Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points
|
|
- Lenard Quinn
- 6 years ago
- Views:
Transcription
1 Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University of Surrey, Guildford, UK e-ail: {S.Georgoulas, P.Triintzios, Abstract The priary role of adission control is to decide on the aount of traffic accepted into the network so that users conforing to their ablished traffic contracts achieve predefined perforance objectives, e.g. bounded packet loss probability, end-to-end delay. We consider Diffserv networks able to support real-tie traffic and we propose a novel fraework for adission control that involves both traffic descriptor and easureent based techniques and we copare its perforance with existing approaches. Our siulation results show that the perforance of our approach is rather insensitive to variations of the traffic sources. Even when the provided traffic descriptors are as siple as a single value denoting the required peak rate, the proposed schee achieves satisfactory perforance. I. INTRODUCTION Real-tie services have stringent delay and loss requireents. Differentiated services (Diffserv) is seen as the eerging technology to support IP Quality of Service (QoS) in a scalable fashion, without the relevant probles of Integrated services (Intserv), which require per icro-flow state inforation in the core network. In Diffserv, per flow state is only kept at edge routers, while in the core network, traffic with siilar QoS requireents is grouped in one of the engineered traffic classes and forwarded in an aggregate fashion. Adission control is the set of actions required at ingress nodes at the service instance ablishent phase to check whether a service requ is to be aditted or rejected. A service instance is aditted when the requed QoS can be satisfied without causing QoS violation to the already ablished service instances. In Diffserv, the violation ers to the QoS perceived by each of the engineered aggregate traffic classes rather than the QoS of individual icro-flows. An additional role of adission control is to optiize the use of network resources in order to achieve realistic network efficiency. The challenge is to design siple control functions that iprove efficiency under any offered traffic conditions. The various adission control approaches differ in the ethods they use to decide if there is enough capacity for the service requ and can be coarsely divided into three categories: (a) Adission control using a priori traffic descriptors, (b) Measureent based adission control (MBAC), and (c) Endpoint adission control (EAC). For the first approach [1], adission control is based on the assuption that it has perfect knowledge of each traffic source type that will be used in every link. It also knows the current nuber of ablished service instances. This inforation will enable adission control to copute the total aount of bandwidth required. Hence, it will only accept a service requ if the iniu aount of bandwidth required by the total nuber of ablished service instances, including the one, is less then the available service rate. It is obvious that this approach is optial if the accurate traffic descriptors are known and used for adission control decisions. As such, the perforance of this approach gives the upper bound for all other adission control approaches, provided of course that sources are conforant. However, since no traffic easureents are taken into consideration, if the provided traffic descriptors do not depict the actual behavior of the sources (for instance that could happen in case of non-conforant non-policed sources) or the appropriate traffic descriptors are not known a priori (for instance, only peak rate ay be known), the perforance of this adission control schee can be very low. The second approach (MBAC) tries to avoid the aforeentioned probles by shifting the task of traffic specification fro the user to the network []. Instead of users explicitly specifying their traffic descriptors, the network attepts to learn the characteristics of existing flows through real-tie easureents. This approach has a nuber of advantages. First, the user-specified traffic descriptors can be very siple, e.g. peak rate, which can be easily policed ([3] suggs that it is hard to police traffic according to a statistical odel). Second, an overly conservative specification does not result in over-allocation of resources for the entire duration of the service session. Third, when traffic fro different flows is ultiplexed, the QoS experienced depends often on their aggregate behavior, the statistics of which are easier to iate than those of an individual flow. However, relying on only quantities for adission control raises a nuber of issues that need to be considered, such as the iation errors [], syste dynaics and eory related issues. In the third approach, the end host/application probes the network by sending t packets along the transission path [4]. Based on soe etric then the host decides if the flow can be aditted. A requireent is for the end-to-end route to
2 be the sae for probing packets and flows. Setup delays ay be high and, furtherore, siultaneous probing by any sources can lead to a situation known as thrashing [4]. That is that even though the nuber of aditted flows is sall, the cuulative level of probe packets prevents further adissions. In this work we consider adission control for real-tie traffic. We define as real-tie traffic, sources that have a strict, usually sall, delay requireent and a bounded, not necessarily too low, packet loss rate (PLR) requireent. Note that jitter is another QoS paraeter for real-tie traffic but we do not consider it in this work. In a Diffserv doain we assue that such real-tie traffic is aggregated so that traffic fro sources coposing each traffic aggregate will receive the sae treatent over the entire doain. The delay requireent of the traffic aggregate has been taken into account in the provisioning stage, i.e. by appropriately setting sall packet queues and by anipulating the routing process to choose appropriate paths. Packets are expected to be lost only at the first point of aggregation (ingress node), where the serialization of the various traffic sources takes place. We assue that further downstrea; traffic aggregates are treated in a peak rate anner. This is feasible since, as stated in [5], in a coon network configuration, backbone links are overprovisioned. This paper is organized as follows: Section II presents our adission control fraework. In Section III we evaluate the perforance of our fraework against others found in the literature. Finally, in Section IV we conclude, suarizing our findings. II. FRAMEWORK FOR ADMISSION CONTROL In Diffserv networks, custoer traffic contracts are preagreed through SLSes [6] that include traffic descriptors. Our proposed approach is a cobination of Measureent-based and a priori Traffic descriptor Adission Control -we will be erring to it as MTAC. As such, it encopasses the positive features of both adission control schees. It provides a systeatic way to derive the bandwidth requireents of the already ablished flows through easureents and of the candidate for adission flow through its traffic descriptors. We use real-tie easureents of the actual load in order to cope with the fact that the traffic descriptors ay not depict the actual characteristics of individual flows. In this case, we ight end up with either under-utilization, if users overiate their requireents, or with QoS degradation if users underiate their requireents and the network is not able to police the efficiently. For bandwidth anipulation and allocation we adopted the effective bandwidth approach. According to [7], when the effect of statistical ultiplexing is significant, the distribution of the stationary bit rate can be accurately approxiated by a Gaussian distribution. Regarding the validity of this assuption, in [8] it is strongly sugged that the aggregation of even a fairly sall nuber of traffic streas is usually sufficient for the Gaussian characterization of the input process. In that case, the effective bandwidth of the ultiplexed sources is given by: C + a with a = ln( ε) ln( π) (1) where is the ean aggregate bit rate, is the standard deviation of the aggregate bit rate and ε is the upper bound on allowed queue overflow probability. A. Adission control logic We assue that through provisioning and traffic engineering, C total bandwidth is available edge-to-edge for the real-tie traffic aggregate. We use a erence source, with ean and standard deviation (, ) and average duration h, as a odel source for engineering reasons. We define as erence trunks ( T ) the nuber of siultaneously ablished erence sources that can fit in C total for a given target bound on PLR. In our odel, we assue that every tie a source wants to ablish or terinate a service instance, it signals this to the ingress node through a resource reservation protocol; as such, the nuber of active sources at every point in tie is always known. When a requ arrives, easureents are taken for bandwidth iations. The paraeters are the ean rate of the offered load, M, and the variance of the offered load,, at the output queue of the ingress node (first aggregation point). We then calculate the nuber N of the erence sources, whose aggregate ean rate is equal to or greater than M, and the nuber N of the erence sources, whose aggregate variance is equal to or greater than. That is, N represents the nuber of active erence sources that would have produced load with average rate at least equal to M, and N represents the nuber of active erence sources that would have produced load with variance at least equal to. They are the integers that satisfy the following relationships: M N = and N = () Having iated N and N, we copute their ean value, which represents an iate of the nuber of N erence sources that produce load with characteristics siilar to the ones having been. N = ( N + N )/ (3) The source requing adission has declared in the SLS its traffic descriptors (, ). In case the only available traffic descriptor is the source s peak rate p, the above pair becoes (, ) = ( p,0). In all cases, having the easureents and the traffic descriptors of the source, we copute the iated bandwidth C as follows: C = M + + a + PLR (4)
3 where a PLR is coputed as in (1), based on the target PLR bound of the real-tie traffic aggregate. This value C will be used in the adission control criterion. B. The Precaution Factor (PF) Before deriving the adission control criterion, there are two iportant issues that need to be taken into account. The first one is that the adission control decision needs to be ore conservative as the current easureents of the offered load correspond to a nuber of erence sources N that exceeds the nuber of erence trunks T to avoid degradation of perforance due to excessive PLR incurred by the overloading of the syste. The second iportant issue is that the ore stringent the target bound on PLR, the ore conservative the adission control decision should be. To deonstrate why that should hold, one can consider the following exaple: the bandwidth that is required by 100 VoIP sources, with peak rate 64kbps and exponentially distributed ON and OFF periods with average durations 1.004sec and 1.587sec, with a bound on queue overflow probability equal to 0.01, using (1), is Mbps. According to (1), the bandwidth required for 101 sources of that type for queue overflow probability 0.01 is Mbps. That eans that the additional source gives an increase of bandwidth, eff (0.01) = 9.0kbps. For queue overflow probability 0.001, the corresponding increase is eff (0.001) = 30.18kbps. This eans that since for decreasing bound on queue overflow probability (which directly translates to a decreasing bound on PLR) the increase in bandwidth requireents for each aditted source is greater, it should be taken into account in the adission control decision. When we decide whether a source should be aditted or not, the two issues discussed above need to be taken into account. Theore we introduce a Precaution Factor (PF ) before we derive the final expression for our adission control criterion. The ore conservative the adission control decision, the greater the value of the precaution factor. In order to take into account the first issue, PF should be proportional to the quantity ( N / T ). In order to take into account the second issue, we proceed as follows: given (1), for two different levels of PLR, e.g. ε 1 and ε with ε 1 < ε and all other paraeters (nuber and characteristics of sources) the sae, it can be sugged that this relative increase in additional bandwidth required is proportional to the quantity ln( ε1 ) ln( π). ln( ε ) ln( π) Theore, the final expression for the precaution factor that is adopted is: ln( ε) ln( π) PF = ( N / T )* (5) ln( ε ) ln( π) In both expressions, ε is a erence PLR level. Also, when it is N < T then the value PF = 1 is adopted. C. The easureent window We define the easureent windoww, as the tie interval within which the offered load is taken into account for deriving the required easureents. In siilar fashion to [9], we use the following expression for the easureent window: w = ax( DTS, w ), (6) In (6), DTS represents the Doinant Tie Scale. DTS is the ost probable tie scale over which overflow occurs. In [8], a systeatic way to derive DTS using real-tie easureents is provided with the assuption that the input process to the ultiplexing point in the network is Gaussian, which is by definition our assuption when eploying (1), and we use this ethod for iating DTS. w represents the ean inter-departure delay [], and it is defined as follows: w h =, (7) Nactive where N active is the nuber of siultaneously active sources. We select as easureent window the ean interdeparture delay, that is the tie interval within which the syste can be considered stationary -no flow departuresunless this tie interval is not long enough to capture the packet level dynaics of the aggregate traffic strea. In that case we use DTS as the value of the easureent window. D. The Adission Control Criterion Given the allocated bandwidth for the real-tie traffic aggregate fro edge-to-edge is C total, and having coputed the value for, eploying the precaution factor and the C easureent window, the adission control criterion becoes: If ( C PF) Ctotal, adit If ( C PF) > C reject total, III. PERFORMANCE EVALUATION In order to evaluate the perforance of the aforeentioned adission control fraework we used siulations. In our experients we use the dubell topology of Fig. 1. Figure 1. Siulation topology. (8)
4 The real-tie traffic QoS requireents are as follows. To eet the target bound on the delay of the aggregate, we configure the output queue to hold a axiu of 5 packets, thus enforcing that the upper bound on packet delay will be no ore than 5 ties the average packet size to the output link capacity. We use scenarios with the target bound on packet loss rate for the aggregate real-tie traffic being equal to 0.01 and We t varying load conditions ranging fro 0.5 to 5, where the value 1 corresponds to the design load. The latter is the load that the syste is designed to handle for a desired service rejection probability of 0.01, if we eploy a circuit switched approach. The reaining details of the siulation setup are: ε is set equal to 0.01, the source active tie is exponentially distributed with average h equal to 300sec. The source activation rate is a Poisson arrival process with average 1000 source activations/hour, which for a service rejection probability equal to 0.01 corresponds to T equal to 100. For traffic sources we use three different odels of VoIP traffic. All of the are ON/OFF sources with exponentially distributed ON and OFF ties, having a peak rate of 64kbps. The first odel [10], has ean duration for the ON and OFF periods of 1.004sec and 1.587sec respectively. This odel is also used as the erence source odel and thus sources that follow this odel are considered as conforant. The second odel we use is the Brady odel [11], which has ean duration for the ON and OFF periods of 1sec and 1.35sec respectively. Sources that follow this odel have worse characteristics than the erence sources; theore they are characterized as non-conforant. In the third odel [1], the ean durations for the ON and OFF periods are 0.35sec and 0.65sec respectively. Sources that follow this odel have better characteristics than the erence sources. The ter ild sources will er to this last category of sources. In order to copare the perforance of our fraework against other existing proposals, we have ipleented two algoriths fro the literature. The first one is an adission control schee using a priori traffic descriptors. We call this algorith TDAC (Traffic Descriptor-based Adission Control). In this schee, only the declared traffic descriptors are used for bandwidth iations and adission control. The second algorith is an ipleentation of the schee described in [13] as Rate Envelope Multiplexing (REM), with adaptive weight factor (the packet loss easureent approach) and no histogra update. We call this algorith MBAC (Measureent-based Adission Control). In this schee, in addition to easureents, the peak rate of the candidate for adission flow is used for adission control. Regarding the tie scales involved in MBAC, we consider the values 0.05sec, 0.1sec, 0.5sec, 1sec and sec. We also adopt the value 0.05sec as the iniu sapling interval involved in our approach in order to derive easureents for the ean rate, the variance of the offered load and iate the DTS. A. Sources that declare their real (, ) In this case the network has been provisioned and engineered using the erence source VoIP odel. However, the invoked sources ay deviate fro this odel, but they declare their real traffic descriptors. That could correspond to a situation where an ISP has provisioned and diensioned its network using a hypothetical erence source odel and has to serve requs that need to send VoIP traffic with different characteristics. We copare the perforance of MTAC against TDAC (we don t consider MBAC in this case because it cannot take advantage of other traffic descriptors apart fro the peak rate) for all three different types of traffic sources and the siulation results are shown in Fig. and 3, where M, R, W in brackets ean that the relevant curve corresponds to ild, erence and worse (non-conforant) sources. Figure. Achieved PLR for target PLR Figure 3. Utilization for target PLR For target PLR 0.01 and for all traffic sources, MTAC perfors reasonably well copared to TDAC. For ild sources the target PLR is not violated in any case. For erence and worse sources, the target PLR is violated only for loading conditions ore than 3 ties the design load, which, in a real network configuration, would correspond to a situation where the network diensioning and provisioning are inadequate. Additionally, it should be noted that MTAC is prone to easureent errors that affect the entities and the iation of DTS, since the coputed value for DTS depends on the values for ean rate and variance of the offered load. Regarding utilization, MTAC s perforance is also satisfactory; taking into account that TDAC provides the upper bound in perforance with respect to both the achieved PLR and utilization. Siilar conclusions, though not shown due to space liitations, can be drawn for the case of target PLR
5 B. Peak rate adission control In this case the invoked sources ay deviate fro the erence source odel and, additionally, the only traffic descriptor they declare is their peak rate p. We copare the perforance of MTAC against MBAC. The siulation results regarding PLR are shown in Fig. 4 and 5. We don t consider TDAC in this case because its overall perforance regarding utilization would be extreely low as a result of the stringent adission control criterion pi + p Ctotal. Figure 4. Achieved PLR for target PLR Figure 5. Achieved PLR for target PLR MBAC achieves PLR uch lower than the 0.01 PLR target for all traffic sources and all loading conditions. For ild sources, MTAC achieves the PLR target for all loading conditions. For erence and worse sources, the target PLR is violated only for loading conditions ore than 3 ties the design load. Regarding utilization, however, MTAC outperfors MBAC in all cases. MBAC s lower utilization is the penalty for achieving PLR significantly lower than the target PLR. The perforance of MBAC is very low for a target PLR equal to It violates that target in ost cases even though the no histogra update ethod that we use in our ipleentation of MBAC, is the ore conservative approach aong all the other variations presented in [13]. MTAC achieves siilar perforance to the case we had target PLR MBAC achieves better utilization than MTAC, but this cannot be considered as an advantage, because the increased utilization is coupled with a violation of the target PLR. In all cases exained, for both MTAC and MBAC we observe an increase in the achieved PLR for increasing loading conditions. This is anticipated [] because since they both rely on easureents, every adission requ carries the potential of aking a wrong decision. That eans i that a high source activation rate is expected to have a negative effect on perforance. IV. CONCLUSIONS In this paper we proposed an approach for adission control at the first points of aggregation. This approach is a cobination of traffic descriptor- and easureent-based adission control. We showed through siulation that our approach is relatively insensitive to variations of the traffic sources fro the traffic source odel used for network diensioning and provisioning, and that it works reasonably well even when the only available traffic descriptor is the peak rate. In the future we will be looking to extend our adission control fraework for different types of real-tie sources. Acknowledgent: This work was undertaken in the context of the Inforation Society Technologies Manageent of Endto-end Quality of Service Across the Internet at Large (MESCAL-IST ) research project, which is partially funded by the Coission of the European Union. V. REFERENCES [1] T.Lee and M.Zukeran An Efficiency Study of Different Model-Based and Measureent-Based Connection Adission Control Techniques using Heterogeneous Traffic Sources, Proceedings of IEEE ATM 1999, May [] M.Grossglauser and D.Tse A Fraework for Robust Measureent- Based Adission Control, IEEE/ACM Transactions on Networking, June 1999, Vol. 7, No. 3, pp [3] J.Hui Resource Allocation for Broadband Networks, IEEE Journal on Selected Areas of Counications, Deceber 1988, Vol. 6, No. 9, pp [4] L.Breslau, E.Knightly, S.Shenker, I.Stoica, and Z.Zhang Endpoint Adission Control: Architectural Issues and Perforance, SIGCOMM 000, Stockhol 000. [5] G.Iannaccone, M.May, and C.Diot Aggregate Traffic Perforance with Active Queue Manageent and Drop fro Tail, Coputer Counications Review, July 001. [6] E.Mykoniati, C.Charalapous, P.Georgatsos, T.Dailatis, D.Goderis, P.Triintzios, G.Pavlou, and D.Griffin Adission Control for Providing QoS in Diffserv IP Networks: The TEQUILA Approach, IEEE Counications Magazine, January 003, Vol. 41, No. 1, pp [7] R.Guerin, H.Ahadi, and M.Naghshieh Equivalent Capacity and its Application to Bandwidth Allocation in High-Speed Networks, IEEE Journal on Selected Areas in Counications, Septeber 1991, Vol. 9, No. 7, pp [8] D.Eun and N.Shroff A Measureent-Analytic Approach for Qos Estiation in a Network Based on the Doinant Tie Scale, IEEE/ACM Transactions on Networking, April 003, Vol. 11, No., pp [9] S.Belenki An Enforced Inter-Adission Delay Perforance-Driven Connection Adission Control Algorith, ACM SIGCOMM, April 00, Vol. 3, No., pp [10] C.Chuah, L.Subraarian, and R.Katz Furies: A Scalable Fraework for Traffic Policing and Adission Control, U.C Berkeley Technical Report No. UCB/CSD , May 001. [11] P.Brady A Model for Generating On-Off Speech Patterns in Two-Way Conversation, The Bell Syste Technical Journal, Septeber 1969, pp [1] I.Habib and T.Saadawi Multiedia Traffic Characteristics in Broadband Networks, IEEE Counications Magazine, page 48, July 199 [13] T.Lee and M.Zukeran Adission Control for Bursty Multiedia Traffic, Proceedings of IEEE INFOCOM 001, pp
Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks
Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,
More informationThe optimization design of microphone array layout for wideband noise sources
PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun
More informationUtility-Based Resource Allocation for Mixed Traffic in Wireless Networks
IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng
More informationHeterogeneous Real-time Traffic Admission Control in Differentiated Services Domains
Heterogeneous Real-time Traffic Admission Control in Differentiated Services Domains S Georgoulas, P Trimintzios,, G Pavlou and K H Ho University of Surrey, UK, {SGeorgoulas, PTrimintzios, GPavlou, KHo}@eimsurreyacuk
More informationOPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS
Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented
More informationAnalysing Real-Time Communications: Controller Area Network (CAN) *
Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination
More informationDerivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router
Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of
More informationA Hybrid Network Architecture for File Transfers
JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,
More informationPerformance Analysis of RAID in Different Workload
Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,
More informationAn Efficient Approach for Content Delivery in Overlay Networks
An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr
More informationImage Filter Using with Gaussian Curvature and Total Variation Model
IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.
More informationDifferent criteria of dynamic routing
Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich
More informationEquation Based Congestion Control for Video Transmission over WCDMA Networks
Equation Based Congestion Control for Video Transission over WCDMA Networks Antonios Alexiou, Diitrios Antonellis and Christos Bouras Research Acadeic Coputer Technology Institute, Greece and Coputer Engineering
More informationOblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands
Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu
More informationAdmission Control for Inter-domain Real-Time Traffic Originating from Differentiated Services Stub Domains
Admission Control for Inter-domain Real-Time Traffic Originating from Differentiated Services Stub Domains Stylianos Georgoulas 1, George Pavlou 1, Panos Trimintzios 2, and Kin-Hon Ho 1 1 Centre for Communication
More informationQoS and Sensible Routing Decisions
QoS and Sensible Routing Decisions Erol Gelenbe Dept. of Electrical & Electronic Engineering Iperial College London SW7 2BT e.gelenbe@iperial.ac.uk Abstract Network Quality of Service (QoS) criteria of
More informationEnergy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks
Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr
More informationCOLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL
COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute
More informationThe Application of Bandwidth Optimization Technique in SLA Negotiation Process
The Application of Bandwidth Optiization Technique in SLA egotiation Process Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia
More informationQUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS
QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755
More informationDesign Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems
Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se
More informationPerformance Analysis of Exposed Terminal Effect in IEEE Ad Hoc Networks in Finite Load Conditions
Perforance Analysis of Exposed Terinal Effect in IEEE 80.11 Ad Hoc Networks in Finite Load Conditions Diitris Vassis 1, Georgios Korentzas 1 1 Dept. of Inforation and Counication Systes Engineering University
More informationA Generic Architecture for Programmable Trac. Shaper for High Speed Networks. Krishnan K. Kailas y Ashok K. Agrawala z. fkrish,
A Generic Architecture for Prograable Trac Shaper for High Speed Networks Krishnan K. Kailas y Ashok K. Agrawala z fkrish, agrawalag@cs.ud.edu y Departent of Electrical Engineering z Departent of Coputer
More informationClustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering
Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into
More informationBurst Scheduling Networks. Simon S. Lam and Georey G. Xie. The University of Texas at Austin. Austin, Texas August 31, 1996.
Burst Scheduling Networks Sion S. La and Georey G. Xie Departent of Coputer Sciences The University of Texas at Austin Austin, Texas 78712-1188 August 31, 1996 Abstract Most application-level data units
More informationDynamical Topology Analysis of VANET Based on Complex Networks Theory
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 14, Special Issue Sofia 014 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.478/cait-014-0053 Dynaical Topology Analysis
More informationData & Knowledge Engineering
Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID
More informationCollaborative Web Caching Based on Proxy Affinities
Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA
More informationEvaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds
Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles
More informationRECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS
RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS AWNI ITRADAT Assistant Professor, Departent of Coputer Engineering, Faculty of Engineering, Hasheite University, P.O. Box 15459,
More informationPERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL
IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant
More informationAdaptive Holistic Scheduling for In-Network Sensor Query Processing
Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,
More informationA Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium
1 A Distributed Multi-service Resource Allocation Algorith in Heterogeneous Wireless Access Mediu Muhaad Isail, Student Meber, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract In this paper, radio resource
More informationTHE rapid growth and continuous change of the real
IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa
More informationMAC schemes - Fixed-assignment schemes
MAC schees - Fixed-assignent schees M. Veeraraghavan, April 6, 04 Mediu Access Control (MAC) schees are echaniss for sharing a single link. MAC schees are essentially ultiplexing schees. For exaple, on
More informationMultipath Selection and Channel Assignment in Wireless Mesh Networks
Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,
More informationA High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 607-626 (2005) A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Mebership Functions * SHIH-HSU HUANG AND JIAN-YUAN LAI + Departent of
More informationAdaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN
Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan
More informationDesigning High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,
More informationDefining and Surveying Wireless Link Virtualization and Wireless Network Virtualization
1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,
More informationA Periodic Dynamic Load Balancing Method
2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation
More informationA Trajectory Splitting Model for Efficient Spatio-Temporal Indexing
A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada
More informationI ve Seen Enough : Incrementally Improving Visualizations to Support Rapid Decision Making
I ve Seen Enough : Increentally Iproving Visualizations to Support Rapid Decision Making Sajjadur Rahan Marya Aliakbarpour 2 Ha Kyung Kong Eric Blais 3 Karrie Karahalios,4 Aditya Paraeswaran Ronitt Rubinfield
More informationLeveraging Relevance Cues for Improved Spoken Document Retrieval
Leveraging Relevance Cues for Iproved Spoken Docuent Retrieval Pei-Ning Chen 1, Kuan-Yu Chen 2 and Berlin Chen 1 National Taiwan Noral University, Taiwan 1 Institute of Inforation Science, Acadeia Sinica,
More informationEE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011
EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction
More informationEvaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS
Evaluation of the Tiing Properties of Two Control Networs: CAN and PROFIBUS Max Mauro Dias Santos 1, Marcelo Ricardo Steer 2 and Francisco Vasques 3 1 UnilesteMG, CEP 35170-056, Coronel Fabriciano MG Brasil.
More informationIntegrating fast mobility in the OLSR routing protocol
Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr
More informationGeo-activity Recommendations by using Improved Feature Combination
Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,
More informationA Learning Framework for Nearest Neighbor Search
A Learning Fraework for Nearest Neighbor Search Lawrence Cayton Departent of Coputer Science University of California, San Diego lcayton@cs.ucsd.edu Sanjoy Dasgupta Departent of Coputer Science University
More informationDetection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm
Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,
More informationMapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues
Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu
More informationSecure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals
Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract
More informationScheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We
More informationPOSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang
IEEE International Conference on ultiedia and Expo POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION Junjun Jiang, Ruiin Hu, Zhen Han, Tao Lu, and Kebin Huang National Engineering
More informationEffects of Interleaving on RTP Header Compression
Effects of Interleaving on RTP Header Copression Colin Perkins Jon Crowcroft Departent of Coputer Science University College London Gower Street London WCE 6BT Abstract We discuss the use of interleaving
More informationOptimal Route Queries with Arbitrary Order Constraints
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL.?, NO.?,? 20?? 1 Optial Route Queries with Arbitrary Order Constraints Jing Li, Yin Yang, Nikos Maoulis Abstract Given a set of spatial points DS,
More informationResearch on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm
roceedings of the 7th International Conference on Innovation & Manageent 893 Research on a Kind of QoS-Sensitive Seantic Web Services Coposition Method Based on Genetic Algorith Cao Hongjiang, Nie Guihua,
More informationIdentifying Converging Pairs of Nodes on a Budget
Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering
More informationEFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B.
EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B. Girod1 1 Stanford University, USA 2 Qualco Inc., USA ABSTRACT We study
More informationReducing Crosspoint Buffers for Performance Guaranteed Asynchronous Crossbar Scheduling
educing Crosspoint Buffers for Perforance Guaranteed Asynchronous Crossbar Scheduling Masoueh Karii, Zhuo Sun, and Deng Pan Florida International University Eails: {kari001, zsun003, pand}@fiu.edu Abstract
More informationEnhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue
Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade
More informationThe Internal Conflict of a Belief Function
The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of
More informationA CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER
A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER VIOLETA TOMAŠEVIĆ, SLOBODAN BOJANIĆ 2 and OCTAVIO NIETO-TALADRIZ 2 The Mihajlo Pupin Institute, Volgina 5, 000 Belgrade, SERBIA AND MONTENEGRO 2 Technical University
More information1 Extended Boolean Model
1 EXTENDED BOOLEAN MODEL It has been well-known that the Boolean odel is too inflexible, requiring skilful use of Boolean operators to obtain good results. On the other hand, the vector space odel is flexible
More informationOn the Computation and Application of Prototype Point Patterns
On the Coputation and Application of Prototype Point Patterns Katherine E. Tranbarger Freier 1 and Frederic Paik Schoenberg 2 Abstract This work addresses coputational probles related to the ipleentation
More informationSmarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math
Sarter Balanced Assessent Consortiu s, s, Stard Alignent for Math The Sarter Balanced Assessent Consortiu (SBAC) has created a hierarchy coprised of clais targets that together can be used to ake stateents
More informationBoosted Detection of Objects and Attributes
L M M Boosted Detection of Objects and Attributes Abstract We present a new fraework for detection of object and attributes in iages based on boosted cobination of priitive classifiers. The fraework directly
More informationDistributed Multicast Tree Construction in Wireless Sensor Networks
Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,
More informationIN many interactive multimedia streaming applications, such
840 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 5, MAY 06 A Geoetric Approach to Server Selection for Interactive Video Streaing Yaochen Hu, Student Meber, IEEE, DiNiu, Meber, IEEE, and Zongpeng Li, Senior
More informationA Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction
MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao
More informationComputer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13
Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical
More informationGenerating Mechanisms for Evolving Software Mirror Graph
Journal of Modern Physics, 2012, 3, 1050-1059 http://dx.doi.org/10.4236/jp.2012.39139 Published Online Septeber 2012 (http://www.scirp.org/journal/jp) Generating Mechaniss for Evolving Software Mirror
More informationData-driven Hybrid Caching in Hierarchical Edge Cache Networks
Data-driven Hybrid Caching in Hierarchical Edge Cache Networks Abstract Hierarchical cache networks are increasingly deployed to facilitate high-throughput and low-latency content delivery to end users.
More informationSurvivability Function A Measure of Disaster-Based Routing Performance
Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected
More informationShape Optimization of Quad Mesh Elements
Shape Optiization of Quad Mesh Eleents Yufei Li 1, Wenping Wang 1, Ruotian Ling 1, and Changhe Tu 2 1 The University of Hong Kong 2 Shandong University Abstract We study the proble of optiizing the face
More informationAn Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks
An Adaptive and Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent
More informationDesign and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design
Design and Ipleentation of Business Logic Layer Object-Oriented Design versus Relational Design Ali Alharthy Faculty of Engineering and IT University of Technology, Sydney Sydney, Australia Eail: Ali.a.alharthy@student.uts.edu.au
More informationFair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones
Advance Access publication on 24 February 2017 The British Coputer Society 2017. All rights reserved. For Perissions, please eail: journals.perissions@oup.co doi:10.1093/cojnl/bxx015 Fair Energy-Efficient
More informationREVENUE-AWARE RESOURCE ALLOCATION IN THE FUTURE MULTI-SERVICE IP NETWORKS
REVENUE-AWARE RESOURCE ALLOCATION IN THE FUTURE MULTI-SERVICE IP NETWORKS Jian Zhang, Tio Haalainen, Jyrki Joutsensalo Dept. of Matheatical Inforation Technology, University ofjyvaskyla, FIN-40014 Jyvaskyla,
More informationResource Optimization for Web Service Composition
Resource Optiization for Web Coposition Xia Gao, Ravi Jain, Zulfikar Razan, Ulas Kozat Abstract coposition recently eerged as a costeffective way to quickly create new services within a network. Soe research
More informationMulti Packet Reception and Network Coding
The 2010 Military Counications Conference - Unclassified Progra - etworking Protocols and Perforance Track Multi Packet Reception and etwork Coding Aran Rezaee Research Laboratory of Electronics Massachusetts
More informationSolving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification
Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural
More informationEnd-to-End QoS Provisioning for Real-Time Video Streaming over SP-Driven P2P Networks Using Admission Control
This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 29 proceedings End-to-End QoS Provisioning for Real-Tie Video
More informationPerformance Evaluation of QoS-Aware Layer-2 VPNs over Fiber-Wireless (FiWi) Networks
Perforance Evaluation of QoS-Aware Layer-2 VPNs over Fiber-Wireless (FiWi) Networks Ahad R. Dhaini, Pin-Han Ho, Abdallah Shai, and Xiaohong Jiang Departent of Electrical and Coputer Engineering, University
More informationEnergy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks
Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networs F. Mousavi Madani Departent of coputer engineering Alzahra University Tehran, Iran, osavif@alzahra.ac.ir Received:
More informationUsing Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses
International Journal of Industrial Engineering & Production Research Septeber 03, Volue 4, Nuber 3 pp. 9-35 ISSN: 008-4889 http://ijiepr.iust.ac.ir/ Using Iperialist Copetitive Algorith in Optiization
More informationA Learning Framework for Nearest Neighbor Search
A Learning Fraework for Nearest Neighbor Search Lawrence Cayton Departent of Coputer Science University of California, San Diego lcayton@cs.ucsd.edu Sanjoy Dasgupta Departent of Coputer Science University
More informationOn the Location-Awareness of Bandwidth Allocation and Admission Control for the Support of Real-Time Traffic in Class-Based IP Networks *
On the Location-Awareness of Bandwidth Allocation and Admission Control for the Support of Real-Time Traffic in Class-Based IP Networks * Stylianos Georgoulas, Panos Trimintzios,, George Pavlou, and Kin-Hon
More informationA Novel Fast Constructive Algorithm for Neural Classifier
A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore
More informationBP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks
BP-MAC: A High Reliable Backoff Preable MAC Protocol for Wireless Sensor Networks Alexander Klein* Jirka Klaue Josef Schalk EADS Innovation Works, Gerany *Eail: klein@inforatik.uni-wuerzburg.de ABSTRACT:
More informationPERFORMANCE ANALYSIS OF THE UMTS SYSTEM FOR PACKET DATA TRANSFER OVER DEDICATED CHANNELS
PERFORMACE AALSIS OF THE MTS SSTEM FOR PACKET DATA TRASFER OVER DEDICATED CHAELS Manju Sarvagya, Ratna V. Raja Kuar Departent of Electronics and Electrical Counication Engineering Indian Institute of Technology,
More informationTensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3
2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition
More informationA Measurement-Based Model for Parallel Real-Time Tasks
A Measureent-Based Model for Parallel Real-Tie Tasks Kunal Agrawal 1 Washington University in St. Louis St. Louis, MO, USA kunal@wustl.edu https://orcid.org/0000-0001-5882-6647 Sanjoy Baruah 2 Washington
More informationAbstract. for L1VPNs [2, 3] and the standardization work at the Internet Engineering Task Force (IETF) is in progress [4].
Traffic Deand Modeling for Dynaic Layer 1 VPN Serices * Joachi Scharf, Martin Köhn Uniersity of Stuttgart, Institute of Counication Networks and Coputer Engineering (IKR), Pfaffenwaldring 47, 70569 Stuttgart,
More informationCollection Selection Based on Historical Performance for Efficient Processing
Collection Selection Based on Historical Perforance for Efficient Processing Christopher T. Fallen and Gregory B. Newby Arctic Region Supercoputing Center University of Alaska Fairbanks Fairbanks, Alaska
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN
International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI
More informationAGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM
International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.5, Septeber 205 AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM Xie Yang and Cheng Wushan College of Mechanical Engineering,
More informationVideo summarization based on shot boundary detection with penalized contrasts
Video suarization based on shot boundary detection with penalized contrasts Paschalina Medentzidou and Constantine Kotropoulos Departent of Inforatics Aristotle University of Thessaloniki Thessaloniki
More informationVerdict Accuracy of Quick Reduct Algorithm using Clustering, Classification Techniques for Gene Expression Data
Verdict Accuracy of Quick Reduct Algorith using Clustering, Classification Techniques for Gene Expression Data T.Chandrasekhar 1, K.Thangavel 2 and E.N.Sathishkuar 3 1 Departent of Coputer Science, eriyar
More informationDYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION
www.arpnjournals.co DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION N. Snehalatha 1 and Paul Rodrigues 2 1 School of Coputing, SRM University, Chennai, Tail Nadu, India 2 Departent
More information