A CLUSTERING-BASED HYBRID REPLICA CONTROL PROTOCOL FOR HIGH AVAILABILITY IN GRID ENVIRONMENT

Size: px
Start display at page:

Download "A CLUSTERING-BASED HYBRID REPLICA CONTROL PROTOCOL FOR HIGH AVAILABILITY IN GRID ENVIRONMENT"

Transcription

1 Journal of Computer Science 10 (12): , 2014 ISSN: R. Latip et al., Thi open acce article i ditributed under a Creative Common Attribution (CC-BY) 3.0 licene doi: /jcp Publihed Online 10 (12) 2014 ( A CLUSTERING-BASED HYBRID REPLICA CONTROL PROTOCOL FOR HIGH AVAILABILITY IN GRID ENVIRONMENT 1 Rohaya Latip, 1 Zulaile Mabni, 2 Hamidah Ibrahim, 1 Azizol Abdullah, 1 Manida Huin 1 Department of Communication Technology and Network, Faculty of Computer Science and Information Technology, Univerity Putra Malayia, Serdang, Selangor, Malayia 2 Department of Computer Science, Faculty of Computer Science and Information Technology, Univerity Putra Malayia, Serdang, Selangor, Malayia Received ; Revied ; Accepted ABSTRACT In recent year, with the emergence of grid computing ytem, the number of ditributed ite ha become very large. When thouand of ite involved in a grid computing ytem, data replication can improve data availability, communication cot and provide fault-tolerance in the ytem. In the literature, many replica control protocol have been propoed for managing replicated data. However, in large cale ditributed ytem, mot of thee protocol till require a bigger number of replica for maintaining conitency, thu degrade the performance of the protocol. Therefore, in thi tudy, we propoed a new replica control protocol named Clutering-Baed Hybrid (CBH) protocol. CBH protocol employ a hybrid replication trategy by combining the advantage of two common replica control protocol into one to improve the performance of the exiting protocol. We analyzed the communication cot and availability of the operation and compare CBH protocol with recently propoed replica control protocol named Dynamic Hybrid (DH) protocol. A imulation model wa developed uing Java to evaluate CBH protocol. Our reult how that the propoed protocol provide lower communication cot and higher data availability than DH protocol. Keyword: Replica Control Protocol, Data Replication, Data Availability, Communication Cot 1. INTRODUCTION A grid i a very large cale ditributed network computing ytem that i deigned to provide reliable acce to data and computational reource over a wide area network and acro organizational domain (Foter et al., 2001; Krauter et al., 2002). In a largecale ditributed ytem and dynamic network uch a grid, data replication ha been implemented to provide high availability, fault tolerance and increae the performance of the ytem (Lamehamedi et al., 2002; a technique of creating multiple copie of data item at ditributed ite. However, ome iue arie in dealing with replication of data. A major iue with replication i maintaining conitency of the replica (Belalem and Slimani, 2006; Yang et al., 2007; Radi et al., 2008). When data are replicated at everal ite, a conitency control protocol mut be enforced to enure the conitent view of the data. Other iue i communication cot where, in general, a the ytem ize grow, the cot of executing operation in replicated databae increae ince many replica may need to be Latip et al., 2008; Mabni and Latip, 2011). Replication i acceed for maintaining the conitency of the replica Correponding Author: Rohaya Latip, Department of Communication Technology and Network, Faculty of Computer Science and Information Technology, Univerity Putra Malayia, Serdang, Selangor, Malayia 2442

2 (Choi and Youn, 2012). The availability of a data on a large network i another iue (Lamehamedi et al., 2002; Lamehamedi et al., 2003; Latip et al., 2009) becaue geographically it i ditributed and ha different databae management to hare acro the grid network. In a ditributed ytem, copie or replica of an object may be tored at everal ite in the network. Thee multiple copie of an object mut appear a a ingle logical object to the tranaction which i known a one-copy equivalence (Berntein and Goodman, 1984). Two operation which are read and are allowed on replicated data. A Read Quorum (RQ) or Write Quorum (WQ) i defined a a et of copie that i ufficient to execute the read or operation. The election of a quorum mut atify the quorum interection property to enure one-copy equivalence among the replica and maintain their conitent tate. The property tated that for any two operation o[x] and o [x] on an object x, where at leat one of them i a, the quorum mut have a nonempty interection (Gifford, 1979). Thu, the baic property employed in maintaining conitency of replicated data i to require conflicting operation to lock at leat one common copy and thi i enforced by the replica control protocol. In recent year, with the emergence of grid computing ytem, the number of ditributed node ha become very large. However, in large cale ytem, mot of the earlier replica control protocol till require a bigger number of replica for read and operation, thu degrade the performance of the protocol. The degradation of performance i due to the conitency enforcement where a large number of replica mut be acceed through the wide area network. In thi tudy, we propoe a new replica control protocol called Clutering-Baed Hybrid (CBH) protocol for grid environment. The propoed protocol employ a hybrid replication trategy by combining the advantage of two common replica control protocol into one to improve the performance of earlier protocol. The propoed protocol group node into cluter and organize thee cluter into a tree tructure which enable the protocol to minimize the number of replica for read or operation a well a reduce the communication cot and provide high availability. 2. RELATED WORKS Thi ection decribe the related work in replica control protocol. They differ from each other mainly in the number of replica involved in performing the read and operation. Thee protocol have atified the quorum interection property to enure one-copy equivalence among the replica and maintain their conitent tate Primary Copy Protocol Primary Copy (PC) protocol i a imple algorithm that deignate one copy of a data object a primary copy (Stonebraker, 1979; Ahamad et al., 1992; Zhou and Holme, 1999). The node that maintain the primary copy of the data object i therefore reponible for maintaining conitency of the object. Any other node that maintain a non-primary copy i known a a lave copy. A read and operation are executed only at the primary copy. For the operation, once the primary copy i updated, it will be propagated out to all the node that maintain the lave copie. The communication cot for read and operation are low becaue only one replica i acceed by the operation. The advantage of thi protocol i that it i eay to implement a compared to other protocol and it i one of the mot widely implemented replication technique. However, it ha a limitation where, if the node that maintain a primary copy fail, then an update operation can no longer be performed until the node become available again Ree Quorum Protocol Agrawal and Abbadi (1990) propoed the Tree Quorum (TQ) protocol, which i baed on a logical tree tructure over a network (Agrawal and Abbadi, 1990). Figure 1 illutrate the diagram of a tree quorum tructure with thirteen copie in a tree of height = 2 and degree of node D = 3, where every copy repreent a replica. In thi protocol, a read quorum conit of the root replica. If the root i inacceible, then majority replica of it children are added a member of thi quorum. Furthermore, for every inacceible replica, majority replica of it children are added a member and o forth. The example of valid read quorum of Fig. 1 are 1} and {2,3} when root replica i inacceible and {5,6,8,9} when replica-2 and replica-3 are inacceible. On the other hand, a quorum i contructed by having a it member the root and any majority replica of the root children and any majority replica of their children and o forth until the leave are reached. Figure 1, the example of valid quorum are {1,2,3,5,6,8,9} and {1,3,4,9,10,11,12}. The trength of thi protocol i that read operation may acce only one replica. Thu, thi protocol allow very low read cot in the bet cae. However, it ha ome drawback uch a, a the level of the tree increae, the number of replica grow rapidly, thu increae the communication cot. 2443

3 3. THE PROPOSED PROTOCOL Fig. 1. A tree organization of 13 copie of data object (Agrawal and Abbadi, 1990) 2.3. Dynamic Hybrid Protocol A recently propoed hybrid replica control protocol i Dynamic Hybrid (DH) protocol (Choi and Youn, 2012). Thi protocol combine the grid and tree tructure o that the overall topology can be flexibly adjuted uing the tree height, number of decendant and grid depth. Figure 2 illutrate the network of Dynamic Hybrid protocol with 31 replica in (3,3,2) topology, where the three argument are repreenting the height h, number of decendant and grid depth g repectively. In the tree tructure of height h, the read operation read the root replica or the decendant of the root replica if the root i not available. The decendant of the root erve a the new root replica of the ub tree. The proce i repeated until level h-1 i reached. Furthermore, in the grid network of depth g, read operation read replica or go to the next level if one of the replica i not available. Thu, the read cot i only 1, if the root replica i available. The example of valid read quorum of Fig. 2 are {R0} and {R1, R2, R3} and {R2, R3, R4, R5, R6}. Meanwhile, the operation read the root replica, one replica of the root decendant, one replica of thee previouly elected replica decendant and o forth until the leave are reached. Furthermore, in the grid network of depth g, operation read only one replica in each level down to the lat level. Figure 2, the example of valid quorum are {R0, R1, R4, R13, R22} and {R0, R2, R7, R16, R27}. The trength of thi protocol i that it capitalize the merit of tree and grid protocol to allow low operation cot and high availability. However, thi protocol ha drawback where, a the network ize grow, large number of replica till need to be acceed to maintain data conitency and therefore, degrade the performance of the ytem. In thi ection, we preent the ytem model and algorithm for the propoed protocol called Clutering-Baed Hybrid (CBH) Protocol. In thi tudy, the term a number of node and a number of ite will be ued interchangeably Sytem Model The ytem conit of N ite that communicate with each other by ending meage over a communication network. We aumed that ite fail independently and communication link do not fail to deliver meage. In CBH protocol, the N ite in the network are logically grouped into everal noninterecting group. For the purpoe of illutration we hall divide the N ite into N dijoint group with each group having approximately N ite. Each group i called a cluter. Thee cluter are logically organized a a tree of height h and decendant. We defined the node in the tree to be a equence of cluter C 0, C 1, C i, C i+1, C n. We aume that the node in each cluter are logically organized into two dimenional grid tructure. For example, if CBH protocol conit of 81 node, it will be divided into 9 cluter with 9 node in each cluter. The node in each cluter will be logically organized in the form of 3 3 grid. Figure 3, an example of a ternary tree of height = 2 with 81 node i preented. Each cluter deignate the middle node of the cluter a the cluter head which i colored in black in Fig. 3 and ha the replica or primary copy of the data object. The center of the cluter i elected becaue it i the hortet path to get a copy of the data from mot of the direction in the cluter Propoed Algorithm Here, we decribe the hybrid trategy of CBH protocol, where it combine the advantage of two common replica control protocol namely Tree Quorum (TQ) protocol and Primary Copy (PC) protocol. Figure 3, we how a ytem with 81 node for which we ue TQ protocol on top of PC protocol a the replication trategy. In order to implify the decription, we aumed that every replica i aigned exactly one vote. Figure 3 how a ytem with 81 node where the nine cluter named C 0, C 1,,C 8 are logical replica which are managed by uing TQ protocol. The logical replica C 0 erve a the root cluter, wherea the logical replica C 1,,C 8 are it decendant. Each logical replica contain a cluter of phyical node with one middle node called phyical replica which ha the replica or primary copy of the data object. 2444

4 Fig. 2. A network for Dynamic Hybrid protocol of 31 replica in (3, 3, 2) topology (Choi and Youn, 2012) Fig. 3. Sytem Model of CBH in a ternary tree of height = 2 with 81 node The phyical replica in the root cluter C 0 i called root replica. Thu, for a ytem with N node, there will be N cluter and N replica. To illutrate the algorithm, the replication trategy involve two trategie: Local Replication, where PC protocol i ued for the replication trategy for managing the phyical replica within a cluter and Global Replication, where TQ protocol i ued a the replication trategy for managing the logical replica between cluter Read Operation A read operation according to TQ protocol, which i ued a the global replication, can be performed by reading the root replicac 0 if C 0 i acceible or if the root replica i inacceible then majority replica of it children are added a member of thi quorum. Furthermore, for every inacceible replica, majority replica of it children are added a member and o forth. In CBH protocol, a logical replica i available for a read operation if a read operation can be performed on the phyical replica which it contain, uing the applied local replication trategy which i PC protocol. Thi mean that the precondition for reading a logical replica i a read quorum of RQ = 1 if it contained phyical replica i acceible for read operation. Thu, in Fig. 3, auming that the root replica i acceible, by employing TQ Protocol, thi lead to a minimal read cot of 1. However, if the root replica i not available, then the majority replica of it children have to be acceed which reult in the read cot of 2. The example of valid read quorum of Fig. 3 are {C 0 } and {C 1, C 2 } if the root replica i not available Write Operation A operation according to TQ protocol, which i ued a the global replication, can be performed by reading the root replicac 0 and any majority replica of the root children and any majority replica of their children and o forth until the leave are reached. In CBH protocol, a logical replica i available for a operation if a operation can be performed on the phyical replica which it contain, uing the applied local replication trategy which i PC protocol. Thi mean that the precondition for writing a logical replica i a quorum of WQ = 1 if it contained phyical replica i acceible for operation. Thu, in Fig. 3, auming that the root replica i acceible, a operation performed on a logical replica require WQ = 1 of it phyical replica. Thu, by employing TQ protocol, we obtain a cot of 7. An example of valid quorum of Fig. 3 i {C 0, C 1, C 2, C 4, C 5, C 7, C 8 } Correctne of CBH Algorithm Here, we demontrate that the read and quorum contructed by the CBH protocol will alway have a non-empty interection. Theorem The CBH protocol guarantee the interection of read and quorum. Proof = The proof i by induction on the height of the tree. 2445

5 Bai = The theorem hold for a tree of height zero, ince there i only one phyical replica in the tree. Induction Hypothee = Aume that the theorem hold for a tree of height h. Induction Step = Conider a tree of height h + 1. The Read Quorum (RQ) and Write Quorum (WQ) contructed for thi tree will be of the following form: RQ = {Root Replica} or {Majority of phyical replica of ub tree of height h} WQ = {Root Replica} and {Majority of phyical replica of ub tree of height h} If a read quorum conit of the root replica of the tree, it i guaranteed to have a nonempty interection with any quorum ince a root replica mut be acceed in any quorum. On the other hand, if the read quorum conit of a majority of phyical replica for ub tree of height h, it i guaranteed to have at leat one ub tree in common with any quorum. Since the ub tree are of height h, the induction hypothei guarantee that read and quorum will have a non-empty interection. Hence, by induction, the CBH protocol guarantee non-empty interection between read and quorum. Therefore, for the propoed CBH, the read/ conflict can be guaranteed to be detected becaue a read operation lock the root replica while a operation lock the root replica and majority of phyical replica of the decendant. A for the conflict between two operation, it can be guaranteed to be detected ince any two operation have to hare the root replica. For example, in Fig. 3, valid RQ are {C 0 } and {C 1, C 2 }, wherea, valid WQ i {C 0, C 1, C 2, C 4, C 5, C 7, C 8 }. Note that C 1 i included in both the valid RQ and WQ for detecting read/ conflict. 4. PERFORMANCE ANALYSIS AND COMPARISON A imulation model wa developed uing Java to validate CBH protocol. In thi ection, we evaluate and compare the performance which are read and communication cot and data availability of CBH and DH protocol Cot Analyi The communication cot of an operation i computed baed on the number of replica involved in the read or operation. The read operation of DH protocol need to acce only the root replica which i very effective if the root replica i available. The minimum read cot C read i Equation 1: min( C read ) = 1 (1) And the cot C that depend on the value of h and g i Equation 2: C = h g (2) On the other hand, for CBH protocol, the communication cot i etimated baed on the TQ protocol a given in (Chung, 1994), where h denote the height of the tree, D i the degree of logical replica in the tree and M i the majority of D where Equation 3: M D + 1 = 2 (3) Therefore, for a tree of height h, the maximum quorum ize i M h and the communication cot for read operation C CBH, R i in the range of 1 C CBH, R M h. Meanwhile, the communication cot for operation C CBH, W i given in Equation 4: i CCBH, W = M (4) where, i = 0,,h. For the read communication cot, both CBH and DH protocol have the ame minimum read cot of 1, which i achieved by acceing only the root replica of the tree if the root replica i acceible. Table 1 and Fig. 4 illutrate the communication cot of CBH and DH protocol for an example ytem with different total number of node, n = 81, 121, 225 and 289. Here, the protocol have the ame number of decendant which i 3 but they differ in their height baed on the number of node. A an example, for 121 node in the ytem, DH protocol i baed on height of 4 and grid depth of 3 which i configured in (4,3,3) topology and CBH i baed on height of 2. For the operation a illutrated in Table 1 and Fig. 4, it i apparent that the overall communication cot for CBH protocol i lower than that of DH protocol. It can be een that CBH need to acce only 9 replica on 225 copie for the operation. On the other hand, for DH with 225 copie, the number of replica that need to be acceed for performing operation i 11. The reult in Fig. 4 how that the average cot for CBH i 8.0 and DH i 9.5. Thu, CBH ha reduced the average cot by up to 15.8% compared to DH. 2446

6 Thu, the overall availability of operation for DH i a given in Equation 8: = k With ( l) k p ( ) 1 k 1 ( l 1) k ( l 1) ( ) k = Where l = h 2 (0) k k G( l) p p ( 1 p). k 1 (8) Fig. 4. Comparion for the cot of the protocol with 81, 121, 225 and 289 node Table 1. Comparion for the cot of the protocol Number of node Protocol N = 81 N = 121 N = 225 N = 289 DH CBH On the other hand, for CBH protocol, the overall availability i obtained uing the combination of availability for PC protocol and TQ protocol. The availability of read operation of PC protocol i a given in Equation 9, where p i the probability of data file acceing between 0.1 to 0.9 and i i the increment of n. n = 1 n APC, R = p p = p i 1 i i n i n ( 1 ) 1 ( 1 ) (9) Thu, the CBH overall availability of read operation for a tree of height h + 1 i a given in Equation 10: 4.2. Availability Analyi In thi ection, we analyzed the read and availability of the protocol. In DH protocol, the overall availability i obtained uing the availability of tree and grid tructure. The availability of read operation of the grid tructure i a given in Equation 5: D D ACBH, R = A, ( 1, ) h 1 PC R + A + PC R i= M i A ( 1 ACBH R ) i CBH, R h, h With A = A CBH, R 0 PC, R D i (10) ( ) G( g 1) ( ) G g = p + 1 p. (5) read read Thu, the overall availability of read operation for DH protocol i a given in Equation 6: ( ) ( l) ( l 1) read p 1 p.( read ) = + with = wherel = h 1 (0) G( g) read read (6) The availability of operation of the grid tructure i a given in Equation 7: = k where, l = g 1 G( l ) k k G( l 1) p ap ( 1 p). k = 1 k p G(0) k = k = 1 ( 1 p ) k (7) The availability of operation of PC protocol i a given in Equation 11: n = 1 n APC, W = p p = p n i i ( 1 ) n i n 1 ( 1 ) (11) Thu, the CBH overall availability of operation for a tree of height h + 1 i a given in Equation 12: D A APC w A A With ( ) D i D i CBH, W =, 1 CBH, W 1 h+ h CBH, W h i= M i A = A CBH, W 0 PC, W (12) Figure 5 and 6 how the read and availability of CBH and DH protocol for 121 node repectively. We aume that all data copie have the ame availabilitie. 2447

7 logically grouped into everal noninterecting group called cluter and organized in a tree tructure. CBH protocol employ a hybrid replication trategy by combining the advantage of Primary Copy (PC) protocol and Tree Quorum (TQ) protocol to improve the performance of the exiting protocol. In CBH, by grouping the node into cluter and having only one replica in each cluter ha reulted in a mall number of replica involved in performing read and operation. The analyi of CBH protocol wa preented in term of communication cot and data availability. Compared to DH protocol, CBH require lower communication cot while providing higher read availability which i preferred for large cale ditributed ytem. Fig. 5. Comparion of read availability for 121 node 6. ACKNOWLEDGEMENT We wih to acknowledge the upport of Malayian Minitry of Science, Technology and Innovation (MOSTI) under the Fundamental Grant No: FR Author Contribution All author equally contributed in thi work Ethic Thi article i original and contain unpublihed material. The correponding author confirm that all of the other author have read and approved the manucript and no ethical iue involved. Fig. 6. Comparion of availability for 121 node Figure 5, we can ee that the read availability for CBH protocol i higher than DH protocol. Thi i due to CBH need only to acce mall number of replica for the read operation. The reult how that CBH protocol ha average of 16.8% higher for read availability compared to DH protocol for all probabilitie of data acceing. However, in cae of availability for 121 node, DH protocol i better than CBH protocol a illutrated in Fig CONCLUSION In thi tudy, a new replica control protocol named Clutering-Baed Hybrid (CBH) protocol ha been propoed for the management of replicated data in large cale ditributed ytem epecially in grid environment. In the propoed protocol, the N ite in the network are 7. REFERENCES Agrawal, D. and A. El Abbadi, The tree quorum protocol: An efficient approach for managing replicated data. Proceeding of the 16th International Conference on Very Large Databae, Aug , Bribane, Autralia, pp: DOI: / Ahamad, M., M.H. Ammar and S.Y. Cheung, Replicated data management in ditributed ytem. Read. Dit. Comput. Syt., DOI: Belalem, G. and Y. Slimani, A hybrid approach for conitency management in large cale ytem. Proceeding of the International Conference on Networking and Service, Jul , IEEE Xplore Pre, Slicon Valley, CA, pp: DOI: /ICNS Berntein, P.A. and N. Goodman, An algorithm for concurrency control and recovery in replicated ditributed databae. Tran. Databae Syt., 9: DOI: /

8 Choi, S.C. and H.Y. Youn, Dynamic hybrid replication effectively combining tree and grid topology. J. Supercomput. 59: DOI: / Chung, S.M., Enhanced tree quorum algorithm for replica control in ditributed databae ytem. Data Knowledge Eng., Elev., 12: DOI: / X(94) Foter, I., C. Keelman and S. Tuecke, The anatomy of the grid: Enabling calable virtual organization. Int. J. High Perform. Comput. Applic., 15: DOI: / Gifford, D.K., Weighted voting for replicated data. Proceeding of the 7th Sympoium on Operating Sytem Principle, (OSP 79), ACM, New York, pp: DOI: / Krauter, K., R. Buyya and M. Mahewaran, A taxanomy and urvey of grid reource management ytem for ditributed computing. Int. J. Software Practice Experience, 32: DOI: /pe.432 Lamehamedi, H., Z. Shentu and B. Syzmanki, Simulation of dynamic data replication trategie in data grid. Proceeding of the 17th International Sympoium on Parallel and Ditributed Proceing, Apr , IEEE Explore Pre, pp: DOI: /IPDPS Lamehamedi, H., B. Syzmanki, Z. Shentu and E. Deelman, Data replication in grid environment. Proceeding of the 5th International Conference on Algorithm and Architecture for Parallel Proceing, (APP 02), pp: DOI: Latip, R., H. Ibrahim, M. Othman, M.N. Sulaiman and A. Abdullah, High availability with Diagonal Replication in 2d Meh (DR2M) protocol for grid environment. J. Comput. Inform. Sci., 1: DOI: /ci.v1n2p95 Latip, R., H. Ibrahim, M. Othman, A. Abdullah and M.N. Sulaiman, Quorum-baed data replication in grid environment. Int. J. Comput. Intell. Syt., 2: DOI: /ijci Mabni, Z. and R. Latip, A comparative tudy on quorum-baed replica control protocol for grid environment. Springer Communicat. Comput. Inform. Sci., 253: DOI: / _32 Radi, M., A. Mamat, M. Mat Deri, H. Ibrahim and S. Subramaniam, Acce weight replica conitency protocol for large cale data grid. J. Comput. Sci. 4: DOI: /jcp Stonebraker, M., Concurrency control and conitency of multiple copie of data in ditributed Ingre. IEEE Tran. Software Eng., 5: DOI: /TSE Yang, C.T., W.C. Tai, T.T. Chen and C.H. Hu, A one-way file replica conitency model in data grid. Proceeding of the 2nd IEEE Aia-Pacific Service Computing Conference, Dec , IEEE Xplore Pre, Tukuba Science City, pp: DOI: /APSCC Zhou, W. and R. Holme, The deign and imulation of a hybrid replication control protocol. Proceeding of the 4th International Sympoium on Parallel Architecture, Algorithm and Network, Jun , IEEE Xplore Pre, Perth/Fremantle, WA, pp: DOI: /ISPAN

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.

Universität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart. Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut

More information

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications

DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu

More information

Routing Definition 4.1

Routing Definition 4.1 4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing

More information

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.

Key Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing. Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in

More information

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router

Distributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To

More information

Laboratory Exercise 6

Laboratory Exercise 6 Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two

More information

Minimum congestion spanning trees in bipartite and random graphs

Minimum congestion spanning trees in bipartite and random graphs Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu

More information

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong

A Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong 4th International Conference on Machinery, Material and Computing Technology (ICMMCT 2016) A Load Balancing Model baed on Load-aware for Ditributed Controller Fengjun Shang, Wenjuan Gong College of Compute

More information

Analyzing Hydra Historical Statistics Part 2

Analyzing Hydra Historical Statistics Part 2 Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the

More information

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage

LinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,

More information

Service and Network Management Interworking in Future Wireless Systems

Service and Network Management Interworking in Future Wireless Systems Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering

More information

How to Select Measurement Points in Access Point Localization

How to Select Measurement Points in Access Point Localization Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,

More information

Image authentication and tamper detection using fragile watermarking in spatial domain

Image authentication and tamper detection using fragile watermarking in spatial domain International Journal of Advanced Reearch in Computer Engineering & Technology (IJARCET) Volume 6, Iue 7, July 2017, ISSN: 2278 1323 Image authentication and tamper detection uing fragile watermarking

More information

Edits in Xylia Validity Preserving Editing of XML Documents

Edits in Xylia Validity Preserving Editing of XML Documents dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,

More information

UC Berkeley International Conference on GIScience Short Paper Proceedings

UC Berkeley International Conference on GIScience Short Paper Proceedings UC Berkeley International Conference on GIScience Short Paper Proceeding Title A novel method for probabilitic coverage etimation of enor network baed on 3D vector repreentation in complex urban environment

More information

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking

Refining SIRAP with a Dedicated Resource Ceiling for Self-Blocking Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT

More information

Data Replication Model For Remote Procedure Call Transactions

Data Replication Model For Remote Procedure Call Transactions Data Replication Model For Remote Procedure Call Transactions MUSTAFA MAT DERIS, ALI MAMAT*, MISWAN SURIP, SAZALI KHALID Department of Information Systems, Faculty of Information Technology and Multimedia

More information

else end while End References

else end while End References 621-630. [RM89] [SK76] Roenfeld, A. and Melter, R. A., Digital geometry, The Mathematical Intelligencer, vol. 11, No. 3, 1989, pp. 69-72. Sklanky, J. and Kibler, D. F., A theory of nonuniformly digitized

More information

SLA Adaptation for Service Overlay Networks

SLA Adaptation for Service Overlay Networks SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada

More information

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks

Localized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de

More information

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata

[N309] Feedforward Active Noise Control Systems with Online Secondary Path Modeling. Muhammad Tahir Akhtar, Masahide Abe, and Masayuki Kawamata he 32nd International Congre and Expoition on Noie Control Engineering Jeju International Convention Center, Seogwipo, Korea, Augut 25-28, 2003 [N309] Feedforward Active Noie Control Sytem with Online

More information

On successive packing approach to multidimensional (M-D) interleaving

On successive packing approach to multidimensional (M-D) interleaving On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a

More information

Planning of scooping position and approach path for loading operation by wheel loader

Planning of scooping position and approach path for loading operation by wheel loader 22 nd International Sympoium on Automation and Robotic in Contruction ISARC 25 - September 11-14, 25, Ferrara (Italy) 1 Planning of cooping poition and approach path for loading operation by wheel loader

More information

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks

Performance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity

More information

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X

Topics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term

More information

The Association of System Performance Professionals

The Association of System Performance Professionals The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and

More information

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE

Keywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent

More information

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract

Karen L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial

More information

Dynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array

Dynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array Dynamically Reconfigurable Neuron Architecture for the Implementation of Self- Organizing Learning Array Januz A. Starzyk,Yongtao Guo, and Zhineng Zhu School of Electrical Engineering & Computer Science

More information

Lecture 14: Minimum Spanning Tree I

Lecture 14: Minimum Spanning Tree I COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce

More information

1 The secretary problem

1 The secretary problem Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.

More information

Multicast with Network Coding in Application-Layer Overlay Networks

Multicast with Network Coding in Application-Layer Overlay Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 1, JANUARY 2004 1 Multicat with Network Coding in Application-Layer Overlay Network Ying Zhu, Baochun Li, Member, IEEE, and Jiang Guo Abtract

More information

Advanced Encryption Standard and Modes of Operation

Advanced Encryption Standard and Modes of Operation Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES

More information

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 3, Iue 4, April 2015 International Journal Advance Reearch in Computer Science and Management Studie Reearch Article / Survey Paper / Cae Study Available online at: www.ijarcm.com

More information

Trainable Context Model for Multiscale Segmentation

Trainable Context Model for Multiscale Segmentation Trainable Context Model for Multicale Segmentation Hui Cheng and Charle A. Bouman School of Electrical and Computer Engineering Purdue Univerity Wet Lafayette, IN 47907-1285 {hui, bouman}@ ecn.purdue.edu

More information

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1

(12) Patent Application Publication (10) Pub. No.: US 2011/ A1 (19) United State US 2011 0316690A1 (12) Patent Application Publication (10) Pub. No.: US 2011/0316690 A1 Siegman (43) Pub. Date: Dec. 29, 2011 (54) SYSTEMAND METHOD FOR IDENTIFYING ELECTRICAL EQUIPMENT

More information

A note on degenerate and spectrally degenerate graphs

A note on degenerate and spectrally degenerate graphs A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove

More information

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS

A SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt

More information

Domain-Specific Modeling for Rapid System-Wide Energy Estimation of Reconfigurable Architectures

Domain-Specific Modeling for Rapid System-Wide Energy Estimation of Reconfigurable Architectures Domain-Specific Modeling for Rapid Sytem-Wide Energy Etimation of Reconfigurable Architecture Seonil Choi 1,Ju-wookJang 2, Sumit Mohanty 1, Viktor K. Praanna 1 1 Dept. of Electrical Engg. 2 Dept. of Electronic

More information

3D SMAP Algorithm. April 11, 2012

3D SMAP Algorithm. April 11, 2012 3D SMAP Algorithm April 11, 2012 Baed on the original SMAP paper [1]. Thi report extend the tructure of MSRF into 3D. The prior ditribution i modified to atify the MRF property. In addition, an iterative

More information

A Multi-objective Genetic Algorithm for Reliability Optimization Problem

A Multi-objective Genetic Algorithm for Reliability Optimization Problem International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR

More information

xy-monotone path existence queries in a rectilinear environment

xy-monotone path existence queries in a rectilinear environment CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of

More information

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS

A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh

More information

Chapter 13 Non Sampling Errors

Chapter 13 Non Sampling Errors Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption

More information

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights

Shortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two

More information

Delaunay Triangulation: Incremental Construction

Delaunay Triangulation: Incremental Construction Chapter 6 Delaunay Triangulation: Incremental Contruction In the lat lecture, we have learned about the Lawon ip algorithm that compute a Delaunay triangulation of a given n-point et P R 2 with O(n 2 )

More information

Keywords: Defect detection, linear phased array transducer, parameter optimization, phased array ultrasonic B-mode imaging testing.

Keywords: Defect detection, linear phased array transducer, parameter optimization, phased array ultrasonic B-mode imaging testing. Send Order for Reprint to reprint@benthamcience.ae 488 The Open Automation and Control Sytem Journal, 2014, 6, 488-492 Open Acce Parameter Optimization of Linear Phaed Array Tranducer for Defect Detection

More information

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz

Operational Semantics Class notes for a lecture given by Mooly Sagiv Tel Aviv University 24/5/2007 By Roy Ganor and Uri Juhasz Operational emantic Page Operational emantic Cla note for a lecture given by Mooly agiv Tel Aviv Univerity 4/5/7 By Roy Ganor and Uri Juhaz Reference emantic with Application, H. Nielon and F. Nielon,

More information

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline

Generic Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline Generic Travere CS 62, Lecture 9 Jared Saia Univerity of New Mexico Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v) from the bag if (v i unmarked) mark v; parent(v) = p;

More information

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks

Maneuverable Relays to Improve Energy Efficiency in Sensor Networks Maneuverable Relay to Improve Energy Efficiency in Senor Network Stephan Eidenbenz, Luka Kroc, Jame P. Smith CCS-5, MS M997; Lo Alamo National Laboratory; Lo Alamo, NM 87545. Email: {eidenben, kroc, jpmith}@lanl.gov

More information

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is

Today s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -

More information

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer

Analysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer International Reearch Journal of Applied and Baic Science 218 Available online at www.irjab.com ISSN 2251-838X / Vol, 12 (1): 49-53 Science Explorer Publication Analyi of the reult of analytical and imulation

More information

AUTOMATIC TEST CASE GENERATION USING UML MODELS

AUTOMATIC TEST CASE GENERATION USING UML MODELS Volume-2, Iue-6, June-2014 AUTOMATIC TEST CASE GENERATION USING UML MODELS 1 SAGARKUMAR P. JAIN, 2 KHUSHBOO S. LALWANI, 3 NIKITA K. MAHAJAN, 4 BHAGYASHREE J. GADEKAR 1,2,3,4 Department of Computer Engineering,

More information

An Approach to a Test Oracle for XML Query Testing

An Approach to a Test Oracle for XML Query Testing An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,

More information

Lecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization

Lecture Outline. Global flow analysis. Global Optimization. Global constant propagation. Liveness analysis. Local Optimization. Global Optimization Lecture Outline Global flow analyi Global Optimization Global contant propagation Livene analyi Adapted from Lecture by Prof. Alex Aiken and George Necula (UCB) CS781(Praad) L27OP 1 CS781(Praad) L27OP

More information

Embedding Service Function Tree with Minimum Cost for NFV Enabled Multicast

Embedding Service Function Tree with Minimum Cost for NFV Enabled Multicast 1 Embedding Service Function Tree with Minimum ot for NFV Enabled Multicat angbang Ren, Student Member, IEEE, eke Guo, Senior Member, IEEE, Yulong Shen, Member, IEEE, Guoming Tang, Member, IEEE, Xu Lin,

More information

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment

Increasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in

More information

Lessons Learned Migrating a Major Application to Exadata v2

Lessons Learned Migrating a Major Application to Exadata v2 Leon Learned Migrating a Major Application to Exadata v2 Oracle Open World 2010 Aaron Werman Bank of America aaron.werman@gmail.com Diclaimer All opinion are thoe of the author No endorement are intended:

More information

Kinematics Programming for Cooperating Robotic Systems

Kinematics Programming for Cooperating Robotic Systems Kinematic Programming for Cooperating Robotic Sytem Critiane P. Tonetto, Carlo R. Rocha, Henrique Sima, Altamir Dia Federal Univerity of Santa Catarina, Mechanical Engineering Department, P.O. Box 476,

More information

A Basic Prototype for Enterprise Level Project Management

A Basic Prototype for Enterprise Level Project Management A Baic Prototype for Enterprie Level Project Management Saurabh Malgaonkar, Abhay Kolhe Computer Engineering Department, Mukeh Patel School of Technology Management & Engineering, NMIMS Univerity, Mumbai,

More information

Development of an atmospheric climate model with self-adapting grid and physics

Development of an atmospheric climate model with self-adapting grid and physics Intitute of Phyic Publihing Journal of Phyic: Conference Serie 16 (2005) 353 357 doi:10.1088/1742-6596/16/1/049 SciDAC 2005 Development of an atmopheric climate model with elf-adapting grid and phyic Joyce

More information

Multi-Target Tracking In Clutter

Multi-Target Tracking In Clutter Multi-Target Tracking In Clutter John N. Sander-Reed, Mary Jo Duncan, W.B. Boucher, W. Michael Dimmler, Shawn O Keefe ABSTRACT A high frame rate (0 Hz), multi-target, video tracker ha been developed and

More information

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II

Distributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II IEEE INFOCO 2002 1 Ditributed Partial Information anagement (DPI) Scheme for Survivable Network - Part II Dahai Xu Chunming Qiao Department of Computer Science and Engineering State Univerity of New York

More information

/06/$ IEEE 364

/06/$ IEEE 364 006 IEEE International ympoium on ignal Proceing and Information Technology oie Variance Etimation In ignal Proceing David Makovoz IPAC, California Intitute of Technology, MC-0, Paadena, CA, 95 davidm@ipac.caltech.edu;

More information

The Comparison of Neighbourhood Set and Degrees of an Interval Graph G Using an Algorithm

The Comparison of Neighbourhood Set and Degrees of an Interval Graph G Using an Algorithm The Comparion of Neighbourhood Set and Degree of an Interval Graph G Uing an Algorithm Dr.A.Sudhakaraiah, K.Narayana Aitant Profeor, Department of Mathematic, S.V. Univerity, Andhra Pradeh, India Reearch

More information

How to. write a paper. The basics writing a solid paper Different communities/different standards Common errors

How to. write a paper. The basics writing a solid paper Different communities/different standards Common errors How to write a paper The baic writing a olid paper Different communitie/different tandard Common error Reource Raibert eay My grammar point Article on a v. the Bug in writing Clarity Goal Conciene Calling

More information

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1 US 2003O196031A1 (19) United State (12) Patent Application Publication (10) Pub. No.: US 2003/0196031 A1 Chen (43) Pub. Date: Oct. 16, 2003 (54) STORAGE CONTROLLER WITH THE DISK Related U.S. Application

More information

Optimal Multi-Robot Path Planning on Graphs: Complete Algorithms and Effective Heuristics

Optimal Multi-Robot Path Planning on Graphs: Complete Algorithms and Effective Heuristics Optimal Multi-Robot Path Planning on Graph: Complete Algorithm and Effective Heuritic Jingjin Yu Steven M. LaValle Abtract arxiv:507.0390v [c.ro] Jul 05 We tudy the problem of optimal multi-robot path

More information

Shortest Path Routing in Arbitrary Networks

Shortest Path Routing in Arbitrary Networks Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,

More information

Shortest Paths with Single-Point Visibility Constraint

Shortest Paths with Single-Point Visibility Constraint Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet

More information

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems

A System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem

More information

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit

Compressed Sensing Image Processing Based on Stagewise Orthogonal Matching Pursuit Senor & randucer, Vol. 8, Iue 0, October 204, pp. 34-40 Senor & randucer 204 by IFSA Publihing, S. L. http://www.enorportal.com Compreed Sening Image Proceing Baed on Stagewie Orthogonal Matching Puruit

More information

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu

CERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,

More information

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,

Hassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem, COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)

More information

A Handover Scheme for Mobile WiMAX Using Signal Strength and Distance

A Handover Scheme for Mobile WiMAX Using Signal Strength and Distance A Handover Scheme for Mobile WiMAX Uing Signal Strength and Ditance Mary Alatie, Mjumo Mzyece and Anih Kurien Department of Electrical Engineering/French South African Intitute of Technology (F SATI) Thwane

More information

Semi-Distributed Load Balancing for Massively Parallel Multicomputer Systems

Semi-Distributed Load Balancing for Massively Parallel Multicomputer Systems Syracue Univerity SUFAC lectrical ngineering and Computer Science echnical eport College of ngineering and Computer Science 8-1991 Semi-Ditributed Load Balancing for aively Parallel ulticomputer Sytem

More information

New Structural Decomposition Techniques for Constraint Satisfaction Problems

New Structural Decomposition Techniques for Constraint Satisfaction Problems New Structural Decompoition Technique for Contraint Satifaction Problem Yaling Zheng and Berthe Y. Choueiry Contraint Sytem Laboratory Univerity of Nebraka-Lincoln Email: yzheng choueiry@ce.unl.edu Abtract.

More information

CS201: Data Structures and Algorithms. Assignment 2. Version 1d

CS201: Data Structures and Algorithms. Assignment 2. Version 1d CS201: Data Structure and Algorithm Aignment 2 Introduction Verion 1d You will compare the performance of green binary earch tree veru red-black tree by reading in a corpu of text, toring the word and

More information

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks

Nearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks Nearly Contant Approximation for Data Aggregation Scheduling in Wirele Senor Network Scott C.-H. Huang, Peng-Jun Wan, Chinh T. Vu, Yinghu Li and France Yao Computer Science Department, City Univerity of

More information

An Improved Implementation of Elliptic Curve Digital Signature by Using Sparse Elements

An Improved Implementation of Elliptic Curve Digital Signature by Using Sparse Elements The International Arab Journal of Information Technology, Vol. 1, No., July 004 0 An Improved Implementation of Elliptic Curve Digital Signature by Uing Spare Element Eam Al-Daoud Computer Science Department,

More information

999 Computer System Network. (12) Patent Application Publication (10) Pub. No.: US 2006/ A1. (19) United States

999 Computer System Network. (12) Patent Application Publication (10) Pub. No.: US 2006/ A1. (19) United States (19) United State US 2006O1296.60A1 (12) Patent Application Publication (10) Pub. No.: Mueller et al. (43) Pub. Date: Jun. 15, 2006 (54) METHOD AND COMPUTER SYSTEM FOR QUEUE PROCESSING (76) Inventor: Wolfgang

More information

The Data Locality of Work Stealing

The Data Locality of Work Stealing The Data Locality of Work Stealing Umut A. Acar School of Computer Science Carnegie Mellon Univerity umut@c.cmu.edu Guy E. Blelloch School of Computer Science Carnegie Mellon Univerity guyb@c.cmu.edu Robert

More information

Modeling of underwater vehicle s dynamics

Modeling of underwater vehicle s dynamics Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation

More information

Brief Announcement: Distributed 3/2-Approximation of the Diameter

Brief Announcement: Distributed 3/2-Approximation of the Diameter Brief Announcement: Ditributed /2-Approximation of the Diameter Preliminary verion of a brief announcement to appear at DISC 14 Stephan Holzer MIT holzer@mit.edu David Peleg Weizmann Intitute david.peleg@weizmann.ac.il

More information

Differentially Private Histogram Publication

Differentially Private Histogram Publication Differentially Private Hitogram Publication Jia Xu, Zhenjie Zhang, Xiaokui Xiao, Yin Yang, Ge Yu College of Information Science & Engineering, Northeatern Univerity, China xujia,yuge@ie.neu.edu.cn Advanced

More information

An efficient resource allocation algorithm for OFDMA cooperative relay networks with fairness and QoS guaranteed

An efficient resource allocation algorithm for OFDMA cooperative relay networks with fairness and QoS guaranteed Univerity of Wollongong Reearch Online Faculty of Informatic - Paper (Archive) Faculty of Engineering and Information Science 200 An efficient reource allocation algorithm for OFDMA cooperative relay network

More information

Abstract. Keywords: Data Warehouse Views, Dimension Hierarchies, Partial Combined Cube lattice, Performance benefit.

Abstract. Keywords: Data Warehouse Views, Dimension Hierarchies, Partial Combined Cube lattice, Performance benefit. Accommodating Scalability in Warehoue View Selection Problem Uing Partial Combined Cube Lattice * C.I. Ezeife and Anna Meng School of Computer Science Univerity of Windor Windor, Ontario Canada N9B 3P4

More information

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM

See chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive

More information

SIMIT 7. Profinet IO Gateway. User Manual

SIMIT 7. Profinet IO Gateway. User Manual SIMIT 7 Profinet IO Gateway Uer Manual Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult are only non-binding uggetion

More information

SIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial

SIMIT 7. Component Type Editor (CTE) User manual. Siemens Industrial SIMIT 7 Component Type Editor (CTE) Uer manual Siemen Indutrial Edition January 2013 Siemen offer imulation oftware to plan, imulate and optimize plant and machine. The imulation- and optimizationreult

More information

Module Size Distribution and Defect Density

Module Size Distribution and Defect Density Module Size Ditribution and Defect Computer Science Dept. Colorado State Univerity With update 1 Module Size Ditribution and Defect Significance: Factor that affect defect denity Exiting work: Data & Hypothei

More information

np vp cost = 0 cost = c np vp cost = c I replacing term cost = c+c n cost = c * Error detection Error correction pron det pron det n gi

np vp cost = 0 cost = c np vp cost = c I replacing term cost = c+c n cost = c * Error detection Error correction pron det pron det n gi Spoken Language Paring with Robutne and ncrementality Yohihide Kato, Shigeki Matubara, Katuhiko Toyama and Yauyohi nagaki y Graduate School of Engineering, Nagoya Univerity y Faculty of Language and Culture,

More information

Connected Placement of Disaster Shelters in Modern Cities

Connected Placement of Disaster Shelters in Modern Cities Connected Placement of Diater Shelter in Modern Citie Huanyang Zheng and Jie Wu Department of Computer and Information Science Temple Univerity, USA {huanyang.zheng, jiewu}@temple.edu ABSTRACT Thi paper

More information

Laboratory Exercise 2

Laboratory Exercise 2 Laoratory Exercie Numer and Diplay Thi i an exercie in deigning cominational circuit that can perform inary-to-decimal numer converion and inary-coded-decimal (BCD) addition. Part I We wih to diplay on

More information

Reporting Checklist for Nature Neuroscience

Reporting Checklist for Nature Neuroscience Correponding Author: Manucript Number: Manucript Type: Jeremy Elman NNBC48172A Brief Communication Reporting Checklit for Nature Neurocience # Figure: 2 # Figure: 5 # Table: 6 # Video: 0 Thi checklit i

More information

Research Article Longest Path Reroute to Optimize the Optical Multicast Routing in Sparse Splitting WDM Networks

Research Article Longest Path Reroute to Optimize the Optical Multicast Routing in Sparse Splitting WDM Networks International Optic Volume 0, Article ID 9, page http://dxdoiorg/0/0/9 Reearch Article Longet Path Reroute to Optimize the Optical Multicat Routing in Spare Splitting WDM Network Huanlin Liu, Hongyue Dai,

More information

A Local Mobility Agent Selection Algorithm for Mobile Networks

A Local Mobility Agent Selection Algorithm for Mobile Networks A Local Mobility Agent Selection Algorithm for Mobile Network Yi Xu Henry C. J. Lee Vrizlynn L. L. Thing Intitute for Infocomm Reearch, 21 Heng Mui Keng Terrace, Singapore 119613 Email: {yxu, hlee, vriz}@i2r.a-tar.edu.g

More information

Markov Random Fields in Image Segmentation

Markov Random Fields in Image Segmentation Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image

More information

Architecture and grid application of cluster computing system

Architecture and grid application of cluster computing system Architecture and grid application of cluter computing ytem Yi Lv*, Shuiqin Yu, Youju Mao Intitute of Optical Fiber Telecom, Chongqing Univ. of Pot & Telecom, Chongqing, 400065, P.R.China ABSTRACT Recently,

More information

arxiv: v1 [cs.ds] 27 Feb 2018

arxiv: v1 [cs.ds] 27 Feb 2018 Incremental Strong Connectivity and 2-Connectivity in Directed Graph Louka Georgiadi 1, Giueppe F. Italiano 2, and Niko Parotidi 2 arxiv:1802.10189v1 [c.ds] 27 Feb 2018 1 Univerity of Ioannina, Greece.

More information