CBFM cutted Bloom filter matrix for multi-dimensional membership query

Size: px
Start display at page:

Download "CBFM cutted Bloom filter matrix for multi-dimensional membership query"

Transcription

1 37 3 Vol.37 No Journal on Communications March 2016 doi: /j.issn x CBFM 1 1, CBFM(cutted Bloom filter matrix) BFM(Bloom filter matrix) CBFM CBFM CBFM BFM 3 TP393 A CBFM cutted Bloom filter matrix for multi-dimensional membership query WANG Yong 1, YUN Xiao-chun 1,2, WANG Shu-peng 1, WANG Xi 1 (1.Institute of Information Engineering, Chinese Academy of Sciences, Beijing , China; 2. National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing , China) Abstract: In order to improve the flexibility and accuracy of mu i-dimensional membership query, a new indexing structure called CBFM(cutted Bloom filter matrix) was proposed. CBFM built the bit matrix by the Cartesian product of different bloom filters, each representing one attribute of primary data. In this way, the proposed matrix supported by-attribute membership query. Besides, the attribute combinations in the bit matrix could be reduced and weighted on demand to further enhance memory utilization rate. Theoretical analysis proves that CBFM utilizes memory more efficiently than BFM, the current state of art. Experiments also show that, on the scenario of memory size fixed, the false positive rate of CBFM is lower than that of all other indexin ethods. Especially on the scenario of memory constrained, the false positive rate of CBFM can be 3 orders of magnitude lower than that of BFM(Bloom filter matrix) indexing method. CBFM is an accurate data structure for multi-dimensional membership query. Key words: query algorithm, multi-dimensional membership query, Bloom filter, bit matrix 1 Web2.0 true/false [2~6] [1] [7] PB No , No , No , No ( 863 ) No. 2012AA013001, No.2013AA013205, No.2013AA01A213 Foundation Items: The National Natural Science Foundation of China (No , No , No , No ), The National High Technology Research and Development Program of China (863 Program) (No.2012AA013001, No.2013AA013205, No.2013AA01A213)

2 Google BigTable [2] HBase [3] CBFM CBFM MapReduce [4] Hive [5] Impala [6] 2) CBFM BFM CBFM TCP 3) CBFM [7] [8,9] CBFM BFM [10,11] [12] 3 CBFM [8, 9] [10,11] 2 [12] MDBF [13] CMDBF [14] 2.1 [12] SBF 1 BFM [14] S ={x 1, x 2,L, x n } n k (h 1, h 2,L, h k ) m x i h j (x i ) (1 j k) BF h j (x i ) 1 xk h 1 (x), h 2 (x),l, h k (x) (schema-free) 1 x x CBFM cutted Bloom filter matrix CBFM 1)

3 3 CBFM 141 O(n) O(log n) (false positive rate) 2.2 SBF EDMI Guo [13] KD MDBF ZPR MD-HBase [11] Z Z-Value CMDBF [14] MDBF KD CBF 2 MDBF 1 2 CBF {n, m, k, L} CMDBF ( f BF (m, k, n)) L +1 MDBF ( f BF (m, k, n)) L MDBF CMDBF Adina [18] 2015 [14] Bloofi B+ (BFM) Flat-Bloofi KEY BF-Matrix [19] BFM 1 B+ BFM 3 CBFM 3.1 [9] Zhou [10] [15] [16] (CBF) S ={x 1, x 2,L, x n } n x i, x i d, x i = [x i1, x i 2,L, x id ] BFM x = [x 1, x 2,L, x d ], 1 j d : x j x = [x [8,9] 1, x 2,L, x d ], [10,11] 1 j d : x [18,19] j true/ false q[q [8] ZFS 1,q 2,L,q d ] S : x j (1 j d ), q j = x j true q[q 1, q 2,L, q d ] S : x j (1 j d), q j x j false

4 CBFM CBFM 1 1 d n e c CBFM r i, c i R,1 i c r i d i=1 m M 3 CBFM CBFM 4 CBFM 2 CBFM 2 CBFM 2(a) CBFM 1 elementinsert(object Element) : A=(a 1,a 2,, a d) :VOID begin assign 0 to ResultArray; for each attribute a x in A { for each hashfunction hashx in HashSet { record hashx(a x) to hashperfield[][]; } // k for each DC of (2 d - 1) combinations { for each hash value hashv in hashperfield { BFM 2(b) YoZ YoZ // calculateindex invoke calculateindex(dc, hashv, ResultArray); } // 1 for each idx of ResultArray { set bit of ResultArray [idx] to 1 end elementinsert XYZ 3 CBFM A(A x, A y ) 4 CBFM CBFM CBFM 5 CBFM WCBFM -Weighted CBFM

5 3 CBFM elementsearch(object Element) : A=(a 1,a 2,, a d), SDC null : begin assign 0 to ResultArray; for each field a x in A { for each hashfunction hashx in HashSet { record hashx(a x) to hashperfield[][]; } // k for each EDC(does not match any dimension combinations to cut off) of SDC { for each hash value hashv in hashperfield { // calculateindex invoke calculateindex(edc, hashv, ResultArray); } for each idx of ResultArray { if bit of ResultArray [idx] equals to 0 { return FALSE; } return TRUE; end elementsearch 5 CBFM 3.3 S ={x 1, x 2,L, x n } x i, x i d CBFM n e d c k r i c d 2 d 1 :VOID if DC match some dimension combinations to cut off { f =e end calculateindex; // [17] kn 1 f BF (m, k, n) = (1 (1 ) kn ) k 1 e m (1) m f n k m k = lbf (2) 1 m = lbelb n (3) f k m+1 r i r i (m +1) r i m r i CBFM (4) BFM m d c d i=1 M = (m+1) 2 d 1 BFM CBFM e r i c [(m + 1) r i m r i ] (4) i=1 d A = (a 1, a 2,L, a d ) CBFM k dk c d d 6 2d 2 c k 2 CBFM O((d + d 3 2 c )k ) d 3 calculateindex(object DC, Object hashv, Object ResultArray) : A=(a 1,a 2,,a d); ; begin } assign 0 to currentbitindex; // DC for each dimension a x in DC(from high to low) { // a x split a x to special bit array and normal bits array; calculate non-bulk offset in special bit array, and add it to currentbitindex; calculate non-bulk offset in normal bits array, and add offset*(hashv[a x]- 1) to currentbitindex; add currentbitindex to ResultArray; end calculateindex CBFM

6 n M 2 1 MB a =0 CBFM 2 (0x x3 1 2) CBFM BFM 14 CBFM 3 n=1 000 CBFM BFM 3 (M=16 MB) 7(a) CBFM SBF BFM CBFM CBF 2 ( M=1 MB) e d c n(bfm) n(cbfm) (0x5,0x3) (0x5,0x3) (0x5,0x3) (0x5,0x3) (0x5,0x3) a =1 6 (k=6) CMDBF MDBF a a =1 SBF BFM CBFM CBF CMDBF MDBF 3 SBF BFM CBFM MDBF a 1 3 ( n=1 000) e d c M-BFM/MB M-CBFM/MB (0x5,0x3) (0x5,0x3) (0x5,0x3) (0x5,0x3) (0x5,0x3) CBFM SBF MDBF CMDBF BFM CBF 4.1 SBF [12] MDBF [13] CMDBF [14] CBF [15] BFM [16] CBFM 6 CBFM 1 32 {0,2 32-1} SBF CMDBF MDBF BFM CBFM CBF 7 CBFM

7 3 CBFM 145 7(b) BFM CBF 100% CBFM ( 0.21%) BFM 3 CBFM 2 BFM 3 CBFM 9 9 WCBFM CBFM 2 CBFM 1.69 DNS 2 { IP IP CBFM } 8(a) SBF CBFM BFM { IP } 8(b) CBFM CBFM 8 CBFM CBFM BFM MDBF CBF 2~3 CBFM

8 CBFM CBFM CBFM CBFM d={1,2,3,4} n=100 CBFM e = CBFM CBFM CBFM CBFM 3 4 BFM 5 CBFM 1 BFM CBFM BFM 4 SBF [12] MDBF [13] CMDBF [14] CBF [15] BFM CBFM 2 BFM [16] CBFM 12 CBFM CBFM(Cutted Bloom Filter Matrix)

9 3 CBFM 147 CBFM, 2008, 29(1): [1] LYNCH C. Big data: how do your data grow[j]. Nature, 2008, 455(7209): [2] CHANG F, DEAN J, GHEMAWAT S, et al. Bigtable: a distributed storage system for structured data[j]. ACM Transactions on Computer Systems (TOCS), 2008, 26(2): 4. [3] VORA M N. Hadoop-HBase for large-scale data[j]. IEEE Computer Science and Network Technology, 2011, (1): [4] DEAN J, GHEMAWAT S. MapReduce: simplified data processing on large clusters[j]. Communications of the ACM, 2008, 51(1): [5] THUSOO A, SARMA J S, JAIN N, et al. Hive: a warehousin solution over a map-reduce framework[j]. Proceedings of the VLDB Endowment, 2009, 2(2): [6] KORNACKER M, BEHM A, BITTORF V, et al. Impala: a modern, open-source SQL engine for Hadoop[C]. Conference on Innovative Data Systems Research (CIDR'15). c2015. [7] TARKOMA S, ROTHENBERG C E, LAGERSPETZ E. Theory and practice of bloom filters for distributed systems[j]. Communications Surveys & Tutorials, IEEE, 2012, 14(1): [8] RODEH O, TEPERMAN A. zfs-a scalable distributed file system using object disks[c]//mass Storage Systems and Technologies (MSST), c2003: [9] DEBNATH B, SENGUPTA S, LI J. FlashStore: high throughput persistent key-value store[j]. Proceedings of the VLDB Endowment, 2010, 3(1-2): [10] ZHOU X, ZHANG X, WANG Y, et al. Efficient distributed multi-dimensional index for big data management[m]. Springer Berlin Heidelberg, [11] NISHIMURA S, DAS S, AGRAWAL D, et al. MD-HBase: a scalable multi-dimensional data infrastructure for location aware services[j]. IEEE Mobile Data Management (MDM), 2011, 1: [12] BLOOM B H. Space/time trade-offs in hash coding with allowable errors[j]. Communications of the ACM, 1970, 13(7): [13] GUO D, WU J, CHEN H, et al. Theory and network applications of dynamic bloom filters[c]//infocom. c2006: [14],,,. XIE K, QIN Z, WEN J G, et al.combine multi-dimension Bloom filter for membership queries[j]. Journal on Communications ( 1) : [15] WANG Z, LUO T, XU G, et al. A new indexing technique for supporting by-attribute membership query of multidimensional data[m]. Springer Berlin Heidelberg, [16] WANG Z, LUO T, XU G, et al. The application of cartesian-join of bloom filters to supporting membership query of multid mensional data[c]//ieee Big Data. c2014: [17] BRODER A, MITZENMACHER M. Network applications of bloom filters: a survey[j]. Internet Mathematics, 2004, 1(4): [18] CHENG X, LI H, WANG Y, et al. BF-matrix: a secondary index for the cloud storage[m]. Springer International Publishing, [19] CRAINICEANU A, LEMIRE D. Bloofi: multidimensional Bloom filters[j]. Information Systems, 2015, 54:

Introduction to Randomized Algorithms III

Introduction to Randomized Algorithms III Introduction to Randomized Algorithms III Joaquim Madeira Version 0.1 November 2017 U. Aveiro, November 2017 1 Overview Probabilistic counters Counting with probability 1 / 2 Counting with probability

More information

Lecture 24: Bloom Filters. Wednesday, June 2, 2010

Lecture 24: Bloom Filters. Wednesday, June 2, 2010 Lecture 24: Bloom Filters Wednesday, June 2, 2010 1 Topics for the Final SQL Conceptual Design (BCNF) Transactions Indexes Query execution and optimization Cardinality Estimation Parallel Databases 2 Lecture

More information

An Early Traffic Sampling Algorithm

An Early Traffic Sampling Algorithm An Early Traffic Sampling Algorithm Hou Ying ( ), Huang Hai, Chen Dan, Wang ShengNan, and Li Peng National Digital Switching System Engineering & Techological R&D center, ZhengZhou, 450002, China ndschy@139.com,

More information

Image information measurement for video retrieval

Image information measurement for video retrieval 37 2 Vol.37 No.2 2016 2 Journal on Communications Feruary 2016 doi:10.11959/j.issn.1000-436x.2016033 1,2 3,4 3,4 3,4 1,2 (1100193 2 100029 3 100190 4 100190 SEII map 4.4% 1.5 TP37 A Image information measurement

More information

Bloom Filters, general theory and variants

Bloom Filters, general theory and variants Bloom Filters: general theory and variants G. Caravagna caravagn@cli.di.unipi.it Information Retrieval Wherever a list or set is used, and space is a consideration, a Bloom Filter should be considered.

More information

Acceptably inaccurate. Probabilistic data structures

Acceptably inaccurate. Probabilistic data structures Acceptably inaccurate Probabilistic data structures Hello Today's talk Motivation Bloom filters Count-Min Sketch HyperLogLog Motivation Tape HDD SSD Memory Tape HDD SSD Memory Speed Tape HDD SSD Memory

More information

Bloom Filter Redux. CS 270 Combinatorial Algorithms and Data Structures. UC Berkeley, Spring 2011

Bloom Filter Redux. CS 270 Combinatorial Algorithms and Data Structures. UC Berkeley, Spring 2011 Bloom Filter Redux Matthias Vallentin Gene Pang CS 270 Combinatorial Algorithms and Data Structures UC Berkeley, Spring 2011 Inspiration Our background: network security, databases We deal with massive

More information

PAPER Adaptive Bloom Filter : A Space-Efficient Counting Algorithm for Unpredictable Network Traffic

PAPER Adaptive Bloom Filter : A Space-Efficient Counting Algorithm for Unpredictable Network Traffic IEICE TRANS.??, VOL.Exx??, NO.xx XXXX x PAPER Adaptive Bloom Filter : A Space-Efficient Counting Algorithm for Unpredictable Network Traffic Yoshihide MATSUMOTO a), Hiroaki HAZEYAMA b), and Youki KADOBAYASHI

More information

Multiple-Site Distributed Spatial Query Optimization using Spatial Semijoins

Multiple-Site Distributed Spatial Query Optimization using Spatial Semijoins 11 Multiple-Site Distributed Spatial Query Optimization using Spatial Semijoins Wendy OSBORN a, 1 and Saad ZAAMOUT a a Department of Mathematics and Computer Science, University of Lethbridge, Lethbridge,

More information

BCN: Expansible Network Structures for Data Centers Using Hierarchical Compound Graphs

BCN: Expansible Network Structures for Data Centers Using Hierarchical Compound Graphs This paper was presented as part of the Mini-Conference at IEEE INFOCOM 011 BCN: Expansible Network Structures for Data Centers Using Hierarchical Compound Graphs Deke Guo, Tao Chen, Dan Li, Yunhao Liu,

More information

CS 591, Lecture 7 Data Analytics: Theory and Applications Boston University

CS 591, Lecture 7 Data Analytics: Theory and Applications Boston University CS 591, Lecture 7 Data Analytics: Theory and Applications Boston University Babis Tsourakakis February 13th, 2017 Bloom Filter Approximate membership problem Highly space-efficient randomized data structure

More information

Weighted Bloom Filter

Weighted Bloom Filter Weighted Bloom Filter Jehoshua Bruck Jie Gao Anxiao (Andrew) Jiang Department of Electrical Engineering, California Institute of Technology. bruck@paradise.caltech.edu. Department of Computer Science,

More information

Part 1: Hashing and Its Many Applications

Part 1: Hashing and Its Many Applications 1 Part 1: Hashing and Its Many Applications Sid C-K Chau Chi-Kin.Chau@cl.cam.ac.u http://www.cl.cam.ac.u/~cc25/teaching Why Randomized Algorithms? 2 Randomized Algorithms are algorithms that mae random

More information

Visualizing Big Data on Maps: Emerging Tools and Techniques. Ilir Bejleri, Sanjay Ranka

Visualizing Big Data on Maps: Emerging Tools and Techniques. Ilir Bejleri, Sanjay Ranka Visualizing Big Data on Maps: Emerging Tools and Techniques Ilir Bejleri, Sanjay Ranka Topics Web GIS Visualization Big Data GIS Performance Maps in Data Visualization Platforms Next: Web GIS Visualization

More information

arxiv: v1 [cs.ds] 3 Feb 2018

arxiv: v1 [cs.ds] 3 Feb 2018 A Model for Learned Bloom Filters and Related Structures Michael Mitzenmacher 1 arxiv:1802.00884v1 [cs.ds] 3 Feb 2018 Abstract Recent work has suggested enhancing Bloom filters by using a pre-filter, based

More information

Lecture and notes by: Alessio Guerrieri and Wei Jin Bloom filters and Hashing

Lecture and notes by: Alessio Guerrieri and Wei Jin Bloom filters and Hashing Bloom filters and Hashing 1 Introduction The Bloom filter, conceived by Burton H. Bloom in 1970, is a space-efficient probabilistic data structure that is used to test whether an element is a member of

More information

The Challenge of Geospatial Big Data Analysis

The Challenge of Geospatial Big Data Analysis 288 POSTERS The Challenge of Geospatial Big Data Analysis Authors - Teerayut Horanont, University of Tokyo, Japan - Apichon Witayangkurn, University of Tokyo, Japan - Shibasaki Ryosuke, University of Tokyo,

More information

Secure Indexes* Eu-Jin Goh Stanford University 15 March 2004

Secure Indexes* Eu-Jin Goh Stanford University 15 March 2004 Secure Indexes* Eu-Jin Goh Stanford University 15 March 2004 * Generalizes an early version of my paper How to search on encrypted data on eprint Cryptology Archive on 7 October 2003 Secure Indexes Data

More information

CS 347. Parallel and Distributed Data Processing. Spring Notes 11: MapReduce

CS 347. Parallel and Distributed Data Processing. Spring Notes 11: MapReduce CS 347 Parallel and Distributed Data Processing Spring 2016 Notes 11: MapReduce Motivation Distribution makes simple computations complex Communication Load balancing Fault tolerance Not all applications

More information

Scalable 3D Spatial Queries for Analytical Pathology Imaging with MapReduce

Scalable 3D Spatial Queries for Analytical Pathology Imaging with MapReduce Scalable 3D Spatial Queries for Analytical Pathology Imaging with MapReduce Yanhui Liang, Stony Brook University Hoang Vo, Stony Brook University Ablimit Aji, Hewlett Packard Labs Jun Kong, Emory University

More information

Study on Coal Methane Adsorption Behavior Under Variation Temperature and Pressure-Taking Xia-Yu-Kou Coal for Example

Study on Coal Methane Adsorption Behavior Under Variation Temperature and Pressure-Taking Xia-Yu-Kou Coal for Example International Journal of Oil, Gas and Coal Engineering 2018; 6(4): 60-66 http://www.sciencepublishinggroup.com/j/ogce doi: 10.11648/j.ogce.20180604.13 ISSN: 2376-7669 (Print); ISSN: 2376-7677(Online) Study

More information

Algorithms for Data Science

Algorithms for Data Science Algorithms for Data Science CSOR W4246 Eleni Drinea Computer Science Department Columbia University Tuesday, December 1, 2015 Outline 1 Recap Balls and bins 2 On randomized algorithms 3 Saving space: hashing-based

More information

CSCB63 Winter Week 11 Bloom Filters. Anna Bretscher. March 30, / 13

CSCB63 Winter Week 11 Bloom Filters. Anna Bretscher. March 30, / 13 CSCB63 Winter 2019 Week 11 Bloom Filters Anna Bretscher March 30, 2019 1 / 13 Today Bloom Filters Definition Expected Complexity Applications 2 / 13 Bloom Filters (Specification) A bloom filter is a probabilistic

More information

Composite Quantization for Approximate Nearest Neighbor Search

Composite Quantization for Approximate Nearest Neighbor Search Composite Quantization for Approximate Nearest Neighbor Search Jingdong Wang Lead Researcher Microsoft Research http://research.microsoft.com/~jingdw ICML 104, joint work with my interns Ting Zhang from

More information

CIEMA: A Configurable Integrated Enterprise Model Architecture

CIEMA: A Configurable Integrated Enterprise Model Architecture CIEMA: A Configurable Integrated Enterprise Model Architecture Yihang Luo 1, Yushun Fan 2 1 CIMS Research Center, Tsinghua University, Beijing, Chinalyh861001@sohu.com 2 CIMS Research Center, Tsinghua

More information

CSE 190, Great ideas in algorithms: Pairwise independent hash functions

CSE 190, Great ideas in algorithms: Pairwise independent hash functions CSE 190, Great ideas in algorithms: Pairwise independent hash functions 1 Hash functions The goal of hash functions is to map elements from a large domain to a small one. Typically, to obtain the required

More information

A REVIEW ON SPATIAL DATA AND SPATIAL HADOOP

A REVIEW ON SPATIAL DATA AND SPATIAL HADOOP International Journal of Latest Trends in Engineering and Technology Vol.(8)Issue(1), pp.545-550 DOI: http://dx.doi.org/10.21172/1.81.071 e-issn:2278-621x A REVIEW ON SPATIAL DATA AND SPATIAL HADOOP Kirandeep

More information

1 Probability Review. CS 124 Section #8 Hashing, Skip Lists 3/20/17. Expectation (weighted average): the expectation of a random quantity X is:

1 Probability Review. CS 124 Section #8 Hashing, Skip Lists 3/20/17. Expectation (weighted average): the expectation of a random quantity X is: CS 24 Section #8 Hashing, Skip Lists 3/20/7 Probability Review Expectation (weighted average): the expectation of a random quantity X is: x= x P (X = x) For each value x that X can take on, we look at

More information

Lecture 4 Thursday Sep 11, 2014

Lecture 4 Thursday Sep 11, 2014 CS 224: Advanced Algorithms Fall 2014 Lecture 4 Thursday Sep 11, 2014 Prof. Jelani Nelson Scribe: Marco Gentili 1 Overview Today we re going to talk about: 1. linear probing (show with 5-wise independence)

More information

Hash tables. Hash tables

Hash tables. Hash tables Dictionary Definition A dictionary is a data-structure that stores a set of elements where each element has a unique key, and supports the following operations: Search(S, k) Return the element whose key

More information

Big Data Infrastructure CS 489/698 Big Data Infrastructure (Winter 2016)

Big Data Infrastructure CS 489/698 Big Data Infrastructure (Winter 2016) Big Data Infrastructure CS 489/698 Big Data Infrastructure (Winter 2016) Week 12: Real-Time Data Analytics (2/2) March 31, 2016 Jimmy Lin David R. Cheriton School of Computer Science University of Waterloo

More information

An Implementation of an Address Generator Using Hash Memories

An Implementation of an Address Generator Using Hash Memories An Implementation of an Address Generator Using Memories Tsutomu Sasao and Munehiro Matsuura Department of Computer Science and Electronics, Kyushu Institute of Technology, Iizuka 820-8502, Japan Abstract

More information

Nanosheet-Constructed Porous BiOCl with Dominant {001} Facets for Superior Photosensitized Degradation

Nanosheet-Constructed Porous BiOCl with Dominant {001} Facets for Superior Photosensitized Degradation Electronic Supplementary Information Nanosheet-Constructed Porous BiOCl with Dominant {001} Facets for Superior Photosensitized Degradation Dong-Hong Wang, ab Gui-Qi Gao, b Yue-Wei Zhang, a Li-Sha Zhou,

More information

Multi-join Query Evaluation on Big Data Lecture 2

Multi-join Query Evaluation on Big Data Lecture 2 Multi-join Query Evaluation on Big Data Lecture 2 Dan Suciu March, 2015 Dan Suciu Multi-Joins Lecture 2 March, 2015 1 / 34 Multi-join Query Evaluation Outline Part 1 Optimal Sequential Algorithms. Thursday

More information

RESEARCH ON THE DISTRIBUTED PARALLEL SPATIAL INDEXING SCHEMA BASED ON R-TREE

RESEARCH ON THE DISTRIBUTED PARALLEL SPATIAL INDEXING SCHEMA BASED ON R-TREE RESEARCH ON THE DISTRIBUTED PARALLEL SPATIAL INDEXING SCHEMA BASED ON R-TREE Yuan-chun Zhao a, b, Cheng-ming Li b a. Shandong University of Science and Technology, Qingdao 266510 b. Chinese Academy of

More information

On the average diameter of directed loop networks

On the average diameter of directed loop networks 34 2 Vol.34 No. 2 203 2 Journal on Communications February 203 doi:0.3969/j.issn.000-436x.203.02.07 2. 243002 2. 24304 L- 4 a b p q 2 L- TP393.0 B 000-436X(203)02-038-09 On the average diameter of directed

More information

DEIM Forum 207 H6-4 305 8573 305 8573 305 8573 E-mail: sn@kde.cs.tsukuba.ac.jp, chiemi@cs.tsukuba.ac.jp, kitagawa@cs.tsukuba.ac.jp DBaaS m. Database as a ServiceDBaaSDBaaS Amazon Relational Database Service

More information

Hash tables. Hash tables

Hash tables. Hash tables Dictionary Definition A dictionary is a data-structure that stores a set of elements where each element has a unique key, and supports the following operations: Search(S, k) Return the element whose key

More information

Causal Consistency for Geo-Replicated Cloud Storage under Partial Replication

Causal Consistency for Geo-Replicated Cloud Storage under Partial Replication Causal Consistency for Geo-Replicated Cloud Storage under Partial Replication Min Shen, Ajay D. Kshemkalyani, TaYuan Hsu University of Illinois at Chicago Min Shen, Ajay D. Kshemkalyani, TaYuan Causal

More information

CS5314 Randomized Algorithms. Lecture 15: Balls, Bins, Random Graphs (Hashing)

CS5314 Randomized Algorithms. Lecture 15: Balls, Bins, Random Graphs (Hashing) CS5314 Randomized Algorithms Lecture 15: Balls, Bins, Random Graphs (Hashing) 1 Objectives Study various hashing schemes Apply balls-and-bins model to analyze their performances 2 Chain Hashing Suppose

More information

Lecture 26 December 1, 2015

Lecture 26 December 1, 2015 CS 229r: Algorithms for Big Data Fall 2015 Prof. Jelani Nelson Lecture 26 December 1, 2015 Scribe: Zezhou Liu 1 Overview Final project presentations on Thursday. Jelani has sent out emails about the logistics:

More information

md5bloom: Forensic Filesystem Hashing Revisited

md5bloom: Forensic Filesystem Hashing Revisited DIGITAL FORENSIC RESEARCH CONFERENCE md5bloom: Forensic Filesystem Hashing Revisited By Vassil Roussev, Timothy Bourg, Yixin Chen, Golden Richard Presented At The Digital Forensic Research Conference DFRWS

More information

12 Count-Min Sketch and Apriori Algorithm (and Bloom Filters)

12 Count-Min Sketch and Apriori Algorithm (and Bloom Filters) 12 Count-Min Sketch and Apriori Algorithm (and Bloom Filters) Many streaming algorithms use random hashing functions to compress data. They basically randomly map some data items on top of each other.

More information

Computational Frameworks. MapReduce

Computational Frameworks. MapReduce Computational Frameworks MapReduce 1 Computational challenges in data mining Computation-intensive algorithms: e.g., optimization algorithms, graph algorithms Large inputs: e.g., web, social networks data.

More information

A Model for Learned Bloom Filters, and Optimizing by Sandwiching

A Model for Learned Bloom Filters, and Optimizing by Sandwiching A Model for Learned Bloom Filters, and Optimizing by Sandwiching Michael Mitzenmacher School of Engineering and Applied Sciences Harvard University michaelm@eecs.harvard.edu Abstract Recent work has suggested

More information

Hybrid Fault diagnosis capability analysis of Hypercubes under the PMC model and MM model

Hybrid Fault diagnosis capability analysis of Hypercubes under the PMC model and MM model Hybrid Fault diagnosis capability analysis of Hypercubes under the PMC model and MM model Qiang Zhu,Lili Li, Sanyang Liu, Xing Zhang arxiv:1709.05588v1 [cs.dc] 17 Sep 017 Abstract System level diagnosis

More information

A Precise Model of TSV Parasitic Capacitance Considering Temperature for 3D IC DENG Quan ZHANG Min-Xuan ZHAO Zhen-Yu LI Peng

A Precise Model of TSV Parasitic Capacitance Considering Temperature for 3D IC DENG Quan ZHANG Min-Xuan ZHAO Zhen-Yu LI Peng International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015) A Precise Model of TSV Parasitic Capacitance Considering Temperature for 3D IC DENG Quan ZHANG Min-Xuan

More information

Asymmetric Correlation Regularized Matrix Factorization for Web Service Recommendation

Asymmetric Correlation Regularized Matrix Factorization for Web Service Recommendation Asymmetric Correlation Regularized Matrix Factorization for Web Service Recommendation Qi Xie, Shenglin Zhao, Zibin Zheng, Jieming Zhu and Michael R. Lyu School of Computer Science and Technology, Southwest

More information

Soil geochemical characteristics and prospecting direction of Pengboshan area Inner Mongolia

Soil geochemical characteristics and prospecting direction of Pengboshan area Inner Mongolia 34 4 2015 12 GLOBAL GEOLOGY Vol. 34 No. 4 Dec. 2015 1004-5589 2015 04-0993 - 09 1 2 3 4 1 1 3 1. 150036 2. 157000 3. 130061 4. 024005 66 4 P632. 1 A doi 10. 3969 /j. issn. 1004-5589. 2015. 04. 011 Soil

More information

The Second International Conference on Web Information Systems Engineering

The Second International Conference on Web Information Systems Engineering The Second International Conference on Web Information Systems Engineering Volume 2 (Workshops) 3-6 December 2001 Kyoto, Japan Editors Christophe Claramunt Werner Winiwarter Yahiko Kambayashi Yanchun Zhang

More information

V.4 MapReduce. 1. System Architecture 2. Programming Model 3. Hadoop. Based on MRS Chapter 4 and RU Chapter 2 IR&DM 13/ 14 !74

V.4 MapReduce. 1. System Architecture 2. Programming Model 3. Hadoop. Based on MRS Chapter 4 and RU Chapter 2 IR&DM 13/ 14 !74 V.4 MapReduce. System Architecture 2. Programming Model 3. Hadoop Based on MRS Chapter 4 and RU Chapter 2!74 Why MapReduce? Large clusters of commodity computers (as opposed to few supercomputers) Challenges:

More information

Human resource data location privacy protection method based on prefix characteristics

Human resource data location privacy protection method based on prefix characteristics Acta Technica 62 No. 1B/2017, 437 446 c 2017 Institute of Thermomechanics CAS, v.v.i. Human resource data location privacy protection method based on prefix characteristics Yulong Qi 1, 2, Enyi Zhou 1

More information

arxiv: v1 [astro-ph.im] 25 Apr 2014

arxiv: v1 [astro-ph.im] 25 Apr 2014 CPC(HEP & NP), 9, 33(X): 5 Chinese Physics C Vol. 33, No. X, Xxx, 9 A linear calibration method on DNL error for energy spectrum * arxiv:44.633v [astro-ph.im] 5 Apr 4 LU Bo() ;) FU Yan-Hong(), CHEN Yong()

More information

Load Balancing in Distributed Service System: A Survey

Load Balancing in Distributed Service System: A Survey Load Balancing in Distributed Service System: A Survey Xingyu Zhou The Ohio State University zhou.2055@osu.edu November 21, 2016 Xingyu Zhou (OSU) Load Balancing November 21, 2016 1 / 29 Introduction and

More information

A General-Purpose Counting Filter: Making Every Bit Count. Prashant Pandey, Michael A. Bender, Rob Johnson, Rob Patro Stony Brook University, NY

A General-Purpose Counting Filter: Making Every Bit Count. Prashant Pandey, Michael A. Bender, Rob Johnson, Rob Patro Stony Brook University, NY A General-Purpose Counting Filter: Making Every Bit Count Prashant Pandey, Michael A. Bender, Rob Johnson, Rob Patro Stony Brook University, NY Approximate Membership Query (AMQ) insert(x) ismember(x)

More information

ZOS: A Fast Rendezvous Algorithm Based on Set of Available Channels for Cognitive Radios

ZOS: A Fast Rendezvous Algorithm Based on Set of Available Channels for Cognitive Radios ZOS: A Fast Rendezvous Algorithm Based on Set of Available Channels for Cognitive Radios Abstract Most of existing rendezvous algorithms generate channel-hopping sequences based on the whole channel set.

More information

arxiv: v2 [quant-ph] 1 Aug 2017

arxiv: v2 [quant-ph] 1 Aug 2017 A quantum algorithm for greatest common divisor problem arxiv:1707.06430v2 [quant-ph] 1 Aug 2017 Wen Wang, 1 Xu Jiang, 1 Liang-Zhu Mu, 1, 2, 3, 4, and Heng Fan 1 School of Physics, Peking University, Beijing

More information

Mining Positive and Negative Fuzzy Association Rules

Mining Positive and Negative Fuzzy Association Rules Mining Positive and Negative Fuzzy Association Rules Peng Yan 1, Guoqing Chen 1, Chris Cornelis 2, Martine De Cock 2, and Etienne Kerre 2 1 School of Economics and Management, Tsinghua University, Beijing

More information

Deleting a marked state in quantum database in a duality computing mode

Deleting a marked state in quantum database in a duality computing mode Article Quantum Information August 013 Vol. 58 o. 4: 97 931 doi: 10.1007/s11434-013-595-9 Deleting a marked state in quantum database in a duality computing mode LIU Yang 1, 1 School of uclear Science

More information

A Novel Method for Mining Relationships of entities on Web

A Novel Method for Mining Relationships of entities on Web , pp.480-484 http://dx.doi.org/10.14257/astl.2016.121.87 A Novel Method for Mining Relationships of entities on Web Xinyan Huang 1,3, Xinjun Wang* 1,2, Hui Li 1, Yongqing Zheng 1 1 Shandong University

More information

Identifying and Estimating Persistent Items in Data Streams

Identifying and Estimating Persistent Items in Data Streams 1 Identifying and Estimating Persistent Items in Data Streams Haipeng Dai Muhammad Shahzad Alex X. Liu Meng Li Yuankun Zhong Guihai Chen Abstract This paper addresses the fundamental problem of finding

More information

19 th %ICCRTS% Set%Reconciliation%in%Two%Rounds%of%Communication%

19 th %ICCRTS% Set%Reconciliation%in%Two%Rounds%of%Communication% 19 th %ICCRTS% Set%Reconciliation%in%Two%Rounds%of%Communication% % % Primary%Topic:%Data,%Information,%and%Knowledge% Alternate%Topic%1:%Cyberspace,%Communications,%and%Information%Networs% Alternate%Topic%2:%Modeling%and%Simulation%

More information

Performance Evaluation of Anti-Collision Algorithms for RFID System with Different Delay Requirements

Performance Evaluation of Anti-Collision Algorithms for RFID System with Different Delay Requirements Performance Evaluation of Anti-Collision Algorithms for RFID System with Different Delay Requirements Warakorn Srichavengsup Computer Engineering, Robotics and Technology Laboratory Faculty of Engineering,

More information

Dictionary: an abstract data type

Dictionary: an abstract data type 2-3 Trees 1 Dictionary: an abstract data type A container that maps keys to values Dictionary operations Insert Search Delete Several possible implementations Balanced search trees Hash tables 2 2-3 trees

More information

Case Doc 1059 Filed 11/26/18 Entered 11/26/18 11:05:25 Desc Main Document Page 1 of 9

Case Doc 1059 Filed 11/26/18 Entered 11/26/18 11:05:25 Desc Main Document Page 1 of 9 Document Page 1 of 9 UNITED STATES BANKRUPTCY COURT DISTRICT OF MASSACHUSETTS ) In Re: ) ) Chapter 11 ) TELEXFREE, LLC, ) Case No. 14-40987-MSH TELEXFREE, INC., ) Case No. 14-40988-MSH TELEXFREE FINANCIAL,

More information

LAYERED R-TREE: AN INDEX STRUCTURE FOR THREE DIMENSIONAL POINTS AND LINES

LAYERED R-TREE: AN INDEX STRUCTURE FOR THREE DIMENSIONAL POINTS AND LINES LAYERED R-TREE: AN INDEX STRUCTURE FOR THREE DIMENSIONAL POINTS AND LINES Yong Zhang *, Lizhu Zhou *, Jun Chen ** * Department of Computer Science and Technology, Tsinghua University Beijing, China, 100084

More information

Impact of traffic mix on caching performance

Impact of traffic mix on caching performance Impact of traffic mix on caching performance Jim Roberts, INRIA/RAP joint work with Christine Fricker, Philippe Robert, Nada Sbihi BCAM, 27 June 2012 A content-centric future Internet most Internet traffic

More information

Design and performance of Hall probe measurement system in CSNS

Design and performance of Hall probe measurement system in CSNS Radiat Detect Technol Methods (2017) 1:18 https://doi.org/10.1007/s41605-017-0017-z ORIGINAL PAPER Design and performance of Hall probe measurement system in CSNS Xi Wu 1,2 Wen Kang 1,2 Wan Chen 1,2 Chang-dong

More information

Two-stage Pedestrian Detection Based on Multiple Features and Machine Learning

Two-stage Pedestrian Detection Based on Multiple Features and Machine Learning 38 3 Vol. 38, No. 3 2012 3 ACTA AUTOMATICA SINICA March, 2012 1 1 1, (Adaboost) (Support vector machine, SVM). (Four direction features, FDF) GAB (Gentle Adaboost) (Entropy-histograms of oriented gradients,

More information

Finding similar items

Finding similar items Finding similar items CSE 344, section 10 June 2, 2011 In this section, we ll go through some examples of finding similar item sets. We ll directly compare all pairs of sets being considered using the

More information

Membership Function of a Special Conditional Uncertain Set

Membership Function of a Special Conditional Uncertain Set Membership Function of a Special Conditional Uncertain Set Kai Yao School of Management, University of Chinese Academy of Sciences, Beijing 100190, China yaokai@ucas.ac.cn Abstract Uncertain set is a set-valued

More information

Data-Intensive Distributed Computing

Data-Intensive Distributed Computing Data-Intensive Distributed Computing CS 451/651 431/631 (Winter 2018) Part 9: Real-Time Data Analytics (2/2) March 29, 2018 Jimmy Lin David R. Cheriton School of Computer Science University of Waterloo

More information

International Symposium of Cavitation and Multiphase Flow (ISCM 2014) Beijing, China October 2014

International Symposium of Cavitation and Multiphase Flow (ISCM 2014) Beijing, China October 2014 International Symposium of Cavitation and Multiphase Flow (ISCM 2014) IOP Conference Series: Materials Science and Engineering Volume 72 Beijing, China 18-21 October 2014 ISBN: 978-1-63439-883-1 ISSN:

More information

Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON

Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON Danping Shi 1,2, Lei Hu 1,2, Siwei Sun 1,2, Ling Song 1,2, Kexin Qiao 1,2, Xiaoshuang Ma 1,2 1 State Key Laboratory of Information

More information

Using the Power of Two Choices to Improve Bloom Filters

Using the Power of Two Choices to Improve Bloom Filters Internet Mathematics Vol. 4, No. 1: 17-33 Using the Power of Two Choices to Improve Bloom Filters Steve Lumetta and Michael Mitzenmacher Abstract. We consider the combination of two ideas from the hashing

More information

A Chance-Constrained Programming Model for Inverse Spanning Tree Problem with Uncertain Edge Weights

A Chance-Constrained Programming Model for Inverse Spanning Tree Problem with Uncertain Edge Weights A Chance-Constrained Programming Model for Inverse Spanning Tree Problem with Uncertain Edge Weights 1 Xiang Zhang, 2 Qina Wang, 3 Jian Zhou* 1, First Author School of Management, Shanghai University,

More information

Consolidation properties of dredger fill under surcharge preloading in coast region of Tianjin

Consolidation properties of dredger fill under surcharge preloading in coast region of Tianjin 30 2 2011 6 GLOBAL GEOLOGY Vol. 30 No. 2 Jun. 2011 1004-5589 2011 02-0289 - 07 1 1 2 3 4 4 1. 130026 2. 130026 3. 110015 4. 430074 45 cm 100% ` TU447 A doi 10. 3969 /j. issn. 1004-5589. 2011. 02. 020 Consolidation

More information

Revenue Maximization in a Cloud Federation

Revenue Maximization in a Cloud Federation Revenue Maximization in a Cloud Federation Makhlouf Hadji and Djamal Zeghlache September 14th, 2015 IRT SystemX/ Telecom SudParis Makhlouf Hadji Outline of the presentation 01 Introduction 02 03 04 05

More information

Multi-wind Field Output Power Prediction Method based on Energy Internet and DBPSO-LSSVM

Multi-wind Field Output Power Prediction Method based on Energy Internet and DBPSO-LSSVM , pp.128-133 http://dx.doi.org/1.14257/astl.16.138.27 Multi-wind Field Output Power Prediction Method based on Energy Internet and DBPSO-LSSVM *Jianlou Lou 1, Hui Cao 1, Bin Song 2, Jizhe Xiao 1 1 School

More information

A REVIEW ON SPATIAL DATA AND SPATIAL HADOOP

A REVIEW ON SPATIAL DATA AND SPATIAL HADOOP International Journal of Latest Trends in Engineering and Technology Vol.(8)Issue(1), pp.545-550 DOI: http://dx.doi.org/10.21172/1.81.071 e-issn:2278-621x A REVIEW ON SPATIAL DATA AND SPATIAL HADOOP Kirandeep

More information

Compression in the Space of Permutations

Compression in the Space of Permutations Compression in the Space of Permutations Da Wang Arya Mazumdar Gregory Wornell EECS Dept. ECE Dept. Massachusetts Inst. of Technology Cambridge, MA 02139, USA {dawang,gww}@mit.edu University of Minnesota

More information

Face Recognition Using Global Gabor Filter in Small Sample Case *

Face Recognition Using Global Gabor Filter in Small Sample Case * ISSN 1673-9418 CODEN JKYTA8 E-mail: fcst@public2.bta.net.cn Journal of Frontiers of Computer Science and Technology http://www.ceaj.org 1673-9418/2010/04(05)-0420-06 Tel: +86-10-51616056 DOI: 10.3778/j.issn.1673-9418.2010.05.004

More information

From Geophysical Data to Geophysical Informatics

From Geophysical Data to Geophysical Informatics I CODATA S U Peng, F et al 2015 From Geophysical Data to Geophysical Informatics. Data Science Journal, 14: 13, pp. 1-5, DOI: http://dx.doi.org/10.5334/dsj- 2015-013 PROCEEDINGS PAPER From Geophysical

More information

Approximate Performance Study of Non-Line-of- Sight Ultraviolet Communication Links in Noncoplanar Geometry

Approximate Performance Study of Non-Line-of- Sight Ultraviolet Communication Links in Noncoplanar Geometry 01 7th International ICS Conference on Communications and Networking in China (CHINACOM) Approximate Performance Study of Non-Line-of- Sight Ultraviolet Communication Links in Noncoplanar Geometry Yong

More information

The Bloom Paradox: When not to Use a Bloom Filter

The Bloom Paradox: When not to Use a Bloom Filter 1 The Bloom Paradox: When not to Use a Bloom Filter Ori Rottenstreich and Isaac Keslassy Abstract In this paper, we uncover the Bloom paradox in Bloom filters: sometimes, the Bloom filter is harmful and

More information

Nearest Neighbor Search with Keywords in Spatial Databases

Nearest Neighbor Search with Keywords in Spatial Databases 776 Nearest Neighbor Search with Keywords in Spatial Databases 1 Sphurti S. Sao, 2 Dr. Rahila Sheikh 1 M. Tech Student IV Sem, Dept of CSE, RCERT Chandrapur, MH, India 2 Head of Department, Dept of CSE,

More information

arxiv: v1 [physics.ins-det] 19 Apr 2014

arxiv: v1 [physics.ins-det] 19 Apr 2014 Sub to Chinese Physics C Vol. 33, No. X, Xxx, 9 Proton irradiation effect on SCDs * arxiv:144.4931v1 [physics.ins-det] 19 Apr 14 YANG Yan-Ji() 1,;1) LU Jing-Bin() 1 WANG Yu-Sa() CHEN Yong() XU Yu-Peng()

More information

2005 Journal of Software (, ) A Spatial Index to Improve the Response Speed of WebGIS Servers

2005 Journal of Software (, ) A Spatial Index to Improve the Response Speed of WebGIS Servers 1000-9825/2005/16(05)0819 2005 Journal of Software Vol.16, No.5 WebGIS +,, (, 410073) A Spatial Index to Improve the Response Speed of WebGIS Servers YE Chang-Chun +, LUO Jin-Ping, ZHOU Xing-Ming (Institute

More information

CALCULATION OF THE MINIMUM COMPUTATIONAL COMPLEXITY BASED ON INFORMATION ENTROPY

CALCULATION OF THE MINIMUM COMPUTATIONAL COMPLEXITY BASED ON INFORMATION ENTROPY CALCULATION OF THE MINIMUM COMPUTATIONAL COMPLEXITY BASED ON INFORMATION ENTROPY Xue Wu 1 1 Department of Microelectronics, Tsinghua University, Beijing, China wuxiqh@yahoo.cn ABSTRACT In order to find

More information

Surveying, Mapping and Remote Sensing (LIESMARS), Wuhan University, China

Surveying, Mapping and Remote Sensing (LIESMARS), Wuhan University, China Name: Peng Yue Title: Professor and Director, Institute of Geospatial Information and Location Based Services (IGILBS) Associate Chair, Department of Geographic Information Engineering School of Remote

More information

Spatial Data Science. Soumya K Ghosh

Spatial Data Science. Soumya K Ghosh Workshop on Data Science and Machine Learning (DSML 17) ISI Kolkata, March 28-31, 2017 Spatial Data Science Soumya K Ghosh Professor Department of Computer Science and Engineering Indian Institute of Technology,

More information

Succinct Approximate Counting of Skewed Data

Succinct Approximate Counting of Skewed Data Succinct Approximate Counting of Skewed Data David Talbot Google Inc., Mountain View, CA, USA talbot@google.com Abstract Practical data analysis relies on the ability to count observations of objects succinctly

More information

Organization and Correction of Spatial Data in Mobile GIS

Organization and Correction of Spatial Data in Mobile GIS 1514 JOURNAL OF NETWORKS, VOL. 8, NO. 7, JULY 2013 Organization and Correction of Spatial Data in Mobile GIS Feixiang Chen *, Xiao Ma, and Shaoliang Ni School of Information Science and Technology, Beijing

More information

Hidden Number Problem Given Bound of Secret Jia-ning LIU and Ke-wei LV *

Hidden Number Problem Given Bound of Secret Jia-ning LIU and Ke-wei LV * 2017 2nd International Conference on Artificial Intelligence: Techniques and Applications (AITA 2017) ISBN: 978-1-60595-491-2 Hidden Number Problem Given Bound of Secret Jia-ning LIU and Ke-wei LV * DCS

More information

Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015)

Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) Extracting Land Cover Change Information by using Raster Image and Vector Data Synergy Processing Methods Tao

More information

Metal Organic Framework-Derived Metal Oxide Embedded in Nitrogen-Doped Graphene Network for High-Performance Lithium-Ion Batteries

Metal Organic Framework-Derived Metal Oxide Embedded in Nitrogen-Doped Graphene Network for High-Performance Lithium-Ion Batteries Supporting Information for Metal Organic Framework-Derived Metal Oxide Embedded in Nitrogen-Doped Graphene Network for High-Performance Lithium-Ion Batteries Zhu-Yin Sui, Pei-Ying Zhang,, Meng-Ying Xu,

More information

V r : A new index to represent the variation rate of geomagnetic activity

V r : A new index to represent the variation rate of geomagnetic activity Earthq Sci (2010)23: 343 348 343 Doi: 10.1007/s11589-010-0731-9 V r : A new index to represent the variation rate of geomagnetic activity Dongmei Yang 1, Yufei He 1 Chuanhua Chen 2 and Jiadong Qian 3 1

More information

Study on form distribution of soil iron in western Jilin and its correlation with soil properties

Study on form distribution of soil iron in western Jilin and its correlation with soil properties 35 2 2016 6 GLOBAL GEOLOGY Vol. 35 No. 2 Jun. 2016 1004 5589 2016 02 0593 08 1 1 2 1 1 1. 130061 2. 130012 50 A > B > C > D > E > F > G A A CEC B ph C E A C D G B C D P595 S151. 9 A doi 10. 3969 /j. issn.

More information

Dynamical Behavior Analysis of Fixed Points of Investment Competition Model

Dynamical Behavior Analysis of Fixed Points of Investment Competition Model Dynamical Behavior Analysis of Fixed Points of Investment Competition Model Shujuan Guo 1,BingHan, and Chunmei Yuan 1 1 School of Physics and Mathematics, Changzhou University Changzhou 13164, China shujuanguohb@yahoo.cn,

More information

A tunable corner-pumped Nd:YAG/YAG composite slab CW laser

A tunable corner-pumped Nd:YAG/YAG composite slab CW laser Chin. Phys. B Vol. 21, No. 1 (212) 1428 A tunable corner-pumped Nd:YAG/YAG composite slab CW laser Liu Huan( 刘欢 ) and Gong Ma-Li( 巩马理 ) State Key Laboratory of Tribology, Center for Photonics and Electronics,

More information