Network Coding in Wireless Networks with Random Access

Size: px
Start display at page:

Download "Network Coding in Wireless Networks with Random Access"

Transcription

1 ISIT2007, Nie, Frane, June 24 - June 29, 200O Network Coding in Wireless Networks with Random Aess Danail Traskovt, Desmond S. Lun, Ralf Koettert, and Muriel Medardt Broad Institute MIT and Harvard Cambridge, MA dlun@broad.mit.edu tcoordinated Siene Laboratory University of Illinois at Urbana-Champaign Urbana, IL {traskov2, koetter}@uiu.edu +LIDS MIT Cambridge, MA medard@mit.edu Abstrat- We onsider the problem of applying network oding in wireless networks with random medium aess. To optimize the network oding subgraph and the transmission attempt probabilities jointly is a tratable problem only for rather small networks. Therefore, we suggest a suboptimal, yet pratial and deentralized algorithm to ombine network oding with random aess. We illustrate the performane gains of our approah with simulations. I. INTRODUCTION The problem we onsider is to establish a set of multiast or uniast onnetions in a wireless network using network oding. The utility of network oding in suh a setup has been demonstrated e.g. in [1], [2]. There, the authors develop a mathematial framework for omputing a network oding subgraph that an support the desired onnetions and provide simulation results showing signifiant advantages of a network oded approah. As they point out, to inlude the interferene onstraints of the wireless network in the optimization model may pose quite a hallenge. In fat, it is the struture of the medium aess onstraints of the network that essentially determines the diffiulty of the resulting optimization problem. Coneptually, one an view the overall problem, of establishing a set of onnetions in a wireless network with interferene, as two oupled subproblems. Resoure provision (or sheduling) deals with the supply of network resoures suh as interferene-free sets of links, whereas the onern of resoure alloation is how to assign the available resoures to different users. For resoure provision one an onsider a sheduled approah whih effetively eliminates interferene or, on the other hand, an ALOHA-like random medium aess mehanism. For the resoure alloation problem possible hoies are routing as opposed to network oding. The authors in [1], [2] fous on the resoure alloation aspet, assuming that nodes in the network do not experiene interferene. The wireless network is regarded as essentially interferene free, due to an underlying shedule. However, to bring network oding one step loser to pratial implementation, it is neessary to investigate the interplay between these by no means independent problems. The fous of our work is to ombine the network oding subgraph optimization with the resoure provision aspet of the overall problem. This work was supported by the Control-Based Mobile Ad-Ho Networking (CBMANET) Program under DARPA subontrat no , by the National Siene Foundation under grant no. CCR , and by AFOSR. The authors would like to thank R. Srikant his valuable input /07/$25.00 (.)2007 IEEE 2726 The joint resoure provision and alloation strategy we will investigate is random, linear, intra-session network oding ombined with a slotted-aloha random medium aess sheme. To be more preise, network oding takes plae only within the set of pakets of a partiular user (i.e. intra-session) and is applied by forming linear ombinations of pakets with random oeffiients at intermediate nodes of the subgraph. This sheme is easy to implement, it ahieves the apaity for a single onnetion [3], and has a simple flow optimization formulation [4]. Given multiple onnetions, it is reasonable to ask why we restrit ourselves from using network oding ombining pakets of different users (i.e. inter-session). There exists a variety of tehniques for inter-session network oding, suh as [5]-[8], but these are quite omplex and therefore signifiantly further down the road of pratial implementation. In ontrast COPE [9] is a pratial and suessfully implemented network oding protool. However, our fous is on developing mathematial models in terms of optimization of flows and the opportunisti and heuristi nature of COPE is diffiult to apture in suh a framework. Although we use solely intrasession network oding, it is important to keep in mind that, in general, inter-session network oding is neessary to approah the apaity of the network and it is reasonable to expet further gains by applying inter-session oding. At the medium aess layer of the network, we use a random slotted-aloha-like mehanism. The network is assumed to operate in time slots and, for every slot, a node is assigned some transmission attempt probability. We assume that in every time slot nodes deide to transmit with these fixed probabilities but otherwise independently of eah other. Random aess is an important medium aess tehnique used in various appliations (see e.g. [10]). One main advantage lies in the simpliity, sine just deiding, whether a vetor of link flows an be supported by a ollision-free transmission shedule is an NP-omplete problem [11]. Furthermore, if nodes are assumed to be mobile, frequent hanges in the network topology have to be taken into aount and a low-omplexity random aess approah is expeted to ope better with the updates due to mobility. Furthermore, our subgraph seletion proedure an be ombined with a sheduled approah in a fairly straightforward fashion. The problem of ross-layer network oding and random aess is also treated in [12], [13]. As it turns out, the problem of finding an optimal network oding subgraph subjet to the random aess interferene onstraints is too diffiult to be tratable in pratial networks

2 'v ISIT2007, Nie, Frane, June 24 - June 29, 2007 Fig. 1. An example of a hypergraph. Here, the node set is JA and the hyperar set is A = {(1, {2, 3}), (2, 3)}. of moderate size. This is largely due to the non-onvexity of the medium aess rate region. Furthermore, in [14], [15] the authors have looked at the problem of ommuniating in multiple aess networks from an information theoreti perspetive and reah similar onlusions regarding the diffiulty of the general problem. We therefore suggest a relaxation of the original problem, whih is suboptimal, yet pratially implementable. Our algorithm an be arried out in a distributed fashion, a highly desirable property in pratial networks, and therefore an serve as the baseline of a protool. The remainder of this paper is organized as follows: In Setion II, we introdue the wireless network model and the network oding sheme. In Setion III, we formulate the joint network oding and random aess problem and disuss its omplexity. Setion IV suggests a relaxation of this problem ombined with an iterative proedure to verify feasibility and assign transmission attempt probabilities. In Setion V, we evaluate the performane gains of our algorithm by means of simulations. Setion VI onludes the paper. II. NETWORK MODEL The wireless network (following the model from [4]) is represented by a hypergraph X = (JV, A), where AV stands for the set of nodes and A is the set of hyperars. A hyperar, our approah to model a broadast hannel, is a pair (i, J), where i is a node and J is a nonempty subset of the node set AV. An example of a hypergraph is depited in Fig. 1. If node i injets a paket on hyperar J it is reeived by some subset K C J, possibly K being the empty set 0. Let Ai (T) be the ounting proess desribing paket injetions on hyperar J and AiJK (T) be the ounting proesses aounting for the pakets reeived preisely by the subsets K. Obviously, we have EKCJ AiJK(T) = Aij(T). We assume that for the injetion proesses time averages exist, i.e. limt"q Ai(T) exists with probability 1, is finite, and equals Zij. Similarly, we define limto AiJK(T) = ZiJK- With these assumptions T Zij = EKCJ ZiJK is the average paket injetion rate on hyperar J. In the remainder of the paper we will assume that ZiJK is proportional to zij and define ZiJK PiJK ZiJ to be the probability that a paket injeted on J is reeived preisely by the subset K. We all the rate vetor (ZiJ)(i,J)C, the network oding subgraph. One the subgraph is omputed our network oding tehnique of hoie will be the well known random network oding [3], [4], some more pratial aspets of whih an be found in [16]. Roughly, that means that a node stores reeived paket 2727 in its memory and upon an opportunity transmits a linear ombination of the stored pakets with oeffiients drawn uniformly from a finite field. Coding is restrited to pakets belonging to the same user (intra-session). {1, 2, 3} III. THE JOINT NETWORK CODING AND RANDOM ACCESS OPTIMIZATION PROBLEM We onsider C multiast sessions, where a multiast session (s, T, R), C 1,... C is haraterized by its soure s, its destination set TC C AV and rate R. Every node t e TC reeives information at the ommon rate R. We seek a network oding subgraph that is able to support these requirements and that is subjet to the multiple aess onstraints of the network. This an be formulated as an optimization problem and translates into the following onstraint set [4] vjkijca J I(i,J)EE,4 E ii < zij, V (i, J) C A, (2) S t'j) < Yij ijk, jek V (i,j) A, K J, tct, C= 1,...,C, v(t,) jeej where we define iaj\f\t}, t Z j (t,) (RC {jt,ia E 1- i (i,i)ea,igi11 0 C T,v = I,...,C, SCj >, 0, V (i, J) C A, j C J, (zij) C Z, V (i, J) C A, (3) t = SC, i = t, else, (4) (5) (6) bijk E PiJL- {LCJILnK 0} Here, bijk stands for the probability that a paket injeted on hyperar (i, J) is reeived by at least one node in K. As disussed Zij is the paket injetion rate on hyperar is the rate alloated for multiast session on (i, J), and y() ths ypra.th vribl (t,) this hyperar. The variable xij node i, the soure of a hyperar, to a node j e J in the destination set of the hyperar. We will therefore, slightly abusing terminology, refer to a variable of this type as a link flow. Constraint (3) defines the feasible rate region of link flow alloations for a hyperar (i, J). Constraints (2)-(5) represents the flow between relate the network oding subgraph (zij) and the link flows (t,) xij. The network oding subgraph is restrited within some onstraint set Z whih is ditated by the medium aess layer of the network. It is the struture of this set that essentially determines the diffiulty of the optimization problem.1 We onsider a random aess mehanism, where in every time slot a node makes a transmission attempt determined by a Bernoulli random variable. Nodes make the transmission 'As we will show in the next setion the onstraints (2)-(5) alone if ombined with a onvex ost funtion define a fairly tratable onvex optimization problem.

3 ISIT2007, Nie, Frane, June 24 - June 29, 200O deisions independent of eah other with the same probability over different slots. We assume that the time granularity of the system is suffiiently high and do not use a bakoff mehanism, suh as binary exponential bakoff. We make no assumptions on the statistial properties of the traffi in the network exept that average rates exist. This is without loss of generality, sine in [17] it is shown that bursty traffi does not derease the apaity region of the multiple aess hannel. To formulate the onstraint set under a random medium aess poliy, let qijj be the probability that node i plaes a paket on hyperar J whih is intended to be reeived by node j e J. In the following we will make the assumption that every node has preisely one outgoing hyperar, whih is not a major restrition and serves mainly to streamline notation. We will therefore write qij suppressing the hyperar index. Let Qi = Eqij (7) jcj be the probability that node i transmits in a slot. If node i transmits a paket on its outgoing hyperar J then it will be reeived by node j C J if and only if 1) it is not lost due to an erasure, 2) node j is not transmitting itself, and 3) none of the nodes with outgoing hyperars ontaining j transmit. As a onsequene of this interferene model for every hyperar (i, J) the link throughputs fij, for all (i,j), j, must be smaller than the apaity where the maximum is taken over the link flows required to serve the different sinks of one multiast session and the summation implies that the traffi demands due to different multiast sessions ontribute additively to the overall network flow2. This is due to the fat that we ode only within one session and different multiast onnetions share the network without network oding ooperation aross them. The medium aess onstraint (6) thus beomes C S maxxt') < q. (I QH)II (1 kgkj\i -Qk) This is an intriguing losed form expression for the problem of jointly seleting a network oding subgraph and assigning optimal transmission attempt probabilities. Unfortunately, it is very diffiult to solve for general networks exept for very small ones. This is due to the non-onvexity of the 2Stritly speaking, (9) as it stands holds in the ase where the network does not experiene erasures. However, to take these into aount is straightforward as we merely have to sale the link flows with a proper set of oeffiients depending on the loss probabilities. the fij (.) 2728 onstraint set whih, to the best of our knowledge, annot be overome with onvexifying transformations. In an apparently similar setting, the authors in [18] have suessfully applied a logarithmi transformation to exploit the fat that the RHS of (10) is log-onave (i.e. its logarithm is onave). However, they onsider joint medium aess and end-to-end rate ontrol only. We on the other hand are also interested in finding a subgraph to ode over. In this ase, this and related well known transformations fail to yield a onvex problem formulation. IV. A RELAXATION OF THE JOINT OPTIMIZATION PROBLEM The joint optimization problem is very diffiult and intratable for all but rather small network instanes. We therefore suggest a simple relaxation that is easily implementable not only with a manageable amount of omplexity but also in a distributed fashion. To that end, we drop the random aess onstraints and solve the remaining optimization problem whih is the seletion of the network oding subgraph. One we have omputed the required link throughputs fij to support the given demands, we an use the iterative proedure from [10] to either find transmission attempt probabilities qij supporting the desired link throughputs or to rule out their feasibility. In ase we enounter an infeasible set of demands, we redue the rates (aording to some heuristi rule), reompute the required link throughputs and hek again for feasibility. Consider to that end the following linear program, where for brevity we have omitted the qualifying onditions: ij = qij(i - Qj) 1 (1 - Qk), (8) minimize A ZiJ kkjk\i (i, J)GA where Ki C AV is the set of all nodes whose hyperars ontain subjet to node j. The link throughput fij between node i and j is x i< < zij, C=l fi; = E: max x(tjj): (9) E ti') ()iyi(j) < bijk, jek S S (t,) {JI(i,J)EA4 jej (RC Z( t,) j E zjtsic t- {ii (j,i)ea,igl 1 0 (t, - R (1 1) (12) t = s, i = t, else, (13) (14) The ost funtion we have hosen to minimize is the total number of transmissions neessary to support a given rate, however any onvex separable funtion of the network oding subgraph3 an easily be aommodated in our framework. This optimization problem has a deentralized solution. As shown in [19], for a single session, the multiast subgraph seletion an be arried out in a distributed fashion. Under our assumptions on the ost funtion and the relaxed onstraint set it is readily seen that minimizing Z(iJ), Zij is equivalent to minimizing jc7 Z.j) Yi( ( Furthermore, the different 3That means a funtion of the form f(z) =(i,j)v4 fij(zij). are inreasing and onvex funtions. where

4 Lt ISIT2007, Nie, Frane, June 24 - June 29, 2007 multiast sessions are not oupled through any onstraints, whih implies that a solution to the subgraph optimization problem an be obtained by solving the different sessions oneby-one and then adding the resulting link flows. Clearly, in this ase the distributed algorithm from [19] applies. After having omputed the network oding subgraph, we an determine the required link throughputs fij using (9). To find transmission attempt probabilities qij yielding the desired link throughputs we an use the iterative proedure from [10], whih onsists of the following steps: 1) Initialize: qij [O] = 0. 2) Perform the iteration: Qi [n] = 1: qij [n], Pij [n] = (I1- Qj [n] ) (]-Qk [n]), kg Kj \i Pij Inl] Path oding/sheduling ^ Our algorithm 0.2 Link-by-link retransm./random aess 0.18 o o: (15) Fig. 2. Maximal rate of a uniast onnetion as a funtion of the number of nodes. The number of neighbors is upper bounded by 5. (16) (17) If the iteration onverges, then it is guaranteed that the transmission attempt probabilities qij support the required link throughputs. If, on the other hand, at some point any of the Qi[n] exeeds 1 the link throughputs are infeasible. Then we have to redue the end-to-end rates, ompute a new subgraph and repeat the feasibility iteration loop. Note that at every step of this iteration all required variable updates an be performed with information gathered within a one hop neighborhood, implying that also this omponent of our algorithm is deentralized and, ombined with the above subgraph optimization, yields a fully distributed approah. Our algorithm is suboptimal sine we separated the original problem into a subgraph seletion problem and a multiple aess problem and solved them more or less independently. However, simulation results illustrate that our approah shows signifiant gains. This is the fous of the next setion. V. SIMULATION RESULTS To get an idea of the performane gains of our approah we ondut simulations over random network topologies. We assume that a number of nodes are uniformly sattered over a square region with unit node density. Two nodes are in radio range if their distane is below some threshold, the radius of onnetivity, whih we take to be 1.8. Transmissions are subjet to erasures whih may be due to distane attenuation and Rayleigh fading. When a node transmits another node in radio range at distane d will reeive the paket orretly if -yd2 > /3, where 'yis a unit mean exponential variable and Q = 1/4 is our hosen SNR threshold, otherwise the paket is lost ompletely. We also take into aount interferene by assuming nodes to operate half-duplex (i.e. they annot transmit and reeive at the same time) and furthermore if in a given time slot a node is in radio range of more than one transmitting neighbor then it annot reover any of the pakets Path oding/sheduling Our.. algorithm... :Link-by-link retransm./random aess 0.18 o, 16 'r 0.14 U E a Fig. 3. Maximal rate of a uniast onnetion as a funtion of the number of nodes. The number of neighbors is upper bounded by 6. In Fig. 2 and Fig. 3, we are interested in the maximal rate of a single point-to-point onnetion. The soure is taken to be the node with the smallest x-oordinate and the destination the one with the highest x-oordinate. The differene between the two figures is merely the limit on the number of neighbors, with Fig. 3 having slightly riher onnetivity. We simulate the following shemes: 1) Path oding and sheduling: The shortest path4 from soure to sink is hosen and nodes on the path employ a random linear ode (e.g. the oding sheme from [1]) to ompensate for erased pakets. This is a form of network oding. Alternatively, one ould employ a FECode on every link and let intermediate nodes deode and re-enode pakets. However, suh an approah seems prohibitive due to large delays espeially on longer paths. An optimal ollision-free shedule is used whih, for the speial ase of a single onnetion on a path rather than a subgraph, is not a diffiult task. 4See also [20] for an interesting approah using multiple paths.

5 ISIT2007, Nie, Frane, June 24 - June 29, F Ir E 0.09 E i 0.08 E LPath oding/sheduling *Our algorithm Fig. 4. Maximal ommon rate of four simultaneous uniast onnetion as a funtion of the number of nodes. The number of neighbors is upper bounded by 6. 2) Subgraph oding and random aess heuristi: This is our algorithm as desribed in Setions III and IV. Note, that in ontrast to the three other tehniques, we ode over a subgraph rather than over a path. 3) Path oding and random aess: The shortest path between soure and destination is hosen and the same oding sheme from the first approah is used on the path. However, instead of sheduling we use random aess with optimal transmission attempt probabilities. 4) Link-by-link retransmission and random aess: The shortest path between soure and destination is hosen and nodes are required to aknowledge reeived pakets. If a paket or an aknowledgement is lost a retransmission is triggered, however we do not expliitly use negative aknowledgements (NACK's). It is important to keep in mind that approahes (1)-(3) use network oding, while approah (4) does not. Therefore, although approah (3) operates on a path rather than on a subgraph it apitalizes already signifiantly on network oding gains. Approah (2) goes one step further by hoosing a subgraph rather than a path to ode over and therefore utilizes the overhearing of pakets by other neighbors, a phenomenon alled the wireless broadast advantage [19]. We observe, that our suboptimal network oding algorithm is able to lose muh of the gap between random aess and a sheduled approah. The gains are more pronouned in Fig. 3 where the network onnetivity is riher. Another experiment we onduted is to use the same network topology and setup simultaneously four uniast onnetions sharing the network. Fig. 4 shows the maximal ommon rate at whih they an transmit and, again, the urves illustrate the gains due to network oding. Together, these experiments give a ompelling reason to expet onsiderable advantages by using network oding. In fat, together with the simulation results in [2], [21], [22], it is reasonable to investigate further the appliation of network oding in wireless networks VI. CONCLUSION We have suggested a ombined network oding and random aess strategy whih shows signifiant performane gains in simulations. It an be implemented in a distributed fashion whih is a basi requirement if it is to be used as the basis of a protool. What is not yet lear in partiular is the delay harateristis of pakets in atual network operation. This is an important aspet in networking and requires more investigation. REFERENCES [1] D. S. Lun, M. Medard, R. Koetter, and M. Effros, "On oding for reliable ommuniation over paket networks," Tehnial report #2741, MIT LIDS, January [2] D. S. Lun, M. Medard and R. Koetter, "Network oding for effiient wireless uniast," in International Zurih Seminar on Communiation, February [3] T. Ho, R. Koetter, M. Medard, M. Effros, J. Shi, and D. Karger, "A random linear network oding approah to multiast," IEEE Trans. on Information Theory, 52 (10). pp , Otober [4] D. S. Lun, "Effiient operation of oded paket networks," Ph.D. dissertation, Massahusetts Institute of Tehnology, June [5] N. Ratnakar, D. Traskov, and R. Koetter, "Approahes to network oding for multiple uniast," invited paper, International Zurih Seminar on Communiation, February [6] D. Traskov, N. Ratnakar, D. S. Lun, R. Koetter, and M. Medard, "Network oding for multiple uniasts: An approah based on linear optimization," in IEEE Int. Symp. on Inf. Theory, Seattle, [7] A. Eryilmaz, and D. S. Lun, "Control for inter-session network oding," Tehnial report #2722, MIT LIDS, August [8] T. Ho, Y. Chang and K. J. Han, "On onstrutive network oding for multiple uniasts," invited paper, 44th Allerton Conferene on [9] Communiation, Control and Computing, S. Katti, D. Katabi, W. Hu, and R Hariharan, "The importane of being opportunisti: Pratial network oding for wireless environments," in Allerton Conferene on Communiation, Control, and Computing, [10] D. Bertsekas, and R. Gallager. Data networks. Prentie Hall, Upper Saddle River, NJ, seond edition, [11] E. Arikan "Some omplexity results about paket radio networks," IEEE Trans. on Information Theory," 30(4): , July [12] Y. E. Sagduyu, and A. Ephremides, "Cross-layer optimization through [13] wireless network oding in queueing tandem networks," submitted to IEEE Trans. on Information Theory, May Y. Wu, P. A. Chou, Q. Zhang, K. Jain, W. Zhu, and S.-Y. Kung, "Network planning in wireless ad ho networks: a ross-layer approah," in IEEE [14] Journal on Seleted Areas in Comm., 23(1): , Jan B. Nazer, and M. Gastpar, "Reliable omputation over multiple-aess hannels," in Allerton Conferene on Commununiation, Control and Computation, Montiello, IL, Sept [15] S. Ray, M. Effros, M. Medard, R. Koetter, T. Ho, D. Karger and J. Abounadi, "On separation, randomness and linearity for network odes [16] over finite fields," MIT LIDS Tehnial Report #2687, Marh P. A. Chou, Y. Wu, and K. Jain, "Pratial network oding," Allerton Conferene on Communiation, Control, and Computing, Montiello, IL, Otober [17] M. Medard, J. Huang, A. Goldsmith, S. Meyn, T. Coleman, "Capaity in of time-slotted ALOHA AWGN hannel", paketized IEEE Trans. mutiple-aess on Wireless systems Comm., over the 3(2): , Marh [18] X. Wang, and K. Kar, "Cross-layer rate ontrol in multi-hop wireless networks with random aess," IEEE Journal on Seleted Areas in Communiations, 24(8): , August [19] D.S. Lun, N. Ratnakar, M. Medard, R. Koetter, D.R. Karger, T. Ho, E. Ahmed, "Minimum-ost multiast over oded paket networks," IEEE Trans. on Information Theory, 52(6): , June [20] A. L. Toledo, and X. Wang, "Effiient multipath in sensor networks using diffusion and network oding," in 4oth Annual Conferene on Information Sienes and Systems, Prineton, NJ, Marh, [21] J.-S. Park, D. S. Lun, F. Soldo, M. Gerla, and M. Medard. "Performane of network oding in ad ho networks," in IEEE Milom, Otober [22] R. Khalili and K. Salamatian, "A new relaying sheme for heap wireless relay nodes," in Wiopt 2005, Trentino, Italy.

Cluster-based Cooperative Communication with Network Coding in Wireless Networks

Cluster-based Cooperative Communication with Network Coding in Wireless Networks Cluster-based Cooperative Communiation with Network Coding in Wireless Networks Zygmunt J. Haas Shool of Eletrial and Computer Engineering Cornell University Ithaa, NY 4850, U.S.A. Email: haas@ee.ornell.edu

More information

Multi-Channel Wireless Networks: Capacity and Protocols

Multi-Channel Wireless Networks: Capacity and Protocols Multi-Channel Wireless Networks: Capaity and Protools Tehnial Report April 2005 Pradeep Kyasanur Dept. of Computer Siene, and Coordinated Siene Laboratory, University of Illinois at Urbana-Champaign Email:

More information

Acoustic Links. Maximizing Channel Utilization for Underwater

Acoustic Links. Maximizing Channel Utilization for Underwater Maximizing Channel Utilization for Underwater Aousti Links Albert F Hairris III Davide G. B. Meneghetti Adihele Zorzi Department of Information Engineering University of Padova, Italy Email: {harris,davide.meneghetti,zorzi}@dei.unipd.it

More information

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless

More information

We don t need no generation - a practical approach to sliding window RLNC

We don t need no generation - a practical approach to sliding window RLNC We don t need no generation - a pratial approah to sliding window RLNC Simon Wunderlih, Frank Gabriel, Sreekrishna Pandi, Frank H.P. Fitzek Deutshe Telekom Chair of Communiation Networks, TU Dresden, Dresden,

More information

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr

More information

Improved flooding of broadcast messages using extended multipoint relaying

Improved flooding of broadcast messages using extended multipoint relaying Improved flooding of broadast messages using extended multipoint relaying Pere Montolio Aranda a, Joaquin Garia-Alfaro a,b, David Megías a a Universitat Oberta de Catalunya, Estudis d Informàtia, Mulimèdia

More information

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks A Dual-Hamiltonian-Path-Based Multiasting Strategy for Wormhole-Routed Star Graph Interonnetion Networks Nen-Chung Wang Department of Information and Communiation Engineering Chaoyang University of Tehnology,

More information

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Ho Wireless Networks Giorgio Quer, Federio Librino, Lua Canzian, Leonardo Badia, Mihele Zorzi, University of California San Diego La

More information

Accommodations of QoS DiffServ Over IP and MPLS Networks

Accommodations of QoS DiffServ Over IP and MPLS Networks Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering

More information

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

Multi-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks

Multi-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks Multi-hop Fast Conflit Resolution Algorithm for Ad Ho Networks Shengwei Wang 1, Jun Liu 2,*, Wei Cai 2, Minghao Yin 2, Lingyun Zhou 2, and Hui Hao 3 1 Power Emergeny Center, Sihuan Eletri Power Corporation,

More information

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1. Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,

More information

Exploring the Commonality in Feature Modeling Notations

Exploring the Commonality in Feature Modeling Notations Exploring the Commonality in Feature Modeling Notations Miloslav ŠÍPKA Slovak University of Tehnology Faulty of Informatis and Information Tehnologies Ilkovičova 3, 842 16 Bratislava, Slovakia miloslav.sipka@gmail.om

More information

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communiations 1 RAC 2 E: Novel Rendezvous Protool for Asynhronous Cognitive Radios in Cooperative Environments Valentina Pavlovska,

More information

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department

More information

An Experimental Study of Fractional Cooperation in Wireless Mesh Networks

An Experimental Study of Fractional Cooperation in Wireless Mesh Networks An Experimental tudy of Frational Cooperation in Wireless Mesh Networks Anthony Cale, Nariman Farsad, and Andrew W. Ekford Dept. of Computer iene and Engineering, York University 47 Keele treet, Toronto,

More information

An Alternative Approach to the Fuzzifier in Fuzzy Clustering to Obtain Better Clustering Results

An Alternative Approach to the Fuzzifier in Fuzzy Clustering to Obtain Better Clustering Results An Alternative Approah to the Fuzziier in Fuzzy Clustering to Obtain Better Clustering Results Frank Klawonn Department o Computer Siene University o Applied Sienes BS/WF Salzdahlumer Str. 46/48 D-38302

More information

CleanUp: Improving Quadrilateral Finite Element Meshes

CleanUp: Improving Quadrilateral Finite Element Meshes CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments Establishing Seure Ethernet LANs Using Intelligent Swithing Hubs in Internet Environments WOEIJIUNN TSAUR AND SHIJINN HORNG Department of Eletrial Engineering, National Taiwan University of Siene and Tehnology,

More information

Performance Benchmarks for an Interactive Video-on-Demand System

Performance Benchmarks for an Interactive Video-on-Demand System Performane Benhmarks for an Interative Video-on-Demand System. Guo,P.G.Taylor,E.W.M.Wong,S.Chan,M.Zukerman andk.s.tang ARC Speial Researh Centre for Ultra-Broadband Information Networks (CUBIN) Department

More information

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks 62 Uplink Channel Alloation Sheme and QoS Management Mehanism for Cognitive Cellular- Femtoell Networks Kien Du Nguyen 1, Hoang Nam Nguyen 1, Hiroaki Morino 2 and Iwao Sasase 3 1 University of Engineering

More information

This fact makes it difficult to evaluate the cost function to be minimized

This fact makes it difficult to evaluate the cost function to be minimized RSOURC LLOCTION N SSINMNT In the resoure alloation step the amount of resoures required to exeute the different types of proesses is determined. We will refer to the time interval during whih a proess

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

New Channel Allocation Techniques for Power Efficient WiFi Networks

New Channel Allocation Techniques for Power Efficient WiFi Networks ew Channel Alloation Tehniques for Power Effiient WiFi etworks V. Miliotis, A. Apostolaras, T. Korakis, Z. Tao and L. Tassiulas Computer & Communiations Engineering Dept. University of Thessaly Centre

More information

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality INTERNATIONAL CONFERENCE ON MANUFACTURING AUTOMATION (ICMA200) Multi-Piee Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality Stephen Stoyan, Yong Chen* Epstein Department of

More information

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks International Journal of Computer Theory and Engineering, Vol. 5, No. 2, April 213 A Multi-Head Clustering Algorithm in Vehiular Ad Ho Networks Shou-Chih Lo, Yi-Jen Lin, and Jhih-Siao Gao Abstrat Clustering

More information

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of

More information

arxiv: v1 [cs.db] 13 Sep 2017

arxiv: v1 [cs.db] 13 Sep 2017 An effiient lustering algorithm from the measure of loal Gaussian distribution Yuan-Yen Tai (Dated: May 27, 2018) In this paper, I will introdue a fast and novel lustering algorithm based on Gaussian distribution

More information

Drawing lines. Naïve line drawing algorithm. drawpixel(x, round(y)); double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx; double y = y0;

Drawing lines. Naïve line drawing algorithm. drawpixel(x, round(y)); double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx; double y = y0; Naïve line drawing algorithm // Connet to grid points(x0,y0) and // (x1,y1) by a line. void drawline(int x0, int y0, int x1, int y1) { int x; double dy = y1 - y0; double dx = x1 - x0; double m = dy / dx;

More information

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University

More information

Fast Distribution of Replicated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon

Fast Distribution of Replicated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon ACEEE Int. J. on Information Tehnology, Vol. 3, No. 2, June 2013 Fast Distribution of Repliated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon Email: mmalli@aou.edu.lb

More information

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Arne Hamann, Razvan Rau, Rolf Ernst Institute of Computer and Communiation Network Engineering Tehnial University of Braunshweig,

More information

Alleviating DFT cost using testability driven HLS

Alleviating DFT cost using testability driven HLS Alleviating DFT ost using testability driven HLS M.L.Flottes, R.Pires, B.Rouzeyre Laboratoire d Informatique, de Robotique et de Miroéletronique de Montpellier, U.M. CNRS 5506 6 rue Ada, 34392 Montpellier

More information

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method 3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr

More information

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections SVC-DASH-M: Salable Video Coding Dynami Adaptive Streaming Over HTTP Using Multiple Connetions Samar Ibrahim, Ahmed H. Zahran and Mahmoud H. Ismail Department of Eletronis and Eletrial Communiations, Faulty

More information

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of

More information

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,

More information

Path Diversity for Overlay Multicast Streaming

Path Diversity for Overlay Multicast Streaming Path Diversity for Overlay Multiast Streaming Matulya Bansal and Avideh Zakhor Department of Eletrial Engineering and Computer Siene University of California, Berkeley Berkeley, CA 9472 {matulya, avz}@ees.berkeley.edu

More information

Facility Location: Distributed Approximation

Facility Location: Distributed Approximation Faility Loation: Distributed Approximation Thomas Mosibroda Roger Wattenhofer Distributed Computing Group PODC 2005 Where to plae ahes in the Internet? A distributed appliation that has to dynamially plae

More information

A {k, n}-secret Sharing Scheme for Color Images

A {k, n}-secret Sharing Scheme for Color Images A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University

More information

Optimizing Large-Scale MIMO Cellular Downlink: Multiplexing, Diversity, or Interference Nulling?

Optimizing Large-Scale MIMO Cellular Downlink: Multiplexing, Diversity, or Interference Nulling? Optimizing Large-Sale MIMO Cellular Downlink: Multiplexing, Diversity, or Interferene Nulling? Kianoush Hosseini, Wei Yu, and Raviraj S. Adve The Edward S. Rogers Sr. Department of Eletrial and Computer

More information

Distributed Resource Allocation Strategies for Achieving Quality of Service in Server Clusters

Distributed Resource Allocation Strategies for Achieving Quality of Service in Server Clusters Proeedings of the 45th IEEE Conferene on Deision & Control Manhester Grand Hyatt Hotel an Diego, CA, UA, Deember 13-15, 2006 Distributed Resoure Alloation trategies for Ahieving Quality of ervie in erver

More information

KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION

KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION Cuiui Kang 1, Shengai Liao, Shiming Xiang 1, Chunhong Pan 1 1 National Laboratory of Pattern Reognition, Institute of Automation, Chinese

More information

Backpressure with Adaptive Redundancy (BWAR)

Backpressure with Adaptive Redundancy (BWAR) Bakpressure with Adaptive Redundany (BWAR) Majed Alresaini alresain AT us. edu Maheswaran Sathiamoorthy msathiam AT us. edu Bhaskar Krishnamahari bkrishna AT us. edu Mihael J. Neely mjneely AT us. edu

More information

Cooperative Coverage Extension for Relay-Union Networks

Cooperative Coverage Extension for Relay-Union Networks 1.119/TPDS.214.23821, IEEE Transations on Parallel and Distributed Systems IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 1 Cooperative Coverage Extension for Relay-Union Networks Yong Cui, Xiao

More information

Implementing Load-Balanced Switches With Fat-Tree Networks

Implementing Load-Balanced Switches With Fat-Tree Networks Implementing Load-Balaned Swithes With Fat-Tree Networks Hung-Shih Chueh, Ching-Min Lien, Cheng-Shang Chang, Jay Cheng, and Duan-Shin Lee Department of Eletrial Engineering & Institute of Communiations

More information

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient

More information

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion

More information

HEXA: Compact Data Structures for Faster Packet Processing

HEXA: Compact Data Structures for Faster Packet Processing Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for

More information

Detection of RF interference to GPS using day-to-day C/No differences

Detection of RF interference to GPS using day-to-day C/No differences 1 International Symposium on GPS/GSS Otober 6-8, 1. Detetion of RF interferene to GPS using day-to-day /o differenes Ryan J. R. Thompson 1#, Jinghui Wu #, Asghar Tabatabaei Balaei 3^, and Andrew G. Dempster

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

The Implementation of RRTs for a Remote-Controlled Mobile Robot

The Implementation of RRTs for a Remote-Controlled Mobile Robot ICCAS5 June -5, KINEX, Gyeonggi-Do, Korea he Implementation of RRs for a Remote-Controlled Mobile Robot Chi-Won Roh*, Woo-Sub Lee **, Sung-Chul Kang *** and Kwang-Won Lee **** * Intelligent Robotis Researh

More information

Taming Decentralized POMDPs: Towards Efficient Policy Computation for Multiagent Settings

Taming Decentralized POMDPs: Towards Efficient Policy Computation for Multiagent Settings Taming Deentralized PMDPs: Towards ffiient Poliy omputation for Multiagent Settings. Nair and M. Tambe omputer Siene Dept. University of Southern alifornia Los Angeles A 90089 nair,tambe @us.edu M. Yokoo

More information

Approximate logic synthesis for error tolerant applications

Approximate logic synthesis for error tolerant applications Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu

More information

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer

More information

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization Self-Adaptive Parent to Mean-Centri Reombination for Real-Parameter Optimization Kalyanmoy Deb and Himanshu Jain Department of Mehanial Engineering Indian Institute of Tehnology Kanpur Kanpur, PIN 86 {deb,hjain}@iitk.a.in

More information

Interior-Point Algorithms for Linear-Programming Decoding 0

Interior-Point Algorithms for Linear-Programming Decoding 0 Interior-Point Algorithms for Linear-Programming Deoding 0 Pasal O. Vontobel Hewlett Pakard Laboratories Palo Alto, CA 94304, USA Email: pasal.vontobel@ieee.org arxiv:080.1369v1 [s.it] 11 Feb 008 Abstrat

More information

THROUGHPUT EVALUATION OF AN ASYMMETRICAL FDDI TOKEN RING NETWORK WITH MULTIPLE CLASSES OF TRAFFIC

THROUGHPUT EVALUATION OF AN ASYMMETRICAL FDDI TOKEN RING NETWORK WITH MULTIPLE CLASSES OF TRAFFIC THROUGHPUT EVALUATION OF AN ASYMMETRICAL FDDI TOKEN RING NETWORK WITH MULTIPLE CLASSES OF TRAFFIC Priya N. Werahera and Anura P. Jayasumana Department of Eletrial Engineering Colorado State University

More information

Announcements. Lecture Caching Issues for Multi-core Processors. Shared Vs. Private Caches for Small-scale Multi-core

Announcements. Lecture Caching Issues for Multi-core Processors. Shared Vs. Private Caches for Small-scale Multi-core Announements Your fous should be on the lass projet now Leture 17: Cahing Issues for Multi-ore Proessors This week: status update and meeting A short presentation on: projet desription (problem, importane,

More information

Displacement-based Route Update Strategies for Proactive Routing Protocols in Mobile Ad Hoc Networks

Displacement-based Route Update Strategies for Proactive Routing Protocols in Mobile Ad Hoc Networks Displaement-based Route Update Strategies for Proative Routing Protools in Mobile Ad Ho Networks Mehran Abolhasan 1 and Tadeusz Wysoki 1 1 University of Wollongong, NSW 2522, Australia E-mail: mehran@titr.uow.edu.au,

More information

Partial Character Decoding for Improved Regular Expression Matching in FPGAs

Partial Character Decoding for Improved Regular Expression Matching in FPGAs Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia

More information

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425) Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University

More information

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT?

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? 3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? Bernd Girod, Peter Eisert, Marus Magnor, Ekehard Steinbah, Thomas Wiegand Te {girod eommuniations Laboratory, University of Erlangen-Nuremberg

More information

DoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay

DoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay DoS-Resistant Broadast Authentiation Protool with Low End-to-end Delay Ying Huang, Wenbo He and Klara Nahrstedt {huang, wenbohe, klara}@s.uiu.edu Department of Computer Siene University of Illinois at

More information

Sparse Certificates for 2-Connectivity in Directed Graphs

Sparse Certificates for 2-Connectivity in Directed Graphs Sparse Certifiates for 2-Connetivity in Direted Graphs Loukas Georgiadis Giuseppe F. Italiano Aikaterini Karanasiou Charis Papadopoulos Nikos Parotsidis Abstrat Motivated by the emergene of large-sale

More information

Semi-Supervised Affinity Propagation with Instance-Level Constraints

Semi-Supervised Affinity Propagation with Instance-Level Constraints Semi-Supervised Affinity Propagation with Instane-Level Constraints Inmar E. Givoni, Brendan J. Frey Probabilisti and Statistial Inferene Group University of Toronto 10 King s College Road, Toronto, Ontario,

More information

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification erformane Improvement of TC on Wireless Cellular Networks by Adaptive Combined with Expliit Loss tifiation Masahiro Miyoshi, Masashi Sugano, Masayuki Murata Department of Infomatis and Mathematial Siene,

More information

Anonymity Trilemma: Strong Anonymity, Low Bandwidth, Low Latency Choose Two

Anonymity Trilemma: Strong Anonymity, Low Bandwidth, Low Latency Choose Two Anonymity Trilemma: Strong Anonymity, Low Bandwidth, Low Lateny Choose Two Debajyoti Das Purdue University, USA das48@purdue.edu Sebastian Meiser University College London, U s.meiser@ul.a.uk Esfandiar

More information

Gray Codes for Reflectable Languages

Gray Codes for Reflectable Languages Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings

More information

Dynamic Backlight Adaptation for Low Power Handheld Devices 1

Dynamic Backlight Adaptation for Low Power Handheld Devices 1 Dynami Baklight Adaptation for ow Power Handheld Devies 1 Sudeep Pasriha, Manev uthra, Shivajit Mohapatra, Nikil Dutt and Nalini Venkatasubramanian 444, Computer Siene Building, Shool of Information &

More information

A Hybrid Neuro-Genetic Approach to Short-Term Traffic Volume Prediction

A Hybrid Neuro-Genetic Approach to Short-Term Traffic Volume Prediction A Hybrid Neuro-Geneti Approah to Short-Term Traffi Volume Predition 1. Introdution Shahriar Afandizadeh 1,*, Jalil Kianfar 2 Reeived: January 2003, Revised: July 2008, Aepted: January 2009 Abstrat: This

More information

Routing Protocols for Wireless Ad Hoc Networks Hybrid routing protocols Theofanis Kilinkaridis

Routing Protocols for Wireless Ad Hoc Networks Hybrid routing protocols Theofanis Kilinkaridis Routing Protools for Wireless Ad Ho Networks Hyrid routing protools Theofanis Kilinkaridis tkilinka@.hut.fi Astrat This paper presents a partiular group of routing protools that aim to omine the advantages

More information

mahines. HBSP enhanes the appliability of the BSP model by inorporating parameters that reet the relative speeds of the heterogeneous omputing omponen

mahines. HBSP enhanes the appliability of the BSP model by inorporating parameters that reet the relative speeds of the heterogeneous omputing omponen The Heterogeneous Bulk Synhronous Parallel Model Tiani L. Williams and Rebea J. Parsons Shool of Computer Siene University of Central Florida Orlando, FL 32816-2362 fwilliams,rebeag@s.uf.edu Abstrat. Trends

More information

Time delay estimation of reverberant meeting speech: on the use of multichannel linear prediction

Time delay estimation of reverberant meeting speech: on the use of multichannel linear prediction University of Wollongong Researh Online Faulty of Informatis - apers (Arhive) Faulty of Engineering and Information Sienes 7 Time delay estimation of reverberant meeting speeh: on the use of multihannel

More information

with respect to the normal in each medium, respectively. The question is: How are θ

with respect to the normal in each medium, respectively. The question is: How are θ Prof. Raghuveer Parthasarathy University of Oregon Physis 35 Winter 8 3 R EFRACTION When light travels from one medium to another, it may hange diretion. This phenomenon familiar whenever we see the bent

More information

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,

More information

Plot-to-track correlation in A-SMGCS using the target images from a Surface Movement Radar

Plot-to-track correlation in A-SMGCS using the target images from a Surface Movement Radar Plot-to-trak orrelation in A-SMGCS using the target images from a Surfae Movement Radar G. Golino Radar & ehnology Division AMS, Italy ggolino@amsjv.it Abstrat he main topi of this paper is the formulation

More information

A scheme for racquet sports video analysis with the combination of audio-visual information

A scheme for racquet sports video analysis with the combination of audio-visual information A sheme for raquet sports video analysis with the ombination of audio-visual information Liyuan Xing a*, Qixiang Ye b, Weigang Zhang, Qingming Huang a and Hua Yu a a Graduate Shool of the Chinese Aadamy

More information

Constructing Transaction Serialization Order for Incremental. Data Warehouse Refresh. Ming-Ling Lo and Hui-I Hsiao. IBM T. J. Watson Research Center

Constructing Transaction Serialization Order for Incremental. Data Warehouse Refresh. Ming-Ling Lo and Hui-I Hsiao. IBM T. J. Watson Research Center Construting Transation Serialization Order for Inremental Data Warehouse Refresh Ming-Ling Lo and Hui-I Hsiao IBM T. J. Watson Researh Center July 11, 1997 Abstrat In typial pratie of data warehouse, the

More information

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq

Dr.Hazeem Al-Khafaji Dept. of Computer Science, Thi-Qar University, College of Science, Iraq Volume 4 Issue 6 June 014 ISSN: 77 18X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om Medial Image Compression using

More information

Capacity Analysis for Flat and Clustered Wireless Sensor Networks

Capacity Analysis for Flat and Clustered Wireless Sensor Networks International Conferene on Wireless Algoritms, Systems and Appliations Capaity Analysis for Flat and Clustered Wireless Sensor etworks Min Song, Bei He Department of Eletrial and Computer Engineering Old

More information

A Comparison of Hard-state and Soft-state Signaling Protocols

A Comparison of Hard-state and Soft-state Signaling Protocols University of Massahusetts Amherst SholarWorks@UMass Amherst Computer Siene Department Faulty Publiation Series Computer Siene 2003 A Comparison of Hard-state and Soft-state Signaling Protools Ping Ji

More information

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah

More information

IN RECENT years, multi-hop wireless networks have made

IN RECENT years, multi-hop wireless networks have made IEEE JOURNAL ON SELECED AREAS IN COMMUNUNICAIONS, VOL. 3, NO. 7, AUGUS 37 Revenue Maximization in ime-varying Multi-Hop Wireless Networks: A Dynami Priing Approah Yang Song, Chi Zhang, Member, IEEE, Yuguang

More information

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm

More information

Sequential Incremental-Value Auctions

Sequential Incremental-Value Auctions Sequential Inremental-Value Autions Xiaoming Zheng and Sven Koenig Department of Computer Siene University of Southern California Los Angeles, CA 90089-0781 {xiaominz,skoenig}@us.edu Abstrat We study the

More information

The influence of QoS routing on the achievable capacity in TDMA based Ad hoc wireless networks

The influence of QoS routing on the achievable capacity in TDMA based Ad hoc wireless networks Wireless Netw () 6:9 DOI.7/s76-8-- The influene of QoS routing on the ahievable apaity in TDMA based Ad ho wireless networks S. Sriram Æ T. Bheemarjuna Reddy Æ C. Siva Ram Murthy Published online: August

More information

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering A Novel Bit Level Time Series Representation with Impliation of Similarity Searh and lustering hotirat Ratanamahatana, Eamonn Keogh, Anthony J. Bagnall 2, and Stefano Lonardi Dept. of omputer Siene & Engineering,

More information

Recommendation Subgraphs for Web Discovery

Recommendation Subgraphs for Web Discovery Reommation Subgraphs for Web Disovery Arda Antikaioglu Department of Mathematis Carnegie Mellon University aantika@andrew.mu.edu R. Ravi Tepper Shool of Business Carnegie Mellon University ravi@mu.edu

More information

Colouring contact graphs of squares and rectilinear polygons de Berg, M.T.; Markovic, A.; Woeginger, G.

Colouring contact graphs of squares and rectilinear polygons de Berg, M.T.; Markovic, A.; Woeginger, G. Colouring ontat graphs of squares and retilinear polygons de Berg, M.T.; Markovi, A.; Woeginger, G. Published in: nd European Workshop on Computational Geometry (EuroCG 06), 0 Marh - April, Lugano, Switzerland

More information

User-level Fairness Delivered: Network Resource Allocation for Adaptive Video Streaming

User-level Fairness Delivered: Network Resource Allocation for Adaptive Video Streaming User-level Fairness Delivered: Network Resoure Alloation for Adaptive Video Streaming Mu Mu, Steven Simpson, Arsham Farshad, Qiang Ni, Niholas Rae Shool of Computing and Communiations, Lanaster University

More information

Gradient based progressive probabilistic Hough transform

Gradient based progressive probabilistic Hough transform Gradient based progressive probabilisti Hough transform C.Galambos, J.Kittler and J.Matas Abstrat: The authors look at the benefits of exploiting gradient information to enhane the progressive probabilisti

More information