Available online at Procedia Computer Science 9 (2012 ) International Conference on Computational Science, ICCS 2012

Size: px
Start display at page:

Download "Available online at Procedia Computer Science 9 (2012 ) International Conference on Computational Science, ICCS 2012"

Transcription

1 Available online at Procedia Coputer Science 9 (2012 ) Abstract International Conference on Coputational Science, ICCS 2012 Reachability Analysis of Concurrent Boolean Progras with Sybolic Counter Abstraction Junyan Qian, Min Li, Lingzhong Zhao* Departent of Coputer Science and Engineering,GuiLin University of Electronic Technology,GuiLin541004,China A basic proble in software odel checking is the choice of a odel for software. Boolean progra is the ost popular representation and is aenable to odel checking. We show how to apply counter abstraction to real world concurrent Boolean progras to eliinate state redundancy. We present a odel checking algorith for thread-state reachability analysis of concurrent Boolean progras, constructing Karp-Miller coverability tree directly on a Boolean progra. And finally evaluate the perforance of the approach using a substantial set of Boolean progra bencharks. Keywords:Concurrent Boolean Progras; Sybolic Counter Abstraction; Model Checking; Thread-state Reachability; Karp-Miller Coverability Tree 1. Introduction Model checking [1] is an autoated verification technique to prove the correctness of the finite-state concurrent systes, by searching the state space of a syste to deterine if the syste property holds. Model checking has been successfully used for verification of concurrent systes, such as integrated circuits, counication protocols. However, the ain obstacle of odel checking concurrent software is the state explosion proble: the nuber of reachable states of a progra grows exponentially with the nuber of concurrent threads. As a result, straightforward ipleent of odel checking on concurrent software can need excessive eory and coputation resources, which leads to the efficiency of verification is very low. To address the proble, a series of ethods have been proposed, including sybolic odel checking[2], abstraction[3], partial order reduction[4], syetry reduction[5]and so on, one of the ost effective way aong these techniques to alleviate the state space explosion is abstraction, especially predicate abstraction[6]is the ost successful prooted by Microsoft Research. Boolean progras [7] are obtained fro source progras using predicate abstraction, i.e., all variables are in type of Boolean. The verification of Boolean progra is the bottleneck in predicate abstraction refineent fraework. Multi-threaded concurrent software often exhibits syetry, finding a way to reduce the verification coplexity according to the nature: counter abstraction. The traditional global state is represented by a vector of local states, *Corresponding author. Tel.: +86_773_229_1629; fax: +86_773_560_1330. E-ail address: Zhaolingzhong163@163.co Published by Elsevier Ltd. doi: /j.procs Open access under CC BY-NC-ND license.

2 1364 Junyan Qian et al. / Procedia Coputer Science 9 ( 2012 ) now introducing a counter for each local state, each counter records the nuber of threads in the current local state, and a vector of counters represents global state of a syste. Counter abstraction turns the state space size of concurrent systes grows exponentially in n into polynoial in n. Since a local state is defined as a valuation of all thread local variables of a thread, the nuber of local states grows exponentially with the nuber of thread-local variables. As a result, the nuber of local states generated is very large, probably resulting in any illions of local states. Introducing a counter for each local state is ipractical but only for tiny progra. To solve the proble, we present a solution for the thread-state reachability analysis of syetric concurrent Boolean progra. First, instead of statically translating each stateent s of the input progra into counter changes, do the translation on the fly. This way requires executing s only in the narrow context of a given and reachable local state. In addition, in a global state only keep counters for those local states that at least one thread exists in. Because l» n (l, n represent respectively the nuber of local states and that of threads), in every syste state the value of ost counters are zero, reoving the zero-valued counters will save huge storage space. Second, construct Karp- Miller coverability tree directly on a Boolean progra. Since the proble of thread-state reachability can reduce to the coverability proble of VASS (vector addition systes with states) [8], and the coverability proble of VASS can be deterined by building a Karp-Miller [9] coverability tree for it. The advantage of constructing Karp-Miller tree directly on Boolean progra is to avoid the blowup that Boolean progra translation into VASS entails. Finally, evaluate the perforance of the ethod on a set of Boolean progra bencharks. 2. Preliinaries 2.1. Concurrent Boolean Progra Boolean progras are obtained by applying predicate abstraction to the original progra P, all variables are Boolean variables. In order to get sound verification of the reachability proble, constructing Boolean progra by over-approxiate the behavior of P, which ay appear spurious paths, this can refine the abstraction further by adding predicates, then detect and eliinate spurious paths, this process is counterexaple-guided abstraction refineent(cegar)[10]. The Boolean progra syntax has been detailed in [7]. SATABS extends the seantics for sequential Boolean progras with the following four instructions to support concurrency: The instruction start_thread goto l creates a new thread that starts execution at the progra location l. It gets a copy of the local variables of the current thread, which continues execution at the proceeding stateent. The instruction end_thread terinates the current thread, i.e., has no successor state. The instruction atoic_begin prevents the scheduler fro a context switch to other thread. The instruction atoic_end allows any thread to be executed. Let P, PC, L, V s, V l, V be a Boolean progra, progra counter, progra location, the set of shared variables, the set of thread-local variables, the set of progra variables respectively, where V = V s V l. Definition 1. An explicit state of a Boolean progra is a triple <n, PC, >, where n is the nuber of threads, PC: {1,,n} L is the vector of progra locations, : V s ({1,,n} V l ) B { } is the valuation of the progra variables. Definition 2. <PC, > with PC L, B { } is called a thread state. It is a valuation of the progra counter, the local variables of a particular thread, and the globally shared variables. We use η ξ to denote a transition fro thread state η to thread state ξ. The conditions on the transition η ξ for each instruction are shown as follows: skip: PPC ( ) = skip < PC, Ω> < PC + 1, Ω> PPC ( ) = goto l,, lk < PC, Ω> < l, Ω> i PPC ( ) = x,..., xk : = e,..., econstrain e, Ω = [ x/ k e, Ω, ι ]...[ x k k / e, Ω, ι ], k e, Ω, Ω, ι < PC, Ω> < PC + 1, Ω > goto l 1,,l k : 1 x 1,,x k :=e 1,,e k constrain e: i {1,...,k} (2) (1) (3)

3 Junyan Qian et al. / Procedia Coputer Science 9 ( 2012 ) start_thread: PPC ( ) = start thread l < PC, Ω> < PC + 1, Ω> PPC ( ) = start thread l < PC, Ω> < l, Ω> (4) 2.2. Counter Abstraction Counter abstraction [11] can be seen as a for of syetric reduction that presented by Pnueli et al. in the verification of liveness properties of paraeter syste, the ain idea is to use an abstract state replacing the concrete state of a concurrent syste that consists of any siilar coponents, each abstract state is a k-tuple of integer, denoted by (c 1, c 2,..., c k ), c j counts how any processes are currently in the j-th state. A transition fro local state A to local state B can be translated a decreent of the counter for A and an increent of that for B. This transforation can be ipleented statically in the text of syetric progra P before creating the Kripke odel, the resulting counter-abstracted progra ˆP generates a Kripke structure ˆM whose reachable is isoorphic to that of the traditional quotient structure M, so that can be odel checked without considering further syetry. Counter abstraction technique akes a proble of size exponential in n reduces to one of size polynoial in n, iproving the efficiency of the verification. For any given Boolean progra, l is a constant, seen fro a theoretical view, sees to have solved the state space explosion proble. However, for concurrent software, the thread behavior is given in the for of a progra that control thread-local variables, a local state is defined as a valuation of all thread-local variables, which is incopatible in practice with the idea of counter abstraction: the nuber of the local states generated is very large. For exaple, a Boolean progra with five thread-local variables and the PC with range {1 10} can generate 2 5 *10=320 local states. In practice, concurrent Boolean progras generally have dozens of thread-local variables and thousands of lines, which can generate illions of local states. As a result of the local state space explosion proble, the state space of the V 2 l counter-abstracted progra is of size Ω ( n ), doubly-exponential in the nuber of thread-local variables. Therefore, the traditional counter abstraction is unfit to general progra but for tiny progras Karp-Miller Coverability Tree We use S, and respectively denote the set of states, the set of -tuple of integers and the set of -tuple of non-negative integers. An -diensional VASS is a finite-state achine whose edges are labeled with v, denoted by W= (d, ), where d S is the initial configuration and : S S is the transition function. A configuration of a VASS is denoted by (q, x), where q is a state, x is an -tuple of non-negative integers. There is a transition (q, x) (q', x') if (q', v) (q) and x'=x + v. A Configuration (q, x) is reachable if there is a sequence of transitions start at d and end at (q, x). The coverability proble of VASS asks whether a given configuration (q, x) is covered by the VASS, i.e., whether a configuration (q, x') is reachable such that x' x. Figure 1 shows an exaple of VASS. (0,0,0,0) (-1,1,0,0) (-1,1,0,0) (0,-1,1,0) decl s:=0 ain () begin 0: goto 1 1: s: =1 2: s: =0 3: end d (1,0,0,0) (0,0,0,0) (0,0,-1,1) s=0 s=1 (0,0,-1,1) (0,-1,1,0) (a) Boolean progra Fig.1. (a) Boolean progra; (b) VASS (b) VASS Theore 1([12]). The coverability proble for VASS is decidable. The thread state reachability proble can be reduced to VASS coverability proble, for this reduction, local states corresponding to an -diensional vector, the value of i-th coponent of VASS configuration vector

4 1366 Junyan Qian et al. / Procedia Coputer Science 9 ( 2012 ) corresponding to the nuber of threads in state i. As a result, the tie coplexity of thread-state reachability proble is equivalent to that of the coverability proble for VASS that are polynoial. Corollary 2. The thread-state reachability proble for replicated finite-state progras is decidable. Karp-Miller tree can copactly represent the set of covered configurations of a VASS. The algorith as follows: The root of the tree is labeled by the initial configuration of VASS. For any two nodes and in the tree, if there is a path fro to, denotes as ; if there is an edge fro to, then is a successor of. A node without successors is called an end node. Each node of the tree is labeled with l ( ) = (q, x), where q is a state, x is -diensional vector whose coordinate are eleents of {ω} (ω is any natural nuber). For any node labeled with l ( ) = (p, y) differs fro, we say l ( ) covers l ( ) if p=q and for each i-th coordinates of vectors x and y, such that x i y i. For soe node, l ( ) = (q, x): is an end node if there exist soe node,, l ( ) =l ( ); otherwise, is a successor of, l ( ) = (q', x'). Deterines each i-th coordinates of vector x' as followings (We call it the ω procedure): (1) if there is a path and l ( ) =(s, y), such that covers and y i <(x + v) i, then x' i =ω, ω is a sybol such that z, ω > z and ω+ z =ω;(2) if there is no such node, then x' i =(x + v) i. This process eventually reaches a fix point. If there is a label (q, v) such that x v, then the configuration (q, x) is covered by the VASS. Figure 2 depicts the Coverability Tree of the exaple in Figure 1: 3. Sybolic Counter Abstraction <S 0, (,, 0, )> <S d, (ω, 0, 0, 0)> < S 0, (, 0, 0, 0)> < S 0, (,, 0, 0)> <S 1, (,, 1, 0)> <S d, (0, 0, 0, 0)> <S 0, (0, 0, 0, 0)> < S 1, (,,, 0)> < S 1, (,, 1, )> < S 1, (,,, )> <S 0, (,,, )> Fig.2. Corresponding Karp-Miller tree for Figure 1 To solve the state sapce explosion proble faced during the ipleentation of the traditional counter abstraction, we give a solution for the thread state reachability analysis of concurrent Boolean progra. First, instead of statically translating each stateent s of the input progra into counter updates, do the translation on the fly. In a global state only keep counters for those local states that at least one thread resides in. Because l» n, in every syste state ost counters are zero; Second, construct Karp-Miller coverability tree directly on a Boolean progra. The advantage is to avoid the blowup that Boolean progra translation into VASS entails. As a result, the worst-case size of the Kripke structure of the counter-abstracted progra is reduced fro n l to n in {n, l}, copletely eliinating the sensitivity to the local state space explosion proble. We first describe a data structure used to store syste states copactly before describing the sybolic state space exploration algorith that ipleents this ethod Sybolic representation Boolean progra ake heavy use of data nondeterinis, the nondeterinistic Boolean value is denoted by. In practice, enuerating all possible values of expression associated with is infeasible, a better ethod is to

5 Junyan Qian et al. / Procedia Coputer Science 9 ( 2012 ) interpret sybolically, this interpretation is not only copatible with Boolean progra encodings based on BDDs, but can also be cobined well with counter abstraction. Our approach is to count sets of local states, rather than individual local state. To foralize the state representation, let L be the set of local states, i.e., L =l. An abstract global state can be expressed as: <S, (L 1, n 1 ),, (L k, n k )> (5) In this expression, S represents valuations of the shared variables, L i represents the set of local states, L i L, n i represents a counter, n i 1, n i { }, (L i, n i ) denotes there are n i threads in the local state L i. For instance, the abstract global state < ({x=1}, 2), ({x=0}, 4)> represents these concrete states where 2 threads satisfy x=1, whereas the reaining 4 threads satisfy x=0. The seantics of this representation is given by the set of concrete states that expression (5) represents, naely the states of the for (s, l 1,..., l n )such that: (a) s S, k (b) = n, (6) n i= 1 i (c) there exists a partition {I 1,..., I k } of {1,...,n} such that for all i {1,...,n}, I i =n i and for all j I i, l j L i. In traditional counter abstraction, k=l= L and do not require n i 1, thus suffer fro the potential redundancy of n i being 0 for ost i. In addition, representation (5) has a proble. When counicate data between threads, Boolean progras can introduce such constraints between shared and thread-local variables, such as introduced by an assignent of the for shared: =local, are inexpressible. The reason is that neither S nor the sets L i are defined by expressions over both shared and thread-local variables. In order to ake this constraint expressible, we ust treat certain assignents and related stateents specially. Definition 3. A splice state is a predicate f over shared V s and thread-local variables V l such that ( Vs. f) ( V l. f) Splice states result fro counication. Split the current thread state before executing a splice stateent as follows: Iage (T) = Iage (T v=0) Iage (T v=1) The worst-case cost of state splitting is exponential in the nuber of splice variables. However, we observed in experients: (1) there is relatively few splice stateents; (2) very few splice variables in a splice stateent (one or two); (3) relatively proportion of cofactors encountered during the exploration is actually unsatisfiable and does not produce new states. As a result, the decoposition never suffers fro the potential cobinatorial explosion Sybolic State Space Exploration We present a sybolic odel checking algorith for thread-state reachability analysis of concurrent Boolean progras, constructing Karp-Miller coverability tree directly on a Boolean progra (Fig 3). The algorith uses the state representation described section 3.1, ainly coputes the counter-abstracted set of states reachable fro a given set of initial state, and checks whether the new node covers previously discovered node. To ake the search efficient, keep a separate copy of those discovered nodes that are axial as to the covering partial order. New labels are copared against these axial nodes only. More precisely, when a new node is found, the algorith first checks whether soe previously discovered node covers. if so, then discard. To check this, only copare with the axial eleents of each chain in the covering partial order. Conversely, the algorith checks whether covers soe previously discovered node. if so, then reoved fro the unexplored list. The algorith as follows: f

6 1368 Junyan Qian et al. / Procedia Coputer Science 9 ( 2012 ) : Initialize: R :={< S 0, (L 0, n 0 ) >}; insert<s 0, (L 0, n 0 )>into WorkList n 0 threads in L 0 2: While WorkList Ø do 3: pop =<S, F> (F= {(L 1, n 1 ),,(L k, n k )})fro WorkList 4: for i {1,...,k}do 5: T :=< S, L i > extract i-th thread state fro 6: for v all valuations of Splice Variables (T) do 7: T'=<S', L' >:= Iage (T v) copute successor thread state 8: if L' L i then 9: ':= UPDATECOUNTERS (S, S', F, i, L')> build new syste state ' 10: '':= UPDATECOVER ( ') build covered syste state '' 11: if '' R then 12: R: = R ' if new, store ' as reachable 13: insert ' into WorkList Fig.3. Reachability Analysis The algorith (in Fig 3) expands unexplored syste states fro a worklist. The loop in line 4 iterates over all pairs (L i, n i ) contained in the popped state. The next and crucial step is to copute the successor thread states (lines 6-7). After coputing the iage for each cofactor, the algorith constructs the respective syste state for it (lines 8-9). The UPDATECOUNTERS function (see Fig 4(a)) deterines the new set of F' according to the local state part L' of the newly coputed thread state. If n i =ω, then n i is never updated, since ω - 1=ω. If n i ω and no ore threads reside in the state L i, then eliinate the i-th pair (line 4). If the new local state L' was already present in the syste state, if n j ω, n i =ω and S'=S, then n j doesn t change, since ω + 1=ω (line 8); if n i ω, then n j is increented (lines 9-11). Otherwise the state is inserted with counter value 1 (line 13). The procedure UPDATECOVER (see Fig 4(b)) introduces ω for the thread states that can be reached. The idea is to look for cycles in the execution path that spawn new threads infinitely. That is, we first walk backwards towards the initial state (line 4) and check if any preceding state is subsued by the state τ. If such a state ' has been found (line 5), any pair (L i, n i ) that occurs in the new state τ with a higher counter value than in the preceding state ' is replaced by the pair (L i, ω) (lines 6-8). Finally, the algorith adds the states encountered for the first tie to the set of reachable states, and to the worklist of states to expand (lines in Fig 3). 1: procedure UPDATECOUNTERS (S, S, F, i, L') 2: let (L i, n i ) be the i-th pair in F 3: if n i ω then 4:F':= F {(L i,n i )} (n i >1? {(L i, n i 1)}: Ø) 5: if j. (L', n j ) F then 6: if n j ω then 7: if n i =ω S'=S then 8: F':= F' {(L', n j )} {(L', ω)} else 9: F':= F' {(L', n j )} {(L', n j + 1)} 10: else if n i =ω S'=S then 11: F':= F' {(L', ω)} 12: else 13: F':= F' {(L', 1)} 14: return< S', F'> 1: procedure UPDATECOVER ( ) 2: σ =τ 3: let (L i, n i ) be the i-th pair in σ=<s, (L 1, n 1 ),,(L k, n k )> 4: for all ' Pred( ) do 5: if and S'=S then 6: let (L' j,n' j ) be the i-th pair in '=<S',(L' 1, n' 1 ), (L' k, n' k )> 7: I: = {i L' j =L i, n' j < n i } 8: σ:=σ [(L i, n i )/ (L i, ω), i I] 9: return σ (a) Build Coverability Tree Fig.4. (a) Build Coverability Tree; (b) Build Covering State (b) Build Covering State

7 Junyan Qian et al. / Procedia Coputer Science 9 ( 2012 ) Experiental Evaluation We have ipleented the algorith presented in this paper in a tool of reachability analysis of concurrent Boolean progra called BOOM, the concurrent bencharks used is drawn fro a large and diverse set of benchark Boolean progras generated by SATABS[13]that abstract Linux and Windows kernel coponents using SLAM tool[14]. The experiental setup is as follows: we run full reachability analysis with n 0 =1 initial thread, and then increase the bound N until the tool ties out. The tieout is set to 720s and the eory liit to 12GB. The experients are perfored on Linux operating syste. The ain goal of this paper is the sybolic analysis of Boolean progras. In the sae bencharks, we copare the running tie of the sybolic counter abstraction with that of a plain sybolic ipleentation in BOOM that ignores the syetry, shown in Fig 5(a). Counter abstraction gets the iproveent in scalability, when the nuber of threads is sall, traditional Model Checking is faster, but the coplexity of counter abstraction is polynoial; in fact, our algorith can verify any instances for 7 or ore threads. Overall, the running tie of sybolic counter abstraction is faster. For the thread-state reachability analysis with unbounded thread creation, the experient shows the running ties using Karp-Miller ethod are very sall (Fig 5(b)). running tie(s) sybolic counter abstraction plain sybolic exploration threads(n) running tie(s) the running tie of Karp-Miller Boolean progras (a) (b) Fig.5. (a) Running tie of sybolic counter abstraction vs. plain exploration; (b) Running tie of Karp-Miller ethod for various Boolean progras 5. Conclusion We present a odel checking algorith based on sybolic counter abstraction for thread-state reachability analysis of concurrent Boolean progras, construct Karp-Miller coverability tree directly on a Boolean progra, which avoids effectively the local state space explosion proble facing that Boolean progra translation into VASS, experiental results show the effectiveness of the ethod. In concurrent software verification, counter abstraction has an iproveent in scalability. Since the state space size of the counter-abstracted progra is polynoial, which reduces greatly the coplexity of the verification. Sybolic counter abstraction prooted the verification of syetric concurrent systes that described using Boolean progras. In future work we will consider how to cobine it with other techniques to achieve ore effective copression, such as partial order, and research how to apply it to reachability analysis of concurrent systes of paraeterized systes or unbounded dynaic thread creation. Acknowledgeents This work is supported by Natural Science Foundation of China (No , No ), Guangxi Natural Science Foundation of China (No.2011GXNSFA018164, No.2011GXNSFA018166), China Postdoctoral Science Foundation (No ), Guangxi Graduate Innovation Foundation (No M19). We

8 1370 Junyan Qian et al. / Procedia Coputer Science 9 ( 2012 ) sincerely thank all the colleagues in Software Technology Institute for helping and inspiring discussions on reachability analysis of concurrent Boolean progras. References 1. E. Clarke, O. Gruberg, D. Peled.Model Checking.Cabridge: MIT Press, A. Ciatti, E. Clarke, E. Giunchiglia, F. Giunchiglia, M. Pistore, M. Roveri, etc.nusmv 2:An OpenSource Tool for sybolic odel checking.in Proceedings of the 14th International Conference on Coputer Aided Verification. LNCS 2404, Copenhagen:Springer- Verlag,2002, P. Cousot.The Role of Abstract Interpretation in Foral Methods.In Proceedings of the 5th IEEE International Conference on Software Engineering and For- al Methods. London: IEEE,2007, V. Kahlon, C. Wang, A. Gupta. Monotonic Partial Order Reduction: An Optial Sybolic Partial Order Reduction Technique. In Proceedings of the 21st Inte- rnational Conference on Coputer Aided Verification. LNCS 5643, Grenoble:Springer-Verlag,2009, E. Clarke, R. Enders, T. Filkorn, and S. Jha. Exploiting Syetry in Teporal Logic Model Checking. Foral Methods in Syste Design,1996,9(1-2): K. Lahiri, R. Bryant and B. Cook.A Sybolic Approach to Predicate Abstraction.In Proceedings of the 15th International Conference on Coputer Aided Verification. LNCS 2725, Boulder:Springer-Verlag,2003, T. Ball, S. Rajaani. Bebop: A Sybolic Model Checker for Boolean Progras. In Spin Model Checking and Software Verification, LNCS1885, Springer-Verlag,2000, T. Brázdil, P. Jan ar and A. Ku era. Reachability Gaes on Extended Vector Addition Systes with States. In Proceedings of the 37th International Colloquiu on Autoata, Languages and Prograing. LNCS 6199, Bordeaux:Springer-Verlag,2010, K. N. Vera and J. Goubault-Larrecq.Karp-Miller trees for a branching extension of VASS. In Discrete Matheatics and Theoretical Coputer Science, 2005,7(1): R. Kurshan. Coputer-Aided Verification of Coordinating Processes.Princeton University Press, A. Pnueli, J. Xu, and L. Zuck. Liveness with (0,1, )-counter abstraction.in Proceedings of the14th International Conference on Coputer Aided Verification.LNCS 2404, Copenhagen:Springer-Verlag,2002, R. Karp and R. Miller. Parallel progra scheata. In Coputer and Syste Sciences,1969,3(2): E. Clarke, D. Kroening, N. Sharygina and K. Yorav. SATABS: SAT-based predicate abstraction for ANSI-C. In Tools and Algoriths for the Construction and Analysis of Systes, LNCS3440, Springer-Verlag,2005, T. Ball and S. Rajaani. The SLAM project: debugging syste software via static analysis.in Proceedings of the 29th ACM SIGPLAN- SIGACT syposiu on Principles of prograing languages, ACM, 2002,37(1):1-3.

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

Verifying the structure and behavior in UML/OCL models using satisfiability solvers

Verifying the structure and behavior in UML/OCL models using satisfiability solvers IET Cyber-Physical Systes: Theory & Applications Review Article Verifying the structure and behavior in UML/OCL odels using satisfiability solvers ISSN 2398-3396 Received on 20th October 2016 Revised on

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

Closing The Performance Gap between Causal Consistency and Eventual Consistency

Closing The Performance Gap between Causal Consistency and Eventual Consistency Closing The Perforance Gap between Causal Consistency and Eventual Consistency Jiaqing Du Călin Iorgulescu Aitabha Roy Willy Zwaenepoel EPFL ABSTRACT It is well known that causal consistency is ore expensive

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

CS 361 Meeting 8 9/24/18

CS 361 Meeting 8 9/24/18 CS 36 Meeting 8 9/4/8 Announceents. Hoework 3 due Friday. Review. The closure properties of regular languages provide a way to describe regular languages by building the out of sipler regular languages

More information

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu

More information

Image Filter Using with Gaussian Curvature and Total Variation Model

Image Filter Using with Gaussian Curvature and Total Variation Model IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.

More information

Data & Knowledge Engineering

Data & Knowledge Engineering Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information

A Periodic Dynamic Load Balancing Method

A Periodic Dynamic Load Balancing Method 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3 2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition

More information

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University

More information

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13 Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

Deterministic Voting in Distributed Systems Using Error-Correcting Codes

Deterministic Voting in Distributed Systems Using Error-Correcting Codes IEEE TRASACTIOS O PARALLEL AD DISTRIBUTED SYSTEMS, VOL. 9, O. 8, AUGUST 1998 813 Deterinistic Voting in Distributed Systes Using Error-Correcting Codes Lihao Xu and Jehoshua Bruck, Senior Meber, IEEE Abstract

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem Theoretical Analysis of Local Search and Siple Evolutionary Algoriths for the Generalized Travelling Salesperson Proble Mojgan Pourhassan ojgan.pourhassan@adelaide.edu.au Optiisation and Logistics, The

More information

Predicting x86 Program Runtime for Intel Processor

Predicting x86 Program Runtime for Intel Processor Predicting x86 Progra Runtie for Intel Processor Behra Mistree, Haidreza Haki Javadi, Oid Mashayekhi Stanford University bistree,hrhaki,oid@stanford.edu 1 Introduction Progras can be equivalent: given

More information

Approximate String Matching with Reduced Alphabet

Approximate String Matching with Reduced Alphabet Approxiate String Matching with Reduced Alphabet Leena Salela 1 and Jora Tarhio 2 1 University of Helsinki, Departent of Coputer Science leena.salela@cs.helsinki.fi 2 Aalto University Deptartent of Coputer

More information

A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER

A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER VIOLETA TOMAŠEVIĆ, SLOBODAN BOJANIĆ 2 and OCTAVIO NIETO-TALADRIZ 2 The Mihajlo Pupin Institute, Volgina 5, 000 Belgrade, SERBIA AND MONTENEGRO 2 Technical University

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

1 P a g e. F x,x...,x,.,.' written as F D, is the same.

1 P a g e. F x,x...,x,.,.' written as F D, is the same. 11. The security syste at an IT office is coposed of 10 coputers of which exactly four are working. To check whether the syste is functional, the officials inspect four of the coputers picked at rando

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

Feature Selection to Relate Words and Images

Feature Selection to Relate Words and Images The Open Inforation Systes Journal, 2009, 3, 9-13 9 Feature Selection to Relate Words and Iages Wei-Chao Lin 1 and Chih-Fong Tsai*,2 Open Access 1 Departent of Coputing, Engineering and Technology, University

More information

F-Soft: Software Verification Platform

F-Soft: Software Verification Platform F-Soft: Software Verification Platform F. Ivančić, Z. Yang, M.K. Ganai, A. Gupta, I. Shlyakhter, and P. Ashar NEC Laboratories America, 4 Independence Way, Suite 200, Princeton, NJ 08540 fsoft@nec-labs.com

More information

Problem Solving of graph correspondence using Genetics Algorithm and ACO Algorithm

Problem Solving of graph correspondence using Genetics Algorithm and ACO Algorithm Proble Solving of graph correspondence using Genetics Algorith and ACO Algorith Alireza Rezaee, 1, Azizeh Ajalli 2 Assistant professor,departent of Mechatronics Engineering, Faculty of New Sciences and

More information

The Internal Conflict of a Belief Function

The Internal Conflict of a Belief Function The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of

More information

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade

More information

Optimal Route Queries with Arbitrary Order Constraints

Optimal Route Queries with Arbitrary Order Constraints IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL.?, NO.?,? 20?? 1 Optial Route Queries with Arbitrary Order Constraints Jing Li, Yin Yang, Nikos Maoulis Abstract Given a set of spatial points DS,

More information

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer Departent of Coputer Science and Engineering University of South Florida Tapa, FL 33620 Abstract -- The

More information

Privacy-preserving String-Matching With PRAM Algorithms

Privacy-preserving String-Matching With PRAM Algorithms Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,

More information

Automatic Graph Drawing Algorithms

Automatic Graph Drawing Algorithms Autoatic Graph Drawing Algoriths Susan Si sisuz@turing.utoronto.ca Deceber 7, 996. Ebeddings of graphs have been of interest to theoreticians for soe tie, in particular those of planar graphs and graphs

More information

Rule Extraction using Artificial Neural Networks

Rule Extraction using Artificial Neural Networks Rule Extraction using Artificial Neural Networks S. M. Karuzzaan 1 Ahed Ryadh Hasan 2 Abstract Artificial neural networks have been successfully applied to a variety of business application probles involving

More information

INSERTION SORT is O(n log n)

INSERTION SORT is O(n log n) INSERTION SORT is On log n) Michael A. Bender Martín Farach-Colton Miguel A. Mosteiro Abstract Traditional INSERTION SORT runs in On 2 ) tie because each insertion takes On) tie. When people run INSERTION

More information

λ-harmonious Graph Colouring Lauren DeDieu

λ-harmonious Graph Colouring Lauren DeDieu λ-haronious Graph Colouring Lauren DeDieu June 12, 2012 ABSTRACT In 198, Hopcroft and Krishnaoorthy defined a new type of graph colouring called haronious colouring. Haronious colouring is a proper vertex

More information

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches Efficient Estiation of Inclusion Coefficient using HyperLogLog Sketches Azade Nazi, Bolin Ding, Vivek Narasayya, Surajit Chaudhuri Microsoft Research {aznazi, bolind, viveknar, surajitc}@icrosoft.co ABSTRACT

More information

Survivability Function A Measure of Disaster-Based Routing Performance

Survivability Function A Measure of Disaster-Based Routing Performance Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected

More information

Knowledge Discovery Applied to Agriculture Economy Planning

Knowledge Discovery Applied to Agriculture Economy Planning Knowledge Discovery Applied to Agriculture Econoy Planning Bing-ru Yang and Shao-un Huang Inforation Engineering School University of Science and Technology, Beiing, China, 100083 Eail: bingru.yang@b.col.co.cn

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

Novel Image Representation and Description Technique using Density Histogram of Feature Points

Novel Image Representation and Description Technique using Density Histogram of Feature Points Novel Iage Representation and Description Technique using Density Histogra of Feature Points Keneilwe ZUVA Departent of Coputer Science, University of Botswana, P/Bag 00704 UB, Gaborone, Botswana and Tranos

More information

Relief shape inheritance and graphical editor for the landscape design

Relief shape inheritance and graphical editor for the landscape design Relief shape inheritance and graphical editor for the landscape design Egor A. Yusov Vadi E. Turlapov Nizhny Novgorod State University after N. I. Lobachevsky Nizhny Novgorod Russia yusov_egor@ail.ru vadi.turlapov@cs.vk.unn.ru

More information

Carving Differential Unit Test Cases from System Test Cases

Carving Differential Unit Test Cases from System Test Cases Carving Differential Unit Test Cases fro Syste Test Cases Sebastian Elbau, Hui Nee Chin, Matthew B. Dwyer, Jonathan Dokulil Departent of Coputer Science and Engineering University of Nebraska - Lincoln

More information

News Events Clustering Method Based on Staging Incremental Single-Pass Technique

News Events Clustering Method Based on Staging Incremental Single-Pass Technique News Events Clustering Method Based on Staging Increental Single-Pass Technique LI Yongyi 1,a *, Gao Yin 2 1 School of Electronics and Inforation Engineering QinZhou University 535099 Guangxi, China 2

More information

IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE. Rafael García, Xevi Cufí and Lluís Pacheco

IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE. Rafael García, Xevi Cufí and Lluís Pacheco IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE Rafael García, Xevi Cufí and Lluís Pacheco Coputer Vision and Robotics Group Institute of Inforatics and Applications, University of

More information

A GRAPH-PLANARIZATION ALGORITHM AND ITS APPLICATION TO RANDOM GRAPHS

A GRAPH-PLANARIZATION ALGORITHM AND ITS APPLICATION TO RANDOM GRAPHS A GRAPH-PLANARIZATION ALGORITHM AND ITS APPLICATION TO RANDOM GRAPHS T. Ozawa and H. Takahashi Departent of Electrical Engineering Faculty of Engineering, Kyoto University Kyoto, Japan 606 Abstract. In

More information

OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS

OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS ADRIAN DEACONU Transilvania University of Brasov, Roania Abstract A linear tie

More information

Effective Tracking of the Players and Ball in Indoor Soccer Games in the Presence of Occlusion

Effective Tracking of the Players and Ball in Indoor Soccer Games in the Presence of Occlusion Effective Tracking of the Players and Ball in Indoor Soccer Gaes in the Presence of Occlusion Soudeh Kasiri-Bidhendi and Reza Safabakhsh Airkabir Univerisity of Technology, Tehran, Iran {kasiri, safa}@aut.ac.ir

More information

Guillotine subdivisions approximate polygonal subdivisions: Part III { Faster polynomial-time approximation schemes for

Guillotine subdivisions approximate polygonal subdivisions: Part III { Faster polynomial-time approximation schemes for Guillotine subdivisions approxiate polygonal subdivisions: Part III { Faster polynoial-tie approxiation schees for geoetric network optiization Joseph S. B. Mitchell y April 19, 1997; Last revision: May

More information

Recursion-Driven Parallel Code Generation for Multi-Core Platforms

Recursion-Driven Parallel Code Generation for Multi-Core Platforms Recursion-Driven Parallel Generation for Multi- Platfors Rebecca L. Collins, Bharadwaj Vellore, and Luca P. Carloni Departent of Coputer Science, Colubia University, New York, NY 10027 Eail: {rlc2119,vrb2102,luca}@cs.colubia.edu

More information

I ve Seen Enough : Incrementally Improving Visualizations to Support Rapid Decision Making

I ve Seen Enough : Incrementally Improving Visualizations to Support Rapid Decision Making I ve Seen Enough : Increentally Iproving Visualizations to Support Rapid Decision Making Sajjadur Rahan Marya Aliakbarpour 2 Ha Kyung Kong Eric Blais 3 Karrie Karahalios,4 Aditya Paraeswaran Ronitt Rubinfield

More information

Boosted Detection of Objects and Attributes

Boosted Detection of Objects and Attributes L M M Boosted Detection of Objects and Attributes Abstract We present a new fraework for detection of object and attributes in iages based on boosted cobination of priitive classifiers. The fraework directly

More information

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada

More information

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural

More information

Research on the Classification and Selection of Archive Texts with the Improved C4.5 Algorithm

Research on the Classification and Selection of Archive Texts with the Improved C4.5 Algorithm INTERNATIONAL JOURNAL OF IRUITS, SYSTEMS AND SIGNAL PROESSING Volue 2, 208 Research on the lassification and Selection of Archive Texts with the Iproved 4.5 Algorith Xianbin Lv Abstract In the age of inforation

More information

Fast Accumulation Lattice Algorithm for Mining Sequential Patterns

Fast Accumulation Lattice Algorithm for Mining Sequential Patterns Proceedings of the 6th WSEAS International Conference on Applied Coputer Science, Hangzhou, China, April 15-17, 2007 229 Fast Accuulation Lattice Algorith for Mining Sequential Patterns NANCY P. LIN, WEI-HUA

More information

Fair Resource Allocation for Heterogeneous Tasks

Fair Resource Allocation for Heterogeneous Tasks Fair Resource Allocation for Heterogeneous Tasks Koyel Mukherjee, Partha utta, Gurulingesh Raravi, Thangaraj Balasubraania, Koustuv asgupta, Atul Singh Xerox Research Center India, Bangalore, India 560105

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI

More information

Gromov-Hausdorff Distance Between Metric Graphs

Gromov-Hausdorff Distance Between Metric Graphs Groov-Hausdorff Distance Between Metric Graphs Jiwon Choi St Mark s School January, 019 Abstract In this paper we study the Groov-Hausdorff distance between two etric graphs We copute the precise value

More information

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao

More information

Interleaving Execution and Planning for Nondeterministic, Partially Observable Domains

Interleaving Execution and Planning for Nondeterministic, Partially Observable Domains Interleaving Execution and lanning for Nondeterinistic, artially bservable Doains iergiorgio ertoli and lessandro iatti and aolo Traverso bstract. Methods that interleave planning and execution are a practical

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

A simplified approach to merging partial plane images

A simplified approach to merging partial plane images A siplified approach to erging partial plane iages Mária Kruláková 1 This paper introduces a ethod of iage recognition based on the gradual generating and analysis of data structure consisting of the 2D

More information

A Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem

A Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem IE Vol. 7, No. 2, pp. 84-92, Septeber 2008. A Coparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Proble Ji Ung Sun School of Industrial and Managent Engineering Hankuk University

More information

Generating Mechanisms for Evolving Software Mirror Graph

Generating Mechanisms for Evolving Software Mirror Graph Journal of Modern Physics, 2012, 3, 1050-1059 http://dx.doi.org/10.4236/jp.2012.39139 Published Online Septeber 2012 (http://www.scirp.org/journal/jp) Generating Mechaniss for Evolving Software Mirror

More information

Scope-aware Data Cache Analysis for WCET Estimation

Scope-aware Data Cache Analysis for WCET Estimation Scope-aware Data Cache Analysis for WCET Estiation Bach Khoa Huynh National University of Singapore huynhbac@cop.nus.edu.sg Lei Ju Shandong University julei@sdu.edu.cn (Corresponding author) Abhik Roychoudhury

More information

Identifying Converging Pairs of Nodes on a Budget

Identifying Converging Pairs of Nodes on a Budget Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering

More information

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage 216 IEEE 23rd International Conference on High Perforance Coputing A Low-Cost Multi-Failure Resilient Replication Schee for High Data Availability in Cloud Storage Jinwei Liu* and Haiying Shen *Departent

More information

Comparative Evaluation of Color-Based Video Signatures in the Presence of Various Distortion Types

Comparative Evaluation of Color-Based Video Signatures in the Presence of Various Distortion Types Coparative Evaluation of Color-Based Video Signatures in the Presence of Various Distortion Types Aritz Sánchez de la Fuente, Patrick Ndjiki-Nya, Karsten Sühring, Tobias Hinz, Karsten üller, and Thoas

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS AWNI ITRADAT Assistant Professor, Departent of Coputer Engineering, Faculty of Engineering, Hasheite University, P.O. Box 15459,

More information

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute

More information

A Novel 2D Texture Classifier For Gray Level Images

A Novel 2D Texture Classifier For Gray Level Images 2012, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.co A Novel 2D Texture Classifier For Gray Level Iages B.S. Mousavi 1 Young Researchers Club, Zahedan

More information

Overview. Topology as Central Information in Building Models. Basic Set. Topology Topological Space. What is topology?

Overview. Topology as Central Information in Building Models. Basic Set. Topology Topological Space. What is topology? Overview What is topology? as Central Inforation in Building Models Frank Gielsdorf Wolfgang uhnt technet Gb Berlin Technical University Berlin Why topology is needed for process odeling? ow can topologic

More information

Feature Based Registration for Panoramic Image Generation

Feature Based Registration for Panoramic Image Generation IJCSI International Journal of Coputer Science Issues, Vol. 10, Issue 6, No, Noveber 013 www.ijcsi.org 13 Feature Based Registration for Panoraic Iage Generation Kawther Abbas Sallal 1, Abdul-Mone Saleh

More information

Having a BLAST with SLAM

Having a BLAST with SLAM Having a BLAST with SLAM Meeting, CSCI 555, Fall 20 Announcements Homework 0 due Sat Questions? Move Tue office hours to -5pm 2 Software Model Checking via Counterexample Guided Abstraction Refinement

More information

AN APPROACH ON BIMODAL BIOMETRIC SYSTEMS

AN APPROACH ON BIMODAL BIOMETRIC SYSTEMS AN APPROACH ON BIODAL BIOETRIC SYSTES Eugen LUPU, Siina EERICH Technical University of Cluj-Napoca, 26-28 Baritiu str. Cluj-Napoca phone: +40-264-40-266; fax: +40-264-592-055; e-ail: Eugen.Lupu @co.utcluj.ro

More information

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl. Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH V. Atienza; J.M. Valiente and G. Andreu Departaento de Ingeniería de Sisteas, Coputadores y Autoática Universidad Politécnica de Valencia.

More information

2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016)

2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016) 2nd Workshop on Advanced Research and Technology in Industry Applications (WARTIA 2016) Method for Marking and Positioning Corrosions in the Autoobile Engine Cylinder Cavity fro the Ultrasonic Phased Array

More information

Polynomial-Time Isomorphism of 1-L-Complete Sets

Polynomial-Time Isomorphism of 1-L-Complete Sets journal of coputer and syste sciences 53, 155160 (1996) article no. 0057 Polynoial-Tie Isoorphis of 1-L-Coplete Sets anindra Agrawal* and Soenath Biswas - epartent of Coputer Science and Engineering, Indian

More information

A Study of the Relationship Between Support Vector Machine and Gabriel Graph

A Study of the Relationship Between Support Vector Machine and Gabriel Graph A Study of the Relationship Between Support Vector Machine and Gabriel Graph Wan Zhang and Irwin King {wzhang, king}@cse.cuhk.edu.hk Departent of Coputer Science & Engineering The Chinese University of

More information

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of

More information

An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured from Different Viewpoints

An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured from Different Viewpoints 519 An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured fro Different Viewpoints Yousuke Kawauchi 1, Shin Usuki, Kenjiro T. Miura 3, Hiroshi Masuda 4 and Ichiro Tanaka 5 1 Shizuoka

More information

Using an induction prover for verifying arithmetic circuits

Using an induction prover for verifying arithmetic circuits Int J STTT (2000) 3: 1 34 2000 Springer-Verlag Using an induction prover for verifying arithetic circuits Deepak Kapur 1, M. Subraania 2 1 Departent of Coputer Science,University of New Mexico,Albuquerque,NM

More information

Quantitative Comparison of Sinc-Approximating Kernels for Medical Image Interpolation

Quantitative Comparison of Sinc-Approximating Kernels for Medical Image Interpolation Quantitative Coparison of Sinc-Approxiating Kernels for Medical Iage Interpolation Erik H. W. Meijering, Wiro J. Niessen, Josien P. W. Plui, Max A. Viergever Iage Sciences Institute, Utrecht University

More information

FPL Implementation of a SIMD RISC RNS-Enabled DSP

FPL Implementation of a SIMD RISC RNS-Enabled DSP FPL Ipleentation of a SIMD RISC RNS-Enabled DSP J. RAMÍREZ (1), A. GARCÍA (1), P. G. FERNÁNDEZ (2), A. LLORIS (1) (1) Dpt. of Electronics and Coputer Technology (2) Dpt. of Electrical Engineering University

More information

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We

More information

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San

More information

Using the Karp-Miller Tree Construction to Analyse Concurrent Finite-State Programs

Using the Karp-Miller Tree Construction to Analyse Concurrent Finite-State Programs Using the Karp-Miller Tree Construction to Analyse Concurrent Finite-State Programs Haoxian Zhao Kellogg College Submitted in partial fulfilment of the degree of Master of Science in Computer Science Supervised

More information

Action Recognition Using Local SpatioTemporal Oriented Energy Features and Additive. Kernel SVMs

Action Recognition Using Local SpatioTemporal Oriented Energy Features and Additive. Kernel SVMs International Journal of Electronics and Electrical Engineering Vol., No., June, 4 Action Recognition Using Local SpatioTeporal Oriented Energy Features and Additive Kernel SVMs Jiangfeng Yang and Zheng

More information

Data Caching for Enhancing Anonymity

Data Caching for Enhancing Anonymity Data Caching for Enhancing Anonyity Rajiv Bagai and Bin Tang Departent of Electrical Engineering and Coputer Science Wichita State University Wichita, Kansas 67260 0083, USA Eail: {rajiv.bagai, bin.tang}@wichita.edu

More information