On network coding and routing in dynamic wireless multicast networks
|
|
- Donald Ellis
- 5 years ago
- Views:
Transcription
1 On network coding nd routing in dynmic wireless multicst networks Trcey Ho, Ji-Qi Jin Cliforni Institute of Technology Psden, CA Emil: {tho, Hrish Viswnthn Lucent Technologies, Bell Ls Murry Hill, NJ Emil: Astrct We compre multicst network coding nd routing for time-vrying wireless network model with interferencedetermined link cpcities We use dynmic ck pressure lgorithms tht re optiml for intr-session network coding nd routing respectively Our results suggest tht under such conditions, the gp in multicst cpcity etween network coding nd routing cn decrese reltive to collision-sed wireless model with fixed link cpcities I INTRODUCTION In this pper we consider dynmic multicsting in timevrying wireless networks We investigte the cpcity enefit of network coding reltive to multicst routing, ie forwrding nd repliction over one or more multicst trees Network coding hs een shown to e necessry for chieving multicst cpcity in some wired networks such s the multicst network of Figure 1 [1]; mny known exmples of such networks re extensions or generliztions of this sic exmple Reference [16] gives n nlogous exmple, shown in Figure 2, of sttic wireless network with fixed link rtes nd hlf-duplex constrint, ie ech node cn either send or receive single trnsmission t ny one time In this exmple, the optiml network coding solution, shown in Figure 3, chieves 4/3 times the multicst throughput of the optiml routing solution, shown in Figure 3 As we consider more relistic wireless network models, we move progressively further from the sttic wireless model tht is closest to the originl wired model For instnce, if we consider the effect of interference on link cpcities, it is not cler to wht extent the network coding nd routing solutions of Figure 3 re ffected, since their trnsmit scenrios involve different sets of interfering links Also, chnnel conditions often vry nd trffic is usully ursty ecuse either the sources generte trffic in ursts or the network nodes employ queuing nd scheduling cross multiple sessions In such scenrios, optiml scheduling, routing nd coding should vry dynmiclly depending on the current stte of the network chnnel conditions nd uffer occupncy Routing, scheduling, rte, nd power control in networks with ursty trffic hs recently received significnt ttention in the context of wireless networks [2], [10], [12], [13], [14], [15], [19], [21], [22] Much of the recent work in this re uilds on the ides of [3], [18] tht descrie lgorithms for routing nd scheduling flows using queue sizes, or differences Fig 1 Wired multicst network exmple, with single node A multicsting informtion to two sink nodes E nd F in queue size etween the queues t the source nd the destintion of link, s the metric to select etween different flows Such n pproch is usully sid to e ck-pressure sed since hevily loded nodes downstrem slow down the flow coming down from nodes upstrem Such pproches re optiml in the sense of llowing trnsmission t the mximum possile rrivl rtes into the network for which the queues t the vrious network nodes cn e stilized While the ck-pressure pproch hs mostly een pplied in the context of unicst trnsmissions, it hs lso een extended to the cse of multicst trnsmissions [2], [17] However, in the multicst cse without network coding the lgorithms re significntly more complex, even for wired networks We hve recently extended the ove ck-pressure sed dynmic routing nd scheduling lgorithms to include network coding nd correlted sources [8] Rndom network coding [6], introduced for the flow model, extends nturlly to timevrying network with ursty trffic nd provides distriuted implementtion For networks with one or more multicst sessions, ech consisting of set of sources nd sinks such tht dt from ll the sources is intended for ll the sinks,
2 Fig 2 Wireless multicst network exmple, with single node A multicsting informtion to two sink nodes E nd F The coordintes represent physicl distnces which re vried in our simultion experiments Fig 3 Illustrtion of optiml schedules for coding nd routing An lterntive schedule for routing is given in c Ech ox shows set of wireless links tht cn e simultneously ctivted, termed trnsmit scenrio TS our lgorithm for routing, network coding, scheduling nd rte control chieves stility for ll input rtes tht cn e stilized with intr-session network coding Aprt from the potentil cpcity gin of llowing network coding within multicst sessions, we lso otin much reduced complexity compred to the existing lgorithms of [17], which involves enumertion of ll multicst trees used, nd [2], which involves mintining virtul queue for every suset of sinks for every session In our pproch, ech node hs just one virtul queue for ech sink of ech session for independent sources or for ech source-sink pir of ech session for correlted sources Routing, network coding nd scheduling decisions re mde loclly y compring, for ech link, the difference in length of corresponding virtul queues, summed over ech session s queues For correlted sources, the sinks loclly determine nd control trnsmission rtes cross the sources This gives completely distriuted lgorithm for wired networks; in the wireless cse, scheduling nd power control mong interfering trnsmitters is done centrlly This pper is orgnized s follows We present the system nd network coding model in Section II Optiml ck pressure lgorithms for multicst with nd without network coding re descried in Section III In Section IV, we compre the two lgorithms on the exmple of Figure 2 We conclude with summry in Section V A Wireless network model II MODEL We use model similr to tht in [15] We consider network composed of set N of N = N nodes with communiction links etween them tht re fixed or timevrying ccording to some specified ergodic processes, nd trnsmission of set of multicst sessions C through the network Ech session c C is ssocited with set S c N of sources, nd n exogenous process of dt rrivls t ech of these sources which must e trnsmitted over the network to ech of set T c N of sinks Trnsmissions re ssumed to occur in slotted time, with time slots of length T Decisions on routing, scheduling, etc re mde t most once slot For simplicity, we ssume fixed length pckets nd link trnsmission rtes tht re restricted to integer multiples of the pcket-length/time-slot quotient Tht is, n integer numer of pckets cn e trnsmitted in ech slot The link trnsmission rte µ ij from node i to node j, with other nodes n N trnsmitting independent informtion simultneously, is given y the Shnnon formul [5] P i S ij µ ij P, S = log 1 + N 0 + n N P ns nj where P l is the power trnsmitted y node l, S lj is the chnnel gin from node l to node j nd N 0 is dditive white Gussin noise power over the signling ndwidth We ssume tht the chnnel conditions re fixed over the durtion of slot, nd known t the eginning of the slot For simplicity of exposition we ssume tht the chnnel nd rrivl processes re independent nd identiclly distriuted cross slots; strightforwrd generliztion to ergodic processes is possile using similr pproch s tht in [15] We denote y, Z wireless rodcst link where is the originting node nd Z is the set of receiving nodes Link rtes µp, S = µ Z P, S re determined y the vector of trnsmit powers P t = P Z t nd chnnel stte vector St St is ssumed to e constnt over ech time slot, ie, stte trnsitions occur only on slot oundries t = kt, k integer We lso ssume tht St tkes vlues from finite set nd is ergodic; we denote y π S the time verge proility of stte S P t is lso held constnt over ech time slot, nd is chosen from compct set Π of power lloctions representing limits on trnsmit power per node nd/or cross nodes
3 B Network coding We use the pproch of distriuted rndom liner network coding [4], [6], [7], in which network nodes form output dt y tking rndom liner comintions of input dt The contents of ech pcket, s liner comintion of the input pckets, re specified y coefficient vector in the pcket heder, updted y pplying to the coefficient vectors the sme liner trnsformtions s to the dt The coefficient vector is thus function of the rndom code coefficients specifying the liner comintions t intermedite nodes A sink is le to decode when it receives full set of pckets with linerly independent coefficient vectors For simplicity, we consider the cse where no restrictions re plced on coding mong pckets from the sme multicst session This symptoticlly chieves optiml cpcity, ut in the worst-cse decoding my not e possile until the end of the entire session III DYNAMIC BACK-PRESSURE ALGORITHMS A Multicst with intr-session network coding In [8] we give dynmic lgorithm tht uses queue stte informtion to mke network coding nd trnsmit scenrio decisions, without requiring ny knowledge of the input or chnnel sttistics Bck-pressure policy In ech time slot [t, t + T, the following re crried out: Scheduling: For ech link, Z, one session c Z = rg mx c is chosen Let wz = β T c Z mx β T c mx mx Z mx Z U c Z β U cβ U cβ, 0 U c Z β, 0 1 Power control: The stte St is oserved, nd power lloction P t = rg mx µ Z P, StwZ 2 P Π,Z is chosen Network coding: For ech link, Z, rndom liner comintion of dt corresponding to ech session, sink pir c Z, β T c for which mx Z Z U c Z β U c Z β > 0 is sent t the rte offered y the power lloction Ech destintion node d Z ssocites the received informtion with the virtul uffers corresponding to sinks β T c Z for which d = rg mx Z U c Z β U c Z β If the originting queues re empty within the time slot, no dt is sent In network where simultneous trnsmissions interfere, optimizing 2 requires centrlized solution In prctice, the optimiztion 2 cn e done heuristiclly using greedy pproch similr to tht in [11], [20] ut with the dded guidnce of weights wz for prioritiztion mong cndidte links, Z If there re enough chnnels for independent trnsmissions, the optimiztion cn e done independently for ech trnsmitter This lgorithm stilizes ny set of input rtes stilizle with intr-session network coding [8]: Theorem 1: If input rtes λ c i stisfy λc i + ɛ Λ, the ck-pressure policy stilizes the system nd gurntees n verge totl uffer occupncy upper ounded y T BN ɛ, where { B = τ mx 1 A } c 2 E i + µ out mx + µ in 2 N T mx 2 i,c B Bck pressure lgorithm for multicst routing We compre our ck pressure multicst network coding lgorithm with ck pressure lgorithm for optiml multicst routing, for the cse of single multicst session with two sinks The routing lgorithm is similr to tht in [2] in tht ech node mintins queue for every suset of sinks The lgorithms differ in their policies for updting queues, s the lgorithm of [2] is for dversril wired networks, wheres our lgorithm is for non-dversril wireless networks In generl, the numer of queues is exponentil in the numer of sinks We descrie the lgorithm for the cse of two sinks, where ech node mintins three queues: two individul queues contining dt tht is to e trnsmitted to ech of the sinks nd common queue contining dt tht is to e trnsmitted to oth sinks We denote y U k i, k = 1, 2, 3, respectively the lengths of these three queues t node i, nd refer to dt in the respective queues s commodity k = 1, 2, 3 dt Bck pressure is used to control the rnch points of the multicst distriution trees used In ech time slot [t, t + T, the following re crried out: Blncing: At the strt of ech timeslot, for ech nonsink node i, if U 3 i U 1 i U 2 i > 0, then n mount U 3 i U 1 i U 2 i /3 of dt is removed from the common queue nd the sme mount of dt is dded to ech of the individul queues t i Scheduling: For ech link, Z, If then we set k Z = rg mx k mx Z U k mx U k Z U k Z > U 3 Z U k 2 j=1 wz = mx U k Z U k Z Z Otherwise, we set k Z = 0 nd w Z = U 3 2 j=1 min U j Z min U j, Z
4 Power control: The stte St is oserved, nd power lloction P t = rg mx µ Z P, StwZ P Π,Z is chosen Routing: For ech link, Z, if kz 0 nd mx Z U k Z U k Z > 0, commodity kz dt is sent from to rg mx Z U k Z U k Z t the rte offered y the power lloction Otherwise, if kz = 0 nd U 3 2 j=1 min Z U j > 0, dt from the common queue t is rodcst on, Z t the offered rte, nd corresponding mount is dded to min Z U j, j = 1, 2 If the originting queues re empty within the time slot, no dt is sent This lgorithm symptoticlly chieves the optiml multicst throughput for routing The proof is omitted for revity A Experimentl setup IV SIMULATION EXPERIMENTS We run the two multicst lgorithms of the previous section on the network of Fig 2, with single node A multicsting informtion to two sink nodes E nd F We ssume common trnsmission power nd hlf-duplex constrint t ech network node The chnnel gin for from node i to node j is modeled s: trnsmission rte of R, defined s the mximum vlue for which the network is stle t rte R nd unstle t rte R + 01 The network ws considered stle for given trnsmission rte nd policy if the mximum cklog in ll queues of ll nodes ws ounded y 200 when run for 20,000 timeslots B Results The simultion results re shown in Tle 1 nd Figures 4-6 From Tle 1, we see tht under this time-vrying wireless network model with interference, the cpcity gin of the network coding strtegy of [16] over routing is lower thn the 4/3 fctor otined in the fixed-rte collision model Figures 4-6 show the proportion of different trnsmit scenrios used y the two policies, which vries depending on the experimentl prmeters In the network coding cse, the proportion of trnsmit scenrios gives rough indiction of the proportion of time network coding is used TABLE I MAXIMUM TRANSMISSION RATES R FOR CODING AND ROUTING snr 2 R for coding R for routing / / / / S ij = f ij 2 d k ij where f ij is the Ryleigh fding stte nd d ij is the distnce etween i nd j, nd k is the propgtion power loss exponent We ssume µ = E[ f 2 ] is the sme for ll i, j The two lgorithms symptoticlly chieve, for liner coding nd routing respectively, the optiml multicst throughput chievle with the following seven trnsmit scenrios, chosen so s to cover the network coding nd routing schedules of Figure 3: trnsmit scenrio 1, where A trnsmits to B, nd C rodcsts to D nd F trnsmit scenrio 2, where A trnsmits to C, nd B rodcsts to D nd E trnsmit scenrio 3, where D rodcsts to E nd F trnsmit scenrio 4, where A rodcsts to B nd C trnsmit scenrio 5, where B trnsmits to E, nd C trnsmits to F, respectively trnsmit scenrio 6, where B trnsmits to E trnsmit scenrio 7, where C trnsmits to F To investigte the effects of network geometry nd SNR, the two lgorithms were run for numer of different vlues for prmeter 1, defined in Figure 2, nd SNR For ech choice of prmeter vlues, series of simultion runs ws crried out to find the mximum stle multicst rte For ech run, the throughput ws incresed y 01, until the source queue ecme unstle, giving n pproximte mximum 3 Fig 4 The proportion of different trnsmit scenrios used y the network coding lgorithm for snr = 10 10dB, 1 = 2 = = 2/2, k = 2, µ = 15, trnmssion rte = 14 V CONCLUSION We hve compred multicst network coding nd routing for time-vrying wireless network model with interference Our results suggest tht when link cpcities re ffected y interference, nd power control, scheduling, network coding nd routing re dynmiclly controlled in response to network conditions, the gp in multicst cpcity etween network
5 Fig 5 The proportion of different trnsmit scenrios used y the network coding lgorithm for snr = dB, 1 = 2 = = 2/2, k = 2, µ = 15, trnsmission rte = 23 Fig 6 The proportion of different trnsmit scenrios used y the routing lgorithm for snr = 10 10dB, = 1 = 2 = 2/2, k = 2, µ = 15, trnmssion rte = 13 coding nd routing cn decrese reltive to collision-sed wireless model with fixed link cpcities In such cses, the min dvntge of network coding my e the reduction in complexity of optimiztion nd opertion The coding dvntge my lso increse in situtions where routing, power control nd scheduling re not done optimlly, s hs een shown for the multiple unicsts cse [9] [3] Bruch Aweruch nd Tom Leighton A simple locl control pproximtion lgorithm for multicommodity flow In Proceedings of 34th IEEE Conference on Foundtions of Computer Science, 1993 [4] P A Chou, Y Wu, nd K Jin Prcticl network coding In Proceedings of 41st Annul Allerton Conference on Communiction, Control, nd Computing, Octoer 2003 [5] Thoms Cover nd Joy Thoms Elements of Informtion Theory Wiley, 1991 [6] T Ho, R Koetter, M Médrd, D R Krger, nd M Effros The enefits of coding over routing in rndomized setting In Proceedings of 2003 IEEE Interntionl Symposium on Informtion Theory, June 2003 [7] T Ho, M Médrd, J Shi, M Effros, nd D R Krger On rndomized network coding In Proceedings of 41st Annul Allerton Conference on Communiction, Control, nd Computing, Octoer 2003 [8] T Ho nd H Viswnthn Dynmic lgorithms for multicst with intrsession network coding In Proc 43rd Annul Allerton Conference on Communiction, Control, nd Computing, 2005 [9] S Ktti, D Kti, nd M Médrd The importnce of eing opportunistic In Proc 43rd Annul Allerton Conference on Communiction, Control, nd Computing, 2005 [10] Thierry Klein nd Hrish Viswnthn Centrlized power control in multihop wireless networks In Proceedings of IEEE Interntionl Symposium on Informtion Theory, 2003 [11] Syndev Mukherjee nd Hrish Viswnthn Throughput rnge trdeoff of wireless mesh ckhul networks IEEE Journl on Selected Ares in Communictions, to pper, 2006 [12] Michel Neely Energy optiml control for time vrying networks In Proceedings of the IEEE INFOCOM, 2005 [13] Michel Neely, Eytn Modino, nd Chih-Ping Li Firness nd optiml stochstic control for heterogeneous networks In Proceedings of the IEEE INFOCOM, 2005 [14] Michel Neely, Eytn Modino, nd C Rohrs Pcket routing over prllel time-vrying queues with ppliction to stellite nd wireless networks In Proceedings of the Thirty-Ninth Annul Allerton Conference on Communictions nd Control, 2001 [15] Michel Neely, Eytn Modino, nd Chrles E Rohrs Dynmic power lloction nd routing for time-vrying wireless networks In Proceedings of IEEE Infocom, 2003 [16] Y E Sgduyu nd A Ephremides Joint scheduling nd wireless network coding In Proc 1st Workshop on Network Coding, Theory nd Applictions, 2005 [17] Sswti Srkr nd Lendros Tssiuls A frmework for routing nd congestion control for multicst informtion flows IEEE Trnsctions on Informtion Theory, 2002 [18] Lendros Tssiuls nd Anthony F Ephremides Stility properties of constrined queuing systems nd scheduling policies for mximum throughput in multihop networks IEEE Trnsctions on Informtion Theory, 1992 [19] Hrish Viswnthn nd Krishnn Kumrn Rte scheduling for multiple ntenn downlink wireless systems In Proceedings of the Thirty- Ninth Annul Allerton Conference on Communictions nd Control, 2001 [20] Yunnn Wu, Philip A Chou, Qin Zhng, Kml Jin, Wenwu Zhu, nd Sun-Yun Kung Network plnning in wireless d hoc networks: A cross-lyer pproch IEEE Journl on Selected Ares in Communictions, Specil Issue on Wireless Ad Hoc Networks, 2005 [21] Edmund Yeh nd Aron Cohen Throughput nd dely optiml resource lloction in multiccess fding chnnels In Proceedings of IEEE Interntionl Symposium on Informtion Theory, 2003 [22] Edmund Yeh nd Aron Cohen Throughput optiml power nd rte control in queued multiccess nd fding chnnels In Proceedings of IEEE Interntionl Symposium on Informtion Theory, 2004 REFERENCES [1] R Ahlswede, N Ci, S-YR Li, nd RW Yeung Network informtion flow IEEE Trnsctions on Informtion Theory, 46: , 2000 [2] Bruch Aweruch, André Brinkmnn, nd Christin Scheideler Anycsting nd multicsting in dversril systems: routing nd dmission control, preliminry technicl report, 2002
2 Computing all Intersections of a Set of Segments Line Segment Intersection
15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design
More informationOn Achieving Optimal Throughput with Network Coding
In IEEE INFOCOM On Achieving Optiml Throughput with Network Coding Zongpeng Li, Bochun Li, Dn Jing, Lp Chi Lu Astrct With the constrints of network topologies nd link cpcities, chieving the optiml end-to-end
More informationComplete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li
2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min
More informationLecture 10 Evolutionary Computation: Evolution strategies and genetic programming
Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting
More informationEvolutionary Approaches To Minimizing Network Coding Resources
This full text pper ws peer reviewed t the direction of IEEE Communictions Society suject mtter experts for puliction in the IEEE INFOCOM 2007 proceedings. Evolutionry Approches To Minimizing Network Coding
More informationRevisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network
Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 Revisiting the notion of Origin-Destintion Trffic Mtrix of the Hosts tht re ttched to Switched Locl Are Network Mondy
More informationOverview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases
Overview Mobile computing nd dtbses Generl issues in mobile dt mngement Dt dissemintion Dt consistency Loction dependent queries Interfces Detils of brodcst disks thlis klfigopoulos Network rchitecture
More informationAn evolutionary approach to inter-session network coding
An evolutionry pproch to inter-session network coding The MIT Fculty hs mde this rticle openly ville. Plese shre how this ccess enefits you. Your story mtters. Cittion As Pulished Pulisher Kim, M. et l.
More informationBefore We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):
Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters
More informationFig.25: the Role of LEX
The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing
More informationDesign and Performance Evaluation of Underwater Data Dissemination Strategies using Interference Avoidance and Network Coding
Design nd Performnce Evlution of Underwter Dt Dissemintion Strtegies using Interference Avoidnce nd Network Coding Rúl Plcios Fbrizio Grnelli University of Trento, Itly Jnus Heide Frnk H.P. Fitzek Alborg
More informationAgilent Mass Hunter Software
Agilent Mss Hunter Softwre Quick Strt Guide Use this guide to get strted with the Mss Hunter softwre. Wht is Mss Hunter Softwre? Mss Hunter is n integrl prt of Agilent TOF softwre (version A.02.00). Mss
More informationEfficient Rerouting Algorithms for Congestion Mitigation
2009 IEEE Computer Society Annul Symposium on VLSI Efficient Rerouting Algorithms for Congestion Mitigtion M. A. R. Chudhry*, Z. Asd, A. Sprintson, nd J. Hu Deprtment of Electricl nd Computer Engineering
More informationNetwork Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved
Network Interconnection: Bridging CS 57 Fll 6 6 Kenneth L. Clvert All rights reserved The Prolem We know how to uild (rodcst) LANs Wnt to connect severl LANs together to overcome scling limits Recll: speed
More informationUT1553B BCRT True Dual-port Memory Interface
UTMC APPICATION NOTE UT553B BCRT True Dul-port Memory Interfce INTRODUCTION The UTMC UT553B BCRT is monolithic CMOS integrted circuit tht provides comprehensive MI-STD- 553B Bus Controller nd Remote Terminl
More informationTHE throughput of information transmission within a data
IEEE TRANACTION ON INFORMATION THEORY A Constnt Bound on Throughput Improvement of Multicst Network Coding in Undirected Networks Zongpeng Li, Memer, IEEE Bochun Li, enior Memer, IEEE Lp Chi Lu Deprtment
More informationEfficient Algorithms For Optimizing Policy-Constrained Routing
Efficient Algorithms For Optimizing Policy-Constrined Routing Andrew R. Curtis curtis@cs.colostte.edu Ross M. McConnell rmm@cs.colostte.edu Dn Mssey mssey@cs.colostte.edu Astrct Routing policies ply n
More informationImproving the Connectivity of Heterogeneous Multi-Hop Wireless Networks
1569363897 1 Improving the Connectivity of Heterogeneous Multi-Hop Wireless Networks Te-Hoon Kim, Dvid Tipper, nd Prshnt Krishnmurthy Grdute Networking nd Telecommunictions Progrm University of Pittsburgh,
More informationComputer Networks 53 (2009) Contents lists available at ScienceDirect. Computer Networks. journal homepage:
Computer Networks 53 (29) 252 2516 Contents lists ville t ScienceDirect Computer Networks journl homepge: www.elsevier.com/locte/comnet Congestion-wre chnnel ssignment for multi-chnnel wireless mesh networks
More informationLECT-10, S-1 FP2P08, Javed I.
A Course on Foundtions of Peer-to-Peer Systems & Applictions LECT-10, S-1 CS /799 Foundtion of Peer-to-Peer Applictions & Systems Kent Stte University Dept. of Computer Science www.cs.kent.edu/~jved/clss-p2p08
More informationCSEP 573 Artificial Intelligence Winter 2016
CSEP 573 Artificil Intelligence Winter 2016 Luke Zettlemoyer Problem Spces nd Serch slides from Dn Klein, Sturt Russell, Andrew Moore, Dn Weld, Pieter Abbeel, Ali Frhdi Outline Agents tht Pln Ahed Serch
More informationSlides for Data Mining by I. H. Witten and E. Frank
Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully
More informationNetwork Layer: Routing Classifications; Shortest Path Routing
igitl ommuniction in the Modern World : Routing lssifictions; Shortest Pth Routing s min prolem: To get efficiently from one point to the other in dynmic environment http://.cs.huji.c.il/~com com@cs.huji.c.il
More informationPerformance analysis of QoS mechanisms in IP networks
University of Wollongong Reserch Online Fculty of Informtics - Ppers (Archive) Fculty of Engineering nd Informtion Sciences 2000 Performnce nlysis of QoS mechnisms in IP networks D. Ji University of Wollongong
More informationthis grammar generates the following language: Because this symbol will also be used in a later step, it receives the
LR() nlysis Drwcks of LR(). Look-hed symols s eplined efore, concerning LR(), it is possile to consult the net set to determine, in the reduction sttes, for which symols it would e possile to perform reductions.
More informationPresentation Martin Randers
Presenttion Mrtin Rnders Outline Introduction Algorithms Implementtion nd experiments Memory consumption Summry Introduction Introduction Evolution of species cn e modelled in trees Trees consist of nodes
More informationMobile IP route optimization method for a carrier-scale IP network
Moile IP route optimiztion method for crrier-scle IP network Tkeshi Ihr, Hiroyuki Ohnishi, nd Ysushi Tkgi NTT Network Service Systems Lortories 3-9-11 Midori-cho, Musshino-shi, Tokyo 180-8585, Jpn Phone:
More informationCS 268: IP Multicast Routing
Motivtion CS 268: IP Multicst Routing Ion Stoic April 5, 2004 Mny pplictions requires one-to-mny communiction - E.g., video/udio conferencing, news dissemintion, file updtes, etc. Using unicst to replicte
More informationA Study of Quality of Service Resource Allocation Schemes for Mobile Health
RESEARCH ARTICLE A Study of Qulity of Service Resource Alloction Schemes for Moile Helth Idris Krim nd Tr Ali Yhiy* Deprtment of Computer Science nd Engineering, University of Kurdistn Hewler, Kurdistn
More informationA dual of the rectangle-segmentation problem for binary matrices
A dul of the rectngle-segmenttion prolem for inry mtrices Thoms Klinowski Astrct We consider the prolem to decompose inry mtrix into smll numer of inry mtrices whose -entries form rectngle. We show tht
More informationEECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining
EECS150 - Digitl Design Lecture 23 - High-level Design nd Optimiztion 3, Prllelism nd Pipelining Nov 12, 2002 John Wwrzynek Fll 2002 EECS150 - Lec23-HL3 Pge 1 Prllelism Prllelism is the ct of doing more
More informationSUPPLEMENTARY INFORMATION
Supplementry Figure y (m) x (m) prllel perpendiculr Distnce (m) Bird Stndrd devition for distnce (m) c 6 prllel perpendiculr 4 doi:.8/nture99 SUPPLEMENTARY FIGURE Confirmtion tht movement within the flock
More informationSolving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016
Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence Winter 2016 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl
More information1.5 Extrema and the Mean Value Theorem
.5 Extrem nd the Men Vlue Theorem.5. Mximum nd Minimum Vlues Definition.5. (Glol Mximum). Let f : D! R e function with domin D. Then f hs n glol mximum vlue t point c, iff(c) f(x) for ll x D. The vlue
More informationA Priority-based Distributed Call Admission Protocol for Multi-hop Wireless Ad hoc Networks
A Priority-bsed Distributed Cll Admission Protocol for Multi-hop Wireless Ad hoc Networks un Sun Elizbeth M. Belding-Royer Deprtment of Computer Science University of Cliforni, Snt Brbr suny, ebelding
More informationOn Computation and Resource Management in Networked Embedded Systems
On Computtion nd Resource Mngement in Networed Embedded Systems Soheil Ghisi Krlene Nguyen Elheh Bozorgzdeh Mjid Srrfzdeh Computer Science Deprtment University of Cliforni, Los Angeles, CA 90095 soheil,
More informationMTH 146 Conics Supplement
105- Review of Conics MTH 146 Conics Supplement In this section we review conics If ou ne more detils thn re present in the notes, r through section 105 of the ook Definition: A prol is the set of points
More informationOrthogonal line segment intersection
Computtionl Geometry [csci 3250] Line segment intersection The prolem (wht) Computtionl Geometry [csci 3250] Orthogonl line segment intersection Applictions (why) Algorithms (how) A specil cse: Orthogonl
More informationThe Greedy Method. The Greedy Method
Lists nd Itertors /8/26 Presenttion for use with the textook, Algorithm Design nd Applictions, y M. T. Goodrich nd R. Tmssi, Wiley, 25 The Greedy Method The Greedy Method The greedy method is generl lgorithm
More informationFrom Dependencies to Evaluation Strategies
From Dependencies to Evlution Strtegies Possile strtegies: 1 let the user define the evlution order 2 utomtic strtegy sed on the dependencies: use locl dependencies to determine which ttriutes to compute
More informationA Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards
A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin
More informationPerformance enhancement of IEEE DCF using novel backoff algorithm
Kuo et l. EURASIP Journl on Wireless Communictions nd Networking 212, 212:274 http://jis.eursipjournls.com/content/212/1/274 RESEARCH Open Access Performnce enhncement of IEEE 82.11 using novel ckoff lgorithm
More informationRethinking Virtual Network Embedding: Substrate Support for Path Splitting and Migration
Rethinking Virtul Network Emedding: Sustrte Support for Pth Splitting nd Migrtion Minln Yu, Yung Yi, Jennifer Rexford, Mung Ching Computer Science, Princeton University, Emil: {minlnyu,jrex}@cs.princeton.edu
More informationToday. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search.
CS 88: Artificil Intelligence Fll 00 Lecture : A* Serch 9//00 A* Serch rph Serch Tody Heuristic Design Dn Klein UC Berkeley Multiple slides from Sturt Russell or Andrew Moore Recp: Serch Exmple: Pncke
More informationPARALLEL AND DISTRIBUTED COMPUTING
PARALLEL AND DISTRIBUTED COMPUTING 2009/2010 1 st Semester Teste Jnury 9, 2010 Durtion: 2h00 - No extr mteril llowed. This includes notes, scrtch pper, clcultor, etc. - Give your nswers in the ville spce
More informationAI Adjacent Fields. This slide deck courtesy of Dan Klein at UC Berkeley
AI Adjcent Fields Philosophy: Logic, methods of resoning Mind s physicl system Foundtions of lerning, lnguge, rtionlity Mthemtics Forml representtion nd proof Algorithms, computtion, (un)decidility, (in)trctility
More informationTree Structured Symmetrical Systems of Linear Equations and their Graphical Solution
Proceedings of the World Congress on Engineering nd Computer Science 4 Vol I WCECS 4, -4 October, 4, Sn Frncisco, USA Tree Structured Symmetricl Systems of Liner Equtions nd their Grphicl Solution Jime
More informationP(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have
Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using
More informationDistributed Systems Principles and Paradigms
Distriuted Systems Principles nd Prdigms Chpter 11 (version April 7, 2008) Mrten vn Steen Vrije Universiteit Amsterdm, Fculty of Science Dept. Mthemtics nd Computer Science Room R4.20. Tel: (020) 598 7784
More informationIn the last lecture, we discussed how valid tokens may be specified by regular expressions.
LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.
More informationAnnouncements. CS 188: Artificial Intelligence Fall Recap: Search. Today. General Tree Search. Uniform Cost. Lecture 3: A* Search 9/4/2007
CS 88: Artificil Intelligence Fll 2007 Lecture : A* Serch 9/4/2007 Dn Klein UC Berkeley Mny slides over the course dpted from either Sturt Russell or Andrew Moore Announcements Sections: New section 06:
More informationEfficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc
4th Ntionl Conference on Electricl, Electronics nd Computer Engineering (NCEECE 2015) Efficient Regulr Expression Grouping Algorithm Bsed on Lbel Propgtion Xi Chen, Shuqio Chenb nd Ming Moc Ntionl Digitl
More information1.1. Interval Notation and Set Notation Essential Question When is it convenient to use set-builder notation to represent a set of numbers?
1.1 TEXAS ESSENTIAL KNOWLEDGE AND SKILLS Prepring for 2A.6.K, 2A.7.I Intervl Nottion nd Set Nottion Essentil Question When is it convenient to use set-uilder nottion to represent set of numers? A collection
More informationStained Glass Design. Teaching Goals:
Stined Glss Design Time required 45-90 minutes Teching Gols: 1. Students pply grphic methods to design vrious shpes on the plne.. Students pply geometric trnsformtions of grphs of functions in order to
More informationMA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork
MA1008 Clculus nd Liner Algebr for Engineers Course Notes for Section B Stephen Wills Deprtment of Mthemtics University College Cork s.wills@ucc.ie http://euclid.ucc.ie/pges/stff/wills/teching/m1008/ma1008.html
More informationLETKF compared to 4DVAR for assimilation of surface pressure observations in IFS
LETKF compred to 4DVAR for ssimiltion of surfce pressure oservtions in IFS Pu Escrià, Mssimo Bonvit, Mts Hmrud, Lrs Isksen nd Pul Poli Interntionl Conference on Ensemle Methods in Geophysicl Sciences Toulouse,
More informationIZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI
IZT DAB ContentServer, IZT S1000 Testing DAB Receivers Using ETI Appliction Note Rel-time nd offline modultion from ETI files Generting nd nlyzing ETI files Rel-time interfce using EDI/ETI IZT DAB CONTENTSERVER
More informationGENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES
GENEATING OTHOIMAGES FO CLOSE-ANGE OBJECTS BY AUTOMATICALLY DETECTING BEAKLINES Efstrtios Stylinidis 1, Lzros Sechidis 1, Petros Ptis 1, Spiros Sptls 2 Aristotle University of Thessloniki 1 Deprtment of
More informationCS321 Languages and Compiler Design I. Winter 2012 Lecture 5
CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,
More informationDIFFERENT POLICY OBJECTIVES OF THE ROAD AUTHORITY IN THE OPTIMAL TOLL DESIGN PROBLEM
DIFFERENT POLICY OBJECTIVES OF THE ROAD AUTHORITY IN THE OPTIMAL TOLL DESIGN PROBLEM Dusic Joksimovic*, Michiel Bliemer Delft University of Technology, The Netherlnds ARS Trnsport &Technology, The Netherlnds
More informationWhat are suffix trees?
Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl
More informationFig.1. Let a source of monochromatic light be incident on a slit of finite width a, as shown in Fig. 1.
Answer on Question #5692, Physics, Optics Stte slient fetures of single slit Frunhofer diffrction pttern. The slit is verticl nd illuminted by point source. Also, obtin n expression for intensity distribution
More informationToday. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search
Uninformed Serch [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.] Tody Serch Problems Uninformed Serch Methods
More informationCS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis
CS143 Hndout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexicl Anlysis In this first written ssignment, you'll get the chnce to ply round with the vrious constructions tht come up when doing lexicl
More informationMcAfee Network Security Platform
10/100/1000 Copper Active Fil-Open Bypss Kit Guide Revision E McAfee Network Security Pltform This document descries the contents nd how to instll the McAfee 10/100/1000 Copper Active Fil-Open Bypss Kit
More informationSystems I. Logic Design I. Topics Digital logic Logic gates Simple combinational logic circuits
Systems I Logic Design I Topics Digitl logic Logic gtes Simple comintionl logic circuits Simple C sttement.. C = + ; Wht pieces of hrdwre do you think you might need? Storge - for vlues,, C Computtion
More informationImproved Clock-Gating through Transparent Pipelining
2. Improved Clock-Gting through Trnsprent Pipelining Hns M. Jcobson IM T.J. Wtson Reserch Center, Yorktown, NY. hnsj@us.ibm.com STRCT This pper re-exmines the well estblished clocking principles of pipelines.
More informationApproximation of Two-Dimensional Rectangle Packing
pproximtion of Two-imensionl Rectngle Pcking Pinhong hen, Yn hen, Mudit Goel, Freddy Mng S70 Project Report, Spring 1999. My 18, 1999 1 Introduction 1-d in pcking nd -d in pcking re clssic NP-complete
More informationAlgorithm Design (5) Text Search
Algorithm Design (5) Text Serch Tkshi Chikym School of Engineering The University of Tokyo Text Serch Find sustring tht mtches the given key string in text dt of lrge mount Key string: chr x[m] Text Dt:
More informationCOMP 423 lecture 11 Jan. 28, 2008
COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring
More informationThe Distributed Data Access Schemes in Lambda Grid Networks
The Distributed Dt Access Schemes in Lmbd Grid Networks Ryot Usui, Hiroyuki Miygi, Yutk Arkw, Storu Okmoto, nd Noki Ymnk Grdute School of Science for Open nd Environmentl Systems, Keio University, Jpn
More informationSolving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence
Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl component
More informationSimrad ES80. Software Release Note Introduction
Simrd ES80 Softwre Relese 1.3.0 Introduction This document descries the chnges introduced with the new softwre version. Product: ES80 Softwre version: 1.3.0 This softwre controls ll functionlity in the
More informationA Sparse Grid Representation for Dynamic Three-Dimensional Worlds
A Sprse Grid Representtion for Dynmic Three-Dimensionl Worlds Nthn R. Sturtevnt Deprtment of Computer Science University of Denver Denver, CO, 80208 sturtevnt@cs.du.edu Astrct Grid representtions offer
More informationSpectral Analysis of MCDF Operations in Image Processing
Spectrl Anlysis of MCDF Opertions in Imge Processing ZHIQIANG MA 1,2 WANWU GUO 3 1 School of Computer Science, Northest Norml University Chngchun, Jilin, Chin 2 Deprtment of Computer Science, JilinUniversity
More informationQubit allocation for quantum circuit compilers
Quit lloction for quntum circuit compilers Nov. 10, 2017 JIQ 2017 Mrcos Yukio Sirichi Sylvin Collnge Vinícius Fernndes dos Sntos Fernndo Mgno Quintão Pereir Compilers for quntum computing The first genertion
More informationPerformance Evaluation of Dynamic Reconfiguration in High-Speed Local Area Networks
Performnce Evlution of Dynmic Reconfigurtion in High-Speed Locl Are Networks Rfel Csdo, Aurelio Bermúdez, Frncisco J. Quiles, JoséL.Sánchez Depto. de Informátic Universidd de Cstill-L Mnch 271- Albcete,
More informationChapter 7. Routing with Frame Relay, X.25, and SNA. 7.1 Routing. This chapter discusses Frame Relay, X.25, and SNA Routing. Also see the following:
Chpter 7 Routing with Frme Rely, X.25, nd SNA This chpter discusses Frme Rely, X.25, nd SNA Routing. Also see the following: Section 4.2, Identifying the BANDIT in the Network Section 4.3, Defining Globl
More informationZZ - Advanced Math Review 2017
ZZ - Advnced Mth Review Mtrix Multipliction Given! nd! find the sum of the elements of the product BA First, rewrite the mtrices in the correct order to multiply The product is BA hs order x since B is
More informationDeadlock-Free Fully Adaptive Routing in Irregular Networks without Virtual Channels
Dedlock-Free Fully Adptive Routing in Irregulr Networks without Virtul Chnnels Dong Xing School of Softwre Tsinghu University Beijing 100084, Chin dxing@tsinghu.edu.cn Zhigng Yu Dept. of Computer Science
More informationUnit #9 : Definite Integral Properties, Fundamental Theorem of Calculus
Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl
More informationCSCI 446: Artificial Intelligence
CSCI 446: Artificil Intelligence Serch Instructor: Michele Vn Dyne [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.]
More informationIP: Network Layer. Goals and Tasks. Routing. Switching. Switching (cont.) Datagram v/s Virtual Circuit. Overview Addressing Routing
IP: Network Lyer Overview Addressing Routing Overview Gols nd Tsks Routing Switching Issues Bsic ides TOC IP TOC IP Overview Gols nd Tsks Gols of Network Lyer Guide pckets from source to destintion Use
More informationVirtual Network Embedding For Evolving Networks
This full text pper ws peer reviewed t the direction of IEEE Communictions Society subject mtter experts for publiction in the IEEE Globecom proceedings. Virtul Network Embedding For Evolving Networks
More informationA Heuristic Approach for Discovering Reference Models by Mining Process Model Variants
A Heuristic Approch for Discovering Reference Models by Mining Process Model Vrints Chen Li 1, Mnfred Reichert 2, nd Andres Wombcher 3 1 Informtion System Group, University of Twente, The Netherlnds lic@cs.utwente.nl
More informationMa/CS 6b Class 1: Graph Recap
M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Adm Sheffer. Office hour: Tuesdys 4pm. dmsh@cltech.edu TA: Victor Kstkin. Office hour: Tuesdys 7pm. 1:00 Mondy, Wednesdy, nd Fridy. http://www.mth.cltech.edu/~2014-15/2term/m006/
More informationSubband coding of image sequences using multiple vector quantizers. Emanuel Martins, Vitor Silva and Luís de Sá
Sund coding of imge sequences using multiple vector quntizers Emnuel Mrtins, Vitor Silv nd Luís de Sá Instituto de Telecomunicções, Deprtmento de Engenhri Electrotécnic Pólo II d Universidde de Coimr,
More information4452 Mathematical Modeling Lecture 4: Lagrange Multipliers
Mth Modeling Lecture 4: Lgrnge Multipliers Pge 4452 Mthemticl Modeling Lecture 4: Lgrnge Multipliers Lgrnge multipliers re high powered mthemticl technique to find the mximum nd minimum of multidimensionl
More informationGeometry-Based Stochastic Channel Models for 5G: Extending Key Features for Massive MIMO
Geometry-Bsed Stochstic Chnnel Models for 5G: Extending Key Fetures for Mssive MIMO Àlex Olivers Mrtínez, Ptrick Eggers, Eliseth De Crvlho Fculty of Engineering nd Science, Dept. of Electronic Systems,
More informationEfficient K-NN Search in Polyphonic Music Databases Using a Lower Bounding Mechanism
Efficient K-NN Serch in Polyphonic Music Dtses Using Lower Bounding Mechnism Ning-Hn Liu Deprtment of Computer Science Ntionl Tsing Hu University Hsinchu,Tiwn 300, R.O.C 886-3-575679 nhliou@yhoo.com.tw
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationCompression Outline :Algorithms in the Real World. Lempel-Ziv Algorithms. LZ77: Sliding Window Lempel-Ziv
Compression Outline 15-853:Algorithms in the Rel World Dt Compression III Introduction: Lossy vs. Lossless, Benchmrks, Informtion Theory: Entropy, etc. Proility Coding: Huffmn + Arithmetic Coding Applictions
More informationA Probabilistic Emergent Routing Algorithm for Mobile Ad Hoc Networks
Author mnuscript, published in "WiOpt'03: Modeling nd Optimiztion in Mobile, Ad oc nd Wireless Networks (2003) 10 pges" A Probbilistic Emergent Routing Algorithm for Mobile Ad oc Networks John S. Brs nd
More informationAnnouncements. CS 188: Artificial Intelligence Fall Recap: Search. Today. Example: Pancake Problem. Example: Pancake Problem
Announcements Project : erch It s live! Due 9/. trt erly nd sk questions. It s longer thn most! Need prtner? Come up fter clss or try Pizz ections: cn go to ny, ut hve priority in your own C 88: Artificil
More informationExam #1 for Computer Simulation Spring 2005
Exm # for Computer Simultion Spring 005 >>> SOLUTION
More informationPointwise convergence need not behave well with respect to standard properties such as continuity.
Chpter 3 Uniform Convergence Lecture 9 Sequences of functions re of gret importnce in mny res of pure nd pplied mthemtics, nd their properties cn often be studied in the context of metric spces, s in Exmples
More informationCSCE 531, Spring 2017, Midterm Exam Answer Key
CCE 531, pring 2017, Midterm Exm Answer Key 1. (15 points) Using the method descried in the ook or in clss, convert the following regulr expression into n equivlent (nondeterministic) finite utomton: (
More informationarxiv: v1 [cs.db] 16 Sep 2016
Blech: A Distriuted Strem Dt Clening System Yongcho Tin Eurecom yongcho.tin@eurecom.fr Pietro Michirdi Eurecom pietro.michirdi@eurecom.fr Mrko Vukolić IBM Reserch - Zurich mvu@zurich.im.com rxiv:169.5113v1
More informationEngineer To Engineer Note
Engineer To Engineer Note EE-169 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit
More informationReplicating Web Applications On-Demand
Replicting Web Applictions On-Demnd Swminthn Sivsubrmnin Guillume Pierre Mrten vn Steen Dept. of Computer Science, Vrije Universiteit, Amsterdm {swmi,gpierre,steen}@cs.vu.nl Abstrct Mny Web-bsed commercil
More information