Energy-Efficient Mobile-Edge Computation Offloading for Applications with Shared Data
|
|
- Juliana Perkins
- 5 years ago
- Views:
Transcription
1 Energy-Efficient Mobile-Edge Comptation Offloading for Applications with Shared Data Xiangy He, Hong Xing, Ye Chen, Armgam Nallanathan School of Electronic Engineering and Compter Science Qeen Mary University of London, London, UK xiangy.he, h.xing, ye.chen, arxiv: v1 [cs.it] 4 Sep 2018 Abstract Mobile-edge comptation offloading (MECO) has been recognized as a promising soltion to alleviate the brden of resorce-limited Internet of Thing (IoT) devices by offloading comptation tasks to the edge of celllar networks (also known as clodlet). Specifically, latency-critical applications sch as virtal reality (VR) and agmented reality (AR) have inherent collaborative properties since part of the inpt/otpt data are shared by different sers in proximity. In this paper, we consider a mlti-ser fog compting system, in which mltiple single-antenna mobile sers rnning applications featring shared data can choose between (partially) offloading their individal tasks to a nearby single-antenna clodlet for remote exection and performing pre local comptation. The mobile sers energy minimization is formlated as a convex problem, sbject to the total compting latency constraint, the total energy constraints for individal data downloading, and the compting freqency constraints for local compting, for which classical Lagrangian dality can be applied to find the optimal soltion. Based pon the semi-closed form soltion, the shared data proves to be transmitted by only one of the mobile sers instead of mltiple ones. Besides, compared to those baseline algorithms withot considering the shared data property or the mobile sers local compting capabilities, the proposed joint comptation offloading and commnications resorce allocation provides significant energy saving. I. INTRODUCTION With the advent of the era of Internet of Things (IoT), the nprecedented growth of latency-critical applications are nevertheless hardly satisfied by mobile clod compting (MCC) alone. To cater for the low-latency reqirements while alleviating the brden over backhal networks, mobileedge compting (MEC), also interchangeably known as fog compting has arosed a paradigm shift by extending clod capabilities to the very edge within the radio access network (RAN) (see [1] and the references therein). Both indstry and academia have devoted constant effort to providing the next generation mobile networks with ltra-reliable low latency commnications (RLLC). Among pioneering indstrialization on fog compting, Cisco has proposed fog compting as a promising candidate for IoT architectre [2]. In academics, [3] [6] focsed on one-toone offloading scheme where there is one mobile ser and one corresponding clodlet, [7] [8] presented mltiple-ser cases where there are mltiple edge servers, while [9] related to mltiple-to-one scenarios where mltiple mobile sers offload compting to one edge server. Recently, the intrinsic collaborative properties of the inpt data for comptation offloading was investigated for agmented reality (AR) in [10]. In fact, in many mobile applications sch as agmented reality (AR) and virtal reality (VR), mltiple mobile devices share parts of compting inpt/otpt in common, ths making it possible for frther redcing compting latency at the edge. In [11], some important insights on the interplay among the social interactions in the VR mobile social network was revealed, and a significant redce on the end-to-end latency was achieved throgh stochastic optimization techniqe. [12] investigated potential spatial data correlation for VR applications to minimize the delay of accomplishing comptation. On another front, joint optimization of comptation offloading with commnications resorces (sch as power, bandwidth, and rate) proves to improve the performance of fog compting by explicitly taking channel conditions and commnications constraints into accont. In an early research [13], the offloading decision making was examined throgh the estimation of bandwidth data withot considering the allocation of commnication resorces and channel conditions. For commnications-aware comptation offloading, [14] minimized the local ser s comptation latency in a mlti-ser cooperative scenario, while [15] minimized the energy consmption of remote fog compting nodes. However, these line of work have not taken the shared data featre aforementioned into accont, ths failing to flly reap the advantage of fog compting. In this paper, we consider a mlti-ser fog compting system, in which mltiple single-antenna mobile sers rnning applications featring shared data can choose between (partially) offloading their compting tasks to a nearby single-antenna clodlet and execting them locally, and then download the reslts from the clodlet. Mobile sers overall energy consmption is minimized via joint optimization of comptation offloading and commnications resorce allocation. Compared with existing literatre, e.g., [10], althogh it investigated the energy minimization problem of shareddata featred offloading, it did not find the optimal soltion. Moreover, it did not draw explicit conclsion regarding the channel condition s inflence in the comptation offloading. From this point of view, or work provides in-depth nderstanding of the shared-data featred offloading in MEC systems.
2 II. SYSTEM MODEL We consider a mobile-edge system that consists of U mobile sers rnning AR applications, denoted as U = 1,...,U, and one base station (BS) eqipped with compting facilities working as a clodlet. All of the mobile sers and the BS are assmed to be eqipped with single antenna. The inpt data size for ser is denoted by D I, U, in which one fraction data size of DS I bits are the shared data that is the same across all U mobile sers and the other fraction of D L bits are the data exected locally by ser. The shared data can be transmitted from each ser by part, denoted by D I, U, sch that U =1 DI = DI S. The amont of inpt data that is exclsively transmitted by is ths given by D I = D I DS I DL, U. transmission power given by p l, the achievable individal data rate for offloading the shared data is expressed as: R l = W l log 2 (1+ pl h 2 ), U, (1) where W l = Wl U with W l denoting the overall bandwidth available for the plink transmission, and is the additive white Gassian noise (AWGN) power. Accordingly, = DI /Rl, and the energy consmed by the -th ser in the shared data offloading sb-phase is given as E l = tl pl = tl h 2f(DI ), U, (2) where the fnctionf(x) is defined asf(x) = (2W l 1). Similarly, the energy consmption for the -th ser in the individal data offloading sb-phase is expressed as: x E l = tl pl = tl B. Comptation Model DI S DL h 2f(DI ), U. (3) Based on the energy model in [9], given the local compting bits D L, the energy consmption for execting local comptation is given by: Fig. 1. Timing illstration for the considered mlti-ser MEC system. It can be seen from Fig. 1 that there are two consective sb-phases for both inpt data offloading and reslts downloading phases: the shared and the individal data transmission. The transmission dration for offloading the shared inpt data is denoted by, U; the offloading dration for the individal data is denoted as, U; and the drations for downloading the shared and the individal otpt data are and tdl, U respectively. The remote comptation time are also illstrated in Fig. 1, where t C S and tc, U, denote that for the shared and the individal data transmitted to the clodlet, respectively. Similarly, F and f, U, denote the comptational freqency (in cycles/s) allocated to the shared and the individal tasks, respectively, by the clodlet. In addition, the local comptation time is denoted by t C,L, U. A. Uplink Transmission As observed from Fig. 1, there are two consective plink transmission sb-phases: the shared data and the individal data offloading [10]. Each mobile ser offloads its comptation task to the clodlet server via freqency division mltiple access (FDMA). The channel coefficient from ser is given by h, U, which is assmed to remain nchanged dring the plink transmission dration. With the E C = κ (λ 0 D L)3 0 2, U, (4) t C,L where λ 0 (in cycles/bit) denotes the nmber of CPU cycles needed for processing one bit of inpt data, and κ 0 is the energy consmption capacitance coefficient. C. Downlink Transmission Similar to the plink transmission, the downlink transmission phase also has two separate sb-phases: the shared and the individal reslts downloading. The shared otpt data are mlticasted to the mobile sers by the clodlet at its maximm transmitting power P max. The achievable individal rate for the shared data downloading is ths given by R dl = Wdl log 2(1+ P max g 2 ), U, (5) where W dl = Wdl U with Wdl denotes the overall bandwidth available for downlink transmission. The downlink channel coefficient is given by g, U. The relation between the shared otpt data and the inpt data is given by DS O = a 0DS I, where a 0 is the factor representing the nmber of otpt bits for execting one bit of inpt data. Accordingly, = DO S /Rdl, U, and ths the latency for transmitting the shared otpt data to all mobile sers is given by S = max tdl. (6) This is becase the individal reslts downloading cannot be initiated ntil the shared data has finished transmission. After the mlticasting transmission, the individal otpt data is sent to each mobile ser via FDMA. Denoting the
3 downlink transmitting power for the -th individal data by p dl, the achievable rate for individal data downloading is ths expressed as: R dl = W dl log 2 (1+ pdl g 2 ), U. (7) Similarly, denoting the individal otpt data size by D O, U, D O = a 0 D I = a 0(D I DI S DL ), and tdl = D/R O dl. For energy consmption, the overall energy consmed for decoding the reslt sent back by the clodlet at the -th mobile ser is given by [10] E dl = (tdl +tdl )ρdl, U, (8) whereρ dl (in Joles/second) captres the energy expenditre per second. In addition, the total energy consmed by the BS for reslts transmission is given by, 0(D I g 2f(a DS I DL ) ), U, (9) which is reqired not to exceed E max by the BS operator. D. Total Latency Next, we consider the overall compting latency. As illstrated in Fig. 1, it is observed the individal data downloading in Phase II cannot start ntil the clodlet completes individal data compting, and the BS finishes the shared data transmission over the downlink. Moreover, for the individal data compting, it cannot start before either the corresponding individal data finishes offloading or the clodlet completes the shared data compting, i.e., max + tl,max tl + tc S. Frthermore, also seen from Fig. 1, for the shared data reslts, it can only start being transmitted in the downlink after the clodlet completes the shared data compting and all the individal data finishes offloading in the plink, i.e., max max tl + t C S,max tl +. Combining the above facts, the total compting latency is expressed as follows: τ = max max +,max tl +t C S+t C, max max tl +t C S,max tl + U. III. PROBLEM FORMULATION + S +, (10) The overall energy consmption at the mobile sers consists of three parts: data offloading over the plink (c.f. (2) and (3)), local compting (c.f. (4)), and reslts retrieving (c.f. (8)), which is ths given by E total = κ 0 (λ 0 D L ) 3 t C,L2 + + DI S DL h 2f(DI )+ h 2f(DI ) ( + )ρ dl. (11) The objective is to minimize the overall energy consmption given by E total, sbject to the compting latency constraints, the maximm local compting freqencies, and the total energy consmption on the individal data at the BS. Specifically, the optimization problem is formlated as below: (P1) : min E total,tl,tc,l,tdl,dl,di (12a) τ T max, U, (12b) 0(D I g 2f(a DI S DL ) ) E max, (12c) 0 t C,L T max, U, (12d) λ 0 D L tc,l f,max, (12e) 0 D L D I DS, I U, (12f) D I = DS,D I I 0, (12g) 0,tl 0,tC,L 0,tdl 0, U. (12h) Constraint (12b) and (12d) gives the latency constraints that the time taken for accomplishing compting tasks cannot excess the maximm allowed length, both for offloading and local compting. (12c) tells that the available energy for downlink transmission of remote compting node shold be lower than a maximm level. (12e) restricts the nmber of allowable local compting bits imposed by local compting capabilities. Besides, (12g) pts that adding all the shared data bits offloaded by all mobile sers respectively, the vale shold be eqal to the exact amont of shared bits existing in the same ser grop. IV. OPTIMAL SCHEME FOR JOINT OFFLOADING AND COMMUNICATION RESOURCE ALLOCATION A. Problem Reformlation Althogh the latency expression (10) looks complex in its from, (12b) is still a convex constraint. For the ease of exposition, we assme herein that the clodlet exectes the shared and the individal compting within the dration of the individal data offloading and the shared reslts downloading, respectively, i.e., t C S tl, and tc tdl, U 1. As a reslt, (12b) can be simplified as below: max +tl +tdl S +tdl T max, U. (13) 1 We assme herein that the comptation capacities at the clodlet is relatively mch higher than those at the mobile sers, and ths the compting time taken is mch shorter than the data transmission time.
4 by introdcing the axiliary variable, which satisfies tdl, U, (13) redces to +tl T max S tdl, U. (14) Notice that E C s (c.f. (4)) is monotonically decreases with respect to the local compting time t C,L for each mobile ser. To obtain the minimal energy consmption, it is obvios that t C,L = T max, U. Then the optimization problem to be solved is reformlated as: (P1 ) : min E total,tl,tdl,tdl,d L,DI (12c 12h),(14). tdl, U. (15a) (15b) (15c) B. Joint offloading and commnication resorce allocation Introdcing dal variables β, ω, σ, ν, the Lagrangian of problem (P1 ) is presented as: L(β,ω,σ,ν,,,,,D,D L ) I = h 2f(DI )+ DI S DL h 2f(DI ) + (λ 0 D L κ )3 0 + ( t C,L2 +tdl )ρdl + β ( + T max + S +tdl )+ ω (λ 0 D L t C,L f,max)+ σ ( tdl ) +ν[ 0(D g 2f(a I DS I DL ) ) E max ], (16) where β = β 1,...,β U are dal variables associated with the latency constraint (14), ω = ω 1,...,ω U are associated with local compting bits constraint (12e)), σ = σ 1,...,σ U are connected with the constraint for axiliary variable, and ν catches the downlink transmission energy constraint (12c). Hence, we have the Lagrangian dal fnction expressed as: g(β,ω,σ,ν) = min L(β,ω,σ,ν,,tl,tdl,tdl,D L,DI,tl,tdl,tdl, D L,DI ), (17) (12f-12h). Conseqently, the corresponding dal problem is formlated as: max g(β,ω,σ,ν) (18) β,ω,σ,ν β 0,ω 0,σ 0,ν 0. Proposition 1. Given a determined set of dal variables β, ω, σ, ν, the optimal soltion to the Lagrangian dal problem (16) can be determined as follows. The optimal primal variables, tl, and, are given by ˆ = ˆ = ˆD I W l ln2 [W 0( 1 e (β h 2, U. (19) 1))+1] D I DI S ˆD L W l ln2 [W 0( 1 e (β h 2, U. (20) 1))+1] ˆ = a 0 (D I DS I ˆD ) L W dl a 0 ln2 [W 0( 1 e ((ρdl +σ ) g 2, U. 1))+1] ν (21) where W 0 (x) is the principle branch of the Lambert W fnction defined as the soltion for W 0 (x)e W0(x) = x [15], e is the base of the natral logarithm; the optimal axiliary variable is given by: 0, ˆ = β σ > 0, (22) T max S, otherwise; and the optimal local compting data size is given by ˆD L = min T max,d I D I S [ ˆr l a 0ˆr dl ln2 3 3κ 0 λ ( 2W l 0 W l h 2 + νa 0 2 W dl W dl g 2 ) ω 3κ 0 λ 2 0, U, where ˆr l = Wl ln2 [W 0( 1 e (β h 2 1)) + 1] and ˆr dl = W dl a [W 0ln2 0( 1 e ((ρdl +σ) g 2 ν 1))+1], U. Proof: Please refer to Appendix A. In fact, on one hand, ˆr l s and ˆr dl s can be interpreted as the optimm transmission rate for the shared/individal data offloading and the individal data downloading, respectively, given the dal variables. On the other hand, for each ser, the optimal transmission rate for the shared data is seen to be identical to that of the individal data over the plink, given that the plink channel gains remain nchanged dring the whole offloading phase. Next, to obtain the optimal offloading bits of the shared data for each ser, i.e., ˆDI, we need the following lemma. Lemma 1. The optimal offloaded shared data for ser is expressed as, D I ˆD I = S, û = arg min, 1 U (23) 0, otherwise, where = f(ˆrl ) ˆr l + β h 2 ˆr l, U. Proof: Please refer to Appendix B. ] +
5 Notable, it is easily observed from Lemma 1 that the shared data is optimally offloaded by one specific ser instead of mltiple ones. Based on Proposition 1, the dal problem can ths be iteratively solved according to ellipsoid method (with constraints), the detail of which can be referred to [16]. The algorithm for solving (P1 ) is smmarized in Table I. TABLE I ALGORITHM I FOR SOLVING(P1 ) Energy consmption ( 10-3 J) Offloading withot considering shared data Fll Offloading Only Proposed Shared data Offloading ALgorithm Offloading with eqal time length Reqire: (β (0),ω (0),σ (0),ν (0) ) 1: repeat 2: Solve (17) given (β (i),ω (i),σ (i),ν (i) ) according to Proposition 1 and obtain ˆ,ˆ,ˆ,ˆ, ˆD, L ˆD I ; 3: pdate the sbgradient of β,ω,σ,ν respectively, i.e., +tl T max + max tdl + tdl, λ 0 D L tc,lf,max, tdl tdl, g 2 f( a 0(D I DS I DL ) ) E max in accordance with the ellipsoid method [16]; 4: ntil the predefined accracy threshold is satisfied. Ensre: The optimal dal variables to the dal problem (18) (β,ω,σ,ν ) 5: Solve (17) again with (β,ω,σ,ν ) Ensre:,tl,,,D L,D V. NUMERICAL RESULTS In this section, the nmerical reslts of the proposed algorithm together with other baseline algorithms are presented. Except for the local compting only scheme where sers execte all the data bits locally, there are three other offloading schemes presented as baseline algorithms: 1) Offloading withot considering the shared data: the collaborative properties are ignored, every ser makes the offloading decision withot coordination among other sers; 2) Fll offloading only: the shared data is taken into consideration, bt the whole chnks of inpt data of every ser are forced to be offloaded to the edge compting node, exclding the local compting capability from participating in the comptation tasks; 3) Offloading with eqal time length: taking the correlated data into consideration, the data offloading and downloading are performed for each ser with eqal time length, with optimal soltions obtained throgh CVX. In the simlation, the bandwidth avaialble is assmed to be W l = W dl =10MHz, the maximm downlink transmit power P max = 1W, and the inpt data size D I = 10kbits for all sers. The spectral density of the (AWGN) power is -169 dbm/hz. The mobile energy expenditre per second in the downlink is ρ dl =0.625 J/s [10], the maximm local compting capability f,max = 1GHz. Besides, λ 0 = cycle/bit, a 0 = 1, κ 0 = The pathloss model is PL = log 10 (d ), where d represents the distance between ser and edge compting node in kilometers. Fig.2 depicts how the energy consmption changes with different latency constraints. The energy consmption are becoming lower as the latency reqirement gets longer for all listed offloading algorithms. Only the proposed offloading scheme can give the lowest energy consming performance Latency Constraint T max (s) Fig. 2. Energy consmption verss different latency constraints The best energy saving improvement can only be achieved throgh the joint participation of local compting and shared data coordination. Besides, even thogh the eqal time length offloading has lower complexity than the proposed algorithm, it cannot compete with the proposed one in terms of energy saving. Recalling or conclsion that the best way to achieve the energy saving is to let these correlated bits transmitted by one specific ser, the reason is that forcing offloading time dration to be eqal makes the shared data to be transmitted by all sers simltaneosly. The energy consmed for compting one data bit increases exponentially as the latency constraint diminishes. Hence for the local compting only scheme, when latency constraint comes to 0.01 second the energy taken to finish the comptation tasks, which is 1000 mjoles, can reach p to nearly 100 times more than those of all the offloading algorithms. Then it drops exponentially to 10 mjoles when the latency constraint goes to 0.1 second. As a reslt, the crve representing local compting only is not added in Fig.2, otherwise the comparison of the offloading schemes will not be clear. In Fig.3, the energy consmption changes with the percentage of shared data is demonstrated. Apparently, as long as we take the shared data into consideration when making offloading decisions, the lower overall energy consmption is achieved when the proportion of shared data gets higher. More energy will be saved when the percentage of shared data gets higher for proposed offloading scheme compared to the scheme withot considering the existence of shared data. This trend applies to the fll offloading only algorithm as well, becase it also cares abot the existence of shared data when making offloading decisions. The energy consmptions for fll offloading only do not always go nder that of offloading withot considering shared data. That is becase when given specific latency constraint, the importance of local compting capabilities diminishes in saving mobile sers energy consmption as the share of common data increases. Since most of the data will be offloaded to the edge node, few inpt bits wold remain local for compting. Then the energy consmption of the fll offloading only scenario represents that it get closer to that of the proposed algorithm when the percentage of shared data increases. Similar trend applies to the eqal time length offloading as well. t C S = λ 0D I S/F (24)
6 12 10 Offloading withot considering shared data Offloading with eqal time length Fll Offloading Only Proposed Shared Data Offloading Algorithm with DI, the partial Lagrangian is expressed as ˆr l min D I L = [ tl h 2f(DI )+β ] Energy consmption ( 10-3 J) = [ D I D ˆr l h 2f(ˆrl I )+β ˆr l = D I ] (24a) Percentage of shared data (%) Fig. 3. Energy consmption verss different percentage of shared data VI. CONCLUSIONS In this paper, a mlti-ser fog compting system was considered, in which mltiple single-antenna mobile sers rnning applications featring shared data can partially offload their individal comptation tasks to a nearby singleantenna clodlet and then download the reslts from it. The mobile sers energy consmption minimization problem sbject to the total latency, the total downlink transmission energy and the local compting constraints was formlated as a convex problem with the optimal soltion obtained by classical Lagrangian dality method. Based pon the semi-closed form soltion, it was proved that the shared data is optimally transmitted by only one of the mobile sers instead of mltiple ones collaboratively. The proposed joint comptation offloading and commnications resorce allocation was verified by simlations against other baseline algorithms that ignore the shared data property or the mobile sers own compting capabilities.. APPENDIX A In order to find the optimal soltions of the primary problem, we need to examine the related partial derivatives L L L L,,,, L, L, U. After obtaining D L D I t l these partial derivatives, the KKT conditions can be applied to find the optimal soltions. For example, let L D L and L D I eqal to 0. The inverse fnction of y = f(x) xf (x) for x > 0 is given by x = Wl [W0( y ln2 e 1 ) + 1]. Then it follows that e f(ˆr ) l ˆr f l (ˆr ) l = f(ˆr l ) ˆr l f (ˆr l ) = β h 2, and the optimal plink transmission rate of the shared data ˆr l and that of the exclsively offloaded data ˆr l are ths derived. Then the expressions of the optimal primary variables are readily obtained as shown in (19), (20), (21), (22), (23), and (23). APPENDIX B To obtain how the shared inpt data offloading ˆD I are distribted among sers, we need to examine the partial Lagrangian regarding D I and. Replacing the shared data offloading time be D I = DS,D I I 0, U, (24b) where we define = f(ˆrl ) β + as a constant given the ˆr l h 2 ˆr l dal variable β s. As a reslt, the optimal soltion to the linear programming (LP) (24) is easily obtained as shown in (23). REFERENCES [1] Y. Mao, C. Yo, J. Zhang, K. Hang, and K. B. Letaief, A srvey on mobile edge compting: The commnication perspective, Commn. Srveys Tts., vol. 19, pp , Forth Qarter [2] F. Bonomi, R. Milito, J. Zh, and S. Addepalli, Fog compting and its role in the Internet of Things, in Proc. ACM SIGCOMM Workshop on Mobile Clod Compting (MCC), (Helsinki, Finland), Ag [3] W. Zhang, Y. Wen, K. Gan, D. Kilper, H. Lo, and D. O. W, Energy-optimal mobile clod compting nder stochastic wireless channel, IEEE Trans. Wireless Commn., vol. 12, pp , September [4] J. Kwak, Y. Kim, J. Lee, and S. Chong, Dream: Dynamic resorce and task allocation for energy minimization in mobile clod systems, IEEE J. Sel. Areas Commn., vol. 33, pp , Dec [5] C. Yo, K. Hang, and H. Chae, Energy efficient mobile clod compting powered by wireless energy transfer, IEEE J. Sel. Areas Commn., vol. 34, pp , May [6] Y. D. Lin, E. T. H. Ch, Y. C. Lai, and T. J. Hang, Time-and-energyaware comptation offloading in handheld devices to coprocessors and clods, IEEE Syst. J., vol. 9, pp , Jne [7] R. Kaewpang, D. Niyato, P. Wang, and E. Hossain, A framework for cooperative resorce management in mobile clod compting, IEEE J. Sel. Areas Commn., vol. 31, pp , December [8] J. Cheng, Y. Shi, B. Bai, and W. Chen, Comptation offloading in clod-ran based mobile clod compting system, in 2016 IEEE International Conference on Commnications (ICC), pp. 1 6, May [9] X. Chen, Decentralized comptation offloading game for mobile clod compting, IEEE Trans. Parallel Distrib. Syst., vol. 26, pp , April [10] A. Al-Shwaili and O. Simeone, Energy-efficient resorce allocation for mobile edge compting-based agmented reality applications, IEEE Wireless Commn. Lett., vol. 6, pp , Jne [11] J. Park, P. Popovski, and O. Simeone, Minimizing latency to spport VR social interactions over wireless celllar systems via bandwidth allocation, IEEE Wireless Commn. Lett., pp. 1 1, [12] M. Chen, W. Saad, C. Yin, and M. Debbah, Echo state transfer learning for data correlation aware resorce allocation in wireless virtal reality, in st Asilomar Conference on Signals, Systems, and Compters, pp , Oct [13] R. Wolski, S. Grn, C. Krintz, and D. Nrmi, Using bandwidth data to make comptation offloading decisions, in 2008 IEEE International Symposim on Parallel and Distribted Processing, pp. 1 8, April [14] H. Xing, L. Li, J. X, and A. Nallanathan, Joint task assignment and wireless resorce allocation for cooperative mobile-edge compting, Proc. IEEE International Conference on Commnications (ICC), May [15] F. Wang, J. X, X. Wang, and S. Ci, Joint offloading and compting optimization in wireless powered mobile-edge compting systems, IEEE Trans. on Wireless Commn., vol. 17, pp , March [16] S. Boyd, Lectre notes for EE364b: Convex Optimization II.
The Disciplined Flood Protocol in Sensor Networks
The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab
More informationThe Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment
This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment
More informationCost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks
Cost Based Local Forwarding Transmission Schemes for Two-hop Celllar Networks Zhenggang Zhao, Xming Fang, Yan Long, Xiaopeng H, Ye Zhao Key Lab of Information Coding & Transmission Sothwest Jiaotong University,
More informationIoT-Cloud Service Optimization in Next Generation Smart Environments
1 IoT-Clod Service Optimization in Next Generation Smart Environments Marc Barcelo, Alejandro Correa, Jaime Llorca, Antonia M. Tlino, Jose Lopez Vicario, Antoni Morell Universidad Atonoma de Barcelona,
More informationOn the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing
1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity
More informationBias of Higher Order Predictive Interpolation for Sub-pixel Registration
Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz
More informationAn Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast
University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna
More informationWhat s New in AppSense Management Suite Version 7.0?
What s New in AMS V7.0 What s New in AppSense Management Site Version 7.0? AppSense Management Site Version 7.0 is the latest version of the AppSense prodct range and comprises three prodct components,
More informationA Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks
Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,
More informationConstructing Multiple Light Multicast Trees in WDM Optical Networks
Constrcting Mltiple Light Mlticast Trees in WDM Optical Networks Weifa Liang Department of Compter Science Astralian National University Canberra ACT 0200 Astralia wliang@csaneda Abstract Mlticast roting
More informationp-norm MINIMIZATION OVER INTERSECTIONS OF CONVEX SETS İlker Bayram
p-norm MINIMIZATION OVER INTERSECTIONS OF CONVEX SETS İlker Bayram Istanbl Technical University, Department of Electronics and Telecommnications Engineering, Istanbl, Trkey ABSTRACT We consider the imization
More informationDate: December 5, 1999 Dist'n: T1E1.4
12/4/99 1 T1E14/99-559 Project: T1E14: VDSL Title: Vectored VDSL (99-559) Contact: J Cioffi, G Ginis, W Y Dept of EE, Stanford U, Stanford, CA 945 Cioffi@stanforded, 1-65-723-215, F: 1-65-724-3652 Date:
More informationStaCo: Stackelberg-based Coverage Approach in Robotic Swarms
Maastricht University Department of Knowledge Engineering Technical Report No.:... : Stackelberg-based Coverage Approach in Robotic Swarms Kateřina Staňková, Bijan Ranjbar-Sahraei, Gerhard Weiss, Karl
More informationImage Denoising Algorithms
Image Denoising Algorithms Xiang Hao School of Compting, University of Utah, USA, hao@cs.tah.ed Abstract. This is a report of an assignment of the class Mathematics of Imaging. In this assignment, we first
More informationA sufficient condition for spiral cone beam long object imaging via backprojection
A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral
More informationIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY 2007 1 On the Analysis of the Bletooth Time Division Dplex Mechanism Gil Zssman Member, IEEE, Adrian Segall Fellow, IEEE, and Uri Yechiali
More informationMinimal Edge Addition for Network Controllability
This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,
More informationThe final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.
The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5
More informationTdb: A Source-level Debugger for Dynamically Translated Programs
Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,
More informationMulti-lingual Multi-media Information Retrieval System
Mlti-lingal Mlti-media Information Retrieval System Shoji Mizobchi, Sankon Lee, Fmihiko Kawano, Tsyoshi Kobayashi, Takahiro Komats Gradate School of Engineering, University of Tokshima 2-1 Minamijosanjima,
More informationOptimal Sampling in Compressed Sensing
Optimal Sampling in Compressed Sensing Joyita Dtta Introdction Compressed sensing allows s to recover objects reasonably well from highly ndersampled data, in spite of violating the Nyqist criterion. In
More informationBroadcasting XORs: On the Application of Network Coding in Access Point-to-Multipoint Networks
Broadcasting XORs: On the Application of Network Coding in Access Point-to-Mltipoint Networks The MIT Faclty has made this article openly available Please share how this access benefits yo Yor story matters
More informationThe single-cycle design from last time
lticycle path Last time we saw a single-cycle path and control nit for or simple IPS-based instrction set. A mlticycle processor fies some shortcomings in the single-cycle CPU. Faster instrctions are not
More informationREPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips
REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands
More informationA choice relation framework for supporting category-partition test case generation
Title A choice relation framework for spporting category-partition test case generation Athor(s) Chen, TY; Poon, PL; Tse, TH Citation Ieee Transactions On Software Engineering, 2003, v. 29 n. 7, p. 577-593
More informationMillimeter-Wave Multi-Hop Wireless Backhauling for 5G Cellular Networks
2017 IEEE 85th Vehiclar Technology Conference (VTC-Spring) Millimeter-Wave Mlti-Hop Wireless Backhaling for 5G Celllar Networks B. P. S. Sahoo, Chn-Han Yao, and Hng-Y Wei Gradate Institte of Electrical
More informationCollision Avoidance and Resolution Multiple Access: First-Success Protocols
Collision Avoidance and Resoltion Mltiple Access: First-Sccess Protocols Rodrigo Garcés and J.J. Garcia-Lna-Aceves askin Center for Compter Engineering and Information Sciences University of California
More informationDiscrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods
Annals of Operations Research 106, 19 46, 2001 2002 Klwer Academic Pblishers. Manfactred in The Netherlands. Discrete Cost Mlticommodity Network Optimization Problems and Exact Soltion Methods MICHEL MINOUX
More informationPipelined van Emde Boas Tree: Algorithms, Analysis, and Applications
This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,
More informationMaster for Co-Simulation Using FMI
Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany
More informationEvaluating Influence Diagrams
Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will
More informationNetworks An introduction to microcomputer networking concepts
Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES
More informationEfficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks
1 Efficient Schedling for Periodic Aggregation Qeries in Mltihop Sensor Networks XiaoHa X, Shaojie Tang, Member, IEEE, XiangYang Li, Senior Member, IEEE Abstract In this work, we stdy periodic qery schedling
More informationPavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003
From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information
More informationThe extra single-cycle adders
lticycle Datapath As an added bons, we can eliminate some of the etra hardware from the single-cycle path. We will restrict orselves to sing each fnctional nit once per cycle, jst like before. Bt since
More informationStatistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem
Statistical Methods in fnctional MRI Lectre 7: Mltiple Comparisons 04/3/13 Martin Lindqist Department of Biostatistics Johns Hopkins University Data Processing Pipeline Standard Analysis Data Acqisition
More informationComparison of memory write policies for NoC based Multicore Cache Coherent Systems
Comparison of memory write policies for NoC based Mlticore Cache Coherent Systems Pierre Gironnet de Massas, Frederic Petrot System-Level Synthesis Grop TIMA Laboratory 46, Av Felix Viallet, 38031 Grenoble,
More information5 Performance Evaluation
5 Performance Evalation his chapter evalates the performance of the compared to the MIP, and FMIP individal performances. We stdy the packet loss and the latency to restore the downstream and pstream of
More informationMaking Full Use of Multi-Core ECUs with AUTOSAR Basic Software Distribution
Making Fll Use of Mlti-Core ECUs with AUTOSAR Basic Software Distribtion Webinar V0.1 2018-09-07 Agenda Motivation for Mlti-Core AUTOSAR Standard: SWC-Split MICROSAR Extension: BSW-Split BSW-Split: Technical
More informationProf. Kozyrakis. 1. (10 points) Consider the following fragment of Java code:
EE8 Winter 25 Homework #2 Soltions De Thrsday, Feb 2, 5 P. ( points) Consider the following fragment of Java code: for (i=; i
More informationComputer-Aided Mechanical Design Using Configuration Spaces
Compter-Aided Mechanical Design Using Configration Spaces Leo Joskowicz Institte of Compter Science The Hebrew University Jersalem 91904, Israel E-mail: josko@cs.hji.ac.il Elisha Sacks (corresponding athor)
More informationCautionary Aspects of Cross Layer Design: Context, Architecture and Interactions
Cationary Aspects of Cross Layer Design: Context, Architectre and Interactions Vikas Kawadia and P. R. Kmar Dept. of Electrical and Compter Engineering, and Coordinated Science Lab University of Illinois,
More informationPARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT
PAAMETE OPTIMIZATION FO TAKAGI-SUGENO FUZZY MODELS LESSONS LEANT Manfred Männle Inst. for Compter Design and Falt Tolerance Univ. of Karlsrhe, 768 Karlsrhe, Germany maennle@compter.org Brokat Technologies
More informationEMC ViPR. User Guide. Version
EMC ViPR Version 1.1.0 User Gide 302-000-481 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is accrate
More informationUnit Testing with VectorCAST and AUTOSAR
Unit Testing with VectorCAST and AUTOSAR Vector TechDay Software Testing with VectorCAST V1.0 2018-11-15 Agenda Introdction Unit Testing Demo Working with AUTOSAR Generated Code Unit Testing AUTOSAR SWCs
More informationNETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS
ETWORK PRESERVATIO THROUGH A TOPOLOGY COTROL ALGORITHM FOR WIRELESS MESH ETWORKS F. O. Aron, T. O. Olwal, A. Krien, Y. Hamam Tshwane University of Technology, Pretoria, Soth Africa. Dept of the French
More informationReal-time mean-shift based tracker for thermal vision systems
9 th International Conference on Qantitative InfraRed Thermography Jly -5, 008, Krakow - Poland Real-time mean-shift based tracker for thermal vision systems G. Bieszczad* T. Sosnowski** * Military University
More informationNew Architectures for Hierarchical Predictive Control
Preprint, 11th IFAC Symposim on Dynamics and Control of Process Systems, inclding Biosystems Jne 6-8, 216. NTNU, Trondheim, Norway New Architectres for Hierarchical Predictive Control Victor M. Zavala
More informationTAKING THE PULSE OF ICT IN HEALTHCARE
ICT TODAY THE OFFICIAL TRADE JOURNAL OF BICSI Janary/Febrary 2016 Volme 37, Nmber 1 TAKING THE PULSE OF ICT IN HEALTHCARE + PLUS + High-Power PoE + Using HDBaseT in AV Design for Schools + Focs on Wireless
More informationDIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES
DIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES Binh-Son Ha 1 Imari Sato 2 Kok-Lim Low 1 1 National University of Singapore 2 National Institte of Informatics, Tokyo, Japan ABSTRACT Dal
More informationConstructing and Comparing User Mobility Profiles for Location-based Services
Constrcting and Comparing User Mobility Profiles for Location-based Services Xihi Chen Interdisciplinary Centre for Secrity, Reliability and Trst, University of Lxemborg Jn Pang Compter Science and Commnications,
More informationSecure Biometric-Based Authentication for Cloud Computing
Secre Biometric-Based Athentication for Clod Compting Kok-Seng Wong * and Myng Ho Kim School of Compter Science and Engineering, Soongsil University, Sangdo-Dong Dongjak-G, 156-743 Seol Korea {kswong,kmh}@ss.ac.kr
More informationIsilon InsightIQ. Version 2.5. User Guide
Isilon InsightIQ Version 2.5 User Gide Pblished March, 2014 Copyright 2010-2014 EMC Corporation. All rights reserved. EMC believes the information in this pblication is accrate as of its pblication date.
More informationThis chapter is based on the following sources, which are all recommended reading:
Bioinformatics I, WS 09-10, D. Hson, December 7, 2009 105 6 Fast String Matching This chapter is based on the following sorces, which are all recommended reading: 1. An earlier version of this chapter
More informationarxiv: v1 [cs.cg] 26 Sep 2018
Convex partial transversals of planar regions arxiv:1809.10078v1 [cs.cg] 26 Sep 2018 Vahideh Keikha Department of Mathematics and Compter Science, University of Sistan and Balchestan, Zahedan, Iran va.keikha@gmail.com
More informationFault Tolerance in Hypercubes
Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different
More informationLWIP and Wi-Fi Boost Flow Control
LWIP and Wi-Fi Boost Flow Control David López-Pérez 1, Jonathan Ling 1, Bong Ho Kim 1, Vasdevan Sbramanian 1, Satish Kangovi 1, Ming Ding 2 1 Nokia Bell Laboratories 2 Data61, Astralia Abstract 3GPP LWIP
More informationTu P7 15 First-arrival Traveltime Tomography with Modified Total Variation Regularization
T P7 15 First-arrival Traveltime Tomography with Modified Total Variation Reglarization W. Jiang* (University of Science and Technology of China) & J. Zhang (University of Science and Technology of China)
More informationMethod to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot
Method to bild an initial adaptive Nero-Fzzy controller for joints control of a legged robot J-C Habmremyi, P. ool and Y. Badoin Royal Military Academy-Free University of Brssels 08 Hobbema str, box:mrm,
More informationIllumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY
Illmina LIMS Software Gide Jne 2017 ILLUMINA PROPRIETARY This docment and its contents are proprietary to Illmina, Inc. and its affiliates ("Illmina"), and are intended solely for the contractal se of
More informationDVR 630/650 Series. Video DVR 630/650 Series. 8/16-Channel real-time recording with CIF resolution. Flexible viewing with two monitor outputs
Video DVR 630/650 Series DVR 630/650 Series 8/16-Channel real-time recording with resoltion Flexible viewing with two monitor otpts Remote viewing, playback, control, and configration Easy Pan/Tilt/Zoom
More informationPERFORMANCE EVALUATION AND HILS TEST OF CONTROL ALLOCATION METHODS FOR RECONFIGURATION CONTROL
6 TH INTENATIONA CONGESS OF THE AEONAUTICA SCIENCES Abstract PEFOMANCE EVAUATION AND HIS TEST OF CONTO AOCATION METHODS FO ECONFIGUATION CONTO Byong-Mn Min*, Bong-J Kim**, Eng-Tai Kim***, and Min-Jea Tahk*
More informationMaximum Weight Independent Sets in an Infinite Plane
Maximm Weight Independent Sets in an Infinite Plane Jarno Nosiainen, Jorma Virtamo, Pasi Lassila jarno.nosiainen@tkk.fi, jorma.virtamo@tkk.fi, pasi.lassila@tkk.fi Department of Commnications and Networking
More informationAn Optimization of Granular Network by Evolutionary Methods
An Optimization of Granlar Networ by Evoltionary Methods YUN-HEE HAN, KEUN-CHANG KWAK* Dept. of Control, Instrmentation, and Robot Engineering Chosn University 375 Seos-dong, Dong-g, Gwangj, 50-759 Soth
More informationPicking and Curves Week 6
CS 48/68 INTERACTIVE COMPUTER GRAPHICS Picking and Crves Week 6 David Breen Department of Compter Science Drexel University Based on material from Ed Angel, University of New Mexico Objectives Picking
More informationAlliances and Bisection Width for Planar Graphs
Alliances and Bisection Width for Planar Graphs Martin Olsen 1 and Morten Revsbæk 1 AU Herning Aarhs University, Denmark. martino@hih.a.dk MADAGO, Department of Compter Science Aarhs University, Denmark.
More informationLocal Run Manager. Software Reference Guide for MiSeqDx
Local Rn Manager Software Reference Gide for MiSeqDx Local Rn Manager Overview 3 Dashboard Overview 4 Administrative Settings and Tasks 7 Workflow Overview 12 Technical Assistance 17 Docment # 1000000011880
More informationMultiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET
Mltiple-Choice Test Chapter 09.0 Golden Section Search Method Optimization COMPLETE SOLUTION SET. Which o the ollowing statements is incorrect regarding the Eqal Interval Search and Golden Section Search
More informationDesigning and Optimization of Heterogeneous OTN/DWDM Networks with Intermediate Grooming
Designing and Optimization of Heterogeneos OTN/DWDM Networks with Intermediate Grooming Afonso Oliveira IST (METI afonso.oliveira@ist.tl.pt ABSTRACT The coexistence of annels with different bitrates in
More informationHardware-Accelerated Free-Form Deformation
Hardware-Accelerated Free-Form Deformation Clint Cha and Ulrich Nemann Compter Science Department Integrated Media Systems Center University of Sothern California Abstract Hardware-acceleration for geometric
More informationAdaptive Influence Maximization in Microblog under the Competitive Independent Cascade Model
International Jornal of Knowledge Engineering, Vol. 1, No. 2, September 215 Adaptie Inflence Maximization in Microblog nder the Competitie Independent Cascade Model Zheng Ding, Kai Ni, and Zhiqiang He
More informationAUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING
AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING Mingsheng LIAO, Li ZHANG, Zxn ZHANG, Jiangqing ZHANG Whan Technical University of Srveying and Mapping, Natinal Lab. for Information Eng. in
More informationPOWER-OF-2 BOUNDARIES
Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of
More informationEECS 487: Interactive Computer Graphics f
Interpolating Key Vales EECS 487: Interactive Compter Graphics f Keys Lectre 33: Keyframe interpolation and splines Cbic splines The key vales of each variable may occr at different frames The interpolation
More informationSTABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWORK DYNAMICS FOR STATIC OPTIMIZATION
STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWOR DYNAMICS FOR STATIC OPTIMIZATION Grsel Serpen and Yifeng X Electrical Engineering and Compter Science Department, The University of Toledo, Toledo, OH
More informationNeighbourhood Searches for the Bounded Diameter Minimum Spanning Tree Problem Embedded in a VNS, EA, and ACO
Neighborhood Searches for the Bonded Diameter Minimm Spanning Tree Problem Embedded in a VNS, EA, and ACO Martin Grber Institte for Compter Graphics and Algorithms, Vienna University of Technology, Favoritenstraße
More informationTowards Understanding Bilevel Multi-objective Optimization with Deterministic Lower Level Decisions
Towards Understanding Bilevel Mlti-objective Optimization with Deterministic Lower Level Decisions Ankr Sinha Ankr.Sinha@aalto.fi Department of Information and Service Economy, Aalto University School
More informationEfficient and Accurate Delaunay Triangulation Protocols under Churn
Efficient and Accrate Delanay Trianglation Protocols nder Chrn Dong-Yong Lee and Simon S. Lam Department of Compter Sciences The University of Texas at Astin {dylee, lam}@cs.texas.ed November 9, 2007 Technical
More informationh-vectors of PS ear-decomposable graphs
h-vectors of PS ear-decomposable graphs Nima Imani 2, Lee Johnson 1, Mckenzie Keeling-Garcia 1, Steven Klee 1 and Casey Pinckney 1 1 Seattle University Department of Mathematics, 901 12th Avene, Seattle,
More informationCongestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems
Congestion-adaptive Data Collection with Accracy Garantee in Cyber-Physical Systems Nematollah Iri, Lei Y, Haiying Shen, Gregori Calfield Department of Electrical and Compter Engineering, Clemson University,
More informationIMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING
International Jornal of Modern Engineering Research (IJMER) www.imer.com Vol.1, Isse1, pp-134-139 ISSN: 2249-6645 IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING
More informationLecture 13: Traffic Engineering
Lectre 13: Traffic Engineering CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Mike Freedman, Nick Feamster, and Ming Zhang Lectre 13 Overview Dealing with mltiple paths Mltihoming Entact
More informationLecture 4: Routing. CSE 222A: Computer Communication Networks Alex C. Snoeren. Thanks: Amin Vahdat
Lectre 4: Roting CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Amin Vahdat Lectre 4 Overview Pop qiz Paxon 95 discssion Brief intro to overlay and active networking 2 End-to-End Roting
More informationAppearance Based Tracking with Background Subtraction
The 8th International Conference on Compter Science & Edcation (ICCSE 213) April 26-28, 213. Colombo, Sri Lanka SD1.4 Appearance Based Tracking with Backgrond Sbtraction Dileepa Joseph Jayamanne Electronic
More informationdss-ip Manual digitalstrom Server-IP Operation & Settings
dss-ip digitalstrom Server-IP Manal Operation & Settings Table of Contents digitalstrom Table of Contents 1 Fnction and Intended Use... 3 1.1 Setting p, Calling p and Operating... 3 1.2 Reqirements...
More informationA Wireless MAC Protocol comparison.
Doc: IEEE P82.1192S1 IEEE 82.11 Wireless Access Method and Physical Layer Specifications Title: Presented by: A Wireless MAC Protocol comparison. Wim Diepstraten NCR SEUtrecht NCRAT&T Network Prodct Grop
More informationAugmenting the edge connectivity of planar straight line graphs to three
Agmenting the edge connectivity of planar straight line graphs to three Marwan Al-Jbeh Mashhood Ishaqe Kristóf Rédei Diane L. Sovaine Csaba D. Tóth Pavel Valtr Abstract We characterize the planar straight
More informationCS 153 Design of Operating Systems Spring 18
CS 53 Design of Operating Systems Spring 8 Lectre 2: Virtal Memory Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Recap: cache Well-written programs exhibit
More informationImage Compression Compression Fundamentals
Compression Fndamentals Data compression refers to the process of redcing the amont of data reqired to represent given qantity of information. Note that data and information are not the same. Data refers
More informationFast Obstacle Detection using Flow/Depth Constraint
Fast Obstacle etection sing Flow/epth Constraint S. Heinrich aimlerchrylser AG P.O.Box 2360, -89013 Ulm, Germany Stefan.Heinrich@aimlerChrysler.com Abstract The early recognition of potentially harmfl
More informationTDT4255 Friday the 21st of October. Real world examples of pipelining? How does pipelining influence instruction
Review Friday the 2st of October Real world eamples of pipelining? How does pipelining pp inflence instrction latency? How does pipelining inflence instrction throghpt? What are the three types of hazard
More informationPipelining. Chapter 4
Pipelining Chapter 4 ake processor rns faster Pipelining is an implementation techniqe in which mltiple instrctions are overlapped in eection Key of making processor fast Pipelining Single cycle path we
More informationObject Pose from a Single Image
Object Pose from a Single Image How Do We See Objects in Depth? Stereo Use differences between images in or left and right eye How mch is this difference for a car at 00 m? Moe or head sideways Or, the
More informationSubgraph Matching with Set Similarity in a Large Graph Database
1 Sbgraph Matching with Set Similarity in a Large Graph Database Liang Hong, Lei Zo, Xiang Lian, Philip S. Y Abstract In real-world graphs sch as social networks, Semantic Web and biological networks,
More informationVirtuOS: an operating system with kernel virtualization
VirtOS: an operating system with kernel virtalization Rslan Nikolaev, Godmar Back SOSP '13 Proceedings of the Twenty-Forth ACM Symposim on Oper ating Systems Principles 이영석, 신현호, 박재완 Index Motivation Design
More informationA Recovery Algorithm for Reliable Multicasting in Reliable Networks
A Recovery Algorithm for Reliable Mlticasting in Reliable Networks Danyang Zhang Sibabrata Ray Dept. of Compter Science University of Alabama Tscaloosa, AL 35487 {dzhang, sib}@cs.a.ed Ragopal Kannan S.
More informationInteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN:
Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: 1137-3601 revista@aepia.org Asociación Española para la Inteligencia Artificial España Zaballos, Lis J.; Henning, Gabriela
More informationA GENERIC MODEL OF A BASE-ISOLATED BUILDING
Chapter 5 A GENERIC MODEL OF A BASE-ISOLATED BUILDING This chapter draws together the work o Chapters 3 and 4 and describes the assembly o a generic model o a base-isolated bilding. The irst section describes
More informationToday s Lecture. Software Architecture. Lecture 27: Introduction to Software Architecture. Introduction and Background of
Today s Lectre Lectre 27: Introdction to Software Architectre Kenneth M. Anderson Fondations of Software Engineering CSCI 5828 - Spring Semester, 1999 Introdction and Backgrond of Software Architectre
More informationHigh-Throughput Data Detection for Massive MU-MIMO-OFDM using Coordinate Descent. Michael Wu, Chris Dick, Joseph R. Cavallaro, and Christoph Studer
1 High-Throghpt Data Detection for Massive MU-MIMO-OFDM sing Coordinate Descent Michael W, Chris Dick, Joseph R. Cavallaro, and Christoph Stder Abstract Data detection in massive mlti-ser (MU) mltipleinpt
More information