Measurement Based Intelligent Prefetch and Cache Technique in Web
|
|
- Denis Allen
- 5 years ago
- Views:
Transcription
1 Measrement ased Intellient Prefetch and Cache Techniqe in Web Zhen Zhao, Jie Yan, Son Wan, Gan Zhan, Yantai Sh Department of Compter Science, Tianin University, Tianin 30007, P.R.China Tel.: , Fax: Abstract In Web, sers in the same workrop miht have similar interests and habits. In this paper we stdy intellient proxy techniqes for people who se a proxy to access Web. Or intellient proxy has two parts: cache and prefetch. We researched three replacement policies for proxy cache: LRU and two variations of LRU. Or simlation showed that basic LRU prodces worst hit rate, while the other two policies achieve rohly the same reslts. Therefore, we choose a mixtre of them as or proposed scheme. y introdcin the prediction alorithm and threshold alorithm, The proxy can predict which Web files will be needed in the near ftre and download some of them before they are really reqested by the ser rop. We can et a more accrate probability by rnnin it on the proxy server than on the client site, when client ser has not visited a file in a Web server often enoh. y implementin the techniqes of prefetch and cache on the proxy server, we can redce the Web latency perceived by sers and also the total nmber of access reqests to Web server, ths propose a reasonable way of decreasin their cost to access the Web for developin contries.. INTRODUCTION Generally speakin, people workin in the same rop may have similar interests and habits. In other words, it's very likely that the paes they've reqested may relate to each other or even be the same one from the Web. Accordin to this characteristic, we proposed an intellient proxy techniqe for these people, who access the Web throh a proxy server. Compared to the existin proxy techniqes, or intellient proxy has two main distinishin featres. First, we enhanced the eneral proxy by addin a prefetch fnction to it. The prefetch techniqe has been sed to combine with the client browser [], bt has never been implemented in a proxy. The proxy, bein exposed to the Web accesses of mltiple sers who have similar interests, has the potential to predict more accrately which paes a ser miht access next, ths it can prefetch those paes to the ser's machine on behalf of the ser. Second, we made some improvements on the cache replacement alorithm of the eneral proxies, which sally se simple FIFO or pre LRU (Least Recently Used) alorithm. We se a variant of LRU alorithm, which achieved a mch hiher hit rate in the limited cache space. In this paper, we first analysis rop interests distribtion, then we desin or cache alorithm to be sed on the proxy and investiate an approach to redce the ser-perceived latency by prefetch from the Web server to the proxy. In the last section, we present the implementation scheme of or intellient proxy server.. THE ANALYSIS OF GROUP INTERESTS DISTRIUTION We assme that members in one rop may have similar interests and will access the Web for similar paes. To analyses this sitation we have stdied three different rops for their Web access traces. In stdyin the lo files of three months, we cont statistical data for all the visited URLs and their freqencies. We define Q n P n specified pae access cont all paes access cont pae cont havin specified Q total cont of access paes X n P n Q n > q n The relation between X n (%) X n and n Qn is shown in Fire Q n (%) Fire : Distribtion of rop interests
2 The fire can be sed to determine the similarity of the rop. In this fire, we have observed that X n (q n 5%) of the three rops are 0%~0%, which denotes that rop sers have enoh similarity. 3. IMPROVEMENT TO CACHE ALGORITHM If a docment is cached when it is accessed first time by a ser, it will be retrieved more efficiently on sbseqent accesses by the same ser or by the same rop members. A cachin proxy does a difficlt ob. First, in order to have a cache hit, the same docment has to be either reqested by one ser twice or more, or be reqested by two or more sers. Second, since most web browsers today have a bilt-in cache, a ser is nlikely to reqest a sinle docment twice in its life cycle. Ths the cache proxy can only have a hit when two or more sers reqest the same docment. This redces the fraction of reqests that the proxy can satisfy from its cache, known as the "hit rate". How effective cold a cachin proxy ever be? We first simlate a proxy server with nlimited disk space, so that cached docments are never deleted de to space limitations. This ives an pper bond on the hit rate a real proxy server can ever achieve. The simlation inpt was athered from several traces of all Web accesses drin 3 months. We observed 30-50% hit rate. We then considered the sitation when we have only limited disk space. Some files have to be replaced de to space limitations. Three replacement policies were examined: LRU and two variations of LRU. Or simlation showed that basic LRU prodces worst hit rate, while LRU-MIN and LRU-THOLD [] achieve rohly the same reslts. So we choose a mixtre of LRU-MIN and LRU-THOLD as or proposed cache scheme. 3.. Cache Replacement Policy Sppose that the size of an incomin reqest docment is S, and the file is not in the cache LRU Policy Classic least recently sed: When the free space in the cache is smaller than S, repeat the followin ntil the free space is at least S: replace the LRU docment. (LRU may discard many small docments to make room for one lare docment.) 3... LRU-MIN Policy A variant of LRU that tries to minimize the nmber of docments replace: Let L and T denote, respectively, a list and an inteer. () Set T to S. () Set L to all docments eqal to or larer than T. (L may be nll.) (3) Remove the LRU docments of list L ntil the list is empty, or the free cache space is at least T. (4) If the free cache space is not at least S, set T to T/ and oto () LRU-THOLD Policy A variant of LRU can avoid the sitation in which a docment that is lare compared to the cache size cases replacement of a lare nmber of smaller docments. This policy is identical to LRU, except that no docment larer than a threshold size is cached. (Even if the cache still has room.) 3.. Simlation Reslts We compared docment replacement policies LRU, LRU-MIN and LRU-THOLD, to identify which maximizes hit rate and minimizes disk size reqired for the cache. The reslts are in Table. Table : Comparison of three cache replacement policies Hit Rate (%) Cache Size (Mbytes) Lifetime (Hors) Min Max Min Max Min Max LRU LRU-M LRU-T In this table, iven an infinite disk space we confirmed that a cachin proxy has an pper bond of 30-50% in its hit rate as described in the reference [3]. In no case did LRU otperform the other replacement policies in Table. Given that the optimal threshold for LRU- THOLD is a fnction of the workload and the ratio of the disk size available for the cache compared to the cache size needed for no replacement, LRU-MIN is the best policy. It reqires no parameters and achieves the best performance most of the time. On the other hand, LRU-THOLD achieves dramatically smaller cache sizes with a small penalty in hit rate compared to LRU-MIN, ths LRU- THOLD is recommended when disk size is limited compared to the cache size reqired for no replacement. Finally, the lifetime reported in the table shows that a docment stays in the cache for reatly varyin times as mch as ten times loner for LRU-THOLD compared to LRU. The short lifetimes for LRU miht explain why its hit rates are never hiher than the other policies: docments are replaced too freqently. Therefore we decide to se the adaptive policy: se LRU-MIN ntil the cache size approached 00% of the available disk size and then chane to LRU-THOLD with a threshold that is radally redced ntil the cache size reaches a low water mark. 4. THE PREDICTION ALGORITHM
3 The prediction alorithms in this stdy observe information collected from past accesses from all the sers to predict what each ser miht access next. The proxy needs to lo all HTTP reqests of the sers and adapts its prefetch activity based on them. In or scheme, the proxy is reqired to maintain two kinds of conters, the pae conters and the link conters, to keep track of each ser's access history. Each pae A is associated with a pae conter C A. In addition, if pae can be accessed directly from pae A, in other words, there exists a hyperlink of on pae A, then we se conter C (A,) to denote this link. Whenever pae A is accessed, the conter C A is increased by one. Similarly, the conter C (A,) is also increased by one, if pae is accessed by clickin on the correspondin link on pae A. The cmlative vale of conter C A and C (A,) can be achieved by addin p each ser's C A and C (A,) respectively. We se conditional probability P( A) to denote the probability of "a ser is to access pae riht after he or she accesses pae A". Therefore, the personal access probability is obtained in the followin way. When a pae A is bein viewed by the ser, for each pae i linked to A, the access probability of i is compted as P( i A) C (i,a) /C A. As described above, the rop sin the proxy has very similar interests. Therefore, the definition of rop access probability has sinificant meanin in the proxybased prediction alorithm. Assmin there are k members in the rop, the rop access probability of i is defined as where P ( i A ) k k C C denotes the th rop member's C A A. ( C A We have three choices to define or final sed access probability. The first one is to se personal access probability p. It is known that the accracy of prediction is closely related to personal interests, which is well indicated by this probability. However, when the ser's Web access history information is rather scant, the probability may not really reflect his or her real interests. The second choice is to se the rop access probability p. Jst as the rop has some common interests, the accmlative data can represent the poplarity of the paes over the rop members. Therefore, this probability may reflect the ser's interests to a certain extent, especially, the more similar the rop members' interests are, and the better this probability fits. Last bt not the least, we introdce the third choice, which we have adopted in this paper, interatin the advantaes of first two choices. y introdcin a weiht β, here we present the interated access probability as p β p + ( - β ) p (), A ) where 0< β <. We can emphasize the personal data or rop data by adstin the vale of β. 5. THE THRESHOLD MODULE Or threshold alorithm is based on that described by Zhimei Jian []. However, there are a few noteworthy differences. First, their scheme was desined for se by a sinle ser to prefetch files on the Web, in which the prefetch enine was located on the ser's local machine. Or model is to pt the prefetch enine on the proxy server, takin advantae of the accmlative data collected on the proxy to achieve a better prediction reslt. Therefore, or threshold alorithm is desined for sers in a rop, who share the same proxy server. Second, by adstin the parameter β, we can obtain their reslts as a limit case of or alorithm; that is to say, or model has a wider application in some senses. In order to et a better tradeoff between system resorce sae and latency, or prefetch stratey first predicts which files are likely to be needed soon and chooses some of them to download beforehand. The first part of this task is accomplished by the prediction modle that we discss in the last section. In the threshold modle, we determine the prefetch threshold for the Web server in real time to determine which files to prefetch. We se the term cost to measre the system performance, which is comprised of the delay cost (α T $/time nit) and the system resorce cost (α $/time nit). The delay cost indicates how valable the time is to the ser. The system resorce cost incldes the cost of processin the packets at the end nodes and that of transmittin them from the sorce to the destination. In this section, we stdy how to determine which files to prefetch in order to minimize the averae cost of reqestin a file for several system models. 5. The cost fnction C For a iven system, let be the arrival rate of ser reqests for paes when no prefetch is applies. We assme that prefetch does not affect the ser's behavior reardin the likelihood of accessed paes. In other words, when prefetch is employed, sers still isse reqests at rate in the same pattern, althoh they can et some paes faster de to prefetch. Let the arrival rate of normal reqests and prefetch reqests are and respectively. Hence the rate at which ser reqests are satisfied by the prefetched files is -, which is simple p becase prefetched paes are eventally reqested by the ser with probability p, where p is the access probability of the prefetched paes. Ths + p, or + + ( - p) () In a Rond-Robin processor-sharin system, the averae response time for reqests reqirin an averae of
4 x time nits of processin is x s t (3) ρ b ( ρ ) where ρ is the system load, s is the averae file size, and b is the system capacity. For the system shown in Fire, ρ s ( + ) / b. Therefore, the cost of a normal reqest, which is the sm of the system resorce cost and the delay cost, becomes s c α s + α t α s + α (4) T T b ( + ) Normal reqests Prefetch reqests Fire : The prefetch system model We can see that in the above eqation, as more files are prefetched, the cost of normal reqests increases becase prefetch increases the system load, which will increase the delay of retrievin files. The averae cost of a prefetched reqest is c α s (5) We obtain the final averae fnction of cost as follows: C c + c s ( p ) αt {[ + ( p) ] α + } b [ + ( p) ] s (6) Pt () into (6), we obtain or obective cost fnction. C s {[ + [ β p - ( - β )p ] ] α (7) + [ ( β p + ( - β ) p ) ] α T } b [ + [ β p - ( - β ) p ] ] s Processor sharin S will et its maximm vale at the zero point of Therefore, we can et the critical vale ', which is dc. d αt ( b( β p + ( β) p) s) ' ( b s ) s ( β p ( β) p) α( β p ( β) p) (9) Since fnction (7) is maximized at ', where dc 0 for d b (β p +( - β) p ) <s, it follows that the cost decreases as increases for > '. Specifically, if ' 0 for the iven p,, and r (α T /α ), then for any in the rane of [0,/p], the hiher the, i.e. the more that files with access probability p are prefetched, the lower the cost is. Ths, for the iven p,, and r, if ' <0, then prefetch all the files with access probability p will minimize the cost. 5.3 The prefetch threshold H Let s now find the prefetch threshold H sch that the cost can be minimized by prefetch all the files with access probabilities p, for p reater than H. From eqation (9), we obtain that ' 0 if and only if (0) ( β p ( ρ ) r + ( β ) p ) ( ρ ) b + r where ρs / b. We then set the prefetch threshold to be ρ () H ( ( ρ ) ) r b + Eqation (0) shows that if the access probability p is reater than or eqal to the threshold H, then ' 0 accordin to (9). Moreover, followin or previos analysis, this implies that prefetch all the files with access probability p minimize the cost, for p H. The threshold H is plotted in Fire 3 as a fnction of system tilization ρ for several different vales of r. 0.9 r 5. The optimm vale of the prefetch rate Let's assme the vale of p and are known, we wish to find at which point of, the averae reqest cost in the system can et its minimized vale. From the eqation (7), we take the second order derivative of C with respect to, and obtain d C s αt ( s b( β p + ( β) p ))( β p ( β) p ) [ ](8) 3 d ( b s ( + ( β p ( β) p ))) The prereqisite of a system to be stable is that + mst be less than b/s, that is to say s ( + ( β p - ( - β) p ) ) < b Therefore, as lon as s < b (β p +( - β) p ), the vale of (8) will definitely below the zero. It implies if s < b (β p +( - β) p ), the eqation (7) Prefetch Threshold H Utilization Fire 3: Prefetch threshold H as a fnction of tilization for different vale of r. Fire 3 shows that as system load ρ increases, the prefetch threshold tends to increase as well, which means that fewer files shold be prefetched. t the increase is r5 r0 r0 r50 r00 r00 r
5 not monotonic for small vales of r. The reason is, in those cases, when the load is low, prefetch does not save mch time. As the load increases, it takes loner to transmit files and prefetch can save more time, ths the threshold decrease. As the load contines to increase, prefetch files will add relatively lon delay to the normal ser reqests, so the threshold needs to be increased aain. In determinin the prefetch threshold, we shold also take into consideration other network performance parameters, sch as Web server load, nmber of roters in the end-to-end connection, bandwidth of links between roters and volme of traffic on each roter. With the aid of some existin measrement software, we can obtain the accrate vale of these data. Here we se Response-time as composite index of network performance. We introdce a network performance factor f n. The new threshold H R is obtained by the followin fnction: H R f H () n The relationship between Response-time and f n is shown in Table, which is determined by the thosands of measrement. Or reslts showed that settins in the table cold achieve optimized effects. Table : Relationship of Response-time and network performance factor f n Response Time (ms) < >000 f n IMPLEMENTATION OF INTELLIGENT PROXY Conceptally, a proxy server transfers characters between the clients network application and the remote web servers. To provide a fll-dplex connection between them, a proxy server mst wait for and read data from two sides. ecase the proxy cannot know which sorce of data will become available first, it cannot block indefinitely waitin for inpt from one of the two sorces withot also checkin for inpt from the other. The proxy server shold be sed for a rop of people and an iterative implementation can perform poorly becase it reqires a iven client to wait while it handles all prior reqests. And the prefetch fnction will increase the response time for mltiple sers. A concrrent implementation avoids lon delays becase it dose not allow a sinle client to hold all resorces. Finally, concrrency can help desiner separate control and processin from normal inpt and otpt. Ths, we choose the concrrent and connection-oriented implementation for better-observed response. We employ mltithread method to realize sch taret. We have two main threads: one to read and maniplate console commands and the other to accept clients connectin reqest. When a client send reqests, the server bein two new threads for every client, one for transferrin data from the web server to the clients and the other for transferrin data reverse direction. The proxy server responses as soon as possible whenever data is available on either end. The prefetch fnction incldes three main parts: the manaement of prefetched files, the interaction of prefetch threads and normal fetchin threads, and prefetch alorithm. In order to control all the threads, we desin lobal strctre links to control all prefetch threads and other threads. Every ser has one link. The link node is called as Control Node. Each thread has one Control Node. A Control Node incldes data fields to record threads stats and properties. It also has data fields for sinals in order to deal with mltithread synchronization and mtal exclsion. In the next section we discss the details of or implementation. 6. The comptation of predictive access probability: In order to compte the final sed accessed probability in formla () we have to record all the access history for every ser s personal conters and rop conters as well. Usin all these data, we can et the personal access probability and the access probability of the special rop. As to the weiht, we choose an adaptive method to determine it. When one special ser ses the proxy for loner time, we can et enoh historical data to predict for him. That means the weiht will be increased slowly. We choose the followin steps to determine the weiht, and the steps are proved effective in practice. In followin, we se C to denote the access freqency for a special pae of one sinle ser and se C for the collective access freqency of rop. C, C < 0 and C > 00 C C β tan, C > 0 π 0 C tan, C < 0 and C < 00 π 0 When C is less than 0 and C is more than 00, the rop access probability will take the sinificant part in the final probability. If C is less than 0 and C is also less than 00, we consider that sin C is more accrate. This sitation will vanish when the proxy server is sed. 6. The modification of compted H R In formla () we et the threshold H R for predictive
6 prpose. In practice, we have to inclde the inflence of compter performance. We mst take into accont the nmber of concrrent mltithreads, memory sed and other network performance parameters. To enhance the proxy server s whole performance, we arrane the threads to several ranks havin different processin privilee. All the normal fetchin threads have the hihest level privilee and the prefetch threads have lower privilee sorted accordin to the access probability. The privilee will indce a bias in maniplation of perspective prefetch acts. When the CPU is rather bsy to deal with clients normal reqests, we have to redce prefetch threads. So in practice we modify the threshold H R to a little hiher as follows: H ' H R + 0.* H R * U. The U is defined as the tilization of compter resorce and can be compted approximately sin a iven nmber dividin the nmber of crrent threads. In or realization, we se a compter with Intel Pentim II 350, 8M RAM and 6.3G HD as a proxy server for 0 sers. We set the iven nmber to 500. In practice, the nmber of threads existed enerally is less than 50 and the clients are satisfied with the response time. Fire 4 is the loic diaram of or prefetch proxy server. In Cache, not in prefetch Consistency Verify Not Expire Expire Initialization Listenin Cache and Prefetch File Searchin Not in both Waitin for Web Server In oth Not in cache, in prefetch Prefetch Take-over sally no more than 30% to 50%. The reason is simple: Most people browse and explore the web, tryin to find new information. One way to frther raise the cachin hit ratio is to anticipate ftre docment reqests and prefetch these docments in a local cache. Ths, sccessfl prefetch pls cache redce the web latency observed by sers, and lower both server and network load. It is known that limited network bandwidth in the developin contries are the main reason to the Web access latency perceived by the sers. Or intellient proxy techniqes in the Web can redce the sers' waitin time, and redce the total nmber of access reqests to Web server and network commnication cost. One practical application is for people in developin contries to make freqent access to the Web servers to obtain technoloy and economic information from developed contries. ACKNOWLEDGMENTS This research was spported in part by the National Natral Science Fondation of China (NSFC) nder rant No Here we thank Oliver W. W. Yan, professor of School of Information Technoloy and Enineerin at University of Ottawa, who provided sefl comments on a draft of this paper. REFERENCES: [] Zhimei Jian, An Adaptive Network Prefetch Scheme, IEEE International Conference on Commnications, Part (of 3), vol., Jne [] Marc Abrams, Charles R. Standride, Cachin Proxies: Limitations and Potentials, [3] S. Glassman, A Cachin Relay for the World-Wide Web, In First International World Wide Web Conference, pp , May 994. [4] J. Gwertzman, Atonomos Replication in Wide- Area Networks, Technical Report, Harvard University, pp. 7-95, 995. Send Data to Client Prefetch alorith Prefetch chosen link Fire 4: The implementation of intellient proxy server 7. CONCLUSION The Web traffic contines to increase at exponential rates [4]. Cachin docments closer to sers redces the nmber of server reqests and the traffic associated with them. Unfortnately, several recent stdies sest that the maximm hit rate achievable by any cachin alorithm is
On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing
1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity
More informationREPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips
REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands
More informationThis chapter is based on the following sources, which are all recommended reading:
Bioinformatics I, WS 09-10, D. Hson, December 7, 2009 105 6 Fast String Matching This chapter is based on the following sorces, which are all recommended reading: 1. An earlier version of this chapter
More informationCS 153 Design of Operating Systems Spring 18
CS 53 Design of Operating Systems Spring 8 Lectre 2: Virtal Memory Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Recap: cache Well-written programs exhibit
More informationReview Multicycle: What is Happening. Controlling The Multicycle Design
Review lticycle: What is Happening Reslt Zero Op SrcA SrcB Registers Reg Address emory em Data Sign etend Shift left Sorce A B Ot [-6] [5-] [-6] [5-] [5-] Instrction emory IR RegDst emtoreg IorD em em
More informationIMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING
International Jornal of Modern Engineering Research (IJMER) www.imer.com Vol.1, Isse1, pp-134-139 ISSN: 2249-6645 IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING
More informationCost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks
Cost Based Local Forwarding Transmission Schemes for Two-hop Celllar Networks Zhenggang Zhao, Xming Fang, Yan Long, Xiaopeng H, Ye Zhao Key Lab of Information Coding & Transmission Sothwest Jiaotong University,
More informationThe Disciplined Flood Protocol in Sensor Networks
The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab
More informationRequirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems
Reqirements Engineering Objectives An introdction to reqirements Gerald Kotonya and Ian Sommerville To introdce the notion of system reqirements and the reqirements process. To explain how reqirements
More informationTdb: A Source-level Debugger for Dynamically Translated Programs
Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,
More informationAn Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast
University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna
More informationTopic Continuity for Web Document Categorization and Ranking
Topic Continity for Web ocment Categorization and Ranking B. L. Narayan, C. A. Mrthy and Sankar. Pal Machine Intelligence Unit, Indian Statistical Institte, 03, B. T. Road, olkata - 70008, India. E-mail:
More informationEvaluating Influence Diagrams
Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will
More informationThe extra single-cycle adders
lticycle Datapath As an added bons, we can eliminate some of the etra hardware from the single-cycle path. We will restrict orselves to sing each fnctional nit once per cycle, jst like before. Bt since
More informationThe Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment
This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment
More informationIsilon InsightIQ. Version 2.5. User Guide
Isilon InsightIQ Version 2.5 User Gide Pblished March, 2014 Copyright 2010-2014 EMC Corporation. All rights reserved. EMC believes the information in this pblication is accrate as of its pblication date.
More informationThe final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.
The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5
More information(2, 4) Tree Example (2, 4) Tree: Insertion
Presentation for se with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 B-Trees and External Memory (2, 4) Trees Each internal node has 2 to 4 children:
More informationBias of Higher Order Predictive Interpolation for Sub-pixel Registration
Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz
More informationThe single-cycle design from last time
lticycle path Last time we saw a single-cycle path and control nit for or simple IPS-based instrction set. A mlticycle processor fies some shortcomings in the single-cycle CPU. Faster instrctions are not
More informationProf. Kozyrakis. 1. (10 points) Consider the following fragment of Java code:
EE8 Winter 25 Homework #2 Soltions De Thrsday, Feb 2, 5 P. ( points) Consider the following fragment of Java code: for (i=; i
More information5 Performance Evaluation
5 Performance Evalation his chapter evalates the performance of the compared to the MIP, and FMIP individal performances. We stdy the packet loss and the latency to restore the downstream and pstream of
More informationCS 153 Design of Operating Systems Spring 18
CS 153 Design of Operating Systems Spring 18 Lectre 8: Threads Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Processes P1 P2 Recall that Bt OS A process
More informationMaster for Co-Simulation Using FMI
Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany
More informationCongestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems
Congestion-adaptive Data Collection with Accracy Garantee in Cyber-Physical Systems Nematollah Iri, Lei Y, Haiying Shen, Gregori Calfield Department of Electrical and Compter Engineering, Clemson University,
More informationEMC ViPR. User Guide. Version
EMC ViPR Version 1.1.0 User Gide 302-000-481 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is accrate
More informationTDT4255 Friday the 21st of October. Real world examples of pipelining? How does pipelining influence instruction
Review Friday the 2st of October Real world eamples of pipelining? How does pipelining pp inflence instrction latency? How does pipelining inflence instrction throghpt? What are the three types of hazard
More informationIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY 2007 1 On the Analysis of the Bletooth Time Division Dplex Mechanism Gil Zssman Member, IEEE, Adrian Segall Fellow, IEEE, and Uri Yechiali
More informationSubgraph Matching with Set Similarity in a Large Graph Database
1 Sbgraph Matching with Set Similarity in a Large Graph Database Liang Hong, Lei Zo, Xiang Lian, Philip S. Y Abstract In real-world graphs sch as social networks, Semantic Web and biological networks,
More informationEXAMINATIONS 2010 END OF YEAR NWEN 242 COMPUTER ORGANIZATION
EXAINATIONS 2010 END OF YEAR COPUTER ORGANIZATION Time Allowed: 3 Hors (180 mintes) Instrctions: Answer all qestions. ake sre yor answers are clear and to the point. Calclators and paper foreign langage
More informationA Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks
Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,
More informationUncertainty Determination for Dimensional Measurements with Computed Tomography
Uncertainty Determination for Dimensional Measrements with Compted Tomography Kim Kiekens 1,, Tan Ye 1,, Frank Welkenhyzen, Jean-Pierre Krth, Wim Dewlf 1, 1 Grop T even University College, KU even Association
More informationDate: December 5, 1999 Dist'n: T1E1.4
12/4/99 1 T1E14/99-559 Project: T1E14: VDSL Title: Vectored VDSL (99-559) Contact: J Cioffi, G Ginis, W Y Dept of EE, Stanford U, Stanford, CA 945 Cioffi@stanforded, 1-65-723-215, F: 1-65-724-3652 Date:
More informationPipelined van Emde Boas Tree: Algorithms, Analysis, and Applications
This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,
More informationCOMPOSITION OF STABLE SET POLYHEDRA
COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining
More informationNetworks An introduction to microcomputer networking concepts
Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES
More informationPicking and Curves Week 6
CS 48/68 INTERACTIVE COMPUTER GRAPHICS Picking and Crves Week 6 David Breen Department of Compter Science Drexel University Based on material from Ed Angel, University of New Mexico Objectives Picking
More informationResolving Linkage Anomalies in Extracted Software System Models
Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program
More informationLecture 13: Traffic Engineering
Lectre 13: Traffic Engineering CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Mike Freedman, Nick Feamster, and Ming Zhang Lectre 13 Overview Dealing with mltiple paths Mltihoming Entact
More informationReal-time mean-shift based tracker for thermal vision systems
9 th International Conference on Qantitative InfraRed Thermography Jly -5, 008, Krakow - Poland Real-time mean-shift based tracker for thermal vision systems G. Bieszczad* T. Sosnowski** * Military University
More informationAUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING
AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING Mingsheng LIAO, Li ZHANG, Zxn ZHANG, Jiangqing ZHANG Whan Technical University of Srveying and Mapping, Natinal Lab. for Information Eng. in
More informationDiscrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods
Annals of Operations Research 106, 19 46, 2001 2002 Klwer Academic Pblishers. Manfactred in The Netherlands. Discrete Cost Mlticommodity Network Optimization Problems and Exact Soltion Methods MICHEL MINOUX
More informationMaximum Weight Independent Sets in an Infinite Plane
Maximm Weight Independent Sets in an Infinite Plane Jarno Nosiainen, Jorma Virtamo, Pasi Lassila jarno.nosiainen@tkk.fi, jorma.virtamo@tkk.fi, pasi.lassila@tkk.fi Department of Commnications and Networking
More informationThe multicycle datapath. Lecture 10 (Wed 10/15/2008) Finite-state machine for the control unit. Implementing the FSM
Lectre (Wed /5/28) Lab # Hardware De Fri Oct 7 HW #2 IPS programming, de Wed Oct 22 idterm Fri Oct 2 IorD The mlticycle path SrcA Today s objectives: icroprogramming Etending the mlti-cycle path lti-cycle
More informationCompound Catadioptric Stereo Sensor for Omnidirectional Object Detection
Compond Catadioptric Stereo Sensor for mnidirectional bject Detection Ryske Sagawa Naoki Krita Tomio Echigo Yasshi Yagi The Institte of Scientific and Indstrial Research, saka University 8-1 Mihogaoka,
More informationAn Introduction to GPU Computing. Aaron Coutino MFCF
An Introdction to GPU Compting Aaron Cotino acotino@waterloo.ca MFCF What is a GPU? A GPU (Graphical Processing Unit) is a special type of processor that was designed to render and maniplate textres. They
More informationDIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES
DIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES Binh-Son Ha 1 Imari Sato 2 Kok-Lim Low 1 1 National University of Singapore 2 National Institte of Informatics, Tokyo, Japan ABSTRACT Dal
More informationMillimeter-Wave Multi-Hop Wireless Backhauling for 5G Cellular Networks
2017 IEEE 85th Vehiclar Technology Conference (VTC-Spring) Millimeter-Wave Mlti-Hop Wireless Backhaling for 5G Celllar Networks B. P. S. Sahoo, Chn-Han Yao, and Hng-Y Wei Gradate Institte of Electrical
More informationCS 153 Design of Operating Systems Spring 18
CS 153 Design of Operating Systems Spring 18 Lectre 11: Semaphores Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Last time Worked throgh software implementation
More informationComputer-Aided Mechanical Design Using Configuration Spaces
Compter-Aided Mechanical Design Using Configration Spaces Leo Joskowicz Institte of Compter Science The Hebrew University Jersalem 91904, Israel E-mail: josko@cs.hji.ac.il Elisha Sacks (corresponding athor)
More informationA choice relation framework for supporting category-partition test case generation
Title A choice relation framework for spporting category-partition test case generation Athor(s) Chen, TY; Poon, PL; Tse, TH Citation Ieee Transactions On Software Engineering, 2003, v. 29 n. 7, p. 577-593
More informationAdaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model
International Jornal of Knowledge Engineering, Vol. 1, No. 2, September 215 Adaptie Inflence Maximization in Microblog nder the Competitie Independent Cascade Model Zheng Ding, Kai Ni, and Zhiqiang He
More informationLocal Run Manager. Software Reference Guide for MiSeqDx
Local Rn Manager Software Reference Gide for MiSeqDx Local Rn Manager Overview 3 Dashboard Overview 4 Administrative Settings and Tasks 7 Workflow Overview 12 Technical Assistance 17 Docment # 1000000011880
More informationPavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003
From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information
More informationMulti-lingual Multi-media Information Retrieval System
Mlti-lingal Mlti-media Information Retrieval System Shoji Mizobchi, Sankon Lee, Fmihiko Kawano, Tsyoshi Kobayashi, Takahiro Komats Gradate School of Engineering, University of Tokshima 2-1 Minamijosanjima,
More informationImage Compression Compression Fundamentals
Compression Fndamentals Data compression refers to the process of redcing the amont of data reqired to represent given qantity of information. Note that data and information are not the same. Data refers
More informationMethod to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot
Method to bild an initial adaptive Nero-Fzzy controller for joints control of a legged robot J-C Habmremyi, P. ool and Y. Badoin Royal Military Academy-Free University of Brssels 08 Hobbema str, box:mrm,
More informationOn the Existence of Subliminal Channel in Instant Messaging Systems
, pp. 353-362 http://dx.doi.org/10.14257/ijsia.2015.9.3.27 On the Existence of Sbliminal Channel in Instant Messaging Systems Lingyn Xiang 1, Yha Xie 2, Gang Lo 3 and Weizheng Wang 1 1 School of Compter
More informationReview: Computer Organization
Review: Compter Organization Pipelining Chans Y Landry Eample Landry Eample Ann, Brian, Cathy, Dave each have one load of clothes to wash, dry, and fold Washer takes 3 mintes A B C D Dryer takes 3 mintes
More informationOffline and Online Scheduling of Concurrent Bags-of-Tasks on Heterogeneous Platforms
Offline and Online Schedling of Concrrent Bags-of-Tasks on Heterogeneos Platforms Anne Benoit, Loris Marchal, Jean-François Pinea, Yves Robert, Frédéric Vivien To cite this version: Anne Benoit, Loris
More informationIDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION
ICAS 2 CONGRESS IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION Christophe Le Garrec, Marc Hmbert, Michel Lacabanne Aérospatiale Matra
More informationHardware-Accelerated Free-Form Deformation
Hardware-Accelerated Free-Form Deformation Clint Cha and Ulrich Nemann Compter Science Department Integrated Media Systems Center University of Sothern California Abstract Hardware-acceleration for geometric
More informationEMC AppSync. User Guide. Version REV 01
EMC AppSync Version 1.5.0 User Gide 300-999-948 REV 01 Copyright 2012-2013 EMC Corporation. All rights reserved. Pblished in USA. EMC believes the information in this pblication is accrate as of its pblication
More informationContinuity Smooth Path Planning Using Cubic Polynomial Interpolation with Membership Function
J Electr Eng Technol Vol., No.?: 74-?, 5 http://dx.doi.org/.537/jeet.5..?.74 ISSN(Print) 975- ISSN(Online) 93-743 Continity Smooth Path Planning Using Cbic Polomial Interpolation with Membership Fnction
More informationWhat s New in AppSense Management Suite Version 7.0?
What s New in AMS V7.0 What s New in AppSense Management Site Version 7.0? AppSense Management Site Version 7.0 is the latest version of the AppSense prodct range and comprises three prodct components,
More informationReview. A single-cycle MIPS processor
Review If three instrctions have opcodes, 7 and 5 are they all of the same type? If we were to add an instrction to IPS of the form OD $t, $t2, $t3, which performs $t = $t2 OD $t3, what wold be its opcode?
More informationStatistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem
Statistical Methods in fnctional MRI Lectre 7: Mltiple Comparisons 04/3/13 Martin Lindqist Department of Biostatistics Johns Hopkins University Data Processing Pipeline Standard Analysis Data Acqisition
More informationMultiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET
Mltiple-Choice Test Chapter 09.0 Golden Section Search Method Optimization COMPLETE SOLUTION SET. Which o the ollowing statements is incorrect regarding the Eqal Interval Search and Golden Section Search
More informationMembership Library in DPDK Sameh Gobriel & Charlie Tai - Intel DPDK US Summit - San Jose
Membership Library in DPDK 17.11 Sameh Gobriel & Charlie Tai - Intel DPDK US Smmit - San Jose - 2017 Contribtors Yipeng Wang yipeng1.wang@intel.com Ren Wang ren.wang@intel.com John Mcnamara john.mcnamara@intel.com
More informationCS 153 Design of Operating Systems
CS 53 Design of Operating Systems Spring 8 Lectre 9: Locality and Cache Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Some slides modified from originals
More informationLDAP Configuration Guide
LDAP Configration Gide Content Content LDAP directories on Gigaset phones............................................... 3 Configration.....................................................................
More informationLecture 10. Diffraction. incident
1 Introdction Lectre 1 Diffraction It is qite often the case that no line-of-sight path exists between a cell phone and a basestation. In other words there are no basestations that the cstomer can see
More informationA Recovery Algorithm for Reliable Multicasting in Reliable Networks
A Recovery Algorithm for Reliable Mlticasting in Reliable Networks Danyang Zhang Sibabrata Ray Dept. of Compter Science University of Alabama Tscaloosa, AL 35487 {dzhang, sib}@cs.a.ed Ragopal Kannan S.
More informationFault Tolerance in Hypercubes
Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different
More informationToday s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of
Today s Lectre Lectre 27: Introdction to Software Architectre Kenneth M. Anderson Fondations of Software Engineering CSCI 5828 - Spring Semester, 1999 Introdction and Backgrond of Software Architectre
More informationEfficient and Accurate Delaunay Triangulation Protocols under Churn
Efficient and Accrate Delanay Trianglation Protocols nder Chrn Dong-Yong Lee and Simon S. Lam Department of Compter Sciences The University of Texas at Astin {dylee, lam}@cs.texas.ed November 9, 2007 Technical
More informationEEC 483 Computer Organization. Branch (Control) Hazards
EEC 483 Compter Organization Section 4.8 Branch Hazards Section 4.9 Exceptions Chans Y Branch (Control) Hazards While execting a previos branch, next instrction address might not yet be known. s n i o
More informationCS 4204 Computer Graphics
CS 424 Compter Graphics Crves and Srfaces Yong Cao Virginia Tech Reference: Ed Angle, Interactive Compter Graphics, University of New Mexico, class notes Crve and Srface Modeling Objectives Introdce types
More informationConstructing and Comparing User Mobility Profiles for Location-based Services
Constrcting and Comparing User Mobility Profiles for Location-based Services Xihi Chen Interdisciplinary Centre for Secrity, Reliability and Trst, University of Lxemborg Jn Pang Compter Science and Commnications,
More informationCollision Avoidance and Resolution Multiple Access: First-Success Protocols
Collision Avoidance and Resoltion Mltiple Access: First-Sccess Protocols Rodrigo Garcés and J.J. Garcia-Lna-Aceves askin Center for Compter Engineering and Information Sciences University of California
More informationFunctions of Combinational Logic
CHPTER 6 Fnctions of Combinational Logic CHPTER OUTLINE 6 6 6 6 6 5 6 6 6 7 6 8 6 9 6 6 Half and Fll dders Parallel inary dders Ripple Carry and Look-head Carry dders Comparators Decoders Encoders Code
More informationCS 153 Design of Operating Systems Spring 18
CS 153 Design of Operating Systems Spring 18 Lectre 9: Synchronization (1) Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Cooperation between Threads
More informationEfficient Mining of Partial Periodic Patterns in Time Series Database
Wright tate University CORE cholar Kno.e.sis Pblications The Ohio Center of Excellence in Knowledge- Enabled Compting (Kno.e.sis) 3-1999 Efficient Mining of Partial Periodic Patterns in Time eries Database
More informationAn Extensive Study of Static Regression Test Selection in Modern Software Evolution
An Extensive Stdy of Static Regression Test Selection in Modern Software Evoltion Owolabi Legnsen 1, Farah Hariri 1, Agst Shi 1, Yafeng L 2, Lingming Zhang 2, and Darko Marinov 1 1 Department of Compter
More informationA personalized search using a semantic distance measure in a graph-based ranking model
Article A personalized search sing a semantic distance measre in a graph-based ranking model Jornal of Information Science XX (X) pp. 1-23 The Athor(s) 2011 Reprints and Permissions: sagepb.co.k/jornalspermissions.nav
More informationCS 153 Design of Operating Systems Spring 18
CS 153 Design of Operating Systems Spring 18 Midterm Review Midterm in class on Friday (May 4) Covers material from arch spport to deadlock Based pon lectre material and modles of the book indicated on
More informationDynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un
Dynamic Maintenance of Majority Information in Constant Time per Update? Gdmnd S. Frandsen and Sven Skym BRICS 1 Department of Compter Science, University of arhs, Ny Mnkegade, DK-8000 arhs C, Denmark
More informationConstructing Multiple Light Multicast Trees in WDM Optical Networks
Constrcting Mltiple Light Mlticast Trees in WDM Optical Networks Weifa Liang Department of Compter Science Astralian National University Canberra ACT 0200 Astralia wliang@csaneda Abstract Mlticast roting
More informationSecure Biometric-Based Authentication for Cloud Computing
Secre Biometric-Based Athentication for Clod Compting Kok-Seng Wong * and Myng Ho Kim School of Compter Science and Engineering, Soongsil University, Sangdo-Dong Dongjak-G, 156-743 Seol Korea {kswong,kmh}@ss.ac.kr
More informationA Dynamic Bandwidth Allocation Mechanism for Slotted Ring Networks*
A Dynamic Bandwidth Aocation Mechanism for Sotted Ring Networs* L. OROZCO-BARBOSA University of Ottawa, Schoo of nformation Technoogy and Engineering 161 Lois Paster, St. Ottawa, ON, K1N 6N5 CANADA Abstract
More informationFeatures. ICMS Integrated Corrosion Management System
ICMS Integrated Corrosion System Featres Total Corrosion Data Data Exhange with DCS/PCS/SCADA Systems Correlate Corrosion & Process Data Enables Highly Cost-Effective Asset Designed Specifically for Corrosion
More informationA sufficient condition for spiral cone beam long object imaging via backprojection
A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral
More informationMETAMODEL FOR SOFTWARE SOLUTIONS IN COMPUTED TOMOGRAPHY
VOL. 10, NO 22, DECEBER, 2015 ISSN 1819-6608 ETAODEL FOR SOFTWARE SOLUTIONS IN COPUTED TOOGRAPHY Vitaliy ezhyev Faclty of Compter Systems and Software Engineering, Universiti alaysia Pahang, Gambang, alaysia
More informationIllumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY
Illmina LIMS Software Gide Jne 2017 ILLUMINA PROPRIETARY This docment and its contents are proprietary to Illmina, Inc. and its affiliates ("Illmina"), and are intended solely for the contractal se of
More informationEfficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks
1 Efficient Schedling for Periodic Aggregation Qeries in Mltihop Sensor Networks XiaoHa X, Shaojie Tang, Member, IEEE, XiangYang Li, Senior Member, IEEE Abstract In this work, we stdy periodic qery schedling
More informationVirtuOS: an operating system with kernel virtualization
VirtOS: an operating system with kernel virtalization Rslan Nikolaev, Godmar Back SOSP '13 Proceedings of the Twenty-Forth ACM Symposim on Oper ating Systems Principles 이영석, 신현호, 박재완 Index Motivation Design
More informationConstrained Routing Between Non-Visible Vertices
Constrained Roting Between Non-Visible Vertices Prosenjit Bose 1, Matias Korman 2, André van Renssen 3,4, and Sander Verdonschot 1 1 School of Compter Science, Carleton University, Ottawa, Canada. jit@scs.carleton.ca,
More informationBlended Deformable Models
Blended Deformable Models (In IEEE Trans. Pattern Analysis and Machine Intelligence, April 996, 8:4, pp. 443-448) Doglas DeCarlo and Dimitri Metaxas Department of Compter & Information Science University
More informationLecture 4: Routing. CSE 222A: Computer Communication Networks Alex C. Snoeren. Thanks: Amin Vahdat
Lectre 4: Roting CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Amin Vahdat Lectre 4 Overview Pop qiz Paxon 95 discssion Brief intro to overlay and active networking 2 End-to-End Roting
More informationPARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT
PAAMETE OPTIMIZATION FO TAKAGI-SUGENO FUZZY MODELS LESSONS LEANT Manfred Männle Inst. for Compter Design and Falt Tolerance Univ. of Karlsrhe, 768 Karlsrhe, Germany maennle@compter.org Brokat Technologies
More information