Design Implications for Enterprise Storage Systems via Multi-Dimensional Trace Analysis

Size: px
Start display at page:

Download "Design Implications for Enterprise Storage Systems via Multi-Dimensional Trace Analysis"

Transcription

1 Design Impliations for Enterprise Storage Systems via Multi-Dimensional Trae Analysis Yanpei Chen, Kiran Srinivasan, Garth Goodson, Randy Katz University of California, Berkeley, NetApp In. {yhen2, {skiran, ABSTRACT Enterprise storage systems are faing enormous hallenges due to inreasing growth and heterogeneity of the data stored. Designing future storage systems requires omprehensive insights that existing trae analysis methods are ill-equipped to supply. In this paper, we seek to provide suh insights by using a new methodology that leverages an objetive, multi-dimensional statistial tehnique to extrat data aess patterns from network storage system traes. We apply our method on two large-sale real-world prodution network storage system traes to obtain omprehensive aess patterns and design insights at user, appliation, file, and diretory levels. We derive simple, easily implementable, threshold-based design optimizations that enable effiient data plaement and apaity optimization strategies for servers, onsolidation poliies for lients, and improved ahing performane for both. Categories and Subjet Desriptors C.4 [Performane of Systems]: Measurement tehniques; D.4.3 [Operating Systems]: File Systems Management Distributed file systems 1. INTRODUCTION Enterprise storage systems are designed around a set of data aess patterns. The storage system an be speialized by designing to a speifi data aess pattern; e.g., a storage system for streaming video supports different aess patterns than a ument repository. The better the aess pattern is understood, the better the storage system design. Insights into aess patterns have been derived from the analysis of existing file system workloads, typially through trae analysis studies [1, 3, 17, 19, 24]. While this is the orret general strategy for improving storage system design, past approahes have ritial shortomings, espeially given reent hanges in tehnology trends. In this paper, we present a new design methodology to overome these shortomings. Permission to make digital or hard opies of all or part of this work for personal or lassroom use is granted without fee provided that opies are not made or distributed for profit or ommerial advantage and that opies bear this notie and the full itation on the first page. To opy otherwise, to republish, to post on servers or to redistribute to lists, requires prior speifi permission and/or a fee. SOSP '11, Otober 23-26, 211, Casais, Portugal. Copyright 211 ACM /11/1... $1.. The data stored on enterprise network-attahed storage systems is undergoing hanges due to a fundamental shift in the underlying tehnology trends. We have observed three suh trends, inluding: Sale: Data size grows at an alarming rate [12], due to new types of soial, business and sientifi appliations [2], and the desire to never delete data. Heterogeneity: The mix of data types stored on these storage systems is beoming inreasingly omplex, eah having its own requirements and aess patterns [22]. Consolidation: Virtualization has enabled the onsolidation of multiple appliations and their data onto fewer storage servers [6, 23]. These virtual mahines (VMs) also present aggregate data aess patterns more omplex than those from individual lients. Better design of future storage systems requires insights into the hanging aess patterns due to these trends. While trae studies have been used to derive data aess patterns, we believe that they have the following shortomings: Unidimensional: Although existing methods analyze many aess harateristis, they do so one at a time, without revealing ross-harateristi dependenies. Expertise bias: Past analyses were performed by storage system designers looking for speifi patterns based on prior workload expetations. This introdues a bias that needs to be revisited based on the new tehnology trends. Storage server entri: Past file system studies foused primarily on storage servers. This reates a ritial knowledge gap regarding lient behavior. To overome these shortomings, we propose a new design methodology baked by the analysis of storage system traes. We present a method that simultaneously analyzes multiple harateristis and their ross dependenies. We use a multi-dimensional, statistial orrelation tehnique, alled k-means [2], that is ompletely agnosti to the harateristis of eah aess pattern and their dependenies. The K-means algorithm an analyze hundreds of dimensions simultaneously, providing added objetivity to our analysis. To further redue expertise bias, we involve as many relevant harateristis as possible for eah aess pattern. In addition, we analyze patterns at different granularities (e.g., at the user session, appliation, file level) on the storage server as well as the lient, thus addressing the need for understanding lient patterns. The resulting design insights enable poliies for building new storage systems. 43

2 Client side observations and design impliations 1. Client sessions with IO sizes >128KB are read only or write only. Clients an onsolidate sessions based on only the read-write ratio. 2. Client sessions with duration >8 hoursdo 1MB of IO. Client ahes an already fit an entire day s IO. 3. Number of lient sessions drops off linearly by 2% from Monday to Friday. Servers an get an extra day for bakground tasks by running at appropriate times during week days. 4. Appliations with <4KB of IO per file open and many opensofafewfilesdoonlyrandomio. Clients should always ahe the first few KB of IO per file per appliation. 5. Appliations with >5% sequential read or write aess entire files at a time. Clients an request file prefeth (read) or delegation (write) based on only the IO sequentiality. 6. Engineering appliations with >5% sequential read and sequential write are doing ode ompile tasks, based on file extensions. Servers an identify ompile tasks; server has to ahe the output of these tasks. Server side observations and design impliations 7. Files with >7% sequential read or write have no repeated reads or overwrites. Servers should delegate sequentially aessed files to lients to improve IO performane. 8. Engineering files with repeated reads have random aesses. Servers should delegate repeatedly read files to lients; lients need to store them in flash or memory. 9. All files are ative (have opens, IO, and metadata aess) for only 1-2 hours in a few months. Servers an use file idle time to ompress or dedupliate to inrease storage apaity. 1. All files have either all random aess or >7% sequential aess. (Seen in past studies too) Servers an selet the best storage medium for eah file based on only aess sequentiality. 11. Diretories with sequentially aessed files almost always ontain randomly aessed files as well. Servers an hange from per-diretory plaement poliy (default) to per-file poliy upon seeing any sequential IO to any files in a diretory. 12. Some diretories aggregate only files with repeated reads and overwrites. Servers an delegate these diretories entirely to lients, tradeoffs permitting. Table 1: Summary of design insights, separated into insights derived from lient aess patterns and server aess patterns. We analyze two reent, network-attahed storage file system traes from a prodution enterprise dataenter. Table 1 summarizes our key observations and design impliations, they will be detailed later in the paper. Our methodology leads to observations that would be diffiult to extrat using past methods. We illustrate two suh aess patterns, one showing the value of multi-granular analysis (Observation 1 in Table 1) and another showing the value of multi-feature analysis (Observation 8). First, we observe (Observation 1) that sessions with more than 128KB of data reads or writes are either read-only or write-only. This observation affets shared ahing and onsolidation poliies aross sessions. Speifially, lient OSs an detet and o-loate ahe sensitive sessions (read-only) with ahe insensitive sessions (write-only) using just one parameter (read-write ratio). This improves ahe utilization and onsolidation (inreased density of sessions per server). Similarly, we observe (Observation 8) that files with >7% sequential read or sequential write have no repeated reads or overwrites. This aess pattern involves four harateristis: read sequentiality, write sequentiality, repeated read behavior, and overwrite behavior. The observation leads to a useful poliy: sequentially aessed files do not need to be ahed at the server (no repeated reads), whih leads to an effiient buffer ahe. These observations illustrate that our methodology an derive unique design impliations that leverage the orrelation between different harateristis. To summarize, our ontributions are: Identify storage system aess patterns using a multidimensional, statistial analysis tehnique. Build a framework for analyzing traes at different granularity levels at both server and lient. Analyze our speifi traes and present the aess patterns identified. Derive design impliations for various storage system omponents from the aess patterns. In the rest of the paper, we motivate and desribe our analysis methodology (Setions 2 and 3), present the aess patterns we found and the design insights (Setion 4), provide the impliations on storage system arhiteture (Setion 5), and suggest future work (Setion 6). 2. MOTIVATION AND BACKGROUND Past trae-based studies have examined a range of storage system protools and use ases, delivering valuable insights for designing storage servers. Table 2 summarizes the ontributions of past studies. Many studies predate urrent tehnology trends. Analysis of real-world, orporate workloads or traes have been sparse, with only three studies among the ones listed [13, 15, 18]. A number of studies have foused on NFS trae analysis only [8, 1]. This fous somewhat neglets systems using the Common Internet File System (CIFS) protool [5], with only a single CIFS study [15]. CIFS systems are important sine CIFS is the network storage protool for Windows, the dominant OS on ommodity platforms. Our work uses the same traes as [15], but we perform analysis using a methodology that extrats multi-dimensional insights at different layers. This methodology is suffiiently different from prior work as to make the analysis findings not omparable. The following disusses the need for this methodology. 2.1 Need for Insights at Different Layers We divide our view of the storage system into behavior at lients and servers. Storage lients interfae diretly with users, who reate and view ontent via appliations. Separately, servers store the ontent in a durable and effiient fashion over the network. Past network storage system trae studies fous mostly on storage servers (Table 2). Storage lient behavior is underrepresented primarily due to the reliane on stateless NFS traes. This leaves a knowledge gap about aess patterns at storage lients. Speifially, these questions are unanswered: Do appliations exhibit lear aess patterns? What are the user-level aess patterns? Any orrelation between users and appliations? Do all appliations interat with files the same way? 44

3 Study Date of File N/w Multi- Multi- Data Trae Insights/ Traes System FS Dim. Layer Set Info Contributions Ousterhout, et al. [17] 1985 BSD Eng Live Seminal patterns analysis: Large, sequential read aess; limited read-write; bursty I/O; short file lifetimes, et. Ramakrishnan, et al. [18] VAX/ VMS Eng, HPC, Corp Live Relationship between files and proesses - on usage patterns, sharing, et. Baker, et al. [3] 1991 Sprite Eng Live Analysis of distributed file system; omparison to [17], ahing effets. Gribble, et al. [1] Sprite, NFS, VxFS Eng, Bakup Live, Snap Workload self-similarity Doueur, et al. [7] 1998 FAT, FAT32, NTFS Vogels [24] 1998 FAT, NTFS Eng Snap Analysis of file and diretory attributes: size, age, lifetime, diretory depth Eng, HPC Live, Snap Supported past observations and trends in NTFS Zhou et al. [25] 1999 VFAT PC Live Analysis of personal omputer workloads Roselli, et al. [19] VxFS, Eng, Live Inreased blok lifetimes, ahing NTFS Server strategies Ellard, et al. [8] 21 NFS Eng, Live NFS peuliarities, pathnames an aid file layout Agrawal, et al. [1] 2-4 FAT, FAT32, NTFS Eng Snap Distribution of file size and type in namespae, hange in file ontents over time Leung, et al. [15] 27 CIFS Corp, Eng Kavalanekar, et al. [13] 27 NTFS Web, Corp This paper 27 CIFS Corp, Eng Live File re-open, sharing, ativity harateristis; hanges ompared to previous studies Live Study of web (live maps, web ontent, et.) workloads in servers via events traing. Live Setion 4 Table 2: Past studies of storage system traes. Corp stands for orporate use ases. Eng stands for engineering use ases. Live implies live requests or events in traes were studied, Snap implies snapshots of file systems were studied. Insights on these aess patterns lead to better design of both lients and servers. They enable server apabilities suh as per session quality of servie (QoS), or per appliation servie level objetives (SLOs). They also inform various onsolidation, ahing, and prefething deisions at lients. Eah of these aess patterns is visible only at a partiular semanti layer within the lient: users or appliations. We define eah suh layer as an aess unit, with the observed behaviors at eah aess unit being an aess pattern. The analysis of lient side aess units represents an improvement on prior work. On the server side, we extend the previous fous on files. We need to also understand how files are grouped within a diretory, as well as ross-file dependenies and diretory organization. Thus, we perform multi-layer and ross-layer dependeny analysis on the server also. This is another improvement on past work. 2.2 Need for Multi-Dimensional Insights Eah aess unit has ertain inherent harateristis. Charateristis that an be quantified are features of that aess unit. For example, for an appliation, the read size in bytes is a feature; the number of unique files aessed is another. Eah feature represents an independent mathematial dimension that desribes an aess unit. We use the terms dimension, feature, and harateristi interhangeably. The global set of features for an aess unit is limitless. Piking a good feature set requires domain knowledge. Many reent studies analyze aess patterns only one feature at a time. This represents a key limitation. The resulting insights, although valuable, lead to uniform poliies around a single design point. For example, study [15] revealed that most bytes are transferred from larger files. Although this is an useful observation, it does not reveal other harateristis of suh large files: Do they have repeated reads? Do they have overwrites? Do they have many metadata requests? And so on. Adding these dimensions breaks up the predominant aess pattern into smaller, minority aess patterns, eah may require a speifi storage poliy. Understanding minority aess patterns is inreasingly important, beause the trend toward data heterogeneity implies that no ommon ase will dominate storage system behavior. Minority aess patterns beome visible only upon analyzing multiple features simultaneously, hene the need for multi-dimensional insights. We also need to selet a reasonable number of features. Doing so allows us to fully desribe the aess patterns and redue the bias in piking any one feature. Manually identifying multi-feature dependenies is diffiult, and an lead to an untenable analysis. Therefore, we need tehniques that analyze a large number of features, sale to a high number of analysis data points, and do not require a priori knowledge of any ross-feature dependenies. Multi-dimensional statistis tehniques have solved similar problems in other domains [4, 9, 21]. We an apply similar tehniques and ombine them with domain speifi knowledge of the storage systems being analyzed. 45

4 In short, the need for multi-layered and multi-dimensional insights motivates our methodology. 3. METHODOLOGY In this setion, we desribe our analysis method in detail. We start with a desription of the traes we analyzed, followed by a desription of the aess units seleted for our study. Next, we desribe key steps in our analysis proess, inluding seleting the right features for eah aess unit, using the k-means data lustering algorithm to identify aess patterns, and additional information needed to interpret and generalize the results. 3.1 Traes Analyzed We olleted CIFS traes from two large-sale, enterpriselass file servers deployed at our orporate dataenters. One server overs roughly 1 employees in marketing, sales, finane, and other orporate roles. We all this the orporate trae. The other server overs roughly 5 employees in various engineering roles. We all this the engineering trae. We desribed the trae olleting infrastruture in [15]. The orporate trae reflets ativities on 3TB of ative storage from 9/2/27 to 11/21/27. It ontains ativity from many Windows appliations. The engineering trae reflets ativities on 19TB of ative storage from 8/1/27 to 11/14/27. It interleaves ativity from both Windows and Linux appliations. In both traes, many lients use virtualization tehnologies. Thus, we believe we have representative traes with regards to the tehnology trends in sale, heterogeneity, and onsolidation. Also, sine protoolindependent users, appliations, and stored data remain the primary fators affeting storage system behavior, we believe our analysis is relevant beyond CIFS. 3.2 Aess Units As mentioned in Setion 2.1, we analyze aess patterns at multiple aess units at the server and the lient. Seleting aess units is subjetive. We hose aess units that form lear semanti design boundaries. On the lient side, we analyze two aess units: Sessions: Sessions reflet aggregate behavior of an user. A CIFS session is bounded by mathing session onnet and logoff requests. CIFS identifies it by a tuple - {lient IP address, session ID}. Appliation instane: Analysisatthislevelleadstoappliation speifi optimizations in lient VMs. CIFS identifies eah appliation instane by the tuple - {lient IP address, session ID, and proess ID}. We also analyzed file open-loses, but obtained no useful insights. Hene we omit that aess unit from the paper. We also examined two server side aess units: File: Analyzing file level aess patterns failitates perfile poliies and optimization tehniques. Eah file is uniquely identified by its full path name. Deepest subtree: This aess unit is identified by the diretory path immediately ontaining the file. Analysis at this level enables per-diretory poliies. Session App. Instane App. Instane App. Instane Deepest subtree A Deepest subtree A/B Figure 1: Aess units analyzed. At lients, eah session ontains many appliation instanes. At servers, eah subtree ontains many files. Figure 1 shows the semanti hierarhy among different aess units. At lients, eah session ontains many appliation instanes. At servers, eah subtree ontains many files. 3.3 Analysis Proess Our method (Figure 2) involves the following steps: 1. Collet network storage system traes (Setion 3.1). 2. Define the desriptive features for eah aess unit. This step requires domain knowledge about storage systems (Setion 3.3.1). 3. Extrat multiple instanes of eah aess unit, and ompute from the trae the orresponding numerial feature values of eah instane. 4. Input those values into k-means, a multi-dimensional statistial data lustering tehnique (Setion 3.3.2). 5. Interpret the k-means output and derive aess patterns by looking at only the relevant subset of features. This step requires knowledge of both storage systems and statistis. We also need to extrat onsiderable additional information to support our interpretations (Setion 3.3.3). 6. Translate aess patterns to design insights. We give more details about Steps 2, 4, and 5 below Seleting features for eah aess unit Seleting the set of desriptive features for eah aess unit requires domain knowledge about storage systems (Step 2 in Figure 2). It also introdues some subjetivity, sine the hoie of features limits on how one aess pattern an differ from another. The human designer needs to selet some basi features initially, e.g., total IO size and read-write ratio for a file. We will not know whether we have a good set of features until we have ompleted the entire analysis proess. If the analysis results leave some design hoie ambiguities, we need to add new features to larify those ambiguities, again using domain knowledge. For example, for the deepest subtrees, we ompute various perentiles (25th, 5th, and 75th) of ertain features like read-write ratio beause the average value for those features did not learly separate the aess patterns. We then repeat the analysis proess using the new feature set. This iterative proess leads to a long feature set for all aess units, somewhat reduing the subjetive bias of a small feature set. We list in Setion 4 the hosen features for eah aess unit. Most of the features used in our analysis (Setion 4) are selfexplanatory; some ambiguous or omplex features require preise definitions, suh as: File File File File 46

5 1. Trae olletion 2. Selet layers, define features 3. Compute numerial feature values means to other lustering algorithms suh as hierarhial lustering and k-means derivatives [2]. 6. Design impliations 5. Interpret results 4. Identify aess patterns by k-means Figure 2: Methodology overview. The two-way arrows and the loop from Step 2 through Step 5 indiate our many iterations between the steps. IO: We use IO as a substitute for read and write. Sequential reads or writes: We onsider two read or writes requests to be sequential if they are onseutive in time, and the file offset + request size of the first request equals the file offset of the seond request. A single read or write request is by definition not sequential. Repeated reads or overwrites: We trak aesses at 4KB blok boundaries within a file, with the offset of the first blok being zero. A read is onsidered repeated if it aesses a blok that has been read in the past half hour. We use an equivalent definition for overwrites Identifying aess patterns via k-means A key part of our methodology is the k-means multi-dimensional orrelation algorithm. We use it to identify aess patterns simultaneously aross many features (Step 4 in Figure 2). K-means is a well-known, statistial orrelation algorithm. It identifies sets of data points that ongregate around a region in n-dimensional spae. These ongregations are alled lusters. Given data points in an n- dimensional spae, k-means piks k points at random as initial luster enters, assigns data points to their nearest luster enters, and reomputes new luster enters via arithmeti means aross points in the luster. K-means iterates the assignment-reompute proess until the luster enters beome stationary. K-means an run with multiple sets of initial luster enters and return the best result [2]. For eah aess unit, we extrat different instanes of it from the trae, i.e., all session instanes, appliation instanes, et. For eah instane, we ompute the numerial values of all its features. This gives us a data array in whih eah row orrespond to an instane, i.e., a data point, and eah olumn orrespond to a feature, i.e., a dimension. We input the array into k-means, and the algorithm finds the natural lusters aross all data points. We onsider all data points in a luster as belonging to a single equivalene lass, i.e., a single aess pattern. The numerial values of the luster enters indiate the harateristis of eah aess pattern. We hoose k-means for two reasons. First, k-means is algorithmially simple. This allows rapid proessing on large data sets. We used a modified version of the k-means C library [14], in whih we made some improvements to limits the memory footprint when proessing large data sizes. Seond, k-means leads to intuitive labels of the luster enters. This helps us translate the statistial behavior extrated from the traes into tangible insights. Thus, we prefer k- K-means requires us to speify k, the number of lusters. This is a diffiult task sine we do not know a priori the number of natural lusters in the data. We ompute the intra-luster residual variane from the k-means results - the sum of squared distanes from eah data point to its assigned luster enter. This is a standard metri for luster quality, and gives us a lower bound on k. We annot set k so small that the residual variane forms a large fration of the total variane, i.e., residual variane the sum of squared distanes from eah data point to the global average of all data points. We optionally inrease k beyond the lower bound until some key aess patterns an be separated. Conurrently, we take are not to inrease k too high, to prevent having an unwieldy number of aess patterns and design targets. We applied this reasoning to set k at eah lient and server aess unit Interpreting and generalizing the results The k-means algorithm gives us a set of aess patterns with various harateristis. We need additional information to understand the signifiane of the results. This information omes from omputing various seondary data outside of k- means analysis (Step 5 in Figure 2: We gathered the start and end times of eah session instane, aggregated by times of the day and days of the week. This gave us insight into how users launh and end sessions. We examine filename extensions of files assoiated with every aess pattern belonging to these aess units: appliation instanes, files, and deepest subtrees. This information onnets the aess patterns to more easily reognizable file extensions. We perform orrelation analysis between the file and deepest subtrees aess units. Speifially, we ompute thenumberoffilesofeahfileaesspatternthatisloated within diretories in eah deepest subtree aess pattern. This information aptures the organizations of files in diretories. Suh information gives us a detailed piture about the semantis of the aess patterns, resulting in human understandable labels to the aess patterns. Suh labels help us translate observations to design impliations. Furthermore, after identifying the design impliations, we explore if the design insights an be extrapolated to other trae periods and other storage system use ases. We aomplish this by repeating our exat analysis over multiple subsets of the traes, for example, a week s worth of traes at a time. This allow us to examine how our analysis would be different had we obtained only a week s trae. Aess patterns that are onsistent, stable aross different weeks would indiate that they are likely to be more general than just our traing period or our use ases. 4. ANALYSIS RESULTS & IMPLICATIONS This setion presents the aess patterns we identified and the aompanying design insights. We disuss lient and 47

6 (a). Desriptive features for eah session Duration Total metadata requests Overwrite ratio Diretories aessed Total IO size Avg. time between IO requests Tree onnets Appliation instanes seen Read:write ratio by bytes Read sequentiality Unique trees aessed Total IO requests Write sequentiality File opens Read:write ratio by requests Repeated read ratio Unique files opened (b). Corporate session Full day work Half day on- Short ontent Short ontent Supporting Supporting aess patterns tent viewing viewing generation metadata read-write %ofallsessions.5%.7% 1.2%.2% 96% 1.4% Duration 8hrs 4hrs 1min 7min 7se 1se Total IO size 11MB 3MB 128KB 3MB 42B Read:write ratio by bytes 3:2 1: 1: :1 : 1:1 Metadata requests Read sequentiality 7% 8% % - - % Write sequentiality 8% - - 9% - % File opens:files 2:4 8:15 3:7 5:15 : 6:3 Tree onnet:trees 5:2 3:2 2:2 2:2 1:1 2:2 Diretories aessed Appliation instanes (). Engineering session Full day work Human edit Appliation gene- Short ontent Supporting Mahine geneaess patterns small files rated bakup/opy generation metadata rated update %ofallsessions.4% 1.% 4.4%.4% 9% 3.6% Duration 1day 2hrs 1min 1hr 1se 1se Total IO size 5MB 5KB 2MB 2MB 36B Read:write ratio 7:4 1:1 1: :1 : 1: Metadata requests Read sequentiality 6% % 9% - - % Write sequentiality 7% % - 9% - - File opens:files 13:2 9:2 6:5 15:6 : 1:1 Tree onnet:trees 1:1 1:1 1:1 1:1 1:1 1:1 Diretories aessed Appliation instanes Table 3: Session aess patterns. (a): Full list of desriptive features. (b) and (): Short names and desriptions of sessions in eah aess pattern; listing only the features that help separate the aess patterns. serve side aess patterns (Setion 4.1, 4.2). We also hek if these patterns persist aross time (Setion 4.3). For eah aess unit, we list the desriptive features (only some of whih help separate aess patterns), outline how we derived the high-level name (label) for eah aess pattern, and disuss relevant design insights. 4.1 Client Side Aess Patterns As mentioned in Setion 3.2, we analyze sessions and appliation instanes at lients Sessions Sessions reflet aggregate behavior of human users. We used 17 features to desribe sessions (Table 3). The orporate trae has 59,76 sessions, and the engineering trae has 232,33. In Table 3, we provide quantitative desriptions and short names for all the session aess patterns. We derive the names from examining the signifiant features: duration, read-write ratio, and IO size. We also looked at the aggregate session start and end times to get additional semanti knowledge about eah aess pattern. Figure 3 shows the start and end times for seleted session aess patterns. The start times of orporate full-day work sessions orrespond exatly to the U.S. work day 9am start, 12pm lunh, 5pm end. Corporate ontent generation sessions show slight inrease in the evening and towards Friday, indiating rushes to meet daily or weekly deadlines. In the engineering trae, the appliation generated bakup and mahine generated update sessions depart signifiantly from human workday and work week patterns, leading us to label them as appliation and mahine (lient OS) generated. One surprise was that the supporting metadata sessions aount for >9% of all sessions in both traes. We believe these sessions are not humanly generated. They last roughly 1 seonds, leaving little time for human mediated interations. Also, the session start rate averages to roughly one per employee per minute. We are ertain that our olleagues are not onneting and logging off every minute of the entire day. However, the shape of the start time graphs have a strong orrelation with the human work day and work week. We all these supporting metadata sessions mahine generated in support of human user ativities. These metadata sessions form a sort of bakground noise to the storage system. We observe the same bakground noise at other layers both at lients and servers. Observation 1: The sessions with IO sizes greater than 128KB are either read-only or write-only, exept for the full-day work sessions. Among these sessions, only read-only sessions utilize buffer ahe for repeated reads and prefethes. Write-only sessions only use the ahe to buffer writes. Thus, if we have a ahe evition poliy that reognizes their writeonly nature and releases the buffers immediately on flushingdirtydata,weansatisfymanywrite-onlysessionswith relatively little buffer ahe spae. We an attain better onsolidation and buffer ahe utilization by managing the ratio of o-loated read-only and write-only sessions. This insight an be used by virtualization managers and lient operating systems to manage a shared buffer ahe between sessions. Reognizing suh read-only and write-only sessions 48

7 # of sessions Corp full day work start end Corp short ontent generation 5 25 Corp supporting metadata Eng appliation generated bakup or opy Eng mahine generated update hrs of the day hrs of the day hrs of the day hrs of the day hrs of the day # of sessions days of the week days of the week days of the week days of the week days of the week Figure 3: Number of sessions that start or ends at a partiular time. Number of session starts and ends in times of the day (top) and session starts in days of the week (bottom). Showing only seleted aess patterns. is easy. Examining a session s total read size and write size reveals their read-only or write-only nature. Impliation 1: Clients an onsolidate sessions effiiently based only on the read-write ratio. Observation 2: The full-day work, ontent-viewing, and ontent-generating sessions all do 1MB of IO. This means that a lient ahe of 1s of MB an fit the working set of a day for most sessions. Given the growth of flash devies on lients for ahing, despite large-sale onsolidation, lients should easily ahe a day s worth of data for all users. In suh a senario, most IO requests would be absorbed by the ahe, reduing network lateny and bandwidth utilization, and load on the server. Moreover, omplex ahe evition algorithms are unneessary. Impliation 2: Clients ahes an already fit an entire day s IO. Observation 3: The number of human-generated sessions and supporting sessions peaks on Monday and dereases steadily to 8% of the peak on Friday (Figure 3). This is true for all human generated sessions, inluding the ones not shown in Figure 3. There is onsiderable slak in the server load during evenings, lunh times, and even during working hours. This implies that the server an perform bakground tasks suh as onsisteny heks, maintenane, or ompression/dedupliation, at appropriate times during the week. A simple ount of ative sessions an serve as an effetive start and stop signal. By omputing the area under the urve for session start times by days of the week, we estimate that bakground tasks an squeeze out roughly one extra day s worth of proessing without altering the peak demand on the system. This is a 5% improvement over a setup whih performs bakground tasks only during weekends. In the engineering trae, the appliation generated bakup or opy sessions seem to have been already designed this way. Impliation 3: Servers get an extra day for bakground tasks by running them at appropriate times during week-days Appliation instanes Appliation instane aess patterns reflets appliation behavior, failitating appliation speifi optimizations. We used 16 features to desribe appliation instanes (Table 4). The orporate trae has 138,723 appliation instanes, and the engineering trae has 741,319. Table 4 provides quantitative desriptions and short names for all the appliation instane aess patterns. We derive the names from examining the read-write ratio, IO size, and file extensions aessed (Figures 4 and 5). We see again the metadata bakground noise. The supporting metadata appliation instanes aount for the largest fration, and often do not even open a file. There are many files without a file extension, a phenomenon also observed in reent storage system snapshot studies [16]. We notie that file extensions turn out to be poor indiators of appliation instane aess patterns. This is not surprising beause we separate aess patterns based on read/write properties. A user ould either view a. or reate a.. The same appliation software has different read/write patterns. This speaks to the strength of our multi-layer framework. Aggregating IO by appliation instanes gives lean separation of patterns; while aggregating just by appliation software or file extensions will not. We also find it interesting that most file extensions are immediately reognizable. This means that what people use network storage systems for, i.e., the file extensions, remains easily reognizable, even though how people use network storage systems, i.e., the aess patterns, is ever hanging and beoming more omplex. Observation 4: The small ontent viewing appliation and ontent update appliation instanes have <4KB total reads per file open and aess a few unique files many times. The small read size and multiple reads from the same files means that lients should prefeth and plae the files in a ahe optimized for random aess (flash/ssd/memory). The trend towards flash ahes on lients should enable this transfer. Appliation instanes have bi-modal total IO size - either 49

8 very small or large. Thus, a simple ahe management algorithm suffies; we always keep the first 2 bloks of 4KB in ahe. If the appliation instane does more IO, it is likely to have IO size in the 1KB-1MB range, so we evit it from the ahe. We should note that suh a poliy makes sense even though we proposed earlier to ahe all 11MB of a typial day s working set - 11MB of ahe beomes a onern when we have many onsolidated lients. Impliation 4: Clients should always ahe the first few KB of IO per file per appliation. Observation 5: We see >5% sequential read and write ratio for the ontent update appliations instanes (orporate) and the ontent viewing appliations instanes for humangenerated ontent (both orporate and engineering). Dividing the total IO size by the number of file opens suggest that these appliation instanes are sequentially reading and writing entire files for offie produtivity (.,.,.ppt,.pdf, et.) and multimedia appliations. This implies that the files assoiated with these appliations should be prefethed and delegated to the lient. Prefething means delivering the whole file to the lient before the whole file is requested. Delegation means giving a lient temporary, exlusive aess to a file, with the lient periodially synhronizing to server to ensure data durability. CIFS does delegation using opportunisti loks, while NFSv4 has a dediated operation for delegation. Prefething and delegation of suh files will improve read and write performane, lower network traffi, and lighten server load. The aess patterns again offer a simple, threshold-based deision algorithm. If an appliation instane does more than 1s of KB of sequential IO, and has no overwrite, then it is likely to be a ontent viewing or update appliation instane; suh files are prefethed and delegated to the lients. Impliation 5: Clients an request file prefeth (read) and delegation (write) based on only IO sequentiality. Observation 6: Engineering appliations with >5% sequential reads and >5% sequential writes are doing ode ompile tasks. We know this from looking at the file extensions in Figure 5. These ompile proesses show read sequentiality, write sequentiality, a signifiant overwrite ratio and large number of metadata requests. They rely on the server heavily for data aesses. We need more detailed lient side information to understand why lient ahes are ineffetive in this ase. However, it is lear that the server ahe needs to prefeth the read files for these appliations. The high perentage of sequential reads and writes gives us another threshold-based algorithm to identify these appliations. Impliation 6: Servers an identify ompile tasks by the presene of both sequential reads and writes; server has to ahe the output of these tasks. 4.2 Server Side Aess Patterns As mentioned in Setion 3.2, we analyzed two kinds of server side aess units: files and deepest subtrees Files File aess patterns help storage server designers develop per-file plaement and optimization tehniques. We used 25 features to desribe files (Table 5). Note that some of Fration of appliation instanes n.f.e. + lnk n.f.e. + ppt ini pdf n.f.e. + n.f.e. + ontent viewing app - app generated ontent n.f.e. + n.f.e. no files opened supporting metadata n.f.e. + n.f.e. + htm n.f.e. + n.f.e. + n.f.e. app generated file updates n.f.e. + pdf n.f.e. + ppt n.f.e. + pdf n.f.e. + ontent viewing app - human generated ontent n.f.e. + pdf n.f.e. + ppt n.f.e. + lnk n.f.e. + n.f.e. + ontent update app Figure 4: File extensions for orporate appliation instane aess patterns. For eah aess pattern (olumn), showing the fration of the two most frequent file extensions that are aessed together within a single appliation instane. n.f.e. denotes files with no file extension. Fration of appliation instanes d + h n.f.e. + h + d h + dbo h + h + o ompilation app n.f.e. no files opened supporting metadata txt n.f.e. + n.f.e. rnd ontent update app - small pdf bmp ontent viewing app - human generated ontent txt n.f.e. pst rnd + n.t.e. ontent viewing app - small Figure 5: File extensions for engineering appliation instane aess patterns. For eah aess pattern (olumn), showing the fration of the two most frequent file extensions that are aessed together within a single appliation instane. n.f.e. denotes files with no file extension. the features inlude different perentiles of a harateristi, e.g., read request size as perentiles of all read requests. We believe inluding different perentiles rather than just the average would allow better separation of aess patterns. The orporate trae has 1,155,99 files, and the engineering trae has 1,89,571. In Table 5, we quantitative desriptions and short names for all the file aess patterns. Figures 6 and 7 give the most ommon file extensions in eah. We derived the names by examining the read-write ratio and IO size. For the engineering trae, examining the file extensions also proved useful, leading to labels suh as edit ode and ompile output, and read only log/bakup. 5

9 (a). Desriptive features for eah appliation instane Total IO size Total metadata requests Repeated read ratio File opens Read:write ratio by bytes Avg. time between IO requests Overwrite ratio Unique files opened Total IO requests by bytes Read sequentiality Tree onnets Diretories aessed Read:write ratio by requests Write sequentiality Unique trees aessed File extensions aessed (b). Corporate appliation Content viewing app - Supporting App generated Content viewing app - Content update instane aess patterns app generated ontent metadata file updates human generated ontent app % of all app instanes 16% 56% 14% 8.8% 5.1% Total IO 1KB 1KB 8KB 3.5MB Read:write ratio 1: : 1:1 1: 2:3 Metadata requests Read sequentiality 5% - % 8% 5% Write sequentiality - - % - 8% Overwrite ratio - - % - 5% File opens:files 19:4 : 1:4 2:4 6:11 Tree onnet:trees 2:2 : 2:2 2:2 2:2 Diretories aessed File extensions aessed (). Engineering appliation Compilation app Supporting Content update Content viewing app - Content viewing instane aess patterns metadata app - small human generated ontent app - small % of all app instanes 1.6% 93%.9% 2.% 2.5% Total IO 2MB 2KB 1MB 3KB Read:write ratio 9:1 : :1 1: 1: Metadata requests Read sequentiality 5% - - 9% % Write sequentiality 8% - % - - Overwrite ratio 2% - % - - File opens:files 145:75 : 3:1 5:4 2:1 Tree onnet:trees 1:1 : 1:1 1:1 1:1 Diretories aessed File extensions aessed Table 4: Appliation instane aess patterns. (a): Full list of desriptive features. (b) and (): Short names and desriptions of appliation instanes in eah aess pattern; listing only the features that help separate the aess patterns. We see that there are groupings of files with similar extensions. For example, in the orporate trae, the small random read aess patterns inlude many file extensions assoiated with web browser ahes. Also, multi-media files like.mp3 and. ongregate in the sequential read and write aess patterns. In the engineering trae, ode libraries group under the sequential write files, and read only log/bakup files ontain file extensions. to.99. However, the most ommon file extensions in eah trae still spread aross many aess patterns, e.g., offie produtivity files in the orporate trae and ode files in the engineering trae. Observation 7: For files with >7% sequential reads or sequential writes, the repeated read and overwrite ratios are lose to zero. This implies that there is little benefit in ahing these files at the server. They should be prefethed as a whole and delegated to the lient. Again, the bimodal IO sequentiality offers a simple algorithm for the server to detet whih files should be prefethed and delegated if a file has any sequential aess, it is likely to have a high perentage of sequential aess, therefore it should be prefethed and delegated to the lient. Future storage servers an suggest suh information to lients, leading to delegation requests. Impliation 7: Servers should delegate sequentially aessed files to lients to improve IO performane. Observation 8: In the engineering trae, only the edit ode and ompile output files have a high % of repeated reads. Those files should be delegated to the lients as well. The repeated reads do not show up in the engineering appliation instanes, possibly beause a ompilation proess launhes many hild proesses repeatedly reading the same files. Eah hild proess reads fresh data, even though the server sees repeated reads. With larger memory or flash ahes at lients, we expet this behavior to drop. The working set issues that lead to this senario need to be examined. If the repeated reads ome from a single lient, then the server an suggest that the lient ahe the appropriate files. We an again employ a threshold-based algorithm. Deteting any repeated reads at the server signals that the file should be delegated to the lient. At worst, only the first few reads will hit the server. Subsequent repeated reads are stopped at the lient. Impliation 8: Servers should delegate repeatedly read files to lients. Observation 9: Almost all files are ative (have opens, IO, and metadata aess) for only 1-2 hours over the entire trae period, as indiated by the typial opens/read/write ativity of all aess patterns. There are some regularly aessed files, but they are so few that they do not affet the k-means analysis. The lak of regular aess for most files means that there is room for the server to employ tehniques to inrease apaity by doing ompation on idle files. Common tehniques inlude dedupliation and ompression. The ativity on these files indiate that the IO performane impat should be small. Even if run onstantly, ompation has a low probability of affeting an ative file. Sine ommon libraries like gzip optimize for deompression [11], deompressing files at read time should have only slight performane impat. Impliation9:Serversanusefileidletime to ompress or dedupliate data to inrease storage apaity. 51

10 (a). Desriptive features for eah file Number of hours with 1, 2-3, or 4 file opens Number of hours with 1-1KB, 1KB-1MB, or >1MB reads Number of hours with 1-1KB, 1KB-1MB, or >1MB writes Number of hours with 1, 2-3, or 4 metadata requests Read request size - 25th, 5th, and 75th perentile of all requests Write request size - 25th, 5th, and 75th perentile of all requests Avg. time between IO requests - 25th, 5th, and 75th perentile of all request pairs Read sequentiality Write sequentiality Read:write ratio by bytes Repeated read ratio Overwrite ratio (b). Corporate file Metadata only Sequential write Sequential read Small random Smallest random Small random aess patterns write read read %ofallfiles 59% 4.% 4.1% 4.7% 19% 9.2% Opens ativity 2hrs, 1 open 1hr, 2-3 opens 1hr, 2-3 opens 1hr, 2-3 opens 1hr, 1 open 1hr, 1 open Read ativity 1hr, 1KB-1MB 1hr, 1-1KB 1hr, 1-1KB Write ativity 1hr, 1KB-1MB 1hr, 1-1KB Read request size KB - 2KB 32KB Write request size - 6KB KB - - Read sequentiality - - 7% - % % Write sequentiality - 8% - % - - Read:write ratio : :1 1: :1 1: 1: (). Engineering file Metadata only Sequential write Small random Edit ode & Sequential read Read-only aess patterns read ompile output log/bakup %ofallfiles 42% 1.9% 32% 7.3% 8.3% 8.1% Opens ativity 1hr, 1 open 1hr, 2-3 opens 1hr, 2-3 opens 1hr, 2-3 opens 1hr, 2-3 opens 2hrs, 2-3 opens Read ativity 1hr, 1-1KB 1hr, 1-1KB 1hr, 1-1KB 2hrs, 1-1KB Write ativity 1hr, >1MB Read request size KB 4KB 8-16KB 1KB Write request size - 64KB Read sequentiality - - % % 7% % Write sequentiality - 9% Repeated read ratio - - % 5% % % Read:write ratio : :1 1: 1: 1: 1: Table 5: File aess patterns. (a): Full list of desriptive features. (b) and (): Short names and desriptions of files in eah aess pattern; listing only the features that help separate the aess patterns. 1 1 Fration of files xml io z pdf mp3 ppt pdf mp3 swf htm zip gif xml ppt Fration of files eth h d bf o wma jar dll mp3 gif d h o d bq h h o bq -99 metadata only files seq write files seq read files small random write files smallest random read files small random read files idle, only metadata seq write files small random read files edit ode & ompile output seq read files read only log/bakup files Figure 6: File extensions for orporate files. Fration of file extensions in eah file aess pattern. Figure 7: File extensions for engineering files. Fration of file extensions in eah file aess pattern. Observation 1: All files have either all random aess or >7% sequential aess. The small random read and write files in both traes an benefit from being plaed on media with high random aess performane, suh as solid state drives (SSDs). Files with a high perentage of sequential aess an reside on traditional hard disk drives (HDDs), whih already optimize for sequential aess. The bimodal IO sequentiality offers yet another threshold-based plaement algorithm if a file has any sequential aess, it is likely to have a high perentage of sequential aess; therefore plae it on HDDs. Otherwise, plae it on SSDs. We note that there are more randomly aessed files than sequentially aessed files. Even though sequential files tend to be larger, we still need to do a working set analysis to determine the right size of server SSDs for eah use ase. Impliation 1: Servers an selet the best storage medium for eah file based only on aess sequentiality Deepest subtrees Deepest subtree aess patterns help storage server designers develop per-diretory poliies. We used 4 features to desribe deepest subtrees (Table 6). Some of the features 52

11 Fration of files xml temp dirs for real data gif msg xml zip swf pdf mp3 lient mix read aheable dirs, dirs mostly seq xml io z metadata only dirs mp3 pdf mix write dirs, mostly seq zip htm gif xml small random read dirs Figure 8: File extensions for orporate deepest subtrees. Fration of file extensions in deepest subtree aess patterns. Fration of files eth h d o bf metadata only dir bq h small random read dir d bq h d o lient mix read aheable dirs, dirs mostly seq dll ryy jar seq write dirs obj dbo d o temp dirs for real data Figure 9: File extensions for engineering deepest subtrees. Fration of file extensions in deepest subtree aess patterns. inlude different perentiles of a harateristi, e.g. per file read sequentiality as perentiles of all files in a diretory. Inluding different perentiles rather than just the average allows better separation of aess patterns. The orporate trae has 117,64 deepest subtrees, and the engineering trae has 161,858. We use diretories and deepest subtrees interhangeably. In Table 6, we provide quantitative desriptions and short names for all the deepest subtree aess patterns. We derive the names using two types of information. First, we analyze the file extensions in eah subtree aess pattern (Figures 8 and 9). Seond, we examine how many files of eah file aess patterns are within eah subtree pattern (Figures 1). For brevity, we show only the graph for orporate deepest subtrees. The graph for the engineering deepest subtrees onveys the same information with regard to our design insights. For example, the random read and lient aheable labels ome from looking at the IO patterns. Temporary diretories aounted for the. files in those diretories. Mix read and mix write diretories onsidered the presene of both sequential and randomly aessed files in those diretories. The metadata bakground noise remains visible at the subtree layer. The spread of file extensions is similar to that for file aess patterns some file extensions ongregate and spread evenly. Interestingly, some subtrees have a large fration of metadata-only files that do not affet the desriptions of those subtrees. Some subtrees ontain only files of a single aess pattern (e.g., small random read subtrees in Figures 1). There, we an apply the design insights from the file aess patterns to the entire subtree. For example, the small random read subtrees an reside on SSDs. Sine there are more files than subtrees, per-subtree poliies an lower the amount of poliy information kept at the server. In ontrast, the mix read and mix write diretories ontain both sequential and randomly aessed files. Those subtrees need per-file poliies: Plae the sequentially aessed files on HDDs and the randomly aessed files on SSDs. Soft links to files an preserve the user-faing diretory organization, while allowing the server optimize per-file plaement. The server should automatially deide when to apply per-file or per-subtree poliies. Observation 11: Diretories with sequentially aessed files almost always ontain randomly aessed files also. Conversely, some diretories with randomly aess files will not ontain sequentially aessed files. Thus, we an default all subtrees to per-subtree poliies. Conurrently, we trak the IO sequentiality per subtree. If the sequentiality is above some threshold, then the subtree swithes to per-file poliies. Impliation 11: Servers an hange from per-diretory plaement poliy (default) to per-file poliy upon seeing any sequential IO to any files in a diretory. Observation 12: The lient aheable subtrees and temporary subtrees aggregate files with repeated reads or overwrites. Additional omputation showed that the repeated reads and overwrites almost always ome from a single lient. Thus, it is possible for the entire diretory to be prefethed and delegated to the lient. Delegating entire diretories an preempt all aesses that are loal to a diretory, but onsumes lient ahe spae. We need to understand the tradeoffs through a more in-depth working set and temporal loality analysis at both the file and deepest subtree levels. Impliation 12: Servers an delegate repeated read and overwrite diretories entirely to lients, tradeoffs permitting. 4.3 Aess Pattern Evolutions Over Time We want to know if the aess patterns are restrited to our partiular traing period or if they persist aross time. Only if the design insights remain relevant aross time an we rationalize their existene in similar use ases. We do not have enough traes to generalize beyond our monitoring period. We investigate the reverse problem - if we 53

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425) Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University

More information

Announcements. Lecture Caching Issues for Multi-core Processors. Shared Vs. Private Caches for Small-scale Multi-core

Announcements. Lecture Caching Issues for Multi-core Processors. Shared Vs. Private Caches for Small-scale Multi-core Announements Your fous should be on the lass projet now Leture 17: Cahing Issues for Multi-ore Proessors This week: status update and meeting A short presentation on: projet desription (problem, importane,

More information

Multi-Channel Wireless Networks: Capacity and Protocols

Multi-Channel Wireless Networks: Capacity and Protocols Multi-Channel Wireless Networks: Capaity and Protools Tehnial Report April 2005 Pradeep Kyasanur Dept. of Computer Siene, and Coordinated Siene Laboratory, University of Illinois at Urbana-Champaign Email:

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

Facility Location: Distributed Approximation

Facility Location: Distributed Approximation Faility Loation: Distributed Approximation Thomas Mosibroda Roger Wattenhofer Distributed Computing Group PODC 2005 Where to plae ahes in the Internet? A distributed appliation that has to dynamially plae

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY Dileep P, Bhondarkor Texas Instruments Inorporated Dallas, Texas ABSTRACT Charge oupled devies (CCD's) hove been mentioned as potential fast auxiliary

More information

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department

More information

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections SVC-DASH-M: Salable Video Coding Dynami Adaptive Streaming Over HTTP Using Multiple Connetions Samar Ibrahim, Ahmed H. Zahran and Mahmoud H. Ismail Department of Eletronis and Eletrial Communiations, Faulty

More information

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

Graph-Based vs Depth-Based Data Representation for Multiview Images

Graph-Based vs Depth-Based Data Representation for Multiview Images Graph-Based vs Depth-Based Data Representation for Multiview Images Thomas Maugey, Antonio Ortega, Pasal Frossard Signal Proessing Laboratory (LTS), Eole Polytehnique Fédérale de Lausanne (EPFL) Email:

More information

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University

More information

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,

More information

- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger.

- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger. - 1 - S 21 Diretory-based Administration of Virtual Private Networks: Poliy & Configuration Charles A Kunzinger kunzinge@us.ibm.om - 2 - Clik here Agenda to type page title What is a VPN? What is VPN Poliy?

More information

1. The collection of the vowels in the word probability. 2. The collection of real numbers that satisfy the equation x 9 = 0.

1. The collection of the vowels in the word probability. 2. The collection of real numbers that satisfy the equation x 9 = 0. C HPTER 1 SETS I. DEFINITION OF SET We begin our study of probability with the disussion of the basi onept of set. We assume that there is a ommon understanding of what is meant by the notion of a olletion

More information

Exploiting Enriched Contextual Information for Mobile App Classification

Exploiting Enriched Contextual Information for Mobile App Classification Exploiting Enrihed Contextual Information for Mobile App Classifiation Hengshu Zhu 1 Huanhuan Cao 2 Enhong Chen 1 Hui Xiong 3 Jilei Tian 2 1 University of Siene and Tehnology of China 2 Nokia Researh Center

More information

Query Evaluation Overview. Query Optimization: Chap. 15. Evaluation Example. Cost Estimation. Query Blocks. Query Blocks

Query Evaluation Overview. Query Optimization: Chap. 15. Evaluation Example. Cost Estimation. Query Blocks. Query Blocks Query Evaluation Overview Query Optimization: Chap. 15 CS634 Leture 12 SQL query first translated to relational algebra (RA) Atually, some additional operators needed for SQL Tree of RA operators, with

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

Partial Character Decoding for Improved Regular Expression Matching in FPGAs

Partial Character Decoding for Improved Regular Expression Matching in FPGAs Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia

More information

Exploring the Commonality in Feature Modeling Notations

Exploring the Commonality in Feature Modeling Notations Exploring the Commonality in Feature Modeling Notations Miloslav ŠÍPKA Slovak University of Tehnology Faulty of Informatis and Information Tehnologies Ilkovičova 3, 842 16 Bratislava, Slovakia miloslav.sipka@gmail.om

More information

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Arne Hamann, Razvan Rau, Rolf Ernst Institute of Computer and Communiation Network Engineering Tehnial University of Braunshweig,

More information

Fast Distribution of Replicated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon

Fast Distribution of Replicated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon ACEEE Int. J. on Information Tehnology, Vol. 3, No. 2, June 2013 Fast Distribution of Repliated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon Email: mmalli@aou.edu.lb

More information

Chapter 2: Introduction to Maple V

Chapter 2: Introduction to Maple V Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard

More information

The AMDREL Project in Retrospective

The AMDREL Project in Retrospective The AMDREL Projet in Retrospetive K. Siozios 1, G. Koutroumpezis 1, K. Tatas 1, N. Vassiliadis 2, V. Kalenteridis 2, H. Pournara 2, I. Pappas 2, D. Soudris 1, S. Nikolaidis 2, S. Siskos 2, and A. Thanailakis

More information

HEXA: Compact Data Structures for Faster Packet Processing

HEXA: Compact Data Structures for Faster Packet Processing Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for

More information

CA Test Data Manager 4.x Implementation Proven Professional Exam (CAT-681) Study Guide Version 1.0

CA Test Data Manager 4.x Implementation Proven Professional Exam (CAT-681) Study Guide Version 1.0 Implementation Proven Professional Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer

More information

Make your process world

Make your process world Automation platforms Modion Quantum Safety System Make your proess world a safer plae You are faing omplex hallenges... Safety is at the heart of your proess In order to maintain and inrease your ompetitiveness,

More information

Semi-Supervised Affinity Propagation with Instance-Level Constraints

Semi-Supervised Affinity Propagation with Instance-Level Constraints Semi-Supervised Affinity Propagation with Instane-Level Constraints Inmar E. Givoni, Brendan J. Frey Probabilisti and Statistial Inferene Group University of Toronto 10 King s College Road, Toronto, Ontario,

More information

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer

More information

the data. Structured Principal Component Analysis (SPCA)

the data. Structured Principal Component Analysis (SPCA) Strutured Prinipal Component Analysis Kristin M. Branson and Sameer Agarwal Department of Computer Siene and Engineering University of California, San Diego La Jolla, CA 9193-114 Abstrat Many tasks involving

More information

Detecting Moving Targets in Clutter in Airborne SAR via Keystoning and Multiple Phase Center Interferometry

Detecting Moving Targets in Clutter in Airborne SAR via Keystoning and Multiple Phase Center Interferometry Deteting Moving Targets in Clutter in Airborne SAR via Keystoning and Multiple Phase Center Interferometry D. M. Zasada, P. K. Sanyal The MITRE Corp., 6 Eletroni Parkway, Rome, NY 134 (dmzasada, psanyal)@mitre.org

More information

Approximate logic synthesis for error tolerant applications

Approximate logic synthesis for error tolerant applications Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu

More information

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method 3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr

More information

Gray Codes for Reflectable Languages

Gray Codes for Reflectable Languages Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings

More information

Recommendation Subgraphs for Web Discovery

Recommendation Subgraphs for Web Discovery Reommation Subgraphs for Web Disovery Arda Antikaioglu Department of Mathematis Carnegie Mellon University aantika@andrew.mu.edu R. Ravi Tepper Shool of Business Carnegie Mellon University ravi@mu.edu

More information

PROJECT PERIODIC REPORT

PROJECT PERIODIC REPORT FP7-ICT-2007-1 Contrat no.: 215040 www.ative-projet.eu PROJECT PERIODIC REPORT Publishable Summary Grant Agreement number: ICT-215040 Projet aronym: Projet title: Enabling the Knowledge Powered Enterprise

More information

CA Release Automation 5.x Implementation Proven Professional Exam (CAT-600) Study Guide Version 1.1

CA Release Automation 5.x Implementation Proven Professional Exam (CAT-600) Study Guide Version 1.1 Exam (CAT-600) Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized

More information

Video Data and Sonar Data: Real World Data Fusion Example

Video Data and Sonar Data: Real World Data Fusion Example 14th International Conferene on Information Fusion Chiago, Illinois, USA, July 5-8, 2011 Video Data and Sonar Data: Real World Data Fusion Example David W. Krout Applied Physis Lab dkrout@apl.washington.edu

More information

Accommodations of QoS DiffServ Over IP and MPLS Networks

Accommodations of QoS DiffServ Over IP and MPLS Networks Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering

More information

Reducing Runtime Complexity of Long-Running Application Services via Dynamic Profiling and Dynamic Bytecode Adaptation for Improved Quality of Service

Reducing Runtime Complexity of Long-Running Application Services via Dynamic Profiling and Dynamic Bytecode Adaptation for Improved Quality of Service Reduing Runtime Complexity of Long-Running Appliation Servies via Dynami Profiling and Dynami Byteode Adaptation for Improved Quality of Servie ABSTRACT John Bergin Performane Engineering Laboratory University

More information

Acoustic Links. Maximizing Channel Utilization for Underwater

Acoustic Links. Maximizing Channel Utilization for Underwater Maximizing Channel Utilization for Underwater Aousti Links Albert F Hairris III Davide G. B. Meneghetti Adihele Zorzi Department of Information Engineering University of Padova, Italy Email: {harris,davide.meneghetti,zorzi}@dei.unipd.it

More information

This fact makes it difficult to evaluate the cost function to be minimized

This fact makes it difficult to evaluate the cost function to be minimized RSOURC LLOCTION N SSINMNT In the resoure alloation step the amount of resoures required to exeute the different types of proesses is determined. We will refer to the time interval during whih a proess

More information

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of

More information

On Dynamic Server Provisioning in Multi-channel P2P Live Streaming

On Dynamic Server Provisioning in Multi-channel P2P Live Streaming On Dynami Server Provisioning in Multi-hannel P2P Live Streaming Chuan Wu Baohun Li Shuqiao Zhao Department of Computer Siene Department of Eletrial Multimedia Development Group The University of Hong

More information

Direct-Mapped Caches

Direct-Mapped Caches A Case for Diret-Mapped Cahes Mark D. Hill University of Wisonsin ahe is a small, fast buffer in whih a system keeps those parts, of the ontents of a larger, slower memory that are likely to be used soon.

More information

COSSIM An Integrated Solution to Address the Simulator Gap for Parallel Heterogeneous Systems

COSSIM An Integrated Solution to Address the Simulator Gap for Parallel Heterogeneous Systems COSSIM An Integrated Solution to Address the Simulator Gap for Parallel Heterogeneous Systems Andreas Brokalakis Synelixis Solutions Ltd, Greee brokalakis@synelixis.om Nikolaos Tampouratzis Teleommuniation

More information

Rotation Invariant Spherical Harmonic Representation of 3D Shape Descriptors

Rotation Invariant Spherical Harmonic Representation of 3D Shape Descriptors Eurographis Symposium on Geometry Proessing (003) L. Kobbelt, P. Shröder, H. Hoppe (Editors) Rotation Invariant Spherial Harmoni Representation of 3D Shape Desriptors Mihael Kazhdan, Thomas Funkhouser,

More information

Tackling IPv6 Address Scalability from the Root

Tackling IPv6 Address Scalability from the Root Takling IPv6 Address Salability from the Root Mei Wang Ashish Goel Balaji Prabhakar Stanford University {wmei, ashishg, balaji}@stanford.edu ABSTRACT Internet address alloation shemes have a huge impat

More information

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,

More information

Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8

Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8 Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introdution... 1 1.1. Internet Information...2 1.2. Internet Information Retrieval...3 1.2.1. Doument Indexing...4 1.2.2. Doument Retrieval...4

More information

Reading Object Code. A Visible/Z Lesson

Reading Object Code. A Visible/Z Lesson Reading Objet Code A Visible/Z Lesson The Idea: When programming in a high-level language, we rarely have to think about the speifi ode that is generated for eah instrution by a ompiler. But as an assembly

More information

Type of document: Usebility Checklist

Type of document: Usebility Checklist Projet: JEGraph Type of doument: Usebility Cheklist Author: Max Bryan Version: 1.30 2011 Envidate GmbH Type of Doumet Developer guidelines User guidelines Dutybook Speifiation Programming and testing Test

More information

Boosted Random Forest

Boosted Random Forest Boosted Random Forest Yohei Mishina, Masamitsu suhiya and Hironobu Fujiyoshi Department of Computer Siene, Chubu University, 1200 Matsumoto-ho, Kasugai, Aihi, Japan {mishi, mtdoll}@vision.s.hubu.a.jp,

More information

SSD Based First Layer File System for the Next Generation Super-computer

SSD Based First Layer File System for the Next Generation Super-computer SSD Based First Layer File System for the Next Generation Super-omputer Shinji Sumimoto, Ph.D. Next Generation Tehnial Computing Unit FUJITSU LIMITED Sept. 24 th, 2018 0 Outline of This Talk A64FX: High

More information

特集 Road Border Recognition Using FIR Images and LIDAR Signal Processing

特集 Road Border Recognition Using FIR Images and LIDAR Signal Processing デンソーテクニカルレビュー Vol. 15 2010 特集 Road Border Reognition Using FIR Images and LIDAR Signal Proessing 高木聖和 バーゼル ファルディ Kiyokazu TAKAGI Basel Fardi ヘンドリック ヴァイゲル Hendrik Weigel ゲルド ヴァニーリック Gerd Wanielik This paper

More information

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis

More information

Performance Benchmarks for an Interactive Video-on-Demand System

Performance Benchmarks for an Interactive Video-on-Demand System Performane Benhmarks for an Interative Video-on-Demand System. Guo,P.G.Taylor,E.W.M.Wong,S.Chan,M.Zukerman andk.s.tang ARC Speial Researh Centre for Ultra-Broadband Information Networks (CUBIN) Department

More information

arxiv: v1 [cs.db] 13 Sep 2017

arxiv: v1 [cs.db] 13 Sep 2017 An effiient lustering algorithm from the measure of loal Gaussian distribution Yuan-Yen Tai (Dated: May 27, 2018) In this paper, I will introdue a fast and novel lustering algorithm based on Gaussian distribution

More information

Automated System for the Study of Environmental Loads Applied to Production Risers Dustin M. Brandt 1, Celso K. Morooka 2, Ivan R.

Automated System for the Study of Environmental Loads Applied to Production Risers Dustin M. Brandt 1, Celso K. Morooka 2, Ivan R. EngOpt 2008 - International Conferene on Engineering Optimization Rio de Janeiro, Brazil, 01-05 June 2008. Automated System for the Study of Environmental Loads Applied to Prodution Risers Dustin M. Brandt

More information

CleanUp: Improving Quadrilateral Finite Element Meshes

CleanUp: Improving Quadrilateral Finite Element Meshes CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)

More information

Reading Object Code. A Visible/Z Lesson

Reading Object Code. A Visible/Z Lesson Reading Objet Code A Visible/Z Lesson The Idea: When programming in a high-level language, we rarely have to think about the speifi ode that is generated for eah instrution by a ompiler. But as an assembly

More information

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes Deteting Outliers in High-Dimensional Datasets with Mixed Attributes A. Koufakou, M. Georgiopoulos, and G.C. Anagnostopoulos 2 Shool of EECS, University of Central Florida, Orlando, FL, USA 2 Dept. of

More information

An Efficient and Scalable Approach to CNN Queries in a Road Network

An Efficient and Scalable Approach to CNN Queries in a Road Network An Effiient and Salable Approah to CNN Queries in a Road Network Hyung-Ju Cho Chin-Wan Chung Dept. of Eletrial Engineering & Computer Siene Korea Advaned Institute of Siene and Tehnology 373- Kusong-dong,

More information

Unsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks

Unsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks Unsupervised Stereosopi Video Objet Segmentation Based on Ative Contours and Retrainable Neural Networks KLIMIS NTALIANIS, ANASTASIOS DOULAMIS, and NIKOLAOS DOULAMIS National Tehnial University of Athens

More information

Dynamic Backlight Adaptation for Low Power Handheld Devices 1

Dynamic Backlight Adaptation for Low Power Handheld Devices 1 Dynami Baklight Adaptation for ow Power Handheld Devies 1 Sudeep Pasriha, Manev uthra, Shivajit Mohapatra, Nikil Dutt and Nalini Venkatasubramanian 444, Computer Siene Building, Shool of Information &

More information

Joint Server Selection and Routing for Geo-Replicated Services

Joint Server Selection and Routing for Geo-Replicated Services Joint Server Seletion and Routing for Geo-Repliated Servies Srinivas Narayana, Wenjie Jiang, Jennifer Rexford, Mung Chiang Prineton University Abstrat The performane and osts of geo-repliated online servies

More information

arxiv:cs/ v1 [cs.ni] 12 Dec 2006

arxiv:cs/ v1 [cs.ni] 12 Dec 2006 Optimal Filtering for DDoS Attaks Karim El Defrawy ICS Dept. UC Irvine keldefra@ui.edu Athina Markopoulou EECS Dept. UC Irvine athina@ui.edu Katerina Argyraki EE Dept. Stanford Univ. argyraki@stanford.edu

More information

Distributed Resource Allocation Strategies for Achieving Quality of Service in Server Clusters

Distributed Resource Allocation Strategies for Achieving Quality of Service in Server Clusters Proeedings of the 45th IEEE Conferene on Deision & Control Manhester Grand Hyatt Hotel an Diego, CA, UA, Deember 13-15, 2006 Distributed Resoure Alloation trategies for Ahieving Quality of ervie in erver

More information

Adobe Certified Associate

Adobe Certified Associate Adobe Certified Assoiate About the Adobe Certified Assoiate (ACA) Program The Adobe Certified Assoiate (ACA) program is for graphi designers, Web designers, video prodution designers, and digital professionals

More information

CA API Management 8.x Implementation Proven Professional Exam (CAT-560) Study Guide Version 1.1

CA API Management 8.x Implementation Proven Professional Exam (CAT-560) Study Guide Version 1.1 Exam (CAT-560) Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized

More information

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah

More information

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communiations 1 RAC 2 E: Novel Rendezvous Protool for Asynhronous Cognitive Radios in Cooperative Environments Valentina Pavlovska,

More information

CA Agile Requirements Designer 2.x Implementation Proven Professional Exam (CAT-720) Study Guide Version 1.0

CA Agile Requirements Designer 2.x Implementation Proven Professional Exam (CAT-720) Study Guide Version 1.0 Exam (CAT-720) Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized

More information

Defect Detection and Classification in Ceramic Plates Using Machine Vision and Naïve Bayes Classifier for Computer Aided Manufacturing

Defect Detection and Classification in Ceramic Plates Using Machine Vision and Naïve Bayes Classifier for Computer Aided Manufacturing Defet Detetion and Classifiation in Cerami Plates Using Mahine Vision and Naïve Bayes Classifier for Computer Aided Manufaturing 1 Harpreet Singh, 2 Kulwinderpal Singh, 1 Researh Student, 2 Assistant Professor,

More information

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks 62 Uplink Channel Alloation Sheme and QoS Management Mehanism for Cognitive Cellular- Femtoell Networks Kien Du Nguyen 1, Hoang Nam Nguyen 1, Hiroaki Morino 2 and Iwao Sasase 3 1 University of Engineering

More information

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT?

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? 3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? Bernd Girod, Peter Eisert, Marus Magnor, Ekehard Steinbah, Thomas Wiegand Te {girod eommuniations Laboratory, University of Erlangen-Nuremberg

More information

Constructing Transaction Serialization Order for Incremental. Data Warehouse Refresh. Ming-Ling Lo and Hui-I Hsiao. IBM T. J. Watson Research Center

Constructing Transaction Serialization Order for Incremental. Data Warehouse Refresh. Ming-Ling Lo and Hui-I Hsiao. IBM T. J. Watson Research Center Construting Transation Serialization Order for Inremental Data Warehouse Refresh Ming-Ling Lo and Hui-I Hsiao IBM T. J. Watson Researh Center July 11, 1997 Abstrat In typial pratie of data warehouse, the

More information

Cluster-based Cooperative Communication with Network Coding in Wireless Networks

Cluster-based Cooperative Communication with Network Coding in Wireless Networks Cluster-based Cooperative Communiation with Network Coding in Wireless Networks Zygmunt J. Haas Shool of Eletrial and Computer Engineering Cornell University Ithaa, NY 4850, U.S.A. Email: haas@ee.ornell.edu

More information

Sparse Certificates for 2-Connectivity in Directed Graphs

Sparse Certificates for 2-Connectivity in Directed Graphs Sparse Certifiates for 2-Connetivity in Direted Graphs Loukas Georgiadis Giuseppe F. Italiano Aikaterini Karanasiou Charis Papadopoulos Nikos Parotsidis Abstrat Motivated by the emergene of large-sale

More information

A scheme for racquet sports video analysis with the combination of audio-visual information

A scheme for racquet sports video analysis with the combination of audio-visual information A sheme for raquet sports video analysis with the ombination of audio-visual information Liyuan Xing a*, Qixiang Ye b, Weigang Zhang, Qingming Huang a and Hua Yu a a Graduate Shool of the Chinese Aadamy

More information

Design and Analysis of a Robust Pipelined Memory System

Design and Analysis of a Robust Pipelined Memory System Design and Analysis of a obust Pipelined Memory System Hao ang 1 Haiquan (Chuk) Zhao 2 Bill Lin 1 Jun (Jim) Xu 2 1 Department of Eletrial and Computer Engineering, University of California, San Diego Email

More information

Incremental Mining of Partial Periodic Patterns in Time-series Databases

Incremental Mining of Partial Periodic Patterns in Time-series Databases CERIAS Teh Report 2000-03 Inremental Mining of Partial Periodi Patterns in Time-series Dataases Mohamed G. Elfeky Center for Eduation and Researh in Information Assurane and Seurity Purdue University,

More information

Divide-and-conquer algorithms 1

Divide-and-conquer algorithms 1 * 1 Multipliation Divide-and-onquer algorithms 1 The mathematiian Gauss one notied that although the produt of two omplex numbers seems to! involve four real-number multipliations it an in fat be done

More information

CA Single Sign-On 12.x Proven Implementation Professional Exam (CAT-140) Study Guide Version 1.5

CA Single Sign-On 12.x Proven Implementation Professional Exam (CAT-140) Study Guide Version 1.5 Study Guide Version 1.5 PROPRIETARY AND CONFIDENTIAL INFORMATION 2018 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized use,

More information

Allocating Rotating Registers by Scheduling

Allocating Rotating Registers by Scheduling Alloating Rotating Registers by Sheduling Hongbo Rong Hyunhul Park Cheng Wang Youfeng Wu Programming Systems Lab Intel Labs {hongbo.rong,hyunhul.park,heng..wang,youfeng.wu}@intel.om ABSTRACT A rotating

More information

DECT Module Installation Manual

DECT Module Installation Manual DECT Module Installation Manual Rev. 2.0 This manual desribes the DECT module registration method to the HUB and fan airflow settings. In order for the HUB to ommuniate with a ompatible fan, the DECT module

More information

CA Unified Infrastructure Management 8.x Implementation Proven Professional Exam (CAT-540) Study Guide Version 1.1

CA Unified Infrastructure Management 8.x Implementation Proven Professional Exam (CAT-540) Study Guide Version 1.1 Management 8.x Implementation Proven Professional Exam (CAT-540) Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information.

More information

Detection of RF interference to GPS using day-to-day C/No differences

Detection of RF interference to GPS using day-to-day C/No differences 1 International Symposium on GPS/GSS Otober 6-8, 1. Detetion of RF interferene to GPS using day-to-day /o differenes Ryan J. R. Thompson 1#, Jinghui Wu #, Asghar Tabatabaei Balaei 3^, and Andrew G. Dempster

More information

Gradient based progressive probabilistic Hough transform

Gradient based progressive probabilistic Hough transform Gradient based progressive probabilisti Hough transform C.Galambos, J.Kittler and J.Matas Abstrat: The authors look at the benefits of exploiting gradient information to enhane the progressive probabilisti

More information

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

Parametric Abstract Domains for Shape Analysis

Parametric Abstract Domains for Shape Analysis Parametri Abstrat Domains for Shape Analysis Xavier RIVAL (INRIA & Éole Normale Supérieure) Joint work with Bor-Yuh Evan CHANG (University of Maryland U University of Colorado) and George NECULA (University

More information

13.1 Numerical Evaluation of Integrals Over One Dimension

13.1 Numerical Evaluation of Integrals Over One Dimension 13.1 Numerial Evaluation of Integrals Over One Dimension A. Purpose This olletion of subprograms estimates the value of the integral b a f(x) dx where the integrand f(x) and the limits a and b are supplied

More information

CA Privileged Access Manager 3.x Proven Implementation Professional Exam (CAT-661) Study Guide Version 1.0

CA Privileged Access Manager 3.x Proven Implementation Professional Exam (CAT-661) Study Guide Version 1.0 Exam (CAT-661) Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFMATION 2018 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized

More information

8 Instruction Selection

8 Instruction Selection 8 Instrution Seletion The IR ode instrutions were designed to do exatly one operation: load/store, add, subtrat, jump, et. The mahine instrutions of a real CPU often perform several of these primitive

More information

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering A Novel Bit Level Time Series Representation with Impliation of Similarity Searh and lustering hotirat Ratanamahatana, Eamonn Keogh, Anthony J. Bagnall 2, and Stefano Lonardi Dept. of omputer Siene & Engineering,

More information