Virtual Network with Security Guarantee Embedding Algorithms

Size: px
Start display at page:

Download "Virtual Network with Security Guarantee Embedding Algorithms"

Transcription

1 2782 JOURNAL OF COMPUERS, OL. 8, NO. 11, NOEMBER 2013 irtual Network with Security Guarantee Embedding Algorithms Chiqiang Xing National Digital switching System Engineering & echnological R&D Center, Zhengzhou, China Julong Lan and Yuxiang Hu National Digital switching System Engineering & echnological R&D Center, Zhengzhou, China Abstract Network irtualization has been widely concerned as the new technology to remedy the current ossification Internet architecture. Preious irtual network (N) embedding algorithms focus on optimizing the use of resources with regard to performance with constraints on irtual nodes and links. here are few researches to analyze the security threat to the irtual network. In this paper, we first present two security threats of irtual network and inestigate them in depth. hen we propose a noel irtual network with security guarantee that will take the trust alue and security protection leel as the new security constraints during its embedding. he irtual network with security guarantee embedding algorithm is gien at last, and the simulation results show that the algorithm is effectie. Index erms irtual network embedding;security guarantee; trust alue; security protection leel. I. INRODUCION he packet switching used by the Internet Protocol (IP) has its own quality characteristics [1], and its simple structure that the network terminals are intelligent makes the Internet an important information infrastructure that supports economic deelopment, social progress and scientific innoation in modern society, while generates some new problems. First, the rigid Internet architecture, the single function of network layer and the excessie separation between the business and network cannot meet the dierse needs of the business; secondly, because the Internet cannot be changed, the implementation and promotion of new technologies, such as IP6, DiffSer and IntSer are ery difficult [2]. In recent years, network irtualization has been widely concerned by the industry and academia [3]. Network irtualization has been propounded as a fundamental diersifying attribute of the future internetworking paradigm that will allow multiple heterogeneous network architectures to coexist on a shared substrate [4]. It also enables researchers to design and ealuation new networking protocols on the heterogeneous experimental architectures [5] [6]. Constructing irtual backbone network in wireless sensor networks also has a wonderful performance in improing the performance of broadcast [7]. herefore, the network irtualization can support network technology innoations effectiely, make it possible to deploy new network architectures, protocols and applications without changing the existing network. It not only proides a feasible eolution way from the current network to the future, but also a key feature of the future Internet [8]. Preious irtual network embedding algorithms are aimed to archie optimization objects, such as the acceptance ratio, the aerage reenue/cost of the substrate network oer time and the load balancing, with constraints on irtual nodes and links. hese irtual network embedding (NE) algorithms can be diided into different kinds: uncoordinated and coordinated, static and dynamic, distributed and centralized, concise and redundant. Minlan Yu[9] designed a irtual link mapping algorithm and path migration algorithm based on the multi-commodity flow (MCF)under the condition that the substrate network support diision and migration, improed the link mapping phase of the baseline algorithm to get higher substrate network resource utilization. In literature [10], the main objectie of the irtual network embedding algorithm based on traffic constraint was to find a irtual network that can not only meet the traffic demand but also get efficient utilization of the substrate network resource. In literature [11] a irtual network mapping algorithm with QoS guarantees (QoSMap) was proposed, its basic idea is to map a irtual link onto a single link and use a hop relay routing node to proide high quality backup routing path for the irtual link, improing the quality and reliability of the irtual network. Literature [12] presents two algorithms in order to make the substrate network load balanced: irtual network mapping algorithm without reconfiguration and irtual network mapping algorithm with reconfiguration, the first algorithm s basic idea is to map all of the irtual nodes onto the substrate nodes with little load and nearer to the irtual node that hae already been mapped, then map the irtual link with the shortest path algorithm; the latter cyclically examine the load of the substrate nodes and links. And when the load exceeds a predefined threshold alue, the Ns mapped to the node or link will be re-mapped to eliminate resource bottlenecks. doi: /jcp

2 JOURNAL OF COMPUERS, OL. 8, NO. 11, NOEMBER Nowadays, the issues of network security are becoming increasingly serious and attract more attention [13]. hese algorithms are proposed to increase the acceptance ratio that map as more as possible N requests onto specific nodes and paths in the substrate network with constraints on irtual links and nodes resources. Howeer, the security of the substrate hosts in the substrate network is not considered. Because all the irtual nodes of different N requests are mapped onto the substrate nodes, the N will be affected if the substrate nodes are under attack or cannot be trusted. In response to these problems, we will consider new security constraints that the substrate nodes need to meet the security requirements of the irtual networks during the mapping to guarantee the security of N and resist the possible attacks to the substrate hosts. he remainder of this paper is organized as follows. Section 2 formalizes the irtual Network with Security guarantee (SN) model and gies the description and ealuation of the embedding problems. Based on the Section 2, we proposed two algorithms: N embedding algorithm based on the greedy algorithm (NE-GA) without security constraints and N embedding algorithm with security constraints (SNE-GA), and then compared the both in Section 3. Section 4 presents simulations results that ealuate the proposed algorithms and Section 5 concludes the paper. II. IRUAL NEWORK MODEL AND EMBEDDING PROBLEM A. Model of the irtual Network with Security Guarantee he hierarchy architecture of Ns is shown in Figure 1. he substrate nodes that the irtual nodes are mapped onto are called host nodes. Figure 1. the hierarchy architecture of the irtual network he security of information is an issue related to information and communication technology and a management issue as well [14]. he risks that the N introduced can be categorized in two areas: A host node attacking one of its irtual nodes. he resources that the irtual node uses are ultimately the resources owned by host nodes. All the computations of the irtual node are carried out by the hardware and software of host nodes. he host nodes can monitor or change any act of the irtual nodes in theory. And irtual nodes hae no option to defend themseles. In this case we need to map the irtual nodes onto trusted host nodes. Other malicious nodes attacking the host nodes affecting the working of Ns. In this case, host nodes being under attack, the Ns cannot work properly, een causing information leakage. hen we need to consider the anti-attack ability, called security protection leel of the substrate nodes. And we can only map the irtual nodes onto the substrate nodes that hae a higher leel of the security protection. In the first case, we can use the trust relationship between nodes to get the trust alue as one of the security constraints on irtual nodes. Some researchers apply the trust relationship mechanism to the communication network to enable the network with intrusion tolerance and increase the security. Usually, the trust alue node A to node B is a decimal between 0 and 1. he higher alue indicates the more trust from A to B. Meanwhile, the trust relationship management is a complex process. he trust alue will decrease if B does some malicious actiities to other nodes that A recognizes. For simple, we will not consider the trust relationship between nodes and set the trust alue of each node a unified decimal between 0 and 1 in the whole network. For the second case, we can introduce the computer information system security protection leel of substrate nodes, which is defined in the GB Classified oriteria for security protection of computer information system, as another security constraint on irtual nodes. GB proides the computer information system security protection with fie leels: the first leel of user self-protection leel, the second leel of system audit protection leel, the third leel of security token protection leel, the fourth leel of structural protection leel and the fifth leel of access authentication protection leel. his proision applies to diide leel of the computer information system security protection. he security protection capabilities of the computer information system increase as the leel increases. he relationships between fie leels and security functions are shown in the able 1: ABLE 1 HE RELAIONSHIPS BEWEEN FIE LEELS AND SECURIY FUNCIONS Leel 1 Leel 2 Leel 3 Leel 4 Leel 5 Discretionary Access Control Y Y Y Y Y Mandatory Access Control - - Y Y Y Mark Y Y Y

3 2784 JOURNAL OF COMPUERS, OL. 8, NO. 11, NOEMBER 2013 Authentication Y Y Y Y Y Object reuse - Y Y Y Y Audit - Y Y Y Y Data Integrity Y Y Y Y Y Coert channel analysis Y Y rusted path Y Y Credible analysis Y So, during the embedding process of SN, except for the remaining node CPU resources and link bandwidth need to meet the N request, the trust alue and security protection leel of substrate nodes should also meet the requirements of Ns. B. irtual Network Embedding Problem Substrate network. For the embedding problem of SN, the substrate network can be modeled as a weighted undirected graph and denote it by G s =( s, E s ), where s is the set of substrate nodes and E s is the set of substrate links. Each substrate node s s is associated with the CPU capacity weight alue C( s ), trust alue ( s ) and safety protection leel S( s ). Each substrate link e s (i, j) E s between two substrate nodes i and j is associated with the bandwidth capacity weight alue W(e s ) denoting the total amount of bandwidth. he C( s ), ( s ), S( s ) and W(E s ) are non-negatie, and ( s ) [0,1], S( s ) {1,2,3,4,5}. N request. Similar to the substrate network, we model N requests as weighted undirected graphs and denote a N request by G =(, E ). Likewise, Each irtual node is associated with the required CPU weight alue C( ), trust alue ( ) and safety protection alue S( ). Each irtual link e E is associated with the required bandwidth weight alue W(e s ) denoting the required bandwidth. he C( ), ( ), S( ) and W(E ) are non-negatie, and ( ) [0,1], S( ) {1,2,3,4,5}. Each N is also associated with the required time and lifetime. N Embedding. A irtual network embedding for a N request can be defined as a mapping: M : G ( s, P ), where s s is a subset of the substrate nodes and P P, the mapping result of E s,is a subset of the substrate links. he N embedding can be naturally decomposed into node and link mapping and both the s and P are required to meet certain constraints. For the node mapping M : s, mapping irtual nodes onto substrate nodes that all M ( ) S subject to RC( M ( )) C( ) M ( ( )) ( ) (1) SM ( ( )) S ( ) For the link mapping RW ( es) W ( e), es P( M ( u), M ( )) (2) RC( s ) and RW(e s ) denote the remaining CPU resources of node s and the remaining bandwidth of link e s, where u and are irtual nodes. Objecties. Our main interest is to propose an efficient embedding algorithm for the SN and compare with the N. Because of the additional security constraints, the security protection leel and the trust alue on irtual nodes during the embedding process of N, we redefine the reenue and cost of the substrate network as follows. Similar to the preious work, we introduce the notion of reenue that corresponds to the economic benefit of accepting the N request. We denote by R(G, t) the reenue of sering the N request at time t. Reenue gies an insight into how much an InP will gain by accepting a N request. RG (, t) = α W( e) + α C ( ) 1 2 e E + α ( k ( ) + k S( )) We also redefine the cost of accepting a N request as the sum of total substrate resources allocated to the N. CG (, t) = α We ( ) + α C ( ) 1 2 ' ' es P s s + α ( k ( ) + k S( )) ' s s And the following three ealuations can be gien: 1) Aerage Reenue Oer ime: 2) Acceptance Ratio: R/ = lim t= 0 lim 3) Aerage Reenue/Cost: lim RG (, t) S RG (, t) CG (, t) III. IRUAL NEWORK WIH SECURIY GUARANEE EMBEDDING ALGORIHM We employ a node mapping algorithm based on greedy, since it is computational too expensie to employ other strategies. In order to map irtual nodes onto substrate nodes based on the greedy algorithm, we gies the following definition to ealuate the remaining bandwidth of substrate nodes and the demand bandwidth of irtual nodes: From the substrate node s point of iew, we denote by PR(t, s ) the potential remaining bandwidth of the substrate node at time t as the sum of the remaining bandwidth of all the links that connect node s : (3) (4) (5) (6) (7)

4 JOURNAL OF COMPUERS, OL. 8, NO. 11, NOEMBER PR(, t) = RWte (, ) (8) s es L( s) We also define by PR(t, ) the potential required bandwidth of the irtual node at time t as the sum of the required bandwidth of all the irtual links that connect to : PR(, t) = Wte (, ) (9) e L( ) Algorithm 1 N Embedding Algorithm based on Greedy Algorithm, NE-GA Step 1: Sort the irtual nodes according to the PR(t, ) and the substrate nodes according to the AR(t, s ) in descending order when the N request arries. Define N and N s as the number of irtual nodes and substrate nodes respectiely; Step 2: for i=1:n, j=1: N s, if RC( s ) j RC( ) i, map the irtual node i onto the substrate node sj. If all the irtual nodes are mapped successfully, go to Step 3; otherwise go to Step 5, the request fails; Step 3: e E, find the shortest path that meets the bandwidth requirement with the shortest path algorithm to complete the link mapping. If all the irtual links are mapped successfully, go to Step 4; otherwise go to Step 5, the request fails; Step 4: Update the substrate network with the node CPU resources and link bandwidth resources; Step 5: Waiting for the next N request arries and then go to Step 1. In the SN embedding algorithm, because of the additional security constraints we first need to remoe the substrate nodes that does not meet the needs of the SN request, and then perform the aboe NE-GA algorithm. Meanwhile, due to the "bucket effect" of the security, we let the security protection leel S and the trust alue of the irtual nodes to be same in the same SN. We can gie the SN embedding algorithm based on greedy. Algorithm 2 SN Embedding Algorithm based on Greedy Algorithm, SNE-GA Step 1: Remoe the substrate nodes that cannot meet the security constraints S, when the SN request arries, getting an aailable set of substrate nodes. Define N and N s as the number of irtual nodes and aailable substrate nodes respectiely. If N s >N, go to Step 2; otherwise go to Step 5, the request fails; Step 2: for i=1: N, j=1: N s, if RC( s ) j RC( ) i, then map the irtual node i onto substrate node sj. If all the irtual nodes are mapped successfully, go to Step 3; otherwise go to Step 5, the request fails; Step 3: e E find the shortest path that meets the bandwidth requirement with the shortest path algorithm to complete the link mapping. If all the irtual links are mapped successfully, go to Step 4; otherwise go to Step 5, the request fails; Step 4: Update the substrate network with the node CPU resources and link bandwidth resources; Step 5: Waiting for the next SN request arries and then go to Step 1. s Compared with the NE-GA, the SNE-GA algorithm will lead to lower acceptance ratio as the aailable substrate nodes decrease because of the security constraints on irtual nodes. he following simulation experiments and results also erified this situation. I. PERFORMANCE EALUAION In this section, we first describe the performance ealuation enironment, and then present our main ealuation results. Our ealuation focuses primarily on comparing the acceptance ratio, reenue and cost of substrate network in the aboe two algorithms. A. Ealuation Enironment We implement a N embedding simulator to ealuate our algorithms. Substrate network. We use the G-IM tool [15] to generate the substrate network topology. he substrate network is configured to hae 100 nodes and around 500 links, a scale that corresponds to a medium-sized ISP. he CPU resources at nodes and the link bandwidths at links follow a uniform distribution from 50 to 100 units. he trust alue and the security protection leel follow a uniform distribution from 0 to1 and 1to 5 (integer) separately. N request. he arrials of N requests are modeled by a Poisson process with mean fie requests per 100 time units. he duration of the requests follows an exponential distribution with 500 time units on aerage. In one N request, the number of N nodes is randomly determined by a uniform distribution between 2 and 20. Each pair of irtual nodes are randomly connected with probability 0.5. As well, the CPU requirements of the irtual nodes and the bandwidth requirements of the irtual links are uniformly distributed between 0 and 50. he required trust alue and the security protection leel follow a uniform distribution from 0 to1 and 1to 5 (integer) separately. In NE-GA and G-SP [11], because there are no security constraints, we set α 1 =α 2 =0.5, α 3 =0 in (3) (4). In SNE-GA, we set α 1 =α 2 =α 3 =1/3, and considering the alues of and S, set k 1 =25, k 2 =5.We run all of simulations for time units, which correspond to about 2500 requests on aerage in an instance of simulation. B. Ealuation Results We used seeral metrics in our ealuations to measure the performances of our algorithms against the G-SP and compare the N and SN. he metrics conclude the acceptance ratio, aerage reenue(r) and cost (C) oer time. We also ealuated and compared the acceptance ratio by changing the distributions that the trust alue and security protection leel of substrate nodes follow. In all cases we plot the performance metrics against time to show how each of these algorithms actually perform in the long run. We summarize our key obserations in the following. (1) NE-GA leads to higher acceptance ratio than G-SP and because of additional security constraints, SNE-GA leads to lower acceptance ratio than NE-GA. Fig.2 depict that without the security

5 2786 JOURNAL OF COMPUERS, OL. 8, NO. 11, NOEMBER 2013 constraints, the acceptance ratio of NE-GA is 65%, achieing about 10% increases oer the G-SP. And the acceptance ratio of SNE-GA is about 53%, 12% decreasing oer the NE-GA. his is because that NE-SC takes the trust alue and security protection leel as the additional constraints on irtual nodes, the aailable substrate nodes decrease for each N request. can proide customized serices and security guarantee, making the reenue increase significantly and the cost increase slightly, leading significantly improement of the R/C. Fig.3 and Fig.4 gie the aerage reenue and cost oer time separately. We can see that because of the security constraints, the acceptance ratio decreased, as the cost and reenue NE-GA G-SP SNE-GA NE-GA SNE-GA Acceptance Ratio Reenue/Cost Figure 2. N request acceptance ratio. Figure 3. ime aerage of reenue/cost (2)NE-SC leads to higher reenue/cost than NE-GA. Figure 3 shows the result. Because of the additional components (trust alue and security protection leel in (3) (4))in the reue and cost, the substrate network Aerage Cost Oer ime NE-GA SNE-GA Aerage Reenue Oer ime NE-GA SNE-GA 10 6 Figure 4. Aerage cost oer time reenue oer time Figure 5. Aerage (3) he substrate network with higher trust alue and security protection leel will lead to higher acceptance ratio. From the results aboe we can see that the acceptance ratio decreased due to additional constraints of the security protection leel and trust alue on irtual nodes. herefore, the different distributions of the trust alue and security protection leel (called as the ability ) of the substrate network will lead to different acceptance ratio. he following simulation shows this situation too. he different distributions of the trust alue and security protection leel of the substrate network are shown in able 2. We can see that the ability of substrate nodes in Distribution 2 is stronger than Distribution 1. ABLE 2 DIFFEREN DISRIBUIONS OF HE RUS ALUE AND SECURIY PROECION LEEL Security protection leel rust alue Distribution1 Distribution2 Leel 1 [0,0.2) Leel 2 [0.2,0.4)

6 JOURNAL OF COMPUERS, OL. 8, NO. 11, NOEMBER he result of acceptance ratio is shown in Fig.5. he acceptance of Distribution 2 is 57%, 4% (about 100 SN requests) increase oer Distribution 1. his is because the "ability" of substrate nodes in Distribution 2 is stronger than Distribution 1, leading the number of aailable substrate nodes increasing for each N request, and the higher acceptance ratio. Acceptance Ratio Leel 3 [0.4,0.6) Leel 4 [0.6,0.8) Leel 5 [0.8,1] Distribution1 Distribution2 Figure 6. SN request acceptance ratio. CONCLUSION Network irtualization has been propounded as a fundamental diersifying attribute of the future internetworking paradigm that will allow multiple heterogeneous network architectures to coexist on a shared substrate. Howeer, being the foundation critical infrastructure, N must strie to ensure a certain leel of security. In this paper we first analyzes two security risks that the network irtualization introduced and then proposes a new irtual network model with security guarantee that take the trust alue and security protection leel of substrate nodes as new constraints. Finally, the irtual network with security guarantee embedding algorithm based on greedy algorithm is gien and the simulation results show that the algorithm is effectie and alidate. We also proed that the substrate nodes with higher security ability can increase the acceptance ratio. Meanwhile, the irtual network model with security guarantee in this paper is a new consideration that needs further study in many ways: First, the dynamically management and update of the trust relationships between substrate nodes. Second, the improement of the SN embedding algorithm, especially considering how to use the intelligence optimization algorithm to increase the acceptance ratio and make the substrate network load balanced are the future works. ACKNOWLEDGMEN his paper is originated from a project numbered as 2012CB315901, which is supported by national 973 foundations, and 2011AA01A103, 2011AA01A101, which is supported by national 863 foundations. REFERENCES [1] CHENG Dong-nian, WANG Bin-qiang, WANG Bao-jin, ZHANG Jian-hui. Preliminary study on the connotation of flexibility in dynamically reconfigurable networks[j].journal of Communication, olume33, Number8, pages , 2012 [2] Secure irtual network embedding. Praxis der Information serarbeiting and Kommunikation, olume34, Number4, pages , [3] CHENG Xiang, ZHANG Zhong-bao, SU Sen, YANG Fang-chun. Surey of irtual network embedding problem[j]. Journal of Communication, olume32, Number10, pages ,2011. [4] Mosharaf Chowdhury, Muntasir Raihan Rahman, Raouf Boutaba. ineyard: irtual Network Embedding Algorithms With Coordinated Node and Link Mapping. IEEE/ACM RANSACIONS ON NEWORKING, OL. 20, NO. 1, FEBRUARY2012. [5] GENI:Global enironment for network innoations, [Online].Aailable: [6] A. Baier, N. Feamster, M. Huang, L. Peterson, and J. Rexford, In INI eritas: Realistic and controlled network experimentation, in Proc. ACM SIGCOMM, 2006, pp [7] Yong ang, Yu Xiang, et al. Leeraging 1-hop Neighborhood Knowledge for Connected Dominating Set in Wireless Sensor Networks. Journal of Computers, 2012, 7(1), [8] FEAMSlER N, GAO L, REXFORD J. How to lease the Interact in your spare time[j]. ACM SIGCOMM Computer Communication Reiew 2007, 37(1): [9] YU M, YI Y, REXFORD J, et a1. Rethinking irtual network embedding: substrate support for path splitting and migration[j], ACMSIGCOMM Computer Communication Reiew, 2008, 38(2): [10] LU J. URNER J, Efficient Mapping of irtual Networks onto a Shared Substrate[R]. Department of Computer Science and Engineering, Washington Uniersity, [11] SHAMSI J, BROCKMEYER M. QoSMap:QoS aware mapping of irtual networks for resiliency and efficiency[a]. Proceedings of the IEEE GLOBECOM Workshop [C] Washington. IX, USA, [12] ZHU Y, AMMAR M. Algorithms for assigning substrate network resources to irtual network components[a]. Proceedings of the IEEE INFOCOM[C]. Barcelona, Spain, 2006, pp [13] Ye Du Jiqiang, Liu Ruhui, et al. A Dynamic Security Mechanism for Web Serices Based on NDIS Intermediate Driers. JOURNAL OF COMPUERS. 2011, 6(10), [14] Kuo-Hsiung Liao, Hao-En Chueh. Medical Organization Information Security Management Based on ISO27001 Information Security Standard. Journal of Software, 2012,7(4), [15] E. W. Zegura, K. L. Calert, and S. Bhattacharjee. How to model an internetwork. In Proc. IEEE INFOCOM, 1996.

7 2788 JOURNAL OF COMPUERS, OL. 8, NO. 11, NOEMBER 2013 Chiqiang Xing is currently a Post-Graduate student at the National Digital switching System Engineering & echnological R&D Center, Zhengzhou, China, superised by Professor Julong Lan. His research interests include information network, network security and new network architecture. Julong Lan is currently a professor at the National Digital switching System Engineering & echnological R&D Center, Zhengzhou, China. His research interests include new network architecture and Network modeling. Yuxiang Hu is currently a lecturer at the National Digital switching System Engineering & echnological R&D Center, Zhengzhou, China. His research interests include new network architecture, routing and switching technologies.

Minimizing bottleneck nodes of a substrate in virtual network embedding

Minimizing bottleneck nodes of a substrate in virtual network embedding Minimizing bottleneck nodes of a substrate in virtual network embedding Adil Razzaq, Peter Sjödin, Markus Hidell School of ICT, KTH-Royal Institute of Technology Stockholm, Sweden {arazzaq, psj, mahidell}@

More information

Virtual Network Embedding with Substrate Support for Parallelization

Virtual Network Embedding with Substrate Support for Parallelization Virtual Network Embedding with Substrate Support for Parallelization Sheng Zhang, Nanjing University, P.R. China Jie Wu, Temple University, USA Sanglu Lu, Nanjing University, P.R. China Presenter: Pouya

More information

VNE-Sim: A Virtual Network Embedding Simulator

VNE-Sim: A Virtual Network Embedding Simulator VNE-Sim: A Virtual Network Embedding Simulator Soroush Haeri and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/~ljilja/cnl/ Simon Fraser University Vancouver, British Columbia,

More information

A New Multicast Wavelength Assignment Algorithm in Wavelength-Converted Optical Networks

A New Multicast Wavelength Assignment Algorithm in Wavelength-Converted Optical Networks Int J Communications, Network and System Sciences, 2009, 2, 912-916 doi:104236/ijcns200929106 Published Online December 2009 (http://wwwscirporg/journal/ijcns/) A New Multicast Waelength Assignment Algorithm

More information

A Novel Secure Localization Scheme Against Collaborative Collusion in Wireless Sensor Networks

A Novel Secure Localization Scheme Against Collaborative Collusion in Wireless Sensor Networks A Noel Secure Localization Scheme Against Collaboratie Collusion in Wireless Sensor Networks Jinfang Jiang 1, Guangjie Han 1,2, Lei Shu 2, Han-Chieh Chao 3, Shojiro Nishio 2 1 Department of Information

More information

A Prediction-based Dynamic Resource Management Approach for Network Virtualization

A Prediction-based Dynamic Resource Management Approach for Network Virtualization A Prediction-based Dynamic Resource Management Approach for Network Virtualization Jiacong Li, Ying Wang, Zhanwei Wu, Sixiang Feng, Xuesong Qiu State Key Laboratory of Networking and Switching Technology

More information

A Bit-Window based Algorithm for Balanced and Efficient Object Placement and Lookup in Large-scale Object Based Storage Cluster

A Bit-Window based Algorithm for Balanced and Efficient Object Placement and Lookup in Large-scale Object Based Storage Cluster A Bit-Window based Algorithm for Balanced and Efficient Object lacement and Lookup in Large-scale Object Based Storage Cluster enuga Kanagaelu A*STA Data Storage Institute, Singapore Email:renuga_KANAGAVELU@dsia-staredusg

More information

DSNRA: a Dynamic Substrate Network Reconfiguration Algorithm

DSNRA: a Dynamic Substrate Network Reconfiguration Algorithm DSNRA: a Dynamic Substrate Network Reconfiguration Algorithm Xinliang LV, Xiangwei ZHENG, and Hui ZHANG School of Information Science and Engineering Shandong Normal University, 250014, Jinan, CHINA Abstract

More information

IBM Tivoli OMEGAMON XE for CICS TG on z/os Version User's Guide SC

IBM Tivoli OMEGAMON XE for CICS TG on z/os Version User's Guide SC IBM Tioli OMEGAMON XE for CICS TG on z/os Version 5.1.0 User's Guide SC14-7476-00 IBM Tioli OMEGAMON XE for CICS TG on z/os Version 5.1.0 User's Guide SC14-7476-00 Note Before using this information and

More information

Technical Report CS : Incorporating Trust in Network Virtualization

Technical Report CS : Incorporating Trust in Network Virtualization Technical Report CS-2010-04: Incorporating Trust in Network Virtualization Loubna Mekouar University of Waterloo Waterloo, Canada lmekouar@bbcr.uwaterloo.ca Youssef Iraqi Khalifa University Sharjah, UAE

More information

IBM i Version 7.2. Security Service Tools IBM

IBM i Version 7.2. Security Service Tools IBM IBM i Version 7.2 Security Serice Tools IBM IBM i Version 7.2 Security Serice Tools IBM Note Before using this information and the product it supports, read the information in Notices on page 37. This

More information

Modification of an energy-efficient virtual network mapping method for a load-dependent power consumption model

Modification of an energy-efficient virtual network mapping method for a load-dependent power consumption model Modification of an energy-efficient virtual network mapping method for a load-dependent power consumption model HIROMICHI SUGIYAMA YUKINOBU FUKUSHIMA TOKUMI YOKOHIRA The Graduate School of Natural Science

More information

ReViNE: Reallocation of Virtual Network Embedding to Eliminate Substrate Bottleneck

ReViNE: Reallocation of Virtual Network Embedding to Eliminate Substrate Bottleneck ReViNE: Reallocation of Virtual Network Embedding to Eliminate Substrate Bottleneck Shihabur R. Chowdhury, Reaz Ahmed, Nashid Shahriar, Aimal Khan, Raouf Boutaba Jeebak Mitra, Liu Liu Virtual Network Embedding

More information

Exploiting Route Redundancy via Structured Peer to Peer Overlays

Exploiting Route Redundancy via Structured Peer to Peer Overlays Exploiting Route Redundancy ia Structured Peer to Peer Oerlays Ben Y. Zhao, Ling Huang, Jeremy Stribling, Anthony D. Joseph, and John D. Kubiatowicz Uniersity of California, Berkeley Challenges Facing

More information

Research on Heterogeneous Communication Network for Power Distribution Automation

Research on Heterogeneous Communication Network for Power Distribution Automation 3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG

More information

Robinhood: Towards Efficient Work-stealing in Virtualized Environments

Robinhood: Towards Efficient Work-stealing in Virtualized Environments 1 : Towards Efficient Work-stealing in Virtualized Enironments Yaqiong Peng, Song Wu, Member, IEEE, Hai Jin, Senior Member, IEEE Abstract Work-stealing, as a common user-leel task scheduler for managing

More information

Live Partition Mobility ESCALA REFERENCE 86 A1 85FA 01

Live Partition Mobility ESCALA REFERENCE 86 A1 85FA 01 Lie Partition Mobility ESCALA REFERENCE 86 A1 85FA 01 ESCALA Lie Partition Mobility Hardware May 2009 BULL CEDOC 357 AVENUE PATTON B.P.20845 49008 ANGERS CEDE 01 FRANCE REFERENCE 86 A1 85FA 01 The following

More information

Tivoli Application Dependency Discovery Manager Version 7 Release 2.1. Installation Guide

Tivoli Application Dependency Discovery Manager Version 7 Release 2.1. Installation Guide Tioli Application Dependency Discoery Manager Version 7 Release 2.1 Installation Guide Tioli Application Dependency Discoery Manager Version 7 Release 2.1 Installation Guide Note Before using this information

More information

A Flexible Scheme of Self Recovery for Digital Image Protection

A Flexible Scheme of Self Recovery for Digital Image Protection www.ijcsi.org 460 A Flexible Scheme of Self Recoery for Digital Image Protection Zhenxing Qian, Lili Zhao 2 School of Communication and Information Engineering, Shanghai Uniersity, Shanghai 200072, China

More information

Expertise-Based Data Access in Content-Centric Mobile Opportunistic Networks

Expertise-Based Data Access in Content-Centric Mobile Opportunistic Networks Expertise-Based Data Access in Content-Centric Mobile Opportunistic Networks Jing Zhao, Xiaomei Zhang, Guohong Cao, Mudhakar Sriatsa and Xifeng Yan Pennsylania State Uniersity, Uniersity Park, PA IBM T.

More information

CONTINUOUS VIGILANCE POLICY

CONTINUOUS VIGILANCE POLICY CONTINUOUS VIGILANCE POLICY Policy: Policy Owner: Continuous Vigilance CIO Change Management Original Implementation Date: 8/30/2017 Effectie Date: 8/30/2017 Reision Date: Approed By: NIST Cyber Security

More information

IBM Sterling Gentran:Server for Windows. Installation Guide. Version 5.3.1

IBM Sterling Gentran:Server for Windows. Installation Guide. Version 5.3.1 IBM Sterling Gentran:Serer for Windows Installation Guide Version 5.3.1 IBM Sterling Gentran:Serer for Windows Installation Guide Version 5.3.1 Note Before using this information and the product it supports,

More information

2 Video Quality Assessment framework for ROI-based Mobile Video Adaptation

2 Video Quality Assessment framework for ROI-based Mobile Video Adaptation 3rd International Conference on Multimedia Technology(ICMT 2013) A Noel Scheme of Video Quality Estimation for the ROI Transcoding Video Ting Yao 1. Abstract. Because of the limitation of bandwidth and

More information

iseries Experience Reports Configuring Management Central Connections for Firewall Environments

iseries Experience Reports Configuring Management Central Connections for Firewall Environments iseries Experience Reports Configuring Management Central Connections for Firewall Enironments iseries Experience Reports Configuring Management Central Connections for Firewall Enironments Copyright

More information

iplanetwebserveruser sguide

iplanetwebserveruser sguide IBM Tioli Monitoring for Web Infrastructure iplanetwebsereruser sguide Version 5.1.0 SH19-4574-00 IBM Tioli Monitoring for Web Infrastructure iplanetwebsereruser sguide Version 5.1.0 SH19-4574-00 Note

More information

Internet Information Server User s Guide

Internet Information Server User s Guide IBM Tioli Monitoring for Web Infrastructure Internet Information Serer User s Guide Version 5.1.0 SH19-4573-00 IBM Tioli Monitoring for Web Infrastructure Internet Information Serer User s Guide Version

More information

SA-OLSR: Security Aware Optimized Link State Routing for Mobile Ad Hoc Networks

SA-OLSR: Security Aware Optimized Link State Routing for Mobile Ad Hoc Networks SA-OLSR: Security Aware Optimized Link State Routing for Mobile Ad Hoc Networks Bounpadith Kannhaong, Hidehisa Nakayama, Yoshiaki Nemoto, and Nei Kato Graduate School of Information Sciences ohoku Uniersity

More information

IBM. Systems management Logical partitions. System i. Version 6 Release 1

IBM. Systems management Logical partitions. System i. Version 6 Release 1 IBM System i Systems management Logical partitions Version 6 Release 1 IBM System i Systems management Logical partitions Version 6 Release 1 Note Before using this information and the product it supports,

More information

IBM Security Access Manager for Web Version 7.0. Upgrade Guide SC

IBM Security Access Manager for Web Version 7.0. Upgrade Guide SC IBM Security Access Manager for Web Version 7.0 Upgrade Guide SC23-6503-02 IBM Security Access Manager for Web Version 7.0 Upgrade Guide SC23-6503-02 Note Before using this information and the product

More information

IBM Tivoli Storage Manager for Windows Version Installation Guide

IBM Tivoli Storage Manager for Windows Version Installation Guide IBM Tioli Storage Manager for Windows Version 7.1.1 Installation Guide IBM Tioli Storage Manager for Windows Version 7.1.1 Installation Guide Note: Before using this information and the product it supports,

More information

Cloning IMS Systems and Databases

Cloning IMS Systems and Databases white paper Cloning IMS Systems and Databases Ensure the Ongoing Health of Your IMS Database System Rocket Mainstar Cloning IMS Systems and Databases A White Paper by Rocket Software Version 3.1 Reised

More information

iseries Configuring Management Central Connections for Firewall Environments

iseries Configuring Management Central Connections for Firewall Environments iseries Configuring Management Central Connections for Firewall Enironments iseries Configuring Management Central Connections for Firewall Enironments Copyright International Business Machines Corporation

More information

Technology Mapping Targeting Routing Congestion under Delay Constraints

Technology Mapping Targeting Routing Congestion under Delay Constraints 1 Technology Mapping Targeting Routing Congestion under Delay Constraints Rupesh S. Shelar, Member, IEEE, Prashant Saxena, and Sachin S. Sapatnekar, Fellow, IEEE Abstract Routing congestion has become

More information

Virtual Backbone Construction for Cognitive Radio Networks without Common Control Channel

Virtual Backbone Construction for Cognitive Radio Networks without Common Control Channel Virtual Backbone Construction for Cognitie Radio Networks without Common Control Channel Ying Dai, Jie Wu, and ChunSheng Xin Department of Computer and Information Sciences, Temple Uniersity, Philadelphia,

More information

2009 Conference for Visual Media Production

2009 Conference for Visual Media Production 009 Conference for Visual Media Production COECTIG SHAPESS VAIATIOS I STEEO IMAGE PAIS C. Doutre and P. asiopoulos Departement of Electrical and Computer gineering Uniersity of British Columbia, Vancouer,

More information

IBM Netcool Operations Insight Version 1 Release 4.1. Integration Guide IBM SC

IBM Netcool Operations Insight Version 1 Release 4.1. Integration Guide IBM SC IBM Netcool Operations Insight Version 1 Release 4.1 Integration Guide IBM SC27-8601-08 Note Before using this information and the product it supports, read the information in Notices on page 403. This

More information

IBM Tivoli Storage Manager for Virtual Environments Version Data Protection for VMware Installation Guide IBM

IBM Tivoli Storage Manager for Virtual Environments Version Data Protection for VMware Installation Guide IBM IBM Tioli Storage Manager for Virtual Enironments Version 7.1.6 Data Protection for VMware Installation Guide IBM IBM Tioli Storage Manager for Virtual Enironments Version 7.1.6 Data Protection for VMware

More information

Managed Dynamic VPN Service: Core Capacity Sharing Schemes For Improved VPN Performance

Managed Dynamic VPN Service: Core Capacity Sharing Schemes For Improved VPN Performance This full tet paper was peer reiewed at the direction of IEEE Communications Society subject matter eperts for publication in the ICC 2007 proceedings. Managed Dynamic VPN Serice: Core Capacity Sharing

More information

TSF: Trajectory-based Statistical Forwarding for Infrastructure-to-Vehicle Data Delivery in Vehicular Networks

TSF: Trajectory-based Statistical Forwarding for Infrastructure-to-Vehicle Data Delivery in Vehicular Networks : Trajectory-based Statistical Forwarding for Infrastructure-to-Vehicle Data Deliery in Vehicular Networks Jaehoon Jeong, Shuo Guo, Yu Gu, Tian He and Daid H.C. Du Department of Computer Science & Engineering,

More information

Registration Authority Desktop Guide

Registration Authority Desktop Guide IBM SecureWay Trust Authority Registration Authority Desktop Guide Version 3 Release 1.1 SH09-4530-01 IBM SecureWay Trust Authority Registration Authority Desktop Guide Version 3 Release 1.1 SH09-4530-01

More information

A SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang 2, a, Lu Wang 2

A SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang 2, a, Lu Wang 2 5th International Conference on Information Engineering for Mechanics and Materials (ICIMM 2015) A SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang

More information

IBM Security Access Manager Version Appliance administration topics

IBM Security Access Manager Version Appliance administration topics IBM Security Access Manager Version 8.0.0.5 Appliance administration topics IBM Security Access Manager Version 8.0.0.5 Appliance administration topics ii IBM Security Access Manager Version 8.0.0.5:

More information

A Modified Tabu Search Algorithm to Solve Vehicle Routing Problem

A Modified Tabu Search Algorithm to Solve Vehicle Routing Problem Journal of Computers Vol. 29 No. 3, 2018, pp. 197-209 doi:10.3966/199115992018062903019 A Modified Tabu Search Algorithm to Sole Vehicle Routing Problem Qinhong Fu 1, Kang Zhou 1*, Huaqing Qi 2, Falin

More information

Maximizing the Lifetime of Dominating Sets

Maximizing the Lifetime of Dominating Sets Maximizing the Lifetime of Dominating Sets Thomas Moscibroda and Roger Wattenhofer {moscitho, wattenhofer}@tik.ee.ethz.ch Computer Engineering and Networks Laboratory, ETH Zurich 892 Zurich, Switzerland

More information

Ensuring Catalog and Control Data Set Integrity

Ensuring Catalog and Control Data Set Integrity white paper Ensuring Catalog and Control Data Set Integrity Part I: Catalog Integrity Ensuring Catalog and Control Data Set Integrity Part 1: Catalog Integrity A White Paper by Rocket Software Version

More information

On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks

On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks Akshaye Dhawan Georgia State University Atlanta, Ga 30303 akshaye@cs.gsu.edu Abstract A key challenge in Wireless

More information

Resource analysis of network virtualization through user and network

Resource analysis of network virtualization through user and network Resource analysis of network virtualization through user and network P.N.V.VAMSI LALA, Cloud Computing, Master of Technology, SRM University, Potheri. Mr.k.Venkatesh, Asst.Professor (Sr.G), Information

More information

Evaluating Allocation Paradigms for Multi-Objective Adaptive Provisioning in Virtualized Networks

Evaluating Allocation Paradigms for Multi-Objective Adaptive Provisioning in Virtualized Networks Evaluating Allocation Paradigms for Multi-Objective Adaptive Provisioning in Virtualized Networks Rafael Pereira Esteves, Lisandro Zambenedetti Granville, Mohamed Faten Zhani, Raouf Boutaba Institute of

More information

IBM Initiate Web Reports. User's Guide. Version9Release7 SC

IBM Initiate Web Reports. User's Guide. Version9Release7 SC IBM Initiate Web Reports User's Guide Version9Release7 SC19-3142-04 IBM Initiate Web Reports User's Guide Version9Release7 SC19-3142-04 Note Before using this information and the product that it supports,

More information

IBM i Version 7.2. Connecting to IBM i IBM i Access for Web IBM

IBM i Version 7.2. Connecting to IBM i IBM i Access for Web IBM IBM i Version 7.2 Connecting to IBM i IBM i Access for Web IBM IBM i Version 7.2 Connecting to IBM i IBM i Access for Web IBM Note Before using this information and the product it supports, read the information

More information

Chongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation.

Chongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation. 2016 International Conference on Computer, Mechatronics and Electronic Engineering (CMEE 2016) ISBN: 978-1-60595-406-6 The Data Aggregation Privacy Protection Algorithm of Body Area Network Based on Data

More information

Memory Hierarchy. Reading. Sections 5.1, 5.2, 5.3, 5.4, 5.8 (some elements), 5.9 (2) Lecture notes from MKP, H. H. Lee and S.

Memory Hierarchy. Reading. Sections 5.1, 5.2, 5.3, 5.4, 5.8 (some elements), 5.9 (2) Lecture notes from MKP, H. H. Lee and S. Memory Hierarchy Lecture notes from MKP, H. H. Lee and S. Yalamanchili Sections 5.1, 5.2, 5.3, 5.4, 5.8 (some elements), 5.9 Reading (2) 1 SRAM: Value is stored on a pair of inerting gates Very fast but

More information

IBM i Version 7.2. Service and support IBM

IBM i Version 7.2. Service and support IBM IBM i Version 7.2 Serice and support IBM IBM i Version 7.2 Serice and support IBM Note Before using this information and the product it supports, read the information in Notices on page 71. This document

More information

IBM Tivoli Storage Manager for Windows Version 7.1. Installation Guide

IBM Tivoli Storage Manager for Windows Version 7.1. Installation Guide IBM Tioli Storage Manager for Windows Version 7.1 Installation Guide IBM Tioli Storage Manager for Windows Version 7.1 Installation Guide Note: Before using this information and the product it supports,

More information

Topology-Awareness and Reoptimization Mechanism for Virtual Network Embedding

Topology-Awareness and Reoptimization Mechanism for Virtual Network Embedding Topology-Awareness and Reoptimization Mechanism for Virtual Network Embedding Nabeel Farooq Butt 1, Mosharaf Chowdhury 2, and Raouf Boutaba 13 1 David R. Cheriton School of Computer Science University

More information

Trust-Based Recommendation: an Empirical Analysis

Trust-Based Recommendation: an Empirical Analysis rust-based Recommendation: an Empirical Analysis Daire O Doherty Uniersite catholique de Louain 1348 Louain-La-Neue, Belgium daire.odoherty@student.uclouain.be Salim Jouili EURA NOVA Rue Emile Francqui,

More information

International Journal of Multidisciplinary Research and Modern Education (IJMRME) Impact Factor: 6.725, ISSN (Online):

International Journal of Multidisciplinary Research and Modern Education (IJMRME) Impact Factor: 6.725, ISSN (Online): COMPUTER REPRESENTATION OF GRAPHS USING BINARY LOGIC CODES IN DISCRETE MATHEMATICS S. Geetha* & Dr. S. Jayakumar** * Assistant Professor, Department of Mathematics, Bon Secours College for Women, Villar

More information

Tivoli Monitoring: Windows OS Agent

Tivoli Monitoring: Windows OS Agent Tioli Monitoring: Windows OS Agent Version 6.2.2 User s Guide SC32-9445-03 Tioli Monitoring: Windows OS Agent Version 6.2.2 User s Guide SC32-9445-03 Note Before using this information and the product

More information

Installing and Configuring Tivoli Enterprise Data Warehouse

Installing and Configuring Tivoli Enterprise Data Warehouse Installing and Configuring Tioli Enterprise Data Warehouse Version 1 Release 1 GC32-0744-00 Installing and Configuring Tioli Enterprise Data Warehouse Version 1 Release 1 GC32-0744-00 Installing and Configuring

More information

Load Stabilization and Minimization of Handover Delay in IEEE802.16

Load Stabilization and Minimization of Handover Delay in IEEE802.16 Load Stabilization and Minimization of Handoer Delay in IEEE802.16 Anil Sangwan. Assistant Professor, Electronics and Communication, Uniersity Institute of Engineering and Technology, Maharshi Dayanand

More information

THE RESEARCH ON LPA ALGORITHM AND ITS IMPROVEMENT BASED ON PARTIAL INFORMATION

THE RESEARCH ON LPA ALGORITHM AND ITS IMPROVEMENT BASED ON PARTIAL INFORMATION THE RESEARCH O LPA ALGORITHM AD ITS IMPROVEMET BASED O PARTIAL IFORMATIO 1 SHEG XI 1 School of Finance, Shandong Polytechnic Uniersity, Jinan, 250353 China ABSTRACT With the growing expansion of data size,

More information

Solutions for SAP Systems Using IBM DB2 for IBM z/os

Solutions for SAP Systems Using IBM DB2 for IBM z/os Rocket Mainstar Solutions for SAP Systems Using IBM DB2 for IBM z/os white paper Rocket Mainstar Solutions for SAP Systems Using IBM DB2 for IBM z/os A White Paper by Rocket Software Version 1.4 Reised

More information

Motion Compensated Frame Interpolation Using Motion Vector Refinement with Low Complexity

Motion Compensated Frame Interpolation Using Motion Vector Refinement with Low Complexity Motion Compensated Frame Interpolation Using Motion Vector Refinement with Low Complexity Jun-Geon Kim and Daeho Lee Abstract-- In this paper, we propose a noel method of motion compensated frame interpolation

More information

On Local Approximation of Minimum-Latency Broadcast Scheduling in 3D MANETs

On Local Approximation of Minimum-Latency Broadcast Scheduling in 3D MANETs On Local Approximation of Minimum-Latency Broadcast Scheduling in 3D MANETs Yilin Shen, Ying Xuan, My T. Thai CISE Dept, Uniersity of Florida, Email: {yshen, yxuan, mythai}@cise.ufl.edu Abstract Minimum-latency

More information

Modification Semantics in Now-Relative Databases

Modification Semantics in Now-Relative Databases Modification Semantics in Now-Relatie Databases Kristian Torp Christian S. Jensen Richard T. Snodgrass February 5, 00 Abstract Most real-world databases record time-arying information. In such databases,

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

All Rights Reserved 2017 IJARCET

All Rights Reserved 2017 IJARCET END-TO-END DELAY WITH MARKOVIAN QUEUING BASED OPTIMUM ROUTE ALLOCATION FOR MANETs S. Sudha, Research Scholar Mrs. V.S.LAVANYA M.Sc(IT)., M.C.A., M.Phil., Assistant Professor, Department of Computer Science,

More information

High Availability Guide for Distributed Systems

High Availability Guide for Distributed Systems IBM Tioli Monitoring Version 6.2.3 Fix Pack 1 High Aailability Guide for Distributed Systems SC23-9768-03 IBM Tioli Monitoring Version 6.2.3 Fix Pack 1 High Aailability Guide for Distributed Systems SC23-9768-03

More information

IBM InfoSphere Data Replication for VSAM for z/os Version 11 Release 3. Guide and Reference

IBM InfoSphere Data Replication for VSAM for z/os Version 11 Release 3. Guide and Reference IBM InfoSphere Data Replication for VSAM for z/os Version 11 Release 3 Guide and Reference IBM InfoSphere Data Replication for VSAM for z/os Version 11 Release 3 Guide and Reference Note Before using

More information

Topology-aware Virtual Network Embedding Using Multiple Characteristics

Topology-aware Virtual Network Embedding Using Multiple Characteristics KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 8, NO. 1, Jan. 2014 145 Topology-aware Virtual Network Embedding Using Multiple Characteristics Jianxin Liao 1*, Min Feng 1, Tonghong Li 2, Jingyu

More information

Compatible Class Encoding in Roth-Karp Decomposition for Two-Output LUT Architecture

Compatible Class Encoding in Roth-Karp Decomposition for Two-Output LUT Architecture Compatible Class Encoding in Roth-Karp Decomposition for Two-Output LUT Architecture Juinn-Dar Huang, Jing-Yang Jou and Wen-Zen Shen Department of Electronics Engineering, National Chiao Tung Uniersity,

More information

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng

More information

Connectivity-aware Virtual Network Embedding

Connectivity-aware Virtual Network Embedding Connectivity-aware Virtual Network Embedding Nashid Shahriar, Reaz Ahmed, Shihabur R. Chowdhury, Md Mashrur Alam Khan, Raouf Boutaba Jeebak Mitra, Feng Zeng Outline Survivability in Virtual Network Embedding

More information

A Multicast Routing Algorithm for 3D Network-on-Chip in Chip Multi-Processors

A Multicast Routing Algorithm for 3D Network-on-Chip in Chip Multi-Processors Proceedings of the World Congress on Engineering 2018 ol I A Routing Algorithm for 3 Network-on-Chip in Chip Multi-Processors Rui Ben, Fen Ge, intian Tong, Ning Wu, ing hang, and Fang hou Abstract communication

More information

A Two-phase Distributed Training Algorithm for Linear SVM in WSN

A Two-phase Distributed Training Algorithm for Linear SVM in WSN Proceedings of the World Congress on Electrical Engineering and Computer Systems and Science (EECSS 015) Barcelona, Spain July 13-14, 015 Paper o. 30 A wo-phase Distributed raining Algorithm for Linear

More information

IBM Interact Version 9 Release 0 May 31, User's Guide

IBM Interact Version 9 Release 0 May 31, User's Guide IBM Interact Version 9 Release 0 May 31, 2013 User's Guide Note Before using this information and the product it supports, read the information in Notices on page 97. This edition applies to ersion 9,

More information

IBM Cloud Orchestrator Version Content Development Guide IBM

IBM Cloud Orchestrator Version Content Development Guide IBM IBM Cloud Orchestrator Version 2.5.0.8 Content Deelopment Guide IBM Note Before using this information and the product it supports, read the information in Notices. This edition applies to ersion 2, release

More information

Capacitated Vehicle Routing Problem Solving using Adaptive Sweep and Velocity Tentative PSO

Capacitated Vehicle Routing Problem Solving using Adaptive Sweep and Velocity Tentative PSO (IJACSA) International Journal of Adanced Computer Science and Applications, Capacitated Vehicle Routing Problem Soling using Adaptie Sweep and Velocity Tentatie PSO M. A. H. Akhand, Zahrul Jannat Peya

More information

Modification Semantics in Now-Relative Databases

Modification Semantics in Now-Relative Databases 5 Modification Semantics in Now-Relatie Databases Kristian Torp, Christian S. Jensen, and Richard T. Snodgrass Most real-world databases record time-arying information. In such databases, the notion of

More information

IBM. Basic system operations. System i. Version 6 Release 1

IBM. Basic system operations. System i. Version 6 Release 1 IBM System i Basic system operations Version 6 Release 1 IBM System i Basic system operations Version 6 Release 1 Note Before using this information and the product it supports, read the information in

More information

A Novel Performance Metric for Virtual Network Embedding Combining Aspects of Blocking Probability and Embedding Cost

A Novel Performance Metric for Virtual Network Embedding Combining Aspects of Blocking Probability and Embedding Cost A Novel Performance Metric for Virtual Network Embedding Combining Aspects of Blocking Probability and Embedding Cost Enrique Dávalos 1 and Benjamín Barán Universidad Nacional de Asunción, Facultad Politécnica

More information

IBM Tivoli Storage Manager Version Optimizing Performance IBM

IBM Tivoli Storage Manager Version Optimizing Performance IBM IBM Tioli Storage Manager Version 7.1.6 Optimizing Performance IBM IBM Tioli Storage Manager Version 7.1.6 Optimizing Performance IBM Note: Before you use this information and the product it supports,

More information

IBM Tealeaf cximpact Version 9 December 4, Tealeaf Reporting Guide

IBM Tealeaf cximpact Version 9 December 4, Tealeaf Reporting Guide IBM Tealeaf cximpact Version 9 December 4, 2014 Tealeaf Reporting Guide Note Before using this information and the product it supports, read the information in Notices on page 175. This edition applies

More information

Source Routing Algorithms for Networks with Advance Reservations

Source Routing Algorithms for Networks with Advance Reservations Source Routing Algorithms for Networks with Advance Reservations Lars-Olof Burchard Communication and Operating Systems Technische Universitaet Berlin ISSN 1436-9915 No. 2003-3 February, 2003 Abstract

More information

A New Approach to Ant Colony to Load Balancing in Cloud Computing Environment

A New Approach to Ant Colony to Load Balancing in Cloud Computing Environment A New Approach to Ant Colony to Load Balancing in Cloud Computing Environment Hamid Mehdi Department of Computer Engineering, Andimeshk Branch, Islamic Azad University, Andimeshk, Iran Hamidmehdi@gmail.com

More information

IBM. Connecting to IBM i IBM i Access for Web. IBM i 7.1

IBM. Connecting to IBM i IBM i Access for Web. IBM i 7.1 IBM IBM i Connecting to IBM i IBM i Access for Web 7.1 IBM IBM i Connecting to IBM i IBM i Access for Web 7.1 Note Before using this information and the product it supports, read the information in Notices,

More information

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks

Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks , March 12-14, 2014, Hong Kong Message Transmission with User Grouping for Improving Transmission Efficiency and Reliability in Mobile Social Networks Takuro Yamamoto, Takuji Tachibana, Abstract Recently,

More information

Opportunistic Bandwidth Sharing for Virtual Network Mapping

Opportunistic Bandwidth Sharing for Virtual Network Mapping Opportunistic Bandwidth Sharing for Virtual Network Mapping Sheng Zhang, Zhuzhong Qian, Bin Tang, Jie Wu, and Sanglu Lu State Key Lab. for Novel Software Technology, Nanjing University, China Department

More information

Selective Refinement Of Progressive Meshes Using Vertex Hierarchies

Selective Refinement Of Progressive Meshes Using Vertex Hierarchies Selectie Refinement Of Progressie Meshes Using Vertex Hierarchies Yigang Wanga, Bernd Fröhlichb and Martin Göbelc a,c Fraunhofer-Institut für Medienkommunication, Germany b Bauhaus-Uniersität Weimar, Germany

More information

Discovery of BGP MPLS VPNs

Discovery of BGP MPLS VPNs Discoery of BGP MPLS VPNs Sarit Mukherjee, Tejas Naik, Sampath Rangarajan Center for Networking Research Bell Labs, Holmdel, NJ sarit@bell-labs.com, {tnaik, sampath}@research.bell-labs.com Abstract. BGP/MPLS

More information

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and

More information

IBM Unica Detect Version 8 Release 5 October 26, Administrator's Guide

IBM Unica Detect Version 8 Release 5 October 26, Administrator's Guide IBM Unica Detect Version 8 Release 5 October 26, 2011 Administrator's Guide Note Before using this information and the product it supports, read the information in Notices on page 175. This edition applies

More information

Verifying Keys through Publicity and Communities of Trust " Eric Osterweil! Dan Massey! Danny McPherson! Lixia Zhang!

Verifying Keys through Publicity and Communities of Trust  Eric Osterweil! Dan Massey! Danny McPherson! Lixia Zhang! Verifying Keys through Publicity and Communities of Trust " Eric Osterweil! Dan Massey! Danny McPherson! Lixia Zhang! DNSSEC: Security for a Core Internet System" DNS is a staple of today s online actiities!

More information

Triangulated Views Selection for Image-based Walkthrough

Triangulated Views Selection for Image-based Walkthrough Proceedings of the International MultiConference of Engineers and Computer Scientists 009 Vol I IMECS 009, March 8-0, 009, Hong Kong Triangulated Views Selection for Image-based Walkthrough Chang Ok Yun,

More information

An Improved k-nearest Neighbor Classification Algorithm Using Shared Nearest Neighbor Similarity

An Improved k-nearest Neighbor Classification Algorithm Using Shared Nearest Neighbor Similarity ging, 26(3), p.p.405-421. 10. D. Adalsteinsson, J. A. Sethian (1999) The Fast Construction of Extension Velocities in Leel Set Methods. Journal of Computational Physics, 148, p.p.2-22. Information technologies

More information

IBM Unica Distributed Marketing Version 8 Release 6 May 25, Field Marketer's Guide

IBM Unica Distributed Marketing Version 8 Release 6 May 25, Field Marketer's Guide IBM Unica Distributed Marketing Version 8 Release 6 May 25, 2012 Field Marketer's Guide Note Before using this information and the product it supports, read the information in Notices on page 83. This

More information

WebSphere Message Broker ESQL

WebSphere Message Broker ESQL WebSphere Message Broker ESQL Version 6 Release 0 WebSphere Message Broker ESQL Version 6 Release 0 Note Before using this information and the product it supports, read the information in the Notices

More information

Intelligent Load Balancing Approach for Cognitive Radio Networks

Intelligent Load Balancing Approach for Cognitive Radio Networks Intelligent Load Balancing Approach for Cognitive Radio Networks 1 Ravneet Kaur, 2 Er.Vimmi Malhotra 1 Student, M.Tech CSE, 2 Assistant Professor, Dept. of CSE, 1 ravneetkaur0013@gmail.com, 2 malhotra.vimmi22@gmail.com

More information

IBM Tivoli Monitoring for Virtual Environments: Dashboard, Reporting, and Capacity Planning Version 7.1 Fix Pack 1. User s Guide SC

IBM Tivoli Monitoring for Virtual Environments: Dashboard, Reporting, and Capacity Planning Version 7.1 Fix Pack 1. User s Guide SC IBM Tioli Monitoring for Virtual Enironments: Dashboard, Reporting, and Capacity Planning Version 7.1 Fix Pack 1 User s Guide SC14-7493-01 IBM Tioli Monitoring for Virtual Enironments: Dashboard, Reporting,

More information

IBM License Metric Tool 9.2.x. Scalability Guide. Version 2 IBM

IBM License Metric Tool 9.2.x. Scalability Guide. Version 2 IBM IBM License Metric Tool 9.2.x Scalability Guide Version 2 IBM IBM License Metric Tool 9.2.x Scalability Guide Version 2 IBM Scalability Guide This edition applies to ersion 9.2.x of License Metric Tool

More information