On network coding and routing in dynamic wireless multicast networks

Size: px
Start display at page:

Download "On network coding and routing in dynamic wireless multicast networks"

Transcription

1 On network coding nd routing in dynmic wireless multicst networks Trcey Ho, Ji-Qi Jin Cliforni Institute of Technology Psden, CA Emil: {tho, Hrish Viswnthn Lucent Technologies, Bell Ls Murry Hill, NJ Emil: Astrct We compre multicst network coding nd routing for time-vrying wireless network model with interferencedetermined link cpcities We use dynmic ck pressure lgorithms tht re optiml for intr-session network coding nd routing respectively Our results suggest tht under such conditions, the gp in multicst cpcity etween network coding nd routing cn decrese reltive to collision-sed wireless model with fixed link cpcities I INTRODUCTION In this pper we consider dynmic multicsting in timevrying wireless networks We investigte the cpcity enefit of network coding reltive to multicst routing, ie forwrding nd repliction over one or more multicst trees Network coding hs een shown to e necessry for chieving multicst cpcity in some wired networks such s the multicst network of Figure 1 [1]; mny known exmples of such networks re extensions or generliztions of this sic exmple Reference [16] gives n nlogous exmple, shown in Figure 2, of sttic wireless network with fixed link rtes nd hlf-duplex constrint, ie ech node cn either send or receive single trnsmission t ny one time In this exmple, the optiml network coding solution, shown in Figure 3, chieves 4/3 times the multicst throughput of the optiml routing solution, shown in Figure 3 As we consider more relistic wireless network models, we move progressively further from the sttic wireless model tht is closest to the originl wired model For instnce, if we consider the effect of interference on link cpcities, it is not cler to wht extent the network coding nd routing solutions of Figure 3 re ffected, since their trnsmit scenrios involve different sets of interfering links Also, chnnel conditions often vry nd trffic is usully ursty ecuse either the sources generte trffic in ursts or the network nodes employ queuing nd scheduling cross multiple sessions In such scenrios, optiml scheduling, routing nd coding should vry dynmiclly depending on the current stte of the network chnnel conditions nd uffer occupncy Routing, scheduling, rte, nd power control in networks with ursty trffic hs recently received significnt ttention in the context of wireless networks [2], [10], [12], [13], [14], [15], [19], [21], [22] Much of the recent work in this re uilds on the ides of [3], [18] tht descrie lgorithms for routing nd scheduling flows using queue sizes, or differences Fig 1 Wired multicst network exmple, with single node A multicsting informtion to two sink nodes E nd F in queue size etween the queues t the source nd the destintion of link, s the metric to select etween different flows Such n pproch is usully sid to e ck-pressure sed since hevily loded nodes downstrem slow down the flow coming down from nodes upstrem Such pproches re optiml in the sense of llowing trnsmission t the mximum possile rrivl rtes into the network for which the queues t the vrious network nodes cn e stilized While the ck-pressure pproch hs mostly een pplied in the context of unicst trnsmissions, it hs lso een extended to the cse of multicst trnsmissions [2], [17] However, in the multicst cse without network coding the lgorithms re significntly more complex, even for wired networks We hve recently extended the ove ck-pressure sed dynmic routing nd scheduling lgorithms to include network coding nd correlted sources [8] Rndom network coding [6], introduced for the flow model, extends nturlly to timevrying network with ursty trffic nd provides distriuted implementtion For networks with one or more multicst sessions, ech consisting of set of sources nd sinks such tht dt from ll the sources is intended for ll the sinks,

2 Fig 2 Wireless multicst network exmple, with single node A multicsting informtion to two sink nodes E nd F The coordintes represent physicl distnces which re vried in our simultion experiments Fig 3 Illustrtion of optiml schedules for coding nd routing An lterntive schedule for routing is given in c Ech ox shows set of wireless links tht cn e simultneously ctivted, termed trnsmit scenrio TS our lgorithm for routing, network coding, scheduling nd rte control chieves stility for ll input rtes tht cn e stilized with intr-session network coding Aprt from the potentil cpcity gin of llowing network coding within multicst sessions, we lso otin much reduced complexity compred to the existing lgorithms of [17], which involves enumertion of ll multicst trees used, nd [2], which involves mintining virtul queue for every suset of sinks for every session In our pproch, ech node hs just one virtul queue for ech sink of ech session for independent sources or for ech source-sink pir of ech session for correlted sources Routing, network coding nd scheduling decisions re mde loclly y compring, for ech link, the difference in length of corresponding virtul queues, summed over ech session s queues For correlted sources, the sinks loclly determine nd control trnsmission rtes cross the sources This gives completely distriuted lgorithm for wired networks; in the wireless cse, scheduling nd power control mong interfering trnsmitters is done centrlly This pper is orgnized s follows We present the system nd network coding model in Section II Optiml ck pressure lgorithms for multicst with nd without network coding re descried in Section III In Section IV, we compre the two lgorithms on the exmple of Figure 2 We conclude with summry in Section V A Wireless network model II MODEL We use model similr to tht in [15] We consider network composed of set N of N = N nodes with communiction links etween them tht re fixed or timevrying ccording to some specified ergodic processes, nd trnsmission of set of multicst sessions C through the network Ech session c C is ssocited with set S c N of sources, nd n exogenous process of dt rrivls t ech of these sources which must e trnsmitted over the network to ech of set T c N of sinks Trnsmissions re ssumed to occur in slotted time, with time slots of length T Decisions on routing, scheduling, etc re mde t most once slot For simplicity, we ssume fixed length pckets nd link trnsmission rtes tht re restricted to integer multiples of the pcket-length/time-slot quotient Tht is, n integer numer of pckets cn e trnsmitted in ech slot The link trnsmission rte µ ij from node i to node j, with other nodes n N trnsmitting independent informtion simultneously, is given y the Shnnon formul [5] P i S ij µ ij P, S = log 1 + N 0 + n N P ns nj where P l is the power trnsmitted y node l, S lj is the chnnel gin from node l to node j nd N 0 is dditive white Gussin noise power over the signling ndwidth We ssume tht the chnnel conditions re fixed over the durtion of slot, nd known t the eginning of the slot For simplicity of exposition we ssume tht the chnnel nd rrivl processes re independent nd identiclly distriuted cross slots; strightforwrd generliztion to ergodic processes is possile using similr pproch s tht in [15] We denote y, Z wireless rodcst link where is the originting node nd Z is the set of receiving nodes Link rtes µp, S = µ Z P, S re determined y the vector of trnsmit powers P t = P Z t nd chnnel stte vector St St is ssumed to e constnt over ech time slot, ie, stte trnsitions occur only on slot oundries t = kt, k integer We lso ssume tht St tkes vlues from finite set nd is ergodic; we denote y π S the time verge proility of stte S P t is lso held constnt over ech time slot, nd is chosen from compct set Π of power lloctions representing limits on trnsmit power per node nd/or cross nodes

3 B Network coding We use the pproch of distriuted rndom liner network coding [4], [6], [7], in which network nodes form output dt y tking rndom liner comintions of input dt The contents of ech pcket, s liner comintion of the input pckets, re specified y coefficient vector in the pcket heder, updted y pplying to the coefficient vectors the sme liner trnsformtions s to the dt The coefficient vector is thus function of the rndom code coefficients specifying the liner comintions t intermedite nodes A sink is le to decode when it receives full set of pckets with linerly independent coefficient vectors For simplicity, we consider the cse where no restrictions re plced on coding mong pckets from the sme multicst session This symptoticlly chieves optiml cpcity, ut in the worst-cse decoding my not e possile until the end of the entire session III DYNAMIC BACK-PRESSURE ALGORITHMS A Multicst with intr-session network coding In [8] we give dynmic lgorithm tht uses queue stte informtion to mke network coding nd trnsmit scenrio decisions, without requiring ny knowledge of the input or chnnel sttistics Bck-pressure policy In ech time slot [t, t + T, the following re crried out: Scheduling: For ech link, Z, one session c Z = rg mx c is chosen Let wz = β T c Z mx β T c mx mx Z mx Z U c Z β U cβ U cβ, 0 U c Z β, 0 1 Power control: The stte St is oserved, nd power lloction P t = rg mx µ Z P, StwZ 2 P Π,Z is chosen Network coding: For ech link, Z, rndom liner comintion of dt corresponding to ech session, sink pir c Z, β T c for which mx Z Z U c Z β U c Z β > 0 is sent t the rte offered y the power lloction Ech destintion node d Z ssocites the received informtion with the virtul uffers corresponding to sinks β T c Z for which d = rg mx Z U c Z β U c Z β If the originting queues re empty within the time slot, no dt is sent In network where simultneous trnsmissions interfere, optimizing 2 requires centrlized solution In prctice, the optimiztion 2 cn e done heuristiclly using greedy pproch similr to tht in [11], [20] ut with the dded guidnce of weights wz for prioritiztion mong cndidte links, Z If there re enough chnnels for independent trnsmissions, the optimiztion cn e done independently for ech trnsmitter This lgorithm stilizes ny set of input rtes stilizle with intr-session network coding [8]: Theorem 1: If input rtes λ c i stisfy λc i + ɛ Λ, the ck-pressure policy stilizes the system nd gurntees n verge totl uffer occupncy upper ounded y T BN ɛ, where { B = τ mx 1 A } c 2 E i + µ out mx + µ in 2 N T mx 2 i,c B Bck pressure lgorithm for multicst routing We compre our ck pressure multicst network coding lgorithm with ck pressure lgorithm for optiml multicst routing, for the cse of single multicst session with two sinks The routing lgorithm is similr to tht in [2] in tht ech node mintins queue for every suset of sinks The lgorithms differ in their policies for updting queues, s the lgorithm of [2] is for dversril wired networks, wheres our lgorithm is for non-dversril wireless networks In generl, the numer of queues is exponentil in the numer of sinks We descrie the lgorithm for the cse of two sinks, where ech node mintins three queues: two individul queues contining dt tht is to e trnsmitted to ech of the sinks nd common queue contining dt tht is to e trnsmitted to oth sinks We denote y U k i, k = 1, 2, 3, respectively the lengths of these three queues t node i, nd refer to dt in the respective queues s commodity k = 1, 2, 3 dt Bck pressure is used to control the rnch points of the multicst distriution trees used In ech time slot [t, t + T, the following re crried out: Blncing: At the strt of ech timeslot, for ech nonsink node i, if U 3 i U 1 i U 2 i > 0, then n mount U 3 i U 1 i U 2 i /3 of dt is removed from the common queue nd the sme mount of dt is dded to ech of the individul queues t i Scheduling: For ech link, Z, If then we set k Z = rg mx k mx Z U k mx U k Z U k Z > U 3 Z U k 2 j=1 wz = mx U k Z U k Z Z Otherwise, we set k Z = 0 nd w Z = U 3 2 j=1 min U j Z min U j, Z

4 Power control: The stte St is oserved, nd power lloction P t = rg mx µ Z P, StwZ P Π,Z is chosen Routing: For ech link, Z, if kz 0 nd mx Z U k Z U k Z > 0, commodity kz dt is sent from to rg mx Z U k Z U k Z t the rte offered y the power lloction Otherwise, if kz = 0 nd U 3 2 j=1 min Z U j > 0, dt from the common queue t is rodcst on, Z t the offered rte, nd corresponding mount is dded to min Z U j, j = 1, 2 If the originting queues re empty within the time slot, no dt is sent This lgorithm symptoticlly chieves the optiml multicst throughput for routing The proof is omitted for revity A Experimentl setup IV SIMULATION EXPERIMENTS We run the two multicst lgorithms of the previous section on the network of Fig 2, with single node A multicsting informtion to two sink nodes E nd F We ssume common trnsmission power nd hlf-duplex constrint t ech network node The chnnel gin for from node i to node j is modeled s: trnsmission rte of R, defined s the mximum vlue for which the network is stle t rte R nd unstle t rte R + 01 The network ws considered stle for given trnsmission rte nd policy if the mximum cklog in ll queues of ll nodes ws ounded y 200 when run for 20,000 timeslots B Results The simultion results re shown in Tle 1 nd Figures 4-6 From Tle 1, we see tht under this time-vrying wireless network model with interference, the cpcity gin of the network coding strtegy of [16] over routing is lower thn the 4/3 fctor otined in the fixed-rte collision model Figures 4-6 show the proportion of different trnsmit scenrios used y the two policies, which vries depending on the experimentl prmeters In the network coding cse, the proportion of trnsmit scenrios gives rough indiction of the proportion of time network coding is used TABLE I MAXIMUM TRANSMISSION RATES R FOR CODING AND ROUTING snr 2 R for coding R for routing / / / / S ij = f ij 2 d k ij where f ij is the Ryleigh fding stte nd d ij is the distnce etween i nd j, nd k is the propgtion power loss exponent We ssume µ = E[ f 2 ] is the sme for ll i, j The two lgorithms symptoticlly chieve, for liner coding nd routing respectively, the optiml multicst throughput chievle with the following seven trnsmit scenrios, chosen so s to cover the network coding nd routing schedules of Figure 3: trnsmit scenrio 1, where A trnsmits to B, nd C rodcsts to D nd F trnsmit scenrio 2, where A trnsmits to C, nd B rodcsts to D nd E trnsmit scenrio 3, where D rodcsts to E nd F trnsmit scenrio 4, where A rodcsts to B nd C trnsmit scenrio 5, where B trnsmits to E, nd C trnsmits to F, respectively trnsmit scenrio 6, where B trnsmits to E trnsmit scenrio 7, where C trnsmits to F To investigte the effects of network geometry nd SNR, the two lgorithms were run for numer of different vlues for prmeter 1, defined in Figure 2, nd SNR For ech choice of prmeter vlues, series of simultion runs ws crried out to find the mximum stle multicst rte For ech run, the throughput ws incresed y 01, until the source queue ecme unstle, giving n pproximte mximum 3 Fig 4 The proportion of different trnsmit scenrios used y the network coding lgorithm for snr = 10 10dB, 1 = 2 = = 2/2, k = 2, µ = 15, trnmssion rte = 14 V CONCLUSION We hve compred multicst network coding nd routing for time-vrying wireless network model with interference Our results suggest tht when link cpcities re ffected y interference, nd power control, scheduling, network coding nd routing re dynmiclly controlled in response to network conditions, the gp in multicst cpcity etween network

5 Fig 5 The proportion of different trnsmit scenrios used y the network coding lgorithm for snr = dB, 1 = 2 = = 2/2, k = 2, µ = 15, trnsmission rte = 23 Fig 6 The proportion of different trnsmit scenrios used y the routing lgorithm for snr = 10 10dB, = 1 = 2 = 2/2, k = 2, µ = 15, trnmssion rte = 13 coding nd routing cn decrese reltive to collision-sed wireless model with fixed link cpcities In such cses, the min dvntge of network coding my e the reduction in complexity of optimiztion nd opertion The coding dvntge my lso increse in situtions where routing, power control nd scheduling re not done optimlly, s hs een shown for the multiple unicsts cse [9] [3] Bruch Aweruch nd Tom Leighton A simple locl control pproximtion lgorithm for multicommodity flow In Proceedings of 34th IEEE Conference on Foundtions of Computer Science, 1993 [4] P A Chou, Y Wu, nd K Jin Prcticl network coding In Proceedings of 41st Annul Allerton Conference on Communiction, Control, nd Computing, Octoer 2003 [5] Thoms Cover nd Joy Thoms Elements of Informtion Theory Wiley, 1991 [6] T Ho, R Koetter, M Médrd, D R Krger, nd M Effros The enefits of coding over routing in rndomized setting In Proceedings of 2003 IEEE Interntionl Symposium on Informtion Theory, June 2003 [7] T Ho, M Médrd, J Shi, M Effros, nd D R Krger On rndomized network coding In Proceedings of 41st Annul Allerton Conference on Communiction, Control, nd Computing, Octoer 2003 [8] T Ho nd H Viswnthn Dynmic lgorithms for multicst with intrsession network coding In Proc 43rd Annul Allerton Conference on Communiction, Control, nd Computing, 2005 [9] S Ktti, D Kti, nd M Médrd The importnce of eing opportunistic In Proc 43rd Annul Allerton Conference on Communiction, Control, nd Computing, 2005 [10] Thierry Klein nd Hrish Viswnthn Centrlized power control in multihop wireless networks In Proceedings of IEEE Interntionl Symposium on Informtion Theory, 2003 [11] Syndev Mukherjee nd Hrish Viswnthn Throughput rnge trdeoff of wireless mesh ckhul networks IEEE Journl on Selected Ares in Communictions, to pper, 2006 [12] Michel Neely Energy optiml control for time vrying networks In Proceedings of the IEEE INFOCOM, 2005 [13] Michel Neely, Eytn Modino, nd Chih-Ping Li Firness nd optiml stochstic control for heterogeneous networks In Proceedings of the IEEE INFOCOM, 2005 [14] Michel Neely, Eytn Modino, nd C Rohrs Pcket routing over prllel time-vrying queues with ppliction to stellite nd wireless networks In Proceedings of the Thirty-Ninth Annul Allerton Conference on Communictions nd Control, 2001 [15] Michel Neely, Eytn Modino, nd Chrles E Rohrs Dynmic power lloction nd routing for time-vrying wireless networks In Proceedings of IEEE Infocom, 2003 [16] Y E Sgduyu nd A Ephremides Joint scheduling nd wireless network coding In Proc 1st Workshop on Network Coding, Theory nd Applictions, 2005 [17] Sswti Srkr nd Lendros Tssiuls A frmework for routing nd congestion control for multicst informtion flows IEEE Trnsctions on Informtion Theory, 2002 [18] Lendros Tssiuls nd Anthony F Ephremides Stility properties of constrined queuing systems nd scheduling policies for mximum throughput in multihop networks IEEE Trnsctions on Informtion Theory, 1992 [19] Hrish Viswnthn nd Krishnn Kumrn Rte scheduling for multiple ntenn downlink wireless systems In Proceedings of the Thirty- Ninth Annul Allerton Conference on Communictions nd Control, 2001 [20] Yunnn Wu, Philip A Chou, Qin Zhng, Kml Jin, Wenwu Zhu, nd Sun-Yun Kung Network plnning in wireless d hoc networks: A cross-lyer pproch IEEE Journl on Selected Ares in Communictions, Specil Issue on Wireless Ad Hoc Networks, 2005 [21] Edmund Yeh nd Aron Cohen Throughput nd dely optiml resource lloction in multiccess fding chnnels In Proceedings of IEEE Interntionl Symposium on Informtion Theory, 2003 [22] Edmund Yeh nd Aron Cohen Throughput optiml power nd rte control in queued multiccess nd fding chnnels In Proceedings of IEEE Interntionl Symposium on Informtion Theory, 2004 REFERENCES [1] R Ahlswede, N Ci, S-YR Li, nd RW Yeung Network informtion flow IEEE Trnsctions on Informtion Theory, 46: , 2000 [2] Bruch Aweruch, André Brinkmnn, nd Christin Scheideler Anycsting nd multicsting in dversril systems: routing nd dmission control, preliminry technicl report, 2002

2 Computing all Intersections of a Set of Segments Line Segment Intersection

2 Computing all Intersections of a Set of Segments Line Segment Intersection 15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design

More information

On Achieving Optimal Throughput with Network Coding

On Achieving Optimal Throughput with Network Coding In IEEE INFOCOM On Achieving Optiml Throughput with Network Coding Zongpeng Li, Bochun Li, Dn Jing, Lp Chi Lu Astrct With the constrints of network topologies nd link cpcities, chieving the optiml end-to-end

More information

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li 2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min

More information

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

Evolutionary Approaches To Minimizing Network Coding Resources

Evolutionary Approaches To Minimizing Network Coding Resources This full text pper ws peer reviewed t the direction of IEEE Communictions Society suject mtter experts for puliction in the IEEE INFOCOM 2007 proceedings. Evolutionry Approches To Minimizing Network Coding

More information

Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network

Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 Revisiting the notion of Origin-Destintion Trffic Mtrix of the Hosts tht re ttched to Switched Locl Are Network Mondy

More information

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases Overview Mobile computing nd dtbses Generl issues in mobile dt mngement Dt dissemintion Dt consistency Loction dependent queries Interfces Detils of brodcst disks thlis klfigopoulos Network rchitecture

More information

An evolutionary approach to inter-session network coding

An evolutionary approach to inter-session network coding An evolutionry pproch to inter-session network coding The MIT Fculty hs mde this rticle openly ville. Plese shre how this ccess enefits you. Your story mtters. Cittion As Pulished Pulisher Kim, M. et l.

More information

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1): Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

Design and Performance Evaluation of Underwater Data Dissemination Strategies using Interference Avoidance and Network Coding

Design and Performance Evaluation of Underwater Data Dissemination Strategies using Interference Avoidance and Network Coding Design nd Performnce Evlution of Underwter Dt Dissemintion Strtegies using Interference Avoidnce nd Network Coding Rúl Plcios Fbrizio Grnelli University of Trento, Itly Jnus Heide Frnk H.P. Fitzek Alborg

More information

Agilent Mass Hunter Software

Agilent Mass Hunter Software Agilent Mss Hunter Softwre Quick Strt Guide Use this guide to get strted with the Mss Hunter softwre. Wht is Mss Hunter Softwre? Mss Hunter is n integrl prt of Agilent TOF softwre (version A.02.00). Mss

More information

Efficient Rerouting Algorithms for Congestion Mitigation

Efficient Rerouting Algorithms for Congestion Mitigation 2009 IEEE Computer Society Annul Symposium on VLSI Efficient Rerouting Algorithms for Congestion Mitigtion M. A. R. Chudhry*, Z. Asd, A. Sprintson, nd J. Hu Deprtment of Electricl nd Computer Engineering

More information

Network Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved

Network Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved Network Interconnection: Bridging CS 57 Fll 6 6 Kenneth L. Clvert All rights reserved The Prolem We know how to uild (rodcst) LANs Wnt to connect severl LANs together to overcome scling limits Recll: speed

More information

UT1553B BCRT True Dual-port Memory Interface

UT1553B BCRT True Dual-port Memory Interface UTMC APPICATION NOTE UT553B BCRT True Dul-port Memory Interfce INTRODUCTION The UTMC UT553B BCRT is monolithic CMOS integrted circuit tht provides comprehensive MI-STD- 553B Bus Controller nd Remote Terminl

More information

THE throughput of information transmission within a data

THE throughput of information transmission within a data IEEE TRANACTION ON INFORMATION THEORY A Constnt Bound on Throughput Improvement of Multicst Network Coding in Undirected Networks Zongpeng Li, Memer, IEEE Bochun Li, enior Memer, IEEE Lp Chi Lu Deprtment

More information

Efficient Algorithms For Optimizing Policy-Constrained Routing

Efficient Algorithms For Optimizing Policy-Constrained Routing Efficient Algorithms For Optimizing Policy-Constrined Routing Andrew R. Curtis curtis@cs.colostte.edu Ross M. McConnell rmm@cs.colostte.edu Dn Mssey mssey@cs.colostte.edu Astrct Routing policies ply n

More information

Improving the Connectivity of Heterogeneous Multi-Hop Wireless Networks

Improving the Connectivity of Heterogeneous Multi-Hop Wireless Networks 1569363897 1 Improving the Connectivity of Heterogeneous Multi-Hop Wireless Networks Te-Hoon Kim, Dvid Tipper, nd Prshnt Krishnmurthy Grdute Networking nd Telecommunictions Progrm University of Pittsburgh,

More information

Computer Networks 53 (2009) Contents lists available at ScienceDirect. Computer Networks. journal homepage:

Computer Networks 53 (2009) Contents lists available at ScienceDirect. Computer Networks. journal homepage: Computer Networks 53 (29) 252 2516 Contents lists ville t ScienceDirect Computer Networks journl homepge: www.elsevier.com/locte/comnet Congestion-wre chnnel ssignment for multi-chnnel wireless mesh networks

More information

LECT-10, S-1 FP2P08, Javed I.

LECT-10, S-1 FP2P08, Javed I. A Course on Foundtions of Peer-to-Peer Systems & Applictions LECT-10, S-1 CS /799 Foundtion of Peer-to-Peer Applictions & Systems Kent Stte University Dept. of Computer Science www.cs.kent.edu/~jved/clss-p2p08

More information

CSEP 573 Artificial Intelligence Winter 2016

CSEP 573 Artificial Intelligence Winter 2016 CSEP 573 Artificil Intelligence Winter 2016 Luke Zettlemoyer Problem Spces nd Serch slides from Dn Klein, Sturt Russell, Andrew Moore, Dn Weld, Pieter Abbeel, Ali Frhdi Outline Agents tht Pln Ahed Serch

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully

More information

Network Layer: Routing Classifications; Shortest Path Routing

Network Layer: Routing Classifications; Shortest Path Routing igitl ommuniction in the Modern World : Routing lssifictions; Shortest Pth Routing s min prolem: To get efficiently from one point to the other in dynmic environment http://.cs.huji.c.il/~com com@cs.huji.c.il

More information

Performance analysis of QoS mechanisms in IP networks

Performance analysis of QoS mechanisms in IP networks University of Wollongong Reserch Online Fculty of Informtics - Ppers (Archive) Fculty of Engineering nd Informtion Sciences 2000 Performnce nlysis of QoS mechnisms in IP networks D. Ji University of Wollongong

More information

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the LR() nlysis Drwcks of LR(). Look-hed symols s eplined efore, concerning LR(), it is possile to consult the net set to determine, in the reduction sttes, for which symols it would e possile to perform reductions.

More information

Presentation Martin Randers

Presentation Martin Randers Presenttion Mrtin Rnders Outline Introduction Algorithms Implementtion nd experiments Memory consumption Summry Introduction Introduction Evolution of species cn e modelled in trees Trees consist of nodes

More information

Mobile IP route optimization method for a carrier-scale IP network

Mobile IP route optimization method for a carrier-scale IP network Moile IP route optimiztion method for crrier-scle IP network Tkeshi Ihr, Hiroyuki Ohnishi, nd Ysushi Tkgi NTT Network Service Systems Lortories 3-9-11 Midori-cho, Musshino-shi, Tokyo 180-8585, Jpn Phone:

More information

CS 268: IP Multicast Routing

CS 268: IP Multicast Routing Motivtion CS 268: IP Multicst Routing Ion Stoic April 5, 2004 Mny pplictions requires one-to-mny communiction - E.g., video/udio conferencing, news dissemintion, file updtes, etc. Using unicst to replicte

More information

A Study of Quality of Service Resource Allocation Schemes for Mobile Health

A Study of Quality of Service Resource Allocation Schemes for Mobile Health RESEARCH ARTICLE A Study of Qulity of Service Resource Alloction Schemes for Moile Helth Idris Krim nd Tr Ali Yhiy* Deprtment of Computer Science nd Engineering, University of Kurdistn Hewler, Kurdistn

More information

A dual of the rectangle-segmentation problem for binary matrices

A dual of the rectangle-segmentation problem for binary matrices A dul of the rectngle-segmenttion prolem for inry mtrices Thoms Klinowski Astrct We consider the prolem to decompose inry mtrix into smll numer of inry mtrices whose -entries form rectngle. We show tht

More information

EECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining

EECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining EECS150 - Digitl Design Lecture 23 - High-level Design nd Optimiztion 3, Prllelism nd Pipelining Nov 12, 2002 John Wwrzynek Fll 2002 EECS150 - Lec23-HL3 Pge 1 Prllelism Prllelism is the ct of doing more

More information

SUPPLEMENTARY INFORMATION

SUPPLEMENTARY INFORMATION Supplementry Figure y (m) x (m) prllel perpendiculr Distnce (m) Bird Stndrd devition for distnce (m) c 6 prllel perpendiculr 4 doi:.8/nture99 SUPPLEMENTARY FIGURE Confirmtion tht movement within the flock

More information

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016 Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence Winter 2016 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl

More information

1.5 Extrema and the Mean Value Theorem

1.5 Extrema and the Mean Value Theorem .5 Extrem nd the Men Vlue Theorem.5. Mximum nd Minimum Vlues Definition.5. (Glol Mximum). Let f : D! R e function with domin D. Then f hs n glol mximum vlue t point c, iff(c) f(x) for ll x D. The vlue

More information

A Priority-based Distributed Call Admission Protocol for Multi-hop Wireless Ad hoc Networks

A Priority-based Distributed Call Admission Protocol for Multi-hop Wireless Ad hoc Networks A Priority-bsed Distributed Cll Admission Protocol for Multi-hop Wireless Ad hoc Networks un Sun Elizbeth M. Belding-Royer Deprtment of Computer Science University of Cliforni, Snt Brbr suny, ebelding

More information

On Computation and Resource Management in Networked Embedded Systems

On Computation and Resource Management in Networked Embedded Systems On Computtion nd Resource Mngement in Networed Embedded Systems Soheil Ghisi Krlene Nguyen Elheh Bozorgzdeh Mjid Srrfzdeh Computer Science Deprtment University of Cliforni, Los Angeles, CA 90095 soheil,

More information

MTH 146 Conics Supplement

MTH 146 Conics Supplement 105- Review of Conics MTH 146 Conics Supplement In this section we review conics If ou ne more detils thn re present in the notes, r through section 105 of the ook Definition: A prol is the set of points

More information

Orthogonal line segment intersection

Orthogonal line segment intersection Computtionl Geometry [csci 3250] Line segment intersection The prolem (wht) Computtionl Geometry [csci 3250] Orthogonl line segment intersection Applictions (why) Algorithms (how) A specil cse: Orthogonl

More information

The Greedy Method. The Greedy Method

The Greedy Method. The Greedy Method Lists nd Itertors /8/26 Presenttion for use with the textook, Algorithm Design nd Applictions, y M. T. Goodrich nd R. Tmssi, Wiley, 25 The Greedy Method The Greedy Method The greedy method is generl lgorithm

More information

From Dependencies to Evaluation Strategies

From Dependencies to Evaluation Strategies From Dependencies to Evlution Strtegies Possile strtegies: 1 let the user define the evlution order 2 utomtic strtegy sed on the dependencies: use locl dependencies to determine which ttriutes to compute

More information

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin

More information

Performance enhancement of IEEE DCF using novel backoff algorithm

Performance enhancement of IEEE DCF using novel backoff algorithm Kuo et l. EURASIP Journl on Wireless Communictions nd Networking 212, 212:274 http://jis.eursipjournls.com/content/212/1/274 RESEARCH Open Access Performnce enhncement of IEEE 82.11 using novel ckoff lgorithm

More information

Rethinking Virtual Network Embedding: Substrate Support for Path Splitting and Migration

Rethinking Virtual Network Embedding: Substrate Support for Path Splitting and Migration Rethinking Virtul Network Emedding: Sustrte Support for Pth Splitting nd Migrtion Minln Yu, Yung Yi, Jennifer Rexford, Mung Ching Computer Science, Princeton University, Emil: {minlnyu,jrex}@cs.princeton.edu

More information

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search.

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search. CS 88: Artificil Intelligence Fll 00 Lecture : A* Serch 9//00 A* Serch rph Serch Tody Heuristic Design Dn Klein UC Berkeley Multiple slides from Sturt Russell or Andrew Moore Recp: Serch Exmple: Pncke

More information

PARALLEL AND DISTRIBUTED COMPUTING

PARALLEL AND DISTRIBUTED COMPUTING PARALLEL AND DISTRIBUTED COMPUTING 2009/2010 1 st Semester Teste Jnury 9, 2010 Durtion: 2h00 - No extr mteril llowed. This includes notes, scrtch pper, clcultor, etc. - Give your nswers in the ville spce

More information

AI Adjacent Fields. This slide deck courtesy of Dan Klein at UC Berkeley

AI Adjacent Fields. This slide deck courtesy of Dan Klein at UC Berkeley AI Adjcent Fields Philosophy: Logic, methods of resoning Mind s physicl system Foundtions of lerning, lnguge, rtionlity Mthemtics Forml representtion nd proof Algorithms, computtion, (un)decidility, (in)trctility

More information

Tree Structured Symmetrical Systems of Linear Equations and their Graphical Solution

Tree Structured Symmetrical Systems of Linear Equations and their Graphical Solution Proceedings of the World Congress on Engineering nd Computer Science 4 Vol I WCECS 4, -4 October, 4, Sn Frncisco, USA Tree Structured Symmetricl Systems of Liner Equtions nd their Grphicl Solution Jime

More information

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distriuted Systems Principles nd Prdigms Chpter 11 (version April 7, 2008) Mrten vn Steen Vrije Universiteit Amsterdm, Fculty of Science Dept. Mthemtics nd Computer Science Room R4.20. Tel: (020) 598 7784

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. General Tree Search. Uniform Cost. Lecture 3: A* Search 9/4/2007

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. General Tree Search. Uniform Cost. Lecture 3: A* Search 9/4/2007 CS 88: Artificil Intelligence Fll 2007 Lecture : A* Serch 9/4/2007 Dn Klein UC Berkeley Mny slides over the course dpted from either Sturt Russell or Andrew Moore Announcements Sections: New section 06:

More information

Efficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc

Efficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc 4th Ntionl Conference on Electricl, Electronics nd Computer Engineering (NCEECE 2015) Efficient Regulr Expression Grouping Algorithm Bsed on Lbel Propgtion Xi Chen, Shuqio Chenb nd Ming Moc Ntionl Digitl

More information

1.1. Interval Notation and Set Notation Essential Question When is it convenient to use set-builder notation to represent a set of numbers?

1.1. Interval Notation and Set Notation Essential Question When is it convenient to use set-builder notation to represent a set of numbers? 1.1 TEXAS ESSENTIAL KNOWLEDGE AND SKILLS Prepring for 2A.6.K, 2A.7.I Intervl Nottion nd Set Nottion Essentil Question When is it convenient to use set-uilder nottion to represent set of numers? A collection

More information

Stained Glass Design. Teaching Goals:

Stained Glass Design. Teaching Goals: Stined Glss Design Time required 45-90 minutes Teching Gols: 1. Students pply grphic methods to design vrious shpes on the plne.. Students pply geometric trnsformtions of grphs of functions in order to

More information

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork MA1008 Clculus nd Liner Algebr for Engineers Course Notes for Section B Stephen Wills Deprtment of Mthemtics University College Cork s.wills@ucc.ie http://euclid.ucc.ie/pges/stff/wills/teching/m1008/ma1008.html

More information

LETKF compared to 4DVAR for assimilation of surface pressure observations in IFS

LETKF compared to 4DVAR for assimilation of surface pressure observations in IFS LETKF compred to 4DVAR for ssimiltion of surfce pressure oservtions in IFS Pu Escrià, Mssimo Bonvit, Mts Hmrud, Lrs Isksen nd Pul Poli Interntionl Conference on Ensemle Methods in Geophysicl Sciences Toulouse,

More information

IZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI

IZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI IZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI Appliction Note Rel-time nd offline modultion from ETI files Generting nd nlyzing ETI files Rel-time interfce using EDI/ETI IZT DAB CONTENTSERVER

More information

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES GENEATING OTHOIMAGES FO CLOSE-ANGE OBJECTS BY AUTOMATICALLY DETECTING BEAKLINES Efstrtios Stylinidis 1, Lzros Sechidis 1, Petros Ptis 1, Spiros Sptls 2 Aristotle University of Thessloniki 1 Deprtment of

More information

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5 CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,

More information

DIFFERENT POLICY OBJECTIVES OF THE ROAD AUTHORITY IN THE OPTIMAL TOLL DESIGN PROBLEM

DIFFERENT POLICY OBJECTIVES OF THE ROAD AUTHORITY IN THE OPTIMAL TOLL DESIGN PROBLEM DIFFERENT POLICY OBJECTIVES OF THE ROAD AUTHORITY IN THE OPTIMAL TOLL DESIGN PROBLEM Dusic Joksimovic*, Michiel Bliemer Delft University of Technology, The Netherlnds ARS Trnsport &Technology, The Netherlnds

More information

What are suffix trees?

What are suffix trees? Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl

More information

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1.

Fig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1. Answer on Question #5692, Physics, Optics Stte slient fetures of single slit Frunhofer diffrction pttern. The slit is verticl nd illuminted by point source. Also, obtin n expression for intensity distribution

More information

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search Uninformed Serch [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.] Tody Serch Problems Uninformed Serch Methods

More information

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis CS143 Hndout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexicl Anlysis In this first written ssignment, you'll get the chnce to ply round with the vrious constructions tht come up when doing lexicl

More information

McAfee Network Security Platform

McAfee Network Security Platform 10/100/1000 Copper Active Fil-Open Bypss Kit Guide Revision E McAfee Network Security Pltform This document descries the contents nd how to instll the McAfee 10/100/1000 Copper Active Fil-Open Bypss Kit

More information

Systems I. Logic Design I. Topics Digital logic Logic gates Simple combinational logic circuits

Systems I. Logic Design I. Topics Digital logic Logic gates Simple combinational logic circuits Systems I Logic Design I Topics Digitl logic Logic gtes Simple comintionl logic circuits Simple C sttement.. C = + ; Wht pieces of hrdwre do you think you might need? Storge - for vlues,, C Computtion

More information

Improved Clock-Gating through Transparent Pipelining

Improved Clock-Gating through Transparent Pipelining 2. Improved Clock-Gting through Trnsprent Pipelining Hns M. Jcobson IM T.J. Wtson Reserch Center, Yorktown, NY. hnsj@us.ibm.com STRCT This pper re-exmines the well estblished clocking principles of pipelines.

More information

Approximation of Two-Dimensional Rectangle Packing

Approximation of Two-Dimensional Rectangle Packing pproximtion of Two-imensionl Rectngle Pcking Pinhong hen, Yn hen, Mudit Goel, Freddy Mng S70 Project Report, Spring 1999. My 18, 1999 1 Introduction 1-d in pcking nd -d in pcking re clssic NP-complete

More information

Algorithm Design (5) Text Search

Algorithm Design (5) Text Search Algorithm Design (5) Text Serch Tkshi Chikym School of Engineering The University of Tokyo Text Serch Find sustring tht mtches the given key string in text dt of lrge mount Key string: chr x[m] Text Dt:

More information

COMP 423 lecture 11 Jan. 28, 2008

COMP 423 lecture 11 Jan. 28, 2008 COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring

More information

The Distributed Data Access Schemes in Lambda Grid Networks

The Distributed Data Access Schemes in Lambda Grid Networks The Distributed Dt Access Schemes in Lmbd Grid Networks Ryot Usui, Hiroyuki Miygi, Yutk Arkw, Storu Okmoto, nd Noki Ymnk Grdute School of Science for Open nd Environmentl Systems, Keio University, Jpn

More information

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl component

More information

Simrad ES80. Software Release Note Introduction

Simrad ES80. Software Release Note Introduction Simrd ES80 Softwre Relese 1.3.0 Introduction This document descries the chnges introduced with the new softwre version. Product: ES80 Softwre version: 1.3.0 This softwre controls ll functionlity in the

More information

A Sparse Grid Representation for Dynamic Three-Dimensional Worlds

A Sparse Grid Representation for Dynamic Three-Dimensional Worlds A Sprse Grid Representtion for Dynmic Three-Dimensionl Worlds Nthn R. Sturtevnt Deprtment of Computer Science University of Denver Denver, CO, 80208 sturtevnt@cs.du.edu Astrct Grid representtions offer

More information

Spectral Analysis of MCDF Operations in Image Processing

Spectral Analysis of MCDF Operations in Image Processing Spectrl Anlysis of MCDF Opertions in Imge Processing ZHIQIANG MA 1,2 WANWU GUO 3 1 School of Computer Science, Northest Norml University Chngchun, Jilin, Chin 2 Deprtment of Computer Science, JilinUniversity

More information

Qubit allocation for quantum circuit compilers

Qubit allocation for quantum circuit compilers Quit lloction for quntum circuit compilers Nov. 10, 2017 JIQ 2017 Mrcos Yukio Sirichi Sylvin Collnge Vinícius Fernndes dos Sntos Fernndo Mgno Quintão Pereir Compilers for quntum computing The first genertion

More information

Performance Evaluation of Dynamic Reconfiguration in High-Speed Local Area Networks

Performance Evaluation of Dynamic Reconfiguration in High-Speed Local Area Networks Performnce Evlution of Dynmic Reconfigurtion in High-Speed Locl Are Networks Rfel Csdo, Aurelio Bermúdez, Frncisco J. Quiles, JoséL.Sánchez Depto. de Informátic Universidd de Cstill-L Mnch 271- Albcete,

More information

Chapter 7. Routing with Frame Relay, X.25, and SNA. 7.1 Routing. This chapter discusses Frame Relay, X.25, and SNA Routing. Also see the following:

Chapter 7. Routing with Frame Relay, X.25, and SNA. 7.1 Routing. This chapter discusses Frame Relay, X.25, and SNA Routing. Also see the following: Chpter 7 Routing with Frme Rely, X.25, nd SNA This chpter discusses Frme Rely, X.25, nd SNA Routing. Also see the following: Section 4.2, Identifying the BANDIT in the Network Section 4.3, Defining Globl

More information

ZZ - Advanced Math Review 2017

ZZ - Advanced Math Review 2017 ZZ - Advnced Mth Review Mtrix Multipliction Given! nd! find the sum of the elements of the product BA First, rewrite the mtrices in the correct order to multiply The product is BA hs order x since B is

More information

Deadlock-Free Fully Adaptive Routing in Irregular Networks without Virtual Channels

Deadlock-Free Fully Adaptive Routing in Irregular Networks without Virtual Channels Dedlock-Free Fully Adptive Routing in Irregulr Networks without Virtul Chnnels Dong Xing School of Softwre Tsinghu University Beijing 100084, Chin dxing@tsinghu.edu.cn Zhigng Yu Dept. of Computer Science

More information

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

CSCI 446: Artificial Intelligence

CSCI 446: Artificial Intelligence CSCI 446: Artificil Intelligence Serch Instructor: Michele Vn Dyne [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.]

More information

IP: Network Layer. Goals and Tasks. Routing. Switching. Switching (cont.) Datagram v/s Virtual Circuit. Overview Addressing Routing

IP: Network Layer. Goals and Tasks. Routing. Switching. Switching (cont.) Datagram v/s Virtual Circuit. Overview Addressing Routing IP: Network Lyer Overview Addressing Routing Overview Gols nd Tsks Routing Switching Issues Bsic ides TOC IP TOC IP Overview Gols nd Tsks Gols of Network Lyer Guide pckets from source to destintion Use

More information

Virtual Network Embedding For Evolving Networks

Virtual Network Embedding For Evolving Networks This full text pper ws peer reviewed t the direction of IEEE Communictions Society subject mtter experts for publiction in the IEEE Globecom proceedings. Virtul Network Embedding For Evolving Networks

More information

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants A Heuristic Approch for Discovering Reference Models by Mining Process Model Vrints Chen Li 1, Mnfred Reichert 2, nd Andres Wombcher 3 1 Informtion System Group, University of Twente, The Netherlnds lic@cs.utwente.nl

More information

Ma/CS 6b Class 1: Graph Recap

Ma/CS 6b Class 1: Graph Recap M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Adm Sheffer. Office hour: Tuesdys 4pm. dmsh@cltech.edu TA: Victor Kstkin. Office hour: Tuesdys 7pm. 1:00 Mondy, Wednesdy, nd Fridy. http://www.mth.cltech.edu/~2014-15/2term/m006/

More information

Subband coding of image sequences using multiple vector quantizers. Emanuel Martins, Vitor Silva and Luís de Sá

Subband coding of image sequences using multiple vector quantizers. Emanuel Martins, Vitor Silva and Luís de Sá Sund coding of imge sequences using multiple vector quntizers Emnuel Mrtins, Vitor Silv nd Luís de Sá Instituto de Telecomunicções, Deprtmento de Engenhri Electrotécnic Pólo II d Universidde de Coimr,

More information

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers Mth Modeling Lecture 4: Lgrnge Multipliers Pge 4452 Mthemticl Modeling Lecture 4: Lgrnge Multipliers Lgrnge multipliers re high powered mthemticl technique to find the mximum nd minimum of multidimensionl

More information

Geometry-Based Stochastic Channel Models for 5G: Extending Key Features for Massive MIMO

Geometry-Based Stochastic Channel Models for 5G: Extending Key Features for Massive MIMO Geometry-Bsed Stochstic Chnnel Models for 5G: Extending Key Fetures for Mssive MIMO Àlex Olivers Mrtínez, Ptrick Eggers, Eliseth De Crvlho Fculty of Engineering nd Science, Dept. of Electronic Systems,

More information

Efficient K-NN Search in Polyphonic Music Databases Using a Lower Bounding Mechanism

Efficient K-NN Search in Polyphonic Music Databases Using a Lower Bounding Mechanism Efficient K-NN Serch in Polyphonic Music Dtses Using Lower Bounding Mechnism Ning-Hn Liu Deprtment of Computer Science Ntionl Tsing Hu University Hsinchu,Tiwn 300, R.O.C 886-3-575679 nhliou@yhoo.com.tw

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Compression Outline :Algorithms in the Real World. Lempel-Ziv Algorithms. LZ77: Sliding Window Lempel-Ziv

Compression Outline :Algorithms in the Real World. Lempel-Ziv Algorithms. LZ77: Sliding Window Lempel-Ziv Compression Outline 15-853:Algorithms in the Rel World Dt Compression III Introduction: Lossy vs. Lossless, Benchmrks, Informtion Theory: Entropy, etc. Proility Coding: Huffmn + Arithmetic Coding Applictions

More information

A Probabilistic Emergent Routing Algorithm for Mobile Ad Hoc Networks

A Probabilistic Emergent Routing Algorithm for Mobile Ad Hoc Networks Author mnuscript, published in "WiOpt'03: Modeling nd Optimiztion in Mobile, Ad oc nd Wireless Networks (2003) 10 pges" A Probbilistic Emergent Routing Algorithm for Mobile Ad oc Networks John S. Brs nd

More information

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. Example: Pancake Problem. Example: Pancake Problem

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. Example: Pancake Problem. Example: Pancake Problem Announcements Project : erch It s live! Due 9/. trt erly nd sk questions. It s longer thn most! Need prtner? Come up fter clss or try Pizz ections: cn go to ny, ut hve priority in your own C 88: Artificil

More information

Exam #1 for Computer Simulation Spring 2005

Exam #1 for Computer Simulation Spring 2005 Exm # for Computer Simultion Spring 005 >>> SOLUTION

More information

Pointwise convergence need not behave well with respect to standard properties such as continuity.

Pointwise convergence need not behave well with respect to standard properties such as continuity. Chpter 3 Uniform Convergence Lecture 9 Sequences of functions re of gret importnce in mny res of pure nd pplied mthemtics, nd their properties cn often be studied in the context of metric spces, s in Exmples

More information

CSCE 531, Spring 2017, Midterm Exam Answer Key

CSCE 531, Spring 2017, Midterm Exam Answer Key CCE 531, pring 2017, Midterm Exm Answer Key 1. (15 points) Using the method descried in the ook or in clss, convert the following regulr expression into n equivlent (nondeterministic) finite utomton: (

More information

arxiv: v1 [cs.db] 16 Sep 2016

arxiv: v1 [cs.db] 16 Sep 2016 Blech: A Distriuted Strem Dt Clening System Yongcho Tin Eurecom yongcho.tin@eurecom.fr Pietro Michirdi Eurecom pietro.michirdi@eurecom.fr Mrko Vukolić IBM Reserch - Zurich mvu@zurich.im.com rxiv:169.5113v1

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-169 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

Replicating Web Applications On-Demand

Replicating Web Applications On-Demand Replicting Web Applictions On-Demnd Swminthn Sivsubrmnin Guillume Pierre Mrten vn Steen Dept. of Computer Science, Vrije Universiteit, Amsterdm {swmi,gpierre,steen}@cs.vu.nl Abstrct Mny Web-bsed commercil

More information