The Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks

Size: px
Start display at page:

Download "The Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks"

Transcription

1 The Scalability and Performance of Common Vector Solution to Generalized abel Continuity Constraint in Hybrid Otical/Pacet etwors Shujia Gong and Ban Jabbari {sgong, George Mason University bstract In hybrid Otical/acet networs, wavelength and V tag continuity along a abel Switched Path are two common constraints These two tyes of constraints, referred to as Generalized abel Continuity Constraints, have global significance in a networ; namely, the label should aear only in other lin- or node- disjoint aths In considering these constraints, a solution is the common vector aroach, which sees a common available label along the ath determined by CSPF without label constraints In this aer, we rovide an estimation method to comute the uer bound of the blocing robability for the above aroach We also address the scalability roblem of the existing traffic engineering algorithms We then resent the simulation results corroborating with our analytical modelh I ITRODUCTIO Traffic engineering utilizing Multi-Protocol abel Switching (MPS) and Generalized MPS (GMPS)[] are widely utilized in the bacbone of the Internet infrastructure [] GMPS is attractive as it allows end-to-end control, rovisioning, rotection and restoration in the hybrid IP and Otical transort networs onetheless, there are challenging roblems associated with the abel Switched Path (SP) setu rocess due to hysically diverse data forwarding lane with multile routing and switching technologies The ath comutation algorithms are needed to tae into account of all forwarding technology and networ secific constraints in order to yield an end-to-end SP n examle of the above constraints is the wavelength continuity constraint in ll-otical etwors (Os) or networs based on Reconfigurable Otical dd-dro Multilexer (RODM) and/or Dense Wavelength Division Multilexing (DWDM), in which an end-to-end SP needs to be setu Deterministic networ services to high-end escience alications that require high seed and high caacity lightath, which is subject to the wavelength continuity constraint, are in demand nother examle is the V tag continuity, where an endto-end ath across geograhically disersed Ethernet switches is needed This Ethernet switching technology is deloyed not only in local area networs, but also in bacbones such as in the hybrid otical and acet networ infrastructure, eg, HOPI roject Ethernet switches in the networ may not necessarily suort V tag swaing and therefore, V tag continuity constraint also needs to be satisfied Both wavelength and V tags, as mentioned above, are labels These as well as other labels can be classified under Generalized abel Continuity Constraints (GCC) GMPS defines a set of rotocols as the standardized control lane to instantiate the SP setu, tear-down and maniulation In this aer, we discuss the alicability of a common vector solution to address the GCC roblem We develo an analytical model to obtain the estimation on blocing robability of SP setu requests We also develo a simulation model Subsequently, numerical results are resented and comared with the analytical model Finally, concluding remars are made II COMMO VECTOR SOUTIOS TO GCC COSTRITS n aroach to solve the wavelength continuity constraint by converting a etwor Grah to a Wavelength Grah has been resented in [3] In wavelength grah, one lane is generated for each wavelength, and each node in the networ grah is dulicated at each wavelength lane For those nodes that have wavelength conversion caability, additional lins are created to connect the relications of each node on corresonding wavelength lane Virtual nodes are generated as a dummy originating node and a dummy destination node These virtual nodes are connected to the relications of the true originating node and destination node resectively and metric on those virtual lins is assigned as zero lthough wavelength grah can find an otimal ath for an SP setu request, and can liewise be used to address V continuity constraints, it has inherent scalability roblems The comutational comlexity of wavelength grah is n(n + ), where is the number of wavelength in a fiber and n is the number of nodes in the networ grah, which maes it imractical for large label sace regardless of the networ size V Tag Constraints and the Solution V tag is a field of bits, which can identify 4096 Vs If we create V lane as we do on wavelength lane and relicate nodes and lins, a networ will generate hundreds of millions of nodes and lins Clearly, wavelength grah aroach cannot rovide a scalable solution to V tag continuity constraint To address this roblem, we utilize the Common Vector solution, where the elements of the vector reresent the availability or the lac of the labels at a node across the ath The set of available labels can simly be determined by taing

2 the logical D across the vectors at each node on the ath method such as Extended Indexing Ref [4] can be used to facilitate the distribution of the labels vector comrised of 4096 bits, with each bit indicating the status of one of the 4096 V tags used at each node is an attractive solution for large Ethernet networs in ractice B Modeling of Common Vector Solution to Wavelength Continuity Constraint In this section, we show that the common vector aroach is a reasonably good solution to wavelength continuity constraints by the following models We assume that the arrival rocess of SP setu requests to each node is Poisson with mean of λ and the dearture rocess is exonential with mean service time /μ We use the following notations in our model: G <V, E>: etwor grah G with node set V and lin set E : Total number of nodes in V M: Total number of lins in E : Total number of labels in each lin In this context, labels are wavelengths v i : ode i in node set V, where i e i : in i in lin set E, where i M h : The number of hos of the shortest ath between v i and v j in G λ : The intensity of traffic with v i and v j as source and destination node, resectively f : The traffic flow generated by λ in the networ fe : The total traffic flow on lin e I(v i, v j, e ): n indication function on whether the shortest ath between v i and v j on the networ grah traverses lin e e i : The number of available labels on lin e i P : Path between v i and v j : The lin that the m th ho along P traverses m,, m : The number of labels that are commonly available on the first m hos along P We also assume that the traffic intensity in the networ is not high When an SP request arrives at node vi, vi will chec its Traffic Engineering Database (TEDB), rune those lins without enough bandwidth and run CSPF without considering the label availability fter a ath is found, vi will erform the logical D oeration on the vector of label availability along the ath If no commonly available label is found, the SP request will be rejected To simlify the analysis, we assume that the label occuancy on each lin is indeendent This is not an accurate assumtion in that all the labels along an SP ath are selected to be the same, which indicates the deendency of the label occuancy on different lins However, this deendency favors the common vector solution, and the actual erformance of the networ will be better than the analytical model we rovide in the next subsections C Estimation of the umber of vailable abels on a in Blocing robability in various networ scenarios have been extensively studies, such as in [5] [7] Comuting the number of available labels on a lin is a M/M/m/m queueing roblem We first need to now the traffic flow on each lin The traffic flow generated by any air of nodes vi and vj is: f λ h () We first run the shortest ath first algorithm between each air of nodes on a networ grah without traffic and define: if P traverses e ; I( v, v, e ) () i j 0 Otherwise Due to the assumtion that the traffic intensity is not high, only a small roortion of SPs will tae a ath other than the shortest one, and we can neglect the difference between the offered load and the carried load on a lin Therefore, fe can be estimated as: fe i j f I( v, v, e ) (3) With the assumtion of light traffic intensity, we can also aroximate the arrival of SP requests to a lin to be a Poisson rocess Therefore, we can aly M/M/m/m formula to find the number of available labels f /! (4) f / j!) ei e ) i j ( 0 This estimation in Equation (4) is very rough esecially when traffic intensity is moderate It assumes static routing and overestimates the traffic flow on each lin Reference [8] rovides a more accurate estimation on the uer bounds of lin blocing robability in homogeneous otical ring networs If we assume that the routing algorithm is dynamic, the lin blocing robability is nearly the same in the whole networ, and the networ is comlicated enough that the alternative ath is of the equal length as the shortest ath, we can further simlified the equation (3) as follows: f i j fe (5) M Because we use offered load instead of carried load to calculate the traffic flow on each lin, the equation (4) definitely gives us the uer bound of the actual blocing ratio D Estimation of Blocing Probability of SP Setu Requests Equation (4) gives the robability of e i ) For an SP with multi-hos, a successful connection needs at least one articular label that is commonly available along the ath Given a two-ho SP P between v i and v j, we denote that there are common wavelength available on and as, ) j ei

3 Given and, we have:, P ) (,, P P 0 0 (6) P ) P ) P )) Given labels in a lin, the number of ossibilities for and is: Given labels in a lin, (7) and,, means that we choose out of on first Because there are common labels on and, it means that we choose labels out of labels on and - labels out of - labels on Fig etwor Toology The number of ossibilities is: (8) Dividing (8) by (7), we have: P, (, ) P P P where max(0, + -) min(, ) Therefore, we have:, P ) P where max(0, + -) min(, ),, (9) P ) (0) The estimation of the case that there are common labels along a n-ho SP is an iterative rocess We have:,,, n P ),, n P (,,, n n, P P 0 0 () ),, n P ) n P )) Fig Comarison of Estimated and ctual Blocing Therefore, the robability of blocing is P 0) (,,, n P We assume that the alternative ath between any air of nodes v i and v j is of the same length as the shortest ath The exected blocing robability is as follows: λ P b P (,,, h P λ 0) () If we use (3) to estimate the traffic flow on a lin, we called it estimation based on static routing If we use (5) to estimate the traffic flow on a lin, we called it estimation based on homogeneous lin load assumtion III SIMUTIO VERSUS YTIC RESUTS We consider a networ toology as deicted in Fig, and assume that the traffic matrix is homogeneous We consider that each lin has 8 wavelengths Fig shows the estimation of blocing robability based on both static route and the homogeneous lin load assumtion resectively It also showed the actual blocing robability by simulating 0 million SP setu requests We can clearly see

4 Fig 3 Comarison of ctual Blocing in Wavelength Grah Solution and Common Vector Solution Fig 4 Comarison of Time Consumtion that the estimation based on homogeneous lin load assumtion is closer to the actual blocing rate Both estimations are uer bounds of the actual blocing rate Figure 3 also comared the blocing ratio of the common vector solution with the wavelength grah solution Given incoming traffic to each node of 3 Erlangs, we simulated the cases that there are 4 to 8 wavelengths in a fiber one of the node has wavelength translation caability The wavelength grah solution can accet more calls than the common vector solution However, when the networ load is very high or very low, the imrovement on the call accetance ratio is not significant When the networ load is moderate, wavelength grah solution can show its advantage with regard to call accetance The comutational comlexity of the common vector solution is equivalent to run Dstra algorithm and then find the availability of labels on each lin traversed by the SP Therefore, it is O(M+log())+O( +) The comutational comlexity of the wavelength grah solution is given in [3], which is O(( + )) Figure 4 shows that the comutational comlexity of common vector solution is almost irrelevant to the number of wavelengths on a lin, while the wavelength grah solution shows that even if the wavelength number is small, it still taes much more time than the common vector solution does Homogeneous and non-homogeneous traffic matrix may result in different networ blocing scenario To mae the comarison, we design three cases: ) Traffic generated at each node is the same and the traffic matrix is homogenous; ) Traffic generated at each node is the same and the traffic matrix is non-homogenous, ie the mean holding time between node vi and vj is in roortion to the value in i th row and j th column given in table I; and 3) Traffic generated at each node is in roortion to the values given in table II and the traffic matrix is nonhomogenous as given in table I Fig 5 Comarison of Blocing Probability of Common Vector Solution between Case, and 3 TBE I O-HOMOGEEOUS TRFFIC MTRIX node TBE II O-HOMOGEEOUS TRFFIC MTRIX WITH O- HOMOGEEOUS TRFFIC ITESITY T ECH ODE node Traffic Intensity

5 Fig 6 Comarison of Blocing Probability of Wavelength Grah Solution between Case, and 3 Fig 7 Estimated vs ctual Blocing Probability of Common Vector Solution in Case, and 3 Figure 5 and 6 show the blocing robability of all the three cases of the common vector and wavelength grah solutions resectively Comaring case and case, there is not much erformance degradation However, case 3 is clearly worse than case and case This imlies that given the same traffic intensity, a networ with nearly homogeneous traffic demand has better erformance from blocing robability ersective Figure 7 shows the comarison between estimated and actual blocing robability of the common vector solution The estimations based on both equation (3) and (5) are showed When the traffic load is light, the estimation of blocing ratio based on dynamic routing is even less than the actual blocing ratio This is because the dynamic routing assumtion hides the non-homogeneous traffic demand from each node IV COCUSIO In this aer, we roose a scalable solution to the generalized label continuity constraints in an otical/acet hybrid networ We demonstrate that we can estimate the uer bound of the lin blocing robability and show that this scalable solution will only slightly degrade the Quality of Service from the call blocing ersective, esecially when the traffic load is light or the networ is overloaded This algorithm has been imlemented in the DRGO (Dynamic Resource llocation in GMPS Otical etwors) roject, an SF sonsored research to create dynamic, deterministic, and manageable end-to-end networ transort services for high-end e-science alications REFERECES [] E Mannie and Ed, Generalized multi-rotocol label switching (GMPS) architecture, RFC3954 [] D wduche and B Jabbari, Internet traffic engineering using Multi- Protocol abel Switching (MPS), Journal of Comuter etwors, vol 40, no, 9, Set 00, invited Paer [3] I Chlamtac, Faragoe, and T Zhang, ightath (Wavelength) routing in large WDM networs, IEEE JSC, vol 4, no 5, June 996 [4] B Jabbari, Extended indexing method for resource assignment, Internal Reort, ug 006 [5] R Barry and P Humblet, Models of blocing robability in allotical networs with and without wavelength changers, IEEE Journal on Selected reas in Communications, vol 4, no 5, , June 996 [6] W Chen and E Modiano, Efficient routing and wavelength assignment for reconfigurable wdm ring networs with wavelength converters, IEEE/CM Transactions on etworing, vol 3, no, 73 86, Feb005 [7] S Subramaniam, M zizogelu, and K Somani, ll-otical networs with sarse wavelength conversion, IEEE/CM Transactions on etworing, vol 4, no 4, , ug 996 [8] S Gong and B Jabbari, in erformance bounds in homogeneous otically switched ring networs, IEEE GOBECOM, San Francisco, ov 006

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,

More information

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture

More information

Modeling Reliable Broadcast of Data Buffer over Wireless Networks

Modeling Reliable Broadcast of Data Buffer over Wireless Networks JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 3, 799-810 (016) Short Paer Modeling Reliable Broadcast of Data Buffer over Wireless Networs Deartment of Comuter Engineering Yeditee University Kayışdağı,

More information

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1 Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and

More information

A Study of Protocols for Low-Latency Video Transport over the Internet

A Study of Protocols for Low-Latency Video Transport over the Internet A Study of Protocols for Low-Latency Video Transort over the Internet Ciro A. Noronha, Ph.D. Cobalt Digital Santa Clara, CA ciro.noronha@cobaltdigital.com Juliana W. Noronha University of California, Davis

More information

Resilient Availability and Bandwidth-aware Multipath Provisioning for Media Transfer Over the Internet

Resilient Availability and Bandwidth-aware Multipath Provisioning for Media Transfer Over the Internet Resilient Availability and Bandwidth-aware Multiath Provisioning for Media Transfer Over the Internet Sahel Sahhaf, Wouter Tavernier, Didier Colle, Mario Pickavet Ghent University - iminds Email: sahel.sahhaf@intec.ugent.be

More information

An Efficient End-to-End QoS supporting Algorithm in NGN Using Optimal Flows and Measurement Feed-back for Ubiquitous and Distributed Applications

An Efficient End-to-End QoS supporting Algorithm in NGN Using Optimal Flows and Measurement Feed-back for Ubiquitous and Distributed Applications An Efficient End-to-End QoS suorting Algorithm in NGN Using Otimal Flows and Measurement Feed-back for Ubiquitous and Distributed Alications Se Youn Ban, Seong Gon Choi 2, Jun Kyun Choi Information and

More information

A joint multi-layer planning algorithm for IP over flexible optical networks

A joint multi-layer planning algorithm for IP over flexible optical networks A joint multi-layer lanning algorithm for IP over flexible otical networks Vasileios Gkamas, Konstantinos Christodoulooulos, Emmanouel Varvarigos Comuter Engineering and Informatics Deartment, University

More information

Incremental Planning of Multi-layer Elastic Optical Networks

Incremental Planning of Multi-layer Elastic Optical Networks Incremental Planning of Multi-layer Elastic Otical Networks P. Paanikolaou, K. Christodoulooulos, and E. Varvarigos School of Electrical and Comuter Engineering, National Technical University of Athens,

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

α i k (βi k ) Request ratio of rank-k chunks (a specific chunk) at node v i g i k Size of set Ck S i Cache size of node v i

α i k (βi k ) Request ratio of rank-k chunks (a specific chunk) at node v i g i k Size of set Ck S i Cache size of node v i ing Hierarchical Caches in Content-Centric Networs Zixiao Jia,PengZhang,JiweiHuang,ChuangLin, and John C. S. Lui Tsinghua National Laboratory for Information Science and Technology Det. of Comuter Science

More information

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Journal of Comuting and Information Technology - CIT 8, 2000, 1, 1 12 1 Comlexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Eunice E. Santos Deartment of Electrical

More information

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu

More information

Interactive Image Segmentation

Interactive Image Segmentation Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).

More information

IN an ad hoc wireless network, where nodes are likely to

IN an ad hoc wireless network, where nodes are likely to 1432 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 10, OCTOBER 2006 Otimal Transmit Power in Wireless Sensor Networks Sooksan Panichaiboon, Student Member, IEEE, Gianluigi Ferrari, Member, IEEE, and

More information

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION Yugoslav Journal of Oerations Research (00), umber, 5- A BICRITERIO STEIER TREE PROBLEM O GRAPH Mirko VUJO[EVI], Milan STAOJEVI] Laboratory for Oerational Research, Faculty of Organizational Sciences University

More information

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model Ad Hoc Networks (4) 5 68 Contents lists available at SciVerse ScienceDirect Ad Hoc Networks journal homeage: www.elsevier.com/locate/adhoc Latency-minimizing data aggregation in wireless sensor networks

More information

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method ITB J. Eng. Sci. Vol. 39 B, No. 1, 007, 1-19 1 Leak Detection Modeling and Simulation for Oil Pieline with Artificial Intelligence Method Pudjo Sukarno 1, Kuntjoro Adji Sidarto, Amoranto Trisnobudi 3,

More information

A Comprehensive Minimum Energy Routing Scheme for Wireless Ad hoc Networks

A Comprehensive Minimum Energy Routing Scheme for Wireless Ad hoc Networks A Comrehensive Minimum Energy Routing Scheme for Wireless Ad hoc Networks Jinhua Zhu, Chunming Qiao and Xin Wang Deartment of Comuter Science and Engineering State University of New York at Buffalo, Buffalo,

More information

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links

More information

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,

More information

Applying the fuzzy preference relation to the software selection

Applying the fuzzy preference relation to the software selection Proceedings of the 007 WSEAS International Conference on Comuter Engineering and Alications, Gold Coast, Australia, January 17-19, 007 83 Alying the fuzzy reference relation to the software selection TIEN-CHIN

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

Source Coding and express these numbers in a binary system using M log

Source Coding and express these numbers in a binary system using M log Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Distrib. Comut. 71 (2011) 288 301 Contents lists available at ScienceDirect J. Parallel Distrib. Comut. journal homeage: www.elsevier.com/locate/jdc Quality of security adatation in arallel

More information

Distributed Estimation from Relative Measurements in Sensor Networks

Distributed Estimation from Relative Measurements in Sensor Networks Distributed Estimation from Relative Measurements in Sensor Networks #Prabir Barooah and João P. Hesanha Abstract We consider the roblem of estimating vectorvalued variables from noisy relative measurements.

More information

An Efficient Video Program Delivery algorithm in Tree Networks*

An Efficient Video Program Delivery algorithm in Tree Networks* 3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,

More information

Efficient Parallel Hierarchical Clustering

Efficient Parallel Hierarchical Clustering Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore

More information

AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS

AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS Philie LACOMME, Christian PRINS, Wahiba RAMDANE-CHERIF Université de Technologie de Troyes, Laboratoire d Otimisation des Systèmes Industriels (LOSI)

More information

TOPP Probing of Network Links with Large Independent Latencies

TOPP Probing of Network Links with Large Independent Latencies TOPP Probing of Network Links with Large Indeendent Latencies M. Hosseinour, M. J. Tunnicliffe Faculty of Comuting, Information ystems and Mathematics, Kingston University, Kingston-on-Thames, urrey, KT1

More information

Semi-Markov Process based Model for Performance Analysis of Wireless LANs

Semi-Markov Process based Model for Performance Analysis of Wireless LANs Semi-Markov Process based Model for Performance Analysis of Wireless LANs Murali Krishna Kadiyala, Diti Shikha, Ravi Pendse, and Neeraj Jaggi Deartment of Electrical Engineering and Comuter Science Wichita

More information

Collective Communication: Theory, Practice, and Experience. FLAME Working Note #22

Collective Communication: Theory, Practice, and Experience. FLAME Working Note #22 Collective Communication: Theory, Practice, and Exerience FLAME Working Note # Ernie Chan Marcel Heimlich Avi Purkayastha Robert van de Geijn Setember, 6 Abstract We discuss the design and high-erformance

More information

The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing

The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing Mikael Taveniku 2,3, Anders Åhlander 1,3, Magnus Jonsson 1 and Bertil Svensson 1,2

More information

To appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree

To appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree To aear in IEEE TKDE Title: Efficient Skyline and To-k Retrieval in Subsaces Keywords: Skyline, To-k, Subsace, B-tree Contact Author: Yufei Tao (taoyf@cse.cuhk.edu.hk) Deartment of Comuter Science and

More information

Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication

Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication Using Permuted States and Validated Simulation to Analyze Conflict Rates in Otimistic Relication An-I A. Wang Comuter Science Deartment Florida State University Geoff H. Kuenning Comuter Science Deartment

More information

FIELD-programmable gate arrays (FPGAs) are quickly

FIELD-programmable gate arrays (FPGAs) are quickly This article has been acceted for inclusion in a future issue of this journal Content is final as resented, with the excetion of agination IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS

More information

Randomized algorithms: Two examples and Yao s Minimax Principle

Randomized algorithms: Two examples and Yao s Minimax Principle Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum

More information

Figure 8.1: Home age taken from the examle health education site (htt:// Setember 14, 2001). 201

Figure 8.1: Home age taken from the examle health education site (htt://  Setember 14, 2001). 201 200 Chater 8 Alying the Web Interface Profiles: Examle Web Site Assessment 8.1 Introduction This chater describes the use of the rofiles develoed in Chater 6 to assess and imrove the quality of an examle

More information

Near-Optimal Routing Lookups with Bounded Worst Case Performance

Near-Optimal Routing Lookups with Bounded Worst Case Performance Near-Otimal Routing Lookus with Bounded Worst Case Performance Pankaj Guta Balaji Prabhakar Stehen Boyd Deartments of Electrical Engineering and Comuter Science Stanford University CA 9430 ankaj@stanfordedu

More information

Extracting Optimal Paths from Roadmaps for Motion Planning

Extracting Optimal Paths from Roadmaps for Motion Planning Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu

More information

Phase Transitions in Interconnection Networks with Finite Buffers

Phase Transitions in Interconnection Networks with Finite Buffers Abstract Phase Transitions in Interconnection Networks with Finite Buffers Yelena Rykalova Boston University rykalova@bu.edu Lev Levitin Boston University levitin@bu.edu This aer resents theoretical models

More information

Record Route IP Traceback: Combating DoS Attacks and the Variants

Record Route IP Traceback: Combating DoS Attacks and the Variants Record Route IP Traceback: Combating DoS Attacks and the Variants Abdullah Yasin Nur, Mehmet Engin Tozal University of Louisiana at Lafayette, Lafayette, LA, US ayasinnur@louisiana.edu, metozal@louisiana.edu

More information

An Indexing Framework for Structured P2P Systems

An Indexing Framework for Structured P2P Systems An Indexing Framework for Structured P2P Systems Adina Crainiceanu Prakash Linga Ashwin Machanavajjhala Johannes Gehrke Carl Lagoze Jayavel Shanmugasundaram Deartment of Comuter Science, Cornell University

More information

Collective communication: theory, practice, and experience

Collective communication: theory, practice, and experience CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Comutat.: Pract. Exer. 2007; 19:1749 1783 Published online 5 July 2007 in Wiley InterScience (www.interscience.wiley.com)..1206 Collective

More information

A Model-Adaptable MOSFET Parameter Extraction System

A Model-Adaptable MOSFET Parameter Extraction System A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313

More information

Construction of Irregular QC-LDPC Codes in Near-Earth Communications

Construction of Irregular QC-LDPC Codes in Near-Earth Communications Journal of Communications Vol. 9, No. 7, July 24 Construction of Irregular QC-LDPC Codes in Near-Earth Communications Hui Zhao, Xiaoxiao Bao, Liang Qin, Ruyan Wang, and Hong Zhang Chongqing University

More information

New Techniques for Making Transport Protocols Robust to Corruption-Based Loss

New Techniques for Making Transport Protocols Robust to Corruption-Based Loss New Techniques for Making Transort Protocols Robust to Corrution-Based Loss Wesley M. Eddy NASA GRC / Verizon weddy@grc.nasa.gov Shawn Ostermann Ohio University ostermann@eecs.ohiou.edu Mark Allman ICSI

More information

Brief Contributions. A Geometric Theorem for Network Design 1 INTRODUCTION

Brief Contributions. A Geometric Theorem for Network Design 1 INTRODUCTION IEEE TRANSACTIONS ON COMPUTERS, VOL. 53, NO., APRIL 00 83 Brief Contributions A Geometric Theorem for Network Design Massimo Franceschetti, Member, IEEE, Matthew Cook, and Jehoshua Bruck, Fellow, IEEE

More information

EE678 Application Presentation Content Based Image Retrieval Using Wavelets

EE678 Application Presentation Content Based Image Retrieval Using Wavelets EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective

More information

TCP VON: Joint Congestion Control and Online Network Coding for Wireless Networks

TCP VON: Joint Congestion Control and Online Network Coding for Wireless Networks TCP VON: Joint Congestion Control and Online Network Coding for Wireless Networks Wei Bao, Vahid Shah-Mansouri, Vincent W.S. Wong, and Victor C.M. Leung Deartment of Electrical and Comuter Engineering

More information

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical

More information

Autonomic Physical Database Design - From Indexing to Multidimensional Clustering

Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Stehan Baumann, Kai-Uwe Sattler Databases and Information Systems Grou Technische Universität Ilmenau, Ilmenau, Germany

More information

Directed File Transfer Scheduling

Directed File Transfer Scheduling Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was

More information

A 2D Random Walk Mobility Model for Location Management Studies in Wireless Networks Abstract: I. Introduction

A 2D Random Walk Mobility Model for Location Management Studies in Wireless Networks Abstract: I. Introduction A D Random Walk Mobility Model for Location Management Studies in Wireless Networks Kuo Hsing Chiang, RMIT University, Melbourne, Australia Nirmala Shenoy, Information Technology Deartment, RIT, Rochester,

More information

A power efficient flit-admission scheme for wormhole-switched networks on chip

A power efficient flit-admission scheme for wormhole-switched networks on chip A ower efficient flit-admission scheme for wormhole-switched networks on chi Zhonghai Lu, Li Tong, Bei Yin and Axel Jantsch Laboratory of Electronics and Comuter Systems Royal Institute of Technology,

More information

Lecture 8: Orthogonal Range Searching

Lecture 8: Orthogonal Range Searching CPS234 Comutational Geometry Setember 22nd, 2005 Lecture 8: Orthogonal Range Searching Lecturer: Pankaj K. Agarwal Scribe: Mason F. Matthews 8.1 Range Searching The general roblem of range searching is

More information

A Metaheuristic Scheduler for Time Division Multiplexed Network-on-Chip

A Metaheuristic Scheduler for Time Division Multiplexed Network-on-Chip Downloaded from orbit.dtu.dk on: Jan 25, 2019 A Metaheuristic Scheduler for Time Division Multilexed Network-on-Chi Sørensen, Rasmus Bo; Sarsø, Jens; Pedersen, Mark Ruvald; Højgaard, Jasur Publication

More information

10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1

10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1 10 File System 1 We will examine this chater in three subtitles: Mass Storage Systems OERATING SYSTEMS FILE SYSTEM 1 File System Interface File System Imlementation 10.1.1 Mass Storage Structure 3 2 10.1

More information

Experimental Comparison of Shortest Path Approaches for Timetable Information

Experimental Comparison of Shortest Path Approaches for Timetable Information Exerimental Comarison of Shortest Path roaches for Timetable Information Evangelia Pyrga Frank Schulz Dorothea Wagner Christos Zaroliagis bstract We consider two aroaches that model timetable information

More information

AN early generation of unstructured P2P systems is

AN early generation of unstructured P2P systems is 1078 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 16, NO. 11, NOVEMBER 2005 Dynamic Layer Management in Suereer Architectures Li Xiao, Member, IEEE, Zhenyun Zhuang, and Yunhao Liu, Member,

More information

Parallel Construction of Multidimensional Binary Search Trees. Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka

Parallel Construction of Multidimensional Binary Search Trees. Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka Parallel Construction of Multidimensional Binary Search Trees Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka School of CIS and School of CISE Northeast Parallel Architectures Center Syracuse

More information

Optimizing the Number of Fog Nodes for Cloud-Fog-Thing Networks

Optimizing the Number of Fog Nodes for Cloud-Fog-Thing Networks 1 Otimizing the Number of Fog Nodes for Cloud-Fog-Thing Networks Eren Balevi, and Richard D. Gitlin Deartment of Electrical Engineering, University of South Florida Tama, Florida 336, USA erenbalevi@mail.usf.edu,

More information

Toward Optimal Network Fault Correction via End-to-End Inference

Toward Optimal Network Fault Correction via End-to-End Inference Toward Otimal Network Fault Correction via End-to-End Inference Patrick P. C. Lee, Vishal Misra, and Dan Rubenstein Abstract We consider an end-to-end aroach of inferring network faults that manifest in

More information

A network performance-based device driven communication scheme for 5G networks

A network performance-based device driven communication scheme for 5G networks Received: 29 October 217 Revised: 26 December 217 Acceted: 27 December 217 DOI: 1.12/itl2.27 LETTER A network erformance-based device driven communication scheme for 5G networks Sanjay K. Biswash Dushantha

More information

A Novel Iris Segmentation Method for Hand-Held Capture Device

A Novel Iris Segmentation Method for Hand-Held Capture Device A Novel Iris Segmentation Method for Hand-Held Cature Device XiaoFu He and PengFei Shi Institute of Image Processing and Pattern Recognition, Shanghai Jiao Tong University, Shanghai 200030, China {xfhe,

More information

Quality-of-Service Routing with Two Concave Constraints

Quality-of-Service Routing with Two Concave Constraints This full text aer was eer reviewed at the direction of IEEE Communications ociety subject matter exerts for ublication in the ICC 008 roceedings. Quality-of-ervice Routing with Two Concave Constraints

More information

Design Trade-offs in Customized On-chip Crossbar Schedulers

Design Trade-offs in Customized On-chip Crossbar Schedulers J Sign Process Syst () 8:9 8 DOI.7/s-8--x Design Trade-offs in Customized On-chi Crossbar Schedulers Jae Young Hur Stehan Wong Todor Stefanov Received: October 7 / Revised: June 8 / cceted: ugust 8 / Published

More information

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism Erlin Yao, Mingyu Chen, Rui Wang, Wenli Zhang, Guangming Tan Key Laboratory of Comuter System and Architecture Institute

More information

Process and Measurement System Capability Analysis

Process and Measurement System Capability Analysis Process and Measurement System aability Analysis Process caability is the uniformity of the rocess. Variability is a measure of the uniformity of outut. Assume that a rocess involves a quality characteristic

More information

Equality-Based Translation Validator for LLVM

Equality-Based Translation Validator for LLVM Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented

More information

QSRED, An Algorithm To Solve The Mismatch Between The Microscopic and Macroscopic Behavior of RED Gateways

QSRED, An Algorithm To Solve The Mismatch Between The Microscopic and Macroscopic Behavior of RED Gateways IJCSNS International Journal of Comuter Science Network Security, VOL.10 No.11, November 2010 63 QSRED, An Algorim To Solve The Mismatch Between The Microscoic Macroscoic Behavior of RED Gateways Nabhan

More information

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics structure arises in many alications of geometry. The dual structure, called a Delaunay triangulation also has many interesting roerties. Figure 3: Voronoi diagram and Delaunay triangulation. Search: Geometric

More information

A GPU Heterogeneous Cluster Scheduling Model for Preventing Temperature Heat Island

A GPU Heterogeneous Cluster Scheduling Model for Preventing Temperature Heat Island A GPU Heterogeneous Cluster Scheduling Model for Preventing Temerature Heat Island Yun-Peng CAO 1,2,a and Hai-Feng WANG 1,2 1 School of Information Science and Engineering, Linyi University, Linyi Shandong,

More information

Analytical Modelling and Message Delay Performance Evaluation of the IEEE MAC Protocol

Analytical Modelling and Message Delay Performance Evaluation of the IEEE MAC Protocol Analytical Modelling and Message Delay Performance Evaluation of the IEEE 8.6 MAC Protocol Luís F. M. de Moraes and Danielle Loes F. G. Vieira Laboratório de Redes de Alta Velocidade - Universidade Federal

More information

Hardware-Accelerated Formal Verification

Hardware-Accelerated Formal Verification Hardare-Accelerated Formal Verification Hiroaki Yoshida, Satoshi Morishita 3 Masahiro Fujita,. VLSI Design and Education Center (VDEC), University of Tokyo. CREST, Jaan Science and Technology Agency 3.

More information

EP2200 Performance analysis of Communication networks. Topic 3 Congestion and rate control

EP2200 Performance analysis of Communication networks. Topic 3 Congestion and rate control EP00 Performance analysis of Communication networks Toic 3 Congestion and rate control Congestion, rate and error control Lecture material: Bertsekas, Gallager, Data networks, 6.- I. Kay, Stochastic modeling,

More information

10. Parallel Methods for Data Sorting

10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting... 1 10.1. Parallelizing Princiles... 10.. Scaling Parallel Comutations... 10.3. Bubble Sort...3 10.3.1. Sequential Algorithm...3

More information

APPLICATION OF PARTICLE FILTERS TO MAP-MATCHING ALGORITHM

APPLICATION OF PARTICLE FILTERS TO MAP-MATCHING ALGORITHM APPLICATION OF PARTICLE FILTERS TO MAP-MATCHING ALGORITHM Pavel Davidson 1, Jussi Collin 2, and Jarmo Taala 3 Deartment of Comuter Systems, Tamere University of Technology, Finland e-mail: avel.davidson@tut.fi

More information

Patterned Wafer Segmentation

Patterned Wafer Segmentation atterned Wafer Segmentation ierrick Bourgeat ab, Fabrice Meriaudeau b, Kenneth W. Tobin a, atrick Gorria b a Oak Ridge National Laboratory,.O.Box 2008, Oak Ridge, TN 37831-6011, USA b Le2i Laboratory Univ.of

More information

The Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005*

The Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005* The Anubis Service Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL-2005-72 June 8, 2005* timed model, state monitoring, failure detection, network artition Anubis is a fully

More information

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal

More information

Object and Native Code Thread Mobility Among Heterogeneous Computers

Object and Native Code Thread Mobility Among Heterogeneous Computers Object and Native Code Thread Mobility Among Heterogeneous Comuters Bjarne Steensgaard Eric Jul Microsoft Research DIKU (Det. of Comuter Science) One Microsoft Way University of Coenhagen Redmond, WA 98052

More information

Information Flow Based Event Distribution Middleware

Information Flow Based Event Distribution Middleware Information Flow Based Event Distribution Middleware Guruduth Banavar 1, Marc Kalan 1, Kelly Shaw 2, Robert E. Strom 1, Daniel C. Sturman 1, and Wei Tao 3 1 IBM T. J. Watson Research Center Hawthorne,

More information

Privacy Preserving Moving KNN Queries

Privacy Preserving Moving KNN Queries Privacy Preserving Moving KNN Queries arxiv:4.76v [cs.db] 4 Ar Tanzima Hashem Lars Kulik Rui Zhang National ICT Australia, Deartment of Comuter Science and Software Engineering University of Melbourne,

More information

Complexity analysis and performance evaluation of matrix product on multicore architectures

Complexity analysis and performance evaluation of matrix product on multicore architectures Comlexity analysis and erformance evaluation of matrix roduct on multicore architectures Mathias Jacquelin, Loris Marchal and Yves Robert École Normale Suérieure de Lyon, France {Mathias.Jacquelin Loris.Marchal

More information

Resource Allocation for QoS Provisioning in Wireless Ad Hoc Networks

Resource Allocation for QoS Provisioning in Wireless Ad Hoc Networks Resource Allocation for QoS Provisioning in Wireless Ad Hoc Networks Mung Chiang, Daniel ONeill, David Julian andstehenboyd Electrical Engineering Deartment Stanford University, CA 94305, USA Abstract-

More information

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China

More information

3D Surface Simplification Based on Extended Shape Operator

3D Surface Simplification Based on Extended Shape Operator 3D Surface Simlification Based on Extended Shae Oerator JUI-LIG TSEG, YU-HSUA LI Deartment of Comuter Science and Information Engineering, Deartment and Institute of Electrical Engineering Minghsin University

More information

arxiv: v1 [cs.mm] 18 Jan 2016

arxiv: v1 [cs.mm] 18 Jan 2016 Lossless Intra Coding in with 3-ta Filters Saeed R. Alvar a, Fatih Kamisli a a Deartment of Electrical and Electronics Engineering, Middle East Technical University, Turkey arxiv:1601.04473v1 [cs.mm] 18

More information

Constrained Path Optimisation for Underground Mine Layout

Constrained Path Optimisation for Underground Mine Layout Constrained Path Otimisation for Underground Mine Layout M. Brazil P.A. Grossman D.H. Lee J.H. Rubinstein D.A. Thomas N.C. Wormald Abstract The major infrastructure comonent reuired to develo an underground

More information

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems Matlab Virtual Reality Simulations for otimizations and raid rototying of flexible lines systems VAMVU PETRE, BARBU CAMELIA, POP MARIA Deartment of Automation, Comuters, Electrical Engineering and Energetics

More information

EDGE: A ROUTING ALGORITHM FOR MAXIMIZING THROUGHPUT AND MINIMIZING DELAY IN WIRELESS SENSOR NETWORKS

EDGE: A ROUTING ALGORITHM FOR MAXIMIZING THROUGHPUT AND MINIMIZING DELAY IN WIRELESS SENSOR NETWORKS EDGE: A ROUTING ALGORITHM FOR MAXIMIZING THROUGHPUT AND MINIMIZING DELAY IN WIRELESS SENSOR NETWORKS Shuang Li, Alvin Lim, Santosh Kulkarni and Cong Liu Auburn University, Comuter Science and Software

More information

Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern

Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern Face Recognition Based on Wavelet Transform and Adative Local Binary Pattern Abdallah Mohamed 1,2, and Roman Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville, Louisville,

More information

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY Andrew Lam 1, Steven J.E. Wilton 1, Phili Leong 2, Wayne Luk 3 1 Elec. and Com. Engineering 2 Comuter Science

More information

Single character type identification

Single character type identification Single character tye identification Yefeng Zheng*, Changsong Liu, Xiaoqing Ding Deartment of Electronic Engineering, Tsinghua University Beijing 100084, P.R. China ABSTRACT Different character recognition

More information

A Reconfigurable Architecture for Quad MAC VLIW DSP

A Reconfigurable Architecture for Quad MAC VLIW DSP A Reconfigurable Architecture for Quad MAC VLIW DSP Sangwook Kim, Sungchul Yoon, Jaeseuk Oh, Sungho Kang Det. of Electrical & Electronic Engineering, Yonsei University 132 Shinchon-Dong, Seodaemoon-Gu,

More information

Stereo Disparity Estimation in Moment Space

Stereo Disparity Estimation in Moment Space Stereo Disarity Estimation in oment Sace Angeline Pang Faculty of Information Technology, ultimedia University, 63 Cyberjaya, alaysia. angeline.ang@mmu.edu.my R. ukundan Deartment of Comuter Science, University

More information

The Research on Curling Track Empty Value Fill Algorithm Based on Similar Forecast

The Research on Curling Track Empty Value Fill Algorithm Based on Similar Forecast Research Journal of Alied Sciences, Engineering and Technology 6(8): 1472-1478, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: October 31, 2012 Acceted: January

More information