Scalable P2P Search Daniel A. Menascé George Mason University

Size: px
Start display at page:

Download "Scalable P2P Search Daniel A. Menascé George Mason University"

Transcription

1 Saling the Web Salable P2P Searh aniel. Menasé eorge Mason University lthough the traditional lient-server model irst established the Web s bakbone, it tends to underuse the Internet s bandwidth and intensiy the burden that dediated servers ae as their load inreases. 1 Peer-to-peer omputing relies on individual omputers omputing power and storage apaity to better utilize bandwidth and distribute this load in a sel-organizing manner. In P2P, nodes (or peers) at as both lients and servers, orm an appliation-level network, and route messages (suh as requests to loate a resoure). The design o these routing protools is o paramount importane to a P2P appliation s eiieny: naive approahes suh as nutella s lood routing, or example an add trai. 1,2 P2P systems that exhibit the small world property in whih most peers have ew links to other peers, but a ew o them have many are robust to random attaks, but an be highly vulnerable to targeted ones. 3,4 P2P omputing also has the potential to enhane reliability and ault tolerane beause it doesn t rely on dediated servers. 1 ah peer maintains a loal diretory with entries to the resoures it manages. It an also ahe other peers diretory entries. Important appliations o P2P tehnologies inlude distributed diretory systems, 1 new e-ommere models, 5 and Web servie disovery, all o whih require eiient resoure-loation mehanisms. We an view the resoure-loation problem simply as, given a resoure name, ind the node or nodes that manage the resoure. I all this the deterministi loation problem. In a very large network, ontating all the nodes to loate a resoure is learly not easible. Instead, onsider this modiied problem statement: given a resoure name, ind with a given probability the node or nodes that manage the resoure. I all this a probabilisti loation approah. I present here a probabilisti resoure-loation protool that an trade perormane and salability or the probability P that a resoure will be loated. The protool behavior depends on probabilisti parameters that we an tune to obtain a desired value o P. The goal is to ahieve a probability P lose to 1 with a ost muh lower than that o the deterministi ase. We an measure ost in terms o the number o messages exhanged, bandwidth used, or number o peers ontated. Probabilisti Searh Protool onsider a large, ully onneted network with N peer nodes and an unknown topology. very peer has a loal diretory (L) that points to loally managed resoures (suh as iles, Web pages, proesses, and devies). The L o peer node in igure 1, or example, indiates that the node stores resoures g and h. ah peer has total ontrol over its loal resoures and its L, whih means that resoures an be added or deleted rom the L without the other iretory ahe () Loal diretory (L) o: igure 1. peer-to-peer omputing system. ah peer node has a loal diretory and a diretory ahe. The diretory ahe o peer, or example, indiates that resoure d is loated in peer. The diretory ahes or nodes,, and are empty. I INTRNT OMPUTIN /03/$ I Published by the I omputer Soiety MR PRIL

2 Saling the Web r: SearhRequest (soure, resoure, (s 1,, s m ), TTL) I resoure in L Then Send Resoureound (soure, resoure, (s 1,, s m 1 ), r) to sm lse I (resoure, lo) in Then /* send request to presumed peer */ Send SearhRequest (soure, resoure, (s 1,, s m, r), TTL 1) to lo. lse I TTL > 0 Then /* probabilisti broadast */ or every v N(r) do Send SearhRequest (soure, resoure, (s 1,, s m, r), TTL 1)] p ; r: Resoureound (soure, resoure, (s 1,, s m ), v) I r soure Then egin Send Resoureound (soure, resoure, (s 1,, s m 1 ), v) to sm; dd (resoure, v) to nd lse request soure rom peer v /* end */ igure 2. The probabilisti resoure-loation protool. It onsiders two ases: in one, peer r reeives a SearhRequest (SR) message; in the other, peer r reeives a Resoureound message. In this algorithm, r: M(, ) means that message M with ields, and is reeived at peer r; [x]p means that x exeutes with probability p. iretory ahe () Loal diretory (L) o: igure 3. xample o the SearhRequest (SR) message s propagation. The SR message arrives at peer in searh o resoure n. In step 2, this request is probabilistially sent to peer, whih inds in its the inormation that resoure n is in peer. Peer then sends the SR diretly to peer. peers authorization. This assumption distinguishes the protool desribed here rom other work, 6,7 whih assumes that resoures an be repliated and an migrate to any node at the P2P system s will. ah resoure has a unique, loation-independent, global identiier (UI) that developers an generate by several means. reenet, or example, uses seure S-1 hashes o ile ontent to generate UIs. 3 In a distributed online bookstore appliation, developers ould use ISNs as UIs. ah peer has a diretory ahe () that points to the presumed loation o resoures managed by other peers. The o node in igure 1, or instane, indiates that resoure will be in node. ntries in the might just hint at the loation o remote resoures. n entry in the is a pair (id, lo) in whih id is the UI o a resoure and lo is the network address o a peer node that might store the resoure loally. iretory entries migrate rom Ls to s at other nodes to adjust to aess patterns. ah peer s has a loal neighborhood N(s) deined as the set o peers lose one hop away or in the same loal area network to peer s. We an extend the notion o neighborhood to indiate a set o peers that have business dealings with a peer, as in an e-ommere setting. Protool Operation igure 2 provides a high-level desription o the probabilisti resoure-loation protool. The soure is where a searh starts in a peer node. The algo- 84 MR PRIL I INTRNT OMPUTIN

3 Salable P2P Searh rithm in the igure uses the ollowing messages: SearhRequest (s, res, RevPath, TTL) is a request sent by soure s to loate resoure res. RevPath is the sequene o peers that have reeived this message so ar. This sequene is used as a reverse path to the soure. The parameter TTL (time to live) limits this message s propagation. Resoureound (s, res, RevPath, v) indiates that the resoure res being searhed by soure s was ound at peer v. RevPath is the reverse path to the soure. When the peer reeives the SearhRequest message, it searhes its L irst and then its. I it inds the resoure in the L, it sends a Resoureound message along the path the SearhRequest message traverses until it reahes the soure. This message updates the at every peer it visits. I the peer inds the resoure in the, it sends the SearhRequest message to the peer pointed to by that. This peer might no longer have the resoure, so the searh ontinues rom that point orward. I a peer does not ind the resoure in its L or, it will send the request to eah peer in its neighborhood with a ertain probability p, alled the broadast probability. This probability ould vary with the length o the path that the request traverses. igure 3 shows how the SearhRequest message is propagated when a request or resoure n arrives at peer. Resoure n is not in peer s L, so a probabilisti broadast sends the SearhRequest message on to peer. This node heks its L, but does not ind resoure n. owever, the in node has an indiation that resoure n might be in peer. Peer then sends the SearhRequest message to. igure 4 shows how the Resoureound message travels bak to the soure (node ) via the reverse path used by the SearhRequest message rom to to. Note how the in node gets updated: the next time resoure n is requested, node an ontat node diretly. Protool Perormane igure 5 shows two urves generated rom models that a student and I developed. 8 The igure s graphs assume a network with 120 peers, with an average node degree equal to 5 and a dereasing hit ratio at the. The irst urve in igure 5 illustrates the variation o the probability P that a resoure will be ound with the broadast probability p. s the R(n) iretory ahe () Loal diretory (L) broadast probability p inreases, the probability that the resoure will be ound inreases and reahes 0.9 or a value o p equal to 0.6. t that value, only 10.5 perent o the peers are involved in the searh, as shown in the seond urve, whih displays the variation o the ration o peers involved in the searh. s the broadast probability approahes one, the probability that a resoure will be ound also approahes one. t that point, R(n) o: igure 4. xample o the Resoureound (R) message s propagation. The R message returns to the soure (node ) ollowing the reverse path used by the SR message. The R message updates the in eah o the nodes. In step 3, the in node is updated to relet the at that resoure n is in peer % igure 5. Probability that the resoure will be ound and the ration o peers ontated versus the broadast probability. The urves show that a relatively high probability o inding a resoure an be ahieved by ontating a small ration o all peer nodes roadast probability (p) Probability resoure is ound ration o peers ontated I INTRNT OMPUTIN MR PRIL

4 Saling the Web Ishould mention several relevant P2P systems here, inluding nutella, reenet, ridella, and Sun s JXT Searh. nutella is an open, deentralized group membership and searh protool used mainly or ile sharing. Its goals are dynami operability, perormane and salability, reliability, and anonymity, 1 but it uses lood routing to broadast queries, whih an generate unneessary trai. 2 Ripeanu and olleagues 1 identiied a mismath between nutella s overlay network topology and the Internet inrastruture, whih they show has ritial perormane impliations. berer and olleagues 2 disuss ridella a nutella-ompatible P2P system that distributes repliation over a ommunity o Other P2P orts peers and redues bandwidth requirements beause o its superimposition o a binary tree on top o the P2P network. reenet is a distributed inormation storage system designed to address inormation privay and survivability onerns. 3 reenet operates a sel-organizing P2P network that pools unused disk spae aross potentially hundreds o thousands o omputers to reate a ollaborative virtual ile system. JXT 4 is a suite o protools that ailitates P2P ommuniation. JXT Searh is a deentralized P2P searh engine in whih inormation providers publish a desription o queries they are willing to answer. JXT Searh uses speialized peers (alled hubs) that an register with other hubs as inormation providers.this searh engine is a middle ground between the deentralized nutella model and the entralized Napster approah. Reerenes 1. M. Ripeanu,. Iamnithi, and I. oster, Mapping the nutella Network, I Internet omputing, vol. 5, no. 1, 2002, pp K.berer et al., Improving ata ess in P2P Systems, I Internet omputing, vol. 5, no. 1, 2002, pp I. larke et al., Proteting ree xpression Online with reenet, I Internet omputing,vol.5,no.1, 2002, pp S.Waterhouse et al., istributed Searh in P2P Networks, I Internet omputing, vol. 5, no. 1, 2002, pp verage number o hops (number o peers 1) Peers urther away are ontated Resoure ound loser due to inreased ahe hit ratio roadast probability (p) igure 6. Normalized average number o hops versus broadast probability. s the broadast probability inreases, more nodes are ontated, and the probability o inding a resoure loser to the soure inreases thanks to an inreased ahe hit ratio. a little over 50 perent o the peer nodes are ontated beause o the s eet. What is most interesting here is that a relatively small broadast probability an generate a reasonable probability o inding a resoure at a very low ost (meaning a small ration o the peer nodes are involved). To urther evaluate the probabilisti searh protool, I implemented it in a LN in whih eah mahine simulates multiple peer nodes. I also experimented with randomly generated topologies. To generate the topology or a network with N peers I start with a regular graph with k neighbors in every node and then rewire the graph by taking eah edge in turn. With a ertain probability, I move it to onnet to a randomly hosen vertex. I the resulting graph is not onneted, I restart the proess. You an use this approah to generate graphs that exhibit the small-world behavior mentioned earlier. Suh networks are haraterized by a power-law distribution o graph degree (x) ~ x t in whih (x) is the distribution o the number o routing table entries. 3 or eah ombination o the set o parameters, I generated 10 random topologies with the same initial node degree k and rewiring probability and then generated as many requests per peer as neessary to ahieve at least a ive-perent preision with a 95-perent onidene interval. The results in igure 6 assume 30 peers, k = 4, a rewiring probability equal to 0.1, and a ahe size per peer equal to 1 perent o the total number o resoures stored by all peers. Least reently used (LRU) is the ahe replaement poliy. igure 6 shows the variation o the average number o hops needed to ind a resoure normalized by the total number o peers that must be ontated i all peers (exept the soure) reeived a searh request message. The urve also shows the measurements 95-perent onidene intervals. Initially, the average number o hops inreases as peers urther away rom the soure are ontated; the resoure tends to be ound at a greater distane rom the soure. s p ontinues to inrease, the 86 MR PRIL I INTRNT OMPUTIN

5 Salable P2P Searh inreased value o the ahe hit ratio allows resoures to be ound loser to the soure, dereasing the value o. Note that the maximum value o the urve in igure 6 ours or p = 0.5. t this value, a resoure will be ound with probability 0.84 within 3.4 hops rom the soure on average. onlusions The protool desribed here does not address ahe replaement poliies in the or ahe invalidation options. I ould extend the protool to allow or invalidation o entries when a SearhRequest is reeived beause the resoure was ound in the. The igure doesn t show other details o the protool suh as a provision to avoid broadasting a message more than one. n optimization to the protool would be to notiy the soure as soon as the resoure is ound in addition to sending the Resoureound message to the soure through the reverse path. This would redue searh response time. The design o salable P2P resoure loation protools has drawn the attention o many researhers given that resoure loation is at the heart o any middleware servie. iient middleware servies or P2P are essential glue or appliations running on a multitude o devies inluding wireless devies and all sorts o applianes. Reerenes 1. L. ong, Peer-to-Peer Networks in tion, I Internet omputing, vol. 5, no. 1, 2002, pp K. berer et al., Improving ata ess in P2P Systems, I Internet omputing, vol. 5, no. 1, 2002, pp I. larke et al., Proteting ree xpression Online with reenet, I Internet omputing, vol. 5, no. 1, 2002, pp T. ong, Perormane, Peer-to-Peer: arnessing the Power o isruptive Tehnologies,. Oram, ed., O Reilly, 2001, pp W. Meira Jr. et al., -Representative: Salability Sheme or -ommere, Pro. 2nd Int l Workshop on dvaned Issues o -ommere and Web-ased Inormation Systems (WWIS 2000), I S Press, S. Ratnasamy et al., Salable ontent ddressable Network, Pro. M SIOMM, M Press, 2001, pp Rowstron and P. rushel, Pastry: Salable, istributed, Objet Loation and Routing or Large-Sale Peer-to-Peer Systems, IIP/M Int l on. istributed System Platorms (Middleware), M Press, 2001, pp Menasé and L. Kanhanapalli, Probabilisti Salable P2P Resoure Loation Servies, M Sigmetris Perormane valuation Rev., vol. 30, no. 2, 2002, pp aniel Menasé is a proessor o omputer siene, the odiretor o the -enter or -usiness and the diretor o the MS in -ommere program at eorge Mason University. e reeived a Ph in omputer siene rom UL and published the books apaity Planning or Web Servies and Saling or -usiness (Prentie all, 2002 and 2000). e is a ellow o the M and the reipient o the Mihelson ward rom the omputer Measurement roup. et SP ertiied nnouning I omputer Soiety's new ertiied Sotware evelopment Proessional Program oing Sotware Right emonstrate your level o ability in relation to your peers Measure your proessional knowledge and ompetene The SP Program dierentiates between you and others in a ield that has every kind o redential, but only one that was developed by, or, and with sotware engineering proessionals. "The exam is valuable to me or two reasons: One, it validates my knowledge in various areas o expertise within the sotware ield, without regard to speii knowledge o tools or ommerial produts... Two, my partiipation, along with others, in the exam and in ontinuing eduation sends a message that sotware development is a proessional pursuit requiring advaned eduation and/or experiene, and all the other requirements the I omputer Soiety has established. I also believe in living by the Sotware ngineering ode o ethis endorsed by the omputer Soiety. ll o this will help to improve the overall quality o the produts and servies we provide to our ustomers..." Karen Thurston, ase Two Solutions Register Today Visit the SP web site at or ontat ertiiation@omputer.org

An Alternative Approach to the Fuzzifier in Fuzzy Clustering to Obtain Better Clustering Results

An Alternative Approach to the Fuzzifier in Fuzzy Clustering to Obtain Better Clustering Results An Alternative Approah to the Fuzziier in Fuzzy Clustering to Obtain Better Clustering Results Frank Klawonn Department o Computer Siene University o Applied Sienes BS/WF Salzdahlumer Str. 46/48 D-38302

More information

Announcements. Lecture Caching Issues for Multi-core Processors. Shared Vs. Private Caches for Small-scale Multi-core

Announcements. Lecture Caching Issues for Multi-core Processors. Shared Vs. Private Caches for Small-scale Multi-core Announements Your fous should be on the lass projet now Leture 17: Cahing Issues for Multi-ore Proessors This week: status update and meeting A short presentation on: projet desription (problem, importane,

More information

1. Introduction. 2. The Probable Stope Algorithm

1. Introduction. 2. The Probable Stope Algorithm 1. Introdution Optimization in underground mine design has reeived less attention than that in open pit mines. This is mostly due to the diversity o underground mining methods and omplexity o underground

More information

- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger.

- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger. - 1 - S 21 Diretory-based Administration of Virtual Private Networks: Poliy & Configuration Charles A Kunzinger kunzinge@us.ibm.om - 2 - Clik here Agenda to type page title What is a VPN? What is VPN Poliy?

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

DoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay

DoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay DoS-Resistant Broadast Authentiation Protool with Low End-to-end Delay Ying Huang, Wenbo He and Klara Nahrstedt {huang, wenbohe, klara}@s.uiu.edu Department of Computer Siene University of Illinois at

More information

CA Privileged Access Manager 3.x Proven Implementation Professional Exam (CAT-661) Study Guide Version 1.0

CA Privileged Access Manager 3.x Proven Implementation Professional Exam (CAT-661) Study Guide Version 1.0 Exam (CAT-661) Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFMATION 2018 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized

More information

CA Single Sign-On 12.x Proven Implementation Professional Exam (CAT-140) Study Guide Version 1.5

CA Single Sign-On 12.x Proven Implementation Professional Exam (CAT-140) Study Guide Version 1.5 Study Guide Version 1.5 PROPRIETARY AND CONFIDENTIAL INFORMATION 2018 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized use,

More information

DECT Module Installation Manual

DECT Module Installation Manual DECT Module Installation Manual Rev. 2.0 This manual desribes the DECT module registration method to the HUB and fan airflow settings. In order for the HUB to ommuniate with a ompatible fan, the DECT module

More information

Multi-Channel Wireless Networks: Capacity and Protocols

Multi-Channel Wireless Networks: Capacity and Protocols Multi-Channel Wireless Networks: Capaity and Protools Tehnial Report April 2005 Pradeep Kyasanur Dept. of Computer Siene, and Coordinated Siene Laboratory, University of Illinois at Urbana-Champaign Email:

More information

Make your process world

Make your process world Automation platforms Modion Quantum Safety System Make your proess world a safer plae You are faing omplex hallenges... Safety is at the heart of your proess In order to maintain and inrease your ompetitiveness,

More information

Batch Auditing for Multiclient Data in Multicloud Storage

Batch Auditing for Multiclient Data in Multicloud Storage Advaned Siene and Tehnology Letters, pp.67-73 http://dx.doi.org/0.4257/astl.204.50. Bath Auditing for Multilient Data in Multiloud Storage Zhihua Xia, Xinhui Wang, Xingming Sun, Yafeng Zhu, Peng Ji and

More information

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

Automated System for the Study of Environmental Loads Applied to Production Risers Dustin M. Brandt 1, Celso K. Morooka 2, Ivan R.

Automated System for the Study of Environmental Loads Applied to Production Risers Dustin M. Brandt 1, Celso K. Morooka 2, Ivan R. EngOpt 2008 - International Conferene on Engineering Optimization Rio de Janeiro, Brazil, 01-05 June 2008. Automated System for the Study of Environmental Loads Applied to Prodution Risers Dustin M. Brandt

More information

CA Release Automation 5.x Implementation Proven Professional Exam (CAT-600) Study Guide Version 1.1

CA Release Automation 5.x Implementation Proven Professional Exam (CAT-600) Study Guide Version 1.1 Exam (CAT-600) Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized

More information

Distributed Resource Allocation Strategies for Achieving Quality of Service in Server Clusters

Distributed Resource Allocation Strategies for Achieving Quality of Service in Server Clusters Proeedings of the 45th IEEE Conferene on Deision & Control Manhester Grand Hyatt Hotel an Diego, CA, UA, Deember 13-15, 2006 Distributed Resoure Alloation trategies for Ahieving Quality of ervie in erver

More information

CA Test Data Manager 4.x Implementation Proven Professional Exam (CAT-681) Study Guide Version 1.0

CA Test Data Manager 4.x Implementation Proven Professional Exam (CAT-681) Study Guide Version 1.0 Implementation Proven Professional Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer

More information

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

Cisco Collaborative Knowledge

Cisco Collaborative Knowledge Ciso Collaborative Knowledge Ciso on Ciso: How Ciso Servies Upskilled 14,400 Employees and Transformed into a Consultative, Solutions-Selling Organization. It is estimated that by 2020, roughly four out

More information

1 The Knuth-Morris-Pratt Algorithm

1 The Knuth-Morris-Pratt Algorithm 5-45/65: Design & Analysis of Algorithms September 26, 26 Leture #9: String Mathing last hanged: September 26, 27 There s an entire field dediated to solving problems on strings. The book Algorithms on

More information

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments Establishing Seure Ethernet LANs Using Intelligent Swithing Hubs in Internet Environments WOEIJIUNN TSAUR AND SHIJINN HORNG Department of Eletrial Engineering, National Taiwan University of Siene and Tehnology,

More information

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY Dileep P, Bhondarkor Texas Instruments Inorporated Dallas, Texas ABSTRACT Charge oupled devies (CCD's) hove been mentioned as potential fast auxiliary

More information

CA Privileged Identity Manager r12.x (CA ControlMinder) Implementation Proven Professional Exam (CAT-480) Study Guide Version 1.5

CA Privileged Identity Manager r12.x (CA ControlMinder) Implementation Proven Professional Exam (CAT-480) Study Guide Version 1.5 Proven Professional Exam (CAT-480) Study Guide Version 1.5 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer

More information

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

A Fast Sub-pixel Motion Estimation Algorithm for. H.264/AVC Video Coding

A Fast Sub-pixel Motion Estimation Algorithm for. H.264/AVC Video Coding A Fast Sub-pixel Motion Estimation Algorithm or H.64/AVC Video Coding Weiyao Lin Krit Panusopone David M. Baylon Ming-Ting Sun 3 Zhenzhong Chen 4 and Hongxiang Li 5 Institute o Image Communiation and Inormation

More information

Partial Character Decoding for Improved Regular Expression Matching in FPGAs

Partial Character Decoding for Improved Regular Expression Matching in FPGAs Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia

More information

Improved flooding of broadcast messages using extended multipoint relaying

Improved flooding of broadcast messages using extended multipoint relaying Improved flooding of broadast messages using extended multipoint relaying Pere Montolio Aranda a, Joaquin Garia-Alfaro a,b, David Megías a a Universitat Oberta de Catalunya, Estudis d Informàtia, Mulimèdia

More information

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communiations 1 RAC 2 E: Novel Rendezvous Protool for Asynhronous Cognitive Radios in Cooperative Environments Valentina Pavlovska,

More information

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks 62 Uplink Channel Alloation Sheme and QoS Management Mehanism for Cognitive Cellular- Femtoell Networks Kien Du Nguyen 1, Hoang Nam Nguyen 1, Hiroaki Morino 2 and Iwao Sasase 3 1 University of Engineering

More information

CA Unified Infrastructure Management 8.x Implementation Proven Professional Exam (CAT-540) Study Guide Version 1.1

CA Unified Infrastructure Management 8.x Implementation Proven Professional Exam (CAT-540) Study Guide Version 1.1 Management 8.x Implementation Proven Professional Exam (CAT-540) Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information.

More information

TUNING INTO OTT 2.0 MAKING DIGITAL VIDEO AS GOOD AS TV. Orchestrating an effective live and OTT Video Strategy with a Platform-as-a-Service Solution

TUNING INTO OTT 2.0 MAKING DIGITAL VIDEO AS GOOD AS TV. Orchestrating an effective live and OTT Video Strategy with a Platform-as-a-Service Solution TUNING INTO OTT 2.0 MAKING DIGITAL VIDEO AS GOOD AS TV Orhestrating an effetive live and OTT Video Strategy with a Platform-as-a-Servie Solution Vidya S Nath, Researh Diretor Swetha R Krishnamoorthi, Senior

More information

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks International Journal of Computer Theory and Engineering, Vol. 5, No. 2, April 213 A Multi-Head Clustering Algorithm in Vehiular Ad Ho Networks Shou-Chih Lo, Yi-Jen Lin, and Jhih-Siao Gao Abstrat Clustering

More information

CA Identity Suite 14.x Implementation Proven Professional Exam (CAT-760) Study Guide Version 1.1

CA Identity Suite 14.x Implementation Proven Professional Exam (CAT-760) Study Guide Version 1.1 Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2018 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized use,

More information

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes Deteting Outliers in High-Dimensional Datasets with Mixed Attributes A. Koufakou, M. Georgiopoulos, and G.C. Anagnostopoulos 2 Shool of EECS, University of Central Florida, Orlando, FL, USA 2 Dept. of

More information

Computing Pool: a Simplified and Practical Computational Grid Model

Computing Pool: a Simplified and Practical Computational Grid Model Computing Pool: a Simplified and Pratial Computational Grid Model Peng Liu, Yao Shi, San-li Li Institute of High Performane Computing, Department of Computer Siene and Tehnology, Tsinghua University, Beijing,

More information

Intra- and Inter-Stream Synchronisation for Stored Multimedia Streams

Intra- and Inter-Stream Synchronisation for Stored Multimedia Streams IEEE International Conferene on Multimedia Computing & Systems, June 17-23, 1996, in Hiroshima, Japan, p 372-381 Intra- and Inter-Stream Synhronisation for Stored Multimedia Streams Ernst Biersak, Werner

More information

Cluster-based Cooperative Communication with Network Coding in Wireless Networks

Cluster-based Cooperative Communication with Network Coding in Wireless Networks Cluster-based Cooperative Communiation with Network Coding in Wireless Networks Zygmunt J. Haas Shool of Eletrial and Computer Engineering Cornell University Ithaa, NY 4850, U.S.A. Email: haas@ee.ornell.edu

More information

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

Fast Distribution of Replicated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon

Fast Distribution of Replicated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon ACEEE Int. J. on Information Tehnology, Vol. 3, No. 2, June 2013 Fast Distribution of Repliated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon Email: mmalli@aou.edu.lb

More information

Routing Protocols for Wireless Ad Hoc Networks Hybrid routing protocols Theofanis Kilinkaridis

Routing Protocols for Wireless Ad Hoc Networks Hybrid routing protocols Theofanis Kilinkaridis Routing Protools for Wireless Ad Ho Networks Hyrid routing protools Theofanis Kilinkaridis tkilinka@.hut.fi Astrat This paper presents a partiular group of routing protools that aim to omine the advantages

More information

13.1 Numerical Evaluation of Integrals Over One Dimension

13.1 Numerical Evaluation of Integrals Over One Dimension 13.1 Numerial Evaluation of Integrals Over One Dimension A. Purpose This olletion of subprograms estimates the value of the integral b a f(x) dx where the integrand f(x) and the limits a and b are supplied

More information

HEXA: Compact Data Structures for Faster Packet Processing

HEXA: Compact Data Structures for Faster Packet Processing Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for

More information

Episode 12: TCP/IP & UbiComp

Episode 12: TCP/IP & UbiComp Episode 12: TCP/IP & UbiComp Hannes Frey and Peter Sturm University of Trier Outline Introdution Mobile IP TCP and Mobility Conlusion Referenes [1] James D. Solomon, Mobile IP: The Unplugged, Prentie Hall,

More information

Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations

Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations ABSTRACT Maitreya Natu University of Delaware 103 Smith Hall Newark, DE 19716, USA natu@is.udel.edu Reently proposed apability

More information

CA Service Desk Manager 14.x Implementation Proven Professional Exam (CAT-181) Study Guide Version 1.3

CA Service Desk Manager 14.x Implementation Proven Professional Exam (CAT-181) Study Guide Version 1.3 Exam (CAT-181) Study Guide Version 1.3 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized

More information

Facility Location: Distributed Approximation

Facility Location: Distributed Approximation Faility Loation: Distributed Approximation Thomas Mosibroda Roger Wattenhofer Distributed Computing Group PODC 2005 Where to plae ahes in the Internet? A distributed appliation that has to dynamially plae

More information

CA PPM 14.x Implementation Proven Professional Exam (CAT-222) Study Guide Version 1.2

CA PPM 14.x Implementation Proven Professional Exam (CAT-222) Study Guide Version 1.2 CA PPM 14.x Implementation Proven Professional Exam (CAT-222) Study Guide Version 1.2 PROPRIETARY AND CONFIDENTIAL INFMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

Adobe Certified Associate

Adobe Certified Associate Adobe Certified Assoiate About the Adobe Certified Assoiate (ACA) Program The Adobe Certified Assoiate (ACA) program is for graphi designers, Web designers, video prodution designers, and digital professionals

More information

This fact makes it difficult to evaluate the cost function to be minimized

This fact makes it difficult to evaluate the cost function to be minimized RSOURC LLOCTION N SSINMNT In the resoure alloation step the amount of resoures required to exeute the different types of proesses is determined. We will refer to the time interval during whih a proess

More information

Acoustic Links. Maximizing Channel Utilization for Underwater

Acoustic Links. Maximizing Channel Utilization for Underwater Maximizing Channel Utilization for Underwater Aousti Links Albert F Hairris III Davide G. B. Meneghetti Adihele Zorzi Department of Information Engineering University of Padova, Italy Email: {harris,davide.meneghetti,zorzi}@dei.unipd.it

More information

Whole Numbers. Whole Numbers. Solutions. Curriculum Ready.

Whole Numbers. Whole Numbers. Solutions. Curriculum Ready. Whole Numbers Whole Numbers Solutions Curriulum Ready www.mathletis.om Copyright 009 P Learning. All rights reserved. First edition printed 009 in Australia. A atalogue reord for this book is available

More information

Connection Guide. Installing the printer locally (Windows) What is local printing? Installing the printer using the Software and Documentation CD

Connection Guide. Installing the printer locally (Windows) What is local printing? Installing the printer using the Software and Documentation CD Page 1 of 7 Connetion Guide Installing the printer loally (Windows) Note: When installing a loally attahed printer, if the operating system is not supported y the Software and Doumentation CD, then the

More information

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless

More information

Displacement-based Route Update Strategies for Proactive Routing Protocols in Mobile Ad Hoc Networks

Displacement-based Route Update Strategies for Proactive Routing Protocols in Mobile Ad Hoc Networks Displaement-based Route Update Strategies for Proative Routing Protools in Mobile Ad Ho Networks Mehran Abolhasan 1 and Tadeusz Wysoki 1 1 University of Wollongong, NSW 2522, Australia E-mail: mehran@titr.uow.edu.au,

More information

PROJECT PERIODIC REPORT

PROJECT PERIODIC REPORT FP7-ICT-2007-1 Contrat no.: 215040 www.ative-projet.eu PROJECT PERIODIC REPORT Publishable Summary Grant Agreement number: ICT-215040 Projet aronym: Projet title: Enabling the Knowledge Powered Enterprise

More information

Taming Decentralized POMDPs: Towards Efficient Policy Computation for Multiagent Settings

Taming Decentralized POMDPs: Towards Efficient Policy Computation for Multiagent Settings Taming Deentralized PMDPs: Towards ffiient Poliy omputation for Multiagent Settings. Nair and M. Tambe omputer Siene Dept. University of Southern alifornia Los Angeles A 90089 nair,tambe @us.edu M. Yokoo

More information

A Combination of Trie-trees and Inverted Files for the Indexing of Set-valued Attributes

A Combination of Trie-trees and Inverted Files for the Indexing of Set-valued Attributes A Combination o Trie-trees and Files or the Indexing o Set-valued Attributes Manolis Terrovitis Nat. Tehnial Univ. Athens mter@dblab.ee.ntua.gr Spyros Passas Nat. Tehnial Univ. Athens spas@dblab.ee.ntua.gr

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

Direct-Mapped Caches

Direct-Mapped Caches A Case for Diret-Mapped Cahes Mark D. Hill University of Wisonsin ahe is a small, fast buffer in whih a system keeps those parts, of the ontents of a larger, slower memory that are likely to be used soon.

More information

Scalable TCP: Improving Performance in Highspeed Wide Area Networks

Scalable TCP: Improving Performance in Highspeed Wide Area Networks Salable TP: Improving Performane in Highspeed Wide Area Networks Tom Kelly ERN - IT Division Geneva 3 Switzerland tk@am.a.uk ABSTRAT TP ongestion ontrol an perform badly in highspeed wide area networks

More information

References. December 1992, pp. 71 { 81. pp.457{467. Magazine, June for very large high throughput database systems,"

References. December 1992, pp. 71 { 81. pp.457{467. Magazine, June for very large high throughput database systems, the overall working time for other appliations. In ase, data ltering was the only appliation being run, then using distributed indexing, we an serve 00 times as many requests. 6 Conlusion We have explored

More information

Design Implications for Enterprise Storage Systems via Multi-Dimensional Trace Analysis

Design Implications for Enterprise Storage Systems via Multi-Dimensional Trace Analysis Design Impliations for Enterprise Storage Systems via Multi-Dimensional Trae Analysis Yanpei Chen, Kiran Srinivasan, Garth Goodson, Randy Katz University of California, Berkeley, NetApp In. {yhen2, randy}@ees.berkeley.edu,

More information

Real-Time Control for a Turbojet Engine

Real-Time Control for a Turbojet Engine A Multiproessor mplementation of Real-Time Control for a Turbojet Engine Phillip L. Shaffer ABSTRACT: A real-time ontrol program for a turbojet engine has been implemented on a four-proessor omputer, ahieving

More information

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections SVC-DASH-M: Salable Video Coding Dynami Adaptive Streaming Over HTTP Using Multiple Connetions Samar Ibrahim, Ahmed H. Zahran and Mahmoud H. Ismail Department of Eletronis and Eletrial Communiations, Faulty

More information

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based

More information

Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8

Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8 Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introdution... 1 1.1. Internet Information...2 1.2. Internet Information Retrieval...3 1.2.1. Doument Indexing...4 1.2.2. Doument Retrieval...4

More information

MATH STUDENT BOOK. 12th Grade Unit 6

MATH STUDENT BOOK. 12th Grade Unit 6 MATH STUDENT BOOK 12th Grade Unit 6 Unit 6 TRIGONOMETRIC APPLICATIONS MATH 1206 TRIGONOMETRIC APPLICATIONS INTRODUCTION 3 1. TRIGONOMETRY OF OBLIQUE TRIANGLES 5 LAW OF SINES 5 AMBIGUITY AND AREA OF A TRIANGLE

More information

An Edge-based Clustering Algorithm to Detect Social Circles in Ego Networks

An Edge-based Clustering Algorithm to Detect Social Circles in Ego Networks JOURNAL OF COMPUTERS, VOL. 8, NO., OCTOBER 23 2575 An Edge-based Clustering Algorithm to Detet Soial Cirles in Ego Networks Yu Wang Shool of Computer Siene and Tehnology, Xidian University Xi an,77, China

More information

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm

More information

A scheme for racquet sports video analysis with the combination of audio-visual information

A scheme for racquet sports video analysis with the combination of audio-visual information A sheme for raquet sports video analysis with the ombination of audio-visual information Liyuan Xing a*, Qixiang Ye b, Weigang Zhang, Qingming Huang a and Hua Yu a a Graduate Shool of the Chinese Aadamy

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

Parallelizing Frequent Web Access Pattern Mining with Partial Enumeration for High Speedup

Parallelizing Frequent Web Access Pattern Mining with Partial Enumeration for High Speedup Parallelizing Frequent Web Aess Pattern Mining with Partial Enumeration for High Peiyi Tang Markus P. Turkia Department of Computer Siene Department of Computer Siene University of Arkansas at Little Rok

More information

Dynamic Backlight Adaptation for Low Power Handheld Devices 1

Dynamic Backlight Adaptation for Low Power Handheld Devices 1 Dynami Baklight Adaptation for ow Power Handheld Devies 1 Sudeep Pasriha, Manev uthra, Shivajit Mohapatra, Nikil Dutt and Nalini Venkatasubramanian 444, Computer Siene Building, Shool of Information &

More information

P-admissible Solution Space

P-admissible Solution Space P-admissible Solution Spae P-admissible solution spae or Problem P: 1. the solution spae is inite, 2. every solution is easible, 3. evaluation or eah oniguration is possible in polynomial time and so is

More information

Multi-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks

Multi-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks Multi-hop Fast Conflit Resolution Algorithm for Ad Ho Networks Shengwei Wang 1, Jun Liu 2,*, Wei Cai 2, Minghao Yin 2, Lingyun Zhou 2, and Hui Hao 3 1 Power Emergeny Center, Sihuan Eletri Power Corporation,

More information

Chapter 2: Introduction to Maple V

Chapter 2: Introduction to Maple V Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard

More information

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering A Novel Bit Level Time Series Representation with Impliation of Similarity Searh and lustering hotirat Ratanamahatana, Eamonn Keogh, Anthony J. Bagnall 2, and Stefano Lonardi Dept. of omputer Siene & Engineering,

More information

Dynamic Programming. Lecture #8 of Algorithms, Data structures and Complexity. Joost-Pieter Katoen Formal Methods and Tools Group

Dynamic Programming. Lecture #8 of Algorithms, Data structures and Complexity. Joost-Pieter Katoen Formal Methods and Tools Group Dynami Programming Leture #8 of Algorithms, Data strutures and Complexity Joost-Pieter Katoen Formal Methods and Tools Group E-mail: katoen@s.utwente.nl Otober 29, 2002 JPK #8: Dynami Programming ADC (214020)

More information

CA PPM 15.x Proven Implementation Professional Exam (CAT-223) Study Guide Version 1.3

CA PPM 15.x Proven Implementation Professional Exam (CAT-223) Study Guide Version 1.3 CA PPM 15.x Proven Implementation Professional Exam (CAT-223) Study Guide Version 1.3 PROPRIETARY AND CONFIDENTIAL INFORMATION 2018 CA. All rights reserved. CA onfidential & proprietary information. For

More information

Connection Guide. Installing the printer locally (Windows) What is local printing? Installing the printer using the Software and Documentation CD

Connection Guide. Installing the printer locally (Windows) What is local printing? Installing the printer using the Software and Documentation CD Connetion Guide Page 1 of 5 Connetion Guide Installing the printer loally (Windows) Note: If the Software and Doumentation CD does not support the operating system, you must use the Add Printer Wizard.

More information

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method 3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr

More information

Australian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message

Australian Journal of Basic and Applied Sciences. A new Divide and Shuffle Based algorithm of Encryption for Text Message ISSN:1991-8178 Australian Journal of Basi and Applied Sienes Journal home page: www.ajbasweb.om A new Divide and Shuffle Based algorithm of Enryption for Text Message Dr. S. Muthusundari R.M.D. Engineering

More information

Video Data and Sonar Data: Real World Data Fusion Example

Video Data and Sonar Data: Real World Data Fusion Example 14th International Conferene on Information Fusion Chiago, Illinois, USA, July 5-8, 2011 Video Data and Sonar Data: Real World Data Fusion Example David W. Krout Applied Physis Lab dkrout@apl.washington.edu

More information

Reading Object Code. A Visible/Z Lesson

Reading Object Code. A Visible/Z Lesson Reading Objet Code A Visible/Z Lesson The Idea: When programming in a high-level language, we rarely have to think about the speifi ode that is generated for eah instrution by a ompiler. But as an assembly

More information

Reading Object Code. A Visible/Z Lesson

Reading Object Code. A Visible/Z Lesson Reading Objet Code A Visible/Z Lesson The Idea: When programming in a high-level language, we rarely have to think about the speifi ode that is generated for eah instrution by a ompiler. But as an assembly

More information

Coprocessors, multi-scale modeling, fluid models and global warming. Chris Hill, MIT

Coprocessors, multi-scale modeling, fluid models and global warming. Chris Hill, MIT Coproessors, multi-sale modeling, luid models and global warming. Chris Hill, MIT Outline Some motivation or high-resolution modeling o Earth oean system. the modeling hallenge An approah Sotware triks

More information

Dubins Path Planning of Multiple UAVs for Tracking Contaminant Cloud

Dubins Path Planning of Multiple UAVs for Tracking Contaminant Cloud Proeedings of the 17th World Congress The International Federation of Automati Control Dubins Path Planning of Multiple UAVs for Traking Contaminant Cloud S. Subhan, B.A. White, A. Tsourdos M. Shanmugavel,

More information

IN structured P2P overlay networks, each node and file key

IN structured P2P overlay networks, each node and file key 242 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 21, NO. 2, FEBRUARY 2010 Elasti Routing Table with Provable Performane for Congestion Control in DHT Networks Haiying Shen, Member, IEEE,

More information

The Implementation of RRTs for a Remote-Controlled Mobile Robot

The Implementation of RRTs for a Remote-Controlled Mobile Robot ICCAS5 June -5, KINEX, Gyeonggi-Do, Korea he Implementation of RRs for a Remote-Controlled Mobile Robot Chi-Won Roh*, Woo-Sub Lee **, Sung-Chul Kang *** and Kwang-Won Lee **** * Intelligent Robotis Researh

More information

Performance Benchmarks for an Interactive Video-on-Demand System

Performance Benchmarks for an Interactive Video-on-Demand System Performane Benhmarks for an Interative Video-on-Demand System. Guo,P.G.Taylor,E.W.M.Wong,S.Chan,M.Zukerman andk.s.tang ARC Speial Researh Centre for Ultra-Broadband Information Networks (CUBIN) Department

More information

A Lightweight Intrusion-Tolerant Overlay Network

A Lightweight Intrusion-Tolerant Overlay Network A Lightweight Intrusion-Tolerant Overlay Network Rafael R. Obelheiro and Joni da Silva Fraga Department of Automation and Systems Federal University of Santa Catarina, Brazil Email: rro@das.ufs.br, fraga@das.ufs.br

More information

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,

More information

An Experimental Study of Fractional Cooperation in Wireless Mesh Networks

An Experimental Study of Fractional Cooperation in Wireless Mesh Networks An Experimental tudy of Frational Cooperation in Wireless Mesh Networks Anthony Cale, Nariman Farsad, and Andrew W. Ekford Dept. of Computer iene and Engineering, York University 47 Keele treet, Toronto,

More information

Publish/Subscribe Systems on Node and Link Error Prone Mobile Environments

Publish/Subscribe Systems on Node and Link Error Prone Mobile Environments Publish/Subsribe Systems on Node and Link Error Prone Mobile Environments Sangyoon Oh,, Sangmi Lee Pallikara, Sunghoon Ko, Jai-Hoon Kim,3, Geoffrey Fox, Community Grids Lab., Indiana University, Bloomington,

More information

Wireless Rear Speaker Kit

Wireless Rear Speaker Kit Wireless Rear Speaker Kit Thank you for purhasing this produt (SWA-8000S). Model : SWA-8000S For more detailed information on how to onnet and use the Wireless Rear Speaker Kit (SWA-8000S), refer to the

More information

Exploring the Commonality in Feature Modeling Notations

Exploring the Commonality in Feature Modeling Notations Exploring the Commonality in Feature Modeling Notations Miloslav ŠÍPKA Slovak University of Tehnology Faulty of Informatis and Information Tehnologies Ilkovičova 3, 842 16 Bratislava, Slovakia miloslav.sipka@gmail.om

More information

CleanUp: Improving Quadrilateral Finite Element Meshes

CleanUp: Improving Quadrilateral Finite Element Meshes CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)

More information