Search results for "ARCHITECTURE"

showing 10 items of 3706 documents

Computing the Probability for Data Loss in Two-Dimensional Parity RAIDs

2017

Parity RAIDs are used to protect storage systems against disk failures. The idea is to add redundancy to the system by storing the parity of subsets of disks on extra parity disks. A simple two-dimensional scheme is the one in which the data disks are arranged in a rectangular grid, and every row and column is extended by one disk which stores the parity of it.In this paper we describe several two-dimensional parity RAIDs and analyse, for each of them, the probability for dataloss given that f random disks fail. This probability can be used to determine the overall probability using the model of Hafner and Rao. We reduce subsets of the forest counting problem to the different cases and show…

Discrete mathematicsHardware_MEMORYSTRUCTURESRAIDComputer science020206 networking & telecommunications02 engineering and technologyData lossGridElectronic mail020202 computer hardware & architecturelaw.inventionExact algorithmCounting problemlawData_FILES0202 electrical engineering electronic engineering information engineeringTutte polynomialParity (mathematics)2017 13th European Dependable Computing Conference (EDCC)
researchProduct

Balls into non-uniform bins

2014

Balls-into-bins games for uniform bins are widely used to model randomized load balancing strategies. Recently, balls-into-bins games have been analysed under the assumption that the selection probabilities for bins are not uniformly distributed. These new models are motivated by properties of many peer-to-peer (P2P) networks, which are not able to perfectly balance the load over the bins. While previous evaluations try to find strategies for uniform bins under non-uniform bin selection probabilities, this paper investigates heterogeneous bins, where the "capacities" of the bins might differ significantly. We show that heterogeneous environments can even help to distribute the load more eve…

Discrete mathematicsMathematical optimizationComputational complexity theoryComputer Networks and CommunicationsComputer scienceDistributed computingAstrophysics::Cosmology and Extragalactic AstrophysicsPhysics::Data Analysis; Statistics and ProbabilityLoad balancing (computing)BinTheoretical Computer ScienceLoad managementCapacity planningArtificial IntelligenceHardware and ArchitectureTheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITYBounded functionBall (bearing)Resource allocationHardware_ARITHMETICANDLOGICSTRUCTURESGame theorySoftwareMathematicsMathematicsofComputing_DISCRETEMATHEMATICS2010 IEEE International Symposium on Parallel & Distributed Processing (IPDPS)
researchProduct

A loopless algorithm for generating the permutations of a multiset

2003

AbstractMany combinatorial structures can be constructed from simpler components. For example, a permutation can be constructed from cycles, or a Motzkin word from a Dyck word and a combination. In this paper we present a constructor for combinatorial structures, called shuffle on trajectories (defined previously in a non-combinatorial context), and we show how this constructor enables us to obtain a new loopless generating algorithm for multiset permutations from similar results for simpler objects.

Discrete mathematicsMultisetMathematics::CombinatoricsGeneral Computer ScienceMultiset permutationsLoopless algorithmStructure (category theory)Context (language use)Gray codesTheoretical Computer ScienceCombinatoricsGray codePermutationLoopless generating algorithmsShuffle combinatorial objectsBinomial coefficientWord (computer architecture)Computer Science::Formal Languages and Automata TheoryMathematicsMathematicsofComputing_DISCRETEMATHEMATICSComputer Science(all)Theoretical Computer Science
researchProduct

Burrows-Wheeler transform and Run-Length Enconding

2017

In this paper we study the clustering effect of the Burrows-Wheeler Transform (BWT) from a combinatorial viewpoint. In particular, given a word w we define the BWT-clustering ratio of w as the ratio between the number of clusters produced by BWT and the number of the clusters of w. The number of clusters of a word is measured by its Run-Length Encoding. We show that the BWT-clustering ratio ranges in ]0, 2]. Moreover, given a rational number \(r\,\in \,]0,2]\), it is possible to find infinitely many words having BWT-clustering ratio equal to r. Finally, we show how the words can be classified according to their BWT-clustering ratio. The behavior of such a parameter is studied for very well-…

Discrete mathematicsRational numberBurrows–Wheeler transformComputer scienceComputer Science (all)0102 computer and information sciences02 engineering and technologyBurrows-Wheeler transform01 natural sciencesBurrows-Wheeler transform; Clustering effect; Run-length encoding; Theoretical Computer Science; Computer Science (all)Theoretical Computer ScienceClustering effect010201 computation theory & mathematicsRun-length encoding0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingCluster analysisWord (computer architecture)Run-length encoding
researchProduct

Randomized renaming in shared memory systems.

2021

Abstract Renaming is a task in distributed computing where n processes are assigned new names from a name space of size m . The problem is called tight if m = n , and loose if m > n . In recent years renaming came to the fore again and new algorithms were developed. For tight renaming in asynchronous shared memory systems, Alistarh et al. describe a construction based on the AKS network that assigns all names within O ( log n ) steps per process. They also show that, depending on the size of the name space, loose renaming can be done considerably faster. For m = ( 1 + ϵ ) ⋅ n and constant ϵ , they achieve a step complexity of O ( log log n ) . In this paper we consider tight as well as loos…

Discrete mathematicsShared memory modelSpeedupComputer Networks and CommunicationsComputer science020206 networking & telecommunications02 engineering and technologyParallel computingTheoretical Computer ScienceRandomized algorithmTask (computing)Constant (computer programming)Shared memoryArtificial IntelligenceHardware and ArchitectureAsynchronous communicationDistributed algorithm0202 electrical engineering electronic engineering information engineeringOverhead (computing)020201 artificial intelligence & image processingSoftware
researchProduct

Online Scheduling of Task Graphs on Heterogeneous Platforms

2020

Modern computing platforms commonly include accelerators. We target the problem of scheduling applications modeled as task graphs on hybrid platforms made of two types of resources, such as CPUs and GPUs. We consider that task graphs are uncovered dynamically, and that the scheduler has information only on the available tasks, i.e., tasks whose predecessors have all been completed. Each task can be processed by either a CPU or a GPU, and the corresponding processing times are known. Our study extends a previous $4\sqrt{m/k}$ 4 m / k -competitive online algorithm by Amaris et al. [1] , where $m$ m is the number of CPUs and $k$ k the number of GPUs ( $m\geq k$ m ≥ k ). We prove that no online…

Discrete mathematics[INFO.INFO-CC]Computer Science [cs]/Computational Complexity [cs.CC]020203 distributed computingScheduleCompetitive analysisComputer scienceHeuristicSchedulingOnline algorithmsProcessor schedulingSymmetric multiprocessor system02 engineering and technologyUpper and lower boundsGraphScheduling (computing)Computational Theory and MathematicsHardware and ArchitectureSignal Processing0202 electrical engineering electronic engineering information engineeringTask analysisTask graphsHeterogeneous computingOnline algorithm[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]
researchProduct

172 REAL TIME EDGES DETECTION USING WAVELET TRANSFORM

2000

One of the way to extract edges uses the fast wavelet transform algorithm. This technique allows the detection of multiscale edges and is used to detect all the details, which are in a picture by modifying the scale. The real time application for edge detection involves the implementation of the algorithm on an integrated circuit like a FPGA and the development of an appropriated board. This article deals about the implementation of a wavelet transform algorithm onto a FPGA and development of an electronic board to detect multiscale edges.

Discrete wavelet transformbusiness.industryComputer scienceSecond-generation wavelet transformStationary wavelet transformWavelet transformWavelet packet decompositionComputer Science::Hardware ArchitectureWaveletComputer visionArtificial intelligenceHarmonic wavelet transformFast wavelet transformbusinessJournal of the Visualization Society of Japan
researchProduct

ADI schemes for valuing European options under the Bates model

2018

Abstract This paper is concerned with the adaptation of alternating direction implicit (ADI) time discretization schemes for the numerical solution of partial integro-differential equations (PIDEs) with application to the Bates model in finance. Three different adaptations are formulated and their (von Neumann) stability is analyzed. Ample numerical experiments are provided for the Bates PIDE, illustrating the actual stability and convergence behaviour of the three adaptations.

DiscretizationStability (learning theory)bates modelBATES010103 numerical & computational mathematicsalternating direction implicit schemes01 natural sciencessymbols.namesakeConvergence (routing)FOS: MathematicsApplied mathematicsMathematics - Numerical Analysis0101 mathematicsAdaptation (computer science)Mathematicsta113Numerical Analysispartial integro-differential equationsApplied MathematicsNumerical Analysis (math.NA)stability010101 applied mathematicsComputational MathematicsAlternating direction implicit methodsymbolsoperator splitting methodsMathematicsVon Neumann architectureApplied Numerical Mathematics
researchProduct

A Metric for Automatic Word categorization

2008

This paper presents a metric to be used by the working prototype WIH (Web Intelligent Handler). This metric (referred here as po) is designed to reflect main topic words and discriminate certain text profiles through word weightings. The actual version is designed only for Spanish web texts. Statistical analyses show that it is possible to differentiate text profiles upon po behavior. A poll is presented also, showing that it is a good main words discriminator. This paper is posted here as a new algorithm useful for Spanish text processing.

DiscriminatorComputer sciencebusiness.industryPart of speechcomputer.software_genreText processingCategorizationStatistical analysesMetric (mathematics)Artificial intelligenceComputational linguisticsbusinesscomputerWord (computer architecture)Natural language processing
researchProduct

A Probabilistic Approach to the Count-To-Infinity Problem in Distance-Vector Routing Algorithms

2013

Count-to-infinity problem is characteristic for routing algorithms based on the distributed implementation of the classical Bellman-Ford algorithm. In this paper a probabilistic solution to this problem is proposed. It is argued that by the use of a Bloom Filter added to the routing message the routing loops will with high probability not form. An experimental analysis of this solution for use in Wireless Sensor Networks in practice is also included.

Distance-vector routing protocolLink-state routing protocolComputer scienceAnt colony optimization algorithmsComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSMultipath routingComputer Science::Networking and Internet ArchitectureProbabilistic logicPath vector protocolProbabilistic analysis of algorithmsRouting (electronic design automation)Algorithm
researchProduct