Selective Flooding Based on Relevant Nearest-Neighbor using Query Feedback and Similarity across Unstructured Peer-to-Peer Networks
|
|
- Joleen Patrick
- 5 years ago
- Views:
Transcription
1 Journal of Computer Scence 5 (3): , 009 ISSN Scence Publcatons Selectve Floodng Based on Relevant Nearest-Neghbor usng Query Feedback and Smlarty across Unstructured Peer-to-Peer Networks 1 Iskandar Ishak and Naome Salm 1 Department of Computer Scence, Faculty of Computer Scence and Informaton Technology, Unversty Putra Malaysa, UPM, Selangor, Malaysa Faculty of Computer Scence and Informaton System, Unversty Technology Malaysa, Skuda, Johor, Malaysa Abstract: Problem statement: Effcent searchng s a fundamental problem for unstructured peer to peer networks. Floodng requres a lot of resources n the network and thus wll ncrease the search cost. Searchng approach that utlzes mnmum network resources s requred to produce effcent searchng n the robust and dynamc peer-to-peer network. Approach: Ths study addressed the need for effcent flood-based searchng n unstructured peer-to-peer network by consderng the content of query and only selectng peers that were most related to the query gven. We used mnmum nformaton to perform effcent peer selecton by utlzng the past queres data and the query message. We exploted the nearest-neghbor concept on our query smlarty and query hts space metrcs for selectng the most relevant peers for effcent searchng. Results: As demonstrated by extensve smulatons, our searchng scheme acheved better retreval and low messages consumpton. Concluson: Ths study suggested that, n an unstructured peer-to-peer network, floodng that was based on the selecton of relevant peers, can mprove searchng effcency. Key words: Unstructured peer-to-peer searchng, nformaton retreval, nearest neghbor INTRODUCTION Peer-to-peer system has phenomenally become popular n recent years for ts ablty to search and communcate across the globe. The prncpal operatons n any peer-to-peer networks s to effcently search and locate data or fle, whch s ultmately challengng due to ts dynamc and robust nature. The challenges are to develop searchng effcently able o locate the fle ntended. The dynamc nature of the peer-to-peer network where peers can jon and leave at anytme make the searchng to become effcent s even dffcult. The demand for advance searchng technque s always present as the peer-to-peer networks becomng larger and more complex and the network become faster and storage become cheaper. In a peer-to-peer network, a peer acts as clent and a server of the system. Peer-to-peer presents attractve soluton through ts scalablty, fault-tolerance and autonomy. Many real-world large scale peer-to-peer networks are unstructured. However, n ther basc structure; peer-to-peer suffers hgh cost when dealng wth locatng content effcently due to use of prmtve searchng and routng technque that uses large overhead and long query tme. Therefore t s crucal to select relevant peers to route query message to reduce the search cost and better retreval n unstructured peerto-peer network wthout the loss of the unstructured peer-to-peer dentty and characterstcs. Unstructured peer-to-peer networks such as Gnutella [1,] rely on a random process, that peers are nterconnected n a random way. Typcally, unstructured peer-to-peer search s based on floodng. Basc unstructured networks whch apply floodng technque for propagatng user queres s very expensve both n processng tme and resources. Several studes have addressed the completeness and scalablty ssues of floodng [3,4]. Although flood-based search s generally consdered neffcent, a number of efforts have been done to mprove the searchng n unstructured peer to peer to become more effcent Structured peer-to-peer networks have been developed to provde strct data locaton management [5,6]. It uses dstrbuted hash tables that assst the routng mechansm to mantan desrable propertes for quck lookup. Structured approach offers better search performance n terms of response tme and communcaton overhead when compared to the Correspondng Author: Iskandar Ishak, Department of Computer Scence, Faculty of Computer Scence and Informaton Technology, Unversty Putra Malaysa, Malaysa 184
2 unstructured system. However, despte ts hghly effectve approach, the system lacks partal match lookup capablty. The system also ncur larger overhead than unstructured peer-to-peer systems especally when the overlay s re-arrange whenever there s falng peers or leavng peers. Ths study proposes relevant nearest neghbor based search technque that explots mnmal nformaton n each peer. The algorthm s formulated to acheve effcent search and hgh retreval rate n unstructured peer-to-peer networks. Related work: The earlest technque for peer-to-peer routng s based on the Naïve Breadth-Frst Search (BFS) algorthm or Floodng. Ths technque s used n fle-sharng peer-to-peer applcaton Gnutella [1]. In ths approach, each query from a peer wll be broadcasted to all the peers n the network but restrcted by the TTL (tme to lve) value. Floodng may generate O(N) message where N s the number of node. As a result, the query consumes a great deal of processng resources and excessve network. In a worst case stuaton such as low bandwdth network, floodng could make the network become a bottleneck. Although, t s a robust and smple technque for query routng but t nvolves a great deal of communcaton overhead, that s, hgh n number of messages. Hop count s also ncreased exponentally. Some of the messages mght vst the same node that has been searched prevously. Therefore, communcaton overhead and scalablty are the man problems n ths approach. These problems have been proven n a number of papers [,7,8]. In the random Breadth-Frst-Search (BFS) approach [9,10], each peer forwards a search message to only a fracton of ts peers. Each node randomly selects a subset of peers connected to t and then propagates the search message to those peers. The advantage of ths technque s t does not need any global knowledge. Each peer s able to make local decson n a quck manner snce t needs only small porton of connected peers to route the query. Ths approach may generate only a fracton of messages compared to floodng approach. In random walks [4] approach, the requestng peer sends out a number of query messages to an equal number of random neghborng peers. Each of the query messages wll follow ther own path n whch ntermedate peers wll forward the messages to randomly chosen neghbor. These query messages are known as walkers. The walkers wll be termnated on both success and falure occasons and determned through the use of TTL of the messages or through the use of checkng method n whch the walker perodcally J. Computer Sc., 5 (3): , contact the source peer whether the termnaton condton s met. It acheves sgnfcant message reducton when compared to the floodng approach. However, the success rate and the number of hts depend largely on the network topology and the random choces t made. Another unstructured peer-to-peer searchng approach s the Drected BFS combned wth the Most Result n the Past n [11]. Each peer forwards a search message to a number of peers whch returned the most results for the last most current queres. The nature of ths approach s t allows peers explore larger network segments and fnd most stable neghbors. A content-based searchng for peer-to-peer based system s proposed n [1]. In ths approach, each peer wll have a specal ndex called flters to facltate query routng only to those that may contan relevant nformaton. Each peer mantans one flter that summarzes all documents that exst locally n the peer, called local flters. A merged flters s the flter that summarzng the document of a set of ts neghbors. When a query reaches a peer, the peer wll check ts local flter and uses the merged flter to route the query to the peers whose flters match the query. Intellgent Search Mechansm [9] s proposed as a searchng technque based on the smlarty of the query. In ths approach, each peer has ts own profle table that stores the nformaton they get from peers that answered ther queres. The nformaton stored n Table 1 s the query ID, peer ID and the query keywords that have been answered and also the query ht. Only the latest peer that answered the query wll be kept nto a table. Routng s based on the smlarty values of the query word wth the keyword from the past queres stored n the profle. Peers that have hgh smlarty wth the query wll be selected for routng. Ant Colony optmzaton s also used n unstructured peer-to-peer search n [13]. The approach s called SemAnt where t emulates the nature of ants cooperatng between themselves to fnd food based on the pheromone. The peers are the ones who act lke an ant and cooperated between them n creatng pheromone trals. The pheromone trals s the probablstc overlay networks and also ndcates the most promsng path for a gven query. As a result, the more popular a query becomes, the better the tral. The experments shown that the search algorthm s stable, robust and converges fast whole ts performance s pretty much acceptable. Table 1: Profle table Query ID Connecton and hts Tmestamps Amazon ran forest 1311 P(34), P34(), P5(56) 1011 Gulf ol rgs Null 10 Waste dsposal P4(34), P8(4) 1033
3 J. Computer Sc., 5 (3): , 009 MATERIALS AND METHODS Relevance-Nearest Neghbor based search (RNN) usng query feedback and smlarty: Our search approach consst of 3 components; profle table, relevance peers estmaton and nearest neghbor selecton. Profle table s used to store past query message and query hts from other peers who have answered prevous queres. The Relevance Nearest Neghbor based Search or RNN s based on the concept of gvng the same weght both on the query hts and query content smlarty wth the ncomng query and selectng only the nearest relevant peers. We also nclude the nearest neghbor approach to mnmze the search cost but at the same tme able to retreve hgh query hts or recall. The search method s bascally a floodng based search but s based on selectve floodng. The search algorthm s shown n Fg. 1. The objectve of ths searchng approach s to have an effcent search and hgh recall. For a peer p P, we use T(p) to denote set of past query mantaned by p. Each tem n T(p) has two attrbutes; query term, q and number of hts n, so we denote each data tem n T(p) as a par of q(p), n(p). By usng each q and n on T(p), we determne the relevance of a peer by usng the smlarty of all q(p) n T(p) to calculate the smlarty between them. On the other hand, we use n(p) to calculate the stablty of each peer n T(p). We defne a reference pont, whch s the hghest or optmum value of query smlarty and also the hghest query hts denoted as d pont. Relevance peer estmaton: The relevance-based component s based on the work n [14]. Ths component uses the peer smlarty-hts graph model. Our peer-smlarty graph model captures both the peer query hts and peer smlarty wth correspondng ncomng query (Fg. ). We used both nformaton gathered n the profle table whch s based on the work done n [9]. We ncorporated both, query content and connecton stablty nformaton to determne relevant peer to route query. Each peer stores nformaton about past queres and the query hts n a table. There wll be no global knowledge shared between all the peers but each peer wll also have a lst of data collected from the answered query and store t n neghbor profle table (Table 1). The profle table contans the ID of the answerng peer, connecton ID, the query words that have been answered by other peers and a tmestamp of the returned query. These query words are the words that matched the query sent by ths peer and the words are contaned n the peer are only answered query words. The lst wll keep the last M queres and a Least Recently Used (LRU) polcy wll keep the most recent queres n the table. The relevance value wll be based on two parameters, query hts and the smlarty value between the query to be routed and the stored past queres. Query hts determne peer connecton stablty wth the processng peers. The more query hts, the more stable the peer s connected and thus gvng the mpresson of the partcular peers connecton relablty. Smlarty value s based on cosne smlarty (1). q s the ncomng query whle q s the past queres stored n the profle table n each peer. As an example, let peer A has a lst of past queres; d. Query q s an ncomng query and s watng to be routed q wll be compared wth all the queres, q, n d. The smlarty between them wll determne the relaton between the content that the partcular peer has n ts storage wth the query terms. The most relevance of peers s peers that have among the most query hts and t has a content related to the ncomng query. Fg. 1: Relevance Nearest Neghbor Search algorthm that uses the Selectve floodng concept Fg. : Smlarty and Query hts metrc space 186
4 J. Computer Sc., 5 (3): , 009 Fg. 4: Doublng the normal search radus Fg. 3: Pont of reference estmaton We calculate the relevance value usng formula descrbed n (3). In ths formula, we are actually calculatng the dstance of relevance value of the peers nsde the profle table wth the most optmum relevance pont n the smlarty-query hts graph. M s the maxmum cosne value, n whch for the purpose of easy calculaton, we decded to defne M = 1. h s the returned hts values for a partcular query, whle H p s the maxmum hts retreved from all h that have been recorded. The formula to defne the maxmum hts (), nvolved the use of nearest-neghbor concept, whch wll be explaned later. N p s the total number of query hts of all peers stored n the neghbor profle table: Fg. 5 Nearest-neghbor search space RESULTS sm(q,q ) = p ( q * q ) (q) * (q ) (1) H = (h ) () H h p R(q,q ) = + M sm(q,q ) N p ( ) (3) Nearest neghbor selecton: We determne our group of peers wthn the relevance value by usng the nearest neghbor prncpal. It s based on the fast algorthm for nearest neghbor search proposed n [15]. The purpose of the applcaton of nearest neghbor method s to avod comparng all the peers nsde the table because table wth sze of N wll requre N tmes comparson and relevance calculaton process. As we can see n Fg. 3, nearest neghbors n our context are the peers that resdes wthn the area of radus r. However, nstead of selectng a statc value [14], we decded to make the value r dynamc. We determned the dynamc r value by explotng the nequalty of trangle (Fg. 4). The nequaltes wll determne a bound for peer selectons and therefore, less relevance values wll be compared to the dstance r (Fg. 5). 187 We evaluate the performance of our searchng approach by extendng a peer-to-peer smulator called Peerware. We generate 100 peers wth a total of documents. Each node holds random number of documents between documents. The document collecton used s the Reuters-1578 document collecton whch appeared on the Reuters newswre n Three dfferent number of query set are used; q100 that contan 100 random query terms; q75 contans 75 queres and q50 wth 50 query terms. Each query terms contan between two to fve words. Each peer s country-based and each peer holds news about that partcular country. One country could have more than one peer representatves n the network. We compare our approach wth the Most-Query Hts (MQH) and Intellgent Search Mechansm (ISM) approaches. We compare the search approaches based on query recalls, number of messages used and search effcency. s are the number of query matches wth the content of each peer, whle number of messages used s the number of messages used to answer a query. Search effcency s the performance evaluaton parameter that s calculated by dvdng recalls wth number of messages used: Search effcency = (4)
5 J. Computer Sc., 5 (3): , 009 DISCUSSION Our experments showed that our approach (RNN) s effcent n terms of network usage compared to the other two searchng technques. The experments that employed q50 showed that our searchng approach recorded the hghest recall when compared to the ISM and MQH technques. The recall s 4.87% hgher compared to the MQH approach and slghtly over than ISM approach wth 1.67% more than ISM recall (Fg. 6). Fgure 7 shows the message usage for all three approaches for query set q50 n whch our approach recorded the hghest number of message usage than MQH and ISM (4.79 and.1% respectvely). However, we recorded hghest effcency wth 38.1% hgher than MQH and 8.8% effcency hgher than ISM (Fg. 8). RNN also recorded hghest recall when employng the q75 query set n the experment, our approach stll managed to record hghest recall; as shown n Fg. 9. The RNN search recorded 4.31% hgher recall than MQH and 0.85% hgher recall than ISM. The RNN recorded 9.4% messages hgher than MQH but t yeld better search effcency wth 16.5% Fg. 6: recorded for 50 queres searchng RNN also recorded hgher number of messages used than the ISM wth 5.1% hgher but the RNN approach regstered 0.6% hgher search effcency than ISM. and search effcency graph for experment usng the query set q75 are shown n Fg. 10 and 11 respectvely. Our experment usng q100 query set also showed that RNN approach recorded hgh recall than other search technque. As shown n Fg. 1, RNN recorded 1.67% hgher recall than MQH approach and 0.% hgher recall than ISM. In terms of message usage, Search effcency Fg. 8: Search Effcency for 50 queres searchng Fg. 9: recorded for 75 queres searchng MQH ISM Relevant (NN) Fg. 7: for 50 queres searchng Fg. 10: for 75 queres searchng 188
6 J. Computer Sc., 5 (3): , 009 Search effcency Search effcency MQH ISM Relevant (NN) 0.03 Fg. 11: Search effcency for 75 queres searchng MQH ISM R elevant (NN) Fg. 1: recorded for 100 queres searchng Fg. 13: for 100 queres searchng we can show n Fg. 13 that RNN approach recorded 3.01% less message than MQH and 8.5% messages less than ISM approach. In the same experment settng, we found out that RNN search s the most effcent wth 13.51% more effcent than MQH and 17.95% more effcent than ISM (Fg. 14). Fg. 14: Search Effcency for 100 queres searchng CONCLUSION Ths study explots the query content and query feedback data for developng flood-based search n unstructured peer-to-peer that s mnmal n cost but gvng hgh retreval. RNN explots very mnmal data and also nearest-neghbor concept to reduce the cost of searchng n unstructured peer-to-peer networks. Our smulaton tests showed that our searchng approach performs better than the other two flood-based searchng approaches that also use mnmal data and local ndces. We showed that by usng mnmal nformaton of query hts and smlarty, effcent search n unstructured peer-to-peer can be acheved ACKNOWLEDGEMENT The researchers would lke to express ther cordal thanks to Demetrs Zenalpour for gvng the permsson to use the full data set of Reuters-1578 document collecton and the Peerware smulator. REFERENCES 1. Grossel, Y. and R. Manfred, 009. Gtk-Gnutella. Rpeanu, M., 001. Peer-to-peer archtecture case study: Gnutella network. Proceedng of the 1st Internatonal Conference on Peer-to-Peer Computng, Aug. 7-9, IEEE Xplore Press, USA., pp: DOI: /PP Cohen, E. and S. Shenker, 00, Replcaton strateges n unstructured peer-to-peer networks. Proceedngs of the 00 Conference on Applcatons, Technologes, Archtectures and Protocols for Computer Communcatons, Aug. 19-3, ACM Press, New York, USA., pp:
7 J. Computer Sc., 5 (3): , Lv, Q., P. Cao, E.C.A.T. Labs-Research, K. L and S. Shenker, 00. Search and replcaton n unstructured peer-to-peer networks. Proceedngs of the 16th Internatonal Conference on Supercomputng, June -6, ACM Press, New York, USA., pp: Ratnasamy, S., P. Francs, M. Handley, R. Karp and S. Shenker, 001. A scalable contentaddressable network. Proceedngs of the 001 Conference on Applcatons, Technologes, Archtectures and Protocols for Computer Communcatons, ACM Press, San Dego, Calforna, USA., pp: Stoca, I., R. Morrs, D. Karger, M.F. Kaashoek and H. Balakrshnan, 001. Chord: A scalable peer-to-peer lokup servce for nternet applcatons. Comput. Commun. Rev., 31: &ETOC=RN&from=searchengne 7. Ramanathan, M.K., V. Kalogerak and J. Pruyne, 00. Fndng good peers n peer-to-peer networks. Proceedng of the Internatonal Symposum on Parallel and Dstrbuted Processng, Apr , IEEE Computer Socety, Washngton DC., USA., pp: DOI: /IPDPS Kwok, S.H., K.Y. Chan and Y.M. Cheung, 005. A server-medated peer-to-peer system. ACM SIGecom Exchanges, 5: Zenalpour-Yazt, D., V. Kalogerak and D. Gunopolus, 005. Explotng localty for scalable nformaton retreval n peer-to-peer networks. Inform. Syst., 30: Dmakopolous, V. and E. Ptoura, 003. A peer-topeer approach to resource dscovery n mult-agent systems. Lecture Notes Comput. Sc., 78: DOI: /b Yang, B. and H. Garca-Molna, 00. Effcent search n peer-to-peer networks. Proceedng of the Internatonal Conference on Dstrbuted Computng System, (ICDCS 0), Venna, Austra, pp: Papers/GarcaMolna-showDoc.pdf 1. Kolonar, G. and E. Ptoura, 004. Content-based routng of path queres n peer-to-peer systems. Adv. Database Technol., 99: edy7.pdf 13. Mchlmayr, E., 006, Ant algorthms for search n unstructured peer-to-peer networks. Proceedng of the nd Internatonal Conference on Data Engneerng Workshop, IEEE Computer Socety, Washngton DC., USA., pp: DOI: /ICDEW Ishak, I. and N. Salm, 008. Explotng query feedbacks for effcent query routng n unstructured peer-to-peer networks. Proceedng of the Internatonal Conference on Multmeda, Internet and Web Engneerng, August, World Academy of Scence, Engneerng and Technology, Sngapore, pp: Orchard, M.T., A fast nearest-neghbor search algorthm. Proceedng of the Internatonal Conference on Acoustcs, Speech and Sgnal Processng, Apr , IEEE Xplore Press, USA., pp: DOI: /ICASSP
Simulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationA KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE
A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs
More informationEfficient Distributed File System (EDFS)
Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate
More informationThe Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique
//00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationResource Discovery in P2P Networks Using Evolutionary Neural Networks
> PAPER IDENTIFICATION NUMBER: 067-04 < Resource Dscovery n P2P Networks Usng Evolutonary Neural Networks Mkko A. VAPA, Nko P. KOTILAINEN, Annemar K. AUVINEN, Hekk M. KAINULAINEN, and Jarkko T. VUORI Abstract--
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationIJCTA Nov-Dec 2016 Available
Dr K Santh et al, Internatonal Journal of Computer Technology & Applcatons,Vol 7(6),773-779 Optmzed Route Technque for DSR Routng Protocol n MANET Dr.K.Santh, Assocate Professor, Dept. of Computer Scence,
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationAN INDEXING METHOD FOR SUPPORTING SPATIAL QUERIES IN STRUCTURED PEER-TO-PEER SYSTEMS
AN INDEXING METHOD FOR SUPPORTING SPATIAL QUERIES IN STRUCTURED PEER-TO-PEER SYSTEMS Lngku Meng a, Wenun Xe a, *, Dan Lu a, b a School of Remote Sensng and Informaton Engneerng, Wuhan Unversty, Wuhan 4379,
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationPerformance Evaluation of Information Retrieval Systems
Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence
More informationAn Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices
Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal
More informationCHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION
24 CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION The present chapter proposes an IPSO approach for multprocessor task schedulng problem wth two classfcatons, namely, statc ndependent tasks and
More informationVideo Proxy System for a Large-scale VOD System (DINA)
Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationLearning-Based Top-N Selection Query Evaluation over Relational Databases
Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **
More informationSubspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;
Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features
More informationParallel matrix-vector multiplication
Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more
More informationImproved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment
JOURNAL OF COMPUTERS, VOL. 4, NO. 9, SEPTEMBER 2009 873 Improved Resource Allocaton Algorthms for Practcal Image Encodng n a Ubqutous Computng Envronment Manxong Dong, Long Zheng, Kaoru Ota, Song Guo School
More informationResearch of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm
, pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,
More information6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour
6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationEfficient Content Distribution in Wireless P2P Networks
Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,
More informationA Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks
A Load-balancng and Energy-aware Clusterng Algorthm n Wreless Ad-hoc Networks Wang Jn, Shu Le, Jnsung Cho, Young-Koo Lee, Sungyoung Lee, Yonl Zhong Department of Computer Engneerng Kyung Hee Unversty,
More informationOptimizing Document Scoring for Query Retrieval
Optmzng Document Scorng for Query Retreval Brent Ellwen baellwe@cs.stanford.edu Abstract The goal of ths project was to automate the process of tunng a document query engne. Specfcally, I used machne learnng
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationVirtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory
Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process
More informationAdaptive Energy and Location Aware Routing in Wireless Sensor Network
Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}
More informationDistributed Resource Scheduling in Grid Computing Using Fuzzy Approach
Dstrbuted Resource Schedulng n Grd Computng Usng Fuzzy Approach Shahram Amn, Mohammad Ahmad Computer Engneerng Department Islamc Azad Unversty branch Mahallat, Iran Islamc Azad Unversty branch khomen,
More informationQuery Clustering Using a Hybrid Query Similarity Measure
Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationA Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes
A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,
More informationLobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide
Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationCost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network
Cost-Effectve Lfetme Predcton Based Routng Protocol for Wreless Network ABU MD. ZAFOR ALAM, MUHAMMAD ARIFUR RAHMAN, MOHAMMED ABUL HASAN 2,M. LUTFAR RAHMAN Faculty of Scence and IT, Daffodl Internatonal
More informationUB at GeoCLEF Department of Geography Abstract
UB at GeoCLEF 2006 Mguel E. Ruz (1), Stuart Shapro (2), June Abbas (1), Slva B. Southwck (1) and Davd Mark (3) State Unversty of New York at Buffalo (1) Department of Lbrary and Informaton Studes (2) Department
More informationDEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS
DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261
More informationS1 Note. Basis functions.
S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type
More informationSequential search. Building Java Programs Chapter 13. Sequential search. Sequential search
Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to
More informationCourse Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms
Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques
More informationClassic Term Weighting Technique for Mining Web Content Outliers
Internatonal Conference on Computatonal Technques and Artfcal Intellgence (ICCTAI'2012) Penang, Malaysa Classc Term Weghtng Technque for Mnng Web Content Outlers W.R. Wan Zulkfel, N. Mustapha, and A. Mustapha
More informationPerformance Improvement of Direct Diffusion Algorithm in Sensor Networks
Mddle-East Journal of Scentfc Research 2 (): 566-574, 202 ISSN 990-9233 IDOSI Publcatons, 202 DOI: 0.5829/dos.mejsr.202.2..43 Performance Improvement of Drect Dffuson Algorthm n Sensor Networks Akbar Bemana
More informationModule Management Tool in Software Development Organizations
Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,
More informationSum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints
Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan
More informationCSCI 104 Sorting Algorithms. Mark Redekopp David Kempe
CSCI 104 Sortng Algorthms Mark Redekopp Davd Kempe Algorthm Effcency SORTING 2 Sortng If we have an unordered lst, sequental search becomes our only choce If we wll perform a lot of searches t may be benefcal
More informationAn Entropy-Based Approach to Integrated Information Needs Assessment
Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology
More informationSAO: A Stream Index for Answering Linear Optimization Queries
SAO: A Stream Index for Answerng near Optmzaton Queres Gang uo Kun-ung Wu Phlp S. Yu IBM T.J. Watson Research Center {luog, klwu, psyu}@us.bm.com Abstract near optmzaton queres retreve the top-k tuples
More informationPositive Semi-definite Programming Localization in Wireless Sensor Networks
Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer
More informationFederated Search of Text-Based Digital Libraries in Hierarchical Peer-to-Peer Networks
Federated Search of Text-Based Dgtal Lbrares n Herarchcal Peer-to-Peer Networks Je Lu School of Computer Scence Carnege Mellon Unversty Pttsburgh, PA 15213 jelu@cs.cmu.edu Jame Callan School of Computer
More informationQuerying by sketch geographical databases. Yu Han 1, a *
4th Internatonal Conference on Sensors, Measurement and Intellgent Materals (ICSMIM 2015) Queryng by sketch geographcal databases Yu Han 1, a * 1 Department of Basc Courses, Shenyang Insttute of Artllery,
More informationAn Image Fusion Approach Based on Segmentation Region
Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationA Topology-aware Random Walk
A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble
More informationA Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks
A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationProgramming in Fortran 90 : 2017/2018
Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationInternet Traffic Managers
Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John
More informationMining User Similarity Using Spatial-temporal Intersection
www.ijcsi.org 215 Mnng User Smlarty Usng Spatal-temporal Intersecton Ymn Wang 1, Rumn Hu 1, Wenhua Huang 1 and Jun Chen 1 1 Natonal Engneerng Research Center for Multmeda Software, School of Computer,
More informationA Novel Distributed Collaborative Filtering Algorithm and Its Implementation on P2P Overlay Network*
A Novel Dstrbuted Collaboratve Flterng Algorthm and Its Implementaton on P2P Overlay Network* Peng Han, Bo Xe, Fan Yang, Jajun Wang, and Rumn Shen Department of Computer Scence and Engneerng, Shangha Jao
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationOnline Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks
12 IEEE Wreless Communcatons and Networkng Conference: Moble and Wreless Networks Onlne Polces for Opportunstc Vrtual MISO Routng n Wreless Ad Hoc Networks Crstano Tapparello, Stefano Tomasn and Mchele
More informationPrivate Information Retrieval (PIR)
2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market
More informationInformation Retrieval
Anmol Bhasn abhasn[at]cedar.buffalo.edu Moht Devnan mdevnan[at]cse.buffalo.edu Sprng 2005 #$ "% &'" (! Informaton Retreval )" " * + %, ##$ + *--. / "#,0, #'",,,#$ ", # " /,,#,0 1"%,2 '",, Documents are
More informationSkew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach
Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research
More informationPriority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks
Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,
More informationRevealing Paths of Relevant Information in Web Graphs
Revealng Paths of Relevant Informaton n Web Graphs Georgos Kouzas 1, Vassleos Kolas 2, Ioanns Anagnostopoulos 1 and Eleftheros Kayafas 2 1 Unversty of the Aegean Department of Fnancal and Management Engneerng
More informationsensors ISSN
Sensors 2011, 11, 5383-5401; do:10.3390/s110505383 OPEN ACCESS sensors ISSN 1424-8220 www.mdp.com/journal/sensors Artcle FRCA: A Fuzzy Relevance-Based Cluster Head Selecton Algorthm for Wreless Moble Ad-Hoc
More informationOutline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like:
Self-Organzng Maps (SOM) Turgay İBRİKÇİ, PhD. Outlne Introducton Structures of SOM SOM Archtecture Neghborhoods SOM Algorthm Examples Summary 1 2 Unsupervsed Hebban Learnng US Hebban Learnng, Cntd 3 A
More informationA Genetic Algorithm Based Dynamic Load Balancing Scheme for Heterogeneous Distributed Systems
Proceedngs of the Internatonal Conference on Parallel and Dstrbuted Processng Technques and Applcatons, PDPTA 2008, Las Vegas, Nevada, USA, July 14-17, 2008, 2 Volumes. CSREA Press 2008, ISBN 1-60132-084-1
More informationAvailable online at Available online at Advanced in Control Engineering and Information Science
Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced
More informationScheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research
Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research
More informationA Frame Packing Mechanism Using PDO Communication Service within CANopen
28 A Frame Packng Mechansm Usng PDO Communcaton Servce wthn CANopen Mnkoo Kang and Kejn Park Dvson of Industral & Informaton Systems Engneerng, Ajou Unversty, Suwon, Gyeongg-do, South Korea Summary The
More informationOptimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors
Optmal Fault-Tolerant Routng n Hypercubes Usng Extended Safety Vectors Je Wu Department of Computer Scence and Engneerng Florda Atlantc Unversty Boca Raton, FL 3343 Feng Gao, Zhongcheng L, and Ynghua Mn
More informationR s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes
SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges
More informationFuture Generation Computer Systems
Future Generaton Computer Systems 29 (2013) 1631 1644 Contents lsts avalable at ScVerse ScenceDrect Future Generaton Computer Systems journal homepage: www.elsever.com/locate/fgcs Gosspng for resource
More informationAn Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems
S. J and D. Shn: An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems 2355 An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems Seunggu J and Dongkun Shn, Member,
More informationCACHE MEMORY DESIGN FOR INTERNET PROCESSORS
CACHE MEMORY DESIGN FOR INTERNET PROCESSORS WE EVALUATE A SERIES OF THREE PROGRESSIVELY MORE AGGRESSIVE ROUTING-TABLE CACHE DESIGNS AND DEMONSTRATE THAT THE INCORPORATION OF HARDWARE CACHES INTO INTERNET
More informationReal-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems
Real-tme Fault-tolerant Schedulng Algorthm for Dstrbuted Computng Systems Yun Lng, Y Ouyang College of Computer Scence and Informaton Engneerng Zheang Gongshang Unversty Postal code: 310018 P.R.CHINA {ylng,
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationUsing Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol
2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen
More informationReal-Time Guarantees. Traffic Characteristics. Flow Control
Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak
More informationAdaptive Power-Aware Prefetch in Wireless Networks
Adaptve Power-Aware Prefetch n Wreless Networks Langzhong Yn, Student Member, IEEE, and Guohong Cao, Member, IEEE Abstract Most of the prefetch technques used n the current cache management schemes do
More informationEnhancement of Infrequent Purchased Product Recommendation Using Data Mining Techniques
Enhancement of Infrequent Purchased Product Recommendaton Usng Data Mnng Technques Noraswalza Abdullah, Yue Xu, Shlomo Geva, and Mark Loo Dscplne of Computer Scence Faculty of Scence and Technology Queensland
More informationWightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK
Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your
More informationBRDPHHC: A Balance RDF Data Partitioning Algorithm based on Hybrid Hierarchical Clustering
015 IEEE 17th Internatonal Conference on Hgh Performance Computng and Communcatons (HPCC), 015 IEEE 7th Internatonal Symposum on Cyberspace Safety and Securty (CSS), and 015 IEEE 1th Internatonal Conf
More informationCost-efficient deployment of distributed software services
1/30 Cost-effcent deployment of dstrbuted software servces csorba@tem.ntnu.no 2/30 Short ntroducton & contents Cost-effcent deployment of dstrbuted software servces Cost functons Bo-nspred decentralzed
More informationOn the Efficiency of Swap-Based Clustering
On the Effcency of Swap-Based Clusterng Pas Fränt and Oll Vrmaok Department of Computer Scence, Unversty of Joensuu, Fnland {frant, ovrma}@cs.oensuu.f Abstract. Random swap-based clusterng s very smple
More informationUse of Genetic Algorithms in Efficient Scheduling for Multi Service Classes
Use of Genetc Algorthms n Effcent Schedulng for Mult Servce Classes Shyamale Thlakawardana and Rahm Tafazoll Centre for Communcatons Systems Research (CCSR), Unversty of Surrey, Guldford, GU27XH, UK Abstract
More informationRAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:
Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:
More informationTN348: Openlab Module - Colocalization
TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages
More informationSRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions
SRB: Shared Runnng Buffers n Proxy to Explot Memory Localty of Multple Streamng Meda Sessons Songqng Chen,BoShen, Yong Yan, Sujoy Basu, and Xaodong Zhang Department of Computer Scence Moble and Meda System
More informationMinimum Cost Optimization of Multicast Wireless Networks with Network Coding
Mnmum Cost Optmzaton of Multcast Wreless Networks wth Network Codng Chengyu Xong and Xaohua L Department of ECE, State Unversty of New York at Bnghamton, Bnghamton, NY 13902 Emal: {cxong1, xl}@bnghamton.edu
More informationResearch Article Energy Efficient Interest Forwarding in NDN-Based Wireless Sensor Networks
Moble Informaton Systems Volume 2016, Artcle ID 3127029, 15 pages http://dx.do.org/10.1155/2016/3127029 Research Artcle Energy Effcent Interest Forwardng n NDN-Based Wreless Sensor Networks Shua Gao, 1
More informationConstructing Minimum Connected Dominating Set: Algorithmic approach
Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected
More information