Redundancy Awareness in SQL Queries
|
|
- Kerrie Georgia Jacobs
- 6 years ago
- Views:
Transcription
1 Redundancy Awareness in QL Queries Bin ao and Antonio Badia omputer Engineering and omputer cience Department University of Louisville Abstract In tis paper, we study QL queries wit aggregate subqueries tat sare common tables and conditions wit te outer query. Wile several approaces can deal wit suc queries, tey ave limited applicability. We propose te redundancy awareness metod to detect te largest common part sared by query and subquery, compute it once, and determine wat operations are needed to finis evaluation of te original query. ur approac can deal wit redundancy in all types of subqueries. We offer te possibility for te optimizer to coose te most efficient plan for a given query. We ave implemented our approac on top of a commercial DBM; our experiments sow tat our approac compares favorably to existing optimization tecniques. 1. Introduction ne powerful feature of QL is te use of subqueries wit aggregation, so tat wenever possible, aggregates are computed and used witin te same query. However, one of te limitations is tat suc queries usually sow a great deal of redundancy, tat is, te outer query and te subquery sare common tables and conditions. It is important to point out tat redundancy is present because of te structure of QL. In tis paper, we study te general idea of optimizing queries aving redundancy by focusing on te problem of queries wit aggregate subqueries. Altoug oter approaces ave addressed suc queries [3, 9], tey ave some limitations tat we aim to overcome. In particular, suc approaces only apply under limited circumstances, wile we present a general and efficient approac, called te redundancy awareness metod. We attack te redundancy problem directly by identifying te largest common part sared by query and subquery and executing tis common part only once. However, tis does not, per se, guarantee improved performance. Tus, we propose a new operator, called te for-loop, tat allows efficient computation of aggregates and conditions involving tem wit one pass over te common part. ur approac can deal wit redundancy in WHERE clause subqueries witout restrictions, and applies also to subqueries in te HAVIG clause. It also can be extended to non-aggregate subqueries via a rewriting of te subquery and multiple subqueries. Te nested relational approac aims to detect te largest redundancy present in te outer query and te subquery. However, saring te largest common part can not always yield te most efficient plan. ometimes, executing none or part of redundancy may ave better performance. Wat we do ere is to offer te possibility for te optimizer to coose te best plan. We present experimental evidence tat our approac, wen applicable, performs better tan oter optimizations proposed in te literature. 2. Related Work and Motivation A typical query aving redundancy is sown below: Query 1 : select s_acctbal,s_name,n_name, p_partkey,p_mfgr,s_address, s_pone,s_comment from part,supplier,partsupp,nation,region were p_partkey=ps_partkey and s_suppkey=ps_suppkey and p_size=15 and p_type like %BRA and s_nationkey=n_nationkey and n_regionkey=r_regionkey and r_name= EURPE and ps_supplycost = (select min(ps_supplycost from partsupp,supplier,nation,region were p_partkey=ps_partkey and s_suppkey=ps_suppkey and s_nationkey=n_nationkey and n_regionkey=r_regionkey and r_name= EURPE Te most noticeable feature of te above query is redundancy: te tables and conditions in te subquery are totally
2 - - - < included in tose in te outer query. As a query aving a correlated aggregate subquery, Query 1 can be unnested by most approaces proposed in te literature (e.g. [6]. However, suc approaces would not recognize te redundancy. Terefore, common tables and common conditions ave to be accessed and computed more tan once. ptimization of nested queries as received significant attention since te 198 s. However, te redundancy problem as not received attention until recently [5, 3, 9]. Rao and Ross [5] proposed te invariant tecnique wic implements te nested iteration metod wile considering invariants in te subquery. However, te invariant tecnique only as better performance for te nested queries tat can not be unnested by traditional unnesting strategies. Galindo- Legaria and Josi [3] presented te decorrelation tecnique used in Microsoft QL erver wic solves te redundancy problem using te egmentapply operator. Zuzarte et al. [9] introduced te Win tecnique to evaluate queries aving redundancy by making use of extended window aggregation capabilities. Wile tese tecniques [3, 9] can ave muc better performance tan traditional unnesting approaces (e.g.[6], bot tecniques only consider queries wit some restricted redundancy. As a more complex example, consider te following query: Query 2 : select sum(l_extendedprice/7. from lineitem, part, orders were p_partkey=l_partkey and p_size=15 and p_type like %BRA and l_sipdate>= and l_sipdate<l_commitdate and l_orderkey=o_orderkey and o_orderdate>= and o_orderdate< and l_quantity < (select.2*avg(l_quantity from lineitem, partsupp were l_partkey=p_partkey and l_commitdate<l_receiptdate and l_sipdate<l_commitdate and l_suppkey=ps_suppkey and ps_availqty>5 In Query 2, te outer query and te subquery sare common tables and common conditions, but extra tables and conditions are present in bot te outer query and te subquery. Furtermore, te join operation between partsupp and lineitem in te subquery is not a lossless join, wic is not witin te scope of te Win tecnique. Redundancy may also appear in subqueries in te HAV- IG clause, in non-aggregate subqueries, or in queries aving multiple subqueries. In [9], te autors indicate tat Win can andle non-aggregate subqueries, but detailed tecniques are not provided. In fact, dealing wit te T I or ALL subquery needs careful consideration due to null values. To te best of our knowledge, no existing tecnique adequately considers te redundancy present in suc queries. In tis paper, we propose a general approac, te redundancy awareness metod, to avoid redundant computation in QL queries. 3. Redundancy Awareness Metod Te basic idea of te redundancy awareness metod is straigtforward: te conditions and tables in te outer query and te subquery are rougly divided into tree parts: one tat is common in bot te outer query and te subquery, one tat belongs only to te outer query, and one tat belongs only to te subquery. Based on tese tree parts, a query can be evaluated as follows: first, we create a base relation based on common tables and common conditions; second, starting from te base relation, we compute te aggregation in te subquery based on te tables and conditions belonging only to te subquery; finally, we generate te desired result based on te tables and conditions belonging only to te outer query and te subquery result. To acieve tis goal, te base relation must be correctly identified. Furtermore, we introduce te for-loop operator to compute te subquery and te outer query based on te base relation. Wit an efficient implementation, te for-loop operator needs only one pass over te base relation to compute te subquery and te outer query Generating base relations For te purpose of our approac, we use a query pattern to represent a query. A query pattern is a scematic representation of a query using keywords ELET, FRM, WHERE (and optional GRUP BY, HAVIG, and variables over tables, aggregate functions and conditions. A typical one-level nested query aving redundancy wit a correlated aggregate subquery in te WHERE clause can be expressed by te query pattern sown below (we assume tat te desired result is an aggregate function. ELET FRM, "!, $%& WHERE ' (*$+& AD ' &!, AD '$%& AD (.$%& AD (. /&! AD 1!23!+465 (ELET 1!2 7 1!23 7 FRM, 8!9+ WHERE ' (:!99 AD '!99 AD (.!;+9 AD " 7 Were = denotes aggregate functions, >*??@ denotes attributes, A denotes tables, B denotes selection conditions, and D denote join conditions. bviously, Query 2
3 7 Q m : = m matces tis query pattern. Due to lack of space, we omit te details of ow to matc a query to its query pattern. Query structure detection, especially te common part detection, is similar to matcing part or all of queries to materialized views [7, 4]. How to detect common subqueries and exploit tem in complex query optimization as been studied by Zu, Tao and Zuzarte [8]. Te algoritm proposed in [8] can be modified and reused to implement our matcing tecnique. Te key conditions to ceck wen using te redundancy awareness metod are: (1 te set of common tables (A is not empty, and (2 correlated predicates (D and te join conditions between common tables and correlation tables in te outer query ( are te same (for correlated subqueries. Even toug te above conditions are satisfied, wat conditions are exactly common to te outer query and te subquery still need furter consideration, because te conditions involving te common tables in te outer query (B and te conditions involving te common tables in te subquery (B! " migt contain different conditions. We define te base relation, denoted by, as te common part (tables and conditions between te outer query and te subquery. To obtain te base relation, we compute: B&('* B +-, B! ", B&(' +. B / B 12! 3, B&('12! 3 4 B 12! 3 B /. learly, B&(' is used to compute te base relation; but B &(' and B&56'12! 3 must be applied at te rigt time, to produce te rigt subquery result and te rigt final result. Tus, te base relation can be simply obtained by performing selection B &(' on A (for noncorrelated subqueries, or by performing a join of A and A on B &(', B and D (for correlated subqueries. If tere are extra tables in te subquery except common tables, i.e. A 2! 3 is not empty, we ave to extend te base relation to te extended base relation, denoted by 7. Generally, te extended base relation is obtained by performing a left outer join of and A8! " on 12! 3. ote tat B 2! 3 can be pused down. Performing an outer join of and A 2! 3 migt cause tuples in 9$ duplicated if 12! 3 is not a lossless join. uc duplicates are required to compute te aggregation in te subquery, but will cause an error wen computing te final result. Te solution to tis problem is to use 7 to compute te aggregation in te subquery, and ten reduce 7 to to compute te outer query M P by performing : DEFGIH+H+JLK, were : denotes group-by, and denotes te primary key. Wit respect to te QL syntax, te grouping attributes migt include te primary key of as well as oter attributes required for later processing Te for-loop operator nce obtaining te (extended base relation (denoted by 9$ 7PR, were te square bracket denotes optional, te subsequent computations of te aggregation in te subquery and te linking predicate between te outer query and te subquery can be done efficiently by only one pass over te (extended base relation. In order to do so, we define a new operator, for-loop, wic combines several relational operators into a new one (i.e. a macro-operator. Tis approac is based on te observation tat some basic operations appear frequently togeter and tey could be more efficiently implemented as a wole, tus saving considerable disk I/. In te following, : is used to indicate a group-by operation, MX$P indicates te aggregation = computed and T:P:VU EW over all values of te attribute of te relation $. Definition 1 Let $ $P be a relation, ]\ $P L$4 Y Z6[ Y Z6[, _^`Y+Z+[ condition on $ (i.e. involving $Pdcfe only attributes g of Y Z6[ and b a condition on Y Z6[ te scema of $,, = an aggregate function, a a $P (i.e. possibly involving =. Ten te for-loop operator is defined in two variants: -i/a MA jka ll$p = U EW l. Te meaning of te operator is $on <?> ikp8i qi/a MX j L$P given by m U EW, were te condition of te join is understood as te pairwise equality of eac attribute in. Tis is called a grouped for-loop. = U l EW by m for-loop. t MA jka l/l$p T:P:PU EW. Te meaning of te operator is given M( j L$P*rs$P. Tis is called a flat Altoug algebraic expression is an important issue, it is not te only reason to define te for-loop operator. Tere are also significant implementation issues. To acieve te objective of computing several results at once wit a single pass over te data, te operator can be implemented as an iterator tat loops over te input implementing a simple program. Te basic idea is twofold: first, selections and groupings (eiter grouping alone or togeter wit aggregate calculations can be effectively implemented in one algoritm; second, and more important, in some cases computing an aggregation and using te aggregate result in a selection can be done at te same time. Tis is due to te beavior of some aggregates and te semantics of te conditions involved. For instance, a comparison of te type attr1 = min(attr2, were bot attr1 and attr2 are attributes of some can be efficiently implemented by a sequential pass Furtermore, wen a subquery is correlated, we use te grouped for-loop and aggregate
4 = g computation is done per group. Tat means tat results (and temporary results are only accumulated by group, and terefore all temporary information needed is likely to fit in memory and performance may be good even for cases were te condition is ard to compute. Te for-loop operator is similar to te egmentapply operator [3] and te window aggregation [9] in tat all of tese operators are used to do computation based on te common part between te outer query and te subquery. Bot te forloop operator and te egmentapply operator are extended relational operators wic ave to be implemented inside DBM. Te window aggregation is one of te analytic features defined as part of te AI QL 1999 standard and as been implemented in some commercial DBM. Tus, te query can be rewritten in QL wit te redundancy considered by using te window aggregation and te WITH clause wic declares te common part. Te tecnique described in section 3.1 can be used to compose te WITH clause. From te performance point of view, te for-loop operator may perform more efficient tan te oter two due to its efficient implementation for computing te linked aggregation, te linking predicate, and te final result, wic needs only one pass over te common part Evaluation plan Based on te (extended base relation and te for-loop operator, te execution plan for queries aving redundancy can be created by te following tree steps: 1. We create te (extended base relation Q 9$ 7PR. ote tat standard relational optimization tecniques can be applied to tis part. 2. For queries wit correlated subqueries, we apply a ia MA jka l/ Q 9$P grouped for-loop operator, = U EW 74R, to Q 74R. For queries wit non-correlated subqueries, MA ja l/ Q we P apply a flat for-loop operator,. According to te U E2W 74R, to Q 74R for-loop operator definition, is >??@ X (te attributes of te outer query in te correlated predicates; if te correlating attribute is not te primary key of A X2, sould be replaced by te primary key. = is =I2 ( >*??@6 6, a is B&56'12! 3, b is B&('/ >*??@+I X =I ( >??@+I2 (. 3. If A is empty, te final result can be obtained by projection on te desired attributes. If A= + is not empty, te final result can be obtained by performing a join of Q 74R and A + on followed by projection of te desired attributes Extensions We consider tree main extensions of te redundancy awareness metod to cover subqueries in te HAVIG clause, non-aggregate subqueries, and multi-level queries. ubqueries in te HAVIG clause. In QL, te HAVIG clause usually occurs after te GRUP BY clause. If te subquery is correlated, te correlating attributes must be te same as te attributes in te GRUP BY clause. Tus, te aggregation in te outer query and te aggregation in te subquery can be computed simultaneously. If te subquery is not correlated, te aggregation in te subquery is computed over a wole base relation. Te only ting tat is needed is to continue te computations, witout resetting, across groups. After eac group is computed, we can compare te result of te global aggregate so far to te new group, and proceed as in te regular case. on-aggregate subqueries. A non-aggregate subquery is linked to its outer query by one of te following operators: EXIT, T EXIT, I, T I, ME/AY, and ALL, were ^ e. uc queries can be rewritten as queries wit aggregate subqueries, in particular wit te UT aggregate. uc rewrites must be carefully specified for te ALL or T I subquery, toug, since approaces usually tougt to work fail in te presence of null values. Let te subquery be attr1 ALL (select attr2... Ten te query can be rewritten as (select count(attr2...=(select (count(attr2..., were te first subquery is exactly as it was in te original, and te second one is also te same as te original but as te predicate attr1 attr2 added to te WHERE clause (tis approac is basically equivalent to tat of [1]. Multi-level queries. Wen considering queries of arbitrary dept, we distinguis between linear queries (were tere is at most one subquery in any given level and tree queries (were in some level tere are two or more subqueries. It is easy to see tat te redundancy awareness metod can be extended to linear queries of any dept: te metod is applied from te bottom up, starting at te innermost subquery. nce tis step is done, one can proceed up te query until te outermost block. Tree queries can also be taken care of, but require some additional care. Assuming tat query block as two subqueries, and, we consider two cases: (1 If as some overlap wit and does not, can be processed by a traditional approac and can be processed wit te redundancy awareness metod. (2 If bot and
5 = U U ave overlap wit, we furter distinguis two cases: if and are bot correlated and ave te same correlating attribute wit, bot subqueries could be computed by a for-loop operator for furter efficiency. terwise, it is better to treat and separately, creating a subtree for-loop operator for eac one. For eac case, te for-loop operator needs to be extended to deal wit several aggregations simultaneously; eac one wit its own conditions. Te extended notation of te for-loop operator is: i A E EW MA j MA E ï 2A EW MA j MA > > > A l Q P 74R, were te square bracket denotes optional. Tis definition is very similar to te multidimensional join (MD operator defined in [1]. Unlike tat work, toug, te for-loop operator is aware of redundancy and works on te (extended base relation, wile te MD operator does not consider redundancy and ave to access common tables more tan once. Tus, te MD operator relies on furter optimization to recognize redundancy on its operation, wile we create and control suc redundancy. 4. Experiments To verify te efficiency of te redundancy awareness metod, we ave implemented it on top of a leading commercial DBM, wic we call ystem A. We created TP-H databases [2] at scale factors 1 and 1 (size of 1GB and 1GB respectively in ystem A. We run Query 1 and Query 2 on a buffer cace of size 32MB and 128M respectively. Te execution results are sown in figure 1 and figure 2. From tese two figures, we can see tat bot te redundancy awareness metod and Win [9] perform muc better tan magic decorrelation [6] by avoiding redundant computations. Furtermore, te redundancy awareness metod performs sligtly better tan Win. Detailed performance analysis and te results of oter test queries will be included in our full paper Win Metod (a 32M Win Metod Figure 1. Query (b 128M Metod (a 32M 5. onclusions Metod 1.5 Figure 2. Query (b 128M In tis paper, we propose te redundancy awareness metod to efficiently evaluate queries aving redundancy. Te results of our experiments sow tat our approac indeed outperforms traditional optimizations. Furtermore, our approac is potentially applicable to a wide range of queries. We are currently expanding our experiments to examine te impact of different amounts of redundancy. References [1] M.. Akinde and M. H. Bolen. Efficient computation of subqueries in complex olap. In Proceedings of te IDE onference, pages , 23. [2] T. P. P. ouncil. Te tpc- bencmark. ttp:// [3]. A. Galindo-Legaria and M. M. Josi. rtogonal optimization of subqueries and aggregation. In Proceedings of te AM IGMD onference, pages , 21. [4] J. Goldstein and P.-A. Larson. ptimizing queries using materialized views: a practical, scalable solution. In Proceedings of te IGMD onference, pages , 21. [5] J. Rao and K. A. Ross. Reusing invariants: a new strategy for correlated queries. In Proceedings of te AM IGMD onference, pages 37 48, [6] P. esadri, H. Piraes, and T. Y.. Leung. omplex query decorrelation. In Proceedings of te IDE onference, pages , [7] M. Zaarioudakis, R. ocrane, G. Lapis, H. Piraes, and M. Urata. Answering complex sql queries using automatic summary tables. In Proceedings of te IGMD onference, pages , 2. [8] Q. Zu, Y. Tao, and. Zuzarte. ptimizing complex queries based on similarities of subqueries. Information ystems, 8(3:35 373, 25. [9]. Zuzarte, H. Piraes, W. Ma, Q. eng, L. Liu, and K. Wong. Winmagic: ubquery elimination using window aggregation. In Proceedings of te AM IGMD onference, pages ,
Section 2.3: Calculating Limits using the Limit Laws
Section 2.3: Calculating Limits using te Limit Laws In previous sections, we used graps and numerics to approimate te value of a it if it eists. Te problem wit tis owever is tat it does not always give
More information4.1 Tangent Lines. y 2 y 1 = y 2 y 1
41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange
More information, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result
RT. Complex Fractions Wen working wit algebraic expressions, sometimes we come across needing to simplify expressions like tese: xx 9 xx +, xx + xx + xx, yy xx + xx + +, aa Simplifying Complex Fractions
More informationHaar Transform CS 430 Denbigh Starkey
Haar Transform CS Denbig Starkey. Background. Computing te transform. Restoring te original image from te transform 7. Producing te transform matrix 8 5. Using Haar for lossless compression 6. Using Haar
More informationMATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2
MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 Note: Tere will be a very sort online reading quiz (WebWork) on eac reading assignment due one our before class on its due date. Due dates can be found
More information2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically
2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use
More informationMinimizing Memory Access By Improving Register Usage Through High-level Transformations
Minimizing Memory Access By Improving Register Usage Troug Hig-level Transformations San Li Scool of Computer Engineering anyang Tecnological University anyang Avenue, SIGAPORE 639798 Email: p144102711@ntu.edu.sg
More informationMore on Functions and Their Graphs
More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in
More information2.8 The derivative as a function
CHAPTER 2. LIMITS 56 2.8 Te derivative as a function Definition. Te derivative of f(x) istefunction f (x) defined as follows f f(x + ) f(x) (x). 0 Note: tis differs from te definition in section 2.7 in
More informationHash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring
Has-Based Indexes Capter 11 Comp 521 Files and Databases Spring 2010 1 Introduction As for any index, 3 alternatives for data entries k*: Data record wit key value k
More informationBounding Tree Cover Number and Positive Semidefinite Zero Forcing Number
Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various
More informationNotes: Dimensional Analysis / Conversions
Wat is a unit system? A unit system is a metod of taking a measurement. Simple as tat. We ave units for distance, time, temperature, pressure, energy, mass, and many more. Wy is it important to ave a standard?
More informationHash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall
Has-Based Indexes Capter 11 Comp 521 Files and Databases Fall 2012 1 Introduction Hasing maps a searc key directly to te pid of te containing page/page-overflow cain Doesn t require intermediate page fetces
More information1.4 RATIONAL EXPRESSIONS
6 CHAPTER Fundamentals.4 RATIONAL EXPRESSIONS Te Domain of an Algebraic Epression Simplifying Rational Epressions Multiplying and Dividing Rational Epressions Adding and Subtracting Rational Epressions
More information4.2 The Derivative. f(x + h) f(x) lim
4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially
More informationOur Calibrated Model has No Predictive Value: An Example from the Petroleum Industry
Our Calibrated Model as No Predictive Value: An Example from te Petroleum Industry J.N. Carter a, P.J. Ballester a, Z. Tavassoli a and P.R. King a a Department of Eart Sciences and Engineering, Imperial
More informationDensity Estimation Over Data Stream
Density Estimation Over Data Stream Aoying Zou Dept. of Computer Science, Fudan University 22 Handan Rd. Sangai, 2433, P.R. Cina ayzou@fudan.edu.cn Ziyuan Cai Dept. of Computer Science, Fudan University
More information12.2 TECHNIQUES FOR EVALUATING LIMITS
Section Tecniques for Evaluating Limits 86 TECHNIQUES FOR EVALUATING LIMITS Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing tecnique to evaluate its of
More information3.6 Directional Derivatives and the Gradient Vector
288 CHAPTER 3. FUNCTIONS OF SEVERAL VARIABLES 3.6 Directional Derivatives and te Gradient Vector 3.6.1 Functions of two Variables Directional Derivatives Let us first quickly review, one more time, te
More informationMulti-Stack Boundary Labeling Problems
Multi-Stack Boundary Labeling Problems Micael A. Bekos 1, Micael Kaufmann 2, Katerina Potika 1 Antonios Symvonis 1 1 National Tecnical University of Atens, Scool of Applied Matematical & Pysical Sciences,
More informationCS 234. Module 6. October 16, CS 234 Module 6 ADT Dictionary 1 / 33
CS 234 Module 6 October 16, 2018 CS 234 Module 6 ADT Dictionary 1 / 33 Idea for an ADT Te ADT Dictionary stores pairs (key, element), were keys are distinct and elements can be any data. Notes: Tis is
More informationTwo Modifications of Weight Calculation of the Non-Local Means Denoising Method
Engineering, 2013, 5, 522-526 ttp://dx.doi.org/10.4236/eng.2013.510b107 Publised Online October 2013 (ttp://www.scirp.org/journal/eng) Two Modifications of Weigt Calculation of te Non-Local Means Denoising
More information15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes
15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes William Lovas (wlovas@cs) Karl Naden Out: Tuesday, Friday, June 10, 2011 Due: Monday, June 13, 2011 (Written
More informationMAP MOSAICKING WITH DISSIMILAR PROJECTIONS, SPATIAL RESOLUTIONS, DATA TYPES AND NUMBER OF BANDS 1. INTRODUCTION
MP MOSICKING WITH DISSIMILR PROJECTIONS, SPTIL RESOLUTIONS, DT TYPES ND NUMBER OF BNDS Tyler J. lumbaug and Peter Bajcsy National Center for Supercomputing pplications 605 East Springfield venue, Campaign,
More informationOptimal In-Network Packet Aggregation Policy for Maximum Information Freshness
1 Optimal In-etwork Packet Aggregation Policy for Maimum Information Fresness Alper Sinan Akyurek, Tajana Simunic Rosing Electrical and Computer Engineering, University of California, San Diego aakyurek@ucsd.edu,
More informationInvestigating an automated method for the sensitivity analysis of functions
Investigating an automated metod for te sensitivity analysis of functions Sibel EKER s.eker@student.tudelft.nl Jill SLINGER j..slinger@tudelft.nl Delft University of Tecnology 2628 BX, Delft, te Neterlands
More informationOn the Use of Radio Resource Tests in Wireless ad hoc Networks
Tecnical Report RT/29/2009 On te Use of Radio Resource Tests in Wireless ad oc Networks Diogo Mónica diogo.monica@gsd.inesc-id.pt João Leitão jleitao@gsd.inesc-id.pt Luis Rodrigues ler@ist.utl.pt Carlos
More informationSymmetric Tree Replication Protocol for Efficient Distributed Storage System*
ymmetric Tree Replication Protocol for Efficient Distributed torage ystem* ung Cune Coi 1, Hee Yong Youn 1, and Joong up Coi 2 1 cool of Information and Communications Engineering ungkyunkwan University
More informationExperimental Studies on SMT-based Debugging
Experimental Studies on SMT-based Debugging Andre Sülflow Görscwin Fey Rolf Drecsler Institute of Computer Science University of Bremen 28359 Bremen, Germany {suelflow,fey,drecsle}@informatik.uni-bremen.de
More informationCoarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes
Coarticulation: An Approac for Generating Concurrent Plans in Markov Decision Processes Kasayar Roanimanes kas@cs.umass.edu Sridar Maadevan maadeva@cs.umass.edu Department of Computer Science, University
More informationFast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation
P R E P R N T CPWS XV Berlin, September 8, 008 Fast Calculation of Termodynamic Properties of Water and Steam in Process Modelling using Spline nterpolation Mattias Kunick a, Hans-Joacim Kretzscmar a,
More informationAn Algorithm for Loopless Deflection in Photonic Packet-Switched Networks
An Algoritm for Loopless Deflection in Potonic Packet-Switced Networks Jason P. Jue Center for Advanced Telecommunications Systems and Services Te University of Texas at Dallas Ricardson, TX 75083-0688
More informationThe Euler and trapezoidal stencils to solve d d x y x = f x, y x
restart; Te Euler and trapezoidal stencils to solve d d x y x = y x Te purpose of tis workseet is to derive te tree simplest numerical stencils to solve te first order d equation y x d x = y x, and study
More informationNumerical Derivatives
Lab 15 Numerical Derivatives Lab Objective: Understand and implement finite difference approximations of te derivative in single and multiple dimensions. Evaluate te accuracy of tese approximations. Ten
More informationData Structures and Programming Spring 2014, Midterm Exam.
Data Structures and Programming Spring 2014, Midterm Exam. 1. (10 pts) Order te following functions 2.2 n, log(n 10 ), 2 2012, 25n log(n), 1.1 n, 2n 5.5, 4 log(n), 2 10, n 1.02, 5n 5, 76n, 8n 5 + 5n 2
More informationCESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm
Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer
More informationFighting Redundancy in SQL
Fighting Redundancy in SQL Antonio Badia and Dev Anand Computer Engineering and Computer Science department University of Louisville, Louisville KY 40292 Abstract. Many SQL queries with aggregated subqueries
More information2.5 Evaluating Limits Algebraically
SECTION.5 Evaluating Limits Algebraically 3.5 Evaluating Limits Algebraically Preinary Questions. Wic of te following is indeterminate at x? x C x ; x x C ; x x C 3 ; x C x C 3 At x, x isofteform 0 xc3
More informationTuning MAX MIN Ant System with off-line and on-line methods
Université Libre de Bruxelles Institut de Recerces Interdisciplinaires et de Développements en Intelligence Artificielle Tuning MAX MIN Ant System wit off-line and on-line metods Paola Pellegrini, Tomas
More informationAnnouncements SORTING. Prelim 1. Announcements. A3 Comments 9/26/17. This semester s event is on Saturday, November 4 Apply to be a teacher!
Announcements 2 "Organizing is wat you do efore you do someting, so tat wen you do it, it is not all mixed up." ~ A. A. Milne SORTING Lecture 11 CS2110 Fall 2017 is a program wit a teac anyting, learn
More informationANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS
NTNN SPHRICL COORDINT SSTMS ND THIR PPLICTION IN COMBINING RSULTS FROM DIFFRNT NTNN ORINTTIONS llen C. Newell, Greg Hindman Nearfield Systems Incorporated 133. 223 rd St. Bldg. 524 Carson, C 9745 US BSTRCT
More informationCE 221 Data Structures and Algorithms
CE Data Structures and Algoritms Capter 4: Trees (AVL Trees) Text: Read Weiss, 4.4 Izmir University of Economics AVL Trees An AVL (Adelson-Velskii and Landis) tree is a binary searc tree wit a balance
More informationMAC-CPTM Situations Project
raft o not use witout permission -P ituations Project ituation 20: rea of Plane Figures Prompt teacer in a geometry class introduces formulas for te areas of parallelograms, trapezoids, and romi. e removes
More informationIntra- and Inter-Session Network Coding in Wireless Networks
Intra- and Inter-Session Network Coding in Wireless Networks Hulya Seferoglu, Member, IEEE, Atina Markopoulou, Member, IEEE, K K Ramakrisnan, Fellow, IEEE arxiv:857v [csni] 3 Feb Abstract In tis paper,
More informationMaterials: Whiteboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector.
Adam Clinc Lesson: Deriving te Derivative Grade Level: 12 t grade, Calculus I class Materials: Witeboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector. Goals/Objectives:
More information12.2 Techniques for Evaluating Limits
335_qd /4/5 :5 PM Page 863 Section Tecniques for Evaluating Limits 863 Tecniques for Evaluating Limits Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing
More informationParallel Simulation of Equation-Based Models on CUDA-Enabled GPUs
Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs Per Ostlund Department of Computer and Information Science Linkoping University SE-58183 Linkoping, Sweden per.ostlund@liu.se Kristian
More informationA Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science
A Cost Model for Distributed Sared Memory Using Competitive Update Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, Texas, 77843-3112, USA E-mail: fjkim,vaidyag@cs.tamu.edu
More informationHW 2 Bench Table. Hash Indexes: Chap. 11. Table Bench is in tablespace setq. Loading table bench. Then a bulk load
Has Indexes: Cap. CS64 Lecture 6 HW Benc Table Table of M rows, Columns of different cardinalities CREATE TABLE BENCH ( KSEQ integer primary key, K5K integer not null, K5K integer not null, KK integer
More informationCommunicator for Mac Quick Start Guide
Communicator for Mac Quick Start Guide 503-968-8908 sterling.net training@sterling.net Pone Support 503.968.8908, option 2 pone-support@sterling.net For te most effective support, please provide your main
More informationLinear Interpolating Splines
Jim Lambers MAT 772 Fall Semester 2010-11 Lecture 17 Notes Tese notes correspond to Sections 112, 11, and 114 in te text Linear Interpolating Splines We ave seen tat ig-degree polynomial interpolation
More informationMulti-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art
Multi-Objective Particle Swarm Optimizers: A Survey of te State-of-te-Art Margarita Reyes-Sierra and Carlos A. Coello Coello CINVESTAV-IPN (Evolutionary Computation Group) Electrical Engineering Department,
More informationSoftware Fault Prediction using Machine Learning Algorithm Pooja Garg 1 Mr. Bhushan Dua 2
IJSRD - International Journal for Scientific Researc & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Software Fault Prediction using Macine Learning Algoritm Pooja Garg 1 Mr. Busan Dua 2
More informationTHANK YOU FOR YOUR PURCHASE!
THANK YOU FOR YOUR PURCHASE! Te resources included in tis purcase were designed and created by me. I ope tat you find tis resource elpful in your classroom. Please feel free to contact me wit any questions
More informationAsynchronous Power Flow on Graphic Processing Units
1 Asyncronous Power Flow on Grapic Processing Units Manuel Marin, Student Member, IEEE, David Defour, and Federico Milano, Senior Member, IEEE Abstract Asyncronous iterations can be used to implement fixed-point
More informationFeature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes
Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganograpic Scemes Jessica Fridric Dept. of Electrical Engineering, SUNY Bingamton, Bingamton, NY 3902-6000, USA fridric@bingamton.edu
More informationNetwork Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks
Downloaded from vbn.aau.dk on: April 7, 09 Aalborg Universitet etwork Coding to Enance Standard Routing Protocols in Wireless Mes etworks Palevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank;
More informationTilings of rectangles with T-tetrominoes
Tilings of rectangles wit T-tetrominoes Micael Korn and Igor Pak Department of Matematics Massacusetts Institute of Tecnology Cambridge, MA, 2139 mikekorn@mit.edu, pak@mat.mit.edu August 26, 23 Abstract
More informationTREES. General Binary Trees The Search Tree ADT Binary Search Trees AVL Trees Threaded trees Splay Trees B-Trees. UNIT -II
UNIT -II TREES General Binary Trees Te Searc Tree DT Binary Searc Trees VL Trees Treaded trees Splay Trees B-Trees. 2MRKS Q& 1. Define Tree tree is a data structure, wic represents ierarcical relationsip
More informationAn experimental framework to investigate context-aware schemes for content delivery
An experimental framework to investigate context-aware scemes for content delivery Pietro Lungaro +, Cristobal Viedma +, Zary Segall + and Pavan Kumar + Mobile Service Lab, Royal Institute of Tecnology
More informationIntegrating Multimedia Applications in Hard Real-Time Systems
Integrating Multimedia Applications in Hard Real-Time Systems Luca Abeni and Giorgio Buttazzo Scuola Superiore S. Anna, Pisa luca@arti.sssup.it, giorgio@sssup.it Abstract Tis paper focuses on te problem
More informationNOTES: A quick overview of 2-D geometry
NOTES: A quick overview of 2-D geometry Wat is 2-D geometry? Also called plane geometry, it s te geometry tat deals wit two dimensional sapes flat tings tat ave lengt and widt, suc as a piece of paper.
More informationMeasuring Length 11and Area
Measuring Lengt 11and Area 11.1 Areas of Triangles and Parallelograms 11.2 Areas of Trapezoids, Romuses, and Kites 11.3 Perimeter and Area of Similar Figures 11.4 Circumference and Arc Lengt 11.5 Areas
More informationWhen a BST becomes badly unbalanced, the search behavior can degenerate to that of a sorted linked list, O(N).
Balanced Binary Trees Binary searc trees provide O(log N) searc times provided tat te nodes are distributed in a reasonably balanced manner. Unfortunately, tat is not always te case and performing a sequence
More informationAn Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks
Tis paper was presented as part of te main tecnical program at IEEE INFOCOM 20 An Analytical Approac to Real-Time Misbeavior Detection in IEEE 802. Based Wireless Networks Jin Tang, Yu Ceng Electrical
More information6 Computing Derivatives the Quick and Easy Way
Jay Daigle Occiental College Mat 4: Calculus Experience 6 Computing Derivatives te Quick an Easy Way In te previous section we talke about wat te erivative is, an we compute several examples, an ten we
More informationAn Anchor Chain Scheme for IP Mobility Management
An Ancor Cain Sceme for IP Mobility Management Yigal Bejerano and Israel Cidon Department of Electrical Engineering Tecnion - Israel Institute of Tecnology Haifa 32000, Israel E-mail: bej@tx.tecnion.ac.il.
More informationComparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method
International Journal of Statistics and Applications 0, (): -0 DOI: 0.9/j.statistics.000.0 Comparison of te Efficiency of te Various Algoritms in Stratified Sampling wen te Initial Solutions are Determined
More informationRECONSTRUCTING OF A GIVEN PIXEL S THREE- DIMENSIONAL COORDINATES GIVEN BY A PERSPECTIVE DIGITAL AERIAL PHOTOS BY APPLYING DIGITAL TERRAIN MODEL
IV. Évfolyam 3. szám - 2009. szeptember Horvát Zoltán orvat.zoltan@zmne.u REONSTRUTING OF GIVEN PIXEL S THREE- DIMENSIONL OORDINTES GIVEN Y PERSPETIVE DIGITL ERIL PHOTOS Y PPLYING DIGITL TERRIN MODEL bsztrakt/bstract
More informationPYRAMID FILTERS BASED ON BILINEAR INTERPOLATION
PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION Martin Kraus Computer Grapics and Visualization Group, Tecnisce Universität Müncen, Germany krausma@in.tum.de Magnus Strengert Visualization and Interactive
More informationHigher-Order Symbolic Execution via Contracts
Higer-Order Symbolic Execution via Contracts Sam Tobin-Hocstadt David Van Horn Norteastern University {samt,dvanorn}@ccs.neu.edu Abstract We present a new approac to automated reasoning about iger-order
More informationAlternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method
Te Open Plasma Pysics Journal, 2010, 3, 29-35 29 Open Access Alternating Direction Implicit Metods for FDTD Using te Dey-Mittra Embedded Boundary Metod T.M. Austin *, J.R. Cary, D.N. Smite C. Nieter Tec-X
More informationCS211 Spring 2004 Lecture 06 Loops and their invariants. Software engineering reason for using loop invariants
CS211 Spring 2004 Lecture 06 Loops and teir invariants Reading material: Tese notes. Weiss: Noting on invariants. ProgramLive: Capter 7 and 8 O! Tou ast damnale iteration and art, indeed, ale to corrupt
More informationeach node in the tree, the difference in height of its two subtrees is at the most p. AVL tree is a BST that is height-balanced-1-tree.
Data Structures CSC212 1 AVL Trees A binary tree is a eigt-balanced-p-tree if for eac node in te tree, te difference in eigt of its two subtrees is at te most p. AVL tree is a BST tat is eigt-balanced-tree.
More informationFault Localization Using Tarantula
Class 20 Fault localization (cont d) Test-data generation Exam review: Nov 3, after class to :30 Responsible for all material up troug Nov 3 (troug test-data generation) Send questions beforeand so all
More informationTraffic Sign Classification Using Ring Partitioned Method
Traffic Sign Classification Using Ring Partitioned Metod Aryuanto Soetedjo and Koici Yamada Laboratory for Management and Information Systems Science, Nagaoa University of Tecnology 603- Kamitomioamaci,
More informationMaster the Audit of Information Security Management Systems (ISMS) based on ISO/IEC 27001
Lead Auditor Master te Audit of Systems (ISMS) based on Wy sould you attend? Lead Auditor training enables you to develop te necessary expertise to perform an System (ISMS) audit by applying widely recognized
More informationA Statistical Approach for Target Counting in Sensor-Based Surveillance Systems
Proceedings IEEE INFOCOM A Statistical Approac for Target Counting in Sensor-Based Surveillance Systems Dengyuan Wu, Decang Cen,aiXing, Xiuzen Ceng Department of Computer Science, Te George Wasington University,
More informationApplication of a Key Value Paradigm to Logic Factoring
INVITED PAPER Application of a Key Value Paradigm to Logic Factoring Te autor first revisits a classic algoritm for algebraic factoring to establis a stronger connection to te functional intent rater tan
More informationGeorge Xylomenos and George C. Polyzos. with existing protocols and their eæciency in terms of
IP MULTICASTING FOR WIRELESS MOBILE OSTS George Xylomenos and George C. Polyzos fxgeorge,polyzosg@cs.ucsd.edu Computer Systems Laboratory Department of Computer Science and Engineering University of California,
More informationPLK-B SERIES Technical Manual (USA Version) CLICK HERE FOR CONTENTS
PLK-B SERIES Technical Manual (USA Version) CLICK ERE FOR CONTENTS CONTROL BOX PANEL MOST COMMONLY USED FUNCTIONS INITIAL READING OF SYSTEM SOFTWARE/PAGES 1-2 RE-INSTALLATION OF TE SYSTEM SOFTWARE/PAGES
More informationEfficient Content-Based Indexing of Large Image Databases
Efficient Content-Based Indexing of Large Image Databases ESSAM A. EL-KWAE University of Nort Carolina at Carlotte and MANSUR R. KABUKA University of Miami Large image databases ave emerged in various
More informationExtended Synchronization Signals for Eliminating PCI Confusion in Heterogeneous LTE
1 Extended Syncronization Signals for Eliminating PCI Confusion in Heterogeneous LTE Amed H. Zaran Department of Electronics and Electrical Communications Cairo University Egypt. azaran@eecu.cu.edu.eg
More informationDistributed and Optimal Rate Allocation in Application-Layer Multicast
Distributed and Optimal Rate Allocation in Application-Layer Multicast Jinyao Yan, Martin May, Bernard Plattner, Wolfgang Mülbauer Computer Engineering and Networks Laboratory, ETH Zuric, CH-8092, Switzerland
More informationA UPnP-based Decentralized Service Discovery Improved Algorithm
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol.1, No.1, Marc 2013, pp. 21~26 ISSN: 2089-3272 21 A UPnP-based Decentralized Service Discovery Improved Algoritm Yu Si-cai*, Wu Yan-zi,
More informationAn Iterative Approach to the Hand-Eye and Base-World Calibration Problem
Proceedings of te 2001 IEEE International Conference on Robotics & Automation Seoul, Korea. May 21-26, 2001 An Iterative Approac to te Hand-Eye and Base-World Calibration Problem Robert Lee Hirs Guilerme
More informationArrays in a Lazy Functional Language a case study: the Fast Fourier Transform
Arrays in a Lazy Functional Language a case study: te Fast Fourier Transform Pieter H. Hartel and Willem G. Vree Department of Computer Systems University of Amsterdam Kruislaan 403, 1098 SJ Amsterdam,
More informationImage Registration via Particle Movement
Image Registration via Particle Movement Zao Yi and Justin Wan Abstract Toug fluid model offers a good approac to nonrigid registration wit large deformations, it suffers from te blurring artifacts introduced
More informationLimits and Continuity
CHAPTER Limits and Continuit. Rates of Cange and Limits. Limits Involving Infinit.3 Continuit.4 Rates of Cange and Tangent Lines An Economic Injur Level (EIL) is a measurement of te fewest number of insect
More informationSORTING 9/26/18. Prelim 1. Prelim 1. Why Sorting? InsertionSort. Some Sorting Algorithms. Tonight!!!! Two Sessions:
Prelim 1 2 "Organizing is wat you do efore you do someting, so tat wen you do it, it is not all mixed up." ~ A. A. Milne SORTING Tonigt!!!! Two Sessions: You sould now y now wat room to tae te final. Jenna
More informationAnnouncements. Lilian s office hours rescheduled: Fri 2-4pm HW2 out tomorrow, due Thursday, 7/7. CSE373: Data Structures & Algorithms
Announcements Lilian s office ours resceduled: Fri 2-4pm HW2 out tomorrow, due Tursday, 7/7 CSE373: Data Structures & Algoritms Deletion in BST 2 5 5 2 9 20 7 0 7 30 Wy migt deletion be arder tan insertion?
More information19.2 Surface Area of Prisms and Cylinders
Name Class Date 19 Surface Area of Prisms and Cylinders Essential Question: How can you find te surface area of a prism or cylinder? Resource Locker Explore Developing a Surface Area Formula Surface area
More informationFighting Redundancy in SQL: the For-Loop Approach
Fighting Redundancy in SQL: the For-Loop Approach Antonio Badia and Dev Anand Computer Engineering and Computer Science department University of Louisville, Louisville KY 40292 July 8, 2004 1 Introduction
More informationSLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS. Hewlett-Packard Company East Mission Avenue. Bogazici University
SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS Sanuj V. Sarin 1, Hakan Delic 2 and Jung H. Kim 3 1 Hewlett-Packard Company 24001 East Mission Avenue Spokane, Wasington 99109, USA 2 Signal
More informationAnalytical CHEMISTRY
ISSN : 974-749 Grap kernels and applications in protein classification Jiang Qiangrong*, Xiong Zikang, Zai Can Department of Computer Science, Beijing University of Tecnology, Beijing, (CHINA) E-mail:
More informationM2TECH HIFACE DAC 384KHZ/32BIT DIGITAL-TO-ANALOG CONVERTER USER MANUAL
M2TECH HIFACE DAC 384KHZ/32BIT DIGITAL-TO-ANALOG CONVERTER USER MANUAL REV. 1.1 5/2013 Warning! Canges or modifications not autorized by te manufacturer can invalidate te compliance to CE regulations and
More informationA Bidirectional Subsethood Based Similarity Measure for Fuzzy Sets
A Bidirectional Subsetood Based Similarity Measure for Fuzzy Sets Saily Kabir Cristian Wagner Timoty C. Havens and Derek T. Anderson Intelligent Modelling and Analysis (IMA) Group and Lab for Uncertainty
More informationDesign of PSO-based Fuzzy Classification Systems
Tamkang Journal of Science and Engineering, Vol. 9, No 1, pp. 6370 (006) 63 Design of PSO-based Fuzzy Classification Systems Cia-Cong Cen Department of Electronics Engineering, Wufeng Institute of Tecnology,
More informationMTH-112 Quiz 1 - Solutions
MTH- Quiz - Solutions Words in italics are for eplanation purposes onl (not necessar to write in te tests or. Determine weter te given relation is a function. Give te domain and range of te relation. {(,
More information1 Finding Trigonometric Derivatives
MTH 121 Fall 2008 Essex County College Division of Matematics Hanout Version 8 1 October 2, 2008 1 Fining Trigonometric Derivatives 1.1 Te Derivative as a Function Te efinition of te erivative as a function
More information