On Achieving Optimal Throughput with Network Coding

Size: px
Start display at page:

Download "On Achieving Optimal Throughput with Network Coding"

Transcription

1 In IEEE INFOCOM On Achieving Optiml Throughput with Network Coding Zongpeng Li, Bochun Li, Dn Jing, Lp Chi Lu Astrct With the constrints of network topologies nd link cpcities, chieving the optiml end-to-end throughput in dt networks hs een known s fundmentl ut computtionlly hrd prolem. In this pper, we seek efficient solutions to the prolem of chieving optiml throughput in dt networks, with single or multiple unicst, multicst nd rodcst sessions. Although previous pproches led to solving NP-complete prolems, we show the surprising result tht, fcilitted y the recent dvnces of network coding, computing the strtegies to chieve the optiml end-to-end throughput cn e performed in polynomil time. This result holds for one or more communiction sessions, s well s in the overly network model. Supported y empiricl studies, we present the surprising oservtion tht in most topologies, pplying network coding my not improve the chievle optiml throughput; rther, it fcilittes the design of significntly more efficient lgorithms to chieve such optimlity. Index terms: Grph theory, Informtion theory, Mthemticl progrmming/optimiztion, Simultions. I. INTRODUCTION In its most generl form, dt network consists of set of end hosts nd switches interconnected vi undirected (or duplex) communiction links. In dt networks with known topologies nd ndwidth cpcity ounds for ech undirected link, fundmentl prolem is to compute nd chieve the mximum end-to-end throughput for one or multiple ctive communiction sessions. Depending on the ojectives of pplictions, communiction session my e in the form of unicst (one-to-one), multicst (one-to-mny), rodcst (one-to-ll), or group communiction (mny-to-mny). The solutions to this prolem my led to fundmentl nd new insights with respect to optiml routing nd trffic engineering. For exmple, the recent prdigm of selfish routing [1] llows end hosts to choose routes themselves using source routing strtegies. Finding the optiml strtegy to disseminte dt to multiple destintions with mximum throughput is of nturl interests in such prdigm, especilly when we wish to optimlly exploit existing network cpcities to disseminte lrge volumes of dt. The focus on the undirected network model is supported y the following justifictions. First, s pst reserch in network flow theory [2] nd informtion theory [3] suggests, the undirected network model hs its own rhythm, nd results otined there my e drsticlly different from those otined in the directed network model. In fct, the undirected model is Zongpeng Li, Bochun Li nd Dn Jing re with the Deprtment of Electricl nd Computer Engineering, University of Toronto. Their emil ddresses re {rcne,li,djing}@eecg.toronto.edu}. Lp Chi Lu is with the Deprtment of Computer Science, University of Toronto. His emil ddress is {chi@cs.toronto.edu}. more generl nd fundmentl in tht, solution constructed for undirected networks cn usully e pplied to solve the sme prolem in directed networks, ut not vice vers. This is prticulrly true for our prolem nd solution in this pper. Second, undirected communiction links provide the complete flexiility in cpcity lloction, nd consequently leds to higher trnsmission rtes tht etter represent the optiml informtion flow rte. Finlly, in specil network scenrios such s wireless d hoc networks, communiction links re nturlly undirected, in the sense tht dt trnsmission long oth directions of the wireless link shre the ville spectrum. In this pper, we seek to ring fundmentlly new insights nd efficient solutions to the prolem of optimizing end-toend throughput in undirected dt networks. We first illustrte the power of network coding [4], [] with respect to chieving optiml throughput. In the prdigm of network coding, informtion flows in dt networks my not only e stored nd forwrded, ut lso e encoded nd decoded in ny nodes in the network. We show tht, lthough previous directions of computing optiml multicst throughput involve solving NP-complete prolems, the mximum multicst throughput nd the corresponding optiml multicst strtegy cn indeed e computed efficiently in polynomil time, with the unique encodle property of informtion flows considered. We then show tht this conclusion cn e extended to multiple concurrent sessions, s well s to other types of communiction, including unicst, rodcst nd group communiction. Even when the generl form of dt networks is modified to reflect relistic chrcteristics of overly networks (where only end hosts t the edge my e le to replicte, encode nd decode dt), the sme conclusion still holds. The solutions to the prolems include not only optiml routing strtegies to trnsmit dt in the network, ut lso how dt my e encoded nd decoded s they re relyed towrds the destintions. Though there exist previous results on network coded throughput in directed networks, to the est of our knowledge, this pper is the first work tht systemticlly studies the effects of network coding with respect to optimizing throughput in undirected dt networks. The vilility of efficient solutions mkes it finlly possile to study vrious spects of properties of the chievle throughput, in relisticlly sized networks. We present empiricl studies sed on simultion results over thousnds of test scenrios using our lgorithms. We compre the optiml multicst throughput with nd without network coding, nd show tht noticele throughput gins cn only e experienced in contrived network topologies; for rndom nd irregulr network topologies it is lmost lwys zero. This grees with 1

2 out previous theoreticl results on the upper ound of the dvntge of network coding in undirected networks [3]: rther thn incresing throughput, the dvntge of network coding is indeed to fcilitte significntly more efficient computtion of the strtegies to chieve optiml throughput of informtion flows. Our empiricl studies lso show tht overly multicst, which hs recently ttrcted extensive reserch efforts, my pproch optiml throughput quite well. The reminder of this pper is orgnized s follows. We first discuss relted work in Sec. II. In Sec. III, we present our min theorems nd lgorithm with respect to chieving optiml endto-end throughput with single multicst session. In Sec. IV, we extend our results to the cses of multiple sessions of unicst, multicst, rodcst, nd group communiction. We lso consider the model of overly networks, where only suset of nodes re cple of repliction nd coding. We then present empiricl studies in Sec. V, nd conclude the pper in Sec. VI. II. RELATED WORK The open prolem of chieving optiml end-to-end throughput with efficient lgorithms hs not een discussed in depth in existing literture. There exist, however, similr prolems tht hve een extensively studied. Towrds the direction of Qulity of Service (QoS) routing, the ojective is to find endto-end pths or multicst trees tht stisfy specific ndwidth or dely constrints, nd therefore providing the desired QoS gurntees [6]. With respect to end-to-end throughput, finding good topologies tht stisfy ndwidth requirements is oviously different from nd rguly esier thn finding optiml ones. There exists n extensive ody of reserch in the re of multicst routing in wide-re IP networks (e.g., [7]). The dvntge of IP-sed multicst is rought y dt pcket repliction on multicst-cple switches, improving ndwidth efficiency nd throughput compred to ll (nive) unicst etween the source nd the multicst receivers. However, since it is sed on the construction of single tree, the end-to-end throughput is not optiml compred to wht is chievle y topology eyond tree. As IP multicst is not redily deployed, lgorithms promoting ppliction-lyer overly multicst hve recently een proposed s remedil solutions, focusing on the issue of constructing nd mintining multicst tree using only end hosts [8], [9]. Though single multicst tree my not led to optimized throughput, recent studies (e.g., SplitStrem [1], CoopNet [11], Digitl Fountin [12] nd Bullet [13]) hve proposed to utilize either multiple multicst trees (forest) or topologicl mesh to deliver striped dt from the source, using either multiple description coding or source ersure codes to split content to e multicst. These proposls hve indeed improved end-to-end throughput eyond tht of single tree, ut there hve een no discussions on whether the optiml throughput my e chieved, or how close the proposed lgorithms pproch optimlity. In this pper, we study such chievle optimlity, while considering the most generl cse where the dt source trnsmits strem of ytes, nd is not ssumed to perform ny source or error correction coding. There hve een studies on chieving optimlity with respect to computing olivious routing strtegies in dt networks. The ojectives re to mximize throughput for source-destintion pir, nd to minimize congestion on the network. Most notly, using liner progrmming techniques, polynomil time lgorithms (with polynomil numer of vriles nd constrints in the LP formultion) cn e constructed to compute strtegies for optiml olivious routing for ny network, directed or undirected [14]. Though we lso employ liner optimiztion tools nd study undirected networks, our prolem domin is more generl: while optiml olivious routing focuses on origin-destintion pirs of unicst sessions (possily exploiting pth diversity), we focus on vriety of communiction sessions, including unicst, multicst, rodcst nd group communiction. We seek fundmentl insights on how optiml routing strtegy my ecome, nd wht is the mximum chievle throughput in communiction session. The theory of network flows studies the trnsmission of commodities of the sme type (unicommodity flows) through cpcitied network. The mximum flow rte etween the source nd the destintion which my e computed with vrious efficient comintoril lgorithms [2]. When commodities to e trnsmitted re of different types (multicommodity flows), computing the mximum flow rte cn e solved s liner optimiztion prolem. In oth unicommodity nd multicommodity flows, commodities my only e forwrded t intermedite nodes, comprle to ll unicst in dt networks. The concept of network coding extends the cpilities of network nodes in communiction session: from sic dt forwrding (s in ll unicst) nd dt repliction (s in IP or overly multicst), to coding in Glois fields. Fig. 1 illustrtes clssic exmple of how network coding ssists to improve end-to-end throughput. As R 1 receives oth nd + (encoded over GF(2)), it is le to decode nd retrieve oth nd. If the link cpcities re 1, the mximum chievle throughput with network coding is 2. Without coding, it cn e computed tht the optiml throughput is 1.87 [3]. If only one multicst tree is used (s in IP multicst), the chieved throughput is 1. S R1 R 2 () Mximum throughput with one multicst tree is 1(1.87 with multiple trees). + S + R1 R 2 () Mximum throughput with network coding is 2. Fig. 1. The dvntge of network coding with respect to improving the end-to-end multicst throughput from S to R 1 nd R 2. The recent rekthrough theorem in network coding shows tht, for multicst session in directed networks, if rte x cn e chieved from the sender to ech of the multicst receivers independently, it cn lso e chieved for the entire multicst session (refer to independent proofs of Ahlswede et l. [4] nd Koetter et l. []). In ddition, Li et l. [1] show tht liner codes suffice to chieve such property. All +

3 liner coding opertions re defined s liner comintions over Glois fields with fixed element lengths, thus the size of the dt does not increse fter eing encoded. III. ACHIEVING OPTIMAL THROUGHPUT IN UNDIRECTED DATA NETWORKS: THE SINGLE MULTICAST CASE We egin our study from the cse of single multicst session. We consider the most generl form of dt networks, represented y simple grph G = (V,E) with undirected edges etween network nodes. Ech edge represents communiction link, nd the edge cpcities re specified y function C : E Q + (where Q + denotes the set of positive rtionl numers), representing the ville ndwidth cpcities of communiction links. Throughout this pper, we focus on the frctionl model of dt routing, where the cpcity of ech link my e shred frctionlly in oth directions, nd informtion flows my e split nd merged t ritrrily fine scles. We use M = {m,m 1,...,m k } V to specify the set of nodes in the multicst group, with m eing the sender. In grphicl illustrtions throughout this pper, nodes in M re shown s lck, nd nodes in V M re shown s white. Links re leled with their cpcities, nd ll unleled links hve cpcity of 1. A. Steiner tree pcking nd Steiner strength To compute the optiml throughput of multicst sessions, Steiner tree pcking [16], [17] nd Steiner strength hve een the stte-of-the-rt. Unfortuntely, oth re NP-hrd solutions. Steiner tree pcking. Consider the cse of informtion flows in one multicst session from source to set of destintions. It cn e theoreticlly shown tht, if coding is not considered, chieving optiml throughput vi multiple multicst trees is equivlent to the prolem of Steiner tree pcking, which seeks to find the mximum numer of pirwise edge-disjoint Steiner trees, in ech of which the multicst group remins connected. An intuitive explntion to such equivlence is tht, ech unit throughput corresponds to unit informtion flow eing trnsmitted long tree tht connects every node in the group. The mximum numer of trees we cn find corresponds to the optiml throughput for the session. Fig. 2() shows such n exmple. In the figure, ech letter corresponds to distinct Steiner tree, nd nine such Steiner trees ( to i) exist in the shown pcking scheme, where the tree corresponding to is highlighted. Since ech link with unit cpcity needs to ccommodtes Steiner trees, the chievle throughput on ech tree is, therefore,.2. This leds to multicst throughput of 1.8, which is optiml without coding. Unfortuntely, Steiner tree pcking hs een shown to e NP-complete [17], [18], nd the est known polynomil time lgorithm hs n pproximtion rtio of round 1. [18]. With the sme exmple, we cn lso show tht the chievle optiml throughput with network coding is 2 (Fig. 2()), which is higher thn tht chieved without coding. Consequently, even if Steiner tree pcking is computtionlly fesile, it my not lwys yield the ctul optiml multicst throughput. Steiner strength. In n undirected cpcitied network N, we consider prtitions of the network where there exists t defh m 3 efgh defgh cegi m 1 cdi m fghi cdi cefgh () steiner tree pcking nd multicst without coding. cdi m 2 m3 m 1 + m + + m 2 () multicst with network coding. Fig. 2. The chievle optiml throughput is 1.8 without coding, nd 2 with coding. lest one source or receiver node in ech component of the prtition. Let P e the set of ll such prtitions. The Steiner strength of N is defined s min p P E c /( p 1), where E c is the totl inter-component link cpcity on the set of links E c eing cut, nd p is the numer of components in the prtition p. It is nturl extension of network strength [19] defined for rodcst network. It is known from our previous work tht network strength is equivlent to the chievle optiml throughput in rodcst sessions [3]. Therefore, it is nturl direction to compute optiml multicst throughput y computing the Steiner strength. Unfortuntely, the Steiner strength prolem turns out to e NP-complete s well. The fct tht computing Steiner strength is NP-complete lso rules out the possiility tht Steiner strength nd optiml multicst throughput re lwys equl. In fct, we find tht Steiner strength is either equl to or higher thn the chievle optiml throughput 1. B. Efficient solutions for throughput optimiztion: the cflow Liner Progrm Contrry to the previous pessimistic views, we present the surprising result tht efficient solutions do exist for computing optiml throughput in undirected networks. We first formulte the prolem s liner network optimiztion prolem, in which oth the numer of vriles nd the numer of constrints re ounded y O( M E ). We then show tht the result of such optimiztion exctly gives the mximum chievle throughput, s well s the corresponding routing strtegy. We lso discuss possile solutions to the liner progrm. We egin y presenting the orienttion constrints of the liner progrm tht computes optiml throughput. An orienttion of network N is strtegy to replce ech undirected link e = uv with two directed links 1 = uv nd 2 = vu, such tht C(e) = C( 1 ) + C( 2 ). After the orienttion, the set of undirected links E ecomes set of directed links A, with the numer of links in the set douled. We proceed to consider flows from the source to the multicst receivers. To tke dvntge of the power of network coding to resolve competition for link cpcities, we introduce the concept of conceptul flows (cflow). We define conceptul 1 Oserving spce constrints, we exclude the proofs of this result nd the NP-completeness of Steiner strength. Interested reders re referred to our technicl report [], which lso includes more detiled explntions nd n exmple in which the Steiner strength is higher thn the optiml throughput.

4 flows s network flows tht co-exist in the network without contending for link cpcities. Our liner progrm to compute the optiml throughput, shown in Tle I, is referred to s the cflow LP since it is sed on conceptul flows. In the LP, f 1...f k re the conceptul flows from sender m to ech of the receivers. Ech flow vector f i specifies flow rte f i () for ech directed link A. fin i (v) denotes the totl incoming fi flow rte t node v, similr for fout(v). i Finlly, the sclr χ is the trget flow rte of optimiztion. In ddition to the orienttion constrints, the cflow LP lso includes the network flow constrints for ech conceptul flow, nd the equl rte constrints. The network flow constrints re specified in compct form for ll conceptul flows, which requires (1) flow rtes must e upper ounded y link cpcities; (2) flow conservtion, i.e., the incoming flow rte in the conceptul flow f i equls to outgoing flow rte in f i t rely node for f i ; nd (3) the incoming flow rte t the source nd the outgoing flow rtes t the receiver re ll zero, for ech f i. The equl rte constrints require tht the flow rtes of conceptul flows re identicl, with χ eing the uniform flow rte. With these liner constrints, the trget flow rte χ is then mximized. TABLE I THE cflow LP Mximize: χ Suject to: Orienttion j constrints: C() A C( 1) + C( 2) = C(e) e E Independent 8 network flow constrints for ech conceptul flow: f i () i [1..k], A >< f i () C() i [1..k], A fin(v) i = fout(v) i i [1..k], v V {m, m i} f >: in(m i ) = i [1..k] fout(m i i) = i [1..k] Equl rte constrints: χ = fin(m i i) i [1..k] We re now redy to present one of our min contriutions of this pper, y showing tht the cflow LP provides n efficient lgorithm to compute the chievle optiml throughput, s well s the routing strtegy. Theorem 1. For n undirected dt network with single multicst session, N = {G(V,E),C : E Q +,M = {m,m 1,...,m k } V }, the mximum end-to-end throughput χ(n) nd its corresponding optiml routing strtegy cn e computed in polynomil time using the cflow LP, in which oth the numer of vriles nd the numer of constrints re polynomil, nd on the order of O( M E ). The conceptul flows f 1...f k constitute the optiml routing strtegy. Proof: The orienttion constrints reflect complete flexiility in orienting the undirected network N, without eing too restrictive or too relxed. For ech fixed orienttion, conceptul flows re eing mximized with independent nd stndrd network flow constrints, s well s the extr constrint tht conceptul flow rtes re equl to ech other. Therefore, the result of the mximiztion is the mximum possile flow rte tht cn e independently chieved from the source to ll receivers, over ll possile orienttions of the network: χ = mx [ min (mximum m m i flow rte)], o O m i M {m } where O denotes ll possile orienttions of the network, nd M {m } is the set of multicst receivers. Recll the recent rekthrough in network coding [4], [] shows tht, for fixed orienttion of the network, rte x cn e chieved for the entire multicst session if nd only if it cn e chieved for ech multicst receiver independently. This implies tht, the mximum throughput in ech orienttion equls to the minimum of the mximum source to receiver flow rte. The cflow LP essentilly mximizes this min-mx flow over ll possile network orienttions, nd otins the mx-min-mx flow tht is precisely the mximum multicst throughput in the originl undirected network. Further, the source my trnsmit informtion to ech receiver m i ccording to the conceptul flow f i. Should more thn one conceptul flows utilize cpcity on the sme link, the conflict cn lwys e resolved, provided tht network coding is pplied ppropritely [4], []. The cflow LP contins 2 E orienttion vriles C(), 2 M E virtul flow vriles f i (), nd one trget flow rte vrile χ. Therefore, the totl numer of vriles is 2( M + 1) E + 1, which is on the order of O( M E ). In ddition, the cflow LP contins 3 E orienttion constrints, (4 E + V )( M 1) network flow constrints, s well s M 1 equl rte constrints. The totl numer of constrints is, therefore, (4 E + V + 1)( M 1) + 3 E, which is lso on the order of O( M E ). The optiml routing strtegy computed y cflow LP specifies the rte of dt strems eing trnsmitted long ech link. Bsed on the routing strtegy, we need to perform the dditionl step of code ssignment to compute the coding strtegy, efore dt strems my e trnsmitted. The coding strtegy includes one trnsformtion mtrix for ech node, which specifies how incoming dt strems re linerly coded into outgoing strems. Given the routing strtegy from the cflow LP, there exist polynomil time lgorithms to perform such code ssignments [21]. Therefore, we hve the following corollry of Theorem 1: Corollry 1. The complete solution tht chieves optiml throughput in undirected dt networks with single multicst session cn e computed in polynomil time, including oth the routing nd coding strtegies. In order to evlute the dvntge of network coding with respect to improving chievle optiml throughput, we hve implemented oth the cflow LP nd rute-force lgorithm to compute the Steiner tree pcking numer. The Steiner tree pcking lgorithm enumertes ll steiner trees in the network, ssigns flow vrile to ech tree, nd then mximizes the summtion of ll tree flows, suject to the constrints tht the totl weight (throughput) of trees using ech link should not exceed its cpcity. We hve evluted oth the cflow LP nd Steiner tree pcking (denoted s π(n)) using our previous exmple in

5 Fig. 1, s well s set of uniform iprtite networks, which re elieved to e good cndidtes to show the power of coding on improving throughput [21], [22]. A uniform iprtite network C(n,k) consists of the dt source nd two lyers: one with n rely nodes nd the other with ( n k) receivers. Ech rely node is connected to the sender, nd ech receiver is connected to different group of k rely nodes, nd ll links hve cpcity of 1. For instnce, the network in Fig. 2 is C(3,2), nd the clssic exmple of network coding in Fig. 1 is isomorphic to C(3,2). Tle II summrizes the results of our empiricl studies, from which we hve derived the following oservtions. First, the cflow LP is much more sclle nd efficient thn Steiner tree pcking, which fils to compute solution for network s smll s C(,3), with only 16 nodes nd 3 links, ut lmost million different Steiner trees. In seprte experiments, the cflow LP is le to compute the optiml throughput for networks hving thousnds of nodes. Second, optiml throughput with coding is lwys lower ounded y tht without coding; however, network coding only introduces slight dvntge, with the χ(n)/π(n) rtio no higher thn 1.1. Third, coded trnsmission my led to more integrl flow rtes nd throughput thn uncoded trnsmission. TABLE II COMPUTING OPTIMAL THROUGHPUT: cflow LP VS. STEINER TREE PACKING χ(n) π(n) Network V M E χ(n) π(n) # of trees Fig C(3, 2) C(4, 3) ,113 C(4, 2) ,128 C(, 4) ,24 C(, 2) ,14 C(, 3) ,96,624 A. The cses of unicst, rodcst nd group communiction sessions Since unicst nd rodcst cn e viewed s specil cses of multicst, where two nodes nd ll nodes re in the multicst group, respectively, our solution in the single multicst cse cn e redily pplied to single unicst or rodcst session without modifictions. In the cse of unicst session, the cflow LP essentilly solves liner progrm for single network flow. In the cse of rodcst session, the cflow LP computes the optiml rodcst throughput, which hs een shown y our previous work to e the sme s oth the spnning tree pcking numer nd the network strength [3]. Trditionlly, these three equl quntities hve een computed from either the perspective of network strength or spnning tree pcking. Cunninghm [19] first gve comintoril lgorithm tht computes the network strength, which ws lter improved y Brhon [24]. Both lgorithms re sed on mtroid theory, nd re highly sophisticted. Though the spnning tree pcking prolem hs n LP formultion, the numer of vriles is exponentil. It is therefore necessry to work on its dul progrm, where the minimum spnning tree lgorithms cn serve s the seprtion orcle. In comprison, the cflow LP provides n efficient lterntive, with polynomil numer of constrints nd vriles, nd with oth generl LP solvers nd custom-tilored distriuted sugrdient solutions [23] ville. f1 S1 S f2 S 2 As finl note, we point out tht eyond pplying generl liner progrmming solutions such s the simplex method it is lso possile to design custom-tilored lgorithms for the cflow LP, to tke dvntge of its underlying network flow structure. In n ccompnying pper [23], we pply Lgrngin relxtion on the dul progrm of the cflow LP, nd design distriuted sugrdient solution. The lgorithm itertively refines n existing orienttion of the originl network, until n optiml one is reched. At this point, M mxflow computtions re invoked to find the optiml multicst throughput. IV. ACHIEVING OPTIMAL THROUGHPUT IN UNDIRECTED DATA NETWORKS: MORE GENERAL CASES Our efficient solution, the cflow LP, cn e extended to solve the optiml throughput prolem in cses eyond single multicst session. We now present its extensions (1) to unicst, rodcst nd group communiction sessions, (2) to the cse of multiple communiction sessions, nd (3) to the model of overly networks. Fig. 3. Trnsforming group communiction into multicst trnsmission. Group communiction refers to mny-to-mny communiction sessions where multiple sources multicst independent dt to the sme group of receivers, the set of senders nd the set of receivers my or my not overlp. Previous work [] hs shown tht mny-to-mny session cn e esily trnsformed into multicst session, y dding super source, which is trditionl technique in network flows. As illustrted in Fig. 3, we cn dd n dditionl source S to the network, nd connect it to ech of the sources in the group communiction session, with links of unounded cpcity. We my then pply the cflow LP to mximize the multicst throughput from S to ll the receivers. Additionl constrints cn e pplied to flow rtes on the newly dded links etween the super source nd the originl sources in the session, governing firness mong the originl sources. The outcome from the cflow LP is the optiml throughput nd its corresponding routing strtegy for the originl group communiction session.

6 B. The cse of multiple sessions In its most generl form, the optiml throughput prolem llows multiple communiction sessions of different types to co-exist in the sme network. Since multicst is representtive in tht unicst, rodcst nd group communiction cn ll e trnsformed into multicst it is sufficient to consider the optiml throughput prolem in the cse of multiple multicst sessions. To chieve optiml throughput with multiple sessions, we need to consider the prolem of inter-session firness. The definition of firness is usully ppliction dependent; however, s long s it cn e expressed using liner constrints, we cn esily include them in the LP formultion. With respect to network coding in multiple sessions, it is theoreticlly possile to pply network coding on multiple incoming strems of different sessions. However, we rgue ginst this possiility, nd use coding y superposition [4], i.e., network coding is pplied only to incoming strems of the sme session. This rgument is minly supported y the computtionl intrctility of the optiml throughput prolem if inter-session coding is llowed 2. In ddition, our empiricl experiences show tht llowing inter-session coding cn hrdly improve optiml throughput, nd it is not prcticl to code dt strems from different pplictions either. The mflow LP given in Tle III is designed to solve the optiml throughput prolem with multiple multicst sessions, where we use weighted proportionl firness s the firness model. It is the result of extending the cflow LP to its multicommodity vrint. We ssume there exist totl of s multicst sessions, numered s 1...s. Ech session i hs source m i, numer of receivers m i1...m iki, set of conceptul flows f i1...f i k i, s well s weight w i indicting the importnce of the session. The sclr χ i is the common rte for conceptul flows within session i, the sclr χ is the common weighted throughput for ll the multicst sessions, nd the trget of the mflow LP is to mximize χ. The mflow LP replces the stndrd network flow constrints in the cflow LP with set of multicommodity cflow constrints. Since flows of different sessions contend for link cpcity, the summtion of the per-session flow rtes should not exceed link cpcities. Since flows within the sme session do not compete for link cpcity, the effective flow rte within session i on link is f i () = mx j [1..ki] f ij (). The mx function is not liner, so this constrint is relxed to f i () f ij (), j [1...k i ]. Theorem 2. In the cse of multiple multicst sessions with coding y superposition, the optiml end-to-end throughput nd its corresponding optiml routing strtegy in undirected dt networks cn e computed in polynomil time, y the mflow LP. Proof: The correctness of the mflow LP uilds upon the correctness of the cflow LP, which is proved in Theorem 1, plus the fct tht for coding y superposition, dt trnsmission from different sessions constitute totlly different commodities 2 It is known tht finding sufficient nd necessry conditions for the fesiility of multiple sessions in this cse is equivlent to finding point in n lgeric vriety, which is NP-hrd []. TABLE III THE mflow LP Mximize: χ Suject to: Orienttion j constrints: C() A C( 1) + C( 2) = C(e) e E Multicommodity 8 cflow constrints: f i j () i [1..s], j [1..k i], A f i j () f i () i [1..s], j [1..k i], >< P A s i=1 fi () C() A f i j in (v) = fi j out(v) i [1..s], j [1..k i] v V {m i, m ij } f >: j in (mi ) = i [1..s], j [1..k i] f i j out(m ij ) = i [1..s], j [1..k i] Equl rte constrints: χ i = f i j in (mi ) j Firness constrints: i [1..s], j [1..ki] χ = χ i /w i i [1..s] when competing for link cpcity. Furthermore, it is esy to check tht oth the numer of vriles nd the numer of constrints in the mflow LP re on the order of O(s M E ), where s is the numer of sessions. C. The cse of overly networks Since neither network coding nor dt repliction (for IP multicst) re widely supported in the current-genertion network elements in the core, we consider the cse of overly networks where only the end hosts hve the full cpilities to forwrd, replicte nd code dt strems, nd the core network elements (henceforth referred to s routers) my only forwrd dt pckets s is. We note tht the cse of overly networks is ctully more generl thn the clssicl model of undirected dt networks we hve used so fr, which hints tht the optiml throughput prolem my ecome hrder to solve. Let N = {G(V,E),C : Q +,M = {m,...,m k },H = M {m k+1,...m h } V } e n overly network with multicst session. The multicst group M is suset of the end hosts H. If M = H, i.e., ll end hosts re in the multicst group, Grg et l. [] hs shown tht the optiml multicst throughput cn e efficiently computed in this cse, y working on the dul progrm of nturl LP formultion. It hs lso een shown in [] tht, in the generl cse the optiml throughput prolem without network coding is the overly Steiner tree pcking prolem, nd is still NP-complete. With the support of network coding, however, we re le to extend the cflow LP to its overly vrint, referred to s the oflow LP, to solve the optiml throughput prolem in the model of overly networks. The oflow LP tkes hierrchicl view of the multicst trnsmission, with n underly nd n overly level. The underly level corresponds to the physicl network topology, nd hs multicommodity flows g ij connecting ech pir of end hosts m i nd m j, vi only routers s intermedite nodes. The overly level is conceptul, nd

7 contins end hosts fully connected s complete grph. The link ij from m i to m j hs cpcity equl to the underly flow rte g ij. We then pply the cflow LP in the overly level to mximize the end-to-end throughput, where ech node is cple of repliction nd coding. In the oflow LP shown in Tle IV, we include three groups of constrints. First, the orienttion constrints re identicl to those included in the cflow LP. Second, the stndrd multicommodity flow constrints re specified for the underly flows etween end hosts nd vi routers only. Third, we introduce the mpping constrints tht mp the underly g ij flow rte to the overly link cpcity (referred to s C ( ij )), nd then pply the originl constrints in the cflow LP t the overly level. The trget of the oflow LP is to mximize throughput in the overly level. TABLE IV THE oflow LP Mximize: χ Suject to: Orienttion j constrints: C() A C( 1) + C( 2) = C(e) e E Underly 8 multicommodity flow constrints: P g ij () i, j [1..h], A >< g ij () C() i, j [1..h], A g ij in (v) = gij out(v) i, j [1..h], v V H g >: in (v) = i, j [1..h], v H {mj} gout(v) ij = i, j [1..h], v H {m i} Overly 8 cflow constrints: C ( ij) = gout(m ij i) i, j [1..h] f i ( ) i [1..k], >< A = { ij 1 i, j h} f i ( ) C ( ) A, i [1..k] fin(v) i = fout(v) i i [1..k], v H M fin(m i ) = i [1..k] f >: out(m i i) = i [1..k] χ = fin(m i i) i [1..k] Theorem 3. In the cse of single multicst session in the model of overly networks, the optiml end-to-end throughput nd its corresponding optiml routing strtegy cn e computed in polynomil time, using the oflow LP. Proof: Since rely nodes in the overly network cn not replicte or encode dt, dt strem tht is trnsmitted etween two end hosts without pssing third end host remins unchnged throughout the trnsmission nd upon rrivl. Therefore, it is vlid to model these direct trnsmissions etween end hosts s multicommodity flows. The vlidity of the cflow constrints in the overly lyer my e derived from the correctness of the cflow LP, which we hve proved in Theorem 1. Furthermore, inspection on the vriles nd constrints in the oflow LP revels tht, the numer of oth re on the order of O( H 2 E ). Similr to the extension from cflow to mflow, one my extend the oflow LP into its multicommodity vrint to ccommodte multiple sessions in overly networks. More specificlly, one needs to replce the overly cflow constrints with the overly mflow constrints in the third group of constrints of the oflow LP. The resulting liner progrm hs oth its numer of vriles nd numer of constrints ounded y O(( H 2 + s M ) E ). This is usully not worse thn those of the single-session oflow LP, since H 2 domintes s M in most cses. V. EMPIRICAL STUDIES Due to the lck of efficient lgorithms, previous studies on the prolem of improving session throughput re lrgely sed on experimentl or intuitive insights. We rgue tht the vilility of the cflow, mflow nd oflow LPs hs significntly chnged the lndscpe, nd hs mde it computtionlly fesile to study the exct enefits of vrious proposls to chieve higher throughput, including single multicst tree with dt repliction, multiple multicst trees, nd network coding. Our empiricl studies re sed on the implementtion of ll three LPs tht we hve proposed. In comprison studies, we hve lso implemented lgorithms to compute the optiml throughput with multiple multicst trees ut without coding, the optiml throughput with widest multicst tree, s well s the optiml throughput with ll unicst from the source to ll receivers. Topologies used in our simultions re generted y the BRITE topology genertor [26], with sizes rnging from 1 to nodes, oth with nd without power-lw properties, with hevy-tiled or constnt link cpcities. How dvntgeous is network coding with respect to improving optiml throughput? The rtio of chievle optiml throughput with coding over tht without coding is referred to s the coding dvntge. Recll tht we hve investigted the coding dvntge in Tle I, nd re unle to experimentlly find cses where network coding my improve optiml throughput y fctor higher thn 1.1. We re nturlly led to the question: Wht is the upper ound of the coding dvntge? Previous work [21] shows tht in directed cyclic networks with integrl routing requirement, there exist multicst networks where the coding dvntge grows proportionlly s log( V ), nd is thus not finitely ounded. However, we found the sitution is drsticlly different in undirected networks. In [3], we use undirected splitting nd grph orienttion to prove tht, for multicst trnsmissions in undirected networks, the coding dvntge is ounded y constnt fctor of 2. Given the ound 1.1 otined for contrived networks, nd the ound 2 proven in theory, we further studied the coding dvntge in over one thousnd rndomly generted topologies. Our oservtion is tht, for ll the rndom topologies we tested, the coding dvntge lwys remins 1., i.e., network coding does not introduce ny improvement in chievle throughput. This implies tht the fundmentl enefit of network coding is not higher optiml throughput, ut to fcilitte significntly more efficient computtion nd implementtion of strtegies to chieve such optiml throughput. How dvntgeous is stndrd multicst compred to unicst nd overly multicst?

8 The cflow LP is instrumentl to precisely compute the chievle optiml throughput with one multicst communiction session, either with network coding or with multiple multicst trees, since the outcomes from the two re hrdly different. In either cse, dt repliction need to e supported on ll network nodes, including core network elements. It hs een common knowledge tht, when compred to unicst from the source to ll receivers, stndrd multicst rings etter ndwidth efficiency nd higher end-to-end session throughput. However, even in the cse of unicst, pth diversity needs to e exploited to chieve optiml throughput, equivlent to the mximum unicommodity flow prolem. It is not immeditely cler how dvntgeous stndrd multicst is. Overly multicst lnces the trdeoff etween the prcticlity of stndrd multicst nd unicst. It refers to the cse where only the memers of the multicst group my replicte or code dt, wheres ll other nodes my only forwrd dt. The optiml throughput chieved y overly multicst is efficiently computed y the oflow LP. We perform quntittive study tht compres the optiml throughput chieved with stndrd multicst, overly multicst nd unicst. The study is performed in rndom networks with up to nodes nd over 1 links. There re 3 nd 1 memers in the multicst group respectively, in two different sets of tests. Multicst nodes re rndomly selected, with different multicst groups eing s disjoint s possile. For ech network size, multiple tests re performed with different network topologies nd different choices of the multicst group, the results re then verged. Optiml throughput (Kps) Optiml throughput (Kps) () Size of multicst group = Numer of nodes in the network () Size of multicst group = 1 Stndrd multicst Overly multicst All unicst Numer of nodes in the network Fig. 4. Achievle optiml throughput using stndrd multicst, overly multicst, nd ll unicst from the sender to ll receivers. As we my oserve from Fig. 4, there exists ovious differences etween stndrd multicst throughput nd ll unicst throughput, nd the differences re more significnt in Fig. 4(), where the scle of the multicst trnsmission is lrger. This is due to the fct tht with lrge numer of receivers, the numer of unicst flows increses in the ll unicst pproch, nd links incident to the sender ecome ottlenecks for the trnsmission. Surprisingly, the figure lso suggests tht, the optiml throughput chieved y overly multicst is lmost identicl to tht chieved y stndrd multicst, where ll network nodes re le to replicte or code dt. On verge, the optiml throughput of overly multicst is over 9% of stndrd multicst. This oservtion shows tht, from the perspective of mximum chievle throughput, while there my exist contrived network topologies tht show more significnt dvntges of stndrd multicst over overly multicst, little difference remins once lrge scle prcticl network topologies re considered. In summry, the ll unicst pproch does not scle, while overly multicst my closely pproch optiml throughput without requiring core routers to e modified. How sensitive is optiml throughput to node joins? When new nodes join the multicst session, how my chievle optiml throughput e ffected? Intuitively, if rely node joins the multicst group nd ecomes new receiver, the chievle session throughput should decrese, due to the following two cuses: (1) lrger numer of receivers my led to more intense competition for ndwidth; nd (2) new node with low cpcity my ecome ottleneck nd limit the throughput for the entire session. Our simultion results show tht, the second cuse hs much more significnt impct thn the first one. Fig. () shows vritions of optiml throughput s the numer of nodes in the multicst group increses from three to V /2, nd then to V (effectively rodcst session), for vrious network sizes V. In this experiment, network topologies re generted with two edges per node without power-lw reltionships, with hevy-tiled ndwidth distriution etween 1 nd Kps on the links. As we cn oserve, when the size of the multicst group increses from three to V /2, the effects on chievle throughput is rther significnt. However, further expnding the multicst group to the entire network leds to much smller decrese. Both cuses tht we hve discussed contriute to the initil decrese of throughput, while the second cuse (i.e., the effects of ottleneck node) plys less importnt role in the susequent decrese when the multicst group contins hlf of the nodes in the network, it is very likely for the group to hve lredy contined node with low cpcity. We further performed the sme tests on power-lw network topologies with 1 Kps constnt link ndwidth, nd the results re shown in Fig. (). In the power-lw topologies, most nodes hve smll degrees of two or three, while smll numer of nodes hve high degrees. Therefore, the initil multicst group usully contins node with smll degree lredy, which lso hs low cpcity, since the link ndwidth is constnt. In this cse, only inter-receiver ndwidth competition remins s mjor concern. However, s we cn oserve in the figure, in most cses the optiml multicst throughput remins roughly constnt, even fter ll the nodes hve joined the multicst session. This counterintuitive oservtion shows tht, new receivers my shre ndwidth with existing receivers well, nd do not significntly

9 Optiml throughput (Kps) Optiml throughput (Kps) () Hevy tiled link cpcity Numer of nodes in the network () Constnt link cpcity 3 M =3 M = V /2 M = V Numer of nodes in the network Fig.. Vritions of optiml throughput due to new nodes joining the multicst session. Optiml throughput (Kps) Fig Numer of sessions = Numer of sessions = Optiml throughput (Kps) Numer of sessions = Numer of sessions = Numer of nodes in the network prev optiml incrementl re optimized Throughput vritions s new session is creted ffect the chievle throughput, s long s their cpcities re not too low. Spikes in Fig. () correspond to the occsionl cses where nodes in the initil multicst group ll hve reltively high cpcities. Both results in Fig. () nd () hve led to the sme oservtion tht, when new nodes join multicst session, the decresed optiml throughput is minly due to ottleneck receivers with lower cpcities. How sensitive is optiml throughput to the ddition of new sessions? When new sessions re dded to the network, how do they ffect chievle optiml throughput? The mflow LP, presented in Sec. IV, mkes it fesile to crry out our empiricl studies. Fig. 6 shows the vrition of optiml throughput s new communiction sessions re creted. Three types of throughput re shown: (1) previous optiml, which represents the optiml weighted session throughput efore the new session is dded; (2) incrementl, which is the weighted throughput for the new session using residul link cpcities only, or just the previous optiml throughput if the chievle throughput of the new session is higher; nd (3) re-optimized, which is the re-computed optiml session throughput fter the new session is dded. Four groups of simultions re performed, with two, three, four, nd five existing sessions, respectively, efore the new session is estlished. Ech multicst group hs size five, nd nodes in different multicst groups re chosen to e s disjoint s possile. Ech session is ssigned n equl weight. Results in Fig. 6 show tht, the ddition of n extr session does not drmticlly ffect the chievle optiml throughput, especilly when the network size is lrge in comprison to the numer of nodes involved in the trnsmissions. However, if the existing sessions remin trnsmitting ccording to the optiml trnsmission strtegy computed efore the new session joins, nd only residul cpcities cn e utilized to serve the new session (the incrementl throughput cse), then the resulting throughput is not stisfctory unless the numer of sessions is very smll (s = 2). In generl, this my led to very low, even zero, throughput for the new session. Therefore it is necessry to perform re-optimiztion efore new session strts to trnsmit. How sensitive is optiml throughput to firness constrints? In order to investigte how inter-session firness requirements ffect the optiml throughput, we estlish three oneto-two multicst sessions in networks of vrious sizes etween 1 nd 3, nd computed their totl optiml throughput with the following firness constrints, respectively: () no firness requirement, which leds to the mximum vlue possile for the totl throughput; () solute firness, in which ech session is required to hve exctly the sme throughput; (c) weighted proportionl firness, where the throughput of ech session is proportionl to the ssocited weight of tht session; nd (d) mx-min firness, in which no session throughput cn e incresed without decresing nother lredy smller session throughput. As first smll-scle experiment to gin some insights, Fig. 7 shows the totl throughput of three sessions in network with twenty nodes, using the mflow LP. Multicst groups re chosen to e s disjoint s possile. The totl weight of three sessions w 1 + w 2 + w 3 = 1. As we cn see, the weight distriution hs significnt impct on the chievle totl throughput. When the three weights re hevily unlnced, the session with the smllest weight cn not relize its throughput potentil, nd consequently leds to smll vlue of totl throughput. The chievle throughput with solute firness t w 1 = w 2 = w 3 =.333 is 91.8 Kps. The glol optiml throughput 17. Kps is chieved t (w 1,w 2,w 3 ) = (.287,.47,.36), which turns out to e identicl to the throughput with mx-min firness in this cse. Further results in Tle V show tht the excellent performnce of mx-min firness in the ove exmple is not

10 4 Hevy tiled link cpcity 8 Hevy tiled link cpcity Totl throughput of 3 sessions (Kps) W W1 Fig. 7. Totl throughput of three multicst sessions, s inter-session firness requirements chnge..2 Optiml throughput (Kps) Constnt link cpcity Bndwidth efficiency (%) Constnt link cpcity cflow Widest tree coincidence. As we my oserve, when the network size is reltively lrge ( nd ove in the tle), mx-min firness lwys leds to optiml throughput. When the network size is smll (1 nd in the tle), the inter-session competition for ndwidth ecomes more intense. The throughput with mxmin firness my e inferior to the optiml throughput in this cse, ut the difference is usully smll. TABLE V TOTAL ACHIEVABLE THROUGHPUT WITH MAX-MIN FAIRNESS VS. GLOBAL OPTIMAL THROUGHPUT network size mx-min (Kps) optiml (Kps) Does optiml throughput led to low ndwidth efficiency? In order to find out whether chieving optiml throughput scrifices ndwidth efficiency, we hve conducted performnce comprisons etween optiml throughput multicst nd single tree multicst. In the ltter cse, we compute the widest Steiner tree, which hs the highest throughput from ll possile multicst trees. The throughput of tree is the lowest cpcity of its links. We choose the tree with the highest throughput rther thn the one tht is most ndwidth efficient, since the ltter is equivlent to the minimum Steiner tree prolem, which is hrd to compute or to pproximte. Even when we cn find such ndwidth efficient tree, it my hve n exceedingly low throughput, which is not prcticl for dt trnsmissions. In Fig. 8, we compre oth chievle throughput nd ndwidth efficiency etween the two pproches. Bndwidth efficiency is computed s the totl receiving rte t ll receivers divided y the totl ndwidth consumption. We tested two groups of networks, one with vrile link cpcity conforming to the hevy-tiled distriution, the other with constnt link cpcity. For the vrile link cpcity cse, optiml throughput is higher thn the widest Steiner tree throughput y fctor of over 2 on verge, showing the dvntge of using the optiml trnsmission strtegy computed with the cflow LP, eyond single multicst tree. Interestingly, the ndwidth efficiency of optiml throughput multicst lso outperforms tht of the widest Steiner tree multicst. The widest Steiner tree insists to use links with the highest ndwidth possile, nd therefore my result in rther long tree rnches, especilly Numer of nodes in the network Fig. 8. Achievle throughput nd ndwidth efficiency: comprison etween the optiml throughput multicst (cflow LP) nd the widest Steiner tree. when the network size is lrge. For the constnt link cpcity cse, the difference etween the optiml nd widest Steiner tree throughput ecomes even lrger. Every tree in this cse hs the sme throughput, therefore the widest selection criterion ecomes irrelevnt. However, the difference in ndwidth efficiency decreses, since it is no longer necessry to include long tree rnches to chieve the mximum tree throughput. VI. CONCLUDING REMARKS The min prolem we hve studied in this pper is to compute nd chieve optiml throughput in dt networks, in the generl cse of undirected communiction links. We hve een plesntly surprised t how results from network coding re le to fcilitte the design of efficient solutions to this fundmentl prolem tht ws previously viewed s very hrd. We lso show the counter-intuitive conclusion tht, the most significnt enefit of network coding is not to chieve higher optiml throughput, ut to mke it fesile to chieve such optimlity in polynomil time. We show tht such efficient lgorithms my e designed for multiple communiction sessions of vriety of types, nd for the more relistic model of overly networks. Simultion studies lso suggest tht, overly multicst techniques my pproch optiml multicst throughput quite well. REFERENCES [1] L. Qiu, Y. R. Yng, Y. Zhng, nd S. Shenker, On Selfish Routing in Internet-Like Environments, in Proc. of ACM SIGCOMM, 3. [2] R. K. Ahuj, T. L. Mgnnti, nd J. B. Orlin, Network Flows: Theory, Algorithms, nd Applictions, Prentice Hll, Upper Sddle River, New Jersey, [3] Z. Li nd B. Li, Network Coding in Undirected Networks, in Proc. of the 38th Annul Conference on Informtion Sciences nd Systems (CISS), 4. [4] R. Ahlswede, N. Ci, S. R. Li, nd R. W. Yeung, Network Informtion Flow, IEEE Trnsctions on Informtion Theory, vol. 46, no. 4, pp , July.

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

THE throughput of information transmission within a data

THE throughput of information transmission within a data IEEE TRANACTION ON INFORMATION THEORY A Constnt Bound on Throughput Improvement of Multicst Network Coding in Undirected Networks Zongpeng Li, Memer, IEEE Bochun Li, enior Memer, IEEE Lp Chi Lu Deprtment

More information

2 Computing all Intersections of a Set of Segments Line Segment Intersection

2 Computing all Intersections of a Set of Segments Line Segment Intersection 15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design

More information

A dual of the rectangle-segmentation problem for binary matrices

A dual of the rectangle-segmentation problem for binary matrices A dul of the rectngle-segmenttion prolem for inry mtrices Thoms Klinowski Astrct We consider the prolem to decompose inry mtrix into smll numer of inry mtrices whose -entries form rectngle. We show tht

More information

The Greedy Method. The Greedy Method

The Greedy Method. The Greedy Method Lists nd Itertors /8/26 Presenttion for use with the textook, Algorithm Design nd Applictions, y M. T. Goodrich nd R. Tmssi, Wiley, 25 The Greedy Method The Greedy Method The greedy method is generl lgorithm

More information

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1): Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters

More information

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin

More information

What are suffix trees?

What are suffix trees? Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl

More information

Network Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved

Network Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved Network Interconnection: Bridging CS 57 Fll 6 6 Kenneth L. Clvert All rights reserved The Prolem We know how to uild (rodcst) LANs Wnt to connect severl LANs together to overcome scling limits Recll: speed

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully

More information

Efficient Rerouting Algorithms for Congestion Mitigation

Efficient Rerouting Algorithms for Congestion Mitigation 2009 IEEE Computer Society Annul Symposium on VLSI Efficient Rerouting Algorithms for Congestion Mitigtion M. A. R. Chudhry*, Z. Asd, A. Sprintson, nd J. Hu Deprtment of Electricl nd Computer Engineering

More information

Efficient Algorithms For Optimizing Policy-Constrained Routing

Efficient Algorithms For Optimizing Policy-Constrained Routing Efficient Algorithms For Optimizing Policy-Constrined Routing Andrew R. Curtis curtis@cs.colostte.edu Ross M. McConnell rmm@cs.colostte.edu Dn Mssey mssey@cs.colostte.edu Astrct Routing policies ply n

More information

Approximation of Two-Dimensional Rectangle Packing

Approximation of Two-Dimensional Rectangle Packing pproximtion of Two-imensionl Rectngle Pcking Pinhong hen, Yn hen, Mudit Goel, Freddy Mng S70 Project Report, Spring 1999. My 18, 1999 1 Introduction 1-d in pcking nd -d in pcking re clssic NP-complete

More information

Evolutionary Approaches To Minimizing Network Coding Resources

Evolutionary Approaches To Minimizing Network Coding Resources This full text pper ws peer reviewed t the direction of IEEE Communictions Society suject mtter experts for puliction in the IEEE INFOCOM 2007 proceedings. Evolutionry Approches To Minimizing Network Coding

More information

CS 268: IP Multicast Routing

CS 268: IP Multicast Routing Motivtion CS 268: IP Multicst Routing Ion Stoic April 5, 2004 Mny pplictions requires one-to-mny communiction - E.g., video/udio conferencing, news dissemintion, file updtes, etc. Using unicst to replicte

More information

Graphs with at most two trees in a forest building process

Graphs with at most two trees in a forest building process Grphs with t most two trees in forest uilding process rxiv:802.0533v [mth.co] 4 Fe 208 Steve Butler Mis Hmnk Mrie Hrdt Astrct Given grph, we cn form spnning forest y first sorting the edges in some order,

More information

Algorithm Design (5) Text Search

Algorithm Design (5) Text Search Algorithm Design (5) Text Serch Tkshi Chikym School of Engineering The University of Tokyo Text Serch Find sustring tht mtches the given key string in text dt of lrge mount Key string: chr x[m] Text Dt:

More information

COMP 423 lecture 11 Jan. 28, 2008

COMP 423 lecture 11 Jan. 28, 2008 COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring

More information

EECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining

EECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining EECS150 - Digitl Design Lecture 23 - High-level Design nd Optimiztion 3, Prllelism nd Pipelining Nov 12, 2002 John Wwrzynek Fll 2002 EECS150 - Lec23-HL3 Pge 1 Prllelism Prllelism is the ct of doing more

More information

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li 2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min

More information

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs. Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online

More information

From Dependencies to Evaluation Strategies

From Dependencies to Evaluation Strategies From Dependencies to Evlution Strtegies Possile strtegies: 1 let the user define the evlution order 2 utomtic strtegy sed on the dependencies: use locl dependencies to determine which ttriutes to compute

More information

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using

More information

An evolutionary approach to inter-session network coding

An evolutionary approach to inter-session network coding An evolutionry pproch to inter-session network coding The MIT Fculty hs mde this rticle openly ville. Plese shre how this ccess enefits you. Your story mtters. Cittion As Pulished Pulisher Kim, M. et l.

More information

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search.

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search. CS 88: Artificil Intelligence Fll 00 Lecture : A* Serch 9//00 A* Serch rph Serch Tody Heuristic Design Dn Klein UC Berkeley Multiple slides from Sturt Russell or Andrew Moore Recp: Serch Exmple: Pncke

More information

Presentation Martin Randers

Presentation Martin Randers Presenttion Mrtin Rnders Outline Introduction Algorithms Implementtion nd experiments Memory consumption Summry Introduction Introduction Evolution of species cn e modelled in trees Trees consist of nodes

More information

Mobile IP route optimization method for a carrier-scale IP network

Mobile IP route optimization method for a carrier-scale IP network Moile IP route optimiztion method for crrier-scle IP network Tkeshi Ihr, Hiroyuki Ohnishi, nd Ysushi Tkgi NTT Network Service Systems Lortories 3-9-11 Midori-cho, Musshino-shi, Tokyo 180-8585, Jpn Phone:

More information

Rethinking Virtual Network Embedding: Substrate Support for Path Splitting and Migration

Rethinking Virtual Network Embedding: Substrate Support for Path Splitting and Migration Rethinking Virtul Network Emedding: Sustrte Support for Pth Splitting nd Migrtion Minln Yu, Yung Yi, Jennifer Rexford, Mung Ching Computer Science, Princeton University, Emil: {minlnyu,jrex}@cs.princeton.edu

More information

Qubit allocation for quantum circuit compilers

Qubit allocation for quantum circuit compilers Quit lloction for quntum circuit compilers Nov. 10, 2017 JIQ 2017 Mrcos Yukio Sirichi Sylvin Collnge Vinícius Fernndes dos Sntos Fernndo Mgno Quintão Pereir Compilers for quntum computing The first genertion

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distriuted Systems Principles nd Prdigms Chpter 11 (version April 7, 2008) Mrten vn Steen Vrije Universiteit Amsterdm, Fculty of Science Dept. Mthemtics nd Computer Science Room R4.20. Tel: (020) 598 7784

More information

On network coding and routing in dynamic wireless multicast networks

On network coding and routing in dynamic wireless multicast networks On network coding nd routing in dynmic wireless multicst networks Trcey Ho, Ji-Qi Jin Cliforni Institute of Technology Psden, CA Emil: {tho, jin}@cltechedu Hrish Viswnthn Lucent Technologies, Bell Ls Murry

More information

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

10.5 Graphing Quadratic Functions

10.5 Graphing Quadratic Functions 0.5 Grphing Qudrtic Functions Now tht we cn solve qudrtic equtions, we wnt to lern how to grph the function ssocited with the qudrtic eqution. We cll this the qudrtic function. Grphs of Qudrtic Functions

More information

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. General Tree Search. Uniform Cost. Lecture 3: A* Search 9/4/2007

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. General Tree Search. Uniform Cost. Lecture 3: A* Search 9/4/2007 CS 88: Artificil Intelligence Fll 2007 Lecture : A* Serch 9/4/2007 Dn Klein UC Berkeley Mny slides over the course dpted from either Sturt Russell or Andrew Moore Announcements Sections: New section 06:

More information

UT1553B BCRT True Dual-port Memory Interface

UT1553B BCRT True Dual-port Memory Interface UTMC APPICATION NOTE UT553B BCRT True Dul-port Memory Interfce INTRODUCTION The UTMC UT553B BCRT is monolithic CMOS integrted circuit tht provides comprehensive MI-STD- 553B Bus Controller nd Remote Terminl

More information

Ma/CS 6b Class 1: Graph Recap

Ma/CS 6b Class 1: Graph Recap M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Adm Sheffer. Office hour: Tuesdys 4pm. dmsh@cltech.edu TA: Victor Kstkin. Office hour: Tuesdys 7pm. 1:00 Mondy, Wednesdy, nd Fridy. http://www.mth.cltech.edu/~2014-15/2term/m006/

More information

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,

More information

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016 Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence Winter 2016 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl

More information

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases Overview Mobile computing nd dtbses Generl issues in mobile dt mngement Dt dissemintion Dt consistency Loction dependent queries Interfces Detils of brodcst disks thlis klfigopoulos Network rchitecture

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

On Computation and Resource Management in Networked Embedded Systems

On Computation and Resource Management in Networked Embedded Systems On Computtion nd Resource Mngement in Networed Embedded Systems Soheil Ghisi Krlene Nguyen Elheh Bozorgzdeh Mjid Srrfzdeh Computer Science Deprtment University of Cliforni, Los Angeles, CA 90095 soheil,

More information

OUTPUT DELIVERY SYSTEM

OUTPUT DELIVERY SYSTEM Differences in ODS formtting for HTML with Proc Print nd Proc Report Lur L. M. Thornton, USDA-ARS, Animl Improvement Progrms Lortory, Beltsville, MD ABSTRACT While Proc Print is terrific tool for dt checking

More information

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis CS143 Hndout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexicl Anlysis In this first written ssignment, you'll get the chnce to ply round with the vrious constructions tht come up when doing lexicl

More information

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. Example: Pancake Problem. Example: Pancake Problem

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. Example: Pancake Problem. Example: Pancake Problem Announcements Project : erch It s live! Due 9/. trt erly nd sk questions. It s longer thn most! Need prtner? Come up fter clss or try Pizz ections: cn go to ny, ut hve priority in your own C 88: Artificil

More information

AI Adjacent Fields. This slide deck courtesy of Dan Klein at UC Berkeley

AI Adjacent Fields. This slide deck courtesy of Dan Klein at UC Berkeley AI Adjcent Fields Philosophy: Logic, methods of resoning Mind s physicl system Foundtions of lerning, lnguge, rtionlity Mthemtics Forml representtion nd proof Algorithms, computtion, (un)decidility, (in)trctility

More information

Performance analysis of QoS mechanisms in IP networks

Performance analysis of QoS mechanisms in IP networks University of Wollongong Reserch Online Fculty of Informtics - Ppers (Archive) Fculty of Engineering nd Informtion Sciences 2000 Performnce nlysis of QoS mechnisms in IP networks D. Ji University of Wollongong

More information

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES GENEATING OTHOIMAGES FO CLOSE-ANGE OBJECTS BY AUTOMATICALLY DETECTING BEAKLINES Efstrtios Stylinidis 1, Lzros Sechidis 1, Petros Ptis 1, Spiros Sptls 2 Aristotle University of Thessloniki 1 Deprtment of

More information

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5 CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,

More information

PARALLEL AND DISTRIBUTED COMPUTING

PARALLEL AND DISTRIBUTED COMPUTING PARALLEL AND DISTRIBUTED COMPUTING 2009/2010 1 st Semester Teste Jnury 9, 2010 Durtion: 2h00 - No extr mteril llowed. This includes notes, scrtch pper, clcultor, etc. - Give your nswers in the ville spce

More information

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric

More information

LR Parsing, Part 2. Constructing Parse Tables. Need to Automatically Construct LR Parse Tables: Action and GOTO Table

LR Parsing, Part 2. Constructing Parse Tables. Need to Automatically Construct LR Parse Tables: Action and GOTO Table TDDD55 Compilers nd Interpreters TDDB44 Compiler Construction LR Prsing, Prt 2 Constructing Prse Tles Prse tle construction Grmmr conflict hndling Ctegories of LR Grmmrs nd Prsers Peter Fritzson, Christoph

More information

Compression Outline :Algorithms in the Real World. Lempel-Ziv Algorithms. LZ77: Sliding Window Lempel-Ziv

Compression Outline :Algorithms in the Real World. Lempel-Ziv Algorithms. LZ77: Sliding Window Lempel-Ziv Compression Outline 15-853:Algorithms in the Rel World Dt Compression III Introduction: Lossy vs. Lossless, Benchmrks, Informtion Theory: Entropy, etc. Proility Coding: Huffmn + Arithmetic Coding Applictions

More information

LECT-10, S-1 FP2P08, Javed I.

LECT-10, S-1 FP2P08, Javed I. A Course on Foundtions of Peer-to-Peer Systems & Applictions LECT-10, S-1 CS /799 Foundtion of Peer-to-Peer Applictions & Systems Kent Stte University Dept. of Computer Science www.cs.kent.edu/~jved/clss-p2p08

More information

CSCI 446: Artificial Intelligence

CSCI 446: Artificial Intelligence CSCI 446: Artificil Intelligence Serch Instructor: Michele Vn Dyne [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.]

More information

Categorical Skylines for Streaming Data

Categorical Skylines for Streaming Data Ctegoricl Skylines for Streming Dt ABSTRACT Nikos Srks University of Toronto nsrks@cs.toronto.edu Nick Kouds University of Toronto kouds@cs.toronto.edu The prolem of skyline computtion hs ttrcted considerle

More information

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search Uninformed Serch [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.] Tody Serch Problems Uninformed Serch Methods

More information

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants A Heuristic Approch for Discovering Reference Models by Mining Process Model Vrints Chen Li 1, Mnfred Reichert 2, nd Andres Wombcher 3 1 Informtion System Group, University of Twente, The Netherlnds lic@cs.utwente.nl

More information

12-B FRACTIONS AND DECIMALS

12-B FRACTIONS AND DECIMALS -B Frctions nd Decimls. () If ll four integers were negtive, their product would be positive, nd so could not equl one of them. If ll four integers were positive, their product would be much greter thn

More information

Digital Signal Processing: A Hardware-Based Approach

Digital Signal Processing: A Hardware-Based Approach Digitl Signl Processing: A Hrdwre-Bsed Approch Roert Esposito Electricl nd Computer Engineering Temple University troduction Teching Digitl Signl Processing (DSP) hs included the utilition of simultion

More information

Efficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc

Efficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc 4th Ntionl Conference on Electricl, Electronics nd Computer Engineering (NCEECE 2015) Efficient Regulr Expression Grouping Algorithm Bsed on Lbel Propgtion Xi Chen, Shuqio Chenb nd Ming Moc Ntionl Digitl

More information

Position Heaps: A Simple and Dynamic Text Indexing Data Structure

Position Heaps: A Simple and Dynamic Text Indexing Data Structure Position Heps: A Simple nd Dynmic Text Indexing Dt Structure Andrzej Ehrenfeucht, Ross M. McConnell, Niss Osheim, Sung-Whn Woo Dept. of Computer Science, 40 UCB, University of Colordo t Boulder, Boulder,

More information

Computer Networks 53 (2009) Contents lists available at ScienceDirect. Computer Networks. journal homepage:

Computer Networks 53 (2009) Contents lists available at ScienceDirect. Computer Networks. journal homepage: Computer Networks 53 (29) 252 2516 Contents lists ville t ScienceDirect Computer Networks journl homepge: www.elsevier.com/locte/comnet Congestion-wre chnnel ssignment for multi-chnnel wireless mesh networks

More information

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl component

More information

F. R. K. Chung y. University ofpennsylvania. Philadelphia, Pennsylvania R. L. Graham. AT&T Labs - Research. March 2,1997.

F. R. K. Chung y. University ofpennsylvania. Philadelphia, Pennsylvania R. L. Graham. AT&T Labs - Research. March 2,1997. Forced convex n-gons in the plne F. R. K. Chung y University ofpennsylvni Phildelphi, Pennsylvni 19104 R. L. Grhm AT&T Ls - Reserch Murry Hill, New Jersey 07974 Mrch 2,1997 Astrct In seminl pper from 1935,

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

1 Quad-Edge Construction Operators

1 Quad-Edge Construction Operators CS48: Computer Grphics Hndout # Geometric Modeling Originl Hndout #5 Stnford University Tuesdy, 8 December 99 Originl Lecture #5: 9 November 99 Topics: Mnipultions with Qud-Edge Dt Structures Scribe: Mike

More information

Approximation by NURBS with free knots

Approximation by NURBS with free knots pproximtion by NURBS with free knots M Rndrinrivony G Brunnett echnicl University of Chemnitz Fculty of Computer Science Computer Grphics nd Visuliztion Strße der Ntionen 6 97 Chemnitz Germny Emil: mhrvo@informtiktu-chemnitzde

More information

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization An Efficient Divide nd Conquer Algorithm for Exct Hzrd Free Logic Minimiztion J.W.J.M. Rutten, M.R.C.M. Berkelr, C.A.J. vn Eijk, M.A.J. Kolsteren Eindhoven University of Technology Informtion nd Communiction

More information

Ma/CS 6b Class 1: Graph Recap

Ma/CS 6b Class 1: Graph Recap M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Instructor: Adm Sheffer. TA: Cosmin Pohot. 1pm Mondys, Wednesdys, nd Fridys. http://mth.cltech.edu/~2015-16/2term/m006/ Min ook: Introduction to Grph

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-186 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

1.5 Extrema and the Mean Value Theorem

1.5 Extrema and the Mean Value Theorem .5 Extrem nd the Men Vlue Theorem.5. Mximum nd Minimum Vlues Definition.5. (Glol Mximum). Let f : D! R e function with domin D. Then f hs n glol mximum vlue t point c, iff(c) f(x) for ll x D. The vlue

More information

A Sparse Grid Representation for Dynamic Three-Dimensional Worlds

A Sparse Grid Representation for Dynamic Three-Dimensional Worlds A Sprse Grid Representtion for Dynmic Three-Dimensionl Worlds Nthn R. Sturtevnt Deprtment of Computer Science University of Denver Denver, CO, 80208 sturtevnt@cs.du.edu Astrct Grid representtions offer

More information

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork MA1008 Clculus nd Liner Algebr for Engineers Course Notes for Section B Stephen Wills Deprtment of Mthemtics University College Cork s.wills@ucc.ie http://euclid.ucc.ie/pges/stff/wills/teching/m1008/ma1008.html

More information

Virtual Network Embedding For Evolving Networks

Virtual Network Embedding For Evolving Networks This full text pper ws peer reviewed t the direction of IEEE Communictions Society subject mtter experts for publiction in the IEEE Globecom proceedings. Virtul Network Embedding For Evolving Networks

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Stack Manipulation. Other Issues. How about larger constants? Frame Pointer. PowerPC. Alternative Architectures

Stack Manipulation. Other Issues. How about larger constants? Frame Pointer. PowerPC. Alternative Architectures Other Issues Stck Mnipultion support for procedures (Refer to section 3.6), stcks, frmes, recursion mnipulting strings nd pointers linkers, loders, memory lyout Interrupts, exceptions, system clls nd conventions

More information

CS 241. Fall 2017 Midterm Review Solutions. October 24, Bits and Bytes 1. 3 MIPS Assembler 6. 4 Regular Languages 7.

CS 241. Fall 2017 Midterm Review Solutions. October 24, Bits and Bytes 1. 3 MIPS Assembler 6. 4 Regular Languages 7. CS 241 Fll 2017 Midterm Review Solutions Octoer 24, 2017 Contents 1 Bits nd Bytes 1 2 MIPS Assemly Lnguge Progrmming 2 3 MIPS Assemler 6 4 Regulr Lnguges 7 5 Scnning 9 1 Bits nd Bytes 1. Give two s complement

More information

Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network

Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 Revisiting the notion of Origin-Destintion Trffic Mtrix of the Hosts tht re ttched to Switched Locl Are Network Mondy

More information

A Progressive Register Allocator for Irregular Architectures

A Progressive Register Allocator for Irregular Architectures A Progressive Register Alloctor for Irulr Architectures Dvid Koes nd Seth Copen Goldstein Computer Science Deprtment Crnegie Mellon University {dkoes,seth}@cs.cmu.edu Abstrct Register lloction is one of

More information

Parallel Square and Cube Computations

Parallel Square and Cube Computations Prllel Squre nd Cube Computtions Albert A. Liddicot nd Michel J. Flynn Computer Systems Lbortory, Deprtment of Electricl Engineering Stnford University Gtes Building 5 Serr Mll, Stnford, CA 945, USA liddicot@stnford.edu

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Transparent neutral-element elimination in MPI reduction operations

Transparent neutral-element elimination in MPI reduction operations Trnsprent neutrl-element elimintion in MPI reduction opertions Jesper Lrsson Träff Deprtment of Scientific Computing University of Vienn Disclimer Exploiting repetition nd sprsity in input for reducing

More information

Vulnerability Analysis of Electric Power Communication Network. Yucong Wu

Vulnerability Analysis of Electric Power Communication Network. Yucong Wu 2nd Interntionl Conference on Advnces in Mechnicl Engineering nd Industril Informtics (AMEII 2016 Vulnerbility Anlysis of Electric Power Communiction Network Yucong Wu Deprtment of Telecommunictions Engineering,

More information

Midterm 2 Sample solution

Midterm 2 Sample solution Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Memory-Optimized Software Synthesis from Dataflow Program Graphs withlargesizedatasamples

Memory-Optimized Software Synthesis from Dataflow Program Graphs withlargesizedatasamples EURSIP Journl on pplied Signl Processing 2003:6, 54 529 c 2003 Hindwi Publishing orportion Memory-Optimized Softwre Synthesis from tflow Progrm Grphs withlrgesizetsmples Hyunok Oh The School of Electricl

More information

Outline. Introduction Suffix Trees (ST) Building STs in linear time: Ukkonen s algorithm Applications of ST

Outline. Introduction Suffix Trees (ST) Building STs in linear time: Ukkonen s algorithm Applications of ST Suffi Trees Outline Introduction Suffi Trees (ST) Building STs in liner time: Ukkonen s lgorithm Applictions of ST 2 3 Introduction Sustrings String is ny sequence of chrcters. Sustring of string S is

More information

MATH 25 CLASS 5 NOTES, SEP

MATH 25 CLASS 5 NOTES, SEP MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid

More information

ON THE DEHN COMPLEX OF VIRTUAL LINKS

ON THE DEHN COMPLEX OF VIRTUAL LINKS ON THE DEHN COMPLEX OF VIRTUAL LINKS RACHEL BYRD, JENS HARLANDER Astrct. A virtul link comes with vriety of link complements. This rticle is concerned with the Dehn spce, pseudo mnifold with oundry, nd

More information

Design and Performance Evaluation of Underwater Data Dissemination Strategies using Interference Avoidance and Network Coding

Design and Performance Evaluation of Underwater Data Dissemination Strategies using Interference Avoidance and Network Coding Design nd Performnce Evlution of Underwter Dt Dissemintion Strtegies using Interference Avoidnce nd Network Coding Rúl Plcios Fbrizio Grnelli University of Trento, Itly Jnus Heide Frnk H.P. Fitzek Alborg

More information

documents 1. Introduction

documents 1. Introduction www.ijcsi.org 4 Efficient structurl similrity computtion etween XML documents Ali Aïtelhdj Computer Science Deprtment, Fculty of Electricl Engineering nd Computer Science Mouloud Mmmeri University of Tizi-Ouzou

More information

Computer Arithmetic Logical, Integer Addition & Subtraction Chapter

Computer Arithmetic Logical, Integer Addition & Subtraction Chapter Computer Arithmetic Logicl, Integer Addition & Sutrction Chpter 3.-3.3 3.3 EEC7 FQ 25 MIPS Integer Representtion -it signed integers,, e.g., for numeric opertions 2 s s complement: one representtion for

More information

CS 221: Artificial Intelligence Fall 2011

CS 221: Artificial Intelligence Fall 2011 CS 221: Artificil Intelligence Fll 2011 Lecture 2: Serch (Slides from Dn Klein, with help from Sturt Russell, Andrew Moore, Teg Grenger, Peter Norvig) Problem types! Fully observble, deterministic! single-belief-stte

More information

CSEP 573 Artificial Intelligence Winter 2016

CSEP 573 Artificial Intelligence Winter 2016 CSEP 573 Artificil Intelligence Winter 2016 Luke Zettlemoyer Problem Spces nd Serch slides from Dn Klein, Sturt Russell, Andrew Moore, Dn Weld, Pieter Abbeel, Ali Frhdi Outline Agents tht Pln Ahed Serch

More information

Dr. D.M. Akbar Hussain

Dr. D.M. Akbar Hussain Dr. D.M. Akr Hussin Lexicl Anlysis. Bsic Ide: Red the source code nd generte tokens, it is similr wht humns will do to red in; just tking on the input nd reking it down in pieces. Ech token is sequence

More information

Systems I. Logic Design I. Topics Digital logic Logic gates Simple combinational logic circuits

Systems I. Logic Design I. Topics Digital logic Logic gates Simple combinational logic circuits Systems I Logic Design I Topics Digitl logic Logic gtes Simple comintionl logic circuits Simple C sttement.. C = + ; Wht pieces of hrdwre do you think you might need? Storge - for vlues,, C Computtion

More information

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers Mth Modeling Lecture 4: Lgrnge Multipliers Pge 4452 Mthemticl Modeling Lecture 4: Lgrnge Multipliers Lgrnge multipliers re high powered mthemticl technique to find the mximum nd minimum of multidimensionl

More information

ΕΠΛ323 - Θεωρία και Πρακτική Μεταγλωττιστών

ΕΠΛ323 - Θεωρία και Πρακτική Μεταγλωττιστών ΕΠΛ323 - Θωρία και Πρακτική Μταγλωττιστών Lecture 3 Lexicl Anlysis Elis Athnsopoulos elisthn@cs.ucy.c.cy Recognition of Tokens if expressions nd reltionl opertors if è if then è then else è else relop

More information

Spectral Analysis of MCDF Operations in Image Processing

Spectral Analysis of MCDF Operations in Image Processing Spectrl Anlysis of MCDF Opertions in Imge Processing ZHIQIANG MA 1,2 WANWU GUO 3 1 School of Computer Science, Northest Norml University Chngchun, Jilin, Chin 2 Deprtment of Computer Science, JilinUniversity

More information