Research Progress for the Interest Control Protocol of Content-centric Networking
|
|
- Virgil Beasley
- 5 years ago
- Views:
Transcription
1 Sensors & Transducers 2013 by IFSA Research Progress or the Interest Control Protocol o Content-centric Networing GAO QIANG, WANG WEIMING, ZHOU JINGJING Zhejiang Gongshang University o Institute o Networ and Communication Engineering, Hangzhou, , China gaoqiang@pop.zjgsu.edu.cn, wmwang@zjsu.edu.cn, zhoujingjing@mail.zjgsu.edu.cn Received: 28 April 2013 /Accepted: 19 July 2013 /Published: 31 July 2013 Abstract: Content-centric networing (CCN) brings a new change in today's Internet communication mode by addressing named-data instead o host locations. Another major eature is the possibility to added storage capabilities into the networ. Now, the ocus o this wor is on the design o a receiver-driven Interest control protocol or CCN. ICP realizes a window-based Interest low control, achieving ull eiciency and airness under proper parameters setting. In order to research ICP in-depth, in this paper, we summary the recent research progress o it. ICP is divided into several parts: content request process, bandwidth sharing model, content request aggregation, storage sharing model. We mae these process modeling, research and analysis in linear and binary tree networ topology separately, and conirm the accuracy o the models and its characteristics through the numerical analysis, inally give the research trend or ICP. Copyright 2013 IFSA. Keywords: Content centric networ (CCN), Interest control protocol (ICP). 1. Introduction The design principle and structure o today's Internet originated in the in the 1960s and 70s. The goal o networ design is to solve the shared hardware resources. Thereore, the main purpose o the communication is to connect the two hosts, and the need to determine the speciic location o a device. However, with the rapid development o inormation technology, computer hardware costs a signiicant reduction in shared hardware resources demand have aded, and the subject o networ applications has turned to text messages and video content, and content services is slowly becoming a main networ service body. The content o the Internet service has been more attention. In content services networ, people do not care about what computer to provide content inormation, and is only concerned about the speed o access to the content as well as the reliability and security o the content. So, content service has become the main networ services. Under this premise, people do not care which computer provides the content inormation, but only concern about the speed o access to the content as well as the reliability and security o the content. However, the currently widely used in the Internet's TCP / IP is still a Host-to-Host communication model, this model is obvious shortcoming to post and access to inormation-based Internet. In this case, the point-to-point (p2p) technology and content delivery networ (CDN) technology, to some extent, ease the user's content / inormation sharing needs. However, any content delivery mechanism in the current networing is not completely overcome the deects o the underlying mechanism, resulting in a waste o resources, and requires a complex mapping o the content and "position". Article number P_
2 In order to adapt to this change in demand, new networ architecture should be established. Thereore, the Inormation Center Networ (ICN, Inormation Centric Networing) is proposed, and its goal is to solve all the problems existing in the internet today. It has been proved that ICN is better able to solve the various problems in today's Internet. In these uture networs research projects, Palo Alto research Center s (PARC) Content-centric networing (CCN) [1] has more advantages. Currently, many research institutions are involved in the content-centric networ architecture, Such as UCLA, and Bell Labs [7], Europe CONNECT project team [2] and so on. The rest o this article is organized as ollows. In Section 2 describes the CCN architecture, the dierence between CCN and the TCP / IP protocol. In Section 3 describes the research progress o the ICP protocol requests rom the research ramewor and content transmission bandwidth sharing, shared storage and iltering o the routing nodes several processes to describe. In Section 4 is a summary o the thesis. 2. CCN System Introduction The basic meaning o the Content-centric networing is that the demand o the entire networ is content, not the host. It undamentally changed the IP pacet s encapsulation structure and addressing mode, the pacet header no longer identiies the address, but the content name. CCN communication is driven by the consumers o data. There are two CCN pacet types [4], Interest and Data (Fig. 1). Fig. 1. CCN pacet types. The entire inormation transmission process is that the request pacet deines the title o the contents contained in a pacet and the pacet is transmitted to all directions, then the device o an adjacent node which can provide the requested content will sent data to the requesting node through the content data pacage. It can be seen that the CCN entire process is no longer concerned about the location, but quicly get the most rom the neighboring nodes in a minimum price. So, CCN provides a new protocol stac (Fig. 2). Fig. 2 compares the IP and CCN protocol stacs. CCN architecture shape and TCP / IP networ is very similar, the lower layer protocols are designed or adaptation o the underlying physical lins and communication, the upper layer protocols are designed to correspond to the related application. The main dierence is that the CCN using the Content chuns instead o the IP and using named data instead the naming o physical entities. IP protocol's success lies in its relaxed requirements or second layer protocol, CCN inherited it, and CCN can be implemented in any o the underlying protocols, can even architecture above the IP layer. In addition, the content-centric networ routing node built storage unction used to cache data pacets which can speed up access to other users and reduce networ traic. Fig. 2. The compare between TCP/IP and CCN. The ICP protocol [5] o CCN describes the entire inormation communication process: air sharing o the transmission, and the routing node storage and iltration process rom the transmission o the request pacet, the bandwidth on the lin. We will describe the progress o the current study as ollows. 3. ICP Introduction The CCN s ICP protocol [5] describes the entire inormation communication process. The client sends a request pacet, transmitted via the lin, reaches a routing node, the routing node o the query sequence are sequentially processed (the detailed procedure as ollowed), then sends to uplin by a node (in CCN, only the request pacets are routed), until retrievals needed data pacets, then the pacet request reverse transmission path o the pacet routing, service receiving end. The ICP process is divided into several parts: content request process, lin bandwidth sharing transmission process, storage and iltration process o the routing nodes. For the beneit o research, we model these sub-processes, and discuss the ICP s availability, eiciency and airness based on linear and binary tree networ topologies Node Model Analysis Interest Pacet Routing Analysis From Fig. 3, the typical CCN node model includes the contents o memory (CS), pending requests table (PIT) and orward orwarding (FIB). 88
3 CS is similar to IP routers cache, but uses dierent caching strategies. Because each o the IP pacets belong to a single point-to-point session, no value to the other session, so it uses the MRU replacement strategy which empty the inormation stored ater the completion o a session. CCN each pacet is selidentity and sel-validation, so there is also value or other users, CCN will uses the LRU or LFU replacement policy to maximize store important inormation, in order to reduce the content download delay and networ bandwidth. PIT records the uplin routing path o request pacets, so the content data pacage can be bactrac spread bac to the requesting node according to PIT recorded inormation trac. When the content requested arrives at the receiving node, PIT will delete this entry. FIB and the IP router s processing mechanism are similar, but it can be orwarded to the plurality o directions at the same time request. When an Interest pacet arrives on some ace, a longest-match looup is done on its Content Name. The index structure used or looup is ordered so that a Content Store match will be preerred over a PIT match which will be preerred over a FIB match. The speciic operation is as ollows: Fig. 3. CCN orwarding engine model. I CS contains a request pacet, it will directly sends the corresponding content to the requested port, and discards the request pacet, otherwise it will continue to query the PIT. Otherwise, i PIT contains entries associated with the content name, it will let request port added to the request port list, and discards the request pacet, otherwise it will continue to query the FIB. Otherwise, i FIB contains entries associated with content name, it will orward the pacet to the next CCN node in accordance with the instructions o the FIB. I the rest o the port is not empty, then it will orward request to all the rest, and ormat new list o entries and ports in the FIB. I there is no match or the Interest it is discarded (this node does not have any matching data and does not now how to ind any) Data Pacet Routing Analysis Data pacet processing is relatively simple since Data does not require routing, ollowed by only PIT port records the request data pacet transmission trajectory to reach the initial client. When a pacet arrives routing nodes, the longest match its content name query. Described in the PIT match the pacet ater the request when the CS match the pacet duplication, to remove it; PIT port o the FIB matching the node does not match, the pacet is unsolicited delete it; pacet orwarding path, request the end through the node to accept Assumptions and Notation For the various parts o the ICP protocol, we reerence [5, 7, 8] and summarize all o the models. The main assumptions are the ollowing: 1. M dierent content items are equally partitioned in K classes o popularity, i.e. is requested with probability q, 1. We assume a Zip popularity distribution, q c K, c ( 1 1/ ), with Content items are divided into chuns (P size) and the content size distribution is geometric with average σ chuns. 89
4 3. N networ nodes (or levels or tree topologies). Node i is equipped with a cache o size xi chuns. 4. The request arrival process is modeled as a Marov Modulated Rate Process (MMRP) [3] and the process is according to a Poisson process o intensity q 5. We deine virtual round trip time o class, VRTT, is similar to the round trip time or TCP connections in IP networs. It describes the average time o a chun to send the request and is accepted. than once or a duration equal to the timer as in Fig. 4 (b). Interest timer value: τ should be set larger than the minimum networ delay, and a minimum τ value is necessary to guarantee high utilization o the available bandwidth. In the case o variable τ, ICP maintains round trip delay estimates at every data pacet reception. Each low adapts its timer τ according to RTT ( RTT RTT ), 0.5 (2) min max min N i1 VRTT R (1 p ( i)) p ( j), 1,..., K i i1 j1 (1) VRTT is deined as a weighted sum o the round trip delays Ri associated to node i, and the weights are related to the stationary hit probabilities 1 p ( i) Content Request Process Notation Fig. 4. Linear (a) and binary tree (b) topologies with bandwidth-limited down-lin Content Request Aggregation The content request process is structured in two levels, content and chun. The process is modeled as a Marov Modulated Rate Process (MMRP): the request or content items is according to a Poisson process o intensity: q. A request or content is exactly the content o the irst chun, and when a chun is received, the other new chun is going to sent until the contents o the last chun. ICP realizes a window-based Interest low control, and it uses the AIMD (Additive Increase Multiplicative Decrease) mechanism to adapt the Interest window size to attain the maximum available rate allowed on the networ path. Interest window increase: W is increased by η/w at Data pacet reception. Interest window decrease: The protocol reacts by multiplying W by a decrease actor β< 1, no more CCN s a basic eature o blocing requests lood is the aggregation, which it can prevent the transmitted request or the same data again by the node o the PIT records pending requests chun trajectory. PIT time window Δ: the value is used to limit the number o pacets in its pending request. The larger o the value, the more the number o ilter out a request pacet; smaller the value, means that there are more unnecessary requests continue to be routed. The request aggregation clearly impacts the miss rate o a given cache. In act, when a request chun arrives at a node, i the corresponding chun is stored in the node, it will generate a hit, otherwise it generates a lost. For the latter, the request is iltered only i a previous request or the same chun has been emitted and the chun has not been received yet. Given the request process, the iltering probability associated to class at the irst hop is, 1 b pilt, (1) 1,..., K 1 (11/ ) b b e The proo is reported in [11]. (3) 90
5 3.5. Bandwidth Sharing Model In CCN, a receiver can download data rom multiple nodes and share bandwidth with other concurrent transers. User-perceived perormance depends on the parallel download bandwidth sharing. A generally accepted airness objective is max-min, which can achieve rate equalization. Every route i is characterized by a number o parallel transers, N i, sharing the same route and thereore the limited bandwidth. N i is a random process that varies according to the demand λ and the service rate each transer in progress gets. Ni is a birth and death Marov process, birth rate: ( i1) ( i), ( (0) ) death rate: n ()/( i ) i ( i1) ( i) denotes the rate o the Poisson process o content requests satisied by node i, under the assumption o a MMRP miss process o intensity () i at node i. The death rate, ni ()/( i ), is determined by the max-min air shared bandwidth () i in bps associated to each o the ni content transers in parallel over route i. orwarding tables are implemented by Carzaniga et al. in content-based networing simulator [6]. For the case o a single node, we present the experimental case is that a population o M = content items, and K = 400 classes, each one with m = 50 items. Content items are split in chuns o 10 B each. Users generate content requests according to a Poisson process o intensity λ= 40 content/sec, and the interest transmission window size is W = 1. The cache o size x = chuns (2 GBs) which implements the LRU replacement policy. Each cache is assumed to be initially empty, while statistics are collected in steady state only Storage Sharing Model The research about storage sharing model is based on above three models: content request process, content request aggregation and bandwidth sharing model, so we validate numerical analysis through the storage sharing model. Except 3.2 assumptions, we give the others as ollows: 1. K popularity classes with the same number o content items m = M/K in each one. 2. Non-unitary content size (σ) Storage Model Analysis at Node 1 We irst analyze the irst node which means the irst rom the content request point. Given a MMRP request arrival process with intensity λ, and average content size σ, be x > 0the cache size in number o chuns, then the stationary miss probability or chuns o class is, 1/ g c m (1 ) (4) 1 1 We use an ad-hoc C++ event-driven simulator[8] to conirm the accuracy o the model and assume a simple transport protocol which it uses a ixed window size or chun requests as in CCN. Nodes Fig. 5. Miss probability as a unction o class popularity (a); miss rate with and without request iltering or α= 2 (b) [8]. In Fig. 5 (a) [8] we can see that the greater the value o α, the miss rate is lower, and or high popular level (1 is the highest) o the content, it s miss rate is low, while the lower popular Level o the content, it s miss rate is getting higher and higher, almost, that is certainly lost. Fig 5 (b) [8] shows the miss rate with request iltering is lower than without. Through these two simulation graphics, we can conirm the accuracy o the eq.4 or predicting the probability o loss. 91
6 Storage Model Analysis at Networ Topologies In this section we consider the topologies reported Fig. 4, in order to derive the stationary miss probabilities p () i at hop i > 1, we need the ollowing auxiliary result. Given a MMRP request arrival process with rate λ(i) and popularity distribution: q () i i1 p ( j) q / K l1 ( ), 1,... p j q K j1 l1 j1 l l and deined Si(0, t) the number o dierent chuns th requested in the open interval (0, t] at the i node. Be μ(i) the miss rate at node i () i () i p () i q () i, then it holds [ S (0, t)] () i 1 t ( i1) (5) 1/ gi ( ) lim i 1 c m (1 ) t i.e. gi ()/ g ( i 1)/ () i, being g(1) g.the proo is reported in [9] Miss Rate Characterization without Request Aggregation Given a cascade o N caches as in Fig. 4 (a) and a MMRP request arrival process, then 1 < i N it holds gi () log ( ) ( ) log (1) p i i1 p l g(1) l1 p i1 p()log l p(1) l1 (6) Similarly, one can study the binary tree topology in Fig. 4 (b), that has no dierence with the line topology in the homogeneous case expect that λ(i)=2μ(i-1). Given a homogeneous binary tree with 2 N 1caches (that is with N levels) as in Fig. 4(b) and a MMRP requests arrival process, then 1 < i N it holds p () i p (1) p () i i1 p () 1 1 l p ilt, (1) l (8) For the topology in Fig. 4 (b) the request aggregation can tae place at several hops depending on traic and cache parameters. Given a binary tree with 2 N 1 caches (that is with N levels) as in Fig. 4 (b) and a MMRP requests arrival process and an aggregation timescale, then it holds 1 b ( i) p ilt, () i, 1,..., N 1 (11/ ) b ( i) (9) with / m 2 ( i 1)/ m b (1) e, b ( i) e, i 1. (1)(1, (1)) 1 p pilt i i () i 2 ( i1) p ()(1 i pilt, ()) i i i 1 (10) The proo is provided in [9]. For the case o topology, we present the experimental case is that N = 3 levels binary tree, where data is stored at the root o the tree. Each lin has the same capacity o 10 Gbps and the same round trip delay equal to 2 ms. The Zip parameter α= 2, and chun size is 10 B. Other parameters are same to the above case. Fig. 6 compares the miss probabilities at dierent nodes (rom the 1st to the 3rd level) without request aggregation. The comparison summarizes the good match between model predictions Eq.(4) at level i = 1, Eq.(6) at level i > 1. we can be see that the requests or content items o the most popular class are almost completely served by caches o irst nodes, so the miss probability or class = 1 is nearly 1 at i>1. Content items o class 2 are mainly cached at irst and second level, whereas less popular classes, represented in the queue o the curves, are very rarely cached as hardly requested. i1 () igi () log p ( i) p ( l)log p (1) i1 l1 ( i1) g(1) l1 p ()log l p (1) (7) Miss Rate Characterization with Request Aggregation Given a cascade o N caches as in Fig.4 (a), a MMRP request arrival process and an aggregation timescale, then it holds Fig. 6. Miss probability at dierent levels or binary tree topology, with no iltering [8]. 92
7 4. Conclusions Content-centric networing is the research ocus o the next generation networ. In this paper, we summary the recent research progress o ICP. We mae these process modeling, research and analysis in linear and binary tree networ topology separately, and conirm the accuracy o the models and its characteristics through the numerical analysis, inally give the research trend or ICP. Through the research, we ind that ICP protocol s a signiicant eature is the storage unctions embedded in the networ, it can help reduce content download latency and networ bandwidth usage greatly improve bandwidth utilization perormance. Another is that CCN transport provides Disruption Tolerant Networing. The multipoint nature o data retrieval by Interest provides lexibility to maintain communication in highly dynamic environments. Any node with access to multiple networs can serve as a content router between them. These characteristics do provide eective help to resolve the current Internet problems. But, CCN technology is still in its beginning stages. So, the ICP protocol is not very mature, and the protocol s process and topology are relatively simple, and the protocol traic control problem also needs more in-depth study. The next step o the research is continues to improve the ICP protocol, and over a period o time it will also be the hot issues o the next generation networ research. Acnowledgements This wor has been partially unded by National "973" project, under grant number 2012CB315902, and by NSFC (Natural Science Foundation o China), under grant number , and by Youth Science Fund o NSFC, under grant number , and by Natural Science Foundation o Zhejiang, under grant number Y , and by Public Interest Research social development projects, under grant number 2012C Reerences [1]. Project CCNxTM. [2]. CONNECT [3]. T. E. Stern and A. I. Elwalid, Analysis o separable Marov-modulated rate models or inormationhandling systems, Advances in Applied Probability, Vol. 23, No. 1, 1991, pp [4]. Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nicholas H. Briggs, Rebecca L. Braynard, Networing Named Content, in Proceedings o the ACM CoNEXT, [5]. Giovanna Caroiglio, Massimo Gallo, Luca Muscariello, ICP: Design and Evaluation o an Interset Control Protocol or Content-Centric Networing. in Proceedings o the INFOCOM Worshop, [6]. A. Carzaniga, M. Rutherord, and A. Wol, A routing scheme or content-based networing, in Proceedings o the INFOCOM 04, [7]. Giovanna Caroiglio, Massimo Gallo, Luca Muscariello. Bandwidth and Storage Sharing Perormance in Inormation Centric Networing, in Proceedings o the ACM SIGCOMM Worshop (ICN 11), [8]. Giovanna Caroiglio, Massimo Gallo, Luca Muscariello, Diego Perino, Modeling data transer in content-centric networing, in Proceedings o the (ITC23), [9]. G. Caroiglio, M. Gallo, L. Muscariello, and D. Perino, Modeling data transer in content-centric networing (extended version), in Research report, available at /muscariello, Copyright, International Frequency Sensor Association (IFSA). All rights reserved. ( 93
Bandwidth and Storage Sharing Performance in Information Centric Networking
Bandwidth and Storage Sharing Performance in Information Centric Networking Giovanna Carofiglio Bell Labs, Alcatel-Lucent giovanna.carofiglio@alcatel-lucent.com Massimo Gallo Orange Labs, France Telecom
More informationICP: Design and Evaluation of an Interest Control Protocol for Content-Centric Networking
ICP: Design and Evaluation of an Interest Control Protocol for Content-Centric Networking Giovanna Carofiglio, Massimo Gallo, Luca Muscariello Bell Labs, Alcatel-Lucent, first.last@alcatel-lucent.com,
More informationEfficient Mobile Content-Centric Networking. Using Fast Duplicate Name Prefix Detection. Mechanism
Contemporary Engineering Sciences, Vol. 7, 2014, no. 24, 1345-1353 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49166 Efficient Mobile Content-Centric Networking Using Fast Duplicate
More informationModeling Data Transfer in Content-Centric Networking
ing Data Transfer in Content-Centric Networking Giovanna Carofiglio, Massimo Gallo, Luca Muscariello and Diego Perino. Bell Labs, Alcatel-Lucent, France, Orange Labs, France Telecom, France first.last@alcatel-lucent.com,
More informationCCTCP: A Scalable Receiver-driven Congestion Control Protocol for Content Centric Networking
CCTCP: A Scalable Receiver-driven Congestion Control Protocol for Content Centric Networking Lorenzo Saino, Cosmin Cocora and George Pavlou Communications and Information Systems Group Department of Electrical
More informationLive Streaming with Content Centric Networking
2012 Third International Conference on Networking and Distributed Computing Live Streaming with Content Centric Networking Hongfeng Xu 2,3, Zhen Chen 1,3, Rui Chen 2,3, Junwei Cao 1,3 1 Research Institute
More informationConsumer driven Adaptive Rate Control for Real-time Video Streaming in CCN/NDN
Consumer driven Adaptive Rate Control for Real-time Video Streaming in CCN/NDN Takahiro YONEDA, Ryota OHNISHI, Eiichi MURAMOTO(Presenter),, Panasonic Corporation Jeff Burke, UCLA Contact: muramoto.eiichi@jp.panasonic.com
More informationOptimized Vehicular Traffic Flow Strategy using Content Centric Network based Azimuth Routing
, pp.80-84 http://dx.doi.org/10.14257/astl.2014.64.20 Optimized Vehicular Traffic Flow Strategy using Content Centric Network based Azimuth Routing ByungKwan Lee 1, EunHee Jeong 2 1 Department of Computer,
More informationIN recent years, the amount of traffic has rapidly increased
, March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed
More informationCache Replacement Strategies for Scalable Video Streaming in CCN
Cache Replacement Strategies for Scalable Video Streaming in CCN Junghwan Lee, Kyubo Lim, and Chuck Yoo Dept. Computer Science and Engineering Korea University Seoul, Korea {jhlee, kblim, chuck}@os.korea.ac.kr
More informationOptimal Cache Allocation for Content-Centric Networking
Optimal Cache Allocation for Content-Centric Networking Yonggong Wang, Zhenyu Li, Gaogang Xie Chinese Academy of Sciences Gareth Tyson, Steve Uhlig QMUL Yonggong Wang, Zhenyu Li, Gareth Tyson, Steve Uhlig,
More informationMATRIX ALGORITHM OF SOLVING GRAPH CUTTING PROBLEM
UDC 681.3.06 MATRIX ALGORITHM OF SOLVING GRAPH CUTTING PROBLEM V.K. Pogrebnoy TPU Institute «Cybernetic centre» E-mail: vk@ad.cctpu.edu.ru Matrix algorithm o solving graph cutting problem has been suggested.
More informationTO meet the increasing bandwidth demands and reduce
Assembling TCP/IP Packets in Optical Burst Switched Networks Xiaojun Cao Jikai Li Yang Chen Chunming Qiao Department o Computer Science and Engineering State University o New York at Bualo Bualo, NY -
More informationExperimental Evaluation of Memory Management in Content-Centric Networking
Experimental Evaluation of Memory Management in Content-Centric Networking Giovanna Carofiglio, Vinicius Gehlen, and Diego Perino Bell Labs, Alcatel-Lucent, France, first.last@alcatel-lucent.com Abstract
More informationITU - Telecommunication Standardization Sector. G.fast: Far-end crosstalk in twisted pair cabling; measurements and modelling ABSTRACT
ITU - Telecommunication Standardization Sector STUDY GROUP 15 Temporary Document 11RV-22 Original: English Richmond, VA. - 3-1 Nov. 211 Question: 4/15 SOURCE 1 : TNO TITLE: G.ast: Far-end crosstalk in
More informationScheduling in Multihop Wireless Networks without Back-pressure
Forty-Eighth Annual Allerton Conerence Allerton House, UIUC, Illinois, USA September 29 - October 1, 2010 Scheduling in Multihop Wireless Networks without Back-pressure Shihuan Liu, Eylem Ekici, and Lei
More informationA Proposed Approach for Solving Rough Bi-Level. Programming Problems by Genetic Algorithm
Int J Contemp Math Sciences, Vol 6, 0, no 0, 45 465 A Proposed Approach or Solving Rough Bi-Level Programming Problems by Genetic Algorithm M S Osman Department o Basic Science, Higher Technological Institute
More informationInsensitive Traffic Splitting in Data Networks
Juha Leino and Jorma Virtamo. 2005. Insensitive traffic splitting in data networs. In: Proceedings of the 9th International Teletraffic Congress (ITC9). Beijing, China, 29 August 2 September 2005, pages
More informationNamed Data Networking for 5G Wireless
Named Data Networking for 5G Wireless Edmund Yeh Electrical and Computer Engineering Northeastern University New York University January 27, 2017 Overview NDN: a major information-centric networking architecture
More informationA Markov Model of CCN Pending Interest Table Occupancy with Interest Timeout and Retries
A Markov Model of CCN Pending Interest Table Occupancy with Interest Timeout and Retries Amuda James Abu, Brahim Bensaou and Ahmed M. Abdelmoniem The Department of Computer Science and Engineering The
More informationResearch on Image Splicing Based on Weighted POISSON Fusion
Research on Image Splicing Based on Weighted POISSO Fusion Dan Li, Ling Yuan*, Song Hu, Zeqi Wang School o Computer Science & Technology HuaZhong University o Science & Technology Wuhan, 430074, China
More informationScaled VIP Algorithms for Joint Dynamic Forwarding and Caching in Named Data Networks
1896 1920 1987 2006 Scaled VIP Algorithms for Joint Dynamic Forwarding and Caching in Named Data Networks Ying Cui Shanghai Jiao Tong University, Shanghai, China Joint work with Fan Lai, Feng Qiu, Wenjie
More informationApplying fair queueing and traffic shaping for Internet applications on top of ATM The LB_SCFQ algorithm
Applying air queueing and traic shaping or Internet applications on top o ATM The LB_SCFQ algorithm Abstract Fair queueing mechanisms give very promising results or ATM networks. Combining a air queueing
More informationMCBS: Matrix Computation Based Simulator of NDN
JOURNAL OF COMPUTERS, VOL. 9, NO. 9, SEPTEMBER 2014 2007 MCBS: Matrix Computation Based Simulator of NDN Xiaoke Jiang, Jun Bi, You Wang Institute for Network Sciences and Cyberspace, Tsinghua University
More informationMobile Robot Static Path Planning Based on Genetic Simulated Annealing Algorithm
Mobile Robot Static Path Planning Based on Genetic Simulated Annealing Algorithm Wang Yan-ping 1, Wubing 2 1. School o Electric and Electronic Engineering, Shandong University o Technology, Zibo 255049,
More informationContent Searching Scheme with Distributed Data Processing Service in Content Centric Networking
J. Basic. Appl. Sci. Res., 4(1)160-165, 2014 2014, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com Content Searching Scheme with Distributed Data Processing
More informationAdaptive Routing Forwarding Strategy Based on Neural Network Algorithm
Adaptive Routing Forwarding Strategy Based on Neural Networ Algorithm Chao Ma, Mingchuan Zhang, Fenghua Zhang, Yaming Chen, Xinlu Wang, Qianpeng Li Abstract With the profound changes in global digital
More informationMethod estimating reflection coefficients of adaptive lattice filter and its application to system identification
Acoust. Sci. & Tech. 28, 2 (27) PAPER #27 The Acoustical Society o Japan Method estimating relection coeicients o adaptive lattice ilter and its application to system identiication Kensaku Fujii 1;, Masaaki
More informationOn the Double-Faced Nature of P2P Traffic
On the Double-Faced Nature o P2P Traic Raaele Bolla, Marco Canini, Riccardo Rapuzzi, Michele Sciuto DIST - Department o Communication, Computer and System Sciences, University o Genoa Via Opera Pia 13,
More informationReliable Mobile IP Multicast Based on Hierarchical Local Registration
Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Reliable Mobile IP Multicast Based on Hierarchical Local Registration Huanming ZHANG, * Quanlong GUAN, Zi Zhao ZHU, Weiqi
More informationShortest-hop Based Reliable Network Multicast
Shortest-hop Based Reliable Network Multicast K.L. Eddie Law, Daniel Siu Ryerson University, Toronto, Canada. Email: eddie@ee.ryerson.ca IBM Canada, Toronto, Canada. Email: siud@sympatico.ca Absact Although
More informationCS4/MSc Computer Networking. Lectures 4-5 Transport layer protocols TCP/UDP automatic repeat request
S4/MSc omputer Networking Lectures 4-5 Transport layer protocols TP/UDP automatic repeat request omputer Networking, opyright University o Edinburgh 005 Transport services and protocols provide logical
More informationPiecewise polynomial interpolation
Chapter 2 Piecewise polynomial interpolation In ection.6., and in Lab, we learned that it is not a good idea to interpolate unctions by a highorder polynomials at equally spaced points. However, it transpires
More informationClassification Method for Colored Natural Textures Using Gabor Filtering
Classiication Method or Colored Natural Textures Using Gabor Filtering Leena Lepistö 1, Iivari Kunttu 1, Jorma Autio 2, and Ari Visa 1, 1 Tampere University o Technology Institute o Signal Processing P.
More informationA Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI
Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com A Multipath AODV Reliable Data Transmission Routing Algorithm Based on LQI 1 Yongxian SONG, 2 Rongbiao ZHANG and Fuhuan
More informationDecision Support Systems for E-Purchasing using Case-Based Reasoning and Rating Based Collaborative Filtering
Decision Support Systems or E-Purchasing using Case-Based Reasoning and Rating Based Collaborative Filtering ABSTRACT The amount o trade conducted electronically has grown dramatically since the wide introduction
More informationPublisher Mobility Support in Content Centric Networks
Publisher Mobility Support in Content Centric Networks Dookyoon Han, Munyoung Lee, Kideok Cho, Ted Taekyoung Kwon, and Yanghee Choi School of Computer Science and Engineering Seoul National University,
More informationLow Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks
Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and
More informationNetworking Named Content
Networking Named Content Van Jacobson Diana K. Smetters James D. Thorton Machael F. Plass Nicholas H. Briggs Rebecca L. Braynard Presented by: Vladislav Perelman Advanced Networking Seminar Jacobs University
More informationCSE3213 Computer Network I
SE33 omputer Network I Service Model, Error ontrol, Flow ontrol, and Link Sharing (h. 5. 5.3. and 5.7.) ourse page: http://www.cse.yorku.ca/course/33 Slides modiied om lberto Leon-Garcia and Indra Widjaja
More informationScaled VIP Algorithms for Joint Dynamic Forwarding and Caching in Named Data Networks
Scaled VIP Algorithms for Joint Dynamic Forwarding and Caching in Named Data Networks Fan Lai, Feng Qiu, Wenjie Bian, Ying Cui Shanghai Jiao Tong University Shanghai, China Edmund Yeh Northeastern University
More informationFirst Video Streaming Experiments on a Time Driven Priority Network
First Video Streaming Experiments on a Driven Priority Network Mario Baldi and Guido Marchetto Department o Control and Computer Engineering Politecnico di Torino (Technical University o Torino) Abstract
More informationCompressed Sensing Image Reconstruction Based on Discrete Shearlet Transform
Sensors & Transducers 04 by IFSA Publishing, S. L. http://www.sensorsportal.com Compressed Sensing Image Reconstruction Based on Discrete Shearlet Transorm Shanshan Peng School o Inormation Science and
More informationAn Efficient Configuration Methodology for Time-Division Multiplexed Single Resources
An Eicient Coniguration Methodology or Time-Division Multiplexed Single Resources Benny Akesson 1, Anna Minaeva 1, Přemysl Šůcha 1, Andrew Nelson 2 and Zdeněk Hanzálek 1 1 Czech Technical University in
More information3-D TERRAIN RECONSTRUCTION WITH AERIAL PHOTOGRAPHY
3-D TERRAIN RECONSTRUCTION WITH AERIAL PHOTOGRAPHY Bin-Yih Juang ( 莊斌鎰 ) 1, and Chiou-Shann Fuh ( 傅楸善 ) 3 1 Ph. D candidate o Dept. o Mechanical Engineering National Taiwan University, Taipei, Taiwan Instructor
More informationTCP/IP protocol suite
TCP/IP protocol suite The TCP/IP protocol suite was developed prior to the OSI model. Therefore, the layers in the TCP/IP protocol suite do not match exactly with those in the OSI model. The original TCP/IP
More informationForwarding, Caching and Congestion Control in Named Data Networks
Forwarding, Caching and Congestion Control in Named Data Networs Edmund Yeh Northeastern University eyeh@ece.neu.edu Ran Liu Northeastern University liu.ran@husy.neu.edu Tracey Ho Speedy Pacets Inc. tracey@speedypacets.com
More informationCCN & Network Coding. Cedric Westphal Huawei and UCSC
CCN & Network Coding Cedric Westphal Huawei and UCSC ICN & Network Coding - RFC7933 9.5. Network Coding for Video Distribution in ICN An interesting research area for combining heterogeneous sources is
More informationCache Less for More in Information- Centric Networks W. K. Chai, D. He, I. Psaras and G. Pavlou (presenter)
Cache Less for More in Information- Centric Networks W. K. Chai, D. He, I. Psaras and G. Pavlou (presenter) Department of Electronic & Electrical Engineering University College London London WC1E 6EA United
More informationVideo Conferencing with Content Centric Networking
Video Conferencing with Content Centric Networking Kai Zhao 1,2, Xueqing Yang 1, Xinming Ma 2 1. Information Engineering College, North China University of Water Rescources and Electric Power,Zhengzhou,china
More informationJoint Congestion Control and Scheduling in Wireless Networks with Network Coding
Title Joint Congestion Control and Scheduling in Wireless Networks with Network Coding Authors Hou, R; Wong Lui, KS; Li, J Citation IEEE Transactions on Vehicular Technology, 2014, v. 63 n. 7, p. 3304-3317
More informationCaching Algorithm for Content-Oriented Networks Using Prediction of Popularity of Content
Caching Algorithm for Content-Oriented Networks Using Prediction of Popularity of Content Hiroki Nakayama, Shingo Ata, Ikuo Oka BOSCO Technologies Inc. Osaka City University Background Cache has an important
More informationMAPI Computer Vision. Multiple View Geometry
MAPI Computer Vision Multiple View Geometry Geometry o Multiple Views 2- and 3- view geometry p p Kpˆ [ K R t]p Geometry o Multiple Views 2- and 3- view geometry Epipolar Geometry The epipolar geometry
More informationResearch Article A Two-Level Cache for Distributed Information Retrieval in Search Engines
The Scientific World Journal Volume 2013, Article ID 596724, 6 pages http://dx.doi.org/10.1155/2013/596724 Research Article A Two-Level Cache for Distributed Information Retrieval in Search Engines Weizhe
More informationCharacterizing the network behavior of P2P traffic
Characterizing the network behavior o PP traic Raaele Bolla, Marco Canini, Riccardo Rapuzzi, Michele Sciuto DIST - Department o Communication, Computer and System Sciences, University o Genoa Via Opera
More informationEnabling Correct Interest Forwarding and Retransmissions in a Content Centric Network
Enabling Correct Interest Forwarding and Retransmissions in a Content Centric Network J. J. Garcia-Luna-Aceves 1,2 and Maziar Mirzazad-Barijough 1 1 Computer Engineering Department, University of California,
More informationImproving the Data Scheduling Efficiency of the IEEE (d) Mesh Network
Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw
More informationScheduling Unsplittable Flows Using Parallel Switches
Scheduling Unsplittable Flows Using Parallel Switches Saad Mneimneh, Kai-Yeung Siu Massachusetts Institute of Technology 77 Massachusetts Avenue Room -07, Cambridge, MA 039 Abstract We address the problem
More informationA Light-Weight Forwarding Plane for Content-Centric Networks
A Light-Weight Forwarding Plane for Content-Centric Networks J.J. Garcia-Luna-Aceves 1,2 and Maziar Mirzazad-Barijough 2 1 Palo Alto Research Center, Palo Alto, CA 94304 2 Department of Computer Engineering,
More informationAn Approach for Performance Evaluation of Batch-sequential and Parallel Architectural Styles
An Approach or Perormance Evaluation o Batch-sequential and Parallel Architectural Styles Golnaz Aghaee Ghazvini MSc student, Young Research Club, Njaabad Branch, Esahan, Iran Aghaee.golnaz@sco.iaun.ac.ir
More informationSUPER RESOLUTION IMAGE BY EDGE-CONSTRAINED CURVE FITTING IN THE THRESHOLD DECOMPOSITION DOMAIN
SUPER RESOLUTION IMAGE BY EDGE-CONSTRAINED CURVE FITTING IN THE THRESHOLD DECOMPOSITION DOMAIN Tsz Chun Ho and Bing Zeng Department o Electronic and Computer Engineering The Hong Kong University o Science
More informationA STUDY ON COEXISTENCE OF WLAN AND WPAN USING A PAN COORDINATOR WITH AN ARRAY ANTENNA
A STUDY ON COEXISTENCE OF WLAN AND WPAN USING A PAN COORDINATOR WITH AN ARRAY ANTENNA Yuta NAKAO(Graduate School o Engineering, Division o Physics, Electrical and Computer Engineering, Yokohama National
More informationNetworking Named Content: Content-Centric Networking. John Rula
Networking Named Content: Content-Centric Networking John Rula Overview Replacing traditional host based routing with named content routing Consumers request a data s name instead of a host (ip address)
More informationTraffic-Aware Placement of NFV Middleboxes
Traic-Aware Placement o NFV Middleboxes Wenrui Ma, Carlos Medina, and Deng Pan School o Computing and Inormation Sciences Florida International University, Miami, FL wma6@iu.edu, cmedi45@iu.edu, pand@iu.edu
More informationSensors & Transducers 2016 by IFSA Publishing, S. L.
Sensors & ransducers 06 by IFSA Publishing, S. L. http://www.sensorsportal.com Polynomial Regression echniques or Environmental Data Recovery in Wireless Sensor Networks Kohei Ohba, Yoshihiro Yoneda, Koji
More informationTHE FINANCIAL CALCULATOR
Starter Kit CHAPTER 3 Stalla Seminars THE FINANCIAL CALCULATOR In accordance with the AIMR calculator policy in eect at the time o this writing, CFA candidates are permitted to use one o two approved calculators
More informationAN 608: HST Jitter and BER Estimator Tool for Stratix IV GX and GT Devices
AN 608: HST Jitter and BER Estimator Tool or Stratix IV GX and GT Devices July 2010 AN-608-1.0 The high-speed communication link design toolkit (HST) jitter and bit error rate (BER) estimator tool is a
More informationUsing Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions
Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College
More informationPostprint.
http://www.diva-portal.org Postprint This is the accepted version of a paper presented at The 13th Swedish National Computer Networking Workshop (SNCNW 2017), Halmstad University, May 29-30. Citation for
More informationNeighbourhood Operations
Neighbourhood Operations Neighbourhood operations simply operate on a larger neighbourhood o piels than point operations Origin Neighbourhoods are mostly a rectangle around a central piel Any size rectangle
More informationApplying TCP Congestion Control Schemes on NDN and their Implications for NDN Congestion Control. Shuo Yang
Applying TCP Congestion Control Schemes on NDN and their Implications for NDN Congestion Control Shuo Yang Abstract While congestion control in TCP has been well studied, the future Internet architecture
More informationRough Connected Topologized. Approximation Spaces
International Journal o Mathematical Analysis Vol. 8 04 no. 53 69-68 HIARI Ltd www.m-hikari.com http://dx.doi.org/0.988/ijma.04.4038 Rough Connected Topologized Approximation Spaces M. J. Iqelan Department
More informationA dive into the caching performance of Content Centric Networking
A dive into the caching performance of Content Centric Networking Giuseppe Rossini, Dario Rossi Telecom ParisTech, Paris, France first.last@enst.fr Abstract Content Centric Networking (CCN) is a promising
More informationPerformance Enhancement Of TCP For Wireless Network
P a g e 32 Vol. 10 Issue 12 (Ver. 1.0) October 2010 Global Journal of Computer Science and Technology Performance Enhancement Of TCP For Wireless Network 1 Pranab Kumar Dhar, 2 Mohammad Ibrahim Khan, 3
More informationLower Bound for Mean Object Transfer Latency in the Narrowband IoT Environment
International Journal of Applied Engineering Research ISS 0973-456 Volume 1, umber 1 (017) pp. 3365-3369 Lower Bound for Mean Obect Transfer Latency in the arrowband IoT Environment Y. J. Lee Department
More informationHIGH SPEED LASER STRUCTURING OF CRYSTALLINE SILICON SOLAR CELLS
HIGH SPEED LASER STRUCTURING OF CRYSTALLINE SILICON SOLAR CELLS S. Eidelloth, T. Neubert, T. Brendemühl, S. Hermann, P. Giesel, and R. Brendel Institut ür Solarenergieorschung Hameln (ISFH), Am Ohrberg
More informationImprovement of Buffer Scheme for Delay Tolerant Networks
Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science
More informationAN IMPROVED STEP IN MULTICAST CONGESTION CONTROL OF COMPUTER NETWORKS
AN IMPROVED STEP IN MULTICAST CONGESTION CONTROL OF COMPUTER NETWORKS Shaikh Shariful Habib Assistant Professor, Computer Science & Engineering department International Islamic University Chittagong Bangladesh
More informationDefects Detection of Billet Surface Using Optimized Gabor Filters
Proceedings o the 7th World Congress The International Federation o Automatic Control Deects Detection o Billet Surace Using Optimized Gabor Filters Jong Pil Yun* SungHoo Choi* Boyeul Seo* Chang Hyun Park*
More informationAGENT-BASED ROUTING ALGORITHMS ON A LAN
AGENT-BASED ROUTING ALGORITHMS ON A LAN Y. Yang, A. N. Zincir-Heywood, M. I. Heywood, S. Srinivas Faculty of Computer Science, Dalhousie University {yang@cs.dal.ca, zincir@cs.dal.ca, mheywood@cs.dal.ca,
More informationWeek 2 / Paper 1. The Design Philosophy of the DARPA Internet Protocols
Week 2 / Paper 1 The Design Philosophy of the DARPA Internet Protocols David D. Clark ACM CCR, Vol. 18, No. 4, August 1988 Main point Many papers describe how the Internet Protocols work But why do they
More informationA Method of Sign Language Gesture Recognition Based on Contour Feature
Proceedings o the World Congress on Engineering and Computer Science 014 Vol I WCECS 014, -4 October, 014, San Francisco, USA A Method o Sign Language Gesture Recognition Based on Contour Feature Jingzhong
More informationROBUST FACE DETECTION UNDER CHALLENGES OF ROTATION, POSE AND OCCLUSION
ROBUST FACE DETECTION UNDER CHALLENGES OF ROTATION, POSE AND OCCLUSION Phuong-Trinh Pham-Ngoc, Quang-Linh Huynh Department o Biomedical Engineering, Faculty o Applied Science, Hochiminh University o Technology,
More informationIN this letter we focus on OpenFlow-based network state
1 On the Impact of Networ State Collection on the Performance of SDN Applications Mohamed Aslan, and Ashraf Matrawy Carleton University, ON, Canada Abstract Intelligent and autonomous SDN applications
More informationFusion of Heterogeneous Sensors for the Guidance of an Autonomous Vehicle
Fusion o Heterogeneous Sensors or the Guidance o an Autonomous Vehicle Jan C. Becer Institute o Control Engineering echnical University Braunschweig Hans-Sommer-Str. 66 3816 Braunschweig, Germany jan.becer@tu-bs.de
More informationSTUDIES ON THE PERFORMANCE IMPROVEMENT OF WINDOW ADJUSTMENT PROCEDURE IN HIGH BANDWIDTH DELAY PRODUCT NETWORK
STUDIES ON THE PERFORMANCE IMPROVEMENT OF WINDOW ADJUSTMENT PROCEDURE IN HIGH BANDWIDTH DELAY PRODUCT NETWORK Ms.T.Sheela* and Dr.J.Raja** *Research Scholar, Satyabama University, Chennai, sheela_saiit@yahoo.com
More informationReliable Transport I: Concepts and TCP Protocol
Reliable Transport I: Concepts and TCP Protocol Brad Karp UCL Computer Science CS 3035/GZ01 29 th October 2013 Part I: Transport Concepts Layering context Transport goals Transport mechanisms 2 Context:
More informationOptimum design of roll forming process of slide rail using design of experiments
Journal o Mechanical Science and Technology 22 (28) 1537~1543 Journal o Mechanical Science and Technology www.springerlink.com/content/1738-494x DOI 1.17/s1226-8-43-9 Optimum design o roll orming process
More informationPerformance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s
Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations
More informationTCP and UDP Fairness in Vehicular Ad hoc Networks
TCP and UDP Fairness in Vehicular Ad hoc Networks Forouzan Pirmohammadi 1, Mahmood Fathy 2, Hossein Ghaffarian 3 1 Islamic Azad University, Science and Research Branch, Tehran, Iran 2,3 School of Computer
More information9.8 Graphing Rational Functions
9. Graphing Rational Functions Lets begin with a deinition. Deinition: Rational Function A rational unction is a unction o the orm P where P and Q are polynomials. Q An eample o a simple rational unction
More informationfoldr CS 5010 Program Design Paradigms Lesson 5.4
oldr CS 5010 Program Design Paradigms Lesson 5.4 Mitchell Wand, 2012-2014 This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. 1 Introduction In this lesson,
More informationPerformance of UMTS Radio Link Control
Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication
More informationNew Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
New Key-Recovery Attacks on MAC/NMAC-MD4 and NMAC-MD5 Lei Wang, Kazuo Ohta and Noboru Kunihiro* The University o Electro-Communications * The University o Tokyo at present. 1 Motivation o This Research
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationImproving TCP Performance over Wireless Networks using Loss Predictors
Improving TCP Performance over Wireless Networks using Loss Predictors Fabio Martignon Dipartimento Elettronica e Informazione Politecnico di Milano P.zza L. Da Vinci 32, 20133 Milano Email: martignon@elet.polimi.it
More informationMeasuring the Vulnerability of Interconnection. Networks in Embedded Systems. University of Massachusetts, Amherst, MA 01003
Measuring the Vulnerability o Interconnection Networks in Embedded Systems V. Lakamraju, Z. Koren, I. Koren, and C. M. Krishna Department o Electrical and Computer Engineering University o Massachusetts,
More informationA Learning-based Adaptive Routing Tree for Wireless Sensor Networks
A Learning-based Adaptive Routing Tree or Wireless Sensor Networks Ying Zhang and Qingeng Huang Palo Alto Research Center (PARC) Inc. 3333 Coyote Hill Road Palo Alto, CA 9434, USA Emails:{yzhang, qhuang}@parc.com
More informationSERVICE DISTRIBUTION MECHANISMS IN INFORMATION-CENTRIC NETWORKING
SERVICE DISTRIBUTION MECHANISMS IN INFORMATION-CENTRIC NETWORKING Bachelorarbeit der Philosophisch-naturwissenschaftlichen Fakultät der Universität Bern vorgelegt von Oliver Stapleton 2015 Leiter der Arbeit:
More informationLagrangian relaxations for multiple network alignment
Noname manuscript No. (will be inserted by the editor) Lagrangian relaxations or multiple network alignment Eric Malmi Sanjay Chawla Aristides Gionis Received: date / Accepted: date Abstract We propose
More information