Tackling IPv6 Address Scalability from the Root

Size: px
Start display at page:

Download "Tackling IPv6 Address Scalability from the Root"

Transcription

1 Takling IPv6 Address Salability from the Root Mei Wang Ashish Goel Balaji Prabhakar Stanford University {wmei, ashishg, ABSTRACT Internet address alloation shemes have a huge impat on the size of routing tables. Due to the imminent deployment of IPv6 and the rapidly growing number of users worldwide, it is very urgent that we have a good address alloation algorithm for IPv6. Addresses are alloated by registries to users in the form of prefixes. Suh an alloation dovetails niely with the Longest Mathing Prefix algorithm employed by routers to keep the address lookup problem salable. However, some users inevitably grow in size and need more addresses. The additional alloations often end up reating new prefixes, ausing undesirable address fragmentation. We further develop a simple algorithm, alled Growthbased Address Partitioning (GAP), proposed in Wang (2005). GAP alloates addresses taking into aount the possibility that users may grow in the future. However, it makes the unrealisti assumption that this growth rate is known at the time of the initial request. In this paper, we develop an online version of the GAP algorithm and use theory, simulations and real data from the Asia Paifi and the Chinese registries to show that the online version yields an order of magnitude less address fragmentation ompared to existing alloation shemes. This is signifiant for reduing routing table size, inreasing salability and improving the performane of the Internet. Categories and Subjet Desriptors H.1 [Information Systems]: Models and Priniples General Terms Algorithms, Management, Theory. Keywords Internet address alloation 1. INTRODUCTION Permission to make digital or hard opies of all or part of this work for personal or lassroom use is granted without fee provided that opies are not made or distributed for profit or ommerial advantage and that opies bear this notie and the full itation on the first page. To opy otherwise, to republish, to post on servers or to redistribute to lists, requires prior speifi permission and/or a fee. IPv6 07, August 31, 2007, Kyoto, Japan. Copyright 2007 ACM /07/ $5.00. In a reent meeting of the IETF s Internet Arhiteture Board dediated to routing and addressing [1], the salability of the routing problem was noted as an urgent issue, espeially in the ontext of IPv6. The salability of route lookups depends on the size and struture of routing tables whih, in turn, depend on a good address alloation algorithm [4, 5, 6]. A bad algorithm an ause address fragmentation, whih refers to a single user being represented by multiple disjoint prefixes. Address fragmentation severely degrades the performane of longest-prefix-mathing-based route lookup algorithms whih perform best with a single (unfragmented) prefix per user. Thus, it is imperative we seek a good address alloation algorithm for IPv6 now. The seemingly infinite address spae offered by IPv6 may lead to the pereption that a key problem in IPv4 address fragmentation might no longer be an issue in IPv6. We argue this is not the ase. First of all, the total address IPv6 provides is not as large as it seems. Only the first 64 bits out of the total 128 bits for eah address are used for routing, the other 64 bits are saved for physial ID, e.g., MAC address of ethernet ard. Furthermore, even if the address spae seems to be immense today, history has repeatedly demonstrated that a large supply inevitably invites large onsumption. Lessons from IPv4 show that it would be too late to wait until the address spae beomes rowded before ating. The onern that IPv6 addresses may not be an unlimited resoure has led reent studies to projet IPv6 address spae usage [13]. These studies show that with the urrent address alloation poliies and a onservative projeted onsumption rate, IPv6 addresses will be exhausted in 60 years without taking emerging new appliations into aount. This onern has led to proposals of remedies and poliy hanges to make more effiient use of the address spae and prolong the lifespan of IPv6 [12, 13]. Another fat worth pointing out is that address alloation is not the only fator that may lead to fragmentation, it is one of several auses suh as multi-homing. In this paper, we will fous only on reduing address alloation indued fragmentation. The Growth-based Address Partitioning (GAP) algorithm was proposed to alloate address spae based on eah user s growth rate [2]. Assuming this growth rate is known (an assumption we will relax in this paper), it was suggested that rapidly-growing users ought to be allowed more spae to grow by having their initial prefix allotments in more open regions of the address spae. This is different from an alloation sheme proposed for IPv6, alled the Bisetion al-

2 gorithm. This algorithm assigns a new request to the largest urrently open region, regardless of their growth rate. Thus, the Bisetion algorithm makes the impliit assumption that all users will grow at the same rate. The paper [2] showed that GAP signifiantly redues the number of fragmentations relative to the Bisetion method. This paper provides stronger evidene via theory and simulations. In order to use GAP one needs to know eah user s growth rate, whih is not always available. In this paper, we develop an online version of GAP where we estimate the growth rate of eah user empirially in an online fashion. Using real data from the Asia Paifi and the Chinese registries, we show that this online GAP an redue the number of fragmentations by an order of magnitude ompared to existing alloations. The rest of this paper is organized as follows: Setion 2 lays out the bakground for how addresses are alloated nowadays. Setion 3 desribes the GAP algorithm. Setion 4 proves that the GAP is point-wise optimum. Setion 5 presents the online version of the GAP sheme presents omparisons with other shemes on real data. 2. HOW ADDRESSES ARE ALLOCATED 2.1 Alloation hierarhy The IP address alloation hierarhy is shown in Figure 1. At the top of the hierarhy, the whole address pool is ontrolled by the Internet Assigned Numbers Authority (IANA). IANA alloates large address bloks to eah of the Regional Internet Registries (RIRs) serving North Ameria (ARIN), Europe (RIPE), Asia Paifi (APNIC), Afria (AfriNIC), and Latin Ameria and the Caribbean (LACNIC). The regional registries divide up these large address bloks into medium bloks to alloate to Loal Internet Registries (LIRs), onsisting mainly of Internet Servie Providers (ISPs). The ISPs further assign small address bloks to their users, inluding ompanies, universities, smaller ISPs, et. An address alloation is defined by alloation size and loation. Alloation size speifies how large of the address blok or the prefix is assigned. Alloation loation is where in the address pool this blok is alloated to, this is the result of alloation algorithms. Thus, alloation algorithms determine how address spae is partitioned. While alloation sizes an be different at eah alloation hierarhy layer, a good alloation algorithm an be applied to any layer in the alloation hierarhy and any registry. We will desribe the urrent poliies on alloation sizes and alloation algorithms. 2.2 Alloation sizes The poliies on alloation sizes vary for different registries at different levels, as shown in Figure 1. For example, in the urrent IPv4 poliies [8, 9, 10], IANA alloates to RIRs in the unit of /8. Different RIRs adopt their own poliies for alloations to LIR/ISPs with unit sizes varying from /10 to /20. The sizes assigned to end users by eah ISP also vary greatly. Due to historial alloation shemes, fragmentation is a ommon problem in IPv4 [4]: one ISP is often left with multiple prefixes. For the 128-bit IPv6 address, the last 64 bits are assigned to interfae ID [3], e.g., an ethernets MAC address. Thus, Figure 1: Address alloation hierarhy and poliies on sizes. address alloation only onsiders the top 64 bits. Alloation poliies in terms of size are shown in Figure 1. There is a proposal [15] from major RIRs reommending a Common Address Pool (CAP) in IANA for all RIRs, instead of eah RIR keeping a separate pool of addresses for alloation. Assigning appropriate address sizes at different level has been under extensive disussions [8, 9, 10, 11, 14]. There are many issues involved in the poliy deisions on sizes, suh as fairness, eonomial issues, politial issues, et. The fous of the work in this paper will be on alloation algorithms, whih we believe deserve more attention. 2.3 Alloation algorithms There are two address alloation algorithms that are urrently deployed in the real world: the sequential sheme and the bisetion sheme. Before going into these two algorithms, let us first define two terminologies that we will use often in this paper. Address fragmentation: as mentioned before, it refers to non-ontinuous address bloks for one entity, i.e., more than one prefix representing a single entity in the routing table. Address fragmentation inreases routing table size, dereases the effiieny of IP lookup and routing, as well as redues network salability. Collision: when a user runs out of address spae for further expansion, due to the proximity of the neighboring users in the address spae, this phenomenon is alled ollision. When ollision ours, the address provider an either find a separate loation on the address line or still expand the user s spae by arving out the setion already oupied by its neighbor. Both options lead to fragmentation. Suh pratie should be avoided whenever it is possible. A third option is to move either one of the two users to a different address loation, whih will reate muh hassle and may not always be viable Sequential sheme Sequential sheme is the method used ommonly in the real world pratie attributed to its simpliity. In essene, eah new request is alloated into the first empty spae available from left to right on the address line that fits the requested size. Sequential is a good sheme if the requested sizes are stati, i.e., there is no growth of eah user, the total required size for eah user is fixed at the beginning of the alloation. This is obviously not the ase in reality. Eah entity often requests a relatively small address blok at the beginning,

3 Figure 3: GAP sheme. Figure 2: Bisetion sheme. then omes bak for more as it grows, as we will see in real alloation request patterns in setion Bisetion sheme Bisetion sheme is proposed for IPv6 address alloation pratie by regional registries [18]. Address bloks are alloated in the following way: eah new address blok is alloated by evenly splitting the maximum available spae on the address line between the existing user and the new user. This leaves maximum possible spae for potential growth of both users. An example using this sheme is illustrated in Figure 2. Eah user is given an ID labeling the inoming sequene of the users. The first four users are alloated by dividing the total address spae equally into four parts as shown in Figure 2(a). When the fifth user applies for an address blok, it is plaed to evenly split the setion labeled by the arrow in Figure 2(b). The 6th, 7th, and 8th user will be plaed sequentially in the spaes after the 2nd, 3rd, and 4th user, respetively. Only after the largest empty slots have been exhausted, will new alloations be assigned to biset the smaller slots at the next level. A similar tehnique an be found for dynami memory alloation in Operating Systems. This method uniformly separates the alloated bloks to maximize the spaing between users. It treats eah user equally. Regardless whether a user is big or small, as far as it omes in as the 5th user in the address requesting sequene, this user is always alloated into the spae as shown in Figure 2(b). In reality, different users are likely to require different sizes in the address spae and have different growth rates. Thus this uniform partition may not be the most effiient way to utilize the address spae and give eah user adequate amount of spae to grow, espeially when there are a few very fastgrowing users. These fast-growers are prone for ollisions. 3. GAP: GROWTH-BASED ADDRESS PAR- TITIONING To utilize the address spae more effiiently and redue ollisions, Growth-based Address Partitioning (GAP) sheme [2] was proposed to make alloations based on the growth of eah user. We will review the mehanism of the basi GAP sheme to layout the foundation for the theoretial proof in the next setion. When there are n exiting users, there are at most n possible address loation andidates for the (n+1) th user. Instead of treating eah user equally, as in the bisetion sheme, the GAP sheme evaluates all the options and hooses the lo- ation based on the existing users sizes and their growthrates, the available spae sizes, as well as the size and the growth-rate of the new user. For example, one an hoose the loation for the new user that maximizes the time before the first ollision is projeted to take plae. Beause the prefix bits are binary, the newly alloated blok has to start at the middle point of the available address spae. The growth rate information is assumed to be given in the base ase of GAP algorithm. We will further disuss growth rate information in Setion 5. For now, let us assume we know the growth rates. As shown in Figure 3, we define: n : n + 1 : A i : r i : X i : Y i : the number of existing users; the new user; i=1,...,n,n+1, the alloation for eah user; i=1,...,n,n+1, the growth rate of eah user; i=1,...,n, the empty spae available for the existing user to grow, i.e., the empty spae behind eah alloated blok to bisetion point; i=1,...,n, the empty spae available for newly alloated user to grow; The new loation is hosen to maximize the time before anybody runs out of spae to grow, i.e., the first ollision ours, using: max{min[t(x i, A i, r i), t(y i, A n+1, r n+1)], i = 1,..., n}. (1) t(x, A, r) is the time it takes for an alloation with size A and growth rate r to fill up the spae X. In other words, the new loation is hosen among all available spaes that maximizes the time it takes for either the existing or the new user to run into the boundary. Funtion t(x, A, r) an be of different forms depending on the definition of growth rate r. Through both quantitative analysis using theoretial models and simulations, studies show that GAP offers signifiant advantages over the existing alloation shemes for reduing address fragmentation [2]. 4. POINT-WISE OPTIMALITY OF GAP In this setion we will prove that, in an idealized setting, GAP performs at least as well as the bisetion sheme in terms of the time before the first ollision. We all this point-wise optimality, sine this does not make any stohasti assumptions and is true at all times. The proofs in this setion omplement the experiment results detailed later. We will onsider the ase where all requests arrive in some order at time t = 0 and the initial size s i of the i-th request is 1. Let r i denote the doubling rate of the i-th request, let

4 N denote the total number of requests, and let M denote the total number of bits in the address spae. We will further assume that N = 2 K ; various extensions of our proofs are possible but beyond the sope of this paper. Let t (bisetion) be the time till the first ollision for bisetion. For the GAP sheme, after j N requests have arrived, define t (GAP,j) to be the ollision time if there were no more arrivals. Lemma 4.1. t (GAP,j) t (bisetion) Proof. We will prove this lemma using indution. Base ase (j = 1): In this ase, t (GAP,1) is the ollision time using GAP with only the first request; this is learly no worse than bisetion. Indutive hypothesis: assume the following equation holds for j: t (GAP,j) t (bisetion) (2) Indutive step: onsider request j + 1 N. We an think of the M-bit address spae as a tree of depth M. We will use the term subtree to denote the set of desendants of a point (inluding itself) in this tree. Consider the 2 K subtrees of size 2 M K. Sine j < 2 K, at least one of these subtrees must be empty. Let t be the ollision time if request j + 1 is assigned to the start of this free subtree of size 2 (M K) and if there are no more requests. The proof of the indutive step follows from the following two laims: Claim 1: t (GAP,j+1) t. This laim is easily seen to be true by invoking the single step optimality of GAP. Claim 2: t t (bisetion). The proof of this laim an be divided into two ases. Case 1: if the (j + 1)-th request is involved in the first ollision for GAP, then one of the two olliding requests (we all it request i) must have grown to a size larger than 2 M K. But the bisetion sheme will alloate all requests to subtrees of size 2 M K, and hene the same request i will ause a ollision in the bisetion sheme before time t, i.e. t t (bisetion). Case 2: if request j+1 is not involved in the first ollision in GAP, then the ollision time for GAP does not hange as the result of this new request, and we have t = t (GAP,j) whih is at least as large as t (bisetion) indutive hypothesis. by the Thus, we proved that the time to ollision using GAP is always equal to or longer than that of using bisetion under our idealized onditions. 5. ONLINE GAP WITH REAL DATA 5.1 Online GAP In the base version of the GAP algorithm, the growth rate information of eah user is assumed to be provided at the initial request and remains onstant over time. What if this information is not always available? The method we develop is Online GAP: the growth rate of eah user is estimated based on the historial data of its requests. Using the urrent utilized address spaes and growth projetions of all existing users, Online GAP alloates address bloks for eah new request to prolong the time to ollision. For eah first-time user, we assume that its growth rate is minumum until the same user later sends in further requests. This firsttime user will be alloated based on the size of its request, the existing users urrent utilization and projeted growth rates. As we will see in the address requesting patterns from real data, most are returning users who ome bak for more address spae multiple times as they grow. In the following two subsetions, we will test the performane of Online GAP. The best way to test it is applying the sheme to real data. However, there are very few real IPv6 data available nowadays, while we have a long history of IPv4 alloations. We believe that a good address alloation sheme an benefit both IPv4 and IPv6. What if we had adopted this proposed alloation algorithm for IPv4 say, six months, one year, or even ten years ago? How would the results ompare with that of the existing alloation? Suh omparisons an be an objetive judgment on how good of an alloation algorithm is. Following this thought, we onduted experiments using data from existing IPv4 alloations from a regional registry and a ountry registry. These data are the historial address requesting sequenes from various users. They are fed into the Online GAP engine in the idential order as they were atually requested without any knowledge of future alloations. This makes it an apple-to-apple omparison with the existing alloations. 5.2 Results from Asia Paifi data Asia Paifi Network Information Center (APNIC) is one of the five Regional Internet Registries in the world, in harge of the address alloation and management in the Asia Paifi region. The alloation data from APNIC span from July 1, 1985 to Deember 27, The address bloks are alloated to a region or a large ISP diretly. We proessed the data based on eah ountry or region as an entity. Eah entity has a unique ID. There are 52 entities total in this set of data. Figure 4: Histogram of user requests for APNIC alloation data. To show an example, a blok of the address /7 is used in the experiment shown here. Thus, the total address spae in this blok is There are 21 entities assigned in this blok. The assignments in this blok are very reent: from May 2006 to Deember The histogram of the

5 Number of / Figure 5: users. Address spae request from user 4 from 5/2006 to 12/2006 APNIC data, address blok / Month The request pattern of one of APNIC Number of fragmentations Comparison using CNNIC alloation data Existing CNNIC alloation New algorithm (GAP) 0 6/ /2000 6/ /2001 6/ /2002 6/ /2003 6/ /2004 Alloation date Figure 7: With real alloation data from CNNIC, the number of fragmentation is signifiantly redued using GAP ompared to the existing alloation. number of requests from eah entity is shown in Figure 4, sorted in desending order. The largest number of requests from a single entity during this period of time is 39. Among these 21 entities, 6 of them requested for address bloks only one. The majority of the entities (16 out of 21) requested less than 10 times. As the 80/20 rule ditates, the major part of the address spae is assigned to few entities. Figure 5 shows one of the entities request pattern as an example. This user has requested 28 times during this period of time in this blok. The minimum size of alloation is Number of fragmentations Comparison using APNIC alloation data Existing APNIC alloation New algorithm (GAP) 0 6/2006 7/2006 8/2006 9/ / / /2006 Alloation date Figure 6: With real alloation data from APNIC, the number of fragmentation is signifiantly redued using GAP ompared to the existing alloation. The omparison results in terms of the number of fragmentation are shown in Figure 6. Using the same set of APNIC data, GAP redues the number of fragmentation from 150 to 16 ompared to the urrent alloations, a 90% redution of fragmentation. 5.3 Results from China data China Internet Network Information Center (CNNIC) is a ountry registry, in harge of IP address alloation and management in China. The same methodology is used for this set of data as for APNIC data. The omparison results in Figure 7 show the number of fragmentation is redued from 124 to 30 using GAP. In both ases, the online alloations using GAP fulfilled the same address alloation requests with a muh higher degree of aggregation. All the results we experimented onsistently demonstrate similar degree of improvement in reduing fragmentation using GAP. What is shown here is only one blok of addresses, whih has limited room to enable the full advantages of GAP. Also the time span we looked at is relatively short. If larger total address spae and longer time duration are given, the gain of using GAP an be even more substantial. As more time and spae give the algorithm more buffer to better arrange the addresses. This is why it is ritial to do the address alloation right for IPv6 from the beginning. Also, these results are ahieved without any additional information taken from users. All the growth rate information are derived empirially from the historial data. If projeted growths are provided by individual organization when it requests for addresses, even larger enhanements an be aomplished. 6. CONCLUSIONS AND FUTURE WORK We have studied the GAP algorithm for Internet address alloation using theory and real data. We have shown that GAP is point-wise optimum ompared to the existing Bisetion sheme. An online version of the GAP algorithm is developed; it estimates a user s growth rate based on its past requests. Experiments with real data show that the online versrion of GAP signifiantly redues address fragmentation relative to other shemes. As IPv6 is in the proess of deployment, entities at different levels of the hierarhy are seeking solutions for effiient address alloation. Sine its introdution, GAP has attrated the interest of regional and ountry IP registries, orporations and universities. In partiular, CNNIC is developing a software tool based on the work in this paper that will aid in understanding the goodness of address alloation poliies. Many open questions remain; the following are some of the more important ones. Sine the GAP algorithm s performane is losely related to the auray of the growth rate information provided, it is worthwhile onsidering ways in whih the growth rate

6 an be aurately estimated. Mining historial data (e.g., at a registry, an ISP, or a ompany) is one way of getting aurate information. A more diret way is to inent the users to provide an estimate of their growth rate along with their initial requests. Other potential researh diretions are to design and analyze ompletely different address alloation methods, suh as non-prefix based address alloation, provider independent address alloation, geographial-based address alloation, et. Suh shemes will be more robust to fragmentation and ould lead to new address lookup algorithms (i.e. other than longest prefix mathing). Another researh diretion is to study the salability of the network by ombining addressing with routing, as these are learly inter-dependent. [17] IAB, IESG. RFC 3177 IAB/IESG Reommendations on IPv6 address Alloations to Sites, September [18] P. Wilson, R. Plzak, A. Pawlik. IPv6 Address Spae Management, Otober ACKNOWLEDGMENTS The authors thank Dr. Wei Mao and his team from China Internet Network Information Center (CNNIC) for providing valuable address alloation data from China. 8. REFERENCES [1] IETF Internet Arhiteture Board, Routing and Address Workshop, Otober [2] Mei Wang, A growth-based Address Alloation Sheme for IPv6, Networking, [3] R. Hinden, S. Deering. RFC2373 IP Version 6 Addressing Arhiteture. [4] T. Bu, L. Gao and D. Towsley. On Charaterizing Routing table growth. Proeedings of Global Internet [5] Z. Xu, X. Meng, C. J. Wittbrodt, S. Lu, L. Zhang. IPv4 Address Alloation and the Evolution of the BGP Routing Table. UCLA Computer Siene Department, [6] H. Narayan, R. Govindan, G. Varghese. The Impat of Address Alloation and Routing on the Struture and Implementation of Routing Tables. SIGCOMM [7] IPv4 Address Spae Report, [8] M. Kuhne, P. Rendek, S. Wilmot, L. Vegoda. IPv4 Address Alloation and Assignment Poliies for the RIPE NCC Servie Region, Otober [9] ARIN. IPv4 Poliies. [10] Poliies for IPv4 Address Spae Management in Asia Paifi Region, Marh [11] APNIC, RIPE, ARIN. IPv6 Address Alloation and Assignment Poliy, June [12] Andrew Dul. Proposal : IPv6 HD Ratio, ARIN, Ot [13] G. Huston. Just how big is IPv6? - or Where did all those addresses go? The ISP Column, July, 2005 [14] G. Huston. Consideration of the IPv6 Alloation Unit Size, De [15] G. Huston. Alloations vs. Anounements, The ISP Column, May [16] K. Hubbard, M. Kosters, D. Conrad, K. Karrenberg, J. Postel. RFC 2050 Internet Registry IP Alloation Guidelines, November 1996.

A Growth-Based Address Allocation Scheme for IPv6

A Growth-Based Address Allocation Scheme for IPv6 A Growth-Based Address Allocation Scheme for IPv6 Mei Wang Stanford University, Stanford, CA 9435, USA wmei@stanford.edu Abstract. IP address allocation policies significantly impact the Internet infrastructure,

More information

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425) Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University

More information

Accommodations of QoS DiffServ Over IP and MPLS Networks

Accommodations of QoS DiffServ Over IP and MPLS Networks Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

Gray Codes for Reflectable Languages

Gray Codes for Reflectable Languages Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings

More information

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

Parallelizing Frequent Web Access Pattern Mining with Partial Enumeration for High Speedup

Parallelizing Frequent Web Access Pattern Mining with Partial Enumeration for High Speedup Parallelizing Frequent Web Aess Pattern Mining with Partial Enumeration for High Peiyi Tang Markus P. Turkia Department of Computer Siene Department of Computer Siene University of Arkansas at Little Rok

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering A Novel Bit Level Time Series Representation with Impliation of Similarity Searh and lustering hotirat Ratanamahatana, Eamonn Keogh, Anthony J. Bagnall 2, and Stefano Lonardi Dept. of omputer Siene & Engineering,

More information

HEXA: Compact Data Structures for Faster Packet Processing

HEXA: Compact Data Structures for Faster Packet Processing Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based

More information

Acoustic Links. Maximizing Channel Utilization for Underwater

Acoustic Links. Maximizing Channel Utilization for Underwater Maximizing Channel Utilization for Underwater Aousti Links Albert F Hairris III Davide G. B. Meneghetti Adihele Zorzi Department of Information Engineering University of Padova, Italy Email: {harris,davide.meneghetti,zorzi}@dei.unipd.it

More information

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department

More information

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY Dileep P, Bhondarkor Texas Instruments Inorporated Dallas, Texas ABSTRACT Charge oupled devies (CCD's) hove been mentioned as potential fast auxiliary

More information

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization Self-Adaptive Parent to Mean-Centri Reombination for Real-Parameter Optimization Kalyanmoy Deb and Himanshu Jain Department of Mehanial Engineering Indian Institute of Tehnology Kanpur Kanpur, PIN 86 {deb,hjain}@iitk.a.in

More information

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT?

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? 3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? Bernd Girod, Peter Eisert, Marus Magnor, Ekehard Steinbah, Thomas Wiegand Te {girod eommuniations Laboratory, University of Erlangen-Nuremberg

More information

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

Multi-Channel Wireless Networks: Capacity and Protocols

Multi-Channel Wireless Networks: Capacity and Protocols Multi-Channel Wireless Networks: Capaity and Protools Tehnial Report April 2005 Pradeep Kyasanur Dept. of Computer Siene, and Coordinated Siene Laboratory, University of Illinois at Urbana-Champaign Email:

More information

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient

More information

Incremental Mining of Partial Periodic Patterns in Time-series Databases

Incremental Mining of Partial Periodic Patterns in Time-series Databases CERIAS Teh Report 2000-03 Inremental Mining of Partial Periodi Patterns in Time-series Dataases Mohamed G. Elfeky Center for Eduation and Researh in Information Assurane and Seurity Purdue University,

More information

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method 3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr

More information

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis

More information

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks A Dual-Hamiltonian-Path-Based Multiasting Strategy for Wormhole-Routed Star Graph Interonnetion Networks Nen-Chung Wang Department of Information and Communiation Engineering Chaoyang University of Tehnology,

More information

Performance Benchmarks for an Interactive Video-on-Demand System

Performance Benchmarks for an Interactive Video-on-Demand System Performane Benhmarks for an Interative Video-on-Demand System. Guo,P.G.Taylor,E.W.M.Wong,S.Chan,M.Zukerman andk.s.tang ARC Speial Researh Centre for Ultra-Broadband Information Networks (CUBIN) Department

More information

Multi-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks

Multi-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks Multi-hop Fast Conflit Resolution Algorithm for Ad Ho Networks Shengwei Wang 1, Jun Liu 2,*, Wei Cai 2, Minghao Yin 2, Lingyun Zhou 2, and Hui Hao 3 1 Power Emergeny Center, Sihuan Eletri Power Corporation,

More information

IPv6 Deployment and Distribution in the RIPE NCC Service Region. Marco Schmidt IP Resource Analyst Monday, 23 April 2012

IPv6 Deployment and Distribution in the RIPE NCC Service Region. Marco Schmidt IP Resource Analyst Monday, 23 April 2012 IPv6 Deployment and Distribution in the RIPE NCC Service Region Marco Schmidt IP Resource Analyst Monday, 23 April 2012 Topics: RIPE NCC IPv4 - review and last /8 IPv6 - current status How to get IPv6

More information

Make your process world

Make your process world Automation platforms Modion Quantum Safety System Make your proess world a safer plae You are faing omplex hallenges... Safety is at the heart of your proess In order to maintain and inrease your ompetitiveness,

More information

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks 62 Uplink Channel Alloation Sheme and QoS Management Mehanism for Cognitive Cellular- Femtoell Networks Kien Du Nguyen 1, Hoang Nam Nguyen 1, Hiroaki Morino 2 and Iwao Sasase 3 1 University of Engineering

More information

Partial Character Decoding for Improved Regular Expression Matching in FPGAs

Partial Character Decoding for Improved Regular Expression Matching in FPGAs Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia

More information

arxiv: v1 [cs.db] 13 Sep 2017

arxiv: v1 [cs.db] 13 Sep 2017 An effiient lustering algorithm from the measure of loal Gaussian distribution Yuan-Yen Tai (Dated: May 27, 2018) In this paper, I will introdue a fast and novel lustering algorithm based on Gaussian distribution

More information

Dynamic Backlight Adaptation for Low Power Handheld Devices 1

Dynamic Backlight Adaptation for Low Power Handheld Devices 1 Dynami Baklight Adaptation for ow Power Handheld Devies 1 Sudeep Pasriha, Manev uthra, Shivajit Mohapatra, Nikil Dutt and Nalini Venkatasubramanian 444, Computer Siene Building, Shool of Information &

More information

Sparse Certificates for 2-Connectivity in Directed Graphs

Sparse Certificates for 2-Connectivity in Directed Graphs Sparse Certifiates for 2-Connetivity in Direted Graphs Loukas Georgiadis Giuseppe F. Italiano Aikaterini Karanasiou Charis Papadopoulos Nikos Parotsidis Abstrat Motivated by the emergene of large-sale

More information

1 The Knuth-Morris-Pratt Algorithm

1 The Knuth-Morris-Pratt Algorithm 5-45/65: Design & Analysis of Algorithms September 26, 26 Leture #9: String Mathing last hanged: September 26, 27 There s an entire field dediated to solving problems on strings. The book Algorithms on

More information

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr

More information

IN structured P2P overlay networks, each node and file key

IN structured P2P overlay networks, each node and file key 242 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 21, NO. 2, FEBRUARY 2010 Elasti Routing Table with Provable Performane for Congestion Control in DHT Networks Haiying Shen, Member, IEEE,

More information

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Improvement of low illumination image enhancement algorithm based on physical mode

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Improvement of low illumination image enhancement algorithm based on physical mode [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 22 BioTehnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(22), 2014 [13995-14001] Improvement of low illumination image enhanement

More information

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1. Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,

More information

IPv4 Address Report. This report generated at 12-Mar :24 UTC. IANA Unallocated Address Pool Exhaustion: 03-Feb-2011

IPv4 Address Report. This report generated at 12-Mar :24 UTC. IANA Unallocated Address Pool Exhaustion: 03-Feb-2011 IPv4 Address Report This report generated at 12-Mar-2018 08:24 UTC. IANA Unallocated Address Pool Exhaustion: 03-Feb-2011 Projected RIR Address Pool Exhaustion Dates: RIR Projected Exhaustion Remaining

More information

Improved Circuit-to-CNF Transformation for SAT-based ATPG

Improved Circuit-to-CNF Transformation for SAT-based ATPG Improved Ciruit-to-CNF Transformation for SAT-based ATPG Daniel Tille 1 René Krenz-Bååth 2 Juergen Shloeffel 2 Rolf Drehsler 1 1 Institute of Computer Siene, University of Bremen, 28359 Bremen, Germany

More information

Exploiting Enriched Contextual Information for Mobile App Classification

Exploiting Enriched Contextual Information for Mobile App Classification Exploiting Enrihed Contextual Information for Mobile App Classifiation Hengshu Zhu 1 Huanhuan Cao 2 Enhong Chen 1 Hui Xiong 3 Jilei Tian 2 1 University of Siene and Tehnology of China 2 Nokia Researh Center

More information

Facility Location: Distributed Approximation

Facility Location: Distributed Approximation Faility Loation: Distributed Approximation Thomas Mosibroda Roger Wattenhofer Distributed Computing Group PODC 2005 Where to plae ahes in the Internet? A distributed appliation that has to dynamially plae

More information

C 2 C 3 C 1 M S. f e. e f (3,0) (0,1) (2,0) (-1,1) (1,0) (-1,0) (1,-1) (0,-1) (-2,0) (-3,0) (0,-2)

C 2 C 3 C 1 M S. f e. e f (3,0) (0,1) (2,0) (-1,1) (1,0) (-1,0) (1,-1) (0,-1) (-2,0) (-3,0) (0,-2) SPECIAL ISSUE OF IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION: MULTI-ROBOT SSTEMS, 00 Distributed reonfiguration of hexagonal metamorphi robots Jennifer E. Walter, Jennifer L. Welh, and Nany M. Amato Abstrat

More information

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,

More information

1. The collection of the vowels in the word probability. 2. The collection of real numbers that satisfy the equation x 9 = 0.

1. The collection of the vowels in the word probability. 2. The collection of real numbers that satisfy the equation x 9 = 0. C HPTER 1 SETS I. DEFINITION OF SET We begin our study of probability with the disussion of the basi onept of set. We assume that there is a ommon understanding of what is meant by the notion of a olletion

More information

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections SVC-DASH-M: Salable Video Coding Dynami Adaptive Streaming Over HTTP Using Multiple Connetions Samar Ibrahim, Ahmed H. Zahran and Mahmoud H. Ismail Department of Eletronis and Eletrial Communiations, Faulty

More information

Fast Distribution of Replicated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon

Fast Distribution of Replicated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon ACEEE Int. J. on Information Tehnology, Vol. 3, No. 2, June 2013 Fast Distribution of Repliated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon Email: mmalli@aou.edu.lb

More information

We don t need no generation - a practical approach to sliding window RLNC

We don t need no generation - a practical approach to sliding window RLNC We don t need no generation - a pratial approah to sliding window RLNC Simon Wunderlih, Frank Gabriel, Sreekrishna Pandi, Frank H.P. Fitzek Deutshe Telekom Chair of Communiation Networks, TU Dresden, Dresden,

More information

Space- and Time-Efficient BDD Construction via Working Set Control

Space- and Time-Efficient BDD Construction via Working Set Control Spae- and Time-Effiient BDD Constrution via Working Set Control Bwolen Yang Yirng-An Chen Randal E. Bryant David R. O Hallaron Computer Siene Department Carnegie Mellon University Pittsburgh, PA 15213.

More information

New Channel Allocation Techniques for Power Efficient WiFi Networks

New Channel Allocation Techniques for Power Efficient WiFi Networks ew Channel Alloation Tehniques for Power Effiient WiFi etworks V. Miliotis, A. Apostolaras, T. Korakis, Z. Tao and L. Tassiulas Computer & Communiations Engineering Dept. University of Thessaly Centre

More information

A Dictionary based Efficient Text Compression Technique using Replacement Strategy

A Dictionary based Efficient Text Compression Technique using Replacement Strategy A based Effiient Text Compression Tehnique using Replaement Strategy Debashis Chakraborty Assistant Professor, Department of CSE, St. Thomas College of Engineering and Tehnology, Kolkata, 700023, India

More information

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm

More information

Direct-Mapped Caches

Direct-Mapped Caches A Case for Diret-Mapped Cahes Mark D. Hill University of Wisonsin ahe is a small, fast buffer in whih a system keeps those parts, of the ontents of a larger, slower memory that are likely to be used soon.

More information

DoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay

DoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay DoS-Resistant Broadast Authentiation Protool with Low End-to-end Delay Ying Huang, Wenbo He and Klara Nahrstedt {huang, wenbohe, klara}@s.uiu.edu Department of Computer Siene University of Illinois at

More information

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion

More information

Network Working Group Request for Comments: 4147 Category: Informational August Proposed Changes to the Format of the IANA IPv6 Registry

Network Working Group Request for Comments: 4147 Category: Informational August Proposed Changes to the Format of the IANA IPv6 Registry Network Working Group G. Huston Request for Comments: 4147 APNIC Category: Informational August 2005 Proposed Changes to the Format of the IANA IPv6 Registry Status of This Memo This memo provides information

More information

Approximate logic synthesis for error tolerant applications

Approximate logic synthesis for error tolerant applications Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu

More information

Cluster-Based Cumulative Ensembles

Cluster-Based Cumulative Ensembles Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,

More information

Parametric Abstract Domains for Shape Analysis

Parametric Abstract Domains for Shape Analysis Parametri Abstrat Domains for Shape Analysis Xavier RIVAL (INRIA & Éole Normale Supérieure) Joint work with Bor-Yuh Evan CHANG (University of Maryland U University of Colorado) and George NECULA (University

More information

Chapter 2: Introduction to Maple V

Chapter 2: Introduction to Maple V Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard

More information

The Mathematics of Simple Ultrasonic 2-Dimensional Sensing

The Mathematics of Simple Ultrasonic 2-Dimensional Sensing The Mathematis of Simple Ultrasoni -Dimensional Sensing President, Bitstream Tehnology The Mathematis of Simple Ultrasoni -Dimensional Sensing Introdution Our ompany, Bitstream Tehnology, has been developing

More information

Distributed Resource Allocation Strategies for Achieving Quality of Service in Server Clusters

Distributed Resource Allocation Strategies for Achieving Quality of Service in Server Clusters Proeedings of the 45th IEEE Conferene on Deision & Control Manhester Grand Hyatt Hotel an Diego, CA, UA, Deember 13-15, 2006 Distributed Resoure Alloation trategies for Ahieving Quality of ervie in erver

More information

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless

More information

MPhys Final Year Project Dissertation by Andrew Jackson

MPhys Final Year Project Dissertation by Andrew Jackson Development of software for the omputation of the properties of eletrostati eletro-optial devies via both the diret ray traing and paraxial approximation tehniques. MPhys Final Year Projet Dissertation

More information

Trajectory Tracking Control for A Wheeled Mobile Robot Using Fuzzy Logic Controller

Trajectory Tracking Control for A Wheeled Mobile Robot Using Fuzzy Logic Controller Trajetory Traking Control for A Wheeled Mobile Robot Using Fuzzy Logi Controller K N FARESS 1 M T EL HAGRY 1 A A EL KOSY 2 1 Eletronis researh institute, Cairo, Egypt 2 Faulty of Engineering, Cairo University,

More information

User-level Fairness Delivered: Network Resource Allocation for Adaptive Video Streaming

User-level Fairness Delivered: Network Resource Allocation for Adaptive Video Streaming User-level Fairness Delivered: Network Resoure Alloation for Adaptive Video Streaming Mu Mu, Steven Simpson, Arsham Farshad, Qiang Ni, Niholas Rae Shool of Computing and Communiations, Lanaster University

More information

Improved flooding of broadcast messages using extended multipoint relaying

Improved flooding of broadcast messages using extended multipoint relaying Improved flooding of broadast messages using extended multipoint relaying Pere Montolio Aranda a, Joaquin Garia-Alfaro a,b, David Megías a a Universitat Oberta de Catalunya, Estudis d Informàtia, Mulimèdia

More information

Divide-and-conquer algorithms 1

Divide-and-conquer algorithms 1 * 1 Multipliation Divide-and-onquer algorithms 1 The mathematiian Gauss one notied that although the produt of two omplex numbers seems to! involve four real-number multipliations it an in fat be done

More information

New Fuzzy Object Segmentation Algorithm for Video Sequences *

New Fuzzy Object Segmentation Algorithm for Video Sequences * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 521-537 (2008) New Fuzzy Obet Segmentation Algorithm for Video Sequenes * KUO-LIANG CHUNG, SHIH-WEI YU, HSUEH-JU YEH, YONG-HUAI HUANG AND TA-JEN YAO Department

More information

the data. Structured Principal Component Analysis (SPCA)

the data. Structured Principal Component Analysis (SPCA) Strutured Prinipal Component Analysis Kristin M. Branson and Sameer Agarwal Department of Computer Siene and Engineering University of California, San Diego La Jolla, CA 9193-114 Abstrat Many tasks involving

More information

An Alternative Approach to the Fuzzifier in Fuzzy Clustering to Obtain Better Clustering Results

An Alternative Approach to the Fuzzifier in Fuzzy Clustering to Obtain Better Clustering Results An Alternative Approah to the Fuzziier in Fuzzy Clustering to Obtain Better Clustering Results Frank Klawonn Department o Computer Siene University o Applied Sienes BS/WF Salzdahlumer Str. 46/48 D-38302

More information

Automated System for the Study of Environmental Loads Applied to Production Risers Dustin M. Brandt 1, Celso K. Morooka 2, Ivan R.

Automated System for the Study of Environmental Loads Applied to Production Risers Dustin M. Brandt 1, Celso K. Morooka 2, Ivan R. EngOpt 2008 - International Conferene on Engineering Optimization Rio de Janeiro, Brazil, 01-05 June 2008. Automated System for the Study of Environmental Loads Applied to Prodution Risers Dustin M. Brandt

More information

BENDING STIFFNESS AND DYNAMIC CHARACTERISTICS OF A ROTOR WITH SPLINE JOINTS

BENDING STIFFNESS AND DYNAMIC CHARACTERISTICS OF A ROTOR WITH SPLINE JOINTS Proeedings of ASME 0 International Mehanial Engineering Congress & Exposition IMECE0 November 5-, 0, San Diego, CA IMECE0-6657 BENDING STIFFNESS AND DYNAMIC CHARACTERISTICS OF A ROTOR WITH SPLINE JOINTS

More information

Adobe Certified Associate

Adobe Certified Associate Adobe Certified Assoiate About the Adobe Certified Assoiate (ACA) Program The Adobe Certified Assoiate (ACA) program is for graphi designers, Web designers, video prodution designers, and digital professionals

More information

Query Evaluation Overview. Query Optimization: Chap. 15. Evaluation Example. Cost Estimation. Query Blocks. Query Blocks

Query Evaluation Overview. Query Optimization: Chap. 15. Evaluation Example. Cost Estimation. Query Blocks. Query Blocks Query Evaluation Overview Query Optimization: Chap. 15 CS634 Leture 12 SQL query first translated to relational algebra (RA) Atually, some additional operators needed for SQL Tree of RA operators, with

More information

FREQUENTLY ASKED QUESTIONS ABOUT IPv6

FREQUENTLY ASKED QUESTIONS ABOUT IPv6 FREQUENTLY ASKED QUESTIONS ABOUT IPv6 What is an IP? The letters IP stand for Internet Protocol. This protocol comprises a series of rules used by devices (computers, servers, routers and other equipment:

More information

IPv6, Act Now! Daniel Karrenberg, RIPE NCC Chief Scientist

IPv6, Act Now! Daniel Karrenberg, RIPE NCC Chief Scientist IPv6, Act Now! Daniel Karrenberg, RIPE NCC Chief Scientist Who is talking: Daniel Karrenberg 1980s: helped build Internet in Europe EUnet, Ebone, IXes,... RIPE 1990s: helped build RIPE NCC 1st CEO: 1992-2000

More information

The Happy Ending Problem

The Happy Ending Problem The Happy Ending Problem Neeldhara Misra STATUTORY WARNING This doument is a draft version 1 Introdution The Happy Ending problem first manifested itself on a typial wintery evening in 1933 These evenings

More information

IPv6 Address Allocation and Assignment Policy

IPv6 Address Allocation and Assignment Policy IPv6 Address Allocation and Assignment Policy How to read this draft document: This document relates to a project to improve the readability of RIPE policy documents. If approved, it will replace ripe-512,

More information

UCLA UCLA Previously Published Works

UCLA UCLA Previously Published Works UCLA UCLA Previously Published Works Title IPv address allocation and the BGP routing table evolution Permalink https://escholarship.org/uc/item/8b6dw Journal Computer Communication Review, () ISSN 6-8

More information

Recommendation Subgraphs for Web Discovery

Recommendation Subgraphs for Web Discovery Reommation Subgraphs for Web Disovery Arda Antikaioglu Department of Mathematis Carnegie Mellon University aantika@andrew.mu.edu R. Ravi Tepper Shool of Business Carnegie Mellon University ravi@mu.edu

More information

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,

More information

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University

More information

Batch Auditing for Multiclient Data in Multicloud Storage

Batch Auditing for Multiclient Data in Multicloud Storage Advaned Siene and Tehnology Letters, pp.67-73 http://dx.doi.org/0.4257/astl.204.50. Bath Auditing for Multilient Data in Multiloud Storage Zhihua Xia, Xinhui Wang, Xingming Sun, Yafeng Zhu, Peng Ji and

More information

Measuring IPv6 Deployment

Measuring IPv6 Deployment Measuring IPv6 Deployment The story so far IANA Pool Exhaustion In this model, IANA allocates its last IPv4 /8 to an RIR on the 18 th January 2011 Ten years ago we had a plan Oops! We were meant to have

More information

A {k, n}-secret Sharing Scheme for Color Images

A {k, n}-secret Sharing Scheme for Color Images A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University

More information

Detection and Recognition of Non-Occluded Objects using Signature Map

Detection and Recognition of Non-Occluded Objects using Signature Map 6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,

More information

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Ho Wireless Networks Giorgio Quer, Federio Librino, Lua Canzian, Leonardo Badia, Mihele Zorzi, University of California San Diego La

More information

IPv4 depletion & IPv6 deployment in the RIPE NCC service region. Kjell Leknes - June 2010

IPv4 depletion & IPv6 deployment in the RIPE NCC service region. Kjell Leknes - June 2010 IPv4 depletion & IPv6 deployment in the RIPE NCC service region Kjell Leknes - June 2010 Outline About RIPE and RIPE NCC IPv4 depletion IPv6 deployment Engaging the community - RIPE NCC and the RIPE community

More information

with respect to the normal in each medium, respectively. The question is: How are θ

with respect to the normal in each medium, respectively. The question is: How are θ Prof. Raghuveer Parthasarathy University of Oregon Physis 35 Winter 8 3 R EFRACTION When light travels from one medium to another, it may hange diretion. This phenomenon familiar whenever we see the bent

More information

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Arne Hamann, Razvan Rau, Rolf Ernst Institute of Computer and Communiation Network Engineering Tehnial University of Braunshweig,

More information

Measurement of the stereoscopic rangefinder beam angular velocity using the digital image processing method

Measurement of the stereoscopic rangefinder beam angular velocity using the digital image processing method Measurement of the stereosopi rangefinder beam angular veloity using the digital image proessing method ROMAN VÍTEK Department of weapons and ammunition University of defense Kouniova 65, 62 Brno CZECH

More information

Implementing Load-Balanced Switches With Fat-Tree Networks

Implementing Load-Balanced Switches With Fat-Tree Networks Implementing Load-Balaned Swithes With Fat-Tree Networks Hung-Shih Chueh, Ching-Min Lien, Cheng-Shang Chang, Jay Cheng, and Duan-Shin Lee Department of Eletrial Engineering & Institute of Communiations

More information