Measurement Based Intelligent Prefetch and Cache Technique in Web

Size: px
Start display at page:

Download "Measurement Based Intelligent Prefetch and Cache Technique in Web"

Transcription

1 Measrement ased Intellient Prefetch and Cache Techniqe in Web Zhen Zhao, Jie Yan, Son Wan, Gan Zhan, Yantai Sh Department of Compter Science, Tianin University, Tianin 30007, P.R.China Tel.: , Fax: Abstract In Web, sers in the same workrop miht have similar interests and habits. In this paper we stdy intellient proxy techniqes for people who se a proxy to access Web. Or intellient proxy has two parts: cache and prefetch. We researched three replacement policies for proxy cache: LRU and two variations of LRU. Or simlation showed that basic LRU prodces worst hit rate, while the other two policies achieve rohly the same reslts. Therefore, we choose a mixtre of them as or proposed scheme. y introdcin the prediction alorithm and threshold alorithm, The proxy can predict which Web files will be needed in the near ftre and download some of them before they are really reqested by the ser rop. We can et a more accrate probability by rnnin it on the proxy server than on the client site, when client ser has not visited a file in a Web server often enoh. y implementin the techniqes of prefetch and cache on the proxy server, we can redce the Web latency perceived by sers and also the total nmber of access reqests to Web server, ths propose a reasonable way of decreasin their cost to access the Web for developin contries.. INTRODUCTION Generally speakin, people workin in the same rop may have similar interests and habits. In other words, it's very likely that the paes they've reqested may relate to each other or even be the same one from the Web. Accordin to this characteristic, we proposed an intellient proxy techniqe for these people, who access the Web throh a proxy server. Compared to the existin proxy techniqes, or intellient proxy has two main distinishin featres. First, we enhanced the eneral proxy by addin a prefetch fnction to it. The prefetch techniqe has been sed to combine with the client browser [], bt has never been implemented in a proxy. The proxy, bein exposed to the Web accesses of mltiple sers who have similar interests, has the potential to predict more accrately which paes a ser miht access next, ths it can prefetch those paes to the ser's machine on behalf of the ser. Second, we made some improvements on the cache replacement alorithm of the eneral proxies, which sally se simple FIFO or pre LRU (Least Recently Used) alorithm. We se a variant of LRU alorithm, which achieved a mch hiher hit rate in the limited cache space. In this paper, we first analysis rop interests distribtion, then we desin or cache alorithm to be sed on the proxy and investiate an approach to redce the ser-perceived latency by prefetch from the Web server to the proxy. In the last section, we present the implementation scheme of or intellient proxy server.. THE ANALYSIS OF GROUP INTERESTS DISTRIUTION We assme that members in one rop may have similar interests and will access the Web for similar paes. To analyses this sitation we have stdied three different rops for their Web access traces. In stdyin the lo files of three months, we cont statistical data for all the visited URLs and their freqencies. We define Q n P n specified pae access cont all paes access cont pae cont havin specified Q total cont of access paes X n P n Q n > q n The relation between X n (%) X n and n Qn is shown in Fire Q n (%) Fire : Distribtion of rop interests

2 The fire can be sed to determine the similarity of the rop. In this fire, we have observed that X n (q n 5%) of the three rops are 0%~0%, which denotes that rop sers have enoh similarity. 3. IMPROVEMENT TO CACHE ALGORITHM If a docment is cached when it is accessed first time by a ser, it will be retrieved more efficiently on sbseqent accesses by the same ser or by the same rop members. A cachin proxy does a difficlt ob. First, in order to have a cache hit, the same docment has to be either reqested by one ser twice or more, or be reqested by two or more sers. Second, since most web browsers today have a bilt-in cache, a ser is nlikely to reqest a sinle docment twice in its life cycle. Ths the cache proxy can only have a hit when two or more sers reqest the same docment. This redces the fraction of reqests that the proxy can satisfy from its cache, known as the "hit rate". How effective cold a cachin proxy ever be? We first simlate a proxy server with nlimited disk space, so that cached docments are never deleted de to space limitations. This ives an pper bond on the hit rate a real proxy server can ever achieve. The simlation inpt was athered from several traces of all Web accesses drin 3 months. We observed 30-50% hit rate. We then considered the sitation when we have only limited disk space. Some files have to be replaced de to space limitations. Three replacement policies were examined: LRU and two variations of LRU. Or simlation showed that basic LRU prodces worst hit rate, while LRU-MIN and LRU-THOLD [] achieve rohly the same reslts. So we choose a mixtre of LRU-MIN and LRU-THOLD as or proposed cache scheme. 3.. Cache Replacement Policy Sppose that the size of an incomin reqest docment is S, and the file is not in the cache LRU Policy Classic least recently sed: When the free space in the cache is smaller than S, repeat the followin ntil the free space is at least S: replace the LRU docment. (LRU may discard many small docments to make room for one lare docment.) 3... LRU-MIN Policy A variant of LRU that tries to minimize the nmber of docments replace: Let L and T denote, respectively, a list and an inteer. () Set T to S. () Set L to all docments eqal to or larer than T. (L may be nll.) (3) Remove the LRU docments of list L ntil the list is empty, or the free cache space is at least T. (4) If the free cache space is not at least S, set T to T/ and oto () LRU-THOLD Policy A variant of LRU can avoid the sitation in which a docment that is lare compared to the cache size cases replacement of a lare nmber of smaller docments. This policy is identical to LRU, except that no docment larer than a threshold size is cached. (Even if the cache still has room.) 3.. Simlation Reslts We compared docment replacement policies LRU, LRU-MIN and LRU-THOLD, to identify which maximizes hit rate and minimizes disk size reqired for the cache. The reslts are in Table. Table : Comparison of three cache replacement policies Hit Rate (%) Cache Size (Mbytes) Lifetime (Hors) Min Max Min Max Min Max LRU LRU-M LRU-T In this table, iven an infinite disk space we confirmed that a cachin proxy has an pper bond of 30-50% in its hit rate as described in the reference [3]. In no case did LRU otperform the other replacement policies in Table. Given that the optimal threshold for LRU- THOLD is a fnction of the workload and the ratio of the disk size available for the cache compared to the cache size needed for no replacement, LRU-MIN is the best policy. It reqires no parameters and achieves the best performance most of the time. On the other hand, LRU-THOLD achieves dramatically smaller cache sizes with a small penalty in hit rate compared to LRU-MIN, ths LRU- THOLD is recommended when disk size is limited compared to the cache size reqired for no replacement. Finally, the lifetime reported in the table shows that a docment stays in the cache for reatly varyin times as mch as ten times loner for LRU-THOLD compared to LRU. The short lifetimes for LRU miht explain why its hit rates are never hiher than the other policies: docments are replaced too freqently. Therefore we decide to se the adaptive policy: se LRU-MIN ntil the cache size approached 00% of the available disk size and then chane to LRU-THOLD with a threshold that is radally redced ntil the cache size reaches a low water mark. 4. THE PREDICTION ALGORITHM

3 The prediction alorithms in this stdy observe information collected from past accesses from all the sers to predict what each ser miht access next. The proxy needs to lo all HTTP reqests of the sers and adapts its prefetch activity based on them. In or scheme, the proxy is reqired to maintain two kinds of conters, the pae conters and the link conters, to keep track of each ser's access history. Each pae A is associated with a pae conter C A. In addition, if pae can be accessed directly from pae A, in other words, there exists a hyperlink of on pae A, then we se conter C (A,) to denote this link. Whenever pae A is accessed, the conter C A is increased by one. Similarly, the conter C (A,) is also increased by one, if pae is accessed by clickin on the correspondin link on pae A. The cmlative vale of conter C A and C (A,) can be achieved by addin p each ser's C A and C (A,) respectively. We se conditional probability P( A) to denote the probability of "a ser is to access pae riht after he or she accesses pae A". Therefore, the personal access probability is obtained in the followin way. When a pae A is bein viewed by the ser, for each pae i linked to A, the access probability of i is compted as P( i A) C (i,a) /C A. As described above, the rop sin the proxy has very similar interests. Therefore, the definition of rop access probability has sinificant meanin in the proxybased prediction alorithm. Assmin there are k members in the rop, the rop access probability of i is defined as where P ( i A ) k k C C denotes the th rop member's C A A. ( C A We have three choices to define or final sed access probability. The first one is to se personal access probability p. It is known that the accracy of prediction is closely related to personal interests, which is well indicated by this probability. However, when the ser's Web access history information is rather scant, the probability may not really reflect his or her real interests. The second choice is to se the rop access probability p. Jst as the rop has some common interests, the accmlative data can represent the poplarity of the paes over the rop members. Therefore, this probability may reflect the ser's interests to a certain extent, especially, the more similar the rop members' interests are, and the better this probability fits. Last bt not the least, we introdce the third choice, which we have adopted in this paper, interatin the advantaes of first two choices. y introdcin a weiht β, here we present the interated access probability as p β p + ( - β ) p (), A ) where 0< β <. We can emphasize the personal data or rop data by adstin the vale of β. 5. THE THRESHOLD MODULE Or threshold alorithm is based on that described by Zhimei Jian []. However, there are a few noteworthy differences. First, their scheme was desined for se by a sinle ser to prefetch files on the Web, in which the prefetch enine was located on the ser's local machine. Or model is to pt the prefetch enine on the proxy server, takin advantae of the accmlative data collected on the proxy to achieve a better prediction reslt. Therefore, or threshold alorithm is desined for sers in a rop, who share the same proxy server. Second, by adstin the parameter β, we can obtain their reslts as a limit case of or alorithm; that is to say, or model has a wider application in some senses. In order to et a better tradeoff between system resorce sae and latency, or prefetch stratey first predicts which files are likely to be needed soon and chooses some of them to download beforehand. The first part of this task is accomplished by the prediction modle that we discss in the last section. In the threshold modle, we determine the prefetch threshold for the Web server in real time to determine which files to prefetch. We se the term cost to measre the system performance, which is comprised of the delay cost (α T $/time nit) and the system resorce cost (α $/time nit). The delay cost indicates how valable the time is to the ser. The system resorce cost incldes the cost of processin the packets at the end nodes and that of transmittin them from the sorce to the destination. In this section, we stdy how to determine which files to prefetch in order to minimize the averae cost of reqestin a file for several system models. 5. The cost fnction C For a iven system, let be the arrival rate of ser reqests for paes when no prefetch is applies. We assme that prefetch does not affect the ser's behavior reardin the likelihood of accessed paes. In other words, when prefetch is employed, sers still isse reqests at rate in the same pattern, althoh they can et some paes faster de to prefetch. Let the arrival rate of normal reqests and prefetch reqests are and respectively. Hence the rate at which ser reqests are satisfied by the prefetched files is -, which is simple p becase prefetched paes are eventally reqested by the ser with probability p, where p is the access probability of the prefetched paes. Ths + p, or + + ( - p) () In a Rond-Robin processor-sharin system, the averae response time for reqests reqirin an averae of

4 x time nits of processin is x s t (3) ρ b ( ρ ) where ρ is the system load, s is the averae file size, and b is the system capacity. For the system shown in Fire, ρ s ( + ) / b. Therefore, the cost of a normal reqest, which is the sm of the system resorce cost and the delay cost, becomes s c α s + α t α s + α (4) T T b ( + ) Normal reqests Prefetch reqests Fire : The prefetch system model We can see that in the above eqation, as more files are prefetched, the cost of normal reqests increases becase prefetch increases the system load, which will increase the delay of retrievin files. The averae cost of a prefetched reqest is c α s (5) We obtain the final averae fnction of cost as follows: C c + c s ( p ) αt {[ + ( p) ] α + } b [ + ( p) ] s (6) Pt () into (6), we obtain or obective cost fnction. C s {[ + [ β p - ( - β )p ] ] α (7) + [ ( β p + ( - β ) p ) ] α T } b [ + [ β p - ( - β ) p ] ] s Processor sharin S will et its maximm vale at the zero point of Therefore, we can et the critical vale ', which is dc. d αt ( b( β p + ( β) p) s) ' ( b s ) s ( β p ( β) p) α( β p ( β) p) (9) Since fnction (7) is maximized at ', where dc 0 for d b (β p +( - β) p ) <s, it follows that the cost decreases as increases for > '. Specifically, if ' 0 for the iven p,, and r (α T /α ), then for any in the rane of [0,/p], the hiher the, i.e. the more that files with access probability p are prefetched, the lower the cost is. Ths, for the iven p,, and r, if ' <0, then prefetch all the files with access probability p will minimize the cost. 5.3 The prefetch threshold H Let s now find the prefetch threshold H sch that the cost can be minimized by prefetch all the files with access probabilities p, for p reater than H. From eqation (9), we obtain that ' 0 if and only if (0) ( β p ( ρ ) r + ( β ) p ) ( ρ ) b + r where ρs / b. We then set the prefetch threshold to be ρ () H ( ( ρ ) ) r b + Eqation (0) shows that if the access probability p is reater than or eqal to the threshold H, then ' 0 accordin to (9). Moreover, followin or previos analysis, this implies that prefetch all the files with access probability p minimize the cost, for p H. The threshold H is plotted in Fire 3 as a fnction of system tilization ρ for several different vales of r. 0.9 r 5. The optimm vale of the prefetch rate Let's assme the vale of p and are known, we wish to find at which point of, the averae reqest cost in the system can et its minimized vale. From the eqation (7), we take the second order derivative of C with respect to, and obtain d C s αt ( s b( β p + ( β) p ))( β p ( β) p ) [ ](8) 3 d ( b s ( + ( β p ( β) p ))) The prereqisite of a system to be stable is that + mst be less than b/s, that is to say s ( + ( β p - ( - β) p ) ) < b Therefore, as lon as s < b (β p +( - β) p ), the vale of (8) will definitely below the zero. It implies if s < b (β p +( - β) p ), the eqation (7) Prefetch Threshold H Utilization Fire 3: Prefetch threshold H as a fnction of tilization for different vale of r. Fire 3 shows that as system load ρ increases, the prefetch threshold tends to increase as well, which means that fewer files shold be prefetched. t the increase is r5 r0 r0 r50 r00 r00 r

5 not monotonic for small vales of r. The reason is, in those cases, when the load is low, prefetch does not save mch time. As the load increases, it takes loner to transmit files and prefetch can save more time, ths the threshold decrease. As the load contines to increase, prefetch files will add relatively lon delay to the normal ser reqests, so the threshold needs to be increased aain. In determinin the prefetch threshold, we shold also take into consideration other network performance parameters, sch as Web server load, nmber of roters in the end-to-end connection, bandwidth of links between roters and volme of traffic on each roter. With the aid of some existin measrement software, we can obtain the accrate vale of these data. Here we se Response-time as composite index of network performance. We introdce a network performance factor f n. The new threshold H R is obtained by the followin fnction: H R f H () n The relationship between Response-time and f n is shown in Table, which is determined by the thosands of measrement. Or reslts showed that settins in the table cold achieve optimized effects. Table : Relationship of Response-time and network performance factor f n Response Time (ms) < >000 f n IMPLEMENTATION OF INTELLIGENT PROXY Conceptally, a proxy server transfers characters between the clients network application and the remote web servers. To provide a fll-dplex connection between them, a proxy server mst wait for and read data from two sides. ecase the proxy cannot know which sorce of data will become available first, it cannot block indefinitely waitin for inpt from one of the two sorces withot also checkin for inpt from the other. The proxy server shold be sed for a rop of people and an iterative implementation can perform poorly becase it reqires a iven client to wait while it handles all prior reqests. And the prefetch fnction will increase the response time for mltiple sers. A concrrent implementation avoids lon delays becase it dose not allow a sinle client to hold all resorces. Finally, concrrency can help desiner separate control and processin from normal inpt and otpt. Ths, we choose the concrrent and connection-oriented implementation for better-observed response. We employ mltithread method to realize sch taret. We have two main threads: one to read and maniplate console commands and the other to accept clients connectin reqest. When a client send reqests, the server bein two new threads for every client, one for transferrin data from the web server to the clients and the other for transferrin data reverse direction. The proxy server responses as soon as possible whenever data is available on either end. The prefetch fnction incldes three main parts: the manaement of prefetched files, the interaction of prefetch threads and normal fetchin threads, and prefetch alorithm. In order to control all the threads, we desin lobal strctre links to control all prefetch threads and other threads. Every ser has one link. The link node is called as Control Node. Each thread has one Control Node. A Control Node incldes data fields to record threads stats and properties. It also has data fields for sinals in order to deal with mltithread synchronization and mtal exclsion. In the next section we discss the details of or implementation. 6. The comptation of predictive access probability: In order to compte the final sed accessed probability in formla () we have to record all the access history for every ser s personal conters and rop conters as well. Usin all these data, we can et the personal access probability and the access probability of the special rop. As to the weiht, we choose an adaptive method to determine it. When one special ser ses the proxy for loner time, we can et enoh historical data to predict for him. That means the weiht will be increased slowly. We choose the followin steps to determine the weiht, and the steps are proved effective in practice. In followin, we se C to denote the access freqency for a special pae of one sinle ser and se C for the collective access freqency of rop. C, C < 0 and C > 00 C C β tan, C > 0 π 0 C tan, C < 0 and C < 00 π 0 When C is less than 0 and C is more than 00, the rop access probability will take the sinificant part in the final probability. If C is less than 0 and C is also less than 00, we consider that sin C is more accrate. This sitation will vanish when the proxy server is sed. 6. The modification of compted H R In formla () we et the threshold H R for predictive

6 prpose. In practice, we have to inclde the inflence of compter performance. We mst take into accont the nmber of concrrent mltithreads, memory sed and other network performance parameters. To enhance the proxy server s whole performance, we arrane the threads to several ranks havin different processin privilee. All the normal fetchin threads have the hihest level privilee and the prefetch threads have lower privilee sorted accordin to the access probability. The privilee will indce a bias in maniplation of perspective prefetch acts. When the CPU is rather bsy to deal with clients normal reqests, we have to redce prefetch threads. So in practice we modify the threshold H R to a little hiher as follows: H ' H R + 0.* H R * U. The U is defined as the tilization of compter resorce and can be compted approximately sin a iven nmber dividin the nmber of crrent threads. In or realization, we se a compter with Intel Pentim II 350, 8M RAM and 6.3G HD as a proxy server for 0 sers. We set the iven nmber to 500. In practice, the nmber of threads existed enerally is less than 50 and the clients are satisfied with the response time. Fire 4 is the loic diaram of or prefetch proxy server. In Cache, not in prefetch Consistency Verify Not Expire Expire Initialization Listenin Cache and Prefetch File Searchin Not in both Waitin for Web Server In oth Not in cache, in prefetch Prefetch Take-over sally no more than 30% to 50%. The reason is simple: Most people browse and explore the web, tryin to find new information. One way to frther raise the cachin hit ratio is to anticipate ftre docment reqests and prefetch these docments in a local cache. Ths, sccessfl prefetch pls cache redce the web latency observed by sers, and lower both server and network load. It is known that limited network bandwidth in the developin contries are the main reason to the Web access latency perceived by the sers. Or intellient proxy techniqes in the Web can redce the sers' waitin time, and redce the total nmber of access reqests to Web server and network commnication cost. One practical application is for people in developin contries to make freqent access to the Web servers to obtain technoloy and economic information from developed contries. ACKNOWLEDGMENTS This research was spported in part by the National Natral Science Fondation of China (NSFC) nder rant No Here we thank Oliver W. W. Yan, professor of School of Information Technoloy and Enineerin at University of Ottawa, who provided sefl comments on a draft of this paper. REFERENCES: [] Zhimei Jian, An Adaptive Network Prefetch Scheme, IEEE International Conference on Commnications, Part (of 3), vol., Jne [] Marc Abrams, Charles R. Standride, Cachin Proxies: Limitations and Potentials, [3] S. Glassman, A Cachin Relay for the World-Wide Web, In First International World Wide Web Conference, pp , May 994. [4] J. Gwertzman, Atonomos Replication in Wide- Area Networks, Technical Report, Harvard University, pp. 7-95, 995. Send Data to Client Prefetch alorith Prefetch chosen link Fire 4: The implementation of intellient proxy server 7. CONCLUSION The Web traffic contines to increase at exponential rates [4]. Cachin docments closer to sers redces the nmber of server reqests and the traffic associated with them. Unfortnately, several recent stdies sest that the maximm hit rate achievable by any cachin alorithm is

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity

More information

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands

More information

This chapter is based on the following sources, which are all recommended reading:

This chapter is based on the following sources, which are all recommended reading: Bioinformatics I, WS 09-10, D. Hson, December 7, 2009 105 6 Fast String Matching This chapter is based on the following sorces, which are all recommended reading: 1. An earlier version of this chapter

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 53 Design of Operating Systems Spring 8 Lectre 2: Virtal Memory Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Recap: cache Well-written programs exhibit

More information

Review Multicycle: What is Happening. Controlling The Multicycle Design

Review Multicycle: What is Happening. Controlling The Multicycle Design Review lticycle: What is Happening Reslt Zero Op SrcA SrcB Registers Reg Address emory em Data Sign etend Shift left Sorce A B Ot [-6] [5-] [-6] [5-] [5-] Instrction emory IR RegDst emtoreg IorD em em

More information

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING International Jornal of Modern Engineering Research (IJMER) www.imer.com Vol.1, Isse1, pp-134-139 ISSN: 2249-6645 IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING

More information

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks Cost Based Local Forwarding Transmission Schemes for Two-hop Celllar Networks Zhenggang Zhao, Xming Fang, Yan Long, Xiaopeng H, Ye Zhao Key Lab of Information Coding & Transmission Sothwest Jiaotong University,

More information

The Disciplined Flood Protocol in Sensor Networks

The Disciplined Flood Protocol in Sensor Networks The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab

More information

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems Reqirements Engineering Objectives An introdction to reqirements Gerald Kotonya and Ian Sommerville To introdce the notion of system reqirements and the reqirements process. To explain how reqirements

More information

Tdb: A Source-level Debugger for Dynamically Translated Programs

Tdb: A Source-level Debugger for Dynamically Translated Programs Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,

More information

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna

More information

Topic Continuity for Web Document Categorization and Ranking

Topic Continuity for Web Document Categorization and Ranking Topic Continity for Web ocment Categorization and Ranking B. L. Narayan, C. A. Mrthy and Sankar. Pal Machine Intelligence Unit, Indian Statistical Institte, 03, B. T. Road, olkata - 70008, India. E-mail:

More information

Evaluating Influence Diagrams

Evaluating Influence Diagrams Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will

More information

The extra single-cycle adders

The extra single-cycle adders lticycle Datapath As an added bons, we can eliminate some of the etra hardware from the single-cycle path. We will restrict orselves to sing each fnctional nit once per cycle, jst like before. Bt since

More information

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment

More information

Isilon InsightIQ. Version 2.5. User Guide

Isilon InsightIQ. Version 2.5. User Guide Isilon InsightIQ Version 2.5 User Gide Pblished March, 2014 Copyright 2010-2014 EMC Corporation. All rights reserved. EMC believes the information in this pblication is accrate as of its pblication date.

More information

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read. The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5

More information

(2, 4) Tree Example (2, 4) Tree: Insertion

(2, 4) Tree Example (2, 4) Tree: Insertion Presentation for se with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 B-Trees and External Memory (2, 4) Trees Each internal node has 2 to 4 children:

More information

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz

More information

The single-cycle design from last time

The single-cycle design from last time lticycle path Last time we saw a single-cycle path and control nit for or simple IPS-based instrction set. A mlticycle processor fies some shortcomings in the single-cycle CPU. Faster instrctions are not

More information

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code:

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code: EE8 Winter 25 Homework #2 Soltions De Thrsday, Feb 2, 5 P. ( points) Consider the following fragment of Java code: for (i=; i

More information

5 Performance Evaluation

5 Performance Evaluation 5 Performance Evalation his chapter evalates the performance of the compared to the MIP, and FMIP individal performances. We stdy the packet loss and the latency to restore the downstream and pstream of

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 8: Threads Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Processes P1 P2 Recall that Bt OS A process

More information

Master for Co-Simulation Using FMI

Master for Co-Simulation Using FMI Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany

More information

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems Congestion-adaptive Data Collection with Accracy Garantee in Cyber-Physical Systems Nematollah Iri, Lei Y, Haiying Shen, Gregori Calfield Department of Electrical and Compter Engineering, Clemson University,

More information

EMC ViPR. User Guide. Version

EMC ViPR. User Guide. Version EMC ViPR Version 1.1.0 User Gide 302-000-481 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is accrate

More information

TDT4255 Friday the 21st of October. Real world examples of pipelining? How does pipelining influence instruction

TDT4255 Friday the 21st of October. Real world examples of pipelining? How does pipelining influence instruction Review Friday the 2st of October Real world eamples of pipelining? How does pipelining pp inflence instrction latency? How does pipelining inflence instrction throghpt? What are the three types of hazard

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY 2007 1 On the Analysis of the Bletooth Time Division Dplex Mechanism Gil Zssman Member, IEEE, Adrian Segall Fellow, IEEE, and Uri Yechiali

More information

Subgraph Matching with Set Similarity in a Large Graph Database

Subgraph Matching with Set Similarity in a Large Graph Database 1 Sbgraph Matching with Set Similarity in a Large Graph Database Liang Hong, Lei Zo, Xiang Lian, Philip S. Y Abstract In real-world graphs sch as social networks, Semantic Web and biological networks,

More information

EXAMINATIONS 2010 END OF YEAR NWEN 242 COMPUTER ORGANIZATION

EXAMINATIONS 2010 END OF YEAR NWEN 242 COMPUTER ORGANIZATION EXAINATIONS 2010 END OF YEAR COPUTER ORGANIZATION Time Allowed: 3 Hors (180 mintes) Instrctions: Answer all qestions. ake sre yor answers are clear and to the point. Calclators and paper foreign langage

More information

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,

More information

Uncertainty Determination for Dimensional Measurements with Computed Tomography

Uncertainty Determination for Dimensional Measurements with Computed Tomography Uncertainty Determination for Dimensional Measrements with Compted Tomography Kim Kiekens 1,, Tan Ye 1,, Frank Welkenhyzen, Jean-Pierre Krth, Wim Dewlf 1, 1 Grop T even University College, KU even Association

More information

Date: December 5, 1999 Dist'n: T1E1.4

Date: December 5, 1999 Dist'n: T1E1.4 12/4/99 1 T1E14/99-559 Project: T1E14: VDSL Title: Vectored VDSL (99-559) Contact: J Cioffi, G Ginis, W Y Dept of EE, Stanford U, Stanford, CA 945 Cioffi@stanforded, 1-65-723-215, F: 1-65-724-3652 Date:

More information

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,

More information

COMPOSITION OF STABLE SET POLYHEDRA

COMPOSITION OF STABLE SET POLYHEDRA COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining

More information

Networks An introduction to microcomputer networking concepts

Networks An introduction to microcomputer networking concepts Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES

More information

Picking and Curves Week 6

Picking and Curves Week 6 CS 48/68 INTERACTIVE COMPUTER GRAPHICS Picking and Crves Week 6 David Breen Department of Compter Science Drexel University Based on material from Ed Angel, University of New Mexico Objectives Picking

More information

Resolving Linkage Anomalies in Extracted Software System Models

Resolving Linkage Anomalies in Extracted Software System Models Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program

More information

Lecture 13: Traffic Engineering

Lecture 13: Traffic Engineering Lectre 13: Traffic Engineering CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Mike Freedman, Nick Feamster, and Ming Zhang Lectre 13 Overview Dealing with mltiple paths Mltihoming Entact

More information

Real-time mean-shift based tracker for thermal vision systems

Real-time mean-shift based tracker for thermal vision systems 9 th International Conference on Qantitative InfraRed Thermography Jly -5, 008, Krakow - Poland Real-time mean-shift based tracker for thermal vision systems G. Bieszczad* T. Sosnowski** * Military University

More information

AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING

AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING Mingsheng LIAO, Li ZHANG, Zxn ZHANG, Jiangqing ZHANG Whan Technical University of Srveying and Mapping, Natinal Lab. for Information Eng. in

More information

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods Annals of Operations Research 106, 19 46, 2001 2002 Klwer Academic Pblishers. Manfactred in The Netherlands. Discrete Cost Mlticommodity Network Optimization Problems and Exact Soltion Methods MICHEL MINOUX

More information

Maximum Weight Independent Sets in an Infinite Plane

Maximum Weight Independent Sets in an Infinite Plane Maximm Weight Independent Sets in an Infinite Plane Jarno Nosiainen, Jorma Virtamo, Pasi Lassila jarno.nosiainen@tkk.fi, jorma.virtamo@tkk.fi, pasi.lassila@tkk.fi Department of Commnications and Networking

More information

The multicycle datapath. Lecture 10 (Wed 10/15/2008) Finite-state machine for the control unit. Implementing the FSM

The multicycle datapath. Lecture 10 (Wed 10/15/2008) Finite-state machine for the control unit. Implementing the FSM Lectre (Wed /5/28) Lab # Hardware De Fri Oct 7 HW #2 IPS programming, de Wed Oct 22 idterm Fri Oct 2 IorD The mlticycle path SrcA Today s objectives: icroprogramming Etending the mlti-cycle path lti-cycle

More information

Compound Catadioptric Stereo Sensor for Omnidirectional Object Detection

Compound Catadioptric Stereo Sensor for Omnidirectional Object Detection Compond Catadioptric Stereo Sensor for mnidirectional bject Detection Ryske Sagawa Naoki Krita Tomio Echigo Yasshi Yagi The Institte of Scientific and Indstrial Research, saka University 8-1 Mihogaoka,

More information

An Introduction to GPU Computing. Aaron Coutino MFCF

An Introduction to GPU Computing. Aaron Coutino MFCF An Introdction to GPU Compting Aaron Cotino acotino@waterloo.ca MFCF What is a GPU? A GPU (Graphical Processing Unit) is a special type of processor that was designed to render and maniplate textres. They

More information

DIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES

DIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES DIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES Binh-Son Ha 1 Imari Sato 2 Kok-Lim Low 1 1 National University of Singapore 2 National Institte of Informatics, Tokyo, Japan ABSTRACT Dal

More information

Millimeter-Wave Multi-Hop Wireless Backhauling for 5G Cellular Networks

Millimeter-Wave Multi-Hop Wireless Backhauling for 5G Cellular Networks 2017 IEEE 85th Vehiclar Technology Conference (VTC-Spring) Millimeter-Wave Mlti-Hop Wireless Backhaling for 5G Celllar Networks B. P. S. Sahoo, Chn-Han Yao, and Hng-Y Wei Gradate Institte of Electrical

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 11: Semaphores Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Last time Worked throgh software implementation

More information

Computer-Aided Mechanical Design Using Configuration Spaces

Computer-Aided Mechanical Design Using Configuration Spaces Compter-Aided Mechanical Design Using Configration Spaces Leo Joskowicz Institte of Compter Science The Hebrew University Jersalem 91904, Israel E-mail: josko@cs.hji.ac.il Elisha Sacks (corresponding athor)

More information

A choice relation framework for supporting category-partition test case generation

A choice relation framework for supporting category-partition test case generation Title A choice relation framework for spporting category-partition test case generation Athor(s) Chen, TY; Poon, PL; Tse, TH Citation Ieee Transactions On Software Engineering, 2003, v. 29 n. 7, p. 577-593

More information

Adaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model

Adaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model International Jornal of Knowledge Engineering, Vol. 1, No. 2, September 215 Adaptie Inflence Maximization in Microblog nder the Competitie Independent Cascade Model Zheng Ding, Kai Ni, and Zhiqiang He

More information

Local Run Manager. Software Reference Guide for MiSeqDx

Local Run Manager. Software Reference Guide for MiSeqDx Local Rn Manager Software Reference Gide for MiSeqDx Local Rn Manager Overview 3 Dashboard Overview 4 Administrative Settings and Tasks 7 Workflow Overview 12 Technical Assistance 17 Docment # 1000000011880

More information

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003 From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information

More information

Multi-lingual Multi-media Information Retrieval System

Multi-lingual Multi-media Information Retrieval System Mlti-lingal Mlti-media Information Retrieval System Shoji Mizobchi, Sankon Lee, Fmihiko Kawano, Tsyoshi Kobayashi, Takahiro Komats Gradate School of Engineering, University of Tokshima 2-1 Minamijosanjima,

More information

Image Compression Compression Fundamentals

Image Compression Compression Fundamentals Compression Fndamentals Data compression refers to the process of redcing the amont of data reqired to represent given qantity of information. Note that data and information are not the same. Data refers

More information

Method to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot

Method to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot Method to bild an initial adaptive Nero-Fzzy controller for joints control of a legged robot J-C Habmremyi, P. ool and Y. Badoin Royal Military Academy-Free University of Brssels 08 Hobbema str, box:mrm,

More information

On the Existence of Subliminal Channel in Instant Messaging Systems

On the Existence of Subliminal Channel in Instant Messaging Systems , pp. 353-362 http://dx.doi.org/10.14257/ijsia.2015.9.3.27 On the Existence of Sbliminal Channel in Instant Messaging Systems Lingyn Xiang 1, Yha Xie 2, Gang Lo 3 and Weizheng Wang 1 1 School of Compter

More information

Review: Computer Organization

Review: Computer Organization Review: Compter Organization Pipelining Chans Y Landry Eample Landry Eample Ann, Brian, Cathy, Dave each have one load of clothes to wash, dry, and fold Washer takes 3 mintes A B C D Dryer takes 3 mintes

More information

Offline and Online Scheduling of Concurrent Bags-of-Tasks on Heterogeneous Platforms

Offline and Online Scheduling of Concurrent Bags-of-Tasks on Heterogeneous Platforms Offline and Online Schedling of Concrrent Bags-of-Tasks on Heterogeneos Platforms Anne Benoit, Loris Marchal, Jean-François Pinea, Yves Robert, Frédéric Vivien To cite this version: Anne Benoit, Loris

More information

IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION

IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION ICAS 2 CONGRESS IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION Christophe Le Garrec, Marc Hmbert, Michel Lacabanne Aérospatiale Matra

More information

Hardware-Accelerated Free-Form Deformation

Hardware-Accelerated Free-Form Deformation Hardware-Accelerated Free-Form Deformation Clint Cha and Ulrich Nemann Compter Science Department Integrated Media Systems Center University of Sothern California Abstract Hardware-acceleration for geometric

More information

EMC AppSync. User Guide. Version REV 01

EMC AppSync. User Guide. Version REV 01 EMC AppSync Version 1.5.0 User Gide 300-999-948 REV 01 Copyright 2012-2013 EMC Corporation. All rights reserved. Pblished in USA. EMC believes the information in this pblication is accrate as of its pblication

More information

Continuity Smooth Path Planning Using Cubic Polynomial Interpolation with Membership Function

Continuity Smooth Path Planning Using Cubic Polynomial Interpolation with Membership Function J Electr Eng Technol Vol., No.?: 74-?, 5 http://dx.doi.org/.537/jeet.5..?.74 ISSN(Print) 975- ISSN(Online) 93-743 Continity Smooth Path Planning Using Cbic Polomial Interpolation with Membership Fnction

More information

What s New in AppSense Management Suite Version 7.0?

What s New in AppSense Management Suite Version 7.0? What s New in AMS V7.0 What s New in AppSense Management Site Version 7.0? AppSense Management Site Version 7.0 is the latest version of the AppSense prodct range and comprises three prodct components,

More information

Review. A single-cycle MIPS processor

Review. A single-cycle MIPS processor Review If three instrctions have opcodes, 7 and 5 are they all of the same type? If we were to add an instrction to IPS of the form OD $t, $t2, $t3, which performs $t = $t2 OD $t3, what wold be its opcode?

More information

Statistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem

Statistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem Statistical Methods in fnctional MRI Lectre 7: Mltiple Comparisons 04/3/13 Martin Lindqist Department of Biostatistics Johns Hopkins University Data Processing Pipeline Standard Analysis Data Acqisition

More information

Multiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET

Multiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET Mltiple-Choice Test Chapter 09.0 Golden Section Search Method Optimization COMPLETE SOLUTION SET. Which o the ollowing statements is incorrect regarding the Eqal Interval Search and Golden Section Search

More information

Membership Library in DPDK Sameh Gobriel & Charlie Tai - Intel DPDK US Summit - San Jose

Membership Library in DPDK Sameh Gobriel & Charlie Tai - Intel DPDK US Summit - San Jose Membership Library in DPDK 17.11 Sameh Gobriel & Charlie Tai - Intel DPDK US Smmit - San Jose - 2017 Contribtors Yipeng Wang yipeng1.wang@intel.com Ren Wang ren.wang@intel.com John Mcnamara john.mcnamara@intel.com

More information

CS 153 Design of Operating Systems

CS 153 Design of Operating Systems CS 53 Design of Operating Systems Spring 8 Lectre 9: Locality and Cache Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Some slides modified from originals

More information

LDAP Configuration Guide

LDAP Configuration Guide LDAP Configration Gide Content Content LDAP directories on Gigaset phones............................................... 3 Configration.....................................................................

More information

Lecture 10. Diffraction. incident

Lecture 10. Diffraction. incident 1 Introdction Lectre 1 Diffraction It is qite often the case that no line-of-sight path exists between a cell phone and a basestation. In other words there are no basestations that the cstomer can see

More information

A Recovery Algorithm for Reliable Multicasting in Reliable Networks

A Recovery Algorithm for Reliable Multicasting in Reliable Networks A Recovery Algorithm for Reliable Mlticasting in Reliable Networks Danyang Zhang Sibabrata Ray Dept. of Compter Science University of Alabama Tscaloosa, AL 35487 {dzhang, sib}@cs.a.ed Ragopal Kannan S.

More information

Fault Tolerance in Hypercubes

Fault Tolerance in Hypercubes Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different

More information

Today s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of

Today s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of Today s Lectre Lectre 27: Introdction to Software Architectre Kenneth M. Anderson Fondations of Software Engineering CSCI 5828 - Spring Semester, 1999 Introdction and Backgrond of Software Architectre

More information

Efficient and Accurate Delaunay Triangulation Protocols under Churn

Efficient and Accurate Delaunay Triangulation Protocols under Churn Efficient and Accrate Delanay Trianglation Protocols nder Chrn Dong-Yong Lee and Simon S. Lam Department of Compter Sciences The University of Texas at Astin {dylee, lam}@cs.texas.ed November 9, 2007 Technical

More information

EEC 483 Computer Organization. Branch (Control) Hazards

EEC 483 Computer Organization. Branch (Control) Hazards EEC 483 Compter Organization Section 4.8 Branch Hazards Section 4.9 Exceptions Chans Y Branch (Control) Hazards While execting a previos branch, next instrction address might not yet be known. s n i o

More information

CS 4204 Computer Graphics

CS 4204 Computer Graphics CS 424 Compter Graphics Crves and Srfaces Yong Cao Virginia Tech Reference: Ed Angle, Interactive Compter Graphics, University of New Mexico, class notes Crve and Srface Modeling Objectives Introdce types

More information

Constructing and Comparing User Mobility Profiles for Location-based Services

Constructing and Comparing User Mobility Profiles for Location-based Services Constrcting and Comparing User Mobility Profiles for Location-based Services Xihi Chen Interdisciplinary Centre for Secrity, Reliability and Trst, University of Lxemborg Jn Pang Compter Science and Commnications,

More information

Collision Avoidance and Resolution Multiple Access: First-Success Protocols

Collision Avoidance and Resolution Multiple Access: First-Success Protocols Collision Avoidance and Resoltion Mltiple Access: First-Sccess Protocols Rodrigo Garcés and J.J. Garcia-Lna-Aceves askin Center for Compter Engineering and Information Sciences University of California

More information

Functions of Combinational Logic

Functions of Combinational Logic CHPTER 6 Fnctions of Combinational Logic CHPTER OUTLINE 6 6 6 6 6 5 6 6 6 7 6 8 6 9 6 6 Half and Fll dders Parallel inary dders Ripple Carry and Look-head Carry dders Comparators Decoders Encoders Code

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Lectre 9: Synchronization (1) Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Cooperation between Threads

More information

Efficient Mining of Partial Periodic Patterns in Time Series Database

Efficient Mining of Partial Periodic Patterns in Time Series Database Wright tate University CORE cholar Kno.e.sis Pblications The Ohio Center of Excellence in Knowledge- Enabled Compting (Kno.e.sis) 3-1999 Efficient Mining of Partial Periodic Patterns in Time eries Database

More information

An Extensive Study of Static Regression Test Selection in Modern Software Evolution

An Extensive Study of Static Regression Test Selection in Modern Software Evolution An Extensive Stdy of Static Regression Test Selection in Modern Software Evoltion Owolabi Legnsen 1, Farah Hariri 1, Agst Shi 1, Yafeng L 2, Lingming Zhang 2, and Darko Marinov 1 1 Department of Compter

More information

A personalized search using a semantic distance measure in a graph-based ranking model

A personalized search using a semantic distance measure in a graph-based ranking model Article A personalized search sing a semantic distance measre in a graph-based ranking model Jornal of Information Science XX (X) pp. 1-23 The Athor(s) 2011 Reprints and Permissions: sagepb.co.k/jornalspermissions.nav

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Midterm Review Midterm in class on Friday (May 4) Covers material from arch spport to deadlock Based pon lectre material and modles of the book indicated on

More information

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un

Dynamic Maintenance of Majority Information in Constant Time per Update? Gudmund S. Frandsen and Sven Skyum BRICS 1 Department of Computer Science, Un Dynamic Maintenance of Majority Information in Constant Time per Update? Gdmnd S. Frandsen and Sven Skym BRICS 1 Department of Compter Science, University of arhs, Ny Mnkegade, DK-8000 arhs C, Denmark

More information

Constructing Multiple Light Multicast Trees in WDM Optical Networks

Constructing Multiple Light Multicast Trees in WDM Optical Networks Constrcting Mltiple Light Mlticast Trees in WDM Optical Networks Weifa Liang Department of Compter Science Astralian National University Canberra ACT 0200 Astralia wliang@csaneda Abstract Mlticast roting

More information

Secure Biometric-Based Authentication for Cloud Computing

Secure Biometric-Based Authentication for Cloud Computing Secre Biometric-Based Athentication for Clod Compting Kok-Seng Wong * and Myng Ho Kim School of Compter Science and Engineering, Soongsil University, Sangdo-Dong Dongjak-G, 156-743 Seol Korea {kswong,kmh}@ss.ac.kr

More information

A Dynamic Bandwidth Allocation Mechanism for Slotted Ring Networks*

A Dynamic Bandwidth Allocation Mechanism for Slotted Ring Networks* A Dynamic Bandwidth Aocation Mechanism for Sotted Ring Networs* L. OROZCO-BARBOSA University of Ottawa, Schoo of nformation Technoogy and Engineering 161 Lois Paster, St. Ottawa, ON, K1N 6N5 CANADA Abstract

More information

Features. ICMS Integrated Corrosion Management System

Features. ICMS Integrated Corrosion Management System ICMS Integrated Corrosion System Featres Total Corrosion Data Data Exhange with DCS/PCS/SCADA Systems Correlate Corrosion & Process Data Enables Highly Cost-Effective Asset Designed Specifically for Corrosion

More information

A sufficient condition for spiral cone beam long object imaging via backprojection

A sufficient condition for spiral cone beam long object imaging via backprojection A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral

More information

METAMODEL FOR SOFTWARE SOLUTIONS IN COMPUTED TOMOGRAPHY

METAMODEL FOR SOFTWARE SOLUTIONS IN COMPUTED TOMOGRAPHY VOL. 10, NO 22, DECEBER, 2015 ISSN 1819-6608 ETAODEL FOR SOFTWARE SOLUTIONS IN COPUTED TOOGRAPHY Vitaliy ezhyev Faclty of Compter Systems and Software Engineering, Universiti alaysia Pahang, Gambang, alaysia

More information

Illumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY

Illumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY Illmina LIMS Software Gide Jne 2017 ILLUMINA PROPRIETARY This docment and its contents are proprietary to Illmina, Inc. and its affiliates ("Illmina"), and are intended solely for the contractal se of

More information

Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks

Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks 1 Efficient Schedling for Periodic Aggregation Qeries in Mltihop Sensor Networks XiaoHa X, Shaojie Tang, Member, IEEE, XiangYang Li, Senior Member, IEEE Abstract In this work, we stdy periodic qery schedling

More information

VirtuOS: an operating system with kernel virtualization

VirtuOS: an operating system with kernel virtualization VirtOS: an operating system with kernel virtalization Rslan Nikolaev, Godmar Back SOSP '13 Proceedings of the Twenty-Forth ACM Symposim on Oper ating Systems Principles 이영석, 신현호, 박재완 Index Motivation Design

More information

Constrained Routing Between Non-Visible Vertices

Constrained Routing Between Non-Visible Vertices Constrained Roting Between Non-Visible Vertices Prosenjit Bose 1, Matias Korman 2, André van Renssen 3,4, and Sander Verdonschot 1 1 School of Compter Science, Carleton University, Ottawa, Canada. jit@scs.carleton.ca,

More information

Blended Deformable Models

Blended Deformable Models Blended Deformable Models (In IEEE Trans. Pattern Analysis and Machine Intelligence, April 996, 8:4, pp. 443-448) Doglas DeCarlo and Dimitri Metaxas Department of Compter & Information Science University

More information

Lecture 4: Routing. CSE 222A: Computer Communication Networks Alex C. Snoeren. Thanks: Amin Vahdat

Lecture 4: Routing. CSE 222A: Computer Communication Networks Alex C. Snoeren. Thanks: Amin Vahdat Lectre 4: Roting CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Amin Vahdat Lectre 4 Overview Pop qiz Paxon 95 discssion Brief intro to overlay and active networking 2 End-to-End Roting

More information

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT PAAMETE OPTIMIZATION FO TAKAGI-SUGENO FUZZY MODELS LESSONS LEANT Manfred Männle Inst. for Compter Design and Falt Tolerance Univ. of Karlsrhe, 768 Karlsrhe, Germany maennle@compter.org Brokat Technologies

More information