Performance Characterization of a Bluetooth Piconet with Multi Slot Packets

Size: px
Start display at page:

Download "Performance Characterization of a Bluetooth Piconet with Multi Slot Packets"

Transcription

1 Performance Characterization of a Bluetooth Piconet with Multi Slot Packets aniele Miorani Carlo Caimi Anrea anella To cite this version: aniele Miorani Carlo Caimi Anrea anella. Performance Characterization of a Bluetooth Piconet with Multi Slot Packets. WiOpt 3: Moeling an Optimization in Mobile A Hoc an Wireless Networks Mar 3 Sophia Antipolis France. 6 p. 3. inria-667> HA I: inria Submitte on 5 Mar HA is a multi-isciplinary open access archive for the eposit an issemination of scientific research ocuments whether they are publishe or not. The ocuments may come from teaching an research institutions in France or abroa or from public or private research centers. archive ouverte pluriisciplinaire HA est estinée au épôt et à la iffusion e ocuments scientifiques e niveau recherche publiés ou non émanant es établissements enseignement et e recherche français ou étrangers es laboratoires publics ou privés.

2 Performance Characterization of a Bluetooth Piconet with Multi Slot Packets aniele Miorani Carlo Caimi an Anrea anella epartment of Information Engineering University of Paova ia Graenigo 6/B 353 Paova Italy aniele.miorani carlo.caimi Abstract In this paper we present a framework for performance evaluation of a Bluetooth piconet using multislot packets. In particular uner some classical assumptions we evelop a moel of a Bluetooth network an erive the complete statistics of the one hop elay an other significant metrics such as the channel utilization parameter. Stability conitions are investigate an it is shown that the use of multi slot packets enlarges the achievable rate region. Simulations results are then shown which valiate the propose analysis. Inex Terms Bluetooth S.A.R. multislot packets performance evaluation I. INTROUCTION Originally born as a wireless replacement for cables connecting electronic evices Bluetooth [] has been gaining a lot of consieration an attention by the scientific community in the last few years [] [3] []. The evelopment of this technology is now focuse on the so-calle Wireless Personal Area Networks (WPANs) which are foreseen as the maor application for Bluetooth evices in the short an mi-term future. While the iffusion of Bluetooth evices is believe to experience a rapi growth in the next years thanks to its expecte low cost (own to US accoring to leaing manufacturers) the success of such a technology will still be linke to its ability to track the eman for avance applications. Inee performance improvement schemes have become an active research fiel in orer to let Bluetooth networks being able to support emaning services like Internet MP3 auio an low-quality vieo. The basic brick to buil up a Bluetooth base network is the so calle piconet a cluster of noes (not more than ) communicating with each other by sharing a common FH channel. Access control to the raio channel is achieve by using a master riven T scheme base on a master slave architecture. Piconets may communicate by sharing on a time ivision basis a evice calle inter piconet unit which acts as gateway among the piconets it belongs to. Even if much attention has been evote to performance evaluation of Bluetooth networks most of the results have been obtaine through numerical simulations. Inee the literature still lacks an in epth analytical investigation of Bluetooth network performance. Not even the analysis of a single piconet with multi slot packets has been complete even if some consierable effort has been evote in the last years [5] [6]. In this paper we aim at proviing a mathematical framework This work was supporte by MIUR within the framework of the PRIMO proect FIRB RBNE8RFY which uner some simplifying but classical assumptions allows us to evaluate the performance obtainable with the use of multi slot packets. In particular we provie the packet elay statistics for one hop transmissions. In this sense our approach resembles that use in [6] from which it iffers for some moel assumptions in particular on the role of the master an on the possibility of having ifferent statistics for the packet length at ifferent noes. Furthermore we provie a characterization of the channel utilization parameter an an in epth investigation of the stability regions achievable uner a given Segmentation An Reassemly (SAR) policy showing that the use of multi slot packets provies an enlargement of the achievable rate region. The paper is organize as follows: Section II eals with the characteristics of the Bluetooth communications profile an escribes the system moel which will be use for the analysis. Section III eals with the performance analysis of a Bluetooth piconet in terms of single hop elay together with an investigation of the achievable capacity regions. Finally Section I presents some concluing remarks an open issues for future work. II. BACKGROUN: THE BUETOOTH TECHNOOGY Bluetooth operates in the GHz ISM unlicense ban proviing a raw bit rate of Mb/s by using a binary Gaussianshape FSK moulation. In orer to reuce interference with other evices operating in the ISM ban Bluetooth aopts a frequency hopping (FH) sprea spectrum technique spanning RF carriers -MHz wie each. In orer to communicate two up to eight Bluetooth units may connect in a small network calle piconet. In each piconet a unit acts as master controlling the channel access by means of a simple polling scheme. Time is ivie into consecutive slots of s each that are use for ownlink (master-to-slave) an uplink (slave-to-master) transmissions alternatively in a time ivision uplex (T) fashion. Namely each time-slot is associate to a hop in the hopping sequence resulting in a nominal hop rate of hop/s. The master can transmit in even numbere time slots whereas o numbere slots are reserve for slaves transmissions. The stanar provies two types of service Asynchronous Connectioness (AC) an Synchronous Connection Oriente (SCO). The latter provies a way of sening elay sensitive services (tipically voice) over Bluetooth an is base on a reservation scheme which estabilishes a virtual circuit between a slave an the master. The other type of link AC provies packet switching on

3 " % " % g h I O O PSfrag replacements Type M M3 M5 H H3 H5 Fig.. Slot occupancy Multi slot packet transmission Max.payloa length (bytes) $ &' &" "&"&) TABE I PACKET CHARACTERISTICS FOR AC INKS FEC rate!"!"!" the wireless channel; the stanar presents six possible packet types which iffer for both coing scheme applie (either a - + shortene Hamming coe or none) an packet length (-+. an time slots) as epicte in Fig.. A resume of the packet characteristics is reporte in Tab.I. ifferent piconets are associate to inepenent FH channels. This allows more piconets to share the same physical space an spectrum without increasing excessively the mutual interference. Piconet may communicate by sharing a evice on a time ivision basis forming what is commonly referre to as a scatternet. Both a piconet an a scatternet consisting of /. piconets are epicte in Fig.. embee on the chip an thus it results the most attractive choice for low cost an power-aware solutions. Furthermore in the following we will consier AC links only an limit our analysis to the use of unprotecte packets (3576 where ). In fact it has been shown [9] that in most operating conitions (namely for not too low signal to noise ratios) the use of 3576 packets results in higher gooput with respect to 35/:6. We start by consiering a piconet consisting of ;= noes ; the network may then be represente by a set of interacting queues. Since the solution for problems of interacting queues is still far from coming we assume that the arrival processes at the various queues are inepenent. To treat also slave to slave communications we will employ the classical tool of statistical routing [] which enables us to get an approximate analysis of the network performance. In other wors the traffic from the master to a particular slave say A will be compute as the sum of the traffic generate in the whole piconet for that particular slave an the various resulting flows will be consiere inepenent. To get a more mathematically comprehensive framework we nee to introuce some preliminary notations. et us enumerate units in a piconet from to ;. et B5C + + ; be the master I. For each +AEC + &+; we use the suffix +A to enote the link between noe an A. Note that in case both an A are slave units the link is virtual since each packet exchange between two slaves has to be route through the master that will forwar the packet to the recipient slave. The arrivals are moele with a Poisson process with bulk arrivals an rate FHGI (expresse in packets/slot). The probabilities of packets generate at noe to noe A being one three an NORQ five slots long are KGI KMGI. an KMGI with I SI T K GUI. We assume that no segmentation an reassembly (SAR) proceures take place when a slave to slave communication passes through the master. A complete characterization of the piconet is thus given by: A. System Moel To carry on our analysis we nee some simplifying assumptions on the consiere network. First of all we limit W BX+Y -+ () our analysis to the simplest polling scheme Pure Roun Robin where (PRR) also referre to as imite- polling. Although many Y is the polynomial en to en traffic matrix whose +A -th entry is efine as: efficient polling schemes have been propose in the last few years [7] [8] at this time available evices implement a Y GI F GI\[ -^X ORQ K GI () basic PRR scheme. This is essentially ue to the necessity of SI T keeping the complexity of the firmware as low as possible in orer to reuce the manufacturing costs an lower the The en to en traffic matrix Y can be associate to the power consumption. PRR oes not require complex logic to be effective traffic matrix ` which escribes the actual traffic flowing between the master unit an each slave unit: ` GI ba GUI \[ e] ^f_ ORQ GI (3) I ScI T Fig.. Topologies of Bluetooth networks: piconet & scatternet ue to our assumptions of statistical routing an absence of SAR in slave to slave communications we obtain: Nml Pfn i agi k Ntl Pfn FHGUI 9+op + + ;7+qArbBXs a $I G F GUI yzc{ +~} + ;7+uvbBXs a GI ()

4 Y g Q Q ^ G C _ N.. C _. _ an: h i GUI is the equivalent loa factor for the +A Pfn GI Nm K GI F GI + p + c+; s (see M III-A for more etails). Pfn $I Nt B G K GI C Now we nee to fin the ST of the cycle time F GI Ar + H+; s GI +A bbx+ +.+ (5) There is however a more elegant way to pass irectly from to `. et us efine the matrix as:... + (6)... where the B -th row is the only non zero one an as the all zero matrix presenting a single one in position BX+ B. Then we may write: ` + where Y Y (7) is the ientity matrix. III. PERFORMANCE ANAYSIS The elay on the link +A GUI " + PRQ ^X consists of two components the access elay (i.e. the time it takes for a packet to get to the hea of the queue an start the service) an the transmission elay! ". By using the corresponing STs (aplace-stieltes transforms) we have: $ 3 GI %& %& (8) N + where % " I SI T GI B ('). The access elay itself may be expresse as the sum of two components: -/. + (9) where. is the time elapse between the packet arrival an the first time the queue gets the token whereas the secon term takes into account the time spent for transmitting all the packets foun waiting in queue. Passing to the corresponing STs we obtain: %& %&. %& () The first term may be thought as the resiual life in a renewal process with renewal perio equal to the cycle time. Thus from the theory of ranom look [] we have for the pmf: 9;E= : ; >8?A@ B7C + () BFC :G ;E= %&.?A@B C () where is the probability istribution of the r.v.. Passing to the STs we get: The other term in (9) may be foun by consiering the equivalent /(HIAH moel of the queue with an equivalent service time equal to the cycle time thus getting in terms of STs GI agi amgui %! K G ;5= + (3) where GUI a GUI a GI PRQ I SI T GUI U Pfn ]?A@ B/W a GUI GUI -th queue. The cycle perio may be expresse as the sum of the times spent for ata exchange on the +A BON -th link which ue to our assumptions are assume inepenent an thus: ;E= P I () Accoring to the notation of [6] we set I?Q@ ] ^X_ GUI. Finally consiering that in case of no ata packets available a one slot long ummy packet (PO/NU) is sent we fin: S I K GUI GI GI GI On the whole we get: loa factor of the -th queue may be escribe by: GI amgui?q@ " v GUI GI loa factor GI GI GI GI e S GUI GUI GUI T ;ER (5) TG ;5= 3 GI?A@ BC K! G ^X_ ; = [ GI B (6) $ Equation (6) provies the complete statistics of the elay on the link +A may be foun to be:. In particular the average value 3 GI?A@ GI AU 3?A@B/W 3 C amgi?a@b C BXC may be foun by eriving expres- where the moments of sion (). Finally the average packet elay may be compute as: A. Stability Conitions Generally speaking the loa factor as []: GUI + (7) GI a GI 3 GUI 3 N (8) GI a GI of a queue is efine?q@y?a@[\ + (9) Y [ where is the service time an the arrival rate. A polling system employing PRR is stable if an only if the following conitions are both verifie []: [ GI^] 9+ () GI GI ] -+ +A + + ; () where the first conition applies to the system as a whole whereas the secon ensures that also every single queue is stable. Accoring to the notation previously introuce each. The equivalent may be calculate by consiering the equivalent / (H IAH system B C which presents a service time equal to the?q@b C service time. Thus GI amgui. Substituting after a

5 Q Q.5 x Analytical Simulation H H3 H5.6 G S.5 k (s) G M x 5 Fig. 3. Stability region in terms of offere traffic ( packets only) G (b/s) x 5 Fig. 5. Average packet elay versus offere traffic 7 8 x 5 7 H H+H3 H+H3+H5 N= N=3 N=5 N=7 6 G S 5 3 (ms) G (b/s) x G x 5 M Fig.. Stability region in terms of offere traffic few algebra we get that conition () implies () an is thus not only necessary but also sufficient to get a stable network. In Fig.3 we reporte the results for the case when only 3 76 packets are use on both forwar an reverse links for a piconet with ; slave. The achievable rate region for ; is shown in Fig.. Note that as expecte ue to the higher efficiency (in terms of payloa/packet length ratio) enabling the use of multi slot packets effectively enlarges the achievable rate region. The same reasoning applies to the general case of a piconet with ; slaves where the achievable rate region may be epicte as a polyheron in imensional space. B. Channel Utilization In wireless systems banwith is a scarce resource an hence it is of vital importance to fully exploit the available banwith. The time ivision uplex (T) architecture of Bluetooth systems makes impossible to fulfil this requirement in the case of strongly asymmetric traffic. (An example may be a multicasting in a conference room where ownlink traffic only is present). Hence a metric of great interest is the so calle channel utilization parameter efine as the average percentage of slots occupie by ata packets. The channel Fig. 6. " % Average packet elay versus offere traffic for various utilization parameter which will be enote by may be obtaine by the ratio between the total number of slots use to sen ata uring a service cycle an the cycle uration expresse in slots. Hence using average values we get:?a@ B7C $[ GI C. Numerical Results GUI?Q@ " [ GI a GI?A@ " () In this section we report some results obtaine through numerical simulations. To valiate our moel we implemente a simulator using OPNET; we consiere a scenario of a full piconet (; ) with ownloa traffic only an various SAR policies. The results in terms of average packet elay are plotte in Fig.5 for S In Fig.6 we reporte the impact of the number of slaves on the packet elay for various ; in a balance scenario with GUI S for any +A. In case of slave to slave communications the en to en packet elay clearly epens on the orer the master polls the slaves. To avoi such a epenency (which results in fairness loss) we shoul consier a PRR in which the polling orer is ranomize at each cycle; thus an approximate expression of the packet elay for a +A communication may be given by: 3EGUI t3egi 3 $I (3)

6 .35.3 Analytical Simulation.5.8 (s)..5 η G (b/s) x 5 Fig. 7. Average packet elay for a slave to slave communication Fig π.8 k3 (3).9 π k3 (5) Channel utilization parameteras a function of " an % To show how the assumption of inepenent flows affects the results we simulate a piconet with slaves communicating each other: theoretical an simulation results are shown in Fig.7. It may be note that the assumption of inepenent flows although proviing goo results at low traffic loa leas to substantial mismatch with the simulation results as the system gets close to the stability limit. Finally we investigate the impact of the SAR policy employe: namely we analyze a piconet with ;. slaves; two of them communicate with the master at a bit rate of Kb/s using 3 packets only (which can be thought as a moel for voice over AC) whereas the thir slave is ownloaing from the master at a Kb/s. We varie the for the last connection rate of. an plotte the channel utilization parameter an the average packet elay on the voice links in Fig.8 an Fig.9 respectively. The results are worth some comments: the use of multi slot packets inee while enlarging the capacity region achieves lower efficiency in terms of banwith utilization. This result is in practice ue to the higher efficiency of multi slot packets an thus the terms in () ecreases when longer packets are use. Furthermore longer packets may result in etrimental impact on links carrying elay sensitive flows. In a QoS oriente scenario it is clear that the choice of using multi slot packets shoul be somehow negotiate at the master sie taking into account the possibly negative effects on link performances. Fig. 9. k (s) x π k3 (5).8.5 π k3 (3) Average packet elay for the elay sensitive application as a function of " an % more realistic SAR policies in which the packet length is chosen in function of the buffer length an as a consequence the analysis of the packet elay at CAP level. The last interesting issue woul be the extension of such a framework to accomoate a scatternet structure where other problems (the moeling of the gateways behavior an inter piconet interference) arise. I. CONCUSION In this paper we presente a mathematical framework base on queueing theory tools for performance evaluation in a Bluetooth piconet using multi slot packets. We iscusse stability conitions an showe that the use of multi slot packets ue to their higher efficiency effectively enlarges the bounaries of the achievable capacity region. We showe how the channel utilization parameter a significant metric in wireless networks performance may be calculate an iscusse the traeoffs involve in the choice of a given SAR policy. Three subects seem to be of great interest for future work. The first is the stuy of how channel failures impact on piconet performances an their integration into a queueing theoretic framework. The secon is the effective moeling of REFERENCES [] Bluetooth special interest group. [Online]. Available: []. C. Haartsen The Bluetooth raio system IEEE Pers. Comm. vol. 7 no. pp Feb. [3]. Haartsen M. Naghshineh. Inouye O. oeressen an W. Allen Bluetooth: ision goals an architecture ACM Mobile Computing an Communications Review vol. no. pp Oct 998. [] P. ohansson M. Kazantziis R. Kapoor an M. Gerla Bluetooth: an enabler for personal area networking ACM/IEEE Trans. Net. vol. 5 no. 5 pp Sep.-Oct.. [5] R. Bruno M. Conti an E. Gregori Bluetooth: architecture protocols an scheuling algorithms ACM Cluster Computing vol. 5 pp. 7 3 Apr. [6]. Misic an. Misic On Bluetooth piconet traffic performance in Proc. of IEEE PIMRC isbon Portugal. [7] A. Capone M. Gerla an R. Kapoor Efficient polling schemes for Bluetooth picocells in Proc. IEEE ICC Helsinki.

7 [8] M. Kalia. Bansal an R. Shorey ata scheuling an sar for Bluetooth mac in Proc. IEEE TC (Spring) Tokyo. [9] M. C. alenti M. Robert an. H. Ree On the throughput of Bluetooth ata transmissions in Proc. of IEEE WCNC Orlano. [] H. evy an M. Sii Polling systems: applications moeling an optimization IEEE Transactions on communications no. pp Oct 99. []. Kleinrock Queueing Systems. New York: ohn Wiley & Sons 975.

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information

Supporting Fully Adaptive Routing in InfiniBand Networks

Supporting Fully Adaptive Routing in InfiniBand Networks XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Schemes: an Analytical Approach

Schemes: an Analytical Approach Performance Evaluation of Bluetooth Polling Schemes: an Analytical Approach Daniele Miorandi Andrea Zanella Gianfranco Pierobon Abstract In the recent years many polling schemes for Bluetooth networks

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

Kinematic Analysis of a Family of 3R Manipulators

Kinematic Analysis of a Family of 3R Manipulators Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,

More information

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients Probabilistic Meium Access Control for 1 Full-Duplex Networks with Half-Duplex Clients arxiv:1608.08729v1 [cs.ni] 31 Aug 2016 Shih-Ying Chen, Ting-Feng Huang, Kate Ching-Ju Lin, Member, IEEE, Y.-W. Peter

More information

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,

More information

Analytical approximation of transient joint queue-length distributions of a finite capacity queueing network

Analytical approximation of transient joint queue-length distributions of a finite capacity queueing network Analytical approximation of transient joint queue-length istributions of a finite capacity queueing network Gunnar Flötterö Carolina Osorio March 29, 2013 Problem statements This work contributes to the

More information

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks Optimal Routing an Scheuling for Deterministic Delay Tolerant Networks Davi Hay Dipartimento i Elettronica olitecnico i Torino, Italy Email: hay@tlc.polito.it aolo Giaccone Dipartimento i Elettronica olitecnico

More information

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member

More information

Class-based Packet Scheduling Policies for Bluetooth

Class-based Packet Scheduling Policies for Bluetooth Class-based Packet Scheduling Policies for Bluetooth Vishwanath Sinha, D. Raveendra Babu Department of Electrical Engineering Indian Institute of Technology, Kanpur - 08 06, INDIA vsinha@iitk.ernet.in,

More information

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly

More information

The Proportional Colouring Problem: Optimizing Buffers in Radio Mesh Networks

The Proportional Colouring Problem: Optimizing Buffers in Radio Mesh Networks The Proportional Colouring Problem: Optimizing Buffers in Radio Mesh Networks Florian Huc, Claudia Linhares Sales, Hervé Rivano To cite this version: Florian Huc, Claudia Linhares Sales, Hervé Rivano.

More information

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance International Journal of Moern Communication Technologies & Research (IJMCTR) Impact of FTP Application file size an TCP Variants on MANET Protocols Performance Abelmuti Ahme Abbasher Ali, Dr.Amin Babkir

More information

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter FDL sel. VOA SOA 100 Regular papers ONDM 2018 Scalable Deterministic Scheuling for WDM Slot Switching Xhaul with Zero-Jitter Bogan Uscumlic 1, Dominique Chiaroni 1, Brice Leclerc 1, Thierry Zami 2, Annie

More information

Towards an Adaptive Completion of Sparse Call Detail Records for Mobility Analysis

Towards an Adaptive Completion of Sparse Call Detail Records for Mobility Analysis Towars an Aaptive Completion of Sparse Call Detail Recors for Mobility Analysis Guangshuo Chen, Aline Carneiro Viana, Carlos Sarraute To cite this version: Guangshuo Chen, Aline Carneiro Viana, Carlos

More information

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks Coorinating Distribute Algorithms for Feature Extraction Offloaing in Multi-Camera Visual Sensor Networks Emil Eriksson, György Dán, Viktoria Foor School of Electrical Engineering, KTH Royal Institute

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stolyar Abstract Backpressure-base aaptive routing

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

On Efficient Topologies for Bluetooth Scatternets

On Efficient Topologies for Bluetooth Scatternets On Efficient Topologies for Bluetooth Scatternets Daniele Miorandi, Arianna Trainito, and Andrea Zanella Department of Information Engineering University of Padova, Via Gradenigo 6/B 35131 Padova, Italy

More information

Intra-Piconet Polling Algorithms in Bluetooth

Intra-Piconet Polling Algorithms in Bluetooth Intra-Piconet Polling Algorithms in Bluetooth Jelena Mišić and Vojislav B. Mišić Bluetooth is an emerging standard for Wireless Personal Area Networks (WPANs): short range, ad hoc wireless networks [1].

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.

More information

A Framework for Dialogue Detection in Movies

A Framework for Dialogue Detection in Movies A Framework for Dialogue Detection in Movies Margarita Kotti, Constantine Kotropoulos, Bartosz Ziólko, Ioannis Pitas, an Vassiliki Moschou Department of Informatics, Aristotle University of Thessaloniki

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

MODULE VII. Emerging Technologies

MODULE VII. Emerging Technologies MODULE VII Emerging Technologies Computer Networks an Internets -- Moule 7 1 Spring, 2014 Copyright 2014. All rights reserve. Topics Software Define Networking The Internet Of Things Other trens in networking

More information

Throughput prediction in wireless networks using statistical learning

Throughput prediction in wireless networks using statistical learning Throughput prediction in wireless networks using statistical learning Claudina Rattaro, Pablo Belzarena To cite this version: Claudina Rattaro, Pablo Belzarena. Throughput prediction in wireless networks

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stoylar arxiv:15.4984v1 [cs.ni] 27 May 21 Abstract

More information

Characterizing Decoding Robustness under Parametric Channel Uncertainty

Characterizing Decoding Robustness under Parametric Channel Uncertainty Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric

More information

Optimal Oblivious Path Selection on the Mesh

Optimal Oblivious Path Selection on the Mesh Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract

More information

Robust IP and UDP-lite header recovery for packetized multimedia transmission

Robust IP and UDP-lite header recovery for packetized multimedia transmission Robust IP and UDP-lite header recovery for packetized multimedia transmission Michel Kieffer, François Mériaux To cite this version: Michel Kieffer, François Mériaux. Robust IP and UDP-lite header recovery

More information

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body International Engineering Mathematics Volume 04, Article ID 46593, 7 pages http://x.oi.org/0.55/04/46593 Research Article Invisci Uniform Shear Flow past a Smooth Concave Boy Abullah Mura Department of

More information

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA Internet mobility TCP over noisy links

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA Internet mobility TCP over noisy links Overview 15-441 15-441: Computer Networking 15-641 Lecture 24: Wireless Eric Anerson Fall 2014 www.cs.cmu.eu/~prs/15-441-f14 Internet mobility TCP over noisy links Link layer challenges an WiFi Cellular

More information

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets

A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets A Routing Protocol and Energy Efficient Techniques in Bluetooth Scatternets Balakrishna J. Prabhu and A. Chockalingam Department of Electrical Communication Engineering Indian Institute of Science, Bangalore

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Politecnico i Torino Porto Institutional Repository [Proceeing] Automatic March tests generation for multi-port SRAMs Original Citation: Benso A., Bosio A., i Carlo S., i Natale G., Prinetto P. (26). Automatic

More information

A Practical Evaluation Method of Network Traffic Load for Capacity Planning

A Practical Evaluation Method of Network Traffic Load for Capacity Planning A Practical Evaluation Method of Network Traffic Load for Capacity Planning Takeshi Kitahara, Shuichi Nawata, Masaki Suzuki, Norihiro Fukumoto, Shigehiro Ano To cite this version: Takeshi Kitahara, Shuichi

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

Parallel Directionally Split Solver Based on Reformulation of Pipelined Thomas Algorithm

Parallel Directionally Split Solver Based on Reformulation of Pipelined Thomas Algorithm NASA/CR-1998-208733 ICASE Report No. 98-45 Parallel Directionally Split Solver Base on Reformulation of Pipeline Thomas Algorithm A. Povitsky ICASE, Hampton, Virginia Institute for Computer Applications

More information

Performance Modelling of Necklace Hypercubes

Performance Modelling of Necklace Hypercubes erformance Moelling of ecklace ypercubes. Meraji,,. arbazi-aza,, A. atooghy, IM chool of Computer cience & harif University of Technology, Tehran, Iran {meraji, patooghy}@ce.sharif.eu, aza@ipm.ir a Abstract

More information

Lecture 5. Multiple scattering as a source of radiation. Reflectance from surfaces. Remote sensing of ocean color.

Lecture 5. Multiple scattering as a source of radiation. Reflectance from surfaces. Remote sensing of ocean color. Lecture 5. Multiple scattering as a source of raiation. Reflectance from surfaces. Remote sensing of ocean color. 1. Direct an iffuse raiation. Multiple scattering. Single scattering approximation. 2.

More information

Interference Mitigation Technique for Performance Enhancement in Coexisting Bluetooth and WLAN

Interference Mitigation Technique for Performance Enhancement in Coexisting Bluetooth and WLAN 2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Interference Mitigation Technique for Performance Enhancement in Coexisting

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

Traffic Grooming in Bidirectional WDM Ring Networks

Traffic Grooming in Bidirectional WDM Ring Networks Traffic Grooming in Bidirectional WDM Ring Networks Jean-Claude Bermond, David Coudert, Xavier Munoz, Ignasi Sau To cite this version: Jean-Claude Bermond, David Coudert, Xavier Munoz, Ignasi Sau. Traffic

More information

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks Hinawi Publishing Corporation International Journal of Distribute Sensor Networks Volume 2014, Article ID 936379, 17 pages http://x.oi.org/10.1155/2014/936379 Research Article REALFLOW: Reliable Real-Time

More information

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach Nishi Sharma, Vanna Verma Abstract Wireless sensor networks (WSNs) is one of the emerging fiel of research in recent era

More information

Modelling and simulation of a SFN based PLC network

Modelling and simulation of a SFN based PLC network Modelling and simulation of a SFN based PLC network Raul Brito, Gerd Bumiller, Ye-Qiong Song To cite this version: Raul Brito, Gerd Bumiller, Ye-Qiong Song. Modelling and simulation of a SFN based PLC

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

Directed Louvain : maximizing modularity in directed networks

Directed Louvain : maximizing modularity in directed networks Directe Louvain : maximizing moularity in irecte networks Nicolas Dugué, Anthony Perez To cite this version: Nicolas Dugué, Anthony Perez. Directe Louvain : maximizing moularity in irecte networks. [Research

More information

Adjacency Matrix Based Full-Text Indexing Models

Adjacency Matrix Based Full-Text Indexing Models 1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,

More information

Optimizing the quality of scalable video streams on P2P Networks

Optimizing the quality of scalable video streams on P2P Networks Optimizing the quality of scalable vieo streams on PP Networks Paper #7 ASTRACT The volume of multimeia ata, incluing vieo, serve through Peer-to-Peer (PP) networks is growing rapily Unfortunately, high

More information

Zigbee Wireless Sensor Network Nodes Deployment Strategy for Digital Agricultural Data Acquisition

Zigbee Wireless Sensor Network Nodes Deployment Strategy for Digital Agricultural Data Acquisition Zigbee Wireless Sensor Network Nodes Deployment Strategy for Digital Agricultural Data Acquisition Xinjian Xiang, Xiaoqing Guo To cite this version: Xinjian Xiang, Xiaoqing Guo. Zigbee Wireless Sensor

More information

Comparison of Wireless Network Simulators with Multihop Wireless Network Testbed in Corridor Environment

Comparison of Wireless Network Simulators with Multihop Wireless Network Testbed in Corridor Environment Comparison of Wireless Network Simulators with Multihop Wireless Network Testbe in Corrior Environment Rabiullah Khattak, Anna Chaltseva, Laurynas Riliskis, Ulf Boin, an Evgeny Osipov Department of Computer

More information

Chalmers Publication Library

Chalmers Publication Library Chalmers Publication Library All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA This ocument has been ownloae from Chalmers Publication Library (CPL). It is the author s version of a work

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure

More information

Tight Wavelet Frame Decomposition and Its Application in Image Processing

Tight Wavelet Frame Decomposition and Its Application in Image Processing ITB J. Sci. Vol. 40 A, No., 008, 151-165 151 Tight Wavelet Frame Decomposition an Its Application in Image Processing Mahmu Yunus 1, & Henra Gunawan 1 1 Analysis an Geometry Group, FMIPA ITB, Banung Department

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

Table-based division by small integer constants

Table-based division by small integer constants Table-base ivision by small integer constants Florent e Dinechin, Laurent-Stéphane Diier LIP, Université e Lyon (ENS-Lyon/CNRS/INRIA/UCBL) 46, allée Italie, 69364 Lyon Ceex 07 Florent.e.Dinechin@ens-lyon.fr

More information

Ad-Hoc Networks Beyond Unit Disk Graphs

Ad-Hoc Networks Beyond Unit Disk Graphs A-Hoc Networks Beyon Unit Disk Graphs Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 8092 Zurich, Switzerlan {kuhn, wattenhofer, zollinger}@inf.ethz.ch ABSTRACT

More information

Performance evaluation of the Zipper duplex method

Performance evaluation of the Zipper duplex method Performance evaluation of the Zipper lex metho Frank Sjöberg, Mikael Isaksson, Petra Deutgen, Rickar Nilsson, Per Öling, an Per Ola Börjesson Luleå University of Technology, Division of Signal Processing,

More information

Wireless Sensor Networks

Wireless Sensor Networks Wireless Sensor Networks 11th Lecture 29.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Bluetooth in WSN? There are several commercially available MAC protocol/products Wi-Fi Bluetooth

More information

Chapter 9 Memory Management

Chapter 9 Memory Management Contents 1. Introuction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threas 6. CPU Scheuling 7. Process Synchronization 8. Dealocks 9. Memory Management 10.Virtual Memory

More information

Secure Network Coding for Distributed Secret Sharing with Low Communication Cost

Secure Network Coding for Distributed Secret Sharing with Low Communication Cost Secure Network Coing for Distribute Secret Sharing with Low Communication Cost Nihar B. Shah, K. V. Rashmi an Kannan Ramchanran, Fellow, IEEE Abstract Shamir s (n,k) threshol secret sharing is an important

More information

Bluetooth Time Division Duplex - Exact Analysis as a Polling System

Bluetooth Time Division Duplex - Exact Analysis as a Polling System CCIT Report 414, Technion Dept. of Electrical Engineering, Feb. 003. Bluetooth Time Division Duplex - Exact Analysis as a Polling System Gil Zussman 1, Adrian Segall 1, and Uri Yechiali 1 Department of

More information

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA Preprint, August 5, 2018. 1 All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA Mikhail Ivanov, Frerik Brännström, Alexanre Graell i Amat, an Petar Popovski Department of Signals an Systems,

More information

Simulations of VANET Scenarios with OPNET and SUMO

Simulations of VANET Scenarios with OPNET and SUMO Simulations of VANET Scenarios with OPNET and SUMO Florent Kaisser, Christophe Gransart, Marion Berbineau To cite this version: Florent Kaisser, Christophe Gransart, Marion Berbineau. Simulations of VANET

More information

Improving Performance of Sparse Matrix-Vector Multiplication

Improving Performance of Sparse Matrix-Vector Multiplication Improving Performance of Sparse Matrix-Vector Multiplication Ali Pınar Michael T. Heath Department of Computer Science an Center of Simulation of Avance Rockets University of Illinois at Urbana-Champaign

More information