Ravine Streams: Persistent Data Streams in Disruptive Sensor Networks

Size: px
Start display at page:

Download "Ravine Streams: Persistent Data Streams in Disruptive Sensor Networks"

Transcription

1 Ravine Streas: Persistent Data Streas in Disruptive Sensor Networks Mingsen Xu, Wen-Zhan Song Departent of Coputer Science, Georgia State University Atlanta, Georgia 333, USA Eail: Abstract Opportunistic network coding has been developed and applied in disruptive networks to provide optial data delivery. Though network coding syste utilizes coding opportunities aong ultiple paths, its application in data collection suffers fro a disconnected sink node and the liited storage space available for data cache. The state-of-the-art approach has studied preserving data persistence as an optiization proble under storage and energy constraints, without considering disruptive network dynaics during data redistribution. In this paper, we propose Ravine Streas () to axiize data preservation under the constraints of liited storage and probabilistic node failure throughout data redistribution. Our approach leverages adaptive power control to achieve ensured storage of each redistribution data. Meanwhile, in the course of data redistribution, distributed coding-based rebroadcast strategy not only reduces the data duplication, but also iproves the statistical property of sybol randoness. We show that the perforance of preserving data persistence of proposed is approxiately bounded by the optial solutions. The experiental evaluations deonstrate that increases data delivery ratio, consues even less counication energy with only coparable storage cost, when copared with existing data preserving algoriths. Index Ters Persistent Data Collection, Network Erasure Coding, Transission Power Control, Disruptive Sensor Network I. INTRODUCTION In a large-scale sensor network deployent, one of ajor reasons contributing to interittent connections and disruptive counication is sensor nodes failure. Note that the reasons for node failure have a quite broad range, which can be either power depletion, unable to route packet to destination or overflowed receiving and transitting buffer. Each node failure influences the data collection flow routed through it. In the worst case, sink node failure ipairs the entire network traffic. To preserve data persistence, data strea has to be rerouted to other paths or redistributed to other storage nodes if none active routes are found. Existing algoriths fro the literature studied this data preserving as an network flow optiization proble, like [] axiizes the iniu residue energy in the network for the next data redistribution to arise; [2] cobines iniizing data redistribution and retrieval cost into a single proble. Though optial solutions are devised under either energy or storage space constraints, ost of the previous works ignore the fact that node failures could happen in the course of data rerouting or redistribution. The deterined approach is not capable of scheduling data redistribution without the global knowledge of which part of nodes could fail in the iddle. Moreover, the data redistribution is conducted in the network of heterogeneous node failure probabilities. This fact iplies that data should ove towards ore reliable nodes with sufficient residue energy and storage space, such that higher data delivery rate can be achieved. In this paper, we propose Ravine Streas to preserve data strea persistence in disruptive sensor networks. Source data is initiated and delivered in its encode for by network erasure codes OnCode [2]. For data preservation, receiving nodes distributively ake the acceptance decision based on local failure probability and storage space. Note that here nodal failure probability has taken the residual energy into account and dynaically update across the process. Adaptive transission power control in ensures that data acceptance probability by neighbor nodes is expected at for each broadcasting under iniu transission power. With data packet recoding, the dispensable data content redundancy is constrained for ore energy efficiency. Moreover, we show that the delivery perforance of proposed is bounded by Optial solution: η = OPT ln( δ ) 2λ [ + ω() + 2ω(2) 2 ( 2) ]. In suary, this work has three contributions: () leverages probabilistic transission power control and network erasure recoding to preserve data throughout disruptive network connection. Additionally, the data redundancy is largely reduced, increasing algorith energy efficiency. (2) akes distributed probabilistic decision that directs redistribution data to ore reliable storage nodes, without global knowledge of density and node failure probabilities, soothing data collection traffic under disruptive connections. (3) Our analysis shows that the proposed algorith has bounded perforance copared with optial solution. The rest of the paper is organized as follows. In section II, we suarize and copare related works. Then we present the design and analysis of Ravine Streas protocol in section III. In section IV, we present experiental evaluation results. We conclude our work in section V. II. RELATED WORKS A. Data persistence without storage constraint GROWTH [3] ensures data reliability in a zeroconfiguration network with no storage constraints. Growth code evolves its code degree over tie. For each code degree,

2 2 it leads to a better decoding probability than LT codes when partial encoded packets are received. MORE [4], SlideOR [5] and [6] leverage rando linear coding to encode innovative received packets. All of the have better perforance than the ExOR [7], which is the opportunistic routing protocol without network coding. MORE encode sybols by rando linear coding, without needs of selecting next-hop forwarder list and iproving spatial usage in ultiple transissions. CCACK [8] uses a null-space based ACK to notify neighbor nodes about the reception of encoded packets. CCACK suppress redundant packets, which carry linearly dependent encoded sybols. Distributed LT Codes [9], [] decoposes original degree distribution into different probability distributions for sources only one-hop away fro data relay based on a two-branch relay odel. The degree deconvolution with selective XOR in forwarders theoretically yield a degree distribution close to D in the receiver. Xu et al. proposes ONEC [] to explore network erasure coding in disruptive sensor networks. ONEC leverages a strict structure, e.g. tree structure, to conduct recursive deconvolution of degree distribution. And opportunistic recoding is exploited to ensure ore sybols can seep through network to receiver. All the aforeentioned works do not consider storage constraint and the scenario of sink failure. Sink failure and O() storage space constraints can pose a big challenge to network coding based ethods, which erely encode and forward packets to sink, in either opportunistic or ACK-control anner.. Data persistence with storage and energy constraint Lin et al. [2] propose a LT codes based erasure coding for preserving data in a large-scale network. The key idea is to randoly walk data fro redistribution nodes to storage nodes to eulate the rando selection in LT coding. Multiple redundant rando walks are initiated by each of data which stop in a storage node with specific probability derived by its selected code degree. A optial redundancy factor for each data sybol is derived offline by linear prograing. In [3], Aly et al. suggest to construct LT codes without knowledge of axiu node degree. In [4], Aly et al. eploy rando walk based schee to distributively construct the Raptor Codes, which is of scalable decoding coplexity (+ɛ)n with respect to the network size and sybol size. [5] presents a packetcentric approach to ensure that degree distribution confor with final degree distribution. Every encoded packet is associated with a selected code degree. The packet collects and encodes the sybols fro passing nodes uniforly distributed in the network. The packets terinate once associated code degree is satisfied. The above ethods preserve data persistence in a robust anner by using network coding, however, they ignore the storage and energy constraints. Tang et al. [6] foralizes storage depletion induced data redistribution as the iniu cost flow proble, and devises a distributed data redistribution algorith (). [7] consider the energy and storage depletion to axiize data preservation tie. Valero et al. [2] forulates the proble as an optiization proble and use Linear Prograing to find the optial solution. A distributed algorith () is ipleented for in-network storage and later data retrieval. [8] proposes a probabilistic broadcasting based data redistribution schee. Their contribution is to derive a proper probability distribution for rebroadcasting packet. Hou et al. [] seeks to axiize the iniu reaining energy aong the nodes storing data ites. It presents a centralized greedy heuristic to approxiate the optial solution under certain conditions. The above optiization algoriths, though considering energy and storage constraint, ignore an iportant fact that disruptive condition ay happen in the course of data redistribution. The disruptive network seriously challenges data redistribution. Distinct fro the existing works, our contributions of are three fold: first, conducts probabilistic broadcasting with adaptive transission power to overcoe the disruptive connection during data redistribution. It has high energy efficiency and low essage redundancy. Second, insitu recoding can reduce data redundancy in sybol wise. Third, generalizes the energy and storage constraints to nodal utility, which includes failure probability and storage constraint. According to the nodal utility, data storage decision can be ade distributively. III. ALGORITHMS AND ANALYSIS Ravine Streas is an integrated set of distributed algoriths that protect data collection strea fro disruptive network nodes and connections. The data persistence preservation of is built upon the opportunistic in-network coding and delivery (OnCode) [2]. Data packets are initially encoded and transit by OnCode. When local storage space vanishes, redistributes excessive received data packets to ore reliable nodes to preserve data persistence. considers both heterogeneous failure probabilities (due to energy depletion or other factors) and storage constraints, and addresses the proble of disruptive connection during data redistribution. leverages network erasure coding in data redistribution, and deterines the rebroadcasting probability and transission power level according to nodal utilities. It is worth to ention that algoriths are probabilistic, adapting to the dynaic network conditions with iniu execution overhead. We describe the properties of an ideal data recode and redistribution algorith, which is referred to as OPT. As the optial benchark solution, OPT presents the following properties that our algorith design concerns. First, OPT does know how uch data can be accepted and how uch data needed to be redistributed if the node happens to be disruptive at a certain tie. Here, we define a node is disruptive as it can not forward any data towards sink, and data strea is disconnected hereafter. In other words, OPT deterines the data acceptance in an optial way so that the storage use are balanced across the network. Second, for a data redistribution in a tie range ahead, OPT can always find a deterined path fro disruptive node to destination storage node with stable counication link and ensured data delivery. And only

3 3 one copy of source data packet needs to be aintained inside network. In practice, it is unlikely to predict a stable counication link across ulti-hop connection in the disruptive network conditions, which eans the data redistribution is not guaranteed to be successful every tie. Thus, ultiple copies of data packet are necessary to reduce the risk of data loss. Under this condition, data redundancy needs to be reduced between ultiple survived data copies. Third, OPT can observe if the disruptive node is trapped in bad region or not, so as to adjust the appropriate radio transission power to assist the counication. In fact, without perfect knowledge ahead of tie, it consues considerable overhead to search different levels of transission powers until a proper power is found. adopts two integrated echaniss to tackle the unideal situations: Deterine Data Acceptance, Probabilistic Data Redistribution. is able to preserve data persistence in heterogeneous situations subject to node failure probability and storage constraints. The atheatical sybol and notations are described in Table I. Notation Ni Ui δ i C i C ax β α q i p τ TALE I NOTATION IN ALGORITHM Explanation A. Deterine Data Acceptance Neighbor set of node i under power level Nodal utility under TX power Failure probability of node i Free storage space on node i Maxiu storage space Syste paraeter for data acceptance Replaceent factor Probability of accepting incoing packet in node i Selection probability for power level Exponential index of power adjustent Due to the opportunistic nature of encoded network traffic, it is unlikely to predict the exact aount of incoing packet in a certain tie window. Therefore, when disruption occurs, there is hardly a deterined way to calculate the exact aount of data needed to be redistributed. The best approach is to ake this decision based on the dynaic available storage space in each node. adopts the reactive ethods to discern available storage in node i, defined as C i. We first look at an exaple of a data strea fro i j k, where node k becoes disconnected, aking node j not able to forward any incoing traffic. Node j stores data packets unsent in its own buffer. To preserve data persistence, node j has to redistribute the excessive data to other nodes for storage before its space is used up. If data packets are redistributed only when storage space is full, the network will experience a sudden and unexpected traffic burst. To avoid this draatic traffic change, adopts probabilistic ethod to pre-estiate the probability q j for each incoing packet. The probability q j indicates the probability with which node j accept the received packet. With this soothing technique, network traffic can reain relatively stable even under unforeseen disruptive conditions. The probability q j is deterined distributively, based on local ratio of nodal available storage space C j and axiu storage space C ax. With less available storage ratio, incoing packet will be less likely to be accepted. Moreover, each node i has a certain failure probability δ j due to either energy depletion or other external factors. Therefore, final data C acceptance probability is estiated against factors j C ax and δ j. We cobine these two factors by ultiplicative operation. q j = β U j = β ( δ j C j C ax ) () where U j represents the available nodal utility, and β is introduced by algorith to hold a tolerance guard, which is tunable. If node decides not to save the received packet, it will proceed to redistribute the packet to other nodes for storage.. Probabilistic Data Redistribution The reason of redistributing data packet following a probabilistic anner is two fold. First, having packets probabilistically broadcast consue significantly less counication cost for offloading data to other storage nodes than that of gossip flooding. Second, statistically such a probabilistic redistribution can itigate the risk of data loss despite the fact part of delivery paths ay fail in the course of redistribution. Two ain challenges arise in design. First is about how to ake data redistributed towards reliable storage nodes instead of nodes with higher failure probability. Due to heterogeneous node densities, rebroadcast essage can be heavily stored in nodes with denser vicinity but unreliable nodes. Data is unlikely to be redistributed to other nodes, which ight have better connection to sink node for collection purpose. integrates the adaptive power control to change the outcoe of data redistribution towards ore reliable nodes. Second challenge is to reduce data redundancy in redistribution. More redundant data packets broadcast in the network iplies ore energy are consued to achieve this process. Although energy cost for preserving data persistence is the extra overhead ust paid, this cost needs to be carefully conserved. Excessive waste of energy severely causes nodes to fail due to power depletion. Probabilistic data redistribution is articulated in Algorith, which describes the transission power control based rebroadcast and recoding based data redundancy constraining. When the node with decreasing storage space decides not to save the incoing packet, it starts to redistribute the data to other storage nodes with adaptively controlled transission power. In line 5 8 of Algorith, node i selects a certain power level for broadcasting, according to a posterior probability distribution of transission power, i.e. {p, p 2,..., p }. This power distribution is dynaically updated based on available storage space aong neighbor nodes. This rebroadcast is invoked when the essage is not accepted by the node. Since it is the source of data redistribution, there is no duplicate copy of this packet in the network yet.

4 4 Algorith Probabilistic Data Redistribution Input: Effective storage space C i, β, ax storage C ax, replaceent factor α, Power distribution {p, p 2,..., p } : Draw rando variable ρ fro range (, ) 2: Set q i = β U i = β ( δi Ci C ax ) 3: if ρ < q i then 4: Save this data packet to local storage 5: else 6: Node i select power level with probability p 7: Rebroadcast the data packet κ using selected transission power. 8: end if 9: Node j upon receiving a rebroadcast data packet κ : Draw rando variable ρ fro range (, ) : if ρ < q j then 2: Save the data packet to local storage flash 3: else 4: if Check coding distance(κ, S) > then 5: Select sybol S l with sallest distance with other sybols in storage 6: Replace S l with κ with probability α 7: if ISRECODALE(κ, S) == TRUE then 8: Recode κ by XORing sybols in storage 9: end if 2: Rebroadcast packet κ with probability ( α) 2: else 22: if ISRECODALE(κ, S) == TRUE then 23: Recode κ into κ by XORing sybols fro storage 24: end if 25: Rebroadcast new packet κ 26: end if 27: end if Then the rebroadcast packets are treated differently. When a rebroadcast packet arrives at a node with sufficient storage, the essage will be accepted and stored (line -3). In the other hand, when no sufficient storage is available, receiving node will operate recoding before it rebroadcast out the essage with a selected probability. In line 4, it exaines the code distance between received packet κ and encoded sybols in the storage space with the sae code degree. If there exists data of the sae degree which has different code sybols, the packet will replace the one with sallest coding distance fro other sybols with a probability α. The purpose of replaceent is to axiize the decoding probability, since the encoded sybol with iniu code distance contribute little to the decoding. In case that no sybol with the sae degree is found in the storage, algorith evaluates the opportunity that rebroadcast packet can be recoded by XOR operation with stored sybols to generate a new sybol. Note that the recoding does not change the code degree associated with the packet (line 23-25). Recoding the sae rebroadcast essage in different nodes can ix the essage randoly with diverse sybols, generating non-duplicate encoded data. Hence, it reduces the data redundancy in rebroadcast essages, avoiding wasting energy in broadcasting duplicate essages. Adaptive power control and constrained data redundancy are two ajor technical building blocks in the probabilistic data redistribution, which are described as follows. ) Adaptive Power Control: Without adjusting radio transission power, packets ay be trapped in low storage region. Adjusting transission power oves packet out to the nodes with ore sufficient and reliable storage space. The transission power adjustent procedure itself is probabilistic. An intuitive way for adjusting probability of transission power is to ake it proportional to the total available nodal utilities U j in node j: p = c U j (2) The above equation iplies that transission power that reach larger aount of U Pi j has a larger probability to be selected for data rebroadcast. However, there exists one drawback of directly using the proportional equation to deterine the probability of transission power. Applying this strategy, each node greedily selects the axiu power to rebroadcast throughout the process, leading to significant essage flooding and useless data redundancy, though the local data entrapent is relieved. Figure shows an exaple depicting this proble. In the figure, nodes fro A to G select their axiu power respectively, i.e. = 3, for it can reach nodes with ost nodal utilities. However, each node, like node F, receives 6 copies of rebroadcast essages, which are ostly duplication. Meanwhile, transission with power can consue quadratically ore energy than that of power. The energy efficiency can be enhanced by letting each node selects their transission power conservatively. Meanwhile, we still wish to preserve the data persistence, which eans that rebroadcast essage is stored by at least one storage node. Adaptive power control has been designed to achieve both of goals. U_A =. Fig.. A = =2 =3. C..2 D.3 F E G.2.3 Exaple of transission power control The probability of selecting transission power level is redistributed to be exponentially proportional to the total nodal utilities aong rebroadcasting node s neighbors. p = ( Ūj Ū j (Uj )) τ (3) j

5 5 where τ is the exponential syste paraeter tunable between and and Ū j is the average nodal utilities of node j and node j s neighbors, when power level is applied in node j s transission. When the su of nodal utilities equals to, the expected probability of storing the rebroadcast essage is. This ensures that the corresponding power level is selected to guarantee the data persistence. Rather than linear proportional relationship, the above equation has the power exponent τ (, ). With syste exponent τ, the power level p, under which the su of nodal utilities Uj is closest to, has highest probability in all power levels. The reasons of adding coefficients Ū j are two fold. First, the power level, which increases not only total nodal utilities but also the average values, should be given a higher probability in the power distribution. Second, p needs to approach to ore aggressively once the next power level leads to a larger average utility aount, so that cut-off power level ay appear saller. A saller cut-off power level indicates exponential energy conservation. In Equation 3, if the calculated p, then let p =. Notice that, in which p, is the cut-off power level in power probability distribution. Through probability noralization, it ensures that p equal to. The average nodal utility follows that: Ū j = /Ūj N j + U j In order to calculate the nodal utility suation and average value, node j needs to know its neighbors utilities. Thus, algorith adds two extra fields in each broadcasting packets: power level indicator and available nodal utility. Upon receiving rebroadcast essage, node j records both power level received and available nodal utility fro neighbor node. For instance, in Figure, before adaptive power control, node A choose power level based on Equation 2, so that a total nodal utility can reach or exceed. Since ( ) =.3 >, the ost likely power level for node A is = 3. We set τ =.4. With adaptive power control, when =, it gives p = (. 3).4 =.68. Set = 2, then p 2 = (.4..7).4 =. Thus, node A s cut-off power is reduced fro level 3 to level 2. Average TX Power Level Fig. 2. APC PC Node Density Average TX power level for data redistribution. Figure 2 shows the average TX power levels selected by Equation 2 (PC) and Equation 3 (APC) under different node densities respectively, within the TOSSIM [9] network siulator. Fro the results, it shows that adaptive power control (APC) reduces the power level by 6% on average copared with basic power control (PC). In addition, the saller deviation of power level aong nodes indicate that energy consuption of TX power is relatively ore balanced if executed by APC. Moreover, the value of power level decreases slowly in PC. The reason is that each node greedily selects its power level, so that storage space is consued faster than necessary, aking other nodes have to take higher transission power to discover ore storage nodes. 2) Data Redundancy Constrain: Adaptive power control (APC) reduces the energy consuption of rebroadcast as well as the total aount of rebroadcast data replication. However, redistribution packets consist of duplicate data due to the rebroadcasting process. Data content redundancy wastes counication energy as well as the storage space. Therefore, we further constrain the content redundancy of rebroadcast essage by conducting sybol recoding without ipairing the original code degree distribution. Recoding procedure is shown in Algorith 2. Recoding step takes as input the rebroadcast encoded packet S, a set X of both decoded sybols and encoded packets of degree less than 2 and regenerates a fresh encoded packet with the sae degree as d. This recoding step ixes the encoded sybol of rebroadcast packet with local sybols in storage, such that ultiple copies of broadcast packets can be stored with distinct encoding contents after their redistribution process. Algorith 2 Data Recoding Input: Received rebroadcast packet S, a set X of both decoded sybols and encoded packets of degree 2 Output: Recoded packet Y : for all s S do 2: 3: for all x X do 4: x, if{x s & freq(x) < freq()} 5: end for 6: if = then 7: Y S x 8: end if 9: end for The basic operation in network erasure coding is XOR, which is effective and of low coputation cost. It verifies the properties that swapping sybol only requires another XOR operation. For instance, a native sybol s in S can be replaced with s 2 if target pair (s s 2 ) is available, where s 2 is not contained in S. That is, (s... s ) (s s 2 ) = (s... s 2 ) = S. We denote this relationship as s s 2. Since there are ore than 5% encoded packet of degree equals to or less than 2 in LT Codes and Raptor Codes and the search for degree 2 packets are faster than higher degree packets, we ainly leverage those local packets with degree d 2 to recode rebroadcast packets. When ultiple target

6 6 pairs are found in the storage or can be generated fro native sybols, like (s s 3 ) and (s s 4 ), the sybol s i, with less appearance frequency is selected. Illustrated in Figure 3, conduction of sybol recoding constrains the data redundancy. In Figure 3, packet of {x + x2 + x3} is broadcast fro node C, and two duplicate copies are received by node A and respectively. There exist different groups of encoded sybols previously cached in node A and storage. For exaple, node A has 3 decoded native sybols x3, x4, x6 (degree ), which has different appearance frequency in the prior sybol recoding, shown in nuber arked in the right-top corner. According to line 4 in Algorith 2, node A selects {x2 + x5} to recode, because x5 satisfies x5 x2 and {x2 + x5} has the lower frequency than {x3} and {x4} as well. The recoded packets fro node A and becoe distinct and carry different native sybols. (2) (2) () x3 x4 x6 () x2+x5 () x7+x8+x9 x+x2+x3 Fig. 3. A + x2+x5 x+x2+x3 Rebroadcast Node x+x3+x5 Redistribution Node C x+x2+x3 Rebroadcast Node x+x2+x3 + x3+x4 x3+x4 () (2) x4+x5 () x8+x9 x+x2+x4 Illustration of sybol recoding in rebroadcast node. Although a successful decoding probability depends on the code degree distribution adopted during encoding, sybol recoding does increase the decoding probability. Fro LT encoding point of view, our data redundancy constrain approach builds stronger and ore reliable connections between left and right coponents in the Tanner Graph. Introducing ore connections between sybol and encoded packet prevent decoding fro early failure, in the case of encoded packet loss. Average Packet Redundancy Fig. 4. Recode norecode Node Density Data redundancy under various node densities. Figure 4 evaluates the data redundancy against different node densities. With our recoding on rebroadcast packet, the redundancy of data content has been reduced by at least 5%. With node deployent becoes denser the data redundancy with recoding can be further lowered to approach to, which eans that there is alost no identical rebroadcast essage on the network. In contrast, without recoding the data redundancy increases as the node density, because ore nodes are involved in packet rebroadcasting, causing ore duplicate packets in the network. C. Algorith Analysis preserves data when disruptive connection causes buffer to overflow. This data quality preservation layer is built upon opportunistic in-network coding-based (OnCode [2]) data delivery. The packets delivered in the network before redistribution are handled by OnCode protocol. The deliverable sybol size for unit tie span is based on the disruption probability distribution Π, shown in [2]. Lea : [2] Given a disruption probability distribution Π = {π w, π w2,..., π wn }, with π wi denoting the probability for discretized disruption probability w i, then by recursive hitting tie estiation, the deliverable sybol size = n i= i= n R i i= (+ɛ)λ = n /(+ɛ)λ i= L(i,sink) = /(+ɛ)λ k Nbr(i) P ik(t ik +L(k,sink)), where both P ik and T ik are n i= deterined by distribution Π. Hence, the perforance bound of OnCode is described as: Theore 2: [2] Given the size of sybol set as and degree distribution of Raptor Codes ω( ), the delivery ratio of OnCode is OPT/λ, where λ = + +4 ( e ɛ /δ) 2 ω() (+ɛ) (δ, ɛ (, ]), with a successful decoding probability of all sybols ( e ɛ ). [2] shows that OnCode provides a OPT/λ perforance bound. We continue to consider the optial solution of data preserving in the course of disruptive network connection: OPT. A stable path fro distribution node to storage node is always perceived in OPT for distributing data, and exact one copy of data distribution is sufficient for preserving persistence. Therefore, the storage cost for OPT is O(). For, adaptive power control in section III- ensures that in each broadcast the expected acceptance probability of distribution data in storage node approxiates, and adopts 2-hop rebroadcast to ake sure the event that storage nodes accept distributed data with probability equivalent to. We assue that there are available storage space for innovative data sybols. OPT can exactly leverages all of these space to store redistribution data for persistence. Then, the delivery ratio of is derived as follows. Theore 3: Given the size of source data set, and degree distribution of Raptor Codes ω( ), the final delivery ratio of : η = OPT ln( δ ) 2λ [ + ω() 2 + 2ω(2) ], where ( 2) λ = + +4 ( e ɛ /δ) 2 ω() (+ɛ) and δ, ɛ (, ], with a successful decoding probability of sybols ( e ɛ ). Proof: adopts 2-hop redistribution to ensure the acceptance of data, therefore only 2 can be accepted in storage nodes expectedly without recoding. In other words, the final delivery ratio of becoes λ 2. However, leverages recoding to eliinate data duplication, so that any 2 copies

7 7 are distinct fro each node when they are stored. Therefore, the final delivery ratio is deterined by the portion of data that can be recoded shown in Algorith. Only packets of degree and 2 are utilized in recoding. And we define the event A as that packets are recodable when there exists a sybol x in the packet that can find x y in the storage sybol set of either degree or 2. The probability of event A is ln( δ ) (ω() 2 +ω(2) ). If this event occurs, ( 2) the corresponding delivery ratio of is /λ, otherwise /2λ. Therefore, the final expected delivery ratio equals to: OPT ln( δ ) 2 2λ [ + ω() + 2ω(2) ( 2) ]. IV. PERFORMANCE EVALUATION In this section we present the perforance evaluation of on TOSSIM [9] siulation. The perforance of is copared against other existing data collection and redistribution algoriths fro the literature. The experiental results deonstrate that data delivery ratio under disruptive networks is substantially iproved by our algorith, with an efficient energy cost and oderate storage cost. Experiental setup and result analysis are discussed as follows. A. Experiental setup To illustrate the advantages of Ravine Streas in iproving data delivery ratio, hence enhancing data persistence over disruptive sensor networks, this work ipleents and copares with three other existing data collection and redistribution protocols: [2], [6] and. is proposed to optially solve the data redistribution proble under interittent network connection, i.e. iniizing the data redistribution and retrieval cost. is ipleented in a distributed anner by push-relabel network flow ethods. devises an index based potential field, which is used to deterine the aount of data redistributed to storage nodes. It shows the optiality of data redistribution without data retrieval cost. is a plain data collection protocol, without specific redistribution and coding strategy. Once node disruption happens, data is redistributed randoly to other storage nodes by broadcasting. The experient is carried out in square area with nodes randoly deployed. We test the algoriths in a network of size and 5 respectively, and the total storage space, nodal failure probability and nuber of data generators inside network vary to copare the perforances under different scenarios. Moreover, energy cost and flash storage cost are also evaluated aong different algoriths. For, the total power levels are set as 8, each of which can reach areas of different radii. Set nodal utility factor β =.9, and replaceent factor α =.5. We show the experiental results in the following sections.. Data persistence under disruptive networks For nuerical evaluation, we use data delivery ratio to represent data persistence. Data delivery ratio is defined as the ratio between the aount of data sent and the actual aount of data recovered by the destinations. Figure 5 shows the data delivery ratio for ultiple algoriths under variable total storage spaces. The average nodal failure probability is 2% and there are 5 and 2 data generators in network size of and 5 respectively. Each of data generators has kbps data rate. In Figure 5, y-axis denotes the percentage of data sent which can be preserved throughout the network disruption, with x-axis showing different total storage space in nodes. outperfors other algoriths for all cases of different storage spaces. Fro both of experients, the ratio of data persistence iproves along with the increasing storage space. For exaple, it can be observed that with increasing nodal storage space (.4Mbytes to.mbytes), the ratio of data persistence is significantly iproved by, increasing fro 5% to 93%, which is uch ore than the increents in other algoriths. Copared with the and, the application of network erasure coding in akes packet redistribution ore robust. Unlike the and, which does not has reliable data redistribution to storage node, adopts probabilistic broadcasting together with randoized recoding for data redistribution. Therefore, ore data packets are preserved even in the present of disruptive nodes and network conditions. Copared with the, eliinates the duplicate packet retransissions. The recoding of redistributed packet with innovative data in is beneficial for itigating the data content redundancy. Each packet carries different innovative sybols which contribute to the final decoding. Recoding not only reduces the data redundancy, but also prootes the randoness in ixing sybols. The network erasure coding based data delivery can axiize its coding gains when the sybol selection is pure rando across the entire source sybol set Storage Space (Mytes) Storage Space (Mytes) (a) Network Size (b) Network Size 5 Fig. 5. Data delivery ratio over different storage spaces (failure prob. = 2%). Figure 6 deonstrates the delivery ratio under different node failure probabilities. The storage space of each node is set to Mbytes. In the left figure, it shows that stills has the best perforance in ters of delivery ratio. More iportantly, when average nodal failure probability increases, the delivery ratio of only reduces by 3%, and still aintains above 6% delivery ratio under 9% failure probability. On the contrary, the delivery ratio of and fall below 2%, and has even less than 5% data delivery ratio. The right figure in Figure 6 deonstrates the sae trend. An essential reason is that algoriths other than fail to consider disruptive network condition during data distribution,

8 8 and hence algoriths are not able to adapt to interittent connection and disruptive counication link. For exaple, after redistribution node in deterines how any aount of data should be rerouted to the destination storage node, based on the potential index, redistribution nodes take it for granted that the redistribution data can reach or be stored in the destination. Unfortunately, it is not always true, especially in disruptive networks where the interittent connection can happen any tie during the entire data delivery. This experient anifests that disruptive counication poses a big challenge to existing data redistribution protocols Failure Probability Failure Probability (a) Network Size (b) Network Size 5 Fig. 6. Data delivery ratio over different failure probabilities (storage=myte). Figure 7 deonstrate the delivery ratio under different data generators in the network. With increasing nuber of data generator, the network traffic becoes heavier and preserving data persistence is hence ore challenging. The figure shows that when there are data generators in a network of 5 nodes, and can still preserve ore 5% data, with 45% data persistence for. However, the data delivery ratio of all three approaches drop significantly as the nuber of data generator increases fro to 35. In the worse case, all three data preserving algorith only anage to preserve less than 2% aount of innovative data. y coparison, it shows the advantages of, which retains a steady perforance of above 9% data persistence across different nuber of data generators. Efficient data duplication avoidance (by recoding) and essage redundancy reduction (by opportunistic rebroadcasting and adaptive power control) in play an iportant role in axiizing data delivery ratio. C. Storage cost We evaluate the storage cost for each of the algoriths in Figure 8. We observe that ethod consues ore storage space than others when nuber of data generator increases higher than. Under 35 data generators, there are only 6% storage space on average is available in each of nodes. This iplies that the uncontrolled rebroadcasting of results in uch redundant packets which requires uch ore storage space. Although consues less storage space than and in the network of light traffic, requires ore storage space as the network traffic becoes higher. This is because adopts the opportunistic rebroadcasting to accoodate the disruptive counication link which introduces oderate duplicate essages. and consue less storage space but introduce uch ore energy cost. Available Storage Ratio # of Data Generators Fig. 8. Available storage space ratio v.s. aount of data generators (storage=myte, failure prob. = 2%). D. Energy cost Energy cost is critical to the data preserving, since excessive energy consuption will increase the nodal failure probability due to energy depletion. Illustrated in Figure 6, all the algoriths experience a perforance degradation under higher failure probability. Therefore, energy conservation is not only for the sake of efficiency, but also for axiizing data persistence Percentage Power Select Frequency Selection Cuulative TX Power Level # of Data Generators Fig. 9. Transission Power Level Distribution. Fig. 7. Data delivery ratio v.s. aount of data generators (storage=myte, failure prob. = 2%). The energy cost increent is exponentially proportional to transission power level. Thus, we evaluate the experiental output of power level adaptation algorith in Figure 9. Figure

9 9 9 represents the transission power probability distribution according to Equation 3. The diaond-dotted curve is the cuulative probability of power selection. It shows that ore than 7% probability fall into power level 3 and 4, which are low-oderate power level for the radio. This results is consistent with the preliinary results fro Figure 2. It also depicts that adaptive power control can adapt to network dynaics, including neighbor node failure, node storage space changes and node density alteration, with sall transission power cost. Energy Consuption Rate Fig.. Optial Failure Probability Energy Consuption Rate (storage=myte). Figure deonstrates total energy consuption of different algoriths, noralized against the Optial solution. The optial solution is assued to establish a stable delivery path fro distribution node to storage node, which only consues iniu energy cost. In low failure probability, only expend 2.3 ties as Optial solution. It is due to that in probabilistic rebroadcasting is applied to accoodate the disruptive connection. Copared with Optial, ore redundant nodes are required to rebroadcast packets in the absence of global knowledge of node failure prediction. In the worse case, consues 3.5 ties as uch as Optial solution. Although adjusts its transission power for better expected coverage, its total energy consuption is 4% less than and. The packet retransission in those two approaches consue considerable energy when the path for data redistribution becoes interittent. randoly rebroadcasts the packet for redistribution, which is unaware of network dynaics, so that energy consuption of reains 5 ties as uch as the Optial solution. ut the data preserving perforance of is draatically influenced by failure probability as in Figure 6. V. CONCLUSION An integrated network coding based approach, Ravine Streas (), has been proposed in this work to achieve persistent data streas in disruptive wireless sensor networks. axiizes the probability that source sybols seep through ultiple disruptive paths, via probabilistic rebroadcasting with adaptive power control and recoding, preserving the persistence of data strea. The experiental results reveal that the delivery ratio of source sybols (data strea persistence) is iproved considerably with efficient energy cost and odest storage cost. REFERENCES [] X. Hou, Z. Supter, L. urson, X. Xue, and. Tang, Maxiizing Data Preservation in InterittentlyConnected Sensor Networks, in IEEE International Conference on Mobile Ad hoc and Sensor Systes, Oct. 22. [2] M. Valero, M. Xu, N. A. Mancuso, W.-Z. Song, and R. eyah, : A Sink Failure Resilient Approach for WSNs, in IEEE International Conference on Counications, Jun. 22. [3] A. Kara, V. Misra, J. Feldan, and D. Rubenstein, Growth Codes: Maxiizing Sensor Network Data Persistence, in ACM SIGCOMM, Sep. 26. [4] S. Chachulski, M. Jennings, S. Katti, and D. Katabi, Trading structure for randoness in wireless opportunistic routing. in ACM SIGCOMM, Aug. 27. [5] Y. Lin,. Liang, and. Li, SlideOR: Online Opportunistic Network Coding in Wireless Mesh Networks, in Mini-Conference at IEEE INFOCOM 2, Mar. 2. [6] A. G. Diakis, V. Prabhakaran, and K. Rachandran, Distributed fountain codes for networked storage, in Proceedings of International Conference on Acoustics, Speech and Signal Processing (ICASSP), May 26. [7] S. iswas and R. Morris, ExOR: Opportunistic Multi-hop Routing for Wireless Networks, in Proceedings of the Special Interest Group on Data Counication (SIGCOMM 5), ser. SIGCOMM 5, vol. 35, no. 4. Philadelphia, Pennsylvania, USA: ACM, Oct. 25, pp [Online]. Available: [8] D. Koutsonikolas, C.-C. Wang, and Y. C. Hu, CCACK: Efficient Network Coding ased Opportunistic Routing Through Cuulative Coded Acknowledgents, in IEEE INFOCOM, Mar. 2. [9] S. Puducheri, J. Kliewer, and T. E. Fuja, Distributed LT Codes, in International Syposiu on Inforation and Theory, Sep. 26. [], On the Perforance of Distributed LT Codes, in Allerton Conf. Counications, Control and Coputing, Sep. 26. [] M. Xu, W.-Z. Song, and Y. Zhao, Opportunistic Network Erasure Coding in Disruptive Sensor Networks, in The 8th IEEE International Conference on Mobile Ad-Hoc and Sensor Systes ( IEEE MASS ), 2. [2] Y. Lin,. Liang, and. Li, Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes, in Proceedings of the 26th Annual IEEE International Conference on Coputer Counications (IEEE INFOCOM), May 27. [3] S. A. Aly, Z. Kong, and E. Soljanin, Fountain codes based distributedstorage algoriths for large-scale wireless sensor networks, in Proceedings of the 7th International Conference on Inforation Processing in Sensor Networks (IPSN), Apr. 28. [4], Raptor Codes ased Distributed Storage Algoriths for Wireless Sensor Networks, in IEEE International Syposiu on Inforation Theory, Jul. 28. [5] D. Vukobratovic, C. Stefanovic, V. Crnojevic, F. Chiti, and R. Fantacci, A Packet-Centric Approach to Distributed Rateless Coding in Wireless Sensor Networks, in Proceedings of IEEE SECON, Jun. 29. [6]. Tang, N. Jaggi, H. Wu, and R. Kurkal, Energy-Efficient Data Redistribution in Sensor Networks, in MASS, Aug. 2. [7] M. Takahashi,. Tang, and N. Jaggi, Energy-Efficient Data Preservation in Interittently Connected Sensor Networks, in The Third International Workshop on Wireless Sensor, Actuator and Robot Networks, Apr. 2. [8] J. Liang, J. Wang, X. Zhang, and J. Chen, An Adaptive Probability roadcast-based Data Preservation Protocol in Wireless Sensor Networks, in IEEE International Conference on Counications, Jun. 2. [9] P. Levis, N. Lee, M. Welsh, and D. Culler, TOSSIM: Accurate and Scalable Siulation of Entire TinyOS Applications, in Proceedings of the st ACM Conference on Ebedded Networked Sensor Systes (SenSys 3), 23. [2] M. Xu, W.-Z. Song, and D. Heo, OnCode: Opportunistic In-Network Coding and Delivery in Energy-Synchronized Sensor Networks, available at xu/pub/oncodetr.pdf, Tech. Rep., May 22.

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan

More information

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

Multipath Selection and Channel Assignment in Wireless Mesh Networks

Multipath Selection and Channel Assignment in Wireless Mesh Networks Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

Integrating fast mobility in the OLSR routing protocol

Integrating fast mobility in the OLSR routing protocol Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr

More information

Distributed Multicast Tree Construction in Wireless Sensor Networks

Distributed Multicast Tree Construction in Wireless Sensor Networks Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,

More information

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

Collaborative Web Caching Based on Proxy Affinities

Collaborative Web Caching Based on Proxy Affinities Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA

More information

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction Relocation of ateway for Enhanced Tieliness in Wireless Sensor Networks Keal Akkaya and Mohaed Younis Departent of oputer Science and Electrical Engineering University of Maryland, altiore ounty altiore,

More information

A Periodic Dynamic Load Balancing Method

A Periodic Dynamic Load Balancing Method 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract

More information

BP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks

BP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks BP-MAC: A High Reliable Backoff Preable MAC Protocol for Wireless Sensor Networks Alexander Klein* Jirka Klaue Josef Schalk EADS Innovation Works, Gerany *Eail: klein@inforatik.uni-wuerzburg.de ABSTRACT:

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

A Hybrid Network Architecture for File Transfers

A Hybrid Network Architecture for File Transfers JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,

More information

Identifying Converging Pairs of Nodes on a Budget

Identifying Converging Pairs of Nodes on a Budget Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering

More information

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones Advance Access publication on 24 February 2017 The British Coputer Society 2017. All rights reserved. For Perissions, please eail: journals.perissions@oup.co doi:10.1093/cojnl/bxx015 Fair Energy-Efficient

More information

Deterministic Voting in Distributed Systems Using Error-Correcting Codes

Deterministic Voting in Distributed Systems Using Error-Correcting Codes IEEE TRASACTIOS O PARALLEL AD DISTRIBUTED SYSTEMS, VOL. 9, O. 8, AUGUST 1998 813 Deterinistic Voting in Distributed Systes Using Error-Correcting Codes Lihao Xu and Jehoshua Bruck, Senior Meber, IEEE Abstract

More information

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage 216 IEEE 23rd International Conference on High Perforance Coputing A Low-Cost Multi-Failure Resilient Replication Schee for High Data Availability in Cloud Storage Jinwei Liu* and Haiying Shen *Departent

More information

Improve Peer Cooperation using Social Networks

Improve Peer Cooperation using Social Networks Iprove Peer Cooperation using Social Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Noveber 5, 2007 Corresponding

More information

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.5, Septeber 205 AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM Xie Yang and Cheng Wushan College of Mechanical Engineering,

More information

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University

More information

Survivability Function A Measure of Disaster-Based Routing Performance

Survivability Function A Measure of Disaster-Based Routing Performance Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected

More information

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Navodaya Garepalli Kartik Gopalan Ping Yang Coputer Science, Binghaton University (State University of New York) Contact:

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses International Journal of Industrial Engineering & Production Research Septeber 03, Volue 4, Nuber 3 pp. 9-35 ISSN: 008-4889 http://ijiepr.iust.ac.ir/ Using Iperialist Copetitive Algorith in Optiization

More information

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13 Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical

More information

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We

More information

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem Theoretical Analysis of Local Search and Siple Evolutionary Algoriths for the Generalized Travelling Salesperson Proble Mojgan Pourhassan ojgan.pourhassan@adelaide.edu.au Optiisation and Logistics, The

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

A Network-based Seamless Handover Scheme for Multi-homed Devices

A Network-based Seamless Handover Scheme for Multi-homed Devices A Network-based Sealess Handover Schee for Multi-hoed Devices Md. Shohrab Hossain and Mohaed Atiquzzaan School of Coputer Science, University of Oklahoa, Noran, OK 7319 Eail: {shohrab, atiq}@ou.edu Abstract

More information

IN many interactive multimedia streaming applications, such

IN many interactive multimedia streaming applications, such 840 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 5, MAY 06 A Geoetric Approach to Server Selection for Interactive Video Streaing Yaochen Hu, Student Meber, IEEE, DiNiu, Meber, IEEE, and Zongpeng Li, Senior

More information

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada

More information

Dynamical Topology Analysis of VANET Based on Complex Networks Theory

Dynamical Topology Analysis of VANET Based on Complex Networks Theory BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 14, Special Issue Sofia 014 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.478/cait-014-0053 Dynaical Topology Analysis

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

Adaptive Holistic Scheduling for In-Network Sensor Query Processing

Adaptive Holistic Scheduling for In-Network Sensor Query Processing Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

Equation Based Congestion Control for Video Transmission over WCDMA Networks

Equation Based Congestion Control for Video Transmission over WCDMA Networks Equation Based Congestion Control for Video Transission over WCDMA Networks Antonios Alexiou, Diitrios Antonellis and Christos Bouras Research Acadeic Coputer Technology Institute, Greece and Coputer Engineering

More information

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles

More information

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches Efficient Estiation of Inclusion Coefficient using HyperLogLog Sketches Azade Nazi, Bolin Ding, Vivek Narasayya, Surajit Chaudhuri Microsoft Research {aznazi, bolind, viveknar, surajitc}@icrosoft.co ABSTRACT

More information

Multi Packet Reception and Network Coding

Multi Packet Reception and Network Coding The 2010 Military Counications Conference - Unclassified Progra - etworking Protocols and Perforance Track Multi Packet Reception and etwork Coding Aran Rezaee Research Laboratory of Electronics Massachusetts

More information

Closing The Performance Gap between Causal Consistency and Eventual Consistency

Closing The Performance Gap between Causal Consistency and Eventual Consistency Closing The Perforance Gap between Causal Consistency and Eventual Consistency Jiaqing Du Călin Iorgulescu Aitabha Roy Willy Zwaenepoel EPFL ABSTRACT It is well known that causal consistency is ore expensive

More information

COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS

COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS International Journal of Coputer Science and Counication Vol. 3, No. 1, January-June 2012, pp. 181-185 COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS A.H. Karode 1, S.R. Suralkar 2, Manoj Bagde

More information

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium 1 A Distributed Multi-service Resource Allocation Algorith in Heterogeneous Wireless Access Mediu Muhaad Isail, Student Meber, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract In this paper, radio resource

More information

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade

More information

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networs F. Mousavi Madani Departent of coputer engineering Alzahra University Tehran, Iran, osavif@alzahra.ac.ir Received:

More information

Redundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network

Redundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network (IJACSA) International Journal of Advanced Coputer Science and Applications Vol. 8, No. 1, 217 Redundancy Level Ipact of the Mean Tie to Failure on Wireless Sensor Network Alaa E. S. Ahed 1 College of

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information

Optimal Route Queries with Arbitrary Order Constraints

Optimal Route Queries with Arbitrary Order Constraints IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL.?, NO.?,? 20?? 1 Optial Route Queries with Arbitrary Order Constraints Jing Li, Yin Yang, Nikos Maoulis Abstract Given a set of spatial points DS,

More information

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural

More information

A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER

A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER VIOLETA TOMAŠEVIĆ, SLOBODAN BOJANIĆ 2 and OCTAVIO NIETO-TALADRIZ 2 The Mihajlo Pupin Institute, Volgina 5, 000 Belgrade, SERBIA AND MONTENEGRO 2 Technical University

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

Real-Time Detection of Invisible Spreaders

Real-Time Detection of Invisible Spreaders Real-Tie Detection of Invisible Spreaders MyungKeun Yoon Shigang Chen Departent of Coputer & Inforation Science & Engineering University of Florida, Gainesville, FL 3, USA {yoon, sgchen}@cise.ufl.edu Abstract

More information

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

PERFORMANCE ANALYSIS OF THE UMTS SYSTEM FOR PACKET DATA TRANSFER OVER DEDICATED CHANNELS

PERFORMANCE ANALYSIS OF THE UMTS SYSTEM FOR PACKET DATA TRANSFER OVER DEDICATED CHANNELS PERFORMACE AALSIS OF THE MTS SSTEM FOR PACKET DATA TRASFER OVER DEDICATED CHAELS Manju Sarvagya, Ratna V. Raja Kuar Departent of Electronics and Electrical Counication Engineering Indian Institute of Technology,

More information

Data & Knowledge Engineering

Data & Knowledge Engineering Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive and Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design A Fast Multi-Obective Genetic Algorith for Hardware-Software Partitioning In Ebedded Syste Design 1 M.Jagadeeswari, 2 M.C.Bhuvaneswari 1 Research Scholar, P.S.G College of Technology, Coibatore, India

More information

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se

More information

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

Generating Mechanisms for Evolving Software Mirror Graph

Generating Mechanisms for Evolving Software Mirror Graph Journal of Modern Physics, 2012, 3, 1050-1059 http://dx.doi.org/10.4236/jp.2012.39139 Published Online Septeber 2012 (http://www.scirp.org/journal/jp) Generating Mechaniss for Evolving Software Mirror

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

Performance Analysis of Exposed Terminal Effect in IEEE Ad Hoc Networks in Finite Load Conditions

Performance Analysis of Exposed Terminal Effect in IEEE Ad Hoc Networks in Finite Load Conditions Perforance Analysis of Exposed Terinal Effect in IEEE 80.11 Ad Hoc Networks in Finite Load Conditions Diitris Vassis 1, Georgios Korentzas 1 1 Dept. of Inforation and Counication Systes Engineering University

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

A Measurement-Based Model for Parallel Real-Time Tasks

A Measurement-Based Model for Parallel Real-Time Tasks A Measureent-Based Model for Parallel Real-Tie Tasks Kunal Agrawal 1 Washington University in St. Louis St. Louis, MO, USA kunal@wustl.edu https://orcid.org/0000-0001-5882-6647 Sanjoy Baruah 2 Washington

More information

MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES. Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou

MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES. Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou Departent of Coputer Science and Inforation Engineering, National Chiayi

More information

QoS and Sensible Routing Decisions

QoS and Sensible Routing Decisions QoS and Sensible Routing Decisions Erol Gelenbe Dept. of Electrical & Electronic Engineering Iperial College London SW7 2BT e.gelenbe@iperial.ac.uk Abstract Network Quality of Service (QoS) criteria of

More information

Summary. Reconstruction of data from non-uniformly spaced samples

Summary. Reconstruction of data from non-uniformly spaced samples Is there always extra bandwidth in non-unifor spatial sapling? Ralf Ferber* and Massiiliano Vassallo, WesternGeco London Technology Center; Jon-Fredrik Hopperstad and Ali Özbek, Schluberger Cabridge Research

More information

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute

More information

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao

More information

Planet Scale Software Updates

Planet Scale Software Updates Planet Scale Software Updates Christos Gkantsidis 1, Thoas Karagiannis 2, Pablo Rodriguez 1, and Milan Vojnović 1 1 Microsoft Research 2 UC Riverside Cabridge, UK Riverside, CA, USA {chrisgk,pablo,ilanv}@icrosoft.co

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl. Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable

More information

DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION

DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION www.arpnjournals.co DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION N. Snehalatha 1 and Paul Rodrigues 2 1 School of Coputing, SRM University, Chennai, Tail Nadu, India 2 Departent

More information

Image Filter Using with Gaussian Curvature and Total Variation Model

Image Filter Using with Gaussian Curvature and Total Variation Model IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.

More information

ACNS: Adaptive Complementary Neighbor Selection in BitTorrent-like Applications

ACNS: Adaptive Complementary Neighbor Selection in BitTorrent-like Applications ACNS: Adaptive Copleentary Neighbor Selection in BitTorrent-like Applications Zhenbao Zhou 1, 2, Zhenyu Li 1, 2, Gaogang Xie 1 1 Institute of Coputing Technology, Chinese Acadey of Sciences, Beijing 100190,

More information

Automatic Graph Drawing Algorithms

Automatic Graph Drawing Algorithms Autoatic Graph Drawing Algoriths Susan Si sisuz@turing.utoronto.ca Deceber 7, 996. Ebeddings of graphs have been of interest to theoreticians for soe tie, in particular those of planar graphs and graphs

More information

A Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems

A Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems A Low-cost Meory Architecture with XIP for Mobile Ebedded Systes Chanik Park, Jaeyu Seo, Sunghwan Bae, Hyojun Ki, Shinhan Ki and Busoo Ki Software Center, SAMSUNG Electronics, Co., Ltd. Seoul 135-893,

More information

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

I ve Seen Enough : Incrementally Improving Visualizations to Support Rapid Decision Making

I ve Seen Enough : Incrementally Improving Visualizations to Support Rapid Decision Making I ve Seen Enough : Increentally Iproving Visualizations to Support Rapid Decision Making Sajjadur Rahan Marya Aliakbarpour 2 Ha Kyung Kong Eric Blais 3 Karrie Karahalios,4 Aditya Paraeswaran Ronitt Rubinfield

More information

Distributed Multi-robot Work Load Partition In Manufacturing Automation

Distributed Multi-robot Work Load Partition In Manufacturing Automation th IEEE Conference on Autoation Science and Engineering Key Bridge Marriott, Washington DC, USA August 3-, Distributed Multi-robot Work Load Partition In Manufacturing Autoation Gira S Tewolde, Changhua

More information

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu

More information

Research Article A Game Theory Based Congestion Control Protocol for Wireless Personal Area Networks

Research Article A Game Theory Based Congestion Control Protocol for Wireless Personal Area Networks Journal of Sensors Volue 216, Article ID 61683, 13 pages http://dx.doi.org/1.11/216/61683 Research Article A Gae Theory Based Congestion Control Protocol for Wireless Personal Area Networks Chuang Ma,

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

Content-Centric Multicast Beamforming in Cache-Enabled Cloud Radio Access Networks

Content-Centric Multicast Beamforming in Cache-Enabled Cloud Radio Access Networks Content-Centric Multicast Beaforing in Cache-Enabled Cloud Radio Access Networks Hao Zhou, Meixia Tao, Erkai Chen, Wei Yu *Dept. of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, China

More information

Opportunistic Network Erasure Coding in Disruptive Sensor Networks

Opportunistic Network Erasure Coding in Disruptive Sensor Networks 211 Eighth IEEE International Conference on Mobile Ad-Hoc and Sensor Systems Opportunistic Networ Erasure Coding in Disruptive Sensor Networs Mingsen Xu Sensorweb Research Laboratory Georgia State University

More information

Resource Optimization for Web Service Composition

Resource Optimization for Web Service Composition Resource Optiization for Web Coposition Xia Gao, Ravi Jain, Zulfikar Razan, Ulas Kozat Abstract coposition recently eerged as a costeffective way to quickly create new services within a network. Soe research

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

THE problem of transferring a data file or data stream. Reliable Point-to-point Underwater Acoustic Data Transfer: To Juggle or Not to Juggle?

THE problem of transferring a data file or data stream. Reliable Point-to-point Underwater Acoustic Data Transfer: To Juggle or Not to Juggle? 1 Reliable Point-to-point Underwater Acoustic Data Transfer: To Juggle or Not to Juggle? Mandar Chitre, Senior Meber, IEEE, and Wee-Seng Soh, Meber, IEEE Abstract Reliable data transfer speeds using underwater

More information

Author. Published. Journal Title DOI. Copyright Statement. Downloaded from. Griffith Research Online. Kandjani, Hadi, Wen, Larry, Bernus, Peter

Author. Published. Journal Title DOI. Copyright Statement. Downloaded from. Griffith Research Online. Kandjani, Hadi, Wen, Larry, Bernus, Peter Enterprise Architecture Cybernetics for Global Mining Projects: Reducing the Structural Coplexity of Global Mining Supply Networks via Virtual Brokerage Author Kandjani, Hadi, Wen, Larry, Bernus, Peter

More information

HKBU Institutional Repository

HKBU Institutional Repository Hong Kong Baptist University HKBU Institutional Repository HKBU Staff Publication 18 Towards why-not spatial keyword top-k ueries: A direction-aware approach Lei Chen Hong Kong Baptist University, psuanle@gail.co

More information

Research Article A Novel Data Classification and Scheduling Scheme in the Virtualization of Wireless Sensor Networks

Research Article A Novel Data Classification and Scheduling Scheme in the Virtualization of Wireless Sensor Networks International Journal of Distributed Sensor Networks Volue 2013, Article ID 546708, 14 pages http://dx.doi.org/10.1155/2013/546708 Research Article A Novel Data Classification and Scheduling Schee in the

More information

Rule Extraction using Artificial Neural Networks

Rule Extraction using Artificial Neural Networks Rule Extraction using Artificial Neural Networks S. M. Karuzzaan 1 Ahed Ryadh Hasan 2 Abstract Artificial neural networks have been successfully applied to a variety of business application probles involving

More information