Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Size: px
Start display at page:

Download "Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization"

Transcription

1 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT, Trinity College Dublin Eail: vandebej@tcd.ie School of Electrical and Electronic Engineering, University College Dublin, Ireland arxiv: v2 [cs.ni] 4 Jul 2018 Abstract Virtualization is a topic of great interest in the area of obile and wireless counication systes. However the ter virtualization is used in an inexact anner which akes it difficult to copare and contrast work that has been carried out to date. The purpose of this paper is twofold. In the first place, the paper develops a foral theory for defining virtualization. In the second instance, this theory is used as a way of surveying a body of work in the field of wireless link virtualization, a subspace of wireless network virtualization. The foral theory provides a eans for distinguishing work that should be classed as resource allocation as distinct fro virtualization. It also facilitates a further classification of the representation level at which the virtualization occurs, which akes coparison of work ore eaningful. The paper provides a coprehensive survey and highlights gaps in the research that ake for fruitful future work. I. INTODUCTION Network Virtualization (NV) allows network services to view network resources, such as servers, routers, links, and data, in a anner that is independent fro the underlying physical infrastructure, and to use these resources according to service requireents, rather than based on physical granularities [1]. New network functionality can be achieved using virtualization, such as providing heterogeneous networks with custoizable specifications on-deand, the flexible and dynaic anageent of resources, new types of services, and better security and protection against equipent failure. In addition, network virtualization has the potential to enable new networking technologies and protocols to be developed uch faster than they are currently, since these technologies can be tested through isolated virtual networks on existing infrastructure, while ensuring that existing services are unaffected. Lastly, network virtualization can provide cost savings and new business opportunities, through increased efficiencies and through new services and functionality. Wireless Network Virtualization (WNV) has been proposed as an extension of (wired) network virtualization to the wireless doain, with the ain difference being the wireless links. Thus ost work to date has focussed on Wireless Link Virtualization (WLV). Initially, the purpose of this paper is to perfor a survey of WNV, and to identify open research probles. However, the ter wireless network virtualization carries ultiple connotations. It has becoe an ubrella ter for several differing concepts, applied at different layers of the network stack, and also to different types of network resources. In the existing literature, works such as [2] [7] provide a variety of definitions for WNV, but a lack of consistency Abstract Abstract Doain Doain (0, 1) (0, 1) Physical Physical Doain Doain (a) 1 Abstract Abstract Doain Doain Physical Physical Doain Doain p Figure 1. Objects in the physical doain can be represented using objects in the abstract doain, such as (a) a switch with two settings represented as a bit through 1, or (b) ore generally as an object p represented as p through. persists. A coon thee of these definitions is that they regard virtualization as the abstraction and sharing/slicing of resources. As this work will ephasise, virtualization and abstraction are very different concepts, and virtualization is not necessarily liited to the sharing of resources. It is interesting to note that several authors ([8] and [4]) have pointed out a siilar vagueness and lack of clarity in the field of network virtualization. Although several surveys on wireless network virtualization exist such as [5], [6], [9] [11], this paper brings additional and alternative perspectives (for a ore detailed description see Section VI-G). We develop a foral ethod for describing virtualization as a response to the any definitions that currently exist. We then use this foral ethod as a eans of classifying and analysing the papers we survey which allows for a ore systeatic approach to the survey process. More specifically we ake the following contributions: 1) We clarify the concepts of abstraction and representation, which are key to understanding virtualization, by drawing on a theory known as abstraction/representation theory and extending it. 2) We propose a foral ethod for describing virtualization, which we call virtualization theory. 3) We develop a test for virtualization to distinguish virtualization techniques fro resource allocation techniques. 4) We survey the existing work on wireless network virtualization, and classify this work in a coherent and eaningful anner, using virtualization theory. 5) We identify several research gaps in wireless network virtualization which have not yet been addressed and propose next steps forward. (b) p p p

2 2 The paper is structured around these contributions. Section II introduces key concepts such as abstraction, representation and instantiation, which are prerequisite to virtualization and iportant for the rest of the paper. Section III introduces the theory on which the paper is grounded. In Section IV we exaine the constituent coponents of networks, and how these coponents can be virtualized. We give an overview of network and wireless network virtualization in Section V, to introduce the survey. Since the ain focus of this paper is on wireless link virtualization, in Section VI we perfor a survey of existing literature on wireless link virtualization. This survey allows us to identify open research directions in Section VII, before concluding in Section VIII. II. PEEQUISITES TO VITUALIZATION There are a nuber of concepts, which are key to developing a foral theory of virtualization and in the opening section of the paper we carefully define these concepts. The first two of these are the concepts of abstraction and representation. Table I shows an explanation of these and other ters used in this paper. In this paper, the ter abstraction eans the act of ignoring or hiding details to consider general characteristics, rather than concrete realities. Thus abstraction anages the way in which systes interact, and the coplexity of the interaction, by hiding details that are not relevant to the interaction. Increased abstraction allows systes to be used ore easily for specific applications, but this coes at the cost of decreased flexibility and custoization. Although abstraction is an iportant concept in coputing, as it governs the interaction between huans and coputers, it is not necessarily of iportance to virtualization. However, it is iportant to note the difference between abstraction and the adjective abstract. The ter abstract refers to ideas and concepts that do not have physical existence. The ter representation eans to describe or sybolize soething in a particular way. The ter instantiation eans the ipleentation or realization of a concept or idea. epresentation and instantiation are very iportant to coputing as they describe the relationship between abstract entities and the physical world. As this paper will show later, representation and instantiation are of great iportance to virtualization, since virtualization can only be done in the abstract doain, while network resources exist in the physical doain. We now turn to the recently developed Abstraction/epresentation (A) theory, to provide us with a foral fraework of abstraction and representation [12], [13]. Because this theory is very new, we explain the ost iportant aspects here, borrowed fro [12], before we go on to extend the ideas for the purposes of this paper. A. Abstraction/epresentation Theory 1 Abstraction/epresentation theory 2 is concerned with the physical doain and the abstract doain (also known as the 1 Based on [12] 2 A Theory ight be better naed as epresentation Theory, since it deals ostly with representation, but that nae has already been taken. Ter Abstraction Abstract epresentation Instantiation Table I EXPLANATION OF TEMS USED IN THIS PAPE Explanation The act of ignoring details to consider general characteristics Existing as a thought, idea, or concept, but without physical existence The act of sybolising or portraying soething in a particular way Creating a concrete realization of a concept or idea logical doain), and the relationship between these doains. The physical doain, P, is defined as consisting of all physical objects, p P. The abstract doain, M, consists of all abstract objects, M. For instance, a coputer is an object in the physical doain, which can be in different physical states, while a coputation is a set of objects and relations in the abstract doain. Bold font is used to indicate an object in the physical doain; italic font for an object in the abstract doain. 1) epresentation: A physical object can be represented in the abstract doain, through a representational relationship,. For exaple, a physical on-off switch can be represented in the abstract doain by a binary digit, shown in Figure 1. The general representation relation between a physical object, p, and an abstract object, p, is through a directed ap : p p. The abstract object, p is said to be an abstract representation of the physical object p. It it very iportant to keep in ind that the representation relation is not a atheatical function or a logical relation, but rather a odelling relation that bridges the divide between the physical and the abstract spaces. 2) Physical and Abstract Evolution: In the abstract doain, there can be an evolution or process, C : p p, that changes an abstract object p to another abstract object p. Siilarly in the physical doain, a corresponding evolution H : p p, changes the physical state p to physical state p. This physical state, p can then be represented as p, through the representation relation,. These concepts are shown in Figure 2 (a). The two abstract objects, p and p, lead us to a key concept in A theory. If p p ɛ, for soe error ɛ and nor, then we can say that the abstract evolution, C, and the corresponding physical evolution, H, coute. Under the above condition, the two representation relationships, : p p and : p p, and the pair of abstract and physical evolutions C : p p and H : p p, can be said to for a couting diagra. When a set of abstract and physical objects for a couting diagra using the representation,, then p is a faithful abstract representation of physical syste p for the evolutions C( p ) and. This eans we can be confident that the evolution C in the abstract doain corresponds to the evolution H in the physical doain. The iplication of couting diagras is that the abstract representation of the final state of a physical object (i.e. p/ p ) can be found either by following the physical evolution and then representing the output abstractly, or by

3 3 p p C(01,10) C(p) Abstract Abstract Abstract Abstract p 11p 01,10 p pdoain 11 Doain Doain Doain logic gates 01,10 01,10 01,10 01,10 C(01,10) C(01,10) C(01,10) C(01,10) logic logic logicgates gates gates logic gates 01,10 01,10 01,10 p C(01,10) C(01,10) C(01,10) p 11 p pppp logic logic logicgates gates gates C(p) p 11 pp11 p11 ppp p ~ ~ ~ ~ ~ ~ ~ ~ Physical p Doain p p voltage changes (a) Physical Physical pphysical p Doain Doain Doain C( C( C( p ~ ppp pppp pppp pppp pppp voltage voltage voltagechanges changes changes voltage changes voltage voltage voltagechanges changes changes (b) (c) pppp pppp (d) Figure 2. (a) A physical syste p and its representation p can undergo abstract evolution, C(p ), or physical evolution,. (b) A couting diagra for a binary addition, showing that an abstract evolution through logic gates, C, is coutative with a physical evolution in voltage states, H. (c) A coputer can evaluate an abstract apping by instantiating the abstract object in the physical doain, perforing the physical apping, and representing it as an abstract object. (d) The ost interesting use of a coputer is when the abstract apping is unknown. theoretically evolving the representation of the physical state. As an exaple, consider a couting diagra in which physical voltages are represented by binary nubers, shown in Figure 2 (b). Assue that we want to perfor an abstract evolution (binary addition). Then this evolution can be perfored either in the abstract doain using logic gates, or through physical anipulation of voltages in the physical doain and representing the result abstractly. 3) Instantiation: The instantiation relationship,, can be thought of as the inverse to the representation relation. Just as a physical object can be represented in the abstract doain by the representation relation, the instantiation relation, : p p, instantiates an abstract object in the physical doain. However, unlike representation, the instantiation relation can only exist under specific conditions, as there are any abstract objects that have no physical instantiation. It is necessary for a couting diagra to exist for a given representation relation, before any attepts can be ade to find the inverse instantiation relation (see [12]). Finding an instantiation relation is not straightforward and can be thought of as finding a physical syste, that when represented abstractly gives the abstract object that we desire. This often requires trial and error, if such an instantiation is even possible. Figure 2 (c) shows the binary addition exaple, but this tie the voltages instantiate binary nubers. The instantiation relation,, can be used to change the physical state to p, so that it instantiates the nubers we wish to add. In the abstract doain, the abstract apping (i.e. atheatical and logical operations) C, perfors the addition to arrive at the result. Meanwhile, the physical apping, H, anipulates the voltages to produce the physical result. Using the representation relation,, the abstract representation of p0 is found. If we have confidence that the representation is a faithful abstract representation and also that the instantiation relation is correct, then the outcoe of the abstract and the physical evolutions should be the sae. 4) Copute Cycle: The previous exaple describes a coputer perforing a parallel operation in the abstract and physical doains. However, the ost interesting use of a coputer is when the abstract apping C is unknown and we can use the coputer to solve an abstract proble, shown in Figure 2 (d). Provided that we are confident in the capabilities of the coputer, we can use the coputer to find the solution. The full copute cycle is as follows: Levels of epresentation epresentation level n n 3-n epresentation level 3 Abstract Doain n epresentation level epresentation n epresentation level Physical Doain Figure 3. The abstract doain can be divided into any levels of representation, since abstract objects can represent other abstract objects. In this case there are n representation levels, ordered arbitrarily, but there can be an infinite nuber of levels. Each representation level can represent the physical doain directly, through unidirectional representations 1, 2, etc., or can represent another representation level, through the bidirectional representations 1-2, 2-3, etc. These representations are bidirectional to show that any representation level can represent another level. This iage shows the theoretical representation relations, which does not ean that these relations will all exist in practice. H p p p0 [p0 0p ] Thus representation and instantiation enable physical coputing resources to ipleent abstract objects and operations, which can be called abstract resources. B. Levels of epresentation We extend A theory presented in [12] by focusing on the abstract doain and exaining abstract objects in ore detail. Most iportantly, we observe that objects in the abstract doain, which represent physical objects, can in turn be represented by different abstract objects. The sae is true for instantiation; objects in the abstract doain, which are instantiated in the physical doain, can instantiate different abstract objects. For the purpose of brevity, fro here on we only discuss representation and iply that the sae is true for instantiation. In essence there are any different representations that can be used. We use the ter levels of representation to capture ppp

4 4 epresentation Level 2: epresentation Level 1: epresentation character k Level 2: Abstract Doain ~ ASCII ASCII epresentation binary Level 1: character Abstract Doain ~ ASCII (Writing) epresentation k k character character k Level 2: ASCII Abstract Doain Abstract Doain (Writing) ~ ASCII Logical k Level Level 2: character 2: character k ASCII ~ ASCII ~ ASCII binary ~ epresentation EADING EADING ~ EADING binary EADING Logical Level Level 1: 1: ~ binary EADING EADING Level 1: (Writing) k k ASCII ASCII decial ~ DEC ~ DEC DEC DEC binary pixel pixel ~ JPEG ~ JPEG JPEG JPEG binary ~ BIN BIN ~ BIN BIN ~ BIN BIN ~ BIN ~ BIN BIN BIN ~ BIN ~ BIN BIN BIN ~ BIN ~ BIN BIN BIN Physical Doain Physical p(bin) Doain p(bin) p(reading) Physical Doain (a) p(reading) p(bin) Physical Doain Figure 4. The nuber of representation levels is a design choice. For exaple, the character k can (a) directly represent the physical doain, which we coonly know as reading, or (b) represent a binary nuber, which represents the physical doain. We can speak of one representation level in the first case, the character level, and two representation levels in the second case, the character level and the binary level. this idea and this is depicted in Figure 3. In this figure there are n different levels of representation in the abstract doain. We nuber these representation levels fro 1 to n, but the nubering is arbitrary and is only an identifier. It is iportant to note that the representation used is an arbitrary design choice, and that it is possible to represent the physical doain at any representation level. The unidirectional arrows, 1, 2, etc., show the one-way representation relation fro the physical to the abstract doain as seen previously. Siilarly, any representation level can represent another level, shown in the figure through the two-way representation relations 1-2, 2-3, etc. An iportant point to observe is that there can be an infinite nuber of representation levels, as any abstract object can represent another abstract object. However, in practise not every representation level will have a physical representation relation. A practical exaple is shown in Figure 4 (a). In this exaple, a physical object can be represented by the abstract letter k directly, and one representation level exists. However, Figure 4 (b) has two representation levels. In this case the letter k represents a binary nuber, which in turn represents the physical doain. C. Choosing a Hierarchy of epresentation Levels In theory, there can be an infinite nuber of representation levels in the abstract doain, with an arbitrary ordering of representation levels. However, in practise it is ore useful to coputing (and other abstract doain applications) if an ordered hierarchy of representation levels exists. Then it is possible to think of lower representation levels that are ore concrete, and higher representation levels that are ore abstract. When levels of representation are used in this anner, then we can nuber the representation levels in order of increasing abstraction. One advantage of having an ordered hierarchy of representation levels is that existing physical instantiations for abstract objects can be reused, since it is not an easy task to design a physical instantiation of an abstract syste [12]. ather than finding a physical instantiation for an abstract syste, (b) p(reading) p(bin) (a) p(bin) (b) p(bin) Figure 5. Multiple levels of representation enable a single physical instantiation to be reused for several different abstract objects. In this exaple, depending on the representation/instantiation, a binary nuber could instantiate (a) a character, (b) a decial nuber, or (c) a pixel in an iage. an instantiation can be found in ters of an abstract syste which already has a physical instantiation 3. Figure 5 shows the advantage of ultiple representation levels. In this case, the existing physical instantiation of binary nubers can be used to instantiate additional abstract objects. Many types of data such as integers, characters, volue levels, iage brightness, and instructions, can be instantiated in coputing using bits [14]. Thus, using ultiple levels of representation provides flexibility and easier instantiation. In this exaple, the binary representation level can be considered ore concrete, and the character/decial/pixel representation level can be considered ore abstract. D. Hardware and Software through epresentation The concept of levels of representation fits in very well with the idea of hardware and software. We define hardware as a copute cycle in which the representation/instantiation occurs between the physical and the abstract doain. Software, in contrast, is defined as a copute cycle in which the representation/instantiation is copletely in the abstract doain. We observe that the concept of representing the physical doain at any representation level (for exaple in Figure 4.) is consistent with the principle of equivalence of hardware and software, which states: Hardware and software are logically equivalent. Any operation perfored by software can also be built directly into the hardware and any instruction executed by the hardware can also be siulated in software. [15] The need for this distinction between hardware and software will be useful later in this paper (for exaple in section IV-A). E. How epresentation applies to Virtualization We have exained abstraction and representation, firstly to clarify the distinction between these concepts, and secondly because representation plays a role in virtualization in the following ways: 1) Virtualization ust always be done in the abstract doain. The reason for this is that physical resources cannot 3 Which is not an easy task either, but easier than physical instantiation (c)

5 5 be shared or cobined without odifying their physical properties in soe way. For exaple, it is not possible to split one processor physically to create ultiple virtual processors, however it is possible to split a representation of a processor in the abstract doain. Virtualization allows abstract resources to be reorganised in a anner that is is not liited by the underlying physical resources. 2) Since there can be any different representation levels in the abstract doain, virtualization can be perfored at any of these representation levels and virtualization happens within a representation level. However, virtualization does not happen across a representation level - that is the act of virtualization does not change abstract resources fro one representation level to another representation level. As we will see later, it is iportant to know the representation level when virtualizing abstract resources. III. VITUALIZATION THEOY Having gained a better understanding of abstraction and representation, in this section we identify universal concepts of virtualization, and propose a theory of virtualization. Although soe of the concepts have been entioned before in the literature, to the best of our knowledge this is the first tie that these concepts are brought together into a unified theory. A. Virtualization as esource Mapping As we saw earlier, resources in the abstract doain are representations of the physical doain. To be consistent with the language that is typically used in virtualization, we refer to these resources as real resources (). Although the ter real is used, these resources are in the abstract doain, and are not physical resources. Also note that the act of representation is not virtualization, rather representation is a prerequisite for virtualization. eal resources in the abstract doain can subsequently be virtualized. Virtualization is always perfored in the abstract doain and at a specific representation level. Virtualization is a resource apping which can alter the quantity of resources in soe diension(s). The resources after the virtualization process has occurred are referred to as virtual resources (V), as shown in Figure 6. Virtual resources appear to be the sae type of resources as real resources, but can be altered in quantity in soe way. This altering allows abstract resources to be used in a flexible anner, not liited by the underlying representation of the physical doain. However, when virtual resources are apped to real resources, the real resources cannot be used for any other purpose. Virtual resources are used as if they were real resources, and it should not be possible to perceive any difference between virtual resources and real resources. In this paper we consider that virtual resources are offered to one or ultiple users. The ter users in this case refers to independent agents, that ake decisions on resource use independently. Virtual resources can be offered to different users, and each user has the illusion of full ownership of the resources, eaning that virtual resources can be used for differing purposes. epresentation Level 2 epresentation Level 1 ~ HEX V 1 3 E HEX Abstract Doain 0011 Mapping Mechanis V Virtual esources Physical Doain ~ eal esource ~ BIN Figure 6. epresentation allows physical resources to ipleent abstract resources, while virtualization allows abstract resources to be owned and used at tailor-ade quantities. In this exaple the 8-bit abstract resource 1 is not an efficient resource to instantiate a hexadecial nuber, as hexadecial nubers only require 4-bits. Mapping two 4-bit virtual resources, V 1, and V 2, to 1 using a apping echanis is a ore efficient use of this resource. The virtual resources V 1, and V 2 can then be used to instantiate hexadecial nubers using the instantiation relation HEX. The real resource cannot be used to instantiate any higher representation level, shown by the cross in the figure. In Figure 6, the real resource, 1, is an 8-bit nuber. This 8-bit nuber could be used to instantiate a hexadecial nuber, or any other instantiation that uses 8 or less bits. However, a hexadecial nuber only requires 4 bits to be instantiated, and using 1 would not be an efficient use of resources. Mapping two 4-bit virtual objects, V 1, and V 2 to 1, would be ore efficient, and allows two hexadecial (or any other 4-bit instantiation) to be instantiated, using the sae resource, 1. Virtualization is always achieved through the use of a apping echanis (MM) that aps virtual resources to real resources. The apping echanis is responsible for presenting the virtual resources as if they were real resources, and for aintaining the isolation between different virtual resources. We call this the isolation proble. The apping echanis also decides how resources are allocated; in other words deciding how to divide up or cobine real resources to create virtual resources. This proble is known as the ebedding proble. The ebedding proble depends greatly on the isolation proble, since the ethod of isolation deterines how the resources can be used. These two probles will be discussed in further detail later. According to the authors of [16], and [17], the apping echanis is siply a function f that aps the set of virtual resources V, to the set of real resources. The virtual resources can be thought of as the doain of f and the real resources as the codoain of f. The apping function f aps each eleent in V to an eleent in. f : V {t} BIN

6 Many-to-any One-to-one 6 such that if y ε V and z ε then { z if z is the real resource for virtual resource y f(y) = t if y does not have a corresponding real resource The value f(y) = t causes a trap or fault handling procedure to occur by the apping echanis. In all figures and exaples until now, only one physical resource has been considered, represented as one real resource in the abstract doain. However, virtualization can apply to ultiple real resources, that are representations of ultiple physical resources. Siilarly, there are several ways in which the apping of virtual to real resources can be done - we identify four types of virtualization. In Figure 7 we show the general types of virtualization, where there can be ultiple physical resources, ultiple real and virtual resources, and ultiple types of apping. The four types of apping virtual resources, V n, to real resources, are: 1) One-to-one: Mapping a single virtual resource to a single real resource, to allow for easier anageent of resources; 2) Many-to-one: Mapping ultiple virtual resources to a single real resource such as partitioning a single resource into a nuber of saller and ore easily accessible resources of sae type; 3) One-to-any: Mapping one aggregated virtual resource to several real resources. Used to aggregate any individual coponents into larger resource pool; and lastly 4) Many-to-any: Mapping ultiple virtual resources to ultiple real resources. The cobination of aggregating and partitioning resources to create copletely custoizable resources that can be tailored exactly to requireents. Many-to-any can be considered the ideal case, since it enables resources to be used in the ost flexible anner. epresentation Level n t V f 2 V 2.1 f 2 2 V 2.2 f 3 3 V 3.1 f 3 4 f V f 4 V 4.2 f 4 6 Virtual esources eal esources One-to-any Many-to-one B. ecursion When virtual resources are presented in such a way that they are indistinguishable fro real resources, recursion is possible [18]. Users could choose to virtualize their virtual resources, since they perceive the as real resources. The apping of resources is now done twice, the first apping aps the virtual resources received by the user to the real resources, and the second apping aps virtual resources to virtual resources. The ters real and virtual can be confusing when recursion is taken into account. For this reason we always refer to the codoain of the apping function, i.e. the resources that are being virtualized, as real resources, even though these resources ight already have been virtualized by a previous virtualization instance. The resource apping function, f, described above can be extended directly for recursion by applying the apping function, f, ultiple ties and interpreting V and as different instances of virtualization. Mapping function aps virtual resources V 1 to real resources. Now, in a second virtualization instance, f 2 aps virtual resources V 2 to real resources V 1. Figure 7. In this exaple, six physical resources are represented as real resources, 1 6, at soe representation level n. Multiple virtual resources are apped to the ultiple real resources in different ways, showing the four types of virtualization. Many-to-any apping is the ideal case as it enables abstract resources to be used in the ost flexible anner. : V 1 {t 1 } f 2 : V 2 V 1 {t 2 } The real resources for are, and for f 2 the real resources are V 1. Figure 8 illustrates several virtualization instances that recursively ap virtual resources to real resources. We can say that recursion is a requireent for virtualization, since non-recursive virtualization is siply ultiplexing [19]. In the case of perfect virtualization, i.e. that virtual resources can be used exactly as real resources and no overhead exists, infinite recursion is possible [19].

7 tie Many-to-one 7 epresentation Level n t 1 eal esource, 1 V V V 1.n 3 D 3 (a) In the first instance of virtualization, any-to-any apping aps virtual resources V n to real resources 1 3. V 1 V 2 V 4 V 2.1 V 2.2 epresentation Level n f2 t 2 V 1.1 f 2 t 1 1 V 3 D 2 D 1 V Figure 9. The real resource, 1, can be isolated along three diensions, D 1, D 2, and D 3. The users of virtual resources, V 1, V 2, V 3, and V 4, are only aware of and can only access each of their individual resources, which appear to the as real resources. V 1.n (b) Many-to-one apping function f 2 is an exaple of recursive virtualization, since it aps virtual resources V 2.1 and V 2.2 to real resource V 1.1. V 2.1 V 2.2 f2 f 2 epresentation Level n V 1.1 V 1.2 t 2 t C. The Isolation Proble The isolation proble is the proble of choosing how to create virtual resources, and how to aintain independence between the. It should be ipossible for Vs to interact with other Vs in any anner. By isolating along one or ultiple diensions of the real resources, each virtual resource user is only aware of its own virtual resources and can only use those resources, and thus it cannot interfere with other virtual resource users [20] [2]. This is illustrated in Figure 9. The ter diension refers to a easurable feature of a resource. Thus we add the isolation diension(s) to the apping function: : V 1 T {t 1 } V 1.n 3 for exaple using the tie diension. An exaple of how this applies is shown in Figure 10. V 3.1 f 3 f 3 4 V 1.1 epresentation Level n t (c) The one-to-any function f 3 shows that it could be possible to ap virtual resources to a cobination of real resources, whether these have been previously virtualized or not. In this case V 3.1 is apped to 4 and V 1.n. Figure 8. Exaple of recursive virtualization. is the first instance of virtualization, f 2 is the second instance, and f 3 is the third. f 2 and f 3 are recursive virtualization, since they depend on the first instance of virtualization,. t 3 V 1.2 Figure 10. A any-to-one apping using one diension (tie) for isolation. However, the ability to isolate using a particular diension depends on the technical capability of the apping echanis. The granularity used by the isolation process is very 1

8 8 iportant as the user of the virtual resources ust not be able to perceive any difference between the virtual resource and the real resource. For exaple, in processing virtualization, processing resources can be isolated in the tie diension. However, the tiescale used by the isolation process is so sall (saller than huan reaction tie of approxiately 0.2 seconds) that the user can use the virtual resources as if they were real resources. If the tiescale used by the isolation process was too large, say one hour, then the users of the virtual resources would realise that the resources they are using are not real resources. Although the isolation proble is a prerequisite to the ebedding proble, and influences the ebedding proble greatly, in the literature the isolation proble has received significantly less attention copared to the ebedding proble. D. The Ebedding Proble The proble of deciding how to ap virtual resources to real resources is also known as the ebedding proble. Essentially this is a resource allocation proble, which is the distribution of scarce resources to copeting users. There are several probles that can be considered: 1) The first case is that there ight not be enough resources to satisfy all of the users requests; 2) The second case is that the users can request different quantities of resources; and 3) The third case is that each of the resources can be of unequal value. These three probles are not utually exclusive and often occur siultaneously. Depending on the objective(s) that the resource owner wants to achieve, different etrics can be used to deterine the optial resource allocation. Even when there are enough resources to satisfy all of the users requests and a potential solution exists, resource allocation can be a coplex proble to solve. In the context of virtualization, users can ake requests for virtual resources and an ebedding algorith deterines which requests are successful. Figure 11 shows the resource allocation probles that can occur when users ake requests for two-diensional sets of resources. E. Definition of Virtualization Now that we have a better understanding of virtualization, we propose the following definition for virtualization: Virtualization is a resource apping that occurs in the abstract doain. Virtualization takes places within any one representation level in the abstract doain. The representation level used is a design choice. Abstract resources before virtualization, known as real resources, are liited by the granularity of the underlying physical resources. Abstract resources after virtualization, known as virtual resources, are not, and can be larger or saller than real resources. Virtual resources are independent and can be allocated siultaneously to ultiple users, A A C C B B DD E E E DDE Ebedding? A (a) A B The first B type of proble occurs when there are ore user requests than C resources. At least one user A AC D Ebedding? B DB Ebedding? will not receive resources. C C A A C C B B DD Ebedding? Ebedding? (c) A siilar proble can occur if the resources are of different sizes. A C B D D D Ebedding? (b) Another B type of proble can happen A B A when users have different request sizes. Ebedding? CC C A C E B D E Ebedding? Ebedding? Ebedding? (d) The last exaple shows that these three probles can occur siultaneously. Figure 11. This figure shows resource allocation probles that can happen when users A, B, C, D, and E request two-diensional resources fro a resource owner. There are three different types of probles that can occur, shown in a), b) and c). The three can occur siultaneously as shown in d). esources can be allocated request by request in sequence, or by considering ultiple requests together, which could provide ore efficient ebedding. each with the illusion of full ownership of their resources. Virtualization can always be done recursively, since users perceive no difference between the virtual resources and the real resources. This definition is satisfactory since it addresses the concepts o) abstract resources as representations of physical resources. 2) the splitting and cobining of resources, 3) ownership and isolation, 4) allocation, and 5) recursion. F. Validity of the Theory Although we have attepted to validate virtualization theory as uch as possible by referring to previous works, soe aspects are new and need verification. One ethod of verifying the theory is to exaine virtualization technologies and to see if the theory holds. As an exaple we exaine virtual eory, one of the first virtualization techniques developed. Virtual eory, or one-level storage as it is also known, was developed in 1961 by the Atlas group to overcoe the storage allocation proble of distributing inforation between ain eory and auxiliary eory levels in coputers [21]. In a one-level storage syste, a distinction is ade between the address space, which is the set of identifiers used to refer to inforation, and the eory space, which is the set of physical eory locations used to store inforation [22]. Instead of offering coputer progras direct access to the eory space, progras can only access the address space, and a supervisor aps the address space to the eory space. By decoupling the address space in this way fro the physical eory, it is possible to cobine both ain eory and

9 -2-1 x x z z+1 Input epresentation epresentation epresentation p Level 1: Level Level1:1: ~ Disk Meory y y+1 epresentation epresentation epresentation Level 2: Level Level2:2: Abstract Doain Abstract Doain 0 1 Abstract Doain 0 1 Main Meory 9 Physical Doain Physical PhysicalDoain Doain p Input Input pp Output p p p p pp ~ ~ Process Process Process Storage Storage Storage pp Output Output p pp (a) Hardware a-1 Address Space d-1 Mapping Mechanis Meory Space Figure 12. The separation of address and eory spaces allows the address apping echanis to cobine ain eory and disk eory into a onelevel storage space. The address apping echanis can also give users the perception of having a unique address space for ultitasking Input Input Input p pp p p p p pp ~ 2 Output Output ~ ~ 2 2 Process Process Process2 2 2 C(p) C(C( p)p) p pp ~ 1 p Output p p p p pp Storage Storage Storage ~ ~ pp p 1 1 pp (b) Software Figure 13. (a) Model of coputer hardware based on A theory. Coputer hardware can be thought of as having four functions, corresponding to the appings of A theory and storage of the physical states. (b) Software ust be used to enable all four functions to be virtualized, i.e. perforing the copute cycle in the abstract doain, as virtualization can only be done in the abstract doain. IV. N ETWOK ESOUCE V ITUALIZATION auxiliary eory into a single address space, thus offering the illusion of one-level storage, shown in Figure 12. Let us now exaine how virtualization theory applies to virtual eory, suarized in Table II. Firstly, it is iportant to identify the abstract resources that are being virtualized. In this case the abstract resources are inforation storage in the for of bits. Next, it is possible to see that virtual eory is a one-to-any apping, since it aps one virtual resource (the address space) to any real resources (the ain and auxiliary eory spaces) 4. The isolation diension is the address space, which is to say the index of locations to store inforation. In theory recursion is possible in virtual eory, because the resources offered are locations to store inforation, exactly the sae type of resources as nonvirtualized eory. In fact, the authors of [23] develop such a recursive virtual eory syste. As for the ebedding proble, soe exaples of different approaches to ebedding are the different paging and segentation algoriths that have been developed [17]. Table II V ITUALIZATION T HEOY A PPLICATION : V ITUAL M EMOY Concept Abstract resources at a representation level Use in Virtual Meory Mapping Isolation ecursion Ebedding One-to-any / Many-to-any Address space - index of storage locations Possible but not very useful in practise, see [23] Paging algoriths, segentation algoriths Location to store bits The exaple of virtual eory shows how virtualization theory can apply in practise. We see that each aspect of the theory has a practical counterpart in virtual eory. This offers soe validation of the theory. In the next section we exaine several other virtualization technologies in the context of wireless networks, but for each virtualization technology the sae analysis could be perfored. 4 With the developent of ultitasking, in reality virtual eory is now any-to-any, because different progras each have their own address space. Having developed a theory of virtualization, we now consider how virtualization applies to wireless networks. We define a wireless network as a set of nodes that can transfer inforation through links, where soe of the links ay be wireless in nature. Fro this definition, we can deduce that wireless networks consist of two parts: nodes and links. We ust first be able to virtualize nodes and links when creating virtual wireless networks, and thus as a first step in the virtualization process, we exaine what constitutes nodes and links. We also analyse how node and link functionality can be virtualized. A. Nodes In this paper we consider a node or coputer hardware as a physical device that can deterine the outcoe of abstract operations through physical anipulations [12]. Based on the couting diagra of coputer hardware shown in Figure 13 (a), we can identify four specific functions: input (I), i.e. the instantiation of abstract objects in a physical state, storage (S) of that physical state in soe way, processing (P) of the physical state in a way that is coutative to soe for of abstract operations, and output (O) of result of the physical process in the for of an abstract representation. All functions are required within a node, since, for exaple, it would be pointless to have processing available but no input, as there would be no inforation to process. These four functions are consistent with the IPO+S odel of coputing [24]. Each of these resource types can be represented in the abstract doain and virtualized, which allows resources to be used ore efficiently, and also can provide new functionality, such as achine (node) virtualization. However, as entioned previously, virtualization can only be done in the abstract doain. This eans that if all four functions are to be virtualized siultaneously, then it is necessary to introduce an additional level of representation, that is to perfor the virtualization in software. We show the show the general copute cycle in the abstract doain (software) in Figure 13 (b).

10 10 User 2 User 3 User 1 CPU User 4 User 6 User 5 Figure 14. Tie-sharing gives several users the perception of having exclusive use of a processor, by giving each user a short burst of coputing tie. In this exaple, the CPU is processing user five s burst of tie, before it oves on to the next user. We refer to resources according to their function type, for exaple we refer to storage resources rather than resources that instantiate storage functionality. Although technically incorrect, this siplification akes it easier to follow. The types of node resource virtualization are discussed briefly below. 1) Process Virtualization: The idea of process virtualization can be traced back to the concept of copatible tiesharing, first developed at M.I.T. in the early 1960 s [25]. Tie-sharing was developed to overcoe the liited anachine interaction of batch processing, which had led to an increase in prograing errors and debugging tie, as larger and ore coplex progras were being set [26]. Tie-sharing enables several people to ake use of a coputer at the sae tie, shown in Figure 14 [27]. ather than offering users direct access to coputing resources, which can lead to serious crashes and eory probles, a supervisor buffers user input, and sequentially runs user progras for sall bursts of tie. The full sequence of user progras occurs frequently enough (ideally in less than 0.2 seconds) that a coputer appears to be fully responsive to all users. By apping user processing tie to burst of achine processor tie in this way, and by aintaining strict isolation, users have the perception of exclusive use of dedicated processors. Thus the illusion of ultiple virtual processors is created. Thus virtualization both increases resource efficiency, and also offers users new or iproved functionality. The surveys [28] [30] provide further inforation about processing virtualization techniques, and a very interesting and inforative docuentary on the copatible tie-sharing syste can be found at [31]. 2) Storage Virtualization: One ethod of storage virtualization is virtual eory, which we discussed in section III-F. The use of virtual eory not only autoates the storage allocation proble efficiently [32], but also enables achine independence, progra odularity, convenient eory addressing, and the capability of handling structured data [22], [17]. For a ore detailed view on storage virtualization techniques, see the surveys [33], and [34]. 3) Machine (Node) Virtualization: The developent of process and storage virtualization led to new functionality, and coputing becae thought of as a large syste of coponents serving a counity of users, where each of the users could run different progras with different processing, eory, and I/O interaction requireents [35]. In such a syste, software is coonly split into two classes to avoid syste integrity issues: a privileged supervisor (or Operating Syste) which is presued to be correct, and a second non-privileged class which is denied any functionality that can cause interference between processes [36]. However, this arrangeent only allows one privileged supervisor to be run at a tie, and incopatible non-privileged progras cannot be run easily [37]. Machine virtualization overcoes this proble by constructing siulated copies of the achine, known as virtual achines, and each virtual achine can run a different privileged supervisor [38]. A virtual achine onitor (VMM), also known as a hypervisor, isolates process and eory operations for each virtual achine, and aps the to the host achine using tie-sharing and virtual eory techniques [39]. Until recently I/O operations had to be trapped and executed by the VMM. Advances in achine virtualization, especially in server virtualization have reduced the cost of servers hugely and has led to the widespread adoption of oving coputing tasks to the cloud [40]. The recent developent of I/O virtualization (see next part) has allowed full coputer node virtualization, consisting of storage, process and I/O virtualization. There are any contexts in which the use of node virtualization is growing such as desktop, application, and user virtualization. More inforation can be found in the works [39], [41], [42], [43], and [44]. 4) Input and Output Virtualization: One of the probles encountered by early virtual achines was the apping of input and output (I/O) paths fro virtual device addresses to real device addresses, since absolute addressing is required for I/O paths [37]. Early Virtual Machine Monitors (VMMs) trapped I/O instructions used by the virtual achines, copied instructions, and absolutized the by apping the virtual addresses to the correct real I/O addresses. While this solution of eulating I/O devices in software enabled virtual achines to use I/O operations, it was a work-around and not I/O virtualization. The generalized I/O eory anageent unit (IOMMU), developed by Intel, is a hardware device that aps virtual device addresses to real ones across isolated partitions, supervised by syste software [45]. The VMM controls these partitions and thus full virtualization of I/O operations is possible, since virtual I/O operations are apped directly to the devices. One exaple of an I/O peripheral that has been virtualized is the Network Interface Card. A survey of I/O virtualization techniques is given in [46]. B. Links The function of links is to transfer inforation between nodes in a reliable anner. Siilarly to nodes, links can also be thought of as consisting of abstract objects (i.e. inforation) and physical resources which instantiate that inforation and physically send it between nodes. Again, siilar to nodes, links can only be virtualized in the abstract doain. Links can be wired or wireless. However, there are significant differences between wired and wireless links, due to the nature of the physical resources used. Both wired and

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI

More information

M Software management

M Software management M Software anageent This docuent is part of the UCISA Inforation Security Toolkit providing guidance on the policies and processes needed to ipleent an organisational inforation security policy. To use

More information

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

CS 361 Meeting 8 9/24/18

CS 361 Meeting 8 9/24/18 CS 36 Meeting 8 9/4/8 Announceents. Hoework 3 due Friday. Review. The closure properties of regular languages provide a way to describe regular languages by building the out of sipler regular languages

More information

Generating Mechanisms for Evolving Software Mirror Graph

Generating Mechanisms for Evolving Software Mirror Graph Journal of Modern Physics, 2012, 3, 1050-1059 http://dx.doi.org/10.4236/jp.2012.39139 Published Online Septeber 2012 (http://www.scirp.org/journal/jp) Generating Mechaniss for Evolving Software Mirror

More information

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu

More information

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

Identifying Converging Pairs of Nodes on a Budget

Identifying Converging Pairs of Nodes on a Budget Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering

More information

Design and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design

Design and Implementation of Business Logic Layer Object-Oriented Design versus Relational Design Design and Ipleentation of Business Logic Layer Object-Oriented Design versus Relational Design Ali Alharthy Faculty of Engineering and IT University of Technology, Sydney Sydney, Australia Eail: Ali.a.alharthy@student.uts.edu.au

More information

6.1 Topological relations between two simple geometric objects

6.1 Topological relations between two simple geometric objects Chapter 5 proposed a spatial odel to represent the spatial extent of objects in urban areas. The purpose of the odel, as was clarified in Chapter 3, is ultifunctional, i.e. it has to be capable of supplying

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se

More information

Boosted Detection of Objects and Attributes

Boosted Detection of Objects and Attributes L M M Boosted Detection of Objects and Attributes Abstract We present a new fraework for detection of object and attributes in iages based on boosted cobination of priitive classifiers. The fraework directly

More information

A Periodic Dynamic Load Balancing Method

A Periodic Dynamic Load Balancing Method 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation

More information

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer Departent of Coputer Science and Engineering University of South Florida Tapa, FL 33620 Abstract -- The

More information

A New Generic Model for Vision Based Tracking in Robotics Systems

A New Generic Model for Vision Based Tracking in Robotics Systems A New Generic Model for Vision Based Tracking in Robotics Systes Yanfei Liu, Ada Hoover, Ian Walker, Ben Judy, Mathew Joseph and Charly Heranson lectrical and Coputer ngineering Departent Cleson University

More information

Automatic Graph Drawing Algorithms

Automatic Graph Drawing Algorithms Autoatic Graph Drawing Algoriths Susan Si sisuz@turing.utoronto.ca Deceber 7, 996. Ebeddings of graphs have been of interest to theoreticians for soe tie, in particular those of planar graphs and graphs

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information

Rule Extraction using Artificial Neural Networks

Rule Extraction using Artificial Neural Networks Rule Extraction using Artificial Neural Networks S. M. Karuzzaan 1 Ahed Ryadh Hasan 2 Abstract Artificial neural networks have been successfully applied to a variety of business application probles involving

More information

Privacy-preserving String-Matching With PRAM Algorithms

Privacy-preserving String-Matching With PRAM Algorithms Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,

More information

Novel Image Representation and Description Technique using Density Histogram of Feature Points

Novel Image Representation and Description Technique using Density Histogram of Feature Points Novel Iage Representation and Description Technique using Density Histogra of Feature Points Keneilwe ZUVA Departent of Coputer Science, University of Botswana, P/Bag 00704 UB, Gaborone, Botswana and Tranos

More information

I-0 Introduction. I-1 Introduction. Objectives: Quote:

I-0 Introduction. I-1 Introduction. Objectives: Quote: I-0 Introduction Objectives: Explain necessity of parallel/ultithreaded algoriths Describe different fors of parallel processing Present coonly used architectures Introduce a few basic ters Coents: Try

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

Weeks 1 3 Weeks 4 6 Unit/Topic Number and Operations in Base 10

Weeks 1 3 Weeks 4 6 Unit/Topic Number and Operations in Base 10 Weeks 1 3 Weeks 4 6 Unit/Topic Nuber and Operations in Base 10 FLOYD COUNTY SCHOOLS CURRICULUM RESOURCES Building a Better Future for Every Child - Every Day! Suer 2013 Subject Content: Math Grade 3rd

More information

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada

More information

Feature Selection to Relate Words and Images

Feature Selection to Relate Words and Images The Open Inforation Systes Journal, 2009, 3, 9-13 9 Feature Selection to Relate Words and Iages Wei-Chao Lin 1 and Chih-Fong Tsai*,2 Open Access 1 Departent of Coputing, Engineering and Technology, University

More information

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

1 P a g e. F x,x...,x,.,.' written as F D, is the same.

1 P a g e. F x,x...,x,.,.' written as F D, is the same. 11. The security syste at an IT office is coposed of 10 coputers of which exactly four are working. To check whether the syste is functional, the officials inspect four of the coputers picked at rando

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

Multipath Selection and Channel Assignment in Wireless Mesh Networks

Multipath Selection and Channel Assignment in Wireless Mesh Networks Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,

More information

Carving Differential Unit Test Cases from System Test Cases

Carving Differential Unit Test Cases from System Test Cases Carving Differential Unit Test Cases fro Syste Test Cases Sebastian Elbau, Hui Nee Chin, Matthew B. Dwyer, Jonathan Dokulil Departent of Coputer Science and Engineering University of Nebraska - Lincoln

More information

Gromov-Hausdorff Distance Between Metric Graphs

Gromov-Hausdorff Distance Between Metric Graphs Groov-Hausdorff Distance Between Metric Graphs Jiwon Choi St Mark s School January, 019 Abstract In this paper we study the Groov-Hausdorff distance between two etric graphs We copute the precise value

More information

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute

More information

A Model Free Automatic Tuning Method for a Restricted Structured Controller. by using Simultaneous Perturbation Stochastic Approximation

A Model Free Automatic Tuning Method for a Restricted Structured Controller. by using Simultaneous Perturbation Stochastic Approximation 28 Aerican Control Conference Westin Seattle Hotel, Seattle, Washington, USA June -3, 28 WeC9.5 A Model Free Autoatic Tuning Method for a Restricted Structured Controller by Using Siultaneous Perturbation

More information

A Hybrid Network Architecture for File Transfers

A Hybrid Network Architecture for File Transfers JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

Image Filter Using with Gaussian Curvature and Total Variation Model

Image Filter Using with Gaussian Curvature and Total Variation Model IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.

More information

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University

More information

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design A Fast Multi-Obective Genetic Algorith for Hardware-Software Partitioning In Ebedded Syste Design 1 M.Jagadeeswari, 2 M.C.Bhuvaneswari 1 Research Scholar, P.S.G College of Technology, Coibatore, India

More information

Medical Biophysics 302E/335G/ st1-07 page 1

Medical Biophysics 302E/335G/ st1-07 page 1 Medical Biophysics 302E/335G/500 20070109 st1-07 page 1 STEREOLOGICAL METHODS - CONCEPTS Upon copletion of this lesson, the student should be able to: -define the ter stereology -distinguish between quantitative

More information

Knowledge Discovery Applied to Agriculture Economy Planning

Knowledge Discovery Applied to Agriculture Economy Planning Knowledge Discovery Applied to Agriculture Econoy Planning Bing-ru Yang and Shao-un Huang Inforation Engineering School University of Science and Technology, Beiing, China, 100083 Eail: bingru.yang@b.col.co.cn

More information

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions *

A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 607-626 (2005) A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Mebership Functions * SHIH-HSU HUANG AND JIAN-YUAN LAI + Departent of

More information

Verifying the structure and behavior in UML/OCL models using satisfiability solvers

Verifying the structure and behavior in UML/OCL models using satisfiability solvers IET Cyber-Physical Systes: Theory & Applications Review Article Verifying the structure and behavior in UML/OCL odels using satisfiability solvers ISSN 2398-3396 Received on 20th October 2016 Revised on

More information

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3 2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition

More information

Vodafone MachineLink. Port Forwarding / DMZ Configuration Guide

Vodafone MachineLink. Port Forwarding / DMZ Configuration Guide Vodafone MachineLink Port Forwarding / DMZ Configuration Guide Docuent history This guide covers the following products: Vodafone MachineLink 3G (NWL-10) Vodafone MachineLink 3G Plus (NWL-12) Vodafone

More information

Structuring Business Metadata in Data Warehouse Systems for Effective Business Support

Structuring Business Metadata in Data Warehouse Systems for Effective Business Support Structuring Business Metadata in Data Warehouse Systes for Effective Business Support arxiv:cs/0110020v1 [cs.db] 8 Oct 2001 N.L. Sarda Departent of Coputer Science and Engineering Indian Institute of Technology

More information

Brian Noguchi CS 229 (Fall 05) Project Final Writeup A Hierarchical Application of ICA-based Feature Extraction to Image Classification Brian Noguchi

Brian Noguchi CS 229 (Fall 05) Project Final Writeup A Hierarchical Application of ICA-based Feature Extraction to Image Classification Brian Noguchi A Hierarchical Application of ICA-based Feature Etraction to Iage Classification Introduction Iage classification poses one of the greatest challenges in the achine vision and achine learning counities.

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

A simplified approach to merging partial plane images

A simplified approach to merging partial plane images A siplified approach to erging partial plane iages Mária Kruláková 1 This paper introduces a ethod of iage recognition based on the gradual generating and analysis of data structure consisting of the 2D

More information

Collaborative Web Caching Based on Proxy Affinities

Collaborative Web Caching Based on Proxy Affinities Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA

More information

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage 216 IEEE 23rd International Conference on High Perforance Coputing A Low-Cost Multi-Failure Resilient Replication Schee for High Data Availability in Cloud Storage Jinwei Liu* and Haiying Shen *Departent

More information

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of

More information

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University

More information

An Architecture for a Distributed Deductive Database System

An Architecture for a Distributed Deductive Database System IEEE TENCON '93 / B eih An Architecture for a Distributed Deductive Database Syste M. K. Mohania N. L. Sarda bept. of Coputer Science and Engineering, Indian Institute of Technology, Bobay 400 076, INDIA

More information

News Events Clustering Method Based on Staging Incremental Single-Pass Technique

News Events Clustering Method Based on Staging Incremental Single-Pass Technique News Events Clustering Method Based on Staging Increental Single-Pass Technique LI Yongyi 1,a *, Gao Yin 2 1 School of Electronics and Inforation Engineering QinZhou University 535099 Guangxi, China 2

More information

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural

More information

Minimax Sensor Location to Monitor a Piecewise Linear Curve

Minimax Sensor Location to Monitor a Piecewise Linear Curve NSF GRANT #040040 NSF PROGRAM NAME: Operations Research Miniax Sensor Location to Monitor a Piecewise Linear Curve To M. Cavalier The Pennsylvania State University University Par, PA 680 Whitney A. Conner

More information

Massive amounts of high-dimensional data are pervasive in multiple domains,

Massive amounts of high-dimensional data are pervasive in multiple domains, Challenges of Feature Selection for Big Data Analytics Jundong Li and Huan Liu, Arizona State University Massive aounts of high-diensional data are pervasive in ultiple doains, ranging fro social edia,

More information

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math Sarter Balanced Assessent Consortiu s, s, Stard Alignent for Math The Sarter Balanced Assessent Consortiu (SBAC) has created a hierarchy coprised of clais targets that together can be used to ake stateents

More information

Collection Selection Based on Historical Performance for Efficient Processing

Collection Selection Based on Historical Performance for Efficient Processing Collection Selection Based on Historical Perforance for Efficient Processing Christopher T. Fallen and Gregory B. Newby Arctic Region Supercoputing Center University of Alaska Fairbanks Fairbanks, Alaska

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

Heterogeneous Radial Basis Function Networks

Heterogeneous Radial Basis Function Networks Proceedings of the International Conference on Neural Networks (ICNN ), vol. 2, pp. 23-2, June. Heterogeneous Radial Basis Function Networks D. Randall Wilson, Tony R. Martinez e-ail: randy@axon.cs.byu.edu,

More information

(12) United States Patent Kumar et al.

(12) United States Patent Kumar et al. (12) United States Patent Kuar et al. US006795434B1 (10) Patent N0.: (45) Date of Patent: US 6,795,434 B1 Sep. 21, 2004 (54) REPLICATED SERVER DISCOVERY IN CLIENT-PROXY SERVERS (75) Inventors: Harlharan

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Navodaya Garepalli Kartik Gopalan Ping Yang Coputer Science, Binghaton University (State University of New York) Contact:

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math Sarter Balanced Assessent Consortiu Clais, s, Stard Alignent for Math The Sarter Balanced Assessent Consortiu (SBAC) has created a hierarchy coprised of clais targets that together can be used to ake stateents

More information

An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured from Different Viewpoints

An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured from Different Viewpoints 519 An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured fro Different Viewpoints Yousuke Kawauchi 1, Shin Usuki, Kenjiro T. Miura 3, Hiroshi Masuda 4 and Ichiro Tanaka 5 1 Shizuoka

More information

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang IEEE International Conference on ultiedia and Expo POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION Junjun Jiang, Ruiin Hu, Zhen Han, Tao Lu, and Kebin Huang National Engineering

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

Galois Homomorphic Fractal Approach for the Recognition of Emotion

Galois Homomorphic Fractal Approach for the Recognition of Emotion Galois Hooorphic Fractal Approach for the Recognition of Eotion T. G. Grace Elizabeth Rani 1, G. Jayalalitha 1 Research Scholar, Bharathiar University, India, Associate Professor, Departent of Matheatics,

More information

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl. Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable

More information

Image hiding with an improved genetic algorithm and an optimal pixel adjustment process

Image hiding with an improved genetic algorithm and an optimal pixel adjustment process Eighth International Conference on Intelligent Systes Design and Applications Iage hiding with an iproved genetic algorith and an optial pixel adjustent process Lin-Yu Tseng Yung-Kuan Chan Yu-An Ho Yen-Ping

More information

Integrating fast mobility in the OLSR routing protocol

Integrating fast mobility in the OLSR routing protocol Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr

More information

Entity-Relationship Models of Information Artefacts

Entity-Relationship Models of Information Artefacts Entity-Relationship Models of Inforation Artefacts T. R. G. Green MRC Applied Psychology Unit 5 Chaucer Rd, Cabridge CB2 2EF thoas.green@rc-apu.ca.ac.uk http: //www.rc-apu.ca.ac.uk/personal/thoas.green/

More information

On the Computation and Application of Prototype Point Patterns

On the Computation and Application of Prototype Point Patterns On the Coputation and Application of Prototype Point Patterns Katherine E. Tranbarger Freier 1 and Frederic Paik Schoenberg 2 Abstract This work addresses coputational probles related to the ipleentation

More information

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We

More information

1 Extended Boolean Model

1 Extended Boolean Model 1 EXTENDED BOOLEAN MODEL It has been well-known that the Boolean odel is too inflexible, requiring skilful use of Boolean operators to obtain good results. On the other hand, the vector space odel is flexible

More information

Predicting x86 Program Runtime for Intel Processor

Predicting x86 Program Runtime for Intel Processor Predicting x86 Progra Runtie for Intel Processor Behra Mistree, Haidreza Haki Javadi, Oid Mashayekhi Stanford University bistree,hrhaki,oid@stanford.edu 1 Introduction Progras can be equivalent: given

More information

Relief shape inheritance and graphical editor for the landscape design

Relief shape inheritance and graphical editor for the landscape design Relief shape inheritance and graphical editor for the landscape design Egor A. Yusov Vadi E. Turlapov Nizhny Novgorod State University after N. I. Lobachevsky Nizhny Novgorod Russia yusov_egor@ail.ru vadi.turlapov@cs.vk.unn.ru

More information

Data Caching for Enhancing Anonymity

Data Caching for Enhancing Anonymity Data Caching for Enhancing Anonyity Rajiv Bagai and Bin Tang Departent of Electrical Engineering and Coputer Science Wichita State University Wichita, Kansas 67260 0083, USA Eail: {rajiv.bagai, bin.tang}@wichita.edu

More information

Trees. Linear vs. Branching CSE 143. Branching Structures in CS. What s in a Node? A Tree. [Chapter 10]

Trees. Linear vs. Branching CSE 143. Branching Structures in CS. What s in a Node? A Tree. [Chapter 10] CSE 143 Trees [Chapter 10] Linear vs. Branching Our data structures so far are linear Have a beginning and an end Everything falls in order between the ends Arrays, lined lists, queues, stacs, priority

More information

Closing The Performance Gap between Causal Consistency and Eventual Consistency

Closing The Performance Gap between Causal Consistency and Eventual Consistency Closing The Perforance Gap between Causal Consistency and Eventual Consistency Jiaqing Du Călin Iorgulescu Aitabha Roy Willy Zwaenepoel EPFL ABSTRACT It is well known that causal consistency is ore expensive

More information

Database Design on Mechanical Equipment Operation Management System Zheng Qiu1, Wu kaiyuan1, Wu Chengyan1, Liu Lei2

Database Design on Mechanical Equipment Operation Management System Zheng Qiu1, Wu kaiyuan1, Wu Chengyan1, Liu Lei2 2nd International Conference on Advances in Mechanical Engineering and Industrial Inforatics (AMEII 206) Database Design on Mechanical Equipent Manageent Syste Zheng Qiu, Wu kaiyuan, Wu Chengyan, Liu Lei2

More information

A Network-based Seamless Handover Scheme for Multi-homed Devices

A Network-based Seamless Handover Scheme for Multi-homed Devices A Network-based Sealess Handover Schee for Multi-hoed Devices Md. Shohrab Hossain and Mohaed Atiquzzaan School of Coputer Science, University of Oklahoa, Noran, OK 7319 Eail: {shohrab, atiq}@ou.edu Abstract

More information

Module Contact: Dr Rudy Lapeer (CMP) Copyright of the University of East Anglia Version 1

Module Contact: Dr Rudy Lapeer (CMP) Copyright of the University of East Anglia Version 1 UNIVERSITY OF EAST ANGLIA School of Coputing Sciences Main Series UG Exaination 2016-17 GRAPHICS 1 CMP-5010B Tie allowed: 2 hours Answer THREE questions. Notes are not peritted in this exaination Do not

More information

AN APPROACH ON BIMODAL BIOMETRIC SYSTEMS

AN APPROACH ON BIMODAL BIOMETRIC SYSTEMS AN APPROACH ON BIODAL BIOETRIC SYSTES Eugen LUPU, Siina EERICH Technical University of Cluj-Napoca, 26-28 Baritiu str. Cluj-Napoca phone: +40-264-40-266; fax: +40-264-592-055; e-ail: Eugen.Lupu @co.utcluj.ro

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

Fair Resource Allocation for Heterogeneous Tasks

Fair Resource Allocation for Heterogeneous Tasks Fair Resource Allocation for Heterogeneous Tasks Koyel Mukherjee, Partha utta, Gurulingesh Raravi, Thangaraj Balasubraania, Koustuv asgupta, Atul Singh Xerox Research Center India, Bangalore, India 560105

More information

A Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems

A Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems A Low-cost Meory Architecture with XIP for Mobile Ebedded Systes Chanik Park, Jaeyu Seo, Sunghwan Bae, Hyojun Ki, Shinhan Ki and Busoo Ki Software Center, SAMSUNG Electronics, Co., Ltd. Seoul 135-893,

More information

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS AWNI ITRADAT Assistant Professor, Departent of Coputer Engineering, Faculty of Engineering, Hasheite University, P.O. Box 15459,

More information

Entity Search Engine: Towards Agile Best-Effort Information Integration over the Web

Entity Search Engine: Towards Agile Best-Effort Information Integration over the Web Entity Search Engine: Towards Agile Best-Effort Inforation Integration over the Web Tao Cheng, Kevin Chen-Chuan Chang University of Illinois at Urbana-Chapaign {tcheng3, kcchang}@cs.uiuc.edu. INTRODUCTION

More information