TIMELY: RTT-based Congestion Control for the Datacenter

Size: px
Start display at page:

Download "TIMELY: RTT-based Congestion Control for the Datacenter"

Transcription

1 TIMELY: RTT-based Congestion Control for the Datacenter Radhika Mittal*(UC Berkeley), Vinh The Lam, Nandita Dukkipati, Emily Blem, Hassan Wassel, Monia Ghobadi*(Microsoft), Amin Vahdat, Yaogong Wang, David Wetherall, David Zats * Work done while at Google

2 The Customary Picture of Google s Datacenter

3 The Story of RTT

4 Once upon a time, there was a congestion signal, called RTT.

5 It had all the qualities to rule the congestion control in Datacenters.

6 Qualities of RTT Fine-grained and informative Quick response time No switch support needed End-to-end metric

7 Applicability in Datacenters RTT-based schemes discarded for WANs. Compete poorly with loss-based schemes. This is not a concern for the Datacenters.

8 Stringent Performance Requirements Tightly coupled computing tasks Require both high throughput and low latencies Packet losses are too costly

9 However, it was too hard to measure the RTTs accurately.

10 While RTT was banished from WANs, it was never even considered for Datacenters!!

11 And ECN emerged as a hero instead.

12 ECN DCTCP (2010) D 2 TCP (2012) HULL (2012) TCP-Bolt (2014) DCQCN (2015)

13 This is the tale of how we helped RTT become a powerful congestion signal in modern datacenters.

14 Contributions 1. Show that accurate RTT measurements are possible. 2. Demonstrate the goodness of RTT as a congestion signal. 3. Develop TIMELY: RTT-based congestion control for the datacenters.

15 Accurate RTT Measurement

16 Hardware Assisted RTT Measurement Hardware Timestamps mitigate noise in measurements Hardware Acknowledgements avoid processing overhead

17 Hardware vs Software Timestamps Kernel Timestamps introduce significant noise in RTT measurements compared to HW Timestamps.

18 RTT as a congestion signal

19 RTT is a multi-bit signal RTT ECN

20 RTT correlates with queuing delay

21 TIMELY Framework

22 Overview Data RTT Measurement Engine RTT Rate Computation Engine Rate Pacing Engine Timestamps Paced Data

23 Overview Data RTT Measurement Engine RTT Rate Computation Engine Rate Pacing Engine Timestamps Paced Data

24 RTT Measurement Engine SENDER RECEIVER

25 RTT Measurement Engine SENDER t send t completion RECEIVER

26 RTT Measurement Engine SENDER t send Serialization Delay t completion RECEIVER

27 RTT Measurement Engine SENDER t send Serialization Delay t completion RECEIVER ACK Turnaround Time

28 RTT Measurement Engine SENDER t send Serialization Delay t completion Propagation & Queuing Delay RECEIVER ACK Turnaround Time

29 RTT Measurement Engine SENDER t send Serialization Delay t completion Propagation & Queuing Delay RECEIVER ACK Turnaround Time RTT = Propagation & Queuing Delay

30 RTT Measurement Engine SENDER t send Serialization Delay t completion Propagation & Queuing Delay RECEIVER HW Ack RTT = Propagation + Queuing Delay

31 RTT Measurement Engine SENDER t send Serialization Delay RTT t completion Propagation & Queuing Delay RECEIVER HW ack RTT = t completion t send Serialization Delay

32 Overview Data RTT Measurement Engine RTT Rate Computation Engine Rate Pacing Engine Timestamps Paced Data

33 Rate Computation Engine On each segment completion event Input: RTT sample Runs the rate update algorithm Output: updated rate Why do we compute the rate as opposed to a window? Segment sizes as high as 64KB (32us RTT x 10Gbps) = 40KB window size 40KB < 64KB : Window makes no sense

34 Overview Data RTT Measurement Engine RTT Rate Computation Engine Rate Pacing Engine Timestamps Paced Data

35 Pacing Engine Computes the send time of a segment using segment size computed flow rate time of last transmission

36 TIMELY Algorithm

37 Goals Flow Completion Time Large Flows: High Throughput Short Flows: Low tail latencies Ride the throughput-latency curve until tail latencies become unacceptable low latency prioritized over throughput Fairness and Stability

38 Challenges Bursty traffic Coarse-grained feedback Existing delay-based schemes cannot be used

39 Algorithm Overview Gradient-based Increase / Decrease

40 Algorithm Overview Gradient-based Increase / Decrease RTT gradient = 0 Time

41 Algorithm Overview Gradient-based Increase / Decrease RTT gradient > 0 Time

42 Algorithm Overview Gradient-based Increase / Decrease RTT gradient < 0 Time

43 Algorithm Overview Gradient-based Increase / Decrease RTT Time

44 Algorithm Overview Gradient-based Increase / Decrease To navigate the throughput-latency tradeoff and ensure stability.

45 Algorithm Overview Additive Increase Gradient-based Increase / Decrease Multiplicative Decrease Better Burst Tolerance T low To navigate the throughput-latency tradeoff and ensure stability. T high To keep tail latency within acceptable limits.

46 Evaluation

47 Implementation Set-up TIMELY is implemented in the context of RDMA. RDMA write and read primitives used to invoke NIC services. Priority Flow Control is enabled in the network fabric. RDMA transport in the NIC is sensitive to packet drops. PFC sends out pause frames to ensure lossless network.

48 Experimental Set-up Small-scale experiments: Incast traffic pattern with 10 clients and a server sharing the same rack. Large scale experiments: A few hundreds of machine in a classic Clos-network

49 Impact of RTT noise Comparison with PFC Comparison with DCTCP More results in the paper

50 Impact of RTT Noise Throughput degrades with increasing noise in RTT. Precise RTT measurement is crucial.

51 Comparison with PFC - Small Scale TIMELY PFC Throughput (Gbps) Avg RTT (us) %ile RTT (us)

52 Comparison with PFC - Small Scale TIMELY PFC Throughput (Gbps) Avg RTT (us) %ile RTT (us)

53 Comparison with PFC - Small Scale TIMELY PFC Throughput (Gbps) Avg RTT (us) %ile RTT (us)

54 Comparison with DCTCP TIMELY DCTCP Throughput (Gbps) Avg RTT (us) %ile RTT (us)

55 Comparison with DCTCP TIMELY DCTCP Throughput (Gbps) Avg RTT (us) %ile RTT (us)

56 Comparison with DCTCP TIMELY DCTCP Throughput (Gbps) Avg RTT (us) %ile RTT (us)

57 Summary Show that RTT signals measured with NIC HW strongly correlate with network queuing. Use RTT as a congestion signal to build TIMELY. Evaluate TIMELY in an RDMA framework. - low tail latencies with near-optimum throughput

TIMELY: RTT-based Congestion Control for the Datacenter

TIMELY: RTT-based Congestion Control for the Datacenter TIMELY: RTT-based Congestion Control for the Datacenter Authors: Radhika Mittal(UC Berkeley), Vinh The Lam, Nandita Dukkipati, Emily Blem, Hassan Wassel, Monia Ghobadi(Microsoft), Amin Vahdat, Yaogong

More information

Copa: Practical Delay-Based Congestion Control

Copa: Practical Delay-Based Congestion Control Copa: Practical Delay-Based Congestion Control Venkat Arun and Hari Balakrishnan MIT, CSAIL web.mit.edu/copa The Internet is more challenging than ever (Why are we still talking about congestion control

More information

TCP-Friendly Equation-Based Congestion Control

TCP-Friendly Equation-Based Congestion Control TCP-Friendly Equation-Based Congestion Control (widmer@informatik.uni-mannheim.de) 09 December 2002 Overview Introduction to congestion control Equation-based congestion control (TFRC) Congestion control

More information

BBR Congestion Control

BBR Congestion Control BBR Congestion Control Neal Cardwell, Yuchung Cheng, C. Stephen Gunn, Soheil Hassas Yeganeh, Van Jacobson IETF 97: Seoul, Nov 2016 1 Congestion and bottlenecks 2 Delivery rate Congestion and bottlenecks

More information

Fairness of Congestion-Based Congestion Control: Experimental Evaluation and Analysis

Fairness of Congestion-Based Congestion Control: Experimental Evaluation and Analysis Fairness of Congestion-Based Congestion Control: Experimental Evaluation and Analysis Shiyao Ma, Jingjie Jiang, Wei Wang, Bo Li Department of Computer Science and Engineering, Hong Kong University of Science

More information

Enhancements for RTT-Fair HighSpeed TCP

Enhancements for RTT-Fair HighSpeed TCP Enhancements for RTT-Fair HighSpeed TCP Damien Phillips, Jiankun Hu School of Computer Science and Information Technology, RMIT University GPO Box 2476V, Melbourne 31, Australia Email: {damphil, jiankun}@cs.rmit.edu.au

More information

Internet Engineering Task Force (IETF) Category: Standards Track July 2011 ISSN:

Internet Engineering Task Force (IETF) Category: Standards Track July 2011 ISSN: Internet Engineering Task Force (IETF) G. Renker Request for Comments: 6323 G. Fairhurst Updates: 4342, 5622 University of Aberdeen Category: Standards Track July 2011 ISSN: 2070-1721 Abstract Sender RTT

More information

Passive TCP Stream Estimation of RTT and Jitter Parameters. Jason But Urs Keller Grenville Armitage David Kennedy

Passive TCP Stream Estimation of RTT and Jitter Parameters. Jason But Urs Keller Grenville Armitage David Kennedy Passive TCP Stream Estimation of RTT and Jitter Parameters Jason But Urs Keller Grenville Armitage David Kennedy Outline Passive Monitoring of TCP RTT and Jitter Estimation algorithm Accuracy of Algorithm

More information

(12) Patent Application Publication (10) Pub. No.: US 2009/ A1

(12) Patent Application Publication (10) Pub. No.: US 2009/ A1 (19) United States US 2009.02451 05A1 (12) Patent Application Publication (10) Pub. No.: US 2009/0245105 A1 HO (43) Pub. Date: Oct. 1, 2009 (54) METHOD FOR NETWORK TRANSMISSION (30) Foreign Application

More information

MAC Sleep Mode Control Considering Downlink Traffic Pattern and Mobility

MAC Sleep Mode Control Considering Downlink Traffic Pattern and Mobility 1 MAC Sleep Mode Control Considering Downlink Traffic Pattern and Mobility Neung-Hyung Lee and Saewoong Bahk School of Electrical Engineering & Computer Science, Seoul National University, Seoul Korea

More information

Power Management for Networks to Reduce Energy Consumption

Power Management for Networks to Reduce Energy Consumption Power Management for Networks to Reduce Energy Consumption David Wetherall Intel Research & University of Washington Joint work with: Sylvia Ratnasamy (Intel Research) Sergiu Nedevschi (UC Berkeley) Lucian

More information

Protecting Patient Privacy in Genomic Analysis

Protecting Patient Privacy in Genomic Analysis Protecting Patient Privacy in Genomic Analysis David Wu Stanford University based on joint works with: Gill Bejerano, Bonnie Berger, Johannes A. Birgmeier, Dan Boneh, Hyunghoon Cho, and Karthik A. Jagadeesh

More information

Image Enhancement and Compression using Edge Detection Technique

Image Enhancement and Compression using Edge Detection Technique Image Enhancement and Compression using Edge Detection Technique Sanjana C.Shekar 1, D.J.Ravi 2 1M.Tech in Signal Processing, Dept. Of ECE, Vidyavardhaka College of Engineering, Mysuru 2Professor, Dept.

More information

RTTometer: Measuring Path Minimum RTT with Confidence

RTTometer: Measuring Path Minimum RTT with Confidence RTTometer: Measuring Path Minimum RTT with Confidence Amgad Zeitoun Zhiheng Wang Sugih Jamin Department of Electrical Engineering and Computer Science, The University of Michigan, Ann Arbor {azeitoun,zhihengw,jamin}@eecs.umich.edu

More information

LACNIC Annual Meeting Monday, May 25, 2009 Bill Woodcock Research Director Packet Clearing House

LACNIC Annual Meeting Monday, May 25, 2009 Bill Woodcock Research Director Packet Clearing House Introduction to Peering & Internet Exchange Points LACNIC Annual Meeting Monday, May 25, 2009 Bill Woodcock Research Director Packet Clearing House ISP Lifecycle: Simple Aggregator Single Transit Provider

More information

An Empirical Mixture Model for Large-Scale RTT Measurements

An Empirical Mixture Model for Large-Scale RTT Measurements 1 An Empirical Mixture Model for Large-Scale RTT Measurements Romain Fontugne 1,2 Johan Mazel 1,2 Kensuke Fukuda 1,3 1 National Institute of Informatics 2 JFLI 3 Sokendai June 9, 2015 Introduction RTT:

More information

Next Generation File Replication In GlusterFS. Jeff, Venky, Avra, Kotresh, Karthik

Next Generation File Replication In GlusterFS. Jeff, Venky, Avra, Kotresh, Karthik Next Generation File Replication In GlusterFS Jeff, Venky, Avra, Kotresh, Karthik About me Rafi KC, Software Engineer at Red Hat Rdma, snapshot, tiering, replication Overview Of GlusterFS Existing Replication

More information

Peering vs. Transit. Adnan Ahmed University of Iowa. University of Iowa

Peering vs. Transit. Adnan Ahmed University of Iowa. University of Iowa Peering vs. Transit Adnan Ahmed Introduction Transit Provides connectivity to the Internet Traffic volume based fees Peering Bilateral exchange Settlement-free (no fee) 1. Introduction Related work Interconnection

More information

Course Syllabus. Operating Systems, Spring 2016, Meni Adler, Danny Hendler and Amnon Meisels 1 3/14/2016

Course Syllabus. Operating Systems, Spring 2016, Meni Adler, Danny Hendler and Amnon Meisels 1 3/14/2016 Course Syllabus. Introduction - History; Views; Concepts; Structure 2. Process Management - Processes; State + Resources; Threads; Unix implementation of Processes 3. Scheduling Paradigms; Unix; Modeling

More information

Jitter-aware time-frequency resource allocation and packing algorithm

Jitter-aware time-frequency resource allocation and packing algorithm Jitter-aware time-frequency resource allocation and packing algorithm The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As

More information

GYM Workout Planner Story

GYM Workout Planner Story Story Everyday throughout the GYMs fitness trainers deal with a great number of clients. Lot of the trainers still use paper & pen to write down client s workout plan and to keep their training results.

More information

TCP IN NETWORKS WITH ABRUPT DELAY VARIATIONS AND RANDOM LOSS

TCP IN NETWORKS WITH ABRUPT DELAY VARIATIONS AND RANDOM LOSS TCP N NETWORKS WTH ABRUPT DELAY VARATONS AND RANDOM LOSS Alhussein A. Abouzeid, Sumit Roy Department of Electrical Engineering University of Washington, Box 352500 Seattle, WA 98195-2500 e-mail:{hussein,roy}@ee.washington.edu

More information

Advanced Image Information (3) 画像情報特論 (3) TCP Variants. 情報理工学専攻甲藤二郎

Advanced Image Information (3) 画像情報特論 (3) TCP Variants.   情報理工学専攻甲藤二郎 画像情報特論 (3) Advanced Image Information (3) TCP Variants 情報理工学専攻甲藤二郎 E-Mail: katto@waseda.jp TCP Variants TCP-Reno (loss-based) cwnd loss loss loss a= buffer b=0.5 0 BDP increase: cwnd = cwnd + /cwnd decrease:

More information

Algorithms in Nature. Pruning in neural networks

Algorithms in Nature. Pruning in neural networks Algorithms in Nature Pruning in neural networks Neural network development 1. Efficient signal propagation [e.g. information processing & integration] 2. Robust to noise and failures [e.g. cell or synapse

More information

Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare

Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare 2 Eighth IEEE International Conference on Mobile Ad-Hoc and Sensor Systems Mobile Phone Enabled Social Community Extraction for Controlling of Disease Propagation in Healthcare Yanzhi Ren, Jie Yang, Mooi

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introduction 1.1 Motivation and Goals The increasing availability and decreasing cost of high-throughput (HT) technologies coupled with the availability of computational tools and data form a

More information

Incorporation of Imaging-Based Functional Assessment Procedures into the DICOM Standard Draft version 0.1 7/27/2011

Incorporation of Imaging-Based Functional Assessment Procedures into the DICOM Standard Draft version 0.1 7/27/2011 Incorporation of Imaging-Based Functional Assessment Procedures into the DICOM Standard Draft version 0.1 7/27/2011 I. Purpose Drawing from the profile development of the QIBA-fMRI Technical Committee,

More information

Aug 12, 2013, KDD. Ron Kohavi. Joint work with Alex Deng, Brian Frasca, Toby Walker, Ya Xu, Nils Pohlmann. Paper at

Aug 12, 2013, KDD. Ron Kohavi. Joint work with Alex Deng, Brian Frasca, Toby Walker, Ya Xu, Nils Pohlmann. Paper at Aug 12, 2013, KDD Ron Kohavi Joint work with Alex Deng, Brian Frasca, Toby Walker, Ya Xu, Nils Pohlmann Paper at http://bit.ly/expscale Doctors take the Hippocratic Oath associated with Do no harm, yet

More information

Modern Technology of Internet

Modern Technology of Internet Modern Technology of Internet Jiří Navrátil, Josef Vojtěch, Jan Furman, Tomáš Košnar, Sven Ubik, Milan Šárek, Jan Růžička, Martin Pustka, Laban Mwansa, Rudolf Blažek Katedra počítačových systémů FIT České

More information

Debloating the Linux WiFi Stack

Debloating the Linux WiFi Stack Debloating the Linux WiFi Stack Toke Høiland-Jørgensen Karlstad University toke.hoiland-jorgensen@kau.se 1 QCA, 9th Dec 2016 Toke Høiland-Jørgensen Outline A history of bloat fixes in Linux The issues

More information

Data Analysis of Manufacturing Test Results for DRAM Module

Data Analysis of Manufacturing Test Results for DRAM Module Data Analysis of Manufacturing Test Results for DRAM Module White Paper March 2018 Copyright 2017 Wiwynn. All rights reserved Contents Introduction... 3 Quality Analysis of DIMMs, SSDs and HDDs by Vendor

More information

Two Themes. MobileASL: Making Cell Phones Accessible to the Deaf Community. Our goal: Challenges: Current Technology for Deaf People (text) ASL

Two Themes. MobileASL: Making Cell Phones Accessible to the Deaf Community. Our goal: Challenges: Current Technology for Deaf People (text) ASL Two Themes MobileASL: Making Cell Phones Accessible to the Deaf Community MobileASL AccessComputing Alliance Advancing Deaf and Hard of Hearing in Computing Richard Ladner University of Washington ASL

More information

AND BIOMEDICAL SYSTEMS Rahul Sarpeshkar

AND BIOMEDICAL SYSTEMS Rahul Sarpeshkar ULTRA-LOW-POWER LOW BIO-INSPIRED INSPIRED AND BIOMEDICAL SYSTEMS Rahul Sarpeshkar Research Lab of Electronics Massachusetts Institute of Technology Electrical Engineering and Computer Science FOE Talk

More information

CHAPTER 4 CONTENT LECTURE 1 November :28 AM

CHAPTER 4 CONTENT LECTURE 1 November :28 AM CHAPTER 4 By Radu Muresan University of Guelph Page 1 CHAPTER 4 CONTENT LECTURE 1 November 07 12 10:28 AM UNIPROCESSOR SCHEDULING Real Time Task Model Concepts Types of Real Time Tasks and Their Characteristics

More information

Post-Silicon Bug Diagnosis with Inconsistent Executions

Post-Silicon Bug Diagnosis with Inconsistent Executions Post-Silicon Bug Diagnosis with Inconsistent Executions Andrew DeOrio Daya Shanker Khudia Valeria Bertacco University of Michigan ICCAD 11 9 November 2011 Functional bugs 17 Jan 1995 Electrical failures

More information

TTY/TDD Minimum Performance Specification

TTY/TDD Minimum Performance Specification GPP C.S00-B Version.0 May 0 TTY/TDD Minimum Performance Specification 0 GPP GPP and its Organizational Partners claim copyright in this document and individual Organizational Partners may copyright and

More information

Project: Feedback Systems for Alternative Treatment of Obstructive Sleep Apnea

Project: Feedback Systems for Alternative Treatment of Obstructive Sleep Apnea Project: Feedback Systems for Alternative Treatment of Obstructive Sleep Apnea Idea: Create auditory and visual feedback systems to relate the amount of force back to the person exerting the force Potential

More information

Predicting Breast Cancer Survival Using Treatment and Patient Factors

Predicting Breast Cancer Survival Using Treatment and Patient Factors Predicting Breast Cancer Survival Using Treatment and Patient Factors William Chen wchen808@stanford.edu Henry Wang hwang9@stanford.edu 1. Introduction Breast cancer is the leading type of cancer in women

More information

Towards Human-Centered Optimization of Mobile Sign Language Video Communication

Towards Human-Centered Optimization of Mobile Sign Language Video Communication Towards Human-Centered Optimization of Mobile Sign Language Video Communication Jessica J. Tran Electrical Engineering DUB Group University of Washington Seattle, WA 98195 USA jjtran@uw.edu Abstract The

More information

TREADMILL. Vision Fitness Classic Console TF40

TREADMILL. Vision Fitness Classic Console TF40 TREADMILL Vision Fitness Classic Console TF40 CLASSIC CONSOLE OPERATION A) LARGE LED DISPLAY WINDOW - displays workout time B) ALPHANUMERIC DISPLAY WINDOW displays incline, distance, speed, calories, pace,

More information

Ting: Measuring and Exploiting Latencies Between All Tor Nodes. Frank Cangialosi Dave Levin Neil Spring University of Maryland

Ting: Measuring and Exploiting Latencies Between All Tor Nodes. Frank Cangialosi Dave Levin Neil Spring University of Maryland Ting: Measuring and Eploiting Latencies Between All Tor Nodes Frank Cangialosi Dave Levin Neil Spring Universit of Marland 1 Measuring latencies Ping Measurement Host Eternal Host Limited to the nodes

More information

Quantitative Evaluation of Edge Detectors Using the Minimum Kernel Variance Criterion

Quantitative Evaluation of Edge Detectors Using the Minimum Kernel Variance Criterion Quantitative Evaluation of Edge Detectors Using the Minimum Kernel Variance Criterion Qiang Ji Department of Computer Science University of Nevada Robert M. Haralick Department of Electrical Engineering

More information

Figure 2: Power Angle (Relative) of Generators in Multi Generator Benchmark, What ETAP has shown in Validation Test Cases document is published in

Figure 2: Power Angle (Relative) of Generators in Multi Generator Benchmark, What ETAP has shown in Validation Test Cases document is published in Who are we? IPE () is a nonprofit organization passionate about the power engineering industry. Our main mandate is to test and expose the different issues and dysfunctions of different power system simulation

More information

Shu Kong. Department of Computer Science, UC Irvine

Shu Kong. Department of Computer Science, UC Irvine Ubiquitous Fine-Grained Computer Vision Shu Kong Department of Computer Science, UC Irvine Outline 1. Problem definition 2. Instantiation 3. Challenge and philosophy 4. Fine-grained classification with

More information

Sparse Coding in Sparse Winner Networks

Sparse Coding in Sparse Winner Networks Sparse Coding in Sparse Winner Networks Janusz A. Starzyk 1, Yinyin Liu 1, David Vogel 2 1 School of Electrical Engineering & Computer Science Ohio University, Athens, OH 45701 {starzyk, yliu}@bobcat.ent.ohiou.edu

More information

Behavior Architectures

Behavior Architectures Behavior Architectures 5 min reflection You ve read about two very different behavior architectures. What are the most significant functional/design differences between the two approaches? Are they compatible

More information

Discover the Accessibility Features of Smartphones! A Wireless Education Seminar for Consumers who are Deaf and Hard-of-Hearing

Discover the Accessibility Features of Smartphones! A Wireless Education Seminar for Consumers who are Deaf and Hard-of-Hearing Discover the Accessibility Features of Smartphones! A Wireless Education Seminar for Consumers who are Deaf and Hard-of-Hearing Who We Are Ben Lippincott Project Director Consumer and Industry Outreach

More information

A Proactive Approach to Avoid Performance Degradation of MPTCP

A Proactive Approach to Avoid Performance Degradation of MPTCP A Proactive Approach to Avoid Performance Degradation of MPTCP Draft-zuo-mptcp-degradation-00.txt Authors: F. Wang, Jing Zuo, Z. Cao, K. Zheng, Huawei 1 MPTCP on high-speed rails Two LTE (4G) on high-speed

More information

CAS Seminar - Spiking Neurons Network (SNN) Jakob Kemi ( )

CAS Seminar - Spiking Neurons Network (SNN) Jakob Kemi ( ) CAS Seminar - Spiking Neurons Network (SNN) Jakob Kemi (820622-0033) kemiolof@student.chalmers.se November 20, 2006 Introduction Biological background To be written, lots of good sources. Background First

More information

Meri Awaaz Smart Glove Learning Assistant for Mute Students and teachers

Meri Awaaz Smart Glove Learning Assistant for Mute Students and teachers Meri Awaaz Smart Glove Learning Assistant for Mute Students and teachers Aditya C *1, Siddharth T 1, Karan K 1 and Priya G 2 School of Computer Science and Engineering, VIT University, Vellore, India 1

More information

Protecting Patient Privacy in Genomic Analysis

Protecting Patient Privacy in Genomic Analysis Protecting Patient Privacy in Genomic Analysis David Wu Stanford University based on joint works with: Gill Bejerano, Bonnie Berger, Johannes A. Birgmeier, Dan Boneh, Hyunghoon Cho, and Karthik A. Jagadeesh

More information

Anirudh Kamath 1, Raj Ramnani 2, Jay Shenoy 3, Aditya Singh 4, and Ayush Vyas 5 arxiv: v2 [stat.ml] 15 Aug 2017.

Anirudh Kamath 1, Raj Ramnani 2, Jay Shenoy 3, Aditya Singh 4, and Ayush Vyas 5 arxiv: v2 [stat.ml] 15 Aug 2017. Optimization of Ensemble Supervised Learning Algorithms for Increased Sensitivity, Specificity, and AUC of Population-Based Colorectal Cancer Screenings Anirudh Kamath 1, Raj Ramnani 2, Jay Shenoy 3, Aditya

More information

Name of the paper: Effective Development and Testing using TDD. Name of Project Teams: Conversion Team and Patient Access Team.

Name of the paper: Effective Development and Testing using TDD. Name of Project Teams: Conversion Team and Patient Access Team. 1 Name of the paper: Effective Development and Testing using TDD Name of the author: Payal Sen E-Mail Id: payal.sen@siemens.com Contact Number: 9748492800 Name of Project Teams: Conversion Team and Patient

More information

CCS Concepts Security and privacy Security in hardware Hardware Application-specific VLSI designs.

CCS Concepts Security and privacy Security in hardware Hardware Application-specific VLSI designs. Secure and Reliable XOR Arbiter PUF Design: An Experimental Study based on 1 Trillion Challenge Response Pair Measurements Chen Zhou, Keshab K. Parhi, Chris H. Kim Department of Electrical and Computer

More information

Thought Technology Ltd.

Thought Technology Ltd. Thought Technology Ltd. 8205 Montreal/ Toronto Blvd. Suite 223, Montreal West, QC H4X 1N1 Canada Tel: (800) 361-3651 ۰ (514) 489-8251 Fax: (514) 489-8255 E-mail: mail@thoughttechnology.com Webpage: http://www.thoughttechnology.com

More information

Mitglied der Helmholtz-Gemeinschaft. Advanced System Monitoring in PTP

Mitglied der Helmholtz-Gemeinschaft. Advanced System Monitoring in PTP Mitglied der Helmholtz-Gemeinschaft Advanced System Monitoring in PTP November 19, 2013 Wolfgang Frings and Carsten Karbach Content 1 PTP System Monitoring status quo 2 Short term enhancements 3 Long term

More information

ChildFit. Widex Baby. Compass quick guide

ChildFit. Widex Baby. Compass quick guide ChildFit When working with very young children, it is not always possible to obtain all of the information necessary for an accurate hearing aid fitting. To that end, Widex has developed the ChildFit procedure

More information

Finding subtle mutations with the Shannon human mrna splicing pipeline

Finding subtle mutations with the Shannon human mrna splicing pipeline Finding subtle mutations with the Shannon human mrna splicing pipeline Presentation at the CLC bio Medical Genomics Workshop American Society of Human Genetics Annual Meeting November 9, 2012 Peter K Rogan

More information

Attention, Automaticity, and Priority Learning

Attention, Automaticity, and Priority Learning In Proceedings of the Thirteenth Annual Conference of the Cognitive Science Society, 534-539, Lawrence Erlbaum, Hillsdale, New Jersey, 1991 Attention, Automaticity, and Priority Learning Prahlad Gupta

More information

Adventure 3 Plus Service Manual

Adventure 3 Plus Service Manual Adventure 3 Plus Service Manual 1 TABLE OF CONTENTS CHAPTER 1: SERIAL NUMBER LOCATION...3 CHAPTER 2: PREVENTATIVE MAINTENANCE 2.1 Preventative Maintenance. 4 2.2 Tension and Centering the Running Belt....6

More information

Next Generation Surveillance Systems integrating whole genome sequencing data into real-time detection and control (of TADs / EADs)

Next Generation Surveillance Systems integrating whole genome sequencing data into real-time detection and control (of TADs / EADs) Next Generation Surveillance Systems integrating whole genome sequencing data into real-time detection and control (of TADs / EADs) Peter Durr Ivano Broz Kerryne Graham Jianning Wang Frank Wong Sam McCullough

More information

ShoreTel Network Services Portfolio FAQ

ShoreTel Network Services Portfolio FAQ FREQUENTLY ASKED QUESTIONS ShoreTel Network Services Portfolio FAQ You have questions. We have answers. What is the ShoreTel Network Services Portfolio? Leveraging the proven methodology and best practices

More information

Fig. 1 High level block diagram of the binary mask algorithm.[1]

Fig. 1 High level block diagram of the binary mask algorithm.[1] Implementation of Binary Mask Algorithm for Noise Reduction in Traffic Environment Ms. Ankita A. Kotecha 1, Prof. Y.A.Sadawarte 2 1 M-Tech Scholar, Department of Electronics Engineering, B. D. College

More information

Introduction to Computational Neuroscience

Introduction to Computational Neuroscience Introduction to Computational Neuroscience Lecture 5: Data analysis II Lesson Title 1 Introduction 2 Structure and Function of the NS 3 Windows to the Brain 4 Data analysis 5 Data analysis II 6 Single

More information

Evolve 3 & 5 Service Manual

Evolve 3 & 5 Service Manual Evolve 3 & 5 Service Manual 1 Product Browse 2 Contents CHAPTER 1: SERIAL NUMBER LOCATION... 5 CHAPTER 2: CONSOLE INSTRUCTIONS 2.1 Console Overview... 6 2.1.1 Evolve 3 Console Overview... 6 2.1.2 Evolve

More information

Adaptive Feedback Cancellation for the RHYTHM R3920 from ON Semiconductor

Adaptive Feedback Cancellation for the RHYTHM R3920 from ON Semiconductor Adaptive Feedback Cancellation for the RHYTHM R3920 from ON Semiconductor This information note describes the feedback cancellation feature provided in in the latest digital hearing aid amplifiers for

More information

Defect Removal. RIT Software Engineering

Defect Removal. RIT Software Engineering Defect Removal Agenda Setting defect removal targets Cost effectiveness of defect removal Matching to customer & business needs and preferences Performing defect removal Techniques/approaches/practices

More information

Adventure 4 Plus Service Manual

Adventure 4 Plus Service Manual Adventure 4 Plus Service Manual 1 TABLE OF CONTENTS CHAPTER 1: SERIAL NUMBER LOCATION...3 CHAPTER 2: PREVENTATIVE MAINTENANCE 2.1 Preventative Maintenance. 4 2.2 Tension and Centering the Running Belt....6

More information

New Approaches to Accessibility. Richard Ladner University of Washington

New Approaches to Accessibility. Richard Ladner University of Washington New Approaches to Accessibility Richard Ladner University of Washington 1 What We ll Do Today Disabilities Technology Trends MobileAccessibility Project Other Mobile Projects 2 Basic Data 650 million people

More information

Rocky K. C. Chang, Edmond Chan, Waiting Fok, and Weichao Li. The Hong Kong Polytechnic University Hung hom, Kowloon, Hong Kong

Rocky K. C. Chang, Edmond Chan, Waiting Fok, and Weichao Li. The Hong Kong Polytechnic University Hung hom, Kowloon, Hong Kong Rocky K. C. Chang, Edmond Chan, Waiting Fok, and Weichao Li The Hong Kong Polytechnic University Hung hom, Kowloon, Hong Kong APRICOT 2010 1 Problem statement Measurement system Measurement methodology

More information

FPGA-based Design and Evaluation of an Energy-Efficient 10G-EPON

FPGA-based Design and Evaluation of an Energy-Efficient 10G-EPON FPGA-based Design and Evaluation of an Energy-Efficient -EPON Dung Pham Van, Luca Valcarenghi, and Piero Castoldi Scuola Superiore Sant Anna, Pisa, Italy Email: d.phamvan@sssup.it Abstract This paper presents

More information

THE STAMP PYRAMID: Vertical Thinking for Leverage in a Horizontally Focused World. April 19, 2012 STAMP/STPA Workshop

THE STAMP PYRAMID: Vertical Thinking for Leverage in a Horizontally Focused World. April 19, 2012 STAMP/STPA Workshop THE STAMP PYRAMID: Vertical Thinking for Leverage in a Horizontally Focused World April 19, 2012 STAMP/STPA Workshop William E. Young, Jr. Colonel, USAF PhD Student, Engineering Systems Division Massachusetts

More information

Bimodal Multicast. Harald Gjermundrød CptS/EE 562 February 10, 2004

Bimodal Multicast. Harald Gjermundrød CptS/EE 562 February 10, 2004 1 Bimodal Multicast Harald Gjermundrød CptS/EE 562 February 10, 2004 Bimodal Multicast 2 Bimodal Attack General commands soldiers Consensus is impossible! If almost all attack victory is certain If very

More information

Computer based delineation and follow-up multisite abdominal tumors in longitudinal CT studies

Computer based delineation and follow-up multisite abdominal tumors in longitudinal CT studies Research plan submitted for approval as a PhD thesis Submitted by: Refael Vivanti Supervisor: Professor Leo Joskowicz School of Engineering and Computer Science, The Hebrew University of Jerusalem Computer

More information

Step-by-Step RECD Guide

Step-by-Step RECD Guide Precision Audiometric Instruments www.medrx-usa.com Step-by-Step RECD Guide The RECD task involves 4 steps: 1 - Complete Calibration of the Speakers and Probe Tube 2 - Measure an Ear Response 3 - Perform

More information

Agent-Based Models. Maksudul Alam, Wei Wang

Agent-Based Models. Maksudul Alam, Wei Wang Agent-Based Models Maksudul Alam, Wei Wang Outline Literature Review about Agent-Based model Modeling disease outbreaks in realistic urban social Networks EpiSimdemics: an Efficient Algorithm for Simulating

More information

How_Scientific_Teams_Develop_New_Anti- Cancer_Drugs English mp4_ [00:00:00.00]

How_Scientific_Teams_Develop_New_Anti- Cancer_Drugs English mp4_ [00:00:00.00] How_Scientific_Teams_Develop_New_Anti- Cancer_Drugs English mp4_ [00:00:00.00] [00:00:20.09] KRISTINA MASSON: Welcome to our lesson on drug development and cancer. My name is Kristina, and I work here

More information

Introduction. What s new in Genie 2? New Fitting features. Support for new hearing aids:

Introduction. What s new in Genie 2? New Fitting features. Support for new hearing aids: Guide 207. Introduction Genie 2 and Genie have been updated with a variety of new features and enhancements. Please find a quick overview of these below: What s new in Genie 2? Support for new hearing

More information

Motivation: Attention: Focusing on specific parts of the input. Inspired by neuroscience.

Motivation: Attention: Focusing on specific parts of the input. Inspired by neuroscience. Outline: Motivation. What s the attention mechanism? Soft attention vs. Hard attention. Attention in Machine translation. Attention in Image captioning. State-of-the-art. 1 Motivation: Attention: Focusing

More information

Insio: A new standard in custom instruments

Insio: A new standard in custom instruments Insio: A new standard in custom instruments www.siemens.com Abstract: Insio custom hearing instruments introduce novel features throughout the complete fitting process in order to obtain the best possible

More information

HIIT AiRBIKE AT-1000B

HIIT AiRBIKE AT-1000B HIIT AiRBIKE AT-1000B V2.2 AirTEK Fitness www.airtekfitness.com PO Box 1509 Langley WA, 98260 (360) 321-7090 or (800) 398-9121 TABLE OF CONTENTS SAFETY FIRST... 3 WARRANTY INFORMATION... 4 ASSEMBLY NOTE...

More information

WHAT IS SOFT SKILLS:

WHAT IS SOFT SKILLS: WHAT IS SOFT SKILLS: Soft skills refer to a cluster of personality traits, social graces, facility with language, friendliness and optimism that mark people to a varying degree. Soft skills compliment

More information

Speed - Accuracy - Exploration. Pathfinder SL

Speed - Accuracy - Exploration. Pathfinder SL Speed - Accuracy - Exploration Pathfinder SL 98000 Speed. Accuracy. Exploration. Pathfinder SL represents the evolution of over 40 years of technology, design, algorithm development and experience in the

More information

Body Packet 2. The Framework: The Skeletal System

Body Packet 2. The Framework: The Skeletal System Period Name Body Packet 2 The Framework: The Skeletal System INSTRUCTIONS: Complete a Quick Notes for paragraphs 1-6 on next few pages. Answer all other questions on your own lined notebook paper. The

More information

Error Detection based on neural signals

Error Detection based on neural signals Error Detection based on neural signals Nir Even- Chen and Igor Berman, Electrical Engineering, Stanford Introduction Brain computer interface (BCI) is a direct communication pathway between the brain

More information

MobileAccessibility. Richard Ladner University of Washington

MobileAccessibility. Richard Ladner University of Washington MobileAccessibility Richard Ladner University of Washington 1 What We ll Do Tonight Disabilities Technology Trends MobileAccessibility Project Other Mobile Projects 2 Basic Data 650 million people world-wide

More information

Dilated Recurrent Neural Network for Short-Time Prediction of Glucose Concentration

Dilated Recurrent Neural Network for Short-Time Prediction of Glucose Concentration Dilated Recurrent Neural Network for Short-Time Prediction of Glucose Concentration Jianwei Chen, Kezhi Li, Pau Herrero, Taiyu Zhu, Pantelis Georgiou Department of Electronic and Electrical Engineering,

More information

Sleepless in Seattle No Longer Joshua Reich*, Michel Goraczko, Aman Kansal, and Jitu Padhye

Sleepless in Seattle No Longer Joshua Reich*, Michel Goraczko, Aman Kansal, and Jitu Padhye Sleepless in Seattle No Longer Joshua Reich*, Michel Goraczko, Aman Kansal, and Jitu Padhye Columbia University*, Microsoft Research 1 A Short Story: Sleepless in Seattle A desktop machine Workdays: often

More information

How Evidence-Based Strength Training Builds Stronger, Healthier Fitness Communities

How Evidence-Based Strength Training Builds Stronger, Healthier Fitness Communities Case Study: How Evidence-Based Strength Training Builds Stronger, Healthier Fitness Communities Published February 2017 Page 1 of 18 A Message From the ShapeLog Team We all know exercise is important,

More information

EPON Protocol over Coax

EPON Protocol over Coax TDD Cycle Steve Shellhammer (Qualcomm) June 2013 1 Description of TDD Cycle EPON Protocol over Coax The TDD cycle consists of four time segments Downstream (DS) Upstream (US) Two Guard Times (GT) DS GT

More information

YouGov November 10-12, 2014

YouGov November 10-12, 2014 1. Have you heard of the term "net neutrality"? Yes 46% 55% 36% 42% 44% 50% 44% 41% 48% 46% No 54% 45% 64% 58% 56% 50% 56% 59% 52% 54% 100% 100% 100% 100% 100% 100% 100% (Unweighted N) (999) (476) (523)

More information

Phonak Target 4.3. Desktop Fitting Guide. Content. March 2016

Phonak Target 4.3. Desktop Fitting Guide. Content. March 2016 Phonak Target 4.3 March 2016 Desktop Fitting Guide This guide provides you with a detailed introduction to latest hearing instrument fitting with Phonak Target. www.phonakpro.com/target_guide Please also

More information

Fundamentals of Computational Neuroscience 2e

Fundamentals of Computational Neuroscience 2e Fundamentals of Computational Neuroscience 2e Thomas Trappenberg January 7, 2009 Chapter 1: Introduction What is Computational Neuroscience? What is Computational Neuroscience? Computational Neuroscience

More information

IMRT Planning Basics AAMD Student Webinar

IMRT Planning Basics AAMD Student Webinar IMRT Planning Basics AAMD Student Webinar March 12, 2014 Karen Chin Snyder, MS Senior Associate Physicist Department of Radiation Oncology Disclosures The presenter has received speaker honoraria from

More information

Better hearing is right here, right now.

Better hearing is right here, right now. Better hearing is right here, right now. Just as no two people are alike, no two patients hearing losses are the same. Now, with the addition of our full lineup of Wi Series custom styles to complement

More information

PROFIBUS Products Overview P PROFIBUS Converter/Repeater P PROFIBUS Gateway P6-3-1

PROFIBUS Products Overview P PROFIBUS Converter/Repeater P PROFIBUS Gateway P6-3-1 .1. Overview P-1-1.2. PROFIBUS Converter/Repeater P-2-1.3. PROFIBUS Gateway P-3-1.4. PROFIBUS Remote I/O Modules P-4-1.5. PROFIBUS I/O Unit P-5-1 Overview.1. Overview PROFIBUS (Process Field Bus) is a

More information

Overview Detection epileptic seizures

Overview Detection epileptic seizures Overview Detection epileptic seizures Overview Problem Goal Method Detection with accelerometers Detection with video data Result Problem Detection of epileptic seizures with EEG (Golden Standard) Not

More information

Comparing heritability estimates for twin studies + : & Mary Ellen Koran. Tricia Thornton-Wells. Bennett Landman

Comparing heritability estimates for twin studies + : & Mary Ellen Koran. Tricia Thornton-Wells. Bennett Landman Comparing heritability estimates for twin studies + : & Mary Ellen Koran Tricia Thornton-Wells Bennett Landman January 20, 2014 Outline Motivation Software for performing heritability analysis Simulations

More information

Editorial Note: this manuscript has been previously reviewed at another journal that is not operating a transparent peer review scheme.

Editorial Note: this manuscript has been previously reviewed at another journal that is not operating a transparent peer review scheme. Editorial Note: this manuscript has been previously reviewed at another journal that is not operating a transparent peer review scheme. This document only contains reviewer comments and rebuttal letters

More information

Implementing Spike-Timing-Dependent Plasticity on SpiNNaker Neuromorphic Hardware

Implementing Spike-Timing-Dependent Plasticity on SpiNNaker Neuromorphic Hardware Implementing Spike-Timing-Dependent Plasticity on SpiNNaker Neuromorphic Hardware Xin Jin, Alexander Rast, Francesco Galluppi, Sergio Davies, and Steve Furber Abstract This paper presents an efficient

More information