Efficient Subscription Management in Content-based Networks

Size: px
Start display at page:

Download "Efficient Subscription Management in Content-based Networks"

Transcription

1 Effiient Susription Mngement in Content-sed Networks Rphël Chnd, Psl A. Feler Institut EURECOM Sophi Antipolis, Frne {hnd Astrt Content-sed pulish/susrie systems offer onvenient strtion for dt produer nd onsumers, s most of the omplexity relted to ddressing nd routing is enpsulted within the network infrstruture. A mjor hllenge of ontent-sed networks is their ility to effiiently ope with hnges in onsumer memership. In our XNET XML ontent network, we hve ddressed this issue y designing novel lgorithms to speed up susription mngement t the routers, while gurnteeing perfet routing t ll times nd mintining ompt routing tles thnks to extensive usge of ggregtion. In this pper, we disuss the issue of susription mngement in ontent-sed networks, nd we speifilly desrie nd evlute the lgorithms tht we hve developed for XNET. 1 Introdution In ontent-sed pulish/susrie systems, messges re routed on the sis of their ontent nd the interests (susriptions) of the messge onsumers. This form of ommunition is well dpted to loosely-oupled distriuted systems with lrge onsumer popultions, with diverse interests, wide geogrphil dispersion, nd heterogeneous resoures (e.g., CPU, ndwidth). Severl tehniques hve een proposed to implement ontent routing, with vrious trde offs in terms of lgorithmi omplexity, runtime overhed, or ndwidth utiliztion. In prtiulr, support for perfet routing (i.e., messge trverses ommunition link only if there is some onsumer downstrem tht is interested in tht messge) introdues signifint mngement omplexity t the routers in the presene of dynmi susription registrtions nd nelltions. As onsequene, severl ontent-sed pulish/susrie networks do not systemtilly updte their routing tles upon onsumer deprture nd let the ury of routing degrde over time. In our XNET XML ontent network [7], we hve ddressed this issue y designing novel tehniques to speed up the most time-onsuming susription mngement opertion of the routers. Speifilly, we propose lgorithms tht llow routers to quikly determine the overing reltionships etween n inoming susription nd ll the entries of their routing tle. Covering reltionships re t the ore of susription ggregtion mehnisms, whih help limit the size of routing tles nd hene improve the effiieny of the filtering engine while ensuring perfet routing. Although the lgorithms presented in this pper hve een designed for XPth tree-strutured susriptions, they n e redily pplied to other susription lnguge with similr hrteristis. Experimentl evlution demonstrtes tht these lgorithms re highly effiient even when the numer of susriptions in the routing tle grows very lrge. 2 Relted Work Severl pulish/susrie systems implement some form of distriuted ontent sed routing, most notly IBM Gryphon [2], Sien [3], nd Jedi [10]. These systems dopt vrious pprohes to susription mngement. IBM Gryphon [2] uses distriuted filtering lgorithm sed on prllel serh trees mintined on eh of the rokers to effiiently determine where to route the messges. The system implements perfet routing nd supports susription registrtions nd nelltions; in ft, registering (neling) susription redues to inserting (removing) it from the serh tree nd is thus n effiient opertion. However, to mintin nd updte the prllel serh tree, eh roker must hve opy of ll the susriptions in the system. As onsequene, this pproh my not sle well to lrge nd highly dynmi onsumer popultions. Sien [3] lso uses network of event servers for ontent-sed event distriution, nd relies upon routing protool most similr to ours, ut with limited support for susription nelltion. In reent pper [4], the uthors of Sien introdue novel routing sheme for ontent-sed networking sed on omintion of rodst nd seletive routing. Susription mngement is simple nd effiient ut the system does not gurntee perfet routing, in the sense tht onsumers my reeive messges tht they re not interested in. The uthors hve ddressed this issue

2 y hving routers periodilly request for the routing tle of other routers. JEDI [10] proposes severl vritions for routing events mong its networked event servers; in prtiulr, with the hierrhil pproh, susriptions re propgted upwrd spnning tree nd messges re propgted oth upwrd nd downwrd to the hildren tht hve mthing susriptions. Susription mngement is simple nd effiient, ut this pproh my led to lrge routing tles t the root nd unneessry propgtion of events upwrd the tree. Our susription ontinment nd mthing tehniques re relted to the widely studied prolem of pttern nd regulr expression mthing. There exists severl indexing methods to speed up the serh of textul dt with regulr expressions, like the it-prllel implementtion of NFA [1] nd suffix trees [14]. In [6], the uthors hve ddressed the reverse indexing prolem of retrieving ll the regulr expressions tht mth given string. They propose RE-Tree, n index struture to quikly determine the regulr expressions tht mth given input string, y fousing the serh on only smll frtion of the expressions in the dtse. In [12], Tozw nd Hgiy present ontinment heking tehnique for XML shems, whih is sed on inry deision digrms. Little work hs een done on the prolem of ontinment heking for tree-strutured XPth expressions. In ft, the prolem hs een shown to e onp-omplete [11]. A sound ut non-omplete lgorithm hs een proposed in [5] to determine whether given treestrutured susription overs nother susription, ut it does not ddress the prolem of overing reltionships etween lrge sets of susriptions. 3 System Overview This setion gives n overview of the XNET ontent routing network. We lso riefly desrie its most essentil mehnisms, whih re relevnt for the rest of the pper. More detils n e found in [7]. System Model nd Definitions. XNET is distriuted pulish/susrie system whih onsists of olletion of ontent-sed routers (or nodes) orgnized in n overly network. Eh node routes the messges sed on its lol knowledge of the onsumer susriptions nd the tul ontent of the messges. Eh dt onsumer nd produer is onneted to some node in the network; we ll suh nodes onsumer nd produer nodes. We ssume tht ll routers know their neighors, s well s the est pths tht led to eh produer. We lso ssume tht the numer nd lotion of the produer nodes is known. From the point of view of router, this mounts to knowing whih neighors led to some produer. The onsumer popultion n e highly dynmi nd does not need to e known priori. The most reent implementtion of our routing protool, XROUTE, hndles multiple produers [8]; for the ske of simpliity, however, we only onsider networks with single produer in this pper. Eh node hs set of links, or interfes, tht onnets the node to its diret neighors. We ssume tht there exists extly one interfe per neighor, nd tht ommunition etween two nodes is relile. Our system lso inorportes fult-tolernt mehnisms to hndle oth trnsient nd permnent filures. <Quotes> <Stok> <Symol>DEF</Symol> <Prie>34.1</Prie> </Stok> <Stok> <Symol>GHI</Symol> <Prie>11.5</Prie> </Stok> </Quotes> () Symol // Stok Prie ="GHI" >"15" () Figure 1: () A smple XML doument desriing two stok quotes. () Tree representtion of smple XPth susription (//Stok[Symol="GHI"][Prie>15]) tht does not mth the XML doument. XNET ws designed to del with XML dt, the de fto interhnge lnguge on the Internet. Produers n thus define ustom dt types nd generte ritrry semistrutured events, s long s they re well-formed XML douments. Consumer interests re expressed using susription lnguge. Susriptions llow to speify predites on the set of vlid events for given onsumer. XNET uses signifint suset of the stndrd XPth lnguge to speify omplex, tree-strutured susriptions [13]. An XPth expression ontins one or more lotion steps, seprted y slshes (/). In its most si form, lotion step designtes n element nme followed y zero or more predites speified etween rkets. Predites generlly speify onstrints on the presene of struturl elements, or on the vlues of XML douments using si omprison opertors. XPth lso llows the use of wildrd (*) nd nestor/desendnt (//) opertors, whih respetively mth extly one nd n ritrrily long sequene of element nmes. We sy tht n XML doument mthes n XPth expression when the evlution of the expression on the doument yields non-null ojet. Figure 1 shows n XML event nd n XPth susription tht does not mth the event (eh rnh of the susription hs mthing node in the XML doument, ut the onjuntive ondition t the Stok node is not met). We sy tht susription S 1 overs or ontins nother susription S 2, denoted y S 1 S 2, iff ny event mthing S 2 lso mthes S 1, i.e., mthes(s 2 ) mthes(s 1 ). The overing reltionship defines prtil order on the set of ll susriptions.

3 The Routing Protool. XNET implements perfet routing, tht is, messge trverses ommunition link only if there is some onsumer downstrem tht is interested in tht messge. To do so, eh node in the network mintins in its routing tle olletion of susriptions tht desrie the lsses of messge tht its neighoring nodes re interested in. When reeiving messge, node first determines whih susriptions of its routing tle mth the event; it then forwrds the messge to ll neighors tht hve registered one of these susriptions. Given urte routing tles, this proess ensures tht messge eventully rehes ll the onsumers, nd only those, tht re interested in tht messge. When onsumer registers or nels susription, the nodes of the overly updte their routing tle ordingly y exhnging some piees of informtion tht represent the registrtion or nelltion of the onsumer. The proess strts t the onsumer node nd termintes t the produer node(s), following the shortest pths. As onsequene, messges pulished y the produers follow the reverse pths of the susriptions, long multist tree spnning ll interested onsumers. The routers in our system redue the size of their routing tles s muh s possile y using elorte ggregtion tehniques, whih re sed on the detetion nd the elimintion of susription redundnies. Susription ggregtion llows us to drmtilly improve the routing effiieny of the system oth in terms of throughput nd lteny, euse the time neessry to filter messge is proportionl to the numer of entries in the routing tles. On the other hnd, ggregtion lso dds signifint omplexity nd overhed to the routers, euse they need to identify the overing reltionships etween inoming susriptions nd ll the entries of their routing tles. These mngement opertions were the min ottlenek of erly XNET implementtions nd led us to develop the tehniques presented herefter. More detils out susription ggregtion nd XNET s routing protool n e found in [7]. 4 Susription Mngement Effiient susription mngement is ritil for the overll performne of the system nd to gurntee short registrtion delys to onsumers. As previously mentioned, the ost of susription mngement minly results from the extensive overing heks tht hve to e performed y the routers when susription is registered or neled. To determine whether given tree-strutured susription lso lled tree pttern heneforth overs nother susription, we n use the lgorithm proposed in [5], whih hs time omplexity of O( S 1 S 2 ), where S 1 nd S 2 re the numer of nodes of the two susriptions eing ompred. 1 Oviously, when n inoming 1 Note tht the overing prolem hs een shown to e onpsusription must e tested for overing ginst ll the other susriptions in the routing tle, itertive exeution of the lgorithm is lerly ineffiient. We hve therefore designed novel lgorithm, termed XSEARCH, whih effiiently identifies ll the possile overing reltionships etween given susription nd possily lrge set of susriptions. This lgorithm is desried in the rest of this setion. Additionl detils nd proofs n e found in ompnion tehnil report [8]. Prolem Sttement. Consider tree pttern s nd set R of n tree ptterns, R = {s 1,, s n }, whih we will refer to s the serh set. Our lgorithm runs in two different modes ording to the reltionships tht we wnt to identify. Covered mode identifies the set R of ll the tree ptterns in R tht re overed y s. Cover mode identifies the set R of ll the tree ptterns in R tht over s. We refer to XSEARCH nd XSEARCH s the lgorithm running in overed nd over mode, respetively. Definitions nd Nottions. Let u e node of tree pttern s; we denote y lel(u) the lel of tht node nd y hild(u) the set of the hild nodes of u in s. Rell tht the lel of node u n either e wildrd (*), n nestor/desendnt opertor (//), or tg nme. We define prtil ordering on node lels suh tht if x nd x re tg nmes, then (1) x // nd (2) x x iff x = x. Algorithm 1 dd(s, t, u) 1: if t hild(t) suh tht lel(t ) = lel(u) nd s / su(t ) then 2: su(t ) = su(t ) s 3: else 4: rete t hild(t) suh tht lel(t ) = lel(u) nd su(t ) = {s} 5: end if 6: for ll u hild(u) do 7: dd(s, t, u ) 8: end for Ftoriztion Trees. Our XSEARCH lgorithm does not operte diretly on the set of tree ptterns R, ut on ftoriztion tree uilt from the set R nd defined s follows. The ftoriztion tree of R, denoted T (R), is tree where eh node t hs two ttriutes: lel lel(t) similr to tht of node of tree pttern, nd set of tree ptterns su(t), whih is suset of R. The root node r T of T (R) hs no lel nd su(r T ) = R. Initilly, T (R) onsists of only its root node r T. We inrementlly dd eh tree pttern s R to T (R) with the reursive dd(s, r T, r s ) funtion shown in Algorithm 1, where r s is the root node of tree pttern s. The removl of tree pttern from T (R) is performed in similr mnner using Algorithm 2. Note tht, to keep the presenttion simple, we omitted the speil omplete [11]. Our lgorithm is sound ut not omplete, i.e., it my fil to detet some overing reltionships in rre pthologil ses, ut ll the reltionships tht it reports re orret. Consequently, router my fil to ggregte some vlid susriptions, ut orretness is never violted.

4 se of the root node of the ftoriztion tree in the ddition nd removl lgorithms. Algorithm 2 remove(s, t) 1: for ll t hild(t) suh tht s su(t ) do 2: su(t ) = su(t ) \ {s} 3: remove(s, t ) 4: if su(t ) = {} then 5: remove t from hild(t) 6: end if 7: end for R = s 1 s 2 s 3 s 4 s 5 s 6 * {s 5 } // {s 1,s 3,s 4,s 6,s 7 } 3 * {s 2 } 1 11 {s 5 } 2 {s 1 } {s 3,s 4,s 6,s 7 } {s 4 } {s 2 } r T {s 3,s 4 } {s 3,s 6 } {s 6 } {s 4 } // {s 1,s 2,s 3,s 4,s 5,s 6,s 7 } Figure 2: Six tree ptterns nd orresponding ftoriztion tree, where node is represented y its lel. Eh node is ssoited with set of tree ptterns, shown etween rkets. Intuitively, ftoriztion tree enles us to remove the redundnies etween the tree ptterns in R y ftorizing identil rnhes. Thus, T (R) is ompt representtion of the tree ptterns in R. Figure 2 shows n exmple with six tree ptterns nd the orresponding ftoriztion tree. It is importnt to note tht the ftoriztion tree is not unique; depending on the insertion order of the tree ptterns, we n hve distint, equivlent trees. This does not ffet the orretness of our XSEARCH lgorithm, nor its performne. s 7 The Serh Algorithm. We first desrie the XSEARCH lgorithm in overed mode. Consider susription set R nd orresponding ftoriztion tree, T (R). Let s e single tree pttern. The lgorithm works reursively on the nodes of s. When exeuted with the root nodes of T (R) nd s, XSEARCH (r T, r s ) returns the set R of ll tree ptterns tht re overed y s. The serh proess is desried in pseudo-ode in Algorithm 3. Intuitively, it tries to lote the pths in T (R) tht re overed y s; the tree ptterns tht the union of those pths represent re lso overed y s (lines 6 nd 8). The proess is slightly more omplex when enountering n nestor/desendnt opertor (//), euse we need to try to mp it to pths of length 0 (line 11) or 1 (line 12). To etter illustrte the workings of the lgorithm, onsider the exmple runs shown in Figure 3. Two tree ptterns, u nd v, re mthed ginst the ftoriztion tree T (R) of Figure 2 for lrity. The nodes of u, v, nd T (R) re numered in the figures; we refer to node numer i of u, v, nd T (R) y u i, v i, nd t i, respetively. The different steps of the lgorithm re detiled in the two exeution tres (the symol represents reursive invotions of the lgorithm). Algorithm 3 XSEARCH (t, u) 1: if t is lef then 2: XSEARCH (t, u) = 3: else 4: if lel(u) // then 5: if u is lef then 6: XSEARCH (t, u) = t hild(t) lel(t ) lel(u) su(t ) 7: else 8: XSEARCH (t, u) = t hild(t) lel(t ) lel(u) 9: end if 10: else 11: S 0 = u hild(u) XSEARCH(t, u ) 12: S 1 = t hild(t) XSEARCH(t, u) 13: XSEARCH (t, u) = S 0 S 1 14: end if 15: end if Algorithm 4 XSEARCH (t, u) 1: if u is lef then 2: XSEARCH (t, u) = su(t) 3: else 4: if lel(t) // then 5: if u hild(u), lel(u ) lel(t) then 6: XSEARCH (t, u) = su(t) 7: else 8: if t is lef then 9: XSEARCH (t, u) = 10: else 11: XSEARCH (t, u) = 12: u hild(u) lel(u ) lel(t) 13: end if 14: end if 15: else 16: S 0 = t hild(t) XSEARCH(t, u) 17: S 1 = u hild(u) XSEARCH(t, u ) 18: XSEARCH (t, u) = S 0 S 1 19: end if 20: end if Algorithm 5 XSEARCH (r T, r s ) t hild(t) XSEARCH (t, u ) u hild(u) XSEARCH (t, u ) 1: XSEARCH (r T, r s) = su(t) \ t hild(t) XSEARCH (t, r s) The seond lgorithm, XSEARCH, is desried in Algorithms 4 nd 5 nd works in very similr mnner. The mjor differene is tht the lgorithm works reursively on the nodes of T (R), trying to find pths in s tht re overed y the tree ptterns in T (R). The reursive funtion in Algorithm 4 returns the susriptions tht do not over s. A susription t overs s if eh rnh of s is overed y some rnh of t (line 12). Susriptions tht hve longer (line 2) or inomptile (line 6) pths nnot over s, wheres shorter pths (line 9) re eptle. Finlly, when enountering n nestor/desendnt opertor (//), we need to try to mp it to pths of length 0 (line 16) or

5 * u v // XSEARCH(r T, u 1) = XSEARCH(t 3, u 2) XSEARCH(t 3, u 4) XSEARCH(t 3, u 2) = XSEARCH(t 4, u 3) XSEARCH(t 5, u 3) XSEARCH(t 9, u 3) XSEARCH(t 4, u 3) = XSEARCH(t 5, u 3) = {s 3, s 6} XSEARCH(t 9, u 3) = {s 4} XSEARCH(t 3, u 2) = {s 3, s 6} {s 4} = {s 3, s 4, s 6} XSEARCH(t 3, u 4) = XSEARCH(t 5, u 5) XSEARCH(t 9, u 5) XSEARCH(t 5, u 5) = {s 6} XSEARCH(t 9, u 5) = XSEARCH(t 3, u 4) = {s 6} Finlly: XSEARCH(r T, u 1) = {s 3, s 4, s 6} {s 6} = {s 6} XSEARCH(r T, v 1) = XSEARCH(t 3, v 2) XSEARCH(t 3, v 2) = S 0 S 1 S 0 = XSEARCH(t 3, v 3) S 1 = XSEARCH(t 4, v 2) XSEARCH(t 5, v 2) XSEARCH(t 9, v 2) XSEARCH(t 3, v 3) = su(t 5) su(t 9) = {s 3, s 4, s 6, s 7} XSEARCH(t 4, v 2) = XSEARCH(t 5, v 2) = S 0 S 1 S 0 = XSEARCH(t5, v3) S 1 = XSEARCH(t6, v2) XSEARCH(t7, v2) XSEARCH(t8, v2) XSEARCH(t 5, v 3) = su(t 6) = {s 6} XSEARCH(t 6, v 2) = XSEARCH(t 7, v 2) = XSEARCH(t 8, v 2) = S 0 = {s6} S 1 = XSEARCH(t 5, v 2) = {s 6} XSEARCH(t 9, v 2) = S 0 S 1 S 0 = XSEARCH(t9, v3) S 1 = XSEARCH(t10, v2) XSEARCH(t 9, v 3) = XSEARCH(t 10, v 2) = S 0 = S 1 = XSEARCH(t 9, v 2) = S 0 = {s 3, s 4, s 6, s 7} S 1 = {s 6} XSEARCH(t 3, v 2) = {s 3, s 4, s 6, s 7} {s 6} = {s 3, s 4, s 6, s 7} Finlly: XSEARCH(r T, v 1) = {s 3, s 4, s 6, s 7} Figure 3: Two XSEARCH exmple runs. 1 (line 17). Note tht we impliitely introdue n rtifiil root node in the tree-strutured susriptions (denoted r s for susription s) in order to simplify the desription of the lgorithm. When lled with the roots of the ftoriztion tree nd susription s, Algorithm 5 reusively serhes for susriptions tht do not over s nd return the omplement set with respet to R. Beuse of spe limittions, orretness proofs re not given here (they n e found in [8]). Both Algorithms 3 nd 4 perform in O( T (R) s ) time, where T (R) is the numer of nodes in the ftoriztion tree nd s tht in the expression eing tested. This qudrti time omplexity is due to the ft tht eh node in T (R) nd s is heked t most one. As for the spe omplexity, the size of the ftoriztion tree T (R) grows linerly with the numer of tree ptterns in the serh set R. However, y onstrution, the ftoriztion tree typilly requires muh less spe thn would e needed to mintin the whole serh set R, tht is, T (R) s i R s i when R grows to lrge vlues. 5 Performne evlution Experimentl Setup. To test the effetiveness of our susription mngement tehniques, we hve onduted simultions using rel-life doument types nd lrge numers of susriptions. We hve generted relisti susription worklods using ustom XPth genertor tht tkes Doument Type Desriptor (DTD) s input nd retes set of vlid XPth expressions sed on set of prmeters tht ontrol: the mximum height h of the tree ptterns; the proilities p nd p // of hving wildrd (*) nd nestor/desendnt (//) opertors t node of tree pttern; the proility p λ of hving more thn one hild t given node; nd the skew θ of the Zipf distriution used for seleting element tg nmes. For our experiments, we generted sets of tree ptterns of vrious sizes, with h = 10, p = 0.1, p // = 0.05, p λ = 0.1, nd θ = 1. We used the widely-used NITF (News Industry Text Formt) DTD [9] s the input DTD of our XPth genertor. All the lgorithms were implemented in C++ nd ompiled using GNU C++ version Experiments were onduted on 1.5 GHz Intel Pentium IV mhines with 512 MB of min memory running Linux XSEARCH Effiieny. We evluted the effiieny of the XSEARCH lgorithm for serh sets of different sizes. For this experiment, we onsidered serh sets with unique susriptions, tht is, given susription does not pper more thn one in set. Indeed, in given router, XSEARCH is used to determine the overing reltionships etween given susription nd the susriptions in the routing tle, whih re ll unique. For eh serh set, we generted 1, 000 dditionl susriptions nd, for eh of them, we mesured the time neessry to determine the suset of the susriptions tht over, nd re overed y, tht susription. For omprison purposes, we hve lso mesured the effiieny of the XSEARCH lgorithm ginst sequentil exeution of the ontinment lgorithm of [5], whih we ll Liner. Figure 4 shows the verge serh time of the XSEARCH lgorithm. It ppers lerly tht XSerh is extremely effiient. Even for very lrge serh sets, we n expet n

6 Time in ms Averge serh time for XSerh Averge serh time for XSerh Size of serh set Figure 4: Averge serh time for the XSEARCH lgorithm. verge serh time of less thn 50 ms. In omprison, the Liner lgorithm yields to serh times tht re systemtilly more thn two orders of mgnitude higher. This result is not surprising, s the Liner lgorithm needs to evlute the entire susription set R while XSerh only serhes through the ftoriztion tree, whih is muh smller y onstrution. The seond vrint of the lgorithm, XSerh, tends to e slightly less effiient thn XSerh for lrge onsumer popultions. We n explin this oservtion y the ft tht, on verge, the XSerh lgorithm neessittes deeper trversls of the ftoriztion tree. Size of serh set 1,000 2,000 5,000 10,000 XSEARCH XSEARCH Tle 1: Averge serh time of XSEARCH in ms. One should note tht, in prtie, the sizes of the routing tles rrely exeed 1, 000 entries, even for very lrge onsumer popultions, thnks to susriptions ggregtion. For ompleteness, we show in Tle 1 the solute verge serh time of XSEARCH for serh sets of smll sizes, whih re most relevnt in the ontext of ontent-sed routing. R 1,000 2,000 5,000 10,000 20,000 50, ,000 s i R si T (R) Tle 2: Spe requirements for given susription popultion R nd its ftoriztion tree T (R), in thousnds of nodes. Spe Effiieny. We hve experimentlly quntified the spe requirements of the ftoriztion tree with susription sets of vrious sizes. The results in Tle 2 onfirm tht the numer of nodes in the ftoriztion tree is indeed notly smller thn the sum of the nodes of the individul susriptions. 6 Conlusion We hve desried the susription mngement tehniques tht we implemented in our XNET ontent routing network. These tehniques rely on XSEARCH, n lgorithm tht determines the overing reltionships etween susriptions, to effiiently proess onsumer registrtions nd nelltions. By pitlizing the performne of this lgorithm, our ontent-sed pulish/susrie system n mintin ompt routing tles (for improved routing performne) while ensuring perfet routing (for ndwidth effiieny) t ll time. Although desried in the ontext of ontent-sed routing nd XPth, the XSEARCH lgorithm n e redily used with similr susription lnguges or to ddress different dt mngement prolems. Referenes [1] R. A. Bez-Ytes nd G. H. Gonnet. Fst text serhing for regulr expressions or utomton serhing on tries. Journl of the ACM, 43(6): , [2] G. Bnvr, T. Chndr, B. Mukherjee, J. Ngrjro, R. Strom, nd D. Sturmn. An effiient multist protool for ontent-sed pulish-susrie systems. In Proeedings of ICDCS, My [3] A. Crznig, D. Rosenlum, nd A. Wolf. Design nd Evlution of Wide-Are Event Notifition Servie. ACM Trnstions on Computer Systems, 19(3): , [4] A. Crznig, M. J. Rutherford, nd A. L. Wolf. A routing sheme for ontent-sed networking. In Proeedings of IEEE INFOCOM, Mr [5] C.-Y. Chn, W. Fn, P. Feler, M. Groflkis, nd R. Rstogi. Tree Pttern Aggregtion for Slle XML Dt Dissemintion. In Proeedings of VLDB, Aug [6] C.-Y. Chn, M. Groflkis, nd R. Rstogi. Re-tree: n effiient index struture for regulr expressions. The VLDB Journl, 12(2): , [7] R. Chnd nd P. Feler. A slle protool for ontentsed routing in overly networks. In Proeedings of NCA, Cmridge, MA, Apr [8] R. Chnd nd P. Feler. XNet: An XML Content Routing Network. Tehnil report, Institut EURECOM, [9] I. P. T. Counil. News Industry Text Formt. [10] G. Cugol, E. D. Nitto, nd A. Fugett. The JEDI eventsed infrstruture nd its pplition to the development of the opss wfms. IEEE Trnstions on Softwre Engineering, 27(9): , Sept [11] G. Miklu nd D. Suiu. Continment nd equivlene for n xpth frgment. In Proeedings of PODS, Mdison, WI, June [12] A. Tozw nd M. Hgiy. XML shem ontinment heking sed on semi-impliit tehniques. In Proeedings of the Conferene on Implementtion nd Applition of Automt (CIAA), July [13] W3C. XML Pth Lnguge (XPth) 1.0, Nov [14] S. Wu nd U. Mner. Fst text serhing: llowing errors. Communitions of the ACM, 35(10):83 91, 1992.

Midterm Exam CSC October 2001

Midterm Exam CSC October 2001 Midterm Exm CSC 173 23 Otoer 2001 Diretions This exm hs 8 questions, severl of whih hve suprts. Eh question indites its point vlue. The totl is 100 points. Questions 5() nd 6() re optionl; they re not

More information

CS 241 Week 4 Tutorial Solutions

CS 241 Week 4 Tutorial Solutions CS 4 Week 4 Tutoril Solutions Writing n Assemler, Prt & Regulr Lnguges Prt Winter 8 Assemling instrutions utomtilly. slt $d, $s, $t. Solution: $d, $s, nd $t ll fit in -it signed integers sine they re 5-it

More information

Outline. Motivation Background ARCH. Experiment Additional usages for Input-Depth. Regular Expression Matching DPI over Compressed HTTP

Outline. Motivation Background ARCH. Experiment Additional usages for Input-Depth. Regular Expression Matching DPI over Compressed HTTP ARCH This work ws supported y: The Europen Reserh Counil, The Isreli Centers of Reserh Exellene, The Neptune Consortium, nd Ntionl Siene Foundtion wrd CNS-119748 Outline Motivtion Bkground Regulr Expression

More information

Internet Routing. IP Packet Format. IP Fragmentation & Reassembly. Principles of Internet Routing. Computer Networks 9/29/2014.

Internet Routing. IP Packet Format. IP Fragmentation & Reassembly. Principles of Internet Routing. Computer Networks 9/29/2014. omputer Networks 9/29/2014 IP Pket Formt Internet Routing Ki Shen IP protool version numer heder length (words) for qulity of servie mx numer remining hops (deremented t eh router) upper lyer protool to

More information

Duality in linear interval equations

Duality in linear interval equations Aville online t http://ijim.sriu..ir Int. J. Industril Mthemtis Vol. 1, No. 1 (2009) 41-45 Dulity in liner intervl equtions M. Movhedin, S. Slhshour, S. Hji Ghsemi, S. Khezerloo, M. Khezerloo, S. M. Khorsny

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distriuted Systems Priniples nd Prdigms Christoph Dorn Distriuted Systems Group, Vienn University of Tehnology.dorn@infosys.tuwien..t http://www.infosys.tuwien..t/stff/dorn Slides dpted from Mrten vn Steen,

More information

The Network Layer: Routing in the Internet. The Network Layer: Routing & Addressing Outline

The Network Layer: Routing in the Internet. The Network Layer: Routing & Addressing Outline CPSC 852 Internetworking The Network Lyer: Routing in the Internet Mihele Weigle Deprtment of Computer Siene Clemson University mweigle@s.lemson.edu http://www.s.lemson.edu/~mweigle/ourses/ps852 1 The

More information

COSC 6374 Parallel Computation. Non-blocking Collective Operations. Edgar Gabriel Fall Overview

COSC 6374 Parallel Computation. Non-blocking Collective Operations. Edgar Gabriel Fall Overview COSC 6374 Prllel Computtion Non-loking Colletive Opertions Edgr Griel Fll 2014 Overview Impt of olletive ommunition opertions Impt of ommunition osts on Speedup Crtesin stenil ommunition All-to-ll ommunition

More information

Parallelization Optimization of System-Level Specification

Parallelization Optimization of System-Level Specification Prlleliztion Optimiztion of System-Level Speifition Luki i niel. Gjski enter for Emedded omputer Systems University of liforni Irvine, 92697, US {li, gjski} @es.ui.edu strt This pper introdues the prlleliztion

More information

Error Numbers of the Standard Function Block

Error Numbers of the Standard Function Block A.2.2 Numers of the Stndrd Funtion Blok evlution The result of the logi opertion RLO is set if n error ours while the stndrd funtion lok is eing proessed. This llows you to rnh to your own error evlution

More information

Pattern Matching. Pattern Matching. Pattern Matching. Review of Regular Expressions

Pattern Matching. Pattern Matching. Pattern Matching. Review of Regular Expressions Pttern Mthing Pttern Mthing Some of these leture slides hve een dpted from: lgorithms in C, Roert Sedgewik. Gol. Generlize string serhing to inompletely speified ptterns. pplitions. Test if string or its

More information

Distributed Systems Principles and Paradigms. Chapter 11: Distributed File Systems

Distributed Systems Principles and Paradigms. Chapter 11: Distributed File Systems Distriuted Systems Priniples nd Prdigms Mrten vn Steen VU Amsterdm, Dept. Computer Siene steen@s.vu.nl Chpter 11: Distriuted File Systems Version: Deemer 10, 2012 2 / 14 Distriuted File Systems Distriuted

More information

[SYLWAN., 158(6)]. ISI

[SYLWAN., 158(6)]. ISI The proposl of Improved Inext Isomorphi Grph Algorithm to Detet Design Ptterns Afnn Slem B-Brhem, M. Rizwn Jmeel Qureshi Fulty of Computing nd Informtion Tehnology, King Adulziz University, Jeddh, SAUDI

More information

Inter-domain Routing

Inter-domain Routing COMP 631: NETWORKED & DISTRIBUTED SYSTEMS Inter-domin Routing Jsleen Kur Fll 2016 1 Internet-sle Routing: Approhes DV nd link-stte protools do not sle to glol Internet How to mke routing slle? Exploit

More information

Type Checking. Roadmap (Where are we?) Last lecture Context-sensitive analysis. This lecture Type checking. Symbol tables

Type Checking. Roadmap (Where are we?) Last lecture Context-sensitive analysis. This lecture Type checking. Symbol tables Type Cheking Rodmp (Where re we?) Lst leture Contet-sensitie nlysis Motition Attriute grmmrs Ad ho Synt-direted trnsltion This leture Type heking Type systems Using synt direted trnsltion Symol tles Leil

More information

COSC 6374 Parallel Computation. Communication Performance Modeling (II) Edgar Gabriel Fall Overview. Impact of communication costs on Speedup

COSC 6374 Parallel Computation. Communication Performance Modeling (II) Edgar Gabriel Fall Overview. Impact of communication costs on Speedup COSC 6374 Prllel Computtion Communition Performne Modeling (II) Edgr Griel Fll 2015 Overview Impt of ommunition osts on Speedup Crtesin stenil ommunition All-to-ll ommunition Impt of olletive ommunition

More information

Distance vector protocol

Distance vector protocol istne vetor protool Irene Finohi finohi@i.unirom.it Routing Routing protool Gol: etermine goo pth (sequene of routers) thru network from soure to Grph strtion for routing lgorithms: grph noes re routers

More information

Paradigm 5. Data Structure. Suffix trees. What is a suffix tree? Suffix tree. Simple applications. Simple applications. Algorithms

Paradigm 5. Data Structure. Suffix trees. What is a suffix tree? Suffix tree. Simple applications. Simple applications. Algorithms Prdigm. Dt Struture Known exmples: link tble, hep, Our leture: suffix tree Will involve mortize method tht will be stressed shortly in this ourse Suffix trees Wht is suffix tree? Simple pplitions History

More information

CS 340, Fall 2016 Sep 29th Exam 1 Note: in all questions, the special symbol ɛ (epsilon) is used to indicate the empty string.

CS 340, Fall 2016 Sep 29th Exam 1 Note: in all questions, the special symbol ɛ (epsilon) is used to indicate the empty string. CS 340, Fll 2016 Sep 29th Exm 1 Nme: Note: in ll questions, the speil symol ɛ (epsilon) is used to indite the empty string. Question 1. [10 points] Speify regulr expression tht genertes the lnguge over

More information

Minimal Memory Abstractions

Minimal Memory Abstractions Miniml Memory Astrtions (As implemented for BioWre Corp ) Nthn Sturtevnt University of Alert GAMES Group Ferury, 7 Tlk Overview Prt I: Building Astrtions Minimizing memory requirements Performnes mesures

More information

Incremental Design Debugging in a Logic Synthesis Environment

Incremental Design Debugging in a Logic Synthesis Environment Inrementl Design Deugging in Logi Synthesis Environment Andres Veneris Jing Brndon Liu University of Toronto Freesle Semiondutors Dept ECE nd CS High Performne Tools Group Toronto, ON M5S 3G4 Austin, TX

More information

COMP108 Algorithmic Foundations

COMP108 Algorithmic Foundations Grph Theory Prudene Wong http://www.s.liv..uk/~pwong/tehing/omp108/201617 How to Mesure 4L? 3L 5L 3L ontiner & 5L ontiner (without mrk) infinite supply of wter You n pour wter from one ontiner to nother

More information

McAfee Web Gateway

McAfee Web Gateway Relese Notes Revision C MAfee We Gtewy 7.6.2.11 Contents Aout this relese Enhnement Resolved issues Instlltion instrutions Known issues Additionl informtion Find produt doumenttion Aout this relese This

More information

TEMPLATE FOR ENTRY in Encyclopedia of Database Systems: GRID FILE. Yannis Manolopoulos

TEMPLATE FOR ENTRY in Encyclopedia of Database Systems: GRID FILE. Yannis Manolopoulos TEMPLATE FOR ENTRY in Enylopedi of Dtse Systems: GRID FILE Apostolos N. Ppdopoulos Ynnis Mnolopoulos Ynnis Theodoridis Vssilis Tsotrs Deprtment of Informtis Aristotle University of Thessloniki Thessloniki,

More information

SOFTWARE-BUG LOCALIZATION WITH GRAPH MINING

SOFTWARE-BUG LOCALIZATION WITH GRAPH MINING Chpter 17 SOFTWARE-BUG LOCALIZATION WITH GRAPH MINING Frnk Eihinger Institute for Progrm Strutures nd Dt Orgniztion (IPD) Universit-t Krlsruhe (TH), Germny eihinger@ipd.uk.de Klemens B-ohm Institute for

More information

CMPUT101 Introduction to Computing - Summer 2002

CMPUT101 Introduction to Computing - Summer 2002 CMPUT Introdution to Computing - Summer 22 %XLOGLQJ&RPSXWHU&LUFXLWV Chpter 4.4 3XUSRVH We hve looked t so fr how to uild logi gtes from trnsistors. Next we will look t how to uild iruits from logi gtes,

More information

Lecture 13: Graphs I: Breadth First Search

Lecture 13: Graphs I: Breadth First Search Leture 13 Grphs I: BFS 6.006 Fll 2011 Leture 13: Grphs I: Bredth First Serh Leture Overview Applitions of Grph Serh Grph Representtions Bredth-First Serh Rell: Grph G = (V, E) V = set of verties (ritrry

More information

Approximate Joins for Data Centric XML

Approximate Joins for Data Centric XML Approximte Joins for Dt Centri XML Nikolus Augsten 1, Mihel Böhlen 1, Curtis Dyreson, Johnn Gmper 1 1 Fulty of Computer Siene, Free University of Bozen-Bolzno Dominiknerpltz 3, Bozen, Itly {ugsten,oehlen,gmper}@inf.uniz.it

More information

High-speed architectures for binary-tree based stream ciphers: Leviathan case study

High-speed architectures for binary-tree based stream ciphers: Leviathan case study High-speed rhitetures for inry-tree sed strem iphers: Levithn se study Astrt Rel-time pplitions suh s streming medi nd voie require enryption lgorithms tht do not propgte errors nd support fst enryption

More information

FASTEST METHOD TO FIND ALTERNATIVE RE-ROUTE

FASTEST METHOD TO FIND ALTERNATIVE RE-ROUTE INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 FASTEST METHOD TO FIND ALTERNATIVE RE-ROUTE 1 M.JothiLkshmi, M.S., M.Phil. 2 C.Theeendr, M.S., M.Phil. 3 M.K.Pvithr,

More information

COSC 6374 Parallel Computation. Dense Matrix Operations

COSC 6374 Parallel Computation. Dense Matrix Operations COSC 6374 Prllel Computtion Dense Mtrix Opertions Edgr Griel Fll Edgr Griel Prllel Computtion Edgr Griel erminology Dense Mtrix: ll elements of the mtrix ontin relevnt vlues ypilly stored s 2-D rry, (e.g.

More information

Photovoltaic Panel Modelling Using a Stochastic Approach in MATLAB &Simulink

Photovoltaic Panel Modelling Using a Stochastic Approach in MATLAB &Simulink hotovolti nel Modelling Using Stohsti Approh in MATLAB &Simulink KAREL ZALATILEK, JAN LEUCHTER eprtment of Eletril Engineering University of efene Kouniov 65, 61 City of Brno CZECH REUBLIC krelzpltilek@unoz,

More information

A METHOD FOR CHARACTERIZATION OF THREE-PHASE UNBALANCED DIPS FROM RECORDED VOLTAGE WAVESHAPES

A METHOD FOR CHARACTERIZATION OF THREE-PHASE UNBALANCED DIPS FROM RECORDED VOLTAGE WAVESHAPES A METHOD FOR CHARACTERIZATION OF THREE-PHASE UNBALANCED DIPS FROM RECORDED OLTAGE WAESHAPES M.H.J. Bollen, L.D. Zhng Dept. Eletri Power Engineering Chlmers University of Tehnology, Gothenurg, Sweden Astrt:

More information

UTMC APPLICATION NOTE UT1553B BCRT TO INTERFACE PSEUDO-DUAL-PORT RAM ARCHITECTURE INTRODUCTION ARBITRATION DETAILS DESIGN SELECTIONS

UTMC APPLICATION NOTE UT1553B BCRT TO INTERFACE PSEUDO-DUAL-PORT RAM ARCHITECTURE INTRODUCTION ARBITRATION DETAILS DESIGN SELECTIONS UTMC APPLICATION NOTE UT1553B BCRT TO 80186 INTERFACE INTRODUCTION The UTMC UT1553B BCRT is monolithi CMOS integrte iruit tht provies omprehensive Bus Controller n Remote Terminl funtions for MIL-STD-

More information

Fault tree conversion to binary decision diagrams

Fault tree conversion to binary decision diagrams Loughorough University Institutionl Repository Fult tree onversion to inry deision digrms This item ws sumitted to Loughorough University's Institutionl Repository y the/n uthor. Cittion: ANDREWS, J.D.

More information

10.2 Graph Terminology and Special Types of Graphs

10.2 Graph Terminology and Special Types of Graphs 10.2 Grph Terminology n Speil Types of Grphs Definition 1. Two verties u n v in n unirete grph G re lle jent (or neighors) in G iff u n v re enpoints of n ege e of G. Suh n ege e is lle inient with the

More information

4.3 Balanced Trees. let us assume that we can manipulate them conveniently and see how they can be put together to form trees.

4.3 Balanced Trees. let us assume that we can manipulate them conveniently and see how they can be put together to form trees. 428 T FOU 4.3 Blned Trees T BT GOIT IN T VIOU setion work well for wide vriety of pplitions, ut they hve poor worst-se performne. s we hve noted, files lredy in order, files in reverse order, files with

More information

Towards Unifying Advances in Twig Join Algorithms

Towards Unifying Advances in Twig Join Algorithms Pro. 21st Austrlsin Dtse Conferene (ADC 2010), Brisne, Austrli Towrds Unifying Advnes in Twig Join Algorithms Nils Grimsmo Truls A. Bjørklund Deprtment of Computer nd Informtion Siene Norwegin University

More information

SMALL SIZE EDGE-FED SIERPINSKI CARPET MICROSTRIP PATCH ANTENNAS

SMALL SIZE EDGE-FED SIERPINSKI CARPET MICROSTRIP PATCH ANTENNAS Progress In Eletromgnetis Reserh C, Vol. 3, 195 22, 28 SMALL SIZE EDGE-FED SIERPINSKI CARPET MICROSTRIP PATCH ANTENNAS W.-L. Chen nd G.-M. Wng Rdr Engineering Deprtment Missile Institute of Air Fore Engineering

More information

CS Summer Lecture #23: Network and End-to-End layers

CS Summer Lecture #23: Network and End-to-End layers S 4 - Summer 8 - Leture #3: Network nd End-to-End lyers Pst & Present! Lst time: pushing its out of/into hrdwre Link lyer. How to: enode its on wire (in. ntenn), prse its into pkets, ritrte etween s, nme

More information

Architecture and Data Flows Reference Guide

Architecture and Data Flows Reference Guide Arhiteture nd Dt Flows Referene Guide BES12 Version 12.5 Pulished: 2016-06-29 SWD-20160620150844487 Contents Aout this guide... 5 Arhiteture: BES12 EMM solution... 6 BES12 omponents...8 Components used

More information

Greedy Algorithm. Algorithm Fall Semester

Greedy Algorithm. Algorithm Fall Semester Greey Algorithm Algorithm 0 Fll Semester Optimiztion prolems An optimiztion prolem is one in whih you wnt to fin, not just solution, ut the est solution A greey lgorithm sometimes works well for optimiztion

More information

Final Exam Review F 06 M 236 Be sure to look over all of your tests, as well as over the activities you did in the activity book

Final Exam Review F 06 M 236 Be sure to look over all of your tests, as well as over the activities you did in the activity book inl xm Review 06 M 236 e sure to loo over ll of your tests, s well s over the tivities you did in the tivity oo 1 1. ind the mesures of the numered ngles nd justify your wor. Line j is prllel to line.

More information

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5 CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,

More information

An Approach to Filter the Test Data for Killing Multiple Mutants in Different Locations

An Approach to Filter the Test Data for Killing Multiple Mutants in Different Locations Interntionl Journl of Computer Theory nd Engineering, Vol. 5, No. 2, April 2013 An Approh to Filter the Test Dt for Killing Multiple Mutnts in Different Lotions Ngendr Prtp Singh, Rishi Mishr, Silesh Tiwri,

More information

Lecture 12 : Topological Spaces

Lecture 12 : Topological Spaces Leture 12 : Topologil Spes 1 Topologil Spes Topology generlizes notion of distne nd loseness et. Definition 1.1. A topology on set X is olletion T of susets of X hving the following properties. 1. nd X

More information

Chapter 9. Greedy Technique. Copyright 2007 Pearson Addison-Wesley. All rights reserved.

Chapter 9. Greedy Technique. Copyright 2007 Pearson Addison-Wesley. All rights reserved. Chpter 9 Greey Tehnique Copyright 2007 Person Aison-Wesley. All rights reserve. Greey Tehnique Construts solution to n optimiztion prolem piee y piee through sequene of hoies tht re: fesile lolly optiml

More information

LINX MATRIX SWITCHERS FIRMWARE UPDATE INSTRUCTIONS FIRMWARE VERSION

LINX MATRIX SWITCHERS FIRMWARE UPDATE INSTRUCTIONS FIRMWARE VERSION Overview LINX MATRIX SWITCHERS FIRMWARE UPDATE INSTRUCTIONS FIRMWARE VERSION 4.4.1.0 Due to the omplex nture of this updte, plese fmilirize yourself with these instrutions nd then ontt RGB Spetrum Tehnil

More information

Lesson 4.4. Euler Circuits and Paths. Explore This

Lesson 4.4. Euler Circuits and Paths. Explore This Lesson 4.4 Euler Ciruits nd Pths Now tht you re fmilir with some of the onepts of grphs nd the wy grphs onvey onnetions nd reltionships, it s time to egin exploring how they n e used to model mny different

More information

A distributed edit-compile workflow

A distributed edit-compile workflow Time Synhroniztion nd Logil Cloks Tody 1. The need for time synhroniztion 2. Wll lok time synhroniztion 3. Logil Time: Lmport Cloks COS 418: Distriuted Systems Leture 4 Kyle Jmieson 2 A distriuted edit-ompile

More information

Tiling Triangular Meshes

Tiling Triangular Meshes Tiling Tringulr Meshes Ming-Yee Iu EPFL I&C 1 Introdution Astrt When modelling lrge grphis senes, rtists re not epeted to model minute nd repetitive fetures suh s grss or snd with individul piees of geometry

More information

Architecture and Data Flows Reference Guide

Architecture and Data Flows Reference Guide Arhiteture nd Dt Flows Referene Guide BlkBerry UEM Version 12.7 Pulished: 2017-07-12 SWD-20170627140413745 Contents Aout this guide... 5 Arhiteture: BlkBerry UEM solution... 6 BlkBerry UEM omponents...

More information

INTEGRATED WORKFLOW ART DIRECTOR

INTEGRATED WORKFLOW ART DIRECTOR ART DIRECTOR Progrm Resoures INTEGRATED WORKFLOW PROGRAM PLANNING PHASE In this workflow phse proess, you ollorte with the Progrm Mnger, the Projet Mnger, nd the Art Speilist/ Imge Led to updte the resoures

More information

Distance Computation between Non-convex Polyhedra at Short Range Based on Discrete Voronoi Regions

Distance Computation between Non-convex Polyhedra at Short Range Based on Discrete Voronoi Regions Distne Computtion etween Non-onvex Polyhedr t Short Rnge Bsed on Disrete Voronoi Regions Ktsuki Kwhi nd Hiroms Suzuki Deprtment of Preision Mhinery Engineering, The University of Tokyo 7-3-1 Hongo, Bunkyo-ku,

More information

Can Pythagoras Swim?

Can Pythagoras Swim? Overview Ativity ID: 8939 Mth Conepts Mterils Students will investigte reltionships etween sides of right tringles to understnd the Pythgoren theorem nd then use it to solve prolems. Students will simplify

More information

Shared Memory Architectures. Programming and Synchronization. Today s Outline. Page 1. Message passing review Cosmic Cube discussion

Shared Memory Architectures. Programming and Synchronization. Today s Outline. Page 1. Message passing review Cosmic Cube discussion Tody s Outline Arhitetures Progrmming nd Synhroniztion Disuss pper on Cosmi Cube (messge pssing) Messge pssing review Cosmi Cube disussion > Messge pssing mhine Shred memory model > Communition > Synhroniztion

More information

Triple/Quadruple Patterning Layout Decomposition via Novel Linear Programming and Iterative Rounding

Triple/Quadruple Patterning Layout Decomposition via Novel Linear Programming and Iterative Rounding Triple/Qudruple Ptterning Lyout Deomposition vi Novel Liner Progrmming nd Itertive Rounding Yio Lin, Xioqing Xu, Bei Yu, Ross Bldik nd Dvid Z. Pn ECE Dept., University of Texs t Austin, Austin, TX USA

More information

V = set of vertices (vertex / node) E = set of edges (v, w) (v, w in V)

V = set of vertices (vertex / node) E = set of edges (v, w) (v, w in V) Definitions G = (V, E) V = set of verties (vertex / noe) E = set of eges (v, w) (v, w in V) (v, w) orere => irete grph (igrph) (v, w) non-orere => unirete grph igrph: w is jent to v if there is n ege from

More information

6.045J/18.400J: Automata, Computability and Complexity. Quiz 2: Solutions. Please write your name in the upper corner of each page.

6.045J/18.400J: Automata, Computability and Complexity. Quiz 2: Solutions. Please write your name in the upper corner of each page. 6045J/18400J: Automt, Computbility nd Complexity Mrh 30, 2005 Quiz 2: Solutions Prof Nny Lynh Vinod Vikuntnthn Plese write your nme in the upper orner of eh pge Problem Sore 1 2 3 4 5 6 Totl Q2-1 Problem

More information

Lecture 8: Graph-theoretic problems (again)

Lecture 8: Graph-theoretic problems (again) COMP36111: Advned Algorithms I Leture 8: Grph-theoreti prolems (gin) In Prtt-Hrtmnn Room KB2.38: emil: iprtt@s.mn..uk 2017 18 Reding for this leture: Sipser: Chpter 7. A grph is pir G = (V, E), where V

More information

Robust Boolean Reasoning for Equivalence Checking and Functional Property Verification

Robust Boolean Reasoning for Equivalence Checking and Functional Property Verification IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL., NO. Y, MONTH Roust Boolen Resoning for Equivlene Cheking nd Funtionl Property Verifition Andres Kuehlmnn, Senior Memer,

More information

Width and Bounding Box of Imprecise Points

Width and Bounding Box of Imprecise Points Width nd Bounding Box of Impreise Points Vhideh Keikh Mrten Löffler Ali Mohdes Zhed Rhmti Astrt In this pper we study the following prolem: we re given set L = {l 1,..., l n } of prllel line segments,

More information

CS 551 Computer Graphics. Hidden Surface Elimination. Z-Buffering. Basic idea: Hidden Surface Removal

CS 551 Computer Graphics. Hidden Surface Elimination. Z-Buffering. Basic idea: Hidden Surface Removal CS 55 Computer Grphis Hidden Surfe Removl Hidden Surfe Elimintion Ojet preision lgorithms: determine whih ojets re in front of others Uses the Pinter s lgorithm drw visile surfes from k (frthest) to front

More information

Introduction to Algebra

Introduction to Algebra INTRODUCTORY ALGEBRA Mini-Leture 1.1 Introdution to Alger Evlute lgeri expressions y sustitution. Trnslte phrses to lgeri expressions. 1. Evlute the expressions when =, =, nd = 6. ) d) 5 10. Trnslte eh

More information

Secure XML Querying with Security Views

Secure XML Querying with Security Views Seure XML Querying with Seurity Views Wenfei Fn University of Edinurgh & Bell Lortories wenfei@inf.ed..uk Chee-Yong Chn Ntionl University of Singpore hny@omp.nus.edu.sg Minos Groflkis Bell Lortories minos@reserh.ell-ls.om

More information

A Fast Delay Analysis Algorithm for The Hybrid Structured Clock Network

A Fast Delay Analysis Algorithm for The Hybrid Structured Clock Network A Fst Dely Anlysis Algorithm for The Hyrid Strutured Clok Network Yi Zou 1, Yii Ci 1,Qing Zhou 1,Xinlong Hong 1, Sheldon X.-D. Tn 2 1 Deprtment of Computer Siene nd Tehnology, Tsinghu University, Beijing,

More information

CS453 INTRODUCTION TO DATAFLOW ANALYSIS

CS453 INTRODUCTION TO DATAFLOW ANALYSIS CS453 INTRODUCTION TO DATAFLOW ANALYSIS CS453 Leture Register llotion using liveness nlysis 1 Introdution to Dt-flow nlysis Lst Time Register llotion for expression trees nd lol nd prm vrs Tody Register

More information

COMPUTER EDUCATION TECHNIQUES, INC. (WEBLOGIC_SVR_ADM ) SA:

COMPUTER EDUCATION TECHNIQUES, INC. (WEBLOGIC_SVR_ADM ) SA: In orer to lern whih questions hve een nswere orretly: 1. Print these pges. 2. Answer the questions. 3. Sen this ssessment with the nswers vi:. FAX to (212) 967-3498. Or. Mil the nswers to the following

More information

IMAGE COMPRESSION USING HIRARCHICAL LINEAR POLYNOMIAL CODING

IMAGE COMPRESSION USING HIRARCHICAL LINEAR POLYNOMIAL CODING Rsh Al-Tmimi et l, Interntionl Journl of Computer Siene nd Mobile Computing, Vol.4 Issue.1, Jnury- 015, pg. 11-119 Avilble Online t www.ijsm.om Interntionl Journl of Computer Siene nd Mobile Computing

More information

Lexical Analysis: Constructing a Scanner from Regular Expressions

Lexical Analysis: Constructing a Scanner from Regular Expressions Lexicl Anlysis: Constructing Scnner from Regulr Expressions Gol Show how to construct FA to recognize ny RE This Lecture Convert RE to n nondeterministic finite utomton (NFA) Use Thompson s construction

More information

Introduction to Compilers and Language Design Copyright (C) 2017 Douglas Thain. All rights reserved.

Introduction to Compilers and Language Design Copyright (C) 2017 Douglas Thain. All rights reserved. Introdution to Compilers nd Lnguge Design Copyright (C) 2017 Dougls Thin. All rights reserved. Anyone is free to downlod nd print the PDF edition of this ook for personl use. Commeril distriution, printing,

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

Containers: Queue and List

Containers: Queue and List Continers: Queue n List Queue A ontiner in whih insertion is one t one en (the til) n eletion is one t the other en (the he). Also lle FIFO (First-In, First-Out) Jori Cortell n Jori Petit Deprtment of

More information

COMP 423 lecture 11 Jan. 28, 2008

COMP 423 lecture 11 Jan. 28, 2008 COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring

More information

Taming Subgraph Isomorphism for RDF Query Processing

Taming Subgraph Isomorphism for RDF Query Processing Tming Sugrph Isomorphism for RDF Query Proessing Jinh Kim # jinh.kim@orle.om Hyungyu Shin hgshin@dl.posteh..kr Wook-Shin Hn wshn@posteh..kr Sungpk Hong # Hssn Chfi # {sungpk.hong, hssn.hfi}@orle.om POSTECH,

More information

Table-driven look-ahead lexical analysis

Table-driven look-ahead lexical analysis Tle-riven look-he lexil nlysis WUU YANG Computer n Informtion Siene Deprtment Ntionl Chio-Tung University, HsinChu, Tiwn, R.O.C. Astrt. Moern progrmming lnguges use regulr expressions to efine vli tokens.

More information

MITSUBISHI ELECTRIC RESEARCH LABORATORIES Cambridge, Massachusetts. Introduction to Matroids and Applications. Srikumar Ramalingam

MITSUBISHI ELECTRIC RESEARCH LABORATORIES Cambridge, Massachusetts. Introduction to Matroids and Applications. Srikumar Ramalingam Cmrige, Msshusetts Introution to Mtrois n Applitions Srikumr Rmlingm MERL mm//yy Liner Alger (,0,0) (0,,0) Liner inepenene in vetors: v, v2,..., For ll non-trivil we hve s v s v n s, s2,..., s n 2v2...

More information

Augmenting Sux Trees, with Applications Yossi Matias 1?, S. Muthukrishnan 2??,Suleyman Cenk Ṣahinalp 3???, and Jacob Ziv 4 y 1 Tel-Aviv University, an

Augmenting Sux Trees, with Applications Yossi Matias 1?, S. Muthukrishnan 2??,Suleyman Cenk Ṣahinalp 3???, and Jacob Ziv 4 y 1 Tel-Aviv University, an Augmenting Sux Trees, with Applitions Yossi Mtis 1?, S. Mhukrishnn??,Suleymn Cenk Ṣhinlp 3???, nd Jo Ziv 4 y 1 Tel-Aviv University, nd Bell Ls, Murry Hill Bell Ls, Murry Hill 3 University ofwrwik nd University

More information

Agilent G3314AA BioConfirm Software

Agilent G3314AA BioConfirm Software Agilent G3314AA BioConfirm Softwre Quik Strt Guide Use this guide to instll nd get strted with the BioConfirm softwre. Wht is BioConfirm Softwre? Agilent G3314AA BioConfirm Softwre lets you onfirm the

More information

Internet Routing. Reminder: Routing. CPSC Network Programming

Internet Routing. Reminder: Routing. CPSC Network Programming PS 360 - Network Progrmming Internet Routing Mihele Weigle eprtment of omputer Siene lemson University mweigle@s.lemson.eu pril, 00 http://www.s.lemson.eu/~mweigle/ourses/ps360 Reminer: Routing Internet

More information

String comparison by transposition networks

String comparison by transposition networks String omprison y trnsposition networks Alexnder Tiskin (Joint work with Peter Krushe) Deprtment of Computer Siene University of Wrwik http://www.ds.wrwik..uk/~tiskin (inludes n extended version of this

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

Tracking Hidden Agents Through Shadow Information Spaces

Tracking Hidden Agents Through Shadow Information Spaces Trking Hidden Agents Through Shdow Informtion Spes Jingjin Yu Steven M. LVlle jyu@uiu.edu lvlle@uiu.edu Deprtment of Computer Siene University of Illinois Urn, IL 601 USA Astrt This pper ddresses prolems

More information

[Prakash* et al., 5(8): August, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

[Prakash* et al., 5(8): August, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116 [Prksh* et l 58: ugust 6] ISSN: 77-9655 I Vlue: Impt Ftor: 6 IJESRT INTERNTIONL JOURNL OF ENGINEERING SIENES & RESERH TEHNOLOGY SOME PROPERTIES ND THEOREM ON FUZZY SU-TRIDENT DISTNE Prveen Prksh* M Geeth

More information

To access your mailbox from inside your organization. For assistance, call:

To access your mailbox from inside your organization. For assistance, call: 2001 Ative Voie, In. All rights reserved. First edition 2001. Proteted y one or more of the following United Sttes ptents:,070,2;,3,90;,88,0;,33,102;,8,0;,81,0;,2,7;,1,0;,90,88;,01,11. Additionl U.S. nd

More information

Class Overview. Database Design. Database Design Process. Database Design. Introduction to Data Management CSE 414

Class Overview. Database Design. Database Design Process. Database Design. Introduction to Data Management CSE 414 Introution to Dt Mngement CSE 44 Unit 6: Coneptul Design E/R Digrms Integrity Constrints BCNF Introution to Dt Mngement CSE 44 E/R Digrms ( letures) CSE 44 Autumn 08 Clss Overview Dtse Design Unit : Intro

More information

Profile Based Sub-Image Search in Image Databases

Profile Based Sub-Image Search in Image Databases Profile Bsed Su-Imge Serh in Imge Dtses Vishwkrm Singh 1, Amuj K. Singh 2 Deprtment of Computer Siene, University of Cliforni, Snt Brr, USA 1 vsingh@s.us.edu, 2 muj@s.us.edu Astrt Su-imge serh with high

More information

Compilers. Topic 4. The Symbol Table and Block Structure PART II. Mick O Donnell: Alfonso Ortega:

Compilers. Topic 4. The Symbol Table and Block Structure PART II. Mick O Donnell: Alfonso Ortega: Compilers Topi 4 The ol Tle nd Blok Struture PART II Mik O Donnell: mihel.odonnell@um.es Alfonso Orteg: lfonso.orteg@um.es Topi 2: Blok Struture 2 1 ol tles with lok strutures Blok Struture Progrmming

More information

CICS Application Design

CICS Application Design CICS Applition Design In orer to lern whih questions hve een nswere orretly: 1. Print these pges. 2. Answer the questions. 3. Sen this ssessment with the nswers vi:. FAX to (212) 967-3498. Or. Mil the

More information

An Efficient Code Update Scheme for DSP Applications in Mobile Embedded Systems

An Efficient Code Update Scheme for DSP Applications in Mobile Embedded Systems An Effiient Code Updte Sheme for DSP Applitions in Moile Emedded Systems Weiji Li, Youto Zhng Computer Siene Deprtment,University of Pittsurgh,Pittsurgh, PA 526 {weijili,zhngyt}@s.pitt.edu Astrt DSP proessors

More information

Troubleshooting. Verify the Cisco Prime Collaboration Provisioning Installation (for Advanced or Standard Mode), page

Troubleshooting. Verify the Cisco Prime Collaboration Provisioning Installation (for Advanced or Standard Mode), page Trouleshooting This setion explins the following: Verify the Ciso Prime Collortion Provisioning Instlltion (for Advned or Stndrd Mode), pge 1 Upgrde the Ciso Prime Collortion Provisioning from Smll to

More information

Avocado: A Distributed Virtual Reality Framework

Avocado: A Distributed Virtual Reality Framework Avodo: A Distriuted Virtul Relity Frmework Henrik Trmerend GMD - Germn Ntionl Reserh Center for Informtion Tehnology henrik.trmerend@gmd.de Astrt We present Avodo, our ojet-oriented frmework for the development

More information

Package Contents. Wireless-G USB Network Adapter with SpeedBooster USB Cable Setup CD-ROM with User Guide (English only) Quick Installation

Package Contents. Wireless-G USB Network Adapter with SpeedBooster USB Cable Setup CD-ROM with User Guide (English only) Quick Installation A Division of Ciso Systems, In. Pkge Contents Wireless-G USB Network Adpter with SpeedBooster USB Cle Setup CD-ROM with User Guide (English only) Quik Instlltion 2,4 GHz 802.11g Wireless Model No. Model

More information

the machine and check the components AC Power Cord Carrier Sheet/ Plastic Card Carrier Sheet DVD-ROM

the machine and check the components AC Power Cord Carrier Sheet/ Plastic Card Carrier Sheet DVD-ROM Quik Setup Guide Strt Here ADS-2100 Plese red the Produt Sfety Guide first efore you set up your mhine. Then, plese red this Quik Setup Guide for the orret setup nd instlltion. WARNING WARNING indites

More information

Additional Measurement Algorithms in the Overhauser Magnetometer POS-1

Additional Measurement Algorithms in the Overhauser Magnetometer POS-1 Additionl Mesurement Algorithms in the Overhuser Mgnetometer POS-1 O.V. Denisov, A.Y. Denisov, V.A. Spunov (QM Lortory of Url Stte Tehnil University, Mir 19, Ekterinurg, 620002, Russi) J.L. Rsson (Royl

More information

Declarative Routing: Extensible Routing with Declarative Queries

Declarative Routing: Extensible Routing with Declarative Queries elrtive Routing: Extensile Routing with elrtive Queries Boon Thu Loo 1 Joseph M. Hellerstein 1,2, Ion toi 1, Rghu Rmkrishnn3, 1 University of Cliforni t Berkeley, 2 Intel Reserh Berkeley, 3 University

More information

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries Tries Yufei To KAIST April 9, 2013 Y. To, April 9, 2013 Tries In this lecture, we will discuss the following exct mtching prolem on strings. Prolem Let S e set of strings, ech of which hs unique integer

More information

Efficient Answering of Set Containment Queries for Skewed Item Distributions

Efficient Answering of Set Containment Queries for Skewed Item Distributions Eiient Answering o Set Continment Queries or Skewed Item Distributions Mnolis Terrovitis IMIS, RC Athen Greee mter@imis.theninnovtion.gr Timos Sellis NTU Athens nd IMIS, RC Athen Greee timos@imis.theninnovtion.gr

More information

1. Be able to do System Level Designs by: 2. Become proficient in a hardware-description language (HDL)

1. Be able to do System Level Designs by: 2. Become proficient in a hardware-description language (HDL) Ojetives CENG53 Digitl Sstem Design Digitl Mhine Design Overview 1. Be le to do Sstem Level Designs : Mstering design issues in ottom-up fshion nd Designing sstems for speifi pplitions in top-down methodolog

More information

CS553 Lecture Introduction to Data-flow Analysis 1

CS553 Lecture Introduction to Data-flow Analysis 1 ! Ide Introdution to Dt-flow nlysis!lst Time! Implementing Mrk nd Sweep GC!Tody! Control flow grphs! Liveness nlysis! Register llotion CS553 Leture Introdution to Dt-flow Anlysis 1 Dt-flow Anlysis! Dt-flow

More information