Efficient protection of many-to-one. communications

Size: px
Start display at page:

Download "Efficient protection of many-to-one. communications"

Transcription

1 Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, Rennes Cedex, Fance Abstact. The dependability of a netwok is its ability to cope with failues, i.e., to maintain established connections even in case of failues. IP outing potocols (such as OSPF and RIP) do not fit the dependability objectives of today applications. Moeove, fowading techniques based on destination addess (like IP) induce many-to-one connections. If a dependable connection is needed, all pimay paths and potections having the same destination must be established in a coodinated way. In this pape, we popose a fault ecovey fo many-to-one connections based on a cold (peplanned) potection. The main advantage of ou appoach is that the ecovey in case of failues is achieved within a shot delay. Additionally, with espect to othe appoaches, the dependability of the outing scheme is inceased in the way that it statistically copes with many failues. The algoithm we popose computes an efficient backup fo an abitay pimay tee using an impoved multi-tee algoithm. Keywods: netwok, fault-toleant outing, many-to-one, cold potection, multi-tee algoithm

2 1 Intoduction High-speed netwoks ae becoming inceasingly impotant and allows the development of applications with eal-time constaints, such as multimedia sevices, coopeative systems, distibuted computing. These applications often ely on the suvivability of the netwok: communications should not be inteupted fo a long time by a failue of a link o of a oute. Indeed, the longe the communication is inteupted, the moe packets ae dopped. The poblem of fast ecovey has been well studied fo seveal types of communications, including boadcast (one-to-all), unicast (one-to-one) and multicast (one-to-many). Howeve, thee is no efficient poposition fo dependable incast (many-to-one) communications. Incast connections ae many-to-one, i.e., seveal souces send data to a single destination. An incast connection can be the suppot of homogeneous o heteogeneous communications. Examples of applications inducing homogeneous communications include log collection, data gatheing in senso netwoks, auction sales and massive submissions. In netwoks whee the fowading of packets is based on thei destination addess (such as IP netwoks), all the communications towad the same destination fom an incast connection. In this case, the connection is heteogeneous since it is composed of communications having diffeent equiements and potocols. Fo example, a FTP communication fom an host A to an host C

3 and a HTTP communication fom an host B to an host C fom an incast connection. Incast connections ae taditionally ealized using a tee 1. Implementing dependable communications is a majo thead fo cuent netwoks. Indeed, the netwok is supposed to be suvivable, i.e., it should withstand failues of links o outes. Two measues of the dependability of a netwok can be consideed: the ecovey delay and the numbe of failues managed [1]. It is theefoe citical to educe the ecovey delay as much as possible. Classical ecovey delays of IP potocols such as OSPF o RIP each tens of seconds (see [2] fo OSPF and the slow convegence poblem [3] fo RIP). The othe measue, the numbe of failues managed by a ecovey mechanism, impacts on the eliability of the netwok. In ou model, we conside two types of failues: independent failues and highly coelated failues. Thee is a tade-off fo the ecovey mechanisms in potecting efficiently against independent failues and highly coelated failues. Ou objective is to ecove quickly fom failues on an incast communication while coping with as much failues as possible. In this pape, we popose a cold peplanned potection that allows local ecovey using ac-disjoint tees. Ou constuction of ac-disjoint tees is a genealization of the algoithm descibed in [4]. Section 2 gives a state of the at on dependable communications. Section 3 descibes ou potection constuction based on ac-disjoint tees. 1 Multicast connections ae also ealized using a tee, but incast connections and multicast connections ae not symmetic: multicast connections and multicast outing potocols equie a paticula mechanism in outes, the duplication mechanism, while incast connections do not equie any.

4 Section 4 descibes ou local ecovey mechanism. Section 5 analyzes the tade-off of potecting independent failues and highly coelated failues. Finally, we conclude ou wok in Section 6. 2 State of the at of dependable connections Seveal ways to cope with failues exist. In this section, we biefly suvey the existing appoaches to ealize dependable connections while concentating on ou main concen: the fastness of the ecovey. A detailed suvey on suvivability can be found in [5] (in the case of WDM netwoks). Hot and cold edundancy. Hot edundancy, denoted 1+1 edundancy, consists in sending each message on two disjoint paths simultaneously (cf. [6] fo an example). Hot edundancy allows fast ecovey since the destination eceives the packet fom one of the paths even if a failue on the othe path has occued and has not yet been detected. Howeve, hot edundancy wastes a lot of bandwidth. This majo dawback and the necessity of a selecting algoithm at the destination make hot edundancy not vey used. Cold edundancy, denoted 1:1 edundancy, consists in aising a ecovey mechanism once a failue is detected (cf. [6] again fo an example). Although 1:1 edundancies ae slowe than 1+1 edundancies because of the failue detection delay. They ae often pefeed since they save bandwidth. The estoation and potection ae the two main types of cold edundancy.

5 Restoation and potection. Restoation is a eactive appoach to cope with failues. At the time a failue is detected, the oute that detected the failue seaches fo a new path to eoute the taffic to the destination [7]. The advantage of estoation is that it adapts to the cuent state of the netwok. Howeve, intensive computations ae equied fo the oute to find a new path, which inceases the ecovey delay. Usual Intenet outing potocols use this appoach. Potection is a poactive appoach to cope with failues. The behavio of the outes in case of a failue is peplanned [8]. At the time the failue is detected, the oute eoutes the taffic to the peplanned potection path. This appoach has the advantage of being vey fast, since the ecovey is aised without any additional computation of the oute [9]. Howeve, less failues can be managed compaed to estoation since potection is poactive. Classic potections ae end-to-end o local. End-to-end and local. End-to-end ecovey consists in eouting the taffic at the souce on an ac-disjoint path, once a failue is detected. A typical example of end-to-end potection is the path-based potection. The delay induced by the end-to-end ecovey is high because the souce has fist to be infomed that a failue occued on the pimay path befoe aising the ecovey. Anothe dawback of path-based potection is that it cannot cope with two successive failues: if a failue occus on the pimay path and anothe occus on the altenate path, the connection is inteupted.

6 Local ecovey consists in eouting the taffic at the oute that detected a failue. A typical example of local ecovey is the link-based potection. The delay induced by the local ecovey is low because the ecovey is aised locally. Using link-based ecovey, seveal successive failues on the pimay path can be managed, as long as they concen diffeent links. A dawback of link-based potection (but not of local ecovey appoach) is that node failues ae not managed. A compaison of link-based potection and path-based potection can be found in [10]. In this pape, we popose a new local cold potection to ecove fom failues on incast connections within a shot delay, and without the dawback of the link-based potection. The specificity of incast connections is the lage numbe of souces; theefoe, taditional end-to-end ecovey mechanisms ae not suited to incast, whee all the souces have to be infomed of the failues that occued. 3 Poposed potection of incast tees Ou poposition aims the constuction of dependable incast connections. We show late that the dependability of the outing scheme is einfoced since the poposed potection statistically withstands many failues. Many-to-one connections equie the establishment of the pimay paths in a coodinated way. The backup paths should be synchonized togethe and also with the pimay paths. We call pimay tee the set of pimay paths.

7 Fo basic incast connections, the pimay tee is usually a shotest path tee. QoS awae incast connections may use diffeent patial spanning tees, depending on the netwok status. Fo this eason, we assume that the pimay incast tee is given to ou algoithm eithe by the application o by the netwok management. Often, this pimay tee spans only a sub-gaph of the given netwok. The objectives of the potection ae: (i) it should wok fo any topology and (ii) it should wok fo any given pimay tee (patial o not). In this section we pesent how ou potection can achieve these objectives. Since it efes to the multi-tee constuction algoithm poposed in [4], a bief desciption of the algoithm is done in the following. 3.1 Basic multi-tee constuction A multi-tee is a set of two diected tees that ae ac-disjoints. The algoithm pesented in [4] descibes a way to compute these two tees. The computation woks only in edge-edundant topologies and the two tees spans all the nodes of the netwok. The algoithm assumes that all links ae bidiectional. The multi-tee is built by adding successively extenal paths, as specified by Algoithm 1. An extenal path is a path stating in a spanned node u, ending in a spanned node v and such as all intemediate nodes ae not yet spanned by the multi-tee. Geneally, u v (except at the fist iteation o in the case of aticulation vetex whee u = v =, being eithe the oot o the aticulation node). Fom each extenal path, two

8 ac-disjoint banches ae extacted such as one of them ends at u while the othe ends at v. Algoithm 1 Multi-tee constuction. initialize the multi-tee with the destination node while an extenal path of the cuent multi-tee exists do select an extenal path p extact two ac-disjoint diected paths fom p add the two diected paths to the multi-tee end while Figue 1 shows the successive steps of the algoithm. In this example, an extenal path is chosen abitaily at each step. The coesponding two ac-disjoint banches ae shown on the figue. One of the tee of the multi-tee is epesented in solid lines (and is efeed to as the blue tee in [4]) while the othe is epesented in dashed lines (and is efeed to as the ed tee in [4]). Advantages. With the help of the multi-tee, tee-based communications can be potected against node and link failues in edge-edundant gaphs, and the multi-tee is elatively easy to compute. It can be applied to ealize hot-edundancy fo boadcast o incast communications o as a peplanned potection fo cold-edundancy. Dawbacks. One of the dawbacks of the descibed multi-tee potection is that the algoithm does not deal with abitay topologies, only with edge-edundant topologies.

9 PSfag eplacements u 1 v 1 u 2 v AA ,, --,, --,, -- v 3 FF GG FF GG FF GG :: ;; :: ;; :: ;; "" ## "" ## "" ## //.. //.. // u 3 not spanned node spanned node HH II HH II HH II JJ KK JJ KK JJ KK << == << == << == >>?? >>?? >>?? BB CC v BB 4 CC BB CC DD EE u DD 4 EE DD EE link edge of p $$ %% $$ %% $$ %% && '' && '' && ''!!!!!! u 5 v 5 (( )) (( )) (( )) ** ++ ** ++ ** ++ ac of one tee ac of the othe tee Fig. 1. The multi-tee constuction. A moe impotant dawback follows fom the fact that the selection of successive extenal paths is not detemined. Thus, the diamete of the tees (and as a consequence, the length of the pimay paths) can be abitay lage (fo example, it can be seen on Figue 1 that the distance in the solid tee fom node v 5 to the destination is vey long). The QoS equiement of the applications o the netwok management often impose the use of paticula pimay tees (e.g., of shotest path tees o QoS awae tees). Finally, in most incast communications, only a sub-set of nodes belongs to the set of the souces and so the incast tee is a patial spanning tee. The algoithm should be adapted to patial spanning tees.

10 In the following, we will specify how the diffeent dawbacks of the multi-tee based potection can be eliminated. 3.2 Extension to abitay topologies Often, in eal netwok, aticulation nodes o edges ae possible. Even in initially edundant netwoks, aticulations can be poduced due to pesistent failues. The potection computation should wok also in these cases. To build a multi-tee in an abitay connected netwok, we popose to add to the pevious algoithm a paticula case when aticulation edges ae found. In this case, we popose the ceation of two diected acs on the aticulation edge towad the destination. This edge is not potected against failue but no algoithm could have potected it. Howeve, if failues occu on othe pats of the netwok, they can be ecoveed. It can be noticed that the two tees of the multi-tee ae not ac-disjoints anymoe. 3.3 Potection of a given incast spanning tee In netwok, failues ae ae. Theefoe, the chosen tee used if no failue occus has to ensue an efficient delivey of data packets and cetain QoS citeion. Geneally, none of the diected tees built by the multi-tee algoithm does coespond to a good pimay tee and can not be used fo the communications. Howeve, computing a multi-tee can help in

11 finding the backup suppot of the desied pimay tee as pesented in the following 2. To adapt the potection to a given (total) pimay tee (fo example to the shotest-path tee), we popose the constuction of a multi-tee spanning all of the acs of the given pimay tee. Ou dependable incast connection computation contains two steps: (i) the computation of a multi-tee spanning a given pimay tee and (ii) the constuction of a backup foest on the basis of the multi-tee. Multi-tee constuction fo a given pimay tee To ensue that the pimay tee T p is coveed by the multi-tee, we have to ensue that T p is coveed by the union of the extenal paths selected duing the multitee constuction. In othe wods, we have to ensue that evey ac of T p is coveed by an ac of the multi-tee. Let us denote by dist(t p,, n) the hop distance fom to a node n in T p. At each iteation, the algoithm selects an extenal path containing exactly one edge (n 1, n 2 ) that is not in the pimay tee T p and with at least one node of {n 1, n 2 } not spanned by the multi-tee. One can pove that this kind of extenal path exists if the topology is edundant and the pimay tee spans it. If thee ae seveal candidates, then the extenal path minimizing dist(t p,, n 1 )+dist(t p, n 2, ) is selected. Figue 2 shows such an edge on an example whee the pimay tee T p coesponds to the 2 To simplify let us suppose hee that, similaly to the multi-tee computation, all nodes of the netwok will paticipate to the incast communication. The case of patial spanning tees is discussed in the next sub-section.

12 shotest-path tee. Having chosen the not yet spanned edge (n 1, n 2 ), the extenal path p fom u to v can be found as follows: u and v ae spanned by the multi-tee, p contains the path in the pimay tee fom n 1 to u, the edge (n 1, n 2 ) and the path fom n 2 to v. %% && %% && %% && PSfag eplacements ++,, ++,, ++,,!! ""!! ""!! "" '' (( '' (( '' (( --.. ## $$ )) ** --.. ## $$ )) ** --.. ## $$ )) ** u v u v // 00 // 00 // 00 [3+3] n 1 n 2 n 1 n 2 Fig. 2. An extenal path on a shotest-path tee. Minimizing the hop distance dist(t p,, n 1 ) + dist(t p, n 2, ) on T p allows the potection to be dense. A dense potection is moe obust in the case of multiple failues than a spase potection. Popety 1 shows that ou selection of extenal paths ensue that the pimay tee T p is coveed by the multi-tee. Popety 1. The acs of the diected pimay tee T p ae in the multi-tee built by ou algoithm. Poof. Thee is only one outgoing ac fo each node of the tee T p diected to the oot. The computed multi-tee spans all the nodes by successive extenal paths. To pove the popety, it is sufficient to show that adding a node to the multi-tee implicates also adding its outgoing ac in the pimay tee T p. Let p be an extenal path fom the node u to v selected

13 at any iteation of the algoithm. In a fist time, we show that the outgoing ac of any node n p is in p and in a second time we show that thee is an ac diected to the same diection in the multi-tee. Let us assume that the outgoing ac of n in T p is not in p. In this case, the adjacent edge of n p ae not in T p but this is impossible because thee is only one edge in p which is not in T p. The multi-tee algoithm associates two outgoing acs (one in each diected tee of the multi-tee) to each node, except u and v. The outgoing ac on T p of any node diffeent fom u and v coesponds to an ac in the ceated multi-tee. Constuction of the backup foest Ou impoved multi-tee algoithm builds a multi-tee M = (T 1, T 2 ) coveing the pimay tee T p. To obtain the backup suppot of the pimay tee, Algoithm 2 is poposed: Algoithm 2 Backup foest constuction. Requie: T p a pimay tee, M = (T 1, T 2 ) a multi-tee coveing T p F acs(t 1 ) acs(t 2 ) F F \acs(t p ) The fist step of the algoithm meges the acs of T 1 and T 2 into the diected set F. T 1 and T 2 ae disjoint, except fom the acs on the aticulation edges. Then, in F, only one ac exists on the aticulation edges. The second step of the algoithm emoves in F the pimay acs of T p. The emaining acs ae the backup potection of T p. It can be noticed that F is a foest.

14 3.4 Patial spanning tees Geneally, only a sub-set of the nodes paticipates to the incast communication. To ceate a patial multi-tee which coves at least the patial pimay tee, we popose two algoithms. A simple solution can be obtained by computing the multi-tee spanning all the nodes and by puning the pats that ae not used o edundant. This solution equies an impotant computation even if thee ae few nodes in the set of souces 3. A moe efficient computation can be obtained if only the equied pat of the multi-tee is built. The patial multi-tee can be built with the help of successive shotest loops fom the destination to the souces following the pimay paths in the evese diection. The extenal path selection and the stop condition of the multi-tee algoithm should be modified accodingly. Nodes which ae in the patial multi-tee but not in the pimay tee have two diected paths to the destination. The outgoing acs which is not in the pimay tee can be deleted because the potection of these nodes is not needed. Othe outgoing acs ae used as backup segments fo the pimay tee 4. Figue 3 illustates the patial multi-tee constuction and the obtained potection scheme. The left pat of the figue shows the patial multi-tee constuction. The pimay tee T p, in thick lines, is contained in M = (T 1, T 2 ). The ight pat of the figue, the 3 In this case, poof of Popety 1 emains the same, as long as the puning does not alte neithe the pimay tee no the backup foest. 4 In this case, the poof of Popety 1 is not valid anymoe. Howeve, a simila poof can be done by noticing that the last pat of the extenal path coesponds to the path in the pimay tee T p.

15 obtained potection scheme, shows the pimay tee T p in solid lines and its backup F in dashed lines. PSfag eplacements node node paticipating to outing 2 ** ++ ** ++ ** ++!!!!!! $$ %% $$ %% $$ %% "" ##,, -- "" ##,, -- a "" ##,, -- && '' b && (( '' )) (( )) && '' (( )) souce patial tee solid tee dashed tee pimay tee backup ac Fig. 3. Multi-tee and backup constuction fo a patial incast tee. 4 Poposed ecovey mechanism The pevious section descibed how to compute a potection fo a given tee. Once the potection has been configued, a local ecovey mechanism has to be implemented in outes to potect the connection against failues. Let us ecall that the potection ensues that, fo evey node n of the pimay tee, thee exists two ac-disjoint paths fom n to the destination of the incast connection. We assume that all the outes can stoe two enties fo evey destination. The pimay enty fo the node n coesponds to the fist edge on the pimay path towad the destination and the altenate enty coesponds to the fist edge of the backup path. If a oute detects a failue

16 on the pimay enty fo a destination, it switches its pimay enty to its altenate enty. A oute detects a failue popagation need when it eceives a packet fo a destination on an inteface which coesponds to the next hop fo on the pimay path. In this case, it switches its pimay enty to its altenate enty to avoid loops. This failue popagation occus only when the backup path uses the edges of the pimay path in the evese diection. Fo example, if node a of Figue 3 detects that the link (a, ) failed, it switches to its altenate enty (failue detection). Then, the packets that each a ae fowaded to b. When eceiving a packet fom a fo, b detects that a is the next hop to on its pimay path. Then, b switches to its altenate enty (failue popagation). The packets follow the backup path up to. Now that we descibed ou potection and ou ecovey, the next section analyzes its behavio in the case of independent o highly coelated failues. 5 Analysis of the dependability in the case of multiple failues In this section, we analyze the dependability of seveal potections in case of multiple failues. The numbe of failues that can be managed by a potection geatly depends on the netwok topology and on the incast connection. To study the dependability of a potection in the case of

17 multiple failues, we popose to discuss on the numbe of failues that do not inteupt communications. 5.1 Independent failues In ou model of independent failues, we assume that failues occu successively on the pimay path. Indeed, failues that do not occu on a pimay path do not impact communications. Path-based potection When the fist failue occus on the pimay path and the souce is infomed, the taffic is swapped to the backup path at the souce. Then, if an independent failue touches the backup path, the communication is inteupted. Link-based potection Link-based potections do not cope with node failues. In the case of a link failue, the bypass is used to each the next node while the est of the pimay path is used. If an ulteio link failue occus on the pimay path, anothe bypass can be used if and even if the second bypass is link-disjoint with the fist bypass. The link-based potection allows independent link failues if the bypasses ae independent. Howeve, it does not cope with failues which occus on the bypasses. Ou potection The poposed incast tee potection copes with a link o a node failue. If a second failue touches the backup used to ecove fom a fist failue, thee ae two possibilities. If this backup coesponds to a pimay path of anothe communication and its backup is diffeent fom

18 % & % & % & % & % & $ $ $ $ $ G H G H G H @ > > > > > the fist pimay path, then the local ecovey is possible. If the failed pat of the backup does not coespond to a pimay path of anothe communication o if the backup of this failed point uses the fist failed pimay path, then the mechanism cannot cope with the failue. The mechanism is illustated on Figue 4 (A) and (B) in the case of PSfag eplacements link and node failues. node node paticipating to outing souce patial tee solid tee dashed tee pimay tee backup ac QQ RR QQ RR QQ RR SS TT SS TT SS TT MM NN MM NN MM NN II JJ II JJ II JJ V KK LL KK LL KK LL (A) WW XX WW XX WW XX OO PP OO PP OO PP ecovey path UU VV UU VV UU VV '' (( aa bb aa bb aa bb cc dd cc dd cc dd ]] ^^ ]] ^^ ]] ^^ YY ZZ YY ZZ YY!!! ZZ!!!!!!!!!!!! """ ### """ ### """ ### """ ### """ ### [[ \\ `` ))) *** [[ \\ `` +++,,, [[ \\ `` (B) gg hh gg hh gg hh ee ff ee ff ee ff AAA BBB qq qq qq ss tt ss tt ss tt CCC DDD mm nn... mm nn... mm //// nn //// //// //// //// //// ii jj ////... ii jj ::: ii ;;; jj ::: ;;; ::: ;;; ::: ;;; ::: ;;; kk ll kk ll kk ll (C) ww xx ww xx ww xx oo pp oo pp oo pp <<< === <<< === <<< === <<< === <<< === EEE FFF uu vv uu vv uu vv s Fig. 4. Recovey capability of ou mechanism. 5.2 Highly coelated failues In ou model of highly coelated failues, the failues occu simultaneously on adjacent links o nodes of the netwok: a connected subgaph of the netwok fails. The highe the potection esists to highly coelated failues, the highe can be the diamete of the failed subgaph without inteupting communications. In the same way than peviously, we assume that at least a link o a node of pimay tee fails. Path-based potection Simultaneous failues can occu on the links and nodes of a pimay path. The path based potection copes with lage

19 diamete of failues when all intenal nodes and edges of the pimay path failed. Howeve, the altenate path should be intact. Link-based potection Since link-based potection does not cope with node failues, the maximal diamete of a ecoveed failue is one link. Ou potection In edundant topologies, the poposed tee-based potection gives a link-disjoint altenate path fom all the nodes of the pimay path to the destination. Highly coelated failues on a pimay path with lage diamete can be ecoveed. Moeove in the case of dense incast communications, the mechanism copes with failues which occu on the altenate paths. Figue 4 (C) shows the maximal sub-set of the netwok which can fail with ecovey fom a souce s. 6 Conclusion In this pape, we pesented a cold potection fo many-to-one communications. The potection computation is based on the constuction of a backup foest, given an abitay pimay tee. The ecovey uses a simple failue popagation mechanism and can be ealized by a local switch opeation in the concened outes. Thus, it poduces low failue ecovey delay. We studied the impact on the potection of two scenaios of failues: independent failues and highly coelated failues. We wee able to show that ou method can popose a tade-off between managing independent failues and highly coelated failues. In the futue, we intend to evaluate quantitatively ou potection though simulations.

20 Refeences 1. Duato, J.: A theoy of fault-toleant outing in womhole netwoks. IEEE Tansactions on Paallel and Distibuted Systems 8 (1997) Goyal, M., Ramakishnan, K.K., Feng, W.C.: Achieving Faste Failue Detection in OSPF Netwoks. In: IEEE ICC. (2003) 3. Obadovic, D.: Fomal Analysis of Convegence of Routing Potocols. PhD thesis, Univesity of Pennsylvania (2001) 4. Médad, M., Finn, S.G., Bay, R.A.: Redundant tees fo peplanned ecovey in abitay vetex-edundant o edge-edundant gaphs. In: IEEE/ACM Tansactions on Netwoking. Volume 7. (1999) Maie, G., Pattavina, A., De Pate, S., Matinelli, M.: Optical Netwok Suvivability: Potection Techniques in the WDM Laye. Photonic Netwok Communications 3/4 (2002) Anand, V., Qiao, C.: Static vesus dynamic establishment paths in WDM netwoks, Pat I. In: IEEE ICC. Volume 1. (2000) Ramamuthy, S., Mukhejee, B.: Suvivable WDM Mesh Netwoks, Pat II Restoation. In: IEEE ICC. Volume 3. (1999) Ramamuthy, S., Mukhejee, B.: Suvivable WDM Mesh Netwoks, Pat I Potection. In: IEEE INFOCOM. Volume 2. (1999) Nakamua, R., Ono, H., Nishikawaa, K.: Reliable switching sevices. In: IEEE Globecom. (1994) 10. Johnson, D., Johnson, G.N., Beggs, S.L., Botahm, C., Hawke, I., Chng, R.S.K., Sinclai, M.C., O Mahony, M.J.: Distibuted estoation stategies in telecommunications netwoks. In: IEEE ICC. Volume 1. (1994)

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE 5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai

More information

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Shortest Paths for a Two-Robot Rendez-Vous

Shortest Paths for a Two-Robot Rendez-Vous Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

ART GALLERIES WITH INTERIOR WALLS. March 1998

ART GALLERIES WITH INTERIOR WALLS. March 1998 ART GALLERIES WITH INTERIOR WALLS Andé Kündgen Mach 1998 Abstact. Conside an at galley fomed by a polygon on n vetices with m pais of vetices joined by inteio diagonals, the inteio walls. Each inteio wall

More information

Chapter 4 Network Layer

Chapter 4 Network Layer Chapte 4 Netwok Laye Reti di Elaboatoi Coso di Lauea in Infomatica Univesità degli Studi di Roma La Sapienza Canale A-L Pof.ssa Chiaa Petioli Pate di queste slide sono state pese dal mateiale associato

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

Annales UMCS Informatica AI 2 (2004) UMCS

Annales UMCS Informatica AI 2 (2004) UMCS Pobane z czasopisma Annales AI- Infomatica http://ai.annales.umcs.pl Annales Infomatica AI 2 (2004) 33-340 Annales Infomatica Lublin-Polonia Sectio AI http://www.annales.umcs.lublin.pl/ Embedding as a

More information

Separability and Topology Control of Quasi Unit Disk Graphs

Separability and Topology Control of Quasi Unit Disk Graphs Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

Also available at ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010)

Also available at  ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) Also available at http://amc.imfm.si ISSN 1855-3966 (pinted edn.), ISSN 1855-3974 (electonic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) 109 120 Fulleene patches I Jack E. Gave Syacuse Univesity, Depatment

More information

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,

More information

IP MULTICAST. Adiseshu Hari, T. V. Lakshman and Gordon Wilfong Nokia Bell Labs

IP MULTICAST. Adiseshu Hari, T. V. Lakshman and Gordon Wilfong Nokia Bell Labs IP MULTICAST Adiseshu Hai, T. V. Lakshman and Godon Wilfong Nokia DIMACS Wokshop on Algoithms fo Data Cente Netwoks Rutges Univesity, NJ 1 Why is IP Multicast not deployed in public netwoks? Denial-of-Sevice

More information

Embeddings into Crossed Cubes

Embeddings into Crossed Cubes Embeddings into Cossed Cubes Emad Abuelub *, Membe, IAENG Abstact- The hypecube paallel achitectue is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

FACE VECTORS OF FLAG COMPLEXES

FACE VECTORS OF FLAG COMPLEXES FACE VECTORS OF FLAG COMPLEXES ANDY FROHMADER Abstact. A conjectue of Kalai and Eckhoff that the face vecto of an abitay flag complex is also the face vecto of some paticula balanced complex is veified.

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

Secure Collaboration in Mediator-Free Environments

Secure Collaboration in Mediator-Free Environments Secue Collaboation in Mediato-Fee Envionments Mohamed Shehab School of Electical and Compute Engineeing Pudue Univesity West Lafayette, IN, USA shehab@pudueedu Elisa Betino Depatment of Compute Sciences

More information

MANET QoS support without reservations

MANET QoS support without reservations SECURITY AND COMMUNICATION NETWORKS Secuity Comm. Netwoks (2010) Published online in Wiley InteScience (www.intescience.wiley.com)..183 SPECIAL ISSUE PAPER MANET QoS suppot without esevations Soon Y. Oh,

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

IS-IS Protocol Hardware Implementation for VPN Solutions

IS-IS Protocol Hardware Implementation for VPN Solutions IS-IS Potocol Hadwae Implementation fo VPN Solutions MOHAMED ABOU-GABAL, RAYMOND PETERKIN, DAN IONESCU School of Infomation Technology and Engineeing (SITE) Univesity of Ottawa 161 Louis Pasteu, P.O. Box

More information

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs Fault-Toleant Routing Schemes in RDT(,,)/α-Based Inteconnection Netwok fo Netwoks-on-Chip Designs Mei Yang, Tao Li, Yingtao Jiang, and Yulu Yang Dept. of Electical & Compute Engineeing Univesity of Nevada,

More information

Cryptanalysis of Hwang-Chang s a Time-Stamp Protocol for Digital Watermarking

Cryptanalysis of Hwang-Chang s a Time-Stamp Protocol for Digital Watermarking Cyptanalysis of Hwang-Chang s a Time-Stamp Potocol fo Digital Watemaking *Jue-Sam Chou, Yalin Chen 2, Chung-Ju Chan 3 Depatment of Infomation Management, Nanhua Univesity Chiayi 622 Taiwan, R.O.C *: coesponding

More information

Lecture 27: Voronoi Diagrams

Lecture 27: Voronoi Diagrams We say that two points u, v Y ae in the same connected component of Y if thee is a path in R N fom u to v such that all the points along the path ae in the set Y. (Thee ae two connected components in the

More information

The EigenRumor Algorithm for Ranking Blogs

The EigenRumor Algorithm for Ranking Blogs he EigenRumo Algoithm fo Ranking Blogs Ko Fujimua N Cybe Solutions Laboatoies N Copoation akafumi Inoue N Cybe Solutions Laboatoies N Copoation Masayuki Sugisaki N Resonant Inc. ABSRAC he advent of easy

More information

Automatically Testing Interacting Software Components

Automatically Testing Interacting Software Components Automatically Testing Inteacting Softwae Components Leonad Gallaghe Infomation Technology Laboatoy National Institute of Standads and Technology Gaithesbug, MD 20899, USA lgallaghe@nist.gov Jeff Offutt

More information

Reachable State Spaces of Distributed Deadlock Avoidance Protocols

Reachable State Spaces of Distributed Deadlock Avoidance Protocols Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

Configuring RSVP-ATM QoS Interworking

Configuring RSVP-ATM QoS Interworking Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP

More information

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation A Minutiae-based Fingepint Matching Algoithm Using Phase Coelation Autho Chen, Weiping, Gao, Yongsheng Published 2007 Confeence Title Digital Image Computing: Techniques and Applications DOI https://doi.og/10.1109/dicta.2007.4426801

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

Quality Aware Privacy Protection for Location-based Services

Quality Aware Privacy Protection for Location-based Services In Poceedings of the th Intenational Confeence on Database Systems fo Advanced Applications (DASFAA 007), Bangkok, Thailand, Apil 9-, 007. Quality Awae Pivacy Potection fo Location-based Sevices Zhen Xiao,,

More information

Erasure-Coding Based Routing for Opportunistic Networks

Erasure-Coding Based Routing for Opportunistic Networks Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant

More information

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

Parallel processing model for XML parsing

Parallel processing model for XML parsing Recent Reseaches in Communications, Signals and nfomation Technology Paallel pocessing model fo XML pasing ADRANA GEORGEVA Fac. Applied Mathematics and nfomatics Technical Univesity of Sofia, TU-Sofia

More information

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New

More information

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2 Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

Interference-Aware Multicast for Wireless Multihop Networks

Interference-Aware Multicast for Wireless Multihop Networks Intefeence-Awae Multicast fo Wieless Multihop Netwoks Daniel Letpatchya School of Electical and Compute Engineeing Geogia Institute of Technology Atlanta, Geogia 30332 0250 Douglas M. Blough School of

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks Numbe of Paths and Neighbous Effect on Multipath Routing in Mobile Ad Hoc Netwoks Oday Jeew School of Infomation Systems and Accounting Univesity of Canbea Canbea ACT 2617, Austalia oday.jeew@canbea.edu.au

More information

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology, (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Efficient Candidacy Reduction Fo Fequent Patten Mining M.H Nadimi-Shahaki 1, Nowati Mustapha 2, Md Nasi B Sulaiman 2, Ali B Mamat

More information

arxiv: v4 [cs.ds] 7 Feb 2018

arxiv: v4 [cs.ds] 7 Feb 2018 Dynamic DFS in Undiected Gaphs: beaking the O(m) baie Suende Baswana Sheejit Ray Chaudhuy Keeti Choudhay Shahbaz Khan axiv:1502.02481v4 [cs.ds] 7 Feb 2018 Depth fist seach (DFS) tee is a fundamental data

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers XFVHDL: A Tool fo the Synthesis of Fuzzy Logic Contolles E. Lago, C. J. Jiménez, D. R. López, S. Sánchez-Solano and A. Baiga Instituto de Micoelectónica de Sevilla. Cento Nacional de Micoelectónica, Edificio

More information

A programming model for spatio-temporal data streaming applications

A programming model for spatio-temporal data streaming applications Pocedia Compute Science Pocedia Compute Science 00 (2012) 1 10 Intenational Confeence on Computational Science, ICCS 2012 A pogamming model fo spatio-tempoal data steaming applications Shigeu Imai a,,

More information

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok 14260 Email:

More information

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1)

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1) 1 Multi Path PERT Ankit Singh and A. L. Naasimha Reddy Electical and Compute Engineeing Depatment, Texas A&M Univesity; email: eddy@ece.tamu.edu. Abstact This pape pesents a new multipath delay based algoithm,

More information

High performance CUDA based CNN image processor

High performance CUDA based CNN image processor High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu

More information

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the

More information

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery Poceedings of the 4th WSEAS Intenational Confeence on luid Mechanics and Aeodynamics, Elounda, Geece, August 1-3, 006 (pp337-34) Consevation Law of Centifugal oce and Mechanism of Enegy Tansfe Caused in

More information

Data mining based automated reverse engineering and defect discovery

Data mining based automated reverse engineering and defect discovery Data mining based automated evese engineeing and defect discovey James F. Smith III, ThanhVu H. Nguyen Naval Reseach Laboatoy, Code 5741, Washington, D.C., 20375-5000 ABSTRACT A data mining based pocedue

More information

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number.

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number. Illustative G-C Simila cicles Alignments to Content Standads: G-C.A. Task (a, b) x y Fo this poblem, is a point in the - coodinate plane and is a positive numbe. a. Using a tanslation and a dilation, show

More information

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Decentalized Tust Management fo Ad-Hoc Pee-to-Pee Netwoks Thomas Repantis Vana Kalogeaki Depatment of Compute Science & Engineeing Univesity of Califonia, Riveside Riveside, CA 92521 {tep,vana}@cs.uc.edu

More information

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),

More information

An Extension to the Local Binary Patterns for Image Retrieval

An Extension to the Local Binary Patterns for Image Retrieval , pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science

More information

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity

More information

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network An Efficient andove Mechanism Using the Geneal Switch Management Potocol on a Multi-Potocol abel Switching Netwok Seong Gon hoi, yun Joo Kang, and Jun Kyun hoi Using the geneal switch management potocol

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes On the Convesion between Binay Code and BinayReflected Gay Code on Boolean Cubes The Havad community has made this aticle openly available. Please shae how this access benefits you. You stoy mattes Citation

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer Using the Gow-And-Pune Netwok to Solve Poblems of Lage Dimensionality B.J. Biedis and T.D. Gedeon School of Compute Science & Engineeing The Univesity of New South Wales Sydney NSW 2052 AUSTRALIA bbiedis@cse.unsw.edu.au

More information

Automatic Generation of Reliable E Commerce Payment Processes

Automatic Generation of Reliable E Commerce Payment Processes Infomation Systems Engineeing (WISE 2000), Hong Kong, China, June 2000. Automatic Geneation of Reliable E Commece Payment Pocesses Heiko Schuldt Andei Popovici Hans-Jög Schek Institute of Infomation Systems

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

Gravitational Shift for Beginners

Gravitational Shift for Beginners Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational

More information

The Dual Round Robin Matching Switch with Exhaustive Service

The Dual Round Robin Matching Switch with Exhaustive Service The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

Efficient Execution Path Exploration for Detecting Races in Concurrent Programs

Efficient Execution Path Exploration for Detecting Races in Concurrent Programs IAENG Intenational Jounal of Compute Science, 403, IJCS_40_3_02 Efficient Execution Path Exploation fo Detecting Races in Concuent Pogams Theodous E. Setiadi, Akihiko Ohsuga, and Mamou Maekaa Abstact Concuent

More information

EE 6900: Interconnection Networks for HPC Systems Fall 2016

EE 6900: Interconnection Networks for HPC Systems Fall 2016 EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection

More information

On using circuit-switched networks for file transfers

On using circuit-switched networks for file transfers On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed

More information

Any modern computer system will incorporate (at least) two levels of storage:

Any modern computer system will incorporate (at least) two levels of storage: 1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe

More information

A Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces

A Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces A Family of Distibuted Deadlock Avoidance Potocols and thei Reachable State Spaces Césa Sánchez, Henny B. Sipma, and Zoha Manna Compute Science Depatment Stanfod Univesity, Stanfod, CA 94305-9025 {cesa,sipma,manna}@cs.stanfod.edu

More information

Voting-Based Grouping and Interpretation of Visual Motion

Voting-Based Grouping and Interpretation of Visual Motion Voting-Based Gouping and Intepetation of Visual Motion Micea Nicolescu Depatment of Compute Science Univesity of Nevada, Reno Reno, NV 89557 micea@cs.un.edu Géad Medioni Integated Media Systems Cente Univesity

More information

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

Multiview plus depth video coding with temporal prediction view synthesis

Multiview plus depth video coding with temporal prediction view synthesis 1 Multiview plus depth video coding with tempoal pediction view synthesis Andei I. Puica, Elie G. Moa, Beatice Pesquet-Popescu, Fellow, IEEE, Maco Cagnazzo, Senio Membe, IEEE and Bogdan Ionescu, Senio

More information

Cellular Neural Network Based PTV

Cellular Neural Network Based PTV 3th Int Symp on Applications of Lase Techniques to Fluid Mechanics Lisbon, Potugal, 6-9 June, 006 Cellula Neual Netwok Based PT Kazuo Ohmi, Achyut Sapkota : Depatment of Infomation Systems Engineeing,

More information

Hierarchical Peer-to-peer Systems

Hierarchical Peer-to-peer Systems Hieachical Pee-to-pee ystems L. Gacés-Eice 1, E.W. Biesack 1, P.A. Felbe 1, K.W. Ross 2, and G. Uvoy-Kelle 1 1 Institut EURECOM 06904 ophia Antipolis, Fance {gaces ebi felbe uvoy}@euecom.f 2 Polytechnic

More information