Deadlock-Free Path-Based Fault-Tolerant Multicast Communications on 2-D Mesh Networks-on-Chip

Size: px
Start display at page:

Download "Deadlock-Free Path-Based Fault-Tolerant Multicast Communications on 2-D Mesh Networks-on-Chip"

Transcription

1 The CSI Journal on Computer Scence and Engneerng Vol. 6, No. 2 & 4 (b), 2008 Pages Short Paper Deadlock-Free Path-Based Fault-Tolerant Multcast Communcatons on 2-D Mesh Networks-on-Chp Majed ValadBeg Farshad Safae Department of Electrcal & Computer Engneerng, Shahd Behesht Unversty, Tehran, Iran Abstract The move towards nanoscale Integrated Crcuts (ICs) ncreases performance and capacty, but poses process varaton and relablty challenges whch may cause several faults on routers n Networks-on-Chp (NoCs). Whle utlzng healthy routers n an NoCs s desrable, faulty regons wth dfferent shapes are formed gatherng faulty routers. Fault regons can be used to lead the fault-tolerant routng algorthms to perform data transmsson between healthy routers. Besdes, the ncreasng number of collectve communcaton-based servces wth a mass nterest and the parallel ncreasng demand for servce qualty are pavng the way toward end-to-end qualty of servce guarantees. The collectve communcaton servces embrace multcast (the same message s sent from a source node to an arbtrary number of destnaton nodes). Ths paper presents the fault-tolerant mesh-based wormhole-swtched NoCs whch supports deadlock-free path-based multcast routng. Ths technque flls the gap of not havng optmum multcast fault-tolerant wormhole-swtched approaches and also mantans mnmal routng path whch tolerates both convex and concave fault regons whle keepng the area and power overhead at a proper level. Multcast messages are njected to the network by sendng a message header beforehand. The message header contans destnaton addresses to set-up multcast path connectng a source wth multple destnaton nodes. Moreover, the fault nformaton s kept locally and each faultfree processor needs to know the status of the lnk ncdent on t only. Performance of the proposed methodology s smulated under dfferent network condtons and show that t degrades gracefully n the presence of varous fault patterns. Keywords: Networks-on-Chp, Fault-Tolerance, Multcast Communcatons, Multcast Path-Based Routng, Wormhole Message Passng, Faulty Patterns, Performance Evaluaton. 1. Introducton Networks-on-Chp (NoCs) s a challengng research topc, provdng a scalable soluton for multprocessors on chp [1]. The lack of scalablty n bus-based systems and large area overhead of pont-to-pont dedcated lnks on one hand, and the scalablty and performance of swtch-based networks and packet-based communcaton n the nternet and tradtonal parallel computng on the other hand, have motvated researchers to propose packet-swtched NoCs archtectures to overcome complex on-chp communcaton problems [2]. Although the concept of NoCs s nspred from the networks n parallel processors, they have some specfc propertes whch dffer from the tradtonal networks. Compared to tradtonal networks, power consumpton and fault-tolerance are becomng ncreasngly mportant constrants n NoCs desgn [2]. Wth the shrnkng feature sze, the relablty becomes more dffcult to acheve due to smaller voltage supples and hgher amount of computng elements per area unt. It results n smaller nose mmunty and ncreased rsk of cross-talk and other errors [2-4]. Moreover, crtcal leakage currents, hgh feld effects, and process varaton wll lead to more transent and permanent falures of sgnals, logc values and devces and nterconnects [5]. As communcaton nfrastructure s an mportant ssue of today s Systems-on-Chp (SoCs) and Chp-Multprocessors (CMPs), fault-tolerance has to be taken nto account along wth desgn of ths part of chps. Havng the same concept as tradtonal nterconnecton networks, the resources used n tradtonal networks n order to acheve fault-tolerance are not easly avalable n VLSI chps. Routng algorthm, as one

2 M. ValadBeg and F. Safae: Deadlock-Free Path-Based Fault-Tolerant Multcast (Short Paper) 37 of the most mportant aspects of NoCs, has been exploted by many researchers to guarantee relable operaton of the network [6-8], by bypassng the faulty nodes and lnks. Servces n terms of effcent routng and schedulng are crtcal wth respect to the performance of NoCs-based multcore processor systems. Hstorcally, the frstgeneraton multcomputer supported uncast communcaton only (sngle PE sends a message to sngle PE unt). Nowadays, multcomputers have been developed towards collectve communcaton servces. The collectve communcaton servces embrace multcast (the same message s sent from a source node to an arbtrary number of destnaton nodes). In path-based multcast scheme, a source node prepares a message for delvery to a set of destnatons by frst sortng the addresses of the destnatons n the order n whch they are to be delvered and then placng ths sorted lst n the header flts of message. When the header enters a router wth address a, the router checks to see f a s the next address n the header. If so, the address a s removed from the message header and the data flts are forwarded both to the local processor at ths node as well as to the next node on the path. Otherwse, the message s forwarded only to the next node on the path. In ths way, the message s eventually delvered to every destnaton n the header [9]. In ths paper, we study the problem of fault-tolerant multcast communcaton for wormhole-swtched NoCs. Ths s an mportant problem snce multcast communcaton s a natural communcaton prmtve to handle synchronzatons, nvaldatons and updates of cache lnes n NoCs applcatons and also because the NoCs performance s closely related to the robustness of the fault-tolerant routng algorthms of such networks. Regardng the complexty, havng no guarantee Qualtyof-Servce and lack of fault-tolerant multcast communcatons n NoCs, we propose, mplement and evaluate fault-tolerant wormhole-swtched NoCs whch supports deadlock-free path-based multcast routng that leads to easy handlng of faults and also preventng statc fault patterns n NoCs wth 2-D mesh topology. The rest of the paper s organzed as follows. Secton 2 descrbes the necessary background nformaton that s used n the paper. In Secton 3, we revew prevous relevant works. Secton 4 presents the bref of the man contrbuton of the paper. Our fault-tolerant routng methodology whch s coupled wth multcast communcaton s ntroduced n Secton 5. In Secton 6, the expermental results wth dfferent fault regons and other related parameters are presented. Fnally, n Secton 7 we conclude by summarzng our man contrbuton and future works. 2. Prelmnares Ths secton revews some defntons and background of the mesh and descrbes the concept of fault models and fault patterns used n ths paper The Mesh Networks The topology of a network defnes how the nodes are nterconnected and s generally modeled as a graph n whch the vertces represent the nodes and the edges denote the communcaton lnes. The NoC concept has been proposed to overcome the problems of tradtonal wre/bus-based nterconnecton [3]. The NoC uses nterconnecton networks to connect ntellectual propertes (IPs) and to cope wth the ncreased sze and complexty of IPs. Besdes, dfferent topologes of nterconnecton networks can provde dfferent features n NoCs. Among dfferent topologes the 2-D mesh s one of the most popular topology, n whch the routers of NoCs are connected as a 2-D array and each IP s connected to an ndvdual router. The mesh networks, the tree networks, the star networks and the smple loop networks frequently appear n varous applcatons of networks. Many nterconnecton networks are constructed by Cartesan product [10]. Defnton 1 [10]: Let G 1 = ( V 1, E 1 ) and G 2 = ( V 2, E 2 ) be two graphs. The Cartesan product of G 1 and G 2, denoted by G1 G2, s the graph wth vertex set V 1 V 2 such that ( u1, v 1) s joned to ( u2, v2) k tmes f and only f ether u1 = u2 and v 1 s joned to vk 2 tmes n G 2 or v 1 = v 2 and u 1 s joned to uk 2 tmes n G 1. Defnton 2 [10]: The topologcal structure of a 2-D mesh network, Mm ( 1, m 2) s defned as the Cartesan product of two paths Pm P, where 1 m P 2 m s the path graph wth m vertces. Due to ts modularty and symmetry n terms of lnk length, the mesh topology s one of the most desrable topologes regardng to characterstcs; the number of lnks per node does not change f addtonal nodes are added to the mesh. Therefore, the mesh topology offers very good scalablty. Addtonally, the mesh s low cost s because ths network topology conssts of fewer lnks per node than most other archtectures The Fault Model Fault-tolerance s defned as the ablty of a system to contnue operaton despte the presence of faults [8]. In ths sense, fault-tolerance s closely related to concepts such as relablty, avalablty and dependablty as t may serve to provde these features. Faults n a network take many forms, such as hardware faults, software bugs, malcous snffng or removal of packets. The frst step n dealng wth errors s to understand the nature of component falures and then to develop smple models that allow us to reason about the falure and the methods for handlng t. Classfcaton of faults by nature s ether random or systematc faults. Random faults are usually hardware faults affectng the system components, whch occur wth a certan probablty, whle systematc faults such as software falures are faults whch are not random, whether a component has t or not [8]. We assume that such permanent falures are detected and contaned on a node or lnk boundary. Thus, faults are assumed to be fal-stop [11], meanng that we do not consder Byzantne (.e., malcous) faults [8]. In the contexts of fault-tolerant routng, these are common assumptons [8, 11-13]. Faults can also be classfed by ther duraton as transent and permanent faults [8]. Transent faults persst n the system for only a short duraton whle permanent faults

3 The CSI Journal on Computer Scence and Engneerng, Vol. 6, No. 2 & 4 (b), reman n the system untl t s repared and may be ether dynamc or statc. In a dynamc fault model, once a new fault s found, actons are taken n order to approprately handle the faulty component whch allows the system to reconfgure at the hardware level and preserves the orgnal network topology. A statc system provdes a fault-tolerant routng algorthm that wll bypass any faled node The Fault Pattern To smplfy the routng algorthm, adjacent faulty nodes are coalesced nto fault regons, whch may lead to dfferent patterns of faled components. To analyze the performance of fault-tolerant routng algorthms, t s mportant to dentfy and quantfy the fault regons, whch may occur n the network. The shapes of such fault regons are often restrcted by the fault model n use. Furthermore, the fault model may mpose addtonal restrctons on the locatons of the faults. For nstance faults may not be allowed on the edges of the mesh and there may be a mnmum dstance between separate fault regons. A routng algorthm applyng such a fault model s generally to tolerate all fault combnatons conformng to the fault model, thus, the provded faulttolerance s defned by the fault model. In the case that a fault combnaton s not conformng to the fault model n use, healthy nodes are marked as faulty (.e., dsabled) n order to create proper fault regons. Although healthy nodes are dsabled, a fault combnaton s consdered to be tolerated as long as all the nodes that are nether faulty nor dsabled are connected through vald paths. Fault regons extended by faulty components may form convex (also referred to as the block fault model) or concave shaped fault patterns [8, 11-14]. Defnton 3 [8, 11-14]: A convex regon s defned as a regon n whch a lne segment connectng any two ponts n les entrely wthn. If we change the "lne segment" n the standard convex regon defnton to "horzontal or vertcal lne segment", the resulted regon s called rectlnear convex segments [12, 13]. Any regon that s not convex s a concave regon. Examples of convex regons are -shape, -shape and concave regons are L-shape, U-shape, T-shape, H-shape and +-shape. The convex fault model s the smplest fault model n mesh topologes. Under the convex fault model, all fault regons are requred to have a rectangular shape n a 2-D mesh and a cubod shape n a 3-D mesh. Convex faults can be created by markng a node faulty f t has a faulty neghbor/channel n at least two dmensons [11]. A strcter verson of the convex fault model s when to requrng all fault regons to form a square [8]. Because a node wth at most one faulty or dsabled neghbor s not able to determne whether t s part of such a regon solely based on the status of ts faulty neghbors, such fault regons are more complex to construct and mantan than pure block faults f used wth a dynamc fault model [11]. Furthermore, such a fault model s lkely to requre more nodes to be dsabled. The expermental results gve some ndcatons on the percentage of healthy nodes that are dsabled n a mesh when usng square fault regons [11]. In partcular, when 10% of the routers are faulty, on average, less than 12% of the non-faulty nodes are marked as faulty, and the entre network becomes dsabled when about 20% of the nodes are faulty. Although t may appear that such a method s able to tolerate almost 20% of the routers beng faulty, t s not lkely that the NoC s able to perform satsfactory wth such a hgh proporton of the routers dsabled. In order to reduce the number of dsabled healthy nodes, concave fault regons may be used. By not requrng the nodes wthn such shapes to be dsabled, fault-tolerant routng methods supportng concave faults are able to tolerate a wde range of fault patterns wthout dsablng healthy routers. Specfcally, such routng algorthms provde addtonal support for concave fault patterns compared to the convex fault model by also toleratng concave fault regons. Stll, such methods may not be able to tolerate arbtrary fault patterns and may put some restrctons on the shape of the concavtes. 3. Related Work In ths secton, we ntally provde a bref survey of faulttolerant routng algorthms, multcast routngs and multcast fault-tolerant routngs that have been proposed based on mesh topologes. The survey s by no means exhaustve, but serves to provde a general overvew of dfferent approaches. We only dscuss routng algorthms that are targeted at networks wth lossless flow control that s routng algorthms that take deadlocks nto account. Lots of fault-tolerant routng algorthms based on tradtonal nterconnecton networks can be performed aganst statc faults n NoCs. In desgnng of a fault-tolerant routng algorthm, a sutable fault model s one of the most substantal ssues. The fault model can reflect the fault stuatons n a real system. Rectangular blocks (.e., convex faults) are the most common approach to model node falures and to facltate routngs n 2-D meshes. A labelng scheme [14] has been proposed to construct a fault regon wth rectangular shapes. However, rectangular fault patterns nclude many healthy routers. In order to reduce healthy routers n rectangular fault regons, many related works are proposed n the lterature. Boppana and Chalasan [15] proposed a method to tolerate block faults n 2-D meshes (wth dmenson-order routng). Ths method s able to tolerate overlappng f-rngs/chans when usng four vrtual channels and nonoverlappng f-rngs when usng two vrtual channels. Fault regons are also used by Boura and Das [16] who provde support for fully adaptve fault-tolerant routng n n-d meshes usng three vrtual channels. Ths method s based on an adaptve routng algorthm prevously proposed by the same authors [17]. Because rectangular fault regons are used, they also mark healthy routers as faulty n order to establsh fault regons. However, ther method also has a reactvaton mechansm, enablng some nodes that have been marked as faulty to be reactvated f they are drectly connected to a node outsde the fault regon. Chalasan and Boppana [18] extended ther method to support sold fault regons usng four vrtual channels. On the other hand, ths new method does not support overlappng f-rngs or faults on the edges of the mesh. Such a support s provded by Km and Han [19], however, stll usng the same number of vrtual channels (.e., four). Chen and Chu [20], later, managed to reduce the number of vrtual channels to

4 M. ValadBeg and F. Safae: Deadlock-Free Path-Based Fault-Tolerant Multcast (Short Paper) 39 three, stll toleratng overlappng sold faults and faults on the edges. Wu [21] proposed convex regons wth T-shape, L-shape and +-shape fault regons. Besdes, there are some multcast routng algorthms based on tradtonal nterconnecton networks that can be performed n NoCs. A path-based multcast routng algorthm has been proposed n [22, 23]. In ths algorthm, multcast messages are transmtted on one of the two sub networks H u, H l and, each s defnng a Hamltonan path n the network. The dual-path algorthm n [23] uses at most two copes of the multcast message. The multpath algorthm attempts to reduce long latences by settng up to four copes ( 2n for n-dmensonal) of the orgnal multcast message. As per the multpath routng algorthm, all the destnatons of the multcast message are grouped to four dsjont subsets. Each subset of destnatons s servced by one copy of the multcast messages [24]. The column-path algorthm parttons the set of destnatons of a multcast message nto at most 2k subsets (k s the number of columns n the mesh), such that there are at most two messages drected to each column. If a column of the mesh has one or more destnatons n the same row or n rows above that of the source, then one copy of the message s sent to servce all those destnatons. Smlarly, f a column has one or more destnatons n the rows below that of the source, then one copy of the message s sent to servce all those destnatons. One copy of the message s sent to a column f all destnatons n that column are ether below or above the source node; otherwse, two messages are sent to that column [25]. Moreover, Panda et al. [26] have proposed a general technque to provde multcast routng capablty usng the exstng uncast routng method. However, there are few results that exst on multcast fault-tolerant routng. Boppana and Chalasan proposed a fault-tolerant routng of multcast messages n mesh-based wormhole-swtched nterconnecton networks and ths method can tolerate multple convex faults [27]. Also, Chen and Wu [9] presented a dead-lock free path-based faulttolerant multcast algorthm n 2-D meshes that consder faulty block model. 4. Contrbuton NoCs are beng proposed as a global communcaton platform for future SoCs applcatons. Among the merts are: scalablty, reusablty and etc. Buses (a sngle bus, segmented buses or a herarchy of buses) do not scale wth the system sze n bandwdth and clockng frequency. However, t s very effcent n broadcastng. Although a network allows many more concurrent transactons, mplementng multcast may be neffcent f not addressed properly. The normal multcastng scheme transfers multcast messages by routers n the same way as uncast messages. Ths scheme does not guarantee Qualty-of-Servce (QoS) and multcast fault-tolerant routng. Besdes, accordng to the prevous secton few relevant work exst on multcast faulttolerant routng. Based on ths observaton, a fault-tolerant routng algorthm supportng multcast scheme s proposed wth arbtrary fault patterns. The proposed algorthm s more effcent than prevous work and also supports mnmal routng path. It also tolerates both convex and concave fault regons whle keepng the area and power overhead at a proper level. 5. A Multcast Fault-Tolerant Routng In ths secton we present and evaluate a fault-tolerant wormhole-swtched on NoCs whch supports deadlock-free path-based multcast routng and t s able to tolerate a reasonable number of convex and concave fault patterns wthout dsablng healthy routers. In order to acheve ths scope n a smple manner, thereby reducng the costs due to addtonal vrtual channels and ncreased router complexty, a statc fault model [8] was chosen. Our dscusson n ths secton s prmarly on the concept of message passng after that the dea of hole s descrbed. Then, the explanaton of our methodology algorthm and fnally a bref descrpton on deadlock-freedom of the proposed algorthm are presented The Concept of Wormhole Message Passng The concept of wormhole message passng mechansm wth multple destnatons was used n [28] to perform fast multcast operatons wth Hamlton-path-based routng. Under ths mechansm, the header of a worm conssts of multple destnatons. The sender node creates these destnatons as an ordered lst accordng to ther ntended order of traversal. As soon as the worm s njected nto the network, t s routed based on the address n the leadng header flt correspondng to the frst destnaton. Once the worm reaches the router of the frst destnaton node, the flt contanng ths address s removed by the router. Now the worm s routed to the node whose address s contaned n the next header flt (second destnaton n the ordered lst). Whle the flts are beng forwarded by the router of the frst destnaton node to ts adjacent router, they are also coped flt-by-flt to the system buffer of ths node. Ths process s carred out n each ntermedate destnaton node of the ordered lst. When the message reaches the last destnaton, t s not routed any further and gets completely consumed by the last destnaton node [26] The Idea of Hole Let us defne some notaton to llustrate how the proposed method works. : The set of healthy nodes whch contans any fault regons. : The set of healthy nodes nsde, n whch nodes nsde consst of faulty nodes and. : A sem-faulty node. A node s sem-faulty f has two or more faulty or sem-faulty neghbors. s the set of sem-faulty nodes n the network. A fault labelng mechansm s consdered to specfy nodes status for routng decsons. Hence, each router s labeled as F (frst), H (hole), or E (entrance) node. Fault labelng scheme leads to a general fault model whch can crcumvent faulty nodes.

5 The CSI Journal on Computer Scence and Engneerng, Vol. 6, No. 2 & 4 (b), f : The set of frst destnaton nodes n ordered lst nsde ; f - d1 d2 = { n : $ d, d ' d ¹ d,( n),( n) Î } (1) where d 1, d - are two orthogonal drectons of the node 2 n. The above expresson mples that there are two drectons d 1, d 2 whch are not n the same dmenson and the neghbor of the node n on these two drectons s an element of. e : the set of entrance-nodes; e d = { n : $ d ' ( n) Î, n Ï } (2) e Each node n has only one sem-faulty neghbor. h : the set of hole-nodes; h f = { n : n Î, n Ï } (3) Class: A set of one entrance-node, one frst destnaton node n ordered lst and zero or more hole-node (s). Classes may contan some nodes n common. Thus, we gve each class a unque ID n form of ( xyz,, ), whch ( xy, ) specfes coordnates of the entrance-node and z denotes dmenson of the class. A message wll enter n a class f ts frst destnaton n ordered lst belong to the class and a message wll depart a class f ts frst destnaton n ordered lst are outsde the class. Deadlocks are avoded nsde the classes by usng ths scheme. Also, frst destnaton nodes n ordered lst have hgher prorty than hole or entrance-nodes. Thus, a node labeled as frst destnaton node n ordered lst at a tme, t cannot be labeled as hole or entrance-node any after The MEFH Methodology the message header. All recevng nodes wll nclude ther own addresses to the header and forward the message along the opposte drecton. Ths procedure s done n recursve manner untl the message reaches the frst destnaton node (F) n the ordered lst and ths node sends an ACK message back to the entrance-node (E). In the second approach, the role of the frst destnaton node n the ordered lst and entrance- nodes s swtched. Both of the approaches can be employed, but the complexty of the frst approach s less, snce n the frst approach, the node E knows the drecton of ts class and sends massage on the same drecton, but n the second approach, F wll fnd the approprate drecton possbly after a number of retrals. In the followng treatments, we outlne the fundamental steps that take place f the frst approach s used. Step 1: The entrance-node (E) generates a class creatng message whch contans class number. As mentoned before, the class number contans a trple vector whch keeps the locaton detals of E and the drecton of sendng the message. For example, If E s located at (0, 2) and sends message along the Y-dmenson, the class number wll be (0, 2, Y). Then, the message s transmtted to neghborng node x (x Î ). Step 1 s repeated tll all the entrance- nodes e whch belong to succeed to transmt ther related messages. Step 2: In ths step each node that has receved the generated messages from Step 1, looks whether t s the frst node or not. If t s, t must record the message and transmt an ACK message to E on the drecton n whch t receved the message. Otherwse, the message wll be forwarded on the normal way. Fgure 1. llustrates how the fault labelng scheme works. In ths secton, we propose a multcast fault-tolerant routng methodology, namely MEFH, whch routes messages successfully to all destnatons n the presence of more relaxed fault regons than those n [15, 27] wthout any addtonal vrtual channels, as long as the network s not parttoned by fault regons. Further, t can be appled to any fault-tolerant routng algorthm that employs the concept of f-rng. Ths algorthm n the worst case s so smlar to the fault- tolerant Hamltonan path routng whch s expressed n [28]. Note that we have mostly focused on the frst destnaton node n ordered lst whch can easly be appled to all other nodes accordng to the concept of wormhole message passng Set-up the Classes Node fault labelng technque s requred as pre-processng task before the restart of the system, after the falure of one or more nodes or lnks. In ths process, the nternal nodes of the fault regon are detected, and ther addresses and locatons are sent to the entrance-nodes to convert fault regons nto rectangular shaped regons to facltate message routng. The classes can be easly formed n two approaches: top-to-bottom and bottom-to-top. In the frst approach, the entrance-node (E) sends the message for establshng the class along the drecton that ts neghbor s an element of (.e., the set of sem-faulty nodes) and poses ts address nto Fgure 1. Applcaton of the node fault labelng scheme n an D mesh (note that the frst node n fgure means frst destnaton node n order lst) Step 3: All nodes that receve the ACK message ought to mantan some essental hstory nformaton regardng the path that the message has taken. Ths nformaton comprsed the addresses and the class number wthn the message. Carryng addtonal nformaton usually mposes some overhead, unless header has enough bts to accommodate the addtonal nformaton. When ACK reaches E, t s not stored and dscarded. Only the nformaton of all exstng nodes of each-class s recorded n nodes of type E.

6 M. ValadBeg and F. Safae: Deadlock-Free Path-Based Fault-Tolerant Multcast (Short Paper) Constructng an Approprate Multcast-Path In ths secton a method s defned whch s about how the destnaton address s consdered n the message header to fnd a proper path to send the multcast messages. Here s the descrpton of the method whle we assume all destnatons n just one lst. The lst of destnatons n a multdestnaton worm s ordered by the sender node. The orderng depends on two parameters: 1) Multcast-Labelng number of the node 2) Subnetwork prorty Consder a multdestnaton worm wth n destnatons from a source s wth a destnaton lst { d1, d2,..., dn- 1, dn}, the ordered destnaton lst s { d 1, d 2,..., d n-1, d n} and s gven by the followng defnton. Once the message s routed around faults, the algorthm s used to route the message untl t reaches all of ts destnatons. Defnton 4: The Multcast-Labelng assgnment functon l for R C mesh can be expressed n terms of x and y coordnates of nodes as y C + x f y s even lxy (, ) = ìï í (4) ï y C + C - x - 1 f y s odd ïî Defnton 5: The sub network prorty wx () for R C mesh s gven by maxmum of number of destnatons n each subnetwork whch x s expressed as the number of subnetwork. 2 Intally we dvded the network to n subnetworks (n s the dmenson of network) and we obtan the number of nodes for each subnetwork. Then, we fnd n whch subnetwork our source s located. Later on, we update the set of destnatons n a way that all the exstng nodes (n the chosen subnetwork where the source s located) can be placed n an ascendng manner by consderng ther multcast-labelng number. After locatng all exstng nodes n the set, we wll consder the latest chosen destnaton as the new source. Then the set, n whch the closet node to the new source exsts, s chosen and put through the prevous process. After reachng the latest node of the destnaton set, the updated set from destnaton s chosen and s sent wth the message. The message starts routng and meets every node accordng to the orderng destnaton sets. Remark: If the dstance between the current source node source = d s and dk, d l are equal n whch dk, d l are n two dfferent subnetworks the sub network wll be chosen whose w s more than the other. An example of the method s llustrated n Fgure Routng Rules Here we assume that the network supports a routng scheme Â. Even when there are faults n the network, each message s routed usng the algorthm as much as possble. When a message arrves at a node, the next hop for that message s specfed by the ordered destnaton set whch s explaned before. If that hop s on a faulty lnk, then the message s blocked by the fault. The routng logc s enhanced to handle such stuatons so that the message s routed around faults. Fgure 2. Examples of the proposed algorthm. There s one faulty node. The path of multcast message from (2,0) to (1,0), (1,3), (3,4), (4,4), (5,3), (5,2) Here we assume that n each routng rules the source node s denoted as n s and the frst destnaton node n ordered lst asn d. Note that all the comng rules wll be extended to all destnatons n the ordered lst by applyng the steps of whch we explaned before. Consderng the followng rules, a proper routng algorthm can crcumvent any fault patterns wthout dsablng healthy nodes: a) If all fault patterns are convex, all messages wll be routed by the basc fault-tolerant routng algorthm. b) If there exsts some fault regons but n s and n d are not nsde, the message wll be routed by the basc faulttolerant routng algorthm. c) If n d s nsde and n s s not, a msroutng mechansm wll be appled. Nodes outsde have no knowledge about nodes nsde and cannot fnd the proper E node. As a result, a msroutng mechansm can be used to reach destnaton class entrance-node. Msroutng wthout any threshold, may lead to lvelock. The maxmum msroutng hops accordng to the basc fault-tolerant routng algorthm should be defned. When a message passes maxmum legal msroutng hops, t would be absorbed by the current node and wats for a perod of tme to be re-njected nto the network. Absorbed messages have greater prorty than normal messages for re-enterng nto the network. In ths way, starvaton wll be avoded. Here, we consder delay n local buffer to re-nject messages equal to the message length.

7 The CSI Journal on Computer Scence and Engneerng, Vol. 6, No. 2 & 4 (b), d) If n s s nsde and n d s not, the message wll be forwarded to E node frst, and then wll be routed to n d usng the basc fault-tolerant routng algorthm. e) If both n s and n d are nsde, one of these stuatons wll be encountered: n s and n d belong to a same class, or n s and n d belong to dfferent classes. For the frst stuaton, the message wll be forwarded to n d by dmenson-order-routng algorthm. For the second stuaton, the message wll be forwarded to ts class E node. Afterward, t wll be msrouted to reach destnaton class E node. Fnally, t s forwarded from E node ton d Deadlock Avodance Multcast fault tolerant routng s the topc of ths paper. Beng able to utlze the network wthout ntroducng any rsk of deadlock and decrease unnecessary costs at the same tme are the crucal challenges when desgnng ths knd of routng scheme. Hence, the deadlock-freedom s an essental attrbute of any Multcast fault-tolerant routng algorthm. The followng part of ths secton s devoted to provng that the proposed method (.e., MEFH methodology) s deadlockfree. The followng theorem proves the acyclcty of the channel dependency graph of the proposed multcast faulttolerant routng methodology. Lemma 1: The multcast fault-tolerant routng algorthm based on the MEFH methodology causes no deadlock n 2-D meshes that contans any fault regon. Proof: We ntally consder the source node and the frst destnaton node n ordered lst here. Accordng to wormhole message passng and path-based multcast scheme, when the message reaches the frst destnaton node address t wll be the new source and wll be removed from destnatons lst. Then, the second destnaton node becomes the frst destnaton node n ordered lst. As a result, only the proof for the source and the frst destnaton node s explaned here. Ths approach can be appled to all destnatons. Consequently lemma wll be proved. Accordng to the postons of n s and n d, the proof falls nto one of the followng three cases: Case I: n s and n d are nsde. In such case, no changes are made on the deadlock-free orgnal fault-tolerant algorthm. Consequently, the orgnal fault-tolerant routng algorthm guarantees deadlock-freedom. Case II: n s or n d s nsde. In ths case, the routng strategy s dvded nto two phases. Frst, s that a part of the course of message transmsson s n the class and another e part s outsde the class. The ne Î node s the connectng pont of these two phases. Accordng to the routng rules n an attempt to fnd a path to forward a message outsde the class, the orgnal algorthm s deadlockfree. The second phase s that routng s done nsde the class. Accordng to the characterstcs of the class, we had assumed that classes are solated and path selecton scheme s taken on one dmenson; there s no msroutng operaton, no cycle of deadlocked messages exsts and deadlock-freedom can be assured. Case III: Both n s and n d nodes are nsde. If both n s and n d are n the same class, the message s delvered explctly to ts destnaton wthout producng any msroutng. Hence, n ths case no deadlock wll occur, otherwse t s handled smlar to Case II. 6. Smulaton Study In ths secton, we analyze how the proposed method nfluences the network performance for dfferent fault models. Hence, we wll frst descrbe the smulaton model and then the performance results are shown and evaluated. A flt-level, lstener-based object orented smulator [29] has been used to llustrate the performance of the presented method. An 8 8 mesh network wth pont to pont and bdrectonal lnks has been employed for all smulaton experments, and only wormhole swtchng mechansm s appled. We have fxed the number of destnatons at 15. The wormhole swtchng s consdered as the flow control mechansm. When wormhole flow control s appled, a message s not allowed to re-enter the adaptve layer after havng been routed n the escape layer. The smulatons have been performed usng a base message sze of 8 flts, and also the wdth of each flt s 128 bt. We calculated the power consumpton of lnks of each router n 100 nm technology lbrary. In ths technology, V DD s set to 1.1V, the clock frequency s set to 200 MHz, and the length of lnks between two adjacent routers s set to 1 mm for the mesh topology. The message generaton rate s also equal for all the nodes. The performance and power consumpton of our method s evaluated by terms of average message latency (cycles) and total power consumpton (mw) vs. traffc load. Boppana- Chalasan s fault-tolerant routng [15, 18] s used to govern routng on a faulty network. As we have prevously dscussed, the routng methodology requres addtonal vrtual channels n order to be deadlock-free. Thus, 4 vrtual channels wth 8 flts deep buffers are requred by each varaton of the methodology to avod deadlock phenomenon. We have also evaluated the fault-tolerance of the H- shape, L-shape, Block-shape, and overlapped fault patterns n a 2-D (.e., 8 8) mesh topology, as shown n Table 1. For ths topology, all the combnatons up to sx faults (.e., 10% of the total number of routers) have been exhaustvely analyzed. Results for up to 10% faults are shown n Fgures 3 and 4 and the confdence ntervals are always lower than 5%. Table 1. Dfferent varatons of the fault combnatons that utlze the methodology Fault pattern Faulty ponts set H-shape (2,1)(2,2)(2,3)(3,2)(4,1)(4,2)(4,3) Overlapped (2,2)(2,3)(3,3)(3,5)(4,3)(4,5)(4,6) L-shape (2,1)(2,2)(2,3)(2,4)(3,4)(4,4)(5,4) Block-shape (2,2)(2,3)(2,4)(3,2)(3,3)(3,4)(4,2)(4,3)(4,4)

8 M. ValadBeg and F. Safae: Deadlock-Free Path-Based Fault-Tolerant Multcast (Short Paper) 43 Before explanng both fgures and results, we would lke to stress the pont that smulaton studes show that our approach has a good performance n order to support multcast. Moreover, both Fgure 3 and Fgure 4 show a better performance wth 15 destnatons compared to uncast fault tolerant routng that depends on one source and one destnaton. Average Message Latency (Cycle) H-pattern Ovelapped L-pattern Block-pattern Traffc Load(Cycles) Fgure 3. Average message latences vs. traffc load obtaned by the proposed methodology n an 8 8 Mesh wth 15 destnatons and 4 vrtual channels for each fault pattern lsted n Table 1 Total Power Consumton (mw H-pattern Ovelapped L-pattern Block-pattern Traffc Load(Cycles) Fgure 4. Average power consumpton vs. traffc load n an 8 8 Mesh wth 15 destnatons and 4 vrtual channels obtaned by the proposed methodology for each fault pattern lsted n Table 1 Fgure 3 shows the acheved message latency over normalzed accepted traffc n an 8 8 mesh wth 15 destnatons for 4 dfferent shapes of fault patterns presented n Table 1. In ths confguraton, we used 4 vrtual channels per physcal channel. The fgure reveals that for low traffc load, all four fault patterns have the same latency, but they begn to behave dfferently around the moderate and saturaton regons. At overlapped pattern, congested overlapped nodes between two f-rngs lead to ncrease the average message latency and t can be seen that the worst case has been encountered for overlapped pattern. Fgure 4 compares the power consumpton of the network for dfferent varatons of the proposed methodology as a functon of traffc load by each node n an 8 8 mesh wth 15 destnatons and 4 vrtual channels per physcal lnk. Such curves provde an ndcaton on the degree of performance degradaton caused by fault patterns n the network. It s evdent that, as the traffc load n the network ncreases, the power dsspaton dagram of each pattern ncreases almost lnearly before reachng a pont on the curve. Beyond ths pont, the dsspated power decreases abruptly. Accordng to the dagram we wtness hgh level of ntal consumpton of power that s due to the constructon of the path. Then the power consumpton s reduced and reaches a plateau because the path constructon s completed and there s no need for the extra amount of power. Among fault shapes, the Blockpattern s a stuaton that we just use basc fault- tolerant routng algorthm for H-pattern. Ths means sem-faulty nodes n H-pattern wll be consdered faulty. As the fgure demonstrates, however, the state of Block-pattern s better than H-pattern under 0~60% of traffc load. Beyond 60% of maxmum traffc load, smulaton results exhbt meanngful performance degradaton for Block-pattern. The degradaton reason s related to extra faulty nodes. From smulaton studes we can conclude that our proposed methodology obtans proper performance degradaton n the network. 7. Conclusons and Future Works Due to the exponental growth of crcut ntegraton, the relablty of NoCs s concerned wth ts functonalty n the presence of gven falure probabltes of ther enttes. NoCs relablty pertans to nterconnecton networks whose nodes and/or channels have assocated probabltes of beng operatonal. The man contrbuton of ths artcle s that the proposed approach supports multcast routng whch s based on path-based multcast scheme that easly can handle statc faults. Moreover, the path used does not need to be reconstructed when a fault occurs. Further, our approach s deadlock-free, t supports the statc fault model whch s applcable to both convex and concave fault regons. Ths method flls the gap of not havng an optmum multcast fault-tolerant scheme and ths s the frst attempt to mplementng multcast fault-tolerant routng to support fault regons. In a near future we are plannng to not only mprove t but also to perform more research on the ssue and fnd an optmum soluton and also extend the desgn of path-based fault-tolerant multcast to cover dynamc faults n NoCs wth 2-D mesh topology. Acknowledgement Frst Author would lke to thank Mr. Shahed ValadBeg for hs useful comments and help. References [1] F. A. Samman, T. Hollsten, and M. Glesner, "Adaptve and Deadlock-Free Tree-Based Multcast Routng for Network-on-Chp," IEEE Transactons on Very Large Scale Integraton Systems, vol. 18, no. 7, pp , [2] L. Benn and G. De Mchel, "Networks on Chp: a New Paradgm for Systems on Chp Desgn," IEEE Transactons on Computers, vol. 35, no. 1, pp , [3] G. De Mchel and L. Benn, Networks on Chps, Morgan Kaufmann-Publshers, [4] C. Constantnescu, "Trends and Challenges n VLSI Crcut Relablty," IEEE Mcro, vol. 23, no. 4, pp , [5] T. Dumtras, S. Kerner, and R. Marculescu, "Towards on- Chp Fault-Tolerant Communcaton," Proc. Asa and South Pacfc Desgn Automaton Conference, pp , [6] Y. B. Km, and Y. Km, "Fault Tolerant Source Routng for Network-on-chp," Proc. of the IEEE Internatonal

9 The CSI Journal on Computer Scence and Engneerng, Vol. 6, No. 2 & 4 (b), Symposum on Defect and Fault-Tolerance n VLSI Systems, pp , [7] M. Al, M. Welzl, M. Zwcknagl, and S. Hellebrand, "Consderatons for Fault-Tolerant Network on Chps," Proc. of the Internatonal Conference on Mcroelectroncs, pp , [8] J. Duato, S. Yalamanchl, and L. M. N, Interconnecton networks: An Engneerng Approach, Morgan Kaufmann Publshers, [9] X. Chen and J. Wu, "Path-Based Fault-Tolerant Multcastng n Mesh-Connected Multcomputers," The Handbook of Ad Hoc Wreless Networks, CRC Press, [10] L. H. Hsu and C. K. Ln, Graph Theory and Interconnecton Networks, CRC Press, [11] N. A. Nordbotten, Fault-Tolerant Routng n Interconnecton Networks, Ph.D. Thess, Faculty of Mathematcs and Natural Scences, The Unversty of Oslo, [12] J. Wu and Z. Jang, "On Constructng the Mnmum Orthogonal Convex Polygon for the Fault-Tolerant Routng n 2-D Faulty Meshes," IEEE Transactons on Relablty, vol. 54, no. 3, pp , [13] M. H. Farahabady, F. Safae, A. Khonsar, and M. Fathy, "Characterzaton of Spatal Fault Patterns n Interconnecton Networks, Journal of Parallel Computng, vol. 32, no , pp , [14] A. A. Chen, and J. K. Km, "Planar Adaptve Routng: Low Cost Adaptve Networks for Multprocessors, Proc. of the Internatonal Symposum on Computer Archtecture, pp , [15] R. V. Boppana, and S. Chalasan, "Fault-Tolerant Wormhole Routng Algorthms for Mesh Networks," IEEE Transactons on Computers, vol. 44, no. 7, pp , [16] Y. M. Boura, and C. R. Das, "Fault-Tolerant Routng n Mesh Networks," Proc. of the Internatonal Conference on Parallel Processng, pp , [17] Y. M. Boura, and C. R. Das, "Effcent Fully Adaptve Wormhole Routng n n-dmensonal Meshes," Proc. of the Internatonal Conference on Dstrbuted Computng Systems, pp , [18] S. Chalasan, and R. V. Boppana, "Communcaton n Multcomputers wth Nonconvex Faults," IEEE Transactons on Computers, vol. 46, no. 5, pp , [19] S. P. Km, and T. Han, "Fault-Tolerant Wormhole Routng n Mesh wth Overlapped Sold Fault Regons," Parallel Computng, vol. 23, no. 13, pp , [20] C. L. Chen, and G. M. Chu, "A Fault-Tolerant Routng Scheme for Meshes wth Nonconvex Faults," IEEE Transactons on Parallel and Dstrbuted Systems, vol. 12, no. 5, pp , [21] J. Wu, "A Fault-Tolerant and Deadlock-Free Routng Protocol n 2D Meshes Based on Odd-Even Turn Model," IEEE Transactons on Computers, vol. 52, no. 9, pp , [22] D. F. Robnson, P. K. Mcknley, and B. H. C. Cheng, "Path Based Multcast Communcaton n Wormhole Routed Undrectonal Tours Networks," Journal of Parallel and Dstrbuted computng, vol. 45, pp , [23] X. Ln and L. M. N, "Deadlock-Free Multcast Wormhole Routng Multcomputer Networks," Proc. of the Internatonal Symposum on Computer Archtecture, pp , [24] P. Mohapatra and V. Varavthya, "A Hardware Multcast Routng Algorthm for Two Dmensonal Meshes," Proc. of the IEEE Symposum on Parallel and Dstrbuted Processng, pp , [25] R. V. Boppana, S. Chalasan, and C. S. Raghavendra, "Resource Deadlock and Performance of Wormhole Multcast Routng Algorthms," IEEE Transactons on Parallel and Dstrbuted Systems, vol. 9, no. 6, pp , [26] D. K. Panda, S. Snghal, and R. Keshavan, "Multdestnaton Message Passng n Wormhole k-ary n- Cube Networks wth Base Routng Conformed Paths," IEEE Transactons on Parallel and Dstrbuted Systems, vol. 10, no. 1, pp , [27] R. V. Boppana and S. Chalasan, "Falut-Tolerant Multcast Comuncaton n Multcomputers," Proc. of the IEEE Internatonal Conference on Parallel and Dstrbuted Processng, pp , [28] X. Ln, H. Xu, and A.-H. Esafahnan, "Performance Evaluaton of Multcast Wormhole Routng n 2D-Mesh Multcomputers," Proc. of the Internatonal Conference of Parallel Processng, pp , [29] A. Nayeb, S. Meraj, A. Shamae, and H. Sarbaz-Azad, "XMulator: an Object oorented XML-Based Smulator," Proc. of the Asa Internatonal Conference on Modelng and Smulaton, pp , Majed ValadBeg receved the B.Sc. degree n Computer Hardware Engneerng from Shahd Rajaee Unversty, Tehran, Iran, n He s currently M.Sc. student n Computer Archtecture Engneerng n Department of Electrcal and Computer Engneerng, Shahd Behesht Unversty, Tehran, Iran. He s a member of Scorpus smulaton team whch has partcpated n many nternatonal RoboCup Compettons. He s also an IEEE student member. Hs man Researches focus on network-on-chps, nterconnecton networks, and performance evaluaton. E-mal: m.valadbeg@mal.sbu.ac.r

10 M. ValadBeg and F. Safae: Deadlock-Free Path-Based Fault-Tolerant Multcast (Short Paper) 45 Farshad Safae receved the B.Sc., M.Sc., and Ph.D. degrees n Computer Engneerng from Iran Unversty of Scence and Technology (IUST) n 1994, 1997 and 2007, respectvely. He s currently an assstant professor n the Department of Electrcal and Computer Engneerng, Shahd Behesht Unversty, Tehran, Iran. Hs research nterests are performance modellng/evaluaton, Interconnecton networks, computer networks, and hgh performance computer archtecture. E-mal: f_safae@sbu.ac.r Paper Handlng Data: Submtted: Receved n revsed form: Accepted: Correspondng author: Dr. Farshad Safae, Department of Electrcal & Computer Engneerng, Shahd Behesht Unversty, Tehran, Iran.

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors Optmal Fault-Tolerant Routng n Hypercubes Usng Extended Safety Vectors Je Wu Department of Computer Scence and Engneerng Florda Atlantc Unversty Boca Raton, FL 3343 Feng Gao, Zhongcheng L, and Ynghua Mn

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

Research Article. ISSN (Print) s k and. d k rate of k -th flow, source node and

Research Article. ISSN (Print) s k and. d k rate of k -th flow, source node and Scholars Journal of Engneerng and Technology (SJET) Sch. J. Eng. Tech., 2015; 3(4A):343-350 Scholars Academc and Scentfc Publsher (An Internatonal Publsher for Academc and Scentfc Resources) www.saspublsher.com

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

Minimum Cost Optimization of Multicast Wireless Networks with Network Coding

Minimum Cost Optimization of Multicast Wireless Networks with Network Coding Mnmum Cost Optmzaton of Multcast Wreless Networks wth Network Codng Chengyu Xong and Xaohua L Department of ECE, State Unversty of New York at Bnghamton, Bnghamton, NY 13902 Emal: {cxong1, xl}@bnghamton.edu

More information

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture Goals and Approach CS 194: Dstrbuted Systems Resource Allocaton Goal: acheve predcable performances Three steps: 1) Estmate applcaton s resource needs (not n ths lecture) 2) Admsson control 3) Resource

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Avoiding congestion through dynamic load control

Avoiding congestion through dynamic load control Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

CHAPTER 2 DECOMPOSITION OF GRAPHS

CHAPTER 2 DECOMPOSITION OF GRAPHS CHAPTER DECOMPOSITION OF GRAPHS. INTRODUCTION A graph H s called a Supersubdvson of a graph G f H s obtaned from G by replacng every edge uv of G by a bpartte graph,m (m may vary for each edge by dentfyng

More information

An Euler Path Based Technique for Deadlock-free Multicasting

An Euler Path Based Technique for Deadlock-free Multicasting An Euler Path Based Technque for Deadlockfree Multcastng Ndh Agrawal and C.P.Ravkumar Department of Electrcal Engneerng Indan Insttute of Technology New Delh 006 {ndh,rkumar}@ee.td.ernet.n Abstract The

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

Explicit Formulas and Efficient Algorithm for Moment Computation of Coupled RC Trees with Lumped and Distributed Elements

Explicit Formulas and Efficient Algorithm for Moment Computation of Coupled RC Trees with Lumped and Distributed Elements Explct Formulas and Effcent Algorthm for Moment Computaton of Coupled RC Trees wth Lumped and Dstrbuted Elements Qngan Yu and Ernest S.Kuh Electroncs Research Lab. Unv. of Calforna at Berkeley Berkeley

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

Cordial and 3-Equitable Labeling for Some Star Related Graphs

Cordial and 3-Equitable Labeling for Some Star Related Graphs Internatonal Mathematcal Forum, 4, 009, no. 31, 1543-1553 Cordal and 3-Equtable Labelng for Some Star Related Graphs S. K. Vadya Department of Mathematcs, Saurashtra Unversty Rajkot - 360005, Gujarat,

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

CS 268: Lecture 8 Router Support for Congestion Control

CS 268: Lecture 8 Router Support for Congestion Control CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router

More information

F Geometric Mean Graphs

F Geometric Mean Graphs Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 2 (December 2015), pp. 937-952 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) F Geometrc Mean Graphs A.

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Connection-information-based connection rerouting for connection-oriented mobile communication networks

Connection-information-based connection rerouting for connection-oriented mobile communication networks Dstrb. Syst. Engng 5 (1998) 47 65. Prnted n the UK PII: S0967-1846(98)90513-7 Connecton-nformaton-based connecton reroutng for connecton-orented moble communcaton networks Mnho Song, Yanghee Cho and Chongsang

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Chapter 6 Programmng the fnte element method Inow turn to the man subject of ths book: The mplementaton of the fnte element algorthm n computer programs. In order to make my dscusson as straghtforward

More information

Power-Aware Mapping for Network-on-Chip Architectures under Bandwidth and Latency Constraints

Power-Aware Mapping for Network-on-Chip Architectures under Bandwidth and Latency Constraints Power-Aware Mappng for Network-on-Chp Archtectures under Bandwdth and Latency Constrants Xaohang Wang 1,2, Me Yang 2, Yngtao Jang 2, and Peng Lu 1 1 Department of Informaton Scence and Electronc Engneerng,

More information

A New Transaction Processing Model Based on Optimistic Concurrency Control

A New Transaction Processing Model Based on Optimistic Concurrency Control A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

THE MAP MATCHING ALGORITHM OF GPS DATA WITH RELATIVELY LONG POLLING TIME INTERVALS

THE MAP MATCHING ALGORITHM OF GPS DATA WITH RELATIVELY LONG POLLING TIME INTERVALS THE MA MATCHING ALGORITHM OF GS DATA WITH RELATIVELY LONG OLLING TIME INTERVALS Jae-seok YANG Graduate Student Graduate School of Engneerng Seoul Natonal Unversty San56-, Shllm-dong, Gwanak-gu, Seoul,

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Petri Net Based Software Dependability Engineering

Petri Net Based Software Dependability Engineering Proc. RELECTRONIC 95, Budapest, pp. 181-186; October 1995 Petr Net Based Software Dependablty Engneerng Monka Hener Brandenburg Unversty of Technology Cottbus Computer Scence Insttute Postbox 101344 D-03013

More information

VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES

VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES UbCC 2011, Volume 6, 5002981-x manuscrpts OPEN ACCES UbCC Journal ISSN 1992-8424 www.ubcc.org VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES

More information

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics A Hybrd Genetc Algorthm for Routng Optmzaton n IP Networks Utlzng Bandwdth and Delay Metrcs Anton Redl Insttute of Communcaton Networks, Munch Unversty of Technology, Arcsstr. 21, 80290 Munch, Germany

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

Efficient Load-Balanced IP Routing Scheme Based on Shortest Paths in Hose Model. Eiji Oki May 28, 2009 The University of Electro-Communications

Efficient Load-Balanced IP Routing Scheme Based on Shortest Paths in Hose Model. Eiji Oki May 28, 2009 The University of Electro-Communications Effcent Loa-Balance IP Routng Scheme Base on Shortest Paths n Hose Moel E Ok May 28, 2009 The Unversty of Electro-Communcatons Ok Lab. Semnar, May 28, 2009 1 Outlne Backgroun on IP routng IP routng strategy

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol 2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen

More information

IP Camera Configuration Software Instruction Manual

IP Camera Configuration Software Instruction Manual IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

A Traffic Aware Routing Protocol for Congestion Avoidance in Content-Centric Network

A Traffic Aware Routing Protocol for Congestion Avoidance in Content-Centric Network , pp.69-80 http://dx.do.org/10.14257/jmue.2014.9.9.08 A Traffc Aware Routng Protocol for Congeston Avodance n Content-Centrc Network Jung-Jae Km 1, Mn-Woo Ryu 2*, S-Ho Cha 3 and Kuk-Hyun Cho 1 1 Dept.

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

3D Virtual Eyeglass Frames Modeling from Multiple Camera Image Data Based on the GFFD Deformation Method

3D Virtual Eyeglass Frames Modeling from Multiple Camera Image Data Based on the GFFD Deformation Method NICOGRAPH Internatonal 2012, pp. 114-119 3D Vrtual Eyeglass Frames Modelng from Multple Camera Image Data Based on the GFFD Deformaton Method Norak Tamura, Somsangouane Sngthemphone and Katsuhro Ktama

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1

PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1 PERFORMANCE ANALYSIS OF ROUTING ALGORITHMS OF 1- RD-C/TDMA PACKET RADIO NETWORKS UNDER DYNAMIC RANDOM TOPOLOGY1 A Thess Presented to The Faculty of the College of Engneerng and Technology Oho Unversty

More information

Repeater Insertion for Two-Terminal Nets in Three-Dimensional Integrated Circuits

Repeater Insertion for Two-Terminal Nets in Three-Dimensional Integrated Circuits Repeater Inserton for Two-Termnal Nets n Three-Dmensonal Integrated Crcuts Hu Xu, Vasls F. Pavlds, and Govann De Mchel LSI - EPFL, CH-5, Swtzerland, {hu.xu,vasleos.pavlds,govann.demchel}@epfl.ch Abstract.

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introducton 1.1 Parallel Processng There s a contnual demand for greater computatonal speed from a computer system than s currently possble (.e. sequental systems). Areas need great computatonal

More information

Scheduling and queue management. DigiComm II

Scheduling and queue management. DigiComm II Schedulng and queue management Tradtonal queung behavour n routers Data transfer: datagrams: ndvdual packets no recognton of flows connectonless: no sgnallng Forwardng: based on per-datagram forwardng

More information

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks Communcatons and Network, 2016, 8, 45-55 Publshed Onlne February 2016 n ScRes. http://www.scrp.org/journal/cn http://dx.do.org/10.4236/cn.2016.81006 Performance Comparson of a QoS Aware Routng Protocol

More information

On Some Entertaining Applications of the Concept of Set in Computer Science Course

On Some Entertaining Applications of the Concept of Set in Computer Science Course On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,

More information

A Saturation Binary Neural Network for Crossbar Switching Problem

A Saturation Binary Neural Network for Crossbar Switching Problem A Saturaton Bnary Neural Network for Crossbar Swtchng Problem Cu Zhang 1, L-Qng Zhao 2, and Rong-Long Wang 2 1 Department of Autocontrol, Laonng Insttute of Scence and Technology, Benx, Chna bxlkyzhangcu@163.com

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

CS 534: Computer Vision Model Fitting

CS 534: Computer Vision Model Fitting CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach Dstrbuted Resource Schedulng n Grd Computng Usng Fuzzy Approach Shahram Amn, Mohammad Ahmad Computer Engneerng Department Islamc Azad Unversty branch Mahallat, Iran Islamc Azad Unversty branch khomen,

More information

Internet Traffic Managers

Internet Traffic Managers Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

Fibre-Optic AWG-based Real-Time Networks

Fibre-Optic AWG-based Real-Time Networks Fbre-Optc AWG-based Real-Tme Networks Krstna Kunert, Annette Böhm, Magnus Jonsson, School of Informaton Scence, Computer and Electrcal Engneerng, Halmstad Unversty {Magnus.Jonsson, Krstna.Kunert}@de.hh.se

More information