CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing

Size: px
Start display at page:

Download "CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing"

Transcription

1 CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which is common in local area networks. Toay s lecture is about a ifferent type of routing, which is use between ifferent local networks. The Internet is really a network of networks (Figure 1). An autonomous system (AS) is a centrally controlle collection of routers a bunch of routers with a common aministrator. The Internet has aroun 42,000 ASes, an they span the gamut Internet Service Proviers (ISPs), universities, businesses, governments, etc. For example, Stanfor University is an AS, an so is its Internet Service Provier (Cogent), an these two ASes are irectly connecte by physical links. There are of course other ASes that Stanfor is not irectly connecte to, an sening traffic to them involves routing over a path with multiple hops. 1.1 Routing Within an AS Routing within an AS is usually one using shortest-path routing. These routing protocols resemble the shortest-path algorithms that you stuie in unergrauate algorithms (the greey Dijkstra algorithm, an the ynamic programming-base Bellman-For algorithm), with many aitional etails. Shortest-path routing requires a efinition of a shortest path, which in turn requires a efinition of ege length (in this context, calle link weight ). The simplest example is hop-count (where all link weights are 1), in which case breath-first search can be use to compute shortest paths. Alternatively, ifferent eges can have ifferent link weights, for example epening on the recent average elay along the link. Such elay-base routing brings us back to the selfish routing moel we stuie last lecture. c 2016, Tim Roughgaren. Department of Computer Science, Stanfor University, 474 Gates Builing, 353 Serra Mall, Stanfor, CA tim@cs.stanfor.eu. 1

2 Stanfor Cogent AT&T MIT Figure 1: The Internet: a network of networks. Note that in shortest path routing, all routers effectively agree on which paths are the best (the shortest ones). These common preferences are ictate by the central aministrator, through the choice of link weights. 1.2 Routing Between ASes Routing between ASes is a ifferent story. There is no central aministrator to whom all ASes report (remember these ASes span the globe). Different ASes have ifferent preferences. For example, an AS may prefer paths with the smallest monetary cost to the AS, which is a function of the AS s business agreements with other ASes, an ifferent ASes have ifferent sets of business agreements. For example, ISP#1 may want to route through ISP#2 only as a last resort (if the former has to the pay the latter a high cost). Link weights are insufficient to moel such general preferences. For example, consier the AS network in Figure 2. Assume that the noe is the estination for all traffic. The ASes 1 an 2 are labele with their favorite path (at the top) an their secon-favorite paths. Note that each AS prefers to route to the other one over routing irectly to. (Maybe charges anyone who sens traffic to it.) These preferences are inconsistent with shortest-path routing (for any choice of link weights). 2 The Borer Gateway Protocol (BGP) In the Internet, routing between ASes is one using the Borer Gateway Protocol (BGP). We next explain the most important aspects of how it works (there are of course many more etails in the actual protocol). Fix a estination AS. BGP runs in parallel for all choices of the estination, an the computations for ifferent estinations are completely unrelate. (So when one AS sens a message to another AS, it inclues a full-blown routing table, with the AS s routing plan for all 42K possible estinations.) 2

3 Figure 2: An example of an AS network where each AS prefers to route to the other one over routing irectly to. Next we escribe the intene behavior for ASes in BGP. Later we ll iscuss whether ASes have an incentive to eviate from this intene behavior (recall the BitTorrent iscussion in Lecture #5). The protocol resembles the Bellman-For shortest-path algorithm, except with the istancebase upate step replace with a more abstract upate step. Every AS v will maintain a path P v to (or the empty path, if a path from v to hasn t been foun yet). Initially, sets P to the empty path ( can reach itself via the empty path), an broacasts this fact to all of its neighbors (ASes to which it has a irect physical connection). For example, in Figure 2, the protocol begins with alerting the other two ASes about its existence. All of the ASes are then suppose to execute the following proceure in parallel, continuously an asynchronously. 1 At an AS u with neighbors N: 1. For each v N: BGP Upate Step (a) Let P v be the last path (from v to ) that v announce to u (if any). 2. Reset P u to u s favorite cycle-free path of the form (u, v) P v (if any, otherwise P u is the empty path) If P u changes, announce the new value of P u to all neighbors v N. Note that an AS u has to take care to avoi cycles if P v inclues u in it, then u cannot route using P v (traffic woul then loop forever). For example, let s return to the AS graph in Figure 2. What is the ultimate result of BGP? One possible fixe point of the protocol is shown in Figure 3(a), with 1 routing irectly 1 At the Internet scale, you can t really make any assumptions about the timing of when ifferent events occur. 2 The operator enotes path concatenation. 3

4 to an 2 routing through 1. AS 2 obviously oesn t want to upate its path, since it s using its favorite path. AS 1 isn t thrille about routing irectly to, but it has no other choice: it can t switch to routing via 2, since this woul create a cycle. This is not the only possible fixe point of BGP in the AS graph in Figure 2; Figure 3(b) shows another (symmetric) one. Which fixe point o we expect BGP to reach? It epens on the timing of the messages whichever of 1, 2 fins out first that the other is using a irect path to can switch paths an win. (a) (b) Figure 3: Two stable routings in the AS graph of Figure 2. 3 Stable Routings We call a fixe point of BGP a stable routing. That is, in a stable routing, no AS wants to change its path to, given the path choices of other ASes an the corresponing options available to u. 3 Thus Figure 3 shows two stable routings in the AS graph of Figure 2. A stable routing must be a tree, irecte into the estination. BGP maintains the invariant that the out-egree of every AS is at most 1. It also explicitly prevents cycles from forming. The only possible sink (other than isolate ASes) is. If the AS graph is not connecte, or if some ASes prefer the empty path to some of its paths to, then the tree nee not span all of the ASes. We ve alreay seen that an AS graph can have more than one stable routing. The next example shows that there might be no stable routing at all. Consier a hypothetical stable routing in the network shown in Figure 4. The resulting tree must inclue at least one ege between an another AS, say AS 1. (Otherwise all ASes are isolate, but every AS prefers the irect path to over the empty path). In any stable routing that inclues the link from 1 to, AS 3 must be using the path 31 (since this path is its favorite). Given this, AS 2 must use the path 2, since its preferre path 23 is not available. But if AS 2 uses the path 2, 3 This shoul remin you of the Nash equilibrium concept mentione in Lectures #5 an #6. We can think of the ASes as the players, the neighboring ASes of an AS u as u s available strategies, an with payoffs inuce by an AS s abstract preferences over paths. 4

5 then AS 1 wants to switch to the path 12. We conclue that there cannot be any stable routing Figure 4: An example of an AS network with no stable routing. 4 Dispute Wheels Ultimately, we want to iscuss incentives in BGP o ASes want to follow the intene behavior of the BGP protocol, or are there opportunities to game the system? But the examples in Figures 2 an 4 show that the output of BGP is not even well efine in some cases. In this section we ientify conitions on an AS graph uner which the outcome of BGP makes sense, an then in Section 6 we aress incentive issues. 4.1 No Dispute Wheel Implies BGP Convergence The following theorem ientifies a conition ( no ispute wheel, which we ll efine shortly) uner which BGP has several nice properties. Theorem 4.1 ([3]) Suppose an AS graph has no ispute wheel. Then: (a) There exists a stable routing. (b) This stable routing is unique. (c) BGP is guarantee to converge to the stable routing. Note that part (c) of the theorem is strictly stronger than (a). BGP can only converge to a stable routing, so (c) implies (a). But (a) oes not imply (c) in general: there are AS graphs with a unique stable routing in which BGP can cycle forever. (In light of Theorem 4.1, we know that such examples must have a ispute wheel.) The missing efinition is as follows. A ispute wheel consists of (for some k 2): 1. istinct ASes u 1,..., u k ; 5

6 2. (cycle-free) paths P 1,..., P k, where P i is a path from u i to ; an 3. (cycle-free) paths Q 1,..., Q k, where Q i is a path from u i to u i+1, such that, for each i = 1, 2,..., k, u i prefers the inirect path Q i P i+1 to the irect path P i. (Where by u k+1 an P k+1 we mean u 1 an P 1.) See Figure 5. The figure is somewhat misleaing, as the P i s an Q i s nee not be internally isjoint. For example, a vertex u i is allowe to appear in the mile of all of the paths P j for j i. Q k u 1 Q 1 u k P 1 P k u 2 P 2 Q 2 P 3 u 3 Figure 5: A ispute wheel. The P i s an Q i s nee not be internally isjoint. This efinition generalizes the two examples we ve seen thus far. The AS graph in Figure 2 is a ispute wheel, as seen by taking P 1 as the path 1, P 2 the path 2, Q 1 the path 12, an Q 2 the path 21. (Recall each AS prefers to route to the other over routing irectly to.) The AS graph in Figure 4 is also a ispute wheel: take P i = i for i = 1, 2, 3, Q 1 = 12, Q 2 = 23, an Q 3 = Are There Dispute Wheels in Practice? When someone subjects you to a new efinition, especially a weir one like the one above, you shoul eman two things: interesting consequences of satisfying the efinition, an interesting examples that satisfy the efinition. Theorem 4.1 takes care of the first part AS graphs without a ispute wheel have many esirable properties. But how strong is the no ispute wheel conition? For a sanity check example that is not very interesting in its own right, suppose all ASes prefer shorter paths to longer ones, with respect to some set of nonnegative link weights (with all ASes using the same link weights). Then, it s not har to prove that the corresponing AS graph has no ispute wheel (see Exercise Set #4). But this is not very satisfying the whole point of BGP is to move beyon shortest-path routing. Gao an Rexfor [1] gave a much more satisfying justification of the no ispute wheel conition, an argue that the conition shoul generally hol for realistic AS preferences. 6

7 Formally, they propose what are now known as the Gao-Rexfor conitions on an AS graph, an prove that these conitions rule out any ispute wheels. Stuying the etails of the Gao-Rexfor conitions woul take us too far afiel, but here s the iea. To first orer, pairs of ASes are in one of two possible relationships. They might be peers, who agree to carry traffic to an from each other. (E.g., all pairs of Tier 1 ISPs are peers.) Otherwise, one is the provier an the other the customer, with the customer paying the provier for connectivity to other parts of the Internet. For example, most Tier 2 ISPs have to pay one or more Tier 1 ISPs to be able to reach the entire Internet. One of the Gao-Rexfor conitions is that every AS always prefers routes through a customer over those through a peer, an those through a peer over those through a provier. This hierarchical structure of ASes prevents ispute wheels. 4 There is anecotal evience that the Gao-Rexfor conitions approximately hol for most ASes [2]. 5 Proof of Theorem 4.1 We now prove part(b) of Theorem 4.1. This will be the only proof of the lecture, an it is chosen to be representative of the types of arguments use in the other proofs. 5 In particular, we ll see why ispute wheels naturally come up in such arguments. We ll prove the contrapositive. Suppose an AS graph has two ifferent stable solutions, S an T. (Both are trees, irecte into.) The plan is to exhibit a ispute wheel. As a thought experiment, imagine oing breath-first search backwar from along eges in both S an T, an let H be the vertices reache. That is, efine H as the subset of vertices that use the same path to in both of the stable solutions. See Figure 6. If nothing else, H inclues the estination AS. We claim that there is an ege (u 1, v 1 ) such that: (i) u 1 / H; (ii) v 1 H; an (iii) (u 1, v 1 ) is in either S or T. Note that such an ege cannot be in both S an T (since v 1 is reachable backwar from by eges of S T, if (u 1, v 1 ) were also in S T, then u 1 woul also be in H, which it isn t). We prove the claim by contraiction. If not, then no eges of S or T cross the bounary of H (i.e., have one enpoint in H an the other outsie H). This means that in both S an T, the vertices that have a path to are precisely H. (If some vertex outsie H has a path to in S or T, then the path woul have to cross the bounary of H at some point.) But S an T are ientical insie H (by efinition), so this woul mean that S = T (a contraiction). So pick an ege (u 1, v 1 ) as in the claim. Say the ege is in S but not T (the case where it s in T but not S is symmetric). Since (u 1, v 1 ) S, the path u 1 uses to reach in S has (u 1, v 1 ) as the first hop, followe by whatever path P v1 uses to reach in S. Denote the path (u 1, v 1 ) P v1 by P 1. 4 Another important conition is that ASes refuse to carry transit traffic (i.e., traffic that both originates from an is estine for other ASes), except from customers. This refusal is implemente by announcing non-empty routes only to your customers. The final conition is uncontroversial: there shoul be no cycle of provier-customer relationships. 5 You will prove part (a) in Exercise Set #4. 7

8 s t H Figure 6: The set H in the proof of Theorem 4.1. The soli eges belong to both S an T. The ashe eges s an t belong to only S an T, respectively. Now switch to the other stable solution, T. Since S an T are ientical in H, an v 1 H, P v1 is also in T. Thus, the u 1 - path P 1 is an available option to u 1 in T. Since (u 1, v 1 ) / T, u 1 oes not use the path P 1 in T, an instea uses some other path P. P cannot be the empty path: if u 1 preferre the empty path over P 1, it woul have also chosen the empty path in the stable solution S (instea of P 1 ). Similarly, the first hop of P cannot have the form (u 1, w) for some w H; if u 1 preferre (u 1, w) P w over P 1 in T, then it woul o so in S as well (since w H, P w is available in S). So, P must have the form shown in Figure 7: a nonempty path from u 1 to some other vertex u 2 / H, followe by an ege (u 2, v 2 ) crossing the bounary of H, followe by the path P v2 that v 2 uses to get to (in both S an T ). Define Q 1 as the first part of the path (traveling from u 1 to u 2 ), an P 2 as the secon part (from u 2 to ). By efinition, u 1 prefers the path P = Q 1 P 2 to P 1. We now repeat the argument starting from u 2. The ege (u 2, v 2 ) lies in T (because u 2 chooses the path P 2 in T ), an since it crosses the bounary of H, it cannot also lie in S (see the argument above). Since v 2 H an S, T agree insie H, the path P 2 was one of u 2 s available options in S. Since (u 2, v 2 ) / S, in S, u 2 took some other path to, necessarily of the form shown in Figure 7. This path has the form Q 2 P 3, for a path Q 2 from u 2 to some other vertex u 3 (ifferent from u 2, possibly the same as u 1 ), an for a path P 3 from u 3 to, with the first hop of P 3 crossing the bounary of H. We can iterate this argument as many times as we want, to efine u i s, P i s, an Q i s. At some point, a u i will repeat (e.g., say u 1 = u k+1 ). We claim that the vertices u 1,..., u k with the paths P 1,..., P k an Q 1,..., Q k form a ispute wheel. The proof just checks all the conitions: (i) the u i s are istinct, an k 2; (ii) each path P i is from u i to ; (iii) each path Q i is from u i to u i+1 (with path P k from u k to u 1 ); an (iv) each u i prefers Q i P i+1 to P i (by construction). This completes the proof. 8

9 t 3 t u 1 s 2 1 u 2 u 3 s 1 t 2 s 3 v 1 v 2 v 3 H Figure 7: Illustration for the proof of Theorem 4.1. The soli eges belong to both S an T. The ashe eges s 1, s 2, s 3 an t 1, t 2, t 3 belong to only S an T, respectively. Here, P 1 = s 1 P v1, Q 1 = t 1, P 2 = t 2 P v2, P 2 = t 2 P v2, Q 2 = s 2, P 3 = s 3 P v3, an Q 3 = t 3. 6 Incentive Issues We now focus on incentive issues in AS graphs that have no ispute wheel (where the result of BGP is well efine). Can ASes game BGP? Is there a beneficial unilateral eviation from the intene behavior escribe in Section 2? 6.1 Types of Deviations There are several ways an AS coul eviate from BGP. Here are three types of eviations: 1. Choose your path P u to be something other than your favorite among the available options. 2. Withhol information about your path from (some of) your neighbors. 3. Announce a path to (some of) your neighbors that is ifferent from the one you re actually using, possibly a path that oesn t even exist in the network. It s clear that an AS is in a position to execute the first two types of eviations. What about the thir type? Can an AS really get away with announcing fake paths to its neighbors? It may surprise you that fake path announcements are happening in BGP all the time. One of the more famous examples was in February of Pakistan Telecom wante to block 9

10 access from Pakistan to YouTube, because of some offensive vieos. They implemente this by rerouting YouTube traffic to a local server (just a Web page saying access blocke. ). For whatever reason (accientally?), Pakistan Telecom announce this new route to YouTube to some of its neighbors. An ISP in Hong Kong switche its route to YouTube in secons, an much of the Internet quickly followe suit. 6 The results were not goo for anyboy: wie swaths of the Internet coul not reach YouTube, an Pakistan Telecom was burie uner all the requests that were being irecte to it. 7 The vulnerability of BGP to such mistakes an attacks is obviously a problem, an for many years there have been ongoing efforts to roll out a new an more secure version of BGP, such as the propose BGPsec protocol [4]. As you can imagine, with 42,000 ASes an no central authority, it s not easy to eploy major changes to the protocol. 6.2 Examples First we note that the example in Figure 2, where there are two stable routings, alreay shows that withholing information about your path can be beneficial. Recall that each of the 2 ASes wants to route through the other rather than irectly to the estination. If AS 1 never announces any paths an AS 2 follows the BGP protocol, then the protocol converges to the stable routing that AS 1 prefers (with 2 routing irectly to ). But this example is a ispute wheel, an we alreay know that BGP oesn t function well in the presence of ispute wheels. So what if there are no ispute wheels? To see that announcing fake paths can be beneficial, consier the AS graph in Figure 8. It is similar to the AS graph in Figure 4, except there is no irect physical connection between AS 3 an the estination. If the ege 3 were in the network an AS 3 preferre this path less than 31, there woul be a ispute wheel. With the ege missing, however, there is no ispute wheel (as you re invite to check). It may look weir that AS 2 is stating a preference for the non-existent path 23. But remember that there are 42,000 ASes in the Internet, an they are not always very open about who they re connecte to, an the network is always changing. How is AS 2 suppose to know whether or not there is a irect physical link between AS 3 an? An AS has to be reay to express preferences over any paths that it might encounter. Suppose all of the ASes are honest. Since there is no ispute wheel, BGP converges to a unique stable routing, shown in Figure 9(a). AS 3 gets its secon-favorite path. If AS 3 announces the fake path 3 to its neighbors, however, then BGP converges to the routing shown in Figure 9(b). The figure shows the paths that are actually use; AS 2 has been upe into thinking that its traffic is following its preferre path 23, when in reality it s 6 Why i ISPs prefer the new fake route over the trie-an-true real one? Because one commonly use rule is longest prefix matching, which prefers more targete routes to less specific ones. The true path was liste for a block of 1024 IP aresses (i.e., with the first 22 of the 32 bits of the IP aress specifie) while the path avertise by Pakistan Telecom was for a subset of 256 of these IP aresses (i.e., with 2 aitional bits specifie). This trick is sometimes calle prefix hijacking. 7 An earlier example occurre in 2004, when a Turkish ISP basically pretene to be the entire Internet, resulting in lots of traffic getting reirecte to it. 10

11 Figure 8: An example of an AS network in which announcing a fake path can be beneficial. being route also through AS 1. (If AS 2 knew the actual path being use, the routing woul not be stable.) In this new routing, AS 3 gets its favorite path, an we conclue that announcing fake paths can be beneficial even when there is no ispute wheel. 8 3 (a) 3 (b) Figure 9: Stable routings in the AS graph of Figure 8 if (a) all of the ASes are honest; (b) AS 3 announces the fake path Incentive-Compatibility with Path Verification We alreay note that fake path announcements really are possible (inee, frequent) in the current BGP protocol. But it is plausible that in the future, faking paths will not be so easy. For example, the propose BGPsec protocol uses cryptographic signatures to verify the existence of announce paths. Do incentive issues persist if fake path announcements are isallowe? Theorem 6.1 ([5]) Assume that: 1. No AS can announce a path that oesn t exist. 8 In effect, the fake route announcement creates a fictitious ispute wheel, which is enough to screw things up. 11

12 2. The AS graph oes not have a ispute wheel. Then, no AS has an incentive to unilaterally eviate from the intene behavior in BGP (assuming all other ASes follow BGP). That is, no AS can benefit from withholing paths from neighbors, from choosing a path other than its favorite available option, or from falsely announcing a ifferent route that actually exists in the network. Theorem 6.1 is satisfying an surprising, as many network protocols use in practice are at least somewhat vulnerable to gaming by participants, even uner restrictive assumptions (e.g., recall the BitTorrent iscussion in Lecture #5). The theorem can also be extene to protect against coalitions of eviators if a group of ASes eviates in a coorinate way from BGP an at least one of the coalition members becomes strictly better off, then a ifferent member will be worse off [5]. We won t prove Theorem 6.1, but the intuition is similar to that for the proof of uniqueness given in Section 5. Roughly, if an AS ha a profitable eviation, then the stable routings reache before an after the eviation play the same role as the ifferent stable routings in the proof of Theorem 4.1 (leaing to a ispute wheel). This argument isn t quite right, because after the eviation the routing is only stable in the mins of the ASes, who may have been misle about which path their traffic is being route on (recall Figure 9(b)). It turns out that, as long as ASes can only be misle with existing paths, an analogous argument can still be mae. References [1] L. Gao an J. Rexfor. Stable Internet routing without global coorination. IEEE/ACM Transactions on Networking, 9(6): , [2] P. Gill, M. Schapira, an S. Golberg. A survey of interomain routing policies. Computer Communication Review, 44(1):28 34, [3] T. Griffin, F. B. Shepher, an G. T. Wilfong. The stable paths problem an interomain routing. IEEE/ACM Transactions on Networking, 10(2): , [4] Internet Engineering Task Force. BGPsec protocol specification. Version 18. August 18, [5] H. Levin, M. Schapira, an A. Zohar. Interomain routing an games. SIAM Journal on Computing, 40(6): ,

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus

More information

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

Figure 1: 2D arm. Figure 2: 2D arm with labelled angles

Figure 1: 2D arm. Figure 2: 2D arm with labelled angles 2D Kinematics Consier a robotic arm. We can sen it commans like, move that joint so it bens at an angle θ. Once we ve set each joint, that s all well an goo. More interesting, though, is the question of

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

A Measurement Framework for Pin-Pointing Routing Changes

A Measurement Framework for Pin-Pointing Routing Changes A Measurement Framework for Pin-Pointing Routing Changes Renata Teixeira Univ. Calif. San Diego La Jolla, CA teixeira@cs.ucs.eu Jennifer Rexfor AT&T Labs Research Florham Park, NJ jrex@research.att.com

More information

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples

More information

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations

More information

1 Surprises in high dimensions

1 Surprises in high dimensions 1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

2-connected graphs with small 2-connected dominating sets

2-connected graphs with small 2-connected dominating sets 2-connecte graphs with small 2-connecte ominating sets Yair Caro, Raphael Yuster 1 Department of Mathematics, University of Haifa at Oranim, Tivon 36006, Israel Abstract Let G be a 2-connecte graph. A

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stolyar Abstract Backpressure-base aaptive routing

More information

Divide-and-Conquer Algorithms

Divide-and-Conquer Algorithms Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:

More information

Towards a Realistic Model of Incentives in Interdomain Routing: Decoupling Forwarding from Signaling

Towards a Realistic Model of Incentives in Interdomain Routing: Decoupling Forwarding from Signaling Towards a Realistic Model of Incentives in Interdomain Routing: Decoupling Forwarding from Signaling Aaron D. Jaggard DIMACS Rutgers University Joint work with Vijay Ramachandran (Colgate) and Rebecca

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body International Engineering Mathematics Volume 04, Article ID 46593, 7 pages http://x.oi.org/0.55/04/46593 Research Article Invisci Uniform Shear Flow past a Smooth Concave Boy Abullah Mura Department of

More information

6 Gradient Descent. 6.1 Functions

6 Gradient Descent. 6.1 Functions 6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

Ad-Hoc Networks Beyond Unit Disk Graphs

Ad-Hoc Networks Beyond Unit Disk Graphs A-Hoc Networks Beyon Unit Disk Graphs Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 8092 Zurich, Switzerlan {kuhn, wattenhofer, zollinger}@inf.ethz.ch ABSTRACT

More information

Optimal Oblivious Path Selection on the Mesh

Optimal Oblivious Path Selection on the Mesh Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract

More information

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Shortest Paths Date: 10/13/15

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Shortest Paths Date: 10/13/15 600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Shortest Paths Date: 10/13/15 14.1 Introduction Today we re going to talk about algorithms for computing shortest

More information

Additional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication

Additional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Aitional Divie an Conquer Algorithms Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Divie an Conquer Closest Pair Let s revisit the closest pair problem. Last

More information

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

Cooperative Inter-Domain Traffic Engineering Using Nash Bargaining and Decomposition

Cooperative Inter-Domain Traffic Engineering Using Nash Bargaining and Decomposition Cooperative Inter-Domain Traffic Engineering Using Nash Bargaining an Decomposition Gireesh Shrimali Aitya Akella Almir Mutapcic Stanfor University, University of Wisconsin-Maison Abstract We present a

More information

Proving Vizing s Theorem with Rodin

Proving Vizing s Theorem with Rodin Proving Vizing s Theorem with Roin Joachim Breitner March 25, 2011 Proofs for Vizing s Theorem t to be unwiely unless presente in form a constructive algorithm with a proof of its correctness an termination.

More information

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks Coorinating Distribute Algorithms for Feature Extraction Offloaing in Multi-Camera Visual Sensor Networks Emil Eriksson, György Dán, Viktoria Foor School of Electrical Engineering, KTH Royal Institute

More information

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

Route Registries (IRRs) [1] are use to store an istribute RPSL specications. Thir, a collection of software tools, calle the RAToolSet [2], gives netw

Route Registries (IRRs) [1] are use to store an istribute RPSL specications. Thir, a collection of software tools, calle the RAToolSet [2], gives netw An Analysis of BGP Convergence Properties Timothy G. Grin griffin@research.bell-labs.com, Goron Wilfong Bell Laboratories, Lucent Technologies 6 Mountain Avenue, Murray Hill NJ gtw@research.bell-labs.com

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Two Dimensional-IP Routing

Two Dimensional-IP Routing Two Dimensional-IP Routing Mingwei Xu Shu Yang Dan Wang Hong Kong Polytechnic University Jianping Wu Abstract Traitional IP networks use single-path routing, an make forwaring ecisions base on estination

More information

Efficient Recovery from False State in Distributed Routing Algorithms

Efficient Recovery from False State in Distributed Routing Algorithms Efficient Recovery from False State in Distribute Routing Algorithms Daniel Gyllstrom, Suarshan Vasuevan, Jim Kurose, Gerome Milau Department of Computer Science University of Massachusetts Amherst {pg,

More information

Frequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises

Frequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises verview Frequent Pattern Mining comprises Frequent Pattern Mining hristian Borgelt School of omputer Science University of Konstanz Universitätsstraße, Konstanz, Germany christian.borgelt@uni-konstanz.e

More information

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Enabling Rollback Support in IT Change Management Systems

Enabling Rollback Support in IT Change Management Systems Enabling Rollback Support in IT Change Management Systems Guilherme Sperb Machao, Fábio Fabian Daitx, Weverton Luis a Costa Coreiro, Cristiano Bonato Both, Luciano Paschoal Gaspary, Lisanro Zambeneetti

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpenCourseWare http://ocw.mit.eu 6.854J / 18.415J Avance Algorithms Fall 2008 For inormation about citing these materials or our Terms o Use, visit: http://ocw.mit.eu/terms. 18.415/6.854 Avance Algorithms

More information

Uninformed search methods

Uninformed search methods CS 1571 Introuction to AI Lecture 4 Uninforme search methos Milos Hauskrecht milos@cs.pitt.eu 539 Sennott Square Announcements Homework assignment 1 is out Due on Thursay, September 11, 014 before the

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stoylar arxiv:15.4984v1 [cs.ni] 27 May 21 Abstract

More information

Network-Destabilizing Attacks

Network-Destabilizing Attacks Network-Destabilizing Attacks Robert Lychev Sharon Goldberg Michael Schapira Abstract The Border Gateway Protocol (BGP) sets up routes between the smaller networks that make up the Internet. Despite its

More information

The Strategic Justification for BGP

The Strategic Justification for BGP The Strategic Justification for BGP Hagay Levin Michael Schapira Aviv Zohar Abstract The Internet consists of many administrative domains, or Autonomous Systems (ASes), each owned by an economic entity

More information

Design of Policy-Aware Differentially Private Algorithms

Design of Policy-Aware Differentially Private Algorithms Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

Multicast Routing : Computer Networking. Example Applications. Overview

Multicast Routing : Computer Networking. Example Applications. Overview Multicast outing 5-744: Computer Networking Unicast: one source to one estination Multicast: one source to many estinations Two main functions: Efficient ata istribution Logical naming of a group L-0 Multicast

More information

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao

More information

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

1 Shortest Path Problems

1 Shortest Path Problems CS268: Geometric Algorithms Hanout #7 Design an Analysis Original Hanout #18 Stanfor University Tuesay, 25 February 1992 Original Lecture #8: 4 February 1992 Topics: Shortest Path Problems Scribe: Jim

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Chapter 5 Proposed models for reconstituting/ adapting three stereoscopes

Chapter 5 Proposed models for reconstituting/ adapting three stereoscopes Chapter 5 Propose moels for reconstituting/ aapting three stereoscopes - 89 - 5. Propose moels for reconstituting/aapting three stereoscopes This chapter offers three contributions in the Stereoscopy area,

More information

Topics. Computer Networks and Internets -- Module 5 2 Spring, Copyright All rights reserved.

Topics. Computer Networks and Internets -- Module 5 2 Spring, Copyright All rights reserved. Topics Internet concept an architecture Internet aressing Internet Protocol packets (atagrams) Datagram forwaring Aress resolution Error reporting mechanism Configuration Network aress translation Computer

More information

Secure Network Coding for Distributed Secret Sharing with Low Communication Cost

Secure Network Coding for Distributed Secret Sharing with Low Communication Cost Secure Network Coing for Distribute Secret Sharing with Low Communication Cost Nihar B. Shah, K. V. Rashmi an Kannan Ramchanran, Fellow, IEEE Abstract Shamir s (n,k) threshol secret sharing is an important

More information

HOW DO SECURITY TECHNOLOGIES INTERACT WITH EACH OTHER TO CREATE VALUE? THE ANALYSIS OF FIREWALL AND INTRUSION DETECTION SYSTEM

HOW DO SECURITY TECHNOLOGIES INTERACT WITH EACH OTHER TO CREATE VALUE? THE ANALYSIS OF FIREWALL AND INTRUSION DETECTION SYSTEM HOW O SECURTY TECHNOLOGES NTERACT WTH EACH OTHER TO CREATE VALUE? THE ANALYSS O REWALL AN NTRUSON ETECTON SYSTEM Huseyin CAVUSOGLU Srinivasan RAGHUNATHAN Hasan CAVUSOGLU Tulane University University of

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

Table-based division by small integer constants

Table-based division by small integer constants Table-base ivision by small integer constants Florent e Dinechin, Laurent-Stéphane Diier LIP, Université e Lyon (ENS-Lyon/CNRS/INRIA/UCBL) 46, allée Italie, 69364 Lyon Ceex 07 Florent.e.Dinechin@ens-lyon.fr

More information

The Strategic Justification for BGP

The Strategic Justification for BGP MPRA Munich Personal RePEc Archive The Strategic Justification for BGP Hagay Levin and Michael Schapira and Aviv Zohar The Hebrew University of Jerusalem 20. November 2006 Online at http://mpra.ub.uni-muenchen.de/2110/

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.

More information

Consistent Updates in Software Defined Networks: On Dependencies, Loop Freedom, and Blackholes

Consistent Updates in Software Defined Networks: On Dependencies, Loop Freedom, and Blackholes onsistent Upates in Software Define Networks: On Depenencies, Loop Freeom, an Blackholes Klaus-Tycho Förster ETH urich foklaus@ethz.ch Ratul Mahajan Microsoft Research ratul@microsoft.com Roger Wattenhofer

More information

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times Algorithm for Intermoal Optimal Multiestination Tour with Dynamic Travel Times Neema Nassir, Alireza Khani, Mark Hickman, an Hyunsoo Noh This paper presents an efficient algorithm that fins the intermoal

More information

A Plane Tracker for AEC-automation Applications

A Plane Tracker for AEC-automation Applications A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)

More information

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:

More information

ACE: And/Or-parallel Copying-based Execution of Logic Programs

ACE: And/Or-parallel Copying-based Execution of Logic Programs ACE: An/Or-parallel Copying-base Execution of Logic Programs Gopal GuptaJ Manuel Hermenegilo* Enrico PontelliJ an Vítor Santos Costa' Abstract In this paper we present a novel execution moel for parallel

More information

Recitation Caches and Blocking. 4 March 2019

Recitation Caches and Blocking. 4 March 2019 15-213 Recitation Caches an Blocking 4 March 2019 Agena Reminers Revisiting Cache Lab Caching Review Blocking to reuce cache misses Cache alignment Reminers Due Dates Cache Lab (Thursay 3/7) Miterm Exam

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis

More information

Chapter 3. Set Theory. 3.1 What is a Set?

Chapter 3. Set Theory. 3.1 What is a Set? Chapter 3 Set Theory 3.1 What is a Set? A set is a well-defined collection of objects called elements or members of the set. Here, well-defined means accurately and unambiguously stated or described. Any

More information

Animated Surface Pasting

Animated Surface Pasting Animate Surface Pasting Clara Tsang an Stephen Mann Computing Science Department University of Waterloo 200 University Ave W. Waterloo, Ontario Canaa N2L 3G1 e-mail: clftsang@cgl.uwaterloo.ca, smann@cgl.uwaterloo.ca

More information

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,

More information

Link State Routing & Inter-Domain Routing

Link State Routing & Inter-Domain Routing Link State Routing & Inter-Domain Routing CS640, 2015-02-26 Announcements Assignment #2 is due Tuesday Overview Link state routing Internet structure Border Gateway Protocol (BGP) Path vector routing Inter

More information

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

B-Splines and NURBS Week 5, Lecture 9

B-Splines and NURBS Week 5, Lecture 9 CS 430/585 Computer Graphics I B-Splines an NURBS Week 5, Lecture 9 Davi Breen, William Regli an Maxim Peysakhov Geometric an Intelligent Computing Laboratory Department of Computer Science Drexel University

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

1 Counting triangles and cliques

1 Counting triangles and cliques ITCSC-INC Winter School 2015 26 January 2014 notes by Andrej Bogdanov Today we will talk about randomness and some of the surprising roles it plays in the theory of computing and in coding theory. Let

More information

Pairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11:

Pairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11: airwise alignment using shortest path algorithms, Gunnar Klau, November 9,, : 3 3 airwise alignment using shortest path algorithms e will iscuss: it graph Dijkstra s algorithm algorithm (GDU) 3. References

More information

Interdomain routing CSCI 466: Networks Keith Vertanen Fall 2011

Interdomain routing CSCI 466: Networks Keith Vertanen Fall 2011 Interdomain routing CSCI 466: Networks Keith Vertanen Fall 2011 Overview Business relationships between ASes Interdomain routing using BGP Advertisements Routing policy Integration with intradomain routing

More information

An Agent-based Model for the Evolution of the Internet Ecosystem

An Agent-based Model for the Evolution of the Internet Ecosystem An Agent-based Model for the Evolution of the Internet Ecosystem Amogh Dhamdhere Constantine Dovrolis Georgia Tech The Internet Ecosystem 27,000 autonomous networks independently operated and managed The

More information

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle

More information

CS 204: BGP. Jiasi Chen Lectures: MWF 12:10-1pm Humanities and Social Sciences

CS 204: BGP. Jiasi Chen Lectures: MWF 12:10-1pm Humanities and Social Sciences CS 204: BGP Jiasi Chen Lectures: MWF 12:10-1pm Humanities and Social Sciences 1403 http://www.cs.ucr.edu/~jiasi/teaching/cs204_spring17/ 1 Overview AS relationships Inter-AS routing BGP Example Paper discussion

More information

Solutions to Tutorial 1 (Week 8)

Solutions to Tutorial 1 (Week 8) The University of Syney School of Mathematics an Statistics Solutions to Tutorial 1 (Week 8) MATH2069/2969: Discrete Mathematics an Graph Theory Semester 1, 2018 1. In each part, etermine whether the two

More information

the intruer within the room (P; ) before the intruer reaches? The 1-searcher is allowe to move an change the irection of the ashlight arbitrarily an s

the intruer within the room (P; ) before the intruer reaches? The 1-searcher is allowe to move an change the irection of the ashlight arbitrarily an s International Journal of Computational Geometry & Applications c Worl Scientic Publishing Company SEARCHING A POLYGONAL ROOM WITH ONE DOOR BY A 1-SEARCHER JAE-HA LEE, SANG-MIN PARK an KYUNG-YONG CHWA Department

More information

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15 600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/3/15 25.1 Introduction Today we re going to spend some time discussing game

More information

A Convex Clustering-based Regularizer for Image Segmentation

A Convex Clustering-based Regularizer for Image Segmentation Vision, Moeling, an Visualization (2015) D. Bommes, T. Ritschel an T. Schultz (Es.) A Convex Clustering-base Regularizer for Image Segmentation Benjamin Hell (TU Braunschweig), Marcus Magnor (TU Braunschweig)

More information