Disjoint Multipath Routing in Dual Homing Networks using Colored Trees
|
|
- Kristin Bruce
- 5 years ago
- Views:
Transcription
1 Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona, Tucson, AZ 2 {pthulasi, srini, krunz}@ece.arizona.eu Abstract Wireless sensor networks (WSNs) employe in monitoring applications require ata collecte by the sensors to be eposite at specific noes, referre to as rains. To improve robustness in ata collection, we consier a ual homing network in which two rains are employe an every noe is require to sen ata to the two rains over link- or noe-isjoint paths. One approach to reuce the number of routing table entries at a noe is to construct two trees, namely re an blue, each roote at a particular rain such that the paths from any noe to the two rains on the trees are link- or noe-isjoint. In this paper, we evelop the first istribute algorithm for constructing colore trees in a ual-homing network whose running time is linear in the number of links. In aition, we show that the average path length may be optimize by employing the generalize low-point concept rather than the traitional low-point concept. I. INTRODUCTION Recent avancements in low-power computing, sensing, an wireless communications have contribute to the emergence of multi-hop wireless sensor networks (WSNs) as a costeffective solution for surveillance/monitoring applications. The ata collecte by sensors in a WSN is require to be eposite at specific noes, referre to as rains. In orer to improve robustness in ata collection, we consier a scenario where two rains are employe an ata from every sensor is require to be eposite at both the rains. As the sensor noes have limite battery energy an computational capabilities, implementation of sophisticate transport layer protocols that guarantee en-to-en reliable transmission is impractical. One approach to achieve the goal of robustness is to employ multipath routing (MPR). MPR operates by transmitting ata over multiple paths. In general, the multiple paths from a source to a estination may have common links (or noes) as long as the share links (or noes) have sufficient resources. To improve the transmission reliability an avoi share-link (or noe) failures, the multiple paths can be selecte to be linkor noe-isjoint. In this case, the MPR approach is referre to as isjoint multipath routing (DMPR). Implementation of MPR an DMPR poses two main challenges []. The first is relate to the computation of loopfree multiple paths. For large networks, a istribute solution that relies only on local information is preferre. Distribute multipath routing algorithms in the literature are evelope in the context of wireless networks. MPR approaches base on Dynamic Source Routing (DSR) [2], [], [] require the estination to select maximally isjoint paths among the receive route requests. MPR approaches base on AODV routing [], [], [], [], [] o not guarantee fining isjoint paths. Protocols such as Directe Diffusion [] that have been evelope specifically for wireless sensor networks o not guarantee isjoint multiple paths an may result in loops after a link/noe failure. The secon challenge of implementing MPR or DMPR techniques is relate to forwaring of ata over the multiple paths. Datagram networks rely on the estination aress in the packet heaer for forwaring packets over one path. To implement MPR or DMPR techniques, every noe must maintain a set of preferre neighbors to reach a estination, such that the paths are loop-free (an isjoint, if neee). The forwaring of packets must be base on estination aress an some aitional information (such as source aress, labels, etc.). The intermeiate noes must be aware of this aitional information or otherwise, it must be carrie in every packet heaer. To reuce the routing table overhea, hence reuce lookup time, a novel multipath routing strategy calle colore trees (CT) was evelope []. Every noe in the network has two preferre neighbors to a estination, namely re an blue. A packet transmitte from a source is marke with one of the two colors. An intermeiate noe that receives the packet forwars it to its preferre neighbor base on the color of the packet. Thus, the routing table at a noe has only two entries for every estination noe. The network may be viewe as two trees, namely re an blue, that are roote at the estination. The two paths from a given source to the root of the two trees are link/noe-isjoint. The colore trees may be constructe by aapting the centralize algorithms evelope for robust multicasting [], [], [], by simply reversing the arcs obtaine in the multicast trees. The first istribute algorithm for constructing colore trees, whose complexity is linear in the number of eges, was evelope in []. A ual homing network (DHN) is traitionally employe in IP-base access networks []. A DHN consists of two eicate routers, referre to as ual homes, through which the noes within the access network are connecte to those outsie the access network. A sensor network with two rains may be viewe as a DHN where the two rains act as the two homes. In orer to overcome a single link (or noe) failure within the network, every noe is require to have a path to the two homes that are link-isjoint (or noe-isjoint). In orer to
2 maintain isjoint routes with minimum routing table overhea, thereby reucing routing table lookup time, we evelop the colore trees to ual homes (CTDH). In this approach, the re tree is roote at one home while the blue tree is roote at the other such that the path from any source to the two homes on the two trees are link-isjoint (or noe-isjoint). Figure shows two trees, one roote at noe an the other roote at, in a ual-homing network with noes an as the ual homes. It may be observe that the paths from any noe to the ual homes on the two trees are noe-isjoint. (a) Re tree roote at. (b) Blue tree roote at. Fig.. An example network with re an blue trees. The path from a source to the two homes (rains) are noe-isjoint on the two trees. Contribution. This paper () proves that 2-ege (or 2- noe) connectivity is a sufficient conition for the existence of a solution to the CTDH problem satisfying link-isjoint (or noe-isjoint) constraint; (2) evelops a istribute solution to the CTDH problem whose complexity is linear in the number of eges; () evaluates the effectiveness of employing generalize low-point concept compare to traitional lowpoint concept; an () evaluates the effectiveness of the trees constructe uner multiple link failures. The rest of the paper is organize as follows: Section II escribes the network moel an problem efinition. Section III evelops the linear-time istribute algorithm for constructing the two colore trees. Section IV presents the performance comparison of the istribute algorithm with traitional an generalize low-point concepts. Our conclusions are presente in Section V. II. PROBLEM STATEMENT AND PRELIMINARIES Consier a network G(N, L) compose of a set of noes N an a set of links L. The links are assume to be bi-irectional. The terminology of arc is use to refer to a irecte link between two noes. An arc from noe i to j is represente as i j. Given ual homes, N, the goal is to construct two trees R an B (referre to as the re an blue trees, respectively) roote at an, respectively, that minimize the average path length from a source to the homes such that the CTDH-LD (CTDH-ND) version of the problem satisfies the link-isjoint (noe-isjoint) path constraint. The isjoint path constraints are state as follows. Let P R s an P B s enote the paths from a noe s to rains an on trees R an B, respectively. Link-isjoint path constraint: s N \ {, } an i, j N i j P R s (i j / P B s ) (j i / P B s ). Noe-isjoint path constraint: s N \ {, } an i N \ {s, } i P R s (i / P B s ). If the two homes are the same, say = =, then we refer to the problem of constructing colore trees roote at a given estination such that the path from any noe to the estination is link-isjoint (noe-isjoint) as the CT-LD (CT-ND) problem. Theorem: A solution to the CTDH-LD (CTDH-ND) problem exists if the network is 2-ege (2-noe) connecte. Proof: Construct a graph G from G with an aitional noe an two biirectional links (, ) an (, ). The graph G remains 2-ege (2-noe) connecte if the graph G is 2-ege (2-noe) connecte. Since G is 2-ege (2-noe) connecte, a solution to the CT-LD (CT-ND) problem exists [] with noe as the estination. As noe has only two links, all the paths on one tree must traverse noe an link as the last noe an link, respectively. Similarly, all the paths on the other tree must traverse noe an link. Removing noe an the links attache to it results in a solution to the CTDH-LD (CTDH-ND) problem, thus proves the theorem. The CTDH-LD (CTDH-ND) problems may be formulate as an integer linear program (ILP) by extening the formulation of the CT-LD (CT-ND) problem evelope in []. The ILP formulation is omitte in this paper ue to space constraints, while the results obtaine from it are use to evaluate the performance of the istribute algorithm evelope here. A. Generalize low-point concept The istribute algorithm for the construction of colore trees to ual homes operates in two phases. The first phase involves istribute epth first search (DFS) numbering of the noes an computing the generalize low point values, istances, an neighbors. The secon phase involves istribute path augmentation for computing the two trees. The DFS numbering an low-point computation helps in ientifying paths for augmentation (uring the secon phase) without backtracking. In orer to reuce the average path length, we employ the generalize low point concept evelope in []. Consier a network in which the noes are numbere in the DFS orer. The low-point value of a noe n is traitionally efine as the lowest DFS-inex of a noe that can be reache from n by using DFS-tree eges an at most one back ege. The low-point path of noe n is the path traverse to reach the low-point noe. The low-point path of a noe n is of the form n i i 2... i k n (k 0) such that: () noe n is the DFS-parent of noe i, (2) noe i j is the DFS-parent A DFS-tree is a tree roote at the rain an the arcs in the tree are irecte away from the rain. A back ege is an ege that connects a higher DFSinex noe to a lower DFS-inex noe. The low-point noe of a noe n is the noe whose DFS-number is the LPV of noe n.
3 of noe i j (2 j k), () the DFS-inex of n is lower than that of n; an () the DFS-inex of n is the lowest among all such possible paths. The algorithm evelope in [] employs the traitional low-point value an path. The generalize low-point value (GLPV) of a noe n is efine as the lowest DFS-inex of a noe that can be reache from noe n by traversing a sequence of noes with increasing DFS-inex with the exception of the last hop. The generalize low-point path of a noe n is of the form n i i 2... i k n (k 0), such that: () the DFS-inex of n is lower than that of i, (2) the DFS-inex of i j is lower than that of i j (2 j k), () the DFS-inex of noe n is lower than that of noe n, an () the DFS-inex of n is the lowest among all such possible paths. The generalize lowpoint neighbor (GLPN) of a noe n is efine as that neighbor of noe n which is on its generalize low-point path. III. LINEAR TIME DISTRIBUTED CONSTRUCTION OF COLORED TREES TO DUAL HOMES The implementation of the istribute algorithm for the CTDH problem is base on the proof of existence of a solution escribe in Section II. Assume that we have the graph G obtaine from the given network G with an aitional noe an two biirectional links (, ) an (, ). We may employ the istribute algorithm evelope for the CT-LD an CT-ND problems with noe acting as the estination, except that noe is a virtual noe. A. Distribute DFS numbering Assume that the noes in G are numbere in the DFS orer starting from noe. The DFS-inex of noe is an without loss of generality, assume that the DFS-inex of is 2. In aition, the (generalize) low-point value of woul be an the (generalize) low-point path shoul traverse noe. As noe oes not exist in the given network, we initialize the DFS-inex of to, the DFS-inex of to 2, an allow to start the DFS numbering phase. The GLPV an GLPN of a noe are compute uring the istribute DFS numbering phase. The algorithm to assign the DFS-inices an compute the GLPV an GLPN is shown in Figure 2. The DFS-inices of all the noes are first initialize to -. We incorporate hop count as a metric to compute the shortest generalize low-point path among those available. Note that the linear-time algorithm evelope in this paper will work with the traitional low-point of a noe, however, the path length optimization cannot be mae as the arcs are force to be on the DFS-tree, except the last hop. The noe numbers in the example network shown in Figure inicate the DFS-inices of the noes when numbere from. The generalize low-point values, istances, neighbors of the noes are shown in Table I. B. Distribute path augmentation The istribute path augmentation is base on the generalize path augmentation technique evelope in []. A generalize version of the same is evelope in [], referre Notation Comment fs[n] DFS-inex of noe n. fsparent[n] DFS-parent of noe n. glpv[n] Generalize low-point value of noe n. glpn[n] Generalize low-point neighbor of noe n. glp[n] Generalize low-point istance of noe n. DFS(parent, n, currfs). if fs[n] > 0 return currfs; 2. fs[n] = currfs; fsparent[n] = parent; currfs = currfs + ;. for every neighbor i parent of n o:.a. currfs = DFS(n, i, currfs);.b. if (fs[i] < fs[n]) an (fs[i] glpv[n]).b.i. glpv[n] = fs[i]; glpn[n] = i; glp[n] = ;.C. else if (fs[i] > fs[n]) an (glpv[i] < glpv[n]).c.i. glpv[n] = glpv[i]; glpn[n] = i;.d. glp[n] = glp[i] + ; else if (fs[i] > fs[n]) an (glpv[i] = glpv[n]) an (glp[i] < glp[n] ).D.i. glpn[n] = i; glp[n] = glp[i] + ;. return currfs; Fig. 2. Algorithm to assign DFS-inices to the noes an compute generalize low-point value an neighbor of a noe. TABLE I GLPV, GLPN, AND GLPD VALUES OF THE NODES IN THE EXAMPLE NETWORK. n glpv(n) glpn(n) glp(n) n glpv(n) glpn(n) glp(n) 2 2 to as the XCT algorithm. The XCT algorithm for the CT-ND or CT-LD problem starts by choosing an arbitrary cycle, (, v,..., v k, ), consisting of at least three noes (k 2). The cycle in one irection is ae to the re tree an the cycle in the other irection is ae to the blue tree. If this cycle oes not contain all of the noes of G, then a subsequent path that starts an ens on that cycle an also passes through at least one noe not on the cycle is chosen for augmentation. The algorithm continues in this manner until all noes have been inclue for augmentation. In orer to ensure link-(or noe-)isjoint path constraints, a partial orering among the noes nees to be maintaine. Due to space constraints, we omit the etails on the partial orering an refer the reaers to [] for an elaborate iscussion. The istribute algorithm evelope in [] implements partial orering by maintaining only local (neighborhoo) information. The overview of the path augmentation process is shown in Figure. For the CTDH problem, the home with DFSinex of 2 initiates the path augmentation proceure. The path search message, SEARCH, receive by a noe, is forware to
4 its neighbor base on the forwaring rules escribe in []. The forwaring rules guarantee that the paths are augmente without backtracking, resulting in a linear time algorithm. The neighbors of a noe are arrange in the increasing orer of their DFS-inices in the neighbor list. Such an arrangement ensures that whenever a path search is initiate from the secon home (noe with DFS-inex 2) through its chil, it follows the low-point path, hence resulting in a path to the primary home. Thus, the key ifference between the working of the algorithm for the CTDH problem from that of the CT problem for one estination, is that the former fins a path between the two homes while the latter fins a cycle. The arrangement guarantees that the paths from any noe to a home will not inclue the other home, unless the other home is an articulation noe 2. Distribute Path Augmentation Algorithm ) Arrange the neighbors in the neighbor list in an increasing orer of their DFS inices. 2) On receiving a TOKEN message, initiate path search along every noe in the neighbor list, one at a time. ) Every noe that receives the SEARCH message forwars it sequentially to every noe in the neighbor list accoring to some forwaring rules. If a new path was augmente through a neighbor, then a flag is set corresponing to that noe. ) Forwar the TOKEN message to every noe if the flag is set for that noe. The neighbor list is traverse in the reverse irection. Every noe finishes its operation an sens a RETURN message back. ) After receiving a RETURN message from all the neighbors to whom the token message was sent, sen RETURN message to the noe that sent the TOKEN message. Fig.. Overview of the steps involve in the istribute algorithm for computing colore trees. We illustrate the working of the algorithm with the example network shown in Figure. Step. Noe 2 starts the path search through noe. Base on the forwaring rules [], the message traverses the generalize low point path until it reaches noe. Noe, being a home, is assume to be a part of the trees, hence sens a SUCCESS message in the reverse irection that the search messages were receive. The links that are ae to the blue tree are shown in Figure (a). Step 2. Noe 2 then initiates a path search through noe. The message traverses the generalize low point path. Figure (b) shows the path ae to the blue tree after this augmentation. Step. Now that noe 2 has attempte to augment paths through all its neighbors, the TOKEN will be sent to noe. Noe attempts the path through noe. The path obtaine is. Figure (c) shows the path ae to the blue tree 2 An articulation noe is one which isconnects the network upon its removal. after this step. Step. Noe passes the token to noe which initiates a search through. The path traverse by the message is. Figure () shows the path ae to the blue tree. The blue an re trees that are generate through this process are shown in Figures () an (e), respectively. IV. PERFORMANCE EVALUATION The linear time istribute algorithm evelope in this paper is evaluate on ranom topologies with 0, 0, 200, an 00 noes. The topologies were constructe using Waxman s moel []. As the solution time of the ILP is prohibitively high for large networks, we compare the results of the istribute algorithm to that of the optimal value for one network topology for each network size. Table II shows the comparison of results obtaine from the istribute algorithm employing traitional low point (TLP) an generalize low point (GLP) concepts to the optimal solution obtaine by solving the ILP (using CPLEX.0 solver []). It is observe that the results obtaine by employing GLP are closer to the optimal than those obtaine by employing TLP. In aition, we observe that the average path length obtaine using GLP is at most % away from the optimal. TABLE II COMPARISON OF RESULTS FROM THE DISTRIBUTED ALGORITHM EMPLOYING TLP AND GLP CONCEPTS TO THE OPTIMAL SOLUTION. Noes Links Average Re Path Length Average Blue Path Length TLP GLP Optimal TLP GLP Optimal For each network size, twenty ifferent topologies with two rains were simulate an the average results are shown in Table III for the CTDH-ND case. It is observe that a significant reuction in the average path lengths is obtaine by employing the generalize low-point concept, which reuces the hop-count on the low-point path. Similar results were obtaine for the CTDH-LD case an are not shown here ue to space constraints. TABLE III COMPARISON OF RESULTS OBTAINED IN RANDOM NETWORK TOPOLOGIES Noes Average of Links USING THE DISTRIBUTED ALGORITHM. Average Re Path Length Average Blue Path Length Average Total Path Length TLP GLP TLP GLP TLP GLP Average Reuction % % % % We evaluate the robustness of the trees constructe using the istribute algorithm uner multiple link failures. Let H an H 2 enote the hop length of the two paths from a noe to
5 (a) (b) (c) () (e) Fig.. An example illustrating the stages of the istribute path augmentation technique. the homes. Given that k links have faile in the network, the probability that both the paths of a noe are affecte, enote by P (H, H 2, k), is given by: P (H, H 2, k) = min(h,k ) i= min(h 2,k ) j= ( H )( H2 i ( L k) )( L H H 2 j k i j The sum of the above probability for all the noes gives the average number of noes that will lose both the paths to the homes uner k-link failures. Table IV shows the average number of noes isconnecte from both the rains for arbitrary two an three link failures. It is observe that employing GLP reuces the number of noes isconnecte from both the homes in the network in comparison to employing TLP. TABLE IV AVERAGE NUMBER OF NODES DISCONNECTED FROM BOTH THE DRAINS of Noes FOR ARBITRARY TWO AND THREE LINK FAILURES. of Links Average of Noes Average of Noes Disconnecte for k=2 Disconnecte for k= TLP GLP TLP GLP V. CONCLUSION This paper evelops a linear-time istribute algorithm for the construction of colore trees in a wireless sensor network employing two rains by moeling the network as a ualhoming network. By allowing the two rains to be roots of the trees, the network is resilient to a single rain failure. This paper also shows that employing the generalize low point (GLP) concept in a DFS tree allows for significant average path length reuction than the traitional low point (TLP) concept. In aition, using GLP rather than TLP allows a network to have greater tolerance for k link failures in terms of the number of noes isconnecte from both the homes. ACKNOWLEDGMENT The research evelope in this paper is supporte by National Science Founation uner grants 02, 00, an EEC-00. ) REFERENCES [] S. Ramasubramanian, M. Harkara, an M. Krunz, Distribute linear time construction of colore trees for isjoint multipath routing, in Proceeings of IFIP Networking, Coimbra, Portugal, May 200, pp. 2. [2] S. Lee an M. Gerla, Split multipath routing with maximally isjoint paths in a hoc networks, in Proceeings of IEEE ICC, 200, pp [] A. Nasipuri an S. R. Das, On-eman multipath routing for mobile a hoc networks, in Proceeings of IEEE International Conference on Computer Communications an Networks, October, pp. 0. [] J. Wu, An extene ynamic source routing scheme in a hoc wireless networks, in Proceeings of th Annual Hawaii International Conference on System Sciences, January 2002, pp. 2. [] M. K. Marina an S. R. Das, On-eman multipath istance vector routing in a hoc networks, in Proceeings of IEEE ICNP, November 200, pp. 2. [] V. D. Park an M. S. Corson, A highly aaptive istribute routing algorithm for mobile wireless networks, in Proceeings of IEEE INFOCOM, April, pp.. [] J. Raju an J. J. Garcia-Luna-Aceves, A new approach to on-eman loop-free multipath routing, in Proceeings of IEEE International Conference on Computer Communications an Networks (ICCCN), October, pp [] A. Valera, W. K. G. Seah, an S. V. Rao, Cooperative packet caching an shortest multipath in mobile ahoc networks, in Proceeings of IEEE INFOCOM, March-April 200, pp [] S. Lee an M. Gerla, AODV-BR: Backup routing in a hoc network, in Proceeings of IEEE WCNC, September 2000, pp.. [] C. Intanagonwiwat, R. Govinan, an D. Estrin, Directe iffusion: A scalable an robust communication paraigm for sensor networks, in Mobile Computing an Networking, August 2000, pp.. [] S. Ramasubramanian, H. Krishnamoorthy, an M. Krunz, Disjoint multipath routing using colore trees, Technical Report, University of Arizona, November 200. [] M. Mear, R.A. Barry, S.G. Finn, an R.G. Gallager, Reunant trees for preplanne recovery in arrbitrary vertex- reunant or ege reunant graphs, IEEE/ACM Transactions on Networking, vol., no., pp. 2, October. [] G. Xue, L. Chen, an K. Thulasiraman, Quality-of-service an qualityof-protection issues in preplanne recovery schemes using reunanttrees, IEEE Journal on Selecte Areas in Communication, vol. 2, no., pp. 2, October 200. [] W. Zhang, G. Xue, J. Tang, an K. Thulasiraman, Linear time construction of reunant trees for recovery schemes enhancing QoP an QoS, in Proceeings of IEEE INFOCOM, Miami, FL, USA, March 200, pp [] J. Wang, V.M. Vokkarane, R. Jothi, X. Qi, B. Raghavachari, an J.P. Jue, Dual homing protection in IP-over-WDM networks, Journal of Lightwave Technology, vol. 2, no., pp., 200. [] B. M. Waxman, Routing of multipoint connections, IEEE Journal of Selecte Areas in Communications, vol., no., pp. 22, December. [] CPLEX Solver,
Distributed Linear Time Construction of Colored Trees for Disjoint Multipath Routing
Distributed Linear Time Construction of Colored Trees for Disjoint Multipath Routing Srinivasan Ramasubramanian, Mithun Harkara, and Marwan Krunz Department of Electrical and Computer Engineering University
More informationQuestions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!
EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science
More informationAn Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique
International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech
More informationEDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks
sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun
More informationQuestions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!
EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an
More informationCoupling the User Interfaces of a Multiuser Program
Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces
More informationAnyTraffic Labeled Routing
AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,
More informationAdaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots
Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:
More informationQueueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks
Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication
More informationImpact of FTP Application file size and TCP Variants on MANET Protocols Performance
International Journal of Moern Communication Technologies & Research (IJMCTR) Impact of FTP Application file size an TCP Variants on MANET Protocols Performance Abelmuti Ahme Abbasher Ali, Dr.Amin Babkir
More informationTHE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM
International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao
More informationSURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH
SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway
More informationOne-to-Many Multicast Restoration Based on Dynamic Core-Based Selection Algorithm in WDM Mesh Networks
Proceeings of the International MultiConference of Engineers an Computer Scientists 9 Vol I IMECS 9, March 18 -, 9, Hong Kong One-to-Many Multicast Restoration Base on Dynamic Core-Base Selection Algorithm
More informationMessage Transport With The User Datagram Protocol
Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer
More informationResearch Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks
Hinawi Publishing Corporation International Journal of Distribute Sensor Networks Volume 2014, Article ID 936379, 17 pages http://x.oi.org/10.1155/2014/936379 Research Article REALFLOW: Reliable Real-Time
More informationPAPER. 1. Introduction
IEICE TRANS. COMMUN., VOL. E9x-B, No.8 AUGUST 2010 PAPER Integrating Overlay Protocols for Proviing Autonomic Services in Mobile A-hoc Networks Panagiotis Gouvas, IEICE Stuent member, Anastasios Zafeiropoulos,,
More informationNon-Uniform Sensor Deployment in Mobile Wireless Sensor Networks
01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University
More informationMORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks
: a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications
More informationAn Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach
An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach Nishi Sharma, Vanna Verma Abstract Wireless sensor networks (WSNs) is one of the emerging fiel of research in recent era
More informationDistributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs
IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,
More informationLecture 1 September 4, 2013
CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the
More informationIEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,
More informationProvisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks
Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:
More informationCS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing
CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which
More informationRobust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks
Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,
More informationParticle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base
More informationSkyline Community Search in Multi-valued Networks
Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h
More informationImproving Spatial Reuse of IEEE Based Ad Hoc Networks
mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos
More informationAlmost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control
Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract
More informationArchitecture Design of Mobile Access Coordinated Wireless Sensor Networks
Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,
More informationOnline Appendix to: Generalizing Database Forensics
Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that
More informationBIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES
BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations
More information6.854J / J Advanced Algorithms Fall 2008
MIT OpenCourseWare http://ocw.mit.eu 6.854J / 18.415J Avance Algorithms Fall 2008 For inormation about citing these materials or our Terms o Use, visit: http://ocw.mit.eu/terms. 18.415/6.854 Avance Algorithms
More informationOn the Placement of Internet Taps in Wireless Neighborhood Networks
1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that
More informationUninformed search methods
CS 1571 Introuction to AI Lecture 4 Uninforme search methos Milos Hauskrecht milos@cs.pitt.eu 539 Sennott Square Announcements Homework assignment 1 is out Due on Thursay, September 11, 014 before the
More informationA shortest path algorithm in multimodal networks: a case study with time varying costs
A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via
More informationYet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien
Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,
More informationIntensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2
This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar
More informationThe Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract
The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie
More informationLab work #8. Congestion control
TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño
More informationEfficient Recovery from False State in Distributed Routing Algorithms
Efficient Recovery from False State in Distribute Routing Algorithms Daniel Gyllstrom, Suarshan Vasuevan, Jim Kurose, Gerome Milau Department of Computer Science University of Massachusetts Amherst {pg,
More informationOptimal Oblivious Path Selection on the Mesh
Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract
More informationMODULE VII. Emerging Technologies
MODULE VII Emerging Technologies Computer Networks an Internets -- Moule 7 1 Spring, 2014 Copyright 2014. All rights reserve. Topics Software Define Networking The Internet Of Things Other trens in networking
More informationBackpressure-based Packet-by-Packet Adaptive Routing in Communication Networks
1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stolyar Abstract Backpressure-base aaptive routing
More informationAd-Hoc Networks Beyond Unit Disk Graphs
A-Hoc Networks Beyon Unit Disk Graphs Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 8092 Zurich, Switzerlan {kuhn, wattenhofer, zollinger}@inf.ethz.ch ABSTRACT
More informationUC Santa Cruz UC Santa Cruz Previously Published Works
UC Santa Cruz UC Santa Cruz Previously Publishe Works Title Towars Loop-Free Forwaring of Anonymous Internet Datagrams that Enforce Provenance Permalink https://escholarship.org/uc/item/5376h1mm Author
More informationTwo Dimensional-IP Routing
Two Dimensional-IP Routing Mingwei Xu Shu Yang Dan Wang Hong Kong Polytechnic University Jianping Wu Abstract Traitional IP networks use single-path routing, an make forwaring ecisions base on estination
More informationNon-homogeneous Generalization in Privacy Preserving Data Publishing
Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h
More informationd 3 d 4 d d d d d d d d d d d 1 d d d d d d
Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching
More informationThreshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides
Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita
More informationOptimal Routing and Scheduling for Deterministic Delay Tolerant Networks
Optimal Routing an Scheuling for Deterministic Delay Tolerant Networks Davi Hay Dipartimento i Elettronica olitecnico i Torino, Italy Email: hay@tlc.polito.it aolo Giaccone Dipartimento i Elettronica olitecnico
More informationAn Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources
An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract
More informationA Metric for Routing in Delay-Sensitive Wireless Sensor Networks
A Metric for Routing in Delay-Sensitive Wireless Sensor Networks Zhen Jiang Jie Wu Risa Ito Dept. of Computer Sci. Dept. of Computer & Info. Sciences Dept. of Computer Sci. West Chester University Temple
More informationSupporting Fully Adaptive Routing in InfiniBand Networks
XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar
More informationRandom Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation
DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,
More informationComputer Organization
Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.
More informationAODV Multipath Extension using Source Route Lists with Optimized Route Establishment
INTERNATIONAL WORKHOP ON WIRELE A-HOC NETWORK (IWWAN) AOV Multipath Extension using ource Route Lists with Optimized Route Establishment Yusuke akurai and Jiro Katto Graduate chool of cience and Engineering,
More informationComparison of Methods for Increasing the Performance of a DUA Computation
Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,
More informationAn Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks
An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks Tejomayee Nath #1 & Suneeta Mohanty *2 # School of Computer Engineering, KIIT University Bhubaneswar,, India Abstract
More informationSocially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach
Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly
More informationPairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11:
airwise alignment using shortest path algorithms, Gunnar Klau, November 9,, : 3 3 airwise alignment using shortest path algorithms e will iscuss: it graph Dijkstra s algorithm algorithm (GDU) 3. References
More informationDual Arm Robot Research Report
Dual Arm Robot Research Report Analytical Inverse Kinematics Solution for Moularize Dual-Arm Robot With offset at shouler an wrist Motivation an Abstract Generally, an inustrial manipulator such as PUMA
More informationBootstrapping Chord over MANETs - All Roads Lead to Rome
Bootstrapping Chor over MANETs - All Roas Lea to Rome Wei Ding, Member, IEEE, S. S. Iyengar, Fellow, IEEE Abstract This paper presents a novel approach on bootstrapping Chor over mobile a hoc networs (MANETs).
More informationBackpressure-based Packet-by-Packet Adaptive Routing in Communication Networks
1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stoylar arxiv:15.4984v1 [cs.ni] 27 May 21 Abstract
More informationDesign Principles for Practical Self-Routing Nonblocking Switching Networks with O(N log N) Bit-Complexity
IEEE TRANSACTIONS ON COMPUTERS, VOL. 46, NO. 10, OCTOBER 1997 1 Design Principles for Practical Self-Routing Nonblocking Switching Networks with O(N log N) Bit-Complexity Te H. Szymanski, Member, IEEE
More informationA Hybrid Routing Algorithm for Delay Tolerant Networks
Sensors & Transucers 2013 by IFSA http://www.sensorsportal.com A Hybri Routing Algorithm for Delay Tolerant Networs Jianbo LI, Jixing XU, Lei YOU, Chenqu DAI, Jieheng WU Information Engineering College
More informationLoop Scheduling and Partitions for Hiding Memory Latencies
Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:
More informationOptimal Distributed P2P Streaming under Node Degree Bounds
Optimal Distribute P2P Streaming uner Noe Degree Bouns Shaoquan Zhang, Ziyu Shao, Minghua Chen, an Libin Jiang Department of Information Engineering, The Chinese University of Hong Kong Department of EECS,
More informationRouting and quality of service support for mobile ad hoc networks
Computer Networks 51 (2007) 3142 3156 www.elsevier.com/locate/comnet Routing an quality of service support for mobile a hoc networks Anelise Munaretto a,c, *, Mauro Fonseca b,c a CPGEI/UTFPR, Programa
More informationOffloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization
1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24
More informationAdditional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication
Aitional Divie an Conquer Algorithms Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Divie an Conquer Closest Pair Let s revisit the closest pair problem. Last
More informationDynamic Capacity Allocation in OTN Networks
Communications an Network, 2015, 7, 43-54 Publishe Online February 2015 in SciRes. http://www.scirp.org/journal/cn http://x.oi.org/10.4236/cn.2015.71005 Dynamic Capacity Allocation in OTN Networks Maria
More informationTransient analysis of wave propagation in 3D soil by using the scaled boundary finite element method
Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite
More informationDivide-and-Conquer Algorithms
Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:
More informationAlgorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times
Algorithm for Intermoal Optimal Multiestination Tour with Dynamic Travel Times Neema Nassir, Alireza Khani, Mark Hickman, an Hyunsoo Noh This paper presents an efficient algorithm that fins the intermoal
More information2-connected graphs with small 2-connected dominating sets
2-connecte graphs with small 2-connecte ominating sets Yair Caro, Raphael Yuster 1 Department of Mathematics, University of Haifa at Oranim, Tivon 36006, Israel Abstract Let G be a 2-connecte graph. A
More informationVariable Independence and Resolution Paths for Quantified Boolean Formulas
Variable Inepenence an Resolution Paths for Quantifie Boolean Formulas Allen Van Geler http://www.cse.ucsc.eu/ avg University of California, Santa Cruz Abstract. Variable inepenence in quantifie boolean
More informationCascading Multi-Hop Reservation and Transmission in Underwater Acoustic Sensor Networks
Sensors 2014, 14, 18390-18409; oi:10.3390/s141018390 Article OPEN ACCESS sensors ISSN 1424-8220 www.mpi.com/journal/sensors Cascaing Multi-Hop Reservation an Transmission in Unerwater Acoustic Sensor Networks
More informationA SWARM INSPIRED MULTIPATH DATA TRANSMISSION WITH CONGESTION CONTROL IN MANETS USING PROBABILISTIC APPROACH
A SWARM INSPIRED MULTIPATH DATA TRANSMISSION WITH CONGESTION CONTROL IN MANETS USING PROBABILISTIC APPROACH Subhankar oarar 1, Vanana Bhattacheree 2 an Debasis Giri 1 1 Department of Computer Science an
More informationScalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter
FDL sel. VOA SOA 100 Regular papers ONDM 2018 Scalable Deterministic Scheuling for WDM Slot Switching Xhaul with Zero-Jitter Bogan Uscumlic 1, Dominique Chiaroni 1, Brice Leclerc 1, Thierry Zami 2, Annie
More informationPerformance Study of a Cross-Layer Based Multipath Routing Protocol for IEEE e Mobile Ad Hoc Networks
I. J. Communications, Network an System Sciences, 2008, 4, 285-385 Publishe Online November 2008 in SciRes (http://www.scirp.org/journal/ijcns/). Performance Stuy of a Cross-Layer Base Multipath Routing
More informationCluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters
Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets
More informationAcknowledgement. Flow Graph Theory. Depth First Search. Speeding up DFA 8/16/2016
8/6/06 Program Analysis https://www.cse.iitb.ac.in/~karkare/cs68/ Flow Graph Theory Acknowlegement Slies base on the material at http://infolab.stanfor.eu/~ullman/ragon/ w06/w06.html Amey Karkare Dept
More informationStudy of Network Optimization Method Based on ACL
Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department
More informationLearning convex bodies is hard
Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples
More informationSolution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation
Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University
More informationAdjusted Probabilistic Packet Marking for IP Traceback
Ajuste Probabilistic Packet Marking for IP Traceback Tao Peng, Christopher Leckie, an Kotagiri Ramamohanarao 2 ARC Special Research Center for Ultra-Broaban Information Networks Department of Electrical
More informationAn Extended AODV Protocol for Multipath Routing in MANETs
IACSIT International Journal of Engineering and Technology, Vol.2, No.4, August 21 An Extended Protocol for Multipath Routing in MANETs N.Jaisankar 1 and R.Saravanan 2 Abstract Mobile ad hoc networks (MANETs)
More informationThroughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem
Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple
More informationCompiler Optimisation
Compiler Optimisation Michael O Boyle mob@inf.e.ac.uk Room 1.06 January, 2014 1 Two recommene books for the course Recommene texts Engineering a Compiler Engineering a Compiler by K. D. Cooper an L. Torczon.
More informationTrailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks
Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks Xinxin Liu, Han Zhao, Xin Yang Computer & Information Science & Eng. University of Floria Email:{xinxin,han,xin}@cise.ufl.eu
More informationPerformance Modelling of Necklace Hypercubes
erformance Moelling of ecklace ypercubes. Meraji,,. arbazi-aza,, A. atooghy, IM chool of Computer cience & harif University of Technology, Tehran, Iran {meraji, patooghy}@ce.sharif.eu, aza@ipm.ir a Abstract
More informationOn the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems
On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,
More informationA Review of Pro-Active and Re-Active Routing protocols for Mobile Ad-hoc Network
A Review of Pro-Active and Re-Active Routing protocols for Mobile Ad-hoc Network T. Sivaraman, Department of Computer Science, Thiruvalluvar University Arts & Science College, Thiruvennainallur. Tamilnadu,
More informationPolitecnico di Torino. Porto Institutional Repository
Politecnico i Torino Porto Institutional Repository [Proceeing] Automatic March tests generation for multi-port SRAMs Original Citation: Benso A., Bosio A., i Carlo S., i Natale G., Prinetto P. (26). Automatic
More informationA New Multicast Wavelength Assignment Algorithm in Wavelength-Converted Optical Networks
Int J Communications, Network and System Sciences, 2009, 2, 912-916 doi:104236/ijcns200929106 Published Online December 2009 (http://wwwscirporg/journal/ijcns/) A New Multicast Waelength Assignment Algorithm
More informationTCP Timeout Mechanism for Optimization of Network Fairness and Performance in Multi-Hop Pipeline Network
Draft Version - Brunel University, Lonon TCP Timeout Mechanism for Optimization of Network Fairness an Performance in Multi-Hop Pipeline Network Siva Kumar Subramaniam 1, Rajagopal Nilavalan 3, Wamaeva
More informationEFFICIENT MULTICAST DATA REPLICATION APPROACH FOR POWER CONSUMPTION IN MANET
EFFICIENT MULTICAST DATA REPLICATION APPROACH FOR POWER CONSUMPTION IN MANET 1 T.KARTHIKEYAN, 2 DR.A.RAJARAM 2 Research Scholar, Karpagam University, Coimbatore, Inia 1 Associate Professor, Department
More information