Redundancy Awareness in SQL Queries

Size: px
Start display at page:

Download "Redundancy Awareness in SQL Queries"

Transcription

1 Redundancy Awareness in QL Queries Bin ao and Antonio Badia omputer Engineering and omputer cience Department University of Louisville Abstract In tis paper, we study QL queries wit aggregate subqueries tat sare common tables and conditions wit te outer query. Wile several approaces can deal wit suc queries, tey ave limited applicability. We propose te redundancy awareness metod to detect te largest common part sared by query and subquery, compute it once, and determine wat operations are needed to finis evaluation of te original query. ur approac can deal wit redundancy in all types of subqueries. We offer te possibility for te optimizer to coose te most efficient plan for a given query. We ave implemented our approac on top of a commercial DBM; our experiments sow tat our approac compares favorably to existing optimization tecniques. 1. Introduction ne powerful feature of QL is te use of subqueries wit aggregation, so tat wenever possible, aggregates are computed and used witin te same query. However, one of te limitations is tat suc queries usually sow a great deal of redundancy, tat is, te outer query and te subquery sare common tables and conditions. It is important to point out tat redundancy is present because of te structure of QL. In tis paper, we study te general idea of optimizing queries aving redundancy by focusing on te problem of queries wit aggregate subqueries. Altoug oter approaces ave addressed suc queries [3, 9], tey ave some limitations tat we aim to overcome. In particular, suc approaces only apply under limited circumstances, wile we present a general and efficient approac, called te redundancy awareness metod. We attack te redundancy problem directly by identifying te largest common part sared by query and subquery and executing tis common part only once. However, tis does not, per se, guarantee improved performance. Tus, we propose a new operator, called te for-loop, tat allows efficient computation of aggregates and conditions involving tem wit one pass over te common part. ur approac can deal wit redundancy in WHERE clause subqueries witout restrictions, and applies also to subqueries in te HAVIG clause. It also can be extended to non-aggregate subqueries via a rewriting of te subquery and multiple subqueries. Te nested relational approac aims to detect te largest redundancy present in te outer query and te subquery. However, saring te largest common part can not always yield te most efficient plan. ometimes, executing none or part of redundancy may ave better performance. Wat we do ere is to offer te possibility for te optimizer to coose te best plan. We present experimental evidence tat our approac, wen applicable, performs better tan oter optimizations proposed in te literature. 2. Related Work and Motivation A typical query aving redundancy is sown below: Query 1 : select s_acctbal,s_name,n_name, p_partkey,p_mfgr,s_address, s_pone,s_comment from part,supplier,partsupp,nation,region were p_partkey=ps_partkey and s_suppkey=ps_suppkey and p_size=15 and p_type like %BRA and s_nationkey=n_nationkey and n_regionkey=r_regionkey and r_name= EURPE and ps_supplycost = (select min(ps_supplycost from partsupp,supplier,nation,region were p_partkey=ps_partkey and s_suppkey=ps_suppkey and s_nationkey=n_nationkey and n_regionkey=r_regionkey and r_name= EURPE Te most noticeable feature of te above query is redundancy: te tables and conditions in te subquery are totally

2 - - - < included in tose in te outer query. As a query aving a correlated aggregate subquery, Query 1 can be unnested by most approaces proposed in te literature (e.g. [6]. However, suc approaces would not recognize te redundancy. Terefore, common tables and common conditions ave to be accessed and computed more tan once. ptimization of nested queries as received significant attention since te 198 s. However, te redundancy problem as not received attention until recently [5, 3, 9]. Rao and Ross [5] proposed te invariant tecnique wic implements te nested iteration metod wile considering invariants in te subquery. However, te invariant tecnique only as better performance for te nested queries tat can not be unnested by traditional unnesting strategies. Galindo- Legaria and Josi [3] presented te decorrelation tecnique used in Microsoft QL erver wic solves te redundancy problem using te egmentapply operator. Zuzarte et al. [9] introduced te Win tecnique to evaluate queries aving redundancy by making use of extended window aggregation capabilities. Wile tese tecniques [3, 9] can ave muc better performance tan traditional unnesting approaces (e.g.[6], bot tecniques only consider queries wit some restricted redundancy. As a more complex example, consider te following query: Query 2 : select sum(l_extendedprice/7. from lineitem, part, orders were p_partkey=l_partkey and p_size=15 and p_type like %BRA and l_sipdate>= and l_sipdate<l_commitdate and l_orderkey=o_orderkey and o_orderdate>= and o_orderdate< and l_quantity < (select.2*avg(l_quantity from lineitem, partsupp were l_partkey=p_partkey and l_commitdate<l_receiptdate and l_sipdate<l_commitdate and l_suppkey=ps_suppkey and ps_availqty>5 In Query 2, te outer query and te subquery sare common tables and common conditions, but extra tables and conditions are present in bot te outer query and te subquery. Furtermore, te join operation between partsupp and lineitem in te subquery is not a lossless join, wic is not witin te scope of te Win tecnique. Redundancy may also appear in subqueries in te HAV- IG clause, in non-aggregate subqueries, or in queries aving multiple subqueries. In [9], te autors indicate tat Win can andle non-aggregate subqueries, but detailed tecniques are not provided. In fact, dealing wit te T I or ALL subquery needs careful consideration due to null values. To te best of our knowledge, no existing tecnique adequately considers te redundancy present in suc queries. In tis paper, we propose a general approac, te redundancy awareness metod, to avoid redundant computation in QL queries. 3. Redundancy Awareness Metod Te basic idea of te redundancy awareness metod is straigtforward: te conditions and tables in te outer query and te subquery are rougly divided into tree parts: one tat is common in bot te outer query and te subquery, one tat belongs only to te outer query, and one tat belongs only to te subquery. Based on tese tree parts, a query can be evaluated as follows: first, we create a base relation based on common tables and common conditions; second, starting from te base relation, we compute te aggregation in te subquery based on te tables and conditions belonging only to te subquery; finally, we generate te desired result based on te tables and conditions belonging only to te outer query and te subquery result. To acieve tis goal, te base relation must be correctly identified. Furtermore, we introduce te for-loop operator to compute te subquery and te outer query based on te base relation. Wit an efficient implementation, te for-loop operator needs only one pass over te base relation to compute te subquery and te outer query Generating base relations For te purpose of our approac, we use a query pattern to represent a query. A query pattern is a scematic representation of a query using keywords ELET, FRM, WHERE (and optional GRUP BY, HAVIG, and variables over tables, aggregate functions and conditions. A typical one-level nested query aving redundancy wit a correlated aggregate subquery in te WHERE clause can be expressed by te query pattern sown below (we assume tat te desired result is an aggregate function. ELET FRM, "!, $%& WHERE ' (*$+& AD ' &!, AD '$%& AD (.$%& AD (. /&! AD 1!23!+465 (ELET 1!2 7 1!23 7 FRM, 8!9+ WHERE ' (:!99 AD '!99 AD (.!;+9 AD " 7 Were = denotes aggregate functions, >*??@ denotes attributes, A denotes tables, B denotes selection conditions, and D denote join conditions. bviously, Query 2

3 7 Q m : = m matces tis query pattern. Due to lack of space, we omit te details of ow to matc a query to its query pattern. Query structure detection, especially te common part detection, is similar to matcing part or all of queries to materialized views [7, 4]. How to detect common subqueries and exploit tem in complex query optimization as been studied by Zu, Tao and Zuzarte [8]. Te algoritm proposed in [8] can be modified and reused to implement our matcing tecnique. Te key conditions to ceck wen using te redundancy awareness metod are: (1 te set of common tables (A is not empty, and (2 correlated predicates (D and te join conditions between common tables and correlation tables in te outer query ( are te same (for correlated subqueries. Even toug te above conditions are satisfied, wat conditions are exactly common to te outer query and te subquery still need furter consideration, because te conditions involving te common tables in te outer query (B and te conditions involving te common tables in te subquery (B! " migt contain different conditions. We define te base relation, denoted by, as te common part (tables and conditions between te outer query and te subquery. To obtain te base relation, we compute: B&('* B +-, B! ", B&(' +. B / B 12! 3, B&('12! 3 4 B 12! 3 B /. learly, B&(' is used to compute te base relation; but B &(' and B&56'12! 3 must be applied at te rigt time, to produce te rigt subquery result and te rigt final result. Tus, te base relation can be simply obtained by performing selection B &(' on A (for noncorrelated subqueries, or by performing a join of A and A on B &(', B and D (for correlated subqueries. If tere are extra tables in te subquery except common tables, i.e. A 2! 3 is not empty, we ave to extend te base relation to te extended base relation, denoted by 7. Generally, te extended base relation is obtained by performing a left outer join of and A8! " on 12! 3. ote tat B 2! 3 can be pused down. Performing an outer join of and A 2! 3 migt cause tuples in 9$ duplicated if 12! 3 is not a lossless join. uc duplicates are required to compute te aggregation in te subquery, but will cause an error wen computing te final result. Te solution to tis problem is to use 7 to compute te aggregation in te subquery, and ten reduce 7 to to compute te outer query M P by performing : DEFGIH+H+JLK, were : denotes group-by, and denotes te primary key. Wit respect to te QL syntax, te grouping attributes migt include te primary key of as well as oter attributes required for later processing Te for-loop operator nce obtaining te (extended base relation (denoted by 9$ 7PR, were te square bracket denotes optional, te subsequent computations of te aggregation in te subquery and te linking predicate between te outer query and te subquery can be done efficiently by only one pass over te (extended base relation. In order to do so, we define a new operator, for-loop, wic combines several relational operators into a new one (i.e. a macro-operator. Tis approac is based on te observation tat some basic operations appear frequently togeter and tey could be more efficiently implemented as a wole, tus saving considerable disk I/. In te following, : is used to indicate a group-by operation, MX$P indicates te aggregation = computed and T:P:VU EW over all values of te attribute of te relation $. Definition 1 Let $ $P be a relation, ]\ $P L$4 Y Z6[ Y Z6[, _^`Y+Z+[ condition on $ (i.e. involving $Pdcfe only attributes g of Y Z6[ and b a condition on Y Z6[ te scema of $,, = an aggregate function, a a $P (i.e. possibly involving =. Ten te for-loop operator is defined in two variants: -i/a MA jka ll$p = U EW l. Te meaning of te operator is $on <?> ikp8i qi/a MX j L$P given by m U EW, were te condition of te join is understood as te pairwise equality of eac attribute in. Tis is called a grouped for-loop. = U l EW by m for-loop. t MA jka l/l$p T:P:PU EW. Te meaning of te operator is given M( j L$P*rs$P. Tis is called a flat Altoug algebraic expression is an important issue, it is not te only reason to define te for-loop operator. Tere are also significant implementation issues. To acieve te objective of computing several results at once wit a single pass over te data, te operator can be implemented as an iterator tat loops over te input implementing a simple program. Te basic idea is twofold: first, selections and groupings (eiter grouping alone or togeter wit aggregate calculations can be effectively implemented in one algoritm; second, and more important, in some cases computing an aggregation and using te aggregate result in a selection can be done at te same time. Tis is due to te beavior of some aggregates and te semantics of te conditions involved. For instance, a comparison of te type attr1 = min(attr2, were bot attr1 and attr2 are attributes of some can be efficiently implemented by a sequential pass Furtermore, wen a subquery is correlated, we use te grouped for-loop and aggregate

4 = g computation is done per group. Tat means tat results (and temporary results are only accumulated by group, and terefore all temporary information needed is likely to fit in memory and performance may be good even for cases were te condition is ard to compute. Te for-loop operator is similar to te egmentapply operator [3] and te window aggregation [9] in tat all of tese operators are used to do computation based on te common part between te outer query and te subquery. Bot te forloop operator and te egmentapply operator are extended relational operators wic ave to be implemented inside DBM. Te window aggregation is one of te analytic features defined as part of te AI QL 1999 standard and as been implemented in some commercial DBM. Tus, te query can be rewritten in QL wit te redundancy considered by using te window aggregation and te WITH clause wic declares te common part. Te tecnique described in section 3.1 can be used to compose te WITH clause. From te performance point of view, te for-loop operator may perform more efficient tan te oter two due to its efficient implementation for computing te linked aggregation, te linking predicate, and te final result, wic needs only one pass over te common part Evaluation plan Based on te (extended base relation and te for-loop operator, te execution plan for queries aving redundancy can be created by te following tree steps: 1. We create te (extended base relation Q 9$ 7PR. ote tat standard relational optimization tecniques can be applied to tis part. 2. For queries wit correlated subqueries, we apply a ia MA jka l/ Q 9$P grouped for-loop operator, = U EW 74R, to Q 74R. For queries wit non-correlated subqueries, MA ja l/ Q we P apply a flat for-loop operator,. According to te U E2W 74R, to Q 74R for-loop operator definition, is >??@ X (te attributes of te outer query in te correlated predicates; if te correlating attribute is not te primary key of A X2, sould be replaced by te primary key. = is =I2 ( >*??@6 6, a is B&56'12! 3, b is B&('/ >*??@+I X =I ( >??@+I2 (. 3. If A is empty, te final result can be obtained by projection on te desired attributes. If A= + is not empty, te final result can be obtained by performing a join of Q 74R and A + on followed by projection of te desired attributes Extensions We consider tree main extensions of te redundancy awareness metod to cover subqueries in te HAVIG clause, non-aggregate subqueries, and multi-level queries. ubqueries in te HAVIG clause. In QL, te HAVIG clause usually occurs after te GRUP BY clause. If te subquery is correlated, te correlating attributes must be te same as te attributes in te GRUP BY clause. Tus, te aggregation in te outer query and te aggregation in te subquery can be computed simultaneously. If te subquery is not correlated, te aggregation in te subquery is computed over a wole base relation. Te only ting tat is needed is to continue te computations, witout resetting, across groups. After eac group is computed, we can compare te result of te global aggregate so far to te new group, and proceed as in te regular case. on-aggregate subqueries. A non-aggregate subquery is linked to its outer query by one of te following operators: EXIT, T EXIT, I, T I, ME/AY, and ALL, were ^ e. uc queries can be rewritten as queries wit aggregate subqueries, in particular wit te UT aggregate. uc rewrites must be carefully specified for te ALL or T I subquery, toug, since approaces usually tougt to work fail in te presence of null values. Let te subquery be attr1 ALL (select attr2... Ten te query can be rewritten as (select count(attr2...=(select (count(attr2..., were te first subquery is exactly as it was in te original, and te second one is also te same as te original but as te predicate attr1 attr2 added to te WHERE clause (tis approac is basically equivalent to tat of [1]. Multi-level queries. Wen considering queries of arbitrary dept, we distinguis between linear queries (were tere is at most one subquery in any given level and tree queries (were in some level tere are two or more subqueries. It is easy to see tat te redundancy awareness metod can be extended to linear queries of any dept: te metod is applied from te bottom up, starting at te innermost subquery. nce tis step is done, one can proceed up te query until te outermost block. Tree queries can also be taken care of, but require some additional care. Assuming tat query block as two subqueries, and, we consider two cases: (1 If as some overlap wit and does not, can be processed by a traditional approac and can be processed wit te redundancy awareness metod. (2 If bot and

5 = U U ave overlap wit, we furter distinguis two cases: if and are bot correlated and ave te same correlating attribute wit, bot subqueries could be computed by a for-loop operator for furter efficiency. terwise, it is better to treat and separately, creating a subtree for-loop operator for eac one. For eac case, te for-loop operator needs to be extended to deal wit several aggregations simultaneously; eac one wit its own conditions. Te extended notation of te for-loop operator is: i A E EW MA j MA E ï 2A EW MA j MA > > > A l Q P 74R, were te square bracket denotes optional. Tis definition is very similar to te multidimensional join (MD operator defined in [1]. Unlike tat work, toug, te for-loop operator is aware of redundancy and works on te (extended base relation, wile te MD operator does not consider redundancy and ave to access common tables more tan once. Tus, te MD operator relies on furter optimization to recognize redundancy on its operation, wile we create and control suc redundancy. 4. Experiments To verify te efficiency of te redundancy awareness metod, we ave implemented it on top of a leading commercial DBM, wic we call ystem A. We created TP-H databases [2] at scale factors 1 and 1 (size of 1GB and 1GB respectively in ystem A. We run Query 1 and Query 2 on a buffer cace of size 32MB and 128M respectively. Te execution results are sown in figure 1 and figure 2. From tese two figures, we can see tat bot te redundancy awareness metod and Win [9] perform muc better tan magic decorrelation [6] by avoiding redundant computations. Furtermore, te redundancy awareness metod performs sligtly better tan Win. Detailed performance analysis and te results of oter test queries will be included in our full paper Win Metod (a 32M Win Metod Figure 1. Query (b 128M Metod (a 32M 5. onclusions Metod 1.5 Figure 2. Query (b 128M In tis paper, we propose te redundancy awareness metod to efficiently evaluate queries aving redundancy. Te results of our experiments sow tat our approac indeed outperforms traditional optimizations. Furtermore, our approac is potentially applicable to a wide range of queries. We are currently expanding our experiments to examine te impact of different amounts of redundancy. References [1] M.. Akinde and M. H. Bolen. Efficient computation of subqueries in complex olap. In Proceedings of te IDE onference, pages , 23. [2] T. P. P. ouncil. Te tpc- bencmark. ttp:// [3]. A. Galindo-Legaria and M. M. Josi. rtogonal optimization of subqueries and aggregation. In Proceedings of te AM IGMD onference, pages , 21. [4] J. Goldstein and P.-A. Larson. ptimizing queries using materialized views: a practical, scalable solution. In Proceedings of te IGMD onference, pages , 21. [5] J. Rao and K. A. Ross. Reusing invariants: a new strategy for correlated queries. In Proceedings of te AM IGMD onference, pages 37 48, [6] P. esadri, H. Piraes, and T. Y.. Leung. omplex query decorrelation. In Proceedings of te IDE onference, pages , [7] M. Zaarioudakis, R. ocrane, G. Lapis, H. Piraes, and M. Urata. Answering complex sql queries using automatic summary tables. In Proceedings of te IGMD onference, pages , 2. [8] Q. Zu, Y. Tao, and. Zuzarte. ptimizing complex queries based on similarities of subqueries. Information ystems, 8(3:35 373, 25. [9]. Zuzarte, H. Piraes, W. Ma, Q. eng, L. Liu, and K. Wong. Winmagic: ubquery elimination using window aggregation. In Proceedings of te AM IGMD onference, pages ,

Section 2.3: Calculating Limits using the Limit Laws

Section 2.3: Calculating Limits using the Limit Laws Section 2.3: Calculating Limits using te Limit Laws In previous sections, we used graps and numerics to approimate te value of a it if it eists. Te problem wit tis owever is tat it does not always give

More information

4.1 Tangent Lines. y 2 y 1 = y 2 y 1

4.1 Tangent Lines. y 2 y 1 = y 2 y 1 41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange

More information

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result RT. Complex Fractions Wen working wit algebraic expressions, sometimes we come across needing to simplify expressions like tese: xx 9 xx +, xx + xx + xx, yy xx + xx + +, aa Simplifying Complex Fractions

More information

Haar Transform CS 430 Denbigh Starkey

Haar Transform CS 430 Denbigh Starkey Haar Transform CS Denbig Starkey. Background. Computing te transform. Restoring te original image from te transform 7. Producing te transform matrix 8 5. Using Haar for lossless compression 6. Using Haar

More information

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 Note: Tere will be a very sort online reading quiz (WebWork) on eac reading assignment due one our before class on its due date. Due dates can be found

More information

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically 2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use

More information

Minimizing Memory Access By Improving Register Usage Through High-level Transformations

Minimizing Memory Access By Improving Register Usage Through High-level Transformations Minimizing Memory Access By Improving Register Usage Troug Hig-level Transformations San Li Scool of Computer Engineering anyang Tecnological University anyang Avenue, SIGAPORE 639798 Email: p144102711@ntu.edu.sg

More information

More on Functions and Their Graphs

More on Functions and Their Graphs More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in

More information

2.8 The derivative as a function

2.8 The derivative as a function CHAPTER 2. LIMITS 56 2.8 Te derivative as a function Definition. Te derivative of f(x) istefunction f (x) defined as follows f f(x + ) f(x) (x). 0 Note: tis differs from te definition in section 2.7 in

More information

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring Has-Based Indexes Capter 11 Comp 521 Files and Databases Spring 2010 1 Introduction As for any index, 3 alternatives for data entries k*: Data record wit key value k

More information

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various

More information

Notes: Dimensional Analysis / Conversions

Notes: Dimensional Analysis / Conversions Wat is a unit system? A unit system is a metod of taking a measurement. Simple as tat. We ave units for distance, time, temperature, pressure, energy, mass, and many more. Wy is it important to ave a standard?

More information

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall Has-Based Indexes Capter 11 Comp 521 Files and Databases Fall 2012 1 Introduction Hasing maps a searc key directly to te pid of te containing page/page-overflow cain Doesn t require intermediate page fetces

More information

1.4 RATIONAL EXPRESSIONS

1.4 RATIONAL EXPRESSIONS 6 CHAPTER Fundamentals.4 RATIONAL EXPRESSIONS Te Domain of an Algebraic Epression Simplifying Rational Epressions Multiplying and Dividing Rational Epressions Adding and Subtracting Rational Epressions

More information

4.2 The Derivative. f(x + h) f(x) lim

4.2 The Derivative. f(x + h) f(x) lim 4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially

More information

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry Our Calibrated Model as No Predictive Value: An Example from te Petroleum Industry J.N. Carter a, P.J. Ballester a, Z. Tavassoli a and P.R. King a a Department of Eart Sciences and Engineering, Imperial

More information

Density Estimation Over Data Stream

Density Estimation Over Data Stream Density Estimation Over Data Stream Aoying Zou Dept. of Computer Science, Fudan University 22 Handan Rd. Sangai, 2433, P.R. Cina ayzou@fudan.edu.cn Ziyuan Cai Dept. of Computer Science, Fudan University

More information

12.2 TECHNIQUES FOR EVALUATING LIMITS

12.2 TECHNIQUES FOR EVALUATING LIMITS Section Tecniques for Evaluating Limits 86 TECHNIQUES FOR EVALUATING LIMITS Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing tecnique to evaluate its of

More information

3.6 Directional Derivatives and the Gradient Vector

3.6 Directional Derivatives and the Gradient Vector 288 CHAPTER 3. FUNCTIONS OF SEVERAL VARIABLES 3.6 Directional Derivatives and te Gradient Vector 3.6.1 Functions of two Variables Directional Derivatives Let us first quickly review, one more time, te

More information

Multi-Stack Boundary Labeling Problems

Multi-Stack Boundary Labeling Problems Multi-Stack Boundary Labeling Problems Micael A. Bekos 1, Micael Kaufmann 2, Katerina Potika 1 Antonios Symvonis 1 1 National Tecnical University of Atens, Scool of Applied Matematical & Pysical Sciences,

More information

CS 234. Module 6. October 16, CS 234 Module 6 ADT Dictionary 1 / 33

CS 234. Module 6. October 16, CS 234 Module 6 ADT Dictionary 1 / 33 CS 234 Module 6 October 16, 2018 CS 234 Module 6 ADT Dictionary 1 / 33 Idea for an ADT Te ADT Dictionary stores pairs (key, element), were keys are distinct and elements can be any data. Notes: Tis is

More information

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method Engineering, 2013, 5, 522-526 ttp://dx.doi.org/10.4236/eng.2013.510b107 Publised Online October 2013 (ttp://www.scirp.org/journal/eng) Two Modifications of Weigt Calculation of te Non-Local Means Denoising

More information

15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes

15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes 15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes William Lovas (wlovas@cs) Karl Naden Out: Tuesday, Friday, June 10, 2011 Due: Monday, June 13, 2011 (Written

More information

MAP MOSAICKING WITH DISSIMILAR PROJECTIONS, SPATIAL RESOLUTIONS, DATA TYPES AND NUMBER OF BANDS 1. INTRODUCTION

MAP MOSAICKING WITH DISSIMILAR PROJECTIONS, SPATIAL RESOLUTIONS, DATA TYPES AND NUMBER OF BANDS 1. INTRODUCTION MP MOSICKING WITH DISSIMILR PROJECTIONS, SPTIL RESOLUTIONS, DT TYPES ND NUMBER OF BNDS Tyler J. lumbaug and Peter Bajcsy National Center for Supercomputing pplications 605 East Springfield venue, Campaign,

More information

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness 1 Optimal In-etwork Packet Aggregation Policy for Maimum Information Fresness Alper Sinan Akyurek, Tajana Simunic Rosing Electrical and Computer Engineering, University of California, San Diego aakyurek@ucsd.edu,

More information

Investigating an automated method for the sensitivity analysis of functions

Investigating an automated method for the sensitivity analysis of functions Investigating an automated metod for te sensitivity analysis of functions Sibel EKER s.eker@student.tudelft.nl Jill SLINGER j..slinger@tudelft.nl Delft University of Tecnology 2628 BX, Delft, te Neterlands

More information

On the Use of Radio Resource Tests in Wireless ad hoc Networks

On the Use of Radio Resource Tests in Wireless ad hoc Networks Tecnical Report RT/29/2009 On te Use of Radio Resource Tests in Wireless ad oc Networks Diogo Mónica diogo.monica@gsd.inesc-id.pt João Leitão jleitao@gsd.inesc-id.pt Luis Rodrigues ler@ist.utl.pt Carlos

More information

Symmetric Tree Replication Protocol for Efficient Distributed Storage System*

Symmetric Tree Replication Protocol for Efficient Distributed Storage System* ymmetric Tree Replication Protocol for Efficient Distributed torage ystem* ung Cune Coi 1, Hee Yong Youn 1, and Joong up Coi 2 1 cool of Information and Communications Engineering ungkyunkwan University

More information

Experimental Studies on SMT-based Debugging

Experimental Studies on SMT-based Debugging Experimental Studies on SMT-based Debugging Andre Sülflow Görscwin Fey Rolf Drecsler Institute of Computer Science University of Bremen 28359 Bremen, Germany {suelflow,fey,drecsle}@informatik.uni-bremen.de

More information

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes Coarticulation: An Approac for Generating Concurrent Plans in Markov Decision Processes Kasayar Roanimanes kas@cs.umass.edu Sridar Maadevan maadeva@cs.umass.edu Department of Computer Science, University

More information

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation P R E P R N T CPWS XV Berlin, September 8, 008 Fast Calculation of Termodynamic Properties of Water and Steam in Process Modelling using Spline nterpolation Mattias Kunick a, Hans-Joacim Kretzscmar a,

More information

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks An Algoritm for Loopless Deflection in Potonic Packet-Switced Networks Jason P. Jue Center for Advanced Telecommunications Systems and Services Te University of Texas at Dallas Ricardson, TX 75083-0688

More information

The Euler and trapezoidal stencils to solve d d x y x = f x, y x

The Euler and trapezoidal stencils to solve d d x y x = f x, y x restart; Te Euler and trapezoidal stencils to solve d d x y x = y x Te purpose of tis workseet is to derive te tree simplest numerical stencils to solve te first order d equation y x d x = y x, and study

More information

Numerical Derivatives

Numerical Derivatives Lab 15 Numerical Derivatives Lab Objective: Understand and implement finite difference approximations of te derivative in single and multiple dimensions. Evaluate te accuracy of tese approximations. Ten

More information

Data Structures and Programming Spring 2014, Midterm Exam.

Data Structures and Programming Spring 2014, Midterm Exam. Data Structures and Programming Spring 2014, Midterm Exam. 1. (10 pts) Order te following functions 2.2 n, log(n 10 ), 2 2012, 25n log(n), 1.1 n, 2n 5.5, 4 log(n), 2 10, n 1.02, 5n 5, 76n, 8n 5 + 5n 2

More information

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer

More information

Fighting Redundancy in SQL

Fighting Redundancy in SQL Fighting Redundancy in SQL Antonio Badia and Dev Anand Computer Engineering and Computer Science department University of Louisville, Louisville KY 40292 Abstract. Many SQL queries with aggregated subqueries

More information

2.5 Evaluating Limits Algebraically

2.5 Evaluating Limits Algebraically SECTION.5 Evaluating Limits Algebraically 3.5 Evaluating Limits Algebraically Preinary Questions. Wic of te following is indeterminate at x? x C x ; x x C ; x x C 3 ; x C x C 3 At x, x isofteform 0 xc3

More information

Tuning MAX MIN Ant System with off-line and on-line methods

Tuning MAX MIN Ant System with off-line and on-line methods Université Libre de Bruxelles Institut de Recerces Interdisciplinaires et de Développements en Intelligence Artificielle Tuning MAX MIN Ant System wit off-line and on-line metods Paola Pellegrini, Tomas

More information

Announcements SORTING. Prelim 1. Announcements. A3 Comments 9/26/17. This semester s event is on Saturday, November 4 Apply to be a teacher!

Announcements SORTING. Prelim 1. Announcements. A3 Comments 9/26/17. This semester s event is on Saturday, November 4 Apply to be a teacher! Announcements 2 "Organizing is wat you do efore you do someting, so tat wen you do it, it is not all mixed up." ~ A. A. Milne SORTING Lecture 11 CS2110 Fall 2017 is a program wit a teac anyting, learn

More information

ANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS

ANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS NTNN SPHRICL COORDINT SSTMS ND THIR PPLICTION IN COMBINING RSULTS FROM DIFFRNT NTNN ORINTTIONS llen C. Newell, Greg Hindman Nearfield Systems Incorporated 133. 223 rd St. Bldg. 524 Carson, C 9745 US BSTRCT

More information

CE 221 Data Structures and Algorithms

CE 221 Data Structures and Algorithms CE Data Structures and Algoritms Capter 4: Trees (AVL Trees) Text: Read Weiss, 4.4 Izmir University of Economics AVL Trees An AVL (Adelson-Velskii and Landis) tree is a binary searc tree wit a balance

More information

MAC-CPTM Situations Project

MAC-CPTM Situations Project raft o not use witout permission -P ituations Project ituation 20: rea of Plane Figures Prompt teacer in a geometry class introduces formulas for te areas of parallelograms, trapezoids, and romi. e removes

More information

Intra- and Inter-Session Network Coding in Wireless Networks

Intra- and Inter-Session Network Coding in Wireless Networks Intra- and Inter-Session Network Coding in Wireless Networks Hulya Seferoglu, Member, IEEE, Atina Markopoulou, Member, IEEE, K K Ramakrisnan, Fellow, IEEE arxiv:857v [csni] 3 Feb Abstract In tis paper,

More information

Materials: Whiteboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector.

Materials: Whiteboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector. Adam Clinc Lesson: Deriving te Derivative Grade Level: 12 t grade, Calculus I class Materials: Witeboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector. Goals/Objectives:

More information

12.2 Techniques for Evaluating Limits

12.2 Techniques for Evaluating Limits 335_qd /4/5 :5 PM Page 863 Section Tecniques for Evaluating Limits 863 Tecniques for Evaluating Limits Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing

More information

Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs

Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs Per Ostlund Department of Computer and Information Science Linkoping University SE-58183 Linkoping, Sweden per.ostlund@liu.se Kristian

More information

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science A Cost Model for Distributed Sared Memory Using Competitive Update Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, Texas, 77843-3112, USA E-mail: fjkim,vaidyag@cs.tamu.edu

More information

HW 2 Bench Table. Hash Indexes: Chap. 11. Table Bench is in tablespace setq. Loading table bench. Then a bulk load

HW 2 Bench Table. Hash Indexes: Chap. 11. Table Bench is in tablespace setq. Loading table bench. Then a bulk load Has Indexes: Cap. CS64 Lecture 6 HW Benc Table Table of M rows, Columns of different cardinalities CREATE TABLE BENCH ( KSEQ integer primary key, K5K integer not null, K5K integer not null, KK integer

More information

Communicator for Mac Quick Start Guide

Communicator for Mac Quick Start Guide Communicator for Mac Quick Start Guide 503-968-8908 sterling.net training@sterling.net Pone Support 503.968.8908, option 2 pone-support@sterling.net For te most effective support, please provide your main

More information

Linear Interpolating Splines

Linear Interpolating Splines Jim Lambers MAT 772 Fall Semester 2010-11 Lecture 17 Notes Tese notes correspond to Sections 112, 11, and 114 in te text Linear Interpolating Splines We ave seen tat ig-degree polynomial interpolation

More information

Multi-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art

Multi-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art Multi-Objective Particle Swarm Optimizers: A Survey of te State-of-te-Art Margarita Reyes-Sierra and Carlos A. Coello Coello CINVESTAV-IPN (Evolutionary Computation Group) Electrical Engineering Department,

More information

Software Fault Prediction using Machine Learning Algorithm Pooja Garg 1 Mr. Bhushan Dua 2

Software Fault Prediction using Machine Learning Algorithm Pooja Garg 1 Mr. Bhushan Dua 2 IJSRD - International Journal for Scientific Researc & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Software Fault Prediction using Macine Learning Algoritm Pooja Garg 1 Mr. Busan Dua 2

More information

THANK YOU FOR YOUR PURCHASE!

THANK YOU FOR YOUR PURCHASE! THANK YOU FOR YOUR PURCHASE! Te resources included in tis purcase were designed and created by me. I ope tat you find tis resource elpful in your classroom. Please feel free to contact me wit any questions

More information

Asynchronous Power Flow on Graphic Processing Units

Asynchronous Power Flow on Graphic Processing Units 1 Asyncronous Power Flow on Grapic Processing Units Manuel Marin, Student Member, IEEE, David Defour, and Federico Milano, Senior Member, IEEE Abstract Asyncronous iterations can be used to implement fixed-point

More information

Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes

Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganograpic Scemes Jessica Fridric Dept. of Electrical Engineering, SUNY Bingamton, Bingamton, NY 3902-6000, USA fridric@bingamton.edu

More information

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks Downloaded from vbn.aau.dk on: April 7, 09 Aalborg Universitet etwork Coding to Enance Standard Routing Protocols in Wireless Mes etworks Palevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank;

More information

Tilings of rectangles with T-tetrominoes

Tilings of rectangles with T-tetrominoes Tilings of rectangles wit T-tetrominoes Micael Korn and Igor Pak Department of Matematics Massacusetts Institute of Tecnology Cambridge, MA, 2139 mikekorn@mit.edu, pak@mat.mit.edu August 26, 23 Abstract

More information

TREES. General Binary Trees The Search Tree ADT Binary Search Trees AVL Trees Threaded trees Splay Trees B-Trees. UNIT -II

TREES. General Binary Trees The Search Tree ADT Binary Search Trees AVL Trees Threaded trees Splay Trees B-Trees. UNIT -II UNIT -II TREES General Binary Trees Te Searc Tree DT Binary Searc Trees VL Trees Treaded trees Splay Trees B-Trees. 2MRKS Q& 1. Define Tree tree is a data structure, wic represents ierarcical relationsip

More information

An experimental framework to investigate context-aware schemes for content delivery

An experimental framework to investigate context-aware schemes for content delivery An experimental framework to investigate context-aware scemes for content delivery Pietro Lungaro +, Cristobal Viedma +, Zary Segall + and Pavan Kumar + Mobile Service Lab, Royal Institute of Tecnology

More information

Integrating Multimedia Applications in Hard Real-Time Systems

Integrating Multimedia Applications in Hard Real-Time Systems Integrating Multimedia Applications in Hard Real-Time Systems Luca Abeni and Giorgio Buttazzo Scuola Superiore S. Anna, Pisa luca@arti.sssup.it, giorgio@sssup.it Abstract Tis paper focuses on te problem

More information

NOTES: A quick overview of 2-D geometry

NOTES: A quick overview of 2-D geometry NOTES: A quick overview of 2-D geometry Wat is 2-D geometry? Also called plane geometry, it s te geometry tat deals wit two dimensional sapes flat tings tat ave lengt and widt, suc as a piece of paper.

More information

Measuring Length 11and Area

Measuring Length 11and Area Measuring Lengt 11and Area 11.1 Areas of Triangles and Parallelograms 11.2 Areas of Trapezoids, Romuses, and Kites 11.3 Perimeter and Area of Similar Figures 11.4 Circumference and Arc Lengt 11.5 Areas

More information

When a BST becomes badly unbalanced, the search behavior can degenerate to that of a sorted linked list, O(N).

When a BST becomes badly unbalanced, the search behavior can degenerate to that of a sorted linked list, O(N). Balanced Binary Trees Binary searc trees provide O(log N) searc times provided tat te nodes are distributed in a reasonably balanced manner. Unfortunately, tat is not always te case and performing a sequence

More information

An Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks

An Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks Tis paper was presented as part of te main tecnical program at IEEE INFOCOM 20 An Analytical Approac to Real-Time Misbeavior Detection in IEEE 802. Based Wireless Networks Jin Tang, Yu Ceng Electrical

More information

6 Computing Derivatives the Quick and Easy Way

6 Computing Derivatives the Quick and Easy Way Jay Daigle Occiental College Mat 4: Calculus Experience 6 Computing Derivatives te Quick an Easy Way In te previous section we talke about wat te erivative is, an we compute several examples, an ten we

More information

An Anchor Chain Scheme for IP Mobility Management

An Anchor Chain Scheme for IP Mobility Management An Ancor Cain Sceme for IP Mobility Management Yigal Bejerano and Israel Cidon Department of Electrical Engineering Tecnion - Israel Institute of Tecnology Haifa 32000, Israel E-mail: bej@tx.tecnion.ac.il.

More information

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method International Journal of Statistics and Applications 0, (): -0 DOI: 0.9/j.statistics.000.0 Comparison of te Efficiency of te Various Algoritms in Stratified Sampling wen te Initial Solutions are Determined

More information

RECONSTRUCTING OF A GIVEN PIXEL S THREE- DIMENSIONAL COORDINATES GIVEN BY A PERSPECTIVE DIGITAL AERIAL PHOTOS BY APPLYING DIGITAL TERRAIN MODEL

RECONSTRUCTING OF A GIVEN PIXEL S THREE- DIMENSIONAL COORDINATES GIVEN BY A PERSPECTIVE DIGITAL AERIAL PHOTOS BY APPLYING DIGITAL TERRAIN MODEL IV. Évfolyam 3. szám - 2009. szeptember Horvát Zoltán orvat.zoltan@zmne.u REONSTRUTING OF GIVEN PIXEL S THREE- DIMENSIONL OORDINTES GIVEN Y PERSPETIVE DIGITL ERIL PHOTOS Y PPLYING DIGITL TERRIN MODEL bsztrakt/bstract

More information

PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION

PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION Martin Kraus Computer Grapics and Visualization Group, Tecnisce Universität Müncen, Germany krausma@in.tum.de Magnus Strengert Visualization and Interactive

More information

Higher-Order Symbolic Execution via Contracts

Higher-Order Symbolic Execution via Contracts Higer-Order Symbolic Execution via Contracts Sam Tobin-Hocstadt David Van Horn Norteastern University {samt,dvanorn}@ccs.neu.edu Abstract We present a new approac to automated reasoning about iger-order

More information

Alternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method

Alternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method Te Open Plasma Pysics Journal, 2010, 3, 29-35 29 Open Access Alternating Direction Implicit Metods for FDTD Using te Dey-Mittra Embedded Boundary Metod T.M. Austin *, J.R. Cary, D.N. Smite C. Nieter Tec-X

More information

CS211 Spring 2004 Lecture 06 Loops and their invariants. Software engineering reason for using loop invariants

CS211 Spring 2004 Lecture 06 Loops and their invariants. Software engineering reason for using loop invariants CS211 Spring 2004 Lecture 06 Loops and teir invariants Reading material: Tese notes. Weiss: Noting on invariants. ProgramLive: Capter 7 and 8 O! Tou ast damnale iteration and art, indeed, ale to corrupt

More information

each node in the tree, the difference in height of its two subtrees is at the most p. AVL tree is a BST that is height-balanced-1-tree.

each node in the tree, the difference in height of its two subtrees is at the most p. AVL tree is a BST that is height-balanced-1-tree. Data Structures CSC212 1 AVL Trees A binary tree is a eigt-balanced-p-tree if for eac node in te tree, te difference in eigt of its two subtrees is at te most p. AVL tree is a BST tat is eigt-balanced-tree.

More information

Fault Localization Using Tarantula

Fault Localization Using Tarantula Class 20 Fault localization (cont d) Test-data generation Exam review: Nov 3, after class to :30 Responsible for all material up troug Nov 3 (troug test-data generation) Send questions beforeand so all

More information

Traffic Sign Classification Using Ring Partitioned Method

Traffic Sign Classification Using Ring Partitioned Method Traffic Sign Classification Using Ring Partitioned Metod Aryuanto Soetedjo and Koici Yamada Laboratory for Management and Information Systems Science, Nagaoa University of Tecnology 603- Kamitomioamaci,

More information

Master the Audit of Information Security Management Systems (ISMS) based on ISO/IEC 27001

Master the Audit of Information Security Management Systems (ISMS) based on ISO/IEC 27001 Lead Auditor Master te Audit of Systems (ISMS) based on Wy sould you attend? Lead Auditor training enables you to develop te necessary expertise to perform an System (ISMS) audit by applying widely recognized

More information

A Statistical Approach for Target Counting in Sensor-Based Surveillance Systems

A Statistical Approach for Target Counting in Sensor-Based Surveillance Systems Proceedings IEEE INFOCOM A Statistical Approac for Target Counting in Sensor-Based Surveillance Systems Dengyuan Wu, Decang Cen,aiXing, Xiuzen Ceng Department of Computer Science, Te George Wasington University,

More information

Application of a Key Value Paradigm to Logic Factoring

Application of a Key Value Paradigm to Logic Factoring INVITED PAPER Application of a Key Value Paradigm to Logic Factoring Te autor first revisits a classic algoritm for algebraic factoring to establis a stronger connection to te functional intent rater tan

More information

George Xylomenos and George C. Polyzos. with existing protocols and their eæciency in terms of

George Xylomenos and George C. Polyzos. with existing protocols and their eæciency in terms of IP MULTICASTING FOR WIRELESS MOBILE OSTS George Xylomenos and George C. Polyzos fxgeorge,polyzosg@cs.ucsd.edu Computer Systems Laboratory Department of Computer Science and Engineering University of California,

More information

PLK-B SERIES Technical Manual (USA Version) CLICK HERE FOR CONTENTS

PLK-B SERIES Technical Manual (USA Version) CLICK HERE FOR CONTENTS PLK-B SERIES Technical Manual (USA Version) CLICK ERE FOR CONTENTS CONTROL BOX PANEL MOST COMMONLY USED FUNCTIONS INITIAL READING OF SYSTEM SOFTWARE/PAGES 1-2 RE-INSTALLATION OF TE SYSTEM SOFTWARE/PAGES

More information

Efficient Content-Based Indexing of Large Image Databases

Efficient Content-Based Indexing of Large Image Databases Efficient Content-Based Indexing of Large Image Databases ESSAM A. EL-KWAE University of Nort Carolina at Carlotte and MANSUR R. KABUKA University of Miami Large image databases ave emerged in various

More information

Extended Synchronization Signals for Eliminating PCI Confusion in Heterogeneous LTE

Extended Synchronization Signals for Eliminating PCI Confusion in Heterogeneous LTE 1 Extended Syncronization Signals for Eliminating PCI Confusion in Heterogeneous LTE Amed H. Zaran Department of Electronics and Electrical Communications Cairo University Egypt. azaran@eecu.cu.edu.eg

More information

Distributed and Optimal Rate Allocation in Application-Layer Multicast

Distributed and Optimal Rate Allocation in Application-Layer Multicast Distributed and Optimal Rate Allocation in Application-Layer Multicast Jinyao Yan, Martin May, Bernard Plattner, Wolfgang Mülbauer Computer Engineering and Networks Laboratory, ETH Zuric, CH-8092, Switzerland

More information

A UPnP-based Decentralized Service Discovery Improved Algorithm

A UPnP-based Decentralized Service Discovery Improved Algorithm Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol.1, No.1, Marc 2013, pp. 21~26 ISSN: 2089-3272 21 A UPnP-based Decentralized Service Discovery Improved Algoritm Yu Si-cai*, Wu Yan-zi,

More information

An Iterative Approach to the Hand-Eye and Base-World Calibration Problem

An Iterative Approach to the Hand-Eye and Base-World Calibration Problem Proceedings of te 2001 IEEE International Conference on Robotics & Automation Seoul, Korea. May 21-26, 2001 An Iterative Approac to te Hand-Eye and Base-World Calibration Problem Robert Lee Hirs Guilerme

More information

Arrays in a Lazy Functional Language a case study: the Fast Fourier Transform

Arrays in a Lazy Functional Language a case study: the Fast Fourier Transform Arrays in a Lazy Functional Language a case study: te Fast Fourier Transform Pieter H. Hartel and Willem G. Vree Department of Computer Systems University of Amsterdam Kruislaan 403, 1098 SJ Amsterdam,

More information

Image Registration via Particle Movement

Image Registration via Particle Movement Image Registration via Particle Movement Zao Yi and Justin Wan Abstract Toug fluid model offers a good approac to nonrigid registration wit large deformations, it suffers from te blurring artifacts introduced

More information

Limits and Continuity

Limits and Continuity CHAPTER Limits and Continuit. Rates of Cange and Limits. Limits Involving Infinit.3 Continuit.4 Rates of Cange and Tangent Lines An Economic Injur Level (EIL) is a measurement of te fewest number of insect

More information

SORTING 9/26/18. Prelim 1. Prelim 1. Why Sorting? InsertionSort. Some Sorting Algorithms. Tonight!!!! Two Sessions:

SORTING 9/26/18. Prelim 1. Prelim 1. Why Sorting? InsertionSort. Some Sorting Algorithms. Tonight!!!! Two Sessions: Prelim 1 2 "Organizing is wat you do efore you do someting, so tat wen you do it, it is not all mixed up." ~ A. A. Milne SORTING Tonigt!!!! Two Sessions: You sould now y now wat room to tae te final. Jenna

More information

Announcements. Lilian s office hours rescheduled: Fri 2-4pm HW2 out tomorrow, due Thursday, 7/7. CSE373: Data Structures & Algorithms

Announcements. Lilian s office hours rescheduled: Fri 2-4pm HW2 out tomorrow, due Thursday, 7/7. CSE373: Data Structures & Algorithms Announcements Lilian s office ours resceduled: Fri 2-4pm HW2 out tomorrow, due Tursday, 7/7 CSE373: Data Structures & Algoritms Deletion in BST 2 5 5 2 9 20 7 0 7 30 Wy migt deletion be arder tan insertion?

More information

19.2 Surface Area of Prisms and Cylinders

19.2 Surface Area of Prisms and Cylinders Name Class Date 19 Surface Area of Prisms and Cylinders Essential Question: How can you find te surface area of a prism or cylinder? Resource Locker Explore Developing a Surface Area Formula Surface area

More information

Fighting Redundancy in SQL: the For-Loop Approach

Fighting Redundancy in SQL: the For-Loop Approach Fighting Redundancy in SQL: the For-Loop Approach Antonio Badia and Dev Anand Computer Engineering and Computer Science department University of Louisville, Louisville KY 40292 July 8, 2004 1 Introduction

More information

SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS. Hewlett-Packard Company East Mission Avenue. Bogazici University

SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS. Hewlett-Packard Company East Mission Avenue. Bogazici University SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS Sanuj V. Sarin 1, Hakan Delic 2 and Jung H. Kim 3 1 Hewlett-Packard Company 24001 East Mission Avenue Spokane, Wasington 99109, USA 2 Signal

More information

Analytical CHEMISTRY

Analytical CHEMISTRY ISSN : 974-749 Grap kernels and applications in protein classification Jiang Qiangrong*, Xiong Zikang, Zai Can Department of Computer Science, Beijing University of Tecnology, Beijing, (CHINA) E-mail:

More information

M2TECH HIFACE DAC 384KHZ/32BIT DIGITAL-TO-ANALOG CONVERTER USER MANUAL

M2TECH HIFACE DAC 384KHZ/32BIT DIGITAL-TO-ANALOG CONVERTER USER MANUAL M2TECH HIFACE DAC 384KHZ/32BIT DIGITAL-TO-ANALOG CONVERTER USER MANUAL REV. 1.1 5/2013 Warning! Canges or modifications not autorized by te manufacturer can invalidate te compliance to CE regulations and

More information

A Bidirectional Subsethood Based Similarity Measure for Fuzzy Sets

A Bidirectional Subsethood Based Similarity Measure for Fuzzy Sets A Bidirectional Subsetood Based Similarity Measure for Fuzzy Sets Saily Kabir Cristian Wagner Timoty C. Havens and Derek T. Anderson Intelligent Modelling and Analysis (IMA) Group and Lab for Uncertainty

More information

Design of PSO-based Fuzzy Classification Systems

Design of PSO-based Fuzzy Classification Systems Tamkang Journal of Science and Engineering, Vol. 9, No 1, pp. 6370 (006) 63 Design of PSO-based Fuzzy Classification Systems Cia-Cong Cen Department of Electronics Engineering, Wufeng Institute of Tecnology,

More information

MTH-112 Quiz 1 - Solutions

MTH-112 Quiz 1 - Solutions MTH- Quiz - Solutions Words in italics are for eplanation purposes onl (not necessar to write in te tests or. Determine weter te given relation is a function. Give te domain and range of te relation. {(,

More information

1 Finding Trigonometric Derivatives

1 Finding Trigonometric Derivatives MTH 121 Fall 2008 Essex County College Division of Matematics Hanout Version 8 1 October 2, 2008 1 Fining Trigonometric Derivatives 1.1 Te Derivative as a Function Te efinition of te erivative as a function

More information