Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal

Size: px
Start display at page:

Download "Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal"

Transcription

1 Abstract Authorization of a QoS Path based on Generic Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taa Advanced Internet Research Group, Department of Computer Science, University of Amsterdam. For data intensive Grid appications, such as shown at igrid2002, users may require short-ived guaranteed high bandwidth connections. These types of connections, providing a certain Quaity of Service QoS wi need to be authorized and provisioned, often through mutipe administrative domains. We present a case study of a Bandwidth on Demand service that provides a QoS path based on Generic Authorization, Authentication, Accounting, that represents a first step forward towards a muti domain soution. Keywords: QoS, Bandwidth on Demand; muti domain; Authentication Authorization Accounting 1. Introduction In this paper we discuss a middeware soution for the authorization of a Quaity of Service QoS path with a focus on high bandwidth. QoS represents vaue and, when used in an on demand fashion, needs poicy contro to aow cost effective usage. QoS path creation was first introduced with the Resource ReSerVation Protoco RSVP [1]. During the QoS path creation routers exchange RSVP requests and have the possibiity to pu a poicy decision from a poicy server using Common Open Poicy Service COPS [2]. In our approach a network of servers communicate Bandwidth on Demand BoD requests and use the agent sequence as defined in the Generic framework [3]. An advantage of the agent sequence is that the underying equipment does not have to carry as much inteigence as equipment using the sequence. Network equipment such as ayer 3 routers, ayer 2 switches or ayer 1 crossconnects are capabe of providing a QoS path with different eves of granuarity. Because of the agent sequence our focus is on a switchedike architecture as the more appropriate soution to authorize a QoS path. 2. Generic architecture An server may be invoved in handing one or more of three basic functions. The first function is Authorization of resource usage. Secondy, it verifies identities Authentication. Finay, the server may og key attributes of its functions so they can ater be used for Accounting purposes. The architecture of a Generic server is expained in [4]. We consider the authorization of a QoS path through mutipe administrative domains. As each administrative domain impements the authorization of its resources to an server, more than one server needs to communicate by means of requests in order to authorize a QoS path. A number of definitions exists for terms with respect to poicies, see for exampe [5] and [6]. In this paper we wi introduce the term Driving Poicy. In our appied mode, an server fetches a Driving Poicy when it receives an request. For each type of request there exists a corresponding Driving Poicy that instructs the server how to dea with the request, e.g. a Driving Poicy has to check the pre-conditions of the actions to be performed and how to dea with the post-conditions of these actions. We distinguish between specific actions and generic actions. Specific actions are performed by a so-caed Appication Specific Modue ASM, whereas generic actions are deegated to the generic part of an server. The provisioning of a path within a singe domain is typicay performed by an ASM. Providing the date is an exampe of a generic action. The modue that is responsibe to execute a Driving Poicy is the Rue Based Engine RBE and is contained in the Generic part of an server. Fig. 1 shows the different components of an server. The behavior of the generic part of an server is determined by the combination of Driving Poicies, ASM s and requests. This impies that behavior can be easiy adapted.

2 request / repy contro of the simpest eement. According to the used terminoogy, each QoS eement is a QoS component. Generic Driving Poicy ASM Fig. 1 The different components of an server. 3. Authorization / Contro modes In the context of Generic we consider a QoS path to be buid out of two eementary QoS eements: network nodes vertices and network inks edges, where the reevant parameters of a network node or network ink are under the contro of an server. This means that these parameters are governed by a set of poicies residing in the Poicy Repositories of the servers in contro. In genera a QoS path may span mutipe administrative domains. The foowing terminoogy is introduced to faciitate the mode discussion. We introduce the term QoS segment as the part of a QoS path that is under contro of a singe administrative domain. Each QoS eement is authorized by an server. Those eements of a QoS path beonging to a singe server are caed a QoS component. The server controing QoS eements shoud aso maintain the state of the assigned part of the QoS path condition. In this way, the whoe QoS path can be seen as a guaranteed end-to-end connection. Taking the simpest unidirectiona QoS path between two nodes, three different contros / authorization modes can be distinguished: Individua Contro, Partia contro, and Fu contro. 3.1 Individua Contro mode Each eement, network node or network ink, is managed individuay by an server. The servers execute their own and independent set of poicies. This mode offers individua Fig. 2 Individua Contro mode 3.2 Partia Contro mode. A singe set of poicies contros the usage of both a network node and its outgoing network ink fig. 3 or the set of poicies contros a network node and its incoming network ink fig. 4. This requires specific poicies to describe the negotiations with the neighboring eement. Both figures exist of two components. Fig. 3 Partia Contro mode with an outbound connection. Fig. 4 Partia Contro mode with an inbound connection.

3 3.3 Fu Contro mode. A singe server contros a three network eements of the simpe QoS path, i.e. the QoS component is a segment. Fig. 5 The Fu Contro mode. 4. Authorized path discovery. To show how an authorized QoS path through mutipe domains can be estabished, we make the foowing assumption. servers, especiay proxy servers have an underying mechanism that advertises the connections they can estabish. Athough not fuy researched yet by our group, we expect to be abe to re-use mechanisms such as BGP [7] or proposed extensions to this protoco that is referred to as Optica BGP to advertise reachabiity of networks within administrative domains. A purposey buid BGP ASM wi enabe an server to obtain a view on topoogy and discover which servers shoud be contacted aong the QoS path. Each server wi act as an agent or broker for its sub-domains. As the start for the setup of an authorized QoS path between two nodes, ΠD 0 and N n ΠD n, one of the contro modes shown in fig. 2-5 can be seected. If D 0 and D n are different administrative domains, the start situation wi be the simpest QoS path according to the Individua Contro mode or according to the Partia Contro mode. If D 0 and D n turn out to be the same administrative domain, a simpest QoS path according to the Fu Contro mode may aso be an appropriate choice. In genera mutipe domains are in pay, i.e. the network ink of the start situation wi be a ogica network ink instead of a physica network ink. Authorization of a QoS path between ΠD 0 and N n ΠD n is estabished through the foowing number of steps. Without oss of generaity we take the Fu Contro mode as the starting situation, with D 0 = D n and ogica network ink ~, see figure 6. and N n are authorized by 0, but for the ogica network ink ~ a physica soution must be found. ~ N n D 0 0,1 D 1 D 0 ~ N 2 2,n N n ,2 Fig. 6 The setup of a QoS path starting from the Fu Contro mode. 0

4 Therefore, 0 wi contact the server that advertises a connection between, N n. In fig. 6 it is 1,2 that advertised the required connection. Server 1,2 acts as a proxy server for two other servers: 1 and 2. 0 and 1,2 exchange requests to authorize the network inks 0,1 and 2,n. Fig. 6 shows that for the authorization of 0,1 1,2 resorts to 1 and for the authorization of 2,n 1,2 resorts to 2. This whoe process is started by a Driving Poicy residing at 0. According to the situation depicted in fig. 6 this process of authorization wi continue via 1, as this server sti contros a ogica network ink. As soon as a ogica network inks of the QoS path are authorized, this process of authorization has come to an end. The provisioning of the compete QoS path might be estabished by different approaches. One approach is to wait for provisioning unti the whoe QoS path is authorized. It is aso possibe to choose for an approach of successivey provisioning. More research is necessary to describe the roe of poicies in both of these approaches. 5. server authorization interactions For any QoS path a particuar server wi be the root of a decision network tree needed to authorize usage of the QoS eements invoved. A server interactions are poicy driven. Poicies may ask for a set of credentias or tokens to be present in the request that represents somebody ese s authorization or deegation of authority. For exampe these credentias or tokens may have been issued by an advance reservation system as a proof of a reservation. Poicies may invove parties in the decision that may or may not be hidden from the requesting party. For instance a budget- or payment authorization may be requested. Such checks may additionay invove parties unknown to the requestor. Next to the content of an request, that may need to carry a token or credentia that represents an authorization, aso the integrity, peer authenticity and sometimes confidentiaity of a request must be ensured. Here we rey on existing security mechanisms such as provided thru the GSS-API [RFC 2743] that offers support for these aspects. More specificay, tookits such as Gobus s Grid Security Infrastructure does aso rey on the GSS-API. Some eve of interoperabiity is offered when the GSS-API is depoyed with Pubic Key certificates issued by a GRID Certification Authority. The VOMS project [8], within the EU DataGRID and DataTAG project researches the definition of roes within Grid environments. Thru coaboration with the VOMS project we pan to integrate the concept of roes. A user roe may define that a particuar user is authorized to aocate bandwidth. 6. Case study For the case study presented we wi focus on scientific Grid users, who have a need for an ondemand high bandwidth QoS path. These users fa into a specific category of users that sets them far apart from reguar Internet users. Cassifying users for our purpose is a 3 dimensiona probem: The number of users can both be considered against the amount of bandwidth needed and the amount of destinations in need to be reached. In our case we are targeting a possibe soution for users that 802.1Q VLAN Swicth 1GB Optica 802.1Q VLAN Swicth Host A Host B Host C Host D Fig. 7 igrid 2002 demo setup

5 are both in need of very high amounts of bandwidth and are very imited towards the need to reach destinations. When considering the bandwidth usage ony, these users may fa into the category C as mentioned in the artice The rationae of Optica Networking [9]. Aso considering the fact that appications in this space may use appication specific adapted protocos to reach optima performance, this demonstration shows the authorization of a QoS path using ayer-2 switches. With data transfer programs such as GridFTP in mind, the shown configuration aows the creation of a by-pass channe that can be used as the data-channe in parae with the reguar Internet connection which in this case can be used as the contro channe. The actua technoogy choice for this mode was motivated by avaiabiity of ayer-2 switch technoogy donated by Enterasys Networks. The concept used however may be appied to any ayer 1, 2 or 3 technoogy that is capabe of creating QoS path.abstractions. The usage of the agent mode effectivey separates the contro pane and data forwarding pane. As most of the inteigence exists in the contro pane, depoyement of ess inteigent ayer 1 or 2 equipment in the data forwarding pane seems a more suitabe soution. In our test bed we have two 802.1Q VLAN switches interconnected by an optica fiber. Each switch connects two hosts, see fig. 7. The network ink is impemented as a Gigabit Ethernet connection. One of the hosts wi send an request for a BoD service via the reguar Internet to the server. The server wi fetch the BoD Driving Poicy that describes the pan of actions in order to achieve the authorization and provisioning of the connection. After success a QoS path is provisioned as a private network between the requesting hosts and the targeted host. More impementation detais are discussed the foowing section messages Both the top eve data objects to be carried in an protoco message and the various types of protoco messages have not formay been defined yet. Data objects and message types must be defined in an abstract way without regard to encoding. The message types defined coud be thought of as the Use Cases in the Unified Modeing Language sense for a generic server. The data objects specify what kinds of information can be routed among the servers in the Generic infrastructure. We have chosen to express the different types of messages in XML. The protoco consists of request-repy pairs. XML schemas define these request-repy pairs. An XML schema provides a means for defining the structure, content and the semantics of an XML document. In order to keep the discussion simpe an service request for bandwidth might ook ike: <Request type="bod" > <AuthorizationData> <Credentia> <Type>simpe</Type> <ID>JanJansen</ID> <Secret>#f034d</Secret> </Credentia> </AuthorizationData> <BodData> <Source> </Source> <Destination> </Destination> <Bandwidth>1000</Bandwidth> <StartTime>now</StartTime> <Duration>20</Duration> </BodData> </Request> The server returns a simpe answer to the invoker whether the authorization has succeeded or not. This answer is added as a text node to the XML repy shown beow: <Repy type="bod" > <Answer> <Message></Message> </Answer> </Repy> 6.2 Driving poicies In our poicy anguage a Driving Poicy is of the form IF Condition THEN ActionList ELSE ActionList '. The Driving Poicies can be expressed as nested if-then-ese structures, i.e. an if-then-ese structure might be part of a Condition as we as part of an Action List. As this is not the proper pace to fuy expain the poicy anguage we wi restrict ourseves to the exampe beow in order to convey its expressiveness. A Driving Poicy for an server that accepts the above request for bandwidth might ook ike:

6 IF ASM::Authorizer.authorize Request::AuthorizationData.Credentia. Type, Request::AuthorizationData.Credentia. ID, Request::AuthorizationData.Credentia. Secret THEN IF ASM::RM.CheckConnection Request::BodData.Source, Request::BodData.Destination THEN ActionList1 ELSE Repy::Answer.Message = "Request faied: Bad source or destination" ELSE Repy::Answer.Message = Request faied: Authorization not successfu. This Driving Poicy cas for authorization by an ASM caed Authorizer that contains a pubic method authorize. Three arguments have to be passed. The RBE can deduce that a arguments can be retrieved from the incoming request. If this ca returns a fase vaue the action in the ELSE-part instructs the RBE to add a fai text node to the XML repy. After success the ActionList of the THEN-part is executed. This ActionList contains a singe action, an if-thenese structure. A Resource Manager RM ASM is caed to check if a route between both end points of the QoS path can be estabished. In this fashion a number of pre-conditions are checked before the fina ca for bandwidth is made: RV = ASM::RM.BoD Request::SwitchData.Source, Request::SwitchData.Destination, Request::SwitchData.Bandwidth, Request::SwitchData.StartTime, Request::SwitchData.Duration By assigning the return vaue to the variabe RV, the return vaue is avaiabe in subsequent actions of the Driving Poicy. 6.3 ASM structure In our Bandwidth on Demand demonstration, we impemented a Resource manager ASM needed to deiver the BoD service. A Resource Manager RM ASM is responsibe for tracking the state and the discovery of the resources. The RM ASM aso guarantees QoS by avoiding oversubscribtion of the GigE network ink. For 802.1Q, the RM ASM administers the used VLAN tags to form the QoS path between the hosts. The RM ASM has aso awareness of the destinations based on the primary IP address of the end station and it is abe to discover the switch port the secondary interface is connected to. As such, the server does contro a simpe QoS path within a singe domain. 7. Concusions and future work The demonstrated case represents a first step into the usage of Generic for authorization within a singe domain. In this exampe a QoS path is authorized using a set of Driving Poicies executed by a RBE invoving ASM s. Generic mechanisms shoud aow the support of many combinations of different types of appications. Generic utimatey must support for exampe the combined authorization of a pay per view movie incuding QoS path based deivery across the network and a pizza to go aong with it. If one of these items cannot be deivered, the entire transaction shoud not be authorized to proceed. Athough such vision may not be reaized anywhere soon, it does set the direction for future work. The next steps wi be to put research into creating muti-domain scenario s invoving the pictured individua and partia contro modes to form more comprehensive networks. The path discovery functions that indicate which servers shoud be contacted does pay an integra roe. Further research wi aso be put into buiding compex decision networks where items such as scaabiity, stabiity and performance wi be investigated. Acknowedgements Enterasys Networks donated the equipment for this research. Leon Gommans and Bas van

7 Oudenaarde are funded by the IST Program of the European Union grant IST via the DataTAG project. Additiona funding was provided by the Dutch Nationa Research network SURFnet. The authors whish to thank the IRTF ARCHitecture Research Group for the fruitfu discussions, in particuar John Vobrecht and Dave Spence for their neverending coaboration. The authors woud ike to thank Joe Mambretti and Jeremy Weinberger for their support and contributions during igrid References [1] RFC2205 Resource ReSerVation Protoco RSVP Version 1 Functiona Specification, R. Braden et. a.,sept [2] RFC2748 The COPS Common Open Poicy Service Protoco, D. Durham et. a, Jan [3] RFC2904 Authorization framework, J. Vobrecht et. a. Aug [4] RFC2903 Generic Architecture, C. de Laat et. a. Aug [5] RFC3060 Poicy Core Information Mode -- Version 1 Specification, B. Moore et.a. Feb [6] A Poicy Description Language, J. Lobo et. a. Juy 1999 in proceedings of the American Association for Artificia Inteigence [7] RFC 1771 A Border Gateway Protoco 4 BGP-4, Y. Rekhter et. a. March [8] see references at project page at [9] The rationae of Optica Networking, Cees de Laat, Erik Radius, Steven Waace, IGRID2002 paper submitted to Future Generations Computer Systems, November 2002.

Hour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model

Hour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model Hour 3: The Network Access Layer Page 1 of 10 Hour 3: The Network Access Layer At the base of the TCP/IP protoco stack is the Network Access ayer, the coection of services and specifications that provide

More information

Introduction to USB Development

Introduction to USB Development Introduction to USB Deveopment Introduction Technica Overview USB in Embedded Systems Recent Deveopments Extensions to USB USB as compared to other technoogies USB: Universa Seria Bus A seria bus standard

More information

OAuth 2.0 Token Binding https://tools.ietf.org/html/draft-ietf-oauth-token-binding-04

OAuth 2.0 Token Binding https://tools.ietf.org/html/draft-ietf-oauth-token-binding-04 OAuth 2.0 Token Binding https://toos.ietf.org/htm/draft-ietf-oauth-token-binding-04 Brian Campbe Michae B. Jones John Bradey IETF 99 Prague Juy 2017 from IETF 93 1 The Setting of the Context Provide an

More information

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002*

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002* RDF Objects 1 Aex Barne Information Infrastructure Laboratory HP Laboratories Bristo HPL-2002-315 November 27 th, 2002* E-mai: Andy_Seaborne@hp.hp.com RDF, semantic web, ontoogy, object-oriented datastructures

More information

3GPP TS V7.1.0 ( )

3GPP TS V7.1.0 ( ) TS 29.199-7 V7.1.0 (2006-12) Technica Specification 3rd Generation Partnership Project; Technica Specification Group Core Network and Terminas; Open Service Access (OSA); Paray X Web Services; Part 7:

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

Infinity Connect Web App Customization Guide

Infinity Connect Web App Customization Guide Infinity Connect Web App Customization Guide Contents Introduction 1 Hosting the customized Web App 2 Customizing the appication 3 More information 8 Introduction The Infinity Connect Web App is incuded

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Attention The materias beow are

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Internet Contro Message Protoco (ICMP), RFC 792

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah Journa of Lightwave Technoogy Page of CFP: Cooperative Fast Protection Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapocai and Hussein T. Mouftah Abstract We introduce a nove protection scheme, caed Cooperative

More information

Link Registry Protocol Options

Link Registry Protocol Options Link Registry Protoco Options Norman Finn, March 2017 HUAWEI TECHNOLOGIES CO., LTD. IEEE 802.1 TSN At east two obvious choices for P802.1CS Link Registration Protoco An IS-IS-ike protoco. TCP (Transmission

More information

Four Circuit 4 Wire Unit With Dante Network Audio Interface

Four Circuit 4 Wire Unit With Dante Network Audio Interface Network Audio 4 Wire Interface Four Circuit 4 Wire Unit With Dante Network Audio Interface GS-FW012 ip 4 Wire With Dante Interface Highights Four x 4 Wire Circuits Loca Cue Input Dante Network Audio Three

More information

ngenius Instrumentation Overview

ngenius Instrumentation Overview ngenius Instrumentation Overview NetScout Systems, Inc. 4 Technoogy Park Drive Westford, MA 01886 Teephone: 978-614-4000 Fax: 978-614-4004 Web: http://www.netscout.com NetScout is a registered trademark

More information

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed

More information

BGP-Based SPF IETF 96, Berlin. Keyur Patel, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopal, Cisco

BGP-Based SPF IETF 96, Berlin. Keyur Patel, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopal, Cisco BGP-Based SPF IETF 96, Berin Keyur Pate, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopa, Cisco 1 Data Center Routing Routing Probem Space Routing scaing for Massivey Scaabe

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

Development of a National Portal for Tuvalu. Business Case. SPREP Pacific iclim

Development of a National Portal for Tuvalu. Business Case. SPREP Pacific iclim Deveopment of a Nationa Porta for Tuvau Business Case SPREP Pacific iclim Apri 2018 Tabe of Contents 1. Introduction... 3 1.1 Report Purpose... 3 1.2 Background & Context... 3 1.3 Other IKM Activities

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Multi-MANO interworking for the management of multi-domains networks and network slicing Functionality & Demos

Multi-MANO interworking for the management of multi-domains networks and network slicing Functionality & Demos Muti-MANO interworking for the management of muti-domains networks and network sicing Functionaity & Demos Acknowedgement & Open Source Soutions NECOS project: NFVi Sicing http://aurabaea.com/necos/ SONATA

More information

UnixWare 7 System Administration UnixWare 7 System Configuration

UnixWare 7 System Administration UnixWare 7 System Configuration UnixWare 7 System Administration - CH 3 - UnixWare 7 System Configuration Page 1 of 8 [Figures are not incuded in this sampe chapter] UnixWare 7 System Administration - 3 - UnixWare 7 System Configuration

More information

Special Edition Using Microsoft Office Sharing Documents Within a Workgroup

Special Edition Using Microsoft Office Sharing Documents Within a Workgroup Specia Edition Using Microsoft Office 2000 - Chapter 7 - Sharing Documents Within a.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Office 2000-7 - Sharing

More information

NCH Software Express Delegate

NCH Software Express Delegate NCH Software Express Deegate This user guide has been created for use with Express Deegate Version 4.xx NCH Software Technica Support If you have difficuties using Express Deegate pease read the appicabe

More information

Computing devices have become increasingly mobile at the client end, and the

Computing devices have become increasingly mobile at the client end, and the Pronto: Mobie Gateway With Pubish- Subscribe Paradigm Over Wireess Network Eiko Yoneki University of Cambridge Pronto, a messaging middeware system for mobie appications, provides both centraized and decentraized

More information

Avaya one-x Mobile Pre-Installation Checklist

Avaya one-x Mobile Pre-Installation Checklist Avaya one-x Mobie 18-602133 Issue 1 November 2007 Avaya one-x Mobie November 2007 1 00A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document was compete

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

An Introduction to Design Patterns

An Introduction to Design Patterns An Introduction to Design Patterns 1 Definitions A pattern is a recurring soution to a standard probem, in a context. Christopher Aexander, a professor of architecture Why woud what a prof of architecture

More information

Realization of GGF DAIS Data Service Interface for Grid Access to Data Streams

Realization of GGF DAIS Data Service Interface for Grid Access to Data Streams Reaization of GGF DAIS Data Interface for Grid Access to Data Streams Ying Liu, Beth Pae, Nithya Vijayakumar Indiana University Boomington, IN IU-CS TR 613 ABSTRACT As the computation power of hardware

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

BEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0

BEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Server Reease Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Tuxedo Connector Reease 1.0 Document Date: June 29, 2001 Copyright Copyright 2001 BEA Systems, Inc. A Rights Reserved. Restricted

More information

Automatic Hidden Web Database Classification

Automatic Hidden Web Database Classification Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,

More information

Navigating and searching theweb

Navigating and searching theweb Navigating and searching theweb Contents Introduction 3 1 The Word Wide Web 3 2 Navigating the web 4 3 Hyperinks 5 4 Searching the web 7 5 Improving your searches 8 6 Activities 9 6.1 Navigating the web

More information

From i* to istar 2.0: An Evolving Social Modelling Language

From i* to istar 2.0: An Evolving Social Modelling Language From i* to istar 2.0: An Evoving Socia Modeing Language Lin Liu 1 Schoo of Software, Tsinghua University, Beijing, 100084, China iniu@tsinghua.edu.cn Abstract. Conceptua Modeing, as a thought too, heps

More information

Archive Software with value add services:

Archive Software with value add services: E-Mai Archive Software with vaue add services: Protect your emais from data oss through reasonabe and secure backup features. Increase the productivity of your team by using the integrated search engine

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Scheduing Announcement Homework 2 due on October 25th Project 1 due on October 26th 2 CSE 120 Scheduing and Deadock Scheduing Overview In discussing

More information

Building the Web of Things

Building the Web of Things Buiding the Web of Things Interoperabiity for Connected Devices Dave Raggett W3C Track 14 Apri 2016 Many Potentia IoT Appication Areas each evoving rich capabiities Smart Homes Wearabes Heathcare Power

More information

.County of San Mateo

.County of San Mateo -- - -- -- - -- - - --- a - -- w---- a- -- : m- I - -- -- -- --., I -- I.a, e mzzcm.county of San Mateo InterneUIntranet Web Page Design Guideines. September 30,1997 fabe of Corntents Purpose... Approach....

More information

Commentary Unit With Talkback And Dante Network Audio Interface

Commentary Unit With Talkback And Dante Network Audio Interface Network Audio Commentary Interface ensound Commentary Unit With Takback And Dante Network Audio Interface VITA Network Audio Commentary Interface Highights For Commentary Or Takback Two Assignabe 4 Wire

More information

ECEn 528 Prof. Archibald Lab: Dynamic Scheduling Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018

ECEn 528 Prof. Archibald Lab: Dynamic Scheduling Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018 ECEn 528 Prof. Archibad Lab: Dynamic Scheduing Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018 Overview This ab's purpose is to expore issues invoved in the design of out-of-order issue processors.

More information

No connection establishment Do not perform Flow control Error control Retransmission Suitable for small request/response scenario E.g.

No connection establishment Do not perform Flow control Error control Retransmission Suitable for small request/response scenario E.g. UDP & TCP 2018/3/26 UDP Header Characteristics of UDP No connection estabishment Do not perform Fow contro Error contro Retransmission Suitabe for sma request/response scenario E.g., DNS Remote Procedure

More information

The Big Picture WELCOME TO ESIGNAL

The Big Picture WELCOME TO ESIGNAL 2 The Big Picture HERE S SOME GOOD NEWS. You don t have to be a rocket scientist to harness the power of esigna. That s exciting because we re certain that most of you view your PC and esigna as toos for

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program? Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of

More information

Meeting Exchange 4.1 Service Pack 2 Release Notes for the S6200/S6800 Servers

Meeting Exchange 4.1 Service Pack 2 Release Notes for the S6200/S6800 Servers Meeting Exchange 4.1 Service Pack 2 Reease Notes for the S6200/S6800 Servers The Meeting Exchange S6200/S6800 Media Servers are SIP-based voice and web conferencing soutions that extend Avaya s conferencing

More information

Avaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 5.2.1

Avaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 5.2.1 Avaya Extension to Ceuar User Guide Avaya Aura TM Communication Manager Reease 5.2.1 November 2009 2009 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

International Laboratory Accreditation Cooperation. The ILAC Mutual Recognition Arrangement

International Laboratory Accreditation Cooperation. The ILAC Mutual Recognition Arrangement Internationa Laboratory Accreditation Cooperation The ILAC Mutua Recognition Arrangement Enhancing the acceptance of products and services across nationa borders Removing barriers to goba trade Accreditation

More information

AgreeYa Solutions. Site Administrator for SharePoint User Guide

AgreeYa Solutions. Site Administrator for SharePoint User Guide AgreeYa Soutions Site Administrator for SharePoint 5.2.4 User Guide 2017 2017 AgreeYa Soutions Inc. A rights reserved. This product is protected by U.S. and internationa copyright and inteectua property

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

TSR: Topology Reduction from Tree to Star Data Grids

TSR: Topology Reduction from Tree to Star Data Grids 03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen

More information

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs Repication of Virtua Network Functions: Optimizing Link Utiization and Resource Costs Francisco Carpio, Wogang Bziuk and Admea Jukan Technische Universität Braunschweig, Germany Emai:{f.carpio, w.bziuk,

More information

Symmetra. Product Overview. Redundancy. Scalability. Serviceability. Manageability. Components. How to Configure. Specifications.

Symmetra. Product Overview. Redundancy. Scalability. Serviceability. Manageability. Components. How to Configure. Specifications. Introducing Symmetra, the Word's First Power Array, and the foundation for Buiding Near-Continuous Avaiabiity Power Systems Power Array Symmetra What is a "Power Array?" Product Overview Legacy UPS vs

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER!

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER! [1,2] have, in theory, revoutionized cryptography. Unfortunatey, athough offer many advantages over conventiona and authentication), such cock synchronization in this appication due to the arge operand

More information

Avaya Interaction Center Client SDK Programmer Guide

Avaya Interaction Center Client SDK Programmer Guide Avaya Interaction Center Cient SDK Programmer Guide Reease 7.2 May 2013 Issue 1.1 2013 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document

More information

MCSE Training Guide: Windows Architecture and Memory

MCSE Training Guide: Windows Architecture and Memory MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

Sample of a training manual for a software tool

Sample of a training manual for a software tool Sampe of a training manua for a software too We use FogBugz for tracking bugs discovered in RAPPID. I wrote this manua as a training too for instructing the programmers and engineers in the use of FogBugz.

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

Space-Time Trade-offs.

Space-Time Trade-offs. Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe

More information

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations Formuation of Loss minimization Probem Using Genetic Agorithm and Line-Fow-based Equations Sharanya Jaganathan, Student Member, IEEE, Arun Sekar, Senior Member, IEEE, and Wenzhong Gao, Senior member, IEEE

More information

Modelling and Performance Evaluation of Router Transparent Web cache Mode

Modelling and Performance Evaluation of Router Transparent Web cache Mode Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7,1316-1320 Modeing and Performance Evauation of Transparent cache Mode Emad Hassan A-Hemiary Network Engineering Department, Coege of Information Engineering,

More information

International Journal of Electronics and Communications (AEÜ)

International Journal of Electronics and Communications (AEÜ) Int. J. Eectron. Commun. (AEÜ) 67 (2013) 470 478 Contents ists avaiabe at SciVerse ScienceDirect Internationa Journa of Eectronics and Communications (AEÜ) journa h o me pa ge: www.esevier.com/ocate/aeue

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

Designing for Schedulability Integrating Schedulability Analysis with Object-Oriented Design

Designing for Schedulability Integrating Schedulability Analysis with Object-Oriented Design Designing for Scheduabiity ntegrating Scheduabiity Anaysis with Object-Oriented Design Manas Sasena Department of Computer Science University of Pittsburgh Pittsburgh, PA 15260, USA manas@cs.pitt.edu Panagiota

More information

Outerjoins, Constraints, Triggers

Outerjoins, Constraints, Triggers Outerjoins, Constraints, Triggers Lecture #13 Autumn, 2001 Fa, 2001, LRX #13 Outerjoins, Constraints, Triggers HUST,Wuhan,China 358 Outerjoin R S = R S with danging tupes padded with nus and incuded in

More information

Windows NT, Terminal Server and Citrix MetaFrame Terminal Server Architecture

Windows NT, Terminal Server and Citrix MetaFrame Terminal Server Architecture Windows NT, Termina Server and Citrix MetaFrame - CH 3 - Termina Server Architect.. Page 1 of 13 [Figures are not incuded in this sampe chapter] Windows NT, Termina Server and Citrix MetaFrame - 3 - Termina

More information

A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS

A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS Etienne Cornu 1, Aain Dufaux 2, and David Hermann 1 1 AMI Semiconductor Canada, 611 Kumpf Drive,

More information

A Petrel Plugin for Surface Modeling

A Petrel Plugin for Surface Modeling A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica

More information

Functions. 6.1 Modular Programming. 6.2 Defining and Calling Functions. Gaddis: 6.1-5,7-10,13,15-16 and 7.7

Functions. 6.1 Modular Programming. 6.2 Defining and Calling Functions. Gaddis: 6.1-5,7-10,13,15-16 and 7.7 Functions Unit 6 Gaddis: 6.1-5,7-10,13,15-16 and 7.7 CS 1428 Spring 2018 Ji Seaman 6.1 Moduar Programming Moduar programming: breaking a program up into smaer, manageabe components (modues) Function: a

More information

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks Ad Hoc Networks (3) 683 698 Contents ists avaiabe at SciVerse ScienceDirect Ad Hoc Networks journa homepage: www.esevier.com/ocate/adhoc Dynamic agent-based hierarchica muticast for wireess mesh networks

More information

Operating Avaya Aura Conferencing

Operating Avaya Aura Conferencing Operating Avaya Aura Conferencing Reease 6.0 June 2011 04-603510 Issue 1 2010 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document was compete

More information

More Relation Model: Functional Dependencies

More Relation Model: Functional Dependencies More Reation Mode: Functiona Dependencies Lecture #7 Autumn, 2001 Fa, 2001, LRX #07 More Reation Mode: Functiona Dependencies HUST,Wuhan,China 152 Functiona Dependencies X -> A = assertion about a reation

More information

CylanceOPTICS. Frequently Asked Questions

CylanceOPTICS. Frequently Asked Questions CyanceOPTICS Frequenty Asked Questions Question What is CyanceOPTICS? CyanceOPTICS is an AI driven endpoint detection and response component providing consistent visibiity, root cause anaysis, scaabe threat

More information

Quality Driven Web Services Composition

Quality Driven Web Services Composition Quaity Driven Web Services Composition Liangzhao Zeng University of New South Waes Sydney, Austraia zzhao@cseunsweduau Jayant Kaagnanam IBM TJ Watson Research Center New York, USA ayant@usibmcom Bouaem

More information

Chapter 3: Introduction to the Flash Workspace

Chapter 3: Introduction to the Flash Workspace Chapter 3: Introduction to the Fash Workspace Page 1 of 10 Chapter 3: Introduction to the Fash Workspace In This Chapter Features and Functionaity of the Timeine Features and Functionaity of the Stage

More information

Readme ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT

Readme ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT Reease 11.1.2.4.000 Readme CONTENTS IN BRIEF Purpose... 2 New Features in This Reease... 2 Instaation Information... 2 Supported Patforms... 2 Supported

More information

BGP ingress-to-egress route configuration in a capacityconstrained Asia-Pacific Conference On Communications, 2005, v. 2005, p.

BGP ingress-to-egress route configuration in a capacityconstrained Asia-Pacific Conference On Communications, 2005, v. 2005, p. Tite BGP -to- route configuration in a capacityconstrained AS Author(s) Chim, TW; Yeung, KL; Lu KS Citation 2005 Asia-Pacific Conference On Communications, 2005, v. 2005, p. 386-390 Issued Date 2005 URL

More information

understood as processors that match AST patterns of the source language and translate them into patterns in the target language.

understood as processors that match AST patterns of the source language and translate them into patterns in the target language. A Basic Compier At a fundamenta eve compiers can be understood as processors that match AST patterns of the source anguage and transate them into patterns in the target anguage. Here we wi ook at a basic

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

End To End Software Developer Training

End To End Software Developer Training Page 1 of 13 Software Deveoper Boot Camp www. End To End Software Deveoper Training C# Training ASP.NET Training Software Deveoper Boot Camp.NET FRAMEWORK Training ADO.NET Training About The Software Deveoper

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

Microsoft Visual Studio 2005 Professional Tools. Advanced development tools designed for professional developers

Microsoft Visual Studio 2005 Professional Tools. Advanced development tools designed for professional developers Microsoft Visua Studio 2005 Professiona Toos Advanced deveopment toos designed for professiona deveopers If you re a professiona deveoper, Microsoft has two new ways to fue your deveopment efforts: Microsoft

More information

Chapter 5: Transactions in Federated Databases

Chapter 5: Transactions in Federated Databases Federated Databases Chapter 5: in Federated Databases Saes R&D Human Resources Kemens Böhm Distributed Data Management: in Federated Databases 1 Kemens Böhm Distributed Data Management: in Federated Databases

More information

HTTP Random Access and Live Resources IETF 100

HTTP Random Access and Live Resources IETF 100 HTTP Random Access and Live Resources IETF 1 Barbara Stark bs7652@att.com Darshak Thakore d.thakore@cabeabs.com Craig Pratt pratt@acm.org / craig@ecaspia.com Use existing bytes Range Unit with very arge

More information

Control Plane Based on SCIM API

Control Plane Based on SCIM API Contro Pane Based on SCIM API draft-hunt-secevents-stream-mgmt-api Phi Hunt IETF100, Singapore November, 2017 Why not re-use? Why SCIM? SCIM2 is a provisioning protoco Based on JSON documents and RESTfu

More information

I ARCHITECTURE I BENCH MARKING 118 : ATTRIBUTES EXTRACTOR : I I I l I l 1 CLOUD COMPUTING I

I ARCHITECTURE I BENCH MARKING 118 : ATTRIBUTES EXTRACTOR : I I I l I l 1 CLOUD COMPUTING I US 20110072487A (19) United States (12) Patent Appication Pubication (10) Pub. No.: US 2011/0072487 A1 Hadar et a. (43) Pub. Date: (54) SYSTEM, METHOD, AND SOFTWARE FOR Pubication Cassi?cation PROVDNG

More information

Agent architectures. Francesco Amigoni

Agent architectures. Francesco Amigoni Francesco Amigoni Designing inteigent agents An agent is defined by its agent function f() that maps a sequence of perceptions to an action p(0), p(1),..., p(t) f() a(t) AGENT perceptions actions ENVIRONMENT

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Nattawut Thepayasuwan, Member, IEEE and Aex Doboi, Member, IEEE Abstract

More information

Telephony Trainers with Discovery Software

Telephony Trainers with Discovery Software Teephony Trainers 58 Series Teephony Trainers with Discovery Software 58-001 Teephony Training System 58-002 Digita Switching System 58-003 Digita Teephony Training System 58-004 Digita Trunk Network System

More information

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae

More information

IBC DOCUMENT PROG007. SA/STA SERIES User's Guide V7.0

IBC DOCUMENT PROG007. SA/STA SERIES User's Guide V7.0 IBC DOCUMENT SA/STA SERIES User's Guide V7.0 Page 2 New Features for Version 7.0 Mutipe Schedues This version of the SA/STA firmware supports mutipe schedues for empoyees. The mutipe schedues are impemented

More information

Simba MongoDB ODBC Driver with SQL Connector. Installation and Configuration Guide. Simba Technologies Inc.

Simba MongoDB ODBC Driver with SQL Connector. Installation and Configuration Guide. Simba Technologies Inc. Simba MongoDB ODBC Driver with SQL Instaation and Configuration Guide Simba Technoogies Inc. Version 2.0.1 February 16, 2016 Instaation and Configuration Guide Copyright 2016 Simba Technoogies Inc. A Rights

More information

Conflict graph-based Markovian model to estimate throughput in unsaturated IEEE networks

Conflict graph-based Markovian model to estimate throughput in unsaturated IEEE networks Confict graph-based Markovian mode to estimate throughput in unsaturated IEEE 802 networks Marija STOJANOVA Thomas BEGIN Anthony BUSSON marijastojanova@ens-yonfr thomasbegin@ens-yonfr anthonybusson@ens-yonfr

More information

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University Arithmetic Coding Prof. Ja-Ling Wu Department of Computer Science and Information Engineering Nationa Taiwan University F(X) Shannon-Fano-Eias Coding W..o.g. we can take X={,,,m}. Assume p()>0 for a. The

More information

Guardian 365 Pro App Guide. For more exciting new products please visit our website: Australia: OWNER S MANUAL

Guardian 365 Pro App Guide. For more exciting new products please visit our website: Australia:   OWNER S MANUAL Guardian 365 Pro App Guide For more exciting new products pease visit our website: Austraia: www.uniden.com.au OWNER S MANUAL Privacy Protection Notice As the device user or data controer, you might coect

More information