Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Size: px
Start display at page:

Download "Resource Optimization to Provision a Virtual Private Network Using the Hose Model"

Transcription

1 Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti, gshoja}@cs.uvic.ca Abstract Virtua Private Networks (VPN) provide a secure and reiabe communication between customer sites over a shared network. With increase in number and size of VPNs, providers need efficient provisioning techniques that adapt to customer demands. The recenty proposed hose mode for VPN aeviates the scaabiity probem of the pipe mode by reserving for its aggregate ingress and egress bandwidth instead of between every pair of VPN endpoints. Existing studies on quaity of service guarantees in the hose mode either dea ony with bandwidth requirements or regard the deay requirement as the main objective ignoring the bandwidth cost. In this work we propose a new approach to enhance the hose mode to guarantee deay requirements between endpoints whie optimizing the provisioning bandwidth cost. We connect VPN endpoints using a tree structure and our agorithm attempts to optimize the tota bandwidth reserved on edges of the VPN tree. Our proposed approach takes into account the user preferences in meeting the deay requirements and provisioning cost to find the optima soution of resource aocation probem. Our experimenta resuts indicate that the VPN trees constructed by our proposed agorithm meet minimum deay requirements whie reducing the bandwidth requirements as compared to previousy proposed agorithms. I. INTRODUCTION A Virtua Private Network (VPN) is a group of computer systems connected as a private network but communicates over a pubic network. The aim is to provide the VPN endpoints with a service comparabe to a dedicated private network estabished with eased ines. Thus, providers of VPN services need to address the QoS and security issues whie depoying a VPN over a shared IP network. In recent years, substantia progress in the IP security technoogies have enabed existing VPN service offerings to provide customers with a eve of privacy comparabe to that offered by a dedicated ine [5]. The emergence of IP technoogies such as MPLS and RSVP-TE [1] have made it possibe to reaize IP-based VPNs that can provide the end customers with QoS guarantees. In the context of QoS guarantee in VPNs, ony deay and aggregate bandwidth guarantee has been considered and we wi consider the same in this work. In this paper, we address the probem of resource aocation in VPN hose mode with QoS guarantees whie optimizing tota provisioning bandwidth cost. Two popuar modes have been proposed for providing QoS in the context of VPNs: the pipe mode [1] and the hose mode [2]. As depicted in Fig. 1, in the pipe mode, a VPN customer buys a set of customer-pipes, i.e., aocations of specific bandwidth on paths between every source-destination pair of the VPN endpoints. However, in the hose mode, as iustrated in Fig. 2, each VPN endpoint connects to the network by a hose, which is specified by its aggregate ingress and egress bandwidth requirements. The hose mode has desirabe characteristics such as ease of specification, fexibiity, and mutipexing gain [2]. A number of provisioning agorithms for VPNs in the hose mode have been proposed [2, 3, 5, 6, 1]. In [2], a hose is reaized with a source-based tree and a factor of two to three in capacity savings over the pipe mode is achieved. The authors suggested that using a Steiner tree connecting VPN endpoints woud optimize the tota bandwidth provisioning cost. Further, in [5], it has been shown that optima bandwidth aocation probem in VPN hose mode is NP-compete. In their work, hoses are impemented with a singe shared tree and the proposed agorithms attempt to optimize the tota bandwidth reserved on the edges of the VPN tree. The bandwidth efficiency of the hose mode is studied in [3] where the over-provisioning factor of the mode is evauated in networks with various sizes and node densities. In [7], a muti-path routing provisioning approach is proposed for the hose mode. A VPN network is modeed as a graph G = (V, E) where V is the set of nodes and E is the set of bidirectiona inks connecting the nodes. Each ink (u, v) is associated with two QoS metrics: maximum bandwidth capacity over the ink and deay between ink endpoints. The deay vaue of a path is defined as the sum of the deay vaues of a the inks aong it. The VPN specification in the hose mode incudes: A subset of endpoints P V corresponding to the VPN endpoints; and for each VPN endpoint i P, the associated ingress and egress bandwidths i in and i out, respectivey [5]. The nature of the Service Leve Agreement (SLA) between a customer and a service provider is driven by the traffic characteristics and QoS requirements of the customer appications that make use of the VPN. For exampe, a voiceover-ip VPN service might require tight bounds on the packet oss rate, deay, and possiby jitter. On the other hand, a dataony VPN service might have reativey ess stringent or no deay requirements. To ensure that appropriate requirements can be met, it is essentia for the provider to know the traffic /7/$ IEEE 512

2 Fig. 1: VPN pipe mode Fig. 2: VPN hose mode characteristics. Athough the hose mode provides customers with simper and more fexibe SLAs, the mode presents the provider with a more chaenging probem of resource management. It is aso difficut to provide QoS guarantee in the hose mode since VPN customers specify QoS requirements per VPN endpoint and not for every pair of endpoints. The main probem of interest in this work is the probem of constructing a shared tree connecting a the VPN endpoints with the objective of satisfying the end-to-end deay requirements and guaranteeing the aggregate bandwidth whie minimizing the provisioning bandwidth cost. Compared to the pipe and source-based tree approaches, the shared tree approach makes the best use of statistica mutipexing to reduce the provisioning cost. Thus, we consider tree structures to connect the VPN endpoints in P since trees are scaabe and simpify routing and restoration. Furthermore, trees aow the bandwidth reserved on a ink to be shared by the traffic between the two sets of VPN endpoints connected by the ink [5]. The rest of the paper is organized as foows. A short review on the previous works that this agorithm is based on is presented in section II. The Optima andwidth Deay Shared Tree (ODST) agorithm that meets the deay requirement whie minimizing the provisioning cost is described in section III. Section IV presents the discussion on time compexity. Simuation resuts comparing the performance of the proposed agorithm are presented in section V. Finay, section VI concudes the paper. II. MOTIVATION AND RELATED WORK The prima-dua agorithm for computing VPN tree was deveoped by Kumar et a. [5]. Their approach finds the near optima bandwidth provisioning tree in which a 1- approximation is obtained by soving the inear program reaxation and rounding the fractiona soution. This approach can find a tree with cost smaer than a Steiner tree suggested in [2]. Foowing the notation of Kumar s paper, for a ink (u, v), et P u (u,v) / P v (u,v) denote the set of VPN endpoints in the connected component of tree T connecting nodes u/v when ink (u,v) is deeted from T. In [5] it has been shown that the bandwidth to be reserved on ink (u,v) of T is C ( u, v) T = min{ ( u, v) Pu, out ( u Pv } + min{, v ) in ( u, v) Pv, out ( u Pu The tota bandwidth reserved for tree T is given by ( u, v ) C T = C. For the purpose of this paper, this aocation T ( u, v ) T of tota bandwidth (C T ) is used as bandwidth cost or provisioning cost. Since we are interested in minimizing the reserved bandwidth for tree T, the probem of computing the optima VPN tree becomes the foowing: Optima andwidth-constrained Shared Tree Probem (OSTP): Given a set of VPN endpoints P and their ingress p in and egress p out bandwidths, compute a shared VPN tree T, connecting these nodes for which C T is minimum. In [5] it is proved that the OSTP is NP-hard. Zhang et a. [8] suggested cassifying appications that use VPN in order to sove the Optima Deay-constrained Shared Tree Probem (ODSTP). Each cass, j, is characterized by its end-to-end deay requirement, maximum_aowabe_deay(j) that must hod between every pair of endpoints. ODSTP addresses the probem of finding a shared tree T connecting VPN endpoints that satisfies the deay requirement. In practice, the deay casses are obtained by measuring characteristics of typica appications over the VPN. The ODSTP Probem has aso been proved to be NP-hard [8]. Zhang et a. [8], find near optima deay constrained shared tree by formuating a Minimum Diameter Steiner Tree (MDStT) probem to make the shared tree support the deay requirements. The diameter of a Steiner tree connecting the VPN endpoints is defined as the maximum deay between any two endpoints. The minimum deay requirement that can be supported by the shared tree can be obtained by finding the minimum diameter Steiner tree. The MDStT supports the owest deay requirement using a tree structure. However to buid a ow provisioning cost tree, Zhang et a. [8] suggested a Least-Cost-Least-Deay (LCLD) approach which tries to reduce the provisioning bandwidth whie maintaining the deay requirement. We found no previous proposed way to construct the shared tree connecting VPN endpoints ensuring that both provisioning cost and deay requirement woud be minimized. LCLD agorithm [8] satisfies the deay requirement, but there is no guarantee that the provisioning cost is optima. In this paper, we use a combination of both MDStT [8] and prima-dua [5] agorithms to find the trees with minimum, v ) in }. (1) 513

3 provisioning cost that aso satisfy the deay requirement. For carity of presentation, in the foowing sections, ony the provisioning of one specific deay cass with its given deay requirement and the associated ingress and egress bandwidths for each VPN endpoint is discussed. Note that the deay requirement is identica for a the VPN endpoints for a given cass. Thus provisioning a VPN network can be viewed as provisioning each of the deay casses separatey [8]. III. OUR CONTRIUTIONS This paper s main objective is to find a near optima shared tree considering the deay requirement whie trying to minimize the tota provisioning bandwidth cost. The probem can be formuated as foows: Optima andwidth and Deay-constrained Shared Tree Probem (ODSTP): Given a set of VPN endpoints P with their associated ingress and egress bandwidths and the maximum_aowabe_deay, compute a shared tree T connecting a the VPN endpoints satisfying the deay requirement in which the tota provisioning bandwidth cost is minimized. In this work, we deveop agorithms to sove the ODSTP ignoring ink capacity constraints. Our proposed approach can be extended to hande ink capacity constraints. Our methodoogy is to find two sets of shared trees: one optimizing the deay requirement and the other optimizing the bandwidth cost. From these sets, we seect the best soution regarding both deay and bandwidth requirements using user specified preference parameters. Our approach consists of four phases. In phase 1, we use a modified version of MDStT agorithm [8] to construct shared tree(s) connecting a VPN endpoints with the objective of satisfying the given maximum aowabe deay. In this step, simiar to LCLD approach [8], we deveop our MDStT agorithm based on absoute center probem [11]. In our approach, if more than one oca 1-center points satisfy the deay requirement, in contrast to LCLD approach [8], a of them woud be set as one of the candidates for center of the graph. For each center candidate, a Steiner tree connecting it to a VPN endpoints using the minimum deay path woud be constructed. The set of constructed trees is caed ODST set. This set of trees consists of a the shared trees which satisfy the deay requirement but might not minimize the provisioning bandwidth. In phase 2, the tota provisioning bandwidth of each tree in ODST set, using (1), is computed. The maximum bandwidth cost for trees in ODST set is chosen as the bandwidth threshod to be used in the next phase. This threshod is the maximum amount of provisioning bandwidth that we are interested in. In phase 3, we use a modified version of primadua agorithm [5], to construct shared tree(s) connecting a the VPN endpoints with the cost ess than the bandwidth threshod. The set of constructed trees in this phase is caed OST set. This means that a the shared trees with tota provisioning bandwidth ess than the bandwidth threshod woud be added to OST set. Our approach to modify prima-dua [5] agorithm is that we save a the trees satisfying the bandwidth threshod requirement whie primadua [5] agorithm ony returns one tree with the smaest cost. In phase 4, a ranking scheme is used to rank the trees in ODST and OST sets. The trees with smaest rank woud be the best candidate for ODSTP. Ranking the trees is done according to user specified bandwidth/deay preference and maximum aowabe deay of the particuar service cass. These parameters depend upon cass-of-service of the appication and user preference in meeting bandwidth/deay requirements. We formuate the foowing scheme for choosing from the above sets of trees the ones that wi be cosest to satisfy user's bandwidth/deay requirements. For each shared tree T, the foowing vaue wi be cacuated: T ODST OST, Rank( T ) = deay _ diametert deay _ preference + maximum _ aowabe _ deay bandwidth _ costt bandwidth _ preference. (2) bandwidth _ threshod In the above formua, the maximum_aowabe_deay is defined as the maximum aowabe end-to-end deay dependent on the cass-of-service. The deay_diameter T is defined as maximum end-to-end deay between VPN endpoints of each tree T. The bandwidth_cost T is defined as sum of provisioning bandwidth over inks of T. As expained earier, the bandwidth_threshod is the maximum bandwidth cost for trees in ODST set. The parameters deay_preference and bandwidth_preference are set by the user. The owest ranked trees are candidates for providing near optima soutions. The justification to use this approach is that it provides needed fexibiity with respect to user's preferences in choosing deay versus bandwidth requirement. For exampe, VoIP appications may use arger deay preference whie a guaranteed data service appication may use arger bandwidth preference. As an exampe consider the graph depicted in Fig. 3. It contains a network with six nodes. Nodes, 1, 2, 3 are VPN endpoints with ingress/egress bandwidth equas to 5/5, 6/6, 7/7, 8/8 Mbps respectivey. The numbers on each edge indicate the ink s deay in miiseconds. Assume that the maximum aowabe deay for a particuar appication is 58 ms. The resut of phase 1 is iustrated in Fig. 4 in which the two shared trees A and beong to the ODST set and satisfy the maximum aowabe deay requirement. Then in phase 2, we compute the bandwidth_cost of each tree and the bandwidth_threshod is set as the maximum bandwidth_cost over the trees in ODST. In this case the maximum bandwidth_cost is the cost of the tree abeed as A which is 74 Mbps. Now, in phase 3, we execute our modified primadua agorithm on the origina network to find a the shared trees with tota bandwidth_cost ess than the bandwidth_threshod computed in phase 2. The modified prima-dua agorithm resuts in a set of trees abeed as C, D 514

4 and E in Fig. 5. Note that for the sake of carity we have not shown the homogeneous trees in Fig. 4 and Fig. 5. In phase 4, the ranking is performed for each tree in ODST and OST sets using (2). Assume that the bandwidth_preference and deay_preference are set equa to 1. The ranking vaue for each tree is as foowing: Rank of tree A = 74/74 + 5/58 = 1.86 Rank of tree = 52/ /58 = 1.7 Rank of tree C = 52/ /58 = 1.7 Rank of tree D = 62/ /58 = 1.85 Rank of tree E = 74/ /58 = 2.53 For this exampe, both trees and C have the same minimum rank. Therefore, one can choose either one of them. However, executing the LCLD agorithm [8] on this network woud resut in seection of tree A which has a arger bandwidth_cost. A 8/8 7/ /5 6/6 Fig. 3: A sampe network with 6 nodes IV. COMPLEXITY ANALYSIS As ong as our agorithm uses both MDStT [8] and primadua [5] agorithms to find the best near optima trees regarding both deay and bandwidth, its time compexity is a function of time compexities of MDStT and prima-dua agorithms. The former has time compexity equa to O(mp+npogp) and the atter has time compexity equa to O(n(mp 2 +mnp+n 2 ogn)) where m is number of edges, n is number of nodes and p is number of VPN endpoints in the network. In our ODST agorithm, during phase 1, a the shared trees constructed by setting each edge as the root might have deays ess than the deay threshod in the worst case. This wi not change the time compexity of finding the goba center in the MDStT agorithm [8] but the compexity of tree construction wi be affected. Thus the worst case time compexity wi be O(m 2 p+nmpogp) for phase 1. However, proper seection of maximum aowabe deay woud eiminate this scenario. In our extensive study regarding the seection of maximum aowabe deay, we found that setting this vaue to be a factor seected in interva [1, 1.5] times the minimum supportabe deay of the network (the vaue of the goba center) woud be the best seection that reduces the time compexity to a constant factor of MDStT agorithm [8] regardess of number of edges. Thus the time compexity of phase 2 is O(c). Execution of prima-dua agorithm [5] is independent of the bandwidth threshod since a the trees wi be constructed in prima-dua approach. The ony difference in our approach is that we keep the trees with bandwidth cost ess than the bandwidth threshod in a inked ist for further ranking. In the worst case, the maximum size of ODST set is the number of edges in the network (m) since each edge can be a candidate center point. The maximum size of OST set is the number of vertices of the network (n), since the agorithm iterates over a nodes in the network. Thus, the time compexity of ranking phase is O(m+n). Max Deay: 5 (W Cost: 74) C W Cost: 52 (Max Deay: 58) D V. SIMULATION STUDY Max Deay: 58 (W Cost: 52) Fig. 4: ODST set, the resut of performing phase 1 W Cost: 62 W Cost: 74 (Max Deay: 59) (Max Deay: 89) Fig. 5: OST set, the resut of performing phase 3 Two sets of topoogies were used in our simuations. The first set is taken from the Rocketfue project [9]. Among a the topoogies, we seected two dominant tier-1 ISP topoogies as isted in Tabe I. The ink deays of these two topoogies were computed based on their geographica distances. The second set was randomy generated using the Waxman Mode [4]. Since we can easiy contro the size of the topoogies, we use them to study the effect of the network size. In this mode, the nodes are paced on a 3 24KM 2 pane, roughy the size of the USA. The probabiity for two nodes to be connected by a ink decreases exponentiay with the Eucidean distance between them according to the (, ) foowing probabiity function: P u v e = α exp( ( u, v) / Lβ ) where L is the maximum distance between any two nodes in the network and (u, v) is the distance between u and v. The parameter β contros the ratio of short inks to ong inks, whie the parameter α contros the average node degree of E 515

5 the network. Large vaue of β increases the number of ong inks, and a arge vaue of α resuts in a arge average node degree. In the simuations, α and β were set at 2.2 and.15 respectivey. These vaues were seected to be the same as used in the MDStT agorithm [8] impementations. Like the Rocketfue topoogies, the ink deay vaues of the random networks were cacuated according to their geographica distances. For both sets of topoogies, the VPN endpoints were randomy seected from the network nodes. The number of VPN endpoints was set to 1% of the tota number of network nodes in the network uness expicity specified. The bandwidth requirement of each VPN endpoint was uniformy chosen between 2 and 1 Mbps. An asymmetry parameter r is associated with each endpoint, representing the ratio between the ingress and egress bandwidth requirements. This ratio varies from 1 to 256 in our simuations. Each simuation resut given beow is the average of 5 rounds of simuation run. The 95% confidence intervas are cacuated as ˆ θ t ˆ( σ ˆ) θ θ ˆ θ + t ˆ( σ ˆ) where θˆ is the average α / 2, f α / 2, f θ vaue of simuations runs, ˆ σ 2 ( ˆ θ ) is the standard deviation and t.25,4 is 2.78 according to Tabe A.5 in [12]. The resuts show that the confidence intervas for provisioning costs are ess than.5 Gbps and confidence intervas for minimum supportabe deay are ess than 5 ms. We define three different scenarios for our ODST agorithm: Scenario 1) bandwidth preference is equa to deay preference; Scenario 2) bandwidth preference is greater than deay preference; and Scenario 3) bandwidth preference is smaer than deay preference. The performance of different scenarios of ODST agorithm and LCLD agorithm [8] are compared in Figures 6 to 11. Fig. 6 compares the diameter of constructed shared trees connecting VPN endpoints. This vaue can be interpreted as the minimum deay requirement supported by each tree. The resuts show that using ODST agorithm with deay preference greater than bandwidth preference woud resut in smaer minimum supported deay than LCLD agorithm [8]. The reason is that in LCLD agorithm ony one center point wi be considered to construct the shared tree whie in our agorithm a the candidate centers are considered. Moreover, the resuts in Fig. 7 show that our agorithm wi aways resut in smaer provisioning bandwidth cost. Note that since the Sprint network is a more inear network than the random networks generated by Waxman mode, there is an increase in the minimum supportabe deay for Sprint network in Fig. 6. Fig. 8 iustrates the effect of increasing number of VPN endpoints on provisioning cost for a 1 network node. As stated earier, the resuts show that our ODST agorithm aways resuts in smaer provisioning cost compared to LCLD agorithm [8]. Fig. 9 shows the effect of increasing the number of VPN endpoints on the execution time of agorithms. Fig. 1 shows the effect of increasing the network size on the execution time. As the resuts shows, running ODST agorithm on a typica tier 1 network, which has around 1 nodes, does not require more than 1 minute. TALE I ROCKETFUEL ISP TOPOLOGIES USED IN THE SIMULATIONS AS Number Name Tier No.of Edges 1239 Sprint(US) ATT(US) Minimum deay requirement supported (ms) Provisioning Cost (Mbps) Provisioning cost (Mbps) ODST agorithm (Scenario 3) MDStTagorithm ODST agorithm (Scenario 1) ODST agorithm (Scenario 2) No.of Nodes rand5 ATT rand1 Sprint rand15 rand2 Topoogies Fig. 6: Minimum deay requirement supported ODST agorithm (Scenario 2) ODST agorithm (Scenario 1) ODST agorithm (Scenario 3) LCLD agorithm rand5 Sprint rand1 ATT rand15 rand2 Topoogies Fig. 7: The provisioning cost comparison 1 Nodes Network ased on Waxman Mode LCLD agorithm ODST agorithm (Scenario 2) Number of VPN nodes Fig. 8: Effect of number of VPN nodes on provisioning cost Since the resource aocation is not ikey to be performed more often than every one minute, this does not pose a probem. In Fig. 11 the effect of changing the bandwidth asymmetry ratio on provisioning cost is studied. The ratio between ingress and egress bandwidth of VPN endpoints has 516

6 Execution time (s) Nodes Network ased on Waxman Mode LCLD agorithm ODST agorithm Number of VPN nodes Zhang et a. Our agorithm modifies and combines primadua agorithm [5] and Least-Cost-Least-Deay agorithm [8] to find the MDStT tree that satisfies the maximum aowabe deay and provides optimum provisioning cost. For future work, the ranking scheme wi be extended to incude ink capacity constraints and any ink capacity enhancement features (e.g. increase the path or ink bandwidth) into our ranking scheme. This can be done by introducing two more parameters such as the enhancement preference and enhancement cost in our ranking scheme. The atter can be interpreted as the preference of network administrator to increase the bandwidth capacity of a particuar ink whie the former is the monetary cost to perform such operation. Provisioning cost (Mbps) Execution time (s) Fig. 9: Effect of number of VPN nodes on execution time LCLD agorithm ODST agorithm Number of nodes Fig. 1: Effect of number of network nodes on execution time 1 Nodes Network ased on Waxman Mode LCLD agorithm ODST agorithm andwidth asymmetry ratio REFERENCES [1]. Davie, Y. Rekhter. MPLS technoogy and appications, San Mateo, CA: Morgan Kaufmann, 2. [2] N. G. Duffied, P. Goya,A. Greenberg, P. Mishra, K. K Ramakrishnan, J. E. van der Merwe, A fexibe mode for resource management in Virtua Private Networks, In Proc. ACM SIGCOMM, vo (4), 1999, pp [3] A. Juttner, I. Szabo, A. Szentesi, On bandwidth efficiency of the Hose resource management mode in Virtua Private Networks, In Proc. INFOCOM, vo. 1, 23, pp [4]. M. Waxman, Routing of mutipoint connections, IEEE Journa on Seected Areas in Communications, vo. 6(9), 1988, pp [5] A. Kumar, R. Rastogi, A. Siberschatz,. Yener, Agorithms for provisioning Virtua Private Networks in the hose mode, IEEE/ACM Transaction on Networking, vo. 1(4), 22, pp [6] G. de Veciana, S. Park, A. Sang, S. Weber. Routing and provisioning VPNs based on hose traffic modes and/or constraints. In Proc. 4th Annua Aerton Conference on Communication Contro and Computing, 22, pp [7] T. Erebach, M. Ruegg, Optima bandwidth reservation in hose mode VPNs with muti-path routing, In Proc. INFOCOM, vo. 4, 24, pp [8] L. Zhang; J. Muppaa, S. Chanson, Provisioning virtua private networks in the hose mode with deay requirements. Hong Kong University, Internationa Conference on Parae Processing, 25, pp [9] Rocketfue project, Computer Science and Engineering, Univ. of Washington. [1] A. Gupta, A. Kumar, Keinberg, R. Rastogi,.Yener, Provisioning a Virtua Private Network: A network design probem for muticommodity fow, In Proc. ACM STOC, 21, pp [11] S. Hakimi. Optima ocations of switching centers and medians of A graph, Operations Research, vo. 12, 1964, pp [12] Jerry anks, John S. Carson, arry L. Neson, David M. Nico, Discrete-Event System Simuation, Fourth Edition, Prentice Ha, 25. Fig. 11: Effect of asymmetry ratio been increased from 1 to 256. The resuts show that our ODST agorithm woud sti perform better than the LCLD agorithm. VI. CONCLUSIONS AND FUTURE WORK In this work, we introduced a new ranking scheme based on user preferences to optimize the provisioning bandwidth cost whie supporting the minimum deay requirement in VPN hose mode. This scheme wi resut in ower bandwidth provisioning costs than the previous work introduced by 517

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

Traffic Engineering for Provisioning Restorable Hose-Model VPNs

Traffic Engineering for Provisioning Restorable Hose-Model VPNs Traffic Engineering for Provisioning Restorabe Hose-Mode VPNs Yu-Liang Liu, Nonmember, Yeai S. Sun a) and Meng Chang Chen b), Member Summary Virtua Private Networks (VPNs) are overay networks estabished

More information

Design of IP Networks with End-to. to- End Performance Guarantees

Design of IP Networks with End-to. to- End Performance Guarantees Design of IP Networks with End-to to- End Performance Guarantees Irena Atov and Richard J. Harris* ( Swinburne University of Technoogy & *Massey University) Presentation Outine Introduction Mutiservice

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering

Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering Joint Optimization of Intra- and Inter-Autonomous System Traffic Engineering Kin-Hon Ho, Michae Howarth, Ning Wang, George Pavou and Styianos Georgouas Centre for Communication Systems Research, University

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,

More information

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong

More information

Delay Budget Partitioning to Maximize Network Resource Usage Efficiency

Delay Budget Partitioning to Maximize Network Resource Usage Efficiency Deay Budget Partitioning to Maximize Network Resource Usage Efficiency Kartik Gopaan Tzi-cker Chiueh Yow-Jian Lin Forida State University Stony Brook University Tecordia Technoogies kartik@cs.fsu.edu chiueh@cs.sunysb.edu

More information

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) botton@poms.uc.ac.be Bernard

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

PAPER Delay Constrained Routing and Link Capacity Assignment in Virtual Circuit Networks

PAPER Delay Constrained Routing and Link Capacity Assignment in Virtual Circuit Networks 2004 PAPER Deay Constrained Routing and Link Capacity Assignment in Virtua Circuit Networks Hong-Hsu YEN a), Member and FrankYeong-Sung LIN b), Nonmember SUMMARY An essentia issue in designing, operating

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

TSR: Topology Reduction from Tree to Star Data Grids

TSR: Topology Reduction from Tree to Star Data Grids 03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen

More information

BGP ingress-to-egress route configuration in a capacityconstrained Asia-Pacific Conference On Communications, 2005, v. 2005, p.

BGP ingress-to-egress route configuration in a capacityconstrained Asia-Pacific Conference On Communications, 2005, v. 2005, p. Tite BGP -to- route configuration in a capacityconstrained AS Author(s) Chim, TW; Yeung, KL; Lu KS Citation 2005 Asia-Pacific Conference On Communications, 2005, v. 2005, p. 386-390 Issued Date 2005 URL

More information

Automatic Grouping for Social Networks CS229 Project Report

Automatic Grouping for Social Networks CS229 Project Report Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct

More information

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network Service Chain (SC) Mapping with Mutipe SC Instances in a Wide Area Network This is a preprint eectronic version of the artice submitted to IEEE GobeCom 2017 Abhishek Gupta, Brigitte Jaumard, Massimo Tornatore,

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

Timing-Driven Hierarchical Global Routing with Wire-Sizing and Buffer-Insertion for VLSI with Multi-Routing-Layer

Timing-Driven Hierarchical Global Routing with Wire-Sizing and Buffer-Insertion for VLSI with Multi-Routing-Layer Timing-Driven Hierarchica Goba Routing with Wire-Sizing and Buffer-Insertion for VLSI with Muti-Routing-Layer Takahiro DEGUCHI y Tetsushi KOIDE z Shin ichi WAKABAYASHI y yfacuty of Engineering, Hiroshima

More information

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs Repication of Virtua Network Functions: Optimizing Link Utiization and Resource Costs Francisco Carpio, Wogang Bziuk and Admea Jukan Technische Universität Braunschweig, Germany Emai:{f.carpio, w.bziuk,

More information

International Journal of Electronics and Communications (AEÜ)

International Journal of Electronics and Communications (AEÜ) Int. J. Eectron. Commun. (AEÜ) 67 (2013) 470 478 Contents ists avaiabe at SciVerse ScienceDirect Internationa Journa of Eectronics and Communications (AEÜ) journa h o me pa ge: www.esevier.com/ocate/aeue

More information

A Petrel Plugin for Surface Modeling

A Petrel Plugin for Surface Modeling A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study

More information

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions 2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing

More information

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Y.LI AND B.BHANU CAMERA ASSIGNMENT: A GAME-THEORETIC

More information

On Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture

On Finding the Best Partial Multicast Protection Tree under Dual-Homing Architecture On inding the est Partia Muticast Protection Tree under ua-homing rchitecture Mei Yang, Jianping Wang, Xiangtong Qi, Yingtao Jiang epartment of ectrica and omputer ngineering, University of Nevada Las

More information

A Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks

A Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks Sensors 2013, 13, 16424-16450; doi:10.3390/s131216424 Artice OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journa/sensors A Near-Optima Distributed QoS Constrained Routing Agorithm for Mutichanne Wireess

More information

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line American J. of Engineering and Appied Sciences 3 (): 5-24, 200 ISSN 94-7020 200 Science Pubications Appication of Inteigence Based Genetic Agorithm for Job Sequencing Probem on Parae Mixed-Mode Assemby

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction

More information

Image Segmentation Using Semi-Supervised k-means

Image Segmentation Using Semi-Supervised k-means I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging

More information

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters Optimization and Appication of Support Vector Machine Based on SVM Agorithm Parameters YAN Hui-feng 1, WANG Wei-feng 1, LIU Jie 2 1 ChongQing University of Posts and Teecom 400065, China 2 Schoo Of Civi

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department

More information

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints *

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG

More information

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Nattawut Thepayasuwan, Member, IEEE and Aex Doboi, Member, IEEE Abstract

More information

Service Scheduling for General Packet Radio Service Classes

Service Scheduling for General Packet Radio Service Classes Service Scheduing for Genera Packet Radio Service Casses Qixiang Pang, Amir Bigoo, Victor C. M. Leung, Chris Schoefied Department of Eectrica and Computer Engineering, University of British Coumbia, Vancouver,

More information

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:

More information

Binarized support vector machines

Binarized support vector machines Universidad Caros III de Madrid Repositorio instituciona e-archivo Departamento de Estadística http://e-archivo.uc3m.es DES - Working Papers. Statistics and Econometrics. WS 2007-11 Binarized support vector

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

Community-Aware Opportunistic Routing in Mobile Social Networks

Community-Aware Opportunistic Routing in Mobile Social Networks IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract

More information

CERIAS Tech Report Replicated Parallel I/O without Additional Scheduling Costs by Mikhail J. Atallah Center for Education and Research

CERIAS Tech Report Replicated Parallel I/O without Additional Scheduling Costs by Mikhail J. Atallah Center for Education and Research CERIAS Tech Report 2003-50 Repicated Parae I/O without Additiona Scheduing Costs by Mikhai J. Ataah Center for Education and Research Information Assurance and Security Purdue University, West Lafayette,

More information

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing 100039, China shentao@casm.ac.cn Xu Dehe Institute of resources and environment, North

More information

Quality of Service Evaluations of Multicast Streaming Protocols *

Quality of Service Evaluations of Multicast Streaming Protocols * Quaity of Service Evauations of Muticast Streaming Protocos Haonan Tan Derek L. Eager Mary. Vernon Hongfei Guo omputer Sciences Department University of Wisconsin-Madison, USA {haonan, vernon, guo}@cs.wisc.edu

More information

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models

On Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models On Upper Bounds for Assortment Optimization under the Mixture of Mutinomia Logit Modes Sumit Kunnumka September 30, 2014 Abstract The assortment optimization probem under the mixture of mutinomia ogit

More information

Genetic Algorithms for Parallel Code Optimization

Genetic Algorithms for Parallel Code Optimization Genetic Agorithms for Parae Code Optimization Ender Özcan Dept. of Computer Engineering Yeditepe University Kayışdağı, İstanbu, Turkey Emai: eozcan@cse.yeditepe.edu.tr Abstract- Determining the optimum

More information

AUTOMATIC IMAGE RETARGETING USING SALIENCY BASED MESH PARAMETERIZATION

AUTOMATIC IMAGE RETARGETING USING SALIENCY BASED MESH PARAMETERIZATION S.Sai Kumar et a. / (IJCSIT Internationa Journa of Computer Science and Information Technoogies, Vo. 1 (4, 010, 73-79 AUTOMATIC IMAGE RETARGETING USING SALIENCY BASED MESH PARAMETERIZATION 1 S.Sai Kumar,

More information

Minimizing Resource Cost for Camera Stream Scheduling in Video Data Center

Minimizing Resource Cost for Camera Stream Scheduling in Video Data Center Gao YH, Ma HD, Liu W. Minimizing resource cost for camera stream scheduing in video data center. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 555 570 May 2017. DOI 10.1007/s11390-017-1743-x Minimizing

More information

EE 122 Final Exam - Solution Date: December 14, 2002

EE 122 Final Exam - Solution Date: December 14, 2002 Name: SID: ee ogin: Day/Time of section you atten: EE Fina Exam - Soution Date: December 4, 00 Probem Points /0 /0 3 /0 4 /0 5 /0 6 /0 7 /0 8 /0 9 /0 0 /0 Tota /00 . Question (0 pt) (a) (5 pt) Expain briefy

More information

An Exponential Time 2-Approximation Algorithm for Bandwidth

An Exponential Time 2-Approximation Algorithm for Bandwidth An Exponentia Time 2-Approximation Agorithm for Bandwidth Martin Fürer 1, Serge Gaspers 2, Shiva Prasad Kasiviswanathan 3 1 Computer Science and Engineering, Pennsyvania State University, furer@cse.psu.edu

More information

A Novel Congestion Control Scheme for Elastic Flows in Network-on-Chip Based on Sum-Rate Optimization

A Novel Congestion Control Scheme for Elastic Flows in Network-on-Chip Based on Sum-Rate Optimization A Nove Congestion Contro Scheme for Eastic Fows in Network-on-Chip Based on Sum-Rate Optimization Mohammad S. Taebi 1, Fahimeh Jafari 1,3, Ahmad Khonsari 2,1, and Mohammad H. Yaghmae 3 1 IPM, Schoo of

More information

Fastest-Path Computation

Fastest-Path Computation Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods

More information

Cross-layer Design for Efficient Resource Utilization in WiMedia UWB-based WPANs

Cross-layer Design for Efficient Resource Utilization in WiMedia UWB-based WPANs Cross-ayer Design for Efficient Resource Utiization in WiMedia UWB-based WPANs RAED AL-ZUBI and MARWAN KRUNZ Department of Eectrica and Computer Engineering. University of Arizona. Utra-wideband (UWB)

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

Conflict graph-based Markovian model to estimate throughput in unsaturated IEEE networks

Conflict graph-based Markovian model to estimate throughput in unsaturated IEEE networks Confict graph-based Markovian mode to estimate throughput in unsaturated IEEE 802 networks Marija STOJANOVA Thomas BEGIN Anthony BUSSON marijastojanova@ens-yonfr thomasbegin@ens-yonfr anthonybusson@ens-yonfr

More information

Congestion Avoidance and Control in Sensor Network Based on Fuzzy AQM

Congestion Avoidance and Control in Sensor Network Based on Fuzzy AQM ICSP2012 Proceedings Congestion Avoidance and Contro in Sensor Network Based on Fuzzy AQM Luo Cheng, Xie Weixin,Li Qiusheng ATR Key Laboratory of Nationa Defense Technoogy, Shenzhen University, Shenzhen

More information

A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS

A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS Etienne Cornu 1, Aain Dufaux 2, and David Hermann 1 1 AMI Semiconductor Canada, 611 Kumpf Drive,

More information

ABSTRACT WU, KEHANG. Flow Aggregation based Lagrangian Relaxation with. (Under the direction of Professor Douglas S. Reeves)

ABSTRACT WU, KEHANG. Flow Aggregation based Lagrangian Relaxation with. (Under the direction of Professor Douglas S. Reeves) ABSTRACT WU, KEHANG Fow Aggregation based Lagrangian Reaxation with Appications to Capacity Panning of IP Networks with Mutipe Casses of Service (Under the direction of Professor Dougas S. Reeves) Noninear

More information

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages

Fuzzy Equivalence Relation Based Clustering and Its Use to Restructuring Websites Hyperlinks and Web Pages Fuzzy Equivaence Reation Based Custering and Its Use to Restructuring Websites Hyperinks and Web Pages Dimitris K. Kardaras,*, Xenia J. Mamakou, and Bi Karakostas 2 Business Informatics Laboratory, Dept.

More information

Reference trajectory tracking for a multi-dof robot arm

Reference trajectory tracking for a multi-dof robot arm Archives of Contro Sciences Voume 5LXI, 5 No. 4, pages 53 57 Reference trajectory tracking for a muti-dof robot arm RÓBERT KRASŇANSKÝ, PETER VALACH, DÁVID SOÓS, JAVAD ZARBAKHSH This paper presents the

More information

Response Surface Model Updating for Nonlinear Structures

Response Surface Model Updating for Nonlinear Structures Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,

More information

Alternative Decompositions for Distributed Maximization of Network Utility: Framework and Applications

Alternative Decompositions for Distributed Maximization of Network Utility: Framework and Applications Aternative Decompositions for Distributed Maximization of Network Utiity: Framework and Appications Danie P. Paomar and Mung Chiang Eectrica Engineering Department, Princeton University, NJ 08544, USA

More information

MACHINE learning techniques can, automatically,

MACHINE learning techniques can, automatically, Proceedings of Internationa Joint Conference on Neura Networks, Daas, Texas, USA, August 4-9, 203 High Leve Data Cassification Based on Network Entropy Fiipe Aves Neto and Liang Zhao Abstract Traditiona

More information

Multiple Plane Phase Retrieval Based On Inverse Regularized Imaging and Discrete Diffraction Transform

Multiple Plane Phase Retrieval Based On Inverse Regularized Imaging and Discrete Diffraction Transform Mutipe Pane Phase Retrieva Based On Inverse Reguaried Imaging and Discrete Diffraction Transform Artem Migukin, Vadimir Katkovnik, and Jaakko Astoa Department of Signa Processing, Tampere University of

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

Split Restoration with Wavelength Conversion in WDM Networks*

Split Restoration with Wavelength Conversion in WDM Networks* Spit Reoration with aveength Conversion in DM Networks* Yuanqiu Luo and Nirwan Ansari Advanced Networking Laborator Department of Eectrica and Computer Engineering New Jerse Initute of Technoog Universit

More information

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah Journa of Lightwave Technoogy Page of CFP: Cooperative Fast Protection Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapocai and Hussein T. Mouftah Abstract We introduce a nove protection scheme, caed Cooperative

More information

Lagrangian Relaxation Techniques for Scalable Spatial Conservation Planning

Lagrangian Relaxation Techniques for Scalable Spatial Conservation Planning Proceedings of the Twenty-Sixth AAAI Conference on Artificia Inteigence Lagrangian Reaxation Techniques for Scaabe Spatia Conservation Panning Akshat Kumar and Xiaojian Wu and Shomo Ziberstein Department

More information

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM JOINT IMAGE REGISTRATION AND AMPLE-BASED SUPER-RESOLUTION ALGORITHM Hyo-Song Kim, Jeyong Shin, and Rae-Hong Park Department of Eectronic Engineering, Schoo of Engineering, Sogang University 35 Baekbeom-ro,

More information

No connection establishment Do not perform Flow control Error control Retransmission Suitable for small request/response scenario E.g.

No connection establishment Do not perform Flow control Error control Retransmission Suitable for small request/response scenario E.g. UDP & TCP 2018/3/26 UDP Header Characteristics of UDP No connection estabishment Do not perform Fow contro Error contro Retransmission Suitabe for sma request/response scenario E.g., DNS Remote Procedure

More information

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing Rea-Time Image Generation with Simutaneous Video Memory Read/rite Access and Fast Physica Addressing Mountassar Maamoun 1, Bouaem Laichi 2, Abdehaim Benbekacem 3, Daoud Berkani 4 1 Department of Eectronic,

More information

Endoscopic Motion Compensation of High Speed Videoendoscopy

Endoscopic Motion Compensation of High Speed Videoendoscopy Endoscopic Motion Compensation of High Speed Videoendoscopy Bharath avuri Department of Computer Science and Engineering, University of South Caroina, Coumbia, SC - 901. ravuri@cse.sc.edu Abstract. High

More information

NOWDAYS, our ways of living are under gradual but

NOWDAYS, our ways of living are under gradual but Transmission Management of Deay-Sensitive Medica Packets in Beyond Wireess Body Area Networks: A Queueing Game Approach Changyan Yi, Student Member, IEEE, and Jun Cai, Senior Member, IEEE Abstract In this

More information

Performance of data networks with random links

Performance of data networks with random links Performance of data networks with random inks arxiv:adap-org/9909006 v2 4 Jan 2001 Henryk Fukś and Anna T. Lawniczak Department of Mathematics and Statistics, University of Gueph, Gueph, Ontario N1G 2W1,

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet

DaVinci: Dynamically Adaptive Virtual Networks for a Customized Internet DaVinci: Dynamicay Adaptive Virtua Networks for a Customized Internet Jiayue He, Rui Zhang-Shen, Ying Li, Cheng-Yen Lee, Jennifer Rexford, Mung Chiang Princeton University {jhe, rz, yingi, chengee, jrex,

More information

On-Chip CNN Accelerator for Image Super-Resolution

On-Chip CNN Accelerator for Image Super-Resolution On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement

More information

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y. FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four

More information

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES Eya En Gad, Akshay Gadde, A. Saman Avestimehr and Antonio Ortega Department of Eectrica Engineering University of Southern

More information

Development of a hybrid K-means-expectation maximization clustering algorithm

Development of a hybrid K-means-expectation maximization clustering algorithm Journa of Computations & Modeing, vo., no.4, 0, -3 ISSN: 79-765 (print, 79-8850 (onine Scienpress Ltd, 0 Deveopment of a hybrid K-means-expectation maximization custering agorithm Adigun Abimboa Adebisi,

More information

Navigating and searching theweb

Navigating and searching theweb Navigating and searching theweb Contents Introduction 3 1 The Word Wide Web 3 2 Navigating the web 4 3 Hyperinks 5 4 Searching the web 7 5 Improving your searches 8 6 Activities 9 6.1 Navigating the web

More information

Introduction to USB Development

Introduction to USB Development Introduction to USB Deveopment Introduction Technica Overview USB in Embedded Systems Recent Deveopments Extensions to USB USB as compared to other technoogies USB: Universa Seria Bus A seria bus standard

More information

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER

A NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER Internationa Journa on Technica and Physica Probems of Engineering (IJTPE) Pubished by Internationa Organization of IOTPE ISSN 077-358 IJTPE Journa www.iotpe.com ijtpe@iotpe.com September 014 Issue 0 Voume

More information

Alternate Paths for Multiple Fault Tolerance on Dynamic WDM Optical Networks

Alternate Paths for Multiple Fault Tolerance on Dynamic WDM Optical Networks Aternate Paths for Mutipe Faut Toerance on Dynamic WDM Optica Networks Nicoas Jara, Reinado Vaejos, Gerardo Rubino To cite this version: Nicoas Jara, Reinado Vaejos, Gerardo Rubino. Aternate Paths for

More information

IBM Research Report. On the Tradeoff among Capacity, Routing Hops, and Being Peer-to-Peer in the Design of Structured Overlay Networks

IBM Research Report. On the Tradeoff among Capacity, Routing Hops, and Being Peer-to-Peer in the Design of Structured Overlay Networks RC355 (W5-4) February 4, 5 Computer Science IBM Research Report On the Tradeoff among Capacity, Routing Hops, and Being Peer-to-Peer in the Design of Structured Overay Networks Chunqiang Tang, Meissa J.

More information

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal Abstract Authorization of a QoS Path based on Generic Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taa Advanced Internet Research Group, Department of Computer Science, University of Amsterdam.

More information

QoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization

QoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization QoS-Aware Data Transmission and Wireess Energy Transfer: Performance Modeing and Optimization Dusit Niyato, Ping Wang, Yeow Wai Leong, and Tan Hwee Pink Schoo of Computer Engineering, Nanyang Technoogica

More information

Chemical-Mechanical Polishing Aware Application-Specific 3D NoC Design

Chemical-Mechanical Polishing Aware Application-Specific 3D NoC Design Chemica-Mechanica oishing ware ppication-specific 3D NoC Design Wooyoung Jang, Ou He *, Jae-Seok Yang, and David Z. an SoC atform Deveopment Team, Samsung Eectronics, Yongin-City, South Korea * IBM System

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Attention The materias beow are

More information

Interference Spins Popovski, Petar; Simeone, Osvaldo; Nielsen, Jimmy Jessen; Stefanovic, Cedomir

Interference Spins Popovski, Petar; Simeone, Osvaldo; Nielsen, Jimmy Jessen; Stefanovic, Cedomir Aaborg Universitet Interference Spins Popovski, Petar; Simeone, Osvado; Niesen, Jimmy Jessen; Stefanovic, Cedomir Pubished in: I E E E Communications Letters DOI (ink to pubication from Pubisher): 10.1109/LCOMM.2014.2387166

More information

Transformation Invariance in Pattern Recognition: Tangent Distance and Propagation

Transformation Invariance in Pattern Recognition: Tangent Distance and Propagation Transformation Invariance in Pattern Recognition: Tangent Distance and Propagation Patrice Y. Simard, 1 Yann A. Le Cun, 2 John S. Denker, 2 Bernard Victorri 3 1 Microsoft Research, 1 Microsoft Way, Redmond,

More information

Chapter Multidimensional Direct Search Method

Chapter Multidimensional Direct Search Method Chapter 09.03 Mutidimensiona Direct Search Method After reading this chapter, you shoud be abe to:. Understand the fundamentas of the mutidimensiona direct search methods. Understand how the coordinate

More information

DISTANCE TRANSFORMATION FOR NETWORK DESIGN PROBLEMS

DISTANCE TRANSFORMATION FOR NETWORK DESIGN PROBLEMS DISTANCE TRANSFORMATION FOR NETWORK DESIGN PROBLEMS A Ridha Mahjoub, Michae Poss, Luidi Simonetti, Eduardo Uchoa To cite this version: A Ridha Mahjoub, Michae Poss, Luidi Simonetti, Eduardo Uchoa. DISTANCE

More information

A Scalable Approach for Service Chain (SC) Mapping with Multiple SC Instances in a Wide-Area Network

A Scalable Approach for Service Chain (SC) Mapping with Multiple SC Instances in a Wide-Area Network JOURNAL OF L A TEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 A Scaabe Approach for Service Chain (SC) Mapping with Mutipe SC Instances in a Wide-Area Network This is a preprint eectronic version of the

More information