Fault-Tolerant Streaming with FEC through Capillary Multi-Path Routing
|
|
- Sara Terry
- 5 years ago
- Views:
Transcription
1 Fault-Tolerant Streaming with FEC through Caillary Multi-Path Routing Emin Gabrielyan Switzernet Sàrl and Swiss Federal Institute of Technology (EPFL) Lausanne, Switzerland Abstract Erasure resilient FEC codes in off-line acketized streaming rely on time diversity, which in its turn relies on unrestricted buffering time at the receiver. In real-time streaming the layback buffering time must be very short. Path diversity is an orthogonal strategy, but its drawback is that large number of long aths increases the number of underlying links and consecutively the overall link failure rate. It may result in increase of the overall requirement in redundant FEC ackets combating the link failures. We introduce Redundancy Overall Requirement (ROR), a routing coefficient of the total number of FEC ackets required for comensation of all underlying link failures. We resent caillary routing algorithm constructing layer by layer steadily diversifying multi-ath routing atterns. By measuring ROR coefficients of a dozen of routing layers on hundreds of network samles, we show that the number of required FEC ackets decreases substantially when the ath diversity is achieved by caillary routing algorithm. I. INTRODUCTION Erasure resilient FEC codes achieve high reliability in off-line streaming in most challenging network conditions [], [], [], [], []. Off-line streaming can significantly benefit from FEC due to the fact that in contrary to real-time streaming, the receiver is not obliged to deliver in time the fresh ackets to the user. Since long buffering is not a concern, ackets reresenting the same information can be received at different times. In real-time single-ath streaming, when buffering time is restricted, FEC can only mitigate short granular failures [], [7], [8] and [9]. Packets reresenting the same information cannot be collected at very remote eriods of time. Recent ublications show the alicability of FEC in real-time streaming with ath diversity. Author of [0] shows that strong FEC imroves video communication following two disjoint aths and that in two correlated aths weak FEC is still advantageous. [] rooses adative multi-ath routing for Mobile Ad-Hoc Networks (MANET) addressing the load balance and caacity issues, but mentioning also the ossible advantages for FEC. Authors of [] and [] suggests relacing in MANET the link level Automatic Reeat Query (ARQ) by a link level FEC assuming regenerating nodes. Authors of [] and [] studied video streaming from multile servers. The same author [] later studied real-time streaming over two aths using a static Reed-Solomon RS(0,) code (FEC blocks carrying source ackets and 7 redundant ackets). [], similarly to [0] comared two-ath scenarios with the single OSPF routing strategy and has shown clear advantages of the double ath routing. The ath diversity in all these studies is limited to either two (ossibly correlated) aths or in the most general case to a sequence of arallel and serial links. Various routing toologies, so far, were not regarded as a ground for searching a FEC efficient attern. In this aer we try to resent a comarative study for various multi-ath routing atterns. Single ath routing, being considered as too hostile, is excluded from our comarisons. Steadily diversifying routing atters are built layer by layer with caillary routing algorithm (sections II). In order to comare multi-ath routing atterns, we introduce Redundancy Overall Requirement (ROR), a routing coefficient relying on the sender s transmission rate increases in resonse to individual link failures. By default, the sender is streaming the media with a static amount of FEC codes in order to tolerate a certain weak acket loss rate. The acket loss rate is measured at the receiver and is constantly reorted back to the sender with the oosite flow. The sender increases the FEC overhead whenever the acket loss rate is about to exceed the tolerable limit. This end-to-end adative FEC mechanism is imlemented entirely on the end nodes, at the alication level, and is not aware of the underlying routing scheme [7], [8], [], [7] and [8]. The overall number of transmitted adative redundant ackets for rotecting the communication session against link failures is roortional () to the usual acket transmission rate of the sender, () to the duration of the communication, () to the single link failure rate, () to the single link failure duration and () to the ROR coefficient of the underlying routing attern followed by the communication flow. The novelty brought by ROR is that a routing toology of any comlexity can be rated by a single scalar value (section III). In section IV, we resent ROR coefficients of different routing layers built by caillary routing algorithm. Network 97
2 samles are obtained from a random walk MANET with several hundreds of nodes. We show that ath diversity achieved by caillary routing algorithm reduces substantially the amount of FEC codes required from the sender. II. CAPILLARY ROUTING Caillary routing may be imlemented by an iterative Linear Programming (LP) rocess transforming a singleath flow into a caillary route. First minimize the maximal value of the load of all links by minimizing an uer bound value alied to all links. The full mass of the flow will be slit equally across the ossible arallel routes. Find the bottleneck links of the first layer (see below) and fix their load at the found minimum. Minimize similarly the maximal load of all remaining links without the bottleneck links of the first layer. This second iteration further refines the ath diversity. Find the bottleneck links of the second layer. Minimize the maximal load of all remaining links, now without the bottlenecks of also the second layer. Reeat this iteration until the entire communication footrint is enclosed in the bottlenecks of the constructed layers. Fig., Fig. and Fig. show the first three layers of the caillary routing on a small network. The to node on the diagrams is the sender, the bottom node is the receiver and all links are oriented from to to bottom. Fig.. In the first layer the flow is equally slit across two aths, two links of which, marked by thick dashes, are the Fig.. The second layer minimizes to / the maximal load of the remaining seven links and identifies three Fig.. The third layer minimizes to / the maximal load of the remaining four links and identifies two Fig. shows the 0-th layer of caillary routing between a air of end nodes on a network with 0 nodes and links. Links not carrying traffic are not shown. The solid lines of the diagram reresent the bottleneck links belonging to one of the 0 layers. The dashed lines reresent a mincost solution of the remaining flow not enclosed in bottlenecks after the 0-th layer. There could be several tens of additional routing layers until comlete caillarization is achieved. links: nodes: 0 layers: 0 bottlenecks: 8 remaining: 97 : : : : : 0.7 : : : 0.7 9: 0.9 0: 0. Fig.. Routing attern of layer 0 built by caillary routing algorithm on a network samle with 0 nodes At each layer, after minimizing the maximal load of links, the bottlenecks of the layer are discovered in a bottleneck hunting loo. At each iteration of the hunting loo, we minimize the load of the traffic over all links having maximal load and being susected as Links not maintaining their load at the maximum are removed from the susect list. The bottleneck hunting loo stos if there are no more links to remove. For caillary routing layers, built simultaneously on 00 indeendent network samles each with 00 nodes (in average,.7 links er network), Fig. shows the decrease of the number of susected links during the bottleneck hunting loo of each caillary routing layer from to 0. average number of susected links layer layer layer layer layer layer layer7 layer8 layer9 layer0 Iterations of the hunting loo (from to ) for the layers of the caillary routing (from to 0) Fig.. Decrease of the number of susected links during the bottleneck hunting loo of each of 0 caillary routing layers At the end of each hunting loo (from to iterations) the susect list consists of only true bottleneck links, in average between.9 and 9.9 bottlenecks er network. 98
3 III. REDUNDANCY OVERALL REQUIREMENT (ROR) We assume a combination of the little static tolerance of the media stream, combating weak failures, with a dynamically added adative FEC combating the strong failures exceeding the tolerable acket loss rate. For a given routing attern, ROR is defined as the sum of all transmission rate overheads required from the sender for combating corresondingly all non-simultaneous link failures. For examle, if the communication footrint consists of five links, and in resonse to each individual link failure the sender increases the acket transmission rate by %, then ROR will be equal to the sum of these five FEC transmission rate increases, i.e. ROR = % =.. If P is the usual acket transmission rate and P l is the increased rate of the sender, resonding to the failure of a link l L, where L is the set of all links, then: Pl ROR = () P Let us consider a long communication, and let D be the total failure time of a single network link during the whole duration of the communication. D is the roduct of the average duration of a single link failure, the frequency of a single link failure and the total communication time. According to equation (): Pl D P ROR = D P () P = ( D Pl D P) () Assuming a single link failure at a time and a uniform robability and duration of link failures, according to equation (), D P ROR is the number of adative redundant ackets that the sender actually needs to transmit in order to comensate for all network failures occurring during the total communication time. Therefore ROR is a routing coefficient of the overall number of required redundant ackets. Redundant ackets are injected into the original media stream for every block of M source ackets. During streaming, M is suosed to stay constant. However, the number of redundant ackets for each block of M media ackets is variable, deending on the conditions of the erasure channel. The M source ackets with their related redundant ackets form a FEC block. By FEC we denote the FEC block size chosen by the sender in resonse to a acket loss rate. We assume that by default the media is streamed in FEC blocks of length of FEC such that the t flow has a static tolerance to weak losses 0 t <. When the loss rate measured at the receiver is about to exceed the tolerable limit t, the sender increases its transmission rate by injecting additional redundant ackets. The random acket loss rate, observed at the receiver during the failure time of a link in the communication ath, is the ortion of the traffic being still routed toward the faulty link. Thus a comlete failure of a link l carrying according to the routing attern a relative traffic load of 0 r ( roduces at the receiver a acket loss rate equal to the same relative traffic load r (. Equation () for ROR can thus be re-written as follows: FECr ( ROR = () t r( < FECt a sum over all links carrying a flow exceeding the tolerable loss limit The links carrying the entire traffic are skied in the sum index of equation (), since the FEC required for the comensation of failures of such links is infinite. By construction (sections II) none of the considered multi-ath routing schemes will ass its entire traffic through a noncritical single link. We comute the FEC function assuming a Maximum Distance Searable (MDS) code [9], [0]. With MDS code we can successfully decode the M source ackets if we receive any M ackets of the transmission FEC block. In order to collect a mean of M ackets at the receiver under random loss rate, M /( ) ackets must be transmitted at the sender. However the robability of receiving M ackets or M ackets (which makes the decoding imossible) remains high. In order to maintain a very low robability δ of receiving less than M ackets, we must send much more redundant ackets in the block than is necessary to receive an average of M ackets at the receiver side. We must fix the accetable Decoding Error Rate (DER), such that δ DER, in order to comute the FEC M function. The robability of having exactly n losses (erasures) in a block of N ackets with a random loss robability is comuted according to the binomial distribution: N n N n q, where N N! = and q = n n n! ( N n)! The robability of having N M + or more losses, i.e. the decoding failure robability, is comuted as follows: N N n N n δ = q () n= N M + n Therefore for comuting the carrier block s minimal length for a satisfactory communication (i.e. FEC function), it is sufficient to steadily increase the block length N until the desired decoding error rate (DER) is met. FEC functions divided by M (i.e. transmission rate increase factors FEC / M ) are bounded above by log ( DER) when M = and below by /( ) when 99
4 M (for acket loss rates much larger a very small DER). The larger the number of media ackets M in the FEC block, the smaller the cost of FEC overhead is, but the longer the buffering time at the receiver must be. For examle VOIP with 0 ms samling rate restricts the number of media ackets M in a single FEC block to 0 ackets. If the layback buffering time can be a coule of minutes long, with thousands of source ackets in a FEC block (for examle in acketized TV) we can assume that FEC = M /( ). Although for large numbers of source ackets MDS codes do not exist, other caacity aroaching LDPC [] or fountain codes [] can decode a large block of source ackets requiring only a very little excess of ackets (in this context this excess can be ignored). In such case the overall amount of FEC codes required from the sender as a function of the choice of the multi-ath routing attern, can be evaluated by an ROR coefficient according to the following equation, derived from equation () taking into account the above assumtions: t ROR = () t r( < r( Path diversity can be required in off-line large file downloads aiming at avoiding the idle times of the last kilometer bottleneck occurring due to arbitrary failures elsewhere, within the lossy Internet. Thanks to the sender s adative transmission rate and to multi-ath routing, one may feed the last kilometer bottleneck link constantly at its maximal bandwidth (see [] and [] for video streaming from multile servers). In this case also the choice of the multi-ath routing attern can be rated by equation (). Note that according to equations () and () the ROR coefficient of a routing attern deends also on the static tolerance t of the streaming media to weak failures. IV. FEC REQUIREMENT IN CAPILLARY ROUTING For caillary routing layers to 0, we comute the average ROR coefficients simultaneously over several networks. The network samles are drawn from timeframes of a random walk MANET. Initially the nodes are randomly distributed on a rectangular area, and then, at every timeframe, they move according to a random walk algorithm. If two nodes are close enough (and are within the coverage range) then there is a link between them. At the same time we consider also streaming media at different intensities of static FEC codes tolerating corresondingly weak acket loss rates from.% to (with an increment of 0.%). Fig., reresents a MANET with nodes and 00 timeframes divided into seven sets of network samles. For each set of samles and for each static FEC intensity we lot the average ROR coefficient (over all considered network samles) as the routing layer increases. Fig.. shows that the overall requirement in FEC codes decreases with caillarization. The ROR coefficients of the routing samles are comuted assuming a short layback buffering time according to equation (), where the FEC block size (as function of the acket loss rate ) is comuted according to equation (), the number of media ackets (M) er transmission block is 0 and the desired decoding failure rate (DER) is 0. Average ROR layers: Caillary routing layers from to 0 for each set of samles weak static tolerance:.%.9%.%.8%.0%.% 7.% Fig.. Average ROR as a function from the caillary routing layer Fig. 7 reresents a MANET with 0 nodes and 0 timeframes divided into four sets of network samles. The uer curves similarly to the curves of Fig. are comuted according to equations () and (), where M = 0 and DER = 0. However, the lower curves of Fig. 7 are comuted according to equation () for streaming with large FEC blocks. Average ROR %.9%.%.%.8%.%.0%.% 7.% %.%.% %.9%.%.%.8%.%.0%.% 7.% Caillary routing layers from to 0 for each set of samles Fig. 7. Average ROR comuted assuming real-time streaming (the grou of curves above) and off-line streaming (the grou below) When streaming with large blocks the Redundancy Overall Requirement is twice as low as in streaming with restricted layback buffering time, but the caillarization of routing is beneficiary in both cases. 00
5 Logically, the ROR curve of the media stream is shifted down as the statically added tolerance increases, but the increase of the weak static tolerance yields also a stronger efficiency gain achieved by caillarization. The drawback of ath diversity in general is that by forming long aths we may unjustifiably increase the number of links in the communication footrint raising the overall failure rate and thus ossibly increasing the overall requirement in FEC codes. Fig. and Fig. 7 however show that desite the communication footrint becomes larger; with the routing atters built by caillary routing algorithm the requirement in redundant ackets decreases noticeably most of the time. V. CONCLUSION The resiliency and reliability issues of acketized realtime streaming are of growing imortance. Commercial real-time streaming alications however do not consider channel coding as a serious solution for imroving the reliability of communication. That is because in single ath communications, even heavy FEC overheads cannot rotect against failures lasting more than the short duration of the layback buffer. Recent studies demonstrated that ath diversity makes FEC alicable for real-time streaming. By studying a wide range of routing toologies, we show that combination of channel coding with aroriate multi-ath routing allows reliable real-time streaming with a low overall requirement in FEC codes. For this urose we introduce a layer by layer strategy for building multi-ath caillary routing atterns. The first layer rovides a simle multi-ath solution. As the layer number increases, the underlying routing attern relies on the network more securely. Unlike max-flow or shortest ath solutions, for a given source and destination, by construction (section II) there exists only one solution of caillary routing. We introduce ROR, a method for rating multi-ath routing atterns by a single scalar value. The ROR rating corresonds to the total redundancy overhead that the sending node must rovide in order to combat the losses occurring from non-simultaneous failures of links in the communication ath. Desite the fact that sreading out of the routing results in the increase of the overall failure rate of underlying links and consecutively maybe also of the need in adative FEC codes; with caillarization the overall requirement in FEC codes in fact decreases substantially. Caillary routing can be alicable to multi-ho mobile wireless networks, where wireless content can be streamed to and from the user via multile base stations; or to the ublic internet, where, if the hysical routing cannot be accessed, an overlay network can be used []. We hoe that our investigation will rovide some guidelines for future design of ath diversity-based real-time streaming systems. REFERENCES [] David J. C. MacKay, Fountain codes, IEE Communications, Vol. Issue, Dec 00, [] Amin Shokrollahi, Rator codes, ISIT 0, June 7 July, age [] Loring Wirbel, Deal ushes algorithms into digital radio, Aril, 00, htt:// [] Michael Luby, LT codes, FOCS 0, November -9, [] Mark Fritz, Digital Dailies Flow Freely from Fountain, Aril, 00, htt:// &ArticleID=077 [] Ingemar Johansson, Tomas Frankkila, Per Synnergren, Bandwidth efficient AMR oeration for VoIP, Seech Coding 00, Oct -9,. 0- [7] Yicheng Huang, Jari Korhonen, Ye Wang, Otimization of Source and Channel Coding for Voice Over IP, ICME 0, Jul 0,. 7-7 [8] Chinmay Padhye, Kenneth J. Christensen, Wilfrido Moreno, A new adative FEC loss control algorithm for voice over IP alications, IPCCC 00, Feb 0-,. 07- [9] Eitan Altman, Chadi Barakat, Victor M. Ramos, Queueing analysis of simle FEC schemes for IP telehony, INFOCOM 00, Vol., A -, [0] Qi Qu, Ivan V. Bajic, Xusheng Tian, James W. Modestino, On the effects of ath correlation in multi-ath video communications using FEC over lossy acket networks, IEEE GLOBECOM 0 Vol., Nov 9 - Dec, [] Tawan Thongook, Load balancing of adative zone routing in ad hoc networks, TENCON 00, Vol. B, Nov -,. 7-7 [] Rui Ma, Jacek Ilow, Reliable multiath routing with fixed delays in MANET using regenerating nodes, LCN 0, Oct 0-, [] Rui Ma, Jacek Ilow, Regenerating nodes for real-time transmissions in multi-ho wireless networks, LCN 0, Nov -8, [] Thinh Nguyen, Avideh Zakhor, Protocols for distributed video streaming, Image Processing 00, Vol., Jun -8, [] John W. Byers, Michael Luby, Michale Mitzenmacher, Accessing multile mirror sites in arallel: using Tornado codes to seed u downloads, INFOCOM 999, Vol., Mar -,. 7-8 [] Thinh Nguyen, P. Mehra, Avideh Zakhor, Path diversity and bandwidth allocation for multimedia streaming, ICME 0 Vol., Jul -9,. -7 [7] Seong-ryong Kang, Dmitri Loguinov, Imact of FEC overhead on scalable video streaming, NOSSDAV 0, Jun -,. -8 [8] Youshi Xu, Tingting Zhang, An adative redundancy technique for wireless indoor multicasting, ISCC 000, Jul -,. 07- [9] Gadiel Seroussi, Ron M. Roth, On MDS extensions of generalized Reed- Solomon codes, IEEE Transactions on Information Theory, Vol., Issue, May 98,. 9- [0] Thomas S. J. Schwarz, Generalized Reed Solomon codes for erasure correction in SDDS, In Worksho on Distributed Data and Structures, WDAS 00, Paris, Mar 00 [] Thomas J. Richardson and Rüdiger L Urbanke, Efficient Encoding of Low-Density Parity Check Codes, IEEE Transactions on Information Theory, Vol. 7, No., February 00,. 8- [] Tuna Guven, Chris Kommareddy, Richard J. La, Mark A. Shayman, Bobby Bhattacharjee Measurement based otimal multi-ath routing, INFOCOM 00, Vol., Mar 7-,
IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model
IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,
More informationA Study of Protocols for Low-Latency Video Transport over the Internet
A Study of Protocols for Low-Latency Video Transort over the Internet Ciro A. Noronha, Ph.D. Cobalt Digital Santa Clara, CA ciro.noronha@cobaltdigital.com Juliana W. Noronha University of California, Davis
More informationA CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH
A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu
More informationMulti-path Forward Error Correction Control Scheme with Path Interleaving
Multi-path Forward Error Correction Control Scheme with Path Interleaving Ming-Fong Tsai, Chun-Yi Kuo, Chun-Nan Kuo and Ce-Kuen Shieh Department of Electrical Engineering, National Cheng Kung University,
More informationEP2200 Performance analysis of Communication networks. Topic 3 Congestion and rate control
EP00 Performance analysis of Communication networks Toic 3 Congestion and rate control Congestion, rate and error control Lecture material: Bertsekas, Gallager, Data networks, 6.- I. Kay, Stochastic modeling,
More informationSource Coding and express these numbers in a binary system using M log
Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is
More informationSensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network
1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann
More informationTCP VON: Joint Congestion Control and Online Network Coding for Wireless Networks
TCP VON: Joint Congestion Control and Online Network Coding for Wireless Networks Wei Bao, Vahid Shah-Mansouri, Vincent W.S. Wong, and Victor C.M. Leung Deartment of Electrical and Comuter Engineering
More informationAn Efficient Video Program Delivery algorithm in Tree Networks*
3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,
More informationTOPP Probing of Network Links with Large Independent Latencies
TOPP Probing of Network Links with Large Indeendent Latencies M. Hosseinour, M. J. Tunnicliffe Faculty of Comuting, Information ystems and Mathematics, Kingston University, Kingston-on-Thames, urrey, KT1
More informationStatistical Detection for Network Flooding Attacks
Statistical Detection for Network Flooding Attacks C. S. Chao, Y. S. Chen, and A.C. Liu Det. of Information Engineering, Feng Chia Univ., Taiwan 407, OC. Email: cschao@fcu.edu.tw Abstract In order to meet
More informationShuigeng Zhou. May 18, 2016 School of Computer Science Fudan University
Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions
More informationAn Efficient End-to-End QoS supporting Algorithm in NGN Using Optimal Flows and Measurement Feed-back for Ubiquitous and Distributed Applications
An Efficient End-to-End QoS suorting Algorithm in NGN Using Otimal Flows and Measurement Feed-back for Ubiquitous and Distributed Alications Se Youn Ban, Seong Gon Choi 2, Jun Kyun Choi Information and
More informationAn empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs
An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science
More informationAUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.
inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.
More informationFountain Codes Based on Zigzag Decodable Coding
Fountain Codes Based on Zigzag Decodable Coding Takayuki Nozaki Kanagawa University, JAPAN Email: nozaki@kanagawa-u.ac.jp Abstract Fountain codes based on non-binary low-density parity-check (LDPC) codes
More informationPatterned Wafer Segmentation
atterned Wafer Segmentation ierrick Bourgeat ab, Fabrice Meriaudeau b, Kenneth W. Tobin a, atrick Gorria b a Oak Ridge National Laboratory,.O.Box 2008, Oak Ridge, TN 37831-6011, USA b Le2i Laboratory Univ.of
More informationMulticast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1
Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and
More informationEE678 Application Presentation Content Based Image Retrieval Using Wavelets
EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective
More informationSEARCH ENGINE MANAGEMENT
e-issn 2455 1392 Volume 2 Issue 5, May 2016. 254 259 Scientific Journal Imact Factor : 3.468 htt://www.ijcter.com SEARCH ENGINE MANAGEMENT Abhinav Sinha Kalinga Institute of Industrial Technology, Bhubaneswar,
More informationObjectives. Part 1: Implement Friction Compensation.
ME 446 Laboratory # Inverse Dynamics Joint Control Reort is due at the beginning of your lab time the week of Aril 9 th. One reort er grou. Lab sessions will be held the weeks of March th, March 6 th,
More informationThe Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks
The Scalability and Performance of Common Vector Solution to Generalized abel Continuity Constraint in Hybrid Otical/Pacet etwors Shujia Gong and Ban Jabbari {sgong, bjabbari}@gmuedu George Mason University
More informationModeling Reliable Broadcast of Data Buffer over Wireless Networks
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 3, 799-810 (016) Short Paer Modeling Reliable Broadcast of Data Buffer over Wireless Networs Deartment of Comuter Engineering Yeditee University Kayışdağı,
More informationSemi-Markov Process based Model for Performance Analysis of Wireless LANs
Semi-Markov Process based Model for Performance Analysis of Wireless LANs Murali Krishna Kadiyala, Diti Shikha, Ravi Pendse, and Neeraj Jaggi Deartment of Electrical Engineering and Comuter Science Wichita
More informationRandomized algorithms: Two examples and Yao s Minimax Principle
Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum
More informationConstruction of Irregular QC-LDPC Codes in Near-Earth Communications
Journal of Communications Vol. 9, No. 7, July 24 Construction of Irregular QC-LDPC Codes in Near-Earth Communications Hui Zhao, Xiaoxiao Bao, Liang Qin, Ruyan Wang, and Hong Zhang Chongqing University
More informationA BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION
Yugoslav Journal of Oerations Research (00), umber, 5- A BICRITERIO STEIER TREE PROBLEM O GRAPH Mirko VUJO[EVI], Milan STAOJEVI] Laboratory for Oerational Research, Faculty of Organizational Sciences University
More information12) United States Patent 10) Patent No.: US 6,321,328 B1
USOO6321328B1 12) United States Patent 10) Patent No.: 9 9 Kar et al. (45) Date of Patent: Nov. 20, 2001 (54) PROCESSOR HAVING DATA FOR 5,961,615 10/1999 Zaid... 710/54 SPECULATIVE LOADS 6,006,317 * 12/1999
More informationGrouping of Patches in Progressive Radiosity
Grouing of Patches in Progressive Radiosity Arjan J.F. Kok * Abstract The radiosity method can be imroved by (adatively) grouing small neighboring atches into grous. Comutations normally done for searate
More informationSensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s
Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,
More informationRecord Route IP Traceback: Combating DoS Attacks and the Variants
Record Route IP Traceback: Combating DoS Attacks and the Variants Abdullah Yasin Nur, Mehmet Engin Tozal University of Louisiana at Lafayette, Lafayette, LA, US ayasinnur@louisiana.edu, metozal@louisiana.edu
More informationFace Recognition Using Legendre Moments
Face Recognition Using Legendre Moments Dr.S.Annadurai 1 A.Saradha Professor & Head of CSE & IT Research scholar in CSE Government College of Technology, Government College of Technology, Coimbatore, Tamilnadu,
More informationDistributed Estimation from Relative Measurements in Sensor Networks
Distributed Estimation from Relative Measurements in Sensor Networks #Prabir Barooah and João P. Hesanha Abstract We consider the roblem of estimating vectorvalued variables from noisy relative measurements.
More informationLearning Motion Patterns in Crowded Scenes Using Motion Flow Field
Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical
More informationAd Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model
Ad Hoc Networks (4) 5 68 Contents lists available at SciVerse ScienceDirect Ad Hoc Networks journal homeage: www.elsevier.com/locate/adhoc Latency-minimizing data aggregation in wireless sensor networks
More informationA Model-Adaptable MOSFET Parameter Extraction System
A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313
More informationJ. Parallel Distrib. Comput.
J. Parallel Distrib. Comut. 71 (2011) 288 301 Contents lists available at ScienceDirect J. Parallel Distrib. Comut. journal homeage: www.elsevier.com/locate/jdc Quality of security adatation in arallel
More informationAn Efficient Coding Method for Coding Region-of-Interest Locations in AVS2
An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China
More informationOMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications
OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture
More informationAn FPGA Implementation of ( )-Regular Low-Density. Parity-Check Code Decoder
An FPGA Imlementation of ( )-Regular Low-Density Parity-Check Code Decoder Tong Zhang ECSE Det., RPI Troy, NY tzhang@ecse.ri.edu Keshab K. Parhi ECE Det., Univ. of Minnesota Minneaolis, MN arhi@ece.umn.edu
More informationSpace-efficient Region Filling in Raster Graphics
"The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich
More informationProtecting RAID Arrays Against Unexpectedly High Disk Failure Rates
Protecting RAID Arrays Against Unexectedly High Disk Failure Rates Jehan-François Pâris Comuter Science Det. University of Houston Houston, TX jfaris@uh.edu Thomas Schwarz, S. J. Deto. de ICC Universidad
More informationA Measurement Study of Internet Bottlenecks
A Measurement Study of Internet Bottlenecks Ningning Hu, Li (Erran) Li y, Zhuoqing Morley Mao z, Peter Steenkiste and Jia Wang x Carnegie Mellon University, Email: fhnn, rsg@cs.cmu.edu y Bell Laboratories,
More informationDirected File Transfer Scheduling
Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was
More information22. Swaping: Policies
22. Swaing: Policies Oerating System: Three Easy Pieces 1 Beyond Physical Memory: Policies Memory ressure forces the OS to start aging out ages to make room for actively-used ages. Deciding which age to
More informationEDGE: A ROUTING ALGORITHM FOR MAXIMIZING THROUGHPUT AND MINIMIZING DELAY IN WIRELESS SENSOR NETWORKS
EDGE: A ROUTING ALGORITHM FOR MAXIMIZING THROUGHPUT AND MINIMIZING DELAY IN WIRELESS SENSOR NETWORKS Shuang Li, Alvin Lim, Santosh Kulkarni and Cong Liu Auburn University, Comuter Science and Software
More informationA Comprehensive Minimum Energy Routing Scheme for Wireless Ad hoc Networks
A Comrehensive Minimum Energy Routing Scheme for Wireless Ad hoc Networks Jinhua Zhu, Chunming Qiao and Xin Wang Deartment of Comuter Science and Engineering State University of New York at Buffalo, Buffalo,
More informationPrivacy Preserving Moving KNN Queries
Privacy Preserving Moving KNN Queries arxiv:4.76v [cs.db] 4 Ar Tanzima Hashem Lars Kulik Rui Zhang National ICT Australia, Deartment of Comuter Science and Software Engineering University of Melbourne,
More informationAN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY
AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY Andrew Lam 1, Steven J.E. Wilton 1, Phili Leong 2, Wayne Luk 3 1 Elec. and Com. Engineering 2 Comuter Science
More informationAN early generation of unstructured P2P systems is
1078 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 16, NO. 11, NOVEMBER 2005 Dynamic Layer Management in Suereer Architectures Li Xiao, Member, IEEE, Zhenyun Zhuang, and Yunhao Liu, Member,
More informationA New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism
A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism Erlin Yao, Mingyu Chen, Rui Wang, Wenli Zhang, Guangming Tan Key Laboratory of Comuter System and Architecture Institute
More informationImproved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties
Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal
More informationPREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS
PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links
More informationAn Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal
International Journal of Information and Electronics Engineering, Vol. 1, No. 1, July 011 An Efficient VLSI Architecture for Adative Rank Order Filter for Image Noise Removal M. C Hanumantharaju, M. Ravishankar,
More informationIEEE High Performance Serial Bus
IEEE 1394-1995 High Performance Serial Bus Michael D. Johas Teener Editor, P1394 Working Grou Plumbing Architect, Ale Comuter, Inc. One Infinite Loo, MS 35-OEM Cuertino, CA 95014 teener@ale.com Background
More informationImproving Trust Estimates in Planning Domains with Rare Failure Events
Imroving Trust Estimates in Planning Domains with Rare Failure Events Colin M. Potts and Kurt D. Krebsbach Det. of Mathematics and Comuter Science Lawrence University Aleton, Wisconsin 54911 USA {colin.m.otts,
More informationSource-to-Source Code Generation Based on Pattern Matching and Dynamic Programming
Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Weimin Chen, Volker Turau TR-93-047 August, 1993 Abstract This aer introduces a new technique for source-to-source code
More informationCS649 Sensor Networks IP Track Lecture 6: Graphical Models
CS649 Sensor Networks IP Track Lecture 6: Grahical Models I-Jeng Wang htt://hinrg.cs.jhu.edu/wsn06/ Sring 2006 CS 649 1 Sring 2006 CS 649 2 Grahical Models Grahical Model: grahical reresentation of joint
More informationarxiv: v1 [cs.mm] 18 Jan 2016
Lossless Intra Coding in with 3-ta Filters Saeed R. Alvar a, Fatih Kamisli a a Deartment of Electrical and Electronics Engineering, Middle East Technical University, Turkey arxiv:1601.04473v1 [cs.mm] 18
More informationIntroduction to Parallel Algorithms
CS 1762 Fall, 2011 1 Introduction to Parallel Algorithms Introduction to Parallel Algorithms ECE 1762 Algorithms and Data Structures Fall Semester, 2011 1 Preliminaries Since the early 1990s, there has
More informationChapter 7b - Point Estimation and Sampling Distributions
Chater 7b - Point Estimation and Samling Distributions Chater 7 (b) Point Estimation and Samling Distributions Point estimation is a form of statistical inference. In oint estimation we use the data from
More informationPirogue, a lighter dynamic version of the Raft distributed consensus algorithm
Pirogue a lighter dynamic version of the Raft distributed consensus algorithm Jehan-François Pâris Darrell D.. Long Deartment of Comuter Science Deartment of Comuter Science University of Houston University
More information10. Parallel Methods for Data Sorting
10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting... 1 10.1. Parallelizing Princiles... 10.. Scaling Parallel Comutations... 10.3. Bubble Sort...3 10.3.1. Sequential Algorithm...3
More informationA DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans
Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment
More informationEfficient Processing of Top-k Dominating Queries on Multi-Dimensional Data
Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of
More informationSPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation
To aear in IEEE VLSI Test Symosium, 1997 SITFIRE: Scalable arallel Algorithms for Test Set artitioned Fault Simulation Dili Krishnaswamy y Elizabeth M. Rudnick y Janak H. atel y rithviraj Banerjee z y
More informationA Metaheuristic Scheduler for Time Division Multiplexed Network-on-Chip
Downloaded from orbit.dtu.dk on: Jan 25, 2019 A Metaheuristic Scheduler for Time Division Multilexed Network-on-Chi Sørensen, Rasmus Bo; Sarsø, Jens; Pedersen, Mark Ruvald; Højgaard, Jasur Publication
More informationLeak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method
ITB J. Eng. Sci. Vol. 39 B, No. 1, 007, 1-19 1 Leak Detection Modeling and Simulation for Oil Pieline with Artificial Intelligence Method Pudjo Sukarno 1, Kuntjoro Adji Sidarto, Amoranto Trisnobudi 3,
More informationSkip List Based Authenticated Data Structure in DAS Paradigm
009 Eighth International Conference on Grid and Cooerative Comuting Ski List Based Authenticated Data Structure in DAS Paradigm Jieing Wang,, Xiaoyong Du,. Key Laboratory of Data Engineering and Knowledge
More informationStereo Disparity Estimation in Moment Space
Stereo Disarity Estimation in oment Sace Angeline Pang Faculty of Information Technology, ultimedia University, 63 Cyberjaya, alaysia. angeline.ang@mmu.edu.my R. ukundan Deartment of Comuter Science, University
More informationEfficient stereo vision for obstacle detection and AGV Navigation
Efficient stereo vision for obstacle detection and AGV Navigation Rita Cucchiara, Emanuele Perini, Giuliano Pistoni Diartimento di Ingegneria dell informazione, University of Modena and Reggio Emilia,
More informationDistributed Systems (5DV147)
Distributed Systems (5DV147) Mutual Exclusion and Elections Fall 2013 1 Processes often need to coordinate their actions Which rocess gets to access a shared resource? Has the master crashed? Elect a new
More information10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1
10 File System 1 We will examine this chater in three subtitles: Mass Storage Systems OERATING SYSTEMS FILE SYSTEM 1 File System Interface File System Imlementation 10.1.1 Mass Storage Structure 3 2 10.1
More informationA power efficient flit-admission scheme for wormhole-switched networks on chip
A ower efficient flit-admission scheme for wormhole-switched networks on chi Zhonghai Lu, Li Tong, Bei Yin and Axel Jantsch Laboratory of Electronics and Comuter Systems Royal Institute of Technology,
More informationNear-Optimal Routing Lookups with Bounded Worst Case Performance
Near-Otimal Routing Lookus with Bounded Worst Case Performance Pankaj Guta Balaji Prabhakar Stehen Boyd Deartments of Electrical Engineering and Comuter Science Stanford University CA 9430 ankaj@stanfordedu
More informationUsing Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication
Using Permuted States and Validated Simulation to Analyze Conflict Rates in Otimistic Relication An-I A. Wang Comuter Science Deartment Florida State University Geoff H. Kuenning Comuter Science Deartment
More informationProcess and Measurement System Capability Analysis
Process and Measurement System aability Analysis Process caability is the uniformity of the rocess. Variability is a measure of the uniformity of outut. Assume that a rocess involves a quality characteristic
More informationVisualization, Estimation and User-Modeling for Interactive Browsing of Image Libraries
Visualization, Estimation and User-Modeling for Interactive Browsing of Image Libraries Qi Tian, Baback Moghaddam 2 and Thomas S. Huang Beckman Institute, University of Illinois, Urbana-Chamaign, IL 680,
More informationLOW-DENSITY PARITY-CHECK (LDPC) codes [1] can
208 IEEE TRANSACTIONS ON MAGNETICS, VOL 42, NO 2, FEBRUARY 2006 Structured LDPC Codes for High-Density Recording: Large Girth and Low Error Floor J Lu and J M F Moura Department of Electrical and Computer
More informationSingle character type identification
Single character tye identification Yefeng Zheng*, Changsong Liu, Xiaoqing Ding Deartment of Electronic Engineering, Tsinghua University Beijing 100084, P.R. China ABSTRACT Different character recognition
More informationOn Growth of Parallelism within Routers and Its Impact on Packet Reordering 1
On Growth of Parallelism within Routers and Its Imact on Reordering 1 A. A. Bare 1, A. P. Jayasumana, and N. M. Piratla 2 Deartment of Electrical & Comuter Engineering, Colorado State University, Fort
More informationComplexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks
Journal of Comuting and Information Technology - CIT 8, 2000, 1, 1 12 1 Comlexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Eunice E. Santos Deartment of Electrical
More informationA Novel Iris Segmentation Method for Hand-Held Capture Device
A Novel Iris Segmentation Method for Hand-Held Cature Device XiaoFu He and PengFei Shi Institute of Image Processing and Pattern Recognition, Shanghai Jiao Tong University, Shanghai 200030, China {xfhe,
More informationCooperative Diversity Combined with Beamforming
Cooerative Diversity Combined with Beamforming Hyunwoo Choi and Jae Hong Lee School of Electrical Engineering and INMC Seoul National University Seoul, Korea Email: {novo28, jhlee}@snu.ac.kr Abstract In
More informationProposal for Robust and Adaptive Forward Error Correction for real-time Audio-Video streaming solutions
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 3, Issue 2 (Sep-Oct. 2012), PP 32-36 Proposal for Robust and Adaptive Forward Error Correction
More informationTruth Trees. Truth Tree Fundamentals
Truth Trees 1 True Tree Fundamentals 2 Testing Grous of Statements for Consistency 3 Testing Arguments in Proositional Logic 4 Proving Invalidity in Predicate Logic Answers to Selected Exercises Truth
More informationOptimizing Dynamic Memory Management!
Otimizing Dynamic Memory Management! 1 Goals of this Lecture! Hel you learn about:" Details of K&R hea mgr" Hea mgr otimizations related to Assignment #6" Faster free() via doubly-linked list, redundant
More informationIntroduction to Image Compresion
ENEE63 Fall 2 Lecture-7 Introduction to Image Comresion htt://www.ece.umd.edu/class/enee63/ minwu@eng.umd.edu M. Wu: ENEE63 Digital Image Processing (Fall') Min Wu Electrical & Comuter Engineering Univ.
More informationMeasurement Based Routing Strategies on Overlay Architectures
Measurement Based Routing Strategies on Overlay Architectures Student: Tuna Güven Faculty: Bobby Bhattacharjee, Richard J. La, and Mark A. Shayman LTS Review February 15 th, 2005 Outline Measurement-Based
More informationFountain Codes with XOR of Encoded Packets for Broadcasting and source independent backbone in Multi-hop Networks using Network Coding
Fountain Codes with XOR of Encoded Packets for Broadcasting and source independent backbone in Multi-hop Networks using Network Coding Khaldoun Al Agha LRI, Paris XI University, Orsay, France Email: alagha@lri.fr
More informationAn improved algorithm for Hausdorff Voronoi diagram for non-crossing sets
An imroved algorithm for Hausdorff Voronoi diagram for non-crossing sets Frank Dehne, Anil Maheshwari and Ryan Taylor May 26, 2006 Abstract We resent an imroved algorithm for building a Hausdorff Voronoi
More informationQSRED, An Algorithm To Solve The Mismatch Between The Microscopic and Macroscopic Behavior of RED Gateways
IJCSNS International Journal of Comuter Science Network Security, VOL.10 No.11, November 2010 63 QSRED, An Algorim To Solve The Mismatch Between The Microscoic Macroscoic Behavior of RED Gateways Nabhan
More informationPhase Transitions in Interconnection Networks with Finite Buffers
Abstract Phase Transitions in Interconnection Networks with Finite Buffers Yelena Rykalova Boston University rykalova@bu.edu Lev Levitin Boston University levitin@bu.edu This aer resents theoretical models
More informationAUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY
AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY Yandong Wang EagleView Technology Cor. 5 Methodist Hill Dr., Rochester, NY 1463, the United States yandong.wang@ictometry.com
More informationInteractive Image Segmentation
Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).
More informationRelations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University.
Relations with Relation Names as Arguments: Algebra and Calculus Kenneth A. Ross Columbia University kar@cs.columbia.edu Abstract We consider a version of the relational model in which relation names may
More informationCSC310 Information Theory. Lecture 21: Erasure (Deletion) Channels & Digital Fountain Codes. November 22, 2006 see
CSC310 Information Theory Lecture 21: Erasure (Deletion) Channels & Digital Fountain Codes Sam Roweis Recovering From Erasures 2 How can we recover from erasures? For the BEC, we saw that low-density parity
More informationFigure 8.1: Home age taken from the examle health education site (htt:// Setember 14, 2001). 201
200 Chater 8 Alying the Web Interface Profiles: Examle Web Site Assessment 8.1 Introduction This chater describes the use of the rofiles develoed in Chater 6 to assess and imrove the quality of an examle
More informationBrief Contributions. A Geometric Theorem for Network Design 1 INTRODUCTION
IEEE TRANSACTIONS ON COMPUTERS, VOL. 53, NO., APRIL 00 83 Brief Contributions A Geometric Theorem for Network Design Massimo Franceschetti, Member, IEEE, Matthew Cook, and Jehoshua Bruck, Fellow, IEEE
More informationEfficient Parallel Hierarchical Clustering
Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore
More information