Table-based division by small integer constants

Size: px
Start display at page:

Download "Table-based division by small integer constants"

Transcription

1 Table-base ivision by small integer constants Florent e Dinechin, Laurent-Stéphane Diier LIP, Université e Lyon (ENS-Lyon/CNRS/INRIA/UCBL) 46, allée Italie, Lyon Ceex 07 Florent.e.Dinechin@ens-lyon.fr LIP6, Université Pierre et Marie Curie (UPMC/CNRS) 4 place Jussieu, Paris Ceex 05 Laurent-Stephane.Diier@upmc.fr Abstract. Computing cores to be implemente on FPGAs may involve ivisions by small integer constants in fixe or floating point. This article presents a family of architectures aressing this nee. They are erive from a simple recurrence whose boy can be implemente very efficiently as a look-up table that matches the harware resources of the target FPGA. For instance, ivision of a 32-bit integer by the constant 3 may be implemente by a combinatorial circuit of 48 LUT6 on a Virtex- 5. Other options are stuie, incluing iterative implementations, an architectures base on embee memory blocks. This technique also computes the remainer. An efficient implementation of the correctly roune ivision of a floating-point constant by such a small integer is also presente. 1 Introuction When porting applications to FPGAs, arithmetic operations shoul be optimize in an application-specific way whenever possible. This is the goal of the FloPoCo project [1]. This article consiers ivision by a small integer constant, an emonstrates operators for it that are more efficient than approaches base on stanar ivision [2] or on multiplication by the inverse [3, 4]. Division by a small integer constant is an operation that occurs often enough to justify investigating a specific operator for it. This work, for instance, was motivate by the Jacobi stencil algorithm, whose core computes the average of 3 values: this involves a ivision by 3. Small integer constants are quite common in such situations. Division by 5 also occurs in ecimal / binary conversions. The propose approach coul also be use to interleave memory banks in numbers that are not powers of two: if we have memory banks, an aress A must be translate to aress A/ in bank A mo. Division by a constant in a harware context has actually been stuie quite extensively [3, 5, 4], with goo surveys in [6, 7]. There are two main families of techniques: those base on aitions an subtractions, an those base on multiplication by the inverse. In this article we introuce a technique that has, to our knowlege, only been escribe in lecture notes as a general combinational

2 circuit example [8]. It is in essence a straightforwar aaptation of the paperan-pencil ivision algorithm in the case of small ivisors. The reason why this technique is not mentione in the literature is probably that the core of its iteration itself computes a (smaller) ivision: it oesn t reuce to either aitions, or multiplications. However, it is very well suite to FPGAs, whose logic is base on look-up tables (LUTs): they may implement such complex operations very efficiently, provie the size in bits of the input numbers matches the number of inputs to the harware LUTs. Let us introuce this technique with the help of usual ecimal arithmetic. Suppose we want to ivie an arbitrary number, say 776, by 3. Figure 1 escribes the paper-an-pencil algorithm in this case We first computes the Eucliean ivision of 7 by 3. This gives the first igit of the quotient, here 2, an the remainer is 1. We now have to ivie 176 by 3. In the secon iteration, we ivie 17 by 3: the secon quotient igit is 5, an the remainer is 2. The thir iteration ivies 26 by 3: the thir quotient igit is 8 an the remainer is 2, an this is also the remainer of the ivision of 776 by 3. Fig. 1. Division by 3 in ecimal The key observation is that in this example, the iteration boy consists in the Eucliean ivision of a 2-igit ecimal number by 3. The first of these two igits is a remainer from previous iteration: its value is 0, 1 or 2. We may therefore implement this iteration with a look-up table that, for each value from 00 to 29, gives the quotient an the remainer of its ivision by 3. This small look-up table will allow us to ivie by 3 numbers of arbitrary size. In Section 2 we aapt this raix-10 algorithm to a raix that is a power of two, then chose this raix so that the look-up table matches well the fine structure of the target FPGA. We stuy the case of floating-point inputs in Section 3: it is possible to ensure correct rouning to the nearest for free. Section 4 provies a few results an comparisons. 2 Eucliean ivision of an integer by a small constant 2.1 Notations Let be the constant ivisor, an let α be a small integer. We will use the representation of x in raix β = 2 α, which may also be consiere as breaking own the binary ecomposition of x into k chunks of α bits (see Figure 3): x = k 1 x i.2 αi where x i {0,..., 2 α 1} i=0 2

3 In all this section, we assume that is not a multiple of 2, as ivision by 2 resumes to a constant shift which is for free in FPGAs. 2.2 Algorithm The following algorithm computes the quotient q an the remainer r 0 of the high raix eucliean ivision of x by the constant. At each step of this algorithm, the partial ivien y i, the partial remainer r i an one raix-2 α igit of the quotient are compute. Algorithm 1 LUT-base computation of x/ 1: proceure ConstantDiv(x, ) 2: r k 0 3: for i = k 1 own to 0 o 4: y i x i + 2 α r i+1 (this + is a concatenation) 5: (q i, r i) ( y i/, y i mo ) (rea from a table) 6: en for 7: return q = k i=0 qi.2 αi, r 0 8: en proceure Theorem 1. Algorithm 1 computes the Eucliean ivision of x by. It outputs the quotient q = k i=0 q i.2 αi an the remainer r 0 so that x = q + r 0. The raix-2 α representation of the quotient q is also a binary representation, each iteration proucing α bits of this quotient. The proof of this theorem is in the appenix. The line y i x i + 2 α r i+1 is simply the concatenation of a remainer an a raix-2 α igit. Let us efine γ as the size in bits of the largest possible remainer: γ = log 2 ( 1) this is also the size of as is not a power of two. Then, y i is of size α + γ bits. The secon line of the loop boy, (q i, r i ) ( y i /, y i mo ), computes a raix-2 α igit an a remainer: it may be implemente as a look-up table with α + γ bits of input an α + γ bits of output (Fig. 2). Here, α is a parameter which may be chosen to match the target FPGA architecture, as we show below. The algorithm computes α bits of the quotient in one iteration: the larger α, the fewer iterations are neee for a given input number size n. The iteration may be implemente sequentially as epicte in Fig. 2, although in all the following we will focus on the fully unrolle architecture epicte in Fig. 3, which enables high-throughput pipeline implementations. It shoul be note that, for a given, the architecture grows linearly with the input size n, where general ivision or multiplication architectures grow quaratically. 3

4 reset r i+1 γ x i α LUT α q i clk r i γ Fig. 2. LUT-base sequential ivision by a constant of a raix-2 α igit extene by a remainer. r 4 = x 3 x 2 x 1 x 0 r 3 r 2 r 1 LUT LUT LUT LUT r 0 = r q 3 4 q 2 4 q 1 4 q 0 Fig. 3. LUT-base ivision by 3 of a 16-bit number written in raix 2 4 (α = 4, γ = 2) 2.3 Memory structures in current FPGAs Current FPGAs offer two main memory structures. The first is the 4- to 6- input LUT use in the logic fabric. In the following we note LUTk a k-bit input, 1-bit output LUT. In each FPGA family, there are restrictions on LUT utilization. Let us review recent FPGAs with the motivation to buil k-input, k-output LUTs. The Altera Stratix IV Aaptive Logic Moule (ALM) can be use as two arbitrary LUT4, but may also implement two LUT5 or two LUT6 uner the conition that they share some of their inputs. This is the case for our architectures: a 6-input, 6-output LUT may be built as 3 ALMs. In Xilinx Virtex-5 an Virtex-6, the logic slice inclues 4 registers an 4 LUT6, each of which is fractionable as two LUT5 with inepenent outputs. The sweet spot here is therefore to buil 5-input tables, unless we nee to register all the outputs, in which case 6-input tables shoul be preferre. We may use, for instance, 6-input LUTs to implement ivision by 3 (γ = 2) in raix 16 (α = 4). Implementing the core loop costs 6 LUTs (for a 6 bits in, 6 bits out table). The cost for a fully combinatorial (or unrolle) ivier by 3 on n bits is n/4 6 LUT6s, for instance 36 LUT6s for 24 bits (single precision), or 78 LUTs for 53 bits (ouble precision). The best shift-an-a algorithm to ate nees respectively 118 an 317 full-aers (FA), each FA consuming one LUT both in Xilinx an in Altera evices. The approach propose here is four times as efficient on ivision by 3. The larger, the more inefficient this approach becomes, as we nee more bits to represent the r i. For larger constants, a secon option is the embee memory block, from 9Kbits to 144 Kbits epening on the architecture. We will use them as

5 (9Kbits), (18Kbits or 36KBits) or (144 KBits). For ivision by 3, we may now use α = 7 to α = 11, but these larger memories also push the relevance of this technique to larger constants. These memories are not combinatorial, their inputs must be registere: they are best suite to either sequential, or unrolle but pipeline implementation. In the latter case, we may exploit the fact that all these embee memories are ual-porte: two iterations may be unrolle in one single memory block as epicte in Figure 4. Again for ivision by 3, exploiting the M9K blocks of a Stratix IV (using α = 7), a fully pipeline single-precision ivier by 3 coul be impemente in 2 M9K only (2*2*7=28 bits) an run in 4 cycles at the maximal practical spee supporte by these evices. We have no experimental ata to support these claims as we implemente only the logic-base iviers so far. Inee, results in Section 4 suggest that architectures base on embee RAMs woul not be very competitive. x 3 x 2 x 1 x 0 LUT LUT LUT LUT q 3 q 2 q 1 q 0 r Fig. 4. A pipeline ivier using two ual-porte embee RAMs 3 Division of a floating-point number by a small integer constant A floating-point input X is given by its mantissa m an exponent e: x = 2 e m with m [1, 2). Similarly, the floating-point representation of our integer ivisor is: = 2 s with [1, 2) with s = γ 1 if is not a power of two. As the mantissa has a fixe number of bits, its normalization an rouning have to be performe for almost each floating-point operation [9]. 5

6 3.1 Normalization Let us write the ivision x = m.2e = 2s m 2e s. As 2s m = m [0.5, 2), this is almost the normalize mantissa of the floatingpoint representation of the result: if m, then m [1, 2), the mantissa is correctly normalize an the floating-point number to be returne is ( 2 s ) m y = 2 e s where (z) enotes the IEEE-stanar rouning to nearest even of a real z. if m <, then m [0.5, 1), the mantissa has to be shifte left by one. Thus, the floating-point number to be returne is ( 2 s+1 ) m y = 2 e s 1. It can be observe that the comparison between m an is extremely cheap for small integers because has only γ non-zero bits. Thus, the comparison is reuce to the comparison of these γ bits to the leaing γ bits of m. As both m an have a leaing one, we nee a comparator on γ 1 bits. In terms of latency, this is a very small elay using fast-carry propagation. 3.2 Rouning Let us now aress the issue of correctly rouning the mantissa fraction. If we ignore the remainer, the obtaine result is the rouning towars zero of the floating-point ivision. To obtain correct rouning to the nearest, a first iea is to consier the final remainer. If it is larger than /2, we shoul roun up, i.e. increment the mantissa. The comparison to /2 woul cost nothing (actually the last table woul hol the result of this comparison instea of the remainer value), but this woul mean an aition of the full mantissa size, which woul consume some logic an have a latency comparable to the ivision itself, ue to carry propagation. A better iea is to use the ientity (z) = z + 1 2, which in our case becomes ( 2 s+ɛ ) m 2 s+ɛ m = s+ɛ m + /2 = 2 with ɛ being 0 if m, an 1 otherwise. In the floating-point context we may assume that is o, since powers of two are manage as exponents. Let us write = 2h + 1. We obtain ( 2 s+ɛ ) m 2 s+ɛ m + h = s+ɛ m + h = 2 6

7 so instea of aing a roun bit to the result, we may a h to the ivien before its input into the integer ivisor. It seems we haven t won much, but this pre-aition is actually for free: the aen h = 1 2 is an s-bit number, an we have to a it to the mantissa of x that is shifte left by s + ɛ bits, so it is a mere concatenation. Thus, we save the aer area an the carry propagation latency. ξ e m 1 m <? s s ftz Exn s 1 ov +1 h iv by ξ e m Fig. 5. Floating-point ivision by a small constant. To sum up, the management of a floating-point input as to the area an latency of the mantissa ivier those of one (small) exponent aer, an of one (large) mantissa multiplexer, as illustrate by Figure 5. On this figure, ξ is a 2-bit exception vector use to represent 0, ± an NaN (Not a Number). The implementation in FloPoCo manages ivisions by small integer constants an all their powers of two. The only aitional issues are in the overflow/unerflow logic (the Exn box on Figure 5), but they are too straightforwar to be etaile here. 4 Results an comparison All the results in this section are obtaine for architectures generate by FloPoCo 2.3.0, using ISE 12.1 for an FPGA with 6-input LUTs (Virtex-5). These are synthesis results before place an route, which is perfectly meaningful for such tiny operators. Table 1 provies some results for Eucliean ivision (integer ivision with remainer). We only report the architecture obtaine with the optimal value of α. 7

8 n = 32 bits n = 64 bits constant LUT6 (preicte) latency LUT6 (preicte) latency = 3 (α = 4, γ = 2) 47 (6*8=48) 7.14ns 95 (6*16=96) 14.8ns = 5 (α = 3, γ = 3) 60 (6*11=66) 6.79ns 125 (6*22=132) 13.8ns = 7 (α = 3, γ = 3) 60 (6*11=66) 7.30ns 125 (6*22=132) 15.0ns Table 1. Synthesis results for combinatorial Eucliean ivision on Virtex Integer ivision One woul believe that for such simple architectures, we can preict the synthesis results, at least with respect to LUT count. However, there are still some surprises, which we are currently investigating. The first surprise is that the synthesis tools perform further optimization out of our esigns: the LUT numbers are not always those preicte (they are always better). For instance, for the 64-bit ivier by 3, we preict simply 96 LUT6, but the tool reports 15 LUT3, 18 LUT4, 16 LUT5, an only 45 LUT6, then merges that into 95 LUTs. One of the reasons coul be that some remainer values never occur, which means that there are on t care in the logic tables that enable further optimizations. This woul explain that the results are better for ivision by 5 than for ivision by 7 although they have the same α an β: there are more on t care in the table for 5. Such improvements shoul be stuie systematically. Also, we have mentione earlier that the sweet spot on Virtex-5 shoul be to use 5-input LUTs, but the synthesis tools seem to ecie otherwise: architectures esigne for 5-input LUTs actually consume more than those esigne for 6-input LUTs. This coul come from a coing style issue, or from a misunerstaning of the intricate etails of the Virtex-5 logic block. Table 2 provies some synthesis results for pipeline iviers by 3. Each line is a ifferent frequency/area traeoff (incientally, thanks to FloPoCo s pipelining framework [1], this flexible pipeline took less than ten minutes to implement out of the combinatorial esign). Here we have to investigate why the LUT number is larger than the preicte size. n = 32 bits n = 64 bits FF + LUT6 performance FF + LUT6 performance 33 Reg + 47 LUT MHz 122 Reg LUT MHz 58 Reg + 62 LUT MHz 168 Reg LUT MHz 68 Reg + 72 LUT MHz 172 Reg LUT MHz Table 2. Synthesis results for pipeline Eucliean ivision by 3 on Virtex-5 8

9 4.2 Floating-point ivision Table 3 shows results for floating-point ivision by 3. The behaviour of these operators, incluing the fact that they return correctly roune results, has been verifie by simulation against millions of test vectors generate by an inepenent floating-point ivision by 3 [1]. single precision ouble precision FF + LUT6 performance FF + LUT6 performance 35 Reg + 69 LUT MHz 122 Reg LUT MHz 105 Reg + 83 LUT MHz 245 Reg LUT MHz Table 3. Synthesis results for pipeline floating-point ivision by 3 on Virtex-5 For comparison, a single precision stanar (non-constant) floating-point ivier consumes 1122 reg an 945 LUT an nees MHz. 4.3 Comparison with previous work A review of several algorithms for ivision by a constant is available in [6]. Many of these algorithms require the ivision to be exact (null remainer) an return wrong results otherwise. We will not consier them. Among the remaining techniques, the most relevant is metho 6 in [6]. In this metho, the ivisor has the form 2 t ± 1, which correspons to most of the small ivisors we are targeting. The quotient an the remainer are obtaine through n γ 1 aitions an substractions involving n-bit numbers. Table 4 summarizes the comparison of the size of our implementation an an estimation of the area of an FPGA implementation of this previous technique. It can be observe that in this implementation, the larger, the fewer require aitions, therefore the smaller the implementation. This means that this metho is increasingly relevant for larger constants 2 t ±1, an this is a metho to investigate in the future. Our proposition remains very significally smaller for the small ivisors that it targets. Besies, it oesn t involve any carry propagation, so its latency shoul also be better, but this remains to be quantifie experimentally. n = 16 bits n = 32 bits n = 64 bits Constant Our [6] Our [6] Our [6] Table 4. Comparison of the size in LUT between the implementation of our ivier an [6] on Virtex 5 9

10 The presente floating-point ivision by a small constant also largely outperforms the best technique use so far, which are base on multiplication by the constant 1/ using shift-an-a algorithm [4]. For instance, using this technique, a ouble-precision multiplication by 1/3, in the conitions of Table 3, consumes 282 reg LUT an runs in MHz. 5 Conclusion This article as ivision by a small integer constant such as 3 or 10 to the bestiary of arithmetic operators that C-to-harware compilers can use when they target FPGAs. This operation can be implemente very efficiently, be it for integer inputs, or for floating-point inputs. It is now part of the open-source FloPoCo generator. Some synthesis results suggest that a careful stuy of the tables coul lea to further optimizations. In aition, we shoul try to reformulate our tables so that the propagation of the r i uses the fast-carry lines available on all moern FPGAs: this woul reuce the latency ramatically. Another issue worth of interest is the case of larger constants that are prouct of smaller constants, for which a cascae implementation coul be stuie. Due to routing pressure, the number of inputs to the FPGA LUTs keeps increasing as technology progresses. This shoul make this technique increasingly relevant in the future. References 1. F. e Dinechin an B. Pasca, Designing custom arithmetic ata paths with FloPoCo, IEEE Design & Test of Computers, vol. 28, no. 4, Aug M. D. Ercegovac an T. Lang, Digital Arithmetic. Morgan Kaufmann, E. Artzy, J. A. Hins, an H. J. Saal, A fast ivision technique for constant ivisors, Communications of the ACM, vol. 19, pp , Feb F. e Dinechin, Multiplication by rational constants, IEEE Transactions on Circuits an Systems, II, 2012, to appear. 5. S.-Y. R. Li, Fast constant ivision routines, IEEE Transactions on Computers, vol. C-34, no. 9, pp , Sep P. Srinivasan an F. Petry, Constant-ivision algorithms, IEE Proc. Computers an Digital Techniques, vol. 141, no. 6, pp , Nov R. W. Doran, Special cases of ivision, Journal of Universal Computer Science, vol. 1, no. 3, pp , A. Paplinski, CSE2306/1308 Digital Logic Lecture Note, Lecture 8, Clayton School of Information Technology Monash University, Australia, J.-M. Muller, N. Brisebarre, F. e Dinechin, C.-P. Jeannero, V. Lefèvre, G. Melquion, N. Revol, D. Stehlé, an S. Torres, Hanbook of Floating-Point Arithmetic. Birkhauser Boston,

11 A Proof of correctness of Algorithm 1 The proof procees in two steps. First, we establish that x = k i=0 q i.2 αi +r 0 in lemma 1 below. This shows tha we compute some kin of Eucliean ivision, but it is not enough: we also nee to show that the q i form a binary representation of the result. For this it is enough to show that they are raix-2 α igits, which is establishe thanks to lemma 2 below. Lemma 1. k x = q i.2 αi + r 0 i=0 Proof. To show this lemma, we use the efinition of the Eucliean ivision of y i by : y i = q i + r i. x = k 1 i=0 x i.2 αi = k 1 i=0 (x i + 2 α r i+1 ).2 αi k 1 i=0 (2α r i+1 ).2 αi = k 1 i=0 (q i + r i ).2 αi k i=1 r i.2 αi = k 1 i=0 q i.2 αi + r 0 r k.2 αk Lemma 2. i 0 y i 2 α 1 an r k = 0. Proof. The igit x i verifies by efinition 0 x i 2 α 1; r i+1 is either 0 (initialization) or the remainer of a ivision by, therefore 0 r i 1. Therefore y i = x i +2 α r i+1 verifies 0 y i 2 α 1+2 α ( 1), or 0 y i 2 α 1. We euce from the previous lemma an the efinition of q i as quotient of y i by that i 0 q i 2 α 1 which shows that the q i are inee raix-2 α igits. Thanks to Lemma 1, they are the igits of the quotient. 11

Table-based division by small integer constants

Table-based division by small integer constants Table-based division by small integer constants Florent De Dinechin, Laurent-Stéphane Didier To cite this version: Florent De Dinechin, Laurent-Stéphane Didier. Table-based division by small integer constants.

More information

EFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER

EFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER FFICINT ON-LIN TSTING MTHOD FOR A FLOATING-POINT ADDR A. Droz, M. Lobachev Department of Computer Systems, Oessa State Polytechnic University, Oessa, Ukraine Droz@ukr.net, Lobachev@ukr.net Abstract In

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

A Formal Model and Efficient Traversal Algorithm for Generating Testbenches for Verification of IEEE Standard Floating Point Division

A Formal Model and Efficient Traversal Algorithm for Generating Testbenches for Verification of IEEE Standard Floating Point Division A Formal Moel an Efficient Traversal Algorithm for Generating Testbenches for Verification of IEEE Stanar Floating Point Division Davi W. Matula, Lee D. McFearin Department of Computer Science an Engineering

More information

Vendor Agnostic, High Performance, Double Precision Floating Point Division for FPGAs

Vendor Agnostic, High Performance, Double Precision Floating Point Division for FPGAs Vendor Agnostic, High Performance, Double Precision Floating Point Division for FPGAs Xin Fang and Miriam Leeser Dept of Electrical and Computer Eng Northeastern University Boston, Massachusetts 02115

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Hybrid Position-Residues Number System

Hybrid Position-Residues Number System Hybri Position-Resiues Number System Karim Bigou, Arnau Tisseran To cite this version: Karim Bigou, Arnau Tisseran. Hybri Position-Resiues Number System. J. Hormigo; S. Oberman; N. Revol. ARITH: 3r Symposium

More information

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,

More information

RADIX CONVERSION FOR IEEE MIXED RADIX FLOATING-POINT ARITHMETIC

RADIX CONVERSION FOR IEEE MIXED RADIX FLOATING-POINT ARITHMETIC RADIX CONVERSION FOR IEEE754-8 MIXED RADIX FLOATING-POINT ARITHMETIC Olga Kupriianova UPMC Paris 6 LIP6 PEQUAN team 4, place Jussieu 75252 Paris Cedex 05, France Email: olga.kupriianova@lip6.fr Christoph

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Algebraic transformations of Gauss hypergeometric functions

Algebraic transformations of Gauss hypergeometric functions Algebraic transformations of Gauss hypergeometric functions Raimunas Viūnas Faculty of Mathematics, Kobe University Abstract This article gives a classification scheme of algebraic transformations of Gauss

More information

Supporting Fully Adaptive Routing in InfiniBand Networks

Supporting Fully Adaptive Routing in InfiniBand Networks XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

Pipelined FPGA Adders

Pipelined FPGA Adders 010 International Conference on Field Programmable Logic and Applications Pipelined FPGA Adders Florent de Dinechin, Hong Diep Nguyen, Bogdan Pasca LIP, projet Arénaire ENS de Lyon 6 allée d Italie, 6936

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

NORTHEASTERN UNIVERSITY Graduate School of Engineering. Approved for Thesis Requirements of the Master of Science Degree

NORTHEASTERN UNIVERSITY Graduate School of Engineering. Approved for Thesis Requirements of the Master of Science Degree NORTHEASTERN UNIVERSITY Graduate School of Engineering Thesis Title: Variable Precision Floating Point Reciprocal, Division and Square Root for Major FPGA vendors Author: Xin Fang Department: Electrical

More information

You Can Do That. Unit 16. Motivation. Computer Organization. Computer Organization Design of a Simple Processor. Now that you have some understanding

You Can Do That. Unit 16. Motivation. Computer Organization. Computer Organization Design of a Simple Processor. Now that you have some understanding .. ou Can Do That Unit Computer Organization Design of a imple Clou & Distribute Computing (CyberPhysical, bases, Mining,etc.) Applications (AI, Robotics, Graphics, Mobile) ystems & Networking (Embee ystems,

More information

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations

More information

1 Surprises in high dimensions

1 Surprises in high dimensions 1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

2-connected graphs with small 2-connected dominating sets

2-connected graphs with small 2-connected dominating sets 2-connecte graphs with small 2-connecte ominating sets Yair Caro, Raphael Yuster 1 Department of Mathematics, University of Haifa at Oranim, Tivon 36006, Israel Abstract Let G be a 2-connecte graph. A

More information

Vendor Agnostic, High Performance, Double Precision Floating Point Division for FPGAs

Vendor Agnostic, High Performance, Double Precision Floating Point Division for FPGAs Vendor Agnostic, High Performance, Double Precision Floating Point Division for FPGAs Presented by Xin Fang Advisor: Professor Miriam Leeser ECE Department Northeastern University 1 Outline Background

More information

Implementation and Evaluation of NAS Parallel CG Benchmark on GPU Cluster with Proprietary Interconnect TCA

Implementation and Evaluation of NAS Parallel CG Benchmark on GPU Cluster with Proprietary Interconnect TCA Implementation an Evaluation of AS Parallel CG Benchmark on GPU Cluster with Proprietary Interconnect TCA Kazuya Matsumoto 1, orihisa Fujita 2, Toshihiro Hanawa 3, an Taisuke Boku 1,2 1 Center for Computational

More information

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic

WLAN Indoor Positioning Based on Euclidean Distances and Fuzzy Logic WLAN Inoor Positioning Base on Eucliean Distances an Fuzzy Logic Anreas TEUBER, Bern EISSFELLER Institute of Geoesy an Navigation, University FAF, Munich, Germany, e-mail: (anreas.teuber, bern.eissfeller)@unibw.e

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Learning Polynomial Functions. by Feature Construction

Learning Polynomial Functions. by Feature Construction I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Digital Logic Design. Midterm #1

Digital Logic Design. Midterm #1 The University of Toleo f6ms_il7.fm - EECS: igital Logic esign r. Anthony. Johnson Stuent Name_ igital Logic esign Miterm # Problems Points. 3. 4 3. 6 4. Total 5 Was the eam fair? yes no 9/9/6 The University

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information

Unit 15. Building Wide Muxes. Building Wide Muxes. Common Hardware Components WIDE MUXES

Unit 15. Building Wide Muxes. Building Wide Muxes. Common Hardware Components WIDE MUXES 5. 5.2 Unit 5 Common Harware Components WIE MUXE 5.3 5.4 Builing Wie Muxes Builing Wie Muxes o far muxesonly have single bit inputs I is only -bit I is only -bit What if we still want to select between

More information

Considering bounds for approximation of 2 M to 3 N

Considering bounds for approximation of 2 M to 3 N Consiering bouns for approximation of to (version. Abstract: Estimating bouns of best approximations of to is iscusse. In the first part I evelop a powerseries, which shoul give practicable limits for

More information

Pipelined FPGA Adders

Pipelined FPGA Adders Laboratoire de l Informatique du Parallélisme École Normale Supérieure de Lyon Unité Mixte de Recherche CNRS-INRIA-ENS LYON-UCBL n o 5668 Florent de Dinechin, Hong Diep Nguyen, Bogdan Pasca Pipelined FPGA

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stolyar Abstract Backpressure-base aaptive routing

More information

Chapter 9 Memory Management

Chapter 9 Memory Management Contents 1. Introuction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threas 6. CPU Scheuling 7. Process Synchronization 8. Dealocks 9. Memory Management 10.Virtual Memory

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks Coorinating Distribute Algorithms for Feature Extraction Offloaing in Multi-Camera Visual Sensor Networks Emil Eriksson, György Dán, Viktoria Foor School of Electrical Engineering, KTH Royal Institute

More information

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

A Multi-class SVM Classifier Utilizing Binary Decision Tree

A Multi-class SVM Classifier Utilizing Binary Decision Tree Informatica 33 (009) 33-41 33 A Multi-class Classifier Utilizing Binary Decision Tree Gjorgji Mazarov, Dejan Gjorgjevikj an Ivan Chorbev Department of Computer Science an Engineering Faculty of Electrical

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Politecnico i Torino Porto Institutional Repository [Proceeing] Automatic March tests generation for multi-port SRAMs Original Citation: Benso A., Bosio A., i Carlo S., i Natale G., Prinetto P. (26). Automatic

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember 107 IEICE TRANS INF & SYST, VOLE88 D, NO5 MAY 005 LETTER An Improve Neighbor Selection Algorithm in Collaborative Filtering Taek-Hun KIM a), Stuent Member an Sung-Bong YANG b), Nonmember SUMMARY Nowaays,

More information

FPGA Matrix Multiplier

FPGA Matrix Multiplier FPGA Matrix Multiplier In Hwan Baek Henri Samueli School of Engineering and Applied Science University of California Los Angeles Los Angeles, California Email: chris.inhwan.baek@gmail.com David Boeck Henri

More information

Divide-and-Conquer Algorithms

Divide-and-Conquer Algorithms Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:

More information

Integer and Floating-Point Constant Multipliers for FPGAs

Integer and Floating-Point Constant Multipliers for FPGAs Integer and Floating-Point Constant Multipliers for FPGAs Nicolas Brisebarre, Florent de Dinechin, Jean-Michel Muller LIP (CNRS/INRIA/ENS-Lyon/UCBL) Université de Lyon {Nicolas.Brisebarre, Florent.de.Dinechin,

More information

Compiler Optimisation

Compiler Optimisation Compiler Optimisation Michael O Boyle mob@inf.e.ac.uk Room 1.06 January, 2014 1 Two recommene books for the course Recommene texts Engineering a Compiler Engineering a Compiler by K. D. Cooper an L. Torczon.

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stoylar arxiv:15.4984v1 [cs.ni] 27 May 21 Abstract

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

Finite Automata Implementations Considering CPU Cache J. Holub

Finite Automata Implementations Considering CPU Cache J. Holub Finite Automata Implementations Consiering CPU Cache J. Holub The finite automata are mathematical moels for finite state systems. More general finite automaton is the noneterministic finite automaton

More information

Optimal Oblivious Path Selection on the Mesh

Optimal Oblivious Path Selection on the Mesh Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Solutions to Tutorial 1 (Week 8)

Solutions to Tutorial 1 (Week 8) The University of Syney School of Mathematics an Statistics Solutions to Tutorial 1 (Week 8) MATH2069/2969: Discrete Mathematics an Graph Theory Semester 1, 2018 1. In each part, etermine whether the two

More information

6 Gradient Descent. 6.1 Functions

6 Gradient Descent. 6.1 Functions 6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output

More information

Modifying ROC Curves to Incorporate Predicted Probabilities

Modifying ROC Curves to Incorporate Predicted Probabilities Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,

More information

Coupon Recalculation for the GPS Authentication Scheme

Coupon Recalculation for the GPS Authentication Scheme Coupon Recalculation for the GPS Authentication Scheme Georg Hofferek an Johannes Wolkerstorfer Graz University of Technology, Institute for Applie Information Processing an Communications (IAIK), Inffelgasse

More information

A fast embedded selection approach for color texture classification using degraded LBP

A fast embedded selection approach for color texture classification using degraded LBP A fast embee selection approach for color texture classification using egrae A. Porebski, N. Vanenbroucke an D. Hama Laboratoire LISIC - EA 4491 - Université u Littoral Côte Opale - 50, rue Ferinan Buisson

More information

Recitation Caches and Blocking. 4 March 2019

Recitation Caches and Blocking. 4 March 2019 15-213 Recitation Caches an Blocking 4 March 2019 Agena Reminers Revisiting Cache Lab Caching Review Blocking to reuce cache misses Cache alignment Reminers Due Dates Cache Lab (Thursay 3/7) Miterm Exam

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Linus Svärm Petter Stranmark Centre for Mathematical Sciences, Lun University {linus,petter}@maths.lth.se Abstract Shift-map image processing is a new framework base on energy

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

How to Make E-cash with Non-Repudiation and Anonymity

How to Make E-cash with Non-Repudiation and Anonymity How to Make E-cash with Non-Repuiation an Anonymity Ronggong Song an Larry Korba Institute for Information Technology National Research Council of Canaa Ottawa, Ontario K1A 0R6, Canaa {Ronggong.Song, Larry.Korba}@nrc.ca

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus

More information

PERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING

PERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING PERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING PAMELA RUSSELL ADVISOR: PAUL CULL OREGON STATE UNIVERSITY ABSTRACT. Birchall an Teor prove that

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

Figure 1: 2D arm. Figure 2: 2D arm with labelled angles

Figure 1: 2D arm. Figure 2: 2D arm with labelled angles 2D Kinematics Consier a robotic arm. We can sen it commans like, move that joint so it bens at an angle θ. Once we ve set each joint, that s all well an goo. More interesting, though, is the question of

More information

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.

More information

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science

More information

Technical Report TR Navigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar

Technical Report TR Navigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar Technical Report Department of Computer Science an Engineering niversity of Minnesota 4-192 Keller Hall 2 nion Street SE Minneapolis, MN 55455-159 SA TR 15-5 Navigation Aroun an nknown Obstacle for Autonomous

More information

Top-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications

Top-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications Top-own Connectivity Policy Framework for Mobile Peer-to-Peer Applications Otso Kassinen Mika Ylianttila Junzhao Sun Jussi Ala-Kurikka MeiaTeam Department of Electrical an Information Engineering University

More information

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly

More information

Chapter 03: Computer Arithmetic. Lesson 09: Arithmetic using floating point numbers

Chapter 03: Computer Arithmetic. Lesson 09: Arithmetic using floating point numbers Chapter 03: Computer Arithmetic Lesson 09: Arithmetic using floating point numbers Objective To understand arithmetic operations in case of floating point numbers 2 Multiplication of Floating Point Numbers

More information

New Geometric Interpretation and Analytic Solution for Quadrilateral Reconstruction

New Geometric Interpretation and Analytic Solution for Quadrilateral Reconstruction New Geometric Interpretation an Analytic Solution for uarilateral Reconstruction Joo-Haeng Lee Convergence Technology Research Lab ETRI Daejeon, 305 777, KOREA Abstract A new geometric framework, calle

More information

6.823 Computer System Architecture. Problem Set #3 Spring 2002

6.823 Computer System Architecture. Problem Set #3 Spring 2002 6.823 Computer System Architecture Problem Set #3 Spring 2002 Stuents are strongly encourage to collaborate in groups of up to three people. A group shoul han in only one copy of the solution to the problem

More information

Variable Independence and Resolution Paths for Quantified Boolean Formulas

Variable Independence and Resolution Paths for Quantified Boolean Formulas Variable Inepenence an Resolution Paths for Quantifie Boolean Formulas Allen Van Geler http://www.cse.ucsc.eu/ avg University of California, Santa Cruz Abstract. Variable inepenence in quantifie boolean

More information

Design of Policy-Aware Differentially Private Algorithms

Design of Policy-Aware Differentially Private Algorithms Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft

More information

Hardware division by small integer constants

Hardware division by small integer constants Hardware division by small integer constants Fatih Ugurdag, Florent e inechin, Yılmaz Serhan Gener, Sezer Gören, Laurent-Stéphane idier To cite this version: Fatih Ugurdag, Florent e inechin, Yılmaz Serhan

More information

Navigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar

Navigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar Navigation Aroun an nknown Obstacle for Autonomous Surface Vehicles sing a Forwar-Facing Sonar Patrick A. Plonski, Joshua Vaner Hook, Cheng Peng, Narges Noori, Volkan Isler Abstract A robotic boat is moving

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural

More information

NAND flash memory is widely used as a storage

NAND flash memory is widely used as a storage 1 : Buffer-Aware Garbage Collection for Flash-Base Storage Systems Sungjin Lee, Dongkun Shin Member, IEEE, an Jihong Kim Member, IEEE Abstract NAND flash-base storage evice is becoming a viable storage

More information

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

Inuence of Cross-Interferences on Blocked Loops: to know the precise gain brought by blocking. It is even dicult to determine for which problem

Inuence of Cross-Interferences on Blocked Loops: to know the precise gain brought by blocking. It is even dicult to determine for which problem Inuence of Cross-Interferences on Blocke Loops A Case Stuy with Matrix-Vector Multiply CHRISTINE FRICKER INRIA, France an OLIVIER TEMAM an WILLIAM JALBY University of Versailles, France State-of-the art

More information