Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks

Size: px
Start display at page:

Download "Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks"

Transcription

1 Optimal Routing an Scheuling for Deterministic Delay Tolerant Networks Davi Hay Dipartimento i Elettronica olitecnico i Torino, Italy hay@tlc.polito.it aolo Giaccone Dipartimento i Elettronica olitecnico i Torino, Italy paolo.giaccone@polito.it Abstract Delay Tolerant Networks (DTNs), in which contacts between noes come an go over time, is a promising approach to moel communications in mobile a-hoc networks, where scenarios of network partitioning an noe isconnections are likely to happen. One of the most important challenges in such networks is how to route information an scheule transmissions, coping with the continuously changing network topology. In this paper, we focus on a eterministic an centralize DTN in which the contact times between noes are known in avance or can be preicte; this moel is applicable for various real-life scenarios. We provie a general framework for evising optimal routing algorithms to such networks uner ifferent objective functions an various real-life constraints (such as the available buffer an energy). The key insight is to moel the DTN as an equivalent time-inepenent graph; this allows the usage of well-known algorithms an techniques to achieve optimal results. These algorithms can be also use as approximation for less certain settings or as benchmarks to evaluate other routing algorithms. In aition, we extene our framework to eal with long-live DTNs in which contacts are perioic. Our algorithms are emonstrate by simulations, base irectly on real-life traces, showing capacity-elay traeoffs an the influence of the constraints an perioicity on the achievable throughput of the network. I. INTRODUCTION In Delay (or Disruption) Tolerant Networks (DTN), ento-en communications are not always possible on a irect routing path through the network, since the network connectivity is intermittent an at any instant the network may become partitione. Thus, routing is realize by multi-hop transmissions, exploiting spontaneous connections among the noes. The DTN moel is especially appealing in large mobile ahoc wireless networks (MANETs) that have no fixe infrastructure. In such networks, performance scalability is achieve by exploiting the mobility of the noes in orer to transmit ata in a store, carry an forwar manner [1]: ata is sent by a noe to a close-by noe, which stores it in its buffer; then, the intermeiate mobile noe carries the ata from one physical location to another an finally forwars it to its estination. This transmission paraigm is easily moele through a DTN, in which contacts between two noes appear in the DTN when the noes are physically close-by. This work was supporte by the Italian Ministry of University an Research (MIUR) through the RIN project CARTOON. The promising performance results an concise moeling have le to an extensive research on DTN uring the last few years (e.g, [2] [5]). At the core of this research line are routing an scheuling algorithms: at any given time, each noe shoul fin when an where to forwar the ata store in its buffer so that it reaches the estination in a timely manner. It is important to notice that the performance of the DTN are irectly ictate by the inter-contact times between the noes (which, in turn, are the result of the mobility pattern of the network). In particular, packet elays become comparable with these inter-contact times, implying that application running on DTNs shoul be tolerant to elays of orer of minutes/hours. rime examples in which DTN networks are use is when mobility comes for free : vehicular networks [6] (in which ata is carrie over cars an buses), pocket area networks [7] (in which ata is carrie by people carrying small evices like DAs), mixe groun/satellite networks an sensor networks. Note that the DTN moel captures also scenarios in which some noes are mobile an some noes are fixe (e.g, mobile evices with fixe gateways). This paper focuses on eterministic DTNs in which contact times are known (or can be accurately preicte) in avance. We note that this is not always the case, an we consier the problem of builing the DTN from a specific mobility pattern as orthogonal to this paper. However, in most of the contexts, the mobility, even if ranom or not perfectly known, is quite constraine in the space (like, following some specific routes, or having some spatial limitations like roas) an in the time (like, following some time scheule or some habit rule). Very recently, [8] has shown that also human mobility, consiere traitionally almost unpreictable, shows on the contrary simple an preictable time/space patterns, most of the time. In general, these spatial/temporal constraints are the key issues to consier when esigning practical DTN networks, proviing some level of performance guarantees (QoS) to the en users. Thus, investigating a eterministic DTN can serve as approximation an/or reference moel for less certain scenarios. A. Our contribution In this paper we aress the routing an scheuling problem in eterministic DTNs; namely, fining the sequence of noes on which ata shoul follow from the source to the estination,

2 an computing the contact times in which this ata shoul be transmitte. Due to the eterministic nature of our problem, we were able to evise a centralize optimization framework which computes polynomially the optimal performance of the network, in the spirit of evaluating the achievable level of QoS. When contact times are not known in avance or when centralize algorithms are not possible, our results can be consiere as a reference benchmark for performance comparison. Taking a ifferent perspective, given some QoS constraints, if our optimization framework is not able to fin a solution compatible with them, base on full contact time knowlege an complete scheuling control, it is not possible to evise any scheme to satisfy such constraints. In general, the core of our framework consists in constructing a time-inepenent graph expressing the chronological orer between contacts. Then, optimization problems are solve on this graph using classic algorithms from Graph Theory. It is important to note that previous works (e.g. [2] [5]) suggeste tailore-mae algorithms for each objective function, which works irectly on a particular time-epenent graph, a.k.a. DTN graph. Both the time an space requirements of our construction are linear in the number of contacts, thus o not introuce extra complexity on the classical algorithms. Our approach is preferable since it provies a general reuction to known problems an therefore can be easily applie to many objective functions an constraints as the nee arises. For example, we are able to moel easily the following performance costs: minimum elay (work-span), maximum banwith, minimum number of hops; in aition, we consier the following constraints: minimum banwith per flow, maximum buffer occupancy per noe, an maximum available energy per noe. Note that the last two constraints appear only for several scenarios in which DTN is usually consiere: energy is very important for DAs, cell-phones, but irrelevant for roa vehicles; on the other han, buffer sizes are not usually a constraint in wireless networks, but in some particular sensor evices it can be very small (like in imotes [9]), or in cooperative networks with selfish users, there might be some limitations on the size of the buffer evote to altruistic forwaring. Moreover, our constructions can easily moel the problem of multicasting an simultaneous source-estination flows as classical maximum multi-commoity flow an minimum Steiner tree problems. Thus, we can use the extensive research tackling these problems (an their many variants) in Graph Theory an apply it irectly on DTN. Finally, it is important to note that in this paper we eal only with atomic contacts, assuming that the contact urations are negligible with respect to the inter-contact times. This assumption is realistic in many scenarios, in which simultaneous contacts o not exist. B. revious work Routing problems in DTNs have been extensively investigate in recent years (see [5] for a reasonable set of references on these problems an other DTN-relate esign issues). In general, following the taxonomy in [10], routing algorithms can be classifie either as replication schemes, which sen many copies of the same ata packet across the network, or forwaring schemes, which sen only a single copy of each packet across the network. This paper eals with such routing algorithms an therefore in the sequel we will focus only on relevant results regaring forwaring schemes. It is important to notice that since in these schemes only a single copy is sent, their efficiency strongly relies on the knowlege of future contacts across the entire network. Seminal paper [2] has efine the routing problem in DTN an aresse many esign issues highlighting ifferent approaches base on several levels of knowlege within each noe. The original efinition of the DTN graph, base on the same assumptions as in our work, appears in [2]; as we have alreay observe, such construction is very useful to efine the routing problem, but, since it is base on a time-epenent graph, it requires the esign of a-hoc algorithms; inee, to compute the minimum elay path in the DTN graph, [2] proposes a moifie version of the Dijkstra algorithm. An alternative moeling of the routing problem was propose in [11], which efines a particular space-time graph on which the minimum elay path can be foun exploiting a classic shortest path algorithm. Specifically, the space-time graph hols a layer of the original DTN graph for each timeslot, such that two noes are connecte at some layer t if an only if there was a contact between them at time t; furthermore, copies of the same noe are connecte across layers. It is important to notice the size of the space-time graph (as well as the time it takes to run algorithms on it) epens on the overall time perio T in which the DTN is active. This results, taking the example in [11], in a weaklypolynomial all-pairs shortest-path algorithm with complexity O(n T ), where n is the number of physical noes. On the other han, our construction is linear with the number of contacts an in fact oes not introuce extra complexity to the classical (strongly-polynomial) algorithms. We note that a similar (weakly-polynomial) construction was consiere also in Graph Theory research in the context of network flows over time (a.k.a ynamic networks). Unlike the classical static network flow moel, this moel assumes flows requires preefine amount of time to traverse over an ege in the graph. As a consequence, the flow value over each ege can change over time in orer to maximize the total flow. The moel (an that construction) was first consiere by For an Fulkerson [12]; references [1], [14] provie goo surveys on the avances in this topic over the last ecaes. More recently, [] has consiere the scenario in which the mobility pattern of the noes is eterministic an perioic. As in [2], the authors compute the minimum elay (workspan) path using an extene version of Dijkstra s algorithm. Note that [] is more focuse on a novel hierarchical routing scheme, base on multilevel clustering, than on the routing algorithms. An interesting approach, extening the moel of perioic

3 mobility, has later been propose in [4], which consiers the minimum elay routing problem in the case of perioic but not eterministic mobility. Specifically, in this case each contact is characterize not only by a contact-time but also by a probability that the contact event will inee occur. The solution of the problem is obtaine using a construction that partially resembles ours. Inee, [4] starts from a probabilistic space-time graph an then buils a probabilistic space-space graph which is time-invariant; on this new graph, the optimal routing is evaluate as a solution of a Markov ecision process. Note that this construction has been propose for the minimum elay path only. Finally, [15] has consiere the same eterministic mobility of our paper an has propose some new algorithms to solve the routing problem (also in the multi-commoity flow scenario) taking into account similar constraints an performance costs as in this work. The algorithms in [15], which were erive from the algorithm in [2], run specifically on the DTN graph an their performance are not guarantee to be optimal. On the contrary, our optimization framework works on a timeinvariant graph, on which well-known algorithms are use to fin optimal solutions for the problem an all its variants. II. MODEL DEFINITIONS Let D = V, E be a elay-tolerant network multi-graph (a.k.a. DTN Graph) in which V enotes the participating noes an E enotes the time-contact eges: each ege e E has a label t(e) R + which specifies its contact time; in aition, let bw(e) R + {+ } enotes the banwith of the contact (namely, the number of bytes that can be transmitte between the noes exploiting the contact). We assume that transmissions o not overlap in time or, equivalently, that t : E R + is an injective function an that transmissions are instantaneous. In aition, we consier some resource constraints on the noes of the DTN graph: for each v V, let buf(v) R + {+ } enote the buffer size resiing at noe V an let en(v) R + {+ } be the total amount of energy (battery) available at the noe for transmissions. The goal of the DTN is to eliver a certain amount of bytes from one noe s V to another noe V. The bytes are elivere along (possibly many) paths = {p 1,... p m } between s an, which is the ecomposition of the flow on D to paths. Each path is enote by alternating sequence of noes an eges: p i = (s, e 0, v 0, e 1, v 1,..., e in 1, v in 1, e in, ). The time associate with the routing scheme is the maximum time associate with a link in one of its paths, namely t( ) = max{t(e j ) e j p i, p i }; this quantity is sometimes calle also the work-span of the routing scheme. It is important to notice that since each ege is associate with a specific time, a path p i ictates not only the routing flow of the ata but also the scheuling ecisions within each noe. We call the routing scheme of D an when it is clear from the context, with a slight abuse of notations, we also use to enote its corresponing flow. A feasible routing scheme of x bytes between s an must satisfy the following constraints: Chronological Orer: For each p an for each j {0, i n 1 }, t(e i ) t(e i+1 ). Flow Feasibility: The corresponing flow of is a legal flow on D, whose value is at least x. Buffer Constraints: Let occ(v, t, ) be the number of bytes store at noe v at time t uner routing scheme. For all v, t, occ(v, t, ) buf(v). Energy constraints: Let recv(v, ) an sent(v, ) be the number of bytes receive by noe v uner routing scheme an the number of bytes sent by noe v uner routing scheme. For every noe v, α recv(v, ) + β sent(v, ) en(v), where α an β are parameters of the problem instance. For simplicity, we normalize α an β such that α + β = 1. In aition, since is a flow, if v / {s, } then recv(v, ) = sent(v, ), thus the energy constraint can be rephrase as recv(v, ) en(v) (unless v = s or v = ). III. EVENT-DRIVEN GRAH CONSTRUCTION Our primary metho in orer to eal with problems on DTN graphs is to reuce them into time-inepenent graphs which capture the original constraints of the DTN. Then, the routing an scheuling problems on the DTN can be easily solve on these graphs, using well-known algorithms an techniques (such as augmenting path algorithms an linear programming). We first introuce the notation of an event in the DTN. In irecte DTN, a noe v V is associate with a sening event at time t if there is an outgoing contact from v at time t. Similarly, a noe u V is associate with a receiving event at time t if there is an incoming contact to u at time t. Thus, each contact in a irecte DTN will result in two events, one in its sening en an the other on the receiving en. In an unirecte DTN, each contact will result in four events, since each en can both receive an sen ata. The key concept of the construction of the time-inepenent graph is to represent each event in the system as a noe. Then, two such event-noes are connecte if either they are the sening an receiving event of the same contact (we call this type of connections inter-eges) or if both events occur on the same DTN noe an no event in that noe occurs between them (we call this type of connections intra-eges). Our construction is illustrate by a simple example in Fig. 1. We next given a formal efinition of constructing the graph for a irecte DTN; generalizing the construction for a unirecte DTN will follow. Given an irecte DTN graph D = V, E, let event-riven graph G(D) = V, E be constructe as follows: Noes: For each noe v V, let E v E be the set of eges touching noe v an efine the following set of noes V v = { v, t e E v, t = t(e)}. The set of noes in the event-riven graph is efine as V = v V V v. Furthermore, in the sequel, we say that a noe v, t belongs to a super-noe v if v, t V v.

4 D (t = 0, s bw = 10) (t = 5, bw = 4) u (t = 1, (t = 2, (t =, (t = 10, v w z bw = 5) bw = 2) bw = ) bw = 5) buf = 4 buf = buf = 5 buf = 2 buf = 7 buf = (t = 8, bw = 10) D (t, bw) u buf = bu v buf = bv G(D) u, t, 0 bw bu u, t, 1 v, t, 0 bw bv v, t, 1 bw = 10 s, 0 u, 0 v, 1 w, 2 z, bw = 5 bw = 2 bw = bw = bw = 5 bw = 2 bw = 7, 10 Fig. 2. Example of constructing event-riven graph G(D) from a elaytolerant network D with a single contact. G(D) u, 1 bw = 5 v, 2 v, 8 bw = 10 w, bw = 7 z, 8 z, 10 bw = 7 Fig. 1. Example of constructing event-riven graph G(D) from a DTN graph D. In each ege, t enotes the time of the ege, an bw its banwith. For each noe, buf enotes the buffer size. In G(D), the vertical eges are intra-noe eges, while other eges are inter-noe eges. Note that the ege (u, w) is prune. Intra-noe Eges: For each set V v V \{s, }, sort the noes in ascening orer accoring to their corresponing times; namely V v = ( v, t 0, v, t 1,... v, t l ), where t 0 t 1... t l. For each i {0,..., l 1}, a the ege ( v, t i, v, t i+1 ) banwith buf(v) to E. Inter-noe Eges: For every e = (u, v) E, if u, t(e) V an v, t(e) V, a the ege ( u, t(e), v, t(e) ) to E. The banwith of the ege is bw(e). The event-riven graph is not a time-epenent graph, so all its eges exist all the time. Furthermore, a simple optimization can prune noes of v, t V for which there is no outgoing contact from super-noe v after time t. We next exten the construction to unirecte DTN graphs. A simple approach to hanle unirecte DTN graph coul have been treating each unirecte contact ege as two antisymmetric irecte eges occurring at the same time; however, this will result in a DTN graph for which the time function t : V E is not injective as require. We take a more refine approach in which we characterize each event not only by its noe-time pair, but also by its role (namely, sening or receiving event) an treating a sening event at time t at noe v as if it occurs just before the receiving event at time t at noe v. This implies that we assume that when a noe u sens ata to a noe v, it immeiately evacuates its buffer an therefore can simultaneously receive an store the same amount of ata from v. Fig. 2 illustrates how to convert a single unirecte contact to its corresponing event-riven sub-graph; notice that each noe in the event-riven graph is represente by a triplet corresponing to the super-noe, time an role (0 for sening event an 1 for receiving event). The formal efinitions are omitte from this paper ue to space consierations. We procee by proviing the following properties of eventriven graphs: roperty 1: If D = V, E is a irecte DTN graph, then the number of noes of its corresponing event-riven graph is at most 2 E an the number of eges is boune by E. If D = V, E is unirecte DTN graph, then the number of noes is boune by 4 E an the number of eges is at most 6 E. roperty 2: For any DTN graph D (irecte or unirecte), the event riven graph G(D) is a irecte acyclic graph with maximum in-egree 2, out-egree of 2 an total-egree of. roperty : The construction of an event-riven graph G(D) from a DTN graph D = V, E takes O( E ) time an requires O( E ) space. Finally, we note that the above-mentione construction oes not eal with the energy constraints of the DTN. A iscussion on these constraints an how to incorporate them in the eventriven graph will be presente in Section IV-C. IV. ROUTING AND SCHEDULING ALGORITHMS We emonstrate how to use the event-riven graph in orer to erive routing algorithms for DTNs. The algorithms will iffer from each other in their objective function. A. Minimum Delay (Work-span) ath In this section, the goal is to fin a feasible routing scheme path with strictly positive banwith for which t( ) is minimal (that is, its last contact e has the minimal possible time value of associate with it). Since the only requirement is that the banwith will be strictly positive, it is easy to show that it is sufficient to look at routing schemes which consist on only a single path = {p}. In [2], the authors gave a tailoremae moification to Dijkstra s algorithm in orer to solve this problem irectly on DTN graph. We will take a ifferent approach an solve the problem using the event-riven graph. The path can be foun by aing a global source noe s to G(D) an connect it with all noes belonging to supernoe s. Then, by performing any graph traversal algorithm e.g., breath first search (BFS) from noe s, one can easily compute which noes are reachable from s. Let R V be the noes that are reachable from s an belongs to supernoe, an let t be the minimum time associate with noes in R. Thus, the minimum elay is t an the minimum elay path is the path from s to, t as was iscovere in the graph traversal (for example, the path from s to, t in the BFS tree). The time an space complexity of this algorithm is O( E ). Minimum elay an minimum number of hops: Sometimes, in orer to reuce the number of transmissions, it is esirable to choose, among all minimum elay paths, the one with the minimum number of hops. This can easily achieve by first

5 computing the minimum elay t, then pruning G(D) so that all eges an noes with time more than t are elete, an finally running Dijkstra s shortest path algorithm on the prune G(D) giving each inter-ege a length of 1 an each intra-ege a length of 0. B. Maximum Banwith When the goal is to fin a feasible routing scheme that maximizes the total amount of ata that can be sent from s to, one can use a maximum flow algorithm on the event-riven graph. This stems from the following theorem, showing the correlation between a feasible routing scheme on D an a flow on G(D) (proof omitte); in the sequel we will assume that there is a global source s in G(D) which is connecte with infinite banwith eges to all the noes that belongs to super-noe s an in aition there is a global sink connecte with infinite banwith eges from all the noes that belong to super-noe. Theorem 4: Assume that a DTN graph D = V, E has no energy constraints (that is, for every v V, en(v) = + ). Then, there is an s flow on G(D) = V, E with value x if an only if there is a feasible routing scheme on D with the same value x. Moreover, the routing scheme on G can be efficiently constructe from the flow on G(D). The gist of the proof is an (efficient) construction of a legal flow on G(D) from each routing scheme on D, an vice versa. Basically, the flow on the inter-eges of G(D) is equal to the amount of ata sent on the contacts of G, whereas the flow on the intra-eges of G(D) correspons to the occupancy of D s buffer in a specific time interval. Moreover, it is important to notice that since Theorem 4 provies a metho to translate a given flow on G(D) to a routing scheme in D, the following result immeiately follows: Corollary 5: By applying a maximum-flow algorithm on G(D), one can efficiently fin a routing scheme on D with the maximum value. Maximum banwith with minimum elay: In many cases, it is esirable to choose, among all routing scheme with maximum banwith, the one that occurs the minimal ento-en elay an/or the one that requires the the least possible transmissions per byte of ata. Computing maximum flows on the event-riven graph, or subgraphs of it, is very useful for solving these problems as well. For example, Algorithm 1 shows how, by computing several maximum flows, one can fin a routing scheme with maximum banwith an minimum elay. The algorithm performs a binary search on the maximum flow values of subgraphs of G(D), prune accoring to the possible en times, until the maximum flow with minimum elay is foun; the number of iterations is boune by O(log E in ) where Ein is the set of incoming contacts (in the DTN graph) to the target noe. Other extensions: In orer to fin the routing scheme with maximum banwith an minimum number of transmission per byte, one can solve the maximum flow minimum cost problem, assigning a cost of 0 to each intra-ege an a cost of 1 to each inter-ege. These two extensions can be combine noen 1 Fining the maximum banwith routing scheme with minimum elay 1: G(D) CONSTRUCT-EVENT-DRIVEN-GRAH(D) 2: f MAX-FLOW(G(D)) f is a function from the eges of G(D) to their assigne flow : x e E in f(e) E in E is the set of incoming eges in G(D) to the global sink ; hence, x is the value of (max) flow f 4: T E in 5: SORT(T ) by ascening orer of eges times 6: l 0, h T 1 7: while l h o 8: m (l + h)/2 9: G (D) RUNE(G(D)) accoring to time T [m] f (e) 10: f MAX-FLOW(G(D )), x e E in 11: if x < x then 12: l m + 1 1: else 14: min elay T [m], h m 1 15: G (D) RUNE(G(D)) accoring to time min elay 16: f MAX-FLOW(G(D )) 17: CONSTRUCT-ROUTING-SCHEME-FROM-FLOW(f ) 18: return in orer to choose among the routing scheme with maximum banwith an minimum elay the one with minimum number of transmission per byte: we first apply Algorithm 1 to fin the minimum elay, then prune the graph accoringly an apply the maximum flow minimum cost algorithm. Alternatively, if the contact banwiths are integral (an therefore the flow is integral as well) one can scale the cost of the eges of E in accoring to their times, so that each minimum cost solution will immeiately yiel minimum elay; in this case the cost that shoul be assigne to inter-ege correspons to e E in is t(e) n x where n is the number of inter-eges in G(D) an x is the maximum flow on G(D). Another simple extension to the following algorithms is to fin routing schemes that achieve a certain banwith eman y, with minimum elay, minimum number of transmissions (hops), or both. This can be one, for example, by replacing the comparison in Line 11 of Algorithm 1 to be with y instea of x. Finally, when there are ifferent sources that shoul sen ata to ifferent estinations along the DTN, the problem can be moele as a multi-commoity flow problem on the corresponing event-riven graph. It is well-known that this problem can be solve using linear programming (in case fractional flows are allowe); many other results on this problem an its many variants exist in literature an can be irectly applie in this case as well (c.f. [16], [17] for more comprehensive surveys). In aition, one may use our construction to moel multicast scenarios in DTN (that is, when a single source shoul sen ata to many estinations) an tackle them using off-the-shelf algorithms available on time-inepenent networks (e.g. approximation algorithms for the minimum Steiner tree problem).

6 (t = 0, bw = 5) t = s u t = 1 v t = 4 (t = 2, bw = ) t = 5 s s, 0 5 Energy: 7 u, 0 v, 1 Fig.. Example of using a noe u as a transient buffer for another noe v. The banwith bw of all contact is unless otherwise specifie. s, 2 u, 1 v, 4 C. Dealing with Energy Constraints In this section we introuce the energy constraints on noes of the DTN graph D an iscuss how to evise algorithms taking into account these constraints as well. Recall that since each intermeiate noe (that is, a noe other than s an ) forwars all the ata it gets, the energy constraint translates to the amount of ata a noe receives over the entire time span. A key phenomenon, which makes hanling energy constraints more ifficult, is the usage of noes as transient buffers, such that the flow of ata may form cycles on the DTN graph (but never on the event riven graph). These cycles, in turn, yiel that, in orer to transmit x bytes from s an that go y times through super-noe v (i.e. in y cycles), the amount of energy neee at super noe v is x y. For comparison, in a (traitional) max-flow problem there is no incentive to employ cycles in the graph, an therefore such a problem oes not exist. Fig. epicts a scenario in which such a phenomenon happens: suppose that all noes but u o not have any buffer or energy constraints, an, on the other han, buf(u) = an en(u) = 7; furthermore enote by e i the contact for which t(e i ) = i. We first compute the maximum banwith routing scheme without taking into account the energy constraints: the resulting scheme is = {p 1, p 2 } of total banwith 6, where p 1 = (s, e 0, u, e 1, v, e 4, u, e 5, ) of banwith an p 2 = (s, e 2, u, e, ) of banwith. Note that p 1 contains a cycle (u is visite twice), an in fact noe v was use as a transient buffer for the ata of p 1 between time 1 an. The total amount of energy spent at noe u is 9, thus exceeing en(u). To correct this one shoul ecrease the banwith that goes through u; since each byte along p 1 is counte twice, it is sufficient to reuce the banwith of p 1 to 2, resulting in total banwith of 5. Going back to the event-riven graph G(D), recall that the energy constraints were not realize in its construction. The reason behin this is that energy is counte over the entire time span an not only between events; thus, it is common to all noes that belongs the same super-noe, as illustrate in Fig. 4. Unlike Section IV-B, where we apply combinatorial algorithms to solve maximum-flow relate problems, here we formalize the problem on the event-riven graph as a linear program. It is important to notice that since the resulting flow nee not be integral, solving the linear program yiels an efficient algorithm to fin the maximum flow. For example, the following linear program escribes the problem of fining a maximum flow on the graph, respecting both the buffer an energy constraints: u, 2 u, u, 4 u, 5 Fig. 4. The event-riven graph of the DTN epicte in Fig.. Non-labele eges have infinite banwith.,, 5 maximize f s such that f e bw(e) e E j:(j,i) E f ji j:(i,j) E f ij 0 i V k V v j:(j,k) E f jk I jk en(v) v V where I jk is an 0 1 inicator variable that equals 1 if an only if (j, k) is an inter-ege. Note that the ual of this program is e E bw(e) e + v V en(v)rv minimize such that ij p i + p j + r v(j) I ij 0 (i, j) E p p t 1 e, r v 0 where v(j) is the super-noe v V that the noe j V belongs to. It is important to notice that unlike a traitional MAXIMUM FLOW problem, the solution of the ual problem is not necessarily integral, implying that a max-flow min-cut theorem is unlikely to hol. In fact, the example epicte in Fig. shows also that a simple augmentation-path base algorithm cannot solve this problem, since one can first choose p 1 with banwith without violating the constraints. V. ERIODIC DTN In some cases the DTN graph escribes a perioic pattern of contact between the noes. Specifically, suppose the DTN perio length is given by τ > max e E t(e), then if a contact between some noe u an another noe v has time t(e), it implies that u can sen ata to v at times t(e) + kτ for any k N. Moreover, since the system is now long-live, we treat the energy constraints as the energy that can be spent by a noe over one perio. We focus on a maximum banwith problems where the goal is to eliver as much ata as possible per perio. Since we measure the banwith per perio, one can mistakenly assume that the problem can be solve by looking only on a single perio; however, as the example epicte in Fig. 5 shows, this is not the case: when looking on a single-perio

7 s t = 4 u t = v Fig. 5. Example of a perioic DTN which can eliver banwith of 1, while uring a single perio the DTN cannot eliver any ata. The banwith of all contact bw = 1. DTN, it is clear that no ata can be transferre from the source to the estination, however for a perioic DTN the amount of banwith per perio goes to 1 as ata is sent over the links at times kτ +4, (k +1)τ +, (k +2)τ +2, (k +)τ +1 for any perio k N. This scenario somehow resembles the pipeline paraigm. Therefore, we moel the problem by assuming a perioic routing scheme, which treats traffic transmitte from source s at time kτ + t as the traffic transmitte at time t. Then, we can solve the maximum banwith per perio problem by looking only on the traffic transmitte from the source at the first perio, while respecting the following aitional constraints: let e be a contact, an let f(e, t, ) be the flow assigne to contact e at time t uner routing scheme. Thus, k=0 f(e, t(e) + kτ, ) bw(e); namely, the total amount of flow on a contact over all perios oes not excee its banwith. recall that occ(v, t, ) is the number of bytes store at noe v at time t uner routing scheme. Thus, we require for all v V an t < τ, k=0 occ(v, t + kτ, ) buf(v). let recv(v, k, ) to be the number of bytes receive by noe v uring perio k uner routing scheme. Thus, we require for all v V that, k=0 recv(v, k, ) en(v). Hence, perioic DTN graph can be conceptually reuce to a cyclic event-riven graph G(D) = V, E in which for each super-noe v V there is an extra ege of banwith buf(v) connecting the last noe (orere by time) of V v with the first noe of V v. Running a maximum-flow algorithm on this event-riven graph will give the maximum banwith per perio that can achieve. Moreover, given the maximum flow f, one can construct a routing scheme (using some path splitting algorithm) an compute the corresponing elay of by counting the number of extra eges in each path. Let k max be the maximum number of perios neee to complete any path in (that is, the number of extra eges in the path plus one). It is important to notice that k max τ is only an upper boun on the minimum elay neee to achieve the maximum banwith. In fact, computing the routing scheme with minimum banwith an maximum elay is more complicate in case the DTN is perioic. This is one by consiering an eventriven graph G(D) = Ṽ, Ẽ which hols k max copies of the original event-riven graph G(D) = V, E. Noes corresponing to super-noe s appears in G(D) only in the first copy (implying that we consier only traffic transmitte from the source at the first perio) an the last noe (orere by time) of some super-noe v at k-th copy is connecte by t = 2 w t = 1 an intra-ege of banwith buf(v) to the first noe of v at k +1-th copy; the set of all newly-ae eges between copies k an k + 1 is enote by E k,k+1. Furthermore, let the set of all noes that belongs to super noe v V in the k-th copy be Ṽ v,k, while the set of all k max copies of an ege e E E 0,1 is enote by Ẽe. Finally, we assume that the global source noe s is connecte to all noes that belongs to super noe s while the global sink noe is connecte to all noes that belongs to super noe in all k max copies. The aitional constraints of the perioic DTN can then be realize by aing the corresponing linear inequality constraints, resulting in the following linear program that compute the maximum-flow on G(D): maximize f s such that ẽ Ẽe fẽ bw(e) e E E 0,1 j:(j,i) Ẽ fji j:(i,j) Ẽ fij 0 i Ṽ fjiiji en(v) v V kmax k=0 i Ṽv,k j:(j,i) Ẽ where I ji is an 0 1 inicator variable that equals 1 if an only if (j, i) is an inter-ege. Finally, this proceure can be plugge into Algorithm 1, thus computing the maximum flow with minimum elay. VI. EXERIMENTAL RESULTS Many experimental traces, publicly available in [18], store the contacts observe in ifferent mobility scenarios (like, public transportation systems, humans); they allow to buil irectly the DTN graph, which is the input of our optimization framework. For lack of space, we have chosen to show just some results referre to the mobility of a set of 7 buses running routes for 16 weeks in the UMass campus []. These buses operate aily as ictate by their time scheules but also by their failures an maintenance stops. The trace provies basically the sequence of all the contacts in the following format: time, source bus, estination bus, capacity of the contact (measure in bytes). We have consiere just the contacts referre to the thir week of the experiment. We have run the optimal algorithm to maximize the banwith in a ata flow between two given buses. Fig. 6 shows the curves of the minimum elay necessary to transfer a given amount of ata for two cases, corresponing to two specific pairs of source an estination buses (similar results were observe for all the other possible pairs). Both curves are step functions. Inee, assume that, for a specific value of banwith x an elay y, the last contact in the routing (with contact time y) has not been yet completely saturate. When x increases, then the elay remains the same until the banwith of the last contact is fully exploite. At that point, the elay jumps to the time of the next contact exploite. The graph can be seen also as the representation of the capacity-elay region achievable in the two cases. Inee, there is no algorithm that is able to achieve any point below an to the right of each curve, since the routing an scheuling scheme are optimal from both the capacity an the elay

8 Delay [hours] Bus pair Bus pair Bus pair region Bus pair region Capacity [Mbytes] Fig. 6. Minimum elay for two specific pairs of buses. Curves efine also the optimal elay-capacity regions for the two cases. Capacity [Mbytes] Buffer constraine - perioic Energy constraine - perioic Buffer constraine Energy constraine Energy or Buffer [Mbytes] Fig. 7. Maximum banwith achievable for the bus pair as function of the buffer an energy available at each bus point of view. Note that this region shows some performance limitations of the DTN consiere in the experiment; this is coherent with previous work [15] an ue to the fact that time scheule for public transportation is inherently esigne to reuce contacts among the buses. Fig. 7 consiers only the ata flowing from bus 046 to 041, an shows the effect of the constraints on the resources, i.e. the energy an the buffer available at each noe; for simplicity, we assume an homogeneous network in which all the noes share the same amount of buffer an have the same amount of energy available (measure as the maximum number of bytes that can be transmitte by a noe other than the source). As expecte, capacity is a monotonic function of the energy an the buffer, an its maximum value (80 Mbytes, coherently with Fig. 6) is obtaine for sufficiently large energy an buffer. In aition, the constraint on the energy tens to affect more severely the performance, since the buffer, as a resource, can be re-utilize in ifferent times, whereas the energy can be exploite only once. When the buffer is very small, the routing is so constraine that the buffer tens to be exploite just once an the effects of the energy an the buffer are equivalent. Furthermore, Fig. 7 shows the effect of consiering perioic DTNs. The qualitatively behavior is similar as before. erioic DTNs cannot benefit from small value of resources, especially from small values of energy, which can be exploite only once. Larger values of resources allow to achieve larger capacity, an the maximum possible capacity correspons, in the original DTN graph, to the minimum between the cut aroun the source noe an the cut aroun the estination noe. The capacity gain by consiering perioic DTNs is more than 50% for buffer/energy larger than 1 Mbytes, an reaches 122% when resources are unboune. VII. CONCLUSIONS We have propose an optimization framework to fin the optimal routing for eterministic DTNs. Our novel approach is very general an base on a construction of an eventriven graph from the classical DTN graph; this allows us to exploit stanar algorithms from Graph Theory. We have emonstrate our approach by showing solutions to ifferent cost functions (maximum banwith, minimum elay) an constraints (maximum buffer an energy per noe). We have also iscusse some numerical results referring to a real mobile network, whose DTN graph is known through traces. REFERENCES [1] M. Grossglauser an D. Tse, Mobility increases the capacity of a hoc wireless networks, IEEE/ACM Trans. Netw., vol. 10, no. 4, pp , [2] S. Jain, K. R. Fall, an R. K. atra, Routing in a elay tolerant network, in ACM SIGCOMM, 2004, pp [] C. Liu an J. Wu, Scalable routing in elay tolerant networks, in ACM MobiHoc, 2007, pp [4], Routing in a cyclic mobispace, in ACM MobiHoc, 2008, pp [5] Delay tolerant networking research group. [Online]. Available: [6] J. Burgess, B. Gallagher, D. Jensen, an B. N. Levine, Maxprop: Routing for vehicle-base isruption-tolerant networks, in INFOCOM, [7]. Hui, A. Chaintreau, J. Scott, R. Gass, J. Crowcroft, an C. Diot, ocket switche networks an human mobility in conference environments, in ACM WDTN, 2005, pp [8] M. C. Gonzalez, C. A. Hialgo, an A.-L. Barabasi, Unerstaning iniviual human mobility patterns, Nature, vol. 45, no. 7196, pp , [9] Crossbow technology, inc. [Online]. Available: [10] A. Balasubramani, B. N. Levine, an A. Venkataramani, DTN Routing as a Resource Allocation roblem, in ACM SIGCOMM, [11] S. Merugu, M. Ammar, an E. Zegura, Routing in space an time in networks with preictable mobility, Georgia Institute of Technology, Tech. Rep., [12] L. R. For an D. R. Fulkerson, Constructing maximal ynamic flow from static flows, Operation Research, vol. 6, pp , [1] B. Hoppe, Efficient ynamic network flow algorithms, h.d. issertation, Cornell University, [14] M. Skutella, An introuction to network flows over time, in Research Trens in Combinatorial Optimization. Springer, 2008, pp [15] A. Di Nicolò an. Giaccone, erformance limits of real elay tolerant networks, in IEEE WONS, 2008, pp [16] B. Awerbuch an F. T. Leighton, Multicommoity flows: A survey of recent research, in ISAAC, 199, pp [17] G. Karakostas, Faster approximation schemes for fractional multicommoity flow problems, in ACM-SIAM SODA, 2002, pp [18] Crawa repository. [Online]. Available: eu

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,

More information

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:

More information

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks Hinawi Publishing Corporation International Journal of Distribute Sensor Networks Volume 2014, Article ID 936379, 17 pages http://x.oi.org/10.1155/2014/936379 Research Article REALFLOW: Reliable Real-Time

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

2-connected graphs with small 2-connected dominating sets

2-connected graphs with small 2-connected dominating sets 2-connecte graphs with small 2-connecte ominating sets Yair Caro, Raphael Yuster 1 Department of Mathematics, University of Haifa at Oranim, Tivon 36006, Israel Abstract Let G be a 2-connecte graph. A

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

d 3 d 4 d d d d d d d d d d d 1 d d d d d d

d 3 d 4 d d d d d d d d d d d 1 d d d d d d Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stolyar Abstract Backpressure-base aaptive routing

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

Optimal Oblivious Path Selection on the Mesh

Optimal Oblivious Path Selection on the Mesh Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract

More information

Pairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11:

Pairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11: airwise alignment using shortest path algorithms, Gunnar Klau, November 9,, : 3 3 airwise alignment using shortest path algorithms e will iscuss: it graph Dijkstra s algorithm algorithm (GDU) 3. References

More information

Supporting Fully Adaptive Routing in InfiniBand Networks

Supporting Fully Adaptive Routing in InfiniBand Networks XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stoylar arxiv:15.4984v1 [cs.ni] 27 May 21 Abstract

More information

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao

More information

Ad-Hoc Networks Beyond Unit Disk Graphs

Ad-Hoc Networks Beyond Unit Disk Graphs A-Hoc Networks Beyon Unit Disk Graphs Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 8092 Zurich, Switzerlan {kuhn, wattenhofer, zollinger}@inf.ethz.ch ABSTRACT

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information

A Hybrid Routing Algorithm for Delay Tolerant Networks

A Hybrid Routing Algorithm for Delay Tolerant Networks Sensors & Transucers 2013 by IFSA http://www.sensorsportal.com A Hybri Routing Algorithm for Delay Tolerant Networs Jianbo LI, Jixing XU, Lei YOU, Chenqu DAI, Jieheng WU Information Engineering College

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpenCourseWare http://ocw.mit.eu 6.854J / 18.415J Avance Algorithms Fall 2008 For inormation about citing these materials or our Terms o Use, visit: http://ocw.mit.eu/terms. 18.415/6.854 Avance Algorithms

More information

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita

More information

PAPER. 1. Introduction

PAPER. 1. Introduction IEICE TRANS. COMMUN., VOL. E9x-B, No.8 AUGUST 2010 PAPER Integrating Overlay Protocols for Proviing Autonomic Services in Mobile A-hoc Networks Panagiotis Gouvas, IEICE Stuent member, Anastasios Zafeiropoulos,,

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations

More information

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Secure Network Coding for Distributed Secret Sharing with Low Communication Cost

Secure Network Coding for Distributed Secret Sharing with Low Communication Cost Secure Network Coing for Distribute Secret Sharing with Low Communication Cost Nihar B. Shah, K. V. Rashmi an Kannan Ramchanran, Fellow, IEEE Abstract Shamir s (n,k) threshol secret sharing is an important

More information

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

A Joint Replication-Migration-based Routing in Delay Tolerant Networks A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West

More information

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member

More information

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,

More information

Compact Routing on Internet-Like Graphs

Compact Routing on Internet-Like Graphs Compact Routing on Internet-Like Graphs Dmitri Krioukov Email: ima@krioukov.net Kevin Fall Intel Research, Berkeley Email: kfall@intel-research.net Xiaowei Yang Massachusetts Institute of Technology Email:

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks Coorinating Distribute Algorithms for Feature Extraction Offloaing in Multi-Camera Visual Sensor Networks Emil Eriksson, György Dán, Viktoria Foor School of Electrical Engineering, KTH Royal Institute

More information

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle

More information

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter FDL sel. VOA SOA 100 Regular papers ONDM 2018 Scalable Deterministic Scheuling for WDM Slot Switching Xhaul with Zero-Jitter Bogan Uscumlic 1, Dominique Chiaroni 1, Brice Leclerc 1, Thierry Zami 2, Annie

More information

Performance Modelling of Necklace Hypercubes

Performance Modelling of Necklace Hypercubes erformance Moelling of ecklace ypercubes. Meraji,,. arbazi-aza,, A. atooghy, IM chool of Computer cience & harif University of Technology, Tehran, Iran {meraji, patooghy}@ce.sharif.eu, aza@ipm.ir a Abstract

More information

Optimal Distributed P2P Streaming under Node Degree Bounds

Optimal Distributed P2P Streaming under Node Degree Bounds Optimal Distribute P2P Streaming uner Noe Degree Bouns Shaoquan Zhang, Ziyu Shao, Minghua Chen, an Libin Jiang Department of Information Engineering, The Chinese University of Hong Kong Department of EECS,

More information

A Metric for Routing in Delay-Sensitive Wireless Sensor Networks

A Metric for Routing in Delay-Sensitive Wireless Sensor Networks A Metric for Routing in Delay-Sensitive Wireless Sensor Networks Zhen Jiang Jie Wu Risa Ito Dept. of Computer Sci. Dept. of Computer & Info. Sciences Dept. of Computer Sci. West Chester University Temple

More information

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly

More information

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance International Journal of Moern Communication Technologies & Research (IJMCTR) Impact of FTP Application file size an TCP Variants on MANET Protocols Performance Abelmuti Ahme Abbasher Ali, Dr.Amin Babkir

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

PART 2. Organization Of An Operating System

PART 2. Organization Of An Operating System PART 2 Organization Of An Operating System CS 503 - PART 2 1 2010 Services An OS Supplies Support for concurrent execution Facilities for process synchronization Inter-process communication mechanisms

More information

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember 107 IEICE TRANS INF & SYST, VOLE88 D, NO5 MAY 005 LETTER An Improve Neighbor Selection Algorithm in Collaborative Filtering Taek-Hun KIM a), Stuent Member an Sung-Bong YANG b), Nonmember SUMMARY Nowaays,

More information

NAND flash memory is widely used as a storage

NAND flash memory is widely used as a storage 1 : Buffer-Aware Garbage Collection for Flash-Base Storage Systems Sungjin Lee, Dongkun Shin Member, IEEE, an Jihong Kim Member, IEEE Abstract NAND flash-base storage evice is becoming a viable storage

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Politecnico i Torino Porto Institutional Repository [Proceeing] Automatic March tests generation for multi-port SRAMs Original Citation: Benso A., Bosio A., i Carlo S., i Natale G., Prinetto P. (26). Automatic

More information

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times Algorithm for Intermoal Optimal Multiestination Tour with Dynamic Travel Times Neema Nassir, Alireza Khani, Mark Hickman, an Hyunsoo Noh This paper presents an efficient algorithm that fins the intermoal

More information

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural

More information

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.

More information

Design of Policy-Aware Differentially Private Algorithms

Design of Policy-Aware Differentially Private Algorithms Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

Characterizing Decoding Robustness under Parametric Channel Uncertainty

Characterizing Decoding Robustness under Parametric Channel Uncertainty Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric

More information

A Stochastic Process on the Hypercube with Applications to Peer to Peer Networks

A Stochastic Process on the Hypercube with Applications to Peer to Peer Networks A Stochastic Process on the Hypercube with Applications to Peer to Peer Networs [Extene Abstract] Micah Aler Department of Computer Science, University of Massachusetts, Amherst, MA 0003 460, USA micah@cs.umass.eu

More information

Reformulation and Solution Algorithms for Absolute and Percentile Robust Shortest Path Problems

Reformulation and Solution Algorithms for Absolute and Percentile Robust Shortest Path Problems > REPLACE THIS LINE WITH YOUR PAPER IENTIFICATION NUMBER (OUBLE-CLICK HERE TO EIT) < 1 Reformulation an Solution Algorithms for Absolute an Percentile Robust Shortest Path Problems Xuesong Zhou, Member,

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

A Plane Tracker for AEC-automation Applications

A Plane Tracker for AEC-automation Applications A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach Nishi Sharma, Vanna Verma Abstract Wireless sensor networks (WSNs) is one of the emerging fiel of research in recent era

More information

Additional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication

Additional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Aitional Divie an Conquer Algorithms Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Divie an Conquer Closest Pair Let s revisit the closest pair problem. Last

More information

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:

More information

Table-based division by small integer constants

Table-based division by small integer constants Table-base ivision by small integer constants Florent e Dinechin, Laurent-Stéphane Diier LIP, Université e Lyon (ENS-Lyon/CNRS/INRIA/UCBL) 46, allée Italie, 69364 Lyon Ceex 07 Florent.e.Dinechin@ens-lyon.fr

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus

More information

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients Probabilistic Meium Access Control for 1 Full-Duplex Networks with Half-Duplex Clients arxiv:1608.08729v1 [cs.ni] 31 Aug 2016 Shih-Ying Chen, Ting-Feng Huang, Kate Ching-Ju Lin, Member, IEEE, Y.-W. Peter

More information

Optimizing the quality of scalable video streams on P2P Networks

Optimizing the quality of scalable video streams on P2P Networks Optimizing the quality of scalable vieo streams on PP Networks Paper #7 ASTRACT The volume of multimeia ata, incluing vieo, serve through Peer-to-Peer (PP) networks is growing rapily Unfortunately, high

More information

Change Patterns and Change Support Features in Process-Aware Information Systems

Change Patterns and Change Support Features in Process-Aware Information Systems hange Patterns an hange Support eatures in -Aware Information Systems arbara Weber 1,, Stefanie Rinerle 2, an Manfre Reichert 3 1 Quality ngineering Research Group, University of Innsbruck, Austria arbara.weber@uibk.ac.at

More information

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network

Elimination Of Redundant Data using user Centric Data in Delay Tolerant Network IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 9 February 2015 ISSN (online): 2349-6010 Elimination Of Redundant Data using user Centric Data in Delay Tolerant

More information

Routing in Large-Scale Buses Ad Hoc Networks

Routing in Large-Scale Buses Ad Hoc Networks 1 Routing in Large-Scale Buses Ad Hoc Networks Michel Sede, Xu Li *, Da Li *, Min-You Wu * Laboratory for Computer Communications and Applications, EPFL, Switzerland * Department of Computer Science and

More information

Routing and quality of service support for mobile ad hoc networks

Routing and quality of service support for mobile ad hoc networks Computer Networks 51 (2007) 3142 3156 www.elsevier.com/locate/comnet Routing an quality of service support for mobile a hoc networks Anelise Munaretto a,c, *, Mauro Fonseca b,c a CPGEI/UTFPR, Programa

More information

6 Gradient Descent. 6.1 Functions

6 Gradient Descent. 6.1 Functions 6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output

More information