QoS and Sensible Routing Decisions

Size: px
Start display at page:

Download "QoS and Sensible Routing Decisions"

Transcription

1 QoS and Sensible Routing Decisions Erol Gelenbe Dept. of Electrical & Electronic Engineering Iperial College London SW7 2BT Abstract Network Quality of Service (QoS) criteria of interest include conventional etrics such as throughput, delay, loss, and itter, as well as new QoS criteria based on power utilization, reliability and security. In this paper we suggest a theoretical fraework for the characterization and coparison of adaptive routing algoriths which use QoS as the criterion to select between different paths that data transitted in the network (e.g. packets, connections, etc.) ay take. Our obective is not to analyze QoS, but rather to design randoized routing policies which can iprove QoS. We define a QoS etric as a non-negative rando variables associated with network paths which satisfy a sub-additivity condition along each path. We define the QoS of a path, under soe routing policy, as the expected value of a non-decreasing easurable function of the QoS etric. We discuss sensitive and insensitive QoS etrics, the latter being dependent on the routing policy which is used. We describe routing policies siply as probabilistic choices aong all possible paths fro soe source to soe given destination. Sensible routing policies are then introduced: they take decisions based siply on the QoS of each available path. Sensible policies, which ake decisions based on the QoS of the paths, are introduced. We prove that the routing probability of a sensible policy can always be uniquely obtained. A hierarchy of -sensible probabilistic routing policies is then introduced and we provide conditions under which an + sensible policy provides better QoS on the average than an sensible policy. Keywords: Matheatics of Networks, Quality of Service, Routing. Introduction Quality of Service (QoS) has now becoe a central issue in network design, and there is a vast and significant literature on the proble of estiating certain specific quality of service paraeters (e.g. loss or delay) for given traffic characteristics and a given network topology [3, 4]. Typically such work has considered single buffer odels (finite or infinite), or odels of cascaded nodes with or without interfering traffic. There has also been uch work on schees for obtaining better QoS through routing [6, 4, 5], on scheduling techniques in routers to achieve desired QoS obectives [3], as well as on the analysis of QoS resulting fro the detailed behavior of protocols such as TCP/IP. This work is supported by a grant fro EPSRC. P2/

2 The ixed wired and wireless network topologies that are becoing coon, including fixed and ad-hoc connections, create the need to rationally exploit dynaically variable routing as a function of network conditions, since the a pplications that use such networks have QoS requireents such as delay, loss or itter, as well as reliability and low power utilization. In recent years we have conducted research on routing algoriths with two quite different applications in ind: routing in robotic navigation, and routing algoriths in wired networks and wireless ad-hoc networks. The applied research we are currently conducting basically addresses adaptive routing algoriths in a discrete structure. In robotic navigation, the discrete structure is a discrete grid of points in a terrain (i.e. a terrain database ). In a counication network the discrete structure is obviously the set of nodes in a Mobile Ad-hoc Network or in a wired network, and routing decisions are based on optiizing QoS obectives. The QoS etrics used to route robots in a terrain are based on iniizing travel ties to destination, iniizing the probability of being destroyed by adversaries (which ay be fixed or obile), iniizing power utilization due to otion, and the obvious need to avoid obstacles. In an ad-hoc network, QoS requireents include the iniization of packet loss, the iniization of end-to-end delay, the iniization of overhead, the iniization of power consuption for routing purposes, or a cobination of soe of these criteria. Motivated by our prior work on adaptive network routing algoriths [7, 9, 2, 0, ], in this paper we investigate soe basic atheatical probles concerning QoS driven routing. The ai of this work is not to analyze QoS, but rather to show that certain randoized routine policies can iprove QoS. We define QoS etrics as non-negative rando variables associated with network paths which satisfy a sub-additivity condition along each path. We then describe routing policies siply as probabilistic choices aong all possible paths fro soe source to soe destination. Increental routing policies are defined as those which can be derived fro independent decisions along each sub-path. We define the QoS of a path, under soe routing policy, as the expected value of a easurable function of the QoS etric. We discuss sensitive and insensitive QoS etrics, the latter being dependent on the routing policy which is used. Sensible routing policies are then introduced; these policies take decisions based siply on the QoS of each allowable path. Finally, a hierarchy of -sensible probabilistic routing algoriths is introduced. The 0- sensible ruting policy is siply a rando choice of routes with equal probability, while the -sensible policy uses the relative QoS for each alternate route to ake select a path. An - sensible policy uses the th power of the QoS for each alternate path, rather than ust the st power. Thus it siply uses the sae inforation in a different anner. It is particularly interesting that we can prove that an + -sensible policy provides better resulting average QoS than an -sensible policy, provided that the QoS etric is insensitive. We also prove that under certain sufficient conditions, the sae result holds for senstive QoS etrics. P2/2

3 . Quality of Service (QoS) etrics A QoS etric relates to soe specific data unit, the ost obvious exaple being a packet. However ore broadly, a data unit ay be a significant sequence of packets which belong to the sae connection. A QoS etric q can be illustrated by the following exaples: q D ay be the delay D experienced by a packet as it traverses soe path in the network, or It ay be the binary variable q r = [the path is connected], or q LR = L/n ay be the nuber of packets lost L divided by the nuber of packets sent n (i.e. the packet loss rate) for a sequence of packets, or q ay be the average itter experienced by n successive packets: q J = n n l=2 (R l R l ) (S l S l ), () where S l is the date at which packet l was sent fro the source, and R l is the tie at which packet l arrives to its destination, etc., or q ay be the nuber of hops a packet has to traverse, or q ay be the power expended by the network nodes to service and forward a packet as it travels through a path in the network, or q ay be the effective delay obtained by coposing soe of these values, such as: q = ( q LR )q D + q LR (T o + q D ), = q D + q LR T o. where T o is the (large) tie-out delay which triggers a packet s retransission. Soe paths ay not be connected because physical links ay not exist. Also since we are dealing with potentially unreliable wired networks as well as ad-hoc networks, soe or all links in the path ay be connected only with soe probability. If a link along a path V is disconnected, we can still copute quality of service etrics, for instance we ay then have q D (V ) = +, q LR (V ) =, and q J (V ) = +..2 Routing policies Let the nodes in a network be denoted by a fine set of natural nubers {0,,2,... N}. Definition A path in the network starting at node i and ending at node v d is denoted by V i = (i,...,v d ). It is a sequence of nodes such that the first node is i, the last node is v d, and no node in the sequence V i appears ore than once. We associate QoS etrics with paths in the network. Let FV i (v d ) = {Vi,V i 2,...,V i } be the set of all distinct, but not necessarily disoint, paths fro node i to node v d in the network. P2/3

4 Definition A routing policy for source-destination pair (i,v d ) is a probability distribution π FV i(v d ) on the set FV i (v d ), that selects path V i FV i (v d ) with probability π FV i(v d ) (V i ) for each individual data unit which is sent fro node i to node v d. For any V i FV i (v d ), we ay write V i = (i,...,l,n,...,v d ) as a concatenation of a prefix path and a suffix path: V i = P p i.ss n where P p i = (i,...,l), Sn s = (n,...,v d ). Consider now the sets of paths fro i to l, FV i (l) and fro n to v d, FV n (v d ). Whenever needed, Π will denote the routing policy for the network as a whole, i.e. the set of rules that assign unique paths for each data unit oving fro any source node to any destination in the network. F V will denote the set of all paths fro all possible source to destination nodes in the network. 2 QoS etrics Definition A QoS etric for path V is a rando variable q Π (V ) which takes values in {0,+ }, such that for V = V.V 2 (i.e. V is coposed of path V followed by path V 2 ): q Π (V ) q Π (V ) + q Π (V 2 ), a.s. Note that the requireent that the QoS etric be sub-additive covers any strictly additive etrics of interest such as packet or cell loss rates, delay, path length (nuber of hops), and power dissipation. Other etrics such as path reliability and available bandwidth are subadditive, and are also covered by our definition. For a path V coposed of two successive sub-paths V = V.V 2, the following are obviously sub-additive: q available BW (V ) = inf(q available BW (V ),q available BW (V 2 )) a.s., q available BW (V ) + q available BW (V 2 ) a.s., q r (V ) = [q r (V ) and q r (V 2 )] a.s., q r (V ) + q r (V 2 ) a.s. where q r (.) is treated as a logical binary rando value in the third equation, and as a nuerical (binary) rando value in the last equation. 2. QoS etrics and QoS In the sequel q πf V i (v d ) (V i ) will denote the QoS etric q easured on path Vi, when the policy π FV i(v d ) is applied to data units travelling fro node i to v d using the set of paths FV i (v d ), V i FV i (v d ). We soeties write q with a subscript, e.g. q πf V i (v d ) D (V i ) or V qπf i (v d ) LR (V i ) to indicate that it designates soe specific etric such as packet delay or packet loss rate. Definition Let u be a non-decreasing easurable function and q be a QoS etric. The QoS for data units sent on the path V i using policy π FV i(v d ), fro source i to destination v d along the set of paths FV i (v d ) is siply the expected value E[u(q πf V i (v d ) (V i ))], i.e. the expected value of a easurable function of a QoS etric. The reason for assuing that u is an increasing function (i.e., non-decreasing) is that we want to the QoS to reflect the trend of the QoS etric. If the QoS etric has a larger value P2/4

5 reflecting soe degradation in the path, we want the QoS also to reflect this degradation, or at least not to reflect an iproveent. Let us illustrate this with an exaple: let the QoS etric q πf V i (v d ) D (V i )) be the path delay, and let u(.) = (.) be the indicator or characteristic function. The QoS E[(q πf V i (v d ) D (V i )) > T)] = Prob[qπF V i (v d ) is the probability that the path delay is larger than T. D (V i )) > T] 2.2 Sensitive QoS etrics The value for soe path of a routing sensitive, or siply sensitive QoS etric q increases when the probability of directing traffic into that path increases; exaples include path delay and path loss ratio. An exaple of an insensitive QoS etric is the nuber of hops along a path; the power dissipated per data unit on a path ay also be insensitive. Even when the probability of sending traffic down a given path is zero, we ay assue that the path can be infrequently tested to obtain the value of the QoS etric of that path, or the path QoS ay be known via prior inforation (e.g., available bandwidth, nuber of hops, or the path s power dissipation). Definition We will say that the QoS etric q is sensitive on the set FV i (v d ), if for any two routing policies π FV i(v d ) and π FV i(v d ) and any path V i FV i (v d ): { π FV i(v d ) (V i ) > π FV i(v d ) (V i ) } V Prob[qπF i (v d ) (V i ) > x] V Prob[qπ F i (v d ) (V i ) > x], for all x > 0. We say that q is insensitive on the set FV i (v d ) if for any path V i, and any two routing policies such that π FV i(v d ) (V i ) π FV i(v d ) (V i ): Prob[q πf V i (v d ) (V i ) > x] = V Prob[qπ F i (v d ) (V i )], for all x > 0. 3 Sensible Routing Policies A sensible routing policy is one which: Selects paths only using the expected value of the QoS, i.e. the expected value of a function u of the QoS etric q for each path, as the criterion for selecting the probability that a path is chosen, Selects the path for a new data unit independently of the decision taken for the previous data unit. The practical otivation for considering sensible routing policies is that () averages of QoS etrics, or of functions of QoS etrics, are typically easy to estiate, and (2) decisions which are successively independent for successive data units are easier to ipleent. P2/5

6 Definition Let u be a non-decreasing easurable function. A sensible routing policy (SRP) fro node i to destination v d based on the QoS etric q is a probability distribution π FV i(v d ) on the set FV i (v d ) such that: π FV i(v d ) (V i ) = f i (E[u(qπF V i (v d ) (V i ),u(q πf V i (v d ) (V 2 i ),...,u(q πf V i (v d ) (V FV i(v d ) ))]), (2) for a function f i : R [0,], for each V i V i FV i (v d ) FV i (v d ), such that: π FV i(v d ) (V i ) =, (3) and for each path V i, the function f i (y,...,y,...,y FVi (v d ) ) defined in (2) is strictly decreasing in its arguent y, with li y + f i (y,...,y FVi (v d ) ) = 0. Coent Thus a SRP is a routing policy which decides on routing based only on the QoS of each path, such that whenever the value of the QoS for any path increases then the probability of selecting that path decreases. Exaple A siple exaple of a SRP is the following: π FV i(v d ) (V i ) = E[q πf V i (v d ) D all s (V i )] E[q πf V i (v d ) D (V s i )], (4) which says that packets are directed to the paths with a probability which is inversely proportional to the average delay. In a sensible routing policy, the probability that a specific path is selected will depend on the QoS of that path, which in general depends on the policy itself, i.e. on the probability that the path is selected, unless the policy is insensitive. Thus there is the question of whether we are able to copute the routing probabilities. The following theore provides sufficient conditions for being able to do this. Theore If π FV i(v d ) is a sensible routing policy on FV i (v d ), then the solution to (2) exists and is unique for each path V i. Proof For any path V i, consider: the function f i (y,...,y,...,y FVi (v d ) ) of equation (2), which (strictly) decreases when y increases, and the path QoS y (π FV i(v d ) ) = E[u(q πf V i (v d ) (V i )]. Since { π FV i(v d ) (V i ) > π FV i(v d ) (V i ) } Prob[qπF V i (v d ) (V i ) > x] Prob[qπ F V i (v d ) (V i ) > x], (5) for all x > 0, the path QoS is an increasing function (not strictly) y (π) of its arguent, the probability π, because of (5), and because u is an increasing function. P2/6

7 Thus the solution of equation (2) for any V i is obtained at the intersection of a non-negative, strictly decreasing function f i of y which tends to zero, and an increasing non-negative function y of f i. 4 -Sensible routing policies (-SRP) In this section we extend the concept of a sensible policy to ore sophisticated usage of QoS to ake routing decisions. We construct a hierarchy of -sensible policies, where the -sensible policy is ust the sensitive policy defined earlier, and the 0-sensiblene policy is a rando uninfored choice between paths with equal probability. What is particularly interesting is that, ust by increasing the value of we are guaranteed to achieve better overall QoS, when the QoS etric is insensitive. The sae result can be obtained in the sensitive case as well under certain sufficient conditions. Definition For a natural nuber, an -sensible routing policy ( SRP) fro node i to destination v d based on the QoS etric q is a probability distribution π FV i(v d ) on the set FV i (v d ) such that: π FV i(v d ) (V i ) = E[(u(q π(f V i (v d ) (V all s i )) ] E[u(q πf V i (v d ) (Vi s)) ]. (6) We will use the notation π SRP[FV i(v d )] to denote the fact that the policy π on the set of paths FV i (v d ) is sensible, and the corresponding QoS value will be denoted by q π SRP[F V i (v d )] (Vi s ) for path Vi. Note that a 0 SRP is ust a rando choice aong paths, with equal probability. 4. The -sensible routing theore when the QoS etric is insensitive In this section we assue that q is insensitive on the set FV i (v d ), and consider -SRP routing policies as defined in (6). To siplify the notation, let us associate the index with the path V i and write: W () = E[u(q π SRP[F V i (v d )] (V i ))]. (7) When q is insensitive, we will siply write W. Using (6) and (7) we have: Q π SRP[V F i ] = We first prove the following siple result. = W W = W. (8) Lea For any W 0, W k 0, 2 (W 2 + W k ) + W W k P2/7

8 or W W k + W k W 2. Proof Since (W W k ) 2 0, we have (W 2 + W 2 k ) 2W W k, and therefore (W + W k ) 2 4W W k, or: 2 (W 2 + W k ) + W W k and therefore: which can be written as: copleting the proof. (W + W k )( W + W k ) ( W k W + W W k ) 4 We will call the following result the -SRP theore (-sensible routing theore) for insensitive etrics. Theore 2 If q is insensitive on the set FV i (v d ), the policy (+)-SRP is better than -SRP for, i.e.: Q π SRP[V F i ] Q π(+) SRP[V F i ]. Proof Fro Lea, we have that for any W 0, W k 0, W W k + W k W 2, and ultiplying both sides by /(W W k ) we obtain: W W + k + W + W k 2 W i W. Suing for,k =,...,n and adding identical ters on both sides, we have: = (W + )2,k=; k { W W + k + W + W k } = (W )2 +,k=; k 2 W W k, or ( = W )( = W + ) ( = W ) 2, This can be written as: P2/8

9 = W n = W = = W W +, or in the final for: = = W W W = = W W + W +, which copletes the proof. Q.E.D. It is obvious that for an insensitive QoS etric, selecting to be very large is good, since this will lead to choosing the path with the best QoS if such a path exists. We suarize this point in the following reark. However, if the QoS etric is sensitive then the atter is quite different, as will be discussed in the next section. Reark 3 Suppose that q is insensitive on the set FV i (v d ), and that path Vi following sense: is best in the W < W 2,... W n. Then li Q π SRP[V F i ] = W. Proof Using: Q π SRP[V F i ] = = W W = W which yields the result when we take.q.e.d., (9) = W + W ( W W ) + (W W ), (0) 4.2 The sensible routing theore for sensitive QoS etrics When the QoS etric is sensitive, the QoS varies with the load on the paths. This is of course the ost coon situation in practice, e.g. for QoS etrics such as delay, packet or cell loss, etc.. Thus we cannot generalize Theore 2 to the case where the QoS etric is sensitive. However we can provide necessary and sufficient conditions which will yield a siilar result. Let δ be defined as follows: δ = n = n (W ( + )) (W ()). () This leads to the sensible routing theore for sensitive QoS etrics. = Theore 4 If q is sensitive on the set FV i (v d ), the policy ( + )-SRP is better than -SRP for 0: P2/9

10 provided that the following condition holds: Q π SRP[V F i ] Q π(+) SRP[V F i ], [ = (W (+)) = (W ()) ] = (W (+)) + [ = (W (+)) = (W ()) ] = (W (+)). Proof Fro Theore, we know that for any W 0, =,... n, = W n = W = = W W +, and in particular this is true if we set W = W ( + ), so that = (W (+)) n = (W (+) = = (W (+)), (W (+)) + or: [ = (W (+)) ][ = (W (+)) + ] [ = (W (+)) ][ = (W (+)) ]. Using the definition of δ we have: [ i= (W()) + δ ][ = (W (+)) + ] [ = (W ()) + δ ][ = (W (+)) ], so that: [ = (W ()) ][ = (W (+)) + ] = (W ()) ][ = (W (+)) ] δ [ = (W (+)) ] δ [ = (W (+)) + ]. Condition (??) is therefore sufficient since it iplies that: δ [ = (W (+)) ] δ [ = (W (+)) + ] 0, which copletes the proof. Q.E.D. 5 Conclusions In this paper we suggest a theory of routing based on QoS. We have distinguished between QoS etrics, and QoS. Variable and adaptive routing have again becoe of interest in networking because of the increasing iportance of obile ad-hoc networks. In this paper we have developed a fraework for the study of adaptive routing algoriths which use the expected QoS to select paths to their destination. Our obective is not to analyze QoS, but rather to design randoized routing policies which can iprove QoS. P2/0

11 We define QoS etrics as non-negative rando variables associated with network paths that satisfy a sub-additivity condition along each path. We define the QoS of a path as the expected value of a non-decreasing easurable function of the QoS etric. We discuss sensitive and insensitive QoS etrics, the latter being dependent on the routing policy which is used. An exaple of an insensitive QoS etric is the nuber of hops on a path, since it will not change with the fact that this particular path is selected by the route selection. We describe routing policies as probabilistic choices aong all possible paths fro soe source to soe given destination. Sensible routing policies are then introduced: they take decisions based siply on the QoS of each possible path. Sensible policies, which ake decisions based on the QoS of the paths, are introduced. We prove that the routing probability of a sensible policy can always be uniquely deterined. A hierarchy of -sensible probabilistic routing policies is then introduced. A 0 sensible policy is siply a rando choice of routes with equal probability, while a sensible policy selects a path with a probability which is inversely proportional to the (expected) QoS of the path. We prove that an + sensible policy provides better QoS on the average than an sensible policy, if the QoS etric is insensitive. We also show that under certain conditions, the sae result also holds for sensitive QoS etrics. In future work we will consider yopic policies which only exaine partial inforation based on the QoS of initial portions of the possible paths in order to ake decisions. We will also consider Increental routing policies which can be derived fro independent decisions taken at certain points (or nodes) along paths. Finally, we plan to exploit the sub-additivity of the QoS etrics to prove asyptotic properties for very large networks. References [] D. Bertsekas and R, Gallagher Data Networks, Prentice Hall, Englewood Cliffs, NJ [2] H. Ahadi, R. Guerin and M. Nagshineh Equivalent capacity and its application to bandwidth allocation in high speed networks, IEEE J. on Sel. Areas in Co., Vol. 9, , 99. [3] E. Gelenbe, X. Mang and Y. Feng Diffusion cell loss estiates for ATM with ulticlass bursty traffic, Coputer Systes Science and Engineering, Special Issue: ATM Networks, Vol., No. 6, pp , Noveber 996. [4] V. Srinivasan, A. Ghanwani, E. Gelenbe Block cell loss reduction in ATM systes, Coputer Counications, Vol. 9, pp , 996. [5] D. Minoli and E. Minoli, Delivering Voice over IP Network, John Wiley & Sons, New York, 998. [6] S. Chen and K. Nahrstedt, An overview of Quality-of-Service routing for the next generation high-speed networks: Probles and Solutions, Network Magazine, Nov/Dec [7] E. Gelenbe, E. Seref, Z. Xu Towards networks with intelligent packets, Proc. IEEE-ICTAI Conference on Tools for Artificial Intelligence, Chicago, Noveber 9-, 999. [8] E. Gelenbe, Zhi-Hong Mao and Y. Da-Li (999) Function approxiation with spiked rando networks IEEE Trans. on Neural Networks, Vol. 0, No., pp. 3 9, 999. P2/

12 [9] E. Gelenbe, R. Lent, Z. Xu Towards networks with cognitive packets, Keynote Paper, Proc. IEEE MASCOTS Conference, ISBN X, pp. 3-2, San Francisco, CA, Aug. 29-Sep., [0] E. Gelenbe, R. Lent and Z. Xu Measureent and perforance of Cognitive Packet Networks, J. Cop. Networks, Vol. 37, 69 70, 200. [] E. Gelenbe and R. Lent Mobile Ad-Hoc Cognitive Packet Networks, Proc. IEEE ASWN, Paris, July 2-4, [2] E. Gelenbe, R. Lent, A. Montuori and Z. Xu Cognitive packet petworks: QoS and perforance, Keynote Paper, to appear in Proc. IEEE MASCOTS Conference, San Antonio, TX, Oct. 4-6, [3] F. Hao, E.W. Zegura and M.H. Aar QoS routing for anycast counications: otivation and an architecture for Diffserv networks, IEEE Co. Magazine, Vol. 46, No. 2, 48 56, June [4] Ying-Dar Lin, Nai-Bin Hsu and Ren-Hung Hwang QoS routing granularity in MPLS networks, IEEE Co. Magazine, Vol. 46, No. 2, 58 65, June [5] S. Nelakuditi and Zhi-Li Zhang A localized adaptive proportioning approach to QoS routing granularity, IEEE Co. Magazine, Vol. 46, No. 2, 66 7, June [6] M. Kodiala and T.V. Lakshan Restorable quality of service routing, IEEE Co. Magazine, Vol. 46, No. 2, 72 8, June [7] A. Chaintreau, F. Baccelli, Ch. Diot Ipact of TCP-like congestion control on the throughput of ulticast groups, IEEE/ACM Trans. on Networking, Vol. 0, No. 4, Aug [8] E. Gelenbe, J.M. Fourneau G-Networks with resets, Perforance Evaluation Vol. 49, 79 9, [9] T. Bonald, A. Proutière Insensitivity in processor-sharing networks, Perforance Evaluation Vol. 49, , P2/2

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.5, Septeber 205 AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM Xie Yang and Cheng Wushan College of Mechanical Engineering,

More information

DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION

DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION www.arpnjournals.co DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION N. Snehalatha 1 and Paul Rodrigues 2 1 School of Coputing, SRM University, Chennai, Tail Nadu, India 2 Departent

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University

More information

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

MAC schemes - Fixed-assignment schemes

MAC schemes - Fixed-assignment schemes MAC schees - Fixed-assignent schees M. Veeraraghavan, April 6, 04 Mediu Access Control (MAC) schees are echaniss for sharing a single link. MAC schees are essentially ultiplexing schees. For exaple, on

More information

Geometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem.

Geometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem. Noveber 13, 2016 Geoetry. The Method of the enter of Mass (ass points): Solving probles using the Law of Lever (ass points). Menelaus theore. Pappus theore. M d Theore (Law of Lever). Masses (weights)

More information

Guillotine subdivisions approximate polygonal subdivisions: Part III { Faster polynomial-time approximation schemes for

Guillotine subdivisions approximate polygonal subdivisions: Part III { Faster polynomial-time approximation schemes for Guillotine subdivisions approxiate polygonal subdivisions: Part III { Faster polynoial-tie approxiation schees for geoetric network optiization Joseph S. B. Mitchell y April 19, 1997; Last revision: May

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl. Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable

More information

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13 Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical

More information

Survivability Function A Measure of Disaster-Based Routing Performance

Survivability Function A Measure of Disaster-Based Routing Performance Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected

More information

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant

More information

COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS

COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS International Journal of Coputer Science and Counication Vol. 3, No. 1, January-June 2012, pp. 181-185 COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS A.H. Karode 1, S.R. Suralkar 2, Manoj Bagde

More information

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract

More information

The Hopcount to an Anycast Group

The Hopcount to an Anycast Group The Hopcount to an Anycast Group Piet Van Mieghe Delft University of Technology Abstract The probability density function of the nuber of hops to the ost nearby eber of the anycast group consisting of

More information

A Hybrid Network Architecture for File Transfers

A Hybrid Network Architecture for File Transfers JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,

More information

Performance Analysis of Exposed Terminal Effect in IEEE Ad Hoc Networks in Finite Load Conditions

Performance Analysis of Exposed Terminal Effect in IEEE Ad Hoc Networks in Finite Load Conditions Perforance Analysis of Exposed Terinal Effect in IEEE 80.11 Ad Hoc Networks in Finite Load Conditions Diitris Vassis 1, Georgios Korentzas 1 1 Dept. of Inforation and Counication Systes Engineering University

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

Integrating fast mobility in the OLSR routing protocol

Integrating fast mobility in the OLSR routing protocol Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr

More information

Implementation of fast motion estimation algorithms and comparison with full search method in H.264

Implementation of fast motion estimation algorithms and comparison with full search method in H.264 IJCSNS International Journal of Coputer Science and Network Security, VOL.8 No.3, March 2008 139 Ipleentation of fast otion estiation algoriths and coparison with full search ethod in H.264 A.Ahadi, M.M.Azadfar

More information

Gromov-Hausdorff Distance Between Metric Graphs

Gromov-Hausdorff Distance Between Metric Graphs Groov-Hausdorff Distance Between Metric Graphs Jiwon Choi St Mark s School January, 019 Abstract In this paper we study the Groov-Hausdorff distance between two etric graphs We copute the precise value

More information

Equation Based Congestion Control for Video Transmission over WCDMA Networks

Equation Based Congestion Control for Video Transmission over WCDMA Networks Equation Based Congestion Control for Video Transission over WCDMA Networks Antonios Alexiou, Diitrios Antonellis and Christos Bouras Research Acadeic Coputer Technology Institute, Greece and Coputer Engineering

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

IN many interactive multimedia streaming applications, such

IN many interactive multimedia streaming applications, such 840 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 5, MAY 06 A Geoetric Approach to Server Selection for Interactive Video Streaing Yaochen Hu, Student Meber, IEEE, DiNiu, Meber, IEEE, and Zongpeng Li, Senior

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

Leveraging Relevance Cues for Improved Spoken Document Retrieval

Leveraging Relevance Cues for Improved Spoken Document Retrieval Leveraging Relevance Cues for Iproved Spoken Docuent Retrieval Pei-Ning Chen 1, Kuan-Yu Chen 2 and Berlin Chen 1 National Taiwan Noral University, Taiwan 1 Institute of Inforation Science, Acadeia Sinica,

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

Medical Biophysics 302E/335G/ st1-07 page 1

Medical Biophysics 302E/335G/ st1-07 page 1 Medical Biophysics 302E/335G/500 20070109 st1-07 page 1 STEREOLOGICAL METHODS - CONCEPTS Upon copletion of this lesson, the student should be able to: -define the ter stereology -distinguish between quantitative

More information

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS AWNI ITRADAT Assistant Professor, Departent of Coputer Engineering, Faculty of Engineering, Hasheite University, P.O. Box 15459,

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University

More information

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute

More information

Improve Peer Cooperation using Social Networks

Improve Peer Cooperation using Social Networks Iprove Peer Cooperation using Social Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Noveber 5, 2007 Corresponding

More information

Impact of Network Delay Variations on Multicast Sessions with TCP-like Congestion Control

Impact of Network Delay Variations on Multicast Sessions with TCP-like Congestion Control Ipact of Network Delay Variations on Multicast Sessions with TCP-like Congestion Control Augustin Chaintreau y François Baccelli z Christophe Diot yy y Ecole Norale Supérieure 45 rue d Ul 75005 Paris FRANCE

More information

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction Relocation of ateway for Enhanced Tieliness in Wireless Sensor Networks Keal Akkaya and Mohaed Younis Departent of oputer Science and Electrical Engineering University of Maryland, altiore ounty altiore,

More information

The Internal Conflict of a Belief Function

The Internal Conflict of a Belief Function The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of

More information

On Performance Bottleneck of Anonymous Communication Networks

On Performance Bottleneck of Anonymous Communication Networks On Perforance Bottleneck of Anonyous Counication Networks Ryan Pries, Wei Yu, Steve Graha, and Xinwen Fu Abstract Although a significant aount of effort has been directed at discovering attacks against

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

PROBABILISTIC LOCALIZATION AND MAPPING OF MOBILE ROBOTS IN INDOOR ENVIRONMENTS WITH A SINGLE LASER RANGE FINDER

PROBABILISTIC LOCALIZATION AND MAPPING OF MOBILE ROBOTS IN INDOOR ENVIRONMENTS WITH A SINGLE LASER RANGE FINDER nd International Congress of Mechanical Engineering (COBEM 3) Noveber 3-7, 3, Ribeirão Preto, SP, Brazil Copyright 3 by ABCM PROBABILISTIC LOCALIZATION AND MAPPING OF MOBILE ROBOTS IN INDOOR ENVIRONMENTS

More information

A Generic Architecture for Programmable Trac. Shaper for High Speed Networks. Krishnan K. Kailas y Ashok K. Agrawala z. fkrish,

A Generic Architecture for Programmable Trac. Shaper for High Speed Networks. Krishnan K. Kailas y Ashok K. Agrawala z. fkrish, A Generic Architecture for Prograable Trac Shaper for High Speed Networks Krishnan K. Kailas y Ashok K. Agrawala z fkrish, agrawalag@cs.ud.edu y Departent of Electrical Engineering z Departent of Coputer

More information

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade

More information

Multi Packet Reception and Network Coding

Multi Packet Reception and Network Coding The 2010 Military Counications Conference - Unclassified Progra - etworking Protocols and Perforance Track Multi Packet Reception and etwork Coding Aran Rezaee Research Laboratory of Electronics Massachusetts

More information

Image Filter Using with Gaussian Curvature and Total Variation Model

Image Filter Using with Gaussian Curvature and Total Variation Model IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.

More information

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We

More information

Dynamical Topology Analysis of VANET Based on Complex Networks Theory

Dynamical Topology Analysis of VANET Based on Complex Networks Theory BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 14, Special Issue Sofia 014 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.478/cait-014-0053 Dynaical Topology Analysis

More information

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles

More information

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH V. Atienza; J.M. Valiente and G. Andreu Departaento de Ingeniería de Sisteas, Coputadores y Autoática Universidad Politécnica de Valencia.

More information

6.1 Topological relations between two simple geometric objects

6.1 Topological relations between two simple geometric objects Chapter 5 proposed a spatial odel to represent the spatial extent of objects in urban areas. The purpose of the odel, as was clarified in Chapter 3, is ultifunctional, i.e. it has to be capable of supplying

More information

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Navodaya Garepalli Kartik Gopalan Ping Yang Coputer Science, Binghaton University (State University of New York) Contact:

More information

Collaborative Web Caching Based on Proxy Affinities

Collaborative Web Caching Based on Proxy Affinities Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA

More information

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem Theoretical Analysis of Local Search and Siple Evolutionary Algoriths for the Generalized Travelling Salesperson Proble Mojgan Pourhassan ojgan.pourhassan@adelaide.edu.au Optiisation and Logistics, The

More information

CS 361 Meeting 8 9/24/18

CS 361 Meeting 8 9/24/18 CS 36 Meeting 8 9/4/8 Announceents. Hoework 3 due Friday. Review. The closure properties of regular languages provide a way to describe regular languages by building the out of sipler regular languages

More information

Distributed Multicast Tree Construction in Wireless Sensor Networks

Distributed Multicast Tree Construction in Wireless Sensor Networks Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,

More information

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage 216 IEEE 23rd International Conference on High Perforance Coputing A Low-Cost Multi-Failure Resilient Replication Schee for High Data Availability in Cloud Storage Jinwei Liu* and Haiying Shen *Departent

More information

Deterministic Voting in Distributed Systems Using Error-Correcting Codes

Deterministic Voting in Distributed Systems Using Error-Correcting Codes IEEE TRASACTIOS O PARALLEL AD DISTRIBUTED SYSTEMS, VOL. 9, O. 8, AUGUST 1998 813 Deterinistic Voting in Distributed Systes Using Error-Correcting Codes Lihao Xu and Jehoshua Bruck, Senior Meber, IEEE Abstract

More information

A Network-based Seamless Handover Scheme for Multi-homed Devices

A Network-based Seamless Handover Scheme for Multi-homed Devices A Network-based Sealess Handover Schee for Multi-hoed Devices Md. Shohrab Hossain and Mohaed Atiquzzaan School of Coputer Science, University of Oklahoa, Noran, OK 7319 Eail: {shohrab, atiq}@ou.edu Abstract

More information

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

From Relative to Observable Proportional Differentiation in OBS Networks

From Relative to Observable Proportional Differentiation in OBS Networks Fro Relative to Observable Proportional Differentiation in OBS Networks Pablo Argibay-Losada Departaento de Enxeñería Teleática Capus Universitario s/n, E-363 Vigo, SPAIN pargibay@det.uvigo.es Andrés Suárez-González

More information

Feature Based Registration for Panoramic Image Generation

Feature Based Registration for Panoramic Image Generation IJCSI International Journal of Coputer Science Issues, Vol. 10, Issue 6, No, Noveber 013 www.ijcsi.org 13 Feature Based Registration for Panoraic Iage Generation Kawther Abbas Sallal 1, Abdul-Mone Saleh

More information

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive and Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

λ-harmonious Graph Colouring Lauren DeDieu

λ-harmonious Graph Colouring Lauren DeDieu λ-haronious Graph Colouring Lauren DeDieu June 12, 2012 ABSTRACT In 198, Hopcroft and Krishnaoorthy defined a new type of graph colouring called haronious colouring. Haronious colouring is a proper vertex

More information

Multipath Selection and Channel Assignment in Wireless Mesh Networks

Multipath Selection and Channel Assignment in Wireless Mesh Networks Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,

More information

Real-Time Detection of Invisible Spreaders

Real-Time Detection of Invisible Spreaders Real-Tie Detection of Invisible Spreaders MyungKeun Yoon Shigang Chen Departent of Coputer & Inforation Science & Engineering University of Florida, Gainesville, FL 3, USA {yoon, sgchen}@cise.ufl.edu Abstract

More information

Redundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network

Redundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network (IJACSA) International Journal of Advanced Coputer Science and Applications Vol. 8, No. 1, 217 Redundancy Level Ipact of the Mean Tie to Failure on Wireless Sensor Network Alaa E. S. Ahed 1 College of

More information

Feature Selection to Relate Words and Images

Feature Selection to Relate Words and Images The Open Inforation Systes Journal, 2009, 3, 9-13 9 Feature Selection to Relate Words and Iages Wei-Chao Lin 1 and Chih-Fong Tsai*,2 Open Access 1 Departent of Coputing, Engineering and Technology, University

More information

OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS

OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS ADRIAN DEACONU Transilvania University of Brasov, Roania Abstract A linear tie

More information

Adaptive Holistic Scheduling for In-Network Sensor Query Processing

Adaptive Holistic Scheduling for In-Network Sensor Query Processing Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,

More information

Efficient file search in non-dht P2P networks

Efficient file search in non-dht P2P networks Available online at www.sciencedirect.co Coputer Counications 3 (28) 34 37 www.elsevier.co/locate/coco Efficient file search in non-dht P2P networks Shiping Chen a, Zhan Zhang b, *, Shigang Chen b, Baile

More information

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada

More information

Effects of Interleaving on RTP Header Compression

Effects of Interleaving on RTP Header Compression Effects of Interleaving on RTP Header Copression Colin Perkins Jon Crowcroft Departent of Coputer Science University College London Gower Street London WCE 6BT Abstract We discuss the use of interleaving

More information

A Measurement-Based Model for Parallel Real-Time Tasks

A Measurement-Based Model for Parallel Real-Time Tasks A Measureent-Based Model for Parallel Real-Tie Tasks Kunal Agrawal 1 Washington University in St. Louis St. Louis, MO, USA kunal@wustl.edu https://orcid.org/0000-0001-5882-6647 Sanjoy Baruah 2 Washington

More information

Closing The Performance Gap between Causal Consistency and Eventual Consistency

Closing The Performance Gap between Causal Consistency and Eventual Consistency Closing The Perforance Gap between Causal Consistency and Eventual Consistency Jiaqing Du Călin Iorgulescu Aitabha Roy Willy Zwaenepoel EPFL ABSTRACT It is well known that causal consistency is ore expensive

More information

A simplified approach to merging partial plane images

A simplified approach to merging partial plane images A siplified approach to erging partial plane iages Mária Kruláková 1 This paper introduces a ethod of iage recognition based on the gradual generating and analysis of data structure consisting of the 2D

More information

A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER

A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER VIOLETA TOMAŠEVIĆ, SLOBODAN BOJANIĆ 2 and OCTAVIO NIETO-TALADRIZ 2 The Mihajlo Pupin Institute, Volgina 5, 000 Belgrade, SERBIA AND MONTENEGRO 2 Technical University

More information

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3 2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI

More information

A Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem

A Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem IE Vol. 7, No. 2, pp. 84-92, Septeber 2008. A Coparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Proble Ji Ung Sun School of Industrial and Managent Engineering Hankuk University

More information

Resource Optimization for Web Service Composition

Resource Optimization for Web Service Composition Resource Optiization for Web Coposition Xia Gao, Ravi Jain, Zulfikar Razan, Ulas Kozat Abstract coposition recently eerged as a costeffective way to quickly create new services within a network. Soe research

More information

COMPARISON OF ANT COLONY OPTIMIZATION & PARTICLE SWARM OPTIMIZATION IN GRID ENVIRONMENT

COMPARISON OF ANT COLONY OPTIMIZATION & PARTICLE SWARM OPTIMIZATION IN GRID ENVIRONMENT COMPARISON OF ANT COLONY OPTIMIZATION & PARTICLE SWARM OPTIMIZATION IN GRID ENVIRONMENT B.BOOBA 1 Dr. T.V.GOPAL 2 1 Research Scholar, Assist. Professor(Sl.Gr),Departent of Coputer Applications, Easwari

More information

Homework 1. An Introduction to Neural Networks

Homework 1. An Introduction to Neural Networks Hoework An Introduction to Neural Networks -785: Introduction to Deep Learning Spring 09 OUT: January 4, 09 DUE: February 6, 09, :59 PM Start Here Collaboration policy: You are expected to coply with the

More information

Cassia County School District #151. Expected Performance Assessment Students will: Instructional Strategies. Performance Standards

Cassia County School District #151. Expected Performance Assessment Students will: Instructional Strategies. Performance Standards Unit 1 Congruence, Proof, and Constructions Doain: Congruence (CO) Essential Question: How do properties of congruence help define and prove geoetric relationships? Matheatical Practices: 1. Make sense

More information

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones Advance Access publication on 24 February 2017 The British Coputer Society 2017. All rights reserved. For Perissions, please eail: journals.perissions@oup.co doi:10.1093/cojnl/bxx015 Fair Energy-Efficient

More information

Privacy-preserving String-Matching With PRAM Algorithms

Privacy-preserving String-Matching With PRAM Algorithms Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,

More information

Trees. Linear vs. Branching CSE 143. Branching Structures in CS. What s in a Node? A Tree. [Chapter 10]

Trees. Linear vs. Branching CSE 143. Branching Structures in CS. What s in a Node? A Tree. [Chapter 10] CSE 143 Trees [Chapter 10] Linear vs. Branching Our data structures so far are linear Have a beginning and an end Everything falls in order between the ends Arrays, lined lists, queues, stacs, priority

More information

Identifying Converging Pairs of Nodes on a Budget

Identifying Converging Pairs of Nodes on a Budget Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering

More information