Resource Allocation for QoS Provisioning in Wireless Ad Hoc Networks

Size: px
Start display at page:

Download "Resource Allocation for QoS Provisioning in Wireless Ad Hoc Networks"

Transcription

1 Resource Allocation for QoS Provisioning in Wireless Ad Hoc Networks Mung Chiang, Daniel ONeill, David Julian andstehenboyd Electrical Engineering Deartment Stanford University, CA 94305, USA Abstract- For wireless ad hoc networks with multiho transmissions and Rayleigh fading, this aer maximizes the overall system throughut subect to QoS constraints on ower, robability of outage, and data rates. Formulations are also given which minimize delay and otimize network resources in a wireless ad hoc network, where each link is shared by multile streams of traffic from different QoS classes, and each traffic traverses many links. Although these otimal resource allocation roblems are non-linear, they can be osed as geometric rograms, which are transformed into convex otimizations, and can be solved globally and efficiently through interior-oint methods. I. Introduction Quality of service (QoS) has become amortant issue in various kinds of data networks as some users are no longer satisfied with resource allocation based on service rovisioning. Three maor considerations of QoS suort are bandwidth, delay and delivery guarantee. Voice, data, image, and video have different bandwidth requirements. Some classes of traffic, such as voice, are also much more sensitive to delay than background classes, such as data. QoS rovisioning in a wireless network is a articularly difficult issue because hysical layer roblems; such as ath loss, fading, and multiath; can make the communication links unreliable. This makes delivery guarantee a necessary feature in wireless ad hoc network QoS rovisioning. The challenge is to first rescribe a feasible QoS scheme for different classes of traffic, and then to otimize the use of network resources, mainly link caacities and transmitter owers, to satisfy QoS requirements for all classes while maximizing either the total network erformance, or the QoS for the remier class. Within the wireless arena, ad hoc wireless networks ose additional technical challenges for QoS suort. Unlike cellular wireless networks, ad hoc networks have no fixed infrastructure, and long range communications require multiho transmissions where a acket is routed through the network by other transceivers that act as relay nodes. In sections 3 and 4, the following resource allocation roblems for QoS rovisioning in wireless ad hoc networks are solved: This work was suorted by Hertz Foundation Fellowshi and Stanford Graduate Fellowshi. This work was suorted by NSF Grant CCR and the Stanford Network Research Center. P As a secial case of resource allocation, the ower control of user nodes are otimized to maximize the overall system throughut. P Turning to the general cases, feasibility of service level agreement (SLA) terms are determined under network resource constraints. P 3 Taking delay into consideration, the total delay for the most time sensitive class of traffic is minimized by otimizing over owers, caacities, and SLA terms. P 4 Otimizing over owers, caacities, and SLA terms; the unused caacity of the network is maximized. Because the mobile radio channel is fast varying and the number of user nodes is large, a fast and robust decision making algorithm is needed that accommodates a large number of variables for dynamic resource allocation to be feasible. Several ad hoc heuristics have been roosed to tackle the above roblem, but they cannot meet all of the following criteria: otimality, seed, and the ability to accommodate a variety of constraints and a large number of variables. Solutions for wireless cellular networks have been roosed in []. This aer tackles the more difficult roblems of resource allocation for wireless ad hoc networks. A global solution to non-linear roblems P top4is found by transforming the roblems into convex otimization roblems. Solution methods for these roblems not only roduce globally otimal solutions as efficiently as for linear rograms, but also unambiguously determine feasibility. This second roerty is used to determine the feasibility and ricing scheme of admitting a new user with a defined QoS requirement. II. Convex otimization and geometric rogramming An efficient algorithm is needed in order to find the otimal solution to the above nonlinear roblems in a high seed dynamic network with a large number of links and nodes. Formulations for P top4 are rovided that can be turned into convex otimizations, which have fast algorithms, such as the interior oint method and the rimal dual method, that make them as easy to solve as linear rograms. Convex otimization refers to minimizing a convex obective function over convex constraint sets. The articular tye of convex otimization used in this aer is in the form of geometric rogramming []. First consider the following definition Definition A monomial is a function h : R n R,where the domain contains all real vectors with ositive comonents: /0/$ IEEE 9

2 h(x) =cx a xa xan n, c 0 and a i R () A sum of monomials f(x) = c k kx a k x a k x a nk s called a osynomial. Geometric rogramming is an otimization roblem with the following form: minimize f 0(x) subect to f i(x) h (x) = where f 0 and f i are osynomials and h are monomials. Geometric rogramming in the above form is not a convex otimization roblem. However, with a change of variables: y i =logx i and b ik =logc ik, the geometric rogramming form is ut into convex form: minimize 0(y) = log k ex(at 0ky + b 0k ) subect to i(y) = log k ex(at iky + b ik ) 0 q (y) = a T y+b = 0 (3) It can be verified that the log of sum of exonentials is a convex function []. Therefore i are convex functions and q are affine functions, and the roblem is a convex otimization roblem. Note that if all osynomials are in fact monomials, geometric rogramming becomes linear rogramming. Convex otimization roblems can be solved globally and efficiently through interior oint and rimal dual methods [3], with running times that usually scale to the square root of the roblem size. These methods also offer duality interretations, stability analyses and accommodate a variety of constraints. This aer shows how geometric rogramming can solve many versions of QoS rovisioning roblems in wireless ad hoc networks. III. Power control for throughut otimization First a secial case of resource allocation otimizatios formulated and solved in this section. The variables are user node owers and the obective is to maximize the overall system throughut in bs. The method in this aer exlicitly takes into account the statistical variation of the received signal and the interference ower. A. Multi-ho network model and Rayleigh fading Consider a wireless ad hoc network with n transmitter/receiver airs, labeled,...,n, which transmit at owers P...,P n. The ower received from transmitter, at receiver i is given by () G if ip (4) The nonnegative number G i reresents the ath gain the absence of fading from the th transmitter to the i th receiver. G i can encomass ath loss, shadowing, antenna gain, coding gain, and other factors. The Rayleigh fading between each transmitter and receiver i is given by F i. TheF i s are assumed to be indeendent and have unit mean. The G i s are aroriately scaled to reflect variations from this assumtion. The distribution of the received ower between any air of transmitter and receiver i is exonential with mean value, E [G if ip ]=G ip (5) The signal to interference ratio (SIR) for user i determines the quality of the received signal and is defined as SIR i = P ig ii N i PGi + ni (6) Unlike SNR, SIR cannot be increased by simly increasing all users transmitting owers since that would raise both the signal level and the interference level. This introduces a bit error floor and a QoS bottleneck. B. Outage robability and system throughut An outage is declared when the received SIR falls below a given threshold defined as SIR th, often comuted from a BER requirement. The outage robability associated with the i th ho is given by O i = Pr(SIR i SIR th ) = Pr(G iif iip i SIR th k i G ikf ik P k ) The outage robability can be exressed as [4] O i = k i (7) + SIR th G ik P k (8) Outage robability over a ho induces an outage robability over a ath S O aths = Prob(outage along the ath S) = ( Oi) s S =. (9) s S k s (+ SIR th G ik P k ) The constellation size M used by a ho can be closely aroximated for MQAM modulation as follows M =+.5 SIR (0) ln(5ber) where BER is the bit error rate. Defining K =.5 ln(5ber) leads to a monotonic exression for the data rate of the i th ho as a function of the received SIR: R i =(/T )log ( + KSIR i) () The aggregate data rate for the system can then be written simly as the sum of terms of this form. R system = i Ri =(/T )log ( + KSIRi) () Overall system throughut is defined as the maximum aggregate data rate suortable by the system given a set of users with defined QoS. i 9

3 C. Throughut otimization B Theorem (Otimize ower for throughut maximization) The following roblem of otimizing user node owers to maximize total network throughut is a convex otimization roblem. A D 0m maximize subect to R system 3 4 C R i R i,lb, i Pr k i + SIR th G ik P outi i k Pr s S k s out ath s S (+ SIR th G ik P k ) P i P max (3) The obective functios the overall system throughut. It is otimized over the set of all feasible owers P i. The first set of constraints are the data rates demanded by existing system users. The second set of constraints are the outage robability limitations demanded by users using single hos. The third set of constraints are the outage robability limitations for users using a multi-ho ath. Lastly, the forth set of constraints are regulatory or system limitations on transmitter owers. D. Simulation A simle four node multi-ho network is considered in the following simulation. As shown figure, the network consists of 4 nodes A, B, C, and D, and 4 links,, 3, and 4. On link node A is the transmitter and node B is the receiver; similarly, the transmitter and receiver nodes for each link are shown the figure. Note that node A is also the transmitter on link 3, illustrating that a node can be a transmitter and/or receiver on many links. Nodes A and D as well as B and C are searated by a distance of 0m. By geometry the distance of each transmit ath is 0 m. For this simulation each link has a maximum transmit ower of W. Alternatively, the ower constraint could be laced on each node instead of each link by adding a constraint that P + P 3 W. All nodes are using MQAM modulation. The baseband bandwidth for each link is 0kHz, the minimum data rate for each link is 00bs for maintenance data, and the target BER is 0 3. For the Rayleigh fading a robability of outage of P out =0. is required for an SIR threshold of 0dB. [ The gains for each link are comuted as G i = ] 4 00 d for i, andg ii = [ 4, d] with the excetion of G and G 34 which are set equal to 0 since it is assumed that a node does not transmit and receive at the same time. The factor of 00 can be viewed as the sreading gain a CDMA system, or the ower falloff with frequency in a FDMA system. This gives the following gain matrix: G = (4) 0m Fig. : Network Toology for Simulation The maximum aggregate data rate, found using the geometric rogramming otimization method, is R = 6.8kbs, with M =4.8QAM modulation for each link, R i =54.kbs for each link, and P = P 3 =0.709W and P = P 4 =W link transmit owers. The resulting SIR =.7dB on each link. The symmetry in modulation levels and SIR is due to the symmetries in the network toology, and not due to any exlicit otimization constraint. E. Admission control and ricing The methodology used in this section can also be extended for other resource management uroses in a wireless ad hoc network. For examle, a new user is admissible if his QoS requirements can be suorted by the system without disturbing the existing QoS requirements of current users. In this model a user is admissible if a feasible solution of the roblem in Theorem exists after the new user s QoS constraints have been added. Anfeasible solutios a definitive statement that this new user may not be added to the system without a change in required QoS. Our model also suorts several service-ricing aroaches. The decrease in the overall system throughut associated with a new user can be used to estimate the incremental cost of suorting that new user, and should be roortional to the rice that might be charged. A second aroach is to calculate the effect of different levels of QoS for a given data rate. The effect on overall system throughut for each of the chosen different levels of QoS can then be used to set relative ricing for these levels. One examle is to set ricing as a function of robability of outage for a given data rate. IV. Resource allocation for delay and efficiency otimization The more general cases of resource allocation are formulated and solved in this section. Otimization variables include owers, the number of ackets in each traffic, bandwidth, delay and delivery guarantee required for each QoS class, and caacity for each link. Potential obective criteria include delay, unused caacity and SLA feasibility, in addition to the overall system throughut in the last section. A. Problem formulations 93

4 Consider a network with J links with caacity of C ackets er second for each link. There are K classes of traffic with different QoS requirements to be transorted over the network. For each QoS class k, the bandwidth required is b k Hz, and the delay guarantee in the service level agreement (SLA) is d k,ub seconds. Also, a minimum robability of delivering the acket across the unreliable network is required in the SLA, denoted by k,lb. In this roblem formulation the delay is the delay due to transmission time; roagation delay is ignored because it is constant for the otimization arameters. The more refined model with queueing delay is treated in the extension. Similar to the last section, each stream of traffic from source s to destination d will traverse certain secific links as dictated by the articular routing rotocol used for the network. Denote by K the set of traffic using link and by J k the set of links traversed by QoS class k. Denote by n k the number of ackets dynamically admitted in the k th class of traffic. In an ad hoc network each link may fail due to either ower shut down of a user or dee fading that causes an outage. Therefore, a real number between 0 and, is attached to each link as the robability that this link will be maintained during the transmission. By increasing transmitter ower over a link while keeing other arameters of the network constant, SIR of link and therefore can be increased. As will be shown the following roblem formulations, with the above constraints on link caacity, bandwidth requirement, delay, and delivery robability guarantees, the roblem is not a linear rogramming roblem. However, these nonlinear otimizations can be turned into geometric rogramming roblems and solved as efficiently as linear rograms. The first formulatios the following. constraint, the second one is the delay guarantee constraint and the third one the delivery robability constraint. The fourth constraint delivers a guaranteed data rate to each class of traffic. The fifth constraint makes room for SLA terms that give a class of traffic the sole right to traverse a link.this could be for bandwidth requirements or for security reasons. The sixth constraint allows for SLA terms that secify not ust an end to end total delay guarantee, but also an exact delay requirement for a articular traffic class k on a link. The other constraints are ositivity constraints on the variables, and uer bound constraints on. The following arameters are all otential otimization variables: b k,n k,,c,d k,ub and k,lb. Variables b k,d k,ub and k,lb are terms in the SLA. The link caacities C and robability of maintaining a link are network resources to be otimized over. Admission control is reflected in n k. The formulatios a non-linear otimization roblem because otimization variables are multilied together, such as b k n k in the first constraint or the roduct of in the third constraint, and aear in the denominator, such as C in the second and sixth constraints. However, all the inequality constraints are in osynomial form and all the equality constraints are in monomial form. In the second formulation, the unused caacity of a articular link 0 is maximized. The link may be a bottleneck link, or the most often traversed link in the network. [5]. Theorem 3 (Unused caacity maximization) The following roblem of maximizing the unused caacity under SLA and network constraints is a convex otimization roblem. Theorem (SLA feasibility under network constraints) The following roblem of testing SLA feasibility is a convex otimization roblem. minimize subect to No Obective Function b, ( ) i K J k C J k b k = C C = d k,,ub b k,c,,d k,ub, k,lb 0 (5) No obective functios necessary since in this formulation only the feasibility of the SLA terms,d k,ub and k,lb is being tested. Alternatively, a cost function as the obective function could be used for relative ricing during admission control. Note that the first constraint is the link caacity maximize subect to C 0 k K 0 b k n k b, ( ) i K J k C J k b k = C C = d k,,ub b k,c,,d k,ub, k,lb 0 (6) The obective functios to maximize unused caacity of a link 0 by keeing the used caacity to the minimum under all network and QoS constraints. The constraints are the same as in Theorem. In the third formulation, the total delay for a articular class of traffic is minimized. Theorem 4 (Delay Minimization) Delay minimization under SLA and network constraints is a convex otimization roblem. 94

5 minimize subect to ( i K ) J k0 C + α C b, ( ) i K J k C J k b k = C C = d k,,ub b k,c,,d k,ub, k,lb 0 (7) Where α is the marginal tradeoff of caacity for delay. By increasing caacities available on each link at the relative cost α through bandwidth allocation or bandwidth leasing, delay of the most time sensitive QoS class can be decreased. Therefore, a weighted sum, arametrized by α, of the remier QoS class s delay and the cost of caacity rovisioning is maximized. B. Simulation The following is a simulation for Theorem 4, which investigates the tradeoff between delay and cost of caacity. For the network in Fig. there are three classes of traffic. The first class is audio data traffic sent along ath ABCD requiring a rate of 50 ackets/second and a maximum delay of 0. seconds. The second class is also audio data traffic sent along ath DFEA with the same rate and delay requirements. The third class of traffic is video data sent along ath ABFD with a rate requirement of 50 ackets/second. The goal is to minimize both the delay of the video data and the cost of caacity that must be rovisioned or leased. This is accomlished by minimizing a weighted sum of the video data delay and the total caacity used subect to meeting the rate constraints on all traffic classes, and the delay constraints on the audio data traffic. For each α, the marginal tradeoff value between delay and caacity, Fig. 3 shows the minimum delay achievable for the video traffic given. The x-axis uses a log scale. The tradeoff curve shows that the minimum delay increases raidly with increasing cost of caacity until it reaches the delay associated with the minimum caacity required to suort the video signal; from that oint onwards the tradeoff curve is flat. C. Extensions Some extensions to Theorems to 4 include minimizing the maximum delay and accounting for queueing delay at the nodes. Minimizing the maximum delay can be accomlished by minimizing a dummy variable subect to all delays less than that dummy variable. Queueing delay in a store and forward network can also be accounted for in the geometric rogramming construction [5]. A 4 B E Fig. : Network Toology for Simulation Minimized Delay for Video Traffic α, seconds of delay er acket of caacity Fig. 3: Trade off between video traffic delay and caacity cost Imortant erformance metrics are otimized, such as throughut and delay, subect to a variety of realistic constraints on both SLA terms and network resources. This is done for wireless ad hoc networks with multiho transmissions, mutual interference, and intrinsic unreliability of links and nodes. Although these resource allocation otimizations are non-linear roblems, they can be solved efficiently using fast convex otimization algorithms. Acknowledgments We would like to thank Nicholas Bambos and Andrea Goldsmith for discussions of wireless network roblems. References [] D. Julian, M. Chiang and D. O Neill, Constrained ower control otimization for wireless cellular networks, to aear in IEEE Vehicular Technology Conference, Oct. 00. [] S. Boyd and L. Vandenberghe, Convex Otimization and Its Engineering Alications, Stanford University EE 364 Course Reader 999. [3] Yu. Nesterov and A. Nemirovsky, Interior Point Polynomial Methods in Convex Programming, SIAM 994. [4] S. Kandukuri and S. Boyd, Otimal ower control interference limited fading wireless channels with outage robability secifications. To aear IEEE JSAC, 00. [5] D. ONeill, D. Julian, M. Chiang and S. Boyd, Resource allocation otimization for QoS rovisioning in wireless cellular and ad hoc networks, Submitted to IEEE Transaction on Communication, 00. C F 3 6 D V. Summary 95

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

IN an ad hoc wireless network, where nodes are likely to

IN an ad hoc wireless network, where nodes are likely to 1432 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 10, OCTOBER 2006 Otimal Transmit Power in Wireless Sensor Networks Sooksan Panichaiboon, Student Member, IEEE, Gianluigi Ferrari, Member, IEEE, and

More information

An Efficient End-to-End QoS supporting Algorithm in NGN Using Optimal Flows and Measurement Feed-back for Ubiquitous and Distributed Applications

An Efficient End-to-End QoS supporting Algorithm in NGN Using Optimal Flows and Measurement Feed-back for Ubiquitous and Distributed Applications An Efficient End-to-End QoS suorting Algorithm in NGN Using Otimal Flows and Measurement Feed-back for Ubiquitous and Distributed Alications Se Youn Ban, Seong Gon Choi 2, Jun Kyun Choi Information and

More information

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture

More information

MP-DSM: A Distributed Cross Layer Network Control Protocol

MP-DSM: A Distributed Cross Layer Network Control Protocol MP-DSM: A Distributed Cross Layer Network Control Protocol Daniel C. O Neill, Yan Li, and Stephen Boyd Department of Electrical Engineering Stanford University dconeill, liyan, boyd@stanford.edu Abstract

More information

Convex Optimization of Output Link Scheduling and Active Queue Management in QoS Constrained Packet Switches

Convex Optimization of Output Link Scheduling and Active Queue Management in QoS Constrained Packet Switches Convex Optimization of Output Link Scheduling and Active Queue Management in QoS Constrained acket Switches Mung Chiang, Bernard L. F. Chan and Stephen Boyd lectrical ngineering Department, Stanford University,

More information

An Efficient Video Program Delivery algorithm in Tree Networks*

An Efficient Video Program Delivery algorithm in Tree Networks* 3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,

More information

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,

More information

EP2200 Performance analysis of Communication networks. Topic 3 Congestion and rate control

EP2200 Performance analysis of Communication networks. Topic 3 Congestion and rate control EP00 Performance analysis of Communication networks Toic 3 Congestion and rate control Congestion, rate and error control Lecture material: Bertsekas, Gallager, Data networks, 6.- I. Kay, Stochastic modeling,

More information

Source Coding and express these numbers in a binary system using M log

Source Coding and express these numbers in a binary system using M log Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is

More information

EDGE: A ROUTING ALGORITHM FOR MAXIMIZING THROUGHPUT AND MINIMIZING DELAY IN WIRELESS SENSOR NETWORKS

EDGE: A ROUTING ALGORITHM FOR MAXIMIZING THROUGHPUT AND MINIMIZING DELAY IN WIRELESS SENSOR NETWORKS EDGE: A ROUTING ALGORITHM FOR MAXIMIZING THROUGHPUT AND MINIMIZING DELAY IN WIRELESS SENSOR NETWORKS Shuang Li, Alvin Lim, Santosh Kulkarni and Cong Liu Auburn University, Comuter Science and Software

More information

Multicommodity Network Flow - Methods and Applications

Multicommodity Network Flow - Methods and Applications Multicommodity Network Flow - Methods and Alications Joe Lindström Linköing University joeli89@student.liu.se Abstract This survey describes the Multicommodity Network Flow roblem, a network flow roblem

More information

Randomized algorithms: Two examples and Yao s Minimax Principle

Randomized algorithms: Two examples and Yao s Minimax Principle Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum

More information

A Comprehensive Minimum Energy Routing Scheme for Wireless Ad hoc Networks

A Comprehensive Minimum Energy Routing Scheme for Wireless Ad hoc Networks A Comrehensive Minimum Energy Routing Scheme for Wireless Ad hoc Networks Jinhua Zhu, Chunming Qiao and Xin Wang Deartment of Comuter Science and Engineering State University of New York at Buffalo, Buffalo,

More information

Performance Incentives for Cooperation between Wireless Mesh Network Operators

Performance Incentives for Cooperation between Wireless Mesh Network Operators Performance Incentives for Cooeration between Wireless Mesh Network Oerators Xenofon Fafoutis and Vasilios A. Siris Institute of Comuter Science, Foundation for Research and Technology - Hellas (FORTH)

More information

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Journal of Comuting and Information Technology - CIT 8, 2000, 1, 1 12 1 Comlexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Eunice E. Santos Deartment of Electrical

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

Optimizing the Number of Fog Nodes for Cloud-Fog-Thing Networks

Optimizing the Number of Fog Nodes for Cloud-Fog-Thing Networks 1 Otimizing the Number of Fog Nodes for Cloud-Fog-Thing Networks Eren Balevi, and Richard D. Gitlin Deartment of Electrical Engineering, University of South Florida Tama, Florida 336, USA erenbalevi@mail.usf.edu,

More information

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu

More information

The Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks

The Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks The Scalability and Performance of Common Vector Solution to Generalized abel Continuity Constraint in Hybrid Otical/Pacet etwors Shujia Gong and Ban Jabbari {sgong, bjabbari}@gmuedu George Mason University

More information

TOPP Probing of Network Links with Large Independent Latencies

TOPP Probing of Network Links with Large Independent Latencies TOPP Probing of Network Links with Large Indeendent Latencies M. Hosseinour, M. J. Tunnicliffe Faculty of Comuting, Information ystems and Mathematics, Kingston University, Kingston-on-Thames, urrey, KT1

More information

Extracting Optimal Paths from Roadmaps for Motion Planning

Extracting Optimal Paths from Roadmaps for Motion Planning Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu

More information

Lecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.)

Lecture 3: Geometric Algorithms(Convex sets, Divide & Conquer Algo.) Advanced Algorithms Fall 2015 Lecture 3: Geometric Algorithms(Convex sets, Divide & Conuer Algo.) Faculty: K.R. Chowdhary : Professor of CS Disclaimer: These notes have not been subjected to the usual

More information

Cooperative Diversity Combined with Beamforming

Cooperative Diversity Combined with Beamforming Cooerative Diversity Combined with Beamforming Hyunwoo Choi and Jae Hong Lee School of Electrical Engineering and INMC Seoul National University Seoul, Korea Email: {novo28, jhlee}@snu.ac.kr Abstract In

More information

New Techniques for Making Transport Protocols Robust to Corruption-Based Loss

New Techniques for Making Transport Protocols Robust to Corruption-Based Loss New Techniques for Making Transort Protocols Robust to Corrution-Based Loss Wesley M. Eddy NASA GRC / Verizon weddy@grc.nasa.gov Shawn Ostermann Ohio University ostermann@eecs.ohiou.edu Mark Allman ICSI

More information

Fast Distributed Process Creation with the XMOS XS1 Architecture

Fast Distributed Process Creation with the XMOS XS1 Architecture Communicating Process Architectures 20 P.H. Welch et al. (Eds.) IOS Press, 20 c 20 The authors and IOS Press. All rights reserved. Fast Distributed Process Creation with the XMOS XS Architecture James

More information

Semi-Markov Process based Model for Performance Analysis of Wireless LANs

Semi-Markov Process based Model for Performance Analysis of Wireless LANs Semi-Markov Process based Model for Performance Analysis of Wireless LANs Murali Krishna Kadiyala, Diti Shikha, Ravi Pendse, and Neeraj Jaggi Deartment of Electrical Engineering and Comuter Science Wichita

More information

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model Ad Hoc Networks (4) 5 68 Contents lists available at SciVerse ScienceDirect Ad Hoc Networks journal homeage: www.elsevier.com/locate/adhoc Latency-minimizing data aggregation in wireless sensor networks

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Distrib. Comut. 71 (2011) 288 301 Contents lists available at ScienceDirect J. Parallel Distrib. Comut. journal homeage: www.elsevier.com/locate/jdc Quality of security adatation in arallel

More information

GEOMETRIC CONSTRAINT SOLVING IN < 2 AND < 3. Department of Computer Sciences, Purdue University. and PAMELA J. VERMEER

GEOMETRIC CONSTRAINT SOLVING IN < 2 AND < 3. Department of Computer Sciences, Purdue University. and PAMELA J. VERMEER GEOMETRIC CONSTRAINT SOLVING IN < AND < 3 CHRISTOPH M. HOFFMANN Deartment of Comuter Sciences, Purdue University West Lafayette, Indiana 47907-1398, USA and PAMELA J. VERMEER Deartment of Comuter Sciences,

More information

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION Yugoslav Journal of Oerations Research (00), umber, 5- A BICRITERIO STEIER TREE PROBLEM O GRAPH Mirko VUJO[EVI], Milan STAOJEVI] Laboratory for Oerational Research, Faculty of Organizational Sciences University

More information

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics

Lecture 2: Fixed-Radius Near Neighbors and Geometric Basics structure arises in many alications of geometry. The dual structure, called a Delaunay triangulation also has many interesting roerties. Figure 3: Voronoi diagram and Delaunay triangulation. Search: Geometric

More information

A Study of Protocols for Low-Latency Video Transport over the Internet

A Study of Protocols for Low-Latency Video Transport over the Internet A Study of Protocols for Low-Latency Video Transort over the Internet Ciro A. Noronha, Ph.D. Cobalt Digital Santa Clara, CA ciro.noronha@cobaltdigital.com Juliana W. Noronha University of California, Davis

More information

An Indexing Framework for Structured P2P Systems

An Indexing Framework for Structured P2P Systems An Indexing Framework for Structured P2P Systems Adina Crainiceanu Prakash Linga Ashwin Machanavajjhala Johannes Gehrke Carl Lagoze Jayavel Shanmugasundaram Deartment of Comuter Science, Cornell University

More information

TCP over Multihop Networks: Issues and Performance Enhancement

TCP over Multihop Networks: Issues and Performance Enhancement TCP over Multiho 8.11 Networks: Issues and Performance Enhancement Kitae Nahm nahm@sii.usc.edu Ahmed Helmy helmy@usc.edu Deartment of Electrical Engineering University of Southern California, Los Angeles,

More information

Near-Optimal Routing Lookups with Bounded Worst Case Performance

Near-Optimal Routing Lookups with Bounded Worst Case Performance Near-Otimal Routing Lookus with Bounded Worst Case Performance Pankaj Guta Balaji Prabhakar Stehen Boyd Deartments of Electrical Engineering and Comuter Science Stanford University CA 9430 ankaj@stanfordedu

More information

Graph Cut Matching In Computer Vision

Graph Cut Matching In Computer Vision Grah Cut Matching In Comuter Vision Toby Collins (s0455374@sms.ed.ac.uk) February 2004 Introduction Many of the roblems that arise in early vision can be naturally exressed in terms of energy minimization.

More information

CMSC 425: Lecture 16 Motion Planning: Basic Concepts

CMSC 425: Lecture 16 Motion Planning: Basic Concepts : Lecture 16 Motion lanning: Basic Concets eading: Today s material comes from various sources, including AI Game rogramming Wisdom 2 by S. abin and lanning Algorithms by S. M. LaValle (Chats. 4 and 5).

More information

Grouping of Patches in Progressive Radiosity

Grouping of Patches in Progressive Radiosity Grouing of Patches in Progressive Radiosity Arjan J.F. Kok * Abstract The radiosity method can be imroved by (adatively) grouing small neighboring atches into grous. Comutations normally done for searate

More information

A Petri net-based Approach to QoS-aware Configuration for Web Services

A Petri net-based Approach to QoS-aware Configuration for Web Services A Petri net-based Aroach to QoS-aware Configuration for Web s PengCheng Xiong, YuShun Fan and MengChu Zhou, Fellow, IEEE Abstract With the develoment of enterrise-wide and cross-enterrise alication integration

More information

Time-Dependent Broadband Pricing

Time-Dependent Broadband Pricing Time-Deendent Broadband Pricing Carlee Joe-Wong Deartment of Mathematics Email: cjoe@rinceton.edu Sangtae Ha Deartment of Electrical Engineering Email: sangtaeh@rinceton.edu Mung Chiang Deartment of Electrical

More information

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems

Matlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems Matlab Virtual Reality Simulations for otimizations and raid rototying of flexible lines systems VAMVU PETRE, BARBU CAMELIA, POP MARIA Deartment of Automation, Comuters, Electrical Engineering and Energetics

More information

The Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005*

The Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005* The Anubis Service Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL-2005-72 June 8, 2005* timed model, state monitoring, failure detection, network artition Anubis is a fully

More information

Parallel Construction of Multidimensional Binary Search Trees. Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka

Parallel Construction of Multidimensional Binary Search Trees. Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka Parallel Construction of Multidimensional Binary Search Trees Ibraheem Al-furaih, Srinivas Aluru, Sanjay Goil Sanjay Ranka School of CIS and School of CISE Northeast Parallel Architectures Center Syracuse

More information

Collective communication: theory, practice, and experience

Collective communication: theory, practice, and experience CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Comutat.: Pract. Exer. 2007; 19:1749 1783 Published online 5 July 2007 in Wiley InterScience (www.interscience.wiley.com)..1206 Collective

More information

Brief Contributions. A Geometric Theorem for Network Design 1 INTRODUCTION

Brief Contributions. A Geometric Theorem for Network Design 1 INTRODUCTION IEEE TRANSACTIONS ON COMPUTERS, VOL. 53, NO., APRIL 00 83 Brief Contributions A Geometric Theorem for Network Design Massimo Franceschetti, Member, IEEE, Matthew Cook, and Jehoshua Bruck, Fellow, IEEE

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

Implementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching

Implementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching Imlementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching Ju Hui Li, eng Hiot Lim and Qi Cao School of EEE, Block S Nanyang Technological University Singaore 639798

More information

Directed File Transfer Scheduling

Directed File Transfer Scheduling Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was

More information

Constrained Path Optimisation for Underground Mine Layout

Constrained Path Optimisation for Underground Mine Layout Constrained Path Otimisation for Underground Mine Layout M. Brazil P.A. Grossman D.H. Lee J.H. Rubinstein D.A. Thomas N.C. Wormald Abstract The major infrastructure comonent reuired to develo an underground

More information

AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS

AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS AN INTEGER LINEAR MODEL FOR GENERAL ARC ROUTING PROBLEMS Philie LACOMME, Christian PRINS, Wahiba RAMDANE-CHERIF Université de Technologie de Troyes, Laboratoire d Otimisation des Systèmes Industriels (LOSI)

More information

Quality-of-Service Routing with Two Concave Constraints

Quality-of-Service Routing with Two Concave Constraints This full text aer was eer reviewed at the direction of IEEE Communications ociety subject matter exerts for ublication in the ICC 008 roceedings. Quality-of-ervice Routing with Two Concave Constraints

More information

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal

More information

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University.

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University. Relations with Relation Names as Arguments: Algebra and Calculus Kenneth A. Ross Columbia University kar@cs.columbia.edu Abstract We consider a version of the relational model in which relation names may

More information

The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing

The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing The VEGA Moderately Parallel MIMD, Moderately Parallel SIMD, Architecture for High Performance Array Signal Processing Mikael Taveniku 2,3, Anders Åhlander 1,3, Magnus Jonsson 1 and Bertil Svensson 1,2

More information

Adaptive Management of Network Resources

Adaptive Management of Network Resources Adaptive Management of Network Resources Daniel C. ONei, David Julian, and Stephen Boyd Department of Electrical Engineering Stanford University dconei,djulian,boyd@stanford.edu Abstract This paper describes

More information

Backoff Design for IEEE DCF Networks: Fundamental Tradeoff and Design Criterion

Backoff Design for IEEE DCF Networks: Fundamental Tradeoff and Design Criterion Backoff Design for IEEE 80. DC Networks: undamental Tradeoff and Design Criterion Xinghua Sun, Member, IEEE and Lin Dai, Senior Member, IEEE bstract Binary Exonential Backoff is a key comonent of the IEEE

More information

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China

More information

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment

More information

Collective Communication: Theory, Practice, and Experience. FLAME Working Note #22

Collective Communication: Theory, Practice, and Experience. FLAME Working Note #22 Collective Communication: Theory, Practice, and Exerience FLAME Working Note # Ernie Chan Marcel Heimlich Avi Purkayastha Robert van de Geijn Setember, 6 Abstract We discuss the design and high-erformance

More information

Distributed Estimation from Relative Measurements in Sensor Networks

Distributed Estimation from Relative Measurements in Sensor Networks Distributed Estimation from Relative Measurements in Sensor Networks #Prabir Barooah and João P. Hesanha Abstract We consider the roblem of estimating vectorvalued variables from noisy relative measurements.

More information

COMP Parallel Computing. BSP (1) Bulk-Synchronous Processing Model

COMP Parallel Computing. BSP (1) Bulk-Synchronous Processing Model COMP 6 - Parallel Comuting Lecture 6 November, 8 Bulk-Synchronous essing Model Models of arallel comutation Shared-memory model Imlicit communication algorithm design and analysis relatively simle but

More information

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1 Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and

More information

Performance Analysis of IEEE

Performance Analysis of IEEE Performance Analysis of IEEE 8. Deartment of Electrical and Comuter Engineering Rutgers University, Piscataway, NJ 8854 Abstract. Introduction Existing work includes [Bianchi ], and some roblems that we

More information

Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission.

Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission. An Interactive Programming Method for Solving the Multile Criteria Problem Author(s): Stanley Zionts and Jyrki Wallenius Source: Management Science, Vol. 22, No. 6 (Feb., 1976),. 652-663 Published by:

More information

Privacy Preserving Moving KNN Queries

Privacy Preserving Moving KNN Queries Privacy Preserving Moving KNN Queries arxiv:4.76v [cs.db] 4 Ar Tanzima Hashem Lars Kulik Rui Zhang National ICT Australia, Deartment of Comuter Science and Software Engineering University of Melbourne,

More information

QSRED, An Algorithm To Solve The Mismatch Between The Microscopic and Macroscopic Behavior of RED Gateways

QSRED, An Algorithm To Solve The Mismatch Between The Microscopic and Macroscopic Behavior of RED Gateways IJCSNS International Journal of Comuter Science Network Security, VOL.10 No.11, November 2010 63 QSRED, An Algorim To Solve The Mismatch Between The Microscoic Macroscoic Behavior of RED Gateways Nabhan

More information

Balancing Transport and Physical Layers in Wireless Ad Hoc Networks: Jointly Optimal Congestion Control and Power Control

Balancing Transport and Physical Layers in Wireless Ad Hoc Networks: Jointly Optimal Congestion Control and Power Control Balancing Transport and Physical Layers in Wireless Ad Hoc Networks: Jointly Optimal Congestion Control and Power Control Mung Chiang Electrical Engineering Department, Princeton University NRL/NATO Workshop

More information

On traffic fairness in data center fabrics

On traffic fairness in data center fabrics On traffic fairness in data center fabrics Dallal Belabed, Stefano Secci, Guy Pujolle, Dee Medhi To cite this version: Dallal Belabed, Stefano Secci, Guy Pujolle, Dee Medhi. On traffic fairness in data

More information

521493S Computer Graphics Exercise 3 (Chapters 6-8)

521493S Computer Graphics Exercise 3 (Chapters 6-8) 521493S Comuter Grahics Exercise 3 (Chaters 6-8) 1 Most grahics systems and APIs use the simle lighting and reflection models that we introduced for olygon rendering Describe the ways in which each of

More information

Single character type identification

Single character type identification Single character tye identification Yefeng Zheng*, Changsong Liu, Xiaoqing Ding Deartment of Electronic Engineering, Tsinghua University Beijing 100084, P.R. China ABSTRACT Different character recognition

More information

10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1

10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1 10 File System 1 We will examine this chater in three subtitles: Mass Storage Systems OERATING SYSTEMS FILE SYSTEM 1 File System Interface File System Imlementation 10.1.1 Mass Storage Structure 3 2 10.1

More information

Information Flow Based Event Distribution Middleware

Information Flow Based Event Distribution Middleware Information Flow Based Event Distribution Middleware Guruduth Banavar 1, Marc Kalan 1, Kelly Shaw 2, Robert E. Strom 1, Daniel C. Sturman 1, and Wei Tao 3 1 IBM T. J. Watson Research Center Hawthorne,

More information

A network performance-based device driven communication scheme for 5G networks

A network performance-based device driven communication scheme for 5G networks Received: 29 October 217 Revised: 26 December 217 Acceted: 27 December 217 DOI: 1.12/itl2.27 LETTER A network erformance-based device driven communication scheme for 5G networks Sanjay K. Biswash Dushantha

More information

Distributed Basis Pursuit

Distributed Basis Pursuit Distributed Basis Pursuit João F. C. Mota, João M. F. Xavier, Pedro M. Q. Aguiar, and Markus Püschel arxiv:009.28v3 [math.oc] 4 Mar 202 Abstract We roose a distributed algorithm for solving the otimization

More information

Efficient Dynamic Programming for Optimal Multi-Location Robot Rendezvous with Proofs

Efficient Dynamic Programming for Optimal Multi-Location Robot Rendezvous with Proofs Efficient Dynamic Programming for Otimal Multi-Location Robot Rendezvous with Proofs Ken Alton and Ian M. Mitchell Deartment of Comuter Science University of British Columbia Vancouver, BC, V6T 1Z4, Canada

More information

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links

More information

Lecture 8: Orthogonal Range Searching

Lecture 8: Orthogonal Range Searching CPS234 Comutational Geometry Setember 22nd, 2005 Lecture 8: Orthogonal Range Searching Lecturer: Pankaj K. Agarwal Scribe: Mason F. Matthews 8.1 Range Searching The general roblem of range searching is

More information

PacketScore: A Statistical Packet Filtering Scheme against Distributed Denial-of-Service Attacks

PacketScore: A Statistical Packet Filtering Scheme against Distributed Denial-of-Service Attacks PacketScore: A Statistical Packet Filtering Scheme against Distributed Denial-of-Service Attacks Yoohwan Kim Wing Cheong Lau Mooi Choo Chuah H. Jonathan Chao School of Comuter Science Det. of Information

More information

Autonomic Physical Database Design - From Indexing to Multidimensional Clustering

Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Autonomic Physical Database Design - From Indexing to Multidimensional Clustering Stehan Baumann, Kai-Uwe Sattler Databases and Information Systems Grou Technische Universität Ilmenau, Ilmenau, Germany

More information

MATHEMATICAL MODELING OF COMPLEX MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT

MATHEMATICAL MODELING OF COMPLEX MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT MATHEMATICAL MODELING OF COMPLE MULTI-COMPONENT MOVEMENTS AND OPTICAL METHOD OF MEASUREMENT V.N. Nesterov JSC Samara Electromechanical Plant, Samara, Russia Abstract. The rovisions of the concet of a multi-comonent

More information

Statistical Detection for Network Flooding Attacks

Statistical Detection for Network Flooding Attacks Statistical Detection for Network Flooding Attacks C. S. Chao, Y. S. Chen, and A.C. Liu Det. of Information Engineering, Feng Chia Univ., Taiwan 407, OC. Email: cschao@fcu.edu.tw Abstract In order to meet

More information

Perception of Shape from Shading

Perception of Shape from Shading 1 Percetion of Shae from Shading Continuous image brightness variation due to shae variations is called shading Our ercetion of shae deends on shading Circular region on left is erceived as a flat disk

More information

SPARSE SIGNAL REPRESENTATION FOR COMPLEX-VALUED IMAGING Sadegh Samadi 1, M üjdat Çetin 2, Mohammad Ali Masnadi-Shirazi 1

SPARSE SIGNAL REPRESENTATION FOR COMPLEX-VALUED IMAGING Sadegh Samadi 1, M üjdat Çetin 2, Mohammad Ali Masnadi-Shirazi 1 SPARSE SIGNAL REPRESENTATION FOR COMPLEX-VALUED IMAGING Sadegh Samadi 1, M üjdat Çetin, Mohammad Ali Masnadi-Shirazi 1 1. Shiraz University, Shiraz, Iran,. Sabanci University, Istanbul, Turkey ssamadi@shirazu.ac.ir,

More information

TCP VON: Joint Congestion Control and Online Network Coding for Wireless Networks

TCP VON: Joint Congestion Control and Online Network Coding for Wireless Networks TCP VON: Joint Congestion Control and Online Network Coding for Wireless Networks Wei Bao, Vahid Shah-Mansouri, Vincent W.S. Wong, and Victor C.M. Leung Deartment of Electrical and Comuter Engineering

More information

Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication

Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication Using Permuted States and Validated Simulation to Analyze Conflict Rates in Otimistic Relication An-I A. Wang Comuter Science Deartment Florida State University Geoff H. Kuenning Comuter Science Deartment

More information

To appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree

To appear in IEEE TKDE Title: Efficient Skyline and Top-k Retrieval in Subspaces Keywords: Skyline, Top-k, Subspace, B-tree To aear in IEEE TKDE Title: Efficient Skyline and To-k Retrieval in Subsaces Keywords: Skyline, To-k, Subsace, B-tree Contact Author: Yufei Tao (taoyf@cse.cuhk.edu.hk) Deartment of Comuter Science and

More information

CASCH - a Scheduling Algorithm for "High Level"-Synthesis

CASCH - a Scheduling Algorithm for High Level-Synthesis CASCH a Scheduling Algorithm for "High Level"Synthesis P. Gutberlet H. Krämer W. Rosenstiel Comuter Science Research Center at the University of Karlsruhe (FZI) HaidundNeuStr. 1014, 7500 Karlsruhe, F.R.G.

More information

Trigonometric Functions

Trigonometric Functions Similar Right-Angled Triangles Trigonometric Functions We lan to introduce trigonometric functions as certain ratios determined by similar right-angled triangles. By de nition, two given geometric gures

More information

PA-NEMO: Proxy Mobile IPv6-aided Network Mobility Management Scheme for 6LoWPAN

PA-NEMO: Proxy Mobile IPv6-aided Network Mobility Management Scheme for 6LoWPAN htt://dx.doi.org/10.5755/j01.eee.20.3.3951 ELEKRONIKA IR ELEKROENIKA, ISSN 1392-1215, VOL. 20, NO. 3, 2014 PA-NEMO: Proxy Mobile IPv6-aided Network Mobility Management Scheme for 6LoWPAN Ke Xiong 1, Yu

More information

A joint multi-layer planning algorithm for IP over flexible optical networks

A joint multi-layer planning algorithm for IP over flexible optical networks A joint multi-layer lanning algorithm for IP over flexible otical networks Vasileios Gkamas, Konstantinos Christodoulooulos, Emmanouel Varvarigos Comuter Engineering and Informatics Deartment, University

More information

CS649 Sensor Networks IP Track Lecture 6: Graphical Models

CS649 Sensor Networks IP Track Lecture 6: Graphical Models CS649 Sensor Networks IP Track Lecture 6: Grahical Models I-Jeng Wang htt://hinrg.cs.jhu.edu/wsn06/ Sring 2006 CS 649 1 Sring 2006 CS 649 2 Grahical Models Grahical Model: grahical reresentation of joint

More information

Comparative Evaluation QoS of FTP over LEO and GEO Satellite Networks with Diffserv Architecture

Comparative Evaluation QoS of FTP over LEO and GEO Satellite Networks with Diffserv Architecture Journal of Communication and Comuter 9 (2012) 1383-1394 D DAVID PUBLISHING Comarative Evaluation QoS of FTP over LEO and GEO Satellite Networks with Diffserv Architecture Lukman Audah 1, Zhili Sun 2 and

More information

Truth Trees. Truth Tree Fundamentals

Truth Trees. Truth Tree Fundamentals Truth Trees 1 True Tree Fundamentals 2 Testing Grous of Statements for Consistency 3 Testing Arguments in Proositional Logic 4 Proving Invalidity in Predicate Logic Answers to Selected Exercises Truth

More information

Issues in the Blending of Curves for the Manufacture of Sculptured Surfaces

Issues in the Blending of Curves for the Manufacture of Sculptured Surfaces Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 26) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 2-23 June

More information

Computing the Convex Hull of. W. Hochstattler, S. Kromberg, C. Moll

Computing the Convex Hull of. W. Hochstattler, S. Kromberg, C. Moll Reort No. 94.60 A new Linear Time Algorithm for Comuting the Convex Hull of a Simle Polygon in the Plane by W. Hochstattler, S. Kromberg, C. Moll 994 W. Hochstattler, S. Kromberg, C. Moll Universitat zu

More information

Folded Structures Satisfying Multiple Conditions

Folded Structures Satisfying Multiple Conditions Journal of Information Processing Vol.5 No.4 1 10 (Oct. 017) [DOI: 1197/isjji.5.1] Regular Paer Folded Structures Satisfying Multile Conditions Erik D. Demaine 1,a) Jason S. Ku 1,b) Received: November

More information