Fault-Tolerant Streaming with FEC through Capillary Multi-Path Routing

Size: px
Start display at page:

Download "Fault-Tolerant Streaming with FEC through Capillary Multi-Path Routing"

Transcription

1 Fault-Tolerant Streaming with FEC through Caillary Multi-Path Routing Emin Gabrielyan Switzernet Sàrl and Swiss Federal Institute of Technology (EPFL) Lausanne, Switzerland Abstract Erasure resilient FEC codes in off-line acketized streaming rely on time diversity, which in its turn relies on unrestricted buffering time at the receiver. In real-time streaming the layback buffering time must be very short. Path diversity is an orthogonal strategy, but its drawback is that large number of long aths increases the number of underlying links and consecutively the overall link failure rate. It may result in increase of the overall requirement in redundant FEC ackets combating the link failures. We introduce Redundancy Overall Requirement (ROR), a routing coefficient of the total number of FEC ackets required for comensation of all underlying link failures. We resent caillary routing algorithm constructing layer by layer steadily diversifying multi-ath routing atterns. By measuring ROR coefficients of a dozen of routing layers on hundreds of network samles, we show that the number of required FEC ackets decreases substantially when the ath diversity is achieved by caillary routing algorithm. I. INTRODUCTION Erasure resilient FEC codes achieve high reliability in off-line streaming in most challenging network conditions [], [], [], [], []. Off-line streaming can significantly benefit from FEC due to the fact that in contrary to real-time streaming, the receiver is not obliged to deliver in time the fresh ackets to the user. Since long buffering is not a concern, ackets reresenting the same information can be received at different times. In real-time single-ath streaming, when buffering time is restricted, FEC can only mitigate short granular failures [], [7], [8] and [9]. Packets reresenting the same information cannot be collected at very remote eriods of time. Recent ublications show the alicability of FEC in real-time streaming with ath diversity. Author of [0] shows that strong FEC imroves video communication following two disjoint aths and that in two correlated aths weak FEC is still advantageous. [] rooses adative multi-ath routing for Mobile Ad-Hoc Networks (MANET) addressing the load balance and caacity issues, but mentioning also the ossible advantages for FEC. Authors of [] and [] suggests relacing in MANET the link level Automatic Reeat Query (ARQ) by a link level FEC assuming regenerating nodes. Authors of [] and [] studied video streaming from multile servers. The same author [] later studied real-time streaming over two aths using a static Reed-Solomon RS(0,) code (FEC blocks carrying source ackets and 7 redundant ackets). [], similarly to [0] comared two-ath scenarios with the single OSPF routing strategy and has shown clear advantages of the double ath routing. The ath diversity in all these studies is limited to either two (ossibly correlated) aths or in the most general case to a sequence of arallel and serial links. Various routing toologies, so far, were not regarded as a ground for searching a FEC efficient attern. In this aer we try to resent a comarative study for various multi-ath routing atterns. Single ath routing, being considered as too hostile, is excluded from our comarisons. Steadily diversifying routing atters are built layer by layer with caillary routing algorithm (sections II). In order to comare multi-ath routing atterns, we introduce Redundancy Overall Requirement (ROR), a routing coefficient relying on the sender s transmission rate increases in resonse to individual link failures. By default, the sender is streaming the media with a static amount of FEC codes in order to tolerate a certain weak acket loss rate. The acket loss rate is measured at the receiver and is constantly reorted back to the sender with the oosite flow. The sender increases the FEC overhead whenever the acket loss rate is about to exceed the tolerable limit. This end-to-end adative FEC mechanism is imlemented entirely on the end nodes, at the alication level, and is not aware of the underlying routing scheme [7], [8], [], [7] and [8]. The overall number of transmitted adative redundant ackets for rotecting the communication session against link failures is roortional () to the usual acket transmission rate of the sender, () to the duration of the communication, () to the single link failure rate, () to the single link failure duration and () to the ROR coefficient of the underlying routing attern followed by the communication flow. The novelty brought by ROR is that a routing toology of any comlexity can be rated by a single scalar value (section III). In section IV, we resent ROR coefficients of different routing layers built by caillary routing algorithm. Network 97

2 samles are obtained from a random walk MANET with several hundreds of nodes. We show that ath diversity achieved by caillary routing algorithm reduces substantially the amount of FEC codes required from the sender. II. CAPILLARY ROUTING Caillary routing may be imlemented by an iterative Linear Programming (LP) rocess transforming a singleath flow into a caillary route. First minimize the maximal value of the load of all links by minimizing an uer bound value alied to all links. The full mass of the flow will be slit equally across the ossible arallel routes. Find the bottleneck links of the first layer (see below) and fix their load at the found minimum. Minimize similarly the maximal load of all remaining links without the bottleneck links of the first layer. This second iteration further refines the ath diversity. Find the bottleneck links of the second layer. Minimize the maximal load of all remaining links, now without the bottlenecks of also the second layer. Reeat this iteration until the entire communication footrint is enclosed in the bottlenecks of the constructed layers. Fig., Fig. and Fig. show the first three layers of the caillary routing on a small network. The to node on the diagrams is the sender, the bottom node is the receiver and all links are oriented from to to bottom. Fig.. In the first layer the flow is equally slit across two aths, two links of which, marked by thick dashes, are the Fig.. The second layer minimizes to / the maximal load of the remaining seven links and identifies three Fig.. The third layer minimizes to / the maximal load of the remaining four links and identifies two Fig. shows the 0-th layer of caillary routing between a air of end nodes on a network with 0 nodes and links. Links not carrying traffic are not shown. The solid lines of the diagram reresent the bottleneck links belonging to one of the 0 layers. The dashed lines reresent a mincost solution of the remaining flow not enclosed in bottlenecks after the 0-th layer. There could be several tens of additional routing layers until comlete caillarization is achieved. links: nodes: 0 layers: 0 bottlenecks: 8 remaining: 97 : : : : : 0.7 : : : 0.7 9: 0.9 0: 0. Fig.. Routing attern of layer 0 built by caillary routing algorithm on a network samle with 0 nodes At each layer, after minimizing the maximal load of links, the bottlenecks of the layer are discovered in a bottleneck hunting loo. At each iteration of the hunting loo, we minimize the load of the traffic over all links having maximal load and being susected as Links not maintaining their load at the maximum are removed from the susect list. The bottleneck hunting loo stos if there are no more links to remove. For caillary routing layers, built simultaneously on 00 indeendent network samles each with 00 nodes (in average,.7 links er network), Fig. shows the decrease of the number of susected links during the bottleneck hunting loo of each caillary routing layer from to 0. average number of susected links layer layer layer layer layer layer layer7 layer8 layer9 layer0 Iterations of the hunting loo (from to ) for the layers of the caillary routing (from to 0) Fig.. Decrease of the number of susected links during the bottleneck hunting loo of each of 0 caillary routing layers At the end of each hunting loo (from to iterations) the susect list consists of only true bottleneck links, in average between.9 and 9.9 bottlenecks er network. 98

3 III. REDUNDANCY OVERALL REQUIREMENT (ROR) We assume a combination of the little static tolerance of the media stream, combating weak failures, with a dynamically added adative FEC combating the strong failures exceeding the tolerable acket loss rate. For a given routing attern, ROR is defined as the sum of all transmission rate overheads required from the sender for combating corresondingly all non-simultaneous link failures. For examle, if the communication footrint consists of five links, and in resonse to each individual link failure the sender increases the acket transmission rate by %, then ROR will be equal to the sum of these five FEC transmission rate increases, i.e. ROR = % =.. If P is the usual acket transmission rate and P l is the increased rate of the sender, resonding to the failure of a link l L, where L is the set of all links, then: Pl ROR = () P Let us consider a long communication, and let D be the total failure time of a single network link during the whole duration of the communication. D is the roduct of the average duration of a single link failure, the frequency of a single link failure and the total communication time. According to equation (): Pl D P ROR = D P () P = ( D Pl D P) () Assuming a single link failure at a time and a uniform robability and duration of link failures, according to equation (), D P ROR is the number of adative redundant ackets that the sender actually needs to transmit in order to comensate for all network failures occurring during the total communication time. Therefore ROR is a routing coefficient of the overall number of required redundant ackets. Redundant ackets are injected into the original media stream for every block of M source ackets. During streaming, M is suosed to stay constant. However, the number of redundant ackets for each block of M media ackets is variable, deending on the conditions of the erasure channel. The M source ackets with their related redundant ackets form a FEC block. By FEC we denote the FEC block size chosen by the sender in resonse to a acket loss rate. We assume that by default the media is streamed in FEC blocks of length of FEC such that the t flow has a static tolerance to weak losses 0 t <. When the loss rate measured at the receiver is about to exceed the tolerable limit t, the sender increases its transmission rate by injecting additional redundant ackets. The random acket loss rate, observed at the receiver during the failure time of a link in the communication ath, is the ortion of the traffic being still routed toward the faulty link. Thus a comlete failure of a link l carrying according to the routing attern a relative traffic load of 0 r ( roduces at the receiver a acket loss rate equal to the same relative traffic load r (. Equation () for ROR can thus be re-written as follows: FECr ( ROR = () t r( < FECt a sum over all links carrying a flow exceeding the tolerable loss limit The links carrying the entire traffic are skied in the sum index of equation (), since the FEC required for the comensation of failures of such links is infinite. By construction (sections II) none of the considered multi-ath routing schemes will ass its entire traffic through a noncritical single link. We comute the FEC function assuming a Maximum Distance Searable (MDS) code [9], [0]. With MDS code we can successfully decode the M source ackets if we receive any M ackets of the transmission FEC block. In order to collect a mean of M ackets at the receiver under random loss rate, M /( ) ackets must be transmitted at the sender. However the robability of receiving M ackets or M ackets (which makes the decoding imossible) remains high. In order to maintain a very low robability δ of receiving less than M ackets, we must send much more redundant ackets in the block than is necessary to receive an average of M ackets at the receiver side. We must fix the accetable Decoding Error Rate (DER), such that δ DER, in order to comute the FEC M function. The robability of having exactly n losses (erasures) in a block of N ackets with a random loss robability is comuted according to the binomial distribution: N n N n q, where N N! = and q = n n n! ( N n)! The robability of having N M + or more losses, i.e. the decoding failure robability, is comuted as follows: N N n N n δ = q () n= N M + n Therefore for comuting the carrier block s minimal length for a satisfactory communication (i.e. FEC function), it is sufficient to steadily increase the block length N until the desired decoding error rate (DER) is met. FEC functions divided by M (i.e. transmission rate increase factors FEC / M ) are bounded above by log ( DER) when M = and below by /( ) when 99

4 M (for acket loss rates much larger a very small DER). The larger the number of media ackets M in the FEC block, the smaller the cost of FEC overhead is, but the longer the buffering time at the receiver must be. For examle VOIP with 0 ms samling rate restricts the number of media ackets M in a single FEC block to 0 ackets. If the layback buffering time can be a coule of minutes long, with thousands of source ackets in a FEC block (for examle in acketized TV) we can assume that FEC = M /( ). Although for large numbers of source ackets MDS codes do not exist, other caacity aroaching LDPC [] or fountain codes [] can decode a large block of source ackets requiring only a very little excess of ackets (in this context this excess can be ignored). In such case the overall amount of FEC codes required from the sender as a function of the choice of the multi-ath routing attern, can be evaluated by an ROR coefficient according to the following equation, derived from equation () taking into account the above assumtions: t ROR = () t r( < r( Path diversity can be required in off-line large file downloads aiming at avoiding the idle times of the last kilometer bottleneck occurring due to arbitrary failures elsewhere, within the lossy Internet. Thanks to the sender s adative transmission rate and to multi-ath routing, one may feed the last kilometer bottleneck link constantly at its maximal bandwidth (see [] and [] for video streaming from multile servers). In this case also the choice of the multi-ath routing attern can be rated by equation (). Note that according to equations () and () the ROR coefficient of a routing attern deends also on the static tolerance t of the streaming media to weak failures. IV. FEC REQUIREMENT IN CAPILLARY ROUTING For caillary routing layers to 0, we comute the average ROR coefficients simultaneously over several networks. The network samles are drawn from timeframes of a random walk MANET. Initially the nodes are randomly distributed on a rectangular area, and then, at every timeframe, they move according to a random walk algorithm. If two nodes are close enough (and are within the coverage range) then there is a link between them. At the same time we consider also streaming media at different intensities of static FEC codes tolerating corresondingly weak acket loss rates from.% to (with an increment of 0.%). Fig., reresents a MANET with nodes and 00 timeframes divided into seven sets of network samles. For each set of samles and for each static FEC intensity we lot the average ROR coefficient (over all considered network samles) as the routing layer increases. Fig.. shows that the overall requirement in FEC codes decreases with caillarization. The ROR coefficients of the routing samles are comuted assuming a short layback buffering time according to equation (), where the FEC block size (as function of the acket loss rate ) is comuted according to equation (), the number of media ackets (M) er transmission block is 0 and the desired decoding failure rate (DER) is 0. Average ROR layers: Caillary routing layers from to 0 for each set of samles weak static tolerance:.%.9%.%.8%.0%.% 7.% Fig.. Average ROR as a function from the caillary routing layer Fig. 7 reresents a MANET with 0 nodes and 0 timeframes divided into four sets of network samles. The uer curves similarly to the curves of Fig. are comuted according to equations () and (), where M = 0 and DER = 0. However, the lower curves of Fig. 7 are comuted according to equation () for streaming with large FEC blocks. Average ROR %.9%.%.%.8%.%.0%.% 7.% %.%.% %.9%.%.%.8%.%.0%.% 7.% Caillary routing layers from to 0 for each set of samles Fig. 7. Average ROR comuted assuming real-time streaming (the grou of curves above) and off-line streaming (the grou below) When streaming with large blocks the Redundancy Overall Requirement is twice as low as in streaming with restricted layback buffering time, but the caillarization of routing is beneficiary in both cases. 00

5 Logically, the ROR curve of the media stream is shifted down as the statically added tolerance increases, but the increase of the weak static tolerance yields also a stronger efficiency gain achieved by caillarization. The drawback of ath diversity in general is that by forming long aths we may unjustifiably increase the number of links in the communication footrint raising the overall failure rate and thus ossibly increasing the overall requirement in FEC codes. Fig. and Fig. 7 however show that desite the communication footrint becomes larger; with the routing atters built by caillary routing algorithm the requirement in redundant ackets decreases noticeably most of the time. V. CONCLUSION The resiliency and reliability issues of acketized realtime streaming are of growing imortance. Commercial real-time streaming alications however do not consider channel coding as a serious solution for imroving the reliability of communication. That is because in single ath communications, even heavy FEC overheads cannot rotect against failures lasting more than the short duration of the layback buffer. Recent studies demonstrated that ath diversity makes FEC alicable for real-time streaming. By studying a wide range of routing toologies, we show that combination of channel coding with aroriate multi-ath routing allows reliable real-time streaming with a low overall requirement in FEC codes. For this urose we introduce a layer by layer strategy for building multi-ath caillary routing atterns. The first layer rovides a simle multi-ath solution. As the layer number increases, the underlying routing attern relies on the network more securely. Unlike max-flow or shortest ath solutions, for a given source and destination, by construction (section II) there exists only one solution of caillary routing. We introduce ROR, a method for rating multi-ath routing atterns by a single scalar value. The ROR rating corresonds to the total redundancy overhead that the sending node must rovide in order to combat the losses occurring from non-simultaneous failures of links in the communication ath. Desite the fact that sreading out of the routing results in the increase of the overall failure rate of underlying links and consecutively maybe also of the need in adative FEC codes; with caillarization the overall requirement in FEC codes in fact decreases substantially. Caillary routing can be alicable to multi-ho mobile wireless networks, where wireless content can be streamed to and from the user via multile base stations; or to the ublic internet, where, if the hysical routing cannot be accessed, an overlay network can be used []. We hoe that our investigation will rovide some guidelines for future design of ath diversity-based real-time streaming systems. REFERENCES [] David J. C. MacKay, Fountain codes, IEE Communications, Vol. Issue, Dec 00, [] Amin Shokrollahi, Rator codes, ISIT 0, June 7 July, age [] Loring Wirbel, Deal ushes algorithms into digital radio, Aril, 00, htt:// [] Michael Luby, LT codes, FOCS 0, November -9, [] Mark Fritz, Digital Dailies Flow Freely from Fountain, Aril, 00, htt:// &ArticleID=077 [] Ingemar Johansson, Tomas Frankkila, Per Synnergren, Bandwidth efficient AMR oeration for VoIP, Seech Coding 00, Oct -9,. 0- [7] Yicheng Huang, Jari Korhonen, Ye Wang, Otimization of Source and Channel Coding for Voice Over IP, ICME 0, Jul 0,. 7-7 [8] Chinmay Padhye, Kenneth J. Christensen, Wilfrido Moreno, A new adative FEC loss control algorithm for voice over IP alications, IPCCC 00, Feb 0-,. 07- [9] Eitan Altman, Chadi Barakat, Victor M. Ramos, Queueing analysis of simle FEC schemes for IP telehony, INFOCOM 00, Vol., A -, [0] Qi Qu, Ivan V. Bajic, Xusheng Tian, James W. Modestino, On the effects of ath correlation in multi-ath video communications using FEC over lossy acket networks, IEEE GLOBECOM 0 Vol., Nov 9 - Dec, [] Tawan Thongook, Load balancing of adative zone routing in ad hoc networks, TENCON 00, Vol. B, Nov -,. 7-7 [] Rui Ma, Jacek Ilow, Reliable multiath routing with fixed delays in MANET using regenerating nodes, LCN 0, Oct 0-, [] Rui Ma, Jacek Ilow, Regenerating nodes for real-time transmissions in multi-ho wireless networks, LCN 0, Nov -8, [] Thinh Nguyen, Avideh Zakhor, Protocols for distributed video streaming, Image Processing 00, Vol., Jun -8, [] John W. Byers, Michael Luby, Michale Mitzenmacher, Accessing multile mirror sites in arallel: using Tornado codes to seed u downloads, INFOCOM 999, Vol., Mar -,. 7-8 [] Thinh Nguyen, P. Mehra, Avideh Zakhor, Path diversity and bandwidth allocation for multimedia streaming, ICME 0 Vol., Jul -9,. -7 [7] Seong-ryong Kang, Dmitri Loguinov, Imact of FEC overhead on scalable video streaming, NOSSDAV 0, Jun -,. -8 [8] Youshi Xu, Tingting Zhang, An adative redundancy technique for wireless indoor multicasting, ISCC 000, Jul -,. 07- [9] Gadiel Seroussi, Ron M. Roth, On MDS extensions of generalized Reed- Solomon codes, IEEE Transactions on Information Theory, Vol., Issue, May 98,. 9- [0] Thomas S. J. Schwarz, Generalized Reed Solomon codes for erasure correction in SDDS, In Worksho on Distributed Data and Structures, WDAS 00, Paris, Mar 00 [] Thomas J. Richardson and Rüdiger L Urbanke, Efficient Encoding of Low-Density Parity Check Codes, IEEE Transactions on Information Theory, Vol. 7, No., February 00,. 8- [] Tuna Guven, Chris Kommareddy, Richard J. La, Mark A. Shayman, Bobby Bhattacharjee Measurement based otimal multi-ath routing, INFOCOM 00, Vol., Mar 7-,

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,

More information

A Study of Protocols for Low-Latency Video Transport over the Internet

A Study of Protocols for Low-Latency Video Transport over the Internet A Study of Protocols for Low-Latency Video Transort over the Internet Ciro A. Noronha, Ph.D. Cobalt Digital Santa Clara, CA ciro.noronha@cobaltdigital.com Juliana W. Noronha University of California, Davis

More information

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu

More information

Multi-path Forward Error Correction Control Scheme with Path Interleaving

Multi-path Forward Error Correction Control Scheme with Path Interleaving Multi-path Forward Error Correction Control Scheme with Path Interleaving Ming-Fong Tsai, Chun-Yi Kuo, Chun-Nan Kuo and Ce-Kuen Shieh Department of Electrical Engineering, National Cheng Kung University,

More information

EP2200 Performance analysis of Communication networks. Topic 3 Congestion and rate control

EP2200 Performance analysis of Communication networks. Topic 3 Congestion and rate control EP00 Performance analysis of Communication networks Toic 3 Congestion and rate control Congestion, rate and error control Lecture material: Bertsekas, Gallager, Data networks, 6.- I. Kay, Stochastic modeling,

More information

Source Coding and express these numbers in a binary system using M log

Source Coding and express these numbers in a binary system using M log Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

TCP VON: Joint Congestion Control and Online Network Coding for Wireless Networks

TCP VON: Joint Congestion Control and Online Network Coding for Wireless Networks TCP VON: Joint Congestion Control and Online Network Coding for Wireless Networks Wei Bao, Vahid Shah-Mansouri, Vincent W.S. Wong, and Victor C.M. Leung Deartment of Electrical and Comuter Engineering

More information

An Efficient Video Program Delivery algorithm in Tree Networks*

An Efficient Video Program Delivery algorithm in Tree Networks* 3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,

More information

TOPP Probing of Network Links with Large Independent Latencies

TOPP Probing of Network Links with Large Independent Latencies TOPP Probing of Network Links with Large Indeendent Latencies M. Hosseinour, M. J. Tunnicliffe Faculty of Comuting, Information ystems and Mathematics, Kingston University, Kingston-on-Thames, urrey, KT1

More information

Statistical Detection for Network Flooding Attacks

Statistical Detection for Network Flooding Attacks Statistical Detection for Network Flooding Attacks C. S. Chao, Y. S. Chen, and A.C. Liu Det. of Information Engineering, Feng Chia Univ., Taiwan 407, OC. Email: cschao@fcu.edu.tw Abstract In order to meet

More information

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions

More information

An Efficient End-to-End QoS supporting Algorithm in NGN Using Optimal Flows and Measurement Feed-back for Ubiquitous and Distributed Applications

An Efficient End-to-End QoS supporting Algorithm in NGN Using Optimal Flows and Measurement Feed-back for Ubiquitous and Distributed Applications An Efficient End-to-End QoS suorting Algorithm in NGN Using Otimal Flows and Measurement Feed-back for Ubiquitous and Distributed Alications Se Youn Ban, Seong Gon Choi 2, Jun Kyun Choi Information and

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

Fountain Codes Based on Zigzag Decodable Coding

Fountain Codes Based on Zigzag Decodable Coding Fountain Codes Based on Zigzag Decodable Coding Takayuki Nozaki Kanagawa University, JAPAN Email: nozaki@kanagawa-u.ac.jp Abstract Fountain codes based on non-binary low-density parity-check (LDPC) codes

More information

Patterned Wafer Segmentation

Patterned Wafer Segmentation atterned Wafer Segmentation ierrick Bourgeat ab, Fabrice Meriaudeau b, Kenneth W. Tobin a, atrick Gorria b a Oak Ridge National Laboratory,.O.Box 2008, Oak Ridge, TN 37831-6011, USA b Le2i Laboratory Univ.of

More information

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1 Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and

More information

EE678 Application Presentation Content Based Image Retrieval Using Wavelets

EE678 Application Presentation Content Based Image Retrieval Using Wavelets EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective

More information

SEARCH ENGINE MANAGEMENT

SEARCH ENGINE MANAGEMENT e-issn 2455 1392 Volume 2 Issue 5, May 2016. 254 259 Scientific Journal Imact Factor : 3.468 htt://www.ijcter.com SEARCH ENGINE MANAGEMENT Abhinav Sinha Kalinga Institute of Industrial Technology, Bhubaneswar,

More information

Objectives. Part 1: Implement Friction Compensation.

Objectives. Part 1: Implement Friction Compensation. ME 446 Laboratory # Inverse Dynamics Joint Control Reort is due at the beginning of your lab time the week of Aril 9 th. One reort er grou. Lab sessions will be held the weeks of March th, March 6 th,

More information

The Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks

The Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks The Scalability and Performance of Common Vector Solution to Generalized abel Continuity Constraint in Hybrid Otical/Pacet etwors Shujia Gong and Ban Jabbari {sgong, bjabbari}@gmuedu George Mason University

More information

Modeling Reliable Broadcast of Data Buffer over Wireless Networks

Modeling Reliable Broadcast of Data Buffer over Wireless Networks JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 3, 799-810 (016) Short Paer Modeling Reliable Broadcast of Data Buffer over Wireless Networs Deartment of Comuter Engineering Yeditee University Kayışdağı,

More information

Semi-Markov Process based Model for Performance Analysis of Wireless LANs

Semi-Markov Process based Model for Performance Analysis of Wireless LANs Semi-Markov Process based Model for Performance Analysis of Wireless LANs Murali Krishna Kadiyala, Diti Shikha, Ravi Pendse, and Neeraj Jaggi Deartment of Electrical Engineering and Comuter Science Wichita

More information

Randomized algorithms: Two examples and Yao s Minimax Principle

Randomized algorithms: Two examples and Yao s Minimax Principle Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum

More information

Construction of Irregular QC-LDPC Codes in Near-Earth Communications

Construction of Irregular QC-LDPC Codes in Near-Earth Communications Journal of Communications Vol. 9, No. 7, July 24 Construction of Irregular QC-LDPC Codes in Near-Earth Communications Hui Zhao, Xiaoxiao Bao, Liang Qin, Ruyan Wang, and Hong Zhang Chongqing University

More information

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION Yugoslav Journal of Oerations Research (00), umber, 5- A BICRITERIO STEIER TREE PROBLEM O GRAPH Mirko VUJO[EVI], Milan STAOJEVI] Laboratory for Oerational Research, Faculty of Organizational Sciences University

More information

12) United States Patent 10) Patent No.: US 6,321,328 B1

12) United States Patent 10) Patent No.: US 6,321,328 B1 USOO6321328B1 12) United States Patent 10) Patent No.: 9 9 Kar et al. (45) Date of Patent: Nov. 20, 2001 (54) PROCESSOR HAVING DATA FOR 5,961,615 10/1999 Zaid... 710/54 SPECULATIVE LOADS 6,006,317 * 12/1999

More information

Grouping of Patches in Progressive Radiosity

Grouping of Patches in Progressive Radiosity Grouing of Patches in Progressive Radiosity Arjan J.F. Kok * Abstract The radiosity method can be imroved by (adatively) grouing small neighboring atches into grous. Comutations normally done for searate

More information

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s

Sensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,

More information

Record Route IP Traceback: Combating DoS Attacks and the Variants

Record Route IP Traceback: Combating DoS Attacks and the Variants Record Route IP Traceback: Combating DoS Attacks and the Variants Abdullah Yasin Nur, Mehmet Engin Tozal University of Louisiana at Lafayette, Lafayette, LA, US ayasinnur@louisiana.edu, metozal@louisiana.edu

More information

Face Recognition Using Legendre Moments

Face Recognition Using Legendre Moments Face Recognition Using Legendre Moments Dr.S.Annadurai 1 A.Saradha Professor & Head of CSE & IT Research scholar in CSE Government College of Technology, Government College of Technology, Coimbatore, Tamilnadu,

More information

Distributed Estimation from Relative Measurements in Sensor Networks

Distributed Estimation from Relative Measurements in Sensor Networks Distributed Estimation from Relative Measurements in Sensor Networks #Prabir Barooah and João P. Hesanha Abstract We consider the roblem of estimating vectorvalued variables from noisy relative measurements.

More information

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical

More information

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model Ad Hoc Networks (4) 5 68 Contents lists available at SciVerse ScienceDirect Ad Hoc Networks journal homeage: www.elsevier.com/locate/adhoc Latency-minimizing data aggregation in wireless sensor networks

More information

A Model-Adaptable MOSFET Parameter Extraction System

A Model-Adaptable MOSFET Parameter Extraction System A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Distrib. Comut. 71 (2011) 288 301 Contents lists available at ScienceDirect J. Parallel Distrib. Comut. journal homeage: www.elsevier.com/locate/jdc Quality of security adatation in arallel

More information

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China

More information

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture

More information

An FPGA Implementation of ( )-Regular Low-Density. Parity-Check Code Decoder

An FPGA Implementation of ( )-Regular Low-Density. Parity-Check Code Decoder An FPGA Imlementation of ( )-Regular Low-Density Parity-Check Code Decoder Tong Zhang ECSE Det., RPI Troy, NY tzhang@ecse.ri.edu Keshab K. Parhi ECE Det., Univ. of Minnesota Minneaolis, MN arhi@ece.umn.edu

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

Protecting RAID Arrays Against Unexpectedly High Disk Failure Rates

Protecting RAID Arrays Against Unexpectedly High Disk Failure Rates Protecting RAID Arrays Against Unexectedly High Disk Failure Rates Jehan-François Pâris Comuter Science Det. University of Houston Houston, TX jfaris@uh.edu Thomas Schwarz, S. J. Deto. de ICC Universidad

More information

A Measurement Study of Internet Bottlenecks

A Measurement Study of Internet Bottlenecks A Measurement Study of Internet Bottlenecks Ningning Hu, Li (Erran) Li y, Zhuoqing Morley Mao z, Peter Steenkiste and Jia Wang x Carnegie Mellon University, Email: fhnn, rsg@cs.cmu.edu y Bell Laboratories,

More information

Directed File Transfer Scheduling

Directed File Transfer Scheduling Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was

More information

22. Swaping: Policies

22. Swaping: Policies 22. Swaing: Policies Oerating System: Three Easy Pieces 1 Beyond Physical Memory: Policies Memory ressure forces the OS to start aging out ages to make room for actively-used ages. Deciding which age to

More information

EDGE: A ROUTING ALGORITHM FOR MAXIMIZING THROUGHPUT AND MINIMIZING DELAY IN WIRELESS SENSOR NETWORKS

EDGE: A ROUTING ALGORITHM FOR MAXIMIZING THROUGHPUT AND MINIMIZING DELAY IN WIRELESS SENSOR NETWORKS EDGE: A ROUTING ALGORITHM FOR MAXIMIZING THROUGHPUT AND MINIMIZING DELAY IN WIRELESS SENSOR NETWORKS Shuang Li, Alvin Lim, Santosh Kulkarni and Cong Liu Auburn University, Comuter Science and Software

More information

A Comprehensive Minimum Energy Routing Scheme for Wireless Ad hoc Networks

A Comprehensive Minimum Energy Routing Scheme for Wireless Ad hoc Networks A Comrehensive Minimum Energy Routing Scheme for Wireless Ad hoc Networks Jinhua Zhu, Chunming Qiao and Xin Wang Deartment of Comuter Science and Engineering State University of New York at Buffalo, Buffalo,

More information

Privacy Preserving Moving KNN Queries

Privacy Preserving Moving KNN Queries Privacy Preserving Moving KNN Queries arxiv:4.76v [cs.db] 4 Ar Tanzima Hashem Lars Kulik Rui Zhang National ICT Australia, Deartment of Comuter Science and Software Engineering University of Melbourne,

More information

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY Andrew Lam 1, Steven J.E. Wilton 1, Phili Leong 2, Wayne Luk 3 1 Elec. and Com. Engineering 2 Comuter Science

More information

AN early generation of unstructured P2P systems is

AN early generation of unstructured P2P systems is 1078 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 16, NO. 11, NOVEMBER 2005 Dynamic Layer Management in Suereer Architectures Li Xiao, Member, IEEE, Zhenyun Zhuang, and Yunhao Liu, Member,

More information

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism Erlin Yao, Mingyu Chen, Rui Wang, Wenli Zhang, Guangming Tan Key Laboratory of Comuter System and Architecture Institute

More information

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal

More information

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links

More information

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal

An Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal International Journal of Information and Electronics Engineering, Vol. 1, No. 1, July 011 An Efficient VLSI Architecture for Adative Rank Order Filter for Image Noise Removal M. C Hanumantharaju, M. Ravishankar,

More information

IEEE High Performance Serial Bus

IEEE High Performance Serial Bus IEEE 1394-1995 High Performance Serial Bus Michael D. Johas Teener Editor, P1394 Working Grou Plumbing Architect, Ale Comuter, Inc. One Infinite Loo, MS 35-OEM Cuertino, CA 95014 teener@ale.com Background

More information

Improving Trust Estimates in Planning Domains with Rare Failure Events

Improving Trust Estimates in Planning Domains with Rare Failure Events Imroving Trust Estimates in Planning Domains with Rare Failure Events Colin M. Potts and Kurt D. Krebsbach Det. of Mathematics and Comuter Science Lawrence University Aleton, Wisconsin 54911 USA {colin.m.otts,

More information

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming

Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Source-to-Source Code Generation Based on Pattern Matching and Dynamic Programming Weimin Chen, Volker Turau TR-93-047 August, 1993 Abstract This aer introduces a new technique for source-to-source code

More information

CS649 Sensor Networks IP Track Lecture 6: Graphical Models

CS649 Sensor Networks IP Track Lecture 6: Graphical Models CS649 Sensor Networks IP Track Lecture 6: Grahical Models I-Jeng Wang htt://hinrg.cs.jhu.edu/wsn06/ Sring 2006 CS 649 1 Sring 2006 CS 649 2 Grahical Models Grahical Model: grahical reresentation of joint

More information

arxiv: v1 [cs.mm] 18 Jan 2016

arxiv: v1 [cs.mm] 18 Jan 2016 Lossless Intra Coding in with 3-ta Filters Saeed R. Alvar a, Fatih Kamisli a a Deartment of Electrical and Electronics Engineering, Middle East Technical University, Turkey arxiv:1601.04473v1 [cs.mm] 18

More information

Introduction to Parallel Algorithms

Introduction to Parallel Algorithms CS 1762 Fall, 2011 1 Introduction to Parallel Algorithms Introduction to Parallel Algorithms ECE 1762 Algorithms and Data Structures Fall Semester, 2011 1 Preliminaries Since the early 1990s, there has

More information

Chapter 7b - Point Estimation and Sampling Distributions

Chapter 7b - Point Estimation and Sampling Distributions Chater 7b - Point Estimation and Samling Distributions Chater 7 (b) Point Estimation and Samling Distributions Point estimation is a form of statistical inference. In oint estimation we use the data from

More information

Pirogue, a lighter dynamic version of the Raft distributed consensus algorithm

Pirogue, a lighter dynamic version of the Raft distributed consensus algorithm Pirogue a lighter dynamic version of the Raft distributed consensus algorithm Jehan-François Pâris Darrell D.. Long Deartment of Comuter Science Deartment of Comuter Science University of Houston University

More information

10. Parallel Methods for Data Sorting

10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting... 1 10.1. Parallelizing Princiles... 10.. Scaling Parallel Comutations... 10.3. Bubble Sort...3 10.3.1. Sequential Algorithm...3

More information

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information

SPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation

SPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation To aear in IEEE VLSI Test Symosium, 1997 SITFIRE: Scalable arallel Algorithms for Test Set artitioned Fault Simulation Dili Krishnaswamy y Elizabeth M. Rudnick y Janak H. atel y rithviraj Banerjee z y

More information

A Metaheuristic Scheduler for Time Division Multiplexed Network-on-Chip

A Metaheuristic Scheduler for Time Division Multiplexed Network-on-Chip Downloaded from orbit.dtu.dk on: Jan 25, 2019 A Metaheuristic Scheduler for Time Division Multilexed Network-on-Chi Sørensen, Rasmus Bo; Sarsø, Jens; Pedersen, Mark Ruvald; Højgaard, Jasur Publication

More information

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method ITB J. Eng. Sci. Vol. 39 B, No. 1, 007, 1-19 1 Leak Detection Modeling and Simulation for Oil Pieline with Artificial Intelligence Method Pudjo Sukarno 1, Kuntjoro Adji Sidarto, Amoranto Trisnobudi 3,

More information

Skip List Based Authenticated Data Structure in DAS Paradigm

Skip List Based Authenticated Data Structure in DAS Paradigm 009 Eighth International Conference on Grid and Cooerative Comuting Ski List Based Authenticated Data Structure in DAS Paradigm Jieing Wang,, Xiaoyong Du,. Key Laboratory of Data Engineering and Knowledge

More information

Stereo Disparity Estimation in Moment Space

Stereo Disparity Estimation in Moment Space Stereo Disarity Estimation in oment Sace Angeline Pang Faculty of Information Technology, ultimedia University, 63 Cyberjaya, alaysia. angeline.ang@mmu.edu.my R. ukundan Deartment of Comuter Science, University

More information

Efficient stereo vision for obstacle detection and AGV Navigation

Efficient stereo vision for obstacle detection and AGV Navigation Efficient stereo vision for obstacle detection and AGV Navigation Rita Cucchiara, Emanuele Perini, Giuliano Pistoni Diartimento di Ingegneria dell informazione, University of Modena and Reggio Emilia,

More information

Distributed Systems (5DV147)

Distributed Systems (5DV147) Distributed Systems (5DV147) Mutual Exclusion and Elections Fall 2013 1 Processes often need to coordinate their actions Which rocess gets to access a shared resource? Has the master crashed? Elect a new

More information

10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1

10 File System Mass Storage Structure Mass Storage Systems Mass Storage Structure Mass Storage Structure FILE SYSTEM 1 10 File System 1 We will examine this chater in three subtitles: Mass Storage Systems OERATING SYSTEMS FILE SYSTEM 1 File System Interface File System Imlementation 10.1.1 Mass Storage Structure 3 2 10.1

More information

A power efficient flit-admission scheme for wormhole-switched networks on chip

A power efficient flit-admission scheme for wormhole-switched networks on chip A ower efficient flit-admission scheme for wormhole-switched networks on chi Zhonghai Lu, Li Tong, Bei Yin and Axel Jantsch Laboratory of Electronics and Comuter Systems Royal Institute of Technology,

More information

Near-Optimal Routing Lookups with Bounded Worst Case Performance

Near-Optimal Routing Lookups with Bounded Worst Case Performance Near-Otimal Routing Lookus with Bounded Worst Case Performance Pankaj Guta Balaji Prabhakar Stehen Boyd Deartments of Electrical Engineering and Comuter Science Stanford University CA 9430 ankaj@stanfordedu

More information

Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication

Using Permuted States and Validated Simulation to Analyze Conflict Rates in Optimistic Replication Using Permuted States and Validated Simulation to Analyze Conflict Rates in Otimistic Relication An-I A. Wang Comuter Science Deartment Florida State University Geoff H. Kuenning Comuter Science Deartment

More information

Process and Measurement System Capability Analysis

Process and Measurement System Capability Analysis Process and Measurement System aability Analysis Process caability is the uniformity of the rocess. Variability is a measure of the uniformity of outut. Assume that a rocess involves a quality characteristic

More information

Visualization, Estimation and User-Modeling for Interactive Browsing of Image Libraries

Visualization, Estimation and User-Modeling for Interactive Browsing of Image Libraries Visualization, Estimation and User-Modeling for Interactive Browsing of Image Libraries Qi Tian, Baback Moghaddam 2 and Thomas S. Huang Beckman Institute, University of Illinois, Urbana-Chamaign, IL 680,

More information

LOW-DENSITY PARITY-CHECK (LDPC) codes [1] can

LOW-DENSITY PARITY-CHECK (LDPC) codes [1] can 208 IEEE TRANSACTIONS ON MAGNETICS, VOL 42, NO 2, FEBRUARY 2006 Structured LDPC Codes for High-Density Recording: Large Girth and Low Error Floor J Lu and J M F Moura Department of Electrical and Computer

More information

Single character type identification

Single character type identification Single character tye identification Yefeng Zheng*, Changsong Liu, Xiaoqing Ding Deartment of Electronic Engineering, Tsinghua University Beijing 100084, P.R. China ABSTRACT Different character recognition

More information

On Growth of Parallelism within Routers and Its Impact on Packet Reordering 1

On Growth of Parallelism within Routers and Its Impact on Packet Reordering 1 On Growth of Parallelism within Routers and Its Imact on Reordering 1 A. A. Bare 1, A. P. Jayasumana, and N. M. Piratla 2 Deartment of Electrical & Comuter Engineering, Colorado State University, Fort

More information

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks

Complexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Journal of Comuting and Information Technology - CIT 8, 2000, 1, 1 12 1 Comlexity Issues on Designing Tridiagonal Solvers on 2-Dimensional Mesh Interconnection Networks Eunice E. Santos Deartment of Electrical

More information

A Novel Iris Segmentation Method for Hand-Held Capture Device

A Novel Iris Segmentation Method for Hand-Held Capture Device A Novel Iris Segmentation Method for Hand-Held Cature Device XiaoFu He and PengFei Shi Institute of Image Processing and Pattern Recognition, Shanghai Jiao Tong University, Shanghai 200030, China {xfhe,

More information

Cooperative Diversity Combined with Beamforming

Cooperative Diversity Combined with Beamforming Cooerative Diversity Combined with Beamforming Hyunwoo Choi and Jae Hong Lee School of Electrical Engineering and INMC Seoul National University Seoul, Korea Email: {novo28, jhlee}@snu.ac.kr Abstract In

More information

Proposal for Robust and Adaptive Forward Error Correction for real-time Audio-Video streaming solutions

Proposal for Robust and Adaptive Forward Error Correction for real-time Audio-Video streaming solutions IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 3, Issue 2 (Sep-Oct. 2012), PP 32-36 Proposal for Robust and Adaptive Forward Error Correction

More information

Truth Trees. Truth Tree Fundamentals

Truth Trees. Truth Tree Fundamentals Truth Trees 1 True Tree Fundamentals 2 Testing Grous of Statements for Consistency 3 Testing Arguments in Proositional Logic 4 Proving Invalidity in Predicate Logic Answers to Selected Exercises Truth

More information

Optimizing Dynamic Memory Management!

Optimizing Dynamic Memory Management! Otimizing Dynamic Memory Management! 1 Goals of this Lecture! Hel you learn about:" Details of K&R hea mgr" Hea mgr otimizations related to Assignment #6" Faster free() via doubly-linked list, redundant

More information

Introduction to Image Compresion

Introduction to Image Compresion ENEE63 Fall 2 Lecture-7 Introduction to Image Comresion htt://www.ece.umd.edu/class/enee63/ minwu@eng.umd.edu M. Wu: ENEE63 Digital Image Processing (Fall') Min Wu Electrical & Comuter Engineering Univ.

More information

Measurement Based Routing Strategies on Overlay Architectures

Measurement Based Routing Strategies on Overlay Architectures Measurement Based Routing Strategies on Overlay Architectures Student: Tuna Güven Faculty: Bobby Bhattacharjee, Richard J. La, and Mark A. Shayman LTS Review February 15 th, 2005 Outline Measurement-Based

More information

Fountain Codes with XOR of Encoded Packets for Broadcasting and source independent backbone in Multi-hop Networks using Network Coding

Fountain Codes with XOR of Encoded Packets for Broadcasting and source independent backbone in Multi-hop Networks using Network Coding Fountain Codes with XOR of Encoded Packets for Broadcasting and source independent backbone in Multi-hop Networks using Network Coding Khaldoun Al Agha LRI, Paris XI University, Orsay, France Email: alagha@lri.fr

More information

An improved algorithm for Hausdorff Voronoi diagram for non-crossing sets

An improved algorithm for Hausdorff Voronoi diagram for non-crossing sets An imroved algorithm for Hausdorff Voronoi diagram for non-crossing sets Frank Dehne, Anil Maheshwari and Ryan Taylor May 26, 2006 Abstract We resent an imroved algorithm for building a Hausdorff Voronoi

More information

QSRED, An Algorithm To Solve The Mismatch Between The Microscopic and Macroscopic Behavior of RED Gateways

QSRED, An Algorithm To Solve The Mismatch Between The Microscopic and Macroscopic Behavior of RED Gateways IJCSNS International Journal of Comuter Science Network Security, VOL.10 No.11, November 2010 63 QSRED, An Algorim To Solve The Mismatch Between The Microscoic Macroscoic Behavior of RED Gateways Nabhan

More information

Phase Transitions in Interconnection Networks with Finite Buffers

Phase Transitions in Interconnection Networks with Finite Buffers Abstract Phase Transitions in Interconnection Networks with Finite Buffers Yelena Rykalova Boston University rykalova@bu.edu Lev Levitin Boston University levitin@bu.edu This aer resents theoretical models

More information

AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY

AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY Yandong Wang EagleView Technology Cor. 5 Methodist Hill Dr., Rochester, NY 1463, the United States yandong.wang@ictometry.com

More information

Interactive Image Segmentation

Interactive Image Segmentation Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).

More information

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University.

Relations with Relation Names as Arguments: Algebra and Calculus. Kenneth A. Ross. Columbia University. Relations with Relation Names as Arguments: Algebra and Calculus Kenneth A. Ross Columbia University kar@cs.columbia.edu Abstract We consider a version of the relational model in which relation names may

More information

CSC310 Information Theory. Lecture 21: Erasure (Deletion) Channels & Digital Fountain Codes. November 22, 2006 see

CSC310 Information Theory. Lecture 21: Erasure (Deletion) Channels & Digital Fountain Codes. November 22, 2006 see CSC310 Information Theory Lecture 21: Erasure (Deletion) Channels & Digital Fountain Codes Sam Roweis Recovering From Erasures 2 How can we recover from erasures? For the BEC, we saw that low-density parity

More information

Figure 8.1: Home age taken from the examle health education site (htt:// Setember 14, 2001). 201

Figure 8.1: Home age taken from the examle health education site (htt://  Setember 14, 2001). 201 200 Chater 8 Alying the Web Interface Profiles: Examle Web Site Assessment 8.1 Introduction This chater describes the use of the rofiles develoed in Chater 6 to assess and imrove the quality of an examle

More information

Brief Contributions. A Geometric Theorem for Network Design 1 INTRODUCTION

Brief Contributions. A Geometric Theorem for Network Design 1 INTRODUCTION IEEE TRANSACTIONS ON COMPUTERS, VOL. 53, NO., APRIL 00 83 Brief Contributions A Geometric Theorem for Network Design Massimo Franceschetti, Member, IEEE, Matthew Cook, and Jehoshua Bruck, Fellow, IEEE

More information

Efficient Parallel Hierarchical Clustering

Efficient Parallel Hierarchical Clustering Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore

More information