A Framework for Distributed Computation Over a Heterogeneous Beowulf Cluster.

Size: px
Start display at page:

Download "A Framework for Distributed Computation Over a Heterogeneous Beowulf Cluster."

Transcription

1 A Framework for Dstrbuted Computaton Over a Heterogeneous Beowulf Cluster. Jared A. Heuschele Computer Scence Unversty of Wsconsn-Eau Clare heuschja@uwec.edu Andrew T. Phllps Computer Scence Unversty of Wsconsn-Eau Clare phllpa@uwec.edu Abstract We present a problem ndependent frameworks software desgn that takes a descrpton of some computatonal problem consstng of both the mathematcal model and ts data, and then performs the calculatons n a dstrbuted computng envronment. The MPI standard for dstrbuted computng over a network of heterogeneous workstatons s used, but the software framework s fully applcaton ndependent. Specfc goals of the project were dynamc process control and load balancng and the development of a C++ object orented framework that would take a descrpton of the computatonal problem and ts data and dstrbute the computatons over a heterogeneous Beowulf cluster. That s, the dstrbuted computng aspect of the calculaton s completely separated from the problem and ts descrpton. We wll demonstrate the success of the applcaton framework for dstrbuted computaton, ncludng dynamc load balancng and process management on a network of Lnux and IRIX workstatons, all n the context of a non-trval applcaton, namely the Proten Foldng Problem.

2 Ths paper descrbes a problem ndependent framework based mplementaton of a varaton of the tradtonal master-slave dstrbuted computng model. Our framework approach takes a descrpton of the problem, consstng of the data and the mathematcal/algorthmc model, and performs all calculatons n a dstrbuted computng envronment wthout requrng any knowledge or understandng of dstrbuted computaton on the part of the user. Hence, the framework approach completely dvorces the dstrbuted computaton from the user-defned problem statement and soluton. Furthermore, our dstrbuted computng framework ncludes dynamc process control and load balancng usng a C++ object orented model. Dstrbuted computaton has been practced snce the advent of multple processor supercomputers n the early 1980s. Wth the wdespread growth of computer networks and the avalablty of message passng software, t s also now the doman of common desktop PCs. In ths paper we descrbe a model for dstrbuted computng that makes ths process both easer and problem ndependent. We do ths by creatng a framework for dstrbuted computng whch separates the dstrbuted computng aspect of the mplementaton from the problem and ts descrpton/model. Model for Dstrbuted Computaton Dstrbuted computaton s a method of breakng up a problem nto several computatonal parts and metng out those parts to several ndependent processors. There are several hardware confguratons on whch to mplement dstrbuted computng, and we have chosen to use a Page 1

3 heterogeneous Beowulf cluster. A Beowulf cluster conssts of several ndependent computers, known as "nodes," lnked together va ethernet or other network technology n the attempt to create a gestalt effect of a supercomputer. MPI (Message Passng Interface), a standard protocol for dstrbuted computaton, s then mplemented on the Beowulf cluster n order to run dstrbuted computatons (MPI Forum, 1997). Whle we have selected the Beowulf cluster mplementaton of dstrbuted computaton, none of our desgn s n any way dependent on ths choce. We assume only that whatever dstrbuted computaton mplementaton s chosen, t supports message passng va MPI. There are may dfferent dstrbuted computng models that can be used on a Beowulf cluster. We have chosen a varaton of the tradtonal master-slave model (Breshears, 1998). In the typcal master-slave scenaro, the master assgns tasks for the slaves to process n parallel. Slaves, n turn, perform most or all of the computaton relevant to the applcaton. After the computatons are done by a slave, the results are reported back to the master, whch then combnes the results and contnues the cycle of dstrbutng the tasks untl the entre computaton s complete. The key pont s that the master coordnates, or manages, the dstrbuton of work and the complaton of the results, whle the slaves are solely responsble for the actual computatonal kernel. Our desgn for dstrbuted computaton over N nodes on a Beowulf cluster dffers slghtly from ths master-slave scenaro. Our model nvolves dvdng the ndvdual processors nto a herarchy that conssts of one node runnng the master process, another runnng an assstant process, and the other N-2 nodes runnng the slave processes. Once started, the master node/process s responsble only for assgnng the workload, whch s dynamcally determned, to the slave nodes and montorng ther progress. As before, the slaves do the bulk of the actual Page 2

4 computaton but report ther results to the assstant (not the master). The assstant s duty then s strctly to gather and process the ndvdual results reported to t drectly by the slaves. Ths dvson of labor between master and assstant reduces the amount of communcaton/computaton the master s requred to perform, and frees t to focus exclusvely on manageral actvtes. To use the processng power of a Beowulf cluster at or near the level of greatest potental, the master program must also montor the slave nodes progress n order to deal wth the dffcultes that arse n the envronment created by the hardware and software of heterogeneous machnes and operatng systems. Dffcultes encountered nclude but are not lmted to: network falures and bottlenecks, memory falures, and schedulng bottlenecks assocated wth the operatng system. An effectve way of crcumventng these potental dffcultes s to ncorporate on the master node a dynamc process control mechansm that optmzes job dstrbuton va montorng the load balance among the N-2 slave nodes. Thus, the master process s responsble for more than dstrbutng work to the slaves. In our model, a majorty of ths mechansm s accomplshed va an observer thread that runs on the same node as the master process. The observer keeps a record of tasks assgned to slaves and the status of each task ncludng whether t s completed, n progress, or stalled. On a more fundamental level, t acts as an terator for the master. That s, the master s not responsble for determnng to whch slave to send the next task; nstead, t just asks the observer for the next slave. The observer therefore provdes the basc operaton of teraton among the lst of all actve slaves. The observer also tracks the status of each slave. Should one of the slaves de, the observer notes ths and ensures va ts terator methods that the master avods assgnng tasks to the dead node. Furthermore, the observer measures the effectve speed of a Page 3

5 slave by trackng task completon tmes, and enables the master to assgn the approprate amount of work to each slave. Thus, the load balancng and process management s abstracted out of the master nto the observer. Of course, the master s responsble for ntally assgnng tasks to each of the slaves whch t does wth the help of the observer s terator methods. As slaves complete ther tasks, the master assgns them more work and coordnates the load balancng based on the recommendatons of the observer. Thus, load balancng s an nherent part of the master process; faster slaves wll be able to request and receve more tasks. Fnally, task completon s tracked va verfcaton from the slaves as well as node montorng by the observer. In contrast to the manageral nature of the master, slaves do the actual computatonal work. They awat data from the master, work on t n a user defned way, and then send the results to the assstant, and a correspondng confrmaton of completon to the master, whch then prompts the master to send that slave another task. Note that slaves need know nothng about the exstence of other slaves, nothng about the workload dstrbuton, and nothng about the overall value/use of the results that they compute. The assstant s responsble for processng the results generated by the slaves. It needs to communcate wth the master only at the end of the entre computaton n order to confrm to the master that all work has been completed and the program s ready to end. The communcaton that occurs n our master-assstant-slave model s therefore more complcated than a typcal master-slave model ( Fgure 1): Master Slave Assst. 2 Fgure 1 Page 4

6 In step one, the master sends a data set to the slave for processng. The slave then processes that data set and n step two, passes the result to the assstant and mmedately (step three) sends a confrmaton to the master n order to receve another data set. When the master has assgned all work to the slaves, t sends a sngle message to the assstant ndcatng that t has fnshed assgnng tasks (step four). When the assstant fnshes processng results receved from the slaves, step fve s to send a fnal confrmaton ndcatng problem completon to the master. The Framework The desgn and constructon of the dynamc process control and communcaton n the context of a problem ndependent framework s the key to our model. Much of the software that mplements the rudmentary communcaton between, and dstrbuton to, the nodes s wdely avalable n software lbrary packages lke MPI, whch we use. However, the mplementaton of an object orented framework for dstrbuted computaton s not ncluded n ths and other lbrary packages. A "framework" n the context of computer software s an extenson of the prncple of code reuse. The four prmary benefts of object orented frameworks are modularty, reusablty, extensblty, and nverson of control (Fayad, Schmdt, and Johnson, 1999, p. 8). Of the four nverson of control s the beneft unque to frameworks. Conventonal code reuse conssts of nsertng preexstng modules nto the code developed to solve a problem n order to save tme n Page 5

7 the constructon process. A framework s the fguratve nverse of ths process: nstead of pluggng the preexstng modules nto the problem, the problem s plugged nto the framework. Frameworks are peces/sutes of code that mplement a certan process or model and execute ndependent of the specfcs of a problem. Frameworks serve as a template for a problem soluton technque. In the case of dstrbuted computaton, our framework mplements dynamc load balancng, slave process management, and all communcaton va low-level message passng, all of whch can execute ndependent of the detals of the user defned problem. These aspects of dstrbutng the computaton must be mantaned ndependently and reman unrelated to the actual calculaton. Of course, detals are necessary n the dstrbuton of problem specfc data to each slave process (whch s the responsblty of the master process), the gatherng and processng of the ndvdual results (whch s the role of the assstant process), and n the calculatons specfc to the problem (whch s the duty of the slave processes). Thus, when a framework s constructed, all that s needed s a descrpton of certan specfc master, assstant, and slave process responsbltes. These descrptons are encapsulated n the four user defned functons used by the framework that encompass the user defned soluton method, ts assocated data to be calculated, and how the calculatons are to be dstrbuted. These four functons are: 1. UserNextTask: defnes and provdes a specfc data set on whch to perform computatons. The master requests ths data set from the user pror to communcatng wth a slave. 2. UserWork: defnes the computatonal kernel of work to be done. Each slave s responsble for provdng a specfc data set (obtaned from the master) on whch to perform ths work. Page 6

8 3. UserCombne: combnes results (as reported by the slaves) n a user defned way. The assstant s responsble for provdng a specfc soluton vector for combnng by the user. 4. UserTasksDone: determnes when there are no more data sets/tasks to be completed. The master makes ths request of the user pror to askng for a next data set (va UserNextTask). Thus, the user s problem, confned to these methods, can actually be wrtten and executed sequentally. The user does not have to know anythng about the MPI, message passng, or the vagares of dstrbuted computng. Ths s not to say that usng the framework to solve the user s problem s plug and play. The user must understand and dentfy the parallelsm nherent n the soluton method. Sample Computaton As a smple example of ths model, we use the followng elementary computaton: σ = n = 1 σ 2 whereσ R, and n s consdered to be large. Our framework approach would then requre the followng smple set of user defned functons/behavors: UserWork( σ ): returns 2 σ UserCombne( σ ): partal Page 7

9 update σ = σ + σ UserNextTask(): returns next UserTasksDone(): σ partal returns true f and only f n σ already have been requested. 2 In ths case, each slave smply computes σ (va UserWork) gven a σ from the master (the s obtaned va UserNextTask). Upon completon of ths task, the slave sends t result to the assstant whch n turn keeps a runnng total of the results va UserCombne. When the master has determned that all tasks have been completed (va UserTasksDone and confrmaton from all slaves), the assstant s notfed to prepare to report the fnal result. Notce that the user s responsble for understandng the nherent parallelsm n the computaton, but that no reference to dstrbuted computaton or MPI s expected or requred. σ Relable Message Passng Dstrbuted computaton models rely heavly on the relable transportaton of user data. In our framework, data buffers are sent from the master to be processed by the slaves and results are stored n buffers that are sent from the slaves to be gathered and processed by the assstant. Memory cannot be shared by these processes due to the dstrbuted nature of the computng envronment; that s, we are assumng a dstrbuted memory model, not a shared memory one. Therefore, each of these transfers requre that separate buffers be allocated by the master, assstant, and slaves on each of ther respectve nodes. Master and assstant need only manage one buffer, whereas the slave has two buffers to coordnate: one to store data receved from the Page 8

10 master, and another n whch to send the results to the assstant. Because of the need for relable transport of the buffers contanng the user data, the user must specfy the maxmum length of data buffers that each ndvdual task mght requre. By havng the user specfy the maxmum length of data buffers, the allocaton, passng, and referencng of these data buffers s greatly smplfed. All data buffers used n message passng are thus allocated by the framework, an abstracton that hdes one more complcated aspect of MPI operaton from the user. There s only one type of data that can be relably transferred between multple systems n a heterogeneous cluster: the IEEE double. By usng the IEEE standard 64 bt floatng pont representaton, the framework avods the overhead of trackng varous archtecture dfferences that can results n non-portable or ncorrect message passng. The Object Orented Framework Our framework runs on each machne usng a sngle program, multple data (SPMD) format; each machne comples and runs the same code, but executes that code dfferently dependng on whch personalty (master, slave, assstant) s ntated (Almas & Gottleb, 1994) Each node, whether master, slave, or assstant, shares common attrbutes and behavors whch are abstracted n a base class Mp_t. Each node personalty (Master_t, Asstant_t, or Slave_t) then nherts from ths base class, and then determnes f t s the master, the assstant, or a slave. Each node also determnes the dentty (node number) of the master and assstant. A node s dentty s easly establshed n the Mp_t constructor wth the functon MPI_Comm_rank(), Page 9

11 whch fnds the node s rank n the overall model (OSC, 1996). A node s dentty does not change throughout the run of the computaton. The master node always has a rank of 0, and the assstant node always has a rank of N-1 n a N node cluster. pseudocode: The run methods of each node type can be summarzed n the followng C++ vod Master_t::Run() { whle ((observer->moreslaves()) && UserMoreTasks() ) { allocate workbuffer memory for message passng; UserNextTask(workBuffer); Send workbuffer to observer->currentslave(); deallocate the workbuffer memory; observer->nextslave(); whle (!UserTasksDone()) { receve confrmaton of work completed by slave #d; allocate workbuffer memory for message passng; UserNextTask(workBuffer); Send workbuffer to slave #d; deallocate the workbuffer memory; whle (there are stll tasks unfnshed) { receve confrmaton of work completed from any slave; send message to assstant declarng end of task allocaton, ncludng count of tasks completed by slaves; receve confrmaton from the assstant; StopAllSlaves(); StopMeNow(); The master run method begns by sendng off a task to each slave. It uses the observer to terate through the lst of slaves and does so as long as task exsts for a slave to complete (determned by callng UserTasksDone). After sendng a job to each of the slaves, t wats for the slaves to complete a task and then sends that slave a new task f one remans. Tasks are Page 10

12 contnuously assgned as slaves complete ther work wth the help of UserNextTask. After all tasks have been assgned, the master wats for slaves to confrm that the remander of tasks have completed. vod Slave_t::Work() { allocate memory for resultsbuffer for message passng; UserWork(resultsBuffer,workBuffer); send resultsbuffer to assstant; send confrmaton to master; deallocate the resultsbuffer memory; vod Slave_t::Run() { bool keep_workng = true; whle (keep_workng) { allocate memory for workbuffer for message passng; swtch (Wat for message and buffer from master) { case stop: StopMeNow(); keep_workng = false; break; case more2do: Work(); break; default: keep_workng = false; break; deallocate the workbuffer memory; The slave run method wats n a loop for a message from the master. In that message, a tag determnes whether the slave contnues workng or whether t exts and termnates on the node. If t s told to do work, t calls ts work method, whch executes the UserWork functon to accomplsh the computaton. The slave next sends the results to the assstant and a confrmaton to the master, upon whch t exts the work method and returns to the run method awatng more work. Page 11

13 vod Assstant_t::Work() { allocate memory for resultsbuffer for message passng; wat for a message and resultsbuffer from anybody; f (sender == master) { masternotfedus = true; masterstally = count of completed tasks as sent by master; else { //t was from slave UserCombne(resultsBuffer); completedjobs++; deallocate resultsbuffer memory; bool Assstant_t::sAllWorkDone() { return (masternotfedus && (masterstally == completedjobs)); vod Assstant_t::Run() { whle (!sallworkdone()) { Work(); send confrmaton to master; StopMeNow(); The assstant executes smlar to the slave; ts run method conssts prmarly of a watng for message loop, but n a dfferent form. It checks to see f has receved the message to termnate from the master, and checks the master s tally of tasks assgned aganst the tally of tasks collated by the assstant. If nether of these condtons are met, t executes ts work method, whch wats for a message from anybody, processng the results va UserCombne f the message was from a slave, or checkng the tally from the master otherwse. If the ext condtons are met, t sends a confrmaton of completon to the master and termnates. At ths pont n the executon, computaton s complete, and the program exts normally on each node. Note that message passng s completely abstracted out from the framework wth the class Message_t. It contans the necessary handle nstances and other members to facltate Page 12

14 message passng. Its methods nclude two sendng and two recevng functons, one each for merely sendng and recevng a tag (a message wth no assocated buffer), and another two to send and receve both tag and data. Here s the class defnton for Message_t whch s used to encapsulate all message passng behavor: enum message_type {none, stop, more2do, confrmed, completed; class Message_t { publc: Message_t(); ~Message_t(); message_type RecvTag(); message_type RecvTagFrom(nt fromwhom); vod SendTag2(nt towhom, message_type tag); vod SendMsg2(nt towhom, message_type tag, double *buffer, nt len); message_type RecvMsg(double *buffer, nt len); message_type GetTag(); nt GetSender(); prvate: nt sender; message_type tagrecvd; MPI_Request therequest; MPI_Status thestatus; ; Concluson By developng a the dstrbuted computaton framework, the ease of utlzng parallel computatonal power s ncreased. Users need be able only to understand what aspects of ther problem can be run ndependently and n parallel n order to provde the detals of the template Page 13

15 functons UserWork, UserNextTask, UserCombne, and UserTasksDone. In no case s there any need of the part of the user to understand or use any prncples/methods of dstrbuted computng. Furthermore, by abstractng the message passng out of the master-slave-assstant model, the framework s more adaptable to the changng world of MPI standards and mplementatons, and also allows tself to be moved to other computng envronments by smply changng the mplementaton of the message passng class. References Almas, G. S., Gottleb, A. (1994). Hghly Parallel Computng, 2 nd Ed. Calforna: The Benjamn/Cummngs Publshng Company, Inc. Breshears, Clay. (1998). Detaled Examples. A Begnner's Gude to PVM Parallel Vrtual Machne [Onlne]. Avalable: [2000, February 29]. Fayad, M., Schmdt, D., & Johnson, R. (1999). Buldng Applcaton Frameworks: Object Orented Foundatons of Framework Desgn. New York: Wley Computer Publshng. Message Passng Interface Forum. (1997). MPI-2: Extensons to the Message-Passng Interface [Onlne]. Avalable: Knoxvlle, Tennessee: Unversty of Tennessee. [2000, February 29] OSC (Oho Supercomputer Center), The Oho State Unversty. (1996). Basc Parallel Informaton. MPI Prmer/Developng wth LAM (p.21). Columbus, Oho: The Oho State Unversty. Acknowledgements We would lke to acknowledge the help of the many members of the lam@mp.nd.edu malng lst. Page 14

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Transaction-Consistent Global Checkpoints in a Distributed Database System

Transaction-Consistent Global Checkpoints in a Distributed Database System Proceedngs of the World Congress on Engneerng 2008 Vol I Transacton-Consstent Global Checkponts n a Dstrbuted Database System Jang Wu, D. Manvannan and Bhavan Thurasngham Abstract Checkpontng and rollback

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

AP PHYSICS B 2008 SCORING GUIDELINES

AP PHYSICS B 2008 SCORING GUIDELINES AP PHYSICS B 2008 SCORING GUIDELINES General Notes About 2008 AP Physcs Scorng Gudelnes 1. The solutons contan the most common method of solvng the free-response questons and the allocaton of ponts for

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

A New Transaction Processing Model Based on Optimistic Concurrency Control

A New Transaction Processing Model Based on Optimistic Concurrency Control A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Solution Brief: Creating a Secure Base in a Virtual World

Solution Brief: Creating a Secure Base in a Virtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Abstract The adopton rate of Vrtual Machnes has exploded at most organzatons, drven by the mproved

More information

On Some Entertaining Applications of the Concept of Set in Computer Science Course

On Some Entertaining Applications of the Concept of Set in Computer Science Course On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Notes on Organizing Java Code: Packages, Visibility, and Scope

Notes on Organizing Java Code: Packages, Visibility, and Scope Notes on Organzng Java Code: Packages, Vsblty, and Scope CS 112 Wayne Snyder Java programmng n large measure s a process of defnng enttes (.e., packages, classes, methods, or felds) by name and then usng

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

Information Sciences

Information Sciences Informaton Scences 79 (9) 369 367 ontents lsts avalable at ScenceDrect Informaton Scences ournal homepage: www.elsever.com/locate/ns Necessary and suffcent condtons for transacton-consstent global checkponts

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Agenda & Reading. Simple If. Decision-Making Statements. COMPSCI 280 S1C Applications Programming. Programming Fundamentals

Agenda & Reading. Simple If. Decision-Making Statements. COMPSCI 280 S1C Applications Programming. Programming Fundamentals Agenda & Readng COMPSCI 8 SC Applcatons Programmng Programmng Fundamentals Control Flow Agenda: Decsonmakng statements: Smple If, Ifelse, nested felse, Select Case s Whle, DoWhle/Untl, For, For Each, Nested

More information

Reliability and Performance Models for Grid Computing

Reliability and Performance Models for Grid Computing Relablty and Performance Models for Grd Computng Yuan-Shun Da,2, Jack Dongarra,3,4 Department of Electrcal Engneerng and Computer Scence, Unversty of Tennessee, Knoxvlle 2 Department of Industral and Informaton

More information

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to

More information

124 Chapter 8. Case Study: A Memory Component ndcatng some error condton. An exceptonal return of a value e s called rasng excepton e. A return s ssue

124 Chapter 8. Case Study: A Memory Component ndcatng some error condton. An exceptonal return of a value e s called rasng excepton e. A return s ssue Chapter 8 Case Study: A Memory Component In chapter 6 we gave the outlne of a case study on the renement of a safe regster. In ths chapter wepresent the outne of another case study on persstent communcaton;

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

ELEC 377 Operating Systems. Week 6 Class 3

ELEC 377 Operating Systems. Week 6 Class 3 ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Chapter 6 Programmng the fnte element method Inow turn to the man subject of ths book: The mplementaton of the fnte element algorthm n computer programs. In order to make my dscusson as straghtforward

More information

Comparison of Heuristics for Scheduling Independent Tasks on Heterogeneous Distributed Environments

Comparison of Heuristics for Scheduling Independent Tasks on Heterogeneous Distributed Environments Comparson of Heurstcs for Schedulng Independent Tasks on Heterogeneous Dstrbuted Envronments Hesam Izakan¹, Ath Abraham², Senor Member, IEEE, Václav Snášel³ ¹ Islamc Azad Unversty, Ramsar Branch, Ramsar,

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier Some materal adapted from Mohamed Youns, UMBC CMSC 611 Spr 2003 course sldes Some materal adapted from Hennessy & Patterson / 2003 Elsever Scence Performance = 1 Executon tme Speedup = Performance (B)

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Priority queues and heaps Professors Clark F. Olson and Carol Zander

Priority queues and heaps Professors Clark F. Olson and Carol Zander Prorty queues and eaps Professors Clark F. Olson and Carol Zander Prorty queues A common abstract data type (ADT) n computer scence s te prorty queue. As you mgt expect from te name, eac tem n te prorty

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Array transposition in CUDA shared memory

Array transposition in CUDA shared memory Array transposton n CUDA shared memory Mke Gles February 19, 2014 Abstract Ths short note s nspred by some code wrtten by Jeremy Appleyard for the transposton of data through shared memory. I had some

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

3D vector computer graphics

3D vector computer graphics 3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres

More information

AMath 483/583 Lecture 21 May 13, Notes: Notes: Jacobi iteration. Notes: Jacobi with OpenMP coarse grain

AMath 483/583 Lecture 21 May 13, Notes: Notes: Jacobi iteration. Notes: Jacobi with OpenMP coarse grain AMath 483/583 Lecture 21 May 13, 2011 Today: OpenMP and MPI versons of Jacob teraton Gauss-Sedel and SOR teratve methods Next week: More MPI Debuggng and totalvew GPU computng Read: Class notes and references

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

Classifying Acoustic Transient Signals Using Artificial Intelligence

Classifying Acoustic Transient Signals Using Artificial Intelligence Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Intro. Iterators. 1. Access

Intro. Iterators. 1. Access Intro Ths mornng I d lke to talk a lttle bt about s and s. We wll start out wth smlartes and dfferences, then we wll see how to draw them n envronment dagrams, and we wll fnsh wth some examples. Happy

More information

BIN XIA et al: AN IMPROVED K-MEANS ALGORITHM BASED ON CLOUD PLATFORM FOR DATA MINING

BIN XIA et al: AN IMPROVED K-MEANS ALGORITHM BASED ON CLOUD PLATFORM FOR DATA MINING An Improved K-means Algorthm based on Cloud Platform for Data Mnng Bn Xa *, Yan Lu 2. School of nformaton and management scence, Henan Agrcultural Unversty, Zhengzhou, Henan 450002, P.R. Chna 2. College

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introducton 1.1 Parallel Processng There s a contnual demand for greater computatonal speed from a computer system than s currently possble (.e. sequental systems). Areas need great computatonal

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

Alternating Direction Method of Multipliers Implementation Using Apache Spark

Alternating Direction Method of Multipliers Implementation Using Apache Spark Alternatng Drecton Method of Multplers Implementaton Usng Apache Spark Deterch Lawson June 4, 2014 1 Introducton Many applcaton areas n optmzaton have benefted from recent trends towards massve datasets.

More information

Remote Sensing Image Retrieval Algorithm based on MapReduce and Characteristic Information

Remote Sensing Image Retrieval Algorithm based on MapReduce and Characteristic Information Remote Sensng Image Retreval Algorthm based on MapReduce and Characterstc Informaton Zhang Meng 1, 1 Computer School, Wuhan Unversty Hube, Wuhan430097 Informaton Center, Wuhan Unversty Hube, Wuhan430097

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Polyhedral Compilation Foundations

Polyhedral Compilation Foundations Polyhedral Complaton Foundatons Lous-Noël Pouchet pouchet@cse.oho-state.edu Dept. of Computer Scence and Engneerng, the Oho State Unversty Feb 8, 200 888., Class # Introducton: Polyhedral Complaton Foundatons

More information

CS 534: Computer Vision Model Fitting

CS 534: Computer Vision Model Fitting CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

A MapReduce-supported Data Center Networking Topology

A MapReduce-supported Data Center Networking Topology A MapReduce-supported Data Center Networkng Topology Zelu Dng*,, Xue Lu, Deke Guo*, Honghu Chen*, Xueshan Luo* * Natonal Unversty of Defense Technology, Chna McGll Unversty, Canada Abstract Several novel

More information

Optimizing Document Scoring for Query Retrieval

Optimizing Document Scoring for Query Retrieval Optmzng Document Scorng for Query Retreval Brent Ellwen baellwe@cs.stanford.edu Abstract The goal of ths project was to automate the process of tunng a document query engne. Specfcally, I used machne learnng

More information

Data Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach

Data Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach Data Representaton n Dgtal Desgn, a Sngle Converson Equaton and a Formal Languages Approach Hassan Farhat Unversty of Nebraska at Omaha Abstract- In the study of data representaton n dgtal desgn and computer

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

y and the total sum of

y and the total sum of Lnear regresson Testng for non-lnearty In analytcal chemstry, lnear regresson s commonly used n the constructon of calbraton functons requred for analytcal technques such as gas chromatography, atomc absorpton

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION 24 CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION The present chapter proposes an IPSO approach for multprocessor task schedulng problem wth two classfcatons, namely, statc ndependent tasks and

More information

Sorting Review. Sorting. Comparison Sorting. CSE 680 Prof. Roger Crawfis. Assumptions

Sorting Review. Sorting. Comparison Sorting. CSE 680 Prof. Roger Crawfis. Assumptions Sortng Revew Introducton to Algorthms Qucksort CSE 680 Prof. Roger Crawfs Inserton Sort T(n) = Θ(n 2 ) In-place Merge Sort T(n) = Θ(n lg(n)) Not n-place Selecton Sort (from homework) T(n) = Θ(n 2 ) In-place

More information

K-means and Hierarchical Clustering

K-means and Hierarchical Clustering Note to other teachers and users of these sldes. Andrew would be delghted f you found ths source materal useful n gvng your own lectures. Feel free to use these sldes verbatm, or to modfy them to ft your

More information

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture Goals and Approach CS 194: Dstrbuted Systems Resource Allocaton Goal: acheve predcable performances Three steps: 1) Estmate applcaton s resource needs (not n ths lecture) 2) Admsson control 3) Resource

More information

Review of approximation techniques

Review of approximation techniques CHAPTER 2 Revew of appromaton technques 2. Introducton Optmzaton problems n engneerng desgn are characterzed by the followng assocated features: the objectve functon and constrants are mplct functons evaluated

More information

EECS 730 Introduction to Bioinformatics Sequence Alignment. Luke Huan Electrical Engineering and Computer Science

EECS 730 Introduction to Bioinformatics Sequence Alignment. Luke Huan Electrical Engineering and Computer Science EECS 730 Introducton to Bonformatcs Sequence Algnment Luke Huan Electrcal Engneerng and Computer Scence http://people.eecs.ku.edu/~huan/ HMM Π s a set of states Transton Probabltes a kl Pr( l 1 k Probablty

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Real-time Motion Capture System Using One Video Camera Based on Color and Edge Distribution

Real-time Motion Capture System Using One Video Camera Based on Color and Edge Distribution Real-tme Moton Capture System Usng One Vdeo Camera Based on Color and Edge Dstrbuton YOSHIAKI AKAZAWA, YOSHIHIRO OKADA, AND KOICHI NIIJIMA Graduate School of Informaton Scence and Electrcal Engneerng,

More information

Accounting for the Use of Different Length Scale Factors in x, y and z Directions

Accounting for the Use of Different Length Scale Factors in x, y and z Directions 1 Accountng for the Use of Dfferent Length Scale Factors n x, y and z Drectons Taha Soch (taha.soch@kcl.ac.uk) Imagng Scences & Bomedcal Engneerng, Kng s College London, The Rayne Insttute, St Thomas Hosptal,

More information

Assembler. Building a Modern Computer From First Principles.

Assembler. Building a Modern Computer From First Principles. Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented

More information

Parallel Artificial Bee Colony Algorithm for the Traveling Salesman Problem

Parallel Artificial Bee Colony Algorithm for the Traveling Salesman Problem Parallel Artfcal Bee Colony Algorthm for the Travelng Salesman Problem Kun Xu, Mngyan Jang, Dongfeng Yuan The School of Informaton Scence and Engneerng Shandong Unversty, Jnan, 250100, Chna E-mal: xukun_sdu@163.com,

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

an assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han

an assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han UNITY as a Tool for Desgn and Valdaton of a Data Replcaton System Phlppe Quennec Gerard Padou CENA IRIT-ENSEEIHT y Nnth Internatonal Conference on Systems Engneerng Unversty of Nevada, Las Vegas { 14-16

More information

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

CE 221 Data Structures and Algorithms

CE 221 Data Structures and Algorithms CE 1 ata Structures and Algorthms Chapter 4: Trees BST Text: Read Wess, 4.3 Izmr Unversty of Economcs 1 The Search Tree AT Bnary Search Trees An mportant applcaton of bnary trees s n searchng. Let us assume

More information

CS 268: Lecture 8 Router Support for Congestion Control

CS 268: Lecture 8 Router Support for Congestion Control CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router

More information

CHAPTER 10: ALGORITHM DESIGN TECHNIQUES

CHAPTER 10: ALGORITHM DESIGN TECHNIQUES CHAPTER 10: ALGORITHM DESIGN TECHNIQUES So far, we have been concerned wth the effcent mplementaton of algorthms. We have seen that when an algorthm s gven, the actual data structures need not be specfed.

More information

Connection-information-based connection rerouting for connection-oriented mobile communication networks

Connection-information-based connection rerouting for connection-oriented mobile communication networks Dstrb. Syst. Engng 5 (1998) 47 65. Prnted n the UK PII: S0967-1846(98)90513-7 Connecton-nformaton-based connecton reroutng for connecton-orented moble communcaton networks Mnho Song, Yanghee Cho and Chongsang

More information

Real-time Scheduling

Real-time Scheduling Real-tme Schedulng COE718: Embedded System Desgn http://www.ee.ryerson.ca/~courses/coe718/ Dr. Gul N. Khan http://www.ee.ryerson.ca/~gnkhan Electrcal and Computer Engneerng Ryerson Unversty Overvew RTX

More information