlie Ruig time Pseudo-code Big-oh otatio Big-theta otatio Big-omega otatio Asymptotic algorithm aalysis Aalysis of Algorithms Iput Algorithm Output

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies. Limitations of Experiments Ruig Time ( 3.1) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step- by- step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information

Analysis of Algorithms

Analysis of Algorithms Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Ruig Time Most algorithms trasform iput objects ito output objects. The

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs What are we goig to lear? CSC316-003 Data Structures Aalysis of Algorithms Computer Sciece North Carolia State Uiversity Need to say that some algorithms are better tha others Criteria for evaluatio Structure

More information

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

Outline and Reading. Analysis of Algorithms. Running Time. Experimental Studies. Limitations of Experiments. Theoretical Analysis

Outline and Reading. Analysis of Algorithms. Running Time. Experimental Studies. Limitations of Experiments. Theoretical Analysis Outlie ad Readig Aalysis of Algorithms Iput Algorithm Output Ruig time ( 3.) Pseudo-code ( 3.2) Coutig primitive operatios ( 3.3-3.) Asymptotic otatio ( 3.6) Asymptotic aalysis ( 3.7) Case study Aalysis

More information

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y

More information

Lecture 5. Counting Sort / Radix Sort

Lecture 5. Counting Sort / Radix Sort Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

1 Graph Sparsfication

1 Graph Sparsfication CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider

More information

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Lecture 1: Introduction and Strassen s Algorithm

Lecture 1: Introduction and Strassen s Algorithm 5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access

More information

Lower Bounds for Sorting

Lower Bounds for Sorting Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio

More information

Big-O Analysis. Asymptotics

Big-O Analysis. Asymptotics Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

A Study on the Performance of Cholesky-Factorization using MPI

A Study on the Performance of Cholesky-Factorization using MPI A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8)

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8) CIS 11 Data Structures ad Algorithms with Java Fall 017 Big-Oh Notatio Tuesday, September 5 (Make-up Friday, September 8) Learig Goals Review Big-Oh ad lear big/small omega/theta otatios Practice solvig

More information

Performance Plus Software Parameter Definitions

Performance Plus Software Parameter Definitions Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios

More information

Fast Fourier Transform (FFT) Algorithms

Fast Fourier Transform (FFT) Algorithms Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

Analysis of Algorithms

Analysis of Algorithms Aalysis of Algorithms Ruig Time of a algorithm Ruig Time Upper Bouds Lower Bouds Examples Mathematical facts Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite

More information

condition w i B i S maximum u i

condition w i B i S maximum u i ecture 10 Dyamic Programmig 10.1 Kapsack Problem November 1, 2004 ecturer: Kamal Jai Notes: Tobias Holgers We are give a set of items U = {a 1, a 2,..., a }. Each item has a weight w i Z + ad a utility

More information

1&1 Next Level Hosting

1&1 Next Level Hosting 1&1 Next Level Hostig Performace Level: Performace that grows with your requiremets Copyright 1&1 Iteret SE 2017 1ad1.com 2 1&1 NEXT LEVEL HOSTING 3 Fast page loadig ad short respose times play importat

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:

More information

Lecture 2: Spectra of Graphs

Lecture 2: Spectra of Graphs Spectral Graph Theory ad Applicatios WS 20/202 Lecture 2: Spectra of Graphs Lecturer: Thomas Sauerwald & He Su Our goal is to use the properties of the adjacecy/laplacia matrix of graphs to first uderstad

More information

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le Fudametals of Media Processig Shi'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dih Le Today's topics Noparametric Methods Parze Widow k-nearest Neighbor Estimatio Clusterig Techiques k-meas Agglomerative Hierarchical

More information

How do we evaluate algorithms?

How do we evaluate algorithms? F2 Readig referece: chapter 2 + slides Algorithm complexity Big O ad big Ω To calculate ruig time Aalysis of recursive Algorithms Next time: Litterature: slides mostly The first Algorithm desig methods:

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

Analysis of Algorithms

Analysis of Algorithms Presetatio for use with the textbook, Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 2015 Aalysis of Algorithms Iput 2015 Goodrich ad Tamassia Algorithm Aalysis of Algorithms

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

Hash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015.

Hash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015. Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 2015 Hash Tables xkcd. http://xkcd.com/221/. Radom Number. Used with permissio uder Creative

More information

A graphical view of big-o notation. c*g(n) f(n) f(n) = O(g(n))

A graphical view of big-o notation. c*g(n) f(n) f(n) = O(g(n)) ca see that time required to search/sort grows with size of We How do space/time eeds of program grow with iput size? iput. time: cout umber of operatios as fuctio of iput Executio size operatio Assigmet:

More information

Avid Interplay Bundle

Avid Interplay Bundle Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers

More information

CMSC Computer Architecture Lecture 10: Caches. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 10: Caches. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 10: Caches Prof. Yajig Li Uiversity of Chicago Midterm Recap Overview ad fudametal cocepts ISA Uarch Datapath, cotrol Sigle cycle, multi cycle Pipeliig Basic idea,

More information

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers * Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of

More information

Analysis of Class Design Coupling Based on Information Entropy Di Jiang 1,2, a, Hua Zhou 1,2,b and Xingping Sun 1,2,c

Analysis of Class Design Coupling Based on Information Entropy Di Jiang 1,2, a, Hua Zhou 1,2,b and Xingping Sun 1,2,c Advaced Materials Research Olie: 2013-01-25 IN: 1662-8985, Vol. 659, pp 196-201 doi:10.4028/www.scietific.et/amr.659.196 2013 Tras Tech Publicatios, witzerlad Aalysis of Class Desig Couplig Based o Iformatio

More information

On Nonblocking Folded-Clos Networks in Computer Communication Environments

On Nonblocking Folded-Clos Networks in Computer Communication Environments O Noblockig Folded-Clos Networks i Computer Commuicatio Eviromets Xi Yua Departmet of Computer Sciece, Florida State Uiversity, Tallahassee, FL 3306 xyua@cs.fsu.edu Abstract Folded-Clos etworks, also referred

More information

Cubic Polynomial Curves with a Shape Parameter

Cubic Polynomial Curves with a Shape Parameter roceedigs of the th WSEAS Iteratioal Coferece o Robotics Cotrol ad Maufacturig Techology Hagzhou Chia April -8 00 (pp5-70) Cubic olyomial Curves with a Shape arameter MO GUOLIANG ZHAO YANAN Iformatio ad

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

c-dominating Sets for Families of Graphs

c-dominating Sets for Families of Graphs c-domiatig Sets for Families of Graphs Kelsie Syder Mathematics Uiversity of Mary Washigto April 6, 011 1 Abstract The topic of domiatio i graphs has a rich history, begiig with chess ethusiasts i the

More information

SD vs. SD + One of the most important uses of sample statistics is to estimate the corresponding population parameters.

SD vs. SD + One of the most important uses of sample statistics is to estimate the corresponding population parameters. SD vs. SD + Oe of the most importat uses of sample statistics is to estimate the correspodig populatio parameters. The mea of a represetative sample is a good estimate of the mea of the populatio that

More information

Hashing Functions Performance in Packet Classification

Hashing Functions Performance in Packet Classification Hashig Fuctios Performace i Packet Classificatio Mahmood Ahmadi ad Stepha Wog Computer Egieerig Laboratory Faculty of Electrical Egieerig, Mathematics ad Computer Sciece Delft Uiversity of Techology {mahmadi,

More information

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach Performace Aalysis of Multiclass FIFO: Motivatio, Difficulty ad a Network alculus Approach Yumig Jiag Norwegia Uiversity of Sciece ad Techology (NTNU) 1 19 March 2014, 2d Workshop o Network alculus, Bamberg,

More information

End Semester Examination CSE, III Yr. (I Sem), 30002: Computer Organization

End Semester Examination CSE, III Yr. (I Sem), 30002: Computer Organization Ed Semester Examiatio 2013-14 CSE, III Yr. (I Sem), 30002: Computer Orgaizatio Istructios: GROUP -A 1. Write the questio paper group (A, B, C, D), o frot page top of aswer book, as per what is metioed

More information

Polynomial Functions and Models. Learning Objectives. Polynomials. P (x) = a n x n + a n 1 x n a 1 x + a 0, a n 0

Polynomial Functions and Models. Learning Objectives. Polynomials. P (x) = a n x n + a n 1 x n a 1 x + a 0, a n 0 Polyomial Fuctios ad Models 1 Learig Objectives 1. Idetify polyomial fuctios ad their degree 2. Graph polyomial fuctios usig trasformatios 3. Idetify the real zeros of a polyomial fuctio ad their multiplicity

More information

UNIVERSITY OF MORATUWA

UNIVERSITY OF MORATUWA UNIVERSITY OF MORATUWA FACULTY OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING B.Sc. Egieerig 2014 Itake Semester 2 Examiatio CS2052 COMPUTER ARCHITECTURE Time allowed: 2 Hours Jauary 2016

More information

A General Framework for Accurate Statistical Timing Analysis Considering Correlations

A General Framework for Accurate Statistical Timing Analysis Considering Correlations A Geeral Framework for Accurate Statistical Timig Aalysis Cosiderig Correlatios 7.4 Vishal Khadelwal Departmet of ECE Uiversity of Marylad-College Park vishalk@glue.umd.edu Akur Srivastava Departmet of

More information

Filter design. 1 Design considerations: a framework. 2 Finite impulse response (FIR) filter design

Filter design. 1 Design considerations: a framework. 2 Finite impulse response (FIR) filter design Filter desig Desig cosideratios: a framework C ı p ı p H(f) Aalysis of fiite wordlegth effects: I practice oe should check that the quatisatio used i the implemetatio does ot degrade the performace of

More information

prerequisites: 6.046, 6.041/2, ability to do proofs Randomized algorithms: make random choices during run. Main benefits:

prerequisites: 6.046, 6.041/2, ability to do proofs Randomized algorithms: make random choices during run. Main benefits: Itro Admiistrivia. Sigup sheet. prerequisites: 6.046, 6.041/2, ability to do proofs homework weekly (first ext week) collaboratio idepedet homeworks gradig requiremet term project books. questio: scribig?

More information

( n+1 2 ) , position=(7+1)/2 =4,(median is observation #4) Median=10lb

( n+1 2 ) , position=(7+1)/2 =4,(median is observation #4) Median=10lb Chapter 3 Descriptive Measures Measures of Ceter (Cetral Tedecy) These measures will tell us where is the ceter of our data or where most typical value of a data set lies Mode the value that occurs most

More information

Markov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size

Markov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size Markov Chai Model of HomePlug CSMA MAC for Determiig Optimal Fixed Cotetio Widow Size Eva Krimiger * ad Haiph Latchma Dept. of Electrical ad Computer Egieerig, Uiversity of Florida, Gaiesville, FL, USA

More information

A MODIFIED APPROACH FOR ESTIMATING PROCESS CAPABILITY INDICES USING IMPROVED ESTIMATORS

A MODIFIED APPROACH FOR ESTIMATING PROCESS CAPABILITY INDICES USING IMPROVED ESTIMATORS Pak. J. Statist. 017 Vol. 33(), 411-418 A MODIFIED APPROACH FOR ESTIMATING PROCESS CAPABILITY INDICES USING IMPROVED ESTIMATORS Seem Şaha Vahaplar 1 ad Özlem Ege Oruç Departmet of Statistics, Dokuz Eylül

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

Adaptive and Lazy Segmentation Based Proxy Caching for Streaming Media Delivery

Adaptive and Lazy Segmentation Based Proxy Caching for Streaming Media Delivery Adaptive ad Based Proxy Cachig for Streamig Media Delivery Sogqig Che Dept. of Computer Sciece College of William ad Mary Williamsburg, VA 23187 sqche@cs.wm.edu Susie Wee Mobile ad Media System Lab Hewlett-Packard

More information

Computer Systems - HS

Computer Systems - HS What have we leared so far? Computer Systems High Level ENGG1203 2d Semester, 2017-18 Applicatios Sigals Systems & Cotrol Systems Computer & Embedded Systems Digital Logic Combiatioal Logic Sequetial Logic

More information

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology

More information

One advantage that SONAR has over any other music-sequencing product I ve worked

One advantage that SONAR has over any other music-sequencing product I ve worked *gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig

More information

ISSN (Print) Research Article. *Corresponding author Nengfa Hu

ISSN (Print) Research Article. *Corresponding author Nengfa Hu Scholars Joural of Egieerig ad Techology (SJET) Sch. J. Eg. Tech., 2016; 4(5):249-253 Scholars Academic ad Scietific Publisher (A Iteratioal Publisher for Academic ad Scietific Resources) www.saspublisher.com

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

CMSC Computer Architecture Lecture 11: More Caches. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 11: More Caches. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 11: More Caches Prof. Yajig Li Uiversity of Chicago Lecture Outlie Caches 2 Review Memory hierarchy Cache basics Locality priciples Spatial ad temporal How to access

More information

BASED ON ITERATIVE ERROR-CORRECTION

BASED ON ITERATIVE ERROR-CORRECTION A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity

More information

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB) F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The

More information

Mobile terminal 3D image reconstruction program development based on Android Lin Qinhua

Mobile terminal 3D image reconstruction program development based on Android Lin Qinhua Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 05) Mobile termial 3D image recostructio program developmet based o Adroid Li Qihua Sichua Iformatio Techology College

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

Accuracy Improvement in Camera Calibration

Accuracy Improvement in Camera Calibration Accuracy Improvemet i Camera Calibratio FaJie L Qi Zag ad Reihard Klette CITR, Computer Sciece Departmet The Uiversity of Aucklad Tamaki Campus, Aucklad, New Zealad fli006, qza001@ec.aucklad.ac.z r.klette@aucklad.ac.z

More information

Big-O Analysis. Asymptotics

Big-O Analysis. Asymptotics Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses

More information

GPUMP: a Multiple-Precision Integer Library for GPUs

GPUMP: a Multiple-Precision Integer Library for GPUs GPUMP: a Multiple-Precisio Iteger Library for GPUs Kaiyog Zhao ad Xiaowe Chu Departmet of Computer Sciece, Hog Kog Baptist Uiversity Hog Kog, P. R. Chia Email: {kyzhao, chxw}@comp.hkbu.edu.hk Abstract

More information

Sectio 4, a prototype project of settig field weight with AHP method is developed ad the experimetal results are aalyzed. Fially, we coclude our work

Sectio 4, a prototype project of settig field weight with AHP method is developed ad the experimetal results are aalyzed. Fially, we coclude our work 200 2d Iteratioal Coferece o Iformatio ad Multimedia Techology (ICIMT 200) IPCSIT vol. 42 (202) (202) IACSIT Press, Sigapore DOI: 0.7763/IPCSIT.202.V42.0 Idex Weight Decisio Based o AHP for Iformatio Retrieval

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

Information Metrics for Low-rate DDoS Attack Detection : A Comparative Evaluation

Information Metrics for Low-rate DDoS Attack Detection : A Comparative Evaluation Iformatio Metrics for Low-rate DDoS Attack Detectio : A Comparative Evaluatio Moowar. Bhuya Dept. of Computer Sciece ad Egg Kaziraga Uiversity Koraikhowa, Jorhat 785006, Assam moowar.tezu@gmail.com D.

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter The Processor Part A path Desig Itroductio CPU performace factors Istructio cout Determied by ISA ad compiler. CPI ad

More information

Descriptive Statistics Summary Lists

Descriptive Statistics Summary Lists Chapter 209 Descriptive Statistics Summary Lists Itroductio This procedure is used to summarize cotiuous data. Large volumes of such data may be easily summarized i statistical lists of meas, couts, stadard

More information

Counting the Number of Minimum Roman Dominating Functions of a Graph

Counting the Number of Minimum Roman Dominating Functions of a Graph Coutig the Number of Miimum Roma Domiatig Fuctios of a Graph SHI ZHENG ad KOH KHEE MENG, Natioal Uiversity of Sigapore We provide two algorithms coutig the umber of miimum Roma domiatig fuctios of a graph

More information

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems

More information

Algorithm. Counting Sort Analysis of Algorithms

Algorithm. Counting Sort Analysis of Algorithms Algorithm Coutig Sort Aalysis of Algorithms Assumptios: records Coutig sort Each record cotais keys ad data All keys are i the rage of 1 to k Space The usorted list is stored i A, the sorted list will

More information

Second-Order Domain Decomposition Method for Three-Dimensional Hyperbolic Problems

Second-Order Domain Decomposition Method for Three-Dimensional Hyperbolic Problems Iteratioal Mathematical Forum, Vol. 8, 013, o. 7, 311-317 Secod-Order Domai Decompositio Method for Three-Dimesioal Hyperbolic Problems Youbae Ju Departmet of Applied Mathematics Kumoh Natioal Istitute

More information

UNIT 4 Section 8 Estimating Population Parameters using Confidence Intervals

UNIT 4 Section 8 Estimating Population Parameters using Confidence Intervals UNIT 4 Sectio 8 Estimatig Populatio Parameters usig Cofidece Itervals To make ifereces about a populatio that caot be surveyed etirely, sample statistics ca be take from a SRS of the populatio ad used

More information

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process Vol.133 (Iformatio Techology ad Computer Sciece 016), pp.85-89 http://dx.doi.org/10.1457/astl.016. Euclidea Distace Based Feature Selectio for Fault Detectio Predictio Model i Semicoductor Maufacturig

More information

A Note on Least-norm Solution of Global WireWarping

A Note on Least-norm Solution of Global WireWarping A Note o Least-orm Solutio of Global WireWarpig Charlie C. L. Wag Departmet of Mechaical ad Automatio Egieerig The Chiese Uiversity of Hog Kog Shati, N.T., Hog Kog E-mail: cwag@mae.cuhk.edu.hk Abstract

More information

DATA MINING II - 1DL460

DATA MINING II - 1DL460 DATA MINING II - 1DL460 Sprig 2017 A secod course i data miig http://www.it.uu.se/edu/course/homepage/ifoutv2/vt17/ Kjell Orsbor Uppsala Database Laboratory Departmet of Iformatio Techology, Uppsala Uiversity,

More information

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful

More information