Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points

Size: px
Start display at page:

Download "Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points"

Transcription

1 Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University of Surrey, Guildford, UK e-ail: {S.Georgoulas, P.Triintzios, Abstract The priary role of adission control is to decide on the aount of traffic accepted into the network so that users conforing to their ablished traffic contracts achieve predefined perforance objectives, e.g. bounded packet loss probability, end-to-end delay. We consider Diffserv networks able to support real-tie traffic and we propose a novel fraework for adission control that involves both traffic descriptor and easureent based techniques and we copare its perforance with existing approaches. Our siulation results show that the perforance of our approach is rather insensitive to variations of the traffic sources. Even when the provided traffic descriptors are as siple as a single value denoting the required peak rate, the proposed schee achieves satisfactory perforance. I. INTRODUCTION Real-tie services have stringent delay and loss requireents. Differentiated services (Diffserv) is seen as the eerging technology to support IP Quality of Service (QoS) in a scalable fashion, without the relevant probles of Integrated services (Intserv), which require per icro-flow state inforation in the core network. In Diffserv, per flow state is only kept at edge routers, while in the core network, traffic with siilar QoS requireents is grouped in one of the engineered traffic classes and forwarded in an aggregate fashion. Adission control is the set of actions required at ingress nodes at the service instance ablishent phase to check whether a service requ is to be aditted or rejected. A service instance is aditted when the requed QoS can be satisfied without causing QoS violation to the already ablished service instances. In Diffserv, the violation ers to the QoS perceived by each of the engineered aggregate traffic classes rather than the QoS of individual icro-flows. An additional role of adission control is to optiize the use of network resources in order to achieve realistic network efficiency. The challenge is to design siple control functions that iprove efficiency under any offered traffic conditions. The various adission control approaches differ in the ethods they use to decide if there is enough capacity for the service requ and can be coarsely divided into three categories: (a) Adission control using a priori traffic descriptors, (b) Measureent based adission control (MBAC), and (c) Endpoint adission control (EAC). For the first approach [1], adission control is based on the assuption that it has perfect knowledge of each traffic source type that will be used in every link. It also knows the current nuber of ablished service instances. This inforation will enable adission control to copute the total aount of bandwidth required. Hence, it will only accept a service requ if the iniu aount of bandwidth required by the total nuber of ablished service instances, including the one, is less then the available service rate. It is obvious that this approach is optial if the accurate traffic descriptors are known and used for adission control decisions. As such, the perforance of this approach gives the upper bound for all other adission control approaches, provided of course that sources are conforant. However, since no traffic easureents are taken into consideration, if the provided traffic descriptors do not depict the actual behavior of the sources (for instance that could happen in case of non-conforant non-policed sources) or the appropriate traffic descriptors are not known a priori (for instance, only peak rate ay be known), the perforance of this adission control schee can be very low. The second approach (MBAC) tries to avoid the aforeentioned probles by shifting the task of traffic specification fro the user to the network []. Instead of users explicitly specifying their traffic descriptors, the network attepts to learn the characteristics of existing flows through real-tie easureents. This approach has a nuber of advantages. First, the user-specified traffic descriptors can be very siple, e.g. peak rate, which can be easily policed ([3] suggs that it is hard to police traffic according to a statistical odel). Second, an overly conservative specification does not result in over-allocation of resources for the entire duration of the service session. Third, when traffic fro different flows is ultiplexed, the QoS experienced depends often on their aggregate behavior, the statistics of which are easier to iate than those of an individual flow. However, relying on only quantities for adission control raises a nuber of issues that need to be considered, such as the iation errors [], syste dynaics and eory related issues. In the third approach, the end host/application probes the network by sending t packets along the transission path [4]. Based on soe etric then the host decides if the flow can be aditted. A requireent is for the end-to-end route to

2 be the sae for probing packets and flows. Setup delays ay be high and, furtherore, siultaneous probing by any sources can lead to a situation known as thrashing [4]. That is that even though the nuber of aditted flows is sall, the cuulative level of probe packets prevents further adissions. In this work we consider adission control for real-tie traffic. We define as real-tie traffic, sources that have a strict, usually sall, delay requireent and a bounded, not necessarily too low, packet loss rate (PLR) requireent. Note that jitter is another QoS paraeter for real-tie traffic but we do not consider it in this work. In a Diffserv doain we assue that such real-tie traffic is aggregated so that traffic fro sources coposing each traffic aggregate will receive the sae treatent over the entire doain. The delay requireent of the traffic aggregate has been taken into account in the provisioning stage, i.e. by appropriately setting sall packet queues and by anipulating the routing process to choose appropriate paths. Packets are expected to be lost only at the first point of aggregation (ingress node), where the serialization of the various traffic sources takes place. We assue that further downstrea; traffic aggregates are treated in a peak rate anner. This is feasible since, as stated in [5], in a coon network configuration, backbone links are overprovisioned. This paper is organized as follows: Section II presents our adission control fraework. In Section III we evaluate the perforance of our fraework against others found in the literature. Finally, in Section IV we conclude, suarizing our findings. II. FRAMEWORK FOR ADMISSION CONTROL In Diffserv networks, custoer traffic contracts are preagreed through SLSes [6] that include traffic descriptors. Our proposed approach is a cobination of Measureent-based and a priori Traffic descriptor Adission Control -we will be erring to it as MTAC. As such, it encopasses the positive features of both adission control schees. It provides a systeatic way to derive the bandwidth requireents of the already ablished flows through easureents and of the candidate for adission flow through its traffic descriptors. We use real-tie easureents of the actual load in order to cope with the fact that the traffic descriptors ay not depict the actual characteristics of individual flows. In this case, we ight end up with either under-utilization, if users overiate their requireents, or with QoS degradation if users underiate their requireents and the network is not able to police the efficiently. For bandwidth anipulation and allocation we adopted the effective bandwidth approach. According to [7], when the effect of statistical ultiplexing is significant, the distribution of the stationary bit rate can be accurately approxiated by a Gaussian distribution. Regarding the validity of this assuption, in [8] it is strongly sugged that the aggregation of even a fairly sall nuber of traffic streas is usually sufficient for the Gaussian characterization of the input process. In that case, the effective bandwidth of the ultiplexed sources is given by: C + a with a = ln( ε) ln( π) (1) where is the ean aggregate bit rate, is the standard deviation of the aggregate bit rate and ε is the upper bound on allowed queue overflow probability. A. Adission control logic We assue that through provisioning and traffic engineering, C total bandwidth is available edge-to-edge for the real-tie traffic aggregate. We use a erence source, with ean and standard deviation (, ) and average duration h, as a odel source for engineering reasons. We define as erence trunks ( T ) the nuber of siultaneously ablished erence sources that can fit in C total for a given target bound on PLR. In our odel, we assue that every tie a source wants to ablish or terinate a service instance, it signals this to the ingress node through a resource reservation protocol; as such, the nuber of active sources at every point in tie is always known. When a requ arrives, easureents are taken for bandwidth iations. The paraeters are the ean rate of the offered load, M, and the variance of the offered load,, at the output queue of the ingress node (first aggregation point). We then calculate the nuber N of the erence sources, whose aggregate ean rate is equal to or greater than M, and the nuber N of the erence sources, whose aggregate variance is equal to or greater than. That is, N represents the nuber of active erence sources that would have produced load with average rate at least equal to M, and N represents the nuber of active erence sources that would have produced load with variance at least equal to. They are the integers that satisfy the following relationships: M N = and N = () Having iated N and N, we copute their ean value, which represents an iate of the nuber of N erence sources that produce load with characteristics siilar to the ones having been. N = ( N + N )/ (3) The source requing adission has declared in the SLS its traffic descriptors (, ). In case the only available traffic descriptor is the source s peak rate p, the above pair becoes (, ) = ( p,0). In all cases, having the easureents and the traffic descriptors of the source, we copute the iated bandwidth C as follows: C = M + + a + PLR (4)

3 where a PLR is coputed as in (1), based on the target PLR bound of the real-tie traffic aggregate. This value C will be used in the adission control criterion. B. The Precaution Factor (PF) Before deriving the adission control criterion, there are two iportant issues that need to be taken into account. The first one is that the adission control decision needs to be ore conservative as the current easureents of the offered load correspond to a nuber of erence sources N that exceeds the nuber of erence trunks T to avoid degradation of perforance due to excessive PLR incurred by the overloading of the syste. The second iportant issue is that the ore stringent the target bound on PLR, the ore conservative the adission control decision should be. To deonstrate why that should hold, one can consider the following exaple: the bandwidth that is required by 100 VoIP sources, with peak rate 64kbps and exponentially distributed ON and OFF periods with average durations 1.004sec and 1.587sec, with a bound on queue overflow probability equal to 0.01, using (1), is Mbps. According to (1), the bandwidth required for 101 sources of that type for queue overflow probability 0.01 is Mbps. That eans that the additional source gives an increase of bandwidth, eff (0.01) = 9.0kbps. For queue overflow probability 0.001, the corresponding increase is eff (0.001) = 30.18kbps. This eans that since for decreasing bound on queue overflow probability (which directly translates to a decreasing bound on PLR) the increase in bandwidth requireents for each aditted source is greater, it should be taken into account in the adission control decision. When we decide whether a source should be aditted or not, the two issues discussed above need to be taken into account. Theore we introduce a Precaution Factor (PF ) before we derive the final expression for our adission control criterion. The ore conservative the adission control decision, the greater the value of the precaution factor. In order to take into account the first issue, PF should be proportional to the quantity ( N / T ). In order to take into account the second issue, we proceed as follows: given (1), for two different levels of PLR, e.g. ε 1 and ε with ε 1 < ε and all other paraeters (nuber and characteristics of sources) the sae, it can be sugged that this relative increase in additional bandwidth required is proportional to the quantity ln( ε1 ) ln( π). ln( ε ) ln( π) Theore, the final expression for the precaution factor that is adopted is: ln( ε) ln( π) PF = ( N / T )* (5) ln( ε ) ln( π) In both expressions, ε is a erence PLR level. Also, when it is N < T then the value PF = 1 is adopted. C. The easureent window We define the easureent windoww, as the tie interval within which the offered load is taken into account for deriving the required easureents. In siilar fashion to [9], we use the following expression for the easureent window: w = ax( DTS, w ), (6) In (6), DTS represents the Doinant Tie Scale. DTS is the ost probable tie scale over which overflow occurs. In [8], a systeatic way to derive DTS using real-tie easureents is provided with the assuption that the input process to the ultiplexing point in the network is Gaussian, which is by definition our assuption when eploying (1), and we use this ethod for iating DTS. w represents the ean inter-departure delay [], and it is defined as follows: w h =, (7) Nactive where N active is the nuber of siultaneously active sources. We select as easureent window the ean interdeparture delay, that is the tie interval within which the syste can be considered stationary -no flow departuresunless this tie interval is not long enough to capture the packet level dynaics of the aggregate traffic strea. In that case we use DTS as the value of the easureent window. D. The Adission Control Criterion Given the allocated bandwidth for the real-tie traffic aggregate fro edge-to-edge is C total, and having coputed the value for, eploying the precaution factor and the C easureent window, the adission control criterion becoes: If ( C PF) Ctotal, adit If ( C PF) > C reject total, III. PERFORMANCE EVALUATION In order to evaluate the perforance of the aforeentioned adission control fraework we used siulations. In our experients we use the dubell topology of Fig. 1. Figure 1. Siulation topology. (8)

4 The real-tie traffic QoS requireents are as follows. To eet the target bound on the delay of the aggregate, we configure the output queue to hold a axiu of 5 packets, thus enforcing that the upper bound on packet delay will be no ore than 5 ties the average packet size to the output link capacity. We use scenarios with the target bound on packet loss rate for the aggregate real-tie traffic being equal to 0.01 and We t varying load conditions ranging fro 0.5 to 5, where the value 1 corresponds to the design load. The latter is the load that the syste is designed to handle for a desired service rejection probability of 0.01, if we eploy a circuit switched approach. The reaining details of the siulation setup are: ε is set equal to 0.01, the source active tie is exponentially distributed with average h equal to 300sec. The source activation rate is a Poisson arrival process with average 1000 source activations/hour, which for a service rejection probability equal to 0.01 corresponds to T equal to 100. For traffic sources we use three different odels of VoIP traffic. All of the are ON/OFF sources with exponentially distributed ON and OFF ties, having a peak rate of 64kbps. The first odel [10], has ean duration for the ON and OFF periods of 1.004sec and 1.587sec respectively. This odel is also used as the erence source odel and thus sources that follow this odel are considered as conforant. The second odel we use is the Brady odel [11], which has ean duration for the ON and OFF periods of 1sec and 1.35sec respectively. Sources that follow this odel have worse characteristics than the erence sources; theore they are characterized as non-conforant. In the third odel [1], the ean durations for the ON and OFF periods are 0.35sec and 0.65sec respectively. Sources that follow this odel have better characteristics than the erence sources. The ter ild sources will er to this last category of sources. In order to copare the perforance of our fraework against other existing proposals, we have ipleented two algoriths fro the literature. The first one is an adission control schee using a priori traffic descriptors. We call this algorith TDAC (Traffic Descriptor-based Adission Control). In this schee, only the declared traffic descriptors are used for bandwidth iations and adission control. The second algorith is an ipleentation of the schee described in [13] as Rate Envelope Multiplexing (REM), with adaptive weight factor (the packet loss easureent approach) and no histogra update. We call this algorith MBAC (Measureent-based Adission Control). In this schee, in addition to easureents, the peak rate of the candidate for adission flow is used for adission control. Regarding the tie scales involved in MBAC, we consider the values 0.05sec, 0.1sec, 0.5sec, 1sec and sec. We also adopt the value 0.05sec as the iniu sapling interval involved in our approach in order to derive easureents for the ean rate, the variance of the offered load and iate the DTS. A. Sources that declare their real (, ) In this case the network has been provisioned and engineered using the erence source VoIP odel. However, the invoked sources ay deviate fro this odel, but they declare their real traffic descriptors. That could correspond to a situation where an ISP has provisioned and diensioned its network using a hypothetical erence source odel and has to serve requs that need to send VoIP traffic with different characteristics. We copare the perforance of MTAC against TDAC (we don t consider MBAC in this case because it cannot take advantage of other traffic descriptors apart fro the peak rate) for all three different types of traffic sources and the siulation results are shown in Fig. and 3, where M, R, W in brackets ean that the relevant curve corresponds to ild, erence and worse (non-conforant) sources. Figure. Achieved PLR for target PLR Figure 3. Utilization for target PLR For target PLR 0.01 and for all traffic sources, MTAC perfors reasonably well copared to TDAC. For ild sources the target PLR is not violated in any case. For erence and worse sources, the target PLR is violated only for loading conditions ore than 3 ties the design load, which, in a real network configuration, would correspond to a situation where the network diensioning and provisioning are inadequate. Additionally, it should be noted that MTAC is prone to easureent errors that affect the entities and the iation of DTS, since the coputed value for DTS depends on the values for ean rate and variance of the offered load. Regarding utilization, MTAC s perforance is also satisfactory; taking into account that TDAC provides the upper bound in perforance with respect to both the achieved PLR and utilization. Siilar conclusions, though not shown due to space liitations, can be drawn for the case of target PLR

5 B. Peak rate adission control In this case the invoked sources ay deviate fro the erence source odel and, additionally, the only traffic descriptor they declare is their peak rate p. We copare the perforance of MTAC against MBAC. The siulation results regarding PLR are shown in Fig. 4 and 5. We don t consider TDAC in this case because its overall perforance regarding utilization would be extreely low as a result of the stringent adission control criterion pi + p Ctotal. Figure 4. Achieved PLR for target PLR Figure 5. Achieved PLR for target PLR MBAC achieves PLR uch lower than the 0.01 PLR target for all traffic sources and all loading conditions. For ild sources, MTAC achieves the PLR target for all loading conditions. For erence and worse sources, the target PLR is violated only for loading conditions ore than 3 ties the design load. Regarding utilization, however, MTAC outperfors MBAC in all cases. MBAC s lower utilization is the penalty for achieving PLR significantly lower than the target PLR. The perforance of MBAC is very low for a target PLR equal to It violates that target in ost cases even though the no histogra update ethod that we use in our ipleentation of MBAC, is the ore conservative approach aong all the other variations presented in [13]. MTAC achieves siilar perforance to the case we had target PLR MBAC achieves better utilization than MTAC, but this cannot be considered as an advantage, because the increased utilization is coupled with a violation of the target PLR. In all cases exained, for both MTAC and MBAC we observe an increase in the achieved PLR for increasing loading conditions. This is anticipated [] because since they both rely on easureents, every adission requ carries the potential of aking a wrong decision. That eans i that a high source activation rate is expected to have a negative effect on perforance. IV. CONCLUSIONS In this paper we proposed an approach for adission control at the first points of aggregation. This approach is a cobination of traffic descriptor- and easureent-based adission control. We showed through siulation that our approach is relatively insensitive to variations of the traffic sources fro the traffic source odel used for network diensioning and provisioning, and that it works reasonably well even when the only available traffic descriptor is the peak rate. In the future we will be looking to extend our adission control fraework for different types of real-tie sources. Acknowledgent: This work was undertaken in the context of the Inforation Society Technologies Manageent of Endto-end Quality of Service Across the Internet at Large (MESCAL-IST ) research project, which is partially funded by the Coission of the European Union. V. REFERENCES [1] T.Lee and M.Zukeran An Efficiency Study of Different Model-Based and Measureent-Based Connection Adission Control Techniques using Heterogeneous Traffic Sources, Proceedings of IEEE ATM 1999, May [] M.Grossglauser and D.Tse A Fraework for Robust Measureent- Based Adission Control, IEEE/ACM Transactions on Networking, June 1999, Vol. 7, No. 3, pp [3] J.Hui Resource Allocation for Broadband Networks, IEEE Journal on Selected Areas of Counications, Deceber 1988, Vol. 6, No. 9, pp [4] L.Breslau, E.Knightly, S.Shenker, I.Stoica, and Z.Zhang Endpoint Adission Control: Architectural Issues and Perforance, SIGCOMM 000, Stockhol 000. [5] G.Iannaccone, M.May, and C.Diot Aggregate Traffic Perforance with Active Queue Manageent and Drop fro Tail, Coputer Counications Review, July 001. [6] E.Mykoniati, C.Charalapous, P.Georgatsos, T.Dailatis, D.Goderis, P.Triintzios, G.Pavlou, and D.Griffin Adission Control for Providing QoS in Diffserv IP Networks: The TEQUILA Approach, IEEE Counications Magazine, January 003, Vol. 41, No. 1, pp [7] R.Guerin, H.Ahadi, and M.Naghshieh Equivalent Capacity and its Application to Bandwidth Allocation in High-Speed Networks, IEEE Journal on Selected Areas in Counications, Septeber 1991, Vol. 9, No. 7, pp [8] D.Eun and N.Shroff A Measureent-Analytic Approach for Qos Estiation in a Network Based on the Doinant Tie Scale, IEEE/ACM Transactions on Networking, April 003, Vol. 11, No., pp [9] S.Belenki An Enforced Inter-Adission Delay Perforance-Driven Connection Adission Control Algorith, ACM SIGCOMM, April 00, Vol. 3, No., pp [10] C.Chuah, L.Subraarian, and R.Katz Furies: A Scalable Fraework for Traffic Policing and Adission Control, U.C Berkeley Technical Report No. UCB/CSD , May 001. [11] P.Brady A Model for Generating On-Off Speech Patterns in Two-Way Conversation, The Bell Syste Technical Journal, Septeber 1969, pp [1] I.Habib and T.Saadawi Multiedia Traffic Characteristics in Broadband Networks, IEEE Counications Magazine, page 48, July 199 [13] T.Lee and M.Zukeran Adission Control for Bursty Multiedia Traffic, Proceedings of IEEE INFOCOM 001, pp

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

Heterogeneous Real-time Traffic Admission Control in Differentiated Services Domains

Heterogeneous Real-time Traffic Admission Control in Differentiated Services Domains Heterogeneous Real-time Traffic Admission Control in Differentiated Services Domains S Georgoulas, P Trimintzios,, G Pavlou and K H Ho University of Surrey, UK, {SGeorgoulas, PTrimintzios, GPavlou, KHo}@eimsurreyacuk

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of

More information

A Hybrid Network Architecture for File Transfers

A Hybrid Network Architecture for File Transfers JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

Image Filter Using with Gaussian Curvature and Total Variation Model

Image Filter Using with Gaussian Curvature and Total Variation Model IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

Equation Based Congestion Control for Video Transmission over WCDMA Networks

Equation Based Congestion Control for Video Transmission over WCDMA Networks Equation Based Congestion Control for Video Transission over WCDMA Networks Antonios Alexiou, Diitrios Antonellis and Christos Bouras Research Acadeic Coputer Technology Institute, Greece and Coputer Engineering

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

Admission Control for Inter-domain Real-Time Traffic Originating from Differentiated Services Stub Domains

Admission Control for Inter-domain Real-Time Traffic Originating from Differentiated Services Stub Domains Admission Control for Inter-domain Real-Time Traffic Originating from Differentiated Services Stub Domains Stylianos Georgoulas 1, George Pavlou 1, Panos Trimintzios 2, and Kin-Hon Ho 1 1 Centre for Communication

More information

QoS and Sensible Routing Decisions

QoS and Sensible Routing Decisions QoS and Sensible Routing Decisions Erol Gelenbe Dept. of Electrical & Electronic Engineering Iperial College London SW7 2BT e.gelenbe@iperial.ac.uk Abstract Network Quality of Service (QoS) criteria of

More information

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se

More information

Performance Analysis of Exposed Terminal Effect in IEEE Ad Hoc Networks in Finite Load Conditions

Performance Analysis of Exposed Terminal Effect in IEEE Ad Hoc Networks in Finite Load Conditions Perforance Analysis of Exposed Terinal Effect in IEEE 80.11 Ad Hoc Networks in Finite Load Conditions Diitris Vassis 1, Georgios Korentzas 1 1 Dept. of Inforation and Counication Systes Engineering University

More information

A Generic Architecture for Programmable Trac. Shaper for High Speed Networks. Krishnan K. Kailas y Ashok K. Agrawala z. fkrish,

A Generic Architecture for Programmable Trac. Shaper for High Speed Networks. Krishnan K. Kailas y Ashok K. Agrawala z. fkrish, A Generic Architecture for Prograable Trac Shaper for High Speed Networks Krishnan K. Kailas y Ashok K. Agrawala z fkrish, agrawalag@cs.ud.edu y Departent of Electrical Engineering z Departent of Coputer

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

Burst Scheduling Networks. Simon S. Lam and Georey G. Xie. The University of Texas at Austin. Austin, Texas August 31, 1996.

Burst Scheduling Networks. Simon S. Lam and Georey G. Xie. The University of Texas at Austin. Austin, Texas August 31, 1996. Burst Scheduling Networks Sion S. La and Georey G. Xie Departent of Coputer Sciences The University of Texas at Austin Austin, Texas 78712-1188 August 31, 1996 Abstract Most application-level data units

More information

Dynamical Topology Analysis of VANET Based on Complex Networks Theory

Dynamical Topology Analysis of VANET Based on Complex Networks Theory BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 14, Special Issue Sofia 014 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.478/cait-014-0053 Dynaical Topology Analysis

More information

Data & Knowledge Engineering

Data & Knowledge Engineering Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID

More information

Collaborative Web Caching Based on Proxy Affinities

Collaborative Web Caching Based on Proxy Affinities Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA

More information

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles

More information

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS AWNI ITRADAT Assistant Professor, Departent of Coputer Engineering, Faculty of Engineering, Hasheite University, P.O. Box 15459,

More information

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant

More information

Adaptive Holistic Scheduling for In-Network Sensor Query Processing

Adaptive Holistic Scheduling for In-Network Sensor Query Processing Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,

More information

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium 1 A Distributed Multi-service Resource Allocation Algorith in Heterogeneous Wireless Access Mediu Muhaad Isail, Student Meber, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract In this paper, radio resource

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

MAC schemes - Fixed-assignment schemes

MAC schemes - Fixed-assignment schemes MAC schees - Fixed-assignent schees M. Veeraraghavan, April 6, 04 Mediu Access Control (MAC) schees are echaniss for sharing a single link. MAC schees are essentially ultiplexing schees. For exaple, on

More information

Multipath Selection and Channel Assignment in Wireless Mesh Networks

Multipath Selection and Channel Assignment in Wireless Mesh Networks Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,

More information

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions *

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 607-626 (2005) A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Mebership Functions * SHIH-HSU HUANG AND JIAN-YUAN LAI + Departent of

More information

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

A Periodic Dynamic Load Balancing Method

A Periodic Dynamic Load Balancing Method 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation

More information

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada

More information

I ve Seen Enough : Incrementally Improving Visualizations to Support Rapid Decision Making

I ve Seen Enough : Incrementally Improving Visualizations to Support Rapid Decision Making I ve Seen Enough : Increentally Iproving Visualizations to Support Rapid Decision Making Sajjadur Rahan Marya Aliakbarpour 2 Ha Kyung Kong Eric Blais 3 Karrie Karahalios,4 Aditya Paraeswaran Ronitt Rubinfield

More information

Leveraging Relevance Cues for Improved Spoken Document Retrieval

Leveraging Relevance Cues for Improved Spoken Document Retrieval Leveraging Relevance Cues for Iproved Spoken Docuent Retrieval Pei-Ning Chen 1, Kuan-Yu Chen 2 and Berlin Chen 1 National Taiwan Noral University, Taiwan 1 Institute of Inforation Science, Acadeia Sinica,

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS Evaluation of the Tiing Properties of Two Control Networs: CAN and PROFIBUS Max Mauro Dias Santos 1, Marcelo Ricardo Steer 2 and Francisco Vasques 3 1 UnilesteMG, CEP 35170-056, Coronel Fabriciano MG Brasil.

More information

Integrating fast mobility in the OLSR routing protocol

Integrating fast mobility in the OLSR routing protocol Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

A Learning Framework for Nearest Neighbor Search

A Learning Framework for Nearest Neighbor Search A Learning Fraework for Nearest Neighbor Search Lawrence Cayton Departent of Coputer Science University of California, San Diego lcayton@cs.ucsd.edu Sanjoy Dasgupta Departent of Coputer Science University

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu

More information

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract

More information

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We

More information

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang IEEE International Conference on ultiedia and Expo POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION Junjun Jiang, Ruiin Hu, Zhen Han, Tao Lu, and Kebin Huang National Engineering

More information

Effects of Interleaving on RTP Header Compression

Effects of Interleaving on RTP Header Compression Effects of Interleaving on RTP Header Copression Colin Perkins Jon Crowcroft Departent of Coputer Science University College London Gower Street London WCE 6BT Abstract We discuss the use of interleaving

More information

Optimal Route Queries with Arbitrary Order Constraints

Optimal Route Queries with Arbitrary Order Constraints IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL.?, NO.?,? 20?? 1 Optial Route Queries with Arbitrary Order Constraints Jing Li, Yin Yang, Nikos Maoulis Abstract Given a set of spatial points DS,

More information

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm roceedings of the 7th International Conference on Innovation & Manageent 893 Research on a Kind of QoS-Sensitive Seantic Web Services Coposition Method Based on Genetic Algorith Cao Hongjiang, Nie Guihua,

More information

Identifying Converging Pairs of Nodes on a Budget

Identifying Converging Pairs of Nodes on a Budget Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering

More information

EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B.

EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B. EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B. Girod1 1 Stanford University, USA 2 Qualco Inc., USA ABSTRACT We study

More information

Reducing Crosspoint Buffers for Performance Guaranteed Asynchronous Crossbar Scheduling

Reducing Crosspoint Buffers for Performance Guaranteed Asynchronous Crossbar Scheduling educing Crosspoint Buffers for Perforance Guaranteed Asynchronous Crossbar Scheduling Masoueh Karii, Zhuo Sun, and Deng Pan Florida International University Eails: {kari001, zsun003, pand}@fiu.edu Abstract

More information

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade

More information

The Internal Conflict of a Belief Function

The Internal Conflict of a Belief Function The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of

More information

A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER

A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER VIOLETA TOMAŠEVIĆ, SLOBODAN BOJANIĆ 2 and OCTAVIO NIETO-TALADRIZ 2 The Mihajlo Pupin Institute, Volgina 5, 000 Belgrade, SERBIA AND MONTENEGRO 2 Technical University

More information

1 Extended Boolean Model

1 Extended Boolean Model 1 EXTENDED BOOLEAN MODEL It has been well-known that the Boolean odel is too inflexible, requiring skilful use of Boolean operators to obtain good results. On the other hand, the vector space odel is flexible

More information

On the Computation and Application of Prototype Point Patterns

On the Computation and Application of Prototype Point Patterns On the Coputation and Application of Prototype Point Patterns Katherine E. Tranbarger Freier 1 and Frederic Paik Schoenberg 2 Abstract This work addresses coputational probles related to the ipleentation

More information

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math Sarter Balanced Assessent Consortiu s, s, Stard Alignent for Math The Sarter Balanced Assessent Consortiu (SBAC) has created a hierarchy coprised of clais targets that together can be used to ake stateents

More information

Boosted Detection of Objects and Attributes

Boosted Detection of Objects and Attributes L M M Boosted Detection of Objects and Attributes Abstract We present a new fraework for detection of object and attributes in iages based on boosted cobination of priitive classifiers. The fraework directly

More information

Distributed Multicast Tree Construction in Wireless Sensor Networks

Distributed Multicast Tree Construction in Wireless Sensor Networks Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,

More information

IN many interactive multimedia streaming applications, such

IN many interactive multimedia streaming applications, such 840 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 5, MAY 06 A Geoetric Approach to Server Selection for Interactive Video Streaing Yaochen Hu, Student Meber, IEEE, DiNiu, Meber, IEEE, and Zongpeng Li, Senior

More information

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao

More information

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13 Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical

More information

Generating Mechanisms for Evolving Software Mirror Graph

Generating Mechanisms for Evolving Software Mirror Graph Journal of Modern Physics, 2012, 3, 1050-1059 http://dx.doi.org/10.4236/jp.2012.39139 Published Online Septeber 2012 (http://www.scirp.org/journal/jp) Generating Mechaniss for Evolving Software Mirror

More information

Data-driven Hybrid Caching in Hierarchical Edge Cache Networks

Data-driven Hybrid Caching in Hierarchical Edge Cache Networks Data-driven Hybrid Caching in Hierarchical Edge Cache Networks Abstract Hierarchical cache networks are increasingly deployed to facilitate high-throughput and low-latency content delivery to end users.

More information

Survivability Function A Measure of Disaster-Based Routing Performance

Survivability Function A Measure of Disaster-Based Routing Performance Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected

More information

Shape Optimization of Quad Mesh Elements

Shape Optimization of Quad Mesh Elements Shape Optiization of Quad Mesh Eleents Yufei Li 1, Wenping Wang 1, Ruotian Ling 1, and Changhe Tu 2 1 The University of Hong Kong 2 Shandong University Abstract We study the proble of optiizing the face

More information

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive and Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

Design and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design

Design and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design Design and Ipleentation of Business Logic Layer Object-Oriented Design versus Relational Design Ali Alharthy Faculty of Engineering and IT University of Technology, Sydney Sydney, Australia Eail: Ali.a.alharthy@student.uts.edu.au

More information

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones Advance Access publication on 24 February 2017 The British Coputer Society 2017. All rights reserved. For Perissions, please eail: journals.perissions@oup.co doi:10.1093/cojnl/bxx015 Fair Energy-Efficient

More information

REVENUE-AWARE RESOURCE ALLOCATION IN THE FUTURE MULTI-SERVICE IP NETWORKS

REVENUE-AWARE RESOURCE ALLOCATION IN THE FUTURE MULTI-SERVICE IP NETWORKS REVENUE-AWARE RESOURCE ALLOCATION IN THE FUTURE MULTI-SERVICE IP NETWORKS Jian Zhang, Tio Haalainen, Jyrki Joutsensalo Dept. of Matheatical Inforation Technology, University ofjyvaskyla, FIN-40014 Jyvaskyla,

More information

Resource Optimization for Web Service Composition

Resource Optimization for Web Service Composition Resource Optiization for Web Coposition Xia Gao, Ravi Jain, Zulfikar Razan, Ulas Kozat Abstract coposition recently eerged as a costeffective way to quickly create new services within a network. Soe research

More information

Multi Packet Reception and Network Coding

Multi Packet Reception and Network Coding The 2010 Military Counications Conference - Unclassified Progra - etworking Protocols and Perforance Track Multi Packet Reception and etwork Coding Aran Rezaee Research Laboratory of Electronics Massachusetts

More information

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural

More information

End-to-End QoS Provisioning for Real-Time Video Streaming over SP-Driven P2P Networks Using Admission Control

End-to-End QoS Provisioning for Real-Time Video Streaming over SP-Driven P2P Networks Using Admission Control This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 29 proceedings End-to-End QoS Provisioning for Real-Tie Video

More information

Performance Evaluation of QoS-Aware Layer-2 VPNs over Fiber-Wireless (FiWi) Networks

Performance Evaluation of QoS-Aware Layer-2 VPNs over Fiber-Wireless (FiWi) Networks Perforance Evaluation of QoS-Aware Layer-2 VPNs over Fiber-Wireless (FiWi) Networks Ahad R. Dhaini, Pin-Han Ho, Abdallah Shai, and Xiaohong Jiang Departent of Electrical and Coputer Engineering, University

More information

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networs F. Mousavi Madani Departent of coputer engineering Alzahra University Tehran, Iran, osavif@alzahra.ac.ir Received:

More information

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses International Journal of Industrial Engineering & Production Research Septeber 03, Volue 4, Nuber 3 pp. 9-35 ISSN: 008-4889 http://ijiepr.iust.ac.ir/ Using Iperialist Copetitive Algorith in Optiization

More information

A Learning Framework for Nearest Neighbor Search

A Learning Framework for Nearest Neighbor Search A Learning Fraework for Nearest Neighbor Search Lawrence Cayton Departent of Coputer Science University of California, San Diego lcayton@cs.ucsd.edu Sanjoy Dasgupta Departent of Coputer Science University

More information

On the Location-Awareness of Bandwidth Allocation and Admission Control for the Support of Real-Time Traffic in Class-Based IP Networks *

On the Location-Awareness of Bandwidth Allocation and Admission Control for the Support of Real-Time Traffic in Class-Based IP Networks * On the Location-Awareness of Bandwidth Allocation and Admission Control for the Support of Real-Time Traffic in Class-Based IP Networks * Stylianos Georgoulas, Panos Trimintzios,, George Pavlou, and Kin-Hon

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

BP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks

BP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks BP-MAC: A High Reliable Backoff Preable MAC Protocol for Wireless Sensor Networks Alexander Klein* Jirka Klaue Josef Schalk EADS Innovation Works, Gerany *Eail: klein@inforatik.uni-wuerzburg.de ABSTRACT:

More information

PERFORMANCE ANALYSIS OF THE UMTS SYSTEM FOR PACKET DATA TRANSFER OVER DEDICATED CHANNELS

PERFORMANCE ANALYSIS OF THE UMTS SYSTEM FOR PACKET DATA TRANSFER OVER DEDICATED CHANNELS PERFORMACE AALSIS OF THE MTS SSTEM FOR PACKET DATA TRASFER OVER DEDICATED CHAELS Manju Sarvagya, Ratna V. Raja Kuar Departent of Electronics and Electrical Counication Engineering Indian Institute of Technology,

More information

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3 2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition

More information

A Measurement-Based Model for Parallel Real-Time Tasks

A Measurement-Based Model for Parallel Real-Time Tasks A Measureent-Based Model for Parallel Real-Tie Tasks Kunal Agrawal 1 Washington University in St. Louis St. Louis, MO, USA kunal@wustl.edu https://orcid.org/0000-0001-5882-6647 Sanjoy Baruah 2 Washington

More information

Abstract. for L1VPNs [2, 3] and the standardization work at the Internet Engineering Task Force (IETF) is in progress [4].

Abstract. for L1VPNs [2, 3] and the standardization work at the Internet Engineering Task Force (IETF) is in progress [4]. Traffic Deand Modeling for Dynaic Layer 1 VPN Serices * Joachi Scharf, Martin Köhn Uniersity of Stuttgart, Institute of Counication Networks and Coputer Engineering (IKR), Pfaffenwaldring 47, 70569 Stuttgart,

More information

Collection Selection Based on Historical Performance for Efficient Processing

Collection Selection Based on Historical Performance for Efficient Processing Collection Selection Based on Historical Perforance for Efficient Processing Christopher T. Fallen and Gregory B. Newby Arctic Region Supercoputing Center University of Alaska Fairbanks Fairbanks, Alaska

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI

More information

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.5, Septeber 205 AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM Xie Yang and Cheng Wushan College of Mechanical Engineering,

More information

Video summarization based on shot boundary detection with penalized contrasts

Video summarization based on shot boundary detection with penalized contrasts Video suarization based on shot boundary detection with penalized contrasts Paschalina Medentzidou and Constantine Kotropoulos Departent of Inforatics Aristotle University of Thessaloniki Thessaloniki

More information

Verdict Accuracy of Quick Reduct Algorithm using Clustering, Classification Techniques for Gene Expression Data

Verdict Accuracy of Quick Reduct Algorithm using Clustering, Classification Techniques for Gene Expression Data Verdict Accuracy of Quick Reduct Algorith using Clustering, Classification Techniques for Gene Expression Data T.Chandrasekhar 1, K.Thangavel 2 and E.N.Sathishkuar 3 1 Departent of Coputer Science, eriyar

More information

DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION

DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION www.arpnjournals.co DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION N. Snehalatha 1 and Paul Rodrigues 2 1 School of Coputing, SRM University, Chennai, Tail Nadu, India 2 Departent

More information