CASCH - a Scheduling Algorithm for "High Level"-Synthesis

Size: px
Start display at page:

Download "CASCH - a Scheduling Algorithm for "High Level"-Synthesis"

Transcription

1 CASCH a Scheduling Algorithm for "High Level"Synthesis P. Gutberlet H. Krämer W. Rosenstiel Comuter Science Research Center at the University of Karlsruhe (FZI) HaidundNeuStr. 1014, 7500 Karlsruhe, F.R.G. Phone no.: ++49/71/ , Fax no.: ++49/71/ Abstract It is the goal of the recently develoed and herewith resented scheduling algorithm to otimize the timing behaviour within automated circuit synthesis. The algorithm is a art of the CADDYSynthesisSystem (CAddy SCHeduling). Basis is a list scheduling algorithm which is controlled by a heuristic rating function. The allocated resources can be modelled in a flexible and detailed manner in order to secify comonent tyes for several different oerations as well as different comonent tyes for the same oeration. It is a secial feature of this scheduling algorithm that the assignment of oerations to comonent tyes is decided during the scheduling. Keywords: High level synthesis, Automatic scheduling, Allocation, Tye selection 1. Introduction To reduce the develoment costs of integrated circuits it is necessary to use owerful CADtools. With "High Level" synthesis the circuits behaviour can be secified at an abstract level by imerative or functional rogramming language like descritions. The data ath as well as the control are synthesized from this behavioural secification. Essential for the generation of the control is esecially the detailed time lanning for the single oerations. This lanning is a scheduling roblem. The result of the scheduling determines the timing behaviour of the circuit which is essential for the erformance.. The CADDY synthesis system An overview of the CADDY synthesis system is given in [CaKR84], [RoCa85], [CaRo89], [KrRo89], [DKNP89], [KoGD90]. The integration of scheduling into the design rocess is shown in figure 1. In the first ste the behavioural secification is translated into the intermediate format (flow grah, FG). Such an intermediate format allows different languages as inut interfaces to the synthesis system CADDY. The next ste generates the dataflow and the control flow grahs from this intermediate format. During this ste behavioural transformations like loo exansion or elimination of common subexressions are erformed. The control and the dataflow grahs are the basis for the data ath synthesis. The scheduling algorithm has to otimize the number of cycles on the basis of reviously selected resources. Based on the results of the scheduling the detailed comonent assignment together with register and bus assignment takes lace [KNRW88]. In this hase also the number of registers and busses is otimized. Finally the control can be generated. data flow grah secification language intermediate format data flow / control flow extraction data ath synthesis resource allocation scheduling comonent assignment control synthesis control flow grah to logic synthesis and layout tools Figure 1 The CADDY synthesis system. The allocation task Figure shows a dataflow grah consisting of additions and subtractions and the corresonding data deendencies. The labels to indicate mutual exclusive oerations and are extracted from the ifthenelse structure of the high level secification. erations with label are always executed and oerations with label and are mutual exclusive.

2 The oerations have to be maed onto comonents in the final circuit. Comonents are adders or ALUs etc. During the allocation task the number and the tyes of comonents are selected which determines the maximum degree of arallelism. Because scheduling otimizes the execution time on the basis of given resources, the allocation controls the area/time tradeoff between sequential or arallel designs. Figure Dataflow grah examle.1. Comonent library A comonent library has been imlemented to handle the necessary resource allocation. This library allows a detailed modelling of the roerties which are essential for the scheduling. This is on one hand the secification of comonent tyes with different seed for the same oeration and on the other hand the secification of universal comonents like ALUs which can be used for different oeration tyes. The scheduling algorithm is also able to deal with chaining, multi cycle comonents and comonents with an internal ieline. Some examles from the library are given on the following: * An examle library Comonent ultl Bit * cycles, no ieline eration UL 1 latency ut 1 Comonent ultlp Bit * cycles, ielined eration UL 1 latency 1 ut 1 Comonent adder 4 Bit * 150 ns eration ADD 14 ut Comonent ALU +/ Bit * 00/0 ns eration ADD 1 ut 1 00 eration SUB 1 ut 1 0 This flexible comonent secification allows different comonent tyes for the same kind of oeration. Since different comonent tyes can have different execution times the assignment to comonent tyes highly influences the scheduling. n the other hand an otimized tye selection deends on the number and the tye of the oerations lanned in each clock cycle and this is a result of the scheduling. It is one of the most imortant features of the here resented scheduling algorithm to resolve these mutual deendencies during the scheduling. It also should be stressed that only the assignment to comonent tyes has to be done during the scheduling. The detailed assignment of oerations to single comonents is otimized in a later hase of the CADDY synthesis system. 4. The scheduling algorithm The basic algorithm is a list scheduling algorithm. An outline is given below: PRC CASCH(V) V: erations in the data flow grah BEGIN act_cycle := 1 WHILE V Ø D V r := oerations which can be started in the actual clock cycle (ready oerations) generate_and_evaluate_all_assignments(v r ) V d := the assignment with the best rating Schedule[act_cycle] := V d V := V \ V d act_cycle := act_cycle + 1 ENDWHILE END The roblem of the basic list scheduling algorithm is that not all ready oerations V r can be executed in arallel due to limited resources. In this case a subset V d of V r has to be selected. Also a comonent tye has to be assigned to every selected oeration. The following recursive algorithm generates all subsets and all ossible assignments to comonent tyes. PRC generate_and_evaluate_all_assignments(b) B: ready oerations in the actual clock cycle BEGIN WHILE B Ø D b := elem (B) B := B \ {b} K := set of all comonent tyes where 1. the tye can execute oeration b and. one comonent of the tye is free FR ALL k K D reserve one comonent of tye k lan oeration b into actual clock cycle on tye k call ratingfunction for the actual assignment generate_and_evaluate_all_assignments(b) take oeration b from actual clock cycle release one comonent of tye k ENDFR ENDWHILE END

3 The otimal scheduling roblem can be reduced to the roblem of the otimal selection of one generated subset and assignment. This selection is controlled by the here called ratingfunction. Since the rating function determines the result of the scheduling the rest of this aer concentrates on it. The scheduling algorithm is also able to deal with loos and ielining including latency otimization. These additional features are described in more detail in [Gutb89]. 5. Rating function 5.1. verview The rating function determines during the scheduling how the total delay will "robably" be influenced by a secific assignment. This forecast includes otential latency in case of ieline rocessing which is not exlained here. To determine these delays exactly would of course allow otimal scheduling. But since the roblem of otimal scheduling under given comonent constraints is NPcomlete [GaJo79] no efficient rating algorithm roviding exact results (yet) exists. In the following an efficient and accurate heuristic rating function for estimating the total delay is resented. The estimation is done for the oerations, which are not yet scheduled. The result of the rating function is the minimal delay of the otimal schedule without resource constraints lus the delay caused by resource constraints. Resource constraints are not only a limited number of comonents but also a limited number of internal and external connections. To clarify how this estimation function works, in the following the dataflow grah from figure is treated as an examle for estimating the total delay. To make the examle simle the only resource constraint is a comonent limitation. nly one adder and one ALU are allocated, where each comonent requires one clock cycle. Additions can be erformed by the adder or the ALU. The subtractions can only be erformed by using the ALU. 5.. Distribution of oerations to clock cycles In a first ste an "as soon as ossible (ASAP)" and an "as late as ossible (ALAP)" schedule without resource constraints are calculated. As a result for each oeration the earliest as well as the latest execution time is obtained. Figure shows the time frames for the oerations based on the ASAP and the ALAP schedules. That means, that in the following we are only dealing with robabilities of assigning an oeration to a secific clock cycle. Table 1 contains for each oeration, each clock cycle and each branch label the robability for the oerations assuming an equirobable distribution of the oerations over their time frames. This table is the basis for the delay estimation due to limited resources. T Figure Time frames of the oerations Table 1 Evaluation table T In the examle we use the oeration tyes addition and subtraction. Within this abstraction level we consider the oerations as units cometing for comonents. ne oeration can therefore be characterized by the comonent tyes able to execute this oeration. That means that the oeration tyes therefore define a subset of all comonent tyes in our examle. This results in (1). = K 1 = ALU { } { } (1) + =K = Add,ALU 5.. Distribution of oerations to comonent tyes In the next ste all the resource limitations are introduced. Starting from an already statistical oeration distribution to clock cycles we will calculate a statistical distribution of oerations to comonents. This distribution is exressed by the matrix multilication given in (). Based on these conditions the distribution factors have to be determined next. The determination of this distribution works as follows. Limited comonent tyes should only be used for such oerations where no other tyes exist. For oerations with a large number of comonent tyes tyes with a small load have to be selected. A criteria to get a good distribution is to equalize the load of all comonent tyes as much as ossible. The load is given by ().

4 b k1 v 11 v 1 L v 1 o K1 b k v = 1 v L v o K b km v m1 v m L v m o K v ij [ 0,1] v ij = 0, if k i K j m v ij = 1 i=1 K j o Kj m k i b ki v ij number of oeration tyes oeration tyes tableentryfor oeration tye K j number of comonent tyes comonent tyes necessarynumber of comonentsof tye k i distribution factor for K j on k i () a ki = b k i r ki () a ki b ki r ki load of comonent tye k i necessarynumber of comonentsof tye k i existing number of comonentsof tye k i An otimal assignment of oerations to comonent tyes requires a distribution with a global view, i.e. assignment of an oeration to a comonent tye influences the assignment of other oerations. To eliminate these mutual deendencies an additional heuristic is used. The oeration tyes are sorted in increasing order with resect to the number of different comonent tyes able to execute this oeration. The oerations are now within this order assigned to comonent tyes, i.e. it is assumed that condition (4) holds: "mistakes". In our examle this means that in the first ste the subtractions are distributed (no mistakes ossible) and in the next ste the additions are distributed. The second ste is done by equalizing the load of the ALU and the adder as much as ossible utual exclusive oerations By using the branch labels it is ossible for the scheduling algorithm to assign several oerations within the same clock cycle to the same comonent. For oerations which are mutual exclusive the maximum of the required comonents within each branch is sufficient for all branches. This is taken into account by the following algorithm. The algorithm starts with the evaluation table given in table 1. Beginning with the main branch, all oerations with this label are added to the oerations in all direct sub branches. With nested sub branches this is done recursively until the innermost sub branch is reached. Table shows the result roduced by this algorithm for our examle. ( is the main branch, and are mutual exclusive.) For each branch and each clock cycle now the oerations are distributed by an heuristic algorithm which equally minimizes the load of all comonent tyes. As a result we obtain table. In the next ste we calculate the maximum for the mutual exclusive branches and this results in table 4. The now calculated number of comonents is the estimate for the total number of comonents of each tye, i.e. the necessary comonents required for each ossible branch. From table 4 now the delay due to resource constraints can be estimated as a comonent load larger than one (5). The result is an estimated delay of 0. clock cycles. v k,t = max(a k,t 1,0) a k,t v k,t load of tye k in clock cycle t delayof tye k in clock cycle t (5) K 1 K L K (4) The distribution factors are now columnwise determined from left to right. The heuristic means that at the beginning only few ossibilities exist and therefore only small "mistakes" are ossible. In a later stage the revious decisions can be taken into account in order to correct these Table Sum in branches,, T Table Comonent distribution,, T Add ALU Add ALU Examles and results The filter examle [DeDN85] is a benchmark for the highlevel synthesis worksho series. It contains 6 additions and 8 multilications. The control flow consists of one single loo without mutual exclusive oerations. Table 4 aximum between branches,, T Add ALU Table 5 shows some results which have been calculated by the here resented algorithm. The results are based on different resource allocations using the comonent tyes given in table 6. The uer art of the table is obtained

5 without using the integrated comonent tye assignment. Similar results have already been obtained by other already resented scheduling algorithms [PaPa86], [PaKn87] and [PaKn89]. The lower art of the table shows the imrovements which are ossible by using different ALU tyes. The comonent tye selection integrated in the scheduling algorithm allows a much better design sace exloration and rovides these very encouraging results. Comarable results from other systems are not known to the authors u to now. The CPU time column is given with resect to a HP/Aollo DN 4500 (7IPS) workstation. Table 5 Results for filter examle Resources Results Add Add* ul ulp ALU ALUP CPU(s) Cycles Add Add* ul Table 6 Comonent tyes Adder, delay 1 clock cycle Adder, delay 0.5 clock cycles ultilier, delay clock cycles ulp ul with internal ieline, latency 1 clock cycle ALU ALU (add, mul), delay for add 1 clock cycle, delay for mul clock cycles ALUP ALU with internal ieline, latency 1 clock cycle 7. Summary A new scheduling algorithm has been resented. An essential feature of this new algorithm is the integrated comonent tye assignment within this scheduling algorithm. By using this algorithm it is ossible to otimize the timing behaviour of a circuit by taking advantage as much as ossible of limited available or esecially owerful comonents. This contribution concentrates on the detailed descrition and exlanation of the rating function. The encouraging results esecially the low CPU times of the rating function allow the use of the rating function indeendent from the scheduling algorithm. ne ossible alication of the rating function could be the automation of an otimal resource allocation. 8. References [CaKR84] R. Camosano, A. Kunzmann, W. Rosenstiel, "Automatic Data Path Synthesis from DSL Secifications", International Conference on Comuter Design, ICCD 1984 [CaRo89] R. Camosano, W. Rosenstiel, "Synthesizing Circuits from Behavioral Descritions", IEEE Transactions on CAD, Vol. 8, 1989 [DeDN85] P. Dewilde, E. Derettere, R. Nouta, "Parallel and Pielined VLSI Imlementations of Signal Processing Algorithms" in S. Y. Kung, H. J. Whitehouse, T. Kailath, "VLSI and odern Signal Processing", Prentice Hall, 1985 [DKNP89] P. Duzy, H. Krämer,. Neher,. Pilsl, W. Rosenstiel, T. Wecker, "CALLAS Conversion of Algorithms to Library Adatable Structures", VLSI 89 [GaJo79]. R. Garey, D. S. Johnson, "Comuters and Intractability", Bell Labaratories, urray Hill, New Jersey, 1979 [Gutb89] P. Gutberlet, "Design of a Scheduling Algorithm for the CADDY Synthesis System", (in german) Diloma Thesis, University of Karlsruhe, 1989 [KNRW88] H. Krämer,. Neher, G. Rietsche, W. Rosenstiel, "Data Path and Control Synthesis in the CADDY System", International Worksho on Logic and Architecture Synthesis for Silicon Comilers, 1988 [KoGD90]. Koster,. Geiger, P. Duzy, "ASIC Design Using the HighLevel Synthesis System CALLAS: A Case Study", ICCD 90 [KrRo90] H. Krämer, W. Rosenstiel, "System Synthesis using Behavioural Descritions", Proceedings at 1 st EDAC, 1990 [PaKn87] P. G. Paulin, J. P. Knight, "ForceDirected Scheduling in Automatic Data Path Synthesis", Proceedings of the 4th Design Automation Conference, 1987 [PaKn89] P. G. Paulin, J. P. Knight, "Scheduling and Binding Algorithms for HighLevel Synthesis", Proceedings of the 6th Design Automation Conference, (Extended Version), 1989 [PaPa86] N. Park, A. C. Parker, "SEHWA: A Program for Synthesis of Pielines", Proceedings of the rd Design Automation Conference, 1986 [RoCa85] W. Rosenstiel, R. Camosano, "Synthesizing Circuits from Behavioral Level Secifications", 7th International Symosium on Comuter Hardware Descrition Languages and their Alications, CHDL 85, Tokio, 1985

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Journal of Comuting and Information Technology - CIT 8, 2000, 1, 1 12 1 Comlexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Eunice E. Santos Deartment of Electrical

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

A Model-Adaptable MOSFET Parameter Extraction System

A Model-Adaptable MOSFET Parameter Extraction System A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313

More information

Equality-Based Translation Validator for LLVM

Equality-Based Translation Validator for LLVM Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented

More information

Interface Specification and Synthesis for VHDL Processes *

Interface Specification and Synthesis for VHDL Processes * Interface Specification and Synthesis for VHDL Processes * P. Gutberlet W. Rosenstiel 1 Forschungszentrum Informatik (FZI) Haid-und-Neu-Str. 10-14, D-76131 Karlsruhe, Germany 1 FZI and University of Tübingen

More information

Lecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model.

Lecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model. U.C. Berkeley CS273: Parallel and Distributed Theory Lecture 18 Professor Satish Rao Lecturer: Satish Rao Last revised Scribe so far: Satish Rao (following revious lecture notes quite closely. Lecture

More information

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment

More information

Submission. Verifying Properties Using Sequential ATPG

Submission. Verifying Properties Using Sequential ATPG Verifying Proerties Using Sequential ATPG Jacob A. Abraham and Vivekananda M. Vedula Comuter Engineering Research Center The University of Texas at Austin Austin, TX 78712 jaa, vivek @cerc.utexas.edu Daniel

More information

Randomized algorithms: Two examples and Yao s Minimax Principle

Randomized algorithms: Two examples and Yao s Minimax Principle Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum

More information

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions

More information

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,

More information

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal International Journal of Information and Electronics Engineering, Vol. 1, No. 1, July 011 An Efficient VLSI Architecture for Adative Rank Order Filter for Image Noise Removal M. C Hanumantharaju, M. Ravishankar,

More information

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture

More information

A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems

A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems Cheng-Yuan Chang and I-Lun Tseng Deartment of Comuter Science and Engineering Yuan Ze University,

More information

Using Standard AADL for COMPASS

Using Standard AADL for COMPASS Using Standard AADL for COMPASS (noll@cs.rwth-aachen.de) AADL Standards Meeting Aachen, Germany; July 5 8, 06 Overview Introduction SLIM Language Udates COMPASS Develoment Roadma Fault Injections Parametric

More information

The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing

The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing Mikael Taveniku 2,3, Anders Åhlander 1,3, Magnus Jonsson 1 and Bertil Svensson 1,2

More information

RST(0) RST(1) RST(2) RST(3) RST(4) RST(5) P4 RSR(0) RSR(1) RSR(2) RSR(3) RSR(4) RSR(5) Processor 1X2 Switch 2X1 Switch

RST(0) RST(1) RST(2) RST(3) RST(4) RST(5) P4 RSR(0) RSR(1) RSR(2) RSR(3) RSR(4) RSR(5) Processor 1X2 Switch 2X1 Switch Sub-logarithmic Deterministic Selection on Arrays with a Recongurable Otical Bus 1 Yijie Han Electronic Data Systems, Inc. 750 Tower Dr. CPS, Mail Sto 7121 Troy, MI 48098 Yi Pan Deartment of Comuter Science

More information

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems Matlab Virtual Reality Simulations for otimizations and raid rototying of flexible lines systems VAMVU PETRE, BARBU CAMELIA, POP MARIA Deartment of Automation, Comuters, Electrical Engineering and Energetics

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

Non-Strict Independence-Based Program Parallelization Using Sharing and Freeness Information

Non-Strict Independence-Based Program Parallelization Using Sharing and Freeness Information Non-Strict Indeendence-Based Program Parallelization Using Sharing and Freeness Information Daniel Cabeza Gras 1 and Manuel V. Hermenegildo 1,2 Abstract The current ubiuity of multi-core rocessors has

More information

Distributed Estimation from Relative Measurements in Sensor Networks

Distributed Estimation from Relative Measurements in Sensor Networks Distributed Estimation from Relative Measurements in Sensor Networks #Prabir Barooah and João P. Hesanha Abstract We consider the roblem of estimating vectorvalued variables from noisy relative measurements.

More information

Object and Native Code Thread Mobility Among Heterogeneous Computers

Object and Native Code Thread Mobility Among Heterogeneous Computers Object and Native Code Thread Mobility Among Heterogeneous Comuters Bjarne Steensgaard Eric Jul Microsoft Research DIKU (Det. of Comuter Science) One Microsoft Way University of Coenhagen Redmond, WA 98052

More information

Extracting Optimal Paths from Roadmaps for Motion Planning

Extracting Optimal Paths from Roadmaps for Motion Planning Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

12) United States Patent 10) Patent No.: US 6,321,328 B1

12) United States Patent 10) Patent No.: US 6,321,328 B1 USOO6321328B1 12) United States Patent 10) Patent No.: 9 9 Kar et al. (45) Date of Patent: Nov. 20, 2001 (54) PROCESSOR HAVING DATA FOR 5,961,615 10/1999 Zaid... 710/54 SPECULATIVE LOADS 6,006,317 * 12/1999

More information

Improving Trust Estimates in Planning Domains with Rare Failure Events

Improving Trust Estimates in Planning Domains with Rare Failure Events Imroving Trust Estimates in Planning Domains with Rare Failure Events Colin M. Potts and Kurt D. Krebsbach Det. of Mathematics and Comuter Science Lawrence University Aleton, Wisconsin 54911 USA {colin.m.otts,

More information

SPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation

SPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation To aear in IEEE VLSI Test Symosium, 1997 SITFIRE: Scalable arallel Algorithms for Test Set artitioned Fault Simulation Dili Krishnaswamy y Elizabeth M. Rudnick y Janak H. atel y rithviraj Banerjee z y

More information

An Efficient Video Program Delivery algorithm in Tree Networks*

An Efficient Video Program Delivery algorithm in Tree Networks* 3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,

More information

10. Parallel Methods for Data Sorting

10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting... 1 10.1. Parallelizing Princiles... 10.. Scaling Parallel Comutations... 10.3. Bubble Sort...3 10.3.1. Sequential Algorithm...3

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information

A Reconfigurable Architecture for Quad MAC VLIW DSP

A Reconfigurable Architecture for Quad MAC VLIW DSP A Reconfigurable Architecture for Quad MAC VLIW DSP Sangwook Kim, Sungchul Yoon, Jaeseuk Oh, Sungho Kang Det. of Electrical & Electronic Engineering, Yonsei University 132 Shinchon-Dong, Seodaemoon-Gu,

More information

Introduction to Parallel Algorithms

Introduction to Parallel Algorithms CS 1762 Fall, 2011 1 Introduction to Parallel Algorithms Introduction to Parallel Algorithms ECE 1762 Algorithms and Data Structures Fall Semester, 2011 1 Preliminaries Since the early 1990s, there has

More information

arxiv: v1 [cs.dc] 13 Nov 2018

arxiv: v1 [cs.dc] 13 Nov 2018 Task Grah Transformations for Latency Tolerance arxiv:1811.05077v1 [cs.dc] 13 Nov 2018 Victor Eijkhout November 14, 2018 Abstract The Integrative Model for Parallelism (IMP) derives a task grah from a

More information

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links

More information

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,

More information

AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS

AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS Philie LACOMME, Christian PRINS, Wahiba RAMDANE-CHERIF Université de Technologie de Troyes, Laboratoire d Otimisation des Systèmes Industriels (LOSI)

More information

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY Andrew Lam 1, Steven J.E. Wilton 1, Phili Leong 2, Wayne Luk 3 1 Elec. and Com. Engineering 2 Comuter Science

More information

FIELD-programmable gate arrays (FPGAs) are quickly

FIELD-programmable gate arrays (FPGAs) are quickly This article has been acceted for inclusion in a future issue of this journal Content is final as resented, with the excetion of agination IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS

More information

Randomized Selection on the Hypercube 1

Randomized Selection on the Hypercube 1 Randomized Selection on the Hyercube 1 Sanguthevar Rajasekaran Det. of Com. and Info. Science and Engg. University of Florida Gainesville, FL 32611 ABSTRACT In this aer we resent randomized algorithms

More information

Skip List Based Authenticated Data Structure in DAS Paradigm

Skip List Based Authenticated Data Structure in DAS Paradigm 009 Eighth International Conference on Grid and Cooerative Comuting Ski List Based Authenticated Data Structure in DAS Paradigm Jieing Wang,, Xiaoyong Du,. Key Laboratory of Data Engineering and Knowledge

More information

Autonomic Physical Database Design - From Indexing to Multidimensional Clustering

Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Stehan Baumann, Kai-Uwe Sattler Databases and Information Systems Grou Technische Universität Ilmenau, Ilmenau, Germany

More information

10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1

10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1 10 File System 1 We will examine this chater in three subtitles: Mass Storage Systems OERATING SYSTEMS FILE SYSTEM 1 File System Interface File System Imlementation 10.1.1 Mass Storage Structure 3 2 10.1

More information

A Metaheuristic Scheduler for Time Division Multiplexed Network-on-Chip

A Metaheuristic Scheduler for Time Division Multiplexed Network-on-Chip Downloaded from orbit.dtu.dk on: Jan 25, 2019 A Metaheuristic Scheduler for Time Division Multilexed Network-on-Chi Sørensen, Rasmus Bo; Sarsø, Jens; Pedersen, Mark Ruvald; Højgaard, Jasur Publication

More information

Synthesis of FSMs on the Basis of Reusable Hardware Templates

Synthesis of FSMs on the Basis of Reusable Hardware Templates Proceedings of the 6th WSEAS Int. Conf. on Systems Theory & Scientific Comutation, Elounda, Greece, August -3, 006 (09-4) Synthesis of FSMs on the Basis of Reusable Hardware Temlates VALERY SKLYAROV, IOULIIA

More information

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION Yugoslav Journal of Oerations Research (00), umber, 5- A BICRITERIO STEIER TREE PROBLEM O GRAPH Mirko VUJO[EVI], Milan STAOJEVI] Laboratory for Oerational Research, Faculty of Organizational Sciences University

More information

A power efficient flit-admission scheme for wormhole-switched networks on chip

A power efficient flit-admission scheme for wormhole-switched networks on chip A ower efficient flit-admission scheme for wormhole-switched networks on chi Zhonghai Lu, Li Tong, Bei Yin and Axel Jantsch Laboratory of Electronics and Comuter Systems Royal Institute of Technology,

More information

Source Coding and express these numbers in a binary system using M log

Source Coding and express these numbers in a binary system using M log Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is

More information

Information Flow Based Event Distribution Middleware

Information Flow Based Event Distribution Middleware Information Flow Based Event Distribution Middleware Guruduth Banavar 1, Marc Kalan 1, Kelly Shaw 2, Robert E. Strom 1, Daniel C. Sturman 1, and Wei Tao 3 1 IBM T. J. Watson Research Center Hawthorne,

More information

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Weimin Chen, Volker Turau TR-93-047 August, 1993 Abstract This aer introduces a new technique for source-to-source code

More information

Argo Programming Guide

Argo Programming Guide Argo Programming Guide Evangelia Kasaaki, asmus Bo Sørensen February 9, 2015 Coyright 2014 Technical University of Denmark This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International

More information

Interactive Image Segmentation

Interactive Image Segmentation Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).

More information

A Study of Protocols for Low-Latency Video Transport over the Internet

A Study of Protocols for Low-Latency Video Transport over the Internet A Study of Protocols for Low-Latency Video Transort over the Internet Ciro A. Noronha, Ph.D. Cobalt Digital Santa Clara, CA ciro.noronha@cobaltdigital.com Juliana W. Noronha University of California, Davis

More information

GEOMETRIC CONSTRAINT SOLVING IN < 2 AND < 3. Department of Computer Sciences, Purdue University. and PAMELA J. VERMEER

GEOMETRIC CONSTRAINT SOLVING IN < 2 AND < 3. Department of Computer Sciences, Purdue University. and PAMELA J. VERMEER GEOMETRIC CONSTRAINT SOLVING IN < AND < 3 CHRISTOPH M. HOFFMANN Deartment of Comuter Sciences, Purdue University West Lafayette, Indiana 47907-1398, USA and PAMELA J. VERMEER Deartment of Comuter Sciences,

More information

COMP Parallel Computing. BSP (1) Bulk-Synchronous Processing Model

COMP Parallel Computing. BSP (1) Bulk-Synchronous Processing Model COMP 6 - Parallel Comuting Lecture 6 November, 8 Bulk-Synchronous essing Model Models of arallel comutation Shared-memory model Imlicit communication algorithm design and analysis relatively simle but

More information

Lecture 8: Orthogonal Range Searching

Lecture 8: Orthogonal Range Searching CPS234 Comutational Geometry Setember 22nd, 2005 Lecture 8: Orthogonal Range Searching Lecturer: Pankaj K. Agarwal Scribe: Mason F. Matthews 8.1 Range Searching The general roblem of range searching is

More information

Auto-Tuning Distributed-Memory 3-Dimensional Fast Fourier Transforms on the Cray XT4

Auto-Tuning Distributed-Memory 3-Dimensional Fast Fourier Transforms on the Cray XT4 Auto-Tuning Distributed-Memory 3-Dimensional Fast Fourier Transforms on the Cray XT4 M. Gajbe a A. Canning, b L-W. Wang, b J. Shalf, b H. Wasserman, b and R. Vuduc, a a Georgia Institute of Technology,

More information

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism Erlin Yao, Mingyu Chen, Rui Wang, Wenli Zhang, Guangming Tan Key Laboratory of Comuter System and Architecture Institute

More information

Building Better Nurse Scheduling Algorithms

Building Better Nurse Scheduling Algorithms Building Better Nurse Scheduling Algorithms Annals of Oerations Research, 128, 159-177, 2004. Dr Uwe Aickelin Dr Paul White School of Comuter Science University of the West of England University of Nottingham

More information

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China

More information

Graph Cut Matching In Computer Vision

Graph Cut Matching In Computer Vision Grah Cut Matching In Comuter Vision Toby Collins (s0455374@sms.ed.ac.uk) February 2004 Introduction Many of the roblems that arise in early vision can be naturally exressed in terms of energy minimization.

More information

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu

More information

Experimental Comparison of Shortest Path Approaches for Timetable Information

Experimental Comparison of Shortest Path Approaches for Timetable Information Exerimental Comarison of Shortest Path roaches for Timetable Information Evangelia Pyrga Frank Schulz Dorothea Wagner Christos Zaroliagis bstract We consider two aroaches that model timetable information

More information

Multi-robot SLAM with Unknown Initial Correspondence: The Robot Rendezvous Case

Multi-robot SLAM with Unknown Initial Correspondence: The Robot Rendezvous Case Multi-robot SLAM with Unknown Initial Corresondence: The Robot Rendezvous Case Xun S. Zhou and Stergios I. Roumeliotis Deartment of Comuter Science & Engineering, University of Minnesota, Minneaolis, MN

More information

RTL Fast Convolution using the Mersenne Number Transform

RTL Fast Convolution using the Mersenne Number Transform RTL Fast Convolution using the Mersenne Number Transform Oscar N. Bria and Horacio A. Villagarcía o.bria@ieee.org CeTAD - - Argentina Abstract VHDL is a versatile high level language for the secification

More information

Control plane and data plane. Computing systems now. Glacial process of innovation made worse by standards process. Computing systems once upon a time

Control plane and data plane. Computing systems now. Glacial process of innovation made worse by standards process. Computing systems once upon a time Classical work Architecture A A A Intro to SDN A A Oerating A Secialized Packet A A Oerating Secialized Packet A A A Oerating A Secialized Packet A A Oerating A Secialized Packet Oerating Secialized Packet

More information

Parallel Algorithms for the Summed Area Table on the Asynchronous Hierarchical Memory Machine, with GPU implementations

Parallel Algorithms for the Summed Area Table on the Asynchronous Hierarchical Memory Machine, with GPU implementations Parallel Algorithms for the Summed Area Table on the Asynchronous Hierarchical Memory Machine, ith GPU imlementations Akihiko Kasagi, Koji Nakano, and Yasuaki Ito Deartment of Information Engineering Hiroshima

More information

CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE

CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE Petra Surynková Charles University in Prague, Faculty of Mathematics and Physics, Sokolovská 83,

More information

Fast Distributed Process Creation with the XMOS XS1 Architecture

Fast Distributed Process Creation with the XMOS XS1 Architecture Communicating Process Architectures 20 P.H. Welch et al. (Eds.) IOS Press, 20 c 20 The authors and IOS Press. All rights reserved. Fast Distributed Process Creation with the XMOS XS Architecture James

More information

Communication-Avoiding Parallel Algorithms for Solving Triangular Matrix Equations

Communication-Avoiding Parallel Algorithms for Solving Triangular Matrix Equations Research Collection Bachelor Thesis Communication-Avoiding Parallel Algorithms for Solving Triangular Matrix Equations Author(s): Wicky, Tobias Publication Date: 2015 Permanent Link: htts://doi.org/10.3929/ethz-a-010686133

More information

A 2D Random Walk Mobility Model for Location Management Studies in Wireless Networks Abstract: I. Introduction

A 2D Random Walk Mobility Model for Location Management Studies in Wireless Networks Abstract: I. Introduction A D Random Walk Mobility Model for Location Management Studies in Wireless Networks Kuo Hsing Chiang, RMIT University, Melbourne, Australia Nirmala Shenoy, Information Technology Deartment, RIT, Rochester,

More information

SEARCH ENGINE MANAGEMENT

SEARCH ENGINE MANAGEMENT e-issn 2455 1392 Volume 2 Issue 5, May 2016. 254 259 Scientific Journal Imact Factor : 3.468 htt://www.ijcter.com SEARCH ENGINE MANAGEMENT Abhinav Sinha Kalinga Institute of Industrial Technology, Bhubaneswar,

More information

Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects

Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScrit Objects Shiyi Wei and Barbara G. Ryder Deartment of Comuter Science, Virginia Tech, Blacksburg, VA, USA. {wei,ryder}@cs.vt.edu

More information

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method ITB J. Eng. Sci. Vol. 39 B, No. 1, 007, 1-19 1 Leak Detection Modeling and Simulation for Oil Pieline with Artificial Intelligence Method Pudjo Sukarno 1, Kuntjoro Adji Sidarto, Amoranto Trisnobudi 3,

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Distrib. Comut. 71 (2011) 288 301 Contents lists available at ScienceDirect J. Parallel Distrib. Comut. journal homeage: www.elsevier.com/locate/jdc Quality of security adatation in arallel

More information

Directed File Transfer Scheduling

Directed File Transfer Scheduling Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was

More information

Distributed Algorithms

Distributed Algorithms Course Outline With grateful acknowledgement to Christos Karamanolis for much of the material Jeff Magee & Jeff Kramer Models of distributed comuting Synchronous message-assing distributed systems Algorithms

More information

Improve Precategorized Collection Retrieval by Using Supervised Term Weighting Schemes Λ

Improve Precategorized Collection Retrieval by Using Supervised Term Weighting Schemes Λ Imrove Precategorized Collection Retrieval by Using Suervised Term Weighting Schemes Λ Ying Zhao and George Karyis University of Minnesota, Deartment of Comuter Science Minneaolis, MN 55455 Abstract The

More information

Applying the fuzzy preference relation to the software selection

Applying the fuzzy preference relation to the software selection Proceedings of the 007 WSEAS International Conference on Comuter Engineering and Alications, Gold Coast, Australia, January 17-19, 007 83 Alying the fuzzy reference relation to the software selection TIEN-CHIN

More information

Hardware-Accelerated Formal Verification

Hardware-Accelerated Formal Verification Hardare-Accelerated Formal Verification Hiroaki Yoshida, Satoshi Morishita 3 Masahiro Fujita,. VLSI Design and Education Center (VDEC), University of Tokyo. CREST, Jaan Science and Technology Agency 3.

More information

Model-Based Annotation of Online Handwritten Datasets

Model-Based Annotation of Online Handwritten Datasets Model-Based Annotation of Online Handwritten Datasets Anand Kumar, A. Balasubramanian, Anoo Namboodiri and C.V. Jawahar Center for Visual Information Technology, International Institute of Information

More information

Mitigating the Impact of Decompression Latency in L1 Compressed Data Caches via Prefetching

Mitigating the Impact of Decompression Latency in L1 Compressed Data Caches via Prefetching Mitigating the Imact of Decomression Latency in L1 Comressed Data Caches via Prefetching by Sean Rea A thesis resented to Lakehead University in artial fulfillment of the requirement for the degree of

More information

Optimization of Collective Communication Operations in MPICH

Optimization of Collective Communication Operations in MPICH To be ublished in the International Journal of High Performance Comuting Alications, 5. c Sage Publications. Otimization of Collective Communication Oerations in MPICH Rajeev Thakur Rolf Rabenseifner William

More information

Architecture description languages for programmable embedded systems

Architecture description languages for programmable embedded systems Architecture descrition languages for rogrammable embedded systems P. Mishra and N. Dutt Abstract: Embedded systems resent a tremendous oortunity to customise designs by exloiting the alication behaviour.

More information

Models for Advancing PRAM and Other Algorithms into Parallel Programs for a PRAM-On-Chip Platform

Models for Advancing PRAM and Other Algorithms into Parallel Programs for a PRAM-On-Chip Platform Models for Advancing PRAM and Other Algorithms into Parallel Programs for a PRAM-On-Chi Platform Uzi Vishkin George C. Caragea Bryant Lee Aril 2006 University of Maryland, College Park, MD 20740 UMIACS-TR

More information

A Petri net-based Approach to QoS-aware Configuration for Web Services

A Petri net-based Approach to QoS-aware Configuration for Web Services A Petri net-based Aroach to QoS-aware Configuration for Web s PengCheng Xiong, YuShun Fan and MengChu Zhou, Fellow, IEEE Abstract With the develoment of enterrise-wide and cross-enterrise alication integration

More information

Patterned Wafer Segmentation

Patterned Wafer Segmentation atterned Wafer Segmentation ierrick Bourgeat ab, Fabrice Meriaudeau b, Kenneth W. Tobin a, atrick Gorria b a Oak Ridge National Laboratory,.O.Box 2008, Oak Ridge, TN 37831-6011, USA b Le2i Laboratory Univ.of

More information

Machine-Learning-Based Circuit Synthesis

Machine-Learning-Based Circuit Synthesis Proceedings of the wenty-hird International Joint Conference on Artificial Intelligence Machine-Learning-Based Circuit Synthesis Lior Rokach 1 and Meir Kalech 1 and Gregory Provan 2 and Alexander eldman

More information

Power Savings in Embedded Processors through Decode Filter Cache

Power Savings in Embedded Processors through Decode Filter Cache Power Savings in Embedded Processors through Decode Filter Cache Weiyu Tang Rajesh Guta Alexandru Nicolau Deartment of Information and Comuter Science University of California, Irvine Irvine, CA 92697-3425

More information

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singaore. Title Automatic Robot Taing: Auto-Path Planning and Maniulation Author(s) Citation Yuan, Qilong; Lembono, Teguh

More information

Implementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching

Implementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching Imlementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching Ju Hui Li, eng Hiot Lim and Qi Cao School of EEE, Block S Nanyang Technological University Singaore 639798

More information

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces Wavelet Based Statistical Adated Local Binary atterns for Recognizing Avatar Faces Abdallah A. Mohamed 1, 2 and Roman V. Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville,

More information

7. Extensions and Annotations. Prof. Nagl, Informatik 3 (Software Engineering)

7. Extensions and Annotations. Prof. Nagl, Informatik 3 (Software Engineering) 7. Extensions and Annotations 1 Extensions and Annotations Aims Further imortant asects yielding to extensions o / annotations to architectural languages: not urther isolated view but details o ex. architecture

More information

aclass: ClassDeclaration (name=name) aspectstatement: Statement (place=name) methods method: MethodDeclaration

aclass: ClassDeclaration (name=name) aspectstatement: Statement (place=name) methods method: MethodDeclaration Asect Weaving with Grah Rewriting Uwe A mann and Andreas Ludwig Institut f r Programmstrukturen und Datenorganisation Universit t Karlsruhe, RZ, Postfach 6980, 76128 Karlsruhe, Germany (assmannjludwig)@id.info.uni-karlsruhe.de

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

Brigham Young University Oregon State University. Abstract. In this paper we present a new parallel sorting algorithm which maximizes the overlap

Brigham Young University Oregon State University. Abstract. In this paper we present a new parallel sorting algorithm which maximizes the overlap Aeared in \Journal of Parallel and Distributed Comuting, July 1995 " Overlaing Comutations, Communications and I/O in Parallel Sorting y Mark J. Clement Michael J. Quinn Comuter Science Deartment Deartment

More information

Construction of Irregular QC-LDPC Codes in Near-Earth Communications

Construction of Irregular QC-LDPC Codes in Near-Earth Communications Journal of Communications Vol. 9, No. 7, July 24 Construction of Irregular QC-LDPC Codes in Near-Earth Communications Hui Zhao, Xiaoxiao Bao, Liang Qin, Ruyan Wang, and Hong Zhang Chongqing University

More information

Event Analysis in Intelligent Aerial Surveillance Systems for Vehicle Detection and Tracking

Event Analysis in Intelligent Aerial Surveillance Systems for Vehicle Detection and Tracking Event Analysis in Intelligent Aerial Surveillance Systems for Vehicle Detection and Tracking B.T.R.Naresh Reddy, Prasad Nagelli, K.Srinivasulu Reddy Abstract Vehicle detection lays an imortant role in

More information

Protecting Mobile Agents against Malicious Host Attacks Using Threat Diagnostic AND/OR Tree

Protecting Mobile Agents against Malicious Host Attacks Using Threat Diagnostic AND/OR Tree Protecting Mobile Agents against Malicious Host Attacks Using Threat Diagnostic AND/OR Tree Magdy Saeb, Meer Hamza, Ashraf Soliman. Arab Academy for Science, Technology & Maritime Transort Comuter Engineering

More information

Signature File Hierarchies and Signature Graphs: a New Index Method for Object-Oriented Databases

Signature File Hierarchies and Signature Graphs: a New Index Method for Object-Oriented Databases Signature File Hierarchies and Signature Grahs: a New Index Method for Object-Oriented Databases Yangjun Chen* and Yibin Chen Det. of Business Comuting University of Winnieg, Manitoba, Canada R3B 2E9 ABSTRACT

More information