Resolving Linkage Anomalies in Extracted Software System Models
|
|
- August Beasley
- 5 years ago
- Views:
Transcription
1 Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, Abstract Program model linking has been largely overlooked and not constrained properly in the extraction of software system models. This often reslts in inaccrate system models at different levels of abstraction even if programs can be extracted correctly. This paper describes two constrained approaches toward accrate linkage resoltion. The first approach is prely based on a set of linking heristics. The second approach leverages the software bild process and also tilizes linking heristics. We compare these two approaches and discss their benefits and limitations. The empirical reslts from a case stdy of the PostgreSQL database system are also presented. Or stdy shows that inappropriate linkage resoltion leads to a relatively large nmber of dependency anomalies at higher levels of abstraction. These anomalies can be effectively removed sing or proposed approaches. 1 Introdction Modern software systems are extraordinarily large. For example, large database systems have millions of lines of code and are extremely complex. In order to analyze sch large systems, it is often necessary to extract system models that have linkage dependencies at varios levels of abstraction, sch as fnction level, modle level, and sbsystem level. A linkage dependency normally refers to a fnction call, a variable access, or a se dependency between two modles. This kind of system model represents static software strctre and spports downstream software analysis, for example, reflexion modelling [8], software clstering [7, 12], and architectre extraction and repair [6, 11]. To ensre the accracy of extracted system models, a significant amont of effort has been expended in developing high qality program extractors [1, 2, 3, 10]. By contrast, the process of linking separately extracted program models into system models has been largely overlooked. If not properly done, this linking process can either prodce nexpected linkage or case linkage absences. We refer to both phenomena as linkage anomalies. In an extracted system model, linkage anomalies only accont for a very small percentage of all the resolved linkage dependencies bt they propagate to higher levels of abstraction and case ndesirable impacts on downstream software analysis. In a case stdy of the PostgreSQL system [9], we fond that a small nmber of linkage anomalies cased by nconstrained linking prodced a relatively large nmber of dependency anomalies at higher levels of abstraction. We will explain nconstrained linking in Section 2.2. Abot 1.7% of the resolved cross-references in PostgreSQL were anomalies. The high-level dependency anomalies cased by these anomaly cross-references acconted for 3.5% of dependencies at the modle level and 7.2% at the sbsystem level. If we do reflexion modelling analysis on the extracted system model, we will end p with many architectral divergences that are not cased by the system implementation bt by improper linkage resoltion. This paper discsses what cases linkage anomalies and how to resolve them nder the assmption that programs are extracted separately and accrately. The rest of this paper is organized as follows. Section 2 explains program model linking and linkage anomalies. Section 3 discsses a set of heristics and proposes two approaches to resolving linkage anomalies. Section 4 presents the empirical reslts of or case stdy. Section 5 concldes the paper. 2 Program Model Linking We define program model linking as the process of combining mltiple linkable program models (LPM) into one model and replacing symbolic references with direct references. In this definition, a LPM is a semantic representation of an object modle. Therefore, we can see that program model linking plays the role of code linking, in which object modles are replaced with LPMs.
2 LPM ExternSymbol ResolvedByExtern 2.1 LPM Schema GlobalScope RefersToExtern RefersToExtern Fnction NameRef File RefersTo Figre 1. LPM Schema contain Variable RefersTo A large nmber of program extractors exist [1, 2, 3, 10]. They otpt facts in accordance with different schemas. To facilitate or discssion, we adopt a fact schema shown in Figre 1, which is a redced version of the CPPX/DATRIX schema [2, 4]. Many abstract syntax tree (AST) nodes sch as Type and Statement have been removed. The GlobalScope represents the niversal root of all LPMs. A File entity is a sorce file or an object modle. Each ExternSymbol entity has a niqe identifier that is a symbolic name in the global naming space. A NameRef entity is the domain of a symbolic reference. There are for relations in the schema. The contain is a strctral relation, which forms a tree in any LPM. The RefersTo represents the resolved references within a file. The ResolvedByExtern relation represents symbolic references, which need to be resolved by looking for extern definitions. The RefersToExtern means that a global definition is exported as a symbolic name. 2.2 LPM Linking The resoltion of symbolic references among a collection of LPMs can be concisely expressed and calclated as a relational composition of two binary relations: LinksTo = ResolvedByExtern o RefersToExtern We se o to refer to relational composition. The LinksTo relation denotes cross-references from NameRef entities to Fnction and Variable entities. For example, if X is resolved by Y and Y refers to Z, then X links to Z. By contrast, the RefersTo relation denotes resolved references within a LPM. These two relations together denote all direct references within a software system. Program model linking provides a mechanism to derive software system models. A system model is the combination of program models that are progressively generated as the system is being bilt, and it has no dangling symbolic references among those generated program models. In this definition, the prohibition of dangling symbolic references mandates that any symbolic references resolvable within the system mst be resolved. However, it is optional to resolve those symbolic references pointing to the environment, in which the system is embedded. An approach to deriving system models is nconstrained if it solely ses the above eqation to resolve symbolic references withot considering constraints, sch as program bild dependencies and heristics, which we will discss in more detail in Section 3. An nconstrained approach may prodce linkage anomalies de to the mlti-resoltion of symbolic references. 2.3 Linkage Anomalies A linkage anomaly means an nexpected or a missing linkage dependency in a software system model. In the following, we discss possible cases of linkage anomalies. Mlti-Resoltion A symbolic name with more than one definition can lead to mltiple resoltions of a symbolic reference that refers to the name. This can occr when the software system comprises a collection of exectables and dynamic libraries. In this case, it is highly possible that one symbolic name has more than one definition in varios parts of the system. If model linking is not properly controlled, the resoltion of a symbolic reference may lead to mltiple direct references with only one of them representing the tre cross-reference dependency. For example, the PostgreSQL system has 18 exectable programs and 28 dynamic libraries targeted at the Linx platform. There exist 75 symbolic names with mltiple global definitions. One of them is a fnction called EncodeDateTime, which is defined in two different sorce files, datetime.c and dt common.c. The first file is sed to generate the exectable postgres, which is the backend database server, and the second file is sed to bild the dynamic library libecpg.so, which provides spport for embedding SQL in C. If we apply nconstrained linking, every symbolic reference to the name EncodeDateTime will be resolved to two direct references. Incomplete Resoltion To overcome the mlti-resoltion problem, one soltion is to leverage the software bild process to constrain model linking. We refer to this approach as simlation-based linking, which will be described in Section 3. Unfortnately, the simlation-based approach does not garantee complete linkage resoltion. A software system bild often incldes 2
3 dynamic libraries. When generating a dynamic library, a code linker sch as the GNU linker leaves some dangling symbolic references, which will be resolved by the rntime linker as the dynamic library is loaded into memory. However, a system model reqires that any dangling symbolic references mst be resolved if they refer to definitions within the system. We now describe sch a case fond in PostgreSQL. The fnction tplestore begin heap defined in the file tplestore.c is called by the fnction exec init tple store defined in pl exec.c. The file tplestore.c is part of the backend exectable postgres, and the file pl exec.c is compiled and then linked into a shared library called libplpgsql.so, which provides a loadable procedral langage. If we only follow the steps of bilding PostgreSQL to do model linking, we will not be able to resolve any symbolic references to tplestore begin heap in the file pl exec.c. 3 Resolving Linkage Anomalies We now describe two approaches to linkage resoltion. In contrast to nconstrained linking, these approaches apply constraints to control the process of model linking. The first approach prely tilizes five linking heristics. The second approach simlates the software bild process to gide model linking and then ses heristics for postprocessing. 3.1 Linking Heristics In the following, we discss five heristics, which can be applied to improve the accracy of program model linking. f1 n v r (a) Modle-Modle f1 n v mx r1 r2 (b) Modle-Modle Transitive Closre ss1 ss2 f1 n v H1 Uniqe Definition If a symbolic name refers to exactly one definition, all the symbolic references pointing to that symbolic name can be resolved withot ambigity. This heristic is the most sefl since it resolves the majority of symbolic references. H2 Modle-Modle If a cross-reference already exists from modle to modle, we give higher priority when searching for the definition of any nresolved symbolic references in. Figre 2(a) provides an illstration of this heristic. When resolving the symbolic reference in modle to the name n, we have two cross-reference candidates, v and. We se the notation x.n to indicate that x is named n. Since there already exists a resolved cross-reference r between and, v is determined to be the correct reference in this case. (c) Same Sbsystem ss1 S1 S2 ss2 f1 n v (d) Nearest Sper Sbsystem Figre 2. Linking Heristics (H2-H5) 3
4 H3 Modle-Modle Transitive Closre This heristic is an extension of H2. We lift resolved crossreferences to dependencies at the modle level and then compte the transitive closre of these modle dependencies. This closre is then sed to gide H2 to resolve linkage anomalies. Figre 2(b) shows a simple case. There is no direct crossreference between and, bt an indirect modle dependency between them is formed by r1 and r2. We give priority over when searching for the symbolic name n. Ths, is determined to be the anomaly to eliminate. H4 Same Sbsystem In the C programming langage, a static definition in a compilation nit has higher priority of being linked to when a symbolic reference is to be resolved in that nit, even if an extern definition with the same name exists. We extend this rle and apply it as a heristic in the resoltion of symbolic names within the scope of the sbsystem 1. We refer to this heristic as the Same Sbsystem. De to the natre of software organization, files in the same sbsystem are generally more closely related to each other than those distribted in different sbsystems. Figre 2(c) illstrates this heristic. The symbolic name n sed inside fnction f1 is ambigosly linked to fnctions in and. Since the two modles and are in sbsystem ss1, v is determined to be correct linkage while is an anomaly. H5 Nearest Sper Sbsystem Given a nesting hierarchy of sbsystems, a modle s sper sbsystem is the one that indirectly contains that modle. In heristic H5, a nearer sper sbsystem of a modle has a higher priority to be searched than a farther sper sbsystem when a symbolic reference in that modle needs to be resolved withot ambigity. In Figre 2(d), the nearest sper sbsystem of that has the definition of the symbolic name n is S1. So, is determined to be an anomaly. 3.2 Heristics-Based Linking The following describes a heristics-based algorithm. R represents the resolved LinksTo linkage relation, and U stores the nresolved ResolvedByExtern symbolic references. H refers to the set of heristics to apply. The algorithm simply loops throgh all the heristics in H ntil no symbolic reference in U can be resolved. 1 In or stdies, we adopted the sorce directory strctre as the hierarchy of sbsystems. H = Set of Heristics R = Empty Resolved References U = Unresolved Symbolic References loop for h in H r = h(u) R = R + r U = U - (dom r) o U end for while(u is redced) In the beginning of this algorithm, R is initialized to be be an empty relation, and U contains all the symbolic references to resolve. The expression h(u) applies heristic h to U to determine correct linkage. The expression dom r retrns the domain of the binary relation r, and the expression (dom r) o U calclates the resolved symbolic references in U. This algorithm stops if no heristic in H is able to redce U. In or implementation of this algorithm, we specified an order of the five heristics discssed in Section 3.1, from H1 to H5. In addition, we removed the oter loop and applied heristics H2 and H3 after the exection of the inner for loop to change R and U accordingly. That is, we do not loop the five heristics in random bt apply them in the order of H1, H2, H3, H4, H5, H2, H3. This order gives an optimal soltion and redces linkage anomalies to a minimm degree. The order is important for the following reasons: (1) H1, H4 and H5 cannot resolve any symbolic references after their first se; (2) H3 is less accrate than H2; (3) H5 is less accrate than H4; (4) it is sefl to apply H2 and H3 again if H4 or H5 have resolved at least one symbolic reference; and (4) H2 and H3 are not effective after their second se. 3.3 Simlation-Based Linking In contrast to pre heristics-based linking, or second approach simlates the process of bilding programs and ses heristics for postprocessing. The basic idea is to instrment the bild process to collect program bild dependencies, which are then seqentially applied to gide model linking. As described in Section 2.3, dangling symbolic references may appear if dynamic or shared libraries are generated. We apply heristics H1-H5 to eliminate dangling references. We instrmented the GNU linker ld to dmp modle dependencies. For example, as the heap sbsystem in the PostgreSQL is being bilt, the following fact is dmped: SUBSYS.o : hio.o heapam.o tptoaster.o It means that three object modles are linked into a relocatable modle called SUBSYS.o. Or model linker, called ldm, is instrcted to create the linked model SUBSYS.ta based on hio.ta, heapam.ta and tptoaster.ta, 4
5 Approach Resolved Unresolved Anomalies Unconstrained Heristics Simlation Symbolic References = Resolved Cross References = Table 1. Linking Reslts of the PostgreSQL which are files representing the LPMs of the three object modles. The ldm applies the eqation given in Section 2.2. An implicit naming convention is sed to map modles to LPMs in the form of TA [5]. After processing all the bild dependencies, the ldm frther applies linking heristics to eliminate dangling symbolic references resolvable within the system. 4 Case Stdy We stdied the PostgreSQL, which is a large open sorce database system with 570 KLOC [9]. Its sorce code was dated Janary 01, For brevity, two kinds of trivial symbolic references were ignored: references resolvable within files or modles, and references to system-wide libraries sch as libc.so and libcrypt.so. We were only interested in stdying cross-references among files within the system. As shown in Table 1, the PostgreSQL system model had symbolic references and the same nmber of crossreferences. The simlation-based approach resolved references, which we verified to be correct linkage. By contrast, nconstrained linking prodced 706 anomalies and heristic linking left 43 symbolic references nresolved. This stdy indicates that heristic linking is better than nconstrained linking bt itself does not garantee a complete linkage resoltion. We now discss what impacts linkage anomalies have on the derivation of models at higher levels of abstraction. Based on the simlation reslt, we calclated 3763 dependencies among 462 modles (files) and 657 dependencies among 87 sbsystems. In the case of nconstrained linking, the 706 anomalies introdced 138 dependency anomalies at the modle level and 51 at the sbsystem level. Correspondingly, the error rates were 3.5% and 7.2%. In the case of heristics-based linking, the 43 nresolved symbolic references cased 20 missing dependencies at the modle level and 12 at the sbsystem level. The inaccracy rates were approximately 0.5% and 1.8%. 5 Conclsions This paper investigated linkage resoltion in the extraction of large software system models. We showed that nconstrained linking reslted in linkage anomalies. To solve this problem, we proposed two approaches. One is prely based on a set of heristics. The other is gided by program bild simlation and constrained by heristics. We condcted a case stdy to evalate their effectiveness. The empirical reslts showed that heristics-based linking and simlation-based linking redced linkage anomalies effectively. References [1] Acacia. The C++ Information Abstraction System Online References [2] CPPX. The C/C++ Sorce Extractor Online References. cppx, [3] R. Ferenc, A. Beszedes, F. Magyar, and T. Gyimothy. A short introdction to colmbs/can. Technical Report, [4] A. E. Hassan, R. C. Holt, B. Lage, S. Lapierre, and C. Ledc. E/r schema for the datrix c/c++/java exchange format. In Proceedings of the 7th Working Conference on Reverse Engineering, pages , Brisbane, Astralia, November [5] R. C. Holt. An Introdction to TA: the Tple-Attribte Langage. holt/cv/papers.html, [6] R. Kazman and S. J. Carrière. View extraction and view fsion in architectral nderstanding. In Proceedings of the 5th International Conference on Software Rese, Victoria, BC, Canada, Jne [7] S. Mancoridis, B. S. Mitchell, C. Rorres, Y. Chen, and E. R. Gansner. Using atomatic clstering to prodce high-level system organizations of sorce code. In Proceedings of the 6th International Workshop on Program Comprehension, pages 45 52, Ischia, Italy, Jne [8] G. C. Mrphy, D. Notkin, and K. Sllivan. Software reflexion models: Bridging the gap between sorce and high-level models. In ACM SIGSOFT Symposim on the Fondations of Software Engineering, pages 18 28, New York, NY, October [9] PostgreSQL. The PostgreSQL Database System Online References [10] TkSee/SN. The TkSee/SN Sorce Code Extractor Online References. tcl/kbre, [11] J. B. Tran, M. W. Godfrey, E. H. S. Lee, and R. C. Holt. Architectre repair of open sorce software. In Proceedings of the 8th International Workshop on Program Comprehension, pages 48 59, Limerick, Ireland, Jne [12] V. Tzerpos and R. C. Holt. Acdc: An algorithm for comprehension-driven clstering. In Proceedings of the 7th Working Conference on Reverse Engineering, pages , Brisbane, Astralia, November
Multi-lingual Multi-media Information Retrieval System
Mlti-lingal Mlti-media Information Retrieval System Shoji Mizobchi, Sankon Lee, Fmihiko Kawano, Tsyoshi Kobayashi, Takahiro Komats Gradate School of Engineering, University of Tokshima 2-1 Minamijosanjima,
More informationPavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003
From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information
More informationTdb: A Source-level Debugger for Dynamically Translated Programs
Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,
More informationWhat s New in AppSense Management Suite Version 7.0?
What s New in AMS V7.0 What s New in AppSense Management Site Version 7.0? AppSense Management Site Version 7.0 is the latest version of the AppSense prodct range and comprises three prodct components,
More informationThis chapter is based on the following sources, which are all recommended reading:
Bioinformatics I, WS 09-10, D. Hson, December 7, 2009 105 6 Fast String Matching This chapter is based on the following sorces, which are all recommended reading: 1. An earlier version of this chapter
More informationPARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT
PAAMETE OPTIMIZATION FO TAKAGI-SUGENO FUZZY MODELS LESSONS LEANT Manfred Männle Inst. for Compter Design and Falt Tolerance Univ. of Karlsrhe, 768 Karlsrhe, Germany maennle@compter.org Brokat Technologies
More informationToday s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of
Today s Lectre Lectre 27: Introdction to Software Architectre Kenneth M. Anderson Fondations of Software Engineering CSCI 5828 - Spring Semester, 1999 Introdction and Backgrond of Software Architectre
More informationOn the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing
1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity
More informationThe Disciplined Flood Protocol in Sensor Networks
The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab
More information4.13 Advanced Topic: An Introduction to Digital Design Using a Hardware Design Language 345.e1
.3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage 35.e.3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage to Describe and odel a Pipeline
More informationNetworks An introduction to microcomputer networking concepts
Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES
More informationMaster for Co-Simulation Using FMI
Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany
More informationPOWER-OF-2 BOUNDARIES
Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of
More informationMethod to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot
Method to bild an initial adaptive Nero-Fzzy controller for joints control of a legged robot J-C Habmremyi, P. ool and Y. Badoin Royal Military Academy-Free University of Brssels 08 Hobbema str, box:mrm,
More informationThe Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment
This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment
More informationA GENERIC MODEL OF A BASE-ISOLATED BUILDING
Chapter 5 A GENERIC MODEL OF A BASE-ISOLATED BUILDING This chapter draws together the work o Chapters 3 and 4 and describes the assembly o a generic model o a base-isolated bilding. The irst section describes
More informationMETAMODEL FOR SOFTWARE SOLUTIONS IN COMPUTED TOMOGRAPHY
VOL. 10, NO 22, DECEBER, 2015 ISSN 1819-6608 ETAODEL FOR SOFTWARE SOLUTIONS IN COPUTED TOOGRAPHY Vitaliy ezhyev Faclty of Compter Systems and Software Engineering, Universiti alaysia Pahang, Gambang, alaysia
More informationUncertainty Determination for Dimensional Measurements with Computed Tomography
Uncertainty Determination for Dimensional Measrements with Compted Tomography Kim Kiekens 1,, Tan Ye 1,, Frank Welkenhyzen, Jean-Pierre Krth, Wim Dewlf 1, 1 Grop T even University College, KU even Association
More informationA choice relation framework for supporting category-partition test case generation
Title A choice relation framework for spporting category-partition test case generation Athor(s) Chen, TY; Poon, PL; Tse, TH Citation Ieee Transactions On Software Engineering, 2003, v. 29 n. 7, p. 577-593
More informationUnit Testing with VectorCAST and AUTOSAR
Unit Testing with VectorCAST and AUTOSAR Vector TechDay Software Testing with VectorCAST V1.0 2018-11-15 Agenda Introdction Unit Testing Demo Working with AUTOSAR Generated Code Unit Testing AUTOSAR SWCs
More informationData/Metadata Data and Data Transformations
A Framework for Classifying Scientic Metadata Helena Galhardas, Eric Simon and Anthony Tomasic INRIA Domaine de Volcea - Rocqencort 7853 Le Chesnay France email: First-Name.Last-Name@inria.fr Abstract
More informationSTABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWORK DYNAMICS FOR STATIC OPTIMIZATION
STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWOR DYNAMICS FOR STATIC OPTIMIZATION Grsel Serpen and Yifeng X Electrical Engineering and Compter Science Department, The University of Toledo, Toledo, OH
More informationEvaluating Influence Diagrams
Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will
More informationREPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips
REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands
More informationStereo Matching and 3D Visualization for Gamma-Ray Cargo Inspection
Stereo Matching and 3D Visalization for Gamma-Ray Cargo Inspection Zhigang Zh *ab, Y-Chi H bc a Department of Compter Science, The City College of New York, New York, NY 3 b Department of Compter Science,
More informationMathematical model for storing and effective processing of directed graphs in semistructured data management systems
Mathematical model for storing and effectie processing of directed graphs in semistrctred data management MALIKOV A, GULEVSKIY Y, PARKHOMENKO D Information Systems and Technologies Department North Cacass
More informationTopic Continuity for Web Document Categorization and Ranking
Topic Continity for Web ocment Categorization and Ranking B. L. Narayan, C. A. Mrthy and Sankar. Pal Machine Intelligence Unit, Indian Statistical Institte, 03, B. T. Road, olkata - 70008, India. E-mail:
More informationComputer User s Guide 4.0
Compter User s Gide 4.0 2001 Glenn A. Miller, All rights reserved 2 The SASSI Compter User s Gide 4.0 Table of Contents Chapter 1 Introdction...3 Chapter 2 Installation and Start Up...5 System Reqirements
More informationFault Tolerance in Hypercubes
Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different
More informationA personalized search using a semantic distance measure in a graph-based ranking model
Article A personalized search sing a semantic distance measre in a graph-based ranking model Jornal of Information Science XX (X) pp. 1-23 The Athor(s) 2011 Reprints and Permissions: sagepb.co.k/jornalspermissions.nav
More informationQoS-driven Runtime Adaptation of Service Oriented Architectures
Qo-driven Rntime Adaptation of ervice Oriented Architectres Valeria ardellini 1 Emiliano asalicchio 1 Vincenzo Grassi 1 Francesco Lo Presti 1 Raffaela Mirandola 2 1 Dipartimento di Informatica, istemi
More informationFactors Influencing Performance of Firefly and Particle Swarm Optimization Algorithms
Factors Inflencing Performance of Firefly and Particle Swarm Optimization Algorithms Damanjeet Kar, UIET, Panjab University, Chandigarh Abstract In this paper, two natre inspired meta heristic approaches
More informationCost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks
Cost Based Local Forwarding Transmission Schemes for Two-hop Celllar Networks Zhenggang Zhao, Xming Fang, Yan Long, Xiaopeng H, Ye Zhao Key Lab of Information Coding & Transmission Sothwest Jiaotong University,
More informationMaximum Weight Independent Sets in an Infinite Plane
Maximm Weight Independent Sets in an Infinite Plane Jarno Nosiainen, Jorma Virtamo, Pasi Lassila jarno.nosiainen@tkk.fi, jorma.virtamo@tkk.fi, pasi.lassila@tkk.fi Department of Commnications and Networking
More informationICMS3 Integrated Corrosion Management System
Integrated System Featres Total Data Data Exhange with DCS/PCS/SCADA Systems Correlate & Process Data Enables Highly Cost-Effective Asset Designed Specifically for Personnel Fll Client- Operation The Integrated
More informationFeatures. ICMS Integrated Corrosion Management System
ICMS Integrated Corrosion System Featres Total Corrosion Data Data Exhange with DCS/PCS/SCADA Systems Correlate Corrosion & Process Data Enables Highly Cost-Effective Asset Designed Specifically for Corrosion
More informationA sufficient condition for spiral cone beam long object imaging via backprojection
A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral
More informationHardware-Accelerated Free-Form Deformation
Hardware-Accelerated Free-Form Deformation Clint Cha and Ulrich Nemann Compter Science Department Integrated Media Systems Center University of Sothern California Abstract Hardware-acceleration for geometric
More informationPARTITIONING AND MODULAR CODE SYNTHESIS FOR RECONFIGURABLE MECHATRONIC SOFTWARE COMPONENTS
ARTITIONING AND MODULAR CODE SYNTHESIS FOR RECONFIGURABLE MECHATRONIC SOFTWARE COMONENTS Sven Brmester and Holger Giese Software Engineering Grop University of aderborn Warbrger Str. 00, D-33098 aderborn,
More informationAn Introduction to GPU Computing. Aaron Coutino MFCF
An Introdction to GPU Compting Aaron Cotino acotino@waterloo.ca MFCF What is a GPU? A GPU (Graphical Processing Unit) is a special type of processor that was designed to render and maniplate textres. They
More informationBias of Higher Order Predictive Interpolation for Sub-pixel Registration
Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz
More informationA Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks
Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,
More informationLocal Run Manager Generate FASTQ Analysis Module
Local Rn Manager Generate FASTQ Analysis Modle Workflow Gide For Research Use Only. Not for se in diagnostic procedres. Overview 3 Set Parameters 3 Analysis Methods 5 View Analysis Reslts 5 Analysis Report
More informationFast Obstacle Detection using Flow/Depth Constraint
Fast Obstacle etection sing Flow/epth Constraint S. Heinrich aimlerchrylser AG P.O.Box 2360, -89013 Ulm, Germany Stefan.Heinrich@aimlerChrysler.com Abstract The early recognition of potentially harmfl
More informationRequirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems
Reqirements Engineering Objectives An introdction to reqirements Gerald Kotonya and Ian Sommerville To introdce the notion of system reqirements and the reqirements process. To explain how reqirements
More informationAUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING
AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING Mingsheng LIAO, Li ZHANG, Zxn ZHANG, Jiangqing ZHANG Whan Technical University of Srveying and Mapping, Natinal Lab. for Information Eng. in
More informationSubgraph Matching with Set Similarity in a Large Graph Database
1 Sbgraph Matching with Set Similarity in a Large Graph Database Liang Hong, Lei Zo, Xiang Lian, Philip S. Y Abstract In real-world graphs sch as social networks, Semantic Web and biological networks,
More informationIDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION
ICAS 2 CONGRESS IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION Christophe Le Garrec, Marc Hmbert, Michel Lacabanne Aérospatiale Matra
More informationEMC VNX Series. Problem Resolution Roadmap for VNX with ESRS for VNX and Connect Home. Version VNX1, VNX2 P/N REV. 03
EMC VNX Series Version VNX1, VNX2 Problem Resoltion Roadmap for VNX with ESRS for VNX and Connect Home P/N 300-014-335 REV. 03 Copyright 2012-2014 EMC Corporation. All rights reserved. Pblished in USA.
More informationIsilon InsightIQ. Version 2.5. User Guide
Isilon InsightIQ Version 2.5 User Gide Pblished March, 2014 Copyright 2010-2014 EMC Corporation. All rights reserved. EMC believes the information in this pblication is accrate as of its pblication date.
More informationPlenoPatch: Patch-based Plenoptic Image Manipulation
1 PlenoPatch: Patch-based Plenoptic Image Maniplation Fang-Le Zhang, Member, IEEE, Je Wang, Senior Member, IEEE, Eli Shechtman, Member, IEEE, Zi-Ye Zho, Jia-Xin Shi, and Shi-Min H, Member, IEEE Abstract
More informationCAPL Scripting Quickstart
CAPL Scripting Qickstart CAPL (Commnication Access Programming Langage) For CANalyzer and CANoe V1.01 2015-12-03 Agenda Important information before getting started 3 Visal Seqencer (GUI based programming
More informationSubmodule construction for systems of I/O automata*
Sbmodle constrction for systems of I/O atomata* J. Drissi 1, G. v. Bochmann 2 1 Dept. d'iro, Université de Montréal, CP. 6128, Scc. Centre-Ville, Montréal, H3C 3J7, Canada, Phone: (514) 343-6161, Fax:
More informationIMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING
International Jornal of Modern Engineering Research (IJMER) www.imer.com Vol.1, Isse1, pp-134-139 ISSN: 2249-6645 IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING
More informationDate: December 5, 1999 Dist'n: T1E1.4
12/4/99 1 T1E14/99-559 Project: T1E14: VDSL Title: Vectored VDSL (99-559) Contact: J Cioffi, G Ginis, W Y Dept of EE, Stanford U, Stanford, CA 945 Cioffi@stanforded, 1-65-723-215, F: 1-65-724-3652 Date:
More informationMaximal Cliques in Unit Disk Graphs: Polynomial Approximation
Maximal Cliqes in Unit Disk Graphs: Polynomial Approximation Rajarshi Gpta, Jean Walrand, Oliier Goldschmidt 2 Department of Electrical Engineering and Compter Science Uniersity of California, Berkeley,
More informationStaCo: Stackelberg-based Coverage Approach in Robotic Swarms
Maastricht University Department of Knowledge Engineering Technical Report No.:... : Stackelberg-based Coverage Approach in Robotic Swarms Kateřina Staňková, Bijan Ranjbar-Sahraei, Gerhard Weiss, Karl
More informationBIS - Basic package V4.3
Engineered Soltions BIS - Basic package V4.3 BIS - Basic package V4.3 www.boschsecrity.com Integration of Bosch and third party systems throgh deployment of OPC All relevant information in one ser interface
More informationThe Volcano Optimizer Generator: Extensibility and Efficient Search
The Volcano Optimizer Generator: Extensibility and Efficient Search - Prithvi Lakshminarayanan - 301313262 Athors Goetz Graefe, Portland State University Won the Most Inflential Paper award in 1993 Worked
More informationTowards Understanding Bilevel Multi-objective Optimization with Deterministic Lower Level Decisions
Towards Understanding Bilevel Mlti-objective Optimization with Deterministic Lower Level Decisions Ankr Sinha Ankr.Sinha@aalto.fi Department of Information and Service Economy, Aalto University School
More informationAn Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast
University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna
More informationEMC AppSync. User Guide. Version REV 01
EMC AppSync Version 1.5.0 User Gide 300-999-948 REV 01 Copyright 2012-2013 EMC Corporation. All rights reserved. Pblished in USA. EMC believes the information in this pblication is accrate as of its pblication
More informationLocal Run Manager. Software Reference Guide for MiSeqDx
Local Rn Manager Software Reference Gide for MiSeqDx Local Rn Manager Overview 3 Dashboard Overview 4 Administrative Settings and Tasks 7 Workflow Overview 12 Technical Assistance 17 Docment # 1000000011880
More informationReal-time mean-shift based tracker for thermal vision systems
9 th International Conference on Qantitative InfraRed Thermography Jly -5, 008, Krakow - Poland Real-time mean-shift based tracker for thermal vision systems G. Bieszczad* T. Sosnowski** * Military University
More informationOptimization and Translation of Tableau-Proofs. Abstract: Dierent kinds of logical calculi have dierent advantages and disadvantages.
J. Inform. Process. Cybernet. EIK?? (199?), (formerly: Elektron. Inform.verarb. Kybernet.) Optimization and Translation of Tablea-Proofs into Resoltion By Andreas Wolf, Berlin Abstract: Dierent kinds of
More informationSZ-1.4: Significantly Improving Lossy Compression for Scientific Data Sets Based on Multidimensional Prediction and Error- Controlled Quantization
SZ-1.4: Significantly Improving Lossy Compression for Scientific Data Sets Based on Mltidimensional Prediction and Error- Controlled Qantization Dingwen Tao (University of California, Riverside) Sheng
More informationNETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS
ETWORK PRESERVATIO THROUGH A TOPOLOGY COTROL ALGORITHM FOR WIRELESS MESH ETWORKS F. O. Aron, T. O. Olwal, A. Krien, Y. Hamam Tshwane University of Technology, Pretoria, Soth Africa. Dept of the French
More informationAvailability Analysis of Application Servers Using Software Rejuvenation and Virtualization
Thein T, Park J S. Availability analysis of application servers sing software rejvenation and virtalization. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 24(2): 339 346 Mar. 2009 Availability Analysis of
More informationBIS - Basic Package V4.6
Engineered Soltions BIS - Basic Package V4.6 BIS - Basic Package V4.6 www.boschsecrity.com The Bilding Integration System (BIS) BIS is a flexible, scalable secrity and safety management system that can
More informationComputer-Aided Mechanical Design Using Configuration Spaces
Compter-Aided Mechanical Design Using Configration Spaces Leo Joskowicz Institte of Compter Science The Hebrew University Jersalem 91904, Israel E-mail: josko@cs.hji.ac.il Elisha Sacks (corresponding athor)
More informationMinimal Edge Addition for Network Controllability
This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,
More informationBIS - Basic Package V4.4
Engineered Soltions BIS - Basic Package V4.4 BIS - Basic Package V4.4 www.boschsecrity.com Integration of Bosch and third party systems via open interfaces and SDK All relevant information in one ser interface
More informationNew Architectures for Hierarchical Predictive Control
Preprint, 11th IFAC Symposim on Dynamics and Control of Process Systems, inclding Biosystems Jne 6-8, 216. NTNU, Trondheim, Norway New Architectres for Hierarchical Predictive Control Victor M. Zavala
More informationIllumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY
Illmina LIMS Software Gide Jne 2017 ILLUMINA PROPRIETARY This docment and its contents are proprietary to Illmina, Inc. and its affiliates ("Illmina"), and are intended solely for the contractal se of
More informationPlenoPatch: Patch-based Plenoptic Image Manipulation
1 PlenoPatch: Patch-based Plenoptic Image Maniplation Fang-Le Zhang, Member, IEEE, Je Wang, Senior Member, IEEE, Eli Shechtman, Member, IEEE, Zi-Ye Zho, Jia-Xin Shi, and Shi-Min H, Member, IEEE Abstract
More informationIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY 2007 1 On the Analysis of the Bletooth Time Division Dplex Mechanism Gil Zssman Member, IEEE, Adrian Segall Fellow, IEEE, and Uri Yechiali
More informationAdaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model
International Jornal of Knowledge Engineering, Vol. 1, No. 2, September 215 Adaptie Inflence Maximization in Microblog nder the Competitie Independent Cascade Model Zheng Ding, Kai Ni, and Zhiqiang He
More informationConstructing and Comparing User Mobility Profiles for Location-based Services
Constrcting and Comparing User Mobility Profiles for Location-based Services Xihi Chen Interdisciplinary Centre for Secrity, Reliability and Trst, University of Lxemborg Jn Pang Compter Science and Commnications,
More informationIoT-Cloud Service Optimization in Next Generation Smart Environments
1 IoT-Clod Service Optimization in Next Generation Smart Environments Marc Barcelo, Alejandro Correa, Jaime Llorca, Antonia M. Tlino, Jose Lopez Vicario, Antoni Morell Universidad Atonoma de Barcelona,
More informationCongestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems
Congestion-adaptive Data Collection with Accracy Garantee in Cyber-Physical Systems Nematollah Iri, Lei Y, Haiying Shen, Gregori Calfield Department of Electrical and Compter Engineering, Clemson University,
More informationAddressing in Future Internet: Problems, Issues, and Approaches
Addressing in Ftre Internet: Problems, Isses, and Approaches Mltimedia and Mobile commnications Laboratory Seol National University Jaeyong Choi, Chlhyn Park, Hakyng Jng, Taekyong Kwon, Yanghee Choi 19
More informationOn the Existence of Subliminal Channel in Instant Messaging Systems
, pp. 353-362 http://dx.doi.org/10.14257/ijsia.2015.9.3.27 On the Existence of Sbliminal Channel in Instant Messaging Systems Lingyn Xiang 1, Yha Xie 2, Gang Lo 3 and Weizheng Wang 1 1 School of Compter
More informationDesigning and Optimization of Heterogeneous OTN/DWDM Networks with Intermediate Grooming
Designing and Optimization of Heterogeneos OTN/DWDM Networks with Intermediate Grooming Afonso Oliveira IST (METI afonso.oliveira@ist.tl.pt ABSTRACT The coexistence of annels with different bitrates in
More information5 Performance Evaluation
5 Performance Evalation his chapter evalates the performance of the compared to the MIP, and FMIP individal performances. We stdy the packet loss and the latency to restore the downstream and pstream of
More informationContent Content Introduction
Content Content Introdction...................................................................... 3 Roles in the provisioning process............................................................... 4 Server
More informationConstructing Multiple Light Multicast Trees in WDM Optical Networks
Constrcting Mltiple Light Mlticast Trees in WDM Optical Networks Weifa Liang Department of Compter Science Astralian National University Canberra ACT 0200 Astralia wliang@csaneda Abstract Mlticast roting
More informationLDAP Configuration Guide
LDAP Configration Gide Content Content LDAP directories on Gigaset phones............................................... 3 Configration.....................................................................
More informationABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS
Proceedings th FIG Symposim on Deformation Measrements Santorini Greece 00. ABSOUTE DEFORMATION PROFIE MEASUREMENT IN TUNNES USING REATIVE CONVERGENCE MEASUREMENTS Mahdi Moosai and Saeid Khazaei Mining
More informationConfiguring the Oracle Database with VERITAS Software and EMC Storage for Optimal Scalability, Mangeability, and Performance
Configring the Oracle Database with VERITAS Software and EMC Storage for Optimal Scalability, Mangeability, and Performance Table of Contents I. Introdction II. Storage Topics III. Configring Oracle Database
More informationTowards applications based on measuring the orbital angular momentum of light
CHAPTER 8 Towards applications based on measring the orbital anglar momentm of light Efficient measrement of the orbital anglar momentm (OAM) of light has been a longstanding problem in both classical
More informationEfficient and Accurate Delaunay Triangulation Protocols under Churn
Efficient and Accrate Delanay Trianglation Protocols nder Chrn Dong-Yong Lee and Simon S. Lam Department of Compter Sciences The University of Texas at Astin {dylee, lam}@cs.texas.ed November 9, 2007 Technical
More informationAdvanced Techniques for Predicting Mechanical Product Design via COMSOL Multiphysics
Advanced Techniqes for Predicting Mechanical Prodct Design via COMSOL Mltiphsics Shobing Zhang 1 1 CAEaid, Inc. *Corresponding athor: 184 Jeffs Ln, Astin, TX 78717, shobing.hang@caeaid.com Abstract: Mechanical
More informationCOMPOSITION OF STABLE SET POLYHEDRA
COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining
More informationEfficient Implementation of Binary Trees in LISP Systems
Efficient Implementation of Binary Trees in LISP Systems P. SIPALA Dipartimento di Eleltrotecnica, Eleltronica, Informatica, Universitd di Trieste, Italy In this paper, I consider how to implement the
More informationarxiv: v1 [cs.cr] 3 Jun 2017
Spectrm-based deep neral networks for frad detection arxiv:1706.00891v1 [cs.cr] 3 Jn 2017 ABSTRACT Shhan Yan Tongji University 4e66@tongji.ed.cn Jn Li University of Oregon lijn@cs.oregon.ed In this paper,
More informationTu P7 15 First-arrival Traveltime Tomography with Modified Total Variation Regularization
T P7 15 First-arrival Traveltime Tomography with Modified Total Variation Reglarization W. Jiang* (University of Science and Technology of China) & J. Zhang (University of Science and Technology of China)
More informationPROGRAM LICENSE AGREEMENT LIMITED WARRANTY... 4 Trademarks Contents Preface... 11
. Contents PROGRAM LICENSE AGREEMENT... LIMITED WARRANTY... 4 Trademarks... 6. Contents... 8 Preface... 2. Overview... 3 2. Jst one other important thing... 3 2.2 Abot the ser manal... 4 2.3 Manal System
More informationA RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA
A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA Mei Zho*, Ling-li Tang, Chan-rong Li, Zhi Peng, Jing-mei Li Academy of Opto-Electronics, Chinese Academy of Sciences, No.9, Dengzhang
More informationPERFORMANCE EVALUATION AND HILS TEST OF CONTROL ALLOCATION METHODS FOR RECONFIGURATION CONTROL
6 TH INTENATIONA CONGESS OF THE AEONAUTICA SCIENCES Abstract PEFOMANCE EVAUATION AND HIS TEST OF CONTO AOCATION METHODS FO ECONFIGUATION CONTO Byong-Mn Min*, Bong-J Kim**, Eng-Tai Kim***, and Min-Jea Tahk*
More informationFunctions of Combinational Logic
CHPTER 6 Fnctions of Combinational Logic CHPTER OUTLINE 6 6 6 6 6 5 6 6 6 7 6 8 6 9 6 6 Half and Fll dders Parallel inary dders Ripple Carry and Look-head Carry dders Comparators Decoders Encoders Code
More information