mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee

Size: px
Start display at page:

Download "mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee"

Transcription

1 Reolving Deadlock for Pipelined Stream Application on Network-on-Chip Xiaohang Wang 1,2, Peng Liu 1 1 Department of Information Science and Electronic Engineering, Zheiang Univerity Hangzhou, Zheiang, P. R. China, baikeina@yahoo.com.cn, 1 liupeng@iee.zu.edu.cn Mei Yang 2, Yingtao Jiang 2 2 Department of Electrical and Computer Engineering, Univerity of Nevada, La Vega, NV {meiyang, yingtao}@egr.unlv.edu Abtract When a tream application that demand real-time proceing over continuou data tream i running on a network-on-chip (NoC)-baed multiproceor ytem-on-chip (MPSoC), two type of deadlock may occur: (i) the routingdependent deadlock, and (ii) the meage-dependent deadlock. In thi paper, we focu on the requet-requet type meage-dependent deadlock, the mot devatating deadlock in tream application, and how that thi type of deadlock can be avoided by a proper incluion of virtual channel (VC). We firt prove a ufficient condition that determine the minimum number of VC needed to completely avoid requet-requet type meage-dependent deadlock. We then how that the problem of finding the minimum number of uch VC for a given application i NP-complete, and ubequently, a mixed integral linear programming (MILP)- baed algorithm, referred a Min_VC algorithm, i introduced to olve thi problem. Thi Min_VC algorithm can literally be integrated with any exiting application mapping algorithm to provide deadlock-free mapping reult. The experiment reult hown that for typical tream application, uch a multimedia application, the number of VC needed to avoid deadlock i fairly modet, typically ut 1 or 2 depending on application. That i, with a modet price paid in term of area and power, tream application can run in an NoC-baed ytem completely free of deadlock concern, which i neceary to deliver the quality of ervice (QoS) guarantee required by thee application. Keyword: network-on-chip (NoC), meage-dependent deadlock, virtual channel I. INTRODUCTION Network-on-chip (NoC) ha been widely accepted a a viable communication infratructure for current and future Multiproceor Sytem on Chip (MPSoC) deign [1] tailored for tream application. The increaing importance of tream proceing lie in the fact that many emerging application involve real-time proceing over continuou data tream, uch a VoIP telephony, playback audio/video, IPTV, and enor data analyi [2]. There are unfortunately two type of deadlock that may occur to a pipelined tream application running on an NoCbaed architecture: 1) the routing-dependent deadlock [1] and 2) the meage-dependent deadlock [3, 4]. A meagedependent deadlock i created when ome of thee meage can never be conumed by the conumer tak a the conumption of thee meage i mutually dependent on each other arrival. For example, meage X may block /10/$ IEEE meage Y from arriving at the end proceor/ni while Y i imultaneouly required by the conumer tak to conume X. Thi requet-requet type meage-dependent deadlock can caue devatating effect on a tream application a it may put the whole ytem into a complete tall [3, 4]. To avoid or reolve meage-dependent deadlock in a network, generally two clae of method, reactive method and proactive method, are ued [3, 4, 7]. However, thee exiting method are not uitable for the tream application running on an NoC-baed architecture, for reaon given below. For reactive method, typified by a deadlock recovery mechanim referred a mdiha [7], they cannot deliver the QoS guarantee required by tream application, ince reolving deadlock will caue unpredictably long delay [4]. There exit three poible proactive method that may help avoid deadlock. However, none of thee method will be uitable for tream application which have tringent latency and throughput requirement. (i). Ue of network buffer with an extremely large ize to avoid deadlock. Thi approach i not uitable for NoC deign, a it involve unbearably high area and power cot. In addition, thi method, a pointed out in [4], cannot help avoid the requet-requet type meagedependent deadlock. (ii). Creation of multiple virtual network with one for each meage type. Thi approach, unfortunately, cannot help avoid the requet-requet type meage-dependent deadlock [4]. (iii). Ue of end-to-end flow control. The end-to-end flow control protocol, uch a CTC protocol [3], may ignificantly increae the network latency and communication power due to the uage of additional reply meage for flow control [4]. Virtual channel (VC) have been long employed in many NoC deign to help improve network routing performance. In thi paper, we how that proper incluion of VC can alo provide a practically feaible olution to completely avoid the requet-requet type meagedependent deadlock in an NoC deign. In particular, for the firt time, we have formally proved a ufficient condition that determine the minimum number of VC actually needed to avoid the meage-dependent deadlock. Following thi theory, we propoe an MILP-baed algorithm that can help quickly find thi number, and thi algorithm hall be integrated with exiting application mapping algorithm, like the one reported in [5], to get deadlock-free 93

2 mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC needed to avoid deadlock i fairly modet, typically ut 1 or 2 depending on application. That i, with a modet price paid in term of area and power, tream application can run in an NoCbaed ytem completely free of deadlock concern. II. TARGET APPLICATION AND ARCHITECTURE MODEL A. Application model The tream application can be modeled a a ynchronou data flow graph. Definition 1[2] A ynchronou data flow graph (SDFG) i a directed graph SDFG(A, EC), where each vertex a i A repreent a tak (to be conitent, an actor that wa originally defined in [2] i alo referred a a tak in thi text), and a directed edge ec i =(a k, a ) EC repreent the data communication from a k to a. For tak a k, the following notation are defined, EX(a k ) give the wort execution time of tak a k. IN(a k ) i the et of all a k predeceor tak in SDFG. OUT(a k ) i the et of all a k ucceor tak in SDFG. A ource tak i one which ha no predeceor tak. A ink tak i one which ha no ucceor tak. All the tak will be executed repeatedly for a number of iteration to proce the incoming data tream. A tak that need to communicate with other i allowed to do o either at the beginning (i.e. read input data) or at the end (end output data) of an iteration. Let (a k a ) m denote the data (packed in meage) from a k to a after a k finihe it m-th iteration. In thi paper, we aume that all the tak have already been bound to IP core. Definition 2 A tream communication graph (SCG) i a directed acyclic graph SCG(P, E), where a vertex p k P repreent an IP core, and an edge e i =(p k, p ) E repreent the communication between vertice p k and p. ω(e i ) define the amount of data ent from p k to p in bit per econd (bp). Without lo of generality, we aume that each IP core i allocated with one tak. If multiple tak are allocated to a ingle IP core, we can treat thee tak a one macro tak. There are two type of buffer aociated with a tak: the input data buffer and the output data buffer. For any tak, one input data buffer i dedicated to receive the meage from ut one of it predeceor [2]. That i, the number of input data buffer needed i the ame a that of the tak predeceor. For any tak, meage for one of it ucceor will be tored in a dedicated output data buffer before they can be ent out [2]. That i, the number of output data buffer i the ame a that of the tak ucceor. B. Architectural model Fig. 1 how the architecture model ued in thi paper. The NoC ytem under conideration i compoed of NxN tile interconnected by a 2-D meh network. Each tile, indexed by it coordinate (x, y), where 0 x N-1 and 0 y N- 1, ha one router and one proceing node. A router, a hown in Fig. 2, implement wormhole witching. Each meage will be broken into a number of fixed ize packet with each carrying the needed routing information. Each packet will be further decompoed into flit. Aume each phyical channel i plit into V VC, realized by V buffer at each input port with each buffer holding everal flit. A hown in Fig. 2, each proceing node i compoed of four component: a proceor, a bu, a local memory unit and a network interface (NI). The local memory unit hold the input/output data buffer that can be ued by the tak allocated to thi IP core. The NI hold a number of receiving buffer each dedicated to holding everal flit of the meage from one of the tak predeceor. Hence, the number of receiving buffer configured at the NI i the ame a the number of the tak predeceor. Definition 3 An Architecture Characterization Graph (ACG) Ğ=(T, L) i a directed graph, where each vertex t i T repreent a tile (Fig. 1), and each edge l i =(t k, t ) L repreent the link between adacent t k and t. For link l i, bw(l i ) define the bandwidth provided between tile t k and t. c(l i,v) define the link cot of l i, i.e., power conumption for tranmitting one bit data from t k and t with a total of V VC. Figure 1 NoC architecture model. A rectangle box repreent a router and a circle repreent a proceing node. III. MESSAGE-DEPENDENT DEADLOCK IN STREAM APPLICATION AND MOTIVATING EXAMPLE In thi ection, we provide an example to illutrate how a requet-requet type meage-dependent deadlock can occur, followed by important obervation how uch deadlock can be avoided. Aume the SCG ha three IP core on which three tak a, b, and c are allocated, a hown in Fig. 2, ha already been mapped to the ACG with a 1x3 meh uing the mapping algorithm in [3]. The three tak (with a and b a the producer and c a the conumer) form a pipeline. Aume the puhing protocol [4] i applied; that i, a producer tak i allowed to continuouly puh all it generated data into the network until the network i aturated. In thi example, no virtual channel i ued. A buffer N buffer 1 94

3 indicated in Section 2.1, for all three tak to operate properly, c cannot tart a new iteration (ay the i-th iteration) until it receive the data generated in the i-th iteration of a and b in their correponding input data buffer. Once c tart a new iteration, the two input data buffer mut have been cleared. (c) Figure 2 An example of SCG with three proceor mapped with three tak. Deadlock configuration due to requet-requet type meagedependency. (c) Increaing the number of virtual channel can help avoid requet-requet type meage-dependent deadlock. A eriou problem, however, may happen when, for example, b produce data at a higher rate than a and c. Fig. 2 illutrate uch a ituation. Suppoe c ha finihed it (n-1)-th iteration and it i now waiting for (b c) n and (a c) n. In the following, we will how how a cyclic dependency among the meage can be developed. 1) Flit of (b c) n+1 reerve link (1, 2), the wet input buffer of R 2 and the receiving buffer of NI 2 (marked with * in Fig. 2). 2) Flit of (b c) n+1 cannot proceed to the input data buffer dedicated for b in c local memory ince the buffer i occupied by (b c) n which ha not been conumed (cleared) yet. 3) To conume (b c) n, (a c) n need to arrive at the input data buffer dedicated for a in c local memory to allow c to tart the n-th iteration. (Thi dependency i marked a ** in Fig. 2). 4) In Fig. 2, the arrow marked with *** denote that the input data buffer in c local memory dedicated for a wait for the arrival of flit of (a c) n. 5) However, flit of (a c) n cannot proceed ince the wet input buffer of R 2 i already reerved by flit of (b c) n+1. 6) Up to thi point, a deadlock i already formed. Above example ha revealed that a devatating deadlock can be formed. In another word, to avoid any deadlock like the one hown in Fig. 2, ome network control mechanim hould be in place to either proactively prevent any meage generated in different iteration from blocking other to reach their detination, or act reactively to reolve the deadlock once they are detected. A a matter of fact, all the exiting deadlock avoidance method [3, 4, 7], can actually be viewed a a variation of uch control mechanim. A a viable alternative to the exiting deadlock avoidance method, the requet-requet type meagedependent deadlock can be completely avoided by adding a number of virtual channel. For the example hown in Fig. 2, one can ee that the cycle that caue a deadlock in Fig. 2, i completely avoidable by employing two virtual channel at each router (Fig. 2(c)). Since in many NoC deign, virtual channel are ued for helping improve network routing performance [2], the hardware cot of thi approach for avoiding meage-dependent deadlock i well utifiable. IV. DEADLOCK AVOIDANCE USING VIRTUAL CHANNELS A. Sufficient condition for deadlock-avoidance with virtual channel Aume a tream application given a an SCG (Section 2) ha already been mapped to an NoC architecture modeled by an ACG (Section 2). We alo aume that (i) the routing algorithm ued i deadlock-free, and (ii) meage are delivered in-order. Lemma 1 For any tak in a tream application allocated to an IP core in a given SCG, after it finihe the execution of it n-th iteration, it input data buffer are either empty or they are holding meage from it predeceor (n+1)-th iteration. Lemma 2 For a tream application given a a SCG, there exit one virtual path between any two communicating tak o that all meage will arrive at their detination tak, provided that 1) each link i hared by communication le than or equal to the number of virtual channel and 2) the number of receiving buffer at the NI of each tile i equal to the number of predeceor of the mapped IP core in the SCG. Theorem 1 Conider an NoC architecture in which (i) V VC are ued at each router and (ii) the number of receiving buffer at the NI of each tile i et to be equal to the number of it predeceor. If each link i hared by no more than V communication, no requet-requet type meagedependent deadlock can ever be created. The proof of Lemma 1-3 and Theorem 1 are omitted due to pace limit. B. Minimum virtual channel algorithm MinVC problem: Given an ACG(T, L) that a SCG(P, E) i mapped onto, for each communication e i in SCG, find a 95

4 routing path in ACG among all the poible minimal routing path uch that the number of virtual channel needed at each router i minimized, i.e., Min {V}, atifying, l m, V gl ( m, hm( p ), ( )) (1) ei= ( pk, p) E l m, B ω( ei) g( lm, hm( p ), ( )) (2) ei= ( pk, p) E where M(p) i the tile that p i mapped to, and 1 if l h i M( pk ), M( p ) gl ( i, h M( p ), ( )) =. 0 if l h i M ( pk ), M ( p ) The condition given by (1) enure that each link l in ACG i hared by at mot V communication flow, while the condition given by (2) enure that the total bandwidth requirement of all communication flow haring each link l doe not exceed the capacity of link l. Next we will firt how that the MinVC problem i NPcomplete. Then we will preent an ILP-baed olution. Theorem 2 The deciion verion of the MinVC problem i NP-complete. The proof ketch i lited below. The deciion verion of the MinVC problem i to decide whether there exit the minimal routing path in the ACG for all communication in the SCG, while all the reource contraint are atified and no more than V VC are needed at each router. We will prove thi theorem retricting the deciion verion of the MinVC problem to it intance with ω(e i )=1 for all ei, and V=B. Thu, condition (1) and (2) of the MinVC problem are algebraically identical. Thi retriction, from general MinVC to it retricted verion, take O( L + E ) time, where L i the number of link in the ACG. The retricted MinVC problem i equivalent to finding the minimum cot unplittable flow [8] for a et of E communication flow {1,, E }, each flow ending from a ource node i to it detination node d i with demand ω(e i ) for i {1,, E }. The knapack [9] problem can thu be viewed a a pecial cae of the retricted MinVC problem, a hown in Fig. 3. In Fig. 3, for each item in knapack problem [9], there i a correponding flow i (i.e., an edge e i in the SCG) whoe demand ω(e i ) i equal to the ize of each item. The cot of each direct edge from node to d i i et to w i / i where w i and i repreent the weight and ize of the i-th item, repectively. Cot of all the other edge are et to 0. The capacity of the edge from node to v i equal to the capacity of the knapack while auming all other edge have infinite capacity. Therefore, the minimum cot flow from all i to d i, i {1,, E }, upon atifying all the demand, lead to an optimal olution to the knapack problem and vice vera. The knapack problem i NP-complete [9], and o i the MinVC problem which can be tranformed to the knapack problem. w1 1 w2 2 w E 1 E 1 Figure 3 Formulation of the Knapack problem [9] a the retricted MinVC problem. The MinVC problem can be approximated by formulating it a a mixed integer linear programming problem given below. Here, MP i i the et of all minimal path between the two tile mapped by the two IP core of edge e i, and PATH i, i the -th minimal path in MP i. f i,k = 1 if e i take the k th minimum path. Eqn. (2) et a 0 otherwie contraint that only one of the minimal path will be allocated for each communication. Eqn. (3) et that each link will not accommodate more than V communication. Eqn. (4) repreent the bandwidth contraint of each link. Our experiment ha hown that when lp_olve [10] i ued to olve Min_VC, the running time i le than 0.1ec for a 6 6 meh-baed NoC (obtained from a PC with one Intel Core2 P GHz proceor and 2GB RAM). Min_VC(M, MP) Input: (1) M: a mapped reult (2) MP: a et of all minimum path for all communication flow Output: (1) V: the number of VC needed for all router (2) { f ik, }: the et of minimal path for all e i Procedure body: { call lp_olve to olve the following equation: Obective: min V (1) Contraint: fik, = 1, ei (MP i i the et of all minimal path et for e i ); (2) k MPi fik, V, link l ; (3) ei l PATHi,, k MPi ω( ei) fi, k B, link l ; (4) ei l PATHi, } V. EXPERIMENTS In our experiment, the mapping proce i baed on an exiting mapping algorithm [5]. A. Simulation reult Fig. 4 how a ynthetic application. The execution time of each tage i modeled by a random proce with the mean and variance are choen randomly. For the mapping reult in Fig. 4, it ha been found that 2 VC are needed to completely avoid any deadlock. The CMMS ytem in Fig. 5 i compoed of both a video/audio encoder and a video/audio decoder. The video and audio encoder are ynchronized, and o are the video and audio decoder. The tak in the video codec are w E E 96

5 yntheized a follow. The mean, variance and the Hurt parameter of the execution time of each tage are from [11] We aume that the target platform run QCIF format video which ha 99 macro block in one frame. The video proceing part i pipelined at the macro block level and i ynchronized with the audio proceing at the end of each frame. For thi application, 1 VC i found ufficient to avoid deadlock. Figure 4 The SCG of ynthetic application. The mapping reult. Figure 5 The SCG of CMMS. The mapping of reult. Table I how the power and area reult for each application with the number of VC needed to avoid deadlock. The reult hown are normalized with repect to a baeline deign where no VC i ued. Of the three application, the maximum number of VC needed to avoid deadlock i 2. In the wort cenario, the power and area penaltie are 16% and 17%, repectively, which i tolerable for gaining the benefit of avoiding meage-dependent deadlock that otherwie will have devatating effect on tream application. With thee number of VC, the application have no routing dependent and meage dependent deadlock oberved. TABLE I. THE AREA AND POWER OVERHEAD TO AVOID DEADLOCKS FOR THE THREE APPLICATIONS. Application VC required Power Area Synthetic x 1.17x CMMS 1 1x 1x VI. CONCLUSION In thi paper, we preented a practical method to avoid the requet-requet type meage-dependent deadlock problem that can eriouly impact the performance of a pipelined tream application running on an NoC architecture. We howed that the requet-requet type meage-dependent deadlock can be avoided by adding the right number of virtual channel (VC) and formally proved a ufficient condition which determine the minimum number of VC actually needed to obtain uch a deadlockfree NoC deign. We further howed the problem of finding the minimum number VC i NP-complete and thu propoed an ILP-baed olution which can be and hould be integrated into any mapping algorithm whenever a deadlock-free deign i deired. Experiment baed on three tream application confirmed that deadlock have been avoided with a modet increae of power and area. REFERENCES [1] M. Palei, R. Holmark, S. Kumar, and V. Catania, "Application pecific routing algorithm for Network on Chip," IEEE Tran Parallel and Ditributed Sytem, vol. 20, no. 3, pp , [2] N. K. Kavaldiev, "A run-time reconfigurable Network-on-Chip for treaming DSP application," Phd thei, Univerity of Twente, [3] N. Concer, L. Bononi, M. Soulié, R. Locatelli, and L. P. Carloni, "CTC: An end-to-end flow control protocol for multi-core ytemon-chip," in Proc 3rd ACM/IEEE Int'l Symp on Network-on-Chip, 2009, pp [4] A. Hanon, K. Gooen, and A. Radulecu, "Avoiding meagedependent deadlock in network-baed Sytem-on-Chip," VLSI Deign, vol. 2007, no., pp. 1-10, [5] G. Acia, V. Catania, and M. Palei, "Mapping core on network-onchip," Int'l J Computational Intelligence Reearch, vol. 1, no. 2, pp , [6] X. Wang, M. Yang, Y. Jiang, and P. Liu, "A power-aware mapping approach to map ip core onto noc under bandwidth and latency contraint," to appear in ACM Tran. Architecture and Code Optimization. [7] Y. H. Song and T. M. Pinkton, "A progreive approach to handling meage-dependent deadlock in parallel computer ytem," IEEE Tran Parallel and Ditributed Sytem, vol. 14, no. 3, pp , [8] M. Skutella, "Approximating the ingle ource unplittable min-cot flow problem," Mathematical Programming, vol. 91, no. 3, pp , [9] M. R. Garey and D. S. Johnon, Computer and Intractability: A Guide to the Theory of NP-completene: Freeman San Francico, [10] lp olve 5.5. [Online]. Available: lpolve.ourceforge.net/5.5/. [11] C. Lampert, M. Militzer, and P. Ro. XviD MPEG4 core library. 97

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

Problem Set 2 (Due: Friday, October 19, 2018)

Problem Set 2 (Due: Friday, October 19, 2018) Electrical and Computer Engineering Memorial Univerity of Newfoundland ENGI 9876 - Advanced Data Network Fall 2018 Problem Set 2 (Due: Friday, October 19, 2018) Quetion 1 Conider an M/M/1 model of a queue

More information

Embedding Service Function Tree with Minimum Cost for NFV Enabled Multicast

Embedding Service Function Tree with Minimum Cost for NFV Enabled Multicast 1 Embedding Service Function Tree with Minimum ot for NFV Enabled Multicat angbang Ren, Student Member, IEEE, eke Guo, Senior Member, IEEE, Yulong Shen, Member, IEEE, Guoming Tang, Member, IEEE, Xu Lin,

More information

Contents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course:

Contents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course: Content Shortet path Algorithm and Network 21/211 The hortet path problem: Statement Verion Application Algorithm (for ingle ource p problem) Reminder: relaxation, Dijktra, Variant of Dijktra, Bellman-Ford,

More information

AUTOMATIC TEST CASE GENERATION USING UML MODELS

AUTOMATIC TEST CASE GENERATION USING UML MODELS Volume-2, Iue-6, June-2014 AUTOMATIC TEST CASE GENERATION USING UML MODELS 1 SAGARKUMAR P. JAIN, 2 KHUSHBOO S. LALWANI, 3 NIKITA K. MAHAJAN, 4 BHAGYASHREE J. GADEKAR 1,2,3,4 Department of Computer Engineering,

More information

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong 4th International Conference on Machinery, Material and Computing Technology (ICMMCT 2016) A Load Balancing Model baed on Load-aware for Ditributed Controller Fengjun Shang, Wenjuan Gong College of Compute

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Iue 4, April 2015 International Journal Advance Reearch in Computer Science and Management Studie Reearch Article / Survey Paper / Cae Study Available online at: www.ijarcm.com

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and

More information

A Practical Model for Minimizing Waiting Time in a Transit Network

A Practical Model for Minimizing Waiting Time in a Transit Network A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,

More information

A Multi-objective Genetic Algorithm for Reliability Optimization Problem

A Multi-objective Genetic Algorithm for Reliability Optimization Problem International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR

More information

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck. Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization

More information

xy-monotone path existence queries in a rectilinear environment

xy-monotone path existence queries in a rectilinear environment CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of

More information

Multicast with Network Coding in Application-Layer Overlay Networks

Multicast with Network Coding in Application-Layer Overlay Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 1, JANUARY 2004 1 Multicat with Network Coding in Application-Layer Overlay Network Ying Zhu, Baochun Li, Member, IEEE, and Jiang Guo Abtract

More information

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT

More information

Edits in Xylia Validity Preserving Editing of XML Documents

Edits in Xylia Validity Preserving Editing of XML Documents dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,

More information

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov

More information

else end while End References

else end while End References 621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized

More information

Power Aware Location Aided Routing in Mobile Ad-hoc Networks

Power Aware Location Aided Routing in Mobile Ad-hoc Networks International Journal of Scientific and Reearch Publication, Volume, Iue 1, December 01 1 Power Aware Location Aided Routing in Mobile Ad-hoc Network Anamika Computer Science, Inderprataha Engineering

More information

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt

More information

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term

More information

Service and Network Management Interworking in Future Wireless Systems

Service and Network Management Interworking in Future Wireless Systems Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering

More information

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in

More information

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two

More information

Chapter S:II (continued)

Chapter S:II (continued) Chapter S:II (continued) II. Baic Search Algorithm Sytematic Search Graph Theory Baic State Space Search Depth-Firt Search Backtracking Breadth-Firt Search Uniform-Cot Search AND-OR Graph Baic Depth-Firt

More information

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial

More information

Aspects of Formal and Graphical Design of a Bus System

Aspects of Formal and Graphical Design of a Bus System Apect of Formal and Graphical Deign of a Bu Sytem Tiberiu Seceleanu Univerity of Turku, Dpt. of Information Technology Turku, Finland tiberiu.eceleanu@utu.fi Tomi Weterlund Turku Centre for Computer Science

More information

New Structural Decomposition Techniques for Constraint Satisfaction Problems

New Structural Decomposition Techniques for Constraint Satisfaction Problems New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.

More information

Software Shaders in Interactive Environments Using Relief Impostors

Software Shaders in Interactive Environments Using Relief Impostors Software Shader in Interactive Environment Uing Relief Impotor ESTEBAN WALTER GONZALEZ CLUA BRUNO FEIJÓ MARCELO DREUX, FRANCISCO FONSECA ICAD/IGame/ViionLab, Department of Computer Science, PUC-Rio {eteban,

More information

Domain-Specific Modeling for Rapid System-Wide Energy Estimation of Reconfigurable Architectures

Domain-Specific Modeling for Rapid System-Wide Energy Estimation of Reconfigurable Architectures Domain-Specific Modeling for Rapid Sytem-Wide Energy Etimation of Reconfigurable Architecture Seonil Choi 1,Ju-wookJang 2, Sumit Mohanty 1, Viktor K. Praanna 1 1 Dept. of Electrical Engg. 2 Dept. of Electronic

More information

3D SMAP Algorithm. April 11, 2012

3D SMAP Algorithm. April 11, 2012 3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative

More information

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,

More information

Shortest Path Routing in Arbitrary Networks

Shortest Path Routing in Arbitrary Networks Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,

More information

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer International Reearch Journal of Applied and Baic Science 218 Available online at www.irjab.com ISSN 2251-838X / Vol, 12 (1): 49-53 Science Explorer Publication Analyi of the reult of analytical and imulation

More information

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -

More information

Software Agent (SA) to guarantee QoS for multi constrain applications in all-ip networks

Software Agent (SA) to guarantee QoS for multi constrain applications in all-ip networks Software Agent (SA) to guarantee QoS for multi contrain application in all-ip network Kazi Khaled Al-Zahid and Mituji Matumoto GITS, Waeda Univerity 94 Waeda Univ. Bldg. A-308, 1011Okuboyama Nihitomida

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in VHL and implemented

More information

A New Approach to Pipeline FFT Processor

A New Approach to Pipeline FFT Processor A ew Approach to Pipeline FFT Proceor Shouheng He and Mat Torkelon Department of Applied Electronic, Lund Univerity S- Lund, SWEDE email: he@tde.lth.e; torkel@tde.lth.e Abtract A new VLSI architecture

More information

An Intro to LP and the Simplex Algorithm. Primal Simplex

An Intro to LP and the Simplex Algorithm. Primal Simplex An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n

More information

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1 US 2003O196031A1 (19) United State (12) Patent Application Publication (10) Pub. No.: US 2003/0196031 A1 Chen (43) Pub. Date: Oct. 16, 2003 (54) STORAGE CONTROLLER WITH THE DISK Related U.S. Application

More information

Minimum Energy Reliable Paths Using Unreliable Wireless Links

Minimum Energy Reliable Paths Using Unreliable Wireless Links Minimum Energy Reliable Path Uing Unreliable Wirele Link Qunfeng Dong Department of Computer Science Univerity of Wiconin-Madion Madion, Wiconin 53706 qunfeng@c.wic.edu Micah Adler Department of Computer

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

Network Coding in Duty-Cycled Sensor Networks

Network Coding in Duty-Cycled Sensor Networks 1 Network Coding in Duty-Cycled Senor Network Roja Chandanala, Radu Stoleru, Member, IEEE Abtract Network coding and duty-cycling are two popular technique for aving energy in wirele adhoc and enor network.

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

An Approach to a Test Oracle for XML Query Testing

An Approach to a Test Oracle for XML Query Testing An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

Set-based Approach for Lossless Graph Summarization using Locality Sensitive Hashing

Set-based Approach for Lossless Graph Summarization using Locality Sensitive Hashing Set-baed Approach for Lole Graph Summarization uing Locality Senitive Hahing Kifayat Ullah Khan Supervior: Young-Koo Lee Expected Graduation Date: Fall 0 Deptartment of Computer Engineering Kyung Hee Univerity

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance A Hybrid Deployable Dynamic Traffic Aignment Framework for Robut Online Route Guidance Sriniva Peeta School of Civil Engineering, Purdue Univerity Chao Zhou Sabre, Inc. Sriniva Peeta School of Civil Engineering

More information

A note on degenerate and spectrally degenerate graphs

A note on degenerate and spectrally degenerate graphs A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove

More information

Delaunay Triangulation: Incremental Construction

Delaunay Triangulation: Incremental Construction Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )

More information

arxiv: v1 [cs.ds] 27 Feb 2018

arxiv: v1 [cs.ds] 27 Feb 2018 Incremental Strong Connectivity and 2-Connectivity in Directed Graph Louka Georgiadi 1, Giueppe F. Italiano 2, and Niko Parotidi 2 arxiv:1802.10189v1 [c.ds] 27 Feb 2018 1 Univerity of Ioannina, Greece.

More information

Diverse: Application-Layer Service Differentiation in Peer-to-Peer Communications

Diverse: Application-Layer Service Differentiation in Peer-to-Peer Communications Divere: Application-Layer Service Differentiation in Peer-to-Peer Communication Chuan Wu, Student Member, IEEE, Baochun Li, Senior Member, IEEE Department of Electrical and Computer Engineering Univerity

More information

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt

More information

Research Article Longest Path Reroute to Optimize the Optical Multicast Routing in Sparse Splitting WDM Networks

Research Article Longest Path Reroute to Optimize the Optical Multicast Routing in Sparse Splitting WDM Networks International Optic Volume 0, Article ID 9, page http://dxdoiorg/0/0/9 Reearch Article Longet Path Reroute to Optimize the Optical Multicat Routing in Spare Splitting WDM Network Huanlin Liu, Hongyue Dai,

More information

Lecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization

Lecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization Lecture Outline Global flow analyi Global Optimization Global contant propagation Livene analyi Adapted from Lecture by Prof. Alex Aiken and George Necula (UCB) CS781(Praad) L27OP 1 CS781(Praad) L27OP

More information

Shortest Paths with Single-Point Visibility Constraint

Shortest Paths with Single-Point Visibility Constraint Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet

More information

Robust Routing in Interdependent Networks

Robust Routing in Interdependent Networks Robut Routing in Interdependent Network Jianan Zhang and Eytan Modiano Laboratory for Information and Deciion Sytem, Maachuett Intitute of Technology Abtract We conider a model of two interdependent network,

More information

Frequency Table Computation on Dataflow Architecture

Frequency Table Computation on Dataflow Architecture Frequency Table Computation on Dataflow Architecture P. Škoda *, V. Sruk **, and B. Medved Rogina * * Ruđer Bošković Intitute, Zagreb, Croatia ** Faculty of Electrical Engineering and Computing, Univerity

More information

Stream: Low Overhead Wireless Reprogramming for Sensor Networks

Stream: Low Overhead Wireless Reprogramming for Sensor Networks Thi full text paper wa peer reviewed at the direction of IEEE Communication Society ubject matter expert for publication in the IEEE INFOCOM 27 proceeding. : Low Overhead Wirele Reprogramming for Senor

More information

SIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial

SIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial SIMIT 7 Component Type Editor (CTE) Uer manual Siemen Indutrial Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult

More information

Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity

Modelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity Modelling the impact of cyber attack on the traffic control centre of an urban automobile tranport ytem by mean of enhanced cyberecurity Yoana Ivanova 1,* 1 Bulgarian Academy of Science, Intitute of ICT,

More information

Stress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling

Stress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Stre-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Menter F.R. ANSYS Germany GmbH Introduction It i oberved in many CFD imulation that RANS model how inherent technology limitation

More information

Source Code (C) Phantom Support Sytem Generic Front-End Compiler BB CFG Code Generation ANSI C Single-threaded Application Phantom Call Identifier AEB

Source Code (C) Phantom Support Sytem Generic Front-End Compiler BB CFG Code Generation ANSI C Single-threaded Application Phantom Call Identifier AEB Code Partitioning for Synthei of Embedded Application with Phantom André C. Nácul, Tony Givargi Department of Computer Science Univerity of California, Irvine {nacul, givargi@ic.uci.edu ABSTRACT In a large

More information

Optimizing Synchronous Systems for Multi-Dimensional. Notre Dame, IN Ames, Iowa computation is an optimization problem (b) circuit

Optimizing Synchronous Systems for Multi-Dimensional. Notre Dame, IN Ames, Iowa computation is an optimization problem (b) circuit Optimizing Synchronou Sytem for ulti-imenional pplication Nelon L. Pao and Edwin H.-. Sha Liang-Fang hao ept. of omputer Science & Eng. ept. of Electrical & omputer Eng. Univerity of Notre ame Iowa State

More information

Floating Point CORDIC Based Power Operation

Floating Point CORDIC Based Power Operation Floating Point CORDIC Baed Power Operation Kazumi Malhan, Padmaja AVL Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland Univerity, Rocheter, MI e-mail: kmalhan@oakland.edu,

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

The underigned hereby recommend to the Faculty of Graduate Studie and Reearch aceeptance of the thei, Two Topic in Applied Algorithmic ubmitted by Pat

The underigned hereby recommend to the Faculty of Graduate Studie and Reearch aceeptance of the thei, Two Topic in Applied Algorithmic ubmitted by Pat Two Topic in Applied Algorithmic By Patrick R. Morin A thei ubmitted to the Faculty of Graduate Studie and Reearch in partial fullment of the requirement for the degree of Mater of Computer Science Ottawa-Carleton

More information

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de

More information

Cross-Layer Interactions in Multihop Wireless Sensor Networks: A Constrained Queueing Model

Cross-Layer Interactions in Multihop Wireless Sensor Networks: A Constrained Queueing Model Cro-Layer Interaction in Multihop Wirele Senor Network: A Contrained Queueing Model YANG SONG Univerity of Florida and YUGUANG FANG Univerity of Florida Xidian Univerity In thi article, we propoe a contrained

More information

Diff-Max: Separation of Routing and Scheduling in Backpressure-Based Wireless Networks

Diff-Max: Separation of Routing and Scheduling in Backpressure-Based Wireless Networks Diff-Max: Separation of Routing and Scheduling in -Baed Wirele Network Hulya Seferoglu and Eytan Modiano Laboratory For Information and Deciion Sytem Maachuett Intitute of Technology {heferog, modiano}@mit.edu

More information

How to Select Measurement Points in Access Point Localization

How to Select Measurement Points in Access Point Localization Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,

More information

Motion Control (wheeled robots)

Motion Control (wheeled robots) 3 Motion Control (wheeled robot) Requirement for Motion Control Kinematic / dynamic model of the robot Model of the interaction between the wheel and the ground Definition of required motion -> peed control,

More information

Optimal Multi-Robot Path Planning on Graphs: Complete Algorithms and Effective Heuristics

Optimal Multi-Robot Path Planning on Graphs: Complete Algorithms and Effective Heuristics Optimal Multi-Robot Path Planning on Graph: Complete Algorithm and Effective Heuritic Jingjin Yu Steven M. LaValle Abtract arxiv:507.0390v [c.ro] Jul 05 We tudy the problem of optimal multi-robot path

More information

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline Generic Travere CS 62, Lecture 9 Jared Saia Univerity of New Mexico Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v) from the bag if (v i unmarked) mark v; parent(v) = p;

More information

Kinematics Programming for Cooperating Robotic Systems

Kinematics Programming for Cooperating Robotic Systems Kinematic Programming for Cooperating Robotic Sytem Critiane P. Tonetto, Carlo R. Rocha, Henrique Sima, Altamir Dia Federal Univerity of Santa Catarina, Mechanical Engineering Department, P.O. Box 476,

More information

The Data Locality of Work Stealing

The Data Locality of Work Stealing The Data Locality of Work Stealing Umut A. Acar School of Computer Science Carnegie Mellon Univerity umut@c.cmu.edu Guy E. Blelloch School of Computer Science Carnegie Mellon Univerity guyb@c.cmu.edu Robert

More information

Mid-term review ECE 161C Electrical and Computer Engineering University of California San Diego

Mid-term review ECE 161C Electrical and Computer Engineering University of California San Diego Mid-term review ECE 161C Electrical and Computer Engineering Univerity of California San Diego Nuno Vaconcelo Spring 2014 1. We have een in cla that one popular technique for edge detection i the Canny

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

A Sparse Shared-Memory Multifrontal Solver in SCAD Software

A Sparse Shared-Memory Multifrontal Solver in SCAD Software Proceeding of the International Multiconference on ISBN 978-83-6080--9 Computer Science and Information echnology, pp. 77 83 ISSN 896-709 A Spare Shared-Memory Multifrontal Solver in SCAD Software Sergiy

More information

Priority-Based Distribution Trees for Application-Level Multicast

Priority-Based Distribution Trees for Application-Level Multicast Priority-Baed Ditribution Tree for Application-Level Multicat Jürgen Vogel, Jörg Widmer, Dirk Farin, Martin Mauve, Wolfgang Effelberg Praktiche Informatik IV, Univerity of Mannheim, Germany vogel, widmer,

More information

Separation of Routing and Scheduling in Backpressure- Based Wireless Networks

Separation of Routing and Scheduling in Backpressure- Based Wireless Networks Separation of Routing and Scheduling in - Baed Wirele Network The MIT Faculty ha made thi article openly available. Pleae hare how thi acce benefit you. Your tory matter. Citation A Publihed Publiher Seferoglu,

More information

Connected Placement of Disaster Shelters in Modern Cities

Connected Placement of Disaster Shelters in Modern Cities Connected Placement of Diater Shelter in Modern Citie Huanyang Zheng and Jie Wu Department of Computer and Information Science Temple Univerity, USA {huanyang.zheng, jiewu}@temple.edu ABSTRACT Thi paper

More information

A Basic Prototype for Enterprise Level Project Management

A Basic Prototype for Enterprise Level Project Management A Baic Prototype for Enterprie Level Project Management Saurabh Malgaonkar, Abhay Kolhe Computer Engineering Department, Mukeh Patel School of Technology Management & Engineering, NMIMS Univerity, Mumbai,

More information

Resource Auto-Scaling and Sparse Content Replication for Video Storage Systems

Resource Auto-Scaling and Sparse Content Replication for Video Storage Systems 1 Reource Auto-Scaling and Spare Content Replication for Video Storage Sytem DI NIU 1, HONG XU 2 and BAOCHUN LI 3, Univerity of Alberta 1, City Univerity of Hong Kong 2, Univerity of Toronto 3 Many video-on-demand

More information

Planning of scooping position and approach path for loading operation by wheel loader

Planning of scooping position and approach path for loading operation by wheel loader 22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader

More information

A QoS-aware Service Composition Approach based on Semantic Annotations and Integer Programming

A QoS-aware Service Composition Approach based on Semantic Annotations and Integer Programming A QoS-aware Service Compoition Approach baed on Semantic Annotation and Integer Programming I. INTRODUCTION Service Oriented Architecture (SOA) i a widely adopted paradigm for developing ditributed application

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented

More information

Task-based Adaptation for Ubiquitous Computing

Task-based Adaptation for Ubiquitous Computing IEEE Tranaction on Sytem, Man, and Cybernetic, Part C: Application and Review Special Iue on Engineering Autonomic Sytem, to appear Tak-baed Adaptation for Ubiquitou Computing João Pedro Soua, Vahe Poladian,

More information