The Application of Bandwidth Optimization Technique in SLA Negotiation Process

Size: px
Start display at page:

Download "The Application of Bandwidth Optimization Technique in SLA Negotiation Process"

Transcription

1 The Application of Bandwidth Optiization Technique in SLA egotiation Process Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, Dubrovnik, Croatia Tel , Fax , e-ail Đuro Kužuilović University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, Dubrovnik, Croatia Tel , Fax , e-ail Abstract - In this paper we propose an efficient resource anageent technique for MPLS-based DiffServ networks The service provider (SP) can predict sufficient bandwidth resources on the link for traffic caused by contracting of SLAs (Service Level Agreeent) It could be an iportant part of adission control in the SLA negotiation process (SLA-creation) Decisions of optial capacity arrangeents fro network provider (P) have to be done interactively and dynaically It can significantly iprove QoS end-to-end routing in the oent of service invocation The proble of bandwidth optiization can be seen as an expansion proble of link capacities Such explicit traffic engineering technique provides the possibility to intelligently tailor the route foe each SLA traffic flow such that different parts of the network reain equally loaded can be done dynaically but such resource anageent approach has to be the result of all previous contracted SLAs, that are participating with definite bandwidth in the sae tie period Such bandwidth optiization technique helps to avoid the creation of bottleneck links on the path and aintains high network resource utilization efficiency The iportant difference fro existing traffic routing techniques is that optial path for SLA need not to be the shortest path solution as we have in eg OSPF protocol (often used for traffic routing in the oent of service invocation) Index Ters - dynaic bandwidth, adission control in DiffServ/MPLS networks, SLA creation, end-to-end QoS routing, traffic routing of aggregate flows I ITRODUCTIO In DiffServ networks the classification of the aggregated flows is perfored according to the SLA (Service Level Agreeent) signed between a custoer and the service provider (SP) operator Each SLA contract specifies a tie period for service utilization of defined service class and appropriate bandwidth (speed how traffic ay be sent) In general, any eleents define service class or QoS level To obtain quantitative end-to-end guarantees in DiffServ/MPLS architecture, based on traffic handling echaniss with aggregate flows, soe kind of bandwidth optiization technique (on the link) has to be introduced Multi-protocol label switching (MPLS) has gained popularity as a technology for anaging network resources and providing of perforance guarantees In this paper we are looking for optial path provisioning for traffic flows caused by all existing SLAs participating in the sae tie period (forer contracted SLAs); see fig and fig 2 The ain condition is: the sufficient network resources ust be available at any oent of that period In the worse case it ust be sufficient for the first service class (full satisfied) Any virtual network (V) is a subset of physical network resources purchased by an SP fro the IP transport network provider (P) to build a logical service delivery infrastructure It can be ade dynaically, using soe TE technique If we can predict sufficient link resources (without shortages) in the oent of SLA creation, the possibility of link congestions in V will be significantly reduced in the oent of service invocation The probles of dynaic bandwidth optiization technique are investigating Such proble can be seen as the link capacity expansion proble (CEP) fro the coon source with expansion values in allowed liits Explanation of the atheatical odel for link bandwidth QoS service clasess guaranteed (fully satisfied) adaptive (alost satisfied) best-effort SLA_3 SLA_4 SLA_ SLA_5 critical period SLA_2 tie Figure An exaple of nuber of SLAs that participate in the sae period of tie; see figure 2 The bandwidth optiization and the congestion control has to be done for that critical period (duration of new SLA)

2 SLA_3 ingress SLA_6 egress SLA_ 3 ingress SLA_ ingress SLA_2 ingress SLA_4 egress s SLA_ egress SLA_2 egress SLA_4 ingress SLA_5 egress SLA_6 ingress d SLA_ 4 SLA_ 6 SLA_ 3 5 Sla core network SLA_ 5 SLA_ egress SLA_3 egress SLA_5 ingress Figure 2 An exaple of nuber of SLAs in context of new SLA creation In service specifications (details about service activation and duration) they share bandwidth on the link in the sae period of tie; see fig expansion technique is given in section II Heuristic algorith is described in section III uerical exaples, testing results and algorith application are discussed in section IV The service provider (eg ISP) wants to accept new SLA (traffic flow) that generates the traffic flow between edge s In DiffServ/MPLS architecture we call the LER (Label Edge Router) Traffic deand on exit of LER represents the su of all ingress and egress flows Interior s in core network, capable to forward traffic in equivalent classes (FEC), are called LSR (Label Switching Routers) The network exaple that is shown in figure can be a good representation of such architecture Such aggregated flow is coing to LSR and has to be routed to destination (egress ) Packets of the sae FEC are assigned the sae label and generally traverse trough the sae path across the MPLS network A FEC ay consist of packets that have coon ingress and egress nodes, or the sae service class and sae ingress/egress nodes or any other cobination In this case, the FEC of appropriate service class aggregates traffic deands (new SLA and forer contracted SLAs) of the sae QoS level A path traversed by an FEC is called a label switching path (LSP) In that sense network operator has to find the optial path for the FEC without any congestion in the network Possibility of congestion on soe link (with liited bandwidth) exists, specially for definite period of tie; see fig For each counication link in the DiffServ network given traffic deands can be satisfied on any (usually three) different QoS levels (with appropriate bandwidth) At the SLA level, the transport network resources are shared by set of per-class, per ingress/egress-pair SLAs Traffic can be satisfied on appropriate QoS level or higher, but not on lower QoS level In fact, different LSP is used for different service class But SP doesn t want that transport network be divided into ultiple virtual networks, one per service class The end effect is that SP can give to preiu traffic ore resources, but exactly that is necessary, no less no ore In the sae tie SP strongly needs the optial utilization of liited capacity resources with inial bandwidth resources arrangeent fro P The optial resource anageent proble can be seen as the link capacity expansion proble (CEP) in allowed liits; see [4] and [6] With congestion control/expansion algorith we can predict link resources to satisfy traffic deands caused by all accepted SLAs If the optial routing sequence has any link expansion with value that exceeds allowed liits, it eans that link capacity on the path cannot be sufficient for such traffic It eans that new SLA cannot be accepted and ust be redefined through negotiation process For exaple, the custoer can decide to take the adaptive QoS service class instead of fully satisfied (guaranteed) service class Soe iportant papers about that proble are [], [2] and [3] In paper [] such bandwidth optiization technique is a part of TEQUILA architecture based on autonoic coputing In the paper [4] such algorith is a part of service anageent architecture In papers [8] and [9] siilar network engineering technique is related on path provisioning

3 II THE MATHEMATICAL MODEL The proble explained above can be solved as the capacity expansion proble (CEP) without shortages Partially expansions for each link are ade fro coon source in given liits Transission link capacities (bandwidth) on the path between s are capable to serve traffic deands for different QoS levels (service class) for i =,2,, Fig 3 gives an exaple of network flow representation for ultiple QoS levels () and M internal (core) s included in the path Let G (A, E) denote a network topology, where A is the set of nodes and E the set of links The source and destination nodes (eg edge s in IP-doain) are denoted by s and d respectively Between the there are M interior s on the path; see fig 3 For M interior s on the path we have: M links + 2 = M + links { =,, M+} In the atheatical odel the following notation is used: j and k = QoS level We differentiate n service classes (QoS levels)the levels are ranked fro i =,2,,, fro higher to lover = the order nuber of the link on the path, connecting two successive LSR s, =,, M+ u,v = the order nuber of capacity points in the subproble, u,, v M+ r = traffic deand increent for additional capacity I = the relative aount of idle capacity I i = 0, I M+ = 0 x = the aount of used capacity for facility L = upper bound for link capacity y = the aount of capacity for facility i on the link, redirected to satisfy the traffic of lower level j Consider a network G (A, E) where each link is characterized by z-diensional link weight vector, consisting of z-nonnegative QoS weights The nuber of QoS easures (eg bandwidth, delay) is denoted by z Weights are liited with appropriate constraints for each easure QoS easures can be roughly classified into additive (eg delay) and non-additive (eg available bandwidth) In case of an additive easure, the QoS value of the path is equal to the su of the corresponding weights of the link along that path For a non-additive easure, as we have in our proble, the QoS value of the path is the iniu (or axiu) link weight along the path In this atheatical odel it is assued that the network state inforation (eg traffic deands, link capacities, delay liits) are teporary static In general we have ulti-constrained proble (MCP) but in this paper we talk about one-diensional link weight vectors for M+ links on the path {w, E, i =,, } with only one constraint denoted with L Definition of the single-constrained proble is to find a path P fro node s to node d such that: M ( +, i, = i = w P ) = in w i ( I ) () where: I L (2) for i =,, ; =,, M+ A path obeying the above condition is said to be feasible ote that there ay be ultiple feasible paths between s and d Capacity situation I of each link depends of expansion solutions (x, y, ) Bandwidth constraints for link capacity values on the link and for appropriate service class are denoted with L (L, L 2,, L, ) Such proble is special case of the MCP O R, X, X,2 X,M I, =0, I,2,2 I,3 I,M,M I,M + = 0 r, r,2 r,m QoS le ve l I 2, =0 I,=0 y 2, 2, y 2, I 2,2 y 2,2 2,2 y 2,2 I,2,,2 I 2,3 r 2, y, r 2,2 y,2 r 2,M I,3 I 2,M I,M y 2,M 2,M y 2,M,M y,m I 2,M + = 0 I,M += 0 edge r, in te rio r r,2 r, M lin k lin k 2 lin k M + in te rio r M edge Figure 3 A network flow representation of the CEP odel applied for congestion control in SLA creation process Service classes are differentiated but possible traffic conversion is possible only in direction toward higher QoS level

4 proble, known as Restricted Shortest Path (RSP) proble We can say that each weight w depends of capacity situation on the link between two s (capacity expansion or conversion, inventory or shortage etc) That weight usually corresponds to the link expansion cost It eans that the link weight (cost) is the function of used capacity: lower aount of used capacity (saller bandwidth with delay in acceptable liits) gives lower weight (cost) The ain condition is that given traffic deands ust be fully satisfied without shortages onlinear cost function is necessary if link weights are not positively correlated III ALGORITHM DEVELOPMET The proble of the optial bandwidth on the link for given traffic deands with different QoS service classes can be seen as the Miniu Cost Multi-Coodity Flow Proble (MCMCF) in the single (coon) source ultiple destination network It is very coplex proble (-coplete) Instead of nonlinear convex optiization we used two-stage network optiization technique that is ore appropriate for such non-linear proble Looking for objective function (5) on the first stage of network optiization we are calculating the inial link weights between all pairs of capacity points Calculation of each weight value we call it: sub-proble Algorith is looking for the best expansion solution aong all possible (inial cost) On the second stage of optiization we are looking for the shortest path in the network with forer calculated link weights between node pairs; see fig 4 Link capacity that is capable to serve traffic deands of service class i we call facility It is used priarily to serve deands for QoS level but it can be used to satisfy traffic deands for QoS level j (j > i) Rerouting of traffic deands towards higher QoS level is the sae thing as facility conversion to lower QoS level In this odel conversion of traffic deand is peritted only in the direction toward higher QoS level It eans that alost satisfied service class (adaptive or best effort) can be treated as fully satisfied (guaranteed) service class, but not vice versa Explanation of diagra in fig 3: the -th row of nodes represents a possible link capacity state of each transission link between s for i-th QoS level Generalizing the concept of the capacity states for each quality level of transission link in which the capacity states of each link are known within defined liits we define a capacity point - α α = (I,, I 2,,, I, ) (3) α = α M+ = (0, 0,, 0) (4) In forulation (3) α denotes the vector of capacities I for all QoS levels (facility types) on link, and we call it capacity point Each colun on the flow diagras (fig 3) represents a capacity point, consisting of capacity state values Forulation (4) iplies that idle capacities or capacity shortages are not allowed on the link between edge and interior Total capacity value on the link can be positive only and shortages are not allowed Horizontal links between the represent the traffic flow between s Coon node O is the source for used capacity (expansions), introducing the new traffic on the link Vertical links represent facility conversion that is equal to rerouting of traffic deands to higher quality level (in opposite direction) If the link expansion cost corresponds to the weight of used capacity, the objective is to find optial routing policy that iniizes the total cost incurred over the whole path between edge s (M interior s and M + transission links) and to satisfy given traffic deands The flow theory enables separation of these extree flows, which can be a part of an optial expansion solution, fro those which cannot be With such heuristic approach we can obtain the near-optial result with significant coputational savings; see [4] The objective function for CEP proble can be forulated as follows: M + in c + ( ) + ( ) x h I + g y (5) = i= so that we have:, d(,) d(,c2) I = I + x y ri, j= i+ = I M + = 0 2, d2(,) d2(,c3) 2,C 2 + (6) d3(,) d3(,c4) d22(,) dm(,) d22(c2,c3) I (7) for =, 2,, M+; i =, 2,, ; j = i +,, In the objective function the total cost (weight) on the path fro edge to edge includes soe costs: the cost for capacity expansion c (x ), the idle capacity cost 3, d23(,) d22(,c3) 3,C 3 d2m(,) d2m(c2,) d23(,c4) d2m(c2,) d33(,) M+, Figure 4 Suppose that all links in the network are known, the optial solution for CEP can be found by searching for the optial sequence of capacity points and their associated link values 4, d33(c3,c4) 4,C 4 d3m(,) d3m(c3,) d4m(,) d4m(c4,)

5 D i x,v x,u x,u+ Guaranted (fully satisfied) I,u,u I,u+,u+ I,u+2,v I,v+ r,u r,u+ r,v+ QoS service classes y 2,u y 2,u+ y 2,v adaptive (al ost satisfied) I 2,u 2,u I 2,u+ 2,u+ I 2,u+2 2,v I 2,v+ r 2,u y 3,u r 2,u+ y 3,u+ r 2,v+ y 3,v y 23,u y 23,u+ y 23,v best-effort I 3,u I 3,u+ 3,u 3,u+ I 3,u+2 3,v I 3,v+ r 3,u r 3,u+ r 3,v+ links Figure 5 A network flow representation of a sub-proble for =3 h (I + ) as penalty cost to force the usage of the iniu link capacity (prevention of unused/idle capacity) For the link expansion in allowed liits we can set the expansion cost to zero or we can introduce different cost to each service class Also we can introduce facility conversion cost g (y ) that can control non-effective usage of link capacity Costs are often represented by the fix-charge cost or with constant value We assue that all cost functions are concave and nondecreasing, reflecting econoies of scale, and they change for appropriate link With different cost paraeters we can influence to the optiization process, looking for the ost appropriate routing solution A Capacity Expansion Sub-proble (CES) Let the value d u,v (α u, α v+ ) represents the iniu cost between two capacity points Calculation of that value is denoted as CES (Capacity Expansion Subproble) The expansion sub-proble for facilities i =, 2,, on the path between s u and v is as follows (see fig 5): v in c ( x ) + hi, ( I + ) + g ( y ) (8) = u i= j= + where I v+ = I u + Di ( u, v) Ri ( u, v) (9) v R i u, v) = r i, = u v D i (u,v)= = u ( (0) j = x i, y ; i j () for =, 2,, M+; i =, 2,, ; j = i +,, Let C be the nuber of capacity point values at position (for link between core s) Only one capacity point for the link that connects to the edge : C = C M+ = The total nuber of capacity points is: S I, 0 I 2, = x = D y 23 = 2 ; (- D 2 ) I 3, = 0 Internal M = + p C = C (2) In the CEP we have to find any cost values d u,v (α u, α v+ ) that eanate two capacity points, fro each node (u, α u ) to node (v+, α v+ ) for v u; see fig 4 The total nuber of all connections between capacity points is: = M d i M + Ci C j = j= i+ D 0 D 2 = -2 D 3 = 3 r, x 3 = ; (D 2 + D 3 ) r 2, = - r 3, = 3 Figure 6 An expansion solution I,+ I 2,+ = 0 I 3,+ = 0 + (3) The ost of the coputational effort is spent on coputing the sub-proble values The nuber of all possible d u,v values depends on the total nuber of capacity points It is very iportant to reduce that nuber

6 (C p ) and that can be done through iposing of appropriate capacity bounds or by introduction of adding constraints Lot of expansion solutions is not acceptable and they are not part of the optial sequence Any of the if it cannot be a part of the optial sequence is set to infinity This is the key of the heuristic approach The approach described in [7] requires solving repeatedly a certain single location expansion proble (SLEP) Many different expansion and conversion solutions (rerouting) can be derived, depending on D i polarity An exaple of the expansion solution can be seen in fig 6 In that case preiu class (fully satisfied) has to be expanded independently Traffic deands of lowest service class can be satisfied with capacity of higher class (conversion) because traffic deands of second class has negative polarity and idle capacity (surplus) on the link is present With such sharing approach of link bandwidth aong different quality levels we can solve traffic deands efficiently B Algorith coplexity Suppose that all links are known, the optial solution for CEP can be found by searching for the optial sequence of capacity points and their associated link state values for each location On that network optiization level proble can be seen as a shortest path proble for an acyclic network in which the nodes represent all possible values of capacity points and links represent sub-proble values; see fig 4 Than Dijkstra s algorith or any siilar algorith can be applied It has to be noted that the shortest path in such network need not to be the shortest path solution for routing of traffic flow (new SLA) between edge s Also, on this level of algorith calculation it is very easy to introduce delay liits on the path The nuber of all possible d u,v values depends on the total nuber of capacity points It is very iportant to reduce that nuber (C p ) and that can be done through iposing of appropriate capacity bounds or by introduction of adding constraints The required effort for one sub-proble is O( 2 M) The nuber of all possible d u,v values depends on the total nuber of capacity points If there are no liitations on capacity state (I ) and expansion aount (x ) the coplexity of such heuristic approach is pretty large and increases exponentially with Proble requires the coputation effort of O(M 3 4 R 2(-) i ) In real application we norally apply definite granularity of capacity values It reduces the nuber of the capacity points significantly IV TESTIG RESULTS We tested our algorith on any nuerical testexaples, looking for the best routing sequence on the Figure 7 In this nuerical test-exaple link capacities are sufficient to satisfy traffic deands (SLAs) Figure 8 In this nuerical test-exaple the lack of capacity is obvious and new SLA cannot be accepted

7 path Between edge s there are axiu six LSR (core s) and they are connected with seven links Traffic deands (SLAs) are overlapping in tie The heuristic algorith in all test-exaples can achieve nearoptial expansion sequence with inial total cost, that is equal or very close to that one we can get with algorith based on exact approach (calculating all possible capacity points and all sub-proble values) If the expansions of link capacities are possible (in allowed liits) or the capacity surplus is obvious, the traffic deands can be satisfied In exaple fro figure 7 we can see that traffic deands can be fully satisfied and capacity surplus for all links are positive or zero It eans that there are no negative values; see lower diagra in fig 7 In exaple fro figure 8 we can notice the lack of capacity on the second link (for second QoS level) It eans that traffic deands cannot be fully satisfied although the surplus is obvious on third (lower) QoS level There is no free capacity on the first QoS level (for the preiu service class) to be used instead It eans that adding capacity (fro P) cannot be arranged In that case new SLA cannot be accepted or ust be redefined through negotiation process With such anageent tool we can predict sufficient bandwidth on the link and possible congestions on the path very efficiently Also, we can introduce new link capacity resources (bandwidth) in optial way Optial bandwidth on the link and bandwidth arrangeent for given SLAs can be done fro P dynaically Such explicit traffic engineering technique provides the possibility to intelligently tailor the route foe each SLA traffic flow such that different parts of the network reain equally loaded Also, it helps to avoid the creation of bottleneck links on the path and ensures optial network resource utilization V COCLUSIOS In the process of SLA anageent in DiffServ/MPLS networks service provider (SP) needs bandwidth optiization technique to ensure sufficient resources fro P to satisfy traffic deands caused by forer contracted SLAs In this paper we proposed new bandwidth optiization technique that can ensure sufficient bandwidth on the link It could be ade dynaically through SLA negotiation process With such tool we can significantly reduce the possibility of traffic congestions in the oent of service invocation Proposed heuristic algorith is based on atheatical odel for the capacity expansion proble (CEP) The first aspect of algorith is that load balancing leads to inial cost for used bandwidth and to higher resource usage efficiency It can prevent critical network resources, not to be exhausted early and becoing a bottleneck for the network in the oent of service invocation It eans that such heuristic approach can be successfully applied for adission control in the SLA negotiation process, that is in fir correlation with resource reservation echaniss and adission control process in DiffServ networks The iportant difference fro existing traffic routing techniques is that optial path for SLA need not to be the shortest path solution as we have in eg OSPF protocol (often used for traffic routing in the oent of service invocation) REFERECES [] Yu Cheng, R Farha, A Tizghada and all, Virtual etwork Approach to Scalable IP Service Deployent and Efficient Resorce Manageent, IEEE Counicattion Mag, 2005, Vol 43, o 0, pp76-84 [2] K Gopalan, Tzi-cker Chiueh, Yow-Jian Lin, Load Balancing Routing with Bandwidth-Delay Guarantees, IEEE Counicattion Mag, 2004, Vol 42, o 6, pp08-3 [3] S Giordano, S Salsano, G Ventre, Advanced QoS Provisioning in IP etworks : The European Preiu IP Projects, IEEE Counications Mag, 2003, Vol 4 o, pp30-36 [4] S Krile, ew SLA Creation and Optial Resource Manageent, Proc of 3rd Conf CSDSP (Counication Systes, etworks and Digital Signal Processing), ew Castle (UK), 2004, pp52-55 [5] D Kagklis, C Tsakiris, Liapotis,, Quality of Service: A Mechanis for explicit activation of IP Services Based on RSVP, Journal of Electrical Engineering, Vol 54, o 9-0, Bratislava, 2003, pp [6] S Krile, S Saric, SLA Creation in Relation to Resource Manageent, Journal of Electrical Engineering (JEE), 2003, Vol 54, o 9-0, pp [7] S Krile, M Kos, A Heuristic Approach for Path Provisioning in Diff-Serv etworks, Proc 7 th ISSSTA (Int Syp On Spread-Spectru Tech & Application) - IEEE, Prag, 2002, pp [8] K Biswas, S Ganguly and R Izailov, Path provisioning for service level agreeents in differentiated services networks, ICC IEEE International Conference on Counications, vol 25, o, 2002, pp [9] E Bouillet, D Mitra, G K Raakrishnan, The structure and anageent of service level agreeents in networks, IEEE Journal on Selected Areas in Counications, Vol 20, o 4, 2002, pp69-699

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

Survivability Function A Measure of Disaster-Based Routing Performance

Survivability Function A Measure of Disaster-Based Routing Performance Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University

More information

Multipath Selection and Channel Assignment in Wireless Mesh Networks

Multipath Selection and Channel Assignment in Wireless Mesh Networks Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information

Integrating fast mobility in the OLSR routing protocol

Integrating fast mobility in the OLSR routing protocol Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr

More information

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant

More information

Multi Packet Reception and Network Coding

Multi Packet Reception and Network Coding The 2010 Military Counications Conference - Unclassified Progra - etworking Protocols and Perforance Track Multi Packet Reception and etwork Coding Aran Rezaee Research Laboratory of Electronics Massachusetts

More information

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S COPUTER GEERATED HOLOGRAS Optical Sciences 67 W.J. Dallas (onday, August 3, 004, 1:38 P) PART III: CHAPTER OE DIFFUSERS FOR CGH S Part III: Chapter One Page 1 of 8 Introduction Hologras for display purposes

More information

A Hybrid Network Architecture for File Transfers

A Hybrid Network Architecture for File Transfers JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,

More information

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se

More information

A Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem

A Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem IE Vol. 7, No. 2, pp. 84-92, Septeber 2008. A Coparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Proble Ji Ung Sun School of Industrial and Managent Engineering Hankuk University

More information

Identifying Converging Pairs of Nodes on a Budget

Identifying Converging Pairs of Nodes on a Budget Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering

More information

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses International Journal of Industrial Engineering & Production Research Septeber 03, Volue 4, Nuber 3 pp. 9-35 ISSN: 008-4889 http://ijiepr.iust.ac.ir/ Using Iperialist Copetitive Algorith in Optiization

More information

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

A Generic Architecture for Programmable Trac. Shaper for High Speed Networks. Krishnan K. Kailas y Ashok K. Agrawala z. fkrish,

A Generic Architecture for Programmable Trac. Shaper for High Speed Networks. Krishnan K. Kailas y Ashok K. Agrawala z. fkrish, A Generic Architecture for Prograable Trac Shaper for High Speed Networks Krishnan K. Kailas y Ashok K. Agrawala z fkrish, agrawalag@cs.ud.edu y Departent of Electrical Engineering z Departent of Coputer

More information

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium 1 A Distributed Multi-service Resource Allocation Algorith in Heterogeneous Wireless Access Mediu Muhaad Isail, Student Meber, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract In this paper, radio resource

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

Distributed Multicast Tree Construction in Wireless Sensor Networks

Distributed Multicast Tree Construction in Wireless Sensor Networks Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,

More information

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada

More information

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural

More information

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

Dynamical Topology Analysis of VANET Based on Complex Networks Theory

Dynamical Topology Analysis of VANET Based on Complex Networks Theory BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 14, Special Issue Sofia 014 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.478/cait-014-0053 Dynaical Topology Analysis

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

Handling Indivisibilities. Notes for AGEC 622. Bruce McCarl Regents Professor of Agricultural Economics Texas A&M University

Handling Indivisibilities. Notes for AGEC 622. Bruce McCarl Regents Professor of Agricultural Economics Texas A&M University Notes for AGEC 6 Bruce McCarl Regents Professor of Agricultural Econoics Texas A&M University All or None -- Integer Prograing McCarl and Spreen Chapter 5 Many investent and probles involve cases where

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem Theoretical Analysis of Local Search and Siple Evolutionary Algoriths for the Generalized Travelling Salesperson Proble Mojgan Pourhassan ojgan.pourhassan@adelaide.edu.au Optiisation and Logistics, The

More information

COMPARISON OF ANT COLONY OPTIMIZATION & PARTICLE SWARM OPTIMIZATION IN GRID ENVIRONMENT

COMPARISON OF ANT COLONY OPTIMIZATION & PARTICLE SWARM OPTIMIZATION IN GRID ENVIRONMENT COMPARISON OF ANT COLONY OPTIMIZATION & PARTICLE SWARM OPTIMIZATION IN GRID ENVIRONMENT B.BOOBA 1 Dr. T.V.GOPAL 2 1 Research Scholar, Assist. Professor(Sl.Gr),Departent of Coputer Applications, Easwari

More information

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networs F. Mousavi Madani Departent of coputer engineering Alzahra University Tehran, Iran, osavif@alzahra.ac.ir Received:

More information

IN many interactive multimedia streaming applications, such

IN many interactive multimedia streaming applications, such 840 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 5, MAY 06 A Geoetric Approach to Server Selection for Interactive Video Streaing Yaochen Hu, Student Meber, IEEE, DiNiu, Meber, IEEE, and Zongpeng Li, Senior

More information

Knowledge Discovery Applied to Agriculture Economy Planning

Knowledge Discovery Applied to Agriculture Economy Planning Knowledge Discovery Applied to Agriculture Econoy Planning Bing-ru Yang and Shao-un Huang Inforation Engineering School University of Science and Technology, Beiing, China, 100083 Eail: bingru.yang@b.col.co.cn

More information

End-to-End QoS Provisioning for Real-Time Video Streaming over SP-Driven P2P Networks Using Admission Control

End-to-End QoS Provisioning for Real-Time Video Streaming over SP-Driven P2P Networks Using Admission Control This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 29 proceedings End-to-End QoS Provisioning for Real-Tie Video

More information

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH V. Atienza; J.M. Valiente and G. Andreu Departaento de Ingeniería de Sisteas, Coputadores y Autoática Universidad Politécnica de Valencia.

More information

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage 216 IEEE 23rd International Conference on High Perforance Coputing A Low-Cost Multi-Failure Resilient Replication Schee for High Data Availability in Cloud Storage Jinwei Liu* and Haiying Shen *Departent

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles

More information

Optimal Route Queries with Arbitrary Order Constraints

Optimal Route Queries with Arbitrary Order Constraints IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL.?, NO.?,? 20?? 1 Optial Route Queries with Arbitrary Order Constraints Jing Li, Yin Yang, Nikos Maoulis Abstract Given a set of spatial points DS,

More information

Generating Mechanisms for Evolving Software Mirror Graph

Generating Mechanisms for Evolving Software Mirror Graph Journal of Modern Physics, 2012, 3, 1050-1059 http://dx.doi.org/10.4236/jp.2012.39139 Published Online Septeber 2012 (http://www.scirp.org/journal/jp) Generating Mechaniss for Evolving Software Mirror

More information

A Measurement-Based Model for Parallel Real-Time Tasks

A Measurement-Based Model for Parallel Real-Time Tasks A Measureent-Based Model for Parallel Real-Tie Tasks Kunal Agrawal 1 Washington University in St. Louis St. Louis, MO, USA kunal@wustl.edu https://orcid.org/0000-0001-5882-6647 Sanjoy Baruah 2 Washington

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13 Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical

More information

Adaptive Holistic Scheduling for In-Network Sensor Query Processing

Adaptive Holistic Scheduling for In-Network Sensor Query Processing Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,

More information

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction Relocation of ateway for Enhanced Tieliness in Wireless Sensor Networks Keal Akkaya and Mohaed Younis Departent of oputer Science and Electrical Engineering University of Maryland, altiore ounty altiore,

More information

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches Efficient Estiation of Inclusion Coefficient using HyperLogLog Sketches Azade Nazi, Bolin Ding, Vivek Narasayya, Surajit Chaudhuri Microsoft Research {aznazi, bolind, viveknar, surajitc}@icrosoft.co ABSTRACT

More information

QoS and Sensible Routing Decisions

QoS and Sensible Routing Decisions QoS and Sensible Routing Decisions Erol Gelenbe Dept. of Electrical & Electronic Engineering Iperial College London SW7 2BT e.gelenbe@iperial.ac.uk Abstract Network Quality of Service (QoS) criteria of

More information

The Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network

The Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network The Flaw Attack to the RTS/CTS Handshake Mechanis in Cluster-based Battlefield Self-organizing Network Zeao Zhao College of Counication Engineering, Hangzhou Dianzi University, Hangzhou 310018, China National

More information

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3 2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition

More information

Data & Knowledge Engineering

Data & Knowledge Engineering Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

Ranking Spatial Data by Quality Preferences

Ranking Spatial Data by Quality Preferences 1 Ranking Spatial Data by Quality Preferences Man Lung Yiu, Hua Lu, Nikos Maoulis, and Michail Vaitis Abstract A spatial preference query ranks objects based on the qualities of features in their spatial

More information

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS Evaluation of the Tiing Properties of Two Control Networs: CAN and PROFIBUS Max Mauro Dias Santos 1, Marcelo Ricardo Steer 2 and Francisco Vasques 3 1 UnilesteMG, CEP 35170-056, Coronel Fabriciano MG Brasil.

More information

Image Filter Using with Gaussian Curvature and Total Variation Model

Image Filter Using with Gaussian Curvature and Total Variation Model IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.

More information

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions *

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 607-626 (2005) A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Mebership Functions * SHIH-HSU HUANG AND JIAN-YUAN LAI + Departent of

More information

Deterministic Voting in Distributed Systems Using Error-Correcting Codes

Deterministic Voting in Distributed Systems Using Error-Correcting Codes IEEE TRASACTIOS O PARALLEL AD DISTRIBUTED SYSTEMS, VOL. 9, O. 8, AUGUST 1998 813 Deterinistic Voting in Distributed Systes Using Error-Correcting Codes Lihao Xu and Jehoshua Bruck, Senior Meber, IEEE Abstract

More information

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl. Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable

More information

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao

More information

Abstract. for L1VPNs [2, 3] and the standardization work at the Internet Engineering Task Force (IETF) is in progress [4].

Abstract. for L1VPNs [2, 3] and the standardization work at the Internet Engineering Task Force (IETF) is in progress [4]. Traffic Deand Modeling for Dynaic Layer 1 VPN Serices * Joachi Scharf, Martin Köhn Uniersity of Stuttgart, Institute of Counication Networks and Coputer Engineering (IKR), Pfaffenwaldring 47, 70569 Stuttgart,

More information

Resource Optimization for Web Service Composition

Resource Optimization for Web Service Composition Resource Optiization for Web Coposition Xia Gao, Ravi Jain, Zulfikar Razan, Ulas Kozat Abstract coposition recently eerged as a costeffective way to quickly create new services within a network. Soe research

More information

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang IEEE International Conference on ultiedia and Expo POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION Junjun Jiang, Ruiin Hu, Zhen Han, Tao Lu, and Kebin Huang National Engineering

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

Author. Published. Journal Title DOI. Copyright Statement. Downloaded from. Griffith Research Online. Kandjani, Hadi, Wen, Larry, Bernus, Peter

Author. Published. Journal Title DOI. Copyright Statement. Downloaded from. Griffith Research Online. Kandjani, Hadi, Wen, Larry, Bernus, Peter Enterprise Architecture Cybernetics for Global Mining Projects: Reducing the Structural Coplexity of Global Mining Supply Networks via Virtual Brokerage Author Kandjani, Hadi, Wen, Larry, Bernus, Peter

More information

Collaborative Web Caching Based on Proxy Affinities

Collaborative Web Caching Based on Proxy Affinities Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA

More information

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Navodaya Garepalli Kartik Gopalan Ping Yang Coputer Science, Binghaton University (State University of New York) Contact:

More information

Improve Peer Cooperation using Social Networks

Improve Peer Cooperation using Social Networks Iprove Peer Cooperation using Social Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Noveber 5, 2007 Corresponding

More information

Efficient and Strategyproof Spectrum Allocations in Multi-Channel Wireless Networks

Efficient and Strategyproof Spectrum Allocations in Multi-Channel Wireless Networks Efficient and Strategyproof Spectru Allocations in Multi-Channel Wireless Networks Ping Xu, Xiang-Yang Li, Senior Meber, IEEE, ShaoJie Tang, and JiZhong Zhao Abstract In this paper, we study the spectru

More information

HKBU Institutional Repository

HKBU Institutional Repository Hong Kong Baptist University HKBU Institutional Repository HKBU Staff Publication 18 Towards why-not spatial keyword top-k ueries: A direction-aware approach Lei Chen Hong Kong Baptist University, psuanle@gail.co

More information

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS AWNI ITRADAT Assistant Professor, Departent of Coputer Engineering, Faculty of Engineering, Hasheite University, P.O. Box 15459,

More information

Content-Centric Multicast Beamforming in Cache-Enabled Cloud Radio Access Networks

Content-Centric Multicast Beamforming in Cache-Enabled Cloud Radio Access Networks Content-Centric Multicast Beaforing in Cache-Enabled Cloud Radio Access Networks Hao Zhou, Meixia Tao, Erkai Chen, Wei Yu *Dept. of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, China

More information

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm roceedings of the 7th International Conference on Innovation & Manageent 893 Research on a Kind of QoS-Sensitive Seantic Web Services Coposition Method Based on Genetic Algorith Cao Hongjiang, Nie Guihua,

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

A Periodic Dynamic Load Balancing Method

A Periodic Dynamic Load Balancing Method 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation

More information

6.1 Topological relations between two simple geometric objects

6.1 Topological relations between two simple geometric objects Chapter 5 proposed a spatial odel to represent the spatial extent of objects in urban areas. The purpose of the odel, as was clarified in Chapter 3, is ultifunctional, i.e. it has to be capable of supplying

More information

Research Article A Game Theory Based Congestion Control Protocol for Wireless Personal Area Networks

Research Article A Game Theory Based Congestion Control Protocol for Wireless Personal Area Networks Journal of Sensors Volue 216, Article ID 61683, 13 pages http://dx.doi.org/1.11/216/61683 Research Article A Gae Theory Based Congestion Control Protocol for Wireless Personal Area Networks Chuang Ma,

More information

Effects of Interleaving on RTP Header Compression

Effects of Interleaving on RTP Header Compression Effects of Interleaving on RTP Header Copression Colin Perkins Jon Crowcroft Departent of Coputer Science University College London Gower Street London WCE 6BT Abstract We discuss the use of interleaving

More information

Automatic Graph Drawing Algorithms

Automatic Graph Drawing Algorithms Autoatic Graph Drawing Algoriths Susan Si sisuz@turing.utoronto.ca Deceber 7, 996. Ebeddings of graphs have been of interest to theoreticians for soe tie, in particular those of planar graphs and graphs

More information

Efficient Learning of Generalized Linear and Single Index Models with Isotonic Regression

Efficient Learning of Generalized Linear and Single Index Models with Isotonic Regression Efficient Learning of Generalized Linear and Single Index Models with Isotonic Regression Sha M. Kakade Microsoft Research and Wharton, U Penn skakade@icrosoft.co Varun Kanade SEAS, Harvard University

More information

Minimax Sensor Location to Monitor a Piecewise Linear Curve

Minimax Sensor Location to Monitor a Piecewise Linear Curve NSF GRANT #040040 NSF PROGRAM NAME: Operations Research Miniax Sensor Location to Monitor a Piecewise Linear Curve To M. Cavalier The Pennsylvania State University University Par, PA 680 Whitney A. Conner

More information

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San

More information

Boosted Detection of Objects and Attributes

Boosted Detection of Objects and Attributes L M M Boosted Detection of Objects and Attributes Abstract We present a new fraework for detection of object and attributes in iages based on boosted cobination of priitive classifiers. The fraework directly

More information

Gromov-Hausdorff Distance Between Metric Graphs

Gromov-Hausdorff Distance Between Metric Graphs Groov-Hausdorff Distance Between Metric Graphs Jiwon Choi St Mark s School January, 019 Abstract In this paper we study the Groov-Hausdorff distance between two etric graphs We copute the precise value

More information

Virtual source-based minimum interference path multicast routing in optical virtual private networks

Virtual source-based minimum interference path multicast routing in optical virtual private networks Photon Netw Coun (2007) 13:19 30 DOI 10.1007/s11107-006-0012-7 ORIGINAL ARTICLE Virtual source-based iniu interference path ulticast routing in optical virtual private networks Jun-Mo Jo Suk-Jin Lee Kyung-Dong

More information

News Events Clustering Method Based on Staging Incremental Single-Pass Technique

News Events Clustering Method Based on Staging Incremental Single-Pass Technique News Events Clustering Method Based on Staging Increental Single-Pass Technique LI Yongyi 1,a *, Gao Yin 2 1 School of Electronics and Inforation Engineering QinZhou University 535099 Guangxi, China 2

More information

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute

More information

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math Sarter Balanced Assessent Consortiu s, s, Stard Alignent for Math The Sarter Balanced Assessent Consortiu (SBAC) has created a hierarchy coprised of clais targets that together can be used to ake stateents

More information

Ahmed Benallegue RMDCN workshop on the migration to IP/VPN 1/54

Ahmed Benallegue RMDCN workshop on the migration to IP/VPN 1/54 MPLS Technology Overview Ahmed Benallegue A.Benallegue@ecmwf.int RMDCN workshop on the migration to IP/VPN 1/54 Plan 1. MPLS basics 2. The MPLS approach 3. Label distribution RSVP-TE 4. Traffic Engineering

More information

Ascending order sort Descending order sort

Ascending order sort Descending order sort Scalable Binary Sorting Architecture Based on Rank Ordering With Linear Area-Tie Coplexity. Hatrnaz and Y. Leblebici Departent of Electrical and Coputer Engineering Worcester Polytechnic Institute Abstract

More information

3 Conference on Inforation Sciences and Systes, The Johns Hopkins University, March, 3 Sensitivity Characteristics of Cross-Correlation Distance Metric and Model Function F. Porikli Mitsubishi Electric

More information

Feature Based Registration for Panoramic Image Generation

Feature Based Registration for Panoramic Image Generation IJCSI International Journal of Coputer Science Issues, Vol. 10, Issue 6, No, Noveber 013 www.ijcsi.org 13 Feature Based Registration for Panoraic Iage Generation Kawther Abbas Sallal 1, Abdul-Mone Saleh

More information