Maximizing Timely Content Advertising in DTNs

Size: px
Start display at page:

Download "Maximizing Timely Content Advertising in DTNs"

Transcription

1 Maxmzng Tmely Content Advertsng n DTs Wexong Rao, Ka Zhao, Yan Zhang, Pan Hu and Sasu Tarkoma Department of Computer Scence Smula Research Laboratory Deutsche Telekom Laboratores Unversty of Helsnk, Fnland orway Germany {frstname.lastname}@cs.helsnk.f yanzhang@smula.no pan.hu@telekom.de Abstract Many applcatons, such as product promoton advertsement and traffc congeston notfcaton, beneft from the opportunstc content exchange n Delay Tolerant etworks (DTs). An mportant requrement of such applcatons s tmely delvery. However, the ntermttent connectvty of DTs may sgnfcantly delay content exchange and cannot guarantee tmely delvery. The state-of-the-arts capture the moblty patterns or socal propertes of moble devces. However, there s lttle optmzaton n terms of the delvered content. Wthout such optmzaton, the content demanded by a large number of subscrbers could follow the same forwardng path as the content by only one subscrber. To address the challenge, n ths paper, we separate content routng from content forwardng. For content routng, we leverage content propertes to derve an optmal routng hop count for each content n order to maxmze the number of nodes whch receve demanded content. ext, for tmely forwardng, we develop node utltes to capture nterests and moblty patterns of moble devces for the selecton of content carrers. The dstrbuted greedy relay scheme,, leverages the optmal routng hop count and developed utltes to tmely relay content to the needed nodes as fast as possble. Illustratve results show that s able to acheve comparable delvery rato as the Epdemc but wth much lower overhead. I. Introducton In Delay Tolerant etworks (DTs), whenever moble devces (PDAs, vehcles, moble phones, etc.) encounter each other, they exchange content va short-range communcatons (e.g., Bluetooth or WF). Thus, many applcatons and servces, such as product promoton advertsement and traffc congeston notfcaton, beneft from the opportunstc content exchange. It s useful n the areas where wreless networks do not cover, wreless access s blocked, or cellular networks are congested [1]. Opportunstc communcaton thus helps expandng the network coverage, wthout buldng dedcated network nfrastructures. An mportant requrement assocated wth exchanged content s freshness. That s, besdes delverng the content towards the needed users, we further expect the content to be tmely delvered. For example, tmely delvery of certan product promoton news can be crtcal, e.g., at least before the end day of the product promoton perod. Otherwse, outdated content, though delvered, s meanngless to users. However, opportunstc delvery fashon essentally conflcts the freshness requrement. Servce provders expect to maxmze the number of potental users who can tmely receve content, and hence the tems must be delvered n tme. On the other hand, due to the ntermttent connectvty of DTs, The last author s also afflated wth Department of Computer Scence and Engneerng, Aalto Unversty, Fnland the opportunstc exchange may experence certan delay, and cannot guarantee an expected delvery delay [4]. In ths paper, we study the problem of maxmzng the number of users who can tmely receve content. In detal, we are nspred by the topc-based model [6] to offer personalzed content subscrpton. Ths model s wdely used n many real applcatons (e.g., RSS feeds, onlne games). Subscrbers declare ther nterests by specfyng topcs nsde subscrpton condtons (called flters). An advertsement (whch precsely means a content tem n ths paper) s assocated wth a topc. An advertsement matches a flter (or a flter matches an advertsement), f and only f both the advertsement and flter contan the same topc. The state-of-the-arts [7], [11], [15], [17] leveraged moblty patterns or socal propertes of moble devces to select forwardng paths. However, there s lttle optmzaton n terms of the delvered content. Wthout such optmzaton, the content demanded by a large number of subscrbers could follow the same forwardng path as the (same) content demanded by only one subscrber. It s because the prevous work manly leveraged on the propertes of moble devces, nstead on the content propertes, to optmze the overall content routng. Real applcatons show many unque content propertes, such as correlaton between content supples and demands [16], the well-known Zpf dstrbuton [2]. Based on these content propertes, we propose a new content relay scheme, namely. Specally, dfferng from the above work, shares some smlar dea to the contentcentrc networkng [12], [13], [14]. It separates the end-toend routng (from publshers to subscrbers) from the pontto-pont forwardng among encountered nodes. After revewng related works (Secton II), we defnes the problem and hghlghts the soluton (Secton III), and make the followng contrbutons to support the novel dea of separatng the content routng from content forwardng: We develop an optmal strategy to desgn an optmal hop count for each routed content. The content wth such routng hops s expected to reach the needed nodes (Secton IV). By leveragng the developed utltes to capture the nterests and moblty patterns of moble devces (Secton V), we desgn an adaptve algorthm to select the best carrers for tmely forwardng (Secton VI). We extensvely evaluate the effcency of the over two realstc data sets and verfy that s able to acheve comparable delvery rato as the Epdemc but wth much lower overhead (Secton VII).

2 II. Related Work In the context of DT, [23] studed Epdemc routng by selectng all nodes n the network as relays. ProPHET [15] leveraged encounter hstory to predct the delvery possblty. [22] sprayed data to relays watng for contacts wth destnatons. [1] leveraged a Markovan model to develop an effcent utlty functon for content dssemnaton. [3] used the path lkelhoods to schedule packets transmtted to other peers and packets to be dropped. These works focused on capturng moblty patterns of moble devces, and all desgned for oneto-one routng. Recent works[7],[9],[11],[17] took advantage of socal behavors of moble devces to dentfy the best nformaton carrer. These works exploted socal propertes (e.g., centralty,) to support the one-to-one routng [11], [17], [3], and one-to-many routng [7], [9]. Dfferng from these works, we observe that content propertes could optmze content delvery and desgn an optmal routng hop count for each routed content. In terms of utltes for the selecton of carrers, [7], [11], [9] manly used the utltes to predct the delvery possblty of moble devces. Dfferng from these works, the man purpose of our developed utltes s to capture the nterests of moble devce (together wth ther moblty patterns). For the detals to compute the utltes, [7] dd not adopt an accumulatve utlty functon. Though havng the cumulatve contact length as edge weghts n socal networks, [11] dd not leverage such weghts for data forwardng, and [9] used the same utltes for varous content tems. Instead, our proposed utltes ncorporate the self-nterest of a specfc node and overall nterests of the whole DT, and develop a specfc utlty for each topc. In content-centrc networkng [12], [13], a communcaton network allows a user to focus on the data he or she needs, rather than havng to reference a specfc, physcal locaton where that data s to be retreved from. Dfferng from such workswththevsonforacleanslatedesgnoffutureinternet, we leverage content propertes to derve an optmal routng hop count. In addton, the prevous works [19], [] shared some smlar dea to proactvely assgn more resources (such as replcas) for popular content, but were desgned for P2P networks. III. Problem Statement and Soluton Overvew We expect DTs as complementary network communcaton technologes [1]. They help content provders delver the content (generated by the content provders) to the needed nodes and explore more potental customers. Suppose that the opportunstcally encountered devces are connected as a DT. The roles of moble devces can be publshers, subscrbers or carrers. Publshers publsh advertsements d of specfc topcs t. Subscrbers regster subscrpton flters (contanng defned topcs t ) to expect the advertsements of t. In addton to publshers and subscrbers, moble devces can act as carrers to relay advertsements. When moble devces encounter each other, the carred advertsements are then exchanged, and fnally relayed from the publshers to the subscrbers wth the help of ntermedate carrers. Due to the dverse advertsements and nterests, publshers and subscrbers defne ther favorte topcs. Suppose there exst a total number of T topcs. For a specfc topc t (1 T), we assume that nodes are nterested n t (f a node regsters a flter contanng t, we say that the node s nterested n t ). We defne the demand rate p of a topc t to be the rato between and,.e. p = /. Let M denote the total number of advertsements. We next defne the supply rate q wth respect to (w.r.t) a topc t, and thus q M advertsements are assocated wth t. Gven the above notatons, we defne the followng problem: Problem 1 Wthn a gven tme perod P, we want to desgn an advertsement relay scheme to maxmze the number of nodes whch can receve the matchng advertsements. In Problem 1, an advertsement matches a node f the node regsters a flter havng the same topcs as the advertsement. Gven Problem 1, our basc dea s to separate content routng from content forwardng. For content routng, we leverage content propertes to desgn an optmal hop count for each routed content. ext, for content forwardng, we develop the node utltes to capture nterests and moblty patterns of moble devces. Then the content forwardng leverages the utltes to select the best carrers for routed content. In detal, n Secton IV, for each advertsement d (wth a topc t ), develops an optmal number X of opportunstc encounters for d. Intutvely, the optmal number X can be treated as the overall routng hop count to route d from publshers to subscrbers. That s, when creates only one copy for d, X s the number of hops (or TTL) to route the d towards the needed nodes. When creates multple copes of some d ( d ), X s the accumulatve number of hops to route all copes of the d. Thus, adaptvely allows ether the uncast (e.g., for d ) or multcast (e.g., for d ) to maxmze tmely content advertsng. The key of s to leverage the content propertes and proactvely assgn more hop count for popular advertsements whch are hghly demanded by a large number of subscrbers. Thus, more nodes act as the carrers to route the popular advertsements, and subscrbers tmely receve the needed advertsements. ote that the developed X n Secton IV does not consder moblty patterns of DT nodes. Thus, Secton V desgns the utltes to capture the moblty patterns and nterests of moble devces. Then, based on the utlty of each node, selects the best carrer for each d to tmely forward d towards the needed nodes. Specfcally, we use a vector U j to represent the utltes of a node n j. Gven T topcs, U j contans T elements. For a topc t (1 T), the element u j U j represents how good the node n j can successfully relay the advertsements wth the topc t to the needed nodes. The vector U j and the element u j are named as the vector utlty and an element utlty, respectvely. Based on the element utltes, can dentfy () the nodes that are nterested n the topc t and () how fast the encountered node can tmely forward d to the needed nodes.

3 Symbol T M p q d H X H X Meanng Total number of topcs Total number of advertsements Total number of nodes n DT Demandng rate of a topc t (1 T) Supplyng rate of a topc t (1 T) An advertsement assocated wth a topc t (1 T) the set of nodes nterested n t, wth the cardnalty umber of nodes whch can successfully receve d umber of requred encounters to relay d to the needed nodes Total number of nodes whch receve matchng advertsements Total number of opportunstc encounters to relay advertsements TABLE I Meanngs of man symbols used Gven the above two technques, n Secton VI, selects the best carrers of each advertsement, such that an advertsementd andtscopesexperence X encountersasfast as possble. We prove that the problem of selectng the best carrers to relay advertsements s P-hard. Then, we propose the algorthm detals of. IV. Optmal Advertsement Relay Strategy We frst hghlght the general dea as follows. We defne the event that two nodes encounter as an encounter event, no matter moblty pattern and socal propertes of moble devces. For example, gven three nodes n j, n j and n j, frst n j encounters n j after 1 day, and then n j encounters n j after only 1 mnute. The two occurred events are treated equally, because the occurrence of such events depends upon whether or not two nodes encounter, rather than the experenced perod or encounter frequency. Based on the encounter events, we derve a functon f( ) between the needed encounters to relay an advertsement and the expectaton of the number of nodes whch can successfully receve the matchng advertsements (Secton IV-A). ext, consderng the overall advertsements, we develop a strategy to ensure that each advertsement experences an optmal number of encounters, such that we can maxmze the total number of nodes whch can successfully receve matchng advertsements (Secton IV-B). Essentally, the technques of ths secton are to explot the propertes of advertsements (.e., the demandng and supplyng rates), and do not consder the effect of moblty pattern of moble devces. Such patterns are consdered by the developed utltes for the selecton of carrers (Secton V). Table I summarzes the man symbols used n ths secton. A. Probablstc Advertsement Relay Gven an advertsement d wth a topc t, we denote to be the set of the nodes that expect the advertsement d (.e., = p s the cardnalty of ). For a specfc encounter event among all encounter events, we compute the probabltyρ that the encounter successfully relays an advertsement d to a node nsde. Suppose a node carryng d s opportunstcally encounterng another node, whch could be a member node nsde or not. Among the nodes n the DT, nodes are the members of. Thus, the average probabltyρ s, because () the defned encounter events depend only upon whether or not nodes encounter, nstead of the moblty patterns and socal propertes of moble devces and ()ρ now depends only upon the dstrbuton of flters among the nodes of DT. Based on the above analyss, the probabltyρ 1 of a specfc encounter to relay d to the frst new node nsde s, because any node nsde could be the node to receve d. ext, the probabltyρ 2 that a specfc encounter successfullyrelaysd tothesecond newnoden s (1 1 ),where () s the probablty of a specfc encounter to successfully relay d to any node nsde and () (1 1 ) s the probablty that among the nodes, any of those nodes (except the frst new node) receves d. The reducton of 1/ s to elmnate the stuaton that d s duplcately forwarded to the frst new node that has already receved d. Smlarly, the probablty ρ j that a specfc encounter to successfully relay d to the j-th new node nsde s ρ= j j 1 (1 ) (1) In Equaton (1), the tem (1 j 1 ) represents the probablty that any of the nodes nsde the set (except the prevous (j 1) nodes) can receve the advertsement. Gven the probabltyρ j, the tral that a specfc encounter successfully relays d to the j-th new node nsde can be treated as a geometrc probablty dstrbuton wth the parameterρ j. Thus, the expected number of opportunstc encounters needed to successfully relay d to the j-th new node s X j = 1 ρ j = j+1 = j+1 Suppose our advertsement relay strategy wll ensure that d experences X opportunstc encounters towards the nodes n. We are nterested n the number of nodes n that can successfully receve d. Let H denote the number of nodes n that can successfully receve d. Then, gven the number X, we compute H as follows: H H X j = j=1 j=1 j+1 = X (3) For Equaton (3), we make the followng transformaton: H j=1 j+1 = 1 H j j=1 j=1 1 j (2) ln H (4) The above transformaton (wth H < ) utlzes the result that the summaton 1 j=1 j,.e., the harmonc number, s approxmated by ln. Smlar reasonng apples for H 1 j=1 j and t s approxmated by ln( H ). Consequently, we can derve the functon f( ) between H and X as follows: Theorem 1 If our relay strategy ensures that an advertsement d assocated wth t can experence X opportunstc encounters,wehavethefunctonbetween ( H and X asfollows. H = p 1 e X ). Proof: Based on Equatons (2-4), we obtan X = ln H, and then valdate the correctness of the theorem. In case of X = log, we have H =.

4 B. Optmal Relay Strategy In ths subsecton, consderng the overall advertsements assocated wth T topcs, we develop an optmal relay strategy to maxmze the total number of nodes whch can successfully receve matchng advertsements. By Theorem 1, f an advertsement d experences X opportunstc encounters, H nodes can successfully receve d. We consder the effect of the supplyng rate q as follows. Suppose that among all of the M dstnct advertsements, the topc t s suppled wth q M advertsements. When such advertsements are ndependently publshed by publshers, by q M X opportunstc encounters, q M H nodes can successfully receve matchng advertsements. Gven the total T topcs, the number of nodes whch receve the matchng advertsements, denoted as H, s computed by: H= T [ ] T [ ] q M H = M q p (1 e X ) =1 On the other hand, moble devces opportunstcally encounter each other, and the occurrence of the content exchange depends on whether or not such devces encounter. Therefore, the overall opportunstc encounters to relay advertsements are decded by the moblty pattern of moble devces (and other parameters lke battery, etc.). Thus, wthn a gven tme perod P, the total number of such opportunstc encounters s a gven number X. Hence, we consder that the constrant that the total number of encounters,.e., T =1 (q M X ), s assocated wth at most X encounters. Formally, gven the optmzaton problem to maxmze the H n Equaton (5) wth the constrant T =1 (q M X )=X, we have the followng theorem: Theorem 2 Gventheconstrant T =1 (q M X )=X,thetotal number H of nodes recevng the matchng advertsements s maxmzed when X = X M +lnp T =1 (q lnp ). To prove Theorem 2, we leverage the Lagrange multpler method to obtan the optmal X n terms of p and q. Due to the space lmt, we skp the detals of such proof. We refer nterested readers to the techncal report [21] for the detals. Based on Theorem 2, we have the followng dscusson. When p s larger,.e., more nodes are nterested n t, the tem lnp s a smaller negatve value, thus resultng n a larger X. In terms of physcal nterpretaton, f d s demanded by more nodes, the relay strategy should ensure that more nodes act as the carrers to relay d, and the nodes carryng d encounter more nodes n. When X,M and are gven, X depends on the dstrbuton of p and q. When the dstrbuton of p and q s more skewed, T =1 (q lnp ) and X become smaller. Ths means that the skewed dstrbuton functons of p and q help use smaller X to relay advertsements to the nodes. Many real applcatons ndcate a skewed dstrbuton of p and q [18], [6], whch favors the optmzaton strategy. =1 (5) The soluton to the optmzaton problem n Theorem 2 needs to know the values of the parameters p, q, etc, whch can be acqured by content provders as follows. Frst, snce the content s generated by content provders, the provders can easly compute the parameters (e.g., q, etc.) w.r.t. the content. To compute the parameters (e.g., p, etc.) w.r.t. flters, subscrbers can be requred to regster subscrpton flters to the regstraton server hosted by the content provders(that s possble because we expect that the DT s as a complementary network communcaton technologes). Besdes, the dstrbuted soluton,e.g.,[11],helpsapproxmatetheparameters p andq. Fnally, for the content wth low p but requred to be urgently delvered to the needed nodes (such as the alarm of urgent events), we assgn the content wth a hgh prorty. Then, the content s not evcted by the buffer manager (whch uses the least recent used (LRU) polcy to evct expred tems) and s tmely relayed to the encountered nodes. V. Relay Utltes In ths secton, we gve the detals of the developed utltes, whch capture the subscrpton nterests and moblty pattern of moble devces, for the selecton of node carrers. A. Data Structure For a node n j, we use a vector U j (called vector utlty) to represent n j s utltes. To capture moble devces nterests, U j contans T elements (due to the exstence of T topcs), and each element s assocated wth a topc. The element u j U j (1 T), called element utlty, ndcates the goodness of n j to successfully relay an advertsement d (wth a topc t ) to the nodes n. A larger u j ndcates that n j has more chance to successfully relay d to the nodes n. The proposed utltes have two unque propertes to capture the nterests of moble devces. Among all elements n U j, the one wth the largest value s assocated wth the topc t that node n j tself s nterested n. Thus, f the utlty U j s avalable to a thrd node n k, by dentfyng the largest element nsde U j, n k then dentfes that n j s nterested n the topc assocated wth such an element, before n k communcates wth n j. Ths property s useful for to tmely relay d towards the needed nodes. Except the element wth a largest value, the remanng elements n U j accumulate the nterests of the whole nodes n the DT. That s, f a topc t s popularly regstered n many nodes of DT, the assocated element s larger. In addton, the utlty U j ncorporates the moblty pattern (e.g., encounterng rate) of n j. In Fgure 1, the leftmost column shows the utlty vector of a node n 1. For the 4 topcs t A...t D, n 1 s assumed to be nterested n t A. Thus, the element of t A has the largest value.614, ndcatng that n 1 s self nterested n t A. In addton, snce t B s popularly regstered n 3 other nodes (n 2,n 3 and n 4 ), the assocated element utlty,.271, s also larger than the two remanng element utltes (.e.,.71 and.42). In detal, for a specfc topc t, the element utlty u j has consdered the followng cases. () The node n j tself s

5 Fg. 1. An example to compute the utltes of n 1 for 4 topcs t A...t D nterested n t, and () n j, though not nterested n t, can act as the carrer of d to successfully relay d towards. Therefore, we need the followng nformaton to compute u j. For the nterest of the node n j tself, we use a /1 vector oft elementsr j to represent ts own nterest. The element r j pertanng to t s equal to 1 (.e., r= j 1), ff the node n j s regstered wth a flter defnng t. The utltes U k of the nodes (say n k ) that n j prevously encountered wthn a specfc perod P. U k (resp. U j ) s avalable to n k (resp. n j ) by exchangng the utltes when n j and n k encounter each other. The encounterng rate f j,k of two moble devces n j and n k. The value of f j,k captures the frequency that n j and n k ever encountered (note that f j,k can be adapted by consderng the other aspects of n j and n k, such as the battery level, socal propertes and network bandwdth). In Fgure 1, the 2nd leftmost column ndcates the /1 vector n terms of n 1 s self-nterest: the element pertanng to t A s 1 becausen 1 snterestednthetopct A.Thethreecolumnsfrom the 3rd leftmost column to the rghtmost column n Fgure 1 show the utltes of 3 prevously encountered nodes n 2, n 3 and n 4, respectvely. The tems above the three columns show the encounterng frequency (.e., 1, 4, and 2) between n 1 and the three nodes nsde a perod. Followng [7], the nodes that ever frequently encountered have hgh chance to encounter agan n the future. Thus, f j,k helps predct the chance that n j and n k wll encounter each other. More other technques (e.g., by leveragng spatal and socal propertes) can be ncorporated for further mprovement. Though the computaton of the vector utlty U j does need all above tems, the followng subsecton wll show that t s unnecessary for n j to mantan u k and f j,k for all prevously encounterednodesn k.thus,weavodtheexpensve mantenance overhead, partcularly when n j encountered a large number of nodes. B. Detals to compute utltes Suppose that n j prevously encountered K nodes n k (1 k K) nsde a wndow (e.g., a sldng wndow of 6 hours). To compute U j, the accumulaton technque captures the overall nterests of the whole DT, and the normalzaton technque captures the self-nterests of n j. In detal, the node n j uses the followng four steps to compute U j. (1) Overall Accumulaton: For all of these K nodes n k that n j encounters, we compute the overall utlty U () j and ts element u () j. For an element u () j n terms of a topc t, we accumulate u () j = K k=1 (f j,k u k ) for all such nodes n k. For example, n Fgure 1, we compute u () j for the topc t A as 1.6 (= ). Smlarly, we can compute the overall element utltes for other 3 topcs t B, t C and t D as 3.8, 1. and.5, respectvely. (2) Overall ormalzaton: We normalze the utlty U () j to U() j by computng the element u() j = u () j / T =1 u () j. Followng the above example, for a topc t A, ts normalzed overall utlty s 1.6/( )=1.6/7.. (3) Self Accumulaton: Based on the normalzed overall utlty U() j and the self-nterest r j, we compute the utlty U j by settng ts element u j to u j r = j +u()j j T=1 r j +u()j T=1 r j + T =1 u() j = r +1.. For example for t A, u j t A = 1+1.6/ (4) Self ormalzaton: we fnally normalze the utlty U j to U j by u= j u j / T =1 u j (e.g., for t A, u j t A =.614). Durng the above steps, step 1 accumulates the utltes of the prevously encountered nodes n k to capture the overall nterests of the nodes n k, such that n j acts as the carrer to relay d from n k towards the nodes ntermedately gong through n j. ext, step 3 accumulates the self-nterests of n j wth the overall utltes. Thus, the accumulaton ensures that U j can measure the goodness to relay d towards n j tself and other nterested nodes. In addton, gven the self-nterests wth r j = 1, the normalzaton of steps 2 and 4 ensures that among all elements n U j, the element u j s assocated wth the largest value. Ths property helps relay the advertsement d towards those nodes n va the greedy polcy n the proposed scheme. As mentoned prevously, t s unnecessary to mantan the u k and f j,k for all prevously encountered nodes n k. Instead, we only mantan the accumulated overall utlty U () j (see the above step 1). When n j encounters a new node n k, the element u () j of U () j s ncrementally updated by u () j = u () j +u k. After that, we stll follow the above steps 2-4 to renew the utlty U j. Therefore, the node n j only needs to mantan the overall utlty U () j, the self-nterests r j, and the fnal utlty U j, and the assocated mantenance cost s low. VI. Dstrbuted Greedy Relay Scheme Gven the assgned opportunstc encounters X (gven by Theorem 2 of Secton IV), we develop a dstrbuted relay algorthm,, whch leverages the developed utltes to select the best nodes as the carres of d. A. Two Basc Solutons Before presentng the proposed relay algorthm, we frst gve two basc solutons. Snce Theorem 2 assgns X encounters for the advertsement d, we ntutvely consder that the advertsement d (and ts copes, f have) s assocated wth an overall TTL equal to X. Suppose that the ntal publsher node n 1 starts the relay of d. The frst basc soluton, namely broadcast, s shown as follows. Whenever the ntal node n 1 encounters a node n 2, d s coped to the node n 2. If n 2 regsters a flter f matchng d, then d s successfully dssemnated to the needed node. After that, both n 1 and n 2 reman the copes of d and act as the carrers of d. Meanwhle, such two copes of d 2 are assocated wth a new TTL, whch s equal to (X 1)/2. If n 1 and n 2 encounter more other nodes, d s smlarly coped

6 and the assocated TTLs are renewed. The relay of d (and ts copy) s stopped when the current TTL s equal to. Second, based on the uncast soluton, when n 1 encounters n 2, d s relay from n 1 to n 2 f the element utlty u 2 s larger than u 1 ; meanwhle, n 1 does not reman a copy of d. Then, n 2 acts as the unque carrer of d wth a new TTL (X 1). When n 2 encounters a thrd node n 3, f u 3 > u 2, then d s relayed to n 3 assocated wth the new TTL (X 2). As before, the uncast s fnshed when the current TTL s equal to. Dfferent from the broadcast scheme, the uncast scheme has only one copy of d durng the whole relay process. The above broadcast and uncast schemes suffer from dsadvantages. Frst, the broadcast ncurs too many copes of advertsements. Due to a lmted buffer sze n each node, too many copes of advertsements ncur the overflow ssue and evct useful advertsements (we use the least recent used (LRU) polcy to evct the advertsements). On the other hand, though avodng the overflow ssue, the uncast ncurs a hgh latency before d s successfully relayed to the expected nodes. Thehghlatencymaybeevenlargerthanthegventmeperod P, and the advertsement becomes expred. In ths secton, the scheme combnes the benefts of the uncast and broadcast schemes, and relay (ether broacast or uncast) advertsements towards the needed nodes. Dependng on the utltes of encountered nodes, the leverages the developed utltes to select the best carrers, and adaptvely adjusts the number of advertsement copes to tmely delver the advertsement to the needed nodes as fast as possble. B. Problem Statement We model the DT as an opportunstc graph G. Each node n j (1 j ) n DT s represented by a correspondng vertex n G. If the node n j opportunstcally encounters a node n k ( n j ), there s an edge between n j and n k. In the graph G, each node n j s assocated wth a utlty vector U j, and each element utlty u j n the vector U j represents the utlty of n j to relay the advertsement d. The weght assocated wth the edge between n j and n k depends upon the element utlty u j and the encounterng frequency f j,k between two nodes n j and n k. Larger values of u j and f j,k ndcate hgher chance of n j to successfully relay d from n j to n k (and vce versa). Thus, we can desgnate that the edge between n j and n k wth a weght (f j,k u j ). We formulate the followng problem. Problem 2 Gven an opportunstc graph G, we want to fnd X connected edges startng from n j, such that the sum of all such edges are maxmzed. The optmzaton problem to maxmze the sum of X connected edges of flters s harder than ts decson problem. Ifasolutonoftheoptmzatonproblemsknown,wecanfnd the vertces whch are the endponts of such edges. Then, by smplycountngthenumberofnodesthatappearn,wecan compare the number of such nodes wth the gven number H. We can prove that Problem 2 s P-hard by reducng t from the classc set cover problem. Therefore, we gve a heurstc algorthm as follows. C. A Dstrbuted Heurstc Soluton Snce no node n DT knows the global opportunstc graph G, we can not drectly apply the classcal greedy algorthm of the set cover problem. We nstead propose a dstrbuted greedy-based heurstc algorthm,, to select the best nodesndttotmelyrelaytheadvertsementd.wesuppose that the relay of d starts from an ntal node n j. Algorthm 1: Relay Selecton nput : ode n j, carryng d, s opportunstcally encounterng node n k 1 n j (resp. n k ) updates U j (resp. U k ) by exchangng utltes wth n k (resp. n j ); 2 f n k s nterested n d then d s forwarded to n k ; 3 f the element utlty u k s larger than the element utlty u j then 4 n k keeps a copy of d ; 5 f u k >µ j // /*µ j s the largest element utlty of the topc t among all nodes that n j ever encountered*/ 6 then n j removes d ; 7 else n k does not keep a copy of d ; As shown n Algorthm 1, the two encounterng nodes n j and n k exchange and update ther utltes U j and U k (Secton V has already gven the detals to compute the utltes). ext, when the node n j s nterested n d, then d s coped from t to n k. After that, n k receves the matchng advertsement d. In lne 3, f the element utlty u k of n k n terms of the topc t s larger than the element utlty u j of n j n terms of t, then n k keeps a copy of d n the buffer (lne 4). Otherwse, n j wll not keep a copy of d (lne 7), f one of the followng cases occurs: () n j s nterested n t but n k not, ndcatng that u k < u j must hold, () nether n j nor n k s nterested n t, but u k < u j holds, and () both n j and n k are nterested n t, but u k < u j holds. It means that even f lne 2 s executed, n k stll removes d (lne 7). Ths makes sense because n j s better than n k to act as the carrer of d (e.g., n k s nterested n t but none of ts prevously encountered nodes s nterested n t. Thus t s meanngless for n k to act as the carrer). In lnes 5-6, there s another opton whether or not n j stll needs to keep a copy of d n the buffer and acts as the carrer of d. If u k s larger thanµ j,.e., the largest utlty of the topc t among all nodes that n j ever encountered, then n j removes d from ts buffer and wll not act as the carrer of d. Otherwse, n j stllkeepsd ntsbufferandactsasthecarrerofd.durng the encounter between n j and n k,µ j s updated f u k s larger than the currentµ j. In addton, Algorthm 1 updates the TTL of d as follows. Suppose that the current TTL assocated wth the advertsement d s X (X s ntally equal to X ). If both n j and n k keep the copes of d n ther local buffers, the new TTLs assocated wth both copes are set by (X 1)/2. Otherwse, f ether n j or n k keeps a sngle copy of d, the new TTL assocated wth such a copy s (X 1). The relay of a copy of d s termnated f the assocated TTL s zero. Based on Algorthm 1, those nodes havng larger utltes u j are selected as the carrers of d, and d s greedly relayed to the nodes wth larger element utltes. The greedy polcy helpsrelayd tothenodesn asfastaspossble.inaddton, Algorthm 1 follows the dea of broadcast to allow multple

7 copes of d, and thus ncreases the delvery rato. Algorthm 1 also follows the dea of uncast to lmt the number of such copes n lnes 3-6, and avods creatng too many copes. Our experment shows that Algorthm 1 effcently delvers d towards the needed nodes wth hgh delvery rato and sgnfcantly low overhead. VII. Evaluaton A. Expermental Settngs We compare the scheme wth the Epdemc scheme [23] (.e., the floodng-based approach), ProPHET [15] (.e., the probablstc approach), and Bubble Rap (.e., socal aware approach). ote that for Bubble Rap, when a content tem s needed by multple subscrbes and such subscrbers are located at multple communtes, we then have to forward the tem to all such communtes. In addton, we also compare the scheme wth the broadcast and uncast schemes havng the optmal encounters, both of whch are gven n Secton VI-A. We use two real-world datasets of human moblty traces to run our smulaton. The Infocom6 dataset [5] contans opportunstc Bluetooth contacts between 98 Motes, 78 of whch were dstrbuted to Infocom6 partcpants and of whch were statc. The MIT Realty trace [8] comprses 95 partcpants carryng GSM enabled cell-phones over a perod of 9 months. We consder, as n [5], that two phones are n contact when they share the same GSM base staton. ext, followng the prevous works [6], we use the Zpf dstrbuton to generate flters and content tems for a set of gven topcs. To select subscrbers, we ensure that each node regsters a flter and thus the number of subscrbers (and the number of flters) s equal to the node count. ext, we randomly choose the publshers from all nodes. Table II shows the parameters used n the experments. Takng the Zpf parameterαas an example,.95 s the default value and the nterval [.,1.2] s the allowable range. In addton, we are nterested whether or not the skew of flter dstrbuton correlates the skew of content popularty. The correlaton means that a topc, whch s hghly demanded by subscrbers, smultaneously popularly appears n content tems. Otherwse, the skew of both dstrbutons s antcorrelated. By default, we set up the correlated topcs to generate flters and content (wth the Zpf dstrbuton). Parameter Infocom6 MIT Realty num. of topcs 1 1 num. of flters num. of content tems buf. sze per node 3: [5-] :[5-] runnng perod P 5: [1-8] mns 21:[1-9] days Zpf parameter α.95: [.-1.2].95: [.-1.2] TABLE II Parameters for Dgg Experments Fnally, we use the followng metrcs to measure the performance of our smulatons. () Delvery rato: the average rato of the number of delvered destnatons to the total number of destnatons. () Average delay: the average delay for all the delvered destnatons to receve the data. () Average cost: the average number of content transmssons (ncludng transmssons for duplcated copes) used to delver a data tem. Thus, the average cost measures the average overhead to delver the data tem. The duplcated copes are shown as follows. Snce the topc-based model s essentally a many-tomany communcaton manner (one topc s assocated wth multple content tems and multple subscrbers), a content tem, after arrvng at a subscrber node, stll needs to be forwarded to the remanng subscrbers. As a result, a content tem could duplcatedly reaches the same relay nodes. It s partcularly true when exstng content tems are evcted due to the lmted buffer sze (we use a LRU evcton polcy). B. Effect of Tme Perod Frst, n Fgure 2, we study the effect of the allowable tme perod P over the Infocom6 and MIT realty traces. As shown n Fgure 2 (a), among the four schemes, the scheme acheves comparable delvery rato as the Epdemc scheme, the Bubble Rap scheme has a lower delvery rato than, and the ProPHET scheme has the least delvery rato. In partcular, a larger tme perod P, varyng from 1 mnute to 8 mnutes, leads to a larger delvery rato. Ths s due to the sparse DT property and the low encounterng rate of node contacts. A larger P ndcates that more nodes have chance to relay content tems towards the needed nodes, and thus the delvery ratos of all four schemes ncrease accordngly. Second, Fgure 2 (b) plots the average delay. Result ndcates that the scheme uses a comparable low delay as the Epdemc scheme to delver content tems towards needed nodes. It s because the developed optmzaton strategy can help optmze the delvery of hghly demanded content by usng more nodes as carrers, and then content tems are delvered as fast as possble. ext for the average cost, Fgure 2 (c) shows that the scheme uses a sgnfcantly low cost. For example, when P=8 mnutes, the average cost of the scheme s 3.5% of the Epdemc scheme, 5.22% of the Bubble Rap scheme, and 1.3% of the ProPHET scheme, respectvely. These results ndcate the hgh effcency of the scheme. The low cost of s manly because gven the skewed popularty dstrbuton α =.95, proactvely assgns more optmal encounters for popular tems, but meanwhle assgns fewer encounters for unpopular tems. Furthermore, the relay algorthm of lmts the copes of content tems and thus lmts the content transmssons. For Bubble Rap, snce a content tem mght be located at multple communtes, the tem has to be forwarded to all such communtes, leadng to the cost of Bubble Rap close to the Epdemc approach. In addton, the average cost shown n ths fgure s even larger than the number of devces (98 motes for Infocom6 data set). It s because duplcate content tems reach the same relay nodes (caused by the many-to-many topc model and LRU evcton polcy for the lmted buffer sze). Smlar stuaton occurs for other results for the average cost. When we compare Fgures 2 (a-c) wth Fgures 2 (d-e), the nodes n the MIT realty trace have to use a longer tme perod than the nodes n the Infocom6 trace, untl the almost same delvery rato (for example, %) s acheved. It s

8 Delvery rato (%) Epdemc ProPHET 1 1 Tme Perod (mns) Average delay (secs) 1 1 Epdemc 1 1 Tme Perod (mns) 1 1 Epdemc 1 1 Tme Perod (mns) Delvery rato (%) Epdemc Tme Perod (days) Average delay (hours) Epdemc Tme Perod (days) Epdemc Tme Perod (days) (a) Delvery Rato (IFO6) (b) Average Latency (IFO6) (c) (IFO6) (d) Delvery Rato (Realty) (e) Average Latency(Realty) (f) (Realty) Fg. 2. Effect of the tme perod P on the Infocom6 and MIT Realty data traces Delvery rato (%) Epdemc Buffer sze Average delay (secs) 15 5 Epdemc Buffer sze Epdemc Buffer sze Delvery rato (%) Epdemc Buffer sze Average delay (hours) Epdemc Buffer sze 15 5 Epdemc (a) Delvery Rato (IFO6) (b) Average Latency (IFO6) (c) (IFO6) (d) Delvery Rato (Realty) (e) Average Latency(Realty) (f) (Realty) Fg. 3. Effect of the buffer sze S on the Infocom6 and MIT Realty data traces Buffer sze Delvery rato (%) Epdemc Zpf parameter Average delay (secs) 15 5 Epdemc Zpf parameter Epdemc Zpf parameter Delvery rato (%) Epdemc Zpf parameter Average delay (secs) Epdemc Zpf parameter 15 5 Epdemc Zpf parameter (a) Delvery Rato (IFO6) (b) Average Latency (IFO6) (c) (IFO6) (d) Delvery Rato (Realty) (e) Average Latency(Realty) (f) (Realty) Fg. 4. Effect of the Zpf Parameter on the Infocom6 and MIT Realty data traces Delvery rato (%) Uncast Average Delay(secs) Uncast Uncast Delvery Rato Uncast Average Delay(hours) Uncast Uncast ant-relaton co-relaton ant-relaton co-relaton ant-relaton co-relaton ant-relaton co-relaton ant-relaton co-relaton ant-relaton co-relaton (a) Delvery Rato (IFO6) (b) Average Latency (IFO6) (c) (IFO6) (d) Delvery Rato (Realty) (e) Average Latency(Realty) (f) (Realty) Fg. 5. Comparson of Three Schemes because the encounterng rates of the parwse nodes n the MIT realty trace are much lower than those n the Infocom6 trace. evertheless, consstent wth Fgure 2 (c), the scheme n Fgure 2 (e) uses the least average cost. C. Effect of Buffer Sze In ths experment, we vary the buffer sze S per node (gven the sze S, when more content tems come at the node, the old tems are evcted by the FIFO manner), and study the performance of four schemes n Fgure 3. In general, a larger S helps acheve hgher delvery ratos for all four schemes. Among the four schemes, the Epdemc scheme obvously benefts most from a larger S, because the Epdemc scheme creates the largest number of copes of content tems to be propagated across nodes. Smlar to the Epdemc and Bubble Rap schemes, the scheme allows more copes of popular content tems, and benefts from a larger S. Instead, the ProPHET scheme benefts least from a larger S. A larger S does not necessarly lead to a smaller average delay and cost. In Fgure 3 (c), only after S s suffcent large, the average cost of the Epdemc scheme becomes smaller. Ths s because the average cost depends on both the number of delvered advertsements to the needed nodes and the number of used relays. Though a larger S does ncrease the number of delvered tems, t also leads to a larger number of relays. After P s suffcent large, the number of delvered tems becomes enough large to ensure that the average cost s smaller. Such trend consstently appears n both Fgure 3 (c) and Fgure 3 (f). The scheme lmts the copes of content and a larger S consstently leads to smaller cost.

9 D. Effect of Zpf Parameter Fgure 4 studes the effect of the Zpf parameter α. By varyngαfrom. to 1.2, we can fnd that a largerαhelps acheve hgher delvery rato, lower average delay and cost for the scheme. For example, n Fgure 4 (a), the delvery rato of the scheme ncreases from 26.8% to 49.2% wth around 183% growth, and the average cost decreases from to wth around 31% reducton. These results are consstent wth our analyss n Secton IV, whch favors the skewed dstrbuton of p and q. In addton, for the MIT realty trace, Fgures 4 (d-f) ndcate the smlar growth of the delvery rato, and the reducton of the average delay and cost. For the Epdemc scheme, Fgures 4 (a) and (d) ndcate that the skewed dstrbuton has low effect on the delvery rato. It s because the Epdemc scheme blndly broadcasts content tems towards encounterng nodes and does not reduce the overall delvery rato. However, due to the default correlated dstrbuton of p and q, the Epdemc scheme ensures that an content tem easer encounters the needed nodes. Thus, the average delay and cost are reduced wth a larger α. Smlar stuaton occurs for the ProPHET and Bubble Rap approaches, though the reducton trend of average cost and delay s relatvely low compared wth the Epdemc scheme. E. Comparson of Three Schemes Fnally, we compare the scheme wth the broadcast and uncast schemes gven n Secton VI-A. Fgures 5 (a-c) plot the results of the Infocom6 trace. It s observed that ant-correlated topcs lead to less delvery rato and larger average delay and cost than correlated topcs. For example, for the scheme, the average cost wth antcorrelated topcs s decreased by 35.66%. Ths s because, f a topc s popular among moble devces, the developed optmzaton polcy proactvely relay the advertsements of such topcs wth a larger number of opportunstc encounters. Then, such opportunstc encounters beneft a larger number of content tems (due to the correlated topcs). It obvously leads to a hgher delvery rato and less average delay and cost. Among the three schemes, the scheme acheves the least average cost and comparable delvery rato and average delay as the broadcast scheme. It s because the scheme combnes the befts of both uncast and broadcast schemes. In addton, the uncast and broadcast schemes n ths fgure use less delvery rato than the ProPHET and Epdemc schemes, respectvely. It s because the optmal encounters gven by the developed optmzaton strategy can mprove the delvery of the popular advertsements, whch are hghly demanded by the majorty of moble devces. For the MIT realty data set, Fgures 5 (d-f) show the smlar trend as Fgures 5 (a-c). The scheme uses the least cost to acheve the comparable delvery rato. VIII. Concluson To tmely delver content over a DT, carefully adjusts the number of encounters and content copes for advertsed content, computes the utltes wth low mantenance cost to capture nterests and moblty patterns of moble devces, and develops a dstrbuted relay algorthm to select the best nodes as the carrers. Our experments demonstrate that the proposed scheme s able to acheve hgh delvery rato and sgnfcantly low overhead. Acknowledgment: Ths work s partally supported by Academy of Fnland (Grant o ), and we would lke to thank the anonymous SECO 12 revewers for ther valuable comments. Part of the research was also conducted n the Internet of Thngs program of Tvt (Fnnsh Strategc Centre for Scence, Technology and Innovaton n the feld of ICT), funded by Tekes. References [1] C. Boldrn, M. Cont, and A. Passarella. Modellng data dssemnaton n opportunstc networks. In Proceedngs of the thrd ACM workshop on Challenged networks, CHATS 8, ew York, Y, USA, 8. ACM. [2] L. Breslau, P. Cao, L. Fan, G. Phllps, and S. Shenker. Web cachng and zpf-lke dstrbutons: Evdence and mplcatons. In IFOCOM, pages , [3] J. Burgess, B. Gallagher, D. Jensen, and B.. Levne. Maxprop: Routng for vehcle-based dsrupton-tolerant networks. In IFOCOM, 6. [4] A. Chantreau, P. Hu, J. Crowcroft, C. Dot, R. Gass, and J. Scott. Impact of human moblty on opportunstc forwardng algorthms. IEEE Trans. Mob. Comput., 6(6):6 6, 7. [5] A. Chantreau, A. Mtbaa, L. Massoulé, and C. Dot. The dameter of opportunstc moble networks. In CoEXT, page 12, 7. [6] G. Chockler, R. Melamed, Y. Tock, and R. Vtenberg. Constructng scalable overlays for pub-sub wth many topcs. In PODC, 7. [7] P. Costa, C. Mascolo, M. Musoles, and G. P. Pcco. Socally-aware routng for publsh-subscrbe n delay-tolerant moble ad hoc networks. IEEE JSAC, 26(5):748 7, 8. [8]. Eagle and A. Pentland. Realty mnng: sensng complex socal systems. Personal and Ubqutous Computng, 1(4): , 6. [9] W. Gao, Q. L, B. Zhao, and G. Cao. Multcastng n delay tolerant networks: a socal network perspectve. In MobHoc, 9. [1] B. Han, P. Hu, V. A. Kumar, M. V. Marathe, J. Shao, and A. Srnvasan. Moble data offloadng through opportunstc communcatons and socal partcpaton. IEEE Trans. Mob. Comput., 99(PrePrnts), 11. [11] P. Hu, J. Crowcroft, and E. Yonek. Bubble rap: socal-based forwardng n delay tolerant networks. In MobHoc, pages , 8. [12] V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass,. H. Brggs, and R. Braynard. etworkng named content. In CoEXT, pages 1 12, 9. [13] P. Jokela, A. Zahemszky, C. E. Rothenberg, S. Aranfar, and P. kander. Lpsn: lne speed publsh/subscrbe nter-networkng. In SIGCOMM, pages 195 6, 9. [14] T. Koponen, M. Chawla, B.-G. Chun, A. Ermolnsky, K. H. Km, S. Shenker, and I. Stoca. A data-orented (and beyond) network archtecture. In SIGCOMM, pages , 7. [15] A. Lndgren, A. Dora, and O. Schelén. Probablstc routng n ntermttently connected networks. Moble Computng and Communcatons Revew, 7(3):19, 3. [16] H. Lu, V. Ramasubramanan, and E. G. Srer. Clent behavor and feed characterstcs of rss, a publsh-subscrbe system for web mcronews. In Internet Measurment Conference, pages 29 34, 5. [17] M. Motan, V. Srnvasan, and P. uggehall. Peoplenet: engneerng a wreless vrtual socal network. In MOBICOM, 5. [18] W. Rao, L. Chen, and A. W. Fu. On effcent content matchng n dstrbuted pub/sub systems. In IFOCOM, 9. [19] W. Rao, L. Chen, A. W.-C. Fu, and Y. Bu. Optmal proactve cachng n peer-to-peer network: analyss and applcaton. In CIKM, pages , 7. [] W. Rao, L. Chen, A. W.-C. Fu, and G. Wang. Optmal resource placement n structured peer-to-peer networks. IEEE Trans. Parallel Dstrb. Syst., 21(7): , 1. [21] W. Rao, K. Zhao, and S. Tarkoma Maxmzng tmely content advertsng n delay tolerant networks. In Techncal Report of the Computer Scence Department, Unversty of Helsnk, 11. [22] T. Spyropoulos, K. Psouns, and C. S. Raghavendra. Spray and wat: an effcent routng scheme for ntermttently connected moble networks. In WDT, 5. [23] A. Vahdat and D. Becker. Epdemc routng for partally-connected ad hoc networks. In Duke Techncal Report CS--6, July.

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Significance of Eigenvector Centrality for Routing in a Delay Tolerant Network

Significance of Eigenvector Centrality for Routing in a Delay Tolerant Network Journal of Computatons & Modellng, vol.1, no.1, 2011, 91-100 ISSN: 1792-7625 (prnt), 1792-8850 (onlne) Internatonal Scentfc Press, 2011 Sgnfcance of Egenvector Centralty for Routng n a Delay Tolerant Network

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Efficient Routing Algorithms Combining History and Social Predictors in Mobile Social Networks

Efficient Routing Algorithms Combining History and Social Predictors in Mobile Social Networks Effcent Routng Algorthms Combnng and Socal Predctors n Moble Socal Networks Xao Chen 1, Chengyn Lu 2, Cong Lu 2 1 Department of Computer Scence, Texas State Unversty, San Marcos, TX USA 2 Department of

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Cellular Traffic Offloading through Opportunistic Communications Based on Human Mobility

Cellular Traffic Offloading through Opportunistic Communications Based on Human Mobility KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 9, NO. 3, Mar. 2015 872 Copyrght c 2015 KSII Cellular Traffc Offloadng through Opportunstc Communcatons Based on Human Moblty Zhgang L 1, Yan

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Cache Performance 3/28/17. Agenda. Cache Abstraction and Metrics. Direct-Mapped Cache: Placement and Access

Cache Performance 3/28/17. Agenda. Cache Abstraction and Metrics. Direct-Mapped Cache: Placement and Access Agenda Cache Performance Samra Khan March 28, 217 Revew from last lecture Cache access Assocatvty Replacement Cache Performance Cache Abstracton and Metrcs Address Tag Store (s the address n the cache?

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

SRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions

SRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions SRB: Shared Runnng Buffers n Proxy to Explot Memory Localty of Multple Streamng Meda Sessons Songqng Chen,BoShen, Yong Yan, Sujoy Basu, and Xaodong Zhang Department of Computer Scence Moble and Meda System

More information

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems S. J and D. Shn: An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems 2355 An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems Seunggu J and Dongkun Shn, Member,

More information

Contact Duration Aware Data Replication in Delay Tolerant Networks

Contact Duration Aware Data Replication in Delay Tolerant Networks Contact Duraton Aware Data Replcaton n Delay Tolerant Networks Xuejun Zhuo, Qnghua L, We Gao, Guohong Cao, Yq Da Tsnghua Natonal Laboratory for Informaton Scence and Technology, Tsnghua Unversty, Chna.

More information

Routing in Delay Tolerant Networks Comprising Heterogeneous Node Populations

Routing in Delay Tolerant Networks Comprising Heterogeneous Node Populations Routng n Delay Tolerant Networks Comprsng Heterogeneous Node Populatons Thrasyvoulos Spyropoulos, Member, IEEE, Therry Turlett, Member, IEEE, and Kata Obraczka, Member, IEEE Abstract Communcaton networks

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Survey of buffer management policies for delay tolerant networks

Survey of buffer management policies for delay tolerant networks Survey of buffer management polces for delay tolerant networks Sweta Jan 1, Meenu Chawla 1 Department of CSE and IT, Maulana Azad Natonal Insttute of Technology, Bhopal, Inda E-mal: chawlam@mant.ac.n Publshed

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Shared Running Buffer Based Proxy Caching of Streaming Sessions

Shared Running Buffer Based Proxy Caching of Streaming Sessions Shared Runnng Buffer Based Proxy Cachng of Streamng Sessons Songqng Chen, Bo Shen, Yong Yan, Sujoy Basu Moble and Meda Systems Laboratory HP Laboratores Palo Alto HPL-23-47 March th, 23* E-mal: sqchen@cs.wm.edu,

More information

Optimizing Document Scoring for Query Retrieval

Optimizing Document Scoring for Query Retrieval Optmzng Document Scorng for Query Retreval Brent Ellwen baellwe@cs.stanford.edu Abstract The goal of ths project was to automate the process of tunng a document query engne. Specfcally, I used machne learnng

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

Support Strong Consistency for Mobile Dynamic Contents Delivery Network

Support Strong Consistency for Mobile Dynamic Contents Delivery Network Nnth IEEE Internatonal Symposum on Multmeda 27 Support Strong Consstency for Moble Dynamc Contents Delvery Networ Zhou Su, Jro Katto and Yasuho Yasuda Graduate School of Scence and Engneerng, Waseda Unversty,

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

USING GRAPHING SKILLS

USING GRAPHING SKILLS Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp

More information

Research Article Information Transmission Probability and Cache Management Method in Opportunistic Networks

Research Article Information Transmission Probability and Cache Management Method in Opportunistic Networks Wreless Communcatons and Moble Computng Volume 2018, Artcle ID 1571974, 9 pages https://do.org/10.1155/2018/1571974 Research Artcle Informaton Transmsson Probablty and Cache Management Method n Opportunstc

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

Adaptive Power-Aware Prefetch in Wireless Networks

Adaptive Power-Aware Prefetch in Wireless Networks Adaptve Power-Aware Prefetch n Wreless Networks Langzhong Yn, Student Member, IEEE, and Guohong Cao, Member, IEEE Abstract Most of the prefetch technques used n the current cache management schemes do

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

Distributed Middlebox Placement Based on Potential Game

Distributed Middlebox Placement Based on Potential Game Int. J. Communcatons, Network and System Scences, 2017, 10, 264-273 http://www.scrp.org/ournal/cns ISSN Onlne: 1913-3723 ISSN Prnt: 1913-3715 Dstrbuted Mddlebox Placement Based on Potental Game Yongwen

More information

A Traffic Aware Routing Protocol for Congestion Avoidance in Content-Centric Network

A Traffic Aware Routing Protocol for Congestion Avoidance in Content-Centric Network , pp.69-80 http://dx.do.org/10.14257/jmue.2014.9.9.08 A Traffc Aware Routng Protocol for Congeston Avodance n Content-Centrc Network Jung-Jae Km 1, Mn-Woo Ryu 2*, S-Ho Cha 3 and Kuk-Hyun Cho 1 1 Dept.

More information

A Topology-aware Random Walk

A Topology-aware Random Walk A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics A Hybrd Genetc Algorthm for Routng Optmzaton n IP Networks Utlzng Bandwdth and Delay Metrcs Anton Redl Insttute of Communcaton Networks, Munch Unversty of Technology, Arcsstr. 21, 80290 Munch, Germany

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Cost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network

Cost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network Cost-Effectve Lfetme Predcton Based Routng Protocol for Wreless Network ABU MD. ZAFOR ALAM, MUHAMMAD ARIFUR RAHMAN, MOHAMMED ABUL HASAN 2,M. LUTFAR RAHMAN Faculty of Scence and IT, Daffodl Internatonal

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Efficient Broadcast Disks Program Construction in Asymmetric Communication Environments

Efficient Broadcast Disks Program Construction in Asymmetric Communication Environments Effcent Broadcast Dsks Program Constructon n Asymmetrc Communcaton Envronments Eleftheros Takas, Stefanos Ougaroglou, Petros copoltds Department of Informatcs, Arstotle Unversty of Thessalonk Box 888,

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture Goals and Approach CS 194: Dstrbuted Systems Resource Allocaton Goal: acheve predcable performances Three steps: 1) Estmate applcaton s resource needs (not n ths lecture) 2) Admsson control 3) Resource

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Dynamic Bandwidth Allocation Schemes in Hybrid TDM/WDM Passive Optical Networks

Dynamic Bandwidth Allocation Schemes in Hybrid TDM/WDM Passive Optical Networks Dynamc Bandwdth Allocaton Schemes n Hybrd TDM/WDM Passve Optcal Networks Ahmad R. Dhan, Chad M. Ass, and Abdallah Sham Concorda Insttue for Informaton Systems Engneerng Concorda Unversty, Montreal, Quebec,

More information

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,

More information

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton

More information

Future Generation Computer Systems

Future Generation Computer Systems Future Generaton Computer Systems 29 (2013) 1631 1644 Contents lsts avalable at ScVerse ScenceDrect Future Generaton Computer Systems journal homepage: www.elsever.com/locate/fgcs Gosspng for resource

More information

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding Tarno et al. EURASIP Journal on Wreless Communcatons and Networkng 214, 214:81 http://wcn.euraspournals.com/content/214/1/81 RESEARCH Open Access QoS-aware routng for heterogeneous layered uncast transmssons

More information

DUE to the recent popularization of hand-held mobile

DUE to the recent popularization of hand-held mobile IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 15, NO. 4, APRIL 2016 803 Contact Duraton Aware Data Replcaton n DTNs wth Lcensed and Unlcensed Spectrum Jng Zhao, Student Member, IEEE, Xuejun Zhuo, Qnghua

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

Research Article Energy Efficient Interest Forwarding in NDN-Based Wireless Sensor Networks

Research Article Energy Efficient Interest Forwarding in NDN-Based Wireless Sensor Networks Moble Informaton Systems Volume 2016, Artcle ID 3127029, 15 pages http://dx.do.org/10.1155/2016/3127029 Research Artcle Energy Effcent Interest Forwardng n NDN-Based Wreless Sensor Networks Shua Gao, 1

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Optimized caching in systems with heterogeneous client populations

Optimized caching in systems with heterogeneous client populations Performance Evaluaton 42 (2000) 163 185 Optmzed cachng n systems wth heterogeneous clent populatons Derek L. Eager a,, Mchael C. Ferrs b, Mary K. Vernon b a Department of Computer Scence, Unversty of Saskatchewan,

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

CS 268: Lecture 8 Router Support for Congestion Control

CS 268: Lecture 8 Router Support for Congestion Control CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment JOURNAL OF COMPUTERS, VOL. 4, NO. 9, SEPTEMBER 2009 873 Improved Resource Allocaton Algorthms for Practcal Image Encodng n a Ubqutous Computng Envronment Manxong Dong, Long Zheng, Kaoru Ota, Song Guo School

More information

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks A Load-balancng and Energy-aware Clusterng Algorthm n Wreless Ad-hoc Networks Wang Jn, Shu Le, Jnsung Cho, Young-Koo Lee, Sungyoung Lee, Yonl Zhong Department of Computer Engneerng Kyung Hee Unversty,

More information

Advanced radio access solutions for the new 5G requirements

Advanced radio access solutions for the new 5G requirements Advanced rado access solutons for the new 5G requrements Soumaya Hamouda Assocate Professor, Unversty of Carthage Tuns, Tunsa Soumaya.hamouda@supcom.tn IEEE Summt 5G n Future Afrca. May 3 th, 2017 Pretora,

More information

IJCTA Nov-Dec 2016 Available

IJCTA Nov-Dec 2016 Available Dr K Santh et al, Internatonal Journal of Computer Technology & Applcatons,Vol 7(6),773-779 Optmzed Route Technque for DSR Routng Protocol n MANET Dr.K.Santh, Assocate Professor, Dept. of Computer Scence,

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

An efficient iterative source routing algorithm

An efficient iterative source routing algorithm An effcent teratve source routng algorthm Gang Cheng Ye Tan Nrwan Ansar Advanced Networng Lab Department of Electrcal Computer Engneerng New Jersey Insttute of Technology Newar NJ 7 {gc yt Ansar}@ntedu

More information

WITH rapid improvements of wireless technologies,

WITH rapid improvements of wireless technologies, JOURNAL OF SYSTEMS ARCHITECTURE, SPECIAL ISSUE: HIGHLY-RELIABLE CPS, VOL. 00, NO. 0, MONTH 013 1 Adaptve GTS Allocaton n IEEE 80.15.4 for Real-Tme Wreless Sensor Networks Feng Xa, Ruonan Hao, Je L, Naxue

More information

CS 534: Computer Vision Model Fitting

CS 534: Computer Vision Model Fitting CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the ICC 008 proceedngs. Dynamc Bandwdth Provsonng wth Farness and Revenue Consderatons

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

Unsupervised Learning

Unsupervised Learning Pattern Recognton Lecture 8 Outlne Introducton Unsupervsed Learnng Parametrc VS Non-Parametrc Approach Mxture of Denstes Maxmum-Lkelhood Estmates Clusterng Prof. Danel Yeung School of Computer Scence and

More information