NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS
|
|
- Felix Lloyd
- 5 years ago
- Views:
Transcription
1 ETWORK PRESERVATIO THROUGH A TOPOLOGY COTROL ALGORITHM FOR WIRELESS MESH ETWORKS F. O. Aron, T. O. Olwal, A. Krien, Y. Hamam Tshwane University of Technology, Pretoria, Soth Africa. Dept of the French Soth African Technical Institte in Electronics The Meraka Institte, Concil of Scientific and Indstrial Research, Soth Africa jakajode@gmail.com, Thomas.olwal@gmail.com, krienam@tt.ac.za, hamama@tt.ac.za. ABSTRACT Wireless mesh networks (WMs) is becoming a promising new technology for extending coverage to farflng rral areas. This it achieves by linking the varios wireless LAS (WLAs) in distant locations ths providing a vital mode complimentary to the wireless infrastrctre-based networks. The benefits of WM deployments, however, come with certain challenges e.g., power management. While focssing on WM applications in rral areas, this paper explains the need for transmit power consmption control in WMs and proposes an Enhanced Local Minimm Shortest-path Tree (ELMST) algorithm for topology control for the WMs. The algorithm is distribted with each node sing only the information gathered locally to determine its own transmission power. In the first phase of its constrction, a minimm local shortest-path tree is obtained. The last phase then involves the removal of all nidirectional links. The performance of the algorithm is demonstrated via several simlation tests. The resltant network topology preserves network connectivity in addition to possessing other desirable featres sch as: (1) redction in the average node degree, (2) evenly distribted power consmption among the nodes as well as (3) a redced total power consmption leading to longer connectivity periods. KEY WORDS Topology Control, Wireless, Backbone, Mesh etwork, Energy Efficiency, Localized Algorithm. 1. ITRODUCTIO The efficient management of radio resorces (e.g., energy) in mltihop wireless networks (MWs) greatly impacts on the performance of sch networks [1]. Throgh transmission power control for instance, a network topology is affected, interference levels are adjsted and spatial channel re-se is enhanced. One way for efficient management is to have the network nodes select their appropriate logical neighbors (from a given physical topology network) according to some specified rles. For instance, there can be a coordinated decision making regarding each node s transmission power ranges with a goal of generating a network with some desired properties e.g., connectivity, redcing energy consmption and/or increasing network capacity [2]. This is referred to as topology control. Althogh several topology control techniqes e.g., [3], [], [5] with the aim of conserving power consmption have been proposed for other MWs like MAETs and wireless Sensor etworks (WSs), little attention has been drawn to sch needs in wireless mesh networks (WMs). This is mainly becase the backbone wireless mesh roters are static and have sally been assmed [6] to have electrical mains power spply and hence are prported not to have power constraints. However, with specific considerations to rral area applications of WMs, we arge that the mesh roters wold be stationary bt with power constraints. In rral areas, electrical mains power sorces are limited and/or often not available and the mesh nodes have to rely on exhastible and renewable means of energy spply sch as solar, battery or generator. Frthermore, the mesh clients are definitely power constrained [6]. With the aim of addressing these constraints, this paper proposes an energy-efficient topology control algorithm for WMs which comptes the best path based on the link weight fnctions. One advantage with this approach is that the channel conditions e.g., weather conditions are catered for since the link weights, as is shown later in this work (definition 2 and section B), is a fnction of the transmission power and the distances between nodes. The remainder of this paper is organized as follows. In section 2, the details of the network model is given. In section 3, previos related work is reviewed. The proposed algorithm is presented in section. Section 5 gives the simlation reslts and analysis. Finally, in section 6 the work is conclded and a sggestion for ftre work is given. 2. RELATED WORK Rodopl and Meng [7] describe the first algorithm which is based on the concept of relay region. A node decides to
2 relay throgh other nodes if less power will be consmed. The algorithm garantees the preservation of minimm energy paths between every pair of nodes connected in the original graph. Based on the reslts of [7], Li and Halpern [8] proposed an improved protocol which is comptationally simpler and better in performance with the reslting topology being a sb-network of the one generated by [7]. Li and Halpern [9] frther propose the small minimm energy commnication network (SMEC). In this algorithm, each node initially broadcasts hello message with some initial power and after reception of ACKs from the receiving nodes, checks if the crrent range covers the region of imal transmission range less the nion of the compliment of the relay regions of all the nodes reachable by node. The process terminates if node reaches its imal transmission power. The work in [7], [8] and [9], however, implicitly assme that a long link consmes more power than a shorter link, an assmption that is not practical for instance in heterogeneos networks according to [3]. In [10], [11], the concept of local neighborhood is first introdced. This concept proposes that a logical topological view of a node in a network be constrcted based only on its local information. This forms the basis of the family of the distribted and localized topology control algorithms. In the work of Li et al [10], a node bilds its local minimm spanning tree (LMST) based only on its one hop neighborhood information. It keeps only the one hop nodes as neighbors in the final topology. The reslting topology has been shown to be connected and with node degree bonded by six. In addition they provide an optional phase where the topology is transformed to one with bidirectional links only. However, LMST does not preserve the minimm energy paths. Another angle of approach is given by Li et al [12] for heterogeneos networks, in which the reslting network contains nidirectional links. Other old variants of topology control algorithms sch as in [13] also discss a distribted and localized algorithm to obtain a reliable high throghpt topology by adjsting a per node transmission power. However, their focs is not on minimizing the energy consmed in the network. All of the algorithms shown in [10], [11], [12], [13] have not been applied to WMs. It can not be generally assmed that the algorithms will atomatically fnction in WMs as the reqirements on network preservation, power efficiency and mobility are very different between WMs and other Mltihop etworks [6]. The algorithm proposed in this work consists of two phases with the reslting topology ensring connectivity and redced node logical ot degrees and is shown to apply for WMs. 3. ETWORK ARCHITECTURE AD SYSTEM MODEL In this section, the WM architectre considered in this paper is presented. Additionally a discssion is given on how the network is modelled. 3.1 Architectre A sample hybrid WM architectre modelled is as shown in figre 1. The network is composed of three grops of wireless network elements [6],[1]: (1) mesh gateways, mesh roter with gateway fnctionalities, are sed for relaying traffic between the WM and the internet, (2) Access Points, mesh roters, are the stationary nodes that act as wireless access points for the mesh clients and also form the mlti-hop wireless network infrastrctre and (3) Mesh clients are the end-ser mesh nodes. They are either mobile or stationary. Internet Figre 1: An example of a mesh network architectre for a commnity mesh networking for resorce sharing with six MAPs where one acts as a Gateway to the internet. It is important to note that the mesh gateways can also fnction as mesh roters [15], [16]. Hence, the mesh gateway nodes and the access points form the backbone wireless mesh network and are sfficiently referred to as mesh access points (MAPs). Examples of WM applications [6] inclde commnity srveillance, commnity resorce sharing, broadband home networking, enterprise networking. These applications generate a large amont of client to client traffic as well as client to gateway traffic [15], [17]. Hence, it is sfficient to assme that most traffic appear at the backbone network. The focs of this work is therefore, to imize certain properties sch as network lifetime based on the backbone wireless mesh network ths allowing s to ignore the mesh clients. 3.2 System Model Consider a set V { v v,..., } AP/Gateway Access Point Mobile/stationary device Wireless link Wired link = 1, 2 v n of randomly distribted static Ms located on a 2D plane, each node V has a niqe id( i ) = i, where 1 i ( = V, nmber of nodes) and is specified by its coordinates
3 ( x( ), y( )) at any instance. Each node V is assigned a power fnction p tx where p tx ( d ) is the minimm transmission power needed to establish a commnication link to another node v V located d distance away from. Two assmptions are made: (1) that the imm transmission power, p tx, V is the same and (2) that the imm distance, D, needed for any two nodes v V to commnicate directly is also the same. tx p tx Therefore, p ( D) =, V. At the beginning of p tx simlation, every node transmits with fll power and an indced graph modelled as a qasi Unit Disk Graph (qudg), G = ( V, E) is created. Here, V is the set of all nodes in the network and E is the set of all links/edges i.e., E = {( d( D}. The WM topology is modelled as a weight directed graph in which for each edge ( E, node v has to be within the transmission range of. The notation d( denotes the Eclidean distance between the nodes and v. The following gives a list of definitions to the terms sed in the paper. Definition 1 (Accessible eighborhood Set): The Accessible eighborhood Set,, is defined as the set A of all nodes that have a direct link with node, when transmits at imm transmission power. The set is given by = { v V d( D}. A Definition 2 (Weight Fnction): An edge ( has a weight given by the following expression: α w ( = t. d( + rx(, (1) where t is a threshold related to signal to noise ratio at node and α [ 2,5] is a constant real nmber depending on the wireless transmission environment. Both parts of (1) are smmed p to give the transmission power. The first part is the transmitter power consmed by transmitting a packet from node to v and rx( is the receiver power. Assming all receivers have the same threshold power for signal detection hence the vale of t becomes some appropriate constant. Definition 3 (Logical eighbor Set): A logical L L neighbor set of node is given by S. ode v S if and only if there exists an edge ( in the topology generated by the algorithm and = { v V v}. S L Definition (Flly Connected): A network is flly connected if and only if V, there exist either a direct path or a mltihop path from to every other node v V in the network. Definition 5 (Relay Region): Given a node v, let the physical location of v be denoted by Loc (. The relay region of the transmit-relay node pair (, is the physical region RL sch that relaying throgh v to v any other point in RL v consmes a lesser power than direct transmission to that point. Definition 6 (etwork Lifetime): Given a set of nodes V and for all v V an energy vale E (, the lifetime of node v is Lt = { t f ( t) E( } ntil when E ( = 0, v v where f v (t) is the energy consmed by v. The network lifetime LtV = Minv V ( Ltv ) i.e., the time taken till the first node goes off. Definition 7 (Bi-directionality): A topology G = ( V, E ) generated by the algorithm is bi-directional if, E = {( ( E( G ) and ( v, ) E( G )} and V = V.. PROPOSED ALGORITHM In this section, we present the algorithm design assmptions. Additionally, a two phased design algorithm i.e., constrction of a Local Minimm Shortest-path Tree and nidirectional links removal is proposed..1 Algorithm Design Assmptions The design of the algorithm assmes that: (1) each node se either a GPS receiver or other localization techniqes [20] to gather its location information, (2) each node ses an omni-directional antenna for both transmission and reception, (3) each node is able to adjst its own transmission power and () the initial topology graph G = ( V, E) is flly connected. The objective of the topology control algorithm is to find a sbgraph of the qudg, G = ( V, E), sch that the resltant topology preserves certain network reqirements namely, decrease in average node degree, an averagely low power consmption ths longer network lifetime and a maintenance of connectivity in the resltant network topology. Each node mst adjst its transmission radis to redce its power consmption while still maintaining the connectivity. Since the architectre is more of infrastrctre-less, the topology has to be constrcted in a distribted and localized manner to avoid flooding of the network. This implies that, each node mst establish its transmission power based only on the information of the nodes reachable by a small constant nmber of hops..2 The ELMST Algorithm Design Phases Phase 1: Constrction of Local Minimm Shortest path Tree (LM-SPT).
4 In this phase, each node gathers neighbor information and constrcts an LM-SPT (as depicted in Figre 2). The phase involves three stages: i. Information collection and exchange: - Each node in this step periodically broadcasts a beacon Hello messages sing imm power p. The ii. iii. tx information exchanged here incldes the node ID and the position in the 2D plane. This information is sed to calclate the node to node distance, the link weights and the path weights. The link weight represents the power reqired for transmission along a link, and the path weight represents the sm of all minimm link weights of a path from sorce to destination. The reslt of this stage is the Accessible eighborhood Set A for each node V. The Hello message is also sent by each node asynchronosly and periodically giving each node s information abot its neighbors. Constrction of a Logical Visible eighborhood Topology: - Each node applies the concept of the relay region in order to gather the nodes in the set of Logical Visible eighborhood. The set LV ( k) A at k = 1. If a node v A is in the relay region of another node w A then node v is moved to a new set of non neighbors called otbr. This is repeated for all the nodes i A. All nodes reachable via other nodes are moved ot of the set A and the remaining set is called LV( ). Each node then applies the Dijkstra s algorithm independently from a sorce node to all the other nodes in V in order to bild its LM-SPT a Figre 2: (a) the topology from the point of view of node before topology control. (b) the view after topology control. Compting the transmission power: - Each node comptes its minimal transmission power to cover only all of the nodes contained in the set LV( k ), in which case, it determines which node among the nodes is frthest. The node then adjsts its transmission power to reach this node and ths all other nodes in the set LV ( k) are covered. The set is given by G = ( V, E ). From the information on the location of the nodes, the inter node distance is calclated. The distance is applied in the b propagation model formlas to obtain the minimm transmission power. The free space model is sed for short distances and the two ray grond reflection model is sed for longer distances depending on the vale of the Eclidean distance in relation to the cross over distance. The cross over distance is calclated sing the following expression: Cross _ over _ dist π h h t r =, (2) where h t = h r = 1.5, are the antenna heights of the transmitter and receiver respectively. Lambda λ, denotes the wavelength. For d( v ) < Cross_over_dist, the Free Space model is sed whereas if d( v ) Cross_over_dist, the Two-raygrond model is sed. The free-space propagation model is given by the following expression: λ 2 RxThresh(( π d ) L ) Pmin = 2. (3) G G λ The two ray grond reflection model is given by the following expression: RxThresh( d L ) t r Pmin =, () G G h h 2 2 t r t r where G t = G r = 1 is the transmitter and receiver Antenna gain respectively, L = 1 is path loss exponent and again the vales of h h = t = r Figre 2 shows an illstration of the operations of phase 1. ode broadcasts hello messages with fll transmission power and obtains responses from the nodes in the A sch as nodes 2,3,5,6 and 7. After stage 2, node establishes that node 7 is in the relay region of node 6 and node 2 is in the relay region of node 3 hence, LV () = {3,5,6} and otbr () = {2, 7}. In stage 2, node calclates its final transmission power as that sed to reach node 6 which is the frthest node in the LV() set. The LM-SPT is then bilt sing the Dijkstra s algorithm. Table 1 shows the algorithm that rns in each node V to compte the minimm transmission power. Let p ( be the minimm power reqired to transmit a data packet from node to node v at any time instance. Also let initial power p tx p = and F( p) be the region that node can reach if it broadcasts with power p. It is assmed that every node knows its terrain and antennae characteristics and is able to compte the region F ( p). The sets Accessible eighborhood ( A ), ot neighbor ( otbr ), and Logical Visible
5 eighborhood ( LV () ) of node are initialized to empty set,φ. ode broadcasts the Hello messages at fll transmission power p tx stating its position. It collects all the ACKs recording each nodes ID, and Location ( Loc ( ) in the Accessible eighborhood set A tx = { v Loc( F( p ), v } where Loc ( is the location of the node v and F ( p tx ) is the region covered by node at fll transmission power. Table 1. The Topology Control Algorithm Listing Phase 1: Inpt: the set, ) G = ( V E Otpt: Power assignment to node p = p tx A initialize the imm power = φ accessible neighbors at 003 otbr = φ non neighbor set 00 LV( ) For every node v A, node comptes the distance d ( and the power p( and arranges them in ascending order. For every two nodes v,w A, if node v is in the relay region of node w i.e., Loc( RL w and p( + p( w, p( then node v is moved to the otbr set, otherwise it remains. If p = p tx = φ local Visible neighbors at p () Begin 005 broadcast Hello message with p = p tx 006 receive Acks and record the neighbors id and their locations in the set A 007 A = { v Loc( F( ptx ), v } 008 if ( A == φ ) 009 Retrn, 010 else 011 v A, calclate distance d ( 012 sort distance in ascending order. 013 calclate p (, v A sing d (, received power & propagation models. 01 sort A by p(, in increasing order, v A 015 for each v A do w A do Loc( RL && p( + p( w, p( otbr = otbr v 016 for each 017 if w then { } Loc RL otbr = otbr 018 else if ( v && p( + p( v, p( then { w} 019 LV() = A otbr 020 p( ) = { p( v LV( ), F p F p tx (, ) (, )} Loc( RL v and p( + p( v, p( then node w is moved to the otbr set otherwise it remains. The Logical Visible eighborhood of node i.e., LV () is therefore given by the set A less otbr set of node. Phase 2: Removal of Unidirectional links. Bi-directional links are qite important for link level acknowledgements and for packet transmissions and retransmissions over the nreliable wireless medim. In phase two of the algorithm, nidirectional links generated in phase 1 are removed so as to obtain bi-directional edges sing edge addition. The reslting topology is given by G = ( V, E ) where V = V, E = {( ( E( G ) and ( v, ) E( G )}. Table 2 depicts the algorithm sed. For every node v LV( ), if there is an edge v, then there mst be an edge v and node LV(. Table 2. Algorithm Listing For Unidirectional Links Removal Phase 2: Inpt: LV 1 hop ni/bi - directional link neighbors of. Otpt: () LV () new () 5. SIMULATIO AD RESULTS LV with bi-directional links Convert to bidirectional (*convert nidirectional links to bidirectional links*) 001 LV () 1 hop nidirectional neighbors of node 002 if 003 for each node k in ) 00 if edge k LV ( and LV(k) 005 then add edge k 006 then add node in LV (k) 007 repeat 2 6 for all V 008 Retrn ) LV ( In this section, some of the simlation reslts to verify the effectiveness of ELMST are presented. The performance of ELMST and IEEE b Maximm Power are compared. The topology control algorithm is implemented in S-2. The nodes are randomly distribted in a rectanglar region of 1200m x 1200m and are varied in nmber from 10 to 100 nodes. All the nodes have a imm transmission range D of 250m. A carrier freqency of 2.GHz and a transmission bandwidth of 2MHz is sed. It is assmed that the omni-directional antennas sed have a 0dB gain and are placed at a height of 1.5m above a node. OLSR is sed as the roting protocol in the simlations de to its distribtive natre. UDP traffic is sed as the application traffic sorce with the nmber of connections varying from 10, 20, 30 or 0.
6 The average connectivity is obtained by evalating the average node degree (the mean connectivity per node) sing the formla C = y /( ), where y is the nmber of nodes reachable by node and is the total nmber of nodes in the network. The average mean connectivity denoted by ψ is given by: 1 1 C = 0 ψ =, (5) which is eqivalent to smming p all the mean connectivity of every node in the entire network. The vale of C shold not be too large as this wold imply that a node commnicates even with very distant nodes and this increases interference and collision and also wastes energy. On the other hand, it shold not be made too small as this wold imply that longer paths have to be taken to reach destinations and this also increases the overall energy consmption in the network. Figre 3 shows a comparison of the average node degree levels. The ELMST algorithm records a great redction in the average node degree not exceeding 6.0 for the entire 10 to 100 nodes network, while maintaining node connectivity. This reslts from the fact that with redced power, a node s neighbors becomes only those that are closest to the node nless there is no relay node to a far neighbor. Figre : Performance comparisons between a conventional IEEE b at Max transmission power and ELMST in terms of network lifetime for a 50nodes network. Similarly, in figre 5, a network of 100nodes is simlated with 0 traffic connections at random times. As expected with controlled power, ELMST ensres the network remains connected p to 85s. This is becase, at redced per node transmission energy, channel contention is redced and a nodes total amont of processing power is redced as it only reaches few neighbors and eventally the overall consmed power in the network is redced. Figre 3: Performance comparisons between a conventional IEEE b at Max transmission power and ELMST in terms of Average ode Degree. odes range from 10 to 100. The lifetime of each of the network instances is also considered. This is measred in terms of the nmber of nodes that remain alive over a period of time. The simlations are based on the assmption that nodes are static and are rn for a period of 150 seconds. Figre shows the lifetime of a network of 50 nodes with 20 traffic connections at random times. A total of 102 packets were sent with 512bytes of data. It is noted that when sing imm power, the network gets disconnected after arond 52s. At a controlled power, the lifetime is extended to the 73s. Figre 5: Performance comparisons between a conventional IEEE b at Max transmission power and ELMST in terms of network lifetime for a 100 nodes network. 6. COCLUSIO In order to realize the effectiveness of WMs, the lifetime of the network is very critical. In this work, an enhanced minimm shortest-path tree based energy efficient topology control algorithm (ELMST) for wireless mesh networks with limited mobility was presented. The algorithm ses only the locally available information to determine the nodes that shold be its logical neighbors at any given time. The reslting
7 topology ensres connectivity, lower average node degree as well as redced power consmption in the network. The algorithm was validated via simlations on the ns-2 platform. The algorithm was however limited to the static backbone mesh nodes. REFERECES [1] C.E. Jones, K. M. Sivalingam, P. Argrawal, & J.C. Chen, A srvey of energy efficient network topologies for wireless networks, Wireless networks, 7(), 2001, [2] P. Santi, Topology control in wireless ad hoc and sensor networks, ACM Compting Srvey, 37(2), 2005, [3] Y. Shen, Y. Cai, & X. X A shortest-path-based topology control algorithm in wireless mltihop networks. Compter Commnication Review, 37(5), 2007, [] Y. Wang and X. Shi, Efficient OnDemand Topology Control for Wireless Ad Hoc etworks. In Proc. Conference on Compter Commnications and etworks (ICCC 2005), 2005, [5] W.-Z. Song, Y. Wang, X.-Y. Li, & O. Frieder. Localized algorithms for energy efficient topology in wireless ad hoc networks. In Proc. ACM Mobihoc 0, 200. [6] I. F. Akyildiz, X. Wang, & W. Wang, Wireless mesh networks: a srvey, Elsevier Jornal of Compter etworks, 7, 2005, [7] V. Rodopl & T.H. Meng, Minimm energy mobile wireless networks, IEEE Jornal on Selected Areas in Commnications, 17(8), 1999, [8] L. Li & J. Halpern, Minimm energy mobile wireless networks revised. In Proc. IEEE ICC, Jne [9] L. Li & J.Y. Halpern, A minimm-energy pathpreserving topology-control algorithm, IEEE Transactions on Wireless Commnications, 3(3), 200, [10]. Li, J. Ho & L. Sha, Design and analysis of an MST-based distribted topology control algorithm. In Proc. IEEE IFOCOM, Jne [11] S.C. Wang, D.S.L. Wei, & S.Y. Ko, A topology control algorithm for constrcting power efficient wireless ad hoc networks. In Proc. IEEE GLOBECOM, December [12]. Li and J. Ho Topology Control in Heterogeneos Wireless etworks: Problems and Soltions. In Proc. of IEEE Infocom, Jne 200 [13] L. H Topology Control for Mltihop Packet radio etworks, IEEE Transactions on Commnications, 1(10), 1993, [1] B.-J. Ko, V. Misra, J. Padhye, & D. Rbenstein, Distribted channel assignment in mlti-radio mesh networks. In Proc. Wireless Commnications and etworking Conference (WCC), 2007, [15] P. Bahl, Opportnities and challenges of commnity mesh networking, keynote at mics workshop eth zrich, Jly, 200. [16] S. Waharte and R. Botaba, Tree-based WirelessMesh etwork Architectre, In Proc. 1 st Intnl. Workshop on Wireless Mesh etworks (Meshets), Hngary, Jly 2005 [17] S. Waharte, R. Botaba, Y. Iraqi, & B. Ishibashi, Roting protocols in wireless mesh networks: challenges and design considerations. In Proc. of the Mltimedia Tools and Applications (MTAP) Jornal, Special Isse on Advances in Consmer Commnications and etworking, [18] D. Panigrahi, P. Dtta, S. Jaiswal, K. V. M. aid & R. Rastogi, Minimm Cost Topology Constrction for Rral Wireless Mesh etworks. In Proc. IEEE IFOCOM, April [19] M. Bahramgiri, M. T. Hajiaghayi, and V. S. Mirrokni, Falt-tolerant and 3-dimensional distribted topology control algorithms in wireless mlti-hop networks. Wireless etworks, 12(2), [20] L. M. i, Y. Li Y. C. La and A. Patil. Landmarc, Indoor location sensing sing active rfid. Wireless etworks, 200.
Energy Efficient Topology Control Algorithm for Wireless Mesh Networks
Energy Efficient Topology Control Algorithm for Wireless Mesh etworks a F O Aron*, b T O Olwal, a A Kurien c M O Odhiambo a Dept of Electrical Engineering, F SATIE, Tshwane University of Technology b The
More informationCautionary Aspects of Cross Layer Design: Context, Architecture and Interactions
Cationary Aspects of Cross Layer Design: Context, Architectre and Interactions Vikas Kawadia and P. R. Kmar Dept. of Electrical and Compter Engineering, and Coordinated Science Lab University of Illinois,
More informationOn the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing
1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity
More informationA Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks
Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,
More informationThe Disciplined Flood Protocol in Sensor Networks
The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab
More informationAn Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast
University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna
More information5 Performance Evaluation
5 Performance Evalation his chapter evalates the performance of the compared to the MIP, and FMIP individal performances. We stdy the packet loss and the latency to restore the downstream and pstream of
More informationFault Tolerance in Hypercubes
Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different
More informationA sufficient condition for spiral cone beam long object imaging via backprojection
A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral
More informationCost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks
Cost Based Local Forwarding Transmission Schemes for Two-hop Celllar Networks Zhenggang Zhao, Xming Fang, Yan Long, Xiaopeng H, Ye Zhao Key Lab of Information Coding & Transmission Sothwest Jiaotong University,
More informationThe Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment
This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment
More informationConstructing Multiple Light Multicast Trees in WDM Optical Networks
Constrcting Mltiple Light Mlticast Trees in WDM Optical Networks Weifa Liang Department of Compter Science Astralian National University Canberra ACT 0200 Astralia wliang@csaneda Abstract Mlticast roting
More informationEvaluating Influence Diagrams
Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will
More informationMobility Control and Its Applications in Mobile Ad Hoc Networks
Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai Department of Compter Science and Engineering Florida Atlantic Uniersity Boca Raton, FL 3331 Abstract Most existing localized
More informationIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY 2007 1 On the Analysis of the Bletooth Time Division Dplex Mechanism Gil Zssman Member, IEEE, Adrian Segall Fellow, IEEE, and Uri Yechiali
More informationREPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips
REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands
More informationNetworks An introduction to microcomputer networking concepts
Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES
More informationMinimal Edge Addition for Network Controllability
This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,
More informationIMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING
International Jornal of Modern Engineering Research (IJMER) www.imer.com Vol.1, Isse1, pp-134-139 ISSN: 2249-6645 IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING
More informationTdb: A Source-level Debugger for Dynamically Translated Programs
Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,
More informationLecture 10. Diffraction. incident
1 Introdction Lectre 1 Diffraction It is qite often the case that no line-of-sight path exists between a cell phone and a basestation. In other words there are no basestations that the cstomer can see
More informationMulti-lingual Multi-media Information Retrieval System
Mlti-lingal Mlti-media Information Retrieval System Shoji Mizobchi, Sankon Lee, Fmihiko Kawano, Tsyoshi Kobayashi, Takahiro Komats Gradate School of Engineering, University of Tokshima 2-1 Minamijosanjima,
More informationChapter 5 Network Layer
Chapter Network Layer Network layer Physical layer: moe bit seqence between two adjacent nodes Data link: reliable transmission between two adjacent nodes Network: gides packets from the sorce to destination,
More informationIoT-Cloud Service Optimization in Next Generation Smart Environments
1 IoT-Clod Service Optimization in Next Generation Smart Environments Marc Barcelo, Alejandro Correa, Jaime Llorca, Antonia M. Tlino, Jose Lopez Vicario, Antoni Morell Universidad Atonoma de Barcelona,
More informationImage Compression Compression Fundamentals
Compression Fndamentals Data compression refers to the process of redcing the amont of data reqired to represent given qantity of information. Note that data and information are not the same. Data refers
More informationConstructing and Comparing User Mobility Profiles for Location-based Services
Constrcting and Comparing User Mobility Profiles for Location-based Services Xihi Chen Interdisciplinary Centre for Secrity, Reliability and Trst, University of Lxemborg Jn Pang Compter Science and Commnications,
More informationA Recovery Algorithm for Reliable Multicasting in Reliable Networks
A Recovery Algorithm for Reliable Mlticasting in Reliable Networks Danyang Zhang Sibabrata Ray Dept. of Compter Science University of Alabama Tscaloosa, AL 35487 {dzhang, sib}@cs.a.ed Ragopal Kannan S.
More informationChapter 7 TOPOLOGY CONTROL
Chapter TOPOLOGY CONTROL Oeriew Topology Control Gabriel Graph et al. XTC Interference SINR & Schedling Complexity Distribted Compting Grop Mobile Compting Winter 00 / 00 Distribted Compting Grop MOBILE
More informationPOWER-OF-2 BOUNDARIES
Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of
More informationPavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003
From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information
More informationConstrained Routing Between Non-Visible Vertices
Constrained Roting Between Non-Visible Vertices Prosenjit Bose 1, Matias Korman 2, André van Renssen 3,4, and Sander Verdonschot 1 1 School of Compter Science, Carleton University, Ottawa, Canada. jit@scs.carleton.ca,
More informationWhat s New in AppSense Management Suite Version 7.0?
What s New in AMS V7.0 What s New in AppSense Management Site Version 7.0? AppSense Management Site Version 7.0 is the latest version of the AppSense prodct range and comprises three prodct components,
More informationAn Extended Fault-Tolerant Link-State Routing Protocol in the Internet
An Extended Falt-Tolerant Link-State Roting Protocol in the Internet Jie W, Xiaola Lin, Jiannong Cao z, and Weijia Jia x Department of Compter Science and Engineering Florida Atlantic Uniersit Boca Raton,
More informationReal-time mean-shift based tracker for thermal vision systems
9 th International Conference on Qantitative InfraRed Thermography Jly -5, 008, Krakow - Poland Real-time mean-shift based tracker for thermal vision systems G. Bieszczad* T. Sosnowski** * Military University
More informationPipelined van Emde Boas Tree: Algorithms, Analysis, and Applications
This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,
More informationIP Multicast Fault Recovery in PIM over OSPF
1 IP Mlticast Falt Recovery in PIM over OSPF Abstract Relatively little attention has been given to nderstanding the falt recovery characteristics and performance tning of native IP mlticast networks.
More informationMobility Control and Its Applications in Mobile Ad Hoc Networks
Mobility Control and Its Applications in Mobile Ad Hoc Netorks Jie W and Fei Dai, Florida Atlantic Uniersity Abstract Most eisting localized protocols in mobile ad hoc netorks, sch as data commnication
More informationResolving Linkage Anomalies in Extracted Software System Models
Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program
More informationA choice relation framework for supporting category-partition test case generation
Title A choice relation framework for spporting category-partition test case generation Athor(s) Chen, TY; Poon, PL; Tse, TH Citation Ieee Transactions On Software Engineering, 2003, v. 29 n. 7, p. 577-593
More informationBias of Higher Order Predictive Interpolation for Sub-pixel Registration
Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz
More informationComputer-Aided Mechanical Design Using Configuration Spaces
Compter-Aided Mechanical Design Using Configration Spaces Leo Joskowicz Institte of Compter Science The Hebrew University Jersalem 91904, Israel E-mail: josko@cs.hji.ac.il Elisha Sacks (corresponding athor)
More informationQoS-driven Runtime Adaptation of Service Oriented Architectures
Qo-driven Rntime Adaptation of ervice Oriented Architectres Valeria ardellini 1 Emiliano asalicchio 1 Vincenzo Grassi 1 Francesco Lo Presti 1 Raffaela Mirandola 2 1 Dipartimento di Informatica, istemi
More informationEfficient Scheduling for Periodic Aggregation Queries in Multihop Sensor Networks
1 Efficient Schedling for Periodic Aggregation Qeries in Mltihop Sensor Networks XiaoHa X, Shaojie Tang, Member, IEEE, XiangYang Li, Senior Member, IEEE Abstract In this work, we stdy periodic qery schedling
More informationLecture 13: Traffic Engineering
Lectre 13: Traffic Engineering CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Mike Freedman, Nick Feamster, and Ming Zhang Lectre 13 Overview Dealing with mltiple paths Mltihoming Entact
More informationCongestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems
Congestion-adaptive Data Collection with Accracy Garantee in Cyber-Physical Systems Nematollah Iri, Lei Y, Haiying Shen, Gregori Calfield Department of Electrical and Compter Engineering, Clemson University,
More information(2, 4) Tree Example (2, 4) Tree: Insertion
Presentation for se with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 B-Trees and External Memory (2, 4) Trees Each internal node has 2 to 4 children:
More informationThis chapter is based on the following sources, which are all recommended reading:
Bioinformatics I, WS 09-10, D. Hson, December 7, 2009 105 6 Fast String Matching This chapter is based on the following sorces, which are all recommended reading: 1. An earlier version of this chapter
More informationA personalized search using a semantic distance measure in a graph-based ranking model
Article A personalized search sing a semantic distance measre in a graph-based ranking model Jornal of Information Science XX (X) pp. 1-23 The Athor(s) 2011 Reprints and Permissions: sagepb.co.k/jornalspermissions.nav
More informationTri-Edge-Connectivity Augmentation for Planar Straight Line Graphs
Tri-Edge-Connectivity Agmentation for Planar Straight Line Graphs Marwan Al-Jbeh 1, Mashhood Ishaqe 1, Kristóf Rédei 1, Diane L. Sovaine 1, and Csaba D. Tóth 1,2 1 Department of Compter Science, Tfts University,
More informationProf. Kozyrakis. 1. (10 points) Consider the following fragment of Java code:
EE8 Winter 25 Homework #2 Soltions De Thrsday, Feb 2, 5 P. ( points) Consider the following fragment of Java code: for (i=; i
More informationAugmenting the edge connectivity of planar straight line graphs to three
Agmenting the edge connectivity of planar straight line graphs to three Marwan Al-Jbeh Mashhood Ishaqe Kristóf Rédei Diane L. Sovaine Csaba D. Tóth Pavel Valtr Abstract We characterize the planar straight
More informationAUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING
AUTOMATIC REGISTRATION FOR REPEAT-TRACK INSAR DATA PROCESSING Mingsheng LIAO, Li ZHANG, Zxn ZHANG, Jiangqing ZHANG Whan Technical University of Srveying and Mapping, Natinal Lab. for Information Eng. in
More informationMaximal Cliques in Unit Disk Graphs: Polynomial Approximation
Maximal Cliqes in Unit Disk Graphs: Polynomial Approximation Rajarshi Gpta, Jean Walrand, Oliier Goldschmidt 2 Department of Electrical Engineering and Compter Science Uniersity of California, Berkeley,
More informationPARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT
PAAMETE OPTIMIZATION FO TAKAGI-SUGENO FUZZY MODELS LESSONS LEANT Manfred Männle Inst. for Compter Design and Falt Tolerance Univ. of Karlsrhe, 768 Karlsrhe, Germany maennle@compter.org Brokat Technologies
More informationTopic Continuity for Web Document Categorization and Ranking
Topic Continity for Web ocment Categorization and Ranking B. L. Narayan, C. A. Mrthy and Sankar. Pal Machine Intelligence Unit, Indian Statistical Institte, 03, B. T. Road, olkata - 70008, India. E-mail:
More informationEfficient and Accurate Delaunay Triangulation Protocols under Churn
Efficient and Accrate Delanay Trianglation Protocols nder Chrn Dong-Yong Lee and Simon S. Lam Department of Compter Sciences The University of Texas at Astin {dylee, lam}@cs.texas.ed November 9, 2007 Technical
More informationarxiv: v1 [cs.cg] 27 Nov 2015
On Visibility Representations of Non-planar Graphs Therese Biedl 1, Giseppe Liotta 2, Fabrizio Montecchiani 2 David R. Cheriton School of Compter Science, University of Waterloo, Canada biedl@waterloo.ca
More informationAddressing in Future Internet: Problems, Issues, and Approaches
Addressing in Ftre Internet: Problems, Isses, and Approaches Mltimedia and Mobile commnications Laboratory Seol National University Jaeyong Choi, Chlhyn Park, Hakyng Jng, Taekyong Kwon, Yanghee Choi 19
More informationData/Metadata Data and Data Transformations
A Framework for Classifying Scientic Metadata Helena Galhardas, Eric Simon and Anthony Tomasic INRIA Domaine de Volcea - Rocqencort 7853 Le Chesnay France email: First-Name.Last-Name@inria.fr Abstract
More informationMaking Full Use of Multi-Core ECUs with AUTOSAR Basic Software Distribution
Making Fll Use of Mlti-Core ECUs with AUTOSAR Basic Software Distribtion Webinar V0.1 2018-09-07 Agenda Motivation for Mlti-Core AUTOSAR Standard: SWC-Split MICROSAR Extension: BSW-Split BSW-Split: Technical
More informationComputer User s Guide 4.0
Compter User s Gide 4.0 2001 Glenn A. Miller, All rights reserved 2 The SASSI Compter User s Gide 4.0 Table of Contents Chapter 1 Introdction...3 Chapter 2 Installation and Start Up...5 System Reqirements
More informationarxiv: v3 [math.co] 7 Sep 2018
Cts in matchings of 3-connected cbic graphs Kolja Knaer Petr Valicov arxiv:1712.06143v3 [math.co] 7 Sep 2018 September 10, 2018 Abstract We discss conjectres on Hamiltonicity in cbic graphs (Tait, Barnette,
More informationAlliances and Bisection Width for Planar Graphs
Alliances and Bisection Width for Planar Graphs Martin Olsen 1 and Morten Revsbæk 1 AU Herning Aarhs University, Denmark. martino@hih.a.dk MADAGO, Department of Compter Science Aarhs University, Denmark.
More informationMillimeter-Wave Multi-Hop Wireless Backhauling for 5G Cellular Networks
2017 IEEE 85th Vehiclar Technology Conference (VTC-Spring) Millimeter-Wave Mlti-Hop Wireless Backhaling for 5G Celllar Networks B. P. S. Sahoo, Chn-Han Yao, and Hng-Y Wei Gradate Institte of Electrical
More informationBlended Deformable Models
Blended Deformable Models (In IEEE Trans. Pattern Analysis and Machine Intelligence, April 996, 8:4, pp. 443-448) Doglas DeCarlo and Dimitri Metaxas Department of Compter & Information Science University
More informationTAKING THE PULSE OF ICT IN HEALTHCARE
ICT TODAY THE OFFICIAL TRADE JOURNAL OF BICSI Janary/Febrary 2016 Volme 37, Nmber 1 TAKING THE PULSE OF ICT IN HEALTHCARE + PLUS + High-Power PoE + Using HDBaseT in AV Design for Schools + Focs on Wireless
More informationMultiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET
Mltiple-Choice Test Chapter 09.0 Golden Section Search Method Optimization COMPLETE SOLUTION SET. Which o the ollowing statements is incorrect regarding the Eqal Interval Search and Golden Section Search
More informationA Unified Energy-Efficient Topology for Unicast and Broadcast
A Unified Energy-Efficient Topology for Unicast and Broadcast Xiang-Yang Li Dept. of Compter Science Illinois Institte of Technology, Chicago, IL, USA xli@cs.iit.ed Wen-Zhan Song School of Eng. & Comp.
More informationReading. 13. Texture Mapping. Non-parametric texture mapping. Texture mapping. Required. Watt, intro to Chapter 8 and intros to 8.1, 8.4, 8.6, 8.8.
Reading Reqired Watt, intro to Chapter 8 and intros to 8.1, 8.4, 8.6, 8.8. Recommended 13. Textre Mapping Pal S. Heckbert. Srvey of textre mapping. IEEE Compter Graphics and Applications 6(11): 56--67,
More informationMaster for Co-Simulation Using FMI
Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany
More informationNew Architectures for Hierarchical Predictive Control
Preprint, 11th IFAC Symposim on Dynamics and Control of Process Systems, inclding Biosystems Jne 6-8, 216. NTNU, Trondheim, Norway New Architectres for Hierarchical Predictive Control Victor M. Zavala
More informationAn Introduction to GPU Computing. Aaron Coutino MFCF
An Introdction to GPU Compting Aaron Cotino acotino@waterloo.ca MFCF What is a GPU? A GPU (Graphical Processing Unit) is a special type of processor that was designed to render and maniplate textres. They
More informationCS 153 Design of Operating Systems Spring 18
CS 53 Design of Operating Systems Spring 8 Lectre 2: Virtal Memory Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Recap: cache Well-written programs exhibit
More informationOptimal Sampling in Compressed Sensing
Optimal Sampling in Compressed Sensing Joyita Dtta Introdction Compressed sensing allows s to recover objects reasonably well from highly ndersampled data, in spite of violating the Nyqist criterion. In
More informationMaximum Weight Independent Sets in an Infinite Plane
Maximm Weight Independent Sets in an Infinite Plane Jarno Nosiainen, Jorma Virtamo, Pasi Lassila jarno.nosiainen@tkk.fi, jorma.virtamo@tkk.fi, pasi.lassila@tkk.fi Department of Commnications and Networking
More informationA GENERIC MODEL OF A BASE-ISOLATED BUILDING
Chapter 5 A GENERIC MODEL OF A BASE-ISOLATED BUILDING This chapter draws together the work o Chapters 3 and 4 and describes the assembly o a generic model o a base-isolated bilding. The irst section describes
More informationFunctions of Combinational Logic
CHPTER 6 Fnctions of Combinational Logic CHPTER OUTLINE 6 6 6 6 6 5 6 6 6 7 6 8 6 9 6 6 Half and Fll dders Parallel inary dders Ripple Carry and Look-head Carry dders Comparators Decoders Encoders Code
More informationBroadcasting XORs: On the Application of Network Coding in Access Point-to-Multipoint Networks
Broadcasting XORs: On the Application of Network Coding in Access Point-to-Mltipoint Networks The MIT Faclty has made this article openly available Please share how this access benefits yo Yor story matters
More informationA Wireless MAC Protocol comparison.
Doc: IEEE P82.1192S1 IEEE 82.11 Wireless Access Method and Physical Layer Specifications Title: Presented by: A Wireless MAC Protocol comparison. Wim Diepstraten NCR SEUtrecht NCRAT&T Network Prodct Grop
More informationThe final datapath. M u x. Add. 4 Add. Shift left 2. PCSrc. RegWrite. MemToR. MemWrite. Read data 1 I [25-21] Instruction. Read. register 1 Read.
The final path PC 4 Add Reg Shift left 2 Add PCSrc Instrction [3-] Instrction I [25-2] I [2-6] I [5 - ] register register 2 register 2 Registers ALU Zero Reslt ALUOp em Data emtor RegDst ALUSrc em I [5
More informationHardware-Accelerated Free-Form Deformation
Hardware-Accelerated Free-Form Deformation Clint Cha and Ulrich Nemann Compter Science Department Integrated Media Systems Center University of Sothern California Abstract Hardware-acceleration for geometric
More informationUnit Testing with VectorCAST and AUTOSAR
Unit Testing with VectorCAST and AUTOSAR Vector TechDay Software Testing with VectorCAST V1.0 2018-11-15 Agenda Introdction Unit Testing Demo Working with AUTOSAR Generated Code Unit Testing AUTOSAR SWCs
More informationDate: December 5, 1999 Dist'n: T1E1.4
12/4/99 1 T1E14/99-559 Project: T1E14: VDSL Title: Vectored VDSL (99-559) Contact: J Cioffi, G Ginis, W Y Dept of EE, Stanford U, Stanford, CA 945 Cioffi@stanforded, 1-65-723-215, F: 1-65-724-3652 Date:
More informationVaristors: Ideal Solution to Surge Protection
aristors: deal Soltion to Srge Protection By Brno van Beneden, ishay BCcomponents, Malvern, Pa. f yo re looking for a srge protection device that delivers high levels of performance while addressing pressres
More informationCS 4204 Computer Graphics
CS 424 Compter Graphics Crves and Srfaces Yong Cao Virginia Tech Reference: Ed Angle, Interactive Compter Graphics, University of New Mexico, class notes Crve and Srface Modeling Objectives Introdce types
More informationA RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA
A RECOGNITION METHOD FOR AIRPLANE TARGETS USING 3D POINT CLOUD DATA Mei Zho*, Ling-li Tang, Chan-rong Li, Zhi Peng, Jing-mei Li Academy of Opto-Electronics, Chinese Academy of Sciences, No.9, Dengzhang
More informationStereo Matching and 3D Visualization for Gamma-Ray Cargo Inspection
Stereo Matching and 3D Visalization for Gamma-Ray Cargo Inspection Zhigang Zh *ab, Y-Chi H bc a Department of Compter Science, The City College of New York, New York, NY 3 b Department of Compter Science,
More informationThe extra single-cycle adders
lticycle Datapath As an added bons, we can eliminate some of the etra hardware from the single-cycle path. We will restrict orselves to sing each fnctional nit once per cycle, jst like before. Bt since
More informationIsilon InsightIQ. Version 2.5. User Guide
Isilon InsightIQ Version 2.5 User Gide Pblished March, 2014 Copyright 2010-2014 EMC Corporation. All rights reserved. EMC believes the information in this pblication is accrate as of its pblication date.
More informationComparison of memory write policies for NoC based Multicore Cache Coherent Systems
Comparison of memory write policies for NoC based Mlticore Cache Coherent Systems Pierre Gironnet de Massas, Frederic Petrot System-Level Synthesis Grop TIMA Laboratory 46, Av Felix Viallet, 38031 Grenoble,
More informationConstraint-Driven Communication Synthesis
Constraint-Drien Commnication Synthesis Alessandro Pinto Goqiang Wang Lca P. Carloni Abstract Constraint-drien Commnication Synthesis enables the atomatic design of the commnication architectre of a complex
More informationLecture 4: Routing. CSE 222A: Computer Communication Networks Alex C. Snoeren. Thanks: Amin Vahdat
Lectre 4: Roting CSE 222A: Compter Commnication Networks Alex C. Snoeren Thanks: Amin Vahdat Lectre 4 Overview Pop qiz Paxon 95 discssion Brief intro to overlay and active networking 2 End-to-End Roting
More informationTDT4255 Friday the 21st of October. Real world examples of pipelining? How does pipelining influence instruction
Review Friday the 2st of October Real world eamples of pipelining? How does pipelining pp inflence instrction latency? How does pipelining inflence instrction throghpt? What are the three types of hazard
More informationSubgraph Matching with Set Similarity in a Large Graph Database
1 Sbgraph Matching with Set Similarity in a Large Graph Database Liang Hong, Lei Zo, Xiang Lian, Philip S. Y Abstract In real-world graphs sch as social networks, Semantic Web and biological networks,
More informationAppearance Based Tracking with Background Subtraction
The 8th International Conference on Compter Science & Edcation (ICCSE 213) April 26-28, 213. Colombo, Sri Lanka SD1.4 Appearance Based Tracking with Backgrond Sbtraction Dileepa Joseph Jayamanne Electronic
More informationMETAMODEL FOR SOFTWARE SOLUTIONS IN COMPUTED TOMOGRAPHY
VOL. 10, NO 22, DECEBER, 2015 ISSN 1819-6608 ETAODEL FOR SOFTWARE SOLUTIONS IN COPUTED TOOGRAPHY Vitaliy ezhyev Faclty of Compter Systems and Software Engineering, Universiti alaysia Pahang, Gambang, alaysia
More informationSecure Biometric-Based Authentication for Cloud Computing
Secre Biometric-Based Athentication for Clod Compting Kok-Seng Wong * and Myng Ho Kim School of Compter Science and Engineering, Soongsil University, Sangdo-Dong Dongjak-G, 156-743 Seol Korea {kswong,kmh}@ss.ac.kr
More informationDesigning and Optimization of Heterogeneous OTN/DWDM Networks with Intermediate Grooming
Designing and Optimization of Heterogeneos OTN/DWDM Networks with Intermediate Grooming Afonso Oliveira IST (METI afonso.oliveira@ist.tl.pt ABSTRACT The coexistence of annels with different bitrates in
More informationAn Optimization of Granular Network by Evolutionary Methods
An Optimization of Granlar Networ by Evoltionary Methods YUN-HEE HAN, KEUN-CHANG KWAK* Dept. of Control, Instrmentation, and Robot Engineering Chosn University 375 Seos-dong, Dong-g, Gwangj, 50-759 Soth
More informationEfficient Holistic Control over Industrial Wireless Sensor-Actuator Networks
Efficient Holistic Control over Indstrial Wireless Sensor-Actator Networks Yehan Ma Cyber-Physical Systems Laboratory Washington University in St. Lois, USA Chenyang L Cyber-Physical Systems Laboratory
More information