the large energy consumption on the LLK establishment. Combinatorial design techniques are proposed in [8], [9]. They can

Size: px
Start display at page:

Download "the large energy consumption on the LLK establishment. Combinatorial design techniques are proposed in [8], [9]. They can"

Transcription

1 I SCALABLE LINK-LAYER KEY AGREEMENT IN SENSOR NETWORKS Yun Zhou and Yuguang Fang Deparmen of Elecrical and Compuer Engineering Universiy of Florida, Gainesville, FL 326 Tel: (352) ; Fax: (352) ABSTRACT Link layer key agreemen beween neighboring nodes is a fundamenal issue for securing sensor neworks deployed in unaended and hosile environmens. Recen research ofen assumed a predisribuing approach so ha each pair of neighboring nodes agrees on a shared key direcly or indirecly hrough a mulihop pah. The shorcomings include large memory cos, poor resilience agains node compromise, low secure conneciviy, ec. In his paper, we presen a link-layer key agreemen scheme combining a scalable key agreemen model and space diversiy. In conras o previous proposals, our scheme have higher resilience o node compromise aacks wih much smaller memory coss and high secure conneciviy so ha much less energy needs o be consumed in esablishing indirec keys hrough muli-hop rouing. INTRODUCTION Key agreemen is very criical for securing wireless sensor neworks, because encrypion and auhenicaion services are based on he operaions involving keys. The simple pairwise key approach, which requires each pair of nodes in a nework wih N nodes share a disinc symmeric key, is no scalable due o is memory cos of N - keys per node. In [], [2], a hreshold-based mehod is proposed such ha each node sores A secres and any pair of nodes is able o agree on a unique shared key. The collusion of less han A nodes can no reveal any key held by oher normal nodes, i.e., A-secure. To guaranee perfec secure in a nework wih N nodes, i.e., every key beween a pair of nodes is secure no maer how many oher nodes collude, he (N -2)-secure scheme should be used, which means he memory cos per node is N-. Obviously, hese schemes are lack of scalabiliy and only suiable and opimum in small neworks. Mos recen research in sensor neworks [3][4] focuses on he applicaions of hose schemes in local area of sensor neworks o esablish Link-layer keys (called LLKs hereafer) among neighboring nodes, because he number of nodes in he neighborhood is limied. In he pioneering work [3] and is followers [4]-[6], a global se of secres is uniformly pre-disribued ino he nework so ha This work was suppored in par by he US Office of Naval Research under gran N (Young Invesigaor Award). each node has a secre subse and wo neighboring nodes can achieve a probabilisic key agreemen by he inersecion of heir secre subses. In his way, wo nodes can shared a key direcly or esablish an indirec key wih he help of several inermediae nodes hrough a muli-hop pah. These schemes are vulnerable o node compromise in ha he secres in compromised nodes can be used by he adversary o derive keys shared by oher noncompromised nodes. Moreover, he number of secres ha each node needs o keep is limied due o he memory consrains, which implies a smaller probabiliy ha wo neighboring nodes can esablish a direc LLK, i.e., lower local secure conneciviy, and much more communicaion overhead on indirec LLKs esablishmens hrough muli-hop pahs. Some deerminisic work is developed in [7]-[9]. In [7], all N nodes in a nework are organized ino a 2 dimensional grid. Each node is preloaded wih unique pairwise keys for 2(N- ) nodes, which have he same horizonal or verical coordinaes. Any wo neighboring nodes can esablish an LLK wih he help of no more han one inermediae node. Due o he uniform key predisribuion, he local secure conneciviy is very low, indicaing he large energy consumpion on he LLK esablishmen. Combinaorial design echniques are proposed in [8], [9]. They can ensure key sharing beween any pair of nodes. In heir schemes, however, each key is reused by many sensor nodes like ha in [3]. This leads o poor resilience o node compromise. In addiion, he memory cos of heir schemes is roughly 0)(XN) where N is he oal number of nodes. Some schemes [0]-[4] use locaion informaion o localize he impac of he node compromise aack and increase conneciviy by inenionally pre-disribue he same se of secres in small cells. They can achieve much higher conneciviy han uniform pre-disribuion schemes. However, hey are probabilisic schemes, and sill feaures vulnerabiliy o node compromise and high memory cos. In his paper, we propose a novel LLK agreemen scheme ha combines a scalable key agreemen model we have developed in [5] and node deploymen knowledge. Unlike he aforemenioned schemes, our scheme is scalable in ha i can can provide a high level of securiy and conneciviy wih very small memory cos, which is 0(3kN) per node, where k >. The res of he paper is organized as follows. We will describe

2 our scheme in Secion II. Analysis and evaluaion are carried ou in Secion III. Finally he paper is concluded in Secion IV. he polynomial symmery, he desired shared key beween nodes u and v is calculaed as DETAILS OF OUR SCHEME Kulv Our scheme is based on a mehod we have developed in [5]. Each sensor node carries a share of a global -degree mulivariae symmeric polynomial. If he shares of wo nodes are correlaed, he wo nodes can calculae a shared key direcly. Oherwise, hey can negoiae an indirec key wih he help of an inermediae node. We uilize node deploymen knowledge such ha nodes wih correlaed shares are deployed as close as possible. In his way, each node can direcly calculae LLKs wih mos of is neighbors. In his secion, we will elaborae he deails of our scheme. A. Mahemaical Model A -degree (k )-variae polynomial is defined as f(xi,2, Xk,Xk)... E - io i20 ik,ik... Sikk l Xili2 EEai,,i2,...,ik,ik,k. () iko ik0 All coefficiens of he polynomial are chosen from a finie field IFq, where q is a prime ha is large enough o accommodae a crypographic key. A (k )-uple permuaion is defined as a bijecive mapping (X: [,k] - [,kl] (2) By choosing all he coefficiens according o i2 i2... ik),ikl i () i(2..i () <()(3 for any permuaion u7, we can obain a symmeric polynomial in ha f (xi, X2, *.. Xk, Xkl) f(x(), SCx(2), *.. *, a(k), ff(kl)) (4) Every node should have k credenials, which are posiive and pairwise differen inegers. Suppose node u has credenials (U, U.,... Uk) and node v has credenials (vl, v2,..., vk). Before node deploymen, we can assign a polynomial share f (ul, U2.,..., Uk, Xk) o u and anoher share f (vi, v2.... Vk,Xkl) o v. By assigning polynomial shares, we mean ha he coefficiens of -degree univariae polynomials f(ul, 2,...*,k, k±) and f(vl, v2,...,x ±) are loaded ino node u's and v's memory, respecively. If he credenials of node u and node v have only one mismach, i.e., ) for some i C [, k], vii vi, and 2) forj,2,...,k, ji, Uj vj Cj, hen node u and node v can have a shared key. Node u can ake vi as he inpu o is share f (ui, U2,...., Uk, i), and node v can ake ui as he inpu o is share f(vl, v2,..., Vk, Xk±). Due o f (ClX2 (C,C2,... Ci-l: Ui:Cil:...,Ci-l Vi, Cil,...,Ck, Vi),Ck,Ui) (5) B. Nework Model We assume each node is idenified by an index-uple (n, n2,...,nk), where ni 0,,...,Ni -,i C {,2,....,k}, and we may use he index-uple as he node ID. Hence each node is mapped ino a poin in a k-dimension vecor se Si x S2 x * x Sk, where ni C Si c Z and he cardinaliy Si Ni, for i, 2,..., k. The maximum number of nodes ha he nework can consis of is N H Ni. Due o he broadcas characerisics of radio communicaions, adversaries can easily eavesdrop any messages, eiher non-encryped or encryped, ransmied over he air beween nodes. Adversaries may capure any node and compromise he secres sored in he node. Furhermore, adversaries can use he compromised secres o derive more secres shared beween oher non-compromised nodes. We ry o reduce he probabiliy ha he keys shared beween non-compromised nodes are exposed when some nodes have already been compromised. To furher evaluae he impac of node compromise, we assume he probabiliy of he compromise of a node is p. C. Share Disribuion Before nework deploymen, a global -degree (k )-variae symmeric polynomial is consruced as is saed in Secion II-A. This polynomial is used o derive shares for sensor nodes. To achieve key agreemen, every node n should have k credenials (Cl, C2,..., Ck), which are posiive and pairwise differen as is required in Secion II-A. These credenials can be creaed and preloaded ino nodes before deploymen. However, i requires addiional memory space per node. Forunaely, he k credenials can be derived from he k indices in node ID (n, n2,...,nk) by a bijecion, i.e., C C2 C3 ICk - Ck nl n2nl n3nin2 (6) Nl Nk2 N nk Nk nk where ni,,...,ni - for i,2,...,k. Thus, he k credenials are drawn from differen zones in ha cl e [, N] and ci CE [Nl N,_, N, Nj] for i' 2,... k, which guaranee hey are posiive and pairwise differen (Fig. ). For a node (nl, n2,..., nk), a polynomial share fk±(xk) 2 of 6 f (Cl, C2,. (7) Ck, Xk) ik 0

3 c2 cl 0 Ni c3 ck Nl...Nk NN2 Consrucion of posiive and pairwise differen credenials according o he equaion (6). ci are credenials derived from Figure. node ID. real nework opology of he example in Fig. 2 (a) is illusraed in Fig. 2 (b). is calculaed, where bik PI i E EE il 0 0 i2 bik~ ~~~ail,2, ~0k... k~~kc0lc2 c~ Cik ci2 Ck,ikl ik 0 (8) and (cl, c2,....,cc) is mapped from (n, n2,..., nk) according o he equaions (6). Then he polynomial share is assigned o he node. Here, he node only knows he coefficiens of he univariae polynomial share, bu no he coefficiens of he original (k )-variae polynomial. Therefore, even if he marginal bivariae polynomial is exposed, he global polynomial is sill safe if he degree is chosen properly. D. Node Deploymen According o Secion II-A, wo nodes can calculae a shared key if heir credenials have only one mismach in hem. Due o he one-o-one mapping in he equaions (6), wo nodes u wih ID (U, U2,..., Uk) and v wih ID (vl, v2,..., k) can direcly calculae a shared key wihou any ineracion if heir IDs have only one mismach. If he wo nodes are wihin he radio coverage of each, hen he key can be used as an LLK. Therefore, we need a deploymen mehod ha inenionally make nodes wih only one mismach in heir IDs be deployed as close as possible. In such a way, each node can esablish Link-layer keys wih mos of is neighbors. Because node ID is an index-uple (n, n2,*** nk), where ni 0,,..., Ni, i C {, 2,..., k}, he nework is logically consruced wih k levels. The i-h level consiss of N x N2 x... x Ni cells, each of which has N±i subcells, i.e., N±i x... x Nk nodes, where i, 2,..., k -2. The (k -)-h level consiss of N x N2 x... x Nk- cells, each of which has Nk nodes. Here, he noaion (n, n2,..., ni) can be seen as cell ID a he i-h level for i, 2,..., k -. An example is illusraed in Fig. 2 (a), where Ni N2 N3 9. To faciliae key agreemen, he logical nework opology is ransformed ino a real one, which decides he real node deploymen model. Suppose a level-(i -) cell has Ni Ri x Ci subcells. To do he ransformaion, he following wo seps are aken: ) in he firs sep, flip he even rows of he level- (i -) cell verically; 2) in he second sep, flip he even columns of he level-(i- ) cell horizonally. An example is depiced in Fig. 3. A cell a he (i- 2)-h level has Nii 3 x 5 level-(i -) subcells (Fig. 3 (a)), each of which again has Ni subcells. By he wo-sep ransformaion, we ge he real cell opology illusraed in Fig. 3 (b). The enire nework opology is consruced based on he wo-sep ransformaion. In his way, he nework is divided ino N x N2 x... x Nk- cells, where cells are locaed according o he space order deermined by he wo-sep ransformaion. All he nodes are deployed ino corresponding cells based on heir IDs. The E. Link-layer Key Agreemen As is saed before, wo nodes u wih ID (U, U2,..., Uk) and v wih ID (vl, v2,..., Vk) can direcly calculae a shared key wihou any ineracion if here is only one mismach, say he i-h indices, in heir IDs. Then node u can ake vin Ni as he inpu o is own share f(ci, C2,..., ck, Xk), and node v can as well ake ui N... Ni- as he inpu o is share f (ci, c2,..., c, Xk±). The direc shared key beween nodes u and v is hen calculaed as _KUlV fj(ci..., ui IN,., Ck Vi I N, f(ci...,vi I N, Ck.,ci, N,... Ni-, Ni-) Ni-,... Ni-) (9) Because all node credenials of u and v are drawn from differen subses where any wo subses have no inersecion and ui a vi, he k credenials used o calculae he shared key are pairwise differen, and he se of credenials is unique. Therefore he shared key calculaed by he nodes u and v is unique, i.e., oher nodes do no know he shared key. Consider our deploymen model. A he lowes level, he nework is divided ino N x N2 x... x Nk cells. All he nodes in each of hose cells have common ID prefix, which is he cell ID, and heir node IDs are only differen a he k-h posiion. Therefore, any pair of nodes in one cell can calculae a direc shared key. For example, wo nodes (04) and (044) in cell (04) (Fig. 2 (b)) can calculae a shared key direcly. For wo neighboring cells, if heir cell IDs has only one mismach, each node in one cell can find anoher node in he oher cell such ha he wo nodes have only one mismach in heir node IDs, i.e., he wo nodes can calculae a shared key direcly. In he example Fig. 2 (b), node (04) in cell (04) can calculae a shared key direcly wih node (08) in cell (08). Wih he help of node (08), node (04) can indirecly esablish a shared key wih every oher node in cell (08). For wo neighboring cells wih wo mismaches in heir cell IDs, hey are in he diagonal direcion of each oher and have a neighboring cell in common, which has only one mismach in cell ID wih each of hem. In Fig. 2 (b), node (08) in cell (08) can indirecly negoiae a shared key wih node (5) in cell (5) hrough node (8) in cell (8), because node (8) has direc keys wih node (08) and (5) respecively. Then node (08) can indirecly negoiae a shared key wih each of oher nodes in cell (5) hrough node (5). In our deploymen model, each node can calculae direc LLKs wih mos of is neighbors because mos of is neighbors are in 3 of 6

4 (a) (b) Figure 2. (a) Logical nework opology before deploymen. Each node has an ID (n,n22, n3), where ni C [, Nj] and N N2 N3 9. (b) Real nework opology afer deploymen. Each node (n, n2, n3) is deployed ino he corresponding cell (n, n2). II(a) each of w Ic Nsuc's () Iclpo (b) Figure 3. A cell a he (i -2)-h level has 5 level-i subcells,, each of which again has Ni subcells. (a) is he logical opology before deploymen. Afer flipping he even rows of he level-(i - 2) cell verically and hen he even columns horizonally, we ge (b), he real opology for node deploymen. he same cell as i, and negoiae indirec LLKs wih he res neighbors wih he help of only one inermediae node. Moreover, each node can even esablish shared keys wih oher nodes mulihop away. ANALYSIS AND EVALUATION In his secion, we will carry ou some analysis and evaluae our scheme in comparison wih some ypical schemes including [3], [7]-[0]. A. Memory Cos All nodes in he nework hold parial informaion of one - degree (k )-variae polynomial o achieve key agreemen. The memory cos of each node is because each node needs o sore a -degree univariae polynomial. The smaller is, he less memory cos. However, he value of should no be oo small. During he nework lifeime, some nodes may be compromised and hen collaborae o expose he polynomial wih he parial informaion hey hold whereby o direcly calculae keys beween oher nodes. Obviously, he polynomial degree is an indicaion of he difficuly o expose he polynomial, and i is direcly relaed o he securiy performance. By choosing he value of properly, we can guaranee ha no maer how many nodes are compromised, heir collaboraion canno expose direc keys held beween oher non-compromised nodes, i.e., he global -degree (k )-variae polynomial canno be exposed. I has been proved in [5] ha o guaranee he securiy of he global polynomial he following wo condiions mus be saisfied: 0 < N -2 <, i,2,...,k, (0) and I(H k ki 2 -N ((k I i i Obviously, he soluion should be >. ( ) (2) However, i is very difficul o ge * analyically. If we le Ni N for i, 2,..., k, i.e., all subspaces have he same number of indices, we can bound * as [5] * < r N, (3) 4 of 6

5 TABLE I. Bound and precise raios beween * and N k TABLE II. r PIKE [7] is similar o our scheme in ha any pair of nodes can esablish a shared key hrough no more han one inermediae node. The difference is ha i does no uilize deploymen knowledge o faciliae LLK agreemen and hus is more expensive in communicaion. Moreover, is memory cos per node is higher han ours. Obviously, our scheme is more secure han convenional schemes. * IN Memory cos of differen schemes Schemes E-G [3] LBKP [0] PIKE [7] Combinaorial schemes [8], [9] Ours C. Local Secure Conneciviy Memory Cos m 5( ) 2(N- O(VN) ) 9(kN) where raio r k(k2 )! (4) The second column in Table I gives some bound raios when k is small. The numerical value of * are given in he hird column in Table I when k is small. We compare he memory cos per node of our schemes wih oher schemes in TABLE II. In E-G scheme [3] each node has a subse of m keys, where m may be more han 00 if i needs o mainain a cerain securiy or conneciviy. In LBKP [0] each node is preloaded wih 5 polynomial shares, each of which has a degree of. However, in order o mainain srong securiy, he value of is very high. So is memory cos is much higher han ours. In PIKE [7], each node mus sore 2(N-) keys where N is he nework size. Combinaorial design echniques are proposed in [8], [9]. They are similar o E-G [3], bu hey can ensure key sharing beween any pair of nodes. The memory cos of heir schemes is roughly O(4N) where N is he oal number of nodes. However, he memory cos of our scheme can be 0( kvn), which is much less. Every node can calculae direc LLKs wih some neighbors, and esablish indirec LLKs wih oher neighbors hrough one inermediae node. The local secure conneciviy is direcly relaed o he communicaion overhead of key esablishmens. If a node has high probabiliy o calculae direc LLKs, i can save a lo of communicaion overhead on he esablishmen of indirec LLKs hrough muli-hop rouing. Hence, high local secure conneciviy, which is he probabiliy of esablishmen of direc LLKs, is desirable in sensor neworks. Suppose nodes are uniformly deployed in each cell. The local secure conneciviy can be calculaed as he raio of node coverage in is cell o he node ransmission area. Suppose he side lengh of each cell is 2D, node radio radius is R. Due o he symmery of square cell, we only consider he firs quadran in he Caresian coordinae plane (Fig. 4), where he cener of cell is locaed a he origin of he plane. The firs quadran is divided ino five areas, each of which is corresponding o differen node coverage A(x0, y,) in he cell, where (x0, y,) is he locaion of node. The A(x0, y,) can be calculaed as A(x, Y,) 7R2, R2 In convenional schemes [3], [8]-[0], when he number of compromised nodes is large, he direc keys among non-compromised nodes can be exposed. Moreover, he indirec keys are as well insecure because each indirec key has o be esablished wih he help of several inermediae nodes along a pah. If such a pah involve h inermediae nodes, hen he probabiliy ha an indirec key is exposed can be calculaed as Pc I_( _p)h (5) wheno<x,< D-R, O<y0< D-R 2 arccos(2y2 when ) Y0 0) O<xo<D-R,D-R<yo<D ) arccos(2x) ) X0 when D-R<xo<D,O<yo<D-R ) 2 arccos(2y) ) R2( _ arccos(2x) X0 X02 y Y2), when D-R < xo < D D-R < yo < D, R2 B. Securiy In our scheme, each node can calculae direc LLKs wih mos of is neighbors. Each direc LLK is only known by he pair of nodes ha shares i, and he key can no be derived by oher nodes, because we choose he value of such ha he global polynomial is secure in case of node compromise. As for oher neighbors, each node can negoiae an indirec LLK wih each of hem hrough only one inermediae node. So if he probabiliy of node compromise is p, hen he probabiliy of he exposure of he indirec key is jus p. (6) R2((Xo V (xo- D)2 (yo -D)2 > R2 y02)(y X02) I X02) Y0 arccos(- X ( X02)( XoYI) when D-R<xo<D,D-R<yo<D, (xo- D)2 (yo -D)2 < R2 _y02) (7) where XO DR-o YO D -yo Thus he local secure connecr iviy can be calculaed as D D C A (x, (8). ~~~~C7R2D2 (oy,) dx,dy In scheme [3], each node selecs M keys from S keys, hus he local secure conneciviy is roughly (SMM) /( ) where S > M. In PIKE [7], each node keeps unique pairwise keys wih 2(N- ) nodes, hus he local secure conneciviy of PIKE is abou 2/AN. Schemes [8], [9] are similar o PIKE 5 of 6

6 y D D-R 0 U-R U Figure 4. Node coverage in one cell. [7] in ha he local secure conneciviy is roughly 0(/VN). LBKP scheme [0] uses locaion informaion o faciliae key pre-disribuion so ha each node can esablish direc LLKs wih all neighbors in is cell and in neighboring cells, leading he local secure conneciviy o abou if all he nodes are uniformly deployed in heir home cell. The low local secure conneciviy of schemes [3], [7]-[9] is because each node canno sore oo much keys o increase he local secure conneciviy. However, in ours scheme he local secure conneciviy is unrelaed o memory cos. For example, suppose he size of cell size is 200 x 200m2 and node radio radius is 25m. The local secure conneciviy of ours scheme is 0.89, which is much higher han ha of [3], [7]-[9], which is usually much less han 0.5. CONCLUSION In his paper, we proposed a novel key agreemen scheme, which is scalable for large neworks wih small memory cos. Compared wih convenional schemes which have memory cos of a leas 0 (4N) in a nework wih N nodes, our scheme has only 0 ( kn) memory cos per node, where k >. Moreover, we uilize node deploymen knowledge o faciliae direc LLK agreemen so ha he local secure conneciviy is very high. In his way, he communicaion overhead of esablishing indirec LLKs is reduced significanly. The securiy of our scheme is very srong in ha mos LLKs are esablished direcly, and he oher indirec LLKs are esablished hrough only one inermediae node. REFERENCES r-, l-% pp [] R. Blom, "An opimal class of symmeric key generaion sysems," in Proc. of EUROCRYPT '84, pages , 985. [2] C. Blundo, A. De Sanis, A. Herzberg, S. Kuen, U. Vaccaro,and M. Yung, "Perfecly-secure key disribuion for dynamic conferences," in Advances in Crypology C CRYPTO 92, LNCS 740, pages , 992. [3] L. Eschenauer and V. Gligor, "A key managemen scheme for disribued sensor neworks," in ACM CCS'02, Washingon D.C., [4] H. Chan, A. Perrig, and D. Song, "Random key predisribuion schemes for sensor neworks," in Proceedings of he 2003 IEEE Symposium on Securiy and Privacy, p.l97, May -4, [5] W. Du, J. Deng, Y. S. Han, and P. K.Varshney, "A pairwise key predisribuion scheme for wireless sensor neworks," in CCS'03, Washingon, DC, Ocober 27-30, [6] D. Liu, and P. Ning, "Esablishing pairwise keys in disribuied sensor neworks," CCS'03, Washingon, DC, [7] H. Chan and A. Perrig, "Pike: peer inermediaries for key esablishmen in sensor neworks," in IEEE INFOCOM'05, March, [8] J. Lee and D. Sinson, "Deerminisic key predisribuion schemes for disribued sensor neworks," Seleced Areas in Crypography, [9] S. Camepe and B. Yener, "Combinaorial design of key disribuion mechanisms for wireless sensor neworks," Proc. Ninh European Symp. Research Compuer Securiy, [0] D. Liu, and P. Ning, "Locaion-based pairwise key esablishmens for relaively saic sensor neworks," In ACM Workshop on Securiy ofad Hoc and Sensor Neworks(SASN'03), Ocober [] W. Du, J. Deng, Y S. Han, S. Chen and P. K. Varshney, "A key managemen scheme for wireless sensor neworks using deploymen knowledge," in he IEEE INFOCOM 2004, Hong Kong, March [2] Y. Zhou, Y. Zhang, and Y. Fang, "LLK: A link-layer key esablishmen scheme in wireless sensor neworks," in IEEE WCNC'05, New Orleans, LA, March [3] Y. Zhou, Y. Zhang, and Y. Fang, "Key esablishmen in sensor neworks based on riangle grid deploymen model," IEEE Miliary Communicaions Conference (MILCOM'05), Alanic Ciy, New Jersey, Ocober 7-20, [4] D. Liu, P. Ning and W. Du, "Group-based key pre-disribuion in wireless sensor neworks," ACM WiSe'05, Sepember, [5] Y. Zhou and Y. Fang, "A scalable key agreemen scheme for large scale neworks," in 2006 IEEE Inernaional Conference on Neworking, Sensing and Conrol (ICNSC06), F. Lauderdale, Florida, USA, April 23-25, of 6

Coded Caching with Multiple File Requests

Coded Caching with Multiple File Requests Coded Caching wih Muliple File Requess Yi-Peng Wei Sennur Ulukus Deparmen of Elecrical and Compuer Engineering Universiy of Maryland College Park, MD 20742 ypwei@umd.edu ulukus@umd.edu Absrac We sudy a

More information

Lecture 18: Mix net Voting Systems

Lecture 18: Mix net Voting Systems 6.897: Advanced Topics in Crypography Apr 9, 2004 Lecure 18: Mix ne Voing Sysems Scribed by: Yael Tauman Kalai 1 Inroducion In he previous lecure, we defined he noion of an elecronic voing sysem, and specified

More information

4.1 3D GEOMETRIC TRANSFORMATIONS

4.1 3D GEOMETRIC TRANSFORMATIONS MODULE IV MCA - 3 COMPUTER GRAPHICS ADMN 29- Dep. of Compuer Science And Applicaions, SJCET, Palai 94 4. 3D GEOMETRIC TRANSFORMATIONS Mehods for geomeric ransformaions and objec modeling in hree dimensions

More information

Implementing Ray Casting in Tetrahedral Meshes with Programmable Graphics Hardware (Technical Report)

Implementing Ray Casting in Tetrahedral Meshes with Programmable Graphics Hardware (Technical Report) Implemening Ray Casing in Terahedral Meshes wih Programmable Graphics Hardware (Technical Repor) Marin Kraus, Thomas Erl March 28, 2002 1 Inroducion Alhough cell-projecion, e.g., [3, 2], and resampling,

More information

Shortest Path Algorithms. Lecture I: Shortest Path Algorithms. Example. Graphs and Matrices. Setting: Dr Kieran T. Herley.

Shortest Path Algorithms. Lecture I: Shortest Path Algorithms. Example. Graphs and Matrices. Setting: Dr Kieran T. Herley. Shores Pah Algorihms Background Seing: Lecure I: Shores Pah Algorihms Dr Kieran T. Herle Deparmen of Compuer Science Universi College Cork Ocober 201 direced graph, real edge weighs Le he lengh of a pah

More information

CENG 477 Introduction to Computer Graphics. Modeling Transformations

CENG 477 Introduction to Computer Graphics. Modeling Transformations CENG 477 Inroducion o Compuer Graphics Modeling Transformaions Modeling Transformaions Model coordinaes o World coordinaes: Model coordinaes: All shapes wih heir local coordinaes and sies. world World

More information

Assignment 2. Due Monday Feb. 12, 10:00pm.

Assignment 2. Due Monday Feb. 12, 10:00pm. Faculy of rs and Science Universiy of Torono CSC 358 - Inroducion o Compuer Neworks, Winer 218, LEC11 ssignmen 2 Due Monday Feb. 12, 1:pm. 1 Quesion 1 (2 Poins): Go-ack n RQ In his quesion, we review how

More information

Network management and QoS provisioning - QoS in Frame Relay. . packet switching with virtual circuit service (virtual circuits are bidirectional);

Network management and QoS provisioning - QoS in Frame Relay. . packet switching with virtual circuit service (virtual circuits are bidirectional); QoS in Frame Relay Frame relay characerisics are:. packe swiching wih virual circui service (virual circuis are bidirecional);. labels are called DLCI (Daa Link Connecion Idenifier);. for connecion is

More information

COSC 3213: Computer Networks I Chapter 6 Handout # 7

COSC 3213: Computer Networks I Chapter 6 Handout # 7 COSC 3213: Compuer Neworks I Chaper 6 Handou # 7 Insrucor: Dr. Marvin Mandelbaum Deparmen of Compuer Science York Universiy F05 Secion A Medium Access Conrol (MAC) Topics: 1. Muliple Access Communicaions:

More information

STEREO PLANE MATCHING TECHNIQUE

STEREO PLANE MATCHING TECHNIQUE STEREO PLANE MATCHING TECHNIQUE Commission III KEY WORDS: Sereo Maching, Surface Modeling, Projecive Transformaion, Homography ABSTRACT: This paper presens a new ype of sereo maching algorihm called Sereo

More information

Quantitative macro models feature an infinite number of periods A more realistic (?) view of time

Quantitative macro models feature an infinite number of periods A more realistic (?) view of time INFINIE-HORIZON CONSUMPION-SAVINGS MODEL SEPEMBER, Inroducion BASICS Quaniaive macro models feaure an infinie number of periods A more realisic (?) view of ime Infinie number of periods A meaphor for many

More information

Gauss-Jordan Algorithm

Gauss-Jordan Algorithm Gauss-Jordan Algorihm The Gauss-Jordan algorihm is a sep by sep procedure for solving a sysem of linear equaions which may conain any number of variables and any number of equaions. The algorihm is carried

More information

CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL

CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL Klečka Jan Docoral Degree Programme (1), FEEC BUT E-mail: xkleck01@sud.feec.vubr.cz Supervised by: Horák Karel E-mail: horak@feec.vubr.cz

More information

EECS 487: Interactive Computer Graphics

EECS 487: Interactive Computer Graphics EECS 487: Ineracive Compuer Graphics Lecure 7: B-splines curves Raional Bézier and NURBS Cubic Splines A represenaion of cubic spline consiss of: four conrol poins (why four?) hese are compleely user specified

More information

Less Pessimistic Worst-Case Delay Analysis for Packet-Switched Networks

Less Pessimistic Worst-Case Delay Analysis for Packet-Switched Networks Less Pessimisic Wors-Case Delay Analysis for Packe-Swiched Neworks Maias Wecksén Cenre for Research on Embedded Sysems P O Box 823 SE-31 18 Halmsad maias.wecksen@hh.se Magnus Jonsson Cenre for Research

More information

A Matching Algorithm for Content-Based Image Retrieval

A Matching Algorithm for Content-Based Image Retrieval A Maching Algorihm for Conen-Based Image Rerieval Sue J. Cho Deparmen of Compuer Science Seoul Naional Universiy Seoul, Korea Absrac Conen-based image rerieval sysem rerieves an image from a daabase using

More information

Coded Caching in a Multi-Server System with Random Topology

Coded Caching in a Multi-Server System with Random Topology Coded Caching in a Muli-Server Sysem wih Random Topology iish Mial, Deniz Gündüz and Cong Ling Deparmen of Elecrical and Elecronic Engineering, Imperial College London Email: {n.mial, d.gunduz, c.ling}@imperial.ac.uk

More information

Simple Network Management Based on PHP and SNMP

Simple Network Management Based on PHP and SNMP Simple Nework Managemen Based on PHP and SNMP Krasimir Trichkov, Elisavea Trichkova bsrac: This paper aims o presen simple mehod for nework managemen based on SNMP - managemen of Cisco rouer. The paper

More information

Chapter 8 LOCATION SERVICES

Chapter 8 LOCATION SERVICES Disribued Compuing Group Chaper 8 LOCATION SERVICES Mobile Compuing Winer 2005 / 2006 Overview Mobile IP Moivaion Daa ransfer Encapsulaion Locaion Services & Rouing Classificaion of locaion services Home

More information

PART 1 REFERENCE INFORMATION CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONITOR

PART 1 REFERENCE INFORMATION CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONITOR . ~ PART 1 c 0 \,).,,.,, REFERENCE NFORMATON CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONTOR n CONTROL DATA 6400 Compuer Sysems, sysem funcions are normally handled by he Monior locaed in a Peripheral

More information

Image segmentation. Motivation. Objective. Definitions. A classification of segmentation techniques. Assumptions for thresholding

Image segmentation. Motivation. Objective. Definitions. A classification of segmentation techniques. Assumptions for thresholding Moivaion Image segmenaion Which pixels belong o he same objec in an image/video sequence? (spaial segmenaion) Which frames belong o he same video sho? (emporal segmenaion) Which frames belong o he same

More information

Y. Tsiatouhas. VLSI Systems and Computer Architecture Lab

Y. Tsiatouhas. VLSI Systems and Computer Architecture Lab CMOS INEGRAED CIRCUI DESIGN ECHNIQUES Universiy of Ioannina Clocking Schemes Dep. of Compuer Science and Engineering Y. siaouhas CMOS Inegraed Circui Design echniques Overview 1. Jier Skew hroughpu Laency

More information

Page 1. Key Points from Last Lecture Frame format. EEC173B/ECS152C, Winter Wireless LANs

Page 1. Key Points from Last Lecture Frame format. EEC173B/ECS152C, Winter Wireless LANs EEC173/ECS152C, Winer 2006 Key Poins from Las Lecure Wireless LANs 802.11 Frame forma 802.11 MAC managemen Synchronizaion, Handoffs, Power MAC mehods: DCF & PCF CSMA/CA wih posiive ACK Exponenial backoff

More information

A Scheme to Reduce Packet Loss during PMIPv6 Handover considering Authentication

A Scheme to Reduce Packet Loss during PMIPv6 Handover considering Authentication Inernaional Conference on Compuaional Sciences and Is Applicaions ICCSA 2008 A Scheme o Reduce Loss during P Handover considering Auhenicaion Seonggeun Ryu, Gye-Young Kim, Byunggi Kim, and Youngsong Mun

More information

Low-Cost WLAN based. Dr. Christian Hoene. Computer Science Department, University of Tübingen, Germany

Low-Cost WLAN based. Dr. Christian Hoene. Computer Science Department, University of Tübingen, Germany Low-Cos WLAN based Time-of-fligh fligh Trilaeraion Precision Indoor Personnel Locaion and Tracking for Emergency Responders Third Annual Technology Workshop, Augus 5, 2008 Worceser Polyechnic Insiue, Worceser,

More information

4 Error Control. 4.1 Issues with Reliable Protocols

4 Error Control. 4.1 Issues with Reliable Protocols 4 Error Conrol Jus abou all communicaion sysems aemp o ensure ha he daa ges o he oher end of he link wihou errors. Since i s impossible o build an error-free physical layer (alhough some shor links can

More information

The Impact of Product Development on the Lifecycle of Defects

The Impact of Product Development on the Lifecycle of Defects The Impac of Produc Developmen on he Lifecycle of Rudolf Ramler Sofware Compeence Cener Hagenberg Sofware Park 21 A-4232 Hagenberg, Ausria +43 7236 3343 872 rudolf.ramler@scch.a ABSTRACT This paper invesigaes

More information

MATH Differential Equations September 15, 2008 Project 1, Fall 2008 Due: September 24, 2008

MATH Differential Equations September 15, 2008 Project 1, Fall 2008 Due: September 24, 2008 MATH 5 - Differenial Equaions Sepember 15, 8 Projec 1, Fall 8 Due: Sepember 4, 8 Lab 1.3 - Logisics Populaion Models wih Harvesing For his projec we consider lab 1.3 of Differenial Equaions pages 146 o

More information

A Scalable Key Agreement Scheme For Large Scale Networks

A Scalable Key Agreement Scheme For Large Scale Networks A Scalable Key Agreement Scheme For Large Scale Networs Yun Zhou, Student Member, IEEE, and Yuguang Fang, Senior Member, IEEE Abstract Key agreement is a central problem to build up secure infrastructures

More information

Accelerating Call Route Query of Multi-domain SIP System via P2P GONG Jing, SHEN Qing-guo, SHEN Huan-sheng

Accelerating Call Route Query of Multi-domain SIP System via P2P GONG Jing, SHEN Qing-guo, SHEN Huan-sheng 3rd Inernaional Conference on Mecharonics and Informaion Technology (ICMIT 2016) Acceleraing Call Roue Query of Muli-domain IP ysem via P2P GONG Jing, HEN Qing-guo, HEN Huan-sheng College of Communicaions

More information

Scattering at an Interface: Normal Incidence

Scattering at an Interface: Normal Incidence Course Insrucor Dr. Raymond C. Rumpf Office: A 337 Phone: (915) 747 6958 Mail: rcrumpf@uep.edu 4347 Applied lecromagneics Topic 3f Scaering a an Inerface: Normal Incidence Scaering These Normal noes Incidence

More information

Computational Geometry in Wireless Networks - Routing. Presented by Heather M. Michaud

Computational Geometry in Wireless Networks - Routing. Presented by Heather M. Michaud Compaional Geomery in Wireless Neworks - Roing Presened by Heaher M. Michad 1 Ad Hoc Wireless Neworks No fixed pre-exising infrasrcre Nodes can be saic or mobile Assme nodes don move dring roing or opology

More information

4. Minimax and planning problems

4. Minimax and planning problems CS/ECE/ISyE 524 Inroducion o Opimizaion Spring 2017 18 4. Minima and planning problems ˆ Opimizing piecewise linear funcions ˆ Minima problems ˆ Eample: Chebyshev cener ˆ Muli-period planning problems

More information

Vulnerability Evaluation of Multimedia Subsystem Based on Complex Network

Vulnerability Evaluation of Multimedia Subsystem Based on Complex Network JOURAL OF MULTIMDIA, VOL. 8, O. 4, AUGUST 23 439 Vulnerabiliy valuaion of Mulimedia Subsysem Based on Complex ewor Xiaoling Tang Insiue of Higher ducaion Research, Jilin Business and Technology College,

More information

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version Tes - Accredied Configuraion Engineer (ACE) Exam - PAN-OS 6.0 Version ACE Exam Quesion 1 of 50. Which of he following saemens is NOT abou Palo Alo Neworks firewalls? Sysem defauls may be resored by performing

More information

Opportunistic Flooding in Low-Duty-Cycle Wireless Sensor Networks with Unreliable Links

Opportunistic Flooding in Low-Duty-Cycle Wireless Sensor Networks with Unreliable Links 1 in Low-uy-ycle Wireless Sensor Neworks wih Unreliable Links Shuo uo, Suden Member, IEEE, Liang He, Member, IEEE, Yu u, Member, IEEE, o Jiang, Suden Member, IEEE, and Tian He, Member, IEEE bsrac looding

More information

An Efficient Delivery Scheme for Coded Caching

An Efficient Delivery Scheme for Coded Caching 201 27h Inernaional Teleraffic Congress An Efficien Delivery Scheme for Coded Caching Abinesh Ramakrishnan, Cedric Wesphal and Ahina Markopoulou Deparmen of Elecrical Engineering and Compuer Science, Universiy

More information

Learning in Games via Opponent Strategy Estimation and Policy Search

Learning in Games via Opponent Strategy Estimation and Policy Search Learning in Games via Opponen Sraegy Esimaion and Policy Search Yavar Naddaf Deparmen of Compuer Science Universiy of Briish Columbia Vancouver, BC yavar@naddaf.name Nando de Freias (Supervisor) Deparmen

More information

A new method for 3-dimensional roadway design using visualization techniques

A new method for 3-dimensional roadway design using visualization techniques Urban Transor XIII: Urban Transor and he Environmen in he 2s Cenury 23 A new mehod for 3-dimensional roadway design using visualizaion echniques G. Karri & M. K. Jha Dearmen of Civil Engineering, Morgan

More information

A Face Detection Method Based on Skin Color Model

A Face Detection Method Based on Skin Color Model A Face Deecion Mehod Based on Skin Color Model Dazhi Zhang Boying Wu Jiebao Sun Qinglei Liao Deparmen of Mahemaics Harbin Insiue of Technology Harbin China 150000 Zhang_dz@163.com mahwby@hi.edu.cn sunjiebao@om.com

More information

Attack-Resilient Time Synchronization for Wireless Sensor Networks

Attack-Resilient Time Synchronization for Wireless Sensor Networks ack-resilien Time Synchronizaion for Wireless Sensor Neworks Hui Song, Sencun Zhu, and Guohong Cao Deparmen of Compuer Science & Engineering The Pennsylvania Sae Universiy Universiy Park, P 1682 Email:

More information

Design Alternatives for a Thin Lens Spatial Integrator Array

Design Alternatives for a Thin Lens Spatial Integrator Array Egyp. J. Solids, Vol. (7), No. (), (004) 75 Design Alernaives for a Thin Lens Spaial Inegraor Array Hala Kamal *, Daniel V azquez and Javier Alda and E. Bernabeu Opics Deparmen. Universiy Compluense of

More information

A Routing Algorithm for Flip-Chip Design

A Routing Algorithm for Flip-Chip Design A Rouing Algorihm for Flip-hip Design Jia-Wei Fang, I-Jye Lin, and Yao-Wen hang, Graduae Insiue of Elecronics Engineering, Naional Taiwan Universiy, Taipei Deparmen of Elecrical Engineering, Naional Taiwan

More information

Open Access Research on an Improved Medical Image Enhancement Algorithm Based on P-M Model. Luo Aijing 1 and Yin Jin 2,* u = div( c u ) u

Open Access Research on an Improved Medical Image Enhancement Algorithm Based on P-M Model. Luo Aijing 1 and Yin Jin 2,* u = div( c u ) u Send Orders for Reprins o reprins@benhamscience.ae The Open Biomedical Engineering Journal, 5, 9, 9-3 9 Open Access Research on an Improved Medical Image Enhancemen Algorihm Based on P-M Model Luo Aijing

More information

Spline Curves. Color Interpolation. Normal Interpolation. Last Time? Today. glshademodel (GL_SMOOTH); Adjacency Data Structures. Mesh Simplification

Spline Curves. Color Interpolation. Normal Interpolation. Last Time? Today. glshademodel (GL_SMOOTH); Adjacency Data Structures. Mesh Simplification Las Time? Adjacency Daa Srucures Spline Curves Geomeric & opologic informaion Dynamic allocaion Efficiency of access Mesh Simplificaion edge collapse/verex spli geomorphs progressive ransmission view-dependen

More information

Point Cloud Representation of 3D Shape for Laser- Plasma Scanning 3D Display

Point Cloud Representation of 3D Shape for Laser- Plasma Scanning 3D Display Poin Cloud Represenaion of 3D Shape for Laser- Plasma Scanning 3D Displa Hiroo Ishikawa and Hideo Saio Keio Universi E-mail {hiroo, saio}@ozawa.ics.keio.ac.jp Absrac- In his paper, a mehod of represening

More information

Nonparametric CUSUM Charts for Process Variability

Nonparametric CUSUM Charts for Process Variability Journal of Academia and Indusrial Research (JAIR) Volume 3, Issue June 4 53 REEARCH ARTICLE IN: 78-53 Nonparameric CUUM Chars for Process Variabiliy D.M. Zombade and V.B. Ghue * Dep. of aisics, Walchand

More information

Streamline Pathline Eulerian Lagrangian

Streamline Pathline Eulerian Lagrangian Sreamline Pahline Eulerian Lagrangian Sagnaion Poin Flow V V V = + = + = + o V xi y j a V V xi y j o Pahline and Sreakline Insananeous Sreamlines Pahlines Sreaklines Maerial Derivaive Acceleraion

More information

An Improved Square-Root Nyquist Shaping Filter

An Improved Square-Root Nyquist Shaping Filter An Improved Square-Roo Nyquis Shaping Filer fred harris San Diego Sae Universiy fred.harris@sdsu.edu Sridhar Seshagiri San Diego Sae Universiy Seshigar.@engineering.sdsu.edu Chris Dick Xilinx Corp. chris.dick@xilinx.com

More information

MOBILE COMPUTING. Wi-Fi 9/20/15. CSE 40814/60814 Fall Wi-Fi:

MOBILE COMPUTING. Wi-Fi 9/20/15. CSE 40814/60814 Fall Wi-Fi: MOBILE COMPUTING CSE 40814/60814 Fall 2015 Wi-Fi Wi-Fi: name is NOT an abbreviaion play on Hi-Fi (high fideliy) Wireless Local Area Nework (WLAN) echnology WLAN and Wi-Fi ofen used synonymous Typically

More information

MOBILE COMPUTING 3/18/18. Wi-Fi IEEE. CSE 40814/60814 Spring 2018

MOBILE COMPUTING 3/18/18. Wi-Fi IEEE. CSE 40814/60814 Spring 2018 MOBILE COMPUTING CSE 40814/60814 Spring 2018 Wi-Fi Wi-Fi: name is NOT an abbreviaion play on Hi-Fi (high fideliy) Wireless Local Area Nework (WLAN) echnology WLAN and Wi-Fi ofen used synonymous Typically

More information

Handling uncertainty in semantic information retrieval process

Handling uncertainty in semantic information retrieval process Handling uncerainy in semanic informaion rerieval process Chkiwa Mounira 1, Jedidi Anis 1 and Faiez Gargouri 1 1 Mulimedia, InfoRmaion sysems and Advanced Compuing Laboraory Sfax Universiy, Tunisia m.chkiwa@gmail.com,

More information

An Adaptive Spatial Depth Filter for 3D Rendering IP

An Adaptive Spatial Depth Filter for 3D Rendering IP JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, VOL.3, NO. 4, DECEMBER, 23 175 An Adapive Spaial Deph Filer for 3D Rendering IP Chang-Hyo Yu and Lee-Sup Kim Absrac In his paper, we presen a new mehod

More information

Automatic Calculation of Coverage Profiles for Coverage-based Testing

Automatic Calculation of Coverage Profiles for Coverage-based Testing Auomaic Calculaion of Coverage Profiles for Coverage-based Tesing Raimund Kirner 1 and Waler Haas 1 Vienna Universiy of Technology, Insiue of Compuer Engineering, Vienna, Ausria, raimund@vmars.uwien.ac.a

More information

Protecting User Privacy in a Multi-Path Information-Centric Network Using Multiple Random-Caches

Protecting User Privacy in a Multi-Path Information-Centric Network Using Multiple Random-Caches Chu WB, Wang LF, Jiang ZJ e al. Proecing user privacy in a muli-pah informaion-cenric nework using muliple random-caches. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 585 598 May 27. DOI.7/s39-7-73-2

More information

Sam knows that his MP3 player has 40% of its battery life left and that the battery charges by an additional 12 percentage points every 15 minutes.

Sam knows that his MP3 player has 40% of its battery life left and that the battery charges by an additional 12 percentage points every 15 minutes. 8.F Baery Charging Task Sam wans o ake his MP3 player and his video game player on a car rip. An hour before hey plan o leave, he realized ha he forgo o charge he baeries las nigh. A ha poin, he plugged

More information

Analysis of Various Types of Bugs in the Object Oriented Java Script Language Coding

Analysis of Various Types of Bugs in the Object Oriented Java Script Language Coding Indian Journal of Science and Technology, Vol 8(21), DOI: 10.17485/ijs/2015/v8i21/69958, Sepember 2015 ISSN (Prin) : 0974-6846 ISSN (Online) : 0974-5645 Analysis of Various Types of Bugs in he Objec Oriened

More information

Modeling of IEEE in a Cluster of Synchronized Sensor Nodes

Modeling of IEEE in a Cluster of Synchronized Sensor Nodes Modeling of IEEE 802.15.4 in a Cluser of Synchronized Sensor Nodes Kenji Leibniz, Naoki Wakamiya, and Masayuki Muraa Graduae School of Informaion Science and Technology, Osaka Universiy, 1-5 Yamadaoka,

More information

Exercise 3: Bluetooth BR/EDR

Exercise 3: Bluetooth BR/EDR Wireless Communicaions, M. Rupf. Exercise 3: Blueooh BR/EDR Problem 1: Blueooh Daa Raes. Consider he ACL packe 3-DH5 wih a maximum user payload of 1021 byes. a) Deermine he maximum achievable daa rae in

More information

Detection Tracking and Recognition of Human Poses for a Real Time Spatial Game

Detection Tracking and Recognition of Human Poses for a Real Time Spatial Game Deecion Tracking and Recogniion of Human Poses for a Real Time Spaial Game Feifei Huo, Emile A. Hendriks, A.H.J. Oomes Delf Universiy of Technology The Neherlands f.huo@udelf.nl Pascal van Beek, Remco

More information

This is the published version of a paper presented at The 2013 IEEE International Conference on Internet of Things, Beijing, China, August 2013.

This is the published version of a paper presented at The 2013 IEEE International Conference on Internet of Things, Beijing, China, August 2013. hp://www.diva-poral.org This is he published version of a paper presened a The 2013 IEEE Inernaional Conference on Inerne of Things, Beijing, China, 20-23 Augus 2013. Ciaion for he original published paper:

More information

Communication Networks

Communication Networks Communicaion Neworks Chaper 10 Wireless Local Area Neworks According o IEEE 802.11 Communicaion Neworks: 10. IEEE 802.11 651 10. WLANs According o IEEE 802.11 Overview Organizaion of a WLAN according o

More information

Performance Evaluation of Implementing Calls Prioritization with Different Queuing Disciplines in Mobile Wireless Networks

Performance Evaluation of Implementing Calls Prioritization with Different Queuing Disciplines in Mobile Wireless Networks Journal of Compuer Science 2 (5): 466-472, 2006 ISSN 1549-3636 2006 Science Publicaions Performance Evaluaion of Implemening Calls Prioriizaion wih Differen Queuing Disciplines in Mobile Wireless Neworks

More information

Scheduling. Scheduling. EDA421/DIT171 - Parallel and Distributed Real-Time Systems, Chalmers/GU, 2011/2012 Lecture #4 Updated March 16, 2012

Scheduling. Scheduling. EDA421/DIT171 - Parallel and Distributed Real-Time Systems, Chalmers/GU, 2011/2012 Lecture #4 Updated March 16, 2012 EDA421/DIT171 - Parallel and Disribued Real-Time Sysems, Chalmers/GU, 2011/2012 Lecure #4 Updaed March 16, 2012 Aemps o mee applicaion consrains should be done in a proacive way hrough scheduling. Schedule

More information

Improving the Efficiency of Dynamic Service Provisioning in Transport Networks with Scheduled Services

Improving the Efficiency of Dynamic Service Provisioning in Transport Networks with Scheduled Services Improving he Efficiency of Dynamic Service Provisioning in Transpor Neworks wih Scheduled Services Ralf Hülsermann, Monika Jäger and Andreas Gladisch Technologiezenrum, T-Sysems, Goslarer Ufer 35, D-1585

More information

A Fast Non-Uniform Knots Placement Method for B-Spline Fitting

A Fast Non-Uniform Knots Placement Method for B-Spline Fitting 2015 IEEE Inernaional Conference on Advanced Inelligen Mecharonics (AIM) July 7-11, 2015. Busan, Korea A Fas Non-Uniform Knos Placemen Mehod for B-Spline Fiing T. Tjahjowidodo, VT. Dung, and ML. Han Absrac

More information

Who thinks who knows who? Socio-Cognitive Analysis of an Network

Who thinks who knows who? Socio-Cognitive Analysis of an  Network Who hinks who knows who? Socio-Cogniive Analysis of an Email Nework Nishih Pahak Deparmen of Compuer Science Universiy of Minnesoa Minneapolis, MN, USA npahak@cs.umn.edu Sandeep Mane Deparmen of Compuer

More information

IntentSearch:Capturing User Intention for One-Click Internet Image Search

IntentSearch:Capturing User Intention for One-Click Internet Image Search JOURNAL OF L A T E X CLASS FILES, VOL. 6, NO. 1, JANUARY 2010 1 InenSearch:Capuring User Inenion for One-Click Inerne Image Search Xiaoou Tang, Fellow, IEEE, Ke Liu, Jingyu Cui, Suden Member, IEEE, Fang

More information

LOW-VELOCITY IMPACT LOCALIZATION OF THE COMPOSITE TUBE USING A NORMALIZED CROSS-CORRELATION METHOD

LOW-VELOCITY IMPACT LOCALIZATION OF THE COMPOSITE TUBE USING A NORMALIZED CROSS-CORRELATION METHOD 21 s Inernaional Conference on Composie Maerials Xi an, 20-25 h Augus 2017 LOW-VELOCITY IMPACT LOCALIZATION OF THE COMPOSITE TUBE USING A NORMALIZED CROSS-CORRELATION METHOD Hyunseok Kwon 1, Yurim Park

More information

AML710 CAD LECTURE 11 SPACE CURVES. Space Curves Intrinsic properties Synthetic curves

AML710 CAD LECTURE 11 SPACE CURVES. Space Curves Intrinsic properties Synthetic curves AML7 CAD LECTURE Space Curves Inrinsic properies Synheic curves A curve which may pass hrough any region of hreedimensional space, as conrased o a plane curve which mus lie on a single plane. Space curves

More information

A MAC layer protocol for wireless networks with asymmetric links

A MAC layer protocol for wireless networks with asymmetric links A MAC layer proocol for wireless neworks wih asymmeric links Guoqiang Wang, Damla Turgu, Ladislau Bölöni, Yongchang Ji, Dan C. Marinescu School of Elecrical Engineering and Compuer Science, Universiy of

More information

Packet Scheduling in a Low-Latency Optical Interconnect with Electronic Buffers

Packet Scheduling in a Low-Latency Optical Interconnect with Electronic Buffers Packe cheduling in a Low-Laency Opical Inerconnec wih Elecronic Buffers Lin Liu Zhenghao Zhang Yuanyuan Yang Dep Elecrical & Compuer Engineering Compuer cience Deparmen Dep Elecrical & Compuer Engineering

More information

MoBAN: A Configurable Mobility Model for Wireless Body Area Networks

MoBAN: A Configurable Mobility Model for Wireless Body Area Networks MoBAN: A Configurable Mobiliy Model for Wireless Body Area Neworks Majid Nabi 1, Marc Geilen 1, Twan Basen 1,2 1 Deparmen of Elecrical Engineering, Eindhoven Universiy of Technology, he Neherlands 2 Embedded

More information

ON THE 3D PARAMETRIC MODELING OF MANUFACTURING SYSTEMS UDC: ; ; 338.3;

ON THE 3D PARAMETRIC MODELING OF MANUFACTURING SYSTEMS UDC: ; ; 338.3; 3 rd 7 h June, 2013. year, Belgrade, Serbia. ON THE 3D PARAMETRIC MODEING OF MANUFACTURING SYSTEMS UDC: 519.876.5; 004.896; 338.3; Agahocles A. Krimpenis 1, Nikolaos A. Founas 2, George D. Noeas 3, Dimiris

More information

A METHOD OF MODELING DEFORMATION OF AN OBJECT EMPLOYING SURROUNDING VIDEO CAMERAS

A METHOD OF MODELING DEFORMATION OF AN OBJECT EMPLOYING SURROUNDING VIDEO CAMERAS A METHOD OF MODELING DEFORMATION OF AN OBJECT EMLOYING SURROUNDING IDEO CAMERAS Joo Kooi TAN, Seiji ISHIKAWA Deparmen of Mechanical and Conrol Engineering Kushu Insiue of Technolog, Japan ehelan@is.cnl.kuech.ac.jp,

More information

Computer representations of piecewise

Computer representations of piecewise Edior: Gabriel Taubin Inroducion o Geomeric Processing hrough Opimizaion Gabriel Taubin Brown Universiy Compuer represenaions o piecewise smooh suraces have become vial echnologies in areas ranging rom

More information

A Tool for Multi-Hour ATM Network Design considering Mixed Peer-to-Peer and Client-Server based Services

A Tool for Multi-Hour ATM Network Design considering Mixed Peer-to-Peer and Client-Server based Services A Tool for Muli-Hour ATM Nework Design considering Mied Peer-o-Peer and Clien-Server based Services Conac Auhor Name: Luis Cardoso Company / Organizaion: Porugal Telecom Inovação Complee Mailing Address:

More information

Dynamic Route Planning and Obstacle Avoidance Model for Unmanned Aerial Vehicles

Dynamic Route Planning and Obstacle Avoidance Model for Unmanned Aerial Vehicles Volume 116 No. 24 2017, 315-329 ISSN: 1311-8080 (prined version); ISSN: 1314-3395 (on-line version) url: hp://www.ijpam.eu ijpam.eu Dynamic Roue Planning and Obsacle Avoidance Model for Unmanned Aerial

More information

MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES

MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES B. MARCOTEGUI and F. MEYER Ecole des Mines de Paris, Cenre de Morphologie Mahémaique, 35, rue Sain-Honoré, F 77305 Fonainebleau Cedex, France Absrac. In image

More information

Motion Level-of-Detail: A Simplification Method on Crowd Scene

Motion Level-of-Detail: A Simplification Method on Crowd Scene Moion Level-of-Deail: A Simplificaion Mehod on Crowd Scene Absrac Junghyun Ahn VR lab, EECS, KAIST ChocChoggi@vr.kais.ac.kr hp://vr.kais.ac.kr/~zhaoyue Recen echnological improvemen in characer animaion

More information

Recommendations Based QoS Trust Aggregation and Routing in Mobile Adhoc Networks

Recommendations Based QoS Trust Aggregation and Routing in Mobile Adhoc Networks 215 Recommendaions Based QoS Trus Aggregaion and Rouing in Mobile Adhoc Neworks Nageswararao Sirisala 1 and C.Shoba Bindu 2 1 CSE Dep, Vardhaman College of Engg, Hyderabad, India 2 CSE Dep, JNTUACE, Ananapur,

More information

Precise Voronoi Cell Extraction of Free-form Rational Planar Closed Curves

Precise Voronoi Cell Extraction of Free-form Rational Planar Closed Curves Precise Voronoi Cell Exracion of Free-form Raional Planar Closed Curves Iddo Hanniel, Ramanahan Muhuganapahy, Gershon Elber Deparmen of Compuer Science Technion, Israel Insiue of Technology Haifa 32000,

More information

A Principled Approach to. MILP Modeling. Columbia University, August Carnegie Mellon University. Workshop on MIP. John Hooker.

A Principled Approach to. MILP Modeling. Columbia University, August Carnegie Mellon University. Workshop on MIP. John Hooker. Slide A Principled Approach o MILP Modeling John Hooer Carnegie Mellon Universiy Worshop on MIP Columbia Universiy, Augus 008 Proposal MILP modeling is an ar, bu i need no be unprincipled. Slide Proposal

More information

On the Impact of Concurrency for the Enforcement of Entailment Constraints in Process-driven SOAs

On the Impact of Concurrency for the Enforcement of Entailment Constraints in Process-driven SOAs On he Impac of Concurrency for he Enforcemen of Enailmen Consrains in Process-driven OAs Thomas Quirchmayr and Mark rembeck Insiue for Informaion ysems, New Media Lab, WU Vienna, Ausria {firsname.lasname}@wu.ac.a

More information

Chapter 4 Sequential Instructions

Chapter 4 Sequential Instructions Chaper 4 Sequenial Insrucions The sequenial insrucions of FBs-PLC shown in his chaper are also lised in secion 3.. Please refer o Chaper, "PLC Ladder diagram and he Coding rules of Mnemonic insrucion",

More information

Engineering Mathematics 2018

Engineering Mathematics 2018 Engineering Mahemaics 08 SUBJET NAME : Mahemaics II SUBJET ODE : MA65 MATERIAL NAME : Par A quesions REGULATION : R03 UPDATED ON : November 06 TEXTBOOK FOR REFERENE To buy he book visi : Sri Hariganesh

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. XX, NO. XX, XX XXXX 1

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. XX, NO. XX, XX XXXX 1 This is he auhor's version of an aricle ha has been published in his journal. Changes were made o his version by he publisher prior o publicaion. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. XX,

More information

Fill in the following table for the functions shown below.

Fill in the following table for the functions shown below. By: Carl H. Durney and Neil E. Coer Example 1 EX: Fill in he following able for he funcions shown below. he funcion is odd he funcion is even he funcion has shif-flip symmery he funcion has quarer-wave

More information

Who Thinks Who Knows Who? Socio-cognitive Analysis of Networks. Technical Report

Who Thinks Who Knows Who? Socio-cognitive Analysis of  Networks. Technical Report Who Thinks Who Knows Who? Socio-cogniive Analysis of Email Neworks Technical Repor Deparmen of Compuer Science and Engineering Universiy of Minnesoa 4-192 EECS Building 200 Union Sree SE Minneapolis, MN

More information

It is easier to visualize plotting the curves of cos x and e x separately: > plot({cos(x),exp(x)},x = -5*Pi..Pi,y = );

It is easier to visualize plotting the curves of cos x and e x separately: > plot({cos(x),exp(x)},x = -5*Pi..Pi,y = ); Mah 467 Homework Se : some soluions > wih(deools): wih(plos): Warning, he name changecoords has been redefined Problem :..7 Find he fixed poins, deermine heir sabiliy, for x( ) = cos x e x > plo(cos(x)

More information

NEWTON S SECOND LAW OF MOTION

NEWTON S SECOND LAW OF MOTION Course and Secion Dae Names NEWTON S SECOND LAW OF MOTION The acceleraion of an objec is defined as he rae of change of elociy. If he elociy changes by an amoun in a ime, hen he aerage acceleraion during

More information

A Numerical Study on Impact Damage Assessment of PC Box Girder Bridge by Pounding Effect

A Numerical Study on Impact Damage Assessment of PC Box Girder Bridge by Pounding Effect A Numerical Sudy on Impac Damage Assessmen of PC Box Girder Bridge by Pounding Effec H. Tamai, Y. Sonoda, K. Goou and Y.Kajia Kyushu Universiy, Japan Absrac When a large earhquake occurs, displacemen response

More information

An efficient approach to improve throughput for TCP vegas in ad hoc network

An efficient approach to improve throughput for TCP vegas in ad hoc network Inernaional Research Journal of Engineering and Technology (IRJET) e-issn: 395-0056 Volume: 0 Issue: 03 June-05 www.irje.ne p-issn: 395-007 An efficien approach o improve hroughpu for TCP vegas in ad hoc

More information

Visual Indoor Localization with a Floor-Plan Map

Visual Indoor Localization with a Floor-Plan Map Visual Indoor Localizaion wih a Floor-Plan Map Hang Chu Dep. of ECE Cornell Universiy Ihaca, NY 14850 hc772@cornell.edu Absrac In his repor, a indoor localizaion mehod is presened. The mehod akes firsperson

More information

IROS 2015 Workshop on On-line decision-making in multi-robot coordination (DEMUR 15)

IROS 2015 Workshop on On-line decision-making in multi-robot coordination (DEMUR 15) IROS 2015 Workshop on On-line decision-making in muli-robo coordinaion () OPTIMIZATION-BASED COOPERATIVE MULTI-ROBOT TARGET TRACKING WITH REASONING ABOUT OCCLUSIONS KAROL HAUSMAN a,, GREGORY KAHN b, SACHIN

More information

STRING DESCRIPTIONS OF DATA FOR DISPLAY*

STRING DESCRIPTIONS OF DATA FOR DISPLAY* SLAC-PUB-383 January 1968 STRING DESCRIPTIONS OF DATA FOR DISPLAY* J. E. George and W. F. Miller Compuer Science Deparmen and Sanford Linear Acceleraor Cener Sanford Universiy Sanford, California Absrac

More information

A time-space consistency solution for hardware-in-the-loop simulation system

A time-space consistency solution for hardware-in-the-loop simulation system Inernaional Conference on Advanced Elecronic Science and Technology (AEST 206) A ime-space consisency soluion for hardware-in-he-loop simulaion sysem Zexin Jiang a Elecric Power Research Insiue of Guangdong

More information

Evaluation and Improvement of Region-based Motion Segmentation

Evaluation and Improvement of Region-based Motion Segmentation Evaluaion and Improvemen of Region-based Moion Segmenaion Mark Ross Universiy Koblenz-Landau, Insiue of Compuaional Visualisics, Universiässraße 1, 56070 Koblenz, Germany Email: ross@uni-koblenz.de Absrac

More information

Selective Offloading in Mobile Edge Computing for the Green Internet of Things

Selective Offloading in Mobile Edge Computing for the Green Internet of Things EDGE COMPUTING FOR THE INTERNET OF THINGS Selecive Offloading in Mobile Edge Compuing for he Green Inerne of Things Xinchen Lyu, Hui Tian, Li Jiang, Alexey Vinel, Sabia Maharjan, Sein Gjessing, and Yan

More information

Towards a Realistic Model for Failure Propagation in Interdependent Networks

Towards a Realistic Model for Failure Propagation in Interdependent Networks Towards a Realisic Model for Failure Propagaion in Inerdependen Neworks Agosino Suraro, Simone Silvesri, Mauro Coni, Sajal K. Das Deparmen of Mahemaics, Universiy of Padua, email: agosino.suraro@sudeni.unipd.i,

More information