An Efficient Video Program Delivery algorithm in Tree Networks*
|
|
- Clifton Neal
- 5 years ago
- Views:
Transcription
1 3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science, University of Science and Technology of China, China 2 School of Comuter Science, University of Adelaide, Australia yfh2008@mail.ustc.edu.cn, hongshen@ustc.edu.cn Abstract As the roortion of video rograms is exected to grow significantly, video services will require a huge amount of Internet bandwidth in the future. In this aer, we model the video rogram lacement (VPP roblem in tree networks which sends video rograms to the requesting (demand nodes using a broadcast method. The model considers the cost for both assigning rograms to nodes and broadcasting video rograms through links. The model is formulated as an integer rogram, and its objective is to minimize the total cost of VPP in a tree network. We develo a dynamic rogramming algorithm to solve this roblem with time comlexity ( where N is the number of nodes and P is the number of video rograms. 1. Introduction With an increase in the number of internet users, video services will become more and more oular. The roortion of video contents is exected to grow significantly in the future in Internet, making otimizing delivery of video services which requires a large amount of bandwidth an increasingly imortant roblem. In video services, video rograms are broadcast to assign or demand nodes. A large bandwidth is required when video rograms are broadcast through a link, and a large storage sace is required when video rograms are stored at a node. A simle model of VOD network is roosed in [1] which ays attention to server locations and rogram assignments. A VOD network is artitioned into several levels, and the model finds out otimal server locations and rogram assignments. In this model, servers installed and rograms assigned to a single level means each node in the selected level has a server and same subset of rograms. In [2][3] some heuristic *This work is suorted by National Science Foundation of China under its General Projects funding # and Chinese Academy of Science 100 Talents Project **Corresonding author. hongshen@ustc.edu.cn algorithms are roosed for lacing video rograms in tree networks to satisfy stochastic demands subject to the constraints of storage caacity and secified blocking robabilities. Some algorithms are also roosed to allocate limited bandwidth among multile video rograms in [4][5]. Some other VOD delivery technologies are discussed in [6][7][8]. Hanan et al.[9] roose a model of VOD network to determine the otimal location of servers and otimal assignment of rograms to each of these servers in a tree network. A video rogram may be stored in several servers. In this aer, we model the video rogram lacement (VPP roblem in tree networks. We assume the servers have been installed in some nodes in a tree network. The model considers the cost for both assigning rograms to nodes and broadcasting video rograms through links. Our objective is to minimize the sum of rogram assignment cost at nodes and bandwidth cost on links. This roblem has been solved with time comlexity ( where N is the number of nodes and P is the number of video rograms as a secial case of the model roosed in [9]. We roose a new dynamic rogramming algorithm insired by [10] to solve this roblem with time comlexity ( which outerforms the algorithm roosed in [9] significantly in large-scale networks. This aer is organized as follows: in Section 2, we formulate the roblem. And the dynamic rogramming algorithm is roosed in Section 3. In Section 4 an examle is given to demonstrate our algorithm. We conclude the aer in Section Problem formulation First of all, we resent the formulation of VPP roblem in tree networks which use the broadcasting method to send video rograms to the nodes which require the rogram. It is obvious that the roblem with P rograms to assign can be decomosed into P searate roblems, one er rogram. So we can solve the roblem with one rogram to assign firstly and then imlement it for each rogram. In this aer, we /10 $ IEEE DOI /PAAP
2 formulate the roblem with one rogram and then solve it by using a dynamic rogramming method. Consider a tree (,, where V is the set of nodes in a tree network and is the set of links. There are N+1 nodes in the network, i.e. +1=. For simlicity, we label the nodes as 0,1,2,, from to to bottom and left to right. Node 0 which is the root of the tree is the original server and stores the rogram. We also label link using the label of its end node. For examle, lin k 1 in Fig.1 is the lin k which connects node 0 and node 1. There are N links, ={1,2,,}. In the VPP roblem, servers have been installed in many nodes and the rogram can only be assigned to the nodes which have a server installed in it. We will use some notations as follows: whether node want to access the rogram or not. I.e. =1 if node wants to visit the rogram and 0 otherwise. cost of assigning the rogram to node.this cost includes storage and rocessing cost of the rogram at node. If there is no server installed in it, =. ( cost of the bandwidth required for transmitting the rogram on link. ( decision variable. =1 if the arent of node needs to broadcast the rogram through link, 0 otherwise. To ensure each node s requirement can be met, we will give a assignment strategy which is the set of nodes to which the rogram is assigned to determine value for each link. Because the value of is fixed, can only be determined by assignment strategy only. To avoid confusion, we use, as the decision variable to identify the link which should be or not be under the assignment strategy. The method to determine the value of, by using the assignment strategy will be given in theorem 1. Suose is the set of nodes which stores the rogram, the total cost of assigning and broadcasting the rogram as follows: ( = +, ( where the first art of equation is the assignment cost and the second is the broadcast cost. Our objective is to find an assignment strategy A subject to: ( = {(} \{} This roblem can be solved in olynomial time ( for an N-nodes tree as a secial case of SLPAM using the method roosed in [9]. In this aer we roose a new dynamic rogramming algorithm whose time comlexity is (. Figure 1. A tree network with nodes are labeled from to to bottom and left to right, and the bandwidth required for broadcasting rogram has been labeled near the link, and the nodes with shadow mean a server is not installed in it 3. Dynamic rogramming aroach We use a bottom-u dynamic rogramming aroach en-lightened by [10] to get a solution of a tree network. Let denote the subtree of whole network with as its root node and as the set of children nodes of, e.g. in Fig.2 is the subtree which is enclosed by dotted line and = {, }. is the arent node of and the rogram is assigned or broadcast to node. We use (, to denote the extended subtree including. For examle the tree shown in Fig.2 can be denoted as (,. Definition 1 (otimal solution of (, is a feasible solution, (,, = + \, ( is the total cost in (, under the lacement strategy. The otimal solution of (, is which satisfies (,, =(,, ={ +, ( } \ We denote the value of otimal solution as (, = (,,. Definition 2 (otimal solution of (, By changing the cost of link to, we get the extended tree (,. The otimal solution of (, is which satisfies (,, ={ (,,} =min { +, ( +, \( {} } 4
3 w1 w w Figure 2. Definition of (, where is the subtree with w as its root node and is the subtree with as its root node and has the same definition We denote the value of otimal solution of (, as (, = (,,. The link should not be used under the strategy in (, obviously. All of the feasible solutions of (, can be divided into two kinds: using link to broadcast the rogram or not. In next theorem, we will rove that the best solution which doesn't use link to broadcast the rogram is the otimal solution of (,. Theorem 1. For each, we definite (, = {, (,\{}} and (, = { (,\{}, (,} where (, is the set of nodes on the ath that connects nodes and and. We have ={ =0} (, which is equivalent to, =0 for each and the minimum total cost of solutions in is (, with the otimal solution. Proof: Assume, for each (,, all access request of nodes in can be satisfied by the nodes in and the rogram shouldn t be broadcasted to the trees { }. According to the definitions of (, and (,, we can conclude that (, = \( (,. Because (, =0which means that all of the nodes in (, don t want to access the rogram, the rogram shouldn t be broadcast to (,. And (, (, =, so the rogram shouldn t be broadcast to which means, =0. If a set F, we have (, 0which means there is at least a node in (, which wants to access the rogram, because there is no node that can satisfy it in, the rogram has to be broadcast into subtree using the link, so, =1. (,, = + ( +0 \( {} w2 = + ( +0 ( \( {} = + ( \ =(,, Based on the above analysis, (,, = (,, for each. We define =2 \. In (, (,, = +, ( +1 \ {} (,,, according this inequality, we know that, and (,, = (,, (,, = (,, which means the is the otimal solution in that the total cost of (, is (,. Thus the theorem is roved. Lemma 1. If and, then =,, we have. Proof: Firstly, we will rove that (, =(,. For each (,, we have (,,, (,\{}, (,\{} Because is a rerequisite,, (,\{}, ((, \{} {}, (,\{} where. And because (,, (,, (, \{}, (,\{}, (,\{} (, thus (, =(,. Then we rove (, =(,. (, (,\{}, (, Because for each,(, =, (, (,\{}, (, (,\{}, (, (, \{}, (, (, It is obvious that. Because (, (, and (, =0, (, =0. As mentioned above,. Hence, the lemma is roved. As reviously mentioned, the best solution in is the otimal solution of (,, according to the 5
4 next theorem, we can get the otimal solution of (,. Theorem 2. Let = (, + and B= (, +. For the otimal solution value of (,, we have (, ={,B} And {} B = Proof: Assume = { } and = { }. Clearly is the set of all feasible solutions of (,. Consider the value of : (1 If =0. When, and F, so, = 0. \ = ( \ = ( \ {} = (,, \(. then = +, ( +0 \ {} = +, ( \ = + \{} +, ( \ = + +, ( \( = + +, ( = + (,, + (, ( if = for each, (,, = + (,, meaning = { (,,, } with solution =( {} when, we can divide it into two cases: and \. If, then and, =0. We have (,, = (,, according to Lemma 1 and Theorem 1, (,, = (,,, so (,, = (,, (, = + (, (,, = + (, =B, if and only if = for each, If \, then and, =1. we have (,, =, + (,, (,, So the otimal solution among can be achieved when = and B={ (,,, } with solution = Hence when =0, if B, (, = with solution =, else if >, (, =B with solution =. (2 If =1. It is obvious that = (, + with solution =( {} if it just like in the case =0. When, because, (,and =. So, =1and for each, we have (,, =, + (,, = + (,, (, + We still define B = (, +. In this case, (, = with solution =. This is consistent with the fact that when =1 and, to guarantee node can access the rogram, node has two chooses: store the rogram in node or let node to broadcast the rogram to, because ( =, node should store the rogram in its own storage. Hence, the theorem is roven. According to Theorem 2, we notice that if node has a demand, the otimal solution of (, is ( {} which means the rogram must be assigned to node. 6
5 The otimal solution of (, can be achieved by comaring the otimal solution of (, and the solutions which must use link to broadcast the rogram. To rove theorem 3, we give Lemma 2 firstly. Lemma 2. =2 \ and = ( + (,, then there is a feasible solution =, such that (,, =if and only if =1,. Proof: for each, (,, =, ( + (,,, ( + (, ( + (, It is obvious that if and only if, =,,(,, =. Because = 2 \, we know that, =1. (1 If =1, to satisfy the requirement of node, we have to broadcast the rogram by link, so, =, =1. (2 If,, let =. By the roof of lemma 1, we know that (, = (, and (, = (,. Because there is at last one,, we conclude that (, 0. Then we can have and, =1=,,. (3 If,, we still let =, and by the same method we can have (, = 0 which means, so, =0. For (1(2(3, we know that (,, = in (1(2 and (,, in (3, which means this theorem is correct. Theorem 3. Let = ( + (,. The otimal solution of (, is (, = < (, and (, = { (,,}. Proof: we can div ide all feasible solutions of (, into two kinds: and, just like mentioned in theorem 1. (1 If (,, according to above discussion, we have (,, (,. Obviously (, = (, and the otimal solution of (, is. (2 If < (,. Let =. If,, and according to the roof of lemma 2, we know that, =0, so F and = ( + (, > (,. Because is a feasible solution and the total cost of is (,, we conclude that > (,, (,. But < (, and (,,, so (, which is contrary to >(,. Based on the above discussion, we know that, if < (,, and according to lemma 2, there is a feasible solution = whose total cost is. As a result, we conclude that (, = with as its otimal solution. For (1(2, The theorem is roved. According to theorem 3, we can conclude that, for the whole tree network, the minimum value of the total cost of assigning and broadcasting the rogram is (, and the otimal solution is where is the original server. According to the above theorems, we roose a dynamic rogramming algorithm as follows which runs in a bottom-u order. Algorithm 1: Ste 1. Initialization: = ; = ;, ( =0;, ( =0, for each \{}where (w is the arent of and s is the root of whole tree. Ste 2. Running the algorithm in ost-order traversal. For =, 1,,1do = +, (; B= +, (; = ( +, (; if Bthen =( {} ;, ( =; else = ;, ( =B; endif (,( +=, (; if, then = ;, ( = (, (; else = ; 7
6 , ( =; endif (,( +=, (; endfor = = ; return A ; Time Comlexity What we need to calculate is (, 0,, and the comlexity of our algorithm is ( where N is the number of nodes in a tree network. Because the algorithm is just for one rogram, we have to imlement it once for each rogram, and the total time comlexity is ( for rograms, which is significantly lower than O(N2P of algorithm in [9]. 4. Examle In this section, we give an examle to show the imlementation of our algorithm. The tree network of 13 nodes, labeled as 0-12, as shown in Fig. 1. Because the imlementation er rogram is similar, we just give the imlementation of rogram. Nodes that want to access rogram have been marked as P under it, for examle, in Fig. 2 nodes 2, 3, 5, 7, 8, 9, 11, 12 want to access rogram. The broadcast cost through link also is marked in this link. The cost of assigning rogram to any of the nodes is a =3 for i= 2,3,4,6,7,8,9,10,11. And a = for others because there is no server installed in them. We now demonstrate the imlementation of our algorithm for this examle. The algorithm runs in bottom-u order, so it starts with leaf nodes 7, 8, 9, 10, 11, 12. For node 12, =,B = and =4+ 0=4, so G (12,6 =min{, } =,B = {12}, G(12,6 =min{g (12,6,4} =4,A =. the results of nodes 7, 8, 9, 10, 11, 12 are resented in Table 1. Table 1. The results of leaf nodes 7, 8, 9, 10, 11, 12 Node (, ( (, ( labels Notice that the result of node 10 is secial comaring with other nodes, because node 10 doesn t want to access the rogram. Consider the node 6, =3+G(12,6 +G(11,6 +G(10,6 =10,B= G (12,6 +G (11,6 +G (10,6 = +3 =,=4+3+4=11, so G (6,2 =min{10, } = 10, B = {11,6},G(6,2 =min{10,11} =10,A = B ={6,11}. The results of second level nodes are shown in Table 2. Table 2. The results of 3, 4, 5, 6 Node (, ( (, ( labels , ,11 Then we will give the rocess details of nodes 1 and 2. For node 1, = +3+8=,B = 3+9 = 12,=4+3+8=15,so G (1,0 =min{,12} = 12, B = {3,4},G(1,0 =min{12,15} =12,A = B ={3,4}. And for node 2, =3+2+10= 15, B =, = =16,so G (2,0 = min{,15} =15,B = {2,6,11},G(2,0 = min{15,16} =15,A =B = {2,6,11}. So according to our algorithm, the otimal solution of the examle is {2, 3, 4, 6, 11}. 5. Conclusions The dynamic rogramming algorithm roosed in [9] solves the server location roblem in VOD networks with t ime co mle xity Ο(N 3. This cost is excessively high, making the network administrator unable to determine server locations and reassign rograms (requires time comlexity Ο(N P frequently In this aer, we roose a dynamic rogramming algorithm with time comlexity Ο(NP which allows more frequent rogram reassignment for otimizing erformance and hence is more suitable for solving the video rograms assignment roblem in large-scale networks. 6. References [1] D. Dammicco, U. Mocci, and F. U. Bordoni, Otimal server location in VOD networks, In Proc. IEEE GLOBECOM, Nov. 3-8, 1997, vol. 1, [2] R.H. Hwang and P.H. Chi, Fast otimal video lacement algorithms for hierarchical video-on-demand systems, IEEE Trans. Broadcast, vol.47, no.44, , Dec [3] J.D. Ryoo and S. S. Panwar, File distribution in networks with multimedia storage servers, Networks, vol.38, no.3, Oct.2001, [4] C. Y. Lee, Y. P. Moon and Y. J. Cho, A lexicograhically fair allocation of discrete bandwidth for multicast traffics, Comut. Oer. Res. vol.31, no.14, Dec.2004,
7 [5] H. Luss, An equitable bandwidth allocation model for video-on-demand networks, Netw. Satial Econ., vol.8, no.1, Mar. 2008, [6] K. A. Hua, M. A. Tantaoui, and W. Tavanaong, Video delivery technologies for large-scale deloyment of multimedia alications, Proc. IEEE, vol.92, no.9, Se. 2004, [7] B. Li and J. Liu, Multirate video multicast over the Internet: An overview, IEEE Netw., vol.17, no.1, Jan. 2003, [8] S. Ramesh, I. Rhee, and K. Guo, Multicast with cache (Mcache: An adative zero-delay video-on-demand service, IEEE Trans. Circuits Syst. Video Technol., vol.11, no.3, Mar. 2001, [9] H. Luss, Otimal content distribution in video-ondemand tree networks, IEEE Trans. ON SYSTEM, MAN, AND CYBERNETICS, vol.40, Jan. 2010, no.1. [10] Shihong Xu and Hong Shen, An O(nh Algorithm for Dual-Server Coordinated En-Route Caching in Tree Networks, PDCAT 2006:
IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model
IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,
More informationDirected File Transfer Scheduling
Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was
More informationOMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications
OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture
More informationAUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.
inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.
More informationSensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network
1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann
More informationA BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION
Yugoslav Journal of Oerations Research (00), umber, 5- A BICRITERIO STEIER TREE PROBLEM O GRAPH Mirko VUJO[EVI], Milan STAOJEVI] Laboratory for Oerational Research, Faculty of Organizational Sciences University
More informationSwift Template Matching Based on Equivalent Histogram
Swift emlate Matching ased on Equivalent istogram Wangsheng Yu, Xiaohua ian, Zhiqiang ou * elecommunications Engineering Institute Air Force Engineering University Xi an, PR China *corresonding author:
More informationExtracting Optimal Paths from Roadmaps for Motion Planning
Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu
More informationSource Coding and express these numbers in a binary system using M log
Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is
More informationA CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH
A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu
More informationEfficient Processing of Top-k Dominating Queries on Multi-Dimensional Data
Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of
More informationAn Efficient Coding Method for Coding Region-of-Interest Locations in AVS2
An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China
More informationCMSC 425: Lecture 16 Motion Planning: Basic Concepts
: Lecture 16 Motion lanning: Basic Concets eading: Today s material comes from various sources, including AI Game rogramming Wisdom 2 by S. abin and lanning Algorithms by S. M. LaValle (Chats. 4 and 5).
More informationIntroduction to Parallel Algorithms
CS 1762 Fall, 2011 1 Introduction to Parallel Algorithms Introduction to Parallel Algorithms ECE 1762 Algorithms and Data Structures Fall Semester, 2011 1 Preliminaries Since the early 1990s, there has
More informationAd Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model
Ad Hoc Networks (4) 5 68 Contents lists available at SciVerse ScienceDirect Ad Hoc Networks journal homeage: www.elsevier.com/locate/adhoc Latency-minimizing data aggregation in wireless sensor networks
More informationEE678 Application Presentation Content Based Image Retrieval Using Wavelets
EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective
More information12) United States Patent 10) Patent No.: US 6,321,328 B1
USOO6321328B1 12) United States Patent 10) Patent No.: 9 9 Kar et al. (45) Date of Patent: Nov. 20, 2001 (54) PROCESSOR HAVING DATA FOR 5,961,615 10/1999 Zaid... 710/54 SPECULATIVE LOADS 6,006,317 * 12/1999
More informationEquality-Based Translation Validator for LLVM
Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented
More informationLearning Motion Patterns in Crowded Scenes Using Motion Flow Field
Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical
More informationRST(0) RST(1) RST(2) RST(3) RST(4) RST(5) P4 RSR(0) RSR(1) RSR(2) RSR(3) RSR(4) RSR(5) Processor 1X2 Switch 2X1 Switch
Sub-logarithmic Deterministic Selection on Arrays with a Recongurable Otical Bus 1 Yijie Han Electronic Data Systems, Inc. 750 Tower Dr. CPS, Mail Sto 7121 Troy, MI 48098 Yi Pan Deartment of Comuter Science
More informationLecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.)
Advanced Algorithms Fall 2015 Lecture 3: Geometric Algorithms(Convex sets, Divide & Conuer Algo.) Faculty: K.R. Chowdhary : Professor of CS Disclaimer: These notes have not been subjected to the usual
More informationNear-Optimal Routing Lookups with Bounded Worst Case Performance
Near-Otimal Routing Lookus with Bounded Worst Case Performance Pankaj Guta Balaji Prabhakar Stehen Boyd Deartments of Electrical Engineering and Comuter Science Stanford University CA 9430 ankaj@stanfordedu
More informationGrouping of Patches in Progressive Radiosity
Grouing of Patches in Progressive Radiosity Arjan J.F. Kok * Abstract The radiosity method can be imroved by (adatively) grouing small neighboring atches into grous. Comutations normally done for searate
More informationToward Optimal Network Fault Correction via End-to-End Inference
Toward Otimal Network Fault Correction via End-to-End Inference Patrick P. C. Lee, Vishal Misra, and Dan Rubenstein Abstract We consider an end-to-end aroach of inferring network faults that manifest in
More informationComplexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks
Journal of Comuting and Information Technology - CIT 8, 2000, 1, 1 12 1 Comlexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Eunice E. Santos Deartment of Electrical
More informationMulticast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1
Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and
More informationA DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans
Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment
More informationAN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS
AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS Philie LACOMME, Christian PRINS, Wahiba RAMDANE-CHERIF Université de Technologie de Troyes, Laboratoire d Otimisation des Systèmes Industriels (LOSI)
More informationRandomized algorithms: Two examples and Yao s Minimax Principle
Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum
More informationModeling Reliable Broadcast of Data Buffer over Wireless Networks
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 3, 799-810 (016) Short Paer Modeling Reliable Broadcast of Data Buffer over Wireless Networs Deartment of Comuter Engineering Yeditee University Kayışdağı,
More informationCOMP Parallel Computing. BSP (1) Bulk-Synchronous Processing Model
COMP 6 - Parallel Comuting Lecture 6 November, 8 Bulk-Synchronous essing Model Models of arallel comutation Shared-memory model Imlicit communication algorithm design and analysis relatively simle but
More informationMulticommodity Network Flow - Methods and Applications
Multicommodity Network Flow - Methods and Alications Joe Lindström Linköing University joeli89@student.liu.se Abstract This survey describes the Multicommodity Network Flow roblem, a network flow roblem
More informationCASCH - a Scheduling Algorithm for "High Level"-Synthesis
CASCH a Scheduling Algorithm for "High Level"Synthesis P. Gutberlet H. Krämer W. Rosenstiel Comuter Science Research Center at the University of Karlsruhe (FZI) HaidundNeuStr. 1014, 7500 Karlsruhe, F.R.G.
More informationApplying the fuzzy preference relation to the software selection
Proceedings of the 007 WSEAS International Conference on Comuter Engineering and Alications, Gold Coast, Australia, January 17-19, 007 83 Alying the fuzzy reference relation to the software selection TIEN-CHIN
More informationA Method to Determine End-Points ofstraight Lines Detected Using the Hough Transform
RESEARCH ARTICLE OPEN ACCESS A Method to Detere End-Points ofstraight Lines Detected Using the Hough Transform Gideon Kanji Damaryam Federal University, Lokoja, PMB 1154, Lokoja, Nigeria. Abstract The
More informationA GPU Heterogeneous Cluster Scheduling Model for Preventing Temperature Heat Island
A GPU Heterogeneous Cluster Scheduling Model for Preventing Temerature Heat Island Yun-Peng CAO 1,2,a and Hai-Feng WANG 1,2 1 School of Information Science and Engineering, Linyi University, Linyi Shandong,
More informationFace Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern
Face Recognition Based on Wavelet Transform and Adative Local Binary Pattern Abdallah Mohamed 1,2, and Roman Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville, Louisville,
More informationA Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems
A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems Cheng-Yuan Chang and I-Lun Tseng Deartment of Comuter Science and Engineering Yuan Ze University,
More informationInteractive Image Segmentation
Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).
More informationMatlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems
Matlab Virtual Reality Simulations for otimizations and raid rototying of flexible lines systems VAMVU PETRE, BARBU CAMELIA, POP MARIA Deartment of Automation, Comuters, Electrical Engineering and Energetics
More informationsplit split (a) (b) split split (c) (d)
International Journal of Foundations of Comuter Science c World Scientic Publishing Comany ON COST-OPTIMAL MERGE OF TWO INTRANSITIVE SORTED SEQUENCES JIE WU Deartment of Comuter Science and Engineering
More informationTo appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree
To aear in IEEE TKDE Title: Efficient Skyline and To-k Retrieval in Subsaces Keywords: Skyline, To-k, Subsace, B-tree Contact Author: Yufei Tao (taoyf@cse.cuhk.edu.hk) Deartment of Comuter Science and
More informationA Petri net-based Approach to QoS-aware Configuration for Web Services
A Petri net-based Aroach to QoS-aware Configuration for Web s PengCheng Xiong, YuShun Fan and MengChu Zhou, Fellow, IEEE Abstract With the develoment of enterrise-wide and cross-enterrise alication integration
More informationEfficient Parallel Hierarchical Clustering
Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore
More informationSelecting Discriminative Binary Patterns for a Local Feature
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 3 Sofia 015 rint ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-015-0044 Selecting Discriminative Binary atterns
More informationComputing the Convex Hull of. W. Hochstattler, S. Kromberg, C. Moll
Reort No. 94.60 A new Linear Time Algorithm for Comuting the Convex Hull of a Simle Polygon in the Plane by W. Hochstattler, S. Kromberg, C. Moll 994 W. Hochstattler, S. Kromberg, C. Moll Universitat zu
More informationAN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY
AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY Andrew Lam 1, Steven J.E. Wilton 1, Phili Leong 2, Wayne Luk 3 1 Elec. and Com. Engineering 2 Comuter Science
More informationThe Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks
The Scalability and Performance of Common Vector Solution to Generalized abel Continuity Constraint in Hybrid Otical/Pacet etwors Shujia Gong and Ban Jabbari {sgong, bjabbari}@gmuedu George Mason University
More informationRandomized Selection on the Hypercube 1
Randomized Selection on the Hyercube 1 Sanguthevar Rajasekaran Det. of Com. and Info. Science and Engg. University of Florida Gainesville, FL 32611 ABSTRACT In this aer we resent randomized algorithms
More informationWeighted Page Rank Algorithm based on In-Out Weight of Webpages
Indian Journal of Science and Technology, Vol 8(34), DOI: 10.17485/ijst/2015/v8i34/86120, December 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 eighted Page Rank Algorithm based on In-Out eight
More informationTheoretical Analysis of Graphcut Textures
Theoretical Analysis o Grahcut Textures Xuejie Qin Yee-Hong Yang {xu yang}@cs.ualberta.ca Deartment o omuting Science University o Alberta Abstract Since the aer was ublished in SIGGRAPH 2003 the grahcut
More informationLecture 18. Today, we will discuss developing algorithms for a basic model for parallel computing the Parallel Random Access Machine (PRAM) model.
U.C. Berkeley CS273: Parallel and Distributed Theory Lecture 18 Professor Satish Rao Lecturer: Satish Rao Last revised Scribe so far: Satish Rao (following revious lecture notes quite closely. Lecture
More informationEfficient Sequence Generator Mining and its Application in Classification
Efficient Sequence Generator Mining and its Alication in Classification Chuancong Gao, Jianyong Wang 2, Yukai He 3 and Lizhu Zhou 4 Tsinghua University, Beijing 0084, China {gaocc07, heyk05 3 }@mails.tsinghua.edu.cn,
More informationMining Association rules with Dynamic and Collective Support Thresholds
Mining Association rules with Dynamic and Collective Suort Thresholds C S Kanimozhi Selvi and A Tamilarasi Abstract Mining association rules is an imortant task in data mining. It discovers the hidden,
More informationJ. Parallel Distrib. Comput.
J. Parallel Distrib. Comut. 71 (2011) 288 301 Contents lists available at ScienceDirect J. Parallel Distrib. Comut. journal homeage: www.elsevier.com/locate/jdc Quality of security adatation in arallel
More informationTiling for Performance Tuning on Different Models of GPUs
Tiling for Performance Tuning on Different Models of GPUs Chang Xu Deartment of Information Engineering Zhejiang Business Technology Institute Ningbo, China colin.xu198@gmail.com Steven R. Kirk, Samantha
More informationCollective Communication: Theory, Practice, and Experience. FLAME Working Note #22
Collective Communication: Theory, Practice, and Exerience FLAME Working Note # Ernie Chan Marcel Heimlich Avi Purkayastha Robert van de Geijn Setember, 6 Abstract We discuss the design and high-erformance
More informationTCP VON: Joint Congestion Control and Online Network Coding for Wireless Networks
TCP VON: Joint Congestion Control and Online Network Coding for Wireless Networks Wei Bao, Vahid Shah-Mansouri, Vincent W.S. Wong, and Victor C.M. Leung Deartment of Electrical and Comuter Engineering
More informationRESEARCH ARTICLE. Simple Memory Machine Models for GPUs
The International Journal of Parallel, Emergent and Distributed Systems Vol. 00, No. 00, Month 2011, 1 22 RESEARCH ARTICLE Simle Memory Machine Models for GPUs Koji Nakano a a Deartment of Information
More informationLecture 2: Fixed-Radius Near Neighbors and Geometric Basics
structure arises in many alications of geometry. The dual structure, called a Delaunay triangulation also has many interesting roerties. Figure 3: Voronoi diagram and Delaunay triangulation. Search: Geometric
More informationSimple Memory Machine Models for GPUs
2012 IEEE 2012 26th IEEE International 26th International Parallel Parallel and Distributed and Distributed Processing Processing Symosium Symosium Workshos Workshos & PhD Forum Simle Memory Machine Models
More informationSkip List Based Authenticated Data Structure in DAS Paradigm
009 Eighth International Conference on Grid and Cooerative Comuting Ski List Based Authenticated Data Structure in DAS Paradigm Jieing Wang,, Xiaoyong Du,. Key Laboratory of Data Engineering and Knowledge
More informationResource Allocation for QoS Provisioning in Wireless Ad Hoc Networks
Resource Allocation for QoS Provisioning in Wireless Ad Hoc Networks Mung Chiang, Daniel ONeill, David Julian andstehenboyd Electrical Engineering Deartment Stanford University, CA 94305, USA Abstract-
More informationStereo Disparity Estimation in Moment Space
Stereo Disarity Estimation in oment Sace Angeline Pang Faculty of Information Technology, ultimedia University, 63 Cyberjaya, alaysia. angeline.ang@mmu.edu.my R. ukundan Deartment of Comuter Science, University
More informationShuigeng Zhou. May 18, 2016 School of Computer Science Fudan University
Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions
More informationThe Spatial Skyline Queries
The Satial Skyline Queries Mehdi Sharifzadeh Comuter Science Deartment University of Southern California Los Angeles, CA 90089-078 sharifza@usc.edu Cyrus Shahabi Comuter Science Deartment University of
More informationDistributed Estimation from Relative Measurements in Sensor Networks
Distributed Estimation from Relative Measurements in Sensor Networks #Prabir Barooah and João P. Hesanha Abstract We consider the roblem of estimating vectorvalued variables from noisy relative measurements.
More informationSource-to-Source Code Generation Based on Pattern Matching and Dynamic Programming
Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Weimin Chen, Volker Turau TR-93-047 August, 1993 Abstract This aer introduces a new technique for source-to-source code
More informationParallel Construction of Multidimensional Binary Search Trees. Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka
Parallel Construction of Multidimensional Binary Search Trees Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka School of CIS and School of CISE Northeast Parallel Architectures Center Syracuse
More informationRobust Motion Estimation for Video Sequences Based on Phase-Only Correlation
Robust Motion Estimation for Video Sequences Based on Phase-Only Correlation Loy Hui Chien and Takafumi Aoki Graduate School of Information Sciences Tohoku University Aoba-yama 5, Sendai, 98-8579, Jaan
More informationShort Papers. Symmetry Detection by Generalized Complex (GC) Moments: A Close-Form Solution 1 INTRODUCTION
466 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE VOL 2 NO 5 MAY 999 Short Paers Symmetry Detection by Generalized Comlex (GC) Moments: A Close-Form Solution Dinggang Shen Horace HS I
More information10. Multiprocessor Scheduling (Advanced)
10. Multirocessor Scheduling (Advanced) Oerating System: Three Easy Pieces AOS@UC 1 Multirocessor Scheduling The rise of the multicore rocessor is the source of multirocessorscheduling roliferation. w
More informationTexture Mapping with Vector Graphics: A Nested Mipmapping Solution
Texture Maing with Vector Grahics: A Nested Mimaing Solution Wei Zhang Yonggao Yang Song Xing Det. of Comuter Science Det. of Comuter Science Det. of Information Systems Prairie View A&M University Prairie
More informationCooperative Diversity Combined with Beamforming
Cooerative Diversity Combined with Beamforming Hyunwoo Choi and Jae Hong Lee School of Electrical Engineering and INMC Seoul National University Seoul, Korea Email: {novo28, jhlee}@snu.ac.kr Abstract In
More informationA Symmetric FHE Scheme Based on Linear Algebra
A Symmetric FHE Scheme Based on Linear Algebra Iti Sharma University College of Engineering, Comuter Science Deartment. itisharma.uce@gmail.com Abstract FHE is considered to be Holy Grail of cloud comuting.
More informationSubmission. Verifying Properties Using Sequential ATPG
Verifying Proerties Using Sequential ATPG Jacob A. Abraham and Vivekananda M. Vedula Comuter Engineering Research Center The University of Texas at Austin Austin, TX 78712 jaa, vivek @cerc.utexas.edu Daniel
More informationAn Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal
International Journal of Information and Electronics Engineering, Vol. 1, No. 1, July 011 An Efficient VLSI Architecture for Adative Rank Order Filter for Image Noise Removal M. C Hanumantharaju, M. Ravishankar,
More informationBrief Contributions. A Geometric Theorem for Network Design 1 INTRODUCTION
IEEE TRANSACTIONS ON COMPUTERS, VOL. 53, NO., APRIL 00 83 Brief Contributions A Geometric Theorem for Network Design Massimo Franceschetti, Member, IEEE, Matthew Cook, and Jehoshua Bruck, Fellow, IEEE
More informationWeight Co-occurrence based Integrated Color and Intensity Matrix for CBIR
Weight Co-occurrence based Integrated Color and Intensity Matrix for CBIR Megha Agarwal, 2R.P. Maheshwari Indian Institute of Technology Roorkee 247667, Uttarakhand, India meghagarwal29@gmail.com, 2rmaheshwari@gmail.com
More informationImproving Trust Estimates in Planning Domains with Rare Failure Events
Imroving Trust Estimates in Planning Domains with Rare Failure Events Colin M. Potts and Kurt D. Krebsbach Det. of Mathematics and Comuter Science Lawrence University Aleton, Wisconsin 54911 USA {colin.m.otts,
More informationImproving Parallel-Disk Buffer Management using Randomized Writeback æ
Aears in Proceedings of ICPP 98 1 Imroving Parallel-Disk Buffer Management using Randomized Writeback æ Mahesh Kallahalla Peter J Varman Detartment of Electrical and Comuter Engineering Rice University
More informationWavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces
Wavelet Based Statistical Adated Local Binary atterns for Recognizing Avatar Faces Abdallah A. Mohamed 1, 2 and Roman V. Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville,
More informationBuilding Better Nurse Scheduling Algorithms
Building Better Nurse Scheduling Algorithms Annals of Oerations Research, 128, 159-177, 2004. Dr Uwe Aickelin Dr Paul White School of Comuter Science University of the West of England University of Nottingham
More informationThe VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing
The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing Mikael Taveniku 2,3, Anders Åhlander 1,3, Magnus Jonsson 1 and Bertil Svensson 1,2
More informationAutonomic Physical Database Design - From Indexing to Multidimensional Clustering
Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Stehan Baumann, Kai-Uwe Sattler Databases and Information Systems Grou Technische Universität Ilmenau, Ilmenau, Germany
More informationAn Indexing Framework for Structured P2P Systems
An Indexing Framework for Structured P2P Systems Adina Crainiceanu Prakash Linga Ashwin Machanavajjhala Johannes Gehrke Carl Lagoze Jayavel Shanmugasundaram Deartment of Comuter Science, Cornell University
More informationPower Savings in Embedded Processors through Decode Filter Cache
Power Savings in Embedded Processors through Decode Filter Cache Weiyu Tang Rajesh Guta Alexandru Nicolau Deartment of Information and Comuter Science University of California, Irvine Irvine, CA 92697-3425
More informationImproved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties
Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal
More informationGraph Cut Matching In Computer Vision
Grah Cut Matching In Comuter Vision Toby Collins (s0455374@sms.ed.ac.uk) February 2004 Introduction Many of the roblems that arise in early vision can be naturally exressed in terms of energy minimization.
More informationSpace-efficient Region Filling in Raster Graphics
"The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich
More informationConstruction of Irregular QC-LDPC Codes in Near-Earth Communications
Journal of Communications Vol. 9, No. 7, July 24 Construction of Irregular QC-LDPC Codes in Near-Earth Communications Hui Zhao, Xiaoxiao Bao, Liang Qin, Ruyan Wang, and Hong Zhang Chongqing University
More informationAN early generation of unstructured P2P systems is
1078 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 16, NO. 11, NOVEMBER 2005 Dynamic Layer Management in Suereer Architectures Li Xiao, Member, IEEE, Zhenyun Zhuang, and Yunhao Liu, Member,
More informationParallel Algorithms for the Summed Area Table on the Asynchronous Hierarchical Memory Machine, with GPU implementations
Parallel Algorithms for the Summed Area Table on the Asynchronous Hierarchical Memory Machine, ith GPU imlementations Akihiko Kasagi, Koji Nakano, and Yasuaki Ito Deartment of Information Engineering Hiroshima
More information2010 First International Conference on Networking and Computing
First International Conference on Networking and Comuting Imlementations of Parallel Comutation of Euclidean Distance Ma in Multicore Processors and GPUs Duhu Man, Kenji Uda, Hironobu Ueyama, Yasuaki Ito,
More informationLecture 8: Orthogonal Range Searching
CPS234 Comutational Geometry Setember 22nd, 2005 Lecture 8: Orthogonal Range Searching Lecturer: Pankaj K. Agarwal Scribe: Mason F. Matthews 8.1 Range Searching The general roblem of range searching is
More informationSEARCH ENGINE MANAGEMENT
e-issn 2455 1392 Volume 2 Issue 5, May 2016. 254 259 Scientific Journal Imact Factor : 3.468 htt://www.ijcter.com SEARCH ENGINE MANAGEMENT Abhinav Sinha Kalinga Institute of Industrial Technology, Bhubaneswar,
More informationContinuous Visible k Nearest Neighbor Query on Moving Objects
Continuous Visible k Nearest Neighbor Query on Moving Objects Yaniu Wang a, Rui Zhang b, Chuanfei Xu a, Jianzhong Qi b, Yu Gu a, Ge Yu a, a Deartment of Comuter Software and Theory, Northeastern University,
More informationSignature File Hierarchies and Signature Graphs: a New Index Method for Object-Oriented Databases
Signature File Hierarchies and Signature Grahs: a New Index Method for Object-Oriented Databases Yangjun Chen* and Yibin Chen Det. of Business Comuting University of Winnieg, Manitoba, Canada R3B 2E9 ABSTRACT
More informationThe Edge-flipping Distance of Triangulations
The Edge-fliing Distance of Triangulations Sabine Hanke (Institut für Informatik, Universität Freiburg, Germany hanke@informatik.uni-freiburg.de) Thomas Ottmann (Institut für Informatik, Universität Freiburg,
More informationA Novel Iris Segmentation Method for Hand-Held Capture Device
A Novel Iris Segmentation Method for Hand-Held Cature Device XiaoFu He and PengFei Shi Institute of Image Processing and Pattern Recognition, Shanghai Jiao Tong University, Shanghai 200030, China {xfhe,
More information