Adaptive and Lazy Segmentation Based Proxy Caching for Streaming Media Delivery

Size: px
Start display at page:

Download "Adaptive and Lazy Segmentation Based Proxy Caching for Streaming Media Delivery"

Transcription

1 Adaptive ad Based Proxy Cachig for Streamig Media Delivery Sogqig Che Dept. of Computer Sciece College of William ad Mary Williamsburg, VA Susie Wee Mobile ad Media System Lab Hewlett-Packard Laboratories Palo Alto, CA 9434 Bo She Mobile ad Media System Lab Hewlett-Packard Laboratories Palo Alto, CA 9434 Xiaodog Zhag Dept. of Computer Sciece College of William ad Mary Williamsburg, VA ABSTRACT Streamig media objects are ofte cached i segmets. Previous segmet-based cachig strategies cache segmets with costat or expoetially icreasig legths ad typically favor cachig the begiig segmets of media objects. However, these strategies typically do ot cosider the fact that most accesses are targeted toward a few popular objects. I this paper, we argue that either the use of a predefied segmet legth or the favorable cachig of the begiig segmets is the best cachig strategy for reducig etwork traffic. We propose a adaptive ad lazy segmetatio based cachig mechaism by delayig the segmetatio as late as possible ad determiig the segmet legth based o the cliet access behaviors i real time. I additio, the admissio ad evictio of segmets are carried out adaptively based o a accurate utility fuctio. The proposed method is evaluated by simulatios usig traces icludig oe from actual eterprise server logs. Simulatio results idicate that our proposed method achieves a 3% reductio i etwork traffic. The utility fuctios of the replacemet policy are also evaluated with differet variatios to show its accuracy. Categories ad Subject Descriptors H.4.m [Iformatio System]: Miscellaeous Geeral Terms Algorithms, Experimetatio Keywords Streamig media delivery,, Proxy Cachig Permissio to make digital or hard copies of all or part of this work for persoal or classroom use is grated without fee provided that copies are ot made or distributed for profit or commercial advatage ad that copies bear this otice ad the full citatio o the first page. To copy otherwise, to republish, to post o servers or to redistribute to lists, requires prior specific permissio ad/or a fee. NOSSDAV 3, Jue 1 3, 23, Moterey, Califoria, USA. Copyright 23 ACM /3/6...$ INTRODUCTION Proxy cachig has bee show to reduce etwork traffic ad improve cliet-perceived startup latecy. However, the proliferatio of multimedia cotet makes cachig difficult. Due to the large sizes of typical multimedia objects, a full-object cachig strategy quickly exhausts the cache space. Two techiques are typically used to overcome this problem, amely prefix cachig ad segmet-based cachig. Prefix cachig [17] works well whe most cliets access the iitial portios of media objects as oted i [4, 5]. It also reduces startup latecy by immediately servig the cached prefix from the proxy to the cliet while retrievig subsequet segmets from the origi server. I prefix cachig, the determiatio of the prefix size plays a vital role i the system s performace. Segmet-based cachig methods have bee developed for icreased flexibility. These methods also cache segmets of media objects rather tha etire media objects. Typically two types of segmetatio strategies are used. The first type uses uiformly sized segmets. For example, authors i [14] cosider cachig uiformly sized segmets of layer-ecoded video objects. The secod type uses expoetially sized segmets. I this strategy, media objects are segmeted with icreasig legths; for example, the segmet legth may double [19]. This strategy is based o the assumptio that later segmets of media objects are less likely to be accessed. A combiatio of these methods ca be foud i [2], i which costat legths ad expoetially icreased legths are both cosidered. This type of method also favors the begiig segmets of media objects. The prefix ad segmetatio-based cachig methods discussed above have greatly improved media cachig performace. However, they do ot address the followig cosideratios: 1) Cliet accesses to media objects typically represet a skewed patter: most accesses are for a few popular objects, ad these objects are likely to be watched i their etirety or ear etirety. This is ofte true for movie cotet i a VoD eviromet ad traiig videos i a corporatio eviromet. A heuristic segmet-based cachig strategy with a predefied segmet size, expoetial or uiform, always favorably caches the begiig segmets of media objects ad does ot accout for the fact that most accesses are targeted to a few popular objects. 2) The access characteristics of media objects are dyamically chagig. The media object s popularity ad mostwatched portios may vary with time. For example, some objects

2 may be popular for a iitial time period where most users access etire objects. The, as the time goes o, there may be fewer requests for these objects ad there may be fewer user accesses to the later portios of the objects. I this sceario, usig a fixed strategy of cachig several early segmets may ot work, sice durig the iitial time period this may overload the etwork as later segmets eed to be retrieved frequetly; the durig the later time, cachig all the iitial segmets may become wasteful of resources. The lack or pooress of adaptiveess i the existig proxy cachig schemes may reder proxy cachig to be ieffective. 3) The uiform or the expoetial segmetatio methods always use the fixed base segmet size to segmet all the objects through the proxy. However, a proxy is always exposed to objects with a wide rage of sizes from differet categories ad the access characteristics to them ca be quite diverse. Without a adaptive scheme, a overestimate of the base segmet legth may cause a iefficiet use of cache space, while a uderestimate may cause icreased maagemet overhead. I this paper, we propose a adaptive ad lazy segmetatio based cachig strategy, which resposively adapts to the real time accesses ad lazily segmets objects as late as possible. Specifically, we desig a aggressive admissio policy, a lazy segmetatio strategy, ad a two-phase iterative replacemet policy. The proxy system supported by the proposed cachig strategy has the followig advatages: 1) It achieves maximal etwork traffic reductio by favorably cachig the popular segmets of media objects, regardless of their positios withi the media object. If most of the cliets ted to watch the iitial portios of these objects, the iitial segmets are cached. 2) It dyamically adapts to chages i object access patters over time. Specifically, it performs well i commo scearios i which the popularity characteristics of media objects vary over time. The system automatically takes care of this situatio without assumig a priori access patter. 3) It adapts to differet types of media objects. Media objects from differet categories are treated fairly with the goal of maximizig cachig efficiecy. Specifically, the adaptiveess of our proposed method falls ito two areas. 1) The segmet size of each object is decided adaptively based o the access history of this object recorded i real time. The segmet size determied i this way more accurately reflects the cliet access behaviors. The access history is collected by delayig the segmetatio process. 2) Segmet admissio ad evictio policies are adapted i real time based o the access records. A utility fuctio is derived to maximize the utilizatio of the cache space. Effectively, the cache space is favorably allocated to popular segmets regardless of whether they are iitial segmets or ot. Both sythetic ad real proxy traces are used to evaluate the performace of our proposed method. We show that (1) the uiform segmetatio method achieves a similar performace result as the expoetial segmetatio method o average; (2) our proposed adaptive ad lazy segmetatio strategy outperforms the expoetial ad the uiform segmetatio methods by about 3% i byte hit ratio o average, which represets a server workload ad etwork traffic reductio of 3%. The rest of the paper is orgaized as follows. The desig of the adaptive ad lazy segmetatio based cachig system is preseted i Sectio 2. Performace evaluatio is preseted i Sectio 3 ad further evaluatio is preseted i Sectio 4. We evaluate the utility fuctio of the replacemet policy i Sectio 5 ad make cocludig remarks i Sectio Related Work Proxy cachig of streamig media has bee explored i [17, 6, 2, 1, 13, 14, 15, 19, 8, 18, 12, 2]. Prefix cachig ad its related protocol cosideratios as well as partial sequece cachig are studied i [17, 7, 6]. It had bee show that prefix/suffix cachig is worse tha expoetial segmetatio i terms of cachig efficiecy i [19]. Studies have also show that it is appropriate to cache popular media objects i their etirety. Video stagig [2] reduces the peak or average badwidth requiremets betwee the server ad proxy chael by cosiderig the fact that coded video frames have differet sizes depedig o the scee complexity ad codig method. Specifically, if a coded video frame exceeds a predetermied threshold, the the frame is cut such that a portio is cached o the proxy while the other portio remais o the server, thus reducig or smoothig the badwidth required betwee the two. I [13, 14, 15], a similar idea is proposed for cachig scalable video, ad this is doe i a maer that co-operates with the cogestio cotrol mechaism. The cache replacemet mechaism ad cache resource allocatio problems are studied accordig to the popularity of video objects. I [1], the algorithm attempts to partitio a video ito differet chuks of frames with alteratig chuks stored i the proxy, while i [11], the algorithm may select groups of o-cosecutive frames for cachig i the proxy. The cachig problem for layer-ecoded video is studied i [8]. The cache replacemet of streamig media is studied i the [18, 12]. 2. ADAPTIVE AND LAZY SEGMENTATION BASED CACHING SYSTEM This sectio describes our proposed segmetatio-based cachig algorithm. I our algorithm, each object is fully cached accordig to the proposed aggressive admissio policy whe it is accessed for the first time. The fully cached object is kept i the cache util it is chose as a evictio victim by the replacemet policy. At that time, the object is segmeted usig the lazy segmetatio strategy ad some segmets are evicted by the first phase of the two-phase iterative replacemet policy. From the o, the segmets of the object are adaptively admitted by the aggressive admissio policy or adaptively replaced as described i the secod phase of the twophase iterative replacemet policy. For ay media object accessed through the proxy, a data structure cotaiig the followig items is created ad maitaied. This data structure is called the access log of the object. T 1: the time istace the object is accessed for the first time; T r: the last referece time of the object. It is equal to T 1 whe the object is accessed for the first time; L sum: the sum of the duratio of each access to the object; : the umber of accesses to the object; L b : the legth of the base segmet; s: the umber of the cached segmets of the object. Quatities T r, ad s are dyamically updated upo each access arrival. Quatity L sum is updated upo each sessio termiatio. Quatity L b is decided whe the object is segmeted. I additio, the followig quatities ca be derived from the above items ad are used as measuremets of access activities to each object. I our desig, T c is used to deote the curret time istace. At time istace T c, we deote the access frequecy F as T r T 1, ad deote the average access duratio L avg as Lsum. Both of these quatities are also updated upo each access arrival.

3 We ow preset the three major modules of the cachig system. The aggressive admissio policy is preseted i sectio 2.1. Sectio 2.2 describes the lazy segmetatio strategy. Details of the two-phase iterative replacemet policy are preseted i sectio Aggressive Admissio Policy For ay media object, cache admissio is evaluated each time it is accessed with the followig aggressive admissio policy. If there is o access log for the object, the object is accessed for the first time. Assumig the full legth of the object is kow to the proxy, sufficiet cache space is allocated through a adaptive replacemet algorithm as described i sectio 2.3. The accessed object is subsequetly cached etirely regardless of the request s accessig duratio. A access log is also created for the object ad the recordig of the access history begis. If a access log exists for the object (ot the first time), but the log idicates that the object is fully cached, the access log is updated. No cache admissio is ecessary. If a access log exists for the object (ot the first time), but the log idicates that the object is ot fully cached, the system aggressively cosiders cachig the ( s + 1)th segmet if L avg 1 a (s +1) L b, where a is a costat determied by the replacemet policy (see sectio 2.3). The iequality idicates that the average access duratio is icreasig to the extet that the cached s segmets ca ot cover most of the requests while a total of s + 1 segmets ca. Therefore, the system should cosider the admissio of the ext ucached segmet. The fial determiatio of whether this ucached segmet is fially cached or ot is determied by the replacemet policy (see sectio 2.3). (I our system, a = 2, that is, whe Lsum s+1 L 2 b is true, the ext ucached segmet of this object is cosidered to be cached.) I summary, usig aggressive admissio, the object is fully admitted whe it is accessed for the first time. The the admissio of this object is cosidered segmet by segmet. 2.2 Strategy The key of the lazy segmetatio strategy is as follows. Oce there is o cache space available ad thus cache replacemet is eeded, the replacemet policy calculates the cachig utility of each cached object (see sectio 2.3). Subsequetly, the object with the smallest utility value is chose as the victim if it is ot active (o request is curretly accessig it). If the victim object is fully cached, the proxy segmets the object as follows. The average access duratio L avg at curret time istace is calculated. It is used as the legth of the base segmet of this object, that is, L b = L avg. Note that the value of L b is fixed oce it is determied. The object is the segmeted uiformly based o L b. After that, the first a segmets are kept i the cache, while the remaiig segmets are evicted (see sectio 2.3). The umber of cached segmets, s, is updated i the access log of the object accordigly. If a later request demads more tha the cached umber of segmets of this object, data of legth L b (except for the last segmet) is prefetched from the server. I cotrast with existig segmetatio strategies, i which segmetatio is performed whe the object is accessed for the first time, the lazy segmetatio strategy delays the segmetatio process as late as possible, thus allowig the proxy to collect a sufficiet amout of accessig statistics to improve the accuracy of the segmetatio for each media object. By usig the lazy segmetatio strategy, the system adaptively sets differet base segmet legths for differet objects accordig to real time user access behaviors. 2.3 Two-Phase Iterative Replacemet Policy The replacemet policy is used to select cache evictio victims. We desig a two-phase iterative replacemet policy as follows. First of all, a utility fuctio is derived to help the victim selectio process. Several factors are cosidered to predict future accesses. The average umber of accesses; the average duratio of accesses; the legth of the cached data (could be the whole object, or could be some segmets), which is the cost of the storage; ad the probability of the future access. I additio to the above factors used to predict the users future access behaviors, the two-phase iterative replacemet policy cosiders the possibility of future accesses as follows: the system compares the T c T r, the time iterval betwee ow ad the most recet access, ad the Tr T 1, the average time iterval for a access happeig i the past. If T c T r > Tr T 1, the possibility that a ew request arrives soo for this object is small. Otherwise, it is more likely that a request may be comig soo. Ituitively, the cachig utility of a object is proportioal to the average umber of accesses, the average duratio of accesses ad the probability of accesses. I additio, it is iversely proportioal to the size of the occupied cache space. Therefore, the cachig utility fuctio of each object is defied as follows: f 1( Lsum ) f 2(F ) p 2 MIN{1, Tr T1 f 3( s L b ) p 3 T c T r } where f 1( Lsum ) represets the average duratio of future access; f 2(F ) represets the average umber of future accesses;, (1) MIN{1, Tr T 1 T c T r } deotes the possibility of future accesses; ad f 3( s L b ) is the cost of disk storage. Equatio 1 ca be simplified as L sum T r T 1 MIN{1, Tr T1 T c T r } s L b (2) whe = 1, p 2 = 1 ad p 3 = 1. Compared with the distace-sesitive utility fuctio 1 T c T r 1 (T c T r) i (i represets the i th segmet, is the estimated frequecy) used i the expoetial segmetatio method [19] which favorably caches segmets closer to the begiig of media objects, the proposed utility fuctio provides a more accurate estimatio based o the popularity of segmets regardless of their relative positios i the media object. This helps to esure that less popular segmets get evicted from the cache. Give the defiitio of the utility fuctio, we desig a twophase iterative replacemet policy to maximize the aggregated utility value of the cached objects. Upo object admissio, if there is ot eough cache space, the system calculates the cachig utility of each object curretly i the cache. The object with the smallest utility value is chose as the victim ad partial cached data of this object is evicted i oe of the two phases as follows.

4 First Phase: If the access log of the object idicates that the object is fully cached, the object is segmeted as described i sectio 2.2. The first a (a = 2) segmets are kept ad the rest segmets are evicted right after the segmetatio is completed. Therefore, the portio of the object left i cache is of legth 2 L b. Give that L b = L avg at this time istace, the cached 2 segmets cover a ormal distributio i the access duratio. Secod Phase: If the access log of the object idicates that the object is partially cached, the last cached segmet of this object is evicted. The utility value of the object is updated after each replacemet ad this process repeats iteratively util the required space is foud. The desig of the two-phase iterative replacemet policy reduces the chaces of makig wrog decisios of the replacemet, ad gives fair chaces to the replaced segmets so that they ca be cached back ito the proxy agai by the aggressive admissio policy if they become popular agai. I additio, the iterative ature of the replacemet procedure esures that the aggregated utility value of the cached objects is maximized. Note that eve after a object is fully replaced, the system still keeps its access log. If ot, whe the object is accessed agai, it should be fully cached agai. Sice media objects ted to have dimiishig popularity as the time goes o, if the system caches the object i full agai, it results i a iefficiet use of the cache space. Our desig ehaces the resource utilizatio by avoidig this kid of situatio. 3. PERFORMANCE EVALUATION A evet-drive simulator is implemeted to evaluate the performace of the expoetial segmetatio, the uiform segmetatio, ad our proposed adaptive ad lazy segmetatio techiques by usig sythetic ad real traces. For the adaptive ad lazy segmetatio strategy, Equatio 2 is used as the utility fuctio. The expoetial segmetatio strategy always reserves a portio of cache space (1%) for begiig segmets, ad leaves the rest for later segmets. The utility fuctio used is as described i sectio 2.3 for the replacemet of later segmets, while the LRU policy is used for the begiig segmets. The oly differece betwee the uiform segmetatio ad the expoetial segmetatio method is as follows. Istead of segmetig the object expoetially, the uiform segmetatio strategy segmets the object with a costat legth. Sice the expoetial segmetatio strategy always caches the first 6 segmets as i [19], for a fair compariso, the uiform segmetatio strategy always caches the same legth of first several segmets of media objects. Thus whether the expoetially icreasig segmet legth plays a importat role ca also be evaluated. The byte hit ratio is defied as how may bytes are delivered to the cliet from the proxy directly, ormalized by the total bytes the cliet requested. It is used as the major metric to evaluate the reductio of the etwork traffic to the server ad the disk badwidth utilizatio o the server. The delayed start request ratio is defied as how may requests amog the total do ot have a startup latecy sice the iitial portio of the requested object is cached o the proxy. It is used to idicate the efficiecy of these techiques i reducig the user perceived startup latecy. The average umber of cached objects per time uit deotes that the average umber of objects whose segmets are partially or fully cached. It is used to idicate whether the method favorably caches the begiig segmets of a large umber of differet objects or favorably caches the popular segmets of a small umber of differet objects. 3.1 Workload Summary Table 1 lists some kow properties of sythetic traces ad a actual eterprise trace. Trace Num of Num of Size λ α Rage Duratio Name Request Object (GB) (miute) (day) WEB VOD PART REAL Table 1: Workload Summary WEB ad VOD deote the traces for the Web ad VoD eviromet with complete viewig, while PARTIAL deotes the trace for the Web eviromet with partial viewig. These sythetic N traces assume a Zipf-like distributio (p i = f i/ i fi, fi = 1/i α ) for the popularity of media objects. They also assume the request arrival follows the Poisso distributio (p(x, λ) = e λ (λ) x /(x!), x =, 1, 2...). REAL deotes the trace extracted from server logs of HP Corporate Media Solutios, coverig the period from April 1 through April 1, Evaluatio o Complete Viewig Traces Figure 1 shows the performace results from simulatios usig the WEB trace. Lazy segmetatio refers to our proposed adaptive ad lazy segmetatio method. Expoetial segmetatio refers to the expoetial segmetatio method. Uiform segmetatio (1K) refers to the uiform segmetatio method with 1KB sized segmets, while uiform segmetatio (1M) refers to the uiform segmetatio method with 1MB sized segmets 1. Evidet from Figure 1(a), lazy segmetatio achieves the highest byte hit ratio. Whe the cache size is 1%, 2% ad 3% of the total object size, the byte hit ratios of lazy segmetatio ad expoetial segmetatio are more tha 5% ad 13%, 67% ad 39%, 75% ad 29%, respectively. The absolute performace gap is more tha 3% o average ad gradually decreases with the icrease of available cache space. O average, uiform segmetatio achieves a similar result as expoetial segmetatio, which idicates that the expoetially icreased legth does ot have a obvious effect o the byte hit ratio. Figure 1(b) shows that i terms of the delayed start request ratio, uiform segmetatio (1K) achieves the best result, while expoetial segmetatio is raked secod. This is expected sice both of them always favorably cache the begiig segmets of media objects. Lazy segmetatio achieves the worst percetage amog the three. The results idicate that the achieved high byte hit ratio is paid at the expese of a high delayed start request ratio. Figure 1(c) shows the average umber of cached objects per time uit. Lazy segmetatio always has the least umber of objects cached o average, while it always achieves the best byte hit ratio. The results implicitly idicate that favorably cachig the begiig segmets of media objects is ot efficiet i reducig etwork traffic to the server ad disk badwidth utilizatio o the server. The results of the VOD trace show i Figure 2 show similar treds as those of WEB. The byte hit ratio of lazy segmetatio is improved by 28, 24 ad 1 percetage poits over expoetial segmetatio whe the cache size is 1%, 2% ad 3% of the total object size correspodigly. Sice WEB ad VOD are the complete viewig scearios, results from simulatios usig these two traces demostrate that i 1 I the followig cotext, we also use them to represet their correspodig strategies for brevity.

5 Figure 1: WEB: (a) Byte Hit Ratio, (b) Delayed Start Request ratio, ad (c) Figure 2: VOD: (a) Byte Hit Ratio, (b) Delayed Start Request Ratio, ad (c) terms of the byte hit ratio, it is more appropriate to cache the popular segmets of objects istead of favorably cachig the begiig segmets of a media object. It also implicitly shows that the two-phase iterative replacemet policy of our proposed method ca successfully idetify the popular objects whe compared with the distace-sesitive replacemet policy used i the the expoetial segmetatio techique. 3.3 Evaluatio o Partial Viewig Traces Figure 3 shows the performace results from simulatios usig PARTIAL. 8% of requests i PARTIAL oly access 2% of the object. Show i Figure 3(a), lazy segmetatio achieves the best byte hit ratio: whe the cache size is 1%, 2% ad 3% of the total object size, the byte hit ratio icreases by 28, 42, ad 7 percetage poits, respectively, over the expoetial segmetatio method. Compared with results of WEB, the improvemet of our proposed method over the expoetial segmetatio method is reduced due to the 8% partial viewig sessios. Agai, uiform segmetatio (1K) achieves a similar byte hit ratio as that of expoetial segmetatio o average. Figure 3(b) shows the delayed start request ratio. As expected, the lowest is achieved by uiform segmetatio (1K) while expoetial segmetatio still gets the secod lowest percetage. Lazy segmetatio achieves the highest. This cofirms that the higher byte hit ratio is paid by a higher delayed start request ratio. Figure 3(c) shows the average umber of cached objects of PAR- TIAL. It shows that lazy segmetatio always has the least umber of objects cached, while it always achieves the highest byte hit ratio. The results further idicate that favorably cachig the begiig segmets of media objects is ot effective for alleviatig the bottleecks of deliverig streamig media objects. For the real trace REAL, Figure 4(a) shows the byte hit ratio as a fuctio of icreased cache size. Whe the cache size is 2%, 3%, 4% ad 5% of the total object size, the byte hit ratio icreases of lazy segmetatio are 31, 28, 29, 3 percetage poits, respectively, over expoetial segmetatio. The average performace improvemet is about 3 percetage poits. The treds show i Figure 4(a) are cosistet with the previous oes. Figure 4(b) shows the delayed start request ratio for the REAL trace. It shows that lazy segmetatio has similar results as expoetial segmetatio. Its performace eve exceeds that of expoetial segmetatio whe the cache size is 1% ad 2% of the total cache size. This is due to the ature of partial viewig i REAL. I our proposed method, much cache space is available for the begiig segmets of objects. The result reflects the adaptiveess of our proposed method. Figure 4(c) shows that cosistet with previous evaluatios, our proposed method still has the least umber of objects cached o average while achievig the highest byte hit ratio. The results of REAL show that lazy segmetatio achieves the highest byte hit ratio ad early the lowest delayed start request ratio. The adaptiveess of our proposed method show i this evaluatio cofirms our aalysis i Sectio 1. All these performace results show that: (1) i terms of byte hit ratio (reductios of server workload ad etwork traffic), our proposed adaptive ad lazy segmetatio method always performs best with the least umber of objects cached; (2) uiform segmetatio (1K) achieves a similar result o both the byte hit ratio ad the delayed start request ratio as the expoetial segmetatio method o average. The performace results also idicate that favorably cachig the begiig segmets of media objects is ot effective i alleviatig

6 Figure 3: PART: (a) Byte Hit Ratio, (b) Delayed Start Request Ratio, ad (c) Figure 4: REAL: (a) Byte Hit Ratio, (b) Delayed Start Request Ratio, ad (c) the bottleecks for deliverig streamig media ad expoetially icreasig segmet legth does ot have a obvious advatage over costat segmet legth i terms of byte hit ratio. Uiform segmetatio with other base segmet legths are also tested. They achieve similar performace results as those of uiform segmetatio (1M) i byte hit ratio ad worse results i delayed start request ratio. 4. ADDITIONAL RESULTS I Sectio 3, the adaptive ad lazy segmetatio strategy is evaluated comparatively with the expoetial segmetatio ad the uiform segmetatio strategies. We have leared that geerally the adaptive ad lazy segmetatio strategy achieves a higher byte hit ratio. We also kow that the adaptive ad lazy segmetatio strategy does ot reserve space for begiig segmets of media objects, while the expoetial segmetatio ad uiform segmetatio strategies do reserve space for begiig segmets (1% of the total cache size i the experimets). Thus oe may argue that the higher byte hit ratio achieved by lazy segmetatio comes from freeig the reserved space. To examie whether this is true or ot, two groups of experimets are desiged ad performed based o the chages of either the lazy segmetatio strategy, either the expoetial ad uiform segmetatio strategies. These experimets are used to evaluate whether the freeig of reserved space has a sigificat impact o the byte hit ratio improvemet achieved by lazy segmetatio. 4.1 Small Cache Size for Firstly, we use a smaller cache space for lazy segmetatio. It meas that the available cache space for the adaptive ad lazy segmetatio strategy is the same as the cache space for the expoetial segmetatio strategy other tha the reserved part. I these experimets, the reserved portio for the expoetial segmetatio strategy is set to 1%, thus the totally available cache space for lazy segmetatio is oly 9% of the cache space for expoetial segmetatio. The remaiig 1% is reserved for o use. Figure 5 shows the correspodig results usig the WEB trace. Compared with Figure 1, the achieved byte hit ratio of lazy segmetatio does decrease a little. However, it still achieves the highest byte hit ratio amog all the strategies as show i Figure 5(a). I Figure 5(b), the delayed start request ratio achieved by lazy segmetatio is eve worse compared to Figure 1(b), due to the decrease of the total available cache size. Figure 5(c) shows that due to the case whe oly 9% space is available for lazy segmetatio, the average umber of cached objects is less tha the total umber of objects whe the cache size is 1% of the total object size. The results usig the VOD trace is show i Figure 6. All the treds idicated o Figure 6 are similar to those o Figure 5, with smaller chages correspodigly. The smaller chages are due to the loger duratios of the VOD trace. Compared with Figure 3, the variatios of results usig the trace PARTIAL i Figure 7 are more sigificat o byte hit ratio ad delayed start request ratio. Due to the partial viewig ature of this trace, the performace results are more sesitive to the chages of the available cache size for the adaptive ad lazy segmetatio strategy. However, lazy segmetatio still has a sigificat advatage over the others i achievig a high byte hit ratio. Note that i Figure 7, the average umber of cached objects reaches the total umber of objects whe the cache size is 1%. This is differet i Figure 5 ad Figure 6. Figure 8 shows the correspodig results usig the REAL trace. The byte hit ratio, delayed start request ratio, ad average umber

7 Figure 5: WEB: (a) Byte Hit Ratio, (b) Delayed Start Request Ratio, ad (c) Figure 6: VOD: (a) Byte Hit Ratio, (b) Delayed Start Request Ratio, ad (c) Figure 7: PART: (a) Byte Hit Ratio, (b) Delayed Start Request Ratio, ad (c) Figure 8: REAL: (a) Byte Hit Ratio, (b) Delayed Start Request Ratio, ad (c)

8 Figure 9: WEB: (a) Byte Hit Ratio, (b) Delayed Start Request Ratio, ad (c) Figure 1: VOD: (a) Byte Hit Ratio, (b) Delayed Start Request Ratio, ad (c) (c) of cached objects chage little for lazy segmetatio. We believe this is due to the fact that the REAL trace has may prematurely termiated sessios. I summary, the results of these experimets show that the highest byte hit ratio achieved by lazy segmetatio is ot from freeig the reserved space. 4.2 Elimiatig Reserved Space for Uiform ad I previous sectio, we have altered the available cache space for lazy segmetatio to show that the freeig of reserved space does ot chage the coclusio we made. I this sectio, we desig aother group of experimets for this purpose. I these experimets, the available cache space for the uiform ad expoetial segmetatio strategies ad the lazy segmetatio strategy are the same. However, for uiform ad expoetial segmetatio, o cache space is reserved for the begiig segmets. Followig the origial strategy, for the uiform ad expoetial segmetatio strategies, the first several segmets will be cached whe the object is iitially accessed while the rest will ot. Oce the rest of a object is accessed agai, it is cosidered to be cached accordig to its cachig utility as defied i [19]. The begiig segmets ad the remaiig segmets compete together for the cache space whe they eed it. These comparisos ca provide more isights ito whether the byte hit ratio improvemet of our proposed adaptive ad lazy segmetatio strategy comes from the reserved cache space. Figure 9 shows the correspodig results usig the WEB trace. Compared with Figure 1, the uiform ad expoetial segmetatio strategies have similar performace results, ad the lazy segmetatio strategy still achieves the highest byte hit ratio amog all the strategies as show i Figure 9(a). I Figure 9(b), the delayed start request ratio achieved by the uiform ad expoetial segmetatio strategies are almost same. Figure 9(c) shows that the average umber of cached objects for uiform ad expoetial segmetatio are close to each other. The results usig the VOD trace is show i Figure 1. All the treds idicated o Figure 1 are similar to those show o Figure 9. We show the results usig the PARTIAL trace i Figure 11. It is iterestig to see that lazy segmetatio has a larger umber of cached objects o average whe the cache size icreases from 3% i Figure 11(c). The reaso behid this is that a large portio of the sessios are termiated earlier. I Figure 11(a), we fid that lazy segmetatio still achieves the highest byte hit ratio. The correspodig results usig the trace REAL are show i Figure 12. Agai, the results do ot show sigificat impact of the reserved space o the byte hit ratio improvemet for the uiform ad expoetial segmetatio strategies. 5. EVALUATION OF THE REPLACEMENT UTILITY FUNCTION I the previous evaluatio, we always use Equatio 2 as the utility fuctio for lazy segmetatio. To examie the effects of the variat utility fuctio o system performace, we vary ad p 2 i Equatio 1 to simulate the differet weights of the frequecy ad the average access duratio. To simulate differet weights of storage space, we vary p 3 i Equatio 1. The correspodig results are preseted i this sectio. Figure 13 shows the performace results usig the WEB trace. Figure 13(a) shows that the byte hit ratio chages slightly whe the cachig utility is chagig with the available cache size. Figure

9 Figure 11: PART: (a) Byte Hit Ratio, (b) Delayed Start Request Ratio, ad (c) Figure 12: REAL: (a) Byte Hit Ratio, (b) Delayed Start Request Ratio, ad (c) ,p 2,P 3.5,p 2.5,p 3,p 3,p 3,p 2,p 3.5,p 2,p 3,p 2,p 3,p 2,p ,p 2,P 3.5,p 2.5,p 3,p 3,p 3,p 2,p 3.5,p 2,p 3,p 2,p 3,p 2,p Figure 13: WEB: Variat Utility Fuctios of Replacemet Policy ,p 2,P 3.5,p 2.5,p 3,p 3,p 3,p 2,p 3.5,p 2,p 3,p 2,p 3,p 2,p ,p 2,P 3.5,p 2.5,p 3,p 3,p 3,p 2,p 3.5,p 2,p 3,p 2,p 3,p 2,p Figure 14: VOD: Variat Utility Fuctios of Replacemet Policy 13(b) idicates that the delayed start request ratio has larger variatios whe the cache size icreases, especially whe the cache size icrease from 4% to 9% of the total object size. It also shows that for lazy segmetatio, a better delayed start request ratio ca be achieved oce the priority of the cache space cosumptio is icreased. The results from the VOD trace i Figure 14 idicate similar treds as before. Figure 14(a) shows that the byte hit ratio varies widely compared to those of the WEB trace while Figure 14(b) idicates the chages of the delayed start request ratio are ot as sigificat as those of the WEB trace. Figure 15 shows the results usig the PARTIAL trace, which is a partial viewig case of the WEB trace. Geerally, the treds show i Figure 15 are similar to those of WEB. However, Figure 15(b) does show larger variatios of the delayed start request ratio whe the cache space is icreasig. This idicates that the PARTIAL trace is more sesitive to the storage space cosumptio. Figure 16 shows the results usig the REAL trace. It idicates similar treds as show i Figure 15. As show o Figure 16, the icrease of the priority o storage space cosumptio will worse ad fluctuate the delayed start request ratio for the lazy segmetatio strategy. This is due to the large umber of early termiated sessios. Through all these experimets, we fid the performace of the adaptive ad lazy segmetatio strategy ca be adjusted depedig o available cache space to a certai extet. However, i geeral, icreasig the weights of average access duratio ad frequecy has less impact o the performace results. 6. CONCLUSION We have proposed a streamig media cachig proxy system based

10 ,p 2,P 3.5,p 2.5,p 3,p 3,p 3,p 2,p 3.5,p 2,p 3,p 2,p 3,p 2,p ,p 2,P 3.5,p 2.5,p 3,p 3,p 3,p 2,p 3.5,p 2,p 3,p 2,p 3,p 2,p Figure 15: PART: Variat Utility Fuctios of Replacemet Policy ,p 2,P 3.5,p 2.5,p 3,p 3,p 3,p 2,p 3.5,p 2,p 3,p 2,p 3,p 2,p ,p 2,P 3.5,p 2.5,p 3,p 3,p 3,p 2,p 3.5,p 2,p 3,p 2,p 3,p 2,p Figure 16: REAL: Variat Utility Fuctios of Replacemet Policy o a adaptive ad lazy segmetatio strategy with a aggressive admissio policy ad two-phase iterative replacemet policy. The proposed system is evaluated by simulatios usig sythetic traces ad a actual trace extracted from eterprise media server logs. Compared with a cachig system usig uiform ad expoetial segmetatio methods, the byte hit ratio achieved by the proposed method is improved by 3% o average, which idicates a 3% reductio i the server workload ad etwork traffic. Additioal evaluatios show that the improvemet i byte hit ratio of the lazy segmetatio is ot from the freeig of reserved space. The results show that the adaptive ad lazy segmetatio strategy is a highly efficiet segmet-based cachig method that alleviates bottleecks for the delivery of streamig media objects. We are curretly ivestigatig the trade-offs betwee etwork traffic reductio ad cliet startup latecy. 7. ACKNOWLEDGMENT We would like to thak aoymous reviewers for their helpful commets o this paper. The work is supported by NSF grat CCR ad a grat from Hewlett-Packard Laboratories. 8. REFERENCES [1] E. Bommaiah, K. Guo, M. Hofma ad S. Paul, Desig ad Implemetatio of a Cachig System for Streamig Media over the Iteret, IEEE Real Time Techology ad Applicatios Symposium, May 2. [2] Y. Chae, K. Guo, M. Buddhikot, S. Suri, ad E. Zegura, Silo, Raibow, ad Cachig Toke: Schemes for Scalable Fault Tolerat Stream Cachig, IEEE Joural o Selected Areas i Commuicatios, Special Issue o Iteret Proxy Services, Vol. 2, p , Sept. 22. [3] S. Che, B. She, S. Wee ad X. Zhag, Adaptive ad Lazy Segmetatio Based Proxy Cachig for Streamig Media Delivery, HPCS Lab Tech. Report TR-3-2, College of William ad Mary, Ja., 23. [4] L. Cherkasova ad M. Gupta, Characterizig Locality, Evolutio, ad Life Spa of Accesses i Eterprise Media Server Workloads, NOSSDAV 22, Miami, FL, May 22. [5] M. Chesire, A. Wolma, G. Voelker ad H. Levy, Measuremet ad Aalysis of a Streamig Media Workload, Proc. of the 3rd USENIX Symposium o Iteret Techologies ad Systems, Sa Fracisco, CA, March 21. [6] M. Y.M. Chiu ad K. H.A Yeug, Partial Video Sequece Cachig Scheme for VOD Systems with Heteroeeous Cliets IEEE Trasactios o Iducstrial Electroics, 45(1):44-51, Feb [7] S. Gruber, J. Rexford ad A. Basso, Protocol cosidertatios for a prefix-cachig for multimedia streams, Computer Network, 33(1-6): , Jue 2. [8] J. Kagasharju, F. Hartato, M. Reisslei ad K. W. Ross, Distributig Layered Ecoded Video Through Caches, Proc. of IEEE INFOCOM 1, Achorage, AK, USA, 21. [9] S. Lee, W. Ma ad B. She, A Iteractive Video Delivery ad Cachig System Usig Video Summarizatio, Computer Commuicatios, vol. 25, o. 4, pp , Mar. 22. [1] W.H. Ma ad H.C. Du, Reducig Badwidth Requiremet for Deliverig Video over Wide Area Networks with Proxy Server, Proc. of Iteratioal Cofereces o Multimeida ad Expo., 2, vol. 2, pp [11] Z. Miao ad A. Ortega, Scalable Proxy Cachig of Video Uder Storage Costraits, IEEE Joural o Selected Areas i Commuicatios, vol. 2, p , Sept. 22. [12] M. Reisslei, F. Hartato ad K. W. Ross, Iteractive Video Streamig with Proxy Servers, Proc. of IMMCN, Atlatic City, NJ, Feb. 2. [13] R. Rejaie, M. Hadely ad D. Estri, Quality Adaptatio for Cogestio Cotrolled Video Playback over the Iteret, Proc. of ACM SIGCOMM 99, Cambridge, MA, Sept [14] R. Rejaie, M. Hadley, H. Yu ad D. Estri, Proxy Cachig Mechaism for Multimedia Playback Streams i the Iteret, Proc. of WCW 99, Apr [15] R. Rejaie, H. Yu, M. Hadely ad D. Estri, Multimedia Proxy Cachig Mechaism for Quality Adaptive Streamig Applicatios i the Iteret, Proc. of IEEE INFOCOM, Tel-Aviv, Israel, March 2. [16] S. Se, L. Gao, J. Rexford ad D. Towsley, Optimal Patchig Schemes for Efficiet Multimedia Streamig, NOSSDAV 99, Baskig Ridge, NJ, Jue [17] S. Se, K. Rexford ad D. Towsley, Proxy Prefix Cachig for Multimedia Streams, Proc. IEEE INFOCOM 99, New York, USA, March [18] R. Tewari, H. Vi, A. Da ad D. Sitaram, Resource-based Cachig for Web Servers, Proc. SPIE/ACM Coferece o Multimeida Computig ad Networkig, Ja [19] K. Wu, P. S. Yu ad J. L. Wolf, Segmet-based Proxy Cachig of Multimedia Streams, WWW 21, pp [2] Z.L. Zhag, Y. Wag, D.H.C. Du ad D. Su, Video Stagig: A Proxy-server Based Approach to Ed-to-ed Video Delivery over Wide-area Networks, IEEE Trasactios o Networkig, Vol. 8, o. 4, pp , Aug. 2.

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

Performance Plus Software Parameter Definitions

Performance Plus Software Parameter Definitions Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

ADVANCES in information and communication technologies

ADVANCES in information and communication technologies IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. XXX, NO. XX, XXXXXXX 200 Use of Aalytical Performace Models for System Sizig ad Resource Allocatio i Iteractive Video-o-Demad Systems Employig

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

1&1 Next Level Hosting

1&1 Next Level Hosting 1&1 Next Level Hostig Performace Level: Performace that grows with your requiremets Copyright 1&1 Iteret SE 2017 1ad1.com 2 1&1 NEXT LEVEL HOSTING 3 Fast page loadig ad short respose times play importat

More information

One advantage that SONAR has over any other music-sequencing product I ve worked

One advantage that SONAR has over any other music-sequencing product I ve worked *gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Cubic Polynomial Curves with a Shape Parameter

Cubic Polynomial Curves with a Shape Parameter roceedigs of the th WSEAS Iteratioal Coferece o Robotics Cotrol ad Maufacturig Techology Hagzhou Chia April -8 00 (pp5-70) Cubic olyomial Curves with a Shape arameter MO GUOLIANG ZHAO YANAN Iformatio ad

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

Accuracy Improvement in Camera Calibration

Accuracy Improvement in Camera Calibration Accuracy Improvemet i Camera Calibratio FaJie L Qi Zag ad Reihard Klette CITR, Computer Sciece Departmet The Uiversity of Aucklad Tamaki Campus, Aucklad, New Zealad fli006, qza001@ec.aucklad.ac.z r.klette@aucklad.ac.z

More information

Lower Bounds for Sorting

Lower Bounds for Sorting Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig

More information

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8)

CIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8) CIS 11 Data Structures ad Algorithms with Java Fall 017 Big-Oh Notatio Tuesday, September 5 (Make-up Friday, September 8) Learig Goals Review Big-Oh ad lear big/small omega/theta otatios Practice solvig

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

COSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1

COSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1 COSC 1P03 Ch 7 Recursio Itroductio to Data Structures 8.1 COSC 1P03 Recursio Recursio I Mathematics factorial Fiboacci umbers defie ifiite set with fiite defiitio I Computer Sciece sytax rules fiite defiitio,

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

Operating System Concepts. Operating System Concepts

Operating System Concepts. Operating System Concepts Chapter 4: Mass-Storage Systems Logical Disk Structure Logical Disk Structure Disk Schedulig Disk Maagemet RAID Structure Disk drives are addressed as large -dimesioal arrays of logical blocks, where the

More information

Fast Fourier Transform (FFT) Algorithms

Fast Fourier Transform (FFT) Algorithms Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

FAST BIT-REVERSALS ON UNIPROCESSORS AND SHARED-MEMORY MULTIPROCESSORS

FAST BIT-REVERSALS ON UNIPROCESSORS AND SHARED-MEMORY MULTIPROCESSORS SIAM J. SCI. COMPUT. Vol. 22, No. 6, pp. 2113 2134 c 21 Society for Idustrial ad Applied Mathematics FAST BIT-REVERSALS ON UNIPROCESSORS AND SHARED-MEMORY MULTIPROCESSORS ZHAO ZHANG AND XIAODONG ZHANG

More information

Table 2 GSM, UMTS and LTE Coverage Levels

Table 2 GSM, UMTS and LTE Coverage Levels 6 INDICATORS OF QUALITY OF SERVICE This sectio defies quality idicators that characterize the performace of services supported o mobile commuicatio systems i their various phases of access ad use 6. 6.1

More information

CMSC Computer Architecture Lecture 10: Caches. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 10: Caches. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 10: Caches Prof. Yajig Li Uiversity of Chicago Midterm Recap Overview ad fudametal cocepts ISA Uarch Datapath, cotrol Sigle cycle, multi cycle Pipeliig Basic idea,

More information

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved.

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved. Chapter 11 Frieds, Overloaded Operators, ad Arrays i Classes Copyright 2014 Pearso Addiso-Wesley. All rights reserved. Overview 11.1 Fried Fuctios 11.2 Overloadig Operators 11.3 Arrays ad Classes 11.4

More information

UH-MEM: Utility-Based Hybrid Memory Management. Yang Li, Saugata Ghose, Jongmoo Choi, Jin Sun, Hui Wang, Onur Mutlu

UH-MEM: Utility-Based Hybrid Memory Management. Yang Li, Saugata Ghose, Jongmoo Choi, Jin Sun, Hui Wang, Onur Mutlu UH-MEM: Utility-Based Hybrid Memory Maagemet Yag Li, Saugata Ghose, Jogmoo Choi, Ji Su, Hui Wag, Our Mutlu 1 Executive Summary DRAM faces sigificat techology scalig difficulties Emergig memory techologies

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Cache-Optimal Methods for Bit-Reversals

Cache-Optimal Methods for Bit-Reversals Proceedigs of the ACM/IEEE Supercomputig Coferece, November 1999, Portlad, Orego, U.S.A. Cache-Optimal Methods for Bit-Reversals Zhao Zhag ad Xiaodog Zhag Departmet of Computer Sciece College of William

More information

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1 Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Quality of Service How good are late data ad lowthroughput chaels? It depeds o the applicatio. Do you care if... Your e-mail takes 1/2

More information

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000. 5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator

More information

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process Vol.133 (Iformatio Techology ad Computer Sciece 016), pp.85-89 http://dx.doi.org/10.1457/astl.016. Euclidea Distace Based Feature Selectio for Fault Detectio Predictio Model i Semicoductor Maufacturig

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems

More information

A Study on the Performance of Cholesky-Factorization using MPI

A Study on the Performance of Cholesky-Factorization using MPI A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio

More information

CMSC Computer Architecture Lecture 11: More Caches. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 11: More Caches. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 11: More Caches Prof. Yajig Li Uiversity of Chicago Lecture Outlie Caches 2 Review Memory hierarchy Cache basics Locality priciples Spatial ad temporal How to access

More information

The isoperimetric problem on the hypercube

The isoperimetric problem on the hypercube The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose

More information

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today Admiistrative Fial project No office hours today UNSUPERVISED LEARNING David Kauchak CS 451 Fall 2013 Supervised learig Usupervised learig label label 1 label 3 model/ predictor label 4 label 5 Supervised

More information

OCR Statistics 1. Working with data. Section 3: Measures of spread

OCR Statistics 1. Working with data. Section 3: Measures of spread Notes ad Eamples OCR Statistics 1 Workig with data Sectio 3: Measures of spread Just as there are several differet measures of cetral tedec (averages), there are a variet of statistical measures of spread.

More information

Master Informatics Eng. 2017/18. A.J.Proença. Memory Hierarchy. (most slides are borrowed) AJProença, Advanced Architectures, MiEI, UMinho, 2017/18 1

Master Informatics Eng. 2017/18. A.J.Proença. Memory Hierarchy. (most slides are borrowed) AJProença, Advanced Architectures, MiEI, UMinho, 2017/18 1 Advaced Architectures Master Iformatics Eg. 2017/18 A.J.Proeça Memory Hierarchy (most slides are borrowed) AJProeça, Advaced Architectures, MiEI, UMiho, 2017/18 1 Itroductio Programmers wat ulimited amouts

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:

More information

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence _9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to

More information

Accurate and Efficient Traffic Monitoring Using Adaptive Non-linear Sampling Method

Accurate and Efficient Traffic Monitoring Using Adaptive Non-linear Sampling Method This full text paper was peer reviewed at the directio of IEEE Commuicatios Society subject matter experts for publicatio i the IEEE INFOCOM 8 proceedigs. Accurate ad Efficiet Traffic Moitorig Usig Adaptive

More information

Arithmetic Sequences

Arithmetic Sequences . Arithmetic Sequeces COMMON CORE Learig Stadards HSF-IF.A. HSF-BF.A.1a HSF-BF.A. HSF-LE.A. Essetial Questio How ca you use a arithmetic sequece to describe a patter? A arithmetic sequece is a ordered

More information

Sectio 4, a prototype project of settig field weight with AHP method is developed ad the experimetal results are aalyzed. Fially, we coclude our work

Sectio 4, a prototype project of settig field weight with AHP method is developed ad the experimetal results are aalyzed. Fially, we coclude our work 200 2d Iteratioal Coferece o Iformatio ad Multimedia Techology (ICIMT 200) IPCSIT vol. 42 (202) (202) IACSIT Press, Sigapore DOI: 0.7763/IPCSIT.202.V42.0 Idex Weight Decisio Based o AHP for Iformatio Retrieval

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

Clients Proxy Cache Servers Inter-proxy communication distance Proxy utilization and load balance Size of client population served Proxy Clients

Clients Proxy Cache Servers Inter-proxy communication distance Proxy utilization and load balance Size of client population served Proxy Clients achig for a Better Web Large-Scale Web achig ad otet Delivery Jeff hase PS 22: Distributed Iformatio Systems Fall 2000 PerformaceisamajorcoceritheWeb Proxy cachig is the most widely used method to improve

More information

How do we evaluate algorithms?

How do we evaluate algorithms? F2 Readig referece: chapter 2 + slides Algorithm complexity Big O ad big Ω To calculate ruig time Aalysis of recursive Algorithms Next time: Litterature: slides mostly The first Algorithm desig methods:

More information

Multi-Threading. Hyper-, Multi-, and Simultaneous Thread Execution

Multi-Threading. Hyper-, Multi-, and Simultaneous Thread Execution Multi-Threadig Hyper-, Multi-, ad Simultaeous Thread Executio 1 Performace To Date Icreasig processor performace Pipeliig. Brach predictio. Super-scalar executio. Out-of-order executio. Caches. Hyper-Threadig

More information

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks Iterferece Aware Chael Assigmet Scheme i Multichael Wireless Mesh Networks Sumyeg Kim Departmet of Computer Software Egieerig Kumoh Natioal Istitute of Techology Gum South Korea Abstract Wireless mesh

More information

Hash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015.

Hash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015. Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 2015 Hash Tables xkcd. http://xkcd.com/221/. Radom Number. Used with permissio uder Creative

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued

More information

BASED ON ITERATIVE ERROR-CORRECTION

BASED ON ITERATIVE ERROR-CORRECTION A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity

More information

MAC Throughput Improvement Using Adaptive Contention Window

MAC Throughput Improvement Using Adaptive Contention Window Joural of Computer ad Commuicatios, 2015, 3, 1 14 Published Olie Jauary 2015 i SciRes. http://www.scirp.org/joural/jcc http://dx.doi.org/10.4236/jcc.2015.31001 MAC Throughput Improvemet Usig Adaptive Cotetio

More information

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute

More information

Stone Images Retrieval Based on Color Histogram

Stone Images Retrieval Based on Color Histogram Stoe Images Retrieval Based o Color Histogram Qiag Zhao, Jie Yag, Jigyi Yag, Hogxig Liu School of Iformatio Egieerig, Wuha Uiversity of Techology Wuha, Chia Abstract Stoe images color features are chose

More information

ECE4050 Data Structures and Algorithms. Lecture 6: Searching

ECE4050 Data Structures and Algorithms. Lecture 6: Searching ECE4050 Data Structures ad Algorithms Lecture 6: Searchig 1 Search Give: Distict keys k 1, k 2,, k ad collectio L of records of the form (k 1, I 1 ), (k 2, I 2 ),, (k, I ) where I j is the iformatio associated

More information

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,

More information

arxiv: v2 [cs.ds] 24 Mar 2018

arxiv: v2 [cs.ds] 24 Mar 2018 Similar Elemets ad Metric Labelig o Complete Graphs arxiv:1803.08037v [cs.ds] 4 Mar 018 Pedro F. Felzeszwalb Brow Uiversity Providece, RI, USA pff@brow.edu March 8, 018 We cosider a problem that ivolves

More information

FPGA IMPLEMENTATION OF BASE-N LOGARITHM. Salvador E. Tropea

FPGA IMPLEMENTATION OF BASE-N LOGARITHM. Salvador E. Tropea FPGA IMPLEMENTATION OF BASE-N LOGARITHM Salvador E. Tropea Electróica e Iformática Istituto Nacioal de Tecología Idustrial Bueos Aires, Argetia email: salvador@iti.gov.ar ABSTRACT I this work, we preset

More information

Traffic Models and QoS

Traffic Models and QoS Traffic Models ad QoS TELE4642: Week9 Ackowledgemet: Some slides are adapted from Computer Networkig: A Top Dow Approach Featurig the Iteret, 2 d editio, J.F Kurose ad K.W. Ross All Rights Reserved, copyright

More information

Avid Interplay Bundle

Avid Interplay Bundle Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers

More information

Fire Recognition in Video. Walter Phillips III Mubarak Shah Niels da Vitoria Lobo.

Fire Recognition in Video. Walter Phillips III Mubarak Shah Niels da Vitoria Lobo. Fire Recogitio i Video Walter Phillips III Mubarak Shah Niels da Vitoria Lobo {wrp65547,shah,iels}@cs.ucf.edu Computer Visio Laboratory Departmet of Computer Sciece Uiversity of Cetral Florida Orlado,

More information

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio

More information

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules

More information

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB) F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The

More information

Lecture 1: Introduction and Strassen s Algorithm

Lecture 1: Introduction and Strassen s Algorithm 5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access

More information

Ch 9.3 Geometric Sequences and Series Lessons

Ch 9.3 Geometric Sequences and Series Lessons Ch 9.3 Geometric Sequeces ad Series Lessos SKILLS OBJECTIVES Recogize a geometric sequece. Fid the geeral, th term of a geometric sequece. Evaluate a fiite geometric series. Evaluate a ifiite geometric

More information

Recursion. Recursion. Mathematical induction: example. Recursion. The sum of the first n odd numbers is n 2 : Informal proof: Principle:

Recursion. Recursion. Mathematical induction: example. Recursion. The sum of the first n odd numbers is n 2 : Informal proof: Principle: Recursio Recursio Jordi Cortadella Departmet of Computer Sciece Priciple: Reduce a complex problem ito a simpler istace of the same problem Recursio Itroductio to Programmig Dept. CS, UPC 2 Mathematical

More information

Web OS Switch Software

Web OS Switch Software Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com

More information

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems

More information

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers * Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING

HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Y.K. Patil* Iteratioal Joural of Advaced Research i ISSN: 2278-6244 IT ad Egieerig Impact Factor: 4.54 HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Prof. V.S. Nadedkar** Abstract: Documet clusterig is

More information

Computer Science Foundation Exam. August 12, Computer Science. Section 1A. No Calculators! KEY. Solutions and Grading Criteria.

Computer Science Foundation Exam. August 12, Computer Science. Section 1A. No Calculators! KEY. Solutions and Grading Criteria. Computer Sciece Foudatio Exam August, 005 Computer Sciece Sectio A No Calculators! Name: SSN: KEY Solutios ad Gradig Criteria Score: 50 I this sectio of the exam, there are four (4) problems. You must

More information

Using VTR Emulation on Avid Systems

Using VTR Emulation on Avid Systems Usig VTR Emulatio o Avid Systems VTR emulatio allows you to cotrol a sequece loaded i the Record moitor from a edit cotroller for playback i the edit room alog with other sources. I this sceario the edit

More information

Mobile terminal 3D image reconstruction program development based on Android Lin Qinhua

Mobile terminal 3D image reconstruction program development based on Android Lin Qinhua Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 05) Mobile termial 3D image recostructio program developmet based o Adroid Li Qihua Sichua Iformatio Techology College

More information

Data-Driven Nonlinear Hebbian Learning Method for Fuzzy Cognitive Maps

Data-Driven Nonlinear Hebbian Learning Method for Fuzzy Cognitive Maps Data-Drive Noliear Hebbia Learig Method for Fuzzy Cogitive Maps Wociech Stach, Lukasz Kurga, ad Witold Pedrycz Abstract Fuzzy Cogitive Maps (FCMs) are a coveiet tool for modelig of dyamic systems by meas

More information

Dynamic Programming and Curve Fitting Based Road Boundary Detection

Dynamic Programming and Curve Fitting Based Road Boundary Detection Dyamic Programmig ad Curve Fittig Based Road Boudary Detectio SHYAM PRASAD ADHIKARI, HYONGSUK KIM, Divisio of Electroics ad Iformatio Egieerig Chobuk Natioal Uiversity 664-4 Ga Deokji-Dog Jeoju-City Jeobuk

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5.

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5. Morga Kaufma Publishers 26 February, 208 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Virtual Memory Review: The Memory Hierarchy Take advatage of the priciple

More information

UNIT 4 Section 8 Estimating Population Parameters using Confidence Intervals

UNIT 4 Section 8 Estimating Population Parameters using Confidence Intervals UNIT 4 Sectio 8 Estimatig Populatio Parameters usig Cofidece Itervals To make ifereces about a populatio that caot be surveyed etirely, sample statistics ca be take from a SRS of the populatio ad used

More information

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem Exact Miimum Lower Boud Algorithm for Travelig Salesma Problem Mohamed Eleiche GeoTiba Systems mohamed.eleiche@gmail.com Abstract The miimum-travel-cost algorithm is a dyamic programmig algorithm to compute

More information

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved.

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved. Itroductio to Wireless & Mobile Systems Chapter 6 Multiple Radio Access 1 Outlie Itroductio Multiple Radio Access Protocols Cotetio-based Protocols Pure ALOHA Slotted ALOHA CSMA (Carrier Sese Multiple

More information

Energy-efficient HTTP Adaptive Streaming for High- Quality Video over HetNets

Energy-efficient HTTP Adaptive Streaming for High- Quality Video over HetNets 5 IEEE 6th Iteratioal Symposium o Persoal Idoor ad Mobile Radio Commuicatios - (PIMRC): Services Eergy-efficiet HTTP Adaptive Streamig for High- Quality Video over HetNets Yumi Go Oh Cha Kwo ad Hwaju Sog

More information

GPUMP: a Multiple-Precision Integer Library for GPUs

GPUMP: a Multiple-Precision Integer Library for GPUs GPUMP: a Multiple-Precisio Iteger Library for GPUs Kaiyog Zhao ad Xiaowe Chu Departmet of Computer Sciece, Hog Kog Baptist Uiversity Hog Kog, P. R. Chia Email: {kyzhao, chxw}@comp.hkbu.edu.hk Abstract

More information

1. The lines intersect. There is one solution, the point where they intersect. The system is called a consistent system.

1. The lines intersect. There is one solution, the point where they intersect. The system is called a consistent system. Commo Core Math 3 Notes Uit Day Systems I. Systems of Liear Equatios A system of two liear equatios i two variables is two equatios cosidered together. To solve a system is to fid all the ordered pairs

More information

Heuristic Approaches for Solving the Multidimensional Knapsack Problem (MKP)

Heuristic Approaches for Solving the Multidimensional Knapsack Problem (MKP) Heuristic Approaches for Solvig the Multidimesioal Kapsack Problem (MKP) R. PARRA-HERNANDEZ N. DIMOPOULOS Departmet of Electrical ad Computer Eg. Uiversity of Victoria Victoria, B.C. CANADA Abstract: -

More information