On Cooperative Local Repair in Distributed Storage
|
|
- Milton Edwards
- 5 years ago
- Views:
Transcription
1 On Coopeative Loca Repai in Distibuted Stoae Anit Sinh Rawat Depatment of ECE The Univesity of Texas at Austin Austin, TX 7871 Emai: Aya Mazumda Depatment of ECE Univesity of Minnesota Twin Cities Minneapois, MN Emai: Siam Vishwanath Depatment of ECE The Univesity of Texas at Austin Austin, TX 7871 Emai: Abstact Easue-coectin codes, that suppot oca epai of codewod symbos, have attacted substantia attention ecenty fo thei appication in distibuted stoae systems. In this pape we study a eneaization of the usua ocay ecoveabe codes. We conside such codes that any sma set of codewod symbos is ecoveabe fom a sma numbe of othe symbos. We ca this coopeative oca epai. We pesent bounds on the dimension of such codes as we as ive expicit constuctions of famiies of codes. Some othe esuts eadin coopeative oca epai ae aso pesented, incudin an anaysis fo the Hadamad codes. I. INTRODUCTION In this pape we expoe a new cass of codes that enabe efficient ecovey fom the faiue (easue) of a sma numbe of code symbos. In paticua, we study codes with (, )- ocaity which aow fo any faied codes symbos to be ecoveed by contactin othe intact code symbos. Ou study of such codes is motivated by thei appication in distibuted stoae systems a..a. coud stoae, whee infomation is stoed ove a netwo of stoae nodes (diss). In distibuted stoae systems, one has to intoduce edundancy in ode to potect the stoed infomation aainst inevitabe node (dis) faiues. The taditiona easue codes ae hihy sub-optima fo distibuted stoae settin as these codes incu hih cost of code epai [1]. Recenty, mutipe casses of easue codes have been poposed to optimize the pefomance of code epai pocess with espect to vaious metics. In paticua, the codes that minimize epai-bandwidth, i.e., the numbe of bits communicated duin a node epai, ae studied in [1] [4] and efeences theein. Anothe famiy of easue codes that focus on sma ocaity, i.e., enabin epai of sine code symbo by contactin a sma numbe of othe code symbos, ae pesented in [5] [9]. A code is said to have a-symbo ocaity of if evey code symbo is a function of at most othe code symbos. This ensues oca epai of each code symbo by contactin at most othe code symbos. In this pape we eneaize the notion of codes with a-symbo ocaity to codes with (, )- ocaity: any set of code symbos ae functions of at most othe code symbos. This aows fo coopeative oca epai of code symbos, whee a oups of code symbos is epaied by contactin at most othe code symbos. The appoach of coopeative code epai has been peviousy expoed in the context of epai-bandwidth efficient codes in [10], [11] and efeences theein. In this pape we addess two impotant issues eadin codes with (, )-ocaity: 1) obtainin tade-offs amon minimum distance, dimension, and ocaity paametes (, ) fo such code; and ) pesentin expicit constuctions fo codes with (, )-ocaity that ae cose to the obtained tade-offs. We pesent a foma definition of codes with (, )-ocaity in Section II. In Section III, we obtain an uppe bound on the minimum distance of a code with (, )-ocaity which encodes infomation symbos to n symbos on codewods. We then bound the best possibe ate fo a code with (, )-ocaity. In Section IV we pesent two constuctions fo the codes that have (, )-ocaity and comment on thei ates with espect to the bound obtained in Section III. In Section IV-D, we study the punctued Hadamad codes (a..a. Simpex codes) in the context of coopeative oca epai. In Section IV-E we eneaize the Patition code famewo fom Section IV-A. We biefy conside the settin of andom easues in Section IV-F. A shot note on notation: we use bod owe case ettes to denote vectos. Fo an intee n 1, [n] denotes the set {1,,..., n}. II. CODES WITH (, )-LOCALITY Definition 1. Let C be an (n, ) code. We ca C to be an (n, ) code with (, )-ocaity if fo each S [n] with S =, we have a set Γ S [n]\s such that 1) Γ S, ) Fo any codewod c = (c 1, c,..., c n ) C, the code symbos c S := {c i : i S} ae functions of the code symbos symbos c ΓS := {c i : i Γ S }. Note that Definition 1 ensues that any code symbos can be coopeativey epaied fom at most othe code symbos. This eneaizes the notion of codes with a-symbo ocaity [5], [6], [1], [13], whee ocaity is defined with espect to one code symbo, i.e., = 1. Rema 1. Fo a code C with a-symbo ocaity, we have the foowin bound on its minimum distance [5], [6]. d min (C) n +. (1) The code attainin the bound in (1) ae pesented in [6] [9] and efeences theein.
2 III. RATE VS. DISTANCE TRADE-OFF FOR CODES WITH (, )-LOCALITY In this section, fo iven and, we pesent a tade-off between the ate and the minimum distance of a code with (, )-ocaity (cf. Definition 1). We empoy the enea poof technique intoduced in [5], [14], [15] to obtain the foowin esut. Theoem 1. Let C be an (n, ) code (inea, o non-inea) with (, )-ocaity. Then, the minimum distance of C satisfies d min (C) n + 1 ( 1 ). () Aoithm: Constuction of sub-code C C. Input: (n, ) code C F n q with (, )-ocaity. 1: C 0 = C : = 0 3: whie C > q do 4: = : Choose i 1, i,..., i [n] such that, fo evey m [], thee exist at east two codewods in C 1 that diffe at i m-th coodinate. 6: Let R = Γ {i 1,...,i } be the index of at most code symbos that coopeativey epai code symbos indexed by {i 1,..., i }. 7: Let y F R q be the most fequent eement in the muti-set {x R : x C 1 F n q }. 8: Define C := {x : x C 1 F n q and x R = y}. 9: if 1 < C q then 10: C = C. 11: end whie 1: ese if C = 1 then 13: Pic a maxima subset R R such that C > 1, whee C := {x : x C 1 F n q, x R = ỹ } and ỹ F R q be the most fequent eement in the muti-set {x R : x C 1 F n q }. 14: C = C. 15: end whie. 16: end if 17: end whie Output: C. Fi. 1: Constuction of sub-code C C. Poof: The poof invoves constuction of a subcode C C such that a but a sma numbe of coodinates in evey codewod of C ae fixed. Note that we have d min (C) d min (C ). (3) Given C, one can obtain a code C with C = C by emovin fixed coodinates fom a the codewod in C. This impies that d min (C ) = d min (C ), which aon with (3) ive us the foowin. d min (C) d min (C ). (4) We descibe the constuction of the subcode C in Fi. 1. Befoe poceedin with the anaysis, we aue the coectness of the aoithm in Fi. 1. Note that it is aways possibe to find coodinates {i 1, i,..., i } at ine 5. When the aoithm eaches ine 5, the subcode C 1 has moe than q codewods. Theefoe, thee must be at east coodinates in the codewods in C 1 that ae not fixed in the pevious iteations. This aso impies that, fo m [], i m / I 1 := ) (R {i 1,..., i } [n]. (5) [ 1] Note that the code symbos indexed by I 1 ae fixed in C 1. Thus, we must have R = Γ {i 1,...,i } I 1. Othewise, {i 1,..., i } woud have been fixed in the pevious iteations. Assumin that the constuction in Fi. 1 ends in t-th iteation, we obtain in Appendix A that and t 1. (6) o q C I t + t. (7) Now, we define C = C It which denotes the code obtained by punctuin the codewods in C at the coodinates associated with the set I t. We have C = C and d min (C ) = d min (C ). Moeove, the enth of the codewods in C is n I. Next, appyin the Sineton bound on C ives us d min (C) d min (C ) n I t o q C + 1 n I t ( I t + t) + 1 = n t + 1, (8) It foows fom (8) and (6) that d min (C) n + 1 ( 1 ). (9) The anaysis of the minimum distance when the constuction in Fi 1 ends at ine 15 is pesented in Appendix A. This competes the poof. Note that an (n, ) code with (, )-ocaity has its minimum distance at east +1 as it can ecove fom the easue of any code symbos (cf. Definition 1). Combinin this obsevation with Theoem 1, we obtain the foowin esut. Cooay 1. The ate of an (n, ) code with (, )-ocaity is bounded as n +. (10)
3 Poof: It foows fom () and the fact d min (C) + 1 that + 1 d min (C) n + 1 ( 1 ). (11) Usin 1 1, we et o + n, n +. IV. CONSTRUCTION OF CODES WITH (, )-LOCALITY In this section we addess the issue of constuctin hih ate codes that have (, )-ocaity. In paticua, we descibe two simpe constuctions that ensue coopeative oca epai fo the faiue of any code symbos: 1) Patition code and ) Poduct code. In Patition code, we patition the infomation symbos in oups of symbo and encode each oup with an ( +, )-MDS code (cf. Section IV-A. On the othe hand, a poduct code is obtained by aanin = ( ) infomation symbos in an -dimensiona aay and then intoducin paity symbos aon diffeent dimensions of the aay (cf. Section IV-B). A. Patition Code Fo the ease of exposition, we assume that,, and ( ). Given infomation symbo ove Fq, a Patition code encodes these symbos into n = + symbos on codewods as foows (see Fi. ): 1) Patition infomation symbos into = oups of size each. ) Encode the symbos in each of the oups usin an ( +, )-MDS code ove F q. We efe to the + code symbos obtained by encodin infomation symbo in the i-th oup as i-th oca oup. As it is cea fom the constuction, Patition code has ate n = +. Moeove, a code symbo can be ecoveed fom any othe code symbo fom its oca oup. In the wost case, when faied code symbos beon to distinct oca oup, we can ecove a symbos fom = code symbos, downoadin symbos fom each of the oca oups containin one faied code symbo. B. Poduct Code Poduct codes ae a we nown famiy of codes in the codin theoy iteatue. Given = ( ) infomation symbos and, we fist aane = ( ) infomation symbos in an -dimensiona aay with index of each dimension of the aay anin in the set [ ]. These infomation symbos ae then encoded to obtain an n = ( + 1) symbos on code wod. In the foowin we descibe the encodin pocess fo = -dimensiona aay (see Fi. 3). The eneaization of the encodin pocess fo hihe dimensions is staihtfowad. 1) Aane = ( ) infomation symbos in an aay. ) Fo each ow of the aay, add a paity symbo by summin a symbos in the ow and append these symbos to thei espective ows. 3) Fo each of the + 1 coumns of the updated aay, add a paity by summin a symbos in the coumn. m 1 m m p 1 m +1 m + m p m γ+1 m γ+ m 4 p c 1 p c p c. p p c +1 Fi. 3: Desciption of Poduct code constuction with =. {p 1, p,..., p } denote the paity nodes associated with each ow of the two dimensiona aay of infomation symbos. {p c 1, p c,..., p +1} epesent the paity symbos fo the coumns of the updated aay. We use γ to denote ( 1). C. Compaison between Patition and Poduct code We now compae the ate of Patition code and Poduct code with the bound in (10). Fo any 1, we have ( ) + +. (1) Note that (1) foows fom the fact that ( + ) ( + 1 ) + ( ( ) i i) = ( + ). i Theefoe, Patition code appoach povides (, )-ocaity with a bette ate. Howeve, fo a system paametes, the ate of Patition code is smae than the nown bound (10), i.e., + +. Hee, we woud ie to note that the diffeence between the ate achieved by the Patition code and the bound in (10) ets smae as the paamete becomes ae as compaed to the paamete. It is an inteestin pobem to eithe tihten the bound in (10) o pesent a constuction fo codes with (, )- ocaity which have hihe ate than that of Patition code. i= D. Coopeative Loca Repai fo Hadamad Codes Hee, we comment on the oca epaiabiity of punctued Hadamad codes. Punctued Hadamad codes ae aso efeed to as Simpex codes, which ae the dua codes of Hammin codes. In paticua, we show that an [n = 1,, 1 ] punctued Hadamad code has ( = + 1, ) ocaity fo any n 1. An [n = 1,, 1 ] punctued Hadamad code encodes a bits on messae (m 1, m,..., m ) to an n = 1 codewod c = (c 1, c,..., c n= 1 such that c i = m b i (mod). =1
4 m = (m 1, m,..., m ) F q m 1 m m m +1 m + m m +1 m + m ( +, )-MDS code ( +, )-MDS code ( +, )-MDS code c 1 c c c + c ++1 c ++ c + c + c τ+1 c τ+ c n c n oca oup 1 oca oup Fi. : Iustation of the encodin pocess of Patition code. oca oup Hee b i = (b i 1, b i,..., b i ) F denotes the binay epesentation of the intee i [ 1]. In an [n = 1,, 1 ] punctued Hadamad code, we have c i + c = c i+, whee 1 1 and i [ 1]. Moeove, we note that an [n = 1,, 1 ] punctued Hadamad code has a paticua stuctua popety: fo any <, the pefix of enth 1 of each codewod is a codewod of the [ñ = 1,, 1 ] punctued Hadamad code which encodes the messae (m 1, m,..., m ). We now pesent the main esut of this subsection: Lemma 1. In an [n = 1,, 1 ] punctued Hadamad code, any 1 n 1 easues can be coected by contactin at most + 1 othe code symbos. Poof: We pove the Lemma by usin induction ove. Fo base case, we conside =, whee the [n = 3 = 1,, ] punctued Hadamad code encodes the messae (m 1, m ) to a codewod (c 1, c, c 3 ) = (m 1, m, m 1 +m ). In this case any = 1 easue can be ecoveed by contactin othe + 1 = code symbos. Fo exampe, one can ecove c = m fom (c 1, c 3 ) = (m 1, m 1 + m 3 ). Fo inductive step, we assume that the Lemma hods fo any punctued code of dimension up to 1. Conside the [n = 1,, 1 ] punctued Hadamad code of dimension, and two cases eadin the positions of eased code symbos. Case 1: Thee ae x 1 easues amon the fist n = 1 1 code symbos. Note that the fist n = 1 1 code symbos constitute a codewod of an [ n = 1 1, 1, ] punctued Hadamad code. Theefoe, fom the inductive hypothesis, one can coect the x easues amon the fist n code symbos by contactin x + 1 othe code symbos out of these n code symbos. Now, if the symbo c 1 in easue, we can ecove it by contactin one of the uneased symbo amon {c +1, c 1 +,..., c 1 n= 1} say c 1 + and the coespondin code symbo c fom the fist n code symbos. Now, we can epai the emainin eased symbos amon {c 1 +1, c 1 +,..., c n= 1} fom c 1 and the coespondin code symbo amon the fist n code symbos. Fo exampe, if we want to ecove the symbo c 1 +m, we can use c 1 and c m to econstuct c 1 +m. In the wost case, we contact +1 code symbos duin the epai of a easues. Case : Thee ae x easues amon the fist n = 1 1 code symbos. In this case, we fist ecove the code symbo c 1, if it is in easue. Without oss of eneaity we assume that c 1 is in easue. Note that thee ae n 1 = 1 distinct pais of code symbos {c i, c 1 +i} i [ 1 ] that can ecove c 1. Since we have at most n 1 1 = 1 1 easues apat fom c 1, one of the 1 pais {c i, c +i} 1 i [ 1 ] must be intact. This pai aows us to ecove c 1. Now that we now the symbo c 1 = m, we can emove the contibution of m fom any of the ast 1 code symbos {c 1 +1, c 1 +,..., c n= 1}. Simiay, we can add m to any of the fist n = 1 1 code symbos {c 1, c,..., c 1}. Theefoe, we can educe the Case to Case 1 of the poof, and epai any 1 easues by contactin at most code symbos. Combinin both cases competes the poof. E. Geneaization of Patition Code Appoach In the constuction of the Patition codes, as descibed in Section IV-A, we use an ( +, ) MDS code to encode disoint oups of messae symbos. Note that the ate of this MDS code ovens the ate of the ovea code. One can potentiay use anothe code C oca of minimum distance at east + 1 to encode disoint oups of messae symbos. Now, we use (x), x [] to denote the numbe of symbos that needs to be contacted to epai x easue in one oca oup. Fo the case when an ( +, ) MDS code is used, we have (x) = fo x []. Let (x) denote the uppe concave enveope of (x) on the inteva [1, ] R. Assume that we have disoint oca oups, then a patten of easues can be epesented by a vecto ( 1,,..., ). Hee, i denotes the numbe of easues within i-th oca oup. Note that we have i=1 i =. Fo a iven oca code C oca, one needs to access i=1 ( i) numbe of intact code symbos to epai the easue patten ( 1,,..., ). Now, we use concavity of ( ), the fact that (x) (x) fo x [], and Jensen s inequaity to obtain the
5 foowin. ( i ) i=1 ( i ) ( i=1 = ( ) i=1 i ) (13) Since the ate of the Patition code is anostic to the numbe of oca oups, we can use the vaue of which minimizes the R.H.S. of (13). This appoach optimizes the vaue of fo a iven choice of and C oca. F. Comment of Random Easues The constuctions in Section IV-A & IV-B ae desined to aow fo the coopeative oca epais in the case of advesaia easue pattens. One can conside the settin whee easues occu accodin to a andom mode. Hee, we biefy comment on the settin whee easues ae unifomy distibuted amon the code symbos. Moeove, we assume and to be ae enouh. We conside the constuction of Section IV-A, that is, the Patition codes. In this case, with easonaby hih pobabiity (dependin on and ), ( each ) oca oup (a tota of them) expeiences about t Θ numbe of easues. Theefoe, with hih pobabiity, one can pefom coopeative oca epai of andom easues even if an ( + t, )-MDS code in empoyed in the constuction of the Patition code (cf. Section IV-A). This tansates to a codin scheme with +t the ovea ate of. One can tae ae enouh to optimize this vaue. Indeed, usin the techniques of [16], it can be shown that, fo andom easues, the patition codes ae asymptoticay optima. REFERENCES [1] A. Dimais, P. Godfey, Y. Wu, M. Wainwiht, and K. Ramchandan. Netwo codin fo distibuted stoae systems. IEEE Tans. Inf. Theoy, 56(9): , 010. [] K. Rashmi, N. Shah, and P. Kuma. Optima exact-eeneatin codes fo distibuted stoae at the MSR and MBR points via a poduct-matix constuction. IEEE Tans. Inf. Theoy, 57:57 539, 011. [3] I. Tamo, Z. Wan, and J. Buc. Ziza codes: Mds aay codes with optima ebuidin. IEEE Tans. Inf. Theoy, 59(3): , 013. [4] D. Papaiiopouos, A. Dimais, and V. Cadambe. Repai optima easue codes thouh hadamad desins. IEEE Tans. Inf. Theoy, 59(5): , 013. [5] P. Gopaan, C. Huan, H. Simitci, and S. Yehanin. On the ocaity of codewod symbos. IEEE Tans. Inf. Theoy, 58(11): , 01. [6] D. Papaiiopouos and A. Dimais. Locay epaiabe codes. In Poc. of IEEE ISIT, 01. [7] A. S. Rawat, O. O. Koyuou, N. Sibestein, and S. Vishwanath. Optima ocay epaiabe and secue codes fo distibuted stoae systems. IEEE Tans. Inf. Theoy, 60(1):1 36, 014. [8] G. Kamath, N. Paash, V. Laitha, and P. Kuma. Codes with oca eeneation. CoRR, abs/ , 01. [9] I. Tamo and A. Ba. A famiy of optima ocay ecoveabe codes. CoRR, abs/ , 013. [10] N. Le Scouanec A.-M. Kemaec and G. Staub. Repaiin mutipe faiues with coodinated and adaptive eeneatin codes. In Poc. Intenationa Symposium on Netwo Codin, 011. [11] K. W. Shum and Y. Hu. Coopeative eeneatin codes. IEEE Tans. Inf. Theoy, 59(11):79 758, 013. [1] F. Oie and A. Datta. Sef-epaiin homomophic codes fo distibuted stoae systems. In Poc. of INFOCOM, 011. [13] N. Paash, G. Kamath, V. Laitha, and P. Kuma. Optima inea codes with a oca-eo-coection popety. In Poc. of IEEE ISIT, 01. [14] V. R. Cadambe and A. Mazumda. An uppe bound on the size of ocay ecoveabe codes. CoRR, abs/ , abs/ , 013. [15] M. Fobes and S. Yehanin. On the ocaity of codewod symbos in non-inea codes. CoRR, abs/ , 013. [16] A. Mazumda, V. Chanda, and G. W. Wone. Loca ecovey popeties of capacity achievin codes. In Infomation Theoy and Appications Woshop (ITA), 013, paes 1 3. IEEE, 013. APPENDIX A PART OF THE PROOF OF THEOREM 1 Fo the constuction of a subcode as descibed in Fi. 1, we define A = I \I 1 R {i 1,..., i } and a = A. Assumin that the whie oop in Fi. 1 ends with = t, fo [t], we have I = A, [] whee we tae union of the disoint sets A, []. Note that the code symbos indexed by the set {i 1,..., i } ae functions of the code symbos indexed by the set R = Γ {i 1,...,i }. Theefoe, at ine 7, thee ae at most qa possibiities fo y. This impies that C C 1 /q a. (14) The constuction of the subcode C can end at eithe ine 11 o ine 15. Hee we anyze ony the case when the constuction ends at ine 11. In this case, we have C t q, o 1 o q C t (a +1 ). (15) Now, usin that a A R {i 1,..., i } +, we et which ives us that 1 (a +1 ) t, (16) t Note that sub-code C = C t. Theefoe, o q C = o q C t 1. (17) o q C (a +1 ) = a +1 + t (a) = I t + t (18) whee (a) foows fom the fact that I t is union of the disoint sets A.
Perfect Bayesian Equilibrium in Extensive- Form Games Ù
Pefect Bayesian Equiibium in Extensive-Fom Games Page Pefect Bayesian Equiibium in Extensive- Fom Games Ù Intoduction Bayes Requiement Bayes Requiement Bayes Requiement 5 Bayes Requiement 4 6 A Refinement
More informationCS 5114: Theory of Algorithms. Sorting. Insertion Sort. Exchange Sorting. Clifford A. Shaffer. Spring 2010
Depatment of Compute Science Viginia Tech Backsbug, Viginia Copyight c 10 by Ciffod A. Shaffe 3 4 5 7 : Theoy of Agoithms Tite page : Theoy of Agoithms Ciffod A. Shaffe Sping 10 Ciffod A. Shaffe Depatment
More informationFACE VECTORS OF FLAG COMPLEXES
FACE VECTORS OF FLAG COMPLEXES ANDY FROHMADER Abstact. A conjectue of Kalai and Eckhoff that the face vecto of an abitay flag complex is also the face vecto of some paticula balanced complex is veified.
More informationANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS
ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth
More informationRANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES
RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class
More informationSegmentation of Casting Defects in X-Ray Images Based on Fractal Dimension
17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach
More informationLow Rate Concatenated Zigzag-Hadamard Codes
Low Rate Concatenated Zigzag-Hadamad Codes Guosen Yue,W.K.Leung,LiPing and Xiaodong Wang NEC Laboatoy Ameica, Inc., Pinceton, NJ 854. Dept. of Electonic Eng., City Univesity of Hong Kong. Dept. of Electical
More informationAn Extension to the Local Binary Patterns for Image Retrieval
, pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science
More informationLayer Partition-based Matching Algorithm of DDM
Laye Patition-based Matching Agoithm of DDM Nwe Nwe Myint Thein, and Nay Min Tun Abstact High Leve Achitectue (HLA) is achitectue fo euse and inteopeation of simuations. In HLA paadigm, the Runtime Infastuctue
More informationJournal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012
2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo
More informationColor Correction Using 3D Multiview Geometry
Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,
More informationCommunication vs Distributed Computation: an alternative trade-off curve
Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,
More informationSlotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System
Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet
More informationOn Error Estimation in Runge-Kutta Methods
Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment
More informationEfficient protection of many-to-one. communications
Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok
More informationA Memory Efficient Array Architecture for Real-Time Motion Estimation
A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN
More informationA modal estimation based multitype sensor placement method
A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;
More informationEmbeddings into Crossed Cubes
Embeddings into Cossed Cubes Emad Abuelub *, Membe, IAENG Abstact- The hypecube paallel achitectue is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability
More informationControlled Information Maximization for SOM Knowledge Induced Learning
3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity
More informationDistributed Dynamic Capacity Contracting: An overlay congestion pricing framework for differentiated-services architecture
Distibuted Dynamic apacity ontacting: An oveay congestion picing famewok fo diffeentiated-sevices achitectue Muat Yukse Shivkuma Kayanaaman Anuj Goe Rensseae Poytechnic Institute oy NY yuksem@cspiedu shivkuma@ecsepiedu
More informationADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM
ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,
More informationTowards Adaptive Information Merging Using Selected XML Fragments
Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,
More informationA New Finite Word-length Optimization Method Design for LDPC Decoder
A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology
More informationHISTOGRAMS are an important statistic reflecting the
JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe
More informationAccurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen
Accuate Diffaction Efficiency Contol fo Multiplexed Volume Hologaphic Gatings Xuliang Han, Gichel Kim, and Ray T. Chen Micoelectonic Reseach Cente Depatment of Electical and Compute Engineeing Univesity
More informationPoint-Biserial Correlation Analysis of Fuzzy Attributes
Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh
More informationAn Unsupervised Segmentation Framework For Texture Image Queries
An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu
More informationComparisons of Transient Analytical Methods for Determining Hydraulic Conductivity Using Disc Permeameters
Compaisons of Tansient Analytical Methods fo Detemining Hydaulic Conductivity Using Disc Pemeametes 1,,3 Cook, F.J. 1 CSRO Land and Wate, ndoooopilly, Queensland The Univesity of Queensland, St Lucia,
More informationA Novel Image-Based Rendering System With A Longitudinally Aligned Camera Array
EUOGAPHICS 2 / A. de Sousa, J.C. Toes Shot Pesentations A Novel Image-Based endeing System With A Longitudinally Aligned Camea Aay Jiang Li, Kun Zhou, Yong Wang and Heung-Yeung Shum Micosoft eseach, China
More informationDynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing
IEEE TRANSACTIONS ON COMPUTERS, VOL. 50, NO. 9, SEPTEMBER 200 949 Dynamic Multiple Paity (DMP) Disk Aay fo Seial Tansaction Pocessing K.H. Yeung, Membe, IEEE, and T.S. Yum, Senio Membe, IEEE AbstactÐThe
More informationCardiac C-Arm CT. SNR Enhancement by Combining Multiple Retrospectively Motion Corrected FDK-Like Reconstructions
Cadiac C-Am CT SNR Enhancement by Combining Multiple Retospectively Motion Coected FDK-Like Reconstuctions M. Pümme 1, L. Wigstöm 2,3, R. Fahig 2, G. Lauitsch 4, J. Honegge 1 1 Institute of Patten Recognition,
More informationModelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set
Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;
More informationPrioritized Traffic Recovery over GMPLS Networks
Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing
More informationA ROI Focusing Mechanism for Digital Cameras
A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula
More informationART GALLERIES WITH INTERIOR WALLS. March 1998
ART GALLERIES WITH INTERIOR WALLS Andé Kündgen Mach 1998 Abstact. Conside an at galley fomed by a polygon on n vetices with m pais of vetices joined by inteio diagonals, the inteio walls. Each inteio wall
More informationDetection and Recognition of Alert Traffic Signs
Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives
More informationa Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives
SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which
More informationA Neural Network Model for Storing and Retrieving 2D Images of Rotated 3D Object Using Principal Components
A Neual Netwok Model fo Stong and Reteving 2D Images of Rotated 3D Object Using Pncipal Components Tsukasa AMANO, Shuichi KUROGI, Ayako EGUCHI, Takeshi NISHIDA, Yasuhio FUCHIKAWA Depatment of Contol Engineeng,
More informationIP Multicast Simulation in OPNET
IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok
More informationSegmentation Based Recovery of Arbitrarily Warped Document Images
Segmentation Based Recovey of Abitaiy Waped Document Images B. Gatos, I. Patikakis and K. Ntiogiannis Computationa Inteigence Laboatoy, Institute of Infomatics and Teecommunications, Nationa Cente fo Scientific
More informationOptical Flow for Large Motion Using Gradient Technique
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this
More informationReachable State Spaces of Distributed Deadlock Avoidance Protocols
Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications
More informationA Full-mode FME VLSI Architecture Based on 8x8/4x4 Adaptive Hadamard Transform For QFHD H.264/AVC Encoder
20 IEEE/IFIP 9th Intenational Confeence on VLSI and System-on-Chip A Full-mode FME VLSI Achitectue Based on 8x8/ Adaptive Hadamad Tansfom Fo QFHD H264/AVC Encode Jialiang Liu, Xinhua Chen College of Infomation
More informationIntuitionistic Fuzzy Soft N-ideals
Intenational Jounal of Fuzzy Mathematics and Systems. ISSN 2248-9940 Volume 3, Numbe 4 (2013), pp. 259-267 Reseach India Publications http://www.ipublication.com Intuitionistic Fuzzy Soft N-ideals A. Solaiaju
More informationCloud-Aided Wireless Networks with Edge Caching: Fundamental Latency Trade-Offs in Fog Radio Access Networks
206 IEEE Intenational Symposium on Infomation Theoy Cloud-Aided Wieless Netwos with Edge Caching: Fundamental Latency Tade-Offs in Fog Radio Access Netwos Ravi Tandon Osvaldo Simeone Depatment of ECE Univesity
More informationErasure-Coding Based Routing for Opportunistic Networks
Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant
More informationA Multiphase Image Segmentation Based on Fuzzy Membership Functions and L1-norm Fidelity
Jounal of Scientific Computing manuscipt No. will be inseted by the edito) A Multiphase Image Segmentation Based on Fuzzy Membeship Functions and L1-nom Fidelity Fang Li Stanley Oshe Jing Qin Ming Yan
More informationA Two-stage and Parameter-free Binarization Method for Degraded Document Images
A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and
More informationModule 6 STILL IMAGE COMPRESSION STANDARDS
Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.
More informationAlso available at ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010)
Also available at http://amc.imfm.si ISSN 1855-3966 (pinted edn.), ISSN 1855-3974 (electonic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) 109 120 Fulleene patches I Jack E. Gave Syacuse Univesity, Depatment
More informationIllumination methods for optical wear detection
Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical
More informationThe Role of Switching in Reducing Network Port Counts
The Role of Switchin in Reducin Netwok Pot Counts Eytan Modiano Randall Bey MIT Laboatoy fo Infomation Nothwesten Univesity and Decision Systems Dept. of Electical & Comp. En. Cambide, MA 02139 Evanston,
More informationAn Improved Resource Reservation Protocol
Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing
More informationA VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM
Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,
More informationObstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor
Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,
More informationClustering Interval-valued Data Using an Overlapped Interval Divergence
Poc. of the 8th Austalasian Data Mining Confeence (AusDM'9) Clusteing Inteval-valued Data Using an Ovelapped Inteval Divegence Yongli Ren Yu-Hsn Liu Jia Rong Robet Dew School of Infomation Engineeing,
More informationAnd Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,
(IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Efficient Candidacy Reduction Fo Fequent Patten Mining M.H Nadimi-Shahaki 1, Nowati Mustapha 2, Md Nasi B Sulaiman 2, Ali B Mamat
More informationGeneralized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences
Ameican Jounal of ata ining and Knowledge iscovey 27; 2(4): 2-8 http://www.sciencepublishinggoup.com//admkd doi:.648/.admkd.2724.2 Genealized Gey Taget ecision ethod Based on ecision akes Indiffeence Attibute
More informationA Novel Parallel Deadlock Detection Algorithm and Architecture
A Novel Paallel Deadlock Detection Aloithm and Achitectue Pun H. Shiu 2, Yudon Tan 2, Vincent J. Mooney III {ship, ydtan, mooney}@ece.atech.ed }@ece.atech.edu http://codesin codesin.ece.atech.eduedu,2
More informationA Novel Automatic White Balance Method For Digital Still Cameras
A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing
More informationIP Network Design by Modified Branch Exchange Method
Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management
More informationDEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson
DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:
More informationConversion Functions for Symmetric Key Ciphers
Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401
More informationThe EigenRumor Algorithm for Ranking Blogs
he EigenRumo Algoithm fo Ranking Blogs Ko Fujimua N Cybe Solutions Laboatoies N Copoation akafumi Inoue N Cybe Solutions Laboatoies N Copoation Masayuki Sugisaki N Resonant Inc. ABSRAC he advent of easy
More informationICRU Recommended Dose and Volume Specification for Reporting Interstitial Brachytherapy
ICRU Recommended ose and Volume pecification fo Repotin Intestitial Bachytheapy Ali. Meiooni Ph.. Univesity of entucky Medical Cente epatment of Radiation Medicine exinton Y Table of Contents Intoduction
More informationCoordinate Systems. Ioannis Rekleitis
Coodinate Systems Ioannis ekleitis Position epesentation Position epesentation is: P p p p x y z P CS-417 Intoduction to obotics and Intelligent Systems Oientation epesentations Descibes the otation of
More informationOn the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes
On the Convesion between Binay Code and BinayReflected Gay Code on Boolean Cubes The Havad community has made this aticle openly available. Please shae how this access benefits you. You stoy mattes Citation
More informationCryptanalysis of Hwang-Chang s a Time-Stamp Protocol for Digital Watermarking
Cyptanalysis of Hwang-Chang s a Time-Stamp Potocol fo Digital Watemaking *Jue-Sam Chou, Yalin Chen 2, Chung-Ju Chan 3 Depatment of Infomation Management, Nanhua Univesity Chiayi 622 Taiwan, R.O.C *: coesponding
More informationA Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces
A Family of Distibuted Deadlock Avoidance Potocols and thei Reachable State Spaces Césa Sánchez, Henny B. Sipma, and Zoha Manna Compute Science Depatment Stanfod Univesity, Stanfod, CA 94305-9025 {cesa,sipma,manna}@cs.stanfod.edu
More informationAUTOMATED LOCATION OF ICE REGIONS IN RADARSAT SAR IMAGERY
AUTOMATED LOCATION OF ICE REGIONS IN RADARSAT SAR IMAGERY Chistophe Waceman (1), William G. Pichel (2), Pablo Clement-Colón (2) (1) Geneal Dynamics Advanced Infomation Systems, P.O. Box 134008 Ann Abo
More informationA Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform
A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad
More informationQuery Language #1/3: Relational Algebra Pure, Procedural, and Set-oriented
Quey Language #1/3: Relational Algeba Pue, Pocedual, and Set-oiented To expess a quey, we use a set of opeations. Each opeation takes one o moe elations as input paamete (set-oiented). Since each opeation
More informationEffective Data Co-Reduction for Multimedia Similarity Search
Effective Data Co-Reduction fo Multimedia Similaity Seach Zi Huang Heng Tao Shen Jiajun Liu Xiaofang Zhou School of Infomation Technology and Electical Engineeing The Univesity of Queensland, QLD 472,
More informationSYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH
I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,
More informationSpiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks
Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition
More informationMapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma
apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the
More informationTitle. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information
Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220
More informationImproved Fourier-transform profilometry
Impoved Fouie-tansfom pofilomety Xianfu Mao, Wenjing Chen, and Xianyu Su An impoved optical geomety of the pojected-finge pofilomety technique, in which the exit pupil of the pojecting lens and the entance
More informationFrequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters
Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using
More informationarxiv: v4 [cs.ds] 7 Feb 2018
Dynamic DFS in Undiected Gaphs: beaking the O(m) baie Suende Baswana Sheejit Ray Chaudhuy Keeti Choudhay Shahbaz Khan axiv:1502.02481v4 [cs.ds] 7 Feb 2018 Depth fist seach (DFS) tee is a fundamental data
More informationTESSELLATIONS. This is a sample (draft) chapter from: MATHEMATICAL OUTPOURINGS. Newsletters and Musings from the St. Mark s Institute of Mathematics
TESSELLATIONS This is a sample (daft) chapte fom: MATHEMATICAL OUTPOURINGS Newslettes and Musings fom the St. Mak s Institute of Mathematics James Tanton www.jamestanton.com This mateial was and can still
More informationFifth Wheel Modelling and Testing
Fifth heel Modelling and Testing en Masoy Mechanical Engineeing Depatment Floida Atlantic Univesity Boca aton, FL 4 Lois Malaptias IFMA Institut Fancais De Mechanique Advancee ampus De lemont Feand Les
More informationINFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM
INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300
More informationFault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs
Fault-Toleant Routing Schemes in RDT(,,)/α-Based Inteconnection Netwok fo Netwoks-on-Chip Designs Mei Yang, Tao Li, Yingtao Jiang, and Yulu Yang Dept. of Electical & Compute Engineeing Univesity of Nevada,
More informationSeparability and Topology Control of Quasi Unit Disk Graphs
Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,
More informationMulti-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples
Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits
More informationTransmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design
Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced
More informationIMAGE-GUIDED NON-LOCAL DENSE MATCHING WITH THREE-STEPS OPTIMIZATION
IMAGE-GUIDED NON-LOCAL DENSE MATCHING WITH THREE-STEPS OPTIMIZATION Xu Huang a, Yongjun Zhang a, *, Zhaoxi Yue a a Schoo of Remote Sensing and Infomation Engineeing, Wuhan Univesity, Wuhan, Hubei, China
More informationShortest Paths for a Two-Robot Rendez-Vous
Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal
More informationA Recommender System for Online Personalization in the WUM Applications
A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based
More information(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number.
Illustative G-C Simila cicles Alignments to Content Standads: G-C.A. Task (a, b) x y Fo this poblem, is a point in the - coodinate plane and is a positive numbe. a. Using a tanslation and a dilation, show
More informationComputational and Theoretical Analysis of Null Space and Orthogonal Linear Discriminant Analysis
Jounal of Machine Leaning Reseach 7 2006) 1183 1204 Submitted 12/05; Revised 3/06; Published 7/06 Computational and Theoetical Analysis of Null Space and Othogonal Linea Disciminant Analysis Jieping Ye
More informationConcomitants of Upper Record Statistics for Bivariate Pseudo Weibull Distribution
Available at http://pvamuedu/aam Appl Appl Math ISSN: 93-9466 Vol 5, Issue (Decembe ), pp 8 9 (Peviously, Vol 5, Issue, pp 379 388) Applications and Applied Mathematics: An Intenational Jounal (AAM) Concomitants
More informationCombinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments
Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile
More informationThe Dual Round Robin Matching Switch with Exhaustive Service
The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line
More informationUCLA Papers. Title. Permalink. Authors. Publication Date. Localized Edge Detection in Sensor Fields. https://escholarship.org/uc/item/3fj6g58j
UCLA Papes Title Localized Edge Detection in Senso Fields Pemalink https://escholashipog/uc/item/3fj6g58j Authos K Chintalapudi Govindan Publication Date 3-- Pee eviewed escholashipog Poweed by the Califonia
More informationWIRELESS sensor networks (WSNs), which are capable
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan
More informationParametric Query Optimization for Linear and Piecewise Linear Cost Functions
Paametic Quey Oimization fo Linea and Piecewise Linea Cost Functions Avind Hulgei S. Sudashan Indian Institute of Technology, Bombay {au, sudasha}@cse.iitb.ac.in Abstact The of a quey an depends on many
More informationThe Internet Ecosystem and Evolution
The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee
More informationLinear Ensembles of Word Embedding Models
Linea Ensembles of Wod Embedding Models Avo Muomägi Univesity of Tatu Tatu, Estonia avom@ut.ee Kaiit Sits Univesity of Tatu Tatu, Estonia kaiit.sits@ut.ee Sven Lau Univesity of Tatu Tatu, Estonia swen@math.ut.ee
More information