Hierarchical ORAM Revisited, and Applications to Asymptotically Efficient ORAM and OPRAM. Hubert Chan, Yue Guo, Wei-Kai Lin, Elaine Shi 2017/12/5

Size: px
Start display at page:

Download "Hierarchical ORAM Revisited, and Applications to Asymptotically Efficient ORAM and OPRAM. Hubert Chan, Yue Guo, Wei-Kai Lin, Elaine Shi 2017/12/5"

Transcription

1 Hierarchical ORAM Revisited, and Applications to Asymptotically Efficient ORAM and OPRAM Hubert Chan, Yue Guo, Wei-Kai Lin, Elaine Shi 2017/12/5

2 Random Access Machine, RAM Maybe the standard model of algorithms Memory / Server: N words, indexed by address Interface: Read / Write address CPU / Client: Constant num. of registers Hierarchical ORAM Revisited 2

3 Oblivious RAM (ORAM) Provable security [Goldreich and Ostrovsky] ORAM Read / Write address Addr 1 Addr 2 Addr 3. Hierarchical ORAM Revisited Simulator Addr 1 Addr 2 Addr 3. 3

4 Hierarchical ORAM Schemes (1) Bandwidth overhead: ORAM O N [Goldreich and Ostrovsky] Hierarchical ORAM Revisited 4

5 Hierarchical ORAM Schemes (2) Bandwidth overhead: ORAM O log 3 N [Goldreich and Ostrovsky] Hierarchical ORAM Revisited 5

6 Hierarchical ORAM Schemes (3) Bandwidth overhead: ORAM O log 2 N [Goodrich and Mitzenmacher] Hierarchical ORAM Revisited 6

7 Hierarchical ORAM Schemes (4) Bandwidth overhead: ORAM [Kushilevitz, Lu, and Ostrovsky] O log2 N log log N Hierarchical ORAM Revisited 7

8 Hierarchical ORAM Schemes (5) Bandwidth overhead: ORAM [Today] O log2 N Simple log log N Hierarchical ORAM Revisited 8

9 Warmup: Permute and Buffer [Goldreich and Ostrovsky] Hidden permutation π Memory π 1 π 3 π 2 Hierarchical ORAM Revisited 9

10 Warmup: Permute and Buffer [Goldreich and Ostrovsky] Hidden permutation π Memory π 1 π 3 π 2 π 3? Hierarchical ORAM Revisited 10

11 Warmup: Permute and Buffer [Goldreich and Ostrovsky] Buffer Scan Buffer Random addr. 3?3? 3? Memory random π 1 π 3 π 2 Hierarchical ORAM Revisited 11

12 Warmup: Permute and Buffer [Goldreich and Ostrovsky] Buffer New Permutation Memory Hierarchical ORAM Revisited 12

13 Warmup: Hash and Buffer [Goldreich and Ostrovsky] Buffer Bandwidth overhead: O N Build Lookup Hash Table Hierarchical ORAM Revisited 13

14 Hierarchical ORAM [Goldreich and Ostrovsky] Recursive buffer of next level Level 0 Level 1 Bandwidth overhead: O log 3 N Level 2 Level 3 Level 4 Hierarchical ORAM Revisited 14

15 Use Cuckoo Hash Faster hash table Level 0 Level 1 Level 2 Bandwidth overhead: O log 2 N [Goodrich and Mitzenmacher] Build: O log N per element Lookup: O(1) Level 3 Level 4 Hierarchical ORAM Revisited 15

16 Cuckoo Hash is Involved Especially make it oblivious [Goodrich and Mitzenmacher] Random bipartite graph Doob martingale Azuma s inequality Hierarchical ORAM Revisited 16

17 Cuckoo Hash is Involved Especially make it oblivious Topological info Hierarchical ORAM Revisited 17

18 Cuckoo Hash is Involved Especially make it oblivious Refine algorithm Var. martingale Var. Azume s ineq. [Goodrich and Mitzenmacher] Hierarchical ORAM Revisited 18

19 Use Cuckoo Hash Faster hash table [Goodrich and Mitzenmacher] Level 0 Level 1 Level 2 Build: O log N per element Lookup: O(1) Level 3 Level 4 Hierarchical ORAM Revisited 19

20 Re-parameterize Hierarchy Reduce num. levels Level 0 Each level μ = log N hash tables Level i, capacity μ i log μ N levels Bandwidth overhead: O [Kushilevitz, Lu, and Ostrovsky] log2 N log log N Level 1 Level 2 Hierarchical ORAM Revisited 20

21 Hash Table We Need Each Each level level μ μ = = log log 1 ε NNhash hash tables tables Cuckoo hash is an overkill! Level 0 Level 1 Build: O log N per element Lookup: O(log ε N) Level 2 Hierarchical ORAM Revisited 21

22 Recall: Balls-and-Bins (1-tier) Hash Table Standard hash table Oblivious: sort and scan Bucket size: Z words Not efficient enough Num. of buckets B Secure implementation [GO96] 1. Add hash values 2. Add dummy words 3. Sort by hash values using AKS 4. Mark duplicates 5. Sort by duplicates 6. Truncate 22

23 Two-Tier Hash Table Repeats standard hash twice Diff. B and Z Hierarchical ORAM Revisited 23

24 Parameters To store n elements, choose Z = 5 log ε λ B = n log ε λ ε 0.5, 1 is a constant Bucket size: Z words Num. of buckets B 24

25 Overflow Probability Theorem (1 st tier): If n 3 exp log ε N, then total overflow is at most k = 288B exp Z 6 Except with negl. prob. Theorem (2 nd tier): If n 3 exp log ε N, then no overflow Except with negl. prob. o n 1 α Chernoff bound Moment gen. func. Negative dep. 25

26 Simple Hierarchical ORAM Level 0 Each level μ = log 1 ε N hash tables Two-tier hash Build: O log N per element Lookup: O(log ε N) Bandwidth overhead: O log2 N log log N Level 1 Level 2 Hierarchical ORAM Revisited 26

27 Parallel: Oblivious PRAM Provable security [Boyle, Chung, and Pass] Read / Write address Addr 1 Addr 2 Addr 3. OPRAM OPRAM OPRAM Hierarchical ORAM Revisited Simulator Addr 1 Addr 2 Addr 3. 27

28 Improved OPRAM Level 0 Two-tier hash table is easy to parallelize Just sort and scan Previous result Work && parallel time: O log 3 N O log2 N log log N Level 1 Level 2 Hierarchical ORAM Revisited 28

29 Conclusions ORAM OPRAM Hierarchical ORAM Revisited 29

30 Followup: Cache-Efficiency Contiguous memory Hierarchical ORAM Revisited 30

31 Thank you! Questions? Hierarchical ORAM Revisited 31

2 When Some or All Labels are Missing: The EM Algorithm

2 When Some or All Labels are Missing: The EM Algorithm CS769 Spring Advanced Natural Language Processing The EM Algorithm Lecturer: Xiaojin Zhu jerryzhu@cs.wisc.edu Given labeled examples (x, y ),..., (x l, y l ), one can build a classifier. If in addition

More information

Transposition Table, History Heuristic, and other Search Enhancements

Transposition Table, History Heuristic, and other Search Enhancements Transposition Table, History Heuristic, and other Search Enhancements Tsan-sheng Hsu tshsu@iis.sinica.edu.tw http://www.iis.sinica.edu.tw/~tshsu 1 Abstract Introduce heuristics for improving the efficiency

More information

Non-Interactive Secure Computation Based on Cut-and-Choose

Non-Interactive Secure Computation Based on Cut-and-Choose Non-Interactive Secure Computation Based on Cut-and-Choose Arash Afshar, Payman Mohassel, Benny Pinkas, and Ben Riva May 14, 2014 Afshar, Mohassel, Pinkas, and Riva Non-Interactive Secure Computation Based

More information

Design Strategies for ARX with Provable Bounds: SPARX and LAX

Design Strategies for ARX with Provable Bounds: SPARX and LAX Design Strategies for ARX with Provable Bounds: SPARX and LAX Daniel Dinu 1, Léo Perrin 1, Aleksei Udovenko 1, Vesselin Velichkov 1, Johann Großschädl 1, Alex Biryukov 1 1 SnT, University of Luxembourg

More information

knn & Naïve Bayes Hongning Wang

knn & Naïve Bayes Hongning Wang knn & Naïve Bayes Hongning Wang CS@UVa Today s lecture Instance-based classifiers k nearest neighbors Non-parametric learning algorithm Model-based classifiers Naïve Bayes classifier A generative model

More information

Modelling and Simulation of Environmental Disturbances

Modelling and Simulation of Environmental Disturbances Modelling and Simulation of Environmental Disturbances (Module 5) Dr Tristan Perez Centre for Complex Dynamic Systems and Control (CDSC) Prof. Thor I Fossen Department of Engineering Cybernetics 18/09/2007

More information

Mixture Models & EM. Nicholas Ruozzi University of Texas at Dallas. based on the slides of Vibhav Gogate

Mixture Models & EM. Nicholas Ruozzi University of Texas at Dallas. based on the slides of Vibhav Gogate Mixture Models & EM Nicholas Ruozzi University of Texas at Dallas based on the slides of Vibhav Gogate Previously We looked at -means and hierarchical clustering as mechanisms for unsupervised learning

More information

Accounting for the Evolution of U.S. Wage Inequality

Accounting for the Evolution of U.S. Wage Inequality Accounting for the Evolution of U.S. Wage Inequality Lutz Hendricks UNC Preliminary May 24, 2013 1/42 Motivation Wage inequality has increased in the U.S. since the 1970s standard deviation of log wages,

More information

DESIGN AND ANALYSIS OF ALGORITHMS (DAA 2017)

DESIGN AND ANALYSIS OF ALGORITHMS (DAA 2017) DESIGN AND ANALYSIS OF ALGORITHMS (DAA 2017) Veli Mäkinen 12/05/2017 1 COURSE STRUCTURE 7 weeks: video lecture -> demo lecture -> study group -> exercise Video lecture: Overview, main concepts, algorithm

More information

6/16/2010 DAG Execu>on Model, Work and Depth 1 DAG EXECUTION MODEL, WORK AND DEPTH

6/16/2010 DAG Execu>on Model, Work and Depth 1 DAG EXECUTION MODEL, WORK AND DEPTH 6/16/2010 DAG Execu>on Model, Work and Depth 1 DAG EXECUTION MODEL, WORK AND DEPTH 6/16/2010 DAG Execu>on Model, Work and Depth 2 Computa>onal Complexity of (Sequen>al) Algorithms Model: Each step takes

More information

SEARCH TREE. Generating the children of a node

SEARCH TREE. Generating the children of a node SEARCH TREE Node: State in state tree Root node: Top of state tree Children: Nodes that can be reached from a given node in 1 step (1 operator) Expanding: Generating the children of a node Open: Closed:

More information

Instructors: Randy H. Katz David A. PaGerson hgp://inst.eecs.berkeley.edu/~cs61c/fa10. Fall Lecture #39. Agenda

Instructors: Randy H. Katz David A. PaGerson hgp://inst.eecs.berkeley.edu/~cs61c/fa10. Fall Lecture #39. Agenda 2/2/ CS 6C: Great Ideas in Computer Architecture (Machine Structures) Project 3 Speed- up and RAID Instructors: Randy H Katz David A PaGerson hgp://insteecsberkeleyedu/~cs6c/fa 2// Fall 2 - - Lecture #39

More information

SEARCH SEARCH TREE. Node: State in state tree. Root node: Top of state tree

SEARCH SEARCH TREE. Node: State in state tree. Root node: Top of state tree Page 1 Page 1 Page 2 SEARCH TREE SEARCH Node: State in state tree Root node: Top of state tree Children: Nodes that can be reached from a given node in 1 step (1 operator) Expanding: Generating the children

More information

1.1 The size of the search space Modeling the problem Change over time Constraints... 21

1.1 The size of the search space Modeling the problem Change over time Constraints... 21 Introduction : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 1 I What Are the Ages of My Three Sons? : : : : : : : : : : : : : : : : : 9 1 Why Are Some Problems Dicult to Solve? : : :

More information

Analysis and realization of synchronized swimming in URWPGSim2D

Analysis and realization of synchronized swimming in URWPGSim2D International Conference on Manufacturing Science and Engineering (ICMSE 2015) Analysis and realization of synchronized swimming in URWPGSim2D Han Lu1, a *, Li Shu-qin2, b * 1 School of computer, Beijing

More information

Prediction Market and Parimutuel Mechanism

Prediction Market and Parimutuel Mechanism Prediction Market and Parimutuel Mechanism Yinyu Ye MS&E and ICME Stanford University Joint work with Agrawal, Peters, So and Wang Math. of Ranking, AIM, 2 Outline World-Cup Betting Example Market for

More information

AN ISOLATED SMALL WIND TURBINE EMULATOR

AN ISOLATED SMALL WIND TURBINE EMULATOR AN ISOLATED SMALL WIND TURBINE EMULATOR Md. Arifujjaman Graduate Student Seminar: Master of Engineering Faculty of Engineering and Applied Science Memorial University of Newfoundland St. John s, NL, Canada

More information

GOLOMB Compression Technique For FPGA Configuration

GOLOMB Compression Technique For FPGA Configuration GOLOMB Compression Technique For FPGA Configuration P.Hema Assistant Professor,EEE Jay Shriram Group Of Institutions ABSTRACT Bit stream compression is important in reconfigurable system design since it

More information

Paul Burkhardt. May 19, 2016

Paul Burkhardt. May 19, 2016 GraphEx Symposium 2016 U.S. National Security Agency Research Directorate May 19, 2016 Graphs are everywhere! Why graph? Graph-theoretic approaches are appealing to many fields simple data abstraction

More information

Uninformed Search (Ch )

Uninformed Search (Ch ) 1 Uninformed Search (Ch. 3-3.4) 3 Terminology review State: a representation of a possible configuration of our problem Action: -how our agent interacts with the problem -can be different depending on

More information

AccuRAID iscsi Auto-Tiering Best Practice

AccuRAID iscsi Auto-Tiering Best Practice AccuRAID iscsi Auto-Tiering Best Practice Overview From the perspective of storage features, the performance of SSDs are high, but the cost is also high per GB. Relatively speaking, the cost of a traditional

More information

Uninformed search methods

Uninformed search methods Lecture 3 Uninformed search methods Milos Hauskrecht milos@cs.pitt.edu 5329 Sennott Square Announcements Homework 1 Access through the course web page http://www.cs.pitt.edu/~milos/courses/cs2710/ Two

More information

A new take at Adaptive Fast Multipole Methods: application, implementation, and hybrid CPU/GPU parallelism

A new take at Adaptive Fast Multipole Methods: application, implementation, and hybrid CPU/GPU parallelism A new take at Adaptive Fast Multipole Methods: application, implementation, and hybrid CPU/GPU parallelism Stefan Engblom UPMARC @ TDB/IT, Uppsala University KCSE seminar, Stockholm, November 6, 2013 S.

More information

A Novel Decode-Aware Compression Technique for Improved Compression and Decompression

A Novel Decode-Aware Compression Technique for Improved Compression and Decompression A Novel Decode-Aware Compression Technique for Improved Compression and Decompression J. Suresh Babu, K. Tirumala Rao & P. Srinivas Department Of Electronics & Comm. Engineering, Nimra College of Engineering

More information

Stat 139 Homework 3 Solutions, Spring 2015

Stat 139 Homework 3 Solutions, Spring 2015 Stat 39 Homework 3 Solutions, Spring 05 Problem. Let i Nµ, σ ) for i,..., n, and j Nµ, σ ) for j,..., n. Also, assume that all observations are independent from each other. In Unit 4, we learned that the

More information

Uninformed Search (Ch )

Uninformed Search (Ch ) 1 Uninformed Search (Ch. 3-3.4) 7 Small examples 8-Queens: how to fit 8 queens on a 8x8 board so no 2 queens can capture each other Two ways to model this: Incremental = each action is to add a queen to

More information

A Study on Algorithm for Compression and Decompression of Embedded Codes using Xilinx

A Study on Algorithm for Compression and Decompression of Embedded Codes using Xilinx A Study on Algorithm for Compression and Decompression of Embedded Codes using Xilinx M.Mohana Soundarya 1, Dr.S.Jayachitra 2 1 PG Scholar, Department of ECE, Vivekanandha College of Engineering for Women,

More information

Efficient I/O for Computational Grid Applications

Efficient I/O for Computational Grid Applications Efficient I/O for Computational Grid Applications Ron Oldfield hd. Thesis Defense Department of Computer cience, Dartmouth College May 5, 2003 Committee: David Kotz (chair), Thomas Cormen, Robert Gray,

More information

Instruction Cache Compression for Embedded Systems by Yujia Jin and Rong Chen

Instruction Cache Compression for Embedded Systems by Yujia Jin and Rong Chen Instruction Cache Compression for Embedded Systems by Yujia Jin and Rong Chen Abstract Code compression could lead to less overall system die area and therefore less cost. This is significant in the embedded

More information

Introduction to Parallelism in CASTEP

Introduction to Parallelism in CASTEP to ism in CASTEP Phil Hasnip August 2016 Recap: what does CASTEP do? CASTEP solves the Kohn-Sham equations for electrons in a periodic array of nuclei: Ĥ k [ρ]ψ bk = E bk ψ bk where particle b has the

More information

Reducing Code Size with Run-time Decompression

Reducing Code Size with Run-time Decompression Reducing Code Size with Run-time Decompression Charles Lefurgy, Eva Piccininni, and Trevor Mudge Advanced Computer Architecture Laboratory Electrical Engineering and Computer Science Dept. The University

More information

Ocean Fishing Fleet Scheduling Path Optimization Model Research. Based On Improved Ant Colony Algorithm

Ocean Fishing Fleet Scheduling Path Optimization Model Research. Based On Improved Ant Colony Algorithm 4th International Conference on Sensors, Measurement and Intelligent Materials (ICSMIM 205) Ocean Fishing Fleet Scheduling Path Optimization Model Research Based On Improved Ant Colony Algorithm Li Jia-lin2,

More information

Problem Solving Agents

Problem Solving Agents Problem Solving Agents A problem solving agent is one which decides what actions and states to consider in completing a goal Examples: Finding the shortest path from one city to another 8-puzzle Problem

More information

Diver Training Options

Diver Training Options MAIN INTERNET ON-SITE TAILORED PACKAGES INTER-COMPANY Diver Training Options DBI offers a menu of tailored courses Designed for users as well as IT Professionals to learn how to master the functionality

More information

cudimot: A CUDA toolbox for modelling the brain tissue microstructure from diffusion-mri

cudimot: A CUDA toolbox for modelling the brain tissue microstructure from diffusion-mri cudimot: A CUDA toolbox for modelling the brain tissue microstructure from diffusion-mri Moisés Hernández Fernández Istvan Reguly, Mike Giles, Stephen Smith and Stamatios N. Sotiropoulos GPU Technology

More information

Example: sequence data set wit two loci [simula

Example: sequence data set wit two loci [simula Example: sequence data set wit two loci [simulated data] -- 1 Example: sequence data set wit two loci [simula MIGRATION RATE AND POPULATION SIZE ESTIMATION using the coalescent and maximum likelihood or

More information

Cycle Analysis and Construction of Protographs for QC LDPC Codes With Girth Larger Than 12 ½

Cycle Analysis and Construction of Protographs for QC LDPC Codes With Girth Larger Than 12 ½ Cycle Analysis and Construction of Protographs for QC LDPC Codes With Girth Larger Than 2 ½ Sunghwan Kim, Jong-Seon No School of Electrical Eng & Com Sci Seoul National University, Seoul, Korea Email:

More information

Algorithms and Data Structures

Algorithms and Data Structures Algorithms and Data Structures CMPSC 465 LECTURES 22-23 Binary Search Trees Adam Smith S. Raskhodnikova and A. Smith. Based on slides by C. Leiserson and E. Demaine. 1 Heaps: Review Heap-leap-jeep-creep(A):

More information

Computational Models: Class 6

Computational Models: Class 6 Computational Models: Class 6 Benny Chor School of Computer Science Tel Aviv University November 23, 2015 Based on slides by Maurice Herlihy, Brown University, and modifications by Iftach Haitner and Yishay

More information

ECE 697B (667) Spring 2003

ECE 697B (667) Spring 2003 ECE 667 - Synthesis & Verification - Lecture 2 ECE 697 (667) Spring 23 Synthesis and Verification of Digital Systems unctional Decomposition Slides adopted (with permission) from. Mishchenko, 23 Overview

More information

The Constrained Ski-Rental Problem and its Application to Online Cloud Cost Optimization

The Constrained Ski-Rental Problem and its Application to Online Cloud Cost Optimization The Constrained Ski-Rental Problem and its Application to Online Cloud Cost Optimization Ali Khanafer *, Murali Kodialam **, Krishna P. N. Puttaswamy ** * Coordinated Science Laboratory, UIUC ** Bell Laboratories,

More information

Light Loss-Less Data Compression, With GPU Implementation

Light Loss-Less Data Compression, With GPU Implementation Light Loss-Less Data Compression, With GPU Implementation Shunji Funasaka, Koji Nakano, and Yasuaki Ito Department of Information Engineering, Hiroshima University Kagamiyama -4-, Higashihiroshima 739-8527,

More information

Estimating a Toronto Pedestrian Route Choice Model using Smartphone GPS Data. Gregory Lue

Estimating a Toronto Pedestrian Route Choice Model using Smartphone GPS Data. Gregory Lue Estimating a Toronto Pedestrian Route Choice Model using Smartphone GPS Data Gregory Lue Presentation Outline Introduction Background Data Smartphone Data Alternative Route Generation Choice Model Toronto

More information

Urban OR: Quiz 2 Solutions (2003) ( 1 ρ 1 )( 1 ρ 1 ρ 2 ) ( 1 12 )( ) σ S ] 24 [ 2 = 60, 2 2 ] ( 2 ) 3

Urban OR: Quiz 2 Solutions (2003) ( 1 ρ 1 )( 1 ρ 1 ρ 2 ) ( 1 12 )( ) σ S ] 24 [ 2 = 60, 2 2 ] ( 2 ) 3 Problem 1: (a) Wo = ƒ λ Urban OR: Quiz 2 Solutions (2003) 2 2 E [ S i ] 12 1 12 9 i = + = 1 min i = 1 2 60 2 60 2 W W = o 1 q1 = = 1. 25 min ( 1 ρ 1 ) ( 1 12 ) 60 W W = o 1 q2 = = 6. 25 min ( 1 ρ 1 )(

More information

SUPERGEN Wind Wind Energy Technology Rogue Waves and their effects on Offshore Wind Foundations

SUPERGEN Wind Wind Energy Technology Rogue Waves and their effects on Offshore Wind Foundations SUPERGEN Wind Wind Energy Technology Rogue Waves and their effects on Offshore Wind Foundations Jamie Luxmoore PhD student, Lancaster University SUPERGEN Wind II - 7 th training seminar 3 rd - 4 th September

More information

Fast Software-managed Code Decompression

Fast Software-managed Code Decompression Fast Software-managed Code Decompression Charles Lefurgy and Trevor Mudge Advanced Computer Architecture Laboratory Electrical Engineering and Computer Science Dept. The University of Michigan, Ann Arbor

More information

Queue analysis for the toll station of the Öresund fixed link. Pontus Matstoms *

Queue analysis for the toll station of the Öresund fixed link. Pontus Matstoms * Queue analysis for the toll station of the Öresund fixed link Pontus Matstoms * Abstract A new simulation model for queue and capacity analysis of a toll station is presented. The model and its software

More information

Profile-driven Selective Code Compression

Profile-driven Selective Code Compression Profile-driven Selective Code Compression Yuan Xie and Wayne Wolf Electrical Engineering Department Princeton University Princeton, NJ 08540, USA yuanxie,wolf@ee.princeton.edu Haris Lekatsas NEC USA 4

More information

Bayesian Optimized Random Forest for Movement Classification with Smartphones

Bayesian Optimized Random Forest for Movement Classification with Smartphones Bayesian Optimized Random Forest for Movement Classification with Smartphones 1 2 3 4 Anonymous Author(s) Affiliation Address email 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29

More information

Bridge Decomposition of Restriction Measures Tom Alberts joint work with Hugo Duminil (ENS) with lots of help from Wendelin Werner University of

Bridge Decomposition of Restriction Measures Tom Alberts joint work with Hugo Duminil (ENS) with lots of help from Wendelin Werner University of Bridge Decomposition of Restriction Measures Tom Alberts joint work with Hugo Duminil (ENS) with lots of help from Wendelin Werner University of Toronto Self-Avoiding Walk Bridges Self-Avoiding Walk Bridges

More information

Inverting a Batting Average - an Application of Continued Fractions (Preliminary Version)

Inverting a Batting Average - an Application of Continued Fractions (Preliminary Version) Inverting a Batting Average - an Application of Continued Fractions (Preliminary Version) Allen Back August 30, 2000 Contents Introduction and Motivation 2 Continued Fractions 2 2. Comparison of Two Numbers

More information

Provably Secure Camouflaging Strategy for IC Protection

Provably Secure Camouflaging Strategy for IC Protection Provably Secure Camouflaging Strategy for IC Protection Meng Li 1 Kaveh Shamsi 2 Travis Meade 2 Zheng Zhao 1 Bei Yu 3 Yier Jin 2 David Z. Pan 1 1 Electrical and Computer Engineering, University of Texas

More information

Properties of waves. Definition:

Properties of waves. Definition: Properties of waves A wave motion is the ability of transferring energy from one point (the source) to another point without there being any transfer of matter between the two points. Waves are either

More information

Parsimonious Linear Fingerprinting for Time Series

Parsimonious Linear Fingerprinting for Time Series Parsimonious Linear Fingerprinting for Time Series Lei Li, B. Aditya Prakash, Christos Faloutsos School of Computer Science Carnegie Mellon University VLDB 2010 1 L. Li, 2010 VLDB2010, 36 th International

More information

MEMORY is one of the most constrained resources in an

MEMORY is one of the most constrained resources in an 1224 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 28, NO. 8, AUGUST 2009 A Universal Placement Technique of Compressed Instructions for Efficient Parallel Decompression

More information

On the convergence of fitting algorithms in computer vision

On the convergence of fitting algorithms in computer vision On the convergence of fitting algorithms in computer vision N. Chernov Department of Mathematics University of Alabama at Birmingham Birmingham, AL 35294 chernov@math.uab.edu Abstract We investigate several

More information

- 2 - Companion Web Site. Back Cover. Synopsis

- 2 - Companion Web Site. Back Cover. Synopsis Companion Web Site A Programmer's Introduction to C# by Eric Gunnerson ISBN: 1893115860 Apress 2000, 358 pages This book takes the C programmer through the all the details from basic to advanced-- of the

More information

Ch.5 Reliability System Modeling.

Ch.5 Reliability System Modeling. Certified Reliability Engineer. Ch.5 Reliability System Modeling. Industrial Engineering & Management System Research Center. - 1 - Reliability Data. [CRE Primer Ⅵ 2-6] Sources of Reliability Data. Successful

More information

Evaluation of a High Performance Code Compression Method

Evaluation of a High Performance Code Compression Method Evaluation of a High Performance Code Compression Method Charles Lefurgy, Eva Piccininni, and Trevor Mudge EECS Department, University of Michigan 1301 Beal Ave., Ann Arbor, MI 48109-2122 {lefurgy,epiccini,tnm}@eecs.umich.edu

More information

Log2fs or how to achieve IO/s

Log2fs or how to achieve IO/s fs or how to achieve 150.000 IO/s Lazybastard.org September 24, 2010 fs or how to achieve 150.000 IO/s Just a bunch of random hacks Lazybastard.org September 24, 2010 Just a bunch of random hacks Flash

More information

Sample size for estimating the concentration of. organisms in ballast water

Sample size for estimating the concentration of. organisms in ballast water Sample size for estimating the concentration of organisms in ballast water Eliardo G. Costa,, Rubens M. Lopes, and Julio M. Singer Departamento de Estatística, and Departamento de Oceanografia Biológica,

More information

Numerical study of variable lung ventilation strategies

Numerical study of variable lung ventilation strategies Numerical study of variable lung ventilation strategies Reena Yadav and Mayur Ghatge Centre for Information Communication Technology, Indian Institute of Technology Jodhpur, India Kirankumar Hiremath Centre

More information

Delta Compressed and Deduplicated Storage Using Stream-Informed Locality

Delta Compressed and Deduplicated Storage Using Stream-Informed Locality Delta Compressed and Deduplicated Storage Using Stream-Informed Locality Philip Shilane, Grant Wallace, Mark Huang, & Windsor Hsu Backup Recovery Systems Division EMC Corporation Motivation and Approach

More information

Table S1. Comparison between each data point and the posterior mean estimates, for each of

Table S1. Comparison between each data point and the posterior mean estimates, for each of Table S1. Comparison between each point and the posterior mean estimates, for each of Risk group size % Males models M1 to M4. The posterior mean deviance is shown in parentheses Data Baseline model Revised

More information

Fast Floating Point Compression on the Cell BE Processor

Fast Floating Point Compression on the Cell BE Processor Fast Floating Point Compression on the Cell BE Processor Ajith Padyana, T.V. Siva Kumar, P.K.Baruah Sri Satya Sai University Prasanthi Nilayam - 515134 Andhra Pradhesh, India ajith.padyana@gmail.com, tvsivakumar@gmail.com,

More information

SIDDHARTH INSTITUTE OF ENGINEERING & TECHNOLOGY :: PUTTUR (AUTONOMOUS) Siddharth Nagar, Narayanavanam Road QUESTION BANK (DESCRIPTIVE)

SIDDHARTH INSTITUTE OF ENGINEERING & TECHNOLOGY :: PUTTUR (AUTONOMOUS) Siddharth Nagar, Narayanavanam Road QUESTION BANK (DESCRIPTIVE) Subject with Code : Data Structures(16MC806) Course & Specialization: MCA UNIT I Sorting, Searching and Directories 1. Explain how to sort the elements by using insertion sort and derive time complexity

More information

Integrating Best of Breed Outage Management Systems with Mobile Data Systems. Abstract

Integrating Best of Breed Outage Management Systems with Mobile Data Systems. Abstract Integrating Best of Breed Outage Management Systems with Mobile Data Systems Donald Shaw Partner ExtenSys Inc. 31 Plymbridge Crescent North York, ON M2P 1P4 Canada Telephone: (416) 481-1546 Fax: (416)

More information

Blocking time reduction for level crossings using the genetic algorithm

Blocking time reduction for level crossings using the genetic algorithm Computers in Railways X 299 Blocking time reduction for level crossings using the genetic algorithm Y. Noguchi 1, H. Mochizuki 1, S. Takahashi 1, H. Nakamura 1, S. Kaneko 1 & M. Sakai 2 1 Nihon University,

More information

GRAPH COLORING ALGORITHMS FOR FAST EVALUATION OF CURTIS DECOMPOSITIONS

GRAPH COLORING ALGORITHMS FOR FAST EVALUATION OF CURTIS DECOMPOSITIONS GRPH COLORING LGORITHMS FOR FST EVLUTION OF CURTIS DECOMPOSITIONS Marek Perkowski, Rahul Malvi, Stan Grygiel, Mike Burns, and lan Mishchenko Portland State University, Department of Electrical and Computer

More information

Support Vector Machines: Optimization of Decision Making. Christopher Katinas March 10, 2016

Support Vector Machines: Optimization of Decision Making. Christopher Katinas March 10, 2016 Support Vector Machines: Optimization of Decision Making Christopher Katinas March 10, 2016 Overview Background of Support Vector Machines Segregation Functions/Problem Statement Methodology Training/Testing

More information

Efficient Minimization of Routing Cost in Delay Tolerant Networks

Efficient Minimization of Routing Cost in Delay Tolerant Networks Computer Science Department Christos Tsiaras tsiaras@aueb.gr Master Thesis Presentation (short edition) Efficient Minimization of Routing Cost in Delay Tolerant Networks Supervised by Dr. Stavros Toumpis

More information

Compact Binaries with Code Compression in a Software Dynamic Translator

Compact Binaries with Code Compression in a Software Dynamic Translator Compact Binaries with Code Compression in a Software Dynamic Translator Stacey Shogan and Bruce R. Childers Department of Computer Science, University of Pittsburgh Pittsburgh, PA 15260 USA {sasst118,

More information

MEETPLANNER DESIGN DOCUMENT IDENTIFICATION OVERVIEW. Project Name: MeetPlanner. Project Manager: Peter Grabowski

MEETPLANNER DESIGN DOCUMENT IDENTIFICATION OVERVIEW. Project Name: MeetPlanner. Project Manager: Peter Grabowski MEETPLANNER DESIGN DOCUMENT IDENTIFICATION Project Name: MeetPlanner Project Manager: Peter Grabowski OVERVIEW Swim coaches are often faced with a dilemma while planning swim meets. On the one hand, they

More information

AGA Swiss McMahon Pairing Protocol Standards

AGA Swiss McMahon Pairing Protocol Standards AGA Swiss McMahon Pairing Protocol Standards Final Version 1: 2009-04-30 This document describes the Swiss McMahon pairing system used by the American Go Association (AGA). For questions related to user

More information

A 28nm SoC with a 1.2GHz 568nJ/ Prediction Sparse Deep-Neural-Network Engine with >0.1 Timing Error Rate Tolerance for IoT Applications

A 28nm SoC with a 1.2GHz 568nJ/ Prediction Sparse Deep-Neural-Network Engine with >0.1 Timing Error Rate Tolerance for IoT Applications A 28nm SoC with a 1.2GHz 568nJ/ Prediction Sparse Deep-Neural-Network Engine with >0.1 Timing Error Rate Tolerance for IoT Applications Paul Whatmough, S. K. Lee, H. Lee, S. Rama, D. Brooks, G.-Y. Wei

More information

IA-64: Advanced Loads Speculative Loads Software Pipelining

IA-64: Advanced Loads Speculative Loads Software Pipelining Presentation stolen from the web (with changes) from the Univ of Aberta and Espen Skoglund and Thomas Richards (47 alum) and Our textbook s authors : Advanced Loads Speculative Loads Software Pipelining

More information

MODELLING THE EFFECT OF HEALTH RISK PERCEPTION ON

MODELLING THE EFFECT OF HEALTH RISK PERCEPTION ON MODELLING THE EFFECT OF HEALTH RISK PERCEPTION ON PREFERENCES AND CHOICE SET FORMATION OVER TIME: RECREATIONAL HUNTING SITE CHOICE AND CHRONIC WASTING DISEASE THUY TRUONG VIC ADAMOWICZ PETER BOXALL Resource

More information

Optimizing Cyclist Parking in a Closed System

Optimizing Cyclist Parking in a Closed System Optimizing Cyclist Parking in a Closed System Letu Qingge, Killian Smith Gianforte School of Computing, Montana State University, Bozeman, MT 59717, USA Abstract. In this paper, we consider the two different

More information

Integration of human factors in pedestrian crossing choice models

Integration of human factors in pedestrian crossing choice models Integration of human factors in pedestrian crossing choice models Eleonora Papadimitriou, PhD Workshop on Observation and Modelling of Pedestrian Behaviour - IFSTTAR, 4 May 2014 Background Analysis of

More information

Uninformed search methods

Uninformed search methods Lecture 3 Uninformed search methods Milos Hauskrecht milos@cs.pitt.edu 5329 Sennott Square Announcements Homework assignment 1 is out Due on Tuesday, September 12, 2017 before the lecture Report and programming

More information

Modelling the distribution of first innings runs in T20 Cricket

Modelling the distribution of first innings runs in T20 Cricket Modelling the distribution of first innings runs in T20 Cricket James Kirkby The joy of smoothing James Kirkby Modelling the distribution of first innings runs in T20 Cricket The joy of smoothing 1 / 22

More information

ErratA. Ordinary Differential Equations: An Introduction to the Fundamentals 2014 Edition (August 30, 2015)

ErratA. Ordinary Differential Equations: An Introduction to the Fundamentals 2014 Edition (August 30, 2015) ErratA IN Ordinary Differential Equations: An Introduction to the Fundamentals 2014 Edition (August 30, 2015) Notes: Text from the book is printed using this font (Times Roman) Comments are printed using

More information

2.5. All games and sports have specific rules and regulations. There are rules about. Play Ball! Absolute Value Equations and Inequalities

2.5. All games and sports have specific rules and regulations. There are rules about. Play Ball! Absolute Value Equations and Inequalities Play Ball! Absolute Value Equations and Inequalities.5 LEARNING GOALS In this lesson, you will: Understand and solve absolute values. Solve linear absolute value equations. Solve and graph linear absolute

More information

Compression of FPGA Bitstreams Using Improved RLE Algorithm

Compression of FPGA Bitstreams Using Improved RLE Algorithm International Journal of Scientific & Engineering Research, Volume 4, Issue 6, June-2013 1162 Compression of FPGA Bitstreams Using Improved RLE Algorithm P.Hemnath V.Prabhu Abstract - FPGA are configured

More information

COMPRESSORS WITH SIDE STREAM

COMPRESSORS WITH SIDE STREAM NEW CONTROL PLACE METHOD FOR FOR TITLE FIXED SPEED AUTHORS COMPRESSORS WITH SIDE STREAM David Rossi, GE Oil & Gas Laurence Casali, GE Oil & Gas Marco Pelella, GE Oil & Gas Authors David is presently a

More information

1. What function relating the variables best describes this situation? 3. How high was the balloon 5 minutes before it was sighted?

1. What function relating the variables best describes this situation? 3. How high was the balloon 5 minutes before it was sighted? Hot-Air Balloon At the West Texas Balloon Festival, a hot-air balloon is sighted at an altitude of 800 feet and appears to be descending at a steady rate of 20 feet per minute. Spectators are wondering

More information

Flyweight Pattern. Flyweight: Intent. Use sharing to support large numbers of fine-grained objects efficiently. CSIE Department, NTUT Chien-Hung Liu

Flyweight Pattern. Flyweight: Intent. Use sharing to support large numbers of fine-grained objects efficiently. CSIE Department, NTUT Chien-Hung Liu Flyweight Pattern CSIE Department, NTUT Chien-Hung Liu Flyweight: Intent Use sharing to support large numbers of fine-grained objects efficiently 1 Flyweight: Motivation (1) Some applications could benefit

More information

Fishery Participation and Location Choice

Fishery Participation and Location Choice The West Coast Salmon Fishery Smit Vasquez Caballero 1 Gil Sylvia 1 Dan Holland 2 1 Department of Applied Economics 2 NOAA Northwest Fisheries Science Center March, 2017 Motivation: Fisherman Behavior

More information

Compact Binaries with Code Compression in a Software Dynamic Translator

Compact Binaries with Code Compression in a Software Dynamic Translator Compact Binaries with Code Compression in a Software Dynamic Translator Stacey Shogan and Bruce R. Childers Department of Computer Science University of Pittsburgh Pittsburgh, PA 15260 {sasst118, childers}@cs.pitt.edu

More information

Introduction to Interprocess Communication. Introduction to Interprocess Communication

Introduction to Interprocess Communication. Introduction to Interprocess Communication Introduction to Interprocess Communication Saverio Giallorenzo sgiallor@cs.unibo.it DISI@Unibo 1 The rocess Text Data Heap Stack C AddNumbers: std clc pushf.top i = 3,14 e = 2,71 y = hi x = 5 SUB1 MAIN

More information

Information Systems ISM 3011

Information Systems ISM 3011 Thomson Course Technology 1 Information Systems ISM 3011 Telecommunications and Networks Unit 6A Chapter 6 Dr. Martin Hepp 1 Dr. Martin Hepp 2 Principles and Learning Objectives Effective communication

More information

Minimum Mean-Square Error (MMSE) and Linear MMSE (LMMSE) Estimation

Minimum Mean-Square Error (MMSE) and Linear MMSE (LMMSE) Estimation Minimum Mean-Square Error (MMSE) and Linear MMSE (LMMSE) Estimation Outline: MMSE estimation, Linear MMSE (LMMSE) estimation, Geometric formulation of LMMSE estimation and orthogonality principle. Reading:

More information

Appendix for: Product Differentiation and Mergers in the Carbonated Soft Drink Industry

Appendix for: Product Differentiation and Mergers in the Carbonated Soft Drink Industry Appendix for: Product Differentiation and Mergers in the Carbonated Soft Drink Industry Jean-Pierre Dubé 1 February 2004 1 Graduate School of Business, University of Chicago, jdube@gsb.uchicago.edu. 1

More information

A Bailout Protocol for Mixed Criticality Systems

A Bailout Protocol for Mixed Criticality Systems A Bailout Protocol for Mixed Criticality Systems Iain Bate, Alan Burns, Robert I. Davis Department of Computer Science, University of York, York, UK. email: {iain.bate, alan.burns, rob.davis}@york.ac.uk

More information

A Behavioral Theory. Teck H. Ho. & National University of Singapore. Joint Work with Noah Lim, Houston Juanjuan Zhang, MIT. July 2008 Teck H.

A Behavioral Theory. Teck H. Ho. & National University of Singapore. Joint Work with Noah Lim, Houston Juanjuan Zhang, MIT. July 2008 Teck H. Designing Pricing Contracts for Homo Sapiens: A Behavioral Theory Teck H. Ho University of California, Berkeley & National University of Singapore Joint Work with Noah Lim, Houston Juanjuan Zhang, MIT

More information

Spider Search: An Efficient and Non-Frontier-Based Real-Time Search Algorithm

Spider Search: An Efficient and Non-Frontier-Based Real-Time Search Algorithm International Journal of Computer Information Systems and Industrial Management Applications (IJCISIM) ISSN: 2150-7988 Vol.2 (2010), pp.234-242 http://www.mirlabs.org/ijcisim Spider Search: An Efficient

More information

A ligand conformation preorganization approach to construct a. copper-hexacarboxylate framework with a novel topology for

A ligand conformation preorganization approach to construct a. copper-hexacarboxylate framework with a novel topology for Electronic Supplementary Material (ESI) for Inorganic Chemistry Frontiers. This journal is the Partner rganisations 2018 A ligand conformation preorganization approach to construct a copper-hexacarboxylate

More information

The Mobility and Safety of Walk-and-Ride Systems

The Mobility and Safety of Walk-and-Ride Systems The Mobility and Safety of Walk-and-Ride Systems By Dr. Hugh Medal Department of Industrial and Systems Engineering Mississippi State University (MSU) Phone: 662-325-3932 Email: hugh.medal@msstate.edu

More information

Bulgarian Olympiad in Informatics: Excellence over a Long Period of Time

Bulgarian Olympiad in Informatics: Excellence over a Long Period of Time Olympiads in Informatics, 2017, Vol. 11, 151 158 2017 IOI, Vilnius University DOI: 10.15388/ioi.2017.12 151 Bulgarian Olympiad in Informatics: Excellence over a Long Period of Time Emil KELEVEDJIEV 1,

More information

Homework: Turn in Tortoise & the Hare

Homework: Turn in Tortoise & the Hare Your Learning Goal: After students experienced speed in the Runner s Speed Lab, they will be able to describe how different speeds look like on a graph with 100% accuracy. Table of Contents: Notes: Graphs

More information