Bootstrapping Chord over MANETs - All Roads Lead to Rome

Size: px
Start display at page:

Download "Bootstrapping Chord over MANETs - All Roads Lead to Rome"

Transcription

1 Bootstrapping Chor over MANETs - All Roas Lea to Rome Wei Ding, Member, IEEE, S. S. Iyengar, Fellow, IEEE Abstract This paper presents a novel approach on bootstrapping Chor over mobile a hoc networs (MANETs). The approach uses only neighborhoo information to buil a ring topology in noe ID space of structure peer-to-peer (PP) networs, upon which entire Chor protocol coul be put into normal operation without lengthy stabilization. RAN protocol suite is propose. It inclues three patterns: istribute exhaustive, virtual centralize exhaustive, an ranom. Simulation results show that the istribute exhaustive pattern has optimal overall performance. Once again the superiority of ecentralization is prove. Inex Terms a hoc networs, bootstrap, Chor, peer-topeer R I. INTRODUCTION esearch effort an real worl application interact in various ways. For PP networs, the interaction is quite positive successful business applications arouse public interest an initiate active research, an research in turn brought in better application software. This is a healthy pattern. In the case of MANETs, theoretical research ominate the area for a ecae; however, except Bluetooth, no application has been wiely applie. This has set off a warning signal in the MANETs community. On the other han, the inherent homogeneity between PP systems an MANETs implies promising propobility of synergy an transplantation. Majority of research in synergy an transplantation eals with problems occurring after a stable PP networ or system has been set up over MANETs. They usually as questions lie how to transfer proven PP approaches in wire networs to MANETs. [-5] Little effort has been reflecte in publications to explore the mechanism of bootstrapping a PP networ over MANETs. Bootstrapping has largely been circumvente via unrealistic assumptions. Bootstrapping basically o two things: () configuration of noes aresses (an IDs), () setting up overlay topology. This paper focuses on the secon tas. For structure PP networs, overlay topology lays founation for other functions lie routing, file sharing, looing up, retrieval, an ata issemination. It is one of ominant factors that affect efficiency, robustness, an Wei Ding (corresponing author) is with the University of Maine at Fort Kent. Fort Kent, ME 4743, USA (phone: ; fax: ; wei.ing@maine.eu). S. S. Iyengar is with Louisiana State University, Baton Rouge, LA 783, USA ( iyengar@csc.lsu.eu). feasibility of algorithms. There are two options for bootstrapping a structure PP networ in wire networs. One is to jumpstart a networ from one or few preefine noes, in which the only way to expan the networ is noe joining. Many structure PP systems require the manual creation of a see networ in their bootstrapping protocols. A long time may be neee before a topology is reay to use. Another approach is to construct an overlay topology for each connecte component. With this option, a PP system coul avance to normal woring status immeiately after bootstrapping. Remarable avance has been achieve in topology generation in wire networs. Present state-of-art generators in wire networs can construct basic networ topologies such as line, ring, mesh, star, an tree. General topology generator, which coul construct any topology if a mathematical expression of preferre selection criteria coul be inputte, is alreay available. However, to best of our nowlege, no such topology construction protocol in MANETs has been recore in previous publications. Our proposal probably is the first successful attempt in the specific area. This paper presents Ring A-hoc Networ (RAN) protocol suite, a novel solution for bootstrapping structure PP networs over MANETs an builing a ring topology in noe ID space. On this ring, Chor [6, 7] coul be put into normal operation without lengthy stabilization. The suite inclues three patterns: istribute exhaustive, virtual centralize exhaustive, an ranom. Simulation results show that the istribute exhaustive pattern has optimal overall performance. II. RELATED WORKS Cramer an Fuhrmann s pessimistic verict [8] on bootstrapping Chor over MANETs, which almost sentence eath to the topic, has been an incentive of this research. We completely isagree with their conclusion. Serious problems coul be foun in [8]. The whole paper is built upon some unrealistic, far-fetche assumptions. For example, they assume that all noes can reach a common bootstrap noe immeiately after they power up. To mae it possible, either all noes in the MANET have to be only one away; or every noe alreay has a route to that super noe. The most unrealistic assumption states that at the time of power up an ID space ring has been set up an all noes have alreay

2 joine the this ring. This research has benefite from previous research in T- Man [9], T-Chor [], an Ring Networs (RN) []. T-Man is esigne as a general purpose istribute protocol for builing an maintaining topology in overlay networ. It is intuitive, aaptive, scalable, robust, an flexible. T-Man follows a stepwise refining proceure to increase the quality of the current set of neighbors. Key concept of T-Man is raning function, which specifies the preference for a noe to choose its neighbors in the target topology. A noe uses the raning function to calculate its neighbor set. This simple an elegant abstraction results in an effective algorithm which prouces various topologies with efficiency. It graually evolves the current topology towars the target. The convergence is fast an scalable to networ size. T-Chor efficiently bootstraps Chor from a ranom unstructure overlay using T-Man. T-Chor creates a perfect Chor topology in O(log(N)) steps. N is networ size. It shows optimize message latency. The generate networ is immeiate operable for Chor. The ol pattern of bootstrapping structure PP system uses a jumpstart noe an noe joining proceure. Noes have to be boote one by one in a slow, linear manner. T-Chor completely breas away from the ol pattern. The RN protocol is an asynchronous message-passing istribute protocol. Noes use traitional message passing in communication. Peers o not nee to be informe of any global networ state. The RN protocol is fully istribute. All peers perioically call the Closer Peer Search proceure to fin a closer successor caniate. The most serious problem with RN is that it requires a wealy connecte initial networ calle minimal bootstrapping system. It oes not specify the scale of the bootstrapping system an how the system is foun or configure. III. TOPOLOGY CONSTRUCTION OVER MANETS In wire networs lie Internet, all noes are connecte. Being neighbor is equivalent to nowing aress, which in turn is equivalent to being able to sen a message. In MANETs, not any two noes are guarantee to be connecte. Neighbor relation in MANETs is usually efine by raio range in lowest layer. It has nothing to o with structure PP ID space or overlay layer. Moreover, the neighborhoo relation in wire networs is uniirectional, while in MANETs it is biirectional an symmetric, since it is efine by raio range. In MANETs, a noe s neighbor set is fixe at a given time, while for a noe in a wire networ, it coul have countless variation. Both PP over wire networs an PP over MANETs have proximity concerns, but in MANETs this issue has more serious impact. A in MANETs is more costly than in Internet. Hence proximity optimization has more urgent, more realistic significance in MANETs. A PP networ over wire networ usually oes not inclue all intermeiate noes on its path on the Networ layer. Otherwise the networ may have too many unrelate noes. In a PP networ over a MANET, the situation is poles apart: all intermeiate noes shoul be inclue to secure connectivity on the overlay layer. IV. RAN PROTOCOL SUITE A. Introuction RAN is a protocol to buil a ring topology over MANETs. RAN has integrate merits of T-Man an Ring Networ. RAN is completely istribute, using only neighborhoo information. RAN buils an ieal ring topology for each connecte component. Upon this ring, Chor coul run immeiately without stabilization. Each noe first converts its connecte component into a component tree with itself as the root. At each step, if a noe has shorter istance from root than the current successor, it is selecte as the new successor. The process repeats till the tree is traverse. Fig. Left shows only neighborhoo relation. Mile shows original successor relation. Right is successor relation after running RAN A component tree is a spanning tree erive from the connecte component. We use the assumption of ieal networ, which is a networ with only one complete connecte component. In an ieal networ, all noes have same one noe time complexity an same one noe message complexity. The networ message complexity is the sum of one noe message complexities of all noes. Suppose M is one noe message complexity; MNet is networ message complexity. For a complete component tree with N noes, ownwar egree, an epth, + N = () = log ( N N + ) () = N N + (3) M Net = N M (4) B. Three Patterns an Three Options We esigne three patterns for RAN, namely istribute exhaustive pattern, virtual centralize exhaustive pattern, an ranom pattern. The primary concern is the trae-off between the completeness of ring an complexities of time an message. Two exhaustive patterns exhaustively search closer successor at each level of component tree. The ieal Chor ring is guarantee, because all noe IDs are compare. However, this exhaustion may suffer from high cost. Measures are neee to mitigate the overhea. These two exhaustive patterns are equally excellent in effectiveness. In

3 3 virtual centralize exhaustive pattern the searching noe serves as a central controller. The istribute exhaustive pattern has better performance for only neighbors exchange messages. The ranom pattern has its root in Ring Networ. We eliminate the minimal bootstrapping system an use a breath-first search scheme in lieu of it. All noes in a component tree of the searching noe are traverse in a cascaing manner. Three options are also efine to improve the efficiency. Plain option means no aitional option. The approximation option coul be applie to all three patterns. It loosens the en conition of search. A small fraction of noes are allowe to be left out of the final rings. In multicast option a noe sens message to all irect chilren by multicasting. It consierably improves time an message complexity. It can not be applie to the ranom pattern. C. Pattern In the istribute exhaustive pattern, the searching noe sens a Closest Successor Request message to each chil. Each chil concurrently forwars the request message to its chilren. At following levels, noes eep forwaring the request message to chilren at next level until leaf noes are reache. Then, from leaf noes up, the closest successor of the root in the subtree is calculate at the root of the subtree an returne to the parent noe in a Closest Successor message. The calculation is one by comparing the istance of returne caniates from chilren. The message complexity of noe M + satisfies ( ) M = + N, where + is the number of sippe messages of leaf noes, for they have no chilren. Let T, T u be ownwar an upwar Time cost, plug in (3), we get M = 4N 4 M Net = 4N 4N T = T u = T = T + Tu = ( +) T = ( + )(log ( N N + ) ) = O(log N ) In multicast option, M = ( + 3) N ( + ) M = ( / + 3)( N ) M Net = MN = ( / + 3)( N ) N The Closest Successor Request message nees time unit to move from one level to next, so T = Tu = T = T = log ( N N + ) = O(log N ) D. Pattern In the virtual centralize exhaustive pattern, all irect chilren noes of the root form the first level set. Direct chilren of noes in first level form the secon level, an so on. Current level noes sen their ownwar chilren set to root, so root get information of the next level. Then root sets the next level as new current level an repeats the same proceure till leaves are reache. This algorithm is most expensive in terms of overhea. However, it gives the root noe tremenous power to control whole process upon istribute networ. In real worl application, iniviualize service coul be implemente if this pattern is use. If we count a multi- message as one message, both MNet an M are inepenent of an epth ; they only epen on N. M = ( N ) M Net = ( N ) N Unlie in the istribute exhaustive pattern, almost all messages have to go through multi-s. To get precise comparison with the istribute exhaustive pattern, the message per M shoul be use. A roun trip of the getallneighbors message an AllNeighbors message at first level taes + time units. At secon level, it is +, an so on, till +. M 3 = L + M Net = NM = N i= i i = 3 T = ( + ) + ( + ) + ( + 3) + L+ ( T = N + ( + ) / i= i + i ) E. Pattern pattern is lie a RN in MANETs. To it suitable for MANETs, several changes are mae to mae it completely ecentralize an self-organize. The minimal bootstrapping system is eliminate. As its substituent, all noes in the component are mae available using a breath-first traversal. In worst case, all noes will be covere. In fact only small number of simulations really use all noes. In worst case, M consists of Ms (to launch noes into the search) an Msearch. (to search each noe). To launch noes each noe except the root receives a Start message with root inclue, so M S = N. The secon part is the sum of istance to bottom for each noe except root, M = M S + M search = ( + + L+ In each roun, ) [( + + L+ ( ) T = roun L4 + + ] + ( N ), same as in the

4 4 istribute exhaustive pattern. T = Troun N = ( + ) N = O( N log N) 9 8 Due to the limit of the page number, etaile algorithms for three patterns an their variants are not given in this paper. Please refer to full paper if intereste. V. SIMULATION Parameters teste inclue completeness (percentage of noes covere in the output ring), time, an numbers of sent an receive messages. Result with message processing rate at an per time unit are given below..9 Completeness Fig.3 Completeness in approximation option with message processing rate Completeness Fig.6 Messages receive in approximation option with message rate Fig.7 Completeness in approximation option with message processing rate Time Fig.4 Time in approximation option with message processing rate Time Fig.5 Messages sent in approximation option with message processing rate Fig.8 Time complexity in approximation option with message processing rate

5 5 Fig.9 Messages sent in approximation option with message processing rate Fig. Messages receive in approximation option with message processing rate Obviously, the winner is the istribute exhaustive pattern. It shows perfect effectiveness, at the same time an unlie the other two patterns, it has no serious sie effect to enanger its avantage. The other two, however, suffer from ifferent fatal problems. For ranom pattern, it is the effectiveness. For virtual centralize exhaustive pattern, it is efficiency. The benefit of ecentralization has shown by the istribute exhaustive pattern. This result also raises a question: coul centralization be implemente above ecentralize infrastructure? networs, the Secon WWW Wors on Emerging Applications for Wireless an Mobile Access (MobEA 4), New Yor City, NY, May 4. [4] Y. C. Hu, H. Pucha, an S. M. Das, Exploiting the Synergy between Peer-to-Peer an Mobile A Hoc Networs, in Proceeings of HotOS- IX: Ninth Wors on Hot Topics in Operating Systems, Lihue, Kauai, Hawaii, May 8-, 3. [5] Himabinu Pucha, Saumitra M. Das, Y. Charlie Hu, Eta: An Efficient DHT Substrate for Applications in Mobile A Hoc Networs, Sixth IEEE Wors on Mobile Computing Systems an Applications, pp , 4. [6] Ion Stoica, Robert Morris, Davi Karger, M. Frans Kaashoe, an Hari Balarishnan, Chor: A Scalable Peer-to-peer Looup Service for Internet Applications, In Proceeing of ACM SIGCOMM, pp. 49-6, San Diego, CA, August. [7] Fran Dabe, Emma Brunsill, M. Frans Kaashoe, Davi Karger, Robert Morris, Ion Stoica, Hari Balarishnan, Builing Peer-to-Peer Systems with Chor, a Looup Service, In the Proceeings of the 8th Wors on Hot Topics in Operating Systems (HotOS-VIII), Schloss Elmau, Germany, May. [8] Curt Cramer an Thomas Fuhrmann, Bootstrapping Chor in A Hoc Networs: Not Going Anywhere for a While, Fourth Annual IEEE International Conference on Pervasive Computing an Communications Worss (PERCOMW'6), pp. 68-7, Pisa, Italy, 6. [9] M. Jelasity an O. Babaoglu, T-Man: Gossip-base overlay topology management, In Engineering Self-Organising Applications (ESOA'5), 5. [] Alberto Montresor, Már Jelasity, Ozalp Babaoglu, "Chor on Deman," Fifth IEEE International Conference on Peer-to-Peer Computing (PP'5), pp , 5. [] Ayman Shaer an Douglas S. Reeves, Self-Stabilizing Structure Ring Topology PP Systems, Proceeing of Fifth IEEE International Conference on Peer-to-Peer Computing (PP'5), pp , 5. VI. CONCLUSION This paper proposes a novel ring construction protocol for builing Chor over MANETs. It can be extene to other popular PP systems lie Pastry. This approach inherite successful topology construction methos in PP over Internet. We believe this approach is the first successful attempt to buil ring in PP ID space over MANETs. Our RAN protocol suite is an algorithm family for ring topology construction. RAN buils perfect ring in PP ID space using only simplest multi- unicast an multicast communication primitives. No unerlying routing protocols are neee. Upon ring generate by RAN, popular PP networs lie Chor coul be immeiately starte an put into normal running without usual lengthy stabilization. RAN family inclues a variety of algorithms for ring builing. We showe the pros an cons of these algorithms, both in theory an in simulation experiments, an illustrate that the istribute exhaustive pattern is the best in terms of effectiveness an efficiency in time an messages overhea. REFERENCES [] [HGRW6] T. Heer, S. Gotz, S. Rieche, an K. Wehrle, Aapting Hash Tables for Mobile A Hoc Networs, Proceeing of Fourth Annual IEEE International Conference on Pervasive Computing an Communications Worss, pp.73 78, 6. [] [LJLQC4] Sei-yon Lee, Ju-woo Jang, Kyung-Geun Lee, Lan Quan, Tae-young Cho, A Peer-to-Peer Search Scheme over Mobile A hoc Networs, (ISPC) International Scientific-Practical Conference 4, Institute of Mathematics of National Acaemy of Sciences (IM NAS, Bishe, Kyrgyz Republic), 4. [3] [LLS4] Mei Li, Wang-Chien Lee, Anan Sivasubramaniam, Efficient peer to peer information sharing over mobile a hoc

Mobility Impact in Initializing Ring-Based P2P Systems over MANETs

Mobility Impact in Initializing Ring-Based P2P Systems over MANETs Mobility Impact in Initializing Ring-Based P2P Systems over MANETs Wei Ding University of Maine at Fort Kent Fort Kent, Maine 04743, USA wei.ding@maine.edu Alban Moreau University of Brest Brest, France

More information

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,

More information

PAPER. 1. Introduction

PAPER. 1. Introduction IEICE TRANS. COMMUN., VOL. E9x-B, No.8 AUGUST 2010 PAPER Integrating Overlay Protocols for Proviing Autonomic Services in Mobile A-hoc Networks Panagiotis Gouvas, IEICE Stuent member, Anastasios Zafeiropoulos,,

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

Pairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11:

Pairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11: airwise alignment using shortest path algorithms, Gunnar Klau, November 9,, : 3 3 airwise alignment using shortest path algorithms e will iscuss: it graph Dijkstra s algorithm algorithm (GDU) 3. References

More information

Additional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication

Additional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Aitional Divie an Conquer Algorithms Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Divie an Conquer Closest Pair Let s revisit the closest pair problem. Last

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Fast Topology Management in Large Overlay Networks

Fast Topology Management in Large Overlay Networks Topology as a key abstraction Fast Topology Management in Large Overlay Networks Ozalp Babaoglu Márk Jelasity Alberto Montresor Dipartimento di Scienze dell Informazione Università di Bologna! Topology

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

A Stochastic Process on the Hypercube with Applications to Peer to Peer Networks

A Stochastic Process on the Hypercube with Applications to Peer to Peer Networks A Stochastic Process on the Hypercube with Applications to Peer to Peer Networs [Extene Abstract] Micah Aler Department of Computer Science, University of Massachusetts, Amherst, MA 0003 460, USA micah@cs.umass.eu

More information

Frequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises

Frequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises verview Frequent Pattern Mining comprises Frequent Pattern Mining hristian Borgelt School of omputer Science University of Konstanz Universitätsstraße, Konstanz, Germany christian.borgelt@uni-konstanz.e

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Using Linearization for Global Consistency in SSR

Using Linearization for Global Consistency in SSR Using Linearization for Global Consistency in SSR Kendy Kutzner 1 and Thomas Fuhrmann 2 1 University of Karlsruhe 2 Technical University of Munich Computer Science Department Computer Science Department

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

k-nn Graph Construction: a Generic Online Approach

k-nn Graph Construction: a Generic Online Approach k-nn Graph Construction: a Generic Online Approach Wan-Lei Zhao arxiv:80.00v [cs.ir] Sep 08 Abstract Nearest neighbor search an k-nearest neighbor graph construction are two funamental issues arise from

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Based on Gravity

A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Based on Gravity Worl Applie Sciences Journal 16 (10): 1387-1392, 2012 ISSN 1818-4952 IDOSI Publications, 2012 A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Base on Gravity Aliasghar Rahmani Hosseinabai,

More information

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

1 Surprises in high dimensions

1 Surprises in high dimensions 1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

Uninformed search methods

Uninformed search methods CS 1571 Introuction to AI Lecture 4 Uninforme search methos Milos Hauskrecht milos@cs.pitt.eu 539 Sennott Square Announcements Homework assignment 1 is out Due on Thursay, September 11, 014 before the

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

Ad-Hoc Networks Beyond Unit Disk Graphs

Ad-Hoc Networks Beyond Unit Disk Graphs A-Hoc Networks Beyon Unit Disk Graphs Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 8092 Zurich, Switzerlan {kuhn, wattenhofer, zollinger}@inf.ethz.ch ABSTRACT

More information

One-to-Many Multicast Restoration Based on Dynamic Core-Based Selection Algorithm in WDM Mesh Networks

One-to-Many Multicast Restoration Based on Dynamic Core-Based Selection Algorithm in WDM Mesh Networks Proceeings of the International MultiConference of Engineers an Computer Scientists 9 Vol I IMECS 9, March 18 -, 9, Hong Kong One-to-Many Multicast Restoration Base on Dynamic Core-Base Selection Algorithm

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

Evolutionary Optimisation Methods for Template Based Image Registration

Evolutionary Optimisation Methods for Template Based Image Registration Evolutionary Optimisation Methos for Template Base Image Registration Lukasz A Machowski, Tshilizi Marwala School of Electrical an Information Engineering University of Witwatersran, Johannesburg, South

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Supporting Fully Adaptive Routing in InfiniBand Networks

Supporting Fully Adaptive Routing in InfiniBand Networks XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar

More information

A Plane Tracker for AEC-automation Applications

A Plane Tracker for AEC-automation Applications A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)

More information

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times Algorithm for Intermoal Optimal Multiestination Tour with Dynamic Travel Times Neema Nassir, Alireza Khani, Mark Hickman, an Hyunsoo Noh This paper presents an efficient algorithm that fins the intermoal

More information

Distributed Lookup in Structured Peer-to-Peer Ad-Hoc Networks

Distributed Lookup in Structured Peer-to-Peer Ad-Hoc Networks Distributed Lookup in Structured Peer-to-Peer Ad-Hoc Networks Raphaël Kummer, Peter Kropf, and Pascal Felber Computer Science Department, University of Neuchâtel, Emile-Argand 11, CP 158,CH-2009 Neuchâtel,

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

Figure 1: 2D arm. Figure 2: 2D arm with labelled angles

Figure 1: 2D arm. Figure 2: 2D arm with labelled angles 2D Kinematics Consier a robotic arm. We can sen it commans like, move that joint so it bens at an angle θ. Once we ve set each joint, that s all well an goo. More interesting, though, is the question of

More information

Efficient Recovery from False State in Distributed Routing Algorithms

Efficient Recovery from False State in Distributed Routing Algorithms Efficient Recovery from False State in Distribute Routing Algorithms Daniel Gyllstrom, Suarshan Vasuevan, Jim Kurose, Gerome Milau Department of Computer Science University of Massachusetts Amherst {pg,

More information

Dual Arm Robot Research Report

Dual Arm Robot Research Report Dual Arm Robot Research Report Analytical Inverse Kinematics Solution for Moularize Dual-Arm Robot With offset at shouler an wrist Motivation an Abstract Generally, an inustrial manipulator such as PUMA

More information

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach Nishi Sharma, Vanna Verma Abstract Wireless sensor networks (WSNs) is one of the emerging fiel of research in recent era

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -

More information

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember 107 IEICE TRANS INF & SYST, VOLE88 D, NO5 MAY 005 LETTER An Improve Neighbor Selection Algorithm in Collaborative Filtering Taek-Hun KIM a), Stuent Member an Sung-Bong YANG b), Nonmember SUMMARY Nowaays,

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information

Adjacency Matrix Based Full-Text Indexing Models

Adjacency Matrix Based Full-Text Indexing Models 1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,

More information

Solutions to Tutorial 1 (Week 8)

Solutions to Tutorial 1 (Week 8) The University of Syney School of Mathematics an Statistics Solutions to Tutorial 1 (Week 8) MATH2069/2969: Discrete Mathematics an Graph Theory Semester 1, 2018 1. In each part, etermine whether the two

More information

Mobile Chord: Enhancing P2P Application Performance over Vehicular Ad Hoc Network

Mobile Chord: Enhancing P2P Application Performance over Vehicular Ad Hoc Network : Enhancing PP Application Performance over Vehicular Ad Hoc Network Che-Liang Liu Chih-Yu Wang Hung-Yu Wei* Department of Electrical Engineering National Taiwan University Corresponding Author*:hywei@cc.ee.ntu.edu.tw

More information

Divide-and-Conquer Algorithms

Divide-and-Conquer Algorithms Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:

More information

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis

More information

Distributed Hash Table

Distributed Hash Table Distributed Hash Table P2P Routing and Searching Algorithms Ruixuan Li College of Computer Science, HUST rxli@public.wh.hb.cn http://idc.hust.edu.cn/~rxli/ In Courtesy of Xiaodong Zhang, Ohio State Univ

More information

Building a low-latency, proximity-aware DHT-based P2P network

Building a low-latency, proximity-aware DHT-based P2P network Building a low-latency, proximity-aware DHT-based P2P network Ngoc Ben DANG, Son Tung VU, Hoai Son NGUYEN Department of Computer network College of Technology, Vietnam National University, Hanoi 144 Xuan

More information

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou Scalability In Peer-to-Peer Systems Presented by Stavros Nikolaou Background on Peer-to-Peer Systems Definition: Distributed systems/applications featuring: No centralized control, no hierarchical organization

More information

Overlap Interval Partition Join

Overlap Interval Partition Join Overlap Interval Partition Join Anton Dignös Department of Computer Science University of Zürich, Switzerlan aignoes@ifi.uzh.ch Michael H. Böhlen Department of Computer Science University of Zürich, Switzerlan

More information

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpenCourseWare http://ocw.mit.eu 6.854J / 18.415J Avance Algorithms Fall 2008 For inormation about citing these materials or our Terms o Use, visit: http://ocw.mit.eu/terms. 18.415/6.854 Avance Algorithms

More information

Chapter 5 Proposed models for reconstituting/ adapting three stereoscopes

Chapter 5 Proposed models for reconstituting/ adapting three stereoscopes Chapter 5 Propose moels for reconstituting/ aapting three stereoscopes - 89 - 5. Propose moels for reconstituting/aapting three stereoscopes This chapter offers three contributions in the Stereoscopy area,

More information

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which

More information

CordEx. >> Operating instructions. English

CordEx. >> Operating instructions. English CorEx >> Operating instructions English Symbols use in this manual Important information concerning your safety is specifically marke. Follow these instructions closely to prevent accients an amage to

More information

Optimal Distributed P2P Streaming under Node Degree Bounds

Optimal Distributed P2P Streaming under Node Degree Bounds Optimal Distribute P2P Streaming uner Noe Degree Bouns Shaoquan Zhang, Ziyu Shao, Minghua Chen, an Libin Jiang Department of Information Engineering, The Chinese University of Hong Kong Department of EECS,

More information

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,

More information

On-path Cloudlet Pricing for Low Latency Application Provisioning

On-path Cloudlet Pricing for Low Latency Application Provisioning On-path Cloulet Pricing for Low Latency Application Provisioning Argyrios G. Tasiopoulos, Onur Ascigil, Ioannis Psaras, Stavros Toumpis, George Pavlou Dept. of Electronic an Electrical Engineering, University

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

Figure 1: Schematic of an SEM [source: ]

Figure 1: Schematic of an SEM [source:   ] EECI Course: -9 May 1 by R. Sanfelice Hybri Control Systems Eelco van Horssen E.P.v.Horssen@tue.nl Project: Scanning Electron Microscopy Introuction In Scanning Electron Microscopy (SEM) a (bunle) beam

More information

Optimal Oblivious Path Selection on the Mesh

Optimal Oblivious Path Selection on the Mesh Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract

More information

Collaborative Data Collection with Opportunistic Network Erasure Coding

Collaborative Data Collection with Opportunistic Network Erasure Coding 1 Collaborative Data Collection with Opportunistic Networ Erasure Coing Mingsen Xu Wen-Zhan Song Yichuan Zhao Abstract Disruptive networ communication entails transient networ connectivity, asymmetric

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

Chapter 6 PEER-TO-PEER COMPUTING

Chapter 6 PEER-TO-PEER COMPUTING Chapter 6 PEER-TO-PEER COMPUTING Distributed Computing Group Computer Networks Winter 23 / 24 Overview What is Peer-to-Peer? Dictionary Distributed Hashing Search Join & Leave Other systems Case study:

More information

A Hierarchical P2PSIP Architecture to support Skype-like services

A Hierarchical P2PSIP Architecture to support Skype-like services A Hierarchical P2PSIP Architecture to support Skype-like services Isaias Martinez-Yelmo, Carmen Guerrero, Ruben Cuevas Departamento e Ingeniería Telemática Universia Carlos III e Mari Av. Universia 30.

More information

MODULE VII. Emerging Technologies

MODULE VII. Emerging Technologies MODULE VII Emerging Technologies Computer Networks an Internets -- Moule 7 1 Spring, 2014 Copyright 2014. All rights reserve. Topics Software Define Networking The Internet Of Things Other trens in networking

More information

Chord on Demand. Ozalp Babaoglu University of Bologna, Italy. Alberto Montresor University of Bologna, Italy

Chord on Demand. Ozalp Babaoglu University of Bologna, Italy. Alberto Montresor University of Bologna, Italy Chord on Demand Alberto Montresor University of Bologna, Italy montresor@cs.unibo.it Márk Jelasity University of Bologna, Italy jelasity@cs.unibo.it Ozalp Babaoglu University of Bologna, Italy babaoglu@cs.unibo.it

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Chapter 9 Memory Management

Chapter 9 Memory Management Contents 1. Introuction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threas 6. CPU Scheuling 7. Process Synchronization 8. Dealocks 9. Memory Management 10.Virtual Memory

More information

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance International Journal of Moern Communication Technologies & Research (IJMCTR) Impact of FTP Application file size an TCP Variants on MANET Protocols Performance Abelmuti Ahme Abbasher Ali, Dr.Amin Babkir

More information

Chord on Demand. Mark Jelasity University of Bologna, Italy.

Chord on Demand. Mark Jelasity University of Bologna, Italy. Chord on Demand Alberto Montresor University of Bologna, Italy montresor@cs.unibo.it Mark Jelasity University of Bologna, Italy jelasity@cs.unibo.it Ozalp Babaoglu University of Bologna, Italy babaoglu@cs.unibo.it

More information

Discrete Markov Image Modeling and Inference on the Quadtree

Discrete Markov Image Modeling and Inference on the Quadtree 390 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 9, NO. 3, MARCH 2000 Discrete Markov Image Moeling an Inference on the Quatree Jean-Marc Laferté, Patrick Pérez, an Fabrice Heitz Abstract Noncasual Markov

More information

Design of Policy-Aware Differentially Private Algorithms

Design of Policy-Aware Differentially Private Algorithms Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft

More information

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol Min Li 1, Enhong Chen 1, and Phillip C-y Sheu 2 1 Department of Computer Science and Technology, University of Science and Technology of China,

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

Fast Fractal Image Compression using PSO Based Optimization Techniques

Fast Fractal Image Compression using PSO Based Optimization Techniques Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

Should we build Gnutella on a structured overlay? We believe

Should we build Gnutella on a structured overlay? We believe Should we build on a structured overlay? Miguel Castro, Manuel Costa and Antony Rowstron Microsoft Research, Cambridge, CB3 FB, UK Abstract There has been much interest in both unstructured and structured

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

Compiler Optimisation

Compiler Optimisation Compiler Optimisation Michael O Boyle mob@inf.e.ac.uk Room 1.06 January, 2014 1 Two recommene books for the course Recommene texts Engineering a Compiler Engineering a Compiler by K. D. Cooper an L. Torczon.

More information

CS350 - Exam 4 (100 Points)

CS350 - Exam 4 (100 Points) Fall 0 Name CS0 - Exam (00 Points).(0 points) Re-Black Trees For the Re-Black tree below, inicate where insert() woul initially occur before rebalancing/recoloring. Sketch the tree at ALL intermeiate steps

More information

Considering bounds for approximation of 2 M to 3 N

Considering bounds for approximation of 2 M to 3 N Consiering bouns for approximation of to (version. Abstract: Estimating bouns of best approximations of to is iscusse. In the first part I evelop a powerseries, which shoul give practicable limits for

More information