Multicast Tree Rearrangement to Recover Node Failures. in Overlay Multicast Networks

Size: px
Start display at page:

Download "Multicast Tree Rearrangement to Recover Node Failures. in Overlay Multicast Networks"

Transcription

1 Multcast Tree Rearrangeent to Recover Node Falures n Overlay Multcast Networks Hee K. Cho and Chae Y. Lee Dept. of Industral Engneerng, KAIST, Kusung Dong, Taejon, Korea Abstract Overlay ultcast akes use of the Internet as a low level nfrastructure to provde ultcast servce to end hosts. The strategy of overlay ultcast sldes over ost of the basc deployent ssues assocated wth IP ultcast, such as end-to-end relablty, flow and congeston control, and assgnent of an unque address for each ultcastng group. Snce each ultcast eber s responsble for forwardng ultcast packets, overlay ultcast protocols suffer fro ultcast node falures. To cope wth node falures n the overlay ultcast networks, the eployent of ultcast servce nodes (MSNs) s consdered whch allows relatvely hgh processng perforance to cover the dsconnected nodes. We are nterested n nzng the cost of both the MSNs and addtonal lnks when a node falure occurs. Overlay ultcast tree rearrangeent to connect ultcast ebers s dscussed and forulated as a bnary nteger prograng proble. The tree rearrangeent proble s solved by a heurstc based on the Lagrangean relaxaton. The perforance of the proposed algorth s nvestgated by carryng out experents n 50 and 100 node probles. The eployent of MSNs s llustrated to be dependent on the end-to-end delay bound n overlay networks and the degree constrant of eber nodes. 1

2 1. Introducton Multcastng provdes an effcent way of transttng data fro a sender to a group of recevers. Instead of sendng a separate copy of the data to each ndvdual group eber, a source node sends dentcal essages sultaneously to ultple destnaton nodes. An underlyng ultcast routng algorth deternes a ultcast tree connectng the source and group ebers. Data generated by the source flows through the ultcast tree, traversng each tree edge exactly once. As a result, ultcast s ore resource-effcent and s well suted to applcatons such as teleconferencng, vdeo-on-deand (VOD) servce, electronc newspapers, cyber educaton and edcal ages. However, despte the conceptual splcty of IP ultcast and ts obvous benefts, ts deployent s dffcult due to the coplexty of IP ultcast technology and lack of applcatons. To cope wth the ncreasng traffc of ulteda contents, the study on ultcastng wll becoe ore actve. Recent efforts to provde ultcast delvery have thus shfted to overlay ultcast that bulds a transport-layer overlay network aong ebers of a ultcast group. Recent topcs related to overlay ultcast ncludes [1, 2, 3, 4, 5, 6, 7, 8, 11] as an alternatve to IP ultcast. Overlay ultcast uses the Internet as a low level nfrastructure to provde ultcast servce to end hosts. Many basc deployent ssues such as end-to-end relablty, congeston control, and assgnent of an unque address for each ultcastng group that are assocated wth IP ultcast can be solved wth overlay ultcast. Current overlay ultcast projects can be classfed nto two catalogs accordng to the structure: end-to-end overlay [1, 3, 5] and proxy-based overlay [2, 4]. In end-to-end overlay, every eber n the ultcastng group shares the responsblty to forward data to other ebers. End hosts organze theselves nto a ultcastng tree. We call these end hosts ultcast nodes n the end-to-end overlay case. Scattercast [2] and Overcast [4] are typcal 2

3 exaples of proxy-based overlay structure that for a herarchcal structure copared to endto-end overlay. The ultcastng servce s perfored wth the help of proxy nodes, whch can duplcate data and forward the to end hosts wth predefned routng algorth. In proxy-based overlay, proxy s the ultcast node and end hosts just receve the ultcast data fro the correspondng proxes. Representatve research [7] on overlay ultcast protocol ncludes Scattercast, Overcast, Narda [3] and ALMI [5]. Each protocol has dfferent desgn objectves, whch leads to dfferent propertes. Narda and Scattercast ntend to nze the delay fro a ultcast source to each eber. ALMI strves to nze the ultcast tree cost, where the cost of each lnk s defned as the round-trp delay between group ebers. Overcast, on the other hand, axzes avalable bandwdth for each eber. In the tree constructon process, Narda and Scattercast use a esh-frst approach. That s, group ebers are frst connected nto a esh and then the ultcast tree s bult on top of t. On the other hand, Overcast and ALMI use a drect approach. The step to buld the esh s bypassed and the ultcast tree s fored drectly. In overlay ultcast, snce ultcast ebers are responsble for forwardng ultcast packets, they suffer fro ultcast node falures. When a ultcast node fals, rapd ultcast tree recovery s essental to dstrbute ultcast data to dsconnected nodes. However, any researchers have focused ther attenton anly on constructng the ntal overlay ultcast tree [1, 2, 3, 4, 5, 6, 8, 11]. In ths paper, we are nterested n solvng the tree rearrangeent proble by establshng new connectons for the ultcast ebers when a ultcast node falure occurs. 2. Packet Delvery and Node Falures n Overlay Multcast Networks Overlay ultcast avods the deployent hurdles of IP ultcast at the cost of data delvery latency due to ts neffcent ultcast data dstrbuton. Ths neffcency s llustrated n the 3

4 exaple network of Fgure 1. In Fgure 1, nodes A, B, C, D, and E are ebers of a ultcast group, nodes R1, R2, and R3 are routers n the network, and the dashed lnes connectng the nodes are physcal lnks. The flows n Fgure 1 (a) llustrate how IP ultcast forwards data sent by A to the other ebers of the group. Fgure 1 (b) shows a possble overlay ultcast traffc flow. Fgure 1 (c) shows the overlay wthout the underlyng physcal network. Coparng Fgure 1 (a) and (b), t s clear that data delvery usng overlay ultcast experences longer delay than tradtonal IP ultcast delvery. Ths exaple shows that latency between the source and the ultcast ebers n an overlay ultcast largely depends on the desgn of the overlay route. Thus, n ths paper, we assue that end-to-end delay constrant s requred to avod excessve delay. Note n Fgure 1 (c) that each lnk n the overlay ultcast tree represents an ndependent uncast sesson. Node C of Fgure 1 (c) handles three uncast sessons. However, each ultcast node has a lt n the nuber of uncast sessons that can be handled sultaneously. It s due to the CPU perforance, network nterface card capacty, buffer sze and others. Thus we consder the degree constrant of a ultcast node n the overlay ultcast tree. The degree constrant represents the axu nuber of uncast sessons that a ultcast node can handle dependng on the capacty. B A B A A R1 R2 R1 R2 B C R3 E D C R3 E D D C E (a) Exstng Multcast (b) Overlay Multcast (c) Overlay wthout the underlyng physcal network Fgure 1. Coparson of packet delvery 4

5 B A Sngle doan R1 R2 C R3 D E Fgure 2. Overlay network for nter doan ultcast Overlay ultcast can also be used n nter-doan ultcast. Only a host fro each doan receves the ultcast data strea fro the reote sender va the overlay ultcast. The other recevers n the doan receve the applcaton data strea fro the host as llustrated n Fgure 2. The doan n ths paper represents a doan that s anaged by a coon ultcast protocol. Now, consder a tree rearrangeent n case of a node falure. In Fgure 3, suppose that node A has faled n the overlay ultcast tree. Thus, the chldren of node A have to rejon the ultcast sesson. The overlay ultcast tree s dvded nto several fragents as shown n Fgure 3 (b). Fgure 3 (c) shows the case where the end-to-end delay constrant s not satsfed by soe nodes after the ultcast tree rearrangeent, due to the degree bound of the node. The end-to-end delay can be reduced by the eployent of a node wth a hgher degree n the overlay ultcast tree [8]. Thus, to satsfy the end-to-end delay bound, we consder the eployent of the ultcast servce nodes (MSNs) whch allow relatvely hgh processng perforance by coverng all the dsconnected nodes. The eployent of an MSN requres addtonal lnks to connect the dsconnected ultcast nodes. The overlay ultcast tree rearrangeent, therefore, causes expenses for the MSNs and the lnks. For effcent tree rearrangeent, specal consderaton s requred n the selecton of the MSNs and addtonal lnks. In ths paper, we are nterested n nzng the cost of both 5

6 the MSNs and addtonal lnks when a node falure occurs. Faled node A (a) Sngle ultcast node falure (b) Separaton of ultcast tree End-to-end delay constrant s not satsfed. (c) Tree rearrangeent wthout the delay constrant Multcast Servce Node (MSN) (d) Tree rearrangeent wth the delay constrant Fgure 3. Node falure and tree rearrangeent 6

7 3. Multcast Tree Rearrangeent n Overlay Multcast Networks Gven a graph G = (V, E) where V s the set of nodes and E s the set of lnks, consder an overlay ultcast tree, T = (N, E1) where N V s the set of ultcast nodes and E1 E s the set of lnks n T. Let R N be the set of ultcast nodes to rejon the ultcast tree due to a node falure. The set of the black rectangle nodes n Fgure 3 corresponds to R. For a rejon node R, a sngle path s requred to connect the node to the ultcast source. If no path exsts between the ultcast source and node, the tree rearrangeent s possble. However, by assung at least one path between the ultcast source and node, the faled tree s rearranged to connect every ultcast node. Let x be a bnary varable to represent a lnk (,j) that s eployed for a path between the source and rejon ultcast eber. If lnk (,j) s eployed to connect the source and node, then x = 1. Otherwse, x = 0. The dotted lnes of Fgure 3 (c) and (d) represent lnks wth x = 1. Then the followng relaton holds for every node ncludng the source node s. x x = 1 k k for = s and all x x = 0 for V /{, s} and x x = 1 k for = and all R all In the above constrants, notce that several paths between the source and rejon nodes ay possbly traverse through lnk (,j). Snce the ultcast tree rearrangeent proble consders the cost of each addtonal lnk, we ntroduce a constant M to reflect the ultple new paths that share the sae lnk. Let y represent the adopton of lnk (,j) for the new paths, then the followng equaton holds. R R x + x j My for < j Note that the above equaton holds for any lnk n the overlay ultcast tree. 7

8 Now, as dscussed n the prevous secton, data delvery n the overlay ultcast tree s perfored by ndependent uncast sessons. Because each ultcast node ncludng the MSN has a capacty lt n the nuber of sultaneous uncast sessons, we consder the degree constrant of a ultcast node. The constrant represents the nuber of uncast sessons a ultcast node can handle sultaneously. By lettng w be the degree constrant of node, we have y + k y w z for all In addton to the above constrants, we need to consder the end-to-end delay between the source node and ultcast ebers. In ths proble, we assue that every ultcast eber has a delay bound. In other words, every path between the source and a rejon node has to satsfy the delay bound constrant. By lettng d be the lnk delay and D be the end-to-end delay bound, we have d (, j) E x D for all R Now, we need to nze the cost of the newly nstalled MSNs and that of the newly ncluded lnks. Let u and c respectvely be the cost of the newly nstalled nodes and lnks to rearrange the ultcast tree. Then the total cost s gven by L u z + (, j) E < j c 2 y where L V s a set of canddate MSNs and E2 E s a set of lnks newly ncluded nto the overlay ultcast tree. Fro the above dscusson, the ultcast tree rearrangeent proble can now be forulated as follows. Proble P: Mnze c y + subject to: (, j) E 2 < j L u z 8

9 x x = 1 for = s and all R (1) k k x x = 0 for V /{, s} and all R (2) x x = 1 for = and all R (3) k + x j My for < x j (4) y + y w z for all (5) d (, j) E x k D x, y, z are bnary varables for all R Consderng the NP-hardness of the overlay ultcast tree proble wthout the delay constrant [11], the proposed bnary nteger prograng proble s NP-hard. In the above forulaton constrants (1), (2) and (3) are well known constrants for the shortest path proble. Thus, relaxaton of constrants (4), (5) and (6) ay lead the proble to a less coplcated verson. Lagrangean relaxaton s a general soluton strategy for solvng such a relaxed proble. The procedure perts us to decopose a proble nto several easy subprobles by explotng ts specal structure. Ths soluton approach s used for solvng any odels wth ebedded network structure, such as the one consdered n [10, 15]. In fact, the Lagrangean relaxaton leads the overlay ultcast tree reconstructon proble nto three decoposed subprobles. The frst subproble s reduced nto a sple shortest path proble where any sophstcated algorths are avalable. The other two subprobles are reduced nto unconstraned nzaton probles that are easy to handle. Therefore, n the next secton we thus develop a Lagrangean relaxaton algorth as a prosng soluton procedure for the overlay tree rearrangeent proble. (6) 9

10 4. Lagrangean Relaxaton Based Heurstc for Tree Rearrangeent In ths secton, we consder the Lagrangean relaxaton [9] to solve the proble forulated n Secton 3. The relaxed proble s decoposed nto three subprobles whch can easly be solved by eployng the known algorths for the underlyng network structures [10]. Consder the tree rearrangeent proble P forulated n the prevous secton. The odel s an nteger prograng proble whch s, n general, dffcult to solve. Rather than solvng the dffcult optzaton proble drectly, we cobne the cubersoe constrants wth the orgnal objectve functon, where soe ultpler values act as penalty factors. Then the proble as a whole s transfored to a ore tractable for. The otvaton for adoptng ths approach s based on the fact that the orgnal proble P has an attractve substructure, the shortest path proble, whch we would lke to explot algorthcally. Let us dscuss the Lagrangean relaxaton procedure n ore detal. By relaxng constrants (4), (5), and (6), the relaxed proble P L s obtaned as follows. Proble P L Mnze Z L (λ) = ( R + L (, j) E ( u ( λ (, j) + λ ( ) d 1 w λ ( )) z 2 3 ) x λ ( ) D) + 3 ( c (, j) E 2 < j λ (, j) M 1 + λ ( ) + λ ( j)) y 2 2 Subject to x x = 1 k k for = s and all x x = 0 for V /{, s} and x x = 1 k x, y, z are bnary varables for = and all R all R R 10

11 The Lagrangean ultplers λ 1, λ 2 and λ 3 correspond to the constrant sets (4), (5) and (6) respectvely. Snce λ 1 (,j) s defned only for <j, we let λ 1 (,j) = λ 1 (j,) for coputatonal convenence. Here, note that proble P L can be decoposed nto followng three ndependent subprobles: Subproble P L1 Mnze Subject to ( 1 3 λ3 R (, j) E x x = 1 k k ( λ (, j) + λ ( ) d ) x ( ) D) for = s and all x x = 0 for V /{, s} and x x = 1 k x are bnary varables for = and all R all R R Subproble P L2 Mnze ( c λ1 (, j) M + λ ( ) + λ ( j)) 2 2 y (, j) E 2 < j Subproble P L3 Mnze ( u wλ2 ( )) z L For a specfc rejon node, subproble P L1 s a shortest path proble. Subproble P L2 and P L3 are unconstraned nzaton probles. Now we present a systeatc soluton procedure for the decoposed subprobles. () Soluton to subproble P L1 11

12 The well-known Dkstra s algorth [9, 14] s used for fxed n subproble P L1. The algorth fnds the shortest path fro the source node to the rejon ultcast node n a network. Dkstra s algorth solves the shortest path proble n O(N 2 ) te. Snce totally shortest path probles have to be solved at every teraton, the coputatonal coplexty of subproble P L1 s O(N 2 ). () Soluton to subproble P L2 Subproble P L2 s an unconstraned nzaton proble. If the coeffcent of y s negatve n the objectve functon, then y = 1 nzes the objectve functon value of subproble P L2. Otherwse, y = 0. Thus, the decson crteron of y s as follows. Let l = λ (, j) M + λ ( ) + λ ( )) ( c j y = 0 f l 0 y = 1 otherwse () Soluton to subproble P L3 Subproble P L3 s also an unconstraned nzaton proble. Thus, the decson crteron of z s as follows. Let v = u w λ ( ) 2 Z = 0 f v 0 z = 1 otherwse A soluton to the Lagrangean relaxaton proble P L s obtaned by solvng the above subprobles. However, the soluton to P L s usually not a feasble soluton to the orgnal proble P. Thus, a feasble soluton s obtaned at each teraton as follows. The soluton acqured n Lagrangean relaxaton proble P L s transfored nto tree for through Step 1 and Step 2. Step 3 akes the above soluton satsfy the delay and degree constrants by 12

13 reconstructng the feasble path between the source and rejon node. The soluton n Step 3 s further proved n Step 4. Let p() be an exstng path between the ultcast source and rejon node, eployed for the current ultcast tree, and let p () be a new path between the ultcast source and rejon node. In Step 4, f p () has lower cost than p(), p() s reoved fro the ultcast tree and p () s added to the ultcast tree. The heurstc for generatng feasble solutons s as follows. Step 1. y = 0 for all, j. z = 0 for all. Step 2. If Σ x 1, y = 1. If (y = 1) and ( P), z = 1. If (y = 1) and (j P), z j = 1. Step 3. Check feasblty for each node. If the soluton s feasble for all node, then Goto Step 4. Otherwse, update the network for feasble node and copute Dkstra s algorth to recopute x for nfeasble node. Goto Step 1. Step 4. If ternaton crteron s satsfed, Whle all rejon nodes are not searched, Select a rejon node that s not searched. Fnd a p (). If p () has lower cost than p(), p() s reoved fro the current soluton. p () s added to the current soluton. Stop. 13

14 Otherwse, Stop. Accordng to the Lagrangean boundng prncple [9] we can calculate the axu allowable error range for each of the feasble solutons obtaned. For any vector λ of the Lagrangean ultplers, the objectve functon value Z L (λ) of the Lagrangean dual functon s a lower bound to the optal objectve functon value Z P * of the orgnal optzaton proble P. Thus, we have Z L (λ) Z P *. The boundng prncple edately ples one advantage of the Lagrangean relaxaton approach. The ethod gves us a useful ternaton crteron nvolvng axu allowable error range. At each teraton, Lagrangean relaxaton proble P L s solved by usng updated ultpler value λ. A feasble soluton to the proble P s then generated va the proposed heurstc fro the soluton of the relaxed proble. Let Z P be the objectve functon value of proble P by the feasble soluton. Then the axu allowable error range ε s defned as Z ε = P Z L ( λ) 100% Z ( λ) L Start Copute Lower bound and feasble soluton Solve sub-proble 1 Solve sub-proble 2 Is ternaton crtera satsfed? Yes End Solve sub-proble 3 No Update ultplers wth subgradent ethod Fgure 4. Procedure of the proposed heurstc 14

15 Lagrangean relaxaton proble P L s repeatedly solved by usng updated ultpler values untl the axu allowable error range ε satsfes a ternaton threshold or the nuber of teratons exceeds the threshold lt. We use the subgradent ethod [10, 13] for updatng Lagrangean ultplers. Fgure 4 shows the overall procedure of the proposed algorth. 5. Coputatonal Results In ths secton, we dscuss the coputatonal experent of the Lagrangean relaxaton based heurstc for the tree rearrangeent proble. Multcast networks wth 50 and 100 nodes are generated. In each network, lnks are randoly generated such that the total nuber of lnks becoes E = 5 V. The average lnk cost s assued to be 10. Each lnk has average delay value of three. The end-to-end delay bound has the value of 10 and 20 n the network wth 50 nodes and 15 and 25 n the network of 100 nodes. The average cost of MSN s assued to be 20 and degree constrant has the value of 3 and 8 n the network wth 50 nodes. These values are 5 and 15 n the network of 100 nodes. All soluton procedures are run on a Pentu III-660MHz PC. Table 1 and 2 respectvely show the result of the proposed algorth n 50 and 100 nodes ultcast networks. The CPLEX [12] s eployed to have optal solutons. The proposed Lagrangean heurstc shows good perforance n every proble category of delay bound and degree constrants. The soluton gap fro the optal soluton s slghtly hgher n probles wth lower delay bound and degree constrant. As shown n the table, the average soluton gap fro the optal soluton s 5% and 5.6% respectvely n the 50 and 100 node probles. The CPU seconds are also copared as shown n the tables. The coputatonal effort requred by the proposed algorth s draatcally reduced when copared to the exact soluton procedure. The coputatonal result s further nvestgated by exanng the requred nuber of MSNs, 15

16 due to the dfferent values of delay bounds and degree constrants. Fgure 5 shows that ore MSNs are eployed as the proble becoes ore dffcult. As the delay bound and degree constrant becoes tghter, the eployed nuber of MSNs ncreases for the tree rearrangeent. The ncrease sees to be ore senstve to the delay bound when the degree constrant s tght. Further experents are perfored to exane the cost senstvty of the overlay tree rearrangeent. Fgure 6 shows the nuber of eployed MSNs when dfferent unt MSN cost s appleds. It s clear that ore MSNs are eployed as the nuber of rejonng ultcast nodes ncreases. The ncrease of the requred MSNs s also senstve to the unt cost. Hgher unt cost constrants the nuber of MSNs to cover the rejon hosts. 6. Concluson To overcoe node falures n overlay ultcast networks, ultcast tree rearrangeent s consdered by eployng the ultcast servce nodes (MSNs). The servce nodes generate new paths fro a source to ultcast ebers such that the end-to-end delay bound s satsfed. Snce each ultcast eber s responsble for forwardng the packets n the overlay network, the degree constrant of a ultcast node s also consdered. The tree rearrangeent proble s forulated as a bnary nteger lnear progra that nzes the cost of MSNs and newly adopted lnks. Lagrangean relaxaton based heurstc s developed to solve the proble. Soe ntractable constrants are relaxed and added nto the objectve as a penalty. Then the proble s decoposed nto three subprobles that are easy to handle. Networks wth 50 and 100 nodes are generated for coputatonal experents. In each network, four categores of probles are tested wth dfferent delay bounds and degree constrants. The average soluton gap fro the optal soluton s 5% and 5.6% respectvely n 16

17 the 50 and 100 node probles. The coputatonal te requred by the proposed algorth s draatcally reduced copared to the exact soluton procedure. The requred nuber of MSNs due to the dfferent values of delay bound and degree constrant s also nvestgated. As the proble becoes tghter, the eployed nuber of MSNs ncreases to recover the node falure. The ncrease s ore senstve to the delay bound when the degree constrant s tghter. The cost of MSN also affects the eployent of the nodes. 17

18 Heurstc Optal Optal Proble (Delay bound, CPU Nuber Soluton value CPU GAP* Degree constrant) seconds (HS) (OPT) seconds 1 (10,3) (10,3) (10,3) (10,3) (10,3) (10,8) (10,8) (10,8) (10,8) (10,8) (20,3) (20,3) (20,3) (20,3) (20,3) (20,8) (20,8) (20,8) (20,8) (20,8) *GAP = (HS-OPT)/OPT Table 1. Perforance of the proposed heurstc wth 50 nodes 18

19 Heurstc Optal Optal Proble (Delay bound, CPU Nuber Soluton value CPU GAP* Degree constrant) seconds (HS) (OPT) seconds 1 (15,5) (15,5) (15,5) (15,5) (15,5) (15,15) (15,15) (15,15) (15,15) (15,15) (25,5) (25,5) (25,5) (25,5) (25,5) (25,15) (25,15) (25,15) (25,15) (25,15) *GAP = (HS-OPT)/OPT Table 2. Perforance of the proposed heurstc wth 100 nodes 19

20 3 2.5 (15,5) 100 node probles 50 node probles The nuber of MSNs (10,3) (10,8) (15,15) (25,5) (20,3) (25,15) (20,8) (Delay bound, Degree constrant) Fgure 5. The nuber of MSNs eployed for the tree rearrangeent The nuber of MSNs Average MSN cost = 10 Average MSN cost = 20 Average MSN cost = Rejon ultcast nodes Fgure 6. The nuber of MSNs for the tree rearrangeent 20

21 References [1] P. Francs. Yod: Your own Internet dstrbuton, UC Berkeley ACIRI Tech Report, Apr [2] Y. Chawathe. Scattercast: An Archtecture for Internet Broadcast Dstrbuton as an Infrastructure Servce, Ph. D. thess, Departent of EECS, UC Berkeley, Dec [3] Y. Chu, S. Rao, and H. Zhang. A case for end syste ultcast, ACM Sgetrcs, [4] J. Jannott, D. K. Gfford, K. Jhonson, and M. Kaashock. Overcast: Relable ultcastng wth an overlay network, 5 th Syposu on Openng Syste Desgn and Ipleentaton, Dec [5] D. Tellu. ALMI: An Applcaton Level Multcast Infrastructure, 3 rd Usenx Syposu on Internet Technologes and Systes, March, [6] D. Helder and S. Jan. Banana Tree Protocol, an End-host Multcast Protocol, Tech Report, July [7] Y. Zhu, M. Wu, and W. Shu. Coparson Study and Evaluaton of overlay Multcast Networks, ICME, [8] N.M. Malouch, Z. L, D. Rubensten and S.A Sahu. Graph theoretc approach n proxyasssted, end-syste ultcast, Qualty of Servce, Tenth IEEE Internatonal Workshop, pp , May [9] R. K. Ahuja, T. L. Magnant and J. B. Orln. Network Flows: Theory, Algorths, and Applcatons, Prentcehall, [10] H. Cho, H. Lee, K. Lee, S. K, and J. Lee. "Optal locaton of swtches and nterconnectons for ATM LANs," Coputers & Operatons Research, v. 28, pp , Nov

22 [11] S. Sh and J. Turner. Routng n Overlay Multcast Networks, IEEE INFOCOM, [12] CPLEX 7.0, CPLEX Optzaton Inc [13] M. Held, P. Wolfe and H. P. Crowder. Valdaton of Subgradent Optzaton, Matheatcal Prograng, vol. 6, pp 62-88, [14] D. Bertsekas and R. Gallager. Data Networks, Englewood Clffs, NJ:Prentce Hall, [15] L. Bahense, F. Barahona, and O. Porto. Solvng Stener Tree Probles n Graphs wth Lagrangan Relaxaton, Journal of cobnatoral optzaton, v.7 no.3, pp ,

Optimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming

Optimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming Optzaton Methods: Integer Prograng Integer Lnear Prograng Module Lecture Notes Integer Lnear Prograng Introducton In all the prevous lectures n lnear prograng dscussed so far, the desgn varables consdered

More information

An Efficient Fault-Tolerant Multi-Bus Data Scheduling Algorithm Based on Replication and Deallocation

An Efficient Fault-Tolerant Multi-Bus Data Scheduling Algorithm Based on Replication and Deallocation BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 16, No Sofa 016 Prnt ISSN: 1311-970; Onlne ISSN: 1314-4081 DOI: 10.1515/cat-016-001 An Effcent Fault-Tolerant Mult-Bus Data

More information

On-line Scheduling Algorithm with Precedence Constraint in Embeded Real-time System

On-line Scheduling Algorithm with Precedence Constraint in Embeded Real-time System 00 rd Internatonal Conference on Coputer and Electrcal Engneerng (ICCEE 00 IPCSIT vol (0 (0 IACSIT Press, Sngapore DOI: 077/IPCSIT0VNo80 On-lne Schedulng Algorth wth Precedence Constrant n Ebeded Real-te

More information

Solutions to Programming Assignment Five Interpolation and Numerical Differentiation

Solutions to Programming Assignment Five Interpolation and Numerical Differentiation College of Engneerng and Coputer Scence Mechancal Engneerng Departent Mechancal Engneerng 309 Nuercal Analyss of Engneerng Systes Sprng 04 Nuber: 537 Instructor: Larry Caretto Solutons to Prograng Assgnent

More information

A Unified Approach to Survivability of Connection-Oriented Networks

A Unified Approach to Survivability of Connection-Oriented Networks A Unfed Approach to Survvablty of Connecton-Orented Networs Krzysztof Walowa Char of Systes and Coputer Networs, Faculty of Electroncs, Wroclaw Unversty of Technology, Wybrzeze Wyspansego 27, 50-370 Wroclaw,

More information

Introduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time

Introduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time Lesle Laports e, locks & the Orderng of Events n a Dstrbuted Syste Joseph Sprng Departent of oputer Scence Dstrbuted Systes and Securty Overvew Introducton he artal Orderng Logcal locks Orderng the Events

More information

ALM-FastReplica: Optimizing the Reliable Distribution of Large Files within CDNs

ALM-FastReplica: Optimizing the Reliable Distribution of Large Files within CDNs ALM-FastReplca: Optzng the Relable Dstrbuton of Large Fles wthn CDNs Ludla Cherkasova Internet Systes and Storage Laboratory HP Laboratores Palo Alto HPL-005-64 Aprl 4, 005* E-al: cherkasova@hpl.hp.co

More information

Heuristic Methods for Locating Emergency Facilities

Heuristic Methods for Locating Emergency Facilities Heurstc Methods for Locatng Eergency Facltes L. Caccetta and M. Dzator Western Australan Centre of Excellence n Industral Optsaton, Curtn Unversty of Technology, Kent Street, Bentley WA 602, Australa E-Mal:

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Generating Fuzzy Term Sets for Software Project Attributes using and Real Coded Genetic Algorithms

Generating Fuzzy Term Sets for Software Project Attributes using and Real Coded Genetic Algorithms Generatng Fuzzy Ter Sets for Software Proect Attrbutes usng Fuzzy C-Means C and Real Coded Genetc Algorths Al Idr, Ph.D., ENSIAS, Rabat Alan Abran, Ph.D., ETS, Montreal Azeddne Zah, FST, Fes Internatonal

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

Intra-Parametric Analysis of a Fuzzy MOLP

Intra-Parametric Analysis of a Fuzzy MOLP Intra-Parametrc Analyss of a Fuzzy MOLP a MIAO-LING WANG a Department of Industral Engneerng and Management a Mnghsn Insttute of Technology and Hsnchu Tawan, ROC b HSIAO-FAN WANG b Insttute of Industral

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Multiple Instance Learning via Multiple Kernel Learning *

Multiple Instance Learning via Multiple Kernel Learning * The Nnth nternatonal Syposu on Operatons Research and ts Applcatons (SORA 10) Chengdu-Juzhagou, Chna, August 19 23, 2010 Copyrght 2010 ORSC & APORC, pp. 160 167 ultple nstance Learnng va ultple Kernel

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

What is Object Detection? Face Detection using AdaBoost. Detection as Classification. Principle of Boosting (Schapire 90)

What is Object Detection? Face Detection using AdaBoost. Detection as Classification. Principle of Boosting (Schapire 90) CIS 5543 Coputer Vson Object Detecton What s Object Detecton? Locate an object n an nput age Habn Lng Extensons Vola & Jones, 2004 Dalal & Trggs, 2005 one or ultple objects Object segentaton Object detecton

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

A New Scheduling Algorithm for Servers

A New Scheduling Algorithm for Servers A New Schedulng Algorth for Servers Nann Yao, Wenbn Yao, Shaobn Ca, and Jun N College of Coputer Scence and Technology, Harbn Engneerng Unversty, Harbn, Chna {yaonann, yaowenbn, cashaobn, nun}@hrbeu.edu.cn

More information

User Behavior Recognition based on Clustering for the Smart Home

User Behavior Recognition based on Clustering for the Smart Home 3rd WSEAS Internatonal Conference on REMOTE SENSING, Vence, Italy, Noveber 2-23, 2007 52 User Behavor Recognton based on Clusterng for the Sart Hoe WOOYONG CHUNG, JAEHUN LEE, SUKHYUN YUN, SOOHAN KIM* AND

More information

Review of approximation techniques

Review of approximation techniques CHAPTER 2 Revew of appromaton technques 2. Introducton Optmzaton problems n engneerng desgn are characterzed by the followng assocated features: the objectve functon and constrants are mplct functons evaluated

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

A NEW APPROACH FOR SOLVING LINEAR FUZZY FRACTIONAL TRANSPORTATION PROBLEM

A NEW APPROACH FOR SOLVING LINEAR FUZZY FRACTIONAL TRANSPORTATION PROBLEM Internatonal Journal of Cvl Engneerng and Technology (IJCIET) Volue 8, Issue 8, August 217, pp. 1123 1129, Artcle ID: IJCIET_8_8_12 Avalable onlne at http://http://www.aee.co/cet/ssues.asp?jtype=ijciet&vtype=8&itype=8

More information

On Some Entertaining Applications of the Concept of Set in Computer Science Course

On Some Entertaining Applications of the Concept of Set in Computer Science Course On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton

More information

Classification / Regression Support Vector Machines

Classification / Regression Support Vector Machines Classfcaton / Regresson Support Vector Machnes Jeff Howbert Introducton to Machne Learnng Wnter 04 Topcs SVM classfers for lnearly separable classes SVM classfers for non-lnearly separable classes SVM

More information

Merging Results by Using Predicted Retrieval Effectiveness

Merging Results by Using Predicted Retrieval Effectiveness Mergng Results by Usng Predcted Retreval Effectveness Introducton Wen-Cheng Ln and Hsn-Hs Chen Departent of Coputer Scence and Inforaton Engneerng Natonal Tawan Unversty Tape, TAIWAN densln@nlg.cse.ntu.edu.tw;

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics A Hybrd Genetc Algorthm for Routng Optmzaton n IP Networks Utlzng Bandwdth and Delay Metrcs Anton Redl Insttute of Communcaton Networks, Munch Unversty of Technology, Arcsstr. 21, 80290 Munch, Germany

More information

126 Int. J. Ad Hoc and Ubiquitous Computing, Vol. 1, No. 3, Djamel Djenouri*

126 Int. J. Ad Hoc and Ubiquitous Computing, Vol. 1, No. 3, Djamel Djenouri* 126 Int. J. Ad Hoc and Ubqutous Coputng, Vol. 1, No. 3, 2006 New power-aware routng protocol for oble ad hoc networks Djael Djenour* Basc Software Laboratory, CERIST Center of Research, Algers, Algera

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Scheduling Workflow Applications on the Heterogeneous Cloud Resources

Scheduling Workflow Applications on the Heterogeneous Cloud Resources Indan Journal of Scence and Technology, Vol 8(2, DOI: 0.7485/jst/205/v82/57984, June 205 ISSN (rnt : 0974-6846 ISSN (Onlne : 0974-5645 Schedulng Workflow Applcatons on the Heterogeneous Cloud Resources

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Parallel Branch and Bound Algorithm - A comparison between serial, OpenMP and MPI implementations

Parallel Branch and Bound Algorithm - A comparison between serial, OpenMP and MPI implementations Journal of Physcs: Conference Seres Parallel Branch and Bound Algorthm - A comparson between seral, OpenMP and MPI mplementatons To cte ths artcle: Luco Barreto and Mchael Bauer 2010 J. Phys.: Conf. Ser.

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Measuring Cohesion of Packages in Ada95

Measuring Cohesion of Packages in Ada95 Measurng Coheson of Packages n Ada95 Baowen Xu Zhenqang Chen Departent of Coputer Scence & Departent of Coputer Scence & Engneerng, Southeast Unversty Engneerng, Southeast Unversty Nanjng, Chna, 20096

More information

TPL-Aware Displacement-driven Detailed Placement Refinement with Coloring Constraints

TPL-Aware Displacement-driven Detailed Placement Refinement with Coloring Constraints TPL-ware Dsplacement-drven Detaled Placement Refnement wth Colorng Constrants Tao Ln Iowa State Unversty tln@astate.edu Chrs Chu Iowa State Unversty cnchu@astate.edu BSTRCT To mnmze the effect of process

More information

A fair buffer allocation scheme

A fair buffer allocation scheme A far buffer allocaton scheme Juha Henanen and Kalev Klkk Telecom Fnland P.O. Box 228, SF-330 Tampere, Fnland E-mal: juha.henanen@tele.f Abstract An approprate servce for data traffc n ATM networks requres

More information

5 The Primal-Dual Method

5 The Primal-Dual Method 5 The Prmal-Dual Method Orgnally desgned as a method for solvng lnear programs, where t reduces weghted optmzaton problems to smpler combnatoral ones, the prmal-dual method (PDM) has receved much attenton

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Connection-information-based connection rerouting for connection-oriented mobile communication networks

Connection-information-based connection rerouting for connection-oriented mobile communication networks Dstrb. Syst. Engng 5 (1998) 47 65. Prnted n the UK PII: S0967-1846(98)90513-7 Connecton-nformaton-based connecton reroutng for connecton-orented moble communcaton networks Mnho Song, Yanghee Cho and Chongsang

More information

AN ALGORITHM FOR ODD GRACEFULNESS OF THE TENSOR PRODUCT OF TWO LINE GRAPHS

AN ALGORITHM FOR ODD GRACEFULNESS OF THE TENSOR PRODUCT OF TWO LINE GRAPHS Internatonal ournal on applcatons of graph theory n wreless ad hoc networks and sensor networks (GRAPH-HOC) Vol.3, No., March 0 AN ALGORITHM FOR ODD GRACEFULNESS OF THE TENSOR PRODUCT OF TWO LINE GRAPHS

More information

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding Tarno et al. EURASIP Journal on Wreless Communcatons and Networkng 214, 214:81 http://wcn.euraspournals.com/content/214/1/81 RESEARCH Open Access QoS-aware routng for heterogeneous layered uncast transmssons

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

Solutions for Real-Time Communication over Best-Effort Networks

Solutions for Real-Time Communication over Best-Effort Networks Solutons for Real-Tme Communcaton over Best-Effort Networks Anca Hangan, Ramona Marfevc, Gheorghe Sebestyen Techncal Unversty of Cluj-Napoca, Computer Scence Department {Anca.Hangan, Ramona.Marfevc, Gheorghe.Sebestyen}@cs.utcluj.ro

More information

Assembler. Building a Modern Computer From First Principles.

Assembler. Building a Modern Computer From First Principles. Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

Performance Analysis of Coiflet Wavelet and Moment Invariant Feature Extraction for CT Image Classification using SVM

Performance Analysis of Coiflet Wavelet and Moment Invariant Feature Extraction for CT Image Classification using SVM Perforance Analyss of Coflet Wavelet and Moent Invarant Feature Extracton for CT Iage Classfcaton usng SVM N. T. Renukadev, Assstant Professor, Dept. of CT-UG, Kongu Engneerng College, Perundura Dr. P.

More information

Energy-aware Delay-Constrained Routing in Wireless Sensor Networks

Energy-aware Delay-Constrained Routing in Wireless Sensor Networks Energy-aware Delay-Constraned Routng n Wreless Sensor Networks Keal Akkaya and Mohaed Youns Departent of Coputer Scence and Electrcal Engneerng Unversty of Maryland Baltore County, Baltore, MD 21250 {keal1,

More information

Large Margin Nearest Neighbor Classifiers

Large Margin Nearest Neighbor Classifiers Large Margn earest eghbor Classfers Sergo Bereo and Joan Cabestany Departent of Electronc Engneerng, Unverstat Poltècnca de Catalunya (UPC, Gran Captà s/n, C4 buldng, 08034 Barcelona, Span e-al: sbereo@eel.upc.es

More information

Low training strength high capacity classifiers for accurate ensembles using Walsh Coefficients

Low training strength high capacity classifiers for accurate ensembles using Walsh Coefficients Low tranng strength hgh capacty classfers for accurate ensebles usng Walsh Coeffcents Terry Wndeatt, Cere Zor Unv Surrey, Guldford, Surrey, Gu2 7H t.wndeatt surrey.ac.uk Abstract. If a bnary decson s taken

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

TECHNICAL REPORT AN OPTIMAL DISTRIBUTED PROTOCOL FOR FAST CONVERGENCE TO MAXMIN RATE ALLOCATION. Jordi Ros and Wei K Tsai

TECHNICAL REPORT AN OPTIMAL DISTRIBUTED PROTOCOL FOR FAST CONVERGENCE TO MAXMIN RATE ALLOCATION. Jordi Ros and Wei K Tsai TECHNICAL REPORT AN OPTIMAL DISTRIUTED PROTOCOL FOR FAST CONVERGENCE TO MAXMIN RATE ALLOCATION Jord Ros and We K Tsa Department of Electrcal and Computer Engneerng Unversty of Calforna, Irvne 1 AN OPTIMAL

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

A MapReduce-supported Data Center Networking Topology

A MapReduce-supported Data Center Networking Topology A MapReduce-supported Data Center Networkng Topology Zelu Dng*,, Xue Lu, Deke Guo*, Honghu Chen*, Xueshan Luo* * Natonal Unversty of Defense Technology, Chna McGll Unversty, Canada Abstract Several novel

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

Obstacle-Aware Routing Problem in. a Rectangular Mesh Network

Obstacle-Aware Routing Problem in. a Rectangular Mesh Network Appled Mathematcal Scences, Vol. 9, 015, no. 14, 653-663 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.1988/ams.015.411911 Obstacle-Aware Routng Problem n a Rectangular Mesh Network Norazah Adzhar Department

More information

Routing Time-Constrained Traffic in Wireless Sensor Networks

Routing Time-Constrained Traffic in Wireless Sensor Networks Routng Te-Constraned Traffc n Wreless Sensor Networks Keal Akkaya and Mohaed Youns Departent of Coputer Scence and Electrcal Engneerng Unversty of Maryland, Baltore County Baltore, MD 2250 keal youns@cs.ubc.edu

More information

Equation Based Rate Control and Multiple Connections for Adaptive Video Streaming in Cellular Networks

Equation Based Rate Control and Multiple Connections for Adaptive Video Streaming in Cellular Networks Equaton Based Rate Control and Multple Connectons for Adaptve Vdeo Streang n Cellular Networks A. Mardanan Dehkord and V. Tabataba Vakl Abstract Rate control s an portant ssue for vdeo streang n cellular

More information

A Facet Generation Procedure. for solving 0/1 integer programs

A Facet Generation Procedure. for solving 0/1 integer programs A Facet Generaton Procedure for solvng 0/ nteger programs by Gyana R. Parja IBM Corporaton, Poughkeepse, NY 260 Radu Gaddov Emery Worldwde Arlnes, Vandala, Oho 45377 and Wlbert E. Wlhelm Teas A&M Unversty,

More information

Prediction of Dumping a Product in Textile Industry

Prediction of Dumping a Product in Textile Industry Int. J. Advanced Networkng and Applcatons Volue: 05 Issue: 03 Pages:957-96 (03) IN : 0975-090 957 Predcton of upng a Product n Textle Industry.V.. GANGA EVI Professor n MCA K..R.M. College of Engneerng

More information

Conditional Speculative Decimal Addition*

Conditional Speculative Decimal Addition* Condtonal Speculatve Decmal Addton Alvaro Vazquez and Elsardo Antelo Dep. of Electronc and Computer Engneerng Unv. of Santago de Compostela, Span Ths work was supported n part by Xunta de Galca under grant

More information

A system based on a modified version of the FCM algorithm for profiling Web users from access log

A system based on a modified version of the FCM algorithm for profiling Web users from access log A syste based on a odfed verson of the FCM algorth for proflng Web users fro access log Paolo Corsn, Laura De Dosso, Beatrce Lazzern, Francesco Marcellon Dpartento d Ingegnera dell Inforazone va Dotsalv,

More information

Colored Traveling Salesman Problem and Solution

Colored Traveling Salesman Problem and Solution Preprnts of the 19th World Congress The Internatonal Federaton of Autoatc Control Cape Town, South Afrca. August 24-29, 2014 Colored Travelng Salesan Proble and Soluton Jun L 1, 2, Qru Sun 1, 2, MengChu

More information

Scheduling and queue management. DigiComm II

Scheduling and queue management. DigiComm II Schedulng and queue management Tradtonal queung behavour n routers Data transfer: datagrams: ndvdual packets no recognton of flows connectonless: no sgnallng Forwardng: based on per-datagram forwardng

More information

Wavefront Reconstructor

Wavefront Reconstructor A Dstrbuted Smplex B-Splne Based Wavefront Reconstructor Coen de Vsser and Mchel Verhaegen 14-12-201212 2012 Delft Unversty of Technology Contents Introducton Wavefront reconstructon usng Smplex B-Splnes

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT 3. - 5. 5., Brno, Czech Republc, EU APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT Abstract Josef TOŠENOVSKÝ ) Lenka MONSPORTOVÁ ) Flp TOŠENOVSKÝ

More information

Session 5.3. Switching/Routing and Transmission planning

Session 5.3. Switching/Routing and Transmission planning ITU Regonal Semnar Belgrade Serba and Montenegro 20-24 24 June 2005 Sesson 5.3 Swtchng/Routng and Transmsson plannng volvng nfrastructures to NGN and related Plannng Strateges and Tools I.S. Sesson 5.3-1

More information

Multi-Constraint Multi-Processor Resource Allocation

Multi-Constraint Multi-Processor Resource Allocation Mult-Constrant Mult-Processor Resource Allocaton Ar R. B. Behrouzan 1, Dp Goswa 1, Twan Basten 1,2, Marc Gelen 1, Had Alzadeh Ara 1 1 Endhoven Unversty of Technology, Endhoven, The Netherlands 2 TNO Ebedded

More information

Efficient Load-Balanced IP Routing Scheme Based on Shortest Paths in Hose Model. Eiji Oki May 28, 2009 The University of Electro-Communications

Efficient Load-Balanced IP Routing Scheme Based on Shortest Paths in Hose Model. Eiji Oki May 28, 2009 The University of Electro-Communications Effcent Loa-Balance IP Routng Scheme Base on Shortest Paths n Hose Moel E Ok May 28, 2009 The Unversty of Electro-Communcatons Ok Lab. Semnar, May 28, 2009 1 Outlne Backgroun on IP routng IP routng strategy

More information

Color Image Segmentation Based on Adaptive Local Thresholds

Color Image Segmentation Based on Adaptive Local Thresholds Color Iage Segentaton Based on Adaptve Local Thresholds ETY NAVON, OFE MILLE *, AMI AVEBUCH School of Coputer Scence Tel-Avv Unversty, Tel-Avv, 69978, Israel E-Mal * : llero@post.tau.ac.l Fax nuber: 97-3-916084

More information

2016 International Conference on Sustainable Energy, Environment and Information Engineering (SEEIE 2016) ISBN:

2016 International Conference on Sustainable Energy, Environment and Information Engineering (SEEIE 2016) ISBN: 06 Internatonal Conference on Sustanable Energy, Envronent and Inforaton Engneerng (SEEIE 06) ISBN: 978--60595-337-3 A Study on IEEE 80. MAC Layer Msbehavor under Dfferent Back-off Algorths Trong Mnh HOANG,,

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Routability Driven Modification Method of Monotonic Via Assignment for 2-layer Ball Grid Array Packages

Routability Driven Modification Method of Monotonic Via Assignment for 2-layer Ball Grid Array Packages Routablty Drven Modfcaton Method of Monotonc Va Assgnment for 2-layer Ball Grd Array Pacages Yoch Tomoa Atsush Taahash Department of Communcatons and Integrated Systems, Toyo Insttute of Technology 2 12

More information

Minimum Cost Optimization of Multicast Wireless Networks with Network Coding

Minimum Cost Optimization of Multicast Wireless Networks with Network Coding Mnmum Cost Optmzaton of Multcast Wreless Networks wth Network Codng Chengyu Xong and Xaohua L Department of ECE, State Unversty of New York at Bnghamton, Bnghamton, NY 13902 Emal: {cxong1, xl}@bnghamton.edu

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

A Partial Decision Scheme for Local Search Algorithms for Distributed Constraint Optimization Problems

A Partial Decision Scheme for Local Search Algorithms for Distributed Constraint Optimization Problems A Partal Decson Schee for Local Search Algorths for Dstrbuted Constrant Optzaton Probles Zhepeng Yu, Zyu Chen*, Jngyuan He, Yancheng Deng College of Coputer Scence, Chongqng Unversty, Chongqng, Chna {204402053,

More information

ENSEMBLE learning has been widely used in data and

ENSEMBLE learning has been widely used in data and IEEE GEOSCIENCE AND REMOTE SENSING LETTERS, VOL. 9, NO. 5, SEPTEMBER 2012 943 Sparse Kernel-Based Hyperspectral Anoaly Detecton Prudhv Gurra, Meber, IEEE, Heesung Kwon, Senor Meber, IEEE, andtothyhan Abstract

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

Optimal Distribution of Remotely-Subscribed Multicast Traffic within a Proxy Mobile IPv6 Domain by Using Explicit Multicast

Optimal Distribution of Remotely-Subscribed Multicast Traffic within a Proxy Mobile IPv6 Domain by Using Explicit Multicast ptmal strbuton of Remotely-Subscrbed Multcast Traffc wthn a Proxy Moble v6 oman by Usng Explct Multcast us M. Contreras *, Carlos J. Bernardos * Core Networ Evoluton Telefónca I+ on Ramón de la Cruz, 82-84,

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

An efficient iterative source routing algorithm

An efficient iterative source routing algorithm An effcent teratve source routng algorthm Gang Cheng Ye Tan Nrwan Ansar Advanced Networng Lab Department of Electrcal Computer Engneerng New Jersey Insttute of Technology Newar NJ 7 {gc yt Ansar}@ntedu

More information

A Theory of Non-Deterministic Networks

A Theory of Non-Deterministic Networks A Theory of Non-Deternstc Networs Alan Mshcheno and Robert K rayton Departent of EECS, Unversty of Calforna at ereley {alan, brayton}@eecsbereleyedu Abstract oth non-deterns and ult-level networs copactly

More information

Avoiding congestion through dynamic load control

Avoiding congestion through dynamic load control Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information