A Network Bandwidth Computation Technique for IP Storage with QoS Guarantees

Size: px
Start display at page:

Download "A Network Bandwidth Computation Technique for IP Storage with QoS Guarantees"

Transcription

1 A Network Bandwdth Computaton Technque for IP Storage wth QoS Guarantees Young Jn Nam 1, Junkl Ryu 1, Chank Park 1, and Jong Suk Ahn 2 1 Department of Computer Scence and Engneerng Pohang Unversty of Scence and Technology/PIRL Kyungbuk, Republc of Korea {yjnam,lancer,cpark}@postech.ac.kr 2 Department of Computer Engneerng Dongguk Unversty, Seoul, Republc of Korea jahn@dgu.ac.kr Abstract. IP storage becomes more commonplace wth the prevalence of the SCSI (Internet SCSI) protocol that enables the SCSI protocol to run over the exstng IP network. Meanwhle, storage QoS that assures a requred storage servce for each storage clent has ganed n mportance wth ncreased opportuntes for multple storage clents to share the same IP storage. Consderng the exstence of other competng network traffc n IP network, we have to provde storage I/O traffc wth guaranteed network bandwdth. Most mportantly, we need to calculate the requred network bandwdth to assure a gven storage QoS requrement between a storage clent and IP storage. Ths paper proposes a network bandwdth computaton technque that not only accounts for the overhead caused by the underlyng network protocols, but also guarantees the mnmum data transfer delay over the IP network. Performance evaluatons wth varous I/O workload patterns on our IP storage testbed verfy the correctness of the proposed technque; that s, allocatng a part (0.6 20%) of the entre network bandwdth can assure the gven storage QoS requrements. 1 Introducton Storage Area Networks (SAN), such as Fber Channel and Ggabt Ethernet, have enabled a plethora of storage systems to be mantaned as a storage pool, resultng n reduced total cost of ownershp, effectve storage resource management, etc. Such SAN-based storage systems are advantageous n terms of scalablty and confgurablty, compared wth SCSI bus-based storage systems. Accordngly, a few data transmsson protocols have newly emerged to support the SAN envronment. Fber Channel protocol (FCP) s developed for FC-based SAN, and SCSI recently ratfed by Internet Engneerng Task Force s made for IP SAN. A man advantage of SCSI s that the SCSI can operate on standard network components, such as Ethernet [1]; that s, t explots exstng features and tools that have been developed for the IP network. Thus, ths paper focuses H. Jn et al. (Eds.): NPC 2004, LNCS 3222, pp , c IFIP Internatonal Federaton for Informaton Processng 2004

2 474 Y.J. Nam et al. on the storage envronment usng IP-based SAN (IP storage), where storage devces are attached to IP networks, and storage clents communcate wth the storage devces va the SCSI protocol [1]. An ntator-mode SCSI protocol runs on the storage clent, whereas a target-mode SCSI protocol operates on the IP storage. Note that the tradtonal SCSI protocol operates on top of the SCSI protocol layer that transmts a gven SCSI command to ts assocated IP storage over the IP network. Wth the advance n storage technologes n terms of storage space and I/O performance, the chances ncrease that multple storage clents share the same storage. A dfferent storage clent may requre a dfferent storage servce, called storage Qualty of Servce (QoS); that s, each storage clent requres recevng a guaranteed storage servce, ndependently of the status of the I/O servces n other storage clents. Unfortunately, the storage tself does not contan any feature of assurng storage QoS. As a result, recent research efforts [2,3] try to add the QoS feature to varous types of storage systems. However, notce that the prevous research emphaszes the QoS ssue only wthn the storage system, whereas t s assumed that the SAN tself has no QoS ssues. Note that, FCbased SAN s used only for storage I/O traffc. IP storage, however, transmts ts data over the IP network, where storage I/O traffc s lkely to coexst wth the other network traffc. Consderng ths stuaton leads us to preserve an amount of network bandwdth for the storage I/O traffc between a storage clent and ts assocated IP storage to avod any probable nterference wth the other network traffc. A nave approach s to allocate the full network bandwdth (or separate dedcated IP network) that s large enough to serve the storage I/O traffc wth QoS guarantee for a par of a storage clent and ts assocated IP storage. However, t can be easly nferred that ths approach ends up beng wth under-utlzaton of IP network resources, even though t can certanly guarantee a gven storage QoS requrement. By contrast, unless enough network bandwdth resdes between the storage clent and the IP storage, the storage QoS requrement s no longer guaranteed wth lower I/O throughput (I/O requests per seconds) and hgher response tme due to ncreased data transfer delays. Ths paper emphaszes the problem of computng the requred network bandwdth to meet a gven storage QoS requrement. It proposes a network bandwdth computaton technque that not only accounts for overhead caused by the underlyng network protocols, but also guarantees the mnmum data transfer delay over the IP network. In the case of FC-based SAN envronments, Ward et. al. n [4] proposed a scheme to automatcally desgn an FC-based SAN that not only serves a gven set of storage I/O traffc between storage clents and storage systems, but also mnmzes the system cost. 2 Problem Descrpton We begn by defnng a few notatons to be used throughout the paper. C and Q represent the storage clent and ts storage QoS requrement, respectvely. Generally, the storage QoS requrement s defned as Q = {f,ops,sz,s,rt }.

3 A Network Bandwdth Computaton Technque for IP Storage 475 The notaton of f represents the rato of read I/O requests. In addton, ops, sz,andrt represent the number of I/O requests per second (brefly IOPS), an average I/O request sze, and an average response tme requested from C, respectvely. I/O access pattern s random wth s = 0 and purely sequental wth s = 1. Note that our network bandwdth computaton does not depend on the value of s.wedenotewthb and b the network bandwdth allocated for the drecton from C and ts assocated IP storage and for ts opposte drecton, respectvely. Then, the problem that ths paper wll solve can be descrbed as follows: Compute b and b that satsfy the gven Q for the storage clent C and ts assocated IP storage. Note that we assume that the storage resources except for network resources (bandwdth) have been approprately reserved to satsfy the storage QoS requrement Q. 3 The Proposed Technque To begn, we wll explan the protocol layerng for SCSI protocol and the specfc behavor of the SCSI protocol for read and wrte I/O requests. The SCSI protocol data unt (PDU) conssts of a 48-byte SCSI header and SCSI data of a varable length. The maxmum SCSI data length reles on the types of underlyng Ethernet cards. Typcally, t ranges from 1,394 through 8,894 bytes. The TCP/IP headers and Ethernet header respectvely occupy 40 bytes and 18 bytes. Fgure 1 presents the protocol behavors for read and wrte I/O requests. In the case of the read I/O request, as shown n Fgure 1(a), the storage clent sends the READ SCSI command to the IP storage. Next, after readng the requested data from ts nternal dsk drves, the IP storage transmts the data to the storage clent n the DATA IN phase. Note that the data are to be fragmented nto smaller peces accordng to the maxmum SCSI data length. Fnally, the IP storage sends the response message to the storage clent. The SCSI CMD-Read PDU (106B) DATA_IN PDU..... DATA_IN PDU CMD-Resp PDU (106B) CMD-Wrte PDU (106B) (w/ DATA_OUT PDU) DATA_OUT PDU..... DATA_OUT PDU R2T PDU (106B) DATA_OUT PDU CMD-Resp PDU (106B) (a) read (b) wrte Fg. 1. SCSI protocol behavors for read and wrte I/O requests: (a) read and (b) wrte

4 476 Y.J. Nam et al. protocol behavor for the wrte I/O request s more complcated than that of the read I/O request because of free buffer management and performance optmzaton technques lke mmedate/unsolcted data transmsson. The storage clent sends the WRITE SCSI command to the IP storage. Unless the data sze s greater than the maxmum SCSI data length, t s transmtted along wth the wrte SCSI command. Ths results n collapsng the COMMAND phase and the DATA OUT phase [1]. It s called mmedate data transmsson [1]. If the data sze s greater than FrstBurstLength, the storage clent transfers the data of the frst FrstBurstLength bytes to the IP storage wthout recevng the Ready to Transfer (R2T) message from the IP storage that s used to secure free buffer space to store the wrte data. Ths process s called unsolcted data transmsson [1]. Note that the mmedate data transmsson s combned wth the unsolcted data transmsson. Afterwards, the storage clent transfers data only when t receves the R2T message from the IP storage. It s called solct data transmsson [1]. In what follows, we derve a set of equatons to compute the requred network bandwdth to meet a gven storage QoS requrement. We start by computng the amount of data transfer, ncludng the underlyng protocol overhead for gven read and wrte I/O requests of sze s.wedenotewthdr (sz ) the amount of data transfer from the storage clent to the IP storage for the read I/O request of sze sz,anddr (sz ) for the opposte drecton. From the protocol behavor for the read I/O request, as shown n Fgure 1(a), we can easly obtan Dr (sz ) and Dr (sz ) as follows: Dr (sz )=ov prot, (1) Dr (sz )=2ov prot + sz S f + sz mod Ŝ Ŝf, f (2) where Ŝf = S f ov prot. The notaton of ov prot represents the 106-byte protocol overhead caused by the Ethernet header, the TCP/IP header, and the SCSI header. The notaton of S f represents the underlyng Ethernet frame sze. Next, we calculate the amount of data transfer for the wrte I/O request. To begn, the storage clent sends the agreed-upon amount of data (unsolcted data transmsson) to IP storage wthout havng an R2T message. We assume that the behavor of each data transfer follows that of the solct data transmsson because the network traffc under our consderaton s heavy enough. However, f the I/O request sze s not greater than the maxmum SCSI data length, the assocated data s delvered to the IP storage by usng the mmedate data transmsson. As wth the read I/O request, we denote wth Dw (sz ) the amount of data from the storage clent to the IP storage for the wrte I/O request, and Dw (sz ) for the opposte drecton. Based on the SCSI protocol behavor for the wrte I/O request, as shown n Fgure 1(b), Dw (sz )anddw (sz )can be obtaned as follows: { Dw (sz ovprot + sz f sz )= Ŝf, (3) ov prot + sz S Ŝ f + sz mod Ŝf otherwse f

5 A Network Bandwdth Computaton Technque for IP Storage 477 { Dw ovprot f sz (sz )= FrstBurstLength. (4) 2ov prot otherwse If the data sze s not greater than the maxmum SCSI data length of Ŝ f, Dw c z(sz )sov prot + sz. Otherwse, t ncludes sz tmes of the maxmum Ŝ f Ethernet frame sze of S f and the remanng data wth the protocol overhead of ov prot.asfordw (sz ), f the data sze s not greater than FrstBurstLength, Dw (sz ) s equal to the sze of the SCSI response message. Otherwse, t becomes two tmes of ov prot, because the R2T message s also delvered to the storage clent as well as the SCSI response message. Next, we defne wth the average amount of data transfer ncludng the underlyng protocol overhead from the storage clent to the IP storage for the sz szed I/O request. In addton, we defne wth for the opposte drecton. From Equaton (1) (4), we can obtan and as follows: = {f Dr (sz )+(1 f )Dw (sz )}ops, (5) = {f Dr (sz )+(1 f )D w (sz )}ops. (6) and s expected to assure the The network bandwdth allocaton wth requested maxmum storage bandwdth derved by multplyng sz and ops. However, they may not guarantee the demanded response tme of rt. For example, notce that Equaton (5) and (6) result n a lower network bandwdth wth a smaller sz ops. Ths mples that the chances ncrease that each I/O request of sze sz experences a longer transmsson delay on IP network that s most lkely to ental a volaton of the demanded response tme. Thus, we ntroduce the mnmum network bandwdth to assure the demanded response tme of rt.wedenotewthm and m the mnmum network bandwdth for each drecton. The values of m and m are determned such that the transmsson delay of each I/O request are not greater than α rt, where 0 <α < 1. Usually, α s determned accordng to the margnal response tme to meet rt n the phase of desgnng the assocated IP storage [2,5,3]. For example, f the IP storage s desgned to assure 15msec for gven rt = 20msec, the values of α can range from 0 through We compute m and m from a smple relatonshp that the expected transmsson delay s nversely proportonal to the allocated network bandwdth wthout accountng for the effects of traffc congeston control, IP routng, the transmsson buffer sze, TCP retransmsson, etc. The m and m m m By denotng wth b are wrtten as follows: = max{ f Dr = max{ f Dr and b the network bandwdth for each drecton re- and b as follows: qured to guarantee a gven Q, we fnally have b b b (sz ), 1 f Dw (sz )}, (7) α rt (sz ), 1 f Dw (sz )}. (8) α rt = max{,m }, (9) = max{,m }. (10)

6 478 Y.J. Nam et al. 4 Performance Evaluatons We set up an expermental testbed for IP storage to evaluate the performance of the proposed technque.we use two Intel Pentum III based desktops for the storage clent and the IP storage. Both systems are attached to a Ggabt IP network va Ggabt Ethernet cards and a swtch. Assume that no other traffc exsts between the two systems. The maxmum sze of the Ethernet frame s 1500 bytes. The Lnux kernel works on top of the storage clent and IP storage. The storage clent ncludes the ntator-mode SCSI drver developed by the Unversty of New Hampshre [6], and the IP storage contans the targetmode SCSI drver for operatng the SCSI protocol. The network bandwdth s controlled by Token Bucket Flterng (TBF) [7]. We beleve that ths type of end-to-end traffc control works because no other traffc exsts between the storage clent and the IP storage. Table 1 shows the measured ops and rt for varous QoS requrements of Q 1 Q 4 when the amount of network bandwdth s computed by the proposed technque. In addton, they are compared wth the results wth the full network bandwdth for the same QoS requrements. We denote wth prot-rt and full for the proposed technque and the full network bandwdth, respectvely. Each Table 1. Results of ops and rt for the varous QoS requrements of Q 1 Q 8 by the proposed technque (prot-rt) and the full network bandwdth allocaton (full) QoS Technque Toward IP storage Toward clent ops rt Q 1 prot-rt 0.05MB/s 0.60MB/s 84(100%) 9.74ms full MB/s 100MB/s 82(100%) 9.70ms Q 2 prot-rt 1.84MB/s 0.17MB/s 265(99%) 2.59ms full MB/s 100MB/s 266(100%) 2.58ms Q 3 prot-rt 0.03MB/s 19.19MB/s 77(100%) 15.66ms full MB/s 100MB/s 76(100%) 15.34ms Q 4 prot-rt 15.67MB/s 0.02MB/s 211(100%) 20.28ms full MB/s 100MB/s 208(100%) 21.54ms of the storage QoS requrements s represented as follows: Q 1 = {f 1 =1,ops 1 = 82,sz 1 = 1KB,s 1 = 0,rt 1 = 10ms}, Q 2 = {f 2 = 0,ops 2 = 266,sz 2 = 1KB,s 2 =0,rt 2 =3ms}, Q 3 = {f 3 =1,ops 3 =76,sz 3 =64KB,s 3 =0,rt 3 = 18ms}, andq 4 = {f 4 =0,ops 4 = 208,sz 4 =64KB,s 4 =0,rt 4 =22ms}. The frst two requrements are for the small read and wrte I/O requests as n OLTP applcatons, and the others are for the large read and wrte I/O requests n scentfc applcatons [5]. Snce the network bandwdth allocaton s ndependent of storage access patterns, we assume that all the storage access patterns are purely random. In addton, the demanded IOPS of ops and ts assocated response tme of rt are confgured by njectng a set of I/O workload patterns and mea-

7 A Network Bandwdth Computaton Technque for IP Storage 479 surng each performance. Note that the ops and rt of the QoS requrements fall nto nether too lght traffc that makes the IP storage mostly dle nor too heavy traffc that overloads the system. The results reveal that the allocaton of only % of the full network bandwdth computed by the proposed technque can meet the gven storage QoS requrements. Observe that the proposed technque can compute an approprate amount of network bandwdth to provde the same qualty of storage servce as the case when the full network bandwdth s allocated. The percentage values n the ops column represent the percentage of the measured IOPS wth respect to the demanded IOPS. Table 2 shows the measured ops and rt for the QoS requrements of Q 1 Q 4 for the prot and nave technques. The prot technque computes the requred network bandwdth only by consderng the underlyng protocol overhead, as shown n Equaton (5) (6); that s, and.thenave technque smply calculates the network bandwdth by multplyng ops and sz. It assgns the same bandwdth for each drecton. As expected, the nave technque cannot guarantee even demanded ops, because t does not account for the underlyng protocol overhead n Ethernet, TCP/IP, and SCSI layers at all. Notce that Table 2. Results of ops and rt for the varous QoS requrements of Q 1 Q 8 by the technque usng Equaton (5) (6) (prot) and the technque usng ops sz (nave) QoS Technque Toward IP storage Toward clent ops rt Q 1 nave 0.06MB/s 0.06MB/s 64(77%) 28.82ms prot 0.01MB/s 0.12MB/s 80(96%) 12.99ms Q 2 nave 0.26MB/s 0.26MB/s 238(89%) 9.25ms prot 0.29MB/s 0.03MB/s 262(98%) 3.54ms Q 3 nave 4.78MB/s 4.78MB/s 69(91%) 22.31ms prot 0.01MB/s 5.19MB/s 74(96%) 19.33ms Q 4 nave 13.06MB/s 13.06MB/s 194(93%) 25.13ms prot 14.08MB/s 0.02MB/s 208(99%) 22.05ms the smaller szed I/O request causes hgher protocol overhead, as expected from Equaton (1) (4). In addton, the results show that read I/O requests creates more protocol overhead than wrte I/O requests. It can be expected manly from Equaton (2) (3). By contrast, the prot technque guarantees more than 96% of the requred ops. However, t does not satsfy the demanded response tme of rt because of the transmsson delay on IP network. Recall that, as shown n Table 1, the proposed prot-rt technque can meet both the ops and the rt by effectvely allottng the network bandwdth for each drecton between the storage clent and the IP storage.

8 480 Y.J. Nam et al. 5 Concluson and Future Work Ths paper addressed the problem of effectvely allocatng network bandwdth to assure a gven QoS requrement for IP storage. It defned a specfcaton of the storage QoS requrement, and t proposed a technque to compute the demanded network bandwdth to meet the storage QoS requrement that not only accounts for the overhead caused by the underlyng network protocols, but also guarantees the mnmum data transfer delay over the IP network. Performance evaluatons wth varous I/O workload patterns on our IP storage testbed verfed the correctness of the proposed technque; that s, allocatng a part (0.6 20%) of the entre network bandwdth can assure the gven storage QoS requrements. Currently, we have been revsng Equaton (9) (10) to addtonally account for real-world I/O workload patterns featured by self-smlarty and the condton of traffc congeston. Acknowledgments The authors would lke to thank the Mnstry of Educaton of Korea for ts fnancal support toward the Electrcal and Computer Engneerng Dvson at POSTECH through ts BK21 program. Ths research was also supported n part by the Korea Scence and Engneerng Foundaton (KOSEF) under grant number R and by HY-SDR IT Research Center. References 1. Meth, K., Satran, J.: Desgn of the scs protocol. In: Proceedngs of the Mass Storage Systems and Technologes/20th IEEE/11th NASA Goddard Conference. (2003) 2. Nam, Y.J.: Dynamc Storage QoS Control for Storage Cluster and RAID Performance Enhancement Technques. Ph.D Dssertaton, POSTECH (2004) 3. Anderson, E., Hobbs, M., Keeton, K., Spence, S., Uysal, M., Vetch, A.: Hppodrome: Runnng rngs around storage admnstraton. In: Proceedngs of Conference on Fle and Storage Technologes. (2002) 4. Ward, J., O Sullvan, M., Shahouman, T., Wlkes, J.: Appa: Automatc storage area network desgn. In: Proceedngs of Conference on Fle and Storage Technologes. (2002) 5. Alvarez, G., Borowsky, E., Go, S., Romer, T., Becker-Szendy, R., Goldng, R., Merchant, A., Spasojevc, M., Vetch, A., Wkes, J.: Mnerva: An automated resource provsonng tool for large-scale storage systems. ACM Transactons on Computer Systems 19 (2001) UNH: scs reference mplementaton. (2004) 7. Hurbert, B.: Lnux advanced routng & traffc control. (2003)

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Quantifying Performance Models

Quantifying Performance Models Quantfyng Performance Models Prof. Danel A. Menascé Department of Computer Scence George Mason Unversty www.cs.gmu.edu/faculty/menasce.html 1 Copyrght Notce Most of the fgures n ths set of sldes come from

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Needed Information to do Allocation

Needed Information to do Allocation Complexty n the Database Allocaton Desgn Must tae relatonshp between fragments nto account Cost of ntegrty enforcements Constrants on response-tme, storage, and processng capablty Needed Informaton to

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture Goals and Approach CS 194: Dstrbuted Systems Resource Allocaton Goal: acheve predcable performances Three steps: 1) Estmate applcaton s resource needs (not n ths lecture) 2) Admsson control 3) Resource

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

A QoS-aware Scheduling Scheme for Software-Defined Storage Oriented iscsi Target

A QoS-aware Scheduling Scheme for Software-Defined Storage Oriented iscsi Target A QoS-aware Schedulng Scheme for Software-Defned Storage Orented SCSI Target Xanghu Meng 1,2, Xuewen Zeng 1, Xao Chen 1, Xaozhou Ye 1,* 1 Natonal Network New Meda Engneerng Research Center, Insttute of

More information

A Frame Packing Mechanism Using PDO Communication Service within CANopen

A Frame Packing Mechanism Using PDO Communication Service within CANopen 28 A Frame Packng Mechansm Usng PDO Communcaton Servce wthn CANopen Mnkoo Kang and Kejn Park Dvson of Industral & Informaton Systems Engneerng, Ajou Unversty, Suwon, Gyeongg-do, South Korea Summary The

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Design of the Application-Level Protocol for Synchronized Multimedia Sessions

Design of the Application-Level Protocol for Synchronized Multimedia Sessions Desgn of the Applcaton-Level Protocol for Synchronzed Multmeda Sessons Chun-Chuan Yang Multmeda and Communcatons Laboratory Department of Computer Scence and Informaton Engneerng Natonal Ch Nan Unversty,

More information

3D vector computer graphics

3D vector computer graphics 3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

Research Article. ISSN (Print) s k and. d k rate of k -th flow, source node and

Research Article. ISSN (Print) s k and. d k rate of k -th flow, source node and Scholars Journal of Engneerng and Technology (SJET) Sch. J. Eng. Tech., 2015; 3(4A):343-350 Scholars Academc and Scentfc Publsher (An Internatonal Publsher for Academc and Scentfc Resources) www.saspublsher.com

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Two-Stage Data Distribution for Distributed Surveillance Video Processing with Hybrid Storage Architecture

Two-Stage Data Distribution for Distributed Surveillance Video Processing with Hybrid Storage Architecture Two-Stage Data Dstrbuton for Dstrbuted Survellance Vdeo Processng wth Hybrd Storage Archtecture Yangyang Gao, Hatao Zhang, Bngchang Tang, Yanpe Zhu, Huadong Ma Bejng Key Lab of Intellgent Telecomm. Software

More information

A New Transaction Processing Model Based on Optimistic Concurrency Control

A New Transaction Processing Model Based on Optimistic Concurrency Control A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Transaction-Consistent Global Checkpoints in a Distributed Database System

Transaction-Consistent Global Checkpoints in a Distributed Database System Proceedngs of the World Congress on Engneerng 2008 Vol I Transacton-Consstent Global Checkponts n a Dstrbuted Database System Jang Wu, D. Manvannan and Bhavan Thurasngham Abstract Checkpontng and rollback

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

ABRC: An End-to-End Rate Adaptation Scheme for Multimedia Streaming over Wireless LAN*

ABRC: An End-to-End Rate Adaptation Scheme for Multimedia Streaming over Wireless LAN* ARC: An End-to-End Rate Adaptaton Scheme for Multmeda Streamng over Wreless LAN We Wang Soung C Lew Jack Y Lee Department of Informaton Engneerng he Chnese Unversty of Hong Kong Shatn N Hong Kong {wwang2

More information

Avoiding congestion through dynamic load control

Avoiding congestion through dynamic load control Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach

More information

ELEC 377 Operating Systems. Week 6 Class 3

ELEC 377 Operating Systems. Week 6 Class 3 ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Dynamic Bandwidth Allocation Schemes in Hybrid TDM/WDM Passive Optical Networks

Dynamic Bandwidth Allocation Schemes in Hybrid TDM/WDM Passive Optical Networks Dynamc Bandwdth Allocaton Schemes n Hybrd TDM/WDM Passve Optcal Networks Ahmad R. Dhan, Chad M. Ass, and Abdallah Sham Concorda Insttue for Informaton Systems Engneerng Concorda Unversty, Montreal, Quebec,

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

Journal of Chemical and Pharmaceutical Research, 2014, 6(10): Research Article. Study on the original page oriented load balancing strategy

Journal of Chemical and Pharmaceutical Research, 2014, 6(10): Research Article. Study on the original page oriented load balancing strategy Avalable onlne www.jocpr.com Journal of hemcal and Pharmaceutcal Research, 2014, 6(10):274-280 Research Artcle IN : 0975-7384 ODEN(UA) : JPR5 tudy on the orgnal page orented load balancng strategy Kunpeng

More information

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier Some materal adapted from Mohamed Youns, UMBC CMSC 611 Spr 2003 course sldes Some materal adapted from Hennessy & Patterson / 2003 Elsever Scence Performance = 1 Executon tme Speedup = Performance (B)

More information

Internet Traffic Managers

Internet Traffic Managers Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

IR-HARQ vs. Joint Channel-Network coding for Cooperative Wireless Communication

IR-HARQ vs. Joint Channel-Network coding for Cooperative Wireless Communication Cyber Journals: ultdscplnary Journals n Scence and Technology, Journal of Selected Areas n Telecommuncatons (JSAT), August Edton, 2 IR-HARQ vs. Jont Channel-Network codng for Cooperatve Wreless Communcaton

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING. James Moscola, Young H. Cho, John W. Lockwood

A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING. James Moscola, Young H. Cho, John W. Lockwood A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING James Moscola, Young H. Cho, John W. Lockwood Dept. of Computer Scence and Engneerng Washngton Unversty, St. Lous, MO {jmm5,

More information

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach Dstrbuted Resource Schedulng n Grd Computng Usng Fuzzy Approach Shahram Amn, Mohammad Ahmad Computer Engneerng Department Islamc Azad Unversty branch Mahallat, Iran Islamc Azad Unversty branch khomen,

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

WITH rapid improvements of wireless technologies,

WITH rapid improvements of wireless technologies, JOURNAL OF SYSTEMS ARCHITECTURE, SPECIAL ISSUE: HIGHLY-RELIABLE CPS, VOL. 00, NO. 0, MONTH 013 1 Adaptve GTS Allocaton n IEEE 80.15.4 for Real-Tme Wreless Sensor Networks Feng Xa, Ruonan Hao, Je L, Naxue

More information

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT 3. - 5. 5., Brno, Czech Republc, EU APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT Abstract Josef TOŠENOVSKÝ ) Lenka MONSPORTOVÁ ) Flp TOŠENOVSKÝ

More information

Optimized caching in systems with heterogeneous client populations

Optimized caching in systems with heterogeneous client populations Performance Evaluaton 42 (2000) 163 185 Optmzed cachng n systems wth heterogeneous clent populatons Derek L. Eager a,, Mchael C. Ferrs b, Mary K. Vernon b a Department of Computer Scence, Unversty of Saskatchewan,

More information

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems S. J and D. Shn: An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems 2355 An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems Seunggu J and Dongkun Shn, Member,

More information

Remote Sensing Image Retrieval Algorithm based on MapReduce and Characteristic Information

Remote Sensing Image Retrieval Algorithm based on MapReduce and Characteristic Information Remote Sensng Image Retreval Algorthm based on MapReduce and Characterstc Informaton Zhang Meng 1, 1 Computer School, Wuhan Unversty Hube, Wuhan430097 Informaton Center, Wuhan Unversty Hube, Wuhan430097

More information

Kent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming

Kent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming CS 4/560 Desgn and Analyss of Algorthms Kent State Unversty Dept. of Math & Computer Scence LECT-6 Dynamc Programmng 2 Dynamc Programmng Dynamc Programmng, lke the dvde-and-conquer method, solves problems

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

Evaluation of TCP Variants and Bandwidth on Demand over Next Generation Satellite Network

Evaluation of TCP Variants and Bandwidth on Demand over Next Generation Satellite Network Evaluaton of TCP Varants and Bandwdth on Demand over Next Generaton Satellte Network Songrth Kttperachol, Zhl Sun and Hatham Cruckshank Centre for Communcaton Systems Research Unversty of Surrey Guldford,

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Harmonic Placement: File System Support for Scalable Streaming of Layer Encoded Object

Harmonic Placement: File System Support for Scalable Streaming of Layer Encoded Object Harmonc Placement: Fle System Support for Scalable Streamng of Layer Encoded Obect Sooyong Kang Department of Computer Scence Educaton Hanyang Unv., Seoul, 133-791, Korea syang@hanyang.ac.r Youp Won Seunghyun

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm , pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,

More information

Instantaneous Fairness of TCP in Heterogeneous Traffic Wireless LAN Environments

Instantaneous Fairness of TCP in Heterogeneous Traffic Wireless LAN Environments KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 10, NO. 8, Aug. 2016 3753 Copyrght c2016 KSII Instantaneous Farness of TCP n Heterogeneous Traffc Wreless LAN Envronments Young-Jn Jung 1 and

More information

Finite Element Analysis of Rubber Sealing Ring Resilience Behavior Qu Jia 1,a, Chen Geng 1,b and Yang Yuwei 2,c

Finite Element Analysis of Rubber Sealing Ring Resilience Behavior Qu Jia 1,a, Chen Geng 1,b and Yang Yuwei 2,c Advanced Materals Research Onlne: 03-06-3 ISSN: 66-8985, Vol. 705, pp 40-44 do:0.408/www.scentfc.net/amr.705.40 03 Trans Tech Publcatons, Swtzerland Fnte Element Analyss of Rubber Sealng Rng Reslence Behavor

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

Application of VCG in Replica Placement Strategy of Cloud Storage

Application of VCG in Replica Placement Strategy of Cloud Storage Internatonal Journal of Grd and Dstrbuted Computng, pp.27-40 http://dx.do.org/10.14257/jgdc.2016.9.4.03 Applcaton of VCG n Replca Placement Strategy of Cloud Storage Wang Hongxa Computer Department, Bejng

More information

Maximum Weight Matching Dispatching Scheme in Buffered Clos-Network Packet Switches

Maximum Weight Matching Dispatching Scheme in Buffered Clos-Network Packet Switches Maxmum Weght Matchng Dspatchng Scheme n Buffered Clos-Network Packet Swtches Roberto Roas-Cessa, Member, IEEE, E Ok, Member, IEEE, and H. Jonathan Chao, Fellow, IEEE Abstract The scalablty of Clos-network

More information

PARNIAN: A TWO-STAGE NESTED-AUCTION FOR DYNAMIC BANDWIDTH ALLOCATION IN ETHERNET PASSIVE OPTICAL NETWORKS *

PARNIAN: A TWO-STAGE NESTED-AUCTION FOR DYNAMIC BANDWIDTH ALLOCATION IN ETHERNET PASSIVE OPTICAL NETWORKS * IJST, Transactons of Electrcal Engneerng, Vol. 35, No. E1, pp 45-61 Prnted n The Islamc Republc of Iran, 2011 Shraz Unversty PARNIAN: A TWO-STAGE NESTED-AUCTION FOR DYNAMIC BANDWIDTH ALLOCATION IN ETHERNET

More information

Real-time interactive applications

Real-time interactive applications Real-tme nteractve applcatons PC-2-PC phone PC-2-phone Dalpad Net2phone vdeoconference Webcams Now we look at a PC-2-PC Internet phone example n detal Internet phone over best-effort (1) Best effort packet

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

Assembler. Building a Modern Computer From First Principles.

Assembler. Building a Modern Computer From First Principles. Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

Burst Round Robin as a Proportional-Share Scheduling Algorithm

Burst Round Robin as a Proportional-Share Scheduling Algorithm Burst Round Robn as a Proportonal-Share Schedulng Algorthm Tarek Helmy * Abdelkader Dekdouk ** * College of Computer Scence & Engneerng, Kng Fahd Unversty of Petroleum and Mnerals, Dhahran 31261, Saud

More information

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the ICC 008 proceedngs. Dynamc Bandwdth Provsonng wth Farness and Revenue Consderatons

More information

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks Communcatons and Network, 2016, 8, 45-55 Publshed Onlne February 2016 n ScRes. http://www.scrp.org/journal/cn http://dx.do.org/10.4236/cn.2016.81006 Performance Comparson of a QoS Aware Routng Protocol

More information

A Traffic Aware Routing Protocol for Congestion Avoidance in Content-Centric Network

A Traffic Aware Routing Protocol for Congestion Avoidance in Content-Centric Network , pp.69-80 http://dx.do.org/10.14257/jmue.2014.9.9.08 A Traffc Aware Routng Protocol for Congeston Avodance n Content-Centrc Network Jung-Jae Km 1, Mn-Woo Ryu 2*, S-Ho Cha 3 and Kuk-Hyun Cho 1 1 Dept.

More information

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Channel 0. Channel 1 Channel 2. Channel 3 Channel 4. Channel 5 Channel 6 Channel 7

Channel 0. Channel 1 Channel 2. Channel 3 Channel 4. Channel 5 Channel 6 Channel 7 Optmzed Regonal Cachng for On-Demand Data Delvery Derek L. Eager Mchael C. Ferrs Mary K. Vernon Unversty of Saskatchewan Unversty of Wsconsn Madson Saskatoon, SK Canada S7N 5A9 Madson, WI 5376 eager@cs.usask.ca

More information