O(m) CPU 1 CPU Xeon LZEnd L1 1 L2 1.5 MiB 40 [10] CPU on-memory 2 2 LZEnd LZEnd 1 Xeon 5670 Xeon 5670 L1 data L2 LL Last Level 129 KiB 1
|
|
- ああす はらしない
- 5 years ago
- Views:
Transcription
1 DEIM Forum 2015 G3-3 LZE++: NTT {yamamuro.takeshi,honjo.toshimori}@lab.ntt.co.jp, onizuka@ist.osaka-u.ac.jp T[0...N-1] m LZE++ O(m) LZ77 LZEnd LZEnd O(m) CPU LZE++ O(m) mk/n+1 K K< = N while-loop LZEnd LZEnd on-memory 64 KiB KiB LZ77 1. LZ77 UNIX gzip 1 CPU Snappy 2 LZ77 DBMS [1] [2] [11] URI LZ N O(N) N 2 1 k Block-based Compression BC i i/k i%k O(k) Lucene 2 m O(m) LZEnd [3] LZEnd LZ ,. [5] [6] [7] [8].. BC k. k k k LZEnd
2 O(m) CPU 1 CPU Xeon LZEnd L1 1 L2 1.5 MiB 40 [10] CPU on-memory 2 2 LZEnd LZEnd 1 Xeon 5670 Xeon 5670 L1 data L2 LL Last Level 129 KiB 1.5 MiB 12 MiB 16 KiB PrefixSpan [12] O(m) mk/n+1 K K< = N while-loop LZE++ mk/n+1 LZEnd LZEnd on-memory 64 KiB KiB LZE++ LZEnd LZE LZEnd 2 LZEnd 3. O(m) mk/n : LZEnd 2 LZEnd L1 m BC LZE++ LZE++ O(m) while-loop LZEnd N M M<<N) k LZEnd T[0...N-1]=t 0 t 1...t N 1 t i Σ 0< = i<n 3 Z[0...K-1]=z 0 z 1...z K 1 (K K< = N) T[0...i-1] Z[0...p-1] history Z[0...q] (q<p) T[i...i+l-1] T[i...N-1] T[i...i+l] z p =z q t i+l T[i...i+l-1] history z q source T[N-1] LZEnd z K 1 coarsely optimal [13] Theorem 1. ρ(t ) k H k (T ) [14] T 3 Σ
3 T 0 k lim T f k ( T )=0 s.t. ρ(t ) < = H k (T )+f k ( T ) f k 2. 1 LZEnd LZEnd Z 3 c[0...k-1]: Z x[0...k-1]: z q source B[0...N-1]: c bit z p=z qt i+l c[p]=t i+l x[p]=q B[i+l] bit B rank select rank B(i) B[0...i] bit select B(i) i+1 bit rank select O(1) O(logN) bit B NH 0 [15] z p l B select B select B(p+1)-select B(p) LZEnd Algorithm 1 extract(base, m) 1: /* IN base: start position to decompress */ 2: /* IN m: length */ 3: /* OUT extracted symbols in T[base...base+m-1] */ 4: if n > 0 then 5: end = base + m - 1; 6: r = rank B (end); 7: if B[end] == 1 then 8: extract(base, m - 1); 9: Append c[r] to an output; 10: else 11: pos = select B (r) + 1; 12: if base < pos then 13: extract(base, pos - base); 14: m = end - pos : base = pos; 16: end if 17: ref = select B (x[r+1]) - select B (r + 1) + base + 1; 18: extract(ref, m); 19: end if 20: end if LZEnd Algorithm 1 [3] extract(base, m) T[base...base+m-1] B[end] bit 7 c[r] 9 LZEnd T[i...i+l-1] history z q source source extract T[i...i+l-1] extract m O(m) extract 3. : LZE LZE++ O(m) T[0...N-1] k PrefixSpan [12] S[0...M-1] M<<N LZE++ LZEnd c extract 1 3 abcd LZEnd d c abc extract 3 extract LZE++ ab 2 LZE++ extract LZEnd x CPU LZE++ PrefixSpan CPU CPU 4 (extract seq) wlen extract LZE++ wlen wlen
4 4 wlen extract wlen agpxz LZE++ extract seq CPU 3. 4 CPU 3. 2 LZE S[0...M-1] M<<N CPU k PrefixSpan [12] T N r% B L 0 0, kn/l, 2kN/L,... L/k k PrefixSpan α β ξ Algorithm 2 PrefixSpan 5 ababaac I B L B[i...L-1] (i I) {0, 1,..., L-1} 7 15 Σ s Σ s 13 length α β 10 4 ξ 9 I s B[i...i+length] i I s S 11 S abcde abcd 9 B[i...i+length+1] /S α=2, β=3 2 ξ=2 I {0, 1,..., 6} a, aa, aaa, aab,... 1 ab {0, 2, 4, 5} 2 2 ab S ba S S={ab, ba} S abba 3. 3 LZE++ LZE++ LZEnd 2. 1 hisotry LZE++ LZEnd S[0...M-1]: x [0...K-1]: S Algorithm 2 PrefixSpan(I, length) 1: /* IN I: indices of T and initially I = {0...N-1} */ 2: /* IN length: length of common prefixes among suffixes */ 3: /* OUT S: set of frequent patterns (shared dictionary) */ 4: if length > β then 5: Return; 6: end if 7: while s Σ do 8: I s = {i i I T[i + length] == s}; 9: if I s > = ξ then 10: if length > α && T[i...i + length + 1] / S then 11: S = S {T[i...i + length] i I s}; 12: end if 13: PrefixSpan(I s, length + 1); 14: end if 15: end while 5 ababaac PrefixSpan α=2, β=3, ξ=2 S={ab, ba} R[0...K-1]: bit z p z p =S[j...j+l-1]t i+l c[p]=t i+l x [p]=j B[i+l] R[p] bit LZE++ z p source z q q<p Z[x[p]] S[x [p]] R Algorithm 3 LZEnd extract Algorithm Algorithm 3 LZEnd extract 1: if R[r] == 1 then 2: ref = x [rank R (r) + base - pos]; 3: Append S[ref...ref + m] to B; 4: else 5: ref = select B (x[r + 1]) - select B (r + 1) + base + 1; 6: extract(ref, m); 7: end if LZE++ LZEnd Theorem 2. Z[p] Z[p ] p<p Z[p ] 2 history Z[p]c c Σ S[i...i+k-1]c i+k-1<m Z[p ] Z[p] history 3. 4 extract seq
5 CPU LZE++ wlen wlen T[base...base+m-1] m>wlen T[base...wlen-1] extract T[base+wlen...base+m-1] extract seq wlen LZE++ x log(wlen)-bit extract seq CPU LZE++ B R bit LZEnd Algorithm 4 T[base+wlen...base+m-1] extract seq T[base...wlen-1] extract (r1, r2, pos) while-loop 1 1 B CPU bit x64 CPU 64bit B bit bsr 0 0 l!=0 R[r2]==0 14 x select B 13 R[r2]= O(m) mk/n+1 while-loop 3 K/N<1 CPU 1 rank/select 4. LZE++ LZEnd 4. 1 LZE++ LZEnd LZEnd 2. 2 c 1B x source 4B Algorithm 4 extract seq(base, m) 1: /* IN base: start position to decompress */ 2: /* IN m: length (m > wlen) */ 3: /* OUT extracted symbols in T[base + wlen...base + m - 1] */ 4: r1 = rank B (base + wlen); 5: r2 = rank R (r1); 6: pos = select B (r1) + 1; 7: while pos - base < m do 8: l = Count leading zeroes from pos in B 9: if l!= 0 then 10: if R[r2] == 0 then 11: r3 = r1 - x[r1] + 1; 12: ref = select B (r3); 13: Copy T[ref...ref + l - 1] to an output; 14: else 15: ref = x [r2++]; 16: Copy S[ref...ref + l - 1] to an output; 17: end if 18: end if 19: Print c[r1++] to an output; 20: pos += l + 1; 21: end while bit B [3] rank select RecRank [15] LZEnd c x B 41bit LZEnd Suffix Array LZE++ c B LZEnd x 3. 4 log(wlen)-bit wlen 65,536 2B S 1B S 4B 3. 2 PrefixSpan T 1% r=1 k=1024 B PrefixSpan α β ξ LZE++ c S x x B R 58bits 8B 64bits α=8 wlen LZ77 LZE LZEnd Suffix Array O(m) while-loop B R LZE++1 LZE++2 2 LZE++1 LZEnd RecRank B R 3. 4 while-loop 1 select B select LZE++2 R LZE++1 select B LZE++2
6 DNA (influenza Escherichia Coli) einstein.de.txt world leaders 4 2 enwiki8 5 gov2 6 3 Hadoop 7 Cassandra 8 PostgreSQL 9 (1) (2) enwiki Wikipedia 10 8 B gov gov Web 128 MiB (3) 128 MiB 4. 3 LZE++ LZEnd LZE++ PostgreSQL einstein.de.txt enwiki8 3 LZE++ mk/n+1 while-loop K 4. 5 LZEnd 6 gzip (Version 1.4) LZ77 bzip2 10 (Version 1.0.6) Burrows-Wheeler [14] gzip bzip2-9 lzip 11 (Version 1.12) LZ77 LZMA Snappy (Revision 73) LZ4 (Revision 90) LZ77 Re-Pair 12 [16] Xeon5670 Xeon5670 L1 L2 LL 129 KiB 1.5 MiB 12 MiB CPU perf v3.6.9 C++ gcc v O KiB B 2 16 B LZE++ LZEnd PostgreSQL einstein.de.txt mmahoney/compression/textdata.html 6 mmahoney/compression/textdata.html rwan/en/restore.html 7 T T[0...N-1] S enwik8 LZE++ LZEnd LZEnd LZE LZE select B LZE++ LZE T k B B PrefixSpan T[0...N-1] S T[i...i + l] PostgreSQL 44.57% 71.32% 63.8 KiB 4.83% einstein.de.txt 23.78% 22.85% KiB 13.07% enwik % 47.46% 27.8 KiB 2.84% einstein.de.txt enwik8 0.93% 18.74% CPU L1/LL 8 LZEnd baseline LZE++ LZEnd CPU LL LZEnd LL 16.01% 55.59% 39.37% LL LZE KiB B 2 23 B LZE++ LZEnd LZE++ LZEnd LZEnd LZE LZE
7 6 2 5 B (32 B) 2 23 B (8 MiB) PostgreSQ einstein.de.txt enwik KiB LZEnd LZE LZE++ 64 KiB 3. 3 O(m) mk/n+1 while-loop 4. 4 LZEnd MiB Cassandra PostgreSQL wlen LZEnd 1.52% 6.15% world leaders 36.41% LZE++ Suffix Array 17bit 6 gzip bzip2 lzip Re-Pair LZEnd LZE++ LZEnd LZE++ Re-Pair DNA bzip2 enwik8 gov2 Snappy LZ7 LZEnd LZE++ LZE++ LZ-End LZE++ gzip Escherichia Coli einstein.de.txt bzip2 2 bzip2 lzip LZE++ Snappy LZ4 Re-Pair 4. 5 LZEnd LZE++ 9 LZEnd LZE LZEnd LZE B LZE++ LZEnd PostgreSQL LZEnd 5. [1] [2] [11] DBMS
8 1 LZE++ Apache Cassandra PostgreSQL ( ) wlen LZEnd 1.52% 6.15% Source Size(B) LZE++ LZEnd gzip-9 bzip-9 lzip Snappy LZ4 Re-Pair Escherichia Coli 112,689, influenza 154,808, einstein.de.txt 92,758, world leaders 46,968, enwik8 100,000, gov2 135,268, Hadoop 135,268, Cassandra 135, PostgreSQL 135,268, MiB ms LZE++ LZ-End Source LZE++ LZEnd gzip-9 bzip-9 lzip Snappy LZ4 Re-Pair Escherichia Coli influenza einstein.de.txt world leaders enwik gov Hadoop Cassandra PostgreSQL [1] Run Length Encoding Bitmap Encoding [5] [6] [7] [8] [2] LZEnd [4] [17] N O(logN) 6. m LZE++ LZE++ O(m) while-loop [1] D. Abadi et al., The Design and Implementation of Modern Column-Oriented Database Systems, Foundations and Trends c in Databases, Vol. 5, No. 3, pp , [2] P. Ferragina and G. Manzini, On Compressing the Textual Web, Proceedings of WSDM, [3] S. Kreft and G. Navarro, LZ77-like Compression with Fast Random Access, Proceedings of DCC, [4] S. Kreft and G. Navarro, Self-indexing based on LZ77, Proceedings of CPM, [5] K.Sadakane, New Text Indexing Functionalities of the Compressed Suffix Arrays, J. Algorithms, Vol. 48, No. 2, [6] R. Grossi, A. Gupta, and J. S. Vitter, High-Order Entropy- Compressed Text Indexes, Proceedings of SODA, [7] R.Grossi and J.S.Vitter, Compressed Suffix Arrays and Suffix Trees with Applications to Text Indexing and String Matching, SIAM J. Comput., Vol. 35, No. 2, pp , [8] P. Ferragina and G. Manzini, Opportunistic Data Structures with Applications, Proceedings of 41st FOCS, [9] U. Manber and G. Myers, Suffix Arrays: a New Method for On-line String Searches, Proceedings of SODA, [10] C. Kim et al., Closing the Ninja Performance Gap through Traditional Programming and Compiler Technology, techresearch.intel.com, [11] C. Hoobin et al., Relative Lempel-Ziv Factorization for Efficient Storage and Retrieval of Web Collections, Proceedings of VLDB Endow., Vol. 5, No. 3, [12] J. Pei, et al., PrefixSpan: Mining Sequential Patterns Efficiently by Prefix-Projected Pattern Growth, Proceedings of 17th ICDE, [13] Kosaraju, S.R. and Manzini, G., Compression of Low Entropy Strings with Lempel-Ziv Algorithms, Proceedings of CCS, [14] G. Manzini, An Analysis of the Burrows-Wheeler Transform, J. ACM, Vol. 48, No. 3, pp , [15] D. Okanohara and K. Sadakane, Practical Entropy-Compressed rank/select Dictionary, Proceedings of ALENEX, pp , [16] N. Larsson and A. Moffat, Offline dictionary-based compression, Proceedings of DCC, 1999, pp , [17] B. Philip et al., Random access to grammar-compressed strings, Proceedings of SODA, 2011
DEIM Forum 2013 C10-2 Re-Pair {k sekine, sasakawa, syoshid, 1999 Larsson Moffat Re-Pair Re-Pair Re-Pair
DEIM Forum 2013 C10-2 Re-Pair 060 0814 14 9 E-mail: k sekine, sasakawa, syoshid, kida}@ist.hokudai.ac.jp 1999 Larsson Moffat Re-Pair Re-Pair Re-Pair VF Variable-to-Fixed-Length Encoding for Large Texts
More informationFig. 3 3 Types considered when detecting pattern violations 9)12) 8)9) 2 5 methodx close C Java C Java 3 Java 1 JDT Core 7) ) S P S
1 1 1 Fig. 1 1 Example of a sequential pattern that is exracted from a set of method definitions. A Defect Detection Method for Object-Oriented Programs using Sequential Pattern Mining Goro YAMADA, 1 Norihiro
More informationIPSJ SIG Technical Report Vol.2014-DBS-159 No.6 Vol.2014-IFAT-115 No /8/1 1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Info
1,a) 1 1 1,, 1. ([1]) ([2], [3]) A B 1 ([4]) 1 Graduate School of Information Science and Technology, Osaka University a) kawasumi.ryo@ist.osaka-u.ac.jp 1 1 Bucket R*-tree[5] [4] 2 3 4 5 6 2. 2.1 2.2 2.3
More informationRun-Based Trieから構成される 決定木の枝刈り法
Run-Based Trie 2 2 25 6 Run-Based Trie Simple Search Run-Based Trie Network A Network B Packet Router Packet Filtering Policy Rule Network A, K Network B Network C, D Action Permit Deny Permit Network
More informationCPU Levels in the memory hierarchy Level 1 Level 2... Increasing distance from the CPU in access time Level n Size of the memory at each level 1: 2.2
FFT 1 Fourier fast Fourier transform FFT FFT FFT 1 FFT FFT 2 Fourier 2.1 Fourier FFT Fourier discrete Fourier transform DFT DFT n 1 y k = j=0 x j ω jk n, 0 k n 1 (1) x j y k ω n = e 2πi/n i = 1 (1) n DFT
More information2 ID POS 1... 1 2... 2 2.1 ID POS... 2 2.2... 3 3... 5 3.1... 5 3.2... 6 3.2.1... 6 3.2.2... 7 3.3... 7 3.3.1... 7 3.3.2... 8 3.3.3... 8 3.4... 9 4... 11 4.1... 11 4.2... 15 4.3... 27 5... 35... 36...
More informationVol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m
Vol.55 No.1 2 15 (Jan. 2014) 1,a) 2,3,b) 4,3,c) 3,d) 2013 3 18, 2013 10 9 saccess 1 1 saccess saccess Design and Implementation of an Online Tool for Database Education Hiroyuki Nagataki 1,a) Yoshiaki
More information透過的データアクセスを実現する新しいデータ圧縮法
2013 年度 ERATO 秋の WS ブロック間の辞書共有による Re-Pairアルゴリズムの大規模テキスト圧縮への適用 北海道大学大学院情報科学研究科コンピュータサイエンス専攻 喜田拓也 登別温泉第一滝本館本館会議室 1 2013/09/13 研究の背景と目的 気象衛星データ 航空写真データ リモートセンシングデータ Internet SNS 市民からの情報提供 市民への道路情報の提供 UGC(User
More informationbit bit bit VAST N d i d 1 <d 2 <...<d k <...<d N d k VAST d k 3 d k 3 d k 2 d k 1 d k 4 w w=4 ) HW HW 32bit γ δ [4] PForDelta [3] HW CPU VAST VAST VA
DEIM Forum 2013 F10-6 VAST CPU NTT, 180-0012 3-9-11 E-mail: {yamamuro.takeshi,onizuka.makoto,konishi.fumikazu}@lab.ntt.co.jp CPU HW HW HW VAST VAST SIMD CPU TLB bit VAST VAST VAST VAST CPU SIMD VAST-Tree
More information共有辞書を用いた 効率の良い圧縮アルゴリズム
大規模テキストに対する 共有辞書を用いた Re-Pair 圧縮法 Variable-to-Fixed-Length Encoding for Large Texts Using Re-Pair Algorithm with Efficient Shared Dictionaries 関根渓, 笹川裕人, 吉田諭史, 喜田拓也 北海道大学大学院情報科学研究科 1 背景 : 巨大なデータ 計算機上で扱うデータの巨大化.
More informationrank ”«‘‚“™z‡Ì GPU ‡É‡æ‡éŁÀŠñ›»
rank GPU ERATO 2011 11 1 1 / 26 GPU rank/select wavelet tree balanced parenthesis GPU rank 2 / 26 GPU rank/select wavelet tree balanced parenthesis GPU rank 2 / 26 GPU rank/select wavelet tree balanced
More informationDuplicate Near Duplicate Intact Partial Copy Original Image Near Partial Copy Near Partial Copy with a background (a) (b) 2 1 [6] SIFT SIFT SIF
Partial Copy Detection of Line Drawings from a Large-Scale Database Weihan Sun, Koichi Kise Graduate School of Engineering, Osaka Prefecture University E-mail: sunweihan@m.cs.osakafu-u.ac.jp, kise@cs.osakafu-u.ac.jp
More information1 12 ( )150 ( ( ) ) x M x 0 1 M 2 5x 2 + 4x + 3 x 2 1 M x M 2 1 M x (x + 1) 2 (1) x 2 + x + 1 M (2) 1 3 M (3) x 4 +
( )5 ( ( ) ) 4 6 7 9 M M 5 + 4 + M + M M + ( + ) () + + M () M () 4 + + M a b y = a + b a > () a b () y V a () V a b V n f() = n k= k k () < f() = log( ) t dt log () n+ (i) dt t (n + ) (ii) < t dt n+ n
More informationVol. 0 No Fast Traversal of Suffix Arrays for Full-Text Approximate String Matching Masao Utiyama and Hitoshi Isahara Given a text and a
Vol. 0 No. 0 1959 2 2 2 Fast Traversal of Suffix Arrays for Full-Text Approximate String Matching Masao Utiyama and Hitoshi Isahara Given a text and an input pattern, the goal of full-text approximate
More informationy = x 4 y = x 8 3 y = x 4 y = x 3. 4 f(x) = x y = f(x) 4 x =,, 3, 4, 5 5 f(x) f() = f() = 3 f(3) = 3 4 f(4) = 4 *3 S S = f() + f() + f(3) + f(4) () *4
Simpson H4 BioS. Simpson 3 3 0 x. β α (β α)3 (x α)(x β)dx = () * * x * * ɛ δ y = x 4 y = x 8 3 y = x 4 y = x 3. 4 f(x) = x y = f(x) 4 x =,, 3, 4, 5 5 f(x) f() = f() = 3 f(3) = 3 4 f(4) = 4 *3 S S = f()
More informationPart () () Γ Part ,
Contents a 6 6 6 6 6 6 6 7 7. 8.. 8.. 8.3. 8 Part. 9. 9.. 9.. 3. 3.. 3.. 3 4. 5 4.. 5 4.. 9 4.3. 3 Part. 6 5. () 6 5.. () 7 5.. 9 5.3. Γ 3 6. 3 6.. 3 6.. 3 6.3. 33 Part 3. 34 7. 34 7.. 34 7.. 34 8. 35
More information2/ 土 :30 11:20 似通った科目名がありますので注意してください. 受験許可されていない科目を解答した場合は無効 整理番号と科目コードは受験許可証とよく照合し正確に記入
2/ 土 28 9 10 10:30 11:20 似通った科目名がありますので注意してください. 受験許可されていない科目を解答した場合は無効 整理番号と科目コードは受験許可証とよく照合し正確に記入 30 10 11 12 00011 00016 01101 02607 02703 (1) AB AB 100 cm 2 3.00 cm 2 9.80 m/s 2 AB A B A 10.0 kg A
More information( ) ( ) lex LL(1) LL(1)
() () lex LL(1) LL(1) http://www.cs.info.mie-u.ac.jp/~toshi/lectures/compiler/ 29 5 14 1 1 () / (front end) (back end) (phase) (pass) 1 2 1 () () var left, right; fun int main() { left = 0; right = 10;
More informationDEIM Forum 2009 C8-4 QA NTT QA QA QA 2 QA Abstract Questions Recomme
DEIM Forum 2009 C8-4 QA NTT 239 0847 1 1 E-mail: {kabutoya.yutaka,kawashima.harumi,fujimura.ko}@lab.ntt.co.jp QA QA QA 2 QA Abstract Questions Recommendation Based on Evolution Patterns of a QA Community
More informationx, y x 3 y xy 3 x 2 y + xy 2 x 3 + y 3 = x 3 y xy 3 x 2 y + xy 2 x 3 + y 3 = 15 xy (x y) (x + y) xy (x y) (x y) ( x 2 + xy + y 2) = 15 (x y)
x, y x 3 y xy 3 x 2 y + xy 2 x 3 + y 3 = 15 1 1977 x 3 y xy 3 x 2 y + xy 2 x 3 + y 3 = 15 xy (x y) (x + y) xy (x y) (x y) ( x 2 + xy + y 2) = 15 (x y) ( x 2 y + xy 2 x 2 2xy y 2) = 15 (x y) (x + y) (xy
More informationv 1 v 2 e g ˆ Š Œ Ž p š ~ m n u { i 1, i 2, i 3, i 4 } { i 1, i 5 } v 1 v 2 v 3 v 4 v 5 v 6 { i 1, i 2, i 4 } { i 1, i 2, i 3, i 5 } { i 1, i 3, i 4 }
DEIM Forum 2009 D2-1 COPINE: 112 86 2 1 1 E-mail: {seki,sesejun}@sel.is.ocha.ac.jp COPINE COPINE: Mining Networks Sharing Common Patterns Mio SEKI and Jun SESE Graduate School of Humanities and Sciences,
More information2 2 MATHEMATICS.PDF 200-2-0 3 2 (p n ), ( ) 7 3 4 6 5 20 6 GL 2 (Z) SL 2 (Z) 27 7 29 8 SL 2 (Z) 35 9 2 40 0 2 46 48 2 2 5 3 2 2 58 4 2 6 5 2 65 6 2 67 7 2 69 2 , a 0 + a + a 2 +... b b 2 b 3 () + b n a
More information漸化式のすべてのパターンを解説しましたー高校数学の達人・河見賢司のサイト
https://www.hmg-gen.com/tuusin.html https://www.hmg-gen.com/tuusin1.html 1 2 OK 3 4 {a n } (1) a 1 = 1, a n+1 a n = 2 (2) a 1 = 3, a n+1 a n = 2n a n a n+1 a n = ( ) a n+1 a n = ( ) a n+1 a n {a n } 1,
More information1. A0 A B A0 A : A1,...,A5 B : B1,...,B12 2. 5 3. 4. 5. A0 (1) A, B A B f K K A ϕ 1, ϕ 2 f ϕ 1 = f ϕ 2 ϕ 1 = ϕ 2 (2) N A 1, A 2, A 3,... N A n X N n X N, A n N n=1 1 A1 d (d 2) A (, k A k = O), A O. f
More information( 9 1 ) 1 2 1.1................................... 2 1.2................................................. 3 1.3............................................... 4 1.4...........................................
More information1. A0 A B A0 A : A1,...,A5 B : B1,...,B
1. A0 A B A0 A : A1,...,A5 B : B1,...,B12 2. 3. 4. 5. A0 A, B Z Z m, n Z m n m, n A m, n B m=n (1) A, B (2) A B = A B = Z/ π : Z Z/ (3) A B Z/ (4) Z/ A, B (5) f : Z Z f(n) = n f = g π g : Z/ Z A, B (6)
More informationBW BW
Induced Sorting BW 11T2042B 2015 3 23 1 1 1.1................................ 1 1.2................................... 1 2 BW 1 2.1..................................... 2 2.2 BW.................................
More information2 2 ( M2) ( )
2 2 ( M2) ( ) 2007 3 3 1 2 P. Gaudry and R. Harley, 2000 Schoof 63bit 2 8 P. Gaudry and É. Schost, 2004 80bit 1 / 2 16 2 10 2 p: F p 2 C : Y 2 =F (X), F F p [X] : monic, deg F = 5, J C (F p ) F F p p Frobenius
More informationGray [6] cross tabulation CUBE, ROLL UP Johnson [7] pivoting SQL 3. SuperSQL SuperSQL SuperSQL SQL [1] [2] SQL SELECT GENERATE <media> <TFE> GENER- AT
DEIM Forum 2017 E3-1 SuperSQL 223 8522 3 14 1 E-mail: {tabata,goto}@db.ics.keio.ac.jp, toyama@ics.keio.ac.jp,,,, SuperSQL SuperSQL, SuperSQL. SuperSQL 1. SuperSQL, Cross table, SQL,. 1 1 2 4. 1 SuperSQL
More information2006 3
JAIST Reposi https://dspace.j Title 質問の曖昧性を考慮した質問応答システムに関する研 究 Author(s) 松本, 匡史 Citation Issue Date 2006-03 Type Thesis or Dissertation Text version author URL http://hdl.handle.net/10119/1986 Rights Description
More informationDEIM Forum 2017 H ,
DEIM Forum 217 H5-4 113 8656 7 3 1 153 855 4 6 1 3 2 1 2 E-mail: {satoyuki,haya,kgoda,kitsure}@tkl.iis.u-tokyo.ac.jp,.,,.,,.,, 1.. 1956., IBM IBM RAMAC 35 IBM 35 24 5, 5MB. 1961 IBM 131,,, IBM 35 13.,
More informationjohnny-paper2nd.dvi
13 The Rational Trading by Using Economic Fundamentals AOSHIMA Kentaro 14 2 26 ( ) : : : The Rational Trading by Using Economic Fundamentals AOSHIMA Kentaro abstract: Recently Artificial Markets on which
More informationII (Percolation) ( 3-4 ) 1. [ ],,,,,,,. 2. [ ],.. 3. [ ],. 4. [ ] [ ] G. Grimmett Percolation Springer-Verlag New-York [ ] 3
II (Percolation) 12 9 27 ( 3-4 ) 1 [ ] 2 [ ] 3 [ ] 4 [ ] 1992 5 [ ] G Grimmett Percolation Springer-Verlag New-York 1989 6 [ ] 3 1 3 p H 2 3 2 FKG BK Russo 2 p H = p T (=: p c ) 3 2 Kesten p c =1/2 ( )
More information,,,,., C Java,,.,,.,., ,,.,, i
24 Development of the programming s learning tool for children be derived from maze 1130353 2013 3 1 ,,,,., C Java,,.,,.,., 1 6 1 2.,,.,, i Abstract Development of the programming s learning tool for children
More information2
2 485 1300 1 6 17 18 3 18 18 3 17 () 6 1 2 3 4 1 18 11 27 10001200 705 2 18 12 27 10001230 705 3 19 2 5 10001140 302 5 () 6 280 2 7 ACCESS WEB 8 9 10 11 12 13 14 3 A B C D E 1 Data 13 12 Data 15 9 18 2
More informationT rank A max{rank Q[R Q, J] t-rank T [R T, C \ J] J C} 2 ([1, p.138, Theorem 4.2.5]) A = ( ) Q rank A = min{ρ(j) γ(j) J J C} C, (5) ρ(j) = rank Q[R Q,
(ver. 4:. 2005-07-27) 1 1.1 (mixed matrix) (layered mixed matrix, LM-matrix) m n A = Q T (2m) (m n) ( ) ( ) Q I m Q à = = (1) T diag [t 1,, t m ] T rank à = m rank A (2) 1.2 [ ] B rank [B C] rank B rank
More informationuntitled
18 1 2,000,000 2,000,000 2007 2 2 2008 3 31 (1) 6 JCOSSAR 2007pp.57-642007.6. LCC (1) (2) 2 10mm 1020 14 12 10 8 6 4 40,50,60 2 0 1998 27.5 1995 1960 40 1) 2) 3) LCC LCC LCC 1 1) Vol.42No.5pp.29-322004.5.
More informationコンピュータ概論
4.1 For Check Point 1. For 2. 4.1.1 For (For) For = To Step (Next) 4.1.1 Next 4.1.1 4.1.2 1 i 10 For Next Cells(i,1) Cells(1, 1) Cells(2, 1) Cells(10, 1) 4.1.2 50 1. 2 1 10 3. 0 360 10 sin() 4.1.2 For
More informationSQUFOF NTT Shanks SQUFOF SQUFOF Pentium III Pentium 4 SQUFOF 2.03 (Pentium 4 2.0GHz Willamette) N UBASIC 50 / 200 [
SQUFOF SQUFOF NTT 2003 2 17 16 60 Shanks SQUFOF SQUFOF Pentium III Pentium 4 SQUFOF 2.03 (Pentium 4 2.0GHz Willamette) 60 1 1.1 N 62 16 24 UBASIC 50 / 200 [ 01] 4 large prime 943 2 1 (%) 57 146 146 15
More informationさくらの個別指導 ( さくら教育研究所 ) 1 φ = φ 1 : φ [ ] a [ ] 1 a : b a b b(a + b) b a 2 a 2 = b(a + b). b 2 ( a b ) 2 = a b a/b X 2 X 1 = 0 a/b > 0 2 a
φ + 5 2 φ : φ [ ] a [ ] a : b a b b(a + b) b a 2 a 2 b(a + b). b 2 ( a b ) 2 a b + a/b X 2 X 0 a/b > 0 2 a b + 5 2 φ φ : 2 5 5 [ ] [ ] x x x : x : x x : x x : x x 2 x 2 x 0 x ± 5 2 x x φ : φ 2 : φ ( )
More informationXcalableMP入門
XcalableMP 1 HPC-Phys@, 2018 8 22 XcalableMP XMP XMP Lattice QCD!2 XMP MPI MPI!3 XMP 1/2 PCXMP MPI Fortran CCoarray C++ MPIMPI XMP OpenMP http://xcalablemp.org!4 XMP 2/2 SPMD (Single Program Multiple Data)
More information13 0 1 1 4 11 4 12 5 13 6 2 10 21 10 22 14 3 20 31 20 32 25 33 28 4 31 41 32 42 34 43 38 5 41 51 41 52 43 53 54 6 57 61 57 62 60 70 0 Gauss a, b, c x, y f(x, y) = ax 2 + bxy + cy 2 = x y a b/2 b/2 c x
More informationI A A441 : April 15, 2013 Version : 1.1 I Kawahira, Tomoki TA (Shigehiro, Yoshida )
I013 00-1 : April 15, 013 Version : 1.1 I Kawahira, Tomoki TA (Shigehiro, Yoshida) http://www.math.nagoya-u.ac.jp/~kawahira/courses/13s-tenbou.html pdf * 4 15 4 5 13 e πi = 1 5 0 5 7 3 4 6 3 6 10 6 17
More information., White-Box, White-Box. White-Box.,, White-Box., Maple [11], 2. 1, QE, QE, 1 Redlog [7], QEPCAD [9], SyNRAC [8] 3 QE., 2 Brown White-Box. 3 White-Box
White-Box Takayuki Kunihiro Graduate School of Pure and Applied Sciences, University of Tsukuba Hidenao Iwane ( ) / Fujitsu Laboratories Ltd. / National Institute of Informatics. Yumi Wada Graduate School
More informationDEIM Forum 2009 B4-6, Str
DEIM Forum 2009 B4-6, 305 8573 1 1 1 152 8550 2 12 1 E-mail: tttakuro@kde.cs.tsukuba.ac.jp, watanabe@de.cs.titech.ac.jp, kitagawa@cs.tsukuba.ac.jp StreamSpinner PC PC StreamSpinner Development of Data
More information() / (front end) (back end) (phase) (pass) 1 2
1 () () lex http://www.cs.info.mie-u.ac.jp/~toshi/lectures/compiler/ 2018 4 1 () / (front end) (back end) (phase) (pass) 1 2 () () var left, right; fun int main() { left = 0; right = 10; return ((left
More information学校では教えてくれないアセットバンドル
Unity Technologies Japan Developer Relationship Engineer Yusuke Ebata Unity 5.3 Unity ICON:designed by Freepik 1 AssetBundle.CreateFromMemory AssetBundle.CreateFromFile WWW.LoadFromCacheOrDownload LoadFromCacheOrDonwload
More informationkoji07-02.dvi
007 I II III 1,, 3, 4, 5, 6, 7 5 4 1 ε-n 1 ε-n ε-n ε-n. {a } =1 a ε N N a a N= a a
More informationInt Int 29 print Int fmt tostring 2 2 [19] ML ML [19] ML Emacs Standard ML M M ::= x c λx.m M M let x = M in M end (M) x c λx.
1, 2 1 m110057@shibaura-it.ac.jp 2 sasano@sic.shibaura-it.ac.jp Eclipse Visual Studio ML Standard ML Emacs 1 ( IDE ) IDE C C++ Java IDE IDE IDE IDE Eclipse Java IDE Java Standard ML 1 print (Int. 1 Int
More informationSAMA- SUKU-RU Contents p-adic families of Eisenstein series (modular form) Hecke Eisenstein Eisenstein p T
SAMA- SUKU-RU Contents 1. 1 2. 7.1. p-adic families of Eisenstein series 3 2.1. modular form Hecke 3 2.2. Eisenstein 5 2.3. Eisenstein p 7 3. 7.2. The projection to the ordinary part 9 3.1. The ordinary
More information.5 z = a + b + c n.6 = a sin t y = b cos t dy d a e e b e + e c e e e + e 3 s36 3 a + y = a, b > b 3 s363.7 y = + 3 y = + 3 s364.8 cos a 3 s365.9 y =,
[ ] IC. r, θ r, θ π, y y = 3 3 = r cos θ r sin θ D D = {, y ; y }, y D r, θ ep y yddy D D 9 s96. d y dt + 3dy + y = cos t dt t = y = e π + e π +. t = π y =.9 s6.3 d y d + dy d + y = y =, dy d = 3 a, b
More informationfiš„v8.dvi
(2001) 49 2 333 343 Java Jasp 1 2 3 4 2001 4 13 2001 9 17 Java Jasp (JAva based Statistical Processor) Jasp Jasp. Java. 1. Jasp CPU 1 106 8569 4 6 7; fuji@ism.ac.jp 2 106 8569 4 6 7; nakanoj@ism.ac.jp
More information3 m = [n, n1, n 2,..., n r, 2n] p q = [n, n 1, n 2,..., n r ] p 2 mq 2 = ±1 1 1 6 1.1................................. 6 1.2......................... 8 1.3......................... 13 2 15 2.1.............................
More informationkoji07-01.dvi
2007 I II III 1, 2, 3, 4, 5, 6, 7 5 10 19 (!) 1938 70 21? 1 1 2 1 2 2 1! 4, 5 1? 50 1 2 1 1 2 2 1?? 2 1 1, 2 1, 2 1, 2, 3,... 3 1, 2 1, 3? 2 1 3 1 2 1 1, 2 2, 3? 2 1 3 2 3 2 k,l m, n k,l m, n kn > ml...?
More information土木学会構造工学論文集(2011.3)
Vol.57A (11 3 ) RC Consecutve falling-weight impact test of large-scale RC girders under specified total input-impact energy * ** *** **** ***** Norimitsu Kishi, Hisashi Konno, Satoru Yamaguchi, Hiroshi
More information(2018 2Q C) [ ] R 2 2 P = (a, b), Q = (c, d) Q P QP = ( ) a c b d (a c, b d) P = (a, b) O P ( ) a p = b P = (a, b) p = ( ) a b R 2 {( ) } R 2 x = x, y
(2018 2Q C) [ ] R 2 2 P = (a, b), Q = (c, d) Q P QP = a c b d (a c, b d) P = (a, b) O P a p = b P = (a, b) p = a b R 2 { } R 2 x = x, y R y 2 a p =, c q = b d p + a + c q = b + d q p P q a p = c R c b
More informationII No.01 [n/2] [1]H n (x) H n (x) = ( 1) r n! r!(n 2r)! (2x)n 2r. r=0 [2]H n (x) n,, H n ( x) = ( 1) n H n (x). [3] H n (x) = ( 1) n dn x2 e dx n e x2
II No.1 [n/] [1]H n x) H n x) = 1) r n! r!n r)! x)n r r= []H n x) n,, H n x) = 1) n H n x) [3] H n x) = 1) n dn x e dx n e x [4] H n+1 x) = xh n x) nh n 1 x) ) d dx x H n x) = H n+1 x) d dx H nx) = nh
More information,.,. NP,., ,.,,.,.,,, (PCA)...,,. Tipping and Bishop (1999) PCA. (PPCA)., (Ilin and Raiko, 2010). PPCA EM., , tatsukaw
,.,. NP,.,. 1 1.1.,.,,.,.,,,. 2. 1.1.1 (PCA)...,,. Tipping and Bishop (1999) PCA. (PPCA)., (Ilin and Raiko, 2010). PPCA EM., 152-8552 2-12-1, tatsukawa.m.aa@m.titech.ac.jp, 190-8562 10-3, mirai@ism.ac.jp
More information¥¤¥ó¥¿¡¼¥Í¥Ã¥È·×¬¤È¥Ç¡¼¥¿²òÀÏ Âè1²ó
1 2011 5 11 lumeta internet mapping http://www.lumeta.com http://www.cheswick.com/ches/map/ 2 / 43 ( ) 3 / 43 (Kenjiro Cho) WIDE 1984 ( ) OS 1993 1996 ( ) (QoS ) 2001 ( ) 2004 ( ) QoS 4 / 43 (Internet
More information(2016 2Q H) [ ] R 2 2 P = (a, b), Q = (c, d) Q P QP = ( ) a c b d (a c, b d) P = (a, b) O P ( ) a p = b P = (a, b) p = ( ) a b R 2 {( ) } R 2 x = x, y
(2016 2Q H) [ ] R 2 2 P = (a, b), Q = (c, d) Q P QP = a c b d (a c, b d) P = (a, b) O P a p = b P = (a, b) p = a b R 2 { } R 2 x = x, y R y 2 a p =, c q = b d p + a + c q = b + d q p P q a p = c R c b
More informationDEIM Forum 2019 H2-2 SuperSQL SuperSQL SQL SuperSQL Web SuperSQL DBMS Pi
DEIM Forum 2019 H2-2 SuperSQL 223 8522 3 14 1 E-mail: {terui,goto}@db.ics.keio.ac.jp, toyama@ics.keio.ac.jp SuperSQL SQL SuperSQL Web SuperSQL DBMS PipelineDB SuperSQL Web Web 1 SQL SuperSQL HTML SuperSQL
More information2 (1) a = ( 2, 2), b = (1, 2), c = (4, 4) c = l a + k b l, k (2) a = (3, 5) (1) (4, 4) = l( 2, 2) + k(1, 2), (4, 4) = ( 2l + k, 2l 2k) 2l + k = 4, 2l
ABCDEF a = AB, b = a b (1) AC (3) CD (2) AD (4) CE AF B C a A D b F E (1) AC = AB + BC = AB + AO = AB + ( AB + AF) = a + ( a + b) = 2 a + b (2) AD = 2 AO = 2( AB + AF) = 2( a + b) (3) CD = AF = b (4) CE
More informationResearch on decision making in multi-player games with imperfect information
Research on decision making in multi-player games with imperfect information 37-086521 22 2 9 UCT UCT 46 % 60000 9 % 1 1 1.1........................................ 1 1.2.....................................
More information, = = 7 6 = 42, =
http://www.ss.u-tokai.ac.jp/~mahoro/2016autumn/alg_intro/ 1 1 2016.9.26, http://www.ss.u-tokai.ac.jp/~mahoro/2016autumn/alg_intro/ 1.1 1 214 132 = 28258 2 + 1 + 4 1 + 3 + 2 = 7 6 = 42, 4 + 2 = 6 2 + 8
More information( )
NAIST-IS-MT0851100 2010 2 4 ( ) CR CR CR 1980 90 CR Kerberos SSH CR CR CR CR CR CR,,, ID, NAIST-IS- MT0851100, 2010 2 4. i On the Key Management Policy of Challenge Response Authentication Schemes Toshiya
More informationuntitled
N N X=[ ] R IJK R X R ABC A=[a ] R B=[b ] R C=[c ] R ABC X =[ ] R = a b c X X X X X D( ) D(X X )= log + D( ) a a b b c c b c b c a c a c a b a b R X X A a t =a b c a = t a R i i = a =. a I R = a = b =
More information1 1(a) MPR 1(b) MPR MPR MPR MPR MPR 2 1 MPR MPR MPR A MPR B MPR 2 MPR MPR MPR MPR MPR GPS MPR MPR MPR 3. MPR MPR 2 MPR 2 (1) (4) Zai
Popular MPR 1,a) 2,b) 2,c) GPS Most Popular Route( MPR) MPR MPR MPR MPR MPR MPR MPR Popular Popular MPR MPR Popular 1. GPS GPS GPS Google Maps *1 Zaiben [1] Most Popular Route( MPR) MPR MPR MPR 1 525 8577
More informationNV-HD830DTA
NV-HD830DTA k FOR USE IN JAPAN ONLY z m z z q!1 q w e r t y u o!0!1 i m t t t r e w +_ +_ z z z z zz z z z z z z z z z z z z z z z z z z z z z z z L LL g z z 1 3 4 1 1.. 4
More information. (.8.). t + t m ü(t + t) + c u(t + t) + k u(t + t) = f(t + t) () m ü f. () c u k u t + t u Taylor t 3 u(t + t) = u(t) + t! u(t) + ( t)! = u(t) + t u(
3 8. (.8.)............................................................................................3.............................................4 Nermark β..........................................
More informationC言語によるアルゴリズムとデータ構造
Algorithms and Data Structures in C 4 algorithm List - /* */ #include List - int main(void) { int a, b, c; int max; /* */ Ÿ 3Ÿ 2Ÿ 3 printf(""); printf(""); printf(""); scanf("%d", &a); scanf("%d",
More informationnewmain.dvi
数論 サンプルページ この本の定価 判型などは, 以下の URL からご覧いただけます. http://www.morikita.co.jp/books/mid/008142 このサンプルページの内容は, 第 2 版 1 刷発行当時のものです. Daniel DUVERNEY: THÉORIE DES NOMBRES c Dunod, Paris, 1998, This book is published
More informationCRA3689A
AVIC-DRZ90 AVIC-DRZ80 2 3 4 5 66 7 88 9 10 10 10 11 12 13 14 15 1 1 0 OPEN ANGLE REMOTE WIDE SET UP AVIC-DRZ90 SOURCE OFF AV CONTROL MIC 2 16 17 1 2 0 0 1 AVIC-DRZ90 2 3 4 OPEN ANGLE REMOTE SOURCE OFF
More information[2] 2. [3 5] 3D [6 8] Morishima [9] N n 24 24FPS k k = 1, 2,..., N i i = 1, 2,..., n Algorithm 1 N io user-specified number of inbetween omis
1,a) 2 2 2 1 2 3 24 Motion Frame Omission for Cartoon-like Effects Abstract: Limited animation is a hand-drawn animation style that holds each drawing for two or three successive frames to make up 24 frames
More informationDEIM Forum 2015 E4-5 DSMS DSMS DSMS 32% 46% RTOS Priority Inversion Time
DEIM Forum 2015 E4-5 DSMS 464 8601 E-mail: {katsunuma,honda,hiro}@ertl.jp, watanabe@coi.nagoya-u.ac.jp DSMS DSMS 32% 46% RTOS Priority Inversion Time Reduction by Operator-Level Commit of DSMS Satoshi
More informationR1RW0408D シリーズ
お客様各位 カタログ等資料中の旧社名の扱いについて 2010 年 4 月 1 日を以って NEC エレクトロニクス株式会社及び株式会社ルネサステクノロジが合併し 両社の全ての事業が当社に承継されております 従いまして 本資料中には旧社名での表記が残っておりますが 当社の資料として有効ですので ご理解の程宜しくお願い申し上げます ルネサスエレクトロニクスホームページ (http://www.renesas.com)
More informationOptical Flow t t + δt 1 Motion Field 3 3 1) 2) 3) Lucas-Kanade 4) 1 t (x, y) I(x, y, t)
http://wwwieice-hbkborg/ 2 2 4 2 -- 2 4 2010 9 3 3 4-1 Lucas-Kanade 4-2 Mean Shift 3 4-3 2 c 2013 1/(18) http://wwwieice-hbkborg/ 2 2 4 2 -- 2 -- 4 4--1 2010 9 4--1--1 Optical Flow t t + δt 1 Motion Field
More information1 filename=mathformula tex 1 ax 2 + bx + c = 0, x = b ± b 2 4ac, (1.1) 2a x 1 + x 2 = b a, x 1x 2 = c a, (1.2) ax 2 + 2b x + c = 0, x = b ± b 2
filename=mathformula58.tex ax + bx + c =, x = b ± b 4ac, (.) a x + x = b a, x x = c a, (.) ax + b x + c =, x = b ± b ac. a (.3). sin(a ± B) = sin A cos B ± cos A sin B, (.) cos(a ± B) = cos A cos B sin
More information2 H23 BioS (i) data d1; input group patno t sex censor; cards;
H BioS (i) data d1; input group patno t sex censor; cards; 0 1 0 0 0 0 1 0 1 1 0 4 4 0 1 0 5 5 1 1 0 6 5 1 1 0 7 10 1 0 0 8 15 0 1 0 9 15 0 1 0 10 4 1 0 0 11 4 1 0 1 1 5 1 0 1 1 7 0 1 1 14 8 1 0 1 15 8
More informationa n a n ( ) (1) a m a n = a m+n (2) (a m ) n = a mn (3) (ab) n = a n b n (4) a m a n = a m n ( m > n ) m n 4 ( ) 552
3 3.0 a n a n ( ) () a m a n = a m+n () (a m ) n = a mn (3) (ab) n = a n b n (4) a m a n = a m n ( m > n ) m n 4 ( ) 55 3. (n ) a n n a n a n 3 4 = 8 8 3 ( 3) 4 = 8 3 8 ( ) ( ) 3 = 8 8 ( ) 3 n n 4 n n
More information通信容量制約を考慮したフィードバック制御 - 電子情報通信学会 情報理論研究会(IT) 若手研究者のための講演会
IT 1 2 1 2 27 11 24 15:20 16:05 ( ) 27 11 24 1 / 49 1 1940 Witsenhausen 2 3 ( ) 27 11 24 2 / 49 1940 2 gun director Warren Weaver, NDRC (National Defence Research Committee) Final report D-2 project #2,
More information1. 2 P 2 (x, y) 2 x y (0, 0) R 2 = {(x, y) x, y R} x, y R P = (x, y) O = (0, 0) OP ( ) OP x x, y y ( ) x v = y ( ) x 2 1 v = P = (x, y) y ( x y ) 2 (x
. P (, (0, 0 R {(,, R}, R P (, O (0, 0 OP OP, v v P (, ( (, (, { R, R} v (, (, (,, z 3 w z R 3,, z R z n R n.,..., n R n n w, t w ( z z Ke Words:. A P 3 0 B P 0 a. A P b B P 3. A π/90 B a + b c π/ 3. +
More informationXACCの概要
2 global void kernel(int a[max], int llimit, int ulimit) {... } : int main(int argc, char *argv[]){ MPI_Int(&argc, &argc); MPI_Comm_rank(MPI_COMM_WORLD, &rank); MPI_Comm_size(MPI_COMM_WORLD, &size); dx
More informationver Web
ver201723 Web 1 4 11 4 12 5 13 7 2 9 21 9 22 10 23 10 24 11 3 13 31 n 13 32 15 33 21 34 25 35 (1) 27 4 30 41 30 42 32 43 36 44 (2) 38 45 45 46 45 5 46 51 46 52 48 53 49 54 51 55 54 56 58 57 (3) 61 2 3
More information2.2 Sage I 11 factor Sage Sage exit quit 1 sage : exit 2 Exiting Sage ( CPU time 0m0.06s, Wall time 2m8.71 s). 2.2 Sage Python Sage 1. Sage.sage 2. sa
I 2017 11 1 SageMath SageMath( Sage ) Sage Python Sage Python Sage Maxima Maxima Sage Sage Sage Linux, Mac, Windows *1 2 Sage Sage 4 1. ( sage CUI) 2. Sage ( sage.sage ) 3. Sage ( notebook() ) 4. Sage
More information独立行政法人情報通信研究機構 Development of the Information Analysis System WISDOM KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the infor
独立行政法人情報通信研究機構 KIDAWARA Yutaka NICT Knowledge Clustered Group researched and developed the information analysis system WISDOM as a research result of the second medium-term plan. WISDOM has functions that
More informationDEIM Forum 2014 D3-5 DSMS DSMS DSMS 2.13% RTOS Realtime-Aware Efficient Query Processing for Automotiv
DEIM Forum 2014 D3-5 DSMS 464 8601 E-mail: {katsunuma,honda,hiro}@ertl.jp DSMS DSMS 2.13% RTOS Realtime-Aware Efficient Query Processing for Automotive DSMS Satoshi KATSUNUMA, Shinya HONDA, and Hiroaki
More informationメモリ階層構造を考慮した大規模グラフ処理の高速化
, CREST ERATO 0.. (, CREST) ERATO / 8 Outline NETAL (NETwork Analysis Library) NUMA BFS raph500, reenraph500 Kronecker raph Level Synchronized parallel BFS Hybrid Algorithm for Parallel BFS NUMA Hybrid
More information: ( 1) () 1. ( 1) 2. ( 1) 3. ( 2)
Acquiring Organized Information from News by Incremental Theme Refinements 1 1 1 Yutaro Taniguchi 1 Tetsunori Kobayashi 1 Yoshihiko Hayashi 1 1 1 School of Science and Engineering, Waseda University Abstract:
More information29
9 .,,, 3 () C k k C k C + C + C + + C 8 + C 9 + C k C + C + C + C 3 + C 4 + C 5 + + 45 + + + 5 + + 9 + 4 + 4 + 5 4 C k k k ( + ) 4 C k k ( k) 3 n( ) n n n ( ) n ( ) n 3 ( ) 3 3 3 n 4 ( ) 4 4 4 ( ) n n
More informationDEIM Forum 2010 A3-3 Web Web Web Web Web. Web Abstract Web-page R
DEIM Forum 2010 A3-3 Web Web 305 8550 1 2 305 8550 1 2 E-mail: s0813167@u.tsukuba.ac.jp, satoh@slis.tsukuba.ac.jp Web Web Web. Web Abstract Web-page Recommendation System based on the Keyword transitions
More informationmobius1
H + : ω = ( a, b, c, d, ad bc > 0) 3.. ( c 0 )... ( 5z + 2 : ω = L (*) z + 4 5z + 2 z = z =, 2. (*) z + 4 5z+ 2 6( z+) ω + = + = z+ 4 z+ 4 5z+ 2 3( z 2) ω 2 = 2= z+ 4 z+ 4 ω + z + = 2 ω 2 z 2 x + T ( x)
More information熊本県数学問題正解
00 y O x Typed by L A TEX ε ( ) (00 ) 5 4 4 ( ) http://www.ocn.ne.jp/ oboetene/plan/. ( ) (009 ) ( ).. http://www.ocn.ne.jp/ oboetene/plan/eng.html 8 i i..................................... ( )0... (
More informationMicrosoft Word - toyoshima-deim2011.doc
DEIM Forum 2011 E9-4 252-0882 5322 252-0882 5322 E-mail: t09651yt, sashiori, kiyoki @sfc.keio.ac.jp CBIR A Meaning Recognition System for Sign-Logo by Color-Shape-Based Similarity Computations for Images
More information1. A0 A B A0 A : A1,...,A5 B : B1,...,B
1. A0 A B A0 A : A1,...,A5 B : B1,...,B12 2. 3. 4. 5. A0 A B f : A B 4 (i) f (ii) f (iii) C 2 g, h: C A f g = f h g = h (iv) C 2 g, h: B C g f = h f g = h 4 (1) (i) (iii) (2) (iii) (i) (3) (ii) (iv) (4)
More information10/ / /30 3. ( ) 11/ 6 4. UNIX + C socket 11/13 5. ( ) C 11/20 6. http, CGI Perl 11/27 7. ( ) Perl 12/ 4 8. Windows Winsock 12/11 9. JAV
tutimura@mist.i.u-tokyo.ac.jp kaneko@ipl.t.u-tokyo.ac.jp http://www.misojiro.t.u-tokyo.ac.jp/ tutimura/sem3/ 2002 11 20 p.1/34 10/16 1. 10/23 2. 10/30 3. ( ) 11/ 6 4. UNIX + C socket 11/13 5. ( ) C 11/20
More informationDEIM Forum 2019 D3-5 Web Yahoo! JAPAN Q&A Web Web
DEIM Forum 2019 D3-5 Web 565 0871 1 5 Yahoo! JAPAN 102 8282 1 3 E-mail: {nakamura.tatsuya,hara}@ist.osaka-u.ac.jp, sufujita@yahoo-corp.jp Q&A Web Web Q&A Web Web 1 Web Web Web [2], [3], [10] Web Web [8],
More information2 HI LO ZDD 2 ZDD 2 HI LO 2 ( ) HI (Zero-suppress ) Zero-suppress ZDD ZDD Zero-suppress 1 ZDD abc a HI b c b Zero-suppress b ZDD ZDD 5) ZDD F 1 F = a
ZDD 1, 2 1, 2 1, 2 2 2, 1 #P- Knuth ZDD (Zero-suppressed Binary Decision Diagram) 2 ZDD ZDD ZDD Knuth Knuth ZDD ZDD Path Enumeration Algorithms Using ZDD and Their Performance Evaluations Toshiki Saitoh,
More information3 3 3 Knecht (2-3fps) AR [3] 2. 2 Debevec High Dynamic Range( HDR) [4] HDR Derek [5] 2. 3 [6] 3. [6] x E(x) E(x) = 2π π 2 V (x, θ i, ϕ i )L(θ
(MIRU212) 212 8 RGB-D 223 8522 3 14 1 E-mail: {ikeda,charmie,saito}@hvrl.ics.keio.ac.jp, sugimoto@ics.keio.ac.jp RGB-D Lambert RGB-D 1. Augmented Reality AR [1] AR AR 2 [2], [3] [4], [5] [6] RGB-D RGB-D
More information