Efficient Data Forwarding in Mobile Social Networks with Diverse Connectivity Characteristics

Size: px
Start display at page:

Download "Efficient Data Forwarding in Mobile Social Networks with Diverse Connectivity Characteristics"

Transcription

1 Efficient Data Forwarding in Mobile Social Network with Divere Connectivity Characteritic Xiaomei Zhang and Guohong Cao Department of Computer Science and Engineering The Pennylvania State Univerity, Univerity Park, PA, Abtract Mobile Social Network (MSN) with divere connectivity characteritic i a combination of opportunitic network and mobile ad hoc network. Since the major difficulty of data forwarding i the opportunitic part, technique deigned for opportunitic network are commonly ued to forward data in MSN. However, thi may not be the bet olution ince they do not conider the ubiquitou exitence of Tranient Connected Component (), where node inide a can reach each other by multi-hop wirele communication. In thi paper, we firt identify the exitence of and analyze their propertie baed on five real trace. Then, we propoe -aware data forwarding trategie which exploit the pecial characteritic of to increae the contact opportunitie and then improve the performance of data forwarding. Tracedriven imulation how that our -aware data forwarding trategie outperform exiting data forwarding trategie in term of data delivery ratio and network overhead. I. INTRODUCTION In Mobile Social Network (MSN), human-carried mobile device opportunitically form wirele peer-to-peer connection with each other in the abence of the network infratructure []. Due to the unpredictable human mobility, it i hard to maintain end-to-end connection. A a reult, carry-and-forward [2][3] i ued, where mobile node phyically carry the data, and forward the data when contacting a node with higher forwarding capability. Although mot reearch aume that MSN are highly pare, a cloe crutiny on mot current MSN trace reveal that the connectivity inide a network i divere, and there are ubiquitou exitence of Tranient Connected Component (). Inide, node have tranient contact with each other and form a connected component. For example, tudent in a claroom have tranient connection with each other, and vehicle on highway form platoon and have tranient connection inide a platoon [4]. An MSN with divere connectivity characteritic i a combination of opportunitic network and mobile ad hoc network (MANET). Inide a, a MANET i formed where node can reach each other by multi-hop wirele communication. Outide of, node contact each other opportunitically through carry-and-forward. Since the Thi work wa upported in part by Network Science CTA under grant W9NF C B A (a) D E Figure. The left figure how a of five node. The right table how their forwarding metric. A line between two node mean that they are within communication ditance. major difficulty of data forwarding i the opportunitic part, technique deigned for opportunitic network are commonly ued to forward data in MSN. However, thi may not be the bet olution ince they do not conider the divere connectivity characteritic of MSN. For example, Figure (a) how a of five node and Figure (b) how their forwarding metric which repreent the capability of forwarding data to other node (e.g., node centrality [5]). Node A ha the data which will be forwarded to the detination through carry-and-forward. Baed on exiting technique, the data hould be forwarded to a contacted node with higher forwarding metric. In thi example, node A ha two poible contact: B and E (contact are repreented by line). Since node B ha lower forwarding metric (2.) than A (3.), B will not get the data. E ha higher forwarding metric (4.5) than A, and thu A forward the data to E. After E receive the data, it contact D, which ha higher forwarding metric (5.8), will get the data. D will not forward the data to it contact B which ha a lower forwarding metric. Although C ha a much higher forwarding metric (7.) and much higher chance of reaching the detination, the data will not be forwarded toc ince it i not the contact of D (i.e., no line between them). However, ince C and A are within the ame, it i better for them to exchange their forwarding metric through multihop wirele communication, and then it will be poible for C to forward the data to the detination. In thi paper, we addre the problem of data forwarding in MSN with divere connectivity characteritic by propoing two -aware data forwarding trategie. Since a (b)

2 i a MANET, it i treated a one component and data carrier in thi are elected for opportunitic data forwarding. More pecifically, the paper ha two contribution. ) We identify the exitence of and analyze their propertie baed on five trace. We find that there are ignificant number of in MSN, and the ditribution of ize and node degree follow exponential ditribution. By treating multi-hop wirele communication inide a indirect contact, through theoretical analye, we how that the contact opportunitie can be ignificantly increaed in all trace. 2) We firt propoe a -aware data forwarding trategy to exploit to improve the performance of data forwarding in MSN. In our olution, node inide a exchange their forwarding metric through multi-hop wirele communication, and the node with the highet forwarding metric i elected to get a replicated data copy. Although the -aware data forwarding trategy can increae the data delivery ratio, it increae the data copie in the network. To addre thi problem, we enhance the -aware data forwarding by electing an optimal et of node in the to avoid overlap in their contact and maximize the data forwarding opportunity with a mall number of node. Trace-driven imulation how that our aware data forwarding trategie outperform exiting data forwarding trategie with le network overhead. The ret of the paper i organized a follow. In Section II, we identify the propertie of baed on five trace. Section III preent our -aware data forwarding trategie. In Section IV, we evaluate the performance of the aware data forwarding trategie. Section V review related work, and Section VI conclude the paper. II. TRACE-BASED ANALYSIS In thi ection, we identify the exitence of and analyze their propertie baed on five realitic MSN trace. A. Trace We tudy the propertie of baed on five trace: Social Evolution [6], Friend & Family [7], Reality Mining [8], Infocom [9] and UCSD []. Thee trace record contact among uer carrying different kind of mobile device. The firt three trace are collected by the MIT Reality group baed on Bluetooth on martphone. Among them, Social Evolution record the contact among tudent in an undergraduate dormitory. Friend & Family record the contact among member of a young-family reidential community. Reality Mining track the contact between individual in reearch lab. The trace of Infocom i collected in a conference environment by recording the contact between conference attendant carrying imote. In thee four trace, mobile device periodically detect their peer via Bluetooth interface. A contact i recorded when two mobile device move into the detection range of each other. The UCSD trace i collected at a campu cale, where the device are WiFi enabled PDA. Thee device earch for nearby WiFi Acce Point (AP), and a contact i detected when two device detect the ame AP. The detail of thee five trace are hown in Table. B. Propertie of the Contact Graph Baed on the collected trace, we can draw contact graph which conit of mobile device (node) and their contact (edge), with which we tudy the tranient contact tatu between node. A contact graph can be drawn at each time point, i.e., there i an edge between two node if they are contacting each other at that time point. Here, a contact graph i drawn every minute in the trace. The extracted contact graph have ome intereting propertie, and one of them i related to the ditribution of the node degree. The Complementary Cumulative Ditribution Function (CCDF) of the node degree P(K > k), which repreent the probability that a node ha more than k contact with other node, follow exponential ditribution for k : P(K > k) = e k k k where k i the exponential contant. By recognizing that e k k = when k =, we have the following: P(K > k) = e k k k () The plot of CCDF P(K > k) i hown in Figure 2. The CCDF curve i drawn in a emi-log plot (log cale on y axi), where the exponential ditribution i a traight line. The Leat Square approach [] i applied to fit the degree ditribution with the exponential ditribution. A we can ee in Figure 2, the degree ditribution can be well approximated by exponential ditribution in mot trace. Since the contact graph atify exponential degree ditribution, mot node have low degree. Thi i becaue the contact graph i partitioned into connected component, where node are only connected to ome node in the ame connected component, o that mot node have low degree. For example, in the trace of Friend & Family, people in the reidence community form mall connected component when they tay with their familie. In the trace of Reality Mining, tudent form connected component when they are in the ame laboratory. Since the connected component only appear temporarily, they are referred to a Tranient Connected Component (). C. Propertie of We tudy the propertie of in thi ubection. The firt property i related to Giant Connected Component (GCC), which i the larget connected component of the

3 Table I TRACE SUMMARY Trace Social Evolution Friend & Family Reality Mining Infocom UCSD Device Cell Phone Cell Phone Cell Phone imote WiFi Network type Bluetooth Bluetooth Bluetooth Bluetooth WiFi Number of device Number of contact 2,84 47,774 78,98 26,84 94,68 Start Date Duration(day) Granularity(ec) P(K>k) 2 3 P(K>k) 2 3 P(K>k) 2 3 P(K>k) 2 3 P(K>k) Degree ditribution k (a) Social Evolution (k =.7) Figure 2. 4 Degree ditribution k (b) Friend & Family (k =.4) 4 Degree ditribution k (c) Reality Mining (k =.55) 4 Degree ditribution k (d) Infocom (k = 4.3) The ditribution of node degree can be approximated by exponential ditribution. k i the exponential contant. 4 Degree ditribution k (e) UCSD (k = 2.36) contact graph. The GCC i commonly ued to repreent the overall connectivity of the network [2], and the property of the GCC i cloely related to the degree ditribution [3][4][5]. Baed on [5], in a random graph with exponential degree ditribution, if the exponential contant k i larger than, there exit a GCC with ize that cale linearly with the ize of graph. With the increae of k, the ize of the GCC alo increae. Since k in all trace i larger than a hown in Figure 2, we can expect that there are large GCC inide thee contact graph. Proportion of node in larget evolu family mining infocom ucd Figure 3 ue boxplot to how the ize of the larget a a proportion of the network ize, where the larget i detected every minute. Here, the network ize i the number of node that are in contact with ome node in the trace. Other node may turn off their device or contact node that are not included in the trace, and thee node are not included in our analyi. The reult in Figure 3 are conitent with our concluion that a larger exponential contant k lead to a larger GCC. For example, the Family & Friend trace ha the mallet GCC, becaue k i only lightly larger than. For the trace of Infocom, k i larger than 4 and thu mot node belong to the GCC. Even though the ize of GCC implie the overall connectivity of the network, it i not enough to characterize the complete tructure. Therefore, we are alo intereted in the ditribution of the ize. Figure 4 plot the ditribution of the ize. Similar to the degree ditribution, the ize ditribution alo follow exponential ditribution. The CCDF of the ize P(S > ) i exponential for Figure 3. The boxplot of the larget ize a a proportion of the network ize. The middle line inide the box repreent the median. The lower and upper edge of the box repreent the 25th and 75th percentile, repectively. 2: P(S > ) = { e 2 where i the exponential contant. In the Infocom trace, it only follow exponential ditribution when the ize i mall, i.e., in the range of [2,]. Thi i due to the fact that the network alway conit of a GCC which include mot of the node in the trace, and then the remaining node only form mall. D. Increaing Contact with Inide a, node can communicate with each other through multi-hop wirele communication, which i much fater than carry-and-forward. Therefore, a long a two (2)

4 P(S>) 2 3 P(S>) 2 3 P(S>) 2 3 P(S>) 2 P(S>) ize ditribution (a) Social Evolution ( = 5.25) Figure 4. 4 ize ditribution (b) Friend & Family ( =.52) 4 ize ditribution (c) Reality Mining ( = 3.3) 3 ize ditribution (d) Infocom ( = 2.86) 4 ize ditribution (e) UCSD ( = 4.9) The ditribution of ize can be well approximated by exponential ditribution for mot of the trace. i the exponential contant. node are within a, they have -contact, which can be direct contact or indirect contact. Direct contact are contact between two node within one-hop communication ditance, and indirect contact are contact between node within the ame but multi-hop away. Next, we analyze whether and how contact opportunitie are increaed by conidering -contact. We find that the increae of contact opportunitie i related to the ditribution of node degree and ize. Specifically, we have the following theorem: Theorem. For a contact graph, the contact opportunitie can be increaed by conidering -contact, if the following two condition are atified: ) The ditribution of node degree and the ditribution of ize both follow exponential ditribution with exponential contant k and repectively. (Equation () and (2)) 2) k < ˆk, where ˆk i a function of : ˆk = log 2 (e +( e ) 3 ) 3e +( e ) 3 (3) The proof of Theorem can be found in Appendix A. In the proof, we alo compute the ratio of -contact to direct contact, which can be determined by two exponential contant k and : m t = 2( e k ) e +( e ) 3 e +( e ) 3 (4) where m t i the number of -contact and i the number of direct contact. With Equation (4), we can etimate the increaed contact opportunitie a long a the node degree and ize follow exponential ditribution. Table II lit k, and the value of ˆk in term of in four trace. (Since ize ditribution for Infocom trace doe not follow exponential ditribution, we do not include it in Table II.) We alo did experiment to verify if the etimated value mt m in Equation (4) (i.e., Et. t ) i conitent with the actual value (i.e., Act. mt ) and the reult are hown in Table II. A can be een, k i maller than ˆk in all trace, which indicate that the contact opportunitie are increaed in all thee trace. We alo find that the error of the etimated mt compared to the actual value i very mall, which prove the accuracy of our etimation. Thu, with the ditribution of node degree and ize, we can accurately etimate the increae of contact opportunitie. We alo did experiment on the Infocom trace and find the m t i 8.86, which indicate that the contact opportunitie are alo ignificantly increaed in the Infocom trace. Table II -CONTACTS & DIRECT CONTACTS Trace k ˆk Et. m t Act. Social Evolution Friend & Family Reality Mining UCSD E. Duration of -contact m t Becaue are formed when node have direct contact with each other, the duration of the -contact i maller than the duration of direct contact. The comparion between the duration of -contact and direct contact in five trace are hown in Figure 5. A hown in the figure, even though -contact have maller duration than direct contact, the median duration for -contact are till everal minute. Therefore, by conidering both direct and indirect contact inide, contact opportunitie are increaed and the contact duration are till pretty long. Thi property can be exploited to deign more efficient data forwarding trategie, a hown in the next ection. III. -AWARE DATA FORWARDING STRATEGIES Data forwarding in MSN i difficult due to the opportunitic nature of the network. Being aware of the exitence of, we propoe better data forwarding trategie by utilizing the contact opportunitie in. Inide a, node can reach each other by multi-hop wirele communication, which will ignificantly increae the contact opportunitie and increae the chance of forwarding data to the detination. In thi ection, we firt preent our

5 CDF.6.4 CDF.6.4 CDF.6.4 CDF.6.4 CDF Direct Contact Contact min minhour day week Contact Duration (a) Social Evolution.2 Direct Contact Contact min minhour day week Contact Duration (b) Friend & Family Figure 5..2 Direct Contact Contact min minhour day week Contact Duration (c) Reality Mining The duration of direct contact and -contact..2 Direct Contact Contact min minhour day week Contact Duration (d) Infocom.2 Direct Contact Contact min minhour day week Contact Duration (e) UCSD -aware data forwarding trategy and then improve it performance with an enhanced verion. A. -Aware Data Forwarding Strategy The objective of the -aware data forwarding trategy i to utilize to improve the performance of data forwarding in MSN. ) Identifying the : To utilize, the firt tep i to identify the. A node can detect the node in the current by broadcating inide the, and each node receiving the broadcat end an acknowledgement. In order to know what data item are being forwarded in the current, the node receiving the broadcat meage replie with an acknowledgement that carrie the information about the data item in it buffer. By collecting acknowledgement from other node in the, the original ender can identify the node and the forwarded data in it current. 2) Forwarding Strategy: For each data item created in the network, we intend to forward it from the ource to the detination within the time contraint T. In the proce of forwarding, data can be replicated and forwarded to other node in accordance with pecific trategie. The forwarding i ucceful a long a one data copy of thi data item arrive at the detination. Strategie deigned for opportunitic network are commonly ued to forward data in MSN. Thee data forwarding trategie are normally baed on ocial-aware forwarding metric uch a centrality [3][6][5], which quantify mobile node capability of contacting other in the network. When a node carrying data contact another node, the data packet i forwarded baed on Compare-and-Forward [3][2]; i.e., the data carrier forward the data if and only if the contacted node ha a higher centrality and doe not have thi data. The original data carrier alo keep a copy after forwarding the data. In our -aware data forwarding trategy, a imilar method i ued. However, the data forwarding deciion are not limited to thee two contacted node, but among all node in the. A can be formed by merging two exiting or by adding new node to exiting. For example, node A and B are originally from two different before they contact. After A contact B, the two are merged to a new. Algorithm -aware Data Forwarding Strategy when two Node A,B Contact : M A the et of node in A original 2: M B the et of node in B original 3: if M A = M B then 4: Do NOTHING /*A,B are already in the ame */ 5: ele /*Forwarding deciion inide the will be made centrally at a command node C, which i choen from A,B.*/ 6: if M A M B then 7: C B 8: ele 9: C A : end if /*C will identify the node inide the new and the data item carried by them, and make the forwarding deciion.*/ : M M A MB 2: D the et of unique data item in the new 3: for each data ite D do 4: if M include d detination then 5: d i forwarded to d detination 6: Go to next data item 7: end if 8: H d node with the highet centrality 9: if H d ha the data then 2: Do NOTHING and go to the next data item 2: ele 22: d i forwarded to H d 23: end if 24: end for 25: end if When two node contact, they firt check if they are already in the ame before the contact. They detect their original by uing broadcat meage decribed in Section III-A. A long a one of them receive acknowledgement from the other one, they are already within the ame. If the detected are different for the two node, thee two are merged when they contact. After a new i formed, a imple compare-andforward trategy i ued to forward data to node with higher centrality. However, thi trategy create many data copie. To reduce redundancy, data i only forwarded to the node with the highet centrality, and then at mot one additional data copy i created in a.

6 B (a) A C A B C A B C D E F G Figure 6. The left figure how a of three node. The right table how their contact probabilitie with all other node in the network. The network ha 7 node. 3) The Algorithm: The whole proce of the -aware data forwarding trategy i outlined in Algorithm. When two node contact, they firt check if they belong to the ame (Line 3 5). If o, the data packet ha already been forwarded in the. If not, a new i formed, and the data item will be forwarded inide the new. The forwarding deciion inide thi i made centrally at a node, denoted a command node, which i choen from the two node in contact. The node that ha more node in it original will be the command node (Line 6 ). Then, the command node check all the node and their carried data item in the new and make the forwarding deciion (Line 24). Specifically, for each data item that exit in the, if it detination i inide thi, it i directly forwarded to the detination (Line 4 7). Otherwie, the command node check if the node with the highet centrality ha the data. If the node ha the data, nothing need to be done. Otherwie, one data copy i created and forwarded to the node with the highet centrality (Line 8 23). B. -aware Data Forwarding Strategy ) Motivation: In the -aware data forwarding trategy, the node with the highet centrality in the get one data copy and the original data carrier alo keep their data copie. However, thi may not be the bet option in many cae. For example, Figure 6 (a) how a of three node and Figure 6 (b) lit each node contact probability with other in the network. If the centrality metric i baed on the Cumulative Contacting Probability (CCP) [5], the CCP of node A i = 3.8, the CCP of node B i = 3.3, and the CCP of node C i = 3.3. If C originally carrie the data, A will receive one data copy ince it ha the highet centrality. However, node A and C have imilar contact probabilitie to other node B, D, E, F and G; i.e., they both have high contact probabilitie with B, D and E, and low contact probabilitie with F and G. Thu, keeping data copie at A and C may not help too much ince their contact capabilitie to other node have a large overlap. (b) To deal with thi problem, it i better to chooe A and B a data carrier, becaue B ha high contact probabilitie to F and G, which i complement to A. Even though B and C have the ame CCP centrality, uing A and B a data carrier i better than uing A and C. Thu, we propoe an enhanced -aware data forwarding trategy, where data carrier are elected to maximize the data forwarding opportunity. Different from the previou -aware data forwarding trategy, which elect the highet centrality node a the data carrier, we elect a et of node a data carrier which can maximize the data forwarding opportunity. 2) Set Centrality: We firt define the concept of et centrality to quantify the data forwarding capability of a et of node. Given that a data item i created at time, and expire at time T, the et centrality of a node et S at time t i defined a follow: Definition. The et centrality of a node et S at time t < T i defined a the ummation of their overall probability to contact each of the remaining node in N \S before time T. C S (t) = ( p ji (T t))) (5) i N\S( j S where N i the et of node in the network, and p ji (T t) i the probability that node j will contact node i within time T t. Aume ymmetric contact between node i and j, and then we have p ij (T t) = p ji (T t). Since the inter-contact time between node i and node j ha been experimentally validated in [5] to follow an exponential ditribution with rate parameter λ ij, the probability that the two node will contact before T can be calculated a: p ij (T t) = p ji (T t) = e λij(t t) (6) 3) Selecting the Optimal Set of Data Carrier: We aume that there are k data copie carried by node in a (denoted a M), where k < M. Our objective i to chooe an optimal node et S of ize k with the highet et centrality, where S M. Node in the optimal node et S will be the new data carrier for the k data copie. The detection of the optimal node et S can be formalized a an optimization problem: max ( x i )( ( x j p ji (T t))) (7) i N j N.t. x i {,}, i M (8) x i =, i N \M (9) x i = k () i M where x i {,} indicate whether the node i i elected to the optimal node et S. Formula (7) maximize the et centrality of the elected node. Since S i elected

7 Algorithm 2 -aware Data Forwarding Strategy when two Node A,B Contact : M A the et of node in A original 2: M B the et of node in B original 3: if M A = M B then 4: Do NOTHING /*A,B are already in the ame */ 5: ele /* Forwarding deciion inide the will be made centrally at a command node C, which i choen from A,B.*/ 6: if M A M B then 7: C B 8: ele 9: C A : end if /*C will identify the node inide the new and the data item carried by them, and make the forwarding deciion.*/ : M M A MB 2: D the et of unique data item in the new 3: for each data ite D do 4: if M include d detination then 5: d i forwarded to d detination 6: Go to next data item 7: end if 8: k d number of copie of d in M 9: H d node with the highet centrality 2: if H d doe not have d then 2: k d k d + /*Add one extra data copy*/ 22: end if 23: S the optimal et of k d node /*Decide S a dicued in Section III-B3.*/ /*Node in S will be new carrie of data ite.*/ 24: Data are forwarded from old carrier to node in S 25: end for 26: end if from M, x i {,} for node inide M, and x i = for node outide of M a depicted in (8) and (9) repectively. Formula () indicate that the number of elected node i k. The optimization problem can be eaily olved uing dynamic programming imilar to the knapack problem [7]. With dynamic programming, the optimization problem can be olved with time complexity O( M ). 4) Forwarding Strategy: The enhanced -aware data forwarding trategy i preented in Algorithm 2. Baed on the original -aware data forwarding trategy, the enhanced -aware data forwarding trategy add an extra tep that reditribute data copie inide a (Line 8 24). Similar to the original trategy, one extra data copy i created if the node with the highet centrality doe not have the data (Line 8 22). Then, all data copie are reditributed in the, to make ure they are carried by a et of node with the optimal forwarding capability. Specifically, the command node firt compute an optimal node et with the highet et centrality uing the method in Section III-B3 (Line 23). Afterward, the data copie are forwarded from the original data carrie to the node in the optimal node et (Line 24). IV. PERFORMANCE EVALUATIONS In thi ection, we evaluate the performance of the aware data forwarding trategie by comparing them with exiting data forwarding trategie. A. Strategie in Comparion In -aware data forwarding trategie ( and Enhanced ), the centrality metric i baed on the Cumulative Contacting Probability (CCP) [5]. We compare it with the following four forwarding trategie: Compare-and-Forward: When a node carrying data contact a node without data, the data carrier forward the data if the contacted node ha a higher forwarding metric (CCP). Thi trategy ha been utilized in [3][2][8]. [9]: Upon contact, the data carrier forward data to the contacted node if it doe not have the data. Thi method ha the bet data delivery ratio but the highet network overhead, which i ued a the upper bound. : The data ource doe not forward data to any other node until it contact with the detination. Thi trategy ha the wort delivery ratio but the lowet network overhead, which i ued a the lower bound. R3 [2]: R3 elect a fixed number of forwarding path which together achieve the minimum expected delay. For each path, one data copy i created and then forwarded along the path. B. Simulation Setup We evaluate all the data forwarding trategie baed on the five trace lited in Table I. For each trace, the firt half i ued for warm up, baed on which we determine the centrality metric, and the econd half i ued to evaluate the performance. For each data item, the ource and detination are picked randomly, and the data generation time i randomly choen in the daytime, ince node activity remain low at night and high at daytime. The experiment i repeated time for tatitical convergence. C. Simulation Reult Figure 7 and Figure 8 compare -aware data forwarding trategie ( and ) and other exiting trategie. Figure 7 how data delivery ratio under different time contraint, where delivery ratio i the proportion of data item uccefully delivered to the detination before data expire. Figure 8 how the network overhead under different time contraint, where the overhead i meaured by the average number of data copie created in the network for each data item. Generally peaking, -aware data forwarding trategie have the bet performance by achieving comparable delivery ratio with with much lower network overhead. In the following, we dicu the

8 Delivery Ratio (a) Social Evolution Delivery Ratio (b) Friend & Family Figure 7. Delivery Ratio (c) Reality Mining Delivery Ratio (d) Infocom Comparion baed on data delivery ratio under different time contraint. Delivery Ratio (e) UCSD Overhead 5 5 Overhead 5 5 Overhead Overhead Overhead (a) Social Evolution Figure (b) Friend & Family (c) Reality Mining (d) Infocom Comparion baed on the number of data copie (overhead) created under different time contraint (e) UCSD imulation reult in detail by firt comparing our aware data forwarding trategie with Compare-and-Forward and R3, and then comparing thee two -aware data forwarding trategie. ) Comparion with Compare-and-Forward: A hown in Figure 7 and Figure 8, both and have better performance than Compare-and-Forward, with higher data delivery ratio and lower network overhead. Specifically, the -aware data forwarding trategie achieve % 4% higher delivery ratio than Compare-and-Forward in all five trace. Thi i becaue by utilizing the contact opportunitie inide, node have higher probabilitie to forward data to the detination. Moreover, the aware data forwarding trategie conume 5% 5% le network overhead than Compare-and-Forward. The decreae in network overhead i becaue there i at mot one data copy created when a new i formed. However, in Compare-and-Forward, data copie can be created upon every contact. Thee reult demontrate the effectivene of -aware data forwarding trategie when compared with trategie deigned for opportunitic network. 2) Comparion with R3: To compare with R3 [2], we et the number of data copie (path) to be 5 (R3-5copie) in R3. A hown in Figure 7, the data delivery ratio for R3 with 5 copie i about 5% le than that of and. We alo tet R3 with copie and 2 copie, and find that the delivery ratio doe not increae much a the number of data copie increae. Thi obervation i conitent with the reult in [2], which alo found that the performance doe not increae much a the number of data copie i larger. The reaon for R3 low delivery ratio i that R3 i baed on ource routing, and ource routing i extremely time-conuming when utilized in network with opportunitic feature. MSN with divere connectivity characteritic have the opportunitic feature, becaue node contact opportunitically outide of. 3) Comparion between the -aware data forwarding trategie: From Figure 7 and Figure 8, we can alo ee that conume le overhead than but achieve imilar delivery ratio. Thi i becaue, in the enhanced trategy, data copie can be forwarded from the original data carrier to a et of node with the highet et centrality; i.e., more effective node are elected a data carrier. By chooing a mall number of effective node to carry data, the enhanced trategy require le data carrier than the original trategy. Therefore, the number of data copie can be decreaed with. V. RELATED WORK Data forwarding algorithm deigned for opportunitic network are commonly ued to forward data in MSN, and mot of them are baed on [9], where data i flooded upon contact with other node. Later olution attempt to reduce the number of data copie created by, and thee trategie are known a controlled flooding [2]. For example, Compare-and-Forward i commonly ued to control the data copie created, and the data carrier only forward data to another node with higher forwarding metric. The forwarding metric meaure node capability of forwarding data to the detination. In ome reearch, the forwarding metric are determined baed on node contact probability with the detination, uch a PROPHET [2] and MaxProp [22]. By further aggregating the network to ocial graph [23], ocial propertie of mobile node are analyzed.

9 Baed on thi, node centrality [6][8][24] or community baed olution[25][26][27][28] are ued a forwarding metric. However, thee trategie are deigned for opportunitic network, and they are not the bet olution for MSN with divere connectivity characteritic, ince they neglect the multi-hop communication opportunitie inide. Phe-Neau et al. conidered the multi-hop communication opportunitie around a node vicinity in [29]. However, in their approach, multi-hop communication opportunitie around a node are only utilized when the detination of the data i within the node vicinity, which i baically a WAIT trategy and then it doe not contain mechanim to make the data reach more node and get cloer to the detination. The work by Tie et al. [2] conidered data forwarding in network with divere connectivity characteritic; however, their olution i different from our and they do not conider the effect of. They identified packet replication to be the key difference between protocol deigned for wellconnected network and parely-connected network, and deigned a routing protocol called R3, which determine the number of data copie to be created baed on the predicted delay along network path. R3 i baed on ource routing; i.e., data copie are forwarded along the pre-determined forwarding path. However, protocol baed on ource routing are not uitable for network with opportunitic feature, becaue it i extremely time-conuming to forward data along the pre-determined path. Moreover, R3 doe not conider the effect of on data forwarding, which i the key contribution of our work. Other exiting algorithm try to modify well-known MANET protocol to make them more adaptive to network with divere connectivity characteritic. For example, Raffelberger et al. [3] integrated tore-and-forward to MANET protocol. In MANET protocol, a data item i dropped when the routing table doe not contain an entry for the detination. With tore-and-forward, data i buffered until a route to the detination can be found uing MANET protocol. However, their olution lack a mechanim to chooe effective data carrier to deliver data to detination. There exit ome work on analyzing. For example, [3] demontrated the ize of the giant connected component change over time. [3][4][5] proved that the property of connected component i cloely related with the ditribution of node degree. However, they did not examine the detailed tructure of uing real trace, and did not conider how to ue them to increae the contact opportunitie and improve the performance of data forwarding, which i the focu of our work. VI. CONCLUSIONS In thi paper, we deigned efficient data forwarding - trategie for MSN with divere connectivity characteritic, by exploiting the exitence of. We firt identified the exitence of and analyzed their propertie baed on five trace. By treating multi-hop wirele communication inide a indirect contact, through theoretical analye, we howed that the contact opportunitie can be ignificantly increaed in all trace. Baed on thi obervation, we deigned a -aware data forwarding trategy to improve the performance of data forwarding in MSN. Then, we enhanced the -aware data forwarding by electing an optimal et of node in the to avoid overlap in their contact and maximize the data forwarding opportunity with a mall number of node. Trace-driven imulation howed that our -aware data forwarding trategie outperform exiting data forwarding trategie with le network overhead. REFERENCES [] S. Ioannidi, A. Chaintreau, and L. Maoulié, Optimal and calable ditribution of content update over a mobile ocial network, in IEEE INFOCOM, 29. [2] A. Lindgren, A. Doria, and O. Schelén, Probabilitic routing in intermittently connected network, ACM SIGMOBILE CCR, vol. 7, no. 3, pp. 9 2, 23. [3] E. Daly and M. Haahr, Social network analyi for routing in diconnected delay-tolerant manet, in ACM MobiHoc, 27. [4] Y. Zhang and G. Cao, V-pada: Vehicle-platoon-aware data acce in vanet, IEEE Tranaction on Vehicular Technology, vol. 6, no. 5, pp , 2. [5] W. Gao, Q. Li, B. Zhao, and G. Cao, Multicating in delay tolerant network: a ocial network perpective, in ACM MobiHoc, 29. [6] A. Madan, M. Cebrian, S. Moturu, K. Farrahi, and A. Pentland, Sening the health tate of a community, Pervaive Computing, vol., no. 4, pp , 22. [7] N. Aharony, W. Pan, C. Ip, I. Khayal, and A. Pentland, Social fmri: Invetigating and haping ocial mechanim in the real world, Pervaive and Mobile Computing, vol. 7, no. 6, pp , 2. [8] N. Eagle and A. Pentland, Reality mining: ening complex ocial ytem, Peronal and Ubiquitou Computing, vol., no. 4, pp , 26. [9] A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Ga, and J. Scott, Impact of human mobility on opportunitic forwarding algorithm, IEEE Tranaction on Mobile Computing, vol. 6, no. 6, pp , 27. [] M. McNett and G. Voelker, Acce and mobility of wirele pda uer, ACM SIGMOBILE CCR, vol. 9, no. 2, pp. 4 55, 25. [] Å. Björck, Numerical method for leat quare problem. Siam, 996. [2] T. Spyropoulo, K. Pouni, and C. Raghavendra, Spray and wait: an efficient routing cheme for intermittently connected mobile network, in ACM SIGCOMM workhop on Delay-tolerant networking, 25. [3] M. Molloy and B. Reed, The ize of the giant component of a random graph with a given degree equence, Combinatoric probability and computing, vol. 7, no. 3, pp , 998. [4] W. Aiello, F. Chung, and L. Lu, A random graph model for power law graph, Experimental Mathematic, vol., no., pp , 2. [5] M. E. J. Newman, 2 random graph a model of network, Handbook of graph and network, p. 35, 23. [6] P. Hui, J. Crowcroft, and E. Yoneki, Bubble rap: Social-baed forwarding in delay-tolerant network, IEEE Tranaction on Mobile Computing, vol., no., pp , 2. [7] S. Martello and P. Toth, Knapack problem: algorithm and computer implementation. John Wiley & Son, Inc., 99.

10 [8] W. Gao and G. Cao, On exploiting tranient contact pattern for data forwarding in delay tolerant network, in IEEE ICNP, 2. [9] A. Vahdat, D. Becker et al., routing for partially connected ad hoc network, Technical Report CS-26, Duke Univerity, Tech. Rep., 2. [2] X. Tie, A. Venkataramani, and A. Balaubramanian, R3: robut replication routing in wirele network with divere connectivity characteritic, in ACM Mobicom, 2. [2] K. A. Harra, K. C. Almeroth, and E. M. Belding-Royer, Delay tolerant mobile network (dtmn): Controlled flooding in pare mobile network, in NETWORKING. Springer, 25, pp [22] J. Burge, B. Gallagher, D. Jenen, and B. N. Levine, Maxprop: Routing for vehicle-baed diruption-tolerant network. in IEEE INFOCOM, 26. [23] T. Homann, T. Spyropoulo, and F. Legendre, Know thy neighbor: Toward optimal mapping of contact to ocial graph for dtn routing, in IEEE INFOCOM, 2. [24] W. Gao and G. Cao, Uer-centric data diemination in diruption tolerant network, in IEEE INFOCOM, 2. [25] P. Hui and J. Crowcroft, How mall label create big improvement, in IEEE PerCom Workhop, 27. [26] N. Nguyen, T. Dinh, S. Tokala, and M. Thai, Overlapping communitie in dynamic network: their detection and mobile application, in ACM MobiCom, 2. [27] Z. Lu, Y. Wen, and G. Cao, Community detection in weighted network: Algorithm and application, in IEEE PerCom, 23. [28] X. Zhang and G. Cao, Tranient community detection and it application to data forwarding in delay tolerant network, in IEEE ICNP, 23. [29] T. Phe-Neau, M. D. De Amorim, V. Conan et al., The trength of vicinity annexation in opportunitic networking, in Fifth International Workhop on Network Science for Communication Network (NetSciCom), 23. [3] C. Raffelberger and H. Hellwagner, A hybrid manet-dtn routing cheme for emergency repone cenario, in IEEE PerCom Workhop, 23. [3] A. Pietilänen and C. Diot, Diemination in opportunitic ocial network: the role of temporal communitie, in ACM MobiHoc, 22. APPENDIX A. PROOF OF THEOREM Proof: Baed on the condition that the ditribution of node degree and ize follow exponential ditribution, we compute the number of direct contact and contact. The number of direct contact, denoted a, can be determined by the network ize N and the ditribution of node degree with exponential contant k. Let p(k) denote the probability ma function (PMF) of degree K. p(k) can be computed from the CCDF P(K > k) a p(k) = P(K > k ) P(K > k) = e k k e k k = e k k ( e k ). for k. Then, can be computed a half of the number of total degree: = N (N p(k) k) = 2 2( e k ). () k= We next compute the number of -contact, m t, with the network ize N and the ditribution of ize which ha exponential contant. The PMF p() of ize S can be calculated from CCDF P(S > ) a p() = P(K > ) P(K > ) { e = ( e ) 3 e 2 = 2. We aume the total number of inide the network i N. With the ditribution of ize p(), the number of with ize i N p(). The number of -contact inide a with ize i ( ) 2 = ( ). The total number of -contact 2 inide the network i: m t = (N p() ( ) ) 2 =2 = N E(S2 ) E(S) 2 (2) The value of N can be determined by the network ize N. With the ditribution of ize p(), the number of with ize i N p(). Since a node belong to one, the ummation of all ize i the network ize N. Thu, we have N = ( N p()) = N E(S). =2 Therefore, N = N E(S). With E(S) = 2( e 2 )+ = =3 + e e E(S 2 ) = 4( e 2 )+ = Equation (2) become m t = = N +e =3 ( e ( e, ( e ) e )) ( 2 e ( e, )) N E(S) E(S2 ) E(S) = N E(S2 ) E(S) 2 2E(S) e +( e ) 3 (3) e +( e ) 3. The ratio of -contact to direct contact i m t = 2( e k ) e +( e ) 3 e +( e ) 3. (4) which i determined only by the two exponential contant k and, independent of the network ize N. With mt >, we have k < log 2 (e +( e ) 3 ) 3e +( e ) 3 (5) If ˆk = /log 2 (e +( e ) 3 ), a long a k < ˆk, the 3e +( e ) 3 number of -contact i more than the direct contact, which increae the contact opportunitie.

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

A Practical Model for Minimizing Waiting Time in a Transit Network

A Practical Model for Minimizing Waiting Time in a Transit Network A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,

More information

How to Select Measurement Points in Access Point Localization

How to Select Measurement Points in Access Point Localization Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de

More information

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK

ES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.

More information

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial

More information

UC Berkeley International Conference on GIScience Short Paper Proceedings

UC Berkeley International Conference on GIScience Short Paper Proceedings UC Berkeley International Conference on GIScience Short Paper Proceeding Title A novel method for probabilitic coverage etimation of enor network baed on 3D vector repreentation in complex urban environment

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

Service and Network Management Interworking in Future Wireless Systems

Service and Network Management Interworking in Future Wireless Systems Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering

More information

Comparison of Methods for Horizon Line Detection in Sea Images

Comparison of Methods for Horizon Line Detection in Sea Images Comparion of Method for Horizon Line Detection in Sea Image Tzvika Libe Evgeny Gerhikov and Samuel Koolapov Department of Electrical Engineering Braude Academic College of Engineering Karmiel 2982 Irael

More information

Power Aware Location Aided Routing in Mobile Ad-hoc Networks

Power Aware Location Aided Routing in Mobile Ad-hoc Networks International Journal of Scientific and Reearch Publication, Volume, Iue 1, December 01 1 Power Aware Location Aided Routing in Mobile Ad-hoc Network Anamika Computer Science, Inderprataha Engineering

More information

Chapter 13 Non Sampling Errors

Chapter 13 Non Sampling Errors Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption

More information

Separation of Routing and Scheduling in Backpressure- Based Wireless Networks

Separation of Routing and Scheduling in Backpressure- Based Wireless Networks Separation of Routing and Scheduling in - Baed Wirele Network The MIT Faculty ha made thi article openly available. Pleae hare how thi acce benefit you. Your tory matter. Citation A Publihed Publiher Seferoglu,

More information

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

/06/$ IEEE 364

/06/$ IEEE 364 006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;

More information

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

Focused Video Estimation from Defocused Video Sequences

Focused Video Estimation from Defocused Video Sequences Focued Video Etimation from Defocued Video Sequence Junlan Yang a, Dan Schonfeld a and Magdi Mohamed b a Multimedia Communication Lab, ECE Dept., Univerity of Illinoi, Chicago, IL b Phyical Realization

More information

A Multi-objective Genetic Algorithm for Reliability Optimization Problem

A Multi-objective Genetic Algorithm for Reliability Optimization Problem International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR

More information

Minimum Energy Reliable Paths Using Unreliable Wireless Links

Minimum Energy Reliable Paths Using Unreliable Wireless Links Minimum Energy Reliable Path Uing Unreliable Wirele Link Qunfeng Dong Department of Computer Science Univerity of Wiconin-Madion Madion, Wiconin 53706 qunfeng@c.wic.edu Micah Adler Department of Computer

More information

On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks

On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks Wei Gao and Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University, University

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

Texture-Constrained Active Shape Models

Texture-Constrained Active Shape Models 107 Texture-Contrained Active Shape Model Shuicheng Yan, Ce Liu Stan Z. Li Hongjiang Zhang Heung-Yeung Shum Qianheng Cheng Microoft Reearch Aia, Beijing Sigma Center, Beijing 100080, China Dept. of Info.

More information

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput Modeling the Effect of Mobile Handoff on TCP and TFRC Throughput Antonio Argyriou and Vijay Madietti School of Electrical and Computer Engineering Georgia Intitute of Technology Atlanta, Georgia 3332 25,

More information

Modeling and Analysis of Slow CW Decrease for IEEE WLAN

Modeling and Analysis of Slow CW Decrease for IEEE WLAN Modeling and Analyi of Slow CW Decreae for IEEE 82. WLAN Qiang Ni, Imad Aad 2, Chadi Barakat, and Thierry Turletti Planete Group 2 Planete Group INRIA Sophia Antipoli INRIA Rhône-Alpe Sophia Antipoli,

More information

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing

A Fast Association Rule Algorithm Based On Bitmap and Granular Computing A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity

More information

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT

More information

Diverse: Application-Layer Service Differentiation in Peer-to-Peer Communications

Diverse: Application-Layer Service Differentiation in Peer-to-Peer Communications Divere: Application-Layer Service Differentiation in Peer-to-Peer Communication Chuan Wu, Student Member, IEEE, Baochun Li, Senior Member, IEEE Department of Electrical and Computer Engineering Univerity

More information

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks Nearly Contant Approximation for Data Aggregation Scheduling in Wirele Senor Network Scott C.-H. Huang, Peng-Jun Wan, Chinh T. Vu, Yinghu Li and France Yao Computer Science Department, City Univerity of

More information

Planning of scooping position and approach path for loading operation by wheel loader

Planning of scooping position and approach path for loading operation by wheel loader 22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader

More information

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.

Cutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck. Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization

More information

An Approach to a Test Oracle for XML Query Testing

An Approach to a Test Oracle for XML Query Testing An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,

More information

[Bhosale*, 4.(6): June, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785

[Bhosale*, 4.(6): June, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY EFFECTIVE DATA FORWARDING TECHNIQUE IN MOBILE SOCIAL NETWORK Ms.Yogita Y.Bhosale*, Prof.Nilesh R.Pardeshi * Department of Computer

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

CENTER-POINT MODEL OF DEFORMABLE SURFACE

CENTER-POINT MODEL OF DEFORMABLE SURFACE CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D

More information

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit

More information

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation

More information

Diff-Max: Separation of Routing and Scheduling in Backpressure-Based Wireless Networks

Diff-Max: Separation of Routing and Scheduling in Backpressure-Based Wireless Networks Diff-Max: Separation of Routing and Scheduling in -Baed Wirele Network Hulya Seferoglu and Eytan Modiano Laboratory For Information and Deciion Sytem Maachuett Intitute of Technology {heferog, modiano}@mit.edu

More information

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov

More information

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two

More information

Connected Placement of Disaster Shelters in Modern Cities

Connected Placement of Disaster Shelters in Modern Cities Connected Placement of Diater Shelter in Modern Citie Huanyang Zheng and Jie Wu Department of Computer and Information Science Temple Univerity, USA {huanyang.zheng, jiewu}@temple.edu ABSTRACT Thi paper

More information

A note on degenerate and spectrally degenerate graphs

A note on degenerate and spectrally degenerate graphs A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove

More information

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -

More information

Shortest Path Routing in Arbitrary Networks

Shortest Path Routing in Arbitrary Networks Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

New Structural Decomposition Techniques for Constraint Satisfaction Problems

New Structural Decomposition Techniques for Constraint Satisfaction Problems New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

How to. write a paper. The basics writing a solid paper Different communities/different standards Common errors

How to. write a paper. The basics writing a solid paper Different communities/different standards Common errors How to write a paper The baic writing a olid paper Different communitie/different tandard Common error Reource Raibert eay My grammar point Article on a v. the Bug in writing Clarity Goal Conciene Calling

More information

Keywords: Defect detection, linear phased array transducer, parameter optimization, phased array ultrasonic B-mode imaging testing.

Keywords: Defect detection, linear phased array transducer, parameter optimization, phased array ultrasonic B-mode imaging testing. Send Order for Reprint to reprint@benthamcience.ae 488 The Open Automation and Control Sytem Journal, 2014, 6, 488-492 Open Acce Parameter Optimization of Linear Phaed Array Tranducer for Defect Detection

More information

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds * Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm

More information

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance A Hybrid Deployable Dynamic Traffic Aignment Framework for Robut Online Route Guidance Sriniva Peeta School of Civil Engineering, Purdue Univerity Chao Zhou Sabre, Inc. Sriniva Peeta School of Civil Engineering

More information

A Local Mobility Agent Selection Algorithm for Mobile Networks

A Local Mobility Agent Selection Algorithm for Mobile Networks A Local Mobility Agent Selection Algorithm for Mobile Network Yi Xu Henry C. J. Lee Vrizlynn L. L. Thing Intitute for Infocomm Reearch, 21 Heng Mui Keng Terrace, Singapore 119613 Email: {yxu, hlee, vriz}@i2r.a-tar.edu.g

More information

IMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak

IMPROVED JPEG DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION. Tak-Shing Wong, Charles A. Bouman, and Ilya Pollak IMPROVED DECOMPRESSION OF DOCUMENT IMAGES BASED ON IMAGE SEGMENTATION Tak-Shing Wong, Charle A. Bouman, and Ilya Pollak School of Electrical and Computer Engineering Purdue Univerity ABSTRACT We propoe

More information

Joint Congestion Control and Media Access Control Design for Ad Hoc Wireless Networks

Joint Congestion Control and Media Access Control Design for Ad Hoc Wireless Networks Joint Congetion Control and Media Acce Control Deign for Ad Hoc Wirele Network Lijun Chen, Steven H. Low and John C. Doyle Engineering & Applied Science Diviion, California Intitute of Technology Paadena,

More information

Markov Random Fields in Image Segmentation

Markov Random Fields in Image Segmentation Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

Impact of Social Networks in Delay Tolerant Routing

Impact of Social Networks in Delay Tolerant Routing Impact of Social Networks in Delay Tolerant Routing Eyuphan Bulut, Zijian Wang and Boleslaw K. Szymanski Department of Computer Science and Center for Pervasive Computing and Networking Rensselaer Polytechnic

More information

Image authentication and tamper detection using fragile watermarking in spatial domain

Image authentication and tamper detection using fragile watermarking in spatial domain International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: 2278 1323 Image authentication and tamper detection uing fragile watermarking

More information

Delaunay Triangulation: Incremental Construction

Delaunay Triangulation: Incremental Construction Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )

More information

On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks

On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University Outline Introduction

More information

Contents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course:

Contents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course: Content Shortet path Algorithm and Network 21/211 The hortet path problem: Statement Verion Application Algorithm (for ingle ource p problem) Reminder: relaxation, Dijktra, Variant of Dijktra, Bellman-Ford,

More information

Network Coding in Duty-Cycled Sensor Networks

Network Coding in Duty-Cycled Sensor Networks 1 Network Coding in Duty-Cycled Senor Network Roja Chandanala, Radu Stoleru, Member, IEEE Abtract Network coding and duty-cycling are two popular technique for aving energy in wirele adhoc and enor network.

More information

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer International Reearch Journal of Applied and Baic Science 218 Available online at www.irjab.com ISSN 2251-838X / Vol, 12 (1): 49-53 Science Explorer Publication Analyi of the reult of analytical and imulation

More information

Resource Allocation in Multi-Radio Multi-Channel Multi-Hop Wireless Networks

Resource Allocation in Multi-Radio Multi-Channel Multi-Hop Wireless Networks Reource Allocation in Multi-Radio Multi-Channel Multi-Hop Wirele Network Technical Report (July 2007) Simone Merlin, Nitin Vaidya, Michele Zorzi Padova Univerity, DEI, Padova, Italy; Univerity of Illinoi

More information

Modeling of underwater vehicle s dynamics

Modeling of underwater vehicle s dynamics Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation

More information

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt

More information

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES MAKARA, TEKNOLOGI, VOL. 9, NO., APRIL 5: 3-35 3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES Mochammad Zulianyah Informatic Engineering, Faculty of Engineering, ARS International Univerity,

More information

Transient Community Detection and Its Application to Data Forwarding in Delay Tolerant Networks

Transient Community Detection and Its Application to Data Forwarding in Delay Tolerant Networks Transient Community Detection and Its Application to Data Forwarding in Delay Tolerant Networks Xiaomei Zhang and Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University,

More information

Quadrilaterals. Learning Objectives. Pre-Activity

Quadrilaterals. Learning Objectives. Pre-Activity Section 3.4 Pre-Activity Preparation Quadrilateral Intereting geometric hape and pattern are all around u when we tart looking for them. Examine a row of fencing or the tiling deign at the wimming pool.

More information

Growing Networks Through Random Walks Without Restarts

Growing Networks Through Random Walks Without Restarts Growing Network Through Random Walk Without Retart Bernardo Amorim, Daniel Figueiredo, Giulio Iacobelli, Giovanni Neglia To cite thi verion: Bernardo Amorim, Daniel Figueiredo, Giulio Iacobelli, Giovanni

More information

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique 202 International Conference on Frontier in Handwriting Recognition Building a Compact On-line MRF Recognizer for Large Character Set uing Structured Dictionary Repreentation and Vector Quantization Technique

More information

Brief Announcement: Distributed 3/2-Approximation of the Diameter

Brief Announcement: Distributed 3/2-Approximation of the Diameter Brief Announcement: Ditributed /2-Approximation of the Diameter Preliminary verion of a brief announcement to appear at DISC 14 Stephan Holzer MIT holzer@mit.edu David Peleg Weizmann Intitute david.peleg@weizmann.ac.il

More information

DECENTRALIZED structured overlays and distributed. Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn

DECENTRALIZED structured overlays and distributed. Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Harvard Technical Report TR-3-4 Ditributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Jonathan Ledlie and Margo Seltzer Abtract Numerou propoal exit for load balancing in peer-to-peer (pp)

More information

SECTOR BASED MULTICAST ROUTING ALGORITHM FOR MOBILE AD-HOC NETWORKS

SECTOR BASED MULTICAST ROUTING ALGORITHM FOR MOBILE AD-HOC NETWORKS SECTOR BASED MULTICAST ROUTING ALGORITHM OR MOBILE AD-HOC NETWORKS Murali Paramewaran 1 and Chittaranjan Hota 2 1 Department of Computer Science & Information Sytem, BITS-Pilani, Pilani, India 2 Department

More information

Multi-Target Tracking In Clutter

Multi-Target Tracking In Clutter Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and

More information

A Joint Replication-Migration-based Routing in Delay Tolerant Networks

A Joint Replication-Migration-based Routing in Delay Tolerant Networks A Joint -Migration-based Routing in Delay Tolerant Networks Yunsheng Wang and Jie Wu Dept. of Computer and Info. Sciences Temple University Philadelphia, PA 19122 Zhen Jiang Dept. of Computer Science West

More information

Optimal Gossip with Direct Addressing

Optimal Gossip with Direct Addressing Optimal Goip with Direct Addreing Bernhard Haeupler Microoft Reearch 1065 La Avenida, Mountain View Mountain View, CA 94043 haeupler@c.cmu.edu Dahlia Malkhi Microoft Reearch 1065 La Avenida, Mountain View

More information

TAM 212 Worksheet 3. The worksheet is concerned with the design of the loop-the-loop for a roller coaster system.

TAM 212 Worksheet 3. The worksheet is concerned with the design of the loop-the-loop for a roller coaster system. Name: Group member: TAM 212 Workheet 3 The workheet i concerned with the deign of the loop-the-loop for a roller coater ytem. Old loop deign: The firt generation of loop wa circular, a hown below. R New

More information

A Handover Scheme for Mobile WiMAX Using Signal Strength and Distance

A Handover Scheme for Mobile WiMAX Using Signal Strength and Distance A Handover Scheme for Mobile WiMAX Uing Signal Strength and Ditance Mary Alatie, Mjumo Mzyece and Anih Kurien Department of Electrical Engineering/French South African Intitute of Technology (F SATI) Thwane

More information

USING ARTIFICIAL NEURAL NETWORKS TO APPROXIMATE A DISCRETE EVENT STOCHASTIC SIMULATION MODEL

USING ARTIFICIAL NEURAL NETWORKS TO APPROXIMATE A DISCRETE EVENT STOCHASTIC SIMULATION MODEL USING ARTIFICIAL NEURAL NETWORKS TO APPROXIMATE A DISCRETE EVENT STOCHASTIC SIMULATION MODEL Robert A. Kilmer Department of Sytem Engineering Unite State Military Acaemy Wet Point, NY 1996 Alice E. Smith

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and

More information

A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED

A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED Jutin Domke and Yianni Aloimono Computational Viion Laboratory, Center for Automation Reearch Univerity of Maryland College Park,

More information

Multicast with Network Coding in Application-Layer Overlay Networks

Multicast with Network Coding in Application-Layer Overlay Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 1, JANUARY 2004 1 Multicat with Network Coding in Application-Layer Overlay Network Ying Zhu, Baochun Li, Member, IEEE, and Jiang Guo Abtract

More information

Firewall Packet Filtering Optimization using Statistical Traffic Awareness Test

Firewall Packet Filtering Optimization using Statistical Traffic Awareness Test Firewall Packet Filtering Optimization uing Statitical Traffic Awarene Tet Zouheir Trabel Liren Zhang and Safaa Zeidan Faculty of Information Technology UAE Univerity Al-Ain, UAE {trabel lzhang, afaa.z}

More information

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong 4th International Conference on Machinery, Material and Computing Technology (ICMMCT 2016) A Load Balancing Model baed on Load-aware for Ditributed Controller Fengjun Shang, Wenjuan Gong College of Compute

More information

Robust Routing in Interdependent Networks

Robust Routing in Interdependent Networks Robut Routing in Interdependent Network Jianan Zhang and Eytan Modiano Laboratory for Information and Deciion Sytem, Maachuett Intitute of Technology Abtract We conider a model of two interdependent network,

More information

Landmark Selection and Greedy Landmark-Descent Routing for Sensor Networks

Landmark Selection and Greedy Landmark-Descent Routing for Sensor Networks 1 Landmark Selection and Greedy Landmark-Decent Routing for Senor Network An Nguyen Nikola Miloavljević Qing Fang Jie Gao Leonida J. Guiba Department of Computer Science, Stanford Univerity. {anguyen,nikolam,guiba}@c.tanford.edu

More information