Multicast Tree Rearrangement to Recover Node Failures. in Overlay Multicast Networks
|
|
- Noah Parker
- 5 years ago
- Views:
Transcription
1 Multcast Tree Rearrangeent to Recover Node Falures n Overlay Multcast Networks Hee K. Cho and Chae Y. Lee Dept. of Industral Engneerng, KAIST, Kusung Dong, Taejon, Korea Abstract Overlay ultcast akes use of the Internet as a low level nfrastructure to provde ultcast servce to end hosts. The strategy of overlay ultcast sldes over ost of the basc deployent ssues assocated wth IP ultcast, such as end-to-end relablty, flow and congeston control, and assgnent of an unque address for each ultcastng group. Snce each ultcast eber s responsble for forwardng ultcast packets, overlay ultcast protocols suffer fro ultcast node falures. To cope wth node falures n the overlay ultcast networks, the eployent of ultcast servce nodes (MSNs) s consdered whch allows relatvely hgh processng perforance to cover the dsconnected nodes. We are nterested n nzng the cost of both the MSNs and addtonal lnks when a node falure occurs. Overlay ultcast tree rearrangeent to connect ultcast ebers s dscussed and forulated as a bnary nteger prograng proble. The tree rearrangeent proble s solved by a heurstc based on the Lagrangean relaxaton. The perforance of the proposed algorth s nvestgated by carryng out experents n 50 and 100 node probles. The eployent of MSNs s llustrated to be dependent on the end-to-end delay bound n overlay networks and the degree constrant of eber nodes. 1
2 1. Introducton Multcastng provdes an effcent way of transttng data fro a sender to a group of recevers. Instead of sendng a separate copy of the data to each ndvdual group eber, a source node sends dentcal essages sultaneously to ultple destnaton nodes. An underlyng ultcast routng algorth deternes a ultcast tree connectng the source and group ebers. Data generated by the source flows through the ultcast tree, traversng each tree edge exactly once. As a result, ultcast s ore resource-effcent and s well suted to applcatons such as teleconferencng, vdeo-on-deand (VOD) servce, electronc newspapers, cyber educaton and edcal ages. However, despte the conceptual splcty of IP ultcast and ts obvous benefts, ts deployent s dffcult due to the coplexty of IP ultcast technology and lack of applcatons. To cope wth the ncreasng traffc of ulteda contents, the study on ultcastng wll becoe ore actve. Recent efforts to provde ultcast delvery have thus shfted to overlay ultcast that bulds a transport-layer overlay network aong ebers of a ultcast group. Recent topcs related to overlay ultcast ncludes [1, 2, 3, 4, 5, 6, 7, 8, 11] as an alternatve to IP ultcast. Overlay ultcast uses the Internet as a low level nfrastructure to provde ultcast servce to end hosts. Many basc deployent ssues such as end-to-end relablty, congeston control, and assgnent of an unque address for each ultcastng group that are assocated wth IP ultcast can be solved wth overlay ultcast. Current overlay ultcast projects can be classfed nto two catalogs accordng to the structure: end-to-end overlay [1, 3, 5] and proxy-based overlay [2, 4]. In end-to-end overlay, every eber n the ultcastng group shares the responsblty to forward data to other ebers. End hosts organze theselves nto a ultcastng tree. We call these end hosts ultcast nodes n the end-to-end overlay case. Scattercast [2] and Overcast [4] are typcal 2
3 exaples of proxy-based overlay structure that for a herarchcal structure copared to endto-end overlay. The ultcastng servce s perfored wth the help of proxy nodes, whch can duplcate data and forward the to end hosts wth predefned routng algorth. In proxy-based overlay, proxy s the ultcast node and end hosts just receve the ultcast data fro the correspondng proxes. Representatve research [7] on overlay ultcast protocol ncludes Scattercast, Overcast, Narda [3] and ALMI [5]. Each protocol has dfferent desgn objectves, whch leads to dfferent propertes. Narda and Scattercast ntend to nze the delay fro a ultcast source to each eber. ALMI strves to nze the ultcast tree cost, where the cost of each lnk s defned as the round-trp delay between group ebers. Overcast, on the other hand, axzes avalable bandwdth for each eber. In the tree constructon process, Narda and Scattercast use a esh-frst approach. That s, group ebers are frst connected nto a esh and then the ultcast tree s bult on top of t. On the other hand, Overcast and ALMI use a drect approach. The step to buld the esh s bypassed and the ultcast tree s fored drectly. In overlay ultcast, snce ultcast ebers are responsble for forwardng ultcast packets, they suffer fro ultcast node falures. When a ultcast node fals, rapd ultcast tree recovery s essental to dstrbute ultcast data to dsconnected nodes. However, any researchers have focused ther attenton anly on constructng the ntal overlay ultcast tree [1, 2, 3, 4, 5, 6, 8, 11]. In ths paper, we are nterested n solvng the tree rearrangeent proble by establshng new connectons for the ultcast ebers when a ultcast node falure occurs. 2. Packet Delvery and Node Falures n Overlay Multcast Networks Overlay ultcast avods the deployent hurdles of IP ultcast at the cost of data delvery latency due to ts neffcent ultcast data dstrbuton. Ths neffcency s llustrated n the 3
4 exaple network of Fgure 1. In Fgure 1, nodes A, B, C, D, and E are ebers of a ultcast group, nodes R1, R2, and R3 are routers n the network, and the dashed lnes connectng the nodes are physcal lnks. The flows n Fgure 1 (a) llustrate how IP ultcast forwards data sent by A to the other ebers of the group. Fgure 1 (b) shows a possble overlay ultcast traffc flow. Fgure 1 (c) shows the overlay wthout the underlyng physcal network. Coparng Fgure 1 (a) and (b), t s clear that data delvery usng overlay ultcast experences longer delay than tradtonal IP ultcast delvery. Ths exaple shows that latency between the source and the ultcast ebers n an overlay ultcast largely depends on the desgn of the overlay route. Thus, n ths paper, we assue that end-to-end delay constrant s requred to avod excessve delay. Note n Fgure 1 (c) that each lnk n the overlay ultcast tree represents an ndependent uncast sesson. Node C of Fgure 1 (c) handles three uncast sessons. However, each ultcast node has a lt n the nuber of uncast sessons that can be handled sultaneously. It s due to the CPU perforance, network nterface card capacty, buffer sze and others. Thus we consder the degree constrant of a ultcast node n the overlay ultcast tree. The degree constrant represents the axu nuber of uncast sessons that a ultcast node can handle dependng on the capacty. B A B A A R1 R2 R1 R2 B C R3 E D C R3 E D D C E (a) Exstng Multcast (b) Overlay Multcast (c) Overlay wthout the underlyng physcal network Fgure 1. Coparson of packet delvery 4
5 B A Sngle doan R1 R2 C R3 D E Fgure 2. Overlay network for nter doan ultcast Overlay ultcast can also be used n nter-doan ultcast. Only a host fro each doan receves the ultcast data strea fro the reote sender va the overlay ultcast. The other recevers n the doan receve the applcaton data strea fro the host as llustrated n Fgure 2. The doan n ths paper represents a doan that s anaged by a coon ultcast protocol. Now, consder a tree rearrangeent n case of a node falure. In Fgure 3, suppose that node A has faled n the overlay ultcast tree. Thus, the chldren of node A have to rejon the ultcast sesson. The overlay ultcast tree s dvded nto several fragents as shown n Fgure 3 (b). Fgure 3 (c) shows the case where the end-to-end delay constrant s not satsfed by soe nodes after the ultcast tree rearrangeent, due to the degree bound of the node. The end-to-end delay can be reduced by the eployent of a node wth a hgher degree n the overlay ultcast tree [8]. Thus, to satsfy the end-to-end delay bound, we consder the eployent of the ultcast servce nodes (MSNs) whch allow relatvely hgh processng perforance by coverng all the dsconnected nodes. The eployent of an MSN requres addtonal lnks to connect the dsconnected ultcast nodes. The overlay ultcast tree rearrangeent, therefore, causes expenses for the MSNs and the lnks. For effcent tree rearrangeent, specal consderaton s requred n the selecton of the MSNs and addtonal lnks. In ths paper, we are nterested n nzng the cost of both 5
6 the MSNs and addtonal lnks when a node falure occurs. Faled node A (a) Sngle ultcast node falure (b) Separaton of ultcast tree End-to-end delay constrant s not satsfed. (c) Tree rearrangeent wthout the delay constrant Multcast Servce Node (MSN) (d) Tree rearrangeent wth the delay constrant Fgure 3. Node falure and tree rearrangeent 6
7 3. Multcast Tree Rearrangeent n Overlay Multcast Networks Gven a graph G = (V, E) where V s the set of nodes and E s the set of lnks, consder an overlay ultcast tree, T = (N, E1) where N V s the set of ultcast nodes and E1 E s the set of lnks n T. Let R N be the set of ultcast nodes to rejon the ultcast tree due to a node falure. The set of the black rectangle nodes n Fgure 3 corresponds to R. For a rejon node R, a sngle path s requred to connect the node to the ultcast source. If no path exsts between the ultcast source and node, the tree rearrangeent s possble. However, by assung at least one path between the ultcast source and node, the faled tree s rearranged to connect every ultcast node. Let x be a bnary varable to represent a lnk (,j) that s eployed for a path between the source and rejon ultcast eber. If lnk (,j) s eployed to connect the source and node, then x = 1. Otherwse, x = 0. The dotted lnes of Fgure 3 (c) and (d) represent lnks wth x = 1. Then the followng relaton holds for every node ncludng the source node s. x x = 1 k k for = s and all x x = 0 for V /{, s} and x x = 1 k for = and all R all In the above constrants, notce that several paths between the source and rejon nodes ay possbly traverse through lnk (,j). Snce the ultcast tree rearrangeent proble consders the cost of each addtonal lnk, we ntroduce a constant M to reflect the ultple new paths that share the sae lnk. Let y represent the adopton of lnk (,j) for the new paths, then the followng equaton holds. R R x + x j My for < j Note that the above equaton holds for any lnk n the overlay ultcast tree. 7
8 Now, as dscussed n the prevous secton, data delvery n the overlay ultcast tree s perfored by ndependent uncast sessons. Because each ultcast node ncludng the MSN has a capacty lt n the nuber of sultaneous uncast sessons, we consder the degree constrant of a ultcast node. The constrant represents the nuber of uncast sessons a ultcast node can handle sultaneously. By lettng w be the degree constrant of node, we have y + k y w z for all In addton to the above constrants, we need to consder the end-to-end delay between the source node and ultcast ebers. In ths proble, we assue that every ultcast eber has a delay bound. In other words, every path between the source and a rejon node has to satsfy the delay bound constrant. By lettng d be the lnk delay and D be the end-to-end delay bound, we have d (, j) E x D for all R Now, we need to nze the cost of the newly nstalled MSNs and that of the newly ncluded lnks. Let u and c respectvely be the cost of the newly nstalled nodes and lnks to rearrange the ultcast tree. Then the total cost s gven by L u z + (, j) E < j c 2 y where L V s a set of canddate MSNs and E2 E s a set of lnks newly ncluded nto the overlay ultcast tree. Fro the above dscusson, the ultcast tree rearrangeent proble can now be forulated as follows. Proble P: Mnze c y + subject to: (, j) E 2 < j L u z 8
9 x x = 1 for = s and all R (1) k k x x = 0 for V /{, s} and all R (2) x x = 1 for = and all R (3) k + x j My for < x j (4) y + y w z for all (5) d (, j) E x k D x, y, z are bnary varables for all R Consderng the NP-hardness of the overlay ultcast tree proble wthout the delay constrant [11], the proposed bnary nteger prograng proble s NP-hard. In the above forulaton constrants (1), (2) and (3) are well known constrants for the shortest path proble. Thus, relaxaton of constrants (4), (5) and (6) ay lead the proble to a less coplcated verson. Lagrangean relaxaton s a general soluton strategy for solvng such a relaxed proble. The procedure perts us to decopose a proble nto several easy subprobles by explotng ts specal structure. Ths soluton approach s used for solvng any odels wth ebedded network structure, such as the one consdered n [10, 15]. In fact, the Lagrangean relaxaton leads the overlay ultcast tree reconstructon proble nto three decoposed subprobles. The frst subproble s reduced nto a sple shortest path proble where any sophstcated algorths are avalable. The other two subprobles are reduced nto unconstraned nzaton probles that are easy to handle. Therefore, n the next secton we thus develop a Lagrangean relaxaton algorth as a prosng soluton procedure for the overlay tree rearrangeent proble. (6) 9
10 4. Lagrangean Relaxaton Based Heurstc for Tree Rearrangeent In ths secton, we consder the Lagrangean relaxaton [9] to solve the proble forulated n Secton 3. The relaxed proble s decoposed nto three subprobles whch can easly be solved by eployng the known algorths for the underlyng network structures [10]. Consder the tree rearrangeent proble P forulated n the prevous secton. The odel s an nteger prograng proble whch s, n general, dffcult to solve. Rather than solvng the dffcult optzaton proble drectly, we cobne the cubersoe constrants wth the orgnal objectve functon, where soe ultpler values act as penalty factors. Then the proble as a whole s transfored to a ore tractable for. The otvaton for adoptng ths approach s based on the fact that the orgnal proble P has an attractve substructure, the shortest path proble, whch we would lke to explot algorthcally. Let us dscuss the Lagrangean relaxaton procedure n ore detal. By relaxng constrants (4), (5), and (6), the relaxed proble P L s obtaned as follows. Proble P L Mnze Z L (λ) = ( R + L (, j) E ( u ( λ (, j) + λ ( ) d 1 w λ ( )) z 2 3 ) x λ ( ) D) + 3 ( c (, j) E 2 < j λ (, j) M 1 + λ ( ) + λ ( j)) y 2 2 Subject to x x = 1 k k for = s and all x x = 0 for V /{, s} and x x = 1 k x, y, z are bnary varables for = and all R all R R 10
11 The Lagrangean ultplers λ 1, λ 2 and λ 3 correspond to the constrant sets (4), (5) and (6) respectvely. Snce λ 1 (,j) s defned only for <j, we let λ 1 (,j) = λ 1 (j,) for coputatonal convenence. Here, note that proble P L can be decoposed nto followng three ndependent subprobles: Subproble P L1 Mnze Subject to ( 1 3 λ3 R (, j) E x x = 1 k k ( λ (, j) + λ ( ) d ) x ( ) D) for = s and all x x = 0 for V /{, s} and x x = 1 k x are bnary varables for = and all R all R R Subproble P L2 Mnze ( c λ1 (, j) M + λ ( ) + λ ( j)) 2 2 y (, j) E 2 < j Subproble P L3 Mnze ( u wλ2 ( )) z L For a specfc rejon node, subproble P L1 s a shortest path proble. Subproble P L2 and P L3 are unconstraned nzaton probles. Now we present a systeatc soluton procedure for the decoposed subprobles. () Soluton to subproble P L1 11
12 The well-known Dkstra s algorth [9, 14] s used for fxed n subproble P L1. The algorth fnds the shortest path fro the source node to the rejon ultcast node n a network. Dkstra s algorth solves the shortest path proble n O(N 2 ) te. Snce totally shortest path probles have to be solved at every teraton, the coputatonal coplexty of subproble P L1 s O(N 2 ). () Soluton to subproble P L2 Subproble P L2 s an unconstraned nzaton proble. If the coeffcent of y s negatve n the objectve functon, then y = 1 nzes the objectve functon value of subproble P L2. Otherwse, y = 0. Thus, the decson crteron of y s as follows. Let l = λ (, j) M + λ ( ) + λ ( )) ( c j y = 0 f l 0 y = 1 otherwse () Soluton to subproble P L3 Subproble P L3 s also an unconstraned nzaton proble. Thus, the decson crteron of z s as follows. Let v = u w λ ( ) 2 Z = 0 f v 0 z = 1 otherwse A soluton to the Lagrangean relaxaton proble P L s obtaned by solvng the above subprobles. However, the soluton to P L s usually not a feasble soluton to the orgnal proble P. Thus, a feasble soluton s obtaned at each teraton as follows. The soluton acqured n Lagrangean relaxaton proble P L s transfored nto tree for through Step 1 and Step 2. Step 3 akes the above soluton satsfy the delay and degree constrants by 12
13 reconstructng the feasble path between the source and rejon node. The soluton n Step 3 s further proved n Step 4. Let p() be an exstng path between the ultcast source and rejon node, eployed for the current ultcast tree, and let p () be a new path between the ultcast source and rejon node. In Step 4, f p () has lower cost than p(), p() s reoved fro the ultcast tree and p () s added to the ultcast tree. The heurstc for generatng feasble solutons s as follows. Step 1. y = 0 for all, j. z = 0 for all. Step 2. If Σ x 1, y = 1. If (y = 1) and ( P), z = 1. If (y = 1) and (j P), z j = 1. Step 3. Check feasblty for each node. If the soluton s feasble for all node, then Goto Step 4. Otherwse, update the network for feasble node and copute Dkstra s algorth to recopute x for nfeasble node. Goto Step 1. Step 4. If ternaton crteron s satsfed, Whle all rejon nodes are not searched, Select a rejon node that s not searched. Fnd a p (). If p () has lower cost than p(), p() s reoved fro the current soluton. p () s added to the current soluton. Stop. 13
14 Otherwse, Stop. Accordng to the Lagrangean boundng prncple [9] we can calculate the axu allowable error range for each of the feasble solutons obtaned. For any vector λ of the Lagrangean ultplers, the objectve functon value Z L (λ) of the Lagrangean dual functon s a lower bound to the optal objectve functon value Z P * of the orgnal optzaton proble P. Thus, we have Z L (λ) Z P *. The boundng prncple edately ples one advantage of the Lagrangean relaxaton approach. The ethod gves us a useful ternaton crteron nvolvng axu allowable error range. At each teraton, Lagrangean relaxaton proble P L s solved by usng updated ultpler value λ. A feasble soluton to the proble P s then generated va the proposed heurstc fro the soluton of the relaxed proble. Let Z P be the objectve functon value of proble P by the feasble soluton. Then the axu allowable error range ε s defned as Z ε = P Z L ( λ) 100% Z ( λ) L Start Copute Lower bound and feasble soluton Solve sub-proble 1 Solve sub-proble 2 Is ternaton crtera satsfed? Yes End Solve sub-proble 3 No Update ultplers wth subgradent ethod Fgure 4. Procedure of the proposed heurstc 14
15 Lagrangean relaxaton proble P L s repeatedly solved by usng updated ultpler values untl the axu allowable error range ε satsfes a ternaton threshold or the nuber of teratons exceeds the threshold lt. We use the subgradent ethod [10, 13] for updatng Lagrangean ultplers. Fgure 4 shows the overall procedure of the proposed algorth. 5. Coputatonal Results In ths secton, we dscuss the coputatonal experent of the Lagrangean relaxaton based heurstc for the tree rearrangeent proble. Multcast networks wth 50 and 100 nodes are generated. In each network, lnks are randoly generated such that the total nuber of lnks becoes E = 5 V. The average lnk cost s assued to be 10. Each lnk has average delay value of three. The end-to-end delay bound has the value of 10 and 20 n the network wth 50 nodes and 15 and 25 n the network of 100 nodes. The average cost of MSN s assued to be 20 and degree constrant has the value of 3 and 8 n the network wth 50 nodes. These values are 5 and 15 n the network of 100 nodes. All soluton procedures are run on a Pentu III-660MHz PC. Table 1 and 2 respectvely show the result of the proposed algorth n 50 and 100 nodes ultcast networks. The CPLEX [12] s eployed to have optal solutons. The proposed Lagrangean heurstc shows good perforance n every proble category of delay bound and degree constrants. The soluton gap fro the optal soluton s slghtly hgher n probles wth lower delay bound and degree constrant. As shown n the table, the average soluton gap fro the optal soluton s 5% and 5.6% respectvely n the 50 and 100 node probles. The CPU seconds are also copared as shown n the tables. The coputatonal effort requred by the proposed algorth s draatcally reduced when copared to the exact soluton procedure. The coputatonal result s further nvestgated by exanng the requred nuber of MSNs, 15
16 due to the dfferent values of delay bounds and degree constrants. Fgure 5 shows that ore MSNs are eployed as the proble becoes ore dffcult. As the delay bound and degree constrant becoes tghter, the eployed nuber of MSNs ncreases for the tree rearrangeent. The ncrease sees to be ore senstve to the delay bound when the degree constrant s tght. Further experents are perfored to exane the cost senstvty of the overlay tree rearrangeent. Fgure 6 shows the nuber of eployed MSNs when dfferent unt MSN cost s appleds. It s clear that ore MSNs are eployed as the nuber of rejonng ultcast nodes ncreases. The ncrease of the requred MSNs s also senstve to the unt cost. Hgher unt cost constrants the nuber of MSNs to cover the rejon hosts. 6. Concluson To overcoe node falures n overlay ultcast networks, ultcast tree rearrangeent s consdered by eployng the ultcast servce nodes (MSNs). The servce nodes generate new paths fro a source to ultcast ebers such that the end-to-end delay bound s satsfed. Snce each ultcast eber s responsble for forwardng the packets n the overlay network, the degree constrant of a ultcast node s also consdered. The tree rearrangeent proble s forulated as a bnary nteger lnear progra that nzes the cost of MSNs and newly adopted lnks. Lagrangean relaxaton based heurstc s developed to solve the proble. Soe ntractable constrants are relaxed and added nto the objectve as a penalty. Then the proble s decoposed nto three subprobles that are easy to handle. Networks wth 50 and 100 nodes are generated for coputatonal experents. In each network, four categores of probles are tested wth dfferent delay bounds and degree constrants. The average soluton gap fro the optal soluton s 5% and 5.6% respectvely n 16
17 the 50 and 100 node probles. The coputatonal te requred by the proposed algorth s draatcally reduced copared to the exact soluton procedure. The requred nuber of MSNs due to the dfferent values of delay bound and degree constrant s also nvestgated. As the proble becoes tghter, the eployed nuber of MSNs ncreases to recover the node falure. The ncrease s ore senstve to the delay bound when the degree constrant s tghter. The cost of MSN also affects the eployent of the nodes. 17
18 Heurstc Optal Optal Proble (Delay bound, CPU Nuber Soluton value CPU GAP* Degree constrant) seconds (HS) (OPT) seconds 1 (10,3) (10,3) (10,3) (10,3) (10,3) (10,8) (10,8) (10,8) (10,8) (10,8) (20,3) (20,3) (20,3) (20,3) (20,3) (20,8) (20,8) (20,8) (20,8) (20,8) *GAP = (HS-OPT)/OPT Table 1. Perforance of the proposed heurstc wth 50 nodes 18
19 Heurstc Optal Optal Proble (Delay bound, CPU Nuber Soluton value CPU GAP* Degree constrant) seconds (HS) (OPT) seconds 1 (15,5) (15,5) (15,5) (15,5) (15,5) (15,15) (15,15) (15,15) (15,15) (15,15) (25,5) (25,5) (25,5) (25,5) (25,5) (25,15) (25,15) (25,15) (25,15) (25,15) *GAP = (HS-OPT)/OPT Table 2. Perforance of the proposed heurstc wth 100 nodes 19
20 3 2.5 (15,5) 100 node probles 50 node probles The nuber of MSNs (10,3) (10,8) (15,15) (25,5) (20,3) (25,15) (20,8) (Delay bound, Degree constrant) Fgure 5. The nuber of MSNs eployed for the tree rearrangeent The nuber of MSNs Average MSN cost = 10 Average MSN cost = 20 Average MSN cost = Rejon ultcast nodes Fgure 6. The nuber of MSNs for the tree rearrangeent 20
21 References [1] P. Francs. Yod: Your own Internet dstrbuton, UC Berkeley ACIRI Tech Report, Apr [2] Y. Chawathe. Scattercast: An Archtecture for Internet Broadcast Dstrbuton as an Infrastructure Servce, Ph. D. thess, Departent of EECS, UC Berkeley, Dec [3] Y. Chu, S. Rao, and H. Zhang. A case for end syste ultcast, ACM Sgetrcs, [4] J. Jannott, D. K. Gfford, K. Jhonson, and M. Kaashock. Overcast: Relable ultcastng wth an overlay network, 5 th Syposu on Openng Syste Desgn and Ipleentaton, Dec [5] D. Tellu. ALMI: An Applcaton Level Multcast Infrastructure, 3 rd Usenx Syposu on Internet Technologes and Systes, March, [6] D. Helder and S. Jan. Banana Tree Protocol, an End-host Multcast Protocol, Tech Report, July [7] Y. Zhu, M. Wu, and W. Shu. Coparson Study and Evaluaton of overlay Multcast Networks, ICME, [8] N.M. Malouch, Z. L, D. Rubensten and S.A Sahu. Graph theoretc approach n proxyasssted, end-syste ultcast, Qualty of Servce, Tenth IEEE Internatonal Workshop, pp , May [9] R. K. Ahuja, T. L. Magnant and J. B. Orln. Network Flows: Theory, Algorths, and Applcatons, Prentcehall, [10] H. Cho, H. Lee, K. Lee, S. K, and J. Lee. "Optal locaton of swtches and nterconnectons for ATM LANs," Coputers & Operatons Research, v. 28, pp , Nov
22 [11] S. Sh and J. Turner. Routng n Overlay Multcast Networks, IEEE INFOCOM, [12] CPLEX 7.0, CPLEX Optzaton Inc [13] M. Held, P. Wolfe and H. P. Crowder. Valdaton of Subgradent Optzaton, Matheatcal Prograng, vol. 6, pp 62-88, [14] D. Bertsekas and R. Gallager. Data Networks, Englewood Clffs, NJ:Prentce Hall, [15] L. Bahense, F. Barahona, and O. Porto. Solvng Stener Tree Probles n Graphs wth Lagrangan Relaxaton, Journal of cobnatoral optzaton, v.7 no.3, pp ,
Optimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming
Optzaton Methods: Integer Prograng Integer Lnear Prograng Module Lecture Notes Integer Lnear Prograng Introducton In all the prevous lectures n lnear prograng dscussed so far, the desgn varables consdered
More informationAn Efficient Fault-Tolerant Multi-Bus Data Scheduling Algorithm Based on Replication and Deallocation
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 16, No Sofa 016 Prnt ISSN: 1311-970; Onlne ISSN: 1314-4081 DOI: 10.1515/cat-016-001 An Effcent Fault-Tolerant Mult-Bus Data
More informationOn-line Scheduling Algorithm with Precedence Constraint in Embeded Real-time System
00 rd Internatonal Conference on Coputer and Electrcal Engneerng (ICCEE 00 IPCSIT vol (0 (0 IACSIT Press, Sngapore DOI: 077/IPCSIT0VNo80 On-lne Schedulng Algorth wth Precedence Constrant n Ebeded Real-te
More informationSolutions to Programming Assignment Five Interpolation and Numerical Differentiation
College of Engneerng and Coputer Scence Mechancal Engneerng Departent Mechancal Engneerng 309 Nuercal Analyss of Engneerng Systes Sprng 04 Nuber: 537 Instructor: Larry Caretto Solutons to Prograng Assgnent
More informationA Unified Approach to Survivability of Connection-Oriented Networks
A Unfed Approach to Survvablty of Connecton-Orented Networs Krzysztof Walowa Char of Systes and Coputer Networs, Faculty of Electroncs, Wroclaw Unversty of Technology, Wybrzeze Wyspansego 27, 50-370 Wroclaw,
More informationIntroduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time
Lesle Laports e, locks & the Orderng of Events n a Dstrbuted Syste Joseph Sprng Departent of oputer Scence Dstrbuted Systes and Securty Overvew Introducton he artal Orderng Logcal locks Orderng the Events
More informationALM-FastReplica: Optimizing the Reliable Distribution of Large Files within CDNs
ALM-FastReplca: Optzng the Relable Dstrbuton of Large Fles wthn CDNs Ludla Cherkasova Internet Systes and Storage Laboratory HP Laboratores Palo Alto HPL-005-64 Aprl 4, 005* E-al: cherkasova@hpl.hp.co
More informationHeuristic Methods for Locating Emergency Facilities
Heurstc Methods for Locatng Eergency Facltes L. Caccetta and M. Dzator Western Australan Centre of Excellence n Industral Optsaton, Curtn Unversty of Technology, Kent Street, Bentley WA 602, Australa E-Mal:
More informationTN348: Openlab Module - Colocalization
TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationGenerating Fuzzy Term Sets for Software Project Attributes using and Real Coded Genetic Algorithms
Generatng Fuzzy Ter Sets for Software Proect Attrbutes usng Fuzzy C-Means C and Real Coded Genetc Algorths Al Idr, Ph.D., ENSIAS, Rabat Alan Abran, Ph.D., ETS, Montreal Azeddne Zah, FST, Fes Internatonal
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationAn Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed
More informationIntra-Parametric Analysis of a Fuzzy MOLP
Intra-Parametrc Analyss of a Fuzzy MOLP a MIAO-LING WANG a Department of Industral Engneerng and Management a Mnghsn Insttute of Technology and Hsnchu Tawan, ROC b HSIAO-FAN WANG b Insttute of Industral
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationMultiple Instance Learning via Multiple Kernel Learning *
The Nnth nternatonal Syposu on Operatons Research and ts Applcatons (SORA 10) Chengdu-Juzhagou, Chna, August 19 23, 2010 Copyrght 2010 ORSC & APORC, pp. 160 167 ultple nstance Learnng va ultple Kernel
More informationAADL : about scheduling analysis
AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng
More informationWhat is Object Detection? Face Detection using AdaBoost. Detection as Classification. Principle of Boosting (Schapire 90)
CIS 5543 Coputer Vson Object Detecton What s Object Detecton? Locate an object n an nput age Habn Lng Extensons Vola & Jones, 2004 Dalal & Trggs, 2005 one or ultple objects Object segentaton Object detecton
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationA New Scheduling Algorithm for Servers
A New Schedulng Algorth for Servers Nann Yao, Wenbn Yao, Shaobn Ca, and Jun N College of Coputer Scence and Technology, Harbn Engneerng Unversty, Harbn, Chna {yaonann, yaowenbn, cashaobn, nun}@hrbeu.edu.cn
More informationUser Behavior Recognition based on Clustering for the Smart Home
3rd WSEAS Internatonal Conference on REMOTE SENSING, Vence, Italy, Noveber 2-23, 2007 52 User Behavor Recognton based on Clusterng for the Sart Hoe WOOYONG CHUNG, JAEHUN LEE, SUKHYUN YUN, SOOHAN KIM* AND
More informationReview of approximation techniques
CHAPTER 2 Revew of appromaton technques 2. Introducton Optmzaton problems n engneerng desgn are characterzed by the followng assocated features: the objectve functon and constrants are mplct functons evaluated
More information6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour
6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the
More informationMathematics 256 a course in differential equations for engineering students
Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More informationA NEW APPROACH FOR SOLVING LINEAR FUZZY FRACTIONAL TRANSPORTATION PROBLEM
Internatonal Journal of Cvl Engneerng and Technology (IJCIET) Volue 8, Issue 8, August 217, pp. 1123 1129, Artcle ID: IJCIET_8_8_12 Avalable onlne at http://http://www.aee.co/cet/ssues.asp?jtype=ijciet&vtype=8&itype=8
More informationOn Some Entertaining Applications of the Concept of Set in Computer Science Course
On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,
More informationEfficient Distributed File System (EDFS)
Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate
More informationA New Token Allocation Algorithm for TCP Traffic in Diffserv Network
A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,
More informationON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE
Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton
More informationClassification / Regression Support Vector Machines
Classfcaton / Regresson Support Vector Machnes Jeff Howbert Introducton to Machne Learnng Wnter 04 Topcs SVM classfers for lnearly separable classes SVM classfers for non-lnearly separable classes SVM
More informationMerging Results by Using Predicted Retrieval Effectiveness
Mergng Results by Usng Predcted Retreval Effectveness Introducton Wen-Cheng Ln and Hsn-Hs Chen Departent of Coputer Scence and Inforaton Engneerng Natonal Tawan Unversty Tape, TAIWAN densln@nlg.cse.ntu.edu.tw;
More informationQuality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation
Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on
More informationA Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics
A Hybrd Genetc Algorthm for Routng Optmzaton n IP Networks Utlzng Bandwdth and Delay Metrcs Anton Redl Insttute of Communcaton Networks, Munch Unversty of Technology, Arcsstr. 21, 80290 Munch, Germany
More information126 Int. J. Ad Hoc and Ubiquitous Computing, Vol. 1, No. 3, Djamel Djenouri*
126 Int. J. Ad Hoc and Ubqutous Coputng, Vol. 1, No. 3, 2006 New power-aware routng protocol for oble ad hoc networks Djael Djenour* Basc Software Laboratory, CERIST Center of Research, Algers, Algera
More informationThe Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique
//00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy
More informationScheduling Workflow Applications on the Heterogeneous Cloud Resources
Indan Journal of Scence and Technology, Vol 8(2, DOI: 0.7485/jst/205/v82/57984, June 205 ISSN (rnt : 0974-6846 ISSN (Onlne : 0974-5645 Schedulng Workflow Applcatons on the Heterogeneous Cloud Resources
More informationPrivate Information Retrieval (PIR)
2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market
More informationParallel Branch and Bound Algorithm - A comparison between serial, OpenMP and MPI implementations
Journal of Physcs: Conference Seres Parallel Branch and Bound Algorthm - A comparson between seral, OpenMP and MPI mplementatons To cte ths artcle: Luco Barreto and Mchael Bauer 2010 J. Phys.: Conf. Ser.
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationMeasuring Cohesion of Packages in Ada95
Measurng Coheson of Packages n Ada95 Baowen Xu Zhenqang Chen Departent of Coputer Scence & Departent of Coputer Scence & Engneerng, Southeast Unversty Engneerng, Southeast Unversty Nanjng, Chna, 20096
More informationTPL-Aware Displacement-driven Detailed Placement Refinement with Coloring Constraints
TPL-ware Dsplacement-drven Detaled Placement Refnement wth Colorng Constrants Tao Ln Iowa State Unversty tln@astate.edu Chrs Chu Iowa State Unversty cnchu@astate.edu BSTRCT To mnmze the effect of process
More informationA fair buffer allocation scheme
A far buffer allocaton scheme Juha Henanen and Kalev Klkk Telecom Fnland P.O. Box 228, SF-330 Tampere, Fnland E-mal: juha.henanen@tele.f Abstract An approprate servce for data traffc n ATM networks requres
More information5 The Primal-Dual Method
5 The Prmal-Dual Method Orgnally desgned as a method for solvng lnear programs, where t reduces weghted optmzaton problems to smpler combnatoral ones, the prmal-dual method (PDM) has receved much attenton
More informationVideo Proxy System for a Large-scale VOD System (DINA)
Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,
More informationA New Approach For the Ranking of Fuzzy Sets With Different Heights
New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationConnection-information-based connection rerouting for connection-oriented mobile communication networks
Dstrb. Syst. Engng 5 (1998) 47 65. Prnted n the UK PII: S0967-1846(98)90513-7 Connecton-nformaton-based connecton reroutng for connecton-orented moble communcaton networks Mnho Song, Yanghee Cho and Chongsang
More informationAN ALGORITHM FOR ODD GRACEFULNESS OF THE TENSOR PRODUCT OF TWO LINE GRAPHS
Internatonal ournal on applcatons of graph theory n wreless ad hoc networks and sensor networks (GRAPH-HOC) Vol.3, No., March 0 AN ALGORITHM FOR ODD GRACEFULNESS OF THE TENSOR PRODUCT OF TWO LINE GRAPHS
More informationQoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding
Tarno et al. EURASIP Journal on Wreless Communcatons and Networkng 214, 214:81 http://wcn.euraspournals.com/content/214/1/81 RESEARCH Open Access QoS-aware routng for heterogeneous layered uncast transmssons
More informationFeature Reduction and Selection
Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components
More informationSolutions for Real-Time Communication over Best-Effort Networks
Solutons for Real-Tme Communcaton over Best-Effort Networks Anca Hangan, Ramona Marfevc, Gheorghe Sebestyen Techncal Unversty of Cluj-Napoca, Computer Scence Department {Anca.Hangan, Ramona.Marfevc, Gheorghe.Sebestyen}@cs.utcluj.ro
More informationAssembler. Building a Modern Computer From First Principles.
Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought
More informationEvaluation of an Enhanced Scheme for High-level Nested Network Mobility
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.
More informationAdvanced Computer Networks
Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans
More informationPerformance Analysis of Coiflet Wavelet and Moment Invariant Feature Extraction for CT Image Classification using SVM
Perforance Analyss of Coflet Wavelet and Moent Invarant Feature Extracton for CT Iage Classfcaton usng SVM N. T. Renukadev, Assstant Professor, Dept. of CT-UG, Kongu Engneerng College, Perundura Dr. P.
More informationEnergy-aware Delay-Constrained Routing in Wireless Sensor Networks
Energy-aware Delay-Constraned Routng n Wreless Sensor Networks Keal Akkaya and Mohaed Youns Departent of Coputer Scence and Electrcal Engneerng Unversty of Maryland Baltore County, Baltore, MD 21250 {keal1,
More informationLarge Margin Nearest Neighbor Classifiers
Large Margn earest eghbor Classfers Sergo Bereo and Joan Cabestany Departent of Electronc Engneerng, Unverstat Poltècnca de Catalunya (UPC, Gran Captà s/n, C4 buldng, 08034 Barcelona, Span e-al: sbereo@eel.upc.es
More informationLow training strength high capacity classifiers for accurate ensembles using Walsh Coefficients
Low tranng strength hgh capacty classfers for accurate ensebles usng Walsh Coeffcents Terry Wndeatt, Cere Zor Unv Surrey, Guldford, Surrey, Gu2 7H t.wndeatt surrey.ac.uk Abstract. If a bnary decson s taken
More informationTsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance
Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for
More informationSum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints
Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan
More informationTECHNICAL REPORT AN OPTIMAL DISTRIBUTED PROTOCOL FOR FAST CONVERGENCE TO MAXMIN RATE ALLOCATION. Jordi Ros and Wei K Tsai
TECHNICAL REPORT AN OPTIMAL DISTRIUTED PROTOCOL FOR FAST CONVERGENCE TO MAXMIN RATE ALLOCATION Jord Ros and We K Tsa Department of Electrcal and Computer Engneerng Unversty of Calforna, Irvne 1 AN OPTIMAL
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationA MapReduce-supported Data Center Networking Topology
A MapReduce-supported Data Center Networkng Topology Zelu Dng*,, Xue Lu, Deke Guo*, Honghu Chen*, Xueshan Luo* * Natonal Unversty of Defense Technology, Chna McGll Unversty, Canada Abstract Several novel
More informationMeta-heuristics for Multidimensional Knapsack Problems
2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,
More informationObstacle-Aware Routing Problem in. a Rectangular Mesh Network
Appled Mathematcal Scences, Vol. 9, 015, no. 14, 653-663 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.1988/ams.015.411911 Obstacle-Aware Routng Problem n a Rectangular Mesh Network Norazah Adzhar Department
More informationRouting Time-Constrained Traffic in Wireless Sensor Networks
Routng Te-Constraned Traffc n Wreless Sensor Networks Keal Akkaya and Mohaed Youns Departent of Coputer Scence and Electrcal Engneerng Unversty of Maryland, Baltore County Baltore, MD 2250 keal youns@cs.ubc.edu
More informationEquation Based Rate Control and Multiple Connections for Adaptive Video Streaming in Cellular Networks
Equaton Based Rate Control and Multple Connectons for Adaptve Vdeo Streang n Cellular Networks A. Mardanan Dehkord and V. Tabataba Vakl Abstract Rate control s an portant ssue for vdeo streang n cellular
More informationA Facet Generation Procedure. for solving 0/1 integer programs
A Facet Generaton Procedure for solvng 0/ nteger programs by Gyana R. Parja IBM Corporaton, Poughkeepse, NY 260 Radu Gaddov Emery Worldwde Arlnes, Vandala, Oho 45377 and Wlbert E. Wlhelm Teas A&M Unversty,
More informationPrediction of Dumping a Product in Textile Industry
Int. J. Advanced Networkng and Applcatons Volue: 05 Issue: 03 Pages:957-96 (03) IN : 0975-090 957 Predcton of upng a Product n Textle Industry.V.. GANGA EVI Professor n MCA K..R.M. College of Engneerng
More informationConditional Speculative Decimal Addition*
Condtonal Speculatve Decmal Addton Alvaro Vazquez and Elsardo Antelo Dep. of Electronc and Computer Engneerng Unv. of Santago de Compostela, Span Ths work was supported n part by Xunta de Galca under grant
More informationA system based on a modified version of the FCM algorithm for profiling Web users from access log
A syste based on a odfed verson of the FCM algorth for proflng Web users fro access log Paolo Corsn, Laura De Dosso, Beatrce Lazzern, Francesco Marcellon Dpartento d Ingegnera dell Inforazone va Dotsalv,
More informationColored Traveling Salesman Problem and Solution
Preprnts of the 19th World Congress The Internatonal Federaton of Autoatc Control Cape Town, South Afrca. August 24-29, 2014 Colored Travelng Salesan Proble and Soluton Jun L 1, 2, Qru Sun 1, 2, MengChu
More informationScheduling and queue management. DigiComm II
Schedulng and queue management Tradtonal queung behavour n routers Data transfer: datagrams: ndvdual packets no recognton of flows connectonless: no sgnallng Forwardng: based on per-datagram forwardng
More informationWavefront Reconstructor
A Dstrbuted Smplex B-Splne Based Wavefront Reconstructor Coen de Vsser and Mchel Verhaegen 14-12-201212 2012 Delft Unversty of Technology Contents Introducton Wavefront reconstructon usng Smplex B-Splnes
More informationARTICLE IN PRESS. Signal Processing: Image Communication
Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton
More informationAPPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT
3. - 5. 5., Brno, Czech Republc, EU APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT Abstract Josef TOŠENOVSKÝ ) Lenka MONSPORTOVÁ ) Flp TOŠENOVSKÝ
More informationSession 5.3. Switching/Routing and Transmission planning
ITU Regonal Semnar Belgrade Serba and Montenegro 20-24 24 June 2005 Sesson 5.3 Swtchng/Routng and Transmsson plannng volvng nfrastructures to NGN and related Plannng Strateges and Tools I.S. Sesson 5.3-1
More informationMulti-Constraint Multi-Processor Resource Allocation
Mult-Constrant Mult-Processor Resource Allocaton Ar R. B. Behrouzan 1, Dp Goswa 1, Twan Basten 1,2, Marc Gelen 1, Had Alzadeh Ara 1 1 Endhoven Unversty of Technology, Endhoven, The Netherlands 2 TNO Ebedded
More informationEfficient Load-Balanced IP Routing Scheme Based on Shortest Paths in Hose Model. Eiji Oki May 28, 2009 The University of Electro-Communications
Effcent Loa-Balance IP Routng Scheme Base on Shortest Paths n Hose Moel E Ok May 28, 2009 The Unversty of Electro-Communcatons Ok Lab. Semnar, May 28, 2009 1 Outlne Backgroun on IP routng IP routng strategy
More informationColor Image Segmentation Based on Adaptive Local Thresholds
Color Iage Segentaton Based on Adaptve Local Thresholds ETY NAVON, OFE MILLE *, AMI AVEBUCH School of Coputer Scence Tel-Avv Unversty, Tel-Avv, 69978, Israel E-Mal * : llero@post.tau.ac.l Fax nuber: 97-3-916084
More information2016 International Conference on Sustainable Energy, Environment and Information Engineering (SEEIE 2016) ISBN:
06 Internatonal Conference on Sustanable Energy, Envronent and Inforaton Engneerng (SEEIE 06) ISBN: 978--60595-337-3 A Study on IEEE 80. MAC Layer Msbehavor under Dfferent Back-off Algorths Trong Mnh HOANG,,
More informationSupport Vector Machines
/9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.
More informationRoutability Driven Modification Method of Monotonic Via Assignment for 2-layer Ball Grid Array Packages
Routablty Drven Modfcaton Method of Monotonc Va Assgnment for 2-layer Ball Grd Array Pacages Yoch Tomoa Atsush Taahash Department of Communcatons and Integrated Systems, Toyo Insttute of Technology 2 12
More informationMinimum Cost Optimization of Multicast Wireless Networks with Network Coding
Mnmum Cost Optmzaton of Multcast Wreless Networks wth Network Codng Chengyu Xong and Xaohua L Department of ECE, State Unversty of New York at Bnghamton, Bnghamton, NY 13902 Emal: {cxong1, xl}@bnghamton.edu
More informationRAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:
Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationA Partial Decision Scheme for Local Search Algorithms for Distributed Constraint Optimization Problems
A Partal Decson Schee for Local Search Algorths for Dstrbuted Constrant Optzaton Probles Zhepeng Yu, Zyu Chen*, Jngyuan He, Yancheng Deng College of Coputer Scence, Chongqng Unversty, Chongqng, Chna {204402053,
More informationENSEMBLE learning has been widely used in data and
IEEE GEOSCIENCE AND REMOTE SENSING LETTERS, VOL. 9, NO. 5, SEPTEMBER 2012 943 Sparse Kernel-Based Hyperspectral Anoaly Detecton Prudhv Gurra, Meber, IEEE, Heesung Kwon, Senor Meber, IEEE, andtothyhan Abstract
More informationAnalysis of Continuous Beams in General
Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,
More informationOptimal Distribution of Remotely-Subscribed Multicast Traffic within a Proxy Mobile IPv6 Domain by Using Explicit Multicast
ptmal strbuton of Remotely-Subscrbed Multcast Traffc wthn a Proxy Moble v6 oman by Usng Explct Multcast us M. Contreras *, Carlos J. Bernardos * Core Networ Evoluton Telefónca I+ on Ramón de la Cruz, 82-84,
More informationDelay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks
Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network
More informationAn efficient iterative source routing algorithm
An effcent teratve source routng algorthm Gang Cheng Ye Tan Nrwan Ansar Advanced Networng Lab Department of Electrcal Computer Engneerng New Jersey Insttute of Technology Newar NJ 7 {gc yt Ansar}@ntedu
More informationA Theory of Non-Deterministic Networks
A Theory of Non-Deternstc Networs Alan Mshcheno and Robert K rayton Departent of EECS, Unversty of Calforna at ereley {alan, brayton}@eecsbereleyedu Abstract oth non-deterns and ult-level networs copactly
More informationAvoiding congestion through dynamic load control
Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach
More informationScheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research
Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research
More information