A Petri net-based Approach to QoS-aware Configuration for Web Services

Size: px
Start display at page:

Download "A Petri net-based Approach to QoS-aware Configuration for Web Services"

Transcription

1 A Petri net-based Aroach to QoS-aware Configuration for Web s PengCheng Xiong, YuShun Fan and MengChu Zhou, Fellow, IEEE Abstract With the develoment of enterrise-wide and cross-enterrise alication integration and interoeration towards web service, web service roviders try to not only fulfill the functional requirements of web service users, but also satisfy their non-functional conditions in order to survive in the cometitive market. A hot research toic is how to configure web services to meet their demand under a dynamic heterogeneous environment. This aer builds a web service configuration net based on Petri nets in order to exhibit web service configuration in a formal way. Then, an otimal algorithm is resented to hel choose the best configuration with the otimal quality of services (QoS) to meet users non-functional requirements. Finally, the simulation results and related analysis rove the soundness and correctness of our model and algorithm. I. INTRODUCTION EB service [] framework has evolved to become a W romising technology for the integration of disarate software comonents using Internet rotocols. Web service roviders register web services through an UDDI registry. The web service that they intend to offer is defined by WSDL. Then, web service users/requestors discover the needed web services and send the requests via invocation interfaces. After the resonse from a web service rovider, they invoke those services under SOAP. When any single web service fails to accomlish service requestor s multile function requirements, multile web services need to be dynamically configured together to form a web service comosition. However, configuring web services to meet secial needs is not a trivial task. There are two main considerations. One is functional requirement []. In this resect, the configuration must ensure that all functions required by the requestor are rovided by service elements. comonent architecture [3] rovides a rogramming model through assembly of heterogeneous services. A dynamic configuration can be modeled as a functional decomosition This work was suorted in art by the National High Technology Research and Develoment (863) Program of China under Grant 006AA0Z5 and the China National Science Foundation under Grant The extended version of this aer is submitted to IEEE Transaction on System, Man and Cybernetics: Part A for review. P.C. Xiong and Y.S. Fan are with the Deartment of Automation, Tsinghua University, Beijing 0008, China ( xc03@mails.tsinghua.edu.cn, fanyus@tsinghua.edu.cn) M.C. Zhou is with Deartment of ECE, New Jersey Institute of Technology Newark, NJ USA and School of Electro-Mechanical Engineering, Xidian University, Xi'An, Shanxi 7007, China ( zhou@njit.edu). of the overall requested function. As a formal digrah to resent all of the deendency relationshis, Deendency Grah (SDG) is oularly used to deict deendency relationshi among web services []. Although it rovides a means for web service configuration descritions in order to ensure functional interoerability among collaborating web services, SDG deals with only the functional asect. It is not hard to imagine that service requestors will face with a large number of choices of service configurations that can rovide the similar function. Another consideration is non-functional [-9], such as cost and QoS which are necessary for the evaluation, selection, and configuration of needed service comositions. Nevertheless, although there are many research aers [-5], rojects, such as METEOR-S [7], and middleware, such as GlueQoS [8] and SwinDeW [9] related to QoS aware web service selection, they do not consider that a service configuration is oerating under an environment where the run-time erformance is fluctuating and quality of the individual services are subject to change. In this aer, we address the otimal configuration issues by concentrating on a) modeling and definition of the configuration and b) the otimal QoS searching algorithm under a varying environment. II. MODELING SERVICE CONFIGURATION WITH PETRI NETS The web service rovided may be dynamically reconfigured uon the service comonent udates, resource availability changes, or user requests. We model the configuration roblem as Functional Deendency Configuration (SFDC). A web service rovided may have multile SFDCs. The functional deendency relationshi of a configuration can be divided into two tyes, i.e., function combination and function selection. We describe these two basic tyes by alying AND and OR structures in Petri nets [0] as shown in Fig.. The following definition is used. Definition : A Petri net is a 5-tule PN = ( P, T, I, O, M ) where:. P =,,...,, m > 0, is a finite set of laces. m. T = t, t,..., t, n > 0, is a finite set of transitions, with n P T and P T = ; 3. I : P T 0,, is an inut function that defines the set of directed arcs from P to T;. O: P T 0,, is an outut function that defines the set of directed arcs from T to P;

2 5. M : P N, is an m column vector whose ith comonent reresents the number of tokens in the ith lace, where N = 0,. An initial marking is denoted by M t t t 3 Figure. AND/OR structure in Petri nets Post set of t is the set of outut laces of t, denoted by t. Preset of t is the set of inut laces of t, denoted by t. Post (Pre) set of is the set of outut (inut) transitions of, denoted by and resectively. Definition : set S = WS s dummy where = is a finite set of web services, and s dummy is WS s z dummy service. Definition 3: Functional Deendency Configuration Net (S-net) : an acyclic Petri net PN is an S-net if:. s S, P, s is maed to a web service lace. If s is a dummy service, s is maed to. t T, if t > and relationshi between and dummy 8 t P., t, there is an AND. t T, if t =, t = and >, there is an OR relationshi among ( ). 3. Each transition has only one inut arc and at least one outut arc.. There is a lace denoted by ' with no inut arc, which corresonds to the service the user requests. M ( ') = and 0 M ( ) = 0, ' A marking in an S-net is changed according to the following transition rule: ) A transition t T is said to be enabled if and only if M ( ) I(, t), P and we denote M [ t >. We denote E(M) as an enabled transition set under M. ) Firing t at M leads to M ', denoted as M [ t > M ', where M '( ) = 0 if ( t, ) I; M '( ) = if ( t, ) Oand M '( ) = M ( ) otherwise. Definition : An SFDC, at timeζ, denoted as C( ', ζ ) is a subset of P such that (a) ' C( ', ζ ), and (b) C( ', ζ ), if, t and '' t, '' C( ', ζ ). III. AUTOMATIC WEB SERVICE CONFIGURATION WITH OPTIMAL QOS Each functionality of a service may have several QoS arameters and can be evaluated by measurements. Ran sorts the QoS arameters into runtime, transaction suort, configuration management and cost, and security related ones []. Each is made u of several metrics and sub-metrics. For instance, higher values of throughut, reliability, robustness and flexibility are desired. Lower values of resonse time, latency and cost are also referred. We suose that a certain QoS arameter of a non-dummy web service lace at time ζ is ψ (, ζ ). In general, higher value of ψ (, ζ ) means higher quality. For examle, ψ (, ζ ) can be throughut and denotes the number of comleted service requests over a time eriod. To reflect the cost, ψ (, ζ ) is defined as the value of zero minus the rice involved in requesting the service. If the web service reresented by is not available, ψ (, ζ ) =. Because the whole functionality of a service deends on its own functionality and that of its deendent sub-services, we assume that a QoS arameter for a C( ', ζ ) is a function of the QoS arameter of all the non-dummy deendent services, i.e., QoS( C( ', ζ)) = f ( ψ(, ζ) C( ', ζ) \ ). dummy For examle, the function to calculate the configuration cost can be simly summing u of all the non-dummy services ψ (, ζ ), i.e., QoS( C( ', ζ )) = ψ(, ζ ) C( ', ζ )\ dummy Given ' and ζ, the algorithm to search for the best C( ', ζ ) of S-net PN, i.e., an SFDC with the highest QoS( C( ', ζ )) is as follows OtimalConfiguration( ', ζ ) Initialization: Get the ψ (, ζ ) for all the non-dummy web service laces Set all the transitions as unmarked find=false a marking stack S = M 0 OtimalQoS= //The otimal QoS OtimalS= //The otimal marking stack CStack= //The configured web service lace stack While ( S ) Begin Get the marking at the to of the stack M = STo. If t where M[ t > and t has never been marked with M Mark t with M; For every t' E( M), if t' Push t into CStack; M ' = Mt [ > ; t, mark t ' with M;

3 For every, if CStack Delete the token in and set M '( ) = 0 ; Push M ' into S; If (find==true) and QoS(S)<OtimalQoS Po(S) and Po (CStack); Elseif t t where M[ t > but t t has been marked with M Po(S) and Po(CStack); Else If QoS(S)>OtimalQoS //At this time the first or a better configuration is found. find= true; OtimalQoS= QoS(S); OtimalS= Configuration(S); Po(S) and Po(CStack); End Begin End While The QoS for a marking stack S can be calculated as follows: QoS(Stack S) Set temorary web service lace set P = T For every CStack Add to P ; T Get the marking at the to of the stack M = STo. Find all P, M( ) > 0 Add to P ; T Return f ( ψ(, ζ) P \ ) T dummy The configuration for a marking stack S can be calculated as follows: Configuration(Stack S) Set temorary SFDC C( ', ζ ) = For every CStack Add to C( ', ζ ) Get the marking at the to of the stack M = STo. Find all P, M( ) > 0 Add to C( ', ζ ) Return C( ', ζ ) Generally seaking, the QoS arameter of the configuration is deteriorating when more deendent web services are added to the configuration, e.g., comared with an individual web service, the integral of this web service and a deendent web service on it has worse reliability, longer latency and higher cost. Based on this regulation, as the algorithm roceeds, when the QoS arameter of the current configuration is already worse than the otimal one, we sto searching along this configuration ath and retrieve to another one through o and ush oerations. Hence the QoS arameter of C( ', ζ ) found through the algorithm is increasing monotonically, and we can conclude that the algorithm is able to find the best C( ', ζ ) with the highest QoS( C( ', ζ )). Only in the worst case, the algorithm has to search for the whole reachability tree. Theorem [6]: If P\ ', = η, the worst-case dummy comlexity of the above algorithm is aroximately Oe ( η ), where e.788 is the base of the natural logarithm. Though the algorithm is roved to be of exonential time in the worst case, the comlexity grows exonentially only with the number of laces in OR structures (not all laces) in the S-net and also deends on actual circumstance. On the other hand, the configuration ste in our algorithm can be carried out concurrently, meaning that each sibling transition of t, i.e., ( t) \ t can fire with t concurrently. If multirocessors are used, this roerty can seed u the algorithm. Moreover, the algorithm derives the best configuration result whose erformance may well exceed what the user really exects. Hence, if considering users actual exectation, the algorithm can terminate in a shorter time once it finds the first configuration meeting their exectation. The above oints rove the alicability of our algorithm. IV. CASE STUDY AND PERFORMANCE ANALYSIS To evaluate algorithm OtimalConfiguration, we take an examle and measure its configuration ability in user satisfaction rate through simulation. During the execution, at a given time eriod ϒ, we measure the number of the invoking times Invoking( ϒ ) and the number of times the user s request is satisfied Satisfied( ϒ ). Then the user satisfaction rate can be calculated as Cr( ϒ ) = Satisfied( ϒ)/ Invoking( ϒ ). We comare the erformance of the roosed algorithm with two other tyical aroaches. The first method is Fixed, which selects the first feasible configuration and never changes. The other one is Random, which randomly chooses a configuration regardless of its erformance. In this section we take the examle of manufacture execution service configuration as shown in Fig.. The manufacture execution service deends on the order management service to collect orders, worksho management service to schedule and monitor job rogress, and rocess quality control service to track roduct quality. The job

4 rogress reort service further relies on two kinds of monitoring services, i.e., the human insection and live monitoring aroaches. Both of the aroaches deend on a data collection service. The data collection service is a dummy service and shown in a dotted-line box, because the configuration should choose one and only one system to realize it. Figure. Web service deendency grah The S-net corresonding to the web service deendency grah is shown in Fig. 3. For simlicity, here we take the cost of the web services as the QoS arameter. Suose that in a highly varying environment, the cost of a web service changes conforming to a normal distribution. The web services that ' and 8 denote and their cost distribution arameters are shown in Tab.. We also assume that the user affordable rice fluctuates in a normal distribution with a mean of 00 and a standard deviation of 0. The average user s request arrival rate is 0. er second and we aroximately receive 600 web service requests over 3000 second eriod in the simulation environment. ' Figure 3. Web service deendency grah We comare the erformance of different algorithms in our simulation in Fig. and Fig. 5. In the simulation, we choose the first feasible configuration as ',,,, for 9 7 Fixed. And it has the worst success rate because of its uniformly choosing one configuration. Random has better erformance since it has more chances to obtain a better configuration. OtimalConfiguration algorithm kees the best success rate since it can accommodate its choice to the changing environment. Because the algorithm does not have to generate the whole reachability tree each time, it is also better than the exhausted enumeration method. We then study the algorithm erformance under a wider request range, i.e., the user affordable rice has an increased mean from 350 to 500 and a standard deviation of 0. The simulation result is shown in Fig. 5. The curve for our OtimalConfiguration algorithm is always above the curves for Random and Fixed algorithms, which roves a better erformance over the other two. Moreover, under a stringent user s request, e.g., 350, our OtimalConfiguration algorithm can still satisfy over 30% of the requests while the other two almost fail. When we gradually relax user s request to 500, the curve for OtimalConfiguration reaches 00% satisfaction rate raidly, while the other two at a lower seed. Note that, Random is not always better than Fixed. In the simulation environment, because the sum of normal distribution variables also conforms to a normal distribution, we can denote the cost obtained through the Fixed and Random algorithms as normal distributions Nu (, σ ) and R Nu (, σ ) resectively, where R Nuσ (, ) denotes a normal distribution with a mean of u and a standard deviation of σ. From the cost distribution arameters in Tab., it is easy to get u > u and σ σ aroximately. Suose that the F R F R affordable rice conforms to Nu (, σ ). The success rate U U for the Fixed and Random algorithms can be calculated as Φ(( u u ) / σ + σ ) and U F F U Φ(( u u ) / σ + σ ) resectively, where U R R U x ( x ) e t Φ = / d t π is the Lalace function. Under the fixed affordable rice mean of 00, we can calculate the satisfaction rate for Fixed as Φ( 0.899) = 0.8, which is close to the simulation result in Fig.. Hence, if u > u and F R σ = σ F R, Random has a higher user satisfaction rate. But if the first feasible configuration Fixed chooses the case that u < u, for instance, ',,,,,, it has a F R higher user satisfaction rate than that of Random. In summary, the above simulation results show that our algorithm is the best suitable for the highly varying environment, while delivering web services with high QoS uon a user s request to make the configuration decision. TABLE I THE WEB SERVICES AND THEIR COST DISTRIBUTION PARAMETERS. Places ' Web service name Manufacture Execution Order Management Mean cost of F F Standard Deviation of Cost

5 3 5 Worksho Management Process Quality Control Job Scheduling Alarm and Warning SPC Product Tracking 7 8 Rolling Scheduling PLC PLC 7 0 PLC 3 6 Human Insection 3 Live Monitoring System 58 5 System System Bar Code 55 7 RFID 3 8 Otimal Random Fixed Otimal Random Fixed Figure 5. Simulation result under variable affordable rice mean from 350 to 500 V. CONCLUSION Since web service framework brings in a new revolution in traditional comuting, web service configuration issues have been receiving more and more attentions. The imortance of web service configuration is also incarnated in the research on other hot toics such as service fault management, accounting management as well as service comonent selection olicy. This aer rooses a systematic method to manage the existent web services to form a high erformance configuration under a diverse and changeable environment. It resents a service functional deendency configuration net based on Petri nets for the web service resentation and automatic configuration. Based on the configuration net, this aer resents an otimal algorithm able to return the otimal configuration with the best QoS arameter. Comared with a brute force exhaust algorithm, this algorithm often does not have to search for all the ossible configurations in order to obtain the otimal one. Moreover, theoretical evidence and simulation results demonstrate that the configuration results our algorithm returns can achieve the highest user satisfaction rate. Figure. Simulation result under fixed affordable rice mean of 00 REFERENCES [] F. Curbera, M. Duftler, R. Khalaf, W. Nagy, N. Mukhi and S. Weerawarana, Unraveling the Web s Web: An Introduction to SOAP, WSDL, and UDDI, IEEE Internet Comuting, Vol. 6, No., , Mar./Ar. 00. [] P. Hasselmayer, Managing Dynamic Deendencies, Proc. of the th Int l Worksho on Distributed Systems: Oerations and Management, Nancy, France, Oct. 00,.-50. [3] IBM, SAP, Oracle, BEA, Sybase, Siebel Systems, etc. SCA Assembly Model Secification. htt://www-8.ibm.com/develoerworks/library/secification/ws-sca [] S. Ran, A model for web services discovery with QoS, SIGecom Exchanges, Vol., Iss.,. -0, Mar [5] D. Ardagna and B. Pernici, Global and local QoS constraints guarantee in Web service selection, Proc. of 005 IEEE International Conference on Web s, Orlando, FL, July 005,

6 [6] P.C. Xiong, Y. S. Fan and M.C. Zhou, QoS-aware Web Configuration, Submitted to IEEE Transaction on System, Man and Cybernetics, Part A. [7] A. Sheth, J. Cardoso, J. Miller and K. Kochut, QoS for -oriented Middleware, Proc. of the Conference on Systemics, Cybernetics and Informatics, Orlando, FL, July 00, [8] E. Wohlstadter, S. Tai, T. Mikalsen, I. Rouvellou and P. Devanbu, GlueQoS: middleware to sweeten quality-of-service olicy interactions, Proc. of the 6th International Conference on Software Engineering, Edinburgh, United Kingdom, May 00, [9] J. Yan, Y. Yang and G. K. Raikundalia, SwinDeW-a -based decentralized workflow management system, IEEE Transactions on Systems, Man and Cybernetics, Part A, Vol. 36, Iss. 5, , Set [0] M.C. Zhou and K. Venkatesh, Modeling, Simulation and Control of Flexible Manufacturing Systems: A Petri Net Aroach, World Scientific, Singaore, 998.

An Efficient Video Program Delivery algorithm in Tree Networks*

An Efficient Video Program Delivery algorithm in Tree Networks* 3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu

More information

Directed File Transfer Scheduling

Directed File Transfer Scheduling Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was

More information

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism Erlin Yao, Mingyu Chen, Rui Wang, Wenli Zhang, Guangming Tan Key Laboratory of Comuter System and Architecture Institute

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Distrib. Comut. 71 (2011) 288 301 Contents lists available at ScienceDirect J. Parallel Distrib. Comut. journal homeage: www.elsevier.com/locate/jdc Quality of security adatation in arallel

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

Improving Trust Estimates in Planning Domains with Rare Failure Events

Improving Trust Estimates in Planning Domains with Rare Failure Events Imroving Trust Estimates in Planning Domains with Rare Failure Events Colin M. Potts and Kurt D. Krebsbach Det. of Mathematics and Comuter Science Lawrence University Aleton, Wisconsin 54911 USA {colin.m.otts,

More information

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,

More information

Single character type identification

Single character type identification Single character tye identification Yefeng Zheng*, Changsong Liu, Xiaoqing Ding Deartment of Electronic Engineering, Tsinghua University Beijing 100084, P.R. China ABSTRACT Different character recognition

More information

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture

More information

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links

More information

Extracting Optimal Paths from Roadmaps for Motion Planning

Extracting Optimal Paths from Roadmaps for Motion Planning Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu

More information

Lecture 8: Orthogonal Range Searching

Lecture 8: Orthogonal Range Searching CPS234 Comutational Geometry Setember 22nd, 2005 Lecture 8: Orthogonal Range Searching Lecturer: Pankaj K. Agarwal Scribe: Mason F. Matthews 8.1 Range Searching The general roblem of range searching is

More information

SIMULATION SYSTEM MODELING FOR MASS CUSTOMIZATION MANUFACTURING

SIMULATION SYSTEM MODELING FOR MASS CUSTOMIZATION MANUFACTURING Proceedings of the 2002 Winter Simulation Conference E. Yücesan, C.-H. Chen, J. L. Snowdon, and J. M. Charnes, eds.. SIMULATION SYSTEM MODELING FOR MASS CUSTOMIATION MANUFACTURING Guixiu Qiao Charles McLean

More information

Theoretical Analysis of Graphcut Textures

Theoretical Analysis of Graphcut Textures Theoretical Analysis o Grahcut Textures Xuejie Qin Yee-Hong Yang {xu yang}@cs.ualberta.ca Deartment o omuting Science University o Alberta Abstract Since the aer was ublished in SIGGRAPH 2003 the grahcut

More information

Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects

Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScrit Objects Shiyi Wei and Barbara G. Ryder Deartment of Comuter Science, Virginia Tech, Blacksburg, VA, USA. {wei,ryder}@cs.vt.edu

More information

Semi-Markov Process based Model for Performance Analysis of Wireless LANs

Semi-Markov Process based Model for Performance Analysis of Wireless LANs Semi-Markov Process based Model for Performance Analysis of Wireless LANs Murali Krishna Kadiyala, Diti Shikha, Ravi Pendse, and Neeraj Jaggi Deartment of Electrical Engineering and Comuter Science Wichita

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

Constrained Path Optimisation for Underground Mine Layout

Constrained Path Optimisation for Underground Mine Layout Constrained Path Otimisation for Underground Mine Layout M. Brazil P.A. Grossman D.H. Lee J.H. Rubinstein D.A. Thomas N.C. Wormald Abstract The major infrastructure comonent reuired to develo an underground

More information

Skip List Based Authenticated Data Structure in DAS Paradigm

Skip List Based Authenticated Data Structure in DAS Paradigm 009 Eighth International Conference on Grid and Cooerative Comuting Ski List Based Authenticated Data Structure in DAS Paradigm Jieing Wang,, Xiaoyong Du,. Key Laboratory of Data Engineering and Knowledge

More information

Synthesis of FSMs on the Basis of Reusable Hardware Templates

Synthesis of FSMs on the Basis of Reusable Hardware Templates Proceedings of the 6th WSEAS Int. Conf. on Systems Theory & Scientific Comutation, Elounda, Greece, August -3, 006 (09-4) Synthesis of FSMs on the Basis of Reusable Hardware Temlates VALERY SKLYAROV, IOULIIA

More information

Randomized algorithms: Two examples and Yao s Minimax Principle

Randomized algorithms: Two examples and Yao s Minimax Principle Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum

More information

split split (a) (b) split split (c) (d)

split split (a) (b) split split (c) (d) International Journal of Foundations of Comuter Science c World Scientic Publishing Comany ON COST-OPTIMAL MERGE OF TWO INTRANSITIVE SORTED SEQUENCES JIE WU Deartment of Comuter Science and Engineering

More information

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China

More information

Equality-Based Translation Validator for LLVM

Equality-Based Translation Validator for LLVM Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented

More information

Statistical Detection for Network Flooding Attacks

Statistical Detection for Network Flooding Attacks Statistical Detection for Network Flooding Attacks C. S. Chao, Y. S. Chen, and A.C. Liu Det. of Information Engineering, Feng Chia Univ., Taiwan 407, OC. Email: cschao@fcu.edu.tw Abstract In order to meet

More information

Hardware-Accelerated Formal Verification

Hardware-Accelerated Formal Verification Hardare-Accelerated Formal Verification Hiroaki Yoshida, Satoshi Morishita 3 Masahiro Fujita,. VLSI Design and Education Center (VDEC), University of Tokyo. CREST, Jaan Science and Technology Agency 3.

More information

Auto-Tuning Distributed-Memory 3-Dimensional Fast Fourier Transforms on the Cray XT4

Auto-Tuning Distributed-Memory 3-Dimensional Fast Fourier Transforms on the Cray XT4 Auto-Tuning Distributed-Memory 3-Dimensional Fast Fourier Transforms on the Cray XT4 M. Gajbe a A. Canning, b L-W. Wang, b J. Shalf, b H. Wasserman, b and R. Vuduc, a a Georgia Institute of Technology,

More information

Introduction to Parallel Algorithms

Introduction to Parallel Algorithms CS 1762 Fall, 2011 1 Introduction to Parallel Algorithms Introduction to Parallel Algorithms ECE 1762 Algorithms and Data Structures Fall Semester, 2011 1 Preliminaries Since the early 1990s, there has

More information

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics structure arises in many alications of geometry. The dual structure, called a Delaunay triangulation also has many interesting roerties. Figure 3: Voronoi diagram and Delaunay triangulation. Search: Geometric

More information

To appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree

To appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree To aear in IEEE TKDE Title: Efficient Skyline and To-k Retrieval in Subsaces Keywords: Skyline, To-k, Subsace, B-tree Contact Author: Yufei Tao (taoyf@cse.cuhk.edu.hk) Deartment of Comuter Science and

More information

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions

More information

Object and Native Code Thread Mobility Among Heterogeneous Computers

Object and Native Code Thread Mobility Among Heterogeneous Computers Object and Native Code Thread Mobility Among Heterogeneous Comuters Bjarne Steensgaard Eric Jul Microsoft Research DIKU (Det. of Comuter Science) One Microsoft Way University of Coenhagen Redmond, WA 98052

More information

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems Matlab Virtual Reality Simulations for otimizations and raid rototying of flexible lines systems VAMVU PETRE, BARBU CAMELIA, POP MARIA Deartment of Automation, Comuters, Electrical Engineering and Energetics

More information

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment

More information

Experimental Comparison of Shortest Path Approaches for Timetable Information

Experimental Comparison of Shortest Path Approaches for Timetable Information Exerimental Comarison of Shortest Path roaches for Timetable Information Evangelia Pyrga Frank Schulz Dorothea Wagner Christos Zaroliagis bstract We consider two aroaches that model timetable information

More information

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Weimin Chen, Volker Turau TR-93-047 August, 1993 Abstract This aer introduces a new technique for source-to-source code

More information

Information Flow Based Event Distribution Middleware

Information Flow Based Event Distribution Middleware Information Flow Based Event Distribution Middleware Guruduth Banavar 1, Marc Kalan 1, Kelly Shaw 2, Robert E. Strom 1, Daniel C. Sturman 1, and Wei Tao 3 1 IBM T. J. Watson Research Center Hawthorne,

More information

Efficient Parallel Hierarchical Clustering

Efficient Parallel Hierarchical Clustering Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore

More information

Collective Communication: Theory, Practice, and Experience. FLAME Working Note #22

Collective Communication: Theory, Practice, and Experience. FLAME Working Note #22 Collective Communication: Theory, Practice, and Exerience FLAME Working Note # Ernie Chan Marcel Heimlich Avi Purkayastha Robert van de Geijn Setember, 6 Abstract We discuss the design and high-erformance

More information

Cooperative Diversity Combined with Beamforming

Cooperative Diversity Combined with Beamforming Cooerative Diversity Combined with Beamforming Hyunwoo Choi and Jae Hong Lee School of Electrical Engineering and INMC Seoul National University Seoul, Korea Email: {novo28, jhlee}@snu.ac.kr Abstract In

More information

A Model-Adaptable MOSFET Parameter Extraction System

A Model-Adaptable MOSFET Parameter Extraction System A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313

More information

Allowing the use of Multiple Ontologies for Discovery of Web Services in Federated Registry Environment

Allowing the use of Multiple Ontologies for Discovery of Web Services in Federated Registry Environment Allowing the use of Multile Ontologies for Discovery of Web Services in Federated Registry Environment Kunal Verma 1, Amit Sheth 2, Swana Oundhakar 3, Kaarthik Sivashanmugam 4, John Miller 3 1 Accenture

More information

Efficient Sequence Generator Mining and its Application in Classification

Efficient Sequence Generator Mining and its Application in Classification Efficient Sequence Generator Mining and its Alication in Classification Chuancong Gao, Jianyong Wang 2, Yukai He 3 and Lizhu Zhou 4 Tsinghua University, Beijing 0084, China {gaocc07, heyk05 3 }@mails.tsinghua.edu.cn,

More information

Implementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching

Implementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching Imlementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching Ju Hui Li, eng Hiot Lim and Qi Cao School of EEE, Block S Nanyang Technological University Singaore 639798

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information

Source Coding and express these numbers in a binary system using M log

Source Coding and express these numbers in a binary system using M log Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is

More information

Protecting Mobile Agents against Malicious Host Attacks Using Threat Diagnostic AND/OR Tree

Protecting Mobile Agents against Malicious Host Attacks Using Threat Diagnostic AND/OR Tree Protecting Mobile Agents against Malicious Host Attacks Using Threat Diagnostic AND/OR Tree Magdy Saeb, Meer Hamza, Ashraf Soliman. Arab Academy for Science, Technology & Maritime Transort Comuter Engineering

More information

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model Ad Hoc Networks (4) 5 68 Contents lists available at SciVerse ScienceDirect Ad Hoc Networks journal homeage: www.elsevier.com/locate/adhoc Latency-minimizing data aggregation in wireless sensor networks

More information

Stereo Disparity Estimation in Moment Space

Stereo Disparity Estimation in Moment Space Stereo Disarity Estimation in oment Sace Angeline Pang Faculty of Information Technology, ultimedia University, 63 Cyberjaya, alaysia. angeline.ang@mmu.edu.my R. ukundan Deartment of Comuter Science, University

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

Collective communication: theory, practice, and experience

Collective communication: theory, practice, and experience CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Comutat.: Pract. Exer. 2007; 19:1749 1783 Published online 5 July 2007 in Wiley InterScience (www.interscience.wiley.com)..1206 Collective

More information

Truth Trees. Truth Tree Fundamentals

Truth Trees. Truth Tree Fundamentals Truth Trees 1 True Tree Fundamentals 2 Testing Grous of Statements for Consistency 3 Testing Arguments in Proositional Logic 4 Proving Invalidity in Predicate Logic Answers to Selected Exercises Truth

More information

EE678 Application Presentation Content Based Image Retrieval Using Wavelets

EE678 Application Presentation Content Based Image Retrieval Using Wavelets EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective

More information

Autonomic Physical Database Design - From Indexing to Multidimensional Clustering

Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Stehan Baumann, Kai-Uwe Sattler Databases and Information Systems Grou Technische Universität Ilmenau, Ilmenau, Germany

More information

The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing

The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing Mikael Taveniku 2,3, Anders Åhlander 1,3, Magnus Jonsson 1 and Bertil Svensson 1,2

More information

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Journal of Comuting and Information Technology - CIT 8, 2000, 1, 1 12 1 Comlexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Eunice E. Santos Deartment of Electrical

More information

CMSC 425: Lecture 16 Motion Planning: Basic Concepts

CMSC 425: Lecture 16 Motion Planning: Basic Concepts : Lecture 16 Motion lanning: Basic Concets eading: Today s material comes from various sources, including AI Game rogramming Wisdom 2 by S. abin and lanning Algorithms by S. M. LaValle (Chats. 4 and 5).

More information

A Study of Protocols for Low-Latency Video Transport over the Internet

A Study of Protocols for Low-Latency Video Transport over the Internet A Study of Protocols for Low-Latency Video Transort over the Internet Ciro A. Noronha, Ph.D. Cobalt Digital Santa Clara, CA ciro.noronha@cobaltdigital.com Juliana W. Noronha University of California, Davis

More information

On Growth of Parallelism within Routers and Its Impact on Packet Reordering 1

On Growth of Parallelism within Routers and Its Impact on Packet Reordering 1 On Growth of Parallelism within Routers and Its Imact on Reordering 1 A. A. Bare 1, A. P. Jayasumana, and N. M. Piratla 2 Deartment of Electrical & Comuter Engineering, Colorado State University, Fort

More information

GENERIC PILOT AND FLIGHT CONTROL MODEL FOR USE IN SIMULATION STUDIES

GENERIC PILOT AND FLIGHT CONTROL MODEL FOR USE IN SIMULATION STUDIES AIAA Modeling and Simulation Technologies Conference and Exhibit 5-8 August 22, Monterey, California AIAA 22-4694 GENERIC PILOT AND FLIGHT CONTROL MODEL FOR USE IN SIMULATION STUDIES Eric N. Johnson *

More information

Construction of Irregular QC-LDPC Codes in Near-Earth Communications

Construction of Irregular QC-LDPC Codes in Near-Earth Communications Journal of Communications Vol. 9, No. 7, July 24 Construction of Irregular QC-LDPC Codes in Near-Earth Communications Hui Zhao, Xiaoxiao Bao, Liang Qin, Ruyan Wang, and Hong Zhang Chongqing University

More information

Using Kullback-Leibler Divergence to Model Opponents in Poker

Using Kullback-Leibler Divergence to Model Opponents in Poker Comuter Poker and Imerfect Information: Paers from the I-14 Worksho Using Kullback-Leibler Divergence to Model Oonents in Poker Jiajia Zhang 1, Xuan Wang, Lin Yao 3, Jingeng Li 1, Xuedong Shen 1 1 Intelligence

More information

A GPU Heterogeneous Cluster Scheduling Model for Preventing Temperature Heat Island

A GPU Heterogeneous Cluster Scheduling Model for Preventing Temperature Heat Island A GPU Heterogeneous Cluster Scheduling Model for Preventing Temerature Heat Island Yun-Peng CAO 1,2,a and Hai-Feng WANG 1,2 1 School of Information Science and Engineering, Linyi University, Linyi Shandong,

More information

MATHEMATICAL MODELING OF COMPLEX MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT

MATHEMATICAL MODELING OF COMPLEX MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT MATHEMATICAL MODELING OF COMPLE MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT V.N. Nesterov JSC Samara Electromechanical Plant, Samara, Russia Abstract. The rovisions of the concet of a multi-comonent

More information

An Efficient End-to-End QoS supporting Algorithm in NGN Using Optimal Flows and Measurement Feed-back for Ubiquitous and Distributed Applications

An Efficient End-to-End QoS supporting Algorithm in NGN Using Optimal Flows and Measurement Feed-back for Ubiquitous and Distributed Applications An Efficient End-to-End QoS suorting Algorithm in NGN Using Otimal Flows and Measurement Feed-back for Ubiquitous and Distributed Alications Se Youn Ban, Seong Gon Choi 2, Jun Kyun Choi Information and

More information

APPLICATION OF PARTICLE FILTERS TO MAP-MATCHING ALGORITHM

APPLICATION OF PARTICLE FILTERS TO MAP-MATCHING ALGORITHM APPLICATION OF PARTICLE FILTERS TO MAP-MATCHING ALGORITHM Pavel Davidson 1, Jussi Collin 2, and Jarmo Taala 3 Deartment of Comuter Systems, Tamere University of Technology, Finland e-mail: avel.davidson@tut.fi

More information

Interactive Image Segmentation

Interactive Image Segmentation Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).

More information

Learning Robust Locality Preserving Projection via p-order Minimization

Learning Robust Locality Preserving Projection via p-order Minimization Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence Learning Robust Locality Preserving Projection via -Order Minimization Hua Wang, Feiing Nie, Heng Huang Deartment of Electrical

More information

FIELD-programmable gate arrays (FPGAs) are quickly

FIELD-programmable gate arrays (FPGAs) are quickly This article has been acceted for inclusion in a future issue of this journal Content is final as resented, with the excetion of agination IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS

More information

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal International Journal of Information and Electronics Engineering, Vol. 1, No. 1, July 011 An Efficient VLSI Architecture for Adative Rank Order Filter for Image Noise Removal M. C Hanumantharaju, M. Ravishankar,

More information

Distributed Estimation from Relative Measurements in Sensor Networks

Distributed Estimation from Relative Measurements in Sensor Networks Distributed Estimation from Relative Measurements in Sensor Networks #Prabir Barooah and João P. Hesanha Abstract We consider the roblem of estimating vectorvalued variables from noisy relative measurements.

More information

An Indexing Framework for Structured P2P Systems

An Indexing Framework for Structured P2P Systems An Indexing Framework for Structured P2P Systems Adina Crainiceanu Prakash Linga Ashwin Machanavajjhala Johannes Gehrke Carl Lagoze Jayavel Shanmugasundaram Deartment of Comuter Science, Cornell University

More information

Privacy Preserving Moving KNN Queries

Privacy Preserving Moving KNN Queries Privacy Preserving Moving KNN Queries arxiv:4.76v [cs.db] 4 Ar Tanzima Hashem Lars Kulik Rui Zhang National ICT Australia, Deartment of Comuter Science and Software Engineering University of Melbourne,

More information

10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1

10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1 10 File System 1 We will examine this chater in three subtitles: Mass Storage Systems OERATING SYSTEMS FILE SYSTEM 1 File System Interface File System Imlementation 10.1.1 Mass Storage Structure 3 2 10.1

More information

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces Wavelet Based Statistical Adated Local Binary atterns for Recognizing Avatar Faces Abdallah A. Mohamed 1, 2 and Roman V. Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville,

More information

Chapter 8: Adaptive Networks

Chapter 8: Adaptive Networks Chater : Adative Networks Introduction (.1) Architecture (.2) Backroagation for Feedforward Networks (.3) Jyh-Shing Roger Jang et al., Neuro-Fuzzy and Soft Comuting: A Comutational Aroach to Learning and

More information

22. Swaping: Policies

22. Swaping: Policies 22. Swaing: Policies Oerating System: Three Easy Pieces 1 Beyond Physical Memory: Policies Memory ressure forces the OS to start aging out ages to make room for actively-used ages. Deciding which age to

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singaore. Title Automatic Robot Taing: Auto-Path Planning and Maniulation Author(s) Citation Yuan, Qilong; Lembono, Teguh

More information

Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication

Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication Using Permuted States and Validated Simulation to Analyze Conflict Rates in Otimistic Relication An-I A. Wang Comuter Science Deartment Florida State University Geoff H. Kuenning Comuter Science Deartment

More information

Using Standard AADL for COMPASS

Using Standard AADL for COMPASS Using Standard AADL for COMPASS (noll@cs.rwth-aachen.de) AADL Standards Meeting Aachen, Germany; July 5 8, 06 Overview Introduction SLIM Language Udates COMPASS Develoment Roadma Fault Injections Parametric

More information

A Metaheuristic Scheduler for Time Division Multiplexed Network-on-Chip

A Metaheuristic Scheduler for Time Division Multiplexed Network-on-Chip Downloaded from orbit.dtu.dk on: Jan 25, 2019 A Metaheuristic Scheduler for Time Division Multilexed Network-on-Chi Sørensen, Rasmus Bo; Sarsø, Jens; Pedersen, Mark Ruvald; Højgaard, Jasur Publication

More information

The Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks

The Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks The Scalability and Performance of Common Vector Solution to Generalized abel Continuity Constraint in Hybrid Otical/Pacet etwors Shujia Gong and Ban Jabbari {sgong, bjabbari}@gmuedu George Mason University

More information

CASCH - a Scheduling Algorithm for "High Level"-Synthesis

CASCH - a Scheduling Algorithm for High Level-Synthesis CASCH a Scheduling Algorithm for "High Level"Synthesis P. Gutberlet H. Krämer W. Rosenstiel Comuter Science Research Center at the University of Karlsruhe (FZI) HaidundNeuStr. 1014, 7500 Karlsruhe, F.R.G.

More information

Submission. Verifying Properties Using Sequential ATPG

Submission. Verifying Properties Using Sequential ATPG Verifying Proerties Using Sequential ATPG Jacob A. Abraham and Vivekananda M. Vedula Comuter Engineering Research Center The University of Texas at Austin Austin, TX 78712 jaa, vivek @cerc.utexas.edu Daniel

More information

A joint multi-layer planning algorithm for IP over flexible optical networks

A joint multi-layer planning algorithm for IP over flexible optical networks A joint multi-layer lanning algorithm for IP over flexible otical networks Vasileios Gkamas, Konstantinos Christodoulooulos, Emmanouel Varvarigos Comuter Engineering and Informatics Deartment, University

More information

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,

More information

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University.

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University. Relations with Relation Names as Arguments: Algebra and Calculus Kenneth A. Ross Columbia University kar@cs.columbia.edu Abstract We consider a version of the relational model in which relation names may

More information

Graph: composable production systems in Clojure. Jason Wolfe Strange Loop 12

Graph: composable production systems in Clojure. Jason Wolfe Strange Loop 12 Grah: comosable roduction systems in Clojure Jason Wolfe (@w01fe) Strange Loo 12 Motivation Interesting software has: many comonents comlex web of deendencies Develoers want: simle, factored code easy

More information

Toward Optimal Network Fault Correction via End-to-End Inference

Toward Optimal Network Fault Correction via End-to-End Inference Toward Otimal Network Fault Correction via End-to-End Inference Patrick P. C. Lee, Vishal Misra, and Dan Rubenstein Abstract We consider an end-to-end aroach of inferring network faults that manifest in

More information

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical

More information

A Method to Determine End-Points ofstraight Lines Detected Using the Hough Transform

A Method to Determine End-Points ofstraight Lines Detected Using the Hough Transform RESEARCH ARTICLE OPEN ACCESS A Method to Detere End-Points ofstraight Lines Detected Using the Hough Transform Gideon Kanji Damaryam Federal University, Lokoja, PMB 1154, Lokoja, Nigeria. Abstract The

More information

Use of Multivariate Statistical Analysis in the Modelling of Chromatographic Processes

Use of Multivariate Statistical Analysis in the Modelling of Chromatographic Processes Use of Multivariate Statistical Analysis in the Modelling of Chromatograhic Processes Simon Edwards-Parton 1, Nigel itchener-hooker 1, Nina hornhill 2, Daniel Bracewell 1, John Lidell 3 Abstract his aer

More information

521493S Computer Graphics Exercise 3 (Chapters 6-8)

521493S Computer Graphics Exercise 3 (Chapters 6-8) 521493S Comuter Grahics Exercise 3 (Chaters 6-8) 1 Most grahics systems and APIs use the simle lighting and reflection models that we introduced for olygon rendering Describe the ways in which each of

More information

GEOMETRIC CONSTRAINT SOLVING IN < 2 AND < 3. Department of Computer Sciences, Purdue University. and PAMELA J. VERMEER

GEOMETRIC CONSTRAINT SOLVING IN < 2 AND < 3. Department of Computer Sciences, Purdue University. and PAMELA J. VERMEER GEOMETRIC CONSTRAINT SOLVING IN < AND < 3 CHRISTOPH M. HOFFMANN Deartment of Comuter Sciences, Purdue University West Lafayette, Indiana 47907-1398, USA and PAMELA J. VERMEER Deartment of Comuter Sciences,

More information

The Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005*

The Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005* The Anubis Service Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL-2005-72 June 8, 2005* timed model, state monitoring, failure detection, network artition Anubis is a fully

More information

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1 Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and

More information

Near-Optimal Routing Lookups with Bounded Worst Case Performance

Near-Optimal Routing Lookups with Bounded Worst Case Performance Near-Otimal Routing Lookus with Bounded Worst Case Performance Pankaj Guta Balaji Prabhakar Stehen Boyd Deartments of Electrical Engineering and Comuter Science Stanford University CA 9430 ankaj@stanfordedu

More information

10. Parallel Methods for Data Sorting

10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting... 1 10.1. Parallelizing Princiles... 10.. Scaling Parallel Comutations... 10.3. Bubble Sort...3 10.3.1. Sequential Algorithm...3

More information