ACNS: Adaptive Complementary Neighbor Selection in BitTorrent-like Applications

Size: px
Start display at page:

Download "ACNS: Adaptive Complementary Neighbor Selection in BitTorrent-like Applications"

Transcription

1 ACNS: Adaptive Copleentary Neighbor Selection in BitTorrent-like Applications Zhenbao Zhou 1, 2, Zhenyu Li 1, 2, Gaogang Xie 1 1 Institute of Coputing Technology, Chinese Acadey of Sciences, Beijing , China 2 Graduate School of Chinese Acadey of Sciences, Beijing , China {zhouzhenbao, zyli, xie}@ict.ac.cn Abstract BitTorrent, one of the ost popular Peer-to-Peer file sharing applications, accounts for a large proportion of the total Internet traffic. While its appearance benefits the content distributors and users, the traffic injected into the network backbone has becoe a great challenge for the ISPs. In this paper, we study traffic shaping in BitTorrent-like applications to iprove traffic locality and enable fast data delivery. To this end, a piece copleentary index is introduced based on the piece deand between peer nodes. Then, we propose an efficient and adaptive neighbor selection schee (ACNS). According to ACNS, each node self-adaptively chooses the ost copleentary peers to connect with and download file pieces, rather than having a fixed nuber of outside neighbors. Our schee can be integrated with the BitTorrent protocol by slight odifications, and requires no additional infrastructure provided by ISPs. Experiental results based on extensive siulations have shown the effectiveness of ACNS. Copared with the fixed biased neighbor selection schee, ANCS cuts down the cross-isp traffic by ore than 31% and iproves the download rate by about 15%. I. INTRODUCTION The past few years have witnessed the continuous growth of the P2P (Peer-to-Peer) file sharing applications, such as Gnutella, emule, BitTorrent [3] and etc. A recent report [13] by Ipoque has shown that P2P file sharing applications account for about 49% to 83% of Internet traffic worldwide, while BitTorrent is the ost popular application which represents as large as 73% of P2P traffic in Australia, and ore than 60% in Gerany, China and soe other countries. For space liitation, we oit the BitTorrent protocol specifications since is quite well-known [10]. A. Proble Stateent and Related Works BitTorrent has gained great success and has been considered as one of the ost popular and efficient applications for file content distribution. However, it brings a great challenge for the Internet Service Providers (ISPs) due to the large aount of cross-isp traffic, which not only significantly increases ISPs cost, but also consues too uch backbone s bandwidth, adversely affecting the QoS of other applications, such as WWW, Eail and etc. In BitTorrent, the neighbors of a node are chosen randoly. The randoized neighbor selection enables the even distribution of file pieces during file downloading. But, it also greatly increases the probability that a node downloads a piece fro a reote neighbor (e.g. belonging to different ISPs), although the piece is also owned by a physically nearby neighbor (e.g. belonging to the sae ISP). Thus, the cross-isp traffic is considerable. Actually, in an N-node syste, for the ISP that has n nodes in the syste, a file piece traverses into the ISP n(1 n/ N) n ties, on average [11]. Currently, ISPs always resort to rate throttling to control the traffic generated by BitTorrent. The coplaints raised by the subscribers and how to accurately identify BitTorrent traffic are two ajor concerns. Deploying caches at the ISPs gateways is another choice [6][8]. However, it requires a large storage space and violates the legality of the content. Bindal et. al in [10] present a fixed biased neighbor selection algorith to iprove the traffic locality of BitTorrent. Each node only builds a sall nuber (e.g. 1) of links with external peers that locate at other ISPs. Liiting and fixing the nuber of links with external peers adversely affect the evenly distribution of file pieces, which in turn prolongs the download tie. Moreover, the external neighbors of a node are fixed all the tie, which akes it very likely the file pieces that are very coon within local network are still fetched fro other ISPs. Xie et. al propose P4P [6], an architecture for cooperative traffic control. Each ISP provides a server naed itracker to keep track of the network state, topology and policy of the ISP. Then, the tracker calculates which neighbor should be chosen according to the inforation collected by itrackers. In [11], nodes are grouped into clusters and several nodes with higher upload speed are selected as the core nodes for the cluster. Only the core nodes get file pieces fro other clusters. Therefore, the core nodes are naturally the bottlenecks of the clusters and ore vulnerable. Other related works include easureent and odeling of BitTorrent systes. Interested readers please refer to [2] [4]for details. B. Our Contribution In this paper, we study traffic shaping in BitTorrent-like applications through adaptive bias neighbor selection. Our goal is to iprove traffic locality and enable fast data delivery. To this end, we propose an efficient and adaptive neighbor selection schee (ACNS). ACNS is otivated by the fact that the nuber of rando neighbors of a node should varies adaptively with the file download process. The file download process is spit into three phases [12]: bootstrap phase, efficient download phase and last download phase. At the bootstrap phase, since only very few nodes have file pieces, a node /09/$ IEEE

2 should establish ore links to rando nodes to fetch file pieces into the local network. At the efficient download phase, since there have been lots of file pieces in local network, the nuber of rando neighbors of a node should be reduced correspondingly. At the last download phase, since the nuber of nodes in the local network is relative sall, a node should build ore rando links to get the last pieces. We introduce a piece copleentary index (PCI) to evaluate the copleent of two nodes, based on the deand of the on each other. PCIs of neighbors vary with the evolution of the file download process and give us indications of how any and which rando neighbors that a node should have. Each peer periodically evaluates the PCIs to rando nodes and self-adaptively chooses the ost copleentary peers to connect with and download file pieces. To the best of our knowledge, this is the first work that uses adaptive neighbor selection to shape BitTorrent traffic. We perfor extensive syste siulations based on an event-driven siulator to evaluate the perforance of ACNS. The results show that our schee iproves the traffic locality and file download speed effectively. Specially, copared with the fixed biased neighbor selection schee [10], ANCS cuts down the cross-isp traffic by ore than 31% and iproves the download rate by about 15%. The rest of the paper is organized as follows. Section II details ACNS algorith, including the definition of PCI and adaptive neighbor selection. Section III presents the experient setup, perforance etrics and the results. Finally, we conclude our work in Section IV and describe the possible future works. II. ADAPTIVE COMPLEMENTARY NEIGHBOR SELECTION In this section, we detail our approach ACNS. To ease description, we define soe notations. A node y is called as node x s outside neighbor if x and y locate at different ISPs. Otherwise, y is x s inside neighbor. We first introduce Piece Copleentary Index (PCI) to reflect the copleent of two peers. If a node x s outside peer y has several file pieces which are rare on x s inside neighbors, then we call x has a deand on y. If y also has a deand on x, we call x and y are copleentary. A larger copleent of x and y indicates the necessary to build a neighbor link between the. Obviously, the copleent of two peers varies with the file download process. Thus, each node periodically evaluates the deands of it on the outside peers and, in turn, calculates the PCIs. Based on the PCIs, a node adaptively adjusts its TABLE I NOTATIONS Notation ISP-x D(x, y) P(x) M(x) S(x) R(x) K x L(i,x) PCI(x, y) Definition the nuber of overall pieces the ISP that node x belongs to the deand of node x on node y the set of pieces peer x has downloaded the set of pieces peer x isses the set of inside neighbors of peer x the set of outside neighbors of peer x the nuber of inside neighbors of peer x, equal to the cardinality of S x the nuber of nodes in S x that have piece i the piece copleentary index of node x and node y neighbor relationship by selecting several outside peers which are ore copleentary to it to connect and download file pieces. Table I lists all iportant paraeters and notations used in this paper. A. Piece Copleentary Index We first describe how to evaluate the deand of a node x on an outside peer y, D( xy., ) Intuitively, x has a deand on y if y has soe file pieces that x issed. However, our goal is to liit the traffic injected into the ISPs. Thus, we call x has a deand on y if and only if y has several file pieces that are rare on x s inside neighbors. Thus, we define D( xy, ) to reflect the extent of x s deand on y as follows. Dxy (, ) = i= 0 ( e ( i)( K L( i, x)) xy i= 0 x ( e ( i) K ) xy x where exy () i is a indicator which indicates whether file piece i is owned by y but issed by x, and is calculated as follows. Other notations are listed in Table I. 1 if i P( y) and i M ( x) exy () i = (2) 0 otherwise Obviously, 0 Dxy (, ) 1. Note that D( xy, ) is not zero even x s inside neighbors have the pieces that x isses. Recall that another goal is to enable fast file distribution. If only very few (e.g. 1) inside neighbors have the file piece that x isses, then, since a node only supports 5 concurrent uploads, x ay wait for a long tie before it gets that piece. Thus, if the file pieces that x isses are rarely replicated on its inside neighbors, x still has a deand on the outside neighbor y which has those pieces. However, the extent of x s deand on an outside peer decreases with the growth of the nuber of inside neighbors which have the file pieces that x isses. Another thing worth pointing out is that the deand of x on outside peer y also reflects the deand of ISP-x on peer y. The deand of node x on its outside peer can be used to guide the neighbor relationship establishent between the: the higher the deand is, the higher probability that a link is built between the. However, recall that BitTorrent uses incentive schee Tit-for-Tat (TFT). Thus, if x s outside peer y has little interests on the pieces that x has downloaded, then it would take a long tie before x gets a file piece fro y, even x has a large deand on y. On the other hand, if y also has a large deand on x, then it has a great chance that the file piece transferring starts quickly between the and the transferring lasts for a long tie. Note that, since each peer leverages rare-first strategy to select which piece to download, the file pieces exchanged between x and y ust be the ones that ISP-x and ISP-y need eagerly. Motivated by this fact, we define Piece Copleentary Index (PCI) to reflect the copleent of x and y as follows. PCI( x, y) = D( x, y) D( y, x) (3) Now, we directly leverage PCI( x, y ) to guide the neighbor relationship establishent. A larger copleent of x and y indicates the ore necessary to build a neighbor link between the. Fig. 1 gives an exaple of how to copute PCI between (1)

3 two peers. The shared file is divided into 3 pieces. Since node y only has piece c, thus Dxy (, ) = ( (3 2))/3= 1/3. Since node y and all its inside neighbors iss piece a, thus Dyx= (, ) ((3 0) ) / 3 = 1. Finally, PCI( x, y ) = 1/3. Fig. 1 Exaple: calculation of PCI( x, y ) B. Adaptive Neighbor Manageent Each node x periodically requests the tracker for a peer list. In ACNS, the tracker records which ISP each peer belongs to. When receiving a request fro x for peer list, the tracker responds x with a k-peer list, of which k/2 peers are randoly selected fro x s inside peers and other k/2 peers are randoly selected fro x s outside peers. Node x aintains two peer lists: one for inside peers and one for outside peers. These two lists are used to record the peer inforation received fro the tracker. Node x coputes PCIs with each peer in the outside peer list according forula (3). To save the tie and space cost, we liit the length of each list to 35. Least Recently Used (LRU) echanis is used when the lists are full. For each node x, suppose that q outside peers are kept in the outside peer list, we sort the by their PCIs with x, which yields PCI ( x, y1) PCI ( x, y2)... PCI( x, y q ). Now, we select the first several peers with higher PCIs as x s outside neighbor. The question is how any peers we should select. A siple answer is that each node fixed selects k peers. Then, the question is transfored to how to deterine the value of k. A larger k causes too uch cross-isp traffic whereas a saller k slows down the download rate. Instead, in ACNS, we adopt an adaptive selection based on the PCIs. After sorting the PCIs of all available outside peers of x, we have the following question: in( k ), subjected to PCI( x, y1) + PCI ( x, y2) PCI( x, yk ) RT, where RT is short for (Required Threshold) and reflects how large the copleent we want to have. Given the value of RT, we can get the k outside peers for peer x to connect with. The default value of RT is 1. However, we evaluate its effect on the perforance in the siulations (Section III). Suppose the selected k outside peers for node x copose set T( x. ) Node x runs the routine adjust_neighbor as described in Fig. 2. After the execution of routine adjust_neighbor, if the total nuber of connections that node x initializes is below 20, as the regular BitTorrent, x contacts the tracker to obtain a new peer list and connects with the inside peers. Peers in ACNS periodically adjust their neighborhood relationships. The period, which is referred as Rechoose Neighbor Interval (RNI), should be chosen carefully. Since TFT strategy x.adjust_neighbor( T( x ) ) // the notations used here are all listed in Table 1, if not otherwise specified. 1. for each node y R( x) do 2. if y T( x) then 3. x disconnects the connection to y 4. T( x) = T( x) { y} 5. end if 6. end for 7. t = 35 S( x) R( x) /* A node at ost can initialize 35 connections actively, S( x ) and R( x ) are the cardinality of the set S( x ) and R( x ), respectively. */ 8. while t > 0 and T( x ) is not epty do 9. x randoly selects a node z in T( x ) to establish a connection 10. t = t T( x) = T( x) { z} 12. end while 13. if t > 0 then 14. x randoly selects t peers fro the inside peer list it stores to connect with 15. end if Fig. 2 Algorith for neighbor adjustent is used, a node only unchokes its neighbor fro which its download rate is higher. Therefore, newly neighbors can only get unchoked by optiistic unchoke strategy. This eans that the RNI should be bigger than the optiistic unchoke interval, which is 30 seconds. If we only consider the control overhead, RNI should be larger. However, after the piece exchanges for a while, the copleent of two nodes shrinks quickly. When the copleent of two nodes is very low, we should disconnect the links and build new links between ore copleentary nodes. Thus, the interval should not be too long. In current design, the default value of RNI is 120 seconds. However, we also evaluate the ipact of RNI on the perforance in siulations (Section III). Under two special circustances, ACNS is not used. First, since the seeds do not need any file piece, they randoly choose their neighbors as in the regular BitTorrent protocol to evenly distribute the file pieces. Second, for a new peer that has just joined and does not have any blocks, ACNS is not applicable. The new peers also select their initial neighbors randoly. Note that we do not eploy ACNS when selecting inside neighbors. This is because, after joining the torrent for a while, a node always has ore links to inside neighbors and the bandwidths of these links are always very large. Thus, the file pieces are distributed very quickly within the ISPs even without ACNS. C. The Ipleentation of ACNS By slightly odifying the tracker and the client, ANCS can be ipleented easily. A function is added in the tracker to record the ISPs that the peers belong to. The challenge for tracker is how to get the inforation of ISP for each client. Many tools such as iplane [14] periodically update their databases for IP-to-AS apping. Based on that inforation, tracker can easily know that which ISP the peers belong to. As for the client, the function of periodic neighbor relationship

4 anageent based on PCIs should be added. We believe the slightly odifications on tracker and client are acceptable, and it greatly benefits both service provider and end-user. III. EVALUATIONS A. Experient Setup We developed a discrete-event siulator to evaluate the perforance of BitTorrent protocol with ACNS. This siulator odels peer activities (e.g. joins, departures) as well as other BitTorrent echaniss (e.g. TFT, etc.) in detail. We ipleent ACNS, original BitTorrent with no changes (called as Native BitTorrent) and biased neighbor selection [11] schee in which a node only has 1 fixed outside neighbor. All nodes in the network have asyetric upload/download bandwidths. The network (i.e. torrent) consists of 1,000 peers. Since ost of the current users are ADSL subscribers, the upload bandwidth of each peer is set to 512 Kbps while the download bandwidth is 2,048 Kbps. It is assued that the file to distribute is a very popular one, so all the peers join in the syste as a flash crowd [7]. The peer leaves the network as soon as it copletes downloading. There is one original seed in the syste. The original seed does not depart until all the nodes finish downloading. The default upload bandwidth of the seed is 5Mbps. 1,000 nodes are assigned to 10 ISPs, each with roughly 100 nodes. All the ISPs are copletely connected with each other. The downlink bandwidth of each ISP is 200Mbps, while the uplink bandwidth for BitTorrent application is liited, considering the traffic-shaping devices deployed by ISPs. The default uplink bandwidth of each ISP is 30Mbps. However, we explore the ipact of bandwidth throttling. The default file size is 100MB. The file is divided into pieces, each with 256KB. We ainly focus on three perforance etrics. M1. Proportion of cross-isp traffic. Let T intra-isp denotes the traffic generated within ISPs to distribute the file to all the nodes, T cross-isp denote the traffic between ISPs. Then the proportion of cross-isp traffic (P_Cross) is defined as follow, where n is the nuber of nodes. Tcross ISP Tcross ISP P_ Cross = = 100% Tcross ISP + Tint ra ISP n sizeof ( file) M2. Maxiu download tie: It is defined as the axiu value of nodes download coplete tie. M3. Mean download tie: It is defined as the ean value of nodes download coplete tie. Obviously, the first etric deonstrates the efficacy of our schee in ters of traffic shaping, while the last two tell us the download rate perforance. B. Perforance Results Experiental results are reported below in ters of 3 perforance etrics. We copare our schee ACNS-enabled BitTorrent perforance with the native BitTorrent and bias neighbor selection based BitTorrent. The siulations are run ultiple ties and the differences between the are neglectable. Hence, we only present the result of one run. 1) Relative ACNS Perforance First, we evaluate the perforances of different schees (a) Proportion of the cross-isp traffic (b) CDF of coplete tie Fig. 3 Relative perforance of ACNS enabled BitTorrent protocols. Fig. 3 depicts the results. Fig. 3(a) copares the proportion of cross-isp traffic. The cross-isp traffic only contributes 15.19% in ACNS, while it contributes 55.18% and 22.18% in native and biased BitTorrent, respectively. Thus, copared with native and biased BitTorrent, ACNS-enabled BitTorrent reduces the cross-isp traffic by about 72.5% and 31.5%, respectively. Fig. 3(b) shows the cuulative distribution of download coplete tie. It is found that, in ACNS-enabled BitTorrent, 95.4% percent of the total nodes coplete the download within 2,000 seconds, while only 17.0% percent and 59.1% percent within 2,000 seconds in native BitTorrent and bias neighbor selection based BitTorrent, respectively. We also copute the ean download tie. The results show that the ean download tie is 2,376 seconds for native BitTorrent, 1,945 seconds for bias neighbor selection based BitTorrent, and 1,660 seconds for ACNS-enabled BitTorrent. Hence, copared with native and biased BitTorrent, ACNS-enabled BitTorrent iproves the download rate by about 30.1% and 14.6%, respectively. 2) Ipact of Rechoose Neighbor Interval (RNI) Next, we explore the ipact of RNI on the perforance of ACNS. Recall that RNI should be bigger than 30 seconds. Fig. 4 plots the results when RNI varies fro 60 seconds to 600 seconds. The download tie is relative large when RNI is 60 seconds. This is because the interval is so sall that an outside neighbor ay have no chance to be optiistic unchoked before the connection is disconnected. However, once the RNI grows to 120 seconds, the download tie dwindles sharply. As to the cross-isp traffic, it grows fro 13.9% to 28.3% as RNI increases fro 60 seconds to 600 seconds. This stes fro the fact that, for a larger interval, it takes a long tie for the nuber of outside neighbors of a node drops to a sall value, which in turn benefits the piece exchanges aong ISPs. We choose 120 seconds for the default value of the interval.

5 Fig. 4 Ipact of Rechoose Neighbor Interval Fig. 5 Effect of Required Threshold 3) Effect of Required Threshold (RT) In this set of experients, we evaluate the effect of Required Threshold. Fig. 5 reports the results. Two observations are notable. First, when RT is as sall as 0.5, the download tie is relatively large. This is because, in this case, a node always has fewer outside neighbors. The file pieces that the ISPs really need are not fetched into the ISPs in tie. However, once the threshold grows to 1, the download tie decreases sharply. Second, the proportion of cross-isp traffic grows with the growth of the threshold for that a node always has ore outside neighbors when the threshold is larger. We choose 1 as the default value of the threshold. 4) Ipact of bandwidth throttling We evaluate the ipact of bandwidth throttling on the perforance by varying the ISP uplink bandwidth. Fig. 6 reports the results. In the native BitTorrent, node neighbors are randoly selected and ost of file pieces are exchanged aong ISPs. Thus, the uplink bandwidth is the bottleneck, which is the reason why the download tie in native BitTorrent decreases with the growth of uplink bandwidth. On the other hand, when the bandwidth is liited, a node ay only get fewer file pieces fro outside neighbors, while a considerable nuber of file pieces are gotten fro inside neighbors. This is the reason why the cross-isp traffic in native BitTorrent is saller when the uplink bandwidth is only 10Mbps. It is also found that the uplink bandwidth has a relatively sall ipact on the perforances of ACNS-enabled and bias neighbor selection based BitTorrent. However, ACNS outperfors others. Proportion of cross-isp traffic IV. CONCLUSION AND FUTURE WORK In this paper, we propose ACNS, an adaptive neighbor selection algorith for BitTorrent applications to reduce cross-isp traffic and enable fast content distribution. Rather than having a fixed nuber of outside neighbors, ACNS suggests that a node should adaptively select the ost cople- Fig. 6 Ipact of bandwidth throttling entary peers in other ISPs to connect with. To this end, we introduce piece copleentary index to evaluate the copleent of two nodes locating in different ISPs and then, depict how to leverage the index to guide the adjustent of neighbor relationships. The experiental results show the efficacy of our schee in ters of two perforance etrics, naely download tie and the cross-isp traffic. Specially, copared with the fixed biased neighbor selection schee, ANCS cuts down the cross-isp traffic by ore than 31% and iproves the download rate by about 15%. As a future work, we will study the piece selection strategy in BitTorrent to iprove the traffic locality and integrate the proposed schee into the open-source BitTorrent. ACKNOWLEDGE This work is supported by National Basic Research Progra of China with grant No.2007CB310702, by National Natural Science Foundation of China with grant No and No REFERENCES [1] A. Legout, G. Urvoy-Keller, P. Michiardi, Rarest first and choke algoriths are enough, proceedings of the 6th ACM SIGCOMM conference on Internet easureent, Rio de Janeriro, Brazil, [2] A. R. Bharabe, C. Herley, and V. N. Padanabhan, Analyzing and iproving a bittorrent networks perforance echaniss, INFOCOM [3] B. Cohen. Incentives build robustness in BitTorrent, P2PEcon, [4] D. Qiu and R. Srikant. Modeling and Perforance Analysis of BitTorrent-like Peer-to-Peer Networks, SIGCOMM, Sep [5] G. Shen, Y. Wang, Y. Xiong, B.Y. Zhao, Z. Zhang HPTP: Relieving the tension between ISPs and P2P, Proceedings of IPTPS, [6] H. Xie, A. Krishnaurthy, A. Silberschatz, Y. R. Yang, P4P: Provider Portal for Applications, SIGCOMM, [7] J.A. Pouwelse, P. Garbacki, D.H.J. Epea, H.J. Sips, A Measureent Study of the BitTorrent Peer-to-Peer File-Sharing Syste, technical report PDS , May [8] K. Guadi, R. Dunn, S. Saroiu, S. Gribble, H. Levy, and J. Zahorjan. Measureent, odeling, and analysis of a peer-to-peer file-sharing workload, in Proc. of SOSP 03, Bolton Landing, Oct [9] L. Guo, S. Chen, Z. Xiao, E. Tan, Measuresnts, analysis and odeling of bittorrent-like systes, IMC, [10] R. Bindal, P. Cao, W. Chan, J. Medved, G. Suwala, T. Bates, and A. Zhang, Iproving traffic locality in bittorrent via biased neighbor selection, ICDCS, [11] T. Wang, L. Wen, W. Li, J. Tao, A. Wang, and F. Baker Traffic Shaping in BitTorrent Systes by Centralized Hierarchical Peer-node Assignent, ICC, [12] V. Rai, S. Sivasubraanian, and S. Bhulai., A ulti Phased approach for odeling and analysis of the BitTorrent protocol, Proc. of IEEE ICDCS 2007, Toronto, Canada, [13] Internet Study 2007, Available: [14] iplane. Available:

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan

More information

Improve Peer Cooperation using Social Networks

Improve Peer Cooperation using Social Networks Iprove Peer Cooperation using Social Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Noveber 5, 2007 Corresponding

More information

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

A Hybrid Network Architecture for File Transfers

A Hybrid Network Architecture for File Transfers JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,

More information

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm roceedings of the 7th International Conference on Innovation & Manageent 893 Research on a Kind of QoS-Sensitive Seantic Web Services Coposition Method Based on Genetic Algorith Cao Hongjiang, Nie Guihua,

More information

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

Planet Scale Software Updates

Planet Scale Software Updates Planet Scale Software Updates Christos Gkantsidis 1, Thoas Karagiannis 2, Pablo Rodriguez 1, and Milan Vojnović 1 1 Microsoft Research 2 UC Riverside Cabridge, UK Riverside, CA, USA {chrisgk,pablo,ilanv}@icrosoft.co

More information

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San

More information

Real-Time Detection of Invisible Spreaders

Real-Time Detection of Invisible Spreaders Real-Tie Detection of Invisible Spreaders MyungKeun Yoon Shigang Chen Departent of Coputer & Inforation Science & Engineering University of Florida, Gainesville, FL 3, USA {yoon, sgchen}@cise.ufl.edu Abstract

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction Relocation of ateway for Enhanced Tieliness in Wireless Sensor Networks Keal Akkaya and Mohaed Younis Departent of oputer Science and Electrical Engineering University of Maryland, altiore ounty altiore,

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

The Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network

The Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network The Flaw Attack to the RTS/CTS Handshake Mechanis in Cluster-based Battlefield Self-organizing Network Zeao Zhao College of Counication Engineering, Hangzhou Dianzi University, Hangzhou 310018, China National

More information

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13 Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical

More information

Content Distribution and BitTorrent [Based on slides by Cosmin Arad]

Content Distribution and BitTorrent [Based on slides by Cosmin Arad] ID2210 - Distributed Computing, Peer-to-Peer and GRIDS Content Distribution and BitTorrent [Based on slides by Cosmin Arad] Today The problem of content distribution A popular solution: BitTorrent Underlying

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

Collaborative Web Caching Based on Proxy Affinities

Collaborative Web Caching Based on Proxy Affinities Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA

More information

Integrating fast mobility in the OLSR routing protocol

Integrating fast mobility in the OLSR routing protocol Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr

More information

A Measurement-Based Model for Parallel Real-Time Tasks

A Measurement-Based Model for Parallel Real-Time Tasks A Measureent-Based Model for Parallel Real-Tie Tasks Kunal Agrawal 1 Washington University in St. Louis St. Louis, MO, USA kunal@wustl.edu https://orcid.org/0000-0001-5882-6647 Sanjoy Baruah 2 Washington

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

Efficiency of Data Distribution in BitTorrent-Like Systems

Efficiency of Data Distribution in BitTorrent-Like Systems Efficiency of Data Distribution in BitTorrent-Like Systems Ho-Leung Chan 1,, Tak-Wah Lam 2, and Prudence W.H. Wong 3 1 Department of Computer Science, University of Pittsburgh hlchan@cs.pitt.edu 2 Department

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones Advance Access publication on 24 February 2017 The British Coputer Society 2017. All rights reserved. For Perissions, please eail: journals.perissions@oup.co doi:10.1093/cojnl/bxx015 Fair Energy-Efficient

More information

Multi Packet Reception and Network Coding

Multi Packet Reception and Network Coding The 2010 Military Counications Conference - Unclassified Progra - etworking Protocols and Perforance Track Multi Packet Reception and etwork Coding Aran Rezaee Research Laboratory of Electronics Massachusetts

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Navodaya Garepalli Kartik Gopalan Ping Yang Coputer Science, Binghaton University (State University of New York) Contact:

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se

More information

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design A Fast Multi-Obective Genetic Algorith for Hardware-Software Partitioning In Ebedded Syste Design 1 M.Jagadeeswari, 2 M.C.Bhuvaneswari 1 Research Scholar, P.S.G College of Technology, Coibatore, India

More information

A Periodic Dynamic Load Balancing Method

A Periodic Dynamic Load Balancing Method 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation

More information

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3 2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition

More information

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We

More information

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao

More information

Data & Knowledge Engineering

Data & Knowledge Engineering Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID

More information

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH Kulapraote Prathuchai Geoinforatics Center, Asian Institute of Technology, 58 Moo9, Klong Luang, Pathuthani, Thailand.

More information

A Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems

A Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems A Low-cost Meory Architecture with XIP for Mobile Ebedded Systes Chanik Park, Jaeyu Seo, Sunghwan Bae, Hyojun Ki, Shinhan Ki and Busoo Ki Software Center, SAMSUNG Electronics, Co., Ltd. Seoul 135-893,

More information

DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION

DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION www.arpnjournals.co DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION N. Snehalatha 1 and Paul Rodrigues 2 1 School of Coputing, SRM University, Chennai, Tail Nadu, India 2 Departent

More information

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium 1 A Distributed Multi-service Resource Allocation Algorith in Heterogeneous Wireless Access Mediu Muhaad Isail, Student Meber, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract In this paper, radio resource

More information

Dynamical Topology Analysis of VANET Based on Complex Networks Theory

Dynamical Topology Analysis of VANET Based on Complex Networks Theory BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 14, Special Issue Sofia 014 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.478/cait-014-0053 Dynaical Topology Analysis

More information

Efficient file search in non-dht P2P networks

Efficient file search in non-dht P2P networks Available online at www.sciencedirect.co Coputer Counications 3 (28) 34 37 www.elsevier.co/locate/coco Efficient file search in non-dht P2P networks Shiping Chen a, Zhan Zhang b, *, Shigang Chen b, Baile

More information

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES. Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou

MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES. Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou Departent of Coputer Science and Inforation Engineering, National Chiayi

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

Generating Mechanisms for Evolving Software Mirror Graph

Generating Mechanisms for Evolving Software Mirror Graph Journal of Modern Physics, 2012, 3, 1050-1059 http://dx.doi.org/10.4236/jp.2012.39139 Published Online Septeber 2012 (http://www.scirp.org/journal/jp) Generating Mechaniss for Evolving Software Mirror

More information

Design and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design

Design and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design Design and Ipleentation of Business Logic Layer Object-Oriented Design versus Relational Design Ali Alharthy Faculty of Engineering and IT University of Technology, Sydney Sydney, Australia Eail: Ali.a.alharthy@student.uts.edu.au

More information

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang IEEE International Conference on ultiedia and Expo POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION Junjun Jiang, Ruiin Hu, Zhen Han, Tao Lu, and Kebin Huang National Engineering

More information

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University

More information

Carving Differential Unit Test Cases from System Test Cases

Carving Differential Unit Test Cases from System Test Cases Carving Differential Unit Test Cases fro Syste Test Cases Sebastian Elbau, Hui Nee Chin, Matthew B. Dwyer, Jonathan Dokulil Departent of Coputer Science and Engineering University of Nebraska - Lincoln

More information

1 Extended Boolean Model

1 Extended Boolean Model 1 EXTENDED BOOLEAN MODEL It has been well-known that the Boolean odel is too inflexible, requiring skilful use of Boolean operators to obtain good results. On the other hand, the vector space odel is flexible

More information

Burst Scheduling Networks. Simon S. Lam and Georey G. Xie. The University of Texas at Austin. Austin, Texas August 31, 1996.

Burst Scheduling Networks. Simon S. Lam and Georey G. Xie. The University of Texas at Austin. Austin, Texas August 31, 1996. Burst Scheduling Networks Sion S. La and Georey G. Xie Departent of Coputer Sciences The University of Texas at Austin Austin, Texas 78712-1188 August 31, 1996 Abstract Most application-level data units

More information

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant

More information

Relief shape inheritance and graphical editor for the landscape design

Relief shape inheritance and graphical editor for the landscape design Relief shape inheritance and graphical editor for the landscape design Egor A. Yusov Vadi E. Turlapov Nizhny Novgorod State University after N. I. Lobachevsky Nizhny Novgorod Russia yusov_egor@ail.ru vadi.turlapov@cs.vk.unn.ru

More information

BP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks

BP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks BP-MAC: A High Reliable Backoff Preable MAC Protocol for Wireless Sensor Networks Alexander Klein* Jirka Klaue Josef Schalk EADS Innovation Works, Gerany *Eail: klein@inforatik.uni-wuerzburg.de ABSTRACT:

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

Closing The Performance Gap between Causal Consistency and Eventual Consistency

Closing The Performance Gap between Causal Consistency and Eventual Consistency Closing The Perforance Gap between Causal Consistency and Eventual Consistency Jiaqing Du Călin Iorgulescu Aitabha Roy Willy Zwaenepoel EPFL ABSTRACT It is well known that causal consistency is ore expensive

More information

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.5, Septeber 205 AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM Xie Yang and Cheng Wushan College of Mechanical Engineering,

More information

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract

More information

Identifying Converging Pairs of Nodes on a Budget

Identifying Converging Pairs of Nodes on a Budget Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering

More information

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage 216 IEEE 23rd International Conference on High Perforance Coputing A Low-Cost Multi-Failure Resilient Replication Schee for High Data Availability in Cloud Storage Jinwei Liu* and Haiying Shen *Departent

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

On Performance Bottleneck of Anonymous Communication Networks

On Performance Bottleneck of Anonymous Communication Networks On Perforance Bottleneck of Anonyous Counication Networks Ryan Pries, Wei Yu, Steve Graha, and Xinwen Fu Abstract Although a significant aount of effort has been directed at discovering attacks against

More information

A Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem

A Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem IE Vol. 7, No. 2, pp. 84-92, Septeber 2008. A Coparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Proble Ji Ung Sun School of Industrial and Managent Engineering Hankuk University

More information

Multipath Selection and Channel Assignment in Wireless Mesh Networks

Multipath Selection and Channel Assignment in Wireless Mesh Networks Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,

More information

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute

More information

Adaptive Holistic Scheduling for In-Network Sensor Query Processing

Adaptive Holistic Scheduling for In-Network Sensor Query Processing Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,

More information

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches Efficient Estiation of Inclusion Coefficient using HyperLogLog Sketches Azade Nazi, Bolin Ding, Vivek Narasayya, Surajit Chaudhuri Microsoft Research {aznazi, bolind, viveknar, surajitc}@icrosoft.co ABSTRACT

More information

Equation Based Congestion Control for Video Transmission over WCDMA Networks

Equation Based Congestion Control for Video Transmission over WCDMA Networks Equation Based Congestion Control for Video Transission over WCDMA Networks Antonios Alexiou, Diitrios Antonellis and Christos Bouras Research Acadeic Coputer Technology Institute, Greece and Coputer Engineering

More information

IN many interactive multimedia streaming applications, such

IN many interactive multimedia streaming applications, such 840 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 5, MAY 06 A Geoetric Approach to Server Selection for Interactive Video Streaing Yaochen Hu, Student Meber, IEEE, DiNiu, Meber, IEEE, and Zongpeng Li, Senior

More information

Redundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network

Redundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network (IJACSA) International Journal of Advanced Coputer Science and Applications Vol. 8, No. 1, 217 Redundancy Level Ipact of the Mean Tie to Failure on Wireless Sensor Network Alaa E. S. Ahed 1 College of

More information

Database Design on Mechanical Equipment Operation Management System Zheng Qiu1, Wu kaiyuan1, Wu Chengyan1, Liu Lei2

Database Design on Mechanical Equipment Operation Management System Zheng Qiu1, Wu kaiyuan1, Wu Chengyan1, Liu Lei2 2nd International Conference on Advances in Mechanical Engineering and Industrial Inforatics (AMEII 206) Database Design on Mechanical Equipent Manageent Syste Zheng Qiu, Wu kaiyuan, Wu Chengyan, Liu Lei2

More information

I ve Seen Enough : Incrementally Improving Visualizations to Support Rapid Decision Making

I ve Seen Enough : Incrementally Improving Visualizations to Support Rapid Decision Making I ve Seen Enough : Increentally Iproving Visualizations to Support Rapid Decision Making Sajjadur Rahan Marya Aliakbarpour 2 Ha Kyung Kong Eric Blais 3 Karrie Karahalios,4 Aditya Paraeswaran Ronitt Rubinfield

More information

Scheduling Parallel Task Graphs on (Almost) Homogeneous Multi-cluster Platforms

Scheduling Parallel Task Graphs on (Almost) Homogeneous Multi-cluster Platforms 1 Scheduling Parallel Task Graphs on (Alost) Hoogeneous Multi-cluster Platfors Pierre-François Dutot, Tchiou N Takpé, Frédéric Suter and Henri Casanova Abstract Applications structured as parallel task

More information

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles

More information

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade

More information

1 P a g e. F x,x...,x,.,.' written as F D, is the same.

1 P a g e. F x,x...,x,.,.' written as F D, is the same. 11. The security syste at an IT office is coposed of 10 coputers of which exactly four are working. To check whether the syste is functional, the officials inspect four of the coputers picked at rando

More information

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networs F. Mousavi Madani Departent of coputer engineering Alzahra University Tehran, Iran, osavif@alzahra.ac.ir Received:

More information

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive and Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

Improving BitTorrent: A Simple Approach

Improving BitTorrent: A Simple Approach Improving BitTorrent: A Simple Approach Alix L.H. Chow Univ. of Southern California Leana Golubchik Univ. of Southern California Vishal Misra Columbia University Abstract Measurement studies have shown

More information

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH V. Atienza; J.M. Valiente and G. Andreu Departaento de Ingeniería de Sisteas, Coputadores y Autoática Universidad Politécnica de Valencia.

More information

Research Article A Game Theory Based Congestion Control Protocol for Wireless Personal Area Networks

Research Article A Game Theory Based Congestion Control Protocol for Wireless Personal Area Networks Journal of Sensors Volue 216, Article ID 61683, 13 pages http://dx.doi.org/1.11/216/61683 Research Article A Gae Theory Based Congestion Control Protocol for Wireless Personal Area Networks Chuang Ma,

More information

Verifying the structure and behavior in UML/OCL models using satisfiability solvers

Verifying the structure and behavior in UML/OCL models using satisfiability solvers IET Cyber-Physical Systes: Theory & Applications Review Article Verifying the structure and behavior in UML/OCL odels using satisfiability solvers ISSN 2398-3396 Received on 20th October 2016 Revised on

More information

Effects of Interleaving on RTP Header Compression

Effects of Interleaving on RTP Header Compression Effects of Interleaving on RTP Header Copression Colin Perkins Jon Crowcroft Departent of Coputer Science University College London Gower Street London WCE 6BT Abstract We discuss the use of interleaving

More information

Data-driven Hybrid Caching in Hierarchical Edge Cache Networks

Data-driven Hybrid Caching in Hierarchical Edge Cache Networks Data-driven Hybrid Caching in Hierarchical Edge Cache Networks Abstract Hierarchical cache networks are increasingly deployed to facilitate high-throughput and low-latency content delivery to end users.

More information

HIGH PERFORMANCE PRE-SEGMENTATION ALGORITHM FOR SONAR IMAGES

HIGH PERFORMANCE PRE-SEGMENTATION ALGORITHM FOR SONAR IMAGES HIGH PERFORMANCE PRE-SEGMENTATION ALGORITHM FOR SONAR IMAGES Benjain Lehann*, Konstantinos Siantidis*, Dieter Kraus** *ATLAS ELEKTRONIK GbH Sebaldsbrücker Heerstraße 235 D-28309 Breen, GERMANY Eail: benjain.lehann@atlas-elektronik.co

More information

Reducing Crosspoint Buffers for Performance Guaranteed Asynchronous Crossbar Scheduling

Reducing Crosspoint Buffers for Performance Guaranteed Asynchronous Crossbar Scheduling educing Crosspoint Buffers for Perforance Guaranteed Asynchronous Crossbar Scheduling Masoueh Karii, Zhuo Sun, and Deng Pan Florida International University Eails: {kari001, zsun003, pand}@fiu.edu Abstract

More information

Distributed Multi-robot Work Load Partition In Manufacturing Automation

Distributed Multi-robot Work Load Partition In Manufacturing Automation th IEEE Conference on Autoation Science and Engineering Key Bridge Marriott, Washington DC, USA August 3-, Distributed Multi-robot Work Load Partition In Manufacturing Autoation Gira S Tewolde, Changhua

More information

Improving the Download Time of BitTorrent-like Systems

Improving the Download Time of BitTorrent-like Systems Improving the Download Time of BitTorrent-like Systems Chi-Jen Wu, Cheng-Ying Li, and Jan-Ming Ho Institute of Information Science Academia Sinica, Taiwan {cjwu, cyli, hoho}@iis.sinica.edu.tw Abstract

More information

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada

More information

COMPARISON OF ANT COLONY OPTIMIZATION & PARTICLE SWARM OPTIMIZATION IN GRID ENVIRONMENT

COMPARISON OF ANT COLONY OPTIMIZATION & PARTICLE SWARM OPTIMIZATION IN GRID ENVIRONMENT COMPARISON OF ANT COLONY OPTIMIZATION & PARTICLE SWARM OPTIMIZATION IN GRID ENVIRONMENT B.BOOBA 1 Dr. T.V.GOPAL 2 1 Research Scholar, Assist. Professor(Sl.Gr),Departent of Coputer Applications, Easwari

More information

Survivability Function A Measure of Disaster-Based Routing Performance

Survivability Function A Measure of Disaster-Based Routing Performance Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information