CERIAS Tech Report Replicated Parallel I/O without Additional Scheduling Costs by Mikhail J. Atallah Center for Education and Research
|
|
- Alaina Lucas
- 5 years ago
- Views:
Transcription
1 CERIAS Tech Report Repicated Parae I/O without Additiona Scheduing Costs by Mikhai J. Ataah Center for Education and Research Information Assurance and Security Purdue University, West Lafayette, IN
2 Repicated Parae I/O without Additiona Scheduing Costs Mikhai Ataah and Keith Frikken Purdue University Abstract. A common technique for improving performance in a database is to decuster the database among mutipe disks so that data retrieva can be paraeized. In this paper we focus on answering range queries in a mutidimensiona database (such as a GIS), where each of its dimensions is divided uniformy to obtain ties which are paced on different disks; there has been a significant amount of research for this probem (a subset of which is [1,2,3,4,5,6,7,8,9,11,12,13,14,15]). A decustering scheme woud be optima if any range query coud be answered by doing no more than # of ties inside the range/# of disks retrievas from any one disk. However, it was shown in [1] that this is not achievabe in many cases even for two dimensions, and therefore much of the research in this area has focused on deveoping schemes that performed cose to optima. Recenty, the idea of using repication (i.e. pacing records on more than one disk) to increase performance has been introduced. [7, 12,13,15]. If repication is used, a retrieva schedue (i.e. which disk to retrieve each tie from) must be computed whenever a query is being processed. In this paper we introduce a cass of repicated schemes where the retrieva schedue can be computed in time O(# of ties inside the query s range), which is asymptoticay equivaent to query retrieva for the non-repicated case. Furthermore, this cass of schemes has a strong performance advantage over non-repicated schemes, and severa schemes are introduced that are either optima or are optima pus a constant additive factor. Aso presented in this paper is a stricty optima scheme for any number of coors that requires the owest known eve of repication of any such scheme. 1 Introduction A typica botteneck in many systems is I/O; to reduce the effect of this botteneck data can be decustered onto mutipe disks to faciitate parae retrieva of the data. In a muti-dimensiona database, such as a GIS or a spatio-tempora database, the dimensions can be tied uniformy to form a grid, and when answering a range query in such a system, ony the ties that contain part of the Portions of this work were supported by Grants EIA and ISS from the Nationa Science Foundation, Contract N from the Office of Nava Research, by sponsors of the Center for Education and Research in Information Assurance and Security, by Purdue Discovery Park s e-enterprise Center, and by the GAANN feowship. V. Mařík et a. (Eds.): DEXA 2003, LNCS 2736, pp , c Springer-Verag Berin Heideberg 2003
3 224 M. Ataah and K. Frikken query need to be retrieved. In such an environment, a decustering scheme attempts to pace the ties on disks in such a way that the average range query is answered as efficienty as possibe. If the database is treated ike a grid and the disks as coors, then this can be stated as a grid cooring probem. For the rest of the paper we use record and tie synonymousy and ikewise use decustering and cooring interchangeaby. Given a database decustered on k disks and a range query Q contained on m ties, Q is answered optimay if no more than m k ties are retrieved from any one disk. A decustering is caed stricty optima if a range queries can be answered optimay, however it was shown in [1] that this is not achievabe except in a few imited circumstances. Thus there has been a significant amount of work to deveop decustering schemes that have cose to optima performance, a samping of which are in [2,3,4,5,6,9,11,14]. To improve performance further the idea of using repication (i.e. pacing each tie on mutipe disks) has been introduced [7,12,13,15]. When repication is used each tie in a query can be retrieved from mutipe paces which aows greater fexibiity when answering the query. In order to use repication an agorithm for computing an optima retrieva schedue is required (i.e. which disk do you retrieve each tie from). Agorithms for computing this schedue are given in [7, 12,13,15]. The most genera of these runs in time O(rm 2 + mk) where r is the most number of disks that a tie is stored on, m is the number of ties to be retrieved, and k is the number of disks. (For more information on work using repication see Section 2). One probem with repication is that it adds a nonnegigibe overhead to query response. In this paper we define a cass of cooring techniques, which we ca the grouping schemes, for which a schedue of retrievas can be computed in time O(# of ties to be retrieved) (from here on we refer to this as O(# of ties)), which is asymptoticay equivaent to the time required to compute a schedue for a non-repicated scheme. This technique essentiay transforms existing cooring schemes into repicated schemes by pacing disks into groups and pacing ties on a disks in a group; when the group size is two this is equivaent to RAID eve 1. Previousy, the ony genera strict optima soution for any number of disks was the Compete Cooring [7,15], which paces each tie on every disk. We introduce severa new schemes that are either have stricty optima performance for a queries or wi answer any query in no more time than a stricty optima scheme pus an additive constant; these new schemes have the owest known eve of repication for such performance bounds. Furthermore, these grouping schemes are shown to have stronger experimenta performance than schemes without repication. The outine of this paper is as foows: Section 2 discusses previous work in this area, in Section 3 the grouping schemes are introduced and schemes that achieve stricty optima performance or are a constant additive factor above an optima soution, Section 4 contains experimenta data showing the performance of the grouping schemes, and Section 5 concudes the paper.
4 2 Reated Work Repicated Parae I/O without Additiona Scheduing Costs 225 Given an n-dimensiona database with each dimension divided uniformy to form ties, if ties are paced on different disks, then the retrieva of records during query processing can be paraeized. The I/O time in such a system is time that it takes to retrieve the maximum number of ties stored on the same disk. The probem of pacing the records so that the response times for range queries is minimized has been we studied; this section presents a survey of this work. Given a database decustered onto k disks and a range query Q contained on m ties, an optima tie decustering woud require no more than m k retrievas from any one disk. It was shown in [1] that this bound is unachievabe for a range queries in a grid except in a few imited circumstances. Since there are many cases where no scheme can achieve this optima bound, severa schemes have been deveoped to achieve performance that is cose to optima. To quantify cose to optima, define the additive error of a decustering scheme to be the maximum over a range queries Q of the vaue (rettime(q) m k ), where rettime(q) is defined as the retrieva time for query Q (i.e. it is the maximum number of ties in Q retrieved from a singe disk). These schemes incude Disk Moduo DM [6], Fiedwise excusive (FX) or [9], the cycic schemes (incuding RPHM, GFIB, and EXH) [11], GRS [4], a technique deveoped by Ataah and Prabhakar [2] which we wi ca RFX, and severa techniques based on discrepancy theory [5,14] (for an introduction to discrepancy theory see [10]). Note that these are just a subset of the decustering techniques that have been deveoped for this probem. Suppose we are given k coors. The DM approach [6] assigns tie (x, y) to (x + y) modk. The FX approach [9] assigns tie (x, y) to(x y) modk. Cycic aocation schemes [11] choose a skip vaue s such that gcd(k, s) = 1 and assigns tie (x, y) to(x + sy) modk. The choice of the skip vaue, s, is what defines the scheme. In RPHM (Reativey Prime Haf Moduo), s is defined to be the integer nearest to k 2 that is reativey prime to k. The GFIB (Generaized FIBonacci) scheme defines s to be an approximate of the previous Fibonacci number (by using the cosed formua) that is reativey prime to k. The EXH (Exhaustive) scheme takes a vaues of s where gcd(s, k) = 1 and finds the one that optimizes a certain criterion, for exampe minimizing the additive error is a possibe criterion. Another cass of schemes are the permutation schemes [4], in these schemes a permutation φ of the numbers in {0,..., k 1} is chosen and then tie (x, y) is assigned coor (x φ 1 ((y) modk)). Exampes of permutation schemes are DM, the cycic schemes, and GRS. In the GRS scheme [4] the permutation is computed 2i as foows: i) i {0,..., k 1} compute the fractiona part of 1+, and ca 5 it k i and then ii) sort the vaues k i and use this to define the permutation. A scheme based on the Corput set is defined in [14] that is simiar to GRS except that the k i vaues are a0 2 + a1 4 + a a k 1 where a 2 k k 1...a 1 a 0 is the binary representation of i. In [2], the RFX scheme was presented that was ater found in [3] to be equivaent to (x y R )modk, where y R is the ( og k )-bit reversa of y. For brevity, the detais of higher dimensiona schemes are not provided.
5 226 M. Ataah and K. Frikken It was shown in [14] that the additive error for k coors in two dimensions is Ω(og k), and that in d( 3) dimensions it is Ω(og d 1 2 k). In two dimensions, schemes have been deveoped (RFX, GRS, and schemes based in discrepancy theory [2,14]) that have a provabe upper bound of O(og k) on additive error. For higher dimensions d( 3), two schemes are given in [5] with additive error O(og (d 1) k), which are the schemes with the owest proven asymptotic bound on additive error. A recent trend has been to use repication [7,12,13,15] to increase performance further. Severa query scheduing agorithms have been given in previous work, but the ony genera agorithm that works for any type of repication is in [7] and runs in time O(rm 2 +mk) where r is the most number of disks that a tie is stored on, m is the number of ties to be retrieved, and k is the number of disks. In [12,13] it was proven that if ties are stored on two random disks then the probabiity of requiring more than ( (# of ties/# of disks) +1) retrievas from a singe disk for a random query approaches 0 as the number of disks gets arge. In [15] repication was used to achieve optima soutions for up to 15 disks. A stricty optima scheme, caed Compete Cooring (CC), for any number of disks by storing a ties on a disks was introduced in [7,15]. The SRCDM scheme was introduced in [7], and has an additive error no arger than 1, but requires the number of disks be a perfect square (n 2 ) and requires that each tie is paced on n disks. 3 Grouping Repication Scheme In this section the grouping schemes are introduced. Section 3.1 defines some notations that wi be needed before defining this cass of schemes. In Section 3.2, the grouping schemes are defined aong with an agorithm that computes the retrieva schedue in time O(#of ties). Section 3.3 contains severa schemes that have an additive error that is 0 or is O(1). Finay, in Section 3.4 we provide a stricty optima cooring scheme that works for any number of coors. 3.1 Notations and Terminoogy Before we can formay define the grouping schemes we need to define some notation and terminoogy. A non-repicated cooring function C for d dimensions and m disks is a function C : ℵ d {0,..., m 1}, essentiay C maps a tie to a disk. A repicated cooring function C with eve of repication r for d dimensions and m disks is a function C : ℵ d r {0,..., m 1} i, essentiay C maps a i=1 tie to the set of disks (with size no more than r) that contain the tie. Since the repicated cooring function is a generaization of the non-repicated cooring function, we assume a cooring functions are repicated for the rest of the paper. A convenient shorthand notation for cooring schemes is (C, m, r, d) which states the cooring function C decusters a d dimensiona grid onto m disks with a eve of repication r. Two cooring schemes (C, m, r, d) and (D, m, r, d) are said to be equivaent if and ony if there is a bijection f : {0,..., m 1} {0,..., m 1} such
6 Repicated Parae I/O without Additiona Scheduing Costs 227 that i C(x 1,..., x d )ifff(i) D(x 1,..., x d ). Essentiay schemes are equivaent if there is a rearrangement of the coors that wi make them identica, and it is obvious that equivaent schemes have identica retrieva time for any query. 3.2 Definition of Grouping Schemes A scheme is considered to be formed with groups if the coors are partitioned into sets and ties are assigned to partitions where assigning a partition to a tie is equivaent to pacing it on a disks in that partition. The motivation for this cass of schemes is to be abe to distribute the additive error of the cooring that assigns ties to partitions among the different members of the partition. Hence, the additive error of any one member of the partition wi be smaer, and thus reducing the additive error of the scheme. Formay, a cooring scheme (C, m, r, d) is considered formed by groups if the coors can be partitioned into sets S 1,S 2,..., S k with at east one set where S i > 1 such that if C(x 1,x 2,..., x d )=S and the foowing hods: if (S i S), then S i S. Such a scheme is caed simpe if the ast constraint is changed to: if (S i S), then S i = S. A scheme formed by groups is said to have equa partitions if each partition S i is identica in size, or equivaenty S i = m k for a i. It is possibe to transform any cooring scheme (C, m, r 1,d) into a scheme formed by groups with equa partitions (of size r 2 )(C,mr 2,r 1 r 2,d), where C is defined as: C (x 1,..., x d )= {im + s 0 i<r 2 }, we denote this s C(x 1,...,x d ) transformation process by GROUP ((C, m, r 1,d),r 2 )((C, m, r 1,d) is referred to as the base scheme in what foows). A scheme defined with GROUP is simpe if r 1 = 1. Now any scheme defined with GROUP is a scheme formed by groups with equa partitions, but any scheme formed by groups with equa partitions is equivaent to a scheme that can be defined with GROUP (proof omitted). We ca the set of schemes defined by GROUP the grouping schemes. There have been scheduing agorithms defined for any repicated agorithm that wi work for any repicated scheme, but for simpe grouping schemes (represented by GROUP ((C, m, 1,d),r)) there is a scheduing agorithm that runs in time O(m) and executes with one pass over the ties (see RetrieveTies beow). The agorithm uses a function SetSchedue(tie,disk) which sets the schedue to retrieve tie from disk. begin RetrieveTies(Query, (C,mr,r,d) =GROU P ((D, m, 1,d),r)) A[] := array initiaized to 0 of size m. fora t =(t 1,..., t d ) in Query do c := C(t) SetSchedue(t,c + A[c]) A[c] :=((A[c]+m) mod(mr)) endfor end RetrieveTies
7 228 M. Ataah and K. Frikken Thus simpe grouping schemes can be used without having to incur the additiona scheduing costs of other repicated schemes. In addition to this, the additive error of a grouping scheme with eve of repication is bounded by the o where o is the additive error of the base scheme (see Theorem 3-3). Before this can be proven we need Lemmas 3-1 and 3-2. Lemma 3-1: If the cooring scheme (C, m, r, d) has an additive error of o, then GROUP ((C, m, r, d),) wi have a response time no arger than x k +o for x records. Proof: For the x records the origina cooring scheme wi have at most ( x k + o) instances of any one coor which means there wi be at most ( x k + o) instances of any group. These vaues can be distributed equay among the coors in that group to obtain a maximum response time of x k +o. QED Lemma 3-2: x k +o x k + o Proof: Let x = a(k)+bk + c, where 0 b<and 0 c<k. There are two cases to consider: (b = 0 and c =0)or(b 0orc 0). Case 1: (b = 0 and c = 0): x k +o = a(k) k +o = a+o = a + o = a(k) k + o = x k + o Case 2: (b 0orc 0): x k +o = ak+bk+c k +o = a+b+ c k +o a + b+1+o a + +o = a +1+ o = a(k)+bk+c k + o = x k + o. In either case x k +o x k + o. QED Theorem 3-3: If the cooring scheme (C, m, r,d) has an additive error of o, then GROUP ((C, m, r,d),r) wi have an additive error no arger than o r. Proof: Foows directy from Lemma 3-1 and Lemma 3-2. QED This ast theorem impies that the additive error for a cooring scheme can be reduced by using this grouping method. Since the additive error can be reduced the expected vaue above optima wi aso be reduced. To summarize this section, a cass of repicated schemes can be defined with the GROU P transformation, which we ca the grouping schemes. A subset of these schemes are simpe and for this subset there are two significant benefits compared to non-repicated schemes incuding: i) queries can be processed in time proportiona to the number of records which is asymptoticay optima, and ii) there is a performance increase. 3.3 Achieving Optima and Constant Additive Error In this section schemes with 0 and O(1) additive error are introduced. Coroary 3-4: If a scheme (C, m, r 1,d) is stricty optima so is GROUP ((C, m, r 1,d),r 2 ). Proof: Since (C, m, r 1,d) is stricty optima the additive error wi be 0, and thus by Theorem 3-3, the additive error of GROUP ((C, m, r 1,d),r 2 ) wi aso be 0, and thus is stricty optima. QED The previous coroary impies that any scheme with eve of repication r that is optima for c disks can be transformed using GROUP into a scheme that is optima for ck disks with eve of repication kr. It is possibe to coor a
8 Repicated Parae I/O without Additiona Scheduing Costs 229 two dimensiona grid optimay with 1, 2, or 3 (or 5 in 2-D) coors using RPHM in two dimensions and DM in higher dimensions. Hence, it is possibe to coor a grid with r, 2r, or3r, (or 5r in 2-D) with eve of repication r in a stricty optima fashion (by Coroary 3-4). Furthermore, these schemes are simpe and so RetrieveTies can be used to retrieve the ties in time proportiona to the number of records. The CC scheme described in [7,15] is the scheme defined above that uses a base scheme with ony 1 coor. In addition to these optima schemes there are grouping schemes that achieve an additive error that is O(1). Coroary 3-5: If a scheme (C, m, r 1,d) has an additive error of O(f(m)) for some function f then is GROUP ((C, m, r 1,d),x), where x>f(m) has an additive error that is O(1). Proof: Since the scheme (C, m, r 1,d) has an additive error of O(f(m)), then the additive error is bounded by af(m) for some constant a. Now by theorem 3-3, GROUP ((C, m, r 1,d),x) wi have an additive error no arger than af(m) x a and thus is O(1). QED The foowing is a tabe of grouping schemes with base schemes with m coors that have an additive error which is O(1) but can be schedued with RetrieveTies (it is assumed m is a power of 2 for the RFX scheme): Leve of Additive Base Scheme Dimensions Repication Error LHDM [8] d (m 1) d RFX, GRS, and other schemes [2,3,14] 2 og m O(1) RFX [2,3] 2 2 og m 3 1 Schemes in [5] d og d 1 (m) O(1) 3.4 Generaizing Optima Additive Error In the previous section schemes were introduced that were stricty optima, but these schemes are appied in the situation where the number of coors was a mutipe of the number of coors in a base scheme that is optima (i.e. 1, 2, or 3 (or 5 in 2-D)). The CC cooring is an instance of the previous scheme and is stricty optima for any number of coors, but it requires that the eve of repication be the number of coors, which may be unreasonabe for many appications. In this section a stricty optima scheme for any number of coors is given with a eve of repication cose to haf the number of coors. The scheme presented here is a generaization of GROU P ((C,2, 1, d), k) where C is the DM cooring scheme that is stricty optima for any number of coors. In the case, where the number of coors is even, we are triviay done using schemes discussed in the previous section. Suppose the number of coors is odd (i.e. m =2k + 1), to create a scheme for m coors pace 2k of the coors using the grouped DM scheme with eve of repication k and then pace the entire database on the ast disk. Note that the eve of repication for such a scheme for m disks is m 2 +(m mod 2) which is about m 2. It can be proven that this scheme is stricty optima, but we omit this proof due to space constraints.
9 230 M. Ataah and K. Frikken A possibe criticism of this scheme is that if you can pace the entire database on a singe disk, then why not use the CC mechanism for simpicity. However, in this case it is ony required that a singe disk be arge enough to hod the entire database. This may not be reasonabe for arge databases, but is reasonabe in some situations. This generaized approach can be extended to grouping schemes with base schemes with 3 (and 5 in 2-D) disks in a simiar fashion (we omit the detais due to space constraints). It is not true however that if you have an optima scheme for k coors that if you put a ties on another disk that the soution wi be optima for k + 1 disks. The scheme defined in this section constitutes a genera stricty optima schemes with the owest known eve of repication. With some modification to our scheduing agorithm the schedue can be computed in time O(# of records). We give a verba description of the agorithm here for when there are 2k + 1 coors and the scheme described above is used. Essentiay there are two groups of k coors and 1 extra coor. We know that an optima schedue is achievabe so we determine what optima is, and ca it o. Assign up to the first ko ties of each group to disks in that group, such that no more than o ties are assigned to any one disk, and if there are any ties remaining after this has been done to both groups assign these eftovers to the ast disk which is not in either group. 4 Experiments For this section, experiments were performed to compare the performance between grouped schemes with eve of repication as 2 and non-grouped schemes. The comparison criterion that is used is the expected deviation from optima for a queries. To compute the expected deviation from optima for a cooring scheme (C, m, r, d) we compute the expected vaue from optima of a wraparound queries in an d dimensiona grid with side engths equa to m. There is a finite number of queries in such a grid so this vaue can be computed exacty for smaer m vaues, but is estimated for arger vaues. This estimation is done by taking a random samping of queries and computing the expected deviation from optima of these queries. It is worth noting that when an exact vaue is computed that the maximum additive error found wi be the maximum additive error in any grid (see [8], which can be generaized to grouping schemes, but this generaization is omitted). To perform the comparison between the repicated and non-repicated schemes we use a hybrid cooring. Given a set of coorings this hybrid cooring uses the cooring that minimizes the expected deviation from optima for a specific number of disks, i.e. the hybrid cooring uses the best cooring in the set for a specific situation. The comparison is figure 1 is between the hybrid cooring of a set of non-repicated schemes and the hybrid cooring for these schemes transformed with GROU P using eve of repication of 2. The set of non-repicated cooring schemes used are DM [6], FX (for powers of 2) [9], RFX (for powers of 2) [2], RPHM [11], GFIB [11], GRS [4], and a scheme
10 Repicated Parae I/O without Additiona Scheduing Costs 231 Fig. 1. Expected Deviation from Optima for 2-D Schemes based on the Corput set [14]. For the grouping schemes we use the grouped version of these schemes with eve of repication 2. When the number of disks is no more than 40, exact vaues were computed, but estimates were used for up to 140 disks. These estimates were made by ooking at 5000 queries (chosen randomy with uniform distribution) in the grid using the mean deviation as the estimate. The resuts are dispayed in Figure 1. Figure 1 is interesting for severa reasons. First, it shows that the estimate is accurate for predicting the expected deviation for vaues up to 40. Aso, it shows that the grouping schemes perform far better than the non-repicated schemes, since the expected deviation from optima is 2-3 times arger for non-repicated coorings than for grouping schemes. Thus if a repication eve of 2 is used, then range query performance wi be improved substantiay. 5 Concusions When decustering data, there are three inhibiting factors that may prevent the usage of repication: i) there is not enough disk space on each disk to contain enough information, ii) the sow down that occurs with query scheduing for repication is too overwheming, and iii) the benefit from repication is not significant. We have introduced a cass of schemes, caed the grouping schemes, which eiminate conditions (ii) and (iii). Condition (ii) is eiminated because the grouping schemes can be schedued in time O(number of ties), and it was shown
11 232 M. Ataah and K. Frikken in Section 4, that these techniques perform extremey we even if the eve of repication is 2 which eiminates condition (iii). Thus an important concusion about the usage of repication can be stated: If there is enough room on the disks to faciitate repication, then repication shoud be used. Furthermore, a stricty optima scheme for any number of coors with the owest known eve of repication for such a soution was presented aong with severa schemes with additive error that is O(1) were given that have fewer restrictions on the number of disks and have a ower eve of repication than previous schemes that achieve an O(1) bound on additive error (the authors know of ony one such previous scheme, which is SRCDM). References 1. K. Abde-Ghaffar and A. E. Abbadi. Optima aocation of two-dimensiona data. In Internationa Conference on Database Theory, pages , M. J. Ataah and S. Prabhakar. (amost) optima parae bock access to range queries. In Proceedings of the nineteenth ACM SIGMOD-SIGACT-SIGART symposium on Principes of database systems, pages ACM Press, R. Bhatia, R. Sinha, and C.-M. Chen. Hierarchica decustering schemes for range queries. In In 7th Int Conf. on Extending Database Technoogy, R. Bhatia, R. K. Sinha, and C.-M. Chen. Decustering using goden ratio sequences. In ICDE, pages , C.-M. Chen and C. T. Cheng. From discrepancy to decustering: near-optima mutidimensiona decustering strategies for range queries. In Proceedings of the twentyfirst ACM SIGMOD-SIGACT-SIGART symposium on Principes of database systems, pages ACM Press, H. Du and J. Soboewski. Disk aocation for cartesian product fies on mutipe disk systems. ACM Transactions on Database System, pages , K. Frikken, M. Ataah, S. Prabhakar, and R. Safavi-Naini. Optima parae i/o for range queries through repication. In Proceedings of 13th Int. Conf. on Database and Expert Systems Appication (LNCS 2453), pages B. Himatsingka, J. Srivastava, J.-Z. Li, and D. Rotem. Latin hypercubes: A cass of mutidimensiona decustering techniques, M. H. Kim and S. Pramanik. Optima fie distribution for partia match retrieva. In Proceedings of the 1988 ACM SIGMOD internationa conference on Management of data, pages ACM Press, J. Matousek. Geometric discrepancy, an iustrated guide. Springer-Verag, S. Prabhakar, K. Abde-Ghaffar, D. Agrawa, and A. E. Abbadi. Cycic aocation of two-dimensiona data. Technica Report TRCS97-08, 1, P. Sanders. Reconciing simpicity and reaism in parae disk modes. In Proceedings of the twefth annua ACM-SIAM symposium on Discrete agorithms, pages ACM Press, P. Sanders, S. Egner, and J. Korst. Fast concurrent access to parae disks. In Proceedings of the eeventh annua ACM-SIAM symposium on Discrete agorithms, pages ACM Press, R. K. Sinha, R. Bhatia, and C.-M. Chen. Asymptoticay optima decustering schemes for range queries. In Internationa Conference on Database Theory, A. Tosun and H. Ferhatosmanogu. Optima parae i/o using repication. Technica Report OSU-CISRC-11/01-TR26, 2001.
Language Identification for Texts Written in Transliteration
Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy
More informationAlpha labelings of straight simple polyominal caterpillars
Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.
More informationCERIAS Tech Report Cropping-Resilient Segmented Multiple Watermarking by Mikhail J. Atallah Center for Education and Research Information
CERIAS Tech Report 2003-49 Cropping-Resilient Segmented Multiple Watermarking by Mikhail J. Atallah Center for Education and Research Information Assurance and Security Purdue University, West Lafayette,
More informationSolutions to the Final Exam
CS/Math 24: Intro to Discrete Math 5//2 Instructor: Dieter van Mekebeek Soutions to the Fina Exam Probem Let D be the set of a peope. From the definition of R we see that (x, y) R if and ony if x is a
More informationA Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm
A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm
More informationAN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART
13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of
More informationA Petrel Plugin for Surface Modeling
A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica
More informationArithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University
Arithmetic Coding Prof. Ja-Ling Wu Department of Computer Science and Information Engineering Nationa Taiwan University F(X) Shannon-Fano-Eias Coding W..o.g. we can take X={,,,m}. Assume p()>0 for a. The
More informationA Memory Grouping Method for Sharing Memory BIST Logic
A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5
More informationLoad Balancing by MPLS in Differentiated Services Networks
Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,
More informationChapter Multidimensional Direct Search Method
Chapter 09.03 Mutidimensiona Direct Search Method After reading this chapter, you shoud be abe to:. Understand the fundamentas of the mutidimensiona direct search methods. Understand how the coordinate
More informationAn Exponential Time 2-Approximation Algorithm for Bandwidth
An Exponentia Time 2-Approximation Agorithm for Bandwidth Martin Fürer 1, Serge Gaspers 2, Shiva Prasad Kasiviswanathan 3 1 Computer Science and Engineering, Pennsyvania State University, furer@cse.psu.edu
More informationNeural Network Enhancement of the Los Alamos Force Deployment Estimator
Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the
More informationFurther Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code
Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222
More informationarxiv: v1 [cs.cg] 3 Dec 2013
Linear transformation distance for bichromatic matchings Oswin Aichhozer Luis Barba Thomas Hack Aexander Piz Birgit Vogtenhuber arxiv:1312.0884v1 [cs.cg] 3 Dec 2013 Abstract Let P = B R be a set of 2n
More informationOutline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm
Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae
More informationSpecial Edition Using Microsoft Excel Selecting and Naming Cells and Ranges
Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and
More informationCrossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters
Crossing Minimiation Probems o Drawing Bipartite Graphs in Two Custers Lanbo Zheng, Le Song, and Peter Eades Nationa ICT Austraia, and Schoo o Inormation Technoogies, University o Sydney,Austraia Emai:
More informationProceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER!
[1,2] have, in theory, revoutionized cryptography. Unfortunatey, athough offer many advantages over conventiona and authentication), such cock synchronization in this appication due to the arge operand
More informationResource Optimization to Provision a Virtual Private Network Using the Hose Model
Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,
More informationA Fast Block Matching Algorithm Based on the Winner-Update Strategy
In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping
More informationMobile App Recommendation: Maximize the Total App Downloads
Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management
More informationIntro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?
Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of
More informationAs Michi Henning and Steve Vinoski showed 1, calling a remote
Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware
More informationLecture Notes for Chapter 4 Part III. Introduction to Data Mining
Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,
More informationSolving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming
The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction
More informationOn Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models
On Upper Bounds for Assortment Optimization under the Mixture of Mutinomia Logit Modes Sumit Kunnumka September 30, 2014 Abstract The assortment optimization probem under the mixture of mutinomia ogit
More informationDistance Weighted Discrimination and Second Order Cone Programming
Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and
More informationA Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory
0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory
More informationA Local Optimal Method on DSA Guiding Template Assignment with Redundant/Dummy Via Insertion
A Loca Optima Method on DSA Guiding Tempate Assignment with Redundant/Dummy Via Insertion Xingquan Li 1, Bei Yu 2, Jiani Chen 1, Wenxing Zhu 1, 24th Asia and South Pacific Design T h e p i c Automation
More informationfile://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01
Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.
More informationTesting Whether a Set of Code Words Satisfies a Given Set of Constraints *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG
More informationSpace-Time Trade-offs.
Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe
More informationMCSE Training Guide: Windows Architecture and Memory
MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the
More informationCLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING
CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:
More informationFastest-Path Computation
Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods
More informationRegister Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x
Register Aocation Consider the foowing assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Assume that two registers are avaiabe. Starting from the eft a compier woud generate
More informationA METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds
A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed
More informationACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega
ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES Eya En Gad, Akshay Gadde, A. Saman Avestimehr and Antonio Ortega Department of Eectrica Engineering University of Southern
More informationA NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER
Internationa Journa on Technica and Physica Probems of Engineering (IJTPE) Pubished by Internationa Organization of IOTPE ISSN 077-358 IJTPE Journa www.iotpe.com ijtpe@iotpe.com September 014 Issue 0 Voume
More information17.3 Surface Area of Pyramids and Cones
Name Cass Date 17.3 Surface Area of Pyramids and Cones Essentia Question: How is the formua for the atera area of a reguar pyramid simiar to the formua for the atera area of a right cone? Expore G.11.C
More informationLecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.
Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence
More informationNearest Neighbor Learning
Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification
More informationImage Segmentation Using Semi-Supervised k-means
I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging
More informationFurther Concepts in Geometry
ppendix F Further oncepts in Geometry F. Exporing ongruence and Simiarity Identifying ongruent Figures Identifying Simiar Figures Reading and Using Definitions ongruent Trianges assifying Trianges Identifying
More informationDETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS
DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,
More informationCraig A. Knoblock. Carnegie Mellon University. Pittsburgh, PA empirical demonstration to date, but these results are
Proceedings of the Ninth Nationa Conference on Arti- cia Inteigence, AAAI Press, Meno Par, CA, 1991 Search Reduction in Hierarchica Probem Soving Craig A. Knoboc Schoo of Computer Science Carnegie Meon
More informationReal-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing
Rea-Time Image Generation with Simutaneous Video Memory Read/rite Access and Fast Physica Addressing Mountassar Maamoun 1, Bouaem Laichi 2, Abdehaim Benbekacem 3, Daoud Berkani 4 1 Department of Eectronic,
More informationM. Badent 1, E. Di Giacomo 2, G. Liotta 2
DIEI Dipartimento di Ingegneria Eettronica e de informazione RT 005-06 Drawing Coored Graphs on Coored Points M. Badent 1, E. Di Giacomo 2, G. Liotta 2 1 University of Konstanz 2 Università di Perugia
More informationAnalysis of Random. Processes via And-Or Tree Evaluation. Michael Mitzenmachert M. Amin Shokrollahiz
Anaysis of Random Processes via And-Or Tree Evauation Michae G. Luby* Michae Mitzenmachert M. Amin Shokroahiz Abstract distributions not considered by previous anayses. We introduce a new set of probabiistic
More informationHiding secrete data in compressed images using histogram analysis
University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University
More informationOn-Chip CNN Accelerator for Image Super-Resolution
On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement
More informationMULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY
MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY R.D. FALGOUT, T.A. MANTEUFFEL, B. O NEILL, AND J.B. SCHRODER Abstract. The need for paraeism in the time dimension is being driven
More informationMore Relation Model: Functional Dependencies
More Reation Mode: Functiona Dependencies Lecture #7 Autumn, 2001 Fa, 2001, LRX #07 More Reation Mode: Functiona Dependencies HUST,Wuhan,China 152 Functiona Dependencies X -> A = assertion about a reation
More informationUniversity of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162
oward Efficient Spatia Variation Decomposition via Sparse Regression Wangyang Zhang, Karthik Baakrishnan, Xin Li, Duane Boning and Rob Rutenbar 3 Carnegie Meon University, Pittsburgh, PA 53, wangyan@ece.cmu.edu,
More informationApplication of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line
American J. of Engineering and Appied Sciences 3 (): 5-24, 200 ISSN 94-7020 200 Science Pubications Appication of Inteigence Based Genetic Agorithm for Job Sequencing Probem on Parae Mixed-Mode Assemby
More informationSample of a training manual for a software tool
Sampe of a training manua for a software too We use FogBugz for tracking bugs discovered in RAPPID. I wrote this manua as a training too for instructing the programmers and engineers in the use of FogBugz.
More informationCSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling
CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Scheduing Announcement Homework 2 due on October 25th Project 1 due on October 26th 2 CSE 120 Scheduing and Deadock Scheduing Overview In discussing
More informationReal-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method
297 Rea-Time Feature escriptor Matching via a Muti-Resoution Ehaustive Search Method Chi-Yi Tsai, An-Hung Tsao, and Chuan-Wei Wang epartment of Eectrica Engineering, Tamang University, New Taipei City,
More informationIntro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components Illustrated
Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Fa 2017 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program instructions
More informationPriority Queueing for Packets with Two Characteristics
1 Priority Queueing for Packets with Two Characteristics Pave Chuprikov, Sergey I. Nikoenko, Aex Davydow, Kiri Kogan Abstract Modern network eements are increasingy required to dea with heterogeneous traffic.
More informationOptimization and Application of Support Vector Machine Based on SVM Algorithm Parameters
Optimization and Appication of Support Vector Machine Based on SVM Agorithm Parameters YAN Hui-feng 1, WANG Wei-feng 1, LIU Jie 2 1 ChongQing University of Posts and Teecom 400065, China 2 Schoo Of Civi
More informationTSR: Topology Reduction from Tree to Star Data Grids
03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen
More informationBacking-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism
Backing-up Fuzzy Contro of a Truck-traier Equipped with a Kingpin Siding Mechanism G. Siamantas and S. Manesis Eectrica & Computer Engineering Dept., University of Patras, Patras, Greece gsiama@upatras.gr;stam.manesis@ece.upatras.gr
More information5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014
5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 014 Topoogy-Transparent Scheduing in Mobie Ad Hoc Networks With Mutipe Packet Reception Capabiity Yiming Liu, Member, IEEE,
More informationCSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Lecture 4: Threads
CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Lecture 4: Threads Announcement Project 0 Due Project 1 out Homework 1 due on Thursday Submit it to Gradescope onine 2 Processes Reca that
More informationQuality of Service Evaluations of Multicast Streaming Protocols *
Quaity of Service Evauations of Muticast Streaming Protocos Haonan Tan Derek L. Eager Mary. Vernon Hongfei Guo omputer Sciences Department University of Wisconsin-Madison, USA {haonan, vernon, guo}@cs.wisc.edu
More informationOn Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture
On inding the est Partia Muticast Protection Tree under ua-homing rchitecture Mei Yang, Jianping Wang, Xiangtong Qi, Yingtao Jiang epartment of ectrica and omputer ngineering, University of Nevada Las
More informationWATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION
WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing 100039, China shentao@casm.ac.cn Xu Dehe Institute of resources and environment, North
More informationRDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002*
RDF Objects 1 Aex Barne Information Infrastructure Laboratory HP Laboratories Bristo HPL-2002-315 November 27 th, 2002* E-mai: Andy_Seaborne@hp.hp.com RDF, semantic web, ontoogy, object-oriented datastructures
More informationThe Big Picture WELCOME TO ESIGNAL
2 The Big Picture HERE S SOME GOOD NEWS. You don t have to be a rocket scientist to harness the power of esigna. That s exciting because we re certain that most of you view your PC and esigna as toos for
More informationl Tree: set of nodes and directed edges l Parent: source node of directed edge l Child: terminal node of directed edge
Trees & Heaps Week 12 Gaddis: 20 Weiss: 21.1-3 CS 5301 Fa 2016 Ji Seaman 1 Tree: non-recursive definition Tree: set of nodes and directed edges - root: one node is distinguished as the root - Every node
More informationA Method for Calculating Term Similarity on Large Document Collections
$ A Method for Cacuating Term Simiarity on Large Document Coections Wofgang W Bein Schoo of Computer Science University of Nevada Las Vegas, NV 915-019 bein@csunvedu Jeffrey S Coombs and Kazem Taghva Information
More informationPlanar Graphs of Bounded Degree have Constant Queue Number
Panar Graphs of Bounded Degree have Constant Queue Number Michae A. Bekos, Henry Förster, Martin Gronemann, Tamara Mchedidze 3 Fabrizio Montecchiani 4, Chrysanthi Raftopouou 5, Torsten Ueckerdt 3 Institute
More informationDistinct Sampling on Streaming Data with Near-Duplicates*
Distinct Samping on Streaming Data with Near-Dupicates* ABSTRACT Jiecao Chen Indiana University Boomington Boomington, IN, USA jiecchen@umai.iu.edu In this paper we study how to perform distinct samping
More informationProviding Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks
The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department
More informationSensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space
Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study
More informationApproximate Closest Community Search in Networks
Approximate Cosest Community Search in Networks Xin Huang, Laks V.S. Lakshmanan, Jeffrey Xu Yu, Hong Cheng University of British Coumbia, The Chinese University of Hong Kong {xin,aks}@cs.ubc.ca, {yu, hcheng}@se.cuhk.edu.hk
More informationLayout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed
Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Nattawut Thepayasuwan, Member, IEEE and Aex Doboi, Member, IEEE Abstract
More informationSearching, Sorting & Analysis
Searching, Sorting & Anaysis Unit 2 Chapter 8 CS 2308 Fa 2018 Ji Seaman 1 Definitions of Search and Sort Search: find a given item in an array, return the index of the item, or -1 if not found. Sort: rearrange
More informationBridge Talk Release Notes for Meeting Exchange 5.0
Bridge Tak Reease Notes for Meeting Exchange 5.0 This document ists new product features, issues resoved since the previous reease, and current operationa issues. New Features This section provides a brief
More informationTechTest2017. Solutions Key. Final Edit Copy. Merit Scholarship Examination in the Sciences and Mathematics given on 1 April 2017, and.
TechTest07 Merit Schoarship Examination in the Sciences and Mathematics given on Apri 07, and sponsored by The Sierra Economics and Science Foundation Soutions Key V9feb7 TechTest07 Soutions Key / 9 07
More informationJoint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.
FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four
More informationUnderstanding the Mixing Patterns of Social Networks: The Impact of Cores, Link Directions, and Dynamics
Understanding the Mixing Patterns of Socia Networks: The Impact of Cores, Link Directions, and Dynamics [Last revised on May 22, 2011] Abedeaziz Mohaisen Huy Tran Nichoas Hopper Yongdae Kim University
More informationPerformance of data networks with random links
Performance of data networks with random inks arxiv:adap-org/9909006 v2 4 Jan 2001 Henryk Fukś and Anna T. Lawniczak Department of Mathematics and Statistics, University of Gueph, Gueph, Ontario N1G 2W1,
More informationSuccinct Indices for Path Minimum, with Applications to Path Reporting
Succinct Indices for Path Minimum, with Appications to Path Reporting Timothy M. Chan 1, Meng He 2, J. Ian Munro 1, and Gein Zhou 1 1 David R. Cheriton Schoo of Computer Science, University of Wateroo,
More informationSelf-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System
Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong
More informationTopology-aware Key Management Schemes for Wireless Multicast
Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu
More informationDistributed Approximation of k-service Assignment
Distributed Approximation of k-service Assignment Magnús M. Hadórsson, Sven Köher 2, and Dror Rawitz 3 Reykjavik University, Iceand, mmh@ru.is 2 University of Freiburg, koehers@informatik.uni-freiburg.de
More informationOptimized Base-Station Cache Allocation for Cloud Radio Access Network with Multicast Backhaul
Optimized Base-Station Cache Aocation for Coud Radio Access Network with Muticast Backhau Binbin Dai, Student Member, IEEE, Ya-Feng Liu, Member, IEEE, and Wei Yu, Feow, IEEE arxiv:804.0730v [cs.it] 28
More informationand its spectrum 1. Notation and preliminaries ~~~(AI-A(G)) of A(G) by G{\), and refer to
BULL. AUSTRAL. MATH. SOC. VOL. 18 (1978), 21-28. A new graph product and its spectrum C.D. Godsi and B.D. McKay A new graph product is introduced, and the characteristic poynomia of a graph so-formed is
More informationChapter 5: Transactions in Federated Databases
Federated Databases Chapter 5: in Federated Databases Saes R&D Human Resources Kemens Böhm Distributed Data Management: in Federated Databases 1 Kemens Böhm Distributed Data Management: in Federated Databases
More informationEndoscopic Motion Compensation of High Speed Videoendoscopy
Endoscopic Motion Compensation of High Speed Videoendoscopy Bharath avuri Department of Computer Science and Engineering, University of South Caroina, Coumbia, SC - 901. ravuri@cse.sc.edu Abstract. High
More informationAutomatic Hidden Web Database Classification
Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,
More informationAuthorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal
Abstract Authorization of a QoS Path based on Generic Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taa Advanced Internet Research Group, Department of Computer Science, University of Amsterdam.
More informationService Scheduling for General Packet Radio Service Classes
Service Scheduing for Genera Packet Radio Service Casses Qixiang Pang, Amir Bigoo, Victor C. M. Leung, Chris Schoefied Department of Eectrica and Computer Engineering, University of British Coumbia, Vancouver,
More informationFormulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations
Formuation of Loss minimization Probem Using Genetic Agorithm and Line-Fow-based Equations Sharanya Jaganathan, Student Member, IEEE, Arun Sekar, Senior Member, IEEE, and Wenzhong Gao, Senior member, IEEE
More informationReplication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs
Repication of Virtua Network Functions: Optimizing Link Utiization and Resource Costs Francisco Carpio, Wogang Bziuk and Admea Jukan Technische Universität Braunschweig, Germany Emai:{f.carpio, w.bziuk,
More informationMulti-level Shape Recognition based on Wavelet-Transform. Modulus Maxima
uti-eve Shape Recognition based on Waveet-Transform oduus axima Faouzi Aaya Cheikh, Azhar Quddus and oncef Gabbouj Tampere University of Technoogy (TUT), Signa Processing aboratory, P.O. Box 553, FIN-33101
More informationOn coding for reliable communication over packet networks
Physica Communication 1 (2008) 3 20 Fu ength artice www.esevier.com/ocate/phycom On coding for reiabe communication over packet networks Desmond S. Lun a,1, Murie Médard a,, Raf Koetter b,2, Michee Effros
More information