A Petri net-based Approach to QoS-aware Configuration for Web Services
|
|
- Amice Robertson
- 5 years ago
- Views:
Transcription
1 A Petri net-based Aroach to QoS-aware Configuration for Web s PengCheng Xiong, YuShun Fan and MengChu Zhou, Fellow, IEEE Abstract With the develoment of enterrise-wide and cross-enterrise alication integration and interoeration towards web service, web service roviders try to not only fulfill the functional requirements of web service users, but also satisfy their non-functional conditions in order to survive in the cometitive market. A hot research toic is how to configure web services to meet their demand under a dynamic heterogeneous environment. This aer builds a web service configuration net based on Petri nets in order to exhibit web service configuration in a formal way. Then, an otimal algorithm is resented to hel choose the best configuration with the otimal quality of services (QoS) to meet users non-functional requirements. Finally, the simulation results and related analysis rove the soundness and correctness of our model and algorithm. I. INTRODUCTION EB service [] framework has evolved to become a W romising technology for the integration of disarate software comonents using Internet rotocols. Web service roviders register web services through an UDDI registry. The web service that they intend to offer is defined by WSDL. Then, web service users/requestors discover the needed web services and send the requests via invocation interfaces. After the resonse from a web service rovider, they invoke those services under SOAP. When any single web service fails to accomlish service requestor s multile function requirements, multile web services need to be dynamically configured together to form a web service comosition. However, configuring web services to meet secial needs is not a trivial task. There are two main considerations. One is functional requirement []. In this resect, the configuration must ensure that all functions required by the requestor are rovided by service elements. comonent architecture [3] rovides a rogramming model through assembly of heterogeneous services. A dynamic configuration can be modeled as a functional decomosition This work was suorted in art by the National High Technology Research and Develoment (863) Program of China under Grant 006AA0Z5 and the China National Science Foundation under Grant The extended version of this aer is submitted to IEEE Transaction on System, Man and Cybernetics: Part A for review. P.C. Xiong and Y.S. Fan are with the Deartment of Automation, Tsinghua University, Beijing 0008, China ( xc03@mails.tsinghua.edu.cn, fanyus@tsinghua.edu.cn) M.C. Zhou is with Deartment of ECE, New Jersey Institute of Technology Newark, NJ USA and School of Electro-Mechanical Engineering, Xidian University, Xi'An, Shanxi 7007, China ( zhou@njit.edu). of the overall requested function. As a formal digrah to resent all of the deendency relationshis, Deendency Grah (SDG) is oularly used to deict deendency relationshi among web services []. Although it rovides a means for web service configuration descritions in order to ensure functional interoerability among collaborating web services, SDG deals with only the functional asect. It is not hard to imagine that service requestors will face with a large number of choices of service configurations that can rovide the similar function. Another consideration is non-functional [-9], such as cost and QoS which are necessary for the evaluation, selection, and configuration of needed service comositions. Nevertheless, although there are many research aers [-5], rojects, such as METEOR-S [7], and middleware, such as GlueQoS [8] and SwinDeW [9] related to QoS aware web service selection, they do not consider that a service configuration is oerating under an environment where the run-time erformance is fluctuating and quality of the individual services are subject to change. In this aer, we address the otimal configuration issues by concentrating on a) modeling and definition of the configuration and b) the otimal QoS searching algorithm under a varying environment. II. MODELING SERVICE CONFIGURATION WITH PETRI NETS The web service rovided may be dynamically reconfigured uon the service comonent udates, resource availability changes, or user requests. We model the configuration roblem as Functional Deendency Configuration (SFDC). A web service rovided may have multile SFDCs. The functional deendency relationshi of a configuration can be divided into two tyes, i.e., function combination and function selection. We describe these two basic tyes by alying AND and OR structures in Petri nets [0] as shown in Fig.. The following definition is used. Definition : A Petri net is a 5-tule PN = ( P, T, I, O, M ) where:. P =,,...,, m > 0, is a finite set of laces. m. T = t, t,..., t, n > 0, is a finite set of transitions, with n P T and P T = ; 3. I : P T 0,, is an inut function that defines the set of directed arcs from P to T;. O: P T 0,, is an outut function that defines the set of directed arcs from T to P;
2 5. M : P N, is an m column vector whose ith comonent reresents the number of tokens in the ith lace, where N = 0,. An initial marking is denoted by M t t t 3 Figure. AND/OR structure in Petri nets Post set of t is the set of outut laces of t, denoted by t. Preset of t is the set of inut laces of t, denoted by t. Post (Pre) set of is the set of outut (inut) transitions of, denoted by and resectively. Definition : set S = WS s dummy where = is a finite set of web services, and s dummy is WS s z dummy service. Definition 3: Functional Deendency Configuration Net (S-net) : an acyclic Petri net PN is an S-net if:. s S, P, s is maed to a web service lace. If s is a dummy service, s is maed to. t T, if t > and relationshi between and dummy 8 t P., t, there is an AND. t T, if t =, t = and >, there is an OR relationshi among ( ). 3. Each transition has only one inut arc and at least one outut arc.. There is a lace denoted by ' with no inut arc, which corresonds to the service the user requests. M ( ') = and 0 M ( ) = 0, ' A marking in an S-net is changed according to the following transition rule: ) A transition t T is said to be enabled if and only if M ( ) I(, t), P and we denote M [ t >. We denote E(M) as an enabled transition set under M. ) Firing t at M leads to M ', denoted as M [ t > M ', where M '( ) = 0 if ( t, ) I; M '( ) = if ( t, ) Oand M '( ) = M ( ) otherwise. Definition : An SFDC, at timeζ, denoted as C( ', ζ ) is a subset of P such that (a) ' C( ', ζ ), and (b) C( ', ζ ), if, t and '' t, '' C( ', ζ ). III. AUTOMATIC WEB SERVICE CONFIGURATION WITH OPTIMAL QOS Each functionality of a service may have several QoS arameters and can be evaluated by measurements. Ran sorts the QoS arameters into runtime, transaction suort, configuration management and cost, and security related ones []. Each is made u of several metrics and sub-metrics. For instance, higher values of throughut, reliability, robustness and flexibility are desired. Lower values of resonse time, latency and cost are also referred. We suose that a certain QoS arameter of a non-dummy web service lace at time ζ is ψ (, ζ ). In general, higher value of ψ (, ζ ) means higher quality. For examle, ψ (, ζ ) can be throughut and denotes the number of comleted service requests over a time eriod. To reflect the cost, ψ (, ζ ) is defined as the value of zero minus the rice involved in requesting the service. If the web service reresented by is not available, ψ (, ζ ) =. Because the whole functionality of a service deends on its own functionality and that of its deendent sub-services, we assume that a QoS arameter for a C( ', ζ ) is a function of the QoS arameter of all the non-dummy deendent services, i.e., QoS( C( ', ζ)) = f ( ψ(, ζ) C( ', ζ) \ ). dummy For examle, the function to calculate the configuration cost can be simly summing u of all the non-dummy services ψ (, ζ ), i.e., QoS( C( ', ζ )) = ψ(, ζ ) C( ', ζ )\ dummy Given ' and ζ, the algorithm to search for the best C( ', ζ ) of S-net PN, i.e., an SFDC with the highest QoS( C( ', ζ )) is as follows OtimalConfiguration( ', ζ ) Initialization: Get the ψ (, ζ ) for all the non-dummy web service laces Set all the transitions as unmarked find=false a marking stack S = M 0 OtimalQoS= //The otimal QoS OtimalS= //The otimal marking stack CStack= //The configured web service lace stack While ( S ) Begin Get the marking at the to of the stack M = STo. If t where M[ t > and t has never been marked with M Mark t with M; For every t' E( M), if t' Push t into CStack; M ' = Mt [ > ; t, mark t ' with M;
3 For every, if CStack Delete the token in and set M '( ) = 0 ; Push M ' into S; If (find==true) and QoS(S)<OtimalQoS Po(S) and Po (CStack); Elseif t t where M[ t > but t t has been marked with M Po(S) and Po(CStack); Else If QoS(S)>OtimalQoS //At this time the first or a better configuration is found. find= true; OtimalQoS= QoS(S); OtimalS= Configuration(S); Po(S) and Po(CStack); End Begin End While The QoS for a marking stack S can be calculated as follows: QoS(Stack S) Set temorary web service lace set P = T For every CStack Add to P ; T Get the marking at the to of the stack M = STo. Find all P, M( ) > 0 Add to P ; T Return f ( ψ(, ζ) P \ ) T dummy The configuration for a marking stack S can be calculated as follows: Configuration(Stack S) Set temorary SFDC C( ', ζ ) = For every CStack Add to C( ', ζ ) Get the marking at the to of the stack M = STo. Find all P, M( ) > 0 Add to C( ', ζ ) Return C( ', ζ ) Generally seaking, the QoS arameter of the configuration is deteriorating when more deendent web services are added to the configuration, e.g., comared with an individual web service, the integral of this web service and a deendent web service on it has worse reliability, longer latency and higher cost. Based on this regulation, as the algorithm roceeds, when the QoS arameter of the current configuration is already worse than the otimal one, we sto searching along this configuration ath and retrieve to another one through o and ush oerations. Hence the QoS arameter of C( ', ζ ) found through the algorithm is increasing monotonically, and we can conclude that the algorithm is able to find the best C( ', ζ ) with the highest QoS( C( ', ζ )). Only in the worst case, the algorithm has to search for the whole reachability tree. Theorem [6]: If P\ ', = η, the worst-case dummy comlexity of the above algorithm is aroximately Oe ( η ), where e.788 is the base of the natural logarithm. Though the algorithm is roved to be of exonential time in the worst case, the comlexity grows exonentially only with the number of laces in OR structures (not all laces) in the S-net and also deends on actual circumstance. On the other hand, the configuration ste in our algorithm can be carried out concurrently, meaning that each sibling transition of t, i.e., ( t) \ t can fire with t concurrently. If multirocessors are used, this roerty can seed u the algorithm. Moreover, the algorithm derives the best configuration result whose erformance may well exceed what the user really exects. Hence, if considering users actual exectation, the algorithm can terminate in a shorter time once it finds the first configuration meeting their exectation. The above oints rove the alicability of our algorithm. IV. CASE STUDY AND PERFORMANCE ANALYSIS To evaluate algorithm OtimalConfiguration, we take an examle and measure its configuration ability in user satisfaction rate through simulation. During the execution, at a given time eriod ϒ, we measure the number of the invoking times Invoking( ϒ ) and the number of times the user s request is satisfied Satisfied( ϒ ). Then the user satisfaction rate can be calculated as Cr( ϒ ) = Satisfied( ϒ)/ Invoking( ϒ ). We comare the erformance of the roosed algorithm with two other tyical aroaches. The first method is Fixed, which selects the first feasible configuration and never changes. The other one is Random, which randomly chooses a configuration regardless of its erformance. In this section we take the examle of manufacture execution service configuration as shown in Fig.. The manufacture execution service deends on the order management service to collect orders, worksho management service to schedule and monitor job rogress, and rocess quality control service to track roduct quality. The job
4 rogress reort service further relies on two kinds of monitoring services, i.e., the human insection and live monitoring aroaches. Both of the aroaches deend on a data collection service. The data collection service is a dummy service and shown in a dotted-line box, because the configuration should choose one and only one system to realize it. Figure. Web service deendency grah The S-net corresonding to the web service deendency grah is shown in Fig. 3. For simlicity, here we take the cost of the web services as the QoS arameter. Suose that in a highly varying environment, the cost of a web service changes conforming to a normal distribution. The web services that ' and 8 denote and their cost distribution arameters are shown in Tab.. We also assume that the user affordable rice fluctuates in a normal distribution with a mean of 00 and a standard deviation of 0. The average user s request arrival rate is 0. er second and we aroximately receive 600 web service requests over 3000 second eriod in the simulation environment. ' Figure 3. Web service deendency grah We comare the erformance of different algorithms in our simulation in Fig. and Fig. 5. In the simulation, we choose the first feasible configuration as ',,,, for 9 7 Fixed. And it has the worst success rate because of its uniformly choosing one configuration. Random has better erformance since it has more chances to obtain a better configuration. OtimalConfiguration algorithm kees the best success rate since it can accommodate its choice to the changing environment. Because the algorithm does not have to generate the whole reachability tree each time, it is also better than the exhausted enumeration method. We then study the algorithm erformance under a wider request range, i.e., the user affordable rice has an increased mean from 350 to 500 and a standard deviation of 0. The simulation result is shown in Fig. 5. The curve for our OtimalConfiguration algorithm is always above the curves for Random and Fixed algorithms, which roves a better erformance over the other two. Moreover, under a stringent user s request, e.g., 350, our OtimalConfiguration algorithm can still satisfy over 30% of the requests while the other two almost fail. When we gradually relax user s request to 500, the curve for OtimalConfiguration reaches 00% satisfaction rate raidly, while the other two at a lower seed. Note that, Random is not always better than Fixed. In the simulation environment, because the sum of normal distribution variables also conforms to a normal distribution, we can denote the cost obtained through the Fixed and Random algorithms as normal distributions Nu (, σ ) and R Nu (, σ ) resectively, where R Nuσ (, ) denotes a normal distribution with a mean of u and a standard deviation of σ. From the cost distribution arameters in Tab., it is easy to get u > u and σ σ aroximately. Suose that the F R F R affordable rice conforms to Nu (, σ ). The success rate U U for the Fixed and Random algorithms can be calculated as Φ(( u u ) / σ + σ ) and U F F U Φ(( u u ) / σ + σ ) resectively, where U R R U x ( x ) e t Φ = / d t π is the Lalace function. Under the fixed affordable rice mean of 00, we can calculate the satisfaction rate for Fixed as Φ( 0.899) = 0.8, which is close to the simulation result in Fig.. Hence, if u > u and F R σ = σ F R, Random has a higher user satisfaction rate. But if the first feasible configuration Fixed chooses the case that u < u, for instance, ',,,,,, it has a F R higher user satisfaction rate than that of Random. In summary, the above simulation results show that our algorithm is the best suitable for the highly varying environment, while delivering web services with high QoS uon a user s request to make the configuration decision. TABLE I THE WEB SERVICES AND THEIR COST DISTRIBUTION PARAMETERS. Places ' Web service name Manufacture Execution Order Management Mean cost of F F Standard Deviation of Cost
5 3 5 Worksho Management Process Quality Control Job Scheduling Alarm and Warning SPC Product Tracking 7 8 Rolling Scheduling PLC PLC 7 0 PLC 3 6 Human Insection 3 Live Monitoring System 58 5 System System Bar Code 55 7 RFID 3 8 Otimal Random Fixed Otimal Random Fixed Figure 5. Simulation result under variable affordable rice mean from 350 to 500 V. CONCLUSION Since web service framework brings in a new revolution in traditional comuting, web service configuration issues have been receiving more and more attentions. The imortance of web service configuration is also incarnated in the research on other hot toics such as service fault management, accounting management as well as service comonent selection olicy. This aer rooses a systematic method to manage the existent web services to form a high erformance configuration under a diverse and changeable environment. It resents a service functional deendency configuration net based on Petri nets for the web service resentation and automatic configuration. Based on the configuration net, this aer resents an otimal algorithm able to return the otimal configuration with the best QoS arameter. Comared with a brute force exhaust algorithm, this algorithm often does not have to search for all the ossible configurations in order to obtain the otimal one. Moreover, theoretical evidence and simulation results demonstrate that the configuration results our algorithm returns can achieve the highest user satisfaction rate. Figure. Simulation result under fixed affordable rice mean of 00 REFERENCES [] F. Curbera, M. Duftler, R. Khalaf, W. Nagy, N. Mukhi and S. Weerawarana, Unraveling the Web s Web: An Introduction to SOAP, WSDL, and UDDI, IEEE Internet Comuting, Vol. 6, No., , Mar./Ar. 00. [] P. Hasselmayer, Managing Dynamic Deendencies, Proc. of the th Int l Worksho on Distributed Systems: Oerations and Management, Nancy, France, Oct. 00,.-50. [3] IBM, SAP, Oracle, BEA, Sybase, Siebel Systems, etc. SCA Assembly Model Secification. htt://www-8.ibm.com/develoerworks/library/secification/ws-sca [] S. Ran, A model for web services discovery with QoS, SIGecom Exchanges, Vol., Iss.,. -0, Mar [5] D. Ardagna and B. Pernici, Global and local QoS constraints guarantee in Web service selection, Proc. of 005 IEEE International Conference on Web s, Orlando, FL, July 005,
6 [6] P.C. Xiong, Y. S. Fan and M.C. Zhou, QoS-aware Web Configuration, Submitted to IEEE Transaction on System, Man and Cybernetics, Part A. [7] A. Sheth, J. Cardoso, J. Miller and K. Kochut, QoS for -oriented Middleware, Proc. of the Conference on Systemics, Cybernetics and Informatics, Orlando, FL, July 00, [8] E. Wohlstadter, S. Tai, T. Mikalsen, I. Rouvellou and P. Devanbu, GlueQoS: middleware to sweeten quality-of-service olicy interactions, Proc. of the 6th International Conference on Software Engineering, Edinburgh, United Kingdom, May 00, [9] J. Yan, Y. Yang and G. K. Raikundalia, SwinDeW-a -based decentralized workflow management system, IEEE Transactions on Systems, Man and Cybernetics, Part A, Vol. 36, Iss. 5, , Set [0] M.C. Zhou and K. Venkatesh, Modeling, Simulation and Control of Flexible Manufacturing Systems: A Petri Net Aroach, World Scientific, Singaore, 998.
An Efficient Video Program Delivery algorithm in Tree Networks*
3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,
More informationSensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network
1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann
More informationA CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH
A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu
More informationDirected File Transfer Scheduling
Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was
More informationA New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism
A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism Erlin Yao, Mingyu Chen, Rui Wang, Wenli Zhang, Guangming Tan Key Laboratory of Comuter System and Architecture Institute
More informationJ. Parallel Distrib. Comput.
J. Parallel Distrib. Comut. 71 (2011) 288 301 Contents lists available at ScienceDirect J. Parallel Distrib. Comut. journal homeage: www.elsevier.com/locate/jdc Quality of security adatation in arallel
More informationAUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.
inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.
More informationImproving Trust Estimates in Planning Domains with Rare Failure Events
Imroving Trust Estimates in Planning Domains with Rare Failure Events Colin M. Potts and Kurt D. Krebsbach Det. of Mathematics and Comuter Science Lawrence University Aleton, Wisconsin 54911 USA {colin.m.otts,
More informationIMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model
IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,
More informationSingle character type identification
Single character tye identification Yefeng Zheng*, Changsong Liu, Xiaoqing Ding Deartment of Electronic Engineering, Tsinghua University Beijing 100084, P.R. China ABSTRACT Different character recognition
More informationOMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications
OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture
More informationPREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS
PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links
More informationExtracting Optimal Paths from Roadmaps for Motion Planning
Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu
More informationLecture 8: Orthogonal Range Searching
CPS234 Comutational Geometry Setember 22nd, 2005 Lecture 8: Orthogonal Range Searching Lecturer: Pankaj K. Agarwal Scribe: Mason F. Matthews 8.1 Range Searching The general roblem of range searching is
More informationSIMULATION SYSTEM MODELING FOR MASS CUSTOMIZATION MANUFACTURING
Proceedings of the 2002 Winter Simulation Conference E. Yücesan, C.-H. Chen, J. L. Snowdon, and J. M. Charnes, eds.. SIMULATION SYSTEM MODELING FOR MASS CUSTOMIATION MANUFACTURING Guixiu Qiao Charles McLean
More informationTheoretical Analysis of Graphcut Textures
Theoretical Analysis o Grahcut Textures Xuejie Qin Yee-Hong Yang {xu yang}@cs.ualberta.ca Deartment o omuting Science University o Alberta Abstract Since the aer was ublished in SIGGRAPH 2003 the grahcut
More informationIdentity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects
Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScrit Objects Shiyi Wei and Barbara G. Ryder Deartment of Comuter Science, Virginia Tech, Blacksburg, VA, USA. {wei,ryder}@cs.vt.edu
More informationSemi-Markov Process based Model for Performance Analysis of Wireless LANs
Semi-Markov Process based Model for Performance Analysis of Wireless LANs Murali Krishna Kadiyala, Diti Shikha, Ravi Pendse, and Neeraj Jaggi Deartment of Electrical Engineering and Comuter Science Wichita
More informationSpace-efficient Region Filling in Raster Graphics
"The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich
More informationConstrained Path Optimisation for Underground Mine Layout
Constrained Path Otimisation for Underground Mine Layout M. Brazil P.A. Grossman D.H. Lee J.H. Rubinstein D.A. Thomas N.C. Wormald Abstract The major infrastructure comonent reuired to develo an underground
More informationSkip List Based Authenticated Data Structure in DAS Paradigm
009 Eighth International Conference on Grid and Cooerative Comuting Ski List Based Authenticated Data Structure in DAS Paradigm Jieing Wang,, Xiaoyong Du,. Key Laboratory of Data Engineering and Knowledge
More informationSynthesis of FSMs on the Basis of Reusable Hardware Templates
Proceedings of the 6th WSEAS Int. Conf. on Systems Theory & Scientific Comutation, Elounda, Greece, August -3, 006 (09-4) Synthesis of FSMs on the Basis of Reusable Hardware Temlates VALERY SKLYAROV, IOULIIA
More informationRandomized algorithms: Two examples and Yao s Minimax Principle
Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum
More informationsplit split (a) (b) split split (c) (d)
International Journal of Foundations of Comuter Science c World Scientic Publishing Comany ON COST-OPTIMAL MERGE OF TWO INTRANSITIVE SORTED SEQUENCES JIE WU Deartment of Comuter Science and Engineering
More informationAn Efficient Coding Method for Coding Region-of-Interest Locations in AVS2
An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China
More informationEquality-Based Translation Validator for LLVM
Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented
More informationStatistical Detection for Network Flooding Attacks
Statistical Detection for Network Flooding Attacks C. S. Chao, Y. S. Chen, and A.C. Liu Det. of Information Engineering, Feng Chia Univ., Taiwan 407, OC. Email: cschao@fcu.edu.tw Abstract In order to meet
More informationHardware-Accelerated Formal Verification
Hardare-Accelerated Formal Verification Hiroaki Yoshida, Satoshi Morishita 3 Masahiro Fujita,. VLSI Design and Education Center (VDEC), University of Tokyo. CREST, Jaan Science and Technology Agency 3.
More informationAuto-Tuning Distributed-Memory 3-Dimensional Fast Fourier Transforms on the Cray XT4
Auto-Tuning Distributed-Memory 3-Dimensional Fast Fourier Transforms on the Cray XT4 M. Gajbe a A. Canning, b L-W. Wang, b J. Shalf, b H. Wasserman, b and R. Vuduc, a a Georgia Institute of Technology,
More informationIntroduction to Parallel Algorithms
CS 1762 Fall, 2011 1 Introduction to Parallel Algorithms Introduction to Parallel Algorithms ECE 1762 Algorithms and Data Structures Fall Semester, 2011 1 Preliminaries Since the early 1990s, there has
More informationLecture 2: Fixed-Radius Near Neighbors and Geometric Basics
structure arises in many alications of geometry. The dual structure, called a Delaunay triangulation also has many interesting roerties. Figure 3: Voronoi diagram and Delaunay triangulation. Search: Geometric
More informationTo appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree
To aear in IEEE TKDE Title: Efficient Skyline and To-k Retrieval in Subsaces Keywords: Skyline, To-k, Subsace, B-tree Contact Author: Yufei Tao (taoyf@cse.cuhk.edu.hk) Deartment of Comuter Science and
More informationShuigeng Zhou. May 18, 2016 School of Computer Science Fudan University
Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions
More informationObject and Native Code Thread Mobility Among Heterogeneous Computers
Object and Native Code Thread Mobility Among Heterogeneous Comuters Bjarne Steensgaard Eric Jul Microsoft Research DIKU (Det. of Comuter Science) One Microsoft Way University of Coenhagen Redmond, WA 98052
More informationMatlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems
Matlab Virtual Reality Simulations for otimizations and raid rototying of flexible lines systems VAMVU PETRE, BARBU CAMELIA, POP MARIA Deartment of Automation, Comuters, Electrical Engineering and Energetics
More informationA DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans
Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment
More informationExperimental Comparison of Shortest Path Approaches for Timetable Information
Exerimental Comarison of Shortest Path roaches for Timetable Information Evangelia Pyrga Frank Schulz Dorothea Wagner Christos Zaroliagis bstract We consider two aroaches that model timetable information
More informationSource-to-Source Code Generation Based on Pattern Matching and Dynamic Programming
Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Weimin Chen, Volker Turau TR-93-047 August, 1993 Abstract This aer introduces a new technique for source-to-source code
More informationInformation Flow Based Event Distribution Middleware
Information Flow Based Event Distribution Middleware Guruduth Banavar 1, Marc Kalan 1, Kelly Shaw 2, Robert E. Strom 1, Daniel C. Sturman 1, and Wei Tao 3 1 IBM T. J. Watson Research Center Hawthorne,
More informationEfficient Parallel Hierarchical Clustering
Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore
More informationCollective Communication: Theory, Practice, and Experience. FLAME Working Note #22
Collective Communication: Theory, Practice, and Exerience FLAME Working Note # Ernie Chan Marcel Heimlich Avi Purkayastha Robert van de Geijn Setember, 6 Abstract We discuss the design and high-erformance
More informationCooperative Diversity Combined with Beamforming
Cooerative Diversity Combined with Beamforming Hyunwoo Choi and Jae Hong Lee School of Electrical Engineering and INMC Seoul National University Seoul, Korea Email: {novo28, jhlee}@snu.ac.kr Abstract In
More informationA Model-Adaptable MOSFET Parameter Extraction System
A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313
More informationAllowing the use of Multiple Ontologies for Discovery of Web Services in Federated Registry Environment
Allowing the use of Multile Ontologies for Discovery of Web Services in Federated Registry Environment Kunal Verma 1, Amit Sheth 2, Swana Oundhakar 3, Kaarthik Sivashanmugam 4, John Miller 3 1 Accenture
More informationEfficient Sequence Generator Mining and its Application in Classification
Efficient Sequence Generator Mining and its Alication in Classification Chuancong Gao, Jianyong Wang 2, Yukai He 3 and Lizhu Zhou 4 Tsinghua University, Beijing 0084, China {gaocc07, heyk05 3 }@mails.tsinghua.edu.cn,
More informationImplementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching
Imlementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching Ju Hui Li, eng Hiot Lim and Qi Cao School of EEE, Block S Nanyang Technological University Singaore 639798
More informationEfficient Processing of Top-k Dominating Queries on Multi-Dimensional Data
Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of
More informationSource Coding and express these numbers in a binary system using M log
Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is
More informationProtecting Mobile Agents against Malicious Host Attacks Using Threat Diagnostic AND/OR Tree
Protecting Mobile Agents against Malicious Host Attacks Using Threat Diagnostic AND/OR Tree Magdy Saeb, Meer Hamza, Ashraf Soliman. Arab Academy for Science, Technology & Maritime Transort Comuter Engineering
More informationAd Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model
Ad Hoc Networks (4) 5 68 Contents lists available at SciVerse ScienceDirect Ad Hoc Networks journal homeage: www.elsevier.com/locate/adhoc Latency-minimizing data aggregation in wireless sensor networks
More informationStereo Disparity Estimation in Moment Space
Stereo Disarity Estimation in oment Sace Angeline Pang Faculty of Information Technology, ultimedia University, 63 Cyberjaya, alaysia. angeline.ang@mmu.edu.my R. ukundan Deartment of Comuter Science, University
More informationAn empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs
An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science
More informationCollective communication: theory, practice, and experience
CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Comutat.: Pract. Exer. 2007; 19:1749 1783 Published online 5 July 2007 in Wiley InterScience (www.interscience.wiley.com)..1206 Collective
More informationTruth Trees. Truth Tree Fundamentals
Truth Trees 1 True Tree Fundamentals 2 Testing Grous of Statements for Consistency 3 Testing Arguments in Proositional Logic 4 Proving Invalidity in Predicate Logic Answers to Selected Exercises Truth
More informationEE678 Application Presentation Content Based Image Retrieval Using Wavelets
EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective
More informationAutonomic Physical Database Design - From Indexing to Multidimensional Clustering
Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Stehan Baumann, Kai-Uwe Sattler Databases and Information Systems Grou Technische Universität Ilmenau, Ilmenau, Germany
More informationThe VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing
The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing Mikael Taveniku 2,3, Anders Åhlander 1,3, Magnus Jonsson 1 and Bertil Svensson 1,2
More informationComplexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks
Journal of Comuting and Information Technology - CIT 8, 2000, 1, 1 12 1 Comlexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Eunice E. Santos Deartment of Electrical
More informationCMSC 425: Lecture 16 Motion Planning: Basic Concepts
: Lecture 16 Motion lanning: Basic Concets eading: Today s material comes from various sources, including AI Game rogramming Wisdom 2 by S. abin and lanning Algorithms by S. M. LaValle (Chats. 4 and 5).
More informationA Study of Protocols for Low-Latency Video Transport over the Internet
A Study of Protocols for Low-Latency Video Transort over the Internet Ciro A. Noronha, Ph.D. Cobalt Digital Santa Clara, CA ciro.noronha@cobaltdigital.com Juliana W. Noronha University of California, Davis
More informationOn Growth of Parallelism within Routers and Its Impact on Packet Reordering 1
On Growth of Parallelism within Routers and Its Imact on Reordering 1 A. A. Bare 1, A. P. Jayasumana, and N. M. Piratla 2 Deartment of Electrical & Comuter Engineering, Colorado State University, Fort
More informationGENERIC PILOT AND FLIGHT CONTROL MODEL FOR USE IN SIMULATION STUDIES
AIAA Modeling and Simulation Technologies Conference and Exhibit 5-8 August 22, Monterey, California AIAA 22-4694 GENERIC PILOT AND FLIGHT CONTROL MODEL FOR USE IN SIMULATION STUDIES Eric N. Johnson *
More informationConstruction of Irregular QC-LDPC Codes in Near-Earth Communications
Journal of Communications Vol. 9, No. 7, July 24 Construction of Irregular QC-LDPC Codes in Near-Earth Communications Hui Zhao, Xiaoxiao Bao, Liang Qin, Ruyan Wang, and Hong Zhang Chongqing University
More informationUsing Kullback-Leibler Divergence to Model Opponents in Poker
Comuter Poker and Imerfect Information: Paers from the I-14 Worksho Using Kullback-Leibler Divergence to Model Oonents in Poker Jiajia Zhang 1, Xuan Wang, Lin Yao 3, Jingeng Li 1, Xuedong Shen 1 1 Intelligence
More informationA GPU Heterogeneous Cluster Scheduling Model for Preventing Temperature Heat Island
A GPU Heterogeneous Cluster Scheduling Model for Preventing Temerature Heat Island Yun-Peng CAO 1,2,a and Hai-Feng WANG 1,2 1 School of Information Science and Engineering, Linyi University, Linyi Shandong,
More informationMATHEMATICAL MODELING OF COMPLEX MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT
MATHEMATICAL MODELING OF COMPLE MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT V.N. Nesterov JSC Samara Electromechanical Plant, Samara, Russia Abstract. The rovisions of the concet of a multi-comonent
More informationAn Efficient End-to-End QoS supporting Algorithm in NGN Using Optimal Flows and Measurement Feed-back for Ubiquitous and Distributed Applications
An Efficient End-to-End QoS suorting Algorithm in NGN Using Otimal Flows and Measurement Feed-back for Ubiquitous and Distributed Alications Se Youn Ban, Seong Gon Choi 2, Jun Kyun Choi Information and
More informationAPPLICATION OF PARTICLE FILTERS TO MAP-MATCHING ALGORITHM
APPLICATION OF PARTICLE FILTERS TO MAP-MATCHING ALGORITHM Pavel Davidson 1, Jussi Collin 2, and Jarmo Taala 3 Deartment of Comuter Systems, Tamere University of Technology, Finland e-mail: avel.davidson@tut.fi
More informationInteractive Image Segmentation
Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).
More informationLearning Robust Locality Preserving Projection via p-order Minimization
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence Learning Robust Locality Preserving Projection via -Order Minimization Hua Wang, Feiing Nie, Heng Huang Deartment of Electrical
More informationFIELD-programmable gate arrays (FPGAs) are quickly
This article has been acceted for inclusion in a future issue of this journal Content is final as resented, with the excetion of agination IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS
More informationAn Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal
International Journal of Information and Electronics Engineering, Vol. 1, No. 1, July 011 An Efficient VLSI Architecture for Adative Rank Order Filter for Image Noise Removal M. C Hanumantharaju, M. Ravishankar,
More informationDistributed Estimation from Relative Measurements in Sensor Networks
Distributed Estimation from Relative Measurements in Sensor Networks #Prabir Barooah and João P. Hesanha Abstract We consider the roblem of estimating vectorvalued variables from noisy relative measurements.
More informationAn Indexing Framework for Structured P2P Systems
An Indexing Framework for Structured P2P Systems Adina Crainiceanu Prakash Linga Ashwin Machanavajjhala Johannes Gehrke Carl Lagoze Jayavel Shanmugasundaram Deartment of Comuter Science, Cornell University
More informationPrivacy Preserving Moving KNN Queries
Privacy Preserving Moving KNN Queries arxiv:4.76v [cs.db] 4 Ar Tanzima Hashem Lars Kulik Rui Zhang National ICT Australia, Deartment of Comuter Science and Software Engineering University of Melbourne,
More information10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1
10 File System 1 We will examine this chater in three subtitles: Mass Storage Systems OERATING SYSTEMS FILE SYSTEM 1 File System Interface File System Imlementation 10.1.1 Mass Storage Structure 3 2 10.1
More informationWavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces
Wavelet Based Statistical Adated Local Binary atterns for Recognizing Avatar Faces Abdallah A. Mohamed 1, 2 and Roman V. Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville,
More informationChapter 8: Adaptive Networks
Chater : Adative Networks Introduction (.1) Architecture (.2) Backroagation for Feedforward Networks (.3) Jyh-Shing Roger Jang et al., Neuro-Fuzzy and Soft Comuting: A Comutational Aroach to Learning and
More information22. Swaping: Policies
22. Swaing: Policies Oerating System: Three Easy Pieces 1 Beyond Physical Memory: Policies Memory ressure forces the OS to start aging out ages to make room for actively-used ages. Deciding which age to
More informationThis document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.
This document is downloaded from DR-NTU, Nanyang Technological University Library, Singaore. Title Automatic Robot Taing: Auto-Path Planning and Maniulation Author(s) Citation Yuan, Qilong; Lembono, Teguh
More informationUsing Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication
Using Permuted States and Validated Simulation to Analyze Conflict Rates in Otimistic Relication An-I A. Wang Comuter Science Deartment Florida State University Geoff H. Kuenning Comuter Science Deartment
More informationUsing Standard AADL for COMPASS
Using Standard AADL for COMPASS (noll@cs.rwth-aachen.de) AADL Standards Meeting Aachen, Germany; July 5 8, 06 Overview Introduction SLIM Language Udates COMPASS Develoment Roadma Fault Injections Parametric
More informationA Metaheuristic Scheduler for Time Division Multiplexed Network-on-Chip
Downloaded from orbit.dtu.dk on: Jan 25, 2019 A Metaheuristic Scheduler for Time Division Multilexed Network-on-Chi Sørensen, Rasmus Bo; Sarsø, Jens; Pedersen, Mark Ruvald; Højgaard, Jasur Publication
More informationThe Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks
The Scalability and Performance of Common Vector Solution to Generalized abel Continuity Constraint in Hybrid Otical/Pacet etwors Shujia Gong and Ban Jabbari {sgong, bjabbari}@gmuedu George Mason University
More informationCASCH - a Scheduling Algorithm for "High Level"-Synthesis
CASCH a Scheduling Algorithm for "High Level"Synthesis P. Gutberlet H. Krämer W. Rosenstiel Comuter Science Research Center at the University of Karlsruhe (FZI) HaidundNeuStr. 1014, 7500 Karlsruhe, F.R.G.
More informationSubmission. Verifying Properties Using Sequential ATPG
Verifying Proerties Using Sequential ATPG Jacob A. Abraham and Vivekananda M. Vedula Comuter Engineering Research Center The University of Texas at Austin Austin, TX 78712 jaa, vivek @cerc.utexas.edu Daniel
More informationA joint multi-layer planning algorithm for IP over flexible optical networks
A joint multi-layer lanning algorithm for IP over flexible otical networks Vasileios Gkamas, Konstantinos Christodoulooulos, Emmanouel Varvarigos Comuter Engineering and Informatics Deartment, University
More informationSensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s
Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,
More informationRelations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University.
Relations with Relation Names as Arguments: Algebra and Calculus Kenneth A. Ross Columbia University kar@cs.columbia.edu Abstract We consider a version of the relational model in which relation names may
More informationGraph: composable production systems in Clojure. Jason Wolfe Strange Loop 12
Grah: comosable roduction systems in Clojure Jason Wolfe (@w01fe) Strange Loo 12 Motivation Interesting software has: many comonents comlex web of deendencies Develoers want: simle, factored code easy
More informationToward Optimal Network Fault Correction via End-to-End Inference
Toward Otimal Network Fault Correction via End-to-End Inference Patrick P. C. Lee, Vishal Misra, and Dan Rubenstein Abstract We consider an end-to-end aroach of inferring network faults that manifest in
More informationLearning Motion Patterns in Crowded Scenes Using Motion Flow Field
Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical
More informationA Method to Determine End-Points ofstraight Lines Detected Using the Hough Transform
RESEARCH ARTICLE OPEN ACCESS A Method to Detere End-Points ofstraight Lines Detected Using the Hough Transform Gideon Kanji Damaryam Federal University, Lokoja, PMB 1154, Lokoja, Nigeria. Abstract The
More informationUse of Multivariate Statistical Analysis in the Modelling of Chromatographic Processes
Use of Multivariate Statistical Analysis in the Modelling of Chromatograhic Processes Simon Edwards-Parton 1, Nigel itchener-hooker 1, Nina hornhill 2, Daniel Bracewell 1, John Lidell 3 Abstract his aer
More information521493S Computer Graphics Exercise 3 (Chapters 6-8)
521493S Comuter Grahics Exercise 3 (Chaters 6-8) 1 Most grahics systems and APIs use the simle lighting and reflection models that we introduced for olygon rendering Describe the ways in which each of
More informationGEOMETRIC CONSTRAINT SOLVING IN < 2 AND < 3. Department of Computer Sciences, Purdue University. and PAMELA J. VERMEER
GEOMETRIC CONSTRAINT SOLVING IN < AND < 3 CHRISTOPH M. HOFFMANN Deartment of Comuter Sciences, Purdue University West Lafayette, Indiana 47907-1398, USA and PAMELA J. VERMEER Deartment of Comuter Sciences,
More informationThe Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005*
The Anubis Service Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL-2005-72 June 8, 2005* timed model, state monitoring, failure detection, network artition Anubis is a fully
More informationMulticast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1
Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and
More informationNear-Optimal Routing Lookups with Bounded Worst Case Performance
Near-Otimal Routing Lookus with Bounded Worst Case Performance Pankaj Guta Balaji Prabhakar Stehen Boyd Deartments of Electrical Engineering and Comuter Science Stanford University CA 9430 ankaj@stanfordedu
More information10. Parallel Methods for Data Sorting
10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting... 1 10.1. Parallelizing Princiles... 10.. Scaling Parallel Comutations... 10.3. Bubble Sort...3 10.3.1. Sequential Algorithm...3
More information