mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee
|
|
- Samantha Beasley
- 5 years ago
- Views:
Transcription
1 Reolving Deadlock for Pipelined Stream Application on Network-on-Chip Xiaohang Wang 1,2, Peng Liu 1 1 Department of Information Science and Electronic Engineering, Zheiang Univerity Hangzhou, Zheiang, P. R. China, baikeina@yahoo.com.cn, 1 liupeng@iee.zu.edu.cn Mei Yang 2, Yingtao Jiang 2 2 Department of Electrical and Computer Engineering, Univerity of Nevada, La Vega, NV {meiyang, yingtao}@egr.unlv.edu Abtract When a tream application that demand real-time proceing over continuou data tream i running on a network-on-chip (NoC)-baed multiproceor ytem-on-chip (MPSoC), two type of deadlock may occur: (i) the routingdependent deadlock, and (ii) the meage-dependent deadlock. In thi paper, we focu on the requet-requet type meage-dependent deadlock, the mot devatating deadlock in tream application, and how that thi type of deadlock can be avoided by a proper incluion of virtual channel (VC). We firt prove a ufficient condition that determine the minimum number of VC needed to completely avoid requet-requet type meage-dependent deadlock. We then how that the problem of finding the minimum number of uch VC for a given application i NP-complete, and ubequently, a mixed integral linear programming (MILP)- baed algorithm, referred a Min_VC algorithm, i introduced to olve thi problem. Thi Min_VC algorithm can literally be integrated with any exiting application mapping algorithm to provide deadlock-free mapping reult. The experiment reult hown that for typical tream application, uch a multimedia application, the number of VC needed to avoid deadlock i fairly modet, typically ut 1 or 2 depending on application. That i, with a modet price paid in term of area and power, tream application can run in an NoC-baed ytem completely free of deadlock concern, which i neceary to deliver the quality of ervice (QoS) guarantee required by thee application. Keyword: network-on-chip (NoC), meage-dependent deadlock, virtual channel I. INTRODUCTION Network-on-chip (NoC) ha been widely accepted a a viable communication infratructure for current and future Multiproceor Sytem on Chip (MPSoC) deign [1] tailored for tream application. The increaing importance of tream proceing lie in the fact that many emerging application involve real-time proceing over continuou data tream, uch a VoIP telephony, playback audio/video, IPTV, and enor data analyi [2]. There are unfortunately two type of deadlock that may occur to a pipelined tream application running on an NoCbaed architecture: 1) the routing-dependent deadlock [1] and 2) the meage-dependent deadlock [3, 4]. A meagedependent deadlock i created when ome of thee meage can never be conumed by the conumer tak a the conumption of thee meage i mutually dependent on each other arrival. For example, meage X may block /10/$ IEEE meage Y from arriving at the end proceor/ni while Y i imultaneouly required by the conumer tak to conume X. Thi requet-requet type meage-dependent deadlock can caue devatating effect on a tream application a it may put the whole ytem into a complete tall [3, 4]. To avoid or reolve meage-dependent deadlock in a network, generally two clae of method, reactive method and proactive method, are ued [3, 4, 7]. However, thee exiting method are not uitable for the tream application running on an NoC-baed architecture, for reaon given below. For reactive method, typified by a deadlock recovery mechanim referred a mdiha [7], they cannot deliver the QoS guarantee required by tream application, ince reolving deadlock will caue unpredictably long delay [4]. There exit three poible proactive method that may help avoid deadlock. However, none of thee method will be uitable for tream application which have tringent latency and throughput requirement. (i). Ue of network buffer with an extremely large ize to avoid deadlock. Thi approach i not uitable for NoC deign, a it involve unbearably high area and power cot. In addition, thi method, a pointed out in [4], cannot help avoid the requet-requet type meagedependent deadlock. (ii). Creation of multiple virtual network with one for each meage type. Thi approach, unfortunately, cannot help avoid the requet-requet type meage-dependent deadlock [4]. (iii). Ue of end-to-end flow control. The end-to-end flow control protocol, uch a CTC protocol [3], may ignificantly increae the network latency and communication power due to the uage of additional reply meage for flow control [4]. Virtual channel (VC) have been long employed in many NoC deign to help improve network routing performance. In thi paper, we how that proper incluion of VC can alo provide a practically feaible olution to completely avoid the requet-requet type meagedependent deadlock in an NoC deign. In particular, for the firt time, we have formally proved a ufficient condition that determine the minimum number of VC actually needed to avoid the meage-dependent deadlock. Following thi theory, we propoe an MILP-baed algorithm that can help quickly find thi number, and thi algorithm hall be integrated with exiting application mapping algorithm, like the one reported in [5], to get deadlock-free 93
2 mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC needed to avoid deadlock i fairly modet, typically ut 1 or 2 depending on application. That i, with a modet price paid in term of area and power, tream application can run in an NoCbaed ytem completely free of deadlock concern. II. TARGET APPLICATION AND ARCHITECTURE MODEL A. Application model The tream application can be modeled a a ynchronou data flow graph. Definition 1[2] A ynchronou data flow graph (SDFG) i a directed graph SDFG(A, EC), where each vertex a i A repreent a tak (to be conitent, an actor that wa originally defined in [2] i alo referred a a tak in thi text), and a directed edge ec i =(a k, a ) EC repreent the data communication from a k to a. For tak a k, the following notation are defined, EX(a k ) give the wort execution time of tak a k. IN(a k ) i the et of all a k predeceor tak in SDFG. OUT(a k ) i the et of all a k ucceor tak in SDFG. A ource tak i one which ha no predeceor tak. A ink tak i one which ha no ucceor tak. All the tak will be executed repeatedly for a number of iteration to proce the incoming data tream. A tak that need to communicate with other i allowed to do o either at the beginning (i.e. read input data) or at the end (end output data) of an iteration. Let (a k a ) m denote the data (packed in meage) from a k to a after a k finihe it m-th iteration. In thi paper, we aume that all the tak have already been bound to IP core. Definition 2 A tream communication graph (SCG) i a directed acyclic graph SCG(P, E), where a vertex p k P repreent an IP core, and an edge e i =(p k, p ) E repreent the communication between vertice p k and p. ω(e i ) define the amount of data ent from p k to p in bit per econd (bp). Without lo of generality, we aume that each IP core i allocated with one tak. If multiple tak are allocated to a ingle IP core, we can treat thee tak a one macro tak. There are two type of buffer aociated with a tak: the input data buffer and the output data buffer. For any tak, one input data buffer i dedicated to receive the meage from ut one of it predeceor [2]. That i, the number of input data buffer needed i the ame a that of the tak predeceor. For any tak, meage for one of it ucceor will be tored in a dedicated output data buffer before they can be ent out [2]. That i, the number of output data buffer i the ame a that of the tak ucceor. B. Architectural model Fig. 1 how the architecture model ued in thi paper. The NoC ytem under conideration i compoed of NxN tile interconnected by a 2-D meh network. Each tile, indexed by it coordinate (x, y), where 0 x N-1 and 0 y N- 1, ha one router and one proceing node. A router, a hown in Fig. 2, implement wormhole witching. Each meage will be broken into a number of fixed ize packet with each carrying the needed routing information. Each packet will be further decompoed into flit. Aume each phyical channel i plit into V VC, realized by V buffer at each input port with each buffer holding everal flit. A hown in Fig. 2, each proceing node i compoed of four component: a proceor, a bu, a local memory unit and a network interface (NI). The local memory unit hold the input/output data buffer that can be ued by the tak allocated to thi IP core. The NI hold a number of receiving buffer each dedicated to holding everal flit of the meage from one of the tak predeceor. Hence, the number of receiving buffer configured at the NI i the ame a the number of the tak predeceor. Definition 3 An Architecture Characterization Graph (ACG) Ğ=(T, L) i a directed graph, where each vertex t i T repreent a tile (Fig. 1), and each edge l i =(t k, t ) L repreent the link between adacent t k and t. For link l i, bw(l i ) define the bandwidth provided between tile t k and t. c(l i,v) define the link cot of l i, i.e., power conumption for tranmitting one bit data from t k and t with a total of V VC. Figure 1 NoC architecture model. A rectangle box repreent a router and a circle repreent a proceing node. III. MESSAGE-DEPENDENT DEADLOCK IN STREAM APPLICATION AND MOTIVATING EXAMPLE In thi ection, we provide an example to illutrate how a requet-requet type meage-dependent deadlock can occur, followed by important obervation how uch deadlock can be avoided. Aume the SCG ha three IP core on which three tak a, b, and c are allocated, a hown in Fig. 2, ha already been mapped to the ACG with a 1x3 meh uing the mapping algorithm in [3]. The three tak (with a and b a the producer and c a the conumer) form a pipeline. Aume the puhing protocol [4] i applied; that i, a producer tak i allowed to continuouly puh all it generated data into the network until the network i aturated. In thi example, no virtual channel i ued. A buffer N buffer 1 94
3 indicated in Section 2.1, for all three tak to operate properly, c cannot tart a new iteration (ay the i-th iteration) until it receive the data generated in the i-th iteration of a and b in their correponding input data buffer. Once c tart a new iteration, the two input data buffer mut have been cleared. (c) Figure 2 An example of SCG with three proceor mapped with three tak. Deadlock configuration due to requet-requet type meagedependency. (c) Increaing the number of virtual channel can help avoid requet-requet type meage-dependent deadlock. A eriou problem, however, may happen when, for example, b produce data at a higher rate than a and c. Fig. 2 illutrate uch a ituation. Suppoe c ha finihed it (n-1)-th iteration and it i now waiting for (b c) n and (a c) n. In the following, we will how how a cyclic dependency among the meage can be developed. 1) Flit of (b c) n+1 reerve link (1, 2), the wet input buffer of R 2 and the receiving buffer of NI 2 (marked with * in Fig. 2). 2) Flit of (b c) n+1 cannot proceed to the input data buffer dedicated for b in c local memory ince the buffer i occupied by (b c) n which ha not been conumed (cleared) yet. 3) To conume (b c) n, (a c) n need to arrive at the input data buffer dedicated for a in c local memory to allow c to tart the n-th iteration. (Thi dependency i marked a ** in Fig. 2). 4) In Fig. 2, the arrow marked with *** denote that the input data buffer in c local memory dedicated for a wait for the arrival of flit of (a c) n. 5) However, flit of (a c) n cannot proceed ince the wet input buffer of R 2 i already reerved by flit of (b c) n+1. 6) Up to thi point, a deadlock i already formed. Above example ha revealed that a devatating deadlock can be formed. In another word, to avoid any deadlock like the one hown in Fig. 2, ome network control mechanim hould be in place to either proactively prevent any meage generated in different iteration from blocking other to reach their detination, or act reactively to reolve the deadlock once they are detected. A a matter of fact, all the exiting deadlock avoidance method [3, 4, 7], can actually be viewed a a variation of uch control mechanim. A a viable alternative to the exiting deadlock avoidance method, the requet-requet type meagedependent deadlock can be completely avoided by adding a number of virtual channel. For the example hown in Fig. 2, one can ee that the cycle that caue a deadlock in Fig. 2, i completely avoidable by employing two virtual channel at each router (Fig. 2(c)). Since in many NoC deign, virtual channel are ued for helping improve network routing performance [2], the hardware cot of thi approach for avoiding meage-dependent deadlock i well utifiable. IV. DEADLOCK AVOIDANCE USING VIRTUAL CHANNELS A. Sufficient condition for deadlock-avoidance with virtual channel Aume a tream application given a an SCG (Section 2) ha already been mapped to an NoC architecture modeled by an ACG (Section 2). We alo aume that (i) the routing algorithm ued i deadlock-free, and (ii) meage are delivered in-order. Lemma 1 For any tak in a tream application allocated to an IP core in a given SCG, after it finihe the execution of it n-th iteration, it input data buffer are either empty or they are holding meage from it predeceor (n+1)-th iteration. Lemma 2 For a tream application given a a SCG, there exit one virtual path between any two communicating tak o that all meage will arrive at their detination tak, provided that 1) each link i hared by communication le than or equal to the number of virtual channel and 2) the number of receiving buffer at the NI of each tile i equal to the number of predeceor of the mapped IP core in the SCG. Theorem 1 Conider an NoC architecture in which (i) V VC are ued at each router and (ii) the number of receiving buffer at the NI of each tile i et to be equal to the number of it predeceor. If each link i hared by no more than V communication, no requet-requet type meagedependent deadlock can ever be created. The proof of Lemma 1-3 and Theorem 1 are omitted due to pace limit. B. Minimum virtual channel algorithm MinVC problem: Given an ACG(T, L) that a SCG(P, E) i mapped onto, for each communication e i in SCG, find a 95
4 routing path in ACG among all the poible minimal routing path uch that the number of virtual channel needed at each router i minimized, i.e., Min {V}, atifying, l m, V gl ( m, hm( p ), ( )) (1) ei= ( pk, p) E l m, B ω( ei) g( lm, hm( p ), ( )) (2) ei= ( pk, p) E where M(p) i the tile that p i mapped to, and 1 if l h i M( pk ), M( p ) gl ( i, h M( p ), ( )) =. 0 if l h i M ( pk ), M ( p ) The condition given by (1) enure that each link l in ACG i hared by at mot V communication flow, while the condition given by (2) enure that the total bandwidth requirement of all communication flow haring each link l doe not exceed the capacity of link l. Next we will firt how that the MinVC problem i NPcomplete. Then we will preent an ILP-baed olution. Theorem 2 The deciion verion of the MinVC problem i NP-complete. The proof ketch i lited below. The deciion verion of the MinVC problem i to decide whether there exit the minimal routing path in the ACG for all communication in the SCG, while all the reource contraint are atified and no more than V VC are needed at each router. We will prove thi theorem retricting the deciion verion of the MinVC problem to it intance with ω(e i )=1 for all ei, and V=B. Thu, condition (1) and (2) of the MinVC problem are algebraically identical. Thi retriction, from general MinVC to it retricted verion, take O( L + E ) time, where L i the number of link in the ACG. The retricted MinVC problem i equivalent to finding the minimum cot unplittable flow [8] for a et of E communication flow {1,, E }, each flow ending from a ource node i to it detination node d i with demand ω(e i ) for i {1,, E }. The knapack [9] problem can thu be viewed a a pecial cae of the retricted MinVC problem, a hown in Fig. 3. In Fig. 3, for each item in knapack problem [9], there i a correponding flow i (i.e., an edge e i in the SCG) whoe demand ω(e i ) i equal to the ize of each item. The cot of each direct edge from node to d i i et to w i / i where w i and i repreent the weight and ize of the i-th item, repectively. Cot of all the other edge are et to 0. The capacity of the edge from node to v i equal to the capacity of the knapack while auming all other edge have infinite capacity. Therefore, the minimum cot flow from all i to d i, i {1,, E }, upon atifying all the demand, lead to an optimal olution to the knapack problem and vice vera. The knapack problem i NP-complete [9], and o i the MinVC problem which can be tranformed to the knapack problem. w1 1 w2 2 w E 1 E 1 Figure 3 Formulation of the Knapack problem [9] a the retricted MinVC problem. The MinVC problem can be approximated by formulating it a a mixed integer linear programming problem given below. Here, MP i i the et of all minimal path between the two tile mapped by the two IP core of edge e i, and PATH i, i the -th minimal path in MP i. f i,k = 1 if e i take the k th minimum path. Eqn. (2) et a 0 otherwie contraint that only one of the minimal path will be allocated for each communication. Eqn. (3) et that each link will not accommodate more than V communication. Eqn. (4) repreent the bandwidth contraint of each link. Our experiment ha hown that when lp_olve [10] i ued to olve Min_VC, the running time i le than 0.1ec for a 6 6 meh-baed NoC (obtained from a PC with one Intel Core2 P GHz proceor and 2GB RAM). Min_VC(M, MP) Input: (1) M: a mapped reult (2) MP: a et of all minimum path for all communication flow Output: (1) V: the number of VC needed for all router (2) { f ik, }: the et of minimal path for all e i Procedure body: { call lp_olve to olve the following equation: Obective: min V (1) Contraint: fik, = 1, ei (MP i i the et of all minimal path et for e i ); (2) k MPi fik, V, link l ; (3) ei l PATHi,, k MPi ω( ei) fi, k B, link l ; (4) ei l PATHi, } V. EXPERIMENTS In our experiment, the mapping proce i baed on an exiting mapping algorithm [5]. A. Simulation reult Fig. 4 how a ynthetic application. The execution time of each tage i modeled by a random proce with the mean and variance are choen randomly. For the mapping reult in Fig. 4, it ha been found that 2 VC are needed to completely avoid any deadlock. The CMMS ytem in Fig. 5 i compoed of both a video/audio encoder and a video/audio decoder. The video and audio encoder are ynchronized, and o are the video and audio decoder. The tak in the video codec are w E E 96
5 yntheized a follow. The mean, variance and the Hurt parameter of the execution time of each tage are from [11] We aume that the target platform run QCIF format video which ha 99 macro block in one frame. The video proceing part i pipelined at the macro block level and i ynchronized with the audio proceing at the end of each frame. For thi application, 1 VC i found ufficient to avoid deadlock. Figure 4 The SCG of ynthetic application. The mapping reult. Figure 5 The SCG of CMMS. The mapping of reult. Table I how the power and area reult for each application with the number of VC needed to avoid deadlock. The reult hown are normalized with repect to a baeline deign where no VC i ued. Of the three application, the maximum number of VC needed to avoid deadlock i 2. In the wort cenario, the power and area penaltie are 16% and 17%, repectively, which i tolerable for gaining the benefit of avoiding meage-dependent deadlock that otherwie will have devatating effect on tream application. With thee number of VC, the application have no routing dependent and meage dependent deadlock oberved. TABLE I. THE AREA AND POWER OVERHEAD TO AVOID DEADLOCKS FOR THE THREE APPLICATIONS. Application VC required Power Area Synthetic x 1.17x CMMS 1 1x 1x VI. CONCLUSION In thi paper, we preented a practical method to avoid the requet-requet type meage-dependent deadlock problem that can eriouly impact the performance of a pipelined tream application running on an NoC architecture. We howed that the requet-requet type meage-dependent deadlock can be avoided by adding the right number of virtual channel (VC) and formally proved a ufficient condition which determine the minimum number of VC actually needed to obtain uch a deadlockfree NoC deign. We further howed the problem of finding the minimum number VC i NP-complete and thu propoed an ILP-baed olution which can be and hould be integrated into any mapping algorithm whenever a deadlock-free deign i deired. Experiment baed on three tream application confirmed that deadlock have been avoided with a modet increae of power and area. REFERENCES [1] M. Palei, R. Holmark, S. Kumar, and V. Catania, "Application pecific routing algorithm for Network on Chip," IEEE Tran Parallel and Ditributed Sytem, vol. 20, no. 3, pp , [2] N. K. Kavaldiev, "A run-time reconfigurable Network-on-Chip for treaming DSP application," Phd thei, Univerity of Twente, [3] N. Concer, L. Bononi, M. Soulié, R. Locatelli, and L. P. Carloni, "CTC: An end-to-end flow control protocol for multi-core ytemon-chip," in Proc 3rd ACM/IEEE Int'l Symp on Network-on-Chip, 2009, pp [4] A. Hanon, K. Gooen, and A. Radulecu, "Avoiding meagedependent deadlock in network-baed Sytem-on-Chip," VLSI Deign, vol. 2007, no., pp. 1-10, [5] G. Acia, V. Catania, and M. Palei, "Mapping core on network-onchip," Int'l J Computational Intelligence Reearch, vol. 1, no. 2, pp , [6] X. Wang, M. Yang, Y. Jiang, and P. Liu, "A power-aware mapping approach to map ip core onto noc under bandwidth and latency contraint," to appear in ACM Tran. Architecture and Code Optimization. [7] Y. H. Song and T. M. Pinkton, "A progreive approach to handling meage-dependent deadlock in parallel computer ytem," IEEE Tran Parallel and Ditributed Sytem, vol. 14, no. 3, pp , [8] M. Skutella, "Approximating the ingle ource unplittable min-cot flow problem," Mathematical Programming, vol. 91, no. 3, pp , [9] M. R. Garey and D. S. Johnon, Computer and Intractability: A Guide to the Theory of NP-completene: Freeman San Francico, [10] lp olve 5.5. [Online]. Available: lpolve.ourceforge.net/5.5/. [11] C. Lampert, M. Militzer, and P. Ro. XviD MPEG4 core library. 97
Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.
Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut
More informationDistributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router
Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To
More informationKeywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE
Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent
More informationRouting Definition 4.1
4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing
More informationDAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications
DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu
More informationSee chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM
Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive
More informationLecture 14: Minimum Spanning Tree I
COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce
More informationPerformance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks
Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity
More informationKey Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.
Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in
More informationSLA Adaptation for Service Overlay Networks
SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two
More informationProblem Set 2 (Due: Friday, October 19, 2018)
Electrical and Computer Engineering Memorial Univerity of Newfoundland ENGI 9876 - Advanced Data Network Fall 2018 Problem Set 2 (Due: Friday, October 19, 2018) Quetion 1 Conider an M/M/1 model of a queue
More informationEmbedding Service Function Tree with Minimum Cost for NFV Enabled Multicast
1 Embedding Service Function Tree with Minimum ot for NFV Enabled Multicat angbang Ren, Student Member, IEEE, eke Guo, Senior Member, IEEE, Yulong Shen, Member, IEEE, Guoming Tang, Member, IEEE, Xu Lin,
More informationContents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course:
Content Shortet path Algorithm and Network 21/211 The hortet path problem: Statement Verion Application Algorithm (for ingle ource p problem) Reminder: relaxation, Dijktra, Variant of Dijktra, Bellman-Ford,
More informationAUTOMATIC TEST CASE GENERATION USING UML MODELS
Volume-2, Iue-6, June-2014 AUTOMATIC TEST CASE GENERATION USING UML MODELS 1 SAGARKUMAR P. JAIN, 2 KHUSHBOO S. LALWANI, 3 NIKITA K. MAHAJAN, 4 BHAGYASHREE J. GADEKAR 1,2,3,4 Department of Computer Engineering,
More informationA Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong
4th International Conference on Machinery, Material and Computing Technology (ICMMCT 2016) A Load Balancing Model baed on Load-aware for Ditributed Controller Fengjun Shang, Wenjuan Gong College of Compute
More informationMinimum congestion spanning trees in bipartite and random graphs
Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu
More informationISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Iue 4, April 2015 International Journal Advance Reearch in Computer Science and Management Studie Reearch Article / Survey Paper / Cae Study Available online at: www.ijarcm.com
More information1 The secretary problem
Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.
More informationThe Association of System Performance Professionals
The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and
More informationA Practical Model for Minimizing Waiting Time in a Transit Network
A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,
More informationA Multi-objective Genetic Algorithm for Reliability Optimization Problem
International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR
More informationCutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.
Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization
More informationxy-monotone path existence queries in a rectilinear environment
CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of
More informationMulticast with Network Coding in Application-Layer Overlay Networks
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 1, JANUARY 2004 1 Multicat with Network Coding in Application-Layer Overlay Network Ying Zhu, Baochun Li, Member, IEEE, and Jiang Guo Abtract
More informationRefining SIRAP with a Dedicated Resource Ceiling for Self-Blocking
Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT
More informationEdits in Xylia Validity Preserving Editing of XML Documents
dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,
More informationManeuverable Relays to Improve Energy Efficiency in Sensor Networks
Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov
More informationelse end while End References
621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized
More informationPower Aware Location Aided Routing in Mobile Ad-hoc Networks
International Journal of Scientific and Reearch Publication, Volume, Iue 1, December 01 1 Power Aware Location Aided Routing in Mobile Ad-hoc Network Anamika Computer Science, Inderprataha Engineering
More informationAN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM
RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt
More informationTopics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X
Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term
More informationService and Network Management Interworking in Future Wireless Systems
Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering
More informationIncreasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment
Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in
More informationShortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights
Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two
More informationChapter S:II (continued)
Chapter S:II (continued) II. Baic Search Algorithm Sytematic Search Graph Theory Baic State Space Search Depth-Firt Search Backtracking Breadth-Firt Search Uniform-Cot Search AND-OR Graph Baic Depth-Firt
More informationKaren L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract
Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial
More informationAspects of Formal and Graphical Design of a Bus System
Apect of Formal and Graphical Deign of a Bu Sytem Tiberiu Seceleanu Univerity of Turku, Dpt. of Information Technology Turku, Finland tiberiu.eceleanu@utu.fi Tomi Weterlund Turku Centre for Computer Science
More informationNew Structural Decomposition Techniques for Constraint Satisfaction Problems
New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.
More informationSoftware Shaders in Interactive Environments Using Relief Impostors
Software Shader in Interactive Environment Uing Relief Impotor ESTEBAN WALTER GONZALEZ CLUA BRUNO FEIJÓ MARCELO DREUX, FRANCISCO FONSECA ICAD/IGame/ViionLab, Department of Computer Science, PUC-Rio {eteban,
More informationDomain-Specific Modeling for Rapid System-Wide Energy Estimation of Reconfigurable Architectures
Domain-Specific Modeling for Rapid Sytem-Wide Energy Etimation of Reconfigurable Architecture Seonil Choi 1,Ju-wookJang 2, Sumit Mohanty 1, Viktor K. Praanna 1 1 Dept. of Electrical Engg. 2 Dept. of Electronic
More information3D SMAP Algorithm. April 11, 2012
3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative
More informationCERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu
CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,
More informationShortest Path Routing in Arbitrary Networks
Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,
More informationAnalysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer
International Reearch Journal of Applied and Baic Science 218 Available online at www.irjab.com ISSN 2251-838X / Vol, 12 (1): 49-53 Science Explorer Publication Analyi of the reult of analytical and imulation
More informationToday s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is
Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -
More informationSoftware Agent (SA) to guarantee QoS for multi constrain applications in all-ip networks
Software Agent (SA) to guarantee QoS for multi contrain application in all-ip network Kazi Khaled Al-Zahid and Mituji Matumoto GITS, Waeda Univerity 94 Waeda Univ. Bldg. A-308, 1011Okuboyama Nihitomida
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in VHL and implemented
More informationA New Approach to Pipeline FFT Processor
A ew Approach to Pipeline FFT Proceor Shouheng He and Mat Torkelon Department of Applied Electronic, Lund Univerity S- Lund, SWEDE email: he@tde.lth.e; torkel@tde.lth.e Abtract A new VLSI architecture
More informationAn Intro to LP and the Simplex Algorithm. Primal Simplex
An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n
More information(12) Patent Application Publication (10) Pub. No.: US 2003/ A1
US 2003O196031A1 (19) United State (12) Patent Application Publication (10) Pub. No.: US 2003/0196031 A1 Chen (43) Pub. Date: Oct. 16, 2003 (54) STORAGE CONTROLLER WITH THE DISK Related U.S. Application
More informationMinimum Energy Reliable Paths Using Unreliable Wireless Links
Minimum Energy Reliable Path Uing Unreliable Wirele Link Qunfeng Dong Department of Computer Science Univerity of Wiconin-Madion Madion, Wiconin 53706 qunfeng@c.wic.edu Micah Adler Department of Computer
More informationAdvanced Encryption Standard and Modes of Operation
Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES
More informationNetwork Coding in Duty-Cycled Sensor Networks
1 Network Coding in Duty-Cycled Senor Network Roja Chandanala, Radu Stoleru, Member, IEEE Abtract Network coding and duty-cycling are two popular technique for aving energy in wirele adhoc and enor network.
More informationHassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,
COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)
More informationAn Approach to a Test Oracle for XML Query Testing
An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,
More informationOperational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz
Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,
More informationSet-based Approach for Lossless Graph Summarization using Locality Sensitive Hashing
Set-baed Approach for Lole Graph Summarization uing Locality Senitive Hahing Kifayat Ullah Khan Supervior: Young-Koo Lee Expected Graduation Date: Fall 0 Deptartment of Computer Engineering Kyung Hee Univerity
More informationMAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc
MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic
More informationA Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance
A Hybrid Deployable Dynamic Traffic Aignment Framework for Robut Online Route Guidance Sriniva Peeta School of Civil Engineering, Purdue Univerity Chao Zhou Sabre, Inc. Sriniva Peeta School of Civil Engineering
More informationA note on degenerate and spectrally degenerate graphs
A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove
More informationDelaunay Triangulation: Incremental Construction
Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )
More informationarxiv: v1 [cs.ds] 27 Feb 2018
Incremental Strong Connectivity and 2-Connectivity in Directed Graph Louka Georgiadi 1, Giueppe F. Italiano 2, and Niko Parotidi 2 arxiv:1802.10189v1 [c.ds] 27 Feb 2018 1 Univerity of Ioannina, Greece.
More informationDiverse: Application-Layer Service Differentiation in Peer-to-Peer Communications
Divere: Application-Layer Service Differentiation in Peer-to-Peer Communication Chuan Wu, Student Member, IEEE, Baochun Li, Senior Member, IEEE Department of Electrical and Computer Engineering Univerity
More informationA SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS
A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt
More informationResearch Article Longest Path Reroute to Optimize the Optical Multicast Routing in Sparse Splitting WDM Networks
International Optic Volume 0, Article ID 9, page http://dxdoiorg/0/0/9 Reearch Article Longet Path Reroute to Optimize the Optical Multicat Routing in Spare Splitting WDM Network Huanlin Liu, Hongyue Dai,
More informationLecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization
Lecture Outline Global flow analyi Global Optimization Global contant propagation Livene analyi Adapted from Lecture by Prof. Alex Aiken and George Necula (UCB) CS781(Praad) L27OP 1 CS781(Praad) L27OP
More informationShortest Paths with Single-Point Visibility Constraint
Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet
More informationRobust Routing in Interdependent Networks
Robut Routing in Interdependent Network Jianan Zhang and Eytan Modiano Laboratory for Information and Deciion Sytem, Maachuett Intitute of Technology Abtract We conider a model of two interdependent network,
More informationFrequency Table Computation on Dataflow Architecture
Frequency Table Computation on Dataflow Architecture P. Škoda *, V. Sruk **, and B. Medved Rogina * * Ruđer Bošković Intitute, Zagreb, Croatia ** Faculty of Electrical Engineering and Computing, Univerity
More informationStream: Low Overhead Wireless Reprogramming for Sensor Networks
Thi full text paper wa peer reviewed at the direction of IEEE Communication Society ubject matter expert for publication in the IEEE INFOCOM 27 proceeding. : Low Overhead Wirele Reprogramming for Senor
More informationSIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial
SIMIT 7 Component Type Editor (CTE) Uer manual Siemen Indutrial Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult
More informationModelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity
Modelling the impact of cyber attack on the traffic control centre of an urban automobile tranport ytem by mean of enhanced cyberecurity Yoana Ivanova 1,* 1 Bulgarian Academy of Science, Intitute of ICT,
More informationStress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling
Stre-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Menter F.R. ANSYS Germany GmbH Introduction It i oberved in many CFD imulation that RANS model how inherent technology limitation
More informationSource Code (C) Phantom Support Sytem Generic Front-End Compiler BB CFG Code Generation ANSI C Single-threaded Application Phantom Call Identifier AEB
Code Partitioning for Synthei of Embedded Application with Phantom André C. Nácul, Tony Givargi Department of Computer Science Univerity of California, Irvine {nacul, givargi@ic.uci.edu ABSTRACT In a large
More informationOptimizing Synchronous Systems for Multi-Dimensional. Notre Dame, IN Ames, Iowa computation is an optimization problem (b) circuit
Optimizing Synchronou Sytem for ulti-imenional pplication Nelon L. Pao and Edwin H.-. Sha Liang-Fang hao ept. of omputer Science & Eng. ept. of Electrical & omputer Eng. Univerity of Notre ame Iowa State
More informationFloating Point CORDIC Based Power Operation
Floating Point CORDIC Baed Power Operation Kazumi Malhan, Padmaja AVL Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland Univerity, Rocheter, MI e-mail: kmalhan@oakland.edu,
More informationOn successive packing approach to multidimensional (M-D) interleaving
On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a
More informationThe underigned hereby recommend to the Faculty of Graduate Studie and Reearch aceeptance of the thei, Two Topic in Applied Algorithmic ubmitted by Pat
Two Topic in Applied Algorithmic By Patrick R. Morin A thei ubmitted to the Faculty of Graduate Studie and Reearch in partial fullment of the requirement for the degree of Mater of Computer Science Ottawa-Carleton
More informationLocalized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks
Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de
More informationCross-Layer Interactions in Multihop Wireless Sensor Networks: A Constrained Queueing Model
Cro-Layer Interaction in Multihop Wirele Senor Network: A Contrained Queueing Model YANG SONG Univerity of Florida and YUGUANG FANG Univerity of Florida Xidian Univerity In thi article, we propoe a contrained
More informationDiff-Max: Separation of Routing and Scheduling in Backpressure-Based Wireless Networks
Diff-Max: Separation of Routing and Scheduling in -Baed Wirele Network Hulya Seferoglu and Eytan Modiano Laboratory For Information and Deciion Sytem Maachuett Intitute of Technology {heferog, modiano}@mit.edu
More informationHow to Select Measurement Points in Access Point Localization
Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,
More informationMotion Control (wheeled robots)
3 Motion Control (wheeled robot) Requirement for Motion Control Kinematic / dynamic model of the robot Model of the interaction between the wheel and the ground Definition of required motion -> peed control,
More informationOptimal Multi-Robot Path Planning on Graphs: Complete Algorithms and Effective Heuristics
Optimal Multi-Robot Path Planning on Graph: Complete Algorithm and Effective Heuritic Jingjin Yu Steven M. LaValle Abtract arxiv:507.0390v [c.ro] Jul 05 We tudy the problem of optimal multi-robot path
More informationGeneric Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline
Generic Travere CS 62, Lecture 9 Jared Saia Univerity of New Mexico Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v) from the bag if (v i unmarked) mark v; parent(v) = p;
More informationKinematics Programming for Cooperating Robotic Systems
Kinematic Programming for Cooperating Robotic Sytem Critiane P. Tonetto, Carlo R. Rocha, Henrique Sima, Altamir Dia Federal Univerity of Santa Catarina, Mechanical Engineering Department, P.O. Box 476,
More informationThe Data Locality of Work Stealing
The Data Locality of Work Stealing Umut A. Acar School of Computer Science Carnegie Mellon Univerity umut@c.cmu.edu Guy E. Blelloch School of Computer Science Carnegie Mellon Univerity guyb@c.cmu.edu Robert
More informationMid-term review ECE 161C Electrical and Computer Engineering University of California San Diego
Mid-term review ECE 161C Electrical and Computer Engineering Univerity of California San Diego Nuno Vaconcelo Spring 2014 1. We have een in cla that one popular technique for edge detection i the Canny
More informationAnalyzing Hydra Historical Statistics Part 2
Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the
More informationA Sparse Shared-Memory Multifrontal Solver in SCAD Software
Proceeding of the International Multiconference on ISBN 978-83-6080--9 Computer Science and Information echnology, pp. 77 83 ISSN 896-709 A Spare Shared-Memory Multifrontal Solver in SCAD Software Sergiy
More informationPriority-Based Distribution Trees for Application-Level Multicast
Priority-Baed Ditribution Tree for Application-Level Multicat Jürgen Vogel, Jörg Widmer, Dirk Farin, Martin Mauve, Wolfgang Effelberg Praktiche Informatik IV, Univerity of Mannheim, Germany vogel, widmer,
More informationSeparation of Routing and Scheduling in Backpressure- Based Wireless Networks
Separation of Routing and Scheduling in - Baed Wirele Network The MIT Faculty ha made thi article openly available. Pleae hare how thi acce benefit you. Your tory matter. Citation A Publihed Publiher Seferoglu,
More informationConnected Placement of Disaster Shelters in Modern Cities
Connected Placement of Diater Shelter in Modern Citie Huanyang Zheng and Jie Wu Department of Computer and Information Science Temple Univerity, USA {huanyang.zheng, jiewu}@temple.edu ABSTRACT Thi paper
More informationA Basic Prototype for Enterprise Level Project Management
A Baic Prototype for Enterprie Level Project Management Saurabh Malgaonkar, Abhay Kolhe Computer Engineering Department, Mukeh Patel School of Technology Management & Engineering, NMIMS Univerity, Mumbai,
More informationResource Auto-Scaling and Sparse Content Replication for Video Storage Systems
1 Reource Auto-Scaling and Spare Content Replication for Video Storage Sytem DI NIU 1, HONG XU 2 and BAOCHUN LI 3, Univerity of Alberta 1, City Univerity of Hong Kong 2, Univerity of Toronto 3 Many video-on-demand
More informationPlanning of scooping position and approach path for loading operation by wheel loader
22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader
More informationA QoS-aware Service Composition Approach based on Semantic Annotations and Integer Programming
A QoS-aware Service Compoition Approach baed on Semantic Annotation and Integer Programming I. INTRODUCTION Service Oriented Architecture (SOA) i a widely adopted paradigm for developing ditributed application
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented
More informationTask-based Adaptation for Ubiquitous Computing
IEEE Tranaction on Sytem, Man, and Cybernetic, Part C: Application and Review Special Iue on Engineering Autonomic Sytem, to appear Tak-baed Adaptation for Ubiquitou Computing João Pedro Soua, Vahe Poladian,
More information