A Caching Algorithm using Evolutionary Game Theory in a File-Sharing System
|
|
- Moses Lyons
- 6 years ago
- Views:
Transcription
1 A Caching Algoithm using Evolutionay Game Theoy in a File-Shaing System Masahio Sasabe Cybemedia Cente Osaka Univesity 1-32 Machikaneyama-cho, Toyonaka-shi Osaka 56-43, Japan m-sasabe@cmc.osaka-u.ac.jp Naoki Wakamiya, Masayuki Muata Gad. School of Infomation Science and Technology Osaka Univesity 1-5 Yamadaoka, Suita-shi Osaka , Japan {wakamiya, muata}@ist.osaka-u.ac.jp Abstact In a P2P file-shaing system, a node finds and etieves its desied file. If multiple nodes cache the same file to povide othes, we can achieve a file-shaing system with low latency and high file availability. Howeve, a node has to spend costs, e.g., pocessing load o stoage capacity, on caching of a file. Consequently, a node may selfishly behave and hesitate to cache a file. In such a case, thee is a possibility that unpopula files disappea fom the system. In this pape, we aim to accomplish effective caching in the whole system that emeges fom autonomous and selfish node behavio. We fist discuss elationship between selfish node behavio and system dynamics accoding to evolutionay game theoy. As a esult, we show that a file-shaing system can be obust to file disappeaance depending on a cost and demand model fo caching even if nodes behave selfishly. 1. Intoduction In a Pee-to-Pee (P2P) file-shaing system, a node exchanges infomation and files with othe nodes on a logical netwok that the nodes constuct by establishing a logical link between two nodes. Each node caches its oiginal o etieved files into a local stoage to shae them with othe nodes. If multiple nodes coopeatively cache an identical file into thei stoages, a node can find it with highe pobability and etieve it moe quickly. This leads to enhance pefomance, availability, and eliability of the system [6, 11]. Howeve, caching of a file incus costs such as pocessing load and stoage capacity. A node consisting of the fileshaing system selfishly behaves because it is pimitively a use teminal. As a esult, some nodes may not be coopeative to cache files [3]. In such a situation, thee is a poblem that a node cannot use a file due to disappeaance caused by its unpopulaity. It is difficult fo a system administato to monito and manage all nodes so that the system achieves effective caching. Thus, it is desiable that selfish and autonomous node behavio leads to effective caching in the whole system. Game theoy can eveal how the selfish node behavio affects dynamics of the whole system [5, 1]. In Ref. [5], they assume that a node behaves to minimize its own costs fo using a file. The costs ae stoage capacity consumed by caching and latency to etieve a file fom its coesponding file holde, i.e., povide. Then, they pove that Nash equilibia, namely stable states of a system, exist in such a situation by using game theoy. Futhemoe, they show an optimum state of the system is equal to one of the Nash equilibia by intoducing a payment model in which a node can obtain payments to cache a file fom othe nodes that etieve the cache file. On the othe hand, in Ref. [1], they discuss coopeative node behavio in a file-shaing system unde the famewok of Multi-Peson Pisone s Dilemma. If thee is no incentive fo caching a file, all nodes become fee-ides in a Nash equilibium. Though analyses and simulation evaluations, they pesent that a node intends to contibute to caching if it can obtain payments o eputations fom othe nodes in compensation fo caching a file. Although these studies eveal how selfish node behavio affects the system pefomance in a Nash equilibium, they insist that incentive mechanisms, e.g., payments o eputations fom othe nodes, ae essential to achieve coopeative caching. Howeve, such incentive mechanisms ae not necessaily applied to a file-shaing system. Fo example, thee is a file-shaing system that hides a povide fom nodes equesting the coesponding file so as to impove the anonymity among nodes. In such a system, it is difficult fo a povide to obtain payments fom the equesting nodes. In this pape, we focus on a moe geneal file-shaing system without such incentive mechanisms. We aim to accomplish effective caching in the whole system that emeges fom selfish and autonomous node behavio taking into account its demand and cost fo caching. Fo this pupose,
2 we use evolutionay game theoy to examine how local inteaction between selfish nodes affects the dynamics of the whole system [7]. In a society of oganisms, vaious individuals influence each othe. Evolutionay game theoy oiginally ties to figue out a mechanism in which optimum behavio comes down to offsping in evolutionay pocess of oganisms by using game theoy. Suppose that individual behavio defined by genes is a stategy of game theoy and the numbe of offsping following cetain behavio is payoffs acquied by the coesponding stategy. In such a case, vaious individuals ae in stategically mutual dependence elation of game theoy. Thus, by using game theoy, we can explain the phenomenon that supeio behavio speads ove a society of oganisms though inheitance fom ancestos to offsping. Fo example, many eseaches focus on how individual behavio that seems to be selfish and uncoopeative affects the emegence of coopeative phenomena in the whole society [7, 9, 12]. We expect that evolutionay game theoy can also eveal how much selfish node behavio based on local inteaction has impact on caching condition in the whole system. In this pape, we deive the elationship between node behavio and the numbe of cache files in a stable state of the whole system by using eplicato dynamics and agent-based dynamics of evolutionay game theoy. Then, we examine effective caching in the whole system that emeges fom selfish node behavio. Replicato dynamics and agent-based dynamics ae models to deive a stategy distibution in an evolutionay stable state. Replicato dynamics is a mathematical model in which a stategy inceases when it can yield moe payoffs than aveage payoffs of all stategies. Note that eplicato dynamics can be applicable when the numbe of individuals composed of the society is elatively lage and the netwok among the individuals is mean-field like. As a esult, we can obtain the system chaacteistics in the case that a node selfishly behaves in accodance with global infomation on caching condition in a full mesh netwok. On the othe hand, agent-based dynamics models a phenomenon that a supeio stategy speads ove the netwok in a hop-by-hop manne. In agent-based dynamics, an individual plays a game once with all neighboing individuals, detemines supeioity of its own stategy based on the game esults, and finally decides the next stategy. Consequently, we can find out the system chaacteistics in the case that a node selfishly behaves based on its local infomation in vaious netwok topologies. In this pape, we fist make modeling a file-shaing system as a game taking into account cost and demand fo caching. Then, we theoetically deive the numbe of cache files in the whole system by eplicato dynamics when a node can obtain global infomation. Futhemoe, though simulation expeiments based on agent-based dynamics, we Table 1. payoff matix (geneal) playe 2 coopeato defecto playe 1 coopeato (R, R) (S, T ) defecto (T, S) (P, P ) evaluate the numbe of cache files and distance fom a node to a povide in the case that a node behaves accoding to its local infomation. Finally, we descibe an appopiate caching model to achieve effective caching fom the analyses and simulation esults. The est of the pape is oganized as follows. In section 2, we descibe models of caching games with which we deal in this pape. Then, we evaluate the system chaacteistics by eplicato dynamics in section 3 and by agentbased dynamics in section 4. Fom the esults, we examine whethe the models ae suited to effective caching. Finally, section 5 gives conclusions and futue wok. 2. Caching Game In evolutionay game theoy, a game between two abitay playes is defined as a pay-off matix as shown in Tab. 1. A defecto exploiting a coopeato gets T and the exploited coopeato eceives S. Both playes eceives R (P ) when they coopeate (defect) each othe. Pisone s Dilemma Game (T > R > P > S) and SnowDift Game (T > R > S > P ) ae examples of well-known games. In this pape, we fist model caching in a file-shaing system as a caching game between two neighboing nodes. If thee is no capacity limit on nodes that esults in no competition of stoage capacity among diffeent files, we can assume that the caching is composed of multiple sepaated caching games each of which deals with a single file. In what follows, we define caching games fo a single file fo sake of simplicity. Fo the single file caching, each node has two stategies: caching o no caching. Since a node satisfies its demand to the file by leveaging the file, we egad the benefit obtained by the use of the file as its demand b. On the othe hand, a node has to spend a cost on caching a file. In this pape, we investigate two kinds of costs: pocessing load c l caused by self o othe node s access to a file and stoage capacity c s consumed by caching a file. As futue wok, we plan to conside dynamic costs, e.g., netwok bandwidth o delay equied to etieve a file fom a povide. We do not conside the incentive mechanisms fo caching [5, 1] because we assume a geneal file-shaing system in this pape. In the case that the cost is the pocessing load, the paametes of payoff matix become R = b c l, T = b, S = b 2c l, P = (Tab. 2). Note that b 2c l is geate than. Since the elationship among paametes of Tab. 2 sat-
3 Table 2. payoff matix (caching game, cost: load) playe 2 caching no caching playe 1 caching (b c l, b c l ) (b 2c l, b) no caching (b, b 2c l ) (,) Table 3. payoff matix (caching game, cost: stoage) playe playe 1 2 caching no caching caching (b c s, b c s ) (b c s, b) no caching (b, b c s ) (,) isfies T > R > S > P, Tab. 2 is the same as SnowDift Game. On the contay, we obtain R = b c l, T = b, S = b c l, P = in the case that the cost is the stoage capacity (Tab. 3). Note that b c s is geate than. Tab. 3 holds T > R = S > P and does not coespond to any kind of existing games. In the succeeding sections, we exploe how the numbe of nodes caching a file, that is the numbe of nodes taking the stategy caching, changes in accodance with the paametes of payoff matix and examine the ealization of a file-shaing system with high file availability. 3. Theoetical Analysis by Replicato Dynamics In this section, we theoetically deive the elationship between the paamete settings in Tabs. 2 and 3 and the numbe of nodes caching a file in a stable state of a fileshaing system by eplicato dynamics [7]. If the payoff matix can enfoce moe nodes to take the stategy caching, we can enhance the file availability of the file-shaing system composed of nodes that selfishly behave based on the payoff matix Replicato Dynamics The basic concept of eplicato dynamics is that the gowth ate of nodes taking a stategy is popotional to the payoff acquied by the stategy. Thus, the stategy that yields moe payoff than aveage payoff of the whole system inceases, and vice vesa. Note that eplicato dynamics assumes that an node plays a game with all othe nodes. In what follows, we explain the deivation pocess of eplicato dynamics in a geneal game descibed as Tab. 1. Suppose that the atio of coopeatos at a cetain time is x and that of defectos is 1 x. The aveage payoff of coopeatos becomes On the contay, that of defectos is Rx + S(1 x). (1) T x + P (1 x). (2) Consequently, the aveage payoff of the whole nodes can be deived as follows: x(rx + S(1 x)) + (1 x)(t x + P (1 x)). (3) The payoff diffeence between the aveage payoff of coopeatos and that of the whole nodes is expessed as {Rx + S(1 x)} {x(rx + S(1 x)) + (1 x)(t x + P (1 x))} = {(R + P T S)x + S P }(1 x). (4) Finally, eplicato dynamics ẋ that indicates the tansition of x is defined as follows: ẋ = {(R + P T S)x + S P }(1 x)x. (5) 3.2. The Numbe of Cache Files in a Stable State The equilibia of x that satisfy ẋ = ae, 1, and R+P T S. Next, we descibe the stability of thei equilibia. In Eq. (5), (1 x)x is constantly ove zeo fo x 1. The emaining pat (R + P T S)x + S P becomes positive fo x < R+P T S and negative fo x > R+P T S because of the definition of games in section 2. As a esult, x appoaches to R+P T S independently of the initial value of x. Thus, the stable equilibium is P S x = R + P T S. (6) Eq. (6) indicates that the atio of coopeatos at a stable state depends on the paametes of the payoff matix. Based on Refs. [9, 12, 8], we fist define as the cost-tobenefit atio of mutual coopeation. means a isk that a node should take when it behaves as a coopeato. anges (,1]. The smalle value of indicates that coopeatos incease. In this pape, is detemined by b and c l o by b and c s. Theefoe, can be egaded as the atio of demand to cost fo caching. If the cost is the pocessing load, fom Eq. (6) and Tab. 2, the atio x of coopeatos at a stable state becomes x = b 2c l. (7) b c l On the othe hand, the cost-to-benefit atio of mutual coopeation is as follows: c l =. (8) b c l
4 Finally, the elationship between x and satisfies x = 1. (9) We can also deive the elationship between x and in the case whee the cost is the stoage capacity as follows: 1 x = 1 +. (1) Fom Eqs. (9) and (1), the atio x of coopeatos deteioates with the incease of the, namely the decease of the demand b to the file, independently of the cost models. In this pape, we aim to achieve a file-shaing system with high file-availability that is obust to file disappeaance. If the cost is the pocessing load, Eq. (9) denotes that a file disappeas fom the system when is close to 1 that means the demand to the file is low. On the othe hand, the cost model of the stoage capacity enhances the file availability by peventing x falling in even if is Simulation-based Analysis by Agent-based Dynamics Agent-based dynamics [7] can eveal how much caching based on local inteaction among neighboing nodes has impact on the numbe of cache files in the whole system. Moeove, we can evaluate seach latency fo a file since we can obtain the stategies of all nodes, namely the locations of cache files Agent-based Dynamics In agent-based dynamics, a node detemines its stategy by compaing its own payoff with that of a neighboing node. A node initially selects a stategy at andom. The initial atio of coopeatos and that of defectos ae fifty-fifty in Refs. [8, 9, 12]. Once a node i detemines its stategy, it plays a game once with all neighboing nodes. This is one geneation. At the end of the geneation, the node i calculates aveage A i of payoffs acquied, then detemines the stategy of the next geneation as follows. Step 1: Selection of a neighboing node fo compaison of payoffs The node i andomly chooses a node j fom neighboing nodes. Step 2: Decision of the next stategy based on the compaison of aveage payoffs If A j > A i is satisfied, the node i imitates the stategy of node j with the following pobability: P A (i, j) = A j A i T P. (11) Othewise, it does not change its stategy. The node i tends to imitate the stategy of a node that obtained Table 4. maximum hop count between two abitay nodes m = 2 m = 4 scale-fee netwok andom netwok moe payoffs than it. In addition, P A inceases in popotion to the payoff diffeence. In an actual system, we should conside the oveheads incued by playing games and exchanging payoff with neighboing nodes. We expect that these pocesses can be ealized by applying the keep-alive messaging as in Gnutella with slight modifications Simulation Expeiments Though seveal simulation expeiments, we evaluate how node behavio based on the payoff matix affects file availability and seach latency of the whole system in scalefee and andom netwoks. We evaluate the file availability by the atio x of nodes taking the stategy caching. In the case of single-file caching, the numbe of cache files is the same as the poduct of x and the numbe of nodes. On the othe hand, we define the seach latency as the aveage hop count between a node to its closest povide including itself. Note that we altenatively use the maximum hop count between two abitay nodes when a file disappeas fom the system Simulation Model. We used NetLogo [2] in ou simulation expeiments. Based on Refs. [8, 9, 12], we set simulation configuations as follows. We geneated scale-fee and andom netwoks of 1 nodes by using the topology geneato BRITE [1]. The scale-fee netwok was based on Baabási-Albet (BA) model [4] and the andom netwok followed waxman algoithm [13] with α =.15 and β =.2. We also set the numbe m of connections that a newly paticipating node established to 2 and 4. Table 4 epesents the aveage of maximum hop count between two abitay nodes in twenty netwoks. We set the caching costs c l and c s to 1, espectively. Thus, independently of the cost models, b = 1+ was deived. We configued that the initial atio of stategy caching and that of stategy no caching wee fifty-fifty. To investigate the system chaacteistics in a stable state, we show esults when 1 geneations passed. The following esults indicate the aveage of twenty simulations. We abbeviate eplicato dynamics to RD, agent-based dynamics to AD, scale-fee to SF, and andom to RND in the following figues Impact of Payoff Matix. Figue 1(a) illustates that the elationship between and the atio x of nodes taking
5 1 4.5 x AD (load).2 AD (stoage) RD (load) RD (stoage) hop count to the closest povide AD (load) AD (stoage) (a) faction of coopeatos (b) hop count to the closest povide Figue 1. payoff matix vs. file availability and seach latency (scale-fee: m=4) the stategy caching that is deived by agent-based dynamics in a scale-fee netwok with m = 4. We discove that x deteioates with the incease of, namely the decease of demand, egadless of the cost models. In addition, the cost model of pocessing load causes the disappeaance of files with lage. On the othe hand, the file availability is enhanced by using the cost model of stoage capacity even if is 1. Next, Fig. 1(a) also shows x deived by eplicato dynamics. If the cost is the pocessing load, x of agent-based dynamics is lowe than that of eplicato dynamics excluding the case of smalle. On the contay, the cost model of stoage capacity enhances the file availability as x of agent-based dynamics achieves almost the same as that of eplicato dynamics. Figue 1(b) depicts that the seach latency inceases with the gowth of, independently of the cost models. This is because the numbe of povides deceases as shown in Fig. 1(a). In the case that the cost is the stoage capacity, x is highe than.4 even fo a low-demand file. Consequently, a node can educe the seach latency by finding out a close povide Impact of Netwok Stuctue. Figue 2 illustates x and the seach latency in scale-fee netwoks with m = 2, 4. Since the aveage degee is 2m, lage m makes a netwok dense. Figue 2(a) shows that smalle m pomotes to incease high-demand files, independently of the cost models. This is due to the effect of high degee nodes. A high degee node tends to acquie moe payoffs than othe nodes and be chosen fo compaison of payoffs by its neighboing nodes. As a esult, the stategy of a high degee node is likely to spead ove the netwok. The impact of high degee nodes is acceleated in a netwok with small m whee low degee nodes fequently exist. On the othe hand, Fig. 2(b) pesents that the seach latency of m = 2 is lowe than that of m = 4 if is smalle than.3 in the cost model of pocessing load and.5 in the cost model of stoage capacity. This is because files with smalle ae moe cached in the case of m = 2 as shown in Fig. 2(a). Since the incease of esults in the decease of povides, the seach latency of m = 4 becomes supeio to that of m = 2. Note that thee is slight diffeence between m = 2 and m = 4 in the cost model of stoage capacity. Figue 2 also shows that x and the seach latency in the andom netwok with m = 4. We find that x in the scalefee netwok is mainly lage than that in the andom netwok as shown in Fig. 2(a). Contay to ou expectation, Fig. 2(b) pesents that the seach latency in the scale-fee netwok is not so supeio to that in the andom netwok despite of its lowe diamete of the netwok (Tab. 4). This is because files tend to be cached at egula nodes athe than high degee nodes in the scale-fee netwok. In othe wods, we can alleviate load concentation on high degee nodes while suppessing the seach latency. Note that the diffeence of degee distibution does not so much affect to the seach latency if the cost is the stoage capacity. In summay, we can accomplish a file-shaing system with high file-availability and low seach-latency by using the cost model of stoage capacity independently of the netwok stuctues. 5. Conclusions In this pape, we evealed the elationship between node behavio and effective caching in the whole system by evolutionay game theoy so as to accomplish a file-shaing system with high file availability and low seach latency even if nodes behaved selfishly and autonomously. We fist made modeling a file-shaing system as two kinds of caching games between two neighboing nodes. Then, we
6 1 4.5 x load, SF (m=2) load, SF (m=4) load, RND (m=4).2 stoage, SF (m=2) stoage, SF (m=4) stoage, RND (m=4) hop count to the closest povide load, SF (m=2) load, SF (m=4) load, RND (m=4) stoage, SF (m=2) stoage, SF (m=4) stoage, RND (m=4) (a) faction of coopeatos (b) hop count to the closest povide Figue 2. impact of netwok stuctue (m=2 vs. m=4, scale-fee vs. andom) showed the basic chaacteistics of the models by analytically deiving the numbe of cache files in the system based on eplicato dynamics. Futhemoe, though simulation expeiments based on agent-based dynamics, we evaluated how much local node behavio had impact on the system pefomance. Simulation esults showed that modeling the cost fo caching as the stoage capacity made a file-shaing system obust to fie disappeaance independently of the netwok stuctues even if nodes behave selfishly. As futue eseach wok, we should examine a caching game that takes into account combination of multiple costs including dynamic costs, e.g., delay and bandwidth. Futhemoe, we plan to analyze the dynamics of infomation netwoks othe than the file-shaing system and popose contol mechanisms based on the analysis. Fo example, infomation tavels along a chain of intemediate nodes towad its destination in the following infomation systems: infomation distibution on an ovelay netwok, e.g., application level multicast, and infomation diffusion and gatheing on a senso netwok. Since fowading infomation takes costs, such as netwok bandwidth and electicity consumption, an effective fowading mechanism taking into account the significance of infomation is needed. Evolutionay game theoy can eveal node behavio suitable fo such effective infomation tansfe. Acknowledgement This eseach was suppoted by a Gant-in-Aid fo Young Scientists (B) and New Infomation Technologies fo Building a Netwoked Symbiosis Envionment of The 21st Centuy Cente of Excellence Pogam of the Ministy of Education, Cultue, Spots, Science and Technology in Japan. Refeences [1] BRITE. available at bite/. [2] NetLogo. available at edu/netlogo/. [3] E. Ada and B. A. Hubeman. Fee Riding on Gnutella. Technical Repot Xeox PARC, 2. [4] A.-L. Baabási and R. Albet. Emegence of Scaling in Random Netwoks. Science, 286, [5] B.-G. Chun, K. Chaudhui, H. Wee, M. Baeno, C. H. Papadimitiou, and J. Kubiatowicz. Selfish Caching in Distibuted Systems: A Game-Theoetic Analysis. In Poceedings of PODC 24, pages 21 3, Aveio, July 24. [6] K. P. Gummadi, R. J. Dunn, S. Saoiu, S. D. Gibble, H. M. Levy, and J. Zahojan. Measuement, Modeling, and Analysis of a Pee-to-Pee File-Shaing Wokload. In Poceedings of SOSP 23, pages , New Yok, Oct. 23. [7] S. Gyogy and F. Gabo. Evolutionay Games on Gaphs. AXiv Condensed Matte e-pints, July 26. [8] C. Hauet and M. Doebeli. Spatial Stuctue Often Inhibits The Evolution of Coopeation in The Snowdift Game. Natue, 428, 24. [9] J. M. Pacheco and F. C. Santos. Netwok Dependence of the Dilemmas of Coopeation. In Poceedings of CNET 24, pages 9 1, Aveio, Aug. 24. [1] K. Ranganathan, M. Ripeanu, A. Sain, and I. Foste. Incentive Mechanisms fo Lage Collaboative Resouce Shaing. In Poceedings of CCGRID 24, pages 1 8, Washington, DC, 24. [11] A. Rowston and P. Duschel. Stoage Management and Caching in PAST, a Lage-Scale, Pesistent Pee-to-Pee Stoage Utility. In Poceedings of SOSP 21, pages , New Yok, Oct. 21. [12] F. C. Santos and J. M. Pacheco. A New Route to the Evolution of Coopeation. Jounal of Evolutionay Biology, 19(3): , 26. [13] B. M. Waxman. Routing of Multipoint Connections. IEEE Jounal on Selected Aeas in Communications, 6(9): , Dec
Controlled Information Maximization for SOM Knowledge Induced Learning
3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity
More informationIP Network Design by Modified Branch Exchange Method
Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management
More informationarxiv: v2 [physics.soc-ph] 30 Nov 2016
Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity
More informationPerformance Optimization in Structured Wireless Sensor Networks
5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame
More informationJournal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012
2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo
More informationTopological Characteristic of Wireless Network
Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences
More informationPoint-Biserial Correlation Analysis of Fuzzy Attributes
Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh
More informationObstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor
Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,
More informationAn Unsupervised Segmentation Framework For Texture Image Queries
An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu
More informationHierarchically Clustered P2P Streaming System
Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.
More informationSegmentation of Casting Defects in X-Ray Images Based on Fractal Dimension
17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach
More informationRANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES
RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class
More informationNumber of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks
Numbe of Paths and Neighbous Effect on Multipath Routing in Mobile Ad Hoc Netwoks Oday Jeew School of Infomation Systems and Accounting Univesity of Canbea Canbea ACT 2617, Austalia oday.jeew@canbea.edu.au
More informationQuality Aware Privacy Protection for Location-based Services
In Poceedings of the th Intenational Confeence on Database Systems fo Advanced Applications (DASFAA 007), Bangkok, Thailand, Apil 9-, 007. Quality Awae Pivacy Potection fo Location-based Sevices Zhen Xiao,,
More informationDecentralized Trust Management for Ad-Hoc Peer-to-Peer Networks
Decentalized Tust Management fo Ad-Hoc Pee-to-Pee Netwoks Thomas Repantis Vana Kalogeaki Depatment of Compute Science & Engineeing Univesity of Califonia, Riveside Riveside, CA 92521 {tep,vana}@cs.uc.edu
More informationA modal estimation based multitype sensor placement method
A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;
More informationColor Correction Using 3D Multiview Geometry
Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,
More informationANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS
ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth
More informationIP Multicast Simulation in OPNET
IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok
More informationA New Finite Word-length Optimization Method Design for LDPC Decoder
A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology
More informationA Recommender System for Online Personalization in the WUM Applications
A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based
More informationSlotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System
Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet
More informationCombinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments
Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile
More informationWIRELESS sensor networks (WSNs), which are capable
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan
More informationFINITE ELEMENT MODEL UPDATING OF AN EXPERIMENTAL VEHICLE MODEL USING MEASURED MODAL CHARACTERISTICS
COMPDYN 009 ECCOMAS Thematic Confeence on Computational Methods in Stuctual Dynamics and Eathquake Engineeing M. Papadakakis, N.D. Lagaos, M. Fagiadakis (eds.) Rhodes, Geece, 4 June 009 FINITE ELEMENT
More informationSimulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM
J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on
More informationHierarchical Peer-to-peer Systems
Hieachical Pee-to-pee ystems L. Gacés-Eice 1, E.W. Biesack 1, P.A. Felbe 1, K.W. Ross 2, and G. Uvoy-Kelle 1 1 Institut EURECOM 06904 ophia Antipolis, Fance {gaces ebi felbe uvoy}@euecom.f 2 Polytechnic
More informationGeneralized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences
Ameican Jounal of ata ining and Knowledge iscovey 27; 2(4): 2-8 http://www.sciencepublishinggoup.com//admkd doi:.648/.admkd.2724.2 Genealized Gey Taget ecision ethod Based on ecision akes Indiffeence Attibute
More informationLifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks
788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,
More informationCommunication vs Distributed Computation: an alternative trade-off curve
Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,
More informationa Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives
SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which
More informationSYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH
I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,
More informationErasure-Coding Based Routing for Opportunistic Networks
Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant
More informationAnnales UMCS Informatica AI 2 (2004) UMCS
Pobane z czasopisma Annales AI- Infomatica http://ai.annales.umcs.pl Annales Infomatica AI 2 (2004) 33-340 Annales Infomatica Lublin-Polonia Sectio AI http://www.annales.umcs.lublin.pl/ Embedding as a
More informationTHE THETA BLOCKCHAIN
THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent
More informationOptical Flow for Large Motion Using Gradient Technique
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this
More informationA New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE
5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai
More informationA Novel Automatic White Balance Method For Digital Still Cameras
A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing
More informationThe Internet Ecosystem and Evolution
The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee
More informationThe EigenRumor Algorithm for Ranking Blogs
he EigenRumo Algoithm fo Ranking Blogs Ko Fujimua N Cybe Solutions Laboatoies N Copoation akafumi Inoue N Cybe Solutions Laboatoies N Copoation Masayuki Sugisaki N Resonant Inc. ABSRAC he advent of easy
More informationGravitational Shift for Beginners
Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational
More informationSpiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks
Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition
More informationOn the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks
On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New
More informationDetection and Recognition of Alert Traffic Signs
Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives
More informationAssessment of Track Sequence Optimization based on Recorded Field Operations
Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment
More informationA Memory Efficient Array Architecture for Real-Time Motion Estimation
A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN
More informationImage Enhancement in the Spatial Domain. Spatial Domain
8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along
More informationIllumination methods for optical wear detection
Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical
More informationShortest Paths for a Two-Robot Rendez-Vous
Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal
More informationModelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set
Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;
More informationAnalysis of Wired Short Cuts in Wireless Sensor Networks
Analysis of Wied Shot Cuts in Wieless Senso Netwos ohan Chitaduga Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles 90089, USA Email: chitadu@usc.edu Ahmed Helmy Depatment
More informationA Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation
A Minutiae-based Fingepint Matching Algoithm Using Phase Coelation Autho Chen, Weiping, Gao, Yongsheng Published 2007 Confeence Title Digital Image Computing: Techniques and Applications DOI https://doi.og/10.1109/dicta.2007.4426801
More informationAdaptation of TDMA Parameters Based on Network Conditions
Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.
More informationMulti-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples
Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits
More informationA ROI Focusing Mechanism for Digital Cameras
A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula
More informationConversion Functions for Symmetric Key Ciphers
Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401
More information= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2
Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used
More informationMonte Carlo Simulation for the ECAT HRRT using GATE
Monte Calo Simulation fo the ECAT HRRT using GATE F. Bataille, C. Comtat, Membe, IEEE, S. Jan, and R. Tébossen Abstact The ECAT HRRT (High Resolution Reseach Tomogaph, CPS Innovations, Knoxville, TN, U.S.A.)
More informationDesired Attitude Angles Design Based on Optimization for Side Window Detection of Kinetic Interceptor *
Poceedings of the 7 th Chinese Contol Confeence July 6-8, 008, Kunming,Yunnan, China Desied Attitude Angles Design Based on Optimization fo Side Window Detection of Kinetic Intecepto * Zhu Bo, Quan Quan,
More informationAN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE
AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity
More informationTransmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design
Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced
More informationA Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform
A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad
More informationDEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson
DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:
More informationPrioritized Traffic Recovery over GMPLS Networks
Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing
More informationEffects of Model Complexity on Generalization Performance of Convolutional Neural Networks
Effects of Model Complexity on Genealization Pefomance of Convolutional Neual Netwoks Tae-Jun Kim 1, Dongsu Zhang 2, and Joon Shik Kim 3 1 Seoul National Univesity, Seoul 151-742, Koea, E-mail: tjkim@bi.snu.ac.k
More informationPositioning of a robot based on binocular vision for hand / foot fusion Long Han
2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,
More informationADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM
ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,
More informationMobility Pattern Recognition in Mobile Ad-Hoc Networks
Mobility Patten Recognition in Mobile Ad-Hoc Netwoks S. M. Mousavi Depatment of Compute Engineeing, Shaif Univesity of Technology sm_mousavi@ce.shaif.edu H. R. Rabiee Depatment of Compute Engineeing, Shaif
More informationEvent-based Location Dependent Data Services in Mobile WSNs
Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,
More informationTitle. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information
Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220
More informationHISTOGRAMS are an important statistic reflecting the
JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe
More informationOn Error Estimation in Runge-Kutta Methods
Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment
More informationScaling Location-based Services with Dynamically Composed Location Index
Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute
More informationHigh performance CUDA based CNN image processor
High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu
More informationA VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM
Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,
More informationTowards Adaptive Information Merging Using Selected XML Fragments
Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,
More informationModeling spatially-correlated data of sensor networks with irregular topologies
This full text pape was pee eviewed at the diection of IEEE Communications Society subject matte expets fo publication in the IEEE SECON 25 poceedings Modeling spatially-coelated data of senso netwoks
More informationSCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS
SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),
More informationCryptanalysis of Hwang-Chang s a Time-Stamp Protocol for Digital Watermarking
Cyptanalysis of Hwang-Chang s a Time-Stamp Potocol fo Digital Watemaking *Jue-Sam Chou, Yalin Chen 2, Chung-Ju Chan 3 Depatment of Infomation Management, Nanhua Univesity Chiayi 622 Taiwan, R.O.C *: coesponding
More informationOn using circuit-switched networks for file transfers
On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed
More informationFrequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters
Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using
More informationInput Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer
Using the Gow-And-Pune Netwok to Solve Poblems of Lage Dimensionality B.J. Biedis and T.D. Gedeon School of Compute Science & Engineeing The Univesity of New South Wales Sydney NSW 2052 AUSTRALIA bbiedis@cse.unsw.edu.au
More informationClustering Interval-valued Data Using an Overlapped Interval Divergence
Poc. of the 8th Austalasian Data Mining Confeence (AusDM'9) Clusteing Inteval-valued Data Using an Ovelapped Inteval Divegence Yongli Ren Yu-Hsn Liu Jia Rong Robet Dew School of Infomation Engineeing,
More informationExperimental and numerical simulation of the flow over a spillway
Euopean Wate 57: 253-260, 2017. 2017 E.W. Publications Expeimental and numeical simulation of the flow ove a spillway A. Seafeim *, L. Avgeis, V. Hissanthou and K. Bellos Depatment of Civil Engineeing,
More informationAPPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE
APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE 1 YAROSLAVTSEV A.F., 2 Al-THUNEIBAT S.A., 3 AL TAWALBEH N.A 1 Depatment of Netwoking, SSUTI, Novosibisk, Russia
More informationUCLA Papers. Title. Permalink. Authors. Publication Date. Localized Edge Detection in Sensor Fields. https://escholarship.org/uc/item/3fj6g58j
UCLA Papes Title Localized Edge Detection in Senso Fields Pemalink https://escholashipog/uc/item/3fj6g58j Authos K Chintalapudi Govindan Publication Date 3-- Pee eviewed escholashipog Poweed by the Califonia
More informationSecure Collaboration in Mediator-Free Environments
Secue Collaboation in Mediato-Fee Envionments Mohamed Shehab School of Electical and Compute Engineeing Pudue Univesity West Lafayette, IN, USA shehab@pudueedu Elisa Betino Depatment of Compute Sciences
More informationXFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers
XFVHDL: A Tool fo the Synthesis of Fuzzy Logic Contolles E. Lago, C. J. Jiménez, D. R. López, S. Sánchez-Solano and A. Baiga Instituto de Micoelectónica de Sevilla. Cento Nacional de Micoelectónica, Edificio
More informationAny modern computer system will incorporate (at least) two levels of storage:
1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe
More informationA Two-stage and Parameter-free Binarization Method for Degraded Document Images
A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and
More informationTier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints
Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok 14260 Email:
More informationDynamic Topology Control to Reduce Interference in MANETs
Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity
More informationModule 6 STILL IMAGE COMPRESSION STANDARDS
Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.
More informationSeparability and Topology Control of Quasi Unit Disk Graphs
Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,
More informationData mining based automated reverse engineering and defect discovery
Data mining based automated evese engineeing and defect discovey James F. Smith III, ThanhVu H. Nguyen Naval Reseach Laboatoy, Code 5741, Washington, D.C., 20375-5000 ABSTRACT A data mining based pocedue
More informationINFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM
INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300
More informationLoss-Cognizant Pricing in Feed-Forward Networks with Greedy Users
Loss-Cognizant Picing in Feed-Fowad Netwoks with Geedy Uses Ashaf Al Daoud and Muat Alanyali Depatment of Electical and Compute Engineeing Boston Univesity, Boston, MA 02215 Email: {ashaf, alanyali}@bu.edu
More informationExtensive games with imperfect information
Extensive games with impefect infomation ECON500 Advanced micoeconomics ectues in game theoy Fall 0, Pat 3 7.07.0 G.. Asheim, ECON500-3 Incomplete Complete infomation infomation Pefect infomation Impefect
More informationAnd Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,
(IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Efficient Candidacy Reduction Fo Fequent Patten Mining M.H Nadimi-Shahaki 1, Nowati Mustapha 2, Md Nasi B Sulaiman 2, Ali B Mamat
More informationLecture # 04. Image Enhancement in Spatial Domain
Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency
More information