LECT-10, S-1 FP2P08, Javed I.
|
|
- Jack McKinney
- 5 years ago
- Views:
Transcription
1 A Course on Foundtions of Peer-to-Peer Systems & Applictions LECT-10, S-1 CS /799 Foundtion of Peer-to-Peer Applictions & Systems Kent Stte University Dept. of Computer Science PASTRY 2 1
2 [mechnics] Updte overview 1 clss strt+routing+node filure LECT-10, S-3 Pstry [updte.. Old] Overview Pstry: Sclble, decentrlized object loction nd routing for lrge-scle peer-to-peer systems, Antony Rowstron nd Peter Druschel, 2001 Topology Consistnt Hshing Key Spce Routing Lef Set Numericlly Closest Set Physiclly Closest Set Node Arrivl Bootstrpping Finding Zone Joining the Routing (Route Tble Updtes) Node Deprture Identifiction of Tkeover Node Recovery Algorithm Performnce Anlysis Evlution Stbility Robustness Lod blncing LECT-10, S-4 2
3 Pstry Topology LECT-10, S- Pstry An overly network tht provides selforgnizing routing nd loction service (like Chord). Seeks to minimize the distnce (sclr proimity metric like routing hops) messges trvel. Epected number of routing steps is O(log N); N=No. of Pstry nodes in the network LECT-10, S- 3
4 Pstry Topology Nodes re orgnized in circulr ID spce, using consistent DHT hshing. NodeId rndomly ssigned from {0,.., } A pstry node cn route to the numericlly closest node to given key in less thn log 2 b N steps. (b, L re configurtion prmeters) Despite concurrent node filures, delivery is gurnteed unless more thn L /2 nodes with djcent NodeIds fil simultneously Ech node join triggers O(log 2 b N) messges LECT-10, S-7 Pstry: Object distribution Consistent hshing O 128 bit circulr id spce nodeids (uniform rndom) objid/key objids/keys (uniform rndom) Invrint: node with numericlly closest nodeid mintins object nodeids LECT-10, S-8 4
5 Pstry: Object insertion/lookup Msg with key X is routed to live node with nodeid closest to X Problem: complete routing tble not fesible O X Route(X) LECT-10, S-9 Pstry Routing LECT-10, S-10
6 Node ID NodeIds re in bse 2 b n b NodId# LECT-10, S-11 Three Concept of Proimity Set of nodes with L /2 smller nd L /2 lrger numericlly closest NodeIds Prefi-bsed routing entries M physiclly closest nodes LECT-10, S-12
7 L nodes in lef set (typicl L= 2 b ) Routing Tble Dimensions log 2b N Rows (ctully log 2 b = 128/b) 2 b columns M neighbors (typicl M= 22 b ) LECT-10, S-13 How to select b? NodeIds re in bse 2 b One row for ech prefi of locl NodeId (Log 2 b N populted on verge) One for ech possible digit in the NodeId representtion 2 b 1 columns b defines the trdeoff: (Log 2 b N) (2 b 1) entries Vs. Log 2 b N routing hops LECT-10, S-14 7
8 8 PEER PEER-TO TO-PEER PEER LECT-10, S-1 Pstry: Prefi Tble (# 1fc Pstry: Prefi Tble (# 1fc) b c d e f b c d e f b c d e f b c d e f log 1 N rows Row 0 Row 1 Row 2 Row 3 PEER PEER-TO TO-PEER PEER LECT-10, S-1 A Hypotheticl Pstry node with ID A Hypotheticl Pstry node with ID Vlues: b = 2, nd l = 8. All numbers re in bse 4. The top row of the routing tble is row zero. The entries re common prefi with net digit - rest of nodeid.
9 Pstry: Lef Sets In lef set ech node mintins IP ddresses of the nodes with the L /2 numericlly closest lrger L /2 L /2 smller numericlly closest nodeids. Routing efficiency/robustness Fult detection (keep-live) Appliction-specific locl coordintion Neighborhood Set The neighborhood set M contins nodeids nd IP ddresses of M nodes those re physiclly closest (or s per some other proimity metric) to the locl node. Its use will be discussed in proimity routing discussion. LECT-10, S-18 9
10 Route Tble of A 1fc Route Tble of B d13d3 Route Tble of C d4213f Find (d41c) 1fc find B (d13d3) d13d3 finds C (d4213f) d4213f finds D(d42b) LECT-10, S-19 Pstry: Routing Route(d41c) d41c d471f1 d47c4 d42b d4213f d13d3 Properties log 1 N steps O(log N) stte 1fc LECT-10, S-20 10
11 Pstry Routing Algorithm (1) Single hop (2) Towrds better prefi-mtch (3) Towrds numericlly closer NodeId D: Messge Key L i : i th closest NodeId in lef set shl(a, B): Length of prefi shred by nodes A nd B R i LECT-10, S-21 j: (j, i) th entry of routing tble Pstry: Routing Procedure if (destintion is within rnge of our lef set) forwrd to numericlly closest member else let l = length of shred prefi let d = vlue of l-th digit in D s ddress if (R l d eists) forwrd to R l d else forwrd to known node tht () shres t lest s long prefi (b) is numericlly closer thn this node LECT-10, S-22 11
12 Routing Performnce: Intuition (1) Single hop, termintion (2) No. of nodes which prefi-mtch the key upto current length reduces by 2 b (3) Low probbility, dds one hop LECT-10, S-23 Pstry Self-Orgniztion LECT-10, S-24 12
13 Pstry: Node Addition d41c d471f1 d47c4 d42b d4213f New node: d41c Route(d41c) d13d3 1fc LECT-10, S-2 Self-orgniztion: Node Arrivl Arriving Node X knows nerby node A. X sks A to route join messge with key = NodeId(X). Messge is routed nd finds Z, whose NodeId is numericlly closest to NodeId(X) All nodes long the pth A, B,, Z send stte tbles to X X initilizes its stte using this informtion. X sends its stte to concerned nodes A Z X LECT-10, S-2 13
14 Stte Initiliztion (1) X borrows A s Neighborhood Set A is geogrphiclly closer to X so it is OK to borrow the set. A B Z X C LECT-10, S-27 Stte Initiliztion (2) Z ID is numericlly closest to X s Therefore: X s lef set is derived from Z s lef set A B Z X C LECT-10, S-28 14
15 Stte Initiliztion (3) X 0 set to A 0 X 1 set to B 1, X 2 set to C 2, Finlly, X trnsmits its lefset, neighborhood set nd routing tble to ech of the nodes in these sets. A B Z X C The totl messge cost is O(log 2b N). The constnt is 32 b. To hndle concurrent rrivl, etensive timestmps re used. LECT-10, S-29 Self-orgniztion: Node Filure (1) Detected when live node tries to contct filed node Updting Lef set get lef set from lrgest inde on the side of the filed node. L - L /2 or L L /2 L /2 bound on filed nodes This set prtilly overlps the present nodes lef set L nd etr nodes not in L. It thus selects the pproprite one. Verifies tht it is live nd dds. LECT-10, S-30 1
16 Self-orgniztion: Node Filure (2) Updting routing tble - To repir R d l, sk ny R i l i d in the sme row for its R d l If the unlikely cse its empty (no live node), with the right prefi then it contcts ny R i l+1 i d. thereby csting wider net. This process is highly unlikely to fil. LECT-10, S-31 Self-orgniztion: Node Filure (3) Updting neighborhood set This is not used in routing generlly. Ask ny live set-members for their neighbors LECT-10, S-32 1
17 Loclity Appliction provides the distnce function Invrint: All routing tble entries refer to node tht is ner the present node, ccording to the proimity metric, mong ll live nodes with n pproprite prefi Invrint mintined on self-orgniztion LECT-10, S-33 Hndling Mlicious Nodes Routing is deterministic Rndomize choice between multiple suitble cndidtes with bis towrds the best one LECT-10, S-34 17
18 Pstry Anlysis LECT-10, S-3 Routing Performnce The epected number of routing steps is log 2b N steps, ssuming ccurte routing tbles nd no recent node filures. Consider the three cses in the routing procedure. If messge is forwrded using the routing tble (lines 8), then the set of nodes whose ids hve longer prefi mtch with the key is reduced by fctor of 2 b in ech step, which mens the destintion is reched in log 2b N steps. If the key is within rnge of the lef set (lines 2 3), then the destintion node is t most one hop wy. The third cse rises when the key is not covered by the lef set (i.e., it is still more thn one hop wy from the destintion), but there is no routing tble entry. Assuming ccurte routing tbles nd no recent node filures, this mens tht node with the pproprite prefi does not eist (lines 11 14). The likelihood of this cse, given the uniform distribution of nodeids, depends on L. Anlysis shows tht with L = 2 b nd L = 22 b, the probbility tht this cse rises during given messge trnsmission is less thn.02 nd 0.00, respectively. When it hppens, no more thn one dditionl routing step results with high probbility. In the event of mny simultneous node filures, the number of routing steps required my be t worst liner in N, while the nodes re updting their stte. This is loose upper bound; in prctice, routing performnce degrdes grdully with the number of recent node filures (shown eperimentlly). Eventul messge delivery is gurnteed unless L /2 nodes with consecutive nodeids fil simultneously. The probbility of such filure cn be mde very low. LECT-10, S-3 18
19 Pstry Etensions: API & Applictions LECT-10, S-37 The Pstry API Opertions eported by Pstry nodeid = pstryinit(credentils,appliction) route(msg,key) Opertions eported by the ppliction working bove Pstry deliver(msg,key) forwrd(msg,key,netid) newlefs(lefset) LECT-10, S-38 19
Looking up objects in Pastry
Review: Pstry routing tbles 0 1 2 3 4 7 8 9 b c d e f 0 1 2 3 4 7 8 9 b c d e f 0 1 2 3 4 7 8 9 b c d e f 0 2 3 4 7 8 9 b c d e f Row0 Row 1 Row 2 Row 3 Routing tble of node with ID i =1fc s - For ech
More informationTopology-aware routing in structured peer-to-peer overlay networks
Topologywre routing in structured peertopeer overly networks Miguel Cstro Peter Druschel Y. Chrlie Hu Antony Rowstron Microsoft Reserch, 7 J J Thomson Close, Cmbridge, C3 F, UK. Rice University, Min Street,
More informationTopology-aware routing in structured peer-to-peer overlay networks
Topology-wre routing in structured peer-to-peer overly networks Miguel Cstro ½ Peter Druschel ¾ Y. Chrlie Hu Antony Rowstron ½ ½ Microsoft Reserch, 7 J J Thomson Close, Cmbridge, CB3 FB, UK. ¾ Rice University,
More informationExploiting network proximity in peer-to-peer overlay networks
Eploiting network proimity in peer-to-peer overly networks Miguel Cstro Peter Druschel Y. Chrlie Hu Antony Rowstron Microsoft Reserch, J J Thomson Close, Cmbridge, CB3 FB, UK. Rice University, Min Street,
More informationSecure routing for structured peer-to-peer overlay networks
Secure routing for structured peer-to-peer overly networks Miguel Cstro, Peter Druschel 2, Aylvdi Gnesh, Antony Rowstron nd Dn S. Wllch 2 Microsoft Reserch Ltd., 7JJThomson Avenue, Cmbridge, CB3 FB, UK
More informationInfrastructures for Cloud Computing and Big Data
University of Bologn Diprtimento di Informtic Scienz e Ingegneri (DISI) Engineering Bologn Cmpus Clss of Computer Networks M or Infrstructures for Cloud Computing nd Big Dt ONs nd Advnced Filesystems Antonio
More informationSelf-Organizing Hierarchical Routing for Scalable Ad Hoc Networking
1 Self-Orgnizing Hierrchicl Routing for Sclble Ad Hoc Networking Shu Du Ahmed Khn Sntshil PlChudhuri Ansley Post Amit Kumr Sh Peter Druschel Dvid B. Johnson Rudolf Riedi Rice University Abstrct As devices
More informationEngineer To Engineer Note
Engineer To Engineer Note EE-169 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit
More informationSupporting Complex Multi-dimensional Queries in P2P Systems
Supporting Complex Multi-dimensionl Queries in P2P Systems Bin Liu Wng-Chien Lee Di Lun Lee Deprtment of Computer Science Hong Kong University of Science nd Technology Deprtment of Computer Science nd
More informationNetwork Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved
Network Interconnection: Bridging CS 57 Fll 6 6 Kenneth L. Clvert All rights reserved The Prolem We know how to uild (rodcst) LANs Wnt to connect severl LANs together to overcome scling limits Recll: speed
More informationDistributed Systems Principles and Paradigms
Distriuted Systems Principles nd Prdigms Chpter 11 (version April 7, 2008) Mrten vn Steen Vrije Universiteit Amsterdm, Fculty of Science Dept. Mthemtics nd Computer Science Room R4.20. Tel: (020) 598 7784
More informationSolving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016
Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence Winter 2016 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl
More informationAnnouncements. CS 188: Artificial Intelligence Fall Recap: Search. Today. General Tree Search. Uniform Cost. Lecture 3: A* Search 9/4/2007
CS 88: Artificil Intelligence Fll 2007 Lecture : A* Serch 9/4/2007 Dn Klein UC Berkeley Mny slides over the course dpted from either Sturt Russell or Andrew Moore Announcements Sections: New section 06:
More informationx )Scales are the reciprocal of each other. e
9. Reciprocls A Complete Slide Rule Mnul - eville W Young Chpter 9 Further Applictions of the LL scles The LL (e x ) scles nd the corresponding LL 0 (e -x or Exmple : 0.244 4.. Set the hir line over 4.
More informationSolving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence
Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl component
More informationThe Distributed Data Access Schemes in Lambda Grid Networks
The Distributed Dt Access Schemes in Lmbd Grid Networks Ryot Usui, Hiroyuki Miygi, Yutk Arkw, Storu Okmoto, nd Noki Ymnk Grdute School of Science for Open nd Environmentl Systems, Keio University, Jpn
More informationScalable Distributed Data Structures: A Survey Λ
Sclble Distributed Dt Structures: A Survey Λ ADRIANO DI PASQUALE University of L Aquil, Itly ENRICO NARDELLI University of L Aquil nd Istituto di Anlisi dei Sistemi ed Informtic, Itly Abstrct This pper
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationPresentation Martin Randers
Presenttion Mrtin Rnders Outline Introduction Algorithms Implementtion nd experiments Memory consumption Summry Introduction Introduction Evolution of species cn e modelled in trees Trees consist of nodes
More informationSection 10.4 Hyperbolas
66 Section 10.4 Hyperbols Objective : Definition of hyperbol & hyperbols centered t (0, 0). The third type of conic we will study is the hyperbol. It is defined in the sme mnner tht we defined the prbol
More informationToday. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search
Uninformed Serch [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.] Tody Serch Problems Uninformed Serch Methods
More information9 Graph Cutting Procedures
9 Grph Cutting Procedures Lst clss we begn looking t how to embed rbitrry metrics into distributions of trees, nd proved the following theorem due to Brtl (1996): Theorem 9.1 (Brtl (1996)) Given metric
More informationMidterm 2 Sample solution
Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the
More informationCS 221: Artificial Intelligence Fall 2011
CS 221: Artificil Intelligence Fll 2011 Lecture 2: Serch (Slides from Dn Klein, with help from Sturt Russell, Andrew Moore, Teg Grenger, Peter Norvig) Problem types! Fully observble, deterministic! single-belief-stte
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationAnnouncements. CS 188: Artificial Intelligence Fall Recap: Search. Today. Example: Pancake Problem. Example: Pancake Problem
Announcements Project : erch It s live! Due 9/. trt erly nd sk questions. It s longer thn most! Need prtner? Come up fter clss or try Pizz ections: cn go to ny, ut hve priority in your own C 88: Artificil
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationWhat are suffix trees?
Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl
More information1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)
Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric
More informationCSE 401 Midterm Exam 11/5/10 Sample Solution
Question 1. egulr expressions (20 points) In the Ad Progrmming lnguge n integer constnt contins one or more digits, but it my lso contin embedded underscores. Any underscores must be preceded nd followed
More informationCSCI 446: Artificial Intelligence
CSCI 446: Artificil Intelligence Serch Instructor: Michele Vn Dyne [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.]
More informationCS 268: IP Multicast Routing
Motivtion CS 268: IP Multicst Routing Ion Stoic April 5, 2004 Mny pplictions requires one-to-mny communiction - E.g., video/udio conferencing, news dissemintion, file updtes, etc. Using unicst to replicte
More informationIP: Network Layer. Goals and Tasks. Routing. Switching. Switching (cont.) Datagram v/s Virtual Circuit. Overview Addressing Routing
IP: Network Lyer Overview Addressing Routing Overview Gols nd Tsks Routing Switching Issues Bsic ides TOC IP TOC IP Overview Gols nd Tsks Gols of Network Lyer Guide pckets from source to destintion Use
More informationAI Adjacent Fields. This slide deck courtesy of Dan Klein at UC Berkeley
AI Adjcent Fields Philosophy: Logic, methods of resoning Mind s physicl system Foundtions of lerning, lnguge, rtionlity Mthemtics Forml representtion nd proof Algorithms, computtion, (un)decidility, (in)trctility
More informationToday. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search.
CS 88: Artificil Intelligence Fll 00 Lecture : A* Serch 9//00 A* Serch rph Serch Tody Heuristic Design Dn Klein UC Berkeley Multiple slides from Sturt Russell or Andrew Moore Recp: Serch Exmple: Pncke
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationCSEP 573 Artificial Intelligence Winter 2016
CSEP 573 Artificil Intelligence Winter 2016 Luke Zettlemoyer Problem Spces nd Serch slides from Dn Klein, Sturt Russell, Andrew Moore, Dn Weld, Pieter Abbeel, Ali Frhdi Outline Agents tht Pln Ahed Serch
More informationNearest Keyword Set Search in Multi-dimensional Datasets
Nerest Keyword Set Serch in Multi-dimensionl Dtsets Vishwkrm Singh Deprtment of Computer Science University of Cliforni Snt Brbr, USA Emil: vsingh014@gmil.com Ambuj K. Singh Deprtment of Computer Science
More informationOverview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases
Overview Mobile computing nd dtbses Generl issues in mobile dt mngement Dt dissemintion Dt consistency Loction dependent queries Interfces Detils of brodcst disks thlis klfigopoulos Network rchitecture
More informationEfficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc
4th Ntionl Conference on Electricl, Electronics nd Computer Engineering (NCEECE 2015) Efficient Regulr Expression Grouping Algorithm Bsed on Lbel Propgtion Xi Chen, Shuqio Chenb nd Ming Moc Ntionl Digitl
More informationComplete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li
2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationOn the Detection of Step Edges in Algorithms Based on Gradient Vector Analysis
On the Detection of Step Edges in Algorithms Bsed on Grdient Vector Anlysis A. Lrr6, E. Montseny Computer Engineering Dept. Universitt Rovir i Virgili Crreter de Slou sin 43006 Trrgon, Spin Emil: lrre@etse.urv.es
More informationFile Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment
File Mnger Quick Reference Guide June 2018 Prepred for the Myo Clinic Enterprise Khu Deployment NVIGTION IN FILE MNGER To nvigte in File Mnger, users will mke use of the left pne to nvigte nd further pnes
More information2 Computing all Intersections of a Set of Segments Line Segment Intersection
15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design
More informationSlides for Data Mining by I. H. Witten and E. Frank
Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully
More informationRegular Expression Matching with Multi-Strings and Intervals. Philip Bille Mikkel Thorup
Regulr Expression Mtching with Multi-Strings nd Intervls Philip Bille Mikkel Thorup Outline Definition Applictions Previous work Two new problems: Multi-strings nd chrcter clss intervls Algorithms Thompson
More informationMath 142, Exam 1 Information.
Mth 14, Exm 1 Informtion. 9/14/10, LC 41, 9:30-10:45. Exm 1 will be bsed on: Sections 7.1-7.5. The corresponding ssigned homework problems (see http://www.mth.sc.edu/ boyln/sccourses/14f10/14.html) At
More informationCS481: Bioinformatics Algorithms
CS481: Bioinformtics Algorithms Cn Alkn EA509 clkn@cs.ilkent.edu.tr http://www.cs.ilkent.edu.tr/~clkn/teching/cs481/ EXACT STRING MATCHING Fingerprint ide Assume: We cn compute fingerprint f(p) of P in
More informationA New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method
A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,
More informationP(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have
Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using
More informationFall 2018 Midterm 2 November 15, 2018
Nme: 15-112 Fll 2018 Midterm 2 November 15, 2018 Andrew ID: Recittion Section: ˆ You my not use ny books, notes, extr pper, or electronic devices during this exm. There should be nothing on your desk or
More informationMid-term exam. Scores. Fall term 2012 KAIST EE209 Programming Structures for EE. Thursday Oct 25, Student's name: Student ID:
Fll term 2012 KAIST EE209 Progrmming Structures for EE Mid-term exm Thursdy Oct 25, 2012 Student's nme: Student ID: The exm is closed book nd notes. Red the questions crefully nd focus your nswers on wht
More informationUT1553B BCRT True Dual-port Memory Interface
UTMC APPICATION NOTE UT553B BCRT True Dul-port Memory Interfce INTRODUCTION The UTMC UT553B BCRT is monolithic CMOS integrted circuit tht provides comprehensive MI-STD- 553B Bus Controller nd Remote Terminl
More informationTilt-Sensing with Kionix MEMS Accelerometers
Tilt-Sensing with Kionix MEMS Accelerometers Introduction Tilt/Inclintion sensing is common ppliction for low-g ccelerometers. This ppliction note describes how to use Kionix MEMS low-g ccelerometers to
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationAlignment of Long Sequences. BMI/CS Spring 2012 Colin Dewey
Alignment of Long Sequences BMI/CS 776 www.biostt.wisc.edu/bmi776/ Spring 2012 Colin Dewey cdewey@biostt.wisc.edu Gols for Lecture the key concepts to understnd re the following how lrge-scle lignment
More informationUnion-Find Problem. Using Arrays And Chains. A Set As A Tree. Result Of A Find Operation
Union-Find Problem Given set {,,, n} of n elements. Initilly ech element is in different set. ƒ {}, {},, {n} An intermixed sequence of union nd find opertions is performed. A union opertion combines two
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationTree Structured Symmetrical Systems of Linear Equations and their Graphical Solution
Proceedings of the World Congress on Engineering nd Computer Science 4 Vol I WCECS 4, -4 October, 4, Sn Frncisco, USA Tree Structured Symmetricl Systems of Liner Equtions nd their Grphicl Solution Jime
More informationGeometric transformations
Geometric trnsformtions Computer Grphics Some slides re bsed on Shy Shlom slides from TAU mn n n m m T A,,,,,, 2 1 2 22 12 1 21 11 Rows become columns nd columns become rows nm n n m m A,,,,,, 1 1 2 22
More informationAlgorithm Design (5) Text Search
Algorithm Design (5) Text Serch Tkshi Chikym School of Engineering The University of Tokyo Text Serch Find sustring tht mtches the given key string in text dt of lrge mount Key string: chr x[m] Text Dt:
More informationCSCI 104. Rafael Ferreira da Silva. Slides adapted from: Mark Redekopp and David Kempe
CSCI 0 fel Ferreir d Silv rfsilv@isi.edu Slides dpted from: Mrk edekopp nd Dvid Kempe LOG STUCTUED MEGE TEES Series Summtion eview Let n = + + + + k $ = #%& #. Wht is n? n = k+ - Wht is log () + log ()
More informationCS201 Discussion 10 DRAWTREE + TRIES
CS201 Discussion 10 DRAWTREE + TRIES DrwTree First instinct: recursion As very generic structure, we could tckle this problem s follows: drw(): Find the root drw(root) drw(root): Write the line for the
More informationBefore We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):
Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters
More informationChapter 2 Sensitivity Analysis: Differential Calculus of Models
Chpter 2 Sensitivity Anlysis: Differentil Clculus of Models Abstrct Models in remote sensing nd in science nd engineering, in generl re, essentilly, functions of discrete model input prmeters, nd/or functionls
More informationSuffix trees, suffix arrays, BWT
ALGORITHMES POUR LA BIO-INFORMATIQUE ET LA VISUALISATION COURS 3 Rluc Uricru Suffix trees, suffix rrys, BWT Bsed on: Suffix trees nd suffix rrys presenttion y Him Kpln Suffix trees course y Pco Gomez Liner-Time
More informationCS311H: Discrete Mathematics. Graph Theory IV. A Non-planar Graph. Regions of a Planar Graph. Euler s Formula. Instructor: Işıl Dillig
CS311H: Discrete Mthemtics Grph Theory IV Instructor: Işıl Dillig Instructor: Işıl Dillig, CS311H: Discrete Mthemtics Grph Theory IV 1/25 A Non-plnr Grph Regions of Plnr Grph The plnr representtion of
More informationChapter 7. Routing with Frame Relay, X.25, and SNA. 7.1 Routing. This chapter discusses Frame Relay, X.25, and SNA Routing. Also see the following:
Chpter 7 Routing with Frme Rely, X.25, nd SNA This chpter discusses Frme Rely, X.25, nd SNA Routing. Also see the following: Section 4.2, Identifying the BANDIT in the Network Section 4.3, Defining Globl
More informationNetwork Layer: Routing Classifications; Shortest Path Routing
igitl ommuniction in the Modern World : Routing lssifictions; Shortest Pth Routing s min prolem: To get efficiently from one point to the other in dynmic environment http://.cs.huji.c.il/~com com@cs.huji.c.il
More informationLecture 10 Evolutionary Computation: Evolution strategies and genetic programming
Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting
More informationDr. D.M. Akbar Hussain
Dr. D.M. Akr Hussin Lexicl Anlysis. Bsic Ide: Red the source code nd generte tokens, it is similr wht humns will do to red in; just tking on the input nd reking it down in pieces. Ech token is sequence
More informationEngineer To Engineer Note
Engineer To Engineer Note EE-186 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit
More informationOutline. Introduction Suffix Trees (ST) Building STs in linear time: Ukkonen s algorithm Applications of ST
Suffi Trees Outline Introduction Suffi Trees (ST) Building STs in liner time: Ukkonen s lgorithm Applictions of ST 2 3 Introduction Sustrings String is ny sequence of chrcters. Sustring of string S is
More informationA Scalable and Reliable Mobile Agent Computation Model
A Sclble nd Relible Mobile Agent Computtion Model Yong Liu, Congfu Xu, Zhohui Wu, nd Yunhe Pn College of Computer Science, Zhejing University Hngzhou 310027, Chin cckffe@yhoo.com.cn Abstrct. This pper
More informationDynamic Programming. Andreas Klappenecker. [partially based on slides by Prof. Welch] Monday, September 24, 2012
Dynmic Progrmming Andres Klppenecker [prtilly bsed on slides by Prof. Welch] 1 Dynmic Progrmming Optiml substructure An optiml solution to the problem contins within it optiml solutions to subproblems.
More informationA REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS
A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS Ji-Eun Roh (), Te-Eog Lee (b) (),(b) Deprtment of Industril nd Systems Engineering, Kore Advnced Institute
More informationA Priority-based Distributed Call Admission Protocol for Multi-hop Wireless Ad hoc Networks
A Priority-bsed Distributed Cll Admission Protocol for Multi-hop Wireless Ad hoc Networks un Sun Elizbeth M. Belding-Royer Deprtment of Computer Science University of Cliforni, Snt Brbr suny, ebelding
More informationEpson Projector Content Manager Operation Guide
Epson Projector Content Mnger Opertion Guide Contents 2 Introduction to the Epson Projector Content Mnger Softwre 3 Epson Projector Content Mnger Fetures... 4 Setting Up the Softwre for the First Time
More informationChapter Spline Method of Interpolation More Examples Electrical Engineering
Chpter. Spline Method of Interpoltion More Exmples Electricl Engineering Exmple Thermistors re used to mesure the temperture of bodies. Thermistors re bsed on mterils chnge in resistnce with temperture.
More informationEasyMP Multi PC Projection Operation Guide
EsyMP Multi PC Projection Opertion Guide Contents 2 Introduction to EsyMP Multi PC Projection 5 EsyMP Multi PC Projection Fetures... 6 Connection to Vrious Devices... 6 Four-Pnel Disply... 6 Chnge Presenters
More informationMATH 2530: WORKSHEET 7. x 2 y dz dy dx =
MATH 253: WORKSHT 7 () Wrm-up: () Review: polr coordintes, integrls involving polr coordintes, triple Riemnn sums, triple integrls, the pplictions of triple integrls (especilly to volume), nd cylindricl
More informationEpson iprojection Operation Guide (Windows/Mac)
Epson iprojection Opertion Guide (Windows/Mc) Contents 2 Introduction to Epson iprojection 5 Epson iprojection Fetures... 6 Connection to Vrious Devices... 6 Four-Pnel Disply... 6 Chnge Presenters nd Projection
More informationFall 2018 Midterm 1 October 11, ˆ You may not ask questions about the exam except for language clarifications.
15-112 Fll 2018 Midterm 1 October 11, 2018 Nme: Andrew ID: Recittion Section: ˆ You my not use ny books, notes, extr pper, or electronic devices during this exm. There should be nothing on your desk or
More informationUnit #9 : Definite Integral Properties, Fundamental Theorem of Calculus
Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl
More informationExpected Worst-case Performance of Hash Files
Expected Worst-cse Performnce of Hsh Files Per-Ake Lrson Deprtment of Informtion Processing, Abo Akdemi, Fnriksgtn, SF-00 ABO 0, Finlnd The following problem is studied: consider hshfilend the longest
More informationUninformed Search. Hal Daumé III. Computer Science University of Maryland CS 421: Introduction to Artificial Intelligence 31 Jan 2012
1 Hl Dumé III (me@hl3.nme) Uninformed Serch Hl Dumé III Comuter Science University of Mrylnd me@hl3.nme CS 421: Introduction to Artificil Intelligence 31 Jn 2012 Mny slides courtesy of Dn Klein, Sturt
More information12-B FRACTIONS AND DECIMALS
-B Frctions nd Decimls. () If ll four integers were negtive, their product would be positive, nd so could not equl one of them. If ll four integers were positive, their product would be much greter thn
More informationRouters implementations
Routers implementtions Switching Technology S38.65 http://www.netlb.hut.fi/opetus/s3865 L - Router implementtions Generl of routers Functions of n IP router Router rchitectures Introduction to routing
More informationIST 220: Ch3-Transport Layer
ST 220: Ch3-Trns Lyer Abdullh Konk School of nformtion Sciences nd Technology Penn Stte Berks Lerning Objectives. Understnd position of trns lyer in nternet model. Understnd rtionle for extence of trns
More informationMobile IP route optimization method for a carrier-scale IP network
Moile IP route optimiztion method for crrier-scle IP network Tkeshi Ihr, Hiroyuki Ohnishi, nd Ysushi Tkgi NTT Network Service Systems Lortories 3-9-11 Midori-cho, Musshino-shi, Tokyo 180-8585, Jpn Phone:
More informationReplicating Web Applications On-Demand
Replicting Web Applictions On-Demnd Swminthn Sivsubrmnin Guillume Pierre Mrten vn Steen Dept. of Computer Science, Vrije Universiteit, Amsterdm {swmi,gpierre,steen}@cs.vu.nl Abstrct Mny Web-bsed commercil
More informationA Comparison of Hard-state and Soft-state Signaling Protocols
A Comprison of Hrd-stte nd Soft-stte Signling Protocols Ping Ji, Zihui Ge, Jim Kurose, nd Don Towsley Computer Science Deprtment, University of Msschusetts t Amherst, jiping,gezihui,kurose,towsley @cs.umss.edu
More informationDELAY Tolerant Networks (DTNs) [1] [2] are a class of
2254 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 23, NO. 12, DECEMBER 2012 Exploiting Friendship Reltions for Efficient Routing in Mobile Socil Networks Eyuphn Bulut, Member, IEEE, nd Boleslw
More informationEvolutionary Approaches To Minimizing Network Coding Resources
This full text pper ws peer reviewed t the direction of IEEE Communictions Society suject mtter experts for puliction in the IEEE INFOCOM 2007 proceedings. Evolutionry Approches To Minimizing Network Coding
More informationThe Greedy Method. The Greedy Method
Lists nd Itertors /8/26 Presenttion for use with the textook, Algorithm Design nd Applictions, y M. T. Goodrich nd R. Tmssi, Wiley, 25 The Greedy Method The Greedy Method The greedy method is generl lgorithm
More informationControl-Flow Analysis and Loop Detection
! Control-Flow Anlysis nd Loop Detection!Lst time! PRE!Tody! Control-flow nlysis! Loops! Identifying loops using domintors! Reducibility! Using loop identifiction to identify induction vribles CS553 Lecture
More informationExam #1 for Computer Simulation Spring 2005
Exm # for Computer Simultion Spring 005 >>> SOLUTION
More information