Queue-Management Architecture for Delay Tolerant Networking

Size: px
Start display at page:

Download "Queue-Management Architecture for Delay Tolerant Networking"

Transcription

1 Queue-Mngement Architecture for Dely Tolernt Networking Sotirios-Angelos Lens, Stylinos Dimitriou, Fni Tspeli, Vssilis Tsoussidis Spce Internetworking Center (SPICE), ECE Deprtment, Democritus University of Thrce, Xnthi, Greece {slens, sdimitr, ttspeli, Astrct. During the lst yers, the interest in Dely/Disruption Tolernt Networks hs een significntly incresed, minly ecuse DTN covers vst spectrum of pplictions, such s deep-spce, stellite, sensor nd vehiculr networks. Even though the Bundle Protocol seems to e the prevlent cndidte rchitecture for dely-tolernt pplictions, some prcticl issues hinder its wide deployment. One of the functionlities tht require further reserch nd implementtion is DTN queue mngement. Indeed, queue mngement in DTN networks is complex issue: loss of connectivity or extended delys, render occsionlly meningless ny pre-scheduled priority for pcket forwrding. Our Queue-mngement pproch integrtes connectivity sttus into uffering nd forwrding policy, eliminting the possiility of stored dt to expire nd promoting pplictions tht show potentil to run smoothly. Therefore, our pproch does not rely solely on mrked priorities ut rther on ctive networking conditions. e present our model nlyticlly nd compre it with stndrd solutions. e then develop n evlution tool y extending ns- modules nd, sed on selective scenrios primrily from Spce Communictions, we demonstrte the suitility of our model for use in lowconnectivity/high-dely environments. Keywords: DTN, Queue mngement, Scheduling Introduction Queue mngement in trditionl networks is used minly to regulte trffic fluctutions, s well s to ssign priorities to specific trffic clsses. It often utilizes dropping mechnisms tht signl end-users, implicitly or explicitly, for impeding congestion events. Nevertheless, queue mngement in Dely/Disruptive Tolernt Networks (DTN) [] [], with long delys nd disruptions hs to ddress dditionl issues. hile fir resource lloction nd trffic clssifiction re still importnt, queue mngement needs lso to exploit every ville contct opportunity nd reschedule trffic prioritiztion nd dt storge to hndle communiction disruptions nd delys. e extend further the preliminry rchitecture proposed in [3] with mthemticl nlysis, rchitecturl enhncements nd systemtic evlution. Our rchitecture is composed now y three min components: i) n Admission Control unit, which determines the criteri tht DTN nodes use to ccept or reject incoming undles, ii)

2 Buffer nd Storge Mngement unit, which determines how ccepted undles should e stored, nd iii) Scheduling unit, which determines undle service priorities. Here, we refer to dt hndled y DTN nodes s undles, even though the rchitecture proposed is not confined y the stndrdized Bundle Protocol [4]. The chrcteristics of ech type of DTN network my vry nd the ojective ech time my e different. Here, we emphsize on spce pplictions: spce stisfies oth dimensions of DTN, tht is, disruptions nd long delys. e hve primrily two gols: i) to increse the DTN device throughput vi efficient link exploittion nd ii) to increse ppliction stisfction. From n engineer s viewpoint, DTN requires dditionl supportive functionlity primrily for resource mngement. In DTN, resource mngement incorportes storge cpcity s well, which in turn is ssocited with long delys for dt forwrding nd incresed complexity for scheduling. For exmple, unlike typicl IP network pckets, undles do not fce the dnger to e dropped, however they do fce the dnger to expire. Also, priority-mrked pckets need not prioritized service in cse connectivity disruptions hve dmged their scope lredy. A trditionl FIFO-Droptil queue policy my hve een n initil cndidte for such system. Aprt from its simplicity nd the fct tht it my perform decently in low-trffic networks, this pproch is flwed severely: we cnnot ssign different priorities to different trffic clsses nd, on top of tht, queuing delys punish uniformly nd cumultively ll users, even those tht my hve chnce to survive potentil short disruption. Alterntively, we could integrte prioritiztion lgorithm in our scheme, such s Priority Queuing (PQ), Fir Queuing (FQ), Clss-sed eighted Fir Queuing [5] (CBFQ) nd Low Ltency Queuing (LLQ) [6]. A common, undesirle chrcteristic, however, is tht priorities re typiclly predetermined nd/or sttic, in the sense tht do not incorporte connectivity feedck nd hence cnnot reflect scheduling policy to corresponding forwrding implementtion. This non-typicl requirement renders them only lind tools for DTN mngement nd hence unsuitle, in their present form, for DTN networks. Additionl pproches presented in [7] tke ccount the low expirtion time left nd the numer of times pcket hs een forwrded, in order to drop it in cses of congestion. The most notle pproch is SHLI (drop shortest life time first) which drops the pcket with the lowest expirtion time. However, this might hve some undesirle side-effects when some pckets hve een delyed significntly, yet we cn still mnge to forwrd them efore they expire. Relevnt work on DTN queue mngement is limited, nd usully focuses on specific prolems, such s policies or scheduling, providing nrrow pproch to the queue mngement, occsionlly isolting joint prolems. However, some interesting work exists lredy. In [8], Amir Krif et l., focus on queue mngement policies, nd rech similr conclusions; they show tht trditionl uffer mngement policies such s drop-til or drop-front re su-optiml for use in DTN networks. Current implementtions of the DTN, such s ION [9] nd DTN [0], t this stge, dopt simple pproches to queue mngement considering the lck of corresponding stndrds. For exmple ION, deploys the undle protocol pproch, vi PQ scheme with three queues of outound undles, one queue for ech of the defined levels of priority ( clss of service ) supported y BP. Our pproch employs n enhnced clssifiction scheme tht integrtes oth network (i.e., connectivity) dynmics nd

3 trffic requirements. Therefore, scheduling is not product of pcket mrks nd hence, ppliction lone, ut rther joint decision of dt priority, ppliction potentil to survive disruptions nd the network disruptions per se. The rest of the pper is orgnized s follows. In section, we define our queue mngement model, including only the detils necessry for the stochstic nlysis, wheres in section 3 we present our stochstic nlysis nd the corresponding results. In section 4 we pply, vlidte nd compre prt of our model through simultions in ns-. Finlly, in section 5 we conclude nd set the frmework for future work. Dely Tolernt Queue Mngement Model In order to define our queue-mngement model, herefter referred s DTQM (Dely-Tolernt Queue Mngement) we consider the DTN network s network with low connectivity, high nd vrile delys nd sence of end-to-end pth. e define DTQM in wy tht llows us to include ll the necessry functionlity to stisfy generic set of requirements. Thus, we divide DTQM into three units; i) Admission Control, ii) Buffer nd Storge Mngement, nd iii) Scheduling. e discuss ll units functionlity, however, due to lck of spce we emphsize on the most novel nd sophisticted units, nmely the Buffer nd Storge Mngement nd Scheduling units. Admission Control: Admission Control determines how nd which dt my e ccepted from DTN node nd is minly relted to dt-custody requests. hen custody requests re ccepted y DTN node, tht node is oliged to mintin the undles in its memory, until it is le to forwrd them, or until they expire. Buffer nd Storge Mngement: Contrry to trditionl networks, where the routing nodes require uffers to implement store-nd-forwrd strtegy, DTN nodes need dditionl persistent storge to mintin those pckets tht cnnot immeditely e forwrded due to limited connectivity. In IP-sed routers, the min focus of reserchers is to increse chnnel utiliztion nd decrese dely through scheduling nd dropping. This pproch inherently ssumes tht end nodes respond to losses nd therefore recover in short time. However, when connectivity is scrce, the requirement for short-time recovery is lredy violted. Furthermore, DTN networks introduce n dditionl level of complexity, s result of comining oth voltile nd persistent storge. Clerly, the trivil pproch to store every incoming undle in persistent storge nd move it to uffer upon request increses the processing dely of ll the undles nd fils in cses of pplictions engged in low-dely trnsfers. In Fig. we depict grphiclly the Buffer nd Storge Mngement unit. Generlly, this model is composed y two units, the Policy unit nd the ctul Storge unit. The purpose of the Policy unit is to ccept ll the undles tht enter the node nd, depending on the conditions, move them to uffers or storge. Buffer nd Storge mngement is initilly differentited sed on whether there is connectivity etween the DTN node nd the next-hop. During periods of connectivity, pckets tht enter the node my e immeditely routed to the output without eing stored first. The totl sending rte is clculted y the sum of sending rtes of the Connectivity nd Non-Connectivity uffers.

4 Fig.. The Buffer nd Storge Mngement model. In more detil the purpose of ech storge unit cn e descried s follows: Connectivity uffer. The Policy unit moves undles to the Connectivity uffer only when there is connectivity nd therefore the corresponding undles cn e forwrded to the next node. After time-period which is determined y some threshold, when no connectivity exists, undles tht re stored temporrily in the Connectivity uffer move to Persistent storge. Persistent storge. The Policy unit moves undles to Persistent storge in three cses: i) when there is no connectivity, ii) when there is connectivity ut no Connectivity uffer spce ville, nd iii) when there is oth connectivity nd Connectivity uffer spce ville, however the contct grph, which is known priori, instructs tht time does not suffice to forwrd undles to the next hop. Non-Connectivity uffer. Bundles re moved from storge to the Non- Connectivity uffer in the following two cses: i) when undles re of high priority (re either urgent or scheduled contct is expected) nd there is no connectivity nd ii) when there is connectivity ut other undles re selected to e forwrded (opportunistic contct). The lgorithm tht determines which undles should e forwrded first t given communiction opportunity is descried riefly in the Scheduling section. Our proposed model dditionlly dels with the prolem of incresed processing dely. In the event of multiple nodes in row tht re ctively connected, trnsmission is rther strightforwrd, since pckets re trnsferred from uffer to uffer without the interference of storge. In the event of short connectivity no further dely due to storge retrievl is imposed; undles hve lredy moved to the Non- Connectivity uffer, nd hence ndwidth through short connectivity cn e fully exploited. Scheduling: Scheduling unit ressigns the priorities for ech undle nd determines which undles should e outputted from the DTN node when communiction opportunity occurs. A priority-oriented model should e inevitly considered; this model should incorporte ppliction requirements, dt requirements, Time-to-Live (TtL) for undles etc. Although we will not delve into more detils, our scheduling depends hevily on the rrivl timestmp nd on TtL. In order to enhnce ppliction service, we promote oth pckets tht hve recently rrived in the node nd pckets tht re ner their expirtion. This pproch decreses significntly witing delys nd promotes ppliction stisfction. In Fig. we depict the priority function used, where ToD (Type of Dt) is specific identifier tht denotes the pcket trffic clss nd TtL denotes the expirtion time.

5 ToD ToD ToD Fig. Scheduling priority function. 0.5 TtL TtL TtL 3 Stochstic Anlysis The purpose of this nlysis is to highlight the dvntges of our proposed model over trditionl scheduling pproches. Our model consists of primry FIFO queue (Connectivity uffer) nd secondry supportive queue (Non Connectivity uffer), which serves high-priority undles. e note tht, in the context of Spce, the queuing dely involved does not expect to contriute significntly to the totl ppliction dely, given the high propgtion dely, nd furthermore, the potentilly very high storge dely involved in typicl Spce pplictions. Therefore, priority queuing (PQ) or PQ-derived scheduling model for incoming pckets does not present conceptully tempting pproch, since it my fil with long-stored pckets. Clerly, our pproch deprts from FIFO scheme, nd therefore, clls for strightforwrd comprison with typicl FIFO scheme. However, for completeness, we extend our stochstic nlysis lso for PQ, which we consider s theoreticl upper ound (only) when connectivity is lwys present. It is pprent, from n engineer s perspective, tht our model is designed to hndle disconnectivity/disruption issues. As such, it is resonly expected to perform etter in environments with limited connectivity, especilly ginst trditionl queuing schemes, which do not include ntive mechnism to hndle intermittent connectivity. Nevertheless, to chieve firness towrds FIFO nd PQ, we use worstcse scenrio for DTQM, where connectivity is lwys ville on the system. The results shll indicte to which extent our model is le to perform stisfctorily. In such environments, where connectivity is lwys ville nd we do not exploit DTQM s full potentil, even performnce comprle to PQ nd etter thn FIFO is cceptle. e initite our nlysis y modeling network trffic. Pcket rrivl is modeled s s n exponentil process nd pcket deprture s generl distriution process. This is not, however, glolly vlid ssumption, since different types of trffic cn result in different distriutions concerning the pcket rrivl nd deprture. Nonetheless, s our knowledge on the possile DTN pplictions is limited, we ssume tht the environment nd the pplictions under investigtion mnifest ll the necessry chrcteristics of M/G/ system sed nlysis. The potentil existence of selfsimilr chrcteristics is not considered here. Furthermore, we ssume tht ll pckets hve the sme size, non-preemptive priority is enforced nd flows correspond to different trffic clsses.

6 One might rgue, from n nlyticl perspective, tht precision is rther duious when we ttempt to nlyticlly compre different queuing policies with potentilly distinct gols. However, there re severl occsions when these mechnisms re indeed equivlent nd directly comprle. For exmple, s throughput is decresing, the ehvior of these three systems converges. e egin our queuing nlysis y estimting the verge system dely for ech flow in PQ scheme. e consider single-server PQ system fed y three Poisson strems with rrivl rtes, nd 3. Ech strem cn e considered s flow of dt generted y vrious pplictions, in our cse Rel-time (RT), Telemetry (TM) nd Telecommnd (TC) pplictions. The uffers corresponding to different flows re infinite nd pckets in ech uffer re served in the order they rrive. Thus, we use three queues, one per flow, nd three priority clsses. e limit the overll system utiliztion y setting ρ i < nd ρ +ρ +ρ 3 <. This keeps the system from eing overloded nd cncels the possiility of flow strvtion. Tle, presents the nottion used throughout the present mthemticl nlysis. TABLE I. NOTATION N i Averge numer of pckets in ech queue i, Pcket rrivl rte t clss-i queue / Totl pcket rrivl rte μ i, μ Pcket service rte t clss-i queue / Totl pcket service rte ρ i, ρ System utiliztion fctor per clss-i / System utiliztion fctor R Men residul service time i Averge queuing dely of clss-i pcket T i Averge system dely of clss-i pcket X Second service moment Tht sid, we consider the i th dt pcket rrivl t the first queue of the PQ system. Since clss- pckets hve the highest priority, the i th pcket tht hs just rrived must wit in queue for men residul time R until the end of the current pcket trnsmission, plus the trnsmission time required for men numer of pckets N currently in the first queue, preceding the i th pcket. N () R + e clculte the men residul time, for M/G/ systems, y the formul ([]): R n i i X i, X i Now, ccording to Little s lw [], the verge numer of pckets witing in the system is equl to the verge dely multiplied y the verge rrivl rte of the system. e pply Little s lw to the clss- queue. As the verge queuing dely for clss- pckets is nd the verge queue occupncy is N with rrivl rte, we hve N (3) R (),(),(3), ρ ρ (4) Similrly, y enforcing non-preemptive priority queuing nd ccording to [] the verge queuing dely for clss nd clss-3 pckets is ccordingly: ()

7 3 R ρ )( ρ ρ ) ( R ρ ρ )( ρ ρ ρ ) ( 3 (5) (6) Finlly, y dding the service time /μ of the i th pcket in the equtions (4), (5) nd (6), we cn clculte the verge system dely for clss-k pckets: T k k + Next, we estimte the verge dely for ech flow in FIFO scheme. In this scheduling scheme, ech flow hs the sme verge queuing dely, which depends on the verge numer of pckets in queue N, nd the men residul time, R. According to [] the verge system dely in FIFO scheme is: T + T ( ρ) FIFO FIFO However, in order to gurntee tht the service distriution of the FIFO queue corresponds to n ppropritely weighted sum of the service distriutions for the different clsses in the priority queue scheme, we set: T NFIFO 3T R FIFO e continue our nlysis y estimting the verge dely for ech flow in DTQM scheme. e divide the nlysis in two prts. Since DTQM uses two outgoing queues (plus the permnent storge see Fig. ) one for connectivity nd the other for non-connectivity dt, we cn sfely ssume tht the first one emultes FIFO queue while the second one pproches the ehvior of PQ scheme. The ltter ssumption holds since the prioritiztion function tht we pply (see Fig. ), requires pcket sorting. Tht sid, the first queue nlysis in terms of verge system dely is directly comprle with FIFO scheme, while the second queue clls for PQ-sed nlysis. In order to firly evlute our proposed scheme, we omit permnent storge from the nlysis. This llows the three systems to present similr properties nd hence e comprle. e consider n verge system rrivl rte equl to the other systems nd set rrivl rtes, without loss of generlity, for the two queues 0.4 nd 0.6. The selection of coefficients 0.4 nd 0.6 s the preferred vlues for our stochstic nlysis ws sed on some initil empiricl clcultions nd will e clirted further ccording to emultion results. Finlly, the totl verge system service rte will e μ where μ 0.4μ nd μ 0.6μ for first nd second queues, respectively. To strt off, the verge queuing dely for the first queue does not differentite per flow nd cn e clculted sed on the verge numer of pckets in queue- nd the men residul time, using eqution () nd replcing,, μ nd μ with,, μ nd μ respectively. (7) (8) (9)

8 N (0) R CON + By pplying Little s lw for queue- we get: N () CON From equtions (0) nd () we get: CON R 0.4, where ρ ρ ρ The verge system dely for ll the flows in queue- is: T CON CON + () (3) e now pproximte the ehvior of the second queue s follows. The queue cn split into three su-queues or suclsses. Ech clss will e served using PQ-sed scheme. Furthermore, the proportion of pckets for ech clss on the totl ville cpcity of the queue- uffer is / for clss- pckets, / for clss- pckets nd 3 / for clss-3 pckets. Therefore, the verge queuing dely for clss- pckets is: N + NONCON By pplying Little's lw [], we otin: N N NONCON 0. 6 NONCON From equtions (4) nd (5) we get: R, where ρ NONCON ρ R ρ 0.6 The verge queuing dely for the second suclss depends on N pckets, which re uffered in the first suclss, plus N pckets, which re uffered in the second suclss, plus the residul time R. In our cse, unlike the ordinry properties of PQ, our design ssumptions do not permit the possiility of higher priority pckets to rerrnge the queue t ny given stge. Therefore, we hve: N N R NONCON NONCON NONCON N N NONCON 0. 6 NONCON From equtions (7) nd (8) we otin: N (4) (5) (6) (7) (8)

9 NONCON NONCON ρ By the sme token, verge queuing dely for third suclss is: 3NONCON NONCON ρ 3 Finlly, system's verge dely for ech suclss is: T k NONCON k NONCON + (9) (0) () Hving clculted the verge delys for the two queues seprtely, we will comine these vlues to cquire the totl dely. A sttisticlly cceptle method for doing this is y using weights. Considering the wy tht we hve defined the prolem, it is logicl to expect tht ech queue will contriute with different percentge to the overll system dely. Hence, we will consider tht queue- nd queue- will contriute to the totl verge system dely y 40% nd 60%, respectively. Considering the vlues of nd μ in ech queue, we hve. T 0.4T T DTQM CON T 0.4T NONCON DTQM CON T T 0.4T T DTQM CON 3NONCON,, NONCON As for the numericl results presented elow, the vlue of system service rte is constnt t 0 pckets/sec, wheres the vlues of vry in order to otin the possile rnge of system utiliztion, 0% - 90%. Τhe vlue of service rte, considering pcket sizes in the order of KB, provides n cceptle rte of dt trnsmission, especilly in spce environments nd mong low energy sensors. () Fig 3. Numericl results The numericl results of our nlysis re presented in Fig. 3. e compre the forementioned queuing schemes sed on the verge dely for ech queue in ech system nd the verge queue occupncy. The results show tht our pproch

10 chieves performnce clerly etter thn FIFO nd in some cses etter thn PQ, especilly when the system utiliztion fctor is high. 4 Experimentl Evlution Evluting such queue mngement policy requires extensive experiments using n ctul spce network, since DTQM ffects oth lower-level (ttery lifespn) nd higher-level (throughput, ltency) performnce metrics. e implement nd evlute our proposed solution using the ns- softwre simultor [3]. This implementtion ws not trivil nd required significnt time considering the fct tht ns- does not support DTN. In this work, we focus on the second nd third components of DTQM, nmely the Buffer nd Storge Mngement nd Scheduling prts, leving the rest of the rchitecture evlution s future work. e pply DTQM to the network topology of Fig. 4. e ssume three sending nodes, S, S, S 3, which re locted in spce nd send trffic generted y vrious pplictions (Rel-time, Telemetry nd Telecommnd; ll constnt it rte with different sending intervls) nd receiving node R, which is locted on erth. All trffic generted y the sending nodes is routed through the routing node Q in which we deploy DTQM. Fig 4. Simultion topology Since we ssumed tht the sending nodes re locted in spce, the connectivity of the wireless links should e intermittent. In order to emulte DTN environment where connectivity is not predetermined, thnks to lterntive routes nd connections, we select rndom disconnectivity pttern with uniformly distriuted connectivity disruptions spred cross the entire durtion of the experiment, s the most pproprite for evluting the proposed rchitecture. In this context, link S -Q is uniformly unville in totl % of the time of the experiment. Similrly link S -Q is 5% unville, link S 3 -Q is 0% unville, nd finlly, link Q-R is 0.5% unville. e set the totl time of the experiments to one hour, nd mesure the totl numer of received pckets for ll three sending nodes, s well s the Appliction Stisfction Index (ASI) [4] of the network, metric tht highlights the contriution of the queuing dely to the totl dely. In order to dd reliility to our results nd enforce rndomness to tke effect we repet the experiment severl times. In prticulr, the performnce of DTQM ws evluted in five connectivity scenrios, ech one utilizing different (rndomly generted) connectivity schedule. e compre the otined results with the corresponding results of FIFO policy. In line with the priority function used (see Fig. ) we ssign ToD for ech ppliction s follows: for the RT ppliction, for the TM ppliction nd 3 for the TC ppliction.

11 Furthermore, we set the pcket intervls for ech ppliction s we would expect in rel-life, tht is, Rel-Time pckets re generted with the shortest intervl nd Telecommnd pckets re generted with the longest intervl; hence the difference in pcket numers. In Fig. 5 elow, we present the results from the comprison of DTQM ginst Droptil, using ASI nd verge dely s our performnce metrics. The first oservtion tht we cn mke is tht DTQM outperforms Droptil in ny cse. In prticulr, we experience 60% dely decrese on verge nd in some cses it cn rech up to 90% reduction of the corresponding undle dely using typicl FIFO scheme. This dely decrese is lso reflected on the system ASI, which is incresed 0%, on verge. Fig 5. Experimentl results TABLE II. EXPERIMENTAL RESULTS Received pckets Averge Dely System ASI Best Cse orst Cse RT TM TC RT TM TC FIFO DTQM FIFO DTQM FIFO DTQM Tle demonstrtes in detil the est nd worst cse results for DTQM. By viewing Tle, we notice tht the received pckets re lmost the sme in ny cse (with the exception of the TM pckets of the worst cse experiment) regrdless of queuing policy. Nevertheless, we my experience up to 40% increse in received Telemetry nd Telecommnd pckets when DTQM is deployed, since we ssign them with higher ToD. Moreover, the most interesting oservtion is the undoutle improvement of the verge dely regrdless of the ppliction. However, since we trnsfer the sme numer of pckets in oth cses, how cn we justify the dely decrese? DTQM uses sophisticted scheduling lgorithm tht ssigns higher priority to the pckets most recently rrived in the node nd promotes them in the queue (see Fig. ). Thus, pckets re reordered in the uffer sed on the time they entered the routing node. Clssic scheduling uses rigid FIFO pproch, which lthough it seems to promote firness, in fct it increses the communiction time, with the risk of dropping pcket due to TtL expirtion.

12 5 Conclusions In this pper we proposed novel rchitecture for queue mngement in DTN nodes. Although the ville spce confines us from presenting more detiled version nd evlution of our model, we sketched severl of its chrcteristics. One of the most interesting results ws initilly introduced y the stochstic nlysis, which yielded positive results for the opertion of our model tht exhiits ehvior fr superior to FIFO nd comprle to PQ, even in network conditions tht re unfvorle for our scheme. e lso otined supportive results from the conducted experiments tht llevite worries from dopting numerous ssumptions on the stochstic nlysis section. Therefore we cn sfely clim tht DTQM hs the potentil to chieve smller queuing delys nd higher ppliction stisfction when connectivity is scrce. Our next step is to enhnce our evlution towrds two directions: i) to present more detiled nlysis, which incorportes totl cpcity nd storge cpcity s well, in order to highlight one mjor property of DTN nd ii) to extend the experiments y using the spce-oriented tested [5] tht we hve developed in our l. Acknowledgments. The reserch leding to these results hs received funding from the Europen Community's Seventh Frmework Progrmme ([FP7/007-03_FP7- REGPOT-00-, SP4 Cpcities, Coordintion nd Support Actions) under grnt greement n 646 (project title: Spce Internetworking Center-SPICE) References. Fll, K.: A dely-tolernt network rchitecture for chllenged internets. ACM SIGCOMM 003, Krlsruhe, Germny, 5-9 August (003).. Cerf, V., Burleigh, S., Hooke, A., Torgerson, L., Durst, R., Scott, K., Fll, K., eiss, H.: Dely Tolernt Networking Architecture. RFC 4838, April (007). 3. Dimitriou, S., Tsoussidis, V.: Effective Buffer nd Storge Mngement in DTN Nodes. E-DTN 009, St. Petersurg, Russi, 4 Octoer (009). 4. Scott, K., Burleigh, S.: Bundle protocol specifiction. RFC 5050, Novemer (007). 5. Clss-sed eighted Fir Queuing, Cisco IOS Softwre Releses.0 T. 6. Low Ltency Queuing, Cisco IOS Softwre Releses.0 T. 7. Lindgren A. nd Phnse K. S.: Evlution of queuing policies nd forwrding strtegies for routing in intermittently connected networks. Proc. of IEEE COMSARE, Jnury Krif, A., Brkt, C., Spyropoulos, T.: Optiml uffer mngement policies for dely tolernt networks. IEEE SECON 008, Sn Frncisco, Cliforni, June 6-0 (008). 9. Jet Propulsion Lortory: ION: Interplnetry Overly Network The Dely-Tolernt Networking Reserch Group (DTNRG): Bertseks, D. P., Gllger, R.: Dt Networks. Prentice Hll (99).. Little, J. D. C.: A Proof of the Queueing Formul L. Opertions Reserch, 9, (96). 3. Network Simultor, (997). 4. Mmts, L, Tsoussidis, V: Differentiting services with Non-Congestive Queuing (NCQ). IEEE Trnsctions on Computers, 58(5): (009). 5. Smrs, C. V., Komnios, I., Dimntopoulos, S., Koutsoginnis, E., Tsoussidis, V., Ppstergiou, G., Pecci, N.: Extending Internet Into Spce - ESA DTN Tested Implementtion nd Evlution. Moilight 0, Athens, Greece, 8-0 My (009).

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

2 Computing all Intersections of a Set of Segments Line Segment Intersection

2 Computing all Intersections of a Set of Segments Line Segment Intersection 15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design

More information

Presentation Martin Randers

Presentation Martin Randers Presenttion Mrtin Rnders Outline Introduction Algorithms Implementtion nd experiments Memory consumption Summry Introduction Introduction Evolution of species cn e modelled in trees Trees consist of nodes

More information

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using

More information

Mobile IP route optimization method for a carrier-scale IP network

Mobile IP route optimization method for a carrier-scale IP network Moile IP route optimiztion method for crrier-scle IP network Tkeshi Ihr, Hiroyuki Ohnishi, nd Ysushi Tkgi NTT Network Service Systems Lortories 3-9-11 Midori-cho, Musshino-shi, Tokyo 180-8585, Jpn Phone:

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully

More information

EECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining

EECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining EECS150 - Digitl Design Lecture 23 - High-level Design nd Optimiztion 3, Prllelism nd Pipelining Nov 12, 2002 John Wwrzynek Fll 2002 EECS150 - Lec23-HL3 Pge 1 Prllelism Prllelism is the ct of doing more

More information

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin

More information

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1): Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters

More information

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases Overview Mobile computing nd dtbses Generl issues in mobile dt mngement Dt dissemintion Dt consistency Loction dependent queries Interfces Detils of brodcst disks thlis klfigopoulos Network rchitecture

More information

COMP 423 lecture 11 Jan. 28, 2008

COMP 423 lecture 11 Jan. 28, 2008 COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring

More information

From Dependencies to Evaluation Strategies

From Dependencies to Evaluation Strategies From Dependencies to Evlution Strtegies Possile strtegies: 1 let the user define the evlution order 2 utomtic strtegy sed on the dependencies: use locl dependencies to determine which ttriutes to compute

More information

UT1553B BCRT True Dual-port Memory Interface

UT1553B BCRT True Dual-port Memory Interface UTMC APPICATION NOTE UT553B BCRT True Dul-port Memory Interfce INTRODUCTION The UTMC UT553B BCRT is monolithic CMOS integrted circuit tht provides comprehensive MI-STD- 553B Bus Controller nd Remote Terminl

More information

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li 2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min

More information

Performance analysis of QoS mechanisms in IP networks

Performance analysis of QoS mechanisms in IP networks University of Wollongong Reserch Online Fculty of Informtics - Ppers (Archive) Fculty of Engineering nd Informtion Sciences 2000 Performnce nlysis of QoS mechnisms in IP networks D. Ji University of Wollongong

More information

The Greedy Method. The Greedy Method

The Greedy Method. The Greedy Method Lists nd Itertors /8/26 Presenttion for use with the textook, Algorithm Design nd Applictions, y M. T. Goodrich nd R. Tmssi, Wiley, 25 The Greedy Method The Greedy Method The greedy method is generl lgorithm

More information

10.5 Graphing Quadratic Functions

10.5 Graphing Quadratic Functions 0.5 Grphing Qudrtic Functions Now tht we cn solve qudrtic equtions, we wnt to lern how to grph the function ssocited with the qudrtic eqution. We cll this the qudrtic function. Grphs of Qudrtic Functions

More information

LETKF compared to 4DVAR for assimilation of surface pressure observations in IFS

LETKF compared to 4DVAR for assimilation of surface pressure observations in IFS LETKF compred to 4DVAR for ssimiltion of surfce pressure oservtions in IFS Pu Escrià, Mssimo Bonvit, Mts Hmrud, Lrs Isksen nd Pul Poli Interntionl Conference on Ensemle Methods in Geophysicl Sciences Toulouse,

More information

Parallel Square and Cube Computations

Parallel Square and Cube Computations Prllel Squre nd Cube Computtions Albert A. Liddicot nd Michel J. Flynn Computer Systems Lbortory, Deprtment of Electricl Engineering Stnford University Gtes Building 5 Serr Mll, Stnford, CA 945, USA liddicot@stnford.edu

More information

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric

More information

LECT-10, S-1 FP2P08, Javed I.

LECT-10, S-1 FP2P08, Javed I. A Course on Foundtions of Peer-to-Peer Systems & Applictions LECT-10, S-1 CS /799 Foundtion of Peer-to-Peer Applictions & Systems Kent Stte University Dept. of Computer Science www.cs.kent.edu/~jved/clss-p2p08

More information

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search.

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search. CS 88: Artificil Intelligence Fll 00 Lecture : A* Serch 9//00 A* Serch rph Serch Tody Heuristic Design Dn Klein UC Berkeley Multiple slides from Sturt Russell or Andrew Moore Recp: Serch Exmple: Pncke

More information

MTH 146 Conics Supplement

MTH 146 Conics Supplement 105- Review of Conics MTH 146 Conics Supplement In this section we review conics If ou ne more detils thn re present in the notes, r through section 105 of the ook Definition: A prol is the set of points

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-169 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

A Priority-based Distributed Call Admission Protocol for Multi-hop Wireless Ad hoc Networks

A Priority-based Distributed Call Admission Protocol for Multi-hop Wireless Ad hoc Networks A Priority-bsed Distributed Cll Admission Protocol for Multi-hop Wireless Ad hoc Networks un Sun Elizbeth M. Belding-Royer Deprtment of Computer Science University of Cliforni, Snt Brbr suny, ebelding

More information

Definition of Regular Expression

Definition of Regular Expression Definition of Regulr Expression After the definition of the string nd lnguges, we re redy to descrie regulr expressions, the nottion we shll use to define the clss of lnguges known s regulr sets. Recll

More information

Exam #1 for Computer Simulation Spring 2005

Exam #1 for Computer Simulation Spring 2005 Exm # for Computer Simultion Spring 005 >>> SOLUTION

More information

Rethinking Virtual Network Embedding: Substrate Support for Path Splitting and Migration

Rethinking Virtual Network Embedding: Substrate Support for Path Splitting and Migration Rethinking Virtul Network Emedding: Sustrte Support for Pth Splitting nd Migrtion Minln Yu, Yung Yi, Jennifer Rexford, Mung Ching Computer Science, Princeton University, Emil: {minlnyu,jrex}@cs.princeton.edu

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

Performance enhancement of IEEE DCF using novel backoff algorithm

Performance enhancement of IEEE DCF using novel backoff algorithm Kuo et l. EURASIP Journl on Wireless Communictions nd Networking 212, 212:274 http://jis.eursipjournls.com/content/212/1/274 RESEARCH Open Access Performnce enhncement of IEEE 82.11 using novel ckoff lgorithm

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distriuted Systems Principles nd Prdigms Chpter 11 (version April 7, 2008) Mrten vn Steen Vrije Universiteit Amsterdm, Fculty of Science Dept. Mthemtics nd Computer Science Room R4.20. Tel: (020) 598 7784

More information

Determining Single Connectivity in Directed Graphs

Determining Single Connectivity in Directed Graphs Determining Single Connectivity in Directed Grphs Adm L. Buchsbum 1 Mrtin C. Crlisle 2 Reserch Report CS-TR-390-92 September 1992 Abstrct In this pper, we consider the problem of determining whether or

More information

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork MA1008 Clculus nd Liner Algebr for Engineers Course Notes for Section B Stephen Wills Deprtment of Mthemtics University College Cork s.wills@ucc.ie http://euclid.ucc.ie/pges/stff/wills/teching/m1008/ma1008.html

More information

On Computation and Resource Management in Networked Embedded Systems

On Computation and Resource Management in Networked Embedded Systems On Computtion nd Resource Mngement in Networed Embedded Systems Soheil Ghisi Krlene Nguyen Elheh Bozorgzdeh Mjid Srrfzdeh Computer Science Deprtment University of Cliforni, Los Angeles, CA 90095 soheil,

More information

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs. Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online

More information

arxiv: v1 [cs.db] 16 Sep 2016

arxiv: v1 [cs.db] 16 Sep 2016 Blech: A Distriuted Strem Dt Clening System Yongcho Tin Eurecom yongcho.tin@eurecom.fr Pietro Michirdi Eurecom pietro.michirdi@eurecom.fr Mrko Vukolić IBM Reserch - Zurich mvu@zurich.im.com rxiv:169.5113v1

More information

F. R. K. Chung y. University ofpennsylvania. Philadelphia, Pennsylvania R. L. Graham. AT&T Labs - Research. March 2,1997.

F. R. K. Chung y. University ofpennsylvania. Philadelphia, Pennsylvania R. L. Graham. AT&T Labs - Research. March 2,1997. Forced convex n-gons in the plne F. R. K. Chung y University ofpennsylvni Phildelphi, Pennsylvni 19104 R. L. Grhm AT&T Ls - Reserch Murry Hill, New Jersey 07974 Mrch 2,1997 Astrct In seminl pper from 1935,

More information

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis CS143 Hndout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexicl Anlysis In this first written ssignment, you'll get the chnce to ply round with the vrious constructions tht come up when doing lexicl

More information

Dr. D.M. Akbar Hussain

Dr. D.M. Akbar Hussain Dr. D.M. Akr Hussin Lexicl Anlysis. Bsic Ide: Red the source code nd generte tokens, it is similr wht humns will do to red in; just tking on the input nd reking it down in pieces. Ech token is sequence

More information

An evolutionary approach to inter-session network coding

An evolutionary approach to inter-session network coding An evolutionry pproch to inter-session network coding The MIT Fculty hs mde this rticle openly ville. Plese shre how this ccess enefits you. Your story mtters. Cittion As Pulished Pulisher Kim, M. et l.

More information

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5 CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,

More information

Graphs with at most two trees in a forest building process

Graphs with at most two trees in a forest building process Grphs with t most two trees in forest uilding process rxiv:802.0533v [mth.co] 4 Fe 208 Steve Butler Mis Hmnk Mrie Hrdt Astrct Given grph, we cn form spnning forest y first sorting the edges in some order,

More information

Bleach: A Distributed Stream Data Cleaning System

Bleach: A Distributed Stream Data Cleaning System Blech: A Distriuted Strem Dt Clening System Yongcho Tin Eurecom Biot, Frnce Emil: yongcho.tin@eurecom.fr Pietro Michirdi Eurecom Biot, Frnce Emil: pietro.michirdi@eurecom.fr Mrko Vukolić IBM Reserch Zurich,

More information

What are suffix trees?

What are suffix trees? Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl

More information

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search Uninformed Serch [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.] Tody Serch Problems Uninformed Serch Methods

More information

ZZ - Advanced Math Review 2017

ZZ - Advanced Math Review 2017 ZZ - Advnced Mth Review Mtrix Multipliction Given! nd! find the sum of the elements of the product BA First, rewrite the mtrices in the correct order to multiply The product is BA hs order x since B is

More information

A dynamic multicast tree based routing scheme without replication in delay tolerant networks

A dynamic multicast tree based routing scheme without replication in delay tolerant networks Accepted Mnuscript A dynmic multicst tree bsed routing scheme without repliction in dely tolernt networks Yunsheng Wng, Jie Wu PII: S0-()00- DOI: 0.0/j.jpdc.0..00 Reference: YJPDC To pper in: J. Prllel

More information

A Study of Quality of Service Resource Allocation Schemes for Mobile Health

A Study of Quality of Service Resource Allocation Schemes for Mobile Health RESEARCH ARTICLE A Study of Qulity of Service Resource Alloction Schemes for Moile Helth Idris Krim nd Tr Ali Yhiy* Deprtment of Computer Science nd Engineering, University of Kurdistn Hewler, Kurdistn

More information

On Achieving Optimal Throughput with Network Coding

On Achieving Optimal Throughput with Network Coding In IEEE INFOCOM On Achieving Optiml Throughput with Network Coding Zongpeng Li, Bochun Li, Dn Jing, Lp Chi Lu Astrct With the constrints of network topologies nd link cpcities, chieving the optiml end-to-end

More information

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. General Tree Search. Uniform Cost. Lecture 3: A* Search 9/4/2007

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. General Tree Search. Uniform Cost. Lecture 3: A* Search 9/4/2007 CS 88: Artificil Intelligence Fll 2007 Lecture : A* Serch 9/4/2007 Dn Klein UC Berkeley Mny slides over the course dpted from either Sturt Russell or Andrew Moore Announcements Sections: New section 06:

More information

6.3 Volumes. Just as area is always positive, so is volume and our attitudes towards finding it.

6.3 Volumes. Just as area is always positive, so is volume and our attitudes towards finding it. 6.3 Volumes Just s re is lwys positive, so is volume nd our ttitudes towrds finding it. Let s review how to find the volume of regulr geometric prism, tht is, 3-dimensionl oject with two regulr fces seprted

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-295 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016 Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence Winter 2016 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl

More information

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

Improper Integrals. October 4, 2017

Improper Integrals. October 4, 2017 Improper Integrls October 4, 7 Introduction We hve seen how to clculte definite integrl when the it is rel number. However, there re times when we re interested to compute the integrl sy for emple 3. Here

More information

Computer-Aided Multiscale Modelling for Chemical Process Engineering

Computer-Aided Multiscale Modelling for Chemical Process Engineering 17 th Europen Symposium on Computer Aided Process Engineesing ESCAPE17 V. Plesu nd P.S. Agchi (Editors) 2007 Elsevier B.V. All rights reserved. 1 Computer-Aided Multiscle Modelling for Chemicl Process

More information

Pointwise convergence need not behave well with respect to standard properties such as continuity.

Pointwise convergence need not behave well with respect to standard properties such as continuity. Chpter 3 Uniform Convergence Lecture 9 Sequences of functions re of gret importnce in mny res of pure nd pplied mthemtics, nd their properties cn often be studied in the context of metric spces, s in Exmples

More information

Accelerating 3D convolution using streaming architectures on FPGAs

Accelerating 3D convolution using streaming architectures on FPGAs Accelerting 3D convolution using streming rchitectures on FPGAs Hohun Fu, Robert G. Clpp, Oskr Mencer, nd Oliver Pell ABSTRACT We investigte FPGA rchitectures for ccelerting pplictions whose dominnt cost

More information

Midterm 2 Sample solution

Midterm 2 Sample solution Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the

More information

Efficient Algorithms For Optimizing Policy-Constrained Routing

Efficient Algorithms For Optimizing Policy-Constrained Routing Efficient Algorithms For Optimizing Policy-Constrined Routing Andrew R. Curtis curtis@cs.colostte.edu Ross M. McConnell rmm@cs.colostte.edu Dn Mssey mssey@cs.colostte.edu Astrct Routing policies ply n

More information

DIFFERENT POLICY OBJECTIVES OF THE ROAD AUTHORITY IN THE OPTIMAL TOLL DESIGN PROBLEM

DIFFERENT POLICY OBJECTIVES OF THE ROAD AUTHORITY IN THE OPTIMAL TOLL DESIGN PROBLEM DIFFERENT POLICY OBJECTIVES OF THE ROAD AUTHORITY IN THE OPTIMAL TOLL DESIGN PROBLEM Dusic Joksimovic*, Michiel Bliemer Delft University of Technology, The Netherlnds ARS Trnsport &Technology, The Netherlnds

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-186 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

M-Historian and M-Trend

M-Historian and M-Trend Product Bulletin Issue Dte June 18, 2004 M-Historin nd The M-Historin mnges the collection nd rchiving of trend dt, nd enles the presenttion of rchived trend dt in the ssocited softwre component. M-Historin

More information

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. Example: Pancake Problem. Example: Pancake Problem

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. Example: Pancake Problem. Example: Pancake Problem Announcements Project : erch It s live! Due 9/. trt erly nd sk questions. It s longer thn most! Need prtner? Come up fter clss or try Pizz ections: cn go to ny, ut hve priority in your own C 88: Artificil

More information

SPLIT PLOT AND STRIP PLOT DESIGNS

SPLIT PLOT AND STRIP PLOT DESIGNS 1. Split Plot Design SPLIT PLOT AND STRIP PLOT DESIGNS D.K. SEHGAL Indin Agriculturl Sttistics Reserch Institute Lirry Avenue, New Delhi-110 01 dksehgl@isri.res.in 1.1 Introduction In conducting experiments,

More information

PARALLEL AND DISTRIBUTED COMPUTING

PARALLEL AND DISTRIBUTED COMPUTING PARALLEL AND DISTRIBUTED COMPUTING 2009/2010 1 st Semester Teste Jnury 9, 2010 Durtion: 2h00 - No extr mteril llowed. This includes notes, scrtch pper, clcultor, etc. - Give your nswers in the ville spce

More information

Simrad ES80. Software Release Note Introduction

Simrad ES80. Software Release Note Introduction Simrd ES80 Softwre Relese 1.3.0 Introduction This document descries the chnges introduced with the new softwre version. Product: ES80 Softwre version: 1.3.0 This softwre controls ll functionlity in the

More information

Network Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved

Network Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved Network Interconnection: Bridging CS 57 Fll 6 6 Kenneth L. Clvert All rights reserved The Prolem We know how to uild (rodcst) LANs Wnt to connect severl LANs together to overcome scling limits Recll: speed

More information

Chapter 2 Sensitivity Analysis: Differential Calculus of Models

Chapter 2 Sensitivity Analysis: Differential Calculus of Models Chpter 2 Sensitivity Anlysis: Differentil Clculus of Models Abstrct Models in remote sensing nd in science nd engineering, in generl re, essentilly, functions of discrete model input prmeters, nd/or functionls

More information

MATH 25 CLASS 5 NOTES, SEP

MATH 25 CLASS 5 NOTES, SEP MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid

More information

12-B FRACTIONS AND DECIMALS

12-B FRACTIONS AND DECIMALS -B Frctions nd Decimls. () If ll four integers were negtive, their product would be positive, nd so could not equl one of them. If ll four integers were positive, their product would be much greter thn

More information

Lecture 7: Integration Techniques

Lecture 7: Integration Techniques Lecture 7: Integrtion Techniques Antiderivtives nd Indefinite Integrls. In differentil clculus, we were interested in the derivtive of given rel-vlued function, whether it ws lgeric, eponentil or logrithmic.

More information

Computer Networks 53 (2009) Contents lists available at ScienceDirect. Computer Networks. journal homepage:

Computer Networks 53 (2009) Contents lists available at ScienceDirect. Computer Networks. journal homepage: Computer Networks 53 (29) 252 2516 Contents lists ville t ScienceDirect Computer Networks journl homepge: www.elsevier.com/locte/comnet Congestion-wre chnnel ssignment for multi-chnnel wireless mesh networks

More information

Spectral Analysis of MCDF Operations in Image Processing

Spectral Analysis of MCDF Operations in Image Processing Spectrl Anlysis of MCDF Opertions in Imge Processing ZHIQIANG MA 1,2 WANWU GUO 3 1 School of Computer Science, Northest Norml University Chngchun, Jilin, Chin 2 Deprtment of Computer Science, JilinUniversity

More information

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,

More information

On network coding and routing in dynamic wireless multicast networks

On network coding and routing in dynamic wireless multicast networks On network coding nd routing in dynmic wireless multicst networks Trcey Ho, Ji-Qi Jin Cliforni Institute of Technology Psden, CA Emil: {tho, jin}@cltechedu Hrish Viswnthn Lucent Technologies, Bell Ls Murry

More information

FastRoute: A Step to Integrate Global Routing into Placement

FastRoute: A Step to Integrate Global Routing into Placement FstRoute: A Step to Integrte Glol Routing into Plcement Min Pn nd Chris Chu Deprtment of Electricl nd Computer Engineering Iow Stte University, Ames, IA 00 Emil: {pnmin, cnchu}@istte.edu ABSTRACT Becuse

More information

Efficient Rerouting Algorithms for Congestion Mitigation

Efficient Rerouting Algorithms for Congestion Mitigation 2009 IEEE Computer Society Annul Symposium on VLSI Efficient Rerouting Algorithms for Congestion Mitigtion M. A. R. Chudhry*, Z. Asd, A. Sprintson, nd J. Hu Deprtment of Electricl nd Computer Engineering

More information

UNIT 11. Query Optimization

UNIT 11. Query Optimization UNIT Query Optimiztion Contents Introduction to Query Optimiztion 2 The Optimiztion Process: An Overview 3 Optimiztion in System R 4 Optimiztion in INGRES 5 Implementing the Join Opertors Wei-Png Yng,

More information

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants

A Heuristic Approach for Discovering Reference Models by Mining Process Model Variants A Heuristic Approch for Discovering Reference Models by Mining Process Model Vrints Chen Li 1, Mnfred Reichert 2, nd Andres Wombcher 3 1 Informtion System Group, University of Twente, The Netherlnds lic@cs.utwente.nl

More information

Digital Signal Processing: A Hardware-Based Approach

Digital Signal Processing: A Hardware-Based Approach Digitl Signl Processing: A Hrdwre-Bsed Approch Roert Esposito Electricl nd Computer Engineering Temple University troduction Teching Digitl Signl Processing (DSP) hs included the utilition of simultion

More information

A Transportation Problem Analysed by a New Ranking Method

A Transportation Problem Analysed by a New Ranking Method (IJIRSE) Interntionl Journl of Innovtive Reserch in Science & Engineering ISSN (Online) 7-07 A Trnsporttion Problem Anlysed by New Rnking Method Dr. A. Shy Sudh P. Chinthiy Associte Professor PG Scholr

More information

2PC AGENT METHOD: ACHIEVING SERIALIZABILITY IN PRESENCE OF FAILURES IN A HETEROGENEOUS MULTIDATABASE

2PC AGENT METHOD: ACHIEVING SERIALIZABILITY IN PRESENCE OF FAILURES IN A HETEROGENEOUS MULTIDATABASE 2PC AGENT METHOD: ACHIEVING SERIALIZABILITY IN PRESENCE OF FAILURES IN A HETEROGENEOUS MULTIDATABASE Antoni Wolski nd Jri Veijlinen Technicl Reserch Centre of Finlnd Lortory for Informtion Processing Lehtisrentie

More information

Evolutionary Approaches To Minimizing Network Coding Resources

Evolutionary Approaches To Minimizing Network Coding Resources This full text pper ws peer reviewed t the direction of IEEE Communictions Society suject mtter experts for puliction in the IEEE INFOCOM 2007 proceedings. Evolutionry Approches To Minimizing Network Coding

More information

SUPPLEMENTARY INFORMATION

SUPPLEMENTARY INFORMATION Supplementry Figure y (m) x (m) prllel perpendiculr Distnce (m) Bird Stndrd devition for distnce (m) c 6 prllel perpendiculr 4 doi:.8/nture99 SUPPLEMENTARY FIGURE Confirmtion tht movement within the flock

More information

such that the S i cover S, or equivalently S

such that the S i cover S, or equivalently S MATH 55 Triple Integrls Fll 16 1. Definition Given solid in spce, prtition of consists of finite set of solis = { 1,, n } such tht the i cover, or equivlently n i. Furthermore, for ech i, intersects i

More information

CS311H: Discrete Mathematics. Graph Theory IV. A Non-planar Graph. Regions of a Planar Graph. Euler s Formula. Instructor: Işıl Dillig

CS311H: Discrete Mathematics. Graph Theory IV. A Non-planar Graph. Regions of a Planar Graph. Euler s Formula. Instructor: Işıl Dillig CS311H: Discrete Mthemtics Grph Theory IV Instructor: Işıl Dillig Instructor: Işıl Dillig, CS311H: Discrete Mthemtics Grph Theory IV 1/25 A Non-plnr Grph Regions of Plnr Grph The plnr representtion of

More information

Efficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc

Efficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc 4th Ntionl Conference on Electricl, Electronics nd Computer Engineering (NCEECE 2015) Efficient Regulr Expression Grouping Algorithm Bsed on Lbel Propgtion Xi Chen, Shuqio Chenb nd Ming Moc Ntionl Digitl

More information

CSCI 3130: Formal Languages and Automata Theory Lecture 12 The Chinese University of Hong Kong, Fall 2011

CSCI 3130: Formal Languages and Automata Theory Lecture 12 The Chinese University of Hong Kong, Fall 2011 CSCI 3130: Forml Lnguges nd utomt Theory Lecture 12 The Chinese University of Hong Kong, Fll 2011 ndrej Bogdnov In progrmming lnguges, uilding prse trees is significnt tsk ecuse prse trees tell us the

More information

Looking up objects in Pastry

Looking up objects in Pastry Review: Pstry routing tbles 0 1 2 3 4 7 8 9 b c d e f 0 1 2 3 4 7 8 9 b c d e f 0 1 2 3 4 7 8 9 b c d e f 0 2 3 4 7 8 9 b c d e f Row0 Row 1 Row 2 Row 3 Routing tble of node with ID i =1fc s - For ech

More information

The gamuts of input and output colour imaging media

The gamuts of input and output colour imaging media In Proceedings of IS&T/SPIE Electronic Imging 1 The gmuts of input nd output colour imging medi án Morovic,* Pei Li Sun* nd Peter Morovic * Colour & Imging Institute, University of Dery, UK School of Informtion

More information

pdfapilot Server 2 Manual

pdfapilot Server 2 Manual pdfpilot Server 2 Mnul 2011 by clls softwre gmbh Schönhuser Allee 6/7 D 10119 Berlin Germny info@cllssoftwre.com www.cllssoftwre.com Mnul clls pdfpilot Server 2 Pge 2 clls pdfpilot Server 2 Mnul Lst modified:

More information

9 Graph Cutting Procedures

9 Graph Cutting Procedures 9 Grph Cutting Procedures Lst clss we begn looking t how to embed rbitrry metrics into distributions of trees, nd proved the following theorem due to Brtl (1996): Theorem 9.1 (Brtl (1996)) Given metric

More information

CSCI 104. Rafael Ferreira da Silva. Slides adapted from: Mark Redekopp and David Kempe

CSCI 104. Rafael Ferreira da Silva. Slides adapted from: Mark Redekopp and David Kempe CSCI 0 fel Ferreir d Silv rfsilv@isi.edu Slides dpted from: Mrk edekopp nd Dvid Kempe LOG STUCTUED MEGE TEES Series Summtion eview Let n = + + + + k $ = #%& #. Wht is n? n = k+ - Wht is log () + log ()

More information

Unit 5 Vocabulary. A function is a special relationship where each input has a single output.

Unit 5 Vocabulary. A function is a special relationship where each input has a single output. MODULE 3 Terms Definition Picture/Exmple/Nottion 1 Function Nottion Function nottion is n efficient nd effective wy to write functions of ll types. This nottion llows you to identify the input vlue with

More information

I/O Efficient Dynamic Data Structures for Longest Prefix Queries

I/O Efficient Dynamic Data Structures for Longest Prefix Queries I/O Efficient Dynmic Dt Structures for Longest Prefix Queries Moshe Hershcovitch 1 nd Him Kpln 2 1 Fculty of Electricl Engineering, moshik1@gmil.com 2 School of Computer Science, himk@cs.tu.c.il, Tel Aviv

More information

Outline. Introduction Suffix Trees (ST) Building STs in linear time: Ukkonen s algorithm Applications of ST

Outline. Introduction Suffix Trees (ST) Building STs in linear time: Ukkonen s algorithm Applications of ST Suffi Trees Outline Introduction Suffi Trees (ST) Building STs in liner time: Ukkonen s lgorithm Applictions of ST 2 3 Introduction Sustrings String is ny sequence of chrcters. Sustring of string S is

More information

Stack. A list whose end points are pointed by top and bottom

Stack. A list whose end points are pointed by top and bottom 4. Stck Stck A list whose end points re pointed by top nd bottom Insertion nd deletion tke plce t the top (cf: Wht is the difference between Stck nd Arry?) Bottom is constnt, but top grows nd shrinks!

More information

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers Mth Modeling Lecture 4: Lgrnge Multipliers Pge 4452 Mthemticl Modeling Lecture 4: Lgrnge Multipliers Lgrnge multipliers re high powered mthemticl technique to find the mximum nd minimum of multidimensionl

More information