On Peer-to-Peer Media Streaming Λ
|
|
- Lorraine Carroll
- 5 years ago
- Views:
Transcription
1 On eer-to-eer Media Streaming Λ Dongyan Xu y, Mohamed Hefeeda, Suanne Hambruch, Bharat Bhargava Department of Computer Science urdue Univerity, Wet Lafayette, IN 797 fdxu, hefeeda, eh, Abtract In thi paper, we tudy a peer-to-peer media treaming ytem with the following characteritic: () it treaming capacity grow dynamically; () peer do not exhibit erverlike behavior; () peer are heterogeneou in their bandwidth contribution; and () each treaming eion may involve multiple upplying peer. Baed on thee characteritic, we invetigate two problem: () how to aign media data to multiple upplying peer in one treaming eion and () how to fat amplify the ytem total treaming capacity. Our olution to the firt problem i an optimal media data aignment algorithm OTS pp, which reult in minimum buffering delay in the conequent treaming eion. Our olution to the econd problem i a ditributed differentiated admiion control protocol DAC pp. By differentiating between requeting peer with different outbound bandwidth, DAC pp achieve fat ytem capacity amplification; benefit all requeting peer in admiion rate, waiting time, and buffering delay; and create an incentive for peer to offer their truly available out-bound bandwidth.. Introduction Although there have been ignificant reearch effort in peer-to-peer ytem during the pat two year [,,, 5, ], one category of peer-to-peer ytem ha o far received le attention: the peer-to-peer media treaming ytem. The major difference between a general peer-topeer ytem and a peer-to-peer media treaming ytem lie in the data haring mode among peer: the former ue the open-after-downloading mode, while the latter ue the play-while-downloading mode. More pecifically, in a peer-to-peer media treaming ytem, a ubet of peer own a certain media file, and they tream the media file to Λ Thi work wa upported in part by NSF grant CCR-99889, CCR-, CCR-7, and CCR-788, and CERIAS. y Correponding author. requeting peer. On the other hand, the requeting peer playback and tore the media data during the treaming eion, and they become upplying peer of the media file after the treaming eion. In thi paper, we aume the following four characteritic of a peer-to-peer media treaming ytem: the firt three are hared by all peerto-peer ytem, while the lat one i unique in peer-topeer media treaming ytem: () A peer-to-peer media treaming ytem i elfgrowing. With requeting peer later becoming upplying peer, the ytem total capacity will be amplified: the more peer it erve, the larger the capacity it will have. () A peer-to-peer media treaming ytem i erverle. A peer i not uppoed to exhibit erver-like behavior, uch a opening a large number of imultaneou connection. () eer are heterogeneou in their out-bound bandwidth contribution to the ytem. Thi heterogeneity may be caued either by different acce network connecting the peer, or by different willingne of the peer to contribute. () The upplying-peer/requeting-peer relation i typically many-to-one, intead of one-to-one a in the general peer-to-peer ytem. Since the out-bound bandwidth offered by a upplying peer may be le than the original playback rate of the media data, it i neceary to involve multiple upplying peer in one real-time treaming eion. We identify two new problem ariing in the above ytem. To the bet of our knowledge, thi i the firt in-depth tudy on thee problem in the context of peer-topeer media treaming. The firt problem i the media data aignment for a multi-upplier peer-to-peer treaming eion. More pecifically, given a requeting peer and a et of upplying peer with heterogeneou out-bound bandwidth offer, we how how to aign a ubet of the media data to each upplying peer. The econd problem i the fat amplification of the peer-to-peer treaming capacity. Intuitively, among multiple requeting peer, ervice priority hould be given to thoe who promie higher out-bound bandwidth offer, becaue they will contribute more to the peer-topeer treaming capacity after becoming upplying peer. roceeding of the nd International Conference on Ditributed Computing Sytem (ICDCS ) 6-697/ $7. IEEE
2 We how how to realize uch a differentiated admiion policy, and that fat capacity amplification will ultimately benefit all peer. In thi paper, we propoe an algorithm OTS pp that compute the optimal media data aignment for each peerto-peer treaming eion. The aignment will lead to the minimum buffering delay experienced by the requeting peer. We alo propoe a ditributed differentiated admiion control protocol DAC pp, to be executed by both upplying and requeting peer. Compared with the current non-differentiated admiion control mechanim, rotocol DAC pp achieve () fater amplification of peer-topeer ytem capacity; () higher admiion rate and fewer rejection (before a peer i admitted) among all requeting peer; and () horter average buffering delay among all admitted requeting peer. Furthermore, for () and (), the protocol alo differentiate between requeting peer with different out-bound bandwidth promie, creating an incentive for them to offer their truly available bandwidth. The ret of the paper i organized a follow: we firt define our peer-to-peer media treaming model in Section. Section and preent our olution to the two problem, repectively. Section 5 preent our imulation reult. Section 6 compare our work with related work. Finally, Section 7 conclude thi paper. eer-to-eer Media Streaming Model In thi ection, we define a peer-to-peer media treaming model and tate our aumption: () Role of peer For a media data item, requeting peer are the peer that requet the data. Once the peer-topeer treaming eion i over, a requeting peer become a upplying peer. To avoid erver-like behavior, each upplying peer participate in at mot one peer-to-peer treaming eion at any time. We alo aume that there are ome eed upplying peer, which obtain the media data from ome external ource. () Bandwidth of peer Let R denote the playback rate of the media data. We aume that each requeting peer r i willing and able to et aide an in-bound bandwidth of R in ( r )=R to receive the treaming ervice. However, the out-bound bandwidth R out ( ) offered by a upplying peer ha one of the following value: R ; R ; R R 8 :::. N () Clae of peer We claify the peer into N clae, according to the N poible value of their out-bound bandwidth offer. More pecifically, a peer willing to offer out-bound bandwidth R n (» n» N) i called a cla-n We alo aume that each peer ha ufficient torage to tore the entire media file. Thi pecial et of value prevent media data aignment from becoming the N-hard binpacking-like problem. peer. We alo aume that the lower the n, thehigher the cla. () Capacity of the peer-to-peer treaming ytem We define the capacity a the total number of peer-topeer treaming eion that can be imultaneouly provided by the ytem. Since a peer-to-peer treaming eion involve multiple upplying peer whoe R out ( ) add up to R, the capacity of the ytem at time t can be computed (t) (Rout()) a C y (t) = b R c ( (t) i the et of upplying peer in the ytem at t). (5) Segment of media data We aume that the media data can be partitioned into mall equential egment of equal ize. We alo aume that the media tream i of Contant-Bit-Rate (CBR) and therefore, the playback time ffit of each egment i the ame (ffit i typically in the magnitude of econd). Optimal Media Data Aignment In thi ection, we tudy the problem of media data aignment. Baed on the model in Section, the problem can be tated a follow: For a requeting peer r and a et of upplying peer ; ;:::m,ifr = R in ( r )= m i= R out( i ), determine () the media data egment to be tranmitted by i (» i» m) and () the playback tart time for r. The goal i to enure a continuou playback, with minimum buffering delay at r. We define the buffering delay a the time interval between the tart of media data egment tranmiion and the tart of playback at r. A hown in Figure, different media data aignment lead to different buffering delay. The requeting peer i r ; and the upplying peer are ; ; ; with out-bound bandwidth of R, R, R 8, and R 8, repectively. In Aignment I, i aigned media data egment 8k, 8k +, 8k +, 8k +(k =; ; ; :::); i aigned egment 8k +, 8k +5; i aigned egment 8k +6;and i aigned egment 8k +7. The tart time of playback at r i 5ffit. Therefore, the buffering delay achieved by Aignment I i 5ffit. However, if Aignment II i ued, the buffering delay will be reduced to ffit. We propoe an algorithm OTS pp, which compute the optimal media data aignment that lead to the minimum buffering delay. The algorithm i executed by the requeting peer. After computing the media data aignment, it will initiate the peer-to-peer treaming eion by notifying each participating upplying peer of the correponding aignment. The upplying peer will then tart the tranmiion of it aigned media data egment. The peudo-code of Algorithm OTS pp i hown in Figure. Suppoe that the m upplying peer have been orted in decending order according to their out-bound roceeding of the nd International Conference on Ditributed Computing Sytem (ICDCS ) 6-697/ $7. IEEE
3 Tranmiion of egment δ t layback of egment by r (a) Aignment I Tranmiion of egment 7 Time OTS pp( r ; f ; ::: m g) f i = n ; while (i ) f for j =to m if the aignment to j i not complete f Aign egment i to j ; i = i ; g g g Figure. Algorithm OTS pp compute an optimal media data aignment, which achieve the minimum buffering delay in the conequent peer-topeer treaming eion. The minimum buffering delay i T min buf = m Λ ffit. 5 δ t layback of egment by r (b) Aignment II Time Figure. Different media data aignment lead to different buffering delay bandwidth offer; and that the lowet cla among them i cla-n. The algorithm compute the aignment of the firt n egment; and the aignment repeat itelf every n egment for the ret of the media file. In fact, Aignment II in Figure i computed by OTS pp: after the firt while iteration, egment 7, 6, 5, are aigned to,,, and, repectively; and and are done with the aignment. After the econd while iteration, egment, areaignedto and, repectively; and i done. During the lat two while iteration, egment and are aigned to - each in one iteration. The optimality of Algorithm OTS pp i tated in Theorem, which give a (omewhat urpriingly) imple form of the minimum buffering delay. The proof of Theorem can be found in []. Theorem Given a et of m upplying peer f ; ::: m g and a requeting peer r, if we have R = m R in ( r ) = i= R out( i ), then Algorithm OTS pp will Fat Sytem Capacity Amplification In thi ection, we tudy the problem of fat capacity amplification of the entire ytem. Thi will alo anwer the quetion of how to elect a et of upplying peer for a peer-to-peer treaming eion, which i not mentioned in Section. Recall that one of the mot exciting property of a peer-to-peer treaming ytem i that it capacity dynamically grow. However, no previou work ha addreed thi problem in the context of peer-to-peer media treaming with peer bandwidth heterogeneity. Conider the cenario hown in Figure. Suppoe at time t, there are four upplying peer in the ytem: two cla- peer and and two cla- peer and. According to the ytem capacity definition, the capacity of the peer-to-peer treaming ytem at t i b( R R + R + + R )=R c =. Thi mean that the ytem can admit one requeting peer at t. Now, uppoe there are three requeting peer: two cla- peer r and r and one cla- peer r. If we admit r at t, the capacity will till be at t + T (T i the duration of the peerto-peer treaming eion), and r and r will have to be admitted one after another at t + T and t + T, repectively. However, if r i admitted at t, the ytem capacity will grow to at t + T,andboth r and r can be admitted at t + T. Furthermore, we define the waiting time of a requeting peer a the interval between it firt treaming requet and the earliet time it can be admitted. The average waiting time incurred by the firt admiion equence i ( + T +T )= = T ; while it i (T + T +)= = T in the econd cae. The above example ugget that a differentiated admiion policy which favor higher-cla requeting peer will roceeding of the nd International Conference on Ditributed Computing Sytem (ICDCS ) 6-697/ $7. IEEE
4 Sytem capacity r r r r r r t t + T t t + T + T Sytem capacity r r r (a) Admitting r! r! r t t + T t + T r r (b) Admitting r! ( r + r ) Figure. Different admiion deciion lead to different growth of treaming capacity lead to a fater amplification of the peer-to-peer ytem capacity, and will ultimately benefit requeting peer of all clae. Other requirement for uch a differentiated admiion policy include: () it hould not tarve the lower-cla requeting peer, even in the hort term; () it hould be enforced in a purely ditributed fahion; and () it hould be differentiating uch that the higher the outbound bandwidth pledged by a requeting peer, the greater the poibility that it will be admitted, and the horter the waiting time and buffering delay it will experience. Thi differentiation will create an incentive to encourage requeting peer to contribute it truly available out-bound bandwidth to the peer-to-peer treaming ytem. Our olution i a ditributed admiion control protocol DAC pp. rotocol DAC pp ha two key feature. Firt, each upplying peer individually decide whether or not to participate in a treaming eion requeted by a requeting peer. The deciion i made in a probabilitic fahion, There i, however, an important aumption: ince the bandwidth commitment i made when a requeting peer requet treaming ervice, there mut be a mechanim to enforce the bandwidth commitment after the requeting peer become a upplying peer. Thi mechanim i aumed to exit in the peer-to-peer oftware intalled in each peer. Time Time with different probability value applied to different clae of requeting peer, and the probabilitie are dynamically adjuted. Second, we propoe a new technique called reminder: under certain condition (to be detailed hortly), a requeting peer r may end a reminder to a buy upplying peer, reminding not to elevate it admiion preference to requeting peer of clae lower than that of r. rotocol DAC pp involve operation of both upplying peer and requeting peer.. DAC pp - Supplying eer Each upplying peer maintain an admiion probability vector <r[];r[]:::; r[n ] >. r[i] (» i» N) will be applied to cla-i requeting peer: if a cla-i requeting peer contact for treaming ervice and i not buy participating in another treaming eion, will grant the requet with probability r[i]. Suppoe itelf i a cla-k peer, then the value in the probability vector of i determined a follow: (a) Initially, when become a upplying peer, it probability vector i initialized a follow: For» i» k, we initialize r[i] = :. For k < i» N, we initialize r[i] =. The intuition behind thi initialization i: i k ince i a cla-k peer itelf, it will favor requeting peer of cla-k and higher by alway granting their treaming requet. However, for requeting peer of lower clae, it will exponentially decreae the admiion probability. We call cla i a favored cla of,if currently ha r[i] =:. For example, for a cla- upplying peer (and uppoe N =), it initial admiion probability vector i < :; :; :5; :5 >, and it initial favored clae are clae and. (b) If ha been idle, then it probability vector will be updated after a timeout period of T out. The update i performed a follow: for each k < i» N, r[i] = r[i] Λ. Thi mean that will elevate the admiion probabilitie of lower-cla requeting peer, if it ha not been erving any requeting peer in the pat period of T out. If remain idle, the update will be performed after every period of T out, until every probability in it probability vector i., i.e. every cla i favored cla. (c) If ha jut finihed erving in a peer-topeer treaming eion, will update it probability vector a follow: ffl If during the treaming eion, it did not receive any requet from a requeting peer of it favored cla, will elevate the admiion probability of the lower clae, imilar to the update in (b): for each k<i» N, r[i] =r[i] Λ. ffl If during the eion, it received at leat one requet from a requeting peer of it favored cla, the requet roceeding of the nd International Conference on Ditributed Computing Sytem (ICDCS ) 6-697/ $7. IEEE
5 wa not granted becaue wa buy. Under a certain condition (to be decribed in Section.), the requeting peer left a reminder to. Suppoe ^k i the highet favored cla of requeting peer() which left a reminder, then for» i» ^k, r[i] =:;and for ^k <i» N, r[i] = i ^k. In the firt cae, relaxe the admiion preference, becaue it ha not been requeted by any peer of it current favored clae. In the econd cae, tighten the admiion preference, becaue there have been reminder from requeting peer of it favored clae which hould have been erved, had not been buy.. DAC pp - Requeting eer Each requeting peer r firt obtain a lit of M randomly elected candidate upplying peer via ome peerto-peer lookup mechanim. We aume that the cla of each candidate i alo obtained. r then directly contact the candidate upplying peer - from high to low clae: ffl r will be admitted, if r i able to obtain permiion from enough upplying peer (among the M candidate) uch that: () they are neither down nor buy with another treaming eion; () they are willing to provide the treaming ervice (i.e. having paed the probabilitic admiion tet); and () their aggregated out-bound bandwidth offer i R um = R. r will then execute Algorithm OTS pp to compute the media data aignment, trigger the participating upplying peer, and the peer-to-peer treaming eion will begin. ffl r will be rejected, if r i not able to get permiion from enough upplying peer that atify all three condition above. However, r will leave a reminder to a ubetw of the buy candidate. W i determined a follow: from high-cla to low-cla buy candidate, the firt few that atify the following condition will belong to W : () the candidate currently favor the cla of r ; and () the aggregated out-bound bandwidth offer of the candidate in W i equal to (R R um ). Each (buy) candidate in W keep the reminder ; and when it current treaming eion i over, it will ue thi reminder to update it probability vector, a decribed in Section.. Note that a reminded upplying peer may not in the future erve exactly the ame requeting peer which left the reminder. Intead, we propoe reminder a a ditributed mechanim to realize differentiated and adaptive admiion For example, by querying a centralized directory erver a in Napter [], or by uing a ditributed lookup ervice uch a Chord []. control, baed on the current overall requet/upply ituation in the peer-to-peer treaming ytem. ffl If r i admitted, when the treaming eion i over, it will become a upplying peer. If r i rejected, it will backoff for at leat a period of T bkf before making the requet again. Furthermore, it backoff period will become T bkf E x bkf after the xth rejection. 5 erformance Study 5. Simulation Setup In thi ection, we how the excellent performance of rotocol DAC pp via extenive imulation reult. We imulate a peer-to-peer media treaming ytem with a total of 5, peer. Initially, there are only eed upplying peer, while the other 5, peer are requeting peer. Each eed upplying peer i a cla- peer, and it poee a copy of a popular video file. The how time of the video i 6 minute. The 5, requeting peer belong to clae,,, and, and their ditribution i %, %, %, and %, repectively. arameter in rotocol DAC pp are et a follow: M =8-each requeting peer probe 8 randomly elected candidate upplying peer; T out = min - each idle upplying peer elevate the admiion probabilitie of lower-cla requeting peer every minute; and T bkf =min; E bkf =-afterthe ith rejection, a requeting peer will backoff for Λ i minute before retry. For comparion, we alo imulate a non-differentiated admiion control protocol NDAC pp, in which the admiion probability vector of each upplying peer i alway < :; :; :; : >. NDAC pp alo have the ame value for parameter M;T bkf,ande bkf. We imulate a period of hour. During the firt 7 hour, the 5, peer make their firt treaming requet. We imulate four different arrival pattern of firt-time treaming requet: attern ha contant arrival; attern ha gradually increaing, then gradually decreaing arrival; attern ha burty arrival followed by lowerandcontant arrival; and attern ha periodic burty arrival with low and contant arrival between burt (detailed pecification are given in []). 5. Simulation Reult () Sytem capacity amplification We firt compare the ytem capacity amplification achieved by DAC pp and NDAC pp. Figure how the growth of the peerto-peer ytem capacity with the elape of time, under firt-time treaming requet arrival attern and 5. 5 Reult for other arrival pattern are decribed in []. roceeding of the nd International Conference on Ditributed Computing Sytem (ICDCS ) 6-697/ $7. IEEE
6 rotocol DAC pp achieve ignificantly fater ytem capacity growth than NDAC pp, epecially during the firt 7 hour when the requeting peer make their firt treaming requet. By the end of the -hour period, the ytem capacity achieved by DAC pp ha reached at leat 95% of the maximum capacity if all 5, peer become upplying peer. We alo oberve that after the firt 7 hour, the ytem capacity growth low down (under both protocol), becaue all requet are now retry requet, and no new requeting peer are coming. Total ytem capacity DAC_pp NDAC_pp 5(b). Even for the cla- requeting peer, thi i alo true except for the firt few hour. Thi obervation indicate that DAC pp benefit all clae of requeting peer with repect to admiion rate. Accumulative admiion rate (%) 8 6 cla cla cla 6 8 (a) Arrival attern, uing DAC pp Total ytem capacity (a) Arrival attern DAC_pp NDAC_pp Accumulative admiion rate (%) 8 6 cla cla cla 6 8 (b) Arrival attern, uing NDAC pp 6 8 Figure 5. er-cla accumulative requet admiion rate (b) Arrival attern Figure. Sytem capacity amplification uing DAC pp and NDAC pp () Requet admiion rate Figure 5 how the per-cla requet admiion rate (accumulative over time) achieved by DAC pp and NDAC pp, under arrival pattern. We firt oberve that by uing DAC pp, different clae of requeting peer have different admiion rate (Figure 5(a)): the higher the cla, the higher the admiion rate. On the contrary, rotocol NDAC pp doe not differentiate (Figure 5(b)), reulting in imilar admiion rate among all clae. Furthermore, we oberve that for requeting peer of clae,, and, their requet admiion rate in Figure 5(a) are contantly higher than thoe in Figure () Average buffering delay Similar to (), DAC pp alo achieve both differentiation and overall improvement, in the apect of buffering delay experienced by requeting peer of different clae. The reult are hown in Figure 6. Recall that the buffering delay of a peer-topeer treaming eion i equal to ffit multiplied by the number of participating upplying peer (Theorem ). On the other hand, in DAC pp, if a requeting peer i admitted, it i likely that the higher the cla it belong to, the higher the clae the participating upplying peer belong to, due to the rule each upplying peer determine it favored clae. We can then infer that in DAC pp, the higher the cla of an admitted requeting peer, the fewer the number of participating upplying peer, and therefore, the lower the buffering delay experienced by the requeting peer. Furthermore, the average buffering delay of each cla in Figure 6(a) i contantly lower than that in Figure 6(b). roceeding of the nd International Conference on Ditributed Computing Sytem (ICDCS ) 6-697/ $7. IEEE
7 Accumulative average buffering delay (y * delta t) Accumulative average buffering delay (y * delta t) cla cla cla 6 8 (a) Arrival attern, uing DAC pp cla cla cla 6 8 (b) Arrival attern, uing NDAC pp Avg. rejection attern attern Cla.77/.7.9/.5 Cla.9/.75.9/.6 Cla./.7.59/. Cla.5/.7.6/.6 Table. er-cla average number of rejection before admiion ( DAC pp / NDAC pp ) to dynamically adjut their favored clae of requeting peer, in repone to the requet arrival rate change (under arrival attern ). The y-axi repreent the lowet cla of requeting peer, favored by each cla of upplying peer. We oberve that for each cla of upplying peer, the degree of admiion differentiation change over time, roughly following the change in the (firt-time) requet arrival rate (recall that attern ha periodic burty arrival). More pecifically, the higher the cla of upplying peer, the more enitive they are to the change in requet arrival rate. Finally, when there are not new requet arrival, and the ytem capacity ha grown ignificantly, all clae of upplying peer relax their admiion preference to all clae of requeting peer, i.e. the lowet favored cla of requeting peer i, for all clae of upplying peer. Figure 6. er-cla accumulative average buffering delay (the actual delay i y Λ ffit) () Average waiting time Similar to () and (), DAC pp alo achieve both differentiation and overall improvement, in the apect of waiting time experienced by requeting peer of different clae. Table how the average (over the entire period of hour) number of rejection before admiion experienced by each cla of requeting peer, under arrival attern and. Given an average number of rejection x, the average waiting time can be computed a T bkf Λ E x bkf. Again, we oberve that the higher the cla of admitted requeting peer, the fewer the average number of rejection each of them experience. Furthermore, for each cla, the average number of rejection achieved by DAC pp i fewer than that achieved by NDAC pp. (5) Adaptivity of differentiation We now take a cloer look at DAC pp adaptivity of admiion differentiation, baed on the dynamic requet/upply ituation in the peerto-peer ytem. Recall that DAC pp ue the elevate-aftertimeout technique to relax the differentiation; while it ue the reminder technique to tighten the differentiation. In Figure 7, we how that upplying peer ue thee technique Lowet favored cla (average) 5 cla cla cla 6 8 (a) Arrival pattern Figure 7. Lowet cla of requeting peer, favored by each cla of upplying peer (non-accumulative, averaged every hour (6) Impact of protocol parameter on performance Finally, we tudy the impact of parameter M;T out,and E bkf on the performance of DAC pp: Figure 8 how the impact of M and T out on the ytem capacity amplification; while Figure 9 how the impact of the backoff exponential factor E bkf on the requet admiion rate, all under arrival attern. In each tudy, the parameter except the one being tudied remain the ame a before. roceeding of the nd International Conference on Ditributed Computing Sytem (ICDCS ) 6-697/ $7. IEEE
8 In Figure 8(a), the number of candidate upplying peer probed by a requeting peer i et to, 8, 6, and, repectively. The ytem capacity grow ignificantly lower when M =, becaue four candidate are too few to identify ufficient number of qualified upplying peer to erve the requeting peer. If we increae M, the ytem capacity will grow much fater. However, when M i greater than 8, the impact of M quickly decreae. Therefore, having alargem doe not improve the ytem capacity growth ignificantly. On the other hand, it may increae the probing overhead and traffic. In Figure 8(b), different time-out period to relax the admiion differentiation of an idle upplying peer i tried. The reult indicate that T out hould not be too hort. The explanation i: having a hort time-out period may make an idle upplying peer relax it admiion preference too oon to lower-cla requeting peer. Therefore, it may mi the chance to erve the one of higher clae, when both lowercla and higher-cla requeting peer are preent. Total ytem capacity 8 6 M = M = 8 M = 6 M = that exponential backoff of requeting peer doe not help to increae the requet admiion rate. On the contrary, the higher the E bkf, the lower the overall admiion rate. In fact, the contant backoff (E bkf = ) cheme achieve ignificantly higher admiion rate. Although not yet fully explored, one poible explanation i: The capacity of a peer-to-peer ytem i elf-growing intead of fixed. Therefore, a more aggreive retry policy may actually help to increae the ytem capacity fater, and hence improve the overall admiion rate. On the other hand, in a ytem with fixed capacity (uch a a traditional client-erver ytem), client may have to perform conervative backoff, in order to achieve a high overall admiion rate. Accumulative overall admiion rate (%) 8 6 E_bkf = E_bkf = E_bkf = E_bkf = 6 8 Figure 9. Impact of E bkf on overall requet admiion rate Total ytem capacity (a) Impact of M T_out = min T_out = min T_out = min T_out = 6 min T_out = min 6 8 (b) Impact of T out Figure 8. Impact of M and T out on ytem capacity amplification In Figure 9, the backoff exponential factor E bkf i et to,,, and, repectively. It i intereting to oberve In ummary, rotocol DAC pp achieve differentiation toward different clae of requeting peer - not only in their admiion probabilitie, but alo in the waiting time and buffering delay they experience. Moreover, the degree of differentiation i adaptive: it change according to the current requet/upply ituation. 6 Related Work eer-to-peer file haring ytem have gained great popularity in recent year. Repreentative peer-to-peer ytem on the Internet include Napter [], Gnutella [], and Freenet []. Thee ytem hare the ame goal of de-centralized data exchange and dynamic growth of ytem capacity. However, they differ in their data lookup/dicovery cheme. For example, Napter employ centralized directory erver, while Gnutella [] ue controlled query flooding. The data haring mode of mot current peer-to-peer ytem i the open-afterdownloading mode, not the play-while-downloading (or treaming) mode a tudied in thi paper (however, there are exception, uch a C-tar [] to be decribed later). In the pat two year, peer-to-peer ytem have alo attracted tremendou attention from the reearch community. roceeding of the nd International Conference on Ditributed Computing Sytem (ICDCS ) 6-697/ $7. IEEE
9 Firt, there have been meaurement baed tudie of the exiting peer-to-peer ytem. In [], a detailed meaurement tudy of Napter and Gnutella i preented. The tudy reveal ignificant degree of heterogeneity in the peer bandwidth availability; and it ugget that future peer-topeer ytem mut have built-in incentive for peer to tell the truth about their bandwidth information. Thee obervation have partly motivated our peer-to-peer treaming model and olution in thi paper. Beide meaurement tudie of current peer-to-peer ytem, new peer-to-peer architecture have alo been propoed. Thee architecture focu on different apect of a fully ditributed and calable peer-to-peer ytem. For example, CAN [8], Chord [], and atry [9] are ditributed peer-to-peer lookup ervice, while AST [] and OceanStore [6] are peerto-peer peritent torage ervice. Our work on peer-topeer media treaming complement thee reult: on one hand, we do not tudy the problem of peer-to-peer data lookup and torage management; on the other hand, the exiting reult do not addre the two new problem in thi paper. Finally, everal cheme of multi-ource media treaming have been propoed. In [7], a ditributed video treaming ytem i preented, where each eion involve multiple replicated video erver. However, it doe not conider the problem of ytem capacity amplification, becaue it i till a client-erver ytem intead of a peerto-peer ytem. C-tar [] i a commercial multi-ource treaming ervice. Similar to our work, the capacity of the C-tar ditribution network grow over time. However, C-tar doe not differentiate between upplier of different out-bound bandwidth capability. In [5], an architecture called SpreadIt i propoed for treaming live media over a peer-to-peer network. It focue on the dynamic contruction of a multicat tree among peer requeting a live media. However, SpreadIt i not intended for the aynchronou treaming of tored media data. Alo it doe not deal with bandwidth heterogeneity and admiion differentiation. 7 Concluion eer-to-peer media treaming ytem are expected to become a popular a the peer-to-peer file haring ytem. In thi paper, we tudy two key problem ariing from peer-to-peer media treaming: the aignment of media data to multiple upplying peer involved in a peer-topeer treaming eion; and fat capacity amplification of the entire peer-to-peer treaming ytem. Our olution to the firt problem i Algorithm OTS pp, which compute optimal media data aignment for peer-to-peer treaming eion. Our olution to the econd problem i the fully ditributed DAC pp protocol. By differentiating between requeting peer according their clae, DAC pp () achieve fat ytem capacity amplification, () benefit all requeting peer in admiion rate, waiting time, and buffering delay, and () create an incentive for peer to offer their truly available out-bound bandwidth. Our extenive imulation reult demontrate the excellent performance of DAC pp. Reference [] C-tar. [] Gnutella. [] Napter. [] I. Clarke, O. Sandberg, B. Wiley, and T. Hong. Freenet: A Ditributed Anonymou Information Storage and Retrieval Sytem. roceeding of Workhop on Deign Iue in Anonymou and Unobervability, July. [5] H. Dehpande, M. Bawa, and H. Garcia-Molina. Streaming Live Media over a eer-to-eer Network. Stanford Databae Group Technical Report (-), Aug.. [6] J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinki,. Eaton, D. Geel, R. Gummadi, S. Rhea, H. Weatherpoon, W. Weimer, C. Well, and B. Zhao. Oceantore: An Architecture for Global-State eritent Store. roceeding of ASLOS, Nov.. [7] T. Nguyen and A. Zakhor. Ditributed Video Streaming Over Internet. roceeding of SIE/ACM MMCN,Jan.. [8] S. Ratnaamy,. Franci, M. Handley, R. Karp, and S. Shenker. A Scalable Content-Addreable Network. roceeding of ACM SIGCOMM, Aug.. [9] A. Rowtron and. Druchel. atry: Scalable Ditributed Object Location and Routing for Large-Scale eer-to-eer Sytem. roceeding of IFI/ACM Middleware, Nov.. [] A. Rowtron and. Druchel. Storage Management and Caching in AST, a Large-Scale, eritent eer-to-eer Storage Utility. roceeding of ACM SOS, Oct.. [] S. Saroiu,. Gummadi, and S. Gribble. A Meaurement Study of eer-to-eer File Sharing Sytem. roceeding of SIE/ACM MMCN, Jan.. [] I. Stoica, R. Morri, D. Karger, F. Kaahoek, and H. Balakrihnan. Chord: A Scalable eer-to-eer Lookup Service for Internet Application. roceeding of ACM SIGCOMM, Aug.. [] D. Xu, M. Hefeeda, S. Hambruch, and B. Bhargava. On eer-to-eer Media Streaming. urdue Computer Science Technical Report, Apr.. [] B. Yang and H. Garcia-Molina. Comparing Hybrid eer-to- eer Sytem. roceeding of VLDB, Sept.. [5] B. Zhao, J. Kubiatowicz, and A. Joeph. Tapetry: An Infratructure for Fault-Reilient Wide-Area Location and Routing. UC Berkeley Computer Science Technical Report (CSD--), Apr.. roceeding of the nd International Conference on Ditributed Computing Sytem (ICDCS ) 6-697/ $7. IEEE
DAROS: Distributed User-Server Assignment And Replication For Online Social Networking Applications
DAROS: Ditributed Uer-Server Aignment And Replication For Online Social Networking Application Thuan Duong-Ba School of EECS Oregon State Univerity Corvalli, OR 97330, USA Email: duongba@eec.oregontate.edu
More informationDistributed Packet Processing Architecture with Reconfigurable Hardware Accelerators for 100Gbps Forwarding Performance on Virtualized Edge Router
Ditributed Packet Proceing Architecture with Reconfigurable Hardware Accelerator for 100Gbp Forwarding Performance on Virtualized Edge Router Satohi Nihiyama, Hitohi Kaneko, and Ichiro Kudo Abtract To
More informationA Local Mobility Agent Selection Algorithm for Mobile Networks
A Local Mobility Agent Selection Algorithm for Mobile Network Yi Xu Henry C. J. Lee Vrizlynn L. L. Thing Intitute for Infocomm Reearch, 21 Heng Mui Keng Terrace, Singapore 119613 Email: {yxu, hlee, vriz}@i2r.a-tar.edu.g
More informationThe Association of System Performance Professionals
The Aociation of Sytem Performance Profeional The Computer Meaurement Group, commonly called CMG, i a not for profit, worldwide organization of data proceing profeional committed to the meaurement and
More informationKey Terms - MinMin, MaxMin, Sufferage, Task Scheduling, Standard Deviation, Load Balancing.
Volume 3, Iue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Tak Aignment in
More informationRefining SIRAP with a Dedicated Resource Ceiling for Self-Blocking
Refining SIRAP with a Dedicated Reource Ceiling for Self-Blocking Mori Behnam, Thoma Nolte Mälardalen Real-Time Reearch Centre P.O. Box 883, SE-721 23 Väterå, Sweden {mori.behnam,thoma.nolte}@mdh.e ABSTRACT
More information1 The secretary problem
Thi i new material: if you ee error, pleae email jtyu at tanford dot edu 1 The ecretary problem We will tart by analyzing the expected runtime of an algorithm, a you will be expected to do on your homework.
More informationRouting Definition 4.1
4 Routing So far, we have only looked at network without dealing with the iue of how to end information in them from one node to another The problem of ending information in a network i known a routing
More informationMinimum congestion spanning trees in bipartite and random graphs
Minimum congetion panning tree in bipartite and random graph M.I. Otrovkii Department of Mathematic and Computer Science St. John Univerity 8000 Utopia Parkway Queen, NY 11439, USA e-mail: otrovm@tjohn.edu
More informationA Load Balancing Model based on Load-aware for Distributed Controllers. Fengjun Shang, Wenjuan Gong
4th International Conference on Machinery, Material and Computing Technology (ICMMCT 2016) A Load Balancing Model baed on Load-aware for Ditributed Controller Fengjun Shang, Wenjuan Gong College of Compute
More informationA Practical Model for Minimizing Waiting Time in a Transit Network
A Practical Model for Minimizing Waiting Time in a Tranit Network Leila Dianat, MASc, Department of Civil Engineering, Sharif Univerity of Technology, Tehran, Iran Youef Shafahi, Ph.D. Aociate Profeor,
More informationLecture 14: Minimum Spanning Tree I
COMPSCI 0: Deign and Analyi of Algorithm October 4, 07 Lecture 4: Minimum Spanning Tree I Lecturer: Rong Ge Scribe: Fred Zhang Overview Thi lecture we finih our dicuion of the hortet path problem and introduce
More informationService and Network Management Interworking in Future Wireless Systems
Service and Network Management Interworking in Future Wirele Sytem V. Tountopoulo V. Stavroulaki P. Demeticha N. Mitrou and M. Theologou National Technical Univerity of Athen Department of Electrical Engineering
More informationPerformance of a Robust Filter-based Approach for Contour Detection in Wireless Sensor Networks
Performance of a Robut Filter-baed Approach for Contour Detection in Wirele Senor Network Hadi Alati, William A. Armtrong, Jr., and Ai Naipuri Department of Electrical and Computer Engineering The Univerity
More informationDiverse: Application-Layer Service Differentiation in Peer-to-Peer Communications
Divere: Application-Layer Service Differentiation in Peer-to-Peer Communication Chuan Wu, Student Member, IEEE, Baochun Li, Senior Member, IEEE Department of Electrical and Computer Engineering Univerity
More informationSee chapter 8 in the textbook. Dr Muhammad Al Salamah, Industrial Engineering, KFUPM
Goal programming Objective of the topic: Indentify indutrial baed ituation where two or more objective function are required. Write a multi objective function model dla a goal LP Ue weighting um and preemptive
More information(12) Patent Application Publication (10) Pub. No.: US 2003/ A1
US 2003O196031A1 (19) United State (12) Patent Application Publication (10) Pub. No.: US 2003/0196031 A1 Chen (43) Pub. Date: Oct. 16, 2003 (54) STORAGE CONTROLLER WITH THE DISK Related U.S. Application
More informationAnalyzing Hydra Historical Statistics Part 2
Analyzing Hydra Hitorical Statitic Part Fabio Maimo Ottaviani EPV Technologie White paper 5 hnode HSM Hitorical Record The hnode i the hierarchical data torage management node and ha to perform all the
More informationSLA Adaptation for Service Overlay Networks
SLA Adaptation for Service Overlay Network Con Tran 1, Zbigniew Dziong 1, and Michal Pióro 2 1 Department of Electrical Engineering, École de Technologie Supérieure, Univerity of Quebec, Montréal, Canada
More informationMAT 155: Describing, Exploring, and Comparing Data Page 1 of NotesCh2-3.doc
MAT 155: Decribing, Exploring, and Comparing Data Page 1 of 8 001-oteCh-3.doc ote for Chapter Summarizing and Graphing Data Chapter 3 Decribing, Exploring, and Comparing Data Frequency Ditribution, Graphic
More informationModelling the impact of cyber attacks on the traffic control centre of an urban automobile transport system by means of enhanced cybersecurity
Modelling the impact of cyber attack on the traffic control centre of an urban automobile tranport ytem by mean of enhanced cyberecurity Yoana Ivanova 1,* 1 Bulgarian Academy of Science, Intitute of ICT,
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each type of circuit will be implemented in two
More informationModeling the Effect of Mobile Handoffs on TCP and TFRC Throughput
Modeling the Effect of Mobile Handoff on TCP and TFRC Throughput Antonio Argyriou and Vijay Madietti School of Electrical and Computer Engineering Georgia Intitute of Technology Atlanta, Georgia 3332 25,
More informationKaren L. Collins. Wesleyan University. Middletown, CT and. Mark Hovey MIT. Cambridge, MA Abstract
Mot Graph are Edge-Cordial Karen L. Collin Dept. of Mathematic Weleyan Univerity Middletown, CT 6457 and Mark Hovey Dept. of Mathematic MIT Cambridge, MA 239 Abtract We extend the definition of edge-cordial
More informationMulticast with Network Coding in Application-Layer Overlay Networks
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 1, JANUARY 2004 1 Multicat with Network Coding in Application-Layer Overlay Network Ying Zhu, Baochun Li, Member, IEEE, and Jiang Guo Abtract
More informationAn Approach to a Test Oracle for XML Query Testing
An Approach to a Tet Oracle for XML Query Teting Dae S. Kim-Park, Claudio de la Riva, Javier Tuya Univerity of Oviedo Computing Department Campu of Vieque, /n, 33204 (SPAIN) kim_park@li.uniovi.e, claudio@uniovi.e,
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in Verilog and implemented
More informationOn successive packing approach to multidimensional (M-D) interleaving
On ucceive packing approach to multidimenional (M-D) interleaving Xi Min Zhang Yun Q. hi ankar Bau Abtract We propoe an interleaving cheme for multidimenional (M-D) interleaving. To achieved by uing a
More informationProblem Set 2 (Due: Friday, October 19, 2018)
Electrical and Computer Engineering Memorial Univerity of Newfoundland ENGI 9876 - Advanced Data Network Fall 2018 Problem Set 2 (Due: Friday, October 19, 2018) Quetion 1 Conider an M/M/1 model of a queue
More informationChapter 13 Non Sampling Errors
Chapter 13 Non Sampling Error It i a general aumption in the ampling theory that the true value of each unit in the population can be obtained and tabulated without any error. In practice, thi aumption
More informationUniversität Augsburg. Institut für Informatik. Approximating Optimal Visual Sensor Placement. E. Hörster, R. Lienhart.
Univerität Augburg à ÊÇÅÍÆ ËÀǼ Approximating Optimal Viual Senor Placement E. Hörter, R. Lienhart Report 2006-01 Januar 2006 Intitut für Informatik D-86135 Augburg Copyright c E. Hörter, R. Lienhart Intitut
More informationAspects of Formal and Graphical Design of a Bus System
Apect of Formal and Graphical Deign of a Bu Sytem Tiberiu Seceleanu Univerity of Turku, Dpt. of Information Technology Turku, Finland tiberiu.eceleanu@utu.fi Tomi Weterlund Turku Centre for Computer Science
More informationA note on degenerate and spectrally degenerate graphs
A note on degenerate and pectrally degenerate graph Noga Alon Abtract A graph G i called pectrally d-degenerate if the larget eigenvalue of each ubgraph of it with maximum degree D i at mot dd. We prove
More informationTopics. Lecture 37: Global Optimization. Issues. A Simple Example: Copy Propagation X := 3 B > 0 Y := 0 X := 4 Y := Z + W A := 2 * 3X
Lecture 37: Global Optimization [Adapted from note by R. Bodik and G. Necula] Topic Global optimization refer to program optimization that encompa multiple baic block in a function. (I have ued the term
More informationHow to Select Measurement Points in Access Point Localization
Proceeding of the International MultiConference of Engineer and Computer Scientit 205 Vol II, IMECS 205, March 8-20, 205, Hong Kong How to Select Meaurement Point in Acce Point Localization Xiaoling Yang,
More informationPriority-Based Distribution Trees for Application-Level Multicast
Priority-Baed Ditribution Tree for Application-Level Multicat Jürgen Vogel, Jörg Widmer, Dirk Farin, Martin Mauve, Wolfgang Effelberg Praktiche Informatik IV, Univerity of Mannheim, Germany vogel, widmer,
More informationA SIMPLE IMPERATIVE LANGUAGE THE STORE FUNCTION NON-TERMINATING COMMANDS
A SIMPLE IMPERATIVE LANGUAGE Eventually we will preent the emantic of a full-blown language, with declaration, type and looping. However, there are many complication, o we will build up lowly. Our firt
More informationLocalized Minimum Spanning Tree Based Multicast Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Sensor Networks
Localized Minimum Spanning Tree Baed Multicat Routing with Energy-Efficient Guaranteed Delivery in Ad Hoc and Senor Network Hanne Frey Univerity of Paderborn D-3398 Paderborn hanne.frey@uni-paderborn.de
More informationThe Implementation of an Adaptive Mechanism in the RTP Packet in Mobile Video Transmission
2011 International Conference on Information Management and Engineering (ICIME 2011) IPCSIT vol. 52 (2012) (2012) IACSIT Pre, Singapore DOI: 10.7763/IPCSIT.2012.V52.91 The Implementation of an Adaptive
More informationEdits in Xylia Validity Preserving Editing of XML Documents
dit in Xylia Validity Preerving diting of XML Document Pouria Shaker, Theodore S. Norvell, and Denni K. Peter Faculty of ngineering and Applied Science, Memorial Univerity of Newfoundland, St. John, NFLD,
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each circuit will be decribed in VHL and implemented
More informationSoftware Agent (SA) to guarantee QoS for multi constrain applications in all-ip networks
Software Agent (SA) to guarantee QoS for multi contrain application in all-ip network Kazi Khaled Al-Zahid and Mituji Matumoto GITS, Waeda Univerity 94 Waeda Univ. Bldg. A-308, 1011Okuboyama Nihitomida
More informationxy-monotone path existence queries in a rectilinear environment
CCCG 2012, Charlottetown, P.E.I., Augut 8 10, 2012 xy-monotone path exitence querie in a rectilinear environment Gregory Bint Anil Mahehwari Michiel Smid Abtract Given a planar environment coniting of
More informationES205 Analysis and Design of Engineering Systems: Lab 1: An Introductory Tutorial: Getting Started with SIMULINK
ES05 Analyi and Deign of Engineering Sytem: Lab : An Introductory Tutorial: Getting Started with SIMULINK What i SIMULINK? SIMULINK i a oftware package for modeling, imulating, and analyzing dynamic ytem.
More informationLaboratory Exercise 6
Laboratory Exercie 6 Adder, Subtractor, and Multiplier a a The purpoe of thi exercie i to examine arithmetic circuit that add, ubtract, and multiply number. Each b c circuit will be decribed in Verilog
More informationNearly Constant Approximation for Data Aggregation Scheduling in Wireless Sensor Networks
Nearly Contant Approximation for Data Aggregation Scheduling in Wirele Senor Network Scott C.-H. Huang, Peng-Jun Wan, Chinh T. Vu, Yinghu Li and France Yao Computer Science Department, City Univerity of
More informationModeling and Analysis of Slow CW Decrease for IEEE WLAN
Modeling and Analyi of Slow CW Decreae for IEEE 82. WLAN Qiang Ni, Imad Aad 2, Chadi Barakat, and Thierry Turletti Planete Group 2 Planete Group INRIA Sophia Antipoli INRIA Rhône-Alpe Sophia Antipoli,
More informationMinimum Energy Reliable Paths Using Unreliable Wireless Links
Minimum Energy Reliable Path Uing Unreliable Wirele Link Qunfeng Dong Department of Computer Science Univerity of Wiconin-Madion Madion, Wiconin 53706 qunfeng@c.wic.edu Micah Adler Department of Computer
More informationLinkGuide: Towards a Better Collection of Hyperlinks in a Website Homepage
Proceeding of the World Congre on Engineering 2007 Vol I LinkGuide: Toward a Better Collection of Hyperlink in a Webite Homepage A. Ammari and V. Zharkova chool of Informatic, Univerity of Bradford anammari@bradford.ac.uk,
More informationHassan Ghaziri AUB, OSB Beirut, Lebanon Key words Competitive self-organizing maps, Meta-heuristics, Vehicle routing problem,
COMPETITIVE PROBABIISTIC SEF-ORGANIZING MAPS FOR ROUTING PROBEMS Haan Ghaziri AUB, OSB Beirut, ebanon ghaziri@aub.edu.lb Abtract In thi paper, we have applied the concept of the elf-organizing map (SOM)
More informationKeywords Cloud Computing, Service Level Agreements (SLA), CloudSim, Monitoring & Controlling SLA Agent, JADE
Volume 5, Iue 8, Augut 2015 ISSN: 2277 128X International Journal of Advanced Reearch in Computer Science and Software Engineering Reearch Paper Available online at: www.ijarce.com Verification of Agent
More informationNetwork Coding in Duty-Cycled Sensor Networks
1 Network Coding in Duty-Cycled Senor Network Roja Chandanala, Radu Stoleru, Member, IEEE Abtract Network coding and duty-cycling are two popular technique for aving energy in wirele adhoc and enor network.
More informationThrough the Diversity of Bandwidth-Related Metrics, Estimation Techniques and Tools: An Overview
I. J. Computer Network and Information Security, 08, 8, -6 Publihed Oine Augut 08 in MECS (http://www.mec-pre.org/) DOI: 0.585/icni.08.08.0 Through the Diverity of Bandwidth-Related Metric, Etimation Technique
More informationA System Dynamics Model for Transient Availability Modeling of Repairable Redundant Systems
International Journal of Performability Engineering Vol., No. 3, May 05, pp. 03-. RAMS Conultant Printed in India A Sytem Dynamic Model for Tranient Availability Modeling of Repairable Redundant Sytem
More informationA Fast Association Rule Algorithm Based On Bitmap and Granular Computing
A Fat Aociation Rule Algorithm Baed On Bitmap and Granular Computing T.Y.Lin Xiaohua Hu Eric Louie Dept. of Computer Science College of Information Science IBM Almaden Reearch Center San Joe State Univerity
More informationPerformance Evaluation of an Advanced Local Search Evolutionary Algorithm
Anne Auger and Nikolau Hanen Performance Evaluation of an Advanced Local Search Evolutionary Algorithm Proceeding of the IEEE Congre on Evolutionary Computation, CEC 2005 c IEEE Performance Evaluation
More informationFirewall Packet Filtering Optimization using Statistical Traffic Awareness Test
Firewall Packet Filtering Optimization uing Statitical Traffic Awarene Tet Zouheir Trabel Liren Zhang and Safaa Zeidan Faculty of Information Technology UAE Univerity Al-Ain, UAE {trabel lzhang, afaa.z}
More informationA study on turbo decoding iterative algorithms
Buletinul Ştiinţific al Univerităţii "Politehnica" din Timişoara Seria ELECTRONICĂ şi TELECOMUNICAŢII TRANSACTIONS on ELECTRONICS and COMMUNICATIONS Tom 49(63, Facicola 2, 2004 A tudy on turbo decoding
More informationMarkov Random Fields in Image Segmentation
Preented at SSIP 2011, Szeged, Hungary Markov Random Field in Image Segmentation Zoltan Kato Image Proceing & Computer Graphic Dept. Univerity of Szeged Hungary Zoltan Kato: Markov Random Field in Image
More informationParameters, UVM, Coverage & Emulation Take Two and Call Me in the Morning
Parameter, UVM, Coverage & Emulation Take Two and Call Me in the Morning Michael Horn Mentor Graphic Corporation Colorado, USA Mike_Horn@mentor.com Bryan Ramirez Mentor Graphic Corporation Colorado, USA
More informationModeling of underwater vehicle s dynamics
Proceeding of the 11th WEA International Conference on YTEM, Agio Nikolao, Crete Iland, Greece, July 23-25, 2007 44 Modeling of underwater vehicle dynamic ANDRZEJ ZAK Department of Radiolocation and Hydrolocation
More informationApplication of Social Relation Graphs for Early Detection of Transient Spammers
Radolaw rendel and Henryk Krawczyk Application of Social Relation raph for Early Detection of Tranient Spammer RADOSLAW RENDEL and HENRYK KRAWCZYK Electronic, Telecommunication and Informatic Department
More informationComputer Arithmetic Homework Solutions. 1 An adder for graphics. 2 Partitioned adder. 3 HDL implementation of a partitioned adder
Computer Arithmetic Homework 3 2016 2017 Solution 1 An adder for graphic In a normal ripple carry addition of two poitive number, the carry i the ignal for a reult exceeding the maximum. We ue thi ignal
More informationConnected Placement of Disaster Shelters in Modern Cities
Connected Placement of Diater Shelter in Modern Citie Huanyang Zheng and Jie Wu Department of Computer and Information Science Temple Univerity, USA {huanyang.zheng, jiewu}@temple.edu ABSTRACT Thi paper
More informationEmbedding Service Function Tree with Minimum Cost for NFV Enabled Multicast
1 Embedding Service Function Tree with Minimum ot for NFV Enabled Multicat angbang Ren, Student Member, IEEE, eke Guo, Senior Member, IEEE, Yulong Shen, Member, IEEE, Guoming Tang, Member, IEEE, Xu Lin,
More informationAn Algebraic Approach to Adaptive Scalable Overlay Network Monitoring
An Algebraic Approach to Adaptive Scalable Overlay Network Monitoring ABSTRACT Overlay network monitoring enable ditributed Internet application to detect and recover from path outage and period of degraded
More informationShortest Path Routing in Arbitrary Networks
Journal of Algorithm, Vol 31(1), 1999 Shortet Path Routing in Arbitrary Network Friedhelm Meyer auf der Heide and Berthold Vöcking Department of Mathematic and Computer Science and Heinz Nixdorf Intitute,
More informationA Multi-objective Genetic Algorithm for Reliability Optimization Problem
International Journal of Performability Engineering, Vol. 5, No. 3, April 2009, pp. 227-234. RAMS Conultant Printed in India A Multi-objective Genetic Algorithm for Reliability Optimization Problem AMAR
More informationarxiv: v1 [cs.ds] 27 Feb 2018
Incremental Strong Connectivity and 2-Connectivity in Directed Graph Louka Georgiadi 1, Giueppe F. Italiano 2, and Niko Parotidi 2 arxiv:1802.10189v1 [c.ds] 27 Feb 2018 1 Univerity of Ioannina, Greece.
More informationAnalysis of the results of analytical and simulation With the network model and dynamic priority Unchecked Buffer
International Reearch Journal of Applied and Baic Science 218 Available online at www.irjab.com ISSN 2251-838X / Vol, 12 (1): 49-53 Science Explorer Publication Analyi of the reult of analytical and imulation
More informationAN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROBLEM
RAC Univerity Journal, Vol IV, No, 7, pp 87-9 AN ALGORITHM FOR RESTRICTED NORMAL FORM TO SOLVE DUAL TYPE NON-CANONICAL LINEAR FRACTIONAL PROGRAMMING PROLEM Mozzem Hoain Department of Mathematic Ghior Govt
More informationGeneric Traverse. CS 362, Lecture 19. DFS and BFS. Today s Outline
Generic Travere CS 62, Lecture 9 Jared Saia Univerity of New Mexico Travere(){ put (nil,) in bag; while (the bag i not empty){ take ome edge (p,v) from the bag if (v i unmarked) mark v; parent(v) = p;
More informationmapping reult. Our experiment have revealed that for many popular tream application, uch a networking and multimedia application, the number of VC nee
Reolving Deadlock for Pipelined Stream Application on Network-on-Chip Xiaohang Wang 1,2, Peng Liu 1 1 Department of Information Science and Electronic Engineering, Zheiang Univerity Hangzhou, Zheiang,
More informationShortest Paths Problem. CS 362, Lecture 20. Today s Outline. Negative Weights
Shortet Path Problem CS 6, Lecture Jared Saia Univerity of New Mexico Another intereting problem for graph i that of finding hortet path Aume we are given a weighted directed graph G = (V, E) with two
More informationTask-based Adaptation for Ubiquitous Computing
IEEE Tranaction on Sytem, Man, and Cybernetic, Part C: Application and Review Special Iue on Engineering Autonomic Sytem, to appear Tak-baed Adaptation for Ubiquitou Computing João Pedro Soua, Vahe Poladian,
More informationA Novel Feature Line Segment Approach for Pattern Classification
12th International Conference on Information Fuion Seattle, WA, USA, July 6-9, 2009 A Novel Feature Line Segment Approach for Pattern Claification Yi Yang Intitute of Integrated Automation Xi an Jiaotong
More informationSECTOR BASED MULTICAST ROUTING ALGORITHM FOR MOBILE AD-HOC NETWORKS
SECTOR BASED MULTICAST ROUTING ALGORITHM OR MOBILE AD-HOC NETWORKS Murali Paramewaran 1 and Chittaranjan Hota 2 1 Department of Computer Science & Information Sytem, BITS-Pilani, Pilani, India 2 Department
More informationResearch Article Longest Path Reroute to Optimize the Optical Multicast Routing in Sparse Splitting WDM Networks
International Optic Volume 0, Article ID 9, page http://dxdoiorg/0/0/9 Reearch Article Longet Path Reroute to Optimize the Optical Multicat Routing in Spare Splitting WDM Network Huanlin Liu, Hongyue Dai,
More informationIncreasing Throughput and Reducing Delay in Wireless Sensor Networks Using Interference Alignment
Int. J. Communication, Network and Sytem Science, 0, 5, 90-97 http://dx.doi.org/0.436/ijcn.0.50 Publihed Online February 0 (http://www.scirp.org/journal/ijcn) Increaing Throughput and Reducing Delay in
More informationDistributed Media-Aware Rate Allocation for Video Multicast over Wireless Networks
Ditributed Media-Aware Rate Allocation for Video Multicat over Wirele Network Xiaoqing Zhu, Thoma Schierl, Thoma Wiegand, Senior Member, IEEE, and Bernd Girod, Fellow, IEEE Abtract A unified optimization
More informationFloating Point CORDIC Based Power Operation
Floating Point CORDIC Baed Power Operation Kazumi Malhan, Padmaja AVL Electrical and Computer Engineering Department School of Engineering and Computer Science Oakland Univerity, Rocheter, MI e-mail: kmalhan@oakland.edu,
More informationA Handover Scheme for Mobile WiMAX Using Signal Strength and Distance
A Handover Scheme for Mobile WiMAX Uing Signal Strength and Ditance Mary Alatie, Mjumo Mzyece and Anih Kurien Department of Electrical Engineering/French South African Intitute of Technology (F SATI) Thwane
More informationA Hybrid Deployable Dynamic Traffic Assignment Framework for Robust Online Route Guidance
A Hybrid Deployable Dynamic Traffic Aignment Framework for Robut Online Route Guidance Sriniva Peeta School of Civil Engineering, Purdue Univerity Chao Zhou Sabre, Inc. Sriniva Peeta School of Civil Engineering
More informationDistributed Partial Information Management (DPIM) Schemes for Survivable Networks - Part II
IEEE INFOCO 2002 1 Ditributed Partial Information anagement (DPI) Scheme for Survivable Network - Part II Dahai Xu Chunming Qiao Department of Computer Science and Engineering State Univerity of New York
More informationStream: Low Overhead Wireless Reprogramming for Sensor Networks
Thi full text paper wa peer reviewed at the direction of IEEE Communication Society ubject matter expert for publication in the IEEE INFOCOM 27 proceeding. : Low Overhead Wirele Reprogramming for Senor
More informationThe Data Locality of Work Stealing
The Data Locality of Work Stealing Umut A. Acar School of Computer Science Carnegie Mellon Univerity umut@c.cmu.edu Guy E. Blelloch School of Computer Science Carnegie Mellon Univerity guyb@c.cmu.edu Robert
More informationOptimal Peer-to-Peer Technique for Massive Content Distribution
1 Optimal Peer-to-Peer Technique for Maive Content Ditribution Xiaoying Zheng, Chunglae Cho and Ye Xia Computer and Information Science and Engineering Department Univerity of Florida Email: {xiazheng,
More informationA Linear Interpolation-Based Algorithm for Path Planning and Replanning on Girds *
Advance in Linear Algebra & Matrix Theory, 2012, 2, 20-24 http://dx.doi.org/10.4236/alamt.2012.22003 Publihed Online June 2012 (http://www.scirp.org/journal/alamt) A Linear Interpolation-Baed Algorithm
More informationCERIAS Tech Report EFFICIENT PARALLEL ALGORITHMS FOR PLANAR st-graphs. by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daescu
CERIAS Tech Report 2003-15 EFFICIENT PARALLEL ALGORITHMS FOR PLANAR t-graphs by Mikhail J. Atallah, Danny Z. Chen, and Ovidiu Daecu Center for Education and Reearch in Information Aurance and Security,
More informationAdvanced Encryption Standard and Modes of Operation
Advanced Encryption Standard and Mode of Operation G. Bertoni L. Breveglieri Foundation of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) i a ymmetric cryptographic algorithm AES
More informationLaboratory Exercise 2
Laoratory Exercie Numer and Diplay Thi i an exercie in deigning cominational circuit that can perform inary-to-decimal numer converion and inary-coded-decimal (BCD) addition. Part I We wih to diplay on
More informationA METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS
Vietnam Journal of Science and Technology 55 (5) (017) 650-657 DOI: 10.1565/55-518/55/5/906 A METHOD OF REAL-TIME NURBS INTERPOLATION WITH CONFINED CHORD ERROR FOR CNC SYSTEMS Nguyen Huu Quang *, Banh
More informationTFRC-CR: An Equation-based Transport Protocol for Cognitive Radio Networks
213 International onference on omputing, Networking and ommunication (IN) Workhop on omputing, Networking and ommunication -R: An Equation-baed Tranport Protocol for ognitive Radio Network Abdulla K. Al-Ali
More informationToday s Outline. CS 561, Lecture 23. Negative Weights. Shortest Paths Problem. The presence of a negative cycle might mean that there is
Today Outline CS 56, Lecture Jared Saia Univerity of New Mexico The path that can be trodden i not the enduring and unchanging Path. The name that can be named i not the enduring and unchanging Name. -
More informationShortest Paths with Single-Point Visibility Constraint
Shortet Path with Single-Point Viibility Contraint Ramtin Khoravi Mohammad Ghodi Department of Computer Engineering Sharif Univerity of Technology Abtract Thi paper tudie the problem of finding a hortet
More informationStochastic Search and Graph Techniques for MCM Path Planning Christine D. Piatko, Christopher P. Diehl, Paul McNamee, Cheryl Resch and I-Jeng Wang
Stochatic Search and Graph Technique for MCM Path Planning Chritine D. Piatko, Chritopher P. Diehl, Paul McNamee, Cheryl Rech and I-Jeng Wang The John Hopkin Univerity Applied Phyic Laboratory, Laurel,
More informationCutting Stock by Iterated Matching. Andreas Fritsch, Oliver Vornberger. University of Osnabruck. D Osnabruck.
Cutting Stock by Iterated Matching Andrea Fritch, Oliver Vornberger Univerity of Onabruck Dept of Math/Computer Science D-4909 Onabruck andy@informatikuni-onabrueckde Abtract The combinatorial optimization
More information(12) Patent Application Publication (10) Pub. No.: US 2011/ A1
(19) United State US 2011 0316690A1 (12) Patent Application Publication (10) Pub. No.: US 2011/0316690 A1 Siegman (43) Pub. Date: Dec. 29, 2011 (54) SYSTEMAND METHOD FOR IDENTIFYING ELECTRICAL EQUIPMENT
More informationChapter S:II (continued)
Chapter S:II (continued) II. Baic Search Algorithm Sytematic Search Graph Theory Baic State Space Search Depth-Firt Search Backtracking Breadth-Firt Search Uniform-Cot Search AND-OR Graph Baic Depth-Firt
More informationCross-Layer Interactions in Multihop Wireless Sensor Networks: A Constrained Queueing Model
Cro-Layer Interaction in Multihop Wirele Senor Network: A Contrained Queueing Model YANG SONG Univerity of Florida and YUGUANG FANG Univerity of Florida Xidian Univerity In thi article, we propoe a contrained
More information