Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput
|
|
- Roger Dorsey
- 5 years ago
- Views:
Transcription
1 Modeling the Effect of Mobile Handoff on TCP and TFRC Throughput Antonio Argyriou and Vijay Madietti School of Electrical and Computer Engineering Georgia Intitute of Technology Atlanta, Georgia , USA Abtract At the forefront of the recent advance in mobile network i the development of ophiticated mobility management mechanim that are uually baed on Mobile IP and it derivative. Baed on thee mobility management protocol, everal tudie that characterize tranport protocol performance have been preented. In thi work we move one tep further, and preent a joint performance evaluation model of TCP and TFRC, with the underlying IP-baed mobility protocol. We develop tochatic model that can characterize the protocol performance during handoff between heterogeneou wirele network like WLAN, cellular, or WMAN. We preent performance evaluation reult for validating the developed model under a et of different handoff cenario. The developed model can be utilized a a bai for further analytical evaluation of new mobility management protocol, allowing thu a fat and accurate comparion. I. INTRODUCTION The wide-pread ucce of IP-baed mobile and wirele device, ha created a need for new network protocol and architecture o that revenue-generating and eamle ervice can be provided to the end uer. One of the firt challenge that ha to be reolved i that of mobility management. The functionality that mobility management define conit of two eparate operation location management and handoff management. Currently, the protocol that i conidered to be a practical approach to the above problem i Mobile IP [1]. Depite however the elegant olution that Mobile IP offer, TCP performance uffer from everal problem due to handoff caued by hot mobility [2]. Neverthele, modeling the performance of TCP i uch a mobile environment ha received little attention. There are everal model for quantitatively analyzing TCP throughput [3], [4], pecifically in the context of the wired internet. On the other hand, coniderable amount of work on modeling mobility management protocol i available, and epecially for mobile IP and it derivative [5], [6]. The main focu of the thee mobility management modeling approache ha been the characterization of the ignalling and proceing load a a meaure of protocol performance. We are aware of only one recent tudy [7], where the author evaluate the performance of the TCP-friendly rate control protocol TFRC [8] during handoff between aymmetric network. However, they do not attempt to model or expre analytically thi behavior. II. SYSTEM MODEL AND ASSUMPTIONS The propoed ytem model aume an end-to-end connection with the data flowing from the correpondent hot CH to the mobile hot MH. According to the mobility cenario that we want to analyze, the MH i initially aociated with the firt acce network AN 1, and at ome time in the future it may move toward AN 2. The two acce network are modeled eparately, while they are both attached to the core network CN which i the Internet. We make the aumption that while the mobile hot i connected to AN 1, the tranport protocol i in teady tate. Subequently, after handoff i performed to AN 2, the protocol will reach the teady tate at ome time in the future. Many tudie have hown that the firt-order two-tate Markov chain i.e. the Gilbert path model can approximate fairly well the behavior of the Internet. However, in thi paper we adopt the Bernoulli path model which i a implification of the Gilbert model. The reaon why we elected a impler path model come from the need to model TCP on the packet level and obtain a cloed form reult. By following a more complex path model, and therefore TCP model, the overall ytem complexity will be unnecearily increaed. With the Bernoulli model the only quantity needed to model the channel i the average packet lo rate. The average packet lo rate i imply calculated by dividing the number of lot packet v. the total number of packet lot or received for each of the two path: #lot P 1,2 = 1 #lot + received However, in order to capture the effect of the handoff we define the handoff packet lo rate P H, which repreent packet loe caued only by handoff. III. TCP MODEL WITH MOBILE HANDOFFS Objective of thi performance model i to evaluate how the pecific parameter related to handoff affect the tranient packet lo, and ultimately the actual TCP throughput. More pecifically, we aume that TCP i in the congetion avoidance phae when a handoff take place. We alo model a TCP connection between two endpoint by conidering round, that have a duration of one RTT. We name the number of RTT
2 round that pa until there i a packet lo a the NL round figure 1. During thi round, TCP end a burt of packet equal to the allowed window, and wait for acknowledgment. Thi approach, which i baed on renewal theory can lead to a cloed form olution for the average throughput. Sequence no. Fig. 1. RTT round FTT 1 A BTT 1 C: No more ack received, RTO tart RTO FTT 2 E L2 handoff diruption time X B packet ent packet received packet lot ack received BTT 2 time Packet-level TCP behavior at the ender during a handoff. A. Handoff packet lo rate P H Figure 1 will be ued for explaining the behavior of TCP during a handoff event. The variable FTT 1 /BT T 1, and FTT 2 /BT T 2 decribe the forward and backward trip time for the two acce network repectively. According to thi figure, at time intant t A, L2 connection i lot and at time t A +RTO, the TCP ender retranmit the firt lot packet. Even more, if t B >t C + FTT 1, then clearly no duplicate acknowledgment will be received at the ender, and the only way for TCP to reume the data flow i by expiration of the RTO of the firt lot packet. On the other hand, a T H hrink, and if t B t C + FTT 1 the probability to receive a number of the lat packet cloe to time intant t C i increaed. If thi happen, then the ender would fat retranmit the firt lot packet, reulting into a fater recovery. If we rewrite the previou equation we have and becaue t C = t A + BTT 1 : t B t C + FTT 1 T H RT T 1. Therefore, the probability of handoff induced packet lo i the probability of that the one way network latency L N, i maller than the handoff duration T H,or: P H = P [L T H ] 2 We define a f LN the ditribution of the end-to-end network induced latency. However, the election of f LN i a deciion orthogonal to our work in thi paper. In our cae we will model the one-way Internet latency a a Gamma ditribution that occur mainly due to buffering at the routing infratructure. On the other hand, the diruption time T H i a parameter that depend of the mobility management a protocol. B. Throughput Having calculated the packet lo probability due to handoff P H, we now have to calculate the actual number of packet ent and lot during the handoff event. Firt, we will ee how the congetion window i evolved when packet lo lead only to triple-duplicate event. Then we will calculate the probability that a packet lo event led to recovery of the lot packet with TO and we will alo calculate the number of packet ent during the TO event. Congetion window in congetion avoidance: Concerning the evolution of the congetion window, we next how the equation that decribe it evolution baed on the average endto-end packet lo rate. By re-uing the formula developed at [3], that decribe congetion window evolution a a function of the packet lo rate, we have: E[Wx h ]= 2 2+b 2b1 P x P H 2+b b 6 3P x + P H 6 3 where P x + P H i the aggregate end-to-end packet lo rate for either path 1 or 2 x =1, 2. Now if packet loe caued by handoff or other reaon in the end-to-end path, and thee loe create only triple duplicate event TD, the throughput formula would be of coure imilar to [3]: 1 P x P T x = x + E[Wx h ] RT T E[Wx h 4 ]b/2+1 However, there i the probability that packet loe caued by the handoff event or the end to end path lead to a timeout TO. Thi i what we calculate next. Probability of TO and TD event: Aume that the ender ha ent a window w worth of packet in the current RTT round. The probability that the firt i packet are acknowledged in thi round, given that the ret are lot becaue of a handoff or buffer overflow in the wireline path 1, i given by P HW = p H + p 1. Becaue packet lo in the wired path and handoff lo are independent, the previou equation become: P HW w, i = 1 P H i P H 1 1 P H w + 1 P 1 i P P 1 w 5 In the above equation the term 1 P i P expree the probability that i packet are received before one i lot on a channel with packet lo rate P. Alo 1 1 P w i the probability that a lo happen in a NLR where w packet were ent. We alo write the probability that m packet acknowledged from the n ent in the lat RTT round [3]: { P m Gn, m = H 1 P H if m n 1 PH m 6 if m = n Now, the probability that at mot two of them were acknowledged i gk = 2 i= Gk, i. The probability for a TO to happen, will be one of coure if w<3, ince not enough duplicate ACK can be received. Now let u ee what happen when w 3. In that cae a packet lo could lead to a TO in two cae: Firt, if TCP end
3 uccefully le than three packet from a round of w packet end, thi would lead to a TO becaue not enough duplicate acknowledgement will be received at the ender. Second, there i alo the probability that the number of acknowledged packet i more than three in one RTT round, while a TO happen becaue in the next round le than three packet are acknowledged. The contribution of the aforementioned two cae in the probability that a packet lo i a TO for path x will give the final: P TOx w = 2 w P HW w, k+ P HW w, kgk 7 k= k=3 Note alo that P TDx w =1 P TOx w. TO duration: Beide the probability for a TO to happen, we have to calculate the average duration of a timeout, baed on the probability that t B > t C + FTT 1 figure 1. The number of the retranmitted packet that will be lot leading to further RTO increae determine when the data flow will be reumed on the new link. Given that the duration of a handoff i T H = t B t A, the number of retranmitted packet depend on the duration of the timeout period, and ubequently on the number of exponential growth the TO timer experienced. We know that for TCP, j conecutive RTO event will have a duration: { 2 = j 1RT O if j< j 6RT O if j 7 where RT O i the initial value of the retranmiion timer. By inverting thi expreion, we obtain the number of RTO expiration: { log 2 RT O j = +1 if 2 6 1RT O 9 RT O +5 otherwie Therefore, the number of experienced TO will be obtained L by taking the of h RT O. Thi value will give the number of RTO expiration and the number of retranmitted packet. The previou equation finally give the expected number of packet ent during t C <t<t B : { E[S h ]= log 2 TH +1 if T H 2 6 1RT O TH +5 otherwie 1 and the duration of the induced TO i E[ ]+T H. Final throughput formula: Finally, by combining all the previou equation, the complete TCP throughput model that conider handoff between aymmetric link i given by: 1 P x Tx h P = x + E[Wx h ]+P TO E[S h ] RT T x E[Wx h ]b/2+1+p TO T H + E[ ] With thi formula we are able to etimate the throughput of TCP connection that i characterized by packet lo rate P x and RT T x after a diruption of T H econd happen. For the new path the P H will be zero which mean that the throughput etimate will only depend on the characteritic of the new path. It i intereting to note that we have decribed the TCP throughput a a function of the diruption time T H, which i eentially controlled by the mobility management cheme in ue, and the handoff packet lo rate P H. St RTT 1 link 1 link 2 B : A: L2 lot with link1 Convergence time t_inter t_inter 2 1 t_interx Fig. 2. B: L2 with link 2 etablihed time TFRC behavior during IP layer handoff. IV. TFRC THROUGHPUT After dealing with TCP, we proceed with the characterization of the rate control protocol TFRC [8]. Our goal i to quantify the effect of mobile handoff on a rate control protocol which ue a completely different congetion control algorithm. In thi paper we conider TFRC to be implemented on top of UDP. TFRC ue the cloed form equation for TCP throughput in order to regulate the ender output rate: T TFRC = 11 2p RT T 3 + t 3p RT O3 8 p1 + 32p2 where i the packet ize, RT T i the RTT etimate, and t RT O i the value of the retranmiion timer. In addition TFRC follow a packet pacing algorithm at the ender [8]. Note that, equation 11 doe not repreent the actual TFRC ending rate but only an upper bound for it. The actual output rate of TFRC i calculated uing the algorithm 1. In thi algorithm, repreent the packet ize, tld i time when the rate wa lat doubled, tmbi i the maximum back-off time 64 econd by default, and X recv i the average receive rate. If p i zero, no packet lo ha yet been een by the flow and in thi phae, the TFRC ender emulate low tart of TCP by doubling the tranmiion rate every RTT. However, the main feature of TFRC i that it react lowly and cautiouly to RTT change and thi mean that the throughput etimate change lowly when compared with TCP. Therefore, a udden change in the RTT and bandwidth of a link, a i the cae with handoff, will lead to coniderable packet loe. We will now attempt to model thi behavior. We tart by identifying the RTT etimation procedure that TFRC ue. Given a decay factor df,then-th RTT etimate i calculated a follow: RT T n = df RT T n 1 +1 df RT Tcur, with RT T cur be the lat real RTT meaurement.
4 Algorithm 1 TFRC rate etimation. 1: if p> then 2: X calc = T p, RT T, T 3: tfrc x = max[minx calc, 2 X recv, tmbi ] 4: ele 5: if tnow tld RT T then 6: tfrc x = maxmin2 tfrc x, 2 X recv,/rtt 7: end if 8: tld = tnow 9: end if When the TFRC ender doe not receive feedback during an entire RTT, it cut the output rate in half. If we aume that at intant t B, where handoff i over the ender end at leat on packet and receive feedback, then in a period of RT T 2 the ender will receive the firt feedback report. So for the handoff duration T H, the ender will reduce the rate in half every RT T 1, ince thi the lat RTT etimate. Therefore the total number of packet ent during T H will be gradually reduced with a total number: E[S h ]= T H RT Tcur i= 1 2 i T TFRC RT T 12 Therefore, for two link with different characteritic, p 1,RTT 1 and p 2,RTT 2, for link 1,2 or when t < t A or t>t C, the actual rate at the ender will be given by the baic TFRC formula: T A B + TFRC = max when t A <t<t B then: T AB TFRC = 1 T H 2 mint TFRC, 21 P 1,2 T TFRC, T H RT Tcur i= 1 2 i T TFRC RT T tmbi If t B <t<t C, the ender gradually tart to catch up with the new link characteritic: TTFRC BC = 1 ncv T TFRC RT T n cv RT T n 15 t cv n=1 We define a convergence time, t cv, the time needed for TFRC to obtain it fair hare of the bandwidth on the new link. Then we can rewrite the equation for RT T n : RT T n = df n RT T + df n 1 1 df RT T cur df RT T cur 16 which if we olve for n give: RT T n 1 df RT T cur n cv = log df RT T 1 df 1 df 17 RT T cur Therefore, n cv will give the number of RTT round needed in order for the RT T n etimate to converge to the RT T cur. In the handoff cae, RT T cur repreent the RT T 2 of the new link while RT T i the lat etimate we had and it i RT T 1. Practically we would like for RT T n to be cloe to 9% of the RT T cur. So the total convergence time will be: t cv = T H + n cv RT T n 18 The throughput i calculated from equation 13, 14, 15. V. EXPERIMENTS FOR MODEL VALIDATION The topology that form the bai of the imulation aume the handoff between two WLAN acce point. Each AP i connected to a LAN which i configured a follow: The value for bandwidth and delay of the LAN link are 1Mbp/1m and 5Kbp/1m for the GFA link, and two FA link, repectively. The elected parameter for TCP and TFRC in the imulation are: W max i 6MB, W i one egment, MSS i 146 byte, the RT O i 2 mec, and the i 15 byte. The cae tudy imulated i now decribed Initially, the MH initiate an FTP data flow from the correpondent hot CH. According to the cenario, at the time intant ec, the MH tart moving away from the firt acce point AP, at a peed of 1m/ec, and i heading toward the other AP. The FA follow the Mobile IP procedure in order to notify the HA after the MH regiter with new FA. In the cae of Hierarchical MIP, the GFA i the one that handle the handoff from the two FA that correpond to the two acce point: AP 1, and AP 2. Finally, for the MIP-RO cae we configured the MH to end a binding update directly to the CH. For all thee experiment we ued the n-2 [9] network imulator. HMIP and MIP-RO: With thi experiment, we want to evaluate the effect of the handoff diruption time T H,onthe throughput of a eion between the erver and the client. Throughput reult are hown in figure 3. A expected, even with MIP-RO, TCP throughput uffer coniderably when diruption time i increaed. The propoed model, predict a logarithmic decreae in throughput a the packet lo rate i increaed, which of coure depend on the duration of the diruption. Concerning the throughput for the combination of HMIP/buffering, we can oberve in figure 3 that TCP throughput remain coniderably table until the point where the diruption time come cloe to the average RTT of the end-to-end eion. Packet are buffered in the old AP and forwarded to the new AP, but after the buffer overflow, packet are dropped and the throughput decreae. Thi mean that after the point where the forwarding buffer i full, the throughput will continue to decreae very fat ince any new packet will be dropped. In figure 4 we preent reult for TFRC throughput. TFRC ue a rate control algorithm that react lowly to packet lo and RTT fluctuation. In addition TFRC make ue of a packet pacing algorithm that arrange the packet in time. A hown in figure 4, the combined MIP-RO/TFRC uffer from minimal packet loe and throughput degradation. With the addition of a buffer in the previou AP, thee loe are reduced further. Alo it i important to note that ince TFRC pace the packet
5 Throughput Kbyte/ Analytical for MIP-RO Simulation for MIP-RO Analytical for HMIP+buffering Simulation for HMIP+buffering Stabilization time ec Analytical for TCP+MIP Simulation for TCP+MIP Analytical for TFRC+MIP Simulation for TFRC+MIP Average diruption time T H ec Fig. 3. Throughput reult for a TCP eion of 15 econd and handoff between two different WLAN ubnet. Fig. 5. TFRC. Required recovery time veru diruption time for both TCP and Throughput Kbyte/ Analytical for MIP-RO Simulation for MIP-RO Analytical for HMIP+buffering Simulation for HMIP+buffering Average diruption time T H ec Fig. 4. Throughput reult for a TFRC eion of 15 econd and handoff between two different WLAN ubnet. in time, the buffer at the previou AP hould not overflow frequently ince it doe not receive packet burt a with TCP. Recovery period: We define a recovery period the time duration that the MH ha to be out of the handoff tate, o that the achieved throughput in thi time period reache the nominal for thi link. Eentially we want to know how fat TCP will recover from a handoff with a pecific duration T H. The anwer to thi quetion can alo give u ueful information concerning the effect of the handoff rate on the TCP throughput. Figure 5, preent reult for thi experiment when baeline Mobile IP wa ued for both TCP and TFRC protocol. We ee that for our model the required recovery period, i increaed exponentially diverging from the real meaurement which are not o peimitic. We believe that thi behavior i due the interpretation of more loe a a TO indication intead of TD. However, the TFRC model doe not have to claify packet lo type, allowing thu a more accurate etimation a figure 5 alo indicate. VI. CONCLUSIONS In thi paper we preented a model for tudying the effect of mobile handoff on two tranport protocol, namely TCP and TFRC. The model wa found to be accurate for TCP in both the cae where HMIP and MIP-RO were ued a the underlying mobility management protocol. However, the TFRC model predict the expected throughput with even better accuracy, due to the impler protocol algorithm. For example the wort cae error for the TCP model wa nearly 22% while for the TFRC model it wa 13%. We alo introduced in thi paper the notion of the recovery period. The low-reponive rate control algorithm of TFRC, require le time in order to recover when compared with TCP. However, we found that a the diruption time i increaed, TFRC uffer from more packet loe than TCP, due to the low-reponive algorithm. REFERENCES [1] C. Perkin, IP Mobility Support for IPv4, RFC 322, January 22. [2] H. Balakrihnan, Challenge to Reliable Data Tranport over Heterogeneou Wirele Network, Ph.D. diertation, UC Berkeley, [3] J. Padhye, V. Firoiu, and D. Towley, Modeling TCP Reno Performance: A Simple Model and It Empirical Validation, IEEE/ACM Tranaction on Networking, vol. 8, no. 2, pp , April 2. [4] B. Sikdar, S. Kalyanaraman, and K. Vatola, Analytic model for the latency and teady-tate throughput of TCP Tahoe, Reno and SACK, in INFOCOM, 21. [5] C. Blondia et al., Performance Analyi of Optimized Smooth Handoff in Mobile IP, in MSWiM, 22. [6], Performance Comparion of Low Latency Mobile IP cheme, in WiOpt, 23. [7] A. Gurtov, Effect of Vertical Handover on Performance of TCP-Friendly Rate Control, in ACM Computer Communication Review, 24. [8] M. Handley, S. Floyd, J. Pahdye, and J. Widmer, TCP Friendly Rate Control TFRC: Protocol Specification, RFC 3448, January 23. [9] Network imulator. [Online]. Available:
Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks
Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity
More informationModeling and Analysis of Slow CW Decrease for IEEE WLAN
Modeling and Analyi of Slow CW Decreae for IEEE 82. WLAN Qiang Ni, Imad Aad 2, Chadi Barakat, and Thierry Turletti Planete Group 2 Planete Group INRIA Sophia Antipoli INRIA Rhône-Alpe Sophia Antipoli,
More informationSLA Adaptation for Service Overlay Networks
SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada
More informationA Local Mobility Agent Selection Algorithm for Mobile Networks
A Local Mobility Agent Selection Algorithm for Mobile Network Yi Xu Henry C. J. Lee Vrizlynn L. L. Thing Intitute for Infocomm Reearch, 21 Heng Mui Keng Terrace, Singapore 119613 Email: {yxu, hlee, vriz}@i2r.a-tar.edu.g
More information1 The secretary problem
Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.
More informationThrough the Diversity of Bandwidth-Related Metrics, Estimation Techniques and Tools: An Overview
I. J. Computer Network and Information Security, 08, 8, -6 Publihed Oine Augut 08 in MECS (http://www.mec-pre.org/) DOI: 0.585/icni.08.08.0 Through the Diverity of Bandwidth-Related Metric, Etimation Technique
More informationA Practical Model for Minimizing Waiting Time in a Transit Network
A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,
More informationMAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc
MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic
More informationLecture 14: Minimum Spanning Tree I
COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce
More informationService and Network Management Interworking in Future Wireless Systems
Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering
More informationA System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems
International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem
More informationPerformance Evaluation of an Advanced Local Search Evolutionary Algorithm
Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation
More informationES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK
ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.
More informationAn Algebraic Approach to Adaptive Scalable Overlay Network Monitoring
An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring ABSTRACT Overlay network monitoring enable ditributed Internet application to detect and recover from path outage and period of degraded
More informationPerformance Evaluation and Comparison of Westwood+, New Reno, and Vegas TCP Congestion Control
Performance Evaluation and Comparion of,, and Vega TCP Congetion Control Luigi A. Grieco and Saverio Macolo Dipartimento di Elettrotecnica ed Elettronica, Politecnico di Bari, Italy {a.grieco,macolo}@poliba.it
More information[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata
he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two
More informationAnalyzing Hydra Historical Statistics Part 2
Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the
More informationModelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity
Modelling the impact of cyber attack on the traffic control centre of an urban automobile tranport ytem by mean of enhanced cyberecurity Yoana Ivanova 1,* 1 Bulgarian Academy of Science, Intitute of ICT,
More informationHow to Select Measurement Points in Access Point Localization
Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,
More informationDAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications
DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu
More informationDistributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router
Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To
More informationelse end while End References
621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized
More informationA Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *
Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm
More informationIncreasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment
Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in
More informationChapter 13 Non Sampling Errors
Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption
More informationOn successive packing approach to multidimensional (M-D) interleaving
On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a
More informationHassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,
COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)
More informationTopics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X
Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term
More informationA METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS
Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh
More informationA study on turbo decoding iterative algorithms
Buletinul Ştiinţific al Univerităţii "Politehnica" din Timişoara Seria ELECTRONICĂ şi TELECOMUNICAŢII TRANSACTIONS on ELECTRONICS and COMMUNICATIONS Tom 49(63, Facicola 2, 2004 A tudy on turbo decoding
More informationNetwork Coding in Duty-Cycled Sensor Networks
1 Network Coding in Duty-Cycled Senor Network Roja Chandanala, Radu Stoleru, Member, IEEE Abtract Network coding and duty-cycling are two popular technique for aving energy in wirele adhoc and enor network.
More informationUniversität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.
Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut
More informationA Handover Scheme for Mobile WiMAX Using Signal Strength and Distance
A Handover Scheme for Mobile WiMAX Uing Signal Strength and Ditance Mary Alatie, Mjumo Mzyece and Anih Kurien Department of Electrical Engineering/French South African Intitute of Technology (F SATI) Thwane
More informationManeuverable Relays to Improve Energy Efficiency in Sensor Networks
Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov
More informationA Multi-objective Genetic Algorithm for Reliability Optimization Problem
International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR
More informationMulti-Target Tracking In Clutter
Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and
More informationModeling Throughput and Delay in Infrastructure Mode Networks with QoS Support from the Point Coordination Function
Proceeding of the World Congre on Engineering and Computer Science 2012 Vol II, October 24-26, 2012, San Francico, USA Modeling Throughput and Delay in 802.11 Infratructure Mode Network with QoS Support
More informationIntegration of Digital Test Tools to the Internet-Based Environment MOSCITO
Integration of Digital Tet Tool to the Internet-Baed Environment MOSCITO Abtract Current paper decribe a new environment MOSCITO for providing acce to tool over the internet. The environment i built according
More informationRouting Definition 4.1
4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing
More informationPlanning of scooping position and approach path for loading operation by wheel loader
22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader
More informationRefining SIRAP with a Dedicated Resource Ceiling for Self-Blocking
Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT
More informationCoordinated TCP Westwood Congestion Control for Multiple Paths over Wireless Networks
Coordinated TCP Wetwood Congetion Control for Multiple Path over Wirele Network Tuan Anh Le, Choong eon Hong, and Eui-Nam Huh Department of Computer Engineering, Kyung Hee Univerity 1 eocheon, Giheung,
More informationLinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage
Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,
More informationDistributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II
IEEE INFOCO 2002 1 Ditributed Partial Information anagement (DPI) Scheme for Survivable Network - Part II Dahai Xu Chunming Qiao Department of Computer Science and Engineering State Univerity of New York
More informationOperational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz
Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,
More informationModeling of underwater vehicle s dynamics
Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation
More informationComputer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder
Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal
More informationApplication of Social Relation Graphs for Early Detection of Transient Spammers
Radolaw rendel and Henryk Krawczyk Application of Social Relation raph for Early Detection of Tranient Spammer RADOSLAW RENDEL and HENRYK KRAWCZYK Electronic, Telecommunication and Informatic Department
More informationSeparation of Routing and Scheduling in Backpressure- Based Wireless Networks
Separation of Routing and Scheduling in - Baed Wirele Network The MIT Faculty ha made thi article openly available. Pleae hare how thi acce benefit you. Your tory matter. Citation A Publihed Publiher Seferoglu,
More informationMinimum congestion spanning trees in bipartite and random graphs
Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu
More information/06/$ IEEE 364
006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in VHL and implemented
More informationFocused Video Estimation from Defocused Video Sequences
Focued Video Etimation from Defocued Video Sequence Junlan Yang a, Dan Schonfeld a and Magdi Mohamed b a Multimedia Communication Lab, ECE Dept., Univerity of Illinoi, Chicago, IL b Phyical Realization
More informationThe Association of System Performance Professionals
The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and
More informationDiverse: Application-Layer Service Differentiation in Peer-to-Peer Communications
Divere: Application-Layer Service Differentiation in Peer-to-Peer Communication Chuan Wu, Student Member, IEEE, Baochun Li, Senior Member, IEEE Department of Electrical and Computer Engineering Univerity
More informationAdvanced Encryption Standard and Modes of Operation
Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES
More informationTFRC-CR: An Equation-based Transport Protocol for Cognitive Radio Networks
213 International onference on omputing, Networking and ommunication (IN) Workhop on omputing, Networking and ommunication -R: An Equation-baed Tranport Protocol for ognitive Radio Network Abdulla K. Al-Ali
More informationKey Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.
Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in
More informationA SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS
A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt
More informationAnalysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer
International Reearch Journal of Applied and Baic Science 218 Available online at www.irjab.com ISSN 2251-838X / Vol, 12 (1): 49-53 Science Explorer Publication Analyi of the reult of analytical and imulation
More informationSee chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM
Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive
More informationCENTER-POINT MODEL OF DEFORMABLE SURFACE
CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D
More informationThe Implementation of an Adaptive Mechanism in the RTP Packet in Mobile Video Transmission
2011 International Conference on Information Management and Engineering (ICIME 2011) IPCSIT vol. 52 (2012) (2012) IACSIT Pre, Singapore DOI: 10.7763/IPCSIT.2012.V52.91 The Implementation of an Adaptive
More informationA Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong
4th International Conference on Machinery, Material and Computing Technology (ICMMCT 2016) A Load Balancing Model baed on Load-aware for Ditributed Controller Fengjun Shang, Wenjuan Gong College of Compute
More information3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES
MAKARA, TEKNOLOGI, VOL. 9, NO., APRIL 5: 3-35 3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES Mochammad Zulianyah Informatic Engineering, Faculty of Engineering, ARS International Univerity,
More informationETSI TS V ( )
TS 122 153 V14.4.0 (2017-05) TECHNICAL SPECIFICATION Digital cellular telecommunication ytem (Phae 2+) (GSM); Univeral Mobile Telecommunication Sytem (UMTS); LTE; Multimedia priority ervice (3GPP TS 22.153
More informationAvailable Bandwidth-Based Association in IEEE Wireless LANs
Available Bandwidth-Baed Aociation in IEEE 82. Wirele LAN Heeyoung Lee, Seongkwan Kim, Okhwan Lee, Sunghyun Choi, Sung-Ju Lee 2 School of Electrical Engineering & INMC, Seoul National Univerity, Seoul,
More informationShortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights
Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two
More informationMotion Control (wheeled robots)
3 Motion Control (wheeled robot) Requirement for Motion Control Kinematic / dynamic model of the robot Model of the interaction between the wheel and the ground Definition of required motion -> peed control,
More informationA Boyer-Moore Approach for. Two-Dimensional Matching. Jorma Tarhio. University of California. Berkeley, CA Abstract
A Boyer-Moore Approach for Two-Dimenional Matching Jorma Tarhio Computer Science Diviion Univerity of California Berkeley, CA 94720 Abtract An imple ublinear algorithm i preented for two-dimenional tring
More informationOn Peer-to-Peer Media Streaming Λ
On eer-to-eer Media Streaming Λ Dongyan Xu y, Mohamed Hefeeda, Suanne Hambruch, Bharat Bhargava Department of Computer Science urdue Univerity, Wet Lafayette, IN 797 fdxu, hefeeda, eh, bbg@c.purdue.edu
More informationA PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED
A PROBABILISTIC NOTION OF CAMERA GEOMETRY: CALIBRATED VS. UNCALIBRATED Jutin Domke and Yianni Aloimono Computational Viion Laboratory, Center for Automation Reearch Univerity of Maryland College Park,
More informationA Fast Association Rule Algorithm Based On Bitmap and Granular Computing
A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity
More informationJoint Congestion Control and Media Access Control Design for Ad Hoc Wireless Networks
Joint Congetion Control and Media Acce Control Deign for Ad Hoc Wirele Network Lijun Chen, Steven H. Low and John C. Doyle Engineering & Applied Science Diviion, California Intitute of Technology Paadena,
More informationDistributed Media-Aware Rate Allocation for Video Multicast over Wireless Networks
Ditributed Media-Aware Rate Allocation for Video Multicat over Wirele Network Xiaoqing Zhu, Thoma Schierl, Thoma Wiegand, Senior Member, IEEE, and Bernd Girod, Fellow, IEEE Abtract A unified optimization
More informationMinimum Energy Reliable Paths Using Unreliable Wireless Links
Minimum Energy Reliable Path Uing Unreliable Wirele Link Qunfeng Dong Department of Computer Science Univerity of Wiconin-Madion Madion, Wiconin 53706 qunfeng@c.wic.edu Micah Adler Department of Computer
More informationStress-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling
Stre-Blended Eddy Simulation (SBES) - A new Paradigm in hybrid RANS-LES Modeling Menter F.R. ANSYS Germany GmbH Introduction It i oberved in many CFD imulation that RANS model how inherent technology limitation
More information3D SMAP Algorithm. April 11, 2012
3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative
More informationConnected Placement of Disaster Shelters in Modern Cities
Connected Placement of Diater Shelter in Modern Citie Huanyang Zheng and Jie Wu Department of Computer and Information Science Temple Univerity, USA {huanyang.zheng, jiewu}@temple.edu ABSTRACT Thi paper
More informationp done CPU p user p drivdone 1-p drivdone
Approximate Analytical Performance Evaluation of a UNIX Baed Multiproceor Operating Sytem Stefan Greiner Duke Univerity Dept. of Electrical Engineering Durham, NC 2770-029, USA Box 9029 greiner@ee.duke.edu
More informationRepresentations and Transformations. Objectives
Repreentation and Tranformation Objective Derive homogeneou coordinate tranformation matrice Introduce tandard tranformation - Rotation - Tranlation - Scaling - Shear Scalar, Point, Vector Three baic element
More information(12) Patent Application Publication (10) Pub. No.: US 2011/ A1
(19) United State US 2011 0316690A1 (12) Patent Application Publication (10) Pub. No.: US 2011/0316690 A1 Siegman (43) Pub. Date: Dec. 29, 2011 (54) SYSTEMAND METHOD FOR IDENTIFYING ELECTRICAL EQUIPMENT
More informationSIMIT 7. Profinet IO Gateway. User Manual
SIMIT 7 Profinet IO Gateway Uer Manual Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult are only non-binding uggetion
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented
More informationWeb Science and additionality
Admin tuff... Lecture 1: EITN01 Web Intelligence and Information Retrieval Meage, lide, handout, lab manual and link: http://www.eit.lth.e/coure/eitn01 Contact: Ander Ardö, Ander.Ardo@eit.lth.e, room:
More informationLecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization
Lecture Outline Global flow analyi Global Optimization Global contant propagation Livene analyi Adapted from Lecture by Prof. Alex Aiken and George Necula (UCB) CS781(Praad) L27OP 1 CS781(Praad) L27OP
More informationAn Approach to a Test Oracle for XML Query Testing
An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,
More informationAspects of Formal and Graphical Design of a Bus System
Apect of Formal and Graphical Deign of a Bu Sytem Tiberiu Seceleanu Univerity of Turku, Dpt. of Information Technology Turku, Finland tiberiu.eceleanu@utu.fi Tomi Weterlund Turku Centre for Computer Science
More informationToday s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is
Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -
More informationKinematics Programming for Cooperating Robotic Systems
Kinematic Programming for Cooperating Robotic Sytem Critiane P. Tonetto, Carlo R. Rocha, Henrique Sima, Altamir Dia Federal Univerity of Santa Catarina, Mechanical Engineering Department, P.O. Box 476,
More informationA TOPSIS based Method for Gene Selection for Cancer Classification
Volume 67 No17, April 2013 A TOPSIS baed Method for Gene Selection for Cancer Claification IMAbd-El Fattah,WIKhedr, KMSallam, 1 Department of Statitic, 3 Department of Deciion upport, 2 Department of information
More informationMarkov Random Fields in Image Segmentation
Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image
More informationEfficient Data Forwarding in Mobile Social Networks with Diverse Connectivity Characteristics
Efficient Data Forwarding in Mobile Social Network with Divere Connectivity Characteritic Xiaomei Zhang and Guohong Cao Department of Computer Science and Engineering The Pennylvania State Univerity, Univerity
More informationImproving TCP Performance in High Bandwidth High RTT Links Using Layered Congestion Control
1 Improving P Performance in High Bandwidth High R Link Uing Layered ongetion ontrol Sumitha Bhandarkar, Saurabh Jain and A. L. Naraimha Reddy Dept. of Electrical Engineering, exa A & M Univerity umitha,aurabhj,reddy
More informationThe norm Package. November 15, Title Analysis of multivariate normal datasets with missing values
The norm Package November 15, 2003 Verion 1.0-9 Date 2002/05/06 Title Analyi of multivariate normal dataet with miing value Author Ported to R by Alvaro A. Novo . Original by Joeph
More informationImage authentication and tamper detection using fragile watermarking in spatial domain
International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: 2278 1323 Image authentication and tamper detection uing fragile watermarking
More informationDWH Performance Tuning For Better Reporting
DWH Performance Tuning For Better Sandeep Bhargava Reearch Scholar Naveen Hemrajani Aociate Profeor Dineh Goyal Aociate Profeor Subhah Gander IT Profeional ABSTRACT: The concept of data warehoue deal in
More informationStochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang
Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,
More informationEdits in Xylia Validity Preserving Editing of XML Documents
dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,
More information