ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS
|
|
- Muriel Carpenter
- 5 years ago
- Views:
Transcription
1 ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth Avenue Faifax, VA 22030, USA Potland, OR menasce@csgmuedu mohamedbennani@oaclecom Abstact Moden compute systems ae based on a wide vaiety of softwae seves, such as web seves, application seves, database seves, and mail seves The typical softwae achitectue of such seves includes a set of pocesses o that seve submitted to the seve Requests that aive at the seve and find all busy, ae placed in a queue Theads that ae busy executing compete fo hadwae esouces (eg, pocessos and I/O devices) at the machine whee the softwae seve uns It is impotant to be able to model softwae seves in a way that takes into account both softwae contention waiting fo and hadwae contention waiting fo pocessos and I/O devices This pape pesents analytical models fo a wide ange of multitheaded softwae seve achitectues: a) single class (ie, all have simila demands) with unlimited thead queue size, b) single class with limited thead queue size, c) multiclass with unlimited thead queue size, and d) multiclass with limited queue size Numeical esults ae pesented to illustate the use of the models 1 Intoduction Moden compute systems ae based on a wide vaiety of softwae seves that seve fom client pocesses Some examples of softwae seves include web seves, application seves, database seves, and mail seves The typical softwae achitectue of such seves includes a set of pocesses o that seve submitted to the seve Requests that aive at the seve and find all busy, ae placed in a queue Theads that ae busy executing compete fo hadwae esouces (eg, pocessos and I/O devices) at the machine whee the softwae seve uns Theefoe, it is impotant to be able to model softwae seves in a way that takes into account both softwae contention waiting fo and hadwae contention waiting fo pocessos and I/O devices This pape pesents analytical models fo a wide ange of multitheaded softwae seve achitectues: a) single class (ie, all have simila demands) with unlimited thead queue size, b) single class with limited thead queue size, c) multiclass with unlimited thead queue size, and d) multiclass with limited queue size This wok was suppoted in pat by the National Geospatial- Intelligence Agency (NGA) contact NMA The models pesented hee build on well-known modeling techniques: bith-death Makov chains [1], Mean Value Analysis (MVA) [4] fo single class queuing netwok models, and appoximate MVA (amva) [5] fo multiple class queueing netwok models We also use the well-known pinciples of hieachical modeling and iteative models The est of this pape is oganized as follows Section two pesents some backgound and notation Section thee pesents a model fo a single class softwae seve with an unlimited thead queue size The next section modifies the model to account fo thead queues of limited size Section five deals with the issue of multiple classes of fo both unlimited and limited queue size Finally section six pesents some concluding emaks 2 Basic Concepts and Notation The models used in this pape daw on the notion of closed queuing netwok (QN) models used to epesent compute systems Such models compise a collection of K devices visited by that may belong to diffeent classes, o wokloads A class of is typically associated to a collection of that have simila demands on the vaious esouces The sevice demand, D i,,of of class at device i is the total sevice time spent by a equest of class ove all visits to device i duing the (c) 2006 Menasce and Bennani All Rights Reseved 1/7
2 execution of the equest The solution to such QNs can be obtained though Mean Value Analysis [4] o appoximate MVA (amva) fo the case of multiple classes [5] Fo moe details on queuing netwoks, the eade is efeed to [3] The notation given in Table 1 is used thoughout the pape 3 Single-class Multitheaded Seve with Unlimited Queue Figue 1 displays a situation in which fo sevice aive to a multitheaded softwae seve that has M The undelying hadwae platfom used by all has pocessing and I/O esouces Aiving join a queue of waiting fo an available thead Once a thead to execute, it stats to compete with othe fo pocessing and I/O esouces The bottom pat of the figue shows queues fo the CPU and fo I/O It is also assumed in this section that all ae homogeneous in tems of thei sevice demands This assumption will be elaxed late in the pape Thus, we ae dealing with a single-class modeling situation aiving queue of waiting fo 1 completing and completion pocess of The ate at which complete is detemined by the solution of a lowe level model, in the fom of a queuing netwok (QN) Let X(k), k =1,, M, be the ate at which a thead completes its execution when thee ae k in execution This ate can be obtained by solving the closed QN model fo the hadwae subsystem composed of the CPU and disk when thee ae k concuent in execution The solution of this queuing netwok can be obtained though Mean Value Analysis (MVA) [3, 4] A state k in the Makov chain of Fig 2 epesents the numbe of in the system (waiting fo a thead o being executed by a thead) This Makov chain has an infinite numbe of states since thee is no limit on the numbe of in the queue The aival ate in the Makov chain (tansition ate to a highe numbeed neighboing state) is the aival ate of, λ, and the completion ate (tansition ate to a lowe numbeed neighboing state) is the completion ate of Note that since thee can be at most M in execution, the depatue ate is constant and equal to X(M) fo any state k>m The solution of this Makov chain, ie, the set of pobabilities P k,k =0,, can be obtained using the Genealized Bith-Death theoem [1, 3]: k 1 λ i P k = P 0 (1) μ i+1 i=0 Fo the model consideed in this subsection, λ i = λ i and μ i = X(i) fo i =0,,M and μ i = X(M) fo i>m M 0 1 k M M+1 (1) (2) (k) (k+1) (M) (M) (M) CPU Figue 2: Makov Chain fo the unlimited thead queue case The solution to the Makov chain of Fig 2 is given by Disk compute system shaed by all Figue 1: Multitheaded seve with unlimited queue In ode to model this type of softwae seve, we use the well-known pinciple of hieachical modeling At the softwae level, we use a Makov chain to model the aival { P0 λ P k = k /β(k) fo k =1,,M P 0 ρ k X(M) M /β(m) fo k>m whee: β(k) =X(1) X(2) X(k), ρ = λ/x(m), and P 0 =[1+ M λk β(k) + X(M)M β(m) ρm+1 1 ρ ] 1 (2) Note that the solution given above only exists when ρ<1 The aveage esponse time, R 0, can be easily computed fom the state pobabilities and fom Little s Law [1] as (c) 2006 Menasce and Bennani All Rights Reseved 2/7
3 K Numbe of devices (eg, pocessos, disks) in the compute system R Numbe of classes (wokloads) M total numbe of in the system N system size (maximum queue length plus numbe of in system) D i, sevice demand of class at device i U i, utilization of device i by class U i utilization of device i (U i = R =1 U i,) n i, aveage numbe of class queued at device i o using the device aveage numbe of class in execution ( = K i=1 n i,) aveage numbe of class in the system (waiting fo a thead o using a thead) Table 1: Notation R 0 = /λ, whee, the aveage numbe of in the system (waiting fo a thead o using a thead), is given by [ M ] = P 0 k λk β(k) + ρ (X(M)ρ)M (1 + M(1 ρ)) β(m) (1 ρ) 2 (3) The aveage numbe of in execution,,is given by = M 1 M 1 k P k + M [1 k=0 P k ] (4) Figue 3 shows the vaiation of the aveage esponse time R 0 as a function of the aveage aival ate λ The paametes used fo this example ae: Numbe of (M): 20 Sevice demand at the CPU (D CPU ): 0020 sec Sevice demand at the disk (D I/O ): 0015 sec Fo the paametes given above, X(20) = 4996 /sec, close to the maximum bound on thoughput which is 1/D CPU = 1/002 = 50 /sec Since ρ = λ/x(20) < 1, λ<4996 As the figue shows, as λ appoaches its maximum possible value, the esponse time goes to infinity vey fast The esponse time stays below 05 sec fo λ<49 /sec 4 Single-class Multitheaded Seve with Limited Queue Figue 4 displays a multitheaded seve with a limited queue fo stoing incoming The numbe of is M as in the unlimited queue size case but thee is a limit N on the total numbe of in the system (waiting fo a thead o being executed by a thead) The solution fo this case can be obtained following the same appoach as in section 3 The Makov chain model in this case, shown in Fig 5, has N +1 states A state k, (k =0,, N), epesents the numbe of in the Avg Response Time (sec) Aival ate (eq/sec) Figue 3: Aveage esponse time (sec) vs aival ate (eq/sec) fo the unlimited queue case with 20 system (waiting fo a thead o using a thead) The aival ate in the diagam is the aival ate of, λ, and the completion ate is the completion ate of Note that since thee can be at most M in execution, the depatue ate is constant and equal to X(M) fo any state k>m as in the pevious case The solution of this Makov Chain, ie, the values of the pobabilities P k,fok =(0,, N), of finding k in the system, can be obtained using the methods in [1, 3] The solution is given below { P0 λ P k = k /β(k) fo k =1,,M P 0 ρ k X(M) M /β(m) whee: β(k) =X(1) X(2) X(k), ρ = λ/x(m), and P 0 =[1+ M λk fo k = M +1,,N (5) β(k) + ρ λm (1 ρ N M ) β(m) (1 ρ) ] 1 (c) 2006 Menasce and Bennani All Rights Reseved 3/7
4 aiving queue of waiting fo 1 used in the unlimited queue case Thee is one additional paamete in this case, which is the system size N The figue shows two cuves, one fo N =25and anothe fo N =35 Max? Yes ejected No M completing Avg esponse time (sec) CPU Aival ate (eq/sec) n = 25 n = 35 Figue 4: queue Disk compute system shaed by all Multitheaded seve with limited thead The metics of inteest, namely the pobability of ejection P ej, the aveage thoughput X and the aveage esponse time R, can be easily computed fom the state pobabilities and fom Little s Law [1] as follows P ej = P n X = λ (1 P ej )= N X(k) P k R 0 = N k P k/x Figue 6 shows the vaiation of the aveage esponse time as a function of the aveage aival ate fo the limited queue case The paametes fo this example ae the same 0 1 k M N-1 N (1) (2) (k) (M) (M) (M) Figue 5: Makov Chain fo the limited thead queue case Figue 6: Aveage esponse time (sec) vs aival ate (eq/sec) fo the limited queue case with 20 and two values of the maximum numbe of in the system (N =25andN = 35) It is inteesting to obseve the shape of this cuve At low loads, the pobability that ae lost, P ej,is vey low Fo example, fo N = 25 and λ = 45 /sec, P ej =1% Howeve, as the load inceases, moe ae ejected and the effective aival ate to the system (equal to the system thoughput) inceases at asloweatewithλ Fo example, fo N =25and λ =70 /sec, P ej =287% Thus, only 499 /sec ae actually being accepted by the system fo execution This explains why the esponse time does not gow to infinity In fact, fo a vey lage value of λ, accepted will find (N M) 1 in the queue fo and all will be busy seving So, the aveage esponse time will become constant and equal to the sum of a constant aveage waiting time and a constant aveage execution time since all M ae busy and competing fo the hadwae esouces 5 Multi-class Multitheaded Seve We now elax the assumption that all have the same sevice demands Conside R diffeent classes of Class ( =1,,R) has an aival ate equal to λ /sec Thee ae K devices (eg, pocessos and I/O devices) and the sevice demand of a equest of class at esouce i is given by D i, Ifweweetousethesame two-level modeling appoach descibed in Sections 3 and 4 we would have a multidimensional Makov chain in which (c) 2006 Menasce and Bennani All Rights Reseved 4/7
5 the state would have to indicate the numbe of of each class in execution as well as the numbe of of each class in the queue This Makov chain would have a vey complex and lage state space Instead of consideing such a lage state space, we use an appoximation that was used by Lazowska et al [2] to model shaed domains in multipogamming systems The basic appoach woks basically as follows: 1 Initialization: Estimate the aveage numbe of in execution,, fo class and the aveage numbe of class in the system (executing o waiting fo a thead),, fo all classes =1,,R 2 Fo each class compute the aveage numbe, δ exec,of of all othe classes that ae in execution and the aveage numbe, δ syst, of of all othe classes that ae in the system (in execution o waiting fo a thead) 3 Solve a multiclass QN model using appoximate Mean Value Analysis (amva) [3] whee the population vecto is ( 1, 2,,n,, fo n =1to M δ exec In othe wods, since thee ae δ exec in execution fom classes othe than class, the numbe of allocated to class is the diffeence between the numbe of M and the numbe of allocated to the othe classes The solution of this QN model gives the class thoughput X ( 1, 2,,n,, fo n =1to M δ exec 4 A unidimensional Makov chain such as the ones discussed in sections 3 o 4 can now be built fo each class using λ as the aival ate and the thoughputs X ( 1, 2,,n,, as the completion ate The solution of this Makov chain povides new values of the aveage numbe of in execution 5 Repeat steps 2 though 4 until successive values of ae sufficiently close fo all classes 6 Compute the pefomance metics We now povide a detailed desciption of the algoithm to model multiclass multitheaded seves The pseudocode fo the initialization phase (step 1 above) is given in Fig 7 The pupose of this phase is to obtain an estimate fo and fo all classes This is done by fist computing the utilization of all devices using the Sevice Demand Law [3] If all utilizations ae below 100%, the fomula fo multiclass open QNs is used to estimate Othewise, we estimate using an appotionment facto based on the elative aival ate of class In both cases, we assume that the queue fo is initially empty, ie, = Note that the initial values of and will be modified though the iteation pocess in the emaining steps of the algoithm Figs 8 and 9 povide a detailed desciption of the iteation phase of the algoithm fo the unlimited and limited thead queue cases, espectively Note that the computation of the pobability distibutions fo P k follows in each case the fomulas used in Sections 3 and 4 fo evey device i do U i ( λ) R =1 U i,( λ)= R =1 λ D i, ; if (U i ( λ) < 10) fo all i then fo evey class do /* use open QN fomula to estimate */ fo evey device i do n i, U i, /(1 U i ); K i=1 n i,; /* adjust n so that it does not exceed M, the numbe of class estimated to be in execution */ min{,m } whee M = M / R s=1 nexec s ; /* assume no queuing fo at initialization */ else /* altenative initialization: use aival ate atios to estimate n */ fo evey class do M λ / s=r s=1 λ s ; /* assume no queuing fo at initialization */ Figue 7: Initialization Phase of the Pefomance Model fo a Multiclass Multitheaded Seve Table 2 shows the esults afte thee iteations fo a two-class multitheaded case with unlimited queue The following paametes wee used: M =10, λ 1 =25 /sec, λ 2 =20/sec, D CPU,1 =0014 sec, D I/O,1 =0020 sec, D CPU,2 =0018 sec, and D I/O,2 = 0012 sec Iteation 0 shows the esults of the initialization step Columns 7 and 13 show the absolute pecent elative eo between two consecutive values of Note that in iteation 3, this eo is aleady at 03% Moe iteations would yield even smalle eos The esponse time fo classes 1 and 2 at iteation 3 is seconds and (c) 2006 Menasce and Bennani All Rights Reseved 5/7
6 Iteation step: fo evey class =1, 2,, R do δ exec = nexec /*adjustethevalueofm */ M = M δ exec fo n =1, 2,, M do Call amva to compute X ( 1, 2,,n,, if M is not an intege then Call amva to compute X ( 1, 2,,M,, define a single class genealized bith-death model with λ = λ and death ates: μ (k) =X ( 1, 2,,k,,,fo1 k M,and μ (k) =X ( 1, 2,,M,, fo k> M compute the pobability distibution, P k, accoding to Section 3 P k = P 0 λk β(k),fo1 k M,and P k = P 0 ρ k μ (M ) M /β( M ),fok> M whee ρ = λ /μ (M ), β(k) =μ (1) μ (k), and [ P 0 = 1+ M λk /β(k)+ μ( M ) M ρ M +1 β( M ) (1 ρ) compute the pefomance metics as: aveage numbe [ of in the system: M = P 0 kλk /β(k)+ ρ [μ( M )ρ] M aveage thoughput: X = λ aveage esponse time: R 0, = /λ aveage numbe of in execution: = M 1 k P k + M [1 M 1 k=0 P k ] ] 1 (1+(M )(1 ρ)) β( M )(1 ρ) ] 2 Convegence test step: Repeat the iteation step until successive values of Compute final metics Retun the pefomance metics as computed in the last iteation ae sufficiently close fo all classes Figue 8: Iteative Phase of the Pefomance Model fo a Multiclass Multitheaded Seve with Unlimited Queue seconds, espectively 6 Concluding Remaks This pape showed how well-known analytic pefomance models can be used to assess the pefomance of multitheaded softwae seves The models use a combination of bith-death Makov chains, Mean Value Analysis, and hieachical modeling The softwae seve achitectues consideed in this pape cove a wide ange of situations found in moden seve-oiented systems The modeling appoach pesented hee takes into account both softwae and hadwae contention in single and multiclass situations Refeences [1] L Kleinock, Queueing Systems Volume I: Theoy, John Wiley & Sons, New Yok, NY, 1975 [2] E Lazowska, J Zahohan, GS Gaham, and KC Sevcik, Quantitative System Pefomance: compute system analysis using queuing netwok models, Pentice Hall, Uppe Saddle Rive, 1984 [3] DA Menascé, VAF Almeida, and LW Dowdy, Pefomance by Design: Compute Capacity Planning by Example, Pentice Hall, Uppe Saddle Rive, 2004 [4] M Reise and S Lavenbeg, Mean-value analysis of closed multi-chain queuing netwoks, J ACM,vol 27, no 2, 1980, pp [5] P Schweitze, Appoximate analysis of multiclass closed netwok of queues, Poc Intl Conf Stochastic Contol and Optimization, Amstedam, 1979 (c) 2006 Menasce and Bennani All Rights Reseved 6/7
7 Iteation 1 1 δ1 exec M1 R 0,1 % elative 2 2 δ2 exec M2 R 0,2 % elative eo 1 eo Table 2: Results fo multiclass unlimited thead queue case Iteation step: fo evey class =1, 2,, R do δ exec = nexec = nsyst /* Adjust the values of M and N */ δ syst M = M δ exec N = N δ syst fo n =1, 2,, M do Call amva to compute X ( 1, 2,,n,, if M is not an intege then Call amva to compute X ( 1, 2,,M,, define a single class genealized bith-death model with λ = λ and death ates: μ (k) =X ( 1, 2,,k,,fo1 k M,and μ (k) =X ( 1, 2,,M, fo M <k N compute the pobability distibution, P k, accoding to Section 4, as P k = P 0 λ k /β(k),fo1 k M,and P k = P 0 ρ k μ (M ) M /β( M ),fo M <k N whee ρ = λ /μ (M ), β(k) =μ (1) μ (k), and P 0 = [ 1+ M λk /β(k)+ ρ λ M Compute the pefomance metics as: aveage numbe of in the system: = N k P k aveage thoughput: X = N P k μ (k) pobability of ejection: P,ej = P N aveage esponse time: R 0, = / X aveage numbe of in execution: ] (1 ρ N M 1 ) β( M ) (1 ρ) = M 1 k P k + M [1 M 1 k=0 P k ] Convegence test step: Repeat the iteation step until successive values of Compute final metics: Retun the pefomance metics as computed in the last iteation ae sufficiently close fo all classes Figue 9: Iteative Phase of the Pefomance Model fo a Multiclass Multitheaded Seve with Limited Queue (c) 2006 Menasce and Bennani All Rights Reseved 7/7
Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System
Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet
More informationControlled Information Maximization for SOM Knowledge Induced Learning
3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity
More informationOn using circuit-switched networks for file transfers
On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed
More informationIP Network Design by Modified Branch Exchange Method
Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management
More informationA New Finite Word-length Optimization Method Design for LDPC Decoder
A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology
More informationThe Dual Round Robin Matching Switch with Exhaustive Service
The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line
More informationHigh performance CUDA based CNN image processor
High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu
More informationModelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set
Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;
More informationAn Unsupervised Segmentation Framework For Texture Image Queries
An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu
More informationGravitational Shift for Beginners
Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational
More informationDynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing
IEEE TRANSACTIONS ON COMPUTERS, VOL. 50, NO. 9, SEPTEMBER 200 949 Dynamic Multiple Paity (DMP) Disk Aay fo Seial Tansaction Pocessing K.H. Yeung, Membe, IEEE, and T.S. Yum, Senio Membe, IEEE AbstactÐThe
More informationRANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES
RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class
More informationCLOUD based storage systems are emerging to gain significant
IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 5, NO. 2, APRIL-JUNE 2017 221 On the Latency and Enegy Efficiency of Distibuted Stoage Systems Akshay Kuma, Student Membe, IEEE, Ravi Tandon, Membe, IEEE, and
More informationJournal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012
2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo
More informationImage Enhancement in the Spatial Domain. Spatial Domain
8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along
More informationUCB CS61C : Machine Structures
inst.eecs.bekeley.edu/~cs61c UCB CS61C : Machine Stuctues Lectue SOE Dan Gacia Lectue 28 CPU Design : Pipelining to Impove Pefomance 2010-04-05 Stanfod Reseaches have invented a monitoing technique called
More informationCommunication vs Distributed Computation: an alternative trade-off curve
Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,
More informationTowards Adaptive Information Merging Using Selected XML Fragments
Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,
More informationCardiac C-Arm CT. SNR Enhancement by Combining Multiple Retrospectively Motion Corrected FDK-Like Reconstructions
Cadiac C-Am CT SNR Enhancement by Combining Multiple Retospectively Motion Coected FDK-Like Reconstuctions M. Pümme 1, L. Wigstöm 2,3, R. Fahig 2, G. Lauitsch 4, J. Honegge 1 1 Institute of Patten Recognition,
More informationSpiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks
Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition
More informationFrequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters
Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using
More informationOptical Flow for Large Motion Using Gradient Technique
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this
More informationA Recommender System for Online Personalization in the WUM Applications
A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based
More informationAn Improved Resource Reservation Protocol
Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing
More informationarxiv: v2 [physics.soc-ph] 30 Nov 2016
Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity
More informationA Two-stage and Parameter-free Binarization Method for Degraded Document Images
A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and
More informationDetection and Recognition of Alert Traffic Signs
Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives
More informationTHE THETA BLOCKCHAIN
THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent
More informationSYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH
I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,
More informationPOMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler
POMDP: Intoduction to Patially Obsevable Makov Decision Pocesses Hossein Kamalzadeh, Michael Hahsle 2019-01-02 The R package pomdp povides an inteface to pomdp-solve, a solve (witten in C) fo Patially
More informationSegmentation of Casting Defects in X-Ray Images Based on Fractal Dimension
17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach
More informationIP Multicast Simulation in OPNET
IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok
More information= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2
Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used
More informationPrioritized Traffic Recovery over GMPLS Networks
Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing
More informationOn the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks
On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New
More informationTopological Characteristic of Wireless Network
Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences
More informationLecture 8 Introduction to Pipelines Adapated from slides by David Patterson
Lectue 8 Intoduction to Pipelines Adapated fom slides by David Patteson http://www-inst.eecs.bekeley.edu/~cs61c/ * 1 Review (1/3) Datapath is the hadwae that pefoms opeations necessay to execute pogams.
More informationA Memory Efficient Array Architecture for Real-Time Motion Estimation
A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN
More informationCombinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments
Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile
More informationConversion Functions for Symmetric Key Ciphers
Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401
More informationAdaptation of TDMA Parameters Based on Network Conditions
Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.
More informationModeling a shared medium access node with QoS distinction
Modeling a shaed medium access node with QoS distinction Matthias Gies, Jonas Geutet Compute Engineeing and Netwoks Laboatoy (TIK) Swiss Fedeal Institute of Technology Züich CH-8092 Züich, Switzeland email:
More informationMonte Carlo Simulation for the ECAT HRRT using GATE
Monte Calo Simulation fo the ECAT HRRT using GATE F. Bataille, C. Comtat, Membe, IEEE, S. Jan, and R. Tébossen Abstact The ECAT HRRT (High Resolution Reseach Tomogaph, CPS Innovations, Knoxville, TN, U.S.A.)
More informationA VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM
Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,
More informationINFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM
INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300
More informationHierarchically Clustered P2P Streaming System
Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.
More informationBo Gu and Xiaoyan Hong*
Int. J. Ad Hoc and Ubiquitous Computing, Vol. 11, Nos. /3, 1 169 Tansition phase of connectivity fo wieless netwoks with gowing pocess Bo Gu and Xiaoyan Hong* Depatment of Compute Science, Univesity of
More informationOptimal Adaptive Learning for Image Retrieval
Optimal Adaptive Leaning fo Image Retieval ao Wang Dept of Compute Sci and ech singhua Univesity Beijing 00084, P. R. China Wangtao7@63.net Yong Rui Micosoft Reseach One Micosoft Way Redmond, WA 9805,
More informationOn Error Estimation in Runge-Kutta Methods
Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment
More informationLecture #22 Pipelining II, Cache I
inst.eecs.bekeley.edu/~cs61c CS61C : Machine Stuctues Lectue #22 Pipelining II, Cache I Wiewold cicuits 2008-7-29 http://www.maa.og/editoial/mathgames/mathgames_05_24_04.html http://www.quinapalus.com/wi-index.html
More informationAn Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network
An Efficient andove Mechanism Using the Geneal Switch Management Potocol on a Multi-Potocol abel Switching Netwok Seong Gon hoi, yun Joo Kang, and Jun Kyun hoi Using the geneal switch management potocol
More informationECE331: Hardware Organization and Design
ECE331: Hadwae Oganization and Design Lectue 16: Pipelining Adapted fom Compute Oganization and Design, Patteson & Hennessy, UCB Last time: single cycle data path op System clock affects pimaily the Pogam
More informationPoint-Biserial Correlation Analysis of Fuzzy Attributes
Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh
More informationConservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery
Poceedings of the 4th WSEAS Intenational Confeence on luid Mechanics and Aeodynamics, Elounda, Geece, August 1-3, 006 (pp337-34) Consevation Law of Centifugal oce and Mechanism of Enegy Tansfe Caused in
More informationAn Extension to the Local Binary Patterns for Image Retrieval
, pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science
More informationOn the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes
On the Convesion between Binay Code and BinayReflected Gay Code on Boolean Cubes The Havad community has made this aticle openly available. Please shae how this access benefits you. You stoy mattes Citation
More informationPerforming real-time image processing on distributed computer systems
Pefoming eal-time image pocessing on distibuted compute systems RADU DOBRESCU, MATEI DOBRESCU, DAN POPESCU "Politehnica" Univesity of Buchaest, Faculty of Contol and Computes, 313 Splaiul Independentei,
More informationMulti-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples
Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits
More informationExperimental and numerical simulation of the flow over a spillway
Euopean Wate 57: 253-260, 2017. 2017 E.W. Publications Expeimental and numeical simulation of the flow ove a spillway A. Seafeim *, L. Avgeis, V. Hissanthou and K. Bellos Depatment of Civil Engineeing,
More informationMapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma
apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the
More informationClass 21. N -body Techniques, Part 4
Class. N -body Techniques, Pat Tee Codes Efficiency can be inceased by gouping paticles togethe: Neaest paticles exet geatest foces diect summation. Distant paticles exet smallest foces teat in goups.
More informationAn effective hop-by-hop Interest shaping mechanism for CCN communications
An effective hop-by-hop Inteest shaping mechanism fo CCN communications Natalya Rozhnova, Sege Fdida To cite this vesion: Natalya Rozhnova, Sege Fdida. An effective hop-by-hop Inteest shaping mechanism
More informationEE 6900: Interconnection Networks for HPC Systems Fall 2016
EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection
More informationADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM
ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,
More informationOn Adaptive Bandwidth Sharing with Rate Guarantees
On Adaptive Bandwidth Shaing with Rate Guaantees N.G. Duffield y T. V. Lakshman D. Stiliadis y AT&T Laboatoies Bell Labs Rm A175, 180 Pak Avenue Lucent Technologies Floham Pak, 101 Cawfods Cone Road NJ
More informationGeneralized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences
Ameican Jounal of ata ining and Knowledge iscovey 27; 2(4): 2-8 http://www.sciencepublishinggoup.com//admkd doi:.648/.admkd.2724.2 Genealized Gey Taget ecision ethod Based on ecision akes Indiffeence Attibute
More informationEffects of Model Complexity on Generalization Performance of Convolutional Neural Networks
Effects of Model Complexity on Genealization Pefomance of Convolutional Neual Netwoks Tae-Jun Kim 1, Dongsu Zhang 2, and Joon Shik Kim 3 1 Seoul National Univesity, Seoul 151-742, Koea, E-mail: tjkim@bi.snu.ac.k
More informationHISTOGRAMS are an important statistic reflecting the
JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe
More informationWIRELESS sensor networks (WSNs), which are capable
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan
More information(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1)
1 Multi Path PERT Ankit Singh and A. L. Naasimha Reddy Electical and Compute Engineeing Depatment, Texas A&M Univesity; email: eddy@ece.tamu.edu. Abstact This pape pesents a new multipath delay based algoithm,
More informationAPPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE
APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE 1 YAROSLAVTSEV A.F., 2 Al-THUNEIBAT S.A., 3 AL TAWALBEH N.A 1 Depatment of Netwoking, SSUTI, Novosibisk, Russia
More informationApproximating Euclidean Distance Transform with Simple Operations in Cellular Processor Arrays
00 th Intenational Wokshop on Cellula Nanoscale Netwoks and thei Applications (CNNA) Appoximating Euclidean Distance Tansfom with Simple Opeations in Cellula Pocesso Aas Samad Razmjooei and Piot Dudek
More informationA Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform
A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad
More informationCollaborative Filtering & Content-Based Recommending. CS 293S. T. Yang Slides based on R. Mooney at UT Austin
ollaboative Filteing & ontent-based Recommending S 293S. T. Yang Slides based on R. Mooney at UT Astin 1 Recommendation Systems Systems fo ecommending items (e.g. books, movies, msic, web pages, newsgop
More informationAN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE
AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity
More informationCS 2461: Computer Architecture 1 Program performance and High Performance Processors
Couse Objectives: Whee ae we. CS 2461: Pogam pefomance and High Pefomance Pocessos Instucto: Pof. Bhagi Naahai Bits&bytes: Logic devices HW building blocks Pocesso: ISA, datapath Using building blocks
More informationCOEN-4730 Computer Architecture Lecture 2 Review of Instruction Sets and Pipelines
1 COEN-4730 Compute Achitectue Lectue 2 Review of nstuction Sets and Pipelines Cistinel Ababei Dept. of Electical and Compute Engineeing Maquette Univesity Cedits: Slides adapted fom pesentations of Sudeep
More informationStrictly as per the compliance and regulations of:
Global Jounal of HUMAN SOCIAL SCIENCE Economics Volume 13 Issue Vesion 1.0 Yea 013 Type: Double Blind Pee Reviewed Intenational Reseach Jounal Publishe: Global Jounals Inc. (USA) Online ISSN: 49-460x &
More informationIntroduction To Pipelining. Chapter Pipelining1 1
Intoduction To Pipelining Chapte 6.1 - Pipelining1 1 Mooe s Law Mooe s Law says that the numbe of pocessos on a chip doubles about evey 18 months. Given the data on the following two slides, is this tue?
More informationAchievable Catalog Size in Peer-to-Peer Video-on-Demand Systems
Achievable Catalog Size in Pee-to-Pee Video-on-Demand Systems Yacine Boufkhad, Fabien Mathieu, Fabien De Montgolfie, Diego Peino, Lauent Viennot To cite this vesion: Yacine Boufkhad, Fabien Mathieu, Fabien
More informationOPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO
OPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO Zeeshan A. Shaikh 1 and T.Y. Badguja 2 1,2 Depatment of Mechanical Engineeing, Late G. N. Sapkal
More informationA Novel Parallel Deadlock Detection Algorithm and Architecture
A Novel Paallel Deadlock Detection Aloithm and Achitectue Pun H. Shiu 2, Yudon Tan 2, Vincent J. Mooney III {ship, ydtan, mooney}@ece.atech.ed }@ece.atech.edu http://codesin codesin.ece.atech.eduedu,2
More informationScaling Location-based Services with Dynamically Composed Location Index
Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute
More informationAny modern computer system will incorporate (at least) two levels of storage:
1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe
More informationTitle. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information
Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220
More informationGTOC 9, Multiple Space Debris Rendezvous Trajectory Design in the J2 environment
GTOC 9, Multiple Space Debis Rendezvous Tajectoy Design in the J envionment Macus Hallmann, Makus Schlottee, Ansga Heidecke, Maco Sagliano Fedeico Fumenti, Volke Maiwald, René Schwaz Institute of Space
More informationParallel processing model for XML parsing
Recent Reseaches in Communications, Signals and nfomation Technology Paallel pocessing model fo XML pasing ADRANA GEORGEVA Fac. Applied Mathematics and nfomatics Technical Univesity of Sofia, TU-Sofia
More informationA modal estimation based multitype sensor placement method
A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;
More informationAn Assessment of the Efficiency of Close-Range Photogrammetry for Developing a Photo-Based Scanning Systeminthe Shams Tabrizi Minaret in Khoy City
Austalian Jounal of Basic and Applied Sciences, 5(1): 80-85, 011 ISSN 1991-8178 An Assessment of the Efficiency of Close-Range Photogammety fo Developing a Photo-Based Scanning Systeminthe Shams Tabizi
More informationHigh Performance Computing on GPU for Electromagnetic Logging
Intenational Confeence "Paallel and Distiuted Computing Systems" High Pefomance Computing on GPU fo lectomagnetic Logging Glinskikh V.N. Kontoovich A.. pov M.I. Tofimuk Institute of Petoleum Geology and
More informationA Neural Network Model for Storing and Retrieving 2D Images of Rotated 3D Object Using Principal Components
A Neual Netwok Model fo Stong and Reteving 2D Images of Rotated 3D Object Using Pncipal Components Tsukasa AMANO, Shuichi KUROGI, Ayako EGUCHI, Takeshi NISHIDA, Yasuhio FUCHIKAWA Depatment of Contol Engineeng,
More informationLecture 27: Voronoi Diagrams
We say that two points u, v Y ae in the same connected component of Y if thee is a path in R N fom u to v such that all the points along the path ae in the set Y. (Thee ae two connected components in the
More informationLecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining
EE 341 Lectue # 12 Instucto: Zeshan hishti zeshan@ece.pdx.edu Novembe 10, 2014 Potland State Univesity asic Pocessing Unit ontol Signals Hadwied ontol Datapath contol signals Dealing with memoy delay Pipelining
More informationEthernet PON (epon): Design and Analysis of an Optical Access Network.
Ethenet PON epon: Design and Analysis of an Optical Access Netwo. Glen Kame Depatment of Compute Science Univesity of Califonia, Davis, CA 9566, USA Tel:.530.297.527; Fax:.530.297.530 E-mail: ame@cs.ucdavis.edu
More informationConfiguring RSVP-ATM QoS Interworking
Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP
More informationReachable State Spaces of Distributed Deadlock Avoidance Protocols
Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications
More informationTransmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design
Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced
More informationLifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks
788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,
More informationA Full-mode FME VLSI Architecture Based on 8x8/4x4 Adaptive Hadamard Transform For QFHD H.264/AVC Encoder
20 IEEE/IFIP 9th Intenational Confeence on VLSI and System-on-Chip A Full-mode FME VLSI Achitectue Based on 8x8/ Adaptive Hadamad Tansfom Fo QFHD H264/AVC Encode Jialiang Liu, Xinhua Chen College of Infomation
More informationEvent-based Location Dependent Data Services in Mobile WSNs
Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,
More information