Parallelizing Frequent Web Access Pattern Mining with Partial Enumeration for High Speedup

Size: px
Start display at page:

Download "Parallelizing Frequent Web Access Pattern Mining with Partial Enumeration for High Speedup"

Transcription

1 Parallelizing Frequent Web Aess Pattern Mining with Partial Enumeration for High Peiyi Tang Markus P. Turkia Department of Computer Siene Department of Computer Siene University of Arkansas at Little Rok University of Arkansas at Little Rok Little Rok, AR Little Rok, AR Abstrat Abstrat The maximum speedup of diret parallelization of pattern-growth mining algorithms for long sequenes is limited by the load imbalane among the parallel tasks. In this paper, we present a sheme to parallelize pattern-growth mining algorithms using partial enumeration for high speedup. The experimental results show that partial enumeration inreases the ahievable speedup of parallel mining signifiantly for the databases with long sequenes. 1 Introdution A sequene is the fundamental mehanism to enode information and design as demonstrated by the biologial sequenes. This is the reason why data mining of frequent patterns from sequenes inluding web aess sequenes has attrated signifiant attention in reent years [1, 2, 3, 4, 5]. The omplexity of mining frequent patterns from sequene databases is inherently exponential due to the fat that patterns are sequenes themselves. The searh spae of frequent patterns grows exponentially as the length of the patterns inreases. One way to ope with this omplexity is to use parallel omputers for the mining. In this paper, we fous on parallelizing the pattern-growth frequent pattern mining algorithms [1, 5, 6]. The major problems in diret parallelizing the pattern-growth algorithms are two-fold: (1) Beause the pattern-growth algorithms are reursive algorithms, the number of parallel tasks that an be found is limited by the number of the symbols used in the sequenes. (2) Aording to empirial studies, the exeution times of these parallel tasks vary signifiantly. Supported in part by NASA and the Arkansas Spae Grant Consortium under Grant UALR The maximum speedup ahievable is limited by the longest task, even thought more parallel proessors are available. In this paper, we propose to use partial enumeration to parallelize the pattern-growth mining algorithms to solve the problems above. Partial enumeration is a tehnique to extend the pattern-growth algorithms so that the frequent patterns an grow faster with more than one symbol at a time [7]. It was shown in [7] that the sequential mining time an be redued by partial enumeration for the databases with long sequenes. The purpose of using partial enumeration in this paper is to inrease the number of tasks beyond the number of symbols and, more importantly, to have better load-balaned parallel tasks to ahieve high speedup. Our experimental results show that partial enumeration an inrease the speedup of parallel mining signifiantly for the databases with long sequenes. The rest of the paper is organized as follows. In Setion 2, we introdue the tehnique of partial enumeration and show why it an inrease the maximum speedup ahievable in the parallel mining. In Setion 3, we desribe the sheme to parallelize the patterngrowth mining algorithm [6] using partial enumeration [7]. The experimental results and the onlusion of the paper are presented in Setion 4. 2 Partial Enumeration for High Let Σ be the set of symbols used to onstrut sequenes. A web aess sequene s is a sequene of finite number of symbols from Σ, s = σ 1 σ m (σ i Σ for all 1 i m < and s i and s j are not neessarily different for i j). A web aess database D is a multiset of web aess sequenes. A pattern is also a web aess sequene. A web aess sequene s = σ 1 σ n is a subsequene of sequene s = σ 1 σ m, denoted as s s, if and only if there exist i 1,, i n (n m) suh 163

2 eplaements that 1 i 1 < < i n m and σ j = σ i j for all 1 j n. A web sequene s is said to support a pattern p if p is a subsequene of s. The support of pattern p in database D, denoted as Sup D (p), is the number of sequenes in D that support p. Given a threshold ξ in interval (0, 1], a pattern p is frequent with respet to ξ and D if Sup D (p) ξ D, where D is the number of sequenes in D. ξ D is alled the absolute threshold and denoted by η. The web aess pattern mining problem is to find all the frequent patterns with respet to ξ and D. Figure 1 illustrates the searh spae for the frequent patterns from the symbol set Σ = {a, b,. a b a ɛ a b a b aa ab a ba bb b a b a b a b a b a b aaa a baa b aa b a b a b Figure 1: Searh Spae Tree a b a b a b a b The pattern-growth algorithms [1, 5, 6] grow frequent patterns by one symbol at a time. The abstrat form of the pattern-growth algorithm [6] is shown in Figure 2. The pattern-growth algorithms [1, 5, 6] are funtion Pattern-Grow(pattern q, database D) { F ; for eah σ in Σ do if (Sup D(σ) η) then F F {q σ; Construt projetion database D σ; F Pattern-Grow(q σ, D σ); F F F ; endfor return F ; Figure 2: Pattern-Growth without Enumeration all based on the priniple of onditional searhing. D σ is the σ-projetion database of D. It onsists of all the σ-projetions of the sequenes in D that support σ. The σ-projetion of a sequene is what left after the prefix from the first symbol up to the first ourrene of σ (inlusive) is deleted. For example, the b-projetion of aabba is ba beause its prefix up to the first ourrene of b as underlined is aab. It an be proved that the support of pattern p in D σ is equal to the support of pattern σ p in D, i.e. Sup D (σ p) = Sup Dσ (p). The details for the priniple of onditional searhing an be found in [6]. The set of all frequent patterns in D, thus, an be found by invoking Pattern-Grow(ɛ, D) in Figure 2 (ɛ is the empty pattern). Sine the pattern-growth algorithms are all reursive algorithms as shown in Figure 2, the only way to parallelize them is to turn the for loop of the top level all into a parallel loop and alloate the tasks of mining the frequent patterns starting with individual symbols to parallel proessors. It is obvious that the maximum speedup of this parallelization is bound by the number of symbols in Σ. For example, we an use only three proessors for the parallel mining for the searh spae in Figure 1 and the maximum speedup is 3. Many important appliations do not have large number of symbols (DNA sequenes have four symbols of nuleotides and protein sequenes have 20 symbols of amino aids). The maximum speedup is further limited by the load imbalane of these tasks. We onduted an empirial study about the exeution times of these tasks and found that they vary signifiantly. Task Times in Seonds Task Times of N=12 and threshold=0.005 task times Task Number Figure 3: Task Times for N=12, C=16, D=00 Figure 3 shows the task times of the 12 tasks of the FLWAP-tree mining [6] on a 497 MHtz Pentium III proessor for a dataset with N = 12 symbols generated by the IBM data generator. The dataset has D=00 sequenes and the average length of the sequenes is C = 16. The threshold ξ is The task with the largest exeution time, whih we alled supertask, is task 12. It takes seonds to omplete. The total exeution time of all the tasks is seonds. If we run the mining on parallel proessors, the parallel exeution time is at least the task time of the supertask. The maximum speedup that an be ahieved is, thus, /3.079 = 5.03, even though more parallel proessors are available. In general, if T 1,, T n be the task times of the total n parallel tasks of mining, the maximum speedup 164

3 eplaements ahievable by parallel mining is SP M = T T n max(t 1,, T n ) Maximum with different k k=3 k=2 k= Number of Symbols, N Figure 4: Maximum s SP M (1) We also onduted an empirial study of the task times for the datasets with N = 2,, 12 symbols, C = 16 and ξ = The maximum speedups for these datasets alulated by (1) are plotted on the line labeled k=1 in Figure 4. They are between 1.64 and 5.02, way below the number of the tasks (whih is N), due to the load imbalane of the tasks. In order to raise the maximum speedup for parallel mining, the work loads of parallel tasks need to be better balaned. We have extended the patterngrowth mining with partial enumeration [7] to grow the frequent patterns by more than one symbol at a time 1. Figure 5 [7] shows the re-arranged searh spae ɛ a b bb dd aa d a b aa ab ba bb d d d dd d dd a b a ad... bb dd a bb add aaa aab... aabb aa... aadd da... a dd bb dbb da... dbb d... ddd Figure 5: Searh Spae by Partial Enumeration to illustrate the idea of partial enumeration. The symbol set Σ = {a, b,, d is first partitioned to disjoint subsets Σ 1 = {a, b and Σ 2 = {, d. For eah subset, the enumerations of the non-empty patterns of length no more than the size of the subset are alled partial enumerations. For example, the partial enumerations from Σ 1 = {a, b are a, b, aa, ab, ba, bb. The set of partial enumerations from the symbol subset Σ j 1 The experimental evaluation shows that the pattern-growth mining with partial enumeration [7] outperforms the patterngrowth mining without enumeration [6] for the datasets with long sequenes. funtion Pattern-Grow(pattern q, int i, database D) { F ; for j = 1, l do if (j i) then Construt apriori enumerator Enum(Σ j); 1: while (p Enum.Next()) is not null) do 2: if (Sup) D(p) η) then 3: Construt the p-projetion database D p,σj ; Call Enum.Confirm(p) to report p is frequent; F F {q p; if ( p = Σ j ) then F Pattern-Grow(q p, 0, D p,σj ); F Pattern-Grow(q p, j, D p,σj ); F F F ; Delete apriori enumerator Enum; endfor return F ; Figure 6: Pattern-Growth with Partial Enumeration is denoted by E(Σ j ). The searh spae is re-arranged as follows. The empty pattern ɛ at the root node grows with the partial enumerations from both Σ 1 = {a, b and Σ 2 = {, d. For eah of the other nodes, if it was grown from its parent node with a partial enumeration shorter than the size of the symbol subset, it will not be extended with the same symbol subset. The reason is to prevent repeating the same pattern in the searh spae tree. For example, pattern a is grown from the empty pattern ɛ with partial enumeration a whose length is less than 2, the size of Σ 1 = {a, b. Therefore, pattern a grows with the partial enumerations from Σ 2 = {, d only, namely, d,, d, d, dd. If it grows with the partial enumerations from Σ 1 = {a, b, we would have patterns aa and ab as its hildren. But, aa and ab are already enumerated along with a as the hildren of the root node ɛ. Patterns aa and ab would be mined twie if they are frequent. On the other hand, if a node is grown from its parent with a partial enumeration of the length equal to the size of the symbol subset, it should be extended with the partial enumerations of all symbol subsets. For instane, pattern aa is grown from the parent node (the empty pattern ɛ) with partial enumeration aa whose length is 2, the size of Σ 1 = {a, b. It should ontinue to grow with the partial enumerations from both Σ 1 = {a, b and Σ 2 = {, d. In partiular, the growth from pattern aa with the partial enumerations from Σ 1 = {a, b 165

4 funtion Mine(enum p, int j, database D) { if (Sup D(p) η) then Report to the Master that p of E(Σ j) is frequent; F {p; Construt projetion database D p,σj ; if ( p = Σ j ) then F Pattern-Grow(p, 0, D p,σj ); F Pattern-Grow(p, j, D p,σj ); F F F ; Send F to the Master and request a next task; Report to Master that p of E(Σ j) is infrequent and request a next task; main-slave() { Input the database D; Send a task Request to Master Proessor; Reeive a task (p, j) from Master Proessor; while (task is not null) do Mine(p, j, D); Reeive a task (p, j) from Master Proessor; Figure 7: Algorithm for Slave Proessors will not dupliate any patterns enumerated. When enumerating the partial enumerations from E(Σ j ), the downward enlosure property should be used to prune away the infrequent enumerations if their subsequenes are known to be infrequent. For example, if a from E({a, b) is infrequent, then aa, ab, ba from E({a, b) are also infrequent and should not be enumerated. This is alled apriori partial enumeration. Figure 6 shows the frequent pattern mining algorithm with apriori partial enumeration [7]. The apriori partial enumerations p from E(Σ j ) are obtained by alling the Next() funtion of the apriori partial enumerator Enum, reated for Σ j. If p is frequent in D (Sup D (p) η), the p-projetion database of D, denoted as D p,σj, is onstruted. The apriori partial enumerator Enum is also informed that p is frequent. D p,σj onsists of p-projetions of the sequenes in D that support p. The p-projetion of sequene s supporting p is what left after the p-prefix of s is deleted. The p-prefix of s is the minimal prefix of s that supports p. It is assumed in Figure 6 that the symbol set Σ is partitioned to l subsets, Σ = Σ 1 Σ l. It an be proved that eah frequent pattern will be mined only one by the algorithm in Figure 6 [7]. The set of frequent patterns in the original database D is mined by alling Pattern-Grow(ɛ, 0, D). Eah apriori partial enumeration p obtained in line 1 of Figure 6 represents a task of mining the orresponding projetion database, D p,σj. We onduted an empirial study of the exeution times of these tasks and found that the work loads of these tasks are muh better balaned. As a result, the maximum speedup alulated by (1) is raised. We partition the symbol set Σ to l = N k subsets, where N = Σ. The first l 1 subsets have the size of k and the size of the last subset may be less than k. When k = 1 (and thus l = N), the algorithm in Figure 6 degenerates to the mining algorithm without enumeration as shown in Figure 2. The plots labeled k=2 and k=3 in Figure 4 are the maximum speedups of the tasks with partial enumeration for the same datasets with N = 2,, 12, C=16, and ξ= The maximum speedup for k = 2 is higher than that of k = 1 for every value of N. When k = 3, the maximum speedups are higher than k = 2 exept for the ase of N = 4. These empirial studies show that partial enumeration an raise the maximum speedup ahievable in parallel mining of frequent patterns. 3 Parallelization The parallel tasks represented by apriori partial enumerations p from E(Σ j ) for all j, denoted by task (p,j), are sheduled by the master proessor and exeuted by the slave proessors. The ode for parallel task (p, j) is shown in Figure 7. Eah slave proessor starts by inputting the original database D and sending a task request to the master proessor. Then it reeives a task (p, j) and exeutes it by alling Mine(p, j, D) repeatedly until it reeives a null task signifying that all the tasks have been alloated. The main funtion of slave proessors is main-slave() shown in Figure 7. Slave Master Task Manager T Enum Enum P,W, Q... Sheduler next task urrent state buff P,W, Q... Slave Slave Slave Figure 8: Software Arhiteture of Parallel Proessors Figure 8 shows the software arhiteture of the 166

5 system. The master proessor runs a dynami sheduler. The basi funtion of the sheduler is to interat with the task manager T to get parallel tasks and alloate them to the slave proessors dynamially. The sheduler of the master proessor ommuniates with the slave proessors through the messages as follows: Slave proessor S i sends task request Req(S i ) to the master proessor. The master proessor sends task (p, j) (or a null task signifying that all the tasks are alloated) to slave proessor S i in response to the task request Req(S i ). Slave proessor S i sends a Report to the master proessor about whether p is frequent in D in response to the task (p, j). Slave proessor S i sends the set of frequent patterns it mined for the task (p, j) to the master proessor, if p is frequent. Upon Reeiving task request Req(S i) from S i { if (urrent-state is wait) then Enqueue S i into buffer buff; if (urrent-state is ready) then Send task (p, j) held in next-task to S i; T.Update(urrent-task, urrent-state); // urrent-state is done Send null task to slave proessor S i; Upon Reeiving a report Report(p, j, freq) { Pass the report to the task manager T by alling T.Report(p,j,freq); if (urrent-state is wait) then T.Update(urrent-task, urrent-state); while ( urrent-state is ready and buff is not empty) do S buff.dequeue(); Send task (p, j) held in next-state to slave proessor S; T.Update(urrent-task, urrent-state); while (urrent-state is done and buff is not empty) do S buff.dequeue(); Send the null task to slave proessor S; Figure 9: The Protool of the Sheduler As shown in main-slave() in Figure 7, the slave proessors piggy-bak the request for the next task to the report of infrequent p or the set of frequent patterns mined. However, the report that p is frequent is sent as soon as it is known before the mining starts. This allows the master to generate further parallel tasks at the earliest possible time. The sheduler has two variables next-task and urrent-state (see Figure 8). The next-task holds the next task (p, j) ready to be dispathed to any slave proessor that requests a task. The urrent-state tells the urrent state of the sheduler. It an hold one of the three states as follows: ready: next-task holds a task ready to be dispathed. wait: There is no task ready to be dispathed and further tasks are pending. done: All the tasks have been generated. The task manager T has two funtions to be alled by the sheduler: Update(next-task, urrent-state) to update nexttask and urrent-state. Report(p, j, freq) to report that the pattern p of task (p, j) is frequent(freq being true) or not (freq being false). The main funtion of the sheduler is a finite state mahine protool responding to the task requests and the reports sent from the slave proessors. The sheduler also has a buffer queue, buff, to hold the slave proessors that are waiting for tasks. The protool of the sheduler is shown in Figure 9. The task manager T manages l apriori enumerators Enum j (j = 1,, l), one for eah symbol subset Σ j. The details of the task manager T an be found in [8]. 4 Experimental Results and Conlusion We have implemented our parallel web aess pattern mining with MPI on a luster of workstations. Two datasets, N4C17D1KS4 and N6C16D1KS4, are generated by the IBM data generator for the experiments. In the names of the datasets, we use N for the number of symbols, i.e. Σ, C for the average length of the sequenes of the database, D for the size of the database (in thousands). Both datasets were mined using threshold ξ = We run the parallel mining for the datasets N4C17D1KS4 and N6C16D1KS4 with k = 1, 2, 4 and k = 1, 2, 3, 6, respetively. The number of parallel 167

6 slave proessors varying from 1 to 13. Eah slave proessor is a 497 MHtz Pentium III proessor. The master is a 997 MHtz Pentium III proessor. Figures (a) and (b) show the speedup of the parallel exeutions over the sequential mining without enumeration enumeration [6] of datasets N4C17D1KS4 and N6C16D1KS4, respetively. Figures (a) shows that k = 4 allows the speedup to inrease as the number of proessors inreases. The k = 3 and k = 6 do the same for dataset N6C16D1KS4 as shown in Figure (b). This is beause with large k values the partial enumeration generates more and better loadbalaned parallel tasks and, thus, allows more parallel proessors to be used to redue the exeution time. Note that the speedup of k = 3 for N6C16D1KS4 is higher than that of k = 6. This is beause with k = 6 the partial enumeration generates many smaller parallel tasks and the ommuniation overhead between the master and slave proessors slows down the parallel exeution k=1 k=2 k=4 over k=1 Sequential Exeution Number of Parallel Proessors (a) Dataset N4C17D1KS4 over k=1 Sequential Exeution k=1 k=2 k=3 k= Number of Parallel Proessors (b) Dataset N6C16D1KS4 Figure : over Sequential Mining We have presented a sheme to parallelize the pattern-growth frequent pattern mining algorithms using partial enumeration. We have shown that partial enumeration an inrease the speedup ahievable by providing better load-balaned parallel tasks. Previous works on parallelizing the sequential pattern mining suh as [9] use diret parallelization and only the databases with short sequenes are used. Referenes [1] Jian Pei, Jiawei Han, Behzad Mortazavi-asl, and Hua Zhu. Mining aess patterns effiiently from web logs. In Proeedings of the 4th Paifi-Asia Conferene on Knowledge Disovery and Data Mining (PAKDD 00), pages Leture Notes in Computer Siene, Vol. 1805, [2] J. Ayres, J. Flannik, J. Gehrke, and T. Yiu. Sequential pattern mining using a bitmap representation. In Proeedings of the eighth ACM SIGKDD International Conferene on Knowledge Disovery and Data Mining, pages , [3] J. Wang and J. Han. BIDE: Effiient mining of frequent losed sequenes. In Proeedings of the 20th International Conferene on Data Engineering (ICDE 04), pages 79 90, [4] Ke Wang, Yabo Xu, and Jeffery Xu Yu. Salable sequential pattern mining for biologial sequenes. In In Proeedings of the Thirteenth ACM International Conferene on Information and knowledge management (CIKM 04), pages , November [5] C.I. Ezeife and Yi Lu. Mining web log sequential patterns with position oded pre-order linked WAP-tree. International Journal of Data Mining and Knowledge Disovery, :5 38, [6] Peiyi Tang, Markus P. Turkia, and Kyle A. Gallivan. Mining web aess patterns with first-ourrene linked WAP-trees. In Proeedings of the 16th International Conferene on Software Engineering and Data Engineering (SEDE 07), pages , Las Vegas, USA, July [7] Peiyi Tang and Markus P. Turkia. Mining frequent web aess patterns with partial enumeration. In Proeedings of the 45 th Annual Assoiation for Computing Mahinery Southeast Conferene (ACMSE 07), pages , Winston-Salem, NC, USA, Marh [8] Peiyi Tang and Markus P. Turkia. Parallelizing frequent web aess pattern mining with partial enumeration for high speedup. Tehnial Report titus.ompsi.ualr.edu/~ptang/papers/parwap.pdf, Dept of CS, UALR, [9] Shengnan Cong, Jiawei Han, and David Padua. Parallel mining of losed sequential patterns. In Proeeding of the Eleventh ACM SIGKDD International Conferene on Knowledge Disovery in Data Mining, pages ,

Mining Web Access Patterns with First-Occurrence Linked WAP-Trees

Mining Web Access Patterns with First-Occurrence Linked WAP-Trees Mining Web Access Patterns with First-Occurrence Linked WAP-Trees Peiyi Tang Markus P. Turkia Kyle A. Gallivan Dept of Computer Science Dept of Computer Science School of Computational Science Univ of

More information

Gray Codes for Reflectable Languages

Gray Codes for Reflectable Languages Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings

More information

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer

More information

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering A Novel Bit Level Time Series Representation with Impliation of Similarity Searh and lustering hotirat Ratanamahatana, Eamonn Keogh, Anthony J. Bagnall 2, and Stefano Lonardi Dept. of omputer Siene & Engineering,

More information

Parallelizing Frequent Itemset Mining with FP-Trees

Parallelizing Frequent Itemset Mining with FP-Trees Parallelizing Frequent Itemset Mining with FP-Trees Peiyi Tang Markus P. Turkia Department of Computer Science Department of Computer Science University of Arkansas at Little Rock University of Arkansas

More information

HEXA: Compact Data Structures for Faster Packet Processing

HEXA: Compact Data Structures for Faster Packet Processing Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for

More information

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425) Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University

More information

Incremental Mining of Partial Periodic Patterns in Time-series Databases

Incremental Mining of Partial Periodic Patterns in Time-series Databases CERIAS Teh Report 2000-03 Inremental Mining of Partial Periodi Patterns in Time-series Dataases Mohamed G. Elfeky Center for Eduation and Researh in Information Assurane and Seurity Purdue University,

More information

Implementing Load-Balanced Switches With Fat-Tree Networks

Implementing Load-Balanced Switches With Fat-Tree Networks Implementing Load-Balaned Swithes With Fat-Tree Networks Hung-Shih Chueh, Ching-Min Lien, Cheng-Shang Chang, Jay Cheng, and Duan-Shin Lee Department of Eletrial Engineering & Institute of Communiations

More information

Batch Auditing for Multiclient Data in Multicloud Storage

Batch Auditing for Multiclient Data in Multicloud Storage Advaned Siene and Tehnology Letters, pp.67-73 http://dx.doi.org/0.4257/astl.204.50. Bath Auditing for Multilient Data in Multiloud Storage Zhihua Xia, Xinhui Wang, Xingming Sun, Yafeng Zhu, Peng Ji and

More information

Space- and Time-Efficient BDD Construction via Working Set Control

Space- and Time-Efficient BDD Construction via Working Set Control Spae- and Time-Effiient BDD Constrution via Working Set Control Bwolen Yang Yirng-An Chen Randal E. Bryant David R. O Hallaron Computer Siene Department Carnegie Mellon University Pittsburgh, PA 15213.

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department

More information

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes Deteting Outliers in High-Dimensional Datasets with Mixed Attributes A. Koufakou, M. Georgiopoulos, and G.C. Anagnostopoulos 2 Shool of EECS, University of Central Florida, Orlando, FL, USA 2 Dept. of

More information

This fact makes it difficult to evaluate the cost function to be minimized

This fact makes it difficult to evaluate the cost function to be minimized RSOURC LLOCTION N SSINMNT In the resoure alloation step the amount of resoures required to exeute the different types of proesses is determined. We will refer to the time interval during whih a proess

More information

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks A Dual-Hamiltonian-Path-Based Multiasting Strategy for Wormhole-Routed Star Graph Interonnetion Networks Nen-Chung Wang Department of Information and Communiation Engineering Chaoyang University of Tehnology,

More information

Tackling IPv6 Address Scalability from the Root

Tackling IPv6 Address Scalability from the Root Takling IPv6 Address Salability from the Root Mei Wang Ashish Goel Balaji Prabhakar Stanford University {wmei, ashishg, balaji}@stanford.edu ABSTRACT Internet address alloation shemes have a huge impat

More information

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient

More information

1 The Knuth-Morris-Pratt Algorithm

1 The Knuth-Morris-Pratt Algorithm 5-45/65: Design & Analysis of Algorithms September 26, 26 Leture #9: String Mathing last hanged: September 26, 27 There s an entire field dediated to solving problems on strings. The book Algorithms on

More information

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based

More information

13.1 Numerical Evaluation of Integrals Over One Dimension

13.1 Numerical Evaluation of Integrals Over One Dimension 13.1 Numerial Evaluation of Integrals Over One Dimension A. Purpose This olletion of subprograms estimates the value of the integral b a f(x) dx where the integrand f(x) and the limits a and b are supplied

More information

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of

More information

XML Data Streams. XML Stream Processing. XML Stream Processing. Yanlei Diao. University of Massachusetts Amherst

XML Data Streams. XML Stream Processing. XML Stream Processing. Yanlei Diao. University of Massachusetts Amherst XML Stream Proessing Yanlei Diao University of Massahusetts Amherst XML Data Streams XML is the wire format for data exhanged online. Purhase orders http://www.oasis-open.org/ommittees/t_home.php?wg_abbrev=ubl

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

arxiv: v1 [cs.db] 13 Sep 2017

arxiv: v1 [cs.db] 13 Sep 2017 An effiient lustering algorithm from the measure of loal Gaussian distribution Yuan-Yen Tai (Dated: May 27, 2018) In this paper, I will introdue a fast and novel lustering algorithm based on Gaussian distribution

More information

Accommodations of QoS DiffServ Over IP and MPLS Networks

Accommodations of QoS DiffServ Over IP and MPLS Networks Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering

More information

Boosted Random Forest

Boosted Random Forest Boosted Random Forest Yohei Mishina, Masamitsu suhiya and Hironobu Fujiyoshi Department of Computer Siene, Chubu University, 1200 Matsumoto-ho, Kasugai, Aihi, Japan {mishi, mtdoll}@vision.s.hubu.a.jp,

More information

Recursion examples: Problem 2. (More) Recursion and Lists. Tail recursion. Recursion examples: Problem 2. Recursion examples: Problem 3

Recursion examples: Problem 2. (More) Recursion and Lists. Tail recursion. Recursion examples: Problem 2. Recursion examples: Problem 3 Reursion eamples: Problem 2 (More) Reursion and s Reursive funtion to reverse a string publi String revstring(string str) { if(str.equals( )) return str; return revstring(str.substring(1, str.length()))

More information

Cluster-Based Cumulative Ensembles

Cluster-Based Cumulative Ensembles Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

Computing Pool: a Simplified and Practical Computational Grid Model

Computing Pool: a Simplified and Practical Computational Grid Model Computing Pool: a Simplified and Pratial Computational Grid Model Peng Liu, Yao Shi, San-li Li Institute of High Performane Computing, Department of Computer Siene and Tehnology, Tsinghua University, Beijing,

More information

Naïve Bayesian Rough Sets Under Fuzziness

Naïve Bayesian Rough Sets Under Fuzziness IJMSA: Vol. 6, No. 1-2, January-June 2012, pp. 19 25 Serials Publiations ISSN: 0973-6786 Naïve ayesian Rough Sets Under Fuzziness G. GANSAN 1,. KRISHNAVNI 2 T. HYMAVATHI 3 1,2,3 Department of Mathematis,

More information

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Arne Hamann, Razvan Rau, Rolf Ernst Institute of Computer and Communiation Network Engineering Tehnial University of Braunshweig,

More information

Exploring the Commonality in Feature Modeling Notations

Exploring the Commonality in Feature Modeling Notations Exploring the Commonality in Feature Modeling Notations Miloslav ŠÍPKA Slovak University of Tehnology Faulty of Informatis and Information Tehnologies Ilkovičova 3, 842 16 Bratislava, Slovakia miloslav.sipka@gmail.om

More information

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization Self-Adaptive Parent to Mean-Centri Reombination for Real-Parameter Optimization Kalyanmoy Deb and Himanshu Jain Department of Mehanial Engineering Indian Institute of Tehnology Kanpur Kanpur, PIN 86 {deb,hjain}@iitk.a.in

More information

splitting tehniques that partition live ranges have been proposed to solve both the spilling problem[5][8] and the assignment problem[8][9]. The parti

splitting tehniques that partition live ranges have been proposed to solve both the spilling problem[5][8] and the assignment problem[8][9]. The parti Load/Store Range Analysis for Global Register Alloation Priyadarshan Kolte and Mary Jean Harrold Department of Computer Siene Clemson University Abstrat Live range splitting tehniques divide the live ranges

More information

TMIX: Temporal Model for Indexing XML Documents

TMIX: Temporal Model for Indexing XML Documents TMIX: Temporal Model for Indexing XML Douments Rasha Bin-Thalab Department of Information System Faulty of omputers and Information Cairo University, Egypt azi_z30@yahoo.om Neamat El-Tazi Department of

More information

Sequential Incremental-Value Auctions

Sequential Incremental-Value Auctions Sequential Inremental-Value Autions Xiaoming Zheng and Sven Koenig Department of Computer Siene University of Southern California Los Angeles, CA 90089-0781 {xiaominz,skoenig}@us.edu Abstrat We study the

More information

mahines. HBSP enhanes the appliability of the BSP model by inorporating parameters that reet the relative speeds of the heterogeneous omputing omponen

mahines. HBSP enhanes the appliability of the BSP model by inorporating parameters that reet the relative speeds of the heterogeneous omputing omponen The Heterogeneous Bulk Synhronous Parallel Model Tiani L. Williams and Rebea J. Parsons Shool of Computer Siene University of Central Florida Orlando, FL 32816-2362 fwilliams,rebeag@s.uf.edu Abstrat. Trends

More information

Multi-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks

Multi-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks Multi-hop Fast Conflit Resolution Algorithm for Ad Ho Networks Shengwei Wang 1, Jun Liu 2,*, Wei Cai 2, Minghao Yin 2, Lingyun Zhou 2, and Hui Hao 3 1 Power Emergeny Center, Sihuan Eletri Power Corporation,

More information

Folding. Hardware Mapped vs. Time multiplexed. Folding by N (N=folding factor) Node A. Unfolding by J A 1 A J-1. Time multiplexed/microcoded

Folding. Hardware Mapped vs. Time multiplexed. Folding by N (N=folding factor) Node A. Unfolding by J A 1 A J-1. Time multiplexed/microcoded Folding is verse of Unfolding Node A A Folding by N (N=folding fator) Folding A Unfolding by J A A J- Hardware Mapped vs. Time multiplexed l Hardware Mapped vs. Time multiplexed/mirooded FI : y x(n) h

More information

arxiv: v1 [cs.gr] 10 Apr 2015

arxiv: v1 [cs.gr] 10 Apr 2015 REAL-TIME TOOL FOR AFFINE TRANSFORMATIONS OF TWO DIMENSIONAL IFS FRACTALS ELENA HADZIEVA AND MARIJA SHUMINOSKA arxiv:1504.02744v1 s.gr 10 Apr 2015 Abstrat. This work introdues a novel tool for interative,

More information

COMP 181. Prelude. Intermediate representations. Today. Types of IRs. High-level IR. Intermediate representations and code generation

COMP 181. Prelude. Intermediate representations. Today. Types of IRs. High-level IR. Intermediate representations and code generation Prelude COMP 181 Intermediate representations and ode generation November, 009 What is this devie? Large Hadron Collider What is a hadron? Subatomi partile made up of quarks bound by the strong fore What

More information

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis

More information

Trajectory Tracking Control for A Wheeled Mobile Robot Using Fuzzy Logic Controller

Trajectory Tracking Control for A Wheeled Mobile Robot Using Fuzzy Logic Controller Trajetory Traking Control for A Wheeled Mobile Robot Using Fuzzy Logi Controller K N FARESS 1 M T EL HAGRY 1 A A EL KOSY 2 1 Eletronis researh institute, Cairo, Egypt 2 Faulty of Engineering, Cairo University,

More information

Path Diversity for Overlay Multicast Streaming

Path Diversity for Overlay Multicast Streaming Path Diversity for Overlay Multiast Streaming Matulya Bansal and Avideh Zakhor Department of Eletrial Engineering and Computer Siene University of California, Berkeley Berkeley, CA 9472 {matulya, avz}@ees.berkeley.edu

More information

Total 100

Total 100 CS331 SOLUTION Problem # Points 1 10 2 15 3 25 4 20 5 15 6 15 Total 100 1. ssume you are dealing with a ompiler for a Java-like language. For eah of the following errors, irle whih phase would normally

More information

We don t need no generation - a practical approach to sliding window RLNC

We don t need no generation - a practical approach to sliding window RLNC We don t need no generation - a pratial approah to sliding window RLNC Simon Wunderlih, Frank Gabriel, Sreekrishna Pandi, Frank H.P. Fitzek Deutshe Telekom Chair of Communiation Networks, TU Dresden, Dresden,

More information

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1. Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,

More information

Performance Benchmarks for an Interactive Video-on-Demand System

Performance Benchmarks for an Interactive Video-on-Demand System Performane Benhmarks for an Interative Video-on-Demand System. Guo,P.G.Taylor,E.W.M.Wong,S.Chan,M.Zukerman andk.s.tang ARC Speial Researh Centre for Ultra-Broadband Information Networks (CUBIN) Department

More information

Dynamic Programming. Lecture #8 of Algorithms, Data structures and Complexity. Joost-Pieter Katoen Formal Methods and Tools Group

Dynamic Programming. Lecture #8 of Algorithms, Data structures and Complexity. Joost-Pieter Katoen Formal Methods and Tools Group Dynami Programming Leture #8 of Algorithms, Data strutures and Complexity Joost-Pieter Katoen Formal Methods and Tools Group E-mail: katoen@s.utwente.nl Otober 29, 2002 JPK #8: Dynami Programming ADC (214020)

More information

the data. Structured Principal Component Analysis (SPCA)

the data. Structured Principal Component Analysis (SPCA) Strutured Prinipal Component Analysis Kristin M. Branson and Sameer Agarwal Department of Computer Siene and Engineering University of California, San Diego La Jolla, CA 9193-114 Abstrat Many tasks involving

More information

Parallel Block-Layered Nonbinary QC-LDPC Decoding on GPU

Parallel Block-Layered Nonbinary QC-LDPC Decoding on GPU Parallel Blok-Layered Nonbinary QC-LDPC Deoding on GPU Huyen Thi Pham, Sabooh Ajaz and Hanho Lee Department of Information and Communiation Engineering, Inha University, Inheon, 42-751, Korea Abstrat This

More information

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification erformane Improvement of TC on Wireless Cellular Networks by Adaptive Combined with Expliit Loss tifiation Masahiro Miyoshi, Masashi Sugano, Masayuki Murata Department of Infomatis and Mathematial Siene,

More information

Social Network Analysis Based on BSP Clustering Algorithm

Social Network Analysis Based on BSP Clustering Algorithm Communiations of the IIMA Volume 7 Issue 4 Artile 5 7 Soial Network Analysis Based on BSP Clustering Algorithm ong Shool of Business Administration China University of Petroleum Follow this and additional

More information

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY Dileep P, Bhondarkor Texas Instruments Inorporated Dallas, Texas ABSTRACT Charge oupled devies (CCD's) hove been mentioned as potential fast auxiliary

More information

Automated System for the Study of Environmental Loads Applied to Production Risers Dustin M. Brandt 1, Celso K. Morooka 2, Ivan R.

Automated System for the Study of Environmental Loads Applied to Production Risers Dustin M. Brandt 1, Celso K. Morooka 2, Ivan R. EngOpt 2008 - International Conferene on Engineering Optimization Rio de Janeiro, Brazil, 01-05 June 2008. Automated System for the Study of Environmental Loads Applied to Prodution Risers Dustin M. Brandt

More information

Computational Biology 6.095/6.895 Database Search Lecture 5 Prof. Piotr Indyk

Computational Biology 6.095/6.895 Database Search Lecture 5 Prof. Piotr Indyk Computational Biology 6.095/6.895 Database Searh Leture 5 Prof. Piotr Indyk Previous letures Leture -3: Global alignment in O(mn) Dynami programming Leture -2: Loal alignment, variants, in O(mn) Leture

More information

Architecture and Performance of the Hitachi SR2201 Massively Parallel Processor System

Architecture and Performance of the Hitachi SR2201 Massively Parallel Processor System Arhiteture and Performane of the Hitahi SR221 Massively Parallel Proessor System Hiroaki Fujii, Yoshiko Yasuda, Hideya Akashi, Yasuhiro Inagami, Makoto Koga*, Osamu Ishihara*, Masamori Kashiyama*, Hideo

More information

Optimizing Sparse Matrix Operations on GPUs using Merge Path

Optimizing Sparse Matrix Operations on GPUs using Merge Path 21 IEEE 29th International Parallel and Distributed Proessing Symposium Optimizing Sparse Matrix Operations on GPUs using Merge Path Steven Dalton, Luke Olson Department of Computer Siene University of

More information

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections SVC-DASH-M: Salable Video Coding Dynami Adaptive Streaming Over HTTP Using Multiple Connetions Samar Ibrahim, Ahmed H. Zahran and Mahmoud H. Ismail Department of Eletronis and Eletrial Communiations, Faulty

More information

The recursive decoupling method for solving tridiagonal linear systems

The recursive decoupling method for solving tridiagonal linear systems Loughborough University Institutional Repository The reursive deoupling method for solving tridiagonal linear systems This item was submitted to Loughborough University's Institutional Repository by the/an

More information

An Efficient and Scalable Approach to CNN Queries in a Road Network

An Efficient and Scalable Approach to CNN Queries in a Road Network An Effiient and Salable Approah to CNN Queries in a Road Network Hyung-Ju Cho Chin-Wan Chung Dept. of Eletrial Engineering & Computer Siene Korea Advaned Institute of Siene and Tehnology 373- Kusong-dong,

More information

Particle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating

Particle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating Original Artile Partile Swarm Optimization for the Design of High Diffration Effiient Holographi Grating A.K. Tripathy 1, S.K. Das, M. Sundaray 3 and S.K. Tripathy* 4 1, Department of Computer Siene, Berhampur

More information

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,

More information

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm

More information

Partial Character Decoding for Improved Regular Expression Matching in FPGAs

Partial Character Decoding for Improved Regular Expression Matching in FPGAs Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia

More information

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks International Journal of Computer Theory and Engineering, Vol. 5, No. 2, April 213 A Multi-Head Clustering Algorithm in Vehiular Ad Ho Networks Shou-Chih Lo, Yi-Jen Lin, and Jhih-Siao Gao Abstrat Clustering

More information

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq Volume 4 Issue 6 June 014 ISSN: 77 18X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om Medial Image Compression using

More information

Exploiting Enriched Contextual Information for Mobile App Classification

Exploiting Enriched Contextual Information for Mobile App Classification Exploiting Enrihed Contextual Information for Mobile App Classifiation Hengshu Zhu 1 Huanhuan Cao 2 Enhong Chen 1 Hui Xiong 3 Jilei Tian 2 1 University of Siene and Tehnology of China 2 Nokia Researh Center

More information

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

Detection and Recognition of Non-Occluded Objects using Signature Map

Detection and Recognition of Non-Occluded Objects using Signature Map 6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,

More information

SEQUENTIAL PATTERN MINING FROM WEB LOG DATA

SEQUENTIAL PATTERN MINING FROM WEB LOG DATA SEQUENTIAL PATTERN MINING FROM WEB LOG DATA Rajashree Shettar 1 1 Associate Professor, Department of Computer Science, R. V College of Engineering, Karnataka, India, rajashreeshettar@rvce.edu.in Abstract

More information

Facility Location: Distributed Approximation

Facility Location: Distributed Approximation Faility Loation: Distributed Approximation Thomas Mosibroda Roger Wattenhofer Distributed Computing Group PODC 2005 Where to plae ahes in the Internet? A distributed appliation that has to dynamially plae

More information

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality INTERNATIONAL CONFERENCE ON MANUFACTURING AUTOMATION (ICMA200) Multi-Piee Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality Stephen Stoyan, Yong Chen* Epstein Department of

More information

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments Establishing Seure Ethernet LANs Using Intelligent Swithing Hubs in Internet Environments WOEIJIUNN TSAUR AND SHIJINN HORNG Department of Eletrial Engineering, National Taiwan University of Siene and Tehnology,

More information

A Dictionary based Efficient Text Compression Technique using Replacement Strategy

A Dictionary based Efficient Text Compression Technique using Replacement Strategy A based Effiient Text Compression Tehnique using Replaement Strategy Debashis Chakraborty Assistant Professor, Department of CSE, St. Thomas College of Engineering and Tehnology, Kolkata, 700023, India

More information

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah

More information

A Novel Timestamp Ordering Approach for Co-existing Traditional and Cooperative Transaction Processing

A Novel Timestamp Ordering Approach for Co-existing Traditional and Cooperative Transaction Processing A Novel Timestamp Ordering Approah for Co-existing Traditional and Cooperative Transation Proessing Author Sun, Chengzheng, Zhang, Y., Kambayashi, Y., Yang, Y. Published 1998 Conferene Title Proeedings

More information

Data Structures in Java

Data Structures in Java Data Strutures in Java Leture 8: Trees and Tree Traversals. 10/5/2015 Daniel Bauer 1 Trees in Computer Siene A lot of data omes in a hierarhial/nested struture. Mathematial expressions. Program struture.

More information

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of

More information

Parametric Abstract Domains for Shape Analysis

Parametric Abstract Domains for Shape Analysis Parametri Abstrat Domains for Shape Analysis Xavier RIVAL (INRIA & Éole Normale Supérieure) Joint work with Bor-Yuh Evan CHANG (University of Maryland U University of Colorado) and George NECULA (University

More information

Sequential PAttern Mining using A Bitmap Representation

Sequential PAttern Mining using A Bitmap Representation Sequential PAttern Mining using A Bitmap Representation Jay Ayres, Jason Flannick, Johannes Gehrke, and Tomi Yiu Dept. of Computer Science Cornell University ABSTRACT We introduce a new algorithm for mining

More information

A Comprehensive Review of Overlapping Community Detection Algorithms for Social Networks

A Comprehensive Review of Overlapping Community Detection Algorithms for Social Networks International Journal of Engineering Researh and Appliations (IJERA) ISSN: 2248-9622 National Conferene on Advanes in Engineering and Tehnology (AET- 29th Marh 2014) RESEARCH ARTICLE OPEN ACCESS A Comprehensive

More information

Chapter 2: Introduction to Maple V

Chapter 2: Introduction to Maple V Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard

More information

An Alternative Approach to the Fuzzifier in Fuzzy Clustering to Obtain Better Clustering Results

An Alternative Approach to the Fuzzifier in Fuzzy Clustering to Obtain Better Clustering Results An Alternative Approah to the Fuzziier in Fuzzy Clustering to Obtain Better Clustering Results Frank Klawonn Department o Computer Siene University o Applied Sienes BS/WF Salzdahlumer Str. 46/48 D-38302

More information

Performance Improvement in a Multi Cluster using a Modified Scheduling and Global Memory Management with a Novel Load Balancing Mechanism

Performance Improvement in a Multi Cluster using a Modified Scheduling and Global Memory Management with a Novel Load Balancing Mechanism Performane Improvement in a Multi Cluster using a Modified Sheduling and Global Memory Management with a Novel Load Balaning Mehanism P. Sammulal, PhD. Assistant Professor, Department of CSE, JNTUH College

More information

IN structured P2P overlay networks, each node and file key

IN structured P2P overlay networks, each node and file key 242 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 21, NO. 2, FEBRUARY 2010 Elasti Routing Table with Provable Performane for Congestion Control in DHT Networks Haiying Shen, Member, IEEE,

More information

Constructing Transaction Serialization Order for Incremental. Data Warehouse Refresh. Ming-Ling Lo and Hui-I Hsiao. IBM T. J. Watson Research Center

Constructing Transaction Serialization Order for Incremental. Data Warehouse Refresh. Ming-Ling Lo and Hui-I Hsiao. IBM T. J. Watson Research Center Construting Transation Serialization Order for Inremental Data Warehouse Refresh Ming-Ling Lo and Hui-I Hsiao IBM T. J. Watson Researh Center July 11, 1997 Abstrat In typial pratie of data warehouse, the

More information

Sparse Certificates for 2-Connectivity in Directed Graphs

Sparse Certificates for 2-Connectivity in Directed Graphs Sparse Certifiates for 2-Connetivity in Direted Graphs Loukas Georgiadis Giuseppe F. Italiano Aikaterini Karanasiou Charis Papadopoulos Nikos Parotsidis Abstrat Motivated by the emergene of large-sale

More information

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks 62 Uplink Channel Alloation Sheme and QoS Management Mehanism for Cognitive Cellular- Femtoell Networks Kien Du Nguyen 1, Hoang Nam Nguyen 1, Hiroaki Morino 2 and Iwao Sasase 3 1 University of Engineering

More information

Query Evaluation Overview. Query Optimization: Chap. 15. Evaluation Example. Cost Estimation. Query Blocks. Query Blocks

Query Evaluation Overview. Query Optimization: Chap. 15. Evaluation Example. Cost Estimation. Query Blocks. Query Blocks Query Evaluation Overview Query Optimization: Chap. 15 CS634 Leture 12 SQL query first translated to relational algebra (RA) Atually, some additional operators needed for SQL Tree of RA operators, with

More information

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communiations 1 RAC 2 E: Novel Rendezvous Protool for Asynhronous Cognitive Radios in Cooperative Environments Valentina Pavlovska,

More information

Intra- and Inter-Stream Synchronisation for Stored Multimedia Streams

Intra- and Inter-Stream Synchronisation for Stored Multimedia Streams IEEE International Conferene on Multimedia Computing & Systems, June 17-23, 1996, in Hiroshima, Japan, p 372-381 Intra- and Inter-Stream Synhronisation for Stored Multimedia Streams Ernst Biersak, Werner

More information