Enhancing MPLS QoS routing algorithms by using the Network Protection Degree paradigm. *
|
|
- Marion Washington
- 5 years ago
- Views:
Transcription
1 Enhancng MPLS QoS routng algorthms by usng the Networ Protecton Degree paradgm. * Euseb Calle, Jose L Marzo, Anna Urra, Pere Vla Broadband Comm. and Dstrbuted Systems Insttut d Informàtca aplcacons (IA) Unverstat de Grona, 77 Grona, SPAIN e-mal: {euseb, marzo, aurra, perev}@ea.udg.es Abstract- IP based networs stll do not have the requred degree of relablty requred by new multmeda servces, achevng such relablty wll be crucal n the success or falure of the new Internet generaton. Most of exstng schemes for QoS routng do not tae nto consderaton parameters concernng the qualty of the protecton, such as pacet loss or restoraton tme. In ths paper, we defne a new paradgm to develop new protecton strateges for buldng relable MPLS networs, based on what we have called the Networ Protecton Degree (NPD). Ths NPD conssts of an a pror evaluaton, the Falure Sensblty Degree (FSD), whch provdes the falure probablty and an a posteror evaluaton, the Falure Impact Degree (FID), to determne the mpact on the networ n case of falure. Havng mathematcal formulated these components, we pont out the most relevant components. Expermental results demonstrate the benefts of the utlzaton of the NPD, when used to enhance some current QoS routng algorthms to offer a certan degree of protecton. I. INTRODUCTION New networ technology enables ncreasngly hgher volumes of nformaton to be carred. Varous dfferent types of msson-crtcal, hgher-prorty traffc are now transported over these networs. In ths scenaro, when offerng better qualty of servce, the consequences of a fault n a ln or node become more pronounced. A new concept of qualty of protecton s requred. Networ relablty can be provded through dfferent fault management mechansms appled at dfferent networ levels and tme scales. Although most concepts and methods dscussed n ths paper are applcable to dfferent networ technologes, whch mplement the logcal path paradgm, our wor focuses manly on MultProtocol Label Swtchng (MPLS) networs. MPLS fault restoraton mechansms usually establsh bacup Label Swtch Paths (LSPs). Wth these bacups, traffc can always be re-routed when a falure occurs. MPLS also provdes sutable fault detecton and fault recovery actuaton, whch allow effectve utlzaton of bacup paths. ([], [2] and [7]). A crucal aspect n the development of a fault management system s the creaton and routng of bacup paths. Several schemes have been proposed ([3], [4], and [5]) for routng new LSPs whch guarantee certan QoS parameters (such as resource utlzaton or mnmzng the request rejecton rato). However, most of these schemes do not tae nto consderaton other aspects, such as networ falure probablty, or parameters concernng the qualty of the protecton, such as pacet loss or restoraton tme. We wll dscuss networ protecton, nvolvng the creaton of fast and sutable recovery mechansms, n the context of these parameters and whch of them have most nfluence. Wth ths am we propose new concepts for calculatng a Networ Protecton Degree (NPD), such as the Falure Sensblty Degree (FSD) or the Falure Impact Degree (FID). A mathematcal formalzaton s developed for each concept and several experments are presented to support these formulatons. Ths paper s organzed as follows: n Secton II, the new Networ Protecton Degree concept s presented and formalzed. In Secton III and IV, the formulatons, supported by experments are dscussed. Fnal Secton summarzes and concludes the paper. II. NETWORK PROTECTION DEGREE In ths secton, we analyze the man components whch defne the Networ Protecton Degree (NPD). There are two man components of NPD: the Falure Senstvty Degree (FSD) and the Falure Impact Degree (FID). The FSD concerns the statstcal analyss of networ falure (ths s an a pror analyss). On the other hand, the FID evaluates the mpact on the networ when the falure occurs (ths s an a posteror analyss). In ths wor, FID s expressed n terms of well-nown parameters such as pacet loss and recovery tme. * Ths wor has been partally supported by Specal Acton (Spansh Mnstry Scence and Technology)TIC22-5-E. GLOBECOM /3/$7. 23 IEEE Authorzed lcensed use lmted to: UNIVERSITAT DE GIRONA. Downloaded on September 7, 29 at 4:39 from IEEE Xplore. Restrctons apply.
2 In a real networ, several technologes coexst: dfferent wrng (or dfferent physcal layers) and dfferent types of nodes (dfferent provders, old and new equpment, etc.) all worng together. Ths means that the actual probablty of falure of any one of these elements s sgnfcantly dfferent from any of the others. Although t s mpossble n practce to determne whch partcular segment n a networ wll fal and when, the probablty of falure can be calculated. A networ operator can apply predcton technques based on fault statstcs. Eventually, a probablty of falure can be explctly assgned, manually, n order to decde upon a specfc degree of protecton. We wll refer to ths probablty as Ln Falure Probablty (LFP). In case of a new segment beng set up, where there s no nowledge concernng falures, a hgh value LFP would ntally be assgned. After a certan amount of normal functonng (no faults) a set of statstcal nformaton s obtaned and the ntal LFP can be updated (hopefully decreased) to a more realstc value. The mechansms and methods for computng all the falure probabltes (LFPs) n a networ are beyond the scope of ths wor. In the wor we present here, we assume that nowledge of these probabltes s already nown or readly avalable. Moreover, although ther values may vary n tme, ths nformaton s assumed to be stable. A way to evaluate the FSD would be a useful tool for networ provders, helpng them to set the desred degree of protecton for ther customers and allowng them to guarantee QoS n terms of relablty and avalablty (dependng on the SLA - Servce Level Agreement). In secton 2. we dscuss usng ths nformaton for calculatng the sensblty to falure of an LSP. On the other hand, the mpact to the networ n the event of ths path falng can be evaluated n terms of recovery delay and pacet loss. The term Recovery Delay (T REC ) s defned as the perod of tme between the fault and the traffc restoraton to the correspondng bacup path. Pacet Loss (P LS ) s defned as the total lost pacets durng the T REC. Therefore, the Falure Impact Degree (FID) s calculated based on T REC and P LS. In the followng sectons, a method for calculatng FID and a study of the crucal factors when usng bacup protecton mechansms are presented. Ths provdes us wth a good nowledge about the segments of the networ whch are the most crtcal n case of falure. 2. Falure Sensblty Degree The Falure Sensblty Degree (FSD) expresses the total probablty of falure of the networ. LSPs can cross through dfferent lns each wth ts own Ln Falure Probablty (LFP). Therefore, we assume n ths wor that all LFP s are nown (by calculaton or heurstcally) and they are also ndependent of each other. These values are normally very small; we assume that LFP<<. A LSP fals f any segment (.e., an ndvdual ln or a combnaton of nodes and lns) along the path fals. However, t s easer to evaluate the nverse probablty,.e., the probablty that all the lns nvolved wor fne. Let consder the nverse probablty of ln falure as LFP -., (.e. the probablty that the ln wors fne). Therefore, the overall (LSP) probablty of no-falure (the nverse of a LSP falure probablty LSP_FP) s: LSP _ FP LFP ( LFP Number of lns of the LSP () By smplfyng all products and powers of LFP (as they are very small values by hypothess) the product of ths term s transformed nto the followng: LSP _ FP Number of lns of the LSP (2) But agan, the LSP Falure Probablty can be calculated as the nverse of LSP_FP -, therefore: LSP_ FP LSP_ FP Number of lns of the LSP (3) As expected, the total probablty of falure of a LSP can be approxmated by the sum of ln falure probabltes. It s also useful to assgn a bnary value to each segment to now whenever a ln should be protected. Ths s defned as the Ln Protecton Requrements (LPR). Ths can be easly obtaned by assgn LPR to those lns wth LFP and LPR wth LFP >. Ths allows us an easy calculaton of the total LSP Number of Lns to Protect (LSP_NLP). Hence, LSP_NLP s calculated as: Number of lns of the LSP (4) In consequence, FSD can be defned as an array of the Falure Probablty of all current LSPs (LSP_FP) n the networ (formula (5)), or as an array Number of Lns to be Protected per LSP (LSP_NLP) (formula (6)). FSD_FP (LSP_FP, LSP_FP 2, LSP_FP N ) (5) FSD_NLP (LSP_NLP, LSP_NLP 2, LSP_NLP N ) (6) Where: N Number of LSPs n the networ ( LFP ) LFP LSP _ NLP ( LPR LFP) LFP ) GLOBECOM /3/$7. 23 IEEE Authorzed lcensed use lmted to: UNIVERSITAT DE GIRONA. Downloaded on September 7, 29 at 4:39 from IEEE Xplore. Restrctons apply.
3 These arrays allow defnng dfferent strateges to evaluate the FSD. Wth (5) the number of LSPs out of an specfc LSP_FP can be computed. Wth (6) we can determne, not only a falure probablty expressed on the average of the number of lns to be protected per LSP, but the protecton requrements (number of lns wth bacup requrements). In secton IV several experments to evaluate ths second opton are carred out. 2.2 Falure Impact Degree (FID) In ths Secton, we show how we calculate the Falure Impact Degree (FID). As mentoned above, ths metrc concerns delays and pacet loss n case of falure. Let us start wth delays. It s well nown that any protecton mechansm based on the establshment of bacup paths follows a set of steps for recoverng faults. Each step needs a certan amount of tme,.e., the Recovery Delay (Tme of Recovery T REC ), to carry on wth the correspondng functons. Ths tme conssts of the followng: Tme for detectng the fault T DET (for nstance a sgnal from lower levels). Notfcaton tme T NOT to nform (.e, send a message to) the node responsble for swtchover. Tme for bacup setup, routng and sgnalng T BE. Tme for traffc swtchover T SW, from actve path to bacup path. Therefore, the T REC can be evaluated by smple addton, as the followng expresson shows: T REC T DET + T NOT + T BE + T SW (7) The Pacet Loss (P LS ) s proportonal to ths T REC and to the transmsson Rate R TR [8]. The pacet loss n the faulty ln (P FL ), that s to say, the pacets lost when the ln that was carryng them faled, should also be added to the equaton. The resultng expresson s: P LS R TR * T REC + P FL (8) Therefore, t can be sad that the Falure Impact Degree s a functon, g, whch depends on the pacet loss and recovery tme: FID g (T REC, P LS ) (9) Fg shows the most common used MPLS protecton methods (global and local bacups). The advantages and dsadvantages of these, and other, mechansms are wdely dscussed n the lterature [], [2],and [3]. In our prevous wor [6], and [7], Pacet Loss and Recovery Delay are consdered as well as pacet reorderng and resource consumpton. Bascally, Local Bacups offers a soluton respect to Pacet Loss and Recovery Tme problems of the Global Bacup. Nevertheless, when the number of lns to protect n the path s elevated Local Bacups are not sutable, due to elevated resource consumpton. In order to formulate FID for each protecton method we have assumed the followng smplfcatons: Ingress node Node Global Bacup path Worng path D (,a) Node a Local Bacup Node b Fg.. Global and Local LSP Bacup Paths. Egress Node Node e ) The fault detecton tme, T DET, depends on several factors (such as the level of the networ where the fault s detected, or the performance of the swtch components). However, these aspects affect all protecton mechansms equally. Moreover, the swtchover tme, T SW, s neglgble wth respect to the notfcaton tme, T NOT, and to the bacup establshment tme, T BE. For the purpose of smplfcaton, they have not been consdered n FID formulaton. 2) Most of currently proposals consder nevtable the pacet loss at the faled ln P FL. However, there are some recent approaches that propose the utlzatons of bufferng and taggng technques to avod such loss [9]. Whether or not these technques are used, n both cases pacet loss s stll neglgble n relaton to the total amount of pacet loss, hence they are not consdered n ths wor 3) The most sgnfcant elements, n terms of delay, of Pacet Loss and the Recovery Delay (dervng from (4) and (5)) are the notfcaton tme, T NOT, and the bacup establshment tme, T BE. However, further analyss of T BE mples a better analyss of the dverse routng algorthms because T BE s proportonal to the tme needed to get a new route. The frst element to loo at s T NOT.. T NOT s proportonal to the propagaton tme for the message, T PR, and the dstance from the node where the fault s detected (a-node) to the responsble of the swtchover (-node) (see fg. ). Although ths dstance, D(,a), should be expressed n a real metrc (meters, Km, etc.), D(,a) s n fact expressed n terms of the number of hops for the purposes of smplfcaton. Therefore, the calculaton for fault notfcaton s: T NOT D(,a) * T PR () Then, the FID s obtaned usng (7),(8) and (9): FID f ( D(,a) * T PR, D(,a) * T PR * R TR ) (2) As expected, pacet loss s proportonal to the restoraton tme whch depends on dstance (D(,a) as defned) and on the propagaton tme T PR.. In concluson, the greater the dstance, (or, the greater the propagaton tme), the worse the mpact of a falure s. Reducng the propagaton tme of the fault notfcaton would reduce the mpact. Unfortunately ths depends on the physcal topology whch s, for a gven networ, a statc GLOBECOM /3/$7. 23 IEEE Authorzed lcensed use lmted to: UNIVERSITAT DE GIRONA. Downloaded on September 7, 29 at 4:39 from IEEE Xplore. Restrctons apply.
4 parameter, and therefore dffcult to modfy. Thus, any effort to mnmze the mpact of falure should be amed at tryng to reduce the dstance from the node where the fault occurs and the node, whch carres out the swtchover. III. NETWORK PROTECTION DEGREE APPLICATION. In the prevous secton, we showed how we calculated the two components to evaluate the Networ Protecton Degree, NPD: the Falure Sensblty Degree, FSD (an a pror component) and the Falure Impact Degree, FID (an a posteror component). The protecton Degree can be expressed as a functon, f, of these two components: NPD f (FSD, FID) (3) We beleve NPD wll allow developers to create new or mprove current QoS routng strateges. In [4] some QoS routng algorthms are defned and analyzed, such as Wdest Shortest Path (WSP) or Shortest Wdest Path (SWP). Both are based on resource optmzaton and load balancng. Recently, more complex approaches have appeared. [5], and [6], focused on resource optmzaton and the mnmzaton of rejected requests. However, most of these algorthms do not consder networ protecton, at least not as a prorty. By usng the calculaton of NPD, some of these methods can easly be enhanced. For nstance, n order to enhance WSP we propose three new routng algorthms to add certan protecton parameters n the route selecton. Twce of them taes n consderaton FSD formulaton explaned n secton 2., n order to acheve LSPs wth less falure probablty and protecton requrements. Wth the am of consderng the FID another routng algorthm ntegratng falure probabltes and dstances (D(,a)) has been developed. In all these algorthms a pre-computaton of a -WSP algorthm s developed. Over the set of possble LSPs dfferent protecton strateges are appled: ) PWSP_FP, Protected WSP consderng the Falure Probabltes; the LSP wth the lowest falure probablty LSP_FP s selected. S S D S2 S D D4 Fg 2. Networ Topology 2 D ) PWSP_NLP, Protected WSP consderng the Number of Lns to Protect;. the LSP wth the lowest Number of LSPs (LSP_NLP) s selected. 3) PWSP_FPD, Protected WSP consderng the Falure Probabltes and Dstances (D(,a). In ths case, the objectve s to reduce not only the falure probablty, but the falure mpact (mnmzng the dstance D(,a), as explaned n secton 2.2). Each ln of a LSP s weghted by the product of the dstance D(,a) by the LFP. Wth the total sum of these values, the LSP wth the lowest value s selected. For all these algorthms, f there are several such paths wth the same characterstcs, one of them s randomly selected. IV. EXPERIMENTAL CALCULATION OF NPD. In ths secton, the NPD s evaluated n two networ scenaros. For these experments we used the same topology, (see Fg. 2), as n several other studes such as [5], or [6]. The capacty of the lns s 2 and 48 (bolded lnes) unts. But these capactes are scaled by, n order to experment wth thousand of LSPs. Each ln s bdrectonal (.e., t acts le two undrectonal lns of half of that capacty). There are 5 nodes and 28 lns. There are four Ingress-Egress node pars (see fg.2). Ln Falure Probabltes (LFPs) are assgned accordng to fgure 2. There are lns to be protected, whch represents a 4.7 percent of the networ. In all smulaton experments descrbed n ths paper, LSP requests arrved randomly, at the same average rate for all node pars. We assume that all lns are long lve (.e., statc case ). For each experment, 2 trals wth 3 LSP demands were conducted. The bandwdth allocaton for the LSPs s unformly dstrbuted between, 2 and 3 unts. Results have been obtaned by mplementng the QoS routng algorthm proposed n prevous secton. Case a: Number of lns to be protected: fgure 3.a) shows an analyss of the average of the number of lns to be protected (NLP) per LSP. Charts show that all routng schemes wth protecton (PWSP algorthms) have smlar NLP results. In the case of applyng a WSP, the NLP per LSP sharply ncreases (about 35 % more). Ths leads us to state that: a) WSP routng ncreases the probablty of falure (due to a major number of lns wth a certan falure probablty), and b) t ncreases the resource consumpton f these lns are protected wth bacups. Case b: Falure mpact degree: In ths case we have analyzed the reducton n the FID, based on dstance (D(,a)). Fg 3.b) shows the dstrbuton of LSPs wth lns to be protected at dfferent dstances. Results, as expected, GLOBECOM /3/$7. 23 IEEE Authorzed lcensed use lmted to: UNIVERSITAT DE GIRONA. Downloaded on September 7, 29 at 4:39 from IEEE Xplore. Restrctons apply.
5 NLP per LSP Number of LSP (N) a) Tral Number b) Dstance 8,8 Number of LSP (N) c) Tral Number Request Rejecton Rato,6,4,2,,8, d) Tral Number WSP PWSP_NLP PWSP_FP PWSP_FPD Fg. 3. a) Number of lns to be protected. b) Falure mpact Degree Analyss. c) Falure mpact Degree Analyss. d) Request Rejecton Raton shows that PWSP_FPD has the best performance, allocatng the major number of lns to be protected at dstance. Agan, WSP shows the worst behavor dstrbutng a bg number of lns to be protected at dstances D(,a)>. Case c: Optmzng the Networ Falure Degree: Fg. 3 shows the number of LSPs out of a pre-set NPD threshold. The NPD (formula [3]) s evaluated n terms of notfcaton dstances (formula [2]) gvng the FID value and falure probabltes (formula [5]) to evaluate the FSD. We have computed those LSPs wth dstances D(,a)> (large FID) and LSP_FP>2-4 (large FSD). In ths case the best opton, once agan, s the PWSP_FPD. However PWSP_NLP and PWSP_FP shows a smlar protecton degree better than the WSP. Case d: Request Rejecton Rato: Cases A, B and C have demonstrated that PWSP mproves the NPD, expressed by the FSD and the FID. However t s mportant to remar that these algorthms do not deterorate the number of requests accepted. Fgure 3.d) shows that all these algorthms eep a Request Rejecton Degree over -5%. Although, n ths case, the best performance s offered by the WSP. CONCLUSIONS In ths paper, we have proposed a new mechansm for evaluatng the Networ Protecton Degree (NPD), whch has two components: the Falure Sensblty Degree (FSD) and the Falure Impact Degree (FID). Experments have demonstrated the benefts of NPD applcaton when used to mprove the well-nown routng algorthm WSP, whch has been enhanced becomng a Protected WSP, PWSP n our study. Ths leads to a reducton n the FSD and FID, n terms of a reducton n the number of protected lns (NPL) and ts probablty of falure. Besdes reducng the NPL, the resource consumpton when usng local bacups s reduced. PWSP algorthms also reduce the mpact n case of falure by decreasng the number of LSPs wth crtcal (large) dstances D(, a) and falure probabltes. In short, the presented formalzaton of the NPD paradgm should allow networ and servce provders to apply better QoS routng strateges that wll mprove the relablty of ther networs. REFERENCES [] Changcheng Huang, Vshal Sharma, Ken Owens, Srnvas Maam, "Buldng relable MPLS Networs usng a path protecton mechansm", IEEE Communcatons Magazne, Mar 22 [2] D. Hasn, R. Krshnan "A Method for Settng an Alternatve Label Swtched Paths to Handle Fast Reroute". (Wor n progress) Internet Draft. Nov 2. [3] R. Guern, D. Wllams, A. Orda. QoS Routng Mechansms and OSPF Extensons. Proceedngs of IEEE Globecom 997. [4] M. Kodalam, T.Lashman. "Mnmum Interference Routng wth Applcatons to MPLS Traffc Engneerng". IEEE Infocom 2. [5] S. Subhash, M. Waldvogel, P. Warhede. "Profle-Based Routng: A New Framewor for MPLS Traffc Engneerng". QofIS'. [6] J. L. Marzo, E.Calle, C. Scoglo, T. Anjal "Addng QoS Protecton n Order to Enhance MPLS QoS Routng". To appear n ICC 23. [7] J. L Marzo, E. Calle, C. Scoglo, T. Anjal "QoS On-Lne Routng and MPLS Multlevel Protecton: a Survey" to appear n IEEE Communcatons Magazne, October 23. [8] L. Hundessa, J. Domngo-Pascual Relable and Fast Reroutng Mechansms for a Protected Label Swtched Path Proceedngs of Globecom 22. GLOBECOM /3/$7. 23 IEEE Authorzed lcensed use lmted to: UNIVERSITAT DE GIRONA. Downloaded on September 7, 29 at 4:39 from IEEE Xplore. Restrctons apply.
Routing in Degree-constrained FSO Mesh Networks
Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationX- Chart Using ANOM Approach
ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are
More informationA Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics
A Hybrd Genetc Algorthm for Routng Optmzaton n IP Networks Utlzng Bandwdth and Delay Metrcs Anton Redl Insttute of Communcaton Networks, Munch Unversty of Technology, Arcsstr. 21, 80290 Munch, Germany
More informationResearch Article. ISSN (Print) s k and. d k rate of k -th flow, source node and
Scholars Journal of Engneerng and Technology (SJET) Sch. J. Eng. Tech., 2015; 3(4A):343-350 Scholars Academc and Scentfc Publsher (An Internatonal Publsher for Academc and Scentfc Resources) www.saspublsher.com
More informationProper Choice of Data Used for the Estimation of Datum Transformation Parameters
Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and
More informationAn Entropy-Based Approach to Integrated Information Needs Assessment
Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology
More informationIntegrated Congestion-Control Mechanism in Optical Burst Switching Networks
Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subect matter experts for publcaton n the IEEE GLOBECOM 2005 proceedngs Integrated Congeston-Control Mechansm n Optcal Burst
More informationAvoiding congestion through dynamic load control
Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach
More informationUser Authentication Based On Behavioral Mouse Dynamics Biometrics
User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationConvolutional interleaver for unequal error protection of turbo codes
Convolutonal nterleaver for unequal error protecton of turbo codes Sna Vaf, Tadeusz Wysock, Ian Burnett Unversty of Wollongong, SW 2522, Australa E-mal:{sv39,wysock,an_burnett}@uow.edu.au Abstract: Ths
More informationOverview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION
Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup
More informationEfficient Load-Balanced IP Routing Scheme Based on Shortest Paths in Hose Model. Eiji Oki May 28, 2009 The University of Electro-Communications
Effcent Loa-Balance IP Routng Scheme Base on Shortest Paths n Hose Moel E Ok May 28, 2009 The Unversty of Electro-Communcatons Ok Lab. Semnar, May 28, 2009 1 Outlne Backgroun on IP routng IP routng strategy
More informationA HEURISTIC METHOD FOR RELIABILITY REDUNDANCY OPTIMIZATION OF FLOW NETWORKS
Kumar Pardeep and Chaturved D.K., Pahua G.L. - A HEURISTIC METHOD FOR RELIABILITY REDUNDANCY OPTIMIZATION OF FLOW NETWORKS A HEURISTIC METHOD FOR RELIABILITY REDUNDANCY OPTIMIZATION OF FLOW NETWORKS Kumar
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationAnalysis of Collaborative Distributed Admission Control in x Networks
1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,
More informationAvailability and QoS Performance Evaluation of Public IP Networks Tivadar Jakab 1, Gábor Horváth 1, Rozália Konkoly 2, Éva Csákány 2 1
Avalablty and QoS Performance Evaluaton of Publc IP Networks Tvadar Jakab, Gábor Horváth, Rozála Konkoly, Éva Csákány Department of Telecommuncatons, Budapest Unversty of Technology and Economcs Magyar
More informationS1 Note. Basis functions.
S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type
More informationPricing Network Resources for Adaptive Applications in a Differentiated Services Network
IEEE INFOCOM Prcng Network Resources for Adaptve Applcatons n a Dfferentated Servces Network Xn Wang and Hennng Schulzrnne Columba Unversty Emal: {xnwang, schulzrnne}@cs.columba.edu Abstract The Dfferentated
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationMODELING THE RELIABILITY OF INFORMATION MANAGEMENT SYSTEMS BASED ON MISSION SPECIFIC TOOLS SET SOFTWARE
Knowledge Dynamcs MODELING THE ELIABILITY OF INFOMATION MANAGEMENT SYSTEMS BASED ON MISSION SPECIFIC TOOLS SET SOFTWAE Cezar VASILESCU Assocate Professor, egonal Department of Defense esources Management
More informationA Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks
A Load-balancng and Energy-aware Clusterng Algorthm n Wreless Ad-hoc Networks Wang Jn, Shu Le, Jnsung Cho, Young-Koo Lee, Sungyoung Lee, Yonl Zhong Department of Computer Engneerng Kyung Hee Unversty,
More informationReducing Frame Rate for Object Tracking
Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg
More informationHelsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)
Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute
More informationCHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION
24 CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION The present chapter proposes an IPSO approach for multprocessor task schedulng problem wth two classfcatons, namely, statc ndependent tasks and
More informationA New Token Allocation Algorithm for TCP Traffic in Diffserv Network
A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,
More informationResearch of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm
, pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,
More informationRegional Load Balancing Circuitous Bandwidth Allocation Method Based on Dynamic Auction Mechanism
ATEC Web of Conferences 76, (8) IFID 8 https://do.org/./matecconf/876 Regonal Load Balancng Crcutous Bandwdth Allocaton ethod Based on Dynamc Aucton echansm Wang Chao, Zhang Dalong, Ran Xaomn atonal Dgtal
More informationSteps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices
Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between
More informationA Decentralized Lifetime Maximization Algorithm for Distributed Applications in Wireless Sensor Networks
A Decentralzed Lfetme Maxmzaton Algorthm for Dstrbuted Applcatons n Wreless Sensor Networks Vrgna Pllon, Mauro Franceschell, Lug Atzor, Alessandro Gua Dept. of Electrcal and Electronc Engneerng, Unversty
More informationDetermining the Optimal Bandwidth Based on Multi-criterion Fusion
Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn
More informationUse of Genetic Algorithms in Efficient Scheduling for Multi Service Classes
Use of Genetc Algorthms n Effcent Schedulng for Mult Servce Classes Shyamale Thlakawardana and Rahm Tafazoll Centre for Communcatons Systems Research (CCSR), Unversty of Surrey, Guldford, GU27XH, UK Abstract
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationGame Based Virtual Bandwidth Allocation for Virtual Networks in Data Centers
Avaable onlne at www.scencedrect.com Proceda Engneerng 23 (20) 780 785 Power Electroncs and Engneerng Applcaton, 20 Game Based Vrtual Bandwdth Allocaton for Vrtual Networks n Data Centers Cu-rong Wang,
More informationA Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks
A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationAn efficient iterative source routing algorithm
An effcent teratve source routng algorthm Gang Cheng Ye Tan Nrwan Ansar Advanced Networng Lab Department of Electrcal Computer Engneerng New Jersey Insttute of Technology Newar NJ 7 {gc yt Ansar}@ntedu
More informationTECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.
TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of
More informationReal-Time Guarantees. Traffic Characteristics. Flow Control
Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationComparison of Heuristics for Scheduling Independent Tasks on Heterogeneous Distributed Environments
Comparson of Heurstcs for Schedulng Independent Tasks on Heterogeneous Dstrbuted Envronments Hesam Izakan¹, Ath Abraham², Senor Member, IEEE, Václav Snášel³ ¹ Islamc Azad Unversty, Ramsar Branch, Ramsar,
More informationCS 268: Lecture 8 Router Support for Congestion Control
CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router
More informationA MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS
Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationVideo Proxy System for a Large-scale VOD System (DINA)
Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,
More informationMaintaining temporal validity of real-time data on non-continuously executing resources
Mantanng temporal valdty of real-tme data on non-contnuously executng resources Tan Ba, Hong Lu and Juan Yang Hunan Insttute of Scence and Technology, College of Computer Scence, 44, Yueyang, Chna Wuhan
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationEfficient Broadcast Disks Program Construction in Asymmetric Communication Environments
Effcent Broadcast Dsks Program Constructon n Asymmetrc Communcaton Envronments Eleftheros Takas, Stefanos Ougaroglou, Petros copoltds Department of Informatcs, Arstotle Unversty of Thessalonk Box 888,
More informationAn Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed
More informationCourse Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms
Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationy and the total sum of
Lnear regresson Testng for non-lnearty In analytcal chemstry, lnear regresson s commonly used n the constructon of calbraton functons requred for analytcal technques such as gas chromatography, atomc absorpton
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationA NEW LOCALIZED NETWORK BASED ROUTING MODEL IN COMPUTER AND COMMUNICATION NETWORKS
A NEW LOCALIZED NETWORK BASED ROUTING MODEL IN COMPUTER AND COMMUNICATION NETWORKS Abdulbaset H. Mohammad School of Computng, Informatcs and Meda, Unversty of Bradford, Bradford, Unted Kngdom a.h.t.mohammad@bradford.ac.uk
More informationA protocol for mixed-criticality management in switched Ethernet networks
A protocol for mxed-crtcalty management n swtched Ethernet networks Olver CROS, Laurent GEORGE Unversté Pars-Est, LIGM / ESIEE, France cros@ece.fr,lgeorge@eee.org Xaotng LI ECE Pars / LACSC, France xaotng.l@ece.fr
More informationPetri Net Based Software Dependability Engineering
Proc. RELECTRONIC 95, Budapest, pp. 181-186; October 1995 Petr Net Based Software Dependablty Engneerng Monka Hener Brandenburg Unversty of Technology Cottbus Computer Scence Insttute Postbox 101344 D-03013
More informationGSLM Operations Research II Fall 13/14
GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are
More information3. CR parameters and Multi-Objective Fitness Function
3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft
More informationExplicit Formulas and Efficient Algorithm for Moment Computation of Coupled RC Trees with Lumped and Distributed Elements
Explct Formulas and Effcent Algorthm for Moment Computaton of Coupled RC Trees wth Lumped and Dstrbuted Elements Qngan Yu and Ernest S.Kuh Electroncs Research Lab. Unv. of Calforna at Berkeley Berkeley
More informationIntelligent Traffic Conditioners for Assured Forwarding Based Differentiated Services Networks 1
Intellgent Traffc Condtoners for Assured Forwardng Based Dfferentated Servces Networks B. Nandy, N. Seddgh, P. Peda, J. Ethrdge Nortel Networks, Ottawa, Canada Emal:{bnandy, nseddgh, ppeda, jethrdg}@nortelnetworks.com
More informationA fair buffer allocation scheme
A far buffer allocaton scheme Juha Henanen and Kalev Klkk Telecom Fnland P.O. Box 228, SF-330 Tampere, Fnland E-mal: juha.henanen@tele.f Abstract An approprate servce for data traffc n ATM networks requres
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More informationPerformance Analysis of a Managed Bandwidth Service for ATM Networks
Performance Analyss of a Managed Bandwdth Servce for ATM Networks Chrstos Bouras Chryss Chantz Vaggels Kapoulas Alexandros Panagopoulos Ioanna Sampraku Afrodte Sevast Research Academc Computer Technology
More informationSubspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;
Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features
More informationApplication of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling
, pp.40-45 http://dx.do.org/10.14257/astl.2017.143.08 Applcaton of Improved Fsh Swarm Algorthm n Cloud Computng Resource Schedulng Yu Lu, Fangtao Lu School of Informaton Engneerng, Chongqng Vocatonal Insttute
More informationDynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication
Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the ICC 008 proceedngs. Dynamc Bandwdth Provsonng wth Farness and Revenue Consderatons
More informationFeature Reduction and Selection
Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components
More informationSmoothing Spline ANOVA for variable screening
Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory
More informationOn the Exact Analysis of Bluetooth Scheduling Algorithms
On the Exact Analyss of Bluetooth Schedulng Algorth Gl Zussman Dept. of Electrcal Engneerng Technon IIT Hafa 3000, Israel glz@tx.technon.ac.l Ur Yechal Dept. of Statstcs and Operatons Research School of
More informationScheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research
Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research
More informationOptimizing Document Scoring for Query Retrieval
Optmzng Document Scorng for Query Retreval Brent Ellwen baellwe@cs.stanford.edu Abstract The goal of ths project was to automate the process of tunng a document query engne. Specfcally, I used machne learnng
More informationDerivation of Three Queue Nodes Discrete-Time Analytical Model Based on DRED Algorithm
Seventh Internatonal Conference on Informaton Technology Dervaton of Three Queue Nodes Dscrete-Tme Analytcal Model Based on DRED Algorthm Jafar Ababneh, Hussen Abdel-Jaber, 3 Fad Thabtah, 3 Wael Had, EmranBadarneh
More informationAdaptive Energy and Location Aware Routing in Wireless Sensor Network
Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}
More informationMathematics 256 a course in differential equations for engineering students
Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the
More informationWishing you all a Total Quality New Year!
Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma
More informationAnnales UMCS Informatica AI 1 (2003) UMCS. Designing of multichannel optical communication systems topologies criteria optimization
Annales Informatca AI 1 (2003) 277-284 Annales Informatca Lubln-Polona Secto AI http://www.annales.umcs.lubln.pl/ Desgnng of multchannel optcal communcaton systems topologes crtera optmzaton Mrosław Hajder,
More informationVirtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory
Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationSupport Strong Consistency for Mobile Dynamic Contents Delivery Network
Nnth IEEE Internatonal Symposum on Multmeda 27 Support Strong Consstency for Moble Dynamc Contents Delvery Networ Zhou Su, Jro Katto and Yasuho Yasuda Graduate School of Scence and Engneerng, Waseda Unversty,
More informationSolutions for Real-Time Communication over Best-Effort Networks
Solutons for Real-Tme Communcaton over Best-Effort Networks Anca Hangan, Ramona Marfevc, Gheorghe Sebestyen Techncal Unversty of Cluj-Napoca, Computer Scence Department {Anca.Hangan, Ramona.Marfevc, Gheorghe.Sebestyen}@cs.utcluj.ro
More informationTN348: Openlab Module - Colocalization
TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages
More informationA fault tree analysis strategy using binary decision diagrams
Loughborough Unversty Insttutonal Repostory A fault tree analyss strategy usng bnary decson dagrams Ths tem was submtted to Loughborough Unversty's Insttutonal Repostory by the/an author. Addtonal Informaton:
More informationFast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems
Fast Retransmsson of Real-Tme Traffc n HIPERLAN/ Systems José A Afonso and Joaqum E Neves Department of Industral Electroncs Unversty of Mnho, Campus de Azurém 4800-058 Gumarães, Portugal {joseafonso,
More informationAPPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT
3. - 5. 5., Brno, Czech Republc, EU APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT Abstract Josef TOŠENOVSKÝ ) Lenka MONSPORTOVÁ ) Flp TOŠENOVSKÝ
More informationOnline Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks
12 IEEE Wreless Communcatons and Networkng Conference: Moble and Wreless Networks Onlne Polces for Opportunstc Vrtual MISO Routng n Wreless Ad Hoc Networks Crstano Tapparello, Stefano Tomasn and Mchele
More informationAn Efficient Genetic Algorithm with Fuzzy c-means Clustering for Traveling Salesman Problem
An Effcent Genetc Algorthm wth Fuzzy c-means Clusterng for Travelng Salesman Problem Jong-Won Yoon and Sung-Bae Cho Dept. of Computer Scence Yonse Unversty Seoul, Korea jwyoon@sclab.yonse.ac.r, sbcho@cs.yonse.ac.r
More informationObstacle-Aware Routing Problem in. a Rectangular Mesh Network
Appled Mathematcal Scences, Vol. 9, 015, no. 14, 653-663 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.1988/ams.015.411911 Obstacle-Aware Routng Problem n a Rectangular Mesh Network Norazah Adzhar Department
More informationUSER CLASS BASED QoS DIFFERENTIATION IN e WLAN
USER CLASS BASED QoS DIFFERENTIATION IN 802.11e WLAN Amt Kejrwal, Ratan Guha School of Computer Scence Unversty of Central Florda Orlando, FL-32816 USA E-mal: {kejrwal, guha}@cs.ucf.edu Manak Chatterjee
More informationAn Image Fusion Approach Based on Segmentation Region
Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua
More informationNetwork-Driven Layered Multicast with IPv6
Network-Drven Layered Multcast wth IPv6 Ho-pong Sze and Soung C. Lew Department of Informaton Engneerng, The Chnese Unversty of Hong Kong, Shatn, N.T., Hong Kong {hpsze8, soung}@e.cuhk.edu.hk Abstract.
More informationScheduling and queue management. DigiComm II
Schedulng and queue management Tradtonal queung behavour n routers Data transfer: datagrams: ndvdual packets no recognton of flows connectonless: no sgnallng Forwardng: based on per-datagram forwardng
More informationGA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks
Seventh Internatonal Conference on Intellgent Systems Desgn and Applcatons GA-Based Learnng Algorthms to Identfy Fuzzy Rules for Fuzzy Neural Networks K Almejall, K Dahal, Member IEEE, and A Hossan, Member
More informationAdaptive Connection Admission Control for Mission Critical Real-Time Communication Networks Abstract 1 Introduction
Adaptve Connecton Admsson Control for Msson Crtcal Real-Tme Communcaton etwors B. Devalla, A. Sahoo, Y. Guan, C. L, R. Bettat and W. Zhao Department of Computer Scence, Texas A&M Unversty, College Staton,
More informationAn Ant-based approach to Power-Efficient Algorithm for Wireless Sensor Networks
An Ant-based approach to Power-Effcent Algorthm for Wreless Sensor Networs Yaofeng Wen, Yuquan Chen, and Dahong Qan, Senor Member, IEEE Abstract We present an adaptve approach for mprovng the performance
More informationConditional Speculative Decimal Addition*
Condtonal Speculatve Decmal Addton Alvaro Vazquez and Elsardo Antelo Dep. of Electronc and Computer Engneerng Unv. of Santago de Compostela, Span Ths work was supported n part by Xunta de Galca under grant
More informationA Robust Method for Estimating the Fundamental Matrix
Proc. VIIth Dgtal Image Computng: Technques and Applcatons, Sun C., Talbot H., Ourseln S. and Adraansen T. (Eds.), 0- Dec. 003, Sydney A Robust Method for Estmatng the Fundamental Matrx C.L. Feng and Y.S.
More information