Skip List Based Authenticated Data Structure in DAS Paradigm

Size: px
Start display at page:

Download "Skip List Based Authenticated Data Structure in DAS Paradigm"

Transcription

1 009 Eighth International Conference on Grid and Cooerative Comuting Ski List Based Authenticated Data Structure in DAS Paradigm Jieing Wang,, Xiaoyong Du,. Key Laboratory of Data Engineering and Knowledge Engineering, Beijing 007, China, MOE. School of Information, Renmin University of China Abstract In Database-as-a-Service (DAS) comuting aradigm, data owners delegate database management tasks to service rovider. Since the service rovider is untrusted, query authentication becomes an essential issue before database outsourcing. In revious research, various Authentication Data Structures (ADS) have been roosed. However, most of them are either disk-based or static. Considering service rovider usually owns large memory and owerful rocessors, in this aer we roose a dynamic main memory ADS based on ski list, which could rovide efficient authentication for range query both in static and in dynamic scenarios. Exerimental results confirm our claim through a systematic analysis of verification metrics. Keywords-DAS; query authentication; ski list; authenticated data structure I. INTRODUCTION DAS (a.k.a. Outsourced database, ODB) [] is a romising database management aradigm, where data owners delegate their data to the third-arty: service rovider. Due to economy of scale, DAS could rovide high quality of service at reduced cost. Since the service rovider is untrusted or comromised, new security issues have been introduced, among which authentication of query results is a major concern before outsourcing database. Basically, query authentication focuses the following three dimensions of data: soundness, comleteness and freshness []. Soundness means the result set does originate from data owner and has not been tamered with in any way. Comleteness means no qualified tules missing from result set. Freshness means the result set incororates the latest version. To achieve query authentication, we introduce a three-tier architecture in Figure. Insert Owner Security Manager Delete Owner m Querier Query Authenticator Querier n Query User Client Data & ADS SQL Resultset & VO Figure. System overview DBMS DB Service Provider In Figure, there are three entities involved: trusted user, trusted client and untrusted service rovider. User can be divided into two roles: owner, who is resonsible for data generation and maintenance; querier, who accesses data. Client is resonsible for security related tasks, such as data encrytion and query authentication. The rest of database management task is carried out by service rovider. Basically, we artition database management tasks into three hases: initial hase, query hase and maintenance hase. In initial hase, owners generate data and uload them to client. Client creates ADS uon data and delegates them to service rovider. In query hase, service rovider executes query locally and returns result set and associated VO (Verification Object) to client, which does the final verification. In maintenance hase, client recalculates ADS and transfers it to service rovider. Consequently, authentication cost includes three arts:.construction cost of ADS, query authentication cost and ADS maintenance cost. In real alications, above three entities own different comuter owers: user is usually ower limited, e.g. mobile device; client tyically ossesses a work station, or even a PC comuter, while service rovider runs a server cluster. The goal of DAS is to ush workload to service rovider as much as ossible and kee client overhead and communication overhead between client and service rovider minimized. In revious research, various ADSs have been roosed. However, most of them focus on disk-based structures such as VB-tree [3], MB-tree and EMB [], where I/O cost and crytograhic oeration cost are two dominating factors. Obviously, none of them considers the fact that service rovider has large memory and owerful rocessors. The only main memory ADS roosed is based on MHT, a binary balanced tree. Since udate oerations will cause comlete rebuilding, MHT is alicable only for static scenario. In this aer, we roose a dynamic main memory ADS based on Ski List: ADSSL, which has one dominating factor: crytograhic oeration. As a robabilistic alternative to balanced tree, Ski list is easy to imlement and efficient in data udates. Secifically, ADSSL has the following advantages: ADSSL is sace efficient and suitable for main memory structure. This work is suorted by two MOE rojects under Grant No 7000 and /09 $ IEEE DOI 0.09/GCC

2 ADSSL is robability balanced and can suly flexible trade-off between storage and verification cost. ADSSL suorts efficient authentication of range query. Maintenance cost of ADSSL is similar to that of query authentication cost. Besides query authentication, there s another imortant class of security issue: data security, which mainly focuses on how to revent sensitive data from unauthorized access. It s orthogonal to our issue and not covered in this aer. The rest of the aer is organized as follows. We resented related work in Section II. In section III, we roosed our new ADS based on ski list and gave systematic evaluations on various authentication costs. Besides, a VO size otimized version of ADSSL is roosed. Exeriments were made in section IV. Section V concludes the aer and oints out future work. II. RELATED WORK Existing research on query authentication can be divided into three categories: signature based, ADS based and robability based. In the following, we comare them from three asects: authentication ability (the tye of query suorted), authentication cost and authentication ratio. Although assigning one signature to each tule could rovide soundness authentication at tule level, it has serious efficiency roblem both in sace and time cost. Furthermore, it could not rovide comleteness authentication. To decrease verification time and network workload, aggregate signature [, 7, 9] was roosed, which transforms multile signature verifications into multile modular multilications and one verification. Signature chain [7, ] was roosed to suort comleteness authentication, where one signature is based on three consecutive tules instead of one tule. In a word, signature based aroach is a simle aroach with 00% authentication ratio. However, it has high authentication cost and limited authentication ability. Secifically, it can only suort soundness and comleteness authentication of range query. To decrease signature cost at tule level, authentication data structure (ADS) [, 3, 0, ] has been extensively studied which organises data into a tree so that only one signature for root is needed. Similar to the signature aroach, ADS could achieve 00% authentication ratio. Among them Merkle Hash Tree (MHT) is a commonly used one. Basic structure of MHT is illustrated in Figure (a). Through rebuilding of MHT and verification on root node, any tamering will be detected. Due to the fast and sace comact of hash, MHT can decrease authentication cost dramatically comared with signature aroach. To enhance erformance further, several variants of MHT [, 3] are roosed, including VB-tree, MB-tree and EMB. The last two structures are illustrated in Figure (b) and (c) resectively. In a word, ADS can suly soundness and comleteness authentication for one-dimensional range query efficiently. For multi-dimensional range query, multile MHT must be built. Besides, it s only suitable for non-sensitive attribute and its maintenance cost is large. h(h h ) h(r ) k h(r ) k k i i h i =H(r i ) (a) MHT... k k j j h j =H(h h f ) (b) MB-tree k i i h i =H(r i ) (c) EMB Figure. Three ADS based on MHT Different from above two aroaches, robability based aroach can only rovide authentication in art. On the other hand, it has strong authentication ability with less authentication cost. There have been two robability authentication aroaches: fake tule [3] and challenge token []. The basic idea of fake tule is as follows: real tules, couled with certain ercentage of fake tules, are outsourced. Through authentication on fake tules, authentication on real tules is inferred with certain robability. However, fake tule aroach brings additional querying and storage cost at DSP. Furthermore, it can not suort authentication of aggregate query. The basic idea of challenge token is that for a batch of queries, through authentication on samled queries, authentication on all queries can be inferred. In [], fake tokens are roosed to increase authentication ratio without increasing authentication cost. Challenge token can authenticate any tye of query efficiently. However, it has two limitations. First, it s a server authentication aroach, which means after roviding correct execution roofs, DSP can still modify result set. Second, it has a strong assumtion that the batch of queries is carried out on the same segment of data, which is difficult to ensure in real alication. Comared with above two aroaches, robability based aroach can authenticate soundness, comleteness and freshness of data. In a conclusion, signature aroaches and ADSs can rovide 00% authentication ratio, but they have limited authentication ability and relative large authentication cost. The robability based aroach is much more efficient and effective, but its authentication ratio is less than 00%. To decrease authentication cost of current ADS, we roose a main memory ADS, which only crytograhic oeration costs are involved. III. AUTHENTICATION DATA STRUCTURE BASED ON SKIP LIST In this section, we first introduce our main memory ADS based on ski list, and then give a detailed analysis on various authentication costs. Finally, we give a VO size efficient version. 70

3 A. Structure Ski list was first roosed by William [] in 990 as a robabilistic alternative to balanced tree, e.g. B+-tree. Figure 3(a) is an examle, where ointers with same level are linked by sorted order. The nodes at low level jum higher with uniform robability. For brevity, a node that has k forward ointers is called a level k node. According to nodes juming higher randomly or not, there re two kinds of ski lists: randomized ski lists, e.g. Figure 3(a); deterministic ski lists, e.g. each node jums one higher. Among them, randomized ski lists are suitable for dynamic scenario and adoted in this aer. Comared with balanced trees, ski lists have the following characteristics: Ski lists are easy to imlement and ractically efficient in search, esecially udate time (without node slit or merge). Interested readers can refer to [] for concrete comarisons. Ski lists are sace comact, where sace is allocated when needed, while emty sace (decided by filling factor) is reserved in balanced tree. Ski lists are main memory index, while balanced tree are disk-based index. In balanced tree, there s only one search direction: move down from root node to leaf node. The number of I/O is decided by the height of tree. However, in ski lists, search includes two directions: ho forward and dro down. For examle, search ath of value 7 is lotted by dotted arrows in Figure 3(a). It s unsuitable to artition ski lists either horizontally or vertically. In conclusion, ski lists are dynamic and efficient main memory index, esecially suitable for the context of service rovider (a) Search ath of value 7 in ski list by dotted arrows (b) Authentication data structure based on ski list (c) Verification rocess of result set {,7,,9,0} (d) VO size otimized authentication structure based on ski list Figure 3. ADSSL and BADSSL based on ski list Although Goodrich etc. roosed authentication dictionary based on ski list and commutative hashing [5], it could only suort membershi query, such as is element s in set S. For range query, a new authentication structure is required. Insired by MHT, we transform ski lists into our new authentication structure, which is illustrated in Figure 3(b). Unlike linked list in Figure 3(a), Figure 3(b) can be regarded as a tree with root node -, where at most one ath exists between any two nodes. 7

4 The search ath in Figure 3(b) is similar to that in Figure 3(a), excet that the number of comarisons is reduced. The construction algorithm of ADSSL is resented in Figure. Algorithm: Construction of ADS Based on Ski Lists Inut: data set: ds, robability: ; maximal levell max Outut: ADS Based on Ski List. for each data in ds{. level = random(l max ); 3. createnode(data, level);. } 5. createnode(, l max );. createnode(+, ); 7. sort nodes on search key;. for each ointer of each node { 9. if exists(consecutive node with equal or less level) 0. link them;. }. scan nodes by reversed sorted order{ 3. calculate verification value for each node;. } Figure. Construction algorithm of ADS based on ski list k v(k ) ck P c3 c c r Child ointer Record ointer Figure 5. Node structure To suort authentication of range queries, each node is assigned with a verification value and the node structure is illustrated in Figure 5, where a node is comosed of three comonents: key (e.g. k, k ), verification value (e.g. v(k ), v(k )) and ointers (e.g. r, c ). The calculation of verification value ensures that it includes information of itself and all of its children. Here we divide ointers into two classes: child ointers and record ointers. Record ointers, denoted as r, refer to the ointer to record. Child ointers, denoted as c, refer to remaining ointers. To calculate verification value uniquely, child ointers are sorted by their levels. As for node n(k, v, r, c, ck ), according to whether c is null or not, the calculation of v is as follows: Case : c =null v(k) = h(r) Case : c null v(k) = h(h(r) v(k-> c ) v(k-> c ) v(k-> ck )) For examle, in Figure 3(b), node (7) and node () corresond to above two cases resectively. Their verification values are calculated as follows: v(7) = h(r 7 ) k v(k ) ck P c3 3 c c r v() = h(h(r ) v(3) v() v()) After initial construction of authentication structure, we calculate verification value for each node from right to left. The calculation of verification value ensures that each node contributes one and only one time to the root node, which is consistent with MHT. B. Query Verification I n this subsection, we discuss how to achieve authentication for range query based on node verification values calculated above. Generally, one range query can be transformed into two (boundary) oint queries. For examle, assume ADSSL in Figure 3(c) is constructed on attribute X. To authenticate range query 7<=x<=9, two oint queries x=7 and x=9 are issued resectively. Query rocess starts from the root node (here is -) and recursively hos forward and dros down until the node with search key is reached. Here the final result set is {7,, 9}. To rovide boundary comleteness, two additional nodes are included: {, 0}. So the result set is {, 7,, 9, 0}. The following roblem is how to construct VOs to rove that the result set is sound and comlete. Generally, VO generation is a reverse rocess of search, which constructs ath from the result set to root. Any node which is required in construction but can not be inferred by the result set (co-ath) is included in VO. For examle, in Figure 3(c), to calculate verification value of node (), two VOs are included: h(r ) and v(5). Two oint queries form a subtree, which is illustrated by dotted line olygon in Figure 3(c). The VO is comosed of those nodes intersecting with subtree, which are illustrated by bold arrows in Figure 3(c). VO is illustrated by bold box. The formal algorithm of verifiable result set generation is illustrated in Figure. Consider, for instance, above query 7<=x<=9, the verifiable result set generated is: [h(-),v(),[h(r),v(3),[h(r),v5],[r, r7]],[r,[r9,[r0,v(+)]]]]]. The time comlexity of VO generation is similar to that of query rocess. After receiving the result set and root signature from service rovider, client would verify if it is sound. Secifically, it scans result set to comute root hash and checks if it agrees with unsigned root signature. Comleteness verification can be achieved by consecutive validation of values in the final result set. There must not be any VO among values in the result set. For examle, if one value, such as r, is omitted from the result set, then the result set is not consecutive. For examle, {r, r 7,VO, r 9, r 0 }. Authentication of ADSSL is ensured by the following theorem. Theorem. ADSSL could rovide soundness and comleteness verification of query results. Proof: Basically, authentication ability of ADSSL is based on the following three factors: first, hash function used to calculate node verification value is one-way and collision-free; second, each node contributes one and only one time to the comutation of root hash; third, the order in which each of value is involved in root hash calculation is fixed and unique. If a attacker modifies, insert or deletes any value in the result set, the ossibility of re-comuting root hash correctly is equal to 7

5 the ossibility of collision in hash, which is negligible in ractice. Algorithm: Verifiable result set generation Inut: ski list root, rang query[low, high] Outut: a verifiable result set. Init stack s; //note: s is a set. search low and ush search ath in stack; 3. search high and ush search ath in stack;. Init rs; 5. while (!emty(s)) {. n = o(s); 7. ush n s ointer values in rs in order;. } 9. return rs; Figure. Verifiable result set generation algorithm C. Maintenance of ADSSL As we ointed out reviously, ski lists are efficient esecially in dynamic scenario. The maintenance of ADSSL is similar to that of ski lists, which is comosed of two stes: query and insert (delete). Here udate is relaced by a air of insert and delete. So maintenance cost is the sum of query cost and insert cost. Since ADSSL is a main memory index, query cost is negligible comared with that of insert. Insert cost is dominated by recalculation of node verification value from inserted (deleted) node to root, which is linear to the search ath. Since ADSSL can be maintained efficiently, it can authenticate data freshness efficiently. D. Cost Analysis Since authentication cost is involved in three hases, we will discuss them resectively. In each hase, authentication cost includes three arts: sace cost, time cost and network cost. Costs of MHT are resented for comarison. TABLE I. NOTATIONS AND DESCRIPTION Symbol Descrition Default Value C h Time of hash 0 μs C s Time of signature 9.53 ms C v Time of verification 0. ms s Size of signature bytes h Size of hash bytes k Size of search key bytes ointer Size of ointer bytes nmht Size of MHT node bytes nsl Size of ski list node bytes N Cardinality of table 0 P Probability of ski list Max level of ski list LogN Cx Construction time of x Sx Sace cost of x Vx Verification time of x VOx VO size of x Mx Maintenance cost of x In initial hase, ADS is construc ted and delivered to the service rovider. Since the root node can be signed only by the client, the client must construct the whole authentication tree locally. Fortunately, the client needn t shift authentication tree to the service rovider. Instead, it can be reconstructed at the service rovider. Thus a large amount of network cost is saved and the only additional network cost is one signature. So in initial hase, cost focuses on two asects: construction time and sace time. Secifically, construction time is dominated by hash comutation. Symbols used in this aer are summarized in table I. Formally, initial costs of MHT and ADSSL are calculated as follows: C s C MHT = (N-)* C h + C ADSSL = N* C h + C s S MHT = (N-)* n MHT + sign S ADSSL = N*( n SL +/(-))+ sign Obviously, the number of hash in ADSSL construction is about half of MHT. Although the sace cost of ADSSL varies with robability, it s always much less than that of MHT. The calculation of SADSSL is as follows: i i N*( )*( n SL + ointer *i) - l * *(- ) max =N*( n SL * *( )* ) * N*( n SL ) ( 0) In query hase, authentication cost is dominated by the number of hash to recomute root hash. Secifically, verification cost and VO size are calculated as follows: V MHT = N* C h + C v V N *( ) C ADSSL C h v VO MHT = N* h + sign *( VO ADSSL = N N / ) * ( ) h sign Assume result set has one value. Extension to result set with more values is straightforward. As for MHT, the height of tree is N. So do the number of hash and VO. The analysis of ADSSL is much more comlex. For juming robability, the height of ADSSL is N. On average, for nodes with the same level, only one of them jums higher. Besides, the robability of any node juming higher is the same. So the average search ath at level is i*. The number i of VO with k level node is (k-). So the total number of VO is N i. i0 Comared with MHT, ADSSL has higher verification cost, esecially in VO size. The detailed comarison is lotted in Figure. Since VO will influence network erformance negatively, we roose an imroved version, denoted as BADSSL, which is resented in Figure 3(d). Obviously, each node with k child ointers in ADSSL is divided into k nodes with one child ointer. Consequently, The number of VO with k level node decreases from (k-) to. The initial and verification of BADSSL is as follows: 73

6 N C BADSSL = Ch Cs N nsl S BADSSL = sign V BADSSL = N *( ) C h C VO N *( ) BADSSL h sign In maintenance hase, MHT is static an d maintenance cost is almost equal to rebuilding cost. While maintenance cost of ADSSL and BADSSL is dominated by search ath. Formal analysis is as follows: M MHT = (N-)*h()+sign() N *( ) M A DS SL = ( )Ch C *( ) M BADSSL = ( N )Ch Cv Here we assume before insertion, th e level of current ADSSL is equal with max level. If the level of inserted element is larger than current max level, maintenance cost will increase a little. IV. EXPERIMENTAL E VALUATION v v cost. In Figure (b), VO size of ADSSL is much larger than two others, which confirms BADSSL is VO size efficient. A. Exerimental Setu We carried out exeriments on Microsoft Windows XP with a.7ghz Intel rocessor and 5M RAM. Crytograhic signature and hash were erformed using the standard Java imlementation of RSA and MD5 algorithm. Our ADSSL and BADSSL are imlemented in JAVA/JRE. develoment kit and Runtime Library. B. Results Analysis We comare initial construction cost, query authentication cost and maintenance cost of three ADSs: MHT, ADSSL and BADSSL. Three sets of exeriments were erformed in total. In the first set of exeriments, we study the sace and time cost of initial construction. The results are illustrated in Figure 7. Both sace cost and time cost of our aroaches are less than those of MHT. Besides, MHT is indeendent of robability, while our two aroaches negatively deend on. Although sace and time cost of ADSSL are always less than those of BADSSL, with the increasing of, the difference decreases quickly. Secifically, when reaches 3, the costs of them are similar. In the second set of exeriments, we study query authentication cost and VO size. The results are illustrated in Figure (a) and (b). In Figure (a), verification cost of our aroaches is always larger than that of MHT. However, for an aroriate, such as, the difference between them is very little. So the selection of is critical in deciding verification Figure 7. Initial construction cost of three ADSs 7

7 Figure. Query authentication cost and VO size comarison The third set of exeriments is to comare maintenance cost of three aroaches. The results are illustrated in Figure 9. Since maintenance cost of MHT is almost equal to that of rebuilding, it s much larger than the others and omitted here. For ADSSL and BADSSL, maintenance costs are the same and little larger than that of verification time. In conclusion, BADSSL is comrehensively efficient in construction cost, query authentication cost and maintenance cost. query distribution is non-uniform, or even skewed, how to adat our authentication structure dynamically is one interesting and useful research toic. REFERENCES [] H. Hacigumus, B. Iyer and S. Mehrotra, Providing database as a service, in Proc. of th ICDE, San Jose, CA, USA, February 00. [] F. Li, M. Hadjieleftheriou, G. Kollios, L. Reyzin, Dynamic authenticated index structures for outsourced databases. SIGMOD, 00. [3] H. Pang, KL.Tan Authenticating query results in edge comuting. In Proc. of International C onference on Data Engineering (ICDE), ages 50-57, 00. [] W. Pugh. Ski lists: a robabilistic alternative to balanced trees. Commun. ACM, 33(): 7, 990. [5] MT. Goodrich, R. Tamassia. Efficient authenticated dictionaries with ski lists and commutative hashing. Technical reort, Johns Hokins Information Security Institute, 000. [] E. Mykletun, M. Narasimha, G. Tsudik. Authentication and Integrity in Outsourced Databases. In Network and Distributed Systems Security, 00. [7] M. Narasimha, G. Tsudik. DSAC: Integrity of Outsourced Databases with Signature Aggregation and Chaining. In Proc. of Conference on Information and Knowledge Management (CIKM), ages 35-5, 005. [] H. Pang, A. Jain, K. Ramamritham, KL Tan. Verifying comleteness of relational query results in data ublishing. In SIGMOD Conference, ages 07. ACM, 005. Figure 9. Maintenance time cost [9] E. Mykletun, M. Narasimha, G. Tsudik. Signature bouquets: Immutability for aggregated/condensed signatures. In Euroean V. CONCLUSIONS AND FUTURE WORK Symosium on Research in Comuter Security (ESORICS), ages 0-7, 00. In this aer, we roosed a dynamic main memory [0] C. Martel, G. Nuckolls, P. Devanbu, M. Gertz, A. Kwong, SG. Stubblebine. A general model for authenticated data structures. authentication data structure: ADSSL, which is not only sace Technical reort, CSE-00-9 UC Davis Deartment of Comuter comact, but also efficient in query authentication cost and Science December 00. maintenance cost. To decrease query VO size of ADSSL, we [] R. Sion. Query execution assurance for outsourced databases. In roose an imroved version: BADSSL, which suorts a VLDB, ages 0. ACM, 005. flexible trade-off between query verification cost and [] P. Devanbu, M. Gertz, C. Martel, SG. Stubblebine. Authentic thirdconstruction cost. arty data ublication. In IFIP Worksho on Database Security, ages 0-, 000. For now, ADSSL only suorts authentication of range [3] M. Xie, HJ Wang, J. Yin, XM Meng. Integrity auditing of outsourced queries. How to suort more tyes of queries, such as data. In Proceedings of the 33rd international conference on VLDB aggregate query, join queries is one of our future work. 007, Pages Moreover, here we assume the workload is uniform. When 75

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions

More information

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China

More information

Efficient Parallel Hierarchical Clustering

Efficient Parallel Hierarchical Clustering Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

An Indexing Framework for Structured P2P Systems

An Indexing Framework for Structured P2P Systems An Indexing Framework for Structured P2P Systems Adina Crainiceanu Prakash Linga Ashwin Machanavajjhala Johannes Gehrke Carl Lagoze Jayavel Shanmugasundaram Deartment of Comuter Science, Cornell University

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information

Record Route IP Traceback: Combating DoS Attacks and the Variants

Record Route IP Traceback: Combating DoS Attacks and the Variants Record Route IP Traceback: Combating DoS Attacks and the Variants Abdullah Yasin Nur, Mehmet Engin Tozal University of Louisiana at Lafayette, Lafayette, LA, US ayasinnur@louisiana.edu, metozal@louisiana.edu

More information

Lecture 8: Orthogonal Range Searching

Lecture 8: Orthogonal Range Searching CPS234 Comutational Geometry Setember 22nd, 2005 Lecture 8: Orthogonal Range Searching Lecturer: Pankaj K. Agarwal Scribe: Mason F. Matthews 8.1 Range Searching The general roblem of range searching is

More information

An Efficient Video Program Delivery algorithm in Tree Networks*

An Efficient Video Program Delivery algorithm in Tree Networks* 3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,

More information

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture

More information

Privacy Preserving Moving KNN Queries

Privacy Preserving Moving KNN Queries Privacy Preserving Moving KNN Queries arxiv:4.76v [cs.db] 4 Ar Tanzima Hashem Lars Kulik Rui Zhang National ICT Australia, Deartment of Comuter Science and Software Engineering University of Melbourne,

More information

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal

More information

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu

More information

Equality-Based Translation Validator for LLVM

Equality-Based Translation Validator for LLVM Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented

More information

search(i): Returns an element in the data structure associated with key i

search(i): Returns an element in the data structure associated with key i CS161 Lecture 7 inary Search Trees Scribes: Ilan Goodman, Vishnu Sundaresan (2015), Date: October 17, 2017 Virginia Williams (2016), and Wilbur Yang (2016), G. Valiant Adated From Virginia Williams lecture

More information

Implementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching

Implementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching Imlementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching Ju Hui Li, eng Hiot Lim and Qi Cao School of EEE, Block S Nanyang Technological University Singaore 639798

More information

10. Parallel Methods for Data Sorting

10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting... 1 10.1. Parallelizing Princiles... 10.. Scaling Parallel Comutations... 10.3. Bubble Sort...3 10.3.1. Sequential Algorithm...3

More information

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution Texture Maing with Vector Grahics: A Nested Mimaing Solution Wei Zhang Yonggao Yang Song Xing Det. of Comuter Science Det. of Comuter Science Det. of Information Systems Prairie View A&M University Prairie

More information

Single character type identification

Single character type identification Single character tye identification Yefeng Zheng*, Changsong Liu, Xiaoqing Ding Deartment of Electronic Engineering, Tsinghua University Beijing 100084, P.R. China ABSTRACT Different character recognition

More information

Directed File Transfer Scheduling

Directed File Transfer Scheduling Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1 Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and

More information

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,

More information

Range Searching. Data structure for a set of objects (points, rectangles, polygons) for efficient range queries.

Range Searching. Data structure for a set of objects (points, rectangles, polygons) for efficient range queries. Range Searching Data structure for a set of objects (oints, rectangles, olygons) for efficient range queries. Y Q Deends on tye of objects and queries. Consider basic data structures with broad alicability.

More information

Introduction to Parallel Algorithms

Introduction to Parallel Algorithms CS 1762 Fall, 2011 1 Introduction to Parallel Algorithms Introduction to Parallel Algorithms ECE 1762 Algorithms and Data Structures Fall Semester, 2011 1 Preliminaries Since the early 1990s, there has

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Distrib. Comut. 71 (2011) 288 301 Contents lists available at ScienceDirect J. Parallel Distrib. Comut. journal homeage: www.elsevier.com/locate/jdc Quality of security adatation in arallel

More information

Interactive Image Segmentation

Interactive Image Segmentation Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).

More information

Lecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model.

Lecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model. U.C. Berkeley CS273: Parallel and Distributed Theory Lecture 18 Professor Satish Rao Lecturer: Satish Rao Last revised Scribe so far: Satish Rao (following revious lecture notes quite closely. Lecture

More information

SPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation

SPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation To aear in IEEE VLSI Test Symosium, 1997 SITFIRE: Scalable arallel Algorithms for Test Set artitioned Fault Simulation Dili Krishnaswamy y Elizabeth M. Rudnick y Janak H. atel y rithviraj Banerjee z y

More information

A GPU Heterogeneous Cluster Scheduling Model for Preventing Temperature Heat Island

A GPU Heterogeneous Cluster Scheduling Model for Preventing Temperature Heat Island A GPU Heterogeneous Cluster Scheduling Model for Preventing Temerature Heat Island Yun-Peng CAO 1,2,a and Hai-Feng WANG 1,2 1 School of Information Science and Engineering, Linyi University, Linyi Shandong,

More information

Signature File Hierarchies and Signature Graphs: a New Index Method for Object-Oriented Databases

Signature File Hierarchies and Signature Graphs: a New Index Method for Object-Oriented Databases Signature File Hierarchies and Signature Grahs: a New Index Method for Object-Oriented Databases Yangjun Chen* and Yibin Chen Det. of Business Comuting University of Winnieg, Manitoba, Canada R3B 2E9 ABSTRACT

More information

A Novel Iris Segmentation Method for Hand-Held Capture Device

A Novel Iris Segmentation Method for Hand-Held Capture Device A Novel Iris Segmentation Method for Hand-Held Cature Device XiaoFu He and PengFei Shi Institute of Image Processing and Pattern Recognition, Shanghai Jiao Tong University, Shanghai 200030, China {xfhe,

More information

A Model-Adaptable MOSFET Parameter Extraction System

A Model-Adaptable MOSFET Parameter Extraction System A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313

More information

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Journal of Comuting and Information Technology - CIT 8, 2000, 1, 1 12 1 Comlexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Eunice E. Santos Deartment of Electrical

More information

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,

More information

level 0 level 1 level 2 level 3

level 0 level 1 level 2 level 3 Communication-Ecient Deterministic Parallel Algorithms for Planar Point Location and 2d Voronoi Diagram? Mohamadou Diallo 1, Afonso Ferreira 2 and Andrew Rau-Chalin 3 1 LIMOS, IFMA, Camus des C zeaux,

More information

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Weimin Chen, Volker Turau TR-93-047 August, 1993 Abstract This aer introduces a new technique for source-to-source code

More information

A Petri net-based Approach to QoS-aware Configuration for Web Services

A Petri net-based Approach to QoS-aware Configuration for Web Services A Petri net-based Aroach to QoS-aware Configuration for Web s PengCheng Xiong, YuShun Fan and MengChu Zhou, Fellow, IEEE Abstract With the develoment of enterrise-wide and cross-enterrise alication integration

More information

To appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree

To appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree To aear in IEEE TKDE Title: Efficient Skyline and To-k Retrieval in Subsaces Keywords: Skyline, To-k, Subsace, B-tree Contact Author: Yufei Tao (taoyf@cse.cuhk.edu.hk) Deartment of Comuter Science and

More information

An improved algorithm for Hausdorff Voronoi diagram for non-crossing sets

An improved algorithm for Hausdorff Voronoi diagram for non-crossing sets An imroved algorithm for Hausdorff Voronoi diagram for non-crossing sets Frank Dehne, Anil Maheshwari and Ryan Taylor May 26, 2006 Abstract We resent an imroved algorithm for building a Hausdorff Voronoi

More information

Cross products. p 2 p. p p1 p2. p 1. Line segments The convex combination of two distinct points p1 ( x1, such that for some real number with 0 1,

Cross products. p 2 p. p p1 p2. p 1. Line segments The convex combination of two distinct points p1 ( x1, such that for some real number with 0 1, CHAPTER 33 Comutational Geometry Is the branch of comuter science that studies algorithms for solving geometric roblems. Has alications in many fields, including comuter grahics robotics, VLSI design comuter

More information

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism Erlin Yao, Mingyu Chen, Rui Wang, Wenli Zhang, Guangming Tan Key Laboratory of Comuter System and Architecture Institute

More information

Brigham Young University Oregon State University. Abstract. In this paper we present a new parallel sorting algorithm which maximizes the overlap

Brigham Young University Oregon State University. Abstract. In this paper we present a new parallel sorting algorithm which maximizes the overlap Aeared in \Journal of Parallel and Distributed Comuting, July 1995 " Overlaing Comutations, Communications and I/O in Parallel Sorting y Mark J. Clement Michael J. Quinn Comuter Science Deartment Deartment

More information

A Study of Protocols for Low-Latency Video Transport over the Internet

A Study of Protocols for Low-Latency Video Transport over the Internet A Study of Protocols for Low-Latency Video Transort over the Internet Ciro A. Noronha, Ph.D. Cobalt Digital Santa Clara, CA ciro.noronha@cobaltdigital.com Juliana W. Noronha University of California, Davis

More information

Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects

Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScrit Objects Shiyi Wei and Barbara G. Ryder Deartment of Comuter Science, Virginia Tech, Blacksburg, VA, USA. {wei,ryder}@cs.vt.edu

More information

Extracting Optimal Paths from Roadmaps for Motion Planning

Extracting Optimal Paths from Roadmaps for Motion Planning Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu

More information

A Symmetric FHE Scheme Based on Linear Algebra

A Symmetric FHE Scheme Based on Linear Algebra A Symmetric FHE Scheme Based on Linear Algebra Iti Sharma University College of Engineering, Comuter Science Deartment. itisharma.uce@gmail.com Abstract FHE is considered to be Holy Grail of cloud comuting.

More information

A Metaheuristic Scheduler for Time Division Multiplexed Network-on-Chip

A Metaheuristic Scheduler for Time Division Multiplexed Network-on-Chip Downloaded from orbit.dtu.dk on: Jan 25, 2019 A Metaheuristic Scheduler for Time Division Multilexed Network-on-Chi Sørensen, Rasmus Bo; Sarsø, Jens; Pedersen, Mark Ruvald; Højgaard, Jasur Publication

More information

split split (a) (b) split split (c) (d)

split split (a) (b) split split (c) (d) International Journal of Foundations of Comuter Science c World Scientic Publishing Comany ON COST-OPTIMAL MERGE OF TWO INTRANSITIVE SORTED SEQUENCES JIE WU Deartment of Comuter Science and Engineering

More information

AN EFFECTIVE SPATIAL QUERY INTEGRITY USING MERKLE HASH TREE

AN EFFECTIVE SPATIAL QUERY INTEGRITY USING MERKLE HASH TREE IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 6, Jun 2014, 9-16 Impact Journals AN EFFECTIVE SPATIAL QUERY INTEGRITY

More information

Distributed Estimation from Relative Measurements in Sensor Networks

Distributed Estimation from Relative Measurements in Sensor Networks Distributed Estimation from Relative Measurements in Sensor Networks #Prabir Barooah and João P. Hesanha Abstract We consider the roblem of estimating vectorvalued variables from noisy relative measurements.

More information

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University.

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University. Relations with Relation Names as Arguments: Algebra and Calculus Kenneth A. Ross Columbia University kar@cs.columbia.edu Abstract We consider a version of the relational model in which relation names may

More information

Autonomic Physical Database Design - From Indexing to Multidimensional Clustering

Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Stehan Baumann, Kai-Uwe Sattler Databases and Information Systems Grou Technische Universität Ilmenau, Ilmenau, Germany

More information

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces Wavelet Based Statistical Adated Local Binary atterns for Recognizing Avatar Faces Abdallah A. Mohamed 1, 2 and Roman V. Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville,

More information

Figure 8.1: Home age taken from the examle health education site (htt:// Setember 14, 2001). 201

Figure 8.1: Home age taken from the examle health education site (htt://  Setember 14, 2001). 201 200 Chater 8 Alying the Web Interface Profiles: Examle Web Site Assessment 8.1 Introduction This chater describes the use of the rofiles develoed in Chater 6 to assess and imrove the quality of an examle

More information

Hardware-Accelerated Formal Verification

Hardware-Accelerated Formal Verification Hardare-Accelerated Formal Verification Hiroaki Yoshida, Satoshi Morishita 3 Masahiro Fujita,. VLSI Design and Education Center (VDEC), University of Tokyo. CREST, Jaan Science and Technology Agency 3.

More information

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment

More information

The Priority R-Tree: A Practically Efficient and Worst-Case Optimal R-Tree

The Priority R-Tree: A Practically Efficient and Worst-Case Optimal R-Tree The Priority R-Tree: A Practically Efficient and Worst-Case Otimal R-Tree Lars Arge Deartment of Comuter Science Duke University, ox 90129 Durham, NC 27708-0129 USA large@cs.duke.edu Mark de erg Deartment

More information

Pivot Selection for Dimension Reduction Using Annealing by Increasing Resampling *

Pivot Selection for Dimension Reduction Using Annealing by Increasing Resampling * ivot Selection for Dimension Reduction Using Annealing by Increasing Resamling * Yasunobu Imamura 1, Naoya Higuchi 1, Tetsuji Kuboyama 2, Kouichi Hirata 1 and Takeshi Shinohara 1 1 Kyushu Institute of

More information

1.5 Case Study. dynamic connectivity quick find quick union improvements applications

1.5 Case Study. dynamic connectivity quick find quick union improvements applications . Case Study dynamic connectivity quick find quick union imrovements alications Subtext of today s lecture (and this course) Stes to develoing a usable algorithm. Model the roblem. Find an algorithm to

More information

Experiments on Patent Retrieval at NTCIR-4 Workshop

Experiments on Patent Retrieval at NTCIR-4 Workshop Working Notes of NTCIR-4, Tokyo, 2-4 June 2004 Exeriments on Patent Retrieval at NTCIR-4 Worksho Hironori Takeuchi Λ Naohiko Uramoto Λy Koichi Takeda Λ Λ Tokyo Research Laboratory, IBM Research y National

More information

Toward Optimal Network Fault Correction via End-to-End Inference

Toward Optimal Network Fault Correction via End-to-End Inference Toward Otimal Network Fault Correction via End-to-End Inference Patrick P. C. Lee, Vishal Misra, and Dan Rubenstein Abstract We consider an end-to-end aroach of inferring network faults that manifest in

More information

The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing

The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing Mikael Taveniku 2,3, Anders Åhlander 1,3, Magnus Jonsson 1 and Bertil Svensson 1,2

More information

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model Ad Hoc Networks (4) 5 68 Contents lists available at SciVerse ScienceDirect Ad Hoc Networks journal homeage: www.elsevier.com/locate/adhoc Latency-minimizing data aggregation in wireless sensor networks

More information

Submission. Verifying Properties Using Sequential ATPG

Submission. Verifying Properties Using Sequential ATPG Verifying Proerties Using Sequential ATPG Jacob A. Abraham and Vivekananda M. Vedula Comuter Engineering Research Center The University of Texas at Austin Austin, TX 78712 jaa, vivek @cerc.utexas.edu Daniel

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links

More information

Improved Image Super-Resolution by Support Vector Regression

Improved Image Super-Resolution by Support Vector Regression Proceedings of International Joint Conference on Neural Networks, San Jose, California, USA, July 3 August 5, 0 Imroved Image Suer-Resolution by Suort Vector Regression Le An and Bir Bhanu Abstract Suort

More information

Integrity Verification of Outsourced XML Databases

Integrity Verification of Outsourced XML Databases 1 Integrity Verification of Outsourced XML atabases Ruilin Liu, Hui (Wendy) Wang epartment of Computer Science, Stevens Institute of Technology Hoboken, NJ, 07030 {rliu3, hwang}@cs.stevens.edu Abstract

More information

A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems

A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems Cheng-Yuan Chang and I-Lun Tseng Deartment of Comuter Science and Engineering Yuan Ze University,

More information

CASCH - a Scheduling Algorithm for "High Level"-Synthesis

CASCH - a Scheduling Algorithm for High Level-Synthesis CASCH a Scheduling Algorithm for "High Level"Synthesis P. Gutberlet H. Krämer W. Rosenstiel Comuter Science Research Center at the University of Karlsruhe (FZI) HaidundNeuStr. 1014, 7500 Karlsruhe, F.R.G.

More information

Lecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.)

Lecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.) Advanced Algorithms Fall 2015 Lecture 3: Geometric Algorithms(Convex sets, Divide & Conuer Algo.) Faculty: K.R. Chowdhary : Professor of CS Disclaimer: These notes have not been subjected to the usual

More information

Efficient Sequence Generator Mining and its Application in Classification

Efficient Sequence Generator Mining and its Application in Classification Efficient Sequence Generator Mining and its Alication in Classification Chuancong Gao, Jianyong Wang 2, Yukai He 3 and Lizhu Zhou 4 Tsinghua University, Beijing 0084, China {gaocc07, heyk05 3 }@mails.tsinghua.edu.cn,

More information

Semi-Supervised Learning Based Object Detection in Aerial Imagery

Semi-Supervised Learning Based Object Detection in Aerial Imagery Semi-Suervised Learning Based Obect Detection in Aerial Imagery Jian Yao Zhongfei (Mark) Zhang Deartment of Comuter Science, State University of ew York at Binghamton, Y 13905, USA yao@binghamton.edu Zhongfei@cs.binghamton.edu

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

Mining Association rules with Dynamic and Collective Support Thresholds

Mining Association rules with Dynamic and Collective Support Thresholds Mining Association rules with Dynamic and Collective Suort Thresholds C S Kanimozhi Selvi and A Tamilarasi Abstract Mining association rules is an imortant task in data mining. It discovers the hidden,

More information

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method ITB J. Eng. Sci. Vol. 39 B, No. 1, 007, 1-19 1 Leak Detection Modeling and Simulation for Oil Pieline with Artificial Intelligence Method Pudjo Sukarno 1, Kuntjoro Adji Sidarto, Amoranto Trisnobudi 3,

More information

Collective communication: theory, practice, and experience

Collective communication: theory, practice, and experience CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Comutat.: Pract. Exer. 2007; 19:1749 1783 Published online 5 July 2007 in Wiley InterScience (www.interscience.wiley.com)..1206 Collective

More information

Face Recognition Using Legendre Moments

Face Recognition Using Legendre Moments Face Recognition Using Legendre Moments Dr.S.Annadurai 1 A.Saradha Professor & Head of CSE & IT Research scholar in CSE Government College of Technology, Government College of Technology, Coimbatore, Tamilnadu,

More information

EE678 Application Presentation Content Based Image Retrieval Using Wavelets

EE678 Application Presentation Content Based Image Retrieval Using Wavelets EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective

More information

Learning Robust Locality Preserving Projection via p-order Minimization

Learning Robust Locality Preserving Projection via p-order Minimization Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence Learning Robust Locality Preserving Projection via -Order Minimization Hua Wang, Feiing Nie, Heng Huang Deartment of Electrical

More information

Near-Optimal Routing Lookups with Bounded Worst Case Performance

Near-Optimal Routing Lookups with Bounded Worst Case Performance Near-Otimal Routing Lookus with Bounded Worst Case Performance Pankaj Guta Balaji Prabhakar Stehen Boyd Deartments of Electrical Engineering and Comuter Science Stanford University CA 9430 ankaj@stanfordedu

More information

A Scalable Parallel Approach for Peptide Identification from Large-scale Mass Spectrometry Data

A Scalable Parallel Approach for Peptide Identification from Large-scale Mass Spectrometry Data 2009 International Conference on Parallel Processing Workshos A Scalable Parallel Aroach for Petide Identification from Large-scale Mass Sectrometry Data Gaurav Kulkarni, Ananth Kalyanaraman School of

More information

Cross products Line segments The convex combination of two distinct points p

Cross products Line segments The convex combination of two distinct points p CHAPTER Comutational Geometry Is the branch of comuter science that studies algorithms for solving geometric roblems. Has alications in many fields, including comuter grahics robotics, VLSI design comuter

More information

MULTIPLE SENSOR TRACKING IN A SENSE & AVOID CONTEXT

MULTIPLE SENSOR TRACKING IN A SENSE & AVOID CONTEXT 7 TH INTERNATIONAL CONGRESS OF THE AERONAUTICAL SCIENCES MULTILE SENSOR TRACKING IN A SENSE & AVOID CONTET M. Rousseau*, L. Ratton*, T. Fournet* *THALES, Defense Mission System Elancourt Keywords: Sense&Avoid,

More information

AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY

AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY Yandong Wang EagleView Technology Cor. 5 Methodist Hill Dr., Rochester, NY 1463, the United States yandong.wang@ictometry.com

More information

Experimental Comparison of Shortest Path Approaches for Timetable Information

Experimental Comparison of Shortest Path Approaches for Timetable Information Exerimental Comarison of Shortest Path roaches for Timetable Information Evangelia Pyrga Frank Schulz Dorothea Wagner Christos Zaroliagis bstract We consider two aroaches that model timetable information

More information

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics structure arises in many alications of geometry. The dual structure, called a Delaunay triangulation also has many interesting roerties. Figure 3: Voronoi diagram and Delaunay triangulation. Search: Geometric

More information

12) United States Patent 10) Patent No.: US 6,321,328 B1

12) United States Patent 10) Patent No.: US 6,321,328 B1 USOO6321328B1 12) United States Patent 10) Patent No.: 9 9 Kar et al. (45) Date of Patent: Nov. 20, 2001 (54) PROCESSOR HAVING DATA FOR 5,961,615 10/1999 Zaid... 710/54 SPECULATIVE LOADS 6,006,317 * 12/1999

More information

The Spatial Skyline Queries

The Spatial Skyline Queries The Satial Skyline Queries Mehdi Sharifzadeh Comuter Science Deartment University of Southern California Los Angeles, CA 90089-078 sharifza@usc.edu Cyrus Shahabi Comuter Science Deartment University of

More information

Parallel Construction of Multidimensional Binary Search Trees. Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka

Parallel Construction of Multidimensional Binary Search Trees. Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka Parallel Construction of Multidimensional Binary Search Trees Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka School of CIS and School of CISE Northeast Parallel Architectures Center Syracuse

More information

Process and Measurement System Capability Analysis

Process and Measurement System Capability Analysis Process and Measurement System aability Analysis Process caability is the uniformity of the rocess. Variability is a measure of the uniformity of outut. Assume that a rocess involves a quality characteristic

More information

We will then introduce the DT, discuss some of its fundamental properties and show how to compute a DT directly from a given set of points.

We will then introduce the DT, discuss some of its fundamental properties and show how to compute a DT directly from a given set of points. Voronoi Diagram and Delaunay Triangulation 1 Introduction The Voronoi Diagram (VD, for short) is a ubiquitious structure that aears in a variety of discilines - biology, geograhy, ecology, crystallograhy,

More information

Collective Communication: Theory, Practice, and Experience. FLAME Working Note #22

Collective Communication: Theory, Practice, and Experience. FLAME Working Note #22 Collective Communication: Theory, Practice, and Exerience FLAME Working Note # Ernie Chan Marcel Heimlich Avi Purkayastha Robert van de Geijn Setember, 6 Abstract We discuss the design and high-erformance

More information

Parametric Optimization in WEDM of WC-Co Composite by Neuro-Genetic Technique

Parametric Optimization in WEDM of WC-Co Composite by Neuro-Genetic Technique Parametric Otimization in WEDM of WC-Co Comosite by Neuro-Genetic Technique P. Saha*, P. Saha, and S. K. Pal Abstract The resent work does a multi-objective otimization in wire electro-discharge machining

More information

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION Yugoslav Journal of Oerations Research (00), umber, 5- A BICRITERIO STEIER TREE PROBLEM O GRAPH Mirko VUJO[EVI], Milan STAOJEVI] Laboratory for Oerational Research, Faculty of Organizational Sciences University

More information

Stereo Disparity Estimation in Moment Space

Stereo Disparity Estimation in Moment Space Stereo Disarity Estimation in oment Sace Angeline Pang Faculty of Information Technology, ultimedia University, 63 Cyberjaya, alaysia. angeline.ang@mmu.edu.my R. ukundan Deartment of Comuter Science, University

More information

arxiv: v1 [cs.mm] 18 Jan 2016

arxiv: v1 [cs.mm] 18 Jan 2016 Lossless Intra Coding in with 3-ta Filters Saeed R. Alvar a, Fatih Kamisli a a Deartment of Electrical and Electronics Engineering, Middle East Technical University, Turkey arxiv:1601.04473v1 [cs.mm] 18

More information

Decoding-Workload-Aware Video Encoding

Decoding-Workload-Aware Video Encoding Decoding-Workload-Aware Video Encoding Yicheng Huang, Guangming Hong, Vu An Tran and Ye Wang Deartment of Comuter Science ational University of Singaore Law Link, Singaore 117590 Reulic of Singaore {huangyic,

More information

CS649 Sensor Networks IP Track Lecture 6: Graphical Models

CS649 Sensor Networks IP Track Lecture 6: Graphical Models CS649 Sensor Networks IP Track Lecture 6: Grahical Models I-Jeng Wang htt://hinrg.cs.jhu.edu/wsn06/ Sring 2006 CS 649 1 Sring 2006 CS 649 2 Grahical Models Grahical Model: grahical reresentation of joint

More information