An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks

Size: px
Start display at page:

Download "An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks"

Transcription

1 An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San Antonio San Antonio, TX , USA and Wei-Ming Lin Departent of Electrical and Coputer Engineering The University of Texas at San Antonio San Antonio, TX , USA ABSTRACT Hashing algoriths have been widely adopted for fast address look-up, which involves a search through a database to find a record associated with a given key. Hashing algoriths transfors a key into a hash value hoping that the hashing renders the database a unifor distribution with respect to the hash value. The closer to unifor hash values, the less search tie required for a query. When the database is key-wise uniforly distributed, any regular hashing algorith (bit-extraction, bit-group XOR, etc.) leads to a statistically perfect unifor hash distribution. When the database has keys with a non-unifor distribution, perforance of regular hashing algoriths becoes far fro desirable. This paper ais at designing a hashing algorith to achieve the highest probability in leading to a uniforly distributed hash result fro non-unifor distributed database. An analytical pre-process on the original database is perfored to extract critical inforation that significantly benefits the design of a better hashing algorith. This process includes sorting the bits of the key to prioritize the use of the in the hashing sequence. Such an ad hoc hash design is critical to adapting to all real-tie situations when there exists a changing database with an irregular non-unifor distribution. Keywords: Hashing, Coputer Networks, Address Lookup, Packet Matching, Internet, Intrusion Detection, Network Security. INTRODUCTION The coputer and counication networks counity has seen extensive advanceent in its research and coercial fields in the past few decades. To further increase the speed of networks takes ore than just physical advances in transission speed through a given ediu. One hindrance that all network coponents, such as routers, firewalls, intrusion detection, and others, have faced and suffered fro it ore as the network size grows is fro the required search and lookup process through a large address space. Fast address lookup or identification atching has becoe critical to the feasibility of any odern applications. In a general for, this proble involves a search process through a large database to find a record (or records) associated with a given key. One odern exaple is in that the routers in wide-area networks have to look through a large database, a routing table, for a forwarding link that atches the given destination address. Another exaple that calls for iinent attention these days is in the area of internet security, in which intrusion detection deands rapid evaluation of client requests. In this, rules are established to allow the intrusion detection syste to check for wrong-doing. Usually, packet headers need to be atched quickly in real tie with rule database. Such a atching process usually is carried out through a hashing process to reduce the otherwise potentially excessively long search tie. There have been any schees developed for IP address lookup proble using a hash function. A coplete survey and coplexity analysis on IP address lookup algoriths has been provided in []. A perforance coparison of traditional XOR folding, bit extraction, CRC-based hash functions is given in [4]. Although ost of the regular hash functions, such as the siple XOR folding and bit extraction, are relatively inexpensive to ipleent in software and hardware, their perforance tends to be far fro desirable. CRC-based hash functions are proved to be excellent eans but are ore coplex to copute and ipleent. Soe schees are hardware based that achieve an iproveent in IP look up by aintaining a subset of routing table in a faster cache eory [7,9], while others are software based which iprove their search per- ISSN: SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME - NUMBER

2 forance ainly through efficient data structures [,3]. Waldvogel et al. [4] proposed an address look up schee based on a binary search of hash table, requiring an extra update process in a look up table. Other hashing algoriths have also been widely adopted to provide for the address look-up process [,3,,6]. All hashing algoriths inevitably suffer fro unpredictable coplexities involving conflicts aong the data with the sae hash result. A search for atching a given query could end up with a sequential search through the nuber of axial conflicts in the database. This ay result in a long search process tie that exceeds the tie liitation iposed by design specifications. When records in the database are key-wise uniforly distributed, any regular hashing algorith would easily lead to the sae probabilistically expected optial perforance in ters of search tie required. On the other hand, if these records are instead not uniforly distributed, then even different regular hash functions would lead to different expected perforance. This paper is aied at the establishent of a ethodology following which a hashing algorith can be designed to achieve the highest probability in leading to a uniforly distributed hash result fro a non-unifor database. An analytical pre-process on the original database is first perfored to extract critical inforation that would significantly benefit the design of a better hashing algorith. This process includes sorting on the bits of the key to prioritize the use of the in the XOR hashing sequence, or a siple bit extraction, or even a cobination of both. Significant iproveent fro our siulation results has been obtained on randoly generated data set as well as real data set. Hashing for Address Look-up H hash cells H subtables H xxx : rule H : hashing operator Rule Set Figure : A Hashing Exaple Basically, hashing is a process that allows the search to go through a statistically saller nuber of steps than a siple sequential straightforward search would have perfored. A hash function, usually a atheatical one, aps a nuber with a large value range into another nuber with a saller range. For exaple, a siplified one as shown in Figure, a database of eight given records are to be atched against for any incoing record. Due to the large size of each record and potentially large nuber of records in the database under real situations, searching through the whole database one at a tie could be erely ipractical. One ay choose to use a portion of the record (or its entirety), as a key, to hash into the target value (a three-bit value as shown in this exaple) using the hash function (operator) H. Therefore, a database of eight records are now grouped into bins of records according to their corresponding hash results. With this, any incoing record would go through the sae hashing to identify the one bin it would need to search through, instead of the whole database. Perfect hashing would guarantee that every bin contains exactly one record, which leads to a search process of exactly one atching to take place. A hash function is considered better than the other if it leads to a saller expected nuber of atching steps required. Note that, if the records in the database follow a unifor distribution with respect to value of the key, any regular hash function, e.g. non-overlapped XOR, bit extraction, etc., would siply lead to a unifor distribution of these records onto the bins. That is, it should always lead to best expected perforance probabilistically in search tie required. The goal of this paper is to develop a universal hashing ethodology applicable to all non-uniforly distributed data sets.. AN HOC ADAPTIVE HASHING FOR DATA SETS WITH AN ARBITRARY pdf One proble that ay arise in the lifetie of the database is that, as the nuber of entries grows and/or the entries are constantly updated, the original hashing algorith previously designed ay becoe obsolete and leads to a large aount of collisions. To deal with such a situation when there exists a changing database with an irregular non-unifor pdf, it would be preferable to develop a hashing algorith based on an ad hoc design that can adapt to the expanding or changing database. To base a hashing algorith on an ad hoc design, a paraeter ust be used to instruct the algorith to adapt over tie. The database is defined as consisting of M = entries with each entry having n bits in length. In order to render the best (unifor) distribution in the final hashed data set, all the bits in the final hashing function H should deonstrate a distribution as probabilistically rando as possible, i.e. evenly distributed between s and s. An optial H will have each of its bits deonstrate even distribution of s and s, and thus leading to the highest probability in reaching the best hashing. The ad hoc paraeter used for adaptation in this paper is identified to be the binary distribution of each bit in the n-bit entry key length. For bit position i, d i is defined as the absolute difference between the nuber of s and s in that bit vector across the data set. Once the d value is found for each bit vector as shown in Figure, they are then sorted into a SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME - NUMBER ISSN: 69-44

3 non-decreasing order as shown in Figure. Note that, Bit Vector V Bit Position Bit Position DB Entry DB Entry # # # # # # #3 #3 #4 #4 # # #6 #6 #7 #7 d = d = Figure : Database with d Values Found Database Sorted By d while sorting is perfored on the d values, no actual rearrangeent of the database is needed; instead, an array of the sorted bit indices is used as the hash function. Assue the bit sequence before sorting is (b n,b n,...,b ) and the bit sequence afterwards is (s n,s n,...,s ). A bit vector V i with d i =indicate that there are even nuber of s and s; while, a d = M reflects that all the bits in the vector have the sae value. Translated to the distribution fro hashing, a bit of d =gives an even hashing distribution (i.e. evenly divided) aong the entire hash space while a d = M hashing will result in hashing to only one half of the hash space. Intuitively, using the bits with saller d values for hashing would lead to a probabilistically better hash distribution, i.e. less conflict in the final apping. Ideally, if one can identify (or through XORing to obtain) bits with all their d values equal to, it should lead to the best potential perforance, assuing no correlation aong the bit vectors. Siulation Setup Our siulation is devoted to finding the proposed technique on several practical perforance indicators. A syste is assued to have a database of entries each of which contains a key of n bits to be used for hashing into bits, and thus each such entry is then apped to a location in a eory of locations (hashed bins) for atching. Three different perforance easureents (indicators) are used to copare different hashing functions: () Nuber of Epty Bins (NEB), () the Average axiu Search Length (ASL), and (3) the Maxiu Search Length (MSL). An illustrating exaple of these indicators is given in Figure 3 showing the nuber of rules apped (hashed) onto each of the bins. NEB tells how any locations in eory that no rule is apped into. ASL is the average axiu nuber of atching steps needed for any given record to atch. MSL denotes the largest nuber of rules that are apped into any location in the eory. For all of the perforance easureents, the saller the value the better the perforance is. The optial perforance value will be for both ASL and MSL, and for NEB, which all indicate that the keys have been evenly distributed aong the eory locations. Data sets 3 Hashed Bins Maxiu Searech Length (MSL) = 3 Average Maxiu Search Length (ASL) = Nuber of Epty Bins (NEM) = Figure 3: Three Perforance Indicators are generated either randoly or fro the real IP addresses collected. Sorting-Based Bit Extraction Hashing Bit extraction is a coonly adopted hashing process for its siplicity. Iediate benefit fro the sorting process is, when eploying siple bit extraction for hashing, significant perforance gain can be easily achieved copared to the regular (rando) bit extraction process. After the sorting, the first bits which have the sallest d values becoe obvious candidates for bit extraction. That is, the final hash keys are (s n,s n,...,s n ). Fro probabilistic point of view, bit extraction using these bits would lead to the best expected perforance aong all bit extraction hashing choices. Figure 4 gives the perforance coparison between the proposed bit extraction hashing and the rando bit extraction approach (i.e. using the first bits before sorting), when n =3and is set to various values. Two data sets are used for siulation, perforance gain (%) NEB MSL perforance gain (%) NEB MSL 8 9 Figure 4: Perforance Iproveent fro Bit-Extraction Hashing on Rando Data Set Real IP Data Set one being a data set randoly generated (in ) such that the d value for each bit position is uniforly distributed, and the other being the real network traffic subnet ID data set (in ). This shows that a very significant iproveent argin is obtained by using this siple bit-extraction approach. A close-to-% reduction in MSL is achieved, thus drastically reducing the search tie required by alost one half. Hybrid XOR Hashing XOR operator has been widely used for hashing and known to be an excellent operator in enhancing rando- ISSN: SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME - NUMBER 3

4 ness in distribution. It also possesses a nice characteristic allowing for analytical perforance analysis and thus better algorith design. XOR-folding is a coonly used hashing technique by siply folding the n-bit key into - bit hash result through a siple process XORing every n key bits into a final hash bit. In soe cases, siple extraction ay outperfor XOR hashing, while in other cases outcoe goes the opposite. A cobination of both would very likely outperfor both if the inforation fro the sorted sequence is properly analyzed and utilized. All-key hashing techniques, i.e. all the bits in the key are used in XORing as in all known XORing hashing techniques, have the benefit in its siplicity, thus easy to ipleent; however, they tend to over-generalize the data set without fully exploiting the d values fro the sorted result. To precisely quantify the benefit in using two bits for XORing with their d values being d i and d j, a forula can be derived to find the expected resultant d for the new bit after XORing, denoted as d [di d j]: d [di d j] = x j k= x C i x M 4k k CM x i j k Cx M j where x i = M di,x j = M dj, =x i x j () Note that the ter C xi x j k CM xi k /Cx M j indicates the probability for the resultant vector to have a d value equal to M 4k. In order not to degrade the hash perforance, every intended XOR operation to be taken between two bits s i and s j after sorting, with d i d j, should lead to a d [di d j] value such that d [di d j] <d i d[di dj] d i Figure : Spectru of d [di d j] Values 3 d j assuing no correlation exists in between bit vectors V i and V j ; otherwise, siply retaining (extracting) the bit s i for hashing would yield better perforance than using XORing of the two bits s i and s j. A coplete spectru of d [di d j] for all possible integral values of d i and d j for M =3is given in Figure. Figure 6 displays, for each d i, the cutoff d j ( d i ) value that would lead to d [di d j] <d i, i.e., the sallest d j that can still be a candidate to be XORed with d i for better perforance. For exaple, when M = 64, ad = will never achieve any ore iproveent when XORing with any d value, i.e. its cutoff is d j =64. On the other hand, a d =6, with its cutoff equal to d j =36, is allowed to XORed with a bit with its d value at least equal 36. Note that, for hashing a database, ultiple bits (i.e. ore than two bits) can be XORed together. That is, when ore than two bits are to be XORed, their final d value would require soe additional process. It can be shown that the process in deterining the d value aong three bits is a process with the property of associativity, that is, d [d[di d j ] d k ] = d [di d [dj d k ]] () Cutoff dj Value d i M=6 M=3 M=64 M=8 M=6 M= M=4 Figure 6: Cutoff Points for Each Integral d i for Different M Note that, d [di d j] (or d [dj d k ]) ay not be an integer anyore, thus the forula in Equation is no longer applicable. We have chosen a siple interpolation/extrapolation 4 SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME - NUMBER ISSN: 69-44

5 approach to approxiate the result when non-integral d values are involved when using the forula in Equation. After the bit vectors are sorted with their d values, our proposed hybrid hashing technique is to adopt a folding hash approach in finding suitable candidate bits to XOR. During each folding cycle, at ost ore bits fro the right end of the sorted bit sequence are XORed with the current -bit interediate hash result with their current d values denoted as (D,D,...D ). Initial hash result is siply an extraction of the first bits of the sorted sequence, thus, ( D, D,... D ) ( G, G,... G j i ( d n, d n,... d n ) ({ s n },{ s n },...{ s n }) (D,D,...D )=(d n,d n,...,d n ) Groups of bits hashed so far are recorded as (G,G,...,G ), and it is initialized to the first bits: (G,G,...,G )=({s n }, {s n },...,{s n }) N cutoff d[ D i ds ] j < Di? D i Y d[ ] D i ds j Essentially, in each folding cycle, each interediate hashing bit-group result with an interediate d value equal to D i, starting with the one with the sallest d value, is XORed with the rightost bit s j with a d value of d sj if d [Di d sj ] <D i ; otherwise it has reached its cutoff point. Folding continues until no ore bits are left for XORing. Once cutoff point is reached for an interediate hash bit, it is autoatically excluded for further XORing in subsequence folding cycles since the sequence is already a sorted one. The coplete algorith is shown in Figure 7. For exaple, given a database with 6 entries with each entry bits long, the database key will be hashed into four bits. An exaple is given in Figure 8. In this exaple, the d values for the bit vectors are {,, 4, 4, 6, 6, 8, 8, 8,,, 4} after sorting. Initial hash result is siply (D 3,D,D,D ) = (,, 4, 4) and the bit-grouping is (G 3,G,G,G ) = ({s }, {s }, {s 9 }, {s 8 }). In the first folding cycle, bit s is XORed with bit s since d 4 =.7 <, while for bit s, the next candidate, bit s has a d value of already passing the cutoff point of d s =. Bits s 9 and s 8 subsequently take their corresponding XOR candidates, bit s and s, to wrap up the first folding cycle with (D 3,D,D,D ) = (.7,, 3.36, 3.36) and (G 3,G,G,G )=({s,s }, {s }, {s 9,s }, {s 8,s }). In the second folding cycle, D 3 runs into its cutoff fro d s3 =8, and therefore bit s 3 is XORed with D and bit s 4 is XORed with D, ended with (D 3,D,D,D ) = (.7,,.99,.99) and (G 3,G,G,G ) = ({s,s }, {s }, {s 9,s,s 3 }, {s 8,s,s 4 }). In the third folding cycle, all D s have their cutoff et and thus ending the process. Note that, this greedy algorith requires a very econoic pre-processing tie coplexity of O(n) in ters of the nuber of bits to visit, while an optial algorith using an exhaustive search would require a tie coplexity of O(( n ) ) by allowing all the n bits to potentially contribute to each of the hash bits. end N N G i G i { s j } j = j+; i = i j < n? Y i <? Y restart a folding cycle Figure 7: The Algorith to Deterine a Hybrid XOR Hashing Function Bit Position s s s 9 s 8 s 7 s 6 s s 4 s 3 s s s d = : XOR : cutoff Figure 8: An Exaple of the Hybrid XOR Process ISSN: SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME - NUMBER

6 Figure 9 shows the perforance iproveent fro using the proposed Hybrid XOR approach over the straightforward all-key XOR on rando data set, and Figure shows the perforance iproveent on a real IP data set. Figure gives breakdowns of MSL iproveent on perforance gain (%) perforance gain (%) n=3 n=4 n= n=3 n=4 n=48 Figure 9: Perforance Iproveent in MSL and ASL with Hybrid XOR on Rando Data Set three different types of IP addresses. Very respectable gains are reached in both results. Perforance iproveent is very significant when is sall, that is, when ore folding is allowed. When becoes larger, the proposed ad hoc algorith gradually loses its advantage until passes a threshold value. This is ost likely due to the fact that, on MSL, the original XOR-folding approach is incapable of liit the search length (the axial nuber of data apped to the sae bin) as well as the proposed technique when is increased. Fro, type-a IP addresses lead to ore iproveent with the proposed technique than the other two types. This could be due to the scenario that ore subnet addresses in this type are ore aggregated (i.e. ibalanced) than the other two types, 3. CONCLUSION The wide applicability of the proposed ethodology is clearly deonstrated by our preliinary application results. General applications include: () IP Address Lookup () Intrusion Detection Systes (3) General Database Query (4) String Matching. The success of this developent will benefit any ore application engineers, scientists and syste designers/analysts. There are still any potential extensions along this line of research, including: perforance gain (%) perforance gain (%) MSL ASL Type-A Type-B Type-C Figure : Siulation Results of Iproveent Using Real Work Loads with n = 3: Aggregate Results Breakdown on Types Precise calculation of d values: we plan to extend our analytical work to find an even ore reliable approxiation of the d value calculation when the coposing d values are not integers. Effect of d values and their cobinations on perforance: Exact effect on perforance fro a hashing with a group of final d values still reains unsolved. For exaple, for =(or even larger ), between two final hashing results, (D,D ) and (D,D ), if D <D but D >D, how to deterine on the better one requires ore a coplex analysis and the analysis becoes harder when becoes larger. A thorough understanding of this is critical to the finding of the best hashing function. Correlation aong bit vectors: when there exists correlation aong bit vectors as ost real data sets exhibit, the best hashing produced by relying solely on the d values ay turn out to be far fro the best. How to coe up with a standard and reliable calibration echanis to quantify the correlation between the two bit vectors (c ij ) and derive a function F (c ij,d i,d j ) to decide whether or not the intended XOR is beneficial. Effect of bit re-using: Once bit(s) are re-used, correlation between bit positions sharing the bit(s) arises. How to decide on whether the ensuing correlation is 6 SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME - NUMBER ISSN: 69-44

7 too big an investent to copensate fro the gain through using the isleadingly saller d values reains a challenge for this project. 4. REFERENCES [] Ole Able and Donald E. Knuth, Ordered Hash Tables. Chapter 7 in D.E.Knuth Selected Papers on Analysis of Algoriths, CSLI Stanford CA,,. [] A. Broder and M. Mitzenacher, Using Multiple Hash Functions to Iprove IP Lookups, IEEE IN- FOCOM,. [3] Sang-Hun Chung, J. Sungkee, Hyunsoo Yoon, Jung- Wan Cho, A Fast and Updatable IP Address Lookup Schee, International Conference on Coputer Networks and Mobile Coputing,. [4] Raj Jain, A Coparison of Hashing Schees for Address Lookup in Coputer Networks, IEEE Transactions on Counications,, Vol. 4, No., Oct 99. [] Donald E. Knuth, The Art of Coputer Prograing, Vol 3: Sorting and Searching. nd Ed., Addison-Wesley, Reading MA, 998. [6] Christopher Martinez, Wei-Ming Lin and Parial Patel, Optial XOR Hashing for A Linearly Distributed Address Lookup in Coputer Networks, Syposiu on Architectures for Networking and Counications Systes, Oct.,, Princeton, New Jersey [7] Andreas Moestedt, Peter Sjodin, IP Address Lookup in Hardware for High-speed Routing, Proc. IEEE Hot Interconnects 6 syposiu, Stanford, California, pp.3-39, August 998. [8] P. Newan, G. Minshall, T. Lyon, and L. Hutson, IP Switching and Gigabit Routers, IEEE Counications Magazine, January 997, p.64-p.69. [9] Xiaojun Nie, David J. Wilson, Jeroe Cornet, Gerard Da, Yiqiang Zhoa, P Address Lookup Using A dynaic Hash Functio, IEEE Electrical and Coputer Engineering, Canadian Conference, Page(s) 646-6, May -4,. [] Stefan Nilsson and Gunnar Karlsson, IP Address Lookup Using LC-Tries, IEEE Journal on Selected Areas in Counications, pp. 83-9, June 999. [] D. Pao, C. Liu, L. Yeung and K.S. Chan, Efficient Hardware Architecture for Fast IP Address Lookup, IEEE INFOCOM,. [] M.A. Ruiz-Sanchez, E.W. Biersack, and W. Dabbous, Survey and Taxonoy of IP Address Lookup Algoriths, IEEE Network, Vol., pp.8-3, Mar./Apr.. [3] V. Srinivasan and G. Varghese, Faster Ip Lookups Using Controlled Prefix Expansion, Proceedings of SIGMETRICS 98, pp. -, Madison, 998. [4] M. Waldvogel, G. Varghese, J. Turner and B. Plattner, Scalable High Speed Ip Routing Lookups, in Proc. ACM SIGCOMM 97, pp. -3, Sept [] G.B. White and M.I. Huson, A Peer-based Hardware Protocol for Intrusion Detection Systes, Military Counications Conference (MILCOM) 996. [6] P.A. Yilaz, A. Belenkiy, N. Uzun, N. Gogate and M. Toy, A Trie-based Algorith for IP Lookup Proble, Global Telecounications Conference (GLOBECOM). [7] Daxiao Yu, Brandon Sith, and Belle Wei, Forwarding Engine for Fast Routing Lookups and Updates, Global Telecounications Conference,, Globeco 99, p.6-p.64. ISSN: SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME - NUMBER 7

HASHING FOR FAST IP ADDRESS LOOKUP UTILIZING INTER-KEY CORRELATION

HASHING FOR FAST IP ADDRESS LOOKUP UTILIZING INTER-KEY CORRELATION HASHING FOR FAST IP ADDRESS LOOKUP UTILIZING INTER-KEY CORRELATION APPROVED BY SUPERVISING COMMITTEE: Wei-Ming Lin, Ph.D., Chair Bao Liu, Ph.D. Ram Krishnan, Ph.D. Accepted: Dean, Graduate School DEDICATION

More information

Hybrid Key Duplication Hashing Techniques for IP Address Lookup

Hybrid Key Duplication Hashing Techniques for IP Address Lookup Int. J. Communications, Network and System Sciences, 2011, 4, 323-334 doi:10.4236/ijcns.2011.45037 Published Online May 2011 (http://www.scirp.org/journal/ijcns) Hybrid Key Duplication Hashing Techniques

More information

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

Identifying Converging Pairs of Nodes on a Budget

Identifying Converging Pairs of Nodes on a Budget Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering

More information

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

Multipath Selection and Channel Assignment in Wireless Mesh Networks

Multipath Selection and Channel Assignment in Wireless Mesh Networks Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,

More information

A Periodic Dynamic Load Balancing Method

A Periodic Dynamic Load Balancing Method 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation

More information

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Navodaya Garepalli Kartik Gopalan Ping Yang Coputer Science, Binghaton University (State University of New York) Contact:

More information

Multi Packet Reception and Network Coding

Multi Packet Reception and Network Coding The 2010 Military Counications Conference - Unclassified Progra - etworking Protocols and Perforance Track Multi Packet Reception and etwork Coding Aran Rezaee Research Laboratory of Electronics Massachusetts

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan

More information

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networs F. Mousavi Madani Departent of coputer engineering Alzahra University Tehran, Iran, osavif@alzahra.ac.ir Received:

More information

Real-Time Detection of Invisible Spreaders

Real-Time Detection of Invisible Spreaders Real-Tie Detection of Invisible Spreaders MyungKeun Yoon Shigang Chen Departent of Coputer & Inforation Science & Engineering University of Florida, Gainesville, FL 3, USA {yoon, sgchen}@cise.ufl.edu Abstract

More information

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

Boosted Detection of Objects and Attributes

Boosted Detection of Objects and Attributes L M M Boosted Detection of Objects and Attributes Abstract We present a new fraework for detection of object and attributes in iages based on boosted cobination of priitive classifiers. The fraework directly

More information

Privacy-preserving String-Matching With PRAM Algorithms

Privacy-preserving String-Matching With PRAM Algorithms Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,

More information

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13 Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical

More information

ACNS: Adaptive Complementary Neighbor Selection in BitTorrent-like Applications

ACNS: Adaptive Complementary Neighbor Selection in BitTorrent-like Applications ACNS: Adaptive Copleentary Neighbor Selection in BitTorrent-like Applications Zhenbao Zhou 1, 2, Zhenyu Li 1, 2, Gaogang Xie 1 1 Institute of Coputing Technology, Chinese Acadey of Sciences, Beijing 100190,

More information

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada

More information

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH Kulapraote Prathuchai Geoinforatics Center, Asian Institute of Technology, 58 Moo9, Klong Luang, Pathuthani, Thailand.

More information

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao

More information

I ve Seen Enough : Incrementally Improving Visualizations to Support Rapid Decision Making

I ve Seen Enough : Incrementally Improving Visualizations to Support Rapid Decision Making I ve Seen Enough : Increentally Iproving Visualizations to Support Rapid Decision Making Sajjadur Rahan Marya Aliakbarpour 2 Ha Kyung Kong Eric Blais 3 Karrie Karahalios,4 Aditya Paraeswaran Ronitt Rubinfield

More information

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S COPUTER GEERATED HOLOGRAS Optical Sciences 67 W.J. Dallas (onday, August 3, 004, 1:38 P) PART III: CHAPTER OE DIFFUSERS FOR CGH S Part III: Chapter One Page 1 of 8 Introduction Hologras for display purposes

More information

BP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks

BP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks BP-MAC: A High Reliable Backoff Preable MAC Protocol for Wireless Sensor Networks Alexander Klein* Jirka Klaue Josef Schalk EADS Innovation Works, Gerany *Eail: klein@inforatik.uni-wuerzburg.de ABSTRACT:

More information

Ascending order sort Descending order sort

Ascending order sort Descending order sort Scalable Binary Sorting Architecture Based on Rank Ordering With Linear Area-Tie Coplexity. Hatrnaz and Y. Leblebici Departent of Electrical and Coputer Engineering Worcester Polytechnic Institute Abstract

More information

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant

More information

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design A Fast Multi-Obective Genetic Algorith for Hardware-Software Partitioning In Ebedded Syste Design 1 M.Jagadeeswari, 2 M.C.Bhuvaneswari 1 Research Scholar, P.S.G College of Technology, Coibatore, India

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

On the Accuracy of MANET Simulators

On the Accuracy of MANET Simulators On the ccuracy of MNT Siulators avid avin david.cavin@epfl.ch Yoav Sasson yoav.sasson@epfl.ch istributed Systes Laboratory cole Polytechnique Fédérale de Lausanne (PFL) H-115 Lausanne ndré Schiper andre.schiper@epfl.ch

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

Deterministic Voting in Distributed Systems Using Error-Correcting Codes

Deterministic Voting in Distributed Systems Using Error-Correcting Codes IEEE TRASACTIOS O PARALLEL AD DISTRIBUTED SYSTEMS, VOL. 9, O. 8, AUGUST 1998 813 Deterinistic Voting in Distributed Systes Using Error-Correcting Codes Lihao Xu and Jehoshua Bruck, Senior Meber, IEEE Abstract

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu

More information

Survivability Function A Measure of Disaster-Based Routing Performance

Survivability Function A Measure of Disaster-Based Routing Performance Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected

More information

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.5, Septeber 205 AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM Xie Yang and Cheng Wushan College of Mechanical Engineering,

More information

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH V. Atienza; J.M. Valiente and G. Andreu Departaento de Ingeniería de Sisteas, Coputadores y Autoática Universidad Politécnica de Valencia.

More information

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones Advance Access publication on 24 February 2017 The British Coputer Society 2017. All rights reserved. For Perissions, please eail: journals.perissions@oup.co doi:10.1093/cojnl/bxx015 Fair Energy-Efficient

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER

A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER VIOLETA TOMAŠEVIĆ, SLOBODAN BOJANIĆ 2 and OCTAVIO NIETO-TALADRIZ 2 The Mihajlo Pupin Institute, Volgina 5, 000 Belgrade, SERBIA AND MONTENEGRO 2 Technical University

More information

Integrating fast mobility in the OLSR routing protocol

Integrating fast mobility in the OLSR routing protocol Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr

More information

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches Efficient Estiation of Inclusion Coefficient using HyperLogLog Sketches Azade Nazi, Bolin Ding, Vivek Narasayya, Surajit Chaudhuri Microsoft Research {aznazi, bolind, viveknar, surajitc}@icrosoft.co ABSTRACT

More information

Planet Scale Software Updates

Planet Scale Software Updates Planet Scale Software Updates Christos Gkantsidis 1, Thoas Karagiannis 2, Pablo Rodriguez 1, and Milan Vojnović 1 1 Microsoft Research 2 UC Riverside Cabridge, UK Riverside, CA, USA {chrisgk,pablo,ilanv}@icrosoft.co

More information

IN many interactive multimedia streaming applications, such

IN many interactive multimedia streaming applications, such 840 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 5, MAY 06 A Geoetric Approach to Server Selection for Interactive Video Streaing Yaochen Hu, Student Meber, IEEE, DiNiu, Meber, IEEE, and Zongpeng Li, Senior

More information

A Hybrid Network Architecture for File Transfers

A Hybrid Network Architecture for File Transfers JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade

More information

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium 1 A Distributed Multi-service Resource Allocation Algorith in Heterogeneous Wireless Access Mediu Muhaad Isail, Student Meber, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract In this paper, radio resource

More information

Data & Knowledge Engineering

Data & Knowledge Engineering Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID

More information

A Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem

A Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem IE Vol. 7, No. 2, pp. 84-92, Septeber 2008. A Coparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Proble Ji Ung Sun School of Industrial and Managent Engineering Hankuk University

More information

Adaptive Holistic Scheduling for In-Network Sensor Query Processing

Adaptive Holistic Scheduling for In-Network Sensor Query Processing Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,

More information

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract

More information

MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES. Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou

MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES. Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou Departent of Coputer Science and Inforation Engineering, National Chiayi

More information

The Internal Conflict of a Belief Function

The Internal Conflict of a Belief Function The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of

More information

Vito R. Gervasi, Adam Schneider, Joshua Rocholl the Milwaukee School of Engineering, Milwaukee, Wisconsin

Vito R. Gervasi, Adam Schneider, Joshua Rocholl the Milwaukee School of Engineering, Milwaukee, Wisconsin GEOMETRY AND PROCEDURE FOR BENCHMARKING SFF AND HYBRID FABRICATION PROCESS RESOLUTION Vito R. Gervasi, Ada Schneider, Joshua Rocholl the Milwaukee School of Engineering, Milwaukee, Wisconsin ABSTRACT Since

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage 216 IEEE 23rd International Conference on High Perforance Coputing A Low-Cost Multi-Failure Resilient Replication Schee for High Data Availability in Cloud Storage Jinwei Liu* and Haiying Shen *Departent

More information

Ravine Streams: Persistent Data Streams in Disruptive Sensor Networks

Ravine Streams: Persistent Data Streams in Disruptive Sensor Networks Ravine Streas: Persistent Data Streas in Disruptive Sensor Networks Mingsen Xu, Wen-Zhan Song Departent of Coputer Science, Georgia State University Atlanta, Georgia 333, USA Eail: {xu4@student.gsu.edu,

More information

Improve Peer Cooperation using Social Networks

Improve Peer Cooperation using Social Networks Iprove Peer Cooperation using Social Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Noveber 5, 2007 Corresponding

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

Collaborative Web Caching Based on Proxy Affinities

Collaborative Web Caching Based on Proxy Affinities Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information

COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS

COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS International Journal of Coputer Science and Counication Vol. 3, No. 1, January-June 2012, pp. 181-185 COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS A.H. Karode 1, S.R. Suralkar 2, Manoj Bagde

More information

Optimal Route Queries with Arbitrary Order Constraints

Optimal Route Queries with Arbitrary Order Constraints IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL.?, NO.?,? 20?? 1 Optial Route Queries with Arbitrary Order Constraints Jing Li, Yin Yang, Nikos Maoulis Abstract Given a set of spatial points DS,

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

Gromov-Hausdorff Distance Between Metric Graphs

Gromov-Hausdorff Distance Between Metric Graphs Groov-Hausdorff Distance Between Metric Graphs Jiwon Choi St Mark s School January, 019 Abstract In this paper we study the Groov-Hausdorff distance between two etric graphs We copute the precise value

More information

Data-driven Hybrid Caching in Hierarchical Edge Cache Networks

Data-driven Hybrid Caching in Hierarchical Edge Cache Networks Data-driven Hybrid Caching in Hierarchical Edge Cache Networks Abstract Hierarchical cache networks are increasingly deployed to facilitate high-throughput and low-latency content delivery to end users.

More information

ELEN : Project Progress Report. Second Order Delay Computation for RC networks with Non-Tree Topology

ELEN : Project Progress Report. Second Order Delay Computation for RC networks with Non-Tree Topology ELEN 689-603: Project Progress eport Second Order Delay Coputation for C networks wi Non-Tree Topology ajeshwary Tayade 000 07 573 //003 PDF created wi pdffactory trial version www.pdffactory.co : Introduction

More information

Reducing Crosspoint Buffers for Performance Guaranteed Asynchronous Crossbar Scheduling

Reducing Crosspoint Buffers for Performance Guaranteed Asynchronous Crossbar Scheduling educing Crosspoint Buffers for Perforance Guaranteed Asynchronous Crossbar Scheduling Masoueh Karii, Zhuo Sun, and Deng Pan Florida International University Eails: {kari001, zsun003, pand}@fiu.edu Abstract

More information

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm roceedings of the 7th International Conference on Innovation & Manageent 893 Research on a Kind of QoS-Sensitive Seantic Web Services Coposition Method Based on Genetic Algorith Cao Hongjiang, Nie Guihua,

More information

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute

More information

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive and Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

Carving Differential Unit Test Cases from System Test Cases

Carving Differential Unit Test Cases from System Test Cases Carving Differential Unit Test Cases fro Syste Test Cases Sebastian Elbau, Hui Nee Chin, Matthew B. Dwyer, Jonathan Dokulil Departent of Coputer Science and Engineering University of Nebraska - Lincoln

More information

Distributed Multicast Tree Construction in Wireless Sensor Networks

Distributed Multicast Tree Construction in Wireless Sensor Networks Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,

More information

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We

More information

QoS and Sensible Routing Decisions

QoS and Sensible Routing Decisions QoS and Sensible Routing Decisions Erol Gelenbe Dept. of Electrical & Electronic Engineering Iperial College London SW7 2BT e.gelenbe@iperial.ac.uk Abstract Network Quality of Service (QoS) criteria of

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

Medical Biophysics 302E/335G/ st1-07 page 1

Medical Biophysics 302E/335G/ st1-07 page 1 Medical Biophysics 302E/335G/500 20070109 st1-07 page 1 STEREOLOGICAL METHODS - CONCEPTS Upon copletion of this lesson, the student should be able to: -define the ter stereology -distinguish between quantitative

More information

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University

More information

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3 2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition

More information

EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B.

EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B. EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B. Girod1 1 Stanford University, USA 2 Qualco Inc., USA ABSTRACT We study

More information

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS Evaluation of the Tiing Properties of Two Control Networs: CAN and PROFIBUS Max Mauro Dias Santos 1, Marcelo Ricardo Steer 2 and Francisco Vasques 3 1 UnilesteMG, CEP 35170-056, Coronel Fabriciano MG Brasil.

More information

Predicting x86 Program Runtime for Intel Processor

Predicting x86 Program Runtime for Intel Processor Predicting x86 Progra Runtie for Intel Processor Behra Mistree, Haidreza Haki Javadi, Oid Mashayekhi Stanford University bistree,hrhaki,oid@stanford.edu 1 Introduction Progras can be equivalent: given

More information

Genetic-Based EM Algorithm for Learning Gaussian Mixture Models

Genetic-Based EM Algorithm for Learning Gaussian Mixture Models 1344 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 27, NO. 8, AUGUST 2005 Genetic-Based EM Algorith for Learning Gaussian Mixture Models Franz Pernkopf, Meber, IEEE, and Djael Bouchaffra,

More information

A Network-based Seamless Handover Scheme for Multi-homed Devices

A Network-based Seamless Handover Scheme for Multi-homed Devices A Network-based Sealess Handover Schee for Multi-hoed Devices Md. Shohrab Hossain and Mohaed Atiquzzaan School of Coputer Science, University of Oklahoa, Noran, OK 7319 Eail: {shohrab, atiq}@ou.edu Abstract

More information

Rule Extraction using Artificial Neural Networks

Rule Extraction using Artificial Neural Networks Rule Extraction using Artificial Neural Networks S. M. Karuzzaan 1 Ahed Ryadh Hasan 2 Abstract Artificial neural networks have been successfully applied to a variety of business application probles involving

More information

Feature Selection to Relate Words and Images

Feature Selection to Relate Words and Images The Open Inforation Systes Journal, 2009, 3, 9-13 9 Feature Selection to Relate Words and Iages Wei-Chao Lin 1 and Chih-Fong Tsai*,2 Open Access 1 Departent of Coputing, Engineering and Technology, University

More information

IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE. Rafael García, Xevi Cufí and Lluís Pacheco

IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE. Rafael García, Xevi Cufí and Lluís Pacheco IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE Rafael García, Xevi Cufí and Lluís Pacheco Coputer Vision and Robotics Group Institute of Inforatics and Applications, University of

More information

Image Filter Using with Gaussian Curvature and Total Variation Model

Image Filter Using with Gaussian Curvature and Total Variation Model IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.

More information