Broadcasting XORs: On the Application of Network Coding in Access Point-to-Multipoint Networks

Size: px
Start display at page:

Download "Broadcasting XORs: On the Application of Network Coding in Access Point-to-Multipoint Networks"

Transcription

1 Broadcasting XORs: On the Application of Network Coding in Access Point-to-Mltipoint Networks The MIT Faclty has made this article openly available Please share how this access benefits yo Yor story matters Citation As Pblished Pblisher Foli, Kerim, Jerome Casse, Ivan Sergeev, Mriel Medard, and Martin Maier Broadcasting XORs: On the Application of Network Coding in Access Point-to-Mltipoint Networks Lectre Notes in Compter Science (01): Springer-Verlag Version Athor's final manscript Accessed Fri Feb 0 3:46:41 EST 018 Citable Link Terms of Use Creative Commons Attribtion-Noncommercial-Share Alike Detailed Terms

2 Broadcasting XORs: On the Application of Network Coding in Access Point-to-Mltipoint Networks Kerim Foli 1, Jérôme Casse, Ivan Sergeev 1, Mriel Médard 1, and Martin Maier 3 1 Research Laboratory of Electronics (RLE), Massachsetts Institte of Technology (MIT), Cambridge, MA 0139, USA {foli,vsergeev,medard}@mited Department of Methematics and Applications, École Normale Spériere (ENS), Paris, France jeromecasse@ensfr 3 Optical Zeitgeist Laboratory, INRS, Montréal, Canada H5A 1K6 maier@emtinrsca Abstract We investigate network coding (NC) in access point-to-mltipoint (PMP) broadcast networks Characterized by a shared nicast pstream channel and a time-shared broadcast downstream channel, PMP networks are widely deployed in optical and wireless access networks We develop a qeing-theoretic model of NC at the medim access control (MAC) sblayer and analyze the impact of NC on packet delay Or analysis is validated throgh discrete-event simlation and demonstrates significant delay advantages for NC nder high loads and localized traffic Keywords: Access Networks, Network Coding, Packet Delay, Point-to- Mltipoint, Polling 1 Introdction Network coding (NC) is an innovative technology that has been shown to improve throghpt, simplify roting, and provide robstness against transmission errors and failres in varios packet networks [1, ] In addition to their traditional forwarding and roting fnctions, NC-enabled nodes may combine or separate transient bits, packets, or flows throgh coding and decoding operations withot loss of information A growing nmber of promising NC applications have been proposed in diverse areas sch as wireless mobile networks, video transmission, peer-to-peer networks, secrity, monitoring, and sensor networks [1, 3, 4] In a recent stdy, significant throghpt gains were demonstrated experimentally in NC-enabled WiFi-based mesh networks [5] In this work, we focs on the application of NC within a particlar class of point-to-mltipoint (PMP) broadcast networks Figs 1 (a) and (b) depict their fndamental characteristics These are centralized networks with a nmber of ser nodes (U) commnicating exclsively throgh a central access point (AP) as follows The plink from any ser towards the AP is a point-to-point link

3 Network Coding in Access Point-to-Mltipoint Networks while the downlink from the AP back to the sers is a broadcast PMP link Althogh the plink and downlink may se more than one freqency channel or transmission medim (eg, separate fibers, wireless spatial diversity), we restrict or stdy to the se of one separate channel in each of the pstream and downstream directions The AP arbitrates the transmissions of the terminals over the plink channel dynamically, whereas the downlink ses time-division mltiplexing (TDM) In sch PMP architectres, NC can exploit the nderlying broadcast architectre to convert nicast transmissions into more efficient broadcast transmissions, as depicted in Figs 1 (c) and (d) In this illstrative scenario, two packets are exchanged between two sers, U 1 and U Withot NC, sch an exchange may be performed in for separate packet transmissions, with the hb receiving and then broadcasting each packet individally, as shown in Fig 1 (c) With NC, the hb may code the received packets into a single packet sing a simple bitwise exclsive-or (XOR) operation, denoted by (see Fig 1 (d)) Upon receiving the coded packet, the terminals decode the packets destined to them sing a copy of their previosly transmitted packets NC hence achieves the packet exchange in only three packet transmissions, sing 50% less downstream bandwidth (a) Upstream (b) Downstream AP AP AP Access Point User EPON/GPON WiMAX/LTE cell WiFi WLAN SatCom Network Cable Network (c) AP (d) AP Fig 1 Network coding in Point-to-Mltipoint (PMP) networks The example of Figs 1 (c) and (d) is a particlar case of NC where the receiver nodes (U 1 and U ) se copies of their own previosly transmitted packets to decode received packets The concept has been explored in the context of wireless commnications, where it is denoted reverse carpooling [6], piggybacking, or pairwise XOR coding The centralized form of reverse carpooling illstrated in Fig 1 is applicable not only to PONs, bt to a nmber of access-metro network architectres sch as wireless local area networks (eg, infrastrctre-mode WiFi), celllar access networks (eg, long term evoltion (LTE) and WiMAX), broadband satellite

4 Network Coding in Access Point-to-Mltipoint Networks 3 networks, and cable networks (eg, DOCSIS) The stdy of localized traffic in PMP networks is motivated by the tremendos growth of traffic generated by applications that stand to benefit from local packet exchanges, inclding sergenerated high-definition video, peer-to-peer, video gaming, as well as voice and video conferencing [10] Frthermore, content caching at ser nodes may open p frther opportnities for local exchanges The application of NC in a centralized PMP setting for local traffic was recently stdied in the context of passive optical networks (PONs) throgh simlation [8, 7, 9] However, previos stdies of NC in PONs offer limited analyses of performance gains Or work differs from previos performance analyses of NC in PONs [7] in the following ways First, we do not consider normally distribted traffic rates Second, we focs on the se of NC at the MAC sblayer Most importantly, we are concerned with the qeeing effects on delay within a switch, particlarly at high loads In this article, we present a generic qeing-theoretic framework of a PMP network To simplify the analysis, we ignore pstream channel arbitration and focs on qeing delay at the AP We derive expressions for the average throghpt and qeing delay nder local traffic when NC is applied at the MAC sblayer Or analytical reslts are then validated throgh OPNET [11] discrete-event simlations In or discssion, we emphasize the high-load regime, where NC gains are visible The remainder of this article is organized as follows In Section, we describe or analytical model and assmptions In Section 3, we show analytically the potential advantages of the se of NC in PMP networks throgh deriving or bonding the average throghpt, qee size, and qeing delay at the AP In Section 4, we verify the condcted analysis and frther investigate NC throgh simlation Finally, we conclde in Section 5 Network Model Let the PMP network have n sers exchanging traffic locally, as depicted in Fig As mentioned in Section 1, since we focs on qeing delay at the AP, we assme a contention-free pstream channel where packets transmitted by sers arrive instantaneosly at the AP At the AP, two qeing configrations are stdied In the first, incoming packets are simply stored in an infinite first-in-first-ot (FIFO) qee, as shown in Fig (a), with a fixed service time T In the second, incoming packets are stored in a two-dimensional bffer matrix according to their sorce-destination pair, as depicted in Fig (b) In this configration, Q i j denotes the qee from ser i to ser j, where i and j are distinct indices in (1n) The bffer matrix has N = n(n 1) infinite qees This qeing configration was proposed in [7] to allow the NC-enabled server (NC server) to process sorce-destination qee pairs jointly, ths eliminating any reqired search for coding opportnities Since the coding consists of low-complexity XOR operations, we assme that coding delays are negligible compared to qeeing delays

5 4 Network Coding in Access Point-to-Mltipoint Networks (a) sers 1 FIFO Server (b) sers 1 n n n Access Point (single qee) destination 1 n {1 sorce X X{ X Access Point (bffer matrix) NC Server Broadcast Broadcast Fig PMP network model with (a) a single first-in-first-ot (FIFO) qee or (b) a two-dimensional bffer matrix NC s bidirectional relaying implies that the symmetrical entries of the pper and lower trianglars are visited simltaneosly by the NC server Each ser is modeled as the sorce of a stream of packets with arrivals that are independent and identically distribted (iid) over a period N T Frthermore, each packet is destined to one of the remaining (n 1) sers in an iid fashion A NC-enhanced AP ses exclsively the bffer matrix configration of Fig (b) For any distinct indices i and j in (1n), the NC server is capable of processing the pair of qees Q i j and Q j i, denoted (i j, j i), simltaneosly Alg 1 gives a formal description of NC server operation The NC server iterates throgh all qee pairs following a rond-robin discipline, allocating a fixed time-slot T to each qee pair irrespective of the qee contents This allows it to code packets opportnistically [5] Qeing delay in sch a strict TDM scheme constittes an pperbond for the dynamic case where the NC server does not wait when no packets are present in (i j, j i) Algorithm 1 NC server for i = 1 (n 1) do for j = (i + 1) n do Process (i j, j i) in time T 1 Qees non-empty transmit one coded packet One qee empty transmit one ncoded packet 3 Both qees empty wait T (only TDM scheme) end for end for

6 Network Coding in Access Point-to-Mltipoint Networks 5 3 Analysis In this section, we derive an expression for the average delay in the system for the two configrations of Fig nder Poisson ser-traffic arrivals We hence assme that packet arrivals are Poisson with parameter λ, where λ is the rate of arrival of packets originating from ser i and destined to ser j 31 No coding: the single-qee configration Under aggregate Poisson arrivals, the configration of Fig (a) satisfies the Markov property [1], and is therefore a classical M/D/1 Markov chain where the fixed service time is T and the total packet arrival rate is Nλ The condition for stability is Nλ < 1 T Therefore, the maximm system throghpt satisfies T max < 1 T We se the Pollaczek-Khinchine (P-K) mean-vale formla [1] to derive the average nmber of packets in the qee and the average qeing delay N Q = (Nλ) E ( T ) {1 (Nλ)E (T )} = (Nλ) T {1 (Nλ)T }, () W = (1) NλT {1 (Nλ)T } (3) 3 NC: the bffer matrix configration Definitions In the architectre of Fig (b), the time between any two visits from the NC server to any Q i j is N T We define the following variables: N t,i j : nmber of packets arriving in Q i j over the time interval [0, t[ p k : probability of k arrivals in an interval [t, t + N T [, or ( ) p k = P N t+ N T,i j N t,i j = k, (4) where i j Or assmptions on incoming traffic ensre that p k is independent from t, i, and j Under Poisson arrivals, p k is given by p k = e λ N T (λ N T )k, (5) k! where λ is the packet arrival rate into any qee Q i j in or configration X t,i j : nmber of packets in Q i j at time t

7 6 Network Coding in Access Point-to-Mltipoint Networks t k (i j): the instant preceding the k th visit of the NC server to Q i j Assming that Q 1 is processed at time t = 0, and that the server follows the procedre of Alg 1, t k (i j) is given by t k (i j) = ((m 1)(n m ) ) + (M m 1) T + k N T, (6) where m = min{i, j}, M = max{i, j}, and i j For example, for Q 1, the expression redces to t k (1 ) = k N T, (7) A k+1,i j : nmber of packets arriving at Q i j between the k th and the (k + 1) th visit of Q i j It follows that A k+1,i j = N tk+1 (i j),i j N tk (i j),i j (8) A: A random variable representing the nmber of arrivals in any qee Q i j over any period of length N T A has probability mass fnction {p k} k N, hence P (A = k) = p k (9) A(x): the probability-generating fnction of A, given by A(x) = p k x k (10) (S k,i j ) k N : infinite series representing the nmber of packets (ie, state) of Q i j jst before the k th visit of the NC server (S k,i j ) k N is defined by (S k,i j ) k N = ( ) X tk (i j),i j (11) k N For instance, Q 1 is associated to the series ( (S k,1 ) k N = X k N )k N T,1 (1) Stability Condition and Throghpt We assme that any Q i j receives on average less than one packet in any period of length N T Sch a condition is reasonable as the NC server processes at most one packet dring that period This stability condition can be expressed as k=0 where E () denotes the expected vale With Poisson inpt traffic, stability reqires E (A) = A (1) < 1, (13) λ N T < 1 (14) Therefore, the maximm system throghpt satisfies T NC max < N( 1 N T ) = T (15)

8 Network Coding in Access Point-to-Mltipoint Networks 7 p 3 p m p m p p 3 p 1 p m p p 0 0 p 1 Fig 3 Markov chain associated to qee Q i j, with m > 3 Markov Chain Under the procedre of Alg 1, any qee Q i j perceives a single service from the NC server each N T period, hence the TDM characterization If the (k + 1) th server visit finds Q i j empty (ie, S k,i j = 0), its next state S k+1,i j will be the nmber of new packet arrivals (A k+1,i j ) Otherwise, it will be the sm of previos state and arrivals, mins one served packet In other words, for any qee Q i j, the series (S k,i j ) satisfies where S k+1,i j = f(s k,i j, A k+1,i j ) (16) f(s, a) = { s + a if s = 0, s + a 1 otherwise, (17) and A k+1,i j is independent from S k,i j for any k It follows that the series (S k,i j ) is a Markov chain with a transition matrix A given by p 0 p 1 p p 3 p 0 p 1 p p 3 A = 0 p 0 p 1 p (18) 0 0 p 0 p 1 Fig 3 illstrates the Markov chain described by A, where each state represents the nmber of packets waiting in Q i j In Fig 3, the transitions departing from state S k = 0 are dashed whereas those departing from S k = 1 are solid The transitions departing from all states S k (not shown) are identical to those departing from S k = 1 Under the stability condition of eq (13) and Poisson arrivals (eq (5)), it can be shown that the Markov chain (S k,i j ) k N associated to any qee Q i j is irredcible, aperiodic, and positive-recrrent [1] Frthermore, since qees Q i j differ only by their initial conditions (ie, S 0,i j ), we se qee Q 1 as a representative of sorce-destination qee statistics in the rest of the stdy Total delay in Q 1 We denote (π s ) s N the stationary distribtion of the Markov chain S k,1, and Π() its probability-generating fnction, given by Π(x) = π s x s (19) s=0

9 8 Network Coding in Access Point-to-Mltipoint Networks We first derive the average nmber of packets in Q 1 by calclating Π(x) sing the P-K transform eqation then determining Π (1) [1] The P-K formla yields A(x)(x 1) Π(x) = (1 ρ) (0) x A(x) where ρ is the tilization factor, given by ρ = E (A) = A (1) (1) Under the stability and traffic conditions of Section 3, we have A(x) = k=0 Therefore, eq (0) yields e λ N T (λ N T )k x k = e λ N T (x 1) () k! Π(x) = (1 λ N T )(x 1)eλ N T (x 1) x e λ N T (x 1) (3) From eq (3), we derive the following expressions for Π(x) and Π (x): Π(x) = (1 λ N T ) x ; (4) ( λ N T )i+1 i=0 (i+1)! (x 1) i Π (x) = (1 λ N T ) i=0 ( 1 λ N T x(i+1) i+ ) ( λ N (x 1) i (1 + x (5) ( λ N T )i+1 i=0 (i+1)! (x 1) i ) T)i+1 (i+1)! Evalating Π (x) for x = 1, we obtain ( 1 λ N Π 4 (1) = T ) λ N T 1 λ N T (6) Hence, for the NC configration of Fig (b), the average qeing time is given by ( 1 λ N W = Π 4 (1) = T ) N T 1 λ N T (7) Total nmber of packets in the system Let X t denote the total nmber of qeed packets in the system at time t, hence X t = X t,i j (8) It can be shown that i,j i j lim max E (X t ) NΠ (1) (9) [t,t+ N T ] t

10 Network Coding in Access Point-to-Mltipoint Networks 9 Therefore, we can se NΠ (1) as an pperbond for the nmber of packets in the bffer matrix: ( 1 λ N 4 N Q T ) λ N T 1 λ N T (30) 4 Nmerical Reslts 41 Infinite Qees In this section, we carry ot OPNET [11] simlations in order to validate the reslts of Section 3 for both configrations of Fig, where all qees are infinite As for the analysis, we simlate niform local traffic where inpt traffic is niformly distribted over the sorces and the destinations Table 1 shows the main simlation parameters We call the configrations of Fig (a) and (b) native and NC-TDM, respectively Recall that in NC-TDM, the NC server waits for one packet dration even when both sorce qees are empty, as per Alg 1 Table 1 Simlation Parameters Nmber of sers 8 Packet size (S p) 1500 Bytes Downstream data rate 1 Gb/s Warmp period s Data collection period 5 s Althogh the simlations illstrated in this section se a warmp period of s, a warmp of 10 s was also implemented for all simlations, with identical reslts, hence verifying steady-state conditions at all load points For all simlation plots in this section, we inclde 95% confidence intervals Average Qeing Delay (ms) Simlation Analysis Native NC-TDM Load (Gb/s) Fig 4 Average packet delay in native and NC-TDM configrations, for both analysis (dashed) and simlation (solid)

11 10 Network Coding in Access Point-to-Mltipoint Networks Fig 4 shows the sperposed analysis and simlation plots for average qeing delay (ie, waiting time) in both configrations The analytical expressions sed for the native and NC-TDM cases are given by eqations (3) and (7), respectively The offered load is increased from 01 Gb/s to the maximm stable load, given for the native and NC-TDM cases by eqations (1) and (15), respectively In Fig 4, the simlation plots match the analysis for both the native and NC- TDM cases, particlarly for the more relevant high loads In the native case, the average difference between analysis and simlation for the highest load qarter (075 Gb/s to 1 Gb/s) is 5 µs, a relative difference of 36% In the NC-TDM scheme, the average difference in the highest load qarter (15 Gb/s to Gb/s) is 190 µs, a relative difference of 10% The NC-TDM plots show that the steady-state qeing delay remains stable p to Gb/s This indicates that network coding keeps the average qee size within the bffer matrix (ie, the size of Q i j ) stable for loads above the available downstream data rate Both analysis and simlation reslts confirm that network coding is therefore able to spport loads p to twice the available downstream data rate nder niform local traffic Both analysis and simlation also show that there is a delay penalty incrred by the NC-TDM scheme at all loads below 1 Gb/s This load penalty remains below 05 ms and is de to the TDM process described in Alg 1: Whereas the native scheme is dynamic in natre, the NC-TDM scheme reslts in a time-slot withot packet transmission for each empty sorce-destination qee pair Sch inefficiency may be removed sing a dynamic NC scheme, as shown in the next section 4 Finite Qees In this section, we frther rn OPNET [11] simlations for qees that are limited in size In addition to applying the parameters of table 1, we limit the total bffer size to N max =1 MByte Moreover, we implement an additional scheme whereby NC is performed in a dynamic fashion (ie, no waiting time in Alg 1) We label this scheme NC-dynamic In the NC configration of Fig (b) which applies to both the NC-TDM and NC-dynamic schemes, we limit each sorce-destination qee (Q i j ) to N max /N in order to have eqal total bffer resorces compared to the native scheme Note that the smaller size of the sorce-destination qees does not affect the maximm attainable throghpt in the NC schemes, as is shown below Fig 5 (a) depicts the average throghpt for the native, NC-TDM, and NCdynamic schemes when the total offered load ranges from 01 Gb/s to 5 Gb/s As expected from throghpt ineqalities of eq (1) and (15), throghpt is eqal to the offered load ntil it reaches the stability limit That limit is eqal to the downstream data rate (T max = 1 Gb/s) for the native scheme and reaches twice the downstream rate (Tmax NC = Gb/s) sing network coding (see Fig 5(a)) Fig 5 (b), we plot the average qeing delay in the three simlated schemes We observe that the average delay crves reach satration vales in all implemented schemes, a conseqence of the limits in qee sizes

12 Network Coding in Access Point-to-Mltipoint Networks 11 Fig 5 (a) Average throghpt in native (black/solid), NC-TDM (grey), and NCdynamic (black/dashed) schemes; (b) Average packet delay in native, NC-TDM, and NC-dynamic configrations At very high loads, incoming packets that are not dropped are likely to see a nearly fll qee In the native scheme, their waiting time is pper-bond by W max = (N max /S p ) T = ms, (31) where S p is the packet size and T is the service time (ie, packet transmission time) In the NC schemes, however, that figre becomes W NC max = (N max /NS p ) (T N/) = W max / = ms, (3) acconting for the redced qee size and the increased service cycle time Fig 5 (b) depicts the two compted delay pper-bonds This theoretical 50% redction in satration delay is verified in the simlation reslts The softer satration seen in the NC schemes is de to the ability of network coding to drain qees faster, hence preventing the qee size from reaching its maximm level even at very high loads More importantly, compared to the NC-TDM scheme, the NC-dynamic scheme effectively eliminates any low-load penalty inherent to the TDM process This is clear from the low-load inset of Fig 5 (b) In addition to its improved throghpt, the NC-dynamic scheme ths exhibits packet delays that are lower than the native scheme at all loads At loads slightly above 1 Gb/s, the delay gains of network coding relative to the native scheme attain two orders of magnitde

13 1 Network Coding in Access Point-to-Mltipoint Networks 5 Conclsions We have shown throgh analysis and discrete-event simlation that the application of network coding in Point-to-Mltipoint (PMP) broadcast networks achieves potentially a two-fold throghpt increase as well as qeing delay gains reaching two orders of magnitde at high loads and nder niform local traffic In access PMP networks, sch performance gains are a strong argment in favor of allocating more bandwidth to pstream channels at the expense of downstream channels, nder highly localized traffic Ftre invesatigation incldes nbalanced pair loads, varying nmber of sers, mlticast traffic, new NC server algorithms, and dal-stage PMP models Acknowledgment This work was spported in part by the Natral Sciences and Engineering Research Concil of Canada (NSERC) References 1 M Médard and A Sprintson (Editors), Network Coding: Fndamentals and Applications Academic Press, Nov 011 T Ho and D Ln, Network Coding: An Introdction Cambridge University Press, Apr C Fragoli, D Katabi, A Markopolo, M Médard, and H Rahl, Wireless Network Coding: Opportnities & Challenges, in Proc, IEEE MILCOM, Orlando, FL, USA, Oct 007, pp C Fragoli and E Soljanin, Network Coding Applications, Fondations and Trends in Networking, vol, no, pp , Jan S Katti, H Rahl, W H, D Katabi, M Médard, and J Crowcroft, XORs in the Air: Practical Wireless Network Coding, IEEE/ACM Transactions on Networking, vol 16, no 3, pp , Jne M Effros, T Ho, and S Kim, A Tiling Approach to Network Code Design for Wireless Networks, in Proc, Information Theory Workshop, Pnta del Este, Urgay, Mar 006, pp K Miller, T Biermann, H Woesner, and H Karl, Network Coding in Passive Optical Networks, in Proc, IEEE International Symposim on Network Coding, Toronto, ON, Canada, Jne 010, pp M Belzner and H Hanstein, Network Coding in Passive Optical Networks, in Proc, ECOC, Vienna, Astria, Sep 009, pp 1 9 K Foli, M Maier, and M Médard, Network Coding in Next-Generation Passive Optical Networks, IEEE Commnications Magazine, vol 49, no 9, pp 38 46, Sept Cisco Systems, Cisco Visal Networking Index: Forecast and Methodology, , Jne OPNET Modeler L Kleinrock, Qeeing Systems, Volme I: Theory John Wiley & Sons, 1975

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY 2007 1 On the Analysis of the Bletooth Time Division Dplex Mechanism Gil Zssman Member, IEEE, Adrian Segall Fellow, IEEE, and Uri Yechiali

More information

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna

More information

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity

More information

Lecture 13: Traffic Engineering

Lecture 13: Traffic Engineering Lectre 13: Traffic Engineering CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Mike Freedman, Nick Feamster, and Ming Zhang Lectre 13 Overview Dealing with mltiple paths Mltihoming Entact

More information

The Disciplined Flood Protocol in Sensor Networks

The Disciplined Flood Protocol in Sensor Networks The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab

More information

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips

REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands

More information

5 Performance Evaluation

5 Performance Evaluation 5 Performance Evalation his chapter evalates the performance of the compared to the MIP, and FMIP individal performances. We stdy the packet loss and the latency to restore the downstream and pstream of

More information

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment

More information

Networks An introduction to microcomputer networking concepts

Networks An introduction to microcomputer networking concepts Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES

More information

Isilon InsightIQ. Version 2.5. User Guide

Isilon InsightIQ. Version 2.5. User Guide Isilon InsightIQ Version 2.5 User Gide Pblished March, 2014 Copyright 2010-2014 EMC Corporation. All rights reserved. EMC believes the information in this pblication is accrate as of its pblication date.

More information

Evaluating Influence Diagrams

Evaluating Influence Diagrams Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will

More information

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks Cost Based Local Forwarding Transmission Schemes for Two-hop Celllar Networks Zhenggang Zhao, Xming Fang, Yan Long, Xiaopeng H, Ye Zhao Key Lab of Information Coding & Transmission Sothwest Jiaotong University,

More information

FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES

FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES RICARDO G. DURÁN AND ARIEL L. LOMBARDI Abstract. We consider the nmerical approximation of a model convection-diffsion

More information

Cautionary Aspects of Cross Layer Design: Context, Architecture and Interactions

Cautionary Aspects of Cross Layer Design: Context, Architecture and Interactions Cationary Aspects of Cross Layer Design: Context, Architectre and Interactions Vikas Kawadia and P. R. Kmar Dept. of Electrical and Compter Engineering, and Coordinated Science Lab University of Illinois,

More information

EMC ViPR. User Guide. Version

EMC ViPR. User Guide. Version EMC ViPR Version 1.1.0 User Gide 302-000-481 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is accrate

More information

A sufficient condition for spiral cone beam long object imaging via backprojection

A sufficient condition for spiral cone beam long object imaging via backprojection A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral

More information

Lecture 10. Diffraction. incident

Lecture 10. Diffraction. incident 1 Introdction Lectre 1 Diffraction It is qite often the case that no line-of-sight path exists between a cell phone and a basestation. In other words there are no basestations that the cstomer can see

More information

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,

More information

Constructing Multiple Light Multicast Trees in WDM Optical Networks

Constructing Multiple Light Multicast Trees in WDM Optical Networks Constrcting Mltiple Light Mlticast Trees in WDM Optical Networks Weifa Liang Department of Compter Science Astralian National University Canberra ACT 0200 Astralia wliang@csaneda Abstract Mlticast roting

More information

Date: December 5, 1999 Dist'n: T1E1.4

Date: December 5, 1999 Dist'n: T1E1.4 12/4/99 1 T1E14/99-559 Project: T1E14: VDSL Title: Vectored VDSL (99-559) Contact: J Cioffi, G Ginis, W Y Dept of EE, Stanford U, Stanford, CA 945 Cioffi@stanforded, 1-65-723-215, F: 1-65-724-3652 Date:

More information

Millimeter-Wave Multi-Hop Wireless Backhauling for 5G Cellular Networks

Millimeter-Wave Multi-Hop Wireless Backhauling for 5G Cellular Networks 2017 IEEE 85th Vehiclar Technology Conference (VTC-Spring) Millimeter-Wave Mlti-Hop Wireless Backhaling for 5G Celllar Networks B. P. S. Sahoo, Chn-Han Yao, and Hng-Y Wei Gradate Institte of Electrical

More information

Illumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY

Illumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY Illmina LIMS Software Gide Jne 2017 ILLUMINA PROPRIETARY This docment and its contents are proprietary to Illmina, Inc. and its affiliates ("Illmina"), and are intended solely for the contractal se of

More information

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING International Jornal of Modern Engineering Research (IJMER) www.imer.com Vol.1, Isse1, pp-134-139 ISSN: 2249-6645 IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING

More information

IoT-Cloud Service Optimization in Next Generation Smart Environments

IoT-Cloud Service Optimization in Next Generation Smart Environments 1 IoT-Clod Service Optimization in Next Generation Smart Environments Marc Barcelo, Alejandro Correa, Jaime Llorca, Antonia M. Tlino, Jose Lopez Vicario, Antoni Morell Universidad Atonoma de Barcelona,

More information

STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWORK DYNAMICS FOR STATIC OPTIMIZATION

STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWORK DYNAMICS FOR STATIC OPTIMIZATION STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWOR DYNAMICS FOR STATIC OPTIMIZATION Grsel Serpen and Yifeng X Electrical Engineering and Compter Science Department, The University of Toledo, Toledo, OH

More information

Minimal Edge Addition for Network Controllability

Minimal Edge Addition for Network Controllability This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,

More information

CAPL Scripting Quickstart

CAPL Scripting Quickstart CAPL Scripting Qickstart CAPL (Commnication Access Programming Langage) For CANalyzer and CANoe V1.01 2015-12-03 Agenda Important information before getting started 3 Visal Seqencer (GUI based programming

More information

Resolving Linkage Anomalies in Extracted Software System Models

Resolving Linkage Anomalies in Extracted Software System Models Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program

More information

Computer User s Guide 4.0

Computer User s Guide 4.0 Compter User s Gide 4.0 2001 Glenn A. Miller, All rights reserved 2 The SASSI Compter User s Gide 4.0 Table of Contents Chapter 1 Introdction...3 Chapter 2 Installation and Start Up...5 System Reqirements

More information

Maximum Weight Independent Sets in an Infinite Plane

Maximum Weight Independent Sets in an Infinite Plane Maximm Weight Independent Sets in an Infinite Plane Jarno Nosiainen, Jorma Virtamo, Pasi Lassila jarno.nosiainen@tkk.fi, jorma.virtamo@tkk.fi, pasi.lassila@tkk.fi Department of Commnications and Networking

More information

Energy-Efficient Mobile-Edge Computation Offloading for Applications with Shared Data

Energy-Efficient Mobile-Edge Computation Offloading for Applications with Shared Data Energy-Efficient Mobile-Edge Comptation Offloading for Applications with Shared Data Xiangy He, Hong Xing, Ye Chen, Armgam Nallanathan School of Electronic Engineering and Compter Science Qeen Mary University

More information

Unit Testing with VectorCAST and AUTOSAR

Unit Testing with VectorCAST and AUTOSAR Unit Testing with VectorCAST and AUTOSAR Vector TechDay Software Testing with VectorCAST V1.0 2018-11-15 Agenda Introdction Unit Testing Demo Working with AUTOSAR Generated Code Unit Testing AUTOSAR SWCs

More information

Master for Co-Simulation Using FMI

Master for Co-Simulation Using FMI Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany

More information

IP Multicast Fault Recovery in PIM over OSPF

IP Multicast Fault Recovery in PIM over OSPF 1 IP Mlticast Falt Recovery in PIM over OSPF Abstract Relatively little attention has been given to nderstanding the falt recovery characteristics and performance tning of native IP mlticast networks.

More information

Blended Deformable Models

Blended Deformable Models Blended Deformable Models (In IEEE Trans. Pattern Analysis and Machine Intelligence, April 996, 8:4, pp. 443-448) Doglas DeCarlo and Dimitri Metaxas Department of Compter & Information Science University

More information

METAMODEL FOR SOFTWARE SOLUTIONS IN COMPUTED TOMOGRAPHY

METAMODEL FOR SOFTWARE SOLUTIONS IN COMPUTED TOMOGRAPHY VOL. 10, NO 22, DECEBER, 2015 ISSN 1819-6608 ETAODEL FOR SOFTWARE SOLUTIONS IN COPUTED TOOGRAPHY Vitaliy ezhyev Faclty of Compter Systems and Software Engineering, Universiti alaysia Pahang, Gambang, alaysia

More information

Fault Tolerance in Hypercubes

Fault Tolerance in Hypercubes Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different

More information

NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS

NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS ETWORK PRESERVATIO THROUGH A TOPOLOGY COTROL ALGORITHM FOR WIRELESS MESH ETWORKS F. O. Aron, T. O. Olwal, A. Krien, Y. Hamam Tshwane University of Technology, Pretoria, Soth Africa. Dept of the French

More information

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,

More information

LWIP and Wi-Fi Boost Flow Control

LWIP and Wi-Fi Boost Flow Control LWIP and Wi-Fi Boost Flow Control David López-Pérez 1, Jonathan Ling 1, Bong Ho Kim 1, Vasdevan Sbramanian 1, Satish Kangovi 1, Ming Ding 2 1 Nokia Bell Laboratories 2 Data61, Astralia Abstract 3GPP LWIP

More information

Addressing in Future Internet: Problems, Issues, and Approaches

Addressing in Future Internet: Problems, Issues, and Approaches Addressing in Ftre Internet: Problems, Isses, and Approaches Mltimedia and Mobile commnications Laboratory Seol National University Jaeyong Choi, Chlhyn Park, Hakyng Jng, Taekyong Kwon, Yanghee Choi 19

More information

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems Congestion-adaptive Data Collection with Accracy Garantee in Cyber-Physical Systems Nematollah Iri, Lei Y, Haiying Shen, Gregori Calfield Department of Electrical and Compter Engineering, Clemson University,

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 153 Design of Operating Systems Spring 18 Midterm Review Midterm in class on Friday (May 4) Covers material from arch spport to deadlock Based pon lectre material and modles of the book indicated on

More information

An Introduction to GPU Computing. Aaron Coutino MFCF

An Introduction to GPU Computing. Aaron Coutino MFCF An Introdction to GPU Compting Aaron Cotino acotino@waterloo.ca MFCF What is a GPU? A GPU (Graphical Processing Unit) is a special type of processor that was designed to render and maniplate textres. They

More information

Secure Biometric-Based Authentication for Cloud Computing

Secure Biometric-Based Authentication for Cloud Computing Secre Biometric-Based Athentication for Clod Compting Kok-Seng Wong * and Myng Ho Kim School of Compter Science and Engineering, Soongsil University, Sangdo-Dong Dongjak-G, 156-743 Seol Korea {kswong,kmh}@ss.ac.kr

More information

A Recovery Algorithm for Reliable Multicasting in Reliable Networks

A Recovery Algorithm for Reliable Multicasting in Reliable Networks A Recovery Algorithm for Reliable Mlticasting in Reliable Networks Danyang Zhang Sibabrata Ray Dept. of Compter Science University of Alabama Tscaloosa, AL 35487 {dzhang, sib}@cs.a.ed Ragopal Kannan S.

More information

Topic Continuity for Web Document Categorization and Ranking

Topic Continuity for Web Document Categorization and Ranking Topic Continity for Web ocment Categorization and Ranking B. L. Narayan, C. A. Mrthy and Sankar. Pal Machine Intelligence Unit, Indian Statistical Institte, 03, B. T. Road, olkata - 70008, India. E-mail:

More information

An Optimization of Granular Network by Evolutionary Methods

An Optimization of Granular Network by Evolutionary Methods An Optimization of Granlar Networ by Evoltionary Methods YUN-HEE HAN, KEUN-CHANG KWAK* Dept. of Control, Instrmentation, and Robot Engineering Chosn University 375 Seos-dong, Dong-g, Gwangj, 50-759 Soth

More information

Method to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot

Method to build an initial adaptive Neuro-Fuzzy controller for joints control of a legged robot Method to bild an initial adaptive Nero-Fzzy controller for joints control of a legged robot J-C Habmremyi, P. ool and Y. Badoin Royal Military Academy-Free University of Brssels 08 Hobbema str, box:mrm,

More information

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz

More information

(2, 4) Tree Example (2, 4) Tree: Insertion

(2, 4) Tree Example (2, 4) Tree: Insertion Presentation for se with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 B-Trees and External Memory (2, 4) Trees Each internal node has 2 to 4 children:

More information

Collision Avoidance and Resolution Multiple Access: First-Success Protocols

Collision Avoidance and Resolution Multiple Access: First-Success Protocols Collision Avoidance and Resoltion Mltiple Access: First-Sccess Protocols Rodrigo Garcés and J.J. Garcia-Lna-Aceves askin Center for Compter Engineering and Information Sciences University of California

More information

MultiView: Improving Trust in Group Video Conferencing Through Spatial Faithfulness David T. Nguyen, John F. Canny

MultiView: Improving Trust in Group Video Conferencing Through Spatial Faithfulness David T. Nguyen, John F. Canny MltiView: Improving Trst in Grop Video Conferencing Throgh Spatial Faithflness David T. Ngyen, John F. Canny CHI 2007, April 28 May 3, 2007, San Jose, California, USA Presented by: Stefan Stojanoski 1529445

More information

Functions of Combinational Logic

Functions of Combinational Logic CHPTER 6 Fnctions of Combinational Logic CHPTER OUTLINE 6 6 6 6 6 5 6 6 6 7 6 8 6 9 6 6 Half and Fll dders Parallel inary dders Ripple Carry and Look-head Carry dders Comparators Decoders Encoders Code

More information

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003 From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information

More information

TRUSTED WIRELESS HEALTH A New Approach to Medical Grade Wireless

TRUSTED WIRELESS HEALTH A New Approach to Medical Grade Wireless By Mitchell Ross TRUSTED WIRELESS HEALTH A New Approach to Medical Grade Wireless Several crrent trends give case to rethink the design of wireless systems in medical bildings. Increasingly, patients are

More information

What s New in AppSense Management Suite Version 7.0?

What s New in AppSense Management Suite Version 7.0? What s New in AMS V7.0 What s New in AppSense Management Site Version 7.0? AppSense Management Site Version 7.0 is the latest version of the AppSense prodct range and comprises three prodct components,

More information

OPTI-502 Optical Design and Instrumentation I John E. Greivenkamp Homework Set 9 Fall, 2018

OPTI-502 Optical Design and Instrumentation I John E. Greivenkamp Homework Set 9 Fall, 2018 OPTI-502 Optical Design and Instrmentation I John E. Greivenkamp Assigned: 10/31/18 Lectre 21 De: 11/7/18 Lectre 23 Note that in man 502 homework and exam problems (as in the real world!!), onl the magnitde

More information

Alliances and Bisection Width for Planar Graphs

Alliances and Bisection Width for Planar Graphs Alliances and Bisection Width for Planar Graphs Martin Olsen 1 and Morten Revsbæk 1 AU Herning Aarhs University, Denmark. martino@hih.a.dk MADAGO, Department of Compter Science Aarhs University, Denmark.

More information

Tdb: A Source-level Debugger for Dynamically Translated Programs

Tdb: A Source-level Debugger for Dynamically Translated Programs Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,

More information

TAKING THE PULSE OF ICT IN HEALTHCARE

TAKING THE PULSE OF ICT IN HEALTHCARE ICT TODAY THE OFFICIAL TRADE JOURNAL OF BICSI Janary/Febrary 2016 Volme 37, Nmber 1 TAKING THE PULSE OF ICT IN HEALTHCARE + PLUS + High-Power PoE + Using HDBaseT in AV Design for Schools + Focs on Wireless

More information

Multi-lingual Multi-media Information Retrieval System

Multi-lingual Multi-media Information Retrieval System Mlti-lingal Mlti-media Information Retrieval System Shoji Mizobchi, Sankon Lee, Fmihiko Kawano, Tsyoshi Kobayashi, Takahiro Komats Gradate School of Engineering, University of Tokshima 2-1 Minamijosanjima,

More information

A choice relation framework for supporting category-partition test case generation

A choice relation framework for supporting category-partition test case generation Title A choice relation framework for spporting category-partition test case generation Athor(s) Chen, TY; Poon, PL; Tse, TH Citation Ieee Transactions On Software Engineering, 2003, v. 29 n. 7, p. 577-593

More information

Designing and Optimization of Heterogeneous OTN/DWDM Networks with Intermediate Grooming

Designing and Optimization of Heterogeneous OTN/DWDM Networks with Intermediate Grooming Designing and Optimization of Heterogeneos OTN/DWDM Networks with Intermediate Grooming Afonso Oliveira IST (METI afonso.oliveira@ist.tl.pt ABSTRACT The coexistence of annels with different bitrates in

More information

EMC AppSync. User Guide. Version REV 01

EMC AppSync. User Guide. Version REV 01 EMC AppSync Version 1.5.0 User Gide 300-999-948 REV 01 Copyright 2012-2013 EMC Corporation. All rights reserved. Pblished in USA. EMC believes the information in this pblication is accrate as of its pblication

More information

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems Reqirements Engineering Objectives An introdction to reqirements Gerald Kotonya and Ian Sommerville To introdce the notion of system reqirements and the reqirements process. To explain how reqirements

More information

Uncertainty Determination for Dimensional Measurements with Computed Tomography

Uncertainty Determination for Dimensional Measurements with Computed Tomography Uncertainty Determination for Dimensional Measrements with Compted Tomography Kim Kiekens 1,, Tan Ye 1,, Frank Welkenhyzen, Jean-Pierre Krth, Wim Dewlf 1, 1 Grop T even University College, KU even Association

More information

SZ-1.4: Significantly Improving Lossy Compression for Scientific Data Sets Based on Multidimensional Prediction and Error- Controlled Quantization

SZ-1.4: Significantly Improving Lossy Compression for Scientific Data Sets Based on Multidimensional Prediction and Error- Controlled Quantization SZ-1.4: Significantly Improving Lossy Compression for Scientific Data Sets Based on Mltidimensional Prediction and Error- Controlled Qantization Dingwen Tao (University of California, Riverside) Sheng

More information

PERFORMANCE EVALUATION AND HILS TEST OF CONTROL ALLOCATION METHODS FOR RECONFIGURATION CONTROL

PERFORMANCE EVALUATION AND HILS TEST OF CONTROL ALLOCATION METHODS FOR RECONFIGURATION CONTROL 6 TH INTENATIONA CONGESS OF THE AEONAUTICA SCIENCES Abstract PEFOMANCE EVAUATION AND HIS TEST OF CONTO AOCATION METHODS FO ECONFIGUATION CONTO Byong-Mn Min*, Bong-J Kim**, Eng-Tai Kim***, and Min-Jea Tahk*

More information

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods Annals of Operations Research 106, 19 46, 2001 2002 Klwer Academic Pblishers. Manfactred in The Netherlands. Discrete Cost Mlticommodity Network Optimization Problems and Exact Soltion Methods MICHEL MINOUX

More information

IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION

IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION ICAS 2 CONGRESS IDENTIFICATION OF THE AEROELASTIC MODEL OF A LARGE TRANSPORT CIVIL AIRCRAFT FOR CONTROL LAW DESIGN AND VALIDATION Christophe Le Garrec, Marc Hmbert, Michel Lacabanne Aérospatiale Matra

More information

The LS-STAG Method : A new Immersed Boundary / Level-Set Method for the Computation of Incompressible Viscous Flows in Complex Geometries

The LS-STAG Method : A new Immersed Boundary / Level-Set Method for the Computation of Incompressible Viscous Flows in Complex Geometries The LS-STAG Method : A new Immersed Bondary / Level-Set Method for the Comptation of Incompressible Viscos Flows in Complex Geometries Yoann Cheny & Olivier Botella Nancy Universités LEMTA - UMR 7563 (CNRS-INPL-UHP)

More information

Computer-Aided Mechanical Design Using Configuration Spaces

Computer-Aided Mechanical Design Using Configuration Spaces Compter-Aided Mechanical Design Using Configration Spaces Leo Joskowicz Institte of Compter Science The Hebrew University Jersalem 91904, Israel E-mail: josko@cs.hji.ac.il Elisha Sacks (corresponding athor)

More information

Real-time mean-shift based tracker for thermal vision systems

Real-time mean-shift based tracker for thermal vision systems 9 th International Conference on Qantitative InfraRed Thermography Jly -5, 008, Krakow - Poland Real-time mean-shift based tracker for thermal vision systems G. Bieszczad* T. Sosnowski** * Military University

More information

Statistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem

Statistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem Statistical Methods in fnctional MRI Lectre 7: Mltiple Comparisons 04/3/13 Martin Lindqist Department of Biostatistics Johns Hopkins University Data Processing Pipeline Standard Analysis Data Acqisition

More information

Neighbourhood Searches for the Bounded Diameter Minimum Spanning Tree Problem Embedded in a VNS, EA, and ACO

Neighbourhood Searches for the Bounded Diameter Minimum Spanning Tree Problem Embedded in a VNS, EA, and ACO Neighborhood Searches for the Bonded Diameter Minimm Spanning Tree Problem Embedded in a VNS, EA, and ACO Martin Grber Institte for Compter Graphics and Algorithms, Vienna University of Technology, Favoritenstraße

More information

Efficient and Accurate Delaunay Triangulation Protocols under Churn

Efficient and Accurate Delaunay Triangulation Protocols under Churn Efficient and Accrate Delanay Trianglation Protocols nder Chrn Dong-Yong Lee and Simon S. Lam Department of Compter Sciences The University of Texas at Astin {dylee, lam}@cs.texas.ed November 9, 2007 Technical

More information

Some Optimization Trade-offs in Wireless Network Coding

Some Optimization Trade-offs in Wireless Network Coding Some Optimization Trade-offs in Wireless Network Coding Yalin Evren Sagduyu and Anthony Ephremides Electrical and Computer Engineering Department and Institute for Systems Research University of Maryland,

More information

Constructing and Comparing User Mobility Profiles for Location-based Services

Constructing and Comparing User Mobility Profiles for Location-based Services Constrcting and Comparing User Mobility Profiles for Location-based Services Xihi Chen Interdisciplinary Centre for Secrity, Reliability and Trst, University of Lxemborg Jn Pang Compter Science and Commnications,

More information

Comparison of memory write policies for NoC based Multicore Cache Coherent Systems

Comparison of memory write policies for NoC based Multicore Cache Coherent Systems Comparison of memory write policies for NoC based Mlticore Cache Coherent Systems Pierre Gironnet de Massas, Frederic Petrot System-Level Synthesis Grop TIMA Laboratory 46, Av Felix Viallet, 38031 Grenoble,

More information

A GENERIC MODEL OF A BASE-ISOLATED BUILDING

A GENERIC MODEL OF A BASE-ISOLATED BUILDING Chapter 5 A GENERIC MODEL OF A BASE-ISOLATED BUILDING This chapter draws together the work o Chapters 3 and 4 and describes the assembly o a generic model o a base-isolated bilding. The irst section describes

More information

Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks

Efficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks 1 Efficient Schedling for Periodic Aggregation Qeries in Mltihop Sensor Networks XiaoHa X, Shaojie Tang, Member, IEEE, XiangYang Li, Senior Member, IEEE Abstract In this work, we stdy periodic qery schedling

More information

Local Run Manager. Software Reference Guide for MiSeqDx

Local Run Manager. Software Reference Guide for MiSeqDx Local Rn Manager Software Reference Gide for MiSeqDx Local Rn Manager Overview 3 Dashboard Overview 4 Administrative Settings and Tasks 7 Workflow Overview 12 Technical Assistance 17 Docment # 1000000011880

More information

Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN:

Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: 1137-3601 revista@aepia.org Asociación Española para la Inteligencia Artificial España Zaballos, Lis J.; Henning, Gabriela

More information

Content Content Introduction

Content Content Introduction Content Content Introdction...................................................................... 3 Roles in the provisioning process............................................................... 4 Server

More information

Sensor-Based Fast Thermal Evaluation Model For Energy Efficient High-Performance Datacenters

Sensor-Based Fast Thermal Evaluation Model For Energy Efficient High-Performance Datacenters Sensor-ased Fast Thermal valation Model For nergy fficient High-Performance atacenters Qinghi Tang Tridib Mkherjee, Sandeep K. S. Gpta Phil ayton ept. of lectrical ng. ept. of ompter Science and ng. Intel

More information

Research Article An Improved Peak Sidelobe Reduction Method for Subarrayed Beam Scanning

Research Article An Improved Peak Sidelobe Reduction Method for Subarrayed Beam Scanning International Jornal of Antennas and Propagation olme 215, Article ID 464521, 6 pages http://dx.doi.org/1.1155/215/464521 Research Article An Improved Peak Sidelobe Redction Method for Sbarrayed Beam Scanning

More information

webinar series

webinar series Ethernet@Atomotive webinar series Moving Forward: Tool Spported Development for Atomotive Ethernet in Time Sensitive Networks V1.06 2016-07-04 Agenda Introdction 3 Recap: Physical layers, network topology

More information

Discretized Approximations for POMDP with Average Cost

Discretized Approximations for POMDP with Average Cost Discretized Approximations for POMDP with Average Cost Hizhen Y Lab for Information and Decisions EECS Dept., MIT Cambridge, MA 0239 Dimitri P. Bertsekas Lab for Information and Decisions EECS Dept., MIT

More information

Introduction to Computational Manifolds and Applications

Introduction to Computational Manifolds and Applications IMPA - Institto de Matemática Pra e Aplicada, Rio de Janeiro, RJ, Brazil Introdction to Comptational Manifolds and Applications Part 1 - Constrctions Prof. Marcelo Ferreira Siqeira mfsiqeira@dimap.frn.br

More information

Making Full Use of Multi-Core ECUs with AUTOSAR Basic Software Distribution

Making Full Use of Multi-Core ECUs with AUTOSAR Basic Software Distribution Making Fll Use of Mlti-Core ECUs with AUTOSAR Basic Software Distribtion Webinar V0.1 2018-09-07 Agenda Motivation for Mlti-Core AUTOSAR Standard: SWC-Split MICROSAR Extension: BSW-Split BSW-Split: Technical

More information

Constrained Routing Between Non-Visible Vertices

Constrained Routing Between Non-Visible Vertices Constrained Roting Between Non-Visible Vertices Prosenjit Bose 1, Matias Korman 2, André van Renssen 3,4, and Sander Verdonschot 1 1 School of Compter Science, Carleton University, Ottawa, Canada. jit@scs.carleton.ca,

More information

Lecture 14: Congestion Control

Lecture 14: Congestion Control Lectre 14: Congestion Control CSE 222A: Compter Commnication Networks George Porter Thanks: Amin Vahdat, Dina Katabi Lectre 14 Overview TCP congestion control review XCP Overview CSE 222A Lectre 14: Congestion

More information

Image Compression Compression Fundamentals

Image Compression Compression Fundamentals Compression Fndamentals Data compression refers to the process of redcing the amont of data reqired to represent given qantity of information. Note that data and information are not the same. Data refers

More information

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.

The final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read. The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5

More information

Lecture 4: Routing. CSE 222A: Computer Communication Networks Alex C. Snoeren. Thanks: Amin Vahdat

Lecture 4: Routing. CSE 222A: Computer Communication Networks Alex C. Snoeren. Thanks: Amin Vahdat Lectre 4: Roting CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Amin Vahdat Lectre 4 Overview Pop qiz Paxon 95 discssion Brief intro to overlay and active networking 2 End-to-End Roting

More information

Hardware-Accelerated Free-Form Deformation

Hardware-Accelerated Free-Form Deformation Hardware-Accelerated Free-Form Deformation Clint Cha and Ulrich Nemann Compter Science Department Integrated Media Systems Center University of Sothern California Abstract Hardware-acceleration for geometric

More information

THE Unit Commitment problem (UCP) is the problem of

THE Unit Commitment problem (UCP) is the problem of IEEE TRANS IN POWER SYSTEMS 1 A new MILP-based approach for Unit Commitment in power prodction planning. Ana Viana and João Pedro Pedroso Abstract This paper presents a novel, iterative optimisation algorithm

More information

VirtuOS: an operating system with kernel virtualization

VirtuOS: an operating system with kernel virtualization VirtOS: an operating system with kernel virtalization Rslan Nikolaev, Godmar Back SOSP '13 Proceedings of the Twenty-Forth ACM Symposim on Oper ating Systems Principles 이영석, 신현호, 박재완 Index Motivation Design

More information

Picking and Curves Week 6

Picking and Curves Week 6 CS 48/68 INTERACTIVE COMPUTER GRAPHICS Picking and Crves Week 6 David Breen Department of Compter Science Drexel University Based on material from Ed Angel, University of New Mexico Objectives Picking

More information