Collaborative Web Caching Based on Proxy Affinities

Size: px
Start display at page:

Download "Collaborative Web Caching Based on Proxy Affinities"

Transcription

1 Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA untz@csuclaedu ABSTRACT With the exponential growth of hosts and trac workloads on the Internet, collaborative web caching has been recognized as an ecient solution to alleviate web page server bottlenecks and reduce trac However, cache discovery, ie, locating where a page is cached, is a challenging proble, especially in the fast growing World Wide Web environent, where the nuber of participating proxies can be very large In this paper, we propose a new schee which eploys proxy anities to aintain a dynaic distributed collaborative caching infrastructure Web pages are partitioned into clusters according to proxy reference patterns All proxies which frequently access soe page(s) in the sae web page cluster for an \inforation group" When web pages belonging to a web page cluster are deleted fro or added into a proxy's cache, only proxies in the associated inforation group are notied This schee can be shown to greatly reduce the nuber of essages and other overhead on individual proxies while aintaining a high cache hit rate Finally, we eploy trace driven siulation to evaluate our web caching schee using three web access trace logs to verify that our caching structure can provide signicant benets on real workloads 1 INTRODUCTION As trac on the Internet continues to grow, how to iprove Internet perforance has becoe a challenging issue Recent research to tackle this proble falls into three categories server load balancing It is well known that the accesses over Internet are not uniforly distributed A coon approach adopted by popular web sites to alleviate server bottleneck is to provide a virtual URL interface and use a distributed server architecture underneath Soe internal echanis to dynaically assign client requests to the web servers is required to achieve scalability and transparency to the clients This assignent decision can be taken at the IP level or at the doain nae syste level In addition to their individual drawbacks [5], both schees require the set up of additional server(s) at local or reote sites to handle request overloads This approach can be taken to avoid request overload at web sites which are continuously popular (eg, DBLP bibliography web site) or predictably popular during soe period (eg, Olypic gae web site) However, due to its static nature, this echanis can not handle unforeseeable bursty requests eectively intra-net collaborative caching Within a ediu area network (MAN) (eg, capus wide network), several proxies are usually connected via high speed links Web pages fetched fro the content server by one proxy can be used to potentially fulll later requests (of the sae web page) fro other proxies within the sae MAN If ultiple requests of the sae web page are subitted fro the sae MAN within a short period of tie, only the rst one will go through the content server Since the proxy is usually uch \closer" to the client than the content server, the average latency of web page retrieval is reduced In addition, only a fraction of all requests need to be handled by the server, thus the server workload and Internet traf- c are also reduced Suary cache [11] is an exaple of this type of technique However, this approach still can not fully eliinate the server bottleneck caused by soe unforeseeable Internet-wide bursty accesses since a cached copy of a web page is only shared by clients within the sae MAN inter-net collaborative caching Based on the following observations, inter-net collaborative caching has been recognized as another feasible approach to iprove Internet perforance 1 Retrieving data fro a nearby proxy usually is uch faster than fetching the data fro a ore distant server (less latency and, ost likely, higher bandwidth) 2 A proxy that fetched a web page could potentially serve as the provider of this web page at a later tie (as long as it still caches an up-to-date copy of the web page) However, the nuber of proxies connected via the Internet is large Without incurring large overhead, how to identify a potential cache provider and oreover,

2 if ultiple providers exist, how to choose an optial one, are very crucial for the scalable perforance of the caching schee Harvest [9] [6] uses a proxy hierarchy to conduct the search for a potential provider This hierarchy is fored statically and independent of the proxy anity for web pages Thus, it is likely that the cache providers are far apart (in the hierarchy) fro the requester In such a case, large overhead will be incurred for cache discovery [19] also tries to solve this proble by aintaining a dynaic routing table In our proposed approach, instead of eploying a xed hierarchy, proxy anities are used to group proxies dynaically Intuitively, fro the viewpoint of a proxy, each web page request falls into one of the following three categories 1 The proxy locally caches an up-to-date version of the requested web page 2 An up-to-date version of the requested web page is cached by soe other nearby proxy 3 The requested web page has to be obtained fro the content server Web pages in the rst and third categories are easy to handle since the operations are local to each individual proxy However, collaborations aong proxies is required to locate cached web pages in the second category A carefully designed caching schee is crucial in order to avoid large overhead In our approach, proxies that have siilar anities will cooperate and share their cache content with each other in such a anner that little overhead is required to achieve a relatively high cache hit ratio Whenever a proxy fetches a web page, it will serve as a cache provider until this copy is obsolete Our ultiate goal is to iniize the average response tie of web page retrievals Two aspects are involved (1) What should be cached and where? (2) How does a proxy locate a reote cache containing a desired page? The rst question can be addressed by algoriths for prefetching [14] [12] Due to space liitations, we will not address this issue but rather focus on the second one The second issue is how to discover which proxy has a cached copy of a particular web page Basically, there are two approaches to cache discovery: pull and push The pull technique is that, when a proxy tries to locate a cache, it rst nds which proxy caches the web page, and then retrieves the page This usually increases the average response tie With the push technique, when the cache contents of a proxy changes, the proxy will tell other proxies about the change However, the push technique can counicate a large aount of unnecessary inforation This generates a signicant overhead not only on the network, but also on the proxies due to essage processing In addition, to locate a cache for a particular web page, a proxy has to aintain the inforation about other proxy's cache contents This can consue a signicant aount of resources when the nuber of proxies is large Therefore, a proxy should be selective concerning which proxies it should send the updates of its cache contents and how often The trend of increasing diversity of web page popularity [2] also indicates that a static global caching structure regardless of individual proxy anities would becoe less eective In fact, an optial cache schee should have good adaptability to diverse proxy anities and their changes In our schee, a dynaic distributed collaborative caching infrastructure is built according to the proxy anities so that unnecessary counication between proxies of distinct anities can be avoid and changes of proxy anities can be adapted to easily and quickly Moreover, scalability is an iportant aspect of a web caching schee since the nuber of proxies and servers could range up to hundreds of thousands in the Internet environent It will be shown in a later section that our approach can scale well when the nuber of proxies is large In this paper, we propose a schee using proxy proles and inforation groups which is based on web page access patterns The goal of this schee is to reduce the average nuber of essages aong proxies for updating the cache status while aintaining a high cache hit rate In our schee, a proxy prole contains a list of URLs of the web pages that are frequently accessed by the proxy, while an inforation group is essentially a ulticast group that links proxies which are collaboratively caching web pages that are of coon interest We group web pages into a set of overlapping web page clusters A proxy ay choose to join an inforation group if the intersection of the associated page cluster and the proxy's prole is signicant Generally, a proxy joins enough inforation groups to cover its ost frequently access pages Since a proxy's prole ay evolve over tie, the web page cluster generation and inforation group foration are perfored periodically (and increentally) to adapt to changes in the proxy's access pattern When a host wants to access a web page, it sends a request to its local proxy If the requested web page is not cached in the local proxy, then the proxy checks whether other proxies in the inforation group(s) (for this page) currently have this page in their cache The request will be sent to the \nearest" site which has this page Once there are enough changes in the cache contents of a proxy, the proxy will notify other proxies in the sae inforation group(s) of the changes Therefore, in order to achieve optial perforance, each inforation group should be of oderate size because a large group size incurs signicant overhead for bookkeeping while a sall group suers fro low cache hit ratio The reainder of this paper is organized as follows We discuss soe related work in Section 2 Section 3 presents the objective odel for our caching schee The siulation set up is presented in Section 4 Our page clustering algorith and inforation group foration algorith are presented in Section 5 and 6, respectively In Section 7 and 8, we discuss the web page retrieval process and optial inforation group size estiation, respectively Finally, conclusions are drawn in Section 9 2 RELATED WORK In this section, we discuss soe other web caching schees proposed recently We note that ost previous cooperative caching schees [6] [19] [11] focused on how caches cooperate with each other They did not take into account the

3 correlation aong proxy anities How to best utilize reference pattern inforation to iprove the Web perforance has becoe a topic of increasing interest [8] One contribution of our work is a schee to eciently analyze reference patterns to organize proxies into collaborative caching groups High cache hit rate can still be aintained at the cost of uch fewer inter-proxy essages as copared with previous schees 21 Caching in Harvest The caching schee in Harvest is presented in [9] [6] Caches are organized in a hierarchy Each cache in the hierarchy independently decides whether to fetch the reference fro the object's hoe site or fro its parent or sibling caches using a resolution protocol If the URL contains any of a congurable list of substrings, then the object is fetched directly fro the object's hoe, rather than through the cache hierarchy This feature is used to force the cache to resolve non-cacheable URLs (eg, cgi-bin) fored pages and local URLs directly fro the object's hoe Otherwise, when a cache receives a request for a URL that isses, it perfors an ICP(Internet Caching Protocol) to all of its siblings and parents, checking if the URL hits any sibling or parent Of all the sites which report having the object, the object is retrieved fro the site with the lowest easured latency 22 Adaptive Web Caching An adaptive web caching schee is proposed in [19] Cache servers are self-organizing and for a tight esh of overlapping ulticast groups and adapt as necessary to changing conditions This esh of overlapping groups fors a scalable, iplicit hierarchy that is used to eciently diuse popular web content towards the deand Adaptive web caches exchange a description of their content state with other ebers of their cache groups to eliinate the delay and unnecessary use of resources of explicit cache probing For each request, a cache rst deterines whether a copy of the requested web page is cached by one of its group ebers If not, the request will be forwarded to another cache (in the web caching infrastructure) which is signicantly ore likely to have the data This routing is accoplished using a URL routing table aintained at each web cache The inforation in the URL routing table is learned fro the source-based and content-based entries fro other web caches 23 Suary Cache Suary cache is a scalable wide area web cache sharing protocol proposed in [11] In this protocol, each proxy keeps a suary of the cache directory of each participating proxy When a user request isses in the local cache, the proxy checks these suaries for potential hits If a hit occurs, the proxy sends out requests to the relevant proxies to fetch the docuent Otherwise, the proxy sends the request directly to the web server In order to reduce the network overhead, a proxy does not update the copy of its suary stored with other proxies upon every odication of its directory: it rather waits until a certain percentage of its cached docuents are not reected in other proxies In addition, bloo lters [3] are used to build suaries in order to keep each individual suary sall Experients have shown that suary cache reduces the nuber of inter-cache protocol essages, the bandwidth consuption, the protocol CPU overhead signicantly while aintaining alost the sae cache hit ratio as the ICP However, when the nuber of proxies is large, the network trac for updating cache contents could also be large Thus suary cache ay have poor scalability 24 Web Caching Based on Dynaic Access Patterns A \local" caching algorith based on dynaic access patterns was presented in [18] This caching algorith exibly adapts its paraeters (such as the nuber of docuents, the size of cache, and the actual docuents in the cache, etc) based on the observation that there is a strong relationship between frequency and probability of access The analysis is based upon a odel fro psychological research on huan eory The probability of future docuent access is estiated based on frequency of prior docuent accesses However, this algorith did not address the issue of cooperative caching 25 Server Volues and Proxy Filters [8] proposed an end-to-end approach to iprove Web perforance using server volues and proxy proles The server groups related resources into volues based on access patterns (captured by conditional probability) and the le syste's directory structure This inforation is piggybacked in the servers response essage to the requesting proxy The proxy generated lter, which indicates the type of inforation of interest to the proxy, is used to tailor the piggyback inforation This piggyback inforation can be used to iprove the eectiveness of a variety of proxy policies such as cache coherency, prefetching, cache replaceent, and so on Experiental results show that probability-based volues can achieve higher prediction rate with a lower piggyback size than the directory-based structure Further reductions in processing and eory overhead are possible by liiting the calculation of probability iplications to pairs of resources that have the sae directory prex, at the expense of issing associations between resources in dierent directories 3 OBJECTIVE MODEL The objective of our web caching schee is to iniize the average latency (or response tie) of web page retrieval The following is a list of paraeters for estiating the average response tie : local cache hit ratio The ratio of the nuber of requests which are served by local proxy over the total nuber of requests!: reote cache hit ratio The ratio of the nuber of requests which are served by reote proxies over the nuber of outgoing requests, ie, the requests which can not be satised locally Local Cost: the average response tie of serving a request by the local proxy Reote Cost: the average response tie to serve a request through a reote proxy

4 Server Cost: the average response tie to serve a request fro the content server Locating Cost: the average tie to nd whether (and where) a cached web page exists P ush Cost: the average overhead (per outgoing request) incurred by ulticasting the changes of cache content to reote proxies Usually, the volue of valid web pages cached at each proxy reains the sae roughly if the syste is stable In other words, the web page expiration rate is coensurate with the fetch-in rate Therefore, the change of cache content can be easured by the aount of new web pages fetched in Assue that whenever the cache content changes by %, the proxy will ulticast the description of the changes to other proxies, and assue that this % change is the result of q (q > 1) outgoing requests on average, which take a period of tie of length t q on average Then, each proxy ulticasts, on average, once for every t q length of tie Assue that a proxy receives ulticast essages (fro other proxies) on average between two consecutive ulticasts Then, a proxy needs to spend t s + t r tie to process ulticast essages, where t s and t r are the average tie to generate and send out a ulticast essage to other proxies and the average tie to receive a ulticast essage sent by other proxy and update its local inforation, respectively Thus, the total push cost for all proxies over a period of tie t q is N p (ts + t r) + N p tn where N p, t n, and N p tn are the total nuber of proxies, the average additional delay to other network trac due to the transission of such a ulticast essage 1, and the overall overhead incurred due to the delivery all ulticast essages sent out by all proxies during t q, respectively Since the inforation ulticasted is used to facilitate the reote cache discovery process, we should factor in this cost when we estiate the search cost of each outgoing request Since there is on average of N p q outgoing requests overall (during the period of t q), the average overhead for each outgoing request is P ush Cost = ts+tr+tn q Search Cost: P ush Cost + Locating Cost Cost: average response tie of retrieval of a web page Cost = Local Cost + (1? ) Search Cost +(1? )! Reote Cost +(1? ) (1?!) Server Cost To siplify the proble, we assue that a web caching algorith can only control the following paraeters: Cost, Locating Cost, P ush Cost, Search Cost,!, but does not have control over the rest of paraeters; so they can be viewed as constant To iniize Cost, we therefore need to 1 Transitting this ulticast essage would consue certain network bandwidth and hence ight cause soe delay in the delivery of other packets iniize the following function: Search Cost +! Reote Cost +(1?!) Server Cost + Locating Cost +! Reote Cost +(1?!) Server Cost (1) = ts+tr+tn q where Server Cost > Reote Cost Each of! and Search Cost can be viewed as a function of the nuber of proxies in collaboration (denoted by ) The ore proxies that are involved, the higher the reote cache hit ratio and the search cost Thus, a oderate value of should be chosen to balance the tradeo between the reote cache hit ratio and the search cost Moreover, an optial strategy will be a schee which has a higher reote cache hit ratio for a given search cost, or a lower search cost for a given reote cache hit ratio It follows that during the push process, the update inforation should only be sent to those proxies which have an anity to the involved web pages By siilar reasoning, during the reote cache discovery process, only those proxies that have an anity for the requested page need to be queried In our proposed schee, proxies that share soe coon anities will for an inforation group which serves as the basis of collaboration All other paraeters except in Function 1 can be either collected or estiated at run tie Then, the optial size of an inforation group (ie, the nuber of proxies in collaboration) can be calculated accordingly In addition, instead of enforcing a unique inforation group size, we eploy two paraeters I in and I ax to indicate the range of optial value of and require that the size of each inforation group is within the range [I in; I ax] This not only accoodates the evaluated error during the estiation of, but also provides soe exibility to the construction of inforation group (without sacricing the quality of collaboration) Values of I in and I ax will be discussed in Section 8 4 TRACES AND SIMULATIONS In this paper, we use three sets of traces of HTTP requests to verify our design: DEC traces [10]: Digital Equipent Corporation Web Proxy Server traces fro Aug 29 to Sep 4, 1996 ClarkNet traces [7]: ClarkNet is a full Internet access provider for the Metro Baltiore-Washington DC area The traces contain all requests to ClarkNet server fro August 24 to Septeber 10, 1995 L traces [13]: an 100 days (during Aug31 to Oct7, 1997) worth of logs of HTTP requests fro about 3000 distinct clients It contains a total of 10 illion requests There are a total 12,000 servers and 300,000 distinct web pages represented in the trace Since the inforation in the trace logs is insucient for the purpose of siulation, eg, the trace logs do not reveal the connectivities of these hosts, we had to approxiate the needed inforation for the detailed siulation To build the topology of these hosts, we rst need to nd the nuber

5 of servers We assue that web pages served by the sae server all have the sae rst level URL coponent For exaple, the URLs of all web pages served by the ACM server starts with \wwwacorg" By exaining the IP address of each user/host, we can discover the nuber of subnets Furtherore, we assue that hosts in a subnet are connected by a 100 MBit/s fast Ethernet and there is a proxy for each subnet Then we generate a rando connected graph in which each node corresponds to a server or a subnet The edges of the graph correspond to the counication links between the server and client subnets The bandwidth on these links is 10MBit/s We generate a background workload which consues half of the bandwidth on each counication link on average In this paper we assue that the average lifetie of a web page is 7 days, and after a proxy fetches a web page, this copy of the web page will reside in the proxy's cache until it becoes obsolete 2 Last but not least, the page size follows a log-noral distribution with an average 8KB[2] Table 1 shows soe statistical inforation on the above three traces 5 PAGE CLUSTER Web pages are identied by their URLs Intuitively, different sets of web pages ay have dierent popularity, ie, soe web pages are hot spots whereas soe others are rarely accessed Experiental results have shown that ajority of the references go to a sall percentage of the web pages[4] It is uch ore benecial to iprove the cache hit rate for these hot web pages Therefore, we focus on the set of frequently accessed web pages for the following reasons: (1) If a page is not frequently accessed by any proxy, then it is unlikely that an up-to-date copy of this page is cached by soe proxy When this page is needed by a proxy, the proxy has to fetch it fro the server in ost cases Therefore, there is no incentive to analyze the access patterns of this set of web pages because we can rarely benet fro it (2) The analysis of access patterns has a certain overhead which is reduced quickly by eliinating fro consideration all infrequently referenced pages Each proxy keeps a log of the web page reference history of local clients, which is a sequence of web page references Given a web page and a trace log, the ratio of the nuber of accesses to this web page over the total nuber of accesses within the trace log is referred to as the frequency of the web page within the trace log For exaple, if there are 100 web page accesses overall and a web page is referenced 30 ties, then the frequency of that web page is 30% in this trace We use a threshold (specied as a percentage) to deterine whether a page is considered to be frequently accessed or not A page is considered frequently accessed if and only if the reference frequency of that web page is at least Intuitively, the frequency can be viewed as an indicator of popularity of that page Table 2 shows the eects of varying the value of For exaple, when is chosen as 001% (ie, a page is considered frequently accessed only if it is accessed at least once per 10,000 references), then 4% of all pages are considered to be frequently accessed, and 40% of all requests are to these 4% of the pages referenced in the DEC trace (These values are in the page coverage and request 2 This is feasible since all cached web pages can be stored on disk coverage coluns, respectively) We will discuss the eect of the value of on the cache hit ratio, average nuber of essages, average size of a essage, etc in Section 7 Page clusters (of frequently referenced web pages) can be fored according to the cobined access patterns of all proxies Grouping web pages into clusters based on these logs consists of two steps: 1 Each proxy sends its prole (ie, local frequently accessed web pages) to a central site S 2 An optial or near optial partition of frequently accessed web pages is generated Each proxy aintains a prole which consists of URLs of its locally frequently accessed web pages This can be easily done by exaining the local trace log We will explain later that this prole is used not only by the central site to group the page clusters but also by the proxy to guide itself to join appropriate inforation groups At the site S all reported web pages are grouped into a set of page clusters (See Figure 1) If a proxy frequently accesses at least one page in a page cluster, then we say that it has an anity for that page cluster An inforation group will be fored for each cluster for collaborative caching A proxy ay choose to join an inforation group if it has an anity for the corresponding cluster However, due to the overlaps aong page clusters, a proxy ight not join an inforation group even though the proxy has an anity for the corresponding page cluster since the proxy ay choose to join another inforation group that also accounts for those pages Let I ax be the axiu nuber of proxies allowed in an inforation group The size of each page cluster is deterined in such a way that the nuber of proxies that join the corresponding inforation group is at ost I ax (eg, I ax = 3 in Figure 1) 3 As entioned before, our goal is to reduce both the average nuber of essages processed by each proxy for updating other proxy's cache status and the size of these essages while aintaining the cache hit rate Moreover, we want to iniize the average nuber of inforation groups a proxy ay join so that the bookkeeping overhead can be iniized Replications are allowed during grouping (ie, two page clusters ight contain soe coon web pages) for such a purpose However, allowing a large aount of replication would cause another proble: the nuber of collaborating proxies for a web page tends to be sall 4 As a result, the cache hit ratio could be ipacted severely In order to prevent such an occurrence, soe echanis has to be eployed to restrict the nuber of replicas allowed for a page during the web page clustering procedure Let I in be the iniu nuber of collaborating proxies required to aintain an acceptable cache hit ratio for a web page (I in = 2 in Figure 1) Then, the proble becoes how to guarantee that a web page A can be allowed to replicate in a page cluster P G i only if it would not cause the size of any inforation group to be less than I in 3 The optial value of I ax is uch larger in reality 4 We will explain it later this section

6 Table 1: Statistical Inforation of Trace Logs DEC Traces ClarkNet Traces L Traces Nuber of Requests 354 illion 33 illion 10 illion Nuber of Proxies Nuber of Clients/Hosts 10,000 21, Nuber of Servers 70, ,000 Table 2: Page/Request Coverage for Dierent Frequencies DEC Traces ClarkNet Traces L Traces page request page request page request coverage coverage coverage coverage coverage coverage 0005% 9% 60% 10% 58% 10% 62% 001% 4% 40% 4% 39% 4% 41% 005% 0:4% 17% 0:4% 16% 0:4% 17% Proxy1 Proxy2 Proxy3 Proxy4 Proxy(n-1) Proxy(n) 3 A C E G 1 B D 4 F 2 Proxy Affinity Page Cluster Web Page G F A B 1 2 C Proxy Affinity n 3 Proxy Web Page 4 n-1 D E Figure 2: Map to a Hyper-graph Proxies Frequently Accessed Web Pages Figure 1: General Scenario The inforation group sizes is crucial to the overall perforance We will analyze the eects of dierent inforation group sizes and how to deterine the optial size in later sections General Approach This is a hyper-graph partition proble with replication as follows Each frequently accessed web page is apped to a vertex; each proxy's prole (ie, anity set) is apped to a hyper-link aong corresponding vertices (See Figure 2) The objective is to iniize the average nuber of inforation groups a proxy ay join in order to cover all its frequently accessed web pages A ove-based algorith [1] can be eployed to for the page clusters Let N p and n p be the nuber of proxies and the average nuber of \frequently accessed" web pages per proxy, respectively We rst group all web pages into N c Npnp (Iax+I in )=2 e clusters without any replication where N c = d if no page cluster exists previously Otherwise, the previously page clusters will be taken as the initial grouping Beginning fro this initial grouping, a series of passes are ade to iprove the quality of grouping by either oving pages aong clusters, replicating pages to soe clusters, or reov- ing replicas fro soe clusters During each pass, pages are successively exained until each page has been exained exactly once Given a current grouping P 0, the previously unexained page with the highest gain (dened shortly) is exained and the corresponding action (oving, replicating, or unreplicating) to incur such gain is taken to odify the current grouping Given the current grouping P 0, the gain of an action Ac is dened as the reduction of average nuber of inforation groups a proxy has to join if action Ac is taken Note that the gain can be either positive or negative After each pass, the best grouping observed during this pass 5 becoes the initial grouping for a new pass This procedure terinates when a pass fails to iprove the quality of its initial grouping Proxy Bucket proxy ID list of frequently accessed pages list of interested clusters (a) Page Bucket page ID list of frequently accessing proxies list of participating clusters gainarray of all possible actions (b) Figure 3: Data Structure Cluster Bucket cluster ID cluster size list of pages list of frequently accessing proxies 5 Note that an individual action during a pass ight not always iprove the grouping quality But it ay create an opportunity for a better grouping to be obtained later (c)

7 Soe necessary data structures are aintained to facilitate the partition process by a scan of all proxies' essages A proxy table, a page table, and a cluster table are built for all proxies, for all web pages frequently accessed by soe proxies, and for all web page clusters, respectively Without loss of generality, we assue that each proxy (page / cluster) can be uniquely identied by its ID which is a nuber between 1 and N p (N w / N c), where N p (N w / N c) is the total nuber of proxies (frequently accessed web pages / web page clusters) 6 In the proxy table, each slot, referred to as a proxy bucket (Figure 3(a)), consists of three coponents: proxy ID, a linked list of web pages this proxy frequently accesses, and a linked list of web page clusters to which this proxy has an anity In the page table, each slot, referred to as a page bucket (Figure 3(b)), aintains the following inforation: 1 page ID 2 a linked list of proxies which frequently access this page 3 a linked list of web page clusters which contain this page 4 gainarray: an array of buckets, each of which contains its gain on soe action The action on a page can be one of the following ove to another cluster replicate in another cluster reove replica fro this cluster Since the size of the inforation group corresponding to a cluster can not exceed I ax, when a cluster P G i grows to such a level that its estiated inforation group size reaches I ax, pages in other clusters are not allowed to ove to P G i or to be replicated in P G i until soe page in P G i is reoved fro P G i Every tie an action is taken on a page A, the gains of relevant pages (those pages which are also frequently accessed by the proxies which frequently access A) are updated For exaple, page B and C are relevant to A in Figure 1 since they are also frequently accessed by Proxy 1 that accesses A frequently In general, as shown in Figure 4(a), when a web page A oves fro cluster P G i to P G j, the inforation group for P G j tends to grow since proxies which have an anity for A ay join this inforation group On the other hand, the inforation group for P G i tends to shrink since proxies which have an anity for A but not for other web pages in P G i will withdraw Siilarly, given that A 2 P G i1 \P G i2 \ \P G ik (Figure 4(b)), replicating A to P G j (j 6= i1; i2; : : : ; ik) causes the inforation group for P G j to grow and the inforation groups for P G i1; P G i2; : : : ; P G ik to shrink for the following two reasons 6 In a general scenario where this assuption does not hold, a hash table can always be eployed to provide a fast apping between a proxy ID (page ID / cluster ID) to its associated inforation PG1 PGi A PGj PGi A PGj (a) ove A fro PGi to PGj PG2 A PGi PG1 PGj PGj (b) replicate A to PGj PG2 A PGi Figure 4: Moving and Replicating a Page 1 Before the replication, all proxies which have an anity only for A and soe other pages in the set P G j \ (P G i1 [ [ P G ik ) (light shaded area in Figure 4(b)) will join at least one of the inforation groups P G i1, P G i2, : : :, P G ik After the replication, soe of these proxies ay join P G j instead Note that, in this case, the average nuber of proxies in each inforation group would not be changed since the replication only causes soe proxies to ove fro inforation groups for P G i1, P G i2, : : :, P G ik to that for P G j 2 Those proxies which have an anity for A and P G j but not for any other web pages in P G i1 [ [ P G ik (dark shaded area in Figure 4(b)) will not join the inforation groups for P G i1, P G i2, : : :, P G ik any longer They just need to join the inforation group for P G j now In other words, the inforation groups for P G i1, P G i2, : : :, P G ik will shrink while the size of inforation group for P G j keeps the sae in this case As a consequence, the average nuber of proxies in an inforation group decreases Therefore, replication tends to reduce the average nuber of proxies in each inforation group Besides the estiated inforation group size of P G j, another criteria to deterine if A should be replicated in a cluster P G j is that the estiated inforation group size of P G i1; P G i2; : : : ; P G ik or P G j ust reain at least I in if the replication is perfored Perforance easureents of our proposed web page partitioning algorith is shown in Table 3 Here the centralized coputing site S is a UltraSparc Workstation which has a 200MB ain eory and one single 366MHz CPU Note that the eciency coes partially fro the trick that new partition is always generated increentally by taking the previous partition as the initial partition This partition process does not signicantly ipact the perforance of other workload on the central site and can be further optiized in the following ways The entire partitioning process can be done oine or taken as a background process If the central site is heavily loaded, it can postpone the coputation of its frequently access web pages until it is idle or lightly loaded

8 The gainarray coputation can be done parallel Therefore, ultiple achines can be used to share the workload of the partitioning process After the page clusters are fored, a server will be chosen to be the coordinator for each inforation group by S Usually, the coordinator of an inforation group is the server which owns the ost pages in the corresponding page cluster Finally, the content of all page clusters and their coordinators are broadcast to all proxies 8 Each proxy will atch its prole with the page clusters and send essage(s) to the coordinator(s) of page cluster(s), for which they have an anity, to join the inforation group(s) Since the content of all page clusters could be large, we use a Bloo Filter [3] [15] to encode the contents of page clusters A Bloo Filter is a ethod for representing a set A = fa 1; a 2; : : : ; a ng of n keys to frequency ebership queries The idea is to allocate a vector v of bits, initially set to 0, and then choose k independent hash functions, h 1; h 2; : : : ; h k, with range f1; : : : ; g For each key a 2 A, the bits h 1(a); h 2(a); : : : ; h k (a) of v are set to 1 Given a query key b, we check the bits h 1(b); h 2(b); : : : ; h k (b) If any of these bits are 0, then b is not in the set A Otherwise, we conjecture that b is in the set although there is a sall probability that we are wrong [11] reports that when the nuber of hash functions is ve and ten bits are used to encode an entry, the error (false positive) is about 09% 6 INFORMATION GROUP MAINTENANCE Inforation groups are fored based on page clusters Each inforation group is associated with one page cluster A proxy ay join ultiple inforation groups based on its pro- le and the contents of these page clusters In the previous section, we described a periodically executed algorith that globally fors page clusters The anager broadcasts the page clustering inforation (ie, the coordinator for each cluster and the content of each cluster) to all participating proxies Then each proxy, based on its proxy prole, deterines which page cluster(s) it has an anity for A proxy ay join the inforation groups for interesting page clusters There ay be several cobinations of inforation groups a proxy can join The choice of which inforation groups to join is based on the nuber of atches between a proxy's prole and the content of a page cluster We eploy a greedy algorith to deterine which inforation groups a proxy should join First, a proxy nds a page cluster which contains the axiu nuber of web pages in the proxy's prole The proxy joins the inforation group for that page cluster Next, the proxy nds another page cluster which contains the axiu nuber of web pages in the reainder of the proxy's prole The proxy joins the inforation group for the second page cluster This process continues until the proxy joins the inforation groups for all web pages in its prole 8 An alternative would be that the central site S deterines the inforation groups a proxy ay join and sends to the proxy only related inforation However, the proxy will lose the opportunity to join other inforation groups when its prole changes because of lack of inforation about other available web page clusters and their associated inforation groups Note that the proxy prole ay change dynaically to re- ect the changes of its client access anity Then every tie the prole changes, the proxy ay choose to withdraw fro soe inforation groups and/or join soe other inforation groups to accoodate the change of the access anity It is possible that, at a given tie, an inforation group ay contain ore than I ax or less than I in proxies due to the changes of proxy anities In such a case, a local reorganization procedure can be perfored on web pages in the web page clusters associated with the oversize and/or undersize inforation group(s) Due to space liitations, we will not elaborate on this in this paper If a proxy wants to join an inforation group, then the proxy sends a essage to the coordinator of that inforation group The coordinator keeps a record of which proxies are in the inforation group It then sends to the new proxy a list of the ebers of the inforation group And the new proxy sends the intersection of its cache content and the corresponding page cluster to all ebers in the inforation group In turn, all old proxies in the inforation group also tell the new proxy their cache contents which intersect the corresponding cluster (These essages can be sent via ulticast) If a proxy wants to withdraw fro an inforation group, then the proxy sends a ulticast essage to all ebers (including the coordinator) of this inforation group to notify this change Figure 5 shows the average cache hit ratio as a function of the inforation group size In our siulations, when the contents of a proxy's cache for a page cluster changes by ore than 10%, the proxy ulticasts the changes to other proxies in the inforation group for that cluster We choose 10% as the threshold because it is shown fro experients that the stale hit rate will be large otherwise [11] For the suary cache, when the overall cache content in a proxy changes over 10%, the proxy then broadcasts the updates to all proxies In our proposed schee the updates are only ulticasted to the proxies in the associated inforation group(s) When decreases, the cache hit ratio increases because ore pages are clustered and proxies exchange inforation on ore web pages It is ore likely, when a proxy tries to retrieve a web page, it can fetch the page fro another proxy instead of the server Moreover, with = 0:005% and a reasonable inforation group size (ie, 10 for DEC trace and 60 for L trace and ClarkNet trace), the cache hit rate for our schee is siilar to that of suary cache because the web pages for about 60% of the requests are analyzed and clustered The rest of the web pages are not \hot", and therefore, the requests for these non-clustered pages will likely result in a cache iss even in the suary cache In addition, for those \hot" pages, collaborative caching aong a relatively sall nuber of proxies is sucient to aintain a high cache hit rate Coordinating a large nuber of proxies in such a process (ie, the scenario in suary cache schee) would incur large overhead but little iproveent on cache hit rate We explore this issue ore in the next section 7 WEB PAGE RETRIEVAL In this section, we rst discuss how the content of the cache at one proxy propagates to other proxies, then we will present the detailed procedure for actual retrieval of web pages fro

9 Table 3: Web Page Partition Cost CPU Tie Average CPU Tie Average Message on S (in) on Each Proxy 7 (in) size (KB) 0005% DEC 001% % % Clark 001% % % L 001% % Hit Ratio DEC Traces L Traces ClarkNet Traces Suary Cache β=0005% β=001% β=005% Figure 5: Cache Hit Rate versus the Inforation Group Size the server or another proxy A proxy ay join several inforation groups When the cache contents of one proxy for one page cluster has changed over a threshold (easured as a percentage),, then the proxy will ulticast the changes to all proxies in the inforation group (for that page cluster) using a Bloo Filter This procedure is siilar to that used in the suary cache by Fang, et al [11] except that in our approach the scope of consideration is each individual page cluster and its corresponding inforation group When the cache contents for one page cluster changes by ore than at a proxy, the proxy will ulticast the changes (related to that page cluster) to other proxies in the associated inforation group In addition, this ulticast essage can be delivered at a lower priority than other packets to reduce its ipact to the noral Internet trac 9 When 1% 10%, the stale cache hit ratios of suary cache and our schee (with = 0:005%; 0:01%; 0:05%) are very siilar, which are between 9% to 12% for the three traces A siilar result is also reported in [11] In the suary cache schee, each proxy needs to aintain inforation of all other proxies' cache contents, whereas in our schee, a proxy only needs to keep inforation of collaborating proxies' cache contents Figure 6 shows the dierent size of cache status inforation aintained by the suary cache and our schee For both schees, the pages are encoded with a Bloo Filter and each entry consues 8 bits It is clear that the suary cache would require uch ore aintenance eort than our caching schee especially when the nuber of proxies is large ClarkNet traces have the largest nuber of proxies and the size of cache status 9 We nd epirically that the incurred sall delay in updating cache status inforation has little ipact on the overall cache hit ratio inforation of other proxies ranges up to several GB in suary cache and it could severely ipact the proxy's ability to serve pages to its clients In contrast, with the increase of the nuber of proxies or the cache size on each proxy, the size of cache status inforation in our proposed schee does not increase as fast as the suary cache This is due to the fact that each proxy only receives the cache status of other proxies in the sae inforation group(s) and only cache status of web pages in the corresponding page cluster(s) is aintained Now we explain how a page is retrieved Let's assue a client attached to proxy P R X sends a request for a particular web page to proxy P R X If P R X can not nd the web page in its local cache, then it will decide fro which reote proxy or the server it will fetch the web page During this process, P R X rst nds which page cluster the web page belongs to by exaining the Bloo Filters If the page does not belong to any cluster, then P R X will directly fetch the page fro the server Otherwise, P R X nds the inforation group(s) for the cluster(s) (The page ay belong to ultiple clusters) Then P R X ranks all proxies in the inforation group(s) and the server of that particular web page based on distance We use the round-trip latency to estiate the distance between two proxies [17] [16] This does not require extra overhead because the round-trip tie can be obtained when the updates of cache contents are sent out and the acknowledge of the updates are received P R X forwards the request to the "nearest" site (proxy or the server) which has the page If the reote proxy does not have the web page because of (1) cache invalidation (stale hit) or (2) error of the Bloo Filter (false hit), then P R X will forward the request to the second \nearest" site (proxy or the server) This process continues until the web page is

10 size of cache status inforation (MB) DEC Traces L Traces ClarkNet Traces Suary Cache β=0005% β=001% β=005% Cache Size (GB) in Cache Size (GB) in Cache Size (GB) in each proxy ( =10) each proxy ( =10) each proxy ( =10) Figure 6: Size of cache status inforation (Note the y-axis is in the log scale) retrieved It is guaranteed that this process will terinate eventually because the server always has the web page Figure 7 and 8 show the average nuber of network essages per user request and the average size of network essages per user request Here each essage processed by a proxy counts as one essage For exaple, if a ulticast essage is sent to 20 proxies, then the essage is counted 20 ties Our proposed schee has not only a uch saller nuber of network essages per user request, but also the essage size is uch saller especially when the nuber of proxies is large (L and ClarkNet traces) due to the cache update inforation Figure 9 shows the average latency for a user request In DEC traces, there are total 16 proxies, our proposed schee does not have a signicant advantage or disadvantage over suary cache However, when the total nuber of proxies is large, our proposed schee could have a signicant bene- t over suary cache due to the less network trac seen by each proxy The average latency of our proposed schee varies signicantly as a function of the inforation group size When is too sall, the cache hit rate will be low but the network trac will also be low because each proxy only need to notify a sall nuber of proxies On the other hand, when is large, the cache hit ratio is high but the network trac is also high Fro the experient, we found that 50 to 70 would be the appropriate range for for the trace data in our test Moreover, fro Figure 9, we can see that the scalability of our proposed schee is better than that of suary cache The response tie of suary cache schee increases fro L trace to ClarkNet trace because of the increase of the proxies (about four folds) However, the response tie of our schee accurately decrease because of the utilization of the proxy anity! 8 ESTIMATION OF INFORMATION GROUP SIZE It is clear that the inforation group size plays a decisive role in our schee and is a prerequisite to partition page clusters In this section, we propose a ethod to estiate the optial inforation group size As we explained in Section 3, besides, the following paraeters also participate in the cost function : Every tie a proxy's cache content changes by %, the proxy will ulticast the description of the changes to other proxies in the inforation group We set = 10% q: the average nuber of outgoing requests (fro a proxy) which would cause this % change t s: the average tie for a proxy to generate the description of its cache changes and send out as a ulticast essage t n: the average network overhead incurred by transitting this ulticast essage Because our schee requires a uch saller nuber (and size) of ulticast essages for updating cache status changes and these essages are delivered at lower priority, no signicant delay for delivery of other packets will be thereby incurred Thus we will oit it in the cost function (ie, t n = 0) t r: the average tie for a proxy to receive this ulticast essage and update its local inforation Locating Cost: the average tie to nd whether (and where) an up-to-date copy of the requested web page exists in the inforation group!: reote cache hit ratio It is the probability that an outgoing request fro a proxy will be served by another proxy in the inforation group Reote Cost: the average tie to retrieve a cached web page fro another proxy in the inforation group Server Cost: the average tie to serve a request fro the content server Therefore, we need to obtain the value of these paraeters in order to calculate the optial Fortunately, all of the can be easily collected by each proxy and reported to the central site S together with the proxy prole except for the rst tie the web page clusters are constructed At the rst tie, since no inforation group exists previously, soe paraeters have to be estiated fro other available inforation Each proxy can still collect the value of q, t s, t r, and Server Cost because introducing inforation group will not have signicant inuence to these paraeters However, the value of Locating Cost,!, and Reote Cost depends heavily on the foration of the inforation group We eploy soe heuristics to estiate the For each page

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

Planet Scale Software Updates

Planet Scale Software Updates Planet Scale Software Updates Christos Gkantsidis 1, Thoas Karagiannis 2, Pablo Rodriguez 1, and Milan Vojnović 1 1 Microsoft Research 2 UC Riverside Cabridge, UK Riverside, CA, USA {chrisgk,pablo,ilanv}@icrosoft.co

More information

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl. Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

Adaptive Holistic Scheduling for In-Network Sensor Query Processing

Adaptive Holistic Scheduling for In-Network Sensor Query Processing Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,

More information

A Periodic Dynamic Load Balancing Method

A Periodic Dynamic Load Balancing Method 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation

More information

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches Efficient Estiation of Inclusion Coefficient using HyperLogLog Sketches Azade Nazi, Bolin Ding, Vivek Narasayya, Surajit Chaudhuri Microsoft Research {aznazi, bolind, viveknar, surajitc}@icrosoft.co ABSTRACT

More information

A Hybrid Network Architecture for File Transfers

A Hybrid Network Architecture for File Transfers JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,

More information

Identifying Converging Pairs of Nodes on a Budget

Identifying Converging Pairs of Nodes on a Budget Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering

More information

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan

More information

Redundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network

Redundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network (IJACSA) International Journal of Advanced Coputer Science and Applications Vol. 8, No. 1, 217 Redundancy Level Ipact of the Mean Tie to Failure on Wireless Sensor Network Alaa E. S. Ahed 1 College of

More information

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Navodaya Garepalli Kartik Gopalan Ping Yang Coputer Science, Binghaton University (State University of New York) Contact:

More information

Closing The Performance Gap between Causal Consistency and Eventual Consistency

Closing The Performance Gap between Causal Consistency and Eventual Consistency Closing The Perforance Gap between Causal Consistency and Eventual Consistency Jiaqing Du Călin Iorgulescu Aitabha Roy Willy Zwaenepoel EPFL ABSTRACT It is well known that causal consistency is ore expensive

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

Improve Peer Cooperation using Social Networks

Improve Peer Cooperation using Social Networks Iprove Peer Cooperation using Social Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Noveber 5, 2007 Corresponding

More information

Integrating fast mobility in the OLSR routing protocol

Integrating fast mobility in the OLSR routing protocol Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr

More information

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade

More information

A Generic Architecture for Programmable Trac. Shaper for High Speed Networks. Krishnan K. Kailas y Ashok K. Agrawala z. fkrish,

A Generic Architecture for Programmable Trac. Shaper for High Speed Networks. Krishnan K. Kailas y Ashok K. Agrawala z. fkrish, A Generic Architecture for Prograable Trac Shaper for High Speed Networks Krishnan K. Kailas y Ashok K. Agrawala z fkrish, agrawalag@cs.ud.edu y Departent of Electrical Engineering z Departent of Coputer

More information

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage 216 IEEE 23rd International Conference on High Perforance Coputing A Low-Cost Multi-Failure Resilient Replication Schee for High Data Availability in Cloud Storage Jinwei Liu* and Haiying Shen *Departent

More information

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

A Network-based Seamless Handover Scheme for Multi-homed Devices

A Network-based Seamless Handover Scheme for Multi-homed Devices A Network-based Sealess Handover Schee for Multi-hoed Devices Md. Shohrab Hossain and Mohaed Atiquzzaan School of Coputer Science, University of Oklahoa, Noran, OK 7319 Eail: {shohrab, atiq}@ou.edu Abstract

More information

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction Relocation of ateway for Enhanced Tieliness in Wireless Sensor Networks Keal Akkaya and Mohaed Younis Departent of oputer Science and Electrical Engineering University of Maryland, altiore ounty altiore,

More information

Real-Time Detection of Invisible Spreaders

Real-Time Detection of Invisible Spreaders Real-Tie Detection of Invisible Spreaders MyungKeun Yoon Shigang Chen Departent of Coputer & Inforation Science & Engineering University of Florida, Gainesville, FL 3, USA {yoon, sgchen}@cise.ufl.edu Abstract

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se

More information

Data & Knowledge Engineering

Data & Knowledge Engineering Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu

More information

Distributed Multicast Tree Construction in Wireless Sensor Networks

Distributed Multicast Tree Construction in Wireless Sensor Networks Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,

More information

Optimal Route Queries with Arbitrary Order Constraints

Optimal Route Queries with Arbitrary Order Constraints IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL.?, NO.?,? 20?? 1 Optial Route Queries with Arbitrary Order Constraints Jing Li, Yin Yang, Nikos Maoulis Abstract Given a set of spatial points DS,

More information

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones Advance Access publication on 24 February 2017 The British Coputer Society 2017. All rights reserved. For Perissions, please eail: journals.perissions@oup.co doi:10.1093/cojnl/bxx015 Fair Energy-Efficient

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

Survivability Function A Measure of Disaster-Based Routing Performance

Survivability Function A Measure of Disaster-Based Routing Performance Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected

More information

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive and Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

BP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks

BP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks BP-MAC: A High Reliable Backoff Preable MAC Protocol for Wireless Sensor Networks Alexander Klein* Jirka Klaue Josef Schalk EADS Innovation Works, Gerany *Eail: klein@inforatik.uni-wuerzburg.de ABSTRACT:

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION

DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION www.arpnjournals.co DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION N. Snehalatha 1 and Paul Rodrigues 2 1 School of Coputing, SRM University, Chennai, Tail Nadu, India 2 Departent

More information

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University

More information

A Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems

A Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems A Low-cost Meory Architecture with XIP for Mobile Ebedded Systes Chanik Park, Jaeyu Seo, Sunghwan Bae, Hyojun Ki, Shinhan Ki and Busoo Ki Software Center, SAMSUNG Electronics, Co., Ltd. Seoul 135-893,

More information

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University

More information

A Measurement-Based Model for Parallel Real-Time Tasks

A Measurement-Based Model for Parallel Real-Time Tasks A Measureent-Based Model for Parallel Real-Tie Tasks Kunal Agrawal 1 Washington University in St. Louis St. Louis, MO, USA kunal@wustl.edu https://orcid.org/0000-0001-5882-6647 Sanjoy Baruah 2 Washington

More information

Multi Packet Reception and Network Coding

Multi Packet Reception and Network Coding The 2010 Military Counications Conference - Unclassified Progra - etworking Protocols and Perforance Track Multi Packet Reception and etwork Coding Aran Rezaee Research Laboratory of Electronics Massachusetts

More information

Multipath Selection and Channel Assignment in Wireless Mesh Networks

Multipath Selection and Channel Assignment in Wireless Mesh Networks Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

Ascending order sort Descending order sort

Ascending order sort Descending order sort Scalable Binary Sorting Architecture Based on Rank Ordering With Linear Area-Tie Coplexity. Hatrnaz and Y. Leblebici Departent of Electrical and Coputer Engineering Worcester Polytechnic Institute Abstract

More information

Burst Scheduling Networks. Simon S. Lam and Georey G. Xie. The University of Texas at Austin. Austin, Texas August 31, 1996.

Burst Scheduling Networks. Simon S. Lam and Georey G. Xie. The University of Texas at Austin. Austin, Texas August 31, 1996. Burst Scheduling Networks Sion S. La and Georey G. Xie Departent of Coputer Sciences The University of Texas at Austin Austin, Texas 78712-1188 August 31, 1996 Abstract Most application-level data units

More information

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13 Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical

More information

Equation Based Congestion Control for Video Transmission over WCDMA Networks

Equation Based Congestion Control for Video Transmission over WCDMA Networks Equation Based Congestion Control for Video Transission over WCDMA Networks Antonios Alexiou, Diitrios Antonellis and Christos Bouras Research Acadeic Coputer Technology Institute, Greece and Coputer Engineering

More information

COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS

COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS International Journal of Coputer Science and Counication Vol. 3, No. 1, January-June 2012, pp. 181-185 COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS A.H. Karode 1, S.R. Suralkar 2, Manoj Bagde

More information

Carving Differential Unit Test Cases from System Test Cases

Carving Differential Unit Test Cases from System Test Cases Carving Differential Unit Test Cases fro Syste Test Cases Sebastian Elbau, Hui Nee Chin, Matthew B. Dwyer, Jonathan Dokulil Departent of Coputer Science and Engineering University of Nebraska - Lincoln

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH Kulapraote Prathuchai Geoinforatics Center, Asian Institute of Technology, 58 Moo9, Klong Luang, Pathuthani, Thailand.

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant

More information

(12) United States Patent Kumar et al.

(12) United States Patent Kumar et al. (12) United States Patent Kuar et al. US006795434B1 (10) Patent N0.: (45) Date of Patent: US 6,795,434 B1 Sep. 21, 2004 (54) REPLICATED SERVER DISCOVERY IN CLIENT-PROXY SERVERS (75) Inventors: Harlharan

More information

Guillotine subdivisions approximate polygonal subdivisions: Part III { Faster polynomial-time approximation schemes for

Guillotine subdivisions approximate polygonal subdivisions: Part III { Faster polynomial-time approximation schemes for Guillotine subdivisions approxiate polygonal subdivisions: Part III { Faster polynoial-tie approxiation schees for geoetric network optiization Joseph S. B. Mitchell y April 19, 1997; Last revision: May

More information

Deterministic Voting in Distributed Systems Using Error-Correcting Codes

Deterministic Voting in Distributed Systems Using Error-Correcting Codes IEEE TRASACTIOS O PARALLEL AD DISTRIBUTED SYSTEMS, VOL. 9, O. 8, AUGUST 1998 813 Deterinistic Voting in Distributed Systes Using Error-Correcting Codes Lihao Xu and Jehoshua Bruck, Senior Meber, IEEE Abstract

More information

Privacy-preserving String-Matching With PRAM Algorithms

Privacy-preserving String-Matching With PRAM Algorithms Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,

More information

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem Theoretical Analysis of Local Search and Siple Evolutionary Algoriths for the Generalized Travelling Salesperson Proble Mojgan Pourhassan ojgan.pourhassan@adelaide.edu.au Optiisation and Logistics, The

More information

1 Extended Boolean Model

1 Extended Boolean Model 1 EXTENDED BOOLEAN MODEL It has been well-known that the Boolean odel is too inflexible, requiring skilful use of Boolean operators to obtain good results. On the other hand, the vector space odel is flexible

More information

Flucs: Artificial Lighting & Daylighting. IES Virtual Environment

Flucs: Artificial Lighting & Daylighting. IES Virtual Environment Flucs: Artificial Lighting & Daylighting IES Virtual Environent Contents 1. General Description of the FLUCS Interface... 6 1.1. Coon Controls... 6 1.2. Main Application Window... 6 1.3. Other Windows...

More information

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium 1 A Distributed Multi-service Resource Allocation Algorith in Heterogeneous Wireless Access Mediu Muhaad Isail, Student Meber, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract In this paper, radio resource

More information

An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured from Different Viewpoints

An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured from Different Viewpoints 519 An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured fro Different Viewpoints Yousuke Kawauchi 1, Shin Usuki, Kenjiro T. Miura 3, Hiroshi Masuda 4 and Ichiro Tanaka 5 1 Shizuoka

More information

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of

More information

Approaching the Skyline in Z Order

Approaching the Skyline in Z Order Approaching the Skyline in Z Order KenC.K.Lee Baihua Zheng Huajing Li Wang-Chien Lee cklee@cse.psu.edu bhzheng@su.edu.sg huali@cse.psu.edu wlee@cse.psu.edu Pennsylvania State University, University Park,

More information

A Discrete Spring Model to Generate Fair Curves and Surfaces

A Discrete Spring Model to Generate Fair Curves and Surfaces A Discrete Spring Model to Generate Fair Curves and Surfaces Atsushi Yaada Kenji Shiada 2 Tootake Furuhata and Ko-Hsiu Hou 2 Tokyo Research Laboratory IBM Japan Ltd. LAB-S73 623-4 Shiotsurua Yaato Kanagawa

More information

Effects of Interleaving on RTP Header Compression

Effects of Interleaving on RTP Header Compression Effects of Interleaving on RTP Header Copression Colin Perkins Jon Crowcroft Departent of Coputer Science University College London Gower Street London WCE 6BT Abstract We discuss the use of interleaving

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural

More information

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San

More information

Performance Analysis of Exposed Terminal Effect in IEEE Ad Hoc Networks in Finite Load Conditions

Performance Analysis of Exposed Terminal Effect in IEEE Ad Hoc Networks in Finite Load Conditions Perforance Analysis of Exposed Terinal Effect in IEEE 80.11 Ad Hoc Networks in Finite Load Conditions Diitris Vassis 1, Georgios Korentzas 1 1 Dept. of Inforation and Counication Systes Engineering University

More information

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS Evaluation of the Tiing Properties of Two Control Networs: CAN and PROFIBUS Max Mauro Dias Santos 1, Marcelo Ricardo Steer 2 and Francisco Vasques 3 1 UnilesteMG, CEP 35170-056, Coronel Fabriciano MG Brasil.

More information

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao

More information

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S COPUTER GEERATED HOLOGRAS Optical Sciences 67 W.J. Dallas (onday, August 3, 004, 1:38 P) PART III: CHAPTER OE DIFFUSERS FOR CGH S Part III: Chapter One Page 1 of 8 Introduction Hologras for display purposes

More information

Data-driven Hybrid Caching in Hierarchical Edge Cache Networks

Data-driven Hybrid Caching in Hierarchical Edge Cache Networks Data-driven Hybrid Caching in Hierarchical Edge Cache Networks Abstract Hierarchical cache networks are increasingly deployed to facilitate high-throughput and low-latency content delivery to end users.

More information

A Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem

A Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem IE Vol. 7, No. 2, pp. 84-92, Septeber 2008. A Coparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Proble Ji Ung Sun School of Industrial and Managent Engineering Hankuk University

More information

Collection Selection Based on Historical Performance for Efficient Processing

Collection Selection Based on Historical Performance for Efficient Processing Collection Selection Based on Historical Perforance for Efficient Processing Christopher T. Fallen and Gregory B. Newby Arctic Region Supercoputing Center University of Alaska Fairbanks Fairbanks, Alaska

More information

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract

More information

On-Chip Interconnect Implications of Shared Memory Multicores

On-Chip Interconnect Implications of Shared Memory Multicores On-Chi Interconnect Ilications of Shared Meory Multicores Srini Devadas Couter Science and Artificial Intelligence Laboratory (CSAIL) Massachusetts Institute of Technology 1 Prograing 1000 cores MPI has

More information

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networs F. Mousavi Madani Departent of coputer engineering Alzahra University Tehran, Iran, osavif@alzahra.ac.ir Received:

More information

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.5, Septeber 205 AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM Xie Yang and Cheng Wushan College of Mechanical Engineering,

More information

Data Caching for Enhancing Anonymity

Data Caching for Enhancing Anonymity Data Caching for Enhancing Anonyity Rajiv Bagai and Bin Tang Departent of Electrical Engineering and Coputer Science Wichita State University Wichita, Kansas 67260 0083, USA Eail: {rajiv.bagai, bin.tang}@wichita.edu

More information

MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES. Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou

MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES. Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou Departent of Coputer Science and Inforation Engineering, National Chiayi

More information

Dynamical Topology Analysis of VANET Based on Complex Networks Theory

Dynamical Topology Analysis of VANET Based on Complex Networks Theory BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 14, Special Issue Sofia 014 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.478/cait-014-0053 Dynaical Topology Analysis

More information

A Learning Framework for Nearest Neighbor Search

A Learning Framework for Nearest Neighbor Search A Learning Fraework for Nearest Neighbor Search Lawrence Cayton Departent of Coputer Science University of California, San Diego lcayton@cs.ucsd.edu Sanjoy Dasgupta Departent of Coputer Science University

More information

Database Design on Mechanical Equipment Operation Management System Zheng Qiu1, Wu kaiyuan1, Wu Chengyan1, Liu Lei2

Database Design on Mechanical Equipment Operation Management System Zheng Qiu1, Wu kaiyuan1, Wu Chengyan1, Liu Lei2 2nd International Conference on Advances in Mechanical Engineering and Industrial Inforatics (AMEII 206) Database Design on Mechanical Equipent Manageent Syste Zheng Qiu, Wu kaiyuan, Wu Chengyan, Liu Lei2

More information

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design A Fast Multi-Obective Genetic Algorith for Hardware-Software Partitioning In Ebedded Syste Design 1 M.Jagadeeswari, 2 M.C.Bhuvaneswari 1 Research Scholar, P.S.G College of Technology, Coibatore, India

More information

COMPARISON OF ANT COLONY OPTIMIZATION & PARTICLE SWARM OPTIMIZATION IN GRID ENVIRONMENT

COMPARISON OF ANT COLONY OPTIMIZATION & PARTICLE SWARM OPTIMIZATION IN GRID ENVIRONMENT COMPARISON OF ANT COLONY OPTIMIZATION & PARTICLE SWARM OPTIMIZATION IN GRID ENVIRONMENT B.BOOBA 1 Dr. T.V.GOPAL 2 1 Research Scholar, Assist. Professor(Sl.Gr),Departent of Coputer Applications, Easwari

More information

Distributed Multi-robot Work Load Partition In Manufacturing Automation

Distributed Multi-robot Work Load Partition In Manufacturing Automation th IEEE Conference on Autoation Science and Engineering Key Bridge Marriott, Washington DC, USA August 3-, Distributed Multi-robot Work Load Partition In Manufacturing Autoation Gira S Tewolde, Changhua

More information