UNION FIND. naïve linking link-by-size link-by-rank path compression link-by-rank with path compression context. An Improved Equivalence Algorithm

Size: px
Start display at page:

Download "UNION FIND. naïve linking link-by-size link-by-rank path compression link-by-rank with path compression context. An Improved Equivalence Algorithm"

Transcription

1 Disjoint-sets data type Lectue slides by Kevin Wayne Copyight 5 Peason-Addison Wesley UNION FIND naïve linking link-by-size link-by-ank path compession link-by-ank with path compession contet Goal. Suppot thee opeations on a collection of disjoint sets. MAKE-SET(): ceate a new set containing only element. FIND(): etun a canonical element in the set containing. UNION(, y): eplace the sets containing and y with thei union. Pefomance paametes. m = numbe of calls to MAKE-SET, FIND, and UNION. n = numbe of elements = numbe of calls to MAKE-SET. Dynamic connectivity. Given an initially empty gaph G, suppot thee opeations. ADD-NODE(u): add node u. ADD-EDGE(u, v): add an edge between nodes u and v. IS-CONNECTED(u, v): is thee a path between u and v? disjoint sets = connected components MAKE-SET opeation UNION opeation FIND opeations Last updated on // : AM Disjoint-sets data type: applications Disjoint-sets data type: applications Oiginal motivation. Compiling EQUIVALENCE, DIMENSION, and COMMON statements in Fotan. An Impoved Equivalence Algoithm BERNARD A. GALLER AND MICHAEL J. FISHER Univesity of Michigan, Ann Abo, Michigan An algoithm fo assigning stoage on the basis of EQUIV- ALENCE, DIMENSION and COMMON declaations is pesented. The algoithm is based on a tee stuctue, and has educed computation time by pecent ove a peviously published algoithm by identifying all equivalence classes with one scan of the EQUIVALENCE declaations. The method is applicable in any poblem in which it is necessay to identify equivalence classes, given the element pais defining the equivalence elation. Note. This pape also intoduced key data stuctue fo poblem. Applications. Pecolation. Kuskal s algoithm. Connected components. Computing LCAs in tees. Computing dominatos in digaphs. Equivalence of finite state automata. Checking flow gaphs fo educibility. Hoshen Kopelman algoithm in physics. Hinley Milne polymophic type infeence. Mophological attibute openings and closings. Matlab s BW-LABEL function fo image pocessing. Compiling EQUIVALENCE, DIMENSION and COMMON statements in Fotan....

2 Disjoint-sets data stuctue UNION FIND naïve linking link-by-size link-by-ank path compession link-by-ank with path compession contet Paent-link epesentation. Repesent each set as a tee of elements. Each element has an eplicit paent pointe in the tee. The oot seves as the canonical element (and points to itself). FIND(): find the oot of the tee containing. UNION(, y): mege tees containing and y. UNION(, 5) paent of is oot 5 Disjoint-sets data stuctue Disjoint-sets data stuctue Paent-link epesentation. Repesent each set as a tee of elements. Each element has an eplicit paent pointe in the tee. The oot seves as the canonical element (and points to itself). FIND(): find the oot of the tee containing. UNION(, y): mege tees containing and y. Aay epesentation. Repesent each set as a tee of elements. Allocate an aay paent[] of length n. paent[i] = j means paent of element i is element j. 5 must know numbe of elements n a pioi paent[] 5 5 UNION(, 5) oot paent of is oot 5 5 Note. Fo bevity, we suppess aows and self loops in figues.

3 Naïve linking Naïve linking Naïve linking. Link oot of fist tee to oot of second tee. Naïve linking. Link oot of fist tee to oot of second tee. UNION(5, ) UNION(5, ) 5 5 Naïve linking Naïve linking: analysis Naïve linking. Link oot of fist tee to oot of second tee. MAKE-SET() UNION(, y) paent[]. s FIND(y). paent[] s. FIND() WHILE ( paent[]) paent[]. RETURN. FIND(). Theoem. Using naïve linking, a UNION o FIND opeation can take Θ(n) time in the wost case, whee n is the numbe of elements. Pf. In the wost case, FIND takes time popotional to the height of the tee. Height of the tee is n afte the sequence of union opeations: UNION(, ), UNION(, ),, UNION(n, n). height = height = ma numbe of links on any path fom oot to leaf node height = n- n

4 Link-by-size UNION FIND Link-by-size. Maintain a tee size (numbe of nodes) fo each oot node. Link oot of smalle tee to oot of lage tee (beaking ties abitaily). naïve linking link-by-size link-by-ank path compession link-by-ank with path compession UNION(5, ) size = size = contet 5 Link-by-size Link-by-size Link-by-size. Maintain a tee size (numbe of nodes) fo each oot node. Link oot of smalle tee to oot of lage tee (beaking ties abitaily). Link-by-size. Maintain a tee size (numbe of nodes) fo each oot node. Link oot of smalle tee to oot of lage tee (beaking ties abitaily). UNION(5, ) size = MAKE-SET() paent[]. size[]. UNION(, y) FIND(). s FIND(y). IF ( = s) RETURN. ELSE IF (size[] > size[s]) 5 FIND() WHILE ( paent[]) paent[]. RETURN. paent[s]. size[] size[] + size[s]. ELSE paent[] s. size[s] size[] + size[s]. link-by-size 5

5 Link-by-size: analysis Link-by-size: analysis Popety. Using link-by-size, fo evey oot node : size[] height(). Pf. [ by induction on numbe of links ] Base case: singleton tee has size and height. Inductive hypothesis: assume tue afte fist i links. Tee ooted at changes only when a smalle (o equal) size tee ooted at s is linked into. Case. [ height() > height(s) ] size = (height = ) s size = (height = ) sizeʹ[] > size[] height() = heightʹ(). inductive hypothesis Popety. Using link-by-size, fo evey oot node : size[] height(). Pf. [ by induction on numbe of links ] Base case: singleton tee has size and height. Inductive hypothesis: assume tue afte fist i links. Tee ooted at changes only when a smalle (o equal) size tee ooted at s is linked into. Case. [ height() height(s) ] size = (height = ) s size = (height = ) sizeʹ[] = size[] + size[s] size[s] height(s) = height(s) + = heightʹ(). link-by-size inductive hypothesis Link-by-size: analysis A tight uppe bound Theoem. Using link-by-size, any UNION o FIND opeation takes O(log n) time in the wost case, whee n is the numbe of elements. Pf. The unning time of each opeation is bounded by the tee height. By the pevious popety, the height is lg n. lg n = log n Note. The UNION opeation takes O() time ecept fo its two calls to FIND. Theoem. Using link-by-size, a tee with n nodes can have height = lg n. Pf. Aange k calls to UNION to fom a binomial tee of ode k. An ode-k binomial tee has k nodes and height k. B B B B B

6 Link-by-ank SECTION 5.. UNION FIND naïve linking link-by-size link-by-ank path compession link-by-ank with path compession contet Link-by-ank. Maintain an intege ank fo each node, initially. Link oot of smalle ank to oot of lage ank; if tie, incease ank of new oot by. UNION(, ) ank = ank = 5 Note. Fo now, ank = height. Link-by-ank Link-by-ank Link-by-ank. Maintain an intege ank fo each node, initially. Link oot of smalle ank to oot of lage ank; if tie, incease ank of new oot by. Note. Fo now, ank = height. ank = 5 Link-by-ank. Maintain an intege ank fo each node, initially. Link oot of smalle ank to oot of lage ank; if tie, incease ank of new oot by. MAKE-SET() UNION(, y) paent[]. ank[]. FIND() WHILE ( paent[]) paent[]. RETURN. FIND(). s FIND(y). IF ( = s) RETURN. ELSE IF (ank[] > ank[s]) paent[s]. ELSE IF (ank[] < ank[s]) paent[] s. ELSE paent[] s. ank[s] ank[s] +. link-by-ank

7 Link-by-ank: popeties Link-by-ank: popeties PROPERTY. If is not a oot node, then ank[] < ank[paent[]]. Pf. A node of ank k is ceated only by linking two oots of ank k. PROPERTY. If is not a oot node, then ank[] will neve change again. Pf. Rank changes only fo oots; a nonoot neve becomes a oot. PROPERTY. If paent[] changes, then ank[paent[]] stictly inceases. Pf. The paent can change only fo a oot, so befoe linking paent[] =. Afte is linked-by-ank to new oot we have ank[] > ank[]. ank = ank = PROPERTY. Any oot node of ank k has k nodes in its tee. Pf. [ by induction on k ] Base case: tue fo k =. Inductive hypothesis: assume tue fo k. A node of ank k is ceated only by linking two oots of ank k. By inductive hypothesis, each subtee has k nodes esulting tee has k nodes. PROPERTY 5. The highest ank of a node is lg n. Pf. Immediate fom PROPERTY and PROPERTY. ank = ( nodes) ank = ( nodes) ank = ank = 5 Link-by-ank: popeties Link-by-ank: analysis PROPERTY. Fo any intege k, thee ae n / k nodes with ank k. Pf. Any oot node of ank k has k descendants. [PROPERTY ] Any nonoot node of ank k has k descendants because: - it had this popety just befoe it became a nonoot [PROPERTY ] - its ank doesn t change once it became a nonoot [PROPERTY ] - its set of descendants doesn t change once it became a nonoot Diffeent nodes of ank k can t have common descendants. [PROPERTY ] ank = ( node) Theoem. Using link-by-ank, any UNION o FIND opeation takes O(log n) time in the wost case, whee n is the numbe of elements. Pf. The unning time of UNION and FIND is bounded by the tee height. By PROPERTY 5, the height is lg n. ank = ( node) ank = (5 nodes) ank = ( nodes) ank = ( nodes)

8 Path compession UNION FIND Path compession. When finding the oot of the tee containing, change the paent pointe of all nodes along the path to point diectly to. naïve linking link-by-size link-by-ank path compession w befoe path compession link-by-ank with path compession contet u v T T afte path compession SECTION 5.. T w v u T T T Path compession Path compession Path compession. When finding the oot of the tee containing, change the paent pointe of all nodes along the path to point diectly to. Path compession. When finding the oot of the tee containing, change the paent pointe of all nodes along the path to point diectly to. 5 5

9 Path compession Path compession Path compession. When finding the oot of the tee containing, change the paent pointe of all nodes along the path to point diectly to. Path compession. When finding the oot of the tee containing, change the paent pointe of all nodes along the path to point diectly to. 5 5 Path compession Path compession Path compession. When finding the oot of the tee containing, change the paent pointe of all nodes along the path to point diectly to. 5 Path compession. When finding the oot of the tee containing, change the paent pointe of all nodes along the path to point diectly to. FIND() IF ( paent[]) paent[] FIND(paent[]). RETURN paent[]. Note. Path compession does not change the ank of a node; so height() ank[] but they ae not necessaily equal. this FIND implementation changes the tee stuctue (!) 5

10 Path compession Fact. Path compession with naïve linking can equie Ω(n) time to pefom a single UNION o FIND opeation, whee n is the numbe of elements. Pf. The height of the tee is n afte the sequence of union opeations: UNION(, ), UNION(, ),, UNION(n, n). naïve linking: link oot of fist tee to oot of second tee Theoem. [Tajan van Leeuwen ] Stating fom an empty data stuctue, path compession with naïve linking pefoms any intemied sequence of m n MAKE-SET, UNION, and FIND opeations on a set of n elements in O(m log n) time. Pf. Nontivial (but omitted). SECTION 5.. UNION FIND naïve linking link-by-size link-by-ank path compession link-by-ank with path compession contet Link-by-ank with path compession: popeties Link-by-ank with path compession: popeties PROPERTY. The tee oots, node anks, and elements within a tee ae the same with o without path compession. Pf. Path compession does not ceate new oots, change anks, o move elements fom one tee to anothe. T y z T befoe path compession z T afte path compession y T PROPERTY. The tee oots, node anks, and elements within a tee ae the same with o without path compession. COROLLARY. PROPERTY, hold fo link-by-ank with path compession. PROPERTY. If is not a oot node, then ank[] < ank[paent[]]. PROPERTY. If is not a oot node, then ank[] will neve change again. PROPERTY. If paent[] changes, then ank[paent[]] stictly inceases. PROPERTY. Any oot node of ank k has k nodes in its tee. PROPERTY 5. The highest ank of a node is lg n. PROPERTY. Fo any intege k, thee ae n / k nodes with ank k. Bottom line. PROPERTY hold fo link-by-ank with path compession. (but we need to echeck PROPERTY and PROPERTY )

11 Link-by-ank with path compession: popeties Iteated logaithm function PROPERTY. If paent[] changes, then ank[paent[]] stictly inceases. Pf. Path compession can make point to only an ancesto of paent[]. PROPERTY. If is not a oot node, then ank[] < ank[paent[]]. Pf. Path compession doesn t change any anks, but it can change paents. If paent[] doesn t change duing a path compession, the inequality continues to hold; if paent[] changes, then ank[paent[]] stictly inceases. y z T befoe path compession z T afte path compession y T Def. The iteated logaithm function is defined by: lg n = n +lg (lg n) Note. We have lg* n 5 unless n eceeds the # atoms in the univese. n lg * n [, ] [5, ] [, 55] [55, 55 ] 5 iteated lg function T Analysis Divide nonzeo anks into the following goups: { } { } {, } { 5,,, } {,,, } { 55, 55,, 55 }... Popety. Evey nonzeo ank falls within one of the fist lg * n goups. Pf. The ank is between and lg n. [PROPERTY 5] Ceative accounting Cedits. A node eceives cedits as soon as it ceases to be a oot. If its ank is in the inteval { k +, k +,, k }, we give it k cedits. goup k Poposition. Numbe of cedits disbused to all nodes is n lg * n. Pf. By PROPERTY, the numbe of nodes with ank k + is at most n k+ + n k+ + n k Thus, nodes in goup k need at most n cedits in total. Thee ae lg * n goups. [PROPERTY ]

12 Running time of FIND Link-by-ank with path compession Running time of FIND. Bounded by numbe of paent pointes followed. Recall: the ank stictly inceases as you go up a tee. [PROPERTY ] Case : paent[] is a oot only happens fo one link pe FIND. Case : ank[paent[]] is in a highe goup than ank[]. Case : ank[paent[]] is in the same goup as ank[]. Case. At most lg * n nodes on path can be in a highe goup. [PROPERTY ] Case. These nodes ae chaged cedit to follow paent pointe. Each time pays cedit, ank[paent[]] stictly inceases. [PROPERTY ] Theefoe, if ank[] is in the goup { k +,, k }, the ank of its paent will be in a highe goup befoe pays k cedits. Once ank[paent[]] is in a highe goup than ank[], it emains so because: - ank[] does not change once it ceases to be a oot. [PROPERTY ] - ank[paent[]] does not decease. [PROPERTY ] - thus, has enough cedits to pay until it becomes a Case node. 5 Theoem. Stating fom an empty data stuctue, link-by-ank with path compession pefoms any intemied sequence of m n MAKE-SET, UNION, and FIND opeations on a set of n elements in O(m log*n) time. Link-by-size with path compession UNION FIND naïve linking link-by-size link-by-ank path compession link-by-ank with path compession contet Theoem. [Fische ] Stating fom an empty data stuctue, link-by-size with path compession pefoms any intemied sequence of m n MAKE-SET, UNION, and FIND opeations on a set of n elements in O(m log log n) time.

13 Link-by-size with path compession Link-by-size with path compession Theoem. [Hopcoft Ullman ] Stating fom an empty data stuctue, link-by-size with path compession pefoms any intemied sequence of m n MAKE-SET, UNION, and FIND opeations on a set of n elements in O(m log*n) time. Theoem. [Tajan 5] Stating fom an empty data stuctue, link-by-size with path compession pefoms any intemied sequence of m n MAKE-SET, UNION, and FIND opeations on a set of n elements in O(m α(m, n)) time, whee α(m, n) is a functional invese of the Ackemann function. SIAM J. COMPUT. Vol., No., Decembe Efficiency of a Good But Not Linea Set Union Algoithm SET MERGING ALGORITHMS* J. E. HOPCROFT" AND J. D. ULLMAN{ Abstact. This pape consides the poblem of meging sets fomed fom a total of n items in such a way that at any time, the name of a set containing a given item can be ascetained. Two algoithms using diffeent data stuctues ae discussed. The eecution times of both algoithms ae bounded by a constant times ng(n), whee G(n) is a function whose asymptotic gowth ate is less than that of any finite numbe of logaithms of n. Key wods, algoithm, algoithmic analysis, computational compleity, data stuctue, equivalence algoithm, meging, popety gamma, set, spanning tee ROBERT ENDRE TAR JAN Univesity of Califonia, Bekeley, Califoma ABSTRACT. TWO types of instuctmns fo mampulating a family of disjoint sets which patitmn a umvese of n elements ae consideed FIND() computes the name of the (unique) set containing element UNION(A, B, C) combines sets A and B into a new set named C. A known algoithm fo implementing sequences of these mstuctmns is eamined It is shown that, if t(m, n) as the maimum time eqmed by a sequence of m > n FINDs and n -- intemied UNIONs, then kima(m, n) _~ t(m, n) < k:ma(m, n) fo some positive constants ki and k, whee a(m, n) is elated to a functional invese of Ackemann's functmn and as vey slow-gowing. 5 Ackemann function Ackemann function Ackemann function. [Ackemann ] A computable function that is not pimitive ecusive. Ackemann function. [Ackemann ] A computable function that is not pimitive ecusive. A(m, n) = n + m = A(m, ) m> n = A(m,A(m, n )) m> n> A(m, n) = n + m = A(m, ) m> n = A(m,A(m, n )) m> n> Invese Ackemann function. (m, n) =min{i :A(i, m/n ) log n} I am not smat enough to undestand this easily. Raymond Seidel Note. Thee ae many inequivalent definitions. 5 5

14 Invese Ackemann function Invese Ackemann function Definition. k(n) = n/ k = n = k + k ( k (n)) E. α (n) = n /. α (n) = lg n = # of times we divide n by, until we each. α (n) = lg * n = # of times we apply the lg function to n, until we each. α (n) = # of times we apply the iteated lg function to n, until we each. 5 5 α(n) α(n) 55 = huge Definition. Popety. Fo evey n 5, the sequence α (n), α (n), α (n), conveges to. E. [n =!] α (n) 5, α (n) =, α (n) =, α (n) =, α 5(n) =. One-paamete invese Ackemann. α(n) = min { k : α k(n) }. E. α(!) = 5. k(n) = n/ k = n = k + k ( k (n)) Two-paamete invese Ackemann. α(m, n) = min { k : α k(n) + m / n }. α(n) α(n) A tight lowe bound Path compaction vaiants Theoem. [Fedman Saks ] In the wost case, any CELL-PROBE(log n) algoithm equies Ω(m α(m, n)) time to pefom an intemied sequence of m MAKE-SET, UNION, and FIND opeations on a set of n elements. Cell-pobe model. [Yao ] Count only numbe of wods of memoy accessed; all othe opeations ae fee. Path splitting. Make evey node on path point to its gandpaent. 5 T5 befoe path splitting Michael L. Fedmal Bellcoe and U.C. San Diego The Cell Pobe Compleity of Dynamic Data Stuctues Michael E. Sak>. U.C. San Diego, Bellcoe and Rutges Univesity T T T afte path splitting. Summay of Results Dynamic data stnctue poblems involve the epesentation of data in memoy in such a way as to pemit cetain types of modifications of the data (updates) and cetain types of questions about the data (queies). This paadigm encompasses many fimdamental poblems in compute science. The pupose of this pape is to pove new lowe and uppe bounds on the tie pe opeation to implement solutions to some familia dynamic data stuctue poblems including list epesentation, subset anking, patial sums, and the set union poblem. The main featues of ou lowe bounds ae: () They hold in the cell pobe model of computation (A. Yao egiste size fom logn to polylog(n) only educes the time compleity by a constant facto. On the othe hand, deceasing the egiste size fom logn to inceases time compleity by a logn facto fo one of the poblems we conside and only a loglogn facto fo some othe poblems. The fist two specific data stuctue poblems obtain bounds ae: fo which we List Repesentation. This poblem concens the epesention of an odeed list of at most n (not necessaily distinct) elements fom the univese U = (,,..., n ). The opeations to be suppoted ae epot(k). which etuns the k element of the list, inset(k, u) which insets element u into the list between the T T 5 T5 T 55 5

15 Path compaction vaiants Linking vaiants Path halving. Make evey othe node on path point to its gandpaent. Link-by-size. Numbe of nodes in tee. befoe path halving Link-by-ank. Rank of tee. T 5 T5 afte path halving Link-by-andom. Label each element with a andom eal numbe between. and.. Link oot with smalle label into oot with lage label. T 5 T T5 T T T 5 5 Disjoint-sets data stuctues Theoem. [Tajan van Leeuwen ] Stating fom an empty data stuctue, link-by- { size, ank } combined with { path compession, path splitting, path halving } pefoms any intemied sequence of m n MAKE-SET, UNION, and FIND opeations on a set of n elements in O(m α(m, n)) time. Wost-Case Analysis of Set Union Algoithms ROBERT E. TAR JAN AT&T Bell Laboatoies, Muay Hdl, New Jesey AND JAN VAN LEEUWEN Univestty of Utecht. Utecht. The Nethelands Abstact. This pape analyzes the asymptotic wost-case unning time of a numbe of vaiants of the well-known method of path compession fo maintaining a collection of disjoint sets unde union. We show that two one-pass methods poposed by van Leeuwen and van de Weide ae asymptotically optimal, wheeas seveal othe methods, including one poposed by Rein and advocated by Dijksta, ae slowe than the best methods. 5

UNION FIND. naïve linking link-by-size link-by-rank path compression link-by-rank with path compression context

UNION FIND. naïve linking link-by-size link-by-rank path compression link-by-rank with path compression context UNION FIND naïve linking link-by-size link-by-rank path compression link-by-rank with path compression context Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison Wesley http://www.cs.princeton.edu/~wayne/kleinberg-tardos

More information

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the

More information

Strongly Connected Components. Uses for SCC s. Two Simple SCC Algorithms. Directed Acyclic Graphs

Strongly Connected Components. Uses for SCC s. Two Simple SCC Algorithms. Directed Acyclic Graphs CSE Intoduction to Algoithms Depth Fist Seach and Stongly Connected Components W.L. Ruzzo, Summe 00 Undiected Depth-Fist Seach It s not just fo tees DFS() back edge tee edge if maked then etun; mak ; #

More information

Lecture 27: Voronoi Diagrams

Lecture 27: Voronoi Diagrams We say that two points u, v Y ae in the same connected component of Y if thee is a path in R N fom u to v such that all the points along the path ae in the set Y. (Thee ae two connected components in the

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

GARBAGE COLLECTION METHODS. Hanan Samet

GARBAGE COLLECTION METHODS. Hanan Samet gc0 GARBAGE COLLECTION METHODS Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 07 e-mail: hjs@umiacs.umd.edu

More information

arxiv: v4 [cs.ds] 7 Feb 2018

arxiv: v4 [cs.ds] 7 Feb 2018 Dynamic DFS in Undiected Gaphs: beaking the O(m) baie Suende Baswana Sheejit Ray Chaudhuy Keeti Choudhay Shahbaz Khan axiv:1502.02481v4 [cs.ds] 7 Feb 2018 Depth fist seach (DFS) tee is a fundamental data

More information

Embeddings into Crossed Cubes

Embeddings into Crossed Cubes Embeddings into Cossed Cubes Emad Abuelub *, Membe, IAENG Abstact- The hypecube paallel achitectue is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability

More information

Lecture 8 Introduction to Pipelines Adapated from slides by David Patterson

Lecture 8 Introduction to Pipelines Adapated from slides by David Patterson Lectue 8 Intoduction to Pipelines Adapated fom slides by David Patteson http://www-inst.eecs.bekeley.edu/~cs61c/ * 1 Review (1/3) Datapath is the hadwae that pefoms opeations necessay to execute pogams.

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

FACE VECTORS OF FLAG COMPLEXES

FACE VECTORS OF FLAG COMPLEXES FACE VECTORS OF FLAG COMPLEXES ANDY FROHMADER Abstact. A conjectue of Kalai and Eckhoff that the face vecto of an abitay flag complex is also the face vecto of some paticula balanced complex is veified.

More information

Reachable State Spaces of Distributed Deadlock Avoidance Protocols

Reachable State Spaces of Distributed Deadlock Avoidance Protocols Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications

More information

Lecture # 04. Image Enhancement in Spatial Domain

Lecture # 04. Image Enhancement in Spatial Domain Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

Image Enhancement in the Spatial Domain. Spatial Domain

Image Enhancement in the Spatial Domain. Spatial Domain 8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along

More information

DYNAMIC STORAGE ALLOCATION. Hanan Samet

DYNAMIC STORAGE ALLOCATION. Hanan Samet ds0 DYNAMIC STORAGE ALLOCATION Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 07 e-mail: hjs@umiacs.umd.edu

More information

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes CS630 Repesenting and Accessing Digital Infomation Infomation Retieval: Basics Thosten Joachims Conell Univesity Infomation Retieval Basics Retieval Models Indexing and Pepocessing Data Stuctues ~ 4 lectues

More information

All lengths in meters. E = = 7800 kg/m 3

All lengths in meters. E = = 7800 kg/m 3 Poblem desciption In this poblem, we apply the component mode synthesis (CMS) technique to a simple beam model. 2 0.02 0.02 All lengths in metes. E = 2.07 10 11 N/m 2 = 7800 kg/m 3 The beam is a fee-fee

More information

Undirected Depth-First Search. CSE 421 Introduction to Algorithms. Undirected Depth-First Search. Directed Depth First Search

Undirected Depth-First Search. CSE 421 Introduction to Algorithms. Undirected Depth-First Search. Directed Depth First Search CSE Intoduction to Algoithms Undiected Depth-Fist Seach It s not just fo tees Depth Fist Seach and Stongly Connected Components DFS() back edge tee edge if maked then etun; mak ; # := ++count; fo all edges

More information

n If S is in convex position, then thee ae exactly k convex k-gons detemined by subsets of S. In geneal, howeve, S may detemine fa fewe convex k-gons.

n If S is in convex position, then thee ae exactly k convex k-gons detemined by subsets of S. In geneal, howeve, S may detemine fa fewe convex k-gons. Counting Convex Polygons in Plana Point Sets Joseph S. B. Mitchell a;1, Günte Rote b, Gopalakishnan Sundaam c, and Gehad Woeginge b a Applied Mathematics and Statistics, SUNY Stony Book, NY 11794-3600.

More information

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology, (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Efficient Candidacy Reduction Fo Fequent Patten Mining M.H Nadimi-Shahaki 1, Nowati Mustapha 2, Md Nasi B Sulaiman 2, Ali B Mamat

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Class 21. N -body Techniques, Part 4

Class 21. N -body Techniques, Part 4 Class. N -body Techniques, Pat Tee Codes Efficiency can be inceased by gouping paticles togethe: Neaest paticles exet geatest foces diect summation. Distant paticles exet smallest foces teat in goups.

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

Evaluation of Partial Path Queries on XML Data

Evaluation of Partial Path Queries on XML Data Evaluation of Patial Path Queies on XML Data Stefanos Souldatos Dept of EE & CE NTUA, Geece stef@dblab.ntua.g Theodoe Dalamagas Dept of EE & CE NTUA, Geece dalamag@dblab.ntua.g Xiaoying Wu Dept. of CS

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

ART GALLERIES WITH INTERIOR WALLS. March 1998

ART GALLERIES WITH INTERIOR WALLS. March 1998 ART GALLERIES WITH INTERIOR WALLS Andé Kündgen Mach 1998 Abstact. Conside an at galley fomed by a polygon on n vetices with m pais of vetices joined by inteio diagonals, the inteio walls. Each inteio wall

More information

Efficient Execution Path Exploration for Detecting Races in Concurrent Programs

Efficient Execution Path Exploration for Detecting Races in Concurrent Programs IAENG Intenational Jounal of Compute Science, 403, IJCS_40_3_02 Efficient Execution Path Exploation fo Detecting Races in Concuent Pogams Theodous E. Setiadi, Akihiko Ohsuga, and Mamou Maekaa Abstact Concuent

More information

Evaluation of Partial Path Queries on XML data

Evaluation of Partial Path Queries on XML data Evaluation of Patial Path Queies on XML data Stefanos Souldatos Dept of EE & CE, NTUA stef@dblab.ntua.g Theodoe Dalamagas Dept of EE & CE, NTUA dalamag@dblab.ntua.g Xiaoying Wu Dept. of CS, NJIT xw43@njit.edu

More information

An Optimised Density Based Clustering Algorithm

An Optimised Density Based Clustering Algorithm Intenational Jounal of Compute Applications (0975 8887) Volume 6 No.9, Septembe 010 An Optimised Density Based Clusteing Algoithm J. Hencil Pete Depatment of Compute Science St. Xavie s College, Palayamkottai,

More information

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes On the Convesion between Binay Code and BinayReflected Gay Code on Boolean Cubes The Havad community has made this aticle openly available. Please shae how this access benefits you. You stoy mattes Citation

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

DUe to the recent developments of gigantic social networks

DUe to the recent developments of gigantic social networks Exploing Communities in Lage Pofiled Gaphs Yankai Chen, Yixiang Fang, Reynold Cheng Membe, IEEE, Yun Li, Xiaojun Chen, Jie Zhang 1 Abstact Given a gaph G and a vetex q G, the community seach (CS) poblem

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

Gravitational Shift for Beginners

Gravitational Shift for Beginners Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational

More information

Two-Dimensional Coding for Advanced Recording

Two-Dimensional Coding for Advanced Recording Two-Dimensional Coding fo Advanced Recoding N. Singla, J. A. O Sullivan, Y. Wu, and R. S. Indec Washington Univesity Saint Louis, Missoui s Motivation: Aeal Density Pefomance: match medium, senso, pocessing

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

Shortest Paths for a Two-Robot Rendez-Vous

Shortest Paths for a Two-Robot Rendez-Vous Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

An Extension to the Local Binary Patterns for Image Retrieval

An Extension to the Local Binary Patterns for Image Retrieval , pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

DYNAMIC STORAGE ALLOCATION. Hanan Samet

DYNAMIC STORAGE ALLOCATION. Hanan Samet ds0 DYNAMIC STORAGE ALLOCATION Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 074 e-mail: hjs@umiacs.umd.edu

More information

INDEXATION OF WEB PAGES BASED ON THEIR VISUAL RENDERING

INDEXATION OF WEB PAGES BASED ON THEIR VISUAL RENDERING INDEXATION OF WEB PAGES BASED ON THEIR VISUAL RENDERING Emmanuel Buno Univesité du Sud Toulon-Va / LSIS CNRS BP 20132, F-83957 La Gade buno@univ-tln.f Nicolas Faessel LSIS CNRS Domaine Univesitaie de Saint-Jéôme

More information

Separability and Topology Control of Quasi Unit Disk Graphs

Separability and Topology Control of Quasi Unit Disk Graphs Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,

More information

The EigenRumor Algorithm for Ranking Blogs

The EigenRumor Algorithm for Ranking Blogs he EigenRumo Algoithm fo Ranking Blogs Ko Fujimua N Cybe Solutions Laboatoies N Copoation akafumi Inoue N Cybe Solutions Laboatoies N Copoation Masayuki Sugisaki N Resonant Inc. ABSRAC he advent of easy

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation A Minutiae-based Fingepint Matching Algoithm Using Phase Coelation Autho Chen, Weiping, Gao, Yongsheng Published 2007 Confeence Title Digital Image Computing: Techniques and Applications DOI https://doi.og/10.1109/dicta.2007.4426801

More information

A Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces

A Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces A Family of Distibuted Deadlock Avoidance Potocols and thei Reachable State Spaces Césa Sánchez, Henny B. Sipma, and Zoha Manna Compute Science Depatment Stanfod Univesity, Stanfod, CA 94305-9025 {cesa,sipma,manna}@cs.stanfod.edu

More information

Pipes, connections, channels and multiplexors

Pipes, connections, channels and multiplexors Pipes, connections, channels and multiplexos Fancisco J. Ballesteos ABSTRACT Channels in the style of CSP ae a poeful abstaction. The ae close to pipes and connections used to inteconnect system and netok

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

Concomitants of Upper Record Statistics for Bivariate Pseudo Weibull Distribution

Concomitants of Upper Record Statistics for Bivariate Pseudo Weibull Distribution Available at http://pvamuedu/aam Appl Appl Math ISSN: 93-9466 Vol 5, Issue (Decembe ), pp 8 9 (Peviously, Vol 5, Issue, pp 379 388) Applications and Applied Mathematics: An Intenational Jounal (AAM) Concomitants

More information

Worst-Case Delay Bounds for Uniform Load-Balanced Switch Fabrics

Worst-Case Delay Bounds for Uniform Load-Balanced Switch Fabrics Wost-Case Delay Bounds fo Unifom Load-Balanced Switch Fabics Spyidon Antonakopoulos, Steven Fotune, Rae McLellan, Lisa Zhang Bell Laboatoies, 600 Mountain Ave, Muay Hill, NJ 07974 fistname.lastname@alcatel-lucent.com

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

Lecture #22 Pipelining II, Cache I

Lecture #22 Pipelining II, Cache I inst.eecs.bekeley.edu/~cs61c CS61C : Machine Stuctues Lectue #22 Pipelining II, Cache I Wiewold cicuits 2008-7-29 http://www.maa.og/editoial/mathgames/mathgames_05_24_04.html http://www.quinapalus.com/wi-index.html

More information

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:

More information

Topic -3 Image Enhancement

Topic -3 Image Enhancement Topic -3 Image Enhancement (Pat 1) DIP: Details Digital Image Pocessing Digital Image Chaacteistics Spatial Spectal Gay-level Histogam DFT DCT Pe-Pocessing Enhancement Restoation Point Pocessing Masking

More information

Modeling a shared medium access node with QoS distinction

Modeling a shared medium access node with QoS distinction Modeling a shaed medium access node with QoS distinction Matthias Gies, Jonas Geutet Compute Engineeing and Netwoks Laboatoy (TIK) Swiss Fedeal Institute of Technology Züich CH-8092 Züich, Switzeland email:

More information

POMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler

POMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler POMDP: Intoduction to Patially Obsevable Makov Decision Pocesses Hossein Kamalzadeh, Michael Hahsle 2019-01-02 The R package pomdp povides an inteface to pomdp-solve, a solve (witten in C) fo Patially

More information

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE 5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai

More information

COSC 6385 Computer Architecture. - Pipelining

COSC 6385 Computer Architecture. - Pipelining COSC 6385 Compute Achitectue - Pipelining Sping 2012 Some of the slides ae based on a lectue by David Culle, Pipelining Pipelining is an implementation technique wheeby multiple instuctions ae ovelapped

More information

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing IEEE TRANSACTIONS ON COMPUTERS, VOL. 50, NO. 9, SEPTEMBER 200 949 Dynamic Multiple Paity (DMP) Disk Aay fo Seial Tansaction Pocessing K.H. Yeung, Membe, IEEE, and T.S. Yum, Senio Membe, IEEE AbstactÐThe

More information

UCB CS61C : Machine Structures

UCB CS61C : Machine Structures inst.eecs.bekeley.edu/~cs61c UCB CS61C : Machine Stuctues Lectue SOE Dan Gacia Lectue 28 CPU Design : Pipelining to Impove Pefomance 2010-04-05 Stanfod Reseaches have invented a monitoing technique called

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

CS 2461: Computer Architecture 1 Program performance and High Performance Processors

CS 2461: Computer Architecture 1 Program performance and High Performance Processors Couse Objectives: Whee ae we. CS 2461: Pogam pefomance and High Pefomance Pocessos Instucto: Pof. Bhagi Naahai Bits&bytes: Logic devices HW building blocks Pocesso: ISA, datapath Using building blocks

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

Monte Carlo Techniques for Rendering

Monte Carlo Techniques for Rendering Monte Calo Techniques fo Rendeing CS 517 Fall 2002 Compute Science Conell Univesity Announcements No ectue on Thusday Instead, attend Steven Gotle, Havad Upson Hall B17, 4:15-5:15 (efeshments ealie) Geomety

More information

The International Conference in Knowledge Management (CIKM'94), Gaithersburg, MD, November 1994.

The International Conference in Knowledge Management (CIKM'94), Gaithersburg, MD, November 1994. The Intenational Confeence in Knowledge Management (CIKM'94), Gaithesbug, MD, Novembe 994. Hashing by Poximity to Pocess Duplicates in Spatial Databases Walid G. Aef Matsushita Infomation Technology Laboatoy

More information

Quality Aware Privacy Protection for Location-based Services

Quality Aware Privacy Protection for Location-based Services In Poceedings of the th Intenational Confeence on Database Systems fo Advanced Applications (DASFAA 007), Bangkok, Thailand, Apil 9-, 007. Quality Awae Pivacy Potection fo Location-based Sevices Zhen Xiao,,

More information

Intuitionistic Fuzzy Soft N-ideals

Intuitionistic Fuzzy Soft N-ideals Intenational Jounal of Fuzzy Mathematics and Systems. ISSN 2248-9940 Volume 3, Numbe 4 (2013), pp. 259-267 Reseach India Publications http://www.ipublication.com Intuitionistic Fuzzy Soft N-ideals A. Solaiaju

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

CS 5114: Theory of Algorithms. Sorting. Insertion Sort. Exchange Sorting. Clifford A. Shaffer. Spring 2010

CS 5114: Theory of Algorithms. Sorting. Insertion Sort. Exchange Sorting. Clifford A. Shaffer. Spring 2010 Depatment of Compute Science Viginia Tech Backsbug, Viginia Copyight c 10 by Ciffod A. Shaffe 3 4 5 7 : Theoy of Agoithms Tite page : Theoy of Agoithms Ciffod A. Shaffe Sping 10 Ciffod A. Shaffe Depatment

More information

The Dual Round Robin Matching Switch with Exhaustive Service

The Dual Round Robin Matching Switch with Exhaustive Service The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line

More information

Also available at ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010)

Also available at  ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) Also available at http://amc.imfm.si ISSN 1855-3966 (pinted edn.), ISSN 1855-3974 (electonic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) 109 120 Fulleene patches I Jack E. Gave Syacuse Univesity, Depatment

More information

A ROI Focusing Mechanism for Digital Cameras

A ROI Focusing Mechanism for Digital Cameras A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula

More information

Any modern computer system will incorporate (at least) two levels of storage:

Any modern computer system will incorporate (at least) two levels of storage: 1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe

More information

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad

More information

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number.

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number. Illustative G-C Simila cicles Alignments to Content Standads: G-C.A. Task (a, b) x y Fo this poblem, is a point in the - coodinate plane and is a positive numbe. a. Using a tanslation and a dilation, show

More information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220

More information

Data mining based automated reverse engineering and defect discovery

Data mining based automated reverse engineering and defect discovery Data mining based automated evese engineeing and defect discovey James F. Smith III, ThanhVu H. Nguyen Naval Reseach Laboatoy, Code 5741, Washington, D.C., 20375-5000 ABSTRACT A data mining based pocedue

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences Ameican Jounal of ata ining and Knowledge iscovey 27; 2(4): 2-8 http://www.sciencepublishinggoup.com//admkd doi:.648/.admkd.2724.2 Genealized Gey Taget ecision ethod Based on ecision akes Indiffeence Attibute

More information

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers XFVHDL: A Tool fo the Synthesis of Fuzzy Logic Contolles E. Lago, C. J. Jiménez, D. R. López, S. Sánchez-Solano and A. Baiga Instituto de Micoelectónica de Sevilla. Cento Nacional de Micoelectónica, Edificio

More information

Lecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining

Lecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining EE 341 Lectue # 12 Instucto: Zeshan hishti zeshan@ece.pdx.edu Novembe 10, 2014 Potland State Univesity asic Pocessing Unit ontol Signals Hadwied ontol Datapath contol signals Dealing with memoy delay Pipelining

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

IP MULTICAST. Adiseshu Hari, T. V. Lakshman and Gordon Wilfong Nokia Bell Labs

IP MULTICAST. Adiseshu Hari, T. V. Lakshman and Gordon Wilfong Nokia Bell Labs IP MULTICAST Adiseshu Hai, T. V. Lakshman and Godon Wilfong Nokia DIMACS Wokshop on Algoithms fo Data Cente Netwoks Rutges Univesity, NJ 1 Why is IP Multicast not deployed in public netwoks? Denial-of-Sevice

More information

Achievable Catalog Size in Peer-to-Peer Video-on-Demand Systems

Achievable Catalog Size in Peer-to-Peer Video-on-Demand Systems Achievable Catalog Size in Pee-to-Pee Video-on-Demand Systems Yacine Boufkhad, Fabien Mathieu, Fabien De Montgolfie, Diego Peino, Lauent Viennot To cite this vesion: Yacine Boufkhad, Fabien Mathieu, Fabien

More information

How many times is the loop executed? middle = (left+right)/2; if (value == arr[middle]) return true;

How many times is the loop executed? middle = (left+right)/2; if (value == arr[middle]) return true; This lectue Complexity o binay seach Answes to inomal execise Abstact data types Stacks ueues ADTs, Stacks, ueues 1 binayseach(int[] a, int value) { while (ight >= let) { { i (value < a[middle]) ight =

More information