Performance Modeling of Database Servers in a Telecommunication Service Management System
|
|
- Wilfred Reeves
- 5 years ago
- Views:
Transcription
1 ICDT : The Seventh Internationa Conference on Digita Teecounications Perforance Modeing of Database Servers in a Teecounication Service Manageent Syste Maria Kih, Paya Aani, Anders Robertsson, Gabriea Radu, Manfred Derantz, and Berti Aspernäs 3 Dept. of Eectrica and Inforation Technoogy, Lund University, Sweden Dept. of Autoatic Contro, Lund University, Sweden 3 Ericsson AB, Karsrona, Sweden {aria.ih, paya.aani, anfred.derantz}@eit.th.se uinita.radu@gai.co, andersro@contro.th.se, berti.aspernas@ericsson.co Abstract Resource optiization echaniss, as adission contro and traffic anageent, require accurate perforance odes that capture the dynaics of the syste during high oads. The ain objective of this paper is to deveop an accurate perforance ode for database servers in a teecounication service anageent syste. We investigate the use of a server ode with oad dependency. Concurrent requests add oad to the syste and decrease the server capacity. We derive expicit equations for the state probabiities, the average nuber of jobs in the syste and the average response ties. Further, we present soe heuristics on how to tune the paraeters for given easureent data. Aso, using testbed experients, we vaidate that the ode accuratey captures the dynaics of a database server with write-heavy woroad. Index Ters Perforance anageent; teecounication systes; queuing theory; database servers. I. ITRODUCTIO Resource anageent of server systes has gained uch attention in the ast years, since poory anaged resources can severey degrade the perforance of a coputer syste. The experience is that enterprise servers are often the bottenecs, whereas the networ bacbone is often underutiized. Therefore, the server systes ust provide perforance guarantees which satisfy the service-eve agreeents (on deay, QoS, etc). Aso, the syste ust provide gracefu perforance degradation during overoad. However, a optiization techniques require accurate perforance odes of the invoved coputing systes. The operation region is ainy high traffic oad scenarios, which eans that the coputing systes show non-inear dynaics that needs to be characterized accuratey. A software syste is basicay a networ of queues, as exapes, the CPU ready queue, seaphore queues, socet queues, and I/O device queues, which store requests in waiting of service in the processors. Therefore, queuing odes can be used when describing the dynaic behavior of server systes [] [] [3] [4]. In a previous wor [], we have shown that web servers with dynaic content can be odeed as singe server queuing systes with processor sharing, where the high oad dynaics can be captured with an M/M/ syste. However, this resut is ony vaid for systes with CPU intensive woroad. Soe recent experients on databases have shown that the high oad dynaics of database servers are copetey different for queries invoving write operations [5]. Since database servers are iportant coponents in Teecounication service anageent systes, it is, therefore, iportant to deveop new odes for database servers with write-heavy operations. The concept of oad dependent server (LDS) odes in which the response tie of the jobs in the syste is a function of the service tie of the jobs and current nuber of jobs waiting to be serviced has, to the best of our nowedge, firsty been introduced in [6]. Ra et a. [7], Curie et a. [8] and Perros et a. [6] used standard benchars for woroad generation and aso regression odes to capture the syste dynaics. A uti-step ode paraeter caibration strategy was used for fine tuning of the paraeters in the ode. The resuting odes were cassified as data driven odes. Mathur and Apte [9] presented a queuing networ ode which represents the oad dependent behavior of the LDS. Their ode was not anayzed theoreticay and was ony vaidated with siuations. A theoretica anaysis of the D/G/ and M/G/ odes with oad dependency assuptions was presented in [] by Leung. These odes were deveoped to be used in congestion contro in broadband networs. In this paper, we add the oad dependency behavior to an M/M/ ode. The steady state probabiities, average nuber of jobs in the syste and average response ties are deterined using queuing theory. Aso, we perfor the sae anaysis for the case where the queue is iited. The ode has a sipe structure and can be tuned for various oad and database configurations. Further, in order to tune the paraeters of the ode to represent the current database and oad setup, effects of variations of each paraeter on the ean response tie of the queries sent to the database as a function of ean effective Copyright (c) IARIA,. ISB:
2 ICDT : The Seventh Internationa Conference on Digita Teecounications arriva rate has been studied. Furtherore, soe heuristics for tuning the ode paraeters are introduced. By eans of these heuristics, the ode paraeters can be tuned to atch the easureents fro the database in a few steps. Finay, eans that previous wor on perforance odeing of server systes is not appicabe since they assue CPU-intensive woroad. Request Request Figure. M/M/ ode. Repy Manageent Syste (MAS) Repy Other traffic Database nodes (Ds) Figure. Teecounication service anageent systes. experienta resuts show that this ode is abe to capture the high oad dynaics of the database server. This paper is organized as foows. The description of the syste is introduced in Section II. Section III is dedicated to introduction of the oad-dependent server ode. Experient setups and resuts are shown in Section IV. Section V concudes the paper. II. SYSTEM AD PROBLEM DESCRIPTIO In teecounication service oriented architectures, as obie networs, a services, either user services as teephony, or adinistrative services as ocation updates or biing, are handed by a service anageent syste with its own networs and protocos, as iustrated in Figure. The service anageent systes have a copex architecture, usuay ipeented as arge distributed server systes, with Manageent appication servers (MAS) processing service requests fro the teeco networs, and databases (Ds) storing subscriber and service data. The Ds are oaded with service traffic fro other networs. A signaing is perfored across IP networs, with standardized appication ayer protocos, as Lightweight Directory Access Protoco (LDAP) or Sipe Object Access Protoco (SOAP). The syste is required to have high reiabiity for varying traffic oads, where the Ds ay be overoaded by the traffic coing fro other networs. The nodes can be owned by different networ operators, iiting the avaiabe inforation of traffic oads and service progress. A signaing is perfored across IP networs. In this paper, we focus on the odeing aspects of database servers in teecounication service anageent systes. The objective is to deveop a perforance ode for the database server that captures the dynaics during high oads. The perforance ode can be used in resource optiization schees, as adission contro systes, in order to axiize the throughput of the database server, whie eeping soe atency constraints. One of the chaenges for these database servers is that they have a write-heavy woroad, which eans that the CPU is not the bottenec during high oads. This III. LOAD-DEPEDET SERVER MODEL Perforance odes are aied to be used in the process of designing anageent entities for server systes. Therefore, the perforance ode shoud capture the doinant dynaics of the server syste. Most service perforance etrics such as response tie, service rate and processing deay depend on queue state dynaics. A. Singe server queues For the objective of perforance contro, sipe odes, based on the assuption of a singe server queue, are often preferred. The ode shoud ony capture the doinating oad dynaics of the syste, since a we-designed contro syste can hande any ode uncertainties []. The cassica M/M/ ode, where a singe-server queue processes requests that arrive according to a Poisson process with exponentia distributed service ties, see Figure, has been shown to accuratey capture the response tie dynaics of a web server syste []. B. M/M/ ode with oad dependency (M/M/-LDS) In this paper, we propose to add oad dependency to an M/M/ syste. In a oad-dependent server odes, the service tie for a request wi be dependent on the nuber of concurrent requests in the syste. This oad dependency wi ode effects of the operating syste, eory use, etc., which ay cause service degradation when there are any concurrent jobs in a coputing syste [8]. In the experient section, we wi show that the M/M/-LDS ode accuratey captures the behavior of write-heavy woroad. The properties of the oad dependent M/M/ ode (M/M/-LDS) are set by an exponentia distributed base processing tie x base = / and a dependency factor (f). When a request enters the syste, it gets the base processing tie x base assigned to it. A singe request in the syste wi aways have a processing tie of x base. Each additiona request inside the syste increases the residua wor for a requests inside the syste (incuding itsef) by a percentage equa to the dependency factor f. When a request eaves the syste a other requests have their residua wor decreased by f percent again. This eans that if n concurrent requests enter the syste at the sae point, they wi a have a processing tie of x ( n) x ( f ) n s base () A specia case is when f =. It eans that there is no oad dependency, and a requests wi have processing tie x base. The syste can process a axiu of concurrent requests at each tie instance. Any additiona request wi Copyright (c) IARIA,. ISB:
3 ICDT : The Seventh Internationa Conference on Digita Teecounications have to wait in the queue. ew requests arrive according to a Poisson process with average rate. Figure 3. Iustration of M/M/-LDS ode as a Marov chain. Therefore, the syste can be odeed as a Marov chain as iustrated in Figure 3. The average service rate of the syste that depends on the nuber of concurrent requests in the syste, is derived as foowed: ( f ) if if ( f ) By soving the baance equations, stationary probabiity distribution of existence of concurrent requests in the syste is cacuated as beow: ( ) ( f ) if! ( )( ) ( f ) if! As the su of the probabiities of a possibe states equas to one, can be derived as foows: ( ) ( ) ( f ) ( f )! ( )!( ( f ) ) The stabiity condition in this case is ( f ) (6) The average nuber of requests in the syste,, can be cacuated as beow: ( f ) ( f ) ( ) ( )! 3 ( f ) ( f ) ( ) ( f ) ( ( )( f ) ) ( )!( ( f ) ) ( ) ( f ) + ( f ) ( f ) ( f ) (3) (4) (5) (7) Finay by eans of Litte s theore, the average tie each request spends in the syste, T, can be derived as foows. T C. M/M//n ode with oad dependency (M/M//n-LDS) In case that the queue is iited to n positions, the probabiity for an epty syste,, can be deterined as foows. This queuing syste is naed as M/M//n-LDS. I II III I ( f )! ( ) nn n ( f ) II f III n n!( ( ) ) ( ) ( f ) ( )!( ( f ) ) Further, the average nuber of requests in the syste is as foows: ( f)! ( ) f f n n n 3 D D D 3 n n 3 ` nn n f n n ` nn f n ( f ) n ( ) f f! f D! D f n nn n f f f n 3 D 3 f f! f (8) (9) () Finay, the average response tie for a request can be derived using Litte s theore. D. Paraeter tuning In a teeco syste with atency constraints, the doinant dynaic of the syste is often characterized by the average response tie, T, when varying the average arriva rate,. Tuning of the paraeters of the oad dependent server ode Copyright (c) IARIA,. ISB:
4 ICDT : The Seventh Internationa Conference on Digita Teecounications in a way that it fits the easured data fro the actua server syste is a necessary step in odeing of such systes. Assuing that and T are easureabe, and therefore, nown, there are three ain paraeters for the M/M/-LDS ode,, f and to tune in order to fit the ode on the easured data. Further, for the M/M//n-LDS there is an extra paraeter, n, to tune. Therefore, in Figures 4-8, we have iustrated the effect of changing ode paraeters. In the rest of the paper, this graph wi be caed the /T graph. In each figure, we have assued that two (three) of the paraeters are fixed and the one that is entioned is the variabe. As the equations for cacuating the ean response tie, is rather copex and the paraeters are interdependent, ore than one set of paraeters can be fit on the easured data. Thus using these figures, we can achieve a heuristic rue for tuning the paraeters of the oad dependent server ode. In the cases where the M/M/-LDS ode is used, the first paraeter to be tuned is the nuber of servers,. As it can be seen in Figure 4, by increasing the axiu nuber of concurrent requests that can be processed in the syste, the inear part of the /T graph wi be shorter and the exponentia rising rate of the graph is increased. In this case it is assued that (f, ) = (.7, ). The second paraeter to be tuned is the dependency factor, f. As shown in Figure 5, by decreasing the dependency factor, the inear part of the /T graph is increased, however, the change is sower than in the case where is decreased. On the other hand the exponentia rising rate of the graph is increased in coparison with the case where is decreased. Here, it is assued that (, ) = (3, ). The effects of changing on the/t graph whie fixing the two other paraeters is iustrated in Figure 6. As shown in the figure, by increasing in equa steps, the /T graph wi be shifted to the right in equa steps. In this case, the rate of rising of the graph is decreased. In this case, (, f) = (3,.7). Figure 5. Variations of /T graph for a specia scenario with f as variabe when (,) = (3, ). Figure 6. Variations of /T graph for a specia scenario with as variabe when (, f) = (3,.7). In cases where the M/M//n-LDS ode is used, there wi be a saturation of the response ties when the oad is high enough to overoad the queue. Here it is assued that the defaut vaues are (, n, f, ) = (4, 5,.6, ). Figure 7 and Figure 8 show the effects when varying and f respectivey. In each case the vaues of the other three paraeters are constant. The genera effect of changing the paraeters is siiar as for the case with the infinite queue, with the difference that the response ties saturate when the oad is high. Figure 4. Variations of the /T graph for a specia scenario with as variabe when (f,) = (.7, ). Figure 7. Variations of /T graph for a specia scenario with as variabe when (n, f, ) = (5,.6, ). Copyright (c) IARIA,. ISB:
5 ICDT : The Seventh Internationa Conference on Digita Teecounications Figure 8. Variations of /T graph for a specia scenario with f as variabe when (, n, ) = (4, 5, ). IV. EXPERIMETS AD RESULTS To vaidate the proposed ode, we have perfored a series of experients in our server ab. We deveoped a database server testbed with a traffic generator and a MySQL 5..4 database server, see Figure 9. The coputers were connected to a oca Fast Ethernet Mbit/s networ. A. Testbed The traffic generator was ipeented in Java, using the JDBC MySQL connector, and it was executed on a coputer with an AMD Pheno II X6 55T Processor at.8 GHz and 4 GB ain eory. The operating syste is Ubuntu.4. LTS. The traffic generator used woring threads and generates MySQL queries according to a Poisson process with average rate queries per second. The behavior of the traffic generator was vaidated in order to guarantee that it was not a bottenec in the experients. The database server has severa reations with the sae structure but with different nuber of tupes. The axiu nuber of aowed concurrent connections is set to. The structure of the reations coes fro the Scaabe Wisconsin Benchar [] with iion tupes. Two basic types of queries are used, SELECT (read) and UPDATE (write). The queries oo ie this SELECT * FROM <reation> WHERE unique=?; UPDATE <reation> SET unique=? WHERE unique=?; The question ars are repaced with unifory distributed rando nubers fro zero to ten iion. Traffic Generator Figure 9. Database server testbed. MySQL Figure. Perforance of the M/M//n-LDS queuing ode in odeing steady state dynaics of a MySQL database server using ony update queries. B. Resuts The dynaics of a database server highy depends on the ix of requests, since Seect and Update queries require different aount of server capacity. Therefore, we have perfored experients with varying woroad ix. Figures and show the resuts fro experients where the arriva rate is varied fro ow oad to high oad. The graphs show the average response ties of update queries as a function of the arriva rate. We have fitted M/M//n-LDS odes for the data using the tuning steps in Section III. In both scenarios, the CPU utiization was very ow, aso for high oads. The axiu CPU oad was about 5%. In Figure, the woroad is based on % Update queries. The fitted ode in this case has the foowing paraeters (, n, f, ) = (3, 8,.75, 37.). In order to ode the networ deays, we have added a bias of.3 seconds in the average response ties of the proposed ode. Figure depicts the sae experient setup when using a ix of 5% Seect and 75% Update queries. The fitted M/M//n-LDS ode in this case has the foowing paraeters (, n, f, ) = (6, 73,.44, 35.). In order to ode the networ deays, we have added a bias of.3 seconds in the average response ties of the proposed ode. Figures and verify that the proposed ode can represent the average dynaics of a database server with write-heavy woroad very we. V. COCLUSIOS AD FUTURE WORKS Resource anageent schees require accurate perforance odes that capture the doinant dynaics of the syste in high oads. For server systes with write-heavy woroad, oad dependent server (LDS) odes can be used to ode the dynaic overhead effects of concurrent requests. In this paper, queuing theoretic etrics ie average nuber of the requests in the syste, average tie in the syste for each request and the steady state probabiities for M/M/-LDS odes with both uniited and iited queues have been derived. Further, it has been shown via experients that the M/M//n-LDS ode represents the average dynaics of the database server very we. The resuts are aied at singe Copyright (c) IARIA,. ISB:
6 ICDT : The Seventh Internationa Conference on Digita Teecounications database servers, and not aied at data centers, which have different dynaics. Furtherore, we wi use this ode in order to design controers and state estiators for resource anageent and adission contro of database servers. VI. ACKOWLEDGMETS The authors at Lund University are ebers of the Lund Center for Contro of Copex Engineering Systes. The wor is party funded by the Swedish Research Counci, grant VR REFERECES [] J. Cao, M. Andersson, C. yberg and M. Kih, Web Server Perforance Modeing using an M/G//K*PS Queue, Proc. of the Internationa Conference on Teecounication, 3. [] J. Diey, R. Friedrich, T. Jin, and J. Roia, Web server perforance easureent and odeing techniques, Perforance Evauation, Vo. 33, o., 998. [3] D. A. Menascé and V. A. F. Aeida. Capacity Panning for Web Services, Prentice Ha,. [4] R. D. van der Mei, R. Hariharan, and P. K. Reeser, Web server perforance odeing, Teecounication Systes, Vo. 6, o. 3,. [5] M. Kih, G. Cedersjö, A. Robertsson, B. Aspernäs, Perforance easureents and odeing of database servers, Sixth Internationa Worshop on Feedbac Contro Ipeentation and Design in Coputing Systes and etwors,. [6] H. Perros, Y. Daery, and G. Pujoe, Anaysis of a queuing networ ode with cass dependent window fow contro, IFOCOM 9. Eeventh Annua Joint Conference of the IEEE Coputer and Counications Societies, IEEE, pp vo., May 99. [7] A. Ra, A. Sguegia, "Instantaneous Load Dependent Servers (ilds) Mode for Web Services," In Proceedings of the Internationa Conference on Copex, Inteigent and Software Intensive Systes,. [8] Curie, M. and Puigjaner, R., Using oad dependent servers to reduce the copexity of arge cient-server siuation odes, Perforance Engineering, Springer-Verag Berin Heideberg, pp. 3-47,. [9] V. Mathur and V. Apte, A coputationa copexity aware ode for perforance anaysis of software servers, in Proc. of Modeing, Anaysis and Siuation of Coputer and Teecounication Systes (MASCOTS), IEEE Coputer Society, pp , 4. [] Kin K. Leung, Load-dependent service queues with appication to congestion contro in broadband networs, Perforance Evauation, Vo. 5, Issue, pp. 7-4, October. [] K J. Åströ and B. Wittenar, Coputer Controed Systes, Upper Sadde River, J: Prentice Ha, 997. [] D.J. DeWitt, The Wisconsin benchar: Past, present, and future, The Benchar Handboo for Database and Transaction Processing Systes,, 99. Figure. Perforance of the M/M//n-LDS queuing ode in odeing steady state dynaics of a MySQL database server using ixed queries. Copyright (c) IARIA,. ISB:
Database Replication Algorithm Performance in High Speed Networks Under Load Balancing
Database Repication Agorith Perforance in High Speed Networks Under Load Baancing Rekh Nath Singh 1, Raghura Singh 2 1 Research Schoar, A. P. J. Abdu Kaa Technica University, Lucknow, India. 2 Director,
More informationConcise Papers. Main Memory Indexing: The Case for BD-Tree 1 INTRODUCTION 3 COST ANALYSIS 2 THE MEMORY-BASED BD-TREE
870 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 16, NO. 7, JULY 2004 Concise Papers Main Meory Indexing: The Case for BD-Tree BinCui,BengChinOoi,Meber, IEEE, Jianwen Su, Senior Meber, IEEE,
More informationA Fast Recovery Technique for Multi-Point to Multi-Point MPLS tunnels
M. Chaitou and J. L. Roux / IJECCT 01, Vo. (3) 34 A Fast Recovery Technique for Muti-Point to Muti-Point MPLS tunnes Mohaad Chaitou and Jean-Louis Le RouxOrange Labs avenue Pierre Marzin, 300 Lannion France
More informationA NEW METHOD FOR OPTIMAL LOCATION OF FACTS CONTROLLERS USING GENETIC ALGORITHM
Journa of heoretica and Appied Inforation echnoogy 200-2007 JAI. A rights reserved. www.atit.org A NEW MEHOD FOR OPIMAL LOCAION OF FACS CONROLLERS USING GENEIC ALGORIHM 1 K. Vayakuar, 2 Dr. R. P. Kuudinidevi
More informationExtending Graph Rewriting for Refactoring
Extending Graph Rewriting for Refactoring Nies Van Eetvede, Dirk Janssens University of Antwerp Departent of oputer science Middeheiaan 1 2020 Antwerpen {nies.vaneetvede dirk.janssens@ua.ac.be Abstract.
More informationDETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS
DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,
More informationImproving Memory Energy Using Access Pattern Classification
Iproving Meory Energy Using Access Pattern Cassification Mahut Kandeir Microsystes Design Lab Pennsyvania State University University Par, PA 16802 andeir@cse.psu.edu Ugur Sezer ECE Departent University
More informationA Secure Approach for Caching Contents in Wireless Ad Hoc Networks
A Secure Approach for Caching Contents in Wireess Ad Hoc Networks Mohsen Karizadeh Kiskani and Haid R. Sadjadpour Abstract Caching ais to store data ocay in soe nodes within the network to be abe to retrieve
More informationA Memory Grouping Method for Sharing Memory BIST Logic
A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5
More informationLanguage Identification for Texts Written in Transliteration
Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy
More informationService Scheduling for General Packet Radio Service Classes
Service Scheduing for Genera Packet Radio Service Casses Qixiang Pang, Amir Bigoo, Victor C. M. Leung, Chris Schoefied Department of Eectrica and Computer Engineering, University of British Coumbia, Vancouver,
More informationUtility-Based Resource Allocation for Mixed Traffic in Wireless Networks
IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng
More informationPERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL
IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant
More informationAn Efficient Approach for Content Delivery in Overlay Networks
An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr
More informationGame Theory-Based Nonlinear Bandwidth Pricing for Congestion Control in Cloud Networks
216 IEEE 8th Internationa Conference on Coud Coputing Technoogy and Science Gae Theory-ased Noninear andwidth Pricing for Congestion Contro in Coud Networs Abouzar Ghavai, Zhuozhao Li and Haiying Shen
More informationAutomatic Conversion Software for the Safety Verification of Goal-Based Control Programs
Subitted, 2009 Internationa Conference on Software Engineering (ICSE) http://www.cds.catech.edu/~urray/papers/2008t_h09-icse.ht Autoatic Conversion Software for the Safety Verification of Goa-Based Contro
More informationRunning Tite: Conict-Free Access of Paths Address for Correspondence: M.C. Pinotti IEI-CNR Via S. Maria, Pisa ITALY E-ai:
Mappings for Conict-Free Access of Paths in Bidiensiona Arrays, Circuar Lists, and Copete Trees Aan A. Bertossi y and M. Cristina Pinotti Istituto di Eaborazione de' Inforazione Nationa Counci of Research
More informationPARALLEL database systems are essential to important
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 13, NO. 12, DECEMBER 2002 1211 Load Baanced and Optia Disk Aocation Strategy for Partia Match Queries on Mutidiensiona Fies Saja K. Das, Meber,
More informationAs Michi Henning and Steve Vinoski showed 1, calling a remote
Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware
More informationDerivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router
Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of
More informationModelling and Performance Evaluation of Router Transparent Web cache Mode
Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7,1316-1320 Modeing and Performance Evauation of Transparent cache Mode Emad Hassan A-Hemiary Network Engineering Department, Coege of Information Engineering,
More informationQuality of Service Evaluations of Multicast Streaming Protocols *
Quaity of Service Evauations of Muticast Streaming Protocos Haonan Tan Derek L. Eager Mary. Vernon Hongfei Guo omputer Sciences Department University of Wisconsin-Madison, USA {haonan, vernon, guo}@cs.wisc.edu
More informationLoad Balancing by MPLS in Differentiated Services Networks
Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,
More informationArea Efficient Implementation of Elliptic Curve Point Multiplication Algorithm
(IJACSA) Internationa Journa of Advanced Coputer Science and Appications, Vo. 6, No., 5 Area Efficient Ipeentation of Eiptic Curve Point Mutipication Agorith Suni Devidas Bobade Research Schoar S.G.B.Aravati
More informationHiding secrete data in compressed images using histogram analysis
University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University
More informationFormalising Refactorings with Graph Transformations
Fundaenta Inforaticae XXI (200) 00 022 00 IOS Press Foraising Refactorings with Graph Transforations To Mens C Prograing Technoogy Lab Vrije Universiteit Brusse Peinaan 2, 050 Brusse, Begiu to.ens@vub.ac.be
More informationReplication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs
Repication of Virtua Network Functions: Optimizing Link Utiization and Resource Costs Francisco Carpio, Wogang Bziuk and Admea Jukan Technische Universität Braunschweig, Germany Emai:{f.carpio, w.bziuk,
More informationTSR: Topology Reduction from Tree to Star Data Grids
03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen
More informationAd Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks
Ad Hoc Networks (3) 683 698 Contents ists avaiabe at SciVerse ScienceDirect Ad Hoc Networks journa homepage: www.esevier.com/ocate/adhoc Dynamic agent-based hierarchica muticast for wireess mesh networks
More informationOPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS
Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented
More informationMosaicShape: Stochastic Region Grouping with Shape Prior
Boston University Coputer Science Technica Report No. 2005-008, Feb. 2005. To appear in Proc. CVPR, 2005. MosaicShape: Stochastic Region Grouping with Shape Prior Jingbin Wang Erdan Gu Margrit Bete Coputer
More informationInvestigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks
Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,
More informationFastest-Path Computation
Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods
More informationQoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization
QoS-Aware Data Transmission and Wireess Energy Transfer: Performance Modeing and Optimization Dusit Niyato, Ping Wang, Yeow Wai Leong, and Tan Hwee Pink Schoo of Computer Engineering, Nanyang Technoogica
More informationLines and Angles. introduction
9 Lines and nges intrductin In cass VI, you have earnt soe basic concepts and ters of geoetry point, ine, pane, ine segent, ray, ange and types of anges. In this chapter, we sha earn about soe pairs of
More informationJoint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points
Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University
More informationA Petrel Plugin for Surface Modeling
A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica
More informationAnalysing Real-Time Communications: Controller Area Network (CAN) *
Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination
More informationA Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks
Sensors 2013, 13, 16424-16450; doi:10.3390/s131216424 Artice OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journa/sensors A Near-Optima Distributed QoS Constrained Routing Agorithm for Mutichanne Wireess
More informationTesting Whether a Set of Code Words Satisfies a Given Set of Constraints *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG
More informationMAC schemes - Fixed-assignment schemes
MAC schees - Fixed-assignent schees M. Veeraraghavan, April 6, 04 Mediu Access Control (MAC) schees are echaniss for sharing a single link. MAC schees are essentially ultiplexing schees. For exaple, on
More informationDifferent criteria of dynamic routing
Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich
More informationAN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART
13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of
More informationThe Internal Conflict of a Belief Function
The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of
More informationAn Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.
[Type text] [Type text] [Type text] ISSN : 0974-7435 Voume 10 Issue 16 BioTechnoogy 014 An Indian Journa FULL PAPER BTAIJ, 10(16), 014 [999-9307] Study on prediction of type- fuzzy ogic power system based
More informationShortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm
International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University
More informationA Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm
A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm
More informationLocation Aided Hybrid Routing Algorithm for MANET
Internationa Journa of Engineering & Technoogy IJET-IJENS Vo: No: 0 30 Location Aided Hybrid Routing Agorithm for MANET Mamoun Hussein Mamoun Facuty of Computer and Information Sciences Mansoura University,
More informationNearest Neighbor Learning
Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification
More informationA Hybrid Network Architecture for File Transfers
JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,
More informationQUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS
QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755
More informationSelf-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System
Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong
More informationDatabase Design on Mechanical Equipment Operation Management System Zheng Qiu1, Wu kaiyuan1, Wu Chengyan1, Liu Lei2
2nd International Conference on Advances in Mechanical Engineering and Industrial Inforatics (AMEII 206) Database Design on Mechanical Equipent Manageent Syste Zheng Qiu, Wu kaiyuan, Wu Chengyan, Liu Lei2
More informationEvaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds
Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles
More informationLARGE SCALE MARS MAPPING AND ROVER LOCALIZATION USING DESCENT AND ROVER IMAGERY
LRGE SCLE MRS MIG D ROVER LOCLIZIO USIG DESCE D ROVER IMGERY Rongxing LI *, Fei M *, Fengiang U *, Larry MHIES **, Cark OLSO **, Yaing IOG ** * Departent of Civi and Environenta Engineering and Geodetic
More informationPerformance Analysis of RAID in Different Workload
Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,
More informationNo connection establishment Do not perform Flow control Error control Retransmission Suitable for small request/response scenario E.g.
UDP & TCP 2018/3/26 UDP Header Characteristics of UDP No connection estabishment Do not perform Fow contro Error contro Retransmission Suitabe for sma request/response scenario E.g., DNS Remote Procedure
More informationEvaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS
Evaluation of the Tiing Properties of Two Control Networs: CAN and PROFIBUS Max Mauro Dias Santos 1, Marcelo Ricardo Steer 2 and Francisco Vasques 3 1 UnilesteMG, CEP 35170-056, Coronel Fabriciano MG Brasil.
More informationFurther Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code
Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222
More informationMACHINE learning techniques can, automatically,
Proceedings of Internationa Joint Conference on Neura Networks, Daas, Texas, USA, August 4-9, 203 High Leve Data Cassification Based on Network Entropy Fiipe Aves Neto and Liang Zhao Abstract Traditiona
More informationAdaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN
Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan
More informationTelephony Trainers with Discovery Software
Teephony Trainers 58 Series Teephony Trainers with Discovery Software 58-001 Teephony Training System 58-002 Digita Switching System 58-003 Digita Teephony Training System 58-004 Digita Trunk Network System
More informationFeedback-Free Packet Loss Recovery for Video Multicast
Feedback-Free Packet Loss Recovery or Video Muticast Xing Zheng S.-H. Gary Chan Qian Zhang Wen-Wu Zhu Ya-Qin Zhang Department o Computer Science Microsot Research Asia The Hong Kong University o Science
More informationResearch of Classification based on Deep Neural Network
2018 Internationa Conference on Sensor Network and Computer Engineering (ICSNCE 2018) Research of Emai Cassification based on Deep Neura Network Wang Yawen Schoo of Computer Science and Engineering Xi
More informationProviding Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks
The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department
More informationCollaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Middle Attacks
Coaborative Approach to Mitigating ARP Poisoning-based Man-in-the-Midde Attacks Seung Yeob Nam a, Sirojiddin Djuraev a, Minho Park b a Department of Information and Communication Engineering, Yeungnam
More informationThe Application of Bandwidth Optimization Technique in SLA Negotiation Process
The Application of Bandwidth Optiization Technique in SLA egotiation Process Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia
More informationA comparative study of colortexture
12th Int. Worshop on Systes, Signas & Iage Processing, 22-24 Septeber 2005, haida, Greece 205 A coparative study of coortexture iage features Diitris Iaovidis* Departent of Inforatics and Teecounications,
More informationEfficient Histogram-based Indexing for Video Copy Detection
Efficient Histogram-based Indexing for Video Copy Detection Chih-Yi Chiu, Jenq-Haur Wang*, and Hung-Chi Chang Institute of Information Science, Academia Sinica, Taiwan *Department of Computer Science and
More informationECE544: Communication Networks-II, Spring Transport Layer Protocols Sumathi Gopal March 31 st 2006
ECE544: Communication Networks-II, Spring 2006 Transport Layer Protocos Sumathi Gopa March 31 st 2006 Lecture Outine Introduction to end-to-end protocos UDP RTP TCP Programming detais 2 End-To-End Protocos
More informationNeural Network Enhancement of the Los Alamos Force Deployment Estimator
Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the
More informationOptimization and Application of Support Vector Machine Based on SVM Algorithm Parameters
Optimization and Appication of Support Vector Machine Based on SVM Agorithm Parameters YAN Hui-feng 1, WANG Wei-feng 1, LIU Jie 2 1 ChongQing University of Posts and Teecom 400065, China 2 Schoo Of Civi
More informationThe optimization design of microphone array layout for wideband noise sources
PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun
More informationDeterministic Voting in Distributed Systems Using Error-Correcting Codes
IEEE TRASACTIOS O PARALLEL AD DISTRIBUTED SYSTEMS, VOL. 9, O. 8, AUGUST 1998 813 Deterinistic Voting in Distributed Systes Using Error-Correcting Codes Lihao Xu and Jehoshua Bruck, Senior Meber, IEEE Abstract
More informationModeling Parallel Applications Performance on Heterogeneous Systems
Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln
More informationDesign of IP Networks with End-to. to- End Performance Guarantees
Design of IP Networks with End-to to- End Performance Guarantees Irena Atov and Richard J. Harris* ( Swinburne University of Technoogy & *Massey University) Presentation Outine Introduction Mutiservice
More informationIrDA IrLAP Throughput Optimisation with Physical Layer Consideration
IrDA IrLAP Throughput Optimisation with Physica Layer onsideration Abstract Barker, P. & Boucouvaas, A.. Mutimedia ommunications Research Group Schoo of Design, Engineering & omputing Bournemouth University,
More informationStraight-line code (or IPO: Input-Process-Output) If/else & switch. Relational Expressions. Decisions. Sections 4.1-6, , 4.
If/ese & switch Unit 3 Sections 4.1-6, 4.8-12, 4.14-15 CS 1428 Spring 2018 Ji Seaman Straight-ine code (or IPO: Input-Process-Output) So far a of our programs have foowed this basic format: Input some
More informationConflict graph-based Markovian model to estimate throughput in unsaturated IEEE networks
Confict graph-based Markovian mode to estimate throughput in unsaturated IEEE 802 networks Marija STOJANOVA Thomas BEGIN Anthony BUSSON marijastojanova@ens-yonfr thomasbegin@ens-yonfr anthonybusson@ens-yonfr
More informationAn Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks
An Adaptive Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent
More informationAdvances in Crystallographic Image Processing for Scanning Probe Microscopy
Advances in Crystaographic Iage Processing for Scanning Probe Microscopy P. Moeck Nano-Crystaography Group, Departent of Physics, Portand State University, 1719 SW 10 th Avenue (SRTC), Portand, OR 97201,
More informationBlackboard Mechanism Based Ant Colony Theory for Dynamic Deployment of Mobile Sensor Networks
Journa of Bionic Engineering 5 (2008) 197 203 Bacboard Mechanism Based Ant Coony Theory for Dynamic Depoyment of Mobie Sensor Networs Guang-ping Qi, Ping Song, Ke-jie Li Schoo of Aerospace Science and
More informationBacking-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism
Backing-up Fuzzy Contro of a Truck-traier Equipped with a Kingpin Siding Mechanism G. Siamantas and S. Manesis Eectrica & Computer Engineering Dept., University of Patras, Patras, Greece gsiama@upatras.gr;stam.manesis@ece.upatras.gr
More informationMETAMORPHOSIS OF PERIODIC SURFACE MODELS
Proceedings of ASE 2009 Internationa Design Engineering echnica Conferences & Coputers and Inforation in Engineering Conference IDEC/CIE 2009 August 0 Septeber 2, 2009, San Diego, Caifornia, USA DEC2009/DAC-870
More informationReal Time Displacement Measurement of an image in a 2D Plane
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882 Volue 5, Issue 3, March 2016 176 Real Tie Displaceent Measureent of an iage in a 2D Plane Abstract Prashant
More informationMulti Packet Reception and Network Coding
The 2010 Military Counications Conference - Unclassified Progra - etworking Protocols and Perforance Track Multi Packet Reception and etwork Coding Aran Rezaee Research Laboratory of Electronics Massachusetts
More informationOuterjoins, Constraints, Triggers
Outerjoins, Constraints, Triggers Lecture #13 Autumn, 2001 Fa, 2001, LRX #13 Outerjoins, Constraints, Triggers HUST,Wuhan,China 358 Outerjoin R S = R S with danging tupes padded with nus and incuded in
More informationResponse Surface Model Updating for Nonlinear Structures
Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,
More informationEnhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue
Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade
More informationResource Optimization to Provision a Virtual Private Network Using the Hose Model
Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,
More informationTALLINN UNIVERSITY OF TECHNOLOGY, INSTITUTE OF PHYSICS 17. FRESNEL DIFFRACTION ON A ROUND APERTURE
7. FRESNEL DIFFRACTION ON A ROUND APERTURE. Objective Exaining diffraction pattern on a round aperture, deterining wavelength of light source.. Equipent needed Optical workbench, light source, color filters,
More informationMultipath Selection and Channel Assignment in Wireless Mesh Networks
Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,
More informationLCD Video Controller. LCD Video Controller. Introduction Safety Precautions Indentifying the Components... 5
LCD Video Controer LCD Video Controer Introduction... 3 Safety Precautions... 4 Indentifying the Components... 5 Main Board... 5 Main Board ASIC Features... 6 LVDS Transmitter... 8 Backight Inverter...
More informationREVENUE-AWARE RESOURCE ALLOCATION IN THE FUTURE MULTI-SERVICE IP NETWORKS
REVENUE-AWARE RESOURCE ALLOCATION IN THE FUTURE MULTI-SERVICE IP NETWORKS Jian Zhang, Tio Haalainen, Jyrki Joutsensalo Dept. of Matheatical Inforation Technology, University ofjyvaskyla, FIN-40014 Jyvaskyla,
More informationMCSE Training Guide: Windows Architecture and Memory
MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the
More informationEnd-to-End QoS Provisioning for Real-Time Video Streaming over SP-Driven P2P Networks Using Admission Control
This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 29 proceedings End-to-End QoS Provisioning for Real-Tie Video
More informationWindows NT, Terminal Server and Citrix MetaFrame Terminal Server Architecture
Windows NT, Termina Server and Citrix MetaFrame - CH 3 - Termina Server Architect.. Page 1 of 13 [Figures are not incuded in this sampe chapter] Windows NT, Termina Server and Citrix MetaFrame - 3 - Termina
More informationEndoscopic Motion Compensation of High Speed Videoendoscopy
Endoscopic Motion Compensation of High Speed Videoendoscopy Bharath avuri Department of Computer Science and Engineering, University of South Caroina, Coumbia, SC - 901. ravuri@cse.sc.edu Abstract. High
More informationNON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH
NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH V. Atienza; J.M. Valiente and G. Andreu Departaento de Ingeniería de Sisteas, Coputadores y Autoática Universidad Politécnica de Valencia.
More informationCSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling
CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Scheduing Announcement Homework 2 due on October 25th Project 1 due on October 26th 2 CSE 120 Scheduing and Deadock Scheduing Overview In discussing
More information