Optimal Parallel Algorithms for Computing the Sum, the Prefix-sums, and the Summed Area Table on the Memory Machine Models

Size: px
Start display at page:

Download "Optimal Parallel Algorithms for Computing the Sum, the Prefix-sums, and the Summed Area Table on the Memory Machine Models"

Transcription

1 IEICE TRANS. INF. & SYST., VOL.Exx??, NO.xx XXXX x 1 PAPER Secial Sectio o Secial Sectio o Parallel ad Distributed Comutig ad Netorkig Otimal Parallel Algorithms for Comutig the Sum, the Prefix-sums, ad the Summed Area Table o the Memory Machie Models Koji NAKANO, Member SUMMARY The mai cotributio of this aer is to sho otimal arallel algorithms to comute the sum, the refix-sums, ad the summed area table o to memory machie models, the Discrete Memory Machie (DMM) ad the Uified Memory Machie (UMM). The DMM ad the UMM are theoretical arallel comutig models that cature the essece of the shared memory ad the global memory of GPUs. These models have three arameters, the umber of threads, ad the idth of the memory, ad the memory access latecy l. We first sho that the sum of umbers ca be comuted i O( l l log ) time uits o the DMM ad the UMM. We the go o to sho that Ω( l l log ) time uits are ecessary to comute the sum. We also reset a arallel algorithm that comutes the refix-sums of umbers i O( l l log ) time uits o the DMM ad the UMM. Fially, e sho that the summed area table of size ca be comuted i O( l l log ) time uits o the DMM ad the UMM. Sice the comutatio of the refix-sums ad the summed area table is at least as hard as the sum comutatio, these arallel algorithms are also otimal. key ords: Memory machie models, refix-sums comutatio, arallel algorithm, GPU, CUDA 1. Itroductio The research of arallel algorithms has a log history of more tha 4 years. Sequetial algorithms have bee develoed mostly o the Radom Access Machie (RAM) [1]. I cotrast, sice there are a variety of coectio methods ad atters betee rocessors ad memories, may arallel comutig models have bee reseted ad may arallel algorithmic techiques have bee sho o them. The most ell-studied arallel comutig model is the Parallel Radom Access Machie (PRAM) [] [4], hich cosists of rocessors ad a shared memory. Each rocessor o the PRAM ca access ay address of the shared memory i a time uit. The PRAM is a good arallel comutig model i the sese that arallelism of each roblem ca be revealed by the erformace of arallel algorithms o the PRAM. Hoever, sice the PRAM requires a shared memory that ca be accessed by all rocessors at the same time, it is ot feasible. The GPU (Grahics Processig Uit), is a secialized circuit desiged to accelerate comutatio for buildig ad maiulatig images [5] [8]. Latest GPUs are desiged for geeral urose comutig ad ca erform comutatio i Mauscrit received Jauary 1, 11. Mauscrit revised Jauary 1, 11. The author is ith the Deartmet of Iformatio Egieerig, Hiroshima Uiversity. DOI: /trasif.E.D.1 alicatios traditioally hadled by the CPU. Hece, GPUs have recetly attracted the attetio of may alicatio develoers [5], [9]. NVIDIA rovides a arallel comutig architecture called CUDA (Comute Uified Device Architecture) [1], the comutig egie for NVIDIA GPUs. CUDA gives develoers access to the virtual istructio set ad memory of the arallel comutatioal elemets i NVIDIA GPUs. I may cases, GPUs are more efficiet tha multicore rocessors [11], sice they have hudreds of rocessor cores ad very high memory badidth. CUDA uses to tyes of memories i the NVIDIA GPUs: the global memory ad the shared memory [1]. The global memory is imlemeted as a off-chi DRAM, ad has large caacity, say, Gbytes, but its access latecy is very large. The shared memory is a extremely fast ochi memory ith loer caacity, say, Kbytes. The efficiet usage of the global memory ad the shared memory is a key for CUDA develoers to accelerate alicatios usig GPUs. I articular, e eed to cosider the coalescig of the global memory access ad the bak coflict of the shared memory access [7], [11], [1]. To maximize the badidth betee the GPU ad the DRAM chis, the cosecutive addresses of the global memory must be accessed at the same time. Thus, threads of CUDA should erform coalesced access he they access the global memory. The address sace of the shared memory is maed ito several hysical memory baks. If to or more threads access the same memory baks at the same time, the access requests are rocessed sequetially. Hece to maximize the memory access erformace, threads should access distict memory baks to avoid the bak coflicts of the memory access. I our revious aer [13], e have itroduced to models, the Discrete Memory Machie (DMM) ad the Uified Memory Machie (UMM), hich reflect the essetial features of the shared memory ad the global memory of NVIDIA GPUs. We have reseted that a off-lie ermutatio algorithm develoed for the DMM rus efficietly o a GPU [14]. The outlie of the architectures of the DMM ad the UMM are illustrated i Figure 1. I both architectures, a sea of threads (Ts) are coected to the memory baks (MBs) through the memory maagemet uit (MMU). Each thread is a Radom Access Machie (RAM) [1], hich ca execute fudametal oeratios i a time uit. We do ot discuss the architecture of the sea of threads i this aer, but e ca imagie that it cosists of a set of multi-core ro- Coyright c x The Istitute of Electroics, Iformatio ad Commuicatio Egieers

2 IEICE TRANS. INF. & SYST., VOL.Exx??, NO.xx XXXX x cessors hich ca execute may threads i arallel. Threads are executed i SIMD [15] fashio, ad the rocessors ru o the same rogram ad ork o the differet data. The DMM ad the UMM have three arameters: idth, latecy l, ad the umber of threads. The idth is the umber of MBs. Also, they ca disatch threads i threads ad the threads ca sed memory access requests. The latecy l is the umber of clock cycles to comlete the memory access requests. MBs costitute a sigle address sace of the memory. A sigle address sace of the memory is maed to the MBs i a iterleaved ay such that the ord of data of address i is stored i the (i mod )-th bak, here is the umber of MBs. We ca thik that addresses j, j 1,..., (1) j 1 for each j costitute a address grou. The mai differece of the to architectures is the coectio of the address lie betee the MMU ad the MBs, hich ca trasfer a address value. I the DMM, the address lies coect the MBs ad the MMU searately, hile a sigle set of address lies from the MMU is coected to the MBs i the UMM. Hece, i the UMM, the same address value is broadcast to every MB, ad the same address of the MBs ca be accessed i each time uit. O the other had, differet addresses of the MBs ca be accessed i the DMM. Hece, the DMM allos to access ay address grou of each MB at the same time, hile the UMM oly allos to access the same address grou of all MBs. Sice the memory access of the UMM is more restricted tha that of the DMM, the UMM is less oerful tha the DMM. a sea of threads a sea of threads ruig o multicore rocessors ruig o multicore rocessors MMU MB MB MB MB Fig. 1 DMM address lie MMU MB MB MB MB UMM data lie The architectures of the DMM ad the UMM The erformace of algorithms of the PRAM is usually evaluated usig to arameters: the size of the iut ad the umber of rocessors. For examle, it is ell ko that the sum of umbers ca be comuted i O( log ) time o the PRAM []. We use four arameters, the size of the iut, the umber of threads, the idth ad the latecy l of the memory he e evaluate the erformace of algorithms o the DMM ad o the UMM. The idth is the umber of memory baks ad the latecy l is the umber of time uits to comlete the memory access. Hece, the erformace of algorithms o the DMM ad the UMM is evaluated as a fuctio of (the size of a roblem), (the umber of threads), (the idth of a memory), ad l (the latecy of a memory). I NVIDIA GPUs, the idth of global ad shared memory is 16 or 3. Also, the latecy l of the global memory is several hudreds clock cycles. A grid ca have at most blocks ith at most 51 threads each for CUDA Versio 1.x ad 31 1 blocks ith at most 14 threads each for CUDA Versio 3. or later [1]. Thus, the umber of threads ca be 33 millio for CUDA Versio 1.x ad much more for CUDA Versio 3. or later. Suose that a array a of umbers is give. The refix-sums of a is the array of size such that the i-th ( i 1) elemet is a[] a[1] a[i]. I this aer, e cosider the additio as a biary oerator for the refix-sums, but it ca be geeralized for ay associative biary oerator. Clearly, a sequetial algorithm ca comute the refix-sums by executig a[i 1] a[i 1] a[i] for all i ( i 1) i tur. The comutatio of the refix-sums of a array is oe of the most imortat algorithmic rocedures. May algorithms such as grah algorithms, geometric algorithms, image rocessig ad matrix comutatio call refix-sum algorithms as a subroutie. For examle, the refix-sums comutatio is used to obtai the re-order, the i-order, ad the ost-order of a rooted biary tree i arallel []. So, it is very imortat to develo efficiet arallel algorithms for the refix-sums. Suose that a matrix a of size is give. Let a[i][ j]( i, j 1) deote the elemet at the i-th ro ad j-th colum. The summed area table [16] is a matrix b of the same size such that b[i][ j] = i i, j j a[i ][ j ]. It should have o difficulty to cofirm that the summed area table ca be obtaied by comutig the colum-ise refixsums of the ro-ise refix-sums as illustrated i Figure. Alteratively, e ca comute the ro-ise refix-sums of the colum-ise refix-sums to obtai the same matrix. Oce e have the summed area table, the sum of ay rectagular area of a ca be comuted i O(1) time. More secifically, e have the folloig equatio: a[i][ j] = b[d][r] b[u][l] b[d][l] b[u][r]. u<i d,l< j r Thus, the sum of a rectagular area ca be comuted usig four elemets of the summed area table b. Sice the sum of a rectagular area ca be comuted i O(1) time the summed area table has may alicatios i the are of image rocessig [17]. The mai cotributio of this aer is to sho otimal arallel algorithms comutig the sum ad the refixsums o the DMM ad the UMM. We first sho that the sum of umbers ca be comuted i O( l l log ) time uits usig threads o the DMM ad the UMM ith idth ad latecy l. We the go o to discuss the loer boud of the time comlexity ad sho three loer bouds, Ω( l )-time badidth limitatio, Ω( )-time latecy

3 NAKANO: OPTIMAL PARALLEL ALGORITHMS FOR COMPUTING THE SUM, THE PREFIX-SUMS, AND THE SUMMED AREA TABLE ON THE MEMORY MACHINE MODELS ro-ise refix-sums colum-ise refix-sums Fig. Summed area table limitatio, ad Ω(l log )-time reductio limitatio. From this discussio, the comutatio of the sum takes at least Ω( l l log ) time uits o the DMM ad the UMM. Thus, the sum algorithm is otimal. For the comutatio of the refix-sums, e first evaluate the comutig time of a ell-ko aive algorithm [4], [17]. We sho that a aive refix-sums algorithm rus i O( log l log l log ) time. Hece, this aive algorithm is ot otimal ad it has a overhead of factor log both for the badidth limitatio ad for the latecy limitatio l. Next, e sho a otimal arallel algorithm that comutes the refix-sums of umbers i O( l l log ) time uits o the DMM ad the UMM. Hoever, this algorithm uses ork sace of size ad it may ot be accetable if the size of the iut is very large. We also sho that the refix-sums ca also be comuted i the same time uits, eve if ork sace ca store oly mi( log,l log(l)) umbers. Fially, e sho that the summed area table ca be comuted i O( l l log ) time uits o the DMM ad the UMM. Several techiques for comutig the refix-sums o GPUs have bee sho i [17]. They have reseted a comlicated data routig techique to avoid the bak coflict i the comutatio of the refix-sums. Hoever, their algorithm erforms memory access distat locatios i arallel ad it erforms o-coalesced memory access. Hece it is ot efficiet for the UMM, that is, the global memory of GPUs. I [17] a ork-efficiet arallel algorithm for refixsums o the GPU has bee reseted. Hoever, the algorithm uses ork sace of log, ad also the theoretical aalysis of the erformace has ot bee reseted. This aer is orgaized as follos. Sectio briefly defies the Discrete Memory Machie (DMM) ad the Uified Memory Machie (UMM) itroduced i our revious aer [13]. I Sectio 3, e evaluate the comutig time of the cotiguous memory access the memory of the DMM ad the UMM. The cotiguous memory access is a key igrediet of arallel algorithm develomet o the DMM ad the UMM. Usig the cotiguous access, e sho that the sum of umbers ca be comuted i O( l l log ) time uits i Sectio 4. We the go o to discuss the loer boud of the time comlexity ad sho three loer bouds, Ω( l )-time badidth limitatio, Ω( )-time latecy limitatio, ad Ω(l log )-time reductio limitatio i Sectio 5. Sectio 6 shos a aive algorithm for the refixsums, hich rus i O( log l log l log ) time uits. We the reset a otimal arallel algorithm for the refixsums ruig i O( l l log ) time uits i Sectio 7. Fially, e sho that the summed area table ca be comuted i O( l l log ) time uits i Sectio 8. Sectio 9 offers coclusio of this aer.. Parallel Memory Machies: DMM ad UMM The mai urose of this sectio is to defie the Discrete Memory Machie (DMM) ad the Uified Memory Machie (UMM) itroduced i our revious aer [13]. Please see [13] for the details. We first defie the Discrete Memory Machie (DMM) of idth ad latecy l. Let m[i] (i ) deote a memory cell of address i i the memory. Let B[ j] = {m[ j], m[ j ], m[ j ], m[ j 3],...} ( j 1) deote the j-th bak of the memory. Clearly, a memory cell m[i] is i the (i mod )-th memory bak. We assume that memory cells i differet baks ca be accessed i a time uit, but o to memory cells i the same bak ca be accessed i a time uit. Also, e assume that l time uits are ecessary to comlete a access request ad cotiuous requests are rocessed i a ielie fashio through the MMU. Thus, if oly oe request is set to a bak, l time uits are ecessary to comlete it. I geeral, it takes k l 1 time uits to comlete k ( 1) access requests to a articular bak. We assume that threads o the DMM ad the UMM ith idth are artitioed ito grous of threads called ars. It makes sese to assume that ad is a multile of. More secifically, threads are artitioed ito ars W(), W(1),..., W( 1) such that W(i) = {T(i ), T(i 1),...,T((i 1) 1)} ( i 1). I other ords, the umber of MBs ad the umber of threads i a ar are equal. Wars are activated for memory access i tur, ad threads i a ar try to access the memory at the same time. I other ords, W(), W(1),...,W( 1) are activated i a roud-robi maer if at least oe thread i a ar requests memory access. If o thread i a ar eeds memory access, such ar is ot activated for memory access. Whe W(i) is activated, threads i W(i) seds memory access requests, oe request er thread, to the memory. We also assume that a thread caot sed a e memory access request util the revious memory access request is comleted. Hece, if a thread sed a memory access request, it must ait l time uits to sed a e memory access request. We ext defie the Uified Memory Machie (UMM) of idth as follos. Let A[ j] = {m[ j ], m[ j

4 4 IEICE TRANS. INF. & SYST., VOL.Exx??, NO.xx XXXX x 1],...,m[(j 1) 1]} deote the j-th address grou. We assume that memory cells i the same address grou are rocessed at the same time. Hoever, if they are i the differet grous, oe time uit is ecessary for each of the grous. Also, similarly to the DMM, threads are artitioed ito ars ad each ar accesses the memory i tur. Figure 3 shos examles of memory access o the DMM ad the UMM. We ca thik that the memory access is erformed through l-stage ielie registers as illustrated i the figure. We assume that each memory access request is comleted he it reaches the last ielie stage. To ars W() ad W(1) access to m[7], m[5], m[15], m[] ad m[1], m[11], m[1], m[9], resectively. I the DMM, memory access requests by W() are searated ito to ielie stages, because addresses m[7] ad m[15] are i the same bak B(3). Those by W(1) occuies 1 stage, because all requests are i distict baks. Thus, the memory requests occuy three stages, it takes = 7 time uits to comlete the memory access. I the UMM, memory access requests by W() are destied for three address grous. Hece the memory requests occuy three stages. Similarly those by W(1) occuy to stages. Hece, it takes = 9 time uits to comlete the memory access. Throughout of this aer, ithout losig geerality, e assume that the idth of the DMM ad the UMM, the umber of the threads, ad the size of roblem iut are oers of to. The reader should have o difficulty to modify algorithms reseted i this aer to ork correctly eve if some of these values are ot oers of to usig stadard algorithmic techiques. 3. Cotiguous Memory Access The mai urose of this sectio is to revie the cotiguous memory access o the DMM ad the UMM sho i [13]. Suose that a array a of size ( ) is give. We use threads to access all of elemets i a such that each thread accesses elemets. Note that accessig ca be readig from or ritig i. Let a[i] ( i 1) deote the i-th elemet i a. Whe, the cotiguous access ca be erformed as follos: [Cotiguous memory access] for t to 1do for i to 1 do i arallel T(i) access a[ t i] We ill evaluate the comutig time. For each t ( t 1), threads access elemets a[t], a[t 1],...,a[(t 1) 1]. This memory access is erformed by ars i tur. More secifically, first, threads i W() access a[t], a[t1],..., a[t 1]. After that, threads i W(1) access a[t ], a[t 1],...,a[t 1], ad the same oeratio is reeatedly erformed. I geeral, threads i W( j)( j 1) accesses a[t j], a[t j 1],...,a[t ( j 1) 1]. Sice elemets are accessed by a ar are i the differet bak, the access ca be comleted i l time uits o the DMM. Also, these elemets are i the same address grou, ad thus, the access ca be comleted i l time uits o the UMM. Recall that the memory access are rocessed i ielie fashio such that threads i each W( j) sed memory access requests i oe time uit. Hece, threads i ars sed memory access requests i time uits. After that, the last memory access requests by W( 1) are comleted i l 1 time uits. Thus, threads access elemets a[t], a[t 1],...,a[(t 1) 1] i l 1 time uits. Sice this memory access is reeated times, the cotiguous access ca be doe i ( l 1) = O( l ) time uits. If < the, the cotiguous memory access ca be simly doe usig threads out of the threads. If this is the case, the memory access ca be doe by O( l) time uits. Therefore, e have, Lemma 1: The cotiguous access to a array of size ca be doe i O( l l) time uits usig threads o the UMM ad the DMM ith idth ad latecy l. We ca cosider that memory access is cotiguous if threads i every ar access the cotiguous addresses of the shared memory o the DMM or the global memory of the UMM. It should have o difficulty to cofirm that, if all of the threads erforms such cotiguous memory access to umbers, umbers er thread, the memory access is also comleted i O( l l) time uits. 4. A otimal arallel algorithm for comutig the sum The mai urose of this sectio is to sho a otimal arallel algorithm for comutig the sum o the memory machie models. Let a be a array of = m umbers. Let us sho a algorithm to comute the sum a[]a[1] a[ 1]. The algorithm uses a ell-ko arallel comutig techique hich reeatedly comutes the airise sums. We imlemet this techique to erform cotiguous memory access. The details are selled out as follos: [Otimal algorithm for comutig the sum] for t m 1 doto do for i to t 1 do i arallel a[i] a[i] a[i t ] Figure 4 illustrates ho the sums of airs are comuted. From the figure, the reader should have o difficulty to cofirm that this algorithm comute the sum correctly. We assume that threads are used to comute the sum. For each t ( t m 1), t oeratios a[i] a[i] a[i t ] are erformed. These oeratio ivolve the folloig memory access oeratios: readig from a[], a[1],...,a[ t 1], readig from a[ t ], a[ t 1],...,a[ t 1], ad ritig i a[], a[1],...,a[ t 1].

5 NAKANO: OPTIMAL PARALLEL ALGORITHMS FOR COMPUTING THE SUM, THE PREFIX-SUMS, AND THE SUMMED AREA TABLE ON THE MEMORY MACHINE MODELS 5 l-stage ielie registers DMM W() W(1) B[] B[1] B[] B[3] Each ielie stage stores memory access requests destied for the differet baks UMM W() W(1) l-stage ielie registers A[] A[1] A[] A[3] Each ielie stage stores memory access requests destied for the same address grou Fig. 3 Examles of memory access o the DMM ad the UMM Fig. 4 Illustratig the summig algorithm for umbers Sice these memory access oeratios are cotiguous, they ca be doe i O( t t l l) time usig threads both o the DMM ad o the UMM ith idth ad latecy l from Lemma 1. Thus, the total comutig time is t= m 1 O( t t l l) = O( m m l lm) = O( l l log ) ad e have, Lemma : The sum of umbers ca be comuted i O( l l log ) time uits usig threads o the DMM ad o the UMM ith idth ad latecy l. 5. The loer boud of the comutig time ad the latecy hidig Let us discuss the loer boud of the time ecessary to comute the sum o the DMM ad the UMM to sho that our arallel summig algorithm for Lemma is otimal. Sice the sum is the last value of the refix-sums ad the summed area table, this loer boud discussio for the sum ca be alied to that for the refix-sums ad the summed area table. We ill sho three loer bouds of the sum, Ω( l )-time badidth limitatio, Ω( )-time latecy limitatio, ad Ω(l log )-time reductio limitatio. Sice the idth of the memory is, at most umbers i the memory ca be read i a time uit. Clearly, all of the umbers must be read to comute the sum. Hece, Ω( ) time uits are ecessary to comute the sum. We call the Ω( )-time loer boud the badidth limitatio. Sice the memory access takes latecy l, a thread ca sed at most t l memory read requests i t time uits. Thus, threads ca sed at most t l total memory requests i t time uits. Sice at least umbers i the memory must be read to comute the sum, t l must be satisfied. Thus, at least t =Ω( l l ) time uits are ecessary. We call the Ω( )-time loer boud the latecy limitatio. Next, e ill sho the reductio limitatio, the Ω(l log )-time loer boud. The formal roof is more comlicated tha those for the badidth limitatio ad the latecy limitatio. Imagie that each of iut umbers stored i the shared memory (or the global memory) is a toke ad each thread is a box. Wheever to tokes are laced i a box,

6 6 IEICE TRANS. INF. & SYST., VOL.Exx??, NO.xx XXXX x they are merged ito oe immediately. We ca move tokes to boxes ad each box ca accet at most oe toke i l time uits. Suose that e have tokes outside boxes. We ill rove that it takes at least l log time uits to merge them ito oe toke. For this urose, e ill rove that, if e have tokes at some time, e must have at least tokes l time uits later. Suose that e have tokes such that k of them are i k boxes ad the remaiig k tokes are out of boxes. If k k the e ca move k tokes to k boxes ad ca merge k airs of tokes i l time uits. After that, k tokes remai. If k > k the e ca merge k airs of tokes ad e have k tokes after l time uits. Hece, after l time uits, e have at least max( k, k) tokes. Thus, e must have at least tokes l time uits later. I other ords, it is ot ossible to reduce the umber of tokes by half or less. Thus, it takes at least l log time uits to merge tokes ito oe. It should be clear that, readig a umber by a thread from the shared memory (or the global memory) corresods to a toke movemet to a box. Therefore, it takes at least Ω(l log ) time uits to comute the sum of umbers. From the discussio above, e have, Theorem 3: Both the DMM ad the UMM ith threads, idth, ad latecy l take at least Ω( l l log ) time uits to comute the sum of umbers. From Theorem 3, the arallel algorithm for commutig the sum sho for Lemma is otimal. Let us discuss the relatio of three limitatios. From a ractical oit of vie, idth ad latecy l are costat values that caot be chaged by arallel comuter users. These values are fixed he a arallel comuter based o the memory machie models is maufactured. Also, the size of the iut are variable. Programmers ca adjust the umber of threads to obtai the best erformace. Thus, the value of the latecy limitatio l ca be chaged by rogrammers. Let us comare the values of three limitatios. l : From l, the badidth limitatio domiates the latecy limitatio. l log : From l log, the badidth limitatio domiates the reductio limitatio. l : From log l log, the latecy limitatio domiates the reductio limitatio. Thus, if both l ad l log are satisfied, the comutig time of the sum algorithm for Lemma is O( ). As illustrated i Figure 3, the memory machie models have l-stage ielie registers such that each stage has registers. Sice more tha oe memory requests by a thread ca ot be stored i each ielie register, l must be satisfied to fill all the ielie registers ith memory access requests by threads. Sice the sum algorithm has log log stages ad exected memory access requests are set to the ielie registers, l log must also be satisfied to fill all the ielie registers ith log memory access requests. From the discussio above, to hide the latecy, the umber of threads must be at least the umber l of ielie registers ad the size of iut must be at least l log(l). 6. A aive refix-sums algorithm We assume that a array a ith = m umbers is give. Let us start ith a ell-ko aive refix-sums algorithm for array a [17], [18], ad sho it is ot otimal. The aive refix-sums algorithm is ritte as follos: [A aive refix-sums algorithm] for t tom 1do for i t to 1 do i arallel a[i] a[i] a[i t ] Figure 5 illustrates ho the refix-sums are comuted. We assume that threads are available ad evaluate the comutig time of the aive refix-sums algorithm. The folloig three memory access oeratios are erformed for each t ( t m 1) by: readig from a[], a[1],...,a[ t 1], readig from a[ t ], a[ t 1],...,a[ 1], ad ritig i a[ t ], a[ t 1],...,a[ 1]. Each of the three oeratios ca be doe by cotiguous memory access for t elemets. Hece, the comutig time of each t is O( t ( t )l l) from Lemma 1. The total comutig time is: m 1 O( t ( t )l l) t= = O( log Thus, e have, l log l log ). Lemma 4: The aive refix-sum algorithm rus i O( log l log l log ) time uits usig threads o the DMM ad o the UMM ith idth ad latecy l. If the comutig time of Lemma 4 matches the loer boud sho i Theorem 3, the refix-sum algorithm is otimal. Hoever, it does ot match the loer boud. I the folloig sectio, e ill sho a otimal refix-sum algorithm hose ruig time matches the loer boud. 7. Otimal refix-sum algorithm This sectio shos a otimal algorithm for the refix-sums ruig i O( l l log ) time uits. We use m arrays a, a 1,...a m 1 as ork sace. Each a t ( t m 1) ca store t umbers. Thus, the total size of the m arrays is o more tha 1 m 1 1 = m 1 = 1. We assume that the iut of umbers are stored i array a m of size. The algorithm has to stages. I the first stage, iterval sums are stored i the m arrays. The secod stage uses iterval sums i the m arrays to comute the resultig

7 NAKANO: OPTIMAL PARALLEL ALGORITHMS FOR COMPUTING THE SUM, THE PREFIX-SUMS, AND THE SUMMED AREA TABLE ON THE MEMORY MACHINE MODELS Fig. 5 Illustratig the aive refix-sums algorithm for umbers refix-sums. The details of the first stage are selled out as follos. [Comute the iterval sums] for t m 1 doto do for i to t 1 do i arallel a t [i] a t1 [ i] a t1 [ i 1] Figure 6 illustrates ho the iterval sums are comuted. Whe this rogram termiates, each a t [i]( t m 1, i t 1) stores a t [i ]a t t [i 1] a t t [(i1) 1]. t I the secod stage, the refix-sums are comuted by comutig the sums of the iterval sums as follos: [Comute the sums of the iterval sums] for t tom 1do for i to t 1 do i arallel a t1 [ i 1] a t [i] for i to t do i arallel a t1 [ i ] a t1 [ i ] a t [i] Figure 7 shos ho the refix-sums are comuted. I the figure, a t1 [ i 1] a t [i] ad a t1 [ i ] a t1 [ i ] a t [i] corresod to coy ad add, resectively. Whe this algorithm termiates, each a m [i] ( i t 1) stores the refix-sum a m [] a m [1] a m [i]. We assume that threads are available ad evaluate the comutig time. The first stage ivolves the folloig memory access oeratios for each t ( t m 1): readig from a t1 [], a t1 [],...,a t1 [ t1 ], readig from a t1 [1], a t1 [3],...,a t1 [ t1 1], ad ritig i a t [], a t [1],...,a t [ t 1]. Every to addresses is accessed i the readig oeratios. Thus, these three memory access oeratios are essetially cotiguous access ad they ca be doe i O( t l) time uits. Therefore, the total comutig time of the first stage is t=1 t l m 1 O( t t l l) = O( l l log ). The secod stage cosists of the folloig memory access oeratios for each t ( t m 1): readig from a t [], a t [1],...,a t [ t 1], readig from a t1 [], a t1 [4],...,a t1 [ t1 ], ad ritig i a t1 [], a t1 [1],...,a t1 [ t1 1]. Similarly, these oeratios ca be doe i O( t t l l) time uits. Hece, the total comutig time of the secod stage is also O( l l log ). Thus, e have, Theorem 5: The refix-sums of umbers ca be comuted i O( l l log ) time uits usig threads o the DMM ad o the UMM ith idth ad latecy l if ork sace of size is available. From Theorem 3, the loer boud of the comutig time of the refix-sums is Ω( l l log ). Suose that is very large ad ork sace of size is ot available. We ill sho that, if ork sace o smaller tha mi( log,l log(l)) is available, the refixsums ca also be comuted i O( l l log ). Let k be a arbitrary umber such that k. We artitio the iut a ith umbers ito k grous ith k ( ) umbers each. Each t-th grou ( t k 1) has k umbers a[tk], a[tk 1],...,a[(t 1)k 1]. The refix-sums of every grou is comuted usig threads i tur as follos. [Sequetial-arallel refix-sums algorithm] for t to k 1do begi if(t ) a[tk] a[tk] a[tk 1] comute the refix-sums of k umbers a[tk], a[tk 1],...,a[(t 1)k 1] ed It should be clear that this algorithm comutes the refixsums correctly. The refix-sums of k umbers ca be comuted i O( k kl l log k). Sice the comutatio of the refix-sums is reeated k times, the total comutig time is O( k kl l log k) k = O( l l log k k ). Thus, e have, Corollary 6: The refix-sums of umbers ca be comuted i O( l l log k k ) time uits usig threads o the DMM ad o the UMM ith idth ad latecy l if ork sace of size k is available.

8 8 IEICE TRANS. INF. & SYST., VOL.Exx??, NO.xx XXXX x a a a a a -15 Fig. 6 Illustratig the comutatio of iterval sums i m arrays. a 4 coy add a a a a -15 Fig. 7 Illustratig the comutatio of the sums of the iterval sums i m arrays. l log k l log( log ) k log l log(l log(l)) l log(l) If k log the, = O( l ). If k l log k l log(l) the k = O( ). Thus, if k mi( log,l log(l)) the the comutig time is O( l ). 8. Otimal algorithms for the summed area table The mai urose of this sectio is to sho otimal algorithms for comutig the summed area table. It should be clear that the colum-ise refix-sums ca be obtaied by the trasose, the ro-ise refix-sums comutatio, ad the trasose. I our revious aer [13], e have reseted that the trasose of a matrix of size ca be doe i O( l ) time uits both o the DMM ad the UMM ith idth ad latecy l usig threads. As illustrated i Figure the summed area table ca be comuted by the roise refix-sums ad the colum-ise refix-sums. Thus, if the ro-ise refix-sums of a matrix of size ca be comuted i O( l l log ) time uits, the summed area table ca be comuted i the same time uits. For simlicity, e assume that is a oer of to. Recall that the algorithm for Theorem 5 comutes the refix-sums of umbers. Imagie that the this algorithm is executed o a matrix of size such that umbers i a matrix arraged i a 1-dimesioal array i ro-major order. We ill sho that the ro-ise refix-sums ca be comuted by modifyig the algorithm for Theorem 5, hich has folloig to stages: Stage 1 the iterval sums are comuted as illustrated i Figure 6, ad Stage the sums of the iterval sums are comuted as illustrated i Figure 7. The idea is to omit several oeratios erformed i these to stages such that the iterval sums of a ro is ot roagated to the ext ro. We ca thik that a t ( log t log ) i these stages is a matrix of size t such that a t [i t j] ( i 1, j t 1) is a elemet i the i-th ro ad j-th colum. For examle, the sizes of a 4, a 3, ad a i Figures 6 ad 7 are 4 4, 4 ad 4 1, resectively. Hece, a 4 [], a 4 [1], a 4 [], a 4 [3], a 3 [], a 3 [1], ad a [] are i ro. We modify Stage 1 such that the iterval sums ithi each ro is comuted. For this urose, e execute the first log (= m ) stes of Stage 1 ad the remaiig m stes are omitted as follos: [Comute the iterval sums i ro-ise] for t m 1 doto m do for i to t 1 do i arallel a t [i] a t1 [ i] a t1 [ i 1] For examle, i Figure 6, a 3 ad a are comuted, but the comutatio of a 1 ad a is omitted.

9 NAKANO: OPTIMAL PARALLEL ALGORITHMS FOR COMPUTING THE SUM, THE PREFIX-SUMS, AND THE SUMMED AREA TABLE ON THE MEMORY MACHINE MODELS 9 coy add a a a ro ro 1 ro ro 3 Fig. 8 Illustratig the comutatio of the sums of the iterval sums of every ro Next, e modify Stage such that the comutatio m is erformed ithi each ro. First, e omit the first stes ad execute the remaiig m stes. I the remaiig m stes, oeratios from a ro to the ext ro are omitted. The reader should comare Figure 7 ad Figure 8 to see ho Stage is modified. Note that all coy oeratios are alays erformed ithi the same ro. Hoever, add oeratios may be erformed to ext ros. For examle, add oeratio a 3 [] a 3 [] a [] is omitted because a 3 [] is i ro 1 ad a [] is i ro. The details are selled out as follos: [Comute the sums of the iterval sums i ro-ise] for t m to m 1do for i to t 1 do i arallel a t1 [ i 1] a t [i] for i to t do i arallel if a t1 [ i ] ad a t [i] are i the same ro the a t1 [ i ] a t1 [ i ] a t [i] Clearly the comutatio of modified Stages 1 ad does ot exceed their origial stages sho for Theorem 5. Thus, e have, Theorem 7: The summed area table of a matrix of size ca be comuted i O( l l log ) time uits usig threads o the DMM ad o the UMM ith idth ad latecy l, if ork sace of size is available. From Theorem 3, the arallel algorithm for Theorem 7 is otimal. 9. Coclusio The mai cotributio of this aer is to sho arallel algorithms to comute the sum, the refix-sums, ad the summed area table i O( l l log ) time uits usig threads o the DMM ad the UMM ith idth ad latecy l. We have also sho ay algorithm to comute these values takes Ω( l l log ) time uits. We believe that to memory machie models, the DMM ad the UMM are romisig as latforms of develomet of algorithmic techiques for GPUs. We la to develo efficiet algorithms for grah-theoretic roblems, geometric roblems, ad image rocessig roblems o the DMM ad the UMM. Refereces [1] A.V. Aho, J.D. Ullma, ad J.E. Hocroft, Data Structures ad Algorithms, Addiso Wesley, [] A. Gibbos ad W. Rytter, Efficiet Parallel Algorithms, Cambridge Uiversity Press, [3] A. Grama, G. Karyis, V. Kumar, ad A. Guta, Itroductio to Parallel Comutig, Addiso Wesley, 3. [4] M.J. Qui, Parallel Comutig: Theory ad Practice, McGra- Hill, [5] W.W. Hu, GPU Comutig Gems Emerald Editio, Morga Kaufma, 11. [6] Y. Ito, K. Ogaa, ad K. Nakao, Fast ellise detectio algorithm usig Hough trasform o the GPU, Proc. of Iteratioal Coferece o Netorkig ad Comutig, , Dec. 11. [7] D. Ma, K. Uda, Y. Ito, ad K. Nakao, A GPU imlemetatio of comutig euclidea distace ma ith efficiet memory access, Proc. of Iteratioal Coferece o Netorkig ad Comutig,.68 76, Dec. 11. [8] A. Uchida, Y. Ito, ad K. Nakao, Fast ad accurate temlate matchig usig ixel rearragemet o the GPU, Proc. of Iteratioal Coferece o Netorkig ad Comutig, , Dec. 11. [9] K. Nishida, Y. Ito, ad K. Nakao, Acceleratig the dyamic rogrammig for the matrix chai roduct o the GPU, Proc. of Iteratioal Coferece o Netorkig ad Comutig,.3 36, Dec. 11. [1] NVIDIA Cororatio, NVIDIA CUDA C rogrammig guide versio 4., 1. [11] D. Ma, K. Uda, H. Ueyama, Y. Ito, ad K. Nakao, Imlemetatios of a arallel algorithm for comutig euclidea distace ma i multicore rocessors ad GPUs, Iteratioal Joural of Netorkig ad Comutig, vol.1,.6 76, July 11. [1] NVIDIA Cororatio, NVIDIA CUDA C best ractice guide versio 3.1, 1. [13] K. Nakao, Simle memory machie models for GPUs, Proc. of Iteratioal Parallel ad Distributed Processig Symosium Workshos, , May 1. [14] A. Kasagi, K. Nakao, ad Y. Ito, A imlemetatio of coflictfree off-lie ermutatio o the GPU, to aear i Proc. of Iteratioal Coferece o Netorkig ad Comutig,.6 3, 1. [15] M.J. Fly, Some comuter orgaizatios ad their effectiveess, IEEE Trasactios o Comuters, vol.c-1, , 197. [16] F. Cro, Summed-area tables for texture maig, Proc. of the 11th aual coferece o Comuter grahics ad iteractive techiques,.7 1, [17] M. Harris, S. Seguta, ad J.D. Oes, Chater 39. arallel refix sum (sca) ith CUDA, i GPU Gems 3, Addiso-Wesley, 7. [18] W.D. Hillis ad G.L. Steele, Jr., Data arallel algorithms, Commu. ACM, vol.9, o.1, , Dec

10 1 IEICE TRANS. INF. & SYST., VOL.Exx??, NO.xx XXXX x Koji Nakao received the BE, ME ad Ph.D degrees from Deartmet of Comuter Sciece, Osaka Uiversity, Jaa i 1987, 1989, ad 199 resectively. I , he as a Research Scietist at Advaced Research Laboratory. Hitachi Ltd. I 1995, he joied Deartmet of Electrical ad Comuter Egieerig, Nagoya Istitute of Techology. I 1, he moved to School of Iformatio Sciece, Jaa Advaced Istitute of Sciece ad Techology, here he as a associate rofessor. He has bee a full rofessor at School of Egieerig, Hiroshima Uiversity from 3. He has ublished extesively i jourals, coferece roceedigs, ad book chaters. He served o the editorial board of jourals icludig IEEE Trasactios o Parallel ad Distributed Systems, IEICE Trasactios o Iformatio ad Systems, ad Iteratioal Joural of Foudatios o Comuter Sciece. He has also guest-edited several secial issues icludig IEEE TPDS Secial issue o Wireless Netorks ad Mobile Comutig, IJFCS secial issue o Grah Algorithms ad Alicatios, ad IEICE Trasactios secial issue o Foudatios of Comuter Sciece. He has orgaized cofereces ad orkshos icludig Iteratioal Coferece o Netorkig ad Comutig, Iteratioal Coferece o Parallel ad Distributed Comutig, Alicatios ad Techologies, IPDPS Worksho o Advaces i Parallel ad Distributed Comutatioal Models, ad ICPP Worksho o Wireless Netorks ad Mobile Comutig. His research iterests icludes image rocessig, hardare algorithms, GPUbased comutig, FPGA-based recofigurable comutig, arallel comutig, algorithms ad architectures.

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

On the L p -conjecture for locally compact groups

On the L p -conjecture for locally compact groups Arch. Math. 89 (2007), 237 242 c 2007 Birkhäuser Verlag Basel/Switzerlad 0003/889X/030237-6, ublished olie 2007-08-0 DOI 0.007/s0003-007-993-x Archiv der Mathematik O the L -cojecture for locally comact

More information

A probabilistic proof of a binomial identity

A probabilistic proof of a binomial identity A probabilistic proof of a biomial idetity Joatho Peterso Abstract We give a elemetary probabilistic proof of a biomial idetity. The proof is obtaied by computig the probability of a certai evet i two

More information

RF Engineering Continuing Education Introduction to Traffic Planning

RF Engineering Continuing Education Introduction to Traffic Planning RF Egieerig otiuig Educatio Itroductio to Traffic Plaig Queuig Systems Figure. shows a schematic reresetatio of a queuig system. This reresetatio is a mathematical abstractio suitable for may differet

More information

Guidelines for a Good Presentation. Luis M. Correia

Guidelines for a Good Presentation. Luis M. Correia Guidelies for a Good Presetatio Luis M. Correia Outlie Basic riciles. Structure. Sizes ad cotrast. Style. Examles. Coclusios. Basic Priciles The resetatio of a work is iteded to show oly its major asects,

More information

3 Energy. 3.3. Non-Flow Energy Equation (NFEE) Internal Energy. MECH 225 Engineering Science 2

3 Energy. 3.3. Non-Flow Energy Equation (NFEE) Internal Energy. MECH 225 Engineering Science 2 MECH 5 Egieerig Sciece 3 Eergy 3.3. No-Flow Eergy Equatio (NFEE) You may have oticed that the term system kees croig u. It is ecessary, therefore, that before we start ay aalysis we defie the system that

More information

Asymptotic Growth of Functions

Asymptotic Growth of Functions CMPS Itroductio to Aalysis of Algorithms Fall 3 Asymptotic Growth of Fuctios We itroduce several types of asymptotic otatio which are used to compare the performace ad efficiecy of algorithms As we ll

More information

Lecture 13. Lecturer: Jonathan Kelner Scribe: Jonathan Pines (2009)

Lecture 13. Lecturer: Jonathan Kelner Scribe: Jonathan Pines (2009) 18.409 A Algorithmist s Toolkit October 27, 2009 Lecture 13 Lecturer: Joatha Keler Scribe: Joatha Pies (2009) 1 Outlie Last time, we proved the Bru-Mikowski iequality for boxes. Today we ll go over the

More information

Supply Chain Network Design with Preferential Tariff under Economic Partnership Agreement

Supply Chain Network Design with Preferential Tariff under Economic Partnership Agreement roceedigs of the 2014 Iteratioal oferece o Idustrial Egieerig ad Oeratios Maageet Bali, Idoesia, Jauary 7 9, 2014 Suly hai Network Desig with referetial ariff uder Ecooic artershi greeet eichi Fuaki Yokohaa

More information

Dilution Example. Chapter 24 Warrants and Convertibles. Warrants. The Difference Between Warrants and Call Options. Warrants

Dilution Example. Chapter 24 Warrants and Convertibles. Warrants. The Difference Between Warrants and Call Options. Warrants Chapter 24 Warrats ad Covertibles Warrats The Differece betee Warrats ad Call Optios Warrat Pricig ad the Black-Scholes Model Covertible Bods The Value of Covertible Bods Reasos for Issuig Warrats ad Covertibles

More information

THE LEAST COMMON MULTIPLE OF A QUADRATIC SEQUENCE

THE LEAST COMMON MULTIPLE OF A QUADRATIC SEQUENCE THE LEAST COMMON MULTIPLE OF A QUADRATIC SEQUENCE JAVIER CILLERUELO Abstract. We obtai, for ay irreducible quadratic olyomial f(x = ax 2 + bx + c, the asymtotic estimate log l.c.m. {f(1,..., f(} log. Whe

More information

Annuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL.

Annuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL. Auities Uder Radom Rates of Iterest II By Abraham Zas Techio I.I.T. Haifa ISRAEL ad Haifa Uiversity Haifa ISRAEL Departmet of Mathematics, Techio - Israel Istitute of Techology, 3000, Haifa, Israel I memory

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis Ruig Time ( 3.) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria

More information

Properties of MLE: consistency, asymptotic normality. Fisher information.

Properties of MLE: consistency, asymptotic normality. Fisher information. Lecture 3 Properties of MLE: cosistecy, asymptotic ormality. Fisher iformatio. I this sectio we will try to uderstad why MLEs are good. Let us recall two facts from probability that we be used ofte throughout

More information

On Formula to Compute Primes. and the n th Prime

On Formula to Compute Primes. and the n th Prime Applied Mathematical cieces, Vol., 0, o., 35-35 O Formula to Compute Primes ad the th Prime Issam Kaddoura Lebaese Iteratioal Uiversity Faculty of Arts ad cieces, Lebao issam.kaddoura@liu.edu.lb amih Abdul-Nabi

More information

CME 302: NUMERICAL LINEAR ALGEBRA FALL 2005/06 LECTURE 8

CME 302: NUMERICAL LINEAR ALGEBRA FALL 2005/06 LECTURE 8 CME 30: NUMERICAL LINEAR ALGEBRA FALL 005/06 LECTURE 8 GENE H GOLUB 1 Positive Defiite Matrices A matrix A is positive defiite if x Ax > 0 for all ozero x A positive defiite matrix has real ad positive

More information

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008 I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces

More information

Incremental calculation of weighted mean and variance

Incremental calculation of weighted mean and variance Icremetal calculatio of weighted mea ad variace Toy Fich faf@cam.ac.uk dot@dotat.at Uiversity of Cambridge Computig Service February 009 Abstract I these otes I eplai how to derive formulae for umerically

More information

Convexity, Inequalities, and Norms

Convexity, Inequalities, and Norms Covexity, Iequalities, ad Norms Covex Fuctios You are probably familiar with the otio of cocavity of fuctios. Give a twicedifferetiable fuctio ϕ: R R, We say that ϕ is covex (or cocave up) if ϕ (x) 0 for

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments Project Deliverables CS 361, Lecture 28 Jared Saia Uiversity of New Mexico Each Group should tur i oe group project cosistig of: About 6-12 pages of text (ca be loger with appedix) 6-12 figures (please

More information

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity

More information

CS103X: Discrete Structures Homework 4 Solutions

CS103X: Discrete Structures Homework 4 Solutions CS103X: Discrete Structures Homewor 4 Solutios Due February 22, 2008 Exercise 1 10 poits. Silico Valley questios: a How may possible six-figure salaries i whole dollar amouts are there that cotai at least

More information

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design A Combied Cotiuous/Biary Geetic Algorithm for Microstrip Atea Desig Rady L. Haupt The Pesylvaia State Uiversity Applied Research Laboratory P. O. Box 30 State College, PA 16804-0030 haupt@ieee.org Abstract:

More information

Lecture 2: Karger s Min Cut Algorithm

Lecture 2: Karger s Min Cut Algorithm priceto uiv. F 3 cos 5: Advaced Algorithm Desig Lecture : Karger s Mi Cut Algorithm Lecturer: Sajeev Arora Scribe:Sajeev Today s topic is simple but gorgeous: Karger s mi cut algorithm ad its extesio.

More information

Chapter 5: Inner Product Spaces

Chapter 5: Inner Product Spaces Chapter 5: Ier Product Spaces Chapter 5: Ier Product Spaces SECION A Itroductio to Ier Product Spaces By the ed of this sectio you will be able to uderstad what is meat by a ier product space give examples

More information

A Mixed-Integer Optimization Model for Compressor Selection in Natural Gas Pipeline Network System Operations

A Mixed-Integer Optimization Model for Compressor Selection in Natural Gas Pipeline Network System Operations Joural of virometal Iformatics 3 () 33-4 (2004) 04JI00025 726-235/684-8799 2004 ISIS www.iseis.org/jei A Mixed-Iteger Otimizatio Model for Comressor Selectio i Natural as Pielie Network System Oeratios

More information

5 Boolean Decision Trees (February 11)

5 Boolean Decision Trees (February 11) 5 Boolea Decisio Trees (February 11) 5.1 Graph Coectivity Suppose we are give a udirected graph G, represeted as a boolea adjacecy matrix = (a ij ), where a ij = 1 if ad oly if vertices i ad j are coected

More information

Section 11.3: The Integral Test

Section 11.3: The Integral Test Sectio.3: The Itegral Test Most of the series we have looked at have either diverged or have coverged ad we have bee able to fid what they coverge to. I geeral however, the problem is much more difficult

More information

The Online Freeze-tag Problem

The Online Freeze-tag Problem The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden mikael.hammar@atus.com School of Technology and Society, Malmö University,

More information

CS100: Introduction to Computer Science

CS100: Introduction to Computer Science Review: History of Computers CS100: Itroductio to Computer Sciece Maiframes Miicomputers Lecture 2: Data Storage -- Bits, their storage ad mai memory Persoal Computers & Workstatios Review: The Role of

More information

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks Computer Commuicatios 30 (2007) 1331 1336 wwwelseviercom/locate/comcom Recovery time guarateed heuristic routig for improvig computatio complexity i survivable WDM etworks Lei Guo * College of Iformatio

More information

Domain 1 Components of the Cisco Unified Communications Architecture

Domain 1 Components of the Cisco Unified Communications Architecture Maual CCNA Domai 1 Compoets of the Cisco Uified Commuicatios Architecture Uified Commuicatios (UC) Eviromet Cisco has itroduced what they call the Uified Commuicatios Eviromet which is used to separate

More information

Trigonometric Form of a Complex Number. The Complex Plane. axis. ( 2, 1) or 2 i FIGURE 6.44. The absolute value of the complex number z a bi is

Trigonometric Form of a Complex Number. The Complex Plane. axis. ( 2, 1) or 2 i FIGURE 6.44. The absolute value of the complex number z a bi is 0_0605.qxd /5/05 0:45 AM Page 470 470 Chapter 6 Additioal Topics i Trigoometry 6.5 Trigoometric Form of a Complex Number What you should lear Plot complex umbers i the complex plae ad fid absolute values

More information

(VCP-310) 1-800-418-6789

(VCP-310) 1-800-418-6789 Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.

More information

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows: Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network

More information

A Faster Clause-Shortening Algorithm for SAT with No Restriction on Clause Length

A Faster Clause-Shortening Algorithm for SAT with No Restriction on Clause Length Joural o Satisfiability, Boolea Modelig ad Computatio 1 2005) 49-60 A Faster Clause-Shorteig Algorithm for SAT with No Restrictio o Clause Legth Evgey Datsi Alexader Wolpert Departmet of Computer Sciece

More information

3. Greatest Common Divisor - Least Common Multiple

3. Greatest Common Divisor - Least Common Multiple 3 Greatest Commo Divisor - Least Commo Multiple Defiitio 31: The greatest commo divisor of two atural umbers a ad b is the largest atural umber c which divides both a ad b We deote the greatest commo gcd

More information

THE HEIGHT OF q-binary SEARCH TREES

THE HEIGHT OF q-binary SEARCH TREES THE HEIGHT OF q-binary SEARCH TREES MICHAEL DRMOTA AND HELMUT PRODINGER Abstract. q biary search trees are obtaied from words, equipped with the geometric distributio istead of permutatios. The average

More information

Department of Computer Science, University of Otago

Department of Computer Science, University of Otago Departmet of Computer Sciece, Uiversity of Otago Techical Report OUCS-2006-09 Permutatios Cotaiig May Patters Authors: M.H. Albert Departmet of Computer Sciece, Uiversity of Otago Micah Colema, Rya Fly

More information

Fuzzy Active Queue Management for Congestion Control in Wireless Ad-Hoc

Fuzzy Active Queue Management for Congestion Control in Wireless Ad-Hoc 50 The Iteratioal Arab Joural of Iformatio Techology, Vol. 4, No. 1, Jauary 2007 Fuzzy Active Queue Maagemet for Cogestio Cotrol i Wireless Ad-Hoc Essam Natsheh, Adza B. Jata, Sabira Khatu, ad Shamala

More information

Capacity of Wireless Networks with Heterogeneous Traffic

Capacity of Wireless Networks with Heterogeneous Traffic Capacity of Wireless Networks with Heterogeeous Traffic Migyue Ji, Zheg Wag, Hamid R. Sadjadpour, J.J. Garcia-Lua-Aceves Departmet of Electrical Egieerig ad Computer Egieerig Uiversity of Califoria, Sata

More information

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal Advaced Sciece ad Techology Letters, pp.31-35 http://dx.doi.org/10.14257/astl.2014.78.06 Study o the applicatio of the software phase-locked loop i trackig ad filterig of pulse sigal Sog Wei Xia 1 (College

More information

Basic Elements of Arithmetic Sequences and Series

Basic Elements of Arithmetic Sequences and Series MA40S PRE-CALCULUS UNIT G GEOMETRIC SEQUENCES CLASS NOTES (COMPLETED NO NEED TO COPY NOTES FROM OVERHEAD) Basic Elemets of Arithmetic Sequeces ad Series Objective: To establish basic elemets of arithmetic

More information

Sequences and Series

Sequences and Series CHAPTER 9 Sequeces ad Series 9.. Covergece: Defiitio ad Examples Sequeces The purpose of this chapter is to itroduce a particular way of geeratig algorithms for fidig the values of fuctios defied by their

More information

On the Throughput Scaling of Cognitive Radio Ad Hoc Networks

On the Throughput Scaling of Cognitive Radio Ad Hoc Networks O the Throughut Scalig of Cogitive Radio Ad Hoc Networks Chegzhi Li ad Huaiyu Dai Deartmet of Electrical ad Comuter Egieerig North Carolia State Uiversity, Raleigh, NC email: {cli3, hdai}@csu.edu Abstract

More information

The Stable Marriage Problem

The Stable Marriage Problem The Stable Marriage Problem William Hut Lae Departmet of Computer Sciece ad Electrical Egieerig, West Virgiia Uiversity, Morgatow, WV William.Hut@mail.wvu.edu 1 Itroductio Imagie you are a matchmaker,

More information

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN Aalyzig Logitudial Data from Complex Surveys Usig SUDAAN Darryl Creel Statistics ad Epidemiology, RTI Iteratioal, 312 Trotter Farm Drive, Rockville, MD, 20850 Abstract SUDAAN: Software for the Statistical

More information

I. Chi-squared Distributions

I. Chi-squared Distributions 1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.

More information

Chapter 10 Computer Design Basics

Chapter 10 Computer Design Basics Logic ad Computer Desig Fudametals Chapter 10 Computer Desig Basics Part 1 Datapaths Charles Kime & Thomas Kamiski 2004 Pearso Educatio, Ic. Terms of Use (Hyperliks are active i View Show mode) Overview

More information

Unit 8: Inference for Proportions. Chapters 8 & 9 in IPS

Unit 8: Inference for Proportions. Chapters 8 & 9 in IPS Uit 8: Iferece for Proortios Chaters 8 & 9 i IPS Lecture Outlie Iferece for a Proortio (oe samle) Iferece for Two Proortios (two samles) Cotigecy Tables ad the χ test Iferece for Proortios IPS, Chater

More information

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value

More information

Class Meeting # 16: The Fourier Transform on R n

Class Meeting # 16: The Fourier Transform on R n MATH 18.152 COUSE NOTES - CLASS MEETING # 16 18.152 Itroductio to PDEs, Fall 2011 Professor: Jared Speck Class Meetig # 16: The Fourier Trasform o 1. Itroductio to the Fourier Trasform Earlier i the course,

More information

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm

A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm International Journal of Comuter Theory and Engineering, Vol. 7, No. 4, August 2015 A Virtual Machine Dynamic Migration Scheduling Model Based on MBFD Algorithm Xin Lu and Zhuanzhuan Zhang Abstract This

More information

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5 Sectio 13 Kolmogorov-Smirov test. Suppose that we have a i.i.d. sample X 1,..., X with some ukow distributio P ad we would like to test the hypothesis that P is equal to a particular distributio P 0, i.e.

More information

Domain 1 - Describe Cisco VoIP Implementations

Domain 1 - Describe Cisco VoIP Implementations Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.

More information

1. MATHEMATICAL INDUCTION

1. MATHEMATICAL INDUCTION 1. MATHEMATICAL INDUCTION EXAMPLE 1: Prove that for ay iteger 1. Proof: 1 + 2 + 3 +... + ( + 1 2 (1.1 STEP 1: For 1 (1.1 is true, sice 1 1(1 + 1. 2 STEP 2: Suppose (1.1 is true for some k 1, that is 1

More information

How To Solve The Homewor Problem Beautifully

How To Solve The Homewor Problem Beautifully Egieerig 33 eautiful Homewor et 3 of 7 Kuszmar roblem.5.5 large departmet store sells sport shirts i three sizes small, medium, ad large, three patters plaid, prit, ad stripe, ad two sleeve legths log

More information

Enhancing Oracle Business Intelligence with cubus EV How users of Oracle BI on Essbase cubes can benefit from cubus outperform EV Analytics (cubus EV)

Enhancing Oracle Business Intelligence with cubus EV How users of Oracle BI on Essbase cubes can benefit from cubus outperform EV Analytics (cubus EV) Ehacig Oracle Busiess Itelligece with cubus EV How users of Oracle BI o Essbase cubes ca beefit from cubus outperform EV Aalytics (cubus EV) CONTENT 01 cubus EV as a ehacemet to Oracle BI o Essbase 02

More information

Soving Recurrence Relations

Soving Recurrence Relations Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree

More information

Lecture 4: Cauchy sequences, Bolzano-Weierstrass, and the Squeeze theorem

Lecture 4: Cauchy sequences, Bolzano-Weierstrass, and the Squeeze theorem Lecture 4: Cauchy sequeces, Bolzao-Weierstrass, ad the Squeeze theorem The purpose of this lecture is more modest tha the previous oes. It is to state certai coditios uder which we are guarateed that limits

More information

A markovian study of no claim discount system of Insurance Regulatory and Development Authority and its application

A markovian study of no claim discount system of Insurance Regulatory and Development Authority and its application Thailad Statisticia July 214; 12(2): 223-236 htt://statassoc.or.th Cotributed aer A markovia study of o claim discout system of Isurace Regulatory ad Develomet Authority ad its alicatio Dili C. Nath* [a]

More information

Automated Trust Negotiation Model based on Dynamic Game of Incomplete Information

Automated Trust Negotiation Model based on Dynamic Game of Incomplete Information 2668 JOURNAL OF SOFTWARE, VOL 8, NO 10, OCTOBER 2013 Automated Trust Negotiatio Model based o Dyamic Game of Icomlete Iformatio Hogwei Che, Shuig Wag, Hui Xu, Zhiwei Ye,*Chuzhi Wag School of Comuter Sciece,

More information

1 Computing the Standard Deviation of Sample Means

1 Computing the Standard Deviation of Sample Means Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.

More information

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return

where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return EVALUATING ALTERNATIVE CAPITAL INVESTMENT PROGRAMS By Ke D. Duft, Extesio Ecoomist I the March 98 issue of this publicatio we reviewed the procedure by which a capital ivestmet project was assessed. The

More information

Output Analysis (2, Chapters 10 &11 Law)

Output Analysis (2, Chapters 10 &11 Law) B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should

More information

S. Tanny MAT 344 Spring 1999. be the minimum number of moves required.

S. Tanny MAT 344 Spring 1999. be the minimum number of moves required. S. Tay MAT 344 Sprig 999 Recurrece Relatios Tower of Haoi Let T be the miimum umber of moves required. T 0 = 0, T = 7 Iitial Coditios * T = T + $ T is a sequece (f. o itegers). Solve for T? * is a recurrece,

More information

Theorems About Power Series

Theorems About Power Series Physics 6A Witer 20 Theorems About Power Series Cosider a power series, f(x) = a x, () where the a are real coefficiets ad x is a real variable. There exists a real o-egative umber R, called the radius

More information

LECTURE 13: Cross-validation

LECTURE 13: Cross-validation LECTURE 3: Cross-validatio Resampli methods Cross Validatio Bootstrap Bias ad variace estimatio with the Bootstrap Three-way data partitioi Itroductio to Patter Aalysis Ricardo Gutierrez-Osua Texas A&M

More information

Tradigms of Astundithi and Toyota

Tradigms of Astundithi and Toyota Tradig the radomess - Desigig a optimal tradig strategy uder a drifted radom walk price model Yuao Wu Math 20 Project Paper Professor Zachary Hamaker Abstract: I this paper the author iteds to explore

More information

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee

More information

DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2

DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2 Itroductio DAME - Microsoft Excel add-i for solvig multicriteria decisio problems with scearios Radomir Perzia, Jaroslav Ramik 2 Abstract. The mai goal of every ecoomic aget is to make a good decisio,

More information

Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable

Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable Week 3 Coditioal probabilities, Bayes formula, WEEK 3 page 1 Expected value of a radom variable We recall our discussio of 5 card poker hads. Example 13 : a) What is the probability of evet A that a 5

More information

Confidence Intervals for One Mean

Confidence Intervals for One Mean Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a

More information

Chapter 7: Confidence Interval and Sample Size

Chapter 7: Confidence Interval and Sample Size Chapter 7: Cofidece Iterval ad Sample Size Learig Objectives Upo successful completio of Chapter 7, you will be able to: Fid the cofidece iterval for the mea, proportio, ad variace. Determie the miimum

More information

CS100: Introduction to Computer Science

CS100: Introduction to Computer Science I-class Exercise: CS100: Itroductio to Computer Sciece What is a flip-flop? What are the properties of flip-flops? Draw a simple flip-flop circuit? Lecture 3: Data Storage -- Mass storage & represetig

More information

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA , pp.180-184 http://dx.doi.org/10.14257/astl.2014.53.39 Evaluatig Model for B2C E- commerce Eterprise Developmet Based o DEA Weli Geg, Jig Ta Computer ad iformatio egieerig Istitute, Harbi Uiversity of

More information

Infinite Sequences and Series

Infinite Sequences and Series CHAPTER 4 Ifiite Sequeces ad Series 4.1. Sequeces A sequece is a ifiite ordered list of umbers, for example the sequece of odd positive itegers: 1, 3, 5, 7, 9, 11, 13, 15, 17, 19, 21, 23, 25, 27, 29...

More information

Optimal Risky Portfolios: Efficient Diversification

Optimal Risky Portfolios: Efficient Diversification Prof. Alex Shapiro Lecture Notes 7 Optimal Risky Portfolios: Efficiet Diversificatio I. Readigs ad Suggested Practice Problems II. Correlatio Revisited: A Fe Graphical Examples III. Stadard Deviatio of

More information

An Inventory Decision Support System to the Glass Manufacturing Industry

An Inventory Decision Support System to the Glass Manufacturing Industry A Ivetory Deciio Suort Sytem to the Gla Maufacturig Idutry Nuo M. R. Órfão (Mechaical Egieerig Deartmet, ESTG-IPLEI) morfao@etg.ilei.t Carlo F. G. Bio (Ititute for Sytem ad Robotic, IST-UTL) cfb@ir.it.utl.t

More information

Building Blocks Problem Related to Harmonic Series

Building Blocks Problem Related to Harmonic Series TMME, vol3, o, p.76 Buildig Blocks Problem Related to Harmoic Series Yutaka Nishiyama Osaka Uiversity of Ecoomics, Japa Abstract: I this discussio I give a eplaatio of the divergece ad covergece of ifiite

More information

Plug-in martingales for testing exchangeability on-line

Plug-in martingales for testing exchangeability on-line Plug-i martigales for testig exchageability o-lie Valetia Fedorova, Alex Gammerma, Ilia Nouretdiov, ad Vladimir Vovk Computer Learig Research Cetre Royal Holloway, Uiversity of Lodo, UK {valetia,ilia,alex,vovk}@cs.rhul.ac.uk

More information

Acta Acad. Paed. Agriensis, Sectio Mathematicae 29 (2002) 77 87. ALMOST SURE FUNCTIONAL LIMIT THEOREMS IN L p( ]0, 1[ ), WHERE 1 p <

Acta Acad. Paed. Agriensis, Sectio Mathematicae 29 (2002) 77 87. ALMOST SURE FUNCTIONAL LIMIT THEOREMS IN L p( ]0, 1[ ), WHERE 1 p < Acta Acad. Paed. Agriesis, Sectio Mathematicae 29 22) 77 87 ALMOST SUR FUNCTIONAL LIMIT THORMS IN L ], [ ), WHR < József Túri Nyíregyháza, Hugary) Dedicated to the memory of Professor Péter Kiss Abstract.

More information

Perfect Packing Theorems and the Average-Case Behavior of Optimal and Online Bin Packing

Perfect Packing Theorems and the Average-Case Behavior of Optimal and Online Bin Packing SIAM REVIEW Vol. 44, No. 1, pp. 95 108 c 2002 Society for Idustrial ad Applied Mathematics Perfect Packig Theorems ad the Average-Case Behavior of Optimal ad Olie Bi Packig E. G. Coffma, Jr. C. Courcoubetis

More information

Chatpun Khamyat Department of Industrial Engineering, Kasetsart University, Bangkok, Thailand ocpky@hotmail.com

Chatpun Khamyat Department of Industrial Engineering, Kasetsart University, Bangkok, Thailand ocpky@hotmail.com SOLVING THE OIL DELIVERY TRUCKS ROUTING PROBLEM WITH MODIFY MULTI-TRAVELING SALESMAN PROBLEM APPROACH CASE STUDY: THE SME'S OIL LOGISTIC COMPANY IN BANGKOK THAILAND Chatpu Khamyat Departmet of Idustrial

More information

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series utomatic Tuig for FOREX Tradig System Usig Fuzzy Time Series Kraimo Maeesilp ad Pitihate Soorasa bstract Efficiecy of the automatic currecy tradig system is time depedet due to usig fixed parameters which

More information

CHAPTER 3 THE TIME VALUE OF MONEY

CHAPTER 3 THE TIME VALUE OF MONEY CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all

More information

Trackless online algorithms for the server problem

Trackless online algorithms for the server problem Iformatio Processig Letters 74 (2000) 73 79 Trackless olie algorithms for the server problem Wolfgag W. Bei,LawreceL.Larmore 1 Departmet of Computer Sciece, Uiversity of Nevada, Las Vegas, NV 89154, USA

More information

Convention Paper 6764

Convention Paper 6764 Audio Egieerig Society Covetio Paper 6764 Preseted at the 10th Covetio 006 May 0 3 Paris, Frace This covetio paper has bee reproduced from the author's advace mauscript, without editig, correctios, or

More information

Domain 1: Designing a SQL Server Instance and a Database Solution

Domain 1: Designing a SQL Server Instance and a Database Solution Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a

More information

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13 EECS 70 Discrete Mathematics ad Probability Theory Sprig 2014 Aat Sahai Note 13 Itroductio At this poit, we have see eough examples that it is worth just takig stock of our model of probability ad may

More information

Definition. A variable X that takes on values X 1, X 2, X 3,...X k with respective frequencies f 1, f 2, f 3,...f k has mean

Definition. A variable X that takes on values X 1, X 2, X 3,...X k with respective frequencies f 1, f 2, f 3,...f k has mean 1 Social Studies 201 October 13, 2004 Note: The examples i these otes may be differet tha used i class. However, the examples are similar ad the methods used are idetical to what was preseted i class.

More information

Hypothesis testing. Null and alternative hypotheses

Hypothesis testing. Null and alternative hypotheses Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate

More information

Stochastic Online Scheduling with Precedence Constraints

Stochastic Online Scheduling with Precedence Constraints Stochastic Olie Schedulig with Precedece Costraits Nicole Megow Tark Vredeveld July 15, 2008 Abstract We cosider the preemptive ad o-preemptive problems of schedulig obs with precedece costraits o parallel

More information

Cooley-Tukey. Tukey FFT Algorithms. FFT Algorithms. Cooley

Cooley-Tukey. Tukey FFT Algorithms. FFT Algorithms. Cooley Cooley Cooley-Tuey Tuey FFT Algorithms FFT Algorithms Cosider a legth- sequece x[ with a -poit DFT X[ where Represet the idices ad as +, +, Cooley Cooley-Tuey Tuey FFT Algorithms FFT Algorithms Usig these

More information

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S CONTROL CHART FOR THE CHANGES IN A PROCESS Supraee Lisawadi Departmet of Mathematics ad Statistics, Faculty of Sciece ad Techoology, Thammasat

More information

Floating Codes for Joint Information Storage in Write Asymmetric Memories

Floating Codes for Joint Information Storage in Write Asymmetric Memories Floatig Codes for Joit Iformatio Storage i Write Asymmetric Memories Axiao (Adrew Jiag Computer Sciece Departmet Texas A&M Uiversity College Statio, TX 77843-311 ajiag@cs.tamu.edu Vaske Bohossia Electrical

More information

Factors of sums of powers of binomial coefficients

Factors of sums of powers of binomial coefficients ACTA ARITHMETICA LXXXVI.1 (1998) Factors of sums of powers of biomial coefficiets by Neil J. Cali (Clemso, S.C.) Dedicated to the memory of Paul Erdős 1. Itroductio. It is well ow that if ( ) a f,a = the

More information

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to

More information