DYNAMIC STORAGE ALLOCATION. Hanan Samet

Size: px
Start display at page:

Download "DYNAMIC STORAGE ALLOCATION. Hanan Samet"

Transcription

1 ds0 DYNAMIC STORAGE ALLOCATION Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland Copyight 1997 Hanan Samet These notes may not e epoduced y any means (mechanical o electonic o any othe) without the expess witten pemission of Hanan Samet

2 DYNAMIC STORAGE ALLOCATION ds1 Explicit allocation and deallocation ( feeing o lieating ) of locks of contiguous stoage locations Issues: 1. how to keep tack of availale space and its patitioning usually keep a linked list of availale locks a. elements location of stat of lock of lock pointe to next lock in list. how to ode (i.e., sot ) list y location (i.e., inceasing ode) y no ode. how to find a lock of consecutive locations if list soted y location, find fist one with s (fist fit) a. equies a seach. ut good if want to mege adjacent empty locks into lage ones upon stoage deallocation if list soted y, find smallest one with s (est fit) Ex: fist fit is supeio to est fit equest availale aeas fist fit availale aeas est fit stat 100, ,100

3 DYNAMIC STORAGE ALLOCATION ds1 Explicit allocation and deallocation ( feeing o lieating ) of locks of contiguous stoage locations Issues: 1. how to keep tack of availale space and its patitioning usually keep a linked list of availale locks a. elements location of stat of lock of lock pointe to next lock in list. how to ode (i.e., sot ) list y location (i.e., inceasing ode) y no ode. how to find a lock of consecutive locations if list soted y location, find fist one with s (fist fit) a. equies a seach. ut good if want to mege adjacent empty locks into lage ones upon stoage deallocation if list soted y, find smallest one with s (est fit) Ex: fist fit is supeio to est fit equest availale aeas fist fit availale aeas est fit stat 100, , , ,00

4 DYNAMIC STORAGE ALLOCATION z ds1 Explicit allocation and deallocation ( feeing o lieating ) of locks of contiguous stoage locations Issues: 1. how to keep tack of availale space and its patitioning usually keep a linked list of availale locks a. elements location of stat of lock of lock pointe to next lock in list. how to ode (i.e., sot ) list y location (i.e., inceasing ode) y no ode. how to find a lock of consecutive locations if list soted y location, find fist one with s (fist fit) a. equies a seach. ut good if want to mege adjacent empty locks into lage ones upon stoage deallocation if list soted y, find smallest one with s (est fit) Ex: fist fit is supeio to est fit equest availale aeas fist fit availale aeas est fit stat 100, , , , ,100 00,00

5 DYNAMIC STORAGE ALLOCATION 4 g z ds1 Explicit allocation and deallocation ( feeing o lieating ) of locks of contiguous stoage locations Issues: 1. how to keep tack of availale space and its patitioning usually keep a linked list of availale locks a. elements location of stat of lock of lock pointe to next lock in list. how to ode (i.e., sot ) list y location (i.e., inceasing ode) y no ode. how to find a lock of consecutive locations if list soted y location, find fist one with s (fist fit) a. equies a seach. ut good if want to mege adjacent empty locks into lage ones upon stoage deallocation if list soted y, find smallest one with s (est fit) Ex: fist fit is supeio to est fit equest availale aeas fist fit availale aeas est fit stat 100, , , , ,100 00, ,100 STUCK!

6 DYNAMIC STORAGE ALLOCATION 5 4 g z ds1 Explicit allocation and deallocation ( feeing o lieating ) of locks of contiguous stoage locations Issues: 1. how to keep tack of availale space and its patitioning usually keep a linked list of availale locks a. elements location of stat of lock of lock pointe to next lock in list. how to ode (i.e., sot ) list y location (i.e., inceasing ode) y no ode. how to find a lock of consecutive locations if list soted y location, find fist one with s (fist fit) a. equies a seach. ut good if want to mege adjacent empty locks into lage ones upon stoage deallocation if list soted y, find smallest one with s (est fit) Ex: fist fit is supeio to est fit equest availale aeas fist fit availale aeas est fit stat 100, , , , ,100 00, ,100 STUCK! Requests in ode of inceasing : fist fit is ette Requests in ode of deceasing : est fit is ette

7 DYNAMIC STORAGE ALLOCATION 6 v 5 4 g z ds1 Explicit allocation and deallocation ( feeing o lieating ) of locks of contiguous stoage locations Issues: 1. how to keep tack of availale space and its patitioning usually keep a linked list of availale locks a. elements location of stat of lock of lock pointe to next lock in list. how to ode (i.e., sot ) list y location (i.e., inceasing ode) y no ode. how to find a lock of consecutive locations if list soted y location, find fist one with s (fist fit) a. equies a seach. ut good if want to mege adjacent empty locks into lage ones upon stoage deallocation if list soted y, find smallest one with s (est fit) Ex: fist fit is supeio to est fit equest availale aeas fist fit availale aeas est fit stat 100, , , , ,100 00, ,100 STUCK! Requests in ode of inceasing : fist fit is ette Requests in ode of deceasing : est fit is ette Can give example whee est fit is ette than fist fit

8 FRAGMENTATION ds Fagmentation esults when too many small locks ae geneated Solutions: 1. can avoid y choosing a constant k and selecting lock a of s to satisfy the equest fo a lock of if s < k eliminates small locks speeds up seach in fist-fit method as list of locks is smalle. can avoid inspecting locks that ae too small in fist-fit y pefoming seach in a cicula manne so that it esumes whee the last lock was found. can also avoid y using compaction upon deallocation

9 LIBERATION ds 1. Want to etun stoage to the AVAIL list as soon as possile implies that can coalesce elements of AVAIL list into lage locks. Contast with methods ased on gaage collection which allocate stoage continuously until exhausting the AVAIL list followed y a pass fo stoage eclamation and compaction. Comining gaage collection with compaction stoage locations must e moved need to execise cae when moving pointe data pesence of elocation egistes oviates some of the polems, since the pointes could e offset addesses

10 LIBERATION WITH COALESCING Ex: assume a soted AVAIL list y memoy locations i.e., LINK(p) Ω LINK(p)>p fee ds4 next on AVAIL lieated next on AVAIL lieated next on AVAIL lieated Polem: each time the algoithm is invoked to lieate lock pointed at y p, we must seach though appoximately half the list to locate q such that LINK(q)>p

11 LIBERATION WITH COALESCING ds4 Ex: assume a soted AVAIL list y memoy locations i.e., LINK(p) Ω LINK(p)>p coalesce fom elow fee next on AVAIL lieated next on AVAIL lieated next on AVAIL lieated Polem: each time the algoithm is invoked to lieate lock pointed at y p, we must seach though appoximately half the list to locate q such that LINK(q)>p

12 LIBERATION WITH COALESCING z ds4 Ex: assume a soted AVAIL list y memoy locations i.e., LINK(p) Ω LINK(p)>p coalesce fom elow fee next on AVAIL lieated coalesce fom aove next on AVAIL lieated next on AVAIL lieated Polem: each time the algoithm is invoked to lieate lock pointed at y p, we must seach though appoximately half the list to locate q such that LINK(q)>p

13 LIBERATION WITH COALESCING 4 g z ds4 Ex: assume a soted AVAIL list y memoy locations i.e., LINK(p) Ω LINK(p)>p coalesce fom elow fee next on AVAIL lieated coalesce fom aove next on AVAIL lieated coalesce fom elow and aove next on AVAIL lieated Polem: each time the algoithm is invoked to lieate lock pointed at y p, we must seach though appoximately half the list to locate q such that LINK(q)>p

14 LIBERATION ALGORITHM ds5 Assume N consecutive wods stating at P0 ae eing lieated Algoithm: 1. seach though AVAIL until finding a node Q such that link(q) = P > P0. if P0+N = P then egin /* coalesce fom aove */ (P0) (P)+N; link(p0) link(p); end else egin link(p0) P; (P0) N; end;. if Q+(Q) = P0 then egin /* coalesce fom elow */ (Q) (Q)+(P); /* N was aleady accounted fo in step (aove) */ link(q) link(p0); end else link(q) P0;

15 LIBERATION USING DOUBLY-LINKED LISTS ds6 Data stuctue lock inuse=+ inuse }SIZE { wods inuse fee lock link link inuse= inuse=+ inuse inuse INUSE and SIZE fields 1. easy to locate immediately adjacent locks to detemine if coalescing is possile. oviate need to sot list of availale locks (AVAIL) in inceasing memoy. moe complex if sot AVAIL y lock as need to update Douly-linked AVAIL enales easy emoval of coalesced locks Ex: fee inuse= pev next + lieated + + pev + lieated + next pev next pev next + lieated +

16 LIBERATION USING DOUBLY-LINKED LISTS ds6 Data stuctue lock inuse=+ inuse }SIZE { wods inuse fee lock link link inuse= inuse=+ inuse inuse INUSE and SIZE fields 1. easy to locate immediately adjacent locks to detemine if coalescing is possile. oviate need to sot list of availale locks (AVAIL) in inceasing memoy. moe complex if sot AVAIL y lock as need to update Douly-linked AVAIL enales easy emoval of coalesced locks Ex: fee inuse= coalesce fom elow pev next + lieated pev + lieated + next pev next pev next + lieated +

17 LIBERATION USING DOUBLY-LINKED LISTS z ds6 Data stuctue lock inuse=+ inuse }SIZE { wods inuse fee lock link link inuse= inuse=+ inuse inuse INUSE and SIZE fields 1. easy to locate immediately adjacent locks to detemine if coalescing is possile. oviate need to sot list of availale locks (AVAIL) in inceasing memoy. moe complex if sot AVAIL y lock as need to update Douly-linked AVAIL enales easy emoval of coalesced locks Ex: fee inuse= coalesce fom elow pev next + lieated coalesce fom aove pev + lieated + next pev next pev next + lieated +

18 LIBERATION USING DOUBLY-LINKED LISTS 4 g z ds6 Data stuctue lock inuse=+ inuse }SIZE { wods inuse fee lock link link inuse= inuse=+ inuse inuse INUSE and SIZE fields 1. easy to locate immediately adjacent locks to detemine if coalescing is possile. oviate need to sot list of availale locks (AVAIL) in inceasing memoy. moe complex if sot AVAIL y lock as need to update Douly-linked AVAIL enales easy emoval of coalesced locks Ex: fee inuse= coalesce fom elow pev next + lieated coalesce fom aove pev + lieated + next coalesce fom elow and aove pev next pev next + lieated +

19 BUDDY SYSTEM ds7 Restict lock to e a powe of 1. all locks of k stat at location x whee x mod k = 0. given a lock stating at location x such that x mod k = 0 BUDDY k (x) = x + k if x mod k+1 = 0 BUDDY k (x) = x k if x mod k+1 = k Ex: BUDDY (10100) = only uddies can e meged 4. ty to coalesce uddies when stoage is deallocated k diffeent availale lock lists one fo each lock When equest a lock of k and none is availale: 1. split smallest lock j > k into a pai of locks of j 1. place lock on appopiate AVAIL list and ty again Data stuctue 1. douly-linked list (not cicula) FREE of availale locks indexed y k links stoed in actual locks FREE[k] points to fist availale lock of k. each lock contains INUSE it SIZE NEXT and PREV links fo FREE list Can get geate vaiety in lock s using Fionacci sequence of lock s so i = i 1 + i and now atio of successive lock s is / instead of 1/

20 EXAMPLE OF BUDDY ALGORITHM M = I S P N 0 16 Ω Ω ds8 k FREE[k] 0 Ω 1 Ω Ω Ω 4 0 initially, one lock of 16 stating at location 0 is availale

21 EXAMPLE OF BUDDY ALGORITHM M = I S P N 0 8 Ω Ω 0 4 Ω Ω 0 Ω Ω Ω Ω z ds8 k FREE[k] 0 Ω 1 Ω Ω 4 Ω Ω initially, one lock of 16 stating at location 0 is availale allocate a lock of

22 EXAMPLE OF BUDDY ALGORITHM M = I S P N 0 4 Ω Ω 0 Ω Ω Ω Ω Ω Ω 0 1 Ω Ω Ω Ω z ds8 k FREE[k] 0 Ω 1 Ω 10 Ω 4 1 Ω 8 Ω 4 0 Ω initially, one lock of 16 stating at location 0 is availale allocate a lock of allocate locks of 4,, in ode

23 EXAMPLE OF BUDDY ALGORITHM M = I S P N Ω Ω Ω Ω 0 0 Ω Ω Ω Ω Ω Ω Ω Ω 10 Ω Ω Ω Ω 4 g z ds8 k FREE[k] 0 Ω 1 Ω 10 Ω 4 1 Ω 8 Ω 4 0 Ω initially, one lock of 16 stating at location 0 is availale allocate a lock of allocate locks of 4,, in ode fee the lock at location

24 EXAMPLE OF BUDDY ALGORITHM 5 v 4 g z ds8 M = I S P N Ω Ω Ω Ω Ω Ω Ω Ω Ω Ω Ω Ω Ω Ω Ω 10 Ω Ω Ω 1 Ω Ω k FREE[k] 0 Ω 1 Ω 10 Ω 4 1 Ω 8 Ω 4 0 Ω initially, one lock of 16 stating at location 0 is availale allocate a lock of allocate locks of 4,, in ode fee the lock at location fee the lock at location 0 mege lock at 0 with its uddy at no futhe meging is possile as the uddy at 4 is in use

25 BUDDY ALGORITHM NOTES ds9 Assume stoage uns fom locations 0 to m 1 To eseve a lock of k : 1. find smallest j fo which FREE[j] Ω (assume this lock stats at location n). emove the lock at location n fom FREE[j]. while j>k do egin j j 1; add lock at location n+ j to FREE[j]; end; To lieate a lock of k stating at location n: while k m and NOT(INUSE(BUDDY k (n))) do egin emove BUDDY k (n) fom FREE[k]; k k+1; if BUDDY k (n)<n then n BUDDY k (n); end; INUSE flag only needs to e set in fist wod of each lock 1. all emaining elements (wods) have thei uddies within the same lock. no one outside the lock will look fo uddies within the lock

26 OVERFLOW ds10 At times, have moe stoage allocation equests than availale memoy Can pefom gaage collection with compaction ut will soon un out of memoy again Altenatively, emove locks to seconday stoage: 1. keep a douly-linked list of locks in use, soted accoding to fequency of use wheneve a lock is accessed, move it to font of list like a self-oganizing file Ex: stat A B C D. cicula list of locks and a ecently-used it indicating if the lock was accessed since the last time locks wee emoved to seconday stoage to emove a lock, mach down the list looking fo a 0 and eset all 1s that wee encounteed to 0 cuculating pointe ensues that a lock eset to 0 will not e checked again fo emoval until all othe locks have een checked Ex: stat A B C D E

27 OVERFLOW ds10 At times, have moe stoage allocation equests than availale memoy Can pefom gaage collection with compaction ut will soon un out of memoy again Altenatively, emove locks to seconday stoage: 1. keep a douly-linked list of locks in use, soted accoding to fequency of use wheneve a lock is accessed, move it to font of list like a self-oganizing file Ex: stat C A B C D accessing C causes it to move to the font. cicula list of locks and a ecently-used it indicating if the lock was accessed since the last time locks wee emoved to seconday stoage to emove a lock, mach down the list looking fo a 0 and eset all 1s that wee encounteed to 0 cuculating pointe ensues that a lock eset to 0 will not e checked again fo emoval until all othe locks have een checked Ex: stat A B C D E

28 OVERFLOW z ds10 At times, have moe stoage allocation equests than availale memoy Can pefom gaage collection with compaction ut will soon un out of memoy again Altenatively, emove locks to seconday stoage: 1. keep a douly-linked list of locks in use, soted accoding to fequency of use wheneve a lock is accessed, move it to font of list like a self-oganizing file Ex: stat C A B C D accessing C causes it to move to the font. cicula list of locks and a ecently-used it indicating if the lock was accessed since the last time locks wee emoved to seconday stoage to emove a lock, mach down the list looking fo a 0 and eset all 1s that wee encounteed to 0 cuculating pointe ensues that a lock eset to 0 will not e checked again fo emoval until all othe locks have een checked Ex: stat stat A 0 B 0 C D E lock D is the fist to e emoved

29 OVERFLOW 4 g z ds10 At times, have moe stoage allocation equests than availale memoy Can pefom gaage collection with compaction ut will soon un out of memoy again Altenatively, emove locks to seconday stoage: 1. keep a douly-linked list of locks in use, soted accoding to fequency of use wheneve a lock is accessed, move it to font of list like a self-oganizing file Ex: stat C A B C D accessing C causes it to move to the font. cicula list of locks and a ecently-used it indicating if the lock was accessed since the last time locks wee emoved to seconday stoage to emove a lock, mach down the list looking fo a 0 and eset all 1s that wee encounteed to 0 cuculating pointe ensues that a lock eset to 0 will not e checked again fo emoval until all othe locks have een checked Ex: stat stat A 0 B 0 1 C D E lock D is the fist to e emoved access lock A

30 OVERFLOW 5 v 4 g z ds10 At times, have moe stoage allocation equests than availale memoy Can pefom gaage collection with compaction ut will soon un out of memoy again Altenatively, emove locks to seconday stoage: 1. keep a douly-linked list of locks in use, soted accoding to fequency of use wheneve a lock is accessed, move it to font of list like a self-oganizing file Ex: stat C A B C D accessing C causes it to move to the font. cicula list of locks and a ecently-used it indicating if the lock was accessed since the last time locks wee emoved to seconday stoage to emove a lock, mach down the list looking fo a 0 and eset all 1s that wee encounteed to 0 cuculating pointe ensues that a lock eset to 0 will not e checked again fo emoval until all othe locks have een checked Ex: stat stat stat A 0 B 0 1 C D E 0 0 lock D is the fist to e emoved access lock A lock B is emoved next

DYNAMIC STORAGE ALLOCATION. Hanan Samet

DYNAMIC STORAGE ALLOCATION. Hanan Samet ds0 DYNAMIC STORAGE ALLOCATION Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 07 e-mail: hjs@umiacs.umd.edu

More information

GARBAGE COLLECTION METHODS. Hanan Samet

GARBAGE COLLECTION METHODS. Hanan Samet gc0 GARBAGE COLLECTION METHODS Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 07 e-mail: hjs@umiacs.umd.edu

More information

Any modern computer system will incorporate (at least) two levels of storage:

Any modern computer system will incorporate (at least) two levels of storage: 1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe

More information

SORTING IN SPACE HANAN SAMET

SORTING IN SPACE HANAN SAMET SORTING IN SPACE HANAN SAMET COMPUTER SCIENCE DEPARTMENT AND CENTER FOR AUTOMATION RESEARCH AND INSTITUTE FOR ADVANCED COMPUTER STUDIES UNIVERSITY OF MARYLAND COLLEGE PARK, MARYLAND 074-4 USA e mail: hjs@cs.umd.edu

More information

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the

More information

Gravitational Shift for Beginners

Gravitational Shift for Beginners Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational

More information

sf3 RESTRICTED QUADTREE (VON HERZEN/BARR)

sf3 RESTRICTED QUADTREE (VON HERZEN/BARR) SURFACE DATA HIERARCHICAL TRIANGULAR DECOMPOSITION Appoximate suface S y plana tiangula patches whose vetices ae a suset of data points defining S Fo each patch, compute an appoximation eo. maximum eo

More information

Lecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining

Lecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining EE 341 Lectue # 12 Instucto: Zeshan hishti zeshan@ece.pdx.edu Novembe 10, 2014 Potland State Univesity asic Pocessing Unit ontol Signals Hadwied ontol Datapath contol signals Dealing with memoy delay Pipelining

More information

CS 61C: Great Ideas in Computer Architecture. Pipelining Hazards. Instructor: Senior Lecturer SOE Dan Garcia

CS 61C: Great Ideas in Computer Architecture. Pipelining Hazards. Instructor: Senior Lecturer SOE Dan Garcia CS 61C: Geat Ideas in Compute Achitectue Pipelining Hazads Instucto: Senio Lectue SOE Dan Gacia 1 Geat Idea #4: Paallelism So9wae Paallel Requests Assigned to compute e.g. seach Gacia Paallel Theads Assigned

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

COSC 6385 Computer Architecture. - Pipelining

COSC 6385 Computer Architecture. - Pipelining COSC 6385 Compute Achitectue - Pipelining Sping 2012 Some of the slides ae based on a lectue by David Culle, Pipelining Pipelining is an implementation technique wheeby multiple instuctions ae ovelapped

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

Statistics of Images. Ioannis Rekleitis

Statistics of Images. Ioannis Rekleitis Statistics of Images Ioannis Rekleitis Some Basic Intensity Tansfoma2on Func2ons Thesholding Logistic function Log tansfomation Powe-law (Gamma coection) Piecewise-linea tansfomation Histogam pocessing

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

Lecture #22 Pipelining II, Cache I

Lecture #22 Pipelining II, Cache I inst.eecs.bekeley.edu/~cs61c CS61C : Machine Stuctues Lectue #22 Pipelining II, Cache I Wiewold cicuits 2008-7-29 http://www.maa.og/editoial/mathgames/mathgames_05_24_04.html http://www.quinapalus.com/wi-index.html

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

Image Enhancement in the Spatial Domain. Spatial Domain

Image Enhancement in the Spatial Domain. Spatial Domain 8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along

More information

t [ Background removed

t [ Background removed HANDS-ON > HOE1 Taining 1 Pictues You decide to ceate a memoies slide show fo you siste and he husband, who wee ecently maied. You include thei high school Sweetheat Ball image, engagement and wedding

More information

The International Conference in Knowledge Management (CIKM'94), Gaithersburg, MD, November 1994.

The International Conference in Knowledge Management (CIKM'94), Gaithersburg, MD, November 1994. The Intenational Confeence in Knowledge Management (CIKM'94), Gaithesbug, MD, Novembe 994. Hashing by Poximity to Pocess Duplicates in Spatial Databases Walid G. Aef Matsushita Infomation Technology Laboatoy

More information

CS 2461: Computer Architecture 1 Program performance and High Performance Processors

CS 2461: Computer Architecture 1 Program performance and High Performance Processors Couse Objectives: Whee ae we. CS 2461: Pogam pefomance and High Pefomance Pocessos Instucto: Pof. Bhagi Naahai Bits&bytes: Logic devices HW building blocks Pocesso: ISA, datapath Using building blocks

More information

Accelerating Storage with RDMA Max Gurtovoy Mellanox Technologies

Accelerating Storage with RDMA Max Gurtovoy Mellanox Technologies Acceleating Stoage with RDMA Max Gutovoy Mellanox Technologies 2018 Stoage Develope Confeence EMEA. Mellanox Technologies. All Rights Reseved. 1 What is RDMA? Remote Diect Memoy Access - povides the ability

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

High performance CUDA based CNN image processor

High performance CUDA based CNN image processor High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu

More information

Cardiac C-Arm CT. SNR Enhancement by Combining Multiple Retrospectively Motion Corrected FDK-Like Reconstructions

Cardiac C-Arm CT. SNR Enhancement by Combining Multiple Retrospectively Motion Corrected FDK-Like Reconstructions Cadiac C-Am CT SNR Enhancement by Combining Multiple Retospectively Motion Coected FDK-Like Reconstuctions M. Pümme 1, L. Wigstöm 2,3, R. Fahig 2, G. Lauitsch 4, J. Honegge 1 1 Institute of Patten Recognition,

More information

You Are Here! Review: Hazards. Agenda. Agenda. Review: Load / Branch Delay Slots 7/28/2011

You Are Here! Review: Hazards. Agenda. Agenda. Review: Load / Branch Delay Slots 7/28/2011 CS 61C: Geat Ideas in Compute Achitectue (Machine Stuctues) Instuction Level Paallelism: Multiple Instuction Issue Guest Lectue: Justin Hsia Softwae Paallel Requests Assigned to compute e.g., Seach Katz

More information

High Performance Computing on GPU for Electromagnetic Logging

High Performance Computing on GPU for Electromagnetic Logging Intenational Confeence "Paallel and Distiuted Computing Systems" High Pefomance Computing on GPU fo lectomagnetic Logging Glinskikh V.N. Kontoovich A.. pov M.I. Tofimuk Institute of Petoleum Geology and

More information

Topic 7 Random Variables and Distribution Functions

Topic 7 Random Variables and Distribution Functions Definition of a Random Vaiable Distibution Functions Popeties of Distibution Functions Topic 7 Random Vaiables and Distibution Functions Distibution Functions 1 / 11 Definition of a Random Vaiable Distibution

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

1 N-Queen Problem as a CSP (23 points + 5 bonus)

1 N-Queen Problem as a CSP (23 points + 5 bonus) Spin Semeste, 2011 CSCE 421/821: Foundations of Constaint Pocessin B.Y. Chouei Homewok 4 Assined: Monda, Fe 28, 2011 Due: Monda, Ma 7, 2011 Total value: 100 points (+ 5 onus points). Penalt of 20 points

More information

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes CS630 Repesenting and Accessing Digital Infomation Infomation Retieval: Basics Thosten Joachims Conell Univesity Infomation Retieval Basics Retieval Models Indexing and Pepocessing Data Stuctues ~ 4 lectues

More information

Modeling a shared medium access node with QoS distinction

Modeling a shared medium access node with QoS distinction Modeling a shaed medium access node with QoS distinction Matthias Gies, Jonas Geutet Compute Engineeing and Netwoks Laboatoy (TIK) Swiss Fedeal Institute of Technology Züich CH-8092 Züich, Switzeland email:

More information

DPICO: A High Speed Deep Packet Inspection Engine Using Compact Finite Automata

DPICO: A High Speed Deep Packet Inspection Engine Using Compact Finite Automata DPICO: A High Speed Deep Packet Inspection Engine Using Compact Finite Automata Chistophe L. Hayes and Yan Luo Depatment of Electical and Compute Engineeing Univesity of Massachusetts Lowell Lowell, MA,

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

Interference-Aware Multicast for Wireless Multihop Networks

Interference-Aware Multicast for Wireless Multihop Networks Intefeence-Awae Multicast fo Wieless Multihop Netwoks Daniel Letpatchya School of Electical and Compute Engineeing Geogia Institute of Technology Atlanta, Geogia 30332 0250 Douglas M. Blough School of

More information

Analysis of uniform illumination system with imperfect Lambertian LEDs

Analysis of uniform illumination system with imperfect Lambertian LEDs Optica Applicata, Vol. XLI, No. 3, 2011 Analysis of unifom illumination system with impefect Lambetian LEDs JIAJIE TAN 1, 2, KECHENG YANG 1*, MIN XIA 1, YING YANG 1 1 Wuhan National Laboatoy fo Optoelectonics,

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

Lecture # 04. Image Enhancement in Spatial Domain

Lecture # 04. Image Enhancement in Spatial Domain Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

Evaluation of Partial Path Queries on XML data

Evaluation of Partial Path Queries on XML data Evaluation of Patial Path Queies on XML data Stefanos Souldatos Dept of EE & CE, NTUA stef@dblab.ntua.g Theodoe Dalamagas Dept of EE & CE, NTUA dalamag@dblab.ntua.g Xiaoying Wu Dept. of CS, NJIT xw43@njit.edu

More information

An Identification Protocol based the secure USB

An Identification Protocol based the secure USB An Identification otocol based the secue UB Chol-Un KIM ok-jun AN and u-nam HAN Faculty of Mathematics Kim Il ung Univesity yongyang..r.k. Abstact In this pape we poposed an identification potocol which

More information

UCB CS61C : Machine Structures

UCB CS61C : Machine Structures inst.eecs.bekeley.edu/~cs61c UCB CS61C : Machine Stuctues Lectue SOE Dan Gacia Lectue 28 CPU Design : Pipelining to Impove Pefomance 2010-04-05 Stanfod Reseaches have invented a monitoing technique called

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

Evaluation of Partial Path Queries on XML Data

Evaluation of Partial Path Queries on XML Data Evaluation of Patial Path Queies on XML Data Stefanos Souldatos Dept of EE & CE NTUA, Geece stef@dblab.ntua.g Theodoe Dalamagas Dept of EE & CE NTUA, Geece dalamag@dblab.ntua.g Xiaoying Wu Dept. of CS

More information

Configuring RSVP-ATM QoS Interworking

Configuring RSVP-ATM QoS Interworking Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP

More information

All lengths in meters. E = = 7800 kg/m 3

All lengths in meters. E = = 7800 kg/m 3 Poblem desciption In this poblem, we apply the component mode synthesis (CMS) technique to a simple beam model. 2 0.02 0.02 All lengths in metes. E = 2.07 10 11 N/m 2 = 7800 kg/m 3 The beam is a fee-fee

More information

n If S is in convex position, then thee ae exactly k convex k-gons detemined by subsets of S. In geneal, howeve, S may detemine fa fewe convex k-gons.

n If S is in convex position, then thee ae exactly k convex k-gons detemined by subsets of S. In geneal, howeve, S may detemine fa fewe convex k-gons. Counting Convex Polygons in Plana Point Sets Joseph S. B. Mitchell a;1, Günte Rote b, Gopalakishnan Sundaam c, and Gehad Woeginge b a Applied Mathematics and Statistics, SUNY Stony Book, NY 11794-3600.

More information

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

Class 21. N -body Techniques, Part 4

Class 21. N -body Techniques, Part 4 Class. N -body Techniques, Pat Tee Codes Efficiency can be inceased by gouping paticles togethe: Neaest paticles exet geatest foces diect summation. Distant paticles exet smallest foces teat in goups.

More information

A Caching Algorithm using Evolutionary Game Theory in a File-Sharing System

A Caching Algorithm using Evolutionary Game Theory in a File-Sharing System A Caching Algoithm using Evolutionay Game Theoy in a File-Shaing System Masahio Sasabe Cybemedia Cente Osaka Univesity 1-32 Machikaneyama-cho, Toyonaka-shi Osaka 56-43, Japan m-sasabe@cmc.osaka-u.ac.jp

More information

Exploring non-typical memcache architectures for decreased latency and distributed network usage.

Exploring non-typical memcache architectures for decreased latency and distributed network usage. Syacuse Univesity SURFACE Electical Engineeing and Compute Science Technical Repots College of Engineeing and Compute Science 9-5-20 Exploing non-typical memcache achitectues fo deceased latency and distibuted

More information

Cellular Neural Network Based PTV

Cellular Neural Network Based PTV 3th Int Symp on Applications of Lase Techniques to Fluid Mechanics Lisbon, Potugal, 6-9 June, 006 Cellula Neual Netwok Based PT Kazuo Ohmi, Achyut Sapkota : Depatment of Infomation Systems Engineeing,

More information

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation A Minutiae-based Fingepint Matching Algoithm Using Phase Coelation Autho Chen, Weiping, Gao, Yongsheng Published 2007 Confeence Title Digital Image Computing: Techniques and Applications DOI https://doi.og/10.1109/dicta.2007.4426801

More information

4.2. Co-terminal and Related Angles. Investigate

4.2. Co-terminal and Related Angles. Investigate .2 Co-teminal and Related Angles Tigonometic atios can be used to model quantities such as

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery Poceedings of the 4th WSEAS Intenational Confeence on luid Mechanics and Aeodynamics, Elounda, Geece, August 1-3, 006 (pp337-34) Consevation Law of Centifugal oce and Mechanism of Enegy Tansfe Caused in

More information

FACE VECTORS OF FLAG COMPLEXES

FACE VECTORS OF FLAG COMPLEXES FACE VECTORS OF FLAG COMPLEXES ANDY FROHMADER Abstact. A conjectue of Kalai and Eckhoff that the face vecto of an abitay flag complex is also the face vecto of some paticula balanced complex is veified.

More information

Effective Data Co-Reduction for Multimedia Similarity Search

Effective Data Co-Reduction for Multimedia Similarity Search Effective Data Co-Reduction fo Multimedia Similaity Seach Zi Huang Heng Tao Shen Jiajun Liu Xiaofang Zhou School of Infomation Technology and Electical Engineeing The Univesity of Queensland, QLD 472,

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes On the Convesion between Binay Code and BinayReflected Gay Code on Boolean Cubes The Havad community has made this aticle openly available. Please shae how this access benefits you. You stoy mattes Citation

More information

Concomitants of Upper Record Statistics for Bivariate Pseudo Weibull Distribution

Concomitants of Upper Record Statistics for Bivariate Pseudo Weibull Distribution Available at http://pvamuedu/aam Appl Appl Math ISSN: 93-9466 Vol 5, Issue (Decembe ), pp 8 9 (Peviously, Vol 5, Issue, pp 379 388) Applications and Applied Mathematics: An Intenational Jounal (AAM) Concomitants

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

A Neural Network Model for Storing and Retrieving 2D Images of Rotated 3D Object Using Principal Components

A Neural Network Model for Storing and Retrieving 2D Images of Rotated 3D Object Using Principal Components A Neual Netwok Model fo Stong and Reteving 2D Images of Rotated 3D Object Using Pncipal Components Tsukasa AMANO, Shuichi KUROGI, Ayako EGUCHI, Takeshi NISHIDA, Yasuhio FUCHIKAWA Depatment of Contol Engineeng,

More information

How many times is the loop executed? middle = (left+right)/2; if (value == arr[middle]) return true;

How many times is the loop executed? middle = (left+right)/2; if (value == arr[middle]) return true; This lectue Complexity o binay seach Answes to inomal execise Abstact data types Stacks ueues ADTs, Stacks, ueues 1 binayseach(int[] a, int value) { while (ight >= let) { { i (value < a[middle]) ight =

More information

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors We ae IntechOpen, the wold s leading publishe of Open Access books Built by scientists, fo scientists,800 6,000 0M Open access books available Intenational authos and editos Downloads Ou authos ae among

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

ISSUES IN SPATIAL DATABASES AND GEOGRAPHIC INFORMATION SYSTEMS (GIS) HANAN SAMET

ISSUES IN SPATIAL DATABASES AND GEOGRAPHIC INFORMATION SYSTEMS (GIS) HANAN SAMET ISSUES IN SPATIAL DATABASES AND GEOGRAPHIC INFORMATION SYSTEMS (GIS) HANAN SAMET COMPUTER SCIENCE DEPARTMENT AND CENTER FOR AUTOMATION RESEARCH AND INSTITUTE FOR ADVANCED COMPUTER STUDIES UNIVERSITY OF

More information

Multidimensional Testing

Multidimensional Testing Multidimensional Testing QA appoach fo Stoage netwoking Yohay Lasi Visuality Systems 1 Intoduction Who I am Yohay Lasi, QA Manage at Visuality Systems Visuality Systems the leading commecial povide of

More information

Administrivia. CMSC 411 Computer Systems Architecture Lecture 5. Data Hazard Even with Forwarding Figure A.9, Page A-20

Administrivia. CMSC 411 Computer Systems Architecture Lecture 5. Data Hazard Even with Forwarding Figure A.9, Page A-20 Administivia CMSC 411 Compute Systems Achitectue Lectue 5 Basic Pipelining (cont.) Alan Sussman als@cs.umd.edu as@csu dedu Homewok poblems fo Unit 1 due today Homewok poblems fo Unit 3 posted soon CMSC

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220

More information

Output Primitives. Ellipse Drawing

Output Primitives. Ellipse Drawing Output Pimitives Ellipse Dawing Ellipses. An ellipses is an elongated cicle and can be dawn with modified cicle dawing algoithm.. An ellipse has set of fied points (foci) that will have a constant total

More information

Simulation-Based Test Algorithm Generation and Port Scheduling for Multi-Port Memories

Simulation-Based Test Algorithm Generation and Port Scheduling for Multi-Port Memories imulationbased Test Algoithm Geneation and Pot cheduling fo MultiPot Memoies ChiFeng Wu, ChihTsun Huang, KuoLiang Cheng, ChihWea Wang, and ChengWen Wu Depatment of Electical Engineeing ational Tsing Hua

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

The EigenRumor Algorithm for Ranking Blogs

The EigenRumor Algorithm for Ranking Blogs he EigenRumo Algoithm fo Ranking Blogs Ko Fujimua N Cybe Solutions Laboatoies N Copoation akafumi Inoue N Cybe Solutions Laboatoies N Copoation Masayuki Sugisaki N Resonant Inc. ABSRAC he advent of easy

More information

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,

More information

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,

More information

COEN-4730 Computer Architecture Lecture 2 Review of Instruction Sets and Pipelines

COEN-4730 Computer Architecture Lecture 2 Review of Instruction Sets and Pipelines 1 COEN-4730 Compute Achitectue Lectue 2 Review of nstuction Sets and Pipelines Cistinel Ababei Dept. of Electical and Compute Engineeing Maquette Univesity Cedits: Slides adapted fom pesentations of Sudeep

More information

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

The Processor: Improving Performance Data Hazards

The Processor: Improving Performance Data Hazards The Pocesso: Impoving Pefomance Data Hazads Monday 12 Octobe 15 Many slides adapted fom: and Design, Patteson & Hennessy 5th Edition, 2014, MK and fom Pof. May Jane Iwin, PSU Summay Pevious Class Pipeline

More information

C. S. Helvig Gabriel Robins Alexander Zelikovsky y. 1(a)). These locations correspond to a group of (up

C. S. Helvig Gabriel Robins Alexander Zelikovsky y. 1(a)). These locations correspond to a group of (up Impoved Appoximation Bounds fo the Goup Steine Polem C. S. Helvig Gaiel Roins Alexande Zelikovsky y Depatment of Compute Science, Univesity of Viginia, Chalottesville, Viginia 22903-2442 y Depatment of

More information

CS 5114: Theory of Algorithms. Sorting. Insertion Sort. Exchange Sorting. Clifford A. Shaffer. Spring 2010

CS 5114: Theory of Algorithms. Sorting. Insertion Sort. Exchange Sorting. Clifford A. Shaffer. Spring 2010 Depatment of Compute Science Viginia Tech Backsbug, Viginia Copyight c 10 by Ciffod A. Shaffe 3 4 5 7 : Theoy of Agoithms Tite page : Theoy of Agoithms Ciffod A. Shaffe Sping 10 Ciffod A. Shaffe Depatment

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

1 N-Queen Problem as a CSP (23 points + 5 bonus)

1 N-Queen Problem as a CSP (23 points + 5 bonus) Fall Semeste, 2014 CSCE 421/821: Foundations of Constaint Pocessin B.Y. Chouei Homewok 5 Assined: Wednesda, Octoe 29th, 2014 Due: Wednesda, Nov 12th, 2014 (Wednesda, Nov 5th, 2014 poess epot due). Total

More information

Finding point-pairs. Find Closest Point from Dense Cloud

Finding point-pairs. Find Closest Point from Dense Cloud Finding point-pais Given an a, find a coesponding b on the suface. Then one appoach would be to seach evey possible tiangle o suface point and then take the closest point. The key is to find a moe efficient

More information

Parallel processing model for XML parsing

Parallel processing model for XML parsing Recent Reseaches in Communications, Signals and nfomation Technology Paallel pocessing model fo XML pasing ADRANA GEORGEVA Fac. Applied Mathematics and nfomatics Technical Univesity of Sofia, TU-Sofia

More information

Introduction To Pipelining. Chapter Pipelining1 1

Introduction To Pipelining. Chapter Pipelining1 1 Intoduction To Pipelining Chapte 6.1 - Pipelining1 1 Mooe s Law Mooe s Law says that the numbe of pocessos on a chip doubles about evey 18 months. Given the data on the following two slides, is this tue?

More information

Reachable State Spaces of Distributed Deadlock Avoidance Protocols

Reachable State Spaces of Distributed Deadlock Avoidance Protocols Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications

More information