Resolving Linkage Anomalies in Extracted Software System Models

Size: px
Start display at page:

Download "Resolving Linkage Anomalies in Extracted Software System Models"

Transcription

1 Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, Abstract Program model linking has been largely overlooked and not constrained properly in the extraction of software system models. This often reslts in inaccrate system models at different levels of abstraction even if programs can be extracted correctly. This paper describes two constrained approaches toward accrate linkage resoltion. The first approach is prely based on a set of linking heristics. The second approach leverages the software bild process and also tilizes linking heristics. We compare these two approaches and discss their benefits and limitations. The empirical reslts from a case stdy of the PostgreSQL database system are also presented. Or stdy shows that inappropriate linkage resoltion leads to a relatively large nmber of dependency anomalies at higher levels of abstraction. These anomalies can be effectively removed sing or proposed approaches. 1 Introdction Modern software systems are extraordinarily large. For example, large database systems have millions of lines of code and are extremely complex. In order to analyze sch large systems, it is often necessary to extract system models that have linkage dependencies at varios levels of abstraction, sch as fnction level, modle level, and sbsystem level. A linkage dependency normally refers to a fnction call, a variable access, or a se dependency between two modles. This kind of system model represents static software strctre and spports downstream software analysis, for example, reflexion modelling [8], software clstering [7, 12], and architectre extraction and repair [6, 11]. To ensre the accracy of extracted system models, a significant amont of effort has been expended in developing high qality program extractors [1, 2, 3, 10]. By contrast, the process of linking separately extracted program models into system models has been largely overlooked. If not properly done, this linking process can either prodce nexpected linkage or case linkage absences. We refer to both phenomena as linkage anomalies. In an extracted system model, linkage anomalies only accont for a very small percentage of all the resolved linkage dependencies bt they propagate to higher levels of abstraction and case ndesirable impacts on downstream software analysis. In a case stdy of the PostgreSQL system [9], we fond that a small nmber of linkage anomalies cased by nconstrained linking prodced a relatively large nmber of dependency anomalies at higher levels of abstraction. We will explain nconstrained linking in Section 2.2. Abot 1.7% of the resolved cross-references in PostgreSQL were anomalies. The high-level dependency anomalies cased by these anomaly cross-references acconted for 3.5% of dependencies at the modle level and 7.2% at the sbsystem level. If we do reflexion modelling analysis on the extracted system model, we will end p with many architectral divergences that are not cased by the system implementation bt by improper linkage resoltion. This paper discsses what cases linkage anomalies and how to resolve them nder the assmption that programs are extracted separately and accrately. The rest of this paper is organized as follows. Section 2 explains program model linking and linkage anomalies. Section 3 discsses a set of heristics and proposes two approaches to resolving linkage anomalies. Section 4 presents the empirical reslts of or case stdy. Section 5 concldes the paper. 2 Program Model Linking We define program model linking as the process of combining mltiple linkable program models (LPM) into one model and replacing symbolic references with direct references. In this definition, a LPM is a semantic representation of an object modle. Therefore, we can see that program model linking plays the role of code linking, in which object modles are replaced with LPMs.

2 LPM ExternSymbol ResolvedByExtern 2.1 LPM Schema GlobalScope RefersToExtern RefersToExtern Fnction NameRef File RefersTo Figre 1. LPM Schema contain Variable RefersTo A large nmber of program extractors exist [1, 2, 3, 10]. They otpt facts in accordance with different schemas. To facilitate or discssion, we adopt a fact schema shown in Figre 1, which is a redced version of the CPPX/DATRIX schema [2, 4]. Many abstract syntax tree (AST) nodes sch as Type and Statement have been removed. The GlobalScope represents the niversal root of all LPMs. A File entity is a sorce file or an object modle. Each ExternSymbol entity has a niqe identifier that is a symbolic name in the global naming space. A NameRef entity is the domain of a symbolic reference. There are for relations in the schema. The contain is a strctral relation, which forms a tree in any LPM. The RefersTo represents the resolved references within a file. The ResolvedByExtern relation represents symbolic references, which need to be resolved by looking for extern definitions. The RefersToExtern means that a global definition is exported as a symbolic name. 2.2 LPM Linking The resoltion of symbolic references among a collection of LPMs can be concisely expressed and calclated as a relational composition of two binary relations: LinksTo = ResolvedByExtern o RefersToExtern We se o to refer to relational composition. The LinksTo relation denotes cross-references from NameRef entities to Fnction and Variable entities. For example, if X is resolved by Y and Y refers to Z, then X links to Z. By contrast, the RefersTo relation denotes resolved references within a LPM. These two relations together denote all direct references within a software system. Program model linking provides a mechanism to derive software system models. A system model is the combination of program models that are progressively generated as the system is being bilt, and it has no dangling symbolic references among those generated program models. In this definition, the prohibition of dangling symbolic references mandates that any symbolic references resolvable within the system mst be resolved. However, it is optional to resolve those symbolic references pointing to the environment, in which the system is embedded. An approach to deriving system models is nconstrained if it solely ses the above eqation to resolve symbolic references withot considering constraints, sch as program bild dependencies and heristics, which we will discss in more detail in Section 3. An nconstrained approach may prodce linkage anomalies de to the mlti-resoltion of symbolic references. 2.3 Linkage Anomalies A linkage anomaly means an nexpected or a missing linkage dependency in a software system model. In the following, we discss possible cases of linkage anomalies. Mlti-Resoltion A symbolic name with more than one definition can lead to mltiple resoltions of a symbolic reference that refers to the name. This can occr when the software system comprises a collection of exectables and dynamic libraries. In this case, it is highly possible that one symbolic name has more than one definition in varios parts of the system. If model linking is not properly controlled, the resoltion of a symbolic reference may lead to mltiple direct references with only one of them representing the tre cross-reference dependency. For example, the PostgreSQL system has 18 exectable programs and 28 dynamic libraries targeted at the Linx platform. There exist 75 symbolic names with mltiple global definitions. One of them is a fnction called EncodeDateTime, which is defined in two different sorce files, datetime.c and dt common.c. The first file is sed to generate the exectable postgres, which is the backend database server, and the second file is sed to bild the dynamic library libecpg.so, which provides spport for embedding SQL in C. If we apply nconstrained linking, every symbolic reference to the name EncodeDateTime will be resolved to two direct references. Incomplete Resoltion To overcome the mlti-resoltion problem, one soltion is to leverage the software bild process to constrain model linking. We refer to this approach as simlation-based linking, which will be described in Section 3. Unfortnately, the simlation-based approach does not garantee complete linkage resoltion. A software system bild often incldes 2

3 dynamic libraries. When generating a dynamic library, a code linker sch as the GNU linker leaves some dangling symbolic references, which will be resolved by the rntime linker as the dynamic library is loaded into memory. However, a system model reqires that any dangling symbolic references mst be resolved if they refer to definitions within the system. We now describe sch a case fond in PostgreSQL. The fnction tplestore begin heap defined in the file tplestore.c is called by the fnction exec init tple store defined in pl exec.c. The file tplestore.c is part of the backend exectable postgres, and the file pl exec.c is compiled and then linked into a shared library called libplpgsql.so, which provides a loadable procedral langage. If we only follow the steps of bilding PostgreSQL to do model linking, we will not be able to resolve any symbolic references to tplestore begin heap in the file pl exec.c. 3 Resolving Linkage Anomalies We now describe two approaches to linkage resoltion. In contrast to nconstrained linking, these approaches apply constraints to control the process of model linking. The first approach prely tilizes five linking heristics. The second approach simlates the software bild process to gide model linking and then ses heristics for postprocessing. 3.1 Linking Heristics In the following, we discss five heristics, which can be applied to improve the accracy of program model linking. f1 n v r (a) Modle-Modle f1 n v mx r1 r2 (b) Modle-Modle Transitive Closre ss1 ss2 f1 n v H1 Uniqe Definition If a symbolic name refers to exactly one definition, all the symbolic references pointing to that symbolic name can be resolved withot ambigity. This heristic is the most sefl since it resolves the majority of symbolic references. H2 Modle-Modle If a cross-reference already exists from modle to modle, we give higher priority when searching for the definition of any nresolved symbolic references in. Figre 2(a) provides an illstration of this heristic. When resolving the symbolic reference in modle to the name n, we have two cross-reference candidates, v and. We se the notation x.n to indicate that x is named n. Since there already exists a resolved cross-reference r between and, v is determined to be the correct reference in this case. (c) Same Sbsystem ss1 S1 S2 ss2 f1 n v (d) Nearest Sper Sbsystem Figre 2. Linking Heristics (H2-H5) 3

4 H3 Modle-Modle Transitive Closre This heristic is an extension of H2. We lift resolved crossreferences to dependencies at the modle level and then compte the transitive closre of these modle dependencies. This closre is then sed to gide H2 to resolve linkage anomalies. Figre 2(b) shows a simple case. There is no direct crossreference between and, bt an indirect modle dependency between them is formed by r1 and r2. We give priority over when searching for the symbolic name n. Ths, is determined to be the anomaly to eliminate. H4 Same Sbsystem In the C programming langage, a static definition in a compilation nit has higher priority of being linked to when a symbolic reference is to be resolved in that nit, even if an extern definition with the same name exists. We extend this rle and apply it as a heristic in the resoltion of symbolic names within the scope of the sbsystem 1. We refer to this heristic as the Same Sbsystem. De to the natre of software organization, files in the same sbsystem are generally more closely related to each other than those distribted in different sbsystems. Figre 2(c) illstrates this heristic. The symbolic name n sed inside fnction f1 is ambigosly linked to fnctions in and. Since the two modles and are in sbsystem ss1, v is determined to be correct linkage while is an anomaly. H5 Nearest Sper Sbsystem Given a nesting hierarchy of sbsystems, a modle s sper sbsystem is the one that indirectly contains that modle. In heristic H5, a nearer sper sbsystem of a modle has a higher priority to be searched than a farther sper sbsystem when a symbolic reference in that modle needs to be resolved withot ambigity. In Figre 2(d), the nearest sper sbsystem of that has the definition of the symbolic name n is S1. So, is determined to be an anomaly. 3.2 Heristics-Based Linking The following describes a heristics-based algorithm. R represents the resolved LinksTo linkage relation, and U stores the nresolved ResolvedByExtern symbolic references. H refers to the set of heristics to apply. The algorithm simply loops throgh all the heristics in H ntil no symbolic reference in U can be resolved. 1 In or stdies, we adopted the sorce directory strctre as the hierarchy of sbsystems. H = Set of Heristics R = Empty Resolved References U = Unresolved Symbolic References loop for h in H r = h(u) R = R + r U = U - (dom r) o U end for while(u is redced) In the beginning of this algorithm, R is initialized to be be an empty relation, and U contains all the symbolic references to resolve. The expression h(u) applies heristic h to U to determine correct linkage. The expression dom r retrns the domain of the binary relation r, and the expression (dom r) o U calclates the resolved symbolic references in U. This algorithm stops if no heristic in H is able to redce U. In or implementation of this algorithm, we specified an order of the five heristics discssed in Section 3.1, from H1 to H5. In addition, we removed the oter loop and applied heristics H2 and H3 after the exection of the inner for loop to change R and U accordingly. That is, we do not loop the five heristics in random bt apply them in the order of H1, H2, H3, H4, H5, H2, H3. This order gives an optimal soltion and redces linkage anomalies to a minimm degree. The order is important for the following reasons: (1) H1, H4 and H5 cannot resolve any symbolic references after their first se; (2) H3 is less accrate than H2; (3) H5 is less accrate than H4; (4) it is sefl to apply H2 and H3 again if H4 or H5 have resolved at least one symbolic reference; and (4) H2 and H3 are not effective after their second se. 3.3 Simlation-Based Linking In contrast to pre heristics-based linking, or second approach simlates the process of bilding programs and ses heristics for postprocessing. The basic idea is to instrment the bild process to collect program bild dependencies, which are then seqentially applied to gide model linking. As described in Section 2.3, dangling symbolic references may appear if dynamic or shared libraries are generated. We apply heristics H1-H5 to eliminate dangling references. We instrmented the GNU linker ld to dmp modle dependencies. For example, as the heap sbsystem in the PostgreSQL is being bilt, the following fact is dmped: SUBSYS.o : hio.o heapam.o tptoaster.o It means that three object modles are linked into a relocatable modle called SUBSYS.o. Or model linker, called ldm, is instrcted to create the linked model SUBSYS.ta based on hio.ta, heapam.ta and tptoaster.ta, 4

5 Approach Resolved Unresolved Anomalies Unconstrained Heristics Simlation Symbolic References = Resolved Cross References = Table 1. Linking Reslts of the PostgreSQL which are files representing the LPMs of the three object modles. The ldm applies the eqation given in Section 2.2. An implicit naming convention is sed to map modles to LPMs in the form of TA [5]. After processing all the bild dependencies, the ldm frther applies linking heristics to eliminate dangling symbolic references resolvable within the system. 4 Case Stdy We stdied the PostgreSQL, which is a large open sorce database system with 570 KLOC [9]. Its sorce code was dated Janary 01, For brevity, two kinds of trivial symbolic references were ignored: references resolvable within files or modles, and references to system-wide libraries sch as libc.so and libcrypt.so. We were only interested in stdying cross-references among files within the system. As shown in Table 1, the PostgreSQL system model had symbolic references and the same nmber of crossreferences. The simlation-based approach resolved references, which we verified to be correct linkage. By contrast, nconstrained linking prodced 706 anomalies and heristic linking left 43 symbolic references nresolved. This stdy indicates that heristic linking is better than nconstrained linking bt itself does not garantee a complete linkage resoltion. We now discss what impacts linkage anomalies have on the derivation of models at higher levels of abstraction. Based on the simlation reslt, we calclated 3763 dependencies among 462 modles (files) and 657 dependencies among 87 sbsystems. In the case of nconstrained linking, the 706 anomalies introdced 138 dependency anomalies at the modle level and 51 at the sbsystem level. Correspondingly, the error rates were 3.5% and 7.2%. In the case of heristics-based linking, the 43 nresolved symbolic references cased 20 missing dependencies at the modle level and 12 at the sbsystem level. The inaccracy rates were approximately 0.5% and 1.8%. 5 Conclsions This paper investigated linkage resoltion in the extraction of large software system models. We showed that nconstrained linking reslted in linkage anomalies. To solve this problem, we proposed two approaches. One is prely based on a set of heristics. The other is gided by program bild simlation and constrained by heristics. We condcted a case stdy to evalate their effectiveness. The empirical reslts showed that heristics-based linking and simlation-based linking redced linkage anomalies effectively. References [1] Acacia. The C++ Information Abstraction System Online References [2] CPPX. The C/C++ Sorce Extractor Online References. cppx, [3] R. Ferenc, A. Beszedes, F. Magyar, and T. Gyimothy. A short introdction to colmbs/can. Technical Report, [4] A. E. Hassan, R. C. Holt, B. Lage, S. Lapierre, and C. Ledc. E/r schema for the datrix c/c++/java exchange format. In Proceedings of the 7th Working Conference on Reverse Engineering, pages , Brisbane, Astralia, November [5] R. C. Holt. An Introdction to TA: the Tple-Attribte Langage. holt/cv/papers.html, [6] R. Kazman and S. J. Carrière. View extraction and view fsion in architectral nderstanding. In Proceedings of the 5th International Conference on Software Rese, Victoria, BC, Canada, Jne [7] S. Mancoridis, B. S. Mitchell, C. Rorres, Y. Chen, and E. R. Gansner. Using atomatic clstering to prodce high-level system organizations of sorce code. In Proceedings of the 6th International Workshop on Program Comprehension, pages 45 52, Ischia, Italy, Jne [8] G. C. Mrphy, D. Notkin, and K. Sllivan. Software reflexion models: Bridging the gap between sorce and high-level models. In ACM SIGSOFT Symposim on the Fondations of Software Engineering, pages 18 28, New York, NY, October [9] PostgreSQL. The PostgreSQL Database System Online References [10] TkSee/SN. The TkSee/SN Sorce Code Extractor Online References. tcl/kbre, [11] J. B. Tran, M. W. Godfrey, E. H. S. Lee, and R. C. Holt. Architectre repair of open sorce software. In Proceedings of the 8th International Workshop on Program Comprehension, pages 48 59, Limerick, Ireland, Jne [12] V. Tzerpos and R. C. Holt. Acdc: An algorithm for comprehension-driven clstering. In Proceedings of the 7th Working Conference on Reverse Engineering, pages , Brisbane, Astralia, November

Multi-lingual Multi-media Information Retrieval System

Multi-lingual Multi-media Information Retrieval System Mlti-lingal Mlti-media Information Retrieval System Shoji Mizobchi, Sankon Lee, Fmihiko Kawano, Tsyoshi Kobayashi, Takahiro Komats Gradate School of Engineering, University of Tokshima 2-1 Minamijosanjima,

More information

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003 From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information

More information

Tdb: A Source-level Debugger for Dynamically Translated Programs

Tdb: A Source-level Debugger for Dynamically Translated Programs Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,

More information

What s New in AppSense Management Suite Version 7.0?

What s New in AppSense Management Suite Version 7.0? What s New in AMS V7.0 What s New in AppSense Management Site Version 7.0? AppSense Management Site Version 7.0 is the latest version of the AppSense prodct range and comprises three prodct components,

More information

This chapter is based on the following sources, which are all recommended reading:

This chapter is based on the following sources, which are all recommended reading: Bioinformatics I, WS 09-10, D. Hson, December 7, 2009 105 6 Fast String Matching This chapter is based on the following sorces, which are all recommended reading: 1. An earlier version of this chapter

More information

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT PAAMETE OPTIMIZATION FO TAKAGI-SUGENO FUZZY MODELS LESSONS LEANT Manfred Männle Inst. for Compter Design and Falt Tolerance Univ. of Karlsrhe, 768 Karlsrhe, Germany maennle@compter.org Brokat Technologies

More information

Today s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of

Today s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of Today s Lectre Lectre 27: Introdction to Software Architectre Kenneth M. Anderson Fondations of Software Engineering CSCI 5828 - Spring Semester, 1999 Introdction and Backgrond of Software Architectre

More information

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity

More information

The Disciplined Flood Protocol in Sensor Networks

The Disciplined Flood Protocol in Sensor Networks The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab

More information

4.13 Advanced Topic: An Introduction to Digital Design Using a Hardware Design Language 345.e1

4.13 Advanced Topic: An Introduction to Digital Design Using a Hardware Design Language 345.e1 .3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage 35.e.3 Advanced Topic: An Introdction to Digital Design Using a Hardware Design Langage to Describe and odel a Pipeline

More information

Networks An introduction to microcomputer networking concepts

Networks An introduction to microcomputer networking concepts Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES

More information

Master for Co-Simulation Using FMI

Master for Co-Simulation Using FMI Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany

More information

POWER-OF-2 BOUNDARIES

POWER-OF-2 BOUNDARIES Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of

More information

Method to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot

Method to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot Method to bild an initial adaptive Nero-Fzzy controller for joints control of a legged robot J-C Habmremyi, P. ool and Y. Badoin Royal Military Academy-Free University of Brssels 08 Hobbema str, box:mrm,

More information

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment

More information

A GENERIC MODEL OF A BASE-ISOLATED BUILDING

A GENERIC MODEL OF A BASE-ISOLATED BUILDING Chapter 5 A GENERIC MODEL OF A BASE-ISOLATED BUILDING This chapter draws together the work o Chapters 3 and 4 and describes the assembly o a generic model o a base-isolated bilding. The irst section describes

More information

METAMODEL FOR SOFTWARE SOLUTIONS IN COMPUTED TOMOGRAPHY

METAMODEL FOR SOFTWARE SOLUTIONS IN COMPUTED TOMOGRAPHY VOL. 10, NO 22, DECEBER, 2015 ISSN 1819-6608 ETAODEL FOR SOFTWARE SOLUTIONS IN COPUTED TOOGRAPHY Vitaliy ezhyev Faclty of Compter Systems and Software Engineering, Universiti alaysia Pahang, Gambang, alaysia

More information

Uncertainty Determination for Dimensional Measurements with Computed Tomography

Uncertainty Determination for Dimensional Measurements with Computed Tomography Uncertainty Determination for Dimensional Measrements with Compted Tomography Kim Kiekens 1,, Tan Ye 1,, Frank Welkenhyzen, Jean-Pierre Krth, Wim Dewlf 1, 1 Grop T even University College, KU even Association

More information

A choice relation framework for supporting category-partition test case generation

A choice relation framework for supporting category-partition test case generation Title A choice relation framework for spporting category-partition test case generation Athor(s) Chen, TY; Poon, PL; Tse, TH Citation Ieee Transactions On Software Engineering, 2003, v. 29 n. 7, p. 577-593

More information

Unit Testing with VectorCAST and AUTOSAR

Unit Testing with VectorCAST and AUTOSAR Unit Testing with VectorCAST and AUTOSAR Vector TechDay Software Testing with VectorCAST V1.0 2018-11-15 Agenda Introdction Unit Testing Demo Working with AUTOSAR Generated Code Unit Testing AUTOSAR SWCs

More information

Data/Metadata Data and Data Transformations

Data/Metadata Data and Data Transformations A Framework for Classifying Scientic Metadata Helena Galhardas, Eric Simon and Anthony Tomasic INRIA Domaine de Volcea - Rocqencort 7853 Le Chesnay France email: First-Name.Last-Name@inria.fr Abstract

More information

STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWORK DYNAMICS FOR STATIC OPTIMIZATION

STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWORK DYNAMICS FOR STATIC OPTIMIZATION STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWOR DYNAMICS FOR STATIC OPTIMIZATION Grsel Serpen and Yifeng X Electrical Engineering and Compter Science Department, The University of Toledo, Toledo, OH

More information

Evaluating Influence Diagrams

Evaluating Influence Diagrams Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will

More information

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands

More information

Stereo Matching and 3D Visualization for Gamma-Ray Cargo Inspection

Stereo Matching and 3D Visualization for Gamma-Ray Cargo Inspection Stereo Matching and 3D Visalization for Gamma-Ray Cargo Inspection Zhigang Zh *ab, Y-Chi H bc a Department of Compter Science, The City College of New York, New York, NY 3 b Department of Compter Science,

More information

Mathematical model for storing and effective processing of directed graphs in semistructured data management systems

Mathematical model for storing and effective processing of directed graphs in semistructured data management systems Mathematical model for storing and effectie processing of directed graphs in semistrctred data management MALIKOV A, GULEVSKIY Y, PARKHOMENKO D Information Systems and Technologies Department North Cacass

More information

Topic Continuity for Web Document Categorization and Ranking

Topic Continuity for Web Document Categorization and Ranking Topic Continity for Web ocment Categorization and Ranking B. L. Narayan, C. A. Mrthy and Sankar. Pal Machine Intelligence Unit, Indian Statistical Institte, 03, B. T. Road, olkata - 70008, India. E-mail:

More information

Computer User s Guide 4.0

Computer User s Guide 4.0 Compter User s Gide 4.0 2001 Glenn A. Miller, All rights reserved 2 The SASSI Compter User s Gide 4.0 Table of Contents Chapter 1 Introdction...3 Chapter 2 Installation and Start Up...5 System Reqirements

More information

Fault Tolerance in Hypercubes

Fault Tolerance in Hypercubes Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different

More information

A personalized search using a semantic distance measure in a graph-based ranking model

A personalized search using a semantic distance measure in a graph-based ranking model Article A personalized search sing a semantic distance measre in a graph-based ranking model Jornal of Information Science XX (X) pp. 1-23 The Athor(s) 2011 Reprints and Permissions: sagepb.co.k/jornalspermissions.nav

More information

QoS-driven Runtime Adaptation of Service Oriented Architectures

QoS-driven Runtime Adaptation of Service Oriented Architectures Qo-driven Rntime Adaptation of ervice Oriented Architectres Valeria ardellini 1 Emiliano asalicchio 1 Vincenzo Grassi 1 Francesco Lo Presti 1 Raffaela Mirandola 2 1 Dipartimento di Informatica, istemi

More information

Factors Influencing Performance of Firefly and Particle Swarm Optimization Algorithms

Factors Influencing Performance of Firefly and Particle Swarm Optimization Algorithms Factors Inflencing Performance of Firefly and Particle Swarm Optimization Algorithms Damanjeet Kar, UIET, Panjab University, Chandigarh Abstract In this paper, two natre inspired meta heristic approaches

More information

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks Cost Based Local Forwarding Transmission Schemes for Two-hop Celllar Networks Zhenggang Zhao, Xming Fang, Yan Long, Xiaopeng H, Ye Zhao Key Lab of Information Coding & Transmission Sothwest Jiaotong University,

More information

Maximum Weight Independent Sets in an Infinite Plane

Maximum Weight Independent Sets in an Infinite Plane Maximm Weight Independent Sets in an Infinite Plane Jarno Nosiainen, Jorma Virtamo, Pasi Lassila jarno.nosiainen@tkk.fi, jorma.virtamo@tkk.fi, pasi.lassila@tkk.fi Department of Commnications and Networking

More information

ICMS3 Integrated Corrosion Management System

ICMS3 Integrated Corrosion Management System Integrated System Featres Total Data Data Exhange with DCS/PCS/SCADA Systems Correlate & Process Data Enables Highly Cost-Effective Asset Designed Specifically for Personnel Fll Client- Operation The Integrated

More information

Features. ICMS Integrated Corrosion Management System

Features. ICMS Integrated Corrosion Management System ICMS Integrated Corrosion System Featres Total Corrosion Data Data Exhange with DCS/PCS/SCADA Systems Correlate Corrosion & Process Data Enables Highly Cost-Effective Asset Designed Specifically for Corrosion

More information

A sufficient condition for spiral cone beam long object imaging via backprojection

A sufficient condition for spiral cone beam long object imaging via backprojection A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral

More information

Hardware-Accelerated Free-Form Deformation

Hardware-Accelerated Free-Form Deformation Hardware-Accelerated Free-Form Deformation Clint Cha and Ulrich Nemann Compter Science Department Integrated Media Systems Center University of Sothern California Abstract Hardware-acceleration for geometric

More information

PARTITIONING AND MODULAR CODE SYNTHESIS FOR RECONFIGURABLE MECHATRONIC SOFTWARE COMPONENTS

PARTITIONING AND MODULAR CODE SYNTHESIS FOR RECONFIGURABLE MECHATRONIC SOFTWARE COMPONENTS ARTITIONING AND MODULAR CODE SYNTHESIS FOR RECONFIGURABLE MECHATRONIC SOFTWARE COMONENTS Sven Brmester and Holger Giese Software Engineering Grop University of aderborn Warbrger Str. 00, D-33098 aderborn,

More information

An Introduction to GPU Computing. Aaron Coutino MFCF

An Introduction to GPU Computing. Aaron Coutino MFCF An Introdction to GPU Compting Aaron Cotino acotino@waterloo.ca MFCF What is a GPU? A GPU (Graphical Processing Unit) is a special type of processor that was designed to render and maniplate textres. They

More information

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz

More information

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,

More information

Local Run Manager Generate FASTQ Analysis Module

Local Run Manager Generate FASTQ Analysis Module Local Rn Manager Generate FASTQ Analysis Modle Workflow Gide For Research Use Only. Not for se in diagnostic procedres. Overview 3 Set Parameters 3 Analysis Methods 5 View Analysis Reslts 5 Analysis Report

More information

Fast Obstacle Detection using Flow/Depth Constraint

Fast Obstacle Detection using Flow/Depth Constraint Fast Obstacle etection sing Flow/epth Constraint S. Heinrich aimlerchrylser AG P.O.Box 2360, -89013 Ulm, Germany Stefan.Heinrich@aimlerChrysler.com Abstract The early recognition of potentially harmfl

More information

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems Reqirements Engineering Objectives An introdction to reqirements Gerald Kotonya and Ian Sommerville To introdce the notion of system reqirements and the reqirements process. To explain how reqirements

More information

AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING

AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING Mingsheng LIAO, Li ZHANG, Zxn ZHANG, Jiangqing ZHANG Whan Technical University of Srveying and Mapping, Natinal Lab. for Information Eng. in

More information

Subgraph Matching with Set Similarity in a Large Graph Database

Subgraph Matching with Set Similarity in a Large Graph Database 1 Sbgraph Matching with Set Similarity in a Large Graph Database Liang Hong, Lei Zo, Xiang Lian, Philip S. Y Abstract In real-world graphs sch as social networks, Semantic Web and biological networks,

More information

IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION

IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION ICAS 2 CONGRESS IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION Christophe Le Garrec, Marc Hmbert, Michel Lacabanne Aérospatiale Matra

More information

EMC VNX Series. Problem Resolution Roadmap for VNX with ESRS for VNX and Connect Home. Version VNX1, VNX2 P/N REV. 03

EMC VNX Series. Problem Resolution Roadmap for VNX with ESRS for VNX and Connect Home. Version VNX1, VNX2 P/N REV. 03 EMC VNX Series Version VNX1, VNX2 Problem Resoltion Roadmap for VNX with ESRS for VNX and Connect Home P/N 300-014-335 REV. 03 Copyright 2012-2014 EMC Corporation. All rights reserved. Pblished in USA.

More information

Isilon InsightIQ. Version 2.5. User Guide

Isilon InsightIQ. Version 2.5. User Guide Isilon InsightIQ Version 2.5 User Gide Pblished March, 2014 Copyright 2010-2014 EMC Corporation. All rights reserved. EMC believes the information in this pblication is accrate as of its pblication date.

More information

PlenoPatch: Patch-based Plenoptic Image Manipulation

PlenoPatch: Patch-based Plenoptic Image Manipulation 1 PlenoPatch: Patch-based Plenoptic Image Maniplation Fang-Le Zhang, Member, IEEE, Je Wang, Senior Member, IEEE, Eli Shechtman, Member, IEEE, Zi-Ye Zho, Jia-Xin Shi, and Shi-Min H, Member, IEEE Abstract

More information

CAPL Scripting Quickstart

CAPL Scripting Quickstart CAPL Scripting Qickstart CAPL (Commnication Access Programming Langage) For CANalyzer and CANoe V1.01 2015-12-03 Agenda Important information before getting started 3 Visal Seqencer (GUI based programming

More information

Submodule construction for systems of I/O automata*

Submodule construction for systems of I/O automata* Sbmodle constrction for systems of I/O atomata* J. Drissi 1, G. v. Bochmann 2 1 Dept. d'iro, Université de Montréal, CP. 6128, Scc. Centre-Ville, Montréal, H3C 3J7, Canada, Phone: (514) 343-6161, Fax:

More information

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING International Jornal of Modern Engineering Research (IJMER) www.imer.com Vol.1, Isse1, pp-134-139 ISSN: 2249-6645 IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING

More information

Date: December 5, 1999 Dist'n: T1E1.4

Date: December 5, 1999 Dist'n: T1E1.4 12/4/99 1 T1E14/99-559 Project: T1E14: VDSL Title: Vectored VDSL (99-559) Contact: J Cioffi, G Ginis, W Y Dept of EE, Stanford U, Stanford, CA 945 Cioffi@stanforded, 1-65-723-215, F: 1-65-724-3652 Date:

More information

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation Maximal Cliqes in Unit Disk Graphs: Polynomial Approximation Rajarshi Gpta, Jean Walrand, Oliier Goldschmidt 2 Department of Electrical Engineering and Compter Science Uniersity of California, Berkeley,

More information

StaCo: Stackelberg-based Coverage Approach in Robotic Swarms

StaCo: Stackelberg-based Coverage Approach in Robotic Swarms Maastricht University Department of Knowledge Engineering Technical Report No.:... : Stackelberg-based Coverage Approach in Robotic Swarms Kateřina Staňková, Bijan Ranjbar-Sahraei, Gerhard Weiss, Karl

More information

BIS - Basic package V4.3

BIS - Basic package V4.3 Engineered Soltions BIS - Basic package V4.3 BIS - Basic package V4.3 www.boschsecrity.com Integration of Bosch and third party systems throgh deployment of OPC All relevant information in one ser interface

More information

The Volcano Optimizer Generator: Extensibility and Efficient Search

The Volcano Optimizer Generator: Extensibility and Efficient Search The Volcano Optimizer Generator: Extensibility and Efficient Search - Prithvi Lakshminarayanan - 301313262 Athors Goetz Graefe, Portland State University Won the Most Inflential Paper award in 1993 Worked

More information

Towards Understanding Bilevel Multi-objective Optimization with Deterministic Lower Level Decisions

Towards Understanding Bilevel Multi-objective Optimization with Deterministic Lower Level Decisions Towards Understanding Bilevel Mlti-objective Optimization with Deterministic Lower Level Decisions Ankr Sinha Ankr.Sinha@aalto.fi Department of Information and Service Economy, Aalto University School

More information

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna

More information

EMC AppSync. User Guide. Version REV 01

EMC AppSync. User Guide. Version REV 01 EMC AppSync Version 1.5.0 User Gide 300-999-948 REV 01 Copyright 2012-2013 EMC Corporation. All rights reserved. Pblished in USA. EMC believes the information in this pblication is accrate as of its pblication

More information

Local Run Manager. Software Reference Guide for MiSeqDx

Local Run Manager. Software Reference Guide for MiSeqDx Local Rn Manager Software Reference Gide for MiSeqDx Local Rn Manager Overview 3 Dashboard Overview 4 Administrative Settings and Tasks 7 Workflow Overview 12 Technical Assistance 17 Docment # 1000000011880

More information

Real-time mean-shift based tracker for thermal vision systems

Real-time mean-shift based tracker for thermal vision systems 9 th International Conference on Qantitative InfraRed Thermography Jly -5, 008, Krakow - Poland Real-time mean-shift based tracker for thermal vision systems G. Bieszczad* T. Sosnowski** * Military University

More information

Optimization and Translation of Tableau-Proofs. Abstract: Dierent kinds of logical calculi have dierent advantages and disadvantages.

Optimization and Translation of Tableau-Proofs. Abstract: Dierent kinds of logical calculi have dierent advantages and disadvantages. J. Inform. Process. Cybernet. EIK?? (199?), (formerly: Elektron. Inform.verarb. Kybernet.) Optimization and Translation of Tablea-Proofs into Resoltion By Andreas Wolf, Berlin Abstract: Dierent kinds of

More information

SZ-1.4: Significantly Improving Lossy Compression for Scientific Data Sets Based on Multidimensional Prediction and Error- Controlled Quantization

SZ-1.4: Significantly Improving Lossy Compression for Scientific Data Sets Based on Multidimensional Prediction and Error- Controlled Quantization SZ-1.4: Significantly Improving Lossy Compression for Scientific Data Sets Based on Mltidimensional Prediction and Error- Controlled Qantization Dingwen Tao (University of California, Riverside) Sheng

More information

NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS

NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS ETWORK PRESERVATIO THROUGH A TOPOLOGY COTROL ALGORITHM FOR WIRELESS MESH ETWORKS F. O. Aron, T. O. Olwal, A. Krien, Y. Hamam Tshwane University of Technology, Pretoria, Soth Africa. Dept of the French

More information

Availability Analysis of Application Servers Using Software Rejuvenation and Virtualization

Availability Analysis of Application Servers Using Software Rejuvenation and Virtualization Thein T, Park J S. Availability analysis of application servers sing software rejvenation and virtalization. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 24(2): 339 346 Mar. 2009 Availability Analysis of

More information

BIS - Basic Package V4.6

BIS - Basic Package V4.6 Engineered Soltions BIS - Basic Package V4.6 BIS - Basic Package V4.6 www.boschsecrity.com The Bilding Integration System (BIS) BIS is a flexible, scalable secrity and safety management system that can

More information

Computer-Aided Mechanical Design Using Configuration Spaces

Computer-Aided Mechanical Design Using Configuration Spaces Compter-Aided Mechanical Design Using Configration Spaces Leo Joskowicz Institte of Compter Science The Hebrew University Jersalem 91904, Israel E-mail: josko@cs.hji.ac.il Elisha Sacks (corresponding athor)

More information

Minimal Edge Addition for Network Controllability

Minimal Edge Addition for Network Controllability This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,

More information

BIS - Basic Package V4.4

BIS - Basic Package V4.4 Engineered Soltions BIS - Basic Package V4.4 BIS - Basic Package V4.4 www.boschsecrity.com Integration of Bosch and third party systems via open interfaces and SDK All relevant information in one ser interface

More information

New Architectures for Hierarchical Predictive Control

New Architectures for Hierarchical Predictive Control Preprint, 11th IFAC Symposim on Dynamics and Control of Process Systems, inclding Biosystems Jne 6-8, 216. NTNU, Trondheim, Norway New Architectres for Hierarchical Predictive Control Victor M. Zavala

More information

Illumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY

Illumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY Illmina LIMS Software Gide Jne 2017 ILLUMINA PROPRIETARY This docment and its contents are proprietary to Illmina, Inc. and its affiliates ("Illmina"), and are intended solely for the contractal se of

More information

PlenoPatch: Patch-based Plenoptic Image Manipulation

PlenoPatch: Patch-based Plenoptic Image Manipulation 1 PlenoPatch: Patch-based Plenoptic Image Maniplation Fang-Le Zhang, Member, IEEE, Je Wang, Senior Member, IEEE, Eli Shechtman, Member, IEEE, Zi-Ye Zho, Jia-Xin Shi, and Shi-Min H, Member, IEEE Abstract

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY 2007 1 On the Analysis of the Bletooth Time Division Dplex Mechanism Gil Zssman Member, IEEE, Adrian Segall Fellow, IEEE, and Uri Yechiali

More information

Adaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model

Adaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model International Jornal of Knowledge Engineering, Vol. 1, No. 2, September 215 Adaptie Inflence Maximization in Microblog nder the Competitie Independent Cascade Model Zheng Ding, Kai Ni, and Zhiqiang He

More information

Constructing and Comparing User Mobility Profiles for Location-based Services

Constructing and Comparing User Mobility Profiles for Location-based Services Constrcting and Comparing User Mobility Profiles for Location-based Services Xihi Chen Interdisciplinary Centre for Secrity, Reliability and Trst, University of Lxemborg Jn Pang Compter Science and Commnications,

More information

IoT-Cloud Service Optimization in Next Generation Smart Environments

IoT-Cloud Service Optimization in Next Generation Smart Environments 1 IoT-Clod Service Optimization in Next Generation Smart Environments Marc Barcelo, Alejandro Correa, Jaime Llorca, Antonia M. Tlino, Jose Lopez Vicario, Antoni Morell Universidad Atonoma de Barcelona,

More information

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems Congestion-adaptive Data Collection with Accracy Garantee in Cyber-Physical Systems Nematollah Iri, Lei Y, Haiying Shen, Gregori Calfield Department of Electrical and Compter Engineering, Clemson University,

More information

Addressing in Future Internet: Problems, Issues, and Approaches

Addressing in Future Internet: Problems, Issues, and Approaches Addressing in Ftre Internet: Problems, Isses, and Approaches Mltimedia and Mobile commnications Laboratory Seol National University Jaeyong Choi, Chlhyn Park, Hakyng Jng, Taekyong Kwon, Yanghee Choi 19

More information

On the Existence of Subliminal Channel in Instant Messaging Systems

On the Existence of Subliminal Channel in Instant Messaging Systems , pp. 353-362 http://dx.doi.org/10.14257/ijsia.2015.9.3.27 On the Existence of Sbliminal Channel in Instant Messaging Systems Lingyn Xiang 1, Yha Xie 2, Gang Lo 3 and Weizheng Wang 1 1 School of Compter

More information

Designing and Optimization of Heterogeneous OTN/DWDM Networks with Intermediate Grooming

Designing and Optimization of Heterogeneous OTN/DWDM Networks with Intermediate Grooming Designing and Optimization of Heterogeneos OTN/DWDM Networks with Intermediate Grooming Afonso Oliveira IST (METI afonso.oliveira@ist.tl.pt ABSTRACT The coexistence of annels with different bitrates in

More information

5 Performance Evaluation

5 Performance Evaluation 5 Performance Evalation his chapter evalates the performance of the compared to the MIP, and FMIP individal performances. We stdy the packet loss and the latency to restore the downstream and pstream of

More information

Content Content Introduction

Content Content Introduction Content Content Introdction...................................................................... 3 Roles in the provisioning process............................................................... 4 Server

More information

Constructing Multiple Light Multicast Trees in WDM Optical Networks

Constructing Multiple Light Multicast Trees in WDM Optical Networks Constrcting Mltiple Light Mlticast Trees in WDM Optical Networks Weifa Liang Department of Compter Science Astralian National University Canberra ACT 0200 Astralia wliang@csaneda Abstract Mlticast roting

More information

LDAP Configuration Guide

LDAP Configuration Guide LDAP Configration Gide Content Content LDAP directories on Gigaset phones............................................... 3 Configration.....................................................................

More information

ABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS

ABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS Proceedings th FIG Symposim on Deformation Measrements Santorini Greece 00. ABSOUTE DEFORMATION PROFIE MEASUREMENT IN TUNNES USING REATIVE CONVERGENCE MEASUREMENTS Mahdi Moosai and Saeid Khazaei Mining

More information

Configuring the Oracle Database with VERITAS Software and EMC Storage for Optimal Scalability, Mangeability, and Performance

Configuring the Oracle Database with VERITAS Software and EMC Storage for Optimal Scalability, Mangeability, and Performance Configring the Oracle Database with VERITAS Software and EMC Storage for Optimal Scalability, Mangeability, and Performance Table of Contents I. Introdction II. Storage Topics III. Configring Oracle Database

More information

Towards applications based on measuring the orbital angular momentum of light

Towards applications based on measuring the orbital angular momentum of light CHAPTER 8 Towards applications based on measring the orbital anglar momentm of light Efficient measrement of the orbital anglar momentm (OAM) of light has been a longstanding problem in both classical

More information

Efficient and Accurate Delaunay Triangulation Protocols under Churn

Efficient and Accurate Delaunay Triangulation Protocols under Churn Efficient and Accrate Delanay Trianglation Protocols nder Chrn Dong-Yong Lee and Simon S. Lam Department of Compter Sciences The University of Texas at Astin {dylee, lam}@cs.texas.ed November 9, 2007 Technical

More information

Advanced Techniques for Predicting Mechanical Product Design via COMSOL Multiphysics

Advanced Techniques for Predicting Mechanical Product Design via COMSOL Multiphysics Advanced Techniqes for Predicting Mechanical Prodct Design via COMSOL Mltiphsics Shobing Zhang 1 1 CAEaid, Inc. *Corresponding athor: 184 Jeffs Ln, Astin, TX 78717, shobing.hang@caeaid.com Abstract: Mechanical

More information

COMPOSITION OF STABLE SET POLYHEDRA

COMPOSITION OF STABLE SET POLYHEDRA COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining

More information

Efficient Implementation of Binary Trees in LISP Systems

Efficient Implementation of Binary Trees in LISP Systems Efficient Implementation of Binary Trees in LISP Systems P. SIPALA Dipartimento di Eleltrotecnica, Eleltronica, Informatica, Universitd di Trieste, Italy In this paper, I consider how to implement the

More information

arxiv: v1 [cs.cr] 3 Jun 2017

arxiv: v1 [cs.cr] 3 Jun 2017 Spectrm-based deep neral networks for frad detection arxiv:1706.00891v1 [cs.cr] 3 Jn 2017 ABSTRACT Shhan Yan Tongji University 4e66@tongji.ed.cn Jn Li University of Oregon lijn@cs.oregon.ed In this paper,

More information

Tu P7 15 First-arrival Traveltime Tomography with Modified Total Variation Regularization

Tu P7 15 First-arrival Traveltime Tomography with Modified Total Variation Regularization T P7 15 First-arrival Traveltime Tomography with Modified Total Variation Reglarization W. Jiang* (University of Science and Technology of China) & J. Zhang (University of Science and Technology of China)

More information

PROGRAM LICENSE AGREEMENT LIMITED WARRANTY... 4 Trademarks Contents Preface... 11

PROGRAM LICENSE AGREEMENT LIMITED WARRANTY... 4 Trademarks Contents Preface... 11 . Contents PROGRAM LICENSE AGREEMENT... LIMITED WARRANTY... 4 Trademarks... 6. Contents... 8 Preface... 2. Overview... 3 2. Jst one other important thing... 3 2.2 Abot the ser manal... 4 2.3 Manal System

More information

A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA

A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA Mei Zho*, Ling-li Tang, Chan-rong Li, Zhi Peng, Jing-mei Li Academy of Opto-Electronics, Chinese Academy of Sciences, No.9, Dengzhang

More information

PERFORMANCE EVALUATION AND HILS TEST OF CONTROL ALLOCATION METHODS FOR RECONFIGURATION CONTROL

PERFORMANCE EVALUATION AND HILS TEST OF CONTROL ALLOCATION METHODS FOR RECONFIGURATION CONTROL 6 TH INTENATIONA CONGESS OF THE AEONAUTICA SCIENCES Abstract PEFOMANCE EVAUATION AND HIS TEST OF CONTO AOCATION METHODS FO ECONFIGUATION CONTO Byong-Mn Min*, Bong-J Kim**, Eng-Tai Kim***, and Min-Jea Tahk*

More information

Functions of Combinational Logic

Functions of Combinational Logic CHPTER 6 Fnctions of Combinational Logic CHPTER OUTLINE 6 6 6 6 6 5 6 6 6 7 6 8 6 9 6 6 Half and Fll dders Parallel inary dders Ripple Carry and Look-head Carry dders Comparators Decoders Encoders Code

More information