On-path Cloudlet Pricing for Low Latency Application Provisioning

Size: px
Start display at page:

Download "On-path Cloudlet Pricing for Low Latency Application Provisioning"

Transcription

1 On-path Cloulet Pricing for Low Latency Application Provisioning Argyrios G. Tasiopoulos, Onur Ascigil, Ioannis Psaras, Stavros Toumpis, George Pavlou Dept. of Electronic an Electrical Engineering, University College Lonon Dept. of Informatics, Athens University of Economics an Business {argyrios.tasiopoulos, o.ascigil, i.psaras, Abstract Clou computing has been tremenously successful in proviing a commercial infrastructure for hosting computationally intensive applications. Nevertheless, an increasing number of Low Latency Applications (LLAs) notably in the entertainment, IoT, an automative omains require response times much smaller than the supporte ones by the typical client-to-clou network moel. Cloulets have been introuce as ata centres in a box, for bringing computing resources closer to the en users. As a result, LLAs can take avantage of cloulets to improve their Quality-of-Service (QoS) by reucing the unerlying response times between their users an application instances location. In this work, we stuy the emerging market of stateful LLAs provisioning over geo-istribute thir-party cloulets. We assume that cloulets offer their resources in the form of Virtual Machines (VMs) via collocate markets. Forwaring requests for LLAs interact with cloulet markets for performing on-path an on-eman resource provisioning. We introuce a pricing scheme where users pay a fixe price for each time unit of their engagement to an LLA instance. Our evaluation on realistic topologies an application requests emonstrate the merits of on-eman provisioning when accompanie by a payas-you-go pricing scheme. I. INTRODUCTION Clou computing is the prominent cost-efficient infrastructure for elivering computationally emaning applications to en-users. Clous abunance of resources enables them to elastically cope with changes in applications eman in a scalable manner via on-eman computation. That is, Clous exploit economies of scale for ecreasing their running cost [7] while eploying usage-base pricing mechanisms for controlling the eman for their computing resources. However, an increasing number of applications (like augmente reality, automotive, health monitoring etc.) require low response times, renering the current clou-base infrastructure unfit for the purpose of application provisioning. We refer to these as Low Latency Applications (LLAs) since they strongly rely on the latency of the network for achieving a satisfying Quality-of- Service (QoS). Cloulets have been propose as ata centres in a box that can be eploye throughout the Internet, for bringing computing resources closer to the en users [12]. That is, cloulets have the potential of improving the network conitions by ecreasing the Roun-Trip-Time (RTT) between en-users an application instances when hoste at cloulets points-ofpresence. Clearly, cloulets can serve as an alternative com /18/$31. c 218 IEEE Fig. 1: On-path application provisioning setting puting infrastructure, that augments as well as complements the centralise provisioning at the clou, for enabling LLAs. Nevertheless, cloulets are incapable of proviing the essentially bounless elasticity of the clou, meaning that occasionally the eman for resources at a given cloulet can excee their availability. That is, resource allocation mechanisms have to prioritise the requests that benefit the most when serve by a cloulet. Especially in the case of stateful LLA provisioning, resource allocation is a challenging task since once a request is accepte an a user is engage to an application instance, the establishe application session cannot be isrupte for reallocating the involve resources. The reason is that session isruptions can cause a user to quit the LLA, which is consiere the worst possible outcome in terms of QoS. In this work we investigate the emerging market of provisioning heavily stateful LLAs over thir party cloulets. In our context, heavily stateful LLAs are efine as the ones that cannot be migrate to another cloulet location, ue to the size of their runtime ata generate by their users, without seriously amaging their QoS [4]. We consier that computation is available either at the ege or mile-tier locations of the network, in the form of cloulets, an/or at istant clous/ata centres (Fig. 1). We argue that application provisioning over cloulets is expecte to take place in a ecentralise an uncoorinate environment. Given that cloulet resources are limite, the key challenge is to create a market that operates on a per-request basis for offering the finest possible resource allocation granularity. We aim to provie answers to the funamental questions of: i) how shoul cloulet resources be allocate over time to ifferent applications/services? an

2 ii) how much shoul a cloulet charge an application? Here, we present a ecentralise pricing mechanism that answers both questions, while aressing the challenges of ynamic application provisioning over an infrastructure of thir-party cloulets. We introuce a pricing mechanism that associates each cloulet with a price for on-path, on-eman, uncoorinate LLA provisioning. In our context, cloulets offer their resources in the form of Virtual Machines (VMs) via collocate markets. As LLA requests are forware towars a efault execution location, i.e., at the Clou, they interact with onpath cloulet markets. If the price of a market is below the gain the LLA woul have if it is serve, an available VM is allocate to serve the request; otherwise, the request is rejecte an continues its journey towars the Clou. For example in Fig. 1, the requests of User 1 (User 2) attempt to provision resources on-path at Cloulet 1 (Cloulet 2) followe by Cloulet 3 before getting serve by the Clou as the last available provisioning infrastructure. Our esign aresses explicitly the heavily stateful requirement of seamless users engagement to LLA instances while setting the price of each cloulet base on its resource utilisation. To this en, the main technical contributions of this paper are as follows: 1) We stuy the emerging market of heavily stateful LLAs provisioning over inepenent cloulets from an economics point of view. 2) We evelop a pricing mechanism for on-path, on-eman LLA provisioning, taking into account the cloulets computing resource limitations an the en users requirement for seamless LLA engagement. 3) We evaluate the merits of our mechanism in an ISP topology uner trace-base application requests. II. DESIGN RATIONALE & SYSTEM MODEL A. Design Rationale We aim to esign a market mechanism tailore to the provisioning of LLAs over an uncoorinate cloulet infrastructure. Our esign has to aress explicitly the application provisioning challenges of i) cloulets resource iscovery, since cloulets points-of-presence are expecte to excee by far the number of clous, an ii) the cloulets limite elasticity of resources. Given that application requests are forware in the network towars a istant ata centre, we argue for both on-path an on-eman application provisioning. That is, by applying onpath provisioning, there is no nee for a centralise resource iscovery process since resources are iscovere in real-time opportunistically. Furthermore, ue to on-eman provisioning, cloulets o not waste resources since each allocate VM serves an application request. We argue that these esign choices enable the most promising an incrementally eployable conitions for the problem of application provisioning we tackle; proviing an uncoorinate solution. However, oneman provisioning has to be accompanie by a pricing scheme that controls the eman at each cloulet, an this nees to happen in a way that the requests that have the highest provisioning gain at a specific location are given priority. Clou resources are offere in terms of remote instances, i.e., virtual machines (VMs), with eicate CPU, memory, an storage resources, as an Infrastructure-as-a-Service (IaaS) [2]. For example as a clou resource provier, Amazon offers instances uner three pricing schemes: 1) Reserve instances guarantee the long-term availability of an instance, i.e., for more than a year, by charging fixe usage-base prices. 2) On-eman instances guarantee the short-term availability of an instance, i.e., for an hour, by also charging fixe usage-base prices. 3) Spot instances create an auction-base market for spare instances. In etail, users can use spot instances only if their bis excee a spot price while spot prices are upate every 5 minutes; meaning that the availability of instances is not guarantee. Offering cloulet resources as reserve an/or on-eman instances fails to capture eman fluctuations uner the boune instances elasticity. Furthermore, spot instances are suitable for interruptible jobs, since a task is execute as long as its bi excees the current spot price; otherwise, the task is suspene. Despite some efforts in strategically biing spot instances for uninterrupte tasks to the clou [16], we suggest that a cloulet pricing plan shoul inclue the applications seamless execution in its inherent characteristics, especially in the case of heavily stateful applications. In this work we argue that cloulets pricing schemes shoul follow a pay-as-you-go structure in terms of application user engagement uration. In other wors, the LLA proviers shoul be charge base on the time their users occupy a cloulet instance. B. System Moel We consier a set S {1, 2,..., S} of LLAs an a set D {1, 2,..., D} of cloulets. We assume that each LLA s S can serve its users eman at a istant clou/ata centre, enote by D s, whose capacity is sufficient for serving the total number of LLA requests it receives. Application users are connecte to the network via a set of P {1, 2,..., P } access points. We assume that the network conitions to a cloulet are access-point specific. That is, a user connecte to access point p while requesting an LLA s S experiences a QoS improvement u s,p, in terms of network conitions, for each secon that the en user remains engage to an LLA instance at cloulet D, as oppose to the efault execution clou D s. The notation followe in throughout the paper is presente in Table I. III. PAY-AS-YOU-GO MECHANISM In this section, we escribe the iniviual components of the propose pay-as-you-go mechanism, namely i) the oneman provisioning component, an ii) the utilisation-base price erivation component. Given a price assignment at each cloulet, the on-eman provisioning component efines the real-time interaction of LLA requests with the collocate

3 System Moel S Set of LLAs. D,D s Set of cloulets, efault ata centre of LLA s. P Set of requests access points. u s,p Per secon QoS gain of LLA s at cloulet for request from access point p, in terms of network conition. Charging Mechanism π Price of cloulet. b s,p Bi of request prouce at access point p for LLA s at cloulet. ρ min, ρ max Target minimum an maximum utilisation of resources at. π Price ecrease step. TABLE I: Notation Fig. 2: On-Deman Provisioning Charging Scheme Overview cloulets markets, as the requests are forware in the network. On the other han, the price erivation component is responsible for eriving a price for each cloulet given the resource utilisation achieve at each cloulet. A. On-Deman Provisioning An overview of the on-eman provisioning scheme is epicte in Fig. 2, where we consier an en user request of LLA s S that arrives at the market of cloulet D (step a). The interaction of the request with each market is characterise by the following properties: A1) The request is for a single VM. A2) The request is associate with a bi, b s,p, that expresses the user s willingness to pay for a VM for each engagement time-unit of the user to an LLA s instance at when her access point is p. A3) The request is not queue at the market, i.e., the request is either serve or rejecte immeiately. A4) The VM allocation time overhea has no impact on the LLA s QoS. In more etail, let the price for the use of a VM at cloulet be π. Upon the arrival of the request the market operates accoring to the following rules: R1 If there are no available VMs, the request is rejecte. R2 Else, if there are available VMs: If b s,p π, a VM is allocate to serve the request at price π for each time unit of user engagement. Else, if b s,p < π, the request is rejecte. Assuming b s,p π an the existence of available VMs, the allocation is taking place an the cloulet starts a timer for keeping track of the user s engagement uration (step b). After the session completion/application termination, the cloulet informs the market about the engagement uration (step c). Then the market verifies the uration an converts it to a bill that equals the engagement uration times the agree per time unit service price π (step ). Finally, the bill is sent to the corresponing LLA provier which eventually pays the cloulet provier for its service. 1 Next, we explain how the request bis as well as the cloulet prices are erive. B. Request Bis an Cloulet Prices erivation Let u s,p be the per-time-unit QoS gain of LLA s when a request is coming from access point p to get serve at cloulet, instea of its efault clou. Biing truthfulness is efine in the following straightforwar way: Definition 1. A bi b s,p for a request arriving at cloulet from access point p for LLA s is truthful iff b s,p := u s,p, where u s,p is the per-time-unit QoS gain of the requeste LLA at. In other wors, a bi is truthful when it equals the actual gain of the serve application. Then, given the cloulet s price, π, the net utility rate of the involve request is efine as: Definition 2. The net utility rate of class p LLA s from bi b s,p an QoS gain u s,p is: { u s,p π, if b s,p π, net utility rate =, otherwise. Proposition 1. Uner rules R1-R2, the request bis are truthful. Proof. We investigate the following possible cases: If u s,p π then the bier woul win the item with a truthful bi as well as an overbi, i.e., b s,p u s,p. If u s,p π > b s,p unerbiing returns a net utility rate equal to, as oppose to a truthful bi for which the net utility rate is non-negative. If π > u s,p then the bier woul loose the item with a truthful bi as well as an unerbi, i.e., u s,p b s,p. If b s,p > π > u s,p, then overbiing woul return a negative net utility rate, as oppose to a truthful bi for which the net utility rate is. From the previous cases, it is clear that truthful biing, i.e., b s,p = u s,p, is the ominant strategy of the involve request. Because the bis must be truthful for a rational user, the strategy of their eployment is straightforwar, i.e., assigning a price b s,p = u s,p to each request. Therefore, a request has to simply be associate to its involve QoS per time unit gain at a given cloulet. Lastly with respect to cloulet price erivation, we assume that each cloulet perioically (every w secons) observes the utilisation ρ ol of its resources that was achieve at the 1 The technical etails of the explaine process, relate to the security, verification, etc., are beyon the scope of this paper although orthogonal to its contribution.

4 previously set price π ol. Then, given a minimum target utilization ρ min the price is ajuste accoring to: π ol π, if ρ ol < ρ min, π = π ol + π, if ρ ol > ρ max, π ol, otherwise. where π > is the price ecreasing increment. Note that as a price ecreases (increases) the number of requests that can be serve at cloulet rises (rops) with the result of increase (ecrease) in the utilisation of s resources. IV. PERFORMANCE EVALUATION In this section, we emonstrate s performance via simulations in an ISP topology. We implement the an the baseline approaches, escribe next, by extening the Icarus caching simulator for application provisioning problems [11]. Application categories for LLAs: The QoS of the LLAs is expresse as a ecreasing function of the en users perceive latency to each cloulet [5], [15]. Similarly to [8] for abstract resource allocation gains, we consier that each LLA is characterise by a ecreasing QoS function of the latency x having the general form: ( umin ( u(x) = + 1 u )( min 1 x l ) 1 ) min α u max (1) u max u max l max The constants u max (u min ) represents the maximum (minimum) QoS that the application user can achieve at the minimum (maximum) latency l min (l max ), i.e., u(l min ) = u max an u(l max ) = u min. We set u max = 1 an l min = 5 ms 2 when is not specifie ifferently. Moreover, the function u( ) is convex for < α 1; that is, we set α =.2 since LLAs QoS is expecte to be more sensitive to latency changes closer to l min. Base on Eq. 1, we create ten LLA categories, each associate to a QoS function that moels a certain sensitivity of the LLA to latency. For each LLA category we assign a ifferent u min value from the set of {, 1, 2,..., 9}. In this way, istinct application categories have iverse QoS gains from being provisione at a cloulet, varying, for example, from 1, for u min = 9 an less-latency sensitive LLAs, to 1, for u min = an latency-critical LLAs, when provisione at the ege, i.e., x = l min. We consier ten LLA categories to be sufficient for the purpose of our evaluation since this number is comparable to the currently consiere types in the context of IoT [3], [1] an Tactile Internet [6]. Lastly, we assume that users remain engage to their LLA instance on average for 1 minute while we execute the following experiments for the uration of three hours in our simulator. LLA Realistic Requests Generation: Each user selects one of the 1 LLA categories base on the sequence of request arrivals in Google s cluster ataset 3. In etail, we associate 2 With recent avances in LTE technology, mobile operators reporte hanset-to-base-station latencies aroun 2 msec (RTT of 5 ms), see: 3 Available at each LLA category to a ParentID fiel, that ientifies the service, of the 1 most popular services in the ataset accounting for more than 2K requests. Then by selecting ranom time intervals in the perio of the seven hours that the ataset covers, users request LLA categories base on the sequence of ParentID fiels that arrive into Google s cluster. ISP Topology & Cloulets Deployment: We evaluate uner the Tiscali topology of the Rocketfuel ataset [13] that contains 24 noes an 44 links. Among the 24 noes, we esignate as hosts the 8 noes that present a egree of one, i.e., they are connecte to only a single noe of the topology. After that, we place the Clou at the noe with the highest closeness centrality with respect to all hosts, i.e., shortest average istance to all hosts. Then we set each host to generate one request per secon forware to the Clou via the shortest path in terms of latency. We place a cloulet to each noe of the topology that belong to at least a single shortest path from a host to the Clou. That is, we have 79 cloulets all over the topology for reucing the Clou RTT latency that on average is 155 ms to each host. The efault number of available VMs per cloulet is 2, while we set the minimum an maximum target utilisation of each cloulet to be equal to ρ min =.85 an ρ max =.95 respectively. Comparison approaches: We compare against the following approaches: : Cloulets assign their VMs to application instances accoring to their eman that is consiere known in avance, e.g., an equal number of VMs is assigne to each LLA in the case of an uniform requests istribution. Least Frequently Use () provisioning: Cloulets perioically assign their VMs to LLA instances, prioritising the ones with the highest observe eman, i.e., popularity. In this case, VMs are allocate first to the most popular application, an the process continues with secon most popular application, an so on, until all the VMs at a cloulet are allocate. The number of VMs assigne to each application is etermine accoring to the number of both the requests serve an rejecte. Provisioning: Cloulets perioically assign their VMs to LLA instances by prioritising the ones with the highest QoS gain. In particular, this strategy iterates through the applications sorte in ecreasing orer of QoS gain, an assigns a number of unallocate VMs to the current application. This results with VMs being assigne to applications that are willing to pay the most. The number of VMs assigne to each application again epens on its observe eman. The Static approach is a form of proactive provisioning, because it relies on prior knowlege of the requests eman for each application, while an Self-tuning approaches perform reactive provisioning, as each cloulet perioically reassigns their VM instances to iniviual LLAs base on the request patterns receive uring the most recent observation perio. We set the efault length of the observation perio to 5 minutes, i.e., 3 secons. Note that we consier a single LLA per LLA category in orer to give an avantage to

5 Average QoS Gain Number of VMs (a) QoS Percent Ile Time Number of VMs (b) Ile Time Percentage Revenue (X $) 1.6x x x1 8 1x1 8 8x1 7 6x1 7 4x1 7 2x Number of VMs (c) Revenue Fig. 3: The impact of the number of VMs on the performance of the provisioning mechanisms. the above-mentione approaches against s oneman provisioning, otherwise their performance coul be arbitrarily eteriorate. For example by increasing the number of LLAs per category from 1 to 1, the utilisation of each cloulet woul ecrease to the 1% of the currently achieve utilisation for the Static, Self-tuning, an provisioning with a negative impact on the achieve QoS gain as well as cloulets revenue. Lastly, in orer to perform a straightforwar an fair comparison against, we assume a charging mechanism, ientical to, where each cloulet is associate to a price that equals the lowest QoS gain over all the accepte LLA request classes at a given location. In that way, we avoi creating application-specific prices that challenge the requests biing truthfulness since they woul pay ifferent prices for ientical VMs. A. Impact of the Number of VMs In Fig. 3, we epict the performance of the LLA provisioning approaches for an increasing number of VMs per cloulet for the metrics of: i) users average QoS gain (u(x)), ii) percentage of ile time experience by the VMs of the cloulets, an iii) the total revenue obtaine by all cloulets. User requests serve by the back-en Clou experience the maximum latency (i.e., l max ), an thus obtain zero gain. The revenue obtaine by a cloulet is compute as the prouct of the engagement time of the serve users at each VM an the per-secon usage price of the VM etermine by a cloulet. For the mechanism, the per-secon usage price of the VMs at a cloulet is erive perioically base on the ifference between the observe an the target utilisation, as escribe in Section III-A. For the rest of the strategies, we assume a secon-price auction mechanism, where the winning biers pay for the next highest bi, an the bis are set to the QoS gain of the users as in a true value biing. As shown in Fig. 3a, the mechanism can achieve a higher average QoS gain than the other strategies. Specifically, the mechanism is outperforme since it ignores the utilisation of resources when provisioning the LLAs. As a result, a larger portion of the requests are serve by the Clou without obtaining any QoS gain. On the other han, an Static approaches provision LLAs purely base on utilisation, without consiering the QoS gain of the users, resulting in lower average QoS gain. Our QoS finings are in accorance with the average ile time percentage of the resources, as it is emonstrate in Fig. 3b. As expecte, Static provisioning presents a higher utilisation of resources, i.e., lower ile time, compare to an Self-tuning by exploiting the knowlege of LLAs upcoming eman. However, since Static,, an Selftuning approaches operate by assigning VMs to LLA instances perioically, they are outperforme by the mechanism that provisions requests as soon as they arrive, in an on-eman manner. As a result of achieving higher QoS gain an utilisation of resources, the mechanism obtains the highest revenue, as epicte in Fig. 3c. As the number of VMs increases, the ile time of the strategies raises by aroun 15%. At the same time the average QoS gain of the users presents an upwar tren, which leas to higher bis for resources followe by greater revenues. We observe that the approach obtains higher revenue than the an nearly the same revenue as Static provisioning. B. Impact of Observation Perio Length In the experiments presente earlier, we use a efault observation perio length of 3 secons (5 minutes). In Fig. 4, we emonstrate the impact of this parameter on QoS gain (left plot) an ile time percentage (right plot) of the provisioning mechanisms. First of all, we observe that the performances of both an Self-tuning approaches are increasing function of the observation perio uration before being stabilise at 2 secons. This is relate to the fact that an Self-tuning rely on the estimation of LLAs eman, that is inaccurate for short observation urations in the trace of requests we are using since it fails to capture the eman fluctuations. In terms of QoS gain, the Self-tuning mechanism achieves a remarkable increase of 33% in the uration interval to 2 secons. At the same time, the mechanism achieves nearly 5% increase in resource utilisation since the ile time percentage rops from 4%, for a uration of secons, to 2%, for 2 secons. The mechanism is affecte the least by the observation perio factor while constantly achieving the highest QoS gain an lowest ile time percentage compare to the rest of approaches. Our evaluation emonstrates that the mechanism can provision resources with high utilisation while pro-

6 Average QoS Gain Observation Perio Length (sec) Percent Ile Time Observation Perio Length (sec) Fig. 4: Impact of observation perio length on QoS gain of users (left) an average ile times of VMs (right). viing high QoS gains for the en-users. The price erivation mechanism of our on-eman provisioning mechanism leas to higher revenues than the provisioning mechanisms that perioically allocate the VMs to LLAs base on the observe eman. V. RELATED WORK Cloulets have been propose in [12] with the initial purpose of acting as a surrogate infrastructure where mobile evices can offloa intensive tasks as a response to their computing an battery limitations. Specifically, [1] aresses the problem of application-specific task offloaing over the fog infrastructure, i.e., a task requires the corresponing virtual instance of the application at a cloulet before getting offloae. However, the authors only consier stateless applications, while ignoring completely the economic aspects of such a problem. In [9], the authors propose a self-tuning application provisioning mechanism using a combinatorial auction mechanism, where application proviers bi perioically for a specific number of VMs organise in ifferent execution zones. Nevertheless, the presente mechanism relies on precise preictions about the future eman of an application an takes place in a centralise way that challenges the scalability of such a scheme. Closer to our setting, [14] iscusses LLA provisioning over thir-party cloulets in an economic context for lightly stateful applications, which can be migrate between cloulets without severely egraing the involve QoS for mobile users (as a result of the han-offs between ifferent cells). Similar to spot pricing mechanisms (e.g., [16], our approach can react to transient changes in eman, but without either suspening applications or collecting (i.e., queuing) user bis to execute an auction. VI. CONCLUSIONS An increasing number of network applications with low latency requirements rener clou provisioning unfit for purpose. In this paper, we investigate the emerging market where heavily stateful low latency applications lease thirparty cloulet resources for provisioning their instances. This is a promising research irection for bringing application instances closer to their users in orer to improve the involve perceive latency. Along these lines, we introuce a charging scheme as an on-path, on-eman market base provisioning mechanism. In the propose scheme, cloulets are associate with a single price that is ajuste base on their target resource utilisation. Then LLAs requests forware in the network interact on-path with collocate markets to the cloulets, provisioning on-eman an application instance to the first cloulet with a price lower than their QoS gain. Our mechanism aress explicitly the challenges of heavily stateful applications whose instances cannot be suspene an/or migrate to other cloulet locations, without impairing irreversibly the perceive QoS. The avantages of such an approach were emonstrate against a variety of proactive an reactive provisioning techniques in realistic topologies. ACKNOWLEDGMENT This work has been supporte by the EC H22 ICN22 project (GA no ), the EPSRC INSP fellowship (EP/M3787/1), an UK EPSRC KCN project (EP/L2612/1). REFERENCES [1] O. Ascigil, T. K. Phan, A. G. Tasiopoulos, V. Sourlas, I. Psaras, an G. Pavlou. On uncoorinate service placement in Ege-Clous. In Clou Computing Technology an Science (ClouCom), 217 IEEE International Conference on, pages IEEE, 217. [2] S. Bharwaj, L. Jain, an S. Jain. Clou computing: A stuy of Infrastructure as a Service (IaaS). International Journal of engineering an information Technology, 2(1):6 63, 21. [3] F. Bonomi, R. Milito, J. Zhu, an S. Aepalli. Fog computing an its role in the Internet of Things. In Proceeings of the first eition of the MCC workshop on Mobile clou computing, pages ACM, 212. [4] C. Clark, K. Fraser, S. Han, J. G. Hansen, E. Jul, C. Limpach, I. Pratt, an A. Warfiel. Live migration of virtual machines. In Proceeings of the 2n Conference on Symposium on Networke Systems Design & Implementation-Volume 2, pages USENIX Association, 25. [5] M. Claypool an K. Claypool. Latency an player actions in online games. Communications of the ACM, 49(11):4 45, 26. [6] G. P. Fettweis. The tactile internet: Applications an challenges. IEEE Vehicular Technology Magazine, 9(1):64 7, 214. [7] A. Greenberg, J. Hamilton, D. A. Maltz, an P. Patel. The cost of a clou: research problems in ata center networks. ACM SIGCOMM computer communication review, 39(1):68 73, 28. [8] H. Izakian, A. Abraham, an B. T. Laani. An auction metho for resource allocation in computational gris. Future Generation Computer Systems, 26(2): , 21. [9] R. Lana, M. Charalambies, R. G. Clegg, D. Griffin, an M. Rio. Self-tuning service provisioning for ecentralize Clou applications. IEEE Transactions on Network an Service Management, 13(2): , 216. [1] I. Lee an K. Lee. The internet of things (iot): Applications, investments, an challenges for enterprises. Business Horizons, 58(4):431 44, 215. [11] L. Saino, I. Psaras, an G. Pavlou. Icarus: a caching simulator for information centric networking (icn). In Proceeings of the 7th International ICST conference on Simulation Tools an Techniques, pages ICST (Institute for Computer Sciences, Social-Informatics an Telecommunications Engineering), 214. [12] M. Satyanarayanan, P. Bahl, R. Caceres, an N. Davies. The case for VM-base Cloulets in mobile computing. IEEE pervasive Computing, 8(4), 29. [13] N. Spring, R. Mahajan, an D. Wetherall. Measuring ISP topologies with Rocketfuel. ACM SIGCOMM Computer Communication Review, 32(4): , 22. [14] A. G. Tasiopoulos, O. Ascigil, I. Psaras, an G. Pavlou. Ege-MAP: Auction markets for ege resource provisioning. In IEEE 19th Worl of Wireless Mobile an Multimeia Networks (WoWMoM), 218. [15] B. Zhang, N. Mor, J. Kolb, D. S. Chan, K. Lutz, E. Allman, J. Wawrzynek, E. A. Lee, an J. Kubiatowicz. The Clou is not enough: Saving IoT from the clou. In HotStorage, 215. [16] L. Zheng, C. Joe-Wong, C. W. Tan, M. Chiang, an X. Wang. How to bi the clou. In ACM SIGCOMM Computer Communication Review, volume 45, pages ACM, 215.

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

Cloud Search Service Product Introduction. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

Cloud Search Service Product Introduction. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD. 1.3.15 Issue 01 Date 2018-11-21 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Lt. 2019. All rights reserve. No part of this ocument may be reprouce or transmitte in any form or by any

More information

A Plane Tracker for AEC-automation Applications

A Plane Tracker for AEC-automation Applications A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)

More information

Top-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications

Top-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications Top-own Connectivity Policy Framework for Mobile Peer-to-Peer Applications Otso Kassinen Mika Ylianttila Junzhao Sun Jussi Ala-Kurikka MeiaTeam Department of Electrical an Information Engineering University

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

6 Gradient Descent. 6.1 Functions

6 Gradient Descent. 6.1 Functions 6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output

More information

Characterizing Decoding Robustness under Parametric Channel Uncertainty

Characterizing Decoding Robustness under Parametric Channel Uncertainty Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric

More information

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:

More information

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing Inexing the Eges A simple an yet efficient approach to high-imensional inexing Beng Chin Ooi Kian-Lee Tan Cui Yu Stephane Bressan Department of Computer Science National University of Singapore 3 Science

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA Preprint, August 5, 2018. 1 All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA Mikhail Ivanov, Frerik Brännström, Alexanre Graell i Amat, an Petar Popovski Department of Signals an Systems,

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks Coorinating Distribute Algorithms for Feature Extraction Offloaing in Multi-Camera Visual Sensor Networks Emil Eriksson, György Dán, Viktoria Foor School of Electrical Engineering, KTH Royal Institute

More information

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural

More information

Two Dimensional-IP Routing

Two Dimensional-IP Routing Two Dimensional-IP Routing Mingwei Xu Shu Yang Dan Wang Hong Kong Polytechnic University Jianping Wu Abstract Traitional IP networks use single-path routing, an make forwaring ecisions base on estination

More information

Parallel Directionally Split Solver Based on Reformulation of Pipelined Thomas Algorithm

Parallel Directionally Split Solver Based on Reformulation of Pipelined Thomas Algorithm NASA/CR-1998-208733 ICASE Report No. 98-45 Parallel Directionally Split Solver Base on Reformulation of Pipeline Thomas Algorithm A. Povitsky ICASE, Hampton, Virginia Institute for Computer Applications

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

Chalmers Publication Library

Chalmers Publication Library Chalmers Publication Library All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA This ocument has been ownloae from Chalmers Publication Library (CPL). It is the author s version of a work

More information

A multiple wavelength unwrapping algorithm for digital fringe profilometry based on spatial shift estimation

A multiple wavelength unwrapping algorithm for digital fringe profilometry based on spatial shift estimation University of Wollongong Research Online Faculty of Engineering an Information Sciences - Papers: Part A Faculty of Engineering an Information Sciences 214 A multiple wavelength unwrapping algorithm for

More information

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun

More information

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science

More information

Overlap Interval Partition Join

Overlap Interval Partition Join Overlap Interval Partition Join Anton Dignös Department of Computer Science University of Zürich, Switzerlan aignoes@ifi.uzh.ch Michael H. Böhlen Department of Computer Science University of Zürich, Switzerlan

More information

Supporting Fully Adaptive Routing in InfiniBand Networks

Supporting Fully Adaptive Routing in InfiniBand Networks XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar

More information

HOW DO SECURITY TECHNOLOGIES INTERACT WITH EACH OTHER TO CREATE VALUE? THE ANALYSIS OF FIREWALL AND INTRUSION DETECTION SYSTEM

HOW DO SECURITY TECHNOLOGIES INTERACT WITH EACH OTHER TO CREATE VALUE? THE ANALYSIS OF FIREWALL AND INTRUSION DETECTION SYSTEM HOW O SECURTY TECHNOLOGES NTERACT WTH EACH OTHER TO CREATE VALUE? THE ANALYSS O REWALL AN NTRUSON ETECTON SYSTEM Huseyin CAVUSOGLU Srinivasan RAGHUNATHAN Hasan CAVUSOGLU Tulane University University of

More information

Optimal Distributed P2P Streaming under Node Degree Bounds

Optimal Distributed P2P Streaming under Node Degree Bounds Optimal Distribute P2P Streaming uner Noe Degree Bouns Shaoquan Zhang, Ziyu Shao, Minghua Chen, an Libin Jiang Department of Information Engineering, The Chinese University of Hong Kong Department of EECS,

More information

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance International Journal of Moern Communication Technologies & Research (IJMCTR) Impact of FTP Application file size an TCP Variants on MANET Protocols Performance Abelmuti Ahme Abbasher Ali, Dr.Amin Babkir

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Learning Polynomial Functions. by Feature Construction

Learning Polynomial Functions. by Feature Construction I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

Exploring Context with Deep Structured models for Semantic Segmentation

Exploring Context with Deep Structured models for Semantic Segmentation 1 Exploring Context with Deep Structure moels for Semantic Segmentation Guosheng Lin, Chunhua Shen, Anton van en Hengel, Ian Rei between an image patch an a large backgroun image region. Explicitly moeling

More information

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,

More information

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks Hinawi Publishing Corporation International Journal of Distribute Sensor Networks Volume 2014, Article ID 936379, 17 pages http://x.oi.org/10.1155/2014/936379 Research Article REALFLOW: Reliable Real-Time

More information

TCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model

TCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model TCP Symbiosis: Congestion Control Mechanisms of TCP base on Lotka-Volterra Competition Moel Go Hasegawa Cybermeia Center Osaka University 1-3, Machikaneyama-cho, Toyonaka, Osaka 56-43, JAPAN Email: hasegawa@cmc.osaka-u.ac.jp

More information

Chapter 5 Proposed models for reconstituting/ adapting three stereoscopes

Chapter 5 Proposed models for reconstituting/ adapting three stereoscopes Chapter 5 Propose moels for reconstituting/ aapting three stereoscopes - 89 - 5. Propose moels for reconstituting/aapting three stereoscopes This chapter offers three contributions in the Stereoscopy area,

More information

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter FDL sel. VOA SOA 100 Regular papers ONDM 2018 Scalable Deterministic Scheuling for WDM Slot Switching Xhaul with Zero-Jitter Bogan Uscumlic 1, Dominique Chiaroni 1, Brice Leclerc 1, Thierry Zami 2, Annie

More information

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus

More information

Figure 1: Schematic of an SEM [source: ]

Figure 1: Schematic of an SEM [source:   ] EECI Course: -9 May 1 by R. Sanfelice Hybri Control Systems Eelco van Horssen E.P.v.Horssen@tue.nl Project: Scanning Electron Microscopy Introuction In Scanning Electron Microscopy (SEM) a (bunle) beam

More information

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients Probabilistic Meium Access Control for 1 Full-Duplex Networks with Half-Duplex Clients arxiv:1608.08729v1 [cs.ni] 31 Aug 2016 Shih-Ying Chen, Ting-Feng Huang, Kate Ching-Ju Lin, Member, IEEE, Y.-W. Peter

More information

PAPER. 1. Introduction

PAPER. 1. Introduction IEICE TRANS. COMMUN., VOL. E9x-B, No.8 AUGUST 2010 PAPER Integrating Overlay Protocols for Proviing Autonomic Services in Mobile A-hoc Networks Panagiotis Gouvas, IEICE Stuent member, Anastasios Zafeiropoulos,,

More information

d 3 d 4 d d d d d d d d d d d 1 d d d d d d

d 3 d 4 d d d d d d d d d d d 1 d d d d d d Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching

More information

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose

More information

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle

More information

On the Energy Efficiency of Content Delivery Architectures

On the Energy Efficiency of Content Delivery Architectures On the Energy Efficiency of Delivery Architectures Kyle Guan, Gary Atkinson, an Daniel C. Kilper Bell Las, Acatel-Lucent, 79 Holmel Roa, Holmel, NJ 07733 Ece Gulsen MIT, 77 Mass. Ave., Camrige, MA 039

More information

Verifying performance-based design objectives using assemblybased vulnerability

Verifying performance-based design objectives using assemblybased vulnerability Verying performance-base esign objectives using assemblybase vulnerability K.A. Porter Calornia Institute of Technology, Pasaena, Calornia, USA A.S. Kiremijian Stanfor University, Stanfor, Calornia, USA

More information

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember 107 IEICE TRANS INF & SYST, VOLE88 D, NO5 MAY 005 LETTER An Improve Neighbor Selection Algorithm in Collaborative Filtering Taek-Hun KIM a), Stuent Member an Sung-Bong YANG b), Nonmember SUMMARY Nowaays,

More information

Mining Sensor Streams for Discovering Human Activity Patterns Over Time

Mining Sensor Streams for Discovering Human Activity Patterns Over Time Mining Sensor Streams for Discovering Human Activity Patterns Over Time Parisa Rashii CS Department ashington State University Pullman, US mail: prashii@wsu.eu Diane J. Cook CS Department ashington State

More information

NET Institute*

NET Institute* NET Institute* www.netinst.org Working Paper #08-24 October 2008 Computer Virus Propagation in a Network Organization: The Interplay between Social an Technological Networks Hsing Kenny Cheng an Hong Guo

More information

Adjusted Probabilistic Packet Marking for IP Traceback

Adjusted Probabilistic Packet Marking for IP Traceback Ajuste Probabilistic Packet Marking for IP Traceback Tao Peng, Christopher Leckie, an Kotagiri Ramamohanarao 2 ARC Special Research Center for Ultra-Broaban Information Networks Department of Electrical

More information

NAND flash memory is widely used as a storage

NAND flash memory is widely used as a storage 1 : Buffer-Aware Garbage Collection for Flash-Base Storage Systems Sungjin Lee, Dongkun Shin Member, IEEE, an Jihong Kim Member, IEEE Abstract NAND flash-base storage evice is becoming a viable storage

More information

EXACT SIMULATION OF A BOOLEAN MODEL

EXACT SIMULATION OF A BOOLEAN MODEL Original Research Paper oi:10.5566/ias.v32.p101-105 EXACT SIMULATION OF A BOOLEAN MODEL CHRISTIAN LANTUÉJOULB MinesParisTech 35 rue Saint-Honoré 77305 Fontainebleau France e-mail: christian.lantuejoul@mines-paristech.fr

More information

A Measurement Framework for Pin-Pointing Routing Changes

A Measurement Framework for Pin-Pointing Routing Changes A Measurement Framework for Pin-Pointing Routing Changes Renata Teixeira Univ. Calif. San Diego La Jolla, CA teixeira@cs.ucs.eu Jennifer Rexfor AT&T Labs Research Florham Park, NJ jrex@research.att.com

More information

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times Algorithm for Intermoal Optimal Multiestination Tour with Dynamic Travel Times Neema Nassir, Alireza Khani, Mark Hickman, an Hyunsoo Noh This paper presents an efficient algorithm that fins the intermoal

More information

Fast Fractal Image Compression using PSO Based Optimization Techniques

Fast Fractal Image Compression using PSO Based Optimization Techniques Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting

More information

Table-based division by small integer constants

Table-based division by small integer constants Table-base ivision by small integer constants Florent e Dinechin, Laurent-Stéphane Diier LIP, Université e Lyon (ENS-Lyon/CNRS/INRIA/UCBL) 46, allée Italie, 69364 Lyon Ceex 07 Florent.e.Dinechin@ens-lyon.fr

More information

Estimating Velocity Fields on a Freeway from Low Resolution Video

Estimating Velocity Fields on a Freeway from Low Resolution Video Estimating Velocity Fiels on a Freeway from Low Resolution Vieo Young Cho Department of Statistics University of California, Berkeley Berkeley, CA 94720-3860 Email: young@stat.berkeley.eu John Rice Department

More information

Comparison of Wireless Network Simulators with Multihop Wireless Network Testbed in Corridor Environment

Comparison of Wireless Network Simulators with Multihop Wireless Network Testbed in Corridor Environment Comparison of Wireless Network Simulators with Multihop Wireless Network Testbe in Corrior Environment Rabiullah Khattak, Anna Chaltseva, Laurynas Riliskis, Ulf Boin, an Evgeny Osipov Department of Computer

More information

Pairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11:

Pairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11: airwise alignment using shortest path algorithms, Gunnar Klau, November 9,, : 3 3 airwise alignment using shortest path algorithms e will iscuss: it graph Dijkstra s algorithm algorithm (GDU) 3. References

More information

Frequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises

Frequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises verview Frequent Pattern Mining comprises Frequent Pattern Mining hristian Borgelt School of omputer Science University of Konstanz Universitätsstraße, Konstanz, Germany christian.borgelt@uni-konstanz.e

More information

Divide-and-Conquer Algorithms

Divide-and-Conquer Algorithms Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:

More information

NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2.

NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2. JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 13/009, ISSN 164-6037 Krzysztof WRÓBEL, Rafał DOROZ * fingerprint, reference point, IPAN99 NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES

More information

Analytical approximation of transient joint queue-length distributions of a finite capacity queueing network

Analytical approximation of transient joint queue-length distributions of a finite capacity queueing network Analytical approximation of transient joint queue-length istributions of a finite capacity queueing network Gunnar Flötterö Carolina Osorio March 29, 2013 Problem statements This work contributes to the

More information

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which

More information