Aligned Beacon Transmissions to Increase IEEE s Light Sleep Mode Scalability

Size: px
Start display at page:

Download "Aligned Beacon Transmissions to Increase IEEE s Light Sleep Mode Scalability"

Transcription

1 Aligned Beacon ransmissions to Increase IEEE s Light Slee Mode Scalability Marco Porsch and homas Bauschert echnische Universität Chemnitz, Reichenhainer Str. 70, Chemnitz, Germany {marco.orsch Abstract. In wireless mesh networks battery-owered devices rely on a sohisticated ower save scheme to rovide enduring network connectivity. herefore, IEEE s defines different ower save modes to reduce the energy consumtion of Wi-Fi mesh nodes. he most common of these modes, light slee mode, aims at conserving energy while maintaining mesh link erformance. o achieve this, it relies on eriodic receits of corresonding eer nodes beacons. his aroach makes it unsuitable for dense toologies where an increasing number of eer links leads to frequent wakeus and higher energy consumtion. o overcome this issue we introduce a novel synchronization algorithm to minimize the overhead of scheduled beacon receits. We evaluate the effectiveness of the algorithm using testbed measurements and a state model-based aroach, in which we comare its erformance with resect to energy efficiency with that of the standard s synchronization algorithm. Keywords: wireless mesh networks, IEEE s, ower save, synchronization, green networking, energy efficiency 1 INRODUCION Wireless mesh networks are well-known in industry and academia but have not yet made their breakthrough in consumer electronics. Actually, wireless mesh networking would be a romising addition to today s Wi-Fi devices as it rovides increased flexibility and robustness. For examle in a smart home there is no need for additional access oints to increase the network coverage if e.g. the Wi-Fi-equied V serves as a mesh access oint to other mesh and legacy devices. Another examle are smarthone users who exchange multimedia content in a Wi-Fi hotsot; in case the hotsot and hones are mesh-enabled, the users may freely roam out of the access oint coverage without losing their connection. In its 2012 revision the IEEE standard includes the former s amendments. Note that s mesh uses regular Wi-Fi hardware as commonly found in almost any of today s smart consumer electronics. Of course, for use on battery-driven user devices there are high requirements concerning energy efficiency. herefore, s introduces different ower modes which, in the meshed environment, are set er neighbor link. Light slee ow- A. Gravey, Y. Kermarrec (Eds.) Eunice 2014 Sringer-Verlag Berlin Heidelberg 2011

2 er mode romises high energy savings on soradically used links while still maintaining roer connectivity with the corresonding neighbors. As we have shown in [4], light slee mode scales oorly with the number of eer nodes since the energy consumtion can even increase linearly in the worst-case scenario. herefore, this aer rooses an standard-comliant synchronization algorithm that reduces the effects of an increasing number of light slee eers on a node s energy consumtion. We focus on the case of an idle network with almost no user data being sent or received. For tyical user devices this case is relevant as, for examle, a smarthone rests in standby state most of the time and just eriodically checks for incoming mails. Similarly, a lato or tablet does not send or receive data while the user is reading a web age. Conserving energy in these situations is most crucial for roer battery runtime. his aer refers to the rules and definitions of the IEEE standard for wireless LAN in its 2012 revision [1]. Previously, in [2] we focused on the effects of ower save on user data forwarding on a s mesh link. Similar research has been conducted by Alam et al. in [3] using ns-2 simulations. In [4] we used testbed measurements to quantify the scalability roerties of s light slee mode. he authors of [5] highlight the imortance of information disseminated in s beacon frames and why legacy beaconing, as in ad hoc networks, is not suitable here. For synchronization numerous algorithms have been roosed in the literature for mobile ad hoc networks and wireless mesh networks. For examle, in [6] yrrell et al. derive an algorithm insired from nature where fireflies synchronize their flashing. Key contributions of this aer are testbed measurements and modelling of IEEE s ower save mode with resect to an increasing number of eers and the roosal of a standard-comliant synchronization algorithm for imroved scalability. he aer is structured as follows: section 2 gives an introduction to IEEE s synchronization and ower save mode. Section 3 exlains our novel beacon alignment synchronization algorithm before we assess its erformance in section 4, where we use results from our mesh testbed to create a model to rove the algorithm s erformance. Section 5 concludes and summarizes the aer. 2 IEEE s Synchronization and Power Save All family rotocols have a common aroach to ower save: for saving energy the radio is susended in times of no activity. With the comlex receiver baseband rocessing disabled, the device ower consumtion is reduced drastically. his makes it more useful than sole transmission ower control as it esecially allows idle nodes to conserve energy. Also, without any receiver interruts, the CPU may send more time in low ower slee states. he radio will be reactivated for frame transmission or for a scheduled receit, e.g. of a neighbor beacon. o reliably schedule doze and wakeus in any of the family ower save schemes, a tight synchronization is required. he time reference is maintained by a local SF (timing synchronization function) and by sending out beacon frames with a fixed beacon interval. he SF timer is a 64bit counter incrementing in one micro-

3 beacon interval second intervals. It determines the B (target beacon transmission time) when the counter value is a multile of the beacon interval. At each B the node schedules the beacon transmission and subsequently transmits according to the general CSMA/CA channel access rules. A beacon frame contains a timestam of the transmitter s SF at the time of transmission. It should be mentioned that, although the beacon frames are transmitted using CSMA/CA, the transmitter sets the SF timestam just once the transmission actually begins. hus, the channel access delay does not influence the accuracy of the synchronization algorithms. Aart from these similarities, the synchronization and beaconing algorithm of IEEE s mesh networks differs from that of IEEE managed mode or ad-hoc networks. First of all, in mesh mode each node has to send its own beacon. his is necessary, since in mesh mode the beacon frame carries many information elements with time-critical content that makes the mesh beacon highly dynamic comared to that of ad-hoc mode [7]. In mesh mode the algorithm used in synchronization is not strictly defined. o adat to the different use cases of wireless mesh networks, IEEE s defines an extensible synchronization framework that allows imlementing alication-secific synchronization algorithms s networks announce the use of such algorithm in beacon and robe resonse frames and only nodes suorting this method may join the MBSS (mesh basic service set). As a common fallback IEEE s defines a default synchronization method in [1] section , called neighbor offset synchronization. his method does not shift the B to a common time; instead, it focuses on keeing the arbitrary offsets between the SF and B of neighboring nodes constant. Uon receit of a beacon or robe resonse frame nodes will evaluate the contained eer s SF at transmission time t and their own SF at the time of receit r to calculate the SF offset to the resective eer. By eriodically monitoring these values, nodes can determine the maximum clock drift within the MBSS. Subsequently, all eers adjust their own SF increments to the slowest clock to mitigate further clock drift. IEEE s defines that this adjustment may only be erformed with a maximum seed of 0.04% of the beacon interval er beacon eriod to avoid that ower-saving nodes lose sync with the nodes shifting their B. With the time references synchronized, a doze/wakeu schedule can be set u according to the Bs of the neighbors towards which a node is in light slee mode. Again, the IEEE s schemes differ from those of legacy Wi-Fi, as there are multile wakeu events determined by multile eer Bs and the own beacon transawake window node A time node B time Fig. 1. Doze/wakeu scheduling of two eers in light slee mode towards each other

4 mission. Furthermore, in IEEE s the ower mode is set for each eer link individually for each direction by the resective arty. Furthermore, this ower mode is not just a binary value reresenting ower save on or off; instead, three ower modes are defined: active, light slee and dee slee mode. A link in active mode may receive ackets anytime and therefore the radio cannot be susended at all. A eer link in light slee mode will only receive ackets at certain times. his allows susending the radio while there are no receits scheduled on any link. A link in dee slee mode behaves similarly but the amount of wakeus and also the ossible erformance is further reduced. Fig. 1 illustrates the behavior of links in light slee mode; here both eers are in light slee mode towards each other. In this examle no further links are established and the doze/wakeu schedule is solely determined by the own and the single eer s B. After waking u to transmit its own beacon, a node stays awake for the awake window duration, which is advertised in an information element within the beacon. During this time interval it can receive frames from other eers. After the awake window assed, the node resumes its doze. Mesh nodes wake u just before the B of their light slee eers to receive their beacon frames and resume doze afterwards. his rocess is reeated eriodically with the beacon interval. With a link in dee slee mode on the other hand, a node will not wake u for the B of the resective eer. his increases delay on that link further and requires secial routines to maintain synchronization and for the forwarding of broadcast frames which are, for examle, required for ath discovery. As the standard leaves many arts of the behavior in dee slee mode undefined and as the erformance on these links might be severely degraded, we will focus solely on light slee mode in the remainder of this aer. 3 BEACON ALIGNMEN SYNCHRONIZAION ALGORIHM An issue of the IEEE s ower save algorithm is its scalability concerning the number of eers; with more eers more wakeus are necessary when links are in light slee mode [4]. heoretically, this should not be a big issue, as the time needed to receive a mesh beacon frame is tyically very low comared to the beacon interval. But besides the actual receive time there are additional delays due to the CSMA/CA channel access mechanism and the time for owering u the receiver s radio, rocessing the beacon and resuming doze. o minimize these wakeu overheads we roose an algorithm subsequently called beacon alignment synchronization. Via this synchronization algorithm we align the B of all MBSS members in a narrow time range to benefit from overlaing awake hases, hence keeing the number of wakeus er beacon interval minimal. In the case that all MBSS members are in direct range of one another and use a common beacon interval, subsequently only a single wakeu is required for all light slee eers. Our synchronization algorithm fits into the extensible synchronization framework that IEEE s rovides as exlained in section 2. hus, it is fully standard-comliant.

5 max min offset before A B C D A time after A B C D time Fig. 2. Behavior of beacon alignment synchronization for common beacon interval values he algorithm consists of three stes; the first ste is to determine the B offsets between all eers. With this information then the steady node can be determined, which will furthermore not shift its B. In the third ste all but the steady node will gradually shift their Bs until they are aligned with their eers. he algorithm s behavior is illustrated for an examle MBSS in Fig. 2. Here in the uer art the B timing of the MBSS is given before the beacon alignment algorithm starts, while the lower art shows the situation after the alignment rocedure is finished. he beacon transmissions at B are indicated in black while the awake hases are marked in grey. In the following we will look at the individual stes in more detail. he first ste for each node is to calculate the B offsets among all eers. o determine these, only two values are required, which can both be determined on receit of a beacon or robe resonse frame. his makes the aroach equally alicable to active or assive scanning before joining the MBSS. he first value is the beacon interval of the neighbor in microsecond units calculated from the corresonding frame field. he second value is the SF offset offset of the local node towards the eer node in microsecond units as described in the IEEE standard [1] for neighbor offset synchronization: offset is calculated from the SF timestam set by the transmitter t and the SF timestam r set by the receiver. he offset determined by a node A towards a node B, offset,ab = t,b r,a, reresents the absolute SF difference between the two nodes and allows to determine the eer s SF from the local SF. Based on and offset, node A is able to determine the B offset towards node B as follows: Boffset,AB= offset,ab mod min,a,,b As we look for offsets towards later B, which generally corresond to negative values, it is sometimes necessary to get the comlementary offset value to the next later B: min * Boffset,AB= Boffset,AB,A,,B o determine the B offset between two eers B and C, node A alies the following equation: mod min Boffset,BC= offset,ac offset,ab,b,,c

6 In the revious ste we calculated all eer s B offsets towards all other eers. Out of these only the offsets between Bs that directly follow one another are of interest, e.g. in the examle of Fig. 2 Boffset,AB and Boffset,BC. hese are the er-eer minimum B offsets. Notice that offsets to B later than the own are negative values. Hence, when comaring offsets we seak in absolute terms. With this information gathered, the node is aware of its eer s B timing as deicted in the uer illustration of Fig. 2. In the second ste the individual nodes determine the node with the largest minimum B offset among all eers this node is subsequently called the steady node. In the examle of Fig. 2 node D is the steady node, due to its large offset towards A. All but the steady node will gradually delay their B, thus slowly shifting towards the right in Fig. 2. he result of the algorithm in the given examle is shown in the lower art of Fig. 2: all MBSS members wake u only once er beacon interval, thus minimizing the wakeu overhead and energy consumtion. A minimum remaining B offset is re-configured to avoid increased contention between the aligned beacon transmissions. he key criterion for our algorithm is to minimize the time until all eer Bs are aligned. Our algorithm avoids moving the longest B offset while all other node s B move concurrently. hus the time until all beacons are aligned is minimal. For neighbor offset synchronization, IEEE mandates shifting B with a maximum of 0.04% of the beacon interval er beacon eriod. For our algorithm the maximum time to termination would be exerienced in the case of an infinite number of eers with common beacon interval and Bs distributed evenly. In this case the maximum distance shifted would be one full beacon interval. In this worst case scenario the beacon alignment synchronization would require 2500 beacon eriods until termination which translates to 512s for a beacon interval of 200U (time units of 1024µs). his may not be suitable for a short-lived mesh network of mobile nodes. o avoid this issue, our algorithm might as well be imlemented as art of the mesh joining rocedure. In this case all required inut values are acquired through active or assive scanning before the node starts beaconing itself. Based on this information the node may then choose a suitable B. he algorithm erforms similar in an MBSS of eers with different beacon interval values. IEEE mandates that the beacon intervals of MBSS members do not have to be equal, but only values to the ower of two are allowed. In this case the rules formulated in this section form multile wakeu grous deending on the minimum beacon interval. o coe with clock drift among eer nodes, the schemes from neighbor offset synchronization may be used once the alignment rocedure is finished. Node movement or limited visibility may result in beacon losses and a differing determination of the steady node. Under most circumstances this will not cause further issues excet for creating multile wakeu grous. Under rare circumstances a circular deendency may lead to ever-following B shifts. For this to haen, a quasi-circular toology is required in which the initial B distribution of the neighboring eers follows one another. his issue may be avoided by imlementing a timeout, where the node stos shifting its B after the exected maximum algorithm runtime of 2500 beacon eriods.

7 Fig. 3. Beacon alignment synchronization of seven eers with common beacon interval ongoing (50mV/div vert., 200ms/div hori.) Fig. 4. Beacon alignment synchronization of seven eers with common beacon interval terminated (50mV/div vert., 200ms/div hori.) 4 ALGORIHM EVALUAION In this section we evaluate the new synchronization algorithm described in section 3. First, we resent testbed measurements to qualitatively visualize the algorithm and to obtain real-life arameters. Second, we feed the measured values into models of the owersave algorithms to quantitatively evaluate and comare their erformance. 4.1 estbed Imlementation In order to evaluate the synchronization and ower saving algorithms of IEEE s and to obtain arameters from real-life Wi-Fi mesh equiment, we set u a testbed. We imlemented the necessary routines in the Linux kernel s Wi-Fi stack [8] in cooeration with the original authors of the oen Wi-Fi mesh imlementation, cozybit Inc. [9]. Most of the code is made oen source and included in current Linux distributions. On hardware, which emloys a soft-mac architecture where most MAC layer management functions are erformed in software, the full range of the s ower saving and synchronization schemes is available. Furthermore, we imlemented the beacon alignment algorithm using the extensible synchronization framework, which allows us to switch between our algorithm and the standard s neighbor offset synchronization. As embedded mobile mesh devices, e.g. smarthones, are not yet available, we used off-the-shelf Netgear WNDR3800 Wi-Fi routers that rovide a suitable soft-mac rotocol stack. In our setu we measured the overall device current consumtion that also includes ower sinks that are not Wi-Fi related, like CPU or Ethernet controller. he measurements were rocessed using a ektronix LS-216 digital oscilloscoe and logic analyzer. he oscilloscoe lots were taken with a samling rate of 1kS/s and a scale of 50mV/div vertical and 200ms/div horizontal. o reduce transients and noise effects an averaging factor of 10 was used. Fig. 3 shows a measurement lot taken in a setu with seven close-by eer nodes where the beacon alignment synchronization is enabled and has just started. he highest sike in current consumtion marks the device s beacon frame transmission followed by the awake window eriod configured to 100U. he smaller consumtion

8 able 1. Model Parameters Model Parameter Configured beacon interval Configured awake window AW Measured awake window duration AWO Measured eer wakeu duration P Configured residual B offset RO Value 200U 10U 16.24ms 12.12ms 4.9ms eaks are the wakeus for the eer Bs. he vertical bars serve as a reference to the beacon interval of 1000U. he area under the grah between the drawn reference bars corresonds to the current consumtion er beacon interval. Given that the network is idle, this curve reeats eriodically for each beacon interval. he mesh router of Fig. 3 has seven established eer links and all eer nodes use an equal beacon interval of 1000U. As all nodes are direct eers of each other they can equally determine the steady node. In the situation of Fig. 3 the steady node is the node whose B is marked by the vertical reference bars. All other nodes start shifting their B towards the right. he node with the highest to-shift distance is the node on the right side of the ga; it has aroximately 60% of the beacon interval to shift. hus, in the situation of Fig. 3 the algorithm will take about 1500s until it terminates with all beacons aligned. Because of the gradual movement of all but the steady node s B and the alied averaging, the current consumtion eaks are slightly deformed to a triangular shae. Fig. 4 shows the outcome of the situation of Fig. 3 after the synchronization algorithm has terminated. As all nodes use a common beacon interval, one single wakeu grou is formed. he final current consumtion deends on the osition within the grou of aligned Bs. his osition determines whether the own awake window overlas with the wakeus for eer Bs. In Fig. 4 the electrical current consumtion er beacon interval is 354,69mAs, while it had been mAs in the situation of Fig. 3. Instead of the actual seven eers of this MBSS, this corresonds to the consumtion in a scenario with only three eers. So the overall wakeu duration and energy consumtion is successfully reduced by the roosed beacon alignment synchronization algorithm. 4.2 Model-based Evaluation In this section we evaluate our beacon alignment algorithm using a model-based aroach. herefore, we use a state model consisting of the states seen in Fig. 5: doze state, awake window and eer wakeu. he doze state corresonds to the state when both the receiver and transmitter hardware are owered down and the ower consumtion is minimal. he awake window state refers to the awake duration after the beacon transmission and the corresonding wakeu overhead. he eer wakeu state corresonds to the awake duration including overhead required for waking u to receive eer beacons in light slee mode. Fig. 5 illustrates the general case for IEEE s light slee mode. Deending on the lacement of the own B and eer s

9 S 0 : doze S 1 : awake window S 2 : eer wakeu S 0 : doze S 1 : awake window + eer wakeus Fig. 5. General State model of mesh light slee mode without traffic Fig. 6. State model for the best case outcome after beacon alignment beacon transmissions the state transitions occur. i corresonds to the time share of the sojourn time in the resective state i. As we assume the system to be modelled comrehensively within these three states, the sum of their time shares is one: For this general case it is non-trivial to determine the time shares of the individual states. Hence, we chose to evaluate only the following three case scenarios: the worst case scenario of unaligned Bs without any overla, the best and the worst case after beacon alignment. We will subsequently use the arameters given in able 1. he arameters for beacon interval and awake window are the ones recommended for moderate ower save in [1] Annex W.3.4, while the measured values have been obtained from our lab setu of section 4.1. he arameter RO describes the minimum offset that is reserved between aligned Bs to avoid contention between the beacon transmissions. he value has been configured according to the value given as the average beacon frame delay in [10]. We furthermore assume that all eers are configured equally and have common characteristics. Using these models and arameters we will derive erformance bounds to comare the erformance of our beacon alignment algorithm to that of the standard s neighbor offset synchronization. Model for unaligned Bs, worst case. his model case refers to the situation that, due to the arbitrary B lacement, there are no overlaing awake hases for the current node, i.e. a eer wakeu never haens during an awake window or during another eer wakeu. For the model deicted in Fig. 5 this means that there are no state transitions between S 1 and S 2. Deending on the arameters and the number of eers N we can immediately determine the time shares of the awake window state, 1, and eer wakeu state, 2 : 2 1 N AWO N P 1

10 he model can easily be solved to determine the time share of the doze state: 0 N 1 AWO N Model for aligned Bs, worst case. his model case refers to the situation that the Bs have been aligned by our beacon alignment synchronization algorithm and we are looking at the current consumtion of the steady node, i.e. the node at the end of the wakeu grou. As this node has its awake window trailing the eer wakeus, it has the highest energy consumtion of the grou. For the model deicted in Fig. 5 this means that there is a strict order of events from S 0 to S 2 to S 1 and to S 0 again, while the transitions S 0 to S 1, S 1 to S 2 and S 2 to S 0 do not occur here. he state time shares of this model are given below. For ease of notation we use a variable time PA, which is the duration of the aligned eer wakeu. In case of a single eer, the aligned wakeu duration PA is equal to P, while all further aligned eers extend its duration by RO. 2 PA N N 1 PA AWO P 0 N 1, for N 0 RO P, for N 0 he model can be solved to determine the time share of the doze state: 0 N 1 AWO Model for aligned Bs, best case. For the case that the Bs have been aligned and we are looking at the current consumtion of first node of the grou we use a different model from the one used before. his is necessary, as the aligned eer wakeu state may be omitted in case it is comletely enclosed by the awake window. he corresonding model is illustrated in Fig. 6. Again, the state time shares sum u to one: 0 1 In this model the number of eers influences whether the eer wakeus fit into the own awake window or if the wakeu eriod is extended due to the trailing eer wakeus. he time share of the awake state in this model is as follows: max 1N 1 AWO, PA PA

11 doze state time share aligned, best case aligned, worst case unaligned, worst case number of light slee eer links Fig. 7. Doze state time share of the different models he model can be solved to determine the time share of the doze state 0 : 0 N 1 max Model comarison. With the doze state time share determined for the three different model cases, we can now comare the erformance of the beacon alignment algorithm with the standard s neighbor offset synchronization. Fig. 7 shows the doze state time share of the different models. It can be seen that the unaligned Bs of neighbor offset synchronization have the lowest doze state time share of the three models. he grah shows only the worst case with a linear decline of doze state time share. Since in neighbor offset synchronization the B lacement is comletely arbitrary, there actually is a high sread of ossible outcomes; with a small robability this scheme may erform equally well to the uer bound of beacon alignment. he worst and best case results for beacon alignment on the other hand show a higher doze state time share. Also they dislay a much smaller sread due to the imlied ordering rocess of the algorithm. he best case grah starts with a constant doze state time share until the duration of aligned eer wakeus exceeds the modelled node s awake window. he grah for the worst case results of beacon alignment exhibits an initial strong decline in doze state time share for the first eer, while the sloe is smaller for any further node. he erformance bounds of beacon alignment may be further imroved by reducing the remaining B offset RO. But this in turn may increase the contention between eer s beacon and oll frame transmissions. Still, the doze state time share dros linearly with increasing number of eers. his issue can only be avoided comletely by using dee slee mode, where nodes will not wake u for eer s Bs anymore. his in turn reduces network erformance and requires secial treatment, e.g. for broadcast forwarding. AWO, PA

12 5 Conclusion In this aer we roose a standard-comliant synchronization scheme to overcome the scalability issues of IEEE s light slee mode. Our algorithm aligns all eer Bs in a narrow time range, which allows nodes in ower save mode to wake u for minimum time to receive all eer beacons. hus, we minimize the energy consumtion overhead of waking u the radio for each eer individually. o evaluate our roosed algorithm we use both testbed measurements and a model-based aroach. Using the testbed we rovide a roof of concet and extract real-life arameters of the s ower save algorithm on off-the-shelf hardware. In the models of the ower save algorithms we use these arameters to get an estimation of their efficiency with resect to increasing number of eer nodes in dense scenarios. We comare the erformance of our new synchronization algorithm to that of the one standardized by IEEE with resect to its effect on the ratio of doze and awake state, which directly translates to energy consumtion. he results show that, although a constant doze/awake ratio with increasing number of light slee eer links cannot be achieved, the roosed algorithm successfully increases the ower save algorithm s scalability. In our future work we will address oen issues of links in dee slee state and design heuristics to control the link ower modes deending on the network conditions. 6 References 1. IEEE Std , Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Secifications. IEEE Comuter Society (May 2012) 2. M. Porsch and. Bauschert, A estbed Analysis of the Effects of IEEE s Power Save on Mesh Link Performance, EUNICE 2012, Lecture Notes in Comuter Science volume 7479,. 1 11, Sringer, (2012) 3. M.N. Alam, R. Jäntti., J. Kneckt and J. Nieminen, Performance Study of IEEE s PSM in FP-CP, Vehicular echnology Conference (VC Fall), 2012 IEEE, M. Porsch and. Bauschert, A estbed Evaluation of the Scalability of IEEE s Light Slee Mode, EUNICE 2013, Lecture Notes in Comuter Science volume 8115, , Sringer, (2013) 5. V. Vishnevsky, A. Lyakhov and A. Safonov, New Asect of Beaconing in IEEE 802.1ls Mesh Networks, Comuters and Communications, ISCC th IEEE Symosium on, A. yrrell, G. Auer and C. Bettstetter, Synchronization Insired from Nature for Wireless Meshed Networks, International Conference on Wireless Communications, Networking and Mobile Comuting WiCOM 2006, A. Safonov, A. Lyakhov and S. Sharov, Synchronization and Beaconing in IEEE s Mesh Networks. International Conference on elecommunications 2008, IC 2008, June 16-19, Official Linux Kernel, mac80211 kernel module source code htt://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/tree/net/mac cozybit Inc., S. Mangold, S. Choi, P. May, O. Klein, G. Hiertz and L. Stibor, IEEE e Wireless LAN for Quality of Service, Proceedings of the Euroean Wireless, , 2002

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,

More information

521493S Computer Graphics Exercise 3 (Chapters 6-8)

521493S Computer Graphics Exercise 3 (Chapters 6-8) 521493S Comuter Grahics Exercise 3 (Chaters 6-8) 1 Most grahics systems and APIs use the simle lighting and reflection models that we introduced for olygon rendering Describe the ways in which each of

More information

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China

More information

A Low-latency and Energy-efficient TDMA Protocol for Wireless Sensor Networks

A Low-latency and Energy-efficient TDMA Protocol for Wireless Sensor Networks A Low-latency and nergy-efficient Protocol for Wireless Sensor Networks Guoqiang Zheng 1, 2, a, Yaru Sun 1, b, Huahong Ma 1, c, Baofeng Ji 1, d, Jishun Li 2, 3, e and Yujun Xue 2, 3, f 1 School of lectronic

More information

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,

More information

Modeling Reliable Broadcast of Data Buffer over Wireless Networks

Modeling Reliable Broadcast of Data Buffer over Wireless Networks JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 3, 799-810 (016) Short Paer Modeling Reliable Broadcast of Data Buffer over Wireless Networs Deartment of Comuter Engineering Yeditee University Kayışdağı,

More information

Semi-Markov Process based Model for Performance Analysis of Wireless LANs

Semi-Markov Process based Model for Performance Analysis of Wireless LANs Semi-Markov Process based Model for Performance Analysis of Wireless LANs Murali Krishna Kadiyala, Diti Shikha, Ravi Pendse, and Neeraj Jaggi Deartment of Electrical Engineering and Comuter Science Wichita

More information

Distributed Systems (5DV147)

Distributed Systems (5DV147) Distributed Systems (5DV147) Mutual Exclusion and Elections Fall 2013 1 Processes often need to coordinate their actions Which rocess gets to access a shared resource? Has the master crashed? Elect a new

More information

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment

More information

Computer Communications

Computer Communications Comuter Communications 34 (2011) 54 67 Contents lists available at ScienceDirect Comuter Communications journal homeage: www.elsevier.com/locate/comcom Review A survey of energy efficient MAC rotocols

More information

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture

More information

Directed File Transfer Scheduling

Directed File Transfer Scheduling Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was

More information

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1 Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and

More information

EE678 Application Presentation Content Based Image Retrieval Using Wavelets

EE678 Application Presentation Content Based Image Retrieval Using Wavelets EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective

More information

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism Erlin Yao, Mingyu Chen, Rui Wang, Wenli Zhang, Guangming Tan Key Laboratory of Comuter System and Architecture Institute

More information

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model Ad Hoc Networks (4) 5 68 Contents lists available at SciVerse ScienceDirect Ad Hoc Networks journal homeage: www.elsevier.com/locate/adhoc Latency-minimizing data aggregation in wireless sensor networks

More information

Distributed Systems. 7. Coordination and Agreement

Distributed Systems. 7. Coordination and Agreement Distributed Systems 7. Coordination and Agreement Werner Nutt 1 Co-ordination Algorithms are fundamental in distributed systems: to dynamically re-assign the role of master choose rimary server after crash

More information

Distributed Algorithms

Distributed Algorithms Course Outline With grateful acknowledgement to Christos Karamanolis for much of the material Jeff Magee & Jeff Kramer Models of distributed comuting Synchronous message-assing distributed systems Algorithms

More information

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION Yugoslav Journal of Oerations Research (00), umber, 5- A BICRITERIO STEIER TREE PROBLEM O GRAPH Mirko VUJO[EVI], Milan STAOJEVI] Laboratory for Oerational Research, Faculty of Organizational Sciences University

More information

A Model-Adaptable MOSFET Parameter Extraction System

A Model-Adaptable MOSFET Parameter Extraction System A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313

More information

The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing

The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing Mikael Taveniku 2,3, Anders Åhlander 1,3, Magnus Jonsson 1 and Bertil Svensson 1,2

More information

Efficient Parallel Hierarchical Clustering

Efficient Parallel Hierarchical Clustering Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore

More information

A Study of Protocols for Low-Latency Video Transport over the Internet

A Study of Protocols for Low-Latency Video Transport over the Internet A Study of Protocols for Low-Latency Video Transort over the Internet Ciro A. Noronha, Ph.D. Cobalt Digital Santa Clara, CA ciro.noronha@cobaltdigital.com Juliana W. Noronha University of California, Davis

More information

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu

More information

An Efficient End-to-End QoS supporting Algorithm in NGN Using Optimal Flows and Measurement Feed-back for Ubiquitous and Distributed Applications

An Efficient End-to-End QoS supporting Algorithm in NGN Using Optimal Flows and Measurement Feed-back for Ubiquitous and Distributed Applications An Efficient End-to-End QoS suorting Algorithm in NGN Using Otimal Flows and Measurement Feed-back for Ubiquitous and Distributed Alications Se Youn Ban, Seong Gon Choi 2, Jun Kyun Choi Information and

More information

Statistical Detection for Network Flooding Attacks

Statistical Detection for Network Flooding Attacks Statistical Detection for Network Flooding Attacks C. S. Chao, Y. S. Chen, and A.C. Liu Det. of Information Engineering, Feng Chia Univ., Taiwan 407, OC. Email: cschao@fcu.edu.tw Abstract In order to meet

More information

A Novel Iris Segmentation Method for Hand-Held Capture Device

A Novel Iris Segmentation Method for Hand-Held Capture Device A Novel Iris Segmentation Method for Hand-Held Cature Device XiaoFu He and PengFei Shi Institute of Image Processing and Pattern Recognition, Shanghai Jiao Tong University, Shanghai 200030, China {xfhe,

More information

Record Route IP Traceback: Combating DoS Attacks and the Variants

Record Route IP Traceback: Combating DoS Attacks and the Variants Record Route IP Traceback: Combating DoS Attacks and the Variants Abdullah Yasin Nur, Mehmet Engin Tozal University of Louisiana at Lafayette, Lafayette, LA, US ayasinnur@louisiana.edu, metozal@louisiana.edu

More information

Construction of Irregular QC-LDPC Codes in Near-Earth Communications

Construction of Irregular QC-LDPC Codes in Near-Earth Communications Journal of Communications Vol. 9, No. 7, July 24 Construction of Irregular QC-LDPC Codes in Near-Earth Communications Hui Zhao, Xiaoxiao Bao, Liang Qin, Ruyan Wang, and Hong Zhang Chongqing University

More information

Implementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching

Implementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching Imlementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching Ju Hui Li, eng Hiot Lim and Qi Cao School of EEE, Block S Nanyang Technological University Singaore 639798

More information

An Indexing Framework for Structured P2P Systems

An Indexing Framework for Structured P2P Systems An Indexing Framework for Structured P2P Systems Adina Crainiceanu Prakash Linga Ashwin Machanavajjhala Johannes Gehrke Carl Lagoze Jayavel Shanmugasundaram Deartment of Comuter Science, Cornell University

More information

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method ITB J. Eng. Sci. Vol. 39 B, No. 1, 007, 1-19 1 Leak Detection Modeling and Simulation for Oil Pieline with Artificial Intelligence Method Pudjo Sukarno 1, Kuntjoro Adji Sidarto, Amoranto Trisnobudi 3,

More information

Privacy Preserving Moving KNN Queries

Privacy Preserving Moving KNN Queries Privacy Preserving Moving KNN Queries arxiv:4.76v [cs.db] 4 Ar Tanzima Hashem Lars Kulik Rui Zhang National ICT Australia, Deartment of Comuter Science and Software Engineering University of Melbourne,

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

Randomized algorithms: Two examples and Yao s Minimax Principle

Randomized algorithms: Two examples and Yao s Minimax Principle Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum

More information

EP2200 Performance analysis of Communication networks. Topic 3 Congestion and rate control

EP2200 Performance analysis of Communication networks. Topic 3 Congestion and rate control EP00 Performance analysis of Communication networks Toic 3 Congestion and rate control Congestion, rate and error control Lecture material: Bertsekas, Gallager, Data networks, 6.- I. Kay, Stochastic modeling,

More information

A 2D Random Walk Mobility Model for Location Management Studies in Wireless Networks Abstract: I. Introduction

A 2D Random Walk Mobility Model for Location Management Studies in Wireless Networks Abstract: I. Introduction A D Random Walk Mobility Model for Location Management Studies in Wireless Networks Kuo Hsing Chiang, RMIT University, Melbourne, Australia Nirmala Shenoy, Information Technology Deartment, RIT, Rochester,

More information

Image Segmentation Using Topological Persistence

Image Segmentation Using Topological Persistence Image Segmentation Using Toological Persistence David Letscher and Jason Fritts Saint Louis University Deartment of Mathematics and Comuter Science {letscher, jfritts}@slu.edu Abstract. This aer resents

More information

Power Efficient Scheduled-Based Medium Access Control Protocol over Wireless Sensor Networks

Power Efficient Scheduled-Based Medium Access Control Protocol over Wireless Sensor Networks Wireless Network, 2016, 8, 13-23 Published Online February 2016 in SciRes. htt://www.scir.org/journal/wsn htt://dx.doi.org/10.4236/wsn.2016.82002 Power Efficient Scheduled-Based Medium Access Control Protocol

More information

PA-NEMO: Proxy Mobile IPv6-aided Network Mobility Management Scheme for 6LoWPAN

PA-NEMO: Proxy Mobile IPv6-aided Network Mobility Management Scheme for 6LoWPAN htt://dx.doi.org/10.5755/j01.eee.20.3.3951 ELEKRONIKA IR ELEKROENIKA, ISSN 1392-1215, VOL. 20, NO. 3, 2014 PA-NEMO: Proxy Mobile IPv6-aided Network Mobility Management Scheme for 6LoWPAN Ke Xiong 1, Yu

More information

A Comprehensive Minimum Energy Routing Scheme for Wireless Ad hoc Networks

A Comprehensive Minimum Energy Routing Scheme for Wireless Ad hoc Networks A Comrehensive Minimum Energy Routing Scheme for Wireless Ad hoc Networks Jinhua Zhu, Chunming Qiao and Xin Wang Deartment of Comuter Science and Engineering State University of New York at Buffalo, Buffalo,

More information

Performance Incentives for Cooperation between Wireless Mesh Network Operators

Performance Incentives for Cooperation between Wireless Mesh Network Operators Performance Incentives for Cooeration between Wireless Mesh Network Oerators Xenofon Fafoutis and Vasilios A. Siris Institute of Comuter Science, Foundation for Research and Technology - Hellas (FORTH)

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

The Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks

The Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks The Scalability and Performance of Common Vector Solution to Generalized abel Continuity Constraint in Hybrid Otical/Pacet etwors Shujia Gong and Ban Jabbari {sgong, bjabbari}@gmuedu George Mason University

More information

Grouping of Patches in Progressive Radiosity

Grouping of Patches in Progressive Radiosity Grouing of Patches in Progressive Radiosity Arjan J.F. Kok * Abstract The radiosity method can be imroved by (adatively) grouing small neighboring atches into grous. Comutations normally done for searate

More information

A GPU Heterogeneous Cluster Scheduling Model for Preventing Temperature Heat Island

A GPU Heterogeneous Cluster Scheduling Model for Preventing Temperature Heat Island A GPU Heterogeneous Cluster Scheduling Model for Preventing Temerature Heat Island Yun-Peng CAO 1,2,a and Hai-Feng WANG 1,2 1 School of Information Science and Engineering, Linyi University, Linyi Shandong,

More information

RECENTLY, considerable research efforts have been put to

RECENTLY, considerable research efforts have been put to IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 9, SEPTEMBER 2011 1283 Adative Asynchronous Slee Scheduling Protocols for Delay Tolerant Networks Bong Jun Choi, Student Member, IEEE, and Xuemin (Sherman)

More information

Analytical Modelling and Message Delay Performance Evaluation of the IEEE MAC Protocol

Analytical Modelling and Message Delay Performance Evaluation of the IEEE MAC Protocol Analytical Modelling and Message Delay Performance Evaluation of the IEEE 8.6 MAC Protocol Luís F. M. de Moraes and Danielle Loes F. G. Vieira Laboratório de Redes de Alta Velocidade - Universidade Federal

More information

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal

More information

A Robust Implicit Access Protocol for Real-Time Wireless Collaboration

A Robust Implicit Access Protocol for Real-Time Wireless Collaboration A Robust Imlicit Access Protocol for Real-Time Wireless Collaboration Tanya L. Crenshaw, Ajay Tirumala, Sencer Hoke, Marco Caccamo Deartment of Comuter Science University of Illinois Urbana, IL 61801 {tcrensha,

More information

A Petri net-based Approach to QoS-aware Configuration for Web Services

A Petri net-based Approach to QoS-aware Configuration for Web Services A Petri net-based Aroach to QoS-aware Configuration for Web s PengCheng Xiong, YuShun Fan and MengChu Zhou, Fellow, IEEE Abstract With the develoment of enterrise-wide and cross-enterrise alication integration

More information

Election Algorithms. has elected i. will eventually set elected i

Election Algorithms. has elected i. will eventually set elected i Election Algorithms Election 8 algorithm designed to designate one unique rocess out of a set of rocesses with similar caabilities to take over certain functions in a distributes system central server

More information

10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1

10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1 10 File System 1 We will examine this chater in three subtitles: Mass Storage Systems OERATING SYSTEMS FILE SYSTEM 1 File System Interface File System Imlementation 10.1.1 Mass Storage Structure 3 2 10.1

More information

Skip List Based Authenticated Data Structure in DAS Paradigm

Skip List Based Authenticated Data Structure in DAS Paradigm 009 Eighth International Conference on Grid and Cooerative Comuting Ski List Based Authenticated Data Structure in DAS Paradigm Jieing Wang,, Xiaoyong Du,. Key Laboratory of Data Engineering and Knowledge

More information

An Efficient Video Program Delivery algorithm in Tree Networks*

An Efficient Video Program Delivery algorithm in Tree Networks* 3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,

More information

Bayesian Oil Spill Segmentation of SAR Images via Graph Cuts 1

Bayesian Oil Spill Segmentation of SAR Images via Graph Cuts 1 Bayesian Oil Sill Segmentation of SAR Images via Grah Cuts 1 Sónia Pelizzari and José M. Bioucas-Dias Instituto de Telecomunicações, I.S.T., TULisbon,Lisboa, Portugal sonia@lx.it.t, bioucas@lx.it.t Abstract.

More information

Layered Switching for Networks on Chip

Layered Switching for Networks on Chip Layered Switching for Networks on Chi Zhonghai Lu zhonghai@kth.se Ming Liu mingliu@kth.se Royal Institute of Technology, Sweden Axel Jantsch axel@kth.se ABSTRACT We resent and evaluate a novel switching

More information

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Journal of Comuting and Information Technology - CIT 8, 2000, 1, 1 12 1 Comlexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Eunice E. Santos Deartment of Electrical

More information

A Symmetric FHE Scheme Based on Linear Algebra

A Symmetric FHE Scheme Based on Linear Algebra A Symmetric FHE Scheme Based on Linear Algebra Iti Sharma University College of Engineering, Comuter Science Deartment. itisharma.uce@gmail.com Abstract FHE is considered to be Holy Grail of cloud comuting.

More information

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution Texture Maing with Vector Grahics: A Nested Mimaing Solution Wei Zhang Yonggao Yang Song Xing Det. of Comuter Science Det. of Comuter Science Det. of Information Systems Prairie View A&M University Prairie

More information

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links

More information

Brief Contributions. A Geometric Theorem for Network Design 1 INTRODUCTION

Brief Contributions. A Geometric Theorem for Network Design 1 INTRODUCTION IEEE TRANSACTIONS ON COMPUTERS, VOL. 53, NO., APRIL 00 83 Brief Contributions A Geometric Theorem for Network Design Massimo Franceschetti, Member, IEEE, Matthew Cook, and Jehoshua Bruck, Fellow, IEEE

More information

A Method to Determine End-Points ofstraight Lines Detected Using the Hough Transform

A Method to Determine End-Points ofstraight Lines Detected Using the Hough Transform RESEARCH ARTICLE OPEN ACCESS A Method to Detere End-Points ofstraight Lines Detected Using the Hough Transform Gideon Kanji Damaryam Federal University, Lokoja, PMB 1154, Lokoja, Nigeria. Abstract The

More information

The Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005*

The Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005* The Anubis Service Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL-2005-72 June 8, 2005* timed model, state monitoring, failure detection, network artition Anubis is a fully

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Distrib. Comut. 71 (2011) 288 301 Contents lists available at ScienceDirect J. Parallel Distrib. Comut. journal homeage: www.elsevier.com/locate/jdc Quality of security adatation in arallel

More information

A STUDY ON CALIBRATION OF DIGITAL CAMERA

A STUDY ON CALIBRATION OF DIGITAL CAMERA A STUDY ON CALIBRATION OF DIGITAL CAMERA Ryuji Matsuoka a, *, Kiyonari Fukue a, Kohei Cho a, Haruhisa Shimoda a, Yoshiaki Matsumae a, Kenji Hongo b, Seiju Fujiwara b a Tokai University Research & Information

More information

Collective Communication: Theory, Practice, and Experience. FLAME Working Note #22

Collective Communication: Theory, Practice, and Experience. FLAME Working Note #22 Collective Communication: Theory, Practice, and Exerience FLAME Working Note # Ernie Chan Marcel Heimlich Avi Purkayastha Robert van de Geijn Setember, 6 Abstract We discuss the design and high-erformance

More information

Near-Optimal Routing Lookups with Bounded Worst Case Performance

Near-Optimal Routing Lookups with Bounded Worst Case Performance Near-Otimal Routing Lookus with Bounded Worst Case Performance Pankaj Guta Balaji Prabhakar Stehen Boyd Deartments of Electrical Engineering and Comuter Science Stanford University CA 9430 ankaj@stanfordedu

More information

has been retired This version of the software Sage Timberline Office Get Started Document Management 9.8 NOTICE

has been retired This version of the software Sage Timberline Office Get Started Document Management 9.8 NOTICE This version of the software has been retired Sage Timberline Office Get Started Document Management 9.8 NOTICE This document and the Sage Timberline Office software may be used only in accordance with

More information

Face Recognition Using Legendre Moments

Face Recognition Using Legendre Moments Face Recognition Using Legendre Moments Dr.S.Annadurai 1 A.Saradha Professor & Head of CSE & IT Research scholar in CSE Government College of Technology, Government College of Technology, Coimbatore, Tamilnadu,

More information

Patterned Wafer Segmentation

Patterned Wafer Segmentation atterned Wafer Segmentation ierrick Bourgeat ab, Fabrice Meriaudeau b, Kenneth W. Tobin a, atrick Gorria b a Oak Ridge National Laboratory,.O.Box 2008, Oak Ridge, TN 37831-6011, USA b Le2i Laboratory Univ.of

More information

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal International Journal of Information and Electronics Engineering, Vol. 1, No. 1, July 011 An Efficient VLSI Architecture for Adative Rank Order Filter for Image Noise Removal M. C Hanumantharaju, M. Ravishankar,

More information

Objectives. Part 1: Implement Friction Compensation.

Objectives. Part 1: Implement Friction Compensation. ME 446 Laboratory # Inverse Dynamics Joint Control Reort is due at the beginning of your lab time the week of Aril 9 th. One reort er grou. Lab sessions will be held the weeks of March th, March 6 th,

More information

Applying the fuzzy preference relation to the software selection

Applying the fuzzy preference relation to the software selection Proceedings of the 007 WSEAS International Conference on Comuter Engineering and Alications, Gold Coast, Australia, January 17-19, 007 83 Alying the fuzzy reference relation to the software selection TIEN-CHIN

More information

SPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation

SPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation To aear in IEEE VLSI Test Symosium, 1997 SITFIRE: Scalable arallel Algorithms for Test Set artitioned Fault Simulation Dili Krishnaswamy y Elizabeth M. Rudnick y Janak H. atel y rithviraj Banerjee z y

More information

EDGE: A ROUTING ALGORITHM FOR MAXIMIZING THROUGHPUT AND MINIMIZING DELAY IN WIRELESS SENSOR NETWORKS

EDGE: A ROUTING ALGORITHM FOR MAXIMIZING THROUGHPUT AND MINIMIZING DELAY IN WIRELESS SENSOR NETWORKS EDGE: A ROUTING ALGORITHM FOR MAXIMIZING THROUGHPUT AND MINIMIZING DELAY IN WIRELESS SENSOR NETWORKS Shuang Li, Alvin Lim, Santosh Kulkarni and Cong Liu Auburn University, Comuter Science and Software

More information

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical

More information

Autonomic Physical Database Design - From Indexing to Multidimensional Clustering

Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Stehan Baumann, Kai-Uwe Sattler Databases and Information Systems Grou Technische Universität Ilmenau, Ilmenau, Germany

More information

A Measurement Study of Internet Bottlenecks

A Measurement Study of Internet Bottlenecks A Measurement Study of Internet Bottlenecks Ningning Hu, Li (Erran) Li y, Zhuoqing Morley Mao z, Peter Steenkiste and Jia Wang x Carnegie Mellon University, Email: fhnn, rsg@cs.cmu.edu y Bell Laboratories,

More information

Swift Template Matching Based on Equivalent Histogram

Swift Template Matching Based on Equivalent Histogram Swift emlate Matching ased on Equivalent istogram Wangsheng Yu, Xiaohua ian, Zhiqiang ou * elecommunications Engineering Institute Air Force Engineering University Xi an, PR China *corresonding author:

More information

GRAPH CUT OPTIMIZATION FOR THE MUMFORD-SHAH MODEL

GRAPH CUT OPTIMIZATION FOR THE MUMFORD-SHAH MODEL GRAPH CUT OPTIMIZATION FOR THE MUMFORD-SHAH MODEL Noha El Zehiry 1,2, Steve Xu 2, Prasanna Sahoo 2 and Adel Elmaghraby 1 1 Deartment of Comuter Engineering and Comuter Science, University of Louisville,

More information

Collective communication: theory, practice, and experience

Collective communication: theory, practice, and experience CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Comutat.: Pract. Exer. 2007; 19:1749 1783 Published online 5 July 2007 in Wiley InterScience (www.interscience.wiley.com)..1206 Collective

More information

Truth Trees. Truth Tree Fundamentals

Truth Trees. Truth Tree Fundamentals Truth Trees 1 True Tree Fundamentals 2 Testing Grous of Statements for Consistency 3 Testing Arguments in Proositional Logic 4 Proving Invalidity in Predicate Logic Answers to Selected Exercises Truth

More information

A joint multi-layer planning algorithm for IP over flexible optical networks

A joint multi-layer planning algorithm for IP over flexible optical networks A joint multi-layer lanning algorithm for IP over flexible otical networks Vasileios Gkamas, Konstantinos Christodoulooulos, Emmanouel Varvarigos Comuter Engineering and Informatics Deartment, University

More information

Interactive Image Segmentation

Interactive Image Segmentation Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).

More information

Slides for Chapter 12: Coordination and Agreement

Slides for Chapter 12: Coordination and Agreement Slides for hater : oordination and greement rom oulouris, ollimore and Kindberg istributed Systems: oncets and esign dition, ailure ssumtions and ailure etectors reliable communication channels rocess

More information

A network performance-based device driven communication scheme for 5G networks

A network performance-based device driven communication scheme for 5G networks Received: 29 October 217 Revised: 26 December 217 Acceted: 27 December 217 DOI: 1.12/itl2.27 LETTER A network erformance-based device driven communication scheme for 5G networks Sanjay K. Biswash Dushantha

More information

Use of Multivariate Statistical Analysis in the Modelling of Chromatographic Processes

Use of Multivariate Statistical Analysis in the Modelling of Chromatographic Processes Use of Multivariate Statistical Analysis in the Modelling of Chromatograhic Processes Simon Edwards-Parton 1, Nigel itchener-hooker 1, Nina hornhill 2, Daniel Bracewell 1, John Lidell 3 Abstract his aer

More information

Control plane and data plane. Computing systems now. Glacial process of innovation made worse by standards process. Computing systems once upon a time

Control plane and data plane. Computing systems now. Glacial process of innovation made worse by standards process. Computing systems once upon a time Classical work Architecture A A A Intro to SDN A A Oerating A Secialized Packet A A Oerating Secialized Packet A A A Oerating A Secialized Packet A A Oerating A Secialized Packet Oerating Secialized Packet

More information

Constrained Empty-Rectangle Delaunay Graphs

Constrained Empty-Rectangle Delaunay Graphs CCCG 2015, Kingston, Ontario, August 10 12, 2015 Constrained Emty-Rectangle Delaunay Grahs Prosenjit Bose Jean-Lou De Carufel André van Renssen Abstract Given an arbitrary convex shae C, a set P of oints

More information

Building Polygonal Maps from Laser Range Data

Building Polygonal Maps from Laser Range Data ECAI Int. Cognitive Robotics Worksho, Valencia, Sain, August 2004 Building Polygonal Mas from Laser Range Data Longin Jan Latecki and Rolf Lakaemer and Xinyu Sun and Diedrich Wolter Abstract. This aer

More information

AN early generation of unstructured P2P systems is

AN early generation of unstructured P2P systems is 1078 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 16, NO. 11, NOVEMBER 2005 Dynamic Layer Management in Suereer Architectures Li Xiao, Member, IEEE, Zhenyun Zhuang, and Yunhao Liu, Member,

More information

Extracting Optimal Paths from Roadmaps for Motion Planning

Extracting Optimal Paths from Roadmaps for Motion Planning Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu

More information

Continuous Visible k Nearest Neighbor Query on Moving Objects

Continuous Visible k Nearest Neighbor Query on Moving Objects Continuous Visible k Nearest Neighbor Query on Moving Objects Yaniu Wang a, Rui Zhang b, Chuanfei Xu a, Jianzhong Qi b, Yu Gu a, Ge Yu a, a Deartment of Comuter Software and Theory, Northeastern University,

More information

Distributed Estimation from Relative Measurements in Sensor Networks

Distributed Estimation from Relative Measurements in Sensor Networks Distributed Estimation from Relative Measurements in Sensor Networks #Prabir Barooah and João P. Hesanha Abstract We consider the roblem of estimating vectorvalued variables from noisy relative measurements.

More information

Decoding-Workload-Aware Video Encoding

Decoding-Workload-Aware Video Encoding Decoding-Workload-Aware Video Encoding Yicheng Huang, Guangming Hong, Vu An Tran and Ye Wang Deartment of Comuter Science ational University of Singaore Law Link, Singaore 117590 Reulic of Singaore {huangyic,

More information

Phase Transitions in Interconnection Networks with Finite Buffers

Phase Transitions in Interconnection Networks with Finite Buffers Abstract Phase Transitions in Interconnection Networks with Finite Buffers Yelena Rykalova Boston University rykalova@bu.edu Lev Levitin Boston University levitin@bu.edu This aer resents theoretical models

More information