CBFM cutted Bloom filter matrix for multi-dimensional membership query
|
|
- Aldous Burns
- 5 years ago
- Views:
Transcription
1 37 3 Vol.37 No Journal on Communications March 2016 doi: /j.issn x CBFM 1 1, CBFM(cutted Bloom filter matrix) BFM(Bloom filter matrix) CBFM CBFM CBFM BFM 3 TP393 A CBFM cutted Bloom filter matrix for multi-dimensional membership query WANG Yong 1, YUN Xiao-chun 1,2, WANG Shu-peng 1, WANG Xi 1 (1.Institute of Information Engineering, Chinese Academy of Sciences, Beijing , China; 2. National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing , China) Abstract: In order to improve the flexibility and accuracy of mu i-dimensional membership query, a new indexing structure called CBFM(cutted Bloom filter matrix) was proposed. CBFM built the bit matrix by the Cartesian product of different bloom filters, each representing one attribute of primary data. In this way, the proposed matrix supported by-attribute membership query. Besides, the attribute combinations in the bit matrix could be reduced and weighted on demand to further enhance memory utilization rate. Theoretical analysis proves that CBFM utilizes memory more efficiently than BFM, the current state of art. Experiments also show that, on the scenario of memory size fixed, the false positive rate of CBFM is lower than that of all other indexin ethods. Especially on the scenario of memory constrained, the false positive rate of CBFM can be 3 orders of magnitude lower than that of BFM(Bloom filter matrix) indexing method. CBFM is an accurate data structure for multi-dimensional membership query. Key words: query algorithm, multi-dimensional membership query, Bloom filter, bit matrix 1 Web2.0 true/false [2~6] [1] [7] PB No , No , No , No ( 863 ) No. 2012AA013001, No.2013AA013205, No.2013AA01A213 Foundation Items: The National Natural Science Foundation of China (No , No , No , No ), The National High Technology Research and Development Program of China (863 Program) (No.2012AA013001, No.2013AA013205, No.2013AA01A213)
2 Google BigTable [2] HBase [3] CBFM CBFM MapReduce [4] Hive [5] Impala [6] 2) CBFM BFM CBFM TCP 3) CBFM [7] [8,9] CBFM BFM [10,11] [12] 3 CBFM [8, 9] [10,11] 2 [12] MDBF [13] CMDBF [14] 2.1 [12] SBF 1 BFM [14] S ={x 1, x 2,L, x n } n k (h 1, h 2,L, h k ) m x i h j (x i ) (1 j k) BF h j (x i ) 1 xk h 1 (x), h 2 (x),l, h k (x) (schema-free) 1 x x CBFM cutted Bloom filter matrix CBFM 1)
3 3 CBFM 141 O(n) O(log n) (false positive rate) 2.2 SBF EDMI Guo [13] KD MDBF ZPR MD-HBase [11] Z Z-Value CMDBF [14] MDBF KD CBF 2 MDBF 1 2 CBF {n, m, k, L} CMDBF ( f BF (m, k, n)) L +1 MDBF ( f BF (m, k, n)) L MDBF CMDBF Adina [18] 2015 [14] Bloofi B+ (BFM) Flat-Bloofi KEY BF-Matrix [19] BFM 1 B+ BFM 3 CBFM 3.1 [9] Zhou [10] [15] [16] (CBF) S ={x 1, x 2,L, x n } n x i, x i d, x i = [x i1, x i 2,L, x id ] BFM x = [x 1, x 2,L, x d ], 1 j d : x j x = [x [8,9] 1, x 2,L, x d ], [10,11] 1 j d : x [18,19] j true/ false q[q [8] ZFS 1,q 2,L,q d ] S : x j (1 j d ), q j = x j true q[q 1, q 2,L, q d ] S : x j (1 j d), q j x j false
4 CBFM CBFM 1 1 d n e c CBFM r i, c i R,1 i c r i d i=1 m M 3 CBFM CBFM 4 CBFM 2 CBFM 2 CBFM 2(a) CBFM 1 elementinsert(object Element) : A=(a 1,a 2,, a d) :VOID begin assign 0 to ResultArray; for each attribute a x in A { for each hashfunction hashx in HashSet { record hashx(a x) to hashperfield[][]; } // k for each DC of (2 d - 1) combinations { for each hash value hashv in hashperfield { BFM 2(b) YoZ YoZ // calculateindex invoke calculateindex(dc, hashv, ResultArray); } // 1 for each idx of ResultArray { set bit of ResultArray [idx] to 1 end elementinsert XYZ 3 CBFM A(A x, A y ) 4 CBFM CBFM CBFM 5 CBFM WCBFM -Weighted CBFM
5 3 CBFM elementsearch(object Element) : A=(a 1,a 2,, a d), SDC null : begin assign 0 to ResultArray; for each field a x in A { for each hashfunction hashx in HashSet { record hashx(a x) to hashperfield[][]; } // k for each EDC(does not match any dimension combinations to cut off) of SDC { for each hash value hashv in hashperfield { // calculateindex invoke calculateindex(edc, hashv, ResultArray); } for each idx of ResultArray { if bit of ResultArray [idx] equals to 0 { return FALSE; } return TRUE; end elementsearch 5 CBFM 3.3 S ={x 1, x 2,L, x n } x i, x i d CBFM n e d c k r i c d 2 d 1 :VOID if DC match some dimension combinations to cut off { f =e end calculateindex; // [17] kn 1 f BF (m, k, n) = (1 (1 ) kn ) k 1 e m (1) m f n k m k = lbf (2) 1 m = lbelb n (3) f k m+1 r i r i (m +1) r i m r i CBFM (4) BFM m d c d i=1 M = (m+1) 2 d 1 BFM CBFM e r i c [(m + 1) r i m r i ] (4) i=1 d A = (a 1, a 2,L, a d ) CBFM k dk c d d 6 2d 2 c k 2 CBFM O((d + d 3 2 c )k ) d 3 calculateindex(object DC, Object hashv, Object ResultArray) : A=(a 1,a 2,,a d); ; begin } assign 0 to currentbitindex; // DC for each dimension a x in DC(from high to low) { // a x split a x to special bit array and normal bits array; calculate non-bulk offset in special bit array, and add it to currentbitindex; calculate non-bulk offset in normal bits array, and add offset*(hashv[a x]- 1) to currentbitindex; add currentbitindex to ResultArray; end calculateindex CBFM
6 n M 2 1 MB a =0 CBFM 2 (0x x3 1 2) CBFM BFM 14 CBFM 3 n=1 000 CBFM BFM 3 (M=16 MB) 7(a) CBFM SBF BFM CBFM CBF 2 ( M=1 MB) e d c n(bfm) n(cbfm) (0x5,0x3) (0x5,0x3) (0x5,0x3) (0x5,0x3) (0x5,0x3) a =1 6 (k=6) CMDBF MDBF a a =1 SBF BFM CBFM CBF CMDBF MDBF 3 SBF BFM CBFM MDBF a 1 3 ( n=1 000) e d c M-BFM/MB M-CBFM/MB (0x5,0x3) (0x5,0x3) (0x5,0x3) (0x5,0x3) (0x5,0x3) CBFM SBF MDBF CMDBF BFM CBF 4.1 SBF [12] MDBF [13] CMDBF [14] CBF [15] BFM [16] CBFM 6 CBFM 1 32 {0,2 32-1} SBF CMDBF MDBF BFM CBFM CBF 7 CBFM
7 3 CBFM 145 7(b) BFM CBF 100% CBFM ( 0.21%) BFM 3 CBFM 2 BFM 3 CBFM 9 9 WCBFM CBFM 2 CBFM 1.69 DNS 2 { IP IP CBFM } 8(a) SBF CBFM BFM { IP } 8(b) CBFM CBFM 8 CBFM CBFM BFM MDBF CBF 2~3 CBFM
8 CBFM CBFM CBFM CBFM d={1,2,3,4} n=100 CBFM e = CBFM CBFM CBFM CBFM 3 4 BFM 5 CBFM 1 BFM CBFM BFM 4 SBF [12] MDBF [13] CMDBF [14] CBF [15] BFM CBFM 2 BFM [16] CBFM 12 CBFM CBFM(Cutted Bloom Filter Matrix)
9 3 CBFM 147 CBFM, 2008, 29(1): [1] LYNCH C. Big data: how do your data grow[j]. Nature, 2008, 455(7209): [2] CHANG F, DEAN J, GHEMAWAT S, et al. Bigtable: a distributed storage system for structured data[j]. ACM Transactions on Computer Systems (TOCS), 2008, 26(2): 4. [3] VORA M N. Hadoop-HBase for large-scale data[j]. IEEE Computer Science and Network Technology, 2011, (1): [4] DEAN J, GHEMAWAT S. MapReduce: simplified data processing on large clusters[j]. Communications of the ACM, 2008, 51(1): [5] THUSOO A, SARMA J S, JAIN N, et al. Hive: a warehousin solution over a map-reduce framework[j]. Proceedings of the VLDB Endowment, 2009, 2(2): [6] KORNACKER M, BEHM A, BITTORF V, et al. Impala: a modern, open-source SQL engine for Hadoop[C]. Conference on Innovative Data Systems Research (CIDR'15). c2015. [7] TARKOMA S, ROTHENBERG C E, LAGERSPETZ E. Theory and practice of bloom filters for distributed systems[j]. Communications Surveys & Tutorials, IEEE, 2012, 14(1): [8] RODEH O, TEPERMAN A. zfs-a scalable distributed file system using object disks[c]//mass Storage Systems and Technologies (MSST), c2003: [9] DEBNATH B, SENGUPTA S, LI J. FlashStore: high throughput persistent key-value store[j]. Proceedings of the VLDB Endowment, 2010, 3(1-2): [10] ZHOU X, ZHANG X, WANG Y, et al. Efficient distributed multi-dimensional index for big data management[m]. Springer Berlin Heidelberg, [11] NISHIMURA S, DAS S, AGRAWAL D, et al. MD-HBase: a scalable multi-dimensional data infrastructure for location aware services[j]. IEEE Mobile Data Management (MDM), 2011, 1: [12] BLOOM B H. Space/time trade-offs in hash coding with allowable errors[j]. Communications of the ACM, 1970, 13(7): [13] GUO D, WU J, CHEN H, et al. Theory and network applications of dynamic bloom filters[c]//infocom. c2006: [14],,,. XIE K, QIN Z, WEN J G, et al.combine multi-dimension Bloom filter for membership queries[j]. Journal on Communications ( 1) : [15] WANG Z, LUO T, XU G, et al. A new indexing technique for supporting by-attribute membership query of multidimensional data[m]. Springer Berlin Heidelberg, [16] WANG Z, LUO T, XU G, et al. The application of cartesian-join of bloom filters to supporting membership query of multid mensional data[c]//ieee Big Data. c2014: [17] BRODER A, MITZENMACHER M. Network applications of bloom filters: a survey[j]. Internet Mathematics, 2004, 1(4): [18] CHENG X, LI H, WANG Y, et al. BF-matrix: a secondary index for the cloud storage[m]. Springer International Publishing, [19] CRAINICEANU A, LEMIRE D. Bloofi: multidimensional Bloom filters[j]. Information Systems, 2015, 54:
Introduction to Randomized Algorithms III
Introduction to Randomized Algorithms III Joaquim Madeira Version 0.1 November 2017 U. Aveiro, November 2017 1 Overview Probabilistic counters Counting with probability 1 / 2 Counting with probability
More informationLecture 24: Bloom Filters. Wednesday, June 2, 2010
Lecture 24: Bloom Filters Wednesday, June 2, 2010 1 Topics for the Final SQL Conceptual Design (BCNF) Transactions Indexes Query execution and optimization Cardinality Estimation Parallel Databases 2 Lecture
More informationAn Early Traffic Sampling Algorithm
An Early Traffic Sampling Algorithm Hou Ying ( ), Huang Hai, Chen Dan, Wang ShengNan, and Li Peng National Digital Switching System Engineering & Techological R&D center, ZhengZhou, 450002, China ndschy@139.com,
More informationImage information measurement for video retrieval
37 2 Vol.37 No.2 2016 2 Journal on Communications Feruary 2016 doi:10.11959/j.issn.1000-436x.2016033 1,2 3,4 3,4 3,4 1,2 (1100193 2 100029 3 100190 4 100190 SEII map 4.4% 1.5 TP37 A Image information measurement
More informationBloom Filters, general theory and variants
Bloom Filters: general theory and variants G. Caravagna caravagn@cli.di.unipi.it Information Retrieval Wherever a list or set is used, and space is a consideration, a Bloom Filter should be considered.
More informationAcceptably inaccurate. Probabilistic data structures
Acceptably inaccurate Probabilistic data structures Hello Today's talk Motivation Bloom filters Count-Min Sketch HyperLogLog Motivation Tape HDD SSD Memory Tape HDD SSD Memory Speed Tape HDD SSD Memory
More informationBloom Filter Redux. CS 270 Combinatorial Algorithms and Data Structures. UC Berkeley, Spring 2011
Bloom Filter Redux Matthias Vallentin Gene Pang CS 270 Combinatorial Algorithms and Data Structures UC Berkeley, Spring 2011 Inspiration Our background: network security, databases We deal with massive
More informationPAPER Adaptive Bloom Filter : A Space-Efficient Counting Algorithm for Unpredictable Network Traffic
IEICE TRANS.??, VOL.Exx??, NO.xx XXXX x PAPER Adaptive Bloom Filter : A Space-Efficient Counting Algorithm for Unpredictable Network Traffic Yoshihide MATSUMOTO a), Hiroaki HAZEYAMA b), and Youki KADOBAYASHI
More informationMultiple-Site Distributed Spatial Query Optimization using Spatial Semijoins
11 Multiple-Site Distributed Spatial Query Optimization using Spatial Semijoins Wendy OSBORN a, 1 and Saad ZAAMOUT a a Department of Mathematics and Computer Science, University of Lethbridge, Lethbridge,
More informationBCN: Expansible Network Structures for Data Centers Using Hierarchical Compound Graphs
This paper was presented as part of the Mini-Conference at IEEE INFOCOM 011 BCN: Expansible Network Structures for Data Centers Using Hierarchical Compound Graphs Deke Guo, Tao Chen, Dan Li, Yunhao Liu,
More informationCS 591, Lecture 7 Data Analytics: Theory and Applications Boston University
CS 591, Lecture 7 Data Analytics: Theory and Applications Boston University Babis Tsourakakis February 13th, 2017 Bloom Filter Approximate membership problem Highly space-efficient randomized data structure
More informationWeighted Bloom Filter
Weighted Bloom Filter Jehoshua Bruck Jie Gao Anxiao (Andrew) Jiang Department of Electrical Engineering, California Institute of Technology. bruck@paradise.caltech.edu. Department of Computer Science,
More informationPart 1: Hashing and Its Many Applications
1 Part 1: Hashing and Its Many Applications Sid C-K Chau Chi-Kin.Chau@cl.cam.ac.u http://www.cl.cam.ac.u/~cc25/teaching Why Randomized Algorithms? 2 Randomized Algorithms are algorithms that mae random
More informationVisualizing Big Data on Maps: Emerging Tools and Techniques. Ilir Bejleri, Sanjay Ranka
Visualizing Big Data on Maps: Emerging Tools and Techniques Ilir Bejleri, Sanjay Ranka Topics Web GIS Visualization Big Data GIS Performance Maps in Data Visualization Platforms Next: Web GIS Visualization
More informationarxiv: v1 [cs.ds] 3 Feb 2018
A Model for Learned Bloom Filters and Related Structures Michael Mitzenmacher 1 arxiv:1802.00884v1 [cs.ds] 3 Feb 2018 Abstract Recent work has suggested enhancing Bloom filters by using a pre-filter, based
More informationLecture and notes by: Alessio Guerrieri and Wei Jin Bloom filters and Hashing
Bloom filters and Hashing 1 Introduction The Bloom filter, conceived by Burton H. Bloom in 1970, is a space-efficient probabilistic data structure that is used to test whether an element is a member of
More informationThe Challenge of Geospatial Big Data Analysis
288 POSTERS The Challenge of Geospatial Big Data Analysis Authors - Teerayut Horanont, University of Tokyo, Japan - Apichon Witayangkurn, University of Tokyo, Japan - Shibasaki Ryosuke, University of Tokyo,
More informationSecure Indexes* Eu-Jin Goh Stanford University 15 March 2004
Secure Indexes* Eu-Jin Goh Stanford University 15 March 2004 * Generalizes an early version of my paper How to search on encrypted data on eprint Cryptology Archive on 7 October 2003 Secure Indexes Data
More informationCS 347. Parallel and Distributed Data Processing. Spring Notes 11: MapReduce
CS 347 Parallel and Distributed Data Processing Spring 2016 Notes 11: MapReduce Motivation Distribution makes simple computations complex Communication Load balancing Fault tolerance Not all applications
More informationScalable 3D Spatial Queries for Analytical Pathology Imaging with MapReduce
Scalable 3D Spatial Queries for Analytical Pathology Imaging with MapReduce Yanhui Liang, Stony Brook University Hoang Vo, Stony Brook University Ablimit Aji, Hewlett Packard Labs Jun Kong, Emory University
More informationStudy on Coal Methane Adsorption Behavior Under Variation Temperature and Pressure-Taking Xia-Yu-Kou Coal for Example
International Journal of Oil, Gas and Coal Engineering 2018; 6(4): 60-66 http://www.sciencepublishinggroup.com/j/ogce doi: 10.11648/j.ogce.20180604.13 ISSN: 2376-7669 (Print); ISSN: 2376-7677(Online) Study
More informationAlgorithms for Data Science
Algorithms for Data Science CSOR W4246 Eleni Drinea Computer Science Department Columbia University Tuesday, December 1, 2015 Outline 1 Recap Balls and bins 2 On randomized algorithms 3 Saving space: hashing-based
More informationCSCB63 Winter Week 11 Bloom Filters. Anna Bretscher. March 30, / 13
CSCB63 Winter 2019 Week 11 Bloom Filters Anna Bretscher March 30, 2019 1 / 13 Today Bloom Filters Definition Expected Complexity Applications 2 / 13 Bloom Filters (Specification) A bloom filter is a probabilistic
More informationComposite Quantization for Approximate Nearest Neighbor Search
Composite Quantization for Approximate Nearest Neighbor Search Jingdong Wang Lead Researcher Microsoft Research http://research.microsoft.com/~jingdw ICML 104, joint work with my interns Ting Zhang from
More informationCIEMA: A Configurable Integrated Enterprise Model Architecture
CIEMA: A Configurable Integrated Enterprise Model Architecture Yihang Luo 1, Yushun Fan 2 1 CIMS Research Center, Tsinghua University, Beijing, Chinalyh861001@sohu.com 2 CIMS Research Center, Tsinghua
More informationCSE 190, Great ideas in algorithms: Pairwise independent hash functions
CSE 190, Great ideas in algorithms: Pairwise independent hash functions 1 Hash functions The goal of hash functions is to map elements from a large domain to a small one. Typically, to obtain the required
More informationA REVIEW ON SPATIAL DATA AND SPATIAL HADOOP
International Journal of Latest Trends in Engineering and Technology Vol.(8)Issue(1), pp.545-550 DOI: http://dx.doi.org/10.21172/1.81.071 e-issn:2278-621x A REVIEW ON SPATIAL DATA AND SPATIAL HADOOP Kirandeep
More information1 Probability Review. CS 124 Section #8 Hashing, Skip Lists 3/20/17. Expectation (weighted average): the expectation of a random quantity X is:
CS 24 Section #8 Hashing, Skip Lists 3/20/7 Probability Review Expectation (weighted average): the expectation of a random quantity X is: x= x P (X = x) For each value x that X can take on, we look at
More informationLecture 4 Thursday Sep 11, 2014
CS 224: Advanced Algorithms Fall 2014 Lecture 4 Thursday Sep 11, 2014 Prof. Jelani Nelson Scribe: Marco Gentili 1 Overview Today we re going to talk about: 1. linear probing (show with 5-wise independence)
More informationHash tables. Hash tables
Dictionary Definition A dictionary is a data-structure that stores a set of elements where each element has a unique key, and supports the following operations: Search(S, k) Return the element whose key
More informationBig Data Infrastructure CS 489/698 Big Data Infrastructure (Winter 2016)
Big Data Infrastructure CS 489/698 Big Data Infrastructure (Winter 2016) Week 12: Real-Time Data Analytics (2/2) March 31, 2016 Jimmy Lin David R. Cheriton School of Computer Science University of Waterloo
More informationAn Implementation of an Address Generator Using Hash Memories
An Implementation of an Address Generator Using Memories Tsutomu Sasao and Munehiro Matsuura Department of Computer Science and Electronics, Kyushu Institute of Technology, Iizuka 820-8502, Japan Abstract
More informationNanosheet-Constructed Porous BiOCl with Dominant {001} Facets for Superior Photosensitized Degradation
Electronic Supplementary Information Nanosheet-Constructed Porous BiOCl with Dominant {001} Facets for Superior Photosensitized Degradation Dong-Hong Wang, ab Gui-Qi Gao, b Yue-Wei Zhang, a Li-Sha Zhou,
More informationMulti-join Query Evaluation on Big Data Lecture 2
Multi-join Query Evaluation on Big Data Lecture 2 Dan Suciu March, 2015 Dan Suciu Multi-Joins Lecture 2 March, 2015 1 / 34 Multi-join Query Evaluation Outline Part 1 Optimal Sequential Algorithms. Thursday
More informationRESEARCH ON THE DISTRIBUTED PARALLEL SPATIAL INDEXING SCHEMA BASED ON R-TREE
RESEARCH ON THE DISTRIBUTED PARALLEL SPATIAL INDEXING SCHEMA BASED ON R-TREE Yuan-chun Zhao a, b, Cheng-ming Li b a. Shandong University of Science and Technology, Qingdao 266510 b. Chinese Academy of
More informationOn the average diameter of directed loop networks
34 2 Vol.34 No. 2 203 2 Journal on Communications February 203 doi:0.3969/j.issn.000-436x.203.02.07 2. 243002 2. 24304 L- 4 a b p q 2 L- TP393.0 B 000-436X(203)02-038-09 On the average diameter of directed
More informationDEIM Forum 207 H6-4 305 8573 305 8573 305 8573 E-mail: sn@kde.cs.tsukuba.ac.jp, chiemi@cs.tsukuba.ac.jp, kitagawa@cs.tsukuba.ac.jp DBaaS m. Database as a ServiceDBaaSDBaaS Amazon Relational Database Service
More informationHash tables. Hash tables
Dictionary Definition A dictionary is a data-structure that stores a set of elements where each element has a unique key, and supports the following operations: Search(S, k) Return the element whose key
More informationCausal Consistency for Geo-Replicated Cloud Storage under Partial Replication
Causal Consistency for Geo-Replicated Cloud Storage under Partial Replication Min Shen, Ajay D. Kshemkalyani, TaYuan Hsu University of Illinois at Chicago Min Shen, Ajay D. Kshemkalyani, TaYuan Causal
More informationCS5314 Randomized Algorithms. Lecture 15: Balls, Bins, Random Graphs (Hashing)
CS5314 Randomized Algorithms Lecture 15: Balls, Bins, Random Graphs (Hashing) 1 Objectives Study various hashing schemes Apply balls-and-bins model to analyze their performances 2 Chain Hashing Suppose
More informationLecture 26 December 1, 2015
CS 229r: Algorithms for Big Data Fall 2015 Prof. Jelani Nelson Lecture 26 December 1, 2015 Scribe: Zezhou Liu 1 Overview Final project presentations on Thursday. Jelani has sent out emails about the logistics:
More informationmd5bloom: Forensic Filesystem Hashing Revisited
DIGITAL FORENSIC RESEARCH CONFERENCE md5bloom: Forensic Filesystem Hashing Revisited By Vassil Roussev, Timothy Bourg, Yixin Chen, Golden Richard Presented At The Digital Forensic Research Conference DFRWS
More information12 Count-Min Sketch and Apriori Algorithm (and Bloom Filters)
12 Count-Min Sketch and Apriori Algorithm (and Bloom Filters) Many streaming algorithms use random hashing functions to compress data. They basically randomly map some data items on top of each other.
More informationComputational Frameworks. MapReduce
Computational Frameworks MapReduce 1 Computational challenges in data mining Computation-intensive algorithms: e.g., optimization algorithms, graph algorithms Large inputs: e.g., web, social networks data.
More informationA Model for Learned Bloom Filters, and Optimizing by Sandwiching
A Model for Learned Bloom Filters, and Optimizing by Sandwiching Michael Mitzenmacher School of Engineering and Applied Sciences Harvard University michaelm@eecs.harvard.edu Abstract Recent work has suggested
More informationHybrid Fault diagnosis capability analysis of Hypercubes under the PMC model and MM model
Hybrid Fault diagnosis capability analysis of Hypercubes under the PMC model and MM model Qiang Zhu,Lili Li, Sanyang Liu, Xing Zhang arxiv:1709.05588v1 [cs.dc] 17 Sep 017 Abstract System level diagnosis
More informationA Precise Model of TSV Parasitic Capacitance Considering Temperature for 3D IC DENG Quan ZHANG Min-Xuan ZHAO Zhen-Yu LI Peng
International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015) A Precise Model of TSV Parasitic Capacitance Considering Temperature for 3D IC DENG Quan ZHANG Min-Xuan
More informationAsymmetric Correlation Regularized Matrix Factorization for Web Service Recommendation
Asymmetric Correlation Regularized Matrix Factorization for Web Service Recommendation Qi Xie, Shenglin Zhao, Zibin Zheng, Jieming Zhu and Michael R. Lyu School of Computer Science and Technology, Southwest
More informationSoil geochemical characteristics and prospecting direction of Pengboshan area Inner Mongolia
34 4 2015 12 GLOBAL GEOLOGY Vol. 34 No. 4 Dec. 2015 1004-5589 2015 04-0993 - 09 1 2 3 4 1 1 3 1. 150036 2. 157000 3. 130061 4. 024005 66 4 P632. 1 A doi 10. 3969 /j. issn. 1004-5589. 2015. 04. 011 Soil
More informationThe Second International Conference on Web Information Systems Engineering
The Second International Conference on Web Information Systems Engineering Volume 2 (Workshops) 3-6 December 2001 Kyoto, Japan Editors Christophe Claramunt Werner Winiwarter Yahiko Kambayashi Yanchun Zhang
More informationV.4 MapReduce. 1. System Architecture 2. Programming Model 3. Hadoop. Based on MRS Chapter 4 and RU Chapter 2 IR&DM 13/ 14 !74
V.4 MapReduce. System Architecture 2. Programming Model 3. Hadoop Based on MRS Chapter 4 and RU Chapter 2!74 Why MapReduce? Large clusters of commodity computers (as opposed to few supercomputers) Challenges:
More informationHuman resource data location privacy protection method based on prefix characteristics
Acta Technica 62 No. 1B/2017, 437 446 c 2017 Institute of Thermomechanics CAS, v.v.i. Human resource data location privacy protection method based on prefix characteristics Yulong Qi 1, 2, Enyi Zhou 1
More informationarxiv: v1 [astro-ph.im] 25 Apr 2014
CPC(HEP & NP), 9, 33(X): 5 Chinese Physics C Vol. 33, No. X, Xxx, 9 A linear calibration method on DNL error for energy spectrum * arxiv:44.633v [astro-ph.im] 5 Apr 4 LU Bo() ;) FU Yan-Hong(), CHEN Yong()
More informationLoad Balancing in Distributed Service System: A Survey
Load Balancing in Distributed Service System: A Survey Xingyu Zhou The Ohio State University zhou.2055@osu.edu November 21, 2016 Xingyu Zhou (OSU) Load Balancing November 21, 2016 1 / 29 Introduction and
More informationA General-Purpose Counting Filter: Making Every Bit Count. Prashant Pandey, Michael A. Bender, Rob Johnson, Rob Patro Stony Brook University, NY
A General-Purpose Counting Filter: Making Every Bit Count Prashant Pandey, Michael A. Bender, Rob Johnson, Rob Patro Stony Brook University, NY Approximate Membership Query (AMQ) insert(x) ismember(x)
More informationZOS: A Fast Rendezvous Algorithm Based on Set of Available Channels for Cognitive Radios
ZOS: A Fast Rendezvous Algorithm Based on Set of Available Channels for Cognitive Radios Abstract Most of existing rendezvous algorithms generate channel-hopping sequences based on the whole channel set.
More informationarxiv: v2 [quant-ph] 1 Aug 2017
A quantum algorithm for greatest common divisor problem arxiv:1707.06430v2 [quant-ph] 1 Aug 2017 Wen Wang, 1 Xu Jiang, 1 Liang-Zhu Mu, 1, 2, 3, 4, and Heng Fan 1 School of Physics, Peking University, Beijing
More informationMining Positive and Negative Fuzzy Association Rules
Mining Positive and Negative Fuzzy Association Rules Peng Yan 1, Guoqing Chen 1, Chris Cornelis 2, Martine De Cock 2, and Etienne Kerre 2 1 School of Economics and Management, Tsinghua University, Beijing
More informationDeleting a marked state in quantum database in a duality computing mode
Article Quantum Information August 013 Vol. 58 o. 4: 97 931 doi: 10.1007/s11434-013-595-9 Deleting a marked state in quantum database in a duality computing mode LIU Yang 1, 1 School of uclear Science
More informationA Novel Method for Mining Relationships of entities on Web
, pp.480-484 http://dx.doi.org/10.14257/astl.2016.121.87 A Novel Method for Mining Relationships of entities on Web Xinyan Huang 1,3, Xinjun Wang* 1,2, Hui Li 1, Yongqing Zheng 1 1 Shandong University
More informationIdentifying and Estimating Persistent Items in Data Streams
1 Identifying and Estimating Persistent Items in Data Streams Haipeng Dai Muhammad Shahzad Alex X. Liu Meng Li Yuankun Zhong Guihai Chen Abstract This paper addresses the fundamental problem of finding
More information19 th %ICCRTS% Set%Reconciliation%in%Two%Rounds%of%Communication%
19 th %ICCRTS% Set%Reconciliation%in%Two%Rounds%of%Communication% % % Primary%Topic:%Data,%Information,%and%Knowledge% Alternate%Topic%1:%Cyberspace,%Communications,%and%Information%Networs% Alternate%Topic%2:%Modeling%and%Simulation%
More informationPerformance Evaluation of Anti-Collision Algorithms for RFID System with Different Delay Requirements
Performance Evaluation of Anti-Collision Algorithms for RFID System with Different Delay Requirements Warakorn Srichavengsup Computer Engineering, Robotics and Technology Laboratory Faculty of Engineering,
More informationDictionary: an abstract data type
2-3 Trees 1 Dictionary: an abstract data type A container that maps keys to values Dictionary operations Insert Search Delete Several possible implementations Balanced search trees Hash tables 2 2-3 trees
More informationCase Doc 1059 Filed 11/26/18 Entered 11/26/18 11:05:25 Desc Main Document Page 1 of 9
Document Page 1 of 9 UNITED STATES BANKRUPTCY COURT DISTRICT OF MASSACHUSETTS ) In Re: ) ) Chapter 11 ) TELEXFREE, LLC, ) Case No. 14-40987-MSH TELEXFREE, INC., ) Case No. 14-40988-MSH TELEXFREE FINANCIAL,
More informationLAYERED R-TREE: AN INDEX STRUCTURE FOR THREE DIMENSIONAL POINTS AND LINES
LAYERED R-TREE: AN INDEX STRUCTURE FOR THREE DIMENSIONAL POINTS AND LINES Yong Zhang *, Lizhu Zhou *, Jun Chen ** * Department of Computer Science and Technology, Tsinghua University Beijing, China, 100084
More informationImpact of traffic mix on caching performance
Impact of traffic mix on caching performance Jim Roberts, INRIA/RAP joint work with Christine Fricker, Philippe Robert, Nada Sbihi BCAM, 27 June 2012 A content-centric future Internet most Internet traffic
More informationDesign and performance of Hall probe measurement system in CSNS
Radiat Detect Technol Methods (2017) 1:18 https://doi.org/10.1007/s41605-017-0017-z ORIGINAL PAPER Design and performance of Hall probe measurement system in CSNS Xi Wu 1,2 Wen Kang 1,2 Wan Chen 1,2 Chang-dong
More informationTwo-stage Pedestrian Detection Based on Multiple Features and Machine Learning
38 3 Vol. 38, No. 3 2012 3 ACTA AUTOMATICA SINICA March, 2012 1 1 1, (Adaboost) (Support vector machine, SVM). (Four direction features, FDF) GAB (Gentle Adaboost) (Entropy-histograms of oriented gradients,
More informationFinding similar items
Finding similar items CSE 344, section 10 June 2, 2011 In this section, we ll go through some examples of finding similar item sets. We ll directly compare all pairs of sets being considered using the
More informationMembership Function of a Special Conditional Uncertain Set
Membership Function of a Special Conditional Uncertain Set Kai Yao School of Management, University of Chinese Academy of Sciences, Beijing 100190, China yaokai@ucas.ac.cn Abstract Uncertain set is a set-valued
More informationData-Intensive Distributed Computing
Data-Intensive Distributed Computing CS 451/651 431/631 (Winter 2018) Part 9: Real-Time Data Analytics (2/2) March 29, 2018 Jimmy Lin David R. Cheriton School of Computer Science University of Waterloo
More informationInternational Symposium of Cavitation and Multiphase Flow (ISCM 2014) Beijing, China October 2014
International Symposium of Cavitation and Multiphase Flow (ISCM 2014) IOP Conference Series: Materials Science and Engineering Volume 72 Beijing, China 18-21 October 2014 ISBN: 978-1-63439-883-1 ISSN:
More informationImproved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON
Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON Danping Shi 1,2, Lei Hu 1,2, Siwei Sun 1,2, Ling Song 1,2, Kexin Qiao 1,2, Xiaoshuang Ma 1,2 1 State Key Laboratory of Information
More informationUsing the Power of Two Choices to Improve Bloom Filters
Internet Mathematics Vol. 4, No. 1: 17-33 Using the Power of Two Choices to Improve Bloom Filters Steve Lumetta and Michael Mitzenmacher Abstract. We consider the combination of two ideas from the hashing
More informationA Chance-Constrained Programming Model for Inverse Spanning Tree Problem with Uncertain Edge Weights
A Chance-Constrained Programming Model for Inverse Spanning Tree Problem with Uncertain Edge Weights 1 Xiang Zhang, 2 Qina Wang, 3 Jian Zhou* 1, First Author School of Management, Shanghai University,
More informationConsolidation properties of dredger fill under surcharge preloading in coast region of Tianjin
30 2 2011 6 GLOBAL GEOLOGY Vol. 30 No. 2 Jun. 2011 1004-5589 2011 02-0289 - 07 1 1 2 3 4 4 1. 130026 2. 130026 3. 110015 4. 430074 45 cm 100% ` TU447 A doi 10. 3969 /j. issn. 1004-5589. 2011. 02. 020 Consolidation
More informationRevenue Maximization in a Cloud Federation
Revenue Maximization in a Cloud Federation Makhlouf Hadji and Djamal Zeghlache September 14th, 2015 IRT SystemX/ Telecom SudParis Makhlouf Hadji Outline of the presentation 01 Introduction 02 03 04 05
More informationMulti-wind Field Output Power Prediction Method based on Energy Internet and DBPSO-LSSVM
, pp.128-133 http://dx.doi.org/1.14257/astl.16.138.27 Multi-wind Field Output Power Prediction Method based on Energy Internet and DBPSO-LSSVM *Jianlou Lou 1, Hui Cao 1, Bin Song 2, Jizhe Xiao 1 1 School
More informationA REVIEW ON SPATIAL DATA AND SPATIAL HADOOP
International Journal of Latest Trends in Engineering and Technology Vol.(8)Issue(1), pp.545-550 DOI: http://dx.doi.org/10.21172/1.81.071 e-issn:2278-621x A REVIEW ON SPATIAL DATA AND SPATIAL HADOOP Kirandeep
More informationCompression in the Space of Permutations
Compression in the Space of Permutations Da Wang Arya Mazumdar Gregory Wornell EECS Dept. ECE Dept. Massachusetts Inst. of Technology Cambridge, MA 02139, USA {dawang,gww}@mit.edu University of Minnesota
More informationFace Recognition Using Global Gabor Filter in Small Sample Case *
ISSN 1673-9418 CODEN JKYTA8 E-mail: fcst@public2.bta.net.cn Journal of Frontiers of Computer Science and Technology http://www.ceaj.org 1673-9418/2010/04(05)-0420-06 Tel: +86-10-51616056 DOI: 10.3778/j.issn.1673-9418.2010.05.004
More informationFrom Geophysical Data to Geophysical Informatics
I CODATA S U Peng, F et al 2015 From Geophysical Data to Geophysical Informatics. Data Science Journal, 14: 13, pp. 1-5, DOI: http://dx.doi.org/10.5334/dsj- 2015-013 PROCEEDINGS PAPER From Geophysical
More informationApproximate Performance Study of Non-Line-of- Sight Ultraviolet Communication Links in Noncoplanar Geometry
01 7th International ICS Conference on Communications and Networking in China (CHINACOM) Approximate Performance Study of Non-Line-of- Sight Ultraviolet Communication Links in Noncoplanar Geometry Yong
More informationThe Bloom Paradox: When not to Use a Bloom Filter
1 The Bloom Paradox: When not to Use a Bloom Filter Ori Rottenstreich and Isaac Keslassy Abstract In this paper, we uncover the Bloom paradox in Bloom filters: sometimes, the Bloom filter is harmful and
More informationNearest Neighbor Search with Keywords in Spatial Databases
776 Nearest Neighbor Search with Keywords in Spatial Databases 1 Sphurti S. Sao, 2 Dr. Rahila Sheikh 1 M. Tech Student IV Sem, Dept of CSE, RCERT Chandrapur, MH, India 2 Head of Department, Dept of CSE,
More informationarxiv: v1 [physics.ins-det] 19 Apr 2014
Sub to Chinese Physics C Vol. 33, No. X, Xxx, 9 Proton irradiation effect on SCDs * arxiv:144.4931v1 [physics.ins-det] 19 Apr 14 YANG Yan-Ji() 1,;1) LU Jing-Bin() 1 WANG Yu-Sa() CHEN Yong() XU Yu-Peng()
More information2005 Journal of Software (, ) A Spatial Index to Improve the Response Speed of WebGIS Servers
1000-9825/2005/16(05)0819 2005 Journal of Software Vol.16, No.5 WebGIS +,, (, 410073) A Spatial Index to Improve the Response Speed of WebGIS Servers YE Chang-Chun +, LUO Jin-Ping, ZHOU Xing-Ming (Institute
More informationCALCULATION OF THE MINIMUM COMPUTATIONAL COMPLEXITY BASED ON INFORMATION ENTROPY
CALCULATION OF THE MINIMUM COMPUTATIONAL COMPLEXITY BASED ON INFORMATION ENTROPY Xue Wu 1 1 Department of Microelectronics, Tsinghua University, Beijing, China wuxiqh@yahoo.cn ABSTRACT In order to find
More informationSurveying, Mapping and Remote Sensing (LIESMARS), Wuhan University, China
Name: Peng Yue Title: Professor and Director, Institute of Geospatial Information and Location Based Services (IGILBS) Associate Chair, Department of Geographic Information Engineering School of Remote
More informationSpatial Data Science. Soumya K Ghosh
Workshop on Data Science and Machine Learning (DSML 17) ISI Kolkata, March 28-31, 2017 Spatial Data Science Soumya K Ghosh Professor Department of Computer Science and Engineering Indian Institute of Technology,
More informationSuccinct Approximate Counting of Skewed Data
Succinct Approximate Counting of Skewed Data David Talbot Google Inc., Mountain View, CA, USA talbot@google.com Abstract Practical data analysis relies on the ability to count observations of objects succinctly
More informationOrganization and Correction of Spatial Data in Mobile GIS
1514 JOURNAL OF NETWORKS, VOL. 8, NO. 7, JULY 2013 Organization and Correction of Spatial Data in Mobile GIS Feixiang Chen *, Xiao Ma, and Shaoliang Ni School of Information Science and Technology, Beijing
More informationHidden Number Problem Given Bound of Secret Jia-ning LIU and Ke-wei LV *
2017 2nd International Conference on Artificial Intelligence: Techniques and Applications (AITA 2017) ISBN: 978-1-60595-491-2 Hidden Number Problem Given Bound of Secret Jia-ning LIU and Ke-wei LV * DCS
More informationJoint International Mechanical, Electronic and Information Technology Conference (JIMET 2015)
Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) Extracting Land Cover Change Information by using Raster Image and Vector Data Synergy Processing Methods Tao
More informationMetal Organic Framework-Derived Metal Oxide Embedded in Nitrogen-Doped Graphene Network for High-Performance Lithium-Ion Batteries
Supporting Information for Metal Organic Framework-Derived Metal Oxide Embedded in Nitrogen-Doped Graphene Network for High-Performance Lithium-Ion Batteries Zhu-Yin Sui, Pei-Ying Zhang,, Meng-Ying Xu,
More informationV r : A new index to represent the variation rate of geomagnetic activity
Earthq Sci (2010)23: 343 348 343 Doi: 10.1007/s11589-010-0731-9 V r : A new index to represent the variation rate of geomagnetic activity Dongmei Yang 1, Yufei He 1 Chuanhua Chen 2 and Jiadong Qian 3 1
More informationStudy on form distribution of soil iron in western Jilin and its correlation with soil properties
35 2 2016 6 GLOBAL GEOLOGY Vol. 35 No. 2 Jun. 2016 1004 5589 2016 02 0593 08 1 1 2 1 1 1. 130061 2. 130012 50 A > B > C > D > E > F > G A A CEC B ph C E A C D G B C D P595 S151. 9 A doi 10. 3969 /j. issn.
More informationDynamical Behavior Analysis of Fixed Points of Investment Competition Model
Dynamical Behavior Analysis of Fixed Points of Investment Competition Model Shujuan Guo 1,BingHan, and Chunmei Yuan 1 1 School of Physics and Mathematics, Changzhou University Changzhou 13164, China shujuanguohb@yahoo.cn,
More informationA tunable corner-pumped Nd:YAG/YAG composite slab CW laser
Chin. Phys. B Vol. 21, No. 1 (212) 1428 A tunable corner-pumped Nd:YAG/YAG composite slab CW laser Liu Huan( 刘欢 ) and Gong Ma-Li( 巩马理 ) State Key Laboratory of Tribology, Center for Photonics and Electronics,
More information