Energy-Efficient Mobile-Edge Computation Offloading for Applications with Shared Data

Size: px
Start display at page:

Download "Energy-Efficient Mobile-Edge Computation Offloading for Applications with Shared Data"

Transcription

1 Energy-Efficient Mobile-Edge Comptation Offloading for Applications with Shared Data Xiangy He, Hong Xing, Ye Chen, Armgam Nallanathan School of Electronic Engineering and Compter Science Qeen Mary University of London, London, UK xiangy.he, h.xing, ye.chen, arxiv: v1 [cs.it] 4 Sep 2018 Abstract Mobile-edge comptation offloading (MECO) has been recognized as a promising soltion to alleviate the brden of resorce-limited Internet of Thing (IoT) devices by offloading comptation tasks to the edge of celllar networks (also known as clodlet). Specifically, latency-critical applications sch as virtal reality (VR) and agmented reality (AR) have inherent collaborative properties since part of the inpt/otpt data are shared by different sers in proximity. In this paper, we consider a mlti-ser fog compting system, in which mltiple single-antenna mobile sers rnning applications featring shared data can choose between (partially) offloading their individal tasks to a nearby single-antenna clodlet for remote exection and performing pre local comptation. The mobile sers energy minimization is formlated as a convex problem, sbject to the total compting latency constraint, the total energy constraints for individal data downloading, and the compting freqency constraints for local compting, for which classical Lagrangian dality can be applied to find the optimal soltion. Based pon the semi-closed form soltion, the shared data proves to be transmitted by only one of the mobile sers instead of mltiple ones. Besides, compared to those baseline algorithms withot considering the shared data property or the mobile sers local compting capabilities, the proposed joint comptation offloading and commnications resorce allocation provides significant energy saving. I. INTRODUCTION With the advent of the era of Internet of Things (IoT), the nprecedented growth of latency-critical applications are nevertheless hardly satisfied by mobile clod compting (MCC) alone. To cater for the low-latency reqirements while alleviating the brden over backhal networks, mobileedge compting (MEC), also interchangeably known as fog compting has arosed a paradigm shift by extending clod capabilities to the very edge within the radio access network (RAN) (see [1] and the references therein). Both indstry and academia have devoted constant effort to providing the next generation mobile networks with ltra-reliable low latency commnications (RLLC). Among pioneering indstrialization on fog compting, Cisco has proposed fog compting as a promising candidate for IoT architectre [2]. In academics, [3] [6] focsed on one-toone offloading scheme where there is one mobile ser and one corresponding clodlet, [7] [8] presented mltiple-ser cases where there are mltiple edge servers, while [9] related to mltiple-to-one scenarios where mltiple mobile sers offload compting to one edge server. Recently, the intrinsic collaborative properties of the inpt data for comptation offloading was investigated for agmented reality (AR) in [10]. In fact, in many mobile applications sch as agmented reality (AR) and virtal reality (VR), mltiple mobile devices share parts of compting inpt/otpt in common, ths making it possible for frther redcing compting latency at the edge. In [11], some important insights on the interplay among the social interactions in the VR mobile social network was revealed, and a significant redce on the end-to-end latency was achieved throgh stochastic optimization techniqe. [12] investigated potential spatial data correlation for VR applications to minimize the delay of accomplishing comptation. On another front, joint optimization of comptation offloading with commnications resorces (sch as power, bandwidth, and rate) proves to improve the performance of fog compting by explicitly taking channel conditions and commnications constraints into accont. In an early research [13], the offloading decision making was examined throgh the estimation of bandwidth data withot considering the allocation of commnication resorces and channel conditions. For commnications-aware comptation offloading, [14] minimized the local ser s comptation latency in a mlti-ser cooperative scenario, while [15] minimized the energy consmption of remote fog compting nodes. However, these line of work have not taken the shared data featre aforementioned into accont, ths failing to flly reap the advantage of fog compting. In this paper, we consider a mlti-ser fog compting system, in which mltiple single-antenna mobile sers rnning applications featring shared data can choose between (partially) offloading their compting tasks to a nearby single-antenna clodlet and execting them locally, and then download the reslts from the clodlet. Mobile sers overall energy consmption is minimized via joint optimization of comptation offloading and commnications resorce allocation. Compared with existing literatre, e.g., [10], althogh it investigated the energy minimization problem of shareddata featred offloading, it did not find the optimal soltion. Moreover, it did not draw explicit conclsion regarding the channel condition s inflence in the comptation offloading. From this point of view, or work provides in-depth nderstanding of the shared-data featred offloading in MEC systems.

2 II. SYSTEM MODEL We consider a mobile-edge system that consists of U mobile sers rnning AR applications, denoted as U = 1,...,U, and one base station (BS) eqipped with compting facilities working as a clodlet. All of the mobile sers and the BS are assmed to be eqipped with single antenna. The inpt data size for ser is denoted by D I, U, in which one fraction data size of DS I bits are the shared data that is the same across all U mobile sers and the other fraction of D L bits are the data exected locally by ser. The shared data can be transmitted from each ser by part, denoted by D I, U, sch that U =1 DI = DI S. The amont of inpt data that is exclsively transmitted by is ths given by D I = D I DS I DL, U. transmission power given by p l, the achievable individal data rate for offloading the shared data is expressed as: R l = W l log 2 (1+ pl h 2 ), U, (1) where W l = Wl U with W l denoting the overall bandwidth available for the plink transmission, and is the additive white Gassian noise (AWGN) power. Accordingly, = DI /Rl, and the energy consmed by the -th ser in the shared data offloading sb-phase is given as E l = tl pl = tl h 2f(DI ), U, (2) where the fnctionf(x) is defined asf(x) = (2W l 1). Similarly, the energy consmption for the -th ser in the individal data offloading sb-phase is expressed as: x E l = tl pl = tl B. Comptation Model DI S DL h 2f(DI ), U. (3) Based on the energy model in [9], given the local compting bits D L, the energy consmption for execting local comptation is given by: Fig. 1. Timing illstration for the considered mlti-ser MEC system. It can be seen from Fig. 1 that there are two consective sb-phases for both inpt data offloading and reslts downloading phases: the shared and the individal data transmission. The transmission dration for offloading the shared inpt data is denoted by, U; the offloading dration for the individal data is denoted as, U; and the drations for downloading the shared and the individal otpt data are and tdl, U respectively. The remote comptation time are also illstrated in Fig. 1, where t C S and tc, U, denote that for the shared and the individal data transmitted to the clodlet, respectively. Similarly, F and f, U, denote the comptational freqency (in cycles/s) allocated to the shared and the individal tasks, respectively, by the clodlet. In addition, the local comptation time is denoted by t C,L, U. A. Uplink Transmission As observed from Fig. 1, there are two consective plink transmission sb-phases: the shared data and the individal data offloading [10]. Each mobile ser offloads its comptation task to the clodlet server via freqency division mltiple access (FDMA). The channel coefficient from ser is given by h, U, which is assmed to remain nchanged dring the plink transmission dration. With the E C = κ (λ 0 D L)3 0 2, U, (4) t C,L where λ 0 (in cycles/bit) denotes the nmber of CPU cycles needed for processing one bit of inpt data, and κ 0 is the energy consmption capacitance coefficient. C. Downlink Transmission Similar to the plink transmission, the downlink transmission phase also has two separate sb-phases: the shared and the individal reslts downloading. The shared otpt data are mlticasted to the mobile sers by the clodlet at its maximm transmitting power P max. The achievable individal rate for the shared data downloading is ths given by R dl = Wdl log 2(1+ P max g 2 ), U, (5) where W dl = Wdl U with Wdl denotes the overall bandwidth available for downlink transmission. The downlink channel coefficient is given by g, U. The relation between the shared otpt data and the inpt data is given by DS O = a 0DS I, where a 0 is the factor representing the nmber of otpt bits for execting one bit of inpt data. Accordingly, = DO S /Rdl, U, and ths the latency for transmitting the shared otpt data to all mobile sers is given by S = max tdl. (6) This is becase the individal reslts downloading cannot be initiated ntil the shared data has finished transmission. After the mlticasting transmission, the individal otpt data is sent to each mobile ser via FDMA. Denoting the

3 downlink transmitting power for the -th individal data by p dl, the achievable rate for individal data downloading is ths expressed as: R dl = W dl log 2 (1+ pdl g 2 ), U. (7) Similarly, denoting the individal otpt data size by D O, U, D O = a 0 D I = a 0(D I DI S DL ), and tdl = D/R O dl. For energy consmption, the overall energy consmed for decoding the reslt sent back by the clodlet at the -th mobile ser is given by [10] E dl = (tdl +tdl )ρdl, U, (8) whereρ dl (in Joles/second) captres the energy expenditre per second. In addition, the total energy consmed by the BS for reslts transmission is given by, 0(D I g 2f(a DS I DL ) ), U, (9) which is reqired not to exceed E max by the BS operator. D. Total Latency Next, we consider the overall compting latency. As illstrated in Fig. 1, it is observed the individal data downloading in Phase II cannot start ntil the clodlet completes individal data compting, and the BS finishes the shared data transmission over the downlink. Moreover, for the individal data compting, it cannot start before either the corresponding individal data finishes offloading or the clodlet completes the shared data compting, i.e., max + tl,max tl + tc S. Frthermore, also seen from Fig. 1, for the shared data reslts, it can only start being transmitted in the downlink after the clodlet completes the shared data compting and all the individal data finishes offloading in the plink, i.e., max max tl + t C S,max tl +. Combining the above facts, the total compting latency is expressed as follows: τ = max max +,max tl +t C S+t C, max max tl +t C S,max tl + U. III. PROBLEM FORMULATION + S +, (10) The overall energy consmption at the mobile sers consists of three parts: data offloading over the plink (c.f. (2) and (3)), local compting (c.f. (4)), and reslts retrieving (c.f. (8)), which is ths given by E total = κ 0 (λ 0 D L ) 3 t C,L2 + + DI S DL h 2f(DI )+ h 2f(DI ) ( + )ρ dl. (11) The objective is to minimize the overall energy consmption given by E total, sbject to the compting latency constraints, the maximm local compting freqencies, and the total energy consmption on the individal data at the BS. Specifically, the optimization problem is formlated as below: (P1) : min E total,tl,tc,l,tdl,dl,di (12a) τ T max, U, (12b) 0(D I g 2f(a DI S DL ) ) E max, (12c) 0 t C,L T max, U, (12d) λ 0 D L tc,l f,max, (12e) 0 D L D I DS, I U, (12f) D I = DS,D I I 0, (12g) 0,tl 0,tC,L 0,tdl 0, U. (12h) Constraint (12b) and (12d) gives the latency constraints that the time taken for accomplishing compting tasks cannot excess the maximm allowed length, both for offloading and local compting. (12c) tells that the available energy for downlink transmission of remote compting node shold be lower than a maximm level. (12e) restricts the nmber of allowable local compting bits imposed by local compting capabilities. Besides, (12g) pts that adding all the shared data bits offloaded by all mobile sers respectively, the vale shold be eqal to the exact amont of shared bits existing in the same ser grop. IV. OPTIMAL SCHEME FOR JOINT OFFLOADING AND COMMUNICATION RESOURCE ALLOCATION A. Problem Reformlation Althogh the latency expression (10) looks complex in its from, (12b) is still a convex constraint. For the ease of exposition, we assme herein that the clodlet exectes the shared and the individal compting within the dration of the individal data offloading and the shared reslts downloading, respectively, i.e., t C S tl, and tc tdl, U 1. As a reslt, (12b) can be simplified as below: max +tl +tdl S +tdl T max, U. (13) 1 We assme herein that the comptation capacities at the clodlet is relatively mch higher than those at the mobile sers, and ths the compting time taken is mch shorter than the data transmission time.

4 by introdcing the axiliary variable, which satisfies tdl, U, (13) redces to +tl T max S tdl, U. (14) Notice that E C s (c.f. (4)) is monotonically decreases with respect to the local compting time t C,L for each mobile ser. To obtain the minimal energy consmption, it is obvios that t C,L = T max, U. Then the optimization problem to be solved is reformlated as: (P1 ) : min E total,tl,tdl,tdl,d L,DI (12c 12h),(14). tdl, U. (15a) (15b) (15c) B. Joint offloading and commnication resorce allocation Introdcing dal variables β, ω, σ, ν, the Lagrangian of problem (P1 ) is presented as: L(β,ω,σ,ν,,,,,D,D L ) I = h 2f(DI )+ DI S DL h 2f(DI ) + (λ 0 D L κ )3 0 + ( t C,L2 +tdl )ρdl + β ( + T max + S +tdl )+ ω (λ 0 D L t C,L f,max)+ σ ( tdl ) +ν[ 0(D g 2f(a I DS I DL ) ) E max ], (16) where β = β 1,...,β U are dal variables associated with the latency constraint (14), ω = ω 1,...,ω U are associated with local compting bits constraint (12e)), σ = σ 1,...,σ U are connected with the constraint for axiliary variable, and ν catches the downlink transmission energy constraint (12c). Hence, we have the Lagrangian dal fnction expressed as: g(β,ω,σ,ν) = min L(β,ω,σ,ν,,tl,tdl,tdl,D L,DI,tl,tdl,tdl, D L,DI ), (17) (12f-12h). Conseqently, the corresponding dal problem is formlated as: max g(β,ω,σ,ν) (18) β,ω,σ,ν β 0,ω 0,σ 0,ν 0. Proposition 1. Given a determined set of dal variables β, ω, σ, ν, the optimal soltion to the Lagrangian dal problem (16) can be determined as follows. The optimal primal variables, tl, and, are given by ˆ = ˆ = ˆD I W l ln2 [W 0( 1 e (β h 2, U. (19) 1))+1] D I DI S ˆD L W l ln2 [W 0( 1 e (β h 2, U. (20) 1))+1] ˆ = a 0 (D I DS I ˆD ) L W dl a 0 ln2 [W 0( 1 e ((ρdl +σ ) g 2, U. 1))+1] ν (21) where W 0 (x) is the principle branch of the Lambert W fnction defined as the soltion for W 0 (x)e W0(x) = x [15], e is the base of the natral logarithm; the optimal axiliary variable is given by: 0, ˆ = β σ > 0, (22) T max S, otherwise; and the optimal local compting data size is given by ˆD L = min T max,d I D I S [ ˆr l a 0ˆr dl ln2 3 3κ 0 λ ( 2W l 0 W l h 2 + νa 0 2 W dl W dl g 2 ) ω 3κ 0 λ 2 0, U, where ˆr l = Wl ln2 [W 0( 1 e (β h 2 1)) + 1] and ˆr dl = W dl a [W 0ln2 0( 1 e ((ρdl +σ) g 2 ν 1))+1], U. Proof: Please refer to Appendix A. In fact, on one hand, ˆr l s and ˆr dl s can be interpreted as the optimm transmission rate for the shared/individal data offloading and the individal data downloading, respectively, given the dal variables. On the other hand, for each ser, the optimal transmission rate for the shared data is seen to be identical to that of the individal data over the plink, given that the plink channel gains remain nchanged dring the whole offloading phase. Next, to obtain the optimal offloading bits of the shared data for each ser, i.e., ˆDI, we need the following lemma. Lemma 1. The optimal offloaded shared data for ser is expressed as, D I ˆD I = S, û = arg min, 1 U (23) 0, otherwise, where = f(ˆrl ) ˆr l + β h 2 ˆr l, U. Proof: Please refer to Appendix B. ] +

5 Notable, it is easily observed from Lemma 1 that the shared data is optimally offloaded by one specific ser instead of mltiple ones. Based on Proposition 1, the dal problem can ths be iteratively solved according to ellipsoid method (with constraints), the detail of which can be referred to [16]. The algorithm for solving (P1 ) is smmarized in Table I. TABLE I ALGORITHM I FOR SOLVING(P1 ) Energy consmption ( 10-3 J) Offloading withot considering shared data Fll Offloading Only Proposed Shared data Offloading ALgorithm Offloading with eqal time length Reqire: (β (0),ω (0),σ (0),ν (0) ) 1: repeat 2: Solve (17) given (β (i),ω (i),σ (i),ν (i) ) according to Proposition 1 and obtain ˆ,ˆ,ˆ,ˆ, ˆD, L ˆD I ; 3: pdate the sbgradient of β,ω,σ,ν respectively, i.e., +tl T max + max tdl + tdl, λ 0 D L tc,lf,max, tdl tdl, g 2 f( a 0(D I DS I DL ) ) E max in accordance with the ellipsoid method [16]; 4: ntil the predefined accracy threshold is satisfied. Ensre: The optimal dal variables to the dal problem (18) (β,ω,σ,ν ) 5: Solve (17) again with (β,ω,σ,ν ) Ensre:,tl,,,D L,D V. NUMERICAL RESULTS In this section, the nmerical reslts of the proposed algorithm together with other baseline algorithms are presented. Except for the local compting only scheme where sers execte all the data bits locally, there are three other offloading schemes presented as baseline algorithms: 1) Offloading withot considering the shared data: the collaborative properties are ignored, every ser makes the offloading decision withot coordination among other sers; 2) Fll offloading only: the shared data is taken into consideration, bt the whole chnks of inpt data of every ser are forced to be offloaded to the edge compting node, exclding the local compting capability from participating in the comptation tasks; 3) Offloading with eqal time length: taking the correlated data into consideration, the data offloading and downloading are performed for each ser with eqal time length, with optimal soltions obtained throgh CVX. In the simlation, the bandwidth avaialble is assmed to be W l = W dl =10MHz, the maximm downlink transmit power P max = 1W, and the inpt data size D I = 10kbits for all sers. The spectral density of the (AWGN) power is -169 dbm/hz. The mobile energy expenditre per second in the downlink is ρ dl =0.625 J/s [10], the maximm local compting capability f,max = 1GHz. Besides, λ 0 = cycle/bit, a 0 = 1, κ 0 = The pathloss model is PL = log 10 (d ), where d represents the distance between ser and edge compting node in kilometers. Fig.2 depicts how the energy consmption changes with different latency constraints. The energy consmption are becoming lower as the latency reqirement gets longer for all listed offloading algorithms. Only the proposed offloading scheme can give the lowest energy consming performance Latency Constraint T max (s) Fig. 2. Energy consmption verss different latency constraints The best energy saving improvement can only be achieved throgh the joint participation of local compting and shared data coordination. Besides, even thogh the eqal time length offloading has lower complexity than the proposed algorithm, it cannot compete with the proposed one in terms of energy saving. Recalling or conclsion that the best way to achieve the energy saving is to let these correlated bits transmitted by one specific ser, the reason is that forcing offloading time dration to be eqal makes the shared data to be transmitted by all sers simltaneosly. The energy consmed for compting one data bit increases exponentially as the latency constraint diminishes. Hence for the local compting only scheme, when latency constraint comes to 0.01 second the energy taken to finish the comptation tasks, which is 1000 mjoles, can reach p to nearly 100 times more than those of all the offloading algorithms. Then it drops exponentially to 10 mjoles when the latency constraint goes to 0.1 second. As a reslt, the crve representing local compting only is not added in Fig.2, otherwise the comparison of the offloading schemes will not be clear. In Fig.3, the energy consmption changes with the percentage of shared data is demonstrated. Apparently, as long as we take the shared data into consideration when making offloading decisions, the lower overall energy consmption is achieved when the proportion of shared data gets higher. More energy will be saved when the percentage of shared data gets higher for proposed offloading scheme compared to the scheme withot considering the existence of shared data. This trend applies to the fll offloading only algorithm as well, becase it also cares abot the existence of shared data when making offloading decisions. The energy consmptions for fll offloading only do not always go nder that of offloading withot considering shared data. That is becase when given specific latency constraint, the importance of local compting capabilities diminishes in saving mobile sers energy consmption as the share of common data increases. Since most of the data will be offloaded to the edge node, few inpt bits wold remain local for compting. Then the energy consmption of the fll offloading only scenario represents that it get closer to that of the proposed algorithm when the percentage of shared data increases. Similar trend applies to the eqal time length offloading as well. t C S = λ 0D I S/F (24)

6 12 10 Offloading withot considering shared data Offloading with eqal time length Fll Offloading Only Proposed Shared Data Offloading Algorithm with DI, the partial Lagrangian is expressed as ˆr l min D I L = [ tl h 2f(DI )+β ] Energy consmption ( 10-3 J) = [ D I D ˆr l h 2f(ˆrl I )+β ˆr l = D I ] (24a) Percentage of shared data (%) Fig. 3. Energy consmption verss different percentage of shared data VI. CONCLUSIONS In this paper, a mlti-ser fog compting system was considered, in which mltiple single-antenna mobile sers rnning applications featring shared data can partially offload their individal comptation tasks to a nearby singleantenna clodlet and then download the reslts from it. The mobile sers energy consmption minimization problem sbject to the total latency, the total downlink transmission energy and the local compting constraints was formlated as a convex problem with the optimal soltion obtained by classical Lagrangian dality method. Based pon the semi-closed form soltion, it was proved that the shared data is optimally transmitted by only one of the mobile sers instead of mltiple ones collaboratively. The proposed joint comptation offloading and commnications resorce allocation was verified by simlations against other baseline algorithms that ignore the shared data property or the mobile sers own compting capabilities.. APPENDIX A In order to find the optimal soltions of the primary problem, we need to examine the related partial derivatives L L L L,,,, L, L, U. After obtaining D L D I t l these partial derivatives, the KKT conditions can be applied to find the optimal soltions. For example, let L D L and L D I eqal to 0. The inverse fnction of y = f(x) xf (x) for x > 0 is given by x = Wl [W0( y ln2 e 1 ) + 1]. Then it follows that e f(ˆr ) l ˆr f l (ˆr ) l = f(ˆr l ) ˆr l f (ˆr l ) = β h 2, and the optimal plink transmission rate of the shared data ˆr l and that of the exclsively offloaded data ˆr l are ths derived. Then the expressions of the optimal primary variables are readily obtained as shown in (19), (20), (21), (22), (23), and (23). APPENDIX B To obtain how the shared inpt data offloading ˆD I are distribted among sers, we need to examine the partial Lagrangian regarding D I and. Replacing the shared data offloading time be D I = DS,D I I 0, U, (24b) where we define = f(ˆrl ) β + as a constant given the ˆr l h 2 ˆr l dal variable β s. As a reslt, the optimal soltion to the linear programming (LP) (24) is easily obtained as shown in (23). REFERENCES [1] Y. Mao, C. Yo, J. Zhang, K. Hang, and K. B. Letaief, A srvey on mobile edge compting: The commnication perspective, Commn. Srveys Tts., vol. 19, pp , Forth Qarter [2] F. Bonomi, R. Milito, J. Zh, and S. Addepalli, Fog compting and its role in the Internet of Things, in Proc. ACM SIGCOMM Workshop on Mobile Clod Compting (MCC), (Helsinki, Finland), Ag [3] W. Zhang, Y. Wen, K. Gan, D. Kilper, H. Lo, and D. O. W, Energy-optimal mobile clod compting nder stochastic wireless channel, IEEE Trans. Wireless Commn., vol. 12, pp , September [4] J. Kwak, Y. Kim, J. Lee, and S. Chong, Dream: Dynamic resorce and task allocation for energy minimization in mobile clod systems, IEEE J. Sel. Areas Commn., vol. 33, pp , Dec [5] C. Yo, K. Hang, and H. Chae, Energy efficient mobile clod compting powered by wireless energy transfer, IEEE J. Sel. Areas Commn., vol. 34, pp , May [6] Y. D. Lin, E. T. H. Ch, Y. C. Lai, and T. J. Hang, Time-and-energyaware comptation offloading in handheld devices to coprocessors and clods, IEEE Syst. J., vol. 9, pp , Jne [7] R. Kaewpang, D. Niyato, P. Wang, and E. Hossain, A framework for cooperative resorce management in mobile clod compting, IEEE J. Sel. Areas Commn., vol. 31, pp , December [8] J. Cheng, Y. Shi, B. Bai, and W. Chen, Comptation offloading in clod-ran based mobile clod compting system, in 2016 IEEE International Conference on Commnications (ICC), pp. 1 6, May [9] X. Chen, Decentralized comptation offloading game for mobile clod compting, IEEE Trans. Parallel Distrib. Syst., vol. 26, pp , April [10] A. Al-Shwaili and O. Simeone, Energy-efficient resorce allocation for mobile edge compting-based agmented reality applications, IEEE Wireless Commn. Lett., vol. 6, pp , Jne [11] J. Park, P. Popovski, and O. Simeone, Minimizing latency to spport VR social interactions over wireless celllar systems via bandwidth allocation, IEEE Wireless Commn. Lett., pp. 1 1, [12] M. Chen, W. Saad, C. Yin, and M. Debbah, Echo state transfer learning for data correlation aware resorce allocation in wireless virtal reality, in st Asilomar Conference on Signals, Systems, and Compters, pp , Oct [13] R. Wolski, S. Grn, C. Krintz, and D. Nrmi, Using bandwidth data to make comptation offloading decisions, in 2008 IEEE International Symposim on Parallel and Distribted Processing, pp. 1 8, April [14] H. Xing, L. Li, J. X, and A. Nallanathan, Joint task assignment and wireless resorce allocation for cooperative mobile-edge compting, Proc. IEEE International Conference on Commnications (ICC), May [15] F. Wang, J. X, X. Wang, and S. Ci, Joint offloading and compting optimization in wireless powered mobile-edge compting systems, IEEE Trans. on Wireless Commn., vol. 17, pp , March [16] S. Boyd, Lectre notes for EE364b: Convex Optimization II.

The Disciplined Flood Protocol in Sensor Networks

The Disciplined Flood Protocol in Sensor Networks The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab

More information

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment

More information

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks Cost Based Local Forwarding Transmission Schemes for Two-hop Celllar Networks Zhenggang Zhao, Xming Fang, Yan Long, Xiaopeng H, Ye Zhao Key Lab of Information Coding & Transmission Sothwest Jiaotong University,

More information

IoT-Cloud Service Optimization in Next Generation Smart Environments

IoT-Cloud Service Optimization in Next Generation Smart Environments 1 IoT-Clod Service Optimization in Next Generation Smart Environments Marc Barcelo, Alejandro Correa, Jaime Llorca, Antonia M. Tlino, Jose Lopez Vicario, Antoni Morell Universidad Atonoma de Barcelona,

More information

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity

More information

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz

More information

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna

More information

What s New in AppSense Management Suite Version 7.0?

What s New in AppSense Management Suite Version 7.0? What s New in AMS V7.0 What s New in AppSense Management Site Version 7.0? AppSense Management Site Version 7.0 is the latest version of the AppSense prodct range and comprises three prodct components,

More information

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,

More information

Constructing Multiple Light Multicast Trees in WDM Optical Networks

Constructing Multiple Light Multicast Trees in WDM Optical Networks Constrcting Mltiple Light Mlticast Trees in WDM Optical Networks Weifa Liang Department of Compter Science Astralian National University Canberra ACT 0200 Astralia wliang@csaneda Abstract Mlticast roting

More information

p-norm MINIMIZATION OVER INTERSECTIONS OF CONVEX SETS İlker Bayram

p-norm MINIMIZATION OVER INTERSECTIONS OF CONVEX SETS İlker Bayram p-norm MINIMIZATION OVER INTERSECTIONS OF CONVEX SETS İlker Bayram Istanbl Technical University, Department of Electronics and Telecommnications Engineering, Istanbl, Trkey ABSTRACT We consider the imization

More information

Date: December 5, 1999 Dist'n: T1E1.4

Date: December 5, 1999 Dist'n: T1E1.4 12/4/99 1 T1E14/99-559 Project: T1E14: VDSL Title: Vectored VDSL (99-559) Contact: J Cioffi, G Ginis, W Y Dept of EE, Stanford U, Stanford, CA 945 Cioffi@stanforded, 1-65-723-215, F: 1-65-724-3652 Date:

More information

StaCo: Stackelberg-based Coverage Approach in Robotic Swarms

StaCo: Stackelberg-based Coverage Approach in Robotic Swarms Maastricht University Department of Knowledge Engineering Technical Report No.:... : Stackelberg-based Coverage Approach in Robotic Swarms Kateřina Staňková, Bijan Ranjbar-Sahraei, Gerhard Weiss, Karl

More information

Image Denoising Algorithms

Image Denoising Algorithms Image Denoising Algorithms Xiang Hao School of Compting, University of Utah, USA, hao@cs.tah.ed Abstract. This is a report of an assignment of the class Mathematics of Imaging. In this assignment, we first

More information

A sufficient condition for spiral cone beam long object imaging via backprojection

A sufficient condition for spiral cone beam long object imaging via backprojection A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY 2007 1 On the Analysis of the Bletooth Time Division Dplex Mechanism Gil Zssman Member, IEEE, Adrian Segall Fellow, IEEE, and Uri Yechiali

More information

Minimal Edge Addition for Network Controllability

Minimal Edge Addition for Network Controllability This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,

More information

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read. The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5

More information

Tdb: A Source-level Debugger for Dynamically Translated Programs

Tdb: A Source-level Debugger for Dynamically Translated Programs Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,

More information

Multi-lingual Multi-media Information Retrieval System

Multi-lingual Multi-media Information Retrieval System Mlti-lingal Mlti-media Information Retrieval System Shoji Mizobchi, Sankon Lee, Fmihiko Kawano, Tsyoshi Kobayashi, Takahiro Komats Gradate School of Engineering, University of Tokshima 2-1 Minamijosanjima,

More information

Optimal Sampling in Compressed Sensing

Optimal Sampling in Compressed Sensing Optimal Sampling in Compressed Sensing Joyita Dtta Introdction Compressed sensing allows s to recover objects reasonably well from highly ndersampled data, in spite of violating the Nyqist criterion. In

More information

Broadcasting XORs: On the Application of Network Coding in Access Point-to-Multipoint Networks

Broadcasting XORs: On the Application of Network Coding in Access Point-to-Multipoint Networks Broadcasting XORs: On the Application of Network Coding in Access Point-to-Mltipoint Networks The MIT Faclty has made this article openly available Please share how this access benefits yo Yor story matters

More information

The single-cycle design from last time

The single-cycle design from last time lticycle path Last time we saw a single-cycle path and control nit for or simple IPS-based instrction set. A mlticycle processor fies some shortcomings in the single-cycle CPU. Faster instrctions are not

More information

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands

More information

A choice relation framework for supporting category-partition test case generation

A choice relation framework for supporting category-partition test case generation Title A choice relation framework for spporting category-partition test case generation Athor(s) Chen, TY; Poon, PL; Tse, TH Citation Ieee Transactions On Software Engineering, 2003, v. 29 n. 7, p. 577-593

More information

Millimeter-Wave Multi-Hop Wireless Backhauling for 5G Cellular Networks

Millimeter-Wave Multi-Hop Wireless Backhauling for 5G Cellular Networks 2017 IEEE 85th Vehiclar Technology Conference (VTC-Spring) Millimeter-Wave Mlti-Hop Wireless Backhaling for 5G Celllar Networks B. P. S. Sahoo, Chn-Han Yao, and Hng-Y Wei Gradate Institte of Electrical

More information

Collision Avoidance and Resolution Multiple Access: First-Success Protocols

Collision Avoidance and Resolution Multiple Access: First-Success Protocols Collision Avoidance and Resoltion Mltiple Access: First-Sccess Protocols Rodrigo Garcés and J.J. Garcia-Lna-Aceves askin Center for Compter Engineering and Information Sciences University of California

More information

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods Annals of Operations Research 106, 19 46, 2001 2002 Klwer Academic Pblishers. Manfactred in The Netherlands. Discrete Cost Mlticommodity Network Optimization Problems and Exact Soltion Methods MICHEL MINOUX

More information

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,

More information

Master for Co-Simulation Using FMI

Master for Co-Simulation Using FMI Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany

More information

Evaluating Influence Diagrams

Evaluating Influence Diagrams Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will

More information

Networks An introduction to microcomputer networking concepts

Networks An introduction to microcomputer networking concepts Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES

More information

Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks

Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks 1 Efficient Schedling for Periodic Aggregation Qeries in Mltihop Sensor Networks XiaoHa X, Shaojie Tang, Member, IEEE, XiangYang Li, Senior Member, IEEE Abstract In this work, we stdy periodic qery schedling

More information

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003 From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information

More information

The extra single-cycle adders

The extra single-cycle adders lticycle Datapath As an added bons, we can eliminate some of the etra hardware from the single-cycle path. We will restrict orselves to sing each fnctional nit once per cycle, jst like before. Bt since

More information

Statistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem

Statistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem Statistical Methods in fnctional MRI Lectre 7: Mltiple Comparisons 04/3/13 Martin Lindqist Department of Biostatistics Johns Hopkins University Data Processing Pipeline Standard Analysis Data Acqisition

More information

Comparison of memory write policies for NoC based Multicore Cache Coherent Systems

Comparison of memory write policies for NoC based Multicore Cache Coherent Systems Comparison of memory write policies for NoC based Mlticore Cache Coherent Systems Pierre Gironnet de Massas, Frederic Petrot System-Level Synthesis Grop TIMA Laboratory 46, Av Felix Viallet, 38031 Grenoble,

More information

5 Performance Evaluation

5 Performance Evaluation 5 Performance Evalation his chapter evalates the performance of the compared to the MIP, and FMIP individal performances. We stdy the packet loss and the latency to restore the downstream and pstream of

More information

Making Full Use of Multi-Core ECUs with AUTOSAR Basic Software Distribution

Making Full Use of Multi-Core ECUs with AUTOSAR Basic Software Distribution Making Fll Use of Mlti-Core ECUs with AUTOSAR Basic Software Distribtion Webinar V0.1 2018-09-07 Agenda Motivation for Mlti-Core AUTOSAR Standard: SWC-Split MICROSAR Extension: BSW-Split BSW-Split: Technical

More information

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code:

Prof. Kozyrakis. 1. (10 points) Consider the following fragment of Java code: EE8 Winter 25 Homework #2 Soltions De Thrsday, Feb 2, 5 P. ( points) Consider the following fragment of Java code: for (i=; i

More information

Computer-Aided Mechanical Design Using Configuration Spaces

Computer-Aided Mechanical Design Using Configuration Spaces Compter-Aided Mechanical Design Using Configration Spaces Leo Joskowicz Institte of Compter Science The Hebrew University Jersalem 91904, Israel E-mail: josko@cs.hji.ac.il Elisha Sacks (corresponding athor)

More information

Cautionary Aspects of Cross Layer Design: Context, Architecture and Interactions

Cautionary Aspects of Cross Layer Design: Context, Architecture and Interactions Cationary Aspects of Cross Layer Design: Context, Architectre and Interactions Vikas Kawadia and P. R. Kmar Dept. of Electrical and Compter Engineering, and Coordinated Science Lab University of Illinois,

More information

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT PAAMETE OPTIMIZATION FO TAKAGI-SUGENO FUZZY MODELS LESSONS LEANT Manfred Männle Inst. for Compter Design and Falt Tolerance Univ. of Karlsrhe, 768 Karlsrhe, Germany maennle@compter.org Brokat Technologies

More information

EMC ViPR. User Guide. Version

EMC ViPR. User Guide. Version EMC ViPR Version 1.1.0 User Gide 302-000-481 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is accrate

More information

Unit Testing with VectorCAST and AUTOSAR

Unit Testing with VectorCAST and AUTOSAR Unit Testing with VectorCAST and AUTOSAR Vector TechDay Software Testing with VectorCAST V1.0 2018-11-15 Agenda Introdction Unit Testing Demo Working with AUTOSAR Generated Code Unit Testing AUTOSAR SWCs

More information

NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS

NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS ETWORK PRESERVATIO THROUGH A TOPOLOGY COTROL ALGORITHM FOR WIRELESS MESH ETWORKS F. O. Aron, T. O. Olwal, A. Krien, Y. Hamam Tshwane University of Technology, Pretoria, Soth Africa. Dept of the French

More information

Real-time mean-shift based tracker for thermal vision systems

Real-time mean-shift based tracker for thermal vision systems 9 th International Conference on Qantitative InfraRed Thermography Jly -5, 008, Krakow - Poland Real-time mean-shift based tracker for thermal vision systems G. Bieszczad* T. Sosnowski** * Military University

More information

New Architectures for Hierarchical Predictive Control

New Architectures for Hierarchical Predictive Control Preprint, 11th IFAC Symposim on Dynamics and Control of Process Systems, inclding Biosystems Jne 6-8, 216. NTNU, Trondheim, Norway New Architectres for Hierarchical Predictive Control Victor M. Zavala

More information

TAKING THE PULSE OF ICT IN HEALTHCARE

TAKING THE PULSE OF ICT IN HEALTHCARE ICT TODAY THE OFFICIAL TRADE JOURNAL OF BICSI Janary/Febrary 2016 Volme 37, Nmber 1 TAKING THE PULSE OF ICT IN HEALTHCARE + PLUS + High-Power PoE + Using HDBaseT in AV Design for Schools + Focs on Wireless

More information

DIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES

DIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES DIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES Binh-Son Ha 1 Imari Sato 2 Kok-Lim Low 1 1 National University of Singapore 2 National Institte of Informatics, Tokyo, Japan ABSTRACT Dal

More information

Constructing and Comparing User Mobility Profiles for Location-based Services

Constructing and Comparing User Mobility Profiles for Location-based Services Constrcting and Comparing User Mobility Profiles for Location-based Services Xihi Chen Interdisciplinary Centre for Secrity, Reliability and Trst, University of Lxemborg Jn Pang Compter Science and Commnications,

More information

Secure Biometric-Based Authentication for Cloud Computing

Secure Biometric-Based Authentication for Cloud Computing Secre Biometric-Based Athentication for Clod Compting Kok-Seng Wong * and Myng Ho Kim School of Compter Science and Engineering, Soongsil University, Sangdo-Dong Dongjak-G, 156-743 Seol Korea {kswong,kmh}@ss.ac.kr

More information

Isilon InsightIQ. Version 2.5. User Guide

Isilon InsightIQ. Version 2.5. User Guide Isilon InsightIQ Version 2.5 User Gide Pblished March, 2014 Copyright 2010-2014 EMC Corporation. All rights reserved. EMC believes the information in this pblication is accrate as of its pblication date.

More information

This chapter is based on the following sources, which are all recommended reading:

This chapter is based on the following sources, which are all recommended reading: Bioinformatics I, WS 09-10, D. Hson, December 7, 2009 105 6 Fast String Matching This chapter is based on the following sorces, which are all recommended reading: 1. An earlier version of this chapter

More information

arxiv: v1 [cs.cg] 26 Sep 2018

arxiv: v1 [cs.cg] 26 Sep 2018 Convex partial transversals of planar regions arxiv:1809.10078v1 [cs.cg] 26 Sep 2018 Vahideh Keikha Department of Mathematics and Compter Science, University of Sistan and Balchestan, Zahedan, Iran va.keikha@gmail.com

More information

Fault Tolerance in Hypercubes

Fault Tolerance in Hypercubes Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different

More information

LWIP and Wi-Fi Boost Flow Control

LWIP and Wi-Fi Boost Flow Control LWIP and Wi-Fi Boost Flow Control David López-Pérez 1, Jonathan Ling 1, Bong Ho Kim 1, Vasdevan Sbramanian 1, Satish Kangovi 1, Ming Ding 2 1 Nokia Bell Laboratories 2 Data61, Astralia Abstract 3GPP LWIP

More information

Tu P7 15 First-arrival Traveltime Tomography with Modified Total Variation Regularization

Tu P7 15 First-arrival Traveltime Tomography with Modified Total Variation Regularization T P7 15 First-arrival Traveltime Tomography with Modified Total Variation Reglarization W. Jiang* (University of Science and Technology of China) & J. Zhang (University of Science and Technology of China)

More information

Method to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot

Method to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot Method to bild an initial adaptive Nero-Fzzy controller for joints control of a legged robot J-C Habmremyi, P. ool and Y. Badoin Royal Military Academy-Free University of Brssels 08 Hobbema str, box:mrm,

More information

Illumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY

Illumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY Illmina LIMS Software Gide Jne 2017 ILLUMINA PROPRIETARY This docment and its contents are proprietary to Illmina, Inc. and its affiliates ("Illmina"), and are intended solely for the contractal se of

More information

DVR 630/650 Series. Video DVR 630/650 Series. 8/16-Channel real-time recording with CIF resolution. Flexible viewing with two monitor outputs

DVR 630/650 Series. Video DVR 630/650 Series. 8/16-Channel real-time recording with CIF resolution. Flexible viewing with two monitor outputs Video DVR 630/650 Series DVR 630/650 Series 8/16-Channel real-time recording with resoltion Flexible viewing with two monitor otpts Remote viewing, playback, control, and configration Easy Pan/Tilt/Zoom

More information

PERFORMANCE EVALUATION AND HILS TEST OF CONTROL ALLOCATION METHODS FOR RECONFIGURATION CONTROL

PERFORMANCE EVALUATION AND HILS TEST OF CONTROL ALLOCATION METHODS FOR RECONFIGURATION CONTROL 6 TH INTENATIONA CONGESS OF THE AEONAUTICA SCIENCES Abstract PEFOMANCE EVAUATION AND HIS TEST OF CONTO AOCATION METHODS FO ECONFIGUATION CONTO Byong-Mn Min*, Bong-J Kim**, Eng-Tai Kim***, and Min-Jea Tahk*

More information

Maximum Weight Independent Sets in an Infinite Plane

Maximum Weight Independent Sets in an Infinite Plane Maximm Weight Independent Sets in an Infinite Plane Jarno Nosiainen, Jorma Virtamo, Pasi Lassila jarno.nosiainen@tkk.fi, jorma.virtamo@tkk.fi, pasi.lassila@tkk.fi Department of Commnications and Networking

More information

An Optimization of Granular Network by Evolutionary Methods

An Optimization of Granular Network by Evolutionary Methods An Optimization of Granlar Networ by Evoltionary Methods YUN-HEE HAN, KEUN-CHANG KWAK* Dept. of Control, Instrmentation, and Robot Engineering Chosn University 375 Seos-dong, Dong-g, Gwangj, 50-759 Soth

More information

Picking and Curves Week 6

Picking and Curves Week 6 CS 48/68 INTERACTIVE COMPUTER GRAPHICS Picking and Crves Week 6 David Breen Department of Compter Science Drexel University Based on material from Ed Angel, University of New Mexico Objectives Picking

More information

Alliances and Bisection Width for Planar Graphs

Alliances and Bisection Width for Planar Graphs Alliances and Bisection Width for Planar Graphs Martin Olsen 1 and Morten Revsbæk 1 AU Herning Aarhs University, Denmark. martino@hih.a.dk MADAGO, Department of Compter Science Aarhs University, Denmark.

More information

Local Run Manager. Software Reference Guide for MiSeqDx

Local Run Manager. Software Reference Guide for MiSeqDx Local Rn Manager Software Reference Gide for MiSeqDx Local Rn Manager Overview 3 Dashboard Overview 4 Administrative Settings and Tasks 7 Workflow Overview 12 Technical Assistance 17 Docment # 1000000011880

More information

Multiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET

Multiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET Mltiple-Choice Test Chapter 09.0 Golden Section Search Method Optimization COMPLETE SOLUTION SET. Which o the ollowing statements is incorrect regarding the Eqal Interval Search and Golden Section Search

More information

Designing and Optimization of Heterogeneous OTN/DWDM Networks with Intermediate Grooming

Designing and Optimization of Heterogeneous OTN/DWDM Networks with Intermediate Grooming Designing and Optimization of Heterogeneos OTN/DWDM Networks with Intermediate Grooming Afonso Oliveira IST (METI afonso.oliveira@ist.tl.pt ABSTRACT The coexistence of annels with different bitrates in

More information

Hardware-Accelerated Free-Form Deformation

Hardware-Accelerated Free-Form Deformation Hardware-Accelerated Free-Form Deformation Clint Cha and Ulrich Nemann Compter Science Department Integrated Media Systems Center University of Sothern California Abstract Hardware-acceleration for geometric

More information

Adaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model

Adaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model International Jornal of Knowledge Engineering, Vol. 1, No. 2, September 215 Adaptie Inflence Maximization in Microblog nder the Competitie Independent Cascade Model Zheng Ding, Kai Ni, and Zhiqiang He

More information

AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING

AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING Mingsheng LIAO, Li ZHANG, Zxn ZHANG, Jiangqing ZHANG Whan Technical University of Srveying and Mapping, Natinal Lab. for Information Eng. in

More information

POWER-OF-2 BOUNDARIES

POWER-OF-2 BOUNDARIES Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of

More information

EECS 487: Interactive Computer Graphics f

EECS 487: Interactive Computer Graphics f Interpolating Key Vales EECS 487: Interactive Compter Graphics f Keys Lectre 33: Keyframe interpolation and splines Cbic splines The key vales of each variable may occr at different frames The interpolation

More information

STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWORK DYNAMICS FOR STATIC OPTIMIZATION

STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWORK DYNAMICS FOR STATIC OPTIMIZATION STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWOR DYNAMICS FOR STATIC OPTIMIZATION Grsel Serpen and Yifeng X Electrical Engineering and Compter Science Department, The University of Toledo, Toledo, OH

More information

Neighbourhood Searches for the Bounded Diameter Minimum Spanning Tree Problem Embedded in a VNS, EA, and ACO

Neighbourhood Searches for the Bounded Diameter Minimum Spanning Tree Problem Embedded in a VNS, EA, and ACO Neighborhood Searches for the Bonded Diameter Minimm Spanning Tree Problem Embedded in a VNS, EA, and ACO Martin Grber Institte for Compter Graphics and Algorithms, Vienna University of Technology, Favoritenstraße

More information

Towards Understanding Bilevel Multi-objective Optimization with Deterministic Lower Level Decisions

Towards Understanding Bilevel Multi-objective Optimization with Deterministic Lower Level Decisions Towards Understanding Bilevel Mlti-objective Optimization with Deterministic Lower Level Decisions Ankr Sinha Ankr.Sinha@aalto.fi Department of Information and Service Economy, Aalto University School

More information

Efficient and Accurate Delaunay Triangulation Protocols under Churn

Efficient and Accurate Delaunay Triangulation Protocols under Churn Efficient and Accrate Delanay Trianglation Protocols nder Chrn Dong-Yong Lee and Simon S. Lam Department of Compter Sciences The University of Texas at Astin {dylee, lam}@cs.texas.ed November 9, 2007 Technical

More information

h-vectors of PS ear-decomposable graphs

h-vectors of PS ear-decomposable graphs h-vectors of PS ear-decomposable graphs Nima Imani 2, Lee Johnson 1, Mckenzie Keeling-Garcia 1, Steven Klee 1 and Casey Pinckney 1 1 Seattle University Department of Mathematics, 901 12th Avene, Seattle,

More information

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems Congestion-adaptive Data Collection with Accracy Garantee in Cyber-Physical Systems Nematollah Iri, Lei Y, Haiying Shen, Gregori Calfield Department of Electrical and Compter Engineering, Clemson University,

More information

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING International Jornal of Modern Engineering Research (IJMER) www.imer.com Vol.1, Isse1, pp-134-139 ISSN: 2249-6645 IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING

More information

Lecture 13: Traffic Engineering

Lecture 13: Traffic Engineering Lectre 13: Traffic Engineering CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Mike Freedman, Nick Feamster, and Ming Zhang Lectre 13 Overview Dealing with mltiple paths Mltihoming Entact

More information

Lecture 4: Routing. CSE 222A: Computer Communication Networks Alex C. Snoeren. Thanks: Amin Vahdat

Lecture 4: Routing. CSE 222A: Computer Communication Networks Alex C. Snoeren. Thanks: Amin Vahdat Lectre 4: Roting CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Amin Vahdat Lectre 4 Overview Pop qiz Paxon 95 discssion Brief intro to overlay and active networking 2 End-to-End Roting

More information

Appearance Based Tracking with Background Subtraction

Appearance Based Tracking with Background Subtraction The 8th International Conference on Compter Science & Edcation (ICCSE 213) April 26-28, 213. Colombo, Sri Lanka SD1.4 Appearance Based Tracking with Backgrond Sbtraction Dileepa Joseph Jayamanne Electronic

More information

dss-ip Manual digitalstrom Server-IP Operation & Settings

dss-ip Manual digitalstrom Server-IP Operation & Settings dss-ip digitalstrom Server-IP Manal Operation & Settings Table of Contents digitalstrom Table of Contents 1 Fnction and Intended Use... 3 1.1 Setting p, Calling p and Operating... 3 1.2 Reqirements...

More information

A Wireless MAC Protocol comparison.

A Wireless MAC Protocol comparison. Doc: IEEE P82.1192S1 IEEE 82.11 Wireless Access Method and Physical Layer Specifications Title: Presented by: A Wireless MAC Protocol comparison. Wim Diepstraten NCR SEUtrecht NCRAT&T Network Prodct Grop

More information

Augmenting the edge connectivity of planar straight line graphs to three

Augmenting the edge connectivity of planar straight line graphs to three Agmenting the edge connectivity of planar straight line graphs to three Marwan Al-Jbeh Mashhood Ishaqe Kristóf Rédei Diane L. Sovaine Csaba D. Tóth Pavel Valtr Abstract We characterize the planar straight

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 53 Design of Operating Systems Spring 8 Lectre 2: Virtal Memory Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Recap: cache Well-written programs exhibit

More information

Image Compression Compression Fundamentals

Image Compression Compression Fundamentals Compression Fndamentals Data compression refers to the process of redcing the amont of data reqired to represent given qantity of information. Note that data and information are not the same. Data refers

More information

Fast Obstacle Detection using Flow/Depth Constraint

Fast Obstacle Detection using Flow/Depth Constraint Fast Obstacle etection sing Flow/epth Constraint S. Heinrich aimlerchrylser AG P.O.Box 2360, -89013 Ulm, Germany Stefan.Heinrich@aimlerChrysler.com Abstract The early recognition of potentially harmfl

More information

TDT4255 Friday the 21st of October. Real world examples of pipelining? How does pipelining influence instruction

TDT4255 Friday the 21st of October. Real world examples of pipelining? How does pipelining influence instruction Review Friday the 2st of October Real world eamples of pipelining? How does pipelining pp inflence instrction latency? How does pipelining inflence instrction throghpt? What are the three types of hazard

More information

Pipelining. Chapter 4

Pipelining. Chapter 4 Pipelining Chapter 4 ake processor rns faster Pipelining is an implementation techniqe in which mltiple instrctions are overlapped in eection Key of making processor fast Pipelining Single cycle path we

More information

Object Pose from a Single Image

Object Pose from a Single Image Object Pose from a Single Image How Do We See Objects in Depth? Stereo Use differences between images in or left and right eye How mch is this difference for a car at 00 m? Moe or head sideways Or, the

More information

Subgraph Matching with Set Similarity in a Large Graph Database

Subgraph Matching with Set Similarity in a Large Graph Database 1 Sbgraph Matching with Set Similarity in a Large Graph Database Liang Hong, Lei Zo, Xiang Lian, Philip S. Y Abstract In real-world graphs sch as social networks, Semantic Web and biological networks,

More information

VirtuOS: an operating system with kernel virtualization

VirtuOS: an operating system with kernel virtualization VirtOS: an operating system with kernel virtalization Rslan Nikolaev, Godmar Back SOSP '13 Proceedings of the Twenty-Forth ACM Symposim on Oper ating Systems Principles 이영석, 신현호, 박재완 Index Motivation Design

More information

A Recovery Algorithm for Reliable Multicasting in Reliable Networks

A Recovery Algorithm for Reliable Multicasting in Reliable Networks A Recovery Algorithm for Reliable Mlticasting in Reliable Networks Danyang Zhang Sibabrata Ray Dept. of Compter Science University of Alabama Tscaloosa, AL 35487 {dzhang, sib}@cs.a.ed Ragopal Kannan S.

More information

Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN:

Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: 1137-3601 revista@aepia.org Asociación Española para la Inteligencia Artificial España Zaballos, Lis J.; Henning, Gabriela

More information

A GENERIC MODEL OF A BASE-ISOLATED BUILDING

A GENERIC MODEL OF A BASE-ISOLATED BUILDING Chapter 5 A GENERIC MODEL OF A BASE-ISOLATED BUILDING This chapter draws together the work o Chapters 3 and 4 and describes the assembly o a generic model o a base-isolated bilding. The irst section describes

More information

Today s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of

Today s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of Today s Lectre Lectre 27: Introdction to Software Architectre Kenneth M. Anderson Fondations of Software Engineering CSCI 5828 - Spring Semester, 1999 Introdction and Backgrond of Software Architectre

More information

High-Throughput Data Detection for Massive MU-MIMO-OFDM using Coordinate Descent. Michael Wu, Chris Dick, Joseph R. Cavallaro, and Christoph Studer

High-Throughput Data Detection for Massive MU-MIMO-OFDM using Coordinate Descent. Michael Wu, Chris Dick, Joseph R. Cavallaro, and Christoph Studer 1 High-Throghpt Data Detection for Massive MU-MIMO-OFDM sing Coordinate Descent Michael W, Chris Dick, Joseph R. Cavallaro, and Christoph Stder Abstract Data detection in massive mlti-ser (MU) mltipleinpt

More information