SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS. Hewlett-Packard Company East Mission Avenue. Bogazici University

Size: px
Start display at page:

Download "SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS. Hewlett-Packard Company East Mission Avenue. Bogazici University"

Transcription

1 SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS Sanuj V. Sarin 1, Hakan Delic 2 and Jung H. Kim 3 1 Hewlett-Packard Company East Mission Avenue Spokane, Wasington 99109, USA 2 Signal and Image Processing Laboratory (BUSIM) Department of Electrical and Electronics Engineering Bogazici University Bebek Istanbul, Turkey 3 Center for Advanced Computer Studies University of Soutwestern Louisiana Lafayette, Louisiana 70504, USA Abstract Tree new ring access protocols, including a novel preemption sceme based on priority sceduling wic we call \soft preemption", are presented for slotted-ring networks were stations generate multiple-priority messages. Te rst of te two nonpreemptive protocols always empties te igpriority queue before releasing low-priority packets into te ring, wereas te second one assumes a desirable, but not strict, delay deadline on te low-priority waiting times. Te preemptive ring access protocol follows preemption rules based on delay deadlines imposed on te waiting times of bot priority classes. We investigate te expected delays of all te protocols via simulations and present a grapical comparison, igligting improvements in te waiting times of ig- and low-priority packets.

2 Sarin, Delic and Kim: Slotted-ring local area networks wit multiple priority stations 2 1 Introduction Slotted-ring protocols ave emerged wit te introduction of te Cambridge Ring in early 1980's [10], and gained furter recognition wit te Orwell access protocol developed by te Britis Telecom Laboratories for voice and ig-speed data integration [7]. Te generic structure of a slotted-ring network is as follows: A number of stations are connected to te ring, were several xed-lengt slots are available for te unidirectional transmission of messages around a circular topology. Eac station sends a message by writing its data into a free slot. Te availability of multiple slots reduces te queueing delays as compared to te token-ring alternative, and adds robustness to te network. In te presently considered large-scale systems, were voice and data can be integrated as ig- and low-priority respectively, it is desirable to develop ring networks were stations can generate multiple-priority messages. Tese priority assigments can be arranged to allow more urgent messages to be delivered faster under eavy trac load conditions. Anoter application is ierarcical organizations suc as te military were certain command posts must simply ave iger priority in secure and fast communications. In [13], a slotted-ring local area network (LAN) was proposed for two levels of message priorities, but te stations were replaced by two substations, eac andling a dierent class of jobs. Wile suc an assumption is valid for analysis purposes, it takes away te possibility of developing sopisticated processing algoritms tat migt perform better by sceduling alternately between te competing queues. Te nonpreemptive network model as found its usefulness in applications were te cost of resuming interrupted processes is ig. Due to te upper bounds on te performance of te nonpreemptive discipline, priority jumps metod [12] and preemption scemes ave been proposed for LANs [2], but tese are rigid and insensitive to canging load conditions of dierent priority tracs. In particular, te discretion rules in [2] are very inexible since every packet entering te system is assessed for a predened set of deadlines wic can not be altered. Witin te class of nonpreemptive ring networks, tose tat employ spatial reuse ave presented temselves as attractive designs for ig-speed LANs [3], [7]. Spatial reuse, based on te destination release principle, allows for multiple simultaneous transmissions by te same station and ence enables ig gains in trougput. In fact, tere ave been proposals to implement tis advantage in some existing ig-speed LAN standards [11], [14]. In tis paper, we propose tree ring access protocols (RAPs) for slotted-ring local area networks were eac station maintains two separate queues for te two priority classes. Te nonpreemptive protocols follow te condition tat once a packet is put on a slot, its transmission cannot be interrupted regardless of te message's priority. On te oter and in te preemptive protocol, a low-priority message may be interrupted by a ig-priority job if certain preemption rules are satised at te sceduling instant. Bot nonpreemptive protocols assure tat te low-priority packets get some sare of te slots even in te presence of eavy ig-priority trac conditions; but one protocol provides faster processing for low-priority messages. Te policies in te soft preemptive RAP are based on delay deadlines (imposed on te waiting times) wic can be slided on a time scale from zero to innity. Tey are refresed at regular intervals by a network management station after sensing te trac load conditions in te cannel. Te protocol as te exibility of going from nonpreemptive to

3 Sarin, Delic and Kim: Slotted-ring local area networks wit multiple priority stations 3 preemptive modes wit various degrees of intermediate preemption stages wit variation in delay deadlines; ence te name soft preemption. It may not be feasible for te preemptive networks proposed in te past [13] to be dynamic to suc an extent. Furtermore, te sceduling algoritm embedded into tis protocol ensures service to low-priority packet witin tolerable waiting time delays. Te organization of te paper is as follows: Section 2 presents te system model for te network under consideration in tis paper. Sections 3 and 4 introduce te nonpreemptive and preemptive access protocols, respectively. Section 5 addresses te stability issue, and Section 6 provides simulation results tat demonstrate te performance advantages of te proposed protocols in terms of average waiting times. Finally Section 7 as te conclusions. 2 System Model Te system model assumes tat stations are connected to a ring were packets ow unidirectionally from one station to te next. A preassigned station known as te monitor initializes te ring to contain a xed number of bits, and ensures tat te number of bits circulating te ring stays constant, irrespective of te number of stations on te ring [9]. Eac packet, made up of a set number of bits, occupies one constant-lengt slot, and includes te F/E (full/empty), source, destination, message, and te acknowledgement bits. Figure 1 sows te format of a typical nonpreemptive slot. F/E SOURCE DEST DATA ACK Figure 1: Slot for nonpreemptive RAPs. Te slot structure diers by an additional bit denoting te priority status of te data (H/L), in te case of preemptive sceduling as sown in Figure 2. F/E H/L SOURCE DEST DATA ACK Figure 2: Slot for preemptive RAPs. Tere are N mutually independent slots available witin te network and it is assumed tat tere is no delay between te arrival of two consecutive slots. In te beginning, all slots are marked empty wen te monitor initializes te ring. Once a station detects an empty slot, it marks F/E bit as full, and proceeds to write te source address, destination address and data information into te slot. Te slot containing tis packet ten travels around te pysical ring from one station to anoter until it reaces its destination. Te destination station, upon reception, reads te data, sets te acknowledge bits and lets te slot continue back to te source witout writing its own

4 Sarin, Delic and Kim: Slotted-ring local area networks wit multiple priority stations 4 data. Since tere are constant number of slots on te ring, source station identies te slot used for previous packet transmission by counting te number of slots passed by. Te source station reads te source address and te ACK bit from te eader of te slot to conrm correct reception of te last transmitted packet. Te source station is allowed to reuse te same slot until te information transfer is complete. However, stations are not allowed to occupy more tan one slot at any given time. Tis is necessary to avoid ogging of slots by a single station and providing additional robustness to te protocol. Te total ring delay time is R. Eac station as te capability of generating ig-priority packets. Tat is, we do not categorize users into a specic priority class, but rater, suppose tat eac user can transmit multiplepriority messages. Stations maintain two separate queues, one for low- and one for ig-priority packets, bot wit innite-size buers. Hig- and low-priority data arrive according to Poisson processes in all stations, wit cumulative rates and l, respectively. Te two data streams are statistically independent, as are te M stations. Typically, one can expect < l, as urgent messages occur less frequently tan regular messages. In general, tere are fewer slots tan stations in a network; tat is N < M. If M = N, ten te ring network is identical to a system wic contains one server per station. 3 Nonpreemptive Protocols Te most direct approac to scedule packets is to provide te ig-priority data wit straigt access to te ring as soon as a free slot becomes available. In te sequel, we will not use an index to specify te stations, but te results are valid for any station due to identical statistical assumptions across all users. Let ft n g be te sequence of consecutive time instants wen a slot becomes available for some station. Let W and W l denote te waiting times of te oldest stored ig-priority and low-priority message at time t n, respectively. If tere are no stored ig-priority (low-priority) messages at t n, ten W (W l ) is te time interval between t n and te generation instant of te ig-priority (low-priority) message tat was transmitted most recently before t n, and it is negative. Ten, te simple RAP1 can be formulated as follows: i) If at some t n, W 0, ten te corresponding ig-priority packet in te station is transmitted wit probability one, regardless of te value of W l. ii) If at some t n, W < 0 and W l 0, ten te corresponding low-priority packet is transmitted wit probability one. In oter words, wen RAP1 is in eect, a low-priority packet can not be transmitted until te ig-priority queue is emptied. Tus, RAP1 ignores te waiting times of te low-priority packets, and low-priority messages are delayed signicantly since tey always yield to ig-priority messages. However, compared to preemptive protocols discussed in [2], low-priority messages are still at an advantage in terms of average delays. Suppose now tat it is desirable tat te low-priority messages be sceduled for transmission troug te ring wen a certain time period as elapsed since te time of teir arrival into te queue. We call tis maximum desirable waiting time as te target delay deadline (TDD). End

5 Sarin, Delic and Kim: Slotted-ring local area networks wit multiple priority stations 5 of TDD does not guarantee immediate service for a low-priority packet because te slot vacation times are random variables, and terefore we consider tis as a rater loose, nonstrict deadline. However it does te serve te purpose of assuring slot sare for low-priority packets wit nonzero probability. Te imposition of te target deadline gives rise to an alternative nonpreemptive protocol, RAP2, tat employs a sceduling policy similar to te one proposed in [5]: i) If at some t n, W l TDD, ten te corresponding low-priority packet in te station is selected for transmission wit probability one, regardless of te value of W. Tis is necessary in order to meet te delay requirement imposed on te low-priority message wit reasonably ig probability. ii) If at some t n, W 0 and W l TDD, ten te corresponding ig-priority packet is selected for transmission wit probability one. iii) If at some t n, W < 0 and W l 0, ten te corresponding low-priority packet is selected for transmission wit probability one. Te protocol described above olds onto te low-priority packets until teir processing becomes inevitable if te delay deadline TDD is to be met. Wile setting a lower value for TDD would increase te probability tat low-priority packets are processed sooner, ig-priority delays would suer consequently. Still, waiting times of ig-priority trac at very low arrival rates sould be insensitive to te variations in te low-priority critical deadline. Comparing RAP1 and RAP2, one does anticipate certain dierences in delay performance. Because of te transmission privilege tey possess, ig-priority packets are expected to attain lower expected delay in RAP1. In contrast, low-priority packets are occasionally permitted to go aead of ig-priority packets in RAP2, and ence, teir expected delay performance will be better at te expense of sligtly increased ig-priority delay. For eac station, at te end of a busy period, te slot becomes unavailable for a random period of time, rater tan going back into service immediately (for te same station). Hence, te systems tat consist of te slotted-ring network wit nonpreemptive RAPs can be modeled as an M/D/1 queue wit vacations [1]. Te expected waiting time equations can be derived directly for RAP1 [6]. But te delay analysis of RAP2 is considerably more dicult because te processing decisions depend te on waiting times. Bounds on te expected delays can be derived using te regenerative teorem [8], but conditional delay distributions are required for precise analysis. Details are omitted for brevity in tis paper. 4 Soft Preemption Nonpreemptive scemes, wile avoiding retransmission costs, restrict possible inprovements in ig-priority delay performance. In tis section we propose a preemptive RAP protocol wic possesses an additional control variable along wit TDD. Suppose tat te urgency of te ig-priority packets can be quantied in terms of teir waiting times. Specically, let te critical preemptive deadline (CPD) be te maximum delay period of te leading ig-priority packet at te queue, up to wic a low-priority packet transmission on te ring will not be preempted. Once te CPD period expires, te ig-priority packet at te station preempts te rst low-priority packet in te slot passing by. Te source station of a preempted

6 Sarin, Delic and Kim: Slotted-ring local area networks wit multiple priority stations 6 packet can detect te preemption troug te status of te H/L bit, and subsequently retransmit te packet. Te dynamic variables, TDD and CPD, serve as a andle to alter service discipline properties based on network load conditions and performance requirements. At te end of CPD, service to a ig-priority packet is guaranteed wit probability very close to one since vacation times of te slots are constrained by te ig-priority load on te network only. Te soft preemptive RAP (RAP3) consists of te following rules [15]: i) If at some t n, 0 W < CPD and W l T DD, ten te low-priority packet is selected for transmission wit probability one. ii) If at some t n, 0 W < CPD and W l < TDD, ten te ig-priority packet is selected for transmission wit probability one witout preemption on te ring. iii) If at some t n, W < 0 and W l 0, ten te low-priority packet is selected for transmission wit probability one. iv) If at some t n, W CPD, ten te corresponding ig priority packet is selected for transmission wit probability one and it is allowed to preempt te rst low-priority packet passing by on te ring. Wen W 2 [0; CPD), RAP3 is similar to RAP2. Tis ensures sucient slot sare for lowpriority packets so tat teir response time is kept witin tolerable limits. Low-priority packets are never allowed to preempt any slot on te ring but ig-priority packets now acquire te autority to preempt in accordance wit te above rules. It is also possible to ave predened ig-priority performance wit respect to low-priority waiting times by sliding CPD towards or away from te origin. Te two dimensional control to acieve user-dened ig- and low-priority performance is an excellent feature of RAP3. 5 Stability Because a station can old onto a slot until it downloads its buer, te unavailability of an empty slot at times does not aect te trougput. In te presence of a packet, none of te protocols remain idle. Moreover, wen packets from bot classes are present, prioritization as no eect on trougput eiter. Hence, RAP1 and RAP2 bot maximize te ring utilization [4]. RAP3, on te oter and, imposes additional overead due to preemption and ence is less ecient. Te sucient condition for te stability of sceduling protocols suc as RAP1 and RAP2 were investigated in [5] using te teory on te ergodicity of two-dimensional discrete-time discretespace Markov cains (for renewal arrival processes), and we do not include it ere. Te necessary condition for te stability of te networks is as follows: ( + l ) R N < 1; were R is te service time. An unstable station will drive up te delays by olding onto a slot for a very long time. But tere will be N? 1 slots available for te remaining M? 1 stations and te system will continue to function. Wen te number of unstable stations reaces N, network-wide instability occurs. Protocols tat allow stations to use multiple slots (spatial reuse) are not as robust.

7 Sarin, Delic and Kim: Slotted-ring local area networks wit multiple priority stations 7 6 Simulations For simulating te protocols, te system model was coded in `C' on a Sun SparcStation ,000 iterations were performed for eac set of low- and ig-priority arrival rates. Average waiting times for bot low-and ig-priority packets were calculated assuming four slots on te ring. Total number of stations present on te ring were equal to ten (M = 10 and N = 4). Simulation results depicting performance as a function of arrival rates are furnised in Figures 4 troug 8. RAP2 simulations were run for TDD = 8, and RAP3 experiments also assumed a value of CPD = 4. Wen bot TDD and CPD were made innite, RAP3 obtained te same performance as RAP1. Comparing te results, it can be noted tat average low-priority waiting times are uniformly te igest for RAP3, despite te target delay deadline set on te low-priority packets. Tis was to be expected since TDD is really a secondary stipulation of te protocol. Te low-priority performance sows an improvement wen te priority queues are competitively sceduled in a nonpreemptive mode. At very low arrival rates of low-priority packets ( l 0:2), te RAP2 yields a tolerable deterioration in ig-priority delay performance wit a noticeable decrease in average low-priority waiting times. However, for iger arrival rates, te RAP2 switces te roles of te two priority classes wit regard to teir average delays, and ence becomes useless. Te latter eect is a result of coosing a very low TDD value. As Figure 3 indicates, RAP2 does yield more controlled delays for bot priority classes wen TDD is selected appropriately ig. For instance, for a coice of TDD = 40 at = 0:3 and l = 0:4, we can obtain bounded average low-priority delays wile keeping te average ig-priority delays muc lower. As can be seen in Figure 8, for moderate TDD values and low ig-priority arrival rates, low-priority packets acieve marginal delay gains by using RAP2 over RAP1, because wen te network load is low, te TDD parameter goes underutilized. For iger arrival rates, low-priority average delay does go down signicantly wen RAP2 is used. RAP3 is very eective in reducing ig-priority waiting times for ig at te expense of signicant rise in low-priority delays. Also, ig-priority delay performance is virtually insensitive to te variations in TDD wen is so ig tat low-priority packets are often preempted. It is of great interest to see tat average ig-priority delay is uniformly bounded for all arrival rates tat fall witin te stability region. Tis suggests tat RAP3 enables eective control of ig-priority performance. Figure 9 quanties te level of control provided by CPD for TDD = 16 slots and l = 0:1. Dramatic reduction in ig-priority delays is possible under loaded network conditions by increasing te CPD parameter. Te average ig-priority delays are lower for RAP1 (compared to RAP3) at very low arrival rates, due to infrequent preemptions in RAP3. Ironically, te RAP1 average low-priority delays are also lower for exactly te same reason.

8 Sarin, Delic and Kim: Slotted-ring local area networks wit multiple priority stations 8 15 Average waiting time in slots b a TDD Figure 3: Average waiting times of RAP2 as a function of TDD, for = 0:3 and l = 0:4 (a: ig-priority; b: low-priority). 7 Discussion and Conclusion Sliding te values of TDD and CPD on te time axis, as a function of te varying load rates, dictates te ig- and low-priority waiting times. We can interface RAP3 to a network manager wic, in turn, can slide tese deadlines according to user-dened requirements of multiple-priority packet transmission. Te ring networks proposed in tis paper ave several more advantages in addition to teir suitability for voice/data integrated applications. Tey are simple and deterministic in teir operations. Moreover, low-priority messages are guaranteed processing even wen te ig-priority messages represent a large volume, unlike te algoritm in [13]. In te absence of a network manager or management agent, te coice between te tree protocols largely depends on te respective trac loads from te two priority classes, as well as te urgency of te ig-priority messages. If te low-priority arrival rate is muc iger tan te ig-priority arrival rate, and if te ig-priority packets can tolerate a certain waiting time delay, ten RAP2 is desirable to keep te low-priority delays manageable. On te oter and, if te ig-priority arrival rate is ig and tey need to be transmitted as fast as possible, RAP1 is more appropriate. Tat RAP3 can perform as RAP1 and RAP2 under dierent values of its deadline may suggest tis protocol as a compromise, owever one as to be alert wit te ig delays for low-priority packets. RAP3 is also suitable for designing ring networks were users branc into more tan two priority classes. Tat is, between M stations, it is possible to impose delay constraints suc tat D 1 > D 2 > : : : > D M were D i is te CPD for station i; i = 1; :::; M. Suc a system is suitable for ierarcical network structures, were users do assume a normal mode (low-priority) wen tere is no emergency. Future researc will investigate protocols tat allow for multiple slots per station at any time, were networks wit asymmetric loads can be accommodated more fairly at te expense of system robustness. Hybrid protocols, utilizing RAP2 and RAP3 depending on te network load, can also be devised to improve performance. Finally, te exact dependence of te protocols' performance on TDD and CPD needs to be

9 Sarin, Delic and Kim: Slotted-ring local area networks wit multiple priority stations Low priority waiting time Hig priority waiting time (RAP1) 80 Average waiting time in slots RAP1 RAP2 RAP Average Low priority arrival rate ( λ l ) 0.50 waiting time in slots 1.00 (λ = 0.4) l (λ l= 0.2) Figure 4: Performance of RAP Hig priority arrival rate ( ) Low priority waiting time Hig priority waiting time (RAP2) Figure 7: Waiting time comparison of ig priority packets. Average waiting time in slots Low priority arrival rate ( λ l ) 100 Figure 5: Performance of RAP2. (λ l= 0.4) RAP1 RAP2 RAP Average 100 Low priority waiting time waiting Hig priority waiting time (RAP3) time in slots 1.00 (λ l= 0.2) Average waiting time in slots Hig priority arrival rate ( ) λ 0.50 Figure 8: Waiting time comparison of low priority packets. Low priority arrival rate ( λ l ) Figure 6: Performance of RAP3.

10 Sarin, Delic and Kim: Slotted-ring local area networks wit multiple priority stations 10 investigated furter. Lower delays for bot classes of jobs sould be attained by optimal coice of tese parameters. References [1] D. Bertsekas and R. G. Gallager (1987): Data Networks, Englewood Clis, New Jersey: Prentice-Hall. [2] Y. Z. Co and C. K. Un (1993):\Analysis of M/G/1 Queue under a Combined Preemptive/Nonpreemptive Discipline", IEEE Transactions on Communications, vol. 41, pp [3] I. Cidon and Y. Ofek (1993): \Metaring- A Full Duplex Ring wit Fairness and Spatial Reuse", IEEE Transactions on Communications, vol. 41, pp [4] H. Delic and P. Papantoni-Kazakos (1991): \An Optimal Policy for Competitive Processing of Hig- and Low-Priority Arrivals", International Journal of Digital and Analog Communication Systems, vol. 4, pp [5] H. Delic and P. Papantoni-Kazakos (1993): \A Class of Sceduling Policies for Mixed Data wit Renewal Arrival Processes", IEEE Transactions on Automatic Control, vol. 38, pp [6] H. Delic and S. V. Sarin (1995): \Nonpreemptive Slotted-Ring Local Area Networks for Users wit Priority Messages", Proceedings of te 29t Annual Conference on Information Sciences and Systems, Baltimore, Maryland, pp [7] R. M. Falconer and J. L. Adams (1987): \Orwell: A Protocol for an Integrated Services Local Network", in Advances in Local Area Networks, K. Kummerle, J. O. Limb and F. A. Tobagi, Editors, New York, NY: IEEE Press. [8] L. Georgiadis, L. Merakos and P. Papantoni-Kazakos (1987): \A Metod for te Delay Analysis of Random Multiple Access Algoritms Wose Delay Process is Regenerative", IEEE Journal on Selected Areas in Communications, vol. 5, pp [9] F. Halsall (1996): Data Communications, Computer Networks and Open Systems, Fourt Edition, New York, NY: Addison-Wesley. [10] A. Hopper (1980): \Te Cambridge Ring- A Local Network", in Advanced Tecniques for Microprocessor Systems, F. K. Hanna, Ed., Stevenage, United Kingdom: Peter Pergrinus. [11] M. J. Karol and R. D. Gitlin (1990): \Hig-Performance Optical Local and Metropolitan Area Networks: Enancements of FDDI and IEEE DQDB", IEEE Journal on Selected Areas in Communications, vol. 8, pp [12] Y. Lim and J. A. Kobza (1990): \Analysis of a Delay Dependent Priority Discipline in an Integrated Multiclass Trac Fast Packet Switc", IEEE Transactions on Communications, vol. 38, pp

11 Sarin, Delic and Kim: Slotted-ring local area networks wit multiple priority stations 11 [13] S. Mukerjee, S. K. Tripati and D. Gosal (1993): \A Multiclass Priority-Based Slotted-Ring LAN and Its Analysis", IEEE Transactions on Computers, vol. 42, pp [14] M. A. Rodrigues (1990): \Erasure Node: Performance Improvements for te IEEE MAN", Proceedings of IEEE INFOCOM'90, San Francisco, California, pp [15] S. V. Sarin and H. Delic (1996): \Soft Preemption in Slotted-Ring Local Area Networks", Record of te International Conference on Telecommunications, Istanbul, Turkey, pp

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks An Algoritm for Loopless Deflection in Potonic Packet-Switced Networks Jason P. Jue Center for Advanced Telecommunications Systems and Services Te University of Texas at Dallas Ricardson, TX 75083-0688

More information

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness 1 Optimal In-etwork Packet Aggregation Policy for Maimum Information Fresness Alper Sinan Akyurek, Tajana Simunic Rosing Electrical and Computer Engineering, University of California, San Diego aakyurek@ucsd.edu,

More information

Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks

Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Okan Yilmaz and Ing-Ray Cen Computer Science Department Virginia Tec {oyilmaz, ircen}@vt.edu

More information

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various

More information

Packet Switching Networks. Jonathan S. Turner. Computer and Communications Research Center. the result of user connections that pass through the

Packet Switching Networks. Jonathan S. Turner. Computer and Communications Research Center. the result of user connections that pass through the Fluid Flow Loading Analysis of Packet Switcing Networks Jonatan S. Turner Computer and Communications Researc Center Wasington University, St. Louis, MO 63130 Abstract Recent researc in switcing as concentrated

More information

An Anchor Chain Scheme for IP Mobility Management

An Anchor Chain Scheme for IP Mobility Management An Ancor Cain Sceme for IP Mobility Management Yigal Bejerano and Israel Cidon Department of Electrical Engineering Tecnion - Israel Institute of Tecnology Haifa 32000, Israel E-mail: bej@tx.tecnion.ac.il.

More information

Investigating an automated method for the sensitivity analysis of functions

Investigating an automated method for the sensitivity analysis of functions Investigating an automated metod for te sensitivity analysis of functions Sibel EKER s.eker@student.tudelft.nl Jill SLINGER j..slinger@tudelft.nl Delft University of Tecnology 2628 BX, Delft, te Neterlands

More information

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science A Cost Model for Distributed Sared Memory Using Competitive Update Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, Texas, 77843-3112, USA E-mail: fjkim,vaidyag@cs.tamu.edu

More information

George Xylomenos and George C. Polyzos. with existing protocols and their eæciency in terms of

George Xylomenos and George C. Polyzos. with existing protocols and their eæciency in terms of IP MULTICASTING FOR WIRELESS MOBILE OSTS George Xylomenos and George C. Polyzos fxgeorge,polyzosg@cs.ucsd.edu Computer Systems Laboratory Department of Computer Science and Engineering University of California,

More information

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically 2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use

More information

Symmetric Tree Replication Protocol for Efficient Distributed Storage System*

Symmetric Tree Replication Protocol for Efficient Distributed Storage System* ymmetric Tree Replication Protocol for Efficient Distributed torage ystem* ung Cune Coi 1, Hee Yong Youn 1, and Joong up Coi 2 1 cool of Information and Communications Engineering ungkyunkwan University

More information

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks Downloaded from vbn.aau.dk on: April 7, 09 Aalborg Universitet etwork Coding to Enance Standard Routing Protocols in Wireless Mes etworks Palevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank;

More information

Multi-Stack Boundary Labeling Problems

Multi-Stack Boundary Labeling Problems Multi-Stack Boundary Labeling Problems Micael A. Bekos 1, Micael Kaufmann 2, Katerina Potika 1 Antonios Symvonis 1 1 National Tecnical University of Atens, Scool of Applied Matematical & Pysical Sciences,

More information

Mean Waiting Time Analysis in Finite Storage Queues for Wireless Cellular Networks

Mean Waiting Time Analysis in Finite Storage Queues for Wireless Cellular Networks Mean Waiting Time Analysis in Finite Storage ueues for Wireless ellular Networks J. YLARINOS, S. LOUVROS, K. IOANNOU, A. IOANNOU 3 A.GARMIS 2 and S.KOTSOOULOS Wireless Telecommunication Laboratory, Department

More information

4.1 Tangent Lines. y 2 y 1 = y 2 y 1

4.1 Tangent Lines. y 2 y 1 = y 2 y 1 41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange

More information

4.2 The Derivative. f(x + h) f(x) lim

4.2 The Derivative. f(x + h) f(x) lim 4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially

More information

An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng

An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng An ffective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Ciming Huang and ei-heng Ceng 5 De c e mbe r0 International Journal of Advanced Information Tecnologies (IJAIT),

More information

MULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS

MULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS ULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS Nimmagadda Calamaia æ Dept. of CSE JNTU College of Engineering Kakinada, India 533 003. calm@cse.iitkgp.ernet.in Badrinat Ramamurty y Dept.

More information

On the Use of Radio Resource Tests in Wireless ad hoc Networks

On the Use of Radio Resource Tests in Wireless ad hoc Networks Tecnical Report RT/29/2009 On te Use of Radio Resource Tests in Wireless ad oc Networks Diogo Mónica diogo.monica@gsd.inesc-id.pt João Leitão jleitao@gsd.inesc-id.pt Luis Rodrigues ler@ist.utl.pt Carlos

More information

3.6 Directional Derivatives and the Gradient Vector

3.6 Directional Derivatives and the Gradient Vector 288 CHAPTER 3. FUNCTIONS OF SEVERAL VARIABLES 3.6 Directional Derivatives and te Gradient Vector 3.6.1 Functions of two Variables Directional Derivatives Let us first quickly review, one more time, te

More information

Intra- and Inter-Session Network Coding in Wireless Networks

Intra- and Inter-Session Network Coding in Wireless Networks Intra- and Inter-Session Network Coding in Wireless Networks Hulya Seferoglu, Member, IEEE, Atina Markopoulou, Member, IEEE, K K Ramakrisnan, Fellow, IEEE arxiv:857v [csni] 3 Feb Abstract In tis paper,

More information

Real-Time Wireless Routing for Industrial Internet of Things

Real-Time Wireless Routing for Industrial Internet of Things Real-Time Wireless Routing for Industrial Internet of Tings Cengjie Wu, Dolvara Gunatilaka, Mo Sa, Cenyang Lu Cyber-Pysical Systems Laboratory, Wasington University in St. Louis Department of Computer

More information

PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION

PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION Martin Kraus Computer Grapics and Visualization Group, Tecnisce Universität Müncen, Germany krausma@in.tum.de Magnus Strengert Visualization and Interactive

More information

Haar Transform CS 430 Denbigh Starkey

Haar Transform CS 430 Denbigh Starkey Haar Transform CS Denbig Starkey. Background. Computing te transform. Restoring te original image from te transform 7. Producing te transform matrix 8 5. Using Haar for lossless compression 6. Using Haar

More information

13.5 DIRECTIONAL DERIVATIVES and the GRADIENT VECTOR

13.5 DIRECTIONAL DERIVATIVES and the GRADIENT VECTOR 13.5 Directional Derivatives and te Gradient Vector Contemporary Calculus 1 13.5 DIRECTIONAL DERIVATIVES and te GRADIENT VECTOR Directional Derivatives In Section 13.3 te partial derivatives f x and f

More information

Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks

Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks Peyman Faizian, Md Safayat Raman, Md Atiqul Molla, Xin Yuan Department of Computer Science Florida State University

More information

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation P R E P R N T CPWS XV Berlin, September 8, 008 Fast Calculation of Termodynamic Properties of Water and Steam in Process Modelling using Spline nterpolation Mattias Kunick a, Hans-Joacim Kretzscmar a,

More information

Integrating Multimedia Applications in Hard Real-Time Systems

Integrating Multimedia Applications in Hard Real-Time Systems Integrating Multimedia Applications in Hard Real-Time Systems Luca Abeni and Giorgio Buttazzo Scuola Superiore S. Anna, Pisa luca@arti.sssup.it, giorgio@sssup.it Abstract Tis paper focuses on te problem

More information

Distributed and Optimal Rate Allocation in Application-Layer Multicast

Distributed and Optimal Rate Allocation in Application-Layer Multicast Distributed and Optimal Rate Allocation in Application-Layer Multicast Jinyao Yan, Martin May, Bernard Plattner, Wolfgang Mülbauer Computer Engineering and Networks Laboratory, ETH Zuric, CH-8092, Switzerland

More information

The Euler and trapezoidal stencils to solve d d x y x = f x, y x

The Euler and trapezoidal stencils to solve d d x y x = f x, y x restart; Te Euler and trapezoidal stencils to solve d d x y x = y x Te purpose of tis workseet is to derive te tree simplest numerical stencils to solve te first order d equation y x d x = y x, and study

More information

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring Has-Based Indexes Capter 11 Comp 521 Files and Databases Spring 2010 1 Introduction As for any index, 3 alternatives for data entries k*: Data record wit key value k

More information

Piecewise Polynomial Interpolation, cont d

Piecewise Polynomial Interpolation, cont d Jim Lambers MAT 460/560 Fall Semester 2009-0 Lecture 2 Notes Tese notes correspond to Section 4 in te text Piecewise Polynomial Interpolation, cont d Constructing Cubic Splines, cont d Having determined

More information

More on Functions and Their Graphs

More on Functions and Their Graphs More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in

More information

Fault Localization Using Tarantula

Fault Localization Using Tarantula Class 20 Fault localization (cont d) Test-data generation Exam review: Nov 3, after class to :30 Responsible for all material up troug Nov 3 (troug test-data generation) Send questions beforeand so all

More information

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall Has-Based Indexes Capter 11 Comp 521 Files and Databases Fall 2012 1 Introduction Hasing maps a searc key directly to te pid of te containing page/page-overflow cain Doesn t require intermediate page fetces

More information

2.8 The derivative as a function

2.8 The derivative as a function CHAPTER 2. LIMITS 56 2.8 Te derivative as a function Definition. Te derivative of f(x) istefunction f (x) defined as follows f f(x + ) f(x) (x). 0 Note: tis differs from te definition in section 2.7 in

More information

A UPnP-based Decentralized Service Discovery Improved Algorithm

A UPnP-based Decentralized Service Discovery Improved Algorithm Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol.1, No.1, Marc 2013, pp. 21~26 ISSN: 2089-3272 21 A UPnP-based Decentralized Service Discovery Improved Algoritm Yu Si-cai*, Wu Yan-zi,

More information

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry Our Calibrated Model as No Predictive Value: An Example from te Petroleum Industry J.N. Carter a, P.J. Ballester a, Z. Tavassoli a and P.R. King a a Department of Eart Sciences and Engineering, Imperial

More information

Author's personal copy

Author's personal copy Autor's personal copy Information Processing Letters 09 (009) 868 875 Contents lists available at ScienceDirect Information Processing Letters www.elsevier.com/locate/ipl Elastic tresold-based admission

More information

Alternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method

Alternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method Te Open Plasma Pysics Journal, 2010, 3, 29-35 29 Open Access Alternating Direction Implicit Metods for FDTD Using te Dey-Mittra Embedded Boundary Metod T.M. Austin *, J.R. Cary, D.N. Smite C. Nieter Tec-X

More information

Asynchronous Power Flow on Graphic Processing Units

Asynchronous Power Flow on Graphic Processing Units 1 Asyncronous Power Flow on Grapic Processing Units Manuel Marin, Student Member, IEEE, David Defour, and Federico Milano, Senior Member, IEEE Abstract Asyncronous iterations can be used to implement fixed-point

More information

Section 2.3: Calculating Limits using the Limit Laws

Section 2.3: Calculating Limits using the Limit Laws Section 2.3: Calculating Limits using te Limit Laws In previous sections, we used graps and numerics to approimate te value of a it if it eists. Te problem wit tis owever is tat it does not always give

More information

Chapter K. Geometric Optics. Blinn College - Physics Terry Honan

Chapter K. Geometric Optics. Blinn College - Physics Terry Honan Capter K Geometric Optics Blinn College - Pysics 2426 - Terry Honan K. - Properties of Ligt Te Speed of Ligt Te speed of ligt in a vacuum is approximately c > 3.0µ0 8 mês. Because of its most fundamental

More information

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer

More information

Numerical Derivatives

Numerical Derivatives Lab 15 Numerical Derivatives Lab Objective: Understand and implement finite difference approximations of te derivative in single and multiple dimensions. Evaluate te accuracy of tese approximations. Ten

More information

Linear Interpolating Splines

Linear Interpolating Splines Jim Lambers MAT 772 Fall Semester 2010-11 Lecture 17 Notes Tese notes correspond to Sections 112, 11, and 114 in te text Linear Interpolating Splines We ave seen tat ig-degree polynomial interpolation

More information

Redundancy Awareness in SQL Queries

Redundancy Awareness in SQL Queries Redundancy Awareness in QL Queries Bin ao and Antonio Badia omputer Engineering and omputer cience Department University of Louisville bin.cao,abadia @louisville.edu Abstract In tis paper, we study QL

More information

Communicator for Mac Quick Start Guide

Communicator for Mac Quick Start Guide Communicator for Mac Quick Start Guide 503-968-8908 sterling.net training@sterling.net Pone Support 503.968.8908, option 2 pone-support@sterling.net For te most effective support, please provide your main

More information

A Novel QC-LDPC Code with Flexible Construction and Low Error Floor

A Novel QC-LDPC Code with Flexible Construction and Low Error Floor A Novel QC-LDPC Code wit Flexile Construction and Low Error Floor Hanxin WANG,2, Saoping CHEN,2,CuitaoZHU,2 and Kaiyou SU Department of Electronics and Information Engineering, Sout-Central University

More information

Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks

Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks Hulya Seferoglu, Atina Markopoulou EECS Dept, University of California, Irvine {seferog, atina}@uci.edu Abstract We

More information

Energy efficient temporal load aware resource allocation in cloud computing datacenters

Energy efficient temporal load aware resource allocation in cloud computing datacenters Vakilinia Journal of Cloud Computing: Advances, Systems and Applications (2018) 7:2 DOI 10.1186/s13677-017-0103-2 Journal of Cloud Computing: Advances, Systems and Applications RESEARCH Energy efficient

More information

Density Estimation Over Data Stream

Density Estimation Over Data Stream Density Estimation Over Data Stream Aoying Zou Dept. of Computer Science, Fudan University 22 Handan Rd. Sangai, 2433, P.R. Cina ayzou@fudan.edu.cn Ziyuan Cai Dept. of Computer Science, Fudan University

More information

CE 221 Data Structures and Algorithms

CE 221 Data Structures and Algorithms CE Data Structures and Algoritms Capter 4: Trees (AVL Trees) Text: Read Weiss, 4.4 Izmir University of Economics AVL Trees An AVL (Adelson-Velskii and Landis) tree is a binary searc tree wit a balance

More information

Cooperation in Wireless Ad Hoc Networks

Cooperation in Wireless Ad Hoc Networks Cooperation in Wireless Ad Hoc Networks Vikram Srinivasan, Pavan Nuggealli, Carla F. Ciasserini, Rames R. Rao Department of Electrical and Computer Engineering, University of California at San Diego email:

More information

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result RT. Complex Fractions Wen working wit algebraic expressions, sometimes we come across needing to simplify expressions like tese: xx 9 xx +, xx + xx + xx, yy xx + xx + +, aa Simplifying Complex Fractions

More information

ANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS

ANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS NTNN SPHRICL COORDINT SSTMS ND THIR PPLICTION IN COMBINING RSULTS FROM DIFFRNT NTNN ORINTTIONS llen C. Newell, Greg Hindman Nearfield Systems Incorporated 133. 223 rd St. Bldg. 524 Carson, C 9745 US BSTRCT

More information

Programming Real-Time Applications with Signal

Programming Real-Time Applications with Signal Programming Real-Time Applications wit Signal Paul Le Guernic, Tierry Gautier, Micel Le Borgne, Claude Le Maire To cite tis version: Paul Le Guernic, Tierry Gautier, Micel Le Borgne, Claude Le Maire. Programming

More information

Sensor Data Collection with Expected Reliability Guarantees

Sensor Data Collection with Expected Reliability Guarantees Sensor Data Collection wit Expected Reliability Guarantees Qi Han, Iosif Lazaridis, Sarad Merotra, Nalini Venkatasubramanian Department of Computer Science, University of California, Irvine, CA 9697 qan,iosif,sarad,nalini

More information

HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS

HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS N.G.Bardis Researc Associate Hellenic Ministry of te Interior, Public Administration and Decentralization 8, Dragatsaniou str., Klatmonos S. 0559, Greece

More information

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method International Journal of Statistics and Applications 0, (): -0 DOI: 0.9/j.statistics.000.0 Comparison of te Efficiency of te Various Algoritms in Stratified Sampling wen te Initial Solutions are Determined

More information

12.2 Techniques for Evaluating Limits

12.2 Techniques for Evaluating Limits 335_qd /4/5 :5 PM Page 863 Section Tecniques for Evaluating Limits 863 Tecniques for Evaluating Limits Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing

More information

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 Note: Tere will be a very sort online reading quiz (WebWork) on eac reading assignment due one our before class on its due date. Due dates can be found

More information

Section 3. Imaging With A Thin Lens

Section 3. Imaging With A Thin Lens Section 3 Imaging Wit A Tin Lens 3- at Ininity An object at ininity produces a set o collimated set o rays entering te optical system. Consider te rays rom a inite object located on te axis. Wen te object

More information

12.2 TECHNIQUES FOR EVALUATING LIMITS

12.2 TECHNIQUES FOR EVALUATING LIMITS Section Tecniques for Evaluating Limits 86 TECHNIQUES FOR EVALUATING LIMITS Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing tecnique to evaluate its of

More information

An Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks

An Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks Tis paper was presented as part of te main tecnical program at IEEE INFOCOM 20 An Analytical Approac to Real-Time Misbeavior Detection in IEEE 802. Based Wireless Networks Jin Tang, Yu Ceng Electrical

More information

RECONSTRUCTING OF A GIVEN PIXEL S THREE- DIMENSIONAL COORDINATES GIVEN BY A PERSPECTIVE DIGITAL AERIAL PHOTOS BY APPLYING DIGITAL TERRAIN MODEL

RECONSTRUCTING OF A GIVEN PIXEL S THREE- DIMENSIONAL COORDINATES GIVEN BY A PERSPECTIVE DIGITAL AERIAL PHOTOS BY APPLYING DIGITAL TERRAIN MODEL IV. Évfolyam 3. szám - 2009. szeptember Horvát Zoltán orvat.zoltan@zmne.u REONSTRUTING OF GIVEN PIXEL S THREE- DIMENSIONL OORDINTES GIVEN Y PERSPETIVE DIGITL ERIL PHOTOS Y PPLYING DIGITL TERRIN MODEL bsztrakt/bstract

More information

Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes

Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganograpic Scemes Jessica Fridric Dept. of Electrical Engineering, SUNY Bingamton, Bingamton, NY 3902-6000, USA fridric@bingamton.edu

More information

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes Coarticulation: An Approac for Generating Concurrent Plans in Markov Decision Processes Kasayar Roanimanes kas@cs.umass.edu Sridar Maadevan maadeva@cs.umass.edu Department of Computer Science, University

More information

Multi-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art

Multi-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art Multi-Objective Particle Swarm Optimizers: A Survey of te State-of-te-Art Margarita Reyes-Sierra and Carlos A. Coello Coello CINVESTAV-IPN (Evolutionary Computation Group) Electrical Engineering Department,

More information

Generalizing Timing Predictions to Set-Associative Caches. Frank Mueller. Humboldt-Universitat zu Berlin. Institut fur Informatik

Generalizing Timing Predictions to Set-Associative Caches. Frank Mueller. Humboldt-Universitat zu Berlin. Institut fur Informatik Generalizing Timing Predictions to Set-Associative Caces Frank Mueller Humboldt-Universitat zu Berlin Institut fur Informatik 10099 Berlin (Germany) e-mail: mueller@informatik.u-berlin.de pone: (+49) (30)

More information

Minimizing Memory Access By Improving Register Usage Through High-level Transformations

Minimizing Memory Access By Improving Register Usage Through High-level Transformations Minimizing Memory Access By Improving Register Usage Troug Hig-level Transformations San Li Scool of Computer Engineering anyang Tecnological University anyang Avenue, SIGAPORE 639798 Email: p144102711@ntu.edu.sg

More information

SEATTLE: A Scalable Ethernet Architecture for Large Enterprises

SEATTLE: A Scalable Ethernet Architecture for Large Enterprises TRC00349 ACM (Typeset by SPi, Manila, Pilippines) 1 of 35 February 23, 2011 14:31 SEATTLE: A Scalable Eternet Arcitecture for Large Enterprises 1 CHANGHOON KIM, Microsoft MATTHEW CAESAR, University of

More information

Tuning MAX MIN Ant System with off-line and on-line methods

Tuning MAX MIN Ant System with off-line and on-line methods Université Libre de Bruxelles Institut de Recerces Interdisciplinaires et de Développements en Intelligence Artificielle Tuning MAX MIN Ant System wit off-line and on-line metods Paola Pellegrini, Tomas

More information

Materials: Whiteboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector.

Materials: Whiteboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector. Adam Clinc Lesson: Deriving te Derivative Grade Level: 12 t grade, Calculus I class Materials: Witeboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector. Goals/Objectives:

More information

SlidesGen: Automatic Generation of Presentation Slides for a Technical Paper Using Summarization

SlidesGen: Automatic Generation of Presentation Slides for a Technical Paper Using Summarization Proceedings of te Twenty-Second International FLAIRS Conference (2009) SlidesGen: Automatic Generation of Presentation Slides for a Tecnical Paper Using Summarization M. Sravanti, C. Ravindranat Cowdary

More information

FUZZY INVENTORY MODEL WITH SINGLE ITEM UNDER TIME DEPENDENT DEMAND AND HOLDING COST.

FUZZY INVENTORY MODEL WITH SINGLE ITEM UNDER TIME DEPENDENT DEMAND AND HOLDING COST. Int J of Intelligent omputing and pplied Sciences 5 FZZY INVENORY MODEL WIH SINGLE IEM NDER IME DEPENDEN DEMND ND HOLDING OS S Barik SKPaikray S Misra K Misra orresponding autor: odma@driemsacin bstract:

More information

Asynchronous Power Flow on Graphic Processing Units

Asynchronous Power Flow on Graphic Processing Units Asyncronous Power Flow on Grapic Processing Units Manuel Marin, David Defour, Federico Milano To cite tis version: Manuel Marin, David Defour, Federico Milano. Asyncronous Power Flow on Grapic Processing

More information

Experimental Studies on SMT-based Debugging

Experimental Studies on SMT-based Debugging Experimental Studies on SMT-based Debugging Andre Sülflow Görscwin Fey Rolf Drecsler Institute of Computer Science University of Bremen 28359 Bremen, Germany {suelflow,fey,drecsle}@informatik.uni-bremen.de

More information

16th European Signal Processing Conference (EUSIPCO 2008), Lausanne, Switzerland, August 25-29, 2008, copyright by EURASIP

16th European Signal Processing Conference (EUSIPCO 2008), Lausanne, Switzerland, August 25-29, 2008, copyright by EURASIP 16t European Signal Processing Conference (EUSIPCO 008), Lausanne, Switzerland, August 5-9, 008, copyrigt by EURASIP ADAPTIVE WINDOW FOR LOCAL POLYNOMIAL REGRESSION FROM NOISY NONUNIFORM SAMPLES A. Sreenivasa

More information

UNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING

UNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING UNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING Raffaele Gaetano, Giuseppe Scarpa, Giovanni Poggi, and Josiane Zerubia Dip. Ing. Elettronica e Telecomunicazioni,

More information

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method Engineering, 2013, 5, 522-526 ttp://dx.doi.org/10.4236/eng.2013.510b107 Publised Online October 2013 (ttp://www.scirp.org/journal/eng) Two Modifications of Weigt Calculation of te Non-Local Means Denoising

More information

11. Transceiver Link Debugging Using the System Console

11. Transceiver Link Debugging Using the System Console November 2011 QII53029-11.1.0 11. Transceiver Link Debugging Using te System Console QII53029-11.1.0 Tis capter describes ow to use te Transceiver Toolkit in te Quartus II sotware. Te Transceiver Toolkit

More information

Introduction to Computer Graphics 5. Clipping

Introduction to Computer Graphics 5. Clipping Introduction to Computer Grapics 5. Clipping I-Cen Lin, Assistant Professor National Ciao Tung Univ., Taiwan Textbook: E.Angel, Interactive Computer Grapics, 5 t Ed., Addison Wesley Ref:Hearn and Baker,

More information

Brief Contributions. A Hybrid Flash File System Based on NOR and NAND Flash Memories for Embedded Devices 1 INTRODUCTION

Brief Contributions. A Hybrid Flash File System Based on NOR and NAND Flash Memories for Embedded Devices 1 INTRODUCTION 1002 IEEE TRANSACTIONS ON COMPUTERS, VOL. 57, NO. 7, JULY 2008 Brief Contributions A Hybrid Flas File System Based on NOR and NAND Flas Memories for Embedded Devices Cul Lee, Student Member, IEEE, Sung

More information

Cubic smoothing spline

Cubic smoothing spline Cubic smooting spline Menu: QCExpert Regression Cubic spline e module Cubic Spline is used to fit any functional regression curve troug data wit one independent variable x and one dependent random variable

More information

Extended Synchronization Signals for Eliminating PCI Confusion in Heterogeneous LTE

Extended Synchronization Signals for Eliminating PCI Confusion in Heterogeneous LTE 1 Extended Syncronization Signals for Eliminating PCI Confusion in Heterogeneous LTE Amed H. Zaran Department of Electronics and Electrical Communications Cairo University Egypt. azaran@eecu.cu.edu.eg

More information

15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes

15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes 15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes William Lovas (wlovas@cs) Karl Naden Out: Tuesday, Friday, June 10, 2011 Due: Monday, June 13, 2011 (Written

More information

MAC-CPTM Situations Project

MAC-CPTM Situations Project raft o not use witout permission -P ituations Project ituation 20: rea of Plane Figures Prompt teacer in a geometry class introduces formulas for te areas of parallelograms, trapezoids, and romi. e removes

More information

Forward End-To-End delay Analysis for AFDX networks

Forward End-To-End delay Analysis for AFDX networks Forward End-To-End delay Analysis for AFDX networks Nassima Benammar, Frederic Ridouard, Henri Bauer and Pascal Ricard e-mail: {nassima.benammar,frederic.ridouard, pascal.ricard}@univ-poitiers.fr enri.bauer@ensma.fr

More information

Section 1.2 The Slope of a Tangent

Section 1.2 The Slope of a Tangent Section 1.2 Te Slope of a Tangent You are familiar wit te concept of a tangent to a curve. Wat geometric interpretation can be given to a tangent to te grap of a function at a point? A tangent is te straigt

More information

MAPI Computer Vision

MAPI Computer Vision MAPI Computer Vision Multiple View Geometry In tis module we intend to present several tecniques in te domain of te 3D vision Manuel Joao University of Mino Dep Industrial Electronics - Applications -

More information

Vector Processing Contours

Vector Processing Contours Vector Processing Contours Andrey Kirsanov Department of Automation and Control Processes MAMI Moscow State Tecnical University Moscow, Russia AndKirsanov@yandex.ru A.Vavilin and K-H. Jo Department of

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Researc in Computer Science and Software Engineering Researc Paper Available online at: www.ijarcsse.com Performance

More information

Dynamic Channel Assignment and Reassignment for Exploiting Channel Reuse Opportunities in Ad Hoc Wireless Networks

Dynamic Channel Assignment and Reassignment for Exploiting Channel Reuse Opportunities in Ad Hoc Wireless Networks Dynamic Cannel Assignment and Reassignment for Exploiting Cannel Reuse Opportunities in Ad Hoc Wireless Networks Ci-Yung Cang *, Po-Ci Huang *, Cao-Tsun Cang +, and Yu-Syan Cen ++ * Department of Computer

More information

Efficient Content-Based Indexing of Large Image Databases

Efficient Content-Based Indexing of Large Image Databases Efficient Content-Based Indexing of Large Image Databases ESSAM A. EL-KWAE University of Nort Carolina at Carlotte and MANSUR R. KABUKA University of Miami Large image databases ave emerged in various

More information

ITERNET of Things (IoT) envisages a future in which a large

ITERNET of Things (IoT) envisages a future in which a large IEEE TANSACTIONS ON VEHICULA TECHNOLOGY, VOL. 66, NO. 10, OCTOBE 2017 9381 An Accurate Security Game for Low-esource IoT Devices Hicem Sedjelmaci, Member, IEEE, Sidi Moamed Senouci, Member, IEEE, and Tarik

More information

Unsupervised Learning for Hierarchical Clustering Using Statistical Information

Unsupervised Learning for Hierarchical Clustering Using Statistical Information Unsupervised Learning for Hierarcical Clustering Using Statistical Information Masaru Okamoto, Nan Bu, and Tosio Tsuji Department of Artificial Complex System Engineering Hirosima University Kagamiyama

More information

BRICK: A Novel Exact Active Statistics Counter Architecture

BRICK: A Novel Exact Active Statistics Counter Architecture BRICK: A ovel Exact Active Statistics Counter Arcitecture an Hua Bill Lin Jun (Jim) Xu Haiquan (Cuck) Zao College of Computing, Georgia Tec Dept of ECE, UCSD ABSTRACT In tis paper, we present an exact

More information

Haptic Rendering of Topological Constraints to Users Manipulating Serial Virtual Linkages

Haptic Rendering of Topological Constraints to Users Manipulating Serial Virtual Linkages Haptic Rendering of Topological Constraints to Users Manipulating Serial Virtual Linkages Daniela Constantinescu and Septimiu E Salcudean Electrical & Computer Engineering Department University of Britis

More information

TREES. General Binary Trees The Search Tree ADT Binary Search Trees AVL Trees Threaded trees Splay Trees B-Trees. UNIT -II

TREES. General Binary Trees The Search Tree ADT Binary Search Trees AVL Trees Threaded trees Splay Trees B-Trees. UNIT -II UNIT -II TREES General Binary Trees Te Searc Tree DT Binary Searc Trees VL Trees Treaded trees Splay Trees B-Trees. 2MRKS Q& 1. Define Tree tree is a data structure, wic represents ierarcical relationsip

More information