Cooperative Coverage Extension for Relay-Union Networks

Size: px
Start display at page:

Download "Cooperative Coverage Extension for Relay-Union Networks"

Transcription

1 1.119/TPDS , IEEE Transations on Parallel and Distributed Systems IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 1 Cooperative Coverage Extension for Relay-Union Networks Yong Cui, Xiao Ma, Xiuzhen Cheng, Minming Li, Jianghuan Liu, Tianze Ma, Yihua Guo, and Biao Chen Abstrat Multi-hop overage extension an be utilized as a feasible approah to failitating unovered users to get Internet servie in publi area WLANs. In this paper we introdue a Relay-Union Network (RUN), whih refers to a publi area WLAN in whih users often wander in the same area and have the ability to provide data forwarding servies for others. We develop a RUN framework to model the ost of providing forwarding servies and the utility obtained by gaining servies. The objetive of the RUN is to maximize the total Quality of Cooperation (QoC) of users among RUN. Two optimal bandwidth alloation shemes are proposed for both free and dynami bandwidth demand models. To make our sheme more pragmati, we then onsider a more pratial senario in whih the bandwidth apaity of the relays and the minimum demand of the lients are bounded. We prove that the problems under both the single relay and the multi-relay senario are NP-hard. Three heuristi algorithms are proposed to deal with bandwidth alloation and relay-lient assoiation. We also propose a distributed signaling protool and divide the entralized MRMC algorithm into three distributed ones to better adapt for real network environment. Finally, extensive simulations demonstrate that our RUN framework an signifiantly improve the effiieny of ooperation in the long term. Index Terms Coverage extension, relay-union network, bandwidth alloation, assoiation, ooperative. 1 INTRODUCTION APubli area WLAN often has a relatively fixed user group suh as students of a lassroom building. Sometimes a user does not have Internet aess due to limited AP overage, poor signal strength, or authentiation failure. Multi-hop aess is a feasible approah to failitate these users to employ other online users as relays for data forwarding [1] [5]. In this paper, we propose a Relay-Union Network (RUN), whih ontains a union of lients that often wander in the same publi area and sometimes provide data forwarding for others. In a RUN, at any moment, a fration of the union members with diret AP onnetions play the role of relays and offer forwarding servies to others. In RUN, servie demands of the lients may be different from eah other and vary from time to time. To haraterize the satisfation degree of a lient on the obtained forwarding servie, we employ a utility funtion as a metri in our model. Sine providing forwarding servies for others may have negative impat on the relay s own Yong Cui, Xiao Ma, Tianze Ma and Yihua Guo are with the Department of Computer Siene and Tehnology, Tsinghua University, Beijing, P. R. China. uiyong@tsinghua.edu.n (Yong Cui), max11@mails.tsinghua.edu.n (Xiao Ma), mtz4@mails.tsinghua.edu.n (Tianze Ma), guo-yh8@mails.tsinghua.edu.n (Yihua Guo). Xiuzhen Cheng is with the Department of Computer Siene, The George Washington University, Washington, DC 252, USA, and College of Computer and Information Sienes, King Saud University, Riyadh, Saudi Arabia. heng@gwu.edu. Minming Li is with the Department of Computer Siene, City University of Hong Kong. minming.li@ityu.edu.hk. Jianghuan Liu is with the Shool of Computing Siene at Simon Fraser University, British Columbia, Canada. jliu@s.sfu.a. Biao Chen is with the Department of Computer Information Siene, University of Maau, Maau, P. R. China. bhen@uma.mo. This work is supported by the 973 Program of China (29CB3253,211CB328), the NSF of China ( ), the NSF of the United States (CNS ), and the NPST program by King Saud University (Projet No. 1-INF1184-2). performane (e.g. battery power, CPU resoure), we also onsider a relay ost funtion in our RUN framework. As all the members in a RUN take the role of relay from time to time, all users mutually benefit from eah other in the long term. In this paper, we first propose a Quality of Cooperation (QoC) model that inludes a lient utility funtion and a relay ost funtion, based on whih the QoC of a relay and a lient an be well defined. Next we point out that the utoff bandwidth alloation is a ruial issue in our strategy through analyzing the relationship between the bandwidth and the QoC. Optimal bandwidth alloation shemes are then proposed for two bandwidth demand models. Following that we onsider a more pratial senario in whih the relay s bandwidth apaity and the lient s minimum bandwidth demand are respetively upper and lower bounded. We then propose three heuristi algorithms, with two targeting on Single- Relay Multi-Client (SRMC) for bandwidth alloation, and the other one targeting on Multi-Relay Multi-Client (MRMC) for both lient-relay assoiation and bandwidth alloation. Finally we introdue a distributed dynami mehanism of MRMC (D 2 MRMC), whih onsists of a distributed signaling protool and several distributed algorithms to handle the dynami senarios of MRMC. Finally, extensive simulation study is performed, and the results indiate that our framework an signifiantly improve the total QoC of RUN. The rest of the paper is organized as follows. Setion 2 presents the related researh. Setion 3 introdues the QoC model and the related definitions. The solutions for single-relay multi-lient and multi-relay multi-lient are investigated in Setion 4 and 5, respetively. The distributed MRMC mehanism and the omparison between MRMC and D 2 MRMC are proposed in Setion 6. The simulation study is inluded in Setion 7. Finally in () 213 IEEE. Personal use is permitted, but republiation/redistribution requires IEEE permission. See

2 1.119/TPDS , IEEE Transations on Parallel and Distributed Systems IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 2 Setion 8 we onlude the paper. 2 RELATED WORK There has been an inreasing interest in enhaning the overage and onnetivity of wireless networks [1], [2], [5] [9]. Multihop-relaying is usually employed to enhane the transmission performane of primary users (PUs) by seleting seondary users (SUs) as relays in Cognitive Radio Networks (CRNs) [1], [2]. Wang et al. [5] investigate a onnetivity-enhaning mehanism for large-sale wireless sensor and ad ho networks by introduing k-hop lustering. Syue et al. [7] investigate radio overage extension in physial layer, and fous on finding the impat of physial-layer ooperation on the network-layer routing design. Guizani et al. [8] leverage a ross-layer approah to enourage potential relaying nodes to provide servies for others. These existing mehanisms not only extend the wireless overage area, but also aim to enhane the QoS by inreasing the average throughput and dereasing the delay. However, the ost of relays aused by providing servies is not perfetly onsidered in their solutions. To better utilize the forwarding apability of eah node in RUN, resoure (e.g. bandwidth, wireless hannel) alloation and relay-lient assoiation are two key issues that need to be investigated. Several works have been proposed to maximize the revenue of ISP and address the ongestion ontrol issue in infrastruture networks. Non-ompetitive priing has been extensively employed as a tool to handle resoure alloation in the literature ( [1] [12]). Hande et al. [1], as a representative ontribution, present an ISP revenue maximization and ongestion management sheme for the appropriate hoie of the aess prie for broadband servies offered by a monopoly ISP. However, the existing priing-based solutions mainly fous on maximizing servie providers revenue in infrastruture networks without onsidering end users profit and somehow fail to apture the full harateristis of RUN (e.g. role exhange). In this paper, We try to explore an appliable solution to guarantee the soial welfare of RUN. On the other hand, relay-lient assoiation is similar to AP assoiation that has been widely studied in reent ten years ( [13] [17]). Referene [13], as one of the representative literature, propose a distributed aess point seletion arhiteture onsidering both throughput and fairness. Dawei Gong et al. [14] explore AP assoiation for 82.11n with heterogeneous lients (82.11a/b/g/n) and onsider the problem as a MAC layer utility maximization problem. The frame aggregation feature of 82.11n is onsidered in their solution to avoid poor lient throughput and overload APs. Different from them, Niholson et al. [16] propose a measurement-based solution named Virgil. It performs fast onnetion and tests on all the available APs to hoose the best one (maximum bandwidth, best signal strength, et.) when servie unavailability ours. In general, the QoS metris employed in these solutions usually lak of onsiderations for various user demands. Serving urgent users in priority may gain more soial welfare from the entire network perspetive. Resoure alloation and relay-lient assoiation for ooperative multi-hop aess in RUN has not been widely investigated yet, whih is the main fous of our paper. 3 MODELS AND DEFINITIONS In our RUN mehanism, the servie that the lient obtains is the most important fator related to QoC maximization. We employ aess bandwidth of a lient as a metri to measure the servie it reeives. Note that in our analysis, we fous on one unit time whenever an amount is involved for simpliity. For instane, the utility funtion of a lient defined in Definition 2 refers to the satisfation degree orresponding to the amount of aess bandwidth it reeives per unit time. Definition 1 (Aess bandwidth of a lient): The aess bandwidth of a lient is defined to be the amount of data transmitted by the lient per unit time. The relationship between the aess bandwidth and the user s satisfation should not be a simple linear funtion. Here we introdue a utility funtion to desribe suh a relationship. Definition 2 (Utility funtion of a lient): The utility funtion of a lient i is defined to be f i (B), where B is the lient s aess bandwidth obtained from its relay and f i (B) is the satisfation degree orresponding to the amount of aess bandwidth B. It reflets the urgeny degree of the lient s servie demand. Assumption 1: The utility funtion of a lient is onave. Assumption 1 an be justified as follows. The derivative f i (B) of the funtion f i (B) is equivalent to the marginal utility (MU) of the aess bandwidth. Aording to the Law of Diminishing Marginal Utility [18], MU dereases with the inrease of the aess bandwidth beause a lient s desire of getting more aess bandwidth does not inrease with eah additional unit of bandwidth aquired. Therefore f i (B) is a dereasing funtion. Thus f i (B) should be onave. Definition 3 (Serving bandwidth of a relay): The serving bandwidth of a relay is defined to be the total amount of bandwidth in bits per seond that the relay utilizes as its forwarding servie. A relay s serving bandwidth is the summation of aess bandwidth of all its lients. Clients in RUN an ahieve more utility by inreasing the relay s serving bandwidth. However, the forwarding servie may have negative impat on the relay s own transmission. Meanwhile, the energy onsumption and CPU utilization may beome heavier. Therefore, a relay pays a ost when providing forwarding servie, whih is formulated by a ost funtion in our model. Definition 4 (Cost funtion of a relay): Denote the ost funtion of a relay r j by g j (B), where B is the relay s serving bandwidth and g j (B) is the orresponding ost () 213 IEEE. Personal use is permitted, but republiation/redistribution requires IEEE permission. See

3 1.119/TPDS , IEEE Transations on Parallel and Distributed Systems IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 3 Assumption 2: The ost funtion of a relay is onvex. Assumption 2 an be justified as follows. The derivative g j (B) of the funtion g j (B) is equivalent to the marginal ost (MC) of the serving bandwidth. MC is inreasing with the inrease of the relay s serving bandwidth. The reason is that when the oupany rates of CPU and bandwidth beome higher, the harm to the performane of the relay aused by forwarding for others beomes heavier. Thereforeg j (B) is an inreasing funtion. Thus g j (B) is assumed to be onvex. Definition 5 (QoC of RUN): The QoC (Quality of Cooperation) Q of a RUN is the metri of the ooperation effiieny among users in RUN and is alulated by the summation of all lients utility minus all relays ost. An example of utility funtion f i (B), ost funtion g j (B) and QoC funtion Q r (B) in a single-relay singlelient senario is illustrated in Fig. 1. QoC fi(b): utility B Cutoff bandwidth B n gj(b): ost fi(b)-gj(b): QoC Bandwidth Fig. 1. An example of utility, ost and QoC funtions. 4 SINGLE-RELAY MULTI-CLIENT We first onsider a relatively simple senario in whih there is only one relay r j serving N lients in RUN. The N lients are denoted by C = { 1, 2,..., N }. Fig. 1 illustrates a simpler ase in whih N = 1. It an be observed that the QoC starts to deline when the serving bandwidth exeeds a threshold. Therefore, the relay should limit eah lient s maximum aess bandwidth by a utoff bandwidth. Definition 6 (Client utoff bandwidth): Define the lient utoff bandwidth of a lient i, denoted by B i 1, to be the maximum aess bandwidth it is allowed to use, whih is limited by its relay. Definition 7 (Relay utoff bandwidth Br j ): Define the relay utoff bandwidth of a relay r j, denoted by Br j, to be the summation of its lient utoff bandwidth. A set of lient utoff bandwidth, denoted by {B i} = {B 1,B2,...BN }, should be determined to maximize the total QoC of RUN. However, the QoC annot be solely determined by the serving bandwidth. It also relates to the aess bandwidth of eah lient that is determined by its bandwidth demand. Definition 8 (Bandwidth demand of a lient): Define the bandwidth demand of a lient to be the bandwidth required for its urrent data transmission. Here we define the ritial marginal utility (MU) of a lient i to bef i (B). i Similarly, ritial MC of a relayr j is 1. For bandwidth notations suh as B,B r,b min and B max, index is the supersript, i.e, B i. But for funtion notations suh as f,g,h,q, index is the subsript, i.e., f i. defined to be g j (Br j ). In the following we disuss how to evaluate the utoff bandwidth of eah lient under different bandwidth demand models. 4.1 Free Bandwidth Demand Model We first onsider an ideal bandwidth demand model, in whih the bandwidth demand of a lient has no onstraint. Therefore, the relay an evaluate an optimal lient utoff bandwidth alloation to maximize the RUN s QoC without onsidering the bandwidth demands of its lients. The total QoC Q of the RUN an be alulated as follows: N Q = f i (B) g(b i r ), (1) i=1 where B r = N i=1 Bi, whih is the serving bandwidth of the relay. Then the optimal lient utoff bandwidth alloation {B i} = {B,B1,...,BN } to maximize the RUN s QoC should be the solution to the following problem. maxq s.t. B i {B i} (2) We have the following theorem: Theorem 1: Under the free bandwidth demand model and the optimal lient utoff bandwidth alloation, the ritial MU of eah lient equals the ritial MC of the relay. It an be formulated by: df i (B i ) db i = dg(b r) db r,1 i N s.t. B i (3) The proof an be found in the supplementary file 2. To make the theorem more omprehensive, we give an easy-to-understand example in setion 4.1 of the supplementary file. In the following part, we utilize this theorem to ompute an optimal bandwidth alloation under free bandwidth demand model. 4.2 Dynami Bandwidth Demand Model We try to onsider a more pratial bandwidth demand model in this setion. In realisti network environments, the bandwidth demand of a lient may vary from time to time. For a lient i, assume that its bandwidth demand is a ontinuous random variable whih follows a ertain distribution with a probability density funtion q i (B) (an be derived aordingly to the historial bandwidth demand). The lient informs the relay of its q i (B), inluding the funtion type and the value of eah oeffiient (the message an be appended to the assoiation request). The relay replies with the lient utoff bandwidthb i. If the lient s bandwidth demand exeeds B i during its data transmission (the probability equals + q B i i (B)dB), its aess bandwidth will be restrited to the lient utoff bandwidth to guarantee soial welfare. 2. For all the theorems in the paper, the detailed proofs an be found in our supplementary file () 213 IEEE. Personal use is permitted, but republiation/redistribution requires IEEE permission. See

4 1.119/TPDS , IEEE Transations on Parallel and Distributed Systems IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 4 Under this bandwidth demand model, we evaluate the total QoC from the perspetive of mathematial expetations. The expetation of the utility of a lient i is B i f i (B)q i (B)dB + + B f i i (B)q i i (B)dB. Thus the expetation of the total utility of N lients an be expressed by (4). E utility = N i=1 ( B i B i f i (B)q i (B)dB + + f i (B i )q i (B)dB) (4) Meanwhile (5) gives the expetation of the relay s serving bandwidth. E bs = N i=1 ( B i Bq i (B)dB + + B i B i q i (B)dB) (5) Thus the expetation of the relay s total ost an be evaluated by (6). E ost = g(e bs ) (6) That is to say, the expetation of total QoC is E Q = E utility E ost. (7) Then an optimal lient utoff bandwidth alloation that an maximize the expetation of the total QoC under the dynami bandwidth demand model should be the solution to the following problem. max {B i } E Q s.t. B i (8) The definition of the relay s ritial MC should also be extended from the perspetive of mathematial expetations, i.e., g (E bs ) instead of g (B r ). We have: Theorem 2: Under the dynami bandwidth demand model and the optimal lient utoff bandwidth alloation, the ritial MU of every lient equals the ritial MC of the relay. Theorem 2 an be formulated by: df i (B i ) db i = dg(e bs) de bs,1 i N s.t. B i (9) It an be utilized to ompute an optimal utoff bandwidth alloation under dynami bandwidth demand model from the mathematial expetation perspetive. 4.3 Capaity Limitation and Minimum Bandwidth Demand Model The above investigation implies an assumption that the apaity of a relay is infinite and a lient an aept an infinitesimally small bandwidth. In reality, a relay s apaity is always upper-bounded and a lient s bandwidth demand is always lower-bounded. Therefore a relay an not afford to serve an exessive number of lients and a lient an not aept a relay that ould not supply a minimum bandwidth. Denote by B max the maximum serving bandwidth of the relay and by B i min the minimum bandwidth demand of lient i. These two new restritions make our model more pratial. The problem of optimal lient utoff bandwidth alloation an be formulated by: max {B i } Q s.t. B i B i min and B r B max. (1) We have the following theorem, Theorem 3: Under the single-relay multi-lient senario with the apaity limitation and minimum bandwidth demand model, the bandwidth alloation problem defined by (1) is NP-hard. We prove the theorem by a redution from the wellknown subset sum problem [19] to the above problem. The proof an be found in the supplementary file. We design a heuristi algorithm named SRMC-ES (Single-Relay Multi-Client based on Equation Solving) to ompute a feasible utoff bandwidth alloation. Algorithm 1: SRMC-ES Input: B max, C = { 1, 2,..., N }, {Bmin 1,B2 min,...,bn min }, r, {f 1,f 2,...,f N }, g Output: {B} i 1 B r Infinity 2 while B r > B max do // Optimal alloation 3 {B} i BandAllo(r,C) // Ensure minimum bandwidth demand of every lient 4 for i = 1;i N;i++ do 5 if B i < Bi min then 6 B i Bmin i 7 end 8 end 9 B r N i=1 Bi 1 if B r B max then 11 break 12 end // Selet the lient index with lowest QoC ontribution 13 for eah i in C do 14 δ i ComputeDelta( i ) 15 end 16 index arg min i δ i, i C // Stop serving index 17 B r (B r B index ) 18 B index 19 C (C { index }) 2 end 21 return{b i} The design motivation of Alg. 1 is stated as follows. We first get the optimal bandwidth alloation {B i } without the apaity and demand limitation by solving equations obtained from (3) or (9) (BandAllo(r, C)). If the relay an not afford to serve all the lients while keeping the RUN s QoC as high as possible, the lients with relatively low ontributions to the RUN s QoC will not be served. Here we introdue a metri δ i to quantify i s ontribution to the RUN s QoC. δ i = f i (B i ) (g(b r) g(b r B i )), (11) where g(b r B i ) is part of the relay s ost aused by the lients other than i. Thus δ i stands for i s portion in the RUN s QoC. We denote the time omplexity of BandAllo() by T B (N), whih depends on the approah adopted to solving (3) or (9). BandAllo() is alled at most N times () 213 IEEE. Personal use is permitted, but republiation/redistribution requires IEEE permission. See

5 1.119/TPDS , IEEE Transations on Parallel and Distributed Systems IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 5 QoC k 1... kp k 3 k 2 B i min B B max fi(b): utility of lient i g(b): ost of relay Bandwidth (a) Pieewise linearized utility and ost funtions B 1 min B 1 min+ B Client 1... Root B 2 min... B n min B 2 min+ B.... B n min+ B Client 2... Bmax Bmax Bmax Client n (b) Tree-knapsak problem to maximize total utility Fig. 2. Approximation for the SRMC problem. in the main loop of SRMC-ES. Thus the time omplexity of SRMC-ES is T(SRMC-ES) = O(N T B (N)). 4.4 An Approximation Solution for Bandwidth Bounded Model The major ontribution to the running time of Alg. 1 is the time used to solve (3) or (9), i.e. T B (N). It highly relies on the exat forms of utility and ost funtions, as well as the algorithm employed to solve the differential equations. To redue the possible unertainty and instability, we further propose a dynami-programmingbased approximation algorithm that does not need to solve (3) or (9), while ahieving an approximate solution at an aeptable approximation degree. Algorithm 2: SRMC-DP Input: B max, C = { 1, 2,..., N }, {Bmin 1,B2 min,...,bn min }, r, {f 1,f 2,...,f N }, g Output: {B i}, Q 1 B min min i Bmin i 2 Q 3 {B} i 4 for B r = B min ;B r B max;b r = B r + B do // Initialization 5 dp(,j) =, j 6 for i = 1;i N;i++ do 7 for j = Bmin i ;j Br;j = j + B do 8 dp(i,j) = 9 end 1 end // Dynami Programming 11 for i = 1;i N;i++ do 12 for j = Bmin i ;j Br;j = j + B do 13 for k = Bmin i ;k j;k = k + B do 14 dp(i,j) = max k {dp(i 1,j k)+f i (k),dp(i 1,j),dp(i,j)} 15 Reord the k that maximizes dp as k i 16 end 17 end 18 end 19 U max = dp(n,b r) 2 Update {B i } aording to the reorded {k i } 21 if Q < (U max g( N i=1 Bi )) then 22 Update Q and {B i} aordingly 23 end 24 end 25 return {B} i and Q As shown in Fig. 2(a), we leverage pieewise linear funtions to approximate the utility of lients and the ost of relay. Sine the minimum bandwidth demand and the apaity of the relay are the lower bound and upper bound of lient i s utoff bandwidth, respetively, we only disretize the utility and ost funtion of eah lient i from Bmin i to B max. With pieewise granularity being B, the utoff bandwidth of lient i an only be hosen from the set {,Bmin i,bi min + B,...,B max}. The basi idea of the heuristi algorithm is depited as follows. We first maximize the total utility of all lients ( N i=1 f i(b)) with the bandwidth apaity of the relay being B max. Unlike the situation in the NP-hard proof above, the QoC of the RUN will not always be maximized even if the apaity of the relay is used up. Providing more serving bandwidth may ause negative QoC inome with the influene of the ost of the relay. Therefore, we repeat the proess of maximizing the total utility under different relay apaities (B min,b min + B,...,B max ), where B min is the minimum bandwidth demand among the N lients. Then we hoose the maximal QoC from the results obtained under different apaities. First, we propose a dynami programming based algorithm to address the utility maximization problem. As shown in Fig. 2(b), under speifi bandwidth apaity, the problem an be regarded as a 1 knapsak problem on a rooted tree T suh that if a node is seleted into a knapsak, then all nodes on the path from the seleted node to the root node must also be seleted into the knapsak. Here the verties in the tree (the items of knapsak problem) represent the different utoff bandwidth, the prie of eah item is the utility, the N branhes represent N lients, and the weight apaity of the knapsak is the bandwidth apaity of the relay. The Tree-Knapsak Problem (TKP) has been proved to be weakly NP-omplete [2]. In this paper, we employ dynami programming to address the problem in pseudo-polynomial time. In the dynami programming proess of Alg. 2, we assume the total utility in state (i,j) to be dp(i,j), where i represents lient 1 to lient i, and j represents the remaining bandwidth apaity of the relay. The parameter k in lines is the bandwidth alloated to lient i. Note that lient i may not be served by the relay, in whih ase the sub-state is dp(i 1,j). The time omplexity of the dynami programming proess (lines 11-18) is O(NBmax). 2 The proess is invoked under different bandwidth apaities, hene the running time of Alg. 2 is O(NBmax 3 ), whih is pseudopolynomial. 5 MULTI-RELAY MULTI-CLIENT In this setion we study the senario of multiple relays and multiple lients in RUN. The following two issues need to be investigated: how to assoiate lients with relays and how to alloate lient utoff bandwidth. Definition 9 (Cluster): A luster i is defined to be the node set onsisting of relay i and all the lients it serves. The serving relationship may vary from time to time. Assume that there are K relays denoted by R = {r 1,r 2,...,r K }. Define by X = (x ij ) a binary assoiation () 213 IEEE. Personal use is permitted, but republiation/redistribution requires IEEE permission. See

6 1.119/TPDS , IEEE Transations on Parallel and Distributed Systems IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 6 matrix with x ij = 1 if and only if r i serves j. Let B = (b ij ) be a lient utoff bandwidth matrix with b ij being the utoff bandwidth assigned to j by r i. If the free bandwidth demand model is utilized, the QoC Q i of eah luster i an be evaluated by Q i = N N x ij f j (b ij ) g i ( x ij b ij ) (12) j=1 j=1 Then the lient-relay assoiation and the lient utoff bandwidth alloation issue an be formulated as follows. s.t. max { K Q i } X,B i=1 K x ij = 1, i=1 N x ij b ij Bmax i, j=1 K x ij b ij B j min, i=1 1 j N 1 i K 1 j N x ij {,1}, 1 i K and 1 j N (13) In (13), the assoiation matrix X and the lient utoff bandwidth matrix B are the variables to be omputed. The objetive funtion is to maximize the summation of all lusters QoC. The first onstraint indiates that every lient an get forwarding servie from one relay; the seond onstraint indiates that the maximum serving bandwidth of the relay r i an not exeed its apaity limitation Bmax; i while the third onstraint indiates that the reeived bandwidth of a lient j should not be smaller than its minimum bandwidth demand B j min. We have the following theorem, Theorem 4: The lient-relay assoiation and the lient utoff bandwidth alloation issue under MRMC is NPhard. The proof an be found in the supplementary file. We propose a greedy algorithm Alg. 3 to ompute a feasible solution for (13). We first examine all possible relay-lient pairs to find out the one with the highest ontribution to the network QoC. Then the lient is assoiated with that relay. Here we use δ ij defined in (11) as a metri to quantify the QoC ontribution of the lient 3. This proess is repeated until all lients are assoiated with relays or all relays are at full apaity. The while-loop of MRMC is exeuted at most N times, assuming N > K. SRMC-ES is alled N K times during the first iteration and at most N times in eah of the other N 1 iterations. Thus the time omplexity of MRMC is T(MRMC) = O(N(N 1) + NK) O(N)T B (N) = O(N 2 (N +K)T B (N)). 3. Note that the algorithm employed to ompute δ ij and {B i } an also be replaed by SRMC-DP (line 7) Algorithm 3: MRMC Input: C = { 1, 2,..., N }, R = {r 1,r 2,...,r K }, {f 1,f 2,...,f N }, {g 1,g 2,...,g K }, {Bmax 1,B2 max,...,bk max }, {Bmin 1,B2 min,...,bn min } Output: X = (x ij ), B = (b ij ) // Define C ri as the set of lients urrently served by r i 1 C ri Φ,i = 1,2,...,K 2 index r,index 3 while C! = Φ and R! = Φ do // Update δ and the bandwidth for eah (,r) pair 4 for eah r i in R do // If i index r, the orresponding δ and the bandwidth alloation does not hange ompared to the last while-loop 5 if index r = or index r = i then 6 for eah j in C do {j } 7 {δ ij,b Cr i } SRMC-ES(r i,c ri {j }, j ) 8 end 9 end 1 end // Selet ( index,r indexr ) with the highest δ 11 {index r,index } arg max i,j δ ij, r i R, j C // Assoiate index with r indexr 12 x indexr,index 1 13 C C { index } // Update C rindexr 14 C rindexr C rindexr {index } 15 Br indexr // Update the orresponding bandwidth alloation 16 for eah k C rindexr do 17 b indexr,k B k 18 Br indexr Br indexr +b indexr,k 19 end // A relay at full apaity should not serve any more lients 2 if Br indexr Bmax indexr then 21 R R {r indexr } 22 end 23 end 24 return{x, B} 6 DISTRIBUTED DYNAMIC MECHANISM OF M- RMC The MRMC algorithm presented in Setion 5 is a entralized one, whih has two limitations. First, the omputation proess should be exeuted on a ertain entralized ontrol node. The overhead of gathering information from the whole network might be quite high and sometimes impratial. Seond, it is diffiult to handle the dynami arrivals and departures of the members in RUN, whih requires the exeution of the algorithm to orrespondingly update the assoiation and bandwidth alloation of the whole network whenever there is a RUN member hange. Therefore, in this setion we propose a distributed dynami mehanism D 2 MRMC for the MRMC senario. D 2 MRMC onsists of a protool that defines the signaling proess between lients and relays, and several modified algorithms to determine relay-lient assoiation and bandwidth alloation. As shown in Fig. 3, we extend the standard AP-STA assoiation protool [21] to handle lient-relay assoiation. The standard beaon frame defined in is extended by appending an additional Cooperation Pa () 213 IEEE. Personal use is permitted, but republiation/redistribution requires IEEE permission. See

7 1.119/TPDS , IEEE Transations on Parallel and Distributed Systems IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 7 rameter Set after the IBSS Parameter Set. The Cooperation Parameter Set ontains the ost funtion and the apaity limitation of the relay, and the utility funtions, the minimum bandwidth demands, et.. When a lient moves out of the overage range of any AP and seeks for forwarding servie, it an reeive a list of available relays by listening to their beaon frames. The lient determines whih relay is the most appropriate one, sends an Assoiation Request frame and gets the Assoiation Response frame to/from the relay to omplete the assoiation proedure. Relay Beaon Frame with Cooperation Parameter Set Assoiation Request Frame with Bandwidth Alloation Vetor Assoiation Response Frame with Cutoff Bandwidth Client Algorithm 5: D 2 MRMC: Client Arrival Input: r i, C ri, Br i, Bi max, BCr i, newly arrived lient j Output: The updated C ri and B Cr i 1 if Br i < Bmax i then 2 broadast beaon frames with Cooperation Parameter Set 3 end 4 if j launhes a onnetion then 5 C ri C ri {j } 6 B i r B Cr i // Capaity release 7 if B i r >= B i max then 8 for eah k in C ri do 9 δ k ComputeDelta( k ) 1 end 11 index arg min k δ k, k C ri 12 C ri C ri { index } 13 B Cr i SRMC-ES(r i,c ri ) 14 end 15 for eah lient k C ri do 16 update B k aording to BCr i 17 end 18 end Fig. 3. The signaling proess of lient-relay assoiation We divide our MRMC algorithm into three omponents to meet the requirement of the distributed senario. Alg. 4 is exeuted on eah lient to determine its expeted relay and the lient utoff bandwidth alloated by that relay when it needs the forwarding servie. Alg. 5 and Alg. 6 are exeuted on eah relay, with the former one handling the arrival of lients, and the latter the departure. If a newly arriving lient has a diret aess to an AP, it an work as a relay by broadasting the beaon frames to attrat lients; when it leaves the network, the assoiated lients need to all Alg. 4 to searh for a new relay. Algorithm 4: D 2 MRMC: Client Aess Input: j, R = {r 1,r 2,...,r K }, Cooperation Parameter Set for eah r i // output is the index of the relay that lient j hoose to assoiate with Output: index 1 if j needs forwarding servie but has no relay then 2 for eah r i R do 3 {δ i,b Cr {j } i } SRMC-ES(r i,c ri {j }, j ) 4 end 5 index arg max i δ i, r i {r i } 6 j onnets to r index 7 end Alg. 4 presents the aess proedure exeuted on eah lient j. For eah relay r i, the lient j omputes its QoC ontribution and the orresponding bandwidth alloation based on the Cooperation Parameter Set (line 3). The lient selets the relay whih ontributes the most to the network QoC aording to δ ij defined in (11). Alg. 5 details the proedure of handling the arrival of a lient at eah relay r i. If a lient deides to onnet to r i, r i gets the bandwidth alloation vetor B Cr i from the lient and updates the lient utoff bandwidth of eah lient it urrently serves by sending the Assoiation Response frame. If the apaity of r i is full, it would rejet the assoiation request of any newomers, and stop its broadast of the beaon frames. Capaity release (lines 7-14) is an option to inrease the QoC of the network if a newly arriving lient an bring more QoC than any existing one(s). To alleviate QoC redution aused by the lients that ontribute less and ome earlier, we need to release the apaity of the relay by kiking out these lients (lines 11-13). The lients ould all Alg. 4 again to selet a new relay. Algorithm 6: D 2 MRMC: Client Departure Input: r i, j, C ri Output: The updated C ri and B Cr i 1 if j was served by r i and it leaves the overage of r i then 2 C ri (C ri { j }) 3 B Cr i SRMC-ES(r i,c ri ) 4 for eah lient k C ri do 5 update B k aording to BCr i 6 end 7 end When a lient moves out of the overage area of its relay, the relay should detet this departure event and all Alg. 6 to re-alulate the lient utoff bandwidth for other serving lients. Then it announes the updated bandwidth alloation to its lients through the Assoiation Response frame. This lient-departure handling proedure makes D 2 MRMC more flexible espeially when users frequently move in and out. 7 EVALUATIONS In this setion we evaluate our RUN framework by simulation study. We first onsider the ase of a single relay and multiple lients to evaluate the QoC inome under the optimal alloation, SRMC-ES, and SRMC-DP () 213 IEEE. Personal use is permitted, but republiation/redistribution requires IEEE permission. See

8 1.119/TPDS , IEEE Transations on Parallel and Distributed Systems IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 8 QoC of RUN Optimal Average Fixed Number of lients (a) Free model with polynomial utility/ost funtion QoC expetations SRMC ES SRMC DP Average Fixed Number of lients () Bandwidth bounded model Fig. 4. SRMC performane QoC expetations Optimal Average Fixed Number of lients (b) Dynami model with uniform distribution Average Kik Rate Total Client #1 Client #2 Client #3 Client # Number of Clients (d) Average proportions of kiked lients of SRMC-ES Then we evaluate the performane of our MRMC algorithm for the ase of multi-relay multi-lient. Finally, the D 2 MRMC mehanism is implemented and evaluated in the simulated RUN to onsider the distributed senario, demonstrating that the signaling proess between lients and relays works well while ahieving high QoC in the long term. 7.1 SRMC Performane We onsider the ase of single-relay multi-lient first. The results for 1 to 7 lients are reported in Fig. 4(a), 4(b) and 4(). The legend Optimal in Fig. 4(a) and Fig. 4(b) stands for the optimal utoff bandwidth alloation obtained from Theorems 1 and 2, Average and Fixed in Fig. 4() are listed for omparisons, with Average indiating that the relay s serving bandwidth is equally alloated to all lients and Fixed implying that the utoff bandwidth of eah lient is fixed to 2Mbps. The free bandwidth demand model is employed in Fig. 4(a). The utility funtions for the seven lients (from lient #1 to #7) are defined by 2 B,3.5 B,5 B,...,11 B (step 1.5) respetively, while the ost funtion of the relay is.2b 2. It is lear that our alloation sheme leads to a higher network QoC than the other two shemes. The result of the dynami bandwidth demand model is shown in Fig. 4(b). Eah data point is an average over 5 runs to redue randomness. The utility funtions are the same as in Fig. 4(a), and the ost funtion is.4b 2. The bandwidth demand of a lient follows a uniform distribution on [.5, 2.5] Mbps. It an be observed that our sheme still ahieves the maximum QoC, while Fixed performs bad ompared with the other two shemes. The result of the bandwidth bounded model is shown in Fig. 4(), in whih SRMC-ES and SRMC-DP are e- valuated. Eah data point is an average over 5 runs to redue randomness. The bandwidth apaity of the relay is fixed to 7Mbps, while the minimum bandwidth demand of eah lient follows a uniform distribution on [.5, 2.5] Mbps. The utility funtions for the seven lients and the ost funtion for the relay are the same as in Fig. 4(b). Note that our SRMC-DP ahieves a higher QoC ompared to the other three shemes. However, sine the running time of SRMC-DP highly relies on the value of B max and the bandwidth granularity ( B), it may take an unaeptable amount of time on bandwidth alloation ompared to SRMC-ES under speifi irumstanes. During the simulation of SRMC-ES, some of the lients may be kiked out from obtaining relay s servie beause they ontribute relatively little QoC to the network. We also alulate the average proportions of the kiked lients in Fig. 4(d). With the inrease of the total number of lients, the proportion of the relay s serving lients (marked as Total in the figure) beomes smaller. This is reasonable sine relay s apaity is upper-bounded, and the relay has to stop serving these lients to ahieve more utility from the lients with larger ontributions. The statistis of the kik rate of lient #1,2,3,4 also proves it. With the inrease of the total number of lients, the lients with less ontributions (e.g. 2 B for Client #1) will be kiked out with a higher priority. 7.2 MRMC Performane Fig. 5(a) and 5(b) depit the simulation results of MRMC in omparison with Random-Average and Random- Fixed shemes. Random implies that the lients are randomly assoiated with relays. Average implies that the relays alloate its bandwidth apaity to all lients equally, and Fixed implies that the relays alloate fixed bandwidth to eah lient until their bandwidth apaity is used up. The utility funtions of the lients are defined as B,3 B,5 B,...,23 B (step 2) while the ost funtions of the relays are.1b 2,.15B 2,.2B 2,...,.35B 2 (step.5). The bandwidth apaities of the relays follow a uniform distribution on [6,14] Mbps, while the minimum bandwidth demands of the lients follow a uniform distribution on [.5,2.5] Mbps. Fig. 5(a) reports the total QoC under a various number of lients while the number of the relays is 4. Fig. 5(b) shows the result under a various number of relays while the number of the lients is fixed to 8. The result of MRMC is an average over 5 runs while those of Random-Average and Random-Fixed are over 1 runs to redue randomness. It is obvious that MRMC possesses an apparent advantage over the other two shemes. Random-Average has very poor performane when the number of lients is small or the number of relays is large. This is beause eah relay serves few lients in these two irumstanes, and the bandwidth alloated to eah lient may be quite high, whih may ause pretty high relay ost. Next, a small publi area WLAN is simulated in whih 3 users loate in the area and form a RUN (note that here node arrival and departure are not onsidered) () 213 IEEE. Personal use is permitted, but republiation/redistribution requires IEEE permission. See

9 1.119/TPDS , IEEE Transations on Parallel and Distributed Systems IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 9 QoC of RUN Average bandwidth(mbps) MRMC Random Fixed Random Average 1 3/4 6/4 9/4 12/4 15/4 Number of lients/number of relays (a) Number of lients varies MRMC Random Average Random Fixed No Run bandwidth ost Proportion of relays () Average bandwidth Relay ost Fig. 5. MRMC performane QoC of RUN Data amount(mb) MRMC Random Fixed Random Average 5 8/2 8/3 8/4 8/5 8/6 Number of lients/number of relays (b) Number of relays varies Average data Average servie Proportion of relays (d) Average data and servie On eah day, these users are randomly divided into 4-8 groups around different APs (i.e. eah group stands for the overage area of one AP). Users of eah group are then randomly divided into relays and lients, and one of them is hosen as the deision node. The proportion of relays in eah group varies from 1% to 6%. An operation of 3 days is simulated. The entralized MRMC algorithm is exeuted on the deision node of eah group to ompute the assoiation and bandwidth alloation. The utility funtions of the lients are defined as B,3 B,...,23 B (step 2) while the ost funtions of the relays are.1b 2,.15B 2,.2B 2,...,.35B 2 (step.5). The bandwidth apaities of the relays follow a uniform distribution on [6,14] Mbps, while the minimum bandwidth demands of the lients follow a uniform distribution on [.5,2.5] Mbps. The simulation results are shown in Fig. 5() and 5(d). We alulate the average aess bandwidth of all users (shown as bar graph) and the ost of all relays (shown as broken line graph) over the 3-day period in Fig. 5(). It an be observed that the average bandwidth is inreased by 4%-9% with our MRMC algorithm ompared with No RUN, whih demonstrates that the users have more hanes to get online by multihop aess and the network QoC is improved. When the proportion of relays is lower, the inrease of the average bandwidth under the RUN mehanism is more obvious. It demonstrates that our solution is more suitable for the publi area WLANs with fewer APs and a larger number of users that are far from any AP. Note that the Random-Average sheme ahieves the maximum average bandwidth, it is reasonable sine the bandwidth apaity of eah relay is over used by lients in this sheme. From the figure we ould see that the ost of relays of Random-Average is nearly 3x larger than that of our MRMC algorithm. It proves that our RUN mehanism an ahieve nearly the same average bandwidth while onsidering servie providers ost simultaneously. A user in RUN both transmits its own data and provides forwarding servie for others. We ompare the average amount of data transmitted by relays and lients (inluding relays own data) and the average amount of servie provided by relays during the 3-day period in Fig. 5(d). The differene between the average amount of data transmitted and the average amount of servie provided beomes larger when the proportion of the relays is higher, whih indiates that more users an onnet to APs diretly under this senario. 7.3 D 2 MRMC Performane To validate D 2 MRMC, we simulate a small publi area WLAN in whih 3 users randomly visit a irular area everyday, making up RUN. There only exists one AP in the enter of the area. On eah day, users arrive at and depart from the area with a preset probability p. Eah user has a random distane from the AP, whih determines whether the user has a diret AP aess or has to obtain forwarding servie from relays. The ratio of the AP overage radius to the radius of the whole irular area, whih is designated as overage ratio, varies from.2 to.7. The ommuniation overhead (lateny) between lients and relays is a fixed value. The relays an obtain 7Mbps bandwidth from the AP. A lient an onnet to a relay only when their distane, whih is determined by their random positions, is smaller than a ertain value. The mobility pattern of eah node follows a random distribution, the x,y oordinates of eah node are generated by a rand() funtion. Other parameter settings are the same as those presented in Setion 7.2 for validating MRMC. The simulation results are reported in Fig. 6. We alulate the average aess bandwidth of all users over the 3-day period and report the results in Fig. 6(a). It an be observed that the average bandwidth inreases by 25%-5% with the RUN mehanism using D 2 MRMC ompared with No RUN. When the overage ratio is lower, the inrease of the average bandwidth under the RUN mehanism is more obvious. The Random-Average ahieves larger average bandwidth than D 2 MRMC, but the ost of relays are also very large just as we have depited in Fig. 5(). Fig. 6(b) illustrates the number of users in 4 different user lasses per unit time under 6 different overage ratios. Potential relay refers to the users having diret AP aess, while Potential lient refers to the users staying out of the overage of the AP. Aordingly, Real relay indiates the users who are forwarding data for others, while Real lient stands for the users who are transmitting data through real relays. The number of potential relays per unit time grows and the number of potential lients per unit time dereases with the inrease of the overage ratio. This is beause a user has a larger possibility to beome a relay rather than a real lient if the AP s overage is beoming larger. Real lients are less than potential lients, espeially when the overage () 213 IEEE. Personal use is permitted, but republiation/redistribution requires IEEE permission. See

10 1.119/TPDS , IEEE Transations on Parallel and Distributed Systems IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 1 Average bandwidth(mbps) D 2 MRMC Random Average Random Fixed No RUN Ratios of AP overage radius (a) Average bandwidth of 3 users Number per unit time Potential Relay Real Relay Potential Client Real Client Ratios of AP overage radius (b) Average user number in different user lasses Data amount(mb) Average data exhange Real relay Real lient Day () The average amount of data exhanged and the number of real relays & real lients in 3 days Number Fig. 6. D 2 MRMC simulation on RUN in 3 days. ratio is small. This is reasonable beause the number of potential relays is small so that some lients are even unable to aess to any relay. When the overage ratio is not too small, this problem rarely happens beause the overage range of all relays an possibly over the whole irular area. We also illustrate the average amount of exhanged data between relays and lients and the total numbers of real relays and real lients for the 3-day period in Fig. 6(). We alulate the average result over 1 simulation runs. The overage ratio of eah run is set to.4. We notie that the total amount of data exhanged has a positive orrelation with the number of real relays and lients, in partiular the number of real relays. The reason is that the number of real relays indiates how many users are forwarding data for others, whih determines the amount of data exhanged in the network. 8 CONCLUSION This paper proposes a ooperative overage extension mehanism in Relay-Union Networks. By investigating the relationship among bandwidth, ost, and utility, we present a QoC model and formulate the maximization of network s QoC as an optimal utoff bandwidth alloation problem. We derive the solution to the problem under two different bandwidth demand models. We then extend the problem by taking eah relay s apaity limitation and eah lient s minimum bandwidth demand into aount. We design SRMC-ES and SRMC-DP to evaluate a feasible bandwidth alloation for the singlerelay multi-lient senario and the MRMC algorithm to ompute a relay-lient assoiation and bandwidth alloation for the multi-relay multi-lient ase. Finally we propose an extended MRMC mehanism termed D 2 MRMC, whih onsists of a protool defining the signaling proess, and several algorithms dynamially handling the ooperation problem in a distributed way. Extensive simulation results demonstrate the inrease of the network QoC and the per-user bandwidth of our RUN framework. REFERENCES [1] W. Li, X. Cheng, T. Jing, and X. Xing, Cooperative multi-hop relaying via network formation games in ognitive radio networks, in IEEE INFOCOM, April 213, pp [2] T. Jing, S. Zhu, H. Li, X. Cheng, and Y. Huo, Cooperative relay seletion in ognitive radio networks, in IEEE INFOCOM Mini- Conferene, April 213, pp [3] W. Wang, J. Zhang, and Q. Zhang, Cooperative ell outage detetion in self-organizing femtoell networks, in IEEE INFOCOM, April 213, pp [4] Y. Zhou and W. Zhuang, Benefiial ooperation ratio in multihop wireless ad ho networks, in IEEE INFOCOM Mini- Conferene, April 213, pp [5] Q. Wang, X. Wang, and X. Lin, Mobility inreases the onnetivity of K-hop lustered wireless networks, in ACM MobiCom, September 29, pp [6] Z. Yu, J. Teng, X. Li, and D. Xuan, On wireless network overage in bounded areas, in IEEE INFOCOM, April 213, pp [7] S.-J. Syue, C.-L. Wang, T. Aguilar, V. Gauthier, and H. Afifi, Cooperative geographi routing with radio overage extension for ser-onstrained wireless relay networks, IEEE Journal on Seleted Areas in Communiations (JSAC), vol. 3, no. 2, pp , 212. [8] M. Guizani, A. Rahedi, and C. Gueguen, Inentive sheduler algorithm for ooperation and overage extension in wireless networks, IEEE Transation on Vehiular Tehnology (TVT), vol. 62, no. 2, pp , 213. [9] V. Gabale, J. Patani, B. Raman, R. Mehta, and R. Kalyanaraman, A dvaar to lokvaani: extending ellular overage inside villages of developing world, in ACM WiNTECH Workshop, MobiCom, Augest 212, pp [1] P. Hande, M. Chiang, R. Calderbank, and J. Zhang, Priing under Constraints in Aess Networks: Revenue Maximization and Congestion Management, in IEEE INFOCOM, Marh 21, pp [11] P. Hande, M. Chiang, R. Calderbank, and S. Rangan, Network priing and rate alloation with ontent provider partiipation, in IEEE INFOCOM, 29, pp [12] C. Chau, Q. Wang, and D. Chiu, On the viability of Paris metro priing for ommuniation and servie networks, in IEEE INFOCOM, Marh 21, pp [13] Y. Fukuda, T. Abe, and Y. Oie, Deentralized aess point seletion arhiteture for wireless lans, in Wireless Teleommuniations Symposium, 24. IEEE, 24, pp [14] D. Gong and Y. Yang, Ap assoiation in n wlans with heterogeneous lients, in INFOCOM, 212 Proeedings IEEE. IEEE, 212, pp [15] X. Chen, Y. Zhao, B. Pek, and D. Qiao, Sap: Smart aess point with seamless load balaning multiple interfaes, in INFOCOM, 212 Proeedings IEEE. IEEE, 212, pp [16] A. J. Niholson, Y. Chawathe, M. Y. Chen, B. D. Noble, and D. Wetherall, Improved aess point seletion, in Proeedings of the 4th international onferene on Mobile systems, appliations and servies. ACM, 26, pp [17] S. Vasudevan, K. Papagiannaki, C. Diot, J. Kurose, and D. Towsley, Failitating aess point seletion in ieee wireless networks, in Proeedings of the 5th ACM SIGCOMM onferene on Internet Measurement. USENIX Assoiation, 25, pp [18] J. Quirk, Intermediate miroeonomis. Siene Researh Assoiates, [19] G. Mihael, R. and J. David, S., Computers and Intratability: A Guide to the Theory of NP-Completeness. W.H. Freeman. ISBN A3.2: SP13, pp.223, [2] O. H. Ibarra and C. E. Kim, Approximation algorithms for ertain sheduling problems, Mathematis of Operations Researh, vol. 3, no. 3, pp , [21] IEEE Standard: Wireless LAN Medium Aess Control (MAC) and Physial Layer (PHY) Speifiations, ANSI/IEEE 82.11, () 213 IEEE. Personal use is permitted, but republiation/redistribution requires IEEE permission. See

11 1.119/TPDS , IEEE Transations on Parallel and Distributed Systems IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 11 Yong Cui is a professor in Tsinghua University, Counil Member in China Communiation Standards Assoiation, Co-Chair of IETF IPv6 Transition WG Softwire. Having published more than 1 papers in refereed journals and onferenes, he is also the winner of Best Paper Award of ACM ICUIMC 211 and WASA 21. Holding more than 4 patents, he is one of the authors in RFC 5747 and RFC 5565 for his proposal on IPv6 transition tehnologies. His major researh interests inlude mobile wireless Internet and omputer network arhiteture. Jianghuan Liu is an Assoiate Professor in the Shool of Computing Siene at Simon Fraser University, British Columbia, Canada. He was also a Mirosoft Researh Fellow, and worked at Mirosoft Researh Asia (MSRA) in the summers of 2, 21, 22, 27, and 211. His researh interests are in networking, in partiular, multimedia ommuniations, peer-to-peer networking, loud omputing, soial networking, and wireless sensor/mesh networking. He is a o-reipient of IEEE IWQoS 8 and IEEE/ACM IWQoS 212 Best Student Paper Awards, IEEE Communiations Soiety Best Paper Award on Multimedia Communiations 29, IEEE Globeom 211 Best Paper Award, and ACM Multimedia 212 Best Paper Award. Xiao Ma reeived his bahelor degree in the Department of Computer Siene and Tehnology from Tsinghua University, China in 211. He is pursuing the master degree in the Department of Computer Siene and Tehnology at Tsinghua University, supervised by Prof. Yong Cui. His researh interests inlude mobile loud omputing, wireless networks and omputer network arhiteture. Tianze Ma reeived his bahelor and MS degree in the Department of Computer Siene and Tehnology from Tsinghua University, China, in 28 and 211, respetively. He has published several papers on international onferenes and journals, inluding a full onferene paper in INFOCOM 211. His researh interests mainly inlude wireless mesh networks and omputer network arhiteture. Xiuzhen Cheng is an assoiate professor at the Department of Computer Siene, The George Washington University, Washington DC. Her urrent researh interests fous on ognitive radio networks and wireless mobile omputing. She has served on the editorial boards of several tehnial journals and the tehnial program ommittees of various professional onferenes/workshops. She also has haired several international onferenes. She worked as a program diretor for the US National Siene Foundation (NSF) from April to Otober in 26, and from April 28 to May 21. She reeived the NSF CAREER Award in 24. She is a senior member of IEEE and a member of ACM. Yihua Guo reeived his bahelor degree in the Department of Computer Siene and Tehnology from Tsinghua University, China in 212. He is pursuing the Ph.D degree at University of Mihigan. His researh interests mainly inlude data enter networking, wireless networks and mobile systems. Minming Li reeived the BE and PhD degrees from the Department of Computer Siene and Tehnology, Tsinghua University, Beijing, China, in 22 and 26, respetively. He is urrently an assistant professor in the Department of Computer Siene, City University of Hong Kong. His researh interests inlude wireless ad ho networks, algorithm design and analysis, and ombinatorial optimization. Biao Chen reeived his BS in Computer Siene from Fudan University in China and MS in Mathematis and PhD in Computer Siene from Texas A&M University respetively. After graduation, he joined the Department of Computer Siene in University of Texas at Dallas as assistant professor. Currently, he is a visiting professor in the Department of Computer and Information Siene of University of Maau. His researh interests inlude distributed systems, networking, internet of things, and seurity. He is a member of Sigma Xi, IEEE, and ACM () 213 IEEE. Personal use is permitted, but republiation/redistribution requires IEEE permission. See

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based

More information

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks 62 Uplink Channel Alloation Sheme and QoS Management Mehanism for Cognitive Cellular- Femtoell Networks Kien Du Nguyen 1, Hoang Nam Nguyen 1, Hiroaki Morino 2 and Iwao Sasase 3 1 University of Engineering

More information

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless

More information

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

Multi-Channel Wireless Networks: Capacity and Protocols

Multi-Channel Wireless Networks: Capacity and Protocols Multi-Channel Wireless Networks: Capaity and Protools Tehnial Report April 2005 Pradeep Kyasanur Dept. of Computer Siene, and Coordinated Siene Laboratory, University of Illinois at Urbana-Champaign Email:

More information

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communiations 1 RAC 2 E: Novel Rendezvous Protool for Asynhronous Cognitive Radios in Cooperative Environments Valentina Pavlovska,

More information

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

Accommodations of QoS DiffServ Over IP and MPLS Networks

Accommodations of QoS DiffServ Over IP and MPLS Networks Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering

More information

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr

More information

Multi-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks

Multi-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks Multi-hop Fast Conflit Resolution Algorithm for Ad Ho Networks Shengwei Wang 1, Jun Liu 2,*, Wei Cai 2, Minghao Yin 2, Lingyun Zhou 2, and Hui Hao 3 1 Power Emergeny Center, Sihuan Eletri Power Corporation,

More information

Fast Distribution of Replicated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon

Fast Distribution of Replicated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon ACEEE Int. J. on Information Tehnology, Vol. 3, No. 2, June 2013 Fast Distribution of Repliated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon Email: mmalli@aou.edu.lb

More information

Distributed Resource Allocation Strategies for Achieving Quality of Service in Server Clusters

Distributed Resource Allocation Strategies for Achieving Quality of Service in Server Clusters Proeedings of the 45th IEEE Conferene on Deision & Control Manhester Grand Hyatt Hotel an Diego, CA, UA, Deember 13-15, 2006 Distributed Resoure Alloation trategies for Ahieving Quality of ervie in erver

More information

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Arne Hamann, Razvan Rau, Rolf Ernst Institute of Computer and Communiation Network Engineering Tehnial University of Braunshweig,

More information

This fact makes it difficult to evaluate the cost function to be minimized

This fact makes it difficult to evaluate the cost function to be minimized RSOURC LLOCTION N SSINMNT In the resoure alloation step the amount of resoures required to exeute the different types of proesses is determined. We will refer to the time interval during whih a proess

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

New Channel Allocation Techniques for Power Efficient WiFi Networks

New Channel Allocation Techniques for Power Efficient WiFi Networks ew Channel Alloation Tehniques for Power Effiient WiFi etworks V. Miliotis, A. Apostolaras, T. Korakis, Z. Tao and L. Tassiulas Computer & Communiations Engineering Dept. University of Thessaly Centre

More information

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method 3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr

More information

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY Dileep P, Bhondarkor Texas Instruments Inorporated Dallas, Texas ABSTRACT Charge oupled devies (CCD's) hove been mentioned as potential fast auxiliary

More information

Improved flooding of broadcast messages using extended multipoint relaying

Improved flooding of broadcast messages using extended multipoint relaying Improved flooding of broadast messages using extended multipoint relaying Pere Montolio Aranda a, Joaquin Garia-Alfaro a,b, David Megías a a Universitat Oberta de Catalunya, Estudis d Informàtia, Mulimèdia

More information

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Ho Wireless Networks Giorgio Quer, Federio Librino, Lua Canzian, Leonardo Badia, Mihele Zorzi, University of California San Diego La

More information

A {k, n}-secret Sharing Scheme for Color Images

A {k, n}-secret Sharing Scheme for Color Images A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University

More information

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks International Journal of Computer Theory and Engineering, Vol. 5, No. 2, April 213 A Multi-Head Clustering Algorithm in Vehiular Ad Ho Networks Shou-Chih Lo, Yi-Jen Lin, and Jhih-Siao Gao Abstrat Clustering

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

Acoustic Links. Maximizing Channel Utilization for Underwater

Acoustic Links. Maximizing Channel Utilization for Underwater Maximizing Channel Utilization for Underwater Aousti Links Albert F Hairris III Davide G. B. Meneghetti Adihele Zorzi Department of Information Engineering University of Padova, Italy Email: {harris,davide.meneghetti,zorzi}@dei.unipd.it

More information

Approximate logic synthesis for error tolerant applications

Approximate logic synthesis for error tolerant applications Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu

More information

User-level Fairness Delivered: Network Resource Allocation for Adaptive Video Streaming

User-level Fairness Delivered: Network Resource Allocation for Adaptive Video Streaming User-level Fairness Delivered: Network Resoure Alloation for Adaptive Video Streaming Mu Mu, Steven Simpson, Arsham Farshad, Qiang Ni, Niholas Rae Shool of Computing and Communiations, Lanaster University

More information

Facility Location: Distributed Approximation

Facility Location: Distributed Approximation Faility Loation: Distributed Approximation Thomas Mosibroda Roger Wattenhofer Distributed Computing Group PODC 2005 Where to plae ahes in the Internet? A distributed appliation that has to dynamially plae

More information

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer

More information

Cluster-based Cooperative Communication with Network Coding in Wireless Networks

Cluster-based Cooperative Communication with Network Coding in Wireless Networks Cluster-based Cooperative Communiation with Network Coding in Wireless Networks Zygmunt J. Haas Shool of Eletrial and Computer Engineering Cornell University Ithaa, NY 4850, U.S.A. Email: haas@ee.ornell.edu

More information

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,

More information

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments Establishing Seure Ethernet LANs Using Intelligent Swithing Hubs in Internet Environments WOEIJIUNN TSAUR AND SHIJINN HORNG Department of Eletrial Engineering, National Taiwan University of Siene and Tehnology,

More information

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425) Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University

More information

DoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay

DoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay DoS-Resistant Broadast Authentiation Protool with Low End-to-end Delay Ying Huang, Wenbo He and Klara Nahrstedt {huang, wenbohe, klara}@s.uiu.edu Department of Computer Siene University of Illinois at

More information

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification erformane Improvement of TC on Wireless Cellular Networks by Adaptive Combined with Expliit Loss tifiation Masahiro Miyoshi, Masashi Sugano, Masayuki Murata Department of Infomatis and Mathematial Siene,

More information

Detection and Recognition of Non-Occluded Objects using Signature Map

Detection and Recognition of Non-Occluded Objects using Signature Map 6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,

More information

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections SVC-DASH-M: Salable Video Coding Dynami Adaptive Streaming Over HTTP Using Multiple Connetions Samar Ibrahim, Ahmed H. Zahran and Mahmoud H. Ismail Department of Eletronis and Eletrial Communiations, Faulty

More information

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization Self-Adaptive Parent to Mean-Centri Reombination for Real-Parameter Optimization Kalyanmoy Deb and Himanshu Jain Department of Mehanial Engineering Indian Institute of Tehnology Kanpur Kanpur, PIN 86 {deb,hjain}@iitk.a.in

More information

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of

More information

Batch Auditing for Multiclient Data in Multicloud Storage

Batch Auditing for Multiclient Data in Multicloud Storage Advaned Siene and Tehnology Letters, pp.67-73 http://dx.doi.org/0.4257/astl.204.50. Bath Auditing for Multilient Data in Multiloud Storage Zhihua Xia, Xinhui Wang, Xingming Sun, Yafeng Zhu, Peng Ji and

More information

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks A Dual-Hamiltonian-Path-Based Multiasting Strategy for Wormhole-Routed Star Graph Interonnetion Networks Nen-Chung Wang Department of Information and Communiation Engineering Chaoyang University of Tehnology,

More information

Semi-Supervised Affinity Propagation with Instance-Level Constraints

Semi-Supervised Affinity Propagation with Instance-Level Constraints Semi-Supervised Affinity Propagation with Instane-Level Constraints Inmar E. Givoni, Brendan J. Frey Probabilisti and Statistial Inferene Group University of Toronto 10 King s College Road, Toronto, Ontario,

More information

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University

More information

HEXA: Compact Data Structures for Faster Packet Processing

HEXA: Compact Data Structures for Faster Packet Processing Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for

More information

Automated System for the Study of Environmental Loads Applied to Production Risers Dustin M. Brandt 1, Celso K. Morooka 2, Ivan R.

Automated System for the Study of Environmental Loads Applied to Production Risers Dustin M. Brandt 1, Celso K. Morooka 2, Ivan R. EngOpt 2008 - International Conferene on Engineering Optimization Rio de Janeiro, Brazil, 01-05 June 2008. Automated System for the Study of Environmental Loads Applied to Prodution Risers Dustin M. Brandt

More information

Gradient based progressive probabilistic Hough transform

Gradient based progressive probabilistic Hough transform Gradient based progressive probabilisti Hough transform C.Galambos, J.Kittler and J.Matas Abstrat: The authors look at the benefits of exploiting gradient information to enhane the progressive probabilisti

More information

SINR-based Network Selection for Optimization in Heterogeneous Wireless Networks (HWNs)

SINR-based Network Selection for Optimization in Heterogeneous Wireless Networks (HWNs) 48 J. ICT Res. Appl., Vol. 9, No., 5, 48-6 SINR-based Network Seletion for Optimization in Heterogeneous Wireless Networks (HWNs) Abubakar M. Miyim, Mahamod Ismail & Rosdiadee Nordin Department of Eletrial,

More information

Gray Codes for Reflectable Languages

Gray Codes for Reflectable Languages Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings

More information

IN RECENT years, multi-hop wireless networks have made

IN RECENT years, multi-hop wireless networks have made IEEE JOURNAL ON SELECED AREAS IN COMMUNUNICAIONS, VOL. 3, NO. 7, AUGUS 37 Revenue Maximization in ime-varying Multi-Hop Wireless Networks: A Dynami Priing Approah Yang Song, Chi Zhang, Member, IEEE, Yuguang

More information

Performance Benchmarks for an Interactive Video-on-Demand System

Performance Benchmarks for an Interactive Video-on-Demand System Performane Benhmarks for an Interative Video-on-Demand System. Guo,P.G.Taylor,E.W.M.Wong,S.Chan,M.Zukerman andk.s.tang ARC Speial Researh Centre for Ultra-Broadband Information Networks (CUBIN) Department

More information

A Comparison of Hard-state and Soft-state Signaling Protocols

A Comparison of Hard-state and Soft-state Signaling Protocols University of Massahusetts Amherst SholarWorks@UMass Amherst Computer Siene Department Faulty Publiation Series Computer Siene 2003 A Comparison of Hard-state and Soft-state Signaling Protools Ping Ji

More information

Sequential Incremental-Value Auctions

Sequential Incremental-Value Auctions Sequential Inremental-Value Autions Xiaoming Zheng and Sven Koenig Department of Computer Siene University of Southern California Los Angeles, CA 90089-0781 {xiaominz,skoenig}@us.edu Abstrat We study the

More information

IN structured P2P overlay networks, each node and file key

IN structured P2P overlay networks, each node and file key 242 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 21, NO. 2, FEBRUARY 2010 Elasti Routing Table with Provable Performane for Congestion Control in DHT Networks Haiying Shen, Member, IEEE,

More information

An Efficient and Scalable Approach to CNN Queries in a Road Network

An Efficient and Scalable Approach to CNN Queries in a Road Network An Effiient and Salable Approah to CNN Queries in a Road Network Hyung-Ju Cho Chin-Wan Chung Dept. of Eletrial Engineering & Computer Siene Korea Advaned Institute of Siene and Tehnology 373- Kusong-dong,

More information

High-level synthesis under I/O Timing and Memory constraints

High-level synthesis under I/O Timing and Memory constraints Highlevel synthesis under I/O Timing and Memory onstraints Philippe Coussy, Gwenolé Corre, Pierre Bomel, Eri Senn, Eri Martin To ite this version: Philippe Coussy, Gwenolé Corre, Pierre Bomel, Eri Senn,

More information

Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations

Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations ABSTRACT Maitreya Natu University of Delaware 103 Smith Hall Newark, DE 19716, USA natu@is.udel.edu Reently proposed apability

More information

THROUGHPUT EVALUATION OF AN ASYMMETRICAL FDDI TOKEN RING NETWORK WITH MULTIPLE CLASSES OF TRAFFIC

THROUGHPUT EVALUATION OF AN ASYMMETRICAL FDDI TOKEN RING NETWORK WITH MULTIPLE CLASSES OF TRAFFIC THROUGHPUT EVALUATION OF AN ASYMMETRICAL FDDI TOKEN RING NETWORK WITH MULTIPLE CLASSES OF TRAFFIC Priya N. Werahera and Anura P. Jayasumana Department of Eletrial Engineering Colorado State University

More information

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive

More information

Optimizing Large-Scale MIMO Cellular Downlink: Multiplexing, Diversity, or Interference Nulling?

Optimizing Large-Scale MIMO Cellular Downlink: Multiplexing, Diversity, or Interference Nulling? Optimizing Large-Sale MIMO Cellular Downlink: Multiplexing, Diversity, or Interferene Nulling? Kianoush Hosseini, Wei Yu, and Raviraj S. Adve The Edward S. Rogers Sr. Department of Eletrial and Computer

More information

Taming Decentralized POMDPs: Towards Efficient Policy Computation for Multiagent Settings

Taming Decentralized POMDPs: Towards Efficient Policy Computation for Multiagent Settings Taming Deentralized PMDPs: Towards ffiient Poliy omputation for Multiagent Settings. Nair and M. Tambe omputer Siene Dept. University of Southern alifornia Los Angeles A 90089 nair,tambe @us.edu M. Yokoo

More information

LRED: A Robust and Responsive AQM Algorithm Using Packet Loss Ratio Measurement

LRED: A Robust and Responsive AQM Algorithm Using Packet Loss Ratio Measurement IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, TPDS-179-5 1 LRED: A Robust and Responsive AQM Algorithm Using Paket Loss Ratio Measurement Chonggang Wang, Member, IEEE, Jianghuan Liu, Member, IEEE,

More information

arxiv:cs/ v1 [cs.ni] 12 Dec 2006

arxiv:cs/ v1 [cs.ni] 12 Dec 2006 Optimal Filtering for DDoS Attaks Karim El Defrawy ICS Dept. UC Irvine keldefra@ui.edu Athina Markopoulou EECS Dept. UC Irvine athina@ui.edu Katerina Argyraki EE Dept. Stanford Univ. argyraki@stanford.edu

More information

Using Augmented Measurements to Improve the Convergence of ICP

Using Augmented Measurements to Improve the Convergence of ICP Using Augmented Measurements to Improve the onvergene of IP Jaopo Serafin, Giorgio Grisetti Dept. of omputer, ontrol and Management Engineering, Sapienza University of Rome, Via Ariosto 25, I-0085, Rome,

More information

On Dynamic Server Provisioning in Multi-channel P2P Live Streaming

On Dynamic Server Provisioning in Multi-channel P2P Live Streaming On Dynami Server Provisioning in Multi-hannel P2P Live Streaming Chuan Wu Baohun Li Shuqiao Zhao Department of Computer Siene Department of Eletrial Multimedia Development Group The University of Hong

More information

Announcements. Lecture Caching Issues for Multi-core Processors. Shared Vs. Private Caches for Small-scale Multi-core

Announcements. Lecture Caching Issues for Multi-core Processors. Shared Vs. Private Caches for Small-scale Multi-core Announements Your fous should be on the lass projet now Leture 17: Cahing Issues for Multi-ore Proessors This week: status update and meeting A short presentation on: projet desription (problem, importane,

More information

Displacement-based Route Update Strategies for Proactive Routing Protocols in Mobile Ad Hoc Networks

Displacement-based Route Update Strategies for Proactive Routing Protocols in Mobile Ad Hoc Networks Displaement-based Route Update Strategies for Proative Routing Protools in Mobile Ad Ho Networks Mehran Abolhasan 1 and Tadeusz Wysoki 1 1 University of Wollongong, NSW 2522, Australia E-mail: mehran@titr.uow.edu.au,

More information

COMBINATION OF INTERSECTION- AND SWEPT-BASED METHODS FOR SINGLE-MATERIAL REMAP

COMBINATION OF INTERSECTION- AND SWEPT-BASED METHODS FOR SINGLE-MATERIAL REMAP Combination of intersetion- and swept-based methods for single-material remap 11th World Congress on Computational Mehanis WCCM XI) 5th European Conferene on Computational Mehanis ECCM V) 6th European

More information

References. December 1992, pp. 71 { 81. pp.457{467. Magazine, June for very large high throughput database systems,"

References. December 1992, pp. 71 { 81. pp.457{467. Magazine, June for very large high throughput database systems, the overall working time for other appliations. In ase, data ltering was the only appliation being run, then using distributed indexing, we an serve 00 times as many requests. 6 Conlusion We have explored

More information

Real-time Container Transport Planning with Decision Trees based on Offline Obtained Optimal Solutions

Real-time Container Transport Planning with Decision Trees based on Offline Obtained Optimal Solutions Real-time Container Transport Planning with Deision Trees based on Offline Obtained Optimal Solutions Bart van Riessen vanriessen@ese.eur.nl Eonometri Institute Erasmus Shool of Eonomis Erasmus University

More information

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,

More information

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes Deteting Outliers in High-Dimensional Datasets with Mixed Attributes A. Koufakou, M. Georgiopoulos, and G.C. Anagnostopoulos 2 Shool of EECS, University of Central Florida, Orlando, FL, USA 2 Dept. of

More information

Dynamic Backlight Adaptation for Low Power Handheld Devices 1

Dynamic Backlight Adaptation for Low Power Handheld Devices 1 Dynami Baklight Adaptation for ow Power Handheld Devies 1 Sudeep Pasriha, Manev uthra, Shivajit Mohapatra, Nikil Dutt and Nalini Venkatasubramanian 444, Computer Siene Building, Shool of Information &

More information

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1. Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,

More information

Path Diversity for Overlay Multicast Streaming

Path Diversity for Overlay Multicast Streaming Path Diversity for Overlay Multiast Streaming Matulya Bansal and Avideh Zakhor Department of Eletrial Engineering and Computer Siene University of California, Berkeley Berkeley, CA 9472 {matulya, avz}@ees.berkeley.edu

More information

Particle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating

Particle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating Original Artile Partile Swarm Optimization for the Design of High Diffration Effiient Holographi Grating A.K. Tripathy 1, S.K. Das, M. Sundaray 3 and S.K. Tripathy* 4 1, Department of Computer Siene, Berhampur

More information

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering A Novel Bit Level Time Series Representation with Impliation of Similarity Searh and lustering hotirat Ratanamahatana, Eamonn Keogh, Anthony J. Bagnall 2, and Stefano Lonardi Dept. of omputer Siene & Engineering,

More information

the data. Structured Principal Component Analysis (SPCA)

the data. Structured Principal Component Analysis (SPCA) Strutured Prinipal Component Analysis Kristin M. Branson and Sameer Agarwal Department of Computer Siene and Engineering University of California, San Diego La Jolla, CA 9193-114 Abstrat Many tasks involving

More information

Design and Evaluation of Automatic Workflow Scaling Algorithms for Multi-Tenant SaaS

Design and Evaluation of Automatic Workflow Scaling Algorithms for Multi-Tenant SaaS Design and Evaluation of Automati Workflow Saling Algorithms for Multi-Tenant SaaS Ankita Atrey 1, Hendrik Moens 1, Gregory Van Seghbroek 1, Bruno Volkaert 1, and Filip De Turk 1 1 INTEC-IBCN-iMinds, Ghent

More information

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality INTERNATIONAL CONFERENCE ON MANUFACTURING AUTOMATION (ICMA200) Multi-Piee Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality Stephen Stoyan, Yong Chen* Epstein Department of

More information

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of

More information

C 2 C 3 C 1 M S. f e. e f (3,0) (0,1) (2,0) (-1,1) (1,0) (-1,0) (1,-1) (0,-1) (-2,0) (-3,0) (0,-2)

C 2 C 3 C 1 M S. f e. e f (3,0) (0,1) (2,0) (-1,1) (1,0) (-1,0) (1,-1) (0,-1) (-2,0) (-3,0) (0,-2) SPECIAL ISSUE OF IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION: MULTI-ROBOT SSTEMS, 00 Distributed reonfiguration of hexagonal metamorphi robots Jennifer E. Walter, Jennifer L. Welh, and Nany M. Amato Abstrat

More information

Cluster-Based Cumulative Ensembles

Cluster-Based Cumulative Ensembles Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,

More information

New Fuzzy Object Segmentation Algorithm for Video Sequences *

New Fuzzy Object Segmentation Algorithm for Video Sequences * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 521-537 (2008) New Fuzzy Obet Segmentation Algorithm for Video Sequenes * KUO-LIANG CHUNG, SHIH-WEI YU, HSUEH-JU YEH, YONG-HUAI HUANG AND TA-JEN YAO Department

More information

Parallelizing Frequent Web Access Pattern Mining with Partial Enumeration for High Speedup

Parallelizing Frequent Web Access Pattern Mining with Partial Enumeration for High Speedup Parallelizing Frequent Web Aess Pattern Mining with Partial Enumeration for High Peiyi Tang Markus P. Turkia Department of Computer Siene Department of Computer Siene University of Arkansas at Little Rok

More information

KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION

KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION KERNEL SPARSE REPRESENTATION WITH LOCAL PATTERNS FOR FACE RECOGNITION Cuiui Kang 1, Shengai Liao, Shiming Xiang 1, Chunhong Pan 1 1 National Laboratory of Pattern Reognition, Institute of Automation, Chinese

More information

CleanUp: Improving Quadrilateral Finite Element Meshes

CleanUp: Improving Quadrilateral Finite Element Meshes CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)

More information

Direct-Mapped Caches

Direct-Mapped Caches A Case for Diret-Mapped Cahes Mark D. Hill University of Wisonsin ahe is a small, fast buffer in whih a system keeps those parts, of the ontents of a larger, slower memory that are likely to be used soon.

More information

A Hybrid Neuro-Genetic Approach to Short-Term Traffic Volume Prediction

A Hybrid Neuro-Genetic Approach to Short-Term Traffic Volume Prediction A Hybrid Neuro-Geneti Approah to Short-Term Traffi Volume Predition 1. Introdution Shahriar Afandizadeh 1,*, Jalil Kianfar 2 Reeived: January 2003, Revised: July 2008, Aepted: January 2009 Abstrat: This

More information

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion

More information

The Implementation of RRTs for a Remote-Controlled Mobile Robot

The Implementation of RRTs for a Remote-Controlled Mobile Robot ICCAS5 June -5, KINEX, Gyeonggi-Do, Korea he Implementation of RRs for a Remote-Controlled Mobile Robot Chi-Won Roh*, Woo-Sub Lee **, Sung-Chul Kang *** and Kwang-Won Lee **** * Intelligent Robotis Researh

More information

Alleviating DFT cost using testability driven HLS

Alleviating DFT cost using testability driven HLS Alleviating DFT ost using testability driven HLS M.L.Flottes, R.Pires, B.Rouzeyre Laboratoire d Informatique, de Robotique et de Miroéletronique de Montpellier, U.M. CNRS 5506 6 rue Ada, 34392 Montpellier

More information

CA Unified Infrastructure Management 8.x Implementation Proven Professional Exam (CAT-540) Study Guide Version 1.1

CA Unified Infrastructure Management 8.x Implementation Proven Professional Exam (CAT-540) Study Guide Version 1.1 Management 8.x Implementation Proven Professional Exam (CAT-540) Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information.

More information

CA Single Sign-On 12.x Proven Implementation Professional Exam (CAT-140) Study Guide Version 1.5

CA Single Sign-On 12.x Proven Implementation Professional Exam (CAT-140) Study Guide Version 1.5 Study Guide Version 1.5 PROPRIETARY AND CONFIDENTIAL INFORMATION 2018 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized use,

More information

An Interactive-Voting Based Map Matching Algorithm

An Interactive-Voting Based Map Matching Algorithm Eleventh International Conferene on Mobile Data Management An Interative-Voting Based Map Mathing Algorithm Jing Yuan* University of Siene and Tehnology of China Hefei, China yuanjing@mail.ust.edu.n Yu

More information

Episode 12: TCP/IP & UbiComp

Episode 12: TCP/IP & UbiComp Episode 12: TCP/IP & UbiComp Hannes Frey and Peter Sturm University of Trier Outline Introdution Mobile IP TCP and Mobility Conlusion Referenes [1] James D. Solomon, Mobile IP: The Unplugged, Prentie Hall,

More information