Path-Based Protection for Surviving Double-Link Failures in Mesh-Restorable Optical Networks

Size: px
Start display at page:

Download "Path-Based Protection for Surviving Double-Link Failures in Mesh-Restorable Optical Networks"

Transcription

1 Path-Based Protection for Surviving Doube-Link Faiures in Mesh-Restorabe Optica Networks Wensheng He and Arun K. Somani Dependabe Computing and Networking Laboratory Department of Eectrica and Computer Engineering Iowa State University Ames, Iowa Emai: Abstract we consider path-based protection methods for twoink faiures in mesh optica networks. Two ink-disjoint backup paths are pre-computed for each source and destination node pair. We identify the scenarios where the backup paths can share their waveengths without vioating 100% restoration guarantee (backup mutipexing). We use integer programming to optimize the tota capacity requirement for both dedicatedand shared-path protection schemes. Our resuts indicate that backup mutipexing significanty improves the efficiency of tota capacity utiization. For the randomy generated demand sets, the shared-path scheme provides up to 37.5% saving in tota capacity utiization over dedicated-path scheme. Backup mutipexing provides more saving for the demand set that has connection requests distributed more eveny. For the doube ink faiure recovery methods, path-based methods are more efficient in capacity utiization than ink-based methods. Dedicated-path scheme performs better than shared-ink scheme in tota capacity utiization on average. I. INTRODUCTION A-optica networks empoying dense waveength division mutipexing (DWDM) have fundamentay changed the economics of transport networking, as they can effectivey satisfy the growing demand for bandwidth. A WDM optica network consists of a set of waveength cross-connects interconnected by point-to-point fiber inks. A waveength-seective crossconnect (WSXC) is capabe of opticay switching an optica signa from an incoming fiber to an outgoing fiber on the same waveength. Unike a WSXC, a waveength-interchange cross-connect (WISC) is capabe of changing the waveength of an incoming signa by using waveength converters. In the absence of converters, the same waveength has to be assigned on a inks aong the route. In this work, we assume that there is no waveength transation in the network. WDM networks are prone to component faiures, and the faiures woud cause catastrophic effects due to the high voume of traffic. The protection methods for surviving ink faiures in mesh-based networks can be cassified by their route computation and execution mechanisms as centraized or distributed, by their re-routing as path- or ink-based, by their computation timing as pre-computed or rea time, and by their capacity sharing as dedicated or shared [1][2][3]. There has been some research in surviving two-ink faiures. The probem of spare-channe design schemes for a sef-heaing network in the case of doube ink faiures was soved using inear programming method in [4]. In [5], the two-ink faiures restorabiity of mesh networks designed to fuy restore any singe ink faiure was studied by experimenta computationa approach. Three ink-based protection methods were presented in [6]. In [7], three different modes were deveoped to address the design of the networks for surviving dua faiures. In our previous study[8], backup mutipexing technique was deveoped for ink-based protection methods in the case of doube-ink faiures. The tota capacity for providing 100% protection was optimized. In this work, we present a pathbased doube-ink faiure recovery mode. We first show that sharing backup resources among backup paths is possibe, and then deveop the rues to identify the scenarios when the sharing of backup capacity wi not vioate 100% restoration guarantee. We formuate the optimization of the tota capacity utiization as an Integer Linear Programming (ILP) probem. Our resuts demonstrate the significant saving in tota capacity by empoying backup mutipexing technique. II. DOUBLE-LINK FAILURE RECOVERY MODEL AND BACKUP MULTIPLEXING A. Doube-Link Faiure Recovery Mode We consider a centraized recovery mode with 100% restoration guarantee against any arbitrary two-ink faiures. The network is represented by a directed graph. For the graph to remain connected when two edges fai, the graph must be 3-connected. We assume this is the case. To provide 100% protection against any two-ink faiures, two inkdisjoint backup paths must be provided for each s-d pair. We assume that both inks fai simutaneousy (the mode aso works for the scenario when the second ink fais during the physica repair of first faied ink). We assume that each path, primary or backup, aways accommodates an OAM (operation, administration, and maintenance) channe terminated at the same s-d pair as the path. When a primary path fais, an aarm indication signa is generated by the node that detects the ink faiure and is transferred over OAM channe. When the source receives the aarm signa in its OAM channe, it prepares to set up the first backup path. The first backup path may aso fai due to another ink faiure. Therefore, run time search is needed. Run time search aso detects if the backup capacity on the first backup path is not avaiabe due to the sharing, in the case of shared-path scheme (detaied in the foowing). If the source detects the above scenarios using run time search, it wi prepare to set up the second backup path; otherwise, it wi use the first backup path to reroute the traffic on the primary. The backup paths may or may not use the same waveength as the primary path.

2 B. Backup Mutipexing Reserving dedicated capacity on two backup paths for every primary path, however, coud reserve excessive capacity in some situations. Fig.1 depicts an exampe to iustrate this probem. Suppose paths and are 2 Fig A 5-node 8-ink network two primary paths p and r. 1 2 and are two backup paths for p, denoted as b p1, b p and are two backup paths for r, denoted as b r1, b r2. The ony faiure scenario that coud cause two primary paths to go down simutaneousy is when one of inks on p, and one of the inks on r fai at the same time. b p1 and b r1 can be used to reroute the working traffic on p and r, respectivey. Thus b p2 and b r2 wi not be used at the same time for a possibe two-ink faiures, therefore they can share backup capacity for primary p and r on ink (4,2). On the other hand, backup capacity sharing is not aways aowed if we want to provide 100% restoration guarantee against any two-ink fais. Suppose the other two primary paths p and r are and 4 5 1, respectivey. The two backup paths for p are, b p1 : 2 1, and b p2 : The two backup paths for r are, b r1 : 4 2 1, b r2 : Since p and b r2 have shared inks, and so do r and b p2, the faiure of one ink on p coud cause b r2 to fai, and the faiure of one ink on r coud cause b p2 to fai. If the above scenario occurs, b p1 and b r1 wi be used to reroute the primary traffic on p and r, respectivey. Therefore they must not share backup capacity even if they have common ink (2,1). Now we summarize the backup mutipexing rues. 1) Primary p and r are ink-disjoint: Tabe I case 1-6 summarize the topoogy reationships and backup capacity sharing constraint. The foowing notations and equations are used to express the topoogy reations and backup capacity sharing constraint. 1) p r = φ: primary path p and r are ink-disjoint; otherwise, they have shared ink(s). 2) BC(b pi ): backup capacity reserved on backup path b pi. 3) BC(b pi ) BC(b r ) = φ: backup paths b pi and b r must not share backup capacity on their common ink(s). 2) Primary p and r are not ink-disjoint: In addition to the above constraint, the faiure of the shared ink of p and r wi cause both p and r to go down simutaneousy. The worst-case scenario is that one of the backup paths of p and one of the backup paths of r aso have a common ink and that ink aso fais, causing these two backup paths to fai at the same time. If the above faiure scenario occurs, the other backup paths of p and r wi be used to reroute the primary traffic on p and r, 5 respectivey. Therefore they must not share backup capacity. This scenario is summarized in case 7 of Tabe I. TABLE I THE TOPOLOGY RELATIONSHIPS, FAILURE SCENARIOS AND BACKUP CAPACITY SHARING CONSTRAINT Primary paths Backup-primary, backup-backup Backup capacity topoogy topoogy reationships sharing constraints reationships p r = φ 1. b pi r φ, b r p φ, BC(b pi) BC(b r ) i and {1, 2} = φ 2. b pi r φ, b r p = φ, BC(b pi) BC(b r ) b rm p φ, = φ i,, and m {1, 2}, m 3. b pi r = φ, b pj r φ, BC(b pi) BC(b r ) b r p = φ, b rm p φ, = φ i, j,, and m {1, 2}, i j, m 4. b pi r = φ, b r p = φ, BC(b pj) BC(b r ) b rm p φ, = φ, j = 1 or 2 i,, and m {1, 2}, m 5. b pi r = φ, b r p φ, BC(b pj) BC(b r ) i and {1, 2} = φ, j = 1 or 2 6. b pi r = φ, b r p = φ, BC(b pj) BC(b rm) i and {1, 2} = φ, j = 1 or 2, m = 1 or 2 p r φ In addition to the above BC(b pj) BC(b rm) primary- and backup cases, = φ, j and m there is one backup -backup {1,2}, j i, m reationship we need to consider 7. b pi b r = φ, i, {1, 2} III. PROBLEM FORMULATION In this section, we deveop the ILP formuation to optimize the capacity utiization for both shared- and dedicated-path protection schemes. A. Route Choices for Primary and Backup Paths For the ILP to optimize the capacity utiization, a set of aternate routes for each node pair need to be provided as given information to the ILP. Eigibe routes can be determined by using hop-imit and distance-imit[7]. The number of equations for the ILP grows rapidy as the number of eigibe routes increases, especiay in the case of existence of waveength continuity constraint. In this work, three successive shortest ink-disjoint routes for each node pair are pre-computed and this information is given to ILP. We are working to find the heuristics to reduce the compexity of ILPs caused by using more aternate routes and hope to present them in the future. B. Probem Formuations We assume the foowing information is given: (a) the network topoogy represented as a directed graph G, (b) a demand matrix, and (c) aternate routing tabes at each node. Each of the three aternate routes between a s-d pair is viewed as W (number of waveengths avaiabe on the ink) waveength continuous paths, and therefore, we do not have an expicit constraint for waveength continuity. Our objective is to minimize the tota number of waveengths used on a the inks in the network (for both the primary and backup paths), measured by number of waveength-inks. 1 waveength-ink is a waveength used on a ink. We first define the notations used in ILPs. = 1, 2..., L: Number assigned to each ink

3 = 1, 2..., W : Number assigned to each waveength i, j = 1, 2..., N(N 1): Number assigned to s-d pair K = 3: Number of aternate routes between s-d pair p, r = 1, 2,..., : Number assigned to a path (i, p) : Refers to the pth path for s-d pair i d i : Demand for node pair i δ i,p : It takes a vaue one if (i, p) is chosen as a primary path, zero otherwise (binary variabe) ν j,r : It takes a vaue one if (j, r) is chosen as a restoration path, zero otherwise (binary variabe) ɛ i,p : Link indicator, which takes a vaue one if ink is used in path (i, p), zero otherwise (data) : Waveength indicator, which takes a vaue one if is used by the path (i, p), zero otherwise (data) g, : It takes a vaue one if waveength is used by some restoration routes that traverses ink (binary variabe) s : Number of waveengths used by backup ightpaths, which pass through ink (variabe) w : Number of waveengths used by primary ightpaths, which pass through ink (variabe) I (i,p)(j,r) : It takes a vaue one if paths (i, p) and (j, r) share ink(s), zero otherwise. If i = j, then p q (data) α (i,p)(j,r) : The number of shared inks between paths (i, p) and (j, r) (data) ψ i,p 1) ILP1: Dedicated-Path Protection: Objective: Minimize Subject to w = s = L (w + s ) (1) =1 w + s W 1 L (2) δ i,p = d i 1 i N(N 1) (3) ψ i,p 1 L (4) 1 L (5) + j=1 ν j,r ɛ j,r ψ j,r 1 (6) 1 L, 1 W Demand constraint for node pair i There are two restoration routes for each primary ca. Let x, y, z { 0, 1, 2} and x y z; t, u, v {x,y,z}, t u v: (t+1)w p=tw +1 δ i,p + (u+1)w p=uw +1 δ i,p = (v+1)w r=vw +1 1 i (N 1) ν i,r (7) 2) ILP2: Shared-Path Protection: It has the same objective and constraints (2),(3),(4) and (7) in ILP 1. Equations (8)- (11) are needed to repace equations (5) and (6) to ensure that sharing of backup capacity is aowed. s = W g, 1 L (8) =1 g, (N 1) g, ψ i,p + g, 1 (9) kw 1 L, 1 W ψ i,r (10) ψ i,r (11) For the foowing equations, et m, n {0, 1, 2}; s, s {(m+ 1) mod 3, (m + 2) mod 3}, s s ; t, t {(n + 1) mod 3, (n + 2) mod 3}, t t. X i,m = ν i,mw + i,mw + ψ (12) Constraint for backup mutipexing rues 1, 2 and 3 in Section II-B: if I (i,s)(j,n) = 1, I (i,m)(j,t) = 1 and I (i,s )(j,t ) = 1, then X i,s 1 1 i < j N(N 1), 1 W (13) Constraint for backup mutipexing rues 4 and 5 in Section II-B: if I (i,s)(j,n) = 0, I (i,s )(j,n) = 0, I (i,m)(j,t) = 1, I (i,s)(j,t ) = 1 and I (i,s )(j,t ) = 1. α (i,smin)(j,t) = MIN(α (i,s)(j,t ), α (i,s )(j,t )), then X i,smin 1 1 i, j N(N 1), 1 W(14) Constraint for backup mutipexing rue 6 in Section II- B: if I (i,s)(j,n) = 0, I (i,s )(j,n) = 0, I (i,m)(j,t) = 0, I (i,m)(j,t ) = 0, I (i,s)(j,t ) = 1, I (i,s)(j,t) = 1, I (i,s)(j,t ) = 1, I (i,s )(j,t) = 1 and I (i,s )(j,t ) = 1, α (i,smin)(j,tmin) = MIN(α (i,s)(j,t), α (i,s)(j,t ), α (i,s )(j,t), α (i,s )(j,t )), then X i,smin + X j,tmin 1 1 i < j N(N 1), 1 W(15) For foowing constraint, et m, n {0, 1, 2}; s, s {m + 1, m + 2}, s s ; t, t {n + 1, n + 2}, t t. Constraint for rue 7: if I (i,m)(j,n) = 1, I (i,s)(j,t) = 1 and I (i,s )(j,t ) = 1, then X i,s 1 1 i, j N(N 1), 1 W (16) IV. RESULTS AND DISCUSSION We use CPLEX Linear Optimizer to sove the ILPs. We first demonstrate the working of the ILPs using a sma exampe. Then we present the numerica resuts for randomy generated demand matrices on a 11-node network.

4 A. An Iustration Consider the simpe 5-node network of Figure 1 again. Assume that the network has one fiber per ink and 3 waveengths per fiber. Let a node pair (i, j) be numbered sequentiay in the order of i and j, i.e. node pair (1, 2) is numbered 1, node pair (1, 3) is numbered 2, and so on. Assume that each of four node pairs 1 (1,2), 5 (2,1), 13 (4,1), 20 (5,4) have one ightpath request between them. The routes and waveengths of primary and backup ightpaths for the dedicated-path protection (as soved by ILP1), and the shared-path protection (as soved by ILP2) are given in Tabe II. TABLE II THE ROUTES AND WAVELENGTHS OF PRIMARY AND BACKUP PATHS UNDER DEDICATED- AND SHARED-PATH PROTECTION Scheme Node pair Primary ightpath Backup 1 Backup 2 Dedicated 1 (1,2) 3 (1,3,2) 2 (1,5,4,2) 2 5 (2,1) 3 (2,3,1) 1 (2,4,5,1) 3 13 (4,2,1) 1 (4,3,1) 2 (4,5,1) 2 20 (5,4) 3 (5,3,4) 3 (5,1,2,4) 1 Shared 1 (1,3,2) 3 (1,2) 3 (1,5,4,2) 1 5 (2,3,1) 3 (2,1) 3 (2,4,5,1) 3 13 (4,5,1) 2 (4,2,1) 1 (4,3,1) 1 20 (5,3,4) 3 (5,4) 1 (5,1,2,4) 3 In dedicated scheme, each reserved waveength on a backup path is dedicated to a primary path. In contrast, in shared scheme, 3 on inks (5, 1) and (2, 4) is shared by backup paths and on inks (5, 4) is shared by backup paths and on inks (4, 2) is shared by backup paths and on ink (1, 2) is shared by backup paths 1 2 and As stated in section II-B, backup paths 2 1 and can not share backup capacity on their common ink (2, 1) because of backup mutipexing constraint 3 in Tabe I. The routings for the primary paths under dedicated- and shared-path schemes are different, because the routing under the shared-path scheme yieds maximum saving for tota capacity. The shared- and dedicated-path protection schemes use a tota of 19 and 24 waveength-inks for this demand matrix, respectivey. The shared-path protection saves about 21% capacity. In ink-based protection, dedicated- and shared-ink schemes use 28 and 23 waveength-inks, respectivey[8]. B. Resuts on Modified NJ LATA Network We present our soution on a modified NJ LATA network shown in Figure 2. The modifications incude adding inks (1,4) and (4,6), so that the network becomes three connected. We assume the network has one fiber per ink for a optimizations. Three groups of demand sets were generated randomy. Each group consists of 10 sets of demand matrix. We wrote a program to generate each set of demand matrix using the foowing steps. Let T NR denotes the desired tota number of requests, and et MNR denotes the maximum number of requests for any node pair. 1) counter = 0; 2) randomy generate source and destination nodes, and the number of requests for this node pair d i, which is between 1 and MNR; Fig A 11-node 22-ink modified NJ LATA network 3) counter = counter + d i ; 4) if counter < T NR, go to step 2; The T NR for group I, II and III are 40, 60, 100, respectivey. The MNR is 4 for group I, II and III. Assume the number of waveengths per fiber is aways sufficient to obtain the feasibe soution for each scheme. The optimization resuts for group I, II and III are shown in Tabe III, IV and V, respectivey. To study the effect of distribution of connection requests, we generated group IV by setting T NR and MNR to be 60 and 8, respectivey. The optimization resuts for group IV are shown in Tabe VI. In a tabes, we denote waveengthinks by WLS, dedicated-path protection scheme by DPS, and shared-path protection scheme by SPS. TABLE III THE OPTIMIZATION RESULTS FOR REQUEST GROUP I set number Tota WLS WLS Saving Primary Primary of node requests used by used by by SPS by DPS pairs average 27.0 Tabe III shows that for a tota of about 40 requests the shared-path scheme requires between % smaer tota capacity than dedicated-path scheme. For a tota of about 60 connection requests, Tabe IV shows that the shared-path scheme saves between % of the tota capacity. For a tota of about 100 requests, shared-path scheme saves between % of the tota capacity, as shown in Tabe V. We cacuated the capacity used by primary paths for group II, shown in coumns 7 and 8 of Tabe III. Resuts show that the average primary capacity for shared-path scheme is 14% higher than the average primary capacity for the dedicated-path scheme.this is due to the factor that in order to yied more 8 6 4

5 saving by sharing backup capacity, sometimes the shared-path scheme uses a onger primary path than the dedicated-path scheme. TABLE IV THE OPTIMIZATION RESULTS FOR REQUEST GROUP II set number of Tota WLS WLS Saving node pairs requests used by used by average TABLE V THE OPTIMIZATION RESULTS FOR REQUEST GROUP III set number of Tota WLS WLS Saving node pairs requests used by used by average 32.3 TABLE VI THE OPTIMIZATION RESULTS FOR REQUEST GROUP IV request number of Tota WLS WLS Saving set node pairs requests used by used by average 23.0 Among groups I to III, The group III obtains the most average saving and group I gets the east average saving in the tota capacity. This is due to the fact that the number of node pairs in the demand matrix increases from group I to III as T N R increases from group I to III. This eads to more sharing in backup capacity. The group II gets more average saving than group IV, which has same number of T NR, but smaer number of node pairs compared to group II. This suggests that the demand matrix with connection requests distributed more eveny (as in the case in group III) wi have more chances to share backup capacity, thus saves more in tota capacity. We conducted optimization for group I, with both dedicatedand shared-ink methods presented in [8]. The resuts are summarized in Tabe VII (SLS:shared-ink scheme; DLS:dedicated-ink scheme). Comparison between the resuts in Tabe III and Tabe VII shows that the path-based methods are more efficient in the tota capacity utiization than the inkbased methods, and on average, the dedicated-path scheme yieds better performance than share-ink scheme. There are no feasibe soutions for some of the demand matrices in dedicated-ink scheme. It is due to the fact that in the inkbased methods, the backup paths have to use the same waveength as the primary paths and in the dedicated-ink scheme, it is easy for conficts to occur between the two backup paths for the two inks on the same primary path. TABLE VII THE OPTIMIZATION RESULTS FOR REQUEST GROUP I request number of Tota WLS WLS Saving set node pairs requests used by used by SLS DLS infeasibe NA infeasibe NA infeasibe NA infeasibe NA infeasibe NA infeasibe NA infeasibe NA V. CONCLUSION We presented a path-based doube-ink faiure recovery mode, in which two backup paths are provided for each node pair and resources are reserved for each connection. We deveoped the rues for identifying the scenarios when backup paths can share their backup capacity without vioating 100% restoration guarantee. The shared-path scheme provides significant tota capacity saving (up to 37.5%). We aso found that the backup mutipexing provides more saving for the demand sets that distribute the connection requests more eveny. For the doube-ink faiure recovery methods, path-based methods are more efficient in tota capacity utiization than ink-based methods. Dedicated-path scheme performs better than sharedink scheme in tota capacity utiization on average. REFERENCES [1] T.H. Wu, Fiber Network Service Survivabiity, Norwood, MA: Artech House, [2] S. Ramamurthy and B. Mukherjee, Survivabe wdm mesh networks, part i:protection, IEEE INFOCOM, vo. 2, pp , March [3] B.T. Doshi, S. Dravida, P. Harshavardhana, O. Hauser, and Y. Wang optica network design and restoration, Be Labs Technica Journa, pp , January-March [4] H. Sakauchi, Y. Okanoue, and S. Hasegawa, Spare-channe design schemes for sef-heaing networks, IEICE Trans. Comm., Vo. E75-B, no.7, PP , Juy [5] M. Couqueur, and W.D.Grove, Computationa and design studies on the unavaiabiity of mesh-restorabe networks, Proc. IEEE/VDE Design of Reiabe Communication Networks 2000, pp , Apri [6] H. Choi, S. Subramaniam, and H.A. Choi, On doube-ink faiure recovery in wdm optica networks, IEEE INFOCOM, pp , June [7] M. Couqueur and Wayne D. Grove, Mesh-restorabe networks with compete dua faiure restorabiity and with seectivey enhanced duafaiure restorabiity properties, Proc. SPIE vo.4874, pp. 1-12, Juy [8] W. He, M. Sridharan and A. K. Somani, Capacity optimization for toerating doube ink faiures in WDM mesh optica networks, Proc. SPIE vo. 4874, pp , Juy 2002.

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah Journa of Lightwave Technoogy Page of CFP: Cooperative Fast Protection Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapocai and Hussein T. Mouftah Abstract We introduce a nove protection scheme, caed Cooperative

More information

Split Restoration with Wavelength Conversion in WDM Networks*

Split Restoration with Wavelength Conversion in WDM Networks* Spit Reoration with aveength Conversion in DM Networks* Yuanqiu Luo and Nirwan Ansari Advanced Networking Laborator Department of Eectrica and Computer Engineering New Jerse Initute of Technoog Universit

More information

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) botton@poms.uc.ac.be Bernard

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

On Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture

On Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture On inding the est Partia Muticast Protection Tree under ua-homing rchitecture Mei Yang, Jianping Wang, Xiangtong Qi, Yingtao Jiang epartment of ectrica and omputer ngineering, University of Nevada Las

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

PAPER Delay Constrained Routing and Link Capacity Assignment in Virtual Circuit Networks

PAPER Delay Constrained Routing and Link Capacity Assignment in Virtual Circuit Networks 2004 PAPER Deay Constrained Routing and Link Capacity Assignment in Virtua Circuit Networks Hong-Hsu YEN a), Member and FrankYeong-Sung LIN b), Nonmember SUMMARY An essentia issue in designing, operating

More information

International Journal of Electronics and Communications (AEÜ)

International Journal of Electronics and Communications (AEÜ) Int. J. Eectron. Commun. (AEÜ) 67 (2013) 470 478 Contents ists avaiabe at SciVerse ScienceDirect Internationa Journa of Eectronics and Communications (AEÜ) journa h o me pa ge: www.esevier.com/ocate/aeue

More information

Alternate Paths for Multiple Fault Tolerance on Dynamic WDM Optical Networks

Alternate Paths for Multiple Fault Tolerance on Dynamic WDM Optical Networks Aternate Paths for Mutipe Faut Toerance on Dynamic WDM Optica Networks Nicoas Jara, Reinado Vaejos, Gerardo Rubino To cite this version: Nicoas Jara, Reinado Vaejos, Gerardo Rubino. Aternate Paths for

More information

Fast and effective dimensioning algorithm for end-toend optical burst switching networks with ON-OFF traffic model

Fast and effective dimensioning algorithm for end-toend optical burst switching networks with ON-OFF traffic model Fast and effective dimensioning agorithm for end-toend optica burst switching networks with ON-OFF traffic mode Reinado Vaejos 1, Aejandra Zapata 1, Marco Aravena 2,1 1 Teematics Group, Eectronic Engineering

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,

More information

Archive Software with value add services:

Archive Software with value add services: E-Mai Archive Software with vaue add services: Protect your emais from data oss through reasonabe and secure backup features. Increase the productivity of your team by using the integrated search engine

More information

A Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks

A Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks Sensors 2013, 13, 16424-16450; doi:10.3390/s131216424 Artice OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journa/sensors A Near-Optima Distributed QoS Constrained Routing Agorithm for Mutichanne Wireess

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs Repication of Virtua Network Functions: Optimizing Link Utiization and Resource Costs Francisco Carpio, Wogang Bziuk and Admea Jukan Technische Universität Braunschweig, Germany Emai:{f.carpio, w.bziuk,

More information

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network Service Chain (SC) Mapping with Mutipe SC Instances in a Wide Area Network This is a preprint eectronic version of the artice submitted to IEEE GobeCom 2017 Abhishek Gupta, Brigitte Jaumard, Massimo Tornatore,

More information

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:

More information

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Y.LI AND B.BHANU CAMERA ASSIGNMENT: A GAME-THEORETIC

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

DYNAMIC ROUTING WITH PARTIAL INFORMATION IN MESH-RESTORABLE OPTICAL NETWORKS *

DYNAMIC ROUTING WITH PARTIAL INFORMATION IN MESH-RESTORABLE OPTICAL NETWORKS * DYNAMIC ROUTING WITH PARTIAL INFORMATION IN MESH-RESTORABLE OPTICAL NETWORKS * Murari Sridharan, R. Srinivasan and Arun K. Somani Dependable Computing & Networking Laboratory Department of Electrical and

More information

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y. FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four

More information

Outerjoins, Constraints, Triggers

Outerjoins, Constraints, Triggers Outerjoins, Constraints, Triggers Lecture #13 Autumn, 2001 Fa, 2001, LRX #13 Outerjoins, Constraints, Triggers HUST,Wuhan,China 358 Outerjoin R S = R S with danging tupes padded with nus and incuded in

More information

Complex Human Activity Searching in a Video Employing Negative Space Analysis

Complex Human Activity Searching in a Video Employing Negative Space Analysis Compex Human Activity Searching in a Video Empoying Negative Space Anaysis Shah Atiqur Rahman, Siu-Yeung Cho, M.K.H. Leung 3, Schoo of Computer Engineering, Nanyang Technoogica University, Singapore 639798

More information

A Petrel Plugin for Surface Modeling

A Petrel Plugin for Surface Modeling A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica

More information

A Scalable Approach for Service Chain (SC) Mapping with Multiple SC Instances in a Wide-Area Network

A Scalable Approach for Service Chain (SC) Mapping with Multiple SC Instances in a Wide-Area Network JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 A Scaabe Approach for Service Chain (SC) Mapping with Mutipe SC Instances in a Wide-Area Network This is a preprint eectronic version of the

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

Design of IP Networks with End-to. to- End Performance Guarantees

Design of IP Networks with End-to. to- End Performance Guarantees Design of IP Networks with End-to to- End Performance Guarantees Irena Atov and Richard J. Harris* ( Swinburne University of Technoogy & *Massey University) Presentation Outine Introduction Mutiservice

More information

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

Automatic Grouping for Social Networks CS229 Project Report

Automatic Grouping for Social Networks CS229 Project Report Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

CENTRE DE RECHERCHE INSTITUT DES SCIENCES DE L INGÉNIEUR

CENTRE DE RECHERCHE INSTITUT DES SCIENCES DE L INGÉNIEUR CENTRE DE RECHERCHE INSTITUT DES SCIENCES DE L INGÉNIEUR Rapport de recherche CR-ISCI-2005-1 Shared Path Protection in Muti-domain Optica Mesh Networks B. Thiongane D.L. Truong Centre de Recherche - ISCI

More information

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Nattawut Thepayasuwan, Member, IEEE and Aex Doboi, Member, IEEE Abstract

More information

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models On Upper Bounds for Assortment Optimization under the Mixture of Mutinomia Logit Modes Sumit Kunnumka September 30, 2014 Abstract The assortment optimization probem under the mixture of mutinomia ogit

More information

Traffic Engineering for Provisioning Restorable Hose-Model VPNs

Traffic Engineering for Provisioning Restorable Hose-Model VPNs Traffic Engineering for Provisioning Restorabe Hose-Mode VPNs Yu-Liang Liu, Nonmember, Yeai S. Sun a) and Meng Chang Chen b), Member Summary Virtua Private Networks (VPNs) are overay networks estabished

More information

Survivable WDM Mesh Networks

Survivable WDM Mesh Networks 870 JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 21, NO. 4, APRIL 2003 Survivable WDM Mesh Networks S. Ramamurthy, Laxman Sahasrabuddhe, Member, IEEE, and Biswanath Mukherjee, Member, IEEE Abstract In a wavelength-division-muliplexing

More information

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing An Adaptive Two-Copy Deayed SR-ARQ for Sateite Channes with Shadowing Jing Zhu, Sumit Roy zhuj@ee.washington.edu Department of Eectrica Engineering, University of Washington Abstract- The paper focuses

More information

BGP ingress-to-egress route configuration in a capacityconstrained Asia-Pacific Conference On Communications, 2005, v. 2005, p.

BGP ingress-to-egress route configuration in a capacityconstrained Asia-Pacific Conference On Communications, 2005, v. 2005, p. Tite BGP -to- route configuration in a capacityconstrained AS Author(s) Chim, TW; Yeung, KL; Lu KS Citation 2005 Asia-Pacific Conference On Communications, 2005, v. 2005, p. 386-390 Issued Date 2005 URL

More information

Fault-Tolerant Design of Wavelength-Routed Optical. Networks. S. Ramamurthy and Biswanath Mukherjee

Fault-Tolerant Design of Wavelength-Routed Optical. Networks. S. Ramamurthy and Biswanath Mukherjee DIMACS Series in Discrete Mathematics and Theoretical Computer Science Fault-Tolerant Design of Wavelength-Routed Optical Networks S. Ramamurthy and Biswanath Mukherjee Abstract. This paper considers optical

More information

Endoscopic Motion Compensation of High Speed Videoendoscopy

Endoscopic Motion Compensation of High Speed Videoendoscopy Endoscopic Motion Compensation of High Speed Videoendoscopy Bharath avuri Department of Computer Science and Engineering, University of South Caroina, Coumbia, SC - 901. ravuri@cse.sc.edu Abstract. High

More information

Reference trajectory tracking for a multi-dof robot arm

Reference trajectory tracking for a multi-dof robot arm Archives of Contro Sciences Voume 5LXI, 5 No. 4, pages 53 57 Reference trajectory tracking for a muti-dof robot arm RÓBERT KRASŇANSKÝ, PETER VALACH, DÁVID SOÓS, JAVAD ZARBAKHSH This paper presents the

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM JOINT IMAGE REGISTRATION AND AMPLE-BASED SUPER-RESOLUTION ALGORITHM Hyo-Song Kim, Jeyong Shin, and Rae-Hong Park Department of Eectronic Engineering, Schoo of Engineering, Sogang University 35 Baekbeom-ro,

More information

Research of Classification based on Deep Neural Network

Research of  Classification based on Deep Neural Network 2018 Internationa Conference on Sensor Network and Computer Engineering (ICSNCE 2018) Research of Emai Cassification based on Deep Neura Network Wang Yawen Schoo of Computer Science and Engineering Xi

More information

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802.

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802. A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irreguar LDPC Codes in the IEEE 82.16e Standards Yeong-Luh Ueng and Chung-Chao Cheng Dept. of Eectrica Engineering,

More information

A probabilistic fuzzy method for emitter identification based on genetic algorithm

A probabilistic fuzzy method for emitter identification based on genetic algorithm A probabitic fuzzy method for emitter identification based on genetic agorithm Xia Chen, Weidong Hu, Hongwen Yang, Min Tang ATR Key Lab, Coege of Eectronic Science and Engineering Nationa University of

More information

TSR: Topology Reduction from Tree to Star Data Grids

TSR: Topology Reduction from Tree to Star Data Grids 03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

Cross-layer Design for Efficient Resource Utilization in WiMedia UWB-based WPANs

Cross-layer Design for Efficient Resource Utilization in WiMedia UWB-based WPANs Cross-ayer Design for Efficient Resource Utiization in WiMedia UWB-based WPANs RAED AL-ZUBI and MARWAN KRUNZ Department of Eectrica and Computer Engineering. University of Arizona. Utra-wideband (UWB)

More information

BGP-Based SPF IETF 96, Berlin. Keyur Patel, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopal, Cisco

BGP-Based SPF IETF 96, Berlin. Keyur Patel, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopal, Cisco BGP-Based SPF IETF 96, Berin Keyur Pate, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopa, Cisco 1 Data Center Routing Routing Probem Space Routing scaing for Massivey Scaabe

More information

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints *

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG

More information

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks Ad Hoc Networks (3) 683 698 Contents ists avaiabe at SciVerse ScienceDirect Ad Hoc Networks journa homepage: www.esevier.com/ocate/adhoc Dynamic agent-based hierarchica muticast for wireess mesh networks

More information

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department

More information

Optimized Base-Station Cache Allocation for Cloud Radio Access Network with Multicast Backhaul

Optimized Base-Station Cache Allocation for Cloud Radio Access Network with Multicast Backhaul Optimized Base-Station Cache Aocation for Coud Radio Access Network with Muticast Backhau Binbin Dai, Student Member, IEEE, Ya-Feng Liu, Member, IEEE, and Wei Yu, Feow, IEEE arxiv:804.0730v [cs.it] 28

More information

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014 5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 014 Topoogy-Transparent Scheduing in Mobie Ad Hoc Networks With Mutipe Packet Reception Capabiity Yiming Liu, Member, IEEE,

More information

THE EXPLOSIVE growth of Web-related services over the. A Practical Approach to Operating Survivable WDM Networks

THE EXPLOSIVE growth of Web-related services over the. A Practical Approach to Operating Survivable WDM Networks 34 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 20, NO. 1, JANUARY 2002 A Practical Approach to Operating Survivable WDM Networks Murari Sridharan, Student Member, IEEE, Murti V. Salapaka, and

More information

Exabyte Tape Drives: Mammoth Technology

Exabyte Tape Drives: Mammoth Technology Exabyte Tape Drives: Mammoth Technoogy January 19, 1999 THIC Meeting at the SEATAC Marriott Seatte WA Key Scharf Exabyte Corp. 1685 38th Street Bouder CO 80301 +1-303-417-7205 emai: key@exabyte.com Mammoth

More information

Automatic Hidden Web Database Classification

Automatic Hidden Web Database Classification Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program? Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of

More information

BEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0

BEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Server Reease Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Tuxedo Connector Reease 1.0 Document Date: June 29, 2001 Copyright Copyright 2001 BEA Systems, Inc. A Rights Reserved. Restricted

More information

Alternative Decompositions for Distributed Maximization of Network Utility: Framework and Applications

Alternative Decompositions for Distributed Maximization of Network Utility: Framework and Applications Aternative Decompositions for Distributed Maximization of Network Utiity: Framework and Appications Danie P. Paomar and Mung Chiang Eectrica Engineering Department, Princeton University, NJ 08544, USA

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

On-Chip CNN Accelerator for Image Super-Resolution

On-Chip CNN Accelerator for Image Super-Resolution On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement

More information

Timing-Driven Hierarchical Global Routing with Wire-Sizing and Buffer-Insertion for VLSI with Multi-Routing-Layer

Timing-Driven Hierarchical Global Routing with Wire-Sizing and Buffer-Insertion for VLSI with Multi-Routing-Layer Timing-Driven Hierarchica Goba Routing with Wire-Sizing and Buffer-Insertion for VLSI with Muti-Routing-Layer Takahiro DEGUCHI y Tetsushi KOIDE z Shin ichi WAKABAYASHI y yfacuty of Engineering, Hiroshima

More information

Chapter 5 Combinational ATPG

Chapter 5 Combinational ATPG Chapter 5 Combinationa ATPG 2 Outine Introduction to ATPG ATPG for Combinationa Circuits Advanced ATPG Techniques 3 Input and Output of an ATPG ATPG (Automatic Test Pattern Generation) Generate a set of

More information

Tutorial 3 Concepts for A1

Tutorial 3 Concepts for A1 CPSC 231 Introduction to Computer Science for Computer Science Majors I Tutoria 3 Concepts for A1 DANNY FISHER dgfisher@ucagary.ca September 23, 2014 Agenda script command more detais Submitting using

More information

An Exponential Time 2-Approximation Algorithm for Bandwidth

An Exponential Time 2-Approximation Algorithm for Bandwidth An Exponentia Time 2-Approximation Agorithm for Bandwidth Martin Fürer 1, Serge Gaspers 2, Shiva Prasad Kasiviswanathan 3 1 Computer Science and Engineering, Pennsyvania State University, furer@cse.psu.edu

More information

Minimizing Resource Cost for Camera Stream Scheduling in Video Data Center

Minimizing Resource Cost for Camera Stream Scheduling in Video Data Center Gao YH, Ma HD, Liu W. Minimizing resource cost for camera stream scheduing in video data center. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 555 570 May 2017. DOI 10.1007/s11390-017-1743-x Minimizing

More information

DISTANCE TRANSFORMATION FOR NETWORK DESIGN PROBLEMS

DISTANCE TRANSFORMATION FOR NETWORK DESIGN PROBLEMS DISTANCE TRANSFORMATION FOR NETWORK DESIGN PROBLEMS A Ridha Mahjoub, Michae Poss, Luidi Simonetti, Eduardo Uchoa To cite this version: A Ridha Mahjoub, Michae Poss, Luidi Simonetti, Eduardo Uchoa. DISTANCE

More information

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES Eya En Gad, Akshay Gadde, A. Saman Avestimehr and Antonio Ortega Department of Eectrica Engineering University of Southern

More information

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing 100039, China shentao@casm.ac.cn Xu Dehe Institute of resources and environment, North

More information

Discrete elastica model for shape design of grid shells

Discrete elastica model for shape design of grid shells Abstracts for IASS Annua Symposium 017 5 8th September, 017, Hamburg, Germany Annette Böge, Manfred Grohmann (eds.) Discrete eastica mode for shape design of grid shes Yusuke SAKAI* and Makoto OHSAKI a

More information

Substitute Model of Deep-groove Ball Bearings in Numeric Analysis of Complex Constructions Like Manipulators

Substitute Model of Deep-groove Ball Bearings in Numeric Analysis of Complex Constructions Like Manipulators Mechanics and Mechanica Engineering Vo. 12, No. 4 (2008) 349 356 c Technica University of Lodz Substitute Mode of Deep-groove Ba Bearings in Numeric Anaysis of Compex Constructions Like Manipuators Leszek

More information

Topics 1. Manipulators and robots

Topics 1. Manipulators and robots Proceedings of the Internationa Symposium of Mechanism and Machine Science, 017 AzCIFToMM Azerbaijan Technica University 11-14 September 017, Baku, Azerbaijan Topics 1. Manipuators and robots Anaysis and

More information

Digital Image Watermarking Algorithm Based on Fast Curvelet Transform

Digital Image Watermarking Algorithm Based on Fast Curvelet Transform J. Software Engineering & Appications, 010, 3, 939-943 doi:10.436/jsea.010.310111 Pubished Onine October 010 (http://www.scirp.org/journa/jsea) 939 igita Image Watermarking Agorithm Based on Fast Curveet

More information

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations Formuation of Loss minimization Probem Using Genetic Agorithm and Line-Fow-based Equations Sharanya Jaganathan, Student Member, IEEE, Arun Sekar, Senior Member, IEEE, and Wenzhong Gao, Senior member, IEEE

More information

Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters

Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters Crossing Minimiation Probems o Drawing Bipartite Graphs in Two Custers Lanbo Zheng, Le Song, and Peter Eades Nationa ICT Austraia, and Schoo o Inormation Technoogies, University o Sydney,Austraia Emai:

More information

Response Surface Model Updating for Nonlinear Structures

Response Surface Model Updating for Nonlinear Structures Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,

More information

Multiple Plane Phase Retrieval Based On Inverse Regularized Imaging and Discrete Diffraction Transform

Multiple Plane Phase Retrieval Based On Inverse Regularized Imaging and Discrete Diffraction Transform Mutipe Pane Phase Retrieva Based On Inverse Reguaried Imaging and Discrete Diffraction Transform Artem Migukin, Vadimir Katkovnik, and Jaakko Astoa Department of Signa Processing, Tampere University of

More information

Genetic Algorithms for Parallel Code Optimization

Genetic Algorithms for Parallel Code Optimization Genetic Agorithms for Parae Code Optimization Ender Özcan Dept. of Computer Engineering Yeditepe University Kayışdağı, İstanbu, Turkey Emai: eozcan@cse.yeditepe.edu.tr Abstract- Determining the optimum

More information

OPTICAL buffering is an important functionality in optical

OPTICAL buffering is an important functionality in optical JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 25, NO. 6, JUNE 2007 1379 Mutipe-Input-Buffer and Shared-Buffer Architectures for Optica Packet- and Burst-Switching Networks Konstantinos Yiannopouos, Kyriakos G.

More information

ABSTRACT WU, KEHANG. Flow Aggregation based Lagrangian Relaxation with. (Under the direction of Professor Douglas S. Reeves)

ABSTRACT WU, KEHANG. Flow Aggregation based Lagrangian Relaxation with. (Under the direction of Professor Douglas S. Reeves) ABSTRACT WU, KEHANG Fow Aggregation based Lagrangian Reaxation with Appications to Capacity Panning of IP Networks with Mutipe Casses of Service (Under the direction of Professor Dougas S. Reeves) Noninear

More information

Research on UAV Fixed Area Inspection based on Image Reconstruction

Research on UAV Fixed Area Inspection based on Image Reconstruction Research on UAV Fixed Area Inspection based on Image Reconstruction Kun Cao a, Fei Wu b Schoo of Eectronic and Eectrica Engineering, Shanghai University of Engineering Science, Abstract Shanghai 20600,

More information

Evolutionary Algorithm Optimization of Edge Delivery Sites in Next Generation Multi-service Content Distribution Networks

Evolutionary Algorithm Optimization of Edge Delivery Sites in Next Generation Multi-service Content Distribution Networks Evoutionary Agorithm Optimization of Edge Deivery Sites in Next Generation Muti-service Content Distribution Networks Ioannis Stephanakis 1 and Dimitrios Logothetis 2 1 Heenic Teecommunication Organization

More information

A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks

A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks Wojciech Molisz and Jacek Rak Gdansk University of Technology, G. Narutowicza 11/12, Pl-8-952 Gdansk, Poland

More information

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong

More information

Absolute three-dimensional shape measurement with two-frequency square binary patterns

Absolute three-dimensional shape measurement with two-frequency square binary patterns 871 Vo. 56, No. 31 / November 1 217 / Appied Optics Research Artice Absoute three-dimensiona shape measurement with two-frequency square binary patterns CHUFAN JIANG AND SONG ZHANG* Schoo of Mechanica

More information

5366 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 10, OCTOBER 2014

5366 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 10, OCTOBER 2014 5366 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 10, OCTOBER 014 Modeing IEEE 80.15.4 Networks Over Fading Channes Piergiuseppe Di Marco, Member, IEEE, Caro Fischione, Member, IEEE, Fortunato

More information

Announcements. Program #2 regrades requests due by 11:00 today HW #2 was collected at the start of class Reading

Announcements. Program #2 regrades requests due by 11:00 today HW #2 was collected at the start of class Reading Announcements Program #2 regrades requests due by 11:00 today HW #2 was coected at the start of cass Reading Today: 6.3-6.4 Thursday: 3.1 CMSC 417 - F97 (ect 16) copyright 1997 Jeffrey K. Hoingsworth 1

More information

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study

More information

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER Internationa Journa on Technica and Physica Probems of Engineering (IJTPE) Pubished by Internationa Organization of IOTPE ISSN 077-358 IJTPE Journa www.iotpe.com ijtpe@iotpe.com September 014 Issue 0 Voume

More information

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions 2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing

More information

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal Abstract Authorization of a QoS Path based on Generic Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taa Advanced Internet Research Group, Department of Computer Science, University of Amsterdam.

More information

Revisions for VISRAD

Revisions for VISRAD Revisions for VISRAD 16.0.0 Support has been added for the SLAC MEC target chamber: 4 beams have been added to the Laser System: X-ray beam (fixed in Port P 90-180), 2 movabe Nd:Gass (ong-puse) beams,

More information

FOR SERVICE TECHNICIAN S USE ONLY

FOR SERVICE TECHNICIAN S USE ONLY W10600683C Assemby: W10611974 FOR SERVICE TECHNICIAN S USE ONLY NOTE: This sheet contains important Technica Service Data. Tech Sheet Do Not Remove Or Destroy DANGER Eectrica Shock Hazard Ony authorized

More information