TOPP Probing of Network Links with Large Independent Latencies

Size: px
Start display at page:

Download "TOPP Probing of Network Links with Large Independent Latencies"

Transcription

1 TOPP Probing of Network Links with Large Indeendent Latencies M. Hosseinour, M. J. Tunnicliffe Faculty of Comuting, Information ystems and Mathematics, Kingston University, Kingston-on-Thames, urrey, KT1 2EE Abstract - The TOPP robing algorithm gauges the bandwidth of a network ath in terms of the disersion between ackets transmitted in closely-saced airs. Its alication to wireless networks has been frustrated by the large latency associated with the re-transmission contention hase. This aer examines the mechanisms involved, and rooses an extended TOPP algorithm to rovide consistent estimates of link and available bandwidth in the resence of a large latency. I. INTRODUCTION The Train-of-Packet-Pairs (TOPP) robing algorithm, first develoed by Melander et al. [1,2], uses the bottleneck-sacing effect to gauge the link caacity and available bandwidth of each ho in a network ath. By measuring the mean disersion between closely saced ackets it is theoretically ossible to estimate the characteristics of each hidden bottleneck in the ath. A simlified version DieTo develoed by Johnsson et al. [3], which assumes a single congestible link er ath, roved successful in all-wired networks but roblematic in networks containing a wireless link. In the latter case, results were shown to deend on the robe acket size and the cross-traffic intensity [4]. This effect was attributed to the large indeendent latency (i.e. a latency indeendent of acket size) associated with the contention hase rior to acket transmission [4]. This aer work resents a quantitative investigation of this theory, and demonstrates a TOPP-based algorithm to rovide consistent estimates of bandwidth and latency. II. BANDWIDTH PROBING AND TOPP If a network node with outgoing link caacity l bits/s rocesses ackets of size bits, each acket exeriences a minimum latency of /l seconds (lus an additional overhead delay which will for the moment be ignored). Under this assumtion, finite acket-size can be ignored and traffic-flows aroximated as continuous fluids. Thus if a traffic rate r bits/s is offered to the link, the outut rate should be: r ; m = l; r l. (1) r > l In the former case, arriving ackets are carried frictionlessly. In the latter case, incoming ackets are queued until the outut ort becomes free. Now suose that a second cross-traffic stream c bits/s is alied to the same network node. If a olicy of roortional fair queuing imlemented then r ; r + c l m = r l ; r + c > l r + c i.e. the node behaves frictionlessly until the combined inut rate exceeds the link caacity, at which oint, the bandwidth is shared roortionally between the two cometing streams. The value r=l-c at which the frictionless behavior ceases is termed the available bandwidth a. If the ath asses through n nodes, the available bandwidth is set by the node with the smallest value of a: i ( ) i { 1.. n} (2) a tot = min a. (3) This is the tight-link of the ath (which is not necessarily the narrow-link, the node with the smallest link caacity [5]). The resent aer is concerned only with the tight-link. To illustrate this, a urose-built simulation of a storeand-forward network was imlemented in C++. The software could suort any arbitrary node toology and traffic configuration, but the exeriments reorted here are based on two simle scenarios: Figure 1 shows a single-ho network, in which 5% of the 2Mbit/s link bandwidth is used by a 1Mbit/s cross-traffic stream. (Throughout this IBN: PGNet

2 aer, cross-traffic is assumed to be Poisson.) The node can also be given an indeendent latency, but this was initially set to zero. Figure 2 shows a two-node network reresenting a wired-cum-wireless scenario. The u-stream node (the wireless link) carries data at a 1Mbit/s, while Node B (wired) runs at 1Mbit/s. For acket sequences (including acket-airs), traffic rate is interreted as the acket size (in bits) divided by the mean acket searation (seconds). Thus the acket disersion ratio D (outut searation/inut searation) is equal to the ratio of the offered rate r to the measured outut rate m. Rearranging Eqn.(2) we obtain: Disersion Ratio byte robe acket data 5byte robe acket data 5byte robe acket regression line 5byte robe acket regression line D = r m 1 ; r m = 1 > m +. r 1 ; r m l l By collecting a set of results for r > m, the values of m and l can be comuted using least-square analysis. Figure 3 shows some tyical results for the one-ho network scenario (Fig.1). The transition between the two linear domains is clearly not abrut as Eqn.(4) would suggest; the disersion ratios observed in the region r m are considerably higher than their theoretical redictions. (This is due to the robing bias, theoretically redicted by Liu et al. [6]). However, this effect is less ronounced if the robe ackets are much larger than the cross-traffic ackets (2bytes), and decays raidly as the offered rate increases. The 5byte data yields very accurate estimates of the available and link bandwidths (1 and 2Mbit/s resectively). Figure 1. ingle-ho network. The available bandwidth should theoretically be 1Mbit/s. Probe In Cross Traffic In: 1Mbit/s, 2byte acket, Poisson Probe In Cross Traffic Out.5Mbit/s, 2byte 1Mbit/s Wireless Link Probe Out 2Mbit/s, 1,, byte buffer Zero fixed latency 8Mbit/s, 2byte 1Mbit/s Wired Link Figure 2. Two-ho wired-cum-wireless scenario. Available bandwidth is 5kbit/s. (4) Probe Out Offered Bit Rate (bits/s) Figure 3. Tyical disersion results obtained from single-ho simulation using 5 and 5byte robe ackets. III. INDEPENDENT NODE LATENCY In addition to the time taken to transmit the acket (acket size transmission rate), the node imoses an additional overhead latency, indeendent of acket size. This aears on all links (wired and wireless) and includes the header-rocessing and roagation delays. However, a wireless link imoses an unusually long delay due to the inter-frame sacing and contention times. Thus the latency imosed on a acket of size bits should be modeled as (/l + t), where l is the link bandwidth and t is the indeendent delay. (For the moment we assume that t is constant; variable t will be considered later.) If a source offers traffic at a rate r bit/s with a acket size bits, then the effective quantity of link bandwidth used by the transmission must be r(1+lt/ ) bits/s. Thus the erceived link bandwidth l is related to the actual link caacity by the formulae: lt l = l 1 + or l l =. (5) + lt Also if a robe source transmits data at a rate equal to the available bandwidth a bits/s (for the articular acket size ), and the cross-traffic rate is c bits/s with a acket size c bits, then the following relationshi must also hold: lt lt a c = l 1+. (6) c

3 This yields the following exression for the available bandwidth: ( l c ) eff a = (7) + lt where c eff is the effective cross traffic rate, given by Available Bandwidth (bits/s) lt c = + eff c 1. (8) c Tight-link caacity: 1Mbit/s Cross traffic at tight-link: 5kbit/s, 2 byte ackets, Poisson arrival. Model: 1byte ackets Model: 3byte ackets Model: 1byte ackets Data: 1byte ackets Data: 3byte ackets Data, 1byte ackets Additional Latency (er acket) at Tight-Link (microseconds) Figure 4. Comarison of exerimental and theoretical available bandwidth as a function of fixed indeendent latency. (Available bandwidth was defined as the highest rate at which no acket losses were observed.) Link Bandwidth (bits/s) Model: 1byte ackets Model: 3byte ackets Model: 1byte ackets Data: 1byte ackets Data: 3byte ackets Data, 1byte ackets Additional Latency (er acket) at Tight-Link (microseconds) Figure 5. Comarison of the exerimental and theoretical link bandwidth as a function of fixed indeendent latency. Measured Bandwidth (bits/s) Probe Packet ize (bytes) Figure 6. Measured bandwidth comared with theoretical redictions for zero (broken lines) and constant 4µs (solid lines) indeendent latency. Data oints: =Available bandwidth, zero additional latency, =Available bandwidth, 4µs additional latency, =link caacity, zero additional latency, =link caacity, 4µs additional latency. Figures 4 and 5 comare the comuted bandwidths with those observed for a deterministic stream with three different acket sizes. The two-node scenario of Figure 2 was used, with the additional delay aearing only on the 1Mbit/s (wireless) tight-link. Offered traffic was incremented in 1,bits/s stes, and available bandwidth was defined as the highest rate at which acket-loss was zero. (Link bandwidth was obtained by reeating the exeriment with the cross-traffic removed.) In all cases, the model redictions are in close agreement with the exerimental results. Figure 6 shows the results of a TOPP robing exeriment on the same network model. The available and link bandwidths were measured using the acket-disersion method, with fixed additional latencies of zero and 4µs with the theoretical values obtained from Eqns. (5) and (7). In the case of zero additional latency, there is an observed tendency to underestimate link caacity when the robe acket size is small, but this can be exlained in terms of the robing bias reviously discussed. Otherwise the model fits the data extremely well. For the urose of bandwidth robing, it is more imortant to be able to go the other way: Namely to obtain values for the link caacity, available bandwidth and indeendent latency from the raw data alone. Rearranging Eqn.(5) yields: l 1 = l + t Thus /l can be lotted against and the values of l and t can be comuted by least-square analysis. (9)

4 Table I Measured and estimated arameters for a 1Mbit/s narrow link with a fixed indeendent latency of 4µs er acket. Probe acket sizes varied in the range 1-1 bytes, with a cross-traffic rate of 5kbit/s, acket size 2 bytes. Parameter Measured Actual Link Bandwidth 1.58 Mbit/s 1. Mbit/s Effective Cross Traffic 6.77 kbit/s 625 kbit/s Additional Latency 492 µs 4 µs Obtaining the recise cross traffic arameters (rate and acket-size) is roblematic, but it is ossible to estimate the effective cross-traffic rate c. Eqns.(5) and (6) can be combined to roduce: lt c' = c 1 + (1) where c is the erceived cross traffic rate, given by (l eff - a), which can be calculated using the estimated values of l and t, averaged across the entire range of acket sizes (1-1 bytes). The resulting value can in rincile be used to obtain the available bandwidth for any required value of using Eqn.(3). Table I shows some tyical results for a 4µs fixed indeendent latency. o far some fairly simlistic conditions have been assumed; namely that the additional node latency is constant, and that the cross traffic is comosed of ackets of one size only. The former assumtion may be valid in a lightly loaded wireless network, where a transmitting node nearly always gains access to the transmission medium once the minimum inter-frame sacing time (e.g. DIF) has elased. In a more heavily loaded network, a node may frequently enter a contention hase, causing the latency to vary stochastically between ackets-transmissions. The exeriment was therefore reeated using randomly-selected additional latencies, governed by a uniform (mean ± 1%) and a Poisson random distribution, and a range of different mean latencies. Figure 7 shows the comuted link bandwidth and the effective cross-traffic lotted against the set mean additional latency. While some random variation exists, the estimates are generally within about 5% of their true values (indicated by the solid and broken lines). Figure 8 shows the estimated mean additional latencies: Although some redictions are very close to their true values, there is (as was reviously seen in Table I) a tendency to overestimate the mean latency, and to underestimate the effective cross traffic. Data Rates (bits/s) 1.1E+6 1.E+6 9.E+5 8.E+5 7.E+5 6.E+5 5.E+5 4.E Link Bandwidth (Actual) Measured Link Bandwidth (Constant) Measured Link Bandwidth (Uniform) Measured Link Bandwidth (Poisson) Actual Mean Additional Latency (s) Effective Cross Traffic (Actual) Measured Effective Cross Traffic (Constant) Measured Effective Cross Traffic (Uniform) Measured Effective Cross Traffic (Poisson) Figure 7. Measured link bandwidth and effective cross-traffic intensities obtained using constant, uniform random (±1%) and Poisson additional node latencies, comared with their true values. Measured Mean Additional Latency (s) Actual Mean Additional Latency (s) Actual Value Constant Uniform Poisson Figure 8. Measured mean additional latency obtained using constant, uniform random (±1%) and Poisson additional node latencies, comared with their true values. o far it has been assumed that the cross-traffic is comosed entirely of Poisson-distributed 2 byte ackets. Further exeriments used a mixture of acket sizes, based on the distribution used by Johnsson et al. [4], while the total rates of 5kbit/s and 8Mbit/s (aearing at the 1Mbit/s and 1Mbit/s nodes resectively) were reserved. Table 2 shows the distribution of cross traffic.

5 Available Bandwidth (bits/s) Packet ize (bytes) Table II Comosition of cross-traffic (based on [4]). % of Total Packets % of Total Traffic Rate Tight-link caacity: 1Mbit/s 5kbit/s mixed Poisson cross traffic, effective acket size bytes Model: 1byte ackets Model: 3byte ackets Model: 1byte ackets Data: 1byte ackets Data: 3byte ackets Data, 1byte ackets Mean Additional Latency (microseconds) Figure 9. Comarison of actual and measured available bandwidth for different additional mean latencies (±1% uniform random distribution) with values obtained using deterministic streams of 1, 3 and 1, byte ackets. Measured Bandwidth (bits/s) 1.E+6 8.E+5 6.E+5 4.E+5 2.E+5 LC, t= AB, t= LC t=4us AB, t=4us Model LC, t= Model AB, t= Model LC, t=4us Model AB, t=4us.e+ Probe Packet ize (bytes) Figure 1. Measured available bandwidth (AB) and link caacity (LC) for 5kbit/s mixed-acket-size cross traffic, comared with theoretical redictions for zero and uniform random (4±4µs) additional latency at the 1Mbit/s tight-link. In order to quantify the combined imact of n different acket sizes, c in Eqn.(8) must be relaced by an effective value: c( eff ) = n α i = 1 ( ) i c i 1 (11) where α i reresents the roortion of the total cross traffic transmitted using ackets of size c(i) bits. For the data shown in Table II, c(eff) equals 578.8bytes (463.5 bits). Figure 9 comares available bandwidths redicted from this value with results obtained from a simulation exeriment, showing that the equations still hold under mixed-traffic conditions. The next challenge is to see whether or not acket-air robing can still be used to estimate the available bandwidth under mixed cross-traffic. Figure 1 comares the available and link bandwidths obtained from regression analysis with their theoretically redicted values. The data shows general agreement with theory, although there is a greater degree of scattering than was observed in Figure 6. As before, there is a slight tendency to underestimate the link caacity when the additional latency is zero. IV: CONCLUION AND FUTURE WORK In this aer we have examined the behavior of the TOPP robing algorithm in a network which imoses large latencies indeendent of acket size. The algorithm has been extended to include trains of different sized ackets, ermitting these latencies to be eliminated. The results we, on the whole otimistic, but were obtained using a simulation tool based on simlistic assumtions: Firstly the cross-traffic was governed by a temorally uniform Poisson rocess, which may not reresent tyical network loading behavior. econdly, the statistical rocess generating the latency in a real wireless node is likely to be more comlex than the uniform and Poisson models assumed here. We are therefore currently working on extending the study to a more realistic simulation, based on the commercial network simulation ackage OPNET. Figures 11 and 12 illustrate some tyical OPNET scenarios: Figure 11 shows a single-ho wireless network, while Figure 12 shows a wired-cum-wireless scenario akin to the network reresented in Figure 2. REFERENCE [1] B.Melander, M.Björkman, P.Gunningberg, A New End-to- End Probing and Analysis Method for Estimating Bandwidth Bottlenecks, Proc. IEEE Glogecom, an Francisco, CA, UA, Nov. 2.

6 [2] B.Melander, M.Björkman, P.Gunningberg, Regression- Based Available Bandwidth Measurements, Proc. 22 Int. ym. on Performance Evaluation of Comuter and Telecommunication ystems, 22. [3] A.Johnsson, B.Melander, M.Björkman,M, DietTo: A First Imlementation and Evaluation of a imlified Bandwidth Measurement Method, 2 nd wedish National Comuter Network Worksho,.5, Karlstad, Nov. 24. [4] A.Johnsson, B.Melander, M.Björkman, Bandwidth Measurement in Wireless Networks, Proc. Mediterranean Ad Hoc Networking Worksho, Porquerolles, France, June 25. [5] M.Jain, C.Dovrolis, Ten Fallacies and Pitfalls on End-to- End Available Bandwidth Estimation, Proc. 4 th ACM IGCOMM, Taormina, icily, Italy,.272-7, 24. [6] X.Liu, K.Ravindran, B.Liu, D.Loguinov, ingle-ho Probing Asymtotics in Available Bandwidth Estimation: amle-path Analysis, Proc. ACM Internet Measurement Conference, 24. Figure 11. OPNET model of a one-ho wireless network scenario. Mobile nodes 1 and 2 communicate with the wireless server. Figure 12. OPNET model of a wired-cum wireless network scenario. The mobile nodes communicates with the fixed server host via the intermediate suervisor host.

EP2200 Performance analysis of Communication networks. Topic 3 Congestion and rate control

EP2200 Performance analysis of Communication networks. Topic 3 Congestion and rate control EP00 Performance analysis of Communication networks Toic 3 Congestion and rate control Congestion, rate and error control Lecture material: Bertsekas, Gallager, Data networks, 6.- I. Kay, Stochastic modeling,

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

A Study of Protocols for Low-Latency Video Transport over the Internet

A Study of Protocols for Low-Latency Video Transport over the Internet A Study of Protocols for Low-Latency Video Transort over the Internet Ciro A. Noronha, Ph.D. Cobalt Digital Santa Clara, CA ciro.noronha@cobaltdigital.com Juliana W. Noronha University of California, Davis

More information

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1 Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and

More information

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY Andrew Lam 1, Steven J.E. Wilton 1, Phili Leong 2, Wayne Luk 3 1 Elec. and Com. Engineering 2 Comuter Science

More information

Semi-Markov Process based Model for Performance Analysis of Wireless LANs

Semi-Markov Process based Model for Performance Analysis of Wireless LANs Semi-Markov Process based Model for Performance Analysis of Wireless LANs Murali Krishna Kadiyala, Diti Shikha, Ravi Pendse, and Neeraj Jaggi Deartment of Electrical Engineering and Comuter Science Wichita

More information

Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication

Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication Using Permuted States and Validated Simulation to Analyze Conflict Rates in Otimistic Relication An-I A. Wang Comuter Science Deartment Florida State University Geoff H. Kuenning Comuter Science Deartment

More information

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,

More information

Source Coding and express these numbers in a binary system using M log

Source Coding and express these numbers in a binary system using M log Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is

More information

EE678 Application Presentation Content Based Image Retrieval Using Wavelets

EE678 Application Presentation Content Based Image Retrieval Using Wavelets EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective

More information

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China

More information

EDGE: A ROUTING ALGORITHM FOR MAXIMIZING THROUGHPUT AND MINIMIZING DELAY IN WIRELESS SENSOR NETWORKS

EDGE: A ROUTING ALGORITHM FOR MAXIMIZING THROUGHPUT AND MINIMIZING DELAY IN WIRELESS SENSOR NETWORKS EDGE: A ROUTING ALGORITHM FOR MAXIMIZING THROUGHPUT AND MINIMIZING DELAY IN WIRELESS SENSOR NETWORKS Shuang Li, Alvin Lim, Santosh Kulkarni and Cong Liu Auburn University, Comuter Science and Software

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model Ad Hoc Networks (4) 5 68 Contents lists available at SciVerse ScienceDirect Ad Hoc Networks journal homeage: www.elsevier.com/locate/adhoc Latency-minimizing data aggregation in wireless sensor networks

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

A Comprehensive Minimum Energy Routing Scheme for Wireless Ad hoc Networks

A Comprehensive Minimum Energy Routing Scheme for Wireless Ad hoc Networks A Comrehensive Minimum Energy Routing Scheme for Wireless Ad hoc Networks Jinhua Zhu, Chunming Qiao and Xin Wang Deartment of Comuter Science and Engineering State University of New York at Buffalo, Buffalo,

More information

A power efficient flit-admission scheme for wormhole-switched networks on chip

A power efficient flit-admission scheme for wormhole-switched networks on chip A ower efficient flit-admission scheme for wormhole-switched networks on chi Zhonghai Lu, Li Tong, Bei Yin and Axel Jantsch Laboratory of Electronics and Comuter Systems Royal Institute of Technology,

More information

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Weimin Chen, Volker Turau TR-93-047 August, 1993 Abstract This aer introduces a new technique for source-to-source code

More information

10. Parallel Methods for Data Sorting

10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting... 1 10.1. Parallelizing Princiles... 10.. Scaling Parallel Comutations... 10.3. Bubble Sort...3 10.3.1. Sequential Algorithm...3

More information

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method ITB J. Eng. Sci. Vol. 39 B, No. 1, 007, 1-19 1 Leak Detection Modeling and Simulation for Oil Pieline with Artificial Intelligence Method Pudjo Sukarno 1, Kuntjoro Adji Sidarto, Amoranto Trisnobudi 3,

More information

The Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks

The Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks The Scalability and Performance of Common Vector Solution to Generalized abel Continuity Constraint in Hybrid Otical/Pacet etwors Shujia Gong and Ban Jabbari {sgong, bjabbari}@gmuedu George Mason University

More information

Extracting Optimal Paths from Roadmaps for Motion Planning

Extracting Optimal Paths from Roadmaps for Motion Planning Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu

More information

Complexity analysis and performance evaluation of matrix product on multicore architectures

Complexity analysis and performance evaluation of matrix product on multicore architectures Comlexity analysis and erformance evaluation of matrix roduct on multicore architectures Mathias Jacquelin, Loris Marchal and Yves Robert École Normale Suérieure de Lyon, France {Mathias.Jacquelin Loris.Marchal

More information

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal

More information

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism Erlin Yao, Mingyu Chen, Rui Wang, Wenli Zhang, Guangming Tan Key Laboratory of Comuter System and Architecture Institute

More information

MATHEMATICAL MODELING OF COMPLEX MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT

MATHEMATICAL MODELING OF COMPLEX MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT MATHEMATICAL MODELING OF COMPLE MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT V.N. Nesterov JSC Samara Electromechanical Plant, Samara, Russia Abstract. The rovisions of the concet of a multi-comonent

More information

New Techniques for Making Transport Protocols Robust to Corruption-Based Loss

New Techniques for Making Transport Protocols Robust to Corruption-Based Loss New Techniques for Making Transort Protocols Robust to Corrution-Based Loss Wesley M. Eddy NASA GRC / Verizon weddy@grc.nasa.gov Shawn Ostermann Ohio University ostermann@eecs.ohiou.edu Mark Allman ICSI

More information

AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH

AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH A. Prokos 1, G. Karras 1, E. Petsa 2 1 Deartment of Surveying, National Technical University of Athens (NTUA),

More information

Earthenware Reconstruction Based on the Shape Similarity among Potsherds

Earthenware Reconstruction Based on the Shape Similarity among Potsherds Original Paer Forma, 16, 77 90, 2001 Earthenware Reconstruction Based on the Shae Similarity among Potsherds Masayoshi KANOH 1, Shohei KATO 2 and Hidenori ITOH 1 1 Nagoya Institute of Technology, Gokiso-cho,

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Distrib. Comut. 71 (2011) 288 301 Contents lists available at ScienceDirect J. Parallel Distrib. Comut. journal homeage: www.elsevier.com/locate/jdc Quality of security adatation in arallel

More information

Stereo Disparity Estimation in Moment Space

Stereo Disparity Estimation in Moment Space Stereo Disarity Estimation in oment Sace Angeline Pang Faculty of Information Technology, ultimedia University, 63 Cyberjaya, alaysia. angeline.ang@mmu.edu.my R. ukundan Deartment of Comuter Science, University

More information

Face Recognition Using Legendre Moments

Face Recognition Using Legendre Moments Face Recognition Using Legendre Moments Dr.S.Annadurai 1 A.Saradha Professor & Head of CSE & IT Research scholar in CSE Government College of Technology, Government College of Technology, Coimbatore, Tamilnadu,

More information

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture

More information

Equality-Based Translation Validator for LLVM

Equality-Based Translation Validator for LLVM Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented

More information

Statistical Detection for Network Flooding Attacks

Statistical Detection for Network Flooding Attacks Statistical Detection for Network Flooding Attacks C. S. Chao, Y. S. Chen, and A.C. Liu Det. of Information Engineering, Feng Chia Univ., Taiwan 407, OC. Email: cschao@fcu.edu.tw Abstract In order to meet

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

2-D Fir Filter Design And Its Applications In Removing Impulse Noise In Digital Image

2-D Fir Filter Design And Its Applications In Removing Impulse Noise In Digital Image -D Fir Filter Design And Its Alications In Removing Imulse Noise In Digital Image Nguyen Thi Huyen Linh 1, Luong Ngoc Minh, Tran Dinh Dung 3 1 Faculty of Electronic and Electrical Engineering, Hung Yen

More information

An Efficient Video Program Delivery algorithm in Tree Networks*

An Efficient Video Program Delivery algorithm in Tree Networks* 3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,

More information

Record Route IP Traceback: Combating DoS Attacks and the Variants

Record Route IP Traceback: Combating DoS Attacks and the Variants Record Route IP Traceback: Combating DoS Attacks and the Variants Abdullah Yasin Nur, Mehmet Engin Tozal University of Louisiana at Lafayette, Lafayette, LA, US ayasinnur@louisiana.edu, metozal@louisiana.edu

More information

A Novel Iris Segmentation Method for Hand-Held Capture Device

A Novel Iris Segmentation Method for Hand-Held Capture Device A Novel Iris Segmentation Method for Hand-Held Cature Device XiaoFu He and PengFei Shi Institute of Image Processing and Pattern Recognition, Shanghai Jiao Tong University, Shanghai 200030, China {xfhe,

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information

On Growth of Parallelism within Routers and Its Impact on Packet Reordering 1

On Growth of Parallelism within Routers and Its Impact on Packet Reordering 1 On Growth of Parallelism within Routers and Its Imact on Reordering 1 A. A. Bare 1, A. P. Jayasumana, and N. M. Piratla 2 Deartment of Electrical & Comuter Engineering, Colorado State University, Fort

More information

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,

More information

Complexity analysis of matrix product on multicore architectures

Complexity analysis of matrix product on multicore architectures Comlexity analysis of matrix roduct on multicore architectures Mathias Jacquelin, Loris Marchal and Yves Robert École Normale Suérieure de Lyon, France {Mathias.Jacquelin Loris.Marchal Yves.Robert}@ens-lyon.fr

More information

Hardware-Accelerated Formal Verification

Hardware-Accelerated Formal Verification Hardare-Accelerated Formal Verification Hiroaki Yoshida, Satoshi Morishita 3 Masahiro Fujita,. VLSI Design and Education Center (VDEC), University of Tokyo. CREST, Jaan Science and Technology Agency 3.

More information

Building Better Nurse Scheduling Algorithms

Building Better Nurse Scheduling Algorithms Building Better Nurse Scheduling Algorithms Annals of Oerations Research, 128, 159-177, 2004. Dr Uwe Aickelin Dr Paul White School of Comuter Science University of the West of England University of Nottingham

More information

Fast Distributed Process Creation with the XMOS XS1 Architecture

Fast Distributed Process Creation with the XMOS XS1 Architecture Communicating Process Architectures 20 P.H. Welch et al. (Eds.) IOS Press, 20 c 20 The authors and IOS Press. All rights reserved. Fast Distributed Process Creation with the XMOS XS Architecture James

More information

Phase Transitions in Interconnection Networks with Finite Buffers

Phase Transitions in Interconnection Networks with Finite Buffers Abstract Phase Transitions in Interconnection Networks with Finite Buffers Yelena Rykalova Boston University rykalova@bu.edu Lev Levitin Boston University levitin@bu.edu This aer resents theoretical models

More information

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution

Texture Mapping with Vector Graphics: A Nested Mipmapping Solution Texture Maing with Vector Grahics: A Nested Mimaing Solution Wei Zhang Yonggao Yang Song Xing Det. of Comuter Science Det. of Comuter Science Det. of Information Systems Prairie View A&M University Prairie

More information

Energy consumption model over parallel programs implemented on multicore architectures

Energy consumption model over parallel programs implemented on multicore architectures Energy consumtion model over arallel rograms imlemented on multicore architectures Ricardo Isidro-Ramírez Instituto Politécnico Nacional SEPI-ESCOM M exico, D.F. Amilcar Meneses Viveros Deartamento de

More information

CLIC CLient-Informed Caching for Storage Servers

CLIC CLient-Informed Caching for Storage Servers CLIC CLient-Informed Caching for Storage Servers Xin Liu Ashraf Aboulnaga Ken Salem Xuhui Li David R. Cheriton School of Comuter Science University of Waterloo February 2009 Two-Tier Caching DBMS storage

More information

Directed File Transfer Scheduling

Directed File Transfer Scheduling Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was

More information

A Novel Implementation of TCP Vegas for Optical Burst Switched Networks

A Novel Implementation of TCP Vegas for Optical Burst Switched Networks A Novel Imlementation of TCP Vegas for Otical Burst Switched Networks Basem Shihada 1, Qiong Zhang, Pin-Han Ho 1, and Jason P. Jue 3 1 Deartment of Electrical and Comuter Engineering, University of Waterloo,

More information

Complexity analysis of matrix product on multicore architectures

Complexity analysis of matrix product on multicore architectures Comlexity analysis of matrix roduct on multicore architectures Mathias Jacquelin, Loris Marchal and Yves Robert École Normale Suérieure de Lyon, France {Mathias.Jacquelin Loris.Marchal Yves.Robert}@ens-lyon.fr

More information

Efficient Parallel Hierarchical Clustering

Efficient Parallel Hierarchical Clustering Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore

More information

IN an ad hoc wireless network, where nodes are likely to

IN an ad hoc wireless network, where nodes are likely to 1432 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 10, OCTOBER 2006 Otimal Transmit Power in Wireless Sensor Networks Sooksan Panichaiboon, Student Member, IEEE, Gianluigi Ferrari, Member, IEEE, and

More information

Submission. Verifying Properties Using Sequential ATPG

Submission. Verifying Properties Using Sequential ATPG Verifying Proerties Using Sequential ATPG Jacob A. Abraham and Vivekananda M. Vedula Comuter Engineering Research Center The University of Texas at Austin Austin, TX 78712 jaa, vivek @cerc.utexas.edu Daniel

More information

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics structure arises in many alications of geometry. The dual structure, called a Delaunay triangulation also has many interesting roerties. Figure 3: Voronoi diagram and Delaunay triangulation. Search: Geometric

More information

Chapter 8: Adaptive Networks

Chapter 8: Adaptive Networks Chater : Adative Networks Introduction (.1) Architecture (.2) Backroagation for Feedforward Networks (.3) Jyh-Shing Roger Jang et al., Neuro-Fuzzy and Soft Comuting: A Comutational Aroach to Learning and

More information

Collective communication: theory, practice, and experience

Collective communication: theory, practice, and experience CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Comutat.: Pract. Exer. 2007; 19:1749 1783 Published online 5 July 2007 in Wiley InterScience (www.interscience.wiley.com)..1206 Collective

More information

A Metaheuristic Scheduler for Time Division Multiplexed Network-on-Chip

A Metaheuristic Scheduler for Time Division Multiplexed Network-on-Chip Downloaded from orbit.dtu.dk on: Jan 25, 2019 A Metaheuristic Scheduler for Time Division Multilexed Network-on-Chi Sørensen, Rasmus Bo; Sarsø, Jens; Pedersen, Mark Ruvald; Højgaard, Jasur Publication

More information

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions

More information

TD C. Space filling designs in R

TD C. Space filling designs in R TD C Sace filling designs in R 8/05/0 Tyical engineering ractice : One-At-a-Time (OAT design X P P3 P X Main remarks : OAT brings some information, but otentially wrong Eloration is oor : on monotonicity?

More information

Analytical Modelling and Message Delay Performance Evaluation of the IEEE MAC Protocol

Analytical Modelling and Message Delay Performance Evaluation of the IEEE MAC Protocol Analytical Modelling and Message Delay Performance Evaluation of the IEEE 8.6 MAC Protocol Luís F. M. de Moraes and Danielle Loes F. G. Vieira Laboratório de Redes de Alta Velocidade - Universidade Federal

More information

Implementations of Partial Document Ranking Using. Inverted Files. Wai Yee Peter Wong. Dik Lun Lee

Implementations of Partial Document Ranking Using. Inverted Files. Wai Yee Peter Wong. Dik Lun Lee Imlementations of Partial Document Ranking Using Inverted Files Wai Yee Peter Wong Dik Lun Lee Deartment of Comuter and Information Science, Ohio State University, 36 Neil Ave, Columbus, Ohio 4321, U.S.A.

More information

One-Node-Based Mobile Architecture for a Better QoS Control

One-Node-Based Mobile Architecture for a Better QoS Control One-ode-Based obile rchitecture for a Better Qo ontrol Khadija aoud, Philie Herbelin Orange Labs ssy Les oulineaux, rance {khadija.daoud, hilie.herbelin}@orange-ftgrou.com oël resi nstitut TELEO udparis

More information

SPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation

SPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation To aear in IEEE VLSI Test Symosium, 1997 SITFIRE: Scalable arallel Algorithms for Test Set artitioned Fault Simulation Dili Krishnaswamy y Elizabeth M. Rudnick y Janak H. atel y rithviraj Banerjee z y

More information

A Measurement Study of Internet Bottlenecks

A Measurement Study of Internet Bottlenecks A Measurement Study of Internet Bottlenecks Ningning Hu, Li (Erran) Li y, Zhuoqing Morley Mao z, Peter Steenkiste and Jia Wang x Carnegie Mellon University, Email: fhnn, rsg@cs.cmu.edu y Bell Laboratories,

More information

Mitigating the Impact of Decompression Latency in L1 Compressed Data Caches via Prefetching

Mitigating the Impact of Decompression Latency in L1 Compressed Data Caches via Prefetching Mitigating the Imact of Decomression Latency in L1 Comressed Data Caches via Prefetching by Sean Rea A thesis resented to Lakehead University in artial fulfillment of the requirement for the degree of

More information

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links

More information

Parallel Construction of Multidimensional Binary Search Trees. Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka

Parallel Construction of Multidimensional Binary Search Trees. Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka Parallel Construction of Multidimensional Binary Search Trees Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka School of CIS and School of CISE Northeast Parallel Architectures Center Syracuse

More information

Modified Bloom filter for high performance hybrid NoSQL systems

Modified Bloom filter for high performance hybrid NoSQL systems odified Bloom filter for high erformance hybrid NoSQL systems A.B.Vavrenyuk, N.P.Vasilyev, V.V.akarov, K.A.atyukhin,..Rovnyagin, A.A.Skitev National Research Nuclear University EPhI (oscow Engineering

More information

Model-Based Annotation of Online Handwritten Datasets

Model-Based Annotation of Online Handwritten Datasets Model-Based Annotation of Online Handwritten Datasets Anand Kumar, A. Balasubramanian, Anoo Namboodiri and C.V. Jawahar Center for Visual Information Technology, International Institute of Information

More information

SPARSE SIGNAL REPRESENTATION FOR COMPLEX-VALUED IMAGING Sadegh Samadi 1, M üjdat Çetin 2, Mohammad Ali Masnadi-Shirazi 1

SPARSE SIGNAL REPRESENTATION FOR COMPLEX-VALUED IMAGING Sadegh Samadi 1, M üjdat Çetin 2, Mohammad Ali Masnadi-Shirazi 1 SPARSE SIGNAL REPRESENTATION FOR COMPLEX-VALUED IMAGING Sadegh Samadi 1, M üjdat Çetin, Mohammad Ali Masnadi-Shirazi 1 1. Shiraz University, Shiraz, Iran,. Sabanci University, Istanbul, Turkey ssamadi@shirazu.ac.ir,

More information

Autonomic Physical Database Design - From Indexing to Multidimensional Clustering

Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Stehan Baumann, Kai-Uwe Sattler Databases and Information Systems Grou Technische Universität Ilmenau, Ilmenau, Germany

More information

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu

More information

Performance Incentives for Cooperation between Wireless Mesh Network Operators

Performance Incentives for Cooperation between Wireless Mesh Network Operators Performance Incentives for Cooeration between Wireless Mesh Network Oerators Xenofon Fafoutis and Vasilios A. Siris Institute of Comuter Science, Foundation for Research and Technology - Hellas (FORTH)

More information

A Model-Adaptable MOSFET Parameter Extraction System

A Model-Adaptable MOSFET Parameter Extraction System A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313

More information

The Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005*

The Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005* The Anubis Service Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL-2005-72 June 8, 2005* timed model, state monitoring, failure detection, network artition Anubis is a fully

More information

On traffic fairness in data center fabrics

On traffic fairness in data center fabrics On traffic fairness in data center fabrics Dallal Belabed, Stefano Secci, Guy Pujolle, Dee Medhi To cite this version: Dallal Belabed, Stefano Secci, Guy Pujolle, Dee Medhi. On traffic fairness in data

More information

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment

More information

Interactive Image Segmentation

Interactive Image Segmentation Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).

More information

Learning Robust Locality Preserving Projection via p-order Minimization

Learning Robust Locality Preserving Projection via p-order Minimization Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence Learning Robust Locality Preserving Projection via -Order Minimization Hua Wang, Feiing Nie, Heng Huang Deartment of Electrical

More information

Using Rational Numbers and Parallel Computing to Efficiently Avoid Round-off Errors on Map Simplification

Using Rational Numbers and Parallel Computing to Efficiently Avoid Round-off Errors on Map Simplification Using Rational Numbers and Parallel Comuting to Efficiently Avoid Round-off Errors on Ma Simlification Maurício G. Grui 1, Salles V. G. de Magalhães 1,2, Marcus V. A. Andrade 1, W. Randolh Franklin 2,

More information

Visualization, Estimation and User-Modeling for Interactive Browsing of Image Libraries

Visualization, Estimation and User-Modeling for Interactive Browsing of Image Libraries Visualization, Estimation and User-Modeling for Interactive Browsing of Image Libraries Qi Tian, Baback Moghaddam 2 and Thomas S. Huang Beckman Institute, University of Illinois, Urbana-Chamaign, IL 680,

More information

Construction of Irregular QC-LDPC Codes in Near-Earth Communications

Construction of Irregular QC-LDPC Codes in Near-Earth Communications Journal of Communications Vol. 9, No. 7, July 24 Construction of Irregular QC-LDPC Codes in Near-Earth Communications Hui Zhao, Xiaoxiao Bao, Liang Qin, Ruyan Wang, and Hong Zhang Chongqing University

More information

Collective Communication: Theory, Practice, and Experience. FLAME Working Note #22

Collective Communication: Theory, Practice, and Experience. FLAME Working Note #22 Collective Communication: Theory, Practice, and Exerience FLAME Working Note # Ernie Chan Marcel Heimlich Avi Purkayastha Robert van de Geijn Setember, 6 Abstract We discuss the design and high-erformance

More information

Multishading masks: a new method for assessing solar penetration in open spaces

Multishading masks: a new method for assessing solar penetration in open spaces PLEA2013-29th Conference, Sustainable Architecture for a Renewable Future, Munich, Germany 10-12 Setember 2013 Multishading masks: a new method for assessing solar enetration in oen saces RAPHAËL COMPAGNON,

More information

COMP Parallel Computing. BSP (1) Bulk-Synchronous Processing Model

COMP Parallel Computing. BSP (1) Bulk-Synchronous Processing Model COMP 6 - Parallel Comuting Lecture 6 November, 8 Bulk-Synchronous essing Model Models of arallel comutation Shared-memory model Imlicit communication algorithm design and analysis relatively simle but

More information

Mining Association rules with Dynamic and Collective Support Thresholds

Mining Association rules with Dynamic and Collective Support Thresholds Mining Association rules with Dynamic and Collective Suort Thresholds C S Kanimozhi Selvi and A Tamilarasi Abstract Mining association rules is an imortant task in data mining. It discovers the hidden,

More information

Process and Measurement System Capability Analysis

Process and Measurement System Capability Analysis Process and Measurement System aability Analysis Process caability is the uniformity of the rocess. Variability is a measure of the uniformity of outut. Assume that a rocess involves a quality characteristic

More information

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical

More information

GDP: Using Dataflow Properties to Accurately Estimate Interference-Free Performance at Runtime

GDP: Using Dataflow Properties to Accurately Estimate Interference-Free Performance at Runtime GDP: Using Dataflow Proerties to Accurately Estimate Interference-Free Performance at Runtime Magnus Jahre Deartment of Comuter Science Norwegian University of Science and Technology (NTNU) Email: magnus.jahre@ntnu.no

More information

High Quality Offset Printing An Evolutionary Approach

High Quality Offset Printing An Evolutionary Approach High Quality Offset Printing An Evolutionary Aroach Ralf Joost Institute of Alied Microelectronics and omuter Engineering University of Rostock Rostock, 18051, Germany +49 381 498 7272 ralf.joost@uni-rostock.de

More information

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal International Journal of Information and Electronics Engineering, Vol. 1, No. 1, July 011 An Efficient VLSI Architecture for Adative Rank Order Filter for Image Noise Removal M. C Hanumantharaju, M. Ravishankar,

More information

Building Polygonal Maps from Laser Range Data

Building Polygonal Maps from Laser Range Data ECAI Int. Cognitive Robotics Worksho, Valencia, Sain, August 2004 Building Polygonal Mas from Laser Range Data Longin Jan Latecki and Rolf Lakaemer and Xinyu Sun and Diedrich Wolter Abstract. This aer

More information

Distributed Estimation from Relative Measurements in Sensor Networks

Distributed Estimation from Relative Measurements in Sensor Networks Distributed Estimation from Relative Measurements in Sensor Networks #Prabir Barooah and João P. Hesanha Abstract We consider the roblem of estimating vectorvalued variables from noisy relative measurements.

More information

Incorporating Geometric Algorithms in Impedance- and Admittance-Type Haptic Rendering

Incorporating Geometric Algorithms in Impedance- and Admittance-Type Haptic Rendering Incororating Geometric Algorithms in Imedance- and Admittance-Tye Hatic Rendering Ryo Kikuuwe and Hideo Fujimoto Nagoya Institute of Technology, Nagoya, 466-8555, Jaan Abstract Geometric (roxy-based) hatic

More information

Swift Template Matching Based on Equivalent Histogram

Swift Template Matching Based on Equivalent Histogram Swift emlate Matching ased on Equivalent istogram Wangsheng Yu, Xiaohua ian, Zhiqiang ou * elecommunications Engineering Institute Air Force Engineering University Xi an, PR China *corresonding author:

More information

arxiv: v1 [cs.mm] 18 Jan 2016

arxiv: v1 [cs.mm] 18 Jan 2016 Lossless Intra Coding in with 3-ta Filters Saeed R. Alvar a, Fatih Kamisli a a Deartment of Electrical and Electronics Engineering, Middle East Technical University, Turkey arxiv:1601.04473v1 [cs.mm] 18

More information