On-path Cloudlet Pricing for Low Latency Application Provisioning
|
|
- Derek Atkins
- 5 years ago
- Views:
Transcription
1 On-path Cloulet Pricing for Low Latency Application Provisioning Argyrios G. Tasiopoulos, Onur Ascigil, Ioannis Psaras, Stavros Toumpis, George Pavlou Dept. of Electronic an Electrical Engineering, University College Lonon Dept. of Informatics, Athens University of Economics an Business {argyrios.tasiopoulos, o.ascigil, i.psaras, Abstract Clou computing has been tremenously successful in proviing a commercial infrastructure for hosting computationally intensive applications. Nevertheless, an increasing number of Low Latency Applications (LLAs) notably in the entertainment, IoT, an automative omains require response times much smaller than the supporte ones by the typical client-to-clou network moel. Cloulets have been introuce as ata centres in a box, for bringing computing resources closer to the en users. As a result, LLAs can take avantage of cloulets to improve their Quality-of-Service (QoS) by reucing the unerlying response times between their users an application instances location. In this work, we stuy the emerging market of stateful LLAs provisioning over geo-istribute thir-party cloulets. We assume that cloulets offer their resources in the form of Virtual Machines (VMs) via collocate markets. Forwaring requests for LLAs interact with cloulet markets for performing on-path an on-eman resource provisioning. We introuce a pricing scheme where users pay a fixe price for each time unit of their engagement to an LLA instance. Our evaluation on realistic topologies an application requests emonstrate the merits of on-eman provisioning when accompanie by a payas-you-go pricing scheme. I. INTRODUCTION Clou computing is the prominent cost-efficient infrastructure for elivering computationally emaning applications to en-users. Clous abunance of resources enables them to elastically cope with changes in applications eman in a scalable manner via on-eman computation. That is, Clous exploit economies of scale for ecreasing their running cost [7] while eploying usage-base pricing mechanisms for controlling the eman for their computing resources. However, an increasing number of applications (like augmente reality, automotive, health monitoring etc.) require low response times, renering the current clou-base infrastructure unfit for the purpose of application provisioning. We refer to these as Low Latency Applications (LLAs) since they strongly rely on the latency of the network for achieving a satisfying Quality-of- Service (QoS). Cloulets have been propose as ata centres in a box that can be eploye throughout the Internet, for bringing computing resources closer to the en users [12]. That is, cloulets have the potential of improving the network conitions by ecreasing the Roun-Trip-Time (RTT) between en-users an application instances when hoste at cloulets points-ofpresence. Clearly, cloulets can serve as an alternative com /18/$31. c 218 IEEE Fig. 1: On-path application provisioning setting puting infrastructure, that augments as well as complements the centralise provisioning at the clou, for enabling LLAs. Nevertheless, cloulets are incapable of proviing the essentially bounless elasticity of the clou, meaning that occasionally the eman for resources at a given cloulet can excee their availability. That is, resource allocation mechanisms have to prioritise the requests that benefit the most when serve by a cloulet. Especially in the case of stateful LLA provisioning, resource allocation is a challenging task since once a request is accepte an a user is engage to an application instance, the establishe application session cannot be isrupte for reallocating the involve resources. The reason is that session isruptions can cause a user to quit the LLA, which is consiere the worst possible outcome in terms of QoS. In this work we investigate the emerging market of provisioning heavily stateful LLAs over thir party cloulets. In our context, heavily stateful LLAs are efine as the ones that cannot be migrate to another cloulet location, ue to the size of their runtime ata generate by their users, without seriously amaging their QoS [4]. We consier that computation is available either at the ege or mile-tier locations of the network, in the form of cloulets, an/or at istant clous/ata centres (Fig. 1). We argue that application provisioning over cloulets is expecte to take place in a ecentralise an uncoorinate environment. Given that cloulet resources are limite, the key challenge is to create a market that operates on a per-request basis for offering the finest possible resource allocation granularity. We aim to provie answers to the funamental questions of: i) how shoul cloulet resources be allocate over time to ifferent applications/services? an
2 ii) how much shoul a cloulet charge an application? Here, we present a ecentralise pricing mechanism that answers both questions, while aressing the challenges of ynamic application provisioning over an infrastructure of thir-party cloulets. We introuce a pricing mechanism that associates each cloulet with a price for on-path, on-eman, uncoorinate LLA provisioning. In our context, cloulets offer their resources in the form of Virtual Machines (VMs) via collocate markets. As LLA requests are forware towars a efault execution location, i.e., at the Clou, they interact with onpath cloulet markets. If the price of a market is below the gain the LLA woul have if it is serve, an available VM is allocate to serve the request; otherwise, the request is rejecte an continues its journey towars the Clou. For example in Fig. 1, the requests of User 1 (User 2) attempt to provision resources on-path at Cloulet 1 (Cloulet 2) followe by Cloulet 3 before getting serve by the Clou as the last available provisioning infrastructure. Our esign aresses explicitly the heavily stateful requirement of seamless users engagement to LLA instances while setting the price of each cloulet base on its resource utilisation. To this en, the main technical contributions of this paper are as follows: 1) We stuy the emerging market of heavily stateful LLAs provisioning over inepenent cloulets from an economics point of view. 2) We evelop a pricing mechanism for on-path, on-eman LLA provisioning, taking into account the cloulets computing resource limitations an the en users requirement for seamless LLA engagement. 3) We evaluate the merits of our mechanism in an ISP topology uner trace-base application requests. II. DESIGN RATIONALE & SYSTEM MODEL A. Design Rationale We aim to esign a market mechanism tailore to the provisioning of LLAs over an uncoorinate cloulet infrastructure. Our esign has to aress explicitly the application provisioning challenges of i) cloulets resource iscovery, since cloulets points-of-presence are expecte to excee by far the number of clous, an ii) the cloulets limite elasticity of resources. Given that application requests are forware in the network towars a istant ata centre, we argue for both on-path an on-eman application provisioning. That is, by applying onpath provisioning, there is no nee for a centralise resource iscovery process since resources are iscovere in real-time opportunistically. Furthermore, ue to on-eman provisioning, cloulets o not waste resources since each allocate VM serves an application request. We argue that these esign choices enable the most promising an incrementally eployable conitions for the problem of application provisioning we tackle; proviing an uncoorinate solution. However, oneman provisioning has to be accompanie by a pricing scheme that controls the eman at each cloulet, an this nees to happen in a way that the requests that have the highest provisioning gain at a specific location are given priority. Clou resources are offere in terms of remote instances, i.e., virtual machines (VMs), with eicate CPU, memory, an storage resources, as an Infrastructure-as-a-Service (IaaS) [2]. For example as a clou resource provier, Amazon offers instances uner three pricing schemes: 1) Reserve instances guarantee the long-term availability of an instance, i.e., for more than a year, by charging fixe usage-base prices. 2) On-eman instances guarantee the short-term availability of an instance, i.e., for an hour, by also charging fixe usage-base prices. 3) Spot instances create an auction-base market for spare instances. In etail, users can use spot instances only if their bis excee a spot price while spot prices are upate every 5 minutes; meaning that the availability of instances is not guarantee. Offering cloulet resources as reserve an/or on-eman instances fails to capture eman fluctuations uner the boune instances elasticity. Furthermore, spot instances are suitable for interruptible jobs, since a task is execute as long as its bi excees the current spot price; otherwise, the task is suspene. Despite some efforts in strategically biing spot instances for uninterrupte tasks to the clou [16], we suggest that a cloulet pricing plan shoul inclue the applications seamless execution in its inherent characteristics, especially in the case of heavily stateful applications. In this work we argue that cloulets pricing schemes shoul follow a pay-as-you-go structure in terms of application user engagement uration. In other wors, the LLA proviers shoul be charge base on the time their users occupy a cloulet instance. B. System Moel We consier a set S {1, 2,..., S} of LLAs an a set D {1, 2,..., D} of cloulets. We assume that each LLA s S can serve its users eman at a istant clou/ata centre, enote by D s, whose capacity is sufficient for serving the total number of LLA requests it receives. Application users are connecte to the network via a set of P {1, 2,..., P } access points. We assume that the network conitions to a cloulet are access-point specific. That is, a user connecte to access point p while requesting an LLA s S experiences a QoS improvement u s,p, in terms of network conitions, for each secon that the en user remains engage to an LLA instance at cloulet D, as oppose to the efault execution clou D s. The notation followe in throughout the paper is presente in Table I. III. PAY-AS-YOU-GO MECHANISM In this section, we escribe the iniviual components of the propose pay-as-you-go mechanism, namely i) the oneman provisioning component, an ii) the utilisation-base price erivation component. Given a price assignment at each cloulet, the on-eman provisioning component efines the real-time interaction of LLA requests with the collocate
3 System Moel S Set of LLAs. D,D s Set of cloulets, efault ata centre of LLA s. P Set of requests access points. u s,p Per secon QoS gain of LLA s at cloulet for request from access point p, in terms of network conition. Charging Mechanism π Price of cloulet. b s,p Bi of request prouce at access point p for LLA s at cloulet. ρ min, ρ max Target minimum an maximum utilisation of resources at. π Price ecrease step. TABLE I: Notation Fig. 2: On-Deman Provisioning Charging Scheme Overview cloulets markets, as the requests are forware in the network. On the other han, the price erivation component is responsible for eriving a price for each cloulet given the resource utilisation achieve at each cloulet. A. On-Deman Provisioning An overview of the on-eman provisioning scheme is epicte in Fig. 2, where we consier an en user request of LLA s S that arrives at the market of cloulet D (step a). The interaction of the request with each market is characterise by the following properties: A1) The request is for a single VM. A2) The request is associate with a bi, b s,p, that expresses the user s willingness to pay for a VM for each engagement time-unit of the user to an LLA s instance at when her access point is p. A3) The request is not queue at the market, i.e., the request is either serve or rejecte immeiately. A4) The VM allocation time overhea has no impact on the LLA s QoS. In more etail, let the price for the use of a VM at cloulet be π. Upon the arrival of the request the market operates accoring to the following rules: R1 If there are no available VMs, the request is rejecte. R2 Else, if there are available VMs: If b s,p π, a VM is allocate to serve the request at price π for each time unit of user engagement. Else, if b s,p < π, the request is rejecte. Assuming b s,p π an the existence of available VMs, the allocation is taking place an the cloulet starts a timer for keeping track of the user s engagement uration (step b). After the session completion/application termination, the cloulet informs the market about the engagement uration (step c). Then the market verifies the uration an converts it to a bill that equals the engagement uration times the agree per time unit service price π (step ). Finally, the bill is sent to the corresponing LLA provier which eventually pays the cloulet provier for its service. 1 Next, we explain how the request bis as well as the cloulet prices are erive. B. Request Bis an Cloulet Prices erivation Let u s,p be the per-time-unit QoS gain of LLA s when a request is coming from access point p to get serve at cloulet, instea of its efault clou. Biing truthfulness is efine in the following straightforwar way: Definition 1. A bi b s,p for a request arriving at cloulet from access point p for LLA s is truthful iff b s,p := u s,p, where u s,p is the per-time-unit QoS gain of the requeste LLA at. In other wors, a bi is truthful when it equals the actual gain of the serve application. Then, given the cloulet s price, π, the net utility rate of the involve request is efine as: Definition 2. The net utility rate of class p LLA s from bi b s,p an QoS gain u s,p is: { u s,p π, if b s,p π, net utility rate =, otherwise. Proposition 1. Uner rules R1-R2, the request bis are truthful. Proof. We investigate the following possible cases: If u s,p π then the bier woul win the item with a truthful bi as well as an overbi, i.e., b s,p u s,p. If u s,p π > b s,p unerbiing returns a net utility rate equal to, as oppose to a truthful bi for which the net utility rate is non-negative. If π > u s,p then the bier woul loose the item with a truthful bi as well as an unerbi, i.e., u s,p b s,p. If b s,p > π > u s,p, then overbiing woul return a negative net utility rate, as oppose to a truthful bi for which the net utility rate is. From the previous cases, it is clear that truthful biing, i.e., b s,p = u s,p, is the ominant strategy of the involve request. Because the bis must be truthful for a rational user, the strategy of their eployment is straightforwar, i.e., assigning a price b s,p = u s,p to each request. Therefore, a request has to simply be associate to its involve QoS per time unit gain at a given cloulet. Lastly with respect to cloulet price erivation, we assume that each cloulet perioically (every w secons) observes the utilisation ρ ol of its resources that was achieve at the 1 The technical etails of the explaine process, relate to the security, verification, etc., are beyon the scope of this paper although orthogonal to its contribution.
4 previously set price π ol. Then, given a minimum target utilization ρ min the price is ajuste accoring to: π ol π, if ρ ol < ρ min, π = π ol + π, if ρ ol > ρ max, π ol, otherwise. where π > is the price ecreasing increment. Note that as a price ecreases (increases) the number of requests that can be serve at cloulet rises (rops) with the result of increase (ecrease) in the utilisation of s resources. IV. PERFORMANCE EVALUATION In this section, we emonstrate s performance via simulations in an ISP topology. We implement the an the baseline approaches, escribe next, by extening the Icarus caching simulator for application provisioning problems [11]. Application categories for LLAs: The QoS of the LLAs is expresse as a ecreasing function of the en users perceive latency to each cloulet [5], [15]. Similarly to [8] for abstract resource allocation gains, we consier that each LLA is characterise by a ecreasing QoS function of the latency x having the general form: ( umin ( u(x) = + 1 u )( min 1 x l ) 1 ) min α u max (1) u max u max l max The constants u max (u min ) represents the maximum (minimum) QoS that the application user can achieve at the minimum (maximum) latency l min (l max ), i.e., u(l min ) = u max an u(l max ) = u min. We set u max = 1 an l min = 5 ms 2 when is not specifie ifferently. Moreover, the function u( ) is convex for < α 1; that is, we set α =.2 since LLAs QoS is expecte to be more sensitive to latency changes closer to l min. Base on Eq. 1, we create ten LLA categories, each associate to a QoS function that moels a certain sensitivity of the LLA to latency. For each LLA category we assign a ifferent u min value from the set of {, 1, 2,..., 9}. In this way, istinct application categories have iverse QoS gains from being provisione at a cloulet, varying, for example, from 1, for u min = 9 an less-latency sensitive LLAs, to 1, for u min = an latency-critical LLAs, when provisione at the ege, i.e., x = l min. We consier ten LLA categories to be sufficient for the purpose of our evaluation since this number is comparable to the currently consiere types in the context of IoT [3], [1] an Tactile Internet [6]. Lastly, we assume that users remain engage to their LLA instance on average for 1 minute while we execute the following experiments for the uration of three hours in our simulator. LLA Realistic Requests Generation: Each user selects one of the 1 LLA categories base on the sequence of request arrivals in Google s cluster ataset 3. In etail, we associate 2 With recent avances in LTE technology, mobile operators reporte hanset-to-base-station latencies aroun 2 msec (RTT of 5 ms), see: 3 Available at each LLA category to a ParentID fiel, that ientifies the service, of the 1 most popular services in the ataset accounting for more than 2K requests. Then by selecting ranom time intervals in the perio of the seven hours that the ataset covers, users request LLA categories base on the sequence of ParentID fiels that arrive into Google s cluster. ISP Topology & Cloulets Deployment: We evaluate uner the Tiscali topology of the Rocketfuel ataset [13] that contains 24 noes an 44 links. Among the 24 noes, we esignate as hosts the 8 noes that present a egree of one, i.e., they are connecte to only a single noe of the topology. After that, we place the Clou at the noe with the highest closeness centrality with respect to all hosts, i.e., shortest average istance to all hosts. Then we set each host to generate one request per secon forware to the Clou via the shortest path in terms of latency. We place a cloulet to each noe of the topology that belong to at least a single shortest path from a host to the Clou. That is, we have 79 cloulets all over the topology for reucing the Clou RTT latency that on average is 155 ms to each host. The efault number of available VMs per cloulet is 2, while we set the minimum an maximum target utilisation of each cloulet to be equal to ρ min =.85 an ρ max =.95 respectively. Comparison approaches: We compare against the following approaches: : Cloulets assign their VMs to application instances accoring to their eman that is consiere known in avance, e.g., an equal number of VMs is assigne to each LLA in the case of an uniform requests istribution. Least Frequently Use () provisioning: Cloulets perioically assign their VMs to LLA instances, prioritising the ones with the highest observe eman, i.e., popularity. In this case, VMs are allocate first to the most popular application, an the process continues with secon most popular application, an so on, until all the VMs at a cloulet are allocate. The number of VMs assigne to each application is etermine accoring to the number of both the requests serve an rejecte. Provisioning: Cloulets perioically assign their VMs to LLA instances by prioritising the ones with the highest QoS gain. In particular, this strategy iterates through the applications sorte in ecreasing orer of QoS gain, an assigns a number of unallocate VMs to the current application. This results with VMs being assigne to applications that are willing to pay the most. The number of VMs assigne to each application again epens on its observe eman. The Static approach is a form of proactive provisioning, because it relies on prior knowlege of the requests eman for each application, while an Self-tuning approaches perform reactive provisioning, as each cloulet perioically reassigns their VM instances to iniviual LLAs base on the request patterns receive uring the most recent observation perio. We set the efault length of the observation perio to 5 minutes, i.e., 3 secons. Note that we consier a single LLA per LLA category in orer to give an avantage to
5 Average QoS Gain Number of VMs (a) QoS Percent Ile Time Number of VMs (b) Ile Time Percentage Revenue (X $) 1.6x x x1 8 1x1 8 8x1 7 6x1 7 4x1 7 2x Number of VMs (c) Revenue Fig. 3: The impact of the number of VMs on the performance of the provisioning mechanisms. the above-mentione approaches against s oneman provisioning, otherwise their performance coul be arbitrarily eteriorate. For example by increasing the number of LLAs per category from 1 to 1, the utilisation of each cloulet woul ecrease to the 1% of the currently achieve utilisation for the Static, Self-tuning, an provisioning with a negative impact on the achieve QoS gain as well as cloulets revenue. Lastly, in orer to perform a straightforwar an fair comparison against, we assume a charging mechanism, ientical to, where each cloulet is associate to a price that equals the lowest QoS gain over all the accepte LLA request classes at a given location. In that way, we avoi creating application-specific prices that challenge the requests biing truthfulness since they woul pay ifferent prices for ientical VMs. A. Impact of the Number of VMs In Fig. 3, we epict the performance of the LLA provisioning approaches for an increasing number of VMs per cloulet for the metrics of: i) users average QoS gain (u(x)), ii) percentage of ile time experience by the VMs of the cloulets, an iii) the total revenue obtaine by all cloulets. User requests serve by the back-en Clou experience the maximum latency (i.e., l max ), an thus obtain zero gain. The revenue obtaine by a cloulet is compute as the prouct of the engagement time of the serve users at each VM an the per-secon usage price of the VM etermine by a cloulet. For the mechanism, the per-secon usage price of the VMs at a cloulet is erive perioically base on the ifference between the observe an the target utilisation, as escribe in Section III-A. For the rest of the strategies, we assume a secon-price auction mechanism, where the winning biers pay for the next highest bi, an the bis are set to the QoS gain of the users as in a true value biing. As shown in Fig. 3a, the mechanism can achieve a higher average QoS gain than the other strategies. Specifically, the mechanism is outperforme since it ignores the utilisation of resources when provisioning the LLAs. As a result, a larger portion of the requests are serve by the Clou without obtaining any QoS gain. On the other han, an Static approaches provision LLAs purely base on utilisation, without consiering the QoS gain of the users, resulting in lower average QoS gain. Our QoS finings are in accorance with the average ile time percentage of the resources, as it is emonstrate in Fig. 3b. As expecte, Static provisioning presents a higher utilisation of resources, i.e., lower ile time, compare to an Self-tuning by exploiting the knowlege of LLAs upcoming eman. However, since Static,, an Selftuning approaches operate by assigning VMs to LLA instances perioically, they are outperforme by the mechanism that provisions requests as soon as they arrive, in an on-eman manner. As a result of achieving higher QoS gain an utilisation of resources, the mechanism obtains the highest revenue, as epicte in Fig. 3c. As the number of VMs increases, the ile time of the strategies raises by aroun 15%. At the same time the average QoS gain of the users presents an upwar tren, which leas to higher bis for resources followe by greater revenues. We observe that the approach obtains higher revenue than the an nearly the same revenue as Static provisioning. B. Impact of Observation Perio Length In the experiments presente earlier, we use a efault observation perio length of 3 secons (5 minutes). In Fig. 4, we emonstrate the impact of this parameter on QoS gain (left plot) an ile time percentage (right plot) of the provisioning mechanisms. First of all, we observe that the performances of both an Self-tuning approaches are increasing function of the observation perio uration before being stabilise at 2 secons. This is relate to the fact that an Self-tuning rely on the estimation of LLAs eman, that is inaccurate for short observation urations in the trace of requests we are using since it fails to capture the eman fluctuations. In terms of QoS gain, the Self-tuning mechanism achieves a remarkable increase of 33% in the uration interval to 2 secons. At the same time, the mechanism achieves nearly 5% increase in resource utilisation since the ile time percentage rops from 4%, for a uration of secons, to 2%, for 2 secons. The mechanism is affecte the least by the observation perio factor while constantly achieving the highest QoS gain an lowest ile time percentage compare to the rest of approaches. Our evaluation emonstrates that the mechanism can provision resources with high utilisation while pro-
6 Average QoS Gain Observation Perio Length (sec) Percent Ile Time Observation Perio Length (sec) Fig. 4: Impact of observation perio length on QoS gain of users (left) an average ile times of VMs (right). viing high QoS gains for the en-users. The price erivation mechanism of our on-eman provisioning mechanism leas to higher revenues than the provisioning mechanisms that perioically allocate the VMs to LLAs base on the observe eman. V. RELATED WORK Cloulets have been propose in [12] with the initial purpose of acting as a surrogate infrastructure where mobile evices can offloa intensive tasks as a response to their computing an battery limitations. Specifically, [1] aresses the problem of application-specific task offloaing over the fog infrastructure, i.e., a task requires the corresponing virtual instance of the application at a cloulet before getting offloae. However, the authors only consier stateless applications, while ignoring completely the economic aspects of such a problem. In [9], the authors propose a self-tuning application provisioning mechanism using a combinatorial auction mechanism, where application proviers bi perioically for a specific number of VMs organise in ifferent execution zones. Nevertheless, the presente mechanism relies on precise preictions about the future eman of an application an takes place in a centralise way that challenges the scalability of such a scheme. Closer to our setting, [14] iscusses LLA provisioning over thir-party cloulets in an economic context for lightly stateful applications, which can be migrate between cloulets without severely egraing the involve QoS for mobile users (as a result of the han-offs between ifferent cells). Similar to spot pricing mechanisms (e.g., [16], our approach can react to transient changes in eman, but without either suspening applications or collecting (i.e., queuing) user bis to execute an auction. VI. CONCLUSIONS An increasing number of network applications with low latency requirements rener clou provisioning unfit for purpose. In this paper, we investigate the emerging market where heavily stateful low latency applications lease thirparty cloulet resources for provisioning their instances. This is a promising research irection for bringing application instances closer to their users in orer to improve the involve perceive latency. Along these lines, we introuce a charging scheme as an on-path, on-eman market base provisioning mechanism. In the propose scheme, cloulets are associate with a single price that is ajuste base on their target resource utilisation. Then LLAs requests forware in the network interact on-path with collocate markets to the cloulets, provisioning on-eman an application instance to the first cloulet with a price lower than their QoS gain. Our mechanism aress explicitly the challenges of heavily stateful applications whose instances cannot be suspene an/or migrate to other cloulet locations, without impairing irreversibly the perceive QoS. The avantages of such an approach were emonstrate against a variety of proactive an reactive provisioning techniques in realistic topologies. ACKNOWLEDGMENT This work has been supporte by the EC H22 ICN22 project (GA no ), the EPSRC INSP fellowship (EP/M3787/1), an UK EPSRC KCN project (EP/L2612/1). REFERENCES [1] O. Ascigil, T. K. Phan, A. G. Tasiopoulos, V. Sourlas, I. Psaras, an G. Pavlou. On uncoorinate service placement in Ege-Clous. In Clou Computing Technology an Science (ClouCom), 217 IEEE International Conference on, pages IEEE, 217. [2] S. Bharwaj, L. Jain, an S. Jain. Clou computing: A stuy of Infrastructure as a Service (IaaS). International Journal of engineering an information Technology, 2(1):6 63, 21. [3] F. Bonomi, R. Milito, J. Zhu, an S. Aepalli. Fog computing an its role in the Internet of Things. In Proceeings of the first eition of the MCC workshop on Mobile clou computing, pages ACM, 212. [4] C. Clark, K. Fraser, S. Han, J. G. Hansen, E. Jul, C. Limpach, I. Pratt, an A. Warfiel. Live migration of virtual machines. In Proceeings of the 2n Conference on Symposium on Networke Systems Design & Implementation-Volume 2, pages USENIX Association, 25. [5] M. Claypool an K. Claypool. Latency an player actions in online games. Communications of the ACM, 49(11):4 45, 26. [6] G. P. Fettweis. The tactile internet: Applications an challenges. IEEE Vehicular Technology Magazine, 9(1):64 7, 214. [7] A. Greenberg, J. Hamilton, D. A. Maltz, an P. Patel. The cost of a clou: research problems in ata center networks. ACM SIGCOMM computer communication review, 39(1):68 73, 28. [8] H. Izakian, A. Abraham, an B. T. Laani. An auction metho for resource allocation in computational gris. Future Generation Computer Systems, 26(2): , 21. [9] R. Lana, M. Charalambies, R. G. Clegg, D. Griffin, an M. Rio. Self-tuning service provisioning for ecentralize Clou applications. IEEE Transactions on Network an Service Management, 13(2): , 216. [1] I. Lee an K. Lee. The internet of things (iot): Applications, investments, an challenges for enterprises. Business Horizons, 58(4):431 44, 215. [11] L. Saino, I. Psaras, an G. Pavlou. Icarus: a caching simulator for information centric networking (icn). In Proceeings of the 7th International ICST conference on Simulation Tools an Techniques, pages ICST (Institute for Computer Sciences, Social-Informatics an Telecommunications Engineering), 214. [12] M. Satyanarayanan, P. Bahl, R. Caceres, an N. Davies. The case for VM-base Cloulets in mobile computing. IEEE pervasive Computing, 8(4), 29. [13] N. Spring, R. Mahajan, an D. Wetherall. Measuring ISP topologies with Rocketfuel. ACM SIGCOMM Computer Communication Review, 32(4): , 22. [14] A. G. Tasiopoulos, O. Ascigil, I. Psaras, an G. Pavlou. Ege-MAP: Auction markets for ege resource provisioning. In IEEE 19th Worl of Wireless Mobile an Multimeia Networks (WoWMoM), 218. [15] B. Zhang, N. Mor, J. Kolb, D. S. Chan, K. Lutz, E. Allman, J. Wawrzynek, E. A. Lee, an J. Kubiatowicz. The Clou is not enough: Saving IoT from the clou. In HotStorage, 215. [16] L. Zheng, C. Joe-Wong, C. W. Tan, M. Chiang, an X. Wang. How to bi the clou. In ACM SIGCOMM Computer Communication Review, volume 45, pages ACM, 215.
MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks
: a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications
More informationQueueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks
Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication
More informationAnyTraffic Labeled Routing
AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,
More informationSURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH
SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway
More informationCoupling the User Interfaces of a Multiuser Program
Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces
More informationOffloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization
1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24
More informationSocially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach
Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly
More informationStudy of Network Optimization Method Based on ACL
Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department
More informationIEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,
More informationOn Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation
On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member
More informationAn Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources
An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract
More informationAlmost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control
Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract
More informationQuestions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!
EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an
More informationThreshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides
Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita
More informationOn the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems
On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,
More informationSkyline Community Search in Multi-valued Networks
Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h
More informationTransient analysis of wave propagation in 3D soil by using the scaled boundary finite element method
Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite
More informationYet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien
Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science
More informationAn Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique
International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech
More informationLearning Subproblem Complexities in Distributed Branch and Bound
Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University
More informationComparison of Methods for Increasing the Performance of a DUA Computation
Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,
More informationNon-homogeneous Generalization in Privacy Preserving Data Publishing
Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h
More informationDistributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs
IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,
More informationOn the Placement of Internet Taps in Wireless Neighborhood Networks
1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that
More informationRobust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks
Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,
More informationCloud Search Service Product Introduction. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.
1.3.15 Issue 01 Date 2018-11-21 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Lt. 2019. All rights reserve. No part of this ocument may be reprouce or transmitte in any form or by any
More informationA Plane Tracker for AEC-automation Applications
A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)
More informationTop-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications
Top-own Connectivity Policy Framework for Mobile Peer-to-Peer Applications Otso Kassinen Mika Ylianttila Junzhao Sun Jussi Ala-Kurikka MeiaTeam Department of Electrical an Information Engineering University
More informationImproving Spatial Reuse of IEEE Based Ad Hoc Networks
mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos
More informationLecture 1 September 4, 2013
CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the
More information6 Gradient Descent. 6.1 Functions
6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output
More informationCharacterizing Decoding Robustness under Parametric Channel Uncertainty
Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric
More informationProvisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks
Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:
More informationIndexing the Edges A simple and yet efficient approach to high-dimensional indexing
Inexing the Eges A simple an yet efficient approach to high-imensional inexing Beng Chin Ooi Kian-Lee Tan Cui Yu Stephane Bressan Department of Computer Science National University of Singapore 3 Science
More informationOnline Appendix to: Generalizing Database Forensics
Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that
More informationAll-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA
Preprint, August 5, 2018. 1 All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA Mikhail Ivanov, Frerik Brännström, Alexanre Graell i Amat, an Petar Popovski Department of Signals an Systems,
More informationTHE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE
БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:
More informationQuestions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!
EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an
More informationRandom Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation
DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,
More informationAdaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots
Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:
More informationThroughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem
Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple
More informationNon-Uniform Sensor Deployment in Mobile Wireless Sensor Networks
01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University
More informationParticle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base
More informationLab work #8. Congestion control
TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño
More informationArchitecture Design of Mobile Access Coordinated Wireless Sensor Networks
Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,
More informationIntensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2
This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar
More informationCoordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks
Coorinating Distribute Algorithms for Feature Extraction Offloaing in Multi-Camera Visual Sensor Networks Emil Eriksson, György Dán, Viktoria Foor School of Electrical Engineering, KTH Royal Institute
More informationThe Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract
The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie
More informationA Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition
ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural
More informationTwo Dimensional-IP Routing
Two Dimensional-IP Routing Mingwei Xu Shu Yang Dan Wang Hong Kong Polytechnic University Jianping Wu Abstract Traitional IP networks use single-path routing, an make forwaring ecisions base on estination
More informationParallel Directionally Split Solver Based on Reformulation of Pipelined Thomas Algorithm
NASA/CR-1998-208733 ICASE Report No. 98-45 Parallel Directionally Split Solver Base on Reformulation of Pipeline Thomas Algorithm A. Povitsky ICASE, Hampton, Virginia Institute for Computer Applications
More informationMessage Transport With The User Datagram Protocol
Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer
More informationChalmers Publication Library
Chalmers Publication Library All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA This ocument has been ownloae from Chalmers Publication Library (CPL). It is the author s version of a work
More informationA multiple wavelength unwrapping algorithm for digital fringe profilometry based on spatial shift estimation
University of Wollongong Research Online Faculty of Engineering an Information Sciences - Papers: Part A Faculty of Engineering an Information Sciences 214 A multiple wavelength unwrapping algorithm for
More informationEDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks
sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun
More informationSoftware Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency
Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science
More informationOverlap Interval Partition Join
Overlap Interval Partition Join Anton Dignös Department of Computer Science University of Zürich, Switzerlan aignoes@ifi.uzh.ch Michael H. Böhlen Department of Computer Science University of Zürich, Switzerlan
More informationSupporting Fully Adaptive Routing in InfiniBand Networks
XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar
More informationHOW DO SECURITY TECHNOLOGIES INTERACT WITH EACH OTHER TO CREATE VALUE? THE ANALYSIS OF FIREWALL AND INTRUSION DETECTION SYSTEM
HOW O SECURTY TECHNOLOGES NTERACT WTH EACH OTHER TO CREATE VALUE? THE ANALYSS O REWALL AN NTRUSON ETECTON SYSTEM Huseyin CAVUSOGLU Srinivasan RAGHUNATHAN Hasan CAVUSOGLU Tulane University University of
More informationOptimal Distributed P2P Streaming under Node Degree Bounds
Optimal Distribute P2P Streaming uner Noe Degree Bouns Shaoquan Zhang, Ziyu Shao, Minghua Chen, an Libin Jiang Department of Information Engineering, The Chinese University of Hong Kong Department of EECS,
More informationImpact of FTP Application file size and TCP Variants on MANET Protocols Performance
International Journal of Moern Communication Technologies & Research (IJMCTR) Impact of FTP Application file size an TCP Variants on MANET Protocols Performance Abelmuti Ahme Abbasher Ali, Dr.Amin Babkir
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html
More informationLoop Scheduling and Partitions for Hiding Memory Latencies
Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:
More informationLearning Polynomial Functions. by Feature Construction
I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate
More informationA shortest path algorithm in multimodal networks: a case study with time varying costs
A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via
More informationExploring Context with Deep Structured models for Semantic Segmentation
1 Exploring Context with Deep Structure moels for Semantic Segmentation Guosheng Lin, Chunhua Shen, Anton van en Hengel, Ian Rei between an image patch an a large backgroun image region. Explicitly moeling
More informationCS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics
CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,
More informationResearch Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks
Hinawi Publishing Corporation International Journal of Distribute Sensor Networks Volume 2014, Article ID 936379, 17 pages http://x.oi.org/10.1155/2014/936379 Research Article REALFLOW: Reliable Real-Time
More informationTCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model
TCP Symbiosis: Congestion Control Mechanisms of TCP base on Lotka-Volterra Competition Moel Go Hasegawa Cybermeia Center Osaka University 1-3, Machikaneyama-cho, Toyonaka, Osaka 56-43, JAPAN Email: hasegawa@cmc.osaka-u.ac.jp
More informationChapter 5 Proposed models for reconstituting/ adapting three stereoscopes
Chapter 5 Propose moels for reconstituting/ aapting three stereoscopes - 89 - 5. Propose moels for reconstituting/aapting three stereoscopes This chapter offers three contributions in the Stereoscopy area,
More informationScalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter
FDL sel. VOA SOA 100 Regular papers ONDM 2018 Scalable Deterministic Scheuling for WDM Slot Switching Xhaul with Zero-Jitter Bogan Uscumlic 1, Dominique Chiaroni 1, Brice Leclerc 1, Thierry Zami 2, Annie
More informationPreamble. Singly linked lists. Collaboration policy and academic integrity. Getting help
CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure
More informationHere are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.
Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus
More informationFigure 1: Schematic of an SEM [source: ]
EECI Course: -9 May 1 by R. Sanfelice Hybri Control Systems Eelco van Horssen E.P.v.Horssen@tue.nl Project: Scanning Electron Microscopy Introuction In Scanning Electron Microscopy (SEM) a (bunle) beam
More informationProbabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients
Probabilistic Meium Access Control for 1 Full-Duplex Networks with Half-Duplex Clients arxiv:1608.08729v1 [cs.ni] 31 Aug 2016 Shih-Ying Chen, Ting-Feng Huang, Kate Ching-Ju Lin, Member, IEEE, Y.-W. Peter
More informationPAPER. 1. Introduction
IEICE TRANS. COMMUN., VOL. E9x-B, No.8 AUGUST 2010 PAPER Integrating Overlay Protocols for Proviing Autonomic Services in Mobile A-hoc Networks Panagiotis Gouvas, IEICE Stuent member, Anastasios Zafeiropoulos,,
More informationd 3 d 4 d d d d d d d d d d d 1 d d d d d d
Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching
More informationPolitehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques
Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose
More informationState Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway
State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle
More informationOn the Energy Efficiency of Content Delivery Architectures
On the Energy Efficiency of Delivery Architectures Kyle Guan, Gary Atkinson, an Daniel C. Kilper Bell Las, Acatel-Lucent, 79 Holmel Roa, Holmel, NJ 07733 Ece Gulsen MIT, 77 Mass. Ave., Camrige, MA 039
More informationVerifying performance-based design objectives using assemblybased vulnerability
Verying performance-base esign objectives using assemblybase vulnerability K.A. Porter Calornia Institute of Technology, Pasaena, Calornia, USA A.S. Kiremijian Stanfor University, Stanfor, Calornia, USA
More informationfiltering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember
107 IEICE TRANS INF & SYST, VOLE88 D, NO5 MAY 005 LETTER An Improve Neighbor Selection Algorithm in Collaborative Filtering Taek-Hun KIM a), Stuent Member an Sung-Bong YANG b), Nonmember SUMMARY Nowaays,
More informationMining Sensor Streams for Discovering Human Activity Patterns Over Time
Mining Sensor Streams for Discovering Human Activity Patterns Over Time Parisa Rashii CS Department ashington State University Pullman, US mail: prashii@wsu.eu Diane J. Cook CS Department ashington State
More informationNET Institute*
NET Institute* www.netinst.org Working Paper #08-24 October 2008 Computer Virus Propagation in a Network Organization: The Interplay between Social an Technological Networks Hsing Kenny Cheng an Hong Guo
More informationAdjusted Probabilistic Packet Marking for IP Traceback
Ajuste Probabilistic Packet Marking for IP Traceback Tao Peng, Christopher Leckie, an Kotagiri Ramamohanarao 2 ARC Special Research Center for Ultra-Broaban Information Networks Department of Electrical
More informationNAND flash memory is widely used as a storage
1 : Buffer-Aware Garbage Collection for Flash-Base Storage Systems Sungjin Lee, Dongkun Shin Member, IEEE, an Jihong Kim Member, IEEE Abstract NAND flash-base storage evice is becoming a viable storage
More informationEXACT SIMULATION OF A BOOLEAN MODEL
Original Research Paper oi:10.5566/ias.v32.p101-105 EXACT SIMULATION OF A BOOLEAN MODEL CHRISTIAN LANTUÉJOULB MinesParisTech 35 rue Saint-Honoré 77305 Fontainebleau France e-mail: christian.lantuejoul@mines-paristech.fr
More informationA Measurement Framework for Pin-Pointing Routing Changes
A Measurement Framework for Pin-Pointing Routing Changes Renata Teixeira Univ. Calif. San Diego La Jolla, CA teixeira@cs.ucs.eu Jennifer Rexfor AT&T Labs Research Florham Park, NJ jrex@research.att.com
More informationAlgorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times
Algorithm for Intermoal Optimal Multiestination Tour with Dynamic Travel Times Neema Nassir, Alireza Khani, Mark Hickman, an Hyunsoo Noh This paper presents an efficient algorithm that fins the intermoal
More informationFast Fractal Image Compression using PSO Based Optimization Techniques
Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting
More informationTable-based division by small integer constants
Table-base ivision by small integer constants Florent e Dinechin, Laurent-Stéphane Diier LIP, Université e Lyon (ENS-Lyon/CNRS/INRIA/UCBL) 46, allée Italie, 69364 Lyon Ceex 07 Florent.e.Dinechin@ens-lyon.fr
More informationEstimating Velocity Fields on a Freeway from Low Resolution Video
Estimating Velocity Fiels on a Freeway from Low Resolution Vieo Young Cho Department of Statistics University of California, Berkeley Berkeley, CA 94720-3860 Email: young@stat.berkeley.eu John Rice Department
More informationComparison of Wireless Network Simulators with Multihop Wireless Network Testbed in Corridor Environment
Comparison of Wireless Network Simulators with Multihop Wireless Network Testbe in Corrior Environment Rabiullah Khattak, Anna Chaltseva, Laurynas Riliskis, Ulf Boin, an Evgeny Osipov Department of Computer
More informationPairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11:
airwise alignment using shortest path algorithms, Gunnar Klau, November 9,, : 3 3 airwise alignment using shortest path algorithms e will iscuss: it graph Dijkstra s algorithm algorithm (GDU) 3. References
More informationFrequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises
verview Frequent Pattern Mining comprises Frequent Pattern Mining hristian Borgelt School of omputer Science University of Konstanz Universitätsstraße, Konstanz, Germany christian.borgelt@uni-konstanz.e
More informationDivide-and-Conquer Algorithms
Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:
More informationNEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2.
JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 13/009, ISSN 164-6037 Krzysztof WRÓBEL, Rafał DOROZ * fingerprint, reference point, IPAN99 NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES
More informationAnalytical approximation of transient joint queue-length distributions of a finite capacity queueing network
Analytical approximation of transient joint queue-length istributions of a finite capacity queueing network Gunnar Flötterö Carolina Osorio March 29, 2013 Problem statements This work contributes to the
More informationCS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing
CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which
More information