Symmetric Tree Replication Protocol for Efficient Distributed Storage System*

Size: px
Start display at page:

Download "Symmetric Tree Replication Protocol for Efficient Distributed Storage System*"

Transcription

1 ymmetric Tree Replication Protocol for Efficient Distributed torage ystem* ung Cune Coi 1, Hee Yong Youn 1, and Joong up Coi 2 1 cool of Information and Communications Engineering ungkyunkwan University , uwon, Korea {coisc,youn}@ece.skku.ac.kr 2 Information ecurity Tecnology Division Korea Information ecurity Agency , eoul, Korea jscoi@kisa.or.kr Abstract. In large distributed systems, replication of data and service is needed to decrease te communication cost, increase te overall availability, avoid single server bottleneck, and increase te reliability. Tree quorum protocol is one of te replication protocols allowing very low cost in te best case but as some drawbacks suc tat te number of replicas grows rapidly as te level increases and root replica becomes a bottleneck. In tis paper we propose a new replication protocol called symmetric tree protocol wic efficiently solves te problems. Te proposed symmetric tree protocol also requires muc smaller cost tan te previous protocols. We conduct cost and availability analysis of te protocols, and te proposed protocol displays comparable availability to te tree protocol using muc smaller number of nodes. It is tus effective to be applied to survival storage system. Keywords: replication protocol, tree quorum, availability, distributed system, symmetric tree 1 Introduction In large distributed systems node and communication failures are likely to occur wic can prevent te operations from being successfully carried out. Tis raises te need for introducing a sufficient level of fault tolerance into te distributed systems [1]. Oter problems are increased communication cost as te system grows and bottleneck of a single server as many processes compete for te same service. Replication of data and services is one of te practical solutions to te problems. It can avoid te server bottleneck problem and increase overall availability [2]. However, te communication cost increases as te number of replicas increases. In order to minimize te *Tis work was supported by Korea Researc Foundation Grant (KRF D00421). Corresponding autor: Hee Yong Youn P.M.A. loot et al. (Eds.): ICC 2003, LNC 2659, pp , pringer-verlag Berlin Heidelberg 2003

2 ymmetric Tree Replication Protocol for Efficient Distributed torage ystem 475 communication cost, tus, te number of replicas sould be kept as small as possible [3,4]. We consider a distributed system in wic data are fully replicated and two types of operations are allowed on te replicated data, namely and write. A operation returns some value wile write operation installs a new value. Proper syncronization is acieved if operations return te value installed by te last write operation, and and write operations or two write operations are not executed concurrently. Eac node uses a centralized concurrency control sceme to syncronize te accesses to its local copy and a replication control protocol to coordinate te accesses to various replicas. Te basic principle employed in maintaining consistency of replicated data is to require conflicting operations to lock at least one common copy. A distributed system consists of a set of distinct sites tat communicate wit eac oter by sending messages over a communication network. No assumptions are made regarding te speed, connectivity, or reliability of te network. We assume tat te sites are fail-stop. A distributed database consists of a set of objects stored at several sites. Users interact wit te database by invoking transaction programs. Transactions are partially ordered sequence of and write operations tat are executed atomically. Execution of a transaction must appear atomic, i.e. a transaction eiter commits or aborts. In a replicated database, copies of an object may be stored at several sites in te network. Multiple copies of an object must appear as a single logical object to te transactions. Tis is termed as one-copy equivalence and enforced by replication control protocol. In te literature tere exist several replication algoritms aiming at different goals. Te Read-One/Write-All algoritm [5] as minimum cost and maximum availability but as maximum communication cost for write operation. Te quorum consensus [6] and dynamic voting [7] ave good and write availability but as a disadvantage of ig cost. For all tese replication control protocols, making te operation ceaper ends up wit a more expensive write operation and vice versa. All te strategies ave a cost of O(n), wic means te operation cost linearly depends on te number of replicas in te system [8]. By assigning a logical structure to a set of replicas, it is possible to reduce te communication cost. Multi-Level-Voting-Protocol [9], Weigted Voting [10], Tree quorum protocol [11] and Grid protocol [12] are suc type of replication protocols, but tey still ave relatively ig operation cost especially wen te number of replicas is large and some failures exist. Te tree quorum protocol as cost of 1 in te absence of failures and provides graceful degradation wen failures exist. Hence in tis paper we develop a new replication protocol wic as low operation cost. We compare te replication protocols wic use a logical tree structure and te proposed symmetric tree structure. Te proposed symmetric tree protocol allows comparable availability to te tree protocol wit muc smaller number of nodes. It is tus effective to be applied to survival storage system. Te rest of te paper is organized as follows. In ect. 2 we describe te earlier protocols, and in ect. 3 we propose a new protocol. We compare te new symmetric tree protocol wit earlier protocols in ect. 4. ection 5 concludes te paper.

3 476. C. Coi, H.Y. Youn, and J.. Coi 2 Review of Earlier Protocols 2.1 Logaritmic Replication Protocol Te class of replication protocols discussed ere is a generalization of te Tree Quorum Protocol. Tese replication protocols use a logical tree structure. All te algoritms ave cost of 1 in te absence of failures and provide graceful degradation wen failures exist. Te replication protocols wic use tree structure ave varying costs and availabilities according to fault condition, wereas oter replication protocols ave constant costs and availabilities. Let n be te number of replicas wic can be organized as a tree of eigt. A non-leaf replica R i as Ri descendants. For eac replica except te leaves we define quorum rq Ri, and a write quorum wq Ri. A tree consisting of 13 replicas organized in tree levels is sown in Fig. 1. Algoritm: Te algoritm is recursive: A tree of eigt 0 consists only of a leaf replica and can be locked by simply locking te replica for eiter or write operation. Read operation: Locking a tree of eigt for a operation means to lock te root replica or rq ROOT of its subtrees wit te rq ROOT descendants of te root serving as new root replicas of te subtrees of eigt -1. Write operation: Locking a tree of eigt for a write operation means to lock te root replica and wq ROOT of its subtrees. Here, te wq ROOT descendants of te root serve as new root replicas for te subtrees of eigt -1. R1 WQ=1,RQ=3 R2 R3 R4 R5 R6 R7 R8 R9 R10 R11 R12 R13 Fig. 1. A tree of eigt 3 wit 13 replicas Examples of valid quorum sets (RQ) from Figure 1 are {R1}, {R2, R3, R4} wen node-1 is not available, and {R5, R6, R7, R3, R11, R12, R13} wen node-1, node-2, and node-4 are not available. Examples of valid write quorum sets (WQ) are {R1, R2, R5}, {R1, R3, R10}, and {R1, R4, R12}. In order to maintain consistency of te replicated objects, te selected and write quorums ave to fulfill some requirements. To detect /write conflict, any

4 ymmetric Tree Replication Protocol for Efficient Distributed torage ystem 477 valid quorum set must intersect wit valid write quorum set. Tis requirement can be satisfied by rqri + wqri > VRi were V Ri is te number of descendants. To detect write/write conflicts, any two valid write quorum sets must intersect. Tis is always satisfied because every valid write quorum set includes te root. o tere exist many cases of valid RQ and WQ in te tree quorum protocol. After reviewing all possible cases regarding te provided cost and availability, te strategy wit RQ = and WQ = 1 is selected as te best coice. Te case is called Logaritmic Protocol. 2.2 Grid Protocol Here te replicas are logically arranged in a grid topology, and and write operations are required to lock te rows and columns of nodes suc tat conflicting operations request a common node. In tis protocol quorum consists of a node from every column and write quorum consists of a node from every column plus a full column of nodes. A grid network wic consists of 4 rows and 4 columns of 16 replicas is sown in Fig. 2. Algoritm: Read operation: elect and lock any single node from eac column. Tis set of nodes is called Column-cover (C-cover). Write operation: Coose a C-cover and lock any wole column. R1 R2 R3 R4 R5 R6 R7 R8 R9 R10 R11 R12 R13 R14 R15 R16 Fig. 2. A Grid network wit 16 replicas Examples of valid quorum sets ere are {R1, R6, R3, R12} and {R1, R6, R7, R8}, and examples of valid write quorum sets are {R1, R10, R3, R4, R2, R6, R14} and {R9, R6, R3, R8, R7, R11, R15}. Here two write operations cannot be executed concurrently because eac one locks a C-cover and all nodes in a column. If two operations ave locked a C-cover, neiter one can obtain write-locks from all te nodes in any column. imilar argu-

5 478. C. Coi, H.Y. Youn, and J.. Coi ment can be used to sow tat concurrent execution of and write operations are not possible. Te grid protocol as constant operation cost because te size of quorum set is always same. One disadvantage of tis protocol is te operation cost is equally ig regardless of failure condition. However, it as iger availability tan tree quorum protocol. To solve te problems of te tree quorum and grid protocol, we next present te proposed symmetric tree protocol. 3 Te Proposed Protocol As mentioned in te previous section, tree quorum protocol and grid protocol ave some drawbacks, respectively. In tis section we propose a new replication protocol called symmetric tree protocol to solve te drawbacks of te previous protocols. 3.1 Motivation In typical replication protocols almost all replicas need to be accessed for and write operation. For example, in Quorum consensus protocol of 16 replicas, quorum + write quorum need to be greater tan 16. However, if we assign a logical structure to te replicas, ten we can reduce te number of replicas because we can organize te structure in suc a way tat te tree and grid topology are used togeter. As previously described, a major weakness of tree quorum protocol is tat te number of replicas rapidly grows as te tree level grows. Te tree quorum protocol as cost of 1 in te absence of failures. As a result, root replica can become a bottleneck. To solve tis problem, te proposed protocol as two root replicas using symmetric tree topology. Terefore, te proposed protocol can ave te advantage of aving minimum operation cost weter failures exist or not. Also it as te advantage of aving not many replicas in ig levels like grid protocol. 3.2 Te Proposed ymmetric Tree Protocol Te proposed protocol solves te problem of oter replication protocols of significantly increased cost wen failures exist using symmetric tree topology. It as te advantage of aving minimum operation cost in te best case like tree structure protocol and also as te advantage of aving not so many replicas in iger levels like grid protocol. In tis protocol replicas are organized as sown in Figure 3, were two tree structures are joined wose leaf nodes are common. We call te two trees uptree and down-tree, respectively. Algoritm: Read Operation: Read operation starts from eiter te root node of up-tree or tat of down-tree. If te root replica is not available, all te descendants of it are. Eac te descendant

6 ymmetric Tree Replication Protocol for Efficient Distributed torage ystem 479 serves as a new root replica for te subtree to te /2-level of te symmetric tree, were is te number of levels of te tree. After te /2-level, te next level is if any node of te parent nodes is not available. Write Operation: Write operation starts from any root replica of te two trees. Only one replica of te descendants of te root must writes. A descendant of te root serves as a new root replica of te subtree. Te descendant of te parents must write from te /2-level to te last level. R1 R2 R3 R4 R5 R6 R7 R8 R9 R10 R11 R12 R13 R14 R15 R16 R17 Fig. 3. A network for te proposed symmetric tree protocol wit 17 replicas From Fig. 3 examples of valid quorum set are {R1}, {R2, R3, R4}, {R3, R4, R5, R6, R7}, {R3, R4, R14}, {R1, R8, R9, R10, R16}, {R14, R15, R16}, and {R17}. Examples of valid write quorum sets are {R1, R2, R5, R14, R17}, {R1, R3, R9, R15, R17}, and {R1, R3, R10, R15, R17}. Consistency is maintained in selecting, write quorum set to satisfy te requirement of detecting /write conflict and write/write conflict. Te Read/Write conflict can be detected because operation sould lock te wole descendants and write operation sould lock at least one replica of wole descendants. Te Write/Write conflict can also be detected because every write operation as to lock te root replica of te symmetric tree structure. Tus, if one replica is locked, ten oters cannot get te lock. 4 Performance Analysis In tis section cost and availability of te proposed protocol and tree protocol are analyzed.

7 480. C. Coi, H.Y. Youn, and J.. Coi 4.1 Cost Analysis For cost analysis, cost and write cost are considered, wic are computed by te number of sites involved in te operation. A operation in bot te protocols need to consult only te root replica wic is very efficient if root replica is available. However, te root replica becomes a bottleneck if all operations are done on it. Terefore te algoritm is sligtly modified as te level of te tree te operation will be performed is randomly selected. For tis, uniformly distributed random variable X in te interval [0,1] and a parameter f in interval [0,1] are cosen. A random value x of X is generated and te top-level is cosen for performing operation if x f. Oterwise, a new x is generated and te next level is cosen if x f, etc Logaritmic Protocol uppose tere are +1 levels. Te average cost computes to C = f + (1 f ) f RQ + (1 f ) f RQ + L + (1 f ) f RQ = f (1 f ) RQ + 1 f (1 f ) RQ k= 0 k= k k k (1 ( f + (1 f) f + (1 f) f + L + (1 f) f)) RQ (1) In te tree protocol, we consider Logaritmic protocol wic is te best coice regarding te cost and availability. Te Logaritmic Protocol is defined by a quorum of RQ = and write quorum of WQ = 1. Average cost is min( C ) = 1 (2) ((1 f) ) 1 C = f + ((1 f ) ) (1 f) 1 (3) For write operation, Cwrite = + 1 (4) ymmetric Tree Protocol For cost analysis, cost and write cost are considered, wic are computed by te number of sites involved in tat operation. A and write operation in bot te protocols only need to consult te root replica wic is very efficient if root replica is available. Average cost is computed by

8 ymmetric Tree Replication Protocol for Efficient Distributed torage ystem C = f + (1 f) f + (1 f) f + L+ (1 f) f + (1 f) f + L+ (1 f) f + (1 ( f + (1 f) f + L+ (1 f) f)) k k k k 2 2 f (1 f) (1 f) k = f (1 f) k= 0 k= 1 k = 0 (5) min( C ) = 1 (6) For write operation, Cwrite = + 1 (7) Comparison of average cost for bot te protocols are sown in Fig. 4 for 121 nodes of tree quorum protocol and 161 nodes of symmetric tree protocol. Average write cost for tem is depend on eigt of tree. Read Cost Logaritmic Protocol (121 nodes) ymmetric tree Protocol (161 nodes) p Fig. 4. Comparison of average cost Te tree quorum protocol consists of 121 nodes of 5 levels and te last level as te maximal number of node. On te oter and, te symmetric tree protocol consists of 161 nodes of 9 levels and te fourt level as te maximal number of node. Also, te maximal number of node is te same. Observe from Figure 4 tat cost of te proposed protocol is always muc smaller tan logaritmic protocol in sprite of as more nodes. Te difference between te two protocols gets more substantial wen te failure of nodes is low.

9 482. C. Coi, H.Y. Youn, and J.. Coi 4.2 Availability Analysis Logaritmic Protocol Te availability of operation for te tree quorum protocol performed on a tree of eigt l > 0 is k () l ( l1) ( l1) k p (1 p) ( k )( ) ( 1 ) k= RQ = + wit = p (8) (0) o te availability of operation for te logaritmic protocol is l ( ) () l ( 1) = p+ (1 p) since RQ = (9) Te availability of write operation is ( )( ) ( 1 ) () l ( l 1) k ( l 1) k write p k write write k= WQ (0) = wit write = p (10) o te availability of write operation for te logaritmic protocol is l ( 1 ( 1 write ) ) = p (11) () l ( 1) write ymmetric Tree Protocol Te availability of operation for te proposed protocol performed on eigt / 2 l > 0 is ( ) ( ) ( ) () l ( l (1 ) 1) 1 ( l 1) = p+ p + p wit (0) = p (12) Te availability of write operation is ( )( ) ( 1 ) () l 2 ( l 1) k ( l 1) k write p k write write k= WQ = (0) wit write = p (13) Comparisons of availabilities of te two protocols are sown in Fig. 5. For te comparison, we examine 3 cases, eac one wit a different number of replicas. Tey are 17 of level 5, 53 of level 7, and 161 replicas of level 9. As illustrated in Fig. 5, te availability of te proposed protocol increases as te level of tree increases. Note tat te availability of symmetric tree protocol is iger tan logaritmic protocol wit muc smaller number of nodes.

10 ymmetric Tree Replication Protocol for Efficient Distributed torage ystem 483 Logaritmic Protocol (121 nodes) ymmetric Tree Protocol (53 nodes) ymmetric Tree Protocol (17 nodes) ymmetric Tree Protocol (161 nodes) Read Availability p Fig. 5. Comparison of availability 5 Conclusion In tis paper we ave proposed a new symmetric tree replication protocol wic is better tan Logaritmic protocol in cost and availability using muc smaller number of nodes. One of te main advantages of te proposed symmetric tree protocol is muc smaller cost tan previous protocols even toug te failure rate of te nodes increases. Te coice of wic replication protocol sould be used depends on te primary performance criterion, and te new proposed symmetric tree protocol can be selected for low operation cost and ig availability. As future work, we will analyze and compare te response time and trougput of te proposed protocol. Implementation of te protocols for survivable storage system will also be carried out. Reference [1] C. Amza,, A.L. Cox, W. Zwaenepoel, Data replication strategies for fault tolerance and availability on commodity clusters, Proc. Int l Conf on Dependable ystems and Networks (DN), 2000, [2] H.Y. Youn, B. Krisnamsetty, D. Lee, B. K. Lee, J.. Coi, H.G. Kim, C.W. Park, and H.. Lee, An Efficient Hybrid Replication Protocol for Higly Available Distributed ystem, Proc. Int l Conf on Communication and Computer Networks (CCN), Nov, 2002, [3] K. Arai, K. Tanaka, M. Takizawa, Group protocol for quorum-based replication, Proc. event Int l Conf on Parallel and Distributed ystems, 2000, [4] G. Alonso, Partial Database Replication and Group Communication Primitives, Proc. of te 2 nd European Researc eminar on Advances in Distributed ystems (ERAD 97), Marc 1997, [5] P.A. Bernstein and N. Goodman, An Algoritm for Concurrency Control and Recovery in Replicated Distributed Databases, ACM Trans on Distributed ystems, 9(4), 1984,

11 484. C. Coi, H.Y. Youn, and J.. Coi [6] R.H. Tomas. A Majority Consensus Approac to Concurrency Control for Multiple Copy Data-based, ACM Trans on Database ystems, 4(2),1979, [7] D. Davcev, A Dynamic Voting ceme in Distributed ystems. IEEE Trans on oftware Engineering, 15(1), 1989, [8] D. aa,. Rangarajan,.K. Tripati, An Analysis of te Average Message Overead in Replica Control Protocols, IEEE Trans on Parallel and Distributed ystems, 7(10), Oct. 1996, [9] B. Freisleben, H.H. Koc, and O. Teel, Designing Multi-Level Quorum cemes for Higly Replicated Data. Proc. of te 1991 Pacific Rim Int l ymp on Fault Tolerant ystems, IEEE, 1991, [10] D.K. Gifford, Weigted Voting for Replicated Data, Proc. of te 7 t ACM ymp on Operating ystems Principles, 1979, [11] D. Agrawal and A. El Abbadi, Te tree Quorum protocol: An Efficient Approac for Managing Replicated Data, Proc of te 16t Very Large Databases (VLDB) Conf, 1990, [12]. Ceung, M. Ammar, and M. Aamad, Te Grid Protocol: A Hig Performance ceme for Maintaining Replicated Data, Proc of te 6t Int l Conf on Data Engineering, 1990,

More on Functions and Their Graphs

More on Functions and Their Graphs More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in

More information

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science A Cost Model for Distributed Sared Memory Using Competitive Update Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, Texas, 77843-3112, USA E-mail: fjkim,vaidyag@cs.tamu.edu

More information

Multi-Stack Boundary Labeling Problems

Multi-Stack Boundary Labeling Problems Multi-Stack Boundary Labeling Problems Micael A. Bekos 1, Micael Kaufmann 2, Katerina Potika 1 Antonios Symvonis 1 1 National Tecnical University of Atens, Scool of Applied Matematical & Pysical Sciences,

More information

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness 1 Optimal In-etwork Packet Aggregation Policy for Maimum Information Fresness Alper Sinan Akyurek, Tajana Simunic Rosing Electrical and Computer Engineering, University of California, San Diego aakyurek@ucsd.edu,

More information

4.2 The Derivative. f(x + h) f(x) lim

4.2 The Derivative. f(x + h) f(x) lim 4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially

More information

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result RT. Complex Fractions Wen working wit algebraic expressions, sometimes we come across needing to simplify expressions like tese: xx 9 xx +, xx + xx + xx, yy xx + xx + +, aa Simplifying Complex Fractions

More information

CHAPTER 7: TRANSCENDENTAL FUNCTIONS

CHAPTER 7: TRANSCENDENTAL FUNCTIONS 7.0 Introduction and One to one Functions Contemporary Calculus 1 CHAPTER 7: TRANSCENDENTAL FUNCTIONS Introduction In te previous capters we saw ow to calculate and use te derivatives and integrals of

More information

Haar Transform CS 430 Denbigh Starkey

Haar Transform CS 430 Denbigh Starkey Haar Transform CS Denbig Starkey. Background. Computing te transform. Restoring te original image from te transform 7. Producing te transform matrix 8 5. Using Haar for lossless compression 6. Using Haar

More information

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various

More information

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring Has-Based Indexes Capter 11 Comp 521 Files and Databases Spring 2010 1 Introduction As for any index, 3 alternatives for data entries k*: Data record wit key value k

More information

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks An Algoritm for Loopless Deflection in Potonic Packet-Switced Networks Jason P. Jue Center for Advanced Telecommunications Systems and Services Te University of Texas at Dallas Ricardson, TX 75083-0688

More information

Section 2.3: Calculating Limits using the Limit Laws

Section 2.3: Calculating Limits using the Limit Laws Section 2.3: Calculating Limits using te Limit Laws In previous sections, we used graps and numerics to approimate te value of a it if it eists. Te problem wit tis owever is tat it does not always give

More information

Unsupervised Learning for Hierarchical Clustering Using Statistical Information

Unsupervised Learning for Hierarchical Clustering Using Statistical Information Unsupervised Learning for Hierarcical Clustering Using Statistical Information Masaru Okamoto, Nan Bu, and Tosio Tsuji Department of Artificial Complex System Engineering Hirosima University Kagamiyama

More information

Design of PSO-based Fuzzy Classification Systems

Design of PSO-based Fuzzy Classification Systems Tamkang Journal of Science and Engineering, Vol. 9, No 1, pp. 6370 (006) 63 Design of PSO-based Fuzzy Classification Systems Cia-Cong Cen Department of Electronics Engineering, Wufeng Institute of Tecnology,

More information

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation P R E P R N T CPWS XV Berlin, September 8, 008 Fast Calculation of Termodynamic Properties of Water and Steam in Process Modelling using Spline nterpolation Mattias Kunick a, Hans-Joacim Kretzscmar a,

More information

4.1 Tangent Lines. y 2 y 1 = y 2 y 1

4.1 Tangent Lines. y 2 y 1 = y 2 y 1 41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange

More information

Density Estimation Over Data Stream

Density Estimation Over Data Stream Density Estimation Over Data Stream Aoying Zou Dept. of Computer Science, Fudan University 22 Handan Rd. Sangai, 2433, P.R. Cina ayzou@fudan.edu.cn Ziyuan Cai Dept. of Computer Science, Fudan University

More information

When a BST becomes badly unbalanced, the search behavior can degenerate to that of a sorted linked list, O(N).

When a BST becomes badly unbalanced, the search behavior can degenerate to that of a sorted linked list, O(N). Balanced Binary Trees Binary searc trees provide O(log N) searc times provided tat te nodes are distributed in a reasonably balanced manner. Unfortunately, tat is not always te case and performing a sequence

More information

CS 234. Module 6. October 25, CS 234 Module 6 ADT Dictionary 1 / 22

CS 234. Module 6. October 25, CS 234 Module 6 ADT Dictionary 1 / 22 CS 234 Module 6 October 25, 2016 CS 234 Module 6 ADT Dictionary 1 / 22 Case study Problem: Find a way to store student records for a course, wit unique IDs for eac student, were records can be accessed,

More information

Investigating an automated method for the sensitivity analysis of functions

Investigating an automated method for the sensitivity analysis of functions Investigating an automated metod for te sensitivity analysis of functions Sibel EKER s.eker@student.tudelft.nl Jill SLINGER j..slinger@tudelft.nl Delft University of Tecnology 2628 BX, Delft, te Neterlands

More information

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry Our Calibrated Model as No Predictive Value: An Example from te Petroleum Industry J.N. Carter a, P.J. Ballester a, Z. Tavassoli a and P.R. King a a Department of Eart Sciences and Engineering, Imperial

More information

3.6 Directional Derivatives and the Gradient Vector

3.6 Directional Derivatives and the Gradient Vector 288 CHAPTER 3. FUNCTIONS OF SEVERAL VARIABLES 3.6 Directional Derivatives and te Gradient Vector 3.6.1 Functions of two Variables Directional Derivatives Let us first quickly review, one more time, te

More information

Henning Koch. Dept. of Computer Science. University of Darmstadt. Alexanderstr. 10. D Darmstadt. Germany. Keywords:

Henning Koch. Dept. of Computer Science. University of Darmstadt. Alexanderstr. 10. D Darmstadt. Germany. Keywords: Embedding Protocols for Scalable Replication Management 1 Henning Koch Dept. of Computer Science University of Darmstadt Alexanderstr. 10 D-64283 Darmstadt Germany koch@isa.informatik.th-darmstadt.de Keywords:

More information

Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks

Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks Peyman Faizian, Md Safayat Raman, Md Atiqul Molla, Xin Yuan Department of Computer Science Florida State University

More information

15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes

15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes 15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes William Lovas (wlovas@cs) Karl Naden Out: Tuesday, Friday, June 10, 2011 Due: Monday, June 13, 2011 (Written

More information

Intra- and Inter-Session Network Coding in Wireless Networks

Intra- and Inter-Session Network Coding in Wireless Networks Intra- and Inter-Session Network Coding in Wireless Networks Hulya Seferoglu, Member, IEEE, Atina Markopoulou, Member, IEEE, K K Ramakrisnan, Fellow, IEEE arxiv:857v [csni] 3 Feb Abstract In tis paper,

More information

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall Has-Based Indexes Capter 11 Comp 521 Files and Databases Fall 2012 1 Introduction Hasing maps a searc key directly to te pid of te containing page/page-overflow cain Doesn t require intermediate page fetces

More information

Redundancy Awareness in SQL Queries

Redundancy Awareness in SQL Queries Redundancy Awareness in QL Queries Bin ao and Antonio Badia omputer Engineering and omputer cience Department University of Louisville bin.cao,abadia @louisville.edu Abstract In tis paper, we study QL

More information

12.2 TECHNIQUES FOR EVALUATING LIMITS

12.2 TECHNIQUES FOR EVALUATING LIMITS Section Tecniques for Evaluating Limits 86 TECHNIQUES FOR EVALUATING LIMITS Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing tecnique to evaluate its of

More information

Vector Processing Contours

Vector Processing Contours Vector Processing Contours Andrey Kirsanov Department of Automation and Control Processes MAMI Moscow State Tecnical University Moscow, Russia AndKirsanov@yandex.ru A.Vavilin and K-H. Jo Department of

More information

each node in the tree, the difference in height of its two subtrees is at the most p. AVL tree is a BST that is height-balanced-1-tree.

each node in the tree, the difference in height of its two subtrees is at the most p. AVL tree is a BST that is height-balanced-1-tree. Data Structures CSC212 1 AVL Trees A binary tree is a eigt-balanced-p-tree if for eac node in te tree, te difference in eigt of its two subtrees is at te most p. AVL tree is a BST tat is eigt-balanced-tree.

More information

MULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS

MULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS ULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS Nimmagadda Calamaia æ Dept. of CSE JNTU College of Engineering Kakinada, India 533 003. calm@cse.iitkgp.ernet.in Badrinat Ramamurty y Dept.

More information

Software Fault Prediction using Machine Learning Algorithm Pooja Garg 1 Mr. Bhushan Dua 2

Software Fault Prediction using Machine Learning Algorithm Pooja Garg 1 Mr. Bhushan Dua 2 IJSRD - International Journal for Scientific Researc & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Software Fault Prediction using Macine Learning Algoritm Pooja Garg 1 Mr. Busan Dua 2

More information

CS 234. Module 6. October 16, CS 234 Module 6 ADT Dictionary 1 / 33

CS 234. Module 6. October 16, CS 234 Module 6 ADT Dictionary 1 / 33 CS 234 Module 6 October 16, 2018 CS 234 Module 6 ADT Dictionary 1 / 33 Idea for an ADT Te ADT Dictionary stores pairs (key, element), were keys are distinct and elements can be any data. Notes: Tis is

More information

Linear Interpolating Splines

Linear Interpolating Splines Jim Lambers MAT 772 Fall Semester 2010-11 Lecture 17 Notes Tese notes correspond to Sections 112, 11, and 114 in te text Linear Interpolating Splines We ave seen tat ig-degree polynomial interpolation

More information

Proceedings of the 8th WSEAS International Conference on Neural Networks, Vancouver, British Columbia, Canada, June 19-21,

Proceedings of the 8th WSEAS International Conference on Neural Networks, Vancouver, British Columbia, Canada, June 19-21, Proceedings of te 8t WSEAS International Conference on Neural Networks, Vancouver, Britis Columbia, Canada, June 9-2, 2007 3 Neural Network Structures wit Constant Weigts to Implement Dis-Jointly Removed

More information

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes Coarticulation: An Approac for Generating Concurrent Plans in Markov Decision Processes Kasayar Roanimanes kas@cs.umass.edu Sridar Maadevan maadeva@cs.umass.edu Department of Computer Science, University

More information

On the Use of Radio Resource Tests in Wireless ad hoc Networks

On the Use of Radio Resource Tests in Wireless ad hoc Networks Tecnical Report RT/29/2009 On te Use of Radio Resource Tests in Wireless ad oc Networks Diogo Mónica diogo.monica@gsd.inesc-id.pt João Leitão jleitao@gsd.inesc-id.pt Luis Rodrigues ler@ist.utl.pt Carlos

More information

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer

More information

2.8 The derivative as a function

2.8 The derivative as a function CHAPTER 2. LIMITS 56 2.8 Te derivative as a function Definition. Te derivative of f(x) istefunction f (x) defined as follows f f(x + ) f(x) (x). 0 Note: tis differs from te definition in section 2.7 in

More information

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method Engineering, 2013, 5, 522-526 ttp://dx.doi.org/10.4236/eng.2013.510b107 Publised Online October 2013 (ttp://www.scirp.org/journal/eng) Two Modifications of Weigt Calculation of te Non-Local Means Denoising

More information

Notes: Dimensional Analysis / Conversions

Notes: Dimensional Analysis / Conversions Wat is a unit system? A unit system is a metod of taking a measurement. Simple as tat. We ave units for distance, time, temperature, pressure, energy, mass, and many more. Wy is it important to ave a standard?

More information

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks Downloaded from vbn.aau.dk on: April 7, 09 Aalborg Universitet etwork Coding to Enance Standard Routing Protocols in Wireless Mes etworks Palevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank;

More information

Tuning MAX MIN Ant System with off-line and on-line methods

Tuning MAX MIN Ant System with off-line and on-line methods Université Libre de Bruxelles Institut de Recerces Interdisciplinaires et de Développements en Intelligence Artificielle Tuning MAX MIN Ant System wit off-line and on-line metods Paola Pellegrini, Tomas

More information

Some Handwritten Signature Parameters in Biometric Recognition Process

Some Handwritten Signature Parameters in Biometric Recognition Process Some Handwritten Signature Parameters in Biometric Recognition Process Piotr Porwik Institute of Informatics, Silesian Uniersity, Bdziska 39, 41- Sosnowiec, Poland porwik@us.edu.pl Tomasz Para Institute

More information

An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng

An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng An ffective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Ciming Huang and ei-heng Ceng 5 De c e mbe r0 International Journal of Advanced Information Tecnologies (IJAIT),

More information

Distributed and Optimal Rate Allocation in Application-Layer Multicast

Distributed and Optimal Rate Allocation in Application-Layer Multicast Distributed and Optimal Rate Allocation in Application-Layer Multicast Jinyao Yan, Martin May, Bernard Plattner, Wolfgang Mülbauer Computer Engineering and Networks Laboratory, ETH Zuric, CH-8092, Switzerland

More information

SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS. Hewlett-Packard Company East Mission Avenue. Bogazici University

SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS. Hewlett-Packard Company East Mission Avenue. Bogazici University SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS Sanuj V. Sarin 1, Hakan Delic 2 and Jung H. Kim 3 1 Hewlett-Packard Company 24001 East Mission Avenue Spokane, Wasington 99109, USA 2 Signal

More information

1.4 RATIONAL EXPRESSIONS

1.4 RATIONAL EXPRESSIONS 6 CHAPTER Fundamentals.4 RATIONAL EXPRESSIONS Te Domain of an Algebraic Epression Simplifying Rational Epressions Multiplying and Dividing Rational Epressions Adding and Subtracting Rational Epressions

More information

Brief Contributions. A Hybrid Flash File System Based on NOR and NAND Flash Memories for Embedded Devices 1 INTRODUCTION

Brief Contributions. A Hybrid Flash File System Based on NOR and NAND Flash Memories for Embedded Devices 1 INTRODUCTION 1002 IEEE TRANSACTIONS ON COMPUTERS, VOL. 57, NO. 7, JULY 2008 Brief Contributions A Hybrid Flas File System Based on NOR and NAND Flas Memories for Embedded Devices Cul Lee, Student Member, IEEE, Sung

More information

Cost Reduction of Replicated Data in Distributed Database System

Cost Reduction of Replicated Data in Distributed Database System Cost Reduction of Replicated Data in Distributed Database System 1 Divya Bhaskar, 2 Meenu Department of computer science and engineering Madan Mohan Malviya University of Technology Gorakhpur 273010, India

More information

Efficient Content-Based Indexing of Large Image Databases

Efficient Content-Based Indexing of Large Image Databases Efficient Content-Based Indexing of Large Image Databases ESSAM A. EL-KWAE University of Nort Carolina at Carlotte and MANSUR R. KABUKA University of Miami Large image databases ave emerged in various

More information

Piecewise Polynomial Interpolation, cont d

Piecewise Polynomial Interpolation, cont d Jim Lambers MAT 460/560 Fall Semester 2009-0 Lecture 2 Notes Tese notes correspond to Section 4 in te text Piecewise Polynomial Interpolation, cont d Constructing Cubic Splines, cont d Having determined

More information

CE 221 Data Structures and Algorithms

CE 221 Data Structures and Algorithms CE Data Structures and Algoritms Capter 4: Trees (AVL Trees) Text: Read Weiss, 4.4 Izmir University of Economics AVL Trees An AVL (Adelson-Velskii and Landis) tree is a binary searc tree wit a balance

More information

Experimental Studies on SMT-based Debugging

Experimental Studies on SMT-based Debugging Experimental Studies on SMT-based Debugging Andre Sülflow Görscwin Fey Rolf Drecsler Institute of Computer Science University of Bremen 28359 Bremen, Germany {suelflow,fey,drecsle}@informatik.uni-bremen.de

More information

A Novel QC-LDPC Code with Flexible Construction and Low Error Floor

A Novel QC-LDPC Code with Flexible Construction and Low Error Floor A Novel QC-LDPC Code wit Flexile Construction and Low Error Floor Hanxin WANG,2, Saoping CHEN,2,CuitaoZHU,2 and Kaiyou SU Department of Electronics and Information Engineering, Sout-Central University

More information

12.2 Techniques for Evaluating Limits

12.2 Techniques for Evaluating Limits 335_qd /4/5 :5 PM Page 863 Section Tecniques for Evaluating Limits 863 Tecniques for Evaluating Limits Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing

More information

An Anchor Chain Scheme for IP Mobility Management

An Anchor Chain Scheme for IP Mobility Management An Ancor Cain Sceme for IP Mobility Management Yigal Bejerano and Israel Cidon Department of Electrical Engineering Tecnion - Israel Institute of Tecnology Haifa 32000, Israel E-mail: bej@tx.tecnion.ac.il.

More information

Extended Synchronization Signals for Eliminating PCI Confusion in Heterogeneous LTE

Extended Synchronization Signals for Eliminating PCI Confusion in Heterogeneous LTE 1 Extended Syncronization Signals for Eliminating PCI Confusion in Heterogeneous LTE Amed H. Zaran Department of Electronics and Electrical Communications Cairo University Egypt. azaran@eecu.cu.edu.eg

More information

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically 2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use

More information

HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS

HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS N.G.Bardis Researc Associate Hellenic Ministry of te Interior, Public Administration and Decentralization 8, Dragatsaniou str., Klatmonos S. 0559, Greece

More information

George Xylomenos and George C. Polyzos. with existing protocols and their eæciency in terms of

George Xylomenos and George C. Polyzos. with existing protocols and their eæciency in terms of IP MULTICASTING FOR WIRELESS MOBILE OSTS George Xylomenos and George C. Polyzos fxgeorge,polyzosg@cs.ucsd.edu Computer Systems Laboratory Department of Computer Science and Engineering University of California,

More information

ANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS

ANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS NTNN SPHRICL COORDINT SSTMS ND THIR PPLICTION IN COMBINING RSULTS FROM DIFFRNT NTNN ORINTTIONS llen C. Newell, Greg Hindman Nearfield Systems Incorporated 133. 223 rd St. Bldg. 524 Carson, C 9745 US BSTRCT

More information

Announcements. Lilian s office hours rescheduled: Fri 2-4pm HW2 out tomorrow, due Thursday, 7/7. CSE373: Data Structures & Algorithms

Announcements. Lilian s office hours rescheduled: Fri 2-4pm HW2 out tomorrow, due Thursday, 7/7. CSE373: Data Structures & Algorithms Announcements Lilian s office ours resceduled: Fri 2-4pm HW2 out tomorrow, due Tursday, 7/7 CSE373: Data Structures & Algoritms Deletion in BST 2 5 5 2 9 20 7 0 7 30 Wy migt deletion be arder tan insertion?

More information

Cubic smoothing spline

Cubic smoothing spline Cubic smooting spline Menu: QCExpert Regression Cubic spline e module Cubic Spline is used to fit any functional regression curve troug data wit one independent variable x and one dependent random variable

More information

Arrays in a Lazy Functional Language a case study: the Fast Fourier Transform

Arrays in a Lazy Functional Language a case study: the Fast Fourier Transform Arrays in a Lazy Functional Language a case study: te Fast Fourier Transform Pieter H. Hartel and Willem G. Vree Department of Computer Systems University of Amsterdam Kruislaan 403, 1098 SJ Amsterdam,

More information

Search-aware Conditions for Probably Approximately Correct Heuristic Search

Search-aware Conditions for Probably Approximately Correct Heuristic Search Searc-aware Conditions for Probably Approximately Correct Heuristic Searc Roni Stern Ariel Felner Information Systems Engineering Ben Gurion University Beer-Seva, Israel 85104 roni.stern@gmail.com, felner@bgu.ac.il

More information

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method International Journal of Statistics and Applications 0, (): -0 DOI: 0.9/j.statistics.000.0 Comparison of te Efficiency of te Various Algoritms in Stratified Sampling wen te Initial Solutions are Determined

More information

MAC-CPTM Situations Project

MAC-CPTM Situations Project raft o not use witout permission -P ituations Project ituation 20: rea of Plane Figures Prompt teacer in a geometry class introduces formulas for te areas of parallelograms, trapezoids, and romi. e removes

More information

Numerical Derivatives

Numerical Derivatives Lab 15 Numerical Derivatives Lab Objective: Understand and implement finite difference approximations of te derivative in single and multiple dimensions. Evaluate te accuracy of tese approximations. Ten

More information

AVL Trees Outline and Required Reading: AVL Trees ( 11.2) CSE 2011, Winter 2017 Instructor: N. Vlajic

AVL Trees Outline and Required Reading: AVL Trees ( 11.2) CSE 2011, Winter 2017 Instructor: N. Vlajic 1 AVL Trees Outline and Required Reading: AVL Trees ( 11.2) CSE 2011, Winter 2017 Instructor: N. Vlajic AVL Trees 2 Binary Searc Trees better tan linear dictionaries; owever, te worst case performance

More information

A Bidirectional Subsethood Based Similarity Measure for Fuzzy Sets

A Bidirectional Subsethood Based Similarity Measure for Fuzzy Sets A Bidirectional Subsetood Based Similarity Measure for Fuzzy Sets Saily Kabir Cristian Wagner Timoty C. Havens and Derek T. Anderson Intelligent Modelling and Analysis (IMA) Group and Lab for Uncertainty

More information

Non-Interferometric Testing

Non-Interferometric Testing NonInterferometric Testing.nb Optics 513 - James C. Wyant 1 Non-Interferometric Testing Introduction In tese notes four non-interferometric tests are described: (1) te Sack-Hartmann test, (2) te Foucault

More information

RECONSTRUCTING OF A GIVEN PIXEL S THREE- DIMENSIONAL COORDINATES GIVEN BY A PERSPECTIVE DIGITAL AERIAL PHOTOS BY APPLYING DIGITAL TERRAIN MODEL

RECONSTRUCTING OF A GIVEN PIXEL S THREE- DIMENSIONAL COORDINATES GIVEN BY A PERSPECTIVE DIGITAL AERIAL PHOTOS BY APPLYING DIGITAL TERRAIN MODEL IV. Évfolyam 3. szám - 2009. szeptember Horvát Zoltán orvat.zoltan@zmne.u REONSTRUTING OF GIVEN PIXEL S THREE- DIMENSIONL OORDINTES GIVEN Y PERSPETIVE DIGITL ERIL PHOTOS Y PPLYING DIGITL TERRIN MODEL bsztrakt/bstract

More information

SlidesGen: Automatic Generation of Presentation Slides for a Technical Paper Using Summarization

SlidesGen: Automatic Generation of Presentation Slides for a Technical Paper Using Summarization Proceedings of te Twenty-Second International FLAIRS Conference (2009) SlidesGen: Automatic Generation of Presentation Slides for a Tecnical Paper Using Summarization M. Sravanti, C. Ravindranat Cowdary

More information

PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION

PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION Martin Kraus Computer Grapics and Visualization Group, Tecnisce Universität Müncen, Germany krausma@in.tum.de Magnus Strengert Visualization and Interactive

More information

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 Note: Tere will be a very sort online reading quiz (WebWork) on eac reading assignment due one our before class on its due date. Due dates can be found

More information

Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs

Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs Per Ostlund Department of Computer and Information Science Linkoping University SE-58183 Linkoping, Sweden per.ostlund@liu.se Kristian

More information

An Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks

An Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks Tis paper was presented as part of te main tecnical program at IEEE INFOCOM 20 An Analytical Approac to Real-Time Misbeavior Detection in IEEE 802. Based Wireless Networks Jin Tang, Yu Ceng Electrical

More information

Mean Waiting Time Analysis in Finite Storage Queues for Wireless Cellular Networks

Mean Waiting Time Analysis in Finite Storage Queues for Wireless Cellular Networks Mean Waiting Time Analysis in Finite Storage ueues for Wireless ellular Networks J. YLARINOS, S. LOUVROS, K. IOANNOU, A. IOANNOU 3 A.GARMIS 2 and S.KOTSOOULOS Wireless Telecommunication Laboratory, Department

More information

Sensor Data Collection with Expected Reliability Guarantees

Sensor Data Collection with Expected Reliability Guarantees Sensor Data Collection wit Expected Reliability Guarantees Qi Han, Iosif Lazaridis, Sarad Merotra, Nalini Venkatasubramanian Department of Computer Science, University of California, Irvine, CA 9697 qan,iosif,sarad,nalini

More information

An Interactive X-Ray Image Segmentation Technique for Bone Extraction

An Interactive X-Ray Image Segmentation Technique for Bone Extraction An Interactive X-Ray Image Segmentation Tecnique for Bone Extraction Cristina Stolojescu-Crisan and Stefan Holban Politenica University of Timisoara V. Parvan 2, 300223 Timisoara, Romania {cristina.stolojescu@etc.upt.ro

More information

16th European Signal Processing Conference (EUSIPCO 2008), Lausanne, Switzerland, August 25-29, 2008, copyright by EURASIP

16th European Signal Processing Conference (EUSIPCO 2008), Lausanne, Switzerland, August 25-29, 2008, copyright by EURASIP 16t European Signal Processing Conference (EUSIPCO 008), Lausanne, Switzerland, August 5-9, 008, copyrigt by EURASIP ADAPTIVE WINDOW FOR LOCAL POLYNOMIAL REGRESSION FROM NOISY NONUNIFORM SAMPLES A. Sreenivasa

More information

Test Generation for Acyclic Sequential Circuits with Hold Registers

Test Generation for Acyclic Sequential Circuits with Hold Registers Test Generation for Acyclic Sequential Circuits wit Hold Registers Tomoo Inoue, Debes Kumar Das, Ciio Sano, Takairo Miara, and Hideo Fujiwara Faculty of Information Sciences Computer Science and Engineering

More information

Minimizing Memory Access By Improving Register Usage Through High-level Transformations

Minimizing Memory Access By Improving Register Usage Through High-level Transformations Minimizing Memory Access By Improving Register Usage Troug Hig-level Transformations San Li Scool of Computer Engineering anyang Tecnological University anyang Avenue, SIGAPORE 639798 Email: p144102711@ntu.edu.sg

More information

A UPnP-based Decentralized Service Discovery Improved Algorithm

A UPnP-based Decentralized Service Discovery Improved Algorithm Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol.1, No.1, Marc 2013, pp. 21~26 ISSN: 2089-3272 21 A UPnP-based Decentralized Service Discovery Improved Algoritm Yu Si-cai*, Wu Yan-zi,

More information

Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes

Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganograpic Scemes Jessica Fridric Dept. of Electrical Engineering, SUNY Bingamton, Bingamton, NY 3902-6000, USA fridric@bingamton.edu

More information

VOLUMES. The volume of a cylinder is determined by multiplying the cross sectional area by the height. r h V. a) 10 mm 25 mm.

VOLUMES. The volume of a cylinder is determined by multiplying the cross sectional area by the height. r h V. a) 10 mm 25 mm. OLUME OF A CYLINDER OLUMES Te volume of a cylinder is determined by multiplying te cross sectional area by te eigt. r Were: = volume r = radius = eigt Exercise 1 Complete te table ( =.14) r a) 10 mm 5

More information

The Euler and trapezoidal stencils to solve d d x y x = f x, y x

The Euler and trapezoidal stencils to solve d d x y x = f x, y x restart; Te Euler and trapezoidal stencils to solve d d x y x = y x Te purpose of tis workseet is to derive te tree simplest numerical stencils to solve te first order d equation y x d x = y x, and study

More information

UNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING

UNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING UNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING Raffaele Gaetano, Giuseppe Scarpa, Giovanni Poggi, and Josiane Zerubia Dip. Ing. Elettronica e Telecomunicazioni,

More information

THE POSSIBILITY OF ESTIMATING THE VOLUME OF A SQUARE FRUSTRUM USING THE KNOWN VOLUME OF A CONICAL FRUSTRUM

THE POSSIBILITY OF ESTIMATING THE VOLUME OF A SQUARE FRUSTRUM USING THE KNOWN VOLUME OF A CONICAL FRUSTRUM THE POSSIBILITY OF ESTIMATING THE VOLUME OF A SQUARE FRUSTRUM USING THE KNOWN VOLUME OF A CONICAL FRUSTRUM SAMUEL OLU OLAGUNJU Adeyemi College of Education NIGERIA Email: lagsam04@aceondo.edu.ng ABSTRACT

More information

Announcements SORTING. Prelim 1. Announcements. A3 Comments 9/26/17. This semester s event is on Saturday, November 4 Apply to be a teacher!

Announcements SORTING. Prelim 1. Announcements. A3 Comments 9/26/17. This semester s event is on Saturday, November 4 Apply to be a teacher! Announcements 2 "Organizing is wat you do efore you do someting, so tat wen you do it, it is not all mixed up." ~ A. A. Milne SORTING Lecture 11 CS2110 Fall 2017 is a program wit a teac anyting, learn

More information

1 Copyright 2012 by Pearson Education, Inc. All Rights Reserved.

1 Copyright 2012 by Pearson Education, Inc. All Rights Reserved. CHAPTER 20 AVL Trees Objectives To know wat an AVL tree is ( 20.1). To understand ow to rebalance a tree using te LL rotation, LR rotation, RR rotation, and RL rotation ( 20.2). To know ow to design te

More information

Asynchronous Power Flow on Graphic Processing Units

Asynchronous Power Flow on Graphic Processing Units 1 Asyncronous Power Flow on Grapic Processing Units Manuel Marin, Student Member, IEEE, David Defour, and Federico Milano, Senior Member, IEEE Abstract Asyncronous iterations can be used to implement fixed-point

More information

All truths are easy to understand once they are discovered; the point is to discover them. Galileo

All truths are easy to understand once they are discovered; the point is to discover them. Galileo Section 7. olume All truts are easy to understand once tey are discovered; te point is to discover tem. Galileo Te main topic of tis section is volume. You will specifically look at ow to find te volume

More information

Multi-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art

Multi-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art Multi-Objective Particle Swarm Optimizers: A Survey of te State-of-te-Art Margarita Reyes-Sierra and Carlos A. Coello Coello CINVESTAV-IPN (Evolutionary Computation Group) Electrical Engineering Department,

More information

MAP MOSAICKING WITH DISSIMILAR PROJECTIONS, SPATIAL RESOLUTIONS, DATA TYPES AND NUMBER OF BANDS 1. INTRODUCTION

MAP MOSAICKING WITH DISSIMILAR PROJECTIONS, SPATIAL RESOLUTIONS, DATA TYPES AND NUMBER OF BANDS 1. INTRODUCTION MP MOSICKING WITH DISSIMILR PROJECTIONS, SPTIL RESOLUTIONS, DT TYPES ND NUMBER OF BNDS Tyler J. lumbaug and Peter Bajcsy National Center for Supercomputing pplications 605 East Springfield venue, Campaign,

More information

CSCE476/876 Spring Homework 5

CSCE476/876 Spring Homework 5 CSCE476/876 Spring 2016 Assigned on: Friday, Marc 11, 2016 Due: Monday, Marc 28, 2016 Homework 5 Programming assignment sould be submitted wit andin Te report can eiter be submitted wit andin as a PDF,

More information

Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks

Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks Hulya Seferoglu, Atina Markopoulou EECS Dept, University of California, Irvine {seferog, atina}@uci.edu Abstract We

More information

Analytical CHEMISTRY

Analytical CHEMISTRY ISSN : 974-749 Grap kernels and applications in protein classification Jiang Qiangrong*, Xiong Zikang, Zai Can Department of Computer Science, Beijing University of Tecnology, Beijing, (CHINA) E-mail:

More information