Spare Capacity Planning Using Survivable Alternate Routing for Long-Haul WDM Networks
|
|
- Derek Thornton
- 6 years ago
- Views:
Transcription
1 Spare Capacity Planning Using Survivable lternate Routing for Long-Haul WDM Networks in Zhou an Hussein T. Mouftah Department of lectrical an Computer ngineering Queen s University, Kingston, Ontario, K7L 3N6 Canaa {zhoubi,mouftah}@ee.queensu.ca bstract Spare capacity planning is to fin the minimum amount of spare capacity to be allocate throughout a network so that the network can survive from network component failures. In this paper, the spare capacity planning problem is investigate for long haul wavelength ivision multiplexing (WDM) networks. three-step metho is evelope for solving the problem. First, heuristic approaches are use to select both caniate working routes an protection routes in orer to achieve approximate optimal performance while maintaining a computational feasibility. Secon, traffic requests are istribute on the obtaine caniate working an protection routes optimally using genetic algorithms (G). Finally wavelengths are assigne to working lightpaths an share protection lightpaths. The major avantage of the new approach is the ability to incorporate nonlinear constraints an nonlinear cost functions into the G, which are introuce by sharing protection links between share risk link groups (SRLG). Moreover, by consiering SRLG constraints in the spare capacity planning phase, wavelengths can be allocate to each share protection route before failures happen, so that shorter restoration latency can be achieve. Numerical results illustrate that the propose approach is more cost-effective than the single-path protection metho. 1. Introuction ackgroun Wavelength Division Multiplexing (WDM), which allows a single fiber to carry multiple signals simultaneously, will soon become the core technology to cope with the rapily increasing eman for banwith in the next generation Internet. n averse result of exploiting this avance technology is the increase network vulnerability in the sense that a single network failure can significantly reuce the capability to eliver services in large-scale information systems. Therefore, network survivability has been a crucial concern in highbanwith optical network. Survivable network architectures are base on either eicate resources, or share resources. With eicate protection, such as 1+1 an 1:1 protection, network service is restore with the eicate network resources. In the occurrence of a failure, the traffic is switche to the pre-configure protection lightpaths or links. Deicate protection has very low recovery latency an can guarantee full restoration against single network failures. However, it will result in inefficient use of network resources. In contrast, with share protection, network protection resource can be use for several ifferent failure scenarios. Major research efforts on share protection schemes focus on reucing the resource overhea by means of techniques such as sharing resources across connections or between isjoint lightpaths for the same connection. Unlike the eicate scheme, a connection can be establishe over the share protection resources only after a network failure is etecte. Share protection approaches can be classifie into link protection an path protection. In link restoration, all the connections that traverse the faile link are reroute aroun that link. The source an estination noes of the connections traversing the faile link are oblivious to the link failure. In path restoration, when a link fails, the source noe an the estination noe of each connection that traverses the faile link are informe of the failure. The source an the estination noes of each connection inepenently reroute the traffic to backup routes on an en-to-en basis. Link protections are expecte to have shorter recovery latency than path protections. However, it has been reporte that share path protection schemes are more economical than link protections in the sense that they require much lower reunant network resources. Moreover, path protections are more feasible than link protections with available technologies. Link protection schemes epen on fault localization, while no fault localization is necessary for path protection. Path rerouting performe at the ege of the network may allow some or all of the recovery functions to be move into the en-system. Thus, it simplifies network esign, an allows applications to make use of application specific information such as tolerance for latency in making rerouting ecisions. ccoringly, this paper focuses on esigning cost-efficient path protection algorithms. Proceeings of the Seventh International Symposium on Computers an Communications (ISCC ) / $ I
2 1. 2. Relate work Many stuies have been to proviing cost-effective protection schemes for WDM networks [1-13]. Protection esign aims to protecting network services from a set of failure scenarios, such as a single span cut, or a noe loss. Protection esign methos can be classifie into two categories: inepenent esign an coorinate esign [6]. Inepenent esign consiers failure scenarios inepenently, in contrast, coorinate esign consiers planning all reconfigurations simultaneously for several failure scenarios, in a coorinate manner. In [6], lanyali, an yanoglu evaluate two iterative methos, inepenent an coorinate esigns, through simulation for three restoration schemes: full reconfiguration, path-base, an link-base. The numerical results showe that coorinate esign with full reconfiguration achieves the most economical solutions in terms of fiber requirements. They also showe that coorinate planning of several failure scenarios provies more efficient esigns than those obtaine by consiering the failures inepenently. The iterative methos nee much shorter computational time than centralize optimization metho using CPLX. However, the solutions obtaine from the iterative methos are not approximately optimal. ecause increasing the number of iterations cannot result in improve solutions in any case. Some other work consiers all possible scenarios together in coorinate esigning without using iterative approaches [1-5, 9,13]. Typically, the path protection problem is to optimally etermine two isjoint alternate paths, a working path an a protection path, for each source-estination pair, so as to minimize require network capacity an cost. However, these algorithms unnecessarily restrict that all traffic for each noe pair follows the same working path an protection path after failures. In contrast, an optimal esign scheme for survivable WDM transport networks is propose in [3], which focuse on optimally istribute traffic among several caniate working path an protection path pairs. However, the algorithm requires that a single restoration path is preetermine for each working path on a one-toone basis. In this paper, we name this approach as singleprotection path metho. Most of the previous work on spare capacity allocation of mesh WDM networks moele the static protection esign as an integer linear programming (ILP) problem. The esign objective is to minimize the total spare capacity require for the restoration in specific failure scenarios. Unfortunately, the resulte ILP formulation is NP-har [13]. To obtain the optimal solution for even a small size network, such as a few tens of noes, is very time consuming using available mathematical tools. Relaxation methos are propose to approximate the IP solution. Lagarangian relaxation, which ecomposes the original complex problem into several easier subproblems, was use by Doshi et al [9]. Simulate annealing an Tabu searching base methos were propose in [1,13] an [2] respectively Our approaches In this work, our objective is to solve the spare capacity planning problem efficiently for long-haul optical networks, where traffic matrix is known for network planner. Centralize optimization is evelope to esign cost-effective path protection for all traffic requests. Then the erive protection results are loae to each source noe of traffic requests, so that upon a network failure, a istribute restoration algorithm can be activate to reroute the traffic to backup lightpaths. survivable alternate routing algorithm is evelope in this paper, which improves the performance of previous work using the following schemes: In orer to reuce the computational complexity of the spare capacity planning problem, a set of caniate working routes an corresponing caniate protection routes for each wavelength request are pre-compute an use to compose the search space for the esign variables. In this paper, we present a survivable routing algorithm, which can calculate a set of caniate working routes an several isjoint caniate protection routes for each working route. To istinguish our metho, we name it as multi-path protection. Multi-path protection can istribute traffic more evenly over networks, thus sharability of protection paths can be improve. The traeoff of multi-path protection is that more complex restoration signaling is necessary after occurrence of failures. Multiple signaling proceures must be simultaneously performe for all of these restoration paths. However, the increase of the complexity is not significant. To aress the share path protection problem, the Share Risk Link Group (SRLG) concept is consiere as one of the most important constraints concerning the constraint-base route computation of optical channel routes [15]. share risk link group is efine as a group of links that share a component which failure causes the failure of all links of the group. We efine sharable protection link group (SPLG) as collections of protection routes which corresponing primary routes o not belong to any SRLG. SRLG constraints can be efine as follows: protection paths can share links if an only if they belong to a common SPLG. Knowing which fibers are in share risk groups is very ifficult, because logical isjoint paths may not be physically iverse [14]. In the existing transport networks, ientification of SRLGs is not conucte effectively. However, recently, management Proceeings of the Seventh International Symposium on Computers an Communications (ISCC ) / $ I
3 an istribution of SRLG information has receive attention from both inustry [18] an Internet ngineering Task Force [19]. y applying the SRLG constraint to the constraintbase path computation, one can select a route taking into account resource an logical structure isjointness that implies a lower probability of simultaneous lightpath failure. However, to the best of our knowlege, general SRLG constraints were selom consiere explicitly in previous work in globally optimizing pre-compute path protection esigns for static traffic moels. Without consiering SRLG constraints, the reserve restoration capacity is either over-reserve or uner-reserve for protection. The typical example of the former case is 1:1 protection, which results in costly esign because of capacity reunancy. In [5], protection paths for a single eman can share reserve banwith uner the conition that their working paths are mutually isjoint. However, the metho can be improve by applying more general SRLG constraints. In the latter case, protection paths can be multiplexe by other working paths or protection paths without SRLG constrains to reuce network resource reunancy. However these methos result in partial restoration after failures happen. nother effect of neglecting SRLG constraints at protection esign stage is that wavelength allocation for backup paths has to be one ynamically after network failures occur [9]. For longhaul WDM networks, the propagation elay of control signaling is long, which contributes significantly the restoration latency. In our approach with the consieration of SRLG in protection esign, wavelengths are allocate to each backup path at esign stage. Thus, it results in short restoration latency. The remainer of this paper is organize as follows: In Section II, fixe survivable alternate route selection an wavelength routing algorithm is presente. The survivable alternate routing with consieration of SRLG constraints is formulate as a non-linear integer programming problem. n approximate solution using genetic algorithms is introuce. Section III presents simulations an numerical results of the propose routing algorithms. Section IV summarizes an conclues the paper. 2. Survivable lternate Routing We propose a survivable alternate routing (SR) heuristic to simplify the searching of working paths an protection paths. We efine a working route set (WRS) between a source noe an a estination noe as a set of pre-compute caniate routes, through which wavelength requests between the noe pair is route. protection route set (PRS) for a working route rw is a set of caniate isjoint routes of rw, through which wavelength requests on rw are reroute accoring to pre-reserve banwith on each backup route if the working route rw is broken. Working routes an protection routes can be either inactive or active. route is active when banwith (wavelengths) is reserve along the route for a traffic request. D F Working path Protection path Figure 1. WRS an PRS Figure 1. shows two working routes, --C-H an - D--H from noe to noe H. For each working route, two backup routes is assigne, e.g. -D--H an -F-G- H are backup routes for --C-H; --C-H an -F-G-H backup -D--H. The SR can be realize as follows: First, for each source an estination pair a set of working routes is precompute using k-shortest path routing algorithm [22]. The maximum size of WRSs is Kw. The Kw shortest routes o not have to be mutually isjoint. Secon, for each working path, up to Kp isjoint backup paths are searche using breath first protection path searching algorithm. In practice, the size of the route sets, Kw an Kp, is below ten, typically 2 to 6. Then a lightpath layout algorithm is execute to establish working lightpaths over the WRSs, an to eploy protection lightpath over the corresponing PRSs. The optimization objective of lightpath layout algorithm is to minimize the total number of wavelengths use on each optical link. The consiere networks are flat all-optical mesh networks. ach noe in the networks enotes an optical channel-switching router, which is strictly bufferless. In the networks, each link inclues two uniirectional fibers, one for each irection, an each fiber can be multiplexe by numbers of wavelengths. anwith requests are in terms of numbers of lightpaths (wavelengths). Figure 2 shows an example result of spare capacity planning by using survivable alternate routing. Traffic requests, working lightpaths, reserve backup lightpaths an the wavelengths allocate for them are shown in Table 1. This example also shows the avantage of multi-path protection. With multi-path protection, banwith can be reserve for protecting working path - on both backup paths, -C-D- an -C--F-D-, so that the traffic can be balance better than that in single-path protection case C G H Proceeings of the Seventh International Symposium on Computers an Communications (ISCC ) / $ I
4 (in this example, no solution can be foun to satisfy all traffic requirements with single-path protection). C λ 2 D F Working path ackup path Figure 2. lternate survivable routing Table 1. n example of alternate survivable routing. WP, λ w : working path an wavelength ID reserve for traffic along the working path, P, λ p : backup path an wavelength ID reserve along the protection path. S-D PIR TRFFIC WP, λ W P, λ P 3 -, 1 -, 2 -, 3 -C-D-, 1 -C-D-, 2 -C--F-D-,3 C D 1 C-D, 3 C--F-D, 3 F 2 -F, 1 -F, 2 -C-D-F, 1 -C-D-F, reath first protection path searching algorithm We evelope an algorithm to search a protection route set for each primary path. We assume that, after the failure of the primary path, it is not necessary to provie the same quality of service in terms of propagation elay on the protection path. Since one of the main objectives of esigning share path protection is to reuce the banwith reunancy by improving the sharing of protection banwith among ifferent SRLGs. ccoringly, we select protection paths base on their iversity other than their cost (elay). The more iverse the protection paths in a protection route set are, the more common backup links can be share by the working paths belonging to ifferent SRLGs. For this reason, instea of using the k-shortest path algorithm to generate PRS, a breath first iverse routing algorithm is evelope. To search protection paths for a working path, a tree is generate from the original network topology graph by eleting the intermeiate noes an links in the working path. Let the source noe be the root noe of the tree. breath first searching metho is use to search the protection paths from root noe to estination noe. Let k enote the traverse times of backup link () by backup paths in the kth protection route set of traffic request, thus, once a new backup path is foun for kth k working path of, increases its counts. To make the obtaine backup paths as iverse as possible, we confine between one to a certain pre-efine value K l which k is less than K p. If k >K l, then the newly foun protection path will not be inclue in the backup route set, an the searching proceure continues until K p protection paths are foun or the last leaf noe is reache. Figure 3. shows the tree generate for working path -- C-H. Protection paths, -D--H, -F-G-H, -D--G-H, -D-F-G-H, -F-D--H, -D-F-G--H, an -F-D--G- H are obtaine sequentially by using broa first searching algorithm. If K l =2 an K p =4, only the -D--H, -F-G- H, an -D--G-H are eligible solutions D F D G G H G H H H G H H Figure 3. reath first backup path searching tree Survivable alternate routing We efine the following notation. N = the set of noes L = the set of links C = the cost for link (), which can be consiere as propagation elay (in time units) over the link λ s = the banwith requirement from noe s to noe in term of number of wavelengths as the basic unit W = the maximum number of wavelength per fiber X = a set of working paths that use link (i, j) Y = a set of backup paths that use link (i,j) Z s = the set of working paths between source noe s an estination noe = the total amount of banwith reserve by active paths that use link (i, j) = the total amount of banwith reserve by backup paths that use link () R w = the set of all working paths, which are numbere from 1 to K p N(N-1) R wk = the kth working path in R w P uv = the uth protection path in PRS of R wv H F Proceeings of the Seventh International Symposium on Computers an Communications (ISCC ) / $ I
5 c k = the amount of banwith is route through the working path R wk uv = the amount of banwith on the backup route P uv Without loss of generality, we assume that paths that share a common link belong to a SRLG. Therefore, X also enotes a SRLG, in which all paths share link (). Then, = c k v P uv an k X uv = c = u Max uv ( mn), ( mn) ( ) u X mn, v Y Constraints: ( ) ( c k k Z s + ) W = λ s Optimality Criterion: Cost Optimization O a : Minimizing ( ) Loa balancing O b : Minimizing ( ) C + ( ) Max + ( ) ecause in most cases, there is no optimal solution which can satisfy all the criteria at the same time. Some compromises have to be mae. Let O an O max* b max* a enote the estimate maximum value of O a, an O b respectively. The objective function can be formulate as follows: O Min + O a b ( wa w max* b max* Oa Ob where w a an w b are the weights for optimality criterion a) an b), respectively. For the above moel, the optimization problem is to fin, between a source an a estination, a set of optimal routes that give the largest amount of resiual banwith along the routes while satisfying the specifie constraints on routing cost. Since the banwith allocate in WDM networks is in number of wavelengths, it is obvious that the formulate problem is an non-linear integer programming problem with multiple objectives. It can be easily proven that it is an NP-har problem. In practice, approximate algorithms are neee to solve such a problem for a large WDM network. ecause integer programming methos involve long computing perio an high computation intensity to get an optimal istribution of traffic over the route sets, we ) evelop a survivable routing algorithm base on Genetic lgorithms (G) to efficiently search approximately optimal solutions. Compute WPSs an PPSs Generate initiate traffic partitions valuate solutions base on: Mutation cost optimization loa balancing Crossover Selection Meet optimization no criteria? yes llocate wavelengths Figure 4. Survivable alternate routing using G G is a stochastic search metho that mimics the metaphor of natural biological evolution. G operates on a population of potential solutions applying the principle of survival of the fittest to prouce better an better approximations to a solution. t each generation, a new set of approximations is create by the process of selecting iniviuals accoring to their level of fitness in the problem omain an breeing them together using genetic operators, i.e. crossover an mutation, borrowe from natural genetics. This process leas to the evolution of populations of iniviuals that are better suite to their environment than the iniviuals that they were create from, just as in natural aaptation. The programming iagram for traffic partitioning using G is shown in Figure 4. Optimization Criteria in G can be an estimate acceptable value of the objective function, an/or a number of generations in G. λ 1 µ 1 S 01 S S (N-1)(N-3) S (N-1)(N-2) λ 2 µ 2 λ K w 1 µ K p 1 µ λ K w Figure 5. G coing of survivable alternate routing The coing of solusion space is illustrate in Figure 5., where S enotes the traffic eployment for noe pair (i,j), ( i, j) λ enotes the traffic loa allocate on the kth working k, ) route of noe pair (i,j), an µ ( i j enotes the banwith l reserve on the lth protection route of the corresponing working route of noe pair (i,j). The length of the chromosome is N (N-1) K w K p. In practice, only the noe pairs which have traffic requests are consiere, thus a compact chromosome coing can be use. K p Proceeings of the Seventh International Symposium on Computers an Communications (ISCC ) / $ I
6 2. 3. Wavelength assignment Given a set of primary paths an backup paths, as well as the wavelength requests on each path, wavelengths can be assigne for each primary path an backup path so that no two primary paths traversing over a fiber link use the same wavelength, an two or more backup paths can share the same wavelength over a fiber link if an only if they belong to ifferent SRLGs. For large-scale networks with arbitrary topology, assigning wavelengths optimally to various lightpaths has been shown to be NP-har in [21]. We use G to solve the wavelength assignment problem. The optimization aims at minimizing the total number of require wavelengths to satisfy the traffic requests an protection requirements. 3. Simulations an numerical results To evaluate the survivable alternate routing algorithm, the numerical results reporte in this section are base on simulations that are conucte using a WDM network planning tool. The tool is evelope using C++ an runs in a Microsoft Winows environment. few objectoriente class libraries have been evelope incluing topology iscovery algorithm, k-shortest path routing, breath first iverse routing, genetic algorithms, wavelength assignment algorithms, an so on. The simulations are conucte on the network topologies shown in Figure 6. ach noe has a fully configurable optical switch, which can connect any wavelength in an ingress fiber to any egress fiber using the same wavelength. Network Network Figure 6. Network topologies use in the simulations Non-uniforme traffic matrixes are generate ranomly. First, traffic patterns are generate for each simulation. traffic pattern specifies the approximate volume of traffic between each noe pair. Three kins of patterns are efine: high volume, meium volume, an low volume. ach kin of pattern is mappe a pre-efine banwith range. Then the traffic matrix is generate, where banwith requirement for each noe pair is generate ranomly accoring to the preefine pattern. The main evaluation metric consiere in this work is the network reunancy ratio (C r ), which is efine as the ratio of the total spare capacity over the total working capacity: C r = ( ) ( ) Network reunancy highly epens on the network topology as well as the spare capacity allocation algorithms use. Using eicate path protection schemes, generally C r is over 100%. Without explicitly consiering SRLG constraints, the share path protection scheme propose in [6] obtaine much lower C r, from 74% to 87% for a thirty-two noe network. However the algorithm epen on fault localization. We compare the multi-path protection scheme with a single-path scheme by using ifferent traffic matrix over the two simulation topologies, the ten noe network an the twenty-three noe network. The numerical results are given in Table 2., which show that the multi-path protection scheme can obtain about a 20% reuction of network reunancy compare with the single-path protection metho. In turn, this reuces the cost of the survivable WDM network in terms of total number of wavelength require for certain traffic requests. Table 2. Comparison of Single-path protection an multi-path protection. T: number of active noe pairs; λ w : total wavelength require with no protection; λ p : total wavelength require with full protection. NTWORK T λ W SINGL-PTH MULTI-PTH PROTCTION PROTCTION λ p C r λ p C r % 10 51% % 14 49% % 19 46% % 14 58% % 17 54% % 19 55% 4. Conclusions This work aims at proviing cost-effective esign of survivable WDM long-haul networks with static traffic. survivable alternate routing metho is propose in this paper. Heuristic approaches are implemente to select both working routes an protection routes in orer to achieve approximate optimal performance while maintaining a computational feasibility. xplicit SRLG constraints are applie in the new metho. Therefore, more cost-effective network esigns an shorter restoration time can be achieve. The numerical results show that the multi-path protection metho outperforms single path protection approaches in terms of the resulting network reunancy. Proceeings of the Seventh International Symposium on Computers an Communications (ISCC ) / $ I
7 Reference: [1]. V. Caenegem, W. V. Parys, F. D. Turck, an P. M. Demeester, Dimensioning of Survivable WDM Networks, I J. Select. reas Commun., vol. 16, no. 7, Sep. 1998, pp [2] O. Crochat, an Jean-Y. L. ouec, Design Protection for WDM Optical Networks, I J. Select. reas Commun., vol. 16, no. 7, Sep. 1998, pp [3] Y. Miyao an H. Saito, Optimal Design an valuation of Survivable WDM Transport Networks, I J. Select. reas Commun., vol. 16, no. 7, Sep. 1998, pp [4] S. Ramamurthyt an. Mukherjee, Survivable WDM Mesh Networks, Part I - Protection, INFOCOM '99. Proceeings. I, Vol. 2, 1999 pp [5] R. D. Davis, K. Kumaran, G. Liu, an I. Saniee, "Spier: simple an Flexible Tool for Design an Provisioning of Protecte Lightpaths in Optical Networks", Vol. 6, No. 1, Jan-Jun, 2001, pp [6] M. lanyali, an. yanoglu, Provisioning algorithms for WDM optical networks I/CM Trans. Net., vol. 7, no. 5, Oct. 1999, pp [7] G. Shen, et. al., Designing WDM optical network for reliability: routing light paths efficiently for path protection Optical Fiber Communication Conference 2000, Vol. 3, pp [8]. Moiano,. Narula-Tam, Survivable routing of logical topologies in WDM networks, INFOCOM Proceeings. I, Vol. 1, 2001, pp [9]. T. Doshi, et. al., Optical Network Design an Restoration, ell Labs Tech. Journal, Vol. 4, No. 1, Jan- Mar, 1999, pp [10] O. Gerstel, an R. Ramaswami, Optical Layer Survivability n Implementation Perspective, I J. Select. reas Commun., VOL. 18, NO. 10, OCTOR 2000 pp [11] Rubin, an J. Ling, Failure Protection Methos for Optical Meshe-Ring Communications Networks, I J. Select. reas Commun., VOL. 18, NO. 10, OCTOR 2000 pp [12] R. R. Iraschko, an W. D. Grover, highly ffienct Path- Restoration Protocol for Management of Opical Network Transport Integrity, I J. Select. reas Commun., vol. 18, No. 5, May 2000 pp [13] Y. Liu, D. Tipper, an P. Siripongwuikorn, pproximating Optimal Spare Capacity llocation by Successive Survivable Routing, INFOCOM Proceeings. I, vol. 1, 2001 [14]. Zhou, an H. T. Mouftah, alance lternate Routing for WDM networks, ISTD International Conference Wireless an Optical Communication 2001, anff, Canaa, July 17-19, 2001 [15]. Zhou, an H. T. Mouftah, aptive lternate Routing for Multi-fiber WDM Networks Using pproximate Congestion Information, International Conference on Communication (ICC20), New York City, US, pril 28-May 2, 20 [16] N. Ghani, S. Dixit, an T. Wang, On IP-Over-WDM Integration, I Commun. Mag., vol. 38, no. 3, Mar. 2000, pp [17] J. Luciani et al., IP over Optical Networks Framework, Internet Draft, Work in progress, raft-many-ip-opticalframework-03.txt, March [18] P. Sebos, J. Yates, G. Hjalmtysson an. Greenberg, "uto-iscovery of Share Risk Link Groups," Optical Fiber Commun. Conf., March 2001 [19] D. Papaimitriou et al, Inference of Share Risk Link Groups, Internet Draft, Work in progress, raft-manyinference-srlg-01.txt, July 2001 [20] Z. Zhang an. S. campora, Heuristic Wavelength ssignment lgorithm for Multihop WDM Networks with Wavelength Routing an Wavelength Re-Use, I/CM Trans. Net., Vol. 3, No. 3, pp , 1995 [21] D. Saha, M.D. Purkayastha, an. Mukherjee, n approach to wie area WDM optical network esign using genetic algorithm, Computer Communications, 22 (1999) pp [22] S. W. Lee an C. S. Wu, "K-est paths algorithm for Highly Reliable Communication Networks", IIC Trans. Commu. Vol.82-, No.4, pp , 1999 Proceeings of the Seventh International Symposium on Computers an Communications (ISCC ) / $ I
SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH
SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway
More informationStudy of Network Optimization Method Based on ACL
Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department
More informationAn Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique
International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech
More informationAdaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots
Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:
More informationOne-to-Many Multicast Restoration Based on Dynamic Core-Based Selection Algorithm in WDM Mesh Networks
Proceeings of the International MultiConference of Engineers an Computer Scientists 9 Vol I IMECS 9, March 18 -, 9, Hong Kong One-to-Many Multicast Restoration Base on Dynamic Core-Base Selection Algorithm
More informationAnyTraffic Labeled Routing
AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,
More informationMessage Transport With The User Datagram Protocol
Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer
More informationA Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks
A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks Wojciech Molisz and Jacek Rak Gdansk University of Technology, G. Narutowicza 11/12, Pl-8-952 Gdansk, Poland
More informationNon-Uniform Sensor Deployment in Mobile Wireless Sensor Networks
01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University
More informationLab work #8. Congestion control
TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño
More informationCoupling the User Interfaces of a Multiuser Program
Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces
More informationOnline Appendix to: Generalizing Database Forensics
Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that
More informationAn Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources
An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract
More informationFault-Tolerant Design of Wavelength-Routed Optical. Networks. S. Ramamurthy and Biswanath Mukherjee
DIMACS Series in Discrete Mathematics and Theoretical Computer Science Fault-Tolerant Design of Wavelength-Routed Optical Networks S. Ramamurthy and Biswanath Mukherjee Abstract. This paper considers optical
More informationQueueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks
Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication
More informationThreshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides
Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita
More informationProvisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks
Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html
More informationYet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien
Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,
More informationIO2654 Optical Networking. WDM network design. Lena Wosinska KTH/ICT. The aim of the next two lectures. To introduce some new definitions
IO2654 Optical Networking WDM network design Lena Wosinska KTH/ICT 1 The aim of the next two lectures To introduce some new definitions To make you aware about the trade-offs for WDM network design To
More informationParticle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base
More informationTransient analysis of wave propagation in 3D soil by using the scaled boundary finite element method
Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite
More informationAlmost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control
Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract
More informationMORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks
: a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications
More informationNon-homogeneous Generalization in Privacy Preserving Data Publishing
Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h
More informationOPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005
OPTICAL NETWORKS Virtual Topology Design A. Gençata İTÜ, Dept. Computer Engineering 2005 Virtual Topology A lightpath provides single-hop communication between any two nodes, which could be far apart in
More informationAPPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly
International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -
More informationOn the Placement of Internet Taps in Wireless Neighborhood Networks
1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that
More informationRobust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks
Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,
More informationDisjoint Multipath Routing in Dual Homing Networks using Colored Trees
Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science
More informationScalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter
FDL sel. VOA SOA 100 Regular papers ONDM 2018 Scalable Deterministic Scheuling for WDM Slot Switching Xhaul with Zero-Jitter Bogan Uscumlic 1, Dominique Chiaroni 1, Brice Leclerc 1, Thierry Zami 2, Annie
More informationOn Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation
On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member
More informationImage Segmentation using K-means clustering and Thresholding
Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,
More informationDynamic Capacity Allocation in OTN Networks
Communications an Network, 2015, 7, 43-54 Publishe Online February 2015 in SciRes. http://www.scirp.org/journal/cn http://x.oi.org/10.4236/cn.2015.71005 Dynamic Capacity Allocation in OTN Networks Maria
More informationOptimal Oblivious Path Selection on the Mesh
Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract
More informationAll-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA
Preprint, August 5, 2018. 1 All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA Mikhail Ivanov, Frerik Brännström, Alexanre Graell i Amat, an Petar Popovski Department of Signals an Systems,
More informationd 3 d 4 d d d d d d d d d d d 1 d d d d d d
Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching
More informationFast Fractal Image Compression using PSO Based Optimization Techniques
Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting
More informationUsing Vector and Raster-Based Techniques in Categorical Map Generalization
Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department
More informationNetwork Topology Control and Routing under Interface Constraints by Link Evaluation
Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu
More informationIndexing the Edges A simple and yet efficient approach to high-dimensional indexing
Inexing the Eges A simple an yet efficient approach to high-imensional inexing Beng Chin Ooi Kian-Lee Tan Cui Yu Stephane Bressan Department of Computer Science National University of Singapore 3 Science
More informationWDM Network Provisioning
IO2654 Optical Networking WDM Network Provisioning Paolo Monti Optical Networks Lab (ONLab), Communication Systems Department (COS) http://web.it.kth.se/~pmonti/ Some of the material is taken from the
More informationKinematic Analysis of a Family of 3R Manipulators
Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,
More informationEFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER
FFICINT ON-LIN TSTING MTHOD FOR A FLOATING-POINT ADDR A. Droz, M. Lobachev Department of Computer Systems, Oessa State Polytechnic University, Oessa, Ukraine Droz@ukr.net, Lobachev@ukr.net Abstract In
More informationArchitecture Design of Mobile Access Coordinated Wireless Sensor Networks
Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,
More informationPAPER. 1. Introduction
IEICE TRANS. COMMUN., VOL. E9x-B, No.8 AUGUST 2010 PAPER Integrating Overlay Protocols for Proviing Autonomic Services in Mobile A-hoc Networks Panagiotis Gouvas, IEICE Stuent member, Anastasios Zafeiropoulos,,
More informationOffloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization
1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24
More informationTHE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM
International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao
More informationA Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks
A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks Wojciech Molisz, DSc, PhD Jacek Rak, PhD Gdansk University of Technology Department of Computer Communications
More informationWAVELENGTH-DIVISION multiplexed (WDM) optical
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 9, NOVEMBER 2004 1823 A Dynamic Routing Algorithm With Load Balancing Heuristics for Restorable Connections in WDM Networks Lu Ruan, Member,
More informationSimple Layout Algorithms To Maintain Network Connectivity Under Faults
Simple Layout Algorithms To Maintain Network Connectivity Under Faults Galen H. Sasaki 1 Department of Electrical, University of Hawaii 2540 Dole Street, Honolulu, HI 96822 USA Ching-Fong Su and David
More informationOn the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems
On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,
More informationDesign of Large-Scale Optical Networks Λ
Design of Large-Scale Optical Networks Λ Yufeng Xin, George N. Rouskas, Harry G. Perros Department of Computer Science, North Carolina State University, Raleigh NC 27695 E-mail: fyxin,rouskas,hpg@eos.ncsu.edu
More informationToward the joint design of electronic and optical layer protection
Toward the joint design of electronic and optical layer protection Massachusetts Institute of Technology Slide 1 Slide 2 CHALLENGES: - SEAMLESS CONNECTIVITY - MULTI-MEDIA (FIBER,SATCOM,WIRELESS) - HETEROGENEOUS
More informationIEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,
More informationReformulation and Solution Algorithms for Absolute and Percentile Robust Shortest Path Problems
> REPLACE THIS LINE WITH YOUR PAPER IENTIFICATION NUMBER (OUBLE-CLICK HERE TO EIT) < 1 Reformulation an Solution Algorithms for Absolute an Percentile Robust Shortest Path Problems Xuesong Zhou, Member,
More informationA Classification of 3R Orthogonal Manipulators by the Topology of their Workspace
A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.
More informationImage compression predicated on recurrent iterated function systems
2n International Conference on Mathematics & Statistics 16-19 June, 2008, Athens, Greece Image compression preicate on recurrent iterate function systems Chol-Hui Yun *, Metzler W. a an Barski M. a * Faculty
More informationChalmers Publication Library
Chalmers Publication Library All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA This ocument has been ownloae from Chalmers Publication Library (CPL). It is the author s version of a work
More informationArc Perturbation Algorithms for Optical Network Design
Applied Mathematical Sciences, Vol. 1, 2007, no. 7, 301-310 Arc Perturbation Algorithms for Optical Network Design Zbigniew R. Bogdanowicz Armament Research, Development and Engineering Center Building
More informationJournal of Cybernetics and Informatics. Slovak Society for Cybernetics and Informatics
Journal of Cybernetics an Informatics publishe by Slovak Society for Cybernetics an Informatics Volume 13, 1 http://www.sski.sk/casopis/inex.php (home page) ISSN: 1336-4774 Journal of Cybernetics an Informatics
More informationLoop Scheduling and Partitions for Hiding Memory Latencies
Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:
More informationWilliam S. Law. Erik K. Antonsson. Engineering Design Research Laboratory. California Institute of Technology. Abstract
Optimization Methos for Calculating Design Imprecision y William S. Law Eri K. Antonsson Engineering Design Research Laboratory Division of Engineering an Applie Science California Institute of Technology
More informationNon-Uniform Sensor Deployment in Mobile Wireless Sensor Networks
0 0 0 0 0 0 0 0 on-uniform Sensor Deployment in Mobile Wireless Sensor etworks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University Boca Raton,
More informationLearning Subproblem Complexities in Distributed Branch and Bound
Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University
More informationA shortest path algorithm in multimodal networks: a case study with time varying costs
A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via
More informationFuzzy Learning Variable Admittance Control for Human-Robot Cooperation
Fuzzy Learning ariable Amittance Control for Human-Robot Cooperation Fotios Dimeas an Nikos Aspragathos Abstract This paper presents a metho for variable amittance control in human-robot cooperation tasks,
More informationSocially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach
Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly
More informationThroughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem
Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple
More informationSolution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation
Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University
More informationA Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition
ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural
More informationSPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS
SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS D. Harle, S. Albarrak, F. Ali Department of Electrical and Electronic Engineering, University of Strathclyde, U. K {d.harle,sbarrak,
More informationNew Geometric Interpretation and Analytic Solution for Quadrilateral Reconstruction
New Geometric Interpretation an Analytic Solution for uarilateral Reconstruction Joo-Haeng Lee Convergence Technology Research Lab ETRI Daejeon, 305 777, KOREA Abstract A new geometric framework, calle
More informationFeature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory
Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative
More informationOptical Communications and Networking 朱祖勍. Nov. 27, 2017
Optical Communications and Networking Nov. 27, 2017 1 What is a Core Network? A core network is the central part of a telecommunication network that provides services to customers who are connected by
More informationAn Efficient Algorithm for Virtual-Wavelength-Path Routing Minimizing Average Number of Hops
An Efficient Algorithm for Virtual-Wavelength-Path Routing Minimizing Average Number of Hops Harsha V. Madhyastha Department of Computer Science and Engineering Indian Institute of Technology, Madras Chennai,
More informationA multiple wavelength unwrapping algorithm for digital fringe profilometry based on spatial shift estimation
University of Wollongong Research Online Faculty of Engineering an Information Sciences - Papers: Part A Faculty of Engineering an Information Sciences 214 A multiple wavelength unwrapping algorithm for
More informationOn the Feasibility and Efficacy of Protection Routing in IP Networks
University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering 2-0-2009 On the Feasibility an Efficacy of Protection Routing in IP Networks Kin-Wah
More informationFrequency Domain Parameter Estimation of a Synchronous Generator Using Bi-objective Genetic Algorithms
Proceeings of the 7th WSEAS International Conference on Simulation, Moelling an Optimization, Beijing, China, September 15-17, 2007 429 Frequenc Domain Parameter Estimation of a Snchronous Generator Using
More informationGenetic Fuzzy Logic Control Technique for a Mobile Robot Tracking a Moving Target
.IJCSI.org 67 Genetic Fuzzy Logic Control Technique for a Mobile Robot Tracking a Moving Target Karim Benbouaballah an Zhu Qi-an College of Automation, Harbin Engineering University Harbin, 151, China
More informationBIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES
BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations
More informationAnalysis and Algorithms for Partial Protection in Mesh Networks
Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu Aradhana Narula-Tam MIT
More informationWDM Network Provisioning
IO2654 Optical Networking WDM Network Provisioning Paolo Monti Optical Networks Lab (ONLab), Communication Systems Department (COS) http://web.it.kth.se/~pmonti/ Some of the material is taken from the
More informationA Hierarchical P2PSIP Architecture to support Skype-like services
A Hierarchical P2PSIP Architecture to support Skype-like services Isaias Martinez-Yelmo, Carmen Guerrero, Ruben Cuevas Departamento e Ingeniería Telemática Universia Carlos III e Mari Av. Universia 30.
More informationIntensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2
This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar
More informationAdjusted Probabilistic Packet Marking for IP Traceback
Ajuste Probabilistic Packet Marking for IP Traceback Tao Peng, Christopher Leckie, an Kotagiri Ramamohanarao 2 ARC Special Research Center for Ultra-Broaban Information Networks Department of Electrical
More informationUninformed search methods
CS 1571 Introuction to AI Lecture 4 Uninforme search methos Milos Hauskrecht milos@cs.pitt.eu 539 Sennott Square Announcements Homework assignment 1 is out Due on Thursay, September 11, 014 before the
More informationCoordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks
Coorinating Distribute Algorithms for Feature Extraction Offloaing in Multi-Camera Visual Sensor Networks Emil Eriksson, György Dán, Viktoria Foor School of Electrical Engineering, KTH Royal Institute
More informationResearch Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks
Hinawi Publishing Corporation International Journal of Distribute Sensor Networks Volume 2014, Article ID 936379, 17 pages http://x.oi.org/10.1155/2014/936379 Research Article REALFLOW: Reliable Real-Time
More informationPerformance Modelling of Necklace Hypercubes
erformance Moelling of ecklace ypercubes. Meraji,,. arbazi-aza,, A. atooghy, IM chool of Computer cience & harif University of Technology, Tehran, Iran {meraji, patooghy}@ce.sharif.eu, aza@ipm.ir a Abstract
More informationEDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks
sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun
More informationDistributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs
IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,
More informationDual Arm Robot Research Report
Dual Arm Robot Research Report Analytical Inverse Kinematics Solution for Moularize Dual-Arm Robot With offset at shouler an wrist Motivation an Abstract Generally, an inustrial manipulator such as PUMA
More informationInterior Permanent Magnet Synchronous Motor (IPMSM) Adaptive Genetic Parameter Estimation
Interior Permanent Magnet Synchronous Motor (IPMSM) Aaptive Genetic Parameter Estimation Java Rezaie, Mehi Gholami, Reza Firouzi, Tohi Alizaeh, Karim Salashoor Abstract - Interior permanent magnet synchronous
More informationSkyline Community Search in Multi-valued Networks
Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h
More informationComparison of Methods for Increasing the Performance of a DUA Computation
Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,
More informationRough Set Approach for Classification of Breast Cancer Mammogram Images
Rough Set Approach for Classification of Breast Cancer Mammogram Images Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative Methos an Information Systems
More informationDistributed Clustering Method for Large-Scaled Wavelength Routed Networks
Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Yukinobu Fukushima Graduate School of Information Science and Technology, Osaka University - Yamadaoka, Suita, Osaka 60-08, Japan
More informationAn Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach
An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach Nishi Sharma, Vanna Verma Abstract Wireless sensor networks (WSNs) is one of the emerging fiel of research in recent era
More information