An ECA-based Control-rule formalism for the BPEL Process Modularization *

Size: px
Start display at page:

Download "An ECA-based Control-rule formalism for the BPEL Process Modularization *"

Transcription

1 Availale online at Proceia Environmental Sciences 11 (2011) An ECA-ase Control-rule formalism for the BPEL Process Moularization * Bang Ouyang, Farong Zhong **, Huan Liu Department of Computer Science,Zhejiang Normal University Jinhua , Zhejiang Province, P. R. China,ouy888@163.com, zfr@zjnu.cn, liuhuan04jsj@126.com Astract Because usinesses are constantly changing, the control flow of usiness process must e pluggale, i.e., it shoul e efine in a flexile manner so that any change in the flow can e easily accommoate. The prolem of astraction with respect to languages for We Services Composition has gaine a lot of attention lately. In this paper, An ECAase control-rule formalism is introuce to moularize the monolithic BPEL process structure. Using such a formalism, usiness users not only can moel executale cross-organizational usiness processes, ut also can easily manage changing usiness environments Pulishe y Elsevier Lt. Open access uner CC BY-NC-ND license. Selection an/or peer-review uner responsiility of the Intelligent Information Technology Application Research Association. Keywors:component: formalism; BPEL Process; composition language astraction; control-rules; 1.Introuction Business Process Execution Language (BPEL) [1], short for We Services Business Process Execution Language (WS-BPEL) is an OASIS stanar executale language for specifying actions within usiness processes with we services. Processes in Business Process Execution Language export an import information y using we service interfaces exclusively. BPEL has gaine a lot of attraction an support from inustry as well as acaemia. The momentum of BPEL is seen through case stuies, an a large numer of BPEL engine implementations in the inustry suggest that BPEL will e the stanar of choice for coorinate We service composition implementations. Service composition shares some common features with workflows [2]. BPEL is ase on the concepts of workflows. However, usinesses are constantly changing, the control flow must e pluggale, i.e., it shoul e efine in a flexile manner so that any change in the flow can e easily accommoate. Keeping this issue in min, a concept of control-rules has een introuce to capture the control flow. In this approach all the activities in the control flow are reay to execute in parallel as soon as the process Pulishe y Elsevier Lt. Open access uner CC BY-NC-ND license. Selection an/or peer-review uner responsiility of the Intelligent Information Technology Application Research Association. oi: /j.proenv

2 512 Bang Ouyang et al. / Proceia Environmental Sciences 11 (2011) starts, ut the execution sequence is governe y links that propagate from activity to activity. Using rules the moeler can specify the irection of flow from one activity to another ase on an optional conition. 2.Relate Works The prolem of astraction with respect to languages for We services composition has gaine a lot of attention lately. Researchers have approache this prolem from various angles having the same ojective, i.e., to facilitate the process of moeling service compositions. Zeng [3] has evelope a ynamic We service composition system that is capale of ynamic composition an moification of running workflows y using a usiness rule inference engine. Business rule templates are use to efine the usiness policies, which in turn are use to generate process schemas. These rules must e efine y omain experts prior to moeling. An XML ase language is evelope to map the process specifications into the composition engine which runs the process. Our approach on the other han, is uil on top of inustry stanar language an captures rules irectly from the moeler. SWORD [4] is another eveloper toolkit for uiling composite We services using rule-ase plan generation. To create a composite service, the service requestor only nees specify the initial an finial states for the composite service, the plan generation then can e achieve using a rule-ase expert system. Again, this system also oes not utilize BPEL or any other We service stanar, which reners the approach unfeasile in practical use. All the rule ase approaches mentione aove apply pure rule ase methoology. Charfi [5] claim that pure rule ase approach is not appropriate to capture all the aspects of We services composition an put forwar a hyri composition approach. The focus of this research is erive from Aspect Oriente Programming(AOP) an the usiness rules are propose to e implemente in an aspect-oriente extension of BPEL calle AO4BPEL [6]. The usage of such technique requires AO4BPEL complaint implementation, which has not yet een provie. Our approach iffers from the aove work as regars to supporting rule ase We services composition in the following manner: Only one classification of rules is efine that hanle the control flow part of the composition linking activities together. Instea of capturing control flow etails using eclarative if-then rules, which later on raises issues of refinement an transformation complexities, we use rule that are in BPEL native format. 3.Rule Base Composition 3.1.Overview Business rules are pieces of knowlege aout the usiness an it is not appropriate to ury that knowlege eep in coe where no one can ientify it as such [7]. Recently there has een a tren of introucing rules into We services composition [8, 9]. These approaches follow a pure rule ase approach for the composition an encapsulate the whole evelopment life cycle. This pure rule ase approach is not appropriate for eveloping We service compositions [5]. A multitue of rules makes the composition ifficult to unerstan an maintain. We therefore avocate the use of rules for capturing the *Supporte y the National Natural Science Founation of China uner Grant No **Corresponing author.

3 Bang Ouyang et al. / Proceia Environmental Sciences 11 (2011) control an ata flow only instea of specifying the whole composition process in terms of rules. Our partial rule approach allows for a more unerstanale service composition y reucing complexity an avoiing monolithic process efinitions. The authors in [5] also avocate that usiness rules cannot capture certain aspects of We services composition. For instance, we cannot efine a usiness rule that states that two services shoul e calle in parallel. In fact, what is neee is a tight integration etween rule-ase languages an We service composition languages in orer to e ale to use activities an variales as terms an facts in the rule language. By oing so we will have refine rules at a lower level of execution that can more easily efine control flow semantics of the composition language. Therefore, we propose using BPEL activities as terms in our rule formalism instea of conventional eclarative statements. In BPEL, the core composition specification only efines the asic control an ata flow etween the services to e compose. If we reak own the usiness logic unerlying the composition into several parts or moules, the composition ecomes more flexile since each of these parts can evolve inepenent of the rest an can e create, moifie or elete ynamically at runtime. The iea is to moularize the control flow into iniviual units, each represente as a rule, linking a single pre-activity with a single post-activity so that when usiness policies are suject to change, we only have to moify the corresponing units that moularize the implementation of the usiness process. Moreover, this moularization reuces the complexity of the composition an oosts the aaptaility. 3.2.Control-Rule Formalism Among various types of usiness rules ientifie y researchers [10, 11], one type is the Reaction Rules also known as ECA (Event-Conition-Action) rules that are concerne with the invocation of actions in response to events ase conitions uner which actions must e taken. The control-rules that we use are similar to ECA rules, in that an event is consiere to e completion of an activity, conition specifies the transition conition, an action efines another activity that will e reay to execute after the first activity completes its execution. The structure of a control-rule is as follows: ControlRule { From (activity) [TransitionConition (Boolean expression)] To (activity) Context (flow) } A control-rule links two activities together as a unit/moule. From specifies a source activity upon the execution of which the To or target activity shoul e execute. TransitionConition is an optional Boolean expression that functions as a guar for following this specifie link. If the transition conition is omitte, it is eeme to e present with the constant value true. An if the transition conition evaluate to false, the link is marke as negative an the target activity is not execute. The links following this target activity are also marke as negative, i.e., the consequence of this ecision is to propagate a negative status to the links ownwars. The significance of transition conitions (use along with join conitions) is actuate in the case of choice an ecision patterns. When joining the activities efine y control-rules, the whole control flow is prouce in the form of irecte graph. This graph ase approach oes not require the structure constructs of BPEL. Thus constructs like sequence, flow, an switch are astracte away from the moeler. The control flow is organize using noes that perform work an lines of control etween them escriing the flow of execution. Here an issue arises, i.e., when the processes grows in size an has iterative tasks then maintaining the process ecomes ifficult [12], ecause control lines in such cases may have many tangle inter-epenencies. Changing the flow also ecomes ifficult as the moeler nees to e aware of

4 514 Bang Ouyang et al. / Proceia Environmental Sciences 11 (2011) epenencies of a particular noe across the entire flow. In orer to get ri of this prolem, we propose to use the while structure construct as an iterative activity. Another structure activity that we use is the pick activity which funamentally is more an event management activity than a structure activity. To moel a special case of simultaneously arriving messages we propose another structure activity calle MultipleReceive that is internally represente with a flow construct an can contain more than one receive activities. All these structure activities may constitute a control flow of their own. Thus the control-rules can e hierarchically neste within these structures an the level at which the rule occurs can e ientifie y the Context attriute of the control-rule. In summary the activity of a control-rule can e anyone of the primitive activities of BPEL; assign (for ata transformations); while (for looping); pick (iffere choice, or event); or our own efine MultipleReceive activity. 4.Patterns analyst It is important to analyze the approach regaring various control flow patterns that may e encountere uring moeling. This is to ensure that any possile scenario can e hanle using the control-rule formalism. In this chapter we analyze how the graph oriente structure of our approach can hanle the most commonly occurring workflow patterns. The control flow perspective provies an essential insight into usiness process moeling effectiveness an expressiveness. A conceptual moel shoul escrie all relevant static an ynamic aspects of the prolem at han. This implies that a process moeling technique shoul have sufficient expressive power in orer to moel all possile patterns [13]. As escrie in [14], a pattern is the astraction from a concrete form which keeps recurring in specific non aritrary contexts. Therefore it is important to analyze common patterns encountere in usiness process moeling. We evaluate our approach using a set of workflow patterns ocumente in [15] an communication patterns ocumente in [16] 4.1.Workflow Patterns The workflow patterns have een compile from an analysis of existing workflow languages an they capture typical control flow epenencies encountere in workflow moeling. These patterns are argualy suitale for analysis of We services composition moeling, since the situations they capture are also relevant in this omain. We shall consier the patterns that are supporte y BPEL only [2]. a a c c an a (a) Sequence () Parallel Split (c) Synchronization a c1 c2 c c or a a c3 c1 c2 c3 c () Exclusive Choice (e) Simple Merge (f) Multi-Choice Figure 1. Workflow patterns Sequence: An activity in a workflow process is enale after the completion of another activity in the same process. This pattern can e hanle y using control-rule without any transition conition, originating from an activity a to another activity (see Fig.1(a)). Parallel Split: A point in the process where a single threa of control splits into multiple threas of control which can e execute in parallel, thus allowing activities to e execute simultaneously or in

5 Bang Ouyang et al. / Proceia Environmental Sciences 11 (2011) any orer. This pattern can e hanle y using control-rules without transition conitions, originating from one activity a an targeting at ifferent activities, c, to e execute in parallel (see Fig.1()) Synchronization: A point in the process where multiple parallel ranches converge into one single threa of control, thus synchronizing multiple threas. It is an assumption of this pattern that after an incoming ranch has een complete, it cannot e complete again while the merge is still waiting for other ranches to e complete. This pattern can e hanle y control-rules with no transition conition, originating from ifferent activities, c, an targeting at one activity a. An AND join conition must e specifie at the target activity (see Fig.1(c)). Exclusive Choice: A point in the workflow process where ase on a ecision or workflow control ata, one of several ranches is chosen. This pattern is hanle y control-rules originating from one activity a an targeting ifferent activities, c,. Each rule shoul e accompanie with a isjoint transition conition c1, c2 an c3(see Fig.1()) Simple Merge: A point in the workflow process where two or more alternative ranches come together without synchronization. It is an assumption of this pattern that none of the alternative ranches is ever execute in parallel. The pattern can e hanle y using control-rules originate from ifferent activities, c, an targeting at one activity a. An OR join conition must e specifie at the target activity(see Fig.1(e)) Multi-Choice : A point in the process, where, ase on a ecision or control ata, a numer of ranches are chosen an execute as parallel threas. This pattern can e hanle y control-rules originating from an activity a an targeting at ifferent activities, c,. A joint transition conition specifie will result in multiple threas of execution(see Fig.1(f)). Synchronizing Merge: A point in the process where multiple paths converge into one single threa. Some of these paths are active (i.e., they are eing execute) an some are not. If only one path is active, the activity after the merge is triggere as soon as this path completes. If more than one path is active, synchronization of all active paths nees to take place efore the next activity is triggere. This pattern is hanle in the same way pattern simple merge is hanle, i.e., using control-rules originate from ifferent activities, c, an targeting at one activity a an having an OR join conition at the target activity. Implicit Termination: A given su-process is terminate when there is nothing left to o, i.e., termination oes not require an explicit termination activity. Implicit termination is suppose y the flow construct an as we use flow construct to envelope the control flow, the process is terminate implicitly. Multiple Instances without Synchronization: Within the context of a single case, multiple instances of an activity may e create, i.e., there is a facility for spawning of new threas of control, all of them inepenent of each other. This pattern can e hanle y using a while activity with a conition an a context of the case that is spawning off new threa (say process A) an using an invoke activity insie the oy of while that is invoking an operation of another process (say B). The process B will e receiving message from the corresponing invoke of process A which is have the attriute createinstance assigne to yes. This can cause multiple instances. Multiple Instance with Synchronization: This pattern has three su categories. All can e hanle using our approach ecause the solution is ase on while an pick activity which our approach support. For more etails on the solution of these patterns, reaer is referre to [2] Deferre Choice: A point in a process where one among several alternative ranches is chosen ase on information which is not necessarily availale when this point is reache. This can e hanle using pick activity. Cancel Activity an Cancel Case: A cancel activity terminates a running instance of an activity, while canceling a case leas to the removal of an entire workflow instance. Cancel Case is solve with the

6 516 Bang Ouyang et al. / Proceia Environmental Sciences 11 (2011) terminate activity, which is use to aanon all execution within a usiness process instance of which the terminate activity is a part. Cancel Activity is ealt with using fault an compensation hanlers, specifying the course of action in cases of faults an cancellations. 4.2.Communication Patterns. The Communication Patterns are relate to the way in which system moules interact in the context of Enterprise Application Integration (EAI). They are argualy suitale for the analysis of the communication moeling ailities involving We services composition, given the strong overlap etween EAI an We services technologies. Two types of communications are istinguishe, namely synchronous an asynchronous communication. Synchronous communication involves Request/Reply, One-Way an Synchronous Polling patterns, whereas asynchronous communication involves Message Passing patterns. All of these patterns are supporte in our approach using various arrangements of messaging activities, i.e., receive, invoke an reply. Accoring to the type of communication an the activity selecte y the moeler, the system coul attaches variale attriutes to the activity ase on the signatures of operations involve. 5.Contriutions an future research An ECA-ase control-rule formalism is introuce to moularize the monolithic BPEL process structure. A control-rule efines the irection of flow from one activity to another along with a transition conition an it captures the control flow etails of the usiness process. BPEL activities are use irectly as terms in the rule system instea of conventional if-then-else eclarative statements. This helps in efining more refine rules at the execution level that can capture the process ehavioral in more realistic fashion. Changes in usiness policies pertinent to the process flow can e easily incorporate just y changing the rules, proviing agility against change. As the flow is automatically generate using rules, the moeler oes not have to other aout the interepenencies of activities. Also the rules can e change inepenent to each other. Accoring to BPEL specification, an exception, event or a compensation action can span over the entire process, over a group of activities, or over a single activity. Currently exception/event/compensation hanling over the process level an single activity levels supporte. In the future, flexiility will e provie to the moeler to specify these hanlers over multiple activities. This can e achieve y introucing hanler over an iniviual or group of rules. As a single rule can accumulate two activities at a time, it can provie the asis for multiple activity grouping. References [1] OASIS. We Services Business Process Execution Language Version 2.0. OASIS Stanar 11. April [2] P. Wohe, W.M.P. vaner Aalst, M. Dumas, Arthur H.M. ter Hofstee, Analysis of We Services Composition Languages: The Case of BPEL4W In: Proceeings of the 22n International Conference on Conceptual Moeling (ER 03), Springer-Verlag, vol.2813, pp , Octoer 2003 [3] L. Zeng. Dynamic We Services Composition. Ph.D. thesis, The School of Computer Science an Engineering, University of New South Wales, August 2003 [4] S. R. Ponnekanti, A. Fox. SWORD: A eveloper Toolkit for We Service Composition. In: Proceeings of the 11th Worl Wie We Conference, Honolulu, HI, USA, 2002 [5] A. Charfi. Aspect-Oriente Workflow Languages: AO4BPEL an Applications. PhD thesis, TU Darmstat, Fachereich Informatik, 2007.

7 Bang Ouyang et al. / Proceia Environmental Sciences 11 (2011) [6] A. Chaffi, M. Mezini. Aspect-Oriente We Service Composition with A04BPEL. In: L.J. Zhang, M. Jeckle, Proceeings of European Conference on We Services (ECOWS 04), Erfurt, Germany, Springer-Verlag, vol.3250, p.168., 2004 [7] B. von Halle. Business Rules Applie: Builing Better Systems using the Business Rules Approach. Wiley, [8] WANG Cong,WANG Zhi-xue,JIANG Guang-jie. Business Process Description Metho Base on ECA Rules. In: Journal of UEST of China. Vol.35 No.1, pp , Fe [9] HE Chunlin, TENG Yun, PENG Renming. We Ser vice Oriente Workflow Moel Base on ECA Rules. In: Computer Science, Vol.36 No.8, pp , Aug 2009 [10] D. Hay, K. A. Healy. Defining Business Rules-What are they really?. Technical report 1.3, The Business Rules Group, July [11] K. Taveter, G. Wagner. Agent-Oriente Enterprise Moeling Base on Business Rules. In: H. S. Kunii, S. Jajoia, A. Selverg, Proceeings of the 20th International Conference on Conceptual Moeling, Yokohama, Japan, Springer-Verlag, vol.2224, pp , Novemer [12] D. Ganesarajah, E. Lupu. Workflow-Base Composition of We-Services: A Business Moel or a Programming Paraigm?. In: Proceeings of the 6th International Enterprise Distriute Oject Computing Conference (EDOC 02), Lausanne, Switzerlan, Septemer, pp , 2002 [13] B. Kiepuszewski. ExpressiVeness an Suitaility of Languages for Control Flow Moelling in Workflows. Ph.D. thesis, Faculty of Information Technology, Queenslan University of Technology, Novemer 2002 [14] D. Riehle, H. Zullighoven. Unerstaning an Using Patterns in Software Development. Theory an Practice of Oject Systems, 2(1), pp [15] Workflow Management Coalition. Terminology&Glossary. Document Numer WFMC-TC-1011, Document Status- Issue 3.0, Feruary 1999 [16] W. A. Ruh, F. X. Maginnis, W. J. Brown. Enterprise Application Integration:A Wiley Tech Brief. John Wiley an Sons, Inc, 2001

An Introduction of BOM Modeling Framework

An Introduction of BOM Modeling Framework An Introuction of BOM Moeling Framework Qiang He, Ming-xin Zhang, an Jian-xing Gong Astract Component ase moeling has een a research hotpot in the area of Moeling an Simulation for a long time. In orer

More information

PART 2. Organization Of An Operating System

PART 2. Organization Of An Operating System PART 2 Organization Of An Operating System CS 503 - PART 2 1 2010 Services An OS Supplies Support for concurrent execution Facilities for process synchronization Inter-process communication mechanisms

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

CMSC 430 Introduction to Compilers. Spring Register Allocation

CMSC 430 Introduction to Compilers. Spring Register Allocation CMSC 430 Introuction to Compilers Spring 2016 Register Allocation Introuction Change coe that uses an unoune set of virtual registers to coe that uses a finite set of actual regs For ytecoe targets, can

More information

Change Patterns and Change Support Features in Process-Aware Information Systems

Change Patterns and Change Support Features in Process-Aware Information Systems hange Patterns an hange Support eatures in -Aware Information Systems arbara Weber 1,, Stefanie Rinerle 2, an Manfre Reichert 3 1 Quality ngineering Research Group, University of Innsbruck, Austria arbara.weber@uibk.ac.at

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

Efficient and Scalable Sequence-Based XML Filtering

Efficient and Scalable Sequence-Based XML Filtering Efficient an Scalale Sequence-Base XML Filtering Mariam Salloum University of California, Riversie, CA, USA msalloum@cs.ucr.eu ABSTRACT The uiquitous aoption of XML as the stanar of ata exchange over the

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

From an Abstract Object-Oriented Model to a Ready-to-Use Embedded System Controller

From an Abstract Object-Oriented Model to a Ready-to-Use Embedded System Controller From an Abstract Object-Oriente Moel to a Reay-to-Use Embee System Controller Stanislav Chachkov, Diier Buchs Software Engineering Laboratory, Swiss Feeral Institute for Technology 1015 Lausanne, Switzerlan

More information

Adjacency Matrix Based Full-Text Indexing Models

Adjacency Matrix Based Full-Text Indexing Models 1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Fast Fractal Image Compression using PSO Based Optimization Techniques

Fast Fractal Image Compression using PSO Based Optimization Techniques Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting

More information

Finite Automata Implementations Considering CPU Cache J. Holub

Finite Automata Implementations Considering CPU Cache J. Holub Finite Automata Implementations Consiering CPU Cache J. Holub The finite automata are mathematical moels for finite state systems. More general finite automaton is the noneterministic finite automaton

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,

More information

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times Algorithm for Intermoal Optimal Multiestination Tour with Dynamic Travel Times Neema Nassir, Alireza Khani, Mark Hickman, an Hyunsoo Noh This paper presents an efficient algorithm that fins the intermoal

More information

Advanced method of NC programming for 5-axis machining

Advanced method of NC programming for 5-axis machining Available online at www.scienceirect.com Proceia CIRP (0 ) 0 07 5 th CIRP Conference on High Performance Cutting 0 Avance metho of NC programming for 5-axis machining Sergej N. Grigoriev a, A.A. Kutin

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Enabling Rollback Support in IT Change Management Systems

Enabling Rollback Support in IT Change Management Systems Enabling Rollback Support in IT Change Management Systems Guilherme Sperb Machao, Fábio Fabian Daitx, Weverton Luis a Costa Coreiro, Cristiano Bonato Both, Luciano Paschoal Gaspary, Lisanro Zambeneetti

More information

JigCell Model Connector: building large molecular network models from components

JigCell Model Connector: building large molecular network models from components Simulation Applications JigCell Moel Connector: builing large molecular network moels from components Simulation: Transactions of the Society for Moeling an Simulation International 2018, Vol. 94(11) 993

More information

Experion PKS R500 Migration Planning Guide

Experion PKS R500 Migration Planning Guide Experion PKS R500 Migration Planning Guie EPDOC-XX70-en-500E May 2018 Release 500 Document Release Issue Date EPDOC-XX70- en-500e 500 0 May 2018 Disclaimer This ocument contains Honeywell proprietary information.

More information

Handling missing values in kernel methods with application to microbiology data

Handling missing values in kernel methods with application to microbiology data an Machine Learning. Bruges (Belgium), 24-26 April 2013, i6oc.com publ., ISBN 978-2-87419-081-0. Available from http://www.i6oc.com/en/livre/?gcoi=28001100131010. Hanling missing values in kernel methos

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

Modifying ROC Curves to Incorporate Predicted Probabilities

Modifying ROC Curves to Incorporate Predicted Probabilities Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Politecnico i Torino Porto Institutional Repository [Proceeing] Automatic March tests generation for multi-port SRAMs Original Citation: Benso A., Bosio A., i Carlo S., i Natale G., Prinetto P. (26). Automatic

More information

DEVELOPMENT OF DamageCALC APPLICATION FOR AUTOMATIC CALCULATION OF THE DAMAGE INDICATOR

DEVELOPMENT OF DamageCALC APPLICATION FOR AUTOMATIC CALCULATION OF THE DAMAGE INDICATOR Mechanical Testing an Diagnosis ISSN 2247 9635, 2012 (II), Volume 4, 28-36 DEVELOPMENT OF DamageCALC APPLICATION FOR AUTOMATIC CALCULATION OF THE DAMAGE INDICATOR Valentina GOLUBOVIĆ-BUGARSKI, Branislav

More information

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks Optimal Routing an Scheuling for Deterministic Delay Tolerant Networks Davi Hay Dipartimento i Elettronica olitecnico i Torino, Italy Email: hay@tlc.polito.it aolo Giaccone Dipartimento i Elettronica olitecnico

More information

Spanheight, A Natural Extension of Bandwidth and Treedepth

Spanheight, A Natural Extension of Bandwidth and Treedepth Master s Thesis Spanheight, A Natural Extension of Banwith an Treeepth Author: N. van Roen Supervisor: Prof. r. Hans. L. Bolaener A thesis sumitte in fulfilment of the requirements for the egree of Master

More information

A Plane Tracker for AEC-automation Applications

A Plane Tracker for AEC-automation Applications A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)

More information

Image compression predicated on recurrent iterated function systems

Image compression predicated on recurrent iterated function systems 2n International Conference on Mathematics & Statistics 16-19 June, 2008, Athens, Greece Image compression preicate on recurrent iterate function systems Chol-Hui Yun *, Metzler W. a an Barski M. a * Faculty

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Proving Vizing s Theorem with Rodin

Proving Vizing s Theorem with Rodin Proving Vizing s Theorem with Roin Joachim Breitner March 25, 2011 Proofs for Vizing s Theorem t to be unwiely unless presente in form a constructive algorithm with a proof of its correctness an termination.

More information

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.

More information

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure

More information

Chapter 9 Memory Management

Chapter 9 Memory Management Contents 1. Introuction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threas 6. CPU Scheuling 7. Process Synchronization 8. Dealocks 9. Memory Management 10.Virtual Memory

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

d 3 d 4 d d d d d d d d d d d 1 d d d d d d

d 3 d 4 d d d d d d d d d d d 1 d d d d d d Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

Kinematic Analysis of a Family of 3R Manipulators

Kinematic Analysis of a Family of 3R Manipulators Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,

More information

NAND flash memory is widely used as a storage

NAND flash memory is widely used as a storage 1 : Buffer-Aware Garbage Collection for Flash-Base Storage Systems Sungjin Lee, Dongkun Shin Member, IEEE, an Jihong Kim Member, IEEE Abstract NAND flash-base storage evice is becoming a viable storage

More information

MODULE VII. Emerging Technologies

MODULE VII. Emerging Technologies MODULE VII Emerging Technologies Computer Networks an Internets -- Moule 7 1 Spring, 2014 Copyright 2014. All rights reserve. Topics Software Define Networking The Internet Of Things Other trens in networking

More information

PART 5. Process Coordination And Synchronization

PART 5. Process Coordination And Synchronization PART 5 Process Coorination An Synchronization CS 503 - PART 5 1 2010 Location Of Process Coorination In The Xinu Hierarchy CS 503 - PART 5 2 2010 Coorination Of Processes Necessary in a concurrent system

More information

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which

More information

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

TREE SPECIES CLASSIFICATION USING RADIOMETRY, TEXTURE AND SHAPE BASED FEATURES

TREE SPECIES CLASSIFICATION USING RADIOMETRY, TEXTURE AND SHAPE BASED FEATURES TREE SPECIES CLASSIFICATIO USIG RADIOMETRY, TEXTURE AD SHAPE BASED FEATURES Maria S. Kulikova 1, Meena Mani 1, Anuj Srivastava 2, Xavier Descomes 1, Josiane Zeruia 1 1 Ariana Research Group, IRIA/I3S 06902

More information

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -

More information

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative

More information

More Raster Line Issues. Bresenham Circles. Once More: 8-Pt Symmetry. Only 1 Octant Needed. Spring 2013 CS5600

More Raster Line Issues. Bresenham Circles. Once More: 8-Pt Symmetry. Only 1 Octant Needed. Spring 2013 CS5600 Spring 03 Lecture Set 3 Bresenham Circles Intro to Computer Graphics From Rich Riesenfel Spring 03 More Raster Line Issues Fat lines with multiple pixel with Symmetric lines n point geometry how shoul

More information

Variable Independence and Resolution Paths for Quantified Boolean Formulas

Variable Independence and Resolution Paths for Quantified Boolean Formulas Variable Inepenence an Resolution Paths for Quantifie Boolean Formulas Allen Van Geler http://www.cse.ucsc.eu/ avg University of California, Santa Cruz Abstract. Variable inepenence in quantifie boolean

More information

A MIMO Fuzzy Controller for tracking: Robot control. Carl Crane Professor, Mechanical Engineering University of Florida Gainesville, FL 32611

A MIMO Fuzzy Controller for tracking: Robot control. Carl Crane Professor, Mechanical Engineering University of Florida Gainesville, FL 32611 A MIMO Fuzzy Controller for tracking: Robot control Paul A.C. Mason Assistant Professor, Kevin Walchko Research Assistant Carl Crane Professor, Mechanical Engineering University of Floria Gainesville,

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Automation of Bird Front Half Deboning Procedure: Design and Analysis

Automation of Bird Front Half Deboning Procedure: Design and Analysis Automation of Bir Front Half Deboning Proceure: Design an Analysis Debao Zhou, Jonathan Holmes, Wiley Holcombe, Kok-Meng Lee * an Gary McMurray Foo Processing echnology Division, AAS Laboratory, Georgia

More information

ACE: And/Or-parallel Copying-based Execution of Logic Programs

ACE: And/Or-parallel Copying-based Execution of Logic Programs ACE: An/Or-parallel Copying-base Execution of Logic Programs Gopal GuptaJ Manuel Hermenegilo* Enrico PontelliJ an Vítor Santos Costa' Abstract In this paper we present a novel execution moel for parallel

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

Animated Surface Pasting

Animated Surface Pasting Animate Surface Pasting Clara Tsang an Stephen Mann Computing Science Department University of Waterloo 200 University Ave W. Waterloo, Ontario Canaa N2L 3G1 e-mail: clftsang@cgl.uwaterloo.ca, smann@cgl.uwaterloo.ca

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Verifying performance-based design objectives using assemblybased vulnerability

Verifying performance-based design objectives using assemblybased vulnerability Verying performance-base esign objectives using assemblybase vulnerability K.A. Porter Calornia Institute of Technology, Pasaena, Calornia, USA A.S. Kiremijian Stanfor University, Stanfor, Calornia, USA

More information

Fuzzy Learning Variable Admittance Control for Human-Robot Cooperation

Fuzzy Learning Variable Admittance Control for Human-Robot Cooperation Fuzzy Learning ariable Amittance Control for Human-Robot Cooperation Fotios Dimeas an Nikos Aspragathos Abstract This paper presents a metho for variable amittance control in human-robot cooperation tasks,

More information

Rough Set Approach for Classification of Breast Cancer Mammogram Images

Rough Set Approach for Classification of Breast Cancer Mammogram Images Rough Set Approach for Classification of Breast Cancer Mammogram Images Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative Methos an Information Systems

More information

On the Energy Efficiency of Content Delivery Architectures

On the Energy Efficiency of Content Delivery Architectures On the Energy Efficiency of Delivery Architectures Kyle Guan, Gary Atkinson, an Daniel C. Kilper Bell Las, Acatel-Lucent, 79 Holmel Roa, Holmel, NJ 07733 Ece Gulsen MIT, 77 Mass. Ave., Camrige, MA 039

More information

A new fuzzy visual servoing with application to robot manipulator

A new fuzzy visual servoing with application to robot manipulator 2005 American Control Conference June 8-10, 2005. Portlan, OR, USA FrA09.4 A new fuzzy visual servoing with application to robot manipulator Marco A. Moreno-Armenariz, Wen Yu Abstract Many stereo vision

More information

MODULE V. Internetworking: Concepts, Addressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, And End-To-End Services

MODULE V. Internetworking: Concepts, Addressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, And End-To-End Services MODULE V Internetworking: Concepts, Aressing, Architecture, Protocols, Datagram Processing, Transport-Layer Protocols, An En-To-En Services Computer Networks an Internets -- Moule 5 1 Spring, 2014 Copyright

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

CONSTRUCTION AND ANALYSIS OF INVERSIONS IN S 2 AND H 2. Arunima Ray. Final Paper, MATH 399. Spring 2008 ABSTRACT

CONSTRUCTION AND ANALYSIS OF INVERSIONS IN S 2 AND H 2. Arunima Ray. Final Paper, MATH 399. Spring 2008 ABSTRACT CONSTUCTION AN ANALYSIS OF INVESIONS IN S AN H Arunima ay Final Paper, MATH 399 Spring 008 ASTACT The construction use to otain inversions in two-imensional Eucliean space was moifie an applie to otain

More information

MODULE II. Network Programming And Applications

MODULE II. Network Programming And Applications MODULE II Network Programming An Applications Computer Networks an Internets -- Moule 2 1 Spring, 2014 Copyright 2014. All rights reserve. Topics Internet services an communication paraigms Client-server

More information

Overlap Interval Partition Join

Overlap Interval Partition Join Overlap Interval Partition Join Anton Dignös Department of Computer Science University of Zürich, Switzerlan aignoes@ifi.uzh.ch Michael H. Böhlen Department of Computer Science University of Zürich, Switzerlan

More information

New Geometric Interpretation and Analytic Solution for Quadrilateral Reconstruction

New Geometric Interpretation and Analytic Solution for Quadrilateral Reconstruction New Geometric Interpretation an Analytic Solution for uarilateral Reconstruction Joo-Haeng Lee Convergence Technology Research Lab ETRI Daejeon, 305 777, KOREA Abstract A new geometric framework, calle

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

Optimization of cable-stayed bridges with box-girder decks

Optimization of cable-stayed bridges with box-girder decks Avances in Engineering Software 31 (2000) 417 423 www.elsevier.com/locate/avengsoft Optimization of cable-staye briges with box-girer ecks L.M.C. Simões*, J.H.J.O. Negrão Department of Civil Engineering,

More information

Design Management Using Dynamically Defined Flows

Design Management Using Dynamically Defined Flows Design Management Using Dynamically Deine Flows Peter R. Sutton*, Jay B. Brockman** an Stephen W. Director* *Department o Electrical an Computer Engineering, Carnegie Mellon University, Pittsburgh, PA

More information

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly

More information

Design of Policy-Aware Differentially Private Algorithms

Design of Policy-Aware Differentially Private Algorithms Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft

More information

The Berlin Airlift ( ) was an operation by the United States and Great. Linear Programming. Preview Exercises

The Berlin Airlift ( ) was an operation by the United States and Great. Linear Programming. Preview Exercises 790 Chapter 7 Sstems of Equations an Inequalities 108. The reason that sstems of linear inequalities are appropriate for moeling health weight is ecause guielines give health weight ranges, rather than

More information

PAPER. 1. Introduction

PAPER. 1. Introduction IEICE TRANS. COMMUN., VOL. E9x-B, No.8 AUGUST 2010 PAPER Integrating Overlay Protocols for Proviing Autonomic Services in Mobile A-hoc Networks Panagiotis Gouvas, IEICE Stuent member, Anastasios Zafeiropoulos,,

More information

Depth Sizing of Surface Breaking Flaw on Its Open Side by Short Path of Diffraction Technique

Depth Sizing of Surface Breaking Flaw on Its Open Side by Short Path of Diffraction Technique 17th Worl Conference on Nonestructive Testing, 5-8 Oct 008, Shanghai, China Depth Sizing of Surface Breaking Flaw on Its Open Sie by Short Path of Diffraction Technique Hiroyuki FUKUTOMI, Shan LIN an Takashi

More information

Workflow : Patterns and Specifications

Workflow : Patterns and Specifications Workflow : Patterns and Specifications Seminar Presentation by Ahana Pradhan Under the guidance of Prof. Rushikesh K. Joshi Department of Computer Science and Engineering Indian Institute of Technology,

More information

Fault Simulation with Parallel Critical Path Tracing for Combinational Circuits Using Structurally Synthesized BDDs

Fault Simulation with Parallel Critical Path Tracing for Combinational Circuits Using Structurally Synthesized BDDs Fault Simulation with Parallel Critical Path Tracing for Combinational Circuits Using Structurall Snthesize BDDs Sergei Devaze, Jaan Rai, Artur Jutman, Raimun Ubar Tallinn Universit of Technolog, Estonia

More information

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples

More information