An Efficient Delivery Scheme for Coded Caching

Size: px
Start display at page:

Download "An Efficient Delivery Scheme for Coded Caching"

Transcription

1 201 27h Inernaional Teleraffic Congress An Efficien Delivery Scheme for Coded Caching Abinesh Ramakrishnan, Cedric Wesphal and Ahina Markopoulou Deparmen of Elecrical Engineering and Compuer Science, Universiy of California, Irvine {abinesh.r, ahina}@uci.edu Huawei Innovaion Cener, Sana Clara, CA Deparmen of Compuer Engineering, Universiy of California, Sana Clara cedric.wesphal@huawei.com, cedric@soe.ucsc.edu Absrac We consider a nework wih several users rying o access a daabase of files sored a a server hrough a shared link. Each user is equipped wih a cache, where files can be prefeched according o a caching policy which is mainly based on he populariies of he files. Coded caching ries o exploi coding opporuniies creaed by cooperaive caching and has been shown o significanly reduce he load on he shared link. Mos of he prior works focused on opimizing he caching policy so as o minimize his expeced load. Given he caching policy and he user demands, he problem of minimizing he load over he shared link is essenially an index coding problem. In his paper, we design a novel delivery scheme ha builds on a prior scheme for he uniform demand case, bu performs beer in he nonuniform demand case. We also evaluae his delivery scheme for differen caching policies. I. INTRODUCTION Today s Inerne raffic is dominaed by conen disribuion services like live-sreaming and video-on-demand. Demand for delivery of video conen o Inerne capable smarphones and oher mobile devices has been one of he mos driving force behind he explosive growh of raffic in he recen imes. Popular services like Neflix, YouTube, ec, exhibi wo imporan feaures: (i he user demands are predicable based on heir saisical hisory [] and (ii hey exhibi srong emporal variabiliy, resuling in highly congesed peak hours and underuilized off-peak hours. A common approach is o ake advanage of he memories disribued across he nework (a end users and/or inside he nework o sore some of he popular conens. This process, ermed caching, can be done during off-peak hours, so ha during peak hours user requess can be served from hese locally available memories wihou having o burden he nework. Design and analysis of caching echniques for various kinds of neworks have been researched exensively in he pas [1], [4], [11], [14], [18], [19] along wih he impac of user demand saisics (file populariies on he performance of caching [], [7], [23]. This body of prior work only considered uncoded caching. I is easy o see ha filling he cache wih he mos popular files (LU is indeed he opimal sraegy for a sysem wih only one user [13], bu as we move on o sysems wih requess from muliple users, new challenges and opporuniies arise. A recenly suggesed mehod combines caching of files on he user devices wih a common mulicas ransmission of nework-coded daa [20], [22]. A coded caching sraegy was proposed by Maddah-Ali e al. in [17] for a sysem of uniform user demands and cenralized conen placemen scheme and was exended o decenralized approach [16] This work was parially suppored by NS Awards (CAREER and A. Ramakrishnan and A. Markopoulou were affiliaed wih CPCC a UCI. Par of he work was conduced during A. Ramakrishnan s inernship a Huawei. and non-uniform Zipf based user demands in [21]. In [1], Llorca e al. presened a formulaion for he general conen disribuion problem, where nodes in an arbirary nework are allowed o cache, forward, replicae, and code messages in order o deliver arbirary user demands wih minimum overall nework cos. In a recen work [], Ji e al. showed order opimaliy for a caching policy ha is uniform or uniform over a subse of he files based on he Zipf parameer for a Zipf disribued file populariy disribuion. Anoher recenly suggesed approach is emocaching [6], which involves deploying a large number of dedicaed helper nodes ha cache popular file and serve he users demands locally. In his approach, he caching is done a he helper nodes raher han a he end users. A hird recenly suggesed approach combines caching of files on he user devices wih shor range device-o-device communicaions [8], [9]. In his approach, he caches of muliple devices form a common virual cache ha can sore a large number of video files, even if he cache on each separae device is no necessarily very large. In our work we sudy he coded caching approach, we consider a seup very similar o he one in [17]. The coded caching problem ypically consiss of wo phases, he placemen phase where he conens are placed in local memory based on he saisics of user demands (file populariies and he delivery phase where he remaining conen, which is no available locally, is delivered afer he demands of he users have been revealed. In his paper, we focus mainly on he delivery phase. Our main conribuion is he design and evaluaion of he Heerogenous Coded Delivery (HCD scheme ha improves upon he curren sae-of-he-ar in coded caching and significanly reduces he load on he server and he shared link during he delivery phase. The srucure of he res of he paper is as follows. In Secion II, we formulae he problem. In Secion III, we discuss he inuiion and background of coded caching. In Secion IV, we presen he proposed heerogenous coded delivery scheme and explain is working in deail. In Secion V, we presen an evaluaion of he proposed scheme. Secion VI concludes he paper. II. MODEL AND ASSUMPTIONS In his paper, we consider a se of users accessing he conen server hrough a shared link as shown in igure 1. By designing an efficien delivery scheme we can reduce he load on he shared link. A. Problem Seing We consider a sysem consising of a server conneced hrough a shared, error-free link o users as illusraed in ig /1 $ IEEE DOI.19/ITC

2 N files User 1 Z1 Z2 message X (d1,...,d k of size R (d1,...,d k bis over he shared link for some fixed real number R (d1,...,d k. R (d1,...,d k is referred o as he load in his paper and is a measure of he lengh of he message. Using is cache conen Z k and he message X (d1,...,d k received over he shared link, each user k aims o reconsruc is requesed file W dk. ig. 1. Server shared link Problem Seup for Coded Caching. User 2 User Zk size M caches 1. The server has access o a daabase of N files W 1,...,W N each of size bis. Wihou loss of generaliy, we assume all files o be of he same size 1. Each user k has an isolaed cache memory Z k of size M bis (MB packes for some real number M [0,N]. The populariy of a file W n is he probabiliy ha his file is requesed by a user. The file populariy disribuion in he server is p =[p n ] N n=1, where N n=1 p n =1. W.l.o.g. we can assume p 1 p 2 p N. The sysem operaes in wo phases: a placemen phase and a delivery phase. In he placemen phase, he users are given access o he enire daabase W 1,...,W N of files. Each user k is hen able o fill he conen of is cache Z k using he daabase. The users follow a caching policy q =[q n ] N n=1, where q n denoes he fracion of he cache space in each user ha will be allocaed o he file W n and N n=1 q n =1. The caching can eiher be done in a cenralized manner, where he server besides deciding he caching policy q also decides wha pars of each file is sored in each user s cache; or in a decenralized/disribued approach. In he decenralized approach, he server has no conrol over which pars of he file goes ino each user s cache, i can only conrol wha fracion of each file is cached (i.e. he caching policy q. The users randomly cache some porion (he size of his porion alone is dicaed by he server of each file in heir corresponding cache. The server is assumed o have complee knowledge of Z k, he conen of he cache of user k. By knowing he conen of cache Z k, he server knows which bis/packes of each file are sored in he cache of user k. In he delivery phase, only he server has access o he daabase. Each user k requess one of he files W dk in he daabase, where d k represens he index of he file requesed by user k. The vecor (d 1,...,d k is a vecor of indices of he files requesed simulaneously by all users ordered accordingly. The file requess are independenly and idenically disribued across all he users and follow he populariy disribuion p. The probabiliy ha a user requess file n is p n. The server is informed of hese requess and proceeds by ransmiing a 1 iles of differen sizes can be spli ino smaller files of he same size. B. Problem Saemen Problem Saemen. Given he cache conen Z k for each user k and he exac demand vecor (d 1,d 2,...,d, wha is he opimal lengh R(d of message X 1,...,d k (d 1,...,d k ha he server should ransmi o saisfy he given demand? In general, his is an opimizaion of he delivery scheme and assumes he conen of he caches o be given. As shown in he nex subsecion, his opimizaion is in general NP-hard. Here we design a pracical delivery scheme for he given cache sae ha helps o reduce he lengh of he message X (d1,...,d k compared o he curren sae of he ar scheme in [21]. The expeced load is defined as he expecaion of he loads over all possible demand vecors, i.e. R(p = R (d1,...,d p d1 p d2 p d and will be used o evaluae how he delivery schemes perform over all (d 1,...,d demands. C. ormulaion In general, he process of various users caching differen pars of a given file resuls in spliing a file ino several nonoverlaping subfiles, such ha each subfile is presen in he caches of a disinc subse of users. Consider a file in he server, say A, here are users in he sysem and during he placemen phase, based on he caching policy, differen pars of his file A migh ge placed a he cache of each user. Grouping he bis of his file based on he se of users hey are cached a, he file A can be spli ino several subfiles A S, where each subfile A S denoes he group of bis ha are sored only in he cache of he specific se of users given by he corresponding S {1,...,}. or example, le us say here are =2 users, hen he file A can be possibly spli ino A {},A {1}.A {2} and A {1,2}. Here A {} represens all he bis ha are cached a neiher of he wo users, A {1} (A {2} represens he bis ha are cached only a user 1(2 and A {1,2} represens he bis ha are cached a boh users 1 and 2. Noe ha hese subfiles are non-overlapping, i.e. if a bi of he file is presen in one subfile i canno be presen in any oher subfile. Also noe ha no all subfiles have o be populaed, in he example above if no even a single bi of file A is cached a boh user 1 and 2 hen A {1,2} is unpopulaed and hence can be discarded. The cache Z k of he user k can be hough of as a collecion of such subfiles ha are cached a his user k. The subfiles can in urn be classified ino ypes based on he number of users hey are cached a. We say a subfile is of ype if exacly users have cached he bis of his subfile. I is easy o see ha here are +1 ypes of subfiles and here are ( subfiles for each ype. In a cenralized approach, he server has complee conrol over which bi of each file ges placed in he cache of each user. This basically means ha he server can deermine how a file is spli in he subfiles defined above. In he decenralized 47

3 approach, since he users randomly choose he bis hey will cache, he spliing is also randomized. Now consider a demand vecor (d 1,d 2,...,d, which indicaes ha user 1 demands file W d1, user 2 requess file W d2, and so on. To simplify noaion, le V k denoe he file requesed by user k, i.e. V k = W dk and V k,s denoe he subfiles corresponding o he file W dk ha are requesed by user k and are only available in he cache of users in S. The noaion S is used o refer o some ordered se of users, S {1, 2,...,}. or a given demand, based on he cache conen across all users, he server creaes subfiles of he form V k,s, for each user k, which will be used for ransmission. The user k already knows some subfiles of he file V k, as hese subfiles are already presen in is cache Z k ; so he server only needs o ransmi he subfiles ha are no presen in is cache Z k o saisfy user k s demand, i.e. he server needs o send all populaed subfiles of he form V k,s\{k} S, for ha paricular user k. Noe ha even if wo users, i and j, reques he same subfile, say A S, we will use separae noaions V i,s and V j,s o denoe he subfile requesed by he respecive users. or a given caching and demand vecor, finding he delivery scheme ha minimizes he code lengh of he message is equivalen o solving an index coding problem [2], [3] whose side informaion graph is deermined by he caching configuraion. The side informaion graph G = (V, E, where V denoes he se of verices and E he se of (direced edges, can be consruced as follows Each bi requesed by each user is represened as a verex. More specificially, every verex v V corresponds o a bi in a subfile of he form V k,s\{k} ha is requesed by user k and is cached only a all he users in he se S\{k}. If wo users reques he same bi of a file, hen ha bi is represened by wo disinc verices. Noe ha he noaion V k,s\{k}, when used in conex of he side informaion graph, denoes he group of verices ha represen he bis in he subfile V k,s\{k}. There exiss an edge (u, v Eiff he cache of he user requesing he bi represened by u conains he bi represened by v. I is well-known ha he index coding problem is, in general, NP-hard [12]. One can use he chromaic number based approach o ge a sub-opimal soluion [] by consrucing an undireced graph G a = (V, E a similar o G. The verices of G a are he same as he verices of G and here exiss an undireced edge (u, v E a beween wo verices u and v iff he cache of he user requesing he bi represened by u conains he bi represened by v and he cache of he user requesing he bi represened by v also conains he bi represened by u. The chromaic number soluion for he complemen graph of G a, which is equivalen o he minimum clique cover of he graph G a, will give a subopimal approach for he delivery scheme in our problem, bu finding he chromaic number is also known o be NP-hard, in general. III. BACGROUND ON CODED CACHING In his secion, we presen background on coded caching and a raher deailed overview of prior work, including observaions and insighs ha inspired our new scheme. A. Uniform Demands We sar from he inuiion of he caching policy and he delivery scheme for he uniform demands scenario, considered in [17]. The N files in he daabase of he server are assumed o have equal populariy here, i.e. he probabiliy ha a given file is requesed by a user is 1/N. Due o he uniform populariy, i only makes sense ha an equal porion of each file be cached a he user caches and since each user has a cache of size M files, some M/N porion of each file should be cached a every user. In oher words, we choose a caching policy where q n = M/N for all n. Also noe ha, [17] considers a cenralized placemen scheme, where he server can deermine which bis of each file ges cached a each user. Le us consider a file A. The caching policy dicaes ha each user caches M/N bis of his file. In order o deermine which bis ge placed a which user s cache, he server splis his file A ino ( subfiles of ype each labeled as AS, for some S. The subse S comprises of users and i is easy o see ha here are ( such subses for a sysem wih users. Since he conen of he subfiles are nonoverlapping, each subfile will conain / ( bis of he file A. A user k mus cache all he subfiles A S, where k S. There are ( 1 1 such subfiles for each user and he oal bis in hem should add up o M/N bis for each user. ( 1 = M N 1 ( = M N Thus he server will spli each file ino subfiles of ype = M/N in order o help he users deermine which bis hey will be soring in heir respecive caches. Designing an opimal delivery scheme for a given demand vecor is equivalen o solving an index coding problem. Due o he NP-hardness of his problem, pracical soluions consider subopimal soluions. The cenralized placemen scheme, described above, coupled wih he uniform caching policy inroduces a symmery in he sysem ha makes i easier o find he minimum clique cover (chromaic number soluion for any given demand vecor. The undireced graph G a =(V, E a can be consruced for a given demand vecor as explained in secion II-C. or every user, here are ( 1, subfiles each wih / ( bis ha are no cached a ha paricular user. So he server needs o ransmi a oal of ( ( 1 / bis o saisfy he demand, i.e. V = ( ( 1 / = (1 M/N. An uncoded delivery scheme would require he server o send all hose bis one by one (in he wors case scenario, when each user demands a differen file o saisfy he demand. The minimum clique cover provides a coding mechanism which would significanly reduce he number of bis ha he server needs o ransmi. Consider a subse S of +1 users, for each k Sconsider a node in G a ha represens a bi in he subfile V k,s\{k}. These +1 nodes can form a clique of size +1. By coding (XORing ogeher all he +1 bis represened by hese nodes and ransmiing hem o all users in S, each user in S will be able o decode is desired bis using he informaion sored in is own cache. Noe ha / ( cliques are required o cover all he bis in a subfile and each clique covers a bi in +1 subfiles. Each clique here is a 48

4 maximal clique and subsequenly i is no hard o see ha he cover indeed uses a minimum number of cliques. This whole process of clique cover based coding can be hough of biwise coding (XOR he subfiles of he form V k,s\{k} k S and repeaing his for all S of size +1. In he end here will be / ( ( cliques for each subse S of size +1 and +1 such subses, ( so he server only needs o send a message of size ( +1 / bis o saisfy all he demands. The ransmied message lengh R (d1,...,d k = ( ( +1 / remains he same across all demand vecors because of he symmery and he uniformiy in he placemen and delivery schemes. or easier noaion, le us denoe his load R (d1,...,d k as jus R. In [17], R is shown o be informaion heoreically opimal. R = ( +1 1 ( = +1 = (1 M/N 1+M/N In he decenralized approach for conen placemen, he server has no conrol over which bis are cached a each user, so i is no possible o look a he files as a collecion of subfiles of a single ype. The users randomly selec M/N bis o sore in heir cache and based on his random placemen of bis, each file can be seen as a collecion of subfiles of various ypes. An algorihm was provided in [16] for he delivery in he decenralized seup, which was sill based on he clique cover approach, bu he clique cover soluion yielded by his algorihm is no necessarily he minimum. Insigh. More imporanly, he algorihm in [16] was resriced o form cliques only beween nodes (i.e., code he corresponding bis ogeher in he subfiles of he same ype, and hus missed coding opporuniies We build upon his observaion and design a new delivery scheme, which considers more coding opporuniies by forming cliques beween nodes no only of he same, bu also of differen ype. B. Non-Uniform Demands Alhough uniform demands faciliae analysis, file populariies are far from uniform in pracice; in fac, hey could vary several orders of magniude. In he uniform case, each file has he same probabiliy of being requesed by a user, hus i is naural o allocae equal cache o each file a every user. In he non-uniform case, he leas popular file almos never ge requesed by users. Therefore, cache should no be allocaed equally o highly popular files and leas popular files. An inuiive way o share he cache is o make he caching policy q follow he populariy disribuion p. The work in [21] considers Zipf-disribued file populariies and hey propose a caching policy ha groups files ogeher. The files are divided ino groups based on he closeness in heir populariies and he caching policy q is designed such ha all he files in he same group will have he same amoun of cache space, q n, which is deermined by dividing he cumulaive populariy of all he files in he corresponding group by he oal number of files in ha group. However, files in differen groups will have differen q n (cache space allocaion. They also explicily sae ha he grouping can be opimized o minimize he expeced load. The work in [] considers Zipf file populariies, bu proposes a simpler and differen caching policy han he one in (1 [21]. [] divides he files ino jus wo groups. The files in one group are no allocaed any cache space a all, i.e. q n =0for all he files in his group, whereas he files in he oher group ge o divide he enire cache space equally among hemselves (q n = M/group size, for all files in his group. Boh [21] and [] assume a decenralized placemen scheme, because a cenralized approach would require a lo of work from he server, which is no as pracical as he decenralized approach. Unlike he uniform case, he load R (d1,...,d k varies across all demand vecors, hus i is more meaningful o consider he expeced load R(p insead. The delivery scheme used in [21] is essenially he same as he one in [16], as discussed briefly in secion III-A. The key idea behind he scheme in [21] is o code (biwise XOR ogeher all he subfiles of he form V k,s\{k} k S and repeaing his coding procedure for all valid S. If he size of hese subfiles is no he same, which is usually he case when employing non-uniform caching policy and/or decenralized placemen scheme, he scheme jus pads hem wih zeros o make all heir sizes he same. Considering a graph G a consruced based on he cache conen of he users, for each S, he algorihm ries o cover all he nodes in he groups of he form V k,s\{k} k S,by rying o form cliques of maximum size S \ {k} beween he nodes across he groups V k,s\{k} k S. If i canno find any uncovered node wihin he groups V k,s\{k} k S o form a clique of size S \ {k}, hen he algorihm simply chooses o form a clique of lower size wih he available nodes. Insigh. In he siuaion jus described above, he algorihm unnecessarily resrics iself from considering all coding opporuniies: i could form a bigger clique wih nodes from a differen group of he form V k,s \{k}, where S S. This is he key poin we will exploi in he improved algorihm ha we presen in he nex secion. The delivery scheme in [] makes use of he minimum clique cover soluion, bu finding he minimum clique cover is NP-hard and [] does no provide any pracical algorihm o do ha efficienly. Boh [21] and [], prove ha heir respecive placemen and delivery scheme combinaions are indeed order opimal. In paricular, [21], chooses a specific grouping, where files wih populariy differing by a mos a facor of wo are grouped ogeher, o prove he order opimaliy of heir approach. IV. HETEROGENOUS CODED DELIVERY In his secion, we propose he Heerogenous Coded Delivery scheme (HCD. irs, we define he algorihm and we discuss he core ideas and inuiion on how his scheme achieves beer performance han he sae-of-he-ar in [16] and [21]. Then, we walk hrough he deails of his new scheme hrough an illusraive example. A. The Scheme The pseudocode for he HCD scheme is presened in Algorihm 1. HCD can be used wih boh cenralized and decenralized placemen approaches. The new scheme, similar o he ones in [16], [21], is sill based on finding a clique cover for he graph G a. Bu HCD explois he possibiliies of forming cliques wih nodes from subfiles of higher ypes, which could poenially reduce he number of cliques required for he cover. The users have already populaed he cache 49

5 based on some caching policy and placemen scheme. Once he server is informed of he user requess, i.e. he demand vecor (d 1,...,d, i would be able o forma he subfiles V k ha are required for ransmission. Algorihm 1 Heerogenous Coded Delivery (HCD 1: procedure DELIVERY(d 1,...,d 2: for =1, 2,..., 1, do 3: 4: for S [] : S = do binsize =max k S V k,s\{k} : 6: for k S do if V k,s\{k} <binsizehen 7: Move (binsize V k,s\{k} bis from non-empy bins V k,s \{k} : S S o emp 8: Creae new subfile V k,s\{k} 9: V k,s\{k} k,s\{k} + emp : coded coded V k,s\{k} 11: else 12: coded coded V k,s\{k} 13: end if 14: end for 1: server ransmis subfile coded 16: end for 17: end for 18: end procedure The procedure DELIVERY is called for he given demand vecor o deermine he message X (d1,...,d k ha needs o be ransmied o saisfy he demands. The scheme requires o ierae over all possible subses of users, S, and he wo ouermos loops in he algorihm help o do ha. Noe ha in Algorihm 1, we use he noaion [] o refer o he se {1, 2,...,}, he operaor + refers o concaenaion and refers o biwise XOR operaion. The innermos loop helps o ierae hrough each user wihin a given subse S. The seps wihin he inner mos loop are he core of he algorihm and he difference beween our algorihm and hose presened in [16], [21]. Recall ha he algorihms in [16], [21] code ogeher all he subfiles of he form V k,s\{k} k S, afer appending zeros o make hem all of he same size (equal number of bis. In our algorihm, insead of appending zeros righ away, we firs ry o borrow bis from he immediae higher ype subfiles of he form V k,s \{k}, where S S. Afer exhausing all he opions for borrowing, we append zeros. In he algorihm, his borrowing process is accompanied by a sep involving he creaion of new subfile V k,s\{k}. We do his o avoid conflic wih he definiion of V k,s \{k}. Noe ha here are bis in he new subfile ha, alhough presen in he caches of users in S\{k}, are no longer cached only a hese user in S\{k}. Since S can be any superse of S, all he bis in he new subfile V k,s\{k} are cached a all he users in S\{k} and so hey would sill be able o decode heir respecive bis using he informaion presen in heir cache. Also noe ha he borrowing process acually involves moving bis from he original subfile, no jus copying hem. I is imporan o firs code and ransmi he subfiles of lower ype before moving on o higher ypes, because a subfile can only borrow bis from he corresponding subfiles of higher ypes. In graph heoreic erms, we consider a graph G a consruced based on he cache conen of he users, as in [16], [21]. or each S he algorihm ries o cover all he nodes in W1 p1 =0.3 W2 p2 =0.2 W3 p3 =0.2 W4 p4 =0.2 W p =0.1 ig. 2. ile Server wih N =and populariy disribuion p. he groups of he form V k,s\{k} k S, by rying o form cliques of maximum size S \ {k} beween he nodes across he groups V k,s\{k} k S. Our algorihm differs in he fac ha, if i canno find any uncovered node wihin he groups V k,s\{k} k So form a clique of size S \ {k}, insead of jus seling wih forming a clique of lower size, our algorihm ries o cover he nodes from he corresponding higher ype groups V k,s \{k}, where S S. We would like o poin ou ha, since our algorihm ries o cover nodes from higher ype groups whenever possible, even in he wors-case scenario he performance of our algorihm will be a leas as good as he ones in [16], [21]. Observe ha we do no ry o opimize he borrowing sep, i.e. we do no ry o deermine he subfiles o borrow bis from such ha final clique is minimized. The opimizaion of his sep is he core of he minimum clique cover and so could be NP-hard. Insead, we choose o go wih a simpler and more pracical approach wherein a subfile V k,s\{k},if required, will firs borrow from a valid immediae higher ype subfile of he form V k,s \{k}, where S S. or example, consider an ieraion where we are rying o code ogeher he subfiles V 1,{2}, which has bis, and V 2,{1}, which only has 1 bi, and he oher subfiles relaed o user 2 presen in he sysem are V 2,{1,3,4},V 2,{1,4,} and V 2,{1,3,4,} wih 2 bis each. The algorihm will firs ry o borrow from he immediae higher ype subfiles, which in his case are V 2,{1,3,4} and V 2,{1,4,}. The nex higher ype subfile V 2,{1,3,4,} will only be considered if V 2,{1,3,4} and V 2,{1,4,} do no have enough bis o borrow from. B. Example We now presen a deailed walkhrough of our algorihm hrough an illusraive example. This will help highligh he subleies in he proposed scheme. Example 1. Consider a sysem wih a server consising of N =files, each of size bis, =users, each wih a cache of size M =2files and populariy disribuion p as shown in fig. 2. The file populariy disribuion akes hree disinc values: p 1 =0.3, p 2 = p 3 = p 4 =0.2 and p =0.1. or his example, we will consider a caching policy ha follows exacly he populariy disribuion, i.e. q = p, and a cenralized placemen scheme. We choose he cenralized placemen scheme as i helps o highligh he key difference beween our algorihm and he one in [16], [21]. The cenralized scheme for he non-uniform caching policy is quie similar o he one described in secion III-A. The server splis a file W i ino ( i subfiles of ype i = p i M, each geing / ( i bis as shown in fig. 3. The server splis he file W1 ino =subfiles of ype 1 = p 1 M =3, namely W 1,{1,2,3}, ( 3 0

6 TABLE I. User i Subfiles requesed bu no cached a user i Size of each bin 1 V 1,{2,3,4},V 1,{2,3,},V 1,{2,4,},V 1,{3,4,} / 2 V 2,{1,3},V 2,{1,4},V 2,{1,},V 2,{3,4},V 2,{3,},V 2,{4,} / 3 V 3,{1,2},V 3,{1,4},V 3,{1,},V 3,{2,4},V 3,{2,},V 3,{4,} / 4 V 4,{1,2},V 4,{1,3},V 4,{1,},V 4,{2,3},V 4,{2,},V 4,{3,} / V,{1},V,{2},V,{3},V,{4} / W 1,{1,2,4}, W 1,{1,2,}, W 1,{1,3,4}, W 1,{1,3,}, W 1,{1,4,}, W 1,{2,3,4}, W 1,{2,3,}, W 1,{2,4,} and W 1,{3,4,}, each wih / bis. Similarly, each of he files (W 2,W 3,W 4 wih populariy 0.2, will be spli ino ( 2 =subfiles of ype 2 ( 2 = 3 = 4 =0.2M =2, each wih / bis. or insance, he file W 2 will be spli ino he following subfiles: W 2,{1,2}, W 2,{1,3}, W 2,{1,4}, W 2,{1,}, W 2,{2,3}, W 2,{2,4}, W 2,{2,}, W 2,{3,4}, W 2,{3,} and W 2,{4,}. inally, he file W will be spli ino ( 1 =subfiles of ype =0.1M =1, each wih / bis, namely W,{1},W,{2},W,{3},W,{4} and W,{}. A user i will sore in is cache all he subfiles of he form W k,{s:i S} k, i.e. i will sore all he subfiles wih a label of he form W k,s, where i S. Observe ha now each user will have cached p i M bis of he file W i and since pi =1, he users end up wih heir caches fully occupied. We will firs consider he demand vecor (W 1,W 2,W 3,W 4,W o see he improvemens his new scheme offers. Afer he server is informed abou he demand vecor, i would be able o creae and populae he subfiles V k,s using he corresponding W dk,s. User 1 demands he file W 1. I already has he subfiles V 1,{1,2,3}, V 1,{1,2,4}, V 1,{1,2,}, V 1,{1,3,4}, V 1,{1,3,} and V 1,{1,4,} in is cache, so he server only needs o send he remaining subfiles V 1,{2,3,4}, V 1,{2,3,}, V 1,{2,4,} and W 1,{3,4,}. Table I shows he subfiles, along wih he number of bis in each, ha he server has o send for each user. The algorihm goes hrough all he subfiles in Table I, saring wih he lower ype ones. In his example he lowes ype subfiles are V,{1},V,{2},V,{3} and V,{4}, each conaining / bis of he file V i ha is no cached a user. If here is a subfile V 1,{} conaining bis demanded by user 1 and cached only a user, we will be able o code (biwise XOR V,{1} wih V 1,{}. Bu such a subfile is no presen, so we creae a new subfile V 1,{} and populae i wih bis borrowed from V 1,{2,3,}, V 1,{2,4,} and V 1,{3,4,}, which we refer o as he donor subfiles. V 1,{} has /, so we borrow /1 bis from each of he hree donor files reducing heir size o / bis. Noe ha he bis in hese donor subfiles are all demanded by user 1 and are cached a user (and also a few oher users, so by ransmiing he / bis obained by coding V,{1} wih V 1,{} user 1 would sill be able o recover is requesed bis and a he same ime user would also be able o receive and recover some of is requesed bis. This process is repeaed for all he remaining subfiles ype 1 as shown in able II and fig. 4. Moving on o he ype 2 subfiles, we can see ha here are 18 subfiles under his ype. Originally, all of hese subfiles had / bis each, bu he borrowing seps shown in able II has reduced he size of some of hem o / bis. Consider he subfiles V 2,{3,4}, V 3,{2,4} and V 4,{2,3}, none of hem were used in able II and so hese subfiles can be coded ogeher and ransmied as a single subfile of size / bis. TABLE II. Subfiles Size Donor subfiles : Bis aken Bis lef Bis lef (before (afer V 1,{2,3,} : 1 1,{} V 1,{2,4,} : 1 V 1,{3,4,} : 1 V 2,{1,} : 1 2,{} 3,{} 4,{} V 2,{3,} : V 2,{4,} : V 3,{1,} : V 3,{2,} : V 3,{4,} : V 4,{1,} : V 4,{2,} : V 4,{3,} : V,{1} 1,{} V,{2} 2,{} V,{3} ig. 4. Cliques of size 2 ig.. 3,{} V V 4,{},{4} V 2,{3,4} V 3,{2,4} V 4,{2,3} Cliques of size 3, no bis borrowed. TABLE III. Subfiles Size Donor subfiles : Bis aken Bis lef Bis lef (before (afer 1,{2,} V 1,{2,3,} : V 1,{2,4,} : 1,{3,4} V 1,{2,3,} : 0 V 1,{3,4,} : V 1,{2,4,} : 1,{4,} 0 V 1,{3,4,} : 0 Nex, consider he subfile V 2,{1,}, i could be poenially coded ogeher wih bins V 1,{2,} and V,{1,2} if hey were presen. We can creae new subfile V 1,{2,} and fill i up wih / bis from donors V 1,{2,3,} and V 1,{2,4,}, bu here is no poin in creaing a subfile V,{1,2} as i does no have any donor subfiles of higher ypes o borrow from. V 3,{1,} and V 4,{1,} encouner a similar siuaion and he enire process for hose subfiles can be seen in able III and fig. 6. Consider subfile V 2,{3,}, i could be poenially coded wih V 3,{2,} and V,{2,3}, one of which is already presen. As in he 1

7 W 1 p 1 =0.3 W 2 p 2 =0.2 W p = W 1,{1,2,3} W 1,{1,2,4} W 1,{1,2,} W 1,{3,4,} W 2,{1,2} W 2,{1,3} W 2,{1,4} W 2,{4,} W,{1} W,{2} W,{3} W,{4} W,{} Type 3 subfiles Type 2 subfiles Type 1 subfiles ig. 3. Placemen Phase,{1,2},{1,3},{1,4} 1,{2,} V 2,{1,} ig. 6. V 1,{3,} V V 1,{4,} 3,{1,} V 4,{1,} Cliques of size 3 ha are reduced o cliques of size 2, bis borrowed.,{2,3},{2,4},{3,4} TABLE IV. Subfiles Size Donor subfiles : Bis aken Bis lef Bis lef (before from each bin (afer 1,{2,3} 1,{2,4} 1,{3,4} 0 V 1,{2,3,4} : V 1,{2,3,} : V 1,{2,3,4} : V 1,{2,4,} : V 1,{2,3,4} : V 1,{3,4,} : ,{2,3} 1,{2,4} 1,{3,4} V 2,{3,} V 3,{2,} V 2,{4,} V 4,{2,} V 3,{4,} V 4,{3,} ig. 7. Cliques of size 3 ha are reduced o cliques of size 2, no bis borrowed. previous case, i does no make sense o creae a new subfile V,{2,3} as i does no have any higher ype donor subfiles o borrow from. Boh V 2,{3,} and V 3,{2,} have / bis as seen in able II each, so we could code hese wo ogeher and ransmi a single subfile of size / bis. This, along wih a similar process for V 2,{4,}, V 4,{2,}, V 3,{4,} and V 4,{3,}, are shown in fig. 7. There are sill a few more subfiles of ype 2 ha have no been ransmied ye, namely V 2,{1,3}, V 3,{1,2}, V 2,{1,4}, V 4,{1,2}, V 3,{1,4} and V 4,{1,3}. None of hem were used as a donor so far and so each of hem sill has / bis. V 2,{1,3} and V 3,{1,2} can be coded ogeher wih V 1,{2,3}, which is no presen. So we creae a new subfile V 1,{2,3} and ry o fill i up wih bis from donor subfile. We can see from Table IV ha here is only one non-empy donor subfile ha we could borrow from and we will borrow all / bis from i. or he oher subfiles, we are lef wih no donor subfiles o borrow from and hence i does no make sense o creae new subfiles. The process is illusraed in able IV and fig. 8. In oal, we have ransmied 4 coded subfiles of size / bis (fig. 4, 4 coded subfiles of size / bis (figs. and 8 and 6 coded subfiles of size / bis. Therefore, he oal lengh of he message ha was ransmied o saisfy he demands vecor (W 1,W 2,W 3,W 4,W is V 2,{1,3} V 3,{1,2} V 2,{1,4} V 4,{1,2} V 3,{1,4} V 4,{1,3} ig. 8. Cliques of size 3, some are reduced o size 2. 4 =1.4 bis Baseline. The scheme in [16], [21] does no borrow bis from higher ype subfiles during he coding process, so heir scheme will end up ransmiing 4 subfiles of size / bis for user s reques, coded subfiles of size / bis for user 2, 3 and 4 s requess and 4 more subfiles of size / for user 1 s reques. This sums up o a oal of 2.2 bis, which is considerably more han he lengh of our scheme. V. EVALUATION We presen an evaluaion of he Heerogeneous Coded Delivery (HCD scheme using simulaions for boh he cenralized and decenralized approaches. Our focus is mainly on he evaluaion of he delivery scheme, no of he caching policy; he laer is fixed for each evaluaion. The load R (d1,d 2,...,d k of he coded message depends on he demand vecor (d 1,d 2,...,d,. Therefore, o evaluae he overall performance, we will use he expeced load meric R(p = R (d1,...,d p d1 p d2 p d hroughou his (d 1,...,d secion. We will mainly be comparing he expeced load of our scheme o he sae-of-he-ar delivery scheme provided in [16], [21]. 2

8 A noe on he decenralized scenario. We would like o highligh some poins before diving ino he evaluaion resuls. In he decenralized approach, he users randomly cache q n M bis of file W n in heir respecive caches. Because of he randomness here, he bis of a file are disribued across subfiles of various ypes, unlike he cenralized approach where hey are conained in subfiles of a single ype. I is easy o see ha a bi in file W n has a probabiliy q n M of being cached a any given user. Noe q n M 1, as i does no make sense o allo more ha he 1 bis for caching he file W n. The probabiliy ha a bi ges cached a users can be easily deduced as: ( Pr(a bi is cached a users = (q n M (1 q n M Thus he number of bis in ype subfiles can be modeled as a binomial disribuion B(, q n M and he bis wihin a ype are uniformly disribued across all he subfiles of ype. We will use his modeling o simulae he decenralized caching. A. Uniform Caching Under a uniform caching policy, all N files will be allocaed an equal amoun of cache space a each user, i.e. q n =1/N n. If such a caching policy is used, irrespecive of he file populariy disribuion, boh our scheme and he scheme in [16] would yield similar load values. Especially, a cenralized placemen scheme following a uniform caching policy will have a srong symmery in he cache conens, which would resul in our scheme essenially reducing o he scheme in [16]. In he cenralized approach, he bis of a file are spli wihin subfiles of he same ype, and due o he uniform naure of he caching policy, a similar phenomenon can be observed across all he files. Here he sep creaing new subfiles ha borrow bis from subfiles of higher ype becomes unnecessary. In he decenralized approach, he subfile ypes are no longer limied o a single value. The bis of a file ge disribued across several subfiles ypes, which can be modeled as a binomial disribuion. This disribuion mainains is parameers across all files because of he uniformiy of q n. All he subfiles which would be coded ogeher in he delivery phase will have almos he same number of bis, hereby minimizing he need o borrow bis from higher ype subfiles in our algorihm. Thus he improvemen we ge from our algorihm, compared o he sae of he ar, would be negligible. This was indeed observed in our simulaions. B. Non-Uniform Caching We define non-uniform caching as a caching policy ha does no allocae equal cache space for all files irrespecive of heir populariies. This definiion includes he mulilevel grouping in [21] and he wo level policy used in []. The caching policy considered in [] divides he files ino wo groups, one group wih files of low populariy which will no be cached a any user and he remaining files of higher populariy which will divide he cache space equally among hemselves. The bis of hese files canno be coded ogeher wih anoher bi, as he users do no have he side informaion necessary o decode. The bis of he files in he Expeced Load Expeced Load Caching policy q ( Zipf parameer Caching policy q ( Zipf parameer Expeced Load Expeceed Load Caching policy q ( Zipf parameer Caching policy q (4 HCD Baseline Zipf parameer ig. 9. Plo of expeced load for N =, =4and M =and cenralized caching. q (1, q (2, q (3 : arbirary mulilevel caching polices - around % improvemen can be noed. q (4 : wo level caching scheme wih levels 0 and no improvemen. laer groups are uniformly divided in subfiles of single ype in a cenralized approach. Therefore, he HCD scheme will no have performance gain compared o he sae-of-he-ar. The same argumens from decenralized uniform caching can be used o explain he negligible difference in load observed in he decenralized approach for his caching policy. If he considered caching policy has muliple levels like he one in [21] or example 1, hen we can see a significan difference in he expeced load. Example 1 uses a caching policy where q = p, we were able o calculae he expeced load for HCD scheme as 1.16 and he expeced load of sae of he ar scheme as This brings an improvemen of nearly % for his example. We also evaluaed our scheme for a sysem wih N =files, =users and M =4 sized cache, where he user demands are Zipf disribued. The resuls of he evaluaion for a cenralized caching approach is presened in fig. 9. The figure shows a plo of he expeced load vs Zipf parameer for four differen caching policies. The firs hree are arbirary policies wih muliple level groups, we are able o see a significan improvemen for hese; he fourh one is similar o he policy in [], where an uniform caching policy is followed for he firs four popular files (level 1/4and he remaining files are no cached (level 0. HCD scheme does no provide any improvemen in his case because of he uniform naure of he caching policy. The performance evaluaion of HCD for a decenralized caching approach is shown in fig., again for a sysem wih N =, =and M =4. The plos in he op row of fig. are for a caching policy ha is also Zipf based, namely Zipf(0.,N, Zipf(0.7,N and Zipf(1,N. We can see ha for he firs wo plos in he op row, here is a performance benefi of around %. The hird plo in he op row shows a huge performance difference due o he inefficiency of he caching policy; his caching policy resuls in allocaing more han bis in he cache of each user for some of he mos 3

9 called he Heerogenous Coded Delivery (HCD scheme, ha performs significanly beer han he curren sae-of-he- ar scheme in coded caching for all mulilevel (more han wo caching policies. An open quesion for fuure work is wheher muliple levels are necessary for opimal caching policies, or wo levels are sufficien. ig.. Plo of expeced load for N =, = 4 and M = and decenralized caching. Top row: Zipf based caching policy; Boom row: Zipf based caching policy wih facor 2 grouping applied. Big gap in performance in he op righ plo is an anomaly due o q i M>1. Improvemens of around % are seen in almos all cases. popular files which is obviously inefficien. C. Comparison o Sae-of-he-Ar. Performance. HDC performs always a leas as well as he baseline scheme, by design: HCD considers all he coding opporuniies ha he baseline does, and hen some more. In he uniform case, however, here is no subsanial benefi: due o he symmery of he problem, our scheme essenially degeneraes o he baseline. The significan benefis come in he non-uniform case, for which our scheme was specifically designed o exend beyond he baseline approach. Complexiy. HDC has a polynomial complexiy in he number of subfiles V k,s (nodes of he graph G d, he same as he coded caching schemes in [16] and [21]. The main difference beween HCD and he one in [21] is he added sep of borrowing bis from higher ype subfiles o fill up he lower ype ones. Consider he wors case scenario, where a subfile of very low ype needs o borrow some bis, he algorihm will firs access he nex immediae higher ype and will keep moving up o higher ype unil i is full. The algorihm will move o higher ypes only afer exhausing all bis from he immediae higher ype. So even if i ends up borrowing bis from he highes ype subfiles, in he process i has covered all he bis for ha user s demand. VI. CONCLUSION The coded caching problem consiss of wo phases: one involves opimizaion of he caching policy and he oher is he design of he delivery scheme ha minimizes he load on he shared link for any given demand. The caching policy opimizaion is a very ineresing problem, wih recen works from [], [21] showing some order opimaliy resuls, bu no he focus of his paper. Given he cache conen and he demands of he users, he delivery phase opimizaion is basically an insance of he index coding problem, which is known o be NP-hard. We provide a pracical algorihm, REERENCES [1] I. Baev, R. Rajaraman, and C. Swamy. Approximaion algorihms for daa placemen problems. SIAM Journal on Compuing, 38(4: , [2] Z. Bar-Yossef, Y. Birk, T. Jayram, and T. ol. Index coding wih side informaion. Informaion Theory, IEEE Transacions on, 7(3: , [3] Y. Birk and T. ol. Coding on demand by an informed source (ISCOD for efficien broadcas of differen supplemenal daa o caching cliens. IEEE/ACM Transacions on Neworking (TON, 14(SI:282 28, [4] S. Bors, V. Gupa, and A. Walid. Disribued caching algorihms for conen disribuion neworks. In IEEE INOCOM, 20. [] L. Breslau, P. Cao, L. an, G. Phillips, and S. Shenker. Web caching and zipf-like disribuions: Evidence and implicaions. In IEEE INO- COM 99, volume 1, [6] N. Golrezaei,. Shanmugam, A. Dimakis, A. Molisch, and G. Caire. emocaching: Wireless video conen delivery hrough disribued caching helpers. In INOCOM, 2012 Proceedings IEEE, pages , March [7] M. Hefeeda and O. Saleh. Traffic modeling and proporional parial caching for peer-o-peer sysems. Neworking, IEEE/ACM Transacions on, 16(6: , [8] M. Ji, G. Caire, and A.. Molisch. undamenal limis of disribued caching in D2D wireless neworks. CoRR, abs/14.86, [9] M. Ji, G. Caire, and A.. Molisch. The hroughpu-ouage radeoff of wireless one-hop caching neworks. CoRR, abs/ , [] M. Ji, A. M. Tulino, J. Llorca, and G. Caire. On he average performance of caching and coded mulicasing wih random demands. arxiv preprin arxiv: , [11] M. R. orupolu, C. G. Plaxon, and R. Rajaraman. Placemen algorihms for hierarchical cooperaive caching. Journal of Algorihms, 38(1:2 2, [12] M. Langberg and A. Sprinson. On he hardness of approximaing he nework coding capaciy. In IEEE ISIT, pages , [13] D. Lee, J. Choi, J.-H. im, S. H. Noh, S. L. Min, Y. Cho, and C. S. im. LRU: A specrum of policies ha subsumes he leas recenly used and leas frequenly used policies. IEEE Trans. on Compuers, 0(12: , [14] A. Leff, J. L. Wolf, and P. S. Yu. Replicaion algorihms in a remoe caching archiecure. Parallel and Disribued Sysems, IEEE Transacions on, 4(11: , [1] J. Llorca, A. Tulino,. Guan, and D. ilper. Nework-coded cachingaided mulicas for efficien conen delivery. In IEEE ICC, pages , June [16] M. A. Maddah-Ali and U. Niesen. Decenralized caching aains orderopimal memory-rae radeoff. arxiv preprin arxiv:11.848, Jan [17] M. A. Maddah-Ali and U. Niesen. undamenal limis of caching. arxiv preprin arxiv: , Sep [18]. Malandrino, M. uran, A. Markopoulou, C. Wesphal, and U. oza. Minimizing he peak load from informaion cascades: Social neworks mee cellular neworks. IEEE Trans. on Mobile Compuing, 201. [19] A. Meyerson,. Munagala, and S. Plokin. Web caching using access saisics. In ACM-SIAM symposium on Discree algorihms, [20] M.-J. Monpei, C. Wesphal, and D. Trossen. Nework coding mees informaion-cenric neworking: an archiecural case for informaion dispersion hrough naive nework coding. In ACM NOMEN workshop, pages ACM, [21] U. Niesen and M. A. Maddah-Ali. Coded caching wih nonuniform demands. arxiv preprin arxiv: , Aug [22] J. Wang, J. Ren,. Lu, J. Wang, S. Liu, and C. Wesphal. An opimal cache managemen framework for informaion-cenric neworks wih nework coding. In IIP/IEEE Neworking Conference, June [23] A. Wolman, M. Voelker, N. Sharma, N. Cardwell, A. arlin, and H. M. Levy. On he scale and performance of cooperaive web proxy caching. In ACM SIGOPS Operaing Sysems Review, volume 33,

Coded Caching with Multiple File Requests

Coded Caching with Multiple File Requests Coded Caching wih Muliple File Requess Yi-Peng Wei Sennur Ulukus Deparmen of Elecrical and Compuer Engineering Universiy of Maryland College Park, MD 20742 ypwei@umd.edu ulukus@umd.edu Absrac We sudy a

More information

Coded Caching in a Multi-Server System with Random Topology

Coded Caching in a Multi-Server System with Random Topology Coded Caching in a Muli-Server Sysem wih Random Topology iish Mial, Deniz Gündüz and Cong Ling Deparmen of Elecrical and Elecronic Engineering, Imperial College London Email: {n.mial, d.gunduz, c.ling}@imperial.ac.uk

More information

COSC 3213: Computer Networks I Chapter 6 Handout # 7

COSC 3213: Computer Networks I Chapter 6 Handout # 7 COSC 3213: Compuer Neworks I Chaper 6 Handou # 7 Insrucor: Dr. Marvin Mandelbaum Deparmen of Compuer Science York Universiy F05 Secion A Medium Access Conrol (MAC) Topics: 1. Muliple Access Communicaions:

More information

4 Error Control. 4.1 Issues with Reliable Protocols

4 Error Control. 4.1 Issues with Reliable Protocols 4 Error Conrol Jus abou all communicaion sysems aemp o ensure ha he daa ges o he oher end of he link wihou errors. Since i s impossible o build an error-free physical layer (alhough some shor links can

More information

Assignment 2. Due Monday Feb. 12, 10:00pm.

Assignment 2. Due Monday Feb. 12, 10:00pm. Faculy of rs and Science Universiy of Torono CSC 358 - Inroducion o Compuer Neworks, Winer 218, LEC11 ssignmen 2 Due Monday Feb. 12, 1:pm. 1 Quesion 1 (2 Poins): Go-ack n RQ In his quesion, we review how

More information

A Matching Algorithm for Content-Based Image Retrieval

A Matching Algorithm for Content-Based Image Retrieval A Maching Algorihm for Conen-Based Image Rerieval Sue J. Cho Deparmen of Compuer Science Seoul Naional Universiy Seoul, Korea Absrac Conen-based image rerieval sysem rerieves an image from a daabase using

More information

Implementing Ray Casting in Tetrahedral Meshes with Programmable Graphics Hardware (Technical Report)

Implementing Ray Casting in Tetrahedral Meshes with Programmable Graphics Hardware (Technical Report) Implemening Ray Casing in Terahedral Meshes wih Programmable Graphics Hardware (Technical Repor) Marin Kraus, Thomas Erl March 28, 2002 1 Inroducion Alhough cell-projecion, e.g., [3, 2], and resampling,

More information

Learning in Games via Opponent Strategy Estimation and Policy Search

Learning in Games via Opponent Strategy Estimation and Policy Search Learning in Games via Opponen Sraegy Esimaion and Policy Search Yavar Naddaf Deparmen of Compuer Science Universiy of Briish Columbia Vancouver, BC yavar@naddaf.name Nando de Freias (Supervisor) Deparmen

More information

Sam knows that his MP3 player has 40% of its battery life left and that the battery charges by an additional 12 percentage points every 15 minutes.

Sam knows that his MP3 player has 40% of its battery life left and that the battery charges by an additional 12 percentage points every 15 minutes. 8.F Baery Charging Task Sam wans o ake his MP3 player and his video game player on a car rip. An hour before hey plan o leave, he realized ha he forgo o charge he baeries las nigh. A ha poin, he plugged

More information

MATH Differential Equations September 15, 2008 Project 1, Fall 2008 Due: September 24, 2008

MATH Differential Equations September 15, 2008 Project 1, Fall 2008 Due: September 24, 2008 MATH 5 - Differenial Equaions Sepember 15, 8 Projec 1, Fall 8 Due: Sepember 4, 8 Lab 1.3 - Logisics Populaion Models wih Harvesing For his projec we consider lab 1.3 of Differenial Equaions pages 146 o

More information

Shortest Path Algorithms. Lecture I: Shortest Path Algorithms. Example. Graphs and Matrices. Setting: Dr Kieran T. Herley.

Shortest Path Algorithms. Lecture I: Shortest Path Algorithms. Example. Graphs and Matrices. Setting: Dr Kieran T. Herley. Shores Pah Algorihms Background Seing: Lecure I: Shores Pah Algorihms Dr Kieran T. Herle Deparmen of Compuer Science Universi College Cork Ocober 201 direced graph, real edge weighs Le he lengh of a pah

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. XX, NO. XX, XX XXXX 1

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. XX, NO. XX, XX XXXX 1 This is he auhor's version of an aricle ha has been published in his journal. Changes were made o his version by he publisher prior o publicaion. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. XX,

More information

Network management and QoS provisioning - QoS in Frame Relay. . packet switching with virtual circuit service (virtual circuits are bidirectional);

Network management and QoS provisioning - QoS in Frame Relay. . packet switching with virtual circuit service (virtual circuits are bidirectional); QoS in Frame Relay Frame relay characerisics are:. packe swiching wih virual circui service (virual circuis are bidirecional);. labels are called DLCI (Daa Link Connecion Idenifier);. for connecion is

More information

Less Pessimistic Worst-Case Delay Analysis for Packet-Switched Networks

Less Pessimistic Worst-Case Delay Analysis for Packet-Switched Networks Less Pessimisic Wors-Case Delay Analysis for Packe-Swiched Neworks Maias Wecksén Cenre for Research on Embedded Sysems P O Box 823 SE-31 18 Halmsad maias.wecksen@hh.se Magnus Jonsson Cenre for Research

More information

4. Minimax and planning problems

4. Minimax and planning problems CS/ECE/ISyE 524 Inroducion o Opimizaion Spring 2017 18 4. Minima and planning problems ˆ Opimizing piecewise linear funcions ˆ Minima problems ˆ Eample: Chebyshev cener ˆ Muli-period planning problems

More information

Chapter 8 LOCATION SERVICES

Chapter 8 LOCATION SERVICES Disribued Compuing Group Chaper 8 LOCATION SERVICES Mobile Compuing Winer 2005 / 2006 Overview Mobile IP Moivaion Daa ransfer Encapsulaion Locaion Services & Rouing Classificaion of locaion services Home

More information

CS 152 Computer Architecture and Engineering. Lecture 7 - Memory Hierarchy-II

CS 152 Computer Architecture and Engineering. Lecture 7 - Memory Hierarchy-II CS 152 Compuer Archiecure and Engineering Lecure 7 - Memory Hierarchy-II Krse Asanovic Elecrical Engineering and Compuer Sciences Universiy of California a Berkeley hp://www.eecs.berkeley.edu/~krse hp://ins.eecs.berkeley.edu/~cs152

More information

A time-space consistency solution for hardware-in-the-loop simulation system

A time-space consistency solution for hardware-in-the-loop simulation system Inernaional Conference on Advanced Elecronic Science and Technology (AEST 206) A ime-space consisency soluion for hardware-in-he-loop simulaion sysem Zexin Jiang a Elecric Power Research Insiue of Guangdong

More information

The Impact of Product Development on the Lifecycle of Defects

The Impact of Product Development on the Lifecycle of Defects The Impac of Produc Developmen on he Lifecycle of Rudolf Ramler Sofware Compeence Cener Hagenberg Sofware Park 21 A-4232 Hagenberg, Ausria +43 7236 3343 872 rudolf.ramler@scch.a ABSTRACT This paper invesigaes

More information

Improving the Efficiency of Dynamic Service Provisioning in Transport Networks with Scheduled Services

Improving the Efficiency of Dynamic Service Provisioning in Transport Networks with Scheduled Services Improving he Efficiency of Dynamic Service Provisioning in Transpor Neworks wih Scheduled Services Ralf Hülsermann, Monika Jäger and Andreas Gladisch Technologiezenrum, T-Sysems, Goslarer Ufer 35, D-1585

More information

Scheduling. Scheduling. EDA421/DIT171 - Parallel and Distributed Real-Time Systems, Chalmers/GU, 2011/2012 Lecture #4 Updated March 16, 2012

Scheduling. Scheduling. EDA421/DIT171 - Parallel and Distributed Real-Time Systems, Chalmers/GU, 2011/2012 Lecture #4 Updated March 16, 2012 EDA421/DIT171 - Parallel and Disribued Real-Time Sysems, Chalmers/GU, 2011/2012 Lecure #4 Updaed March 16, 2012 Aemps o mee applicaion consrains should be done in a proacive way hrough scheduling. Schedule

More information

Chapter 3 MEDIA ACCESS CONTROL

Chapter 3 MEDIA ACCESS CONTROL Chaper 3 MEDIA ACCESS CONTROL Overview Moivaion SDMA, FDMA, TDMA Aloha Adapive Aloha Backoff proocols Reservaion schemes Polling Disribued Compuing Group Mobile Compuing Summer 2003 Disribued Compuing

More information

An efficient approach to improve throughput for TCP vegas in ad hoc network

An efficient approach to improve throughput for TCP vegas in ad hoc network Inernaional Research Journal of Engineering and Technology (IRJET) e-issn: 395-0056 Volume: 0 Issue: 03 June-05 www.irje.ne p-issn: 395-007 An efficien approach o improve hroughpu for TCP vegas in ad hoc

More information

PART 1 REFERENCE INFORMATION CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONITOR

PART 1 REFERENCE INFORMATION CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONITOR . ~ PART 1 c 0 \,).,,.,, REFERENCE NFORMATON CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONTOR n CONTROL DATA 6400 Compuer Sysems, sysem funcions are normally handled by he Monior locaed in a Peripheral

More information

Lecture 18: Mix net Voting Systems

Lecture 18: Mix net Voting Systems 6.897: Advanced Topics in Crypography Apr 9, 2004 Lecure 18: Mix ne Voing Sysems Scribed by: Yael Tauman Kalai 1 Inroducion In he previous lecure, we defined he noion of an elecronic voing sysem, and specified

More information

Design Alternatives for a Thin Lens Spatial Integrator Array

Design Alternatives for a Thin Lens Spatial Integrator Array Egyp. J. Solids, Vol. (7), No. (), (004) 75 Design Alernaives for a Thin Lens Spaial Inegraor Array Hala Kamal *, Daniel V azquez and Javier Alda and E. Bernabeu Opics Deparmen. Universiy Compluense of

More information

Packet Scheduling in a Low-Latency Optical Interconnect with Electronic Buffers

Packet Scheduling in a Low-Latency Optical Interconnect with Electronic Buffers Packe cheduling in a Low-Laency Opical Inerconnec wih Elecronic Buffers Lin Liu Zhenghao Zhang Yuanyuan Yang Dep Elecrical & Compuer Engineering Compuer cience Deparmen Dep Elecrical & Compuer Engineering

More information

Gauss-Jordan Algorithm

Gauss-Jordan Algorithm Gauss-Jordan Algorihm The Gauss-Jordan algorihm is a sep by sep procedure for solving a sysem of linear equaions which may conain any number of variables and any number of equaions. The algorihm is carried

More information

Nonparametric CUSUM Charts for Process Variability

Nonparametric CUSUM Charts for Process Variability Journal of Academia and Indusrial Research (JAIR) Volume 3, Issue June 4 53 REEARCH ARTICLE IN: 78-53 Nonparameric CUUM Chars for Process Variabiliy D.M. Zombade and V.B. Ghue * Dep. of aisics, Walchand

More information

Difficulty-aware Hybrid Search in Peer-to-Peer Networks

Difficulty-aware Hybrid Search in Peer-to-Peer Networks Difficuly-aware Hybrid Search in Peer-o-Peer Neworks Hanhua Chen, Hai Jin, Yunhao Liu, Lionel M. Ni School of Compuer Science and Technology Huazhong Univ. of Science and Technology {chenhanhua, hjin}@hus.edu.cn

More information

Protecting User Privacy in a Multi-Path Information-Centric Network Using Multiple Random-Caches

Protecting User Privacy in a Multi-Path Information-Centric Network Using Multiple Random-Caches Chu WB, Wang LF, Jiang ZJ e al. Proecing user privacy in a muli-pah informaion-cenric nework using muliple random-caches. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 585 598 May 27. DOI.7/s39-7-73-2

More information

NEWTON S SECOND LAW OF MOTION

NEWTON S SECOND LAW OF MOTION Course and Secion Dae Names NEWTON S SECOND LAW OF MOTION The acceleraion of an objec is defined as he rae of change of elociy. If he elociy changes by an amoun in a ime, hen he aerage acceleraion during

More information

EECS 487: Interactive Computer Graphics

EECS 487: Interactive Computer Graphics EECS 487: Ineracive Compuer Graphics Lecure 7: B-splines curves Raional Bézier and NURBS Cubic Splines A represenaion of cubic spline consiss of: four conrol poins (why four?) hese are compleely user specified

More information

An Adaptive Spatial Depth Filter for 3D Rendering IP

An Adaptive Spatial Depth Filter for 3D Rendering IP JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, VOL.3, NO. 4, DECEMBER, 23 175 An Adapive Spaial Deph Filer for 3D Rendering IP Chang-Hyo Yu and Lee-Sup Kim Absrac In his paper, we presen a new mehod

More information

STEREO PLANE MATCHING TECHNIQUE

STEREO PLANE MATCHING TECHNIQUE STEREO PLANE MATCHING TECHNIQUE Commission III KEY WORDS: Sereo Maching, Surface Modeling, Projecive Transformaion, Homography ABSTRACT: This paper presens a new ype of sereo maching algorihm called Sereo

More information

Optimal Crane Scheduling

Optimal Crane Scheduling Opimal Crane Scheduling Samid Hoda, John Hooker Laife Genc Kaya, Ben Peerson Carnegie Mellon Universiy Iiro Harjunkoski ABB Corporae Research EWO - 13 November 2007 1/16 Problem Track-mouned cranes move

More information

Definition and examples of time series

Definition and examples of time series Definiion and examples of ime series A ime series is a sequence of daa poins being recorded a specific imes. Formally, le,,p be a probabiliy space, and T an index se. A real valued sochasic process is

More information

Announcements For The Logic of Boolean Connectives Truth Tables, Tautologies & Logical Truths. Outline. Introduction Truth Functions

Announcements For The Logic of Boolean Connectives Truth Tables, Tautologies & Logical Truths. Outline. Introduction Truth Functions Announcemens For 02.05.09 The Logic o Boolean Connecives Truh Tables, Tauologies & Logical Truhs 1 HW3 is due nex Tuesday William Sarr 02.05.09 William Sarr The Logic o Boolean Connecives (Phil 201.02)

More information

Image segmentation. Motivation. Objective. Definitions. A classification of segmentation techniques. Assumptions for thresholding

Image segmentation. Motivation. Objective. Definitions. A classification of segmentation techniques. Assumptions for thresholding Moivaion Image segmenaion Which pixels belong o he same objec in an image/video sequence? (spaial segmenaion) Which frames belong o he same video sho? (emporal segmenaion) Which frames belong o he same

More information

Data Structures and Algorithms. The material for this lecture is drawn, in part, from The Practice of Programming (Kernighan & Pike) Chapter 2

Data Structures and Algorithms. The material for this lecture is drawn, in part, from The Practice of Programming (Kernighan & Pike) Chapter 2 Daa Srucures and Algorihms The maerial for his lecure is drawn, in par, from The Pracice of Programming (Kernighan & Pike) Chaper 2 1 Moivaing Quoaion Every program depends on algorihms and daa srucures,

More information

CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL

CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL Klečka Jan Docoral Degree Programme (1), FEEC BUT E-mail: xkleck01@sud.feec.vubr.cz Supervised by: Horák Karel E-mail: horak@feec.vubr.cz

More information

An HTTP Web Traffic Model Based on the Top One Million Visited Web Pages

An HTTP Web Traffic Model Based on the Top One Million Visited Web Pages An HTTP Web Traffic Model Based on he Top One Million Visied Web Pages Rasin Pries, Zsol Magyari, Phuoc Tran-Gia Universiy of Würzburg, Insiue of Compuer Science, Germany Email: {pries,rangia}@informaik.uni-wuerzburg.de

More information

Distributed Task Negotiation in Modular Robots

Distributed Task Negotiation in Modular Robots Disribued Task Negoiaion in Modular Robos Behnam Salemi, eer Will, and Wei-Min Shen USC Informaion Sciences Insiue and Compuer Science Deparmen Marina del Rey, USA, {salemi, will, shen}@isi.edu Inroducion

More information

NRMI: Natural and Efficient Middleware

NRMI: Natural and Efficient Middleware NRMI: Naural and Efficien Middleware Eli Tilevich and Yannis Smaragdakis Cener for Experimenal Research in Compuer Sysems (CERCS), College of Compuing, Georgia Tech {ilevich, yannis}@cc.gaech.edu Absrac

More information

Partition-based document identifier assignment (PBDIA) algorithm. (long queries)

Partition-based document identifier assignment (PBDIA) algorithm. (long queries) ( ) Pariion-based documen idenifier assignmen (PBDIA) algorihm PBDIA (long queries) (parallel IR) :,,,, d-gap Compressing an invered file can grealy improve query performance of an informaion rerieval

More information

Opportunistic Flooding in Low-Duty-Cycle Wireless Sensor Networks with Unreliable Links

Opportunistic Flooding in Low-Duty-Cycle Wireless Sensor Networks with Unreliable Links 1 in Low-uy-ycle Wireless Sensor Neworks wih Unreliable Links Shuo uo, Suden Member, IEEE, Liang He, Member, IEEE, Yu u, Member, IEEE, o Jiang, Suden Member, IEEE, and Tian He, Member, IEEE bsrac looding

More information

An Improved Square-Root Nyquist Shaping Filter

An Improved Square-Root Nyquist Shaping Filter An Improved Square-Roo Nyquis Shaping Filer fred harris San Diego Sae Universiy fred.harris@sdsu.edu Sridhar Seshagiri San Diego Sae Universiy Seshigar.@engineering.sdsu.edu Chris Dick Xilinx Corp. chris.dick@xilinx.com

More information

Video Content Description Using Fuzzy Spatio-Temporal Relations

Video Content Description Using Fuzzy Spatio-Temporal Relations Proceedings of he 4s Hawaii Inernaional Conference on Sysem Sciences - 008 Video Conen Descripion Using Fuzzy Spaio-Temporal Relaions rchana M. Rajurkar *, R.C. Joshi and Sananu Chaudhary 3 Dep of Compuer

More information

AML710 CAD LECTURE 11 SPACE CURVES. Space Curves Intrinsic properties Synthetic curves

AML710 CAD LECTURE 11 SPACE CURVES. Space Curves Intrinsic properties Synthetic curves AML7 CAD LECTURE Space Curves Inrinsic properies Synheic curves A curve which may pass hrough any region of hreedimensional space, as conrased o a plane curve which mus lie on a single plane. Space curves

More information

A Tool for Multi-Hour ATM Network Design considering Mixed Peer-to-Peer and Client-Server based Services

A Tool for Multi-Hour ATM Network Design considering Mixed Peer-to-Peer and Client-Server based Services A Tool for Muli-Hour ATM Nework Design considering Mied Peer-o-Peer and Clien-Server based Services Conac Auhor Name: Luis Cardoso Company / Organizaion: Porugal Telecom Inovação Complee Mailing Address:

More information

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version Tes - Accredied Configuraion Engineer (ACE) Exam - PAN-OS 6.0 Version ACE Exam Quesion 1 of 50. Which of he following saemens is NOT abou Palo Alo Neworks firewalls? Sysem defauls may be resored by performing

More information

Restorable Dynamic Quality of Service Routing

Restorable Dynamic Quality of Service Routing QOS ROUTING Resorable Dynamic Qualiy of Service Rouing Murali Kodialam and T. V. Lakshman, Lucen Technologies ABSTRACT The focus of qualiy-of-service rouing has been on he rouing of a single pah saisfying

More information

Computer representations of piecewise

Computer representations of piecewise Edior: Gabriel Taubin Inroducion o Geomeric Processing hrough Opimizaion Gabriel Taubin Brown Universiy Compuer represenaions o piecewise smooh suraces have become vial echnologies in areas ranging rom

More information

Project #1 Math 285 Name:

Project #1 Math 285 Name: Projec #1 Mah 85 Name: Solving Orinary Differenial Equaions by Maple: Sep 1: Iniialize he program: wih(deools): wih(pdeools): Sep : Define an ODE: (There are several ways of efining equaions, we sar wih

More information

Po,,ll. I Appll I APP2 I I App3 I. Illll Illlllll II Illlll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illlll Illl Illl Illl

Po,,ll. I Appll I APP2 I I App3 I. Illll Illlllll II Illlll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illlll Illl Illl Illl Illll Illlllll II Illlll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illlll Illl Illl Illl US 20110153728A1 (19) nied Saes (12) Paen Applicaion Publicaion (10) Pub. No.: S 2011/0153728

More information

I. INTRODUCTION. Keywords -- Web Server, Perceived User Latency, HTTP, Local Measuring. interchangeably.

I. INTRODUCTION. Keywords -- Web Server, Perceived User Latency, HTTP, Local Measuring. interchangeably. Evaluaing Web User Perceived Laency Using Server Side Measuremens Marik Marshak 1 and Hanoch Levy School of Compuer Science Tel Aviv Universiy, Tel-Aviv, Israel mmarshak@emc.com, hanoch@pos.au.ac.il 1

More information

Announcements. TCP Congestion Control. Goals of Today s Lecture. State Diagrams. TCP State Diagram

Announcements. TCP Congestion Control. Goals of Today s Lecture. State Diagrams. TCP State Diagram nnouncemens TCP Congesion Conrol Projec #3 should be ou onigh Can do individual or in a eam of 2 people Firs phase due November 16 - no slip days Exercise good (beer) ime managemen EE 122: Inro o Communicaion

More information

Time-Shifted Streaming in a Tree-Based Peer-to-Peer System Jeonghun Noh ASSIA inc., Redwood City, CA, USA

Time-Shifted Streaming in a Tree-Based Peer-to-Peer System Jeonghun Noh ASSIA inc., Redwood City, CA, USA 22 JOURNAL OF COMMUNICATIONS, VOL. 7, NO. 3, MARCH 212 -Shifed Sreaming in a Tree-Based Peer-o-Peer Sysem Jeonghun Noh ASSIA inc., Redwood Ciy, CA, USA Email: jnoh@assia-inc.com Bernd Girod Informaion

More information

source managemen, naming, proecion, and service provisions. This paper concenraes on he basic processor scheduling aspecs of resource managemen. 2 The

source managemen, naming, proecion, and service provisions. This paper concenraes on he basic processor scheduling aspecs of resource managemen. 2 The Virual Compuers A New Paradigm for Disribued Operaing Sysems Banu Ozden y Aaron J. Goldberg Avi Silberschaz z 600 Mounain Ave. AT&T Bell Laboraories Murray Hill, NJ 07974 Absrac The virual compuers (VC)

More information

Visual Indoor Localization with a Floor-Plan Map

Visual Indoor Localization with a Floor-Plan Map Visual Indoor Localizaion wih a Floor-Plan Map Hang Chu Dep. of ECE Cornell Universiy Ihaca, NY 14850 hc772@cornell.edu Absrac In his repor, a indoor localizaion mehod is presened. The mehod akes firsperson

More information

Spline Curves. Color Interpolation. Normal Interpolation. Last Time? Today. glshademodel (GL_SMOOTH); Adjacency Data Structures. Mesh Simplification

Spline Curves. Color Interpolation. Normal Interpolation. Last Time? Today. glshademodel (GL_SMOOTH); Adjacency Data Structures. Mesh Simplification Las Time? Adjacency Daa Srucures Spline Curves Geomeric & opologic informaion Dynamic allocaion Efficiency of access Mesh Simplificaion edge collapse/verex spli geomorphs progressive ransmission view-dependen

More information

MIC2569. Features. General Description. Applications. Typical Application. CableCARD Power Switch

MIC2569. Features. General Description. Applications. Typical Application. CableCARD Power Switch CableCARD Power Swich General Descripion is designed o supply power o OpenCable sysems and CableCARD hoss. These CableCARDs are also known as Poin of Disribuion (POD) cards. suppors boh Single and Muliple

More information

COMP26120: Algorithms and Imperative Programming

COMP26120: Algorithms and Imperative Programming COMP26120 ecure C3 1/48 COMP26120: Algorihms and Imperaive Programming ecure C3: C - Recursive Daa Srucures Pee Jinks School of Compuer Science, Universiy of Mancheser Auumn 2011 COMP26120 ecure C3 2/48

More information

Voltair Version 2.5 Release Notes (January, 2018)

Voltair Version 2.5 Release Notes (January, 2018) Volair Version 2.5 Release Noes (January, 2018) Inroducion 25-Seven s new Firmware Updae 2.5 for he Volair processor is par of our coninuing effors o improve Volair wih new feaures and capabiliies. For

More information

BI-TEMPORAL INDEXING

BI-TEMPORAL INDEXING BI-TEMPORAL INDEXING Mirella M. Moro Uniersidade Federal do Rio Grande do Sul Poro Alegre, RS, Brazil hp://www.inf.ufrgs.br/~mirella/ Vassilis J. Tsoras Uniersiy of California, Rierside Rierside, CA 92521,

More information

Delayed reservation decision in optical burst switching networks with optical buffers. Title. Li, GM; Li, VOK; Li, CY; Wai, PKA

Delayed reservation decision in optical burst switching networks with optical buffers. Title. Li, GM; Li, VOK; Li, CY; Wai, PKA Tile Delayed reservaion decision in opical burs swiching neworks wih opical buffers Auhor(s) Li, GM; Li, VOK; Li, CY; Wai, PKA Ciaion The 3rd nernaional Conference on Communicaions and Neworking in China

More information

Rule-Based Multi-Query Optimization

Rule-Based Multi-Query Optimization Rule-Based Muli-Query Opimizaion Mingsheng Hong Dep. of Compuer cience Cornell Universiy mshong@cs.cornell.edu Johannes Gehrke Dep. of Compuer cience Cornell Universiy johannes@cs.cornell.edu Mirek Riedewald

More information

On the Impact of Concurrency for the Enforcement of Entailment Constraints in Process-driven SOAs

On the Impact of Concurrency for the Enforcement of Entailment Constraints in Process-driven SOAs On he Impac of Concurrency for he Enforcemen of Enailmen Consrains in Process-driven OAs Thomas Quirchmayr and Mark rembeck Insiue for Informaion ysems, New Media Lab, WU Vienna, Ausria {firsname.lasname}@wu.ac.a

More information

A METHOD OF MODELING DEFORMATION OF AN OBJECT EMPLOYING SURROUNDING VIDEO CAMERAS

A METHOD OF MODELING DEFORMATION OF AN OBJECT EMPLOYING SURROUNDING VIDEO CAMERAS A METHOD OF MODELING DEFORMATION OF AN OBJECT EMLOYING SURROUNDING IDEO CAMERAS Joo Kooi TAN, Seiji ISHIKAWA Deparmen of Mechanical and Conrol Engineering Kushu Insiue of Technolog, Japan ehelan@is.cnl.kuech.ac.jp,

More information

The Roots of Lisp paul graham

The Roots of Lisp paul graham The Roos of Lisp paul graham Draf, January 18, 2002. In 1960, John McCarhy published a remarkable paper in which he did for programming somehing like wha Euclid did for geomery. 1 He showed how, given

More information

Performance Evaluation of Implementing Calls Prioritization with Different Queuing Disciplines in Mobile Wireless Networks

Performance Evaluation of Implementing Calls Prioritization with Different Queuing Disciplines in Mobile Wireless Networks Journal of Compuer Science 2 (5): 466-472, 2006 ISSN 1549-3636 2006 Science Publicaions Performance Evaluaion of Implemening Calls Prioriizaion wih Differen Queuing Disciplines in Mobile Wireless Neworks

More information

MOBILE COMPUTING. Wi-Fi 9/20/15. CSE 40814/60814 Fall Wi-Fi:

MOBILE COMPUTING. Wi-Fi 9/20/15. CSE 40814/60814 Fall Wi-Fi: MOBILE COMPUTING CSE 40814/60814 Fall 2015 Wi-Fi Wi-Fi: name is NOT an abbreviaion play on Hi-Fi (high fideliy) Wireless Local Area Nework (WLAN) echnology WLAN and Wi-Fi ofen used synonymous Typically

More information

MOBILE COMPUTING 3/18/18. Wi-Fi IEEE. CSE 40814/60814 Spring 2018

MOBILE COMPUTING 3/18/18. Wi-Fi IEEE. CSE 40814/60814 Spring 2018 MOBILE COMPUTING CSE 40814/60814 Spring 2018 Wi-Fi Wi-Fi: name is NOT an abbreviaion play on Hi-Fi (high fideliy) Wireless Local Area Nework (WLAN) echnology WLAN and Wi-Fi ofen used synonymous Typically

More information

Automatic Calculation of Coverage Profiles for Coverage-based Testing

Automatic Calculation of Coverage Profiles for Coverage-based Testing Auomaic Calculaion of Coverage Profiles for Coverage-based Tesing Raimund Kirner 1 and Waler Haas 1 Vienna Universiy of Technology, Insiue of Compuer Engineering, Vienna, Ausria, raimund@vmars.uwien.ac.a

More information

CENG 477 Introduction to Computer Graphics. Modeling Transformations

CENG 477 Introduction to Computer Graphics. Modeling Transformations CENG 477 Inroducion o Compuer Graphics Modeling Transformaions Modeling Transformaions Model coordinaes o World coordinaes: Model coordinaes: All shapes wih heir local coordinaes and sies. world World

More information

Who Thinks Who Knows Who? Socio-cognitive Analysis of Networks. Technical Report

Who Thinks Who Knows Who? Socio-cognitive Analysis of  Networks. Technical Report Who Thinks Who Knows Who? Socio-cogniive Analysis of Email Neworks Technical Repor Deparmen of Compuer Science and Engineering Universiy of Minnesoa 4-192 EECS Building 200 Union Sree SE Minneapolis, MN

More information

Who thinks who knows who? Socio-Cognitive Analysis of an Network

Who thinks who knows who? Socio-Cognitive Analysis of an  Network Who hinks who knows who? Socio-Cogniive Analysis of an Email Nework Nishih Pahak Deparmen of Compuer Science Universiy of Minnesoa Minneapolis, MN, USA npahak@cs.umn.edu Sandeep Mane Deparmen of Compuer

More information

Time Expression Recognition Using a Constituent-based Tagging Scheme

Time Expression Recognition Using a Constituent-based Tagging Scheme Track: Web Conen Analysis, Semanics and Knowledge Time Expression Recogniion Using a Consiuen-based Tagging Scheme Xiaoshi Zhong and Erik Cambria School of Compuer Science and Engineering Nanyang Technological

More information

Towards a Realistic Model for Failure Propagation in Interdependent Networks

Towards a Realistic Model for Failure Propagation in Interdependent Networks Towards a Realisic Model for Failure Propagaion in Inerdependen Neworks Agosino Suraro, Simone Silvesri, Mauro Coni, Sajal K. Das Deparmen of Mahemaics, Universiy of Padua, email: agosino.suraro@sudeni.unipd.i,

More information

Parallel and Distributed Systems for Constructive Neural Network Learning*

Parallel and Distributed Systems for Constructive Neural Network Learning* Parallel and Disribued Sysems for Consrucive Neural Nework Learning* J. Flecher Z. Obradovi School of Elecrical Engineering and Compuer Science Washingon Sae Universiy Pullman WA 99164-2752 Absrac A consrucive

More information

Michiel Helder and Marielle C.T.A Geurts. Hoofdkantoor PTT Post / Dutch Postal Services Headquarters

Michiel Helder and Marielle C.T.A Geurts. Hoofdkantoor PTT Post / Dutch Postal Services Headquarters SHORT TERM PREDICTIONS A MONITORING SYSTEM by Michiel Helder and Marielle C.T.A Geurs Hoofdkanoor PTT Pos / Duch Posal Services Headquarers Keywords macro ime series shor erm predicions ARIMA-models faciliy

More information

Using CANopen Slave Driver

Using CANopen Slave Driver CAN Bus User Manual Using CANopen Slave Driver V1. Table of Conens 1. SDO Communicaion... 1 2. PDO Communicaion... 1 3. TPDO Reading and RPDO Wriing... 2 4. RPDO Reading... 3 5. CANopen Communicaion Parameer

More information

Curves & Surfaces. Last Time? Today. Readings for Today (pick one) Limitations of Polygonal Meshes. Today. Adjacency Data Structures

Curves & Surfaces. Last Time? Today. Readings for Today (pick one) Limitations of Polygonal Meshes. Today. Adjacency Data Structures Las Time? Adjacency Daa Srucures Geomeric & opologic informaion Dynamic allocaion Efficiency of access Curves & Surfaces Mesh Simplificaion edge collapse/verex spli geomorphs progressive ransmission view-dependen

More information

A GRAPHICS PROCESSING UNIT IMPLEMENTATION OF THE PARTICLE FILTER

A GRAPHICS PROCESSING UNIT IMPLEMENTATION OF THE PARTICLE FILTER A GRAPHICS PROCESSING UNIT IMPLEMENTATION OF THE PARTICLE FILTER ABSTRACT Modern graphics cards for compuers, and especially heir graphics processing unis (GPUs), are designed for fas rendering of graphics.

More information

A Routing Algorithm for Flip-Chip Design

A Routing Algorithm for Flip-Chip Design A Rouing Algorihm for Flip-hip Design Jia-Wei Fang, I-Jye Lin, and Yao-Wen hang, Graduae Insiue of Elecronics Engineering, Naional Taiwan Universiy, Taipei Deparmen of Elecrical Engineering, Naional Taiwan

More information

DCF/DSDMA: Enhanced DCF with SDMA Downlink Transmissions for WLANs

DCF/DSDMA: Enhanced DCF with SDMA Downlink Transmissions for WLANs DCF/DSDMA: Enhanced DCF wih SDMA Downlink Transmissions for WLANs Ruizhi Liao, oris ellala, Crisina Cano and Miquel Oliver NeTS Research Group Deparmen of Informaion and Communicaion Technologies Universia

More information

STRING DESCRIPTIONS OF DATA FOR DISPLAY*

STRING DESCRIPTIONS OF DATA FOR DISPLAY* SLAC-PUB-383 January 1968 STRING DESCRIPTIONS OF DATA FOR DISPLAY* J. E. George and W. F. Miller Compuer Science Deparmen and Sanford Linear Acceleraor Cener Sanford Universiy Sanford, California Absrac

More information

Utility-Based Hybrid Memory Management

Utility-Based Hybrid Memory Management Uiliy-Based Hybrid Memory Managemen Yang Li Saugaa Ghose Jongmoo Choi Jin Sun Hui Wang Onur Mulu Carnegie Mellon Universiy Dankook Universiy Beihang Universiy ETH Zürich While he memory fooprins of cloud

More information

MOTION DETECTORS GRAPH MATCHING LAB PRE-LAB QUESTIONS

MOTION DETECTORS GRAPH MATCHING LAB PRE-LAB QUESTIONS NME: TE: LOK: MOTION ETETORS GRPH MTHING L PRE-L QUESTIONS 1. Read he insrucions, and answer he following quesions. Make sure you resae he quesion so I don hae o read he quesion o undersand he answer..

More information

Analysis of Various Types of Bugs in the Object Oriented Java Script Language Coding

Analysis of Various Types of Bugs in the Object Oriented Java Script Language Coding Indian Journal of Science and Technology, Vol 8(21), DOI: 10.17485/ijs/2015/v8i21/69958, Sepember 2015 ISSN (Prin) : 0974-6846 ISSN (Online) : 0974-5645 Analysis of Various Types of Bugs in he Objec Oriened

More information

FIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS

FIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS FIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS Mohammed A. Aseeri and M. I. Sobhy Deparmen of Elecronics, The Universiy of Ken a Canerbury Canerbury, Ken, CT2

More information

IROS 2015 Workshop on On-line decision-making in multi-robot coordination (DEMUR 15)

IROS 2015 Workshop on On-line decision-making in multi-robot coordination (DEMUR 15) IROS 2015 Workshop on On-line decision-making in muli-robo coordinaion () OPTIMIZATION-BASED COOPERATIVE MULTI-ROBOT TARGET TRACKING WITH REASONING ABOUT OCCLUSIONS KAROL HAUSMAN a,, GREGORY KAHN b, SACHIN

More information

MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES

MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES B. MARCOTEGUI and F. MEYER Ecole des Mines de Paris, Cenre de Morphologie Mahémaique, 35, rue Sain-Honoré, F 77305 Fonainebleau Cedex, France Absrac. In image

More information

IDEF3 Process Description Capture Method

IDEF3 Process Description Capture Method IDEF3 Process Descripion Capure Mehod IDEF3 is par of he IDEF family of mehods developmen funded by he US Air Force o provide modelling suppor for sysems engineering and enerprise inegraion 2 IDEF3 Mehod

More information

Fully Dynamic Algorithm for Top-k Densest Subgraphs

Fully Dynamic Algorithm for Top-k Densest Subgraphs Fully Dynamic Algorihm for Top-k Denses Subgraphs Muhammad Anis Uddin Nasir 1, Arisides Gionis 2, Gianmarco De Francisci Morales 3 Sarunas Girdzijauskas 4 Royal Insiue of Technology, Sweden Aalo Universiy,

More information

A New Semantic Cache Management Method in Mobile Databases

A New Semantic Cache Management Method in Mobile Databases Journal o Compuer Science 1 (3): 351-354, 25 ISSN 1549-3636 Science Publicaions, 25 A New Semanic Cache Managemen Mehod in Mobile Daabases Shengei Shi, Jianzhong Li and Chaokun Wang School o Compuer Science

More information

CS 152 Computer Architecture and Engineering. Lecture 6 - Memory

CS 152 Computer Architecture and Engineering. Lecture 6 - Memory CS 152 Compuer Archiecure and Engineering Lecure 6 - Memory Krse Asanovic Elecrical Engineering and Compuer Sciences Universiy of California a Berkeley hp://www.eecs.berkeley.edu/~krse hp://ins.eecs.berkeley.edu/~cs152

More information

Evaluation and Improvement of Region-based Motion Segmentation

Evaluation and Improvement of Region-based Motion Segmentation Evaluaion and Improvemen of Region-based Moion Segmenaion Mark Ross Universiy Koblenz-Landau, Insiue of Compuaional Visualisics, Universiässraße 1, 56070 Koblenz, Germany Email: ross@uni-koblenz.de Absrac

More information

1.4 Application Separable Equations and the Logistic Equation

1.4 Application Separable Equations and the Logistic Equation 1.4 Applicaion Separable Equaions and he Logisic Equaion If a separable differenial equaion is wrien in he form f ( y) dy= g( x) dx, hen is general soluion can be wrien in he form f ( y ) dy = g ( x )

More information

Outline. EECS Components and Design Techniques for Digital Systems. Lec 06 Using FSMs Review: Typical Controller: state

Outline. EECS Components and Design Techniques for Digital Systems. Lec 06 Using FSMs Review: Typical Controller: state Ouline EECS 5 - Componens and Design Techniques for Digial Sysems Lec 6 Using FSMs 9-3-7 Review FSMs Mapping o FPGAs Typical uses of FSMs Synchronous Seq. Circuis safe composiion Timing FSMs in verilog

More information