ACNS: Adaptive Complementary Neighbor Selection in BitTorrent-like Applications
|
|
- Clemence Stevens
- 6 years ago
- Views:
Transcription
1 ACNS: Adaptive Copleentary Neighbor Selection in BitTorrent-like Applications Zhenbao Zhou 1, 2, Zhenyu Li 1, 2, Gaogang Xie 1 1 Institute of Coputing Technology, Chinese Acadey of Sciences, Beijing , China 2 Graduate School of Chinese Acadey of Sciences, Beijing , China {zhouzhenbao, zyli, xie}@ict.ac.cn Abstract BitTorrent, one of the ost popular Peer-to-Peer file sharing applications, accounts for a large proportion of the total Internet traffic. While its appearance benefits the content distributors and users, the traffic injected into the network backbone has becoe a great challenge for the ISPs. In this paper, we study traffic shaping in BitTorrent-like applications to iprove traffic locality and enable fast data delivery. To this end, a piece copleentary index is introduced based on the piece deand between peer nodes. Then, we propose an efficient and adaptive neighbor selection schee (ACNS). According to ACNS, each node self-adaptively chooses the ost copleentary peers to connect with and download file pieces, rather than having a fixed nuber of outside neighbors. Our schee can be integrated with the BitTorrent protocol by slight odifications, and requires no additional infrastructure provided by ISPs. Experiental results based on extensive siulations have shown the effectiveness of ACNS. Copared with the fixed biased neighbor selection schee, ANCS cuts down the cross-isp traffic by ore than 31% and iproves the download rate by about 15%. I. INTRODUCTION The past few years have witnessed the continuous growth of the P2P (Peer-to-Peer) file sharing applications, such as Gnutella, emule, BitTorrent [3] and etc. A recent report [13] by Ipoque has shown that P2P file sharing applications account for about 49% to 83% of Internet traffic worldwide, while BitTorrent is the ost popular application which represents as large as 73% of P2P traffic in Australia, and ore than 60% in Gerany, China and soe other countries. For space liitation, we oit the BitTorrent protocol specifications since is quite well-known [10]. A. Proble Stateent and Related Works BitTorrent has gained great success and has been considered as one of the ost popular and efficient applications for file content distribution. However, it brings a great challenge for the Internet Service Providers (ISPs) due to the large aount of cross-isp traffic, which not only significantly increases ISPs cost, but also consues too uch backbone s bandwidth, adversely affecting the QoS of other applications, such as WWW, Eail and etc. In BitTorrent, the neighbors of a node are chosen randoly. The randoized neighbor selection enables the even distribution of file pieces during file downloading. But, it also greatly increases the probability that a node downloads a piece fro a reote neighbor (e.g. belonging to different ISPs), although the piece is also owned by a physically nearby neighbor (e.g. belonging to the sae ISP). Thus, the cross-isp traffic is considerable. Actually, in an N-node syste, for the ISP that has n nodes in the syste, a file piece traverses into the ISP n(1 n/ N) n ties, on average [11]. Currently, ISPs always resort to rate throttling to control the traffic generated by BitTorrent. The coplaints raised by the subscribers and how to accurately identify BitTorrent traffic are two ajor concerns. Deploying caches at the ISPs gateways is another choice [6][8]. However, it requires a large storage space and violates the legality of the content. Bindal et. al in [10] present a fixed biased neighbor selection algorith to iprove the traffic locality of BitTorrent. Each node only builds a sall nuber (e.g. 1) of links with external peers that locate at other ISPs. Liiting and fixing the nuber of links with external peers adversely affect the evenly distribution of file pieces, which in turn prolongs the download tie. Moreover, the external neighbors of a node are fixed all the tie, which akes it very likely the file pieces that are very coon within local network are still fetched fro other ISPs. Xie et. al propose P4P [6], an architecture for cooperative traffic control. Each ISP provides a server naed itracker to keep track of the network state, topology and policy of the ISP. Then, the tracker calculates which neighbor should be chosen according to the inforation collected by itrackers. In [11], nodes are grouped into clusters and several nodes with higher upload speed are selected as the core nodes for the cluster. Only the core nodes get file pieces fro other clusters. Therefore, the core nodes are naturally the bottlenecks of the clusters and ore vulnerable. Other related works include easureent and odeling of BitTorrent systes. Interested readers please refer to [2] [4]for details. B. Our Contribution In this paper, we study traffic shaping in BitTorrent-like applications through adaptive bias neighbor selection. Our goal is to iprove traffic locality and enable fast data delivery. To this end, we propose an efficient and adaptive neighbor selection schee (ACNS). ACNS is otivated by the fact that the nuber of rando neighbors of a node should varies adaptively with the file download process. The file download process is spit into three phases [12]: bootstrap phase, efficient download phase and last download phase. At the bootstrap phase, since only very few nodes have file pieces, a node /09/$ IEEE
2 should establish ore links to rando nodes to fetch file pieces into the local network. At the efficient download phase, since there have been lots of file pieces in local network, the nuber of rando neighbors of a node should be reduced correspondingly. At the last download phase, since the nuber of nodes in the local network is relative sall, a node should build ore rando links to get the last pieces. We introduce a piece copleentary index (PCI) to evaluate the copleent of two nodes, based on the deand of the on each other. PCIs of neighbors vary with the evolution of the file download process and give us indications of how any and which rando neighbors that a node should have. Each peer periodically evaluates the PCIs to rando nodes and self-adaptively chooses the ost copleentary peers to connect with and download file pieces. To the best of our knowledge, this is the first work that uses adaptive neighbor selection to shape BitTorrent traffic. We perfor extensive syste siulations based on an event-driven siulator to evaluate the perforance of ACNS. The results show that our schee iproves the traffic locality and file download speed effectively. Specially, copared with the fixed biased neighbor selection schee [10], ANCS cuts down the cross-isp traffic by ore than 31% and iproves the download rate by about 15%. The rest of the paper is organized as follows. Section II details ACNS algorith, including the definition of PCI and adaptive neighbor selection. Section III presents the experient setup, perforance etrics and the results. Finally, we conclude our work in Section IV and describe the possible future works. II. ADAPTIVE COMPLEMENTARY NEIGHBOR SELECTION In this section, we detail our approach ACNS. To ease description, we define soe notations. A node y is called as node x s outside neighbor if x and y locate at different ISPs. Otherwise, y is x s inside neighbor. We first introduce Piece Copleentary Index (PCI) to reflect the copleent of two peers. If a node x s outside peer y has several file pieces which are rare on x s inside neighbors, then we call x has a deand on y. If y also has a deand on x, we call x and y are copleentary. A larger copleent of x and y indicates the necessary to build a neighbor link between the. Obviously, the copleent of two peers varies with the file download process. Thus, each node periodically evaluates the deands of it on the outside peers and, in turn, calculates the PCIs. Based on the PCIs, a node adaptively adjusts its TABLE I NOTATIONS Notation ISP-x D(x, y) P(x) M(x) S(x) R(x) K x L(i,x) PCI(x, y) Definition the nuber of overall pieces the ISP that node x belongs to the deand of node x on node y the set of pieces peer x has downloaded the set of pieces peer x isses the set of inside neighbors of peer x the set of outside neighbors of peer x the nuber of inside neighbors of peer x, equal to the cardinality of S x the nuber of nodes in S x that have piece i the piece copleentary index of node x and node y neighbor relationship by selecting several outside peers which are ore copleentary to it to connect and download file pieces. Table I lists all iportant paraeters and notations used in this paper. A. Piece Copleentary Index We first describe how to evaluate the deand of a node x on an outside peer y, D( xy., ) Intuitively, x has a deand on y if y has soe file pieces that x issed. However, our goal is to liit the traffic injected into the ISPs. Thus, we call x has a deand on y if and only if y has several file pieces that are rare on x s inside neighbors. Thus, we define D( xy, ) to reflect the extent of x s deand on y as follows. Dxy (, ) = i= 0 ( e ( i)( K L( i, x)) xy i= 0 x ( e ( i) K ) xy x where exy () i is a indicator which indicates whether file piece i is owned by y but issed by x, and is calculated as follows. Other notations are listed in Table I. 1 if i P( y) and i M ( x) exy () i = (2) 0 otherwise Obviously, 0 Dxy (, ) 1. Note that D( xy, ) is not zero even x s inside neighbors have the pieces that x isses. Recall that another goal is to enable fast file distribution. If only very few (e.g. 1) inside neighbors have the file piece that x isses, then, since a node only supports 5 concurrent uploads, x ay wait for a long tie before it gets that piece. Thus, if the file pieces that x isses are rarely replicated on its inside neighbors, x still has a deand on the outside neighbor y which has those pieces. However, the extent of x s deand on an outside peer decreases with the growth of the nuber of inside neighbors which have the file pieces that x isses. Another thing worth pointing out is that the deand of x on outside peer y also reflects the deand of ISP-x on peer y. The deand of node x on its outside peer can be used to guide the neighbor relationship establishent between the: the higher the deand is, the higher probability that a link is built between the. However, recall that BitTorrent uses incentive schee Tit-for-Tat (TFT). Thus, if x s outside peer y has little interests on the pieces that x has downloaded, then it would take a long tie before x gets a file piece fro y, even x has a large deand on y. On the other hand, if y also has a large deand on x, then it has a great chance that the file piece transferring starts quickly between the and the transferring lasts for a long tie. Note that, since each peer leverages rare-first strategy to select which piece to download, the file pieces exchanged between x and y ust be the ones that ISP-x and ISP-y need eagerly. Motivated by this fact, we define Piece Copleentary Index (PCI) to reflect the copleent of x and y as follows. PCI( x, y) = D( x, y) D( y, x) (3) Now, we directly leverage PCI( x, y ) to guide the neighbor relationship establishent. A larger copleent of x and y indicates the ore necessary to build a neighbor link between the. Fig. 1 gives an exaple of how to copute PCI between (1)
3 two peers. The shared file is divided into 3 pieces. Since node y only has piece c, thus Dxy (, ) = ( (3 2))/3= 1/3. Since node y and all its inside neighbors iss piece a, thus Dyx= (, ) ((3 0) ) / 3 = 1. Finally, PCI( x, y ) = 1/3. Fig. 1 Exaple: calculation of PCI( x, y ) B. Adaptive Neighbor Manageent Each node x periodically requests the tracker for a peer list. In ACNS, the tracker records which ISP each peer belongs to. When receiving a request fro x for peer list, the tracker responds x with a k-peer list, of which k/2 peers are randoly selected fro x s inside peers and other k/2 peers are randoly selected fro x s outside peers. Node x aintains two peer lists: one for inside peers and one for outside peers. These two lists are used to record the peer inforation received fro the tracker. Node x coputes PCIs with each peer in the outside peer list according forula (3). To save the tie and space cost, we liit the length of each list to 35. Least Recently Used (LRU) echanis is used when the lists are full. For each node x, suppose that q outside peers are kept in the outside peer list, we sort the by their PCIs with x, which yields PCI ( x, y1) PCI ( x, y2)... PCI( x, y q ). Now, we select the first several peers with higher PCIs as x s outside neighbor. The question is how any peers we should select. A siple answer is that each node fixed selects k peers. Then, the question is transfored to how to deterine the value of k. A larger k causes too uch cross-isp traffic whereas a saller k slows down the download rate. Instead, in ACNS, we adopt an adaptive selection based on the PCIs. After sorting the PCIs of all available outside peers of x, we have the following question: in( k ), subjected to PCI( x, y1) + PCI ( x, y2) PCI( x, yk ) RT, where RT is short for (Required Threshold) and reflects how large the copleent we want to have. Given the value of RT, we can get the k outside peers for peer x to connect with. The default value of RT is 1. However, we evaluate its effect on the perforance in the siulations (Section III). Suppose the selected k outside peers for node x copose set T( x. ) Node x runs the routine adjust_neighbor as described in Fig. 2. After the execution of routine adjust_neighbor, if the total nuber of connections that node x initializes is below 20, as the regular BitTorrent, x contacts the tracker to obtain a new peer list and connects with the inside peers. Peers in ACNS periodically adjust their neighborhood relationships. The period, which is referred as Rechoose Neighbor Interval (RNI), should be chosen carefully. Since TFT strategy x.adjust_neighbor( T( x ) ) // the notations used here are all listed in Table 1, if not otherwise specified. 1. for each node y R( x) do 2. if y T( x) then 3. x disconnects the connection to y 4. T( x) = T( x) { y} 5. end if 6. end for 7. t = 35 S( x) R( x) /* A node at ost can initialize 35 connections actively, S( x ) and R( x ) are the cardinality of the set S( x ) and R( x ), respectively. */ 8. while t > 0 and T( x ) is not epty do 9. x randoly selects a node z in T( x ) to establish a connection 10. t = t T( x) = T( x) { z} 12. end while 13. if t > 0 then 14. x randoly selects t peers fro the inside peer list it stores to connect with 15. end if Fig. 2 Algorith for neighbor adjustent is used, a node only unchokes its neighbor fro which its download rate is higher. Therefore, newly neighbors can only get unchoked by optiistic unchoke strategy. This eans that the RNI should be bigger than the optiistic unchoke interval, which is 30 seconds. If we only consider the control overhead, RNI should be larger. However, after the piece exchanges for a while, the copleent of two nodes shrinks quickly. When the copleent of two nodes is very low, we should disconnect the links and build new links between ore copleentary nodes. Thus, the interval should not be too long. In current design, the default value of RNI is 120 seconds. However, we also evaluate the ipact of RNI on the perforance in siulations (Section III). Under two special circustances, ACNS is not used. First, since the seeds do not need any file piece, they randoly choose their neighbors as in the regular BitTorrent protocol to evenly distribute the file pieces. Second, for a new peer that has just joined and does not have any blocks, ACNS is not applicable. The new peers also select their initial neighbors randoly. Note that we do not eploy ACNS when selecting inside neighbors. This is because, after joining the torrent for a while, a node always has ore links to inside neighbors and the bandwidths of these links are always very large. Thus, the file pieces are distributed very quickly within the ISPs even without ACNS. C. The Ipleentation of ACNS By slightly odifying the tracker and the client, ANCS can be ipleented easily. A function is added in the tracker to record the ISPs that the peers belong to. The challenge for tracker is how to get the inforation of ISP for each client. Many tools such as iplane [14] periodically update their databases for IP-to-AS apping. Based on that inforation, tracker can easily know that which ISP the peers belong to. As for the client, the function of periodic neighbor relationship
4 anageent based on PCIs should be added. We believe the slightly odifications on tracker and client are acceptable, and it greatly benefits both service provider and end-user. III. EVALUATIONS A. Experient Setup We developed a discrete-event siulator to evaluate the perforance of BitTorrent protocol with ACNS. This siulator odels peer activities (e.g. joins, departures) as well as other BitTorrent echaniss (e.g. TFT, etc.) in detail. We ipleent ACNS, original BitTorrent with no changes (called as Native BitTorrent) and biased neighbor selection [11] schee in which a node only has 1 fixed outside neighbor. All nodes in the network have asyetric upload/download bandwidths. The network (i.e. torrent) consists of 1,000 peers. Since ost of the current users are ADSL subscribers, the upload bandwidth of each peer is set to 512 Kbps while the download bandwidth is 2,048 Kbps. It is assued that the file to distribute is a very popular one, so all the peers join in the syste as a flash crowd [7]. The peer leaves the network as soon as it copletes downloading. There is one original seed in the syste. The original seed does not depart until all the nodes finish downloading. The default upload bandwidth of the seed is 5Mbps. 1,000 nodes are assigned to 10 ISPs, each with roughly 100 nodes. All the ISPs are copletely connected with each other. The downlink bandwidth of each ISP is 200Mbps, while the uplink bandwidth for BitTorrent application is liited, considering the traffic-shaping devices deployed by ISPs. The default uplink bandwidth of each ISP is 30Mbps. However, we explore the ipact of bandwidth throttling. The default file size is 100MB. The file is divided into pieces, each with 256KB. We ainly focus on three perforance etrics. M1. Proportion of cross-isp traffic. Let T intra-isp denotes the traffic generated within ISPs to distribute the file to all the nodes, T cross-isp denote the traffic between ISPs. Then the proportion of cross-isp traffic (P_Cross) is defined as follow, where n is the nuber of nodes. Tcross ISP Tcross ISP P_ Cross = = 100% Tcross ISP + Tint ra ISP n sizeof ( file) M2. Maxiu download tie: It is defined as the axiu value of nodes download coplete tie. M3. Mean download tie: It is defined as the ean value of nodes download coplete tie. Obviously, the first etric deonstrates the efficacy of our schee in ters of traffic shaping, while the last two tell us the download rate perforance. B. Perforance Results Experiental results are reported below in ters of 3 perforance etrics. We copare our schee ACNS-enabled BitTorrent perforance with the native BitTorrent and bias neighbor selection based BitTorrent. The siulations are run ultiple ties and the differences between the are neglectable. Hence, we only present the result of one run. 1) Relative ACNS Perforance First, we evaluate the perforances of different schees (a) Proportion of the cross-isp traffic (b) CDF of coplete tie Fig. 3 Relative perforance of ACNS enabled BitTorrent protocols. Fig. 3 depicts the results. Fig. 3(a) copares the proportion of cross-isp traffic. The cross-isp traffic only contributes 15.19% in ACNS, while it contributes 55.18% and 22.18% in native and biased BitTorrent, respectively. Thus, copared with native and biased BitTorrent, ACNS-enabled BitTorrent reduces the cross-isp traffic by about 72.5% and 31.5%, respectively. Fig. 3(b) shows the cuulative distribution of download coplete tie. It is found that, in ACNS-enabled BitTorrent, 95.4% percent of the total nodes coplete the download within 2,000 seconds, while only 17.0% percent and 59.1% percent within 2,000 seconds in native BitTorrent and bias neighbor selection based BitTorrent, respectively. We also copute the ean download tie. The results show that the ean download tie is 2,376 seconds for native BitTorrent, 1,945 seconds for bias neighbor selection based BitTorrent, and 1,660 seconds for ACNS-enabled BitTorrent. Hence, copared with native and biased BitTorrent, ACNS-enabled BitTorrent iproves the download rate by about 30.1% and 14.6%, respectively. 2) Ipact of Rechoose Neighbor Interval (RNI) Next, we explore the ipact of RNI on the perforance of ACNS. Recall that RNI should be bigger than 30 seconds. Fig. 4 plots the results when RNI varies fro 60 seconds to 600 seconds. The download tie is relative large when RNI is 60 seconds. This is because the interval is so sall that an outside neighbor ay have no chance to be optiistic unchoked before the connection is disconnected. However, once the RNI grows to 120 seconds, the download tie dwindles sharply. As to the cross-isp traffic, it grows fro 13.9% to 28.3% as RNI increases fro 60 seconds to 600 seconds. This stes fro the fact that, for a larger interval, it takes a long tie for the nuber of outside neighbors of a node drops to a sall value, which in turn benefits the piece exchanges aong ISPs. We choose 120 seconds for the default value of the interval.
5 Fig. 4 Ipact of Rechoose Neighbor Interval Fig. 5 Effect of Required Threshold 3) Effect of Required Threshold (RT) In this set of experients, we evaluate the effect of Required Threshold. Fig. 5 reports the results. Two observations are notable. First, when RT is as sall as 0.5, the download tie is relatively large. This is because, in this case, a node always has fewer outside neighbors. The file pieces that the ISPs really need are not fetched into the ISPs in tie. However, once the threshold grows to 1, the download tie decreases sharply. Second, the proportion of cross-isp traffic grows with the growth of the threshold for that a node always has ore outside neighbors when the threshold is larger. We choose 1 as the default value of the threshold. 4) Ipact of bandwidth throttling We evaluate the ipact of bandwidth throttling on the perforance by varying the ISP uplink bandwidth. Fig. 6 reports the results. In the native BitTorrent, node neighbors are randoly selected and ost of file pieces are exchanged aong ISPs. Thus, the uplink bandwidth is the bottleneck, which is the reason why the download tie in native BitTorrent decreases with the growth of uplink bandwidth. On the other hand, when the bandwidth is liited, a node ay only get fewer file pieces fro outside neighbors, while a considerable nuber of file pieces are gotten fro inside neighbors. This is the reason why the cross-isp traffic in native BitTorrent is saller when the uplink bandwidth is only 10Mbps. It is also found that the uplink bandwidth has a relatively sall ipact on the perforances of ACNS-enabled and bias neighbor selection based BitTorrent. However, ACNS outperfors others. Proportion of cross-isp traffic IV. CONCLUSION AND FUTURE WORK In this paper, we propose ACNS, an adaptive neighbor selection algorith for BitTorrent applications to reduce cross-isp traffic and enable fast content distribution. Rather than having a fixed nuber of outside neighbors, ACNS suggests that a node should adaptively select the ost cople- Fig. 6 Ipact of bandwidth throttling entary peers in other ISPs to connect with. To this end, we introduce piece copleentary index to evaluate the copleent of two nodes locating in different ISPs and then, depict how to leverage the index to guide the adjustent of neighbor relationships. The experiental results show the efficacy of our schee in ters of two perforance etrics, naely download tie and the cross-isp traffic. Specially, copared with the fixed biased neighbor selection schee, ANCS cuts down the cross-isp traffic by ore than 31% and iproves the download rate by about 15%. As a future work, we will study the piece selection strategy in BitTorrent to iprove the traffic locality and integrate the proposed schee into the open-source BitTorrent. ACKNOWLEDGE This work is supported by National Basic Research Progra of China with grant No.2007CB310702, by National Natural Science Foundation of China with grant No and No REFERENCES [1] A. Legout, G. Urvoy-Keller, P. Michiardi, Rarest first and choke algoriths are enough, proceedings of the 6th ACM SIGCOMM conference on Internet easureent, Rio de Janeriro, Brazil, [2] A. R. Bharabe, C. Herley, and V. N. Padanabhan, Analyzing and iproving a bittorrent networks perforance echaniss, INFOCOM [3] B. Cohen. Incentives build robustness in BitTorrent, P2PEcon, [4] D. Qiu and R. Srikant. Modeling and Perforance Analysis of BitTorrent-like Peer-to-Peer Networks, SIGCOMM, Sep [5] G. Shen, Y. Wang, Y. Xiong, B.Y. Zhao, Z. Zhang HPTP: Relieving the tension between ISPs and P2P, Proceedings of IPTPS, [6] H. Xie, A. Krishnaurthy, A. Silberschatz, Y. R. Yang, P4P: Provider Portal for Applications, SIGCOMM, [7] J.A. Pouwelse, P. Garbacki, D.H.J. Epea, H.J. Sips, A Measureent Study of the BitTorrent Peer-to-Peer File-Sharing Syste, technical report PDS , May [8] K. Guadi, R. Dunn, S. Saroiu, S. Gribble, H. Levy, and J. Zahorjan. Measureent, odeling, and analysis of a peer-to-peer file-sharing workload, in Proc. of SOSP 03, Bolton Landing, Oct [9] L. Guo, S. Chen, Z. Xiao, E. Tan, Measuresnts, analysis and odeling of bittorrent-like systes, IMC, [10] R. Bindal, P. Cao, W. Chan, J. Medved, G. Suwala, T. Bates, and A. Zhang, Iproving traffic locality in bittorrent via biased neighbor selection, ICDCS, [11] T. Wang, L. Wen, W. Li, J. Tao, A. Wang, and F. Baker Traffic Shaping in BitTorrent Systes by Centralized Hierarchical Peer-node Assignent, ICC, [12] V. Rai, S. Sivasubraanian, and S. Bhulai., A ulti Phased approach for odeling and analysis of the BitTorrent protocol, Proc. of IEEE ICDCS 2007, Toronto, Canada, [13] Internet Study 2007, Available: [14] iplane. Available:
Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks
Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr
More informationPerformance Analysis of RAID in Different Workload
Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,
More informationAn Efficient Approach for Content Delivery in Overlay Networks
An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr
More informationThe optimization design of microphone array layout for wideband noise sources
PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun
More informationAdaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN
Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan
More informationImprove Peer Cooperation using Social Networks
Iprove Peer Cooperation using Social Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Noveber 5, 2007 Corresponding
More informationUtility-Based Resource Allocation for Mixed Traffic in Wireless Networks
IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng
More informationA Hybrid Network Architecture for File Transfers
JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,
More informationResearch on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm
roceedings of the 7th International Conference on Innovation & Manageent 893 Research on a Kind of QoS-Sensitive Seantic Web Services Coposition Method Based on Genetic Algorith Cao Hongjiang, Nie Guihua,
More informationDerivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router
Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of
More informationInvestigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks
Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,
More informationPlanet Scale Software Updates
Planet Scale Software Updates Christos Gkantsidis 1, Thoas Karagiannis 2, Pablo Rodriguez 1, and Milan Vojnović 1 1 Microsoft Research 2 UC Riverside Cabridge, UK Riverside, CA, USA {chrisgk,pablo,ilanv}@icrosoft.co
More informationAn Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks
An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San
More informationReal-Time Detection of Invisible Spreaders
Real-Tie Detection of Invisible Spreaders MyungKeun Yoon Shigang Chen Departent of Coputer & Inforation Science & Engineering University of Florida, Gainesville, FL 3, USA {yoon, sgchen}@cise.ufl.edu Abstract
More informationDesigning High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,
More informationRelocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction
Relocation of ateway for Enhanced Tieliness in Wireless Sensor Networks Keal Akkaya and Mohaed Younis Departent of oputer Science and Electrical Engineering University of Maryland, altiore ounty altiore,
More informationOPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS
Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented
More informationThe Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network
The Flaw Attack to the RTS/CTS Handshake Mechanis in Cluster-based Battlefield Self-organizing Network Zeao Zhao College of Counication Engineering, Hangzhou Dianzi University, Hangzhou 310018, China National
More informationComputer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13
Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical
More informationContent Distribution and BitTorrent [Based on slides by Cosmin Arad]
ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent Underlying
More informationOblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands
Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu
More informationCollaborative Web Caching Based on Proxy Affinities
Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA
More informationIntegrating fast mobility in the OLSR routing protocol
Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr
More informationA Measurement-Based Model for Parallel Real-Time Tasks
A Measureent-Based Model for Parallel Real-Tie Tasks Kunal Agrawal 1 Washington University in St. Louis St. Louis, MO, USA kunal@wustl.edu https://orcid.org/0000-0001-5882-6647 Sanjoy Baruah 2 Washington
More informationGeo-activity Recommendations by using Improved Feature Combination
Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,
More informationEfficiency of Data Distribution in BitTorrent-Like Systems
Efficiency of Data Distribution in BitTorrent-Like Systems Ho-Leung Chan 1,, Tak-Wah Lam 2, and Prudence W.H. Wong 3 1 Department of Computer Science, University of Pittsburgh hlchan@cs.pitt.edu 2 Department
More informationDifferent criteria of dynamic routing
Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich
More informationFair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones
Advance Access publication on 24 February 2017 The British Coputer Society 2017. All rights reserved. For Perissions, please eail: journals.perissions@oup.co doi:10.1093/cojnl/bxx015 Fair Energy-Efficient
More informationMulti Packet Reception and Network Coding
The 2010 Military Counications Conference - Unclassified Progra - etworking Protocols and Perforance Track Multi Packet Reception and etwork Coding Aran Rezaee Research Laboratory of Electronics Massachusetts
More informationDetection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm
Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,
More informationControl Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols
Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Navodaya Garepalli Kartik Gopalan Ping Yang Coputer Science, Binghaton University (State University of New York) Contact:
More informationA Novel Fast Constructive Algorithm for Neural Classifier
A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore
More informationTHE rapid growth and continuous change of the real
IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa
More informationDesign Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems
Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se
More informationA Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design
A Fast Multi-Obective Genetic Algorith for Hardware-Software Partitioning In Ebedded Syste Design 1 M.Jagadeeswari, 2 M.C.Bhuvaneswari 1 Research Scholar, P.S.G College of Technology, Coibatore, India
More informationA Periodic Dynamic Load Balancing Method
2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation
More informationTensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3
2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition
More informationScheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We
More informationA Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction
MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao
More informationData & Knowledge Engineering
Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID
More informationELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH
ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH Kulapraote Prathuchai Geoinforatics Center, Asian Institute of Technology, 58 Moo9, Klong Luang, Pathuthani, Thailand.
More informationA Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems
A Low-cost Meory Architecture with XIP for Mobile Ebedded Systes Chanik Park, Jaeyu Seo, Sunghwan Bae, Hyojun Ki, Shinhan Ki and Busoo Ki Software Center, SAMSUNG Electronics, Co., Ltd. Seoul 135-893,
More informationDYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION
www.arpnjournals.co DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION N. Snehalatha 1 and Paul Rodrigues 2 1 School of Coputing, SRM University, Chennai, Tail Nadu, India 2 Departent
More informationA Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium
1 A Distributed Multi-service Resource Allocation Algorith in Heterogeneous Wireless Access Mediu Muhaad Isail, Student Meber, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract In this paper, radio resource
More informationDynamical Topology Analysis of VANET Based on Complex Networks Theory
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 14, Special Issue Sofia 014 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.478/cait-014-0053 Dynaical Topology Analysis
More informationEfficient file search in non-dht P2P networks
Available online at www.sciencedirect.co Coputer Counications 3 (28) 34 37 www.elsevier.co/locate/coco Efficient file search in non-dht P2P networks Shiping Chen a, Zhan Zhang b, *, Shigang Chen b, Baile
More informationMapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues
Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu
More informationModeling Parallel Applications Performance on Heterogeneous Systems
Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln
More informationEE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011
EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction
More informationMULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES. Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou
MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou Departent of Coputer Science and Inforation Engineering, National Chiayi
More informationClustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering
Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into
More informationGenerating Mechanisms for Evolving Software Mirror Graph
Journal of Modern Physics, 2012, 3, 1050-1059 http://dx.doi.org/10.4236/jp.2012.39139 Published Online Septeber 2012 (http://www.scirp.org/journal/jp) Generating Mechaniss for Evolving Software Mirror
More informationDesign and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design
Design and Ipleentation of Business Logic Layer Object-Oriented Design versus Relational Design Ali Alharthy Faculty of Engineering and IT University of Technology, Sydney Sydney, Australia Eail: Ali.a.alharthy@student.uts.edu.au
More informationPOSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang
IEEE International Conference on ultiedia and Expo POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION Junjun Jiang, Ruiin Hu, Zhen Han, Tao Lu, and Kebin Huang National Engineering
More informationJoint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points
Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University
More informationCarving Differential Unit Test Cases from System Test Cases
Carving Differential Unit Test Cases fro Syste Test Cases Sebastian Elbau, Hui Nee Chin, Matthew B. Dwyer, Jonathan Dokulil Departent of Coputer Science and Engineering University of Nebraska - Lincoln
More information1 Extended Boolean Model
1 EXTENDED BOOLEAN MODEL It has been well-known that the Boolean odel is too inflexible, requiring skilful use of Boolean operators to obtain good results. On the other hand, the vector space odel is flexible
More informationBurst Scheduling Networks. Simon S. Lam and Georey G. Xie. The University of Texas at Austin. Austin, Texas August 31, 1996.
Burst Scheduling Networks Sion S. La and Georey G. Xie Departent of Coputer Sciences The University of Texas at Austin Austin, Texas 78712-1188 August 31, 1996 Abstract Most application-level data units
More informationPERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL
IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant
More informationRelief shape inheritance and graphical editor for the landscape design
Relief shape inheritance and graphical editor for the landscape design Egor A. Yusov Vadi E. Turlapov Nizhny Novgorod State University after N. I. Lobachevsky Nizhny Novgorod Russia yusov_egor@ail.ru vadi.turlapov@cs.vk.unn.ru
More informationBP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks
BP-MAC: A High Reliable Backoff Preable MAC Protocol for Wireless Sensor Networks Alexander Klein* Jirka Klaue Josef Schalk EADS Innovation Works, Gerany *Eail: klein@inforatik.uni-wuerzburg.de ABSTRACT:
More informationAnalysing Real-Time Communications: Controller Area Network (CAN) *
Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination
More informationClosing The Performance Gap between Causal Consistency and Eventual Consistency
Closing The Perforance Gap between Causal Consistency and Eventual Consistency Jiaqing Du Călin Iorgulescu Aitabha Roy Willy Zwaenepoel EPFL ABSTRACT It is well known that causal consistency is ore expensive
More informationAGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM
International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.5, Septeber 205 AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM Xie Yang and Cheng Wushan College of Mechanical Engineering,
More informationSecure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals
Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract
More informationIdentifying Converging Pairs of Nodes on a Budget
Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering
More informationA Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage
216 IEEE 23rd International Conference on High Perforance Coputing A Low-Cost Multi-Failure Resilient Replication Schee for High Data Availability in Cloud Storage Jinwei Liu* and Haiying Shen *Departent
More informationQUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS
QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755
More informationOn Performance Bottleneck of Anonymous Communication Networks
On Perforance Bottleneck of Anonyous Counication Networks Ryan Pries, Wei Yu, Steve Graha, and Xinwen Fu Abstract Although a significant aount of effort has been directed at discovering attacks against
More informationA Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem
IE Vol. 7, No. 2, pp. 84-92, Septeber 2008. A Coparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Proble Ji Ung Sun School of Industrial and Managent Engineering Hankuk University
More informationMultipath Selection and Channel Assignment in Wireless Mesh Networks
Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,
More informationCOLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL
COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute
More informationAdaptive Holistic Scheduling for In-Network Sensor Query Processing
Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,
More informationEfficient Estimation of Inclusion Coefficient using HyperLogLog Sketches
Efficient Estiation of Inclusion Coefficient using HyperLogLog Sketches Azade Nazi, Bolin Ding, Vivek Narasayya, Surajit Chaudhuri Microsoft Research {aznazi, bolind, viveknar, surajitc}@icrosoft.co ABSTRACT
More informationEquation Based Congestion Control for Video Transmission over WCDMA Networks
Equation Based Congestion Control for Video Transission over WCDMA Networks Antonios Alexiou, Diitrios Antonellis and Christos Bouras Research Acadeic Coputer Technology Institute, Greece and Coputer Engineering
More informationIN many interactive multimedia streaming applications, such
840 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 5, MAY 06 A Geoetric Approach to Server Selection for Interactive Video Streaing Yaochen Hu, Student Meber, IEEE, DiNiu, Meber, IEEE, and Zongpeng Li, Senior
More informationRedundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network
(IJACSA) International Journal of Advanced Coputer Science and Applications Vol. 8, No. 1, 217 Redundancy Level Ipact of the Mean Tie to Failure on Wireless Sensor Network Alaa E. S. Ahed 1 College of
More informationDatabase Design on Mechanical Equipment Operation Management System Zheng Qiu1, Wu kaiyuan1, Wu Chengyan1, Liu Lei2
2nd International Conference on Advances in Mechanical Engineering and Industrial Inforatics (AMEII 206) Database Design on Mechanical Equipent Manageent Syste Zheng Qiu, Wu kaiyuan, Wu Chengyan, Liu Lei2
More informationI ve Seen Enough : Incrementally Improving Visualizations to Support Rapid Decision Making
I ve Seen Enough : Increentally Iproving Visualizations to Support Rapid Decision Making Sajjadur Rahan Marya Aliakbarpour 2 Ha Kyung Kong Eric Blais 3 Karrie Karahalios,4 Aditya Paraeswaran Ronitt Rubinfield
More informationScheduling Parallel Task Graphs on (Almost) Homogeneous Multi-cluster Platforms
1 Scheduling Parallel Task Graphs on (Alost) Hoogeneous Multi-cluster Platfors Pierre-François Dutot, Tchiou N Takpé, Frédéric Suter and Henri Casanova Abstract Applications structured as parallel task
More informationAn Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks
An Adaptive Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent
More informationEvaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds
Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles
More informationEnhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue
Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade
More information1 P a g e. F x,x...,x,.,.' written as F D, is the same.
11. The security syste at an IT office is coposed of 10 coputers of which exactly four are working. To check whether the syste is functional, the officials inspect four of the coputers picked at rando
More informationEnergy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks
Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networs F. Mousavi Madani Departent of coputer engineering Alzahra University Tehran, Iran, osavif@alzahra.ac.ir Received:
More informationAn Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks
An Adaptive and Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent
More informationImproving BitTorrent: A Simple Approach
Improving BitTorrent: A Simple Approach Alix L.H. Chow Univ. of Southern California Leana Golubchik Univ. of Southern California Vishal Misra Columbia University Abstract Measurement studies have shown
More informationNON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH
NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH V. Atienza; J.M. Valiente and G. Andreu Departaento de Ingeniería de Sisteas, Coputadores y Autoática Universidad Politécnica de Valencia.
More informationResearch Article A Game Theory Based Congestion Control Protocol for Wireless Personal Area Networks
Journal of Sensors Volue 216, Article ID 61683, 13 pages http://dx.doi.org/1.11/216/61683 Research Article A Gae Theory Based Congestion Control Protocol for Wireless Personal Area Networks Chuang Ma,
More informationVerifying the structure and behavior in UML/OCL models using satisfiability solvers
IET Cyber-Physical Systes: Theory & Applications Review Article Verifying the structure and behavior in UML/OCL odels using satisfiability solvers ISSN 2398-3396 Received on 20th October 2016 Revised on
More informationEffects of Interleaving on RTP Header Compression
Effects of Interleaving on RTP Header Copression Colin Perkins Jon Crowcroft Departent of Coputer Science University College London Gower Street London WCE 6BT Abstract We discuss the use of interleaving
More informationData-driven Hybrid Caching in Hierarchical Edge Cache Networks
Data-driven Hybrid Caching in Hierarchical Edge Cache Networks Abstract Hierarchical cache networks are increasingly deployed to facilitate high-throughput and low-latency content delivery to end users.
More informationHIGH PERFORMANCE PRE-SEGMENTATION ALGORITHM FOR SONAR IMAGES
HIGH PERFORMANCE PRE-SEGMENTATION ALGORITHM FOR SONAR IMAGES Benjain Lehann*, Konstantinos Siantidis*, Dieter Kraus** *ATLAS ELEKTRONIK GbH Sebaldsbrücker Heerstraße 235 D-28309 Breen, GERMANY Eail: benjain.lehann@atlas-elektronik.co
More informationReducing Crosspoint Buffers for Performance Guaranteed Asynchronous Crossbar Scheduling
educing Crosspoint Buffers for Perforance Guaranteed Asynchronous Crossbar Scheduling Masoueh Karii, Zhuo Sun, and Deng Pan Florida International University Eails: {kari001, zsun003, pand}@fiu.edu Abstract
More informationDistributed Multi-robot Work Load Partition In Manufacturing Automation
th IEEE Conference on Autoation Science and Engineering Key Bridge Marriott, Washington DC, USA August 3-, Distributed Multi-robot Work Load Partition In Manufacturing Autoation Gira S Tewolde, Changhua
More informationImproving the Download Time of BitTorrent-like Systems
Improving the Download Time of BitTorrent-like Systems Chi-Jen Wu, Cheng-Ying Li, and Jan-Ming Ho Institute of Information Science Academia Sinica, Taiwan {cjwu, cyli, hoho}@iis.sinica.edu.tw Abstract
More informationA Trajectory Splitting Model for Efficient Spatio-Temporal Indexing
A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada
More informationCOMPARISON OF ANT COLONY OPTIMIZATION & PARTICLE SWARM OPTIMIZATION IN GRID ENVIRONMENT
COMPARISON OF ANT COLONY OPTIMIZATION & PARTICLE SWARM OPTIMIZATION IN GRID ENVIRONMENT B.BOOBA 1 Dr. T.V.GOPAL 2 1 Research Scholar, Assist. Professor(Sl.Gr),Departent of Coputer Applications, Easwari
More informationSurvivability Function A Measure of Disaster-Based Routing Performance
Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected
More informationShortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm
International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University
More information