Copyrighted Material

Total Page:16

File Type:pdf, Size:1020Kb

Copyrighted Material INDEX 3DES see Triple DES Encoding algorithm, 6 3G, 223, 276 Identifier, 197 4G, 276 Alphabet, 7, 9, 67, 69, 70, 73, 100, 102, 103, 107, 7-Zip, 126 114, 141, 211 Code alphabet, 7, 27, 100 A posteriori probability see APP Source alphabet, 7, 18, 27, 69, 71, 100, 104 A5/0, 26 Amount of information, 19, 20, 74, 101, 102, 215 A5/1, 26 Annihilator, 86, 87 A5/3, 143 APP, 244–249, 275, 334 Abelian see Group Arithmetic coding, 109, 110, 112, 116, 123, 131 Access control, 133 Arity, 70 Acrypta, 62 ARQ, 211, 218 Active byte, 160 ASCII, 27, 114, 119, 124, 170, 205, 310 AddRoundKey, 153, 154, 157, 160, 307, 309 7 bits, 124 ADFVGX code, 26 ASN.1, 197 Adleman see RSA Asymmetric cryptosystem, 138 ADSL, 210, 276 Asymmetric Digital Subscriber Line see ADSL Advanced Encryption Standard see AES Attack, 10, 26, 68, 77, 140, 144, 149, 166, 174, AES, 139, 144, 149, 151–160, 175, 179, 180, 185, 193, 322 200, 206, 307–309 Active attack, 139 Agrawal–Kayal–SaxenaCOPYRIGHTEDsee AKS Birthday MATERIAL attack see Yuval AKS, 45, 46 Brute force attack, 15, 140 Algorithm, 6 By repetition, 166 Complexity, 13 By signature, 173 Cryptographic algorithm, 26, 137, 141 Chosen ciphertext attack, 140 Decoding algorithm, 10 Chosen plaintext attack, 140 Foundations of Coding: Compression, Encryption, Error Correction, First Edition. Jean-Guillaume Dumas, Jean-Louis Roch, Éric Tannier and Sébastien Varrette. © 2015 John Wiley & Sons, Inc. Published 2015 by John Wiley & Sons, Inc. http://foundationsofcoding.imag.fr 345 346 INDEX Attack (Continued) Flip, 246 Ciphertext only attack, 140 Operation, 13 Common exponent attack, 173 Blahut, 258 Common modulus attack, 173 blake, 180 Differential analysis attack, 140 Block Factorial attack, 173 Cipher, 26, 144 Forced sequence attack, 140 Coding, 211 Known plaintext attack, 140 Blu-ray, 209, 210 Known sequence attack, 140 Bluetooth, 65, 143 Man-in-the-middle see Man-in-the-middle Blum-Blum-Shub, 192 Meet-in-the-middle see Meet-in-the-middle Blum-Micali, 66 On LCGs,85 Bose–Chaudhuri–Hocquenghem see BCH Passive attack, 139 Bound Yuval’s attack see Yuval Of Shannon, 217 Audio, 79, 134 Singleton bound, 233 Audio CD, 266, 268 BPA, 244–250, 334 Authentic, 187 Breaking, 68, 85, 150, 185, 315 Authentication, 75, 133, 175, 185–187, 198–200, BSC, 216, 217, 226, 242, 245, 248, 250, 324, 328, 206, 207, 318 329, 333 Unique authentication, 163 Burrows–Wheeler Transform see BWT Authenticator, 164 Burst of errors, 222 Auto-dual (code), 237 BWT, 120–122, 126 Automatic Repeat reQuest see ARQ bzip2, 122, 126 Aztec, 220 CA, 193, 195–198, 201–203, 321 Baby step, giant step, 95, 175 Caesar encryption, 9–11, 16, 26, 141 Basic Bank Account Number see BBAN CAIN, 138 Bayes Camellia, 152 Formula, 17, 18, 215, 283 Cantor–Zassenhaus, 252 BBAN, 219, 220 Capacity, 215–217, 225, 239, 256, 279, 324, 341 BCH, 249, 254–257 Caracteristic, 32 Primitive code, 256 Card Verification Key, 221 BEC, 250 Card Verification Value see CVV Belief Propagation Algorithm see BPA Cardinal number, 7, 30, 31, 38, 48, 49, 51, 52, Ben-Or, 50 100, 229, 232, 287, 289 Berlekamp–Massey, 254, 259 CBC, 27–30, 144, 159, 185, 188, 206, 284 Berlekamp-Massey, 65, 85, 88, 259 CBC-MAC, 185 Bézout, 32, 33, 35, 37, 38, 47, 48 CBC-MAC-AES, 185 Bézout, 157, 303, 316 CD ROM, 134, 210 BI-AWGNC, 250 Certificate, 193–201, 320, 321 Big-O,14 Chain of certificates, 193 Binary Check, 197 Channel, 211, 216, 217 Directory, 198 Exponentiation, 41, 57, 58, 61, 287 Extraction, 197 Weight see Hamming Issuing, 194 Binary Erasure Channel see BEC Repository, 195, 198 Binary Symmetric Channel see BSC User certificate, 201 Binary-input Additive White Gaussian Verification, 197, 199 Noise Channel see BI-AWGNC Certification Authority see CA Birthday Certification Revocation List see CRL Attack see Yuval CFB, 28, 30, 144, 185, 188, 206, 284 Paradox, 88 Channel coding, 209, 210 Bit, 13 Character, 7 Extraction, 144 Characteristic, 52–54, 149 INDEX 347 Checksum see Parity Constant, 14 Chinese remainder, 39, 40, 169, 286, 288, 315 Exponential, 14 Chroma, 129, 131, 132 Linear, 14 Chrominance see Chroma Logarithmic, 14 Cipher Block Chaining see CBC Polynomial, 14 Cipher FeedBack see CFB Quasilinear, 14 Ciphering, 137 Space complexity, 13 Ciphertext, 9, 12 Time complexity, 13 CIRC, 218, 261, 266, 268 compress, 125, 126 Cleartext, 137 Compression CML, 249 Dynamic compression, 114 Code Dynamic Huffman, 114 Arity of a code, 100 Lossless compression, 99, 128, 132 Auto-dual code, 237 Lossy compression, 23, 68, 74, 100, 128, 129, Bar code, 219, 220, 261 134, 135, 295 Cyclic code, 85, 250, 251, 253, 254, 258, 335 Confidentiality, 133, 138–140, 149, 186, 187, Depth of a code, 72 204 Dual code, 237 Confidentiality, Authentication, Integrity, Equivalent code, 227 Nonrepudiation see CAIN Error-correcting code, 210, 222, 269 Content Scrambling System see CSS Error-detecting code, 210, 218, 222 Control matrix, 235, 237, 257, 258 Extended code, 227, 228 Convolutional Golay code, 237 Non-systematic see NSC Hamming code, 230–232 Recursive see RSC Huffman code, 72, 73, 105, 106, 292 Systematic, 272 Instantaneous code, 70, 71, 73, 107, 118, 291 Coppersmith (Index Calculus), 96 Interleaved code, 263 Coprime, 39, 47, 48, 50, 156, 169, 173, 287 Irreducible code, 70 Correction Linear code, 160, 232–235, 238, 250, 269, By retransmission see ARQ 335 Direct correction, 211 Message Authentication see MAC Rate, 250, 271 Minitel code, 232 Counter Mode Encryption see CTR Non-ambiguous code, 69 Covertext, 23 Perfect code, 229, 230, 234 CRC, 205, 210, 218, 221–223 Punctured code, 228, 229, 234, 272, 330, 331, Credit card, 220 336 One-time credit card, 193 QR-code see QR-code One-time credit card, 193 Rate, 211, 212, 214, 215, 217, 224, 226–228, CRL, 195, 197, 198, 203 230, 231, 239, 272, 279, 326, 330, 341 Issuer, 195, 198 Recursive code see RSC Cross-Interleaved Reed–Solomon Code see CIRC Shortened code, 227–229, 234, 261, 262, 266, Cryptanalysis, 10, 11, 16, 84, 88, 90, 136, 139, 331, 332, 337, 338 149, 150, 159, 170, 177 Systematic code, 218, 224, 234, 235, 272 Frequency Analysis, 12, 171 Turbo code see Turbo Cryptographically secure see Generator Uniquely decodable code, 69 Cryptography Codebreaking, 10 Functionalities see CAIN Coded Modulation Library see CML Fundamental relation, 137 Codeword, 27, 54, 68–73, 211, 251, 291, 292 Services see CAIN Coding theory, 209 CSS,26 Collision, 74, 78, 88–90, 96, 159, 177, 182, 292, CTR, 27, 29, 30, 144, 185, 186, 283 318 Curve point, 58, 92, 95, 175, 191 Complexity, 12–14, 38, 41, 42, 45, 55, 63, 81, 82, CVV, 221 84, 86, 88, 95, 96, 128, 140, 149, 168, 176, Cyclic Redundancy Checks see CRC 181, 259, 282 Cyclic shift, 155, 250 348 INDEX DAT, 210 DVB-S2, 239, 249, 276 Data Encryption Standard see DES DVD, 26, 134, 209 Datamatrix, 220 Dating service, 166 E-mail DCT, 80, 129–133, 135, 301 Address, 192, 321 DDF, 252, 335 Client, 149 Decoding Securization, 201 Iterative decoding, 275 EAN-13, 218–220, 325 Nearest neighbor, 213 ECB, 27–30, 144, 159, 283 Decryption, 85 ECC, 175, 237, 332 Degree ECDSA, 190 Distribution polynomials, 241 Edwards curve, 61, 62 Of a polynomial, 46 EFM, 266 Of liberty, 67 El Gamal, 174, 175 Demultiplexor, 275 Electronic Code Book see ECB Depth Elliptic curve, 59 Of a code, 72 Elliptic curve, 58–61, 91–95, 175, 190, 191, 290 Of a tree, 72 Addition, 60 Of interleaving, 263 Doubling, 60 DES, 144–152, 159, 203, 206, 308 Elliptic Curve Cryptography see ECC DFT, 79–84, 129, 135, 221, 258–260 Elliptic Curve Digital Signature Algorithm Fast DFT,82 see ECDSA Dictionary, 123 Encoding Diffie-Hellman, 163, 194, 207 Adaptive encoding, 116 Key exchange protocol, 161, 162 Channel coding, 214 Public key, 168 Lattice, 270 Digest, 73 Lossless encoding see Compression Digital Right Management see DRM Lossy encoding see Compression Digital Signature Standard see DSS Noiseless encoding, 102 Digital Video Broadcasting see DVB With data loss, 11 dim, 34 Encryption, 133, 137 Dimension, 34 Almost secure encryption, 26, 145 Discrete Cosine Transform see DCT Asymmetric encryption, 168 Discrete Fourier Transform see DFT Mode, 27, 28, 144, 159 Discrete Logarithm Problem see DLP CBC,28 Disorder, 19 CFB,28 Distance, 222 CTR,29 Binary distance see Hamming ECB,27 Free distance, 271 OFB,29 Of a code, 225, 227 Perfect Encryption, 144 Distinct Degree Factorization see DDF Perfect encryption, 24, 141, 144, 149, 282, 304 Distortion, 209 Public key encryption, 168 Distribution Symmetric encryption, 141, 144, 145, 167, 168, Probability, 17 179, 185, 203 Uniform distribution, 19, 67, 216, 291 Unconditionally secure, 144 div, 32 Vernam encryption, 65 DivX, 134 Entropy, 19, 20, 22, 23, 25, 71, 101, 103, 120, DLP, 42, 58, 59, 174, 175 135, 140, 215, 283, 299 Double DES, 150 Conditional entropy, 19, 20, 215 Double-and-add, 61, 92, 191, 290 Induced entropy, 19 DRM, 23, 133 Joint entropy, 19, 20 DSS, 189, 190 Maximum entropy, 19 Dual (code), 237 Pool of entropy, 200 DVB, 239, 249, 276 Equivalence RSA-Factoring, 172 INDEX 349 Equivalence RSA-Factoring, 172 Characteristic of a field, 33 Equivalent (code), 227 Commutative field, 33, 34 Erased, 339 Finite field, 34, 43, 46, 48, 49, 51–57, 151, 232 Erasure, 260, 261, 266–268, 336, 338 Galois field, 48 Error Number field, 93 Correction, 211 Prime field, 33, 43, 46, 48, 49, 55, 56 Correction rate, 217, 226, 227, 250, 271 Splitting field, 84, 257 Detection, 211 Final entity, 193, 198 Detection rate, 226, 227 FinalRound, 154, 308 Rate, 8, 11, 209, 210, 215, 232, 239 Fingerprint, 73, 74, 89, 178, 179, 181, 182, 322 Syndrome, 236, 240, 242, 254, 257, 259, 268, Flash, 210 333, 338 Floyd, 90 estream,
Recommended publications
  • Table of Contents Modules and Packages
    Table of Contents Modules and Packages...........................................................................................1 Software on NAS Systems..................................................................................................1 Using Software Packages in pkgsrc...................................................................................4 Using Software Modules....................................................................................................7 Modules and Packages Software on NAS Systems UPDATE IN PROGRESS: Starting with version 2.17, SGI MPT is officially known as HPE MPT. Use the command module load mpi-hpe/mpt to get the recommended version of MPT library on NAS systems. This article is being updated to reflect this change. Software programs on NAS systems are managed as modules or packages. Available programs are listed in tables below. Note: The name of a software module or package may contain additional information, such as the vendor name, version number, or what compiler/library is used to build the software. For example: • comp-intel/2016.2.181 - Intel Compiler version 2016.2.181 • mpi-sgi/mpt.2.15r20 - SGI MPI library version 2.15r20 • netcdf/4.4.1.1_mpt - NetCDF version 4.4.1.1, built with SGI MPT Modules Use the module avail command to see all available software modules. Run module whatis to view a short description of every module. For more information about a specific module, run module help modulename. See Using Software Modules for more information. Available Modules (as
    [Show full text]
  • An Optimal Real-Time Controller for Vertical Plasma Stabilization N
    1 An optimal real-time controller for vertical plasma stabilization N. Cruz, J.-M. Moret, S. Coda, B.P. Duval, H.B. Le, A.P. Rodrigues, C.A.F. Varandas, C.M.B.A. Correia and B. Gonc¸alves Abstract—Modern Tokamaks have evolved from the initial ax- presents important advantages since it allows the creation isymmetric circular plasma shape to an elongated axisymmetric of divertor plasmas, the increase of the plasma current and plasma shape that improves the energy confinement time and the density limit as well as providing plasma stability. However, triple product, which is a generally used figure of merit for the conditions needed for fusion reactor performance. However, the an elongated plasma is unstable due to the forces that pull elongated plasma cross section introduces a vertical instability the plasma column upward or downward. The result of these that demands a real-time feedback control loop to stabilize forces is a plasma configuration that tends to be pushed up or the plasma vertical position and velocity. At the Tokamak down depending on the initial displacement disturbance. For Configuration Variable (TCV) in-vessel poloidal field coils driven example, a small displacement downwards results in the lower by fast switching power supplies are used to stabilize highly elongated plasmas. TCV plasma experiments have used a PID poloidal field coils pulling the plasma down, with increased algorithm based controller to correct the plasma vertical position. strength as the plasma gets further from the equilibrium posi- In late 2013 experiments a new optimal real-time controller was tion. To compensate this instability, feedback controllers have tested improving the stability of the plasma.
    [Show full text]
  • Aligning Intent and Behavior in Software Systems: How Programs Communicate & Their Distribution and Organization
    © 2020 William B. Dietz ALIGNING INTENT AND BEHAVIOR IN SOFTWARE SYSTEMS: HOW PROGRAMS COMMUNICATE & THEIR DISTRIBUTION AND ORGANIZATION BY WILLIAM B. DIETZ DISSERTATION Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate College of the University of Illinois at Urbana-Champaign, 2020 Urbana, Illinois Doctoral Committee: Professor Vikram Adve, Chair Professor John Regehr, University of Utah Professor Tao Xie Assistant Professor Sasa Misailovic ABSTRACT Managing the overwhelming complexity of software is a fundamental challenge because complex- ity is the root cause of problems regarding software performance, size, and security. Complexity is what makes software hard to understand, and our ability to understand software in whole or in part is essential to being able to address these problems effectively. Attacking this overwhelming complexity is the fundamental challenge I seek to address by simplifying how we write, organize and think about programs. Within this dissertation I present a system of tools and a set of solutions for improving the nature of software by focusing on programmer’s desired outcome, i.e. their intent. At the program level, the conventional focus, it is impossible to identify complexity that, at the system level, is unnecessary. This “accidental complexity” includes everything from unused features to independent implementations of common algorithmic tasks. Software techniques driving innovation simultaneously increase the distance between what is intended by humans – developers, designers, and especially the users – and what the executing code does in practice. By preserving the declarative intent of the programmer, which is lost in the traditional process of compiling and linking and building software, it is easier to abstract away unnecessary details.
    [Show full text]
  • Volume 5: DAF Variable Detail Pages
    Anc hor Volume 5: DAF Variable Detail Pages August 2020 Submitted to: Social Security Administration Office of Retirement and Disability Policy Office of Research, Demonstration, and Employment Support Washington, DC 20024-2796 Project Officers: Paul O’Leary and Debra Tidwell-Peters Contract Number: SS00-16-60003 Submitted by: Mathematica 1100 1st Street, NE 12th Floor Washington, DC 20002-4221 Telephone: (202) 484-9220 Facsimile: (202) 863-1763 Project Director: Jody Schimmel Hyde Reference Number: 50214.Y3.T05.530.360 Suggested Citation: “Disability Analysis File 2018 (DAF18) Documentation: Data from January 1994 through December 2018.” Washington, DC: Mathematica, August 2020. This page has been left blank for double-sided copying. MATHEMATICA CONTENTS GLOSSARY .................................................................................................................................................. .v OVERVIEW OF DAF DOCUMENTATION ................................................................................................... .ix QUICK REFERENCE GUIDE ....................................................................................................................... 1 PART A DAF VARIABLE DETAIL PAGES .................................................................................................. 7 PART B RSA VARIABLE DETAIL PAGES .............................................................................................. 635 iii This page has been left blank for double-sided copying. MATHEMATICA GLOSSARY AB Accelerated
    [Show full text]
  • Kafl: Hardware-Assisted Feedback Fuzzing for OS Kernels
    kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels Sergej Schumilo1, Cornelius Aschermann1, Robert Gawlik1, Sebastian Schinzel2, Thorsten Holz1 1Ruhr-Universität Bochum, 2Münster University of Applied Sciences Motivation IJG jpeg libjpeg-turbo libpng libtiff mozjpeg PHP Mozilla Firefox Internet Explorer PCRE sqlite OpenSSL LibreOffice poppler freetype GnuTLS GnuPG PuTTY ntpd nginx bash tcpdump JavaScriptCore pdfium ffmpeg libmatroska libarchive ImageMagick BIND QEMU lcms Adobe Flash Oracle BerkeleyDB Android libstagefright iOS ImageIO FLAC audio library libsndfile less lesspipe strings file dpkg rcs systemd-resolved libyaml Info-Zip unzip libtasn1OpenBSD pfctl NetBSD bpf man mandocIDA Pro clamav libxml2glibc clang llvmnasm ctags mutt procmail fontconfig pdksh Qt wavpack OpenSSH redis lua-cmsgpack taglib privoxy perl libxmp radare2 SleuthKit fwknop X.Org exifprobe jhead capnproto Xerces-C metacam djvulibre exiv Linux btrfs Knot DNS curl wpa_supplicant Apple Safari libde265 dnsmasq libbpg lame libwmf uudecode MuPDF imlib2 libraw libbson libsass yara W3C tidy- html5 VLC FreeBSD syscons John the Ripper screen tmux mosh UPX indent openjpeg MMIX OpenMPT rxvt dhcpcd Mozilla NSS Nettle mbed TLS Linux netlink Linux ext4 Linux xfs botan expat Adobe Reader libav libical OpenBSD kernel collectd libidn MatrixSSL jasperMaraDNS w3m Xen OpenH232 irssi cmark OpenCV Malheur gstreamer Tor gdk-pixbuf audiofilezstd lz4 stb cJSON libpcre MySQL gnulib openexr libmad ettercap lrzip freetds Asterisk ytnefraptor mpg123 exempi libgmime pev v8 sed awk make
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • Systems Cost/Performance Analysis (Study 2.3) Final Report
    AEROSPffE REPORT NO. AZ "'14(7343)-1, VOL III Systems Cost/Performance Analysis (Study 2.3) Final Report Volume IH: Programmer's Manual and User's Guide Prepared by V'< ADVANCED MISSION ANALYSIS DIRECTORATE Advanced Orbital Systems Division 27 September 1974 Prepared for OFFICE OF MANNED SPACE FLIGHT NATIONAL AERONAUTICS AND SPACE ADMINISTRATION Washington, D.C. 20546 Contract No. NASW-2575 Systems Engineering Operations THE AEROSPACE CORPORATION .(NASA-C-lP3377) SYSTEMS COSr/PERFORACE N75-309211 ANALYSIS (STUDY 2.3). VOLUME 3: IPROG AMER'S MANUAL AND USER'S GUIDE Final Report (Aerospace Corp., El Segundo, Calif.) Unclas 592 p HC $13.25 CSCL 05A G3/8-1 34377 ) Aerospace Report No. ATR-74(7343)-I, Vol, III SYSTEMS COST/PERFORMANCE ANALYSIS (STUDY 2. 3) FINAL REPORT Volume III: Programmer's Manual and User's Guide Prepared by Advanced Mission Analysis Directorate Advanced Orbital Systems Division Z7 September 1974 Systems Engineering Operations THE AEROSPACE CORPORATION El Segundo, California Prepared for OFFICE OF MANNED SPACE FLIGHT NATIONAL AERONAUTICS AND SPACE ADMINISTRATION Washington, D. C. Contract No. NASW-2575 PAGE INTENTIONALLY BLANK Aerospace Report No. ATR-74(7343)-I, Vol. III SYSTEMS COST/PERFORMANCE ANALYSIS (STUDY 2. 3) FINAL REPORT Volume III: Programmer's Manual and User's Guide Prepared R *F.OJ , Man e Data Sys ems An sis Section Data Processing Subdivision Approved L. Sashkin, Director R. H. Herndon, Assoc. Group Data Processing Subdivision Director Information Processing Division Advanced Mission Analysis Engineering Science Operations Directorate Advanced Orbital Systems Division PRECEDING PAGE-iii- BLANK NOT FILMED PAGE INTENTIONALLY BLANK FOREWORD This report documents The Aerospace Corporation effort on Study 2.3, Systems Cost/Perfbrmance Analysis, performed under NASA Contract NASW-2575 during Fiscal Year 1974.
    [Show full text]
  • Porovnání Komprimaˇcních Program ˚U Na Textových Korpusech
    MASARYKOVA UNIVERZITA FAKULTA}w¡¢£¤¥¦§¨ INFORMATIKY !"#$%&'()+,-./012345<yA| Porovnání komprimaˇcních program ˚una textových korpusech BAKALÁRSKÁˇ PRÁCE Jakub Foltas Brno, 2014 Prohlášení Prohlašuji, že tato bakaláˇrskápráce je mým p ˚uvodnímautorským dílem, které jsem vypracoval samostatnˇe.Všechny zdroje, prameny a literaturu, které jsem pˇrivypracování používal nebo z nich ˇcerpal, v práci ˇrádnˇecituji s uvedením úplného odkazu na pˇríslušnýzdroj. Jakub Foltas Vedoucí práce: RNDr. Miloš Jakubíˇcek ii Podˇekování Chtˇelbych podˇekovatvedoucímu mé bakaláˇrské práce RNDr. Mi- loši Jakubíˇckoviza odborné vedení, cenné rady a trpˇelivost,kterou se mnou mˇel.Také bych rád podˇekovalsvé rodinˇea pˇrátel˚umza podporu, kterou mi v dobˇepsaní bakaláˇrsképráce poskytovali. iii Shrnutí Bakaláˇrskápráce se zabývá porovnáním volnˇedostupných bezeztrá- tových komprimaˇcníchprogram ˚una textových korpusech. Hlavním cílem výzkumu bylo najít vhodný komprimaˇcníprogram, který by nahradil souˇcasnˇepoužívaný program XZ v Laboratoˇripro zpraco- vání pˇrirozeného jazyka pˇriMasarykovˇeuniverzitˇe. Testování na dvou odlišných textových korpusech se podrobilo celkem dvacet volnˇedostupných komprimaˇcníchprogram ˚u.Primár- ním kritériem porovnání byla urˇcenavelikost komprimace. Dále byla porovnávána doba bˇehuprogramu a programové vytížení pamˇeti. Dalším pˇredmˇetemzkoumání byly úˇcinkypˇredzpracováníkorpus ˚u pˇredsamotnou komprimací testovanými programy. Tˇriprogramy dokázaly korektnˇezkomprimovat oba zadané kor- pusy a významnˇepˇredˇcilysouˇcasnˇepoužívaný
    [Show full text]
  • IZO: Applications of Large-Window Compression to Virtual Machine Management
    IZO: Applications of Large-Window Compression to Virtual Machine Management Mark A. Smith, Jan Pieper, Daniel Gruhl, and Lucas Villa Real – IBM Almaden Research Center ABSTRACT The increased use of virtual machines in the enterprise environment presents an interesting new set of challenges for the administrators of today’s information systems. In addition to the management of the sheer volume of easily-created new data on physical machines, VMs themselves contain data that is important to the user of the virtual machine. Efficient storage, transmission, and backup of VM images has become a growing concern. We present IZO, a novel large-window compression tool inspired by data deduplication algorithms, which provides significantly faster and better compression than existing large-window compression tools. We apply this tool to a number of VM management domains, including deep-freeze, backup, and transmission, to more efficiently store, administer, and move virtual machines. Introduction We find this property analogous to the way a suitcase is packed. It is possible to simply stuff all of Virtual machines are becoming an increasingly one’s clothes into a suitcase, sit on the lid, and zip it important tool for reducing costs in enterprise comput- ing. The ability to generate a machine for a task, and up. However, if the clothes are folded first, and then know it has a clean install of a given OS can be an compressed, they will fit in a smaller space in less invaluable time saver. It provides a degree of separa- time. Large-window compression can be thought of as tion that simplifies support (a major cost) as people all the folding step, while small-window gzip style com- get their ‘‘own’’ machines [26].
    [Show full text]
  • Lightning Talk Presentations
    Automated Kaguya TC and MRO CTX Stereo DEM Generation 5th Planetary Data Workshop and 2nd Planetary Science Informatics & Data Analytics Meeting Processing Session 1: June 28, 2021 Lauren A. Adoram-Kershner, [email protected] Ben H. Wheeler, [email protected] Jason R. Laura, [email protected] Robin L. Fergason, [email protected] David P. Mayer, [email protected] Motivation • The volume of stereographic images coupled with manual generation standard means a lot of DEM potential. Figure 2: Distribution of • Targeted generation; not covering full datasets. Kaguya TC stereopairs. • Served across various research institutes applying their own processing. • Difficulty tracing provenance of processing typically contained in separate paper(s). Method: Serving LOLA RDR ASAP-Stereo, Ames Stereo Automated Pipeline A. M. Annex1, K. W. Lewis1. 1Department of Earth and Planetary Sciences, Johns Hopkins University, Baltimore, MD 21218, USA ([email protected]) 1 @AndrewAnnex [email protected] www.andrewannex.com What is ASAP-Stereo? 1. Python Library and CLI, higher-level wrapper for Ames Stereo Pipeline 2. Framework to implement ASP workflows, currently implements “asp_scripts” for HiRISE & CTX with enhancements Why use ASAP-Stereo? 1. Reproducibility with Jupyter Notebooks, avoid ad hoc processing! 2. Speedups over asp_scripts 3. Ease of use, less monitoring 2 @AndrewAnnex [email protected] www.andrewannex.com Try ASAP-Stereo! Welcoming contributions for other instruments! Links: https://asap-stereo.readthedocs.io https://asap-stereo.readthedocs.io/en/main/install.html
    [Show full text]
  • UCLA Electronic Theses and Dissertations
    UCLA UCLA Electronic Theses and Dissertations Title Datacomp: Locally-independent Adaptive Compression for Real-World Systems Permalink https://escholarship.org/uc/item/0c3453tc Author Peterson, Peter Andrew Harrington Publication Date 2013 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA Los Angeles Datacomp: Locally-independent Adaptive Compression for Real-World Systems A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Computer Science by Peter Andrew Harrington Peterson 2013 © Copyright Peter Andrew Harrington Peterson 2013 ABSTRACT OF THE DISSERTATION Datacomp: Locally-independent Adaptive Compression for Real-World Systems by Peter Andrew Harrington Peterson Doctor of Philosophy in Computer Science University of California, Los Angeles, 2013 Professor Todd Millstein, Co-chair Professor Peter Reiher, Co-chair Typically used to save space, non-lossy data compression can save time and energy during communication if the cost to compress and send data is less than the cost of sending uncompressed data. However, compression can degrade efficiency if it compresses insufficiently or delays the operation significantly, which can depend on many factors. Because predicting the best strategy is risky and difficult, compression (if available) is typically manually controlled, resulting in missed opportunities and avoidable losses. This dissertation describes Datacomp, a general-purpose Adaptive Compression (AC) framework that improves efficiency in terms of time, space and energy for real-world workloads on real-world systems like laptops and smartphones. Prior systems are limited in important ways or rely on external hosts for prediction and compression, reducing their effectiveness or imposing unnecessary dependencies.
    [Show full text]
  • MIGRATORY COMPRESSION Coarse-Grained Data Reordering to Improve Compressibility
    MIGRATORY COMPRESSION Coarse-grained Data Reordering to Improve Compressibility Xing Lin*, Guanlin Lu, Fred Douglis, Philip Shilane, Grant Wallace *University of Utah EMC Corporation Data Protection and Availability Division © Copyright 2014 EMC Corporation. All rights reserved. 1 Overview Compression: finds redundancy among strings within a certain distance (window size) – Problem: window sizes are small, and similarity across a larger distance will not be identified Migratory compression (MC): coarse-grained reorganization to group similar blocks to improve compressibility – A generic pre-processing stage for standard compressors – In many cases, improve both compressibility and throughput – Effective for improving compression for archival storage © Copyright 2014 EMC Corporation. All rights reserved. 2 Background • Compression Factor (CF) = ratio of original / compressed • Throughput = original size / (de)compression time Compressor MAX Window size Techniques gzip 64 KB LZ; Huffman coding bzip2 900 KB Run-length encoding; Burrows-Wheeler Transform; Huffman coding 7z 1 GB LZ; Markov chain-based range coder © Copyright 2014 EMC Corporation. All rights reserved. 3 Background • Compression Factor (CF) = ratio of original / compressed • Throughput = original size / (de)compression time Compressor MAX Window size Techniques gzip 64 KB LZ; Huffman coding bzip2 900 KB Run-length encoding; Burrows-Wheeler Transform; Huffman coding 7z 1 GB LZ; Markov chain-based range coder © Copyright 2014 EMC Corporation. All rights reserved. 4 Background • Compression Factor (CF) = ratio of original / compressed • Throughput = original size / (de)compression time Compressor MAX Window size Techniques Example Throughput vs. CF gzip 64 KB LZ; Huffman coding 14 gzip bzip2 900 KB Run-length encoding; Burrows- 12 Wheeler Transform; Huffman coding 10 (MB/s) 7z 1 GB LZ; Markov chain-based range 8 coder Tput 6 bzip2 4 7z 2 0 Compression 2.0 2.5 3.0 3.5 4.0 4.5 5.0 Compression Factor (X) The larger the window, the better the compression but slower © Copyright 2014 EMC Corporation.
    [Show full text]