Towards a Fast and Reliable Software Implementation of SLI-FLP Hybrid Computer Arithmetic

Size: px
Start display at page:

Download "Towards a Fast and Reliable Software Implementation of SLI-FLP Hybrid Computer Arithmetic"

Transcription

1 Proceedings of the 6th WSEAS Int. Conf. on Systems Theory & Scientific Computation, Elounda, Greece, August 2-23, 2006 (pp0-08) Towards a Fast and Reliale Software Implementation of SLI-FLP Hyrid Computer Arithmetic UNANG SHEN AND PETER R. TURNER Department of Mathematics and Computer Science Clarkson University Potsdam, N 3699 U.S.A. pturner@clarkson.edu Astract: - In this paper we descrie a C++ implementation of a hyrid system comining SLI (symmetric level-index) arithmetic and FLP (floating-point) arithmetic. The principal motivation for the work to e presented is to promote the use of SLI arithmetic as a practical framework for scientific computing. This hyrid arithmetic is essentially overflow and underflow free, and its implementation has shown the suitaility to e used in real life computations. Key-Words: - symmetric level-index, computer arithmetic, overflow, underflow, hyrid, numer representation. Introduction This paper is concerned with the implementation, which could e used in practical computations, of an over/underflow free arithmetic ased on symmetric level-index (SLI) system. The implementation currently can e run in a C++ environment of either WINDOWS or LINU, and is availale for download at There are other software implementations of SLI arithmetic, typically in MATLAB, FORTRAN [6], or PASCAL [9]. The purposes of these implementations are to verify the algorithms, and to show the effectiveness of a potential hardware implementation y some numerical experiments. Besides those motivations, the new C++ implementation emphasizes more its practical use as software, with some recent improvements of the algorithms and the design of a hyrid numer representation scheme. The choice of programming language is ased on the fact that C++ is efficient, flexile, versatile, and popular in scientific computation. We claim the implementation is appropriate for use in some real life computational prolems, where over/underflow causes troule. A systematic testing process was executed to show its reliaility and efficiency in section 4. An application is also descried in [8] with some performance records of the program. Ease of use is also an important concern for the implementation. Little knowledge aout SLI arithmetic is required, and no additional analysis to the computational prolem is needed to use the C++ lirary. In other words, it is not necessary to predict which variale has the risk of overflow or underflow in floating-point (FLP) arithmetic, or to estimate how large or how small the result could e, if the FLP representale range is to e exceeded. When the desired operations in a program are supported y this C++ implementation, all a programmer needs to do is to simply replace the data type doule with type SLI for all real numer variales. The maority of this paper will discuss the design of the hyrid numer representation scheme, and the algorithms to perform arithmetic operations, as well as a few implementational details of them in C++. A little overview of SLI arithmetic is provided meanwhile. 2 Hyrid Numer Representation The level-index (LI) numer representation is to represent a positive real numer y x, where x, 0 x<, = φ ( x) = () φ ( x ) e, x, and φ is called the generalized exponential function. It follows that x = l + f, where the index f [0,) is given y f = ln(ln(...( ln ))), (2) the natural logarithm eing taken l times. So the level l must e a nonnegative integer. The symmetric level-index system presents a numer in (0, ) y the LI image of its reciprocal. Thus a real numer can e represented y ± r =± φ ( x) = s φ( l + f ), (3) and four pieces of information are needed to store a SLI numer -- numer sign s, level l, index f, and reciprocal sign r.

2 Proceedings of the 6th WSEAS Int. Conf. on Systems Theory & Scientific Computation, Elounda, Greece, August 2-23, 2006 (pp0-08) SLI numer representation has an essentially infinite representale numer range. It is sufficient to allocate ust 3 its to the level when working to any conceivale implemented precision, and the four asic arithmetic operations would e closed in the finite numer set of SLI representation. The details of LI and SLI numer representation and their algorithms for arithmetic operations are descried in [2], [4], [3], [], and [7]. It is not surprising that to perform arithmetic operations would e more complicated in the SLI system than in FLP arithmetic. Accordingly a hyrid system is proposed in [8] to take the advantages of oth SLI arithmetic and FLP arithmetic. If the magnitude of a numer is within a certain range, [2-5, 2 5 ] for example, the numer is represented in the IEEE standard form [5]. SLI numer representation is used otherwise. In this hyrid system, a doule precision numer can e packed into a 64-it word. See [8] for a possile representation scheme in a potential hardware implementation. However, it is not efficient to program this scheme in C++. We implemented the hyrid numer representation using a structure of total length of 70 its, as illustrated in Fig.. Note a SLI numer in this hyrid system is at 5 least level 4, since φ ( 4.57) 2. yte 8 ytes it field of length 3: 0: indicates an FLP numer; 4~7: the level l of an SLI numer. it field: numer sign s for SLI. it field: reciprocal sign r for SLI. not used doule: the value of an FLP numer; or the index f of an SLI numer. Fig. : SLI-FLP hyrid numer representation implemented in C++ This way no it manipulations are required, and the software implementation can run faster, with the tradeoff of a little extra space complexity. 3 Algorithms for Arithmetic Operations The algorithms implemented are ased on the modified algorithms for SLI arithmetic operations descried in []. Those modifications allow more parallel implementations in a potential hardware design. With a small change of initial calculations which will e descried later, the modified algorithms also enefit a software implementation. There are a few maor modifications to the algorithms in [], including the treatments of hyrid numer representation, and an approximation method ased on Taylor expansions for the algorithm of addition/sutraction. 3. Algorithm for Addition/Sutraction The addition/sutraction prolem is to solve the equation rz r r Z = sz φ ( z) = s φ( x) ± sφ( = ± (4) for s Z, r Z, z given s, s, r, r, x, y. We may assume r r φ( x ) φ( (or ) without losing generality. In the hyrid system, different paths of the algorithm will e executed for operands in different ranges. The figure elow displays which path would e chosen according to the larger magnitude operand in the addition/sutraction algorithm. pure FLP addition or sutraction pure SLI or mixed SLI-FLP, using Taylor approximation, or full algorithm φ (.0) φ(4.57) φ(5.84) E+2 trivial addition or sutraction Fig. 2: Domain decomposition of the algorithm for addition/sutraction in the hyrid system, when the larger magnitude operand satisfies > The domain decomposition is almost symmetric aout φ (.0) noticing φ (.0) = = φ(.0). So it is only necessary to show the numer line for >. Both SLI and FLP numers are used to denote magnitudes in the numer line. Notice a doule precision FLP numer can only reach 2 024, which is aout φ (4.632). The algorithm path in the second sudomain is most complex, and can not e shown in a single illustration. Figures of finer domain decomposition can e found in [7] and [8]. Trivial arithmetic operations are defined as the cases where the operation result equals to the larger magnitude operand. In doule precision arithmetic, addition/sutractions are all trivial except for φ( x) φ( x) if φ( x ) φ( ), so Z = and the algorithm is complete. The most eneficial modification in the algorithm is to adopt FLP arithmetic operations. A pure FLP addition or sutraction will e performed, if oth the

3 Proceedings of the 6th WSEAS Int. Conf. on Systems Theory & Scientific Computation, Elounda, Greece, August 2-23, 2006 (pp0-08) operands are within the reduced FLP range [2-5, 2 5 ]. It will e much faster than a pure SLI operation in any conceivale software implementations. If the larger magnitude operand is a FLP numer and the other operand is a SLI numer, it is safe to convert the SLI operand into FLP form and do a pure FLP operation. But for the other SLI-FLP mixed case, the SLI algorithm needs to e performed. The modified full algorithms are ased on computing sequences defined y a = / φ( x ); c = / φ( y ); = φ( z ) / φ( x ). (5) Assuming s = s = in equation (4) for simplicity, we give the full algorithm for SLI addition or sutraction, which is modified from [] as follows. Algorithm : Modified full SLI addition/sutraction of positive arguments for nontrivial cases Input (r, x), (r, r where r φ( x ) φ( and l, l 2. large= ( r == r == ); Initialize Booleans mixed = ( r! = r small = ( r r Z = r. Compute = exp( f ), a l = al = exp( / a ) ( = l = exp( f = exp( / ) ( = l a exp large a, a+ d = exp, mixed a a exp, small a c= ± d c= + r a ln c < l ), == r,...,2); );,...,2); == ). while and c a = +, c = + a ln c if c< a then z = + c / a, go to Output = l, h= f + ln c while h = +, h= ln h z = + h Output (r Z, z) Operator ± is denoted to compute the initial value of the c-sequence. It means that + is used for addition and - is used for sutraction. The computation of sequences in this algorithm is mathematically ut not numerically equivalent to what is defined in []. In order to avoid possile overflow/underflow prolems when generating the c-sequence with FLP internal operations, the initial value of the c-sequence is calculated in a different way. The new definition of the c-sequence is also more efficient to compute in a software implementation, y saving one exponential function evaluation. The tradeoff is that it requires oth operands to e at least level 2. But this will not e a prolem in the hyrid system, since then all SLI numers start from level 4. Another saving is that the flipover cases are all avoided. A flipover addition is defined as the case where the reciprocal sign of the larger addend is changed after a SLI addition. But any two SLI numers with different reciprocal signs are sufficiently distant in this hyrid system to avoid flipover additions, considering the limited precision of a 64-it numer representation. Algorithm is the full algorithm for pure SLI addition or sutractions. As shown in Fig. 2, the algorithm will e considered when the larger magnitude operand satisfies = s r x φ( x) and 2 5 < φ ( x ) < φ(5.84). There can e two simple variations for the algorithm, depending on the magnitude of the other operand. When is represented as a FLP numer in this hyrid system, it is not necessary to compute the -sequence. Notice only, the last value in the sequence, is useful in the later computations. It is possile to skip generating the -sequence in the SLI-FLP mixed case, y redefining d = exp( / a) (6) and performing a large addition in the rest of the algorithm. This variation can e easily verified according to the sequence definitions in (5). When has a magnitude sufficiently smaller than, the Taylor approximation scheme (see [7] for details) is applicale and the computation of the c-sequence can e avoided. In this particular implementation, a linear interpolation is performed for each addition or sutraction to decide if the first order Taylor approximation method is useful. If it is, calculate

4 Proceedings of the 6th WSEAS Int. Conf. on Systems Theory & Scientific Computation, Elounda, Greece, August 2-23, 2006 (pp0-08) d, large or mixed ε = a a... 2 al (7) d /( d+ ), small and output ( r, x± ε ). The approximation of ε is ased on a different expression than in [7], ecause the original full algorithm is used in [7], while the modified algorithm is adapted in this paper. However, the formula deduction of ε is very similar. 3.2 Error Bounds in Implementation Since all the internal operations are performed in standard doule precision FLP arithmetic, the error of the implemented SLI arithmetic operations is larger than what is predicted similarly as in [4]. When performing an SLI addition, we assume that the sequence {a } is stored with asolute precision γ while all the other quantities are stored to asolute precisionγ. Let δz represent the error of z caused y inherent errors δ x in x and δ y in y. As stated in [4], δ z in a large addition satisfies δz c + γ l Z (8) (2ρ+ 2) γ + (/ e lnγ ) ρλγ where ρ= + / φ' () + / φ'(2) (9) and e λ = ( 4+ e ) e (0) On replacing ρ, λ and e y their numerical values, the result reduces to δz 6.784γ + ( lnγ ) γ () Due to the restriction of FLP arithmetic, the internal operations in this software implementation have the precision of Sustituting othγ andγ with 2-52 in (), we computed the error δ z in a large addition is ounded y approximately , and similar error ounds can e otained for mixed and small cases. The largest 4 among the error ounds is , which would e acceptale for most computations. Although the aove error analysis is ased on the full algorithm for pure SLI addition, the error ounds also work for the variations of the algorithm. The SLI-FLP mixed case is expected to have a etter precision since the roundoff error in generating the -sequence is avoided. The Taylor approximation is deemed to e applicale only when its result perfectly matches the result of the full algorithm at the expected precision level, so the approximation method does not introduce any further error to the implementation. Sutractions in this implementation have similar errors, unless cancellations occur. The correctness testing in section 4 supports the error analysis in this section. 3.3 Algorithm for Multiplication/Division The domain decomposition of multiplication/division is similar to the one for addition/sutraction, except that trivial cases start from a different numer. The threshold is aout φ( 6.839) for multiplication/ division in doule precision SLI arithmetic. The full algorithm for multiplication or division is also modified from []. But note here φ( x) φ( r instead of r φ( x ) φ( is required for a pure SLI multiplication/division. Algorithm 2: Modified full SLI multiplication/ division of positive arguments for nontrivial cases Input (r, x), (r, where φ( x) φ( and l, l 3. Initialize Booleans large, mixed, small, r Z = r. Compute = exp( f ), a l al = exp( / a = exp( f ), = exp( / ) ( = l a2 ± exp a22 c = a2 m exp a22 c= ± a ln c 2 ) ( = l 2 2,,,...,3);,...,3); large or small mixed = 2 while < l and c a = +, c = + a ln c if c< a then if = 2 and c < exp( / a2 ) then z = + c / exp( / a2 ), go to Output else z = + c / a, go to Output = l, h= f + ln c while h = +, h= ln h z = + h Output (r Z, z)

5 Proceedings of the 6th WSEAS Int. Conf. on Systems Theory & Scientific Computation, Elounda, Greece, August 2-23, 2006 (pp0-08) When a ± operation appears in this algorithm, + should e used for multiplication and - would e used for division. This algorithm can also have variations to make it run faster for some special cases. However, the Taylor approximation method is not very helpful for multiplication/division, since its applicale domain is very limited. The SLI-FLP mixed case can still simplify the prolem. We first swap with if the leading operand is an FLP numer. Then the value of c can e computed y ± exp( / a2 ) ln, largeor mixed c = (2) m exp( / a2 ) ln, small Again the -sequence is not needed. The multiplication/division algorithm is expected to have similar error as the addition algorithm, unless cancellations happen. 3.4 Algorithm for Powering Operation It is possile to derive a similar algorithm for powering operation, ut there would e many special cases to consider. So the powering operation was implemented y calling the suroutine of multiplication. For example, if φ ( φ ( z) = φ( x), (3) taking logarithms of oth sides of the equation, we will get φ( z ) = φ( x ) φ(. (4) So the large case of powering prolem ecomes a multiplication prolem at different levels. However, a separate powering algorithm could e marginally faster ecause of the saving of extra function calls. 4 Testing One important purpose of this software implementation is to promote the use of SLI arithmetic in practical scientific computation, so the correctness and the performance of the program are oth critical. A systematic testing procedure was designed and executed, so that we can ensure the usefulness of the implementation y providing the testing results. 4. Correctness Testing We are not ale to directly test the correctness of this SLI-FLP hyrid system. It is easy to verify the cases where FLP arithmetic operations are performed, ut it will e hard to tell if the results are correct for numers that exceed the doule precision FLP representale range, especially for cases using the Taylor approximation method. So our testing egan from the pure SLI system using only the full original algorithm introduced in [4]. The original algorithm is identical to the modified algorithm in [] except for the definitions of the -sequence. But there are fewer restrictions that are needed for a pure SLI system using FLP internal operations. We may compare the results from pure SLI arithmetic with the ones from FLP arithmetic if the magnitudes of testing data are ounded, so that the operations will not cause overflow or underflow in FLP arithmetic. A large numer of such tests are ale to cover all ranches of the algorithm. If the implementation gives correct results for all tests in the FLP range, we may reason that the algorithm remains correct for numers that exceed this range, ecause all cases in the pure SLI system are essentially the same computation at different levels. Next we can test the hyrid arithmetic ased on the pure SLI system. The agreement of their results in arithmetic operations is enough to conclude the correctness of the implementation of the hyrid system. To test the pure SLI arithmetic using only the full original algorithm, the testing cases were chosen oth y hand and y a random numer generator. 0,000 pairs of random operands with a log-normal distriution in magnitudes, as shown in Fig. 3, were generated for the testing of the four asic arithmetic operations. The log-normal distriution is the est choice for the testing cases among the well known distriutions, ecause the testing needs to cover a range of doule precision FLP numers as large as possile, ut at the same time, sufficient testing cases need to e picked around, in order to test all the three flipover cases which appear infrequently. Fig. 3: Cumulative distriution of the correctness testing data for asic arithmetic operations in the pure SLI system

6 Proceedings of the 6th WSEAS Int. Conf. on Systems Theory & Scientific Computation, Elounda, Greece, August 2-23, 2006 (pp0-08) The random operands for testing the powering operation could e generated similarly. But FLP overflow/underflow happens more frequently in powering than in the asic arithmetic operations, so the numer range of the testale cases is very limited, and a normal distriution is used instead. A testing tool in LINU called GCOV is used to verify the coverage of all ranches of the algorithm. When some cases with a true zero in operations are manually added, every line in the arithmetic operation suroutines is covered in testing. We claim a test successful if the result in SLI arithmetic and the result in FLP arithmetic differ y no more than a small tolerance. According to the error ounds predicted in Section 3.2, a tolerance of is used in the index. The FLP result of an operation is converted into an SLI numer, and its index is compared with the index of the SLI result, in the situation that oth results have the same level in SLI forms. 4 Using the tolerance , all tests of addition/sutraction were successful. A few tests 4 would fail if a smaller tolerance such as 2 0 is used. The results verified the error ounds predicted in section 2. Almost all the tests of multiplication/division and powering operation succeeded with the same error tolerance. A few exceptions were oserved, since cancellations occur more often in multiplications and divisions, with the log-normal distriuted testing data. Fig. 4: Cumulative distriution of the correctness testing data for arithmetic operations in the SLI-FLP hyrid system Next we tested the implementation of the hyrid system. The random numer generator can now work with SLI numers to get a proper distriution of testing data, and the uniform distriution, as shown in Fig. 4, works well for the testing of all arithmetic operations, including powering. Note the signs of the horizontal coordinates denote for the reciprocal signs of SLI numers instead of numer signs. The reason for having a horizontal line segment in the center is that φ (.0) = / φ(.0), and the length of this line segment is zero in SLI arithmetic. For the hyrid system, we have tested 0,000 pairs of random operands following a uniform distriution in magnitude, plus a few special cases manually added. All ranches of the algorithm were tested, and the results matched the ones from FLP arithmetic or from the well tested pure SLI system. Hence we conclude that to perform arithmetic operations in this SLI-FLP hyrid system is reliale. 4.2 Performance Testing In order to evaluate the performance, the time costs of performing arithmetic operations in the SLI implementation will e compared to the costs in FLP arithmetic. However, the SLI arithmetic was programmed in C++ as a class, and has a lot of overhead in running time, while the FLP arithmetic was uilt in chips. The results of a direct comparison will not reflect the efficiency difference etween their algorithms. An FLP class was then programmed to make the comparison fairer. In this performance comparison we still run the functions defined y ANSI C++ to do FLP arithmetic operations, ut all the operations are now encapsulated into a class, in order to add similar overhead to FLP computations as the ones SLI arithmetic has in the software implementation. Note the comparison is not yet fair for SLI arithmetic, since the logical structure of the algorithm cannot e efficiently programmed in a high level language. The performance testing was done for four types of arithmetic operations -- addition/sutraction, multiplication, division and powering. 0,000 random numers were generated as operands, and each operation etween any two numers was repeated thousands of times for a more accurate comparison. Because the hyrid system uses different algorithms to perform arithmetic operations for operands in different numer ranges, we made three tests with different sets of testing data. All three sets of data follow a uniform distriution in SLI representation, ut with various numer ranges as shown in Tale. The numer range specified in the tale is only for those greater or equal to. If a numer is etween 0 and, it must e within the reciprocal of the corresponding range. For example, must e within 022 (2,) in data set. There are negative numers

7 Proceedings of the 6th WSEAS Int. Conf. on Systems Theory & Scientific Computation, Elounda, Greece, August 2-23, 2006 (pp0-08) Tale : Properties of data sets used in performance testing Data set Numer range (for those. 0 ) Operands in FLP over/underflow Results in FLP over/underflow (,2 ) 0% 3.3% 2 ( φ (4.6322), φ(7.0)) 00% 00% 3 (, φ (7.0)) 39.09% 50.05% as well, and their asolute values fall in the same numer ranges. Data set contains only numers in the doule precision FLP representale range. However, it is possile that the results of arithmetic operations overflow or underflow in FLP arithmetic, especially in powering operations. The performance of the implementation in this numer range is our maor concern, since most practical computations are still in this range. The time costs of other operations in different systems are shown in the following tale, providing that an FLP addition/sutraction costs one time unit. The experiments were performed using a desktop with a 3GHz Pentium 4 CPU. Tale 2: Time comparison for operands in doule precision FLP range, normalized with respect to FLP addition Operation FLP SLI hyrid +(-) * / The pure SLI system used in comparison is implemented ased on the original algorithm without the Taylor approximation method. The results in Tale 2 clearly show that the hyrid system enefits a lot from using FLP arithmetic in an appropriate numer range. The hyrid system costs less than five times the FLP arithmetic does. The cost ratio will e even etter in practice, since a real life prolem usually spends a large portion of time on operations other than real numer computations. See [8] for an example. Tale 3: Time comparison for operands eyond FLP range, normalized with respect to FLP addition Operation FLP SLI hyrid +(-) * / Data set 2 contains numers eyond doule precision FLP range. In this numer range we may tell how the Taylor approximation scheme and the other modifications to the algorithm enefit the performance of SLI arithmetic operations. The time comparisons are displayed in Tale 3. Note that the FLP results are all exceptions (0, Inf or NaN), so the times indicated do not reflect meaningful results. Data set 3 is used to evaluate the overall performance of the hyrid system, so oth FLP numers and SLI numers are included. Tale 4: Time comparison for operands uniformly distriuted in the hyrid numer representale range, normalized with respect to FLP addition Operation FLP SLI hyrid +(-) * / In Tale 4, the hyrid system clearly shows its advantage over the pure SLI system without the Taylor approximation scheme. The overall performance is almost douled for most operations. Although the FLP arithmetic is still much faster, it does not always give desirale results. As shown in Tale, 39% of numers and 50% of operations overflow or underflow in FLP arithmetic for this data set. The performance testing shows that the hyrid system works much faster than a pure SLI system, and its performance is acceptale even compared with a pure FLP system, when a comparison is appropriate. 5 Conclusion The software implementation of SLI-FLP hyrid arithmetic descried in this paper is roust and ready to e used in practical computations. The numer representation scheme and the algorithms for arithmetic operations were all modified, with the goal of eing efficiently implemented using a high level computer language. In order to ensure the reliaility and efficiency of the implementation, oth correctness testing and performance testing were carefully designed and executed. With acceptale efficiency, this C++ lirary can expediently help mathematicians, engineers and

8 Proceedings of the 6th WSEAS Int. Conf. on Systems Theory & Scientific Computation, Elounda, Greece, August 2-23, 2006 (pp0-08) programmers to control overflow and underflow prolems in computing. We hope the implementation also help to motivate further research on SLI arithmetic, y ringing it to the interest of more people who need its advantages. References: [] M.A. Anuta, D.W. Lozier, N. Schaanel & P.R. Turner, Basic Linear Algera Operations in SLI Arithmetic, Computing and Applied Mathematics Laoratory (Applied and Computational Mathematics Division), NIST Report, NISTIR58, 996. [2] C.W. Clenshaw & F.W.J. Olver, Level-index Arithmetic Operations, SIAM J. Numer. Anal. 24, 987, [3] C.W. Clenshaw, F.W.J. Olver & P. R. Turner, Level-Index Arithmetic: An Introductory Survey, Numerical Analysis and Parallel Processing (P.R. Turner, ed.), Springer-Verlag, Berlin, 989, [4] C.W. Clenshaw & P.R. Turner, The Symmetric Level-Index System, IMA J. Numer. Anal. 8, 988, [5] IEEE 754/854, IEEE Standard for Floating Point Arithmetic, ANSI/IEEE Std. Vols 754/854, IEEE, New ork. [6] D.W. Lozier & P.R. Turner, Symmetric Level Index Arithmetic in Simulation and Modeling, J. Res. Natl. Inst. Stand. Technol. 97, 992, [7]. Shen & P.R. Turner, Taylor Approximation for Symmetric Level-Index Arithmetic Processing, IMA J. Numer. Anal.26, 2006, [8]. Shen & P.R. Turner, A Hyrid Numer Representation Scheme Based on Symmetric Level-Index Arithmetic, CSC'06 (WORLDCOMP'06), CSREA Press, Las Vegas, 2006, [9] P.R. Turner, A Software Implementation of SLI Arithmetic, Proc. ARITH9, IEEE Computer Society, Washington DC, 989, 8-24.

G Force Tolerance Sample Solution

G Force Tolerance Sample Solution G Force Tolerance Sample Solution Introduction When different forces are applied to an oject, G-Force is a term used to descrie the resulting acceleration, and is in relation to acceleration due to gravity(g).

More information

Recent Results from Analyzing the Performance of Heuristic Search

Recent Results from Analyzing the Performance of Heuristic Search Recent Results from Analyzing the Performance of Heuristic Search Teresa M. Breyer and Richard E. Korf Computer Science Department University of California, Los Angeles Los Angeles, CA 90095 {treyer,korf}@cs.ucla.edu

More information

CS321 Introduction To Numerical Methods

CS321 Introduction To Numerical Methods CS3 Introduction To Numerical Methods Fuhua (Frank) Cheng Department of Computer Science University of Kentucky Lexington KY 456-46 - - Table of Contents Errors and Number Representations 3 Error Types

More information

/06/$20.00 c 2006 IEEE I. INTRODUCTION

/06/$20.00 c 2006 IEEE I. INTRODUCTION Scalale Router Memory Architecture Based on Interleaved DRAM Feng Wang and Mounir Hamdi Computer Science Department of The Hong Kong University of Science and Technology {fwang, hamdi}@cs.ust.hk Astract

More information

2 Computation with Floating-Point Numbers

2 Computation with Floating-Point Numbers 2 Computation with Floating-Point Numbers 2.1 Floating-Point Representation The notion of real numbers in mathematics is convenient for hand computations and formula manipulations. However, real numbers

More information

2 Computation with Floating-Point Numbers

2 Computation with Floating-Point Numbers 2 Computation with Floating-Point Numbers 2.1 Floating-Point Representation The notion of real numbers in mathematics is convenient for hand computations and formula manipulations. However, real numbers

More information

Table : IEEE Single Format ± a a 2 a 3 :::a 8 b b 2 b 3 :::b 23 If exponent bitstring a :::a 8 is Then numerical value represented is ( ) 2 = (

Table : IEEE Single Format ± a a 2 a 3 :::a 8 b b 2 b 3 :::b 23 If exponent bitstring a :::a 8 is Then numerical value represented is ( ) 2 = ( Floating Point Numbers in Java by Michael L. Overton Virtually all modern computers follow the IEEE 2 floating point standard in their representation of floating point numbers. The Java programming language

More information

Introduction to Machine Learning Spring 2018 Note Sparsity and LASSO. 1.1 Sparsity for SVMs

Introduction to Machine Learning Spring 2018 Note Sparsity and LASSO. 1.1 Sparsity for SVMs CS 189 Introduction to Machine Learning Spring 2018 Note 21 1 Sparsity and LASSO 1.1 Sparsity for SVMs Recall the oective function of the soft-margin SVM prolem: w,ξ 1 2 w 2 + C Note that if a point x

More information

Analyzing the Performance of Pattern Database Heuristics

Analyzing the Performance of Pattern Database Heuristics Analyzing the Performance of Pattern Dataase Heuristics Richard E. Korf Computer Science Department University of California, Los Angeles Los Angeles, CA 90095 korf@cs.ucla.edu Astract We introduce a model

More information

Comp Online Algorithms

Comp Online Algorithms Comp 7720 - Online Algorithms Assignment 1: Introduction, Searching & List Update Shahin Kamalli University of Manitoa - Fall 2018 Due: Thursday, Octoer 4th at 11:59 pm Octoer 29, 2018 The real prolem

More information

Math 340 Fall 2014, Victor Matveev. Binary system, round-off errors, loss of significance, and double precision accuracy.

Math 340 Fall 2014, Victor Matveev. Binary system, round-off errors, loss of significance, and double precision accuracy. Math 340 Fall 2014, Victor Matveev Binary system, round-off errors, loss of significance, and double precision accuracy. 1. Bits and the binary number system A bit is one digit in a binary representation

More information

Formal verification of IA-64 division algorithms

Formal verification of IA-64 division algorithms Formal verification of IA-64 division algorithms John Harrison Intel Corporation, EY2-03 5200 NE Elam Young Parkway Hillsoro, OR 97124, USA Astract. The IA-64 architecture defers floating point and integer

More information

Theory of Integers. CS389L: Automated Logical Reasoning. Lecture 13: The Omega Test. Overview of Techniques. Geometric Description

Theory of Integers. CS389L: Automated Logical Reasoning. Lecture 13: The Omega Test. Overview of Techniques. Geometric Description Theory of ntegers This lecture: Decision procedure for qff theory of integers CS389L: Automated Logical Reasoning Lecture 13: The Omega Test şıl Dillig As in previous two lectures, we ll consider T Z formulas

More information

The Codesign Challenge

The Codesign Challenge ECE 45: Hardware/Software Codesign Codesign Challenge Fall 21 The Codesign Challenge Ojectives In the codesign challenge, your task is to accelerate a given software reference implementation as much as

More information

MAT128A: Numerical Analysis Lecture Two: Finite Precision Arithmetic

MAT128A: Numerical Analysis Lecture Two: Finite Precision Arithmetic MAT128A: Numerical Analysis Lecture Two: Finite Precision Arithmetic September 28, 2018 Lecture 1 September 28, 2018 1 / 25 Floating point arithmetic Computers use finite strings of binary digits to represent

More information

Array Dependence Analysis as Integer Constraints. Array Dependence Analysis Example. Array Dependence Analysis as Integer Constraints, cont

Array Dependence Analysis as Integer Constraints. Array Dependence Analysis Example. Array Dependence Analysis as Integer Constraints, cont Theory of Integers CS389L: Automated Logical Reasoning Omega Test Işıl Dillig Earlier, we talked aout the theory of integers T Z Signature of T Z : Σ Z : {..., 2, 1, 0, 1, 2,..., 3, 2, 2, 3,..., +,, =,

More information

Two Kinds of Golden Triangles, Generalized to Match Continued Fractions

Two Kinds of Golden Triangles, Generalized to Match Continued Fractions Journal for Geometry and Graphics Volume (2007), No. 2, 65 7. Two Kinds of Golden Triangles, Generalized to Match Continued Fractions Clark Kimerling Department of Mathematics, University of Evansville

More information

Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks

Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks Main text appears in A. H. Chan, V. Gligor (Eds.): Information Security ISC 2002, Springer-Verlag LNCS 2433, pp. 402 413, ISBN 3-540-44270-7. Notes added 2002-10-16. Parallelizale Elliptic Curve Point

More information

Floating-Point Numbers in Digital Computers

Floating-Point Numbers in Digital Computers POLYTECHNIC UNIVERSITY Department of Computer and Information Science Floating-Point Numbers in Digital Computers K. Ming Leung Abstract: We explain how floating-point numbers are represented and stored

More information

Misbehavior and MAC Friendliness in CSMA Networks

Misbehavior and MAC Friendliness in CSMA Networks Misehavior and MAC Friendliness in CSMA Networks Zhefu Shi, Cory Beard, Ken Mitchell, University of Missouri-Kansas City Contact: eardc@umkcedu Astract Nodes using standardized, contention-ased CSMA protocols

More information

Mathematical preliminaries and error analysis

Mathematical preliminaries and error analysis Mathematical preliminaries and error analysis Tsung-Ming Huang Department of Mathematics National Taiwan Normal University, Taiwan August 28, 2011 Outline 1 Round-off errors and computer arithmetic IEEE

More information

Floating-Point Numbers in Digital Computers

Floating-Point Numbers in Digital Computers POLYTECHNIC UNIVERSITY Department of Computer and Information Science Floating-Point Numbers in Digital Computers K. Ming Leung Abstract: We explain how floating-point numbers are represented and stored

More information

A Graph-Based Web Usage Mining Considering Page Browsing Time

A Graph-Based Web Usage Mining Considering Page Browsing Time A Graph-Based We Usage Mining Considering Page Browsing Time Koichiro Mihara Masahiro Terae Kazuo Hashimoto Graduate School of Information Sciences, TOHOKU University {mihara, terae, kh}@aiet.ecei.tohoku.ac.jp

More information

Floating-point representation

Floating-point representation Lecture 3-4: Floating-point representation and arithmetic Floating-point representation The notion of real numbers in mathematics is convenient for hand computations and formula manipulations. However,

More information

Computational Mathematics: Models, Methods and Analysis. Zhilin Li

Computational Mathematics: Models, Methods and Analysis. Zhilin Li Computational Mathematics: Models, Methods and Analysis Zhilin Li Chapter 1 Introduction Why is this course important (motivations)? What is the role of this class in the problem solving process using

More information

Data-analysis problems of interest

Data-analysis problems of interest Introduction 3 Data-analysis prolems of interest. Build computational classification models (or classifiers ) that assign patients/samples into two or more classes. - Classifiers can e used for diagnosis,

More information

Gybeh' c.s 9 Springer-Verlag 1993

Gybeh' c.s 9 Springer-Verlag 1993 Biol. yern. 69, 345-351 (1993) Blogr =- Gyeh' c.s 9 Springer-Verlag 1993 Solution of the direct and inverse kinematic prolems y a common algorithm ased on the mean of multiple computations H. ruse, U.

More information

Name Class Date. Quadratic Functions and Transformations

Name Class Date. Quadratic Functions and Transformations 4-1 Reteaching Parent Quadratic Function The parent quadratic function is y = x. Sustitute 0 for x in the function to get y = 0. The vertex of the parent quadratic function is (0, 0). A few points near

More information

Bindel, Fall 2016 Matrix Computations (CS 6210) Notes for

Bindel, Fall 2016 Matrix Computations (CS 6210) Notes for 1 Logistics Notes for 2016-09-07 1. We are still at 50. If you are still waiting and are not interested in knowing if a slot frees up, let me know. 2. There is a correction to HW 1, problem 4; the condition

More information

Basics of Computation. PHY 604:Computational Methods in Physics and Astrophysics II

Basics of Computation. PHY 604:Computational Methods in Physics and Astrophysics II Basics of Computation Basics of Computation Computers store information and allow us to operate on it. That's basically it. Computers have finite memory, so it is not possible to store the infinite range

More information

Introduction to MATLAB

Introduction to MATLAB Chapter 1 Introduction to MATLAB MATLAB Matrix Laoratory A special-purpose program optimized to perform engineering and scientific calculations Chapter M1: Introduction to MATLAB 1 MATLAB Integrated development

More information

Truncation Errors. Applied Numerical Methods with MATLAB for Engineers and Scientists, 2nd ed., Steven C. Chapra, McGraw Hill, 2008, Ch. 4.

Truncation Errors. Applied Numerical Methods with MATLAB for Engineers and Scientists, 2nd ed., Steven C. Chapra, McGraw Hill, 2008, Ch. 4. Chapter 4: Roundoff and Truncation Errors Applied Numerical Methods with MATLAB for Engineers and Scientists, 2nd ed., Steven C. Chapra, McGraw Hill, 2008, Ch. 4. 1 Outline Errors Accuracy and Precision

More information

Binary Decision Diagrams (BDDs) Pingqiang Zhou ShanghaiTech University

Binary Decision Diagrams (BDDs) Pingqiang Zhou ShanghaiTech University Binary Decision Diagrams (BDDs) Pingqiang Zhou ShanghaiTech University Computational Boolean Algera Representations Applying unate recursive paradigm (URP) in solving tautology is a great warm up example.

More information

Review of Calculus, cont d

Review of Calculus, cont d Jim Lambers MAT 460/560 Fall Semester 2009-10 Lecture 4 Notes These notes correspond to Sections 1.1 1.2 in the text. Review of Calculus, cont d Taylor s Theorem, cont d We conclude our discussion of Taylor

More information

SolarCode: Utilizing Erasure Codes for Reliable Data Delivery in Solar-powered Wireless Sensor Networks

SolarCode: Utilizing Erasure Codes for Reliable Data Delivery in Solar-powered Wireless Sensor Networks This full text paper was peer reviewed at the direction of IEEE Communications Society suject matter experts for pulication in the IEEE INFOCOM 2 proceedings This paper was presented as part of the Mini-Conference

More information

y ax bx c y a x h 2 Math 11 Pre-Cal Quadratics Review

y ax bx c y a x h 2 Math 11 Pre-Cal Quadratics Review Math 11 Pre-Cal Quadratics Review A quadratic function can e descried as y ax x c (or equivalent forms, see elow). There are an infinite numer of solutions (x,y pairs) to a quadratic function. If we plot

More information

DCloud: Deadline-aware Resource Allocation for Cloud Computing Jobs

DCloud: Deadline-aware Resource Allocation for Cloud Computing Jobs : Deadline-aware Resource Allocation for Cloud Computing Jos Dan Li, Congjie Chen, Junjie Guan, Ying Zhang, Jing Zhu, Ruozhou Yu Tsinghua University HP Las Astract With the tremendous growth of cloud computing,

More information

OCR J276 GCSE Computer Science

OCR J276 GCSE Computer Science Name: Class Teacher: Date: OCR J76 GCSE Computer Science MARK SCHEME.6 DATA REPRESENTATION Content in J76 GCSE Computer Science: 1.1 Systems Architecture 1. Memory 1.3 Storage 1.4 Wireless and Wired Networks

More information

Review Questions 26 CHAPTER 1. SCIENTIFIC COMPUTING

Review Questions 26 CHAPTER 1. SCIENTIFIC COMPUTING 26 CHAPTER 1. SCIENTIFIC COMPUTING amples. The IEEE floating-point standard can be found in [131]. A useful tutorial on floating-point arithmetic and the IEEE standard is [97]. Although it is no substitute

More information

Most nonzero floating-point numbers are normalized. This means they can be expressed as. x = ±(1 + f) 2 e. 0 f < 1

Most nonzero floating-point numbers are normalized. This means they can be expressed as. x = ±(1 + f) 2 e. 0 f < 1 Floating-Point Arithmetic Numerical Analysis uses floating-point arithmetic, but it is just one tool in numerical computation. There is an impression that floating point arithmetic is unpredictable and

More information

Calculation Enhancement of Chebyshev Polynomial over Z p ABSTRACT

Calculation Enhancement of Chebyshev Polynomial over Z p ABSTRACT Malaysian Journal of Mathematical Sciences 7(S): 131-143 (2013) Special Issue: The 3 rd International Conference on Cryptology & Computer Security 2012 (CRYPTOLOGY2012) MALAYSIAN JOURNAL OF MATHEMATICAL

More information

1. GRAPHS OF THE SINE AND COSINE FUNCTIONS

1. GRAPHS OF THE SINE AND COSINE FUNCTIONS GRAPHS OF THE CIRCULAR FUNCTIONS 1. GRAPHS OF THE SINE AND COSINE FUNCTIONS PERIODIC FUNCTION A period function is a function f such that f ( x) f ( x np) for every real numer x in the domain of f every

More information

ANSI: A swarm intelligence-based unicast routing protocol for hybrid ad hoc networks q,qq

ANSI: A swarm intelligence-based unicast routing protocol for hybrid ad hoc networks q,qq Journal of Systems Architecture xxx (6) xxx xxx www.elsevier.com/locate/sysarc : A swarm intelligence-ased unicast routing protocol for hyrid ad hoc networks q,qq Sundaram Rajagopalan *, Chien-Chung Shen

More information

Pedestrian Detection Using Structured SVM

Pedestrian Detection Using Structured SVM Pedestrian Detection Using Structured SVM Wonhui Kim Stanford University Department of Electrical Engineering wonhui@stanford.edu Seungmin Lee Stanford University Department of Electrical Engineering smlee729@stanford.edu.

More information

- Introduction P. Danziger. Linear Algebra. Algebra Manipulation, Solution or Transformation

- Introduction P. Danziger. Linear Algebra. Algebra Manipulation, Solution or Transformation Linear Algera Linear of line or line like Algera Manipulation, Solution or Transformation Thus Linear Algera is aout the Manipulation, Solution and Transformation of line like ojects. We will also investigate

More information

1 Model checking and equivalence checking

1 Model checking and equivalence checking 978--52-85972- - Practical Design Verification Model checking and equivalence checking Masahiro Fujita. Introduction Owing to the advances in semiconductor technology, a large and complex system that has

More information

Real-Time Median Filtering for Embedded Smart Cameras

Real-Time Median Filtering for Embedded Smart Cameras Real-Time Median Filtering for Emedded Smart Cameras Yong Zhao Brown University Yong Zhao@rown.edu Gariel Tauin Brown University tauin@rown.edu Figure 1: System architecture of our proof-of-concept Visual

More information

Multi Objective Reconfiguration of Distribution Networks with the Objective to Reduce Losses and Improving Power Quality Parameters

Multi Objective Reconfiguration of Distribution Networks with the Objective to Reduce Losses and Improving Power Quality Parameters Applied mathematics in Engineering, Management and Technology 2 (5) 214:177-183 www.amiemt-journal.com Multi Ojective Reconfiguration of Distriution Networks with the Ojective to Reduce Losses and Improving

More information

Floating Point Considerations

Floating Point Considerations Chapter 6 Floating Point Considerations In the early days of computing, floating point arithmetic capability was found only in mainframes and supercomputers. Although many microprocessors designed in the

More information

Reverse order Triangular, Trapezoidal and Pentagonal Fuzzy Numbers

Reverse order Triangular, Trapezoidal and Pentagonal Fuzzy Numbers nnals of Pure and pplied Mathematics Vol. 9, No., 205, 07-7 ISSN: 2279-087X (P), 2279-0888(online) Pulished on 20 January 205 www.researchmathsci.org nnals of Reverse order Triangular, Trapezoidal and

More information

PERFORMANCE OF DIFFERENT CALL ADMISSION SCHEMES IN A QOS DIFFSERV DOMAIN

PERFORMANCE OF DIFFERENT CALL ADMISSION SCHEMES IN A QOS DIFFSERV DOMAIN 1 PERFORMANCE OF DIFFERENT CALL ADMISSION SCHEMES IN A QOS DIFFSERV DOMAIN M. Gerla, S. S. Lee y G. Reali, D. D. Sorte z y Computer Science Dept., UCLA Los Angeles, CA, U.S.A. z Dipartimento di Ingegneria

More information

RECONSTRUCTING FINE-SCALE AIR POLLUTION STRUCTURES FROM COARSELY RESOLVED SATELLITE OBSERVATIONS

RECONSTRUCTING FINE-SCALE AIR POLLUTION STRUCTURES FROM COARSELY RESOLVED SATELLITE OBSERVATIONS RECONSTRUCTING FINE-SCALE AIR POLLUTION STRUCTURES FROM COARSELY RESOLVED SATELLITE OBSERVATIONS Dominik Brunner, Daniel Schau, and Brigitte Buchmann Empa, Swiss Federal Laoratories for Materials Testing

More information

A Novel Approach of Area-Efficient FIR Filter Design Using Distributed Arithmetic with Decomposed LUT

A Novel Approach of Area-Efficient FIR Filter Design Using Distributed Arithmetic with Decomposed LUT IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735. Volume 7, Issue 2 (Jul. - Aug. 2013), PP 13-18 A Novel Approach of Area-Efficient FIR Filter

More information

CSE Discrete Structures

CSE Discrete Structures CSE 2315 - Discrete Structures Homework 3- Solution - Fall 2010 Due Date: Oct. 28 2010, 3:30 pm Sets 1. Rewrite the following sets as a list of elements. (8 points) a) {x ( y)(y N x = y 3 x < 30)} {0,

More information

A Floating-Point Fused Dot-Product Unit

A Floating-Point Fused Dot-Product Unit A Floating-Point Fused Dot-Product Unit Hani H. Saleh Earl E. Swartzlander, Jr. Intel Corporation ECE Department 5000 Plaza on the Lake Blvd. University of Texas at Austin Austin, TX 78746 Austin, TX 787

More information

FAST AND ROBUST RECURSIVE FILTER FOR IMAGE DENOISING. Yiheng Chi and Stanley H. Chan

FAST AND ROBUST RECURSIVE FILTER FOR IMAGE DENOISING. Yiheng Chi and Stanley H. Chan FAST AND ROBUST RECURSIVE FILTER FOR IMAGE DENOISING Yiheng Chi and Stanley H. Chan School of ECE and Dept of Statistics, Purdue University, West Lafayette, IN 47907. ABSTRACT Image denoising on moile

More information

VLSI Logic Test, Validation and Verification Lecture 7 Properties & Applications of Binary Decision Diagrams

VLSI Logic Test, Validation and Verification Lecture 7 Properties & Applications of Binary Decision Diagrams VLSI Logic Test, Validation and Verification Lecture 7 Properties & Applications of Binary Decision Diagrams 1 Instructor: Priyank Kalla Department of Electrical and Computer Engineering University of

More information

Caching Policies for In-Network Caching

Caching Policies for In-Network Caching Caching Policies for In-Network Caching Zhe Li, Gwendal Simon, Annie Gravey Institut Mines Telecom - Telecom Bretagne, UMR CNRS 674 IRISA Université Européenne de Bretagne, France {firstname.lastname}@telecom-retagne.eu

More information

General Approach to Modelling Operation Threats and Extreme Weather Hazards Impact on Critical Infrastructure Safety

General Approach to Modelling Operation Threats and Extreme Weather Hazards Impact on Critical Infrastructure Safety Kołowrocki Krzysztof ORCID ID: -2-4836-4976 Journal of Polish Safety and Reliaility Association Summer Safety and Reliaility Seminars, Volume 8, Numer 3, 217 Soszyńska-Budny Joanna ORCID ID: -3-1525-9392

More information

Vertex 3-colorability of claw-free graphs

Vertex 3-colorability of claw-free graphs R u t c o r Research R e p o r t Vertex 3-coloraility of claw-free graphs M. Kamiński a V. Lozin RRR 8 2007, Feruary 2007 RUTCOR Rutgers Center for Operations Research Rutgers University 640 Bartholomew

More information

Hot X: Algebra Exposed

Hot X: Algebra Exposed Hot X: Algera Exposed Solution Guide for Chapter 5 Here are the solutions for the Doing the Math exercises in Hot X: Algera Exposed! (assume that all denominators 0) DTM from p.59 2. Since they have the

More information

6 th Grade Mathematics Instructional Week 25 Develop and Use Formulas to Determine the Volume and Surface Area of Rectangular Prisms Paced Standards:

6 th Grade Mathematics Instructional Week 25 Develop and Use Formulas to Determine the Volume and Surface Area of Rectangular Prisms Paced Standards: 6 th Grade Mathematics Instructional Week 25 Develop and Use Formulas to Determine the Volume and Surface Area of Rectangular Prisms Paced Standards: 6.GM.4: Find the area of complex shapes composed of

More information

Agus Harjoko Lab. Elektronika dan Instrumentasi, FMIPA, Universitas Gadjah Mada, Yogyakarta, Indonesia

Agus Harjoko Lab. Elektronika dan Instrumentasi, FMIPA, Universitas Gadjah Mada, Yogyakarta, Indonesia A Comparison Study of the Performance of the Fourier Transform Based Algorithm and the Artificial Neural Network Based Algorithm in Detecting Faric Texture Defect Agus Harjoko La. Elektronika dan Instrumentasi,

More information

Classes of Real Numbers 1/2. The Real Line

Classes of Real Numbers 1/2. The Real Line Classes of Real Numbers All real numbers can be represented by a line: 1/2 π 1 0 1 2 3 4 real numbers The Real Line { integers rational numbers non-integral fractions irrational numbers Rational numbers

More information

Binary floating point encodings

Binary floating point encodings Week 1: Wednesday, Jan 25 Binary floating point encodings Binary floating point arithmetic is essentially scientific notation. Where in decimal scientific notation we write in floating point, we write

More information

Umbrella : A novel fixed-size DHT protocol

Umbrella : A novel fixed-size DHT protocol Umrella : A novel fixed-size DHT protocol A. D. Sotiriou, P. Kalliaras, P. Papageorgiou, N. Mitrou Computer Network Laoratory, School of Electrical and Computer Engineering National Technical University

More information

T Parallel and Distributed Systems (4 ECTS)

T Parallel and Distributed Systems (4 ECTS) T 79.4301 Parallel and Distriuted Systems (4 ECTS) T 79.4301 Rinnakkaiset ja hajautetut järjestelmät (4 op) Lecture 4 11th of Feruary 2008 Keijo Heljanko Keijo.Heljanko@tkk.fi T 79.4301 Parallel and Distriuted

More information

' After the ZS-1 prototypes were made operational, a new floating

' After the ZS-1 prototypes were made operational, a new floating An Accurate, High Speed Implementation of Division y Reciprocal Approximation D. L. Fowler and J. E. Smith Astronautics Corporation of America 5800 Cottage Grove Rd. Madison, Wisconsin 53716 Astract Newton-Raphson

More information

Computational Economics and Finance

Computational Economics and Finance Computational Economics and Finance Part I: Elementary Concepts of Numerical Analysis Spring 2015 Outline Computer arithmetic Error analysis: Sources of error Error propagation Controlling the error Rates

More information

GSE Third Grade Curriculum Map

GSE Third Grade Curriculum Map GSE Third Grade Curriculum Map Unit 1 Unit 2 Unit 3 Unit 4 Unit 5 Unit 6 Unit 7 Numers and Operations in Base Ten The Relationship Between Multiplication and Division Patterns in Addition and Multiplication

More information

Fair inter-tap routing and backhaul assignment for wireless mesh networks

Fair inter-tap routing and backhaul assignment for wireless mesh networks WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mo. Comput. (2008) Pulished online in Wiley InterScience (www.interscience.wiley.com).629 Fair inter-tap routing and ackhaul assignment for wireless

More information

Chap5 The Theory of the Simplex Method

Chap5 The Theory of the Simplex Method College of Management, NCTU Operation Research I Fall, Chap The Theory of the Simplex Method Terminology Constraint oundary equation For any constraint (functional and nonnegativity), replace its,, sign

More information

CS 188: Artificial Intelligence Fall Search Gone Wrong?

CS 188: Artificial Intelligence Fall Search Gone Wrong? CS 188: Artificial Intelligence Fall 2009 Lecture 3: A* Search 9/3/2009 Pieter Aeel UC Berkeley Many slides from Dan Klein Search Gone Wrong? 1 Announcements Assignments: Project 0 (Python tutorial): due

More information

UNIT 10 Trigonometry UNIT OBJECTIVES 287

UNIT 10 Trigonometry UNIT OBJECTIVES 287 UNIT 10 Trigonometry Literally translated, the word trigonometry means triangle measurement. Right triangle trigonometry is the study of the relationships etween the side lengths and angle measures of

More information

Lecture Objectives. Structured Programming & an Introduction to Error. Review the basic good habits of programming

Lecture Objectives. Structured Programming & an Introduction to Error. Review the basic good habits of programming Structured Programming & an Introduction to Error Lecture Objectives Review the basic good habits of programming To understand basic concepts of error and error estimation as it applies to Numerical Methods

More information

CS 450 Numerical Analysis. Chapter 7: Interpolation

CS 450 Numerical Analysis. Chapter 7: Interpolation Lecture slides based on the textbook Scientific Computing: An Introductory Survey by Michael T. Heath, copyright c 2018 by the Society for Industrial and Applied Mathematics. http://www.siam.org/books/cl80

More information

Convex Pentagons that can Tessellate the Plane

Convex Pentagons that can Tessellate the Plane Casey Mann (University of Washington Bothell) Jennifer McLoud (University of Washington Bothell) David Von Derau (University of Washington Bothell) 2016 PNACP Meeting Portland Community College April 1,

More information

We use L i to stand for LL L (i times). It is logical to define L 0 to be { }. The union of languages L and M is given by

We use L i to stand for LL L (i times). It is logical to define L 0 to be { }. The union of languages L and M is given by The term languages to mean any set of string formed from some specific alphaet. The notation of concatenation can also e applied to languages. If L and M are languages, then L.M is the language consisting

More information

Numerical Robustness in Geometric Computation: An Expository Summary

Numerical Robustness in Geometric Computation: An Expository Summary Appl. Math. Inf. Sci. 8, No. 6, 2717-2727 (2014) 2717 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/10.12785/amis/080607 Numerical Roustness in Geometric Computation:

More information

Scientific Programming in C VI. Common errors

Scientific Programming in C VI. Common errors Scientific Programming in C VI. Common errors Susi Lehtola 6 November 2012 Beginner errors If you re a beginning C programmer, you might often make off-by one errors when you use arrays: #i n c l u de

More information

RBFT: Redundant Byzantine Fault Tolerance

RBFT: Redundant Byzantine Fault Tolerance RBFT: Redundant Byzantine Fault Tolerance Pierre-Louis Aulin Grenole University Sonia Ben Mokhtar CNRS - LIRIS Vivien Quéma Grenole INP Astract Byzantine Fault Tolerant state machine replication (BFT)

More information

Parallel algorithms for fast air pollution assessment in three dimensions

Parallel algorithms for fast air pollution assessment in three dimensions HPC-UA 2014 (Ukraine, Kyiv, Octoer 14, 2014) Parallel algorithms for fast air pollution assessment in three dimensions Bohaienko V.O. 1 1 Glushkov Institute of Cyernetic of NAS of Ukraine, Kyiv, Ukraine

More information

ESTIMATING AND CALCULATING AREAS OF REGIONS BETWEEN THE X-AXIS AND THE GRAPH OF A CONTINUOUS FUNCTION v.07

ESTIMATING AND CALCULATING AREAS OF REGIONS BETWEEN THE X-AXIS AND THE GRAPH OF A CONTINUOUS FUNCTION v.07 ESTIMATING AND CALCULATING AREAS OF REGIONS BETWEEN THE X-AXIS AND THE GRAPH OF A CONTINUOUS FUNCTION v.7 In this activity, you will explore techniques to estimate the "area" etween a continuous function

More information

Response time analysis in AFDX networks

Response time analysis in AFDX networks Response time analysis in AFDX networks J. Javier Gutiérrez, J. Carlos Palencia, and Michael González Harour Computers and Real-Time Group, Universidad de Cantaria, 39005-Santander, SPAIN {gutierjj, palencij,

More information

Georgia Standards of Excellence 3.2 Curriculum Map

Georgia Standards of Excellence 3.2 Curriculum Map Georgia Standards of Excellence 3.2 Curriculum Map Georgia Standards of Excellence: Curriculum Map 3 rd Grade Unit 4 3 rd Grade Unit 5 3 rd Grade Unit 6 Unit 1 Unit 2 Unit 3 Unit 4 Geometry Representing

More information

Network Game Traffic Modelling

Network Game Traffic Modelling Network Game Traffic Modelling Johannes Färer University of Stuttgart, Inst. of Communication Networks and Computer Engineering Pfaffenwaldring, 9 Stuttgart, Germany E-mail: faerer@ind.uni-stuttgart.de

More information

LECTURE 0: Introduction and Background

LECTURE 0: Introduction and Background 1 LECTURE 0: Introduction and Background September 10, 2012 1 Computational science The role of computational science has become increasingly significant during the last few decades. It has become the

More information

IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY

IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY Shreelekshmi R, Wilscy M 2 and C E Veni Madhavan 3 Department of Computer Science & Engineering, College of Engineering, Trivandrum,

More information

CS6303 COMPUTER ARCHITECTURE LESSION NOTES UNIT II ARITHMETIC OPERATIONS ALU In computing an arithmetic logic unit (ALU) is a digital circuit that performs arithmetic and logical operations. The ALU is

More information

1.2 Round-off Errors and Computer Arithmetic

1.2 Round-off Errors and Computer Arithmetic 1.2 Round-off Errors and Computer Arithmetic 1 In a computer model, a memory storage unit word is used to store a number. A word has only a finite number of bits. These facts imply: 1. Only a small set

More information

Floating-Point Arithmetic

Floating-Point Arithmetic ENEE446---Lectures-4/10-15/08 A. Yavuz Oruç Professor, UMD, College Park Copyright 2007 A. Yavuz Oruç. All rights reserved. Floating-Point Arithmetic Integer or fixed-point arithmetic provides a complete

More information

Bits, Words, and Integers

Bits, Words, and Integers Computer Science 52 Bits, Words, and Integers Spring Semester, 2017 In this document, we look at how bits are organized into meaningful data. In particular, we will see the details of how integers are

More information

Roundoff Errors and Computer Arithmetic

Roundoff Errors and Computer Arithmetic Jim Lambers Math 105A Summer Session I 2003-04 Lecture 2 Notes These notes correspond to Section 1.2 in the text. Roundoff Errors and Computer Arithmetic In computing the solution to any mathematical problem,

More information

fractional quantities are typically represented in computers using floating point format this approach is very much similar to scientific notation

fractional quantities are typically represented in computers using floating point format this approach is very much similar to scientific notation Floating Point Arithmetic fractional quantities are typically represented in computers using floating point format this approach is very much similar to scientific notation for example, fixed point number

More information

Floating Point Arithmetic

Floating Point Arithmetic Floating Point Arithmetic Floating point numbers are frequently used in many applications. Implementation of arithmetic units such as adder, multiplier, etc for Floating point numbers are more complex

More information

VISUAL LANE DETECTION ALGORITHM USING THE PERSPECTIVE TRANSFORM

VISUAL LANE DETECTION ALGORITHM USING THE PERSPECTIVE TRANSFORM Proceedings of the Fourteenth Annual Early Career Technical Conference The University of Alaama, Birmingham ECTC 04 Novemer, 04 - Birmingham, Alaama USA VISUAL LANE DETECTION ALGORITHM USING THE PERSPECTIVE

More information

Floating Point. CSE 351 Autumn Instructor: Justin Hsia

Floating Point. CSE 351 Autumn Instructor: Justin Hsia Floating Point CSE 351 Autumn 2016 Instructor: Justin Hsia Teaching Assistants: Chris Ma Hunter Zahn John Kaltenbach Kevin Bi Sachin Mehta Suraj Bhat Thomas Neuman Waylon Huang Xi Liu Yufang Sun http://xkcd.com/899/

More information

SEARCHING, SORTING, AND ASYMPTOTIC COMPLEXITY

SEARCHING, SORTING, AND ASYMPTOTIC COMPLEXITY 1 A3 and Prelim 2 SEARCHING, SORTING, AND ASYMPTOTIC COMPLEXITY Lecture 11 CS2110 Fall 2016 Deadline for A3: tonight. Only two late days allowed (Wed-Thur) Prelim: Thursday evening. 74 conflicts! If you

More information

15th Special Course on Image Processing for Industrial Applications October, 2000, Delft, The Netherlands. 1. Lab exercises: Mathematical Morphology

15th Special Course on Image Processing for Industrial Applications October, 2000, Delft, The Netherlands. 1. Lab exercises: Mathematical Morphology 1. La exercises: Mathematical Morphology In these la exercises we will use matla and the SDC morphology toolox, a special lirary for mathematical morphological image processing. A demo version of this

More information

From this result, it ecomes evident that y estimating the components of projected motion (i.e. u = v x cos( )+v y sin( )), for at least two independen

From this result, it ecomes evident that y estimating the components of projected motion (i.e. u = v x cos( )+v y sin( )), for at least two independen Efficiency and Accuracy Tradeoffs in using Projections for Motion Estimation Λ Dirk Roinson Peyman Milanfar Department of Electrical Engineering Department of Electrical Engineering University of California

More information