Multi Packet Reception and Network Coding

Size: px
Start display at page:

Download "Multi Packet Reception and Network Coding"

Transcription

1 The 2010 Military Counications Conference - Unclassified Progra - etworking Protocols and Perforance Track Multi Packet Reception and etwork Coding Aran Rezaee Research Laboratory of Electronics Massachusetts Institute of Technology Cabridge, MA. Eail: aranr@it.edu Linda Zeger MIT Lincoln Laboratory Lexington, MA. Eail: zeger@ll.it.edu Muriel Médard Research Laboratory of Electronics Massachusetts Institute of Technology Cabridge, MA. Eail: edard@it.edu Abstract We consider throughput and delay gains resulting fro network coding used to copleent ultipacket reception in a fully connected network with broadcast traffic. The network is coprised of nodes, J of which have data packets to be distributed to all other nodes. Owing to half-duplex constraints, a transitting node is not able to receive data fro other transitting nodes in the sae tie slot. This requires a node to be back-filled with the inforation that it is issing. We consider singlepacket reception, (for which network coding alone yields no gain), ulti-packet reception without network coding, and cobined ulti-packet reception and network coding. We show that the initial transissions and the back-filling process can be greatly sped up through a cobination of network coding and ulti-packet reception. In particular, we show that MPR capability of 2 will not reduce the total delivery tie for packets within a data network unless network coding is used. We also deonstrate that a cobination of network coding and ulti-packet reception can reduce this tie by a factor of, where is the MPR capability of the syste. We deonstrate that network coding can substitute for soe degree of MPR and achieve the sae, or alost the sae, perforance as the higher degree of MPR without network coding. In effect, network coding allows alost double the traffic for a given level of MPR. I. ITRODUCTIO In networks, ulti-user interference is an iportant liitation. In order to alleviate it, the use of ulti-packet reception (MPR) has been proposed [1], [2]. MPR ay be ipleented in a variety of ways, ranging fro orthogonal signaling schees such as OFDM to spread spectru techniques such as frequency hopping or DS-CDMA. Such systes allow a liited nuber of packets to be siultaneously received at a node with MPR capability. In this paper we analyze the effects on network perforance of a range of MPR capabilities, without restricting ourselves This work is sponsored by the United States Air Force under Air Force Contract FA C Opinions, interpretations, recoendations, and conclusions are those of the authors and are not necessarily endorsed by the United States Governent. Specifically, this work was supported by: 640th Electronics Systes Squadron of the Electronic Systes Center, Air Force Materiel Coand, and Inforation Systes of D,DR&E. Generous contributions of Irwin Mark Jacobs and Joan Klein Jacobs Presidential Fellowship has been critical in the success of this project. to specific physical layer ipleentations. Multi-packet reception can help when used with wireless MAC protocols (e.g. ALOHA), in which conventional odels consider the transission of ultiple packets to be a collision and the throughput can be optiized through different backoff echaniss [3]. There has been a renewed interest in capture schees as explained in [4], [5], and [6], the siplest for of which can be used to capture the packet fro the signal that has higher energy at the receiver. It has been shown, in [7] and [8], that network coding can be used to iprove throughput by allowing ixing of data at interediate nodes in a network. If network coding and MPR are utilized together, we expect a higher throughput because MPR at a node enables cobination of diverse packets which can be coded together and consequently, each transission can on average disseinate ore inforation to the network. The ain focus of our paper is to show when and where we should cobine network coding with ulti-packet reception to iprove perforance. The paper is organized as follows. In Section II, the network odel and paraeters are introduced. In Section III, we characterize single-packet reception. In Section IV, ulti-packet reception without network coding is described. In Section V, we present the gains associated with the cobination of network coding and ulti-packet reception. Finally, in Section VI, we conclude the paper with a brief coparison of the results. II. ETWORK MODEL AD PARAMETERS Consider a wireless network represented by a set of nodes. We assue that all nodes are within transission range of each other. That is to say, given that node i is transitting, any node j i in the network can receive the transitted packets if j itself is not transitting. ote that our odel preserves the half-duplex constraint. Within this network, there is a set of J nodes (J ) thathave packets for transission. Each of these J nodes has k packets and transission occurs in tie slots. Let us define the MPR coefficient,, to denote the axiu nuber of siultaneous receptions that is pos /10/$ IEEE 1393

2 sible per node per tie slot. For each node i, we define T (i) to be the first tie slot in which it has received every packet transitted by the J transitting nodes. Two tie variables are defined to easure the perforance of the syste. First is the total tie T tot required for disseination of inforation to all nodes; this tie is a easure of delay perforance of the last node that acquires all the packets. Second is the average tie T avg for disseination of inforation; this tie easures the average delay perforance of the syste. In Sections IV, V, and VI we introduce two auxiliary tie variables: T 1 which is the nuber of tie slots until each of the J transitting nodes has transitted its packets and T 2 to denote the nuber of tie slots to coplete the backfilling. To avoid trivialities, two assuptions are ade regarding the size of the network. First, J which states that the nuber of non-transitting nodes is lower bounded by the MPR coefficient. Second, 2 which ensures that the nuber of nodes in the network is at least twice the MPR capability of the syste. In suary: : uber of nodes in the network. J: uber of transitting nodes within the network. k: uber of packets to be transitted per node. : uber of possible receptions per node per tie slot. T (i): The first tie slot in which node i has received every packet. T 1 : uber of tie slots until each of the J transitting nodes has transitted its packets. T 2 : uber of tie slots to coplete the back-filling process. T tot : Total tie required for disseination of inforation (in tie slots). T avg : Average tie for a node to receive the last packet of the transitted inforation (in tie slots). C, C : Denote network coding, or lack of it, respectively. MPR, MPR : Denote ulti-packet reception, or lack of it, respectively. J 2 III. SIGLE PACKET RECEPTIO ( =1) Since = 1, all transitting nodes will take turns transitting their packet. Thus for k =1: T MPR tot = J (1) More generally, if each of the J transitting nodes has k>1 packets to transit, the total tie will be increased by a factor of k and: T MPR tot = Jk (2) Consider the case where each of the J transitting nodes successively transits all of its k packets. It can be seen that the last transitting node will have every packet after (J 1)k transissions and every other node will have it after Jk transissions. Thus: T MPR avg = 1 T (i) i=1 = Jk k (3) Table I deonstrates how a typical transission takes place when J = 5, and = 8 without MPR. Each node is denoted by a letter, A through H, and tie slots are enuerated by t 1 to t 5. During each tie slot, the transitting node is explicitly arked with an arrow. For exaple X A, shows that node A transitted during t 1 and its packet was received by every other node during the sae tie slot as denoted by X A in the other rows. ode (i) t 1 t 2 t 3 t 4 t 5 T (i) A X A X B X C X D X E 5 B X A X B X C X D X E 5 C X A X B X C X D X E 5 D X A X B X C X D X E 5 E X A X B X C X D X E 4 F X A X B X C X D X E 5 G X A X B X C X D X E 5 H X A X B X C X D X E 5 TABLE I TRASMISSIO SCHEDULE OF A ETWORK WITH =8, J =5, AD =1 ote that since MPR is not present, coding cannot help. In other words, if each node codes its packets before transission, there will be no reduction in the total transission tie or the average transission tie. Hence: avg tot = avg = tot IV. MULTI-PACKET RECEPTIO WITHOUT ETWORK CODIG Consider J transitting nodes, each with one packet to be distributed to every other node. Since receivers are liited by receptions per tie slot, the set of transitting nodes is partitioned into groups of nodes such that all nodes in a given group can transit siultaneously. If J is not a ultiple of, the last group will have J od nodes. Let T 1 be the nuber of tie slots it takes until 1394

3 each of the J transitting nodes has transitted its packet. There will be J such groups, thus: J T 1 = (4) Because of half-duplex constraints, the J transitting nodes need to be back-filled. ote that transissions occur in distinct groups of nodes, and each transitting node has issed a axiu of 1 packets during its transission slot. Since J in our odel, the network will back-fill the previously defined groups consecutively by utilizing of the non-transitting nodes. Each group can be back-filled in one tie slot and backfilling will take the sae nuber of slots as T 1.LetT 2 denote the nuber of slots to coplete the back-filling: J T 2 = u(j 1) (5) where u(j) is the unit step function defined as: { 0 : J 0 u(j) = 1 : J>0 Table II shows a saple transission schedule for =8, J =5,and =2. We note that this saple strategy does not fully utilize the MPR since node E transits alone. In contrast, our scheduling discussed in Part B below ore fully utilizes MPR. ode (i) t 1 t 2 t 3 t 4 t 5 T (i) A X A X C,X D X E X B 4 B X B X C,X D X E X A 4 C X A,X B X C X E X D 5 D X A,X B X D X E X C 5 E X A,X B X C,X D X E 2 F X A,X B X C,X D X E X A X C 3 G X A,X B X C,X D X E X B X D 3 H X A,X B X C,X D X E 3 TABLE II TRASMISSIO SCHEDULE OF A ETWORK WITH =8, J =5, AD =2WITHOUT ETWORK CODIG ow consider the case where each transitting node has k packets. We will present the results for two separate cases, naely for J and J>. A. J When the nuber of transitting nodes is less than the MPR coefficient, we are not able to fully utilize the MPR capability of the syste and the initial transissions will occur in groups of J nodes per tie slot and: T 1 = k (6) As discussed previously, J and we will backfill the J transitting nodes by of the non-transitting nodes. Thus: Jk T 2 = u(j 1) (7) Thus, the total copletion tie is: tot = T 1 + T 2 = k + Jk u(j 1) (8) The average copletion tie can be upper bounded by noting that the J non-transitting nodes will have all the data by T 1 and the J transitting nodes will have every packet in at ost T 1 + T 2 tie slots. Thus: avg ( J)T 1 + J(T 1 + T 2 ) Jk u(j 1) (9) k + J B. J> In this case, the optial strategy is to transit new packets in each tie slot. This is achieved by using all possible cobinations of transitting nodes. In other words, there are ( J ) distinct groups of out of J nodes. Any given node is present in ( J 1 1) groups and is excluded fro ( ) J 1 groups. Assue that k is an integral ultiple of ( J 1 1).Then each node transits k/ ( J 1 1) packets during each transission round, and T 1 can be obtained as: ( ) J k T 1 = ( J 1 ) = Jk (10) 1 Recall that the J transitting nodes need to be backfilled because of half-duplex constraints. Since the transitting groups during tie T 1 are distinct and known to other nodes, we can back-fill the groups consecutively. Let T 2 denote the back-filling tie: T 2 = Jk (11) Thus, the total copletion tie is: ( ) Jk tot = T 1 + T 2 =2 (12) 1395

4 The average copletion tie can be upper bounded followingthesaearguentusedinparta. Thus: avg ( J)T 1 + J(T 1 + T 2 ) Jk ( 1+ J ) (13) V. MULTI-PACKET RECEPTIO WITH ETWORK CODIG Following the odel presented in Section IV, we will introduce network coding as an instruent to reduce the total transission tie. We present a strategy that utilizes network coding only in back-filling. Table III illustrates an exaple in detail; this exaple, like that in Table II, is suboptial since node E transits alone and hence the MPR capability is not fully leveraged. However, our scheduling in Part B ore fully utilizes the MPR. Coefficients α 1 through α 5 are used as coding coefficients and are chosen according to the size of the required finite field. ode (i) t 1 t 2 t 3 t 4 T (i) A X A X C,X D X E X B 4 B X B X C,X D X E X A 4 C X A,X B X C X E X D 4 D X A,X B X D X E X C 4 E X A,X B X C,X D X E 2 F X A,X B X C,X D X E α 3 X C + α 4 X D + α 1 X A + α 2 X B + α 5 X E G X A,X B X C,X D X E 3 H X A,X B X C,X D X E 3 TABLE III TRASMISSIO SCHEDULE OF A ETWORK WITH =8, J =5, AD =2WITH ETWORK CODIG As before, let us analyze the proble separately for J and J>. A. J Since we only use network coding in backfilling, T 1 is the sae as the case of MPR with no network coding: T 1 = k (14) Recall that J, so we can find at least nodes that did not participate in any of the previous transissions and have received each of the Jk transitted packets. The back-filling is accoplished by having each of these nodes transit a linear cobination of all the packets that it has received so far. Every tie these nodes transit, independent coded packets are sent out and, as a result, the original J transitting nodes will get 3 new degrees of freedo in each tie slot and back-filling will be copleted in (J 1)k/ tie slots. Thus: (J 1)k T 2 = (15) The total transission tie for this strategy is: tot = T 1 + T 2 (J 1)k = k + (16) To calculate the average copletion tie, recall that all non-transitting nodes will have every packet by T 1 and the J transitting nodes will have the data after T 1 + T 2 tie slots. Thus: avg = ( J)T 1 + J(T 1 + T 2 ) = k + J (J 1)k (17) B. J> As in Section IV, let us assue that k is a ultiple of ( ) ( J 1 1 and the transitting nodes will send k/ J 1 ) 1 uncoded packets during the first ( J ) tie slots, therefore T 1 will have the sae value as in Section IV: ( ) J k T 1 = ( J 1 ) = Jk (18) 1 During each transission, exactly nodes transitted siultaneously and any given node within a transitting group was unable to receive the packets fro the other 1 nodes. Since each node transitted k packets, it is issing ( 1)k packets in total. Following the sae reasoning used in part A of this section, the back-filling will be copleted in ( 1)k/ tie slots. Thus: ( 1)k T 2 = Thus, the total copletion tie is: tot = T 1 + T 2 (19) = k (J + 1) (20) The average copletion tie can be calculated as: avg = ( J)T 1 + J(T 1 + T 2 ) = Jk ( 1+ 1 ) (21) This strategy deonstrates how network coding can be used with MPR to reduce the total and average transission ties. 1396

5 VI. COMPARISO In practical networks the nuber of transitting nodes is usually uch greater than the MPR capability of the syste, hence we will copare the results of Sections III, IV, and V for the case where J>. Let us revisit the results when each transitting node has k packets. Without MPR: tot avg = tot = Jk (22) = avg = Jk k When MPR of is used without network coding: ( ) Jk tot = 2 avg Jk ( 1+ J When MPR is copleented with network coding: tot = k avg = Jk ) (23) (24) (25) (J + 1) (26) ( 1+ 1 ) (27) Coparing (22) and (24), we can see that MPR reduces T tot by a factor of /2. ote that when =2, the total transission tie reains unchanged. This is depicted in Fig. 1 where lack of network coding is represented by dashed lines. otice that the dashed lines do not change between =1and 2. We will later copare this result with the case that cobines MPR with network coding. To see the advantage of network coding, copare (24) to (26). The total transission tie is reduced by a factor of 2J/(J + 1) which becoes arbitrarily close to two with increasing J. LetusrevisitFig.1.An ellipse in the figure points out the close proxiity of two lines: one representing J =50with coding and the other J = 25 without coding. Coding yields the sae total disseination tie as a network with no coding and only half the traffic. ote that if network coding is used, we can reduce the total transission tie even when =2, which was not achievable without network coding. While Fig. 1 presents the value of T tot for k =1packet per transitting node, if k > 1 and k satisfies the integrality constraint discussed in Sections IV and V, the value of T tot shown in this figure would be ultiplied by k. We will follow the sae approach in calculations of T tot in Fig. 2 and Fig. 3. In Fig. 2, we show that when is fixed, T tot grows linearly with the nuber of nodes if the ratio J/ is kept constant. As shown in the figure, the total transission tie of a network with J = /2 transitting nodes that uses network coding is only slightly higher than that of a network with J = /4 transitting nodes that does not use coding. ( = 4) J = /2 with coding J = /3 with coding J = /4 with coding J = /2 without coding J = /3 without coding J = /4 without coding T tot MPR 10 T tot MPR J = 50 with coding J = 33 with coding J = 25 with coding J = 50 without coding J = 33 without coding J = 25 without coding 5 J = /2 with coding and J = /4 without coding uber of odes () Fig. 2. T tot as a function of for different ratios of J/ when =4 and k =1. Solid lines denote use of network coding and dashed lines are for the case without coding J = 50 with coding and J = 25 without coding Fig. 1. T tot as a function of for different values of J and k =1. Solid lines denote use of network coding and dashed lines are for the case without coding. Fig. 3 shows that for a given value of, the total tie T tot increases linearly with the nuber of transitting nodes J. It is interesting to note that the lines in the figure cross one another when J [1, 4]. This occurs because J in this range, and the behavior is governed by equations (8) and (16) where we have assued that k is divisible by to allow scalability for the results. If the traffic coes fro a fixed nuber of nodes J, the total transission tie T tot will not be affected by an increase in. 1397

6 T tot / k = 1 with coding = 1 without coding = 2 without coding = 3 with coding = 3 without coding = 2 with coding = 4 without coding = 4 with coding uber of transitting nodes (J) Fig. 3. T tot/k as a function of J for different values of. Finally, Fig. 4 illustrates how the nuber of packets k at each transitting node affects T tot for a network with 9 and J =5. otice the siilarity between Fig. 3 and Fig. 4. In essence T tot increases linearly with the nuber of packets k. Again, notice that total transission tie of =2with coding and =4without coding are close to each other. The aount of tie saved by adding network coding to a fixed level of MPR is seen to increase with the nuber of packets k. The sall discontinuities seen on each line are caused by the integrality constraint on k. T tot = 1 with coding = 1 without coding = 2 without coding = 4 with coding = 2 with coding = 3 with coding = 3 without coding = 4 without coding uber of packets (k) without network coding. It is iportant to note that a twofold MPR capability will not reduce the total disseination tie without network coding and is thus ineffective. We have also shown that no gain can be obtained, if network coding is used without MPR. We finally argued that the cobination of network coding and MPR can reduce the total transfer tie by as uch as a factor of. Wealso showed that a MPR equipped network that uses coding behaves siilarly to an equivalent network that has half of that traffic and does not use network coding. Our work deonstrates a nuber of significant gains that do not scale with, in contrast to previous works such as [9] and [10], in which the network is analyzed through scaling laws, and hence would not show such gains. Erasures in these networks are currently under investigation, and we expect an even greater gain fro the cobined usage of network coding and MPR when erasures are present and ust be handled. REFERECES [1] Z. Wang, H. Sadjadpour, and J. Garcia-Luna-Aceves, Capacitydelay tradeoff for inforation disseination odalities in wireless networks, in Inforation Theory, ISIT IEEE International Syposiu on, July 2008, pp [2] X. Wang and J. Garcia-Luna-Aceves, Ebracing interference in ad hoc networks using joint routing and scheduling with ultiple packet reception, in IFOCOM The 27th Conference on Coputer Counications. IEEE, April 2008, pp [3] D. Bertsekas and R. Gallager, Data etworks. Prentice Hall, Englewood Cliffs. J, [4] G. D. Celik, Distributed MAC protocols for networks with ultipacket reception capability and spatially distributed nodes, Master s thesis, MIT Departent of Electrical Engineering and Coputer Science, [5] Z. Hadzi-Velkov and B. Spasenovski, Capture effect in IEEE basic service area under influence of Rayleigh fading and near/far effect, vol. 1, Sept. 2002, pp [6] A. yandoro, L. Liban, and M. Hassan, Service differentiation in wireless LAs based on capture, vol. 6, Dec. 2005, pp [7] R. Ahlswede,. Cai, S.-Y. Li, and R. Yeung, etwork inforation flow, Inforation Theory, IEEE Transactions on, vol. 46, no. 4, pp , Jul [8] T. Ho, M. Médard, R. Koetter, D. Karger, M. Effros, J. Shi, and B. Leong, A rando linear network coding approach to ulticast, Inforation Theory, IEEE Transactions on, vol. 52, no. 10, pp , Oct [9] E. Ahed, A. Eryilaz, M. Médard, and A. E. Ozdaglar, On the scaling law of network coding gains in wireless networks, in Military Counications Conference, MILCOM IEEE, Oct. 2007, pp [10] J. Liu, D. Goeckel, and D. Towsley, The throughput order of ad hoc networks eploying network coding and broadcasting, in Military Counications Conference, MILCOM IEEE, Oct. 2006, pp Fig. 4. T tot as a function of k for different values of when 9 and J =5. VII. COCLUSIO In conclusion, we have shown that MPR can reduce the total tie for a file transfer by as uch as a factor of

MAC schemes - Fixed-assignment schemes

MAC schemes - Fixed-assignment schemes MAC schees - Fixed-assignent schees M. Veeraraghavan, April 6, 04 Mediu Access Control (MAC) schees are echaniss for sharing a single link. MAC schees are essentially ultiplexing schees. For exaple, on

More information

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

Effects of MAC Approaches on Non-Monotonic Saturation with COPE - A Simple Case Study

Effects of MAC Approaches on Non-Monotonic Saturation with COPE - A Simple Case Study Effects of MAC Approaches on Non-Monotonic Saturation with COPE - A Simple Case Study Jason Cloud*, Linda Zeger, Muriel Médard* *Research Laboratory of Electronics, Massachusetts Institute of Technology,

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan

More information

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of

More information

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium 1 A Distributed Multi-service Resource Allocation Algorith in Heterogeneous Wireless Access Mediu Muhaad Isail, Student Meber, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract In this paper, radio resource

More information

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant

More information

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Navodaya Garepalli Kartik Gopalan Ping Yang Coputer Science, Binghaton University (State University of New York) Contact:

More information

BP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks

BP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks BP-MAC: A High Reliable Backoff Preable MAC Protocol for Wireless Sensor Networks Alexander Klein* Jirka Klaue Josef Schalk EADS Innovation Works, Gerany *Eail: klein@inforatik.uni-wuerzburg.de ABSTRACT:

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS

COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS International Journal of Coputer Science and Counication Vol. 3, No. 1, January-June 2012, pp. 181-185 COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS A.H. Karode 1, S.R. Suralkar 2, Manoj Bagde

More information

Performance Analysis of Exposed Terminal Effect in IEEE Ad Hoc Networks in Finite Load Conditions

Performance Analysis of Exposed Terminal Effect in IEEE Ad Hoc Networks in Finite Load Conditions Perforance Analysis of Exposed Terinal Effect in IEEE 80.11 Ad Hoc Networks in Finite Load Conditions Diitris Vassis 1, Georgios Korentzas 1 1 Dept. of Inforation and Counication Systes Engineering University

More information

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute

More information

Integrating fast mobility in the OLSR routing protocol

Integrating fast mobility in the OLSR routing protocol Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr

More information

Adaptive Holistic Scheduling for In-Network Sensor Query Processing

Adaptive Holistic Scheduling for In-Network Sensor Query Processing Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13 Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical

More information

A Hybrid Network Architecture for File Transfers

A Hybrid Network Architecture for File Transfers JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,

More information

Deterministic Voting in Distributed Systems Using Error-Correcting Codes

Deterministic Voting in Distributed Systems Using Error-Correcting Codes IEEE TRASACTIOS O PARALLEL AD DISTRIBUTED SYSTEMS, VOL. 9, O. 8, AUGUST 1998 813 Deterinistic Voting in Distributed Systes Using Error-Correcting Codes Lihao Xu and Jehoshua Bruck, Senior Meber, IEEE Abstract

More information

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction Relocation of ateway for Enhanced Tieliness in Wireless Sensor Networks Keal Akkaya and Mohaed Younis Departent of oputer Science and Electrical Engineering University of Maryland, altiore ounty altiore,

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

Multipath Selection and Channel Assignment in Wireless Mesh Networks

Multipath Selection and Channel Assignment in Wireless Mesh Networks Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,

More information

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San

More information

Collaborative Web Caching Based on Proxy Affinities

Collaborative Web Caching Based on Proxy Affinities Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA

More information

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se

More information

Generating Mechanisms for Evolving Software Mirror Graph

Generating Mechanisms for Evolving Software Mirror Graph Journal of Modern Physics, 2012, 3, 1050-1059 http://dx.doi.org/10.4236/jp.2012.39139 Published Online Septeber 2012 (http://www.scirp.org/journal/jp) Generating Mechaniss for Evolving Software Mirror

More information

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We

More information

Dynamical Topology Analysis of VANET Based on Complex Networks Theory

Dynamical Topology Analysis of VANET Based on Complex Networks Theory BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 14, Special Issue Sofia 014 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.478/cait-014-0053 Dynaical Topology Analysis

More information

Effects of Interleaving on RTP Header Compression

Effects of Interleaving on RTP Header Compression Effects of Interleaving on RTP Header Copression Colin Perkins Jon Crowcroft Departent of Coputer Science University College London Gower Street London WCE 6BT Abstract We discuss the use of interleaving

More information

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade

More information

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer Departent of Coputer Science and Engineering University of South Florida Tapa, FL 33620 Abstract -- The

More information

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles

More information

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural

More information

PERFORMANCE ANALYSIS OF THE UMTS SYSTEM FOR PACKET DATA TRANSFER OVER DEDICATED CHANNELS

PERFORMANCE ANALYSIS OF THE UMTS SYSTEM FOR PACKET DATA TRANSFER OVER DEDICATED CHANNELS PERFORMACE AALSIS OF THE MTS SSTEM FOR PACKET DATA TRASFER OVER DEDICATED CHAELS Manju Sarvagya, Ratna V. Raja Kuar Departent of Electronics and Electrical Counication Engineering Indian Institute of Technology,

More information

A Measurement-Based Model for Parallel Real-Time Tasks

A Measurement-Based Model for Parallel Real-Time Tasks A Measureent-Based Model for Parallel Real-Tie Tasks Kunal Agrawal 1 Washington University in St. Louis St. Louis, MO, USA kunal@wustl.edu https://orcid.org/0000-0001-5882-6647 Sanjoy Baruah 2 Washington

More information

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions *

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 607-626 (2005) A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Mebership Functions * SHIH-HSU HUANG AND JIAN-YUAN LAI + Departent of

More information

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University

More information

DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION

DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION www.arpnjournals.co DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION N. Snehalatha 1 and Paul Rodrigues 2 1 School of Coputing, SRM University, Chennai, Tail Nadu, India 2 Departent

More information

Summary. Reconstruction of data from non-uniformly spaced samples

Summary. Reconstruction of data from non-uniformly spaced samples Is there always extra bandwidth in non-unifor spatial sapling? Ralf Ferber* and Massiiliano Vassallo, WesternGeco London Technology Center; Jon-Fredrik Hopperstad and Ali Özbek, Schluberger Cabridge Research

More information

Improve Peer Cooperation using Social Networks

Improve Peer Cooperation using Social Networks Iprove Peer Cooperation using Social Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Noveber 5, 2007 Corresponding

More information

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada

More information

A Periodic Dynamic Load Balancing Method

A Periodic Dynamic Load Balancing Method 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation

More information

Redundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network

Redundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network (IJACSA) International Journal of Advanced Coputer Science and Applications Vol. 8, No. 1, 217 Redundancy Level Ipact of the Mean Tie to Failure on Wireless Sensor Network Alaa E. S. Ahed 1 College of

More information

ACNS: Adaptive Complementary Neighbor Selection in BitTorrent-like Applications

ACNS: Adaptive Complementary Neighbor Selection in BitTorrent-like Applications ACNS: Adaptive Copleentary Neighbor Selection in BitTorrent-like Applications Zhenbao Zhou 1, 2, Zhenyu Li 1, 2, Gaogang Xie 1 1 Institute of Coputing Technology, Chinese Acadey of Sciences, Beijing 100190,

More information

Identifying Converging Pairs of Nodes on a Budget

Identifying Converging Pairs of Nodes on a Budget Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones Advance Access publication on 24 February 2017 The British Coputer Society 2017. All rights reserved. For Perissions, please eail: journals.perissions@oup.co doi:10.1093/cojnl/bxx015 Fair Energy-Efficient

More information

Equation Based Congestion Control for Video Transmission over WCDMA Networks

Equation Based Congestion Control for Video Transmission over WCDMA Networks Equation Based Congestion Control for Video Transission over WCDMA Networks Antonios Alexiou, Diitrios Antonellis and Christos Bouras Research Acadeic Coputer Technology Institute, Greece and Coputer Engineering

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

A Network-based Seamless Handover Scheme for Multi-homed Devices

A Network-based Seamless Handover Scheme for Multi-homed Devices A Network-based Sealess Handover Schee for Multi-hoed Devices Md. Shohrab Hossain and Mohaed Atiquzzaan School of Coputer Science, University of Oklahoa, Noran, OK 7319 Eail: {shohrab, atiq}@ou.edu Abstract

More information

Privacy-preserving String-Matching With PRAM Algorithms

Privacy-preserving String-Matching With PRAM Algorithms Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,

More information

THE problem of transferring a data file or data stream. Reliable Point-to-point Underwater Acoustic Data Transfer: To Juggle or Not to Juggle?

THE problem of transferring a data file or data stream. Reliable Point-to-point Underwater Acoustic Data Transfer: To Juggle or Not to Juggle? 1 Reliable Point-to-point Underwater Acoustic Data Transfer: To Juggle or Not to Juggle? Mandar Chitre, Senior Meber, IEEE, and Wee-Seng Soh, Meber, IEEE Abstract Reliable data transfer speeds using underwater

More information

Data Caching for Enhancing Anonymity

Data Caching for Enhancing Anonymity Data Caching for Enhancing Anonyity Rajiv Bagai and Bin Tang Departent of Electrical Engineering and Coputer Science Wichita State University Wichita, Kansas 67260 0083, USA Eail: {rajiv.bagai, bin.tang}@wichita.edu

More information

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao

More information

THE rounding operation is performed in almost all arithmetic

THE rounding operation is performed in almost all arithmetic This is the author's version of an article that has been published in this journal. Changes were ade to this version by the publisher prior to publication. The final version of record is available at http://dx.doi.org/.9/tvlsi.5.538

More information

IN many interactive multimedia streaming applications, such

IN many interactive multimedia streaming applications, such 840 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 5, MAY 06 A Geoetric Approach to Server Selection for Interactive Video Streaing Yaochen Hu, Student Meber, IEEE, DiNiu, Meber, IEEE, and Zongpeng Li, Senior

More information

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

Distributed Multicast Tree Construction in Wireless Sensor Networks

Distributed Multicast Tree Construction in Wireless Sensor Networks Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,

More information

Survivability Function A Measure of Disaster-Based Routing Performance

Survivability Function A Measure of Disaster-Based Routing Performance Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive and Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

Data & Knowledge Engineering

Data & Knowledge Engineering Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID

More information

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl. Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable

More information

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design A Fast Multi-Obective Genetic Algorith for Hardware-Software Partitioning In Ebedded Syste Design 1 M.Jagadeeswari, 2 M.C.Bhuvaneswari 1 Research Scholar, P.S.G College of Technology, Coibatore, India

More information

Ascending order sort Descending order sort

Ascending order sort Descending order sort Scalable Binary Sorting Architecture Based on Rank Ordering With Linear Area-Tie Coplexity. Hatrnaz and Y. Leblebici Departent of Electrical and Coputer Engineering Worcester Polytechnic Institute Abstract

More information

Quantitative Comparison of Sinc-Approximating Kernels for Medical Image Interpolation

Quantitative Comparison of Sinc-Approximating Kernels for Medical Image Interpolation Quantitative Coparison of Sinc-Approxiating Kernels for Medical Iage Interpolation Erik H. W. Meijering, Wiro J. Niessen, Josien P. W. Plui, Max A. Viergever Iage Sciences Institute, Utrecht University

More information

News Events Clustering Method Based on Staging Incremental Single-Pass Technique

News Events Clustering Method Based on Staging Incremental Single-Pass Technique News Events Clustering Method Based on Staging Increental Single-Pass Technique LI Yongyi 1,a *, Gao Yin 2 1 School of Electronics and Inforation Engineering QinZhou University 535099 Guangxi, China 2

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

Research Article A Game Theory Based Congestion Control Protocol for Wireless Personal Area Networks

Research Article A Game Theory Based Congestion Control Protocol for Wireless Personal Area Networks Journal of Sensors Volue 216, Article ID 61683, 13 pages http://dx.doi.org/1.11/216/61683 Research Article A Gae Theory Based Congestion Control Protocol for Wireless Personal Area Networks Chuang Ma,

More information

Real-Time Detection of Invisible Spreaders

Real-Time Detection of Invisible Spreaders Real-Tie Detection of Invisible Spreaders MyungKeun Yoon Shigang Chen Departent of Coputer & Inforation Science & Engineering University of Florida, Gainesville, FL 3, USA {yoon, sgchen}@cise.ufl.edu Abstract

More information

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS Evaluation of the Tiing Properties of Two Control Networs: CAN and PROFIBUS Max Mauro Dias Santos 1, Marcelo Ricardo Steer 2 and Francisco Vasques 3 1 UnilesteMG, CEP 35170-056, Coronel Fabriciano MG Brasil.

More information

Fair Resource Allocation for Heterogeneous Tasks

Fair Resource Allocation for Heterogeneous Tasks Fair Resource Allocation for Heterogeneous Tasks Koyel Mukherjee, Partha utta, Gurulingesh Raravi, Thangaraj Balasubraania, Koustuv asgupta, Atul Singh Xerox Research Center India, Bangalore, India 560105

More information

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networs F. Mousavi Madani Departent of coputer engineering Alzahra University Tehran, Iran, osavif@alzahra.ac.ir Received:

More information

Planet Scale Software Updates

Planet Scale Software Updates Planet Scale Software Updates Christos Gkantsidis 1, Thoas Karagiannis 2, Pablo Rodriguez 1, and Milan Vojnović 1 1 Microsoft Research 2 UC Riverside Cabridge, UK Riverside, CA, USA {chrisgk,pablo,ilanv}@icrosoft.co

More information

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches Efficient Estiation of Inclusion Coefficient using HyperLogLog Sketches Azade Nazi, Bolin Ding, Vivek Narasayya, Surajit Chaudhuri Microsoft Research {aznazi, bolind, viveknar, surajitc}@icrosoft.co ABSTRACT

More information

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS AWNI ITRADAT Assistant Professor, Departent of Coputer Engineering, Faculty of Engineering, Hasheite University, P.O. Box 15459,

More information

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses International Journal of Industrial Engineering & Production Research Septeber 03, Volue 4, Nuber 3 pp. 9-35 ISSN: 008-4889 http://ijiepr.iust.ac.ir/ Using Iperialist Copetitive Algorith in Optiization

More information

Geometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem.

Geometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem. Noveber 13, 2016 Geoetry. The Method of the enter of Mass (ass points): Solving probles using the Law of Lever (ass points). Menelaus theore. Pappus theore. M d Theore (Law of Lever). Masses (weights)

More information

QoS and Sensible Routing Decisions

QoS and Sensible Routing Decisions QoS and Sensible Routing Decisions Erol Gelenbe Dept. of Electrical & Electronic Engineering Iperial College London SW7 2BT e.gelenbe@iperial.ac.uk Abstract Network Quality of Service (QoS) criteria of

More information

A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER

A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER VIOLETA TOMAŠEVIĆ, SLOBODAN BOJANIĆ 2 and OCTAVIO NIETO-TALADRIZ 2 The Mihajlo Pupin Institute, Volgina 5, 000 Belgrade, SERBIA AND MONTENEGRO 2 Technical University

More information

Carving Differential Unit Test Cases from System Test Cases

Carving Differential Unit Test Cases from System Test Cases Carving Differential Unit Test Cases fro Syste Test Cases Sebastian Elbau, Hui Nee Chin, Matthew B. Dwyer, Jonathan Dokulil Departent of Coputer Science and Engineering University of Nebraska - Lincoln

More information

COMPARISON OF ANT COLONY OPTIMIZATION & PARTICLE SWARM OPTIMIZATION IN GRID ENVIRONMENT

COMPARISON OF ANT COLONY OPTIMIZATION & PARTICLE SWARM OPTIMIZATION IN GRID ENVIRONMENT COMPARISON OF ANT COLONY OPTIMIZATION & PARTICLE SWARM OPTIMIZATION IN GRID ENVIRONMENT B.BOOBA 1 Dr. T.V.GOPAL 2 1 Research Scholar, Assist. Professor(Sl.Gr),Departent of Coputer Applications, Easwari

More information

Closing The Performance Gap between Causal Consistency and Eventual Consistency

Closing The Performance Gap between Causal Consistency and Eventual Consistency Closing The Perforance Gap between Causal Consistency and Eventual Consistency Jiaqing Du Călin Iorgulescu Aitabha Roy Willy Zwaenepoel EPFL ABSTRACT It is well known that causal consistency is ore expensive

More information

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm roceedings of the 7th International Conference on Innovation & Manageent 893 Research on a Kind of QoS-Sensitive Seantic Web Services Coposition Method Based on Genetic Algorith Cao Hongjiang, Nie Guihua,

More information

A Generic Architecture for Programmable Trac. Shaper for High Speed Networks. Krishnan K. Kailas y Ashok K. Agrawala z. fkrish,

A Generic Architecture for Programmable Trac. Shaper for High Speed Networks. Krishnan K. Kailas y Ashok K. Agrawala z. fkrish, A Generic Architecture for Prograable Trac Shaper for High Speed Networks Krishnan K. Kailas y Ashok K. Agrawala z fkrish, agrawalag@cs.ud.edu y Departent of Electrical Engineering z Departent of Coputer

More information

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem Theoretical Analysis of Local Search and Siple Evolutionary Algoriths for the Generalized Travelling Salesperson Proble Mojgan Pourhassan ojgan.pourhassan@adelaide.edu.au Optiisation and Logistics, The

More information

Problem Solving of graph correspondence using Genetics Algorithm and ACO Algorithm

Problem Solving of graph correspondence using Genetics Algorithm and ACO Algorithm Proble Solving of graph correspondence using Genetics Algorith and ACO Algorith Alireza Rezaee, 1, Azizeh Ajalli 2 Assistant professor,departent of Mechatronics Engineering, Faculty of New Sciences and

More information

On Performance Bottleneck of Anonymous Communication Networks

On Performance Bottleneck of Anonymous Communication Networks On Perforance Bottleneck of Anonyous Counication Networks Ryan Pries, Wei Yu, Steve Graha, and Xinwen Fu Abstract Although a significant aount of effort has been directed at discovering attacks against

More information