Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs
|
|
- Francis Sanders
- 5 years ago
- Views:
Transcription
1 Repication of Virtua Network Functions: Optimizing Link Utiization and Resource Costs Francisco Carpio, Wogang Bziuk and Admea Jukan Technische Universität Braunschweig, Germany Emai:{f.carpio, w.bziuk, arxiv: v1 [cs.ni] 23 Feb 2017 Abstract Network Function Virtuaization (NFV) is enabing the softwarization of traditiona network services, commony depoyed in dedicated hardware, into generic hardware in form of Virtua Network Functions (VNFs), which can be ocated fexiby in the network. However, network oad baancing can be critica for an ordered sequence of VNFs, aso known as Service Function Chains (SFCs), a common coud and network service approach today. The pacement of these chained functions increases the ping-pong traffic between VNFs, directy affecting to the efficiency of bandwidth utiization. The optimization of the pacement of these VNFs is a chaenge as aso other factors need to be considered, such as the resource utiization. To address this issue, we study the probem of VNF pacement with repications, and especiay the potentia of VNFs repications to hep oad baance the network, whie the server utiization is minimized. In this paper we present a Linear Programming (LP) mode for the optimum pacement of functions finding a trade-off between the minimization of two objectives: the ink utiization and CPU resource usage. The resuts show how the mode oad baance the utiization of a inks in the network using minimum resources. I. INTRODUCTION Network Function Virtuaization (NFV) is a new paradigm that virtuaizes the traditiona network functions and paces them into generic hardware and couds, as opposed to the designated hardware. The pacement of the virtua network functions (VNFs) can happen either in remote data centers or by depoying singe servers or custers of servers. Pacing VNFs in remote data center can ower the cost of depoyment, but is known to typicay increasing the deay and create churns of network oad, due to the fix and often remote ocation. Instaing new services (or, mini data centers) inside the network can mitigate the distance-to-datacenter probem. At the same time, the depoyment of new servers forming sma data centers in reguar nodes requires new investment costs, which requires a gradua upgrade of the network. Therefore, the optima pacement of these servers in the network is a must for network operators to reduce the operationa costs. Whie most of the current work concentrates on the optima pacement of VNFs under some specific objective minimizing the network costs under some specific resources constraints, e.g. costs of power consumption or the number of physica servers, ess effort has been on addressing the network oad baancing probem with VNF pacement. In this paper, we address, jointy, the network oad baancing and resource cost probem with VNF pacement, where the concept of VNF repications is used to find a trade-off between network oad baancing and network costs. The Fig. 1 iustrates the idea, whereby we assume a service chain which is composed by non-repicabe VNFs and, depending on the number of repicas, may be spitted to one or more parae sets of an ordered sequence of VNFs towards the service end-point. The VNF repicas in a service chain can be impemented as many time as needed in the network. The major advantage is to spit the traffic fows in a controed way such that network traffic oad baancing can be optimized when the service is running. As commony in network services, the service chain starts with a non-repicabe VNF, e.g. a oad baancer or gateway, and is aocated in a dedicated data center which generates service requests. Whie the rest of the functions are aocated on sma servers, maintaining the sequence order. To find the optimum pacement of servers required for the depoyment of VNFs, we formuate the probem as a Integer Linear Programming (ILP) mode. The rest of the paper is organized as foows. Section II presents reated work. Section III describes the reference architecture. In Section IV, the reated optimization mode is described. Section VI anayzes the performance, and Section VII concudes the paper and discusses future research. II. RELATED WORK Eary work in [1] studies the optima VNFs pacement in hybrid scenarios, where some network functions are provided by dedicated physica hardware and some are virtuaized, depending on demand. They propose an ILP mode mode with the objective to minimize the number of physica nodes used, which imits the network size that can be studied due to compexity of the ILP mode. In [2], a context-free anguage is proposed for the specification of VNFs and a Mixed Integer Quadraticay Constrained Program (MIQCP) for the chaining and pacement of VNFs in the network. The paper finds that the VNF pacement depends on the objective, such as atency, number of aocated nodes, and ink utiizations. In mobie core networks, [3] discuss the virtuaization of mobie gateways, i.e., Serving Gateways (S-GWs) and Packet Data Network Gateways (P-GWs) hosted in data centers. They anayze the optimum pacements by taking into consideration the deay and network oad. In [4] aso propose the instantiation and pacement of PDN-GWs in form of VNFs. Unike previous work, we sove the VNF pacement probem by considering VNF repications which is the nove idea that we aready proposed in [5]. In this work, we extend [5] to sove the optimum pacement of VNFs by minimizing the network
2 enb S-GW Internet P-GW + Services Legacy system VNF1 S-GW P-GW LB Service Function Chain VNF4 LB FW NAT enb VNF1 S-GW LB P-GW VNF4 LB FW NAT VNF1 VNF4 S-NE Physica ocation Fig. 1: Use case on Mobie Core Networks P-NE cost whie maximizing oad baancing with constraints on the avaiabe resources in mobie core networks. Therefore, we propose a more reaistic approach to enabe an scaabe growth of the mobie data traffic over years. This paper aso incudes a new traffic mode which aso considers the end-user traffic generated in the Radio Access Network which previous paper did not consider. We aso consider mutipe VNFs pacement per node with repications, which is new. III. REFERENCE ARCHITECTURE The NFV architecture is basicay described by three components: Services, NFV Infrastructure (NFVI) and NFV Management and Orchestration (NFV-MANO). A Service is the composition of VNFs that can be impemented in virtua machines running on operating systems or on the hardware directy. The hardware and software resources are provided by the NFVI that incudes connectivity, computing, storage, etc. Finay, NFV-MANO is composed by the orchestrator, VNF managers and Virtuaized Infrastructure Managers responsibe for the management tasks appied to VNFs. In NFV-MANO, the orchestrator performs the resource aocation based on the conditions to perform the assignment of VNFs chains on the physica resources. The sub-task running in the orchestrator, known as VNF Forwarding Graph Embedding (VNF-FGE) or VNF pacement probem, tries to find the optimum pace to aocate VNFs with regard to some specific objective, such as minimization of computation resources, minimization of power consumption, network oad baancing, etc. A. Gateway Virtuaization: The EPC Use-Case In the focus area of VNF pacement probem, we propose to study a concrete scenario from egacy mobie systems, namey the Evoved Packet Core (EPC) networks, where we beieve that the VNF pacement in Service Function Chaining can bring most benefits. The proposed case study is shown in Fig. 1. The Serving Gateway (S-GW) and PDN Gateway (P-GW) are connected to e-nodeb and send the end-user traffic towards Internet. This traffic usuay requires various additiona services, currenty depoyed using traditionay enb Background traffic End-user traffic Fig. 2: Network traffic considerations Data Center traffic embedded network functions, such as oad baancers, TCP optimizers, firewas and NATs. Considering the virtuaization of the S-GW and P-GW on sma data centers, as proposed in [3], both the data-pane and contro-pane functions of the current egacy gateways are moved to an operator s datacenter. At the paces of the egacy gateways, an off-the-shef network eement (NE) is used to redirect the traffic from the origin access point of the Radio Access Network (formey done by the S-GW) to the DC and from the DC to the externa backbone interface, which is, in the most cases, the former pace of the P-GW. Typica VNFs reated to contro-pane functionaities of the S-GW and P-GW can not be further distributed on the network. In contrast, due to the arge traffic voumes handed by the data-pane, parae transmission paths can be used in the transport network, and thus, VNFs reated to datapane functions with high intensives tasks, e.g. TCP optimizers (TCP opt) or Performance Enhancement Proxies (PEP), may aso be repicated and be used in parae at different network ocations, as proposed in [6]. Thus, we study the chaining and virtuaization of the additiona functions reated to the datapane on different physica ocations (sma data centers) in the mobie core network. The number of required repicas wi be in reation with the network traffic demands. Therefore, by knowing how many repicas are necessary we can pace them to maintain a good network oad baancing. On the other hand, the usage of additiona network ocations can increase the number of required servers and DCs, which potentiay wi increase the network costs. To this end, we define the probem as finding the optimum pacement for these functions subject to the network costs in form of used DC ocations whie at the same time oad baancing the network. B. Network Traffic Mode In a rea network, not a services wi be virtuaized at once. Thus in this paper, we assume two kinds of network traffic, defined as the background traffic and data center traffic. This is iustrated in Fig. 2. The background traffic is reated to the egacy not virtuaized services and the traffic is
3 generated from each core node to the rest of nodes and routed by a traditiona network core protoco, e.g. IP routing. The virtuaized services are responsibe for the data center traffic. This traffic is generated at the S-NEs (former S-GW paces) and has to be transported towards the Internet gateways (P- NE s at former P-GW ocations), as shown in Fig. 1. Since the atter category of traffic, usuay TCP connections, is generated by end users, it has to traverse a set of network functions to match the required service before accessing to Internet. In our approach, we assume that the background traffic can be generated randomy and forwarded foowing the rues of a specific Traffic Engineering (TE) mode defined by the traditiona singe path destination oriented IP routing. The TE mode written in form of ILP formuation (detaied in the next section) minimizes the ink utiization of a inks in the network using a inear cost functions approach. Once the background traffic is oad baanced, it wi not be affected by the contro of the data center traffic, but it has to be considered as a fixed input parameter for the next mode caed Resource Aocation (RA). This mode is used to aocate optimay VNFs in the network trying to minimize the cost associated to the used resources, maximizing the network oad baancing. The optimum pacement of VNFs and repicas can provide the optimum ocations for the data centers, which wi be responsibe for the instantiation of VNFs in the network. IV. OPTIMIZATION MODELS This section formuates the Link Capacity Dimensioning, TE and RA modes as optimization probems subject to a set of constraints, as described next. The notation of a parameters and variabes is summarized in Tabe I. A. Link Capacity Dimensioning Mode This mode aows the initia ink dimensioning with the aim to minimize the required capacities for a given topoogy and a given traffic matrix. Then: Minimize: C L t T t (1) The constraint (2) assures that for the given ink traffic (eft side) the capacity of each ink is dimensioned according to an over-provisioning factor ϑ. So, L: λ R p t p P p ϑ C λ t T t t (2) λ Λ b To be sure that every ink is of exacty one bandwidth type: L : Ct = 1 (3) t Finay, the next constraint assures that every traffic demand exacty uses one admissibe path: λ Λ b : R p P p λ = 1 (4) λ B. Traffic Engineering Mode The TE mode minimizes the utiization cost of a inks in the network given as Parameter N = {n 0, n 1,..., n (N 1) } L = { 0, 1,..., (L 1) } P = {p 0, p 1,..., p (P 1) } T = {t 0, t 1,..., t (T 1) } Y = {y 0, y 1,..., y (Y 1) } S = {s 0, s 1,..., s (S 1) } V s = {v 0, v 1,..., v (Vs 1)} Λ = {λ 0, λ 1,..., λ (Λ 1) } Λ b Λ Λ s Λ P λ P P s P t p {0, 1} r v {0, 1} r max w max c ϑ Variabe TABLE I: Notation Meaning set of a nodes set of a inks set of a paths set of a bandwidths types set of inear cost functions set of service chains set of VNFs in service chain s set of a traffic demands subset of background traffic demands subset of demands of service chain s subset of paths for a specific λ subset of paths for service chain s 1 if path p traverses ink 1 if function v can be repicated maximum number of aowed repicas per service chain maximum number of VNFs per DC maximum capacity of ink over-provisioning capacity ratio Meaning K utiization cost of ink Rp λ {0, 1} 1 if traffic demand λ is using path p Ct {0, 1} 1 if ink is of of bandwidth type t Rp s {0, 1} 1 if service chain s is using path p Rp λ,s {0, 1} 1 if traffic demand λ from service chain s is using path p Fn v,s {0, 1} 1 if VNF v from service chain s is aocated in node n F n {0, 1} 1 if node n is running some VNF Minimize : L K (5) where the cost of every ink is reated to its ink utiization U T E and defined by the resuting vaue from a inear cost functions y i (U T E ) = a i U T E b i as foows: ( ) L, y Y : K y U T E where constants a i and b i are chosen in a way that the sope of the incrementa cost vaues y i Y approximatey foows an exponentia function [7]. The ink utiization is given by U T E = λ Λ b p P λ (6) λ R λ p t p c (7) The summation takes into account each traffic demand λ out of the set of a background demands Λ b whose specific path p P λ is traversing ink, divided by the ink capacity. The ony routing constraint for this mode assures that every traffic demand exacty uses one admissibe path: λ Λ b : R p P p λ = 1 λ
4 C. Resource Aocation Mode The second optimization mode, caed RA mode, uses a simiar objective function than the previous one, but adding a new term using the binary variabe F n (1 means the node is used by at min 1 VNF, 0 no VNF is assigned) which minimizes the number of nodes that are aocating VNFs subject to the constraints expained beow: ( ) ( ) Minimize : α K + β F n (8) L n N Both terms are weighted by α and β parameters to enabe the desired tradeoff between oad baancing and network costs. In this paper we restrict to use them as seection parameter for one of the objective functions. The RA traffic mode is different to the TE mode and defined as foows. For each service chain s S a tota number of Λ s traffic demands λ Λ s are defined, where each of them coud not be spitted and have to be forwarded over one service chain specifc path p P s, which is taken (is ony 1 if path p is used by demand λ). Furthermore, the number of paths P s may be different than the number of demands. Thus, without the usage of VNF repicas a demands of a service chain must use the same path. As a resut, the ink utiization due to the RA mode is given by: into account by binary variabe R λ,s p U RA = s S λ Λ s p P s λ Rp λ,s t p (9) c In the RA mode, the inear utiization cost functions take into account the superposition of the fix given background TE traffic with the RA traffic specified as: ( ) L, y Y : K y U T E + U RA (10) Because each demand has to be assigned to a path, the routing constraint is given by s S : R λ #» p P p λ,s = Λ s (11) s Λ s Then, to know if an specific node is being used or not, the binary variabe F n wi ony be 1 if 1 VNFs are assigned to a node n, which is assured by the constraint n N : s S v V F v,s n W F n s S v V F v,s n (12) where the binary variabe Fn v,s indicates, if VNF v from service chain s is aocated to node n. W is a arge constant to assure, that the eft side of the equation is aways ess than 1. The next constraint (13) assures that a certain traffic demand λ can ony use a path p if the requested service chain is aso using the same path. Thus (13) takes into account, that more than one demand can use the same path. On the other hand, constraint (14) guarantees, that a service schain s can not estabish an active path without traffic assigned to it. V1 p1 p2 V2 V2_rep Node n V3 Fig. 3: VNF repication strategy s S, p #» P s, λ #» Λ s : R λ,s p R s p (13) s S, p #» P s : R s p R λ,s λ Λ #» s V4 p (14) Furthermore, the number of admissibe paths for each service chain s is constrained by the number of repicas. Then, for [0, 1, 2,..., r max ] repicas, each service chain can use at maximum [1, 2, 3..., (r max + 1)] paths to forward traffic, i.e., s S : 1 p #» P s R s p r max + 1 (15) Therefore, with no repicas, a certain service chain can ony use one path, whie increasing number of repicas, the number of admissibe paths proportionay increases. Then, for each activated path in service chain s defined by Rp, s the next constraint aocates a VNFs of the service chain: s S, p P s, v Fn v,s (16) V s : R s p n p On the other hand, the sequence order of VNFs in the service chain has to be maintained. Then, for a certain path p, the function v can not be aocated in the node n, if the previous function v 1 is not aready aocated in any of the previous nodes of the same path. So, v V s, p P s, n p: ( n ) m=0 F (v 1),s m F v,s n R s p 1 when v > 0 (17) The next two constraints imit the maximum number of VNFs that can be aocated in the network. First, the maximum number of VNFs aocated in some specific node n is constrained by the parameter w max : n N : F s S v V n v,s w max (18) s Second, if a certain function v can be repicated r v, then, the maximum number of repicas is constrained by the maximum number of active paths Rp. s If the function can not be repicated, then can ony be paced once. So, s S, v V s : Fn v,s r v R n N p P p s + 1 r v (19) s To improve the oad baancing feature using repicated VNFs, we introduce an additiona constraint. In the proposed repication mode, we excude the case where two seected
5 Fig. 4: Janos-us network paths p 1 and p 2 from the service chain s are choosing the same shared node n to pace the same function (origina and repica). So, foowing the exampe shown in Fig. 3, v 2 and v 2 rep can never be aocated in the same node n. Then, for v V s, p 1 P s, p 2 P s, n 1 p 1, n 2 p 2 : R s p 1 + R s p 2 + 2F v,s n r v 3 { n1 = n 2 = n v 0 V s 1 (20) To be noted that, this constraint is added for a possibe pairs of admissibe paths of each service chain. To reduce the computing compexity we restrict, in this work, to ink disjoint paths. V. PERFORMANCE EVALUATION In this section, we show the resuts for four different optimization scenarios: 1) network oad baancing (minlb), 2) minimization of network costs (minnc) given by the number of required data centers (DCs), 3) minimization of network costs with imited number of VNFs per DC (minnc constr) and4) network oad baancing with imited number of DCs to pace VNFs and imited number of VNFs per DC (minlb constr). The LP modes are impemented using the Gurobi Optimizer [8] and the topoogy (26 nodes and 84 inks) is chosen from SNDLib website [9] and shown in Fig. 4. The background traffic is generated for each sourcedestination node pair randomy within the interva [1, 4] Gbps. Since the aocation of VNFs is known to be NP-hard, we restrict to 9 S-GWs and 3 P-GWs paced in the network, which are responsibe for the data-center traffic (see Fig.4). Unike other proposas, where the traffic between the S-GW and P- GW is assumed to be non-spittabe, each S-NE generates 10 traffic demands of 4.4 Gbps to its associated P-NE, which can be routed aong different path. For the ink dimensioning, the background and data-center traffic is optimay oad baanced by soving the TE mode, where the GWs are not virtuaized and paced at the origina ocations. Based on the traffic fows, we assume an overprovisioning factor of 1.2 to cacuate the ink capacities c, which are chosen from different granuarities (2.5, 10, 40, 100 and 200 Gbps). For the RA mode the background traffic is routed over the singe path derived above, which yieds the partia ink utiization U T E. Ony the DC traffic is now optimay routed, possiby using parae paths. A traffic demands of one S/P- NE are handed by one service chain. The service chain anayzed is shown in Fig. 2, which is composed by V NF 1 (i.e. S-GW, P-GW, LB), which can not be repicated, V NF 2 (i.e. TCP-optimizer) and V NF 3 (i.e. PEP), which can be repicated, and finay, V NF 4 (i.e. LB, FW, NAT), which again can not be repicated. Depending of the optimization objective, a VNFs may be paced in the same or in different DCs, where aso the S/P-NEs are possibe ocations. Repicated VNFs can be paced ony at DCs on different paths. We assume the ocation of the DCs and the assignment of the VNFs to DCs are the variabes to optimize. A. Network Load Baancing vs Minimum Network Node Costs We study optimization resuts obtained for the excusive minimization of the oad baancing (minlb, α = 1, β = 0) and excusive minimization of the network costs (minnc, α = 0, β = 1). In the Fig. 5, we show the comparison of the average ink utiization, maximum ink utiization, number of used DCs and maximum number of VNFs per DC with no repication, with one and two repicas, respectivey. Due to Eq.(15) the number of repications are restricted to the maximum vaue r max, ater shown in the figures as repicas. For the minnc scenario we observe expected resuts. Due to the cost optimization a VNFs are paced in 3 DCs which are reated to the number of P-NEs and ony singe paths between the S-NEs and P-NEs are used. Thus the average and maximum ink utiization is maintained constant for any case. The maximum number of VNFs per DC for the NC scenario changes if one VNF repication can be used (see Fig. 5c ) athough the optimized vaue of the objective function remains the same. This comes from the fact that the soution is ony unique with respect to the number of used DCs and not to the number of assigned VNFs per DC, which is an important behavior and for further studies. Whie, in the minlb scenario, the average ink utiization increases with repication (Fig. 5a) because the optimization mode tries to decrease number of overoaded inks using onger paths with underutiized inks, which can be seen from the reduction of the maximum ink utiization (Fig. 5b). In more detai Fig. 6 shows a histogram of the ink utiization, which verifies, that an increment of the avaiabe parae paths to forward traffic decreases the number of overoaded inks due to repication. The improvement between one and two repicas is not significant, but it is totay dependent on the chosen topoogy. The effect on the objective function?? is quite arger, as can be seen from the chart embedded in Fig. 6. On the other hand, as shown in (Fig. 5c), the number of used DCs increases because of onger paths more DCs are required to aocate repicas. Accordingy the maximum number of VNFs assigned to a DC decreases. B. Network Optimization under DC and VNF Constraints In the minnc case, the objective is to minimize the number of used DCs without restricting the number of VNF per DC. However, in a reaistic DCs the number of VNFs aocated to a virtua maschine (VM) wi be restricted due to performance
6 Percentage of inks Percentage of inks a) Average Link Utiization b) Maximum Link Utiization c) Max. num of VNF per DC - max. num. of used DCs No repication 1 repica 2 repicas Load Baancing Network Cost No repication 1 repica 2 repicas Load Baancing Network Cost 5 0 No repication 1 repica 2 repicas LB - max VNF LB - used DCs NC - max VNF NC - used DCs Fig. 5: Comparison between Load Baancing and Network Cost modes No repication Normaized cost 1 repica 2 repicas No repication 1 repica 2 repicas No repication Normaized cost 1 repica No repication 1 repica Link utiization Fig. 6: Link Utiization of minlb Mode TABLE II: Node Cost mode with at most 8 VNFs per node Case avg utiization path ength avg vnf No repication With repication boundaries of the avaiabe computation resources, e.g. the service processing time. Furthermore the number of VMs per DC wi be constrained as we. Due to our sma scae exampe we wi dea with this probem by simpe constraining the maximum number of VNFs per DC to 8 VNFs. The soution of the constraint optimization probem minnc constr resuts into 6 DCs, which doubes the network costs as shown in Fig.5. Due to the increased number of DCs the use of VNF repications offers some advantages, as shown in Tabe II. The constraint reduces the average number of VNFs (avg-vnf) per node and further, the usage of repicas aows to use some aternative paths in parae, which reduces the average path ength (in hops). As a consequence, the tota network traffic decreases as we as the average ink utiization. Finay we want to optimize the oad baancing under constraints given by the maximum number of usabe DCs as we as the maximum number of VNFs per DC, where the constraints are taken from the optima resuts given by the minnc constr probem. In the Fig. 7, we show the resuts for the histogram of the ink utiization. Here, we can see that one repica is sti abe to improve the oad baancing, but due to the sma exampe with ess effect. VI. CONCLUSIONS As VNFs can ony be paced onto servers ocated in data centers, the traffic directed to these DCs has not ony Link utiization Fig. 7: Link Utiization of minlb constr mode significant impact on the network costs but aso on the oad baancing. To enabe a cost efficient DC pacement by jointy improve the oad baancing we introduce the VNF pacement with repications in this paper, and especiay show how the repications of VNFs can hep to oad baance the network. ACKNOWLEDGMENT This work has been performed in the framework of SENDATE-PLANETS (Project ID C2015/3-1), and it is party funded by the German BMBF (Project ID 16KIS0470). REFERENCES [1] H. Moens and F. De Turck, VNF-P: A mode for efficient pacement of virtuaized network functions, Proceedings of the 10th Internationa Conference on Network and Service Management, CNSM 2014, [2] S. Mehraghdam, M. Keer, and H. Kar, Specifying and pacing chains of virtua network functions, 2014 IEEE 3rd Internationa Conference on Coud Networking, CoudNet 2014, pp. 7 13, [3] A. Basta, W. Keerer, M. Hoffmann, H. J. Morper, and K. Hoffmann, Appying NFV and SDN to LTE mobie core gateways, the functions pacement probem, AThingsCeuar 14, pp , [4] M. Bagaa, T. Taeb, and A. Ksentini, Service-aware network function pacement for efficient traffic handing in carrier coud, IEEE Wireess Communications and Networking Conference, WCNC, [5] F. Carpio, S. Dhahri, and A. Jukan, VNF Pacement with Repication for Load Baancing in NFV Networks, pp. 1 6, [Onine]. Avaiabe: [6] W. Haeffner, J. Napper, M. Stiemering, D. Lopez, and J. Uttaro, Service Function Chaining Use Cases in Mobie Networks, Internet-Draft, [Onine]. Avaiabe: [7] M. Caria, T. Das, A. Jukan, and M. Hoffmann, Divide and conquer: Partitioning OSPF networks with SDN, in IFIP/IEEE Internationa Symposium on Integrated Network Management, [8] Gurobi, Gurobi Optimizer. [Onine]. Avaiabe: [9] SNDib. [Onine]. Avaiabe:
Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network
Service Chain (SC) Mapping with Mutipe SC Instances in a Wide Area Network This is a preprint eectronic version of the artice submitted to IEEE GobeCom 2017 Abhishek Gupta, Brigitte Jaumard, Massimo Tornatore,
More informationA Scalable Approach for Service Chain (SC) Mapping with Multiple SC Instances in a Wide-Area Network
JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 A Scaabe Approach for Service Chain (SC) Mapping with Mutipe SC Instances in a Wide-Area Network This is a preprint eectronic version of the
More informationMulti-MANO interworking for the management of multi-domains networks and network slicing Functionality & Demos
Muti-MANO interworking for the management of muti-domains networks and network sicing Functionaity & Demos Acknowedgement & Open Source Soutions NECOS project: NFVi Sicing http://aurabaea.com/necos/ SONATA
More informationLoad Balancing by MPLS in Differentiated Services Networks
Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,
More informationA Memory Grouping Method for Sharing Memory BIST Logic
A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5
More informationA Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory
0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory
More informationNearest Neighbor Learning
Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification
More informationFor Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah
Journa of Lightwave Technoogy Page of CFP: Cooperative Fast Protection Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapocai and Hussein T. Mouftah Abstract We introduce a nove protection scheme, caed Cooperative
More informationTSR: Topology Reduction from Tree to Star Data Grids
03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen
More informationBalancing the Migration of Virtual Network Functions with Replications in Data Centers
Balancing the Migration of Virtual Network Functions with Replications in Data Centers Francisco Carpio, Admela Jukan and Rastin Pries Technische Universität Braunschweig, Germany, Nokia Bell Labs, Germany
More informationTopology-aware Key Management Schemes for Wireless Multicast
Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu
More informationImproving Reliability of Service Function Chains with Combined VNF Migrations and Replications
Improving Reliability of Service Function Chains with Combined VNF Migrations and Replications Francisco Carpio and Admela Jukan Technische Universität Braunschweig, Germany Email:{f.carpio, a.jukan}@tu-bs.de
More informationMobile App Recommendation: Maximize the Total App Downloads
Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management
More informationResource Optimization to Provision a Virtual Private Network Using the Hose Model
Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,
More informationJoint Optimization of Intra- and Inter-Autonomous System Traffic Engineering
Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering Kin-Hon Ho, Michae Howarth, Ning Wang, George Pavou and Styianos Georgouas Centre for Communication Systems Research, University
More information5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014
5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 014 Topoogy-Transparent Scheduing in Mobie Ad Hoc Networks With Mutipe Packet Reception Capabiity Yiming Liu, Member, IEEE,
More informationOutline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm
Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae
More informationLayout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed
Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Nattawut Thepayasuwan, Member, IEEE and Aex Doboi, Member, IEEE Abstract
More informationA Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks
Sensors 2013, 13, 16424-16450; doi:10.3390/s131216424 Artice OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journa/sensors A Near-Optima Distributed QoS Constrained Routing Agorithm for Mutichanne Wireess
More informationTraffic Engineering for Provisioning Restorable Hose-Model VPNs
Traffic Engineering for Provisioning Restorabe Hose-Mode VPNs Yu-Liang Liu, Nonmember, Yeai S. Sun a) and Meng Chang Chen b), Member Summary Virtua Private Networks (VPNs) are overay networks estabished
More informationPath-Based Protection for Surviving Double-Link Failures in Mesh-Restorable Optical Networks
Path-Based Protection for Surviving Doube-Link Faiures in Mesh-Restorabe Optica Networks Wensheng He and Arun K. Somani Dependabe Computing and Networking Laboratory Department of Eectrica and Computer
More informationSelf-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System
Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong
More informationNeural Network Enhancement of the Los Alamos Force Deployment Estimator
Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the
More informationHour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model
Hour 3: The Network Access Layer Page 1 of 10 Hour 3: The Network Access Layer At the base of the TCP/IP protoco stack is the Network Access ayer, the coection of services and specifications that provide
More informationMinimizing Resource Cost for Camera Stream Scheduling in Video Data Center
Gao YH, Ma HD, Liu W. Minimizing resource cost for camera stream scheduing in video data center. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 555 570 May 2017. DOI 10.1007/s11390-017-1743-x Minimizing
More informationAd Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks
Ad Hoc Networks (3) 683 698 Contents ists avaiabe at SciVerse ScienceDirect Ad Hoc Networks journa homepage: www.esevier.com/ocate/adhoc Dynamic agent-based hierarchica muticast for wireess mesh networks
More informationBGP ingress-to-egress route configuration in a capacityconstrained Asia-Pacific Conference On Communications, 2005, v. 2005, p.
Tite BGP -to- route configuration in a capacityconstrained AS Author(s) Chim, TW; Yeung, KL; Lu KS Citation 2005 Asia-Pacific Conference On Communications, 2005, v. 2005, p. 386-390 Issued Date 2005 URL
More informationfile://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01
Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.
More informationInfinity Connect Web App Customization Guide
Infinity Connect Web App Customization Guide Contents Introduction 1 Hosting the customized Web App 2 Customizing the appication 3 More information 8 Introduction The Infinity Connect Web App is incuded
More informationApplication of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line
American J. of Engineering and Appied Sciences 3 (): 5-24, 200 ISSN 94-7020 200 Science Pubications Appication of Inteigence Based Genetic Agorithm for Job Sequencing Probem on Parae Mixed-Mode Assemby
More informationDelay Budget Partitioning to Maximize Network Resource Usage Efficiency
Deay Budget Partitioning to Maximize Network Resource Usage Efficiency Kartik Gopaan Tzi-cker Chiueh Yow-Jian Lin Forida State University Stony Brook University Tecordia Technoogies kartik@cs.fsu.edu chiueh@cs.sunysb.edu
More informationDesign of IP Networks with End-to. to- End Performance Guarantees
Design of IP Networks with End-to to- End Performance Guarantees Irena Atov and Richard J. Harris* ( Swinburne University of Technoogy & *Massey University) Presentation Outine Introduction Mutiservice
More informationLanguage Identification for Texts Written in Transliteration
Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy
More informationMCSE Training Guide: Windows Architecture and Memory
MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the
More informationExtended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem
Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) botton@poms.uc.ac.be Bernard
More informationLow Traffic Overlay Networks with Large Routing Tables
Low Traffic Overay Networks with Large Routing Tabes Chunqiang Tang, Meissa J. Buco, Rong N. Chang, Sandhya Dwarkadas, Laura Z. Luan, Edward So, and Christopher Ward ABSTRACT The routing tabes of Distributed
More informationCLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING
CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:
More informationCSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling
CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Scheduing Announcement Homework 2 due on October 25th Project 1 due on October 26th 2 CSE 120 Scheduing and Deadock Scheduing Overview In discussing
More informationIBM Research Report. On the Tradeoff among Capacity, Routing Hops, and Being Peer-to-Peer in the Design of Structured Overlay Networks
RC355 (W5-4) February 4, 5 Computer Science IBM Research Report On the Tradeoff among Capacity, Routing Hops, and Being Peer-to-Peer in the Design of Structured Overay Networks Chunqiang Tang, Meissa J.
More informationAs Michi Henning and Steve Vinoski showed 1, calling a remote
Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware
More informationAuthorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal
Abstract Authorization of a QoS Path based on Generic Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taa Advanced Internet Research Group, Department of Computer Science, University of Amsterdam.
More informationFormulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations
Formuation of Loss minimization Probem Using Genetic Agorithm and Line-Fow-based Equations Sharanya Jaganathan, Student Member, IEEE, Arun Sekar, Senior Member, IEEE, and Wenzhong Gao, Senior member, IEEE
More informationLecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.
Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence
More informationIntro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?
Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of
More informationQoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization
QoS-Aware Data Transmission and Wireess Energy Transfer: Performance Modeing and Optimization Dusit Niyato, Ping Wang, Yeow Wai Leong, and Tan Hwee Pink Schoo of Computer Engineering, Nanyang Technoogica
More informationNo connection establishment Do not perform Flow control Error control Retransmission Suitable for small request/response scenario E.g.
UDP & TCP 2018/3/26 UDP Header Characteristics of UDP No connection estabishment Do not perform Fow contro Error contro Retransmission Suitabe for sma request/response scenario E.g., DNS Remote Procedure
More informationFuzzy Controller for a Dynamic Window in Elliptic Curve Cryptography Wireless Networks for Scalar Multiplication
6th Asia-Pacific Conference on Communications Fuzzy Controer for a Dynamic Window in Eiptic Curve Cryptography Wireess Networks for Scaar Mutipication Xu Huang Facuty of Information Sciences and Engineering
More informationCylanceOPTICS. Frequently Asked Questions
CyanceOPTICS Frequenty Asked Questions Question What is CyanceOPTICS? CyanceOPTICS is an AI driven endpoint detection and response component providing consistent visibiity, root cause anaysis, scaabe threat
More informationDistance Weighted Discrimination and Second Order Cone Programming
Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and
More informationNOWDAYS, our ways of living are under gradual but
Transmission Management of Deay-Sensitive Medica Packets in Beyond Wireess Body Area Networks: A Queueing Game Approach Changyan Yi, Student Member, IEEE, and Jun Cai, Senior Member, IEEE Abstract In this
More informationRDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002*
RDF Objects 1 Aex Barne Information Infrastructure Laboratory HP Laboratories Bristo HPL-2002-315 November 27 th, 2002* E-mai: Andy_Seaborne@hp.hp.com RDF, semantic web, ontoogy, object-oriented datastructures
More informationRelocation of Hopping Sensors
28 IEEE Internationa Conference on Robotics and Automation Pasadena, CA, USA, May 9-23, 28 Reocation of Hopping Sensors Zhiwei Cen Googe Inc. 6 Amphitheatre Pky Mountain View, CA 9443, USA Matt W. Mutka
More informationSensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space
Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study
More informationService Scheduling for General Packet Radio Service Classes
Service Scheduing for Genera Packet Radio Service Casses Qixiang Pang, Amir Bigoo, Victor C. M. Leung, Chris Schoefied Department of Eectrica and Computer Engineering, University of British Coumbia, Vancouver,
More informationModelling and Performance Evaluation of Router Transparent Web cache Mode
Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7,1316-1320 Modeing and Performance Evauation of Transparent cache Mode Emad Hassan A-Hemiary Network Engineering Department, Coege of Information Engineering,
More informationAlpha labelings of straight simple polyominal caterpillars
Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.
More informationProviding Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks
The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department
More informationDETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS
DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,
More informationOn-Chip CNN Accelerator for Image Super-Resolution
On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement
More informationCommunity-Aware Opportunistic Routing in Mobile Social Networks
IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract
More informationCross-layer Design for Efficient Resource Utilization in WiMedia UWB-based WPANs
Cross-ayer Design for Efficient Resource Utiization in WiMedia UWB-based WPANs RAED AL-ZUBI and MARWAN KRUNZ Department of Eectrica and Computer Engineering. University of Arizona. Utra-wideband (UWB)
More informationUnixWare 7 System Administration UnixWare 7 System Configuration
UnixWare 7 System Administration - CH 3 - UnixWare 7 System Configuration Page 1 of 8 [Figures are not incuded in this sampe chapter] UnixWare 7 System Administration - 3 - UnixWare 7 System Configuration
More informationAN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART
13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of
More informationUtility-based Camera Assignment in a Video Network: A Game Theoretic Framework
This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Y.LI AND B.BHANU CAMERA ASSIGNMENT: A GAME-THEORETIC
More informationOptimized Base-Station Cache Allocation for Cloud Radio Access Network with Multicast Backhaul
Optimized Base-Station Cache Aocation for Coud Radio Access Network with Muticast Backhau Binbin Dai, Student Member, IEEE, Ya-Feng Liu, Member, IEEE, and Wei Yu, Feow, IEEE arxiv:804.0730v [cs.it] 28
More informationReal-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing
Rea-Time Image Generation with Simutaneous Video Memory Read/rite Access and Fast Physica Addressing Mountassar Maamoun 1, Bouaem Laichi 2, Abdehaim Benbekacem 3, Daoud Berkani 4 1 Department of Eectronic,
More informationFastest-Path Computation
Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods
More informationA Fast Block Matching Algorithm Based on the Winner-Update Strategy
In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping
More informationACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega
ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES Eya En Gad, Akshay Gadde, A. Saman Avestimehr and Antonio Ortega Department of Eectrica Engineering University of Southern
More informationLecture Notes for Chapter 4 Part III. Introduction to Data Mining
Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,
More informationAn Exponential Time 2-Approximation Algorithm for Bandwidth
An Exponentia Time 2-Approximation Agorithm for Bandwidth Martin Fürer 1, Serge Gaspers 2, Shiva Prasad Kasiviswanathan 3 1 Computer Science and Engineering, Pennsyvania State University, furer@cse.psu.edu
More informationA Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm
A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm
More informationModeling the Time Varying Behavior of Mobile Ad-Hoc Networks
Modeing the Time Varying Behavior of Mobie Ad-Hoc Networks David Tipper University of Pittsburgh 5 N. Beefied Avenue Pittsburgh, PA UA 560 (4) 64-94 tipper@tee.pitt.edu Yi Qian University of Puerto Rico
More informationBGP-Based SPF IETF 96, Berlin. Keyur Patel, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopal, Cisco
BGP-Based SPF IETF 96, Berin Keyur Pate, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopa, Cisco 1 Data Center Routing Routing Probem Space Routing scaing for Massivey Scaabe
More informationAn Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing
An Adaptive Two-Copy Deayed SR-ARQ for Sateite Channes with Shadowing Jing Zhu, Sumit Roy zhuj@ee.washington.edu Department of Eectrica Engineering, University of Washington Abstract- The paper focuses
More informationECEn 528 Prof. Archibald Lab: Dynamic Scheduling Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018
ECEn 528 Prof. Archibad Lab: Dynamic Scheduing Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018 Overview This ab's purpose is to expore issues invoved in the design of out-of-order issue processors.
More informationCLOUD computing has become commercially popular,
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT VOL:11 NO:1 YEAR 2014 Consistency as a Service: Auditing Coud Consistency Qin Liu, Guojun Wang, IEEE, Member, and Jie Wu, IEEE Feow Abstract Coud storage
More informationAlternative Decompositions for Distributed Maximization of Network Utility: Framework and Applications
Aternative Decompositions for Distributed Maximization of Network Utiity: Framework and Appications Danie P. Paomar and Mung Chiang Eectrica Engineering Department, Princeton University, NJ 08544, USA
More informationAutomatic Grouping for Social Networks CS229 Project Report
Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct
More informationInterference Spins Popovski, Petar; Simeone, Osvaldo; Nielsen, Jimmy Jessen; Stefanovic, Cedomir
Aaborg Universitet Interference Spins Popovski, Petar; Simeone, Osvado; Niesen, Jimmy Jessen; Stefanovic, Cedomir Pubished in: I E E E Communications Letters DOI (ink to pubication from Pubisher): 10.1109/LCOMM.2014.2387166
More informationAvaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 5.2.1
Avaya Extension to Ceuar User Guide Avaya Aura TM Communication Manager Reease 5.2.1 November 2009 2009 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information
More informationBlackboard Mechanism Based Ant Colony Theory for Dynamic Deployment of Mobile Sensor Networks
Journa of Bionic Engineering 5 (2008) 197 203 Bacboard Mechanism Based Ant Coony Theory for Dynamic Depoyment of Mobie Sensor Networs Guang-ping Qi, Ping Song, Ke-jie Li Schoo of Aerospace Science and
More informationSolving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming
The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction
More informationA Novel Congestion Control Scheme for Elastic Flows in Network-on-Chip Based on Sum-Rate Optimization
A Nove Congestion Contro Scheme for Eastic Fows in Network-on-Chip Based on Sum-Rate Optimization Mohammad S. Taebi 1, Fahimeh Jafari 1,3, Ahmad Khonsari 2,1, and Mohammad H. Yaghmae 3 1 IPM, Schoo of
More informationUsing data flow analysis for the reliability assessment of safety-critical software systems
Recent Researces in Circuits, Systems, Communications and Computers Using data fow anaysis for te reiabiity assessment of safety-critica software systems BÖRCSÖK J., SCHAEFER S. Department of Computer
More informationCSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Lecture 4: Threads
CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Lecture 4: Threads Announcement Project 0 Due Project 1 out Homework 1 due on Thursday Submit it to Gradescope onine 2 Processes Reca that
More informationpower-saving mode for mobile computing in Wi-Fi hotspots: Limitations, enhancements and open issues
DOI 10.1007/s11276-006-0010-9 802.11 power-saving mode for mobie computing in Wi-Fi hotspots: Limitations, enhancements and open issues G. Anastasi M. Conti E. Gregori A. Passarea C Science + Business
More informationComputer Networks. College of Computing. Copyleft 2003~2018
Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Attention The materias beow are
More informationLoad Balance vs Energy Efficiency in Traffic Engineering: A Game Theoretical Perspective
Load Baance vs Energy Efficiency in Traffic Engineering: A Game Theoretica Perspective Yangming Zhao, Sheng Wang, Shizhong Xu and Xiong Wang Schoo of Communication and Information Engineering University
More informationHiding secrete data in compressed images using histogram analysis
University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University
More informationBinarized support vector machines
Universidad Caros III de Madrid Repositorio instituciona e-archivo Departamento de Estadística http://e-archivo.uc3m.es DES - Working Papers. Statistics and Econometrics. WS 2007-11 Binarized support vector
More informationFurther Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code
Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222
More informationDaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet
DaVinci: Dynamicay Adaptive Virtua Networks for a Customized Internet Jiayue He, Rui Zhang-Shen, Ying Li, Cheng-Yen Lee, Jennifer Rexford, Mung Chiang Princeton University {jhe, rz, yingi, chengee, jrex,
More informationA Model for Enhancing Connection Rerouting Using Active Networks
A Mode for Enhancing Connection Rerouting Using Active Networks Kwan Wu Chin, Mohan Kumar Department of Computer Science, Curtin University of Technoogy, GPO Box U 1987, Perth 6845, Western Austraia (chinkw,kumar)@cs.curtin.edu.au
More informationTechTest2017. Solutions Key. Final Edit Copy. Merit Scholarship Examination in the Sciences and Mathematics given on 1 April 2017, and.
TechTest07 Merit Schoarship Examination in the Sciences and Mathematics given on Apri 07, and sponsored by The Sierra Economics and Science Foundation Soutions Key V9feb7 TechTest07 Soutions Key / 9 07
More informationEE 122 Final Exam - Solution Date: December 14, 2002
Name: SID: ee ogin: Day/Time of section you atten: EE Fina Exam - Soution Date: December 4, 00 Probem Points /0 /0 3 /0 4 /0 5 /0 6 /0 7 /0 8 /0 9 /0 0 /0 Tota /00 . Question (0 pt) (a) (5 pt) Expain briefy
More informationOn Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture
On inding the est Partia Muticast Protection Tree under ua-homing rchitecture Mei Yang, Jianping Wang, Xiangtong Qi, Yingtao Jiang epartment of ectrica and omputer ngineering, University of Nevada Las
More informationRegister Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x
Register Aocation Consider the foowing assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Assume that two registers are avaiabe. Starting from the eft a compier woud generate
More informationConflict graph-based Markovian model to estimate throughput in unsaturated IEEE networks
Confict graph-based Markovian mode to estimate throughput in unsaturated IEEE 802 networks Marija STOJANOVA Thomas BEGIN Anthony BUSSON marijastojanova@ens-yonfr thomasbegin@ens-yonfr anthonybusson@ens-yonfr
More informationAn Introduction to Design Patterns
An Introduction to Design Patterns 1 Definitions A pattern is a recurring soution to a standard probem, in a context. Christopher Aexander, a professor of architecture Why woud what a prof of architecture
More information