IS-IS Protocol Hardware Implementation for VPN Solutions
|
|
- Brian Johns
- 5 years ago
- Views:
Transcription
1 IS-IS Potocol Hadwae Implementation fo VPN Solutions MOHAMED ABOU-GABAL, RAYMOND PETERKIN, DAN IONESCU School of Infomation Technology and Engineeing (SITE) Univesity of Ottawa 161 Louis Pasteu, P.O. Box 450, Station A, Ottawa, Ontaio, K1N 6N5 CANADA Abstact: - One of the majo poblems elated to the gowth of netwok technology is the limitations it pesents when the potection and the esilience of a netwok has to be assued fo fast ecovey as is the case fo 1 and 10 Gbps links. It is well known that calculating the shotest path equies significant computational time. Steam-based applications (such as voice and video) unning on Gigabit links can suffe damatic packet loss duing link failues, intoducing lage delays on eceiving hosts in the pocess. In ode to alleviate the delay in such netwoks, this pape intoduces hadwae achitectue fo the IS-IS potocol. The achitectue implements mathematical algoithms fo calculating the shotest path in FPGAs. Such an implementation impoves the shotest path computation time, allowing fo a apid calculation of the second path. Key-Wods: - IS-IS, hadwae, FPGA, VPN, netwok, OSPF, Dksta 1 Intoduction In ode to ovecome and enginee some of the pefomance issues of packet based netwoks, hieachical and logical outing achitectue potocols wee developed in the aea of packet netwoks. Some of these potocols include Hieachical Pee Netwokto-Netwok inteface (HPNNI) [1] which is applied to ATM netwoks, Open Shotest Path Fist (OSPF) [2], Intemediate-System to Intemediate-System (IS-IS) [3] and Bode Gateway Potocol (BGP) [4] which ae used to oute taffic in autonomous IP netwoks. Most of these potocols ae based on computing Dksta s, Bell-man Fod s o othe algoithms to find the shotest path fom a souce node to a destination node. OSPF and IS-IS potocols ae well known potocols fo suppoting outing in a netwok laye potocol with datagam sevice. While both potocols have numeous similaities (authentication, flooding mechanisms, small contol packets, etc.), thee ae diffeences that become significant. In the constuction, tansmission and pocessing of link state PDUs (LSPs), OSPF is memoy intensive as moe bits ae tansmitted with lage link state heades and lage link state packets [5]. Consequently, OSPF equies moe bandwidth than IS-IS to tansmit infomation to its neighbos. Howeve, IS-IS packets cannot be easily diffeentiated at lowe (kenel) levels (because IS-IS is tansmitted on top of the data link laye) and most IS-IS fields ae of vaiable length, making packet pasing elatively difficult. Theefoe, the effective tade off between OSPF and IS-IS is that OSPF has optimized pocessing with inceased packet sizes while IS-IS has minimized stoage and bandwidth equiements with slow pocessing time. IS-IS outpefoms OSPF in link state packet aival times which is consideed the most impotant pefomance citeion in analyzing how outing infomation is tansmitted thoughout netwoks [6]. Theefoe, IS-IS is the pefeed potocol fo disseminating outing infomation ove boadcast netwoks. Fo these easons, we pusue the development of hadwae achitectue fo IS-IS. Hadwae achitectues fo IS-IS o outing potocols in geneal can be used to optimize pocessing tasks that othewise seve as significant bottlenecks in compute communications. The achitectue in [7] illustates how the shotest path can be calculated in hadwae using Dksta s algoithm. That shotest path achitectue can be used with any potocol equiing shotest path calculations to optimize outing computations. An IS-IS potocol achitectue is given in [8] illustating seveal modules inteacting with each othe to pefom IS-IS tasks, including a sepaate module to calculate the shotest
2 path. A simila achitectue could be implemented in hadwae with FPGAs to optimize pocessing, addessing the advantage of OSPF compaed to IS-IS, while maintaining low stoage and bandwidth equiements. This pape will pesent a new hadwae achitectue fo the IS-IS potocol. This achitectue allows fo a netwok topology to be diectly enteed o emoved as IS-IS pefoms petinent outing opeations. The pape is oganized in the following manne. Section 2 povides a bief oveview of the IS- IS potocol. Section 3 mathematically descibes the shotest path poblem while section 4 illustates a linea pogamming solution specific to shotest path outing. Section 5 descibes why hadwae should be used to addess taffic shaping in outing potocols. Section 6 descibes the hadwae achitectue of IS-IS as it would be implemented on an FPGA. Section 7 descibes expeimental esults achieved thus fa with espect to calculating the shotest path fo IS-IS. Finally, in Section 8 the conclusion to this wok is listed, summaizing elevant aspects of the achitectue and descibing futue wok. 2 IS-IS Oveview IS-IS is an inteio gateway potocol and link state potocol which uses Dksta s algoithm to find the shotest path between two outes within an aea. In this section of the pape a bief oveview of IS-IS is given by descibing the netwok elements and opeations. Fig.1 shows the netwok elements involved in an IS-IS domain. A host is efeed to as an End System (ES), a oute is called an Intemediate System (IS), and a designated oute is efeed to as a Designated Intemediate System (DIS). The data link inteface addess (MAC addess) is known as a Sub-netwok Point of Attachment (SNPA). The netwok laye addess (IP Addess) is known as a Netwok Sevice Access Point (NSAP). IS-IS has two levels of aea outing; level 1 () and level 2 (L2). In, ISs oute ES IS Y Level 1 Aea A Z L2 DIS Level 2 T L2 Backbone M L2 Fig.1. IS-IS Domain Level 1 Aea B K N within thei own aeas. If the destination is not within the aea then data will be outed to the closest L2 IS. L2 acts as a backbone whee ISs oute towads othe aeas. Cetain ISs can be configued fo both and L2. Routing infomation packets used among ISs ae known as Link PDUs (LSPs). Infomation collected by LSPs is stoed in a Link Database (LSDB). If an IS belongs two levels (L2) then that IS will have two LSDBs; one fo each level. Fig.2 illustates a high level opeation of IS-IS. The hello state illustates the activities pefomed in establishing a connection between two ISs. Fom Fig.1, it is assumed that Y is an IS coming up. Z acts as a DIS (i.e. pefoms the flooding of LSPs) and as a Pseudo-node (PSN) (i.e. the vitual node that emulates a boadcast link). When Y comes up it will be idle and it must establish its adjacencies. Y will send out IS-IS Hello (IIH) packets with a null SNPA. Z eceives IIH packets and checks its LSDB to detemine if an adjacency aleady exists. The IIH packet is ignoed if the adjacency exists; othewise Z ceates a new adjacency and sends an IIH packet to Y. Y eceives the IIH packet fom Z and etuns an acknowledgement. Z etuns an additional IIH packet to completely establish the connection. The next state is the Database (DB) Synchonization state whee exchanges of LSPs occu. The sequence numbe integated with LSPs is used to diffeentiate olde LSPs fom newe LSPs. Fom Fig.2, afte Y has established its adjacency, it will send out its LSP with sequence numbe 1. Upon eceiving the LSP Z sends othe LSPs to Y. Y uses these LSPs to ceate its LSDB. Once databases ae synchonized, all ISs compute the shotest path within thei aea in a state known as Shotest Path Fist (SPF). Hello IDLE INIT Y 1 way 2 way UP Veify CSNP Update LSDB IIH ID = Y SNPA = Null IIH ID = Z SNPA = Y IIH ID = Y SNPA = Z IIH ID = Z SNPA = Y DB Exch LSP ID = Y SeqNum = 1 DB Sych LSP ID = Z SeqNum =, LSP ID = SeqNum = n Update LSDB SPF LSP Update Eo, Missing Y ISs Compute Spanning Tee CSNP, Z, Y PSNP, LSP ID = Z SeqNum =, LSP ID= SeqNum = n Fig.2. IS-IS Opeations Z DIS INIT 1 way 2 way UP Update LSDB DB Exch Time fo Update Pocessing PSNP Flood LSPs
3 The next state is known as LSP Update. In this state two kinds of sequence numbes ae intoduced. The fist kind is the Complete Sequence Numbe PDU (CSNP) and the second kind is the Patial Sequence Numbe PDU (PSNP). CSNPs ae used to detemine if ISs have the cuent copies of all LSPs. PSNPs ae used by ISs to espond to CSNP if the CSNP had a missing LSP. F ig.2 shows an example of this scenaio. Afte a specific peiod of time, Z advetises CSNPs with summaies of all known LSPs. Y discoves that the LSP is missing. Hence, Y sends a PSNP equest fo the missing LSPs. Z pocesses the PSNP and floods LSPs that includes the missing. Y eceives the complete LSPs, updates its LSDB and ecomputes the shotest path. 3 Shotest Path Poblem The following notations can be used to descibe the shotest path poblem; G denotes a gaph, N denotes a set of nodes, A epesents a set of acs, s symbolizes the souce node and t denotes the temination node. G = (N,A) (1) { x ( A} (2) whee x denotes the ac/link connecting the node i to node j. The following VPN specific netwok fom [9] expands this definition to include custome nodes (c), custome edges (ce), povide nodes (pe) and povide edges (p). N = N ce N pe N p N a (3) N ce N pe = (4) N pe N p = (5) N ce N p = (6) whee c denotes the link cost between node i and node j. The equation is minimized subject to the following constaints. 1, i = s x x = 1, i = t (8) { j ( } { j ( j, i) } 0, othewise 0, ( A (9) x Solving the shotest path poblem in softwae typically equies O(n 2 ) o O(nlogn) algoithms. Those algoithms use data stuctues whose opeations un in O(1) to O(n) time. Significant inefficiency can exist depending how which algoithms and data stuctues ae used to solve the shotest path poblem. The use of econfiguable hadwae fo the shotest path poblem helps to alleviate the inefficiency obseved in softwae. 4 Shotest Path Routing Optimal pefomance in tems of bandwidth consumed on each link can be achieved with a set of shotest paths by solving the following linea pogam and dual shown in [10]. The linea pogam can be descibed as min R d j, i) j, i) 0 ( R subject to ji c d = 0, i s, t = 1, i = t ( A 1( A, R R R With this notation, the shotest path poblem is descibed as the minimization of the following equation whee T( s, t ) = d fo assumed taffic matix T, ( c x (7) (10) souce (ingess) node s and destination (egess) node t. is the faction of taffic fo though link (. The dual to the linea pogam is descibed as
4 max t R, t V ( subject to U W U j s whee U 0 i = 0. W U W + 1 c W R,( A (11) denotes the link weight fo link (. The linea pogam and dual shown hee illustate the impotance of efficient pocessing fo shotest path calculations, as a diffeent set of next hops may be geneated souce-destination pai whee taffic may be fowaded. The achitectue in this pape is also linea so efficiency in shotest path outing is of significant impotance. The following section illustates the justification of FPGAs in pefoming taffic shaping tasks though outing potocols 6 Hadwae Achitectue In this section of the pape the IS-IS hadwae achitectue will be pesented as follows; a desciption of the inputs and outputs of the IS-IS system and a system desciption is given fist. Then moe detailed discussions ae given fo the contol unit state machine and the data path. Fig.3 shows the inputs and outputs of the IS-IS system. The IS-IS system takes the following inputs: ingesspacket, which is whee incoming packets will be eceived. afivalue, which will be used to set the OSI NSAP addess (the fist octet), the value of this field indicates the top-level addessing domain associated with the NSAP. aeaaddess, which along with afivalue fom what s called the aeaid. systemid, which is the MAC addess of the IS. nsel, which specifies a use of the netwok laye sevice, if left un-initialized it will be set to zeo. psnid, the ID that will be used by the DIS to act as a PSN. 5 Taffic Shaping and Hadwae dis, which acts as the DIS. IS-IS and othe outing potocols play substantial oles in taffic shaping (alteing taffic to incease netwok efficiency). The potential impovements offeed by econfiguable hadwae (FPGAs, Systemson-Chip) to taffic shaping and othe compute communications tasks is best illustated by examining pefomance equiements. The most estictive taffic shaping equiements come fom high speed devices that must opeate at high ates. The infomation given in [11] illustates that slot duations ange fom 2us to 42us fo connections of at least 155Mbps whee the minimum packet sizes wee 40 bytes to 64 bytes. Taffic shaping at those ates is only achievable with dedicated hadwae. These ates ae of paticula impotance in IP netwoks since packets opeations ae expensive due to vaiable packet size. Futhemoe FPGAs ae pefeable as hadwae implementation devices because they ae econfiguable, so a given platfom can be optimized as much as possible. clock, this signal povides a clocking souce to the system fo synchonization. eset, this signal is used to eset IS-IS system to its default configuation. The IS-IS system povides the following outputs: egesspacket, is the inteface at which IS-IS system will be outputting packets such as LSPs, CSNP, PSNP,etc. is, infoms the IS-IS system use about the state of the IS. The IS-IS system is composed of two majo subsystems, a contol unit and a data path (as shown in Fig.4). The contol unit is composed of 4 pocessos, the Main Pocesso (MP) is esponsible fo invoking and updating the othe 3 pocessos based on feedback fom all othe pocessos. The ingesspacket ISIS Data afivalue System Signals aeaaddess egesspacket systemid Contol Signals nsel psnid dis clock eset Fig.3. IS-IS I/O is
5 Ingess Packet Contol Unit Ingess Packet Pocesso Main pocesso Shotest Path Pocesso Data Path Egess Packet Pocesso Egess Packet Fig.4. IS-IS system view ingess packet pocesso (IPP) is esponsible fo pocessing and buffeing packets eceived on the ingess path. It also updates the MP with status signals on the type of packets eceived. The Shotest Path Pocesso (SPP) is esponsible fo computing the SPF. The Egess Packet Pocesso (EPP) handles all tasks elating to sending packets as the esult of LSP advetisements, esponding o acknowledging packets. 6.1 Contol Unit The contol unit is pesented in the state machine shown in Fig.5. The Hello state is whee the adjacency establishment is achieved. If an adjacency was aleady established then the contol unit ignoes the hello packet and goes back to the IDLE state. If an adjacency was not established then the contol unit emains in the hello state and pefoms all necessay computations. In the DB Exchange state the contol unit eceives and advetises LSPs to make sue that its LSDBs ae synchonized with the latest netwok topology. Upon completing the DB Exchange state, the contol unit pocesses buffeed LSPs and stoes them into the appopiate LSDB, in a state known as LSDB Update. Once the LSDB update state is complete, the SPF state is executed and the shotest path is computed. The contol unit moves to an IDLE state whee it waits fo times to be tiggeed. In the case of a DIS deployment, the tiggeed times foce the contol unit to ente the C/P-SNP Pocessing state whee CSNP packets ae sent out to the netwok. The contol unit stays in the C/P-SNP Pocessing state fo a cetain amount of time to ensue that no PSNPs ae eceived. In a egula IS deployment, the contol unit moves to the C/P-SNP Pocessing state if a CSNP is eceived on the ingess path. In some cases, if a CSNP was missing some LSP summaies, then LSP advetisements will be flooded on the netwok and as a esult the contol unit will go to the LSDB Update state and SPF states. 6.2 Data Path As shown in F ig.6, the data path is composed of ingess components, egess components, LSDBs, system inputs, the SPP data path and the muxdemux components. The ingess and egess components ae buffes that stoe packets. The ingess components ae denoted by in in font of the component name and the egess components ae denoted by eg. Below is bief desciption of each buffe: IIH, buffes hello packets. DB, buffes database packets. LSP-, buffes Level 1 LSP packets. LSP-L2, buffes Level 2 LSP packets CSNP, buffes CSNP packets. PSNP, buffes PSNP packets. Thee ae two majo LSDBs; the active LSDB- and the active LSDB-L2. The active LSDB- stoes the pocessed LSPs fo and the active LSDB-L2 muxdemux Hello snpdone hellodone LSDB Update dbdone lspdbdone DB Exchange ingesspacket systeminputs iniih indb inlsp- SPP datapath egiih egdb eglsp- egesspacket inlsp-l2 eglsp-l2 C/P-SNP Pocessing snpnone snppoc IDLE spfdone SPF incsnp inpsnp active LSDB- egcsnp egpsnp standby LSDB- adjavailable active LSDB-L2 standby LSDB-L2 Fig.5. IS-IS main contol unit Fig.6. IS-IS data path majo components
6 stoes the pocessed LSPs fo L2. The standby LSDBs ae initialized to zeo. It is used duing the deletion (link failues o IS cashes) o the addition of LSPs. In the scenaio of adding a new LSP, the IS-IS system adds the new LSP to the standby LSDB, copies the active LSDB to the standby LSDB, then it activates the standby LSDB and deactivates the active LSDB (the standby LSDB becomes active and the active LSDB becomes standby). In the scenaio of deleting a LSP, the modification (eplacing LSPs with zeos) is done on the active LSDB, then the IS-IS system copies the active LSDB (skipping peviously inseted zeos) to the standby LSDB, then it activates the standby LSDB and deactivates the active LSDB. The switching between active and standby LSDBs occus wheneve necessay. The system inputs component ae egistes whee the IS-IS inputs ae stoed. The SPP data path descibed in [7] is used hee. The muxdemux component epesents multiplexes and demultiplexes (fo egulating data flow) that wee hidden fom F ig.6 to simplify the data path diagam. 7 Expeimental Results Simulation esults have been accumulated thus fa with espect to calculating the shotest path fo IS-IS. Othe aspects of IS-IS hadwae implementation ae not completed and consequently no esults can be given at this time. Netwoks of seven nodes o less wee used to geneate esults. Hadwae simulations wee pefomed using Cadence softwae while softwae benchmaks wee found with Java implementations of Dksta s algoithm. The shotest path was calculated in appoximately clock cycles in hadwae simulations. In softwae, those netwoks had thei shotest paths detemined in about 0.2 ms on a 267 MHz with a standad deviation of appoximately 8% ove 50 samples pe netwok. Those esults indicate that the shotest path can be calculated in appoximately 200 cycles in hadwae and the equivalent netwok has its shotest path calculated in cycles in a typical softwae envionment. 8 Conclusion The IS-IS hadwae achitectue pesented in this pape is flexible in adapting to netwok topology changes. The achitectue is scalable though FPGA implementation. Delays fo steam-based applications can be minimized by using this achitectue as demonstated in the expeimental esults achieved fo computing the shotest path. Refeences: [1] ATM Foum Technical Committee, Pivate Netwok-Netwok Inteface Specification, Mach [2] J.Moy, OSPF Anatomy of an Intenet Routing Potocol, Addison-Wesley, Febuay [3] White, Russ, IS-IS: Deployment in IP Netwoks, Addison-Wesley, [4] Y. Rekhte, P. Goss, Application of the Bode Gateway Potocol in the intenet, RFC 1772, Mach [5] Pelman, Radia, A Compaison Between Two Routing Potocols: OSPF and IS-IS, IEEE Netwok Magazine, Vol.5, No.5, 1991, pp [6] Shaon, Oan, Dissemination of Routing Infomation in Boadcast Netwoks: OSPF vesus IS- IS, IEEE Netwok, Vol.15, No.1, 2001, pp. 64. [7] Abou-Gabal, Mohamed, Petekin, Raymond, Ionescu, Dan, Lambi Cistian, Goza, Voicu, A Shotest Path Pocesso fo Taffic Engineeing of VPN Sevices, PERIODICA POLITECHNICA, Tansactions on AUTOMATIC CONTROL and COMPUTER SCIENCE, Vol.49, No.63, [8] Yang, Meong, Hahm, Jinho, Kim, Youngsun, and Kim, Sangha, Design and Implementation of the IS-IS Routing Potocol with Taffic Engineeing, APCC 2003, the 9th Asia-Pacific Confeence on Communications, Vol.3, 2003, pp [9] Lambi Cistian, Ionescu, Dan, Ionescu, Bogdan. Sevice Contol in Connection Oiented Netwoks, Recent Advances in Communications and Compute Science (WSEAS), 2003, pp [10] Sidhaan, Ashwin, Guein, Roch, Diot, Chistophe, Achieving Nea-Optimal Taffic Engineeing Solutions fo Cuent OSPF/IS-IS Netwoks, INFOCOM Twenty-Second Annual Joint Confeence of the IEEE Compute and Communications Societies, Vol.3, 2003, pp [11] Ophanoudakis, T, Leligou, H.-C., Konaos, Geoge, Chaopoulos, Ch. Accuate Schedule Implementation fo Shaping Flows of Vaiable Length Packets in High-Speed Netwoking Applications, Recent Advances in Communications and Compute Science (WSEAS), 2003, pp. 96.
IP Network Design by Modified Branch Exchange Method
Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management
More informationIP Multicast Simulation in OPNET
IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok
More informationANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS
ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth
More informationSlotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System
Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet
More informationThe Internet Ecosystem and Evolution
The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee
More informationPrioritized Traffic Recovery over GMPLS Networks
Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing
More informationAn Improved Resource Reservation Protocol
Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing
More informationCommunication vs Distributed Computation: an alternative trade-off curve
Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,
More informationModelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set
Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;
More informationIP MULTICAST. Adiseshu Hari, T. V. Lakshman and Gordon Wilfong Nokia Bell Labs
IP MULTICAST Adiseshu Hai, T. V. Lakshman and Godon Wilfong Nokia DIMACS Wokshop on Algoithms fo Data Cente Netwoks Rutges Univesity, NJ 1 Why is IP Multicast not deployed in public netwoks? Denial-of-Sevice
More informationConfiguring RSVP-ATM QoS Interworking
Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP
More informationControlled Information Maximization for SOM Knowledge Induced Learning
3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity
More informationA Memory Efficient Array Architecture for Real-Time Motion Estimation
A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN
More informationPerformance Optimization in Structured Wireless Sensor Networks
5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame
More informationPersistent Memory what developers need to know Mark Carlson Co-chair SNIA Technical Council Toshiba
Pesistent Memoy what developes need to know Mak Calson Co-chai SNIA Technical Council Toshiba 2018 Stoage Develope Confeence EMEA. All Rights Reseved. 1 Contents Welcome Pesistent Memoy Oveview Non-Volatile
More informationModule 6 STILL IMAGE COMPRESSION STANDARDS
Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.
More informationEfficient protection of many-to-one. communications
Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok
More informationCombinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments
Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile
More informationHierarchically Clustered P2P Streaming System
Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.
More informationAny modern computer system will incorporate (at least) two levels of storage:
1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe
More informationAdaptation of TDMA Parameters Based on Network Conditions
Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.
More informationMultidimensional Testing
Multidimensional Testing QA appoach fo Stoage netwoking Yohay Lasi Visuality Systems 1 Intoduction Who I am Yohay Lasi, QA Manage at Visuality Systems Visuality Systems the leading commecial povide of
More informationRANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES
RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class
More informationPoint-Biserial Correlation Analysis of Fuzzy Attributes
Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh
More informationDetection and Recognition of Alert Traffic Signs
Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives
More informationAn Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network
An Efficient andove Mechanism Using the Geneal Switch Management Potocol on a Multi-Potocol abel Switching Netwok Seong Gon hoi, yun Joo Kang, and Jun Kyun hoi Using the geneal switch management potocol
More informationChapter 4 Network Layer
Chapte 4 Netwok Laye Reti di Elaboatoi Coso di Lauea in Infomatica Univesità degli Studi di Roma La Sapienza Canale A-L Pof.ssa Chiaa Petioli Pate di queste slide sono state pese dal mateiale associato
More informationCOEN-4730 Computer Architecture Lecture 2 Review of Instruction Sets and Pipelines
1 COEN-4730 Compute Achitectue Lectue 2 Review of nstuction Sets and Pipelines Cistinel Ababei Dept. of Electical and Compute Engineeing Maquette Univesity Cedits: Slides adapted fom pesentations of Sudeep
More informationWIRELESS sensor networks (WSNs), which are capable
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan
More informationA New Finite Word-length Optimization Method Design for LDPC Decoder
A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology
More informationOptical Flow for Large Motion Using Gradient Technique
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this
More informationShortest Paths for a Two-Robot Rendez-Vous
Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal
More informationOn using circuit-switched networks for file transfers
On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed
More informationUCB CS61C : Machine Structures
inst.eecs.bekeley.edu/~cs61c UCB CS61C : Machine Stuctues Lectue SOE Dan Gacia Lectue 28 CPU Design : Pipelining to Impove Pefomance 2010-04-05 Stanfod Reseaches have invented a monitoing technique called
More informationLecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining
EE 341 Lectue # 12 Instucto: Zeshan hishti zeshan@ece.pdx.edu Novembe 10, 2014 Potland State Univesity asic Pocessing Unit ontol Signals Hadwied ontol Datapath contol signals Dealing with memoy delay Pipelining
More information# $!$ %&&' Thanks and enjoy! JFK/KWR. All material copyright J.F Kurose and K.W. Ross, All Rights Reserved
A note on the use of these ppt slides: We e making these slides feely available to all (faculty, students, eades). They e in PowePoint fom so you can add, modify, and delete slides (including this one)
More informationJournal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012
2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo
More informationRT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver
1 RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Dive Amit Jain Daji Qiao Kang G. Shin The Univesity of Michigan Ann Abo, MI 4819, USA {amitj,dqiao,kgshin@eecs.umich.edu Abstact The cuent
More informationModeling a shared medium access node with QoS distinction
Modeling a shaed medium access node with QoS distinction Matthias Gies, Jonas Geutet Compute Engineeing and Netwoks Laboatoy (TIK) Swiss Fedeal Institute of Technology Züich CH-8092 Züich, Switzeland email:
More informationAccelerating Storage with RDMA Max Gurtovoy Mellanox Technologies
Acceleating Stoage with RDMA Max Gutovoy Mellanox Technologies 2018 Stoage Develope Confeence EMEA. Mellanox Technologies. All Rights Reseved. 1 What is RDMA? Remote Diect Memoy Access - povides the ability
More informationXFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers
XFVHDL: A Tool fo the Synthesis of Fuzzy Logic Contolles E. Lago, C. J. Jiménez, D. R. López, S. Sánchez-Solano and A. Baiga Instituto de Micoelectónica de Sevilla. Cento Nacional de Micoelectónica, Edificio
More informationFrequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters
Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using
More informationOn the throughput-cost tradeoff of multi-tiered optical network architectures
1 On the thoughput-cost tadeoff of multi-tieed optical netwok achitectues Guy Weichenbeg, Vincent W. S. Chan, and Muiel Médad Laboatoy fo Infomation and Decision Systems Massachusetts Institute of Technology
More informationHigh performance CUDA based CNN image processor
High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu
More informationCOSC 6385 Computer Architecture. - Pipelining
COSC 6385 Compute Achitectue - Pipelining Sping 2012 Some of the slides ae based on a lectue by David Culle, Pipelining Pipelining is an implementation technique wheeby multiple instuctions ae ovelapped
More informationTHE THETA BLOCKCHAIN
THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent
More informationA modal estimation based multitype sensor placement method
A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;
More informationA Fuzzy Constraint-Based Routing Algorithm for Traffic Engineering
Fuzz Constaint-ased Routing lgoithm fo Taffic Engineeing Junaid. Khan and Hussein M. lnuweii Depatment of Electical & Compute Engineeing, 2356 Main Mall, Univesit of itish Columbia, Vancouve,.C. Canada,
More informationDYNAMIC STORAGE ALLOCATION. Hanan Samet
ds0 DYNAMIC STORAGE ALLOCATION Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 07 e-mail: hjs@umiacs.umd.edu
More informationa Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives
SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which
More informationAdvances in Automobile Engineering
nadvances in Automobile E gineeing ISSN: 2167-7670 Advances in Automobile Engineeing Kabi, 2012, 1:3 DOI: 10.4172/2167-7670.1000101 Reseach Aticle Open Access Netwok Achitectue of a Moden Automotive Infotainment
More informationLifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks
788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,
More informationEvent-based Location Dependent Data Services in Mobile WSNs
Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,
More informationPerforming real-time image processing on distributed computer systems
Pefoming eal-time image pocessing on distibuted compute systems RADU DOBRESCU, MATEI DOBRESCU, DAN POPESCU "Politehnica" Univesity of Buchaest, Faculty of Contol and Computes, 313 Splaiul Independentei,
More informationMULTI-AGENT SYSTEM FOR NETWORK ATTACK DETECTION
Intenational Jounal of Civil Engineeing and Technology (IJCIET) Volume 9, Issue 6, June 2018, pp. 279 286, Aticle ID: IJCIET_09_06_032 Available online at http://www.iaeme.com/ijciet/issues.asp?jtype=ijciet&vtype=9&itype=6
More informationAutomatically Testing Interacting Software Components
Automatically Testing Inteacting Softwae Components Leonad Gallaghe Infomation Technology Laboatoy National Institute of Standads and Technology Gaithesbug, MD 20899, USA lgallaghe@nist.gov Jeff Offutt
More informationSCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS
SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),
More informationObstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor
Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,
More informationConversion Functions for Symmetric Key Ciphers
Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401
More informationA ROI Focusing Mechanism for Digital Cameras
A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula
More informationThe Dual Round Robin Matching Switch with Exhaustive Service
The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line
More informationAN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE
AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity
More informationPipes, connections, channels and multiplexors
Pipes, connections, channels and multiplexos Fancisco J. Ballesteos ABSTRACT Channels in the style of CSP ae a poeful abstaction. The ae close to pipes and connections used to inteconnect system and netok
More informationParallel processing model for XML parsing
Recent Reseaches in Communications, Signals and nfomation Technology Paallel pocessing model fo XML pasing ADRANA GEORGEVA Fac. Applied Mathematics and nfomatics Technical Univesity of Sofia, TU-Sofia
More informationAssessment of Track Sequence Optimization based on Recorded Field Operations
Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment
More informationSimulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM
J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on
More informationSegmentation of Casting Defects in X-Ray Images Based on Fractal Dimension
17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach
More informationAn Identification Protocol based the secure USB
An Identification otocol based the secue UB Chol-Un KIM ok-jun AN and u-nam HAN Faculty of Mathematics Kim Il ung Univesity yongyang..r.k. Abstact In this pape we poposed an identification potocol which
More informationOn the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes
On the Convesion between Binay Code and BinayReflected Gay Code on Boolean Cubes The Havad community has made this aticle openly available. Please shae how this access benefits you. You stoy mattes Citation
More informationScaling Location-based Services with Dynamically Composed Location Index
Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute
More informationTowards Adaptive Information Merging Using Selected XML Fragments
Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,
More information1.3 Multiplexing, Time-Switching, Point-to-Point versus Buses
http://achvlsi.ics.foth.g/~kateveni/534 1.3 Multiplexing, Time-Switching, Point-to-Point vesus Buses n R m Aggegation (multiplexing) Distibution (demultiplexing) Simplest Netwoking, like simplest pogamming:
More informationMapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma
apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the
More informationUser Specified non-bonded potentials in gromacs
Use Specified non-bonded potentials in gomacs Apil 8, 2010 1 Intoduction On fist appeaances gomacs, unlike MD codes like LAMMPS o DL POLY, appeas to have vey little flexibility with egads to the fom of
More informationFault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs
Fault-Toleant Routing Schemes in RDT(,,)/α-Based Inteconnection Netwok fo Netwoks-on-Chip Designs Mei Yang, Tao Li, Yingtao Jiang, and Yulu Yang Dept. of Electical & Compute Engineeing Univesity of Nevada,
More informationMAC Protocol for Supporting QoS in All-IP HiperLAN2
MAC Potocol fo Suppoting QoS in All-IP HipeLAN Chistos E. Politis, Rahim Tafazolli Univesity of Suey Cente fo Communication Systems Reseach Guildfod, GU 7XH, Suey, UK Tel.: +44 483 683463, FAX: +44 483
More informationADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM
ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,
More informationMinimizing spatial and time reservation with Collision-Aware DCF in mobile ad hoc networks
Available online at www.sciencediect.com Ad Hoc Netwoks 7 (29) 23 247 www.elsevie.com/locate/adhoc Minimizing spatial and time esevation with Collision-Awae DCF in mobile ad hoc netwoks Lubo Song a, Chansu
More informationAn effective hop-by-hop Interest shaping mechanism for CCN communications
An effective hop-by-hop Inteest shaping mechanism fo CCN communications Natalya Rozhnova, Sege Fdida To cite this vesion: Natalya Rozhnova, Sege Fdida. An effective hop-by-hop Inteest shaping mechanism
More informationDecentralized Trust Management for Ad-Hoc Peer-to-Peer Networks
Decentalized Tust Management fo Ad-Hoc Pee-to-Pee Netwoks Thomas Repantis Vana Kalogeaki Depatment of Compute Science & Engineeing Univesity of Califonia, Riveside Riveside, CA 92521 {tep,vana}@cs.uc.edu
More informationMonte Carlo Simulation for the ECAT HRRT using GATE
Monte Calo Simulation fo the ECAT HRRT using GATE F. Bataille, C. Comtat, Membe, IEEE, S. Jan, and R. Tébossen Abstact The ECAT HRRT (High Resolution Reseach Tomogaph, CPS Innovations, Knoxville, TN, U.S.A.)
More informationdc - Linux Command Dc may be invoked with the following command-line options: -V --version Print out the version of dc
- CentOS 5.2 - Linux Uses Guide - Linux Command SYNOPSIS [-V] [--vesion] [-h] [--help] [-e sciptexpession] [--expession=sciptexpession] [-f sciptfile] [--file=sciptfile] [file...] DESCRIPTION is a evese-polish
More informationTier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints
Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok 14260 Email:
More informationUsing SPEC SFS with the SNIA Emerald Program for EPA Energy Star Data Center Storage Program Vernon Miller IBM Nick Principe Dell EMC
Using SPEC SFS with the SNIA Emeald Pogam fo EPA Enegy Sta Data Cente Stoage Pogam Venon Mille IBM Nick Pincipe Dell EMC v6 Agenda Backgound on SNIA Emeald/Enegy Sta fo block Intoduce NAS/File test addition;
More informationTime-Constrained Big Data Transfer for SDN-Enabled Smart City
Emeging Tends, Issues, and Challenges in Big Data and Its Implementation towad Futue Smat Cities Time-Constained Big Data Tansfe fo SDN-Enabled Smat City Yuanguo Bi, Chuan Lin, Haibo Zhou, Peng Yang, Xuemin
More informationColor Correction Using 3D Multiview Geometry
Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,
More informationMulti-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples
Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits
More informationA Recommender System for Online Personalization in the WUM Applications
A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based
More informationLecture #22 Pipelining II, Cache I
inst.eecs.bekeley.edu/~cs61c CS61C : Machine Stuctues Lectue #22 Pipelining II, Cache I Wiewold cicuits 2008-7-29 http://www.maa.og/editoial/mathgames/mathgames_05_24_04.html http://www.quinapalus.com/wi-index.html
More informationHaptic Glove. Chan-Su Lee. Abstract. This is a final report for the DIMACS grant of student-initiated project. I implemented Boundary
Physically Accuate Haptic Rendeing of Elastic Object fo a Haptic Glove Chan-Su Lee Abstact This is a final epot fo the DIMACS gant of student-initiated poject. I implemented Bounday Element Method(BEM)
More informationReachable State Spaces of Distributed Deadlock Avoidance Protocols
Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications
More informationThe Processor: Improving Performance Data Hazards
The Pocesso: Impoving Pefomance Data Hazads Monday 12 Octobe 15 Many slides adapted fom: and Design, Patteson & Hennessy 5th Edition, 2014, MK and fom Pof. May Jane Iwin, PSU Summay Pevious Class Pipeline
More informationComparisons of Transient Analytical Methods for Determining Hydraulic Conductivity Using Disc Permeameters
Compaisons of Tansient Analytical Methods fo Detemining Hydaulic Conductivity Using Disc Pemeametes 1,,3 Cook, F.J. 1 CSRO Land and Wate, ndoooopilly, Queensland The Univesity of Queensland, St Lucia,
More informationOn Adaptive Bandwidth Sharing with Rate Guarantees
On Adaptive Bandwidth Shaing with Rate Guaantees N.G. Duffield y T. V. Lakshman D. Stiliadis y AT&T Laboatoies Bell Labs Rm A175, 180 Pak Avenue Lucent Technologies Floham Pak, 101 Cawfods Cone Road NJ
More informationHISTOGRAMS are an important statistic reflecting the
JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe
More informationA Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform
A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad
More informationDYNAMIC STORAGE ALLOCATION. Hanan Samet
ds0 DYNAMIC STORAGE ALLOCATION Hanan Samet Compute Science Depatment and Cente fo Automation Reseach and Institute fo Advanced Compute Studies Univesity of Mayland College Pak, Mayland 074 e-mail: hjs@umiacs.umd.edu
More informationEE 6900: Interconnection Networks for HPC Systems Fall 2016
EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection
More informationSYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH
I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,
More informationDEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson
DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:
More information