CERIAS Tech Report Replicated Parallel I/O without Additional Scheduling Costs by Mikhail J. Atallah Center for Education and Research

Size: px
Start display at page:

Download "CERIAS Tech Report Replicated Parallel I/O without Additional Scheduling Costs by Mikhail J. Atallah Center for Education and Research"

Transcription

1 CERIAS Tech Report Repicated Parae I/O without Additiona Scheduing Costs by Mikhai J. Ataah Center for Education and Research Information Assurance and Security Purdue University, West Lafayette, IN

2 Repicated Parae I/O without Additiona Scheduing Costs Mikhai Ataah and Keith Frikken Purdue University Abstract. A common technique for improving performance in a database is to decuster the database among mutipe disks so that data retrieva can be paraeized. In this paper we focus on answering range queries in a mutidimensiona database (such as a GIS), where each of its dimensions is divided uniformy to obtain ties which are paced on different disks; there has been a significant amount of research for this probem (a subset of which is [1,2,3,4,5,6,7,8,9,11,12,13,14,15]). A decustering scheme woud be optima if any range query coud be answered by doing no more than # of ties inside the range/# of disks retrievas from any one disk. However, it was shown in [1] that this is not achievabe in many cases even for two dimensions, and therefore much of the research in this area has focused on deveoping schemes that performed cose to optima. Recenty, the idea of using repication (i.e. pacing records on more than one disk) to increase performance has been introduced. [7, 12,13,15]. If repication is used, a retrieva schedue (i.e. which disk to retrieve each tie from) must be computed whenever a query is being processed. In this paper we introduce a cass of repicated schemes where the retrieva schedue can be computed in time O(# of ties inside the query s range), which is asymptoticay equivaent to query retrieva for the non-repicated case. Furthermore, this cass of schemes has a strong performance advantage over non-repicated schemes, and severa schemes are introduced that are either optima or are optima pus a constant additive factor. Aso presented in this paper is a stricty optima scheme for any number of coors that requires the owest known eve of repication of any such scheme. 1 Introduction A typica botteneck in many systems is I/O; to reduce the effect of this botteneck data can be decustered onto mutipe disks to faciitate parae retrieva of the data. In a muti-dimensiona database, such as a GIS or a spatio-tempora database, the dimensions can be tied uniformy to form a grid, and when answering a range query in such a system, ony the ties that contain part of the Portions of this work were supported by Grants EIA and ISS from the Nationa Science Foundation, Contract N from the Office of Nava Research, by sponsors of the Center for Education and Research in Information Assurance and Security, by Purdue Discovery Park s e-enterprise Center, and by the GAANN feowship. V. Mařík et a. (Eds.): DEXA 2003, LNCS 2736, pp , c Springer-Verag Berin Heideberg 2003

3 224 M. Ataah and K. Frikken query need to be retrieved. In such an environment, a decustering scheme attempts to pace the ties on disks in such a way that the average range query is answered as efficienty as possibe. If the database is treated ike a grid and the disks as coors, then this can be stated as a grid cooring probem. For the rest of the paper we use record and tie synonymousy and ikewise use decustering and cooring interchangeaby. Given a database decustered on k disks and a range query Q contained on m ties, Q is answered optimay if no more than m k ties are retrieved from any one disk. A decustering is caed stricty optima if a range queries can be answered optimay, however it was shown in [1] that this is not achievabe except in a few imited circumstances. Thus there has been a significant amount of work to deveop decustering schemes that have cose to optima performance, a samping of which are in [2,3,4,5,6,9,11,14]. To improve performance further the idea of using repication (i.e. pacing each tie on mutipe disks) has been introduced [7,12,13,15]. When repication is used each tie in a query can be retrieved from mutipe paces which aows greater fexibiity when answering the query. In order to use repication an agorithm for computing an optima retrieva schedue is required (i.e. which disk do you retrieve each tie from). Agorithms for computing this schedue are given in [7, 12,13,15]. The most genera of these runs in time O(rm 2 + mk) where r is the most number of disks that a tie is stored on, m is the number of ties to be retrieved, and k is the number of disks. (For more information on work using repication see Section 2). One probem with repication is that it adds a nonnegigibe overhead to query response. In this paper we define a cass of cooring techniques, which we ca the grouping schemes, for which a schedue of retrievas can be computed in time O(# of ties to be retrieved) (from here on we refer to this as O(# of ties)), which is asymptoticay equivaent to the time required to compute a schedue for a non-repicated scheme. This technique essentiay transforms existing cooring schemes into repicated schemes by pacing disks into groups and pacing ties on a disks in a group; when the group size is two this is equivaent to RAID eve 1. Previousy, the ony genera strict optima soution for any number of disks was the Compete Cooring [7,15], which paces each tie on every disk. We introduce severa new schemes that are either have stricty optima performance for a queries or wi answer any query in no more time than a stricty optima scheme pus an additive constant; these new schemes have the owest known eve of repication for such performance bounds. Furthermore, these grouping schemes are shown to have stronger experimenta performance than schemes without repication. The outine of this paper is as foows: Section 2 discusses previous work in this area, in Section 3 the grouping schemes are introduced and schemes that achieve stricty optima performance or are a constant additive factor above an optima soution, Section 4 contains experimenta data showing the performance of the grouping schemes, and Section 5 concudes the paper.

4 2 Reated Work Repicated Parae I/O without Additiona Scheduing Costs 225 Given an n-dimensiona database with each dimension divided uniformy to form ties, if ties are paced on different disks, then the retrieva of records during query processing can be paraeized. The I/O time in such a system is time that it takes to retrieve the maximum number of ties stored on the same disk. The probem of pacing the records so that the response times for range queries is minimized has been we studied; this section presents a survey of this work. Given a database decustered onto k disks and a range query Q contained on m ties, an optima tie decustering woud require no more than m k retrievas from any one disk. It was shown in [1] that this bound is unachievabe for a range queries in a grid except in a few imited circumstances. Since there are many cases where no scheme can achieve this optima bound, severa schemes have been deveoped to achieve performance that is cose to optima. To quantify cose to optima, define the additive error of a decustering scheme to be the maximum over a range queries Q of the vaue (rettime(q) m k ), where rettime(q) is defined as the retrieva time for query Q (i.e. it is the maximum number of ties in Q retrieved from a singe disk). These schemes incude Disk Moduo DM [6], Fiedwise excusive (FX) or [9], the cycic schemes (incuding RPHM, GFIB, and EXH) [11], GRS [4], a technique deveoped by Ataah and Prabhakar [2] which we wi ca RFX, and severa techniques based on discrepancy theory [5,14] (for an introduction to discrepancy theory see [10]). Note that these are just a subset of the decustering techniques that have been deveoped for this probem. Suppose we are given k coors. The DM approach [6] assigns tie (x, y) to (x + y) modk. The FX approach [9] assigns tie (x, y) to(x y) modk. Cycic aocation schemes [11] choose a skip vaue s such that gcd(k, s) = 1 and assigns tie (x, y) to(x + sy) modk. The choice of the skip vaue, s, is what defines the scheme. In RPHM (Reativey Prime Haf Moduo), s is defined to be the integer nearest to k 2 that is reativey prime to k. The GFIB (Generaized FIBonacci) scheme defines s to be an approximate of the previous Fibonacci number (by using the cosed formua) that is reativey prime to k. The EXH (Exhaustive) scheme takes a vaues of s where gcd(s, k) = 1 and finds the one that optimizes a certain criterion, for exampe minimizing the additive error is a possibe criterion. Another cass of schemes are the permutation schemes [4], in these schemes a permutation φ of the numbers in {0,..., k 1} is chosen and then tie (x, y) is assigned coor (x φ 1 ((y) modk)). Exampes of permutation schemes are DM, the cycic schemes, and GRS. In the GRS scheme [4] the permutation is computed 2i as foows: i) i {0,..., k 1} compute the fractiona part of 1+, and ca 5 it k i and then ii) sort the vaues k i and use this to define the permutation. A scheme based on the Corput set is defined in [14] that is simiar to GRS except that the k i vaues are a0 2 + a1 4 + a a k 1 where a 2 k k 1...a 1 a 0 is the binary representation of i. In [2], the RFX scheme was presented that was ater found in [3] to be equivaent to (x y R )modk, where y R is the ( og k )-bit reversa of y. For brevity, the detais of higher dimensiona schemes are not provided.

5 226 M. Ataah and K. Frikken It was shown in [14] that the additive error for k coors in two dimensions is Ω(og k), and that in d( 3) dimensions it is Ω(og d 1 2 k). In two dimensions, schemes have been deveoped (RFX, GRS, and schemes based in discrepancy theory [2,14]) that have a provabe upper bound of O(og k) on additive error. For higher dimensions d( 3), two schemes are given in [5] with additive error O(og (d 1) k), which are the schemes with the owest proven asymptotic bound on additive error. A recent trend has been to use repication [7,12,13,15] to increase performance further. Severa query scheduing agorithms have been given in previous work, but the ony genera agorithm that works for any type of repication is in [7] and runs in time O(rm 2 +mk) where r is the most number of disks that a tie is stored on, m is the number of ties to be retrieved, and k is the number of disks. In [12,13] it was proven that if ties are stored on two random disks then the probabiity of requiring more than ( (# of ties/# of disks) +1) retrievas from a singe disk for a random query approaches 0 as the number of disks gets arge. In [15] repication was used to achieve optima soutions for up to 15 disks. A stricty optima scheme, caed Compete Cooring (CC), for any number of disks by storing a ties on a disks was introduced in [7,15]. The SRCDM scheme was introduced in [7], and has an additive error no arger than 1, but requires the number of disks be a perfect square (n 2 ) and requires that each tie is paced on n disks. 3 Grouping Repication Scheme In this section the grouping schemes are introduced. Section 3.1 defines some notations that wi be needed before defining this cass of schemes. In Section 3.2, the grouping schemes are defined aong with an agorithm that computes the retrieva schedue in time O(#of ties). Section 3.3 contains severa schemes that have an additive error that is 0 or is O(1). Finay, in Section 3.4 we provide a stricty optima cooring scheme that works for any number of coors. 3.1 Notations and Terminoogy Before we can formay define the grouping schemes we need to define some notation and terminoogy. A non-repicated cooring function C for d dimensions and m disks is a function C : ℵ d {0,..., m 1}, essentiay C maps a tie to a disk. A repicated cooring function C with eve of repication r for d dimensions and m disks is a function C : ℵ d r {0,..., m 1} i, essentiay C maps a i=1 tie to the set of disks (with size no more than r) that contain the tie. Since the repicated cooring function is a generaization of the non-repicated cooring function, we assume a cooring functions are repicated for the rest of the paper. A convenient shorthand notation for cooring schemes is (C, m, r, d) which states the cooring function C decusters a d dimensiona grid onto m disks with a eve of repication r. Two cooring schemes (C, m, r, d) and (D, m, r, d) are said to be equivaent if and ony if there is a bijection f : {0,..., m 1} {0,..., m 1} such

6 Repicated Parae I/O without Additiona Scheduing Costs 227 that i C(x 1,..., x d )ifff(i) D(x 1,..., x d ). Essentiay schemes are equivaent if there is a rearrangement of the coors that wi make them identica, and it is obvious that equivaent schemes have identica retrieva time for any query. 3.2 Definition of Grouping Schemes A scheme is considered to be formed with groups if the coors are partitioned into sets and ties are assigned to partitions where assigning a partition to a tie is equivaent to pacing it on a disks in that partition. The motivation for this cass of schemes is to be abe to distribute the additive error of the cooring that assigns ties to partitions among the different members of the partition. Hence, the additive error of any one member of the partition wi be smaer, and thus reducing the additive error of the scheme. Formay, a cooring scheme (C, m, r, d) is considered formed by groups if the coors can be partitioned into sets S 1,S 2,..., S k with at east one set where S i > 1 such that if C(x 1,x 2,..., x d )=S and the foowing hods: if (S i S), then S i S. Such a scheme is caed simpe if the ast constraint is changed to: if (S i S), then S i = S. A scheme formed by groups is said to have equa partitions if each partition S i is identica in size, or equivaenty S i = m k for a i. It is possibe to transform any cooring scheme (C, m, r 1,d) into a scheme formed by groups with equa partitions (of size r 2 )(C,mr 2,r 1 r 2,d), where C is defined as: C (x 1,..., x d )= {im + s 0 i<r 2 }, we denote this s C(x 1,...,x d ) transformation process by GROUP ((C, m, r 1,d),r 2 )((C, m, r 1,d) is referred to as the base scheme in what foows). A scheme defined with GROUP is simpe if r 1 = 1. Now any scheme defined with GROUP is a scheme formed by groups with equa partitions, but any scheme formed by groups with equa partitions is equivaent to a scheme that can be defined with GROUP (proof omitted). We ca the set of schemes defined by GROUP the grouping schemes. There have been scheduing agorithms defined for any repicated agorithm that wi work for any repicated scheme, but for simpe grouping schemes (represented by GROUP ((C, m, 1,d),r)) there is a scheduing agorithm that runs in time O(m) and executes with one pass over the ties (see RetrieveTies beow). The agorithm uses a function SetSchedue(tie,disk) which sets the schedue to retrieve tie from disk. begin RetrieveTies(Query, (C,mr,r,d) =GROU P ((D, m, 1,d),r)) A[] := array initiaized to 0 of size m. fora t =(t 1,..., t d ) in Query do c := C(t) SetSchedue(t,c + A[c]) A[c] :=((A[c]+m) mod(mr)) endfor end RetrieveTies

7 228 M. Ataah and K. Frikken Thus simpe grouping schemes can be used without having to incur the additiona scheduing costs of other repicated schemes. In addition to this, the additive error of a grouping scheme with eve of repication is bounded by the o where o is the additive error of the base scheme (see Theorem 3-3). Before this can be proven we need Lemmas 3-1 and 3-2. Lemma 3-1: If the cooring scheme (C, m, r, d) has an additive error of o, then GROUP ((C, m, r, d),) wi have a response time no arger than x k +o for x records. Proof: For the x records the origina cooring scheme wi have at most ( x k + o) instances of any one coor which means there wi be at most ( x k + o) instances of any group. These vaues can be distributed equay among the coors in that group to obtain a maximum response time of x k +o. QED Lemma 3-2: x k +o x k + o Proof: Let x = a(k)+bk + c, where 0 b<and 0 c<k. There are two cases to consider: (b = 0 and c =0)or(b 0orc 0). Case 1: (b = 0 and c = 0): x k +o = a(k) k +o = a+o = a + o = a(k) k + o = x k + o Case 2: (b 0orc 0): x k +o = ak+bk+c k +o = a+b+ c k +o a + b+1+o a + +o = a +1+ o = a(k)+bk+c k + o = x k + o. In either case x k +o x k + o. QED Theorem 3-3: If the cooring scheme (C, m, r,d) has an additive error of o, then GROUP ((C, m, r,d),r) wi have an additive error no arger than o r. Proof: Foows directy from Lemma 3-1 and Lemma 3-2. QED This ast theorem impies that the additive error for a cooring scheme can be reduced by using this grouping method. Since the additive error can be reduced the expected vaue above optima wi aso be reduced. To summarize this section, a cass of repicated schemes can be defined with the GROU P transformation, which we ca the grouping schemes. A subset of these schemes are simpe and for this subset there are two significant benefits compared to non-repicated schemes incuding: i) queries can be processed in time proportiona to the number of records which is asymptoticay optima, and ii) there is a performance increase. 3.3 Achieving Optima and Constant Additive Error In this section schemes with 0 and O(1) additive error are introduced. Coroary 3-4: If a scheme (C, m, r 1,d) is stricty optima so is GROUP ((C, m, r 1,d),r 2 ). Proof: Since (C, m, r 1,d) is stricty optima the additive error wi be 0, and thus by Theorem 3-3, the additive error of GROUP ((C, m, r 1,d),r 2 ) wi aso be 0, and thus is stricty optima. QED The previous coroary impies that any scheme with eve of repication r that is optima for c disks can be transformed using GROUP into a scheme that is optima for ck disks with eve of repication kr. It is possibe to coor a

8 Repicated Parae I/O without Additiona Scheduing Costs 229 two dimensiona grid optimay with 1, 2, or 3 (or 5 in 2-D) coors using RPHM in two dimensions and DM in higher dimensions. Hence, it is possibe to coor a grid with r, 2r, or3r, (or 5r in 2-D) with eve of repication r in a stricty optima fashion (by Coroary 3-4). Furthermore, these schemes are simpe and so RetrieveTies can be used to retrieve the ties in time proportiona to the number of records. The CC scheme described in [7,15] is the scheme defined above that uses a base scheme with ony 1 coor. In addition to these optima schemes there are grouping schemes that achieve an additive error that is O(1). Coroary 3-5: If a scheme (C, m, r 1,d) has an additive error of O(f(m)) for some function f then is GROUP ((C, m, r 1,d),x), where x>f(m) has an additive error that is O(1). Proof: Since the scheme (C, m, r 1,d) has an additive error of O(f(m)), then the additive error is bounded by af(m) for some constant a. Now by theorem 3-3, GROUP ((C, m, r 1,d),x) wi have an additive error no arger than af(m) x a and thus is O(1). QED The foowing is a tabe of grouping schemes with base schemes with m coors that have an additive error which is O(1) but can be schedued with RetrieveTies (it is assumed m is a power of 2 for the RFX scheme): Leve of Additive Base Scheme Dimensions Repication Error LHDM [8] d (m 1) d RFX, GRS, and other schemes [2,3,14] 2 og m O(1) RFX [2,3] 2 2 og m 3 1 Schemes in [5] d og d 1 (m) O(1) 3.4 Generaizing Optima Additive Error In the previous section schemes were introduced that were stricty optima, but these schemes are appied in the situation where the number of coors was a mutipe of the number of coors in a base scheme that is optima (i.e. 1, 2, or 3 (or 5 in 2-D)). The CC cooring is an instance of the previous scheme and is stricty optima for any number of coors, but it requires that the eve of repication be the number of coors, which may be unreasonabe for many appications. In this section a stricty optima scheme for any number of coors is given with a eve of repication cose to haf the number of coors. The scheme presented here is a generaization of GROU P ((C,2, 1, d), k) where C is the DM cooring scheme that is stricty optima for any number of coors. In the case, where the number of coors is even, we are triviay done using schemes discussed in the previous section. Suppose the number of coors is odd (i.e. m =2k + 1), to create a scheme for m coors pace 2k of the coors using the grouped DM scheme with eve of repication k and then pace the entire database on the ast disk. Note that the eve of repication for such a scheme for m disks is m 2 +(m mod 2) which is about m 2. It can be proven that this scheme is stricty optima, but we omit this proof due to space constraints.

9 230 M. Ataah and K. Frikken A possibe criticism of this scheme is that if you can pace the entire database on a singe disk, then why not use the CC mechanism for simpicity. However, in this case it is ony required that a singe disk be arge enough to hod the entire database. This may not be reasonabe for arge databases, but is reasonabe in some situations. This generaized approach can be extended to grouping schemes with base schemes with 3 (and 5 in 2-D) disks in a simiar fashion (we omit the detais due to space constraints). It is not true however that if you have an optima scheme for k coors that if you put a ties on another disk that the soution wi be optima for k + 1 disks. The scheme defined in this section constitutes a genera stricty optima schemes with the owest known eve of repication. With some modification to our scheduing agorithm the schedue can be computed in time O(# of records). We give a verba description of the agorithm here for when there are 2k + 1 coors and the scheme described above is used. Essentiay there are two groups of k coors and 1 extra coor. We know that an optima schedue is achievabe so we determine what optima is, and ca it o. Assign up to the first ko ties of each group to disks in that group, such that no more than o ties are assigned to any one disk, and if there are any ties remaining after this has been done to both groups assign these eftovers to the ast disk which is not in either group. 4 Experiments For this section, experiments were performed to compare the performance between grouped schemes with eve of repication as 2 and non-grouped schemes. The comparison criterion that is used is the expected deviation from optima for a queries. To compute the expected deviation from optima for a cooring scheme (C, m, r, d) we compute the expected vaue from optima of a wraparound queries in an d dimensiona grid with side engths equa to m. There is a finite number of queries in such a grid so this vaue can be computed exacty for smaer m vaues, but is estimated for arger vaues. This estimation is done by taking a random samping of queries and computing the expected deviation from optima of these queries. It is worth noting that when an exact vaue is computed that the maximum additive error found wi be the maximum additive error in any grid (see [8], which can be generaized to grouping schemes, but this generaization is omitted). To perform the comparison between the repicated and non-repicated schemes we use a hybrid cooring. Given a set of coorings this hybrid cooring uses the cooring that minimizes the expected deviation from optima for a specific number of disks, i.e. the hybrid cooring uses the best cooring in the set for a specific situation. The comparison is figure 1 is between the hybrid cooring of a set of non-repicated schemes and the hybrid cooring for these schemes transformed with GROU P using eve of repication of 2. The set of non-repicated cooring schemes used are DM [6], FX (for powers of 2) [9], RFX (for powers of 2) [2], RPHM [11], GFIB [11], GRS [4], and a scheme

10 Repicated Parae I/O without Additiona Scheduing Costs 231 Fig. 1. Expected Deviation from Optima for 2-D Schemes based on the Corput set [14]. For the grouping schemes we use the grouped version of these schemes with eve of repication 2. When the number of disks is no more than 40, exact vaues were computed, but estimates were used for up to 140 disks. These estimates were made by ooking at 5000 queries (chosen randomy with uniform distribution) in the grid using the mean deviation as the estimate. The resuts are dispayed in Figure 1. Figure 1 is interesting for severa reasons. First, it shows that the estimate is accurate for predicting the expected deviation for vaues up to 40. Aso, it shows that the grouping schemes perform far better than the non-repicated schemes, since the expected deviation from optima is 2-3 times arger for non-repicated coorings than for grouping schemes. Thus if a repication eve of 2 is used, then range query performance wi be improved substantiay. 5 Concusions When decustering data, there are three inhibiting factors that may prevent the usage of repication: i) there is not enough disk space on each disk to contain enough information, ii) the sow down that occurs with query scheduing for repication is too overwheming, and iii) the benefit from repication is not significant. We have introduced a cass of schemes, caed the grouping schemes, which eiminate conditions (ii) and (iii). Condition (ii) is eiminated because the grouping schemes can be schedued in time O(number of ties), and it was shown

11 232 M. Ataah and K. Frikken in Section 4, that these techniques perform extremey we even if the eve of repication is 2 which eiminates condition (iii). Thus an important concusion about the usage of repication can be stated: If there is enough room on the disks to faciitate repication, then repication shoud be used. Furthermore, a stricty optima scheme for any number of coors with the owest known eve of repication for such a soution was presented aong with severa schemes with additive error that is O(1) were given that have fewer restrictions on the number of disks and have a ower eve of repication than previous schemes that achieve an O(1) bound on additive error (the authors know of ony one such previous scheme, which is SRCDM). References 1. K. Abde-Ghaffar and A. E. Abbadi. Optima aocation of two-dimensiona data. In Internationa Conference on Database Theory, pages , M. J. Ataah and S. Prabhakar. (amost) optima parae bock access to range queries. In Proceedings of the nineteenth ACM SIGMOD-SIGACT-SIGART symposium on Principes of database systems, pages ACM Press, R. Bhatia, R. Sinha, and C.-M. Chen. Hierarchica decustering schemes for range queries. In In 7th Int Conf. on Extending Database Technoogy, R. Bhatia, R. K. Sinha, and C.-M. Chen. Decustering using goden ratio sequences. In ICDE, pages , C.-M. Chen and C. T. Cheng. From discrepancy to decustering: near-optima mutidimensiona decustering strategies for range queries. In Proceedings of the twentyfirst ACM SIGMOD-SIGACT-SIGART symposium on Principes of database systems, pages ACM Press, H. Du and J. Soboewski. Disk aocation for cartesian product fies on mutipe disk systems. ACM Transactions on Database System, pages , K. Frikken, M. Ataah, S. Prabhakar, and R. Safavi-Naini. Optima parae i/o for range queries through repication. In Proceedings of 13th Int. Conf. on Database and Expert Systems Appication (LNCS 2453), pages B. Himatsingka, J. Srivastava, J.-Z. Li, and D. Rotem. Latin hypercubes: A cass of mutidimensiona decustering techniques, M. H. Kim and S. Pramanik. Optima fie distribution for partia match retrieva. In Proceedings of the 1988 ACM SIGMOD internationa conference on Management of data, pages ACM Press, J. Matousek. Geometric discrepancy, an iustrated guide. Springer-Verag, S. Prabhakar, K. Abde-Ghaffar, D. Agrawa, and A. E. Abbadi. Cycic aocation of two-dimensiona data. Technica Report TRCS97-08, 1, P. Sanders. Reconciing simpicity and reaism in parae disk modes. In Proceedings of the twefth annua ACM-SIAM symposium on Discrete agorithms, pages ACM Press, P. Sanders, S. Egner, and J. Korst. Fast concurrent access to parae disks. In Proceedings of the eeventh annua ACM-SIAM symposium on Discrete agorithms, pages ACM Press, R. K. Sinha, R. Bhatia, and C.-M. Chen. Asymptoticay optima decustering schemes for range queries. In Internationa Conference on Database Theory, A. Tosun and H. Ferhatosmanogu. Optima parae i/o using repication. Technica Report OSU-CISRC-11/01-TR26, 2001.

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

Alpha labelings of straight simple polyominal caterpillars

Alpha labelings of straight simple polyominal caterpillars Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.

More information

CERIAS Tech Report Cropping-Resilient Segmented Multiple Watermarking by Mikhail J. Atallah Center for Education and Research Information

CERIAS Tech Report Cropping-Resilient Segmented Multiple Watermarking by Mikhail J. Atallah Center for Education and Research Information CERIAS Tech Report 2003-49 Cropping-Resilient Segmented Multiple Watermarking by Mikhail J. Atallah Center for Education and Research Information Assurance and Security Purdue University, West Lafayette,

More information

Solutions to the Final Exam

Solutions to the Final Exam CS/Math 24: Intro to Discrete Math 5//2 Instructor: Dieter van Mekebeek Soutions to the Fina Exam Probem Let D be the set of a peope. From the definition of R we see that (x, y) R if and ony if x is a

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

A Petrel Plugin for Surface Modeling

A Petrel Plugin for Surface Modeling A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica

More information

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University Arithmetic Coding Prof. Ja-Ling Wu Department of Computer Science and Information Engineering Nationa Taiwan University F(X) Shannon-Fano-Eias Coding W..o.g. we can take X={,,,m}. Assume p()>0 for a. The

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

Chapter Multidimensional Direct Search Method

Chapter Multidimensional Direct Search Method Chapter 09.03 Mutidimensiona Direct Search Method After reading this chapter, you shoud be abe to:. Understand the fundamentas of the mutidimensiona direct search methods. Understand how the coordinate

More information

An Exponential Time 2-Approximation Algorithm for Bandwidth

An Exponential Time 2-Approximation Algorithm for Bandwidth An Exponentia Time 2-Approximation Agorithm for Bandwidth Martin Fürer 1, Serge Gaspers 2, Shiva Prasad Kasiviswanathan 3 1 Computer Science and Engineering, Pennsyvania State University, furer@cse.psu.edu

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

arxiv: v1 [cs.cg] 3 Dec 2013

arxiv: v1 [cs.cg] 3 Dec 2013 Linear transformation distance for bichromatic matchings Oswin Aichhozer Luis Barba Thomas Hack Aexander Piz Birgit Vogtenhuber arxiv:1312.0884v1 [cs.cg] 3 Dec 2013 Abstract Let P = B R be a set of 2n

More information

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters

Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters Crossing Minimiation Probems o Drawing Bipartite Graphs in Two Custers Lanbo Zheng, Le Song, and Peter Eades Nationa ICT Austraia, and Schoo o Inormation Technoogies, University o Sydney,Austraia Emai:

More information

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER!

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER! [1,2] have, in theory, revoutionized cryptography. Unfortunatey, athough offer many advantages over conventiona and authentication), such cock synchronization in this appication due to the arge operand

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program? Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,

More information

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction

More information

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models On Upper Bounds for Assortment Optimization under the Mixture of Mutinomia Logit Modes Sumit Kunnumka September 30, 2014 Abstract The assortment optimization probem under the mixture of mutinomia ogit

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

A Local Optimal Method on DSA Guiding Template Assignment with Redundant/Dummy Via Insertion

A Local Optimal Method on DSA Guiding Template Assignment with Redundant/Dummy Via Insertion A Loca Optima Method on DSA Guiding Tempate Assignment with Redundant/Dummy Via Insertion Xingquan Li 1, Bei Yu 2, Jiani Chen 1, Wenxing Zhu 1, 24th Asia and South Pacific Design T h e p i c Automation

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints *

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG

More information

Space-Time Trade-offs.

Space-Time Trade-offs. Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe

More information

MCSE Training Guide: Windows Architecture and Memory

MCSE Training Guide: Windows Architecture and Memory MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the

More information

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:

More information

Fastest-Path Computation

Fastest-Path Computation Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods

More information

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Register Aocation Consider the foowing assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Assume that two registers are avaiabe. Starting from the eft a compier woud generate

More information

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed

More information

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES Eya En Gad, Akshay Gadde, A. Saman Avestimehr and Antonio Ortega Department of Eectrica Engineering University of Southern

More information

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER Internationa Journa on Technica and Physica Probems of Engineering (IJTPE) Pubished by Internationa Organization of IOTPE ISSN 077-358 IJTPE Journa www.iotpe.com ijtpe@iotpe.com September 014 Issue 0 Voume

More information

17.3 Surface Area of Pyramids and Cones

17.3 Surface Area of Pyramids and Cones Name Cass Date 17.3 Surface Area of Pyramids and Cones Essentia Question: How is the formua for the atera area of a reguar pyramid simiar to the formua for the atera area of a right cone? Expore G.11.C

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

Image Segmentation Using Semi-Supervised k-means

Image Segmentation Using Semi-Supervised k-means I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging

More information

Further Concepts in Geometry

Further Concepts in Geometry ppendix F Further oncepts in Geometry F. Exporing ongruence and Simiarity Identifying ongruent Figures Identifying Simiar Figures Reading and Using Definitions ongruent Trianges assifying Trianges Identifying

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

Craig A. Knoblock. Carnegie Mellon University. Pittsburgh, PA empirical demonstration to date, but these results are

Craig A. Knoblock. Carnegie Mellon University. Pittsburgh, PA empirical demonstration to date, but these results are Proceedings of the Ninth Nationa Conference on Arti- cia Inteigence, AAAI Press, Meno Par, CA, 1991 Search Reduction in Hierarchica Probem Soving Craig A. Knoboc Schoo of Computer Science Carnegie Meon

More information

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing Rea-Time Image Generation with Simutaneous Video Memory Read/rite Access and Fast Physica Addressing Mountassar Maamoun 1, Bouaem Laichi 2, Abdehaim Benbekacem 3, Daoud Berkani 4 1 Department of Eectronic,

More information

M. Badent 1, E. Di Giacomo 2, G. Liotta 2

M. Badent 1, E. Di Giacomo 2, G. Liotta 2 DIEI Dipartimento di Ingegneria Eettronica e de informazione RT 005-06 Drawing Coored Graphs on Coored Points M. Badent 1, E. Di Giacomo 2, G. Liotta 2 1 University of Konstanz 2 Università di Perugia

More information

Analysis of Random. Processes via And-Or Tree Evaluation. Michael Mitzenmachert M. Amin Shokrollahiz

Analysis of Random. Processes via And-Or Tree Evaluation. Michael Mitzenmachert M. Amin Shokrollahiz Anaysis of Random Processes via And-Or Tree Evauation Michae G. Luby* Michae Mitzenmachert M. Amin Shokroahiz Abstract distributions not considered by previous anayses. We introduce a new set of probabiistic

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

On-Chip CNN Accelerator for Image Super-Resolution

On-Chip CNN Accelerator for Image Super-Resolution On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement

More information

MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY

MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY R.D. FALGOUT, T.A. MANTEUFFEL, B. O NEILL, AND J.B. SCHRODER Abstract. The need for paraeism in the time dimension is being driven

More information

More Relation Model: Functional Dependencies

More Relation Model: Functional Dependencies More Reation Mode: Functiona Dependencies Lecture #7 Autumn, 2001 Fa, 2001, LRX #07 More Reation Mode: Functiona Dependencies HUST,Wuhan,China 152 Functiona Dependencies X -> A = assertion about a reation

More information

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162 oward Efficient Spatia Variation Decomposition via Sparse Regression Wangyang Zhang, Karthik Baakrishnan, Xin Li, Duane Boning and Rob Rutenbar 3 Carnegie Meon University, Pittsburgh, PA 53, wangyan@ece.cmu.edu,

More information

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line American J. of Engineering and Appied Sciences 3 (): 5-24, 200 ISSN 94-7020 200 Science Pubications Appication of Inteigence Based Genetic Agorithm for Job Sequencing Probem on Parae Mixed-Mode Assemby

More information

Sample of a training manual for a software tool

Sample of a training manual for a software tool Sampe of a training manua for a software too We use FogBugz for tracking bugs discovered in RAPPID. I wrote this manua as a training too for instructing the programmers and engineers in the use of FogBugz.

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Scheduing Announcement Homework 2 due on October 25th Project 1 due on October 26th 2 CSE 120 Scheduing and Deadock Scheduing Overview In discussing

More information

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method 297 Rea-Time Feature escriptor Matching via a Muti-Resoution Ehaustive Search Method Chi-Yi Tsai, An-Hung Tsao, and Chuan-Wei Wang epartment of Eectrica Engineering, Tamang University, New Taipei City,

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components Illustrated

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components Illustrated Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Fa 2017 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program instructions

More information

Priority Queueing for Packets with Two Characteristics

Priority Queueing for Packets with Two Characteristics 1 Priority Queueing for Packets with Two Characteristics Pave Chuprikov, Sergey I. Nikoenko, Aex Davydow, Kiri Kogan Abstract Modern network eements are increasingy required to dea with heterogeneous traffic.

More information

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters Optimization and Appication of Support Vector Machine Based on SVM Agorithm Parameters YAN Hui-feng 1, WANG Wei-feng 1, LIU Jie 2 1 ChongQing University of Posts and Teecom 400065, China 2 Schoo Of Civi

More information

TSR: Topology Reduction from Tree to Star Data Grids

TSR: Topology Reduction from Tree to Star Data Grids 03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen

More information

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism Backing-up Fuzzy Contro of a Truck-traier Equipped with a Kingpin Siding Mechanism G. Siamantas and S. Manesis Eectrica & Computer Engineering Dept., University of Patras, Patras, Greece gsiama@upatras.gr;stam.manesis@ece.upatras.gr

More information

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014 5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 014 Topoogy-Transparent Scheduing in Mobie Ad Hoc Networks With Mutipe Packet Reception Capabiity Yiming Liu, Member, IEEE,

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Lecture 4: Threads

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Lecture 4: Threads CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Lecture 4: Threads Announcement Project 0 Due Project 1 out Homework 1 due on Thursday Submit it to Gradescope onine 2 Processes Reca that

More information

Quality of Service Evaluations of Multicast Streaming Protocols *

Quality of Service Evaluations of Multicast Streaming Protocols * Quaity of Service Evauations of Muticast Streaming Protocos Haonan Tan Derek L. Eager Mary. Vernon Hongfei Guo omputer Sciences Department University of Wisconsin-Madison, USA {haonan, vernon, guo}@cs.wisc.edu

More information

On Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture

On Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture On inding the est Partia Muticast Protection Tree under ua-homing rchitecture Mei Yang, Jianping Wang, Xiangtong Qi, Yingtao Jiang epartment of ectrica and omputer ngineering, University of Nevada Las

More information

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing 100039, China shentao@casm.ac.cn Xu Dehe Institute of resources and environment, North

More information

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002*

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002* RDF Objects 1 Aex Barne Information Infrastructure Laboratory HP Laboratories Bristo HPL-2002-315 November 27 th, 2002* E-mai: Andy_Seaborne@hp.hp.com RDF, semantic web, ontoogy, object-oriented datastructures

More information

The Big Picture WELCOME TO ESIGNAL

The Big Picture WELCOME TO ESIGNAL 2 The Big Picture HERE S SOME GOOD NEWS. You don t have to be a rocket scientist to harness the power of esigna. That s exciting because we re certain that most of you view your PC and esigna as toos for

More information

l Tree: set of nodes and directed edges l Parent: source node of directed edge l Child: terminal node of directed edge

l Tree: set of nodes and directed edges l Parent: source node of directed edge l Child: terminal node of directed edge Trees & Heaps Week 12 Gaddis: 20 Weiss: 21.1-3 CS 5301 Fa 2016 Ji Seaman 1 Tree: non-recursive definition Tree: set of nodes and directed edges - root: one node is distinguished as the root - Every node

More information

A Method for Calculating Term Similarity on Large Document Collections

A Method for Calculating Term Similarity on Large Document Collections $ A Method for Cacuating Term Simiarity on Large Document Coections Wofgang W Bein Schoo of Computer Science University of Nevada Las Vegas, NV 915-019 bein@csunvedu Jeffrey S Coombs and Kazem Taghva Information

More information

Planar Graphs of Bounded Degree have Constant Queue Number

Planar Graphs of Bounded Degree have Constant Queue Number Panar Graphs of Bounded Degree have Constant Queue Number Michae A. Bekos, Henry Förster, Martin Gronemann, Tamara Mchedidze 3 Fabrizio Montecchiani 4, Chrysanthi Raftopouou 5, Torsten Ueckerdt 3 Institute

More information

Distinct Sampling on Streaming Data with Near-Duplicates*

Distinct Sampling on Streaming Data with Near-Duplicates* Distinct Samping on Streaming Data with Near-Dupicates* ABSTRACT Jiecao Chen Indiana University Boomington Boomington, IN, USA jiecchen@umai.iu.edu In this paper we study how to perform distinct samping

More information

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department

More information

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study

More information

Approximate Closest Community Search in Networks

Approximate Closest Community Search in Networks Approximate Cosest Community Search in Networks Xin Huang, Laks V.S. Lakshmanan, Jeffrey Xu Yu, Hong Cheng University of British Coumbia, The Chinese University of Hong Kong {xin,aks}@cs.ubc.ca, {yu, hcheng}@se.cuhk.edu.hk

More information

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Nattawut Thepayasuwan, Member, IEEE and Aex Doboi, Member, IEEE Abstract

More information

Searching, Sorting & Analysis

Searching, Sorting & Analysis Searching, Sorting & Anaysis Unit 2 Chapter 8 CS 2308 Fa 2018 Ji Seaman 1 Definitions of Search and Sort Search: find a given item in an array, return the index of the item, or -1 if not found. Sort: rearrange

More information

Bridge Talk Release Notes for Meeting Exchange 5.0

Bridge Talk Release Notes for Meeting Exchange 5.0 Bridge Tak Reease Notes for Meeting Exchange 5.0 This document ists new product features, issues resoved since the previous reease, and current operationa issues. New Features This section provides a brief

More information

TechTest2017. Solutions Key. Final Edit Copy. Merit Scholarship Examination in the Sciences and Mathematics given on 1 April 2017, and.

TechTest2017. Solutions Key. Final Edit Copy. Merit Scholarship Examination in the Sciences and Mathematics given on 1 April 2017, and. TechTest07 Merit Schoarship Examination in the Sciences and Mathematics given on Apri 07, and sponsored by The Sierra Economics and Science Foundation Soutions Key V9feb7 TechTest07 Soutions Key / 9 07

More information

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y. FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four

More information

Understanding the Mixing Patterns of Social Networks: The Impact of Cores, Link Directions, and Dynamics

Understanding the Mixing Patterns of Social Networks: The Impact of Cores, Link Directions, and Dynamics Understanding the Mixing Patterns of Socia Networks: The Impact of Cores, Link Directions, and Dynamics [Last revised on May 22, 2011] Abedeaziz Mohaisen Huy Tran Nichoas Hopper Yongdae Kim University

More information

Performance of data networks with random links

Performance of data networks with random links Performance of data networks with random inks arxiv:adap-org/9909006 v2 4 Jan 2001 Henryk Fukś and Anna T. Lawniczak Department of Mathematics and Statistics, University of Gueph, Gueph, Ontario N1G 2W1,

More information

Succinct Indices for Path Minimum, with Applications to Path Reporting

Succinct Indices for Path Minimum, with Applications to Path Reporting Succinct Indices for Path Minimum, with Appications to Path Reporting Timothy M. Chan 1, Meng He 2, J. Ian Munro 1, and Gein Zhou 1 1 David R. Cheriton Schoo of Computer Science, University of Wateroo,

More information

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

Distributed Approximation of k-service Assignment

Distributed Approximation of k-service Assignment Distributed Approximation of k-service Assignment Magnús M. Hadórsson, Sven Köher 2, and Dror Rawitz 3 Reykjavik University, Iceand, mmh@ru.is 2 University of Freiburg, koehers@informatik.uni-freiburg.de

More information

Optimized Base-Station Cache Allocation for Cloud Radio Access Network with Multicast Backhaul

Optimized Base-Station Cache Allocation for Cloud Radio Access Network with Multicast Backhaul Optimized Base-Station Cache Aocation for Coud Radio Access Network with Muticast Backhau Binbin Dai, Student Member, IEEE, Ya-Feng Liu, Member, IEEE, and Wei Yu, Feow, IEEE arxiv:804.0730v [cs.it] 28

More information

and its spectrum 1. Notation and preliminaries ~~~(AI-A(G)) of A(G) by G{\), and refer to

and its spectrum 1. Notation and preliminaries ~~~(AI-A(G)) of A(G) by G{\), and refer to BULL. AUSTRAL. MATH. SOC. VOL. 18 (1978), 21-28. A new graph product and its spectrum C.D. Godsi and B.D. McKay A new graph product is introduced, and the characteristic poynomia of a graph so-formed is

More information

Chapter 5: Transactions in Federated Databases

Chapter 5: Transactions in Federated Databases Federated Databases Chapter 5: in Federated Databases Saes R&D Human Resources Kemens Böhm Distributed Data Management: in Federated Databases 1 Kemens Böhm Distributed Data Management: in Federated Databases

More information

Endoscopic Motion Compensation of High Speed Videoendoscopy

Endoscopic Motion Compensation of High Speed Videoendoscopy Endoscopic Motion Compensation of High Speed Videoendoscopy Bharath avuri Department of Computer Science and Engineering, University of South Caroina, Coumbia, SC - 901. ravuri@cse.sc.edu Abstract. High

More information

Automatic Hidden Web Database Classification

Automatic Hidden Web Database Classification Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,

More information

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal Abstract Authorization of a QoS Path based on Generic Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taa Advanced Internet Research Group, Department of Computer Science, University of Amsterdam.

More information

Service Scheduling for General Packet Radio Service Classes

Service Scheduling for General Packet Radio Service Classes Service Scheduing for Genera Packet Radio Service Casses Qixiang Pang, Amir Bigoo, Victor C. M. Leung, Chris Schoefied Department of Eectrica and Computer Engineering, University of British Coumbia, Vancouver,

More information

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations Formuation of Loss minimization Probem Using Genetic Agorithm and Line-Fow-based Equations Sharanya Jaganathan, Student Member, IEEE, Arun Sekar, Senior Member, IEEE, and Wenzhong Gao, Senior member, IEEE

More information

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs Repication of Virtua Network Functions: Optimizing Link Utiization and Resource Costs Francisco Carpio, Wogang Bziuk and Admea Jukan Technische Universität Braunschweig, Germany Emai:{f.carpio, w.bziuk,

More information

Multi-level Shape Recognition based on Wavelet-Transform. Modulus Maxima

Multi-level Shape Recognition based on Wavelet-Transform. Modulus Maxima uti-eve Shape Recognition based on Waveet-Transform oduus axima Faouzi Aaya Cheikh, Azhar Quddus and oncef Gabbouj Tampere University of Technoogy (TUT), Signa Processing aboratory, P.O. Box 553, FIN-33101

More information

On coding for reliable communication over packet networks

On coding for reliable communication over packet networks Physica Communication 1 (2008) 3 20 Fu ength artice www.esevier.com/ocate/phycom On coding for reiabe communication over packet networks Desmond S. Lun a,1, Murie Médard a,, Raf Koetter b,2, Michee Effros

More information