TSR: Topology Reduction from Tree to Star Data Grids
|
|
- Rachel Rice
- 5 years ago
- Views:
Transcription
1 03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen #3 # Department of Computer Science, Nationa Chiao Tung niversity, Taiwan * Department of Computer Science, TungHai niversity, Taiwan mingchang09@gmai.com; eufy@thu.edu.tw; 3 ypchen@cs.nctu.edu.tw Abstract To speed up data transmission of data grids, severa co-aocation schemes have been proposed. However, data grids are often arge in scae, heterogeneous in participating resources, and compicated in architecture and network topoogy, consequenty increasing the anaytica compexity of its data transmission behaviour. In other words, if we can reduce the data transmission topoogy for the grid, the anaysis wi be easier. Therefore, in this paper, we propose a topoogy reduction approach, caed the Tree-to-Star Reduction method (TSR for short), which can reduce a packet deivery tree topoogy to a star for a data grid so that the data transmission of a co-aocation scheme can be more convenienty anayzed. Here, a deivery tree topoogy, as a tree topoogy rooted at the destination node, is a network topoogy for deivering a fragments of a fie to the destination node. Keywords data grid, deivery tree, deivery star, topoogy reduction, co-aocation scheme I. INTRODCTION To shorten fie retrieva time and improve fie repication performance for data grids, severa co-aocation schemes have been proposed [][][3][4]. However, it is difficut for us to evauate these schemes' data transmission behaviour since a data grid is often arge in scae [5], heterogeneous in participating resources [6], and compicated in architecture and network topoogy. Coates et a. [7] ogicay transformed a compicated network topoogy into a simpe tree to simpify their performance anayses. Levitin et a. [8] introduced a concept in which the network topoogy used to transmit the data generated by different service sites for a grid job can be treated as a star topoogy in which a ogica ink connects a service site and the destination node. With this star topoogy, users can more easiy evauate the execution time of a task and data transmission reiabiity. However, these studies neither mention how to reduce a compicated network topoogy to a simpe one, nor discuss whether or not the performance of the two topoogies is identica. Hence, in this paper, we propose a topoogy reduction approach, caed the Tree-to-Star Reduction method (TSR for short), which can reduce a compicated packet deivery tree topoogy to a star in a data grid, where a deivery tree topoogy (or simpy a deivery tree), as a tree topoogy rooted at the destination node, comprises a set of service sites and network components for cooperativey deivering a fie or task resuts generated by the service sites to the destination node. Consequenty, the compexity of evauating a co-aocation scheme can be dramaticay reduced. II. BACKGROND A co-aocation scheme is an scheme invoked by the resource broker of a data grid to coordinate a set of service sites to cooperativey deiver a fragments of a fie to where,, is the site at which a user submits a request to access []. In fact, from 's viewpoint, the routing paths that transmit a fragments of to form a deivery tree rooted at. Each fragment may pass through severa routers and inks before arriving at. Due to containing so many network components (i.e., inks and routers) and parameters (e.g., ink bandwidths and the departure and arriva rates of routers), it may be hard for users to anayse the fie transmission time for the scheme in this deivery tree. III. THE TSR METHOD The process of reducing a deivery tree to a star is as foows. A deivery tree basicay comprises two types of structures. The first is a series structure (SS for short) in which a network components form a chain topoogy. If the topoogy contains nodes and inks,, we ca it an SS of ength. Given an SS of ength n-, if there does not exist a node that together with the SS forms an SS of ength, we ca the given SS a maximum series structure (MSS for short). The chain topoogy shown in Fig. a, i.e.,, is an exampe in which and are the head and tai nodes, respectivey. We wish to reduce the MSS to a simpe chain, which consists of the head node and the tai node connected by a ogica ink, denoted by (see Fig. b), impying that is simpified to. The reduction process is caed the series structure reduction process (the SS-reduction process for short). The other type is a parae structure (PS for short), which consists of upstream nodes and,, and a conjunction node, denoted by, in which is connected to through a direct ink, i.e., is a simpe chain which is an SS of ength,, where may be a physica or ogica ink. The structure iustrated in the dashed rectange shown in Fig. is an exampe. Given a PS, if there exists at east one sub-tree rooted at (see Fig. ) with as its eaf nodes, and /3 $ IEEE DOI 0.09/IMIS
2 , then we ca the PS an expandabe PS. If no such sub-tree exists, we ca the PS a maximum parae structure (MPS for short), denoted by MA. The one contained in the dashed rectange shown in Fig. 3a, i.e.,, is an MPS. Given a MA, if there exists an MSS with as its head node, e.g., the one shown in Fig. 3a, i.e.,, then after appying the SS-reduction process on the MSS, the resuting structure as depicted in Fig. 3b is an MPS foowed by a simpe chain. We ca this structure a parae-chain structure, which wi be reduced to a PS (see Fig. 3c). The corresponding reduction process is caed the parae-chain reduction process (the PC-reduction process for short). In the foowing, we assume that ) a packet deivery tree is drop-free, impying that no packet wi be ost and retransmitted during the packet transmission; ) the queuing mode of a node, either a router or a service site, for sending and receiving packets is M/M/ [9], i.e., the arriva and departure rates foow a Poisson distribution; 3) due to appying the TSR to a data grid, each node 's packet service rate (service rate for short), denoted by, and packet departure rate (departure rate for short), denoted by, are a arger than its packet arriva rate (arriva rate for short), named. Here, we separate service rate and departure rate since service rate means the maximum capacity in pkts/sec that a node can transmit, whereas departure rate is the number of packets that physicay sends. For a node in a drop free deivery tree, the capacity of is either or. Let be the function used to cacuate the transmission time of a packet through a ink at time point. Then, () where is the size of, and is the bandwidth of at. Let be the function empoyed to cacuate the expected queueing deay of in a node at. Then, () where is 's arriva rate and is 's service rate. Let be a function used to cacuate 's departure rate. Then, (3) where is the service rate of at. Let be the function empoyed to cacuate 's arriva rate where is the set of 's immediate upstream nodes, in which may be a service site or a router transmitting packets to,. Then, k Fig. The topoogy before and after the SS-reduction process Fig. An expandabe parae structure A. The SS-reduction process To describe the SS-reduction process, we assume that the packet generation rate, i.e., departure rate (rather than service rate), of a service site, denoted by, is known and depoy the topoogy shown in Fig. a as an exampe, in which and are respectivey the head node and tai node of the MSS, and the set of routers are the intermediate nodes and the set of inks are the intermediate inks between and. The resuting topoogy is. The SSreduction process consisting of three phases is as foows.. The first phase uses the function shown in Eq. () to cacuate the transmission time of fowing through a ink at, named, where,. When,.. The second phase empoys the functions shown in Eqs. ()~(4) to cacuate the expected queueing deay of in router at, named, where, in which k MSS n n n (a) S PS conj conj m 'conj m k ' conj (4),, and ' k (b) m+ when,, and when,. n m+ m+ m+ : SS-reduction process : receiving site or router, 679
3 MPS conj conj m MSS m m m S MPS ' conj conj ' S ' ' m m S n n n n (a) Topoogy T (b)topoogy T' (c) Topoogy T'' : receiving site or router : SS-reduction process : PC-reduction process Fig. 3 The topoogy before and after the SS-reduction and PC-reduction processes. (a) A topoogy T in which an MPS is foowed by an MSS; (b) The topoogy T' after reducing the MSS in T to a simpe chain; (c) The topoogy T'' is a PS structure, which is aso an MPS after reducing the parae-chain structure shown in T' with the PC-reduction process 3. The third phase cacuates the accumuated transmission time of which is aso the transmission time of on, denoted by, where and the equivaent bandwidth of at, denoted by, is (6) B. The PC-reduction process In the foowing, we use the topoogy shown in Fig. 3b as an exampe, i.e., MA foowed by a simpe chain, to describe the PC-reduction process which consists of four phases. Aso assume that 's packet generation rate, i.e.,, is known,.. The first phase aso uses Eq. () to cacuate the transmission time of a ink at, denoted by, where,.. The second phase empoys Eq. () to cacuate the queueing deay of in at, denoted by,, in which (5) is the service rate of 's outink at,, and. 3. The third phase aso invokes Eq. () to cacuate the transmission time of through the ink at (see Fig. 3b), denoted by, where. 4. In the fourth phase, the accumuated deay of on traveing through,, and at, denoted by, is cacuated as (7) where is a constant for a,, since and are the average vaues of a the packets fowing through and, respectivey. The bandwidth of at is aso cacuated by invoking Eq. (6),. C. Tree-to-Star Reduction (TSR) agorithm In the foowing, a deivery tree topoogy rooted at with a set of service sites shown in Fig. 4a is given as an exampe to describe the TSR agorithm iustrated in Fig. 5, in which between ines and 3, the TSR first checks to see whether a service site and its foowing MSS is a simpe chain or not (assume that the conjunction node of the MSS is ), where and. If not, the TSR utiizes the SS-reduction process to reduce the MSS to a ogica ink connecting to. The resut is shown in Fig. 4b. Now each service site is the head node of a simpe chain. Between ines 4 and 0, on identifying a new MPS, e.g., MA, the TSR checks to see whether the MSS with and as its head and tai nodes, respectivey, is a simpe chain or not,. If yes, the MPS and the simpe chain form a parae-chain structure. If not, the TSR reduces the MSS to by using the SS-reduction process. After that, the resuting topoogy is aso a parae-chain structure. Next, the TSR utiizes the PCreduction process to reduce the parae-chain structure to a PS. 680
4 m,, m,, m,,, n, m, n, m p m, z p, m, z p, a q, ' m ' p p, p, a, ' m m m m m ' ' p ' p, ' m ' ' ' ', ' m ' ' ' ' ' ' m ' ' ' ' ' ' u ' ' m u u u (a) u u u (b) u u u u u u (c) (d) (e) (f) u : receiving site : SS-reduction process : PC-reduction process Fig. 4 A deivery tree is reduced to a deivery star by invoking the TSR agorithm TSR agorithm: Input: A deivery tree with as its root (eaf nodes); Output: The equivaent deivery star; Procedure: : For each service site, { : If there is an MSS with and as the head node and tai node, respectivey{ /* may be a router or */ 3: Reduce the MSS by using the SS-reduction process; }} /* by invoking Eqs. ()~(6) */ 4: Whie there is a MA newy identified where { 5: If there is an MSS connecting and a node, and its ength is onger than { /* is a router or */ 6: Appy the SS-reduction process to reduce the MSS to a simpe chain ;} 7: Appy the PC-reduction process to reduce the MA and to a PS ; 8: /* by invoking Eqs. ()~(7)*/ 9: Expand the to a PS ; } /*,..., are those service sites currenty and directy connected 0: to by a physica or ogica ink.*/ Fig. 5 The TSR agorithm If the PS is an expandabe one, the TSR expands the PS to a MA by reducing each sub-tree rooted at to an MPS by using the SS-reduction and PCreduction processes interchangeaby where are those service sites that are now directy connected to by a physica or ogica ink. This procedure continues unti is and no MPS can be newy identified. Now a deivery star topoogy (or simpy a deivery star), in which a service sites are connected to the center node, is derived. Fig. 4f is the exampe resut. Figs. 4b, 4c, 4d, and 4e are the intermediate resuts of reducing Fig. 4a to Fig. 4f. IV. A DEMONSTRATION EAMPLE In this section, we woud ike to evauate the transmission time of a packet, KB in ength, in a deivery tree and its corresponding deivery star. We use the tree topoogy iustrated in Fig. 6a as an exampe, which has six service sites that send packets of a fie to, to cacuate 's deivery deay. The bandwidths of a the inks are isted in TABLE I, and the service and departure rates of a service sites and routers are accordingy isted in TABLE II. We assume that service site 's packet generation rate is pkts/sec,. TABLE I THE NETWORK BANDWIDTHS OF ALL THE LINKS SHOWN IN FIG. 6A Network inks The bandwidth of a ink (Mbps) TABLE II THE SERVICE AND DEPARTRE RATES OF ALL SERVICE SITES AND ROTERS SHOWN IN FIG. 6A Network inks The bandwidth of a ink (Mbps) A. The transmission time in a deivery tree The routing path of a packet issued by, denoted by, consists of,,,,,,,,,, and, and hence the tota transmission time of at, denoted by, is (8) 68
5 where based on TABLE I,,,, and. Based on Eq. (), TABLE II, and Fig. 6a, since pkts/sec, and has two incoming inks and, impying pkts/sec. Simiary, in which pkts/sec, pkts/sec, and because pkts/sec and pkts/sec. Furthermore, since pkts/sec and pkts/sec. Based on Eq. (8) and the vaues cacuated above,. The deay of sending a packet by to, denoted by, can be cacuated by the same method,. B. The transmission time in a deivery star We first reduce the deivery tree shown in Fig. 6a to a deivery star by empoying the TSR agorithm. A network components on the paths from and to, and from and to form two parae-chain structures. After appying the PC-reduction process to them, the resut is shown in Fig. 6b, in which PS is an MPS and the path from to is reduced to a ogica ink,. Based on Eq. (7), (9) (0) Hence, the bandwidth of, i.e.,,, can be cacuated by invoking Eq. (6). Now we can further reduce MA and its foowing simpe chain, i.e., forming a parae-chain structure, to a, in which foowed by and is reduced to,. The resuting structure is depicted in Fig. 6c. Based on Eq. (7), () Therefore, the bandwidth of can be obtained by invoking Eq. (6), and then the TSR expands the PS to MA, in which and are individuay connected to by a physica ink, and which as shown in Fig. 6c is a newy identified MPS, and is an MSS which can be reduced by appying the SS-reduction process. The resuting structure is depicted in Fig. 6d, in which the path from to is reduced to a ogica ink. Based on Eq. (5), () where the bandwidths of can be cacuated by empoying Eq. (6). Now MA and is a parae-chain structure which can be reduced to an MPS, i.e., MA, in which,, and become,, and,, and becomes,. p to this point, a deivery star centered at as depicted in Fig. 6e has been derived. Each service site is directy connected to with either a ogica ink or physica ink. Based on Eq. (7) (3) and (4) Among the six service sites, the deay time of a packet sent by, and, to is the ongest. Hence, just as in cacuating the transmission time of a packet in a deivery tree, we cacuate the transmission time of a packet sent by to as an exampe. Let be the transmission deay of from to. Then, (5) Based on Eqs. (5), (3), (), (9), and (), which is equa to Eq. (8), impying that and. The deay of transmitting a packet from to,, can be cacuated by the same method. The deays are,,,, and, respectivey, consequenty demonstrating that the transmission deay of deivery star is equivaent to that of deivery tree. Additionay, if the deivery tree can be identified and the bandwidths of and,,, are cacuated beforehand, the cacuation of, i.e., Eq. (5), is simper than the cacuation of, i.e., Eq. (8). Therefore, it is easier for users to evauate the data transmission deays of a co-aocation scheme. 68
6 * : disk queue * 6 : repica site ' 5 ' 6 u ' '' 4 ' '' 3 ' '' ' '' * : disk queue * : repica site u (a) A deivery tree data grid u (b) A deivery tree reduced from the one shown in Fig. 6a u (c) A deivery tree reduced from the one shown in Fig. 6b 6 u (d) A deivery tree reduced from the one shown in Fig. 6c 4 ' 4 4 ' ' 4 ' ' ' ' * : disk queue * : repica site 3 ' ' 3 3 ' ' 4 ' ' 3 ' ' ' ' ' ' * : disk queue * : repica site ' ' * : disk queue * : repica site (e) A deivery tree reduced from the one shown in Fig. 6d Fig. 6 An exampe of reducing a deivery tree data grid to a deivery star V. CONCLSIONS In this artice, we propose a topoogy reduction approach, caed the TSR, to reduce a compicated deivery tree to a star in a data grid without impacting the evauation accuracy and correctness of data transmission deays for a co-aocation scheme. The deivery star simpifies the evauation and anaytica compexities of the network deay time of a coaocation scheme. Nevertheess, the TSR is aso appicabe to reducing the compexity of a deivery tree in other distribution and parae systems, e.g., a grid computing, coud computing, and PP system. ACKNOWLEDGMENT: The work was partiay supported by TungHai niversity under the project GREENs and the Nationa Science Counci, Taiwan under Grants NSC 0- -E MY3, NSC 00--E and NSC 0-68-E MY3. REFERENCES [] S. Vazhkudai, Enabing the co-aocation of grid data transfers, Proceedings of Internationa Workshop on Grid Computing, pp. 44 5, Phoenix, Arizona, SA, 7 November 003. [] R.S. Chang, C.M. Wang, and P.H. Chen, Repica seection on coaocation data grids, Proceedings of Second Internationa Symposium on Parae and Distributed Processing and Appications, vo. 3358, pp Springer, Heideberg, 004. [3] R.S. Bhuvaneswaran, Y. Katayama, and N. Takahashi, Dynamic coaocation scheme for parae data transfer in grid environment, Proceedings of First Internationa Conference on Semantics, Knowedge, and Grid, Beijing, China, vo. 7, pp. 8 9, Nov [4] C.T. Yang, I.H. Yang, S.Y. Wang, K.C. Li, and C.H. Hsu, A recursivey-adjusting co-aocation scheme with a cyber-transformer in data grids, Future Generation Computer Systems, vo. 5(7). Esevier B.V: pp , Amsterdam, Juy 009. [5] M.C. Lee, F.Y. Leu, and Y.-p. Chen, PFRF: An Adaptive Data Repication Agorithm based on Star-Topoogy Data Grids, Future Generation Computer systems, vo. 8, issue 7, pp , Juy 0. [6] I. Foster, C. Kesseman, and S. Tuecke, "The anatomy of the grid: enabing scaabe virtua organizations," Internationa Journa of High Performance Computing Appications, vo. 5, pp. 00, 00. [7] M. Coates, A. Hero, R. Nowak, and B. Yu, Internet tomography, IEEE Signa Processing Magazine, vo. 9, issue 3, Jan. 00. [8] G. Levitin, Y.S. Dai, and B.H. Hanoch, Reiabiity and performance of star topoogy grid service with precedence constraints on subtask execution, IEEE Transactions on Reiabiity, vo. 55, no. 3, pp , Sept [9] L. Keinrock, Queuing Systems. In: Theory vo., Wiey, New York (975). 683
Modelling and Performance Evaluation of Router Transparent Web cache Mode
Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7,1316-1320 Modeing and Performance Evauation of Transparent cache Mode Emad Hassan A-Hemiary Network Engineering Department, Coege of Information Engineering,
More informationAd Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks
Ad Hoc Networks (3) 683 698 Contents ists avaiabe at SciVerse ScienceDirect Ad Hoc Networks journa homepage: www.esevier.com/ocate/adhoc Dynamic agent-based hierarchica muticast for wireess mesh networks
More informationSelf-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System
Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong
More informationReplication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs
Repication of Virtua Network Functions: Optimizing Link Utiization and Resource Costs Francisco Carpio, Wogang Bziuk and Admea Jukan Technische Universität Braunschweig, Germany Emai:{f.carpio, w.bziuk,
More informationTopology-aware Key Management Schemes for Wireless Multicast
Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu
More informationMobile App Recommendation: Maximize the Total App Downloads
Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management
More informationA Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks
Sensors 2013, 13, 16424-16450; doi:10.3390/s131216424 Artice OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journa/sensors A Near-Optima Distributed QoS Constrained Routing Agorithm for Mutichanne Wireess
More informationDETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS
DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,
More informationService Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network
Service Chain (SC) Mapping with Mutipe SC Instances in a Wide Area Network This is a preprint eectronic version of the artice submitted to IEEE GobeCom 2017 Abhishek Gupta, Brigitte Jaumard, Massimo Tornatore,
More informationResource Optimization to Provision a Virtual Private Network Using the Hose Model
Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,
More informationAn Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing
An Adaptive Two-Copy Deayed SR-ARQ for Sateite Channes with Shadowing Jing Zhu, Sumit Roy zhuj@ee.washington.edu Department of Eectrica Engineering, University of Washington Abstract- The paper focuses
More informationBuffer-aware Worst Case Timing Analysis of Wormhole Network On Chip
1 Buffer-aware Worst Case Timing Anaysis of Wormhoe Network On Chip Ahem Mifdaoui and Hamdi Ayed* University of Tououse -ISAE ahem.mifdaoui@isae.fr, hamdi.ayed@isae.fr arxiv:1602.01732v2 [cs.ni] 25 May
More informationFastest-Path Computation
Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods
More informationReal-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing
Rea-Time Image Generation with Simutaneous Video Memory Read/rite Access and Fast Physica Addressing Mountassar Maamoun 1, Bouaem Laichi 2, Abdehaim Benbekacem 3, Daoud Berkani 4 1 Department of Eectronic,
More informationLanguage Identification for Texts Written in Transliteration
Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy
More informationTesting Whether a Set of Code Words Satisfies a Given Set of Constraints *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG
More informationService Scheduling for General Packet Radio Service Classes
Service Scheduing for Genera Packet Radio Service Casses Qixiang Pang, Amir Bigoo, Victor C. M. Leung, Chris Schoefied Department of Eectrica and Computer Engineering, University of British Coumbia, Vancouver,
More informationMCSE Training Guide: Windows Architecture and Memory
MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the
More informationEE 122 Final Exam - Solution Date: December 14, 2002
Name: SID: ee ogin: Day/Time of section you atten: EE Fina Exam - Soution Date: December 4, 00 Probem Points /0 /0 3 /0 4 /0 5 /0 6 /0 7 /0 8 /0 9 /0 0 /0 Tota /00 . Question (0 pt) (a) (5 pt) Expain briefy
More informationEfficient Histogram-based Indexing for Video Copy Detection
Efficient Histogram-based Indexing for Video Copy Detection Chih-Yi Chiu, Jenq-Haur Wang*, and Hung-Chi Chang Institute of Information Science, Academia Sinica, Taiwan *Department of Computer Science and
More informationError Control Strategies for WiMAX Multi-hop Relay Networks
MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.mer.com Error Contro Strategies for WiMAX Muti-hop Reay Networks Weihuang Fu, Zhifeng Tao, Jinyun Zhang, Dharma Agrawa TR2009-083 December 2009 Abstract
More informationSpecial Edition Using Microsoft Excel Selecting and Naming Cells and Ranges
Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and
More informationHiding secrete data in compressed images using histogram analysis
University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University
More informationPAPER Delay Constrained Routing and Link Capacity Assignment in Virtual Circuit Networks
2004 PAPER Deay Constrained Routing and Link Capacity Assignment in Virtua Circuit Networks Hong-Hsu YEN a), Member and FrankYeong-Sung LIN b), Nonmember SUMMARY An essentia issue in designing, operating
More informationMinimizing Resource Cost for Camera Stream Scheduling in Video Data Center
Gao YH, Ma HD, Liu W. Minimizing resource cost for camera stream scheduing in video data center. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 555 570 May 2017. DOI 10.1007/s11390-017-1743-x Minimizing
More informationQuality of Service Evaluations of Multicast Streaming Protocols *
Quaity of Service Evauations of Muticast Streaming Protocos Haonan Tan Derek L. Eager Mary. Vernon Hongfei Guo omputer Sciences Department University of Wisconsin-Madison, USA {haonan, vernon, guo}@cs.wisc.edu
More informationInternational Journal of Electronics and Communications (AEÜ)
Int. J. Eectron. Commun. (AEÜ) 67 (2013) 470 478 Contents ists avaiabe at SciVerse ScienceDirect Internationa Journa of Eectronics and Communications (AEÜ) journa h o me pa ge: www.esevier.com/ocate/aeue
More informationBacking-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism
Backing-up Fuzzy Contro of a Truck-traier Equipped with a Kingpin Siding Mechanism G. Siamantas and S. Manesis Eectrica & Computer Engineering Dept., University of Patras, Patras, Greece gsiama@upatras.gr;stam.manesis@ece.upatras.gr
More informationA NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER
Internationa Journa on Technica and Physica Probems of Engineering (IJTPE) Pubished by Internationa Organization of IOTPE ISSN 077-358 IJTPE Journa www.iotpe.com ijtpe@iotpe.com September 014 Issue 0 Voume
More informationModeling the Time Varying Behavior of Mobile Ad-Hoc Networks
Modeing the Time Varying Behavior of Mobie Ad-Hoc Networks David Tipper University of Pittsburgh 5 N. Beefied Avenue Pittsburgh, PA UA 560 (4) 64-94 tipper@tee.pitt.edu Yi Qian University of Puerto Rico
More informationFast and effective dimensioning algorithm for end-toend optical burst switching networks with ON-OFF traffic model
Fast and effective dimensioning agorithm for end-toend optica burst switching networks with ON-OFF traffic mode Reinado Vaejos 1, Aejandra Zapata 1, Marco Aravena 2,1 1 Teematics Group, Eectronic Engineering
More informationA Memory Grouping Method for Sharing Memory BIST Logic
A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5
More informationMACHINE learning techniques can, automatically,
Proceedings of Internationa Joint Conference on Neura Networks, Daas, Texas, USA, August 4-9, 203 High Leve Data Cassification Based on Network Entropy Fiipe Aves Neto and Liang Zhao Abstract Traditiona
More informationAlpha labelings of straight simple polyominal caterpillars
Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.
More informationFor Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah
Journa of Lightwave Technoogy Page of CFP: Cooperative Fast Protection Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapocai and Hussein T. Mouftah Abstract We introduce a nove protection scheme, caed Cooperative
More informationDiscrete elastica model for shape design of grid shells
Abstracts for IASS Annua Symposium 017 5 8th September, 017, Hamburg, Germany Annette Böge, Manfred Grohmann (eds.) Discrete eastica mode for shape design of grid shes Yusuke SAKAI* and Makoto OHSAKI a
More informationA Scalable Approach for Service Chain (SC) Mapping with Multiple SC Instances in a Wide-Area Network
JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 A Scaabe Approach for Service Chain (SC) Mapping with Mutipe SC Instances in a Wide-Area Network This is a preprint eectronic version of the
More informationWATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION
WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing 100039, China shentao@casm.ac.cn Xu Dehe Institute of resources and environment, North
More informationFurther Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code
Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222
More informationConflict graph-based Markovian model to estimate throughput in unsaturated IEEE networks
Confict graph-based Markovian mode to estimate throughput in unsaturated IEEE 802 networks Marija STOJANOVA Thomas BEGIN Anthony BUSSON marijastojanova@ens-yonfr thomasbegin@ens-yonfr anthonybusson@ens-yonfr
More informationApplication of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line
American J. of Engineering and Appied Sciences 3 (): 5-24, 200 ISSN 94-7020 200 Science Pubications Appication of Inteigence Based Genetic Agorithm for Job Sequencing Probem on Parae Mixed-Mode Assemby
More informationA Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory
0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory
More informationProviding Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks
The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department
More informationLoad Balancing by MPLS in Differentiated Services Networks
Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,
More informationOn-Chip CNN Accelerator for Image Super-Resolution
On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement
More informationComputer Networks. College of Computing. Copyleft 2003~2018
Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Attention The materias beow are
More informationA Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm
A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm
More informationResponse Surface Model Updating for Nonlinear Structures
Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,
More informationA New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions
2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing
More informationNeural Network Enhancement of the Los Alamos Force Deployment Estimator
Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the
More informationNo connection establishment Do not perform Flow control Error control Retransmission Suitable for small request/response scenario E.g.
UDP & TCP 2018/3/26 UDP Header Characteristics of UDP No connection estabishment Do not perform Fow contro Error contro Retransmission Suitabe for sma request/response scenario E.g., DNS Remote Procedure
More informationSpace-Time Trade-offs.
Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe
More informationTraffic Engineering for Provisioning Restorable Hose-Model VPNs
Traffic Engineering for Provisioning Restorabe Hose-Mode VPNs Yu-Liang Liu, Nonmember, Yeai S. Sun a) and Meng Chang Chen b), Member Summary Virtua Private Networks (VPNs) are overay networks estabished
More informationA METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds
A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed
More informationDelay Budget Partitioning to Maximize Network Resource Usage Efficiency
Deay Budget Partitioning to Maximize Network Resource Usage Efficiency Kartik Gopaan Tzi-cker Chiueh Yow-Jian Lin Forida State University Stony Brook University Tecordia Technoogies kartik@cs.fsu.edu chiueh@cs.sunysb.edu
More informationOn Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture
On inding the est Partia Muticast Protection Tree under ua-homing rchitecture Mei Yang, Jianping Wang, Xiangtong Qi, Yingtao Jiang epartment of ectrica and omputer ngineering, University of Nevada Las
More informationCollaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Middle Attacks
Coaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Midde Attacks Seung Yeob Nam a, Sirojiddin Djuraev a, Minho Park b a Department of Information and Communication Engineering, Yeungnam
More informationCongestion Avoidance and Control in Sensor Network Based on Fuzzy AQM
ICSP2012 Proceedings Congestion Avoidance and Contro in Sensor Network Based on Fuzzy AQM Luo Cheng, Xie Weixin,Li Qiusheng ATR Key Laboratory of Nationa Defense Technoogy, Shenzhen University, Shenzhen
More information(0,l) (0,0) (l,0) (l,l)
Parae Domain Decomposition and Load Baancing Using Space-Fiing Curves Srinivas Auru Fatih E. Sevigen Dept. of CS Schoo of EECS New Mexico State University Syracuse University Las Cruces, NM 88003-8001
More informationMulti-level Shape Recognition based on Wavelet-Transform. Modulus Maxima
uti-eve Shape Recognition based on Waveet-Transform oduus axima Faouzi Aaya Cheikh, Azhar Quddus and oncef Gabbouj Tampere University of Technoogy (TUT), Signa Processing aboratory, P.O. Box 553, FIN-33101
More informationJoint Optimization of Intra- and Inter-Autonomous System Traffic Engineering
Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering Kin-Hon Ho, Michae Howarth, Ning Wang, George Pavou and Styianos Georgouas Centre for Communication Systems Research, University
More informationDesign of IP Networks with End-to. to- End Performance Guarantees
Design of IP Networks with End-to to- End Performance Guarantees Irena Atov and Richard J. Harris* ( Swinburne University of Technoogy & *Massey University) Presentation Outine Introduction Mutiservice
More informationSolving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming
The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction
More informationOutline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm
Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae
More informationA HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS
A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS Etienne Cornu 1, Aain Dufaux 2, and David Hermann 1 1 AMI Semiconductor Canada, 611 Kumpf Drive,
More informationFrom i* to istar 2.0: An Evolving Social Modelling Language
From i* to istar 2.0: An Evoving Socia Modeing Language Lin Liu 1 Schoo of Software, Tsinghua University, Beijing, 100084, China iniu@tsinghua.edu.cn Abstract. Conceptua Modeing, as a thought too, heps
More informationPerformance of data networks with random links
Performance of data networks with random inks arxiv:adap-org/9909006 v2 4 Jan 2001 Henryk Fukś and Anna T. Lawniczak Department of Mathematics and Statistics, University of Gueph, Gueph, Ontario N1G 2W1,
More informationOn coding for reliable communication over packet networks
Physica Communication 1 (2008) 3 20 Fu ength artice www.esevier.com/ocate/phycom On coding for reiabe communication over packet networks Desmond S. Lun a,1, Murie Médard a,, Raf Koetter b,2, Michee Effros
More informationAn Introduction to Design Patterns
An Introduction to Design Patterns 1 Definitions A pattern is a recurring soution to a standard probem, in a context. Christopher Aexander, a professor of architecture Why woud what a prof of architecture
More informationAN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART
13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of
More informationFuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages
Fuzzy Equivaence Reation Based Custering and Its Use to Restructuring Websites Hyperinks and Web Pages Dimitris K. Kardaras,*, Xenia J. Mamakou, and Bi Karakostas 2 Business Informatics Laboratory, Dept.
More informationTIMELY INFERENCE OF LATE/LOST PACKETS IN REAL-TIME STREAMING APPLICATIONS. Ali C. Begen and Yucel Altunbasak
TIMELY INFERENCE OF LTE/LOST PCKETS IN REL-TIME STREMING PPLICTIONS i C. Begen and Yuce tunbasak Schoo of Eectrica and Computer Engineering Georgia Institute of Technoogy, tanta, G US {acbegen,yuce}@ece.gatech.edu
More informationPriority Queueing for Packets with Two Characteristics
1 Priority Queueing for Packets with Two Characteristics Pave Chuprikov, Sergey I. Nikoenko, Aex Davydow, Kiri Kogan Abstract Modern network eements are increasingy required to dea with heterogeneous traffic.
More informationLecture Notes for Chapter 4 Part III. Introduction to Data Mining
Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,
More information5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014
5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 014 Topoogy-Transparent Scheduing in Mobie Ad Hoc Networks With Mutipe Packet Reception Capabiity Yiming Liu, Member, IEEE,
More informationResearch of Classification based on Deep Neural Network
2018 Internationa Conference on Sensor Network and Computer Engineering (ICSNCE 2018) Research of Emai Cassification based on Deep Neura Network Wang Yawen Schoo of Computer Science and Engineering Xi
More informationCommunity-Aware Opportunistic Routing in Mobile Social Networks
IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract
More informationEvolutionary Algorithm Optimization of Edge Delivery Sites in Next Generation Multi-service Content Distribution Networks
Evoutionary Agorithm Optimization of Edge Deivery Sites in Next Generation Muti-service Content Distribution Networks Ioannis Stephanakis 1 and Dimitrios Logothetis 2 1 Heenic Teecommunication Organization
More informationA Method for Calculating Term Similarity on Large Document Collections
$ A Method for Cacuating Term Simiarity on Large Document Coections Wofgang W Bein Schoo of Computer Science University of Nevada Las Vegas, NV 915-019 bein@csunvedu Jeffrey S Coombs and Kazem Taghva Information
More informationDETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM
DETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM Le Minh 1, Thanh Hai Nguyen 2, Tran Nghia Khanh 2, Vo Văn Toi 2, Ngo Van Thuyen 1 1 University of Technica
More informationECE544: Communication Networks-II, Spring Transport Layer Protocols Sumathi Gopal March 31 st 2006
ECE544: Communication Networks-II, Spring 2006 Transport Layer Protocos Sumathi Gopa March 31 st 2006 Lecture Outine Introduction to end-to-end protocos UDP RTP TCP Programming detais 2 End-To-End Protocos
More informationUnixWare 7 System Administration UnixWare 7 System Configuration
UnixWare 7 System Administration - CH 3 - UnixWare 7 System Configuration Page 1 of 8 [Figures are not incuded in this sampe chapter] UnixWare 7 System Administration - 3 - UnixWare 7 System Configuration
More informationPeer-Assisted Computation Offloading in Wireless Networks, Student Member, IEEE, and Guohong Cao, Fellow, IEEE
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 17, NO. 7, JULY 2018 4565 Peer-Assisted Computation Offoading in Wireess Networks Yei Geng, Student Member, IEEE, and Guohong Cao, Feow, IEEE Abstract
More informationChapter 5 Combinational ATPG
Chapter 5 Combinationa ATPG 2 Outine Introduction to ATPG ATPG for Combinationa Circuits Advanced ATPG Techniques 3 Input and Output of an ATPG ATPG (Automatic Test Pattern Generation) Generate a set of
More informationLayout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed
Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Nattawut Thepayasuwan, Member, IEEE and Aex Doboi, Member, IEEE Abstract
More informationExtended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem
Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) botton@poms.uc.ac.be Bernard
More informationComplex Human Activity Searching in a Video Employing Negative Space Analysis
Compex Human Activity Searching in a Video Empoying Negative Space Anaysis Shah Atiqur Rahman, Siu-Yeung Cho, M.K.H. Leung 3, Schoo of Computer Engineering, Nanyang Technoogica University, Singapore 639798
More informationAutomatic Hidden Web Database Classification
Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,
More informationJoint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.
FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four
More informationIrDA IrLAP Throughput Optimisation with Physical Layer Consideration
IrDA IrLAP Throughput Optimisation with Physica Layer onsideration Abstract Barker, P. & Boucouvaas, A.. Mutimedia ommunications Research Group Schoo of Design, Engineering & omputing Bournemouth University,
More informationAs Michi Henning and Steve Vinoski showed 1, calling a remote
Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware
More informationSensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space
Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study
More informationHuman Action Recognition Using Key Points Displacement
Human Action Recognition Using Key Points Dispacement Kuan-Ting Lai,, Chaur-Heh Hsieh 3, Mao-Fu Lai 4, and Ming-Syan Chen, Research Center for Information Technoogy Innovation, Academia Sinica, Taiwan
More informationA Fast Block Matching Algorithm Based on the Winner-Update Strategy
In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping
More informationAuthorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal
Abstract Authorization of a QoS Path based on Generic Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taa Advanced Internet Research Group, Department of Computer Science, University of Amsterdam.
More informationACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega
ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES Eya En Gad, Akshay Gadde, A. Saman Avestimehr and Antonio Ortega Department of Eectrica Engineering University of Southern
More informationCOS 318: Operating Systems. Virtual Memory Design Issues: Paging and Caching. Jaswinder Pal Singh Computer Science Department Princeton University
COS 318: Operating Systems Virtua Memory Design Issues: Paging and Caching Jaswinder Pa Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Virtua Memory:
More informationSolutions to the Final Exam
CS/Math 24: Intro to Discrete Math 5//2 Instructor: Dieter van Mekebeek Soutions to the Fina Exam Probem Let D be the set of a peope. From the definition of R we see that (x, y) R if and ony if x is a
More informationSystematic Design Method and Experimental Validation of a 2-DOF Compliant Parallel Mechanism with Excellent Input and Output Decoupling Performances
appied sciences Artice Systematic Design Method Experimenta Vaidation a -DOF Compiant Parae Mechanism with Exceent Input Output Decouping Performances Yao Jiang 1,, Tiemin Li,3, *, Liping Wang,3 Feifan
More informationUniversity of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162
oward Efficient Spatia Variation Decomposition via Sparse Regression Wangyang Zhang, Karthik Baakrishnan, Xin Li, Duane Boning and Rob Rutenbar 3 Carnegie Meon University, Pittsburgh, PA 53, wangyan@ece.cmu.edu,
More information