Efficient protection of many-to-one. communications
|
|
- Annabel Daniels
- 5 years ago
- Views:
Transcription
1 Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, Rennes Cedex, Fance Abstact. The dependability of a netwok is its ability to cope with failues, i.e., to maintain established connections even in case of failues. IP outing potocols (such as OSPF and RIP) do not fit the dependability objectives of today applications. Moeove, fowading techniques based on destination addess (like IP) induce many-to-one connections. If a dependable connection is needed, all pimay paths and potections having the same destination must be established in a coodinated way. In this pape, we popose a fault ecovey fo many-to-one connections based on a cold (peplanned) potection. The main advantage of ou appoach is that the ecovey in case of failues is achieved within a shot delay. Additionally, with espect to othe appoaches, the dependability of the outing scheme is inceased in the way that it statistically copes with many failues. The algoithm we popose computes an efficient backup fo an abitay pimay tee using an impoved multi-tee algoithm. Keywods: netwok, fault-toleant outing, many-to-one, cold potection, multi-tee algoithm
2 1 Intoduction High-speed netwoks ae becoming inceasingly impotant and allows the development of applications with eal-time constaints, such as multimedia sevices, coopeative systems, distibuted computing. These applications often ely on the suvivability of the netwok: communications should not be inteupted fo a long time by a failue of a link o of a oute. Indeed, the longe the communication is inteupted, the moe packets ae dopped. The poblem of fast ecovey has been well studied fo seveal types of communications, including boadcast (one-to-all), unicast (one-to-one) and multicast (one-to-many). Howeve, thee is no efficient poposition fo dependable incast (many-to-one) communications. Incast connections ae many-to-one, i.e., seveal souces send data to a single destination. An incast connection can be the suppot of homogeneous o heteogeneous communications. Examples of applications inducing homogeneous communications include log collection, data gatheing in senso netwoks, auction sales and massive submissions. In netwoks whee the fowading of packets is based on thei destination addess (such as IP netwoks), all the communications towad the same destination fom an incast connection. In this case, the connection is heteogeneous since it is composed of communications having diffeent equiements and potocols. Fo example, a FTP communication fom an host A to an host C
3 and a HTTP communication fom an host B to an host C fom an incast connection. Incast connections ae taditionally ealized using a tee 1. Implementing dependable communications is a majo thead fo cuent netwoks. Indeed, the netwok is supposed to be suvivable, i.e., it should withstand failues of links o outes. Two measues of the dependability of a netwok can be consideed: the ecovey delay and the numbe of failues managed [1]. It is theefoe citical to educe the ecovey delay as much as possible. Classical ecovey delays of IP potocols such as OSPF o RIP each tens of seconds (see [2] fo OSPF and the slow convegence poblem [3] fo RIP). The othe measue, the numbe of failues managed by a ecovey mechanism, impacts on the eliability of the netwok. In ou model, we conside two types of failues: independent failues and highly coelated failues. Thee is a tade-off fo the ecovey mechanisms in potecting efficiently against independent failues and highly coelated failues. Ou objective is to ecove quickly fom failues on an incast communication while coping with as much failues as possible. In this pape, we popose a cold peplanned potection that allows local ecovey using ac-disjoint tees. Ou constuction of ac-disjoint tees is a genealization of the algoithm descibed in [4]. Section 2 gives a state of the at on dependable communications. Section 3 descibes ou potection constuction based on ac-disjoint tees. 1 Multicast connections ae also ealized using a tee, but incast connections and multicast connections ae not symmetic: multicast connections and multicast outing potocols equie a paticula mechanism in outes, the duplication mechanism, while incast connections do not equie any.
4 Section 4 descibes ou local ecovey mechanism. Section 5 analyzes the tade-off of potecting independent failues and highly coelated failues. Finally, we conclude ou wok in Section 6. 2 State of the at of dependable connections Seveal ways to cope with failues exist. In this section, we biefly suvey the existing appoaches to ealize dependable connections while concentating on ou main concen: the fastness of the ecovey. A detailed suvey on suvivability can be found in [5] (in the case of WDM netwoks). Hot and cold edundancy. Hot edundancy, denoted 1+1 edundancy, consists in sending each message on two disjoint paths simultaneously (cf. [6] fo an example). Hot edundancy allows fast ecovey since the destination eceives the packet fom one of the paths even if a failue on the othe path has occued and has not yet been detected. Howeve, hot edundancy wastes a lot of bandwidth. This majo dawback and the necessity of a selecting algoithm at the destination make hot edundancy not vey used. Cold edundancy, denoted 1:1 edundancy, consists in aising a ecovey mechanism once a failue is detected (cf. [6] again fo an example). Although 1:1 edundancies ae slowe than 1+1 edundancies because of the failue detection delay. They ae often pefeed since they save bandwidth. The estoation and potection ae the two main types of cold edundancy.
5 Restoation and potection. Restoation is a eactive appoach to cope with failues. At the time a failue is detected, the oute that detected the failue seaches fo a new path to eoute the taffic to the destination [7]. The advantage of estoation is that it adapts to the cuent state of the netwok. Howeve, intensive computations ae equied fo the oute to find a new path, which inceases the ecovey delay. Usual Intenet outing potocols use this appoach. Potection is a poactive appoach to cope with failues. The behavio of the outes in case of a failue is peplanned [8]. At the time the failue is detected, the oute eoutes the taffic to the peplanned potection path. This appoach has the advantage of being vey fast, since the ecovey is aised without any additional computation of the oute [9]. Howeve, less failues can be managed compaed to estoation since potection is poactive. Classic potections ae end-to-end o local. End-to-end and local. End-to-end ecovey consists in eouting the taffic at the souce on an ac-disjoint path, once a failue is detected. A typical example of end-to-end potection is the path-based potection. The delay induced by the end-to-end ecovey is high because the souce has fist to be infomed that a failue occued on the pimay path befoe aising the ecovey. Anothe dawback of path-based potection is that it cannot cope with two successive failues: if a failue occus on the pimay path and anothe occus on the altenate path, the connection is inteupted.
6 Local ecovey consists in eouting the taffic at the oute that detected a failue. A typical example of local ecovey is the link-based potection. The delay induced by the local ecovey is low because the ecovey is aised locally. Using link-based ecovey, seveal successive failues on the pimay path can be managed, as long as they concen diffeent links. A dawback of link-based potection (but not of local ecovey appoach) is that node failues ae not managed. A compaison of link-based potection and path-based potection can be found in [10]. In this pape, we popose a new local cold potection to ecove fom failues on incast connections within a shot delay, and without the dawback of the link-based potection. The specificity of incast connections is the lage numbe of souces; theefoe, taditional end-to-end ecovey mechanisms ae not suited to incast, whee all the souces have to be infomed of the failues that occued. 3 Poposed potection of incast tees Ou poposition aims the constuction of dependable incast connections. We show late that the dependability of the outing scheme is einfoced since the poposed potection statistically withstands many failues. Many-to-one connections equie the establishment of the pimay paths in a coodinated way. The backup paths should be synchonized togethe and also with the pimay paths. We call pimay tee the set of pimay paths.
7 Fo basic incast connections, the pimay tee is usually a shotest path tee. QoS awae incast connections may use diffeent patial spanning tees, depending on the netwok status. Fo this eason, we assume that the pimay incast tee is given to ou algoithm eithe by the application o by the netwok management. Often, this pimay tee spans only a sub-gaph of the given netwok. The objectives of the potection ae: (i) it should wok fo any topology and (ii) it should wok fo any given pimay tee (patial o not). In this section we pesent how ou potection can achieve these objectives. Since it efes to the multi-tee constuction algoithm poposed in [4], a bief desciption of the algoithm is done in the following. 3.1 Basic multi-tee constuction A multi-tee is a set of two diected tees that ae ac-disjoints. The algoithm pesented in [4] descibes a way to compute these two tees. The computation woks only in edge-edundant topologies and the two tees spans all the nodes of the netwok. The algoithm assumes that all links ae bidiectional. The multi-tee is built by adding successively extenal paths, as specified by Algoithm 1. An extenal path is a path stating in a spanned node u, ending in a spanned node v and such as all intemediate nodes ae not yet spanned by the multi-tee. Geneally, u v (except at the fist iteation o in the case of aticulation vetex whee u = v =, being eithe the oot o the aticulation node). Fom each extenal path, two
8 ac-disjoint banches ae extacted such as one of them ends at u while the othe ends at v. Algoithm 1 Multi-tee constuction. initialize the multi-tee with the destination node while an extenal path of the cuent multi-tee exists do select an extenal path p extact two ac-disjoint diected paths fom p add the two diected paths to the multi-tee end while Figue 1 shows the successive steps of the algoithm. In this example, an extenal path is chosen abitaily at each step. The coesponding two ac-disjoint banches ae shown on the figue. One of the tee of the multi-tee is epesented in solid lines (and is efeed to as the blue tee in [4]) while the othe is epesented in dashed lines (and is efeed to as the ed tee in [4]). Advantages. With the help of the multi-tee, tee-based communications can be potected against node and link failues in edge-edundant gaphs, and the multi-tee is elatively easy to compute. It can be applied to ealize hot-edundancy fo boadcast o incast communications o as a peplanned potection fo cold-edundancy. Dawbacks. One of the dawbacks of the descibed multi-tee potection is that the algoithm does not deal with abitay topologies, only with edge-edundant topologies.
9 PSfag eplacements u 1 v 1 u 2 v AA ,, --,, --,, -- v 3 FF GG FF GG FF GG :: ;; :: ;; :: ;; "" ## "" ## "" ## //.. //.. // u 3 not spanned node spanned node HH II HH II HH II JJ KK JJ KK JJ KK << == << == << == >>?? >>?? >>?? BB CC v BB 4 CC BB CC DD EE u DD 4 EE DD EE link edge of p $$ %% $$ %% $$ %% && '' && '' && ''!!!!!! u 5 v 5 (( )) (( )) (( )) ** ++ ** ++ ** ++ ac of one tee ac of the othe tee Fig. 1. The multi-tee constuction. A moe impotant dawback follows fom the fact that the selection of successive extenal paths is not detemined. Thus, the diamete of the tees (and as a consequence, the length of the pimay paths) can be abitay lage (fo example, it can be seen on Figue 1 that the distance in the solid tee fom node v 5 to the destination is vey long). The QoS equiement of the applications o the netwok management often impose the use of paticula pimay tees (e.g., of shotest path tees o QoS awae tees). Finally, in most incast communications, only a sub-set of nodes belongs to the set of the souces and so the incast tee is a patial spanning tee. The algoithm should be adapted to patial spanning tees.
10 In the following, we will specify how the diffeent dawbacks of the multi-tee based potection can be eliminated. 3.2 Extension to abitay topologies Often, in eal netwok, aticulation nodes o edges ae possible. Even in initially edundant netwoks, aticulations can be poduced due to pesistent failues. The potection computation should wok also in these cases. To build a multi-tee in an abitay connected netwok, we popose to add to the pevious algoithm a paticula case when aticulation edges ae found. In this case, we popose the ceation of two diected acs on the aticulation edge towad the destination. This edge is not potected against failue but no algoithm could have potected it. Howeve, if failues occu on othe pats of the netwok, they can be ecoveed. It can be noticed that the two tees of the multi-tee ae not ac-disjoints anymoe. 3.3 Potection of a given incast spanning tee In netwok, failues ae ae. Theefoe, the chosen tee used if no failue occus has to ensue an efficient delivey of data packets and cetain QoS citeion. Geneally, none of the diected tees built by the multi-tee algoithm does coespond to a good pimay tee and can not be used fo the communications. Howeve, computing a multi-tee can help in
11 finding the backup suppot of the desied pimay tee as pesented in the following 2. To adapt the potection to a given (total) pimay tee (fo example to the shotest-path tee), we popose the constuction of a multi-tee spanning all of the acs of the given pimay tee. Ou dependable incast connection computation contains two steps: (i) the computation of a multi-tee spanning a given pimay tee and (ii) the constuction of a backup foest on the basis of the multi-tee. Multi-tee constuction fo a given pimay tee To ensue that the pimay tee T p is coveed by the multi-tee, we have to ensue that T p is coveed by the union of the extenal paths selected duing the multitee constuction. In othe wods, we have to ensue that evey ac of T p is coveed by an ac of the multi-tee. Let us denote by dist(t p,, n) the hop distance fom to a node n in T p. At each iteation, the algoithm selects an extenal path containing exactly one edge (n 1, n 2 ) that is not in the pimay tee T p and with at least one node of {n 1, n 2 } not spanned by the multi-tee. One can pove that this kind of extenal path exists if the topology is edundant and the pimay tee spans it. If thee ae seveal candidates, then the extenal path minimizing dist(t p,, n 1 )+dist(t p, n 2, ) is selected. Figue 2 shows such an edge on an example whee the pimay tee T p coesponds to the 2 To simplify let us suppose hee that, similaly to the multi-tee computation, all nodes of the netwok will paticipate to the incast communication. The case of patial spanning tees is discussed in the next sub-section.
12 shotest-path tee. Having chosen the not yet spanned edge (n 1, n 2 ), the extenal path p fom u to v can be found as follows: u and v ae spanned by the multi-tee, p contains the path in the pimay tee fom n 1 to u, the edge (n 1, n 2 ) and the path fom n 2 to v. %% && %% && %% && PSfag eplacements ++,, ++,, ++,,!! ""!! ""!! "" '' (( '' (( '' (( --.. ## $$ )) ** --.. ## $$ )) ** --.. ## $$ )) ** u v u v // 00 // 00 // 00 [3+3] n 1 n 2 n 1 n 2 Fig. 2. An extenal path on a shotest-path tee. Minimizing the hop distance dist(t p,, n 1 ) + dist(t p, n 2, ) on T p allows the potection to be dense. A dense potection is moe obust in the case of multiple failues than a spase potection. Popety 1 shows that ou selection of extenal paths ensue that the pimay tee T p is coveed by the multi-tee. Popety 1. The acs of the diected pimay tee T p ae in the multi-tee built by ou algoithm. Poof. Thee is only one outgoing ac fo each node of the tee T p diected to the oot. The computed multi-tee spans all the nodes by successive extenal paths. To pove the popety, it is sufficient to show that adding a node to the multi-tee implicates also adding its outgoing ac in the pimay tee T p. Let p be an extenal path fom the node u to v selected
13 at any iteation of the algoithm. In a fist time, we show that the outgoing ac of any node n p is in p and in a second time we show that thee is an ac diected to the same diection in the multi-tee. Let us assume that the outgoing ac of n in T p is not in p. In this case, the adjacent edge of n p ae not in T p but this is impossible because thee is only one edge in p which is not in T p. The multi-tee algoithm associates two outgoing acs (one in each diected tee of the multi-tee) to each node, except u and v. The outgoing ac on T p of any node diffeent fom u and v coesponds to an ac in the ceated multi-tee. Constuction of the backup foest Ou impoved multi-tee algoithm builds a multi-tee M = (T 1, T 2 ) coveing the pimay tee T p. To obtain the backup suppot of the pimay tee, Algoithm 2 is poposed: Algoithm 2 Backup foest constuction. Requie: T p a pimay tee, M = (T 1, T 2 ) a multi-tee coveing T p F acs(t 1 ) acs(t 2 ) F F \acs(t p ) The fist step of the algoithm meges the acs of T 1 and T 2 into the diected set F. T 1 and T 2 ae disjoint, except fom the acs on the aticulation edges. Then, in F, only one ac exists on the aticulation edges. The second step of the algoithm emoves in F the pimay acs of T p. The emaining acs ae the backup potection of T p. It can be noticed that F is a foest.
14 3.4 Patial spanning tees Geneally, only a sub-set of the nodes paticipates to the incast communication. To ceate a patial multi-tee which coves at least the patial pimay tee, we popose two algoithms. A simple solution can be obtained by computing the multi-tee spanning all the nodes and by puning the pats that ae not used o edundant. This solution equies an impotant computation even if thee ae few nodes in the set of souces 3. A moe efficient computation can be obtained if only the equied pat of the multi-tee is built. The patial multi-tee can be built with the help of successive shotest loops fom the destination to the souces following the pimay paths in the evese diection. The extenal path selection and the stop condition of the multi-tee algoithm should be modified accodingly. Nodes which ae in the patial multi-tee but not in the pimay tee have two diected paths to the destination. The outgoing acs which is not in the pimay tee can be deleted because the potection of these nodes is not needed. Othe outgoing acs ae used as backup segments fo the pimay tee 4. Figue 3 illustates the patial multi-tee constuction and the obtained potection scheme. The left pat of the figue shows the patial multi-tee constuction. The pimay tee T p, in thick lines, is contained in M = (T 1, T 2 ). The ight pat of the figue, the 3 In this case, poof of Popety 1 emains the same, as long as the puning does not alte neithe the pimay tee no the backup foest. 4 In this case, the poof of Popety 1 is not valid anymoe. Howeve, a simila poof can be done by noticing that the last pat of the extenal path coesponds to the path in the pimay tee T p.
15 obtained potection scheme, shows the pimay tee T p in solid lines and its backup F in dashed lines. PSfag eplacements node node paticipating to outing 2 ** ++ ** ++ ** ++!!!!!! $$ %% $$ %% $$ %% "" ##,, -- "" ##,, -- a "" ##,, -- && '' b && (( '' )) (( )) && '' (( )) souce patial tee solid tee dashed tee pimay tee backup ac Fig. 3. Multi-tee and backup constuction fo a patial incast tee. 4 Poposed ecovey mechanism The pevious section descibed how to compute a potection fo a given tee. Once the potection has been configued, a local ecovey mechanism has to be implemented in outes to potect the connection against failues. Let us ecall that the potection ensues that, fo evey node n of the pimay tee, thee exists two ac-disjoint paths fom n to the destination of the incast connection. We assume that all the outes can stoe two enties fo evey destination. The pimay enty fo the node n coesponds to the fist edge on the pimay path towad the destination and the altenate enty coesponds to the fist edge of the backup path. If a oute detects a failue
16 on the pimay enty fo a destination, it switches its pimay enty to its altenate enty. A oute detects a failue popagation need when it eceives a packet fo a destination on an inteface which coesponds to the next hop fo on the pimay path. In this case, it switches its pimay enty to its altenate enty to avoid loops. This failue popagation occus only when the backup path uses the edges of the pimay path in the evese diection. Fo example, if node a of Figue 3 detects that the link (a, ) failed, it switches to its altenate enty (failue detection). Then, the packets that each a ae fowaded to b. When eceiving a packet fom a fo, b detects that a is the next hop to on its pimay path. Then, b switches to its altenate enty (failue popagation). The packets follow the backup path up to. Now that we descibed ou potection and ou ecovey, the next section analyzes its behavio in the case of independent o highly coelated failues. 5 Analysis of the dependability in the case of multiple failues In this section, we analyze the dependability of seveal potections in case of multiple failues. The numbe of failues that can be managed by a potection geatly depends on the netwok topology and on the incast connection. To study the dependability of a potection in the case of
17 multiple failues, we popose to discuss on the numbe of failues that do not inteupt communications. 5.1 Independent failues In ou model of independent failues, we assume that failues occu successively on the pimay path. Indeed, failues that do not occu on a pimay path do not impact communications. Path-based potection When the fist failue occus on the pimay path and the souce is infomed, the taffic is swapped to the backup path at the souce. Then, if an independent failue touches the backup path, the communication is inteupted. Link-based potection Link-based potections do not cope with node failues. In the case of a link failue, the bypass is used to each the next node while the est of the pimay path is used. If an ulteio link failue occus on the pimay path, anothe bypass can be used if and even if the second bypass is link-disjoint with the fist bypass. The link-based potection allows independent link failues if the bypasses ae independent. Howeve, it does not cope with failues which occus on the bypasses. Ou potection The poposed incast tee potection copes with a link o a node failue. If a second failue touches the backup used to ecove fom a fist failue, thee ae two possibilities. If this backup coesponds to a pimay path of anothe communication and its backup is diffeent fom
18 % & % & % & % & % & $ $ $ $ $ G H G H G H @ > > > > > the fist pimay path, then the local ecovey is possible. If the failed pat of the backup does not coespond to a pimay path of anothe communication o if the backup of this failed point uses the fist failed pimay path, then the mechanism cannot cope with the failue. The mechanism is illustated on Figue 4 (A) and (B) in the case of PSfag eplacements link and node failues. node node paticipating to outing souce patial tee solid tee dashed tee pimay tee backup ac QQ RR QQ RR QQ RR SS TT SS TT SS TT MM NN MM NN MM NN II JJ II JJ II JJ V KK LL KK LL KK LL (A) WW XX WW XX WW XX OO PP OO PP OO PP ecovey path UU VV UU VV UU VV '' (( aa bb aa bb aa bb cc dd cc dd cc dd ]] ^^ ]] ^^ ]] ^^ YY ZZ YY ZZ YY!!! ZZ!!!!!!!!!!!! """ ### """ ### """ ### """ ### """ ### [[ \\ `` ))) *** [[ \\ `` +++,,, [[ \\ `` (B) gg hh gg hh gg hh ee ff ee ff ee ff AAA BBB qq qq qq ss tt ss tt ss tt CCC DDD mm nn... mm nn... mm //// nn //// //// //// //// //// ii jj ////... ii jj ::: ii ;;; jj ::: ;;; ::: ;;; ::: ;;; ::: ;;; kk ll kk ll kk ll (C) ww xx ww xx ww xx oo pp oo pp oo pp <<< === <<< === <<< === <<< === <<< === EEE FFF uu vv uu vv uu vv s Fig. 4. Recovey capability of ou mechanism. 5.2 Highly coelated failues In ou model of highly coelated failues, the failues occu simultaneously on adjacent links o nodes of the netwok: a connected subgaph of the netwok fails. The highe the potection esists to highly coelated failues, the highe can be the diamete of the failed subgaph without inteupting communications. In the same way than peviously, we assume that at least a link o a node of pimay tee fails. Path-based potection Simultaneous failues can occu on the links and nodes of a pimay path. The path based potection copes with lage
19 diamete of failues when all intenal nodes and edges of the pimay path failed. Howeve, the altenate path should be intact. Link-based potection Since link-based potection does not cope with node failues, the maximal diamete of a ecoveed failue is one link. Ou potection In edundant topologies, the poposed tee-based potection gives a link-disjoint altenate path fom all the nodes of the pimay path to the destination. Highly coelated failues on a pimay path with lage diamete can be ecoveed. Moeove in the case of dense incast communications, the mechanism copes with failues which occu on the altenate paths. Figue 4 (C) shows the maximal sub-set of the netwok which can fail with ecovey fom a souce s. 6 Conclusion In this pape, we pesented a cold potection fo many-to-one communications. The potection computation is based on the constuction of a backup foest, given an abitay pimay tee. The ecovey uses a simple failue popagation mechanism and can be ealized by a local switch opeation in the concened outes. Thus, it poduces low failue ecovey delay. We studied the impact on the potection of two scenaios of failues: independent failues and highly coelated failues. We wee able to show that ou method can popose a tade-off between managing independent failues and highly coelated failues. In the futue, we intend to evaluate quantitatively ou potection though simulations.
20 Refeences 1. Duato, J.: A theoy of fault-toleant outing in womhole netwoks. IEEE Tansactions on Paallel and Distibuted Systems 8 (1997) Goyal, M., Ramakishnan, K.K., Feng, W.C.: Achieving Faste Failue Detection in OSPF Netwoks. In: IEEE ICC. (2003) 3. Obadovic, D.: Fomal Analysis of Convegence of Routing Potocols. PhD thesis, Univesity of Pennsylvania (2001) 4. Médad, M., Finn, S.G., Bay, R.A.: Redundant tees fo peplanned ecovey in abitay vetex-edundant o edge-edundant gaphs. In: IEEE/ACM Tansactions on Netwoking. Volume 7. (1999) Maie, G., Pattavina, A., De Pate, S., Matinelli, M.: Optical Netwok Suvivability: Potection Techniques in the WDM Laye. Photonic Netwok Communications 3/4 (2002) Anand, V., Qiao, C.: Static vesus dynamic establishment paths in WDM netwoks, Pat I. In: IEEE ICC. Volume 1. (2000) Ramamuthy, S., Mukhejee, B.: Suvivable WDM Mesh Netwoks, Pat II Restoation. In: IEEE ICC. Volume 3. (1999) Ramamuthy, S., Mukhejee, B.: Suvivable WDM Mesh Netwoks, Pat I Potection. In: IEEE INFOCOM. Volume 2. (1999) Nakamua, R., Ono, H., Nishikawaa, K.: Reliable switching sevices. In: IEEE Globecom. (1994) 10. Johnson, D., Johnson, G.N., Beggs, S.L., Botahm, C., Hawke, I., Chng, R.S.K., Sinclai, M.C., O Mahony, M.J.: Distibuted estoation stategies in telecommunications netwoks. In: IEEE ICC. Volume 1. (1994)
IP Network Design by Modified Branch Exchange Method
Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management
More informationPrioritized Traffic Recovery over GMPLS Networks
Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing
More informationIP Multicast Simulation in OPNET
IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok
More informationThe Internet Ecosystem and Evolution
The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee
More informationCommunication vs Distributed Computation: an alternative trade-off curve
Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,
More informationA New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE
5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai
More informationDEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson
DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:
More informationAn Improved Resource Reservation Protocol
Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing
More informationJournal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012
2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo
More informationRANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES
RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class
More informationShortest Paths for a Two-Robot Rendez-Vous
Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal
More informationPerformance Optimization in Structured Wireless Sensor Networks
5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame
More informationTopological Characteristic of Wireless Network
Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences
More informationPoint-Biserial Correlation Analysis of Fuzzy Attributes
Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh
More informationTHE THETA BLOCKCHAIN
THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent
More informationConversion Functions for Symmetric Key Ciphers
Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401
More informationA Memory Efficient Array Architecture for Real-Time Motion Estimation
A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN
More informationART GALLERIES WITH INTERIOR WALLS. March 1998
ART GALLERIES WITH INTERIOR WALLS Andé Kündgen Mach 1998 Abstact. Conside an at galley fomed by a polygon on n vetices with m pais of vetices joined by inteio diagonals, the inteio walls. Each inteio wall
More informationChapter 4 Network Layer
Chapte 4 Netwok Laye Reti di Elaboatoi Coso di Lauea in Infomatica Univesità degli Studi di Roma La Sapienza Canale A-L Pof.ssa Chiaa Petioli Pate di queste slide sono state pese dal mateiale associato
More informationHierarchically Clustered P2P Streaming System
Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.
More informationTowards Adaptive Information Merging Using Selected XML Fragments
Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,
More informationAnnales UMCS Informatica AI 2 (2004) UMCS
Pobane z czasopisma Annales AI- Infomatica http://ai.annales.umcs.pl Annales Infomatica AI 2 (2004) 33-340 Annales Infomatica Lublin-Polonia Sectio AI http://www.annales.umcs.lublin.pl/ Embedding as a
More informationSeparability and Topology Control of Quasi Unit Disk Graphs
Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,
More informationSegmentation of Casting Defects in X-Ray Images Based on Fractal Dimension
17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach
More informationAlso available at ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010)
Also available at http://amc.imfm.si ISSN 1855-3966 (pinted edn.), ISSN 1855-3974 (electonic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) 109 120 Fulleene patches I Jack E. Gave Syacuse Univesity, Depatment
More informationObstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor
Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,
More informationIP MULTICAST. Adiseshu Hari, T. V. Lakshman and Gordon Wilfong Nokia Bell Labs
IP MULTICAST Adiseshu Hai, T. V. Lakshman and Godon Wilfong Nokia DIMACS Wokshop on Algoithms fo Data Cente Netwoks Rutges Univesity, NJ 1 Why is IP Multicast not deployed in public netwoks? Denial-of-Sevice
More informationEmbeddings into Crossed Cubes
Embeddings into Cossed Cubes Emad Abuelub *, Membe, IAENG Abstact- The hypecube paallel achitectue is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability
More informationControlled Information Maximization for SOM Knowledge Induced Learning
3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity
More informationa Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives
SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which
More informationADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM
ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,
More informationFACE VECTORS OF FLAG COMPLEXES
FACE VECTORS OF FLAG COMPLEXES ANDY FROHMADER Abstact. A conjectue of Kalai and Eckhoff that the face vecto of an abitay flag complex is also the face vecto of some paticula balanced complex is veified.
More informationFrequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters
Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using
More informationSecure Collaboration in Mediator-Free Environments
Secue Collaboation in Mediato-Fee Envionments Mohamed Shehab School of Electical and Compute Engineeing Pudue Univesity West Lafayette, IN, USA shehab@pudueedu Elisa Betino Depatment of Compute Sciences
More informationMANET QoS support without reservations
SECURITY AND COMMUNICATION NETWORKS Secuity Comm. Netwoks (2010) Published online in Wiley InteScience (www.intescience.wiley.com)..183 SPECIAL ISSUE PAPER MANET QoS suppot without esevations Soon Y. Oh,
More informationModule 6 STILL IMAGE COMPRESSION STANDARDS
Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.
More informationIS-IS Protocol Hardware Implementation for VPN Solutions
IS-IS Potocol Hadwae Implementation fo VPN Solutions MOHAMED ABOU-GABAL, RAYMOND PETERKIN, DAN IONESCU School of Infomation Technology and Engineeing (SITE) Univesity of Ottawa 161 Louis Pasteu, P.O. Box
More informationFault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs
Fault-Toleant Routing Schemes in RDT(,,)/α-Based Inteconnection Netwok fo Netwoks-on-Chip Designs Mei Yang, Tao Li, Yingtao Jiang, and Yulu Yang Dept. of Electical & Compute Engineeing Univesity of Nevada,
More informationCryptanalysis of Hwang-Chang s a Time-Stamp Protocol for Digital Watermarking
Cyptanalysis of Hwang-Chang s a Time-Stamp Potocol fo Digital Watemaking *Jue-Sam Chou, Yalin Chen 2, Chung-Ju Chan 3 Depatment of Infomation Management, Nanhua Univesity Chiayi 622 Taiwan, R.O.C *: coesponding
More informationLecture 27: Voronoi Diagrams
We say that two points u, v Y ae in the same connected component of Y if thee is a path in R N fom u to v such that all the points along the path ae in the set Y. (Thee ae two connected components in the
More informationThe EigenRumor Algorithm for Ranking Blogs
he EigenRumo Algoithm fo Ranking Blogs Ko Fujimua N Cybe Solutions Laboatoies N Copoation akafumi Inoue N Cybe Solutions Laboatoies N Copoation Masayuki Sugisaki N Resonant Inc. ABSRAC he advent of easy
More informationAutomatically Testing Interacting Software Components
Automatically Testing Inteacting Softwae Components Leonad Gallaghe Infomation Technology Laboatoy National Institute of Standads and Technology Gaithesbug, MD 20899, USA lgallaghe@nist.gov Jeff Offutt
More informationReachable State Spaces of Distributed Deadlock Avoidance Protocols
Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications
More informationDetection and Recognition of Alert Traffic Signs
Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives
More informationConfiguring RSVP-ATM QoS Interworking
Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP
More informationA Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation
A Minutiae-based Fingepint Matching Algoithm Using Phase Coelation Autho Chen, Weiping, Gao, Yongsheng Published 2007 Confeence Title Digital Image Computing: Techniques and Applications DOI https://doi.og/10.1109/dicta.2007.4426801
More informationSpiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks
Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition
More informationQuality Aware Privacy Protection for Location-based Services
In Poceedings of the th Intenational Confeence on Database Systems fo Advanced Applications (DASFAA 007), Bangkok, Thailand, Apil 9-, 007. Quality Awae Pivacy Potection fo Location-based Sevices Zhen Xiao,,
More informationErasure-Coding Based Routing for Opportunistic Networks
Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant
More informationMulti-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples
Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits
More informationSYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH
I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,
More informationParallel processing model for XML parsing
Recent Reseaches in Communications, Signals and nfomation Technology Paallel pocessing model fo XML pasing ADRANA GEORGEVA Fac. Applied Mathematics and nfomatics Technical Univesity of Sofia, TU-Sofia
More informationOn the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks
On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New
More information= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2
Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used
More informationANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS
ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth
More informationInterference-Aware Multicast for Wireless Multihop Networks
Intefeence-Awae Multicast fo Wieless Multihop Netwoks Daniel Letpatchya School of Electical and Compute Engineeing Geogia Institute of Technology Atlanta, Geogia 30332 0250 Douglas M. Blough School of
More informationCombinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments
Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile
More informationNumber of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks
Numbe of Paths and Neighbous Effect on Multipath Routing in Mobile Ad Hoc Netwoks Oday Jeew School of Infomation Systems and Accounting Univesity of Canbea Canbea ACT 2617, Austalia oday.jeew@canbea.edu.au
More informationA Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform
A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad
More informationAn Unsupervised Segmentation Framework For Texture Image Queries
An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu
More informationOptical Flow for Large Motion Using Gradient Technique
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this
More informationSlotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System
Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet
More informationAnd Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,
(IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Efficient Candidacy Reduction Fo Fequent Patten Mining M.H Nadimi-Shahaki 1, Nowati Mustapha 2, Md Nasi B Sulaiman 2, Ali B Mamat
More informationarxiv: v4 [cs.ds] 7 Feb 2018
Dynamic DFS in Undiected Gaphs: beaking the O(m) baie Suende Baswana Sheejit Ray Chaudhuy Keeti Choudhay Shahbaz Khan axiv:1502.02481v4 [cs.ds] 7 Feb 2018 Depth fist seach (DFS) tee is a fundamental data
More informationSimulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM
J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on
More informationXFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers
XFVHDL: A Tool fo the Synthesis of Fuzzy Logic Contolles E. Lago, C. J. Jiménez, D. R. López, S. Sánchez-Solano and A. Baiga Instituto de Micoelectónica de Sevilla. Cento Nacional de Micoelectónica, Edificio
More informationA programming model for spatio-temporal data streaming applications
Pocedia Compute Science Pocedia Compute Science 00 (2012) 1 10 Intenational Confeence on Computational Science, ICCS 2012 A pogamming model fo spatio-tempoal data steaming applications Shigeu Imai a,,
More informationTier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints
Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok 14260 Email:
More information(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1)
1 Multi Path PERT Ankit Singh and A. L. Naasimha Reddy Electical and Compute Engineeing Depatment, Texas A&M Univesity; email: eddy@ece.tamu.edu. Abstact This pape pesents a new multipath delay based algoithm,
More informationHigh performance CUDA based CNN image processor
High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu
More informationMapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma
apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the
More informationConservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery
Poceedings of the 4th WSEAS Intenational Confeence on luid Mechanics and Aeodynamics, Elounda, Geece, August 1-3, 006 (pp337-34) Consevation Law of Centifugal oce and Mechanism of Enegy Tansfe Caused in
More informationData mining based automated reverse engineering and defect discovery
Data mining based automated evese engineeing and defect discovey James F. Smith III, ThanhVu H. Nguyen Naval Reseach Laboatoy, Code 5741, Washington, D.C., 20375-5000 ABSTRACT A data mining based pocedue
More information(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number.
Illustative G-C Simila cicles Alignments to Content Standads: G-C.A. Task (a, b) x y Fo this poblem, is a point in the - coodinate plane and is a positive numbe. a. Using a tanslation and a dilation, show
More informationDecentralized Trust Management for Ad-Hoc Peer-to-Peer Networks
Decentalized Tust Management fo Ad-Hoc Pee-to-Pee Netwoks Thomas Repantis Vana Kalogeaki Depatment of Compute Science & Engineeing Univesity of Califonia, Riveside Riveside, CA 92521 {tep,vana}@cs.uc.edu
More informationSCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS
SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),
More informationAn Extension to the Local Binary Patterns for Image Retrieval
, pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science
More informationAN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE
AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity
More informationAn Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network
An Efficient andove Mechanism Using the Geneal Switch Management Potocol on a Multi-Potocol abel Switching Netwok Seong Gon hoi, yun Joo Kang, and Jun Kyun hoi Using the geneal switch management potocol
More informationAssessment of Track Sequence Optimization based on Recorded Field Operations
Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment
More informationOn the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes
On the Convesion between Binay Code and BinayReflected Gay Code on Boolean Cubes The Havad community has made this aticle openly available. Please shae how this access benefits you. You stoy mattes Citation
More informationScaling Location-based Services with Dynamically Composed Location Index
Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute
More informationA Two-stage and Parameter-free Binarization Method for Degraded Document Images
A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and
More informationInput Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer
Using the Gow-And-Pune Netwok to Solve Poblems of Lage Dimensionality B.J. Biedis and T.D. Gedeon School of Compute Science & Engineeing The Univesity of New South Wales Sydney NSW 2052 AUSTRALIA bbiedis@cse.unsw.edu.au
More informationAutomatic Generation of Reliable E Commerce Payment Processes
Infomation Systems Engineeing (WISE 2000), Hong Kong, China, June 2000. Automatic Geneation of Reliable E Commece Payment Pocesses Heiko Schuldt Andei Popovici Hans-Jög Schek Institute of Infomation Systems
More informationHISTOGRAMS are an important statistic reflecting the
JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe
More informationGravitational Shift for Beginners
Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational
More informationThe Dual Round Robin Matching Switch with Exhaustive Service
The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line
More informationIllumination methods for optical wear detection
Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical
More informationEfficient Execution Path Exploration for Detecting Races in Concurrent Programs
IAENG Intenational Jounal of Compute Science, 403, IJCS_40_3_02 Efficient Execution Path Exploation fo Detecting Races in Concuent Pogams Theodous E. Setiadi, Akihiko Ohsuga, and Mamou Maekaa Abstact Concuent
More informationEE 6900: Interconnection Networks for HPC Systems Fall 2016
EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection
More informationOn using circuit-switched networks for file transfers
On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed
More informationAny modern computer system will incorporate (at least) two levels of storage:
1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe
More informationA Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces
A Family of Distibuted Deadlock Avoidance Potocols and thei Reachable State Spaces Césa Sánchez, Henny B. Sipma, and Zoha Manna Compute Science Depatment Stanfod Univesity, Stanfod, CA 94305-9025 {cesa,sipma,manna}@cs.stanfod.edu
More informationVoting-Based Grouping and Interpretation of Visual Motion
Voting-Based Gouping and Intepetation of Visual Motion Micea Nicolescu Depatment of Compute Science Univesity of Nevada, Reno Reno, NV 89557 micea@cs.un.edu Géad Medioni Integated Media Systems Cente Univesity
More informationAdaptation of TDMA Parameters Based on Network Conditions
Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.
More informationA modal estimation based multitype sensor placement method
A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;
More informationMultiview plus depth video coding with temporal prediction view synthesis
1 Multiview plus depth video coding with tempoal pediction view synthesis Andei I. Puica, Elie G. Moa, Beatice Pesquet-Popescu, Fellow, IEEE, Maco Cagnazzo, Senio Membe, IEEE and Bogdan Ionescu, Senio
More informationCellular Neural Network Based PTV
3th Int Symp on Applications of Lase Techniques to Fluid Mechanics Lisbon, Potugal, 6-9 June, 006 Cellula Neual Netwok Based PT Kazuo Ohmi, Achyut Sapkota : Depatment of Infomation Systems Engineeing,
More informationHierarchical Peer-to-peer Systems
Hieachical Pee-to-pee ystems L. Gacés-Eice 1, E.W. Biesack 1, P.A. Felbe 1, K.W. Ross 2, and G. Uvoy-Kelle 1 1 Institut EURECOM 06904 ophia Antipolis, Fance {gaces ebi felbe uvoy}@euecom.f 2 Polytechnic
More information