Table-based division by small integer constants
|
|
- Prosper Norris
- 6 years ago
- Views:
Transcription
1 Table-base ivision by small integer constants Florent e Dinechin, Laurent-Stéphane Diier LIP, Université e Lyon (ENS-Lyon/CNRS/INRIA/UCBL) 46, allée Italie, Lyon Ceex 07 Florent.e.Dinechin@ens-lyon.fr LIP6, Université Pierre et Marie Curie (UPMC/CNRS) 4 place Jussieu, Paris Ceex 05 Laurent-Stephane.Diier@upmc.fr Abstract. Computing cores to be implemente on FPGAs may involve ivisions by small integer constants in fixe or floating point. This article presents a family of architectures aressing this nee. They are erive from a simple recurrence whose boy can be implemente very efficiently as a look-up table that matches the harware resources of the target FPGA. For instance, ivision of a 32-bit integer by the constant 3 may be implemente by a combinatorial circuit of 48 LUT6 on a Virtex- 5. Other options are stuie, incluing iterative implementations, an architectures base on embee memory blocks. This technique also computes the remainer. An efficient implementation of the correctly roune ivision of a floating-point constant by such a small integer is also presente. 1 Introuction When porting applications to FPGAs, arithmetic operations shoul be optimize in an application-specific way whenever possible. This is the goal of the FloPoCo project [1]. This article consiers ivision by a small integer constant, an emonstrates operators for it that are more efficient than approaches base on stanar ivision [2] or on multiplication by the inverse [3, 4]. Division by a small integer constant is an operation that occurs often enough to justify investigating a specific operator for it. This work, for instance, was motivate by the Jacobi stencil algorithm, whose core computes the average of 3 values: this involves a ivision by 3. Small integer constants are quite common in such situations. Division by 5 also occurs in ecimal / binary conversions. The propose approach coul also be use to interleave memory banks in numbers that are not powers of two: if we have memory banks, an aress A must be translate to aress A/ in bank A mo. Division by a constant in a harware context has actually been stuie quite extensively [3, 5, 4], with goo surveys in [6, 7]. There are two main families of techniques: those base on aitions an subtractions, an those base on multiplication by the inverse. In this article we introuce a technique that has, to our knowlege, only been escribe in lecture notes as a general combinational
2 circuit example [8]. It is in essence a straightforwar aaptation of the paperan-pencil ivision algorithm in the case of small ivisors. The reason why this technique is not mentione in the literature is probably that the core of its iteration itself computes a (smaller) ivision: it oesn t reuce to either aitions, or multiplications. However, it is very well suite to FPGAs, whose logic is base on look-up tables (LUTs): they may implement such complex operations very efficiently, provie the size in bits of the input numbers matches the number of inputs to the harware LUTs. Let us introuce this technique with the help of usual ecimal arithmetic. Suppose we want to ivie an arbitrary number, say 776, by 3. Figure 1 escribes the paper-an-pencil algorithm in this case We first computes the Eucliean ivision of 7 by 3. This gives the first igit of the quotient, here 2, an the remainer is 1. We now have to ivie 176 by 3. In the secon iteration, we ivie 17 by 3: the secon quotient igit is 5, an the remainer is 2. The thir iteration ivies 26 by 3: the thir quotient igit is 8 an the remainer is 2, an this is also the remainer of the ivision of 776 by 3. Fig. 1. Division by 3 in ecimal The key observation is that in this example, the iteration boy consists in the Eucliean ivision of a 2-igit ecimal number by 3. The first of these two igits is a remainer from previous iteration: its value is 0, 1 or 2. We may therefore implement this iteration with a look-up table that, for each value from 00 to 29, gives the quotient an the remainer of its ivision by 3. This small look-up table will allow us to ivie by 3 numbers of arbitrary size. In Section 2 we aapt this raix-10 algorithm to a raix that is a power of two, then chose this raix so that the look-up table matches well the fine structure of the target FPGA. We stuy the case of floating-point inputs in Section 3: it is possible to ensure correct rouning to the nearest for free. Section 4 provies a few results an comparisons. 2 Eucliean ivision of an integer by a small constant 2.1 Notations Let be the constant ivisor, an let α be a small integer. We will use the representation of x in raix β = 2 α, which may also be consiere as breaking own the binary ecomposition of x into k chunks of α bits (see Figure 3): x = k 1 x i.2 αi where x i {0,..., 2 α 1} i=0 2
3 In all this section, we assume that is not a multiple of 2, as ivision by 2 resumes to a constant shift which is for free in FPGAs. 2.2 Algorithm The following algorithm computes the quotient q an the remainer r 0 of the high raix eucliean ivision of x by the constant. At each step of this algorithm, the partial ivien y i, the partial remainer r i an one raix-2 α igit of the quotient are compute. Algorithm 1 LUT-base computation of x/ 1: proceure ConstantDiv(x, ) 2: r k 0 3: for i = k 1 own to 0 o 4: y i x i + 2 α r i+1 (this + is a concatenation) 5: (q i, r i) ( y i/, y i mo ) (rea from a table) 6: en for 7: return q = k i=0 qi.2 αi, r 0 8: en proceure Theorem 1. Algorithm 1 computes the Eucliean ivision of x by. It outputs the quotient q = k i=0 q i.2 αi an the remainer r 0 so that x = q + r 0. The raix-2 α representation of the quotient q is also a binary representation, each iteration proucing α bits of this quotient. The proof of this theorem is in the appenix. The line y i x i + 2 α r i+1 is simply the concatenation of a remainer an a raix-2 α igit. Let us efine γ as the size in bits of the largest possible remainer: γ = log 2 ( 1) this is also the size of as is not a power of two. Then, y i is of size α + γ bits. The secon line of the loop boy, (q i, r i ) ( y i /, y i mo ), computes a raix-2 α igit an a remainer: it may be implemente as a look-up table with α + γ bits of input an α + γ bits of output (Fig. 2). Here, α is a parameter which may be chosen to match the target FPGA architecture, as we show below. The algorithm computes α bits of the quotient in one iteration: the larger α, the fewer iterations are neee for a given input number size n. The iteration may be implemente sequentially as epicte in Fig. 2, although in all the following we will focus on the fully unrolle architecture epicte in Fig. 3, which enables high-throughput pipeline implementations. It shoul be note that, for a given, the architecture grows linearly with the input size n, where general ivision or multiplication architectures grow quaratically. 3
4 reset r i+1 γ x i α LUT α q i clk r i γ Fig. 2. LUT-base sequential ivision by a constant of a raix-2 α igit extene by a remainer. r 4 = x 3 x 2 x 1 x 0 r 3 r 2 r 1 LUT LUT LUT LUT r 0 = r q 3 4 q 2 4 q 1 4 q 0 Fig. 3. LUT-base ivision by 3 of a 16-bit number written in raix 2 4 (α = 4, γ = 2) 2.3 Memory structures in current FPGAs Current FPGAs offer two main memory structures. The first is the 4- to 6- input LUT use in the logic fabric. In the following we note LUTk a k-bit input, 1-bit output LUT. In each FPGA family, there are restrictions on LUT utilization. Let us review recent FPGAs with the motivation to buil k-input, k-output LUTs. The Altera Stratix IV Aaptive Logic Moule (ALM) can be use as two arbitrary LUT4, but may also implement two LUT5 or two LUT6 uner the conition that they share some of their inputs. This is the case for our architectures: a 6-input, 6-output LUT may be built as 3 ALMs. In Xilinx Virtex-5 an Virtex-6, the logic slice inclues 4 registers an 4 LUT6, each of which is fractionable as two LUT5 with inepenent outputs. The sweet spot here is therefore to buil 5-input tables, unless we nee to register all the outputs, in which case 6-input tables shoul be preferre. We may use, for instance, 6-input LUTs to implement ivision by 3 (γ = 2) in raix 16 (α = 4). Implementing the core loop costs 6 LUTs (for a 6 bits in, 6 bits out table). The cost for a fully combinatorial (or unrolle) ivier by 3 on n bits is n/4 6 LUT6s, for instance 36 LUT6s for 24 bits (single precision), or 78 LUTs for 53 bits (ouble precision). The best shift-an-a algorithm to ate nees respectively 118 an 317 full-aers (FA), each FA consuming one LUT both in Xilinx an in Altera evices. The approach propose here is four times as efficient on ivision by 3. The larger, the more inefficient this approach becomes, as we nee more bits to represent the r i. For larger constants, a secon option is the embee memory block, from 9Kbits to 144 Kbits epening on the architecture. We will use them as
5 (9Kbits), (18Kbits or 36KBits) or (144 KBits). For ivision by 3, we may now use α = 7 to α = 11, but these larger memories also push the relevance of this technique to larger constants. These memories are not combinatorial, their inputs must be registere: they are best suite to either sequential, or unrolle but pipeline implementation. In the latter case, we may exploit the fact that all these embee memories are ual-porte: two iterations may be unrolle in one single memory block as epicte in Figure 4. Again for ivision by 3, exploiting the M9K blocks of a Stratix IV (using α = 7), a fully pipeline single-precision ivier by 3 coul be impemente in 2 M9K only (2*2*7=28 bits) an run in 4 cycles at the maximal practical spee supporte by these evices. We have no experimental ata to support these claims as we implemente only the logic-base iviers so far. Inee, results in Section 4 suggest that architectures base on embee RAMs woul not be very competitive. x 3 x 2 x 1 x 0 LUT LUT LUT LUT q 3 q 2 q 1 q 0 r Fig. 4. A pipeline ivier using two ual-porte embee RAMs 3 Division of a floating-point number by a small integer constant A floating-point input X is given by its mantissa m an exponent e: x = 2 e m with m [1, 2). Similarly, the floating-point representation of our integer ivisor is: = 2 s with [1, 2) with s = γ 1 if is not a power of two. As the mantissa has a fixe number of bits, its normalization an rouning have to be performe for almost each floating-point operation [9]. 5
6 3.1 Normalization Let us write the ivision x = m.2e = 2s m 2e s. As 2s m = m [0.5, 2), this is almost the normalize mantissa of the floatingpoint representation of the result: if m, then m [1, 2), the mantissa is correctly normalize an the floating-point number to be returne is ( 2 s ) m y = 2 e s where (z) enotes the IEEE-stanar rouning to nearest even of a real z. if m <, then m [0.5, 1), the mantissa has to be shifte left by one. Thus, the floating-point number to be returne is ( 2 s+1 ) m y = 2 e s 1. It can be observe that the comparison between m an is extremely cheap for small integers because has only γ non-zero bits. Thus, the comparison is reuce to the comparison of these γ bits to the leaing γ bits of m. As both m an have a leaing one, we nee a comparator on γ 1 bits. In terms of latency, this is a very small elay using fast-carry propagation. 3.2 Rouning Let us now aress the issue of correctly rouning the mantissa fraction. If we ignore the remainer, the obtaine result is the rouning towars zero of the floating-point ivision. To obtain correct rouning to the nearest, a first iea is to consier the final remainer. If it is larger than /2, we shoul roun up, i.e. increment the mantissa. The comparison to /2 woul cost nothing (actually the last table woul hol the result of this comparison instea of the remainer value), but this woul mean an aition of the full mantissa size, which woul consume some logic an have a latency comparable to the ivision itself, ue to carry propagation. A better iea is to use the ientity (z) = z + 1 2, which in our case becomes ( 2 s+ɛ ) m 2 s+ɛ m = s+ɛ m + /2 = 2 with ɛ being 0 if m, an 1 otherwise. In the floating-point context we may assume that is o, since powers of two are manage as exponents. Let us write = 2h + 1. We obtain ( 2 s+ɛ ) m 2 s+ɛ m + h = s+ɛ m + h = 2 6
7 so instea of aing a roun bit to the result, we may a h to the ivien before its input into the integer ivisor. It seems we haven t won much, but this pre-aition is actually for free: the aen h = 1 2 is an s-bit number, an we have to a it to the mantissa of x that is shifte left by s + ɛ bits, so it is a mere concatenation. Thus, we save the aer area an the carry propagation latency. ξ e m 1 m <? s s ftz Exn s 1 ov +1 h iv by ξ e m Fig. 5. Floating-point ivision by a small constant. To sum up, the management of a floating-point input as to the area an latency of the mantissa ivier those of one (small) exponent aer, an of one (large) mantissa multiplexer, as illustrate by Figure 5. On this figure, ξ is a 2-bit exception vector use to represent 0, ± an NaN (Not a Number). The implementation in FloPoCo manages ivisions by small integer constants an all their powers of two. The only aitional issues are in the overflow/unerflow logic (the Exn box on Figure 5), but they are too straightforwar to be etaile here. 4 Results an comparison All the results in this section are obtaine for architectures generate by FloPoCo 2.3.0, using ISE 12.1 for an FPGA with 6-input LUTs (Virtex-5). These are synthesis results before place an route, which is perfectly meaningful for such tiny operators. Table 1 provies some results for Eucliean ivision (integer ivision with remainer). We only report the architecture obtaine with the optimal value of α. 7
8 n = 32 bits n = 64 bits constant LUT6 (preicte) latency LUT6 (preicte) latency = 3 (α = 4, γ = 2) 47 (6*8=48) 7.14ns 95 (6*16=96) 14.8ns = 5 (α = 3, γ = 3) 60 (6*11=66) 6.79ns 125 (6*22=132) 13.8ns = 7 (α = 3, γ = 3) 60 (6*11=66) 7.30ns 125 (6*22=132) 15.0ns Table 1. Synthesis results for combinatorial Eucliean ivision on Virtex Integer ivision One woul believe that for such simple architectures, we can preict the synthesis results, at least with respect to LUT count. However, there are still some surprises, which we are currently investigating. The first surprise is that the synthesis tools perform further optimization out of our esigns: the LUT numbers are not always those preicte (they are always better). For instance, for the 64-bit ivier by 3, we preict simply 96 LUT6, but the tool reports 15 LUT3, 18 LUT4, 16 LUT5, an only 45 LUT6, then merges that into 95 LUTs. One of the reasons coul be that some remainer values never occur, which means that there are on t care in the logic tables that enable further optimizations. This woul explain that the results are better for ivision by 5 than for ivision by 7 although they have the same α an β: there are more on t care in the table for 5. Such improvements shoul be stuie systematically. Also, we have mentione earlier that the sweet spot on Virtex-5 shoul be to use 5-input LUTs, but the synthesis tools seem to ecie otherwise: architectures esigne for 5-input LUTs actually consume more than those esigne for 6-input LUTs. This coul come from a coing style issue, or from a misunerstaning of the intricate etails of the Virtex-5 logic block. Table 2 provies some synthesis results for pipeline iviers by 3. Each line is a ifferent frequency/area traeoff (incientally, thanks to FloPoCo s pipelining framework [1], this flexible pipeline took less than ten minutes to implement out of the combinatorial esign). Here we have to investigate why the LUT number is larger than the preicte size. n = 32 bits n = 64 bits FF + LUT6 performance FF + LUT6 performance 33 Reg + 47 LUT MHz 122 Reg LUT MHz 58 Reg + 62 LUT MHz 168 Reg LUT MHz 68 Reg + 72 LUT MHz 172 Reg LUT MHz Table 2. Synthesis results for pipeline Eucliean ivision by 3 on Virtex-5 8
9 4.2 Floating-point ivision Table 3 shows results for floating-point ivision by 3. The behaviour of these operators, incluing the fact that they return correctly roune results, has been verifie by simulation against millions of test vectors generate by an inepenent floating-point ivision by 3 [1]. single precision ouble precision FF + LUT6 performance FF + LUT6 performance 35 Reg + 69 LUT MHz 122 Reg LUT MHz 105 Reg + 83 LUT MHz 245 Reg LUT MHz Table 3. Synthesis results for pipeline floating-point ivision by 3 on Virtex-5 For comparison, a single precision stanar (non-constant) floating-point ivier consumes 1122 reg an 945 LUT an nees MHz. 4.3 Comparison with previous work A review of several algorithms for ivision by a constant is available in [6]. Many of these algorithms require the ivision to be exact (null remainer) an return wrong results otherwise. We will not consier them. Among the remaining techniques, the most relevant is metho 6 in [6]. In this metho, the ivisor has the form 2 t ± 1, which correspons to most of the small ivisors we are targeting. The quotient an the remainer are obtaine through n γ 1 aitions an substractions involving n-bit numbers. Table 4 summarizes the comparison of the size of our implementation an an estimation of the area of an FPGA implementation of this previous technique. It can be observe that in this implementation, the larger, the fewer require aitions, therefore the smaller the implementation. This means that this metho is increasingly relevant for larger constants 2 t ±1, an this is a metho to investigate in the future. Our proposition remains very significally smaller for the small ivisors that it targets. Besies, it oesn t involve any carry propagation, so its latency shoul also be better, but this remains to be quantifie experimentally. n = 16 bits n = 32 bits n = 64 bits Constant Our [6] Our [6] Our [6] Table 4. Comparison of the size in LUT between the implementation of our ivier an [6] on Virtex 5 9
10 The presente floating-point ivision by a small constant also largely outperforms the best technique use so far, which are base on multiplication by the constant 1/ using shift-an-a algorithm [4]. For instance, using this technique, a ouble-precision multiplication by 1/3, in the conitions of Table 3, consumes 282 reg LUT an runs in MHz. 5 Conclusion This article as ivision by a small integer constant such as 3 or 10 to the bestiary of arithmetic operators that C-to-harware compilers can use when they target FPGAs. This operation can be implemente very efficiently, be it for integer inputs, or for floating-point inputs. It is now part of the open-source FloPoCo generator. Some synthesis results suggest that a careful stuy of the tables coul lea to further optimizations. In aition, we shoul try to reformulate our tables so that the propagation of the r i uses the fast-carry lines available on all moern FPGAs: this woul reuce the latency ramatically. Another issue worth of interest is the case of larger constants that are prouct of smaller constants, for which a cascae implementation coul be stuie. Due to routing pressure, the number of inputs to the FPGA LUTs keeps increasing as technology progresses. This shoul make this technique increasingly relevant in the future. References 1. F. e Dinechin an B. Pasca, Designing custom arithmetic ata paths with FloPoCo, IEEE Design & Test of Computers, vol. 28, no. 4, Aug M. D. Ercegovac an T. Lang, Digital Arithmetic. Morgan Kaufmann, E. Artzy, J. A. Hins, an H. J. Saal, A fast ivision technique for constant ivisors, Communications of the ACM, vol. 19, pp , Feb F. e Dinechin, Multiplication by rational constants, IEEE Transactions on Circuits an Systems, II, 2012, to appear. 5. S.-Y. R. Li, Fast constant ivision routines, IEEE Transactions on Computers, vol. C-34, no. 9, pp , Sep P. Srinivasan an F. Petry, Constant-ivision algorithms, IEE Proc. Computers an Digital Techniques, vol. 141, no. 6, pp , Nov R. W. Doran, Special cases of ivision, Journal of Universal Computer Science, vol. 1, no. 3, pp , A. Paplinski, CSE2306/1308 Digital Logic Lecture Note, Lecture 8, Clayton School of Information Technology Monash University, Australia, J.-M. Muller, N. Brisebarre, F. e Dinechin, C.-P. Jeannero, V. Lefèvre, G. Melquion, N. Revol, D. Stehlé, an S. Torres, Hanbook of Floating-Point Arithmetic. Birkhauser Boston,
11 A Proof of correctness of Algorithm 1 The proof procees in two steps. First, we establish that x = k i=0 q i.2 αi +r 0 in lemma 1 below. This shows tha we compute some kin of Eucliean ivision, but it is not enough: we also nee to show that the q i form a binary representation of the result. For this it is enough to show that they are raix-2 α igits, which is establishe thanks to lemma 2 below. Lemma 1. k x = q i.2 αi + r 0 i=0 Proof. To show this lemma, we use the efinition of the Eucliean ivision of y i by : y i = q i + r i. x = k 1 i=0 x i.2 αi = k 1 i=0 (x i + 2 α r i+1 ).2 αi k 1 i=0 (2α r i+1 ).2 αi = k 1 i=0 (q i + r i ).2 αi k i=1 r i.2 αi = k 1 i=0 q i.2 αi + r 0 r k.2 αk Lemma 2. i 0 y i 2 α 1 an r k = 0. Proof. The igit x i verifies by efinition 0 x i 2 α 1; r i+1 is either 0 (initialization) or the remainer of a ivision by, therefore 0 r i 1. Therefore y i = x i +2 α r i+1 verifies 0 y i 2 α 1+2 α ( 1), or 0 y i 2 α 1. We euce from the previous lemma an the efinition of q i as quotient of y i by that i 0 q i 2 α 1 which shows that the q i are inee raix-2 α igits. Thanks to Lemma 1, they are the igits of the quotient. 11
Table-based division by small integer constants
Table-based division by small integer constants Florent De Dinechin, Laurent-Stéphane Didier To cite this version: Florent De Dinechin, Laurent-Stéphane Didier. Table-based division by small integer constants.
More informationEFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER
FFICINT ON-LIN TSTING MTHOD FOR A FLOATING-POINT ADDR A. Droz, M. Lobachev Department of Computer Systems, Oessa State Polytechnic University, Oessa, Ukraine Droz@ukr.net, Lobachev@ukr.net Abstract In
More informationComputer Organization
Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.
More informationA Formal Model and Efficient Traversal Algorithm for Generating Testbenches for Verification of IEEE Standard Floating Point Division
A Formal Moel an Efficient Traversal Algorithm for Generating Testbenches for Verification of IEEE Stanar Floating Point Division Davi W. Matula, Lee D. McFearin Department of Computer Science an Engineering
More informationVendor Agnostic, High Performance, Double Precision Floating Point Division for FPGAs
Vendor Agnostic, High Performance, Double Precision Floating Point Division for FPGAs Xin Fang and Miriam Leeser Dept of Electrical and Computer Eng Northeastern University Boston, Massachusetts 02115
More informationLoop Scheduling and Partitions for Hiding Memory Latencies
Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:
More informationYet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien
Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,
More informationHybrid Position-Residues Number System
Hybri Position-Resiues Number System Karim Bigou, Arnau Tisseran To cite this version: Karim Bigou, Arnau Tisseran. Hybri Position-Resiues Number System. J. Hormigo; S. Oberman; N. Revol. ARITH: 3r Symposium
More informationCS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics
CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,
More informationRADIX CONVERSION FOR IEEE MIXED RADIX FLOATING-POINT ARITHMETIC
RADIX CONVERSION FOR IEEE754-8 MIXED RADIX FLOATING-POINT ARITHMETIC Olga Kupriianova UPMC Paris 6 LIP6 PEQUAN team 4, place Jussieu 75252 Paris Cedex 05, France Email: olga.kupriianova@lip6.fr Christoph
More informationThroughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem
Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple
More informationLearning Subproblem Complexities in Distributed Branch and Bound
Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University
More informationIntensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2
This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar
More informationOnline Appendix to: Generalizing Database Forensics
Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that
More informationOffloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization
1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24
More informationNon-homogeneous Generalization in Privacy Preserving Data Publishing
Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h
More informationAlgebraic transformations of Gauss hypergeometric functions
Algebraic transformations of Gauss hypergeometric functions Raimunas Viūnas Faculty of Mathematics, Kobe University Abstract This article gives a classification scheme of algebraic transformations of Gauss
More informationSupporting Fully Adaptive Routing in InfiniBand Networks
XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar
More informationShift-map Image Registration
Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.
More informationMessage Transport With The User Datagram Protocol
Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer
More informationQueueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks
Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science
More informationImage Segmentation using K-means clustering and Thresholding
Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,
More informationPipelined FPGA Adders
010 International Conference on Field Programmable Logic and Applications Pipelined FPGA Adders Florent de Dinechin, Hong Diep Nguyen, Bogdan Pasca LIP, projet Arénaire ENS de Lyon 6 allée d Italie, 6936
More informationAn Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique
International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech
More informationThe Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract
The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie
More informationNORTHEASTERN UNIVERSITY Graduate School of Engineering. Approved for Thesis Requirements of the Master of Science Degree
NORTHEASTERN UNIVERSITY Graduate School of Engineering Thesis Title: Variable Precision Floating Point Reciprocal, Division and Square Root for Major FPGA vendors Author: Xin Fang Department: Electrical
More informationYou Can Do That. Unit 16. Motivation. Computer Organization. Computer Organization Design of a Simple Processor. Now that you have some understanding
.. ou Can Do That Unit Computer Organization Design of a imple Clou & Distribute Computing (CyberPhysical, bases, Mining,etc.) Applications (AI, Robotics, Graphics, Mobile) ystems & Networking (Embee ystems,
More informationBIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES
BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations
More information1 Surprises in high dimensions
1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic
More informationStudy of Network Optimization Method Based on ACL
Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department
More informationRandom Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation
DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,
More information2-connected graphs with small 2-connected dominating sets
2-connecte graphs with small 2-connecte ominating sets Yair Caro, Raphael Yuster 1 Department of Mathematics, University of Haifa at Oranim, Tivon 36006, Israel Abstract Let G be a 2-connecte graph. A
More informationVendor Agnostic, High Performance, Double Precision Floating Point Division for FPGAs
Vendor Agnostic, High Performance, Double Precision Floating Point Division for FPGAs Presented by Xin Fang Advisor: Professor Miriam Leeser ECE Department Northeastern University 1 Outline Background
More informationImplementation and Evaluation of NAS Parallel CG Benchmark on GPU Cluster with Proprietary Interconnect TCA
Implementation an Evaluation of AS Parallel CG Benchmark on GPU Cluster with Proprietary Interconnect TCA Kazuya Matsumoto 1, orihisa Fujita 2, Toshihiro Hanawa 3, an Taisuke Boku 1,2 1 Center for Computational
More informationWLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic
WLAN Inoor Positioning Base on Eucliean Distances an Fuzzy Logic Anreas TEUBER, Bern EISSFELLER Institute of Geoesy an Navigation, University FAF, Munich, Germany, e-mail: (anreas.teuber, bern.eissfeller)@unibw.e
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html
More informationLearning Polynomial Functions. by Feature Construction
I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate
More informationSURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH
SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway
More informationOn the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems
On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,
More informationCoupling the User Interfaces of a Multiuser Program
Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces
More informationAlmost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control
Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract
More informationDigital Logic Design. Midterm #1
The University of Toleo f6ms_il7.fm - EECS: igital Logic esign r. Anthony. Johnson Stuent Name_ igital Logic esign Miterm # Problems Points. 3. 4 3. 6 4. Total 5 Was the eam fair? yes no 9/9/6 The University
More informationLab work #8. Congestion control
TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño
More informationUnit 15. Building Wide Muxes. Building Wide Muxes. Common Hardware Components WIDE MUXES
5. 5.2 Unit 5 Common Harware Components WIE MUXE 5.3 5.4 Builing Wie Muxes Builing Wie Muxes o far muxesonly have single bit inputs I is only -bit I is only -bit What if we still want to select between
More informationConsidering bounds for approximation of 2 M to 3 N
Consiering bouns for approximation of to (version. Abstract: Estimating bouns of best approximations of to is iscusse. In the first part I evelop a powerseries, which shoul give practicable limits for
More informationPipelined FPGA Adders
Laboratoire de l Informatique du Parallélisme École Normale Supérieure de Lyon Unité Mixte de Recherche CNRS-INRIA-ENS LYON-UCBL n o 5668 Florent de Dinechin, Hong Diep Nguyen, Bogdan Pasca Pipelined FPGA
More informationSkyline Community Search in Multi-valued Networks
Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h
More informationBackpressure-based Packet-by-Packet Adaptive Routing in Communication Networks
1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stolyar Abstract Backpressure-base aaptive routing
More informationChapter 9 Memory Management
Contents 1. Introuction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threas 6. CPU Scheuling 7. Process Synchronization 8. Dealocks 9. Memory Management 10.Virtual Memory
More informationComparison of Methods for Increasing the Performance of a DUA Computation
Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,
More informationCoordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks
Coorinating Distribute Algorithms for Feature Extraction Offloaing in Multi-Camera Visual Sensor Networks Emil Eriksson, György Dán, Viktoria Foor School of Electrical Engineering, KTH Royal Institute
More informationCS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing
CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which
More informationCluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters
Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets
More informationAn Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources
An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract
More informationA Multi-class SVM Classifier Utilizing Binary Decision Tree
Informatica 33 (009) 33-41 33 A Multi-class Classifier Utilizing Binary Decision Tree Gjorgji Mazarov, Dejan Gjorgjevikj an Ivan Chorbev Department of Computer Science an Engineering Faculty of Electrical
More informationPolitecnico di Torino. Porto Institutional Repository
Politecnico i Torino Porto Institutional Repository [Proceeing] Automatic March tests generation for multi-port SRAMs Original Citation: Benso A., Bosio A., i Carlo S., i Natale G., Prinetto P. (26). Automatic
More informationParticle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base
More informationfiltering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember
107 IEICE TRANS INF & SYST, VOLE88 D, NO5 MAY 005 LETTER An Improve Neighbor Selection Algorithm in Collaborative Filtering Taek-Hun KIM a), Stuent Member an Sung-Bong YANG b), Nonmember SUMMARY Nowaays,
More informationFPGA Matrix Multiplier
FPGA Matrix Multiplier In Hwan Baek Henri Samueli School of Engineering and Applied Science University of California Los Angeles Los Angeles, California Email: chris.inhwan.baek@gmail.com David Boeck Henri
More informationDivide-and-Conquer Algorithms
Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:
More informationInteger and Floating-Point Constant Multipliers for FPGAs
Integer and Floating-Point Constant Multipliers for FPGAs Nicolas Brisebarre, Florent de Dinechin, Jean-Michel Muller LIP (CNRS/INRIA/ENS-Lyon/UCBL) Université de Lyon {Nicolas.Brisebarre, Florent.de.Dinechin,
More informationCompiler Optimisation
Compiler Optimisation Michael O Boyle mob@inf.e.ac.uk Room 1.06 January, 2014 1 Two recommene books for the course Recommene texts Engineering a Compiler Engineering a Compiler by K. D. Cooper an L. Torczon.
More informationBackpressure-based Packet-by-Packet Adaptive Routing in Communication Networks
1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stoylar arxiv:15.4984v1 [cs.ni] 27 May 21 Abstract
More informationLecture 1 September 4, 2013
CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the
More informationFinite Automata Implementations Considering CPU Cache J. Holub
Finite Automata Implementations Consiering CPU Cache J. Holub The finite automata are mathematical moels for finite state systems. More general finite automaton is the noneterministic finite automaton
More informationOptimal Oblivious Path Selection on the Mesh
Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract
More informationTransient analysis of wave propagation in 3D soil by using the scaled boundary finite element method
Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite
More informationSolutions to Tutorial 1 (Week 8)
The University of Syney School of Mathematics an Statistics Solutions to Tutorial 1 (Week 8) MATH2069/2969: Discrete Mathematics an Graph Theory Semester 1, 2018 1. In each part, etermine whether the two
More information6 Gradient Descent. 6.1 Functions
6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output
More informationModifying ROC Curves to Incorporate Predicted Probabilities
Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,
More informationCoupon Recalculation for the GPS Authentication Scheme
Coupon Recalculation for the GPS Authentication Scheme Georg Hofferek an Johannes Wolkerstorfer Graz University of Technology, Institute for Applie Information Processing an Communications (IAIK), Inffelgasse
More informationA fast embedded selection approach for color texture classification using degraded LBP
A fast embee selection approach for color texture classification using egrae A. Porebski, N. Vanenbroucke an D. Hama Laboratoire LISIC - EA 4491 - Université u Littoral Côte Opale - 50, rue Ferinan Buisson
More informationRecitation Caches and Blocking. 4 March 2019
15-213 Recitation Caches an Blocking 4 March 2019 Agena Reminers Revisiting Cache Lab Caching Review Blocking to reuce cache misses Cache alignment Reminers Due Dates Cache Lab (Thursay 3/7) Miterm Exam
More informationShift-map Image Registration
Shift-map Image Registration Linus Svärm Petter Stranmark Centre for Mathematical Sciences, Lun University {linus,petter}@maths.lth.se Abstract Shift-map image processing is a new framework base on energy
More informationMORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks
: a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications
More informationHow to Make E-cash with Non-Repudiation and Anonymity
How to Make E-cash with Non-Repuiation an Anonymity Ronggong Song an Larry Korba Institute for Information Technology National Research Council of Canaa Ottawa, Ontario K1A 0R6, Canaa {Ronggong.Song, Larry.Korba}@nrc.ca
More informationHere are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.
Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus
More informationPERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING
PERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING PAMELA RUSSELL ADVISOR: PAUL CULL OREGON STATE UNIVERSITY ABSTRACT. Birchall an Teor prove that
More informationAnyTraffic Labeled Routing
AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,
More informationUsing Vector and Raster-Based Techniques in Categorical Map Generalization
Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department
More informationFigure 1: 2D arm. Figure 2: 2D arm with labelled angles
2D Kinematics Consier a robotic arm. We can sen it commans like, move that joint so it bens at an angle θ. Once we ve set each joint, that s all well an goo. More interesting, though, is the question of
More informationA Classification of 3R Orthogonal Manipulators by the Topology of their Workspace
A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.
More informationSoftware Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency
Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science
More informationTechnical Report TR Navigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar
Technical Report Department of Computer Science an Engineering niversity of Minnesota 4-192 Keller Hall 2 nion Street SE Minneapolis, MN 55455-159 SA TR 15-5 Navigation Aroun an nknown Obstacle for Autonomous
More informationTop-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications
Top-own Connectivity Policy Framework for Mobile Peer-to-Peer Applications Otso Kassinen Mika Ylianttila Junzhao Sun Jussi Ala-Kurikka MeiaTeam Department of Electrical an Information Engineering University
More informationSocially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach
Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly
More informationChapter 03: Computer Arithmetic. Lesson 09: Arithmetic using floating point numbers
Chapter 03: Computer Arithmetic Lesson 09: Arithmetic using floating point numbers Objective To understand arithmetic operations in case of floating point numbers 2 Multiplication of Floating Point Numbers
More informationNew Geometric Interpretation and Analytic Solution for Quadrilateral Reconstruction
New Geometric Interpretation an Analytic Solution for uarilateral Reconstruction Joo-Haeng Lee Convergence Technology Research Lab ETRI Daejeon, 305 777, KOREA Abstract A new geometric framework, calle
More information6.823 Computer System Architecture. Problem Set #3 Spring 2002
6.823 Computer System Architecture Problem Set #3 Spring 2002 Stuents are strongly encourage to collaborate in groups of up to three people. A group shoul han in only one copy of the solution to the problem
More informationVariable Independence and Resolution Paths for Quantified Boolean Formulas
Variable Inepenence an Resolution Paths for Quantifie Boolean Formulas Allen Van Geler http://www.cse.ucsc.eu/ avg University of California, Santa Cruz Abstract. Variable inepenence in quantifie boolean
More informationDesign of Policy-Aware Differentially Private Algorithms
Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft
More informationHardware division by small integer constants
Hardware division by small integer constants Fatih Ugurdag, Florent e inechin, Yılmaz Serhan Gener, Sezer Gören, Laurent-Stéphane idier To cite this version: Fatih Ugurdag, Florent e inechin, Yılmaz Serhan
More informationNavigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar
Navigation Aroun an nknown Obstacle for Autonomous Surface Vehicles sing a Forwar-Facing Sonar Patrick A. Plonski, Joshua Vaner Hook, Cheng Peng, Narges Noori, Volkan Isler Abstract A robotic boat is moving
More informationImproving Spatial Reuse of IEEE Based Ad Hoc Networks
mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos
More informationA Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition
ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural
More informationNAND flash memory is widely used as a storage
1 : Buffer-Aware Garbage Collection for Flash-Base Storage Systems Sungjin Lee, Dongkun Shin Member, IEEE, an Jihong Kim Member, IEEE Abstract NAND flash-base storage evice is becoming a viable storage
More informationClassifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means
Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu
More informationTHE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE
БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:
More informationInuence of Cross-Interferences on Blocked Loops: to know the precise gain brought by blocking. It is even dicult to determine for which problem
Inuence of Cross-Interferences on Blocke Loops A Case Stuy with Matrix-Vector Multiply CHRISTINE FRICKER INRIA, France an OLIVIER TEMAM an WILLIAM JALBY University of Versailles, France State-of-the art
More information