Analysing Real-Time Communications: Controller Area Network (CAN) *
|
|
- Audra Bond
- 6 years ago
- Views:
Transcription
1 Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination of response ties of counicating distributed processes. Although there has been soe work on the analysis of counication protocols, ost of this is for idealised networks. Experience with single processor scheduling analysis has shown that odels which abstract away fro ipleentation details are at best very pessiistic and at worst lead to unschedulable syste being deeed schedulable. In this paper, we derive idealised scheduling analysis for the CAN network, and then study two actual interface chips to see how the analysis can be applied. 1. Introduction K. W. Tindell, H. Hansson A. J. Wellings Departent of Coputer Systes, Departent of Coputer Science, University of Uppsala, Sweden University of York, England One of the fundaental difficulties in engineering hard real-tie systes is the developent of analysis to bound the tiing behaviour of the syste. Much work in recent years has been developing this analysis for a run-tie dispatching algorith known as fixed priority preeptive scheduling. This work has recently addressed the scheduling of essages on shared broadcast buses [6], and in particular token-passing and priority pre-eptive buses. The work akes certain assuptions about the ideal behaviour of the interface between the host processor and the counications adapter for these buses. However, a given ipleentation ay not eet these assuptions, and so recent research has exained a particular bus protocol and ipleentations fro a nuber of different anufacturers. This paper reports on this analysis, and shows how sall differences in the ipleentation of an interface can have draatic effects on the worst-case tiing perforance of essages. The real-tie bus we exaine in this paper is called Controller Area Network (CAN) [1]. In particular we exaine in detail two interface chips: the controller fro Intel, and the 82C200 controller fro Philips. We show how the Intel controller has a very * This work was supported in part by the U.K. EPSRC, grant nuber 06R00456 Departent of Coputer Systes, P.O. Box 325, S Uppsala, Sweden (E-ail: ken@docs.uu.se) uch better worst-case tiing perforance than the Philips controller. CAN is a broadcast bus designed to operate at speeds of up to 1 Mbit/sec. Data is transitted in essages containing between 0 and 8 bytes of data. An 11 bit nuber is associated with each essage. The identifier is required to be unique, in the sense that two siultaneously active essages originating fro different sources ust have distinct identifiers (typically, an identifier corresponds to a particular type of essage fro a specific source). The identifier serves two purposes: (1) assigning a priority to the essage, and (2) enabling receivers to filter essages. A station filters essages by only receiving essages with particular bit patterns (typically using coparitors and ask registers). Thus CAN essages have no explicit destination, since any station with an appropriate filter ay receive a essage. The use of the identifier as priority is the ost iportant part of CAN with respect to real-tie perforance. Like Ethernet, CAN is a collision-detect broadcast bus, but takes a uch ore systeatic approach to contention. The identifier field of a CAN essage is used to control access to the bus after collisions by taking advantage of certain electrical characteristics of a CAN bus: if ultiple stations are transitting concurrently and one station transits a 0, then all stations onitoring the bus will see a 0. Conversely, only if all stations transit a 1 will all processors onitoring the bus see a 1. In effect, the CAN bus acts like a large AND-gate, with each station able to see the output of the gate. This behaviour is used to resolve collisions: each station waits until bus idle (as with Ethernet). When silence is detected, each station begins to transit the highest priority essage held in its output queue whilst onitoring the bus. The identifier is the first part of the essage to be transitted; the identifier is transitted fro ost-significant to least-significant bit. If a station transits a recessive bit ( 1 ), but onitors the bus and sees a doinant bit ( 0 ), then it stops transitting since it knows that the essage it is transitting is not the highest priority essage in the syste. Because identifiers are deeed unique within the syste, a station transitting the last bit of the identifier without detecting a collision ust be transitting the highest priority
2 queued essage, and hence can start transitting the body of the essage. The CAN essage forat contains 47 bits of protocol control inforation (the identifier, CRC data, acknowledgeent and synchronisation bits, etc.). The data transission uses a bit stuffing protocol which inserts a stuff bit after five consecutive bits of the sae value. Because the nuber of inserted stuff bits depends on the bit pattern of a essage, a given essage type can vary in size, e.g. a CAN essage with 8 bytes of data (and 47 control bits) is transitted with between 0 and 19 stuff bits. 2. Counications odel & notation We define a essage to be either a data essage, or a reote transission request essage. A essage has a size (between zero and eight bytes), and an identifier (as described earlier). The set of all essages in the syste is denoted essages. In a typical syste, a essage is queued by an application task. We assue that each task is invoked repeatedly (a task is said to have arrived when invoked by soe action). Each task has a iniu inter-arrival tie tered the period. Note that the period is a iniu tie between subsequent arrivals, rather than a strict fixed interval. If the essage queued by a given task is potentially sent each tie the task is invoked, then the essage inherits a period equal to the period of the task. We denote as T the period of a given essage. A given task i has a worst-case response tie, denoted R i, which is defined as the longest tie between the arrival of a task and the tie it copletes soe bounded aount of coputation. Existing analysis for single processors is able to deterine this worst-case response tie. In general, the queuing of a essage can occur with jitter [2] (variability in queuing ties). Correct analysis requires that jitter be taken into account. Queuing jitter can be defined as the difference between the earliest and latest possible ties a given essage can be queued. As with the period, the jitter of a given essage ay be inherited fro the sender task. For an application task i (with worst-case response tie R i ) sending essage, this queuing window is no ore than R i in duration (i.e. the difference between the earliest and latest queuing ties of the essage). The jitter of a given essage is denoted J. In any realistic syste all essages will have soe queuing jitter. The worst-case response tie of a given essage is denoted R and defined as the longest tie taken for the essage to reach the destination stations, easured relative to the arrival tie of the sender task. The longest tie taken to transit a given essage we denote as C. For an eight byte essage (the largest essage peritted with CAN) transitted on a 1 Mbit/sec network, C is 130s (64 bits for the data, 47 bits of overhead CRC and identifier fields, etc. and up to 19 stuff bits). Figure 1 illustrates the tiing of a CAN essage. J R T C Figure 1: Tiing odel for CAN essages 3. Basic processor scheduling theory Scheduling essages on a CAN bus is analogous to scheduling tasks by fixed priorities. It is possible to take existing analysis and apply it to CAN essages. We therefore take a brief detour into scheduling theory for fixed priority scheduling of tasks on a single processor. Audsley et al [2] and Burns et al [3] show how the analysis of Joseph and Pandya [4] can be updated to include blocking factors introduced by periods of non-preeption, release jitter, and accurately take account of a task being non-pre-eptive for an interval before terination. The following equations represent this analysis: Ri = Ji + wi + Ci (1) where w i is given by: w i n + 1 w + J + = Bi + τ j hp( i) T j i n j res C Where hp(i) is the set of tasks of higher priority than task i, C i is the worst-case coputation tie required by a given task i, and T j is the period of a given task j. B i is the blocking factor of task i (a bound on the tie that a lower priority task can execute and prevent the execution of task i); the priority ceiling protocol [5] controls this priority inversion and defines how B i can be coputed. t res is the resolution with which we easure tie. On CAN bus we deal with tie units as ultiples of the bit-tie, which we denote as t bit ; with a 1 Mbit/sec bus this is equal to 1 s. J i is the release jitter of task i, analogous to the queuing jitter of a essage. Note that if a task is invoked by an incoing essage, then the task inherits a release jitter (and period) fro the essage (in just the sae way as a essage inherits a queuing jitter fro a sending task); this is known as attribute inheritance, and leads to an approach known as holistic scheduling (see [7] for a full treatent). The feasibility of a given task can be trivially assessed by coparing the worst-case response tie of the task against its deadline. Note that the deadline of a given task i, denoted D i is assued to be less than or equal to T i. Another assuption is that a task cannot voluntarily j (2)
3 suspend itself (and hence the processor cannot be idle when tasks have work to do). Equation 2 describes a recurrence relation, where the (n + 1)th approxiation to the value of w i is found in ters of the nth approxiation, with the first approxiation set to zero. A solution is reached when the (n + 1)th approxiation equals the nth. Having introduced this analysis we can apply it to CAN bus scheduling. We do this by first deriving ideal CAN analysis, and then discussing how the analysis is affected by the behaviour of ipleented hardware. We discuss two ipleented CAN controllers: the Intel and the Philips 82C Analysis for ideal CAN In this section we will derive scheduling analysis to bound the worst-case response tie of a given essage. The analysis of the previous section can be applied to ideal CAN by the analogy between task scheduling and essage scheduling: a task is released at soe tie (i.e. is placed in a priority-ordered queue of runnable tasks), and contends with other tasks (both lower and higher priority tasks) until it becoes the highest priority runnable task. Because of the operation of the priority ceiling protocol, a task need only contend with at ost one lower priority task. In addition, it contends with all higher priority tasks until these have all copleted and the processor is freed. With the odel of Burns et al [3], the task is then dispatched and runs until copletion. Upon copletion it is returned to the waiting queue until next ade runnable. The sae behaviour holds for CAN essages: a essage is queued at soe tie, and contends with other essages until it becoes the highest priority essage. It coences transission, and is transitted without interruption until copletion. Note that this assues that the bus cannot becoe idle between the transission of essages if there are pending essages (this is analogous to the assuption that a task ust not voluntarily suspend itself). This assuption does not hold with the Philips 82C200 controller, and we exaine the raifications of this in section 6. The worst-case response tie of a queued data essage, easured fro the arrival of the queuing task to the tie the essage is fully transitted, is given fro the analogy (equation 1) by: R = J + w + C (3) J is the queuing jitter of essage, inherited fro the worst-case response tie R sender() (where sender() denotes the task queuing essage ). The ter w represents the worst-case queuing delay the longest tie between placing the essage in a priority-ordered queue, and the essage coencing transission. By analogy with equation 2: w = B + j hp( ) w + J + τ j bit T j C where the ter B is the worst-case blocking tie of essage, and is analogous to the blocking factor defined by the analysis of the priority ceiling protocol. B is equal to the longest tie taken to transit a lower priority essage, and given by: B = ax k lp( ) ( C ) k lp() is the set of essages in the syste of lower priority than essage. If is the lowest priority essage then B is zero (just as the lowest priority task has a blocking factor of zero with the priority ceiling protocol). t bit is the tie taken to transit a bit on the bus and hp() is the set of essages in the syste of higher priority than essage. C is the longest tie taken to transit essage. As entioned earlier, CAN has a 47 bit overhead per essage, and a stuff width of 5 bits. Only 34 of the 47 bits of overhead are subject to stuffing, so C can be defined by: C 34+ 8s = 5 j (4) (5) s bit τ (6) where s is the nuber of data bytes in the essage. Equation 4 above can be solved in the sae way as equation 2. We next exaine how the analysis copes with the ipleentation details of different controllers, starting with the Intel Real-tie behaviour of the The queuing of essages in the Intel is undertaken in the controller and interfaced to the host processor via dual-ported RAM. The intention is to ap peranently essage identifiers to eory locations (tered slots), so that both outgoing and desired incoing essages are assigned unique slots. A slot is tagged with a essage identifier, and arked as an incoing or outgoing slot. If a essage is received with the sae identifier as a slot arked as incoing then the essage contents are stored in that slot (the slot also contains an interrupt enable flag so that an interrupt can be raised when the essage arrives). If the host processor wishes to initiate the transission of the essage then it is able to ark the essage as ready for transission.
4 Because of hardware liitations, only 15 slots are available for outgoing and incoing essages (instead of the ideal 2032 the full range of CAN identifiers). However, these 15 slots can be prograed to ap to any CAN identifier. The controller will transit essages in order of slot nuber, rather than the essage identifier, and therefore it is iportant that the essages are allocated to the slots in identifier order. It should be noted that in ost envisaged autootive systes, 15 essages per station is sufficient [8]. There is also a dedicated double-buffered receive buffer: when a essage has been received in the controller without errors, a essage received interrupt ay be raised on the host processor. If the identifier of the essage does not atch the identifier in one of the slots in the controller then the interrupt handler ust copy the contents of the essage fro the buffer and store it in ain eory. The handler then issues a reoved essage signal to the controller, indicating that the receive buffer is free. This is needed because the receive buffer is double buffered: while the host processor is reoving data fro one buffer, the controller ay be placing data in the other buffer. The controller needs to synchronise with the host processor in order to place data in a free buffer. There is an iplicit deadline on handling the essage received interrupt: if the host processor fails to reove the data and signal reoved essage before the controller has received the subsequent essage then any further incoing essages ay be lost (the sallest tie between two successive essages is 47 t bit ). In any ways the dual-ported eory approach is an elegant way of ipleenting a controller, but one drawback is that there is an iplicit restriction on essage deadlines: a essage cannot be queued if the previous queuing of the sae essage has not yet been transitted. Therefore, we ust have D T (an assuption also ade by the scheduling analysis in this paper). Apart fro the liitations discussed, the Intel controller behaves as an ideal CAN controller with respect to the analysis derived in this paper. 6. Real-Tie behaviour of the 82C200 In this section we discuss the behaviour of the Philips 82C200 CAN controller, and show its worst-case realtie properties are poor (space liitations preclude the developent of analysis for this controller). The Philips controller is a siple controller, with two essage buffers on-chip: a single 10 byte transission buffer, and a 10 byte double-buffered receive buffer. The controller is typically interfaced to the processor as a eory apped I/O device, and can raise two interrupts: essage received, and essage sent. The controller accepts three signals fro the host processor: send essage, abort essage, and reoved essage. The controller requires essages to be held on the host processor, and software drivers to copy the essages fro the processor to the controller when appropriate. To send a essage, the host processor fills the transit buffer with up to eight bytes of data, the identifier of the essage, and soe control bits, and then sends a transit essage signal to the controller. We denote the longest tie to do this as t copy. The controller attepts to transit the essage according to the CAN protocol; when the essage has been sent, a essage sent interrupt is raised on the host processor. The reception of essages is very siilar to the Intel controller: when a essage has been received in the controller without errors a essage received interrupt is raised on the host processor and the interrupt handler ust copy the 10 bytes of essage data fro the controller and store it in ain eory. The signal abort essage is to aid in the writing of software device drivers for pre-eptive queuing. Without the signal, the real-tie perforance of the controller would be very poor indeed. Consider the situation where there is a low priority essage in the transit buffer of the controller, and a high priority essage has just been queued by the host processor software. If the host processor were unable to reove the low priority essage, then the high priority essage would blocked until the low priority essage is sent. The low priority essage will only be sent when all other higher priority traffic on the bus has finished; this could be very long. Instead of succubing to this proble, the device driver should abort the transission of the low priority essage, and copy the high priority essage to the transit buffer. The controller will only abort the essage if it has not yet begun transission. This is a sensible approach, since if the low priority essage has begun transission then there will be only a short delay (equal to the transission tie of the essage) before the transission buffer is freed. There reains a ajor proble with the anageent of the transission buffer: the tie between essage sent and the host processor copying the next essage to the transit buffer is non-zero (although short if the host processor is fast). In this short interval the bus could be claied by a low priority essage fro another station and defer the transission of the newly copied essage. This proble also occurs when a essage is pre-epted: the short interval between a lower priority essage being aborted, and the higher priority essage being copied into the buffer, releases the bus to low priority traffic. For every pre-eption (i.e. when a essage is aborted, and replaced by a higher priority essage) in an interval, The software drivers supplied by Motorola for the 82C200 appear to exhibit this priority inversion proble.
5 the bus ay potentially be claied twice by lower priority traffic at other stations: once when the higher priority essage pre-epts, and once when the essage has been transitted. To illustrate this, consider the following scenario: a essage M is to be sent fro a given station. Also sent fro this station are a high priority essage H and a low priority essage L1. Other stations also have low priority traffic to send (essages L2, L3, and L4). In this scenario, essage M can be delayed four ties by lower priority essages whilst being pre-epted just once. This is solely a result of the buffer anageent echanis. The first delay occurs when essage M is queued: as entioned earlier, the 82C200 controller is not able to abort a essage if the essage has begun transission. Therefore essage M can be delayed by L1. After the essage has been sent, the host processor copies essage M to the transission buffer (taking at ost t copy ). In this tie the bus is released and ay becoe idle, or ay be claied by lower priority essages fro other stations. When essage M has been copied to the buffer, and is ready for transission, it ay be delayed by a lower priority essage that has just started transission fro another station (L2). Just before essage M starts transitting, a higher priority essage H can pre-ept M: the 82C200 controller aborts essage M, and copies the higher priority essage to the transission buffer. Again, the bus is released, and again lower priority essage can be transitted (L3), delaying both essage H and essage M. When essage H has been transitted the host processor copies essage M back to the transission buffer. Again, the bus is released, and again essage M can be delayed (by L4). It is straightforward to bound the delays due to this priority inversion, and the delays due to copying essages. This priority inversion can be very large, and lead to very poor worst-case perforance of the controller. The following table details a set of essages based on the above scenario. They confor to the rate onotonic odel of deadlines equal to periods. Message T D C util n H % M % L % L % L % L % In the above table, all ties are in icroseconds. Messages are assued to be queued with zero jitter. A sall value for t copy is assued: large enough to release the bus to lower priority essages when copying a essage to the transission buffer, but not large enough to for a significant part of the response tie of a essage (in practice, such a sall value would be unattainable). The exaple essage set is unschedulable: in the scenario described, we find that the response tie of essage M is 614 s. The bus utilisation in this exaple is just under 16%. By coparison, the worst-case response tie of M with the Intel controller is 224 s. It is possible to find unschedulable scenarios with bus utilisations as low as 11%. Clearly using the Philips controller could lead to very poor resource utilisation. Note that in the situation where there is a large aount of low priority soft real-tie traffic on the bus, the ipact of higher priority traffic on lower priority traffic sent fro the sae station is at least trebled when copared to the ideal CAN behaviour (and when copared to the behaviour of the Intel 82527), and that worst-case response ties will therefore be very uch larger. 7. Conclusions This paper has derived scheduling analysis for the CAN counication protocol. In particular, it has bounded essage response ties for ideal behaviour. It has shown that this ideal odel can be inadequate, and that it is necessary to consider the actual behaviour of the controller technology. Two controllers have been considered: the Intel and the Philips 82C200. The Intel controller perfors ideally, whereas the Philips controller potentially leads to a large aount of priority inversion (and hence requires the ideal analysis to be updated). This paper has considered only essage delivery, but another aspect of real-tie counication is the processing overheads incurred when sending and receiving essage. Analysis bounding such overheads can be developed (see Tindell et al [6] for a full discussion). 8. References [1] Road Vehicles Interchange of Digital Inforation Controller Area Network (CAN) for High Speed Counication, ISO/DIS (Feb. 1992). [2] Audsley, N., Burns, A., Richardson, M., Tindell, K. and Wellings, A., Applying New Scheduling Theory to Static Priority Pre-eptive Scheduling, Software Engineering Journal 8(5), pp (Sept. 1993). [3] Burns, A., Nicholson, M., Tindell, K. and Zhang, N. Allocating and Scheduling Hard Real-Tie Tasks on a Point-to-Point Distributed Syste, Proc. Workshop on Parallel and Dist. Real-Tie Syst., pp (Apr. 1993) [4] Joseph, M. and Pandya, P., Finding Response Ties in a Real-Tie Syste, Coputer J. 29(5), pp (Oct. 1986) [5] Sha, L., Lehoczky, J. P., Rajkuar, R., Priority Inheritance Protocols: An Approach to Real-Tie Synchronization, IEEE Trans. on Coputers, 39(9), pp (Sept. 1990)
6 [6] Tindell, K., Analysis of Hard Real-Tie Counications, YCS 222, Dept. Coputer Science, Univ. of York (1994) (to appear in Real-Tie Systes) [7] Tindell, K., and Clark, J., Holistic schedulability analysis for distributed hard real-tie systes, Microprocessing and Microprograing, 40(2-3), pp (Apr. 1994) [8] Tindell, K., Burns, A., Guaranteed Message Latencies for Distributed Safety Critical Hard Real-Tie Networks, YCS 229, Dept. Coputer Science, Univ. of York (1994).
Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS
Evaluation of the Tiing Properties of Two Control Networs: CAN and PROFIBUS Max Mauro Dias Santos 1, Marcelo Ricardo Steer 2 and Francisco Vasques 3 1 UnilesteMG, CEP 35170-056, Coronel Fabriciano MG Brasil.
More informationEnhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue
Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade
More informationDesign Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems
Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se
More informationAn Efficient Approach for Content Delivery in Overlay Networks
An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr
More informationScheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We
More informationImplementing and Evaluating Various Response-Time Analyses for Mixed Messages in CAN using MPS-CAN Analyzer
Ipleenting and Evaluating Various Response-Tie Analyses for Mixed s in CAN using MPS-CAN Analyzer Saad Mubeen, Jukka Mäki-Turja and Mikael Sjödin Mälardalen Real-Tie Research Centre, Mälardalen University,
More informationProbabilistic Worst-Case Response-Time Analysis for the Controller Area Network
Probabilistic Worst-Case Response-Time Analysis for the Controller Area Network Thomas Nolte, Hans Hansson, and Christer Norström Mälardalen Real-Time Research Centre Department of Computer Engineering
More informationSecure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals
Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract
More informationDesign and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design
Design and Ipleentation of Business Logic Layer Object-Oriented Design versus Relational Design Ali Alharthy Faculty of Engineering and IT University of Technology, Sydney Sydney, Australia Eail: Ali.a.alharthy@student.uts.edu.au
More informationANALYSIS OF HARD REAL-TIME COMMUNICATIONS
ANALYSIS OF HARD REAL-TIME COMMUNICATIONS Ken Tindell, Real-Time Systems Research Group, Department of Computer Science, University of York, England ABSTRACT In a distributed hard real-time system, communications
More informationModeling Parallel Applications Performance on Heterogeneous Systems
Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln
More informationTHE rapid growth and continuous change of the real
IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa
More informationDesigning High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,
More informationMAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer
MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer Departent of Coputer Science and Engineering University of South Florida Tapa, FL 33620 Abstract -- The
More informationA Measurement-Based Model for Parallel Real-Time Tasks
A Measureent-Based Model for Parallel Real-Tie Tasks Kunal Agrawal 1 Washington University in St. Louis St. Louis, MO, USA kunal@wustl.edu https://orcid.org/0000-0001-5882-6647 Sanjoy Baruah 2 Washington
More informationMAC schemes - Fixed-assignment schemes
MAC schees - Fixed-assignent schees M. Veeraraghavan, April 6, 04 Mediu Access Control (MAC) schees are echaniss for sharing a single link. MAC schees are essentially ultiplexing schees. For exaple, on
More informationJoint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points
Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University
More informationInvestigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks
Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN
International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI
More informationMapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues
Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu
More informationBP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks
BP-MAC: A High Reliable Backoff Preable MAC Protocol for Wireless Sensor Networks Alexander Klein* Jirka Klaue Josef Schalk EADS Innovation Works, Gerany *Eail: klein@inforatik.uni-wuerzburg.de ABSTRACT:
More informationcm3520 cm3525 Security Function
wwwiagisticsco c3520 c3525 Security Function Contents Contents 1 Security 11 Introduction 1-2 12 Tradearks and Registered Tradearks 1-2 13 Copliance with the ISO15408 Standard 1-2 14 Operating Precautions1-2
More informationDeterministic Voting in Distributed Systems Using Error-Correcting Codes
IEEE TRASACTIOS O PARALLEL AD DISTRIBUTED SYSTEMS, VOL. 9, O. 8, AUGUST 1998 813 Deterinistic Voting in Distributed Systes Using Error-Correcting Codes Lihao Xu and Jehoshua Bruck, Senior Meber, IEEE Abstract
More informationAdaptive Holistic Scheduling for In-Network Sensor Query Processing
Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,
More informationCollaborative Web Caching Based on Proxy Affinities
Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA
More informationClosing The Performance Gap between Causal Consistency and Eventual Consistency
Closing The Perforance Gap between Causal Consistency and Eventual Consistency Jiaqing Du Călin Iorgulescu Aitabha Roy Willy Zwaenepoel EPFL ABSTRACT It is well known that causal consistency is ore expensive
More informationData Caching for Enhancing Anonymity
Data Caching for Enhancing Anonyity Rajiv Bagai and Bin Tang Departent of Electrical Engineering and Coputer Science Wichita State University Wichita, Kansas 67260 0083, USA Eail: {rajiv.bagai, bin.tang}@wichita.edu
More informationOblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands
Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu
More informationAdaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN
Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan
More informationGrading Results Total 100
University of California, Berkeley College of Engineering Departent of Electrical Engineering and Coputer Sciences Fall 2003 Instructor: Dave Patterson 2003-11-19 v1.9 CS 152 Exa #2 Solutions Personal
More informationShortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm
International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University
More informationMulti Packet Reception and Network Coding
The 2010 Military Counications Conference - Unclassified Progra - etworking Protocols and Perforance Track Multi Packet Reception and etwork Coding Aran Rezaee Research Laboratory of Electronics Massachusetts
More informationCS 361 Meeting 8 9/24/18
CS 36 Meeting 8 9/4/8 Announceents. Hoework 3 due Friday. Review. The closure properties of regular languages provide a way to describe regular languages by building the out of sipler regular languages
More informationA High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 607-626 (2005) A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Mebership Functions * SHIH-HSU HUANG AND JIAN-YUAN LAI + Departent of
More informationPerformance Analysis of RAID in Different Workload
Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,
More informationA Network-based Seamless Handover Scheme for Multi-homed Devices
A Network-based Sealess Handover Schee for Multi-hoed Devices Md. Shohrab Hossain and Mohaed Atiquzzaan School of Coputer Science, University of Oklahoa, Noran, OK 7319 Eail: {shohrab, atiq}@ou.edu Abstract
More informationEnergy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks
Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr
More informationPerformance Analysis of Exposed Terminal Effect in IEEE Ad Hoc Networks in Finite Load Conditions
Perforance Analysis of Exposed Terinal Effect in IEEE 80.11 Ad Hoc Networks in Finite Load Conditions Diitris Vassis 1, Georgios Korentzas 1 1 Dept. of Inforation and Counication Systes Engineering University
More informationClustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering
Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into
More informationEUROPEAN ETS TELECOMMUNICATION August 1995 STANDARD
EUROPEAN ETS 300 428 TELECOMMUNICATION August 1995 STANDARD Source: ETSI TC-NA Reference: DE/NA-052619 ICS: 33.040 Key words: B-ISDN, ATM Broadband Integrated Services Digital Network (B-ISDN); Asynchronous
More informationDefining and Surveying Wireless Link Virtualization and Wireless Network Virtualization
1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,
More informationA Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network
A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University
More informationImplementation of fast motion estimation algorithms and comparison with full search method in H.264
IJCSNS International Journal of Coputer Science and Network Security, VOL.8 No.3, March 2008 139 Ipleentation of fast otion estiation algoriths and coparison with full search ethod in H.264 A.Ahadi, M.M.Azadfar
More informationλ-harmonious Graph Colouring Lauren DeDieu
λ-haronious Graph Colouring Lauren DeDieu June 12, 2012 ABSTRACT In 198, Hopcroft and Krishnaoorthy defined a new type of graph colouring called haronious colouring. Haronious colouring is a proper vertex
More informationComputer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13
Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical
More information1 Extended Boolean Model
1 EXTENDED BOOLEAN MODEL It has been well-known that the Boolean odel is too inflexible, requiring skilful use of Boolean operators to obtain good results. On the other hand, the vector space odel is flexible
More informationEquation Based Congestion Control for Video Transmission over WCDMA Networks
Equation Based Congestion Control for Video Transission over WCDMA Networks Antonios Alexiou, Diitrios Antonellis and Christos Bouras Research Acadeic Coputer Technology Institute, Greece and Coputer Engineering
More informationPERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL
IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant
More informationIntegrating fast mobility in the OLSR routing protocol
Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr
More informationData & Knowledge Engineering
Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID
More informationQUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS
QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755
More informationSurvivability Function A Measure of Disaster-Based Routing Performance
Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected
More informationMultipath Selection and Channel Assignment in Wireless Mesh Networks
Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,
More information1 P a g e. F x,x...,x,.,.' written as F D, is the same.
11. The security syste at an IT office is coposed of 10 coputers of which exactly four are working. To check whether the syste is functional, the officials inspect four of the coputers picked at rando
More informationFlucs: Artificial Lighting & Daylighting. IES Virtual Environment
Flucs: Artificial Lighting & Daylighting IES Virtual Environent Contents 1. General Description of the FLUCS Interface... 6 1.1. Coon Controls... 6 1.2. Main Application Window... 6 1.3. Other Windows...
More informationThe optimization design of microphone array layout for wideband noise sources
PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun
More informationA Soft Real-time Scheduling Server on the Windows NT
A Soft Real-tie Scheduling Server on the Windows NT Chih-han Lin, Hao-hua Chu, Klara Nahrstedt Departent of Coputer Science University of Illinois at Urbana Chapaign clin2, h-chu3, klara@cs.uiuc.edu Abstract
More informationOPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS
Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented
More informationA Hybrid Network Architecture for File Transfers
JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,
More informationCOMMUNICATIONS STRUCTURE FOR SENSOR FUSION IN DISTRIBUTED REAL TIME SYSTEMS. J.L.Posadas, P.Pérez, J.E.Simó, G.Benet, F.Blanes
COMMUNICATIONS STRUCTURE FOR SENSOR FUSION IN DISTRIBUTED REAL TIME SYSTEMS J.L.Posadas, P.Pérez, J.E.Sió, G.Benet, F.Blanes Departaento de Inforática de Sisteas y Coputadores (D.I.S.C.A.) Universidad
More informationControl Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols
Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Navodaya Garepalli Kartik Gopalan Ping Yang Coputer Science, Binghaton University (State University of New York) Contact:
More informationAn Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks
An Adaptive Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent
More informationDifferent criteria of dynamic routing
Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich
More informationPERFORMANCE ANALYSIS OF THE UMTS SYSTEM FOR PACKET DATA TRANSFER OVER DEDICATED CHANNELS
PERFORMACE AALSIS OF THE MTS SSTEM FOR PACKET DATA TRASFER OVER DEDICATED CHAELS Manju Sarvagya, Ratna V. Raja Kuar Departent of Electronics and Electrical Counication Engineering Indian Institute of Technology,
More informationAscending order sort Descending order sort
Scalable Binary Sorting Architecture Based on Rank Ordering With Linear Area-Tie Coplexity. Hatrnaz and Y. Leblebici Departent of Electrical and Coputer Engineering Worcester Polytechnic Institute Abstract
More informationA wireless sensor network for visual detection and classification of intrusions
A wireless sensor network for visual detection and classification of intrusions ANDRZEJ SLUZEK 1,3, PALANIAPPAN ANNAMALAI 2, MD SAIFUL ISLAM 1 1 School of Coputer Engineering, 2 IntelliSys Centre Nanyang
More informationA Generic Architecture for Programmable Trac. Shaper for High Speed Networks. Krishnan K. Kailas y Ashok K. Agrawala z. fkrish,
A Generic Architecture for Prograable Trac Shaper for High Speed Networks Krishnan K. Kailas y Ashok K. Agrawala z fkrish, agrawalag@cs.ud.edu y Departent of Electrical Engineering z Departent of Coputer
More informationRECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS
RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS AWNI ITRADAT Assistant Professor, Departent of Coputer Engineering, Faculty of Engineering, Hasheite University, P.O. Box 15459,
More informationDesign and Implementation of an Acyclic Stable Matching Scheduler
Design and Ipleentation of an Acyclic Stable Matching Scheduler Enyue Lu Mei Yang Yi Zhang ands.q.zheng Dept. of Coputer Science Dept. of Coputer Science Dept. of Electrical Engineering University of Texas
More informationSolving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification
Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural
More informationEE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011
EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction
More informationELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH
ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH Kulapraote Prathuchai Geoinforatics Center, Asian Institute of Technology, 58 Moo9, Klong Luang, Pathuthani, Thailand.
More informationDetection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm
Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,
More informationEffects of Interleaving on RTP Header Compression
Effects of Interleaving on RTP Header Copression Colin Perkins Jon Crowcroft Departent of Coputer Science University College London Gower Street London WCE 6BT Abstract We discuss the use of interleaving
More informationEfficient Estimation of Inclusion Coefficient using HyperLogLog Sketches
Efficient Estiation of Inclusion Coefficient using HyperLogLog Sketches Azade Nazi, Bolin Ding, Vivek Narasayya, Surajit Chaudhuri Microsoft Research {aznazi, bolind, viveknar, surajitc}@icrosoft.co ABSTRACT
More informationCOLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS
International Journal of Coputer Science and Counication Vol. 3, No. 1, January-June 2012, pp. 181-185 COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS A.H. Karode 1, S.R. Suralkar 2, Manoj Bagde
More informationNews Events Clustering Method Based on Staging Incremental Single-Pass Technique
News Events Clustering Method Based on Staging Increental Single-Pass Technique LI Yongyi 1,a *, Gao Yin 2 1 School of Electronics and Inforation Engineering QinZhou University 535099 Guangxi, China 2
More informationFair Resource Allocation for Heterogeneous Tasks
Fair Resource Allocation for Heterogeneous Tasks Koyel Mukherjee, Partha utta, Gurulingesh Raravi, Thangaraj Balasubraania, Koustuv asgupta, Atul Singh Xerox Research Center India, Bangalore, India 560105
More informationA Periodic Dynamic Load Balancing Method
2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation
More informationA Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems
A Low-cost Meory Architecture with XIP for Mobile Ebedded Systes Chanik Park, Jaeyu Seo, Sunghwan Bae, Hyojun Ki, Shinhan Ki and Busoo Ki Software Center, SAMSUNG Electronics, Co., Ltd. Seoul 135-893,
More informationUtility-Based Resource Allocation for Mixed Traffic in Wireless Networks
IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng
More informationAn Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks
An Adaptive and Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent
More informationRelocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction
Relocation of ateway for Enhanced Tieliness in Wireless Sensor Networks Keal Akkaya and Mohaed Younis Departent of oputer Science and Electrical Engineering University of Maryland, altiore ounty altiore,
More informationFair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones
Advance Access publication on 24 February 2017 The British Coputer Society 2017. All rights reserved. For Perissions, please eail: journals.perissions@oup.co doi:10.1093/cojnl/bxx015 Fair Energy-Efficient
More informationBurst Scheduling Networks. Simon S. Lam and Georey G. Xie. The University of Texas at Austin. Austin, Texas August 31, 1996.
Burst Scheduling Networks Sion S. La and Georey G. Xie Departent of Coputer Sciences The University of Texas at Austin Austin, Texas 78712-1188 August 31, 1996 Abstract Most application-level data units
More informationImage Filter Using with Gaussian Curvature and Total Variation Model
IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.
More informationA Novel Fast Constructive Algorithm for Neural Classifier
A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore
More informationGeometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem.
Noveber 13, 2016 Geoetry. The Method of the enter of Mass (ass points): Solving probles using the Law of Lever (ass points). Menelaus theore. Pappus theore. M d Theore (Law of Lever). Masses (weights)
More informationGromov-Hausdorff Distance Between Metric Graphs
Groov-Hausdorff Distance Between Metric Graphs Jiwon Choi St Mark s School January, 019 Abstract In this paper we study the Groov-Hausdorff distance between two etric graphs We copute the precise value
More informationRedundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network
(IJACSA) International Journal of Advanced Coputer Science and Applications Vol. 8, No. 1, 217 Redundancy Level Ipact of the Mean Tie to Failure on Wireless Sensor Network Alaa E. S. Ahed 1 College of
More informationDistributed Multicast Tree Construction in Wireless Sensor Networks
Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,
More informationNON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH
NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH V. Atienza; J.M. Valiente and G. Andreu Departaento de Ingeniería de Sisteas, Coputadores y Autoática Universidad Politécnica de Valencia.
More informationAbstract. for L1VPNs [2, 3] and the standardization work at the Internet Engineering Task Force (IETF) is in progress [4].
Traffic Deand Modeling for Dynaic Layer 1 VPN Serices * Joachi Scharf, Martin Köhn Uniersity of Stuttgart, Institute of Counication Networks and Coputer Engineering (IKR), Pfaffenwaldring 47, 70569 Stuttgart,
More informationOptimal Route Queries with Arbitrary Order Constraints
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL.?, NO.?,? 20?? 1 Optial Route Queries with Arbitrary Order Constraints Jing Li, Yin Yang, Nikos Maoulis Abstract Given a set of spatial points DS,
More informationDerivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router
Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of
More informationA Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem
IE Vol. 7, No. 2, pp. 84-92, Septeber 2008. A Coparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Proble Ji Ung Sun School of Industrial and Managent Engineering Hankuk University
More informationThe Internal Conflict of a Belief Function
The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of
More informationGeo-activity Recommendations by using Improved Feature Combination
Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,
More informationReal-Time Detection of Invisible Spreaders
Real-Tie Detection of Invisible Spreaders MyungKeun Yoon Shigang Chen Departent of Coputer & Inforation Science & Engineering University of Florida, Gainesville, FL 3, USA {yoon, sgchen}@cise.ufl.edu Abstract
More informationAn Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks
An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San
More information