Robust Routing in Interdependent Networks

Size: px
Start display at page:

Download "Robust Routing in Interdependent Networks"

Transcription

1 Robut Routing in Interdependent Network Jianan Zhang and Eytan Modiano Laboratory for Information and Deciion Sytem, Maachuett Intitute of Technology Abtract We conider a model of two interdependent network, where every node in one network depend on one or more upply node in the other network and a node fail if it loe all of it upply node. We develop algorithm to compute the failure probability of a path, and obtain the mot reliable path between a pair of node in a network, under the condition that each upply node fail independently with a given probability. Our work generalize the claical hared rik group model, by conidering multiple rik aociated with a node and letting a node fail if all the rik occur. Moreover, we tudy the divere routing problem by conidering two path between a pair of node. We define two path to be d-failure reilient if at leat one path urvive after removing d or fewer upply node, which generalize the concept of dijoint path in a ingle network, and rik-dijoint path in a claical hared rik group model. We compute the probability that both path fail, and develop algorithm to compute the mot reliable pair of path. I. INTRODUCTION Many modern ytem are interdependent, uch a mart power grid, mart tranportation, and other cyber-phyical ytem [], [], [], [4], [5]. In interdependent network, one network depend on another to properly function. For example, in mart grid, power generator rely on meage from the control center to adjut to the power demand, while the control center relie on the electric power to operate. Due to the interdependence, failure in one network may cacade to another. It i important to undertand the robutne of interdependent network which are prone to cacading failure. Mot previou tudie on interdependent network have focued on the network connectivity baed on random graph model, in the aymptotic regime where the number of node approache infinity [6], [7]. The finite-ize arbitrary-topology graph model, which repreent real communication and phyical network, have been largely overlooked in the interdependent network literature. A few exception include [4], [5], which model interdependent power grid and communication network by graph with topologie pecified by the real network. Similarly, we abtract interdependent network by graph with pecified topologie, which can be tailored for a wide range of application. In thi paper, we tudy robut routing problem in interdependent network, by characterizing the effect of failure in one network on the other network. For an overview of the problem and challenge, it i helpful to conider a implified cenario where a demand network depend on a upply network, illutrated by Fig.. Every node in the demand network Thi work wa upported by DTRA grant HDTRA---00 and HDTRA i upported by one or more node in the upply network. Thu, node in the demand network and node in the upply network can be viewed a demand node and upply node, repectively. Given that a demand node fail if it loe all of it upply node, upply node failure may lead to correlated demand node failure, which make it difficult to route traffic through reliable path in the demand network. We develop technique to tackle the failure correlation. Thi implified one-way dependence exit in current ytem. For example, router and proceor in a communication network depend on the electric power. Moreover, a we will ee later, the analyi baed on thi implified cenario can be applied to interdependent network under certain aumption. demand network upply network Fig.. Every node in the demand network G i upported by two node in the upply network G. The robut routing problem have been extenively tudied under both independent failure and correlated failure cenario. If edge or node fail independently, the mot reliable path between a ource-detination pair can be viewed a a hortet path, where the length i a function of the failure probability. In the cae of correlated failure, it i difficult to find a path with any performance guarantee in general [8]. If correlation only exit among edge or node that fail imultaneouly, the network can be viewed uing a hared rik group model (Fig. ) [9], [0]. The hared rik group model capture correlated failure in an overlay network when underlay failure occur, and i commonly ued to tudy the cro-layer reliability, uch a logical link failure caued by fiber failure in optical network [], [], [], [4]. The mot reliable path contain the mallet number of rik if all rik are equally likely to occur, and can be obtained by integer programming []. Interdependent network have imilaritie with the claical hared rik group model, in that two demand node hare a rik if they have at leat one common upply node. However, t

2 4 Fig.. A hared rik node group model, where node labeled by the ame number hare the ame rik. the key difference i that a demand node doe not necearily fail if a rik occur (i.e., a upply node fail), ince a demand node may have multiple upply node, wherea a node fail if it aociated rik occur in the claical hared rik group model. The reliability of a path in interdependent network, in contrat to the claical hared rik group model, can no longer be characterized by the number of rik that the path contain. For example, if all the node in a path depend on a ingle upply node and thu the path ha a ingle rik, removing a ingle upply node would diconnect the path. In contrat, if every node in a path ha multiple upply node, the path would be more robut and can reit a larger number of upply node failure, although the path ha more rik. In addition to the mot reliable path, a backup path can be ued to further improve reliability, through divere routing. Intuitively, a pair of reliable path hould hare the minimum number of rik (or be rik-dijoint) in the hared rik group model [], []. However, in interdependent network, it i eay to contruct example where two path that hare many upply node can withtand a larger number of upply node failure than two path that hare a maller number of upply node (e.g., Fig. ). New metric, other than the number of rik hared by two path, need to be identified to characterize their reliability t Fig.. The two number in each node repreent it two upply node. The two t path in the left figure hare two upply node, and can be both diconnected after removing upply node {,}. The two t path in the right figure hare four upply node, but they cannot be both diconnected after removing any two upply node. Divere routing problem have been tudied under correlated link failure. The correlation between a pair of logical link i obtained either by meaurement [5] or by analyi of the underlay phyical topology [6]. Heuritic algorithm have been developed to find multiple reliable path, and their performance wa evaluated by imulation [5], [7], t [8]. In contrat, we explicitly bound the gap between the failure probability and the optimization objective, and develop algorithm that have provable performance. In thi paper, we develop an analytically tractable framework to tudy the following robut routing problem in interdependent network. Single-path routing: Compute the probability that a pecified path fail. Obtain the mot reliable path between a ource-detination pair. Divere routing: Compute the probability that two pecified path both fail. Obtain the pair of mot reliable path between a ource-detination pair. By generalizing the concept of dijoint path to interdependent network, we characterize the level of dijointne between two path to tudy divere routing. In contrat to the claical hared rik group model where a node fail if it rik occur, in interdependent network a node fail if a combination of rik occur. In view of thi, our method extend the hared rik group model. To the bet of our knowledge, thi paper i the firt to tudy the robut routing problem in interdependent network. The ret of the paper i organized a follow. In Section II, we tate our model for interdependent network and failure. In Section III, we prove the complexity, and develop approximation algorithm to compute the path failure probability. In Section IV, we develop algorithm to find the mot reliable path between a pair of node. In Section V, we tudy the divere routing problem in interdependent network, and find a pair of reliable path whoe failure probability i minimized. Section VI provide numerical reult. Finally, Section VII conclude the paper. II. MODEL We conider a demand network G and a upply network G, where every demand node in G depend on one or more upply node in G. We aume that every upply node provide ubtitutional upply to the demand node, and a demand node i functioning if it i directly connected to at leat one upply node. To tudy the impact of node failure in G on G, it i equivalent to tudy the following model. Conider a graphg(v,e,s V ), where nodev and edgee are identical to node and edge in G, and S V are the upply node et, each of which i a et of node in G that provide upply to a node in V. In thi model, each node v i V i a demand node, upported by a et of upply node S i S V, and v i fail if all the node in S i fail. (Note that node V may have different number of upply node.) Finally, let,t V be a ource-detination pair. Under the condition that upply node fail independently with given probabilitie, and following the convention that, t do not fail, we tudy the robut routing problem in G(V,E,S V ). Remark. The analyi for thi model can be directly applied to interdependent network, a long a the interdependence i bidirectional (i.e., if v G depend on u G, then u depend on v a well) and failure initially occur in one

3 network. It uffice to oberve that, given a et of failed node S G, a node v G fail if and only if it upply node are all in S. Notice that the failure of v doe not further lead to node failure in G, becaue all the node that v upport, which are exactly the upply node for v due to the bidirectional interdependence, have failed. III. COMPUTING THE RELIABILITY OF A PATH If every node ha a ingle upply node, the path failure probability i given by ( p) r, where each upply node fail independently with probability p and the path i upported byr upply node. In contrat, if every node ha more than one upply node, computing the path failure probability become #P -hard. The proof can be found in the Appendix of the technical report [9]. Theorem. Computing the failure probability of a path i #P -hard, if every node ha two or more upply node and each upply node fail independently with probability p. Although it i #P -hard to compute, the path failure probability can be well approximated. We apply the olution to the DNF probability problem and propoe an (ǫ, δ)-approximation algorithm baed on importance ampling, which approximate the path failure probability to within a multiplicative factor ±ǫ with probability at leat δ. The DNF probability problem compute the probability that a Dijunctive Normal Form (DNF) formula i true, when literal are et to be true independently with given probabilitie. A DNF formula i a dijunction of claue, each of which i a conjunction of literal, and take the following form: (x x n ) (x x n ) (x m xm n m ). Let v v m be a path in G(V,E,S V ). The key obervation i that computing the path failure probability can be formulated by a DNF probability problem, in which a claue C i repreent a node v i in the path and the literal x i j in claue C i repreent the upply node of v i. For completene, we tate Algorithm that approximate the path failure probability, by adapting the algorithm that approximate the DNF probability in [0]. The intuition behind thi importance ampling algorithm i a follow. Some event, although rare, are important in determining the path failure probability, epecially when the path failure probability i mall. The algorithm ample in a pace coniting of important event, each of which i a et of upply node failure U that lead to the path failure. In thi pace, the failure of U may appear multiple time, given that multiple choice ofv i in Step may lead to the ameu in Step. The algorithm then remove the duplicated U via ampling in Step 4. To prove the correctne of the algorithm, we take the following two tep. Firt, following a imilar analyi to [0], we prove that the path failure probability i given by E[I] k m j n (v k ) p(uk j ), where E[I] i the expectation of I in Step 4 of the algorithm. Second, by repeating the loop a ufficiently large number of time, E[I] can be approximated to within factor ± ǫ with probability at leat Algorithm Etimating the path failure probability baed on importance ampling. Initialization: ) Given a path{v,v,...,v m }, let{u i j j =,...,n (v i )} denote the et of upply node of v i, where n (v i ) i the number of upply node of v i. Main loop: ) Among {v,v,...,v m }, randomly chooe v i with probability p(u i j)/ p(u k j). j n (v i) k m j n (v k ) If every demand node ha an identical number of upply node, and the upply node failure probability p(u i j ) i identical, then node v i i choen with probability /m. ) If v i i choen, et all of it upply node {u i j j =,...,n (v i )} to be failed. The other upply node are randomly et to be failed with their repective failure probabilitie. Let U denote the et of failed upply node. 4) Tet whether v i i the firt failed node among {v,v,...,v m }, given that U fail (and no other upply node fail). If true, et I = ; otherwie, et I = 0. Repeat the loop for a = mln(/δ)/ǫ iteration. Reult: 5) Count the number of I = and denote the number by b. An (ǫ, δ)-approximation of the path failure probability i given by b/a k m j n (v k ) p(uk j ). δ. The detail of the proof can be found in the Appendix of the technical report [9]. The advantage of thi algorithm over a naïve Monte-Carlo algorithm (e.g., by repeatedly imulating the upply node failure event and counting the fraction of trial in which the path fail) i that the number of iteration in the naïve Monte- Carlo algorithm i large when the path failure probability i mall. In contrat, by ampling in a more important pace, the number of iteration i reduced. Note that the only quantity that need to be etimated in Algorithm by imulation i E[I], and that Pr(I = ) /m. We conclude thi ection by the following theorem, whoe proof i in the Appendix of the technical report [9]. Theorem. The path failure probability can be etimated to within a multiplicative factor ±ǫ with probability δ, in time O(m n ln(/δ)/ǫ ), where m i the path length and n i the maximum number of upply node for a demand node. Although the failure probability of a pecific path can be well approximated by the importance ampling algorithm, the algorithm hardly give an intuition for path propertie that characterize a reliable path. In the remainder of thi ection, we If F occur in b out of a trial, Pr(F) ( ± ǫ)b/a with probability δ, under the condition that b = Ω(ln(/δ)/ǫ ). The total number of trial a = Ω(ln(/δ)/ǫ )/Pr(F) i large when Pr(F) i mall.

4 develop indicator and bound on the path failure probability, which can be ued for finding the mot reliable path. A. Small and identical failure probability Conider a path v v m in G(V,E,S V ). Let F i denote the event that all the upply node of v i fail. Let F denote the event that the path fail. Clearly, the path fail if at leat one node v i loe all of it upply node (F = i m F i ). By the incluion-excluion principle, we have Pr(F) = Pr(F i ) Pr(F i F i ) i m i <i m + +( ) m Pr(F F F m ). () Directly computing the path failure probability i difficult, given that there are ( m j) ummation in the j-th term of the incluion-excluion formula. We firt reduce the number of event in the incluion-excluion formula, and then further implify the computation under the condition that the upply node failure probability i mall and identical. To reduce the number of event, ome redundant event can be ignored. For example, if F i occur only if F j occur, then the eventf i i redundant in determiningf with the knowledge of F j. To ee thi, note that ) if F j occur, then the path fail regardle of F i ; ) if F j doe not occur, then F i doe not occur a well. If the upply node of v j form a ubet of the upply node of v i, then F i i redundant. With an abue of language, we call a node v i redundant if F i (i.e., the tate of v i ) i redundant. With thi implification, we derive the following reult. Let n (v i ) denote the number of ditinct upply node of v i. Let n min = min i m n (v i ). After removing the redundant node equentially, let m be the number of remaining node that each have n min upply node. The path failure probability can be etimated by the following theorem. Theorem. If every upply node fail independently with probability p ǫ/m, then the path failure probability atifie ( ǫ) mp nmin Pr(F) (+ǫ) mp nmin. Proof. We firt reduce the number of failure event that appear in the incluion-excluion formula by removing the redundant node. Note that determining whether a node i redundant and removing the redundant node are done equentially. Thu, among the et of node that have the ame upply node, one node remain. Let D denote the node in the path excluding the redundant node. Firt, we conider the firt term in Eq. () that provide an upper bound on the path failure probability, known a the union bound. Let D D denote the et of node that each upply node, and let m = D. The remaining node D = D \ D each have n min + or more upply node. Thu, the firt term of Eq. () i at mot have n min for p ǫ/m. Pr(F) mp nmin mp nmin +(m m)pp nmin +ǫp nmin, Next, we conider the firt two term that provide a lower bound on the path failure probability (cf. Bonferroni inequalitie). For any pair of node v j,v k D, the union of their upply node et contain at leat max(n (v j ),n (v k )) + node, becaue neither upply node et include the other a a ubet. At leat n min + upply node have to be removed in order for a pair of node in D to fail. At leat n min + upply node need to be removed in order for a pair of node to fail if at leat one node belong to D. The abolute value of the econd term i at mot ( m ) p n min + +[ ( ) m ) ( m ]p n min +. A lower bound on Pr(F) i ( Pr(F) mp nmin m for p ǫ/m. mp nmin ppnmin ǫ mp nmin, ) + m p p nmin Thu, we have obtained the following two reliability indicator for a path. Thee combinatorial propertie are ueful in finding a reliable path, which will be tudied in the next ection. n min : the minimum number of ditinct upply node for a node in the path. m: the number of combination of n min upply node failure that lead to the failure of at leat one node in the path. B. Arbitrary failure probability In contrat with the cae where upply node failure probability i mall and identical, it i difficult to characterize the reliability of a path by it combinatorial propertie, with limited knowledge of node failure probabilitie. Therefore, we obtain bound on path failure probability that will be ueful in finding a reliable path. Firt, we develop an upper bound on the path failure probability. Let p(v i ) be the failure probability of node v i, under the condition that each of it upply node u i j fail independently with probability p(u i j ). The path failure probability, under the condition that the failure of V are poitively correlated, i no larger than the path failure probability by auming that the failure of V are independent. The proof can be found in the technical report [9]. Lemma. The failure probability of a path P where a upply node u i j fail independently with probability p(ui j ) i upper bounded by v ( p(v i P i)). Then, we develop a lower bound on the path failure probability. The intuition i a follow. After replacing a upply node that upport multiple demand node by multiple independent upply node with ufficiently mall failure probability, the path failure probability doe not increae. In the original graph G(V,E,S V ), conider a node v i V. Let U i denote the et of upply node of v i, let u i j Ui denote one upply node, let p(u i j ) denote the failure probability of ui j, and let n d (u i j ) denote the number of node that ui j upport. Let p(v i ) = u p(u i i j Ui j ) denote the failure probability of v i

5 if u i j fail independently with probability p(ui j ) = ( p(u i j ))/n d(u i j ). A lower bound on the path failure probability i a follow, whoe proof follow a imilar technique in [] and i in the technical report. Lemma. The failure probability of a path P where a upply node u i j fail independently with probability p(ui j ) i lower bounded by v ( p(v i P i)). Let n d denote the maximum number of demand node that a upply node upport, and let n denote the maximum number of upply node for a demand node. The following lemma bound the ratio between the upper and lower bound. It proof can be found in the Appendix of the technical report [9]. Lemma. For any path, the ratio of the upper bound on it failure probability obtained in Lemma to the lower bound obtained in Lemma i at mot (n d ) n. IV. FINDING THE MOST RELIABLE PATH In thi ection, we aim to compute the mot reliable path between a ource-detination pair,t V in G(V,E,S V ). We firt prove that it i NP-hard to approximately compute the mot reliable path. We then develop an algorithm to compute the mot reliable path when the upply node fail independently with an identically mall probability, and finally develop an approximation algorithm under arbitrary failure probabilitie. Hardne of approximation: Although the failure probability of any given path can be approximated to within factor ±ǫ for any ǫ > 0, it i NP-hard to obtain an t path whoe failure probability i le than + ǫ time the optimal for a mall ǫ. The proof can be found in the Appendix of the technical report [9]. Theorem 4. Computing an t path whoe failure probability i le than + ǫ time the failure probability of the mot reliable t path i NP-hard for ǫ < /m, where m i the maximum path length. A. Small and identical failure probability If every upply node fail independently with an identically mall probability, there are two reliability indicator: n min and m. Recall that n min i the minimum number of upply node for a node in the path, and that m i the number of combination of n min upply node failure that diconnect the path. With the two indicator, the path failure probability can be approximated to within a multiplicative factor ± ǫ by mp nmin, under the condition that p ǫ/m. Moreover, the indicator n min i more important (and ha a higher priority to be optimized) than m. We next develop algorithm to optimize the two indicator. Given a graph G(V,E,S V ) and a pair of node (,t), the problem of computing an t path with the maximum n min can be formulated a the maximum capacity path problem, where the capacity of a node equal the number of it ditinct upply node and the capacity of a path i the minimum node capacity along the path. The maximum capacity path can be obtained by a modified Dijktra algorithm, and can be obtained in linear time []. However, it i NP-hard to minimize m, even in the pecial cae where every demand node ha a ingle upply node. The reult follow from the NP-hardne of computing a path with the minimum color in a colored graph []. We develop an integer program to compute the path P with the minimum m, under the condition that n min (P) = min vi P n (v i ) i maximized. The following pre-proceing reduce the ize of the integer program. Firt, compute k = max P P n min (P), where P i the et of all the t path, uing the linear-time maximum capacity path algorithm. Then, remove all the node that have fewer than k ditinct upply node and their attached edge, and denote the remaining graph by G (V,E,S V ). The removed node and edge will not be ued by the optimal path. Let V V denote the node among which each ha exactly k ditinct upply node. We aim to find a path V P where the number of ditinct upply node et for V P V i minimized. Let S i denote the et of upply node of i V. Let S V denote the union of thee et. Let x ij denote the flow variable which take a poitive value if and only if edge (i,j) belong to the elected path. An t path i identified by contraint (). A node i i on the elected path if at leat one of x ij and x ji i poitive. Let h(s i ) denote whether removing upply node S i diconnect the elected path. If a node i i on the elected path and ha k upply node, then h(s i ) mut be one, guaranteed by contraint (4). All the other node either do not belong to the elected path or have more than k upply node, and their upply node failure are not conidered. The objective minimize m, which i the number of combination of k upply node failure that diconnect the path. min.t. S i S V {j (i,j) E } {j (i,j) E } h(s i ) () x ij {j (j,i) E } x ij + {j (j,i) E } x ij 0, (i,j) E, h(s i ) = {0,}, S i S V. B. Arbitrary failure probability, if i =, x ji =, if i = t, 0, otherwie. () x ji h(s i ), i V \,t,(4) If node Ṽ in a graph G(Ṽ,Ẽ) fail independently, the probability that a path urvive i the product of the urvival probabilitie of node along the path. The mot reliable path can be obtained by the claical hortet path algorithm, by replacing the length of travering a node ṽ i by ln( p(ṽ i )), where p(ṽ i ) i the failure probability of ṽ i. It i eay to ee that the length of a path P i ṽ ln( p(ṽ i P i)) = ln ṽ ( p(ṽ i P i)). The hortet path ha the mallet failure probability ṽ ( p(ṽ i P i)). Compared with the above imple model, the difficulty in

6 obtaining the mot reliable t path in interdependent network i the failure correlation of node V G(V,E,S V ). The failure probability of a path can no longer be characterized by v i P ( p(v i)). Moreover, let v i t be the mot reliable t path. The ub-path v i may not be the mot reliable path between and v i. Thu, the labelcorrection approach in dynamic programming (e.g., Dijktra algorithm) cannot be ued, even though the failure probability of a given path can be approximated. Given the bound obtained in the previou ection, we propoe Algorithm to compute a path whoe failure probability i within (n d ) n time the optimal failure probability. Recall that the bound on path urvival probability are the product of (original or new) node urvival probabilitie, which exactly match the path urvival probability in the cae of independent node failure. Algorithm An approximation algorithm to compute a reliable t path in G(V,E,S V ). ) For each v i V, compute p(v i ) a follow. Let u i j be a upply node of v i with failure probability p(u i j ). If u i j upport n d(u i j ) node, let p(ui j ) = ( p(u i j ))/n d(u i j ). Let p(v i ) be the failure probability of v i if u i j fail independently with probability p(ui j ). ) Compute the mot reliable t path auming that v i fail independently with probability p(v i ). The mot reliable path can be obtained by a tandard hortet path algorithm (e.g., Dijktra algorithm), by letting ln( p(v i )) be the length of travering node v i. Theorem 5. The failure probability of the path obtained by Algorithm i at mot (n d ) n time the failure probability of the mot reliable t path under arbitrary upply node failure probabilitie. Proof. Let the path obtained by Algorithm be P and let the path with the minimum failure probability be P. Let p(p ) and p(p ) denote their failure probabilitie. Moreover, let p(p ) and p(p ) denote their failure probabilitie by auming that each node v i fail independently with probability p(v i ). We have p(p ) n n d p(p ) n n d p(p ) n n d p(p ), where the firt inequality follow from Lemma and the lat inequality follow from Lemma. Remark. If n = and every upply node fail independently with an identically mall probability, our reult reduce to the following reult in the claical hared rik group model: The number of rik aociated with the hortet path i at mot n d time the number of rik aociated with the minimum-rik path []. V. RELIABILITY OF A PAIR OF PATHS To tudy divere routing in interdependent network, we conider the implet cae of two t path in thi ection. Given that computing the failure probability of a ingle path i #P hard if every node ha more than one upply node, it i alo #P hard to compute the failure probability of two path. To ee thi, note that if two path have the ame number of node and each node in the firt path ha identical upply node a it correponding node in the econd path, then the probability that both path fail equal the probability that a ingle path fail. Fortunately, we are till able to obtain ±ǫapproximation of the failure probability in polynomial time. A. Small and identical failure probability A central concept in divere routing i the dijoint path or rik dijoint path [], [], [0]. In the claical hared rik group model, if every rik occur independently with an identically mall probability p = o(/m ), the probability that two path fail i Θ(f(m)p ) if they are rik dijoint and Θ(f(m)p) if they hare one or more rik, where m i the maximum path length and f(m) i a function of m. Thu, rik-dijointne characterize the order of the reliability of two path. In interdependent network where every demand node ha multiple upply node, if node in P do not hare any upply node with node in P, then P and P are rik dijoint. However, rik-dijointne doe not uffice to characterize the reliability of two path, for the following two reaon. Firt, the failure probability of a demand node depend on the number of upply node for it, which i not related to rik-dijointne. Second, if P and P hare ome upply node, the failure probability depend further on the maximum number of upply node failure that the two path can withtand. To tudy the reliability of two path in interdependent network, we define d-failure reilient path a follow. Definition. Two path are d-failure reilient if removing any d upply node would not diconnect both path. Remark. In the claical graph model G( Ṽ,Ẽ), two dijoint path are -failure reilient while two overlapping path are 0-failure reilient. In the claical hared rik group model, two rik dijoint path are -failure reilient while two path that hare rik are 0-failure reilient. Two path can never be more than one failure reilient. Thu, the dijointne or rikdijointne uffice to characterize (the order of) the reliability of two path in thee model. ) Evaluation of failure probability: Conider two path P = v v v m t,p = v v v m t between a pair of node (,t). We tudy the event that at leat one node in P and at leat one node in P both fail. Let Fi k denote the event that all the upply node of vi k fail, and let F k denote the event that the k-th path fail, k {,}. Then F F = i m, j m (Fi F j ). For implicity of preentation, let F both = F F and F ij = Fi F j. Let S ij denote the union of upply node of vi and v j. Meanwhile, it i till imple to compute the failure probability of two path if every node ha a ingle upply node, by firt computing the probability that the firt path fail, and then computing the probability that the econd path fail while the firt path doe not fail (i.e., none of the upply node of the firt path fail), both in polynomial time, and umming the two probabilitie.

7 To decide whether two path are d-failure reilient, we conider the number of upply node failure that lead to the event F ij, and denote the number by d ij. Then d = min i m, j m d ij. Moreover, let m be the number of pair of node, one from each path, uch that each pair of node in total have d + ditinct upply node and any two pair do not have the ame et of d+ upply node. (I.e., m combination of d + upply node failure each diconnect both path.) The next theorem formalize the connection between the reliability of two path and d. The proof follow the ame manner a that for Theorem and can be found in the technical report [9]. Theorem 6. If every upply node fail independently with probability p ǫ/(m m ), then the probability that two d- failure reilient path with length m,m both fail atifie ( ǫ) mp d+ Pr(F both ) (+ǫ) mp d+. ) Finding the mot reliable pair of path: From Theorem 6, we know that the probability that two d-failure reilient path both fail i maller for larger value ofd. Moreover, for a fixed d, the failure probability i proportional to m, the number of combination of d + upply node failure that diconnect both path. We have obtained two reliability indicator for two path: d and m. Unfortunately, computing the pair of t path that have the maximum d and the minimum m are both NP-hard, even in the pecial cae where every demand node ha a ingle upply node. Thi pecial cae reduce to the claical hared rik group model. In thi pecial cae, d = if there exit two rik-dijoint path, and d = 0 otherwie. The NP-hardne of determining the exitence of two rik-dijoint path between an t pair ha been proved in []. Moreover, in thi pecial cae, for two path that hare common upply node, m i the number of overlapping rik between the two path (i.e., removing any of the m upply node diconnect both path). The NP-hardne of the leat coupled path problem, which compute a pair of path that hare the minimum number of rik in the claical hared rik group model, ha alo been proved in []. We develop an integer program to compute a pair of t path with the maximum d in G(V,E,S V ). Let variable x k ij denote whether edge (i,j) i part of the k-th path, and let variable b k i denote whether node i i part of the k-th path, k {,}. Same a before, let S i denote the upply node of node i. Contraint (6) guarantee that two path are nodedijoint. Notice that thee contraint can be dropped if there i no retriction on the phyical dijointne of two path. Contraint (7) guarantee that at leat d + upply node need to be removed in order for one node in each path to fail (i.e., b i = b j =, i,j V ), where M i a ufficiently large number, e.g., twice the maximum number of upply node for a demand node. max d (5).t. x k ij, if i =, x k ji =, if i = t, k {,}, {j (i,j) E} {j (j,i) E} 0, otherwie. x k ij + x k ji bk i, i V,k {,} {j (i,j) E} {j (j,i) E} b i +b i, i V \,t, (6) d+ S i S j +M( b i b j ), i,j V \,t,(7) x k ij {0,}, (i,j) E,k {,}, b k i {0,}, i V,k {,}. A lightly modified integer program uffice to minimize m under the condition that d i maximized. Let h(s i S j ) denote whether removing the union of upply node for i and j diconnect both path. Contraint (9) guarantee that if i and j belong to two different path, i.e., b i = b j =, then h(s i S j ) =. Otherwie, h(s i S j ) = 0 in the optimal olution. Let a poitive value w( S i S j ) denote it weight, which i a decreaing function of the cardinality S i S j. We aim to minimize the total weight of upply node failure that diconnect two path. In order to guarantee that d i maximized, w(l)/w(l + ) hould be ufficiently large for any integer l, e.g., V /. Since there are at mot V ( V )/ pair of node, larger d i alway preferable and ha a higher priority to be optimized over m. min.t. w( S i S j )h(s i S j ) (8) S i,s j S V x k ij, if i =, x k ji =, if i = t, k {,}, {j (j,i) E} 0, otherwie. x k ij + x k ji b k i, i V,k {,} {j (i,j) E} {j (i,j) E} {j (j,i) E} b i +b i, i V \,t, h(s i S j ) b i +b j, i,j V \,t, (9) {0,}, (i,j) E,k {,}, x k ij h(s i S j ) {0,}, i,j V. B. Arbitrary failure probability ) Evaluation of failure probability: We ue a imilar importance ampling approach to Algorithm and formulate the problem of computing the failure probability of two path a a DNF probability problem. A claue C ij repreent a pair of node vi and vj. Literal in C ij repreent the union of upply node of vi and vj. A literal i true if and only if the upply node that it repreent fail, and the probability that the literal i true i the ame a the upply node failure probability. The dijunction of claue i true if and only if at leat one claue i true, in which cae both path fail becaue at leat one node from each path fail. The ret of the computation follow the ame manner a Algorithm,

8 by replacing a node in Algorithm by a pair of node. An (ǫ,δ)-approximation of the failure probability Pr(F both ) can be obtained in O(m m n ln(/δ)/ǫ ) time. ) Finding the mot reliable pair of path: It i more difficult to find two path that have the mallet failure probability. Recall Theorem 6. The failure probability of two path i Θ(f(m,m )p d+ ) if they are d-failure reilient when the upply node failure probabilitypi mall, where f(m,m ) i a function of two path length. A a corollary of the fact that it i NP-hard to compute two path that have the maximum level of reilience d, it i alo NP-hard to compute two path whoe failure probability i within a factorαfrom the optimal, where α i any function of the network ize. Thu, we develop the following heuritic. After computing the failure probability p(v i ) of a nodev i in Step of Algorithm, let ln( p(v i )) be the length of travering node v i, and compute two node dijoint path with the minimum total length. The two path can be efficiently obtained uing a lightly modified hortet augmenting path algorithm []. The computation i outlined in Algorithm. The reaon for the graph tranformation in Step i to implify the computation of a reidual graph, to which the hortet augmenting path algorithm can be applied. Algorithm A heuritic to compute a pair of reliable t path in G(V,E,S V ). ) Tranform G(V,E,S V ) with node failure probabilitie to a directed graph G with edge failure probabilitie uing the tandard approach. (Split every node v into v in and v out. Add a directed edge from v in to v out, which ha length ln( p(v i )). Add a directed edge from v out to v in and a directed edge from v out to v in, both with zero length, if an edge exit between v and v in G(V,E,S V ).) ) Compute the hortet path P from out to t in in G. ) Compute the reidual graph a follow. Remove all the edge in P. Add a backward edge from v to v with a negated length if an edge from v to v i part of P. 4) Compute the hortet path P from out to t in in the reidual graph. 5) Combine P and P by cycle cancellation. The two path become node-dijoint and can be mapped to two path in G(V,E,S V ). VI. NUMERICAL RESULTS We tudy the robut routing problem in the XO backbone communication network with 60 node and 75 edge [4], by auming that the XO node are upported by 6 randomly generated upply node within the continental US. The XO network topology i depicted in Fig. 4, and the upply node are marked a triangle. The x-axi repreent the longitude and the y-axi repreent the latitude. We do not claim that the XO network need upply from thee randomly generated point, and we ue thi example only to provide a viualization of the robut routing problem uing available data. 50 Seattle Miami Fig. 4. Topology of the XO network and randomly generated triangle upply node. The mot reliable Seattle-Miami path i colored red under the condition that upply node failure probability i mall and identical and every XO node depend on two nearet upply node. Firt, we aume that every XO node depend on two nearet upply node and every upply node fail independently with probability 0. Since the upply node failure probability i mall and identical, we are able to obtain the mot reliable path and pair of path by optimizing the reliability indicator uing integer program. To identify the mot reliable path, ince n min (P) = for any path P, we only need to compute a path with the minimum m uing the integer program in Section IV. The mot reliable path i colored red in Fig. 4, for which m = 8. To evaluate the path failure probability, by a tronger analog of Theorem (Corollary in the technical report), etting ǫ = 4 0, Pr(F) [ ,8 0 4 ]. To compare, uing Algorithm, we obtain a a ( ± 0.0)-approximation of the path failure probability with probability Thee reult ugget that the two reliability indicator (n min, m) well characterize the path failure probability when the upply node failure probability i mall and identical. We compute the mot reliable pair of path connecting Seattle-Miami uing the integer program in Section V. The two path are plotted in Fig. 5, and they are -failure reilient (d = ). The failure probability of both path i approximately In contrat, the mot reliable pair of path connecting Seattle-Denver are -failure reilient and their failure probability i approximately Thu, the level of reilience well indicate the reliability of two path. Next, we aume that an XO node depend on N randomly choen upply node, where N i uniformly choen among,, and. Let the failure probability of each upply node be uniformly and independently choen from [0.005, 0.05]. We ue Algorithm to obtain a reliable path connecting Seattle- Miami. Averaged over 0 trial, the path failure probability i approximately.0 0, while the lower bound on the failure probability of the mot reliable path i The obtained path ha failure probability around four time the lower bound. Moreover, by uing the heuritic to find a pair of path, the path have average failure probability.97 0, which improve the reliability of a ingle path.

9 REFERENCES 50 Seattle Denver Miami Fig. 5. The mot reliable pair of path between Seattle-Miami are colored red, under the condition that upply node failure probability i mall and identical and every XO node depend on two nearet upply node. We compare the performance of the heuritic (Algorithm ) with the optimal pair of path. Since it i difficult to obtain the optimal pair of path under arbitrary failure probabilitie, we ue the integer program (8), under the condition that upply node fail independently with probability 0. If every XO node depend on two nearet upply node, the failure probabilitie of two optimal path and two path obtained by the heuritic are approximately and , repectively. If every XO node depend on three nearet upply node, the failure probability of two optimal path and two path obtained by the heuritic are approximately and , repectively. Thee experiment validate the performance of our heuritic algorithm. Finally, we report the running time of the algorithm, executed in a worktation that ha an Intel Xeon Proceor (E5-687W v) and 64GB RAM. The integer program that find the mot reliable path and pair of path (under mall and identical upply node failure probability) can both be olved within econd. The approximation algorithm to find a reliable path and the heuritic to find a pair of path (under arbitrary failure probabilitie) can both be olved within 0. econd. The evaluation of the failure probability of one path or a pair of path by Algorithm take everal minute, by etting ǫ = δ = 0.0. Thu, the algorithm (integer program and Algorithm and ) can be ued to find reliable route in realitic ize network. VII. CONCLUSION We tudied the robut routing problem in interdependent network. We developed approximation algorithm to compute the path failure probability, and identified reliability indicator for a path, baed on which we develop algorithm to find the mot reliable route in interdependent network. We alo tudied divere routing in interdependent network, and developed approximation algorithm to compute the probability that two path both fail and to find two reliable path. Our work extend the hared rik group model, and provide a new framework to tudy robut routing problem in interdependent network. [] O. Yagan, D. Qian, J. Zhang, and D. Cochran, Optimal allocation of interconnecting link in cyber-phyical ytem: Interdependence, cacading failure, and robutne, IEEE Tranaction on Parallel and Ditributed Sytem, vol., no. 9, pp , 0. [] V. Roato, L. Iacharoff, F. Tiriticco, S. Meloni, S. Porcellini, and R. Setola, Modelling interdependent infratructure uing interacting dynamical model, Int. J. Critical Infratructure, vol. 4, no. -, pp. 6 79, 008. [] C.-G. Gu, S.-R. Zou, X.-L. Xu, Y.-Q. Qu, Y.-M. Jiang, H.-K. Liu, T. Zhou et al., Onet of cooperation between layered network, Phyical Review E, vol. 84, no., p. 060, 0. [4] M. Parandehgheibi and E. Modiano, Robutne of interdependent network: The cae of communication network and the power grid, in Proc. IEEE GLOBECOM, Atlanta, 0, pp [5] M. Parandehgheibi, K. Turityn, and E. Modiano, Modeling the impact of communication lo on the power grid under emergency control, in Proc. IEEE SmartGridComm, Miami, 05, pp [6] S. V. Buldyrev, R. Parhani, G. Paul, H. E. Stanley, and S. Havlin, Catatrophic cacade of failure in interdependent network, Nature, vol. 464, no. 79, pp , 00. [7] J. Shao, S. V. Buldyrev, S. Havlin, and H. E. Stanley, Cacade of failure in coupled network ytem with multiple upport-dependence relation, Phyical Review E, vol. 8, no., p. 066, 0. [8] S. Yang, S. Trajanovki, and F. A. Kuiper, Shortet path in network with correlated link weight, in Proc. IEEE Computer Communication Workhop (INFOCOM WKSHPS), Hong Kong, 05, pp [9] D. Xu, Y. Xiong, C. Qiao, and G. Li, Failure protection in layered network with hared rik link group, IEEE network, vol. 8, no., pp. 6 4, 004. [0] D. Coudert, P. Datta, S. Pérenne, H. Rivano, and M.-E. Voge, Shared rik reource group complexity and approximability iue, Parallel Proceing Letter, vol. 7, no. 0, pp , 007. [] J. Q. Hu, Divere routing in optical meh network, IEEE Tranaction on Communication, vol. 5, no., pp , 00. [] S. Yuan, S. Varma, and J. P. Jue, Minimum-color path problem for reliability in meh network, in Proc. INFOCOM 005, Miami, 005, pp [] H.-W. Lee, E. Modiano, and K. Lee, Divere routing in network with probabilitic failure, IEEE/ACM Tranaction on Networking, vol. 8, no. 6, pp , 00. [4] M. F. Habib, M. Tornatore, F. Dikbiyik, and B. Mukherjee, Diater urvivability in optical communication network, Computer Communication, vol. 6, no. 6, pp , 0. [5] W. Cui, I. Stoica, and R. H. Katz, Backup path allocation baed on a correlated link failure probability model in overlay network, in Proc. IEEE Int. Conf. Network Protocol, Pari, 00, pp [6] Q. Zheng, G. Cao, T. F. La Porta, and A. Swami, Cro-layer approach for minimizing routing diruption in ip network, IEEE Tranaction on Parallel and Ditributed Sytem, vol. 5, no. 7, pp , 04. [7] C. Tang and P. K. McKinley, Improving multipath reliability in topology-aware overlay network, in Proc. IEEE International Conference on Ditributed Computing Sytem Workhop, Columbu, Ohio, 005, pp [8] T. Fei, S. Tao, L. Gao, and R. Guerin, How to elect a good alternate path in large peer-to-peer ytem? in Proc. INFOCOM 006, Barcelona, April 006, pp.. [9] J. Zhang and E. Modiano, Robut routing in interdependent network, Tech. Rep., 06. [Online]. Available: [0] R. M. Karp, M. Luby, and N. Madra, Monte-carlo approximation algorithm for enumeration problem, Journal of algorithm, vol. 0, no., pp , 989. [] W. Gatterbauer and D. Suciu, Obliviou bound on the probability of boolean function, ACM Tranaction on Databae Sytem (TODS), vol. 9, no., p. 5, 04. [] A. P. Punnen, A linear time algorithm for the maximum capacity path problem, European J. Oper. Re., vol. 5, no., pp , 99. [] J. Edmond and R. M. Karp, Theoretical improvement in algorithmic efficiency for network flow problem, Journal of the ACM (JACM), vol. 9, no., pp , 97. [4] XO Communication, Network map. [Online]. Available:

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

A note on degenerate and spectrally degenerate graphs

A note on degenerate and spectrally degenerate graphs A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

Shortest Path Routing in Arbitrary Networks

Shortest Path Routing in Arbitrary Networks Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

Delaunay Triangulation: Incremental Construction

Delaunay Triangulation: Incremental Construction Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )

More information

Contents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course:

Contents. shortest paths. Notation. Shortest path problem. Applications. Algorithms and Networks 2010/2011. In the entire course: Content Shortet path Algorithm and Network 21/211 The hortet path problem: Statement Verion Application Algorithm (for ingle ource p problem) Reminder: relaxation, Dijktra, Variant of Dijktra, Bellman-Ford,

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term

More information

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline Generic Travere CS 62, Lecture 9 Jared Saia Univerity of New Mexico Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v) from the bag if (v i unmarked) mark v; parent(v) = p;

More information

New Structural Decomposition Techniques for Constraint Satisfaction Problems

New Structural Decomposition Techniques for Constraint Satisfaction Problems New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT

More information

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc

MAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two

More information

xy-monotone path existence queries in a rectilinear environment

xy-monotone path existence queries in a rectilinear environment CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of

More information

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de

More information

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

arxiv: v1 [cs.ds] 27 Feb 2018

arxiv: v1 [cs.ds] 27 Feb 2018 Incremental Strong Connectivity and 2-Connectivity in Directed Graph Louka Georgiadi 1, Giueppe F. Italiano 2, and Niko Parotidi 2 arxiv:1802.10189v1 [c.ds] 27 Feb 2018 1 Univerity of Ioannina, Greece.

More information

A Multi-objective Genetic Algorithm for Reliability Optimization Problem

A Multi-objective Genetic Algorithm for Reliability Optimization Problem International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR

More information

An Intro to LP and the Simplex Algorithm. Primal Simplex

An Intro to LP and the Simplex Algorithm. Primal Simplex An Intro to LP and the Simplex Algorithm Primal Simplex Linear programming i contrained minimization of a linear objective over a olution pace defined by linear contraint: min cx Ax b l x u A i an m n

More information

Lecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization

Lecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization Lecture Outline Global flow analyi Global Optimization Global contant propagation Livene analyi Adapted from Lecture by Prof. Alex Aiken and George Necula (UCB) CS781(Praad) L27OP 1 CS781(Praad) L27OP

More information

Shortest Paths with Single-Point Visibility Constraint

Shortest Paths with Single-Point Visibility Constraint Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II IEEE INFOCO 2002 1 Ditributed Partial Information anagement (DPI) Scheme for Survivable Network - Part II Dahai Xu Chunming Qiao Department of Computer Science and Engineering State Univerity of New York

More information

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial

More information

mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee

mapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee Reolving Deadlock for Pipelined Stream Application on Network-on-Chip Xiaohang Wang 1,2, Peng Liu 1 1 Department of Information Science and Electronic Engineering, Zheiang Univerity Hangzhou, Zheiang,

More information

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Iue 4, April 2015 International Journal Advance Reearch in Computer Science and Management Studie Reearch Article / Survey Paper / Cae Study Available online at: www.ijarcm.com

More information

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov

More information

Shortest-Path Routing in Arbitrary Networks

Shortest-Path Routing in Arbitrary Networks Ž. Journal of Algorithm 31, 105131 1999 Article ID jagm.1998.0980, available online at http:www.idealibrary.com on Shortet-Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vocking

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

/06/$ IEEE 364

/06/$ IEEE 364 006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;

More information

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance

A Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance A Hybrid Deployable Dynamic Traffic Aignment Framework for Robut Online Route Guidance Sriniva Peeta School of Civil Engineering, Purdue Univerity Chao Zhou Sabre, Inc. Sriniva Peeta School of Civil Engineering

More information

How to Select Measurement Points in Access Point Localization

How to Select Measurement Points in Access Point Localization Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,

More information

A CLUSTERING-BASED HYBRID REPLICA CONTROL PROTOCOL FOR HIGH AVAILABILITY IN GRID ENVIRONMENT

A CLUSTERING-BASED HYBRID REPLICA CONTROL PROTOCOL FOR HIGH AVAILABILITY IN GRID ENVIRONMENT Journal of Computer Science 10 (12): 2442-2449, 2014 ISSN: 1549-3636 2014 R. Latip et al., Thi open acce article i ditributed under a Creative Common Attribution (CC-BY) 3.0 licene doi:10.3844/jcp.2014.2442.2449

More information

CENTER-POINT MODEL OF DEFORMABLE SURFACE

CENTER-POINT MODEL OF DEFORMABLE SURFACE CENTER-POINT MODEL OF DEFORMABLE SURFACE Piotr M. Szczypinki Iintitute of Electronic, Technical Univerity of Lodz, Poland Abtract: Key word: Center-point model of deformable urface for egmentation of 3D

More information

3D SMAP Algorithm. April 11, 2012

3D SMAP Algorithm. April 11, 2012 3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

Optimal Gossip with Direct Addressing

Optimal Gossip with Direct Addressing Optimal Goip with Direct Addreing Bernhard Haeupler Microoft Reearch 1065 La Avenida, Mountain View Mountain View, CA 94043 haeupler@c.cmu.edu Dahlia Malkhi Microoft Reearch 1065 La Avenida, Mountain View

More information

Modeling and Analysis of Slow CW Decrease for IEEE WLAN

Modeling and Analysis of Slow CW Decrease for IEEE WLAN Modeling and Analyi of Slow CW Decreae for IEEE 82. WLAN Qiang Ni, Imad Aad 2, Chadi Barakat, and Thierry Turletti Planete Group 2 Planete Group INRIA Sophia Antipoli INRIA Rhône-Alpe Sophia Antipoli,

More information

The Split Domination and Irredundant Number of a Graph

The Split Domination and Irredundant Number of a Graph The Split Domination and Irredundant Number of a Graph S. Delbin Prema 1, C. Jayaekaran 2 1 Department of Mathematic, RVS Technical Campu-Coimbatore, Coimbatore - 641402, Tamil Nadu, India 2 Department

More information

Diverse: Application-Layer Service Differentiation in Peer-to-Peer Communications

Diverse: Application-Layer Service Differentiation in Peer-to-Peer Communications Divere: Application-Layer Service Differentiation in Peer-to-Peer Communication Chuan Wu, Student Member, IEEE, Baochun Li, Senior Member, IEEE Department of Electrical and Computer Engineering Univerity

More information

KS3 Maths Assessment Objectives

KS3 Maths Assessment Objectives KS3 Math Aement Objective Tranition Stage 9 Ratio & Proportion Probabilit y & Statitic Appreciate the infinite nature of the et of integer, real and rational number Can interpret fraction and percentage

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

Minimum Energy Reliable Paths Using Unreliable Wireless Links

Minimum Energy Reliable Paths Using Unreliable Wireless Links Minimum Energy Reliable Path Uing Unreliable Wirele Link Qunfeng Dong Department of Computer Science Univerity of Wiconin-Madion Madion, Wiconin 53706 qunfeng@c.wic.edu Micah Adler Department of Computer

More information

A Practical Model for Minimizing Waiting Time in a Transit Network

A Practical Model for Minimizing Waiting Time in a Transit Network A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,

More information

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang

Stochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,

More information

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt

More information

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm

Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation

More information

Planning of scooping position and approach path for loading operation by wheel loader

Planning of scooping position and approach path for loading operation by wheel loader 22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader

More information

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem

More information

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM

AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt

More information

The norm Package. November 15, Title Analysis of multivariate normal datasets with missing values

The norm Package. November 15, Title Analysis of multivariate normal datasets with missing values The norm Package November 15, 2003 Verion 1.0-9 Date 2002/05/06 Title Analyi of multivariate normal dataet with miing value Author Ported to R by Alvaro A. Novo . Original by Joeph

More information

Multicast with Network Coding in Application-Layer Overlay Networks

Multicast with Network Coding in Application-Layer Overlay Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 1, JANUARY 2004 1 Multicat with Network Coding in Application-Layer Overlay Network Ying Zhu, Baochun Li, Member, IEEE, and Jiang Guo Abtract

More information

Brief Announcement: Distributed 3/2-Approximation of the Diameter

Brief Announcement: Distributed 3/2-Approximation of the Diameter Brief Announcement: Ditributed /2-Approximation of the Diameter Preliminary verion of a brief announcement to appear at DISC 14 Stephan Holzer MIT holzer@mit.edu David Peleg Weizmann Intitute david.peleg@weizmann.ac.il

More information

Connected Placement of Disaster Shelters in Modern Cities

Connected Placement of Disaster Shelters in Modern Cities Connected Placement of Diater Shelter in Modern Citie Huanyang Zheng and Jie Wu Department of Computer and Information Science Temple Univerity, USA {huanyang.zheng, jiewu}@temple.edu ABSTRACT Thi paper

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

Algorithmic Discrete Mathematics 4. Exercise Sheet

Algorithmic Discrete Mathematics 4. Exercise Sheet Algorithmic Dicrete Mathematic. Exercie Sheet Department of Mathematic SS 0 PD Dr. Ulf Lorenz 0. and. May 0 Dipl.-Math. David Meffert Verion of May, 0 Groupwork Exercie G (Shortet path I) (a) Calculate

More information

Optimal Multi-Robot Path Planning on Graphs: Complete Algorithms and Effective Heuristics

Optimal Multi-Robot Path Planning on Graphs: Complete Algorithms and Effective Heuristics Optimal Multi-Robot Path Planning on Graph: Complete Algorithm and Effective Heuritic Jingjin Yu Steven M. LaValle Abtract arxiv:507.0390v [c.ro] Jul 05 We tudy the problem of optimal multi-robot path

More information

New Structural Decomposition Techniques for Constraint Satisfaction Problems

New Structural Decomposition Techniques for Constraint Satisfaction Problems 113 New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory, Univerity of Nebraka-Lincoln {yzheng,choueiry}@ce.unl.edu Abtract.

More information

IMPLEMENTATION OF CHORD LENGTH SAMPLING FOR TRANSPORT THROUGH A BINARY STOCHASTIC MIXTURE

IMPLEMENTATION OF CHORD LENGTH SAMPLING FOR TRANSPORT THROUGH A BINARY STOCHASTIC MIXTURE Nuclear Mathematical and Computational Science: A Century in Review, A Century Anew Gatlinburg, Tenneee, April 6-, 003, on CD-ROM, American Nuclear Society, LaGrange Park, IL (003) IMPLEMENTATION OF CHORD

More information

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique

Building a Compact On-line MRF Recognizer for Large Character Set using Structured Dictionary Representation and Vector Quantization Technique 202 International Conference on Frontier in Handwriting Recognition Building a Compact On-line MRF Recognizer for Large Character Set uing Structured Dictionary Repreentation and Vector Quantization Technique

More information

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in

More information

Chapter S:II (continued)

Chapter S:II (continued) Chapter S:II (continued) II. Baic Search Algorithm Sytematic Search Graph Theory Baic State Space Search Depth-Firt Search Backtracking Breadth-Firt Search Uniform-Cot Search AND-OR Graph Baic Depth-Firt

More information

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES

3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES MAKARA, TEKNOLOGI, VOL. 9, NO., APRIL 5: 3-35 3D MODELLING WITH LINEAR APPROACHES USING GEOMETRIC PRIMITIVES Mochammad Zulianyah Informatic Engineering, Faculty of Engineering, ARS International Univerity,

More information

Chapter 13 Non Sampling Errors

Chapter 13 Non Sampling Errors Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption

More information

Markov Random Fields in Image Segmentation

Markov Random Fields in Image Segmentation Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image

More information

Separation of Routing and Scheduling in Backpressure- Based Wireless Networks

Separation of Routing and Scheduling in Backpressure- Based Wireless Networks Separation of Routing and Scheduling in - Baed Wirele Network The MIT Faculty ha made thi article openly available. Pleae hare how thi acce benefit you. Your tory matter. Citation A Publihed Publiher Seferoglu,

More information

Diff-Max: Separation of Routing and Scheduling in Backpressure-Based Wireless Networks

Diff-Max: Separation of Routing and Scheduling in Backpressure-Based Wireless Networks Diff-Max: Separation of Routing and Scheduling in -Baed Wirele Network Hulya Seferoglu and Eytan Modiano Laboratory For Information and Deciion Sytem Maachuett Intitute of Technology {heferog, modiano}@mit.edu

More information

A Unicast-based Approach for Streaming Multicast

A Unicast-based Approach for Streaming Multicast A Unicat-baed Approach for Streaming Multicat Reuven Cohen and Gideon Kaempfer Department of Computer Science Technion, Haifa 32000, Irael Abtract Network layer multicat i know a the mot efficient way

More information

Multi-Target Tracking In Clutter

Multi-Target Tracking In Clutter Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and

More information

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,

More information

A Novel Feature Line Segment Approach for Pattern Classification

A Novel Feature Line Segment Approach for Pattern Classification 12th International Conference on Information Fuion Seattle, WA, USA, July 6-9, 2009 A Novel Feature Line Segment Approach for Pattern Claification Yi Yang Intitute of Integrated Automation Xi an Jiaotong

More information

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput

Modeling the Effect of Mobile Handoffs on TCP and TFRC Throughput Modeling the Effect of Mobile Handoff on TCP and TFRC Throughput Antonio Argyriou and Vijay Madietti School of Electrical and Computer Engineering Georgia Intitute of Technology Atlanta, Georgia 3332 25,

More information

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online

More information

Service and Network Management Interworking in Future Wireless Systems

Service and Network Management Interworking in Future Wireless Systems Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering

More information

Edits in Xylia Validity Preserving Editing of XML Documents

Edits in Xylia Validity Preserving Editing of XML Documents dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

Touring a Sequence of Polygons

Touring a Sequence of Polygons Touring a Sequence of Polygon Mohe Dror (1) Alon Efrat (1) Anna Lubiw (2) Joe Mitchell (3) (1) Univerity of Arizona (2) Univerity of Waterloo (3) Stony Brook Univerity Problem: Given a equence of k polygon

More information

Multiclass Road Sign Detection using Multiplicative Kernel

Multiclass Road Sign Detection using Multiplicative Kernel Proceeding of the Croatian Computer Viion Workhop, Year 1 Multicla Road Sign Detection uing Multiplicative Kernel Valentina Zadrija Mireo d. d. Zagreb, Croatia valentina.zadrija@mireo.hr Siniša Šegvić

More information

UC Berkeley International Conference on GIScience Short Paper Proceedings

UC Berkeley International Conference on GIScience Short Paper Proceedings UC Berkeley International Conference on GIScience Short Paper Proceeding Title A novel method for probabilitic coverage etimation of enor network baed on 3D vector repreentation in complex urban environment

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and Thi article appeared in a journal publihed by Elevier. The attached copy i furnihed to the author for internal non-commercial reearch and education ue, including for intruction at the author intitution

More information

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong 4th International Conference on Machinery, Material and Computing Technology (ICMMCT 2016) A Load Balancing Model baed on Load-aware for Ditributed Controller Fengjun Shang, Wenjuan Gong College of Compute

More information

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *

A Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds * Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm

More information

Efficient Data Forwarding in Mobile Social Networks with Diverse Connectivity Characteristics

Efficient Data Forwarding in Mobile Social Networks with Diverse Connectivity Characteristics Efficient Data Forwarding in Mobile Social Network with Divere Connectivity Characteritic Xiaomei Zhang and Guohong Cao Department of Computer Science and Engineering The Pennylvania State Univerity, Univerity

More information

Drawing Lines in 2 Dimensions

Drawing Lines in 2 Dimensions Drawing Line in 2 Dimenion Drawing a traight line (or an arc) between two end point when one i limited to dicrete pixel require a bit of thought. Conider the following line uperimpoed on a 2 dimenional

More information

Exercise 4: Markov Processes, Cellular Automata and Fuzzy Logic

Exercise 4: Markov Processes, Cellular Automata and Fuzzy Logic Exercie 4: Marko rocee, Cellular Automata and Fuzzy Logic Formal Method II, Fall Semeter 203 Solution Sheet Marko rocee Theoretical Exercie. (a) ( point) 0.2 0.7 0.3 tanding 0.25 lying 0.5 0.4 0.2 0.05

More information

Computer Networks. Cross-layer design in multihop wireless networks. Lijun Chen, Steven H. Low, John C. Doyle. abstract

Computer Networks. Cross-layer design in multihop wireless networks. Lijun Chen, Steven H. Low, John C. Doyle. abstract Computer Network 55 () 48 496 Content lit available at ScienceDirect Computer Network journal homepage: www.elevier.com/locate/comnet Cro-layer deign in multihop wirele network Lijun Chen, Steven H. Low,

More information

Research Article Longest Path Reroute to Optimize the Optical Multicast Routing in Sparse Splitting WDM Networks

Research Article Longest Path Reroute to Optimize the Optical Multicast Routing in Sparse Splitting WDM Networks International Optic Volume 0, Article ID 9, page http://dxdoiorg/0/0/9 Reearch Article Longet Path Reroute to Optimize the Optical Multicat Routing in Spare Splitting WDM Network Huanlin Liu, Hongyue Dai,

More information

Multiconstrained QoS Routing: Greedy is Good

Multiconstrained QoS Routing: Greedy is Good Multicontrained QoS Routing: Greed i Good Guoliang Xue and Weii Zhang Abtract A fundamental problem in qualit-of-ervice (QoS) routing i to find a path connecting a ource node to a detination node that

More information

CSE 250B Assignment 4 Report

CSE 250B Assignment 4 Report CSE 250B Aignment 4 Report March 24, 2012 Yuncong Chen yuncong@c.ucd.edu Pengfei Chen pec008@ucd.edu Yang Liu yal060@c.ucd.edu Abtract In thi project, we implemented the recurive autoencoder (RAE) a decribed

More information

Domain-Specific Modeling for Rapid System-Wide Energy Estimation of Reconfigurable Architectures

Domain-Specific Modeling for Rapid System-Wide Energy Estimation of Reconfigurable Architectures Domain-Specific Modeling for Rapid Sytem-Wide Energy Etimation of Reconfigurable Architecture Seonil Choi 1,Ju-wookJang 2, Sumit Mohanty 1, Viktor K. Praanna 1 1 Dept. of Electrical Engg. 2 Dept. of Electronic

More information

The Data Locality of Work Stealing

The Data Locality of Work Stealing The Data Locality of Work Stealing Umut A. Acar School of Computer Science Carnegie Mellon Univerity umut@c.cmu.edu Guy E. Blelloch School of Computer Science Carnegie Mellon Univerity guyb@c.cmu.edu Robert

More information