Queue-Management Architecture for Delay Tolerant Networking
|
|
- Spencer Pearson
- 6 years ago
- Views:
Transcription
1 Queue-Mngement Architecture for Dely Tolernt Networking Sotirios-Angelos Lens, Stylinos Dimitriou, Fni Tspeli, Vssilis Tsoussidis Spce Internetworking Center (SPICE), ECE Deprtment, Democritus University of Thrce, Xnthi, Greece {slens, sdimitr, ttspeli, Astrct. During the lst yers, the interest in Dely/Disruption Tolernt Networks hs een significntly incresed, minly ecuse DTN covers vst spectrum of pplictions, such s deep-spce, stellite, sensor nd vehiculr networks. Even though the Bundle Protocol seems to e the prevlent cndidte rchitecture for dely-tolernt pplictions, some prcticl issues hinder its wide deployment. One of the functionlities tht require further reserch nd implementtion is DTN queue mngement. Indeed, queue mngement in DTN networks is complex issue: loss of connectivity or extended delys, render occsionlly meningless ny pre-scheduled priority for pcket forwrding. Our Queue-mngement pproch integrtes connectivity sttus into uffering nd forwrding policy, eliminting the possiility of stored dt to expire nd promoting pplictions tht show potentil to run smoothly. Therefore, our pproch does not rely solely on mrked priorities ut rther on ctive networking conditions. e present our model nlyticlly nd compre it with stndrd solutions. e then develop n evlution tool y extending ns- modules nd, sed on selective scenrios primrily from Spce Communictions, we demonstrte the suitility of our model for use in lowconnectivity/high-dely environments. Keywords: DTN, Queue mngement, Scheduling Introduction Queue mngement in trditionl networks is used minly to regulte trffic fluctutions, s well s to ssign priorities to specific trffic clsses. It often utilizes dropping mechnisms tht signl end-users, implicitly or explicitly, for impeding congestion events. Nevertheless, queue mngement in Dely/Disruptive Tolernt Networks (DTN) [] [], with long delys nd disruptions hs to ddress dditionl issues. hile fir resource lloction nd trffic clssifiction re still importnt, queue mngement needs lso to exploit every ville contct opportunity nd reschedule trffic prioritiztion nd dt storge to hndle communiction disruptions nd delys. e extend further the preliminry rchitecture proposed in [3] with mthemticl nlysis, rchitecturl enhncements nd systemtic evlution. Our rchitecture is composed now y three min components: i) n Admission Control unit, which determines the criteri tht DTN nodes use to ccept or reject incoming undles, ii)
2 Buffer nd Storge Mngement unit, which determines how ccepted undles should e stored, nd iii) Scheduling unit, which determines undle service priorities. Here, we refer to dt hndled y DTN nodes s undles, even though the rchitecture proposed is not confined y the stndrdized Bundle Protocol [4]. The chrcteristics of ech type of DTN network my vry nd the ojective ech time my e different. Here, we emphsize on spce pplictions: spce stisfies oth dimensions of DTN, tht is, disruptions nd long delys. e hve primrily two gols: i) to increse the DTN device throughput vi efficient link exploittion nd ii) to increse ppliction stisfction. From n engineer s viewpoint, DTN requires dditionl supportive functionlity primrily for resource mngement. In DTN, resource mngement incorportes storge cpcity s well, which in turn is ssocited with long delys for dt forwrding nd incresed complexity for scheduling. For exmple, unlike typicl IP network pckets, undles do not fce the dnger to e dropped, however they do fce the dnger to expire. Also, priority-mrked pckets need not prioritized service in cse connectivity disruptions hve dmged their scope lredy. A trditionl FIFO-Droptil queue policy my hve een n initil cndidte for such system. Aprt from its simplicity nd the fct tht it my perform decently in low-trffic networks, this pproch is flwed severely: we cnnot ssign different priorities to different trffic clsses nd, on top of tht, queuing delys punish uniformly nd cumultively ll users, even those tht my hve chnce to survive potentil short disruption. Alterntively, we could integrte prioritiztion lgorithm in our scheme, such s Priority Queuing (PQ), Fir Queuing (FQ), Clss-sed eighted Fir Queuing [5] (CBFQ) nd Low Ltency Queuing (LLQ) [6]. A common, undesirle chrcteristic, however, is tht priorities re typiclly predetermined nd/or sttic, in the sense tht do not incorporte connectivity feedck nd hence cnnot reflect scheduling policy to corresponding forwrding implementtion. This non-typicl requirement renders them only lind tools for DTN mngement nd hence unsuitle, in their present form, for DTN networks. Additionl pproches presented in [7] tke ccount the low expirtion time left nd the numer of times pcket hs een forwrded, in order to drop it in cses of congestion. The most notle pproch is SHLI (drop shortest life time first) which drops the pcket with the lowest expirtion time. However, this might hve some undesirle side-effects when some pckets hve een delyed significntly, yet we cn still mnge to forwrd them efore they expire. Relevnt work on DTN queue mngement is limited, nd usully focuses on specific prolems, such s policies or scheduling, providing nrrow pproch to the queue mngement, occsionlly isolting joint prolems. However, some interesting work exists lredy. In [8], Amir Krif et l., focus on queue mngement policies, nd rech similr conclusions; they show tht trditionl uffer mngement policies such s drop-til or drop-front re su-optiml for use in DTN networks. Current implementtions of the DTN, such s ION [9] nd DTN [0], t this stge, dopt simple pproches to queue mngement considering the lck of corresponding stndrds. For exmple ION, deploys the undle protocol pproch, vi PQ scheme with three queues of outound undles, one queue for ech of the defined levels of priority ( clss of service ) supported y BP. Our pproch employs n enhnced clssifiction scheme tht integrtes oth network (i.e., connectivity) dynmics nd
3 trffic requirements. Therefore, scheduling is not product of pcket mrks nd hence, ppliction lone, ut rther joint decision of dt priority, ppliction potentil to survive disruptions nd the network disruptions per se. The rest of the pper is orgnized s follows. In section, we define our queue mngement model, including only the detils necessry for the stochstic nlysis, wheres in section 3 we present our stochstic nlysis nd the corresponding results. In section 4 we pply, vlidte nd compre prt of our model through simultions in ns-. Finlly, in section 5 we conclude nd set the frmework for future work. Dely Tolernt Queue Mngement Model In order to define our queue-mngement model, herefter referred s DTQM (Dely-Tolernt Queue Mngement) we consider the DTN network s network with low connectivity, high nd vrile delys nd sence of end-to-end pth. e define DTQM in wy tht llows us to include ll the necessry functionlity to stisfy generic set of requirements. Thus, we divide DTQM into three units; i) Admission Control, ii) Buffer nd Storge Mngement, nd iii) Scheduling. e discuss ll units functionlity, however, due to lck of spce we emphsize on the most novel nd sophisticted units, nmely the Buffer nd Storge Mngement nd Scheduling units. Admission Control: Admission Control determines how nd which dt my e ccepted from DTN node nd is minly relted to dt-custody requests. hen custody requests re ccepted y DTN node, tht node is oliged to mintin the undles in its memory, until it is le to forwrd them, or until they expire. Buffer nd Storge Mngement: Contrry to trditionl networks, where the routing nodes require uffers to implement store-nd-forwrd strtegy, DTN nodes need dditionl persistent storge to mintin those pckets tht cnnot immeditely e forwrded due to limited connectivity. In IP-sed routers, the min focus of reserchers is to increse chnnel utiliztion nd decrese dely through scheduling nd dropping. This pproch inherently ssumes tht end nodes respond to losses nd therefore recover in short time. However, when connectivity is scrce, the requirement for short-time recovery is lredy violted. Furthermore, DTN networks introduce n dditionl level of complexity, s result of comining oth voltile nd persistent storge. Clerly, the trivil pproch to store every incoming undle in persistent storge nd move it to uffer upon request increses the processing dely of ll the undles nd fils in cses of pplictions engged in low-dely trnsfers. In Fig. we depict grphiclly the Buffer nd Storge Mngement unit. Generlly, this model is composed y two units, the Policy unit nd the ctul Storge unit. The purpose of the Policy unit is to ccept ll the undles tht enter the node nd, depending on the conditions, move them to uffers or storge. Buffer nd Storge mngement is initilly differentited sed on whether there is connectivity etween the DTN node nd the next-hop. During periods of connectivity, pckets tht enter the node my e immeditely routed to the output without eing stored first. The totl sending rte is clculted y the sum of sending rtes of the Connectivity nd Non-Connectivity uffers.
4 Fig.. The Buffer nd Storge Mngement model. In more detil the purpose of ech storge unit cn e descried s follows: Connectivity uffer. The Policy unit moves undles to the Connectivity uffer only when there is connectivity nd therefore the corresponding undles cn e forwrded to the next node. After time-period which is determined y some threshold, when no connectivity exists, undles tht re stored temporrily in the Connectivity uffer move to Persistent storge. Persistent storge. The Policy unit moves undles to Persistent storge in three cses: i) when there is no connectivity, ii) when there is connectivity ut no Connectivity uffer spce ville, nd iii) when there is oth connectivity nd Connectivity uffer spce ville, however the contct grph, which is known priori, instructs tht time does not suffice to forwrd undles to the next hop. Non-Connectivity uffer. Bundles re moved from storge to the Non- Connectivity uffer in the following two cses: i) when undles re of high priority (re either urgent or scheduled contct is expected) nd there is no connectivity nd ii) when there is connectivity ut other undles re selected to e forwrded (opportunistic contct). The lgorithm tht determines which undles should e forwrded first t given communiction opportunity is descried riefly in the Scheduling section. Our proposed model dditionlly dels with the prolem of incresed processing dely. In the event of multiple nodes in row tht re ctively connected, trnsmission is rther strightforwrd, since pckets re trnsferred from uffer to uffer without the interference of storge. In the event of short connectivity no further dely due to storge retrievl is imposed; undles hve lredy moved to the Non- Connectivity uffer, nd hence ndwidth through short connectivity cn e fully exploited. Scheduling: Scheduling unit ressigns the priorities for ech undle nd determines which undles should e outputted from the DTN node when communiction opportunity occurs. A priority-oriented model should e inevitly considered; this model should incorporte ppliction requirements, dt requirements, Time-to-Live (TtL) for undles etc. Although we will not delve into more detils, our scheduling depends hevily on the rrivl timestmp nd on TtL. In order to enhnce ppliction service, we promote oth pckets tht hve recently rrived in the node nd pckets tht re ner their expirtion. This pproch decreses significntly witing delys nd promotes ppliction stisfction. In Fig. we depict the priority function used, where ToD (Type of Dt) is specific identifier tht denotes the pcket trffic clss nd TtL denotes the expirtion time.
5 ToD ToD ToD Fig. Scheduling priority function. 0.5 TtL TtL TtL 3 Stochstic Anlysis The purpose of this nlysis is to highlight the dvntges of our proposed model over trditionl scheduling pproches. Our model consists of primry FIFO queue (Connectivity uffer) nd secondry supportive queue (Non Connectivity uffer), which serves high-priority undles. e note tht, in the context of Spce, the queuing dely involved does not expect to contriute significntly to the totl ppliction dely, given the high propgtion dely, nd furthermore, the potentilly very high storge dely involved in typicl Spce pplictions. Therefore, priority queuing (PQ) or PQ-derived scheduling model for incoming pckets does not present conceptully tempting pproch, since it my fil with long-stored pckets. Clerly, our pproch deprts from FIFO scheme, nd therefore, clls for strightforwrd comprison with typicl FIFO scheme. However, for completeness, we extend our stochstic nlysis lso for PQ, which we consider s theoreticl upper ound (only) when connectivity is lwys present. It is pprent, from n engineer s perspective, tht our model is designed to hndle disconnectivity/disruption issues. As such, it is resonly expected to perform etter in environments with limited connectivity, especilly ginst trditionl queuing schemes, which do not include ntive mechnism to hndle intermittent connectivity. Nevertheless, to chieve firness towrds FIFO nd PQ, we use worstcse scenrio for DTQM, where connectivity is lwys ville on the system. The results shll indicte to which extent our model is le to perform stisfctorily. In such environments, where connectivity is lwys ville nd we do not exploit DTQM s full potentil, even performnce comprle to PQ nd etter thn FIFO is cceptle. e initite our nlysis y modeling network trffic. Pcket rrivl is modeled s s n exponentil process nd pcket deprture s generl distriution process. This is not, however, glolly vlid ssumption, since different types of trffic cn result in different distriutions concerning the pcket rrivl nd deprture. Nonetheless, s our knowledge on the possile DTN pplictions is limited, we ssume tht the environment nd the pplictions under investigtion mnifest ll the necessry chrcteristics of M/G/ system sed nlysis. The potentil existence of selfsimilr chrcteristics is not considered here. Furthermore, we ssume tht ll pckets hve the sme size, non-preemptive priority is enforced nd flows correspond to different trffic clsses.
6 One might rgue, from n nlyticl perspective, tht precision is rther duious when we ttempt to nlyticlly compre different queuing policies with potentilly distinct gols. However, there re severl occsions when these mechnisms re indeed equivlent nd directly comprle. For exmple, s throughput is decresing, the ehvior of these three systems converges. e egin our queuing nlysis y estimting the verge system dely for ech flow in PQ scheme. e consider single-server PQ system fed y three Poisson strems with rrivl rtes, nd 3. Ech strem cn e considered s flow of dt generted y vrious pplictions, in our cse Rel-time (RT), Telemetry (TM) nd Telecommnd (TC) pplictions. The uffers corresponding to different flows re infinite nd pckets in ech uffer re served in the order they rrive. Thus, we use three queues, one per flow, nd three priority clsses. e limit the overll system utiliztion y setting ρ i < nd ρ +ρ +ρ 3 <. This keeps the system from eing overloded nd cncels the possiility of flow strvtion. Tle, presents the nottion used throughout the present mthemticl nlysis. TABLE I. NOTATION N i Averge numer of pckets in ech queue i, Pcket rrivl rte t clss-i queue / Totl pcket rrivl rte μ i, μ Pcket service rte t clss-i queue / Totl pcket service rte ρ i, ρ System utiliztion fctor per clss-i / System utiliztion fctor R Men residul service time i Averge queuing dely of clss-i pcket T i Averge system dely of clss-i pcket X Second service moment Tht sid, we consider the i th dt pcket rrivl t the first queue of the PQ system. Since clss- pckets hve the highest priority, the i th pcket tht hs just rrived must wit in queue for men residul time R until the end of the current pcket trnsmission, plus the trnsmission time required for men numer of pckets N currently in the first queue, preceding the i th pcket. N () R + e clculte the men residul time, for M/G/ systems, y the formul ([]): R n i i X i, X i Now, ccording to Little s lw [], the verge numer of pckets witing in the system is equl to the verge dely multiplied y the verge rrivl rte of the system. e pply Little s lw to the clss- queue. As the verge queuing dely for clss- pckets is nd the verge queue occupncy is N with rrivl rte, we hve N (3) R (),(),(3), ρ ρ (4) Similrly, y enforcing non-preemptive priority queuing nd ccording to [] the verge queuing dely for clss nd clss-3 pckets is ccordingly: ()
7 3 R ρ )( ρ ρ ) ( R ρ ρ )( ρ ρ ρ ) ( 3 (5) (6) Finlly, y dding the service time /μ of the i th pcket in the equtions (4), (5) nd (6), we cn clculte the verge system dely for clss-k pckets: T k k + Next, we estimte the verge dely for ech flow in FIFO scheme. In this scheduling scheme, ech flow hs the sme verge queuing dely, which depends on the verge numer of pckets in queue N, nd the men residul time, R. According to [] the verge system dely in FIFO scheme is: T + T ( ρ) FIFO FIFO However, in order to gurntee tht the service distriution of the FIFO queue corresponds to n ppropritely weighted sum of the service distriutions for the different clsses in the priority queue scheme, we set: T NFIFO 3T R FIFO e continue our nlysis y estimting the verge dely for ech flow in DTQM scheme. e divide the nlysis in two prts. Since DTQM uses two outgoing queues (plus the permnent storge see Fig. ) one for connectivity nd the other for non-connectivity dt, we cn sfely ssume tht the first one emultes FIFO queue while the second one pproches the ehvior of PQ scheme. The ltter ssumption holds since the prioritiztion function tht we pply (see Fig. ), requires pcket sorting. Tht sid, the first queue nlysis in terms of verge system dely is directly comprle with FIFO scheme, while the second queue clls for PQ-sed nlysis. In order to firly evlute our proposed scheme, we omit permnent storge from the nlysis. This llows the three systems to present similr properties nd hence e comprle. e consider n verge system rrivl rte equl to the other systems nd set rrivl rtes, without loss of generlity, for the two queues 0.4 nd 0.6. The selection of coefficients 0.4 nd 0.6 s the preferred vlues for our stochstic nlysis ws sed on some initil empiricl clcultions nd will e clirted further ccording to emultion results. Finlly, the totl verge system service rte will e μ where μ 0.4μ nd μ 0.6μ for first nd second queues, respectively. To strt off, the verge queuing dely for the first queue does not differentite per flow nd cn e clculted sed on the verge numer of pckets in queue- nd the men residul time, using eqution () nd replcing,, μ nd μ with,, μ nd μ respectively. (7) (8) (9)
8 N (0) R CON + By pplying Little s lw for queue- we get: N () CON From equtions (0) nd () we get: CON R 0.4, where ρ ρ ρ The verge system dely for ll the flows in queue- is: T CON CON + () (3) e now pproximte the ehvior of the second queue s follows. The queue cn split into three su-queues or suclsses. Ech clss will e served using PQ-sed scheme. Furthermore, the proportion of pckets for ech clss on the totl ville cpcity of the queue- uffer is / for clss- pckets, / for clss- pckets nd 3 / for clss-3 pckets. Therefore, the verge queuing dely for clss- pckets is: N + NONCON By pplying Little's lw [], we otin: N N NONCON 0. 6 NONCON From equtions (4) nd (5) we get: R, where ρ NONCON ρ R ρ 0.6 The verge queuing dely for the second suclss depends on N pckets, which re uffered in the first suclss, plus N pckets, which re uffered in the second suclss, plus the residul time R. In our cse, unlike the ordinry properties of PQ, our design ssumptions do not permit the possiility of higher priority pckets to rerrnge the queue t ny given stge. Therefore, we hve: N N R NONCON NONCON NONCON N N NONCON 0. 6 NONCON From equtions (7) nd (8) we otin: N (4) (5) (6) (7) (8)
9 NONCON NONCON ρ By the sme token, verge queuing dely for third suclss is: 3NONCON NONCON ρ 3 Finlly, system's verge dely for ech suclss is: T k NONCON k NONCON + (9) (0) () Hving clculted the verge delys for the two queues seprtely, we will comine these vlues to cquire the totl dely. A sttisticlly cceptle method for doing this is y using weights. Considering the wy tht we hve defined the prolem, it is logicl to expect tht ech queue will contriute with different percentge to the overll system dely. Hence, we will consider tht queue- nd queue- will contriute to the totl verge system dely y 40% nd 60%, respectively. Considering the vlues of nd μ in ech queue, we hve. T 0.4T T DTQM CON T 0.4T NONCON DTQM CON T T 0.4T T DTQM CON 3NONCON,, NONCON As for the numericl results presented elow, the vlue of system service rte is constnt t 0 pckets/sec, wheres the vlues of vry in order to otin the possile rnge of system utiliztion, 0% - 90%. Τhe vlue of service rte, considering pcket sizes in the order of KB, provides n cceptle rte of dt trnsmission, especilly in spce environments nd mong low energy sensors. () Fig 3. Numericl results The numericl results of our nlysis re presented in Fig. 3. e compre the forementioned queuing schemes sed on the verge dely for ech queue in ech system nd the verge queue occupncy. The results show tht our pproch
10 chieves performnce clerly etter thn FIFO nd in some cses etter thn PQ, especilly when the system utiliztion fctor is high. 4 Experimentl Evlution Evluting such queue mngement policy requires extensive experiments using n ctul spce network, since DTQM ffects oth lower-level (ttery lifespn) nd higher-level (throughput, ltency) performnce metrics. e implement nd evlute our proposed solution using the ns- softwre simultor [3]. This implementtion ws not trivil nd required significnt time considering the fct tht ns- does not support DTN. In this work, we focus on the second nd third components of DTQM, nmely the Buffer nd Storge Mngement nd Scheduling prts, leving the rest of the rchitecture evlution s future work. e pply DTQM to the network topology of Fig. 4. e ssume three sending nodes, S, S, S 3, which re locted in spce nd send trffic generted y vrious pplictions (Rel-time, Telemetry nd Telecommnd; ll constnt it rte with different sending intervls) nd receiving node R, which is locted on erth. All trffic generted y the sending nodes is routed through the routing node Q in which we deploy DTQM. Fig 4. Simultion topology Since we ssumed tht the sending nodes re locted in spce, the connectivity of the wireless links should e intermittent. In order to emulte DTN environment where connectivity is not predetermined, thnks to lterntive routes nd connections, we select rndom disconnectivity pttern with uniformly distriuted connectivity disruptions spred cross the entire durtion of the experiment, s the most pproprite for evluting the proposed rchitecture. In this context, link S -Q is uniformly unville in totl % of the time of the experiment. Similrly link S -Q is 5% unville, link S 3 -Q is 0% unville, nd finlly, link Q-R is 0.5% unville. e set the totl time of the experiments to one hour, nd mesure the totl numer of received pckets for ll three sending nodes, s well s the Appliction Stisfction Index (ASI) [4] of the network, metric tht highlights the contriution of the queuing dely to the totl dely. In order to dd reliility to our results nd enforce rndomness to tke effect we repet the experiment severl times. In prticulr, the performnce of DTQM ws evluted in five connectivity scenrios, ech one utilizing different (rndomly generted) connectivity schedule. e compre the otined results with the corresponding results of FIFO policy. In line with the priority function used (see Fig. ) we ssign ToD for ech ppliction s follows: for the RT ppliction, for the TM ppliction nd 3 for the TC ppliction.
11 Furthermore, we set the pcket intervls for ech ppliction s we would expect in rel-life, tht is, Rel-Time pckets re generted with the shortest intervl nd Telecommnd pckets re generted with the longest intervl; hence the difference in pcket numers. In Fig. 5 elow, we present the results from the comprison of DTQM ginst Droptil, using ASI nd verge dely s our performnce metrics. The first oservtion tht we cn mke is tht DTQM outperforms Droptil in ny cse. In prticulr, we experience 60% dely decrese on verge nd in some cses it cn rech up to 90% reduction of the corresponding undle dely using typicl FIFO scheme. This dely decrese is lso reflected on the system ASI, which is incresed 0%, on verge. Fig 5. Experimentl results TABLE II. EXPERIMENTAL RESULTS Received pckets Averge Dely System ASI Best Cse orst Cse RT TM TC RT TM TC FIFO DTQM FIFO DTQM FIFO DTQM Tle demonstrtes in detil the est nd worst cse results for DTQM. By viewing Tle, we notice tht the received pckets re lmost the sme in ny cse (with the exception of the TM pckets of the worst cse experiment) regrdless of queuing policy. Nevertheless, we my experience up to 40% increse in received Telemetry nd Telecommnd pckets when DTQM is deployed, since we ssign them with higher ToD. Moreover, the most interesting oservtion is the undoutle improvement of the verge dely regrdless of the ppliction. However, since we trnsfer the sme numer of pckets in oth cses, how cn we justify the dely decrese? DTQM uses sophisticted scheduling lgorithm tht ssigns higher priority to the pckets most recently rrived in the node nd promotes them in the queue (see Fig. ). Thus, pckets re reordered in the uffer sed on the time they entered the routing node. Clssic scheduling uses rigid FIFO pproch, which lthough it seems to promote firness, in fct it increses the communiction time, with the risk of dropping pcket due to TtL expirtion.
12 5 Conclusions In this pper we proposed novel rchitecture for queue mngement in DTN nodes. Although the ville spce confines us from presenting more detiled version nd evlution of our model, we sketched severl of its chrcteristics. One of the most interesting results ws initilly introduced y the stochstic nlysis, which yielded positive results for the opertion of our model tht exhiits ehvior fr superior to FIFO nd comprle to PQ, even in network conditions tht re unfvorle for our scheme. e lso otined supportive results from the conducted experiments tht llevite worries from dopting numerous ssumptions on the stochstic nlysis section. Therefore we cn sfely clim tht DTQM hs the potentil to chieve smller queuing delys nd higher ppliction stisfction when connectivity is scrce. Our next step is to enhnce our evlution towrds two directions: i) to present more detiled nlysis, which incorportes totl cpcity nd storge cpcity s well, in order to highlight one mjor property of DTN nd ii) to extend the experiments y using the spce-oriented tested [5] tht we hve developed in our l. Acknowledgments. The reserch leding to these results hs received funding from the Europen Community's Seventh Frmework Progrmme ([FP7/007-03_FP7- REGPOT-00-, SP4 Cpcities, Coordintion nd Support Actions) under grnt greement n 646 (project title: Spce Internetworking Center-SPICE) References. Fll, K.: A dely-tolernt network rchitecture for chllenged internets. ACM SIGCOMM 003, Krlsruhe, Germny, 5-9 August (003).. Cerf, V., Burleigh, S., Hooke, A., Torgerson, L., Durst, R., Scott, K., Fll, K., eiss, H.: Dely Tolernt Networking Architecture. RFC 4838, April (007). 3. Dimitriou, S., Tsoussidis, V.: Effective Buffer nd Storge Mngement in DTN Nodes. E-DTN 009, St. Petersurg, Russi, 4 Octoer (009). 4. Scott, K., Burleigh, S.: Bundle protocol specifiction. RFC 5050, Novemer (007). 5. Clss-sed eighted Fir Queuing, Cisco IOS Softwre Releses.0 T. 6. Low Ltency Queuing, Cisco IOS Softwre Releses.0 T. 7. Lindgren A. nd Phnse K. S.: Evlution of queuing policies nd forwrding strtegies for routing in intermittently connected networks. Proc. of IEEE COMSARE, Jnury Krif, A., Brkt, C., Spyropoulos, T.: Optiml uffer mngement policies for dely tolernt networks. IEEE SECON 008, Sn Frncisco, Cliforni, June 6-0 (008). 9. Jet Propulsion Lortory: ION: Interplnetry Overly Network The Dely-Tolernt Networking Reserch Group (DTNRG): Bertseks, D. P., Gllger, R.: Dt Networks. Prentice Hll (99).. Little, J. D. C.: A Proof of the Queueing Formul L. Opertions Reserch, 9, (96). 3. Network Simultor, (997). 4. Mmts, L, Tsoussidis, V: Differentiting services with Non-Congestive Queuing (NCQ). IEEE Trnsctions on Computers, 58(5): (009). 5. Smrs, C. V., Komnios, I., Dimntopoulos, S., Koutsoginnis, E., Tsoussidis, V., Ppstergiou, G., Pecci, N.: Extending Internet Into Spce - ESA DTN Tested Implementtion nd Evlution. Moilight 0, Athens, Greece, 8-0 My (009).
Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming
Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting
More information2 Computing all Intersections of a Set of Segments Line Segment Intersection
15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design
More informationPresentation Martin Randers
Presenttion Mrtin Rnders Outline Introduction Algorithms Implementtion nd experiments Memory consumption Summry Introduction Introduction Evolution of species cn e modelled in trees Trees consist of nodes
More informationP(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have
Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using
More informationMobile IP route optimization method for a carrier-scale IP network
Moile IP route optimiztion method for crrier-scle IP network Tkeshi Ihr, Hiroyuki Ohnishi, nd Ysushi Tkgi NTT Network Service Systems Lortories 3-9-11 Midori-cho, Musshino-shi, Tokyo 180-8585, Jpn Phone:
More informationFig.25: the Role of LEX
The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing
More informationSlides for Data Mining by I. H. Witten and E. Frank
Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully
More informationEECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining
EECS150 - Digitl Design Lecture 23 - High-level Design nd Optimiztion 3, Prllelism nd Pipelining Nov 12, 2002 John Wwrzynek Fll 2002 EECS150 - Lec23-HL3 Pge 1 Prllelism Prllelism is the ct of doing more
More informationA Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards
A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin
More informationBefore We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):
Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters
More informationOverview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases
Overview Mobile computing nd dtbses Generl issues in mobile dt mngement Dt dissemintion Dt consistency Loction dependent queries Interfces Detils of brodcst disks thlis klfigopoulos Network rchitecture
More informationCOMP 423 lecture 11 Jan. 28, 2008
COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring
More informationFrom Dependencies to Evaluation Strategies
From Dependencies to Evlution Strtegies Possile strtegies: 1 let the user define the evlution order 2 utomtic strtegy sed on the dependencies: use locl dependencies to determine which ttriutes to compute
More informationUT1553B BCRT True Dual-port Memory Interface
UTMC APPICATION NOTE UT553B BCRT True Dul-port Memory Interfce INTRODUCTION The UTMC UT553B BCRT is monolithic CMOS integrted circuit tht provides comprehensive MI-STD- 553B Bus Controller nd Remote Terminl
More informationComplete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li
2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min
More informationPerformance analysis of QoS mechanisms in IP networks
University of Wollongong Reserch Online Fculty of Informtics - Ppers (Archive) Fculty of Engineering nd Informtion Sciences 2000 Performnce nlysis of QoS mechnisms in IP networks D. Ji University of Wollongong
More informationThe Greedy Method. The Greedy Method
Lists nd Itertors /8/26 Presenttion for use with the textook, Algorithm Design nd Applictions, y M. T. Goodrich nd R. Tmssi, Wiley, 25 The Greedy Method The Greedy Method The greedy method is generl lgorithm
More information10.5 Graphing Quadratic Functions
0.5 Grphing Qudrtic Functions Now tht we cn solve qudrtic equtions, we wnt to lern how to grph the function ssocited with the qudrtic eqution. We cll this the qudrtic function. Grphs of Qudrtic Functions
More informationLETKF compared to 4DVAR for assimilation of surface pressure observations in IFS
LETKF compred to 4DVAR for ssimiltion of surfce pressure oservtions in IFS Pu Escrià, Mssimo Bonvit, Mts Hmrud, Lrs Isksen nd Pul Poli Interntionl Conference on Ensemle Methods in Geophysicl Sciences Toulouse,
More informationParallel Square and Cube Computations
Prllel Squre nd Cube Computtions Albert A. Liddicot nd Michel J. Flynn Computer Systems Lbortory, Deprtment of Electricl Engineering Stnford University Gtes Building 5 Serr Mll, Stnford, CA 945, USA liddicot@stnford.edu
More information1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)
Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric
More informationLECT-10, S-1 FP2P08, Javed I.
A Course on Foundtions of Peer-to-Peer Systems & Applictions LECT-10, S-1 CS /799 Foundtion of Peer-to-Peer Applictions & Systems Kent Stte University Dept. of Computer Science www.cs.kent.edu/~jved/clss-p2p08
More informationToday. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search.
CS 88: Artificil Intelligence Fll 00 Lecture : A* Serch 9//00 A* Serch rph Serch Tody Heuristic Design Dn Klein UC Berkeley Multiple slides from Sturt Russell or Andrew Moore Recp: Serch Exmple: Pncke
More informationMTH 146 Conics Supplement
105- Review of Conics MTH 146 Conics Supplement In this section we review conics If ou ne more detils thn re present in the notes, r through section 105 of the ook Definition: A prol is the set of points
More informationEngineer To Engineer Note
Engineer To Engineer Note EE-169 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit
More informationA Priority-based Distributed Call Admission Protocol for Multi-hop Wireless Ad hoc Networks
A Priority-bsed Distributed Cll Admission Protocol for Multi-hop Wireless Ad hoc Networks un Sun Elizbeth M. Belding-Royer Deprtment of Computer Science University of Cliforni, Snt Brbr suny, ebelding
More informationDefinition of Regular Expression
Definition of Regulr Expression After the definition of the string nd lnguges, we re redy to descrie regulr expressions, the nottion we shll use to define the clss of lnguges known s regulr sets. Recll
More informationExam #1 for Computer Simulation Spring 2005
Exm # for Computer Simultion Spring 005 >>> SOLUTION
More informationRethinking Virtual Network Embedding: Substrate Support for Path Splitting and Migration
Rethinking Virtul Network Emedding: Sustrte Support for Pth Splitting nd Migrtion Minln Yu, Yung Yi, Jennifer Rexford, Mung Ching Computer Science, Princeton University, Emil: {minlnyu,jrex}@cs.princeton.edu
More informationIn the last lecture, we discussed how valid tokens may be specified by regular expressions.
LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.
More informationPerformance enhancement of IEEE DCF using novel backoff algorithm
Kuo et l. EURASIP Journl on Wireless Communictions nd Networking 212, 212:274 http://jis.eursipjournls.com/content/212/1/274 RESEARCH Open Access Performnce enhncement of IEEE 82.11 using novel ckoff lgorithm
More informationDistributed Systems Principles and Paradigms
Distriuted Systems Principles nd Prdigms Chpter 11 (version April 7, 2008) Mrten vn Steen Vrije Universiteit Amsterdm, Fculty of Science Dept. Mthemtics nd Computer Science Room R4.20. Tel: (020) 598 7784
More informationDetermining Single Connectivity in Directed Graphs
Determining Single Connectivity in Directed Grphs Adm L. Buchsbum 1 Mrtin C. Crlisle 2 Reserch Report CS-TR-390-92 September 1992 Abstrct In this pper, we consider the problem of determining whether or
More informationMA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork
MA1008 Clculus nd Liner Algebr for Engineers Course Notes for Section B Stephen Wills Deprtment of Mthemtics University College Cork s.wills@ucc.ie http://euclid.ucc.ie/pges/stff/wills/teching/m1008/ma1008.html
More informationOn Computation and Resource Management in Networked Embedded Systems
On Computtion nd Resource Mngement in Networed Embedded Systems Soheil Ghisi Krlene Nguyen Elheh Bozorgzdeh Mjid Srrfzdeh Computer Science Deprtment University of Cliforni, Los Angeles, CA 90095 soheil,
More informationIf you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.
Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online
More informationarxiv: v1 [cs.db] 16 Sep 2016
Blech: A Distriuted Strem Dt Clening System Yongcho Tin Eurecom yongcho.tin@eurecom.fr Pietro Michirdi Eurecom pietro.michirdi@eurecom.fr Mrko Vukolić IBM Reserch - Zurich mvu@zurich.im.com rxiv:169.5113v1
More informationF. R. K. Chung y. University ofpennsylvania. Philadelphia, Pennsylvania R. L. Graham. AT&T Labs - Research. March 2,1997.
Forced convex n-gons in the plne F. R. K. Chung y University ofpennsylvni Phildelphi, Pennsylvni 19104 R. L. Grhm AT&T Ls - Reserch Murry Hill, New Jersey 07974 Mrch 2,1997 Astrct In seminl pper from 1935,
More informationCS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis
CS143 Hndout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexicl Anlysis In this first written ssignment, you'll get the chnce to ply round with the vrious constructions tht come up when doing lexicl
More informationDr. D.M. Akbar Hussain
Dr. D.M. Akr Hussin Lexicl Anlysis. Bsic Ide: Red the source code nd generte tokens, it is similr wht humns will do to red in; just tking on the input nd reking it down in pieces. Ech token is sequence
More informationAn evolutionary approach to inter-session network coding
An evolutionry pproch to inter-session network coding The MIT Fculty hs mde this rticle openly ville. Plese shre how this ccess enefits you. Your story mtters. Cittion As Pulished Pulisher Kim, M. et l.
More informationCS321 Languages and Compiler Design I. Winter 2012 Lecture 5
CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,
More informationGraphs with at most two trees in a forest building process
Grphs with t most two trees in forest uilding process rxiv:802.0533v [mth.co] 4 Fe 208 Steve Butler Mis Hmnk Mrie Hrdt Astrct Given grph, we cn form spnning forest y first sorting the edges in some order,
More informationBleach: A Distributed Stream Data Cleaning System
Blech: A Distriuted Strem Dt Clening System Yongcho Tin Eurecom Biot, Frnce Emil: yongcho.tin@eurecom.fr Pietro Michirdi Eurecom Biot, Frnce Emil: pietro.michirdi@eurecom.fr Mrko Vukolić IBM Reserch Zurich,
More informationWhat are suffix trees?
Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl
More informationToday. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search
Uninformed Serch [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.] Tody Serch Problems Uninformed Serch Methods
More informationZZ - Advanced Math Review 2017
ZZ - Advnced Mth Review Mtrix Multipliction Given! nd! find the sum of the elements of the product BA First, rewrite the mtrices in the correct order to multiply The product is BA hs order x since B is
More informationA dynamic multicast tree based routing scheme without replication in delay tolerant networks
Accepted Mnuscript A dynmic multicst tree bsed routing scheme without repliction in dely tolernt networks Yunsheng Wng, Jie Wu PII: S0-()00- DOI: 0.0/j.jpdc.0..00 Reference: YJPDC To pper in: J. Prllel
More informationA Study of Quality of Service Resource Allocation Schemes for Mobile Health
RESEARCH ARTICLE A Study of Qulity of Service Resource Alloction Schemes for Moile Helth Idris Krim nd Tr Ali Yhiy* Deprtment of Computer Science nd Engineering, University of Kurdistn Hewler, Kurdistn
More informationOn Achieving Optimal Throughput with Network Coding
In IEEE INFOCOM On Achieving Optiml Throughput with Network Coding Zongpeng Li, Bochun Li, Dn Jing, Lp Chi Lu Astrct With the constrints of network topologies nd link cpcities, chieving the optiml end-to-end
More informationAnnouncements. CS 188: Artificial Intelligence Fall Recap: Search. Today. General Tree Search. Uniform Cost. Lecture 3: A* Search 9/4/2007
CS 88: Artificil Intelligence Fll 2007 Lecture : A* Serch 9/4/2007 Dn Klein UC Berkeley Mny slides over the course dpted from either Sturt Russell or Andrew Moore Announcements Sections: New section 06:
More information6.3 Volumes. Just as area is always positive, so is volume and our attitudes towards finding it.
6.3 Volumes Just s re is lwys positive, so is volume nd our ttitudes towrds finding it. Let s review how to find the volume of regulr geometric prism, tht is, 3-dimensionl oject with two regulr fces seprted
More informationEngineer-to-Engineer Note
Engineer-to-Engineer Note EE-295 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil
More informationSolving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016
Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence Winter 2016 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl
More informationUnit #9 : Definite Integral Properties, Fundamental Theorem of Calculus
Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl
More informationImproper Integrals. October 4, 2017
Improper Integrls October 4, 7 Introduction We hve seen how to clculte definite integrl when the it is rel number. However, there re times when we re interested to compute the integrl sy for emple 3. Here
More informationComputer-Aided Multiscale Modelling for Chemical Process Engineering
17 th Europen Symposium on Computer Aided Process Engineesing ESCAPE17 V. Plesu nd P.S. Agchi (Editors) 2007 Elsevier B.V. All rights reserved. 1 Computer-Aided Multiscle Modelling for Chemicl Process
More informationPointwise convergence need not behave well with respect to standard properties such as continuity.
Chpter 3 Uniform Convergence Lecture 9 Sequences of functions re of gret importnce in mny res of pure nd pplied mthemtics, nd their properties cn often be studied in the context of metric spces, s in Exmples
More informationAccelerating 3D convolution using streaming architectures on FPGAs
Accelerting 3D convolution using streming rchitectures on FPGAs Hohun Fu, Robert G. Clpp, Oskr Mencer, nd Oliver Pell ABSTRACT We investigte FPGA rchitectures for ccelerting pplictions whose dominnt cost
More informationMidterm 2 Sample solution
Nme: Instructions Midterm 2 Smple solution CMSC 430 Introduction to Compilers Fll 2012 November 28, 2012 This exm contins 9 pges, including this one. Mke sure you hve ll the pges. Write your nme on the
More informationEfficient Algorithms For Optimizing Policy-Constrained Routing
Efficient Algorithms For Optimizing Policy-Constrined Routing Andrew R. Curtis curtis@cs.colostte.edu Ross M. McConnell rmm@cs.colostte.edu Dn Mssey mssey@cs.colostte.edu Astrct Routing policies ply n
More informationDIFFERENT POLICY OBJECTIVES OF THE ROAD AUTHORITY IN THE OPTIMAL TOLL DESIGN PROBLEM
DIFFERENT POLICY OBJECTIVES OF THE ROAD AUTHORITY IN THE OPTIMAL TOLL DESIGN PROBLEM Dusic Joksimovic*, Michiel Bliemer Delft University of Technology, The Netherlnds ARS Trnsport &Technology, The Netherlnds
More informationEngineer To Engineer Note
Engineer To Engineer Note EE-186 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit
More informationM-Historian and M-Trend
Product Bulletin Issue Dte June 18, 2004 M-Historin nd The M-Historin mnges the collection nd rchiving of trend dt, nd enles the presenttion of rchived trend dt in the ssocited softwre component. M-Historin
More informationAnnouncements. CS 188: Artificial Intelligence Fall Recap: Search. Today. Example: Pancake Problem. Example: Pancake Problem
Announcements Project : erch It s live! Due 9/. trt erly nd sk questions. It s longer thn most! Need prtner? Come up fter clss or try Pizz ections: cn go to ny, ut hve priority in your own C 88: Artificil
More informationSPLIT PLOT AND STRIP PLOT DESIGNS
1. Split Plot Design SPLIT PLOT AND STRIP PLOT DESIGNS D.K. SEHGAL Indin Agriculturl Sttistics Reserch Institute Lirry Avenue, New Delhi-110 01 dksehgl@isri.res.in 1.1 Introduction In conducting experiments,
More informationPARALLEL AND DISTRIBUTED COMPUTING
PARALLEL AND DISTRIBUTED COMPUTING 2009/2010 1 st Semester Teste Jnury 9, 2010 Durtion: 2h00 - No extr mteril llowed. This includes notes, scrtch pper, clcultor, etc. - Give your nswers in the ville spce
More informationSimrad ES80. Software Release Note Introduction
Simrd ES80 Softwre Relese 1.3.0 Introduction This document descries the chnges introduced with the new softwre version. Product: ES80 Softwre version: 1.3.0 This softwre controls ll functionlity in the
More informationNetwork Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved
Network Interconnection: Bridging CS 57 Fll 6 6 Kenneth L. Clvert All rights reserved The Prolem We know how to uild (rodcst) LANs Wnt to connect severl LANs together to overcome scling limits Recll: speed
More informationChapter 2 Sensitivity Analysis: Differential Calculus of Models
Chpter 2 Sensitivity Anlysis: Differentil Clculus of Models Abstrct Models in remote sensing nd in science nd engineering, in generl re, essentilly, functions of discrete model input prmeters, nd/or functionls
More informationMATH 25 CLASS 5 NOTES, SEP
MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid
More information12-B FRACTIONS AND DECIMALS
-B Frctions nd Decimls. () If ll four integers were negtive, their product would be positive, nd so could not equl one of them. If ll four integers were positive, their product would be much greter thn
More informationLecture 7: Integration Techniques
Lecture 7: Integrtion Techniques Antiderivtives nd Indefinite Integrls. In differentil clculus, we were interested in the derivtive of given rel-vlued function, whether it ws lgeric, eponentil or logrithmic.
More informationComputer Networks 53 (2009) Contents lists available at ScienceDirect. Computer Networks. journal homepage:
Computer Networks 53 (29) 252 2516 Contents lists ville t ScienceDirect Computer Networks journl homepge: www.elsevier.com/locte/comnet Congestion-wre chnnel ssignment for multi-chnnel wireless mesh networks
More informationSpectral Analysis of MCDF Operations in Image Processing
Spectrl Anlysis of MCDF Opertions in Imge Processing ZHIQIANG MA 1,2 WANWU GUO 3 1 School of Computer Science, Northest Norml University Chngchun, Jilin, Chin 2 Deprtment of Computer Science, JilinUniversity
More informationA New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method
A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,
More informationOn network coding and routing in dynamic wireless multicast networks
On network coding nd routing in dynmic wireless multicst networks Trcey Ho, Ji-Qi Jin Cliforni Institute of Technology Psden, CA Emil: {tho, jin}@cltechedu Hrish Viswnthn Lucent Technologies, Bell Ls Murry
More informationFastRoute: A Step to Integrate Global Routing into Placement
FstRoute: A Step to Integrte Glol Routing into Plcement Min Pn nd Chris Chu Deprtment of Electricl nd Computer Engineering Iow Stte University, Ames, IA 00 Emil: {pnmin, cnchu}@istte.edu ABSTRACT Becuse
More informationEfficient Rerouting Algorithms for Congestion Mitigation
2009 IEEE Computer Society Annul Symposium on VLSI Efficient Rerouting Algorithms for Congestion Mitigtion M. A. R. Chudhry*, Z. Asd, A. Sprintson, nd J. Hu Deprtment of Electricl nd Computer Engineering
More informationUNIT 11. Query Optimization
UNIT Query Optimiztion Contents Introduction to Query Optimiztion 2 The Optimiztion Process: An Overview 3 Optimiztion in System R 4 Optimiztion in INGRES 5 Implementing the Join Opertors Wei-Png Yng,
More informationA Heuristic Approach for Discovering Reference Models by Mining Process Model Variants
A Heuristic Approch for Discovering Reference Models by Mining Process Model Vrints Chen Li 1, Mnfred Reichert 2, nd Andres Wombcher 3 1 Informtion System Group, University of Twente, The Netherlnds lic@cs.utwente.nl
More informationDigital Signal Processing: A Hardware-Based Approach
Digitl Signl Processing: A Hrdwre-Bsed Approch Roert Esposito Electricl nd Computer Engineering Temple University troduction Teching Digitl Signl Processing (DSP) hs included the utilition of simultion
More informationA Transportation Problem Analysed by a New Ranking Method
(IJIRSE) Interntionl Journl of Innovtive Reserch in Science & Engineering ISSN (Online) 7-07 A Trnsporttion Problem Anlysed by New Rnking Method Dr. A. Shy Sudh P. Chinthiy Associte Professor PG Scholr
More information2PC AGENT METHOD: ACHIEVING SERIALIZABILITY IN PRESENCE OF FAILURES IN A HETEROGENEOUS MULTIDATABASE
2PC AGENT METHOD: ACHIEVING SERIALIZABILITY IN PRESENCE OF FAILURES IN A HETEROGENEOUS MULTIDATABASE Antoni Wolski nd Jri Veijlinen Technicl Reserch Centre of Finlnd Lortory for Informtion Processing Lehtisrentie
More informationEvolutionary Approaches To Minimizing Network Coding Resources
This full text pper ws peer reviewed t the direction of IEEE Communictions Society suject mtter experts for puliction in the IEEE INFOCOM 2007 proceedings. Evolutionry Approches To Minimizing Network Coding
More informationSUPPLEMENTARY INFORMATION
Supplementry Figure y (m) x (m) prllel perpendiculr Distnce (m) Bird Stndrd devition for distnce (m) c 6 prllel perpendiculr 4 doi:.8/nture99 SUPPLEMENTARY FIGURE Confirmtion tht movement within the flock
More informationsuch that the S i cover S, or equivalently S
MATH 55 Triple Integrls Fll 16 1. Definition Given solid in spce, prtition of consists of finite set of solis = { 1,, n } such tht the i cover, or equivlently n i. Furthermore, for ech i, intersects i
More informationCS311H: Discrete Mathematics. Graph Theory IV. A Non-planar Graph. Regions of a Planar Graph. Euler s Formula. Instructor: Işıl Dillig
CS311H: Discrete Mthemtics Grph Theory IV Instructor: Işıl Dillig Instructor: Işıl Dillig, CS311H: Discrete Mthemtics Grph Theory IV 1/25 A Non-plnr Grph Regions of Plnr Grph The plnr representtion of
More informationEfficient Regular Expression Grouping Algorithm Based on Label Propagation Xi Chena, Shuqiao Chenb and Ming Maoc
4th Ntionl Conference on Electricl, Electronics nd Computer Engineering (NCEECE 2015) Efficient Regulr Expression Grouping Algorithm Bsed on Lbel Propgtion Xi Chen, Shuqio Chenb nd Ming Moc Ntionl Digitl
More informationCSCI 3130: Formal Languages and Automata Theory Lecture 12 The Chinese University of Hong Kong, Fall 2011
CSCI 3130: Forml Lnguges nd utomt Theory Lecture 12 The Chinese University of Hong Kong, Fll 2011 ndrej Bogdnov In progrmming lnguges, uilding prse trees is significnt tsk ecuse prse trees tell us the
More informationLooking up objects in Pastry
Review: Pstry routing tbles 0 1 2 3 4 7 8 9 b c d e f 0 1 2 3 4 7 8 9 b c d e f 0 1 2 3 4 7 8 9 b c d e f 0 2 3 4 7 8 9 b c d e f Row0 Row 1 Row 2 Row 3 Routing tble of node with ID i =1fc s - For ech
More informationThe gamuts of input and output colour imaging media
In Proceedings of IS&T/SPIE Electronic Imging 1 The gmuts of input nd output colour imging medi án Morovic,* Pei Li Sun* nd Peter Morovic * Colour & Imging Institute, University of Dery, UK School of Informtion
More informationpdfapilot Server 2 Manual
pdfpilot Server 2 Mnul 2011 by clls softwre gmbh Schönhuser Allee 6/7 D 10119 Berlin Germny info@cllssoftwre.com www.cllssoftwre.com Mnul clls pdfpilot Server 2 Pge 2 clls pdfpilot Server 2 Mnul Lst modified:
More information9 Graph Cutting Procedures
9 Grph Cutting Procedures Lst clss we begn looking t how to embed rbitrry metrics into distributions of trees, nd proved the following theorem due to Brtl (1996): Theorem 9.1 (Brtl (1996)) Given metric
More informationCSCI 104. Rafael Ferreira da Silva. Slides adapted from: Mark Redekopp and David Kempe
CSCI 0 fel Ferreir d Silv rfsilv@isi.edu Slides dpted from: Mrk edekopp nd Dvid Kempe LOG STUCTUED MEGE TEES Series Summtion eview Let n = + + + + k $ = #%& #. Wht is n? n = k+ - Wht is log () + log ()
More informationUnit 5 Vocabulary. A function is a special relationship where each input has a single output.
MODULE 3 Terms Definition Picture/Exmple/Nottion 1 Function Nottion Function nottion is n efficient nd effective wy to write functions of ll types. This nottion llows you to identify the input vlue with
More informationI/O Efficient Dynamic Data Structures for Longest Prefix Queries
I/O Efficient Dynmic Dt Structures for Longest Prefix Queries Moshe Hershcovitch 1 nd Him Kpln 2 1 Fculty of Electricl Engineering, moshik1@gmil.com 2 School of Computer Science, himk@cs.tu.c.il, Tel Aviv
More informationOutline. Introduction Suffix Trees (ST) Building STs in linear time: Ukkonen s algorithm Applications of ST
Suffi Trees Outline Introduction Suffi Trees (ST) Building STs in liner time: Ukkonen s lgorithm Applictions of ST 2 3 Introduction Sustrings String is ny sequence of chrcters. Sustring of string S is
More informationStack. A list whose end points are pointed by top and bottom
4. Stck Stck A list whose end points re pointed by top nd bottom Insertion nd deletion tke plce t the top (cf: Wht is the difference between Stck nd Arry?) Bottom is constnt, but top grows nd shrinks!
More information4452 Mathematical Modeling Lecture 4: Lagrange Multipliers
Mth Modeling Lecture 4: Lgrnge Multipliers Pge 4452 Mthemticl Modeling Lecture 4: Lgrnge Multipliers Lgrnge multipliers re high powered mthemticl technique to find the mximum nd minimum of multidimensionl
More information