Energy-Delay Tradeoffs in a Load-Balanced Router

Size: px
Start display at page:

Download "Energy-Delay Tradeoffs in a Load-Balanced Router"

Transcription

1 Energy-Delay Tradeoffs in a Load-Balanced Router Matthew Andrews Bell Labs, Murray Hill, NJ andrews@research.bell-labs.co Lisa Zhang Bell Labs, Murray Hill, NJ ylz@research.bell-labs.co arxiv: v [cs.ni] 3 Jan 203 Abstract The Load-Balanced Router architecture has received a lot of attention because it does not require centralized scheduling at the internal switch fabrics. In this paper we reexaine the architecture, otivated by its potential to turn off ultiple coponents and thereby conserve energy in the presence of low traffic. We perfor a detailed analysis of the queue and delay perforance of a Load-Balanced Router under a siple rando routing algorith. We calculate probabilistic bounds for queue size and delay, and show that the probabilities drop exponentially with increasing queue size or delay. We also deonstrate a tradeoff in energy consuption against the queue and delay perforance. I. INTRODUCTION The concept of a Load-Balanced Router was studied at length at the beginning of last decade. See for exaple [6], [7], [22], [2], [9], [8], [5]. In this wor we analyze various perforance aspects of a Load-Balanced Router, otivated by the potential energy saving enabled by this architecture. Energy efficiency in networing has recently attracted a large aount of attention. One of the ain ais in uch of this wor is captured by the slogan energy-follows-load, also nown as energy-proportionality. In other words, we wish to ae sure that the energy consued by a networing device atches the aount of traffic that the device needs to carry. This is in contrast to ore traditional architectures for which the device operates at full rate at all ties even if it is lightly loaded. Indeed, by a conservative estiate in a study conducted by the Departent of Energy in 2008, at least 40% of the total consuption by networ eleents such as switches and routers can be saved if energy proportionality is achieved. This translates to a saving of 24 billion Wh per year attributed to data networing []. A recent study [2] further confirs that the power consuption of soe stateof-the-art coercial routers stays within a sall percentage of the pea power profile regardless of traffic fluctuation, for exaple the significant daily variation in traffic load [26]. Various approaches have been proposed in order to achieve energy-proportionality. Speed scaling, also nown as rate adaptation, and powering down are two popular ethods for effectively atching energy consuption to traffic load. The forer refers to setting the processing speed of a networ eleent according to traffic load. It is typically assued that the energy consuption is superlinear with respect to the operating rate. The latter refers to turning off the eleent at certain ties and so it either operates at the full rate or zero rate. Both ethods are the subject of active research, though ost of the wor focuses on optiizing an individual eleent in isolation [6], [4], [29], [23], [3], [5], [7], [8], [25], [3]. A central question to both ethods is to set the speed so as to iniize energy usage while aintaining a desirable perforance, e.g. latency or throughput. The Load-Balanced Router architecture has the potential to handle the traffic in such a way that portions of the device can be turned off in response to lightly loaded traffic. We provide what we believe is the first detailed analysis of queue size and delay in a Load-Balanced Router, and we provide a tradeoff between energy consuption and queue size/delay. In order to describe our results in ore detail we now give a brief description of the Load-Balanced Router architecture. A. Motivation for Traditional Load-Balanced Architecture One of the ost fundaental goals of any router architecture is to achieve stability, which is soeties referred to as 00% throughput. In other words the router ais to process all the arriving traffic so long as no input and no output are inherently overloaded. The ey difficulty with doing this is that the arriving traffic ay be highly non-unifor, i.e. if A i is the arrival rate for traffic going fro input i to output, we will typically have A i A i for i i. Early wor on switching considered a crossbar architecture in which atchings between the inputs and the outputs are set up at every tie step. It was shown in [24] that the Maxiu Weight Matching algorith with weights equal to the baclog for each input-output pair can ensure stability. Subsequent papers looed at siplifications of this scheduler that could still achieve stability. However, a ajor drawbac of all these approaches is that they require a centralized scheduler with inforation about the baclogs of data on each input-output pair. A solution is the Load-Balanced Router that could ae use of randoized routing ideas first proposed by Valiant [28]. In the Load-Balanced Router there is a iddle stage placed between the input nodes and the output nodes. Each arriving pacet is routed to a iddle-stage node chosen at rando. After passing through the iddle stage each pacet is then forwarded to its designated output. In order to realize this architecture we place a switching fabric between the input stage and iddle stage and between the iddle stage and the output stage. The beauty of this design is that the rando routing ensures that for each of these switching fabrics no coplicated scheduling is needed. All we need to do is repeat

2 a unifor schedule in which each connection is served at least once [6]. B. Energy Consideration for Revisiting Load-Balanced Architecture Our otivation for revisiting the Load-Balanced Router architecture is that it provides an attractive fraewor for studying energy proportionality [2]. For exaple, the nuber of active nodes in the iddle stage can be reduced in the presence of light traffic, and increased with heavier traffic. The switch fabric between the input and iddle stage and between the iddle stage and the output can be functionally viewed as full eshes, as indicated in Figure. One possibility is to ipleent the esh with round-robin crossbars. For exaple, Keslassy s thesis [22] assues that the input, output and the iddle stage are all of size n and each fabric is an n n crossbar that operates in a tie-slotted fashion. At each tie slot t the first fabric connects input node i to iddle node i+t od n and the second fabric connects iddle node j to output nodej+t od n. In this ipleentation, if the nuber of active nodes in the iddle stage is reduced then the crossbar can either slowdown or be turned off periodically. Adjusting the size of the iddle stage or the speed of the switching fabric requires considerable technological and engineering challenges. In this note we do not ai to address these issues. Our focus is on analyzing queue size and delay given the active portion of the iddle stage, which leads to a tradeoff between power consuption and the size of the active iddle stage. C. Model and Definition We forally define the Load-Balanced Router architecture as follows. The router has n inputs and n outputs. We noralize the line rate such that it equals on each input and output lin. We also have a iddle stage lying in between the inputs and outputs that consists of nodes. The traditional Load-Balanced Router has = n. However, here we treat as a separate paraeter. In between the input and the iddle stage we have an n esh. Effectively each lin in this esh operates at rate α/ for a speedup of α. Siilarly, in between the iddle and the output stage we have an n esh with lin rate β/ for a speedup factor of β. Each of the two eshes is input-buffered, i.e. each input node has a separate buffer for each iddle node and each iddle node has a separate buffer for each output node. See Figure. Fro now on, we use i to index the input, j the iddle stage and the output. We refer to the pacets that wish to go fro input i to output as i pacets. Siilarly, lin connects input i and node j in the iddle stage and lin connects node j in the iddle stage and output. Buffer resp. at node i resp. j buffers pacets that are waiting to traverse lin resp.. The ey to possible energy savings is that we assue that not all nodes need to be active at periods of low load. We suppose that at any tie we can choose nodes to Input alpha/ Middle stage beta/ Output Fig.. A Load-Balanced Router architecture, where the nuber of nodes in the iddle stage can be different fro the nuber of inputs and outputs. be active in the iddle stage and that such a configuration requires power w for soe function w. When an i pacet p arrives we choose a rando iddle node j aong the active nodes in the iddle stage and place p in buffer at node. The lin operates continuously at rate α/ and transits pacets in the buffer in a FIFO anner. Siilarly, when p arrives at node j in the iddle stage, it is placed in the buffer. The lin continuously operates at rate β/ and transits pacets in the buffer in a FIFO anner. As we can see the scheduling for both stages requires no centralized intelligence and is extreely siple. Lastly we describe our traffic odel. As is coon in wor on scheduling in routers, we assue that pacets are of unit size or else are partitioned into cells of unit size. For any s,t let A i s,t be the aount of i traffic arriving at the router in the tie interval [s,t and let A i s,t = A is,t and A s,t = i A is,t. We assue that the i traffic, the input i traffic and the output traffic are σ i,r i, σ, and σ, ε constrained respectively for soe burst paraeters σ i and σ, for soe rate paraeters r i and for soe load paraeterε. In other words we assue that, A i s,t σ i +r i t s A i s,t σ+t s A s,t σ+ εt s. We rear that the arrival rates r i will typically vary over tie. Indeed, the energy savings that we hope to gain coe precisely fro the fact that we can atch the nuber of active coponents to the traffic. However, we assue that this happens over a slow tiescale and so we perfor our scheduling analysis as if the rates r i are fixed. Note that round robin is another possibility for choosing a iddle-stage node. However, a rando choice is ore robust against adversarial types of traffic arrivals. We do not go into details here.

3 D. Results In Section II we ae the siple stateent that r active iddle-stage nodes suffice for handling the traffic load where r i r i for all and r r i for all i. This in turn iplies that the energy required to serve the traffic over the long-ter is w r. In Sections III to IV-E we present a probabilistic analysis that bounds the queue sizes at the input and iddle stages and bounds the delay experienced by pacets as they travel fro the router input to the router output. We first bound the probability for a queue size to exceed a certain aount q, and the delay to exceed a certain aount of d, assuing a fixed sized nuber of iddle stages. An iportant feature of our bounds is that they decrease exponentially with q and d. For a fixed traffic load, we then derive a trade off between the queue size/delay perforance and the nuber of active iddlestage nodes which in turn gives a energy-delay and energy-queue tradeoff. Leaving energy iniization aside, we believe that this is the first detailed analysis of the delay and queue perforance of a Load-Balanced Router, which ay be interesting in its own right. In Section V we present soe nuerical exaples to validate our analytical findings. We note that our approach is different fro the traditional powerdown and rate adaptation techniques since we will be directing traffic in such a way that enables soe coponents to be off. In other words for the iddle stage nodes we are not trying to atch service rate to a traffic process that is exogenous. We are trying to atch the active iddle stage nodes to a traffic process that is under our control due to our ability to route within the router. We also rear that our bounds could be used to govern how any iddle nodes are active in a Load-Balanced Router without necessarily coputing all the bounds on the fly. We could instead precopute the bounds and create a siple loo-up table that deterines how any iddle stage nodes should be active based on easureents of the load at the inputs and outputs. II. THROUGHPUT ANALYSIS Recall that r i represents the current arrival rate of traffic that wishes to be routed fro input i to output. Let r i = r i and let r = i r i. Let r be such that r i r and r r for all i,. Lea. If we use iddle stage eleents then the router is not overloaded if r. Hence the power required to serve all the traffic in the long-ter is at ost w r. Proof: Follows fro the fact that if we turn on iddle stage eleents then for each iddle eleent j, j, the traffic rate that will be routed on lin will be at ost r/ which by assuption is at ost // = /. Since the capacity on the lin isα/ for soeα >, this iplies that the lin is not overloaded. A siilar arguent applies to each lin between the iddle and output stages III. OVERVIEW OF DELAY ANALYSIS Before diving into details of the delay analysis, we first provide a high level overview of our techniques. A. Relationship with Stochastic Networ Calculus We use a variant of networ calculus [0], [], [4] soeties referred to as stochastic networ calculus. The original for of networ calculus derives delay bounds by iposing upper bounds on the aount of traffic arriving at a node via arrival curves and lower bounds on the aount of traffic served by a node via service curves. By relating these two curves we can both obtain a bound on the delay suffered by data at a networ eleent and also characterize the arrival curves for the data at any downstrea nodes. However, in the traditional networ calculus all such bounds are required to hold with probability. In our context this will lead to extreely wea bounds since there is a non-zero probability that the router will send a large nuber of pacets to a single iddle-stage node, thus condening the all to extreely poor service. An alternative therefore is to use a stochastic networ calculus in which we only wish for bounds on service to hold with high probability. A detailed forulation of a stochastic networ calculus was outlined in a series of papers by Jiang and others [20], [9]. At a high level Jiang s approach obtains curves that bound the probability that the delay exceeds a certain aount at upstrea eleents, and then use these curves to bound the worst-case arrivals at downstrea eleents. However, we follow a slightly different approach since we are able to obtain better bounds by not directly utilizing the service curves at the input nodes to bound the arrivals at the iddle-stage nodes. We instead base our calculations at the iddle stage on the external arrivals of various ensebles of flows that ight then be tie-shifted due to delays at the input. This allows us to avoid handling coplicated convolutions of arrival and service curves. We elaborate further on this distinction later. B. Our Approach We divide our analysis into a series of pieces. a Bound the queue build-up at the input: Recall that between input i and iddle-stage node j we effectively have a lin with speed α/. Also recall that the input has a buffer especially dedicated to the traffic that wishes to go fro input i to iddle-stage node j. Suppose that at soe tie t this buffer has level q. Let s be the last tie that this buffer was epty. Note that during the tie interval [s,t the lin served data of total size αt s/. Therefore the total data that arrived for lin i during the tie interval [s,t is at least q +αt s/. Therefore the probability that lin i has a baclog of size q at tie t is upper bounded by the probability that for soe

4 s t, the aount of i data arriving at lin i during the interval [s,t is at least q + αt s/. However, recall that the traffic arriving to input i arrives at rate at ost r and each pacet is sent to a iddle-stage node chosen uniforly at rando. Hence, for fixed s and t, we can use a Chernoff bound to bound the probability that the aount of i data arriving during the interval [s,t is at least q+αt s/. It is easy to show that this probability decreases exponentially in s and so we can use a union bound to bound the probability that this occurs for any s t. b Bound the delay experienced at the input: Translating our bound on queue size into a bound on delay is siple. Since the transission rate on the lin is α/, the event that the head of line pacet for the lin at tie t has experienced delay d, iplies the event that at tie t d, the queue size for the lin was at least dα/. An upper bound on the probability of the latter event can be derived using the ethod described earlier. c Bound the queue build-up at iddle stage: We now give an overview of how we perfor the analysis at the head of the queue at iddle eleent j. This fors the crux of our analysis since we are in a ore coplicated situation due to the fact that the pacet arrivals at the iddle stage are affected by how they are served at the input. As before note that if the queue for lin has size q at tie t, then for soe tie s t, the arrivals for lin at iddlestage node j during the tie interval [s,t ust be at least q +βt s/. Now suppose that the oldest of this data arrived at the input at tie s d, and suppose in addition that this data arrived at iddle-stage node j on lin. We can therefore state that the total aount of data arriving at the syste in the tie interval [s d,t that is destined for lin is at least q +βt s/ and the delay experienced by data arriving at lin i at tie s d is at least d. Via union bounds we can calculate the probability that this occurs for any i,s,d. In particular, for d sall we can say that the probability that the arrivals exceed q+βt s/ is sall whereas if d is large then the probability that the lin i delay is at least d is sall. We ae three points about this analysis at the iddle stage. This is where our analysis deviates slightly fro the traditional ethodology of networ calculus. We do not calculate a service curve for the input and use that service curve to bound the arrivals at the iddle stage. Instead we analyze the delay behavior at the input and then use that calculation to bound the iddle stage queue size using an expression that still involves arrivals at the input. Our initial analysis aes a slight approxiating assuption in that for the i defined above, we treat the arriving traffic for lin and the delay behavior on lin as independent. In reality of course they will be correlated due to traffic that passes fro input i to output through iddle-stage node j. However, this approxiation will typically not have a large effect for larger values of since the i traffic only fors a / fraction of the total j. However, in order to get a ore accurate bound, in Section IV-E we present a ore detailed expression that deals with the correlation explicitly. Our analysis is based on Chernoff bounds. However, the for of the Chernoff bound that we use changes depending on whether the bound on data arrivals that we are considering for a particular lin is close to or far fro the expected nuber of data arrivals for that lin. This unfortunately leads to a soewhat involved case analysis. d Bound the delay experienced at the iddle stage: The conversion of the queue-size bound to a delay bound at the iddle stage can be done in the exact sae way as for the input. Now that we have an expression for the delay at both stages we can convert it into an expression for the end-to-end delay fro the inputs to the outputs. IV. ANALYTICAL BOUNDS ON DELAY We now present the details of our delay analysis. We rely heavily on the following Chernoff bounds [27]. In particular we use 2 to derive analytical bounds and we use to derive tighter bounds for nuerical siulation. Theore 2 Chernoff Bound. Let X,...,X n be independent binary rando variables, and let µ be an upper bound on the expectation E[ i X i]. For all δ > 0, Pr[ i X i +δµ] e δ +δ +δ e inδ2,δ µ/3 µ In what follows we soeties refer to µ as the aggregated ean and δ as the excess factor. For conciseness we shall often use the aggregated ean even though µ is strictly speaing a bound on the ean. A. Input stage analysis We begin by coputing the queue distribution at the head of lin, where i [,n] is an input and j [,] is in the iddle stage. As in Section II we assue that r i r and r r for all i, and we assue that iddle stage eleents are currently active. Initially, in order to eep the forulas anageable, we shall derive our forulas for the case in which r = and =. We shall also assue that the arriving traffic is sooth and so we do not have the burst ters σ i and σ. Later on, we shall show how to adapt the forulas when these assuptions do not hold. Let A i t be the binary rando variable that indicates whether a pacet with input i output is apped to iddle stage j at tie t. We use A i t,t 2 to denote t2 t=t A i t, the total arrival in the duration t,t 2 ]. Let t be the rando variable for the queue size at the head of lin at tie t. To copute Q i,j t, let us assue s < t Q i,j 2

5 be the last tie that the queue at is epty. ForQ i,j t to be larger than a value q, the arrival A i s,t over all [,n] ust be at least α t s +q since lin is operated at a rate α. Forally, Pr[Q t q] s tpr [ n = ] A i s,t α t s +q We now bound the right-hand-side of 3. Since A i t are independent binary variables, we apply the Chernoff bound to every ter in the suation. The following is the aggregated ean µ and the excess factor δ for the above probability. { µ = t s δ = α + q, t s since α t s +q = µ+δ. If α 2, we have δ and we use 2 to derive, Pr[Q t q] e q e t s α q If α < 2, we have δ when t s q 2 α. Otherwise δ <. We apply 2 as follows. Pr[Q t q] q 2 α e q 3 e t s α q 3 + α 2 + e 32 α q e α 2 t s= q 2 α e t s α 2 Note that both expressions are exponentially decreasing in q. For the tie being we shall proceed according to the case α 2 since this leads to ore anageable forulas. Later on, we shall indicate where to adapt the forulas when we are in a scenario where α < 2. Let D 5 t be the axiu delay that soe pacet has t. For this delay to be ore than d at tie t, soe pacet ust be in the queue at tie t d. Since lin operates at rate α in a FIFO anner, the queue at tie t d ust be at least dα/. Therefore, experienced at tie t in the queue Q Pr[D t d] Pr[Q t d dα/] e By a union bound, Pr[ i, D e t d] n dα dα. 6 Recall that the above analysis was perfored in the absence of the burst ter σ. If we do have bursty traffic then we can adjust the forulas by aing the following changes to the aggregated ean and the excess factor and propagating these changes through the resulting forulas. { µ = t s+σ δ = t sα +q σ t s+σ. B. Middle stage analysis We now copute the queue distribution at the head of lin, where j [,] is in the iddle stage and [,n] is an output. Let Q 2 t be defined siilarly as Q t. To 3 bound Q 2 at tie t, let s t be the last tie that the queue Q 2 was epty. For Q2 t to be larger than q, there ust be at least t sβ + q distinct pacets in Q2 during the tie period [s,t]. Further, let s d be the earliest tie one of these pacets arrived at an input, say i. This pacet ust experience a delay of at least d in Q. Therefore, d d Pr[Q 2 t q] [ Pr s t ne dα [ Pr s t i i ] A i s d,t t sβ +q Pr[ i, D s d] ] A i s d,t t sβ +q Note that the bound 6 on the delay distribution at the input stage is independent of the tie index. We can therefore ove Pr[ i, D s d] to outside the suation indexed by tie in the second inequality above. We proceed to bound ] s t Pr[ i A is d,t t sβ +q based on the following expressions for the expectation µ and the excess factor δ. { µ = t s+d δ = t sβ +q d, t s+d since +δµ = t sβ +q. There are two cases to consider, β 2 or β > 2. For β 2, we further consider the following subcases, depending on q d, the value of δ when t s = 0. Note that as t s increases, the value of δ approaches β. Case a: q q 2d d, and t s 2 β. In this case δ. Since δµ = t sβ +q d, bound 2 iplies 8. Case b: q q 2d d, and 2 β t s. In this case β δ, which iplies δ 2 µ β 2 µ. Bound 2 in turn iplies 9. Case 2: β q d, and for all values of t s. In this case, β δ, which is the sae situation as b and iplies 0 in the sae way. Case 3a: q d β, dβ+ 2q t s and dβ+ 2q β β 0. In this case β 2 δ β for all values of t s. Since δ 2 µ β 2 µ 4, bound 2 iplies.

6 Case 3b: q dβ+ 2q d β, and 0 < β t s. In this case β 2 δ β for t s dβ+ 2q β. Since δ 2 µ β 2 µ 4, bound 2 iplies 2. Case 3c: q dβ+ 2q d β, and t s < β. We trivially upper bound the probability by as in 3. a b 2 3a 3b 3c a b 2 3a 3b 3c Pr[Q 2 t q] s tpr[ A t sβ i s d,t +q] 7 d i 2 q d=0 q 2 d=0 q β d= q 2 2q β+ d= q β d= 2q β+ d= 2q β+ q 2d 2 β Pr[ i, D t s= q 2d 2 β t s= dβ+ 2q β n n ne α 6 q ne α 3β q ne 2α 3β+ q s d] e t sβ +q d 3 +8 e t s+d 3 β 2 +9 e t s+d 3 β 2 +0 e β 2 t s+d e β 2 t s+d e β 2 e β +ne α β e α 2q β + 2β β 2 q e β 2 2 e 6 β 2 q e β 2 2 e α 2q β+ e α e α β 2 e 4α+β 2 2 e 2α+ββ 6 2 2q β + e α 2q β+ Note that every ter above decreases exponentially with the queue size q. The case in which β > 2 is sipler. We oit the analysis for space consideration. Recall that all of the above forulas are for the case α 2. If α < 2 then we need to replace all the factors 4, e dα with 5 e dα + e dαα 2 2 α. e α 2 If output has a burst ter σ then as in the input stage we can reflect this by adjusting the aggregated ean and the excess factor to, { µ = t s+d+σ δ = t sβ +q d σ. t s+d+σ We conclude this section by bounding the delay distribution at the iddle stage. D 2 be the axiu delay that soe pacet has experienced at tie t in the queue Q 2 t. For this delay to be ore than d at tie t, soe pacet ust be in the queue at tie t d. Since lin operates in a FIFO anner, the queue at tie t d ust be at least dβ/. Hence Pr[D 2 t d] Pr[Q2 t d dβ/]. We stress again that all of the above forulas are for the case α 2. If α < 2 then we need to replace all the factors 4 with factors 5. C. Eventual end-to-end delay Now that we have delay bounds for the two stages of the router we can obtain a bound on the end-to-end delay distribution. In the following we let g,β q be a shorthand for the dβ+ 2q β 3 upper bound that we have derived on Pr[Q 2 t q] and f,α q a shorthand for our upper bound onpr[q t q]. Suppose that an i pacet is still traversing the router at tie e q 3 t, but it arrived at the router before tie t d. It is not hard + e β to see that either it is still waiting to traverse the input stage e 3 β 2 q at tie t d 2, or it arrived at the iddle stage by tie t d 2. + Hence the probability that the end-to-end delay is at least d e β 2 e α β 2 is at ost, e 3 β 2 q + Pr[D t d 2 d 2 ]+Pr[D2 t d 2 ] f,α dα + 2 +g,β dβ 2. D. Characterizing the tradeoff with the nuber of iddle eleents + In the above delay analysis we ade a nuber of siplifying assuptions to eep the notation anageable. For exaple we held = and r =. We now deonstrate that we can use the above forulas to handle the case of arbitrary and r. This in turn allows to characterize the tradeoff between energy consuption and end-to-end delay.

7 The ain idea is to scale tie so that the arrival rate at the inputs is scaled to. We also adjust the lin rates on the two stages of the esh. In particular, if we wish to analyze a syste with a given,, r, α and β, we define a new syste characterized by ˆ, ˆ, ˆ r, ˆα and ˆβ in which we set, ˆ = ˆ = ˆ r = ˆα = α ˆβ = β r r Then it is not hard to see that if we scale tie by a factor r, the new syste has exactly the sae behavior as the old one. However, we are now woring in a syste with ˆ = ˆ and r =. Hence we can apply the analysis that we have already derived. Our ain result is thus, Theore 3. If we run the router with iddle stage eleents then it uses energy w and the probability that the end-to-end delay is at least d is bounded by, f, dα α r 2 r +g, β r E. Dealing with dependence dβ 2 r. In our analysis of the iddle stage we iplicitly ade the siplifying assuption that i A i s d,t is independent fro D s. However, this is not strictly true since the arrivals for the path i will affect both i A i s d,t as well as D s. Since the i flow represents only a / fraction of the traffic that contributes to D s, this will typically have a negligible effect on the eventual results. However, if we required a true upper bound on the probability distribution of Q 2 we ust use the following adaptation of the forula, which for each î, conditions the event D îj s d on whether or not A î s d,t is greater. More forally, than 5t sβ n Pr[Q 2 t q] d s t î Pr[ î i î Pr[D îj F. Queues at output Pr[A î 5t sβ s d,t ]+ n A t sβ i s d,t s d A î 5t sβ s d,t ] n We conclude this section by explaining how the analysis can be extended if we also wish to bound the delay on the output lin fro the router. Let Q 3 t be the queue at the head of the output lin and recall that this lin has speed. To bound Q 3 t at tie t, let s t be the last tie that queue Q 3 was epty. For Q 3 to be larger than q, there ust be at least t s+q distinct pacets in Q 3 during the tie period [s,t]. Further, let s d be the earliest tie one of these pacets arrived at an input. Suppose that the path of this pacet is i. Then the pacet ust either be waiting in the queue Q at tie s d 2 queue Q 2 at tie s d 2 have experienced delay of d 2 or it ust be waiting in the. In the forer case the pacet ust in Q at tie s d 2 the latter case it ust have experienced delay of d 2 at tie s. Therefore, d d Pr[Q 3 t q] Pr A i s d,t t s+q and in in Q2 s t Pr[,D s d 2 d ]+ Pr[ j,d2 2 s d 2 ] nf,α dα 2 g,β dβ 2 ε d q +σ. In addition, as before, we can convert this bound to a bound on delay for the third stage. Let D 3 be the axiu delay that soe pacet has experienced at tie t in the queue Q 3 t. For this delay to be ore than d at tie t, soe pacet ust be in the queue at tie t d. Since lin operates in a FIFO anner, the queue at tiet d ust be at least d ε. Hence Pr[D 3 t d] Pr[Q3 t d d ε] d nf,α d α 2 g,β d β 2 ε d d ε+σ. V. NUMERICAL RESULTS In this section we show nuerical exaples of the queue bounds. In particular for these calculations we use forulas that are siilar to those derived in Section IV but we use Chernoff bounds of the for rather than 2 since the forer are tighter. Figure 2 plots the logarith of the probability of a iddlestage queue exceeding q pacets against the queue size q. For this instance, the router is The traffic is fully loaded for each of the inputs and outputs. We vary the speedup α = β in the range of 2,3,4 and 5. As we can see fro the figure the logarith of the probability decreases linearly with the queue size, which eans the probability +q 5t sβ decreases exponentially with the queue. As expected, we can ] also see that with increasing speedup, the probability of the n queue size exceeding q drops. Figure 3 deonstrates the tradeoff between the queue size and the nuber of active iddle-stage nodes. For this instance, the router is again The lin rate of the interconnect is set to /20. The traffic is fully loaded for each of the inputs and outputs. If we eep all = 80 nodes in the iddle stage active, we can see fro the botto curve of Figure 3 that the queue size is the sallest. However, this option is also the ost energy consuing as all 80 iddlestage nodes are ept active. For the other extree, we can activate 40 iddle-stage nodes, which is the ost energy efficient. However, we can see fro the botto curve of Figure 3 that the queue size is the sallest. The curves in between correspond to the interediate cases in which the nuber of active iddle-stage nodes are 50, 60 and 70.

8 logarith of probability alpha=2 alpha=3 alpha=4 alpha= queue size Fig. 2. Log of probability against queue size, for n = 20, = 80 and fully loaded traffic. Fro top to botto, the curves correspond to increasing speedup fro α = β = 2, 3,4 and 5. logarith of probability =40 =50 =60 =70 = queue size Fig. 3. Log of probability against queue size, for sae aount of total traffic but varying nuber of active iddle-stage nodes. Fro top to botto, the curves correspond to increasing nuber of active iddle-stage nodes fro = 40,50,60,70,80. The nuber of inputs and outputs is n = 20 and interconnect lin rate is /20. VI. CONCLUSION In this paper we revisit the Load-Balanced Router architecture, otivated by its potential of delivering energy proportionality for routers. We offer a detailed analysis on the queue lengths and pacet delays under a siple rando routing algorith which is robust against all adissible traffic. This allows us to observe a trade off between perforances such as queue size against energy consuption. Our paper does not focus on algoriths that optiize the nuber of active iddle-stage nodes. We give a very siple arguent for which the size of the active iddle stage is proportional to the axiu traffic load over all inputs and outputs. It is an intriguing open question to see how one could ae sure that the size of the active iddle stage is proportional to the traffic average over all input, not to the axiu. REFERENCES [] Routing teleco and data centers toward efficient energy use. In Proceedings of the Vision and Roadap Worshop, U.S. Departent of Energy, October [2] S. Antonaopoulos, S. Fortune, A. Francini, T. Klein, R. McLellan, D. Nielson, and L. Zhang. Personal counication, 20. [3] N. Bansal, T. Kibrel, and K. Pruhs. Speed scaling to anage energy and teperature. Journal of the ACM, 54, [4] J. Y. L. Boudec and P. Thiran. Networ Calculus. Springer Verlag, PS files/netcal.ht, [5] H.-L. Chan, W.-T. Chan, T. W. La, L.-K. Lee, K.-S. Ma, and P. W. H. Wong. Energy efficient online deadline scheduling. In Proceedings of ACM-SIAM SODA, pages , [6] C. Chang, D. Lee, and Y. Jou. Load balanced Birhoff-von Neuann switches, part I: one-stage buffering. In IEEE HPSR 0, Dallas, TX, 200. [7] C. Chang, D. Lee, and C. Lien. Load balanced Birhoff-von Neuann switches, part II: ulti-stage buffering. Coputer Co., 25: , [8] C. Chang, D. Lee, and Y. Shih. Mailbox switch: a scalable twostage switch architecture for conflict resolution of ordered pacets. In Proceedings of IEEE INFOCOM 2004, Hong Kong, [9] C. Chang, D. Lee, and C. Yue. Providing guaranteed rate services in the load balanced Birhoff-von Neuann switches. In Proceedings of IEEE INFOCOM 2003, San Francisco, CA, [0] R. L. Cruz. A calculus for networ delay, Part I: Networ eleents in isolation. IEEE Transactions on Inforation Theory, 37:4 3, 99. [] R. L. Cruz. A calculus for networ delay, Part II: Networ analysis. IEEE Transactions on Inforation Theory, 37:32 4, 99. [2] A. Francini, S. Fortune, T. Klein, and M. Ricca. Energy profiling of networ equipent for rate adaptation technologies. Internal Technical Docuents, Alcatel-Lucent, 20. [3] A. Francini and D. Stiliadis. Energy efficiency with rate adaptation. In Proc. of IEEE HPSR, [4] M. Garrett. Powering down. Coun. ACM, 59:42 46, [5] N. M. I. Keslassy, S.T. Chuang. A load-balanced switch with an arbitrary nuber of linecards. In Proceedings of IEEE INFOCOM 2004, Hong Kong, [6] S. Irani and K. Pruhs. Algorithic probles in power anageent. SIGACT News, 362:63 76, [7] S. Irani, S. K. Shula, and R. Gupta. Algoriths for power savings. ACM Transactions on Algoriths, 34, [8] S. Irani, S. K. Shula, and R. K. Gupta. Online strategies for dynaic power anageent in systes with ultiple power-saving states. ACM Trans. Ebedded Coput. Syst., 23: , [9] Y. Jiang. A basic stochastic networ calculus. In Proceedings of ACM SIGCOMM 06, pages 23 34, New Yor, NY, [20] Y. Jiang and P. J. Estad. Analysis of stochastic service guarantees in counication networs: A server odel. In In Proc. of the International Worshop on Quality of Service IWQoS 2005, pages , [2] I. Keslassy, S.-T. Chuang, D. M. K. Yu, M. Horowitz, and O. Solgaard. Scaling internet routers using optics. In Proceedings of ACM SIGCOMM 03, Karlsruhe, Gerany, [22] I. Keslassy and N. McKeown. Maintaining pacet order in two-stage switches. In Proceedings of IEEE INFOCOM 2002, New Yor, NY, June [23] M. Li, B. J. Liu, and F. F. Yao. Min-energy voltage allocation for tree-structured tass. In Proceedings of COCOON, pages , [24] N. W. McKeown, V. Ananthara, and J. Walrand. Achieving 00% throughput in an input-queued switch. In Proceedings of IEEE INFOCOM 96, pages , San Francisco, CA, March 996. [25] S. Nedevschi, L. Popa, G. Iannaccone, S. Ratnasay, and D. Wetherall. Reducing networ energy consuption via sleeping and rateadaptation. In Proceedings of NSDI, pages , [26] M. Roughan, A. Greenber, C. Kalane, M. Ruescwicz, J. Yates, and Y. Zhang. Experience in easuring internet bacbone traffic variability. In Proc. ACM SIGCOMM IMW, pages 9 92, [27] C. Scheideler. Probabilistic Methods for Coordination Probles. Habilitation thesis, Paderborn University, [28] L. G. Valiant. A schee for fast parallel counication. SIAM J. Coput., 2:350 36, 982. [29] F. F. Yao, A. Deers, and S. Shener. A scheduling odel for reduced CPU energy. In Proceedings of IEEE FOCS, pages , 995.

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13 Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical

More information

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

λ-harmonious Graph Colouring Lauren DeDieu

λ-harmonious Graph Colouring Lauren DeDieu λ-haronious Graph Colouring Lauren DeDieu June 12, 2012 ABSTRACT In 198, Hopcroft and Krishnaoorthy defined a new type of graph colouring called haronious colouring. Haronious colouring is a proper vertex

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

A Measurement-Based Model for Parallel Real-Time Tasks

A Measurement-Based Model for Parallel Real-Time Tasks A Measureent-Based Model for Parallel Real-Tie Tasks Kunal Agrawal 1 Washington University in St. Louis St. Louis, MO, USA kunal@wustl.edu https://orcid.org/0000-0001-5882-6647 Sanjoy Baruah 2 Washington

More information

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage 216 IEEE 23rd International Conference on High Perforance Coputing A Low-Cost Multi-Failure Resilient Replication Schee for High Data Availability in Cloud Storage Jinwei Liu* and Haiying Shen *Departent

More information

The Internal Conflict of a Belief Function

The Internal Conflict of a Belief Function The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of

More information

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant

More information

Data & Knowledge Engineering

Data & Knowledge Engineering Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID

More information

Survivability Function A Measure of Disaster-Based Routing Performance

Survivability Function A Measure of Disaster-Based Routing Performance Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected

More information

Geometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem.

Geometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem. Noveber 13, 2016 Geoetry. The Method of the enter of Mass (ass points): Solving probles using the Law of Lever (ass points). Menelaus theore. Pappus theore. M d Theore (Law of Lever). Masses (weights)

More information

MAC schemes - Fixed-assignment schemes

MAC schemes - Fixed-assignment schemes MAC schees - Fixed-assignent schees M. Veeraraghavan, April 6, 04 Mediu Access Control (MAC) schees are echaniss for sharing a single link. MAC schees are essentially ultiplexing schees. For exaple, on

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS Evaluation of the Tiing Properties of Two Control Networs: CAN and PROFIBUS Max Mauro Dias Santos 1, Marcelo Ricardo Steer 2 and Francisco Vasques 3 1 UnilesteMG, CEP 35170-056, Coronel Fabriciano MG Brasil.

More information

QoS and Sensible Routing Decisions

QoS and Sensible Routing Decisions QoS and Sensible Routing Decisions Erol Gelenbe Dept. of Electrical & Electronic Engineering Iperial College London SW7 2BT e.gelenbe@iperial.ac.uk Abstract Network Quality of Service (QoS) criteria of

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University

More information

The Hopcount to an Anycast Group

The Hopcount to an Anycast Group The Hopcount to an Anycast Group Piet Van Mieghe Delft University of Technology Abstract The probability density function of the nuber of hops to the ost nearby eber of the anycast group consisting of

More information

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH V. Atienza; J.M. Valiente and G. Andreu Departaento de Ingeniería de Sisteas, Coputadores y Autoática Universidad Politécnica de Valencia.

More information

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu

More information

Multipath Selection and Channel Assignment in Wireless Mesh Networks

Multipath Selection and Channel Assignment in Wireless Mesh Networks Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,

More information

A Hybrid Network Architecture for File Transfers

A Hybrid Network Architecture for File Transfers JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,

More information

Adaptive Holistic Scheduling for In-Network Sensor Query Processing

Adaptive Holistic Scheduling for In-Network Sensor Query Processing Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,

More information

Leveraging Relevance Cues for Improved Spoken Document Retrieval

Leveraging Relevance Cues for Improved Spoken Document Retrieval Leveraging Relevance Cues for Iproved Spoken Docuent Retrieval Pei-Ning Chen 1, Kuan-Yu Chen 2 and Berlin Chen 1 National Taiwan Noral University, Taiwan 1 Institute of Inforation Science, Acadeia Sinica,

More information

Reducing Crosspoint Buffers for Performance Guaranteed Asynchronous Crossbar Scheduling

Reducing Crosspoint Buffers for Performance Guaranteed Asynchronous Crossbar Scheduling educing Crosspoint Buffers for Perforance Guaranteed Asynchronous Crossbar Scheduling Masoueh Karii, Zhuo Sun, and Deng Pan Florida International University Eails: {kari001, zsun003, pand}@fiu.edu Abstract

More information

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem Theoretical Analysis of Local Search and Siple Evolutionary Algoriths for the Generalized Travelling Salesperson Proble Mojgan Pourhassan ojgan.pourhassan@adelaide.edu.au Optiisation and Logistics, The

More information

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S COPUTER GEERATED HOLOGRAS Optical Sciences 67 W.J. Dallas (onday, August 3, 004, 1:38 P) PART III: CHAPTER OE DIFFUSERS FOR CGH S Part III: Chapter One Page 1 of 8 Introduction Hologras for display purposes

More information

Ascending order sort Descending order sort

Ascending order sort Descending order sort Scalable Binary Sorting Architecture Based on Rank Ordering With Linear Area-Tie Coplexity. Hatrnaz and Y. Leblebici Departent of Electrical and Coputer Engineering Worcester Polytechnic Institute Abstract

More information

1 Extended Boolean Model

1 Extended Boolean Model 1 EXTENDED BOOLEAN MODEL It has been well-known that the Boolean odel is too inflexible, requiring skilful use of Boolean operators to obtain good results. On the other hand, the vector space odel is flexible

More information

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se

More information

Planet Scale Software Updates

Planet Scale Software Updates Planet Scale Software Updates Christos Gkantsidis 1, Thoas Karagiannis 2, Pablo Rodriguez 1, and Milan Vojnović 1 1 Microsoft Research 2 UC Riverside Cabridge, UK Riverside, CA, USA {chrisgk,pablo,ilanv}@icrosoft.co

More information

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3 2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition

More information

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math Sarter Balanced Assessent Consortiu s, s, Stard Alignent for Math The Sarter Balanced Assessent Consortiu (SBAC) has created a hierarchy coprised of clais targets that together can be used to ake stateents

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract

More information

Privacy-preserving String-Matching With PRAM Algorithms

Privacy-preserving String-Matching With PRAM Algorithms Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,

More information

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University

More information

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH Kulapraote Prathuchai Geoinforatics Center, Asian Institute of Technology, 58 Moo9, Klong Luang, Pathuthani, Thailand.

More information

Homework 1. An Introduction to Neural Networks

Homework 1. An Introduction to Neural Networks Hoework An Introduction to Neural Networks -785: Introduction to Deep Learning Spring 09 OUT: January 4, 09 DUE: February 6, 09, :59 PM Start Here Collaboration policy: You are expected to coply with the

More information

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.5, Septeber 205 AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM Xie Yang and Cheng Wushan College of Mechanical Engineering,

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

CS 361 Meeting 8 9/24/18

CS 361 Meeting 8 9/24/18 CS 36 Meeting 8 9/4/8 Announceents. Hoework 3 due Friday. Review. The closure properties of regular languages provide a way to describe regular languages by building the out of sipler regular languages

More information

Efficient Learning of Generalized Linear and Single Index Models with Isotonic Regression

Efficient Learning of Generalized Linear and Single Index Models with Isotonic Regression Efficient Learning of Generalized Linear and Single Index Models with Isotonic Regression Sha M. Kakade Microsoft Research and Wharton, U Penn skakade@icrosoft.co Varun Kanade SEAS, Harvard University

More information

INSERTION SORT is O(n log n)

INSERTION SORT is O(n log n) INSERTION SORT is On log n) Michael A. Bender Martín Farach-Colton Miguel A. Mosteiro Abstract Traditional INSERTION SORT runs in On 2 ) tie because each insertion takes On) tie. When people run INSERTION

More information

Optimal Route Queries with Arbitrary Order Constraints

Optimal Route Queries with Arbitrary Order Constraints IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL.?, NO.?,? 20?? 1 Optial Route Queries with Arbitrary Order Constraints Jing Li, Yin Yang, Nikos Maoulis Abstract Given a set of spatial points DS,

More information

Identifying Converging Pairs of Nodes on a Budget

Identifying Converging Pairs of Nodes on a Budget Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

Automatic Graph Drawing Algorithms

Automatic Graph Drawing Algorithms Autoatic Graph Drawing Algoriths Susan Si sisuz@turing.utoronto.ca Deceber 7, 996. Ebeddings of graphs have been of interest to theoreticians for soe tie, in particular those of planar graphs and graphs

More information

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles

More information

COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS

COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS International Journal of Coputer Science and Counication Vol. 3, No. 1, January-June 2012, pp. 181-185 COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS A.H. Karode 1, S.R. Suralkar 2, Manoj Bagde

More information

ELEN : Project Progress Report. Second Order Delay Computation for RC networks with Non-Tree Topology

ELEN : Project Progress Report. Second Order Delay Computation for RC networks with Non-Tree Topology ELEN 689-603: Project Progress eport Second Order Delay Coputation for C networks wi Non-Tree Topology ajeshwary Tayade 000 07 573 //003 PDF created wi pdffactory trial version www.pdffactory.co : Introduction

More information

Collaborative Web Caching Based on Proxy Affinities

Collaborative Web Caching Based on Proxy Affinities Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA

More information

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan

More information

The Boundary Between Privacy and Utility in Data Publishing

The Boundary Between Privacy and Utility in Data Publishing The Boundary Between Privacy and Utility in Data Publishing Vibhor Rastogi Dan Suciu Sungho Hong ABSTRACT We consider the privacy proble in data publishing: given a database instance containing sensitive

More information

BP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks

BP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks BP-MAC: A High Reliable Backoff Preable MAC Protocol for Wireless Sensor Networks Alexander Klein* Jirka Klaue Josef Schalk EADS Innovation Works, Gerany *Eail: klein@inforatik.uni-wuerzburg.de ABSTRACT:

More information

Generating Mechanisms for Evolving Software Mirror Graph

Generating Mechanisms for Evolving Software Mirror Graph Journal of Modern Physics, 2012, 3, 1050-1059 http://dx.doi.org/10.4236/jp.2012.39139 Published Online Septeber 2012 (http://www.scirp.org/journal/jp) Generating Mechaniss for Evolving Software Mirror

More information

I ve Seen Enough : Incrementally Improving Visualizations to Support Rapid Decision Making

I ve Seen Enough : Incrementally Improving Visualizations to Support Rapid Decision Making I ve Seen Enough : Increentally Iproving Visualizations to Support Rapid Decision Making Sajjadur Rahan Marya Aliakbarpour 2 Ha Kyung Kong Eric Blais 3 Karrie Karahalios,4 Aditya Paraeswaran Ronitt Rubinfield

More information

A Discrete Spring Model to Generate Fair Curves and Surfaces

A Discrete Spring Model to Generate Fair Curves and Surfaces A Discrete Spring Model to Generate Fair Curves and Surfaces Atsushi Yaada Kenji Shiada 2 Tootake Furuhata and Ko-Hsiu Hou 2 Tokyo Research Laboratory IBM Japan Ltd. LAB-S73 623-4 Shiotsurua Yaato Kanagawa

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade

More information

Real-Time Detection of Invisible Spreaders

Real-Time Detection of Invisible Spreaders Real-Tie Detection of Invisible Spreaders MyungKeun Yoon Shigang Chen Departent of Coputer & Inforation Science & Engineering University of Florida, Gainesville, FL 3, USA {yoon, sgchen}@cise.ufl.edu Abstract

More information

Closing The Performance Gap between Causal Consistency and Eventual Consistency

Closing The Performance Gap between Causal Consistency and Eventual Consistency Closing The Perforance Gap between Causal Consistency and Eventual Consistency Jiaqing Du Călin Iorgulescu Aitabha Roy Willy Zwaenepoel EPFL ABSTRACT It is well known that causal consistency is ore expensive

More information

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networs F. Mousavi Madani Departent of coputer engineering Alzahra University Tehran, Iran, osavif@alzahra.ac.ir Received:

More information

Gromov-Hausdorff Distance Between Metric Graphs

Gromov-Hausdorff Distance Between Metric Graphs Groov-Hausdorff Distance Between Metric Graphs Jiwon Choi St Mark s School January, 019 Abstract In this paper we study the Groov-Hausdorff distance between two etric graphs We copute the precise value

More information

6.1 Topological relations between two simple geometric objects

6.1 Topological relations between two simple geometric objects Chapter 5 proposed a spatial odel to represent the spatial extent of objects in urban areas. The purpose of the odel, as was clarified in Chapter 3, is ultifunctional, i.e. it has to be capable of supplying

More information

A GRAPH-PLANARIZATION ALGORITHM AND ITS APPLICATION TO RANDOM GRAPHS

A GRAPH-PLANARIZATION ALGORITHM AND ITS APPLICATION TO RANDOM GRAPHS A GRAPH-PLANARIZATION ALGORITHM AND ITS APPLICATION TO RANDOM GRAPHS T. Ozawa and H. Takahashi Departent of Electrical Engineering Faculty of Engineering, Kyoto University Kyoto, Japan 606 Abstract. In

More information

Improve Peer Cooperation using Social Networks

Improve Peer Cooperation using Social Networks Iprove Peer Cooperation using Social Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Noveber 5, 2007 Corresponding

More information

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute

More information

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural

More information

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive and Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS AWNI ITRADAT Assistant Professor, Departent of Coputer Engineering, Faculty of Engineering, Hasheite University, P.O. Box 15459,

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI

More information

Author. Published. Journal Title DOI. Copyright Statement. Downloaded from. Griffith Research Online. Kandjani, Hadi, Wen, Larry, Bernus, Peter

Author. Published. Journal Title DOI. Copyright Statement. Downloaded from. Griffith Research Online. Kandjani, Hadi, Wen, Larry, Bernus, Peter Enterprise Architecture Cybernetics for Global Mining Projects: Reducing the Structural Coplexity of Global Mining Supply Networks via Virtual Brokerage Author Kandjani, Hadi, Wen, Larry, Bernus, Peter

More information

Fair Resource Allocation for Heterogeneous Tasks

Fair Resource Allocation for Heterogeneous Tasks Fair Resource Allocation for Heterogeneous Tasks Koyel Mukherjee, Partha utta, Gurulingesh Raravi, Thangaraj Balasubraania, Koustuv asgupta, Atul Singh Xerox Research Center India, Bangalore, India 560105

More information

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer Departent of Coputer Science and Engineering University of South Florida Tapa, FL 33620 Abstract -- The

More information

Verifying the structure and behavior in UML/OCL models using satisfiability solvers

Verifying the structure and behavior in UML/OCL models using satisfiability solvers IET Cyber-Physical Systes: Theory & Applications Review Article Verifying the structure and behavior in UML/OCL odels using satisfiability solvers ISSN 2398-3396 Received on 20th October 2016 Revised on

More information

Distributed Multicast Tree Construction in Wireless Sensor Networks

Distributed Multicast Tree Construction in Wireless Sensor Networks Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,

More information

Data Caching for Enhancing Anonymity

Data Caching for Enhancing Anonymity Data Caching for Enhancing Anonyity Rajiv Bagai and Bin Tang Departent of Electrical Engineering and Coputer Science Wichita State University Wichita, Kansas 67260 0083, USA Eail: {rajiv.bagai, bin.tang}@wichita.edu

More information

Short Papers. Crosstalk in VLSI Interconnections

Short Papers. Crosstalk in VLSI Interconnections IEEE TRANSACTIONS ON COPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTES, VOL. 8, NO. 2, DECEBER 999 87 Short Papers Crosstalk in VLSI Interconnections Ashok Vittal, Lauren Hui Chen, algorzata arek-sadowska,

More information

Integrating fast mobility in the OLSR routing protocol

Integrating fast mobility in the OLSR routing protocol Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr

More information

Impact of Network Delay Variations on Multicast Sessions with TCP-like Congestion Control

Impact of Network Delay Variations on Multicast Sessions with TCP-like Congestion Control Ipact of Network Delay Variations on Multicast Sessions with TCP-like Congestion Control Augustin Chaintreau y François Baccelli z Christophe Diot yy y Ecole Norale Supérieure 45 rue d Ul 75005 Paris FRANCE

More information

Summary. Reconstruction of data from non-uniformly spaced samples

Summary. Reconstruction of data from non-uniformly spaced samples Is there always extra bandwidth in non-unifor spatial sapling? Ralf Ferber* and Massiiliano Vassallo, WesternGeco London Technology Center; Jon-Fredrik Hopperstad and Ali Özbek, Schluberger Cabridge Research

More information

Trees. Linear vs. Branching CSE 143. Branching Structures in CS. What s in a Node? A Tree. [Chapter 10]

Trees. Linear vs. Branching CSE 143. Branching Structures in CS. What s in a Node? A Tree. [Chapter 10] CSE 143 Trees [Chapter 10] Linear vs. Branching Our data structures so far are linear Have a beginning and an end Everything falls in order between the ends Arrays, lined lists, queues, stacs, priority

More information

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl. Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

Content-Centric Multicast Beamforming in Cache-Enabled Cloud Radio Access Networks

Content-Centric Multicast Beamforming in Cache-Enabled Cloud Radio Access Networks Content-Centric Multicast Beaforing in Cache-Enabled Cloud Radio Access Networks Hao Zhou, Meixia Tao, Erkai Chen, Wei Yu *Dept. of Electronic Engineering, Shanghai Jiao Tong University, Shanghai, China

More information

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones Advance Access publication on 24 February 2017 The British Coputer Society 2017. All rights reserved. For Perissions, please eail: journals.perissions@oup.co doi:10.1093/cojnl/bxx015 Fair Energy-Efficient

More information

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction Relocation of ateway for Enhanced Tieliness in Wireless Sensor Networks Keal Akkaya and Mohaed Younis Departent of oputer Science and Electrical Engineering University of Maryland, altiore ounty altiore,

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information