Multicast Tree Reconfiguration in Distributed Interactive Applications
|
|
- Kristina Underwood
- 5 years ago
- Views:
Transcription
1 Multicast Tree Recofiguratio i Distributed Iteractive Applicatios Carste Griwodz 1,2, Kut-Helge Vik 1, Pål Halvorse 1,2 1 IFI, Uiversity of Oslo, Norway 2 imula Research aboratory, Norway {griff, kuthelv, paalh}@ifi.uio.o Abstract Commuicatio i highly iteractive distributed applicatios, such as massive multiplayer olie games, ca ofte be performed efficietly usig multicast, i.e., applicatio level multicast. However, i applicatios with a very dyamic group maagemet, the multicast tree will have frequet chages, ad i applicatios that have striget latecy requiremet, this operatio eeds to be fast. Curret multicast approaches either have o otio of recofiguratio, they do ot care about tree recostructio latecy or wrogly assume that this is a fast, atomic operatio. I this paper, we have focused o dyamic recofiguratio ad have tested differet ways for a ode to joi a tree. Our results show that this is a importat issue for the class of highly iteractive distributed applicatios. I. INTRODUCTION arge improvemets i computer techology have eabled highly iteractive distributed applicatios such as distributed virtual eviromets, massive multiplayer olie games (MMOGs) ad computer supported cooperative work. These applicatios ofte iclude several types of media ragig from text to cotiuous media ad may have very striget requiremets with respect to the quality of the cliet data playout. I the MiMo project, we aim for better system support for such applicatios, i.e., tryig to make more efficiet use of the available resources by offerig mechaisms like predictio, area-of-iterest (AoI) maagemet, group commuicatio, aggregatio, replicatio, etc. I particular, we look at MMOGs due to the mix of differet media, the striget latecy requiremets, the dyamic cliet groups ad the fact that it has become a popular, fast growig, multi-millio idustry with a very high user mass. Today, MMOGs are icreasig i size ad complexity, supportig hudreds or thousads of cocurret players [1], ad they typically iclude a mixture of game situatios from role-playig games, first perso shooter games ad real-time strategy games. Players i the game move aroud ad iteract with other players, seemigly as if they were located ext to each other. Frequetly, may players iteract with each other ad the same object i the game world, these are the said to share a AoI or to be withi each others AoI. If the game is large eough, the majority of players will ot share a AoIs. Today, most MMOGs apply a cetral server approach for collectig ad processig game evets geerated by players, ad poit-to-poit commuicatio for the distributio of game state updates. They have few, if ay, mechaisms to optimize evet distributio. This approach is applicable because games are desiged with extremely low badwidth for players access etworks i mid. Eve these thi idividual data streams cotribute to game server scalability problems if the umber of players that share a AoI is high, forcig game desigers to prevet game situatios that ca lead to such clusterig. It would therefore be desirable to distribute the game evets efficietly, such that 1) the perceived game quality is above a satisfactory threshold regardless of system capacity ad geographical distace ad 2) the available resources are utilized efficietly. By groupig players accordig to their AoI, group commuicatio may be a efficiet meas to achieve this. ackig workig etwork layer multicast i the Iteret, we cosider applicatio layer multicast (AM) ad ivestigate group commuicatio algorithms appropriate for MMOGs to eable efficiet evet distributio. I this paper, we focus o the cost of multicast tree recofiguratio. There is a lot of existig work o multicast group maiteace. Both olie (dyamic trees) ad offlie (static trees) algorithms exist, but oly olie algorithms are applicable, sice players AoI chages frequetly. I fact, AoIs i a moder game ca be etirely player-specific ad have a adaptive size (as opposed to, e.g., room-sized AoIs), which implies that the membership of a group iteractig with a particular object ca be extremely volatile. Curret olie mechaisms do ot cosider tree recostructio latecy or wrogly assume that this is a fast atomic operatio. We have therefore tested several ways of recofigurig (joiig) a tree ad show that this is a importat issue for the class of highly iteractive distributed applicatios. The approaches tested do ot yet address the problem of o-trivial leave operatios where three or more eighbors are ivolved. We share this problem with much of the existig work, ad recogize from the preseted results that this is problematic. II. APPICATION EVE MUTICAT A MMOG may have players located all aroud the world. Thus, choosig a suitable group commuicatio style is importat, both i terms of improvig the service to the users ad optimizig the resource utilizatio of the system. Multicast provides efficiet meas for group commuicatio where the groups are typically orgaized i a tree structure. Oe implemetatio of multicast is IP multicast, but it is ot fully deployed i the Iteret ad lacks features like address filterig ad group membership cotrol. The alterative is AM. Approaches add group membership cotrol, ad make
2 it easy to support high level fuctioalities. Compared to IP multicast, AM is ecessarily less efficiet i terms of latecy but is easier to deploy. I highly iteractive distributed applicatios, especially MMOGs, each user frequetly both seds ad receives data from other users i the same group. I this sceario, we have three importat, but cotradictory, challeges: 1) The maximum delay betwee ay pair of odes must ot exceed a give threshold. 2) The total overall cost of trasmittig data i the multicast tree should be miimized. 3) Multicast tree recofiguratio must be supported olie, ad this operatio must be fast. I literature, a lot of differet algorithms have bee proposed, but curret multicast approaches have isufficiet support for fast recofiguratio which is required i a MMOG sceario due to for example players joiig ad leavig a group (eterig aother room), liks becomig overloaded (too may players sharig a lik), odes goig dow (a player quits), reachig maximum tree ode-to-ode latecy (icreased latecy o a lik due to cogestio), etc. As a first step towards a appropriate multicast algorithm i the MMOG sceario, we therefore look at the cost of olie multicast tree recofiguratio. We compare approaches for performig joi operatios, ad are also evaluatig tree cost if o additioal recofiguratio is performed. III. REATED WORK The costructio of low-cost, delay-bouded multicast trees has bee ivestigated several times before, ofte as teier tree heuristics. However, to the best of our kowledge, existig mechaisms do ot meet all of the required properties from sectio II. Recetly, some delay bouded, may-to-may multicast algorithms are proposed [2], [3], but these (as may oe-to-may approaches) assume scearios where all group members start the sessio at the same time. Olie multicast algorithms support dyamic tree maipulatios [4] [9]. Typical operatios iclude joi ad leave, ad some allow olie rearragemet of the multicast tree. A joi operatio is typically performed usig the shortest path [10], [11] or the delay costraied miimum cost path [12] [14]. This is cheaper tha tearig dow the tree ad re-buildig it from scratch, but it will probably give a larger cost icrease of the tree. A remove operatio deletes a ode from the multicast tree. A leaf ode is trivially removed. Deletig a ode with a degree of 2 results i two subtrees that for example are coected usig the least cost path [15] or least cost delay boud path [13]. If the ode has a larger degree ( 3), the ode is ofte kept i the tree for routig purposes, a approach that we follow as well. Additioally, to reduce the cost of the tree, some algorithms allow periodic tree rearragemet. The cost of the tree may be periodically calculated i the backgroud, ad a complete rearragemet operatio may be triggered based o some threshold value. It has bee proposed to divide the tree ito regios where the quality of the regio is associated with the umber of chages that have bee made without re-optimizig the regio [10], [12]. Existig approaches assume that recofiguratio operatios are atomic, i.e., that ew joi ad remove operatios do ot occur before previous rearragemet has bee completed. MMOGs do ot allow such assumptios. It is critical that tree recofiguratio is fast, i particular ode joi operatios as ew odes should receive the data o time. It is also vital that leave operatios keep the multicast tree itact for all remaiig odes. Rearragig the tree while the data is flowig may cause members to loose data if the operatio is ot hadled appropriately. Existig iteractive applicatios such as ACTIVE [16] perform joi operatios more quickly, but the performace of the operatio has ot bee give particular cosideratio, either. IV. IMUATION AND REUT To uderstad the time that is cosumed by differet approaches for quickly joiig a multicast group, ad the worst-case delays i the resultig overlay etworks, we use simulatio. I our simulatio, we distiguish odes that represet Iteret routers (the backboe etwork) ad odes that represet computers participatig the distributed game (cliets ad servers). We use the topology geerator BRITE [17] to create backboe etworks as graphs with 1000 odes. The lik delay betwee eighborig odes is uiformly distributed betwee 2 ms ad 50 ms. The servers ad cliets are placed i the etwork by attachig them radomly as leaf odes to the backboe etwork. Oe to three leaf odes are coected to each of the backboe odes, ad oe of them is maually selected as the game server. This is meat to model that the game is deployed idepedetly from ay etwork provider. We do t assume support for multicast either. ice we for ow are oly cocered with group maiteace ad ot data exchage, we igore badwidth i this simulatio. To compare topological effects, we have ru all simulatios with the backboes odes arraged i both flat ad hierarchical topologies. The hierarchical topologies orgaize them 10 etworks of 100 odes, respectively. A. Group membership Group membership i our simulatios is ot modeled after the behavior of ay actual applicatios, where odes are usually active members of a group for a loger while, ad where they are members of several groups at the same time. Rather tha that, our simulated cliets remai members of a group withi the game oly for a very short time, ad chage to aother group afterwards. This time is short with respect to the maximum ed-to-ed delay i our topologies, which is approximately 800 ms, a value that is take from real-world MMOG traces. We do this to ivestigate how well joi algorithms perform whe group membership is frequetly outdated. The cetral server is ot member of ay group. It provides a lookup service that allows cliets eterig a group to locate
3 2.JOIN 4.PING 5.PONG 6. CONNECT (first) REQUET 3.INVITE 2.JOIN 4.PING 5.PONG 6. CONNECT (best) REQUET 3.INVITE 3.PING 4.PONG 5.CONNECT (first) REQUET 3.CONNECT (closet address) REQUET (a) coect first with ivitatio (b) coect best with ivitatio (c) coect first without ivitatio (d) coect to closest address Fig. 1. Protocols variatios group members. Every group has a leader, which is the ode that has the smallest maximum delay to all other group members. Wheever a group leader determies that oe of its eighbors has a smaller maximum delay, it hads over group leadership. The ew leader iforms the cetral server of the chage. To ivestigate the performace of the algorithms both i equally sized ad heavily uequally sized groups, we create as may empty groups as the simulatio has cliet odes. To achieve equal group sizes, we let odes perform a radom walk betwee odes, where those are arraged i a square. To achieve uequally sized groups, we assig groups Zipfdistributed popularities. B. Protocol variatios Figure 1 shows the approaches for joiig groups that we have ivestigated i this work. The letter marks the server, the group leader, ad the cliet that tries to ewly joi a group. I all cases, a ode that jois a group cotacts a server first. However, this membership ad leadership iformatio will be outdated frequetly because average membership duratio is short with respect to the ed-to-ed delay i the system. I the sceario coect first with ivitatio (figure 1(a)), the server is otifyig the group leader of the itetio to joi, which will the sed o ivitatio to the ew ode that icludes the addresses of all group members. The ew ode cotacts all of those odes (PING). As soo as it receives a aswer (PONG) from oe of the odes, it coects itself to the overlay etwork formed by the group members at that ode. We expect that this approach would create deep graphs with a high worst-case delay iside groups but fast joi operatios. The sceario coect best with ivitatio (figure 1(b)) is early the same, but the joiig ode waits for aswers from all cotacts odes util it chooses to coect to the ode that has the lowest worst-case latecy to other group members. We expect that this approach would create wide graphs with slow joi operatios but a low worst-case delay iside groups. The sceario coect first without ivitatio (figure 1(c)) resembles the first sceario, but the server is sedig group membership iformatio to the joiig ode, istead of delegatig that operatio to the group leader. While this avoids the latecy that is added by cotactig the group leader first, the group membership iformatio at the server is usually less upto-date tha the group leaders, which may make it ecessary to retry the joi operatio more frequetly. The sceario coect to closest address (figure 1(d)) is the simplest oe. It is similar to the previous approach, but the joiig ode uses the etwork address to estimate physical distace, ad coects to the ode with the most similar oe. We expect very fast joi operatios but a rather high worstcase delay iside groups from this approach. No ode i ay of these approaches collects eough topological iformatio aywhere to be able to compute a optimal tree for the group. I fact, odes kow oly their eighbors ad the worst case delays achieved through these eighbors - all other iformatio becomes outdated too quickly because membership duratio is frequetly shorter tha the maximum delay betwee pairs of group members. C. Evaluatio We have compared the four variatios of our protocol by simulatio. To evaluate them, we use joi latecy ad the tree cost as performace metrics. Joi latecy is a issue accordig to challege 3 i sectio II, i.e., how fast a player ca resume the game-play after the AoI has bee chaged such that a group membership chage is required. Tree cost addresses challege 2, i.e., the total cost i terms of the sum of all edge delays idicatig the overall system performace. The figures show here use etworks with 1000 odes. Other etwork sizes show the same treds, but more sparsely populated etworks do ot show particular chages for the most popular groups. The time that a ode stays i a group is oly partly relevat for efficiecy of the multicast tree that is created accordig to our algorithm. I geeral, all of our approaches will lead to the same multicast tree o all time scales. However, i case of log ed-to-ed delays ad short membership duratio, the cotact iformatio that a joiig ode must retrieve from a cetral etity ( i figure 1) will frequetly be outdated. imilarly, o sigle ode i a multicast tree ca safely kow all other group members at a give time. To provoke this situatio, we have chose 100 ms for our simulatio. This is a frequetly used update frequecy i cetral server games, which limits also the frequecy of dyamic AoI chages.
4 e+07 1e+06 request, ivite, pig, coect first request, ivite, pig, coect best request, create, pig, coect first request, create, coect closests ip percet sum of delays (ms) request, ivite, pig, coect first request, ivite, pig, coect best request, create, pig, coect first request, create, coect closests ip 40 group umber (by popularity, 300 of 1000 total, every 5th show) group umber (by popularity, 300 of 1000 groups, every 5th show) (a) Autoomous system (a) Autoomous system e+07 1e+06 request, ivite, pig, coect first request, ivite, pig, coect best request, create, pig, coect first request, create, coect closests ip percet 55 sum of delays (ms) request, ivite, pig, coect first request, ivite, pig, coect best request, create, pig, coect first request, create, coect closests ip 40 group umber (by popularity, 300 of 1000 total, every 5th show) group umber (by popularity, 300 of 1000 groups, every 5th show) (b) Flat etwork (b) Flat etwork Fig. 2. Percetage of time spet eterig a group, average of 10 rus Fig. 3. um of all edge delays i a group, average of 10 rus I the figures, we show the results for Zipf-distributed group popularities: a small X value i the graph represets a large groups, while a large X value represets a small group. The graphs i figure 2 show the percetage of the time i a group that is used performig the steps described i sectio IV- B. Figure 3 shows the average cost of the overlay etwork coectig all odes i a group, where the cost is the sum of all lik delays. 1) Joi time: As expected, the approach that jois the ode that is closest by its etwork level address speds the highest percetage of its time actually i the group, while the other approaches sped more time performig the steps of figure 1. Eve for the case of groups that are upopular ad therefore frequetly foud empty, this is still true. I geeral, however, the algorithms perform similarly for those odes because early all time is cosumed i cotactig the cetral server for the iitial referece to the group. It is more remarkable that the more complex joiig approaches are also early as fast as coectig to closest address whe groups have a large umber of members. The reaso is that the joiig ode is offered may odes to coect to, some of which are boud to be close to it. The coect step itself is therefore fast. For the groups with a medium umber of odes, o the other had, coect first/best with ivitatio shows large delays. The problem here is that joi operatios are likely to trigger a leader chage i the group. ice the cetral server seds ivitatios oly to the group leader, these are frequetly refused because the cetral server s iformatio is already outdated. This, i tur, requires that the cetral server seds aother ivitatio to the ew leader, which is time-cosumig. 2) Group cost: Coect best with ivitatio achieves cosistetly the cheapest graphs (i terms of the sum of all uidirectioal delays) whe all groups have the same popularity. The created graphs are also cheapest i the Zipf sceario whe groups have medium or low popularity. However, whe the group popularity is high, this is ot the case aymore. The reaso for this is that we use the same leave
5 operatio that is described i sectio III, ie. we do ot remove a leavig ode from the multicast tree before the umber of its direct eighbours drop below three. Coect with ivitatio leads to wide graphs, while coect without ivitatio leads to deep graphs. Wide graphs are boud to have may odes with more tha three eighbors. Nodes close to the group leader ca therefore rarely leave the tree whe they decide to leave the group, ad coectios through them cotribute to the overall cost of the tree. 3) ummary: Our results show that the time to joi a multicast group ca be sigificat ad the chose protocol ca have large effects o the total cost. Additioally, ote that we oly have simulated simple protocols lookig at joi time. If calculatios to check for goals 1 ad 2 i sectio II should be performed before joiig, the joi operatio will cosume cosiderably more time. However, the fast joi operatios lead to a degradatio i tree costs for groups of medium group size. This implies that our further work o recofiguratio must support the removal of ier odes of a tree whe they leave groups. V. CONCUION I this paper, we have looked at the importace of reducig the multicast tree recofiguratio latecy i highly iteractive applicatios. We cosidered games i particular because there are example for cetral server games that beefit from extremely high group dyamicity, but we expect that a icreasig umber of distributed applicatios will require dyamic group membership. I this paper, we have compared several approaches for performig joi operatios, ad performed leave operatios oly whe the umber of ode eighbours is or drops below three. However, to give a complete view of this issue, several more tests must be performed, e.g., compariso with optimal tree costs, further protocol variatios, etwork variatios ad cost factors. Our results idicate that the recofiguratio operatio is a potetial bottleeck for highly iteractive applicatios. Our ogoig work icludes a further ivestigatio of olie recofiguratio mechaisms (icludig group leave operatios) i combiatio with differet treealgorithms, i particular teier tree algorithms, to be able to fid a proper trade-off of the cotradictig goals stated i sectio II. [6] Xiaohua Jia. A distributed algorithm of delay-bouded multicast routig for multimedia applicatios i wide area etworks. IEEE/ACM Trasactios o Networkig, 6(6): , December [7] Girish Kumar, Nishit Narag, ad C. P. Ravikumar. Efficiet algorithms for delay-bouded miimum cost path problem i commuicatio etworks. I Proceedigs of Iteratioal Coferece o High Performace Computig, Cheai (Madras), Idia, December [8] Aa Hac ad Kelei Zhou. A ew heuristic algorithm for fidig miimum-cost multicast trees with bouded path delay. Iteratioal Joural of Network Maagemet, 9: , [9] ih-chyau Wuu, og og i, ad hig-chyi hiao. Costructig delay-bouded multicast trees i computer etworks. Joural of Iformatio ciece ad Efieerig, 17(3): , [10] Fred Bauer ad Auja Varma. ARIE: A rearrageable iexpesive edge-based o-lie teier algorithm. I Proceedigs of the Joit Coferece of the IEEE Computer ad Commuicatios ocieties (IN- FOCOM), pages , a Fracisco, CA, UA, [11] Ehud Aharoi ad Reuve Cohe. Restricted dyamic teier trees for scalable multicast i datagram etworks. IEEE/ACM Trasactios o Networkig, 6(3): , Jue [12] riram Raghava, G. Maimara, ad C. iva Ram Murthy. A rearrageable algorithm for the costructio of delay-costrait dyamic multicast trees. IEEE/ACM Trasactios o Networkig, 7(4): , August [13] Tawfig Alrabiah ad Taieb Zati. Delay-costraied, low-cost multicast routig i multimedia etworks. J. Parallel Distrib. Comput., 61(9): , [14] Mehrdad Parsa, Qig Zhu, ad J. J. Garcia-ua-Aceves. A iterative algorithm for delay-costraied miimum-cost multicastig. IEEE/ACM Trasactios o Networkig, 6(4): , [15] Berard M. Waxma. Dyamic teier tree problem. IAM J. Discrete Math., 4: , [16] eslie. iu, Rahul Hampole, Beomjoo eo, ad Roger Zimmerma. Active: A low latecy P2P live streamig architecture. I Proceedigs of PIE/ACM Coferece o Multimedia Computig ad Networkig (MMCN), a Jose, CA, UA, Jauary [17] Alberto Media, Aukool akhia, Ibrahim Matta, ad Joh Byers. BRITE: Uiversal topology geeratio from a user s perspective. Techical Report BUC-TR , Bosto Uiversity, Jauary REFERENCE [1] eo ag-mi Whag ad Jee Yeo Kim. The olie game world as a product ad the behavioral characteristics of olie game cosumers as role player. I DIGRA 2005, Vacouver, Caada, Jue [2] Chor Pig ow ad Xueya og. O fidig feasible solutios for the delay costraied group multicast routig problem. IEEE Trasactios o Computers, 51(5): , [3] Hug-Yig Tya, Jeifer C. Hou, ad Bi Wag. May-to-may multicast routig with temporal quality of service guaratees. IEEE Joural of elected Areas i Commuicatios, 52(6): , [4] H. alama, Y. Viiotis, ad D. Reeves. A efficiet delay costraied miimum spaig tree heuristic. I Proceedigs of the 5th Iteratioal Coferece o Computer Commuicatios ad Networks (ICCCN), October [5] George N. Rouskas ad Ilia Baldie. Multicast routig with ed-to-ed delay ad delay variatio costraits. IEEE Joural of elected Areas i Commuicatios, 15(3): , 1997.
Ones Assignment Method for Solving Traveling Salesman Problem
Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:
More informationAdministrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today
Admiistrative Fial project No office hours today UNSUPERVISED LEARNING David Kauchak CS 451 Fall 2013 Supervised learig Usupervised learig label label 1 label 3 model/ predictor label 4 label 5 Supervised
More informationAN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS
Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Melisa Hajyvahabzadeh
More informationAlgorithms for Disk Covering Problems with the Most Points
Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi
More informationCopyright 2016 Ramez Elmasri and Shamkant B. Navathe
Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:
More informationA QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services
A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute
More informationperformance to the performance they can experience when they use the services from a xed location.
I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi
More informationImprovement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation
Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity
More informationPrevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting
Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,
More informationMorgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5
Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:
More informationSession Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)
F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The
More informationService discovery in ad hoc networks
Service discovery i ad hoc etworks Mohammed Haddad ad Hamamache Kheddouci Laboratoire PRISMa - Uiversité Claude Berard Lyo, Bât. 7, 843, Bd. du ov. 98, 69622 Villeurbae Cedex Abstract. Various researches
More informationLecture 28: Data Link Layer
Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig
More informationLecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming
Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis
More informationPruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c
Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules
More informationPartition in mobile adhoc network with mobility-a new approach for effective use of fast IP address autoconfiguration
Mukesh Chad et al. / Iteratioal Joural of Egieerig ad Techology (IJET) Partitio i mobile adhoc etwork with mobility-a ew approach for effective use of fast IP address autocofiguratio Mukesh Chad *, HL
More informationInterference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks
Iterferece Aware Chael Assigmet Scheme i Multichael Wireless Mesh Networks Sumyeg Kim Departmet of Computer Software Egieerig Kumoh Natioal Istitute of Techology Gum South Korea Abstract Wireless mesh
More informationLecture 5. Counting Sort / Radix Sort
Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018
More informationEvaluation scheme for Tracking in AMI
A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:
More informationIntroduction. Nature-Inspired Computing. Terminology. Problem Types. Constraint Satisfaction Problems - CSP. Free Optimization Problem - FOP
Nature-Ispired Computig Hadlig Costraits Dr. Şima Uyar September 2006 Itroductio may practical problems are costraied ot all combiatios of variable values represet valid solutios feasible solutios ifeasible
More informationThe isoperimetric problem on the hypercube
The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose
More informationIntroduction to OSPF. ISP Training Workshops
Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged
More informationDesign of efficient, virtual non-blocking optical switches
Desig of efficiet, virtual o-blockig otical switches Larry F. Lid, Michael Sratt Mobile Systems ad Services Laboratory HP Laboratories Bristol HPL-200-239 March 3 th, 2002* otical switchig, switch desig
More informationBasic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.
5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator
More informationGlobal Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c
Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i
More informationImage Segmentation EEE 508
Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.
More informationAvid Interplay Bundle
Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers
More informationAdaptive and Lazy Segmentation Based Proxy Caching for Streaming Media Delivery
Adaptive ad Based Proxy Cachig for Streamig Media Delivery Sogqig Che Dept. of Computer Sciece College of William ad Mary Williamsburg, VA 23187 sqche@cs.wm.edu Susie Wee Mobile ad Media System Lab Hewlett-Packard
More informationRandom Network Coding in Wireless Sensor Networks: Energy Efficiency via Cross-Layer Approach
Radom Network Codig i Wireless Sesor Networks: Eergy Efficiecy via Cross-Layer Approach Daiel Platz, Dereje H. Woldegebreal, ad Holger Karl Uiversity of Paderbor, Paderbor, Germay {platz, dereje.hmr, holger.karl}@upb.de
More informationSecurity of Bluetooth: An overview of Bluetooth Security
Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give
More informationSocial-P2P: An Online Social Network Based P2P File Sharing System
1.119/TPDS.214.23592, IEEE Trasactios o Parallel ad Distributed Systems 1 : A Olie Social Network Based P2P File Sharig System Haiyig She*, Seior Member, IEEE, Ze Li, Studet Member, IEEE, Kag Che Abstract
More information6.854J / J Advanced Algorithms Fall 2008
MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms
More informationn Explore virtualization concepts n Become familiar with cloud concepts
Chapter Objectives Explore virtualizatio cocepts Become familiar with cloud cocepts Chapter #15: Architecture ad Desig 2 Hypervisor Virtualizatio ad cloud services are becomig commo eterprise tools to
More informationOn Nonblocking Folded-Clos Networks in Computer Communication Environments
O Noblockig Folded-Clos Networks i Computer Commuicatio Eviromets Xi Yua Departmet of Computer Sciece, Florida State Uiversity, Tallahassee, FL 3306 xyua@cs.fsu.edu Abstract Folded-Clos etworks, also referred
More informationLecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions
U.C. Berkeley CS170 : Algorithms Midterm 1 Solutios Lecturers: Sajam Garg ad Prasad Raghavedra Feb 1, 017 Midterm 1 Solutios 1. (4 poits) For the directed graph below, fid all the strogly coected compoets
More informationGE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III
GE2112 - FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III PROBLEM SOLVING AND OFFICE APPLICATION SOFTWARE Plaig the Computer Program Purpose Algorithm Flow Charts Pseudocode -Applicatio Software Packages-
More informationTable 2 GSM, UMTS and LTE Coverage Levels
6 INDICATORS OF QUALITY OF SERVICE This sectio defies quality idicators that characterize the performace of services supported o mobile commuicatio systems i their various phases of access ad use 6. 6.1
More information1 Graph Sparsfication
CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider
More informationAn Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem
A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.
More informationWhat are Information Systems?
Iformatio Systems Cocepts What are Iformatio Systems? Roma Kotchakov Birkbeck, Uiversity of Lodo Based o Chapter 1 of Beett, McRobb ad Farmer: Object Orieted Systems Aalysis ad Desig Usig UML, (4th Editio),
More informationQuorum Based Data Replication in Grid Environment
Quorum Based Data Replicatio i Grid Eviromet Rohaya Latip, Hamidah Ibrahim, Mohamed Othma, Md Nasir Sulaima, ad Azizol Abdullah Faculty of Computer Sciece ad Iformatio Techology, Uiversiti Putra Malaysia
More informationThe Value of Peering
The Value of Peerig ISP/IXP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 25 th
More informationEnergy Efficinet Cluster Head Selection and Data Convening in Wireless Sensor Networks
Idia Joural of Sciece ad Techology, Vol 9(15), DOI: 1.17485/ijst/216/v9i15/77749, April 216 ISSN (Prit) : 974-6846 ISSN (Olie) : 974-5645 Eergy Efficiet Cluster Head Selectio ad Data Coveig i Wireless
More informationCIS 121 Data Structures and Algorithms with Java Fall Big-Oh Notation Tuesday, September 5 (Make-up Friday, September 8)
CIS 11 Data Structures ad Algorithms with Java Fall 017 Big-Oh Notatio Tuesday, September 5 (Make-up Friday, September 8) Learig Goals Review Big-Oh ad lear big/small omega/theta otatios Practice solvig
More informationTHE deployment of router-based IP multicast has been
88 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 8, NO. 9, SEPTEMBER 2007 ACOM: Ay-Source Capacity-Costraied Overlay Multicast i No-DHT P2P Networks Shipig Che, Baile Shi, Shigag Che, ad
More informationThe Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems
The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,
More informationComputers and Scientific Thinking
Computers ad Scietific Thikig David Reed, Creighto Uiversity Chapter 15 JavaScript Strigs 1 Strigs as Objects so far, your iteractive Web pages have maipulated strigs i simple ways use text box to iput
More informationSCI Reflective Memory
Embedded SCI Solutios SCI Reflective Memory (Experimetal) Atle Vesterkjær Dolphi Itercoect Solutios AS Olaf Helsets vei 6, N-0621 Oslo, Norway Phoe: (47) 23 16 71 42 Fax: (47) 23 16 71 80 Mail: atleve@dolphiics.o
More informationCMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago
CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems
More informationInformed Search. Russell and Norvig Chap. 3
Iformed Search Russell ad Norvig Chap. 3 Not all search directios are equally promisig Outlie Iformed: use problem-specific kowledge Add a sese of directio to search: work toward the goal Heuristic fuctios:
More informationPerformance Plus Software Parameter Definitions
Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios
More informationThe Magma Database file formats
The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,
More informationAdaptive Resource Allocation for Electric Environmental Pollution through the Control Network
Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the
More informationData diverse software fault tolerance techniques
Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the
More informationCIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19
CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.
More informationDATA MINING II - 1DL460
DATA MINING II - 1DL460 Sprig 2017 A secod course i data miig http://www.it.uu.se/edu/course/homepage/ifoutv2/vt17/ Kjell Orsbor Uppsala Database Laboratory Departmet of Iformatio Techology, Uppsala Uiversity,
More informationProtected points in ordered trees
Applied Mathematics Letters 008 56 50 www.elsevier.com/locate/aml Protected poits i ordered trees Gi-Sag Cheo a, Louis W. Shapiro b, a Departmet of Mathematics, Sugkyukwa Uiversity, Suwo 440-746, Republic
More informationMulti-Threading. Hyper-, Multi-, and Simultaneous Thread Execution
Multi-Threadig Hyper-, Multi-, ad Simultaeous Thread Executio 1 Performace To Date Icreasig processor performace Pipeliig. Brach predictio. Super-scalar executio. Out-of-order executio. Caches. Hyper-Threadig
More informationCombination Labelings Of Graphs
Applied Mathematics E-Notes, (0), - c ISSN 0-0 Available free at mirror sites of http://wwwmaththuedutw/ame/ Combiatio Labeligs Of Graphs Pak Chig Li y Received February 0 Abstract Suppose G = (V; E) is
More informationAnalysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve
Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao
More informationImproving Template Based Spike Detection
Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for
More informationSECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS. Tamil Nadu, INDIA
ARTICLE SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS A Sethil Kumar 1, E Logashamugam 2 * 1 Research Scholar, Dept. of Electroics ad Commuicatio Egieerig, St. Peter
More informationOn Multicast Scheduling and Routing in Multistage Clos Networks
O Multicast Schedulig ad Routig i Multistage Clos Networks Bi Tag Departmet of Computer Sciece Stoy Brook Uiversity Stoy Brook, NY 794 bitag@cs.suysb.edu Abstract Multicast commuicatio, which ivolves trasmittig
More informationCS 683: Advanced Design and Analysis of Algorithms
CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,
More informationAnnouncements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components
Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,
More informationOne advantage that SONAR has over any other music-sequencing product I ve worked
*gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig
More informationMedia Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1
Media Access Protocols Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 Where are We? you are here 00010001 11001001 00011101 A midterm is here Sprig 2018 CS 438 Staff, Uiversity of Illiois 2 Multiple Access
More informationGreedy Algorithms. Interval Scheduling. Greedy Algorithms. Interval scheduling. Greedy Algorithms. Interval Scheduling
Greedy Algorithms Greedy Algorithms Witer Paul Beame Hard to defie exactly but ca give geeral properties Solutio is built i small steps Decisios o how to build the solutio are made to maximize some criterio
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects
Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged
More information. Written in factored form it is easy to see that the roots are 2, 2, i,
CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or
More informationCORD Test Project in Okinawa Open Laboratory
CORD Test Project i Okiawa Ope Laboratory Fukumasa Morifuji NTT Commuicatios Trasform your busiess, trasced expectatios with our techologically advaced solutios. Ageda VxF platform i NTT Commuicatios Expectatio
More informationReliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1
Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable
More informationSwitching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1
Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)
More informationMessage Integrity and Hash Functions. TELE3119: Week4
Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig
More informationData Warehousing. Paper
Data Warehousig Paper 28-25 Implemetig a fiacial balace scorecard o top of SAP R/3, usig CFO Visio as iterface. Ida Carapelle & Sophie De Baets, SOLID Parters, Brussels, Belgium (EUROPE) ABSTRACT Fiacial
More informationCMSC Computer Architecture Lecture 10: Caches. Prof. Yanjing Li University of Chicago
CMSC 22200 Computer Architecture Lecture 10: Caches Prof. Yajig Li Uiversity of Chicago Midterm Recap Overview ad fudametal cocepts ISA Uarch Datapath, cotrol Sigle cycle, multi cycle Pipeliig Basic idea,
More informationOptimization for framework design of new product introduction management system Ma Ying, Wu Hongcui
2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal
More informationGPUMP: a Multiple-Precision Integer Library for GPUs
GPUMP: a Multiple-Precisio Iteger Library for GPUs Kaiyog Zhao ad Xiaowe Chu Departmet of Computer Sciece, Hog Kog Baptist Uiversity Hog Kog, P. R. Chia Email: {kyzhao, chxw}@comp.hkbu.edu.hk Abstract
More informationMultiprocessors. HPC Prof. Robert van Engelen
Multiprocessors Prof. Robert va Egele Overview The PMS model Shared memory multiprocessors Basic shared memory systems SMP, Multicore, ad COMA Distributed memory multicomputers MPP systems Network topologies
More informationTransitioning to BGP
Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April
More informationCHAPTER IV: GRAPH THEORY. Section 1: Introduction to Graphs
CHAPTER IV: GRAPH THEORY Sectio : Itroductio to Graphs Sice this class is called Number-Theoretic ad Discrete Structures, it would be a crime to oly focus o umber theory regardless how woderful those topics
More informationΤεχνολογία Λογισμικού
ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr
More informationDescriptive Statistics Summary Lists
Chapter 209 Descriptive Statistics Summary Lists Itroductio This procedure is used to summarize cotiuous data. Large volumes of such data may be easily summarized i statistical lists of meas, couts, stadard
More informationBayesian approach to reliability modelling for a probability of failure on demand parameter
Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee
More informationCSC 220: Computer Organization Unit 11 Basic Computer Organization and Design
College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:
More informationA Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN
Iteratioal Joural of Digital Cotet Techology ad its Applicatios Vol. 2 No 1, March 2008 A Key Distributio method for Reducig Storage ad Supportig High Level Security i the Large-scale WSN Yoo-Su Jeog *1,
More informationThe golden search method: Question 1
1. Golde Sectio Search for the Mode of a Fuctio The golde search method: Questio 1 Suppose the last pair of poits at which we have a fuctio evaluatio is x(), y(). The accordig to the method, If f(x())
More informationGTS Scheduling Scheme for Real-Time Communication in IEEE Industrial Wireless Sensor Networks
Idia Joural of Sciece ad Techology, Vol 9(7), DOI:.7485/ijst/6/v9i7/87734, February 6 ISSN (Prit) : 974-6846 ISSN (Olie) : 974-5645 GTS Schedulig Scheme for Real-Time Commuicatio i IEEE8.5.4 Idustrial
More informationA New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method
A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro
More informationIMP: Superposer Integrated Morphometrics Package Superposition Tool
IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College
More informationEvaluation of Distributed and Replicated HLR for Location Management in PCS Network
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 9, 85-0 (2003) Evaluatio of Distributed ad Replicated HLR for Locatio Maagemet i PCS Network Departmet of Computer Sciece ad Iformatio Egieerig Natioal Chiao
More informationWEBSITE STRUCTURE IMPROVEMENT USING ANT COLONY TECHNIQUE
WEBSITE STRUCTURE IMPROVEMENT USING ANT COLONY TECHNIQUE Wiwik Aggraei 1, Agyl Ardi Rahmadi 1, Radityo Prasetyo Wibowo 1 1 Iformatio System Departmet, Faculty of Iformatio Techology, Istitut Tekologi Sepuluh
More informationCopyright 2016 Ramez Elmasri and Shamkant B. Navathe
Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 22 Database Recovery Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Recovery algorithms Recovery cocepts Write-ahead
More informationS. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea
S. Mehta ad K.S. Kwak UWB Wireless Commuicatios Research Ceter, Iha Uiversity Icheo, 402-75, Korea suryaad.m@gmail.com ABSTRACT I this paper, we propose a hybrid medium access cotrol protocol (H-MAC) for
More informationMorgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5.
Morga Kaufma Publishers 26 February, 208 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Virtual Memory Review: The Memory Hierarchy Take advatage of the priciple
More informationRelay Placement Based on Divide-and-Conquer
Relay Placemet Based o Divide-ad-Coquer Ravabakhsh Akhlaghiia, Azadeh Kaviafar, ad Mohamad Javad Rostami, Member, IACSIT Abstract I this paper, we defie a relay placemet problem to cover a large umber
More informationLower Bounds for Sorting
Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig
More informationGlobal Optimization of File Availability Through Replication for Efficient File Sharing in MANETs
Global Optimizatio of File Availability Through Replicatio for Efficiet File Sharig i MANETs Kag Che ad Haiyig She Departmet of Electrical ad Computer Egieerig Clemso Uiversity Clemso, South Carolia 29631
More informationHADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING
Y.K. Patil* Iteratioal Joural of Advaced Research i ISSN: 2278-6244 IT ad Egieerig Impact Factor: 4.54 HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Prof. V.S. Nadedkar** Abstract: Documet clusterig is
More informationChapter 2 Distributed Information Systems Architecture
Prof. Dr.-Ig. Stefa Deßloch AG Heterogee Iformatiossysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@iformatik.ui-kl.de Chapter 2 Distributed Iformatio Systems Architecture Chapter Outlie (Distributed)
More information