Topology-aware Key Management Schemes for Wireless Multicast

Size: px
Start display at page:

Download "Topology-aware Key Management Schemes for Wireless Multicast"

Transcription

1 Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, Wireess Information Network Laboratory (WINLAB), Rutgers University Emai: Abstract In secure muticast appications, key management must be empoyed to provide access contro to the muticast content. In wireess networks, where the error rate is high and the bandwidth is imited, the design of key management schemes shoud pace emphasis on reducing the communication burden associated with key updating and improving the reiabiity of key distribution. The topoogy-matching key management () scheme has been proposed to reduce the communication burden associated with rekeying by matching the key tree to the network topoogy and ocaizing the transmission of rekeying messages. This scheme, however, is ony suitabe for homogeneous networks where mobies users are uniformy distributed in the service area and experience simiar deay and transmission error rates. In this paper, we present an improved topoogy-aware key management scheme that is suitabe for a arge-scae ceuar wireess network where the heterogeneity of the network is taken into consideration. The proposed scheme not ony reduces the communication overhead, but aso improves the reiabiity of the key distribution. I. INTRODUCTION The rapid progress in muticast networking has ed to the depoyment of many muticast services, such as streaming stock quotes, video conferencing and communa gaming [1]. At the same time, there has been significant advancements in buiding a goba wireess infrastructure that wi free users from the confines of static communication networks. When wireess connections finay become ubiquitous, consumers wi desire to have muticast appications running on their mobie devices. Before the wireess muticast market can be successfu, access contro mechanisms must be depoyed in order to guarantee that ony authorized users can access the muticast content. Access contro is achieved by encrypting the content using an encryption key, known as the session key (SK), which is shared by a egitimate group members. A trusted third party, known as the key distribution center (KDC), is responsibe for generating and securey communicating key materia to the group members. Since users may join and eave at any time, rekeying messages need to be sent to update keys in order to prevent the eaving user from accessing future communication and prevent the joining user from accessing previous communication. Rekeying messages must be deivered reiaby because the oss of rekeying messages resuts in severe performance degradation [2]. Further, in rea-time muticast appications the rekeying messages shoud be deivered in a timey manner so that users receive the rekeying messages before the new key takes effect. In wireess muticast scenarios, where the bandwidth is imited and the data typicay experience a higher transmission error rate than in conventiona environment, the key management design shoud pace emphasis on improving the reiabiity of key distribution as we as reducing the communication burden associated with key updating, especiay when there are many users and frequent additions to or deetions from the group membership. In [3], a communication-efficient key management scheme, caed topoogy-matching key management (), was introduced for secure wireess muticast. By matching the key tree to the network topoogy and ocaizing the transmission of rekeying messages, the scheme significanty reduces the communication cost of rekeying messages compared with the traditiona schemes [2], [4], [5] that are independent of the network topoogy. This scheme, however, is suitabe ony for homogeneous networks where mobie users are uniformy distributed in the service area and experience simiar deay and transmission error rates. In this paper, we present an improved topoogy-aware key management scheme that is suitabe for a arge-scae ceuar wireess network, where users do not have the same join/departure/mobiity behavior and the network conditions may vary. Athough focusing on the communication overhead reduction, we prove that the proposed method can aso be used to improve the reiabiity of key distribution with minor modifications. In addition, we present a unicast-assisted topoogy-matching key management () scheme, which empoys both unicast and muticast communication to deiver rekeying messages. The scheme further improves the performance of the proposed method. The rest of the paper is organized as foows. Section II introduces the concept of the and the schemes. Section III defines the performance measure and formuates the optimization probem. Section IV describes a tree design procedure considering the heterogeneity of the network. The simuation resuts are presented in Section V, foowed by the concusion in Section VI. II. TOPOLOGY-MATCHING KEY MANAGEMENT TREE In this section, we introduce the idea of matching the key tree to the network topoogy, and outine a procedure to design topoogy-aware key management schemes. A common cass of muticast key management schemes empoy a tree hierarchy for the maintenance of keying materia [2] [4] [5], as depicted in Figure 1. Each user stores his private key u i, the session key K s, and a set of key encrypting GLOBECOM /3/$ IEEE

2 K S Kε SK Service Provider Network K K K 1 K 1 K 1 K 11 KEKs K K 1 K 1 K 11 K 11 K 1 K 11 K u1 u2 u3 u16 Fig. 1. A typica key management tree Users Private Keys keys (KEKs) on the path from himsef to the root of the key tree. The session key (SK) is used to encrypt the muticast content. KEKs are a set of auxiiary keys, which are used soey for the purpose of updating the SK and other KEKs. A user s private key is ony known by that user and the KDC. Since the member join operation can be achieved without transmitting rekeying messages [5], we sha ony focus on member departure. It is observed that most rekeying messages are ony usefu to a subset of users. For exampe, when user 16 eaves the muticast service, a of the keys he possesses, {K s,k ɛ,k 1,K 11,K 111 }, shoud be updated. The message used to update K 111 is ony usefu to user 15, the message used to update K 11 is ony usefu to user 13,14,15, the message used to update K 1 is ony usefu to user 9, 1,, 15, and the message used to update K ɛ and K s are usefu to a users. Therefore, rekeying messages do not have to be sent to every user in the muticast group. This observation motivates us to design a key management tree that matches the network topoogy in such a way that the neighbors on the key tree are aso physica neighbors on the network. Particuary, the key tree is designed to match the ceuar network topoogy depicted in Figure 2. This ceuar network mode, as proposed in [6], consists of mobie users, base stations () and supervisor hosts (). s administer the s and hande most of the routing and protoco detais for mobie users. The service provider, the s, and the s are connected through a wireine backbone, whie the s and the mobie users are connected through wireess channes. The key management tree is designed in three steps: Step 1: Design a subtree for the users under each. These subtrees are caed user subtrees. Step 2: Design subtrees which govern the key hierarchy between the s and the s. These subtrees sha be caed subtrees. Step 3: Design a subtree which governs the key hierarchy between the s and the KDC. This subtree sha be caed the subtree. Figure 3 iustrates an exampe of a key tree that matches the network topoogy shown in Figure 2. By deivering the rekeying messages ony to the users who need them, we can take advantage of the fact that the key tree matches the network topoogy, and ocaize the deivery of rekeying messages to sma regions of the network. This essens the amount of traffic oad as we as enhances the reiabiity of key distribution. Fig. 2. Base Station Non group members group members A ceuar wireess network mode Simiar to [3], we assume that the s and the s have the knowedge of whether the rekeying messages are usefu for the users under them. Using this knowedge, which can be conveyed in the rekeying message header, it is possibe to make ony a subset of s or s transmit messages. That is, a wi muticast a message to their s if the message is usefu to at east one of its s, and a wi muticast if the message is usefu to at east one of its users. When unicast connections between s and s are avaiabe and the number of s that need the messages, denoted by T bs, is sma, it is possibe to reduce the amount of communication by using unicast channes as opposed to muticast channes. Muticast routing protocos do not have the abiity to target message deivery to specific subsets of users. Therefore, when muticasting is empoyed, a rekeying message is sent to the entire group of s, regardess of whether or not a s need that message. Unicast, however, achieves an advantage since it aows for the rekeying message to be sent ony to those s that need that message. Therefore, we propose a transmission strategy between s and s as: When T bs T th, the sends rekeying messages to the s who need the messages using unicast. When T bs >T th, the muticast rekeying messages to a of its s. The threshod T th shoud be determined from the reative cost of the unicast communication compared to the muticast communication. In the reminder of the paper, wi represent the topoogy-matching key management scheme with the first transmission strategy and unicast-assisted () wi represent the topoogy-matching key management scheme using both unicast and muticast communications. Traditiona key management trees, such as those in [4], [5], are independent of the network topoogy, and we ca them Topoogy Independent Key Management () trees. When using a tree, the users are scattered a over the network, and therefore, it is not possibe to ocaize the deivery of rekeying messages. The comparison amongst, and schemes wi be further discussed through simuations in Section V. In the mobie environment, the user wi subscribe to a muticast service under an initia host agent, and through the course of his service move to different ces and undergo handoff to different base stations. Since the and trees depend on the network structure, the physica GLOBECOM /3/$ IEEE

3 ocation of a user affects the user s position on the key management tree. In this paper, we assume that the handoffs ony occur between s under the same, and the efficient handoff scheme proposed in [3] is empoyed to hande user reocation on the key tree. III. PERFORMANCE MEASURE A. Communication Overhead As discussed in the previous section, rekeying messages are first muticast/unicast to s, then broadcast to mobie users. We first define severa variabes as foows. The muticast-message-size is defined as the size of the rekeying messages muticast from the th to its s, denoted by Sm. The unicast-message-size is defined as the size of the rekeying messages unicast from the th to its s, denoted by Su. The wireess-message-size is defined as the size of the rekeying messages broadcast by the s to mobie users under the th, denoted by Sw. n sh denotes the number of s in the system. Under the th, there are n bs s, each of which has n user users. n sh and n bs are assumed to be fixed during the service. Then, the communication cost of the key management schemes is described by wireine cost C wire, wireess cost C wireess, and tota cost C T,as: C wire = αme[s m]+α ue[s u], (1) =1 C wireess = αwe[s w], (2) =1 C T = γ C wireess +(1 γ) C wire, (3) where E[.] is the expectation over the statistics governing the user joining and eaving behavior. Here, γ 1 is the wireess weight, which represents the importance of the wireess cost. {αm}, {αu} and {αm} are sets of weight factors that describe the reative importance of the muticast-messagesize, unicast-message-size, and wireess-message-size under the th, respectivey. The threshod T th in the scheme sha be chosen as α m α. When the s administer u areas with simiar physica network structure and conditions, we approximate {αm}, {αu} and {αm} by 1. B. Reiabiity of Key Distribution The reiabiity of key distribution is critica for key management schemes in wireess networks where the transmission error rate is usuay higher than that in conventiona wireine environment. The oss of rekeying messages resuts in severe performance degradation [2]. If a user oses one key, he not ony wi be unabe to access muticast content encrypted by this key, but aso may not be abe to acquire future keys from future rekeying messages. We introduce three error probabiities for each : (1) the probabiity that one user cannot receive a rekeying message Fig. 3. KDC A Topoogy Matching Key Management Tree correcty from the, denoted by p w; (2) the probabiity that one cannot receive a rekeying message correcty from the through muticast channe, denoted by p m; and (3) the probabiity that one cannot receive a rekeying message correcty from the through the unicast channe, denoted by p u, where =1, 2,,n sh. Users packet oss is assumed to be independent. We define the reiabiity measure P s as the probabiity that a users receive rekeying messages correcty with the average muticast-message-size, unicast-message-size and wireess-messages-size, i.e. P s = and og P s = (1 p w) n user E[S w ] (1 p m) n bs E[S m ] (1 p u) E[S u ], (ˆα w E[S w]+ˆα me[s m]+ˆα ue[s u] ), (4) where ˆα w = n user og(1 p w), ˆα m = n bs og(1 p m), and ˆα u = og(1 p u). Comparing (4) with (1)-(3), it is seen that P s is cosey reated with C T. The techniques that reduce the communication cost can be easiy extended to improve the reiabiity of the key distribution. Particuary, when choosing αw =ˆα w/γ, αm = ˆα m/(1 γ), and αu = ˆα u/(1 γ), the soution that minimizes the tota communication cost in (3) woud maximize P s in (4). Thus, we ony focus on reducing the communication overhead in the remainder of the paper. IV. OPTIMIZATION AND SUBTREE DESIGN In this section, we formuate the optimization probem and describe the key tree design procedures. When a user eaves the service, the keys that need to be updated are divided into three categories: (1)thekeysonthe user subtree, (2) the keys on the subtree, and (3) the keys on the subtree. We can prove that C T = p (k)g (k)a 1(k)+ p (k)g (k)a 2(k) =1 k =1 k ( ) + A 3 p (k)g (k), (5) =1 k where p (k) is the probabiity mass function of the number of users under the th, and G (k) is the probabiity that one of the k users eaves from the th. Here, A 1(k), A 2(k) and A 3 describe the communication cost due to updating keys in category 1, 2, and 3 respectivey, when there are k users GLOBECOM /3/$ IEEE

4 Kε ( q q 5, β β 5 ) ( q 1 + q 2 + q 3, β 1 + β 2 + β 3 ) K K ( q 1 + q 2, β 1 + β 2 ) 1 2 ( q 1, β 1 ) ( q 2, β 2 ) Fig. 4. K s ( q 4 + q 5, β 4 + β 5 ) ( q 3, β 3 ) ( q 4, β 4 ) ( q 5, β 5 ) An exampe of the subtree C sh Comparison of different subtree Design Methods (II) Baanced tree GD Agorithm Optima Tree under the th and one of them eaves. We can prove that the structure of the user-subtrees ony affects A 1(k), the structure of the -subtrees ony affects A 2(k), and the structure of the -subtrees ony affects A 3. Equation (5) indicates that the user subtrees, subtrees and subtree can be designed and optimized separatey. Particuary, the user subtrees under the th shoud be designed to minimize k p (k)g (k)a 1(k), the subtree under the th shoud be designed to minimize k p (k)g (k)a 2(k), and the subtree shoud be designed to minimize n sh ( =1 A 3 k p (k)g (k) ). This is a desired property because optimizing the subtrees separatey reduces the dimension of the search space for optima tree parameters. We use the ALX tree structure proposed in [3] to design user subtrees and subtrees. Since the design method is very simiar to what has been presented in [3], we ony discuss the design of the subtree in this paper. In a typica ceuar network, each administers a arge area where both the user dynamics and the network conditions may differ significanty from the areas administered by other s. The ALX tree structure, which treats every eaf equay, is not suitabe for buiding the subtree. Instead, the heterogeneity may be addressed by buiding a tree where the s have varying path engths from the root to their eaf node. The root of the subtree is the KDC, and the eaves are the s. The design goa is to minimize the third term in equation (5), which we denote by C sh and is given by C sh = q A 3, (6) =1 where q = k p (k)g (k). Letβ be the communication cost of transmitting one rekeying message to a the users under the th. Based on the definition of α 1 and α 2 in Section II, it is easy to show that β =(1 γ)α m + γn bs α w. The vaue of A 3 can be cacuated directy from {β }.For exampe, if the subtree has the structure iustrated in Figure 4 and a user eaves the service from 1, then, A 1 3 =2(β 1 +β 2 )+2(β 1 +β 2 +β 3 )+2(β 1 +β 2 +β 3 +β 4 +β 5 ). The goa of subtree design is to find a tree structure that minimizes C sh given β and q. However, it is very difficut to do so based on (6). Thus, we compute C sh inadifferent way. We sha assign a pair of positive numbers, caed a cost pair, to each node on the tree as foows: the cost pair of the eaf node that represents the th is (q,β ); the cost pairs of the intermediate nodes are the eement-wise summation of Fig The number of s Comparison of severa subtree design methods their chidren nodes cost pairs, as iustrated in Figure 4. The cost pairs of a intermediate nodes are represented by (x m,y m ), where m =1, 2,,M, and M is the tota number of intermediate nodes on the tree. Then, we can prove that C sh can aso be cacuated as C sh = n M m=1 x m y m, where n is the degree of the -subtree. This new formuation eads to a tree construction method for n =2as: 1) Labe a the eaf nodes together with their cost pairs, and mark them to be active nodes. 2) Choose two active nodes, (x i,y i ) and (x j,y j ), such that (x i +x j ) (y i +y j ) is minimized among a possibe pairs of active nodes. Mark those two nodes to be inactive and merge them to generate a new active node with the cost pair (x i + x j,y i + y j ). 3) Repeat step 2 unti there is ony one active node eft. This method, which we ca greedy- subtree-design (GD) agorithm, can be easiy extended to n>2cases. We can prove that the GD agorithm produces the optima soution when β 1 = β 2 = β nsh, but it is not optima in genera. The performance of the GD agorithm wi be demonstrated through simuations in Section V. V. SIMULATION RESULTS We first compare the subtree generated using the proposed GD agorithm with the optima tree obtained by exhaustive search, and with a baanced tree that treats each equay. In the simuation, haf of the {β } are randomy seected from [1, 2], which represent rura areas, and the other haf of {β } are randomy seected from [11, 12], which represent metropoitan areas. In addition, q is chosen to be proportiona to β, where = 1, 2,,n sh, and {q } are normaized so that q =1. In Figure 5, the communication cost due to updating keys on -subtrees, C sh,isshownfor different subtree design methods. Since exhaustive search is computationay very expensive, it is ony done for 1 and fewer s. It is observed that the performance of the GD agorithm is very cose to the optimum. Compared with the baanced tree, the GD agorithm reduces C sh by up to 18%. Figure 6 demonstrates the performance of, and schemes in systems with one. Simiar to [7], we empoyed a homogeneous ceuar network that consists of 12 concatenated ces, and wrap the ce pattern to avoid edge effects. The mobiity mode proposed in [8] is adopted. GLOBECOM /3/$ IEEE

5 15 x 15 One, R=4 mie, V max =5 mie/hr, 1/µ = 2 minute 6 x 17 mutipe, R=4 mie, V max =5 mie/hr, 1/µ = 2 minute wireess cost 1 5 wireess cost 4 2 performance ratio wireine cost x / / user join rate (λ) Fig. 6. Performance Comparison for different user join rate R denotes the radius of the ces, and V max denotes the maximum speed of the mobie users. The M/M/ queueing mode is used to describe the membership dynamics for a muticast service. We define the performance ratio η as the tota communication cost of the tree divided by the tota communication cost of the tree. Figure 6 shows the simuation resuts of wireine cost, wireess cost and the performance ratio for different user join rates, when R =4 mies, V max = 5 mies per hour, γ = 2/3, αm/α u = n bs /4, and the average service time is 2 minutes. Compared with the scheme, scheme reduces the wireess cost but increases the wireine cost, whie scheme reduces both wireess cost and wireine cost. For this particuar simuation setup, the wireine cost of the scheme is ony about 5% of the wireine cost of the scheme. The simuation resuts of the performance ratio indicate that the scheme reduces the tota communication cost to 35-45% and the scheme reduces the tota communication cost to 32-43% of the tota communication cost of the scheme. In Figure 7,, and schemes are compared when the system contains mutipe s, under which users have the same joining/eaving/mobiity behavior and experience the same network conditions. When n sh 2, the and scheme reduce both the wireess and wireine cost. The advantages of the and trees are more significant when the system contains more s. Athough the tree aways has smaer wireine cost, the difference between the and scheme becomes ess significant when the number of s is arge. In this case, the communication cost of the and schemes can be as ow as 2% of the communication cost of the trees. This indicates an 8% reduction in the communication cost. A more compicated system containing 5 s with user joining rate 5, 1, 15, 2 and 25 per second respectivey was aso simuated. When R =4mies, V max =5mies/hr, and average service time is 2 minutes, the wireess cost of the and scheme is 21.8% of that of the performance ratio wireine cost 6 x / /.2 the number of Fig. 7. Performance comparison for different number of s scheme, the wireine cost of the scheme is 35.9% of that of the scheme, and the wireine cost of the scheme is 32.% of that of the scheme. VI. CONCLUSION In this paper, we presented a topoogy-aware key management scheme that is suitabe for a arge-scae ceuar wireess network, where users do not have the same join/departure/mobiity behavior and the network conditions may vary under different s. Simuations were performed for different user join rates and varying number of s. Compared with the traditiona key management schemes that are independent of the network topoogy, the proposed scheme can significanty reduce the communication cost by up to 8%. In addition, we presented the scheme, which empoys both unicast and muticast communication in the deivery of rekeying messages and can further reduce the wireine communication of rekeying messages by about 5%. We aso showed that the proposed methods can be used to enhance the reiabiity of the key distribution. REFERENCES [1] S. Pau, Muticast on the Internet and its appications, Kuwer Academic Pubishers, [2] M.J. Moyer, J.R. Rao, and P. Rohatgi, A survey of security issues in muticast communications, IEEE Network, vo. 13, no. 6, pp , Nov.-Dec [3] Y. Sun; W. Trappe; K.J.Ray Liu, An efficient key management scheme for secure wireess muticast, Proc. of IEEE Internationa Conference on Communication, pp , May 22. [4] C. Wong, M. Gouda, and S. Lam, Secure group communications using key graphs, IEEE/ACM Trans. on Networking, vo. 8, pp. 16 3, Feb. 2. [5] M. Wadvoge, G. Caronni, D. Sun, N. Weier, and B. Pattner, The VersaKey framework: Versatie group key management, IEEE Journa on seected areas in communications, vo. 17, no. 9, pp , Sep [6] K. Brown and S. Singh, ReM: Reiabe muticast for mobie networks, Computer Communication, vo. 2.1, no. 16, pp , June [7] M. Rajaratnam and F. Takawira, Noncassica traffic modeing and performance anaysis of ceuar mobie networks with and without channe reservation, IEEE Trans. on Vehicuar Technoogy, vo. 49, no. 3, pp , May 2. [8] M. M. Zonoozi and P. Dassanayake, User mobiity modeing and characterization of mobiity patterns, IEEE Journa on Seected Areas in Communications, vo. 15, no. 7, pp , Sep GLOBECOM /3/$ IEEE

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing An Adaptive Two-Copy Deayed SR-ARQ for Sateite Channes with Shadowing Jing Zhu, Sumit Roy zhuj@ee.washington.edu Department of Eectrica Engineering, University of Washington Abstract- The paper focuses

More information

Community-Aware Opportunistic Routing in Mobile Social Networks

Community-Aware Opportunistic Routing in Mobile Social Networks IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract

More information

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks Ad Hoc Networks (3) 683 698 Contents ists avaiabe at SciVerse ScienceDirect Ad Hoc Networks journa homepage: www.esevier.com/ocate/adhoc Dynamic agent-based hierarchica muticast for wireess mesh networks

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014 5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 014 Topoogy-Transparent Scheduing in Mobie Ad Hoc Networks With Mutipe Packet Reception Capabiity Yiming Liu, Member, IEEE,

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

TSR: Topology Reduction from Tree to Star Data Grids

TSR: Topology Reduction from Tree to Star Data Grids 03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

Interference Spins Popovski, Petar; Simeone, Osvaldo; Nielsen, Jimmy Jessen; Stefanovic, Cedomir

Interference Spins Popovski, Petar; Simeone, Osvaldo; Nielsen, Jimmy Jessen; Stefanovic, Cedomir Aaborg Universitet Interference Spins Popovski, Petar; Simeone, Osvado; Niesen, Jimmy Jessen; Stefanovic, Cedomir Pubished in: I E E E Communications Letters DOI (ink to pubication from Pubisher): 10.1109/LCOMM.2014.2387166

More information

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong

More information

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs Repication of Virtua Network Functions: Optimizing Link Utiization and Resource Costs Francisco Carpio, Wogang Bziuk and Admea Jukan Technische Universität Braunschweig, Germany Emai:{f.carpio, w.bziuk,

More information

Design of IP Networks with End-to. to- End Performance Guarantees

Design of IP Networks with End-to. to- End Performance Guarantees Design of IP Networks with End-to to- End Performance Guarantees Irena Atov and Richard J. Harris* ( Swinburne University of Technoogy & *Massey University) Presentation Outine Introduction Mutiservice

More information

QoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization

QoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization QoS-Aware Data Transmission and Wireess Energy Transfer: Performance Modeing and Optimization Dusit Niyato, Ping Wang, Yeow Wai Leong, and Tan Hwee Pink Schoo of Computer Engineering, Nanyang Technoogica

More information

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism Backing-up Fuzzy Contro of a Truck-traier Equipped with a Kingpin Siding Mechanism G. Siamantas and S. Manesis Eectrica & Computer Engineering Dept., University of Patras, Patras, Greece gsiama@upatras.gr;stam.manesis@ece.upatras.gr

More information

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Y.LI AND B.BHANU CAMERA ASSIGNMENT: A GAME-THEORETIC

More information

Low Traffic Overlay Networks with Large Routing Tables

Low Traffic Overlay Networks with Large Routing Tables Low Traffic Overay Networks with Large Routing Tabes Chunqiang Tang, Meissa J. Buco, Rong N. Chang, Sandhya Dwarkadas, Laura Z. Luan, Edward So, and Christopher Ward ABSTRACT The routing tabes of Distributed

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

Fastest-Path Computation

Fastest-Path Computation Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods

More information

Delay Budget Partitioning to Maximize Network Resource Usage Efficiency

Delay Budget Partitioning to Maximize Network Resource Usage Efficiency Deay Budget Partitioning to Maximize Network Resource Usage Efficiency Kartik Gopaan Tzi-cker Chiueh Yow-Jian Lin Forida State University Stony Brook University Tecordia Technoogies kartik@cs.fsu.edu chiueh@cs.sunysb.edu

More information

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 7, SEPTEMBER

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 7, SEPTEMBER IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 7, SEPTEMBER 2012 3191 Anaytica Modeing of Muti-hop IEEE 802.15.4 Networks Piergiuseppe Di Marco, Student Member, IEEE, Pangun Park, Member, IEEE,

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

Service Scheduling for General Packet Radio Service Classes

Service Scheduling for General Packet Radio Service Classes Service Scheduing for Genera Packet Radio Service Casses Qixiang Pang, Amir Bigoo, Victor C. M. Leung, Chris Schoefied Department of Eectrica and Computer Engineering, University of British Coumbia, Vancouver,

More information

Blackboard Mechanism Based Ant Colony Theory for Dynamic Deployment of Mobile Sensor Networks

Blackboard Mechanism Based Ant Colony Theory for Dynamic Deployment of Mobile Sensor Networks Journa of Bionic Engineering 5 (2008) 197 203 Bacboard Mechanism Based Ant Coony Theory for Dynamic Depoyment of Mobie Sensor Networs Guang-ping Qi, Ping Song, Ke-jie Li Schoo of Aerospace Science and

More information

Modelling and Performance Evaluation of Router Transparent Web cache Mode

Modelling and Performance Evaluation of Router Transparent Web cache Mode Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7,1316-1320 Modeing and Performance Evauation of Transparent cache Mode Emad Hassan A-Hemiary Network Engineering Department, Coege of Information Engineering,

More information

Location Aided Hybrid Routing Algorithm for MANET

Location Aided Hybrid Routing Algorithm for MANET Internationa Journa of Engineering & Technoogy IJET-IJENS Vo: No: 0 30 Location Aided Hybrid Routing Agorithm for MANET Mamoun Hussein Mamoun Facuty of Computer and Information Sciences Mansoura University,

More information

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES Eya En Gad, Akshay Gadde, A. Saman Avestimehr and Antonio Ortega Department of Eectrica Engineering University of Southern

More information

Congestion Avoidance and Control in Sensor Network Based on Fuzzy AQM

Congestion Avoidance and Control in Sensor Network Based on Fuzzy AQM ICSP2012 Proceedings Congestion Avoidance and Contro in Sensor Network Based on Fuzzy AQM Luo Cheng, Xie Weixin,Li Qiusheng ATR Key Laboratory of Nationa Defense Technoogy, Shenzhen University, Shenzhen

More information

Modeling the Time Varying Behavior of Mobile Ad-Hoc Networks

Modeling the Time Varying Behavior of Mobile Ad-Hoc Networks Modeing the Time Varying Behavior of Mobie Ad-Hoc Networks David Tipper University of Pittsburgh 5 N. Beefied Avenue Pittsburgh, PA UA 560 (4) 64-94 tipper@tee.pitt.edu Yi Qian University of Puerto Rico

More information

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions 2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing

More information

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:

More information

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study

More information

Automatic Hidden Web Database Classification

Automatic Hidden Web Database Classification Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,

More information

A Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks

A Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks Sensors 2013, 13, 16424-16450; doi:10.3390/s131216424 Artice OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journa/sensors A Near-Optima Distributed QoS Constrained Routing Agorithm for Mutichanne Wireess

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

No connection establishment Do not perform Flow control Error control Retransmission Suitable for small request/response scenario E.g.

No connection establishment Do not perform Flow control Error control Retransmission Suitable for small request/response scenario E.g. UDP & TCP 2018/3/26 UDP Header Characteristics of UDP No connection estabishment Do not perform Fow contro Error contro Retransmission Suitabe for sma request/response scenario E.g., DNS Remote Procedure

More information

ECE544: Communication Networks-II, Spring Transport Layer Protocols Sumathi Gopal March 31 st 2006

ECE544: Communication Networks-II, Spring Transport Layer Protocols Sumathi Gopal March 31 st 2006 ECE544: Communication Networks-II, Spring 2006 Transport Layer Protocos Sumathi Gopa March 31 st 2006 Lecture Outine Introduction to end-to-end protocos UDP RTP TCP Programming detais 2 End-To-End Protocos

More information

On coding for reliable communication over packet networks

On coding for reliable communication over packet networks Physica Communication 1 (2008) 3 20 Fu ength artice www.esevier.com/ocate/phycom On coding for reiabe communication over packet networks Desmond S. Lun a,1, Murie Médard a,, Raf Koetter b,2, Michee Effros

More information

MCSE Training Guide: Windows Architecture and Memory

MCSE Training Guide: Windows Architecture and Memory MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

l Tree: set of nodes and directed edges l Parent: source node of directed edge l Child: terminal node of directed edge

l Tree: set of nodes and directed edges l Parent: source node of directed edge l Child: terminal node of directed edge Trees & Heaps Week 12 Gaddis: 20 Weiss: 21.1-3 CS 5301 Fa 2016 Ji Seaman 1 Tree: non-recursive definition Tree: set of nodes and directed edges - root: one node is distinguished as the root - Every node

More information

Image Segmentation Using Semi-Supervised k-means

Image Segmentation Using Semi-Supervised k-means I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging

More information

Modern Physical Design: Algorithm Technology Methodology (Part III)

Modern Physical Design: Algorithm Technology Methodology (Part III) ICCAD Tutoria, November 9, 2000 Modern Physica Design: Agorithm Technoogy Methodoogy (Part III) Stan Chow Ammocore Andrew B. Kahng UCSD Majid Sarrafzadeh UCLA 1 ICCAD Tutoria: November 9, 2000 Goas of

More information

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802.

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802. A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irreguar LDPC Codes in the IEEE 82.16e Standards Yeong-Luh Ueng and Chung-Chao Cheng Dept. of Eectrica Engineering,

More information

Pneumo-Mechanical Simulation of a 2 Dof Planar Manipulator

Pneumo-Mechanical Simulation of a 2 Dof Planar Manipulator Pneumo-Mechanica Simuation of a 2 Dof Panar Manipuator Hermes GIBERTI, Simone CINQUEMANI Mechanica Engineering Department, Poitecnico di Miano, Campus Bovisa Sud, via La Masa 34, 2156, Miano, Itay ABSTRACT

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Attention The materias beow are

More information

IBM Research Report. On the Tradeoff among Capacity, Routing Hops, and Being Peer-to-Peer in the Design of Structured Overlay Networks

IBM Research Report. On the Tradeoff among Capacity, Routing Hops, and Being Peer-to-Peer in the Design of Structured Overlay Networks RC355 (W5-4) February 4, 5 Computer Science IBM Research Report On the Tradeoff among Capacity, Routing Hops, and Being Peer-to-Peer in the Design of Structured Overay Networks Chunqiang Tang, Meissa J.

More information

Collaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Middle Attacks

Collaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Middle Attacks Coaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Midde Attacks Seung Yeob Nam a, Sirojiddin Djuraev a, Minho Park b a Department of Information and Communication Engineering, Yeungnam

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Scheduing Announcement Homework 2 due on October 25th Project 1 due on October 26th 2 CSE 120 Scheduing and Deadock Scheduing Overview In discussing

More information

Automatic Grouping for Social Networks CS229 Project Report

Automatic Grouping for Social Networks CS229 Project Report Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct

More information

Optimized Base-Station Cache Allocation for Cloud Radio Access Network with Multicast Backhaul

Optimized Base-Station Cache Allocation for Cloud Radio Access Network with Multicast Backhaul Optimized Base-Station Cache Aocation for Coud Radio Access Network with Muticast Backhau Binbin Dai, Student Member, IEEE, Ya-Feng Liu, Member, IEEE, and Wei Yu, Feow, IEEE arxiv:804.0730v [cs.it] 28

More information

Efficient Histogram-based Indexing for Video Copy Detection

Efficient Histogram-based Indexing for Video Copy Detection Efficient Histogram-based Indexing for Video Copy Detection Chih-Yi Chiu, Jenq-Haur Wang*, and Hung-Chi Chang Institute of Information Science, Academia Sinica, Taiwan *Department of Computer Science and

More information

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method 297 Rea-Time Feature escriptor Matching via a Muti-Resoution Ehaustive Search Method Chi-Yi Tsai, An-Hung Tsao, and Chuan-Wei Wang epartment of Eectrica Engineering, Tamang University, New Taipei City,

More information

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department

More information

A Novel Congestion Control Scheme for Elastic Flows in Network-on-Chip Based on Sum-Rate Optimization

A Novel Congestion Control Scheme for Elastic Flows in Network-on-Chip Based on Sum-Rate Optimization A Nove Congestion Contro Scheme for Eastic Fows in Network-on-Chip Based on Sum-Rate Optimization Mohammad S. Taebi 1, Fahimeh Jafari 1,3, Ahmad Khonsari 2,1, and Mohammad H. Yaghmae 3 1 IPM, Schoo of

More information

IrDA IrLAP Throughput Optimisation with Physical Layer Consideration

IrDA IrLAP Throughput Optimisation with Physical Layer Consideration IrDA IrLAP Throughput Optimisation with Physica Layer onsideration Abstract Barker, P. & Boucouvaas, A.. Mutimedia ommunications Research Group Schoo of Design, Engineering & omputing Bournemouth University,

More information

Space-Time Trade-offs.

Space-Time Trade-offs. Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe

More information

Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering

Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering Kin-Hon Ho, Michae Howarth, Ning Wang, George Pavou and Styianos Georgouas Centre for Communication Systems Research, University

More information

NOWDAYS, our ways of living are under gradual but

NOWDAYS, our ways of living are under gradual but Transmission Management of Deay-Sensitive Medica Packets in Beyond Wireess Body Area Networks: A Queueing Game Approach Changyan Yi, Student Member, IEEE, and Jun Cai, Senior Member, IEEE Abstract In this

More information

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae

More information

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints *

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG

More information

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162 oward Efficient Spatia Variation Decomposition via Sparse Regression Wangyang Zhang, Karthik Baakrishnan, Xin Li, Duane Boning and Rob Rutenbar 3 Carnegie Meon University, Pittsburgh, PA 53, wangyan@ece.cmu.edu,

More information

Quality of Service Evaluations of Multicast Streaming Protocols *

Quality of Service Evaluations of Multicast Streaming Protocols * Quaity of Service Evauations of Muticast Streaming Protocos Haonan Tan Derek L. Eager Mary. Vernon Hongfei Guo omputer Sciences Department University of Wisconsin-Madison, USA {haonan, vernon, guo}@cs.wisc.edu

More information

A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS

A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS Etienne Cornu 1, Aain Dufaux 2, and David Hermann 1 1 AMI Semiconductor Canada, 611 Kumpf Drive,

More information

International Journal of Electronics and Communications (AEÜ)

International Journal of Electronics and Communications (AEÜ) Int. J. Eectron. Commun. (AEÜ) 67 (2013) 470 478 Contents ists avaiabe at SciVerse ScienceDirect Internationa Journa of Eectronics and Communications (AEÜ) journa h o me pa ge: www.esevier.com/ocate/aeue

More information

Load Balance vs Energy Efficiency in Traffic Engineering: A Game Theoretical Perspective

Load Balance vs Energy Efficiency in Traffic Engineering: A Game Theoretical Perspective Load Baance vs Energy Efficiency in Traffic Engineering: A Game Theoretica Perspective Yangming Zhao, Sheng Wang, Shizhong Xu and Xiong Wang Schoo of Communication and Information Engineering University

More information

AUTOMATIC IMAGE RETARGETING USING SALIENCY BASED MESH PARAMETERIZATION

AUTOMATIC IMAGE RETARGETING USING SALIENCY BASED MESH PARAMETERIZATION S.Sai Kumar et a. / (IJCSIT Internationa Journa of Computer Science and Information Technoogies, Vo. 1 (4, 010, 73-79 AUTOMATIC IMAGE RETARGETING USING SALIENCY BASED MESH PARAMETERIZATION 1 S.Sai Kumar,

More information

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University Arithmetic Coding Prof. Ja-Ling Wu Department of Computer Science and Information Engineering Nationa Taiwan University F(X) Shannon-Fano-Eias Coding W..o.g. we can take X={,,,m}. Assume p()>0 for a. The

More information

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,

More information

Cross-layer Design for Efficient Resource Utilization in WiMedia UWB-based WPANs

Cross-layer Design for Efficient Resource Utilization in WiMedia UWB-based WPANs Cross-ayer Design for Efficient Resource Utiization in WiMedia UWB-based WPANs RAED AL-ZUBI and MARWAN KRUNZ Department of Eectrica and Computer Engineering. University of Arizona. Utra-wideband (UWB)

More information

MACHINE learning techniques can, automatically,

MACHINE learning techniques can, automatically, Proceedings of Internationa Joint Conference on Neura Networks, Daas, Texas, USA, August 4-9, 203 High Leve Data Cassification Based on Network Entropy Fiipe Aves Neto and Liang Zhao Abstract Traditiona

More information

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y. FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four

More information

Quality Assessment using Tone Mapping Algorithm

Quality Assessment using Tone Mapping Algorithm Quaity Assessment using Tone Mapping Agorithm Nandiki.pushpa atha, Kuriti.Rajendra Prasad Research Schoar, Assistant Professor, Vignan s institute of engineering for women, Visakhapatnam, Andhra Pradesh,

More information

BGP ingress-to-egress route configuration in a capacityconstrained Asia-Pacific Conference On Communications, 2005, v. 2005, p.

BGP ingress-to-egress route configuration in a capacityconstrained Asia-Pacific Conference On Communications, 2005, v. 2005, p. Tite BGP -to- route configuration in a capacityconstrained AS Author(s) Chim, TW; Yeung, KL; Lu KS Citation 2005 Asia-Pacific Conference On Communications, 2005, v. 2005, p. 386-390 Issued Date 2005 URL

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation

1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation 1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER 2014 Bacward Fuzzy Rue Interpoation Shangzhu Jin, Ren Diao, Chai Que, Senior Member, IEEE, and Qiang Shen Abstract Fuzzy rue interpoation

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

On-Chip CNN Accelerator for Image Super-Resolution

On-Chip CNN Accelerator for Image Super-Resolution On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

Relocation of Hopping Sensors

Relocation of Hopping Sensors 28 IEEE Internationa Conference on Robotics and Automation Pasadena, CA, USA, May 9-23, 28 Reocation of Hopping Sensors Zhiwei Cen Googe Inc. 6 Amphitheatre Pky Mountain View, CA 9443, USA Matt W. Mutka

More information

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM 17th European Signa Processing Conference (EUSIPCO 2009) Gasgow, Scotand, August 24-28, 2009 THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM P. Murray 1, S. Marsha 1, and E.Buinger 2 1 Dept. of Eectronic

More information

A Method for Calculating Term Similarity on Large Document Collections

A Method for Calculating Term Similarity on Large Document Collections $ A Method for Cacuating Term Simiarity on Large Document Coections Wofgang W Bein Schoo of Computer Science University of Nevada Las Vegas, NV 915-019 bein@csunvedu Jeffrey S Coombs and Kazem Taghva Information

More information

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction

More information

Performance of data networks with random links

Performance of data networks with random links Performance of data networks with random inks arxiv:adap-org/9909006 v2 4 Jan 2001 Henryk Fukś and Anna T. Lawniczak Department of Mathematics and Statistics, University of Gueph, Gueph, Ontario N1G 2W1,

More information

Alpha labelings of straight simple polyominal caterpillars

Alpha labelings of straight simple polyominal caterpillars Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.

More information

Minimizing Resource Cost for Camera Stream Scheduling in Video Data Center

Minimizing Resource Cost for Camera Stream Scheduling in Video Data Center Gao YH, Ma HD, Liu W. Minimizing resource cost for camera stream scheduing in video data center. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 555 570 May 2017. DOI 10.1007/s11390-017-1743-x Minimizing

More information

Analysis of Random. Processes via And-Or Tree Evaluation. Michael Mitzenmachert M. Amin Shokrollahiz

Analysis of Random. Processes via And-Or Tree Evaluation. Michael Mitzenmachert M. Amin Shokrollahiz Anaysis of Random Processes via And-Or Tree Evauation Michae G. Luby* Michae Mitzenmachert M. Amin Shokroahiz Abstract distributions not considered by previous anayses. We introduce a new set of probabiistic

More information

Priority Queueing for Packets with Two Characteristics

Priority Queueing for Packets with Two Characteristics 1 Priority Queueing for Packets with Two Characteristics Pave Chuprikov, Sergey I. Nikoenko, Aex Davydow, Kiri Kogan Abstract Modern network eements are increasingy required to dea with heterogeneous traffic.

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

Feedback-Free Packet Loss Recovery for Video Multicast

Feedback-Free Packet Loss Recovery for Video Multicast Feedback-Free Packet Loss Recovery or Video Muticast Xing Zheng S.-H. Gary Chan Qian Zhang Wen-Wu Zhu Ya-Qin Zhang Department o Computer Science Microsot Research Asia The Hong Kong University o Science

More information

Real Time Abnormal Motion Detection in Surveillance Video

Real Time Abnormal Motion Detection in Surveillance Video Rea Time Abnorma Motion Detection in Surveiance Video Nahum Kiryati Yan Ivanchenko Tammy Rikin Raviv Shay Roche Vision and Image Anaysis Laboratory Schoo of Eectrica Engineering Te Aviv University Background

More information

(0,l) (0,0) (l,0) (l,l)

(0,l) (0,0) (l,0) (l,l) Parae Domain Decomposition and Load Baancing Using Space-Fiing Curves Srinivas Auru Fatih E. Sevigen Dept. of CS Schoo of EECS New Mexico State University Syracuse University Las Cruces, NM 88003-8001

More information

Response Surface Model Updating for Nonlinear Structures

Response Surface Model Updating for Nonlinear Structures Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,

More information

MULTITASK MULTIVARIATE COMMON SPARSE REPRESENTATIONS FOR ROBUST MULTIMODAL BIOMETRICS RECOGNITION. Heng Zhang, Vishal M. Patel and Rama Chellappa

MULTITASK MULTIVARIATE COMMON SPARSE REPRESENTATIONS FOR ROBUST MULTIMODAL BIOMETRICS RECOGNITION. Heng Zhang, Vishal M. Patel and Rama Chellappa MULTITASK MULTIVARIATE COMMON SPARSE REPRESENTATIONS FOR ROBUST MULTIMODAL BIOMETRICS RECOGNITION Heng Zhang, Visha M. Pate and Rama Cheappa Center for Automation Research University of Maryand, Coage

More information

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah Journa of Lightwave Technoogy Page of CFP: Cooperative Fast Protection Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapocai and Hussein T. Mouftah Abstract We introduce a nove protection scheme, caed Cooperative

More information

Endoscopic Motion Compensation of High Speed Videoendoscopy

Endoscopic Motion Compensation of High Speed Videoendoscopy Endoscopic Motion Compensation of High Speed Videoendoscopy Bharath avuri Department of Computer Science and Engineering, University of South Caroina, Coumbia, SC - 901. ravuri@cse.sc.edu Abstract. High

More information

Analytical Modelling of IEEE for Multi-hop Networks with Heterogeneous Traffic and Hidden Terminals

Analytical Modelling of IEEE for Multi-hop Networks with Heterogeneous Traffic and Hidden Terminals Anaytica Modeing of IEEE 802.5.4 for Muti-hop Networks with Heterogeneous Traffic and Hidden Terminas Piergiuseppe Di Marco, Pangun Park, Caro Fischione, Kar Henrik Johansson Abstract IEEE 802.5.4 muti-hop

More information