On Cooperative Local Repair in Distributed Storage

Size: px
Start display at page:

Download "On Cooperative Local Repair in Distributed Storage"

Transcription

1 On Coopeative Loca Repai in Distibuted Stoae Anit Sinh Rawat Depatment of ECE The Univesity of Texas at Austin Austin, TX 7871 Emai: Aya Mazumda Depatment of ECE Univesity of Minnesota Twin Cities Minneapois, MN Emai: Siam Vishwanath Depatment of ECE The Univesity of Texas at Austin Austin, TX 7871 Emai: Abstact Easue-coectin codes, that suppot oca epai of codewod symbos, have attacted substantia attention ecenty fo thei appication in distibuted stoae systems. In this pape we study a eneaization of the usua ocay ecoveabe codes. We conside such codes that any sma set of codewod symbos is ecoveabe fom a sma numbe of othe symbos. We ca this coopeative oca epai. We pesent bounds on the dimension of such codes as we as ive expicit constuctions of famiies of codes. Some othe esuts eadin coopeative oca epai ae aso pesented, incudin an anaysis fo the Hadamad codes. I. INTRODUCTION In this pape we expoe a new cass of codes that enabe efficient ecovey fom the faiue (easue) of a sma numbe of code symbos. In paticua, we study codes with (, )- ocaity which aow fo any faied codes symbos to be ecoveed by contactin othe intact code symbos. Ou study of such codes is motivated by thei appication in distibuted stoae systems a..a. coud stoae, whee infomation is stoed ove a netwo of stoae nodes (diss). In distibuted stoae systems, one has to intoduce edundancy in ode to potect the stoed infomation aainst inevitabe node (dis) faiues. The taditiona easue codes ae hihy sub-optima fo distibuted stoae settin as these codes incu hih cost of code epai [1]. Recenty, mutipe casses of easue codes have been poposed to optimize the pefomance of code epai pocess with espect to vaious metics. In paticua, the codes that minimize epai-bandwidth, i.e., the numbe of bits communicated duin a node epai, ae studied in [1] [4] and efeences theein. Anothe famiy of easue codes that focus on sma ocaity, i.e., enabin epai of sine code symbo by contactin a sma numbe of othe code symbos, ae pesented in [5] [9]. A code is said to have a-symbo ocaity of if evey code symbo is a function of at most othe code symbos. This ensues oca epai of each code symbo by contactin at most othe code symbos. In this pape we eneaize the notion of codes with a-symbo ocaity to codes with (, )- ocaity: any set of code symbos ae functions of at most othe code symbos. This aows fo coopeative oca epai of code symbos, whee a oups of code symbos is epaied by contactin at most othe code symbos. The appoach of coopeative code epai has been peviousy expoed in the context of epai-bandwidth efficient codes in [10], [11] and efeences theein. In this pape we addess two impotant issues eadin codes with (, )-ocaity: 1) obtainin tade-offs amon minimum distance, dimension, and ocaity paametes (, ) fo such code; and ) pesentin expicit constuctions fo codes with (, )-ocaity that ae cose to the obtained tade-offs. We pesent a foma definition of codes with (, )-ocaity in Section II. In Section III, we obtain an uppe bound on the minimum distance of a code with (, )-ocaity which encodes infomation symbos to n symbos on codewods. We then bound the best possibe ate fo a code with (, )-ocaity. In Section IV we pesent two constuctions fo the codes that have (, )-ocaity and comment on thei ates with espect to the bound obtained in Section III. In Section IV-D, we study the punctued Hadamad codes (a..a. Simpex codes) in the context of coopeative oca epai. In Section IV-E we eneaize the Patition code famewo fom Section IV-A. We biefy conside the settin of andom easues in Section IV-F. A shot note on notation: we use bod owe case ettes to denote vectos. Fo an intee n 1, [n] denotes the set {1,,..., n}. II. CODES WITH (, )-LOCALITY Definition 1. Let C be an (n, ) code. We ca C to be an (n, ) code with (, )-ocaity if fo each S [n] with S =, we have a set Γ S [n]\s such that 1) Γ S, ) Fo any codewod c = (c 1, c,..., c n ) C, the code symbos c S := {c i : i S} ae functions of the code symbos symbos c ΓS := {c i : i Γ S }. Note that Definition 1 ensues that any code symbos can be coopeativey epaied fom at most othe code symbos. This eneaizes the notion of codes with a-symbo ocaity [5], [6], [1], [13], whee ocaity is defined with espect to one code symbo, i.e., = 1. Rema 1. Fo a code C with a-symbo ocaity, we have the foowin bound on its minimum distance [5], [6]. d min (C) n +. (1) The code attainin the bound in (1) ae pesented in [6] [9] and efeences theein.

2 III. RATE VS. DISTANCE TRADE-OFF FOR CODES WITH (, )-LOCALITY In this section, fo iven and, we pesent a tade-off between the ate and the minimum distance of a code with (, )-ocaity (cf. Definition 1). We empoy the enea poof technique intoduced in [5], [14], [15] to obtain the foowin esut. Theoem 1. Let C be an (n, ) code (inea, o non-inea) with (, )-ocaity. Then, the minimum distance of C satisfies d min (C) n + 1 ( 1 ). () Aoithm: Constuction of sub-code C C. Input: (n, ) code C F n q with (, )-ocaity. 1: C 0 = C : = 0 3: whie C > q do 4: = : Choose i 1, i,..., i [n] such that, fo evey m [], thee exist at east two codewods in C 1 that diffe at i m-th coodinate. 6: Let R = Γ {i 1,...,i } be the index of at most code symbos that coopeativey epai code symbos indexed by {i 1,..., i }. 7: Let y F R q be the most fequent eement in the muti-set {x R : x C 1 F n q }. 8: Define C := {x : x C 1 F n q and x R = y}. 9: if 1 < C q then 10: C = C. 11: end whie 1: ese if C = 1 then 13: Pic a maxima subset R R such that C > 1, whee C := {x : x C 1 F n q, x R = ỹ } and ỹ F R q be the most fequent eement in the muti-set {x R : x C 1 F n q }. 14: C = C. 15: end whie. 16: end if 17: end whie Output: C. Fi. 1: Constuction of sub-code C C. Poof: The poof invoves constuction of a subcode C C such that a but a sma numbe of coodinates in evey codewod of C ae fixed. Note that we have d min (C) d min (C ). (3) Given C, one can obtain a code C with C = C by emovin fixed coodinates fom a the codewod in C. This impies that d min (C ) = d min (C ), which aon with (3) ive us the foowin. d min (C) d min (C ). (4) We descibe the constuction of the subcode C in Fi. 1. Befoe poceedin with the anaysis, we aue the coectness of the aoithm in Fi. 1. Note that it is aways possibe to find coodinates {i 1, i,..., i } at ine 5. When the aoithm eaches ine 5, the subcode C 1 has moe than q codewods. Theefoe, thee must be at east coodinates in the codewods in C 1 that ae not fixed in the pevious iteations. This aso impies that, fo m [], i m / I 1 := ) (R {i 1,..., i } [n]. (5) [ 1] Note that the code symbos indexed by I 1 ae fixed in C 1. Thus, we must have R = Γ {i 1,...,i } I 1. Othewise, {i 1,..., i } woud have been fixed in the pevious iteations. Assumin that the constuction in Fi. 1 ends in t-th iteation, we obtain in Appendix A that and t 1. (6) o q C I t + t. (7) Now, we define C = C It which denotes the code obtained by punctuin the codewods in C at the coodinates associated with the set I t. We have C = C and d min (C ) = d min (C ). Moeove, the enth of the codewods in C is n I. Next, appyin the Sineton bound on C ives us d min (C) d min (C ) n I t o q C + 1 n I t ( I t + t) + 1 = n t + 1, (8) It foows fom (8) and (6) that d min (C) n + 1 ( 1 ). (9) The anaysis of the minimum distance when the constuction in Fi 1 ends at ine 15 is pesented in Appendix A. This competes the poof. Note that an (n, ) code with (, )-ocaity has its minimum distance at east +1 as it can ecove fom the easue of any code symbos (cf. Definition 1). Combinin this obsevation with Theoem 1, we obtain the foowin esut. Cooay 1. The ate of an (n, ) code with (, )-ocaity is bounded as n +. (10)

3 Poof: It foows fom () and the fact d min (C) + 1 that + 1 d min (C) n + 1 ( 1 ). (11) Usin 1 1, we et o + n, n +. IV. CONSTRUCTION OF CODES WITH (, )-LOCALITY In this section we addess the issue of constuctin hih ate codes that have (, )-ocaity. In paticua, we descibe two simpe constuctions that ensue coopeative oca epai fo the faiue of any code symbos: 1) Patition code and ) Poduct code. In Patition code, we patition the infomation symbos in oups of symbo and encode each oup with an ( +, )-MDS code (cf. Section IV-A. On the othe hand, a poduct code is obtained by aanin = ( ) infomation symbos in an -dimensiona aay and then intoducin paity symbos aon diffeent dimensions of the aay (cf. Section IV-B). A. Patition Code Fo the ease of exposition, we assume that,, and ( ). Given infomation symbo ove Fq, a Patition code encodes these symbos into n = + symbos on codewods as foows (see Fi. ): 1) Patition infomation symbos into = oups of size each. ) Encode the symbos in each of the oups usin an ( +, )-MDS code ove F q. We efe to the + code symbos obtained by encodin infomation symbo in the i-th oup as i-th oca oup. As it is cea fom the constuction, Patition code has ate n = +. Moeove, a code symbo can be ecoveed fom any othe code symbo fom its oca oup. In the wost case, when faied code symbos beon to distinct oca oup, we can ecove a symbos fom = code symbos, downoadin symbos fom each of the oca oups containin one faied code symbo. B. Poduct Code Poduct codes ae a we nown famiy of codes in the codin theoy iteatue. Given = ( ) infomation symbos and, we fist aane = ( ) infomation symbos in an -dimensiona aay with index of each dimension of the aay anin in the set [ ]. These infomation symbos ae then encoded to obtain an n = ( + 1) symbos on code wod. In the foowin we descibe the encodin pocess fo = -dimensiona aay (see Fi. 3). The eneaization of the encodin pocess fo hihe dimensions is staihtfowad. 1) Aane = ( ) infomation symbos in an aay. ) Fo each ow of the aay, add a paity symbo by summin a symbos in the ow and append these symbos to thei espective ows. 3) Fo each of the + 1 coumns of the updated aay, add a paity by summin a symbos in the coumn. m 1 m m p 1 m +1 m + m p m γ+1 m γ+ m 4 p c 1 p c p c. p p c +1 Fi. 3: Desciption of Poduct code constuction with =. {p 1, p,..., p } denote the paity nodes associated with each ow of the two dimensiona aay of infomation symbos. {p c 1, p c,..., p +1} epesent the paity symbos fo the coumns of the updated aay. We use γ to denote ( 1). C. Compaison between Patition and Poduct code We now compae the ate of Patition code and Poduct code with the bound in (10). Fo any 1, we have ( ) + +. (1) Note that (1) foows fom the fact that ( + ) ( + 1 ) + ( ( ) i i) = ( + ). i Theefoe, Patition code appoach povides (, )-ocaity with a bette ate. Howeve, fo a system paametes, the ate of Patition code is smae than the nown bound (10), i.e., + +. Hee, we woud ie to note that the diffeence between the ate achieved by the Patition code and the bound in (10) ets smae as the paamete becomes ae as compaed to the paamete. It is an inteestin pobem to eithe tihten the bound in (10) o pesent a constuction fo codes with (, )- ocaity which have hihe ate than that of Patition code. i= D. Coopeative Loca Repai fo Hadamad Codes Hee, we comment on the oca epaiabiity of punctued Hadamad codes. Punctued Hadamad codes ae aso efeed to as Simpex codes, which ae the dua codes of Hammin codes. In paticua, we show that an [n = 1,, 1 ] punctued Hadamad code has ( = + 1, ) ocaity fo any n 1. An [n = 1,, 1 ] punctued Hadamad code encodes a bits on messae (m 1, m,..., m ) to an n = 1 codewod c = (c 1, c,..., c n= 1 such that c i = m b i (mod). =1

4 m = (m 1, m,..., m ) F q m 1 m m m +1 m + m m +1 m + m ( +, )-MDS code ( +, )-MDS code ( +, )-MDS code c 1 c c c + c ++1 c ++ c + c + c τ+1 c τ+ c n c n oca oup 1 oca oup Fi. : Iustation of the encodin pocess of Patition code. oca oup Hee b i = (b i 1, b i,..., b i ) F denotes the binay epesentation of the intee i [ 1]. In an [n = 1,, 1 ] punctued Hadamad code, we have c i + c = c i+, whee 1 1 and i [ 1]. Moeove, we note that an [n = 1,, 1 ] punctued Hadamad code has a paticua stuctua popety: fo any <, the pefix of enth 1 of each codewod is a codewod of the [ñ = 1,, 1 ] punctued Hadamad code which encodes the messae (m 1, m,..., m ). We now pesent the main esut of this subsection: Lemma 1. In an [n = 1,, 1 ] punctued Hadamad code, any 1 n 1 easues can be coected by contactin at most + 1 othe code symbos. Poof: We pove the Lemma by usin induction ove. Fo base case, we conside =, whee the [n = 3 = 1,, ] punctued Hadamad code encodes the messae (m 1, m ) to a codewod (c 1, c, c 3 ) = (m 1, m, m 1 +m ). In this case any = 1 easue can be ecoveed by contactin othe + 1 = code symbos. Fo exampe, one can ecove c = m fom (c 1, c 3 ) = (m 1, m 1 + m 3 ). Fo inductive step, we assume that the Lemma hods fo any punctued code of dimension up to 1. Conside the [n = 1,, 1 ] punctued Hadamad code of dimension, and two cases eadin the positions of eased code symbos. Case 1: Thee ae x 1 easues amon the fist n = 1 1 code symbos. Note that the fist n = 1 1 code symbos constitute a codewod of an [ n = 1 1, 1, ] punctued Hadamad code. Theefoe, fom the inductive hypothesis, one can coect the x easues amon the fist n code symbos by contactin x + 1 othe code symbos out of these n code symbos. Now, if the symbo c 1 in easue, we can ecove it by contactin one of the uneased symbo amon {c +1, c 1 +,..., c 1 n= 1} say c 1 + and the coespondin code symbo c fom the fist n code symbos. Now, we can epai the emainin eased symbos amon {c 1 +1, c 1 +,..., c n= 1} fom c 1 and the coespondin code symbo amon the fist n code symbos. Fo exampe, if we want to ecove the symbo c 1 +m, we can use c 1 and c m to econstuct c 1 +m. In the wost case, we contact +1 code symbos duin the epai of a easues. Case : Thee ae x easues amon the fist n = 1 1 code symbos. In this case, we fist ecove the code symbo c 1, if it is in easue. Without oss of eneaity we assume that c 1 is in easue. Note that thee ae n 1 = 1 distinct pais of code symbos {c i, c 1 +i} i [ 1 ] that can ecove c 1. Since we have at most n 1 1 = 1 1 easues apat fom c 1, one of the 1 pais {c i, c +i} 1 i [ 1 ] must be intact. This pai aows us to ecove c 1. Now that we now the symbo c 1 = m, we can emove the contibution of m fom any of the ast 1 code symbos {c 1 +1, c 1 +,..., c n= 1}. Simiay, we can add m to any of the fist n = 1 1 code symbos {c 1, c,..., c 1}. Theefoe, we can educe the Case to Case 1 of the poof, and epai any 1 easues by contactin at most code symbos. Combinin both cases competes the poof. E. Geneaization of Patition Code Appoach In the constuction of the Patition codes, as descibed in Section IV-A, we use an ( +, ) MDS code to encode disoint oups of messae symbos. Note that the ate of this MDS code ovens the ate of the ovea code. One can potentiay use anothe code C oca of minimum distance at east + 1 to encode disoint oups of messae symbos. Now, we use (x), x [] to denote the numbe of symbos that needs to be contacted to epai x easue in one oca oup. Fo the case when an ( +, ) MDS code is used, we have (x) = fo x []. Let (x) denote the uppe concave enveope of (x) on the inteva [1, ] R. Assume that we have disoint oca oups, then a patten of easues can be epesented by a vecto ( 1,,..., ). Hee, i denotes the numbe of easues within i-th oca oup. Note that we have i=1 i =. Fo a iven oca code C oca, one needs to access i=1 ( i) numbe of intact code symbos to epai the easue patten ( 1,,..., ). Now, we use concavity of ( ), the fact that (x) (x) fo x [], and Jensen s inequaity to obtain the

5 foowin. ( i ) i=1 ( i ) ( i=1 = ( ) i=1 i ) (13) Since the ate of the Patition code is anostic to the numbe of oca oups, we can use the vaue of which minimizes the R.H.S. of (13). This appoach optimizes the vaue of fo a iven choice of and C oca. F. Comment of Random Easues The constuctions in Section IV-A & IV-B ae desined to aow fo the coopeative oca epais in the case of advesaia easue pattens. One can conside the settin whee easues occu accodin to a andom mode. Hee, we biefy comment on the settin whee easues ae unifomy distibuted amon the code symbos. Moeove, we assume and to be ae enouh. We conside the constuction of Section IV-A, that is, the Patition codes. In this case, with easonaby hih pobabiity (dependin on and ), ( each ) oca oup (a tota of them) expeiences about t Θ numbe of easues. Theefoe, with hih pobabiity, one can pefom coopeative oca epai of andom easues even if an ( + t, )-MDS code in empoyed in the constuction of the Patition code (cf. Section IV-A). This tansates to a codin scheme with +t the ovea ate of. One can tae ae enouh to optimize this vaue. Indeed, usin the techniques of [16], it can be shown that, fo andom easues, the patition codes ae asymptoticay optima. REFERENCES [1] A. Dimais, P. Godfey, Y. Wu, M. Wainwiht, and K. Ramchandan. Netwo codin fo distibuted stoae systems. IEEE Tans. Inf. Theoy, 56(9): , 010. [] K. Rashmi, N. Shah, and P. Kuma. Optima exact-eeneatin codes fo distibuted stoae at the MSR and MBR points via a poduct-matix constuction. IEEE Tans. Inf. Theoy, 57:57 539, 011. [3] I. Tamo, Z. Wan, and J. Buc. Ziza codes: Mds aay codes with optima ebuidin. IEEE Tans. Inf. Theoy, 59(3): , 013. [4] D. Papaiiopouos, A. Dimais, and V. Cadambe. Repai optima easue codes thouh hadamad desins. IEEE Tans. Inf. Theoy, 59(5): , 013. [5] P. Gopaan, C. Huan, H. Simitci, and S. Yehanin. On the ocaity of codewod symbos. IEEE Tans. Inf. Theoy, 58(11): , 01. [6] D. Papaiiopouos and A. Dimais. Locay epaiabe codes. In Poc. of IEEE ISIT, 01. [7] A. S. Rawat, O. O. Koyuou, N. Sibestein, and S. Vishwanath. Optima ocay epaiabe and secue codes fo distibuted stoae systems. IEEE Tans. Inf. Theoy, 60(1):1 36, 014. [8] G. Kamath, N. Paash, V. Laitha, and P. Kuma. Codes with oca eeneation. CoRR, abs/ , 01. [9] I. Tamo and A. Ba. A famiy of optima ocay ecoveabe codes. CoRR, abs/ , 013. [10] N. Le Scouanec A.-M. Kemaec and G. Staub. Repaiin mutipe faiues with coodinated and adaptive eeneatin codes. In Poc. Intenationa Symposium on Netwo Codin, 011. [11] K. W. Shum and Y. Hu. Coopeative eeneatin codes. IEEE Tans. Inf. Theoy, 59(11):79 758, 013. [1] F. Oie and A. Datta. Sef-epaiin homomophic codes fo distibuted stoae systems. In Poc. of INFOCOM, 011. [13] N. Paash, G. Kamath, V. Laitha, and P. Kuma. Optima inea codes with a oca-eo-coection popety. In Poc. of IEEE ISIT, 01. [14] V. R. Cadambe and A. Mazumda. An uppe bound on the size of ocay ecoveabe codes. CoRR, abs/ , abs/ , 013. [15] M. Fobes and S. Yehanin. On the ocaity of codewod symbos in non-inea codes. CoRR, abs/ , 013. [16] A. Mazumda, V. Chanda, and G. W. Wone. Loca ecovey popeties of capacity achievin codes. In Infomation Theoy and Appications Woshop (ITA), 013, paes 1 3. IEEE, 013. APPENDIX A PART OF THE PROOF OF THEOREM 1 Fo the constuction of a subcode as descibed in Fi. 1, we define A = I \I 1 R {i 1,..., i } and a = A. Assumin that the whie oop in Fi. 1 ends with = t, fo [t], we have I = A, [] whee we tae union of the disoint sets A, []. Note that the code symbos indexed by the set {i 1,..., i } ae functions of the code symbos indexed by the set R = Γ {i 1,...,i }. Theefoe, at ine 7, thee ae at most qa possibiities fo y. This impies that C C 1 /q a. (14) The constuction of the subcode C can end at eithe ine 11 o ine 15. Hee we anyze ony the case when the constuction ends at ine 11. In this case, we have C t q, o 1 o q C t (a +1 ). (15) Now, usin that a A R {i 1,..., i } +, we et which ives us that 1 (a +1 ) t, (16) t Note that sub-code C = C t. Theefoe, o q C = o q C t 1. (17) o q C (a +1 ) = a +1 + t (a) = I t + t (18) whee (a) foows fom the fact that I t is union of the disoint sets A.

Perfect Bayesian Equilibrium in Extensive- Form Games Ù

Perfect Bayesian Equilibrium in Extensive- Form Games Ù Pefect Bayesian Equiibium in Extensive-Fom Games Page Pefect Bayesian Equiibium in Extensive- Fom Games Ù Intoduction Bayes Requiement Bayes Requiement Bayes Requiement 5 Bayes Requiement 4 6 A Refinement

More information

CS 5114: Theory of Algorithms. Sorting. Insertion Sort. Exchange Sorting. Clifford A. Shaffer. Spring 2010

CS 5114: Theory of Algorithms. Sorting. Insertion Sort. Exchange Sorting. Clifford A. Shaffer. Spring 2010 Depatment of Compute Science Viginia Tech Backsbug, Viginia Copyight c 10 by Ciffod A. Shaffe 3 4 5 7 : Theoy of Agoithms Tite page : Theoy of Agoithms Ciffod A. Shaffe Sping 10 Ciffod A. Shaffe Depatment

More information

FACE VECTORS OF FLAG COMPLEXES

FACE VECTORS OF FLAG COMPLEXES FACE VECTORS OF FLAG COMPLEXES ANDY FROHMADER Abstact. A conjectue of Kalai and Eckhoff that the face vecto of an abitay flag complex is also the face vecto of some paticula balanced complex is veified.

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

Low Rate Concatenated Zigzag-Hadamard Codes

Low Rate Concatenated Zigzag-Hadamard Codes Low Rate Concatenated Zigzag-Hadamad Codes Guosen Yue,W.K.Leung,LiPing and Xiaodong Wang NEC Laboatoy Ameica, Inc., Pinceton, NJ 854. Dept. of Electonic Eng., City Univesity of Hong Kong. Dept. of Electical

More information

An Extension to the Local Binary Patterns for Image Retrieval

An Extension to the Local Binary Patterns for Image Retrieval , pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science

More information

Layer Partition-based Matching Algorithm of DDM

Layer Partition-based Matching Algorithm of DDM Laye Patition-based Matching Agoithm of DDM Nwe Nwe Myint Thein, and Nay Min Tun Abstact High Leve Achitectue (HLA) is achitectue fo euse and inteopeation of simuations. In HLA paadigm, the Runtime Infastuctue

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

On Error Estimation in Runge-Kutta Methods

On Error Estimation in Runge-Kutta Methods Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

Embeddings into Crossed Cubes

Embeddings into Crossed Cubes Embeddings into Cossed Cubes Emad Abuelub *, Membe, IAENG Abstact- The hypecube paallel achitectue is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

Distributed Dynamic Capacity Contracting: An overlay congestion pricing framework for differentiated-services architecture

Distributed Dynamic Capacity Contracting: An overlay congestion pricing framework for differentiated-services architecture Distibuted Dynamic apacity ontacting: An oveay congestion picing famewok fo diffeentiated-sevices achitectue Muat Yukse Shivkuma Kayanaaman Anuj Goe Rensseae Poytechnic Institute oy NY yuksem@cspiedu shivkuma@ecsepiedu

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen Accuate Diffaction Efficiency Contol fo Multiplexed Volume Hologaphic Gatings Xuliang Han, Gichel Kim, and Ray T. Chen Micoelectonic Reseach Cente Depatment of Electical and Compute Engineeing Univesity

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

Comparisons of Transient Analytical Methods for Determining Hydraulic Conductivity Using Disc Permeameters

Comparisons of Transient Analytical Methods for Determining Hydraulic Conductivity Using Disc Permeameters Compaisons of Tansient Analytical Methods fo Detemining Hydaulic Conductivity Using Disc Pemeametes 1,,3 Cook, F.J. 1 CSRO Land and Wate, ndoooopilly, Queensland The Univesity of Queensland, St Lucia,

More information

A Novel Image-Based Rendering System With A Longitudinally Aligned Camera Array

A Novel Image-Based Rendering System With A Longitudinally Aligned Camera Array EUOGAPHICS 2 / A. de Sousa, J.C. Toes Shot Pesentations A Novel Image-Based endeing System With A Longitudinally Aligned Camea Aay Jiang Li, Kun Zhou, Yong Wang and Heung-Yeung Shum Micosoft eseach, China

More information

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing IEEE TRANSACTIONS ON COMPUTERS, VOL. 50, NO. 9, SEPTEMBER 200 949 Dynamic Multiple Paity (DMP) Disk Aay fo Seial Tansaction Pocessing K.H. Yeung, Membe, IEEE, and T.S. Yum, Senio Membe, IEEE AbstactÐThe

More information

Cardiac C-Arm CT. SNR Enhancement by Combining Multiple Retrospectively Motion Corrected FDK-Like Reconstructions

Cardiac C-Arm CT. SNR Enhancement by Combining Multiple Retrospectively Motion Corrected FDK-Like Reconstructions Cadiac C-Am CT SNR Enhancement by Combining Multiple Retospectively Motion Coected FDK-Like Reconstuctions M. Pümme 1, L. Wigstöm 2,3, R. Fahig 2, G. Lauitsch 4, J. Honegge 1 1 Institute of Patten Recognition,

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

A ROI Focusing Mechanism for Digital Cameras

A ROI Focusing Mechanism for Digital Cameras A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula

More information

ART GALLERIES WITH INTERIOR WALLS. March 1998

ART GALLERIES WITH INTERIOR WALLS. March 1998 ART GALLERIES WITH INTERIOR WALLS Andé Kündgen Mach 1998 Abstact. Conside an at galley fomed by a polygon on n vetices with m pais of vetices joined by inteio diagonals, the inteio walls. Each inteio wall

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

A Neural Network Model for Storing and Retrieving 2D Images of Rotated 3D Object Using Principal Components

A Neural Network Model for Storing and Retrieving 2D Images of Rotated 3D Object Using Principal Components A Neual Netwok Model fo Stong and Reteving 2D Images of Rotated 3D Object Using Pncipal Components Tsukasa AMANO, Shuichi KUROGI, Ayako EGUCHI, Takeshi NISHIDA, Yasuhio FUCHIKAWA Depatment of Contol Engineeng,

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

Segmentation Based Recovery of Arbitrarily Warped Document Images

Segmentation Based Recovery of Arbitrarily Warped Document Images Segmentation Based Recovey of Abitaiy Waped Document Images B. Gatos, I. Patikakis and K. Ntiogiannis Computationa Inteigence Laboatoy, Institute of Infomatics and Teecommunications, Nationa Cente fo Scientific

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Reachable State Spaces of Distributed Deadlock Avoidance Protocols

Reachable State Spaces of Distributed Deadlock Avoidance Protocols Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications

More information

A Full-mode FME VLSI Architecture Based on 8x8/4x4 Adaptive Hadamard Transform For QFHD H.264/AVC Encoder

A Full-mode FME VLSI Architecture Based on 8x8/4x4 Adaptive Hadamard Transform For QFHD H.264/AVC Encoder 20 IEEE/IFIP 9th Intenational Confeence on VLSI and System-on-Chip A Full-mode FME VLSI Achitectue Based on 8x8/ Adaptive Hadamad Tansfom Fo QFHD H264/AVC Encode Jialiang Liu, Xinhua Chen College of Infomation

More information

Intuitionistic Fuzzy Soft N-ideals

Intuitionistic Fuzzy Soft N-ideals Intenational Jounal of Fuzzy Mathematics and Systems. ISSN 2248-9940 Volume 3, Numbe 4 (2013), pp. 259-267 Reseach India Publications http://www.ipublication.com Intuitionistic Fuzzy Soft N-ideals A. Solaiaju

More information

Cloud-Aided Wireless Networks with Edge Caching: Fundamental Latency Trade-Offs in Fog Radio Access Networks

Cloud-Aided Wireless Networks with Edge Caching: Fundamental Latency Trade-Offs in Fog Radio Access Networks 206 IEEE Intenational Symposium on Infomation Theoy Cloud-Aided Wieless Netwos with Edge Caching: Fundamental Latency Tade-Offs in Fog Radio Access Netwos Ravi Tandon Osvaldo Simeone Depatment of ECE Univesity

More information

Erasure-Coding Based Routing for Opportunistic Networks

Erasure-Coding Based Routing for Opportunistic Networks Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant

More information

A Multiphase Image Segmentation Based on Fuzzy Membership Functions and L1-norm Fidelity

A Multiphase Image Segmentation Based on Fuzzy Membership Functions and L1-norm Fidelity Jounal of Scientific Computing manuscipt No. will be inseted by the edito) A Multiphase Image Segmentation Based on Fuzzy Membeship Functions and L1-nom Fidelity Fang Li Stanley Oshe Jing Qin Ming Yan

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

Also available at ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010)

Also available at  ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) Also available at http://amc.imfm.si ISSN 1855-3966 (pinted edn.), ISSN 1855-3974 (electonic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) 109 120 Fulleene patches I Jack E. Gave Syacuse Univesity, Depatment

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

The Role of Switching in Reducing Network Port Counts

The Role of Switching in Reducing Network Port Counts The Role of Switchin in Reducin Netwok Pot Counts Eytan Modiano Randall Bey MIT Laboatoy fo Infomation Nothwesten Univesity and Decision Systems Dept. of Electical & Comp. En. Cambide, MA 02139 Evanston,

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,

More information

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,

More information

Clustering Interval-valued Data Using an Overlapped Interval Divergence

Clustering Interval-valued Data Using an Overlapped Interval Divergence Poc. of the 8th Austalasian Data Mining Confeence (AusDM'9) Clusteing Inteval-valued Data Using an Ovelapped Inteval Divegence Yongli Ren Yu-Hsn Liu Jia Rong Robet Dew School of Infomation Engineeing,

More information

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology, (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Efficient Candidacy Reduction Fo Fequent Patten Mining M.H Nadimi-Shahaki 1, Nowati Mustapha 2, Md Nasi B Sulaiman 2, Ali B Mamat

More information

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences Ameican Jounal of ata ining and Knowledge iscovey 27; 2(4): 2-8 http://www.sciencepublishinggoup.com//admkd doi:.648/.admkd.2724.2 Genealized Gey Taget ecision ethod Based on ecision akes Indiffeence Attibute

More information

A Novel Parallel Deadlock Detection Algorithm and Architecture

A Novel Parallel Deadlock Detection Algorithm and Architecture A Novel Paallel Deadlock Detection Aloithm and Achitectue Pun H. Shiu 2, Yudon Tan 2, Vincent J. Mooney III {ship, ydtan, mooney}@ece.atech.ed }@ece.atech.edu http://codesin codesin.ece.atech.eduedu,2

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

The EigenRumor Algorithm for Ranking Blogs

The EigenRumor Algorithm for Ranking Blogs he EigenRumo Algoithm fo Ranking Blogs Ko Fujimua N Cybe Solutions Laboatoies N Copoation akafumi Inoue N Cybe Solutions Laboatoies N Copoation Masayuki Sugisaki N Resonant Inc. ABSRAC he advent of easy

More information

ICRU Recommended Dose and Volume Specification for Reporting Interstitial Brachytherapy

ICRU Recommended Dose and Volume Specification for Reporting Interstitial Brachytherapy ICRU Recommended ose and Volume pecification fo Repotin Intestitial Bachytheapy Ali. Meiooni Ph.. Univesity of entucky Medical Cente epatment of Radiation Medicine exinton Y Table of Contents Intoduction

More information

Coordinate Systems. Ioannis Rekleitis

Coordinate Systems. Ioannis Rekleitis Coodinate Systems Ioannis ekleitis Position epesentation Position epesentation is: P p p p x y z P CS-417 Intoduction to obotics and Intelligent Systems Oientation epesentations Descibes the otation of

More information

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes On the Convesion between Binay Code and BinayReflected Gay Code on Boolean Cubes The Havad community has made this aticle openly available. Please shae how this access benefits you. You stoy mattes Citation

More information

Cryptanalysis of Hwang-Chang s a Time-Stamp Protocol for Digital Watermarking

Cryptanalysis of Hwang-Chang s a Time-Stamp Protocol for Digital Watermarking Cyptanalysis of Hwang-Chang s a Time-Stamp Potocol fo Digital Watemaking *Jue-Sam Chou, Yalin Chen 2, Chung-Ju Chan 3 Depatment of Infomation Management, Nanhua Univesity Chiayi 622 Taiwan, R.O.C *: coesponding

More information

A Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces

A Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces A Family of Distibuted Deadlock Avoidance Potocols and thei Reachable State Spaces Césa Sánchez, Henny B. Sipma, and Zoha Manna Compute Science Depatment Stanfod Univesity, Stanfod, CA 94305-9025 {cesa,sipma,manna}@cs.stanfod.edu

More information

AUTOMATED LOCATION OF ICE REGIONS IN RADARSAT SAR IMAGERY

AUTOMATED LOCATION OF ICE REGIONS IN RADARSAT SAR IMAGERY AUTOMATED LOCATION OF ICE REGIONS IN RADARSAT SAR IMAGERY Chistophe Waceman (1), William G. Pichel (2), Pablo Clement-Colón (2) (1) Geneal Dynamics Advanced Infomation Systems, P.O. Box 134008 Ann Abo

More information

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad

More information

Query Language #1/3: Relational Algebra Pure, Procedural, and Set-oriented

Query Language #1/3: Relational Algebra Pure, Procedural, and Set-oriented Quey Language #1/3: Relational Algeba Pue, Pocedual, and Set-oiented To expess a quey, we use a set of opeations. Each opeation takes one o moe elations as input paamete (set-oiented). Since each opeation

More information

Effective Data Co-Reduction for Multimedia Similarity Search

Effective Data Co-Reduction for Multimedia Similarity Search Effective Data Co-Reduction fo Multimedia Similaity Seach Zi Huang Heng Tao Shen Jiajun Liu Xiaofang Zhou School of Infomation Technology and Electical Engineeing The Univesity of Queensland, QLD 472,

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the

More information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220

More information

Improved Fourier-transform profilometry

Improved Fourier-transform profilometry Impoved Fouie-tansfom pofilomety Xianfu Mao, Wenjing Chen, and Xianyu Su An impoved optical geomety of the pojected-finge pofilomety technique, in which the exit pupil of the pojecting lens and the entance

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

arxiv: v4 [cs.ds] 7 Feb 2018

arxiv: v4 [cs.ds] 7 Feb 2018 Dynamic DFS in Undiected Gaphs: beaking the O(m) baie Suende Baswana Sheejit Ray Chaudhuy Keeti Choudhay Shahbaz Khan axiv:1502.02481v4 [cs.ds] 7 Feb 2018 Depth fist seach (DFS) tee is a fundamental data

More information

TESSELLATIONS. This is a sample (draft) chapter from: MATHEMATICAL OUTPOURINGS. Newsletters and Musings from the St. Mark s Institute of Mathematics

TESSELLATIONS. This is a sample (draft) chapter from: MATHEMATICAL OUTPOURINGS. Newsletters and Musings from the St. Mark s Institute of Mathematics TESSELLATIONS This is a sample (daft) chapte fom: MATHEMATICAL OUTPOURINGS Newslettes and Musings fom the St. Mak s Institute of Mathematics James Tanton www.jamestanton.com This mateial was and can still

More information

Fifth Wheel Modelling and Testing

Fifth Wheel Modelling and Testing Fifth heel Modelling and Testing en Masoy Mechanical Engineeing Depatment Floida Atlantic Univesity Boca aton, FL 4 Lois Malaptias IFMA Institut Fancais De Mechanique Advancee ampus De lemont Feand Les

More information

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300

More information

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs Fault-Toleant Routing Schemes in RDT(,,)/α-Based Inteconnection Netwok fo Netwoks-on-Chip Designs Mei Yang, Tao Li, Yingtao Jiang, and Yulu Yang Dept. of Electical & Compute Engineeing Univesity of Nevada,

More information

Separability and Topology Control of Quasi Unit Disk Graphs

Separability and Topology Control of Quasi Unit Disk Graphs Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,

More information

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits

More information

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced

More information

IMAGE-GUIDED NON-LOCAL DENSE MATCHING WITH THREE-STEPS OPTIMIZATION

IMAGE-GUIDED NON-LOCAL DENSE MATCHING WITH THREE-STEPS OPTIMIZATION IMAGE-GUIDED NON-LOCAL DENSE MATCHING WITH THREE-STEPS OPTIMIZATION Xu Huang a, Yongjun Zhang a, *, Zhaoxi Yue a a Schoo of Remote Sensing and Infomation Engineeing, Wuhan Univesity, Wuhan, Hubei, China

More information

Shortest Paths for a Two-Robot Rendez-Vous

Shortest Paths for a Two-Robot Rendez-Vous Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number.

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number. Illustative G-C Simila cicles Alignments to Content Standads: G-C.A. Task (a, b) x y Fo this poblem, is a point in the - coodinate plane and is a positive numbe. a. Using a tanslation and a dilation, show

More information

Computational and Theoretical Analysis of Null Space and Orthogonal Linear Discriminant Analysis

Computational and Theoretical Analysis of Null Space and Orthogonal Linear Discriminant Analysis Jounal of Machine Leaning Reseach 7 2006) 1183 1204 Submitted 12/05; Revised 3/06; Published 7/06 Computational and Theoetical Analysis of Null Space and Othogonal Linea Disciminant Analysis Jieping Ye

More information

Concomitants of Upper Record Statistics for Bivariate Pseudo Weibull Distribution

Concomitants of Upper Record Statistics for Bivariate Pseudo Weibull Distribution Available at http://pvamuedu/aam Appl Appl Math ISSN: 93-9466 Vol 5, Issue (Decembe ), pp 8 9 (Peviously, Vol 5, Issue, pp 379 388) Applications and Applied Mathematics: An Intenational Jounal (AAM) Concomitants

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

The Dual Round Robin Matching Switch with Exhaustive Service

The Dual Round Robin Matching Switch with Exhaustive Service The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line

More information

UCLA Papers. Title. Permalink. Authors. Publication Date. Localized Edge Detection in Sensor Fields. https://escholarship.org/uc/item/3fj6g58j

UCLA Papers. Title. Permalink. Authors. Publication Date. Localized Edge Detection in Sensor Fields. https://escholarship.org/uc/item/3fj6g58j UCLA Papes Title Localized Edge Detection in Senso Fields Pemalink https://escholashipog/uc/item/3fj6g58j Authos K Chintalapudi Govindan Publication Date 3-- Pee eviewed escholashipog Poweed by the Califonia

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

Parametric Query Optimization for Linear and Piecewise Linear Cost Functions

Parametric Query Optimization for Linear and Piecewise Linear Cost Functions Paametic Quey Oimization fo Linea and Piecewise Linea Cost Functions Avind Hulgei S. Sudashan Indian Institute of Technology, Bombay {au, sudasha}@cse.iitb.ac.in Abstact The of a quey an depends on many

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

Linear Ensembles of Word Embedding Models

Linear Ensembles of Word Embedding Models Linea Ensembles of Wod Embedding Models Avo Muomägi Univesity of Tatu Tatu, Estonia avom@ut.ee Kaiit Sits Univesity of Tatu Tatu, Estonia kaiit.sits@ut.ee Sven Lau Univesity of Tatu Tatu, Estonia swen@math.ut.ee

More information