Analysing Real-Time Communications: Controller Area Network (CAN) *

Size: px
Start display at page:

Download "Analysing Real-Time Communications: Controller Area Network (CAN) *"

Transcription

1 Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination of response ties of counicating distributed processes. Although there has been soe work on the analysis of counication protocols, ost of this is for idealised networks. Experience with single processor scheduling analysis has shown that odels which abstract away fro ipleentation details are at best very pessiistic and at worst lead to unschedulable syste being deeed schedulable. In this paper, we derive idealised scheduling analysis for the CAN network, and then study two actual interface chips to see how the analysis can be applied. 1. Introduction K. W. Tindell, H. Hansson A. J. Wellings Departent of Coputer Systes, Departent of Coputer Science, University of Uppsala, Sweden University of York, England One of the fundaental difficulties in engineering hard real-tie systes is the developent of analysis to bound the tiing behaviour of the syste. Much work in recent years has been developing this analysis for a run-tie dispatching algorith known as fixed priority preeptive scheduling. This work has recently addressed the scheduling of essages on shared broadcast buses [6], and in particular token-passing and priority pre-eptive buses. The work akes certain assuptions about the ideal behaviour of the interface between the host processor and the counications adapter for these buses. However, a given ipleentation ay not eet these assuptions, and so recent research has exained a particular bus protocol and ipleentations fro a nuber of different anufacturers. This paper reports on this analysis, and shows how sall differences in the ipleentation of an interface can have draatic effects on the worst-case tiing perforance of essages. The real-tie bus we exaine in this paper is called Controller Area Network (CAN) [1]. In particular we exaine in detail two interface chips: the controller fro Intel, and the 82C200 controller fro Philips. We show how the Intel controller has a very * This work was supported in part by the U.K. EPSRC, grant nuber 06R00456 Departent of Coputer Systes, P.O. Box 325, S Uppsala, Sweden (E-ail: ken@docs.uu.se) uch better worst-case tiing perforance than the Philips controller. CAN is a broadcast bus designed to operate at speeds of up to 1 Mbit/sec. Data is transitted in essages containing between 0 and 8 bytes of data. An 11 bit nuber is associated with each essage. The identifier is required to be unique, in the sense that two siultaneously active essages originating fro different sources ust have distinct identifiers (typically, an identifier corresponds to a particular type of essage fro a specific source). The identifier serves two purposes: (1) assigning a priority to the essage, and (2) enabling receivers to filter essages. A station filters essages by only receiving essages with particular bit patterns (typically using coparitors and ask registers). Thus CAN essages have no explicit destination, since any station with an appropriate filter ay receive a essage. The use of the identifier as priority is the ost iportant part of CAN with respect to real-tie perforance. Like Ethernet, CAN is a collision-detect broadcast bus, but takes a uch ore systeatic approach to contention. The identifier field of a CAN essage is used to control access to the bus after collisions by taking advantage of certain electrical characteristics of a CAN bus: if ultiple stations are transitting concurrently and one station transits a 0, then all stations onitoring the bus will see a 0. Conversely, only if all stations transit a 1 will all processors onitoring the bus see a 1. In effect, the CAN bus acts like a large AND-gate, with each station able to see the output of the gate. This behaviour is used to resolve collisions: each station waits until bus idle (as with Ethernet). When silence is detected, each station begins to transit the highest priority essage held in its output queue whilst onitoring the bus. The identifier is the first part of the essage to be transitted; the identifier is transitted fro ost-significant to least-significant bit. If a station transits a recessive bit ( 1 ), but onitors the bus and sees a doinant bit ( 0 ), then it stops transitting since it knows that the essage it is transitting is not the highest priority essage in the syste. Because identifiers are deeed unique within the syste, a station transitting the last bit of the identifier without detecting a collision ust be transitting the highest priority

2 queued essage, and hence can start transitting the body of the essage. The CAN essage forat contains 47 bits of protocol control inforation (the identifier, CRC data, acknowledgeent and synchronisation bits, etc.). The data transission uses a bit stuffing protocol which inserts a stuff bit after five consecutive bits of the sae value. Because the nuber of inserted stuff bits depends on the bit pattern of a essage, a given essage type can vary in size, e.g. a CAN essage with 8 bytes of data (and 47 control bits) is transitted with between 0 and 19 stuff bits. 2. Counications odel & notation We define a essage to be either a data essage, or a reote transission request essage. A essage has a size (between zero and eight bytes), and an identifier (as described earlier). The set of all essages in the syste is denoted essages. In a typical syste, a essage is queued by an application task. We assue that each task is invoked repeatedly (a task is said to have arrived when invoked by soe action). Each task has a iniu inter-arrival tie tered the period. Note that the period is a iniu tie between subsequent arrivals, rather than a strict fixed interval. If the essage queued by a given task is potentially sent each tie the task is invoked, then the essage inherits a period equal to the period of the task. We denote as T the period of a given essage. A given task i has a worst-case response tie, denoted R i, which is defined as the longest tie between the arrival of a task and the tie it copletes soe bounded aount of coputation. Existing analysis for single processors is able to deterine this worst-case response tie. In general, the queuing of a essage can occur with jitter [2] (variability in queuing ties). Correct analysis requires that jitter be taken into account. Queuing jitter can be defined as the difference between the earliest and latest possible ties a given essage can be queued. As with the period, the jitter of a given essage ay be inherited fro the sender task. For an application task i (with worst-case response tie R i ) sending essage, this queuing window is no ore than R i in duration (i.e. the difference between the earliest and latest queuing ties of the essage). The jitter of a given essage is denoted J. In any realistic syste all essages will have soe queuing jitter. The worst-case response tie of a given essage is denoted R and defined as the longest tie taken for the essage to reach the destination stations, easured relative to the arrival tie of the sender task. The longest tie taken to transit a given essage we denote as C. For an eight byte essage (the largest essage peritted with CAN) transitted on a 1 Mbit/sec network, C is 130s (64 bits for the data, 47 bits of overhead CRC and identifier fields, etc. and up to 19 stuff bits). Figure 1 illustrates the tiing of a CAN essage. J R T C Figure 1: Tiing odel for CAN essages 3. Basic processor scheduling theory Scheduling essages on a CAN bus is analogous to scheduling tasks by fixed priorities. It is possible to take existing analysis and apply it to CAN essages. We therefore take a brief detour into scheduling theory for fixed priority scheduling of tasks on a single processor. Audsley et al [2] and Burns et al [3] show how the analysis of Joseph and Pandya [4] can be updated to include blocking factors introduced by periods of non-preeption, release jitter, and accurately take account of a task being non-pre-eptive for an interval before terination. The following equations represent this analysis: Ri = Ji + wi + Ci (1) where w i is given by: w i n + 1 w + J + = Bi + τ j hp( i) T j i n j res C Where hp(i) is the set of tasks of higher priority than task i, C i is the worst-case coputation tie required by a given task i, and T j is the period of a given task j. B i is the blocking factor of task i (a bound on the tie that a lower priority task can execute and prevent the execution of task i); the priority ceiling protocol [5] controls this priority inversion and defines how B i can be coputed. t res is the resolution with which we easure tie. On CAN bus we deal with tie units as ultiples of the bit-tie, which we denote as t bit ; with a 1 Mbit/sec bus this is equal to 1 s. J i is the release jitter of task i, analogous to the queuing jitter of a essage. Note that if a task is invoked by an incoing essage, then the task inherits a release jitter (and period) fro the essage (in just the sae way as a essage inherits a queuing jitter fro a sending task); this is known as attribute inheritance, and leads to an approach known as holistic scheduling (see [7] for a full treatent). The feasibility of a given task can be trivially assessed by coparing the worst-case response tie of the task against its deadline. Note that the deadline of a given task i, denoted D i is assued to be less than or equal to T i. Another assuption is that a task cannot voluntarily j (2)

3 suspend itself (and hence the processor cannot be idle when tasks have work to do). Equation 2 describes a recurrence relation, where the (n + 1)th approxiation to the value of w i is found in ters of the nth approxiation, with the first approxiation set to zero. A solution is reached when the (n + 1)th approxiation equals the nth. Having introduced this analysis we can apply it to CAN bus scheduling. We do this by first deriving ideal CAN analysis, and then discussing how the analysis is affected by the behaviour of ipleented hardware. We discuss two ipleented CAN controllers: the Intel and the Philips 82C Analysis for ideal CAN In this section we will derive scheduling analysis to bound the worst-case response tie of a given essage. The analysis of the previous section can be applied to ideal CAN by the analogy between task scheduling and essage scheduling: a task is released at soe tie (i.e. is placed in a priority-ordered queue of runnable tasks), and contends with other tasks (both lower and higher priority tasks) until it becoes the highest priority runnable task. Because of the operation of the priority ceiling protocol, a task need only contend with at ost one lower priority task. In addition, it contends with all higher priority tasks until these have all copleted and the processor is freed. With the odel of Burns et al [3], the task is then dispatched and runs until copletion. Upon copletion it is returned to the waiting queue until next ade runnable. The sae behaviour holds for CAN essages: a essage is queued at soe tie, and contends with other essages until it becoes the highest priority essage. It coences transission, and is transitted without interruption until copletion. Note that this assues that the bus cannot becoe idle between the transission of essages if there are pending essages (this is analogous to the assuption that a task ust not voluntarily suspend itself). This assuption does not hold with the Philips 82C200 controller, and we exaine the raifications of this in section 6. The worst-case response tie of a queued data essage, easured fro the arrival of the queuing task to the tie the essage is fully transitted, is given fro the analogy (equation 1) by: R = J + w + C (3) J is the queuing jitter of essage, inherited fro the worst-case response tie R sender() (where sender() denotes the task queuing essage ). The ter w represents the worst-case queuing delay the longest tie between placing the essage in a priority-ordered queue, and the essage coencing transission. By analogy with equation 2: w = B + j hp( ) w + J + τ j bit T j C where the ter B is the worst-case blocking tie of essage, and is analogous to the blocking factor defined by the analysis of the priority ceiling protocol. B is equal to the longest tie taken to transit a lower priority essage, and given by: B = ax k lp( ) ( C ) k lp() is the set of essages in the syste of lower priority than essage. If is the lowest priority essage then B is zero (just as the lowest priority task has a blocking factor of zero with the priority ceiling protocol). t bit is the tie taken to transit a bit on the bus and hp() is the set of essages in the syste of higher priority than essage. C is the longest tie taken to transit essage. As entioned earlier, CAN has a 47 bit overhead per essage, and a stuff width of 5 bits. Only 34 of the 47 bits of overhead are subject to stuffing, so C can be defined by: C 34+ 8s = 5 j (4) (5) s bit τ (6) where s is the nuber of data bytes in the essage. Equation 4 above can be solved in the sae way as equation 2. We next exaine how the analysis copes with the ipleentation details of different controllers, starting with the Intel Real-tie behaviour of the The queuing of essages in the Intel is undertaken in the controller and interfaced to the host processor via dual-ported RAM. The intention is to ap peranently essage identifiers to eory locations (tered slots), so that both outgoing and desired incoing essages are assigned unique slots. A slot is tagged with a essage identifier, and arked as an incoing or outgoing slot. If a essage is received with the sae identifier as a slot arked as incoing then the essage contents are stored in that slot (the slot also contains an interrupt enable flag so that an interrupt can be raised when the essage arrives). If the host processor wishes to initiate the transission of the essage then it is able to ark the essage as ready for transission.

4 Because of hardware liitations, only 15 slots are available for outgoing and incoing essages (instead of the ideal 2032 the full range of CAN identifiers). However, these 15 slots can be prograed to ap to any CAN identifier. The controller will transit essages in order of slot nuber, rather than the essage identifier, and therefore it is iportant that the essages are allocated to the slots in identifier order. It should be noted that in ost envisaged autootive systes, 15 essages per station is sufficient [8]. There is also a dedicated double-buffered receive buffer: when a essage has been received in the controller without errors, a essage received interrupt ay be raised on the host processor. If the identifier of the essage does not atch the identifier in one of the slots in the controller then the interrupt handler ust copy the contents of the essage fro the buffer and store it in ain eory. The handler then issues a reoved essage signal to the controller, indicating that the receive buffer is free. This is needed because the receive buffer is double buffered: while the host processor is reoving data fro one buffer, the controller ay be placing data in the other buffer. The controller needs to synchronise with the host processor in order to place data in a free buffer. There is an iplicit deadline on handling the essage received interrupt: if the host processor fails to reove the data and signal reoved essage before the controller has received the subsequent essage then any further incoing essages ay be lost (the sallest tie between two successive essages is 47 t bit ). In any ways the dual-ported eory approach is an elegant way of ipleenting a controller, but one drawback is that there is an iplicit restriction on essage deadlines: a essage cannot be queued if the previous queuing of the sae essage has not yet been transitted. Therefore, we ust have D T (an assuption also ade by the scheduling analysis in this paper). Apart fro the liitations discussed, the Intel controller behaves as an ideal CAN controller with respect to the analysis derived in this paper. 6. Real-Tie behaviour of the 82C200 In this section we discuss the behaviour of the Philips 82C200 CAN controller, and show its worst-case realtie properties are poor (space liitations preclude the developent of analysis for this controller). The Philips controller is a siple controller, with two essage buffers on-chip: a single 10 byte transission buffer, and a 10 byte double-buffered receive buffer. The controller is typically interfaced to the processor as a eory apped I/O device, and can raise two interrupts: essage received, and essage sent. The controller accepts three signals fro the host processor: send essage, abort essage, and reoved essage. The controller requires essages to be held on the host processor, and software drivers to copy the essages fro the processor to the controller when appropriate. To send a essage, the host processor fills the transit buffer with up to eight bytes of data, the identifier of the essage, and soe control bits, and then sends a transit essage signal to the controller. We denote the longest tie to do this as t copy. The controller attepts to transit the essage according to the CAN protocol; when the essage has been sent, a essage sent interrupt is raised on the host processor. The reception of essages is very siilar to the Intel controller: when a essage has been received in the controller without errors a essage received interrupt is raised on the host processor and the interrupt handler ust copy the 10 bytes of essage data fro the controller and store it in ain eory. The signal abort essage is to aid in the writing of software device drivers for pre-eptive queuing. Without the signal, the real-tie perforance of the controller would be very poor indeed. Consider the situation where there is a low priority essage in the transit buffer of the controller, and a high priority essage has just been queued by the host processor software. If the host processor were unable to reove the low priority essage, then the high priority essage would blocked until the low priority essage is sent. The low priority essage will only be sent when all other higher priority traffic on the bus has finished; this could be very long. Instead of succubing to this proble, the device driver should abort the transission of the low priority essage, and copy the high priority essage to the transit buffer. The controller will only abort the essage if it has not yet begun transission. This is a sensible approach, since if the low priority essage has begun transission then there will be only a short delay (equal to the transission tie of the essage) before the transission buffer is freed. There reains a ajor proble with the anageent of the transission buffer: the tie between essage sent and the host processor copying the next essage to the transit buffer is non-zero (although short if the host processor is fast). In this short interval the bus could be claied by a low priority essage fro another station and defer the transission of the newly copied essage. This proble also occurs when a essage is pre-epted: the short interval between a lower priority essage being aborted, and the higher priority essage being copied into the buffer, releases the bus to low priority traffic. For every pre-eption (i.e. when a essage is aborted, and replaced by a higher priority essage) in an interval, The software drivers supplied by Motorola for the 82C200 appear to exhibit this priority inversion proble.

5 the bus ay potentially be claied twice by lower priority traffic at other stations: once when the higher priority essage pre-epts, and once when the essage has been transitted. To illustrate this, consider the following scenario: a essage M is to be sent fro a given station. Also sent fro this station are a high priority essage H and a low priority essage L1. Other stations also have low priority traffic to send (essages L2, L3, and L4). In this scenario, essage M can be delayed four ties by lower priority essages whilst being pre-epted just once. This is solely a result of the buffer anageent echanis. The first delay occurs when essage M is queued: as entioned earlier, the 82C200 controller is not able to abort a essage if the essage has begun transission. Therefore essage M can be delayed by L1. After the essage has been sent, the host processor copies essage M to the transission buffer (taking at ost t copy ). In this tie the bus is released and ay becoe idle, or ay be claied by lower priority essages fro other stations. When essage M has been copied to the buffer, and is ready for transission, it ay be delayed by a lower priority essage that has just started transission fro another station (L2). Just before essage M starts transitting, a higher priority essage H can pre-ept M: the 82C200 controller aborts essage M, and copies the higher priority essage to the transission buffer. Again, the bus is released, and again lower priority essage can be transitted (L3), delaying both essage H and essage M. When essage H has been transitted the host processor copies essage M back to the transission buffer. Again, the bus is released, and again essage M can be delayed (by L4). It is straightforward to bound the delays due to this priority inversion, and the delays due to copying essages. This priority inversion can be very large, and lead to very poor worst-case perforance of the controller. The following table details a set of essages based on the above scenario. They confor to the rate onotonic odel of deadlines equal to periods. Message T D C util n H % M % L % L % L % L % In the above table, all ties are in icroseconds. Messages are assued to be queued with zero jitter. A sall value for t copy is assued: large enough to release the bus to lower priority essages when copying a essage to the transission buffer, but not large enough to for a significant part of the response tie of a essage (in practice, such a sall value would be unattainable). The exaple essage set is unschedulable: in the scenario described, we find that the response tie of essage M is 614 s. The bus utilisation in this exaple is just under 16%. By coparison, the worst-case response tie of M with the Intel controller is 224 s. It is possible to find unschedulable scenarios with bus utilisations as low as 11%. Clearly using the Philips controller could lead to very poor resource utilisation. Note that in the situation where there is a large aount of low priority soft real-tie traffic on the bus, the ipact of higher priority traffic on lower priority traffic sent fro the sae station is at least trebled when copared to the ideal CAN behaviour (and when copared to the behaviour of the Intel 82527), and that worst-case response ties will therefore be very uch larger. 7. Conclusions This paper has derived scheduling analysis for the CAN counication protocol. In particular, it has bounded essage response ties for ideal behaviour. It has shown that this ideal odel can be inadequate, and that it is necessary to consider the actual behaviour of the controller technology. Two controllers have been considered: the Intel and the Philips 82C200. The Intel controller perfors ideally, whereas the Philips controller potentially leads to a large aount of priority inversion (and hence requires the ideal analysis to be updated). This paper has considered only essage delivery, but another aspect of real-tie counication is the processing overheads incurred when sending and receiving essage. Analysis bounding such overheads can be developed (see Tindell et al [6] for a full discussion). 8. References [1] Road Vehicles Interchange of Digital Inforation Controller Area Network (CAN) for High Speed Counication, ISO/DIS (Feb. 1992). [2] Audsley, N., Burns, A., Richardson, M., Tindell, K. and Wellings, A., Applying New Scheduling Theory to Static Priority Pre-eptive Scheduling, Software Engineering Journal 8(5), pp (Sept. 1993). [3] Burns, A., Nicholson, M., Tindell, K. and Zhang, N. Allocating and Scheduling Hard Real-Tie Tasks on a Point-to-Point Distributed Syste, Proc. Workshop on Parallel and Dist. Real-Tie Syst., pp (Apr. 1993) [4] Joseph, M. and Pandya, P., Finding Response Ties in a Real-Tie Syste, Coputer J. 29(5), pp (Oct. 1986) [5] Sha, L., Lehoczky, J. P., Rajkuar, R., Priority Inheritance Protocols: An Approach to Real-Tie Synchronization, IEEE Trans. on Coputers, 39(9), pp (Sept. 1990)

6 [6] Tindell, K., Analysis of Hard Real-Tie Counications, YCS 222, Dept. Coputer Science, Univ. of York (1994) (to appear in Real-Tie Systes) [7] Tindell, K., and Clark, J., Holistic schedulability analysis for distributed hard real-tie systes, Microprocessing and Microprograing, 40(2-3), pp (Apr. 1994) [8] Tindell, K., Burns, A., Guaranteed Message Latencies for Distributed Safety Critical Hard Real-Tie Networks, YCS 229, Dept. Coputer Science, Univ. of York (1994).

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS Evaluation of the Tiing Properties of Two Control Networs: CAN and PROFIBUS Max Mauro Dias Santos 1, Marcelo Ricardo Steer 2 and Francisco Vasques 3 1 UnilesteMG, CEP 35170-056, Coronel Fabriciano MG Brasil.

More information

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade

More information

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We

More information

Implementing and Evaluating Various Response-Time Analyses for Mixed Messages in CAN using MPS-CAN Analyzer

Implementing and Evaluating Various Response-Time Analyses for Mixed Messages in CAN using MPS-CAN Analyzer Ipleenting and Evaluating Various Response-Tie Analyses for Mixed s in CAN using MPS-CAN Analyzer Saad Mubeen, Jukka Mäki-Turja and Mikael Sjödin Mälardalen Real-Tie Research Centre, Mälardalen University,

More information

Probabilistic Worst-Case Response-Time Analysis for the Controller Area Network

Probabilistic Worst-Case Response-Time Analysis for the Controller Area Network Probabilistic Worst-Case Response-Time Analysis for the Controller Area Network Thomas Nolte, Hans Hansson, and Christer Norström Mälardalen Real-Time Research Centre Department of Computer Engineering

More information

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract

More information

Design and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design

Design and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design Design and Ipleentation of Business Logic Layer Object-Oriented Design versus Relational Design Ali Alharthy Faculty of Engineering and IT University of Technology, Sydney Sydney, Australia Eail: Ali.a.alharthy@student.uts.edu.au

More information

ANALYSIS OF HARD REAL-TIME COMMUNICATIONS

ANALYSIS OF HARD REAL-TIME COMMUNICATIONS ANALYSIS OF HARD REAL-TIME COMMUNICATIONS Ken Tindell, Real-Time Systems Research Group, Department of Computer Science, University of York, England ABSTRACT In a distributed hard real-time system, communications

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer Departent of Coputer Science and Engineering University of South Florida Tapa, FL 33620 Abstract -- The

More information

A Measurement-Based Model for Parallel Real-Time Tasks

A Measurement-Based Model for Parallel Real-Time Tasks A Measureent-Based Model for Parallel Real-Tie Tasks Kunal Agrawal 1 Washington University in St. Louis St. Louis, MO, USA kunal@wustl.edu https://orcid.org/0000-0001-5882-6647 Sanjoy Baruah 2 Washington

More information

MAC schemes - Fixed-assignment schemes

MAC schemes - Fixed-assignment schemes MAC schees - Fixed-assignent schees M. Veeraraghavan, April 6, 04 Mediu Access Control (MAC) schees are echaniss for sharing a single link. MAC schees are essentially ultiplexing schees. For exaple, on

More information

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI

More information

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu

More information

BP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks

BP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks BP-MAC: A High Reliable Backoff Preable MAC Protocol for Wireless Sensor Networks Alexander Klein* Jirka Klaue Josef Schalk EADS Innovation Works, Gerany *Eail: klein@inforatik.uni-wuerzburg.de ABSTRACT:

More information

cm3520 cm3525 Security Function

cm3520 cm3525 Security Function wwwiagisticsco c3520 c3525 Security Function Contents Contents 1 Security 11 Introduction 1-2 12 Tradearks and Registered Tradearks 1-2 13 Copliance with the ISO15408 Standard 1-2 14 Operating Precautions1-2

More information

Deterministic Voting in Distributed Systems Using Error-Correcting Codes

Deterministic Voting in Distributed Systems Using Error-Correcting Codes IEEE TRASACTIOS O PARALLEL AD DISTRIBUTED SYSTEMS, VOL. 9, O. 8, AUGUST 1998 813 Deterinistic Voting in Distributed Systes Using Error-Correcting Codes Lihao Xu and Jehoshua Bruck, Senior Meber, IEEE Abstract

More information

Adaptive Holistic Scheduling for In-Network Sensor Query Processing

Adaptive Holistic Scheduling for In-Network Sensor Query Processing Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,

More information

Collaborative Web Caching Based on Proxy Affinities

Collaborative Web Caching Based on Proxy Affinities Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA

More information

Closing The Performance Gap between Causal Consistency and Eventual Consistency

Closing The Performance Gap between Causal Consistency and Eventual Consistency Closing The Perforance Gap between Causal Consistency and Eventual Consistency Jiaqing Du Călin Iorgulescu Aitabha Roy Willy Zwaenepoel EPFL ABSTRACT It is well known that causal consistency is ore expensive

More information

Data Caching for Enhancing Anonymity

Data Caching for Enhancing Anonymity Data Caching for Enhancing Anonyity Rajiv Bagai and Bin Tang Departent of Electrical Engineering and Coputer Science Wichita State University Wichita, Kansas 67260 0083, USA Eail: {rajiv.bagai, bin.tang}@wichita.edu

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan

More information

Grading Results Total 100

Grading Results Total 100 University of California, Berkeley College of Engineering Departent of Electrical Engineering and Coputer Sciences Fall 2003 Instructor: Dave Patterson 2003-11-19 v1.9 CS 152 Exa #2 Solutions Personal

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information

Multi Packet Reception and Network Coding

Multi Packet Reception and Network Coding The 2010 Military Counications Conference - Unclassified Progra - etworking Protocols and Perforance Track Multi Packet Reception and etwork Coding Aran Rezaee Research Laboratory of Electronics Massachusetts

More information

CS 361 Meeting 8 9/24/18

CS 361 Meeting 8 9/24/18 CS 36 Meeting 8 9/4/8 Announceents. Hoework 3 due Friday. Review. The closure properties of regular languages provide a way to describe regular languages by building the out of sipler regular languages

More information

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions *

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 607-626 (2005) A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Mebership Functions * SHIH-HSU HUANG AND JIAN-YUAN LAI + Departent of

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

A Network-based Seamless Handover Scheme for Multi-homed Devices

A Network-based Seamless Handover Scheme for Multi-homed Devices A Network-based Sealess Handover Schee for Multi-hoed Devices Md. Shohrab Hossain and Mohaed Atiquzzaan School of Coputer Science, University of Oklahoa, Noran, OK 7319 Eail: {shohrab, atiq}@ou.edu Abstract

More information

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

Performance Analysis of Exposed Terminal Effect in IEEE Ad Hoc Networks in Finite Load Conditions

Performance Analysis of Exposed Terminal Effect in IEEE Ad Hoc Networks in Finite Load Conditions Perforance Analysis of Exposed Terinal Effect in IEEE 80.11 Ad Hoc Networks in Finite Load Conditions Diitris Vassis 1, Georgios Korentzas 1 1 Dept. of Inforation and Counication Systes Engineering University

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

EUROPEAN ETS TELECOMMUNICATION August 1995 STANDARD

EUROPEAN ETS TELECOMMUNICATION August 1995 STANDARD EUROPEAN ETS 300 428 TELECOMMUNICATION August 1995 STANDARD Source: ETSI TC-NA Reference: DE/NA-052619 ICS: 33.040 Key words: B-ISDN, ATM Broadband Integrated Services Digital Network (B-ISDN); Asynchronous

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University

More information

Implementation of fast motion estimation algorithms and comparison with full search method in H.264

Implementation of fast motion estimation algorithms and comparison with full search method in H.264 IJCSNS International Journal of Coputer Science and Network Security, VOL.8 No.3, March 2008 139 Ipleentation of fast otion estiation algoriths and coparison with full search ethod in H.264 A.Ahadi, M.M.Azadfar

More information

λ-harmonious Graph Colouring Lauren DeDieu

λ-harmonious Graph Colouring Lauren DeDieu λ-haronious Graph Colouring Lauren DeDieu June 12, 2012 ABSTRACT In 198, Hopcroft and Krishnaoorthy defined a new type of graph colouring called haronious colouring. Haronious colouring is a proper vertex

More information

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13 Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical

More information

1 Extended Boolean Model

1 Extended Boolean Model 1 EXTENDED BOOLEAN MODEL It has been well-known that the Boolean odel is too inflexible, requiring skilful use of Boolean operators to obtain good results. On the other hand, the vector space odel is flexible

More information

Equation Based Congestion Control for Video Transmission over WCDMA Networks

Equation Based Congestion Control for Video Transmission over WCDMA Networks Equation Based Congestion Control for Video Transission over WCDMA Networks Antonios Alexiou, Diitrios Antonellis and Christos Bouras Research Acadeic Coputer Technology Institute, Greece and Coputer Engineering

More information

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant

More information

Integrating fast mobility in the OLSR routing protocol

Integrating fast mobility in the OLSR routing protocol Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr

More information

Data & Knowledge Engineering

Data & Knowledge Engineering Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

Survivability Function A Measure of Disaster-Based Routing Performance

Survivability Function A Measure of Disaster-Based Routing Performance Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected

More information

Multipath Selection and Channel Assignment in Wireless Mesh Networks

Multipath Selection and Channel Assignment in Wireless Mesh Networks Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,

More information

1 P a g e. F x,x...,x,.,.' written as F D, is the same.

1 P a g e. F x,x...,x,.,.' written as F D, is the same. 11. The security syste at an IT office is coposed of 10 coputers of which exactly four are working. To check whether the syste is functional, the officials inspect four of the coputers picked at rando

More information

Flucs: Artificial Lighting & Daylighting. IES Virtual Environment

Flucs: Artificial Lighting & Daylighting. IES Virtual Environment Flucs: Artificial Lighting & Daylighting IES Virtual Environent Contents 1. General Description of the FLUCS Interface... 6 1.1. Coon Controls... 6 1.2. Main Application Window... 6 1.3. Other Windows...

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

A Soft Real-time Scheduling Server on the Windows NT

A Soft Real-time Scheduling Server on the Windows NT A Soft Real-tie Scheduling Server on the Windows NT Chih-han Lin, Hao-hua Chu, Klara Nahrstedt Departent of Coputer Science University of Illinois at Urbana Chapaign clin2, h-chu3, klara@cs.uiuc.edu Abstract

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

A Hybrid Network Architecture for File Transfers

A Hybrid Network Architecture for File Transfers JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,

More information

COMMUNICATIONS STRUCTURE FOR SENSOR FUSION IN DISTRIBUTED REAL TIME SYSTEMS. J.L.Posadas, P.Pérez, J.E.Simó, G.Benet, F.Blanes

COMMUNICATIONS STRUCTURE FOR SENSOR FUSION IN DISTRIBUTED REAL TIME SYSTEMS. J.L.Posadas, P.Pérez, J.E.Simó, G.Benet, F.Blanes COMMUNICATIONS STRUCTURE FOR SENSOR FUSION IN DISTRIBUTED REAL TIME SYSTEMS J.L.Posadas, P.Pérez, J.E.Sió, G.Benet, F.Blanes Departaento de Inforática de Sisteas y Coputadores (D.I.S.C.A.) Universidad

More information

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Navodaya Garepalli Kartik Gopalan Ping Yang Coputer Science, Binghaton University (State University of New York) Contact:

More information

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

PERFORMANCE ANALYSIS OF THE UMTS SYSTEM FOR PACKET DATA TRANSFER OVER DEDICATED CHANNELS

PERFORMANCE ANALYSIS OF THE UMTS SYSTEM FOR PACKET DATA TRANSFER OVER DEDICATED CHANNELS PERFORMACE AALSIS OF THE MTS SSTEM FOR PACKET DATA TRASFER OVER DEDICATED CHAELS Manju Sarvagya, Ratna V. Raja Kuar Departent of Electronics and Electrical Counication Engineering Indian Institute of Technology,

More information

Ascending order sort Descending order sort

Ascending order sort Descending order sort Scalable Binary Sorting Architecture Based on Rank Ordering With Linear Area-Tie Coplexity. Hatrnaz and Y. Leblebici Departent of Electrical and Coputer Engineering Worcester Polytechnic Institute Abstract

More information

A wireless sensor network for visual detection and classification of intrusions

A wireless sensor network for visual detection and classification of intrusions A wireless sensor network for visual detection and classification of intrusions ANDRZEJ SLUZEK 1,3, PALANIAPPAN ANNAMALAI 2, MD SAIFUL ISLAM 1 1 School of Coputer Engineering, 2 IntelliSys Centre Nanyang

More information

A Generic Architecture for Programmable Trac. Shaper for High Speed Networks. Krishnan K. Kailas y Ashok K. Agrawala z. fkrish,

A Generic Architecture for Programmable Trac. Shaper for High Speed Networks. Krishnan K. Kailas y Ashok K. Agrawala z. fkrish, A Generic Architecture for Prograable Trac Shaper for High Speed Networks Krishnan K. Kailas y Ashok K. Agrawala z fkrish, agrawalag@cs.ud.edu y Departent of Electrical Engineering z Departent of Coputer

More information

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS AWNI ITRADAT Assistant Professor, Departent of Coputer Engineering, Faculty of Engineering, Hasheite University, P.O. Box 15459,

More information

Design and Implementation of an Acyclic Stable Matching Scheduler

Design and Implementation of an Acyclic Stable Matching Scheduler Design and Ipleentation of an Acyclic Stable Matching Scheduler Enyue Lu Mei Yang Yi Zhang ands.q.zheng Dept. of Coputer Science Dept. of Coputer Science Dept. of Electrical Engineering University of Texas

More information

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH Kulapraote Prathuchai Geoinforatics Center, Asian Institute of Technology, 58 Moo9, Klong Luang, Pathuthani, Thailand.

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

Effects of Interleaving on RTP Header Compression

Effects of Interleaving on RTP Header Compression Effects of Interleaving on RTP Header Copression Colin Perkins Jon Crowcroft Departent of Coputer Science University College London Gower Street London WCE 6BT Abstract We discuss the use of interleaving

More information

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches Efficient Estiation of Inclusion Coefficient using HyperLogLog Sketches Azade Nazi, Bolin Ding, Vivek Narasayya, Surajit Chaudhuri Microsoft Research {aznazi, bolind, viveknar, surajitc}@icrosoft.co ABSTRACT

More information

COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS

COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS International Journal of Coputer Science and Counication Vol. 3, No. 1, January-June 2012, pp. 181-185 COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS A.H. Karode 1, S.R. Suralkar 2, Manoj Bagde

More information

News Events Clustering Method Based on Staging Incremental Single-Pass Technique

News Events Clustering Method Based on Staging Incremental Single-Pass Technique News Events Clustering Method Based on Staging Increental Single-Pass Technique LI Yongyi 1,a *, Gao Yin 2 1 School of Electronics and Inforation Engineering QinZhou University 535099 Guangxi, China 2

More information

Fair Resource Allocation for Heterogeneous Tasks

Fair Resource Allocation for Heterogeneous Tasks Fair Resource Allocation for Heterogeneous Tasks Koyel Mukherjee, Partha utta, Gurulingesh Raravi, Thangaraj Balasubraania, Koustuv asgupta, Atul Singh Xerox Research Center India, Bangalore, India 560105

More information

A Periodic Dynamic Load Balancing Method

A Periodic Dynamic Load Balancing Method 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation

More information

A Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems

A Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems A Low-cost Meory Architecture with XIP for Mobile Ebedded Systes Chanik Park, Jaeyu Seo, Sunghwan Bae, Hyojun Ki, Shinhan Ki and Busoo Ki Software Center, SAMSUNG Electronics, Co., Ltd. Seoul 135-893,

More information

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive and Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction Relocation of ateway for Enhanced Tieliness in Wireless Sensor Networks Keal Akkaya and Mohaed Younis Departent of oputer Science and Electrical Engineering University of Maryland, altiore ounty altiore,

More information

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones Advance Access publication on 24 February 2017 The British Coputer Society 2017. All rights reserved. For Perissions, please eail: journals.perissions@oup.co doi:10.1093/cojnl/bxx015 Fair Energy-Efficient

More information

Burst Scheduling Networks. Simon S. Lam and Georey G. Xie. The University of Texas at Austin. Austin, Texas August 31, 1996.

Burst Scheduling Networks. Simon S. Lam and Georey G. Xie. The University of Texas at Austin. Austin, Texas August 31, 1996. Burst Scheduling Networks Sion S. La and Georey G. Xie Departent of Coputer Sciences The University of Texas at Austin Austin, Texas 78712-1188 August 31, 1996 Abstract Most application-level data units

More information

Image Filter Using with Gaussian Curvature and Total Variation Model

Image Filter Using with Gaussian Curvature and Total Variation Model IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

Geometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem.

Geometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem. Noveber 13, 2016 Geoetry. The Method of the enter of Mass (ass points): Solving probles using the Law of Lever (ass points). Menelaus theore. Pappus theore. M d Theore (Law of Lever). Masses (weights)

More information

Gromov-Hausdorff Distance Between Metric Graphs

Gromov-Hausdorff Distance Between Metric Graphs Groov-Hausdorff Distance Between Metric Graphs Jiwon Choi St Mark s School January, 019 Abstract In this paper we study the Groov-Hausdorff distance between two etric graphs We copute the precise value

More information

Redundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network

Redundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network (IJACSA) International Journal of Advanced Coputer Science and Applications Vol. 8, No. 1, 217 Redundancy Level Ipact of the Mean Tie to Failure on Wireless Sensor Network Alaa E. S. Ahed 1 College of

More information

Distributed Multicast Tree Construction in Wireless Sensor Networks

Distributed Multicast Tree Construction in Wireless Sensor Networks Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,

More information

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH V. Atienza; J.M. Valiente and G. Andreu Departaento de Ingeniería de Sisteas, Coputadores y Autoática Universidad Politécnica de Valencia.

More information

Abstract. for L1VPNs [2, 3] and the standardization work at the Internet Engineering Task Force (IETF) is in progress [4].

Abstract. for L1VPNs [2, 3] and the standardization work at the Internet Engineering Task Force (IETF) is in progress [4]. Traffic Deand Modeling for Dynaic Layer 1 VPN Serices * Joachi Scharf, Martin Köhn Uniersity of Stuttgart, Institute of Counication Networks and Coputer Engineering (IKR), Pfaffenwaldring 47, 70569 Stuttgart,

More information

Optimal Route Queries with Arbitrary Order Constraints

Optimal Route Queries with Arbitrary Order Constraints IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL.?, NO.?,? 20?? 1 Optial Route Queries with Arbitrary Order Constraints Jing Li, Yin Yang, Nikos Maoulis Abstract Given a set of spatial points DS,

More information

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of

More information

A Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem

A Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem IE Vol. 7, No. 2, pp. 84-92, Septeber 2008. A Coparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Proble Ji Ung Sun School of Industrial and Managent Engineering Hankuk University

More information

The Internal Conflict of a Belief Function

The Internal Conflict of a Belief Function The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

Real-Time Detection of Invisible Spreaders

Real-Time Detection of Invisible Spreaders Real-Tie Detection of Invisible Spreaders MyungKeun Yoon Shigang Chen Departent of Coputer & Inforation Science & Engineering University of Florida, Gainesville, FL 3, USA {yoon, sgchen}@cise.ufl.edu Abstract

More information

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San

More information