Delay-Optimized File Retrieval under LT-Based Cloud Storage

Size: px
Start display at page:

Download "Delay-Optimized File Retrieval under LT-Based Cloud Storage"

Transcription

1 infomation: DOI /TCC , IEEE Tansactions on Cloud Computing IEEE TRANSACTIONS ON CLOUD COMPUTING 1 Delay-Optimized File Retieval unde LT-Based Cloud Stoage Haifeng Lu,Chuan Heng Foh, Senio Membe, IEEE, Yonggang Wen, Membe, IEEE, and Jianfei Cai, Senio Membe, IEEE Abstact Fountain-code based cloud stoage system povides eliable online stoage solution though placing unlabeled content blocks into multiple stoage nodes. Luby Tansfom (LT) code is one of the popula fountain codes fo stoage systems due to its efficient ecovey. Howeve, to ensue high success decoding of fountain codes based stoage, etieval of additional fagments is equied, and this equiement could intoduce additional delay. In this pape, we show that multiple stage etieval of fagments is effective to educe the fileetieval delay. We fist develop a delay model fo vaious multiple stage etieval schemes applicable to ou consideed system. With the developed model, we study optimal etieval schemes given equiements on success decodability. Ou numeical esults suggest a fundamental tadeoff between the file-etieval delay and the taget pobability of successful file decoding, and that the file-etieval delay can be significantly educed by optimally scheduling packet equests in a multi-stage fashion. Index Tems Delay-optimal etieval, LT codes, Cloud stoage. 1 INTRODUCTION Cloud stoage systems povide a scalable online stoage solution to end uses who equie flexible amount of stoage space but do not wish to own and maintain stoage infastuctue [1], []. Compaed with taditional data stoage, cloud stoage has seveal advantages. Fo example, end uses can access thei data anywhee though Intenet without botheing about caying physical stoage media. Also, diffeent uses can collaboatively contibute to the data stoed in cloud stoage with pemission fom the data owne. Due to its high populaity in industy, cloud stoage has been a hot topic in cloud computing community []. Geneally, cloud stoage systems ely on thousands of stoage nodes. A content is often fagmented and distibuted into a set of stoage nodes. To offe high eliability and availability of stoage sevices, edundancy of contents may be employed. Fagments of Haifeng Lu is with Alibaba Inc., China ( haifeng.lhf@alibabainc.com). Chuan Heng Foh is with the Institute fo Communication Systems Reseach, Univesity of Suey, Guildfod, Suey, GU XH, UK ( c.foh@suey.ac.uk). Yonggang Wen and Jianfei Cai ae with the School of Compute Engineeing, Nanyang Technological Univesity, 998, Singapoe ( ygwen@ntu.edu.sg, asjfcai@ntu.edu.sg). contents may be simply eplicated and stoed in diffeent stoage nodes to achieve edundancy. Othe than naive eplication, Lin et al. [4] poposed two QoSawae data eplication algoithms to educe stoage cost while maintaining QoS fo the applications. In [5], Weathespoon et al. analyzed two schemes fo edundancy: eplication and easue coding, concluding that easue-coded systems can povide highe availability with lowe bandwidth and less stoage space. Since then, thee ae plenty of woks on designing easue codes fo stoage systems, and they mainly focus on the eliability and availability of stoage systems [], [], [8], [9]. Recently, motivated by the geat success of ateless codes o fountain codes, which have vey low decoding complexity and can geneate infinite numbe of encoded packets, some woks [10], [11] have applied the popula ateless code o LT code, into cloud stoage systems and have achieved pomising pefomance. The main advantage fo a ateless code based cloud stoage system is that it significantly simplifies the challenging content placement and content ecovey poblems that need to be addessed in easue code based systems. This is because a ateless code based system can potentially geneate infinite numbe of encoded packets to be placed acoss the stoage system and to eplace those unavailable packets due to node failue. Howeve, the disadvantage of a ateless code based cloud stoage system is that it incus longe data etieval delay, since it equies moe coded packets due to its uncetainty in decoding diffeent fom its easue code countepat which is deteministic in decoding. Theefoe, in this pape we focus on designing an optimized etieval method fo an LT code based cloud system. As stated in [1], taffic hot spots emege at the coe of a cloud stoage system which is esponsible fo communications between the system and end uses. We call this coe as a potal. In this eseach, we focus on addessing the poblem how to minimize the etieval delay geneated by the potal in an LT-based cloud stoage system. In paticula, unlike the Maximum Distance Sepa-

2 infomation: DOI /TCC , IEEE Tansactions on Cloud Computing IEEE TRANSACTIONS ON CLOUD COMPUTING able (MDS) codes such as Reed-Soloman code [1], which need deteministic numbe of edundant encoded packets fo decoding, a stoage collecto opeating LT decode equies an uncetain numbe of encoded fagments fom the stoage system fo successful decoding. These uncetain numbe of encoded packets add delay in stoage etieval. Thus, a tadeoff between the successful decoding pobability and stoage etieval delay exists. In this pape, we study such a tadeoff and popose a multiple-stage stoage etieval scheme whee we show that stoage etieval delay can be educed without sacificing the pefomance on decoding pobability. We futhe demonstate the optimal etieval setup fo the case of a two-stage etieval. The contibutions of this pape ae twofold. Fistly, we develop a model descibing the multi-stage equest scheme fo an LT code based stoage system. Secondly, we solve the optimization poblem fo the optimal two-stage equest scheme and povide a closed-fom expession fo analysis. The emainde of this pape is oganized as follows. In Section, we biefly eview the elated wok. In Section, we intoduce the system achitectue and pesent the fomal definition of the optimal etieval delay poblem. A detailed desciption of LT codes and its decodability is pesented in Section 4. Section 5 pesents a igoous analysis on the delay fo diffeent etieval schemes togethe with simulation validation. Section povides analysis on the optimal two-stage equest scheme. We then demonstate the tadeoff between the delay and the pobability of successful decoding in Section. We also show some simulation esults using diffeent taffic models in Section 8. Finally, some impotant conclusions ae dawn in Section 9. RELATED WORK Easue code based cloud stoage systems: An example of a successful deployment of commecial cloud stoage system using easue coding is Symfom [14], [15]. In Symfom, Reed-Solomon code [1] is used fo edundancy geneation. Its success shows easuecode-based cloud stoage systems ae pactical and compaable with taditional eplication-based cloud stoage systems. Anothe eseach effot focuses on the design of stoage system opeational optimization based on existing easue codes to achieve some specific optimal pefomance matices. These opeational designs may include stoage edundancy ovehead optimization, stoage allocation and epai, and othes [1], [1], [18], [19]. As afoementioned, compaed with easue code based cloud stoage systems, LT code based systems simplify content placement and ecovey poblems at the cost of longe etieval delay. LT code: Luby Tansfom (LT) code [0] enjoys elatively low computational complexity of O(kln(k/δ)) fo ecoveing k symbols with O( kln (k/δ)) additional packets. Hee, 1 δ is the pobability of successful ecovey of all k symbols. The popety of low decoding complexity makes LT code suitable fo end uses equipped with modeate CPU. Anothe popety of LT code is ateless which means the edundancy atio of data can be abitaily changed without additional design. This popety is natually fit with cloud stoage systems with thousands of stoage nodes stoing vaious type of data. The pomising pefomance of LT code based stoage systems has been shown in [10], [11]. Data etieval pefomance in stoage systems: In addition to the eliability and availability issues of a stoage system, anothe impotant poblem aised in a stoage system is data etieval pefomance. Taditional distibuted file systems like NFS [1] and Spite [] ae single seve based and achieve acceptable etieval pefomance though file caching. Howeve, the etieval pefomance is bounded by the speed of the single stoage seve. Convesely, paallel file systems, such as Vesta [], Galley [4], PVFS [5] and GPFS [], allow data speading acoss multiple stoage nodes and povide paallel access to it. The high tansfe ate is eached by vaious techniques such as I/O scheduling, content pefetching, etc. Moe ecently, high etieval pefomance is achieved by intoducing fast stoage devices like solid-state dives (SSD) [] and DRAM [8]. Unlike these existing wok dealing with the etieval pefomance poblem fom the application level, we conside this poblem fom the netwok level since in an LT code based stoage system the pobabilistic LT decoding could esult in lage etieval delay due to decoding failue. In [9], [0], [1], [], the authos discussed some mechanisms fo educing data fetching latency in distibuted netwoks. Those mechanisms ae designed fo geneal content without consideing any coding metics, and they could be applied togethe with ou method. SYSTEM MODEL AND PROBLEM STATE- MENT In this section, we fist pesent a schematic desciption of a cloud stoage achitectue, in which LT-encoded data packets ae spead out acoss a pool of stoage nodes fo high availability. Following that, we fomulate a delay-optimal file-etieval poblem, which aims to minimize the etieval delay by stategically scheduling packet etieval equests. The notations used in this section ae summaized in Table 1..1 System Achitectue In this pape, we focus on a distibuted cloud stoage system (e.g., a community-based cloud stoage system as in Tahoe-LAFS []). As illustated in Figue 1, the cloud stoage system manages a set of stoage

3 This aticle has been accepted fo publication in a futue issue of this jounal, but has not been fully edited. Content may change pio to final publication. Citation infomation: DOI /TCC , IEEE Tansactions on Cloud Computing IEEE TRANSACTIONS ON CLOUD COMPUTING 1 TABLE 1 Notations Notation k n λa l, σ θ llt ti s ni Desciption No. of oiginal symbols. No. of LT encoded symbols fo cetain taget decoding pobability. Aival ate fo ambient taffic. Mean and vaiance of length of ambient taffic packets. Aival ate fo LT taffic. Length of LT encoded symbols. Aival time fo ith LT encoded symbol. No. of stages. No. of LT encoded symbols equested in stage i. t0 nodes though a communication netwok. The uses can access to the stoage sevice though a dedicated potal. One paticula stoage application of inteest in this eseach is the file stoage. We assume that the stoage sevice povides both pemium LT-based file stoage and egula file stoage. Fo the LT-based file stoage, the potal, upon eceiving a file fom a use equest, encodes the file with a chosen LT code into a set of LT fagments o packets1 and speads them acoss diffeent nodes fo eliability and high availability. Upon eceiving a fileetieval equest, the potal sends a few packet etieval equests to diffeent stoage nodes, and gathes sufficient encoded packets to be fowaded to the use. Fo the egula file stoage, the potal simply stoes the eceived use file into a chosen stoage node, with some potential eplication in anothe set of nodes. We assume that the numbe of subscibes fo the pemium LT-based stoage sevice is much smalle than that fo the egula stoage sevice. As such, it is with high pobability that, at one instant, only one use will etieve his/he LT-coded files and the majoity of the file-etieval equests ae fo the egula stoage sevice. In this pape, we will analyze such a 1. Hee we use the tem packet intechangeably with fagment as we assume that an IP packet caies an LT encoded fagment in the system. t1... ti-1... Receive LT 1st LT packet packet equest aival ti... tn time... i-1-th LT i-th LT packet n-th LT packet packet aival aival aival Fig.. Aival pocess of LT encoded packets seen at the potal fo a file-etieval equest. simplified use case. The insights obtained though the mathematical famewok and numeical analysis will shed lights on moe pactical application scenaios.. Fig. 1. System achitectue fo a cloud stoage system. i Taffic Model In this achitectue, the potal node obseves two types of packets. The fist one is packets fo the egula stoage sevice, consideed as a pocess of ambient taffic. The ambient taffic follows a paticula aival pocess with an aival ate of λa. Moeove, the length of ambient packets is modeled as a andom vaiable with mean l and vaiance σ. The second one is the LT-coded packets fo the pemium stoage sevice. We assume the aival delay of each LT-coded packet is identically distibuted, each of which is a cetain andom vaiable with a mean value of θ 1. The length of LT-coded packets is assumed to be a constant, denoted by llt. When the potal equests n LT-coded packets fom the stoage gid, the packet aival pocess is illustated in Figue. We assume that the packet equest is sent out at time 0 (i.e., t0 = 0), and denote the aival time of the i-th LT-coded packet as ti. We also denote the inte-aival time between the i 1-th packet and the i-th packet as τi = ti ti 1.. Poblem Statement In the consideed distibuted stoage system, the bottleneck lies on the potal, because a lage numbe of uses can issue thei file equests to the potal. In this pape, we focus on the file-etieval delay, defined as the duation between the time fo the potal eceiving an LT-coded file equest and the time when the last LT-coded packet is sent out by the potal. The fileetieval delay is a good indicato of use expeience. Theefoe, we aim to educe the file-etieval delay by stategically scheduling the LT-coded packet equests. The delay-optimal file-etieval poblem is stated as follows. We assume a pobabilistic file-etieval model. In ode to achieve the pobability of successful decoding of p, the potal needs to equest n LT encoded packets fom the stoage gid. Taditionally, the n packets ae equested in one shot. This scheme is efeed to as a one-stage equest scheme. In this pape, we popose to use a multiple-stage equest scheme to impove the file-etieval pefomance. Specifically, the use can divide the equest into s stages, each P consisting of equests fo n1, n,, ns packets ( i ni = n).

4 infomation: DOI /TCC , IEEE Tansactions on Cloud Computing IEEE TRANSACTIONS ON CLOUD COMPUTING 4 If the use successfully decodes the file afte stage m, it will stop equesting the est s i=m+1 n i packets. In ou poposed multi-stage equest scheme, the designing objective is to minimize the aveage fileetieval delay, fo a given numbe of stages. Mathematically, it can be fomulated as the following optimization poblem, min D s (n 1,n,,n s ) (1) s s.t. n i = n, () i=1 n i 0,1 i s. () Hee D s ( ) denotes the aveage etieval delay unde a given equest scheme. Intuitively, multiple stages of packet etieval incus additional delay in stoage etieval. Howeve, we will show that the multi-stage etieval scheme can outpefom the single-stage etieval scheme in tems of the aveage file-etieval delay. This delay eduction oiginates fom the following obsevation. In the multi-stage etieval scheme, just etieving an adequate numbe of packets may aleady give sufficiently high success decodability, eliminating the need fo futhe ounds of packet etieval. Only when the file cannot be decoded with the set of eceived packets, the additional packet equests ae sent in subsequent stages. In such a case, the single-stage etieval scheme is a special case of ou poposed multi-stage etieval scheme, when s = 1. Fom an optimization pespective, the pefomance of the multistage etieval scheme cannot be wose than that of the single-stage scheme. 4 LT CODES AND ITS DECODABILITY In this section, we pesent a detailed desciption about LT-codes, including its encoding and decoding pocesses, and the pobability of decoding files fo a given numbe of etieved packets. 4.1 LT Encode/Decode LT codes ae the fist class of digital fountain codes, with nealy optimal easue coecting capability. Its main chaacteistic lies in employing a simple algoithm based on the exclusive-o opeation to encode and decode the message. As such, it is paticulaly appealing to cloud-based file stoage. In the LT-based cloud stoage system, a file is fist boken into k souce symbols, and then these k souce symbols ae encoded into n packets and spead acoss a pool of stoage nodes. The numbe of encoded packets n can be abitay lage depending on the duplication atio of the system. In this subsection, we biefly explain its encoding and decoding pocesses. The encoding and decoding pocesses of LT codes can be illustated via an example, as shown in Figue. S1 S S S a P1 P P P4 P5 c e g S1 1 S S S1 1 S S b d f h S1 1 S S S1 1 S S Fig.. An example of LT encoding and decoding pocedues fo k = 4 and n = 5.(a) LT encoding: encode 4 souce symbols,s 1 -S 4, into 5 packets,p 1 -P 5. (b)-(h) LT decoding to ecove the 4 souce symbols. An LT encode follows a thee-step pocess to geneate one encoded packet. Fist, a degee d [1, k] is andomly chosen fom a degee distibution of Ω d. Second, d distinct souce symbols ae chosen, unifomly at andom, fom the set of souce symbols. Finally, the encoded packet is equal to the bitwise sum, modulo, of those d chosen souce symbols. The infomation about the set of chosen souce symbols is called coding vecto and it is ecoded in the head of the encoded packet. The same pocess epeats until n encoded packets ae geneated. In Figue, Panel (a) demonstates an example of LT encoding pocedue with 4 binay souce symbols (i.e. k = 4), denoted by S 1,S,,S 4, and 5 LT encoded packets (i.e. n = 5), denoted by P 1,P,,P 5 with value The LT decoding pocess employs a simple message passing algoithm [4], which iteatively decodes souce symbols fom degee-1 encoded packets. Conside the same example illustated in Figue. At the fist iteation, the only encoded packets with degee equal to 1 is P (efe to Panel (a)). Thus, the souce symbol S which is connected to P is set to 1 (efe to Panel (b)). Afte S is ecoveed, the encoded packets which have connections with S ae extacted by the value of S and the connections ae emoved (efe to Panel (c)). Afte this step, a new symbol S 4 can be ecoveed and the same decoding pocedue is executed iteatively until no moe degee-1 encoded packets can be found. If thee ae still some encoded packets which ae not ecoveed, a decoding failue is epoted. In ode to ecove the est of souce symbols, one can equest moe encoded packets. Clealy, the LT decoding pocess cannot guaantee to ecove

5 infomation: DOI /TCC , IEEE Tansactions on Cloud Computing IEEE TRANSACTIONS ON CLOUD COMPUTING 5 Successful pobability k=100 k=00 k=00 k=400 k=1000 simulation fitting n/k Fig. 4. Fitting esults vesus simulation esults. all the souce symbols. In this example, if P 5 is missing, the decoding pocess will be teminated at Panel (b) since no moe degee-1 encoded packets can be found afte ecoveing S. 4. LT Decodability As shown in the example in Section 4.1, the LT decoding pocess is pobabilistic. Specifically, given a set of packets with a full-ank coding matix, the decoding pocess could still fail with a cetain pobability. Moeove, the successful pobability of decoding inceases as the numbe of eceived packets n inceases. In this case, LT decodability, denoted by f k (n), is defined as the pobability of successful decoding k souce symbols fom a set of n encoded packets (n k). Existing eseach on chaacteizing the LT decodability has not esulted in a closed-fom solution yet. In [5], the authos poposed a dynamic pogamming algoithm to calculate the LT decodability, with a computing complexity of O(n log n). Anothe algoithm in [] educes the computing complexity to O(k logk). Howeve, none of these pevious eseach effots esulted in a closed-fom solution to the LT decodability, while elying on numeical evaluation using dynamic pogamming. TABLE Fitting esults fo α and β k α β SSE In this pape, we deive an empiical model fo the LT decodability, by leveaging the numeical evaluation techniques fom []. Note that, in an LT-based cloud stoage system, the decodability unde 50% is of less engineeing inteest. As a esult, we focus on the decodability ove 50% in the est of this pape. We use a two-step pocedue to deive the empiical model fo the LT decodability, as follows: Fistly, we plot the LT decodability as a function of the numbe of encoded packet, by using the numeical technique suggested in []. Secondly, we use a geneic function of f k (n) = 1 e α(n k β) to cuve fit the numeical esults, whee α and β ae two fitting paametes elated to k. We illustate this appoach in Figue 4. Fist, we obtain the simulated LT decodability fo the cases of k = 100, k = 00, k = 00, k = 400 and k = 1000 as illustated with the solid cuves. Second, using MATLAB s Cuve Fitting Tool with a specific fitting function of f k (n) = 1 e α(n k β), we obtain the fitting esults of α and β togethe with the sum of squae eos (SSE) in Table. Finally, we compae the LT decodability between the simulation esults and the fitting esults (the dotted cuves) fo k = 100, 00, 00, 400, and 1000, in Figue 4. It can be obseved that the empiical model captues the simulation esults with a decent accuacy. In the est of this pape, we will use this empiical model of the LT decodability as a basis fo ou optimization famewok. 5 FILE-RETRIEVAL DELAY ANALYSIS In this section, we chaacteize the aveage fileetieval delay fo diffeent equest schemes in the pesence of ambient taffic. To validate ou analytical esults, we un compute simulation witten in Java using NetBeans.1. All the simulation esults ae obtained by aveaging 1000 simulation instances. In simulations, we set that the length of packets in the ambient taffic follows an exponential distibution. Although it is a simplified model, the insights obtained with this simple model can be applied to guide pactical system design. Table lists the default values of some paametes in the simulato. TABLE Default values in Notation Physical Meaning Value l Length of packet fo ambient taffic 104 Bytes l LT Length of LT-coded packet 104 Bytes Tansmission ate 800 kbps 5.1 Delay Analysis fo One Stage Request Scheme We fist investigate the file-etieval delay D 1 (n) fo n LT packets in the one-stage equest case. This delay consists of two pats as shown in Figue 5(a). The fist pat aises fom the taffic aiving befoe the LT equest and the second pat aises fom the taffic aiving afte the LT equest. In this analysis, we assume Poisson aival pocess fo ambient taffic and LT-coded packets. The fist pat only contains ambient taffic and it is teated as a classical M/G/1 queue. Moe infomation on M/G/1 queue can be found in [].

6 infomation: DOI /TCC , IEEE Tansactions on Cloud Computing IEEE TRANSACTIONS ON CLOUD COMPUTING Classical M/G/1 queuing delay Ambient taffic 1... n 10 8 Eq. () Appoximation Classical M/G/1 queuing delay LT packets equest Fist equest (a) case Fist Stage 1... n 1 Ambient taffic (b) case Fig. 5. Components of delay. Second equest Second Stage 1... n Fig.. Compaison between D 1 (n) and D 1 (n). with delay denoted by W. The second pat can be futhe divided into two sub-pats. Fistly, it contains a constant which is the tansmission time of n LT packets, which can be deived as nllt. The est is the time to pocess the ambient taffics which aive at the potal duing the inte-aival time of each LT packet. This pat is denoted by T. Thus, the delay D 1 (n) can be expessed as to appoximate D 1 (n). Simila esults ae found with diffeent settings of λ a and θ. Fo bevity, those esults ae not epoted D 1 (n) = W + nl LT +T. (4) Taking an expectation on both sides, we obtain D 1 (n) = W +T + nl LT = λ a(σ +l ) (1 λal ) + λ al = Γ+ λ al n i=1 n i=1 1 iθ + nl LT τ i + nl LT Γ+ λ al θ (ln(n)+1)+ nl LT, (5) whee Γ is a constant when the paametes fo the taffic ae detemined. Thee ae thee tems in Eq. (5), Γ, the logaithm tem and the linea tem. In ode to ensue the potal has a stable state, λ a should be less than 100 packets pe second unde ou setting stated in Table. Unde this condition, the ode of magnitude of Γ is 10. The numbe of souce symbols k usually exceeds 100 which implies the numbe of equested packets n is also lage than 100. Thus, compaed to the linea tem which has the ode of magnitude equal to 10 o 10, Γ is negligible. If we assume that λ a and θ ae compaable (e.g. λa θ 1), the logaithm tem has the ode of magnitude equal to 10 which is also negligible. As a esult, the linea tem D 1 (n) = nllt can be used to appoximate D 1 (n). In Figue, we plot the values of D 1 (n) and D 1 (n) fo n vaying fom 100 to 800 when λ a = 0 and θ = 50. We can obseve that Γ and the logaithm tem contibute little to the etieval delay. So it is easonable to use D 1 (n) Fig.. Delay in one-stage equest. 1: λ a = 10, θ = 5; : λ a = 0, θ = 50; : λ a = 0, θ = 50. In Figue, we plot the numeical etieval delay D 1 (n), compaed with the simulation esults, as a function of the numbe of equest packets unde diffeent λ a and θ settings. Notice that the numeical esults match the simulation esults well, confiming that using D 1 (n) to appoximate Eq. (5) is applicable. 5. Delay Analysis fo Multiple Stage Request In this subsection, we fist investigate the file-etieval delay fo the two-stage equest scheme. The packet aival pocess is illustated in Figue 5(b). Suppose in the fist stage, the use equests n 1 LT encoded packets. The delay fo the fist stage is D 1 (n 1 ). Afte decoding these n 1 packets, if the use fails to decode the oiginal file, it continues to equest the n packets. Hee we assume that duing the decoding pocess of n 1 packets, the tansmission queue in the potal has aleady etuned to the steady state. This assumption is easonable since it does take some time fo the use to detemine if the n 1 LTencoded packets ae decodable. Thus, the delay fo

7 infomation: DOI /TCC , IEEE Tansactions on Cloud Computing IEEE TRANSACTIONS ON CLOUD COMPUTING the second stage is identical to the fist stage except fo the numbe of encoded packets the use equests. As a esult, the oveall file-etieval delay fo the two stage equest case is given by D (n 1,n ) = f k (n 1 )D 1 (n 1 ) + (1 f k (n 1 ))(D 1 (n 1 )+D 1 (n )) = D 1 (n 1 )+(1 f k (n 1 ))D 1 (n ), () whee f k (n) is the pobability of successful decoding with n LT encoded packets. Using the fitting esults pesented in Section 4., we can calculate f k (n) appoximately. Taking expectation on both sides, we have D (n 1,n ) = D 1 (n 1 )+(1 f k (n 1 ))D 1 (n ). () We plot in Figs. 8-9 the aveage file-etieval delay fo the two-stage equest scheme, as a function of the numbe of packets equested in the fist stage, unde diffeent settings of k, n and taffic loads. Notice that the numeical esults match the simulation esults well, egadless of the taffic loads. Moeove, in all esults, the file-etieval delay fist deceases and then inceases as the numbe of packets equested in the fist stage inceases. This consistent tend indicates a potential fo file-etieval delay minimization by choosing an appopiate numbe of packets equested in the fist stage. We shall addess this optimization poblem in Section (a) λ a = 10,θ = (c) λ a = 0,θ = (b) λ a = 0,θ = (d) λ a = 0,θ = 50 Fig. 8. Delay in two-stage equest when k = 100 and n = 00 unde diffeent taffic loads. Both numeical and simulation esults confim that the minimal delay exists. The esult fo the two-stage equest scheme can be genealized into abitay t-stage equest. Specifically, the delay expession fo t-stage equest can be defined (a) λ a = 10,θ = No. of equest in fist stage (c) λ a = 0,θ = (b) λ a = 0,θ = 5 Simulaaton (d) λ a = 0,θ = 50 Fig. 9. Delay in two-stage equest when k = 400 and n = 00 unde diffeent taffic loads. Both numeical and simulation esults confim that the minimal delay exists. ecusively, D t (n 1,n,,n t ) = (1 f k (n 1 ))(D 1 (n 1 ) + D t 1 (n,,n t )) + f k (n 1 )D 1 (n 1 ), whee the initial values fo D 1, D ae defined in Eq. (4) and Eq. (). In Figue 10 and 11, we plot the optimal delay compaison obtained by diffeent equest schemes fo diffeent numbe of oiginal symbols unde diffeent taffic loads. Both figues show that the multiple stage equest schemes outpefom taditional onestage equest. Moe specifically, the two-stage equest scheme can educe etieval delay by 15% compaed with the one-stage equest. Whilst, the thee-stage equest scheme futhe educes the delay 4% only. It is obvious that to find an optimal equest in thee-stage equest is much moe difficult than that in two-stage equest and the impovement of thee-stage equest is not so significant. Consequently, we will only focus on finding an optimal two-stage equest scheme in the est of this pape. OPTIMAL SCHEDULING FOR PACKET RE- TRIEVAL In this section, we will investigate the optimal scheduling of packet equests to minimize the fileetieval delay fo two-stage equest scheme. The esults in Figue 8 and Figue 9 suggest an optimal two-stage equest scheme fom Eq. (). Anothe obsevation is that fo a ational taget successful pobability (lage than 90%), the optimal numbe of LT-coded packets equested in the fist stage fo a two-stage equest scheme yields f k (n 1 ) > 50%. Thus,

8 infomation: DOI /TCC , IEEE Tansactions on Cloud Computing IEEE TRANSACTIONS ON CLOUD COMPUTING Thee stage (a) λ a = 10,θ = 5 Thee stage (c) λ a = 0,θ = Thee stage (b) λ a = 0,θ = 5 Thee stage (d) λ a = 0,θ = 50 Fig. 10. Minimal delay compaison among one-stage equest, two-stage equest and thee-stage equest when k = Thee stage (a) λ a = 10,θ = 5 Thee stage (c) λ a = 0,θ = Thee stage (b) λ a = 0,θ = 5 Thee stage (d) λ a = 0,θ = 50 Fig. 11. Minimal delay compaison among one-stage equest, two-stage equest and thee-stage equest when k = 400. we can apply the fitting function fo f k (n) to Eq. () and simplify the optimization poblem pesented in Section. fo the two-stage equest. Fo the convenience of discussion, we fomalize the simplified optimization poblem as: min D (n 1 ) = D 1 (n 1 )+e α(n 1 k β) D 1 (n n 1 ) s.t. kβ n 1 n,n 1 N. (8) By solving the above optimization poblem, we can detemine the optimal numbe of packets equested in the fist stage fo a two-stage equest scheme. Instead of finding the exact solution, we elax the intege constaint, and assume n 1 is a positive eal numbe to solve the appoximate poblem without intege constaint. Note that the minimum D (n 1 ) without the intege constaint is a lowe bound of the minimum D (n 1 ) with intege constaint. We obseved in Section 5.1 that D 1 (n) can be appoximated as llt n. Thus, D (n 1 ) in Eq. (8) is convex. Now, taking diffeentiation with espect to n 1 on both sides of Eq. (8) and set D n 1 = 0, we get the equation e α k (n1 kβ) = α k (n n 1) + 1. The solution to this equation is n 1 = n+ k α k α W(eα(n k β)+1 ). (9) Hee, W(x) is Lambet function [8] which is defined as x = W(x)e W(x). Note that W(x) cannot be expessed in tems of elementay functions, and thus calculating the eal value of W(x) is not an easy task. Thee exists liteatues on designing algoithm to compute W(x) [9], [40]. Howeve, in this pape, we ae moe inteested in the analytical bound of W(x). In [41], the authos poved the following bound of W(x), Lemma 1. Fo x > 1 we have W(x) logx (logx loglogx+1), (10) 1+logx with equality only fo x = e x W(x) 4 1 W(x) bound Fig. 1. Compaison between W(x) and its bound. Figue 1 shows the compaison between the tue value of W(x) and the lowe bound in Eq. (10). It is clea that this lowe bound is tight enough and we can use this bound to appoximate W(x). By applying Eq. (10) on Eq. (9), we have n 1 = n+ k α k α W(eα(n k β)+1 ) kβ + k (α( n k β)+1) log(α(n k β)+1) α α( n k β)+. (11) It is tivial that n 1 > kβ, and n 1 kβ + α k log(α(n k β)+1) kβ + kα(n k β) α = n. (1)

9 infomation: DOI /TCC , IEEE Tansactions on Cloud Computing IEEE TRANSACTIONS ON CLOUD COMPUTING 9 Eq. (1) shows n 1 n. Thus, we confim that n 1 is the optimal equest in the fist stage which minimizes the two-stage file-etieval delay. In Figue 1, we show Optimal fist stage equest Optimal fist stage equst (a) k = (c) k = 400 Optimal fist stage equest Optimal fist stage equest (b) k = (d) k = 1000 Fig. 1. Compaison of the optimal fist stage equest between simulation and appoximation unde diffeent k. the compaison of the optimal fist stage equest between simulation and appoximation unde diffeent k. In the simulation, the taffic paametes λ a and θ ae set to 0 packets pe second and 50 packets pe second espectively. The esults confim that the appoximation of the optimal fist stage equest obtained fom Eq. (11) is pactical. In Eq. (11), the optimal fiststage equest is unelated to taffic load (i.e. λ a, θ). When the numbe of oiginal symbols k is fixed (i.e. the paametes a and c ae known), the optimal fiststage equest is detemined. This is consistent with the esults shown in Figue 8 and 9. This phenomena can be explained by the following eason. Compaed with the LT encoded packets equested in each stage, the packets belonging to ambient taffic ae negligible. The file-etieval delay is mainly caused by the pocessing the equested LT encoded packets. Based on Eq. (11), if we incease the taget successful pobability (i.e. incease the numbe of equested packets n), the optimal numbe of packets equested in fist stage n 1 will be also inceased. The atio n 1 n is deceased when n is inceased. We plot the atio in Figue 14. This atio dopping phenomena can be undestood as follows. Fom the aspect of the decoding pobability, evey packet contibutes in the decoding pocess. Fom Figue 4, we see an unequal contibution of each packet to the decoding pobability. The contibution of an additional packet to the decoding pobability is high when the pobability stays at a lowe level. As the pobability pogesses highe, the contibution of each additional packet dops. In othe wods, to make a same gain in the decoding pobability, moe packets ae needed when the pobability is at a highe level. Notice fom Figue that the delay in the one-stage equest scheme inceases linealy with the numbe of equested packets. Consequently, tadeoff exists between decodability and delay. Instead of equesting all the packets equied by the taget decoding pobability at once, equesting a small potion of the numbe of packets needed in the fist stage will geneate a decoding pobability that contibutes most to the final decoding pobability; while the maginal contibution fom the second stage is elatively small. As the decodability inceases, the contibution fom the second stage becomes smalle. In othe wods, a pope numbe of packets equested in the fist stage will give us a elatively high decoding pobability. As a esult, setting a vey high decoding pobability is not ational Ratio (a) k = 100 Ratio (b) k = 400 Fig. 14. Optimal fist stage equest atio when k = 100 and k = 400. DELAY-DECODABILITY TRADEOFF We now investigate the fundamental tadeoff between the tageted decoding pobability and the fileetieval delay fo diffeent equest schemes. This delay-decodability tadeoff is impotant since it helps uses to make a ational equest scheme depending on the equiement of thei applications one stage equest two stage equest Taget successful pobability (a) k = one stage equest two stage equest Taget successful pobability (b) k = 400 Fig. 15. Tadeoff between decoding pobability and delay when k = 100 and k = 400. In Figue 15, we plot the delay-decodability tadeoff fo k = 100 and k = 400 espectively. The numeical esult is obtained by combining Eq. () and Eq. (11). Since taffic paametes do not have stong effect on the optimal etieval delay (efe to the figues shown in Section. 5), we choose λ a = 0,θ = 50 as an example. As shown in Fig. 15, the delay fo onestage equest inceases shaply when the decoding

10 infomation: DOI /TCC , IEEE Tansactions on Cloud Computing IEEE TRANSACTIONS ON CLOUD COMPUTING 10 pobability cosses 95%. In compaison, fo the twostage equest scheme, the delay is consistently lowe. This advantage eflects the gain fom being able to decode in the fist stage with an adequate instead of excessive numbe of LT-coded packets. Based on the epoted delay-decodability tadeoff, uses can choose an appopiate taget of decoding pobability, i.e. fo some delay sensitive applications like steam video, a lowe decoding pobability can be adopted such that the aveage etieval delay can be maintained unde a cetain theshold. equest scheme exhibits the same behavio even when the busty MMPP taffic model is used. With a diffeent decoding pobability, the best fist-stage equest can still be found. Only the aveage delay is affected since moe packets ae needed to achieve a highe decoding pobability. This obsevation confims the optimal equest in fist stage in Eq. (11) which is independent of the popety of ambient taffic. We believe that diffeent models of ambient taffic only affect on the oveall delay while using ou two-stage equest scheme can always give the minimal delay. 8 GENERAL TRAFFIC MODEL In Sections and, we assume that the aival pocess of ambient taffic follows Poisson pocess. In this section, we use a diffeent taffic model to examine how ou two-stage equest scheme pefoms. The Makov-modulated Poisson pocess (MMPP) [4] has been extensively used fo modeling pocesses whose aival ates vay andomly ove time [4]. We use MMPP to model the ambient taffic hee since it is moe geneal than simple Poisson pocess and can captue some featues to study bustiness of ambient taffic. In ou simulations, the MMPP taffic has aival ates of λ 1 and λ fo the two phases, and an exponentially distibuted ate switching duation with a mean value equal to 0.1s. We fix θ = 50 and vay the value of λ 1, λ and n. The simulation esults ae shown in Figue 1. 9 CONCLUSION In this pape, we have investigated the poblem of delay optimal file-etieval unde a distibuted cloud stoage system. The file is fist LT-encoded and spead out into a list of distibuted stoage nodes. Duing etieval, the use schedules the packet equest in a multi-stage manne, with an objective to minimize the aveage file-etieval delay. We developed an accuate model to chaacteize the aveage file-etieval delay fo diffeent equest stategies. Using this model, we deived an optimal two-stage equest scheme fo a given decoding pobability. Both simulation and numeical esults confim that this optimal scheme can educe the aveage delay damatically. Ou analysis offes a way fo stoage system opeatos to design an optimized stoage etieval scheme fo LT-based distibuted cloud stoage systems. Dealy (s) Dealy (s) (a) λ 1 = 10,λ = (c) λ 1 = 0,λ = 0 Dealy (s) Dealy (s) (b) λ 1 = 10,λ = (d) λ 1 = 0,λ = 0 Fig. 1. esult of MMPP model. (a)k = 100, n = 00. (b) k = 100, n = 50. (c) k = 400, n = 00. (d) k = 400, n = 800. Compaing with the simulation esults shown in Figue 8 and Figue 9, we can see that ou two-stage REFERENCES [1] Amazon S. [] EMC Atmos Online Stoage. [] L. Heilig and S. Voss, A scientometic analysis of cloud computing liteatue, IEEE Tansactions on Cloud Computing, vol., no., pp. 8, July 014. [4] J.-W. Lin, C.-H. Chen, and J. Chang, Qos-awae data eplication fo data-intensive applications in cloud computing systems, IEEE Tansactions on Cloud Computing, vol. 1, no. 1, pp , Jan 01. [5] H. Weathespoon and J. Kubiatowicz, Easue coding vs. eplication: A quantitative compaison, Pee-to-Pee Systems, pp. 8, 00. [] J. Hafne, Weave codes: highly fault toleant easue codes fo stoage systems, in Poc. the 4th confeence on USENIX Confeence on File and Stoage Technologies. USENIX Association, 005, pp [] J. Plank and L. Xu, Optimizing cauchy Reed-Solomon codes fo fault-toleant netwok stoage applications, in IEEE Int. Symp. Netwok Computing and Applications. IEEE, 00, pp [8] C. Huang, M. Chen, and J. Li, Pyamid codes: Flexible schemes to tade space fo access efficiency in eliable data stoage systems, in IEEE Int. Symp. Netwok Computing and Applications. IEEE, 00, pp [9] F. Oggie and A. Datta, Self-epaiing homomophic codes fo distibuted stoage systems, in Poc. IEEE INFOCOM. IEEE, 010, pp [10] H. Xia and A. Chien, Robustoe: a distibuted stoage achitectue with obust and high pefomance, in Poceedings of the 00 ACM/IEEE confeence on Supecomputing. ACM, 00, p. 44. [11] N. Cao, S. Yu, Z. Yang, W. Lou, and Y. T. Hou, Lt codes-based secue and eliable cloud stoage sevice, in INFOCOM, 01 Poceedings IEEE. IEEE, 01.

11 infomation: DOI /TCC , IEEE Tansactions on Cloud Computing IEEE TRANSACTIONS ON CLOUD COMPUTING 11 [1] T. Benson, A. Akella, and D. Maltz, Netwok taffic chaacteistics of data centes in the wild, in Poceedings of the 10th annual confeence on Intenet measuement. ACM, 010, pp. 80. [1] I. Reed and G. Solomon, Polynomial codes ove cetain finite fields, Jounal of the Society fo Industial and Applied Mathematics, vol. 8, no., pp , 190. [14] Symfom. [15] D. Conno, P. H. Coigan, J. E. Bagley, and S. S. NOW, Cloud stoage: Adoption, pactice and deployment, An Outlook Repot fom Stoage Stategies NOW, 011. [1] M. Sadai, R. Restepo, F. Feki, and E. Soljanin, Memoy allocation in distibuted stoage netwoks, in Poc. Int. Symp. Infomation Theoy ISIT. IEEE, 010, pp [1] D. Leong, A. Dimakis, and T. Ho, Distibuted stoage allocation fo high eliability, in IEEE Int. Confeence on Communications (ICC). IEEE, 010, pp. 1. [18] A. Dimakis, P. Godfey, Y. Wu, M. Wainwight, and K. Ramchandan, Netwok coding fo distibuted stoage systems, IEEE Tansactions on Infomation Theoy, vol. 5, no. 9, pp , 010. [19] D. Leong, A. Dimakis, and T. Ho, Distibuted stoage allocations fo optimal delay, in Poc. Int. Symp. Infomation Theoy ISIT, 011. [0] M. Luby, LT codes, in Poc. 4d Annual IEEE Symp. Foundations of Compute Science, 00, pp [1] R. Sandbeg, D. Goldbeg, S. Kleiman, D. Walsh, and B. Lyon, Design and implementation of the sun netwok filesystem, in Poceedings of the Summe 1985 USENIX Confeence, 1985, pp [] M. Nelson, B. Welch, and J. Oustehout, Caching in the spite netwok file system, ACM Tansactions on Compute Systems (TOCS), vol., no. 1, pp , [] P. Cobett and D. Feitelson, The vesta paallel file system, ACM Tansactions on Compute Systems (TOCS), vol. 14, no., pp. 5 4, 199. [4] N. Nieuwejaa and D. Kotz, The galley paallel file system, Paallel Computing, vol., no. 4-5, pp. 44 4, 199. [5] P. Cans, W. Ligon III, R. Ross, and R. Thaku, Pvfs: A paallel file system fo linux clustes, in Poceedings of the 4th annual Linux Showcase & Confeence-Volume 4. USENIX Association, 000, pp [] F. B. Schmuck and R. L. Haskin, Gpfs: A shaed-disk file system fo lage computing clustes. in FAST, vol., 00, p. 19. [] M. Dunn and A. Reddy, A new I/O schedule fo solid state devices. Texas A&M Univesity, 010. [8] J. Oustehout, P. Agawal, D. Eickson, C. Kozyakis, J. Leveich, D. Mazièes, S. Mita, A. Naayanan, G. Paulka, M. Rosenblum et al., The case fo amclouds: scalable highpefomance stoage entiely in dam, ACM SIGOPS Opeating Systems Review, vol. 4, no. 4, pp , 010. [9] S. P. Vandewiel and D. J. Lilja, Data pefetch mechanisms, ACM Computing Suveys, vol., no., pp , 000. [0] V. Gupta, M. Hachol Balte, K. Sigman, and W. Whitt, Analysis of join-the-shotest-queue outing fo web seve fams, Pefomance Evaluation, vol. 4, no. 9, pp , 00. [1] M. Bjokqvist, L. Chen, M. Vukolic, and X. Zhang, Minimizing etieval latency fo content cloud, in Poc. IEEE INFOCOM, Apil 011, pp [] B. Guan, J. Wu, Y. Wang, and S. Khan, Civsched: A communication-awae inte-vm scheduling technique fo deceased netwok latency between co-located vms, IEEE Tansactions on Cloud Computing, vol., no., pp. 0, July 014. [] Z. Wilcox-O Hean and B. Wane, Tahoe: the least-authoity filesystem, in Poceedings of the 4th ACM intenational wokshop on Stoage secuity and suvivability, 008, pp. 1. [4] J. Peal, Fusion, popagation, and stuctuing in belief netwoks, Atificial intelligence, vol. 9, no., pp , 198. [5] R. Kap, M. Luby, and A. Shokollahi, Finite length analysis of LT codes, in Poc. Int. Symp. Infomation Theoy ISIT, 004, p. 9. [] E. Maneva and A. Shokollahi, New model fo igoous analysis of LT-codes, in Poc. Int. Symp. Infomation Theoy ISIT, 00, pp. 9. [] D. Goss, J. F. Shotle, J. M. Thompson, and C. M. Hais, Fundamentals of queueing theoy. Wiley. com, 01. [8] R. Coless, G. Gonnet, D. Hae, D. Jeffey, and D. Knuth, On the lambet w function, Advances in Computational Mathematics, vol. 5, no. 1, pp. 9 59, 199. [9] F. N. Fitsch, R. E. Shafe, and W. P. Cowley, Solution of the tanscendental equation wew = x, Commun. ACM, vol. 1, pp. 1 14, Febuay 19. [40] D. A. Bay, P. J. Culligan-Hensley, and S. J. Bay, Real values of the w-function, ACM Tans. Math. Softw., vol. 1, pp , June [41] A. Hoofa and M. Hassani, Inequalities on the lambet w function and hypepowe function, J. Inequal. Pue and Appl. Math, vol. 9, no., 008. [4] D. R. Cox, Some statistical methods connected with seies of events, Jounal of the Royal Statistical Society, pp , [4] W. Fische and K. Meie-Hellsten, The makov-modulated poisson pocess (mmpp) cookbook, Pefomance Evaluation, vol. 18, no., pp , 199.

12 infomation: DOI /TCC , IEEE Tansactions on Cloud Computing IEEE TRANSACTIONS ON CLOUD COMPUTING 1 Haifeng Lu eceived his B.Eng degee in compute science and engineeing fom the Univesity of Science and Technology of China in 008. Since 009, he has been a PhD student at School of Compute Engineeing, Nanyang Technological Univesity. His eseach inteests include netwok coding, ateless coding, cloud computeing. Fom June 01 to July 014, he was a poject office at Rapid-Rich Object Seach (ROSE) Lab, NTU. Cuently, he woks at Alibaba Inc. as a senio secuity enginee. Yonggang Wen eceived the Ph.D. degee in electical engineeing and compute science fom the Massachusetts Institute of Technology, Cambidge, MA, USA, in 008. He is cuently an Assistant Pofesso with the School of Compute Engineeing, Nanyang Technological Univesity, Singapoe. Peviously, he was with Cisco, San Jose, CA, USA, as a Senio Softwae Enginee and a System Achitect fo content netwoking poducts. He has also been a Reseach Inten with Bell Laboatoies, Muay Hill, NJ, USA, Sycamoe Netwoks, Chelmsfod, MA, USA, and a Technical Adviso to the Chaiman at Linea A Netwoks, Inc., Milpitas, CA, USA. His cuent eseach inteests include cloud computing, mobile computing, multimedia netwoks, cybe secuity, and geen ICT. Chuan Heng Foh (S 00-M 0-SM 09) eceived his M.Sc. degee fom Monash Univesity, Austalia in 1999 and Ph.D. degee fom the Univesity of Melboune, Austalia in 00. Afte his PhD, he spent months as a Lectue at Monash Univesity in Austalia. In Decembe 00, he joined Nanyang Technological Univesity as an Assistant Pofesso until 01. He is now a Senio Lectue at The Univesity of Suey. His eseach inteests include potocol design and pefomance analysis of vaious compute netwoks, 5G netwoks, and data cente netwoks. He has authoed o coauthoed ove 100 efeeed papes in intenational jounals and confeences. He actively paticipates in IEEE confeence and wokshop oganization, including the Intenation Wokshop on Cloud Computing Systems, Netwoks, and Applications (CCSNA) whee he is a steeing membe. He is cuently an Associate Edito fo IEEE Access, IEEE Wieless Communications, and vaious othe Intenational Jounals. He is also the chai of the Special Inteest Goup on Geen Data Cente and Cloud Computing unde IEEE Technical Committee on Geen Communications and Computing (TCGCC). He is a senio membe of IEEE. Jianfei Cai (S 98-M 0-SM 0) eceived his PhD degee fom the Univesity of Missoui- Columbia. Cuently, he is the Head of Visual & Inteactive Computing Division at the School of Compute Engineeing, Nanyang Technological Univesity, Singapoe. His majo eseach inteests include visual infomation pocessing and multimedia netwoking. He has published ove 100 technical papes in intenational confeences and jounals. He has been actively paticipating in pogam committees of vaious confeences. He had seved as the leading Technical Pogam Chai fo IEEE Intenational Confeence on Multimedia & Expo (ICME) 01 and he cuently sits in the steeing committee of ICME. He was an invited speake fo the fist IEEE Signal Pocessing Society Summe School on D and high definition / high contast video pocess systems in 011. He is also an Associate Edito fo IEEE Tansactions on Cicuits and Systems fo Video Technology (T-CSVT), and a senio membe of IEEE.

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

Erasure-Coding Based Routing for Opportunistic Networks

Erasure-Coding Based Routing for Opportunistic Networks Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant

More information

On using circuit-switched networks for file transfers

On using circuit-switched networks for file transfers On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Any modern computer system will incorporate (at least) two levels of storage:

Any modern computer system will incorporate (at least) two levels of storage: 1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

Signal integrity analysis and physically based circuit extraction of a mounted

Signal integrity analysis and physically based circuit extraction of a mounted emc design & softwae Signal integity analysis and physically based cicuit extaction of a mounted SMA connecto A poposed geneal appoach is given fo the definition of an equivalent cicuit with SMAs mounted

More information

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks Numbe of Paths and Neighbous Effect on Multipath Routing in Mobile Ad Hoc Netwoks Oday Jeew School of Infomation Systems and Accounting Univesity of Canbea Canbea ACT 2617, Austalia oday.jeew@canbea.edu.au

More information

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

i-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA

i-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA i-pcgrid Wokshop 2016 Apil 1 st 2016 San Fancisco, CA Liang Min* Eddy Banks, Bian Kelley, Met Kokali, Yining Qin, Steve Smith, Philip Top, and Caol Woodwad *min2@llnl.gov, 925-422-1187 LDRD 13-ERD-043

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

ANN Models for Coplanar Strip Line Analysis and Synthesis

ANN Models for Coplanar Strip Line Analysis and Synthesis 200 IJCSNS Intenational Jounal of Compute Science and Netwok Secuity, VOL.8 No.10, Octobe 2008 Models fo Coplana Stip Line Analysis and J.Lakshmi Naayana D.K.Si Rama Kishna D.L.Patap Reddy Chalapathi Institute

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

Using SPEC SFS with the SNIA Emerald Program for EPA Energy Star Data Center Storage Program Vernon Miller IBM Nick Principe Dell EMC

Using SPEC SFS with the SNIA Emerald Program for EPA Energy Star Data Center Storage Program Vernon Miller IBM Nick Principe Dell EMC Using SPEC SFS with the SNIA Emeald Pogam fo EPA Enegy Sta Data Cente Stoage Pogam Venon Mille IBM Nick Pincipe Dell EMC v6 Agenda Backgound on SNIA Emeald/Enegy Sta fo block Intoduce NAS/File test addition;

More information

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,

More information

EE 6900: Interconnection Networks for HPC Systems Fall 2016

EE 6900: Interconnection Networks for HPC Systems Fall 2016 EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection

More information

Dynamic Topology Control to Reduce Interference in MANETs

Dynamic Topology Control to Reduce Interference in MANETs Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity

More information

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing IEEE TRANSACTIONS ON COMPUTERS, VOL. 50, NO. 9, SEPTEMBER 200 949 Dynamic Multiple Paity (DMP) Disk Aay fo Seial Tansaction Pocessing K.H. Yeung, Membe, IEEE, and T.S. Yum, Senio Membe, IEEE AbstactÐThe

More information

POMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler

POMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler POMDP: Intoduction to Patially Obsevable Makov Decision Pocesses Hossein Kamalzadeh, Michael Hahsle 2019-01-02 The R package pomdp povides an inteface to pomdp-solve, a solve (witten in C) fo Patially

More information

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300

More information

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity

More information

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE 1 YAROSLAVTSEV A.F., 2 Al-THUNEIBAT S.A., 3 AL TAWALBEH N.A 1 Depatment of Netwoking, SSUTI, Novosibisk, Russia

More information

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,

More information

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok 14260 Email:

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Decentalized Tust Management fo Ad-Hoc Pee-to-Pee Netwoks Thomas Repantis Vana Kalogeaki Depatment of Compute Science & Engineeing Univesity of Califonia, Riveside Riveside, CA 92521 {tep,vana}@cs.uc.edu

More information

The Dual Round Robin Matching Switch with Exhaustive Service

The Dual Round Robin Matching Switch with Exhaustive Service The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

Comparisons of Transient Analytical Methods for Determining Hydraulic Conductivity Using Disc Permeameters

Comparisons of Transient Analytical Methods for Determining Hydraulic Conductivity Using Disc Permeameters Compaisons of Tansient Analytical Methods fo Detemining Hydaulic Conductivity Using Disc Pemeametes 1,,3 Cook, F.J. 1 CSRO Land and Wate, ndoooopilly, Queensland The Univesity of Queensland, St Lucia,

More information

DISTRIBUTION MIXTURES

DISTRIBUTION MIXTURES Application Example 7 DISTRIBUTION MIXTURES One fequently deals with andom vaiables the distibution of which depends on vaious factos. One example is the distibution of atmospheic paametes such as wind

More information

Mobility Pattern Recognition in Mobile Ad-Hoc Networks

Mobility Pattern Recognition in Mobile Ad-Hoc Networks Mobility Patten Recognition in Mobile Ad-Hoc Netwoks S. M. Mousavi Depatment of Compute Engineeing, Shaif Univesity of Technology sm_mousavi@ce.shaif.edu H. R. Rabiee Depatment of Compute Engineeing, Shaif

More information

Keith Dalbey, PhD. Sandia National Labs, Dept 1441 Optimization & Uncertainty Quantification

Keith Dalbey, PhD. Sandia National Labs, Dept 1441 Optimization & Uncertainty Quantification SAND 0-50 C Effective & Efficient Handling of Ill - Conditioned Coelation atices in Kiging & adient Enhanced Kiging Emulatos hough Pivoted Cholesky Factoization Keith Dalbey, PhD Sandia National Labs,

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

Exploring non-typical memcache architectures for decreased latency and distributed network usage.

Exploring non-typical memcache architectures for decreased latency and distributed network usage. Syacuse Univesity SURFACE Electical Engineeing and Compute Science Technical Repots College of Engineeing and Compute Science 9-5-20 Exploing non-typical memcache achitectues fo deceased latency and distibuted

More information

A Caching Algorithm using Evolutionary Game Theory in a File-Sharing System

A Caching Algorithm using Evolutionary Game Theory in a File-Sharing System A Caching Algoithm using Evolutionay Game Theoy in a File-Shaing System Masahio Sasabe Cybemedia Cente Osaka Univesity 1-32 Machikaneyama-cho, Toyonaka-shi Osaka 56-43, Japan m-sasabe@cmc.osaka-u.ac.jp

More information

Concomitants of Upper Record Statistics for Bivariate Pseudo Weibull Distribution

Concomitants of Upper Record Statistics for Bivariate Pseudo Weibull Distribution Available at http://pvamuedu/aam Appl Appl Math ISSN: 93-9466 Vol 5, Issue (Decembe ), pp 8 9 (Peviously, Vol 5, Issue, pp 379 388) Applications and Applied Mathematics: An Intenational Jounal (AAM) Concomitants

More information

Worst-Case Delay Bounds for Uniform Load-Balanced Switch Fabrics

Worst-Case Delay Bounds for Uniform Load-Balanced Switch Fabrics Wost-Case Delay Bounds fo Unifom Load-Balanced Switch Fabics Spyidon Antonakopoulos, Steven Fotune, Rae McLellan, Lisa Zhang Bell Laboatoies, 600 Mountain Ave, Muay Hill, NJ 07974 fistname.lastname@alcatel-lucent.com

More information

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology, (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Efficient Candidacy Reduction Fo Fequent Patten Mining M.H Nadimi-Shahaki 1, Nowati Mustapha 2, Md Nasi B Sulaiman 2, Ali B Mamat

More information

Lecture # 04. Image Enhancement in Spatial Domain

Lecture # 04. Image Enhancement in Spatial Domain Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency

More information

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),

More information

Automatically Testing Interacting Software Components

Automatically Testing Interacting Software Components Automatically Testing Inteacting Softwae Components Leonad Gallaghe Infomation Technology Laboatoy National Institute of Standads and Technology Gaithesbug, MD 20899, USA lgallaghe@nist.gov Jeff Offutt

More information

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen Accuate Diffaction Efficiency Contol fo Multiplexed Volume Hologaphic Gatings Xuliang Han, Gichel Kim, and Ray T. Chen Micoelectonic Reseach Cente Depatment of Electical and Compute Engineeing Univesity

More information

Modeling spatially-correlated data of sensor networks with irregular topologies

Modeling spatially-correlated data of sensor networks with irregular topologies This full text pape was pee eviewed at the diection of IEEE Communications Society subject matte expets fo publication in the IEEE SECON 25 poceedings Modeling spatially-coelated data of senso netwoks

More information

Achievable Catalog Size in Peer-to-Peer Video-on-Demand Systems

Achievable Catalog Size in Peer-to-Peer Video-on-Demand Systems Achievable Catalog Size in Pee-to-Pee Video-on-Demand Systems Yacine Boufkhad, Fabien Mathieu, Fabien De Montgolfie, Diego Peino, Lauent Viennot To cite this vesion: Yacine Boufkhad, Fabien Mathieu, Fabien

More information

FINITE ELEMENT MODEL UPDATING OF AN EXPERIMENTAL VEHICLE MODEL USING MEASURED MODAL CHARACTERISTICS

FINITE ELEMENT MODEL UPDATING OF AN EXPERIMENTAL VEHICLE MODEL USING MEASURED MODAL CHARACTERISTICS COMPDYN 009 ECCOMAS Thematic Confeence on Computational Methods in Stuctual Dynamics and Eathquake Engineeing M. Papadakakis, N.D. Lagaos, M. Fagiadakis (eds.) Rhodes, Geece, 4 June 009 FINITE ELEMENT

More information

Desired Attitude Angles Design Based on Optimization for Side Window Detection of Kinetic Interceptor *

Desired Attitude Angles Design Based on Optimization for Side Window Detection of Kinetic Interceptor * Poceedings of the 7 th Chinese Contol Confeence July 6-8, 008, Kunming,Yunnan, China Desied Attitude Angles Design Based on Optimization fo Side Window Detection of Kinetic Intecepto * Zhu Bo, Quan Quan,

More information

Diversity-Multiplexing-Delay Tradeoffs in MIMO Multihop Networks with ARQ

Diversity-Multiplexing-Delay Tradeoffs in MIMO Multihop Networks with ARQ ISIT, Austin, Texas, U.S.A., June - 8, Divesity-Multiplexing-Delay Tadeoffs in MIMO Multihop Netwos with ARQ Yao Xie, Andea Goldsmith Depatment of Electical Engineeing, Stanfod Univesity, Stanfod, CA.

More information

Resolution and stability analysis of offset VSP acquisition scenarios with applications to fullwaveform

Resolution and stability analysis of offset VSP acquisition scenarios with applications to fullwaveform Resolution and stability analysis of offset VSP acquisition scenaios with applications to fullwavefom invesion I. Silvestov, IPGG SB RAS, D. Neklyudov, IPGG SB RAS, M. Puckett, Schlumbege, V. Tcheveda,

More information

Gravitational Shift for Beginners

Gravitational Shift for Beginners Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational

More information

Embeddings into Crossed Cubes

Embeddings into Crossed Cubes Embeddings into Cossed Cubes Emad Abuelub *, Membe, IAENG Abstact- The hypecube paallel achitectue is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability

More information

Time-Constrained Big Data Transfer for SDN-Enabled Smart City

Time-Constrained Big Data Transfer for SDN-Enabled Smart City Emeging Tends, Issues, and Challenges in Big Data and Its Implementation towad Futue Smat Cities Time-Constained Big Data Tansfe fo SDN-Enabled Smat City Yuanguo Bi, Chuan Lin, Haibo Zhou, Peng Yang, Xuemin

More information

On Error Estimation in Runge-Kutta Methods

On Error Estimation in Runge-Kutta Methods Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment

More information

Automatic Generation of Reliable E Commerce Payment Processes

Automatic Generation of Reliable E Commerce Payment Processes Infomation Systems Engineeing (WISE 2000), Hong Kong, China, June 2000. Automatic Geneation of Reliable E Commece Payment Pocesses Heiko Schuldt Andei Popovici Hans-Jög Schek Institute of Infomation Systems

More information

All lengths in meters. E = = 7800 kg/m 3

All lengths in meters. E = = 7800 kg/m 3 Poblem desciption In this poblem, we apply the component mode synthesis (CMS) technique to a simple beam model. 2 0.02 0.02 All lengths in metes. E = 2.07 10 11 N/m 2 = 7800 kg/m 3 The beam is a fee-fee

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,

More information

A ROI Focusing Mechanism for Digital Cameras

A ROI Focusing Mechanism for Digital Cameras A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula

More information

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver 1 RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Dive Amit Jain Daji Qiao Kang G. Shin The Univesity of Michigan Ann Abo, MI 4819, USA {amitj,dqiao,kgshin@eecs.umich.edu Abstact The cuent

More information

An Energy-Efficient Approach for Provenance Transmission in Wireless Sensor Networks

An Energy-Efficient Approach for Provenance Transmission in Wireless Sensor Networks An Enegy-Efficient Appoach fo Povenance Tansmission in Wieless Senso Netwoks S. M. Iftekhaul Alam Pudue Univesity alams@pudue.edu Sonia Fahmy Pudue Univesity fahmy@cs.pudue.edu Abstact Assessing the tustwothiness

More information

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New

More information

Method of controlling access to intellectual switching nodes of telecommunication networks and systems

Method of controlling access to intellectual switching nodes of telecommunication networks and systems ISSN (e): 2250 3005 Volume 05 Issue 05 ay 2015 Intenational Jounal of Computational Engineeing eseach (IJCE) ethod of contolling access to intellectual switching nodes of telecommunication netwoks and

More information

An Optimised Density Based Clustering Algorithm

An Optimised Density Based Clustering Algorithm Intenational Jounal of Compute Applications (0975 8887) Volume 6 No.9, Septembe 010 An Optimised Density Based Clusteing Algoithm J. Hencil Pete Depatment of Compute Science St. Xavie s College, Palayamkottai,

More information

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2 Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used

More information

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer Using the Gow-And-Pune Netwok to Solve Poblems of Lage Dimensionality B.J. Biedis and T.D. Gedeon School of Compute Science & Engineeing The Univesity of New South Wales Sydney NSW 2052 AUSTRALIA bbiedis@cse.unsw.edu.au

More information

On the throughput-cost tradeoff of multi-tiered optical network architectures

On the throughput-cost tradeoff of multi-tiered optical network architectures 1 On the thoughput-cost tadeoff of multi-tieed optical netwok achitectues Guy Weichenbeg, Vincent W. S. Chan, and Muiel Médad Laboatoy fo Infomation and Decision Systems Massachusetts Institute of Technology

More information