Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Size: px
Start display at page:

Download "Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks"

Transcription

1 Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication Engineering, University of Thessaly, Volos, 38, Greece Abstract We consier the problem of moeling the transmission of real-time ata from a single noe of a wireless sensor network to the next hop or access point. Generate packets are place in a single position buffer an are transmitte over the wireless meium to the next hop, or they are iscare an replace when a new ata packet is generate from the sensor. To increase the percentage of packets elivere on-time to the next hop, we introuce a thresholing policy that is supporte by an analytical moel an it is responsible for eciing whether to transmit a ata packet or rop it an transmit the next one. Our moel consiers the behavior at single sensor where ata are generate with a Poisson process an have a fixe ealine associate to them while the impact of the other sensors is moele through their effect on the MAC service time. However, we also evaluate the performance of the packet ropping scheme in a multi-hop sensor chain. The propose policy leas to a higher percentage of on-time elivere packets in both scenarios. Inex Terms Real-time communication, wireless sensor networks, packet ropping, queuing moel. I. INTRODUCTION In wireless sensor networks (WSNs) real-time ata generation an transmission ominate the majority of application scenarios. One of the main characteristics of sensor ata that is generate in real-time is that their value may become obsolete when a new one is generate. In this paper, we investigate the communication of real-time messages by eveloping a simple queueing theory moel an we use it for further optimization. We moel the transmitter of a sensor noe as a single-server queue. The generate ata packets have to be transmitte within a certain ealine. The queueing system is assume to have an overwrite-buffer with space for one packet; when a new packet bearing more recent ata arrives to the queueing system, the buffere packet, if any, is iscare an the new packet is store in the buffer. Incluing the buffer space at the transmitter, the system represents an M/M// queue with ealines. The important contribution of this work to the aforementione moel is that it introuces a thresholing mechanism. Accoring to this mechanism, a buffere ata packet is roppe (remove from the buffer) if the remaining time until its ealine is shorter than a certain thresholθ. The intuition behin this policy is that a packet is not transmitte if there is low probability of being receive before its ealine expires, saving thus transmission time for a newly arriving packet an in aition wireless banwith. By ropping the currently store packet, an waiting on a new packet arrival instea, the percentage of on-time packets is increase because sink Fig. : Multiple wireless sensors generate real-time ata that are elivere to a sink. With multi-hop communication the wireless noes closer to the sink may become the bottleneck since they have to forwar higher portion of the traffic. a newly arriving packet has a higher probability of meeting its ealine. Furthermore, with this proactive approach a packet that woul be characterize lost in the next hop, if it was late, will not be transmitte over the wireless meium an consume banwith. II. RELATED WORKS To the best of our knowlege, the problem of moeling the real-time packet transmission in WSNs has not been aequately aresse. Nevertheless, the secon problem we are intereste in this paper, i.e. the phenomenon of overloaing the core of a WSN that operates uner multiple sources an one sink has been reporte in several works []. Fig. epicts a simple wireless sensor network where problems like the above may occur epening on the locally generate traffic loa at each sensor. Optimization efforts in this type of wireless sensors networks have focuse on reucing the traffic loa an also on esigning meium access control (MAC) protocols that prioritize the noes that are closer to the sink [], [3]. Nevertheless these mechanisms attempt to aress the problem from the perspective of the better utilization of the network without looking at the sources themselves an how to prevent unnecessary ata from being injecte into the network. However, for optimizing the injection of real-time traffic into the network, there is a nee for analytical performance moels that characterize the impact of all possible actions taken by a noe. The works in this area are limite an focus primarily on the queuing moel itself without consiering its applicability in a network setting. Barrer was one of the first to analyze an M/M/ queue with eterministic ealines [4], []. This analysis was extene to systems with stateepenent arrival an service rates, an more general ealines by Brant an Brant [6], [7] an by Movaghar [8]. These

2 Fig. : A schematic representation of the moel for a sensor noe that aopts proactive packet ropping. stuies all eal with non-preemptive systems with ealines to service beginnings, but in [9], Movaghar consiers ealines to service enings with preemption. Movaghar an Kargahi [], [] have evise an approximation for an M/M/ queue with the earliest-ealine-first (EDF) iscipline, which is known to stochastically maximise the fraction of packets serve before their ealine (see, e.g., []). Lehoczky [3] analyze an M/M/ queue with ealines to service enings an the EDFpolicy in heavy traffic. He argue that, since the ealines of all store packets have to be taken into account, this queue gives rise to a Markov process on a statespace of infinite imension. Lehoczky shows that the Markov process collapses to a tractable one-imensional process in heavy traffic. Lehozcky later use these results to analyze control policies in [4], an extene his analysis to Jackson networks in []. Doytchinov et al. [6] extene this analysis to a GI/G/ queue with ealines, an Kruk et al. [7] to networks of such queues. A. Sensor System Moel III. PERFORMANCE ANALYSIS We now provie further etails for the performance analysis of the propose system moel. Packets are generate at each sensor accoring to a Poisson process with parameter. The packets have exponentially istribute service times with parameter that correspon to the behavior of the MAC protocol an the impact of channel contention from other noes. A packet transmission is consiere successful if it is complete within time units after the arrival of the packet to the queue, i.e., if a packet arrives at time t, its transmission must finish before its global ealine t +, with being a fixe relative ealine. Packet transmission at the physical layer (PHY) is non-preemptive, meaning that if a packet starts being transmitte it will finish regarless of whether another packet arrives. We efine the packet elivery ratio (PDR) of the system as the fraction of packets that are transmitte successfully, i.e. within the ealine requirement. B. PDR Calculation In this section, we compute the PDR of the system in the presence of packet ropping enote by γ(θ). The parameter θ enotes the packet ropping threshol given in secons, an it will be iscusse in more etail later. We enote by L the number of packets present in the system (incluing the transmitter) immeiately before a packet arrival. A packet arriving to the system will fin the latter in one of the following three states: Empty (L = ): The transmitter is available, an there is no packet occupying the buffer spot. Busy Transmitter (L = ): The transmitter is transmitting a packet but the buffer is empty. Full, (L = ): The transmitter is busy an the buffer also contains a packet. In that case, an arriving packet overwrites the buffere one. The PDR γ(θ) is by efinition equal to the probability that the transmission of an arbitrary packet is successful. To compute this probability, we conition on whether a packet arrives at an empty system or not. Denoting by B the service time that the arriving packet woul experience, We have: γ(θ) = P(L = )P(B ) θ +( P(L = )) e t P(B t)e t t () The rationale behin Eq. () is as follows: If an arbitrary packet P arrives at an empty system, it is transmitte successfully only if the require transmission time B is less than. This explains the term P(L = )P(B ). If P arrives at a non-empty system (L = or L = ), we conition on the length of the remaining (resiual) transmission time t of the packet that is currently being transmitte. The resiual service time is exponentially istribute, so its ensity is e t. Moreover, given that the resiual service time is t, the service of P is successful if the following three conitions are all met: First, the time until the ealine is larger than θ when the resiual service ens, i.e., t θ. This is taken into account in the integration region of Eq. (). Secon, the service time is less than t, which explains the factor P(B t ). Thir, there were no other arrivals uring t time units, which explains the term e t. C. Probability of an Empty System Next, we calculate P(L = ), i.e. the probability that an arbitrary packet arrives at an empty system. For this purpose we efine the cycle time C which is the time between two consecutive time instants at which the system becomes empty an it is epicte in Fig. 3. The cycle time is separate into two perios: A first ile perio uring which the system is empty, an a busy perio uring which the transmitter is occupie until it becomes empty again. The busy perio spreas throughout the time that the system is not in a state L =. It consists of a collection of consecutive states characterize by L = or L =. We shall refer to the case where L = uring a busy perio as clearance perio (CP ), which is the amount of time the buffer is continuously occupie. A clearance perio ens when the buffer is cleare, i.e. when either a ispatch to the transmitter occurs, or when the store packet is enie service an remove from the system following the thresholing proceure. The ile time lasts until a packet arrives, so the mean ile time is /. If the busy perio is enote by BP, we have: E[C] = +E[BP]. () From the PASTA-property [8], we have that the probability that a packet arrives at an empty system, P(L = ),

3 Packet arrivals First arrival, begins a clearance perio L = L = L = L = L = time L = L = clearance perio (CP) CP Ile time Ile time busy perio cycle new cycle begins Fig. 3: A cycle consisting of ile time an busy perio. it is equal to the probability that the system is empty at an arbitrary time. To erive this probability we ivie the mean ile time by the mean cycle time as follows: P(L = ) = / E[C] = / /+E[BP]. (3) Now we erive an expression for the busy perio. The busy perio starts when a packet arrives to an empty system. After this, the expecte time until the first event (an arrival or service completion) is /(+). Furthermore, with probability /(+ ), the first event is a service completion, an the busy perio ens after / time units. With probability /(+ ), the first event is an arrival. In this case, the arriving packet is store in the buffer an the buffer has to be cleare, which takes in expectation E[T] time units. Once the buffer has been cleare, the expecte time before the system becomes empty is again equal to E[BP] ue to the memorylessness of service times. From the above we have that the mean busy perio is E[BP] = + + (E[T]+E[BP]), (4) + where E[T] is the mean buffer clearance perio. We will erive E[T] next. With algebraic manipulations (4) yiels E[BP] = + E[T]. () Now, it remains to etermine E[T], the expecte length of the buffer clearance perio. Without loss of generality, we assume that the buffer clearance perio starts at time. We conition on t the time at which the next event (arrival or service completion) occurs. Because the time until the next event is exponentially istribute with parameter +, we obtain: E[T] = + + θ θ θ (+)e (+)t ( θ)t + (+)e (+)t tt + (+)e (+)t (t+e[t])t. The three integrals (from left to right) cover the following three possibilities: First, if there are no events before time θ, Γ Θ Fig. 4: The PDR as a function of θ, with = = =. the buffer is cleare at time θ because the ealine of the buffere packet becomes smaller than θ. Secon, if the first event occurs at time t < θ, an the first event is a service completion, the buffer is cleare at time t because the buffere packet enters service. Thir, if the first event occurs at time t < θ an is a packet arrival, the arriving packet overwrites the buffere packet, an a new buffer clearance perio begins. After rewriting an evaluating the integrals (the rightmost two using partial integration), we obtain: E[T] = e (+)( θ) +e (+)( θ). (6) Combining Equations (3), (), an (6) we have that P(L = ) = + +e (+)( θ) + + Finally, by substituting (7) into () an evaluating the integrals we have that the PDR γ(θ) is given by γ(θ) = P(L = )( e )+ [ ( P(L = )) + ( e (+)( θ)) e (7) ( e ( θ))]. (8) Note that if, ealines become irrelevant an two special cases occur for specific values of θ. If θ =, packets in the buffer are always transmitte, regarless of the time until their ealine. The PDR of the system is thus equal to that in an M/M// queue (see e.g., [9, Section.7]. If θ =, packets in the buffer are never transmitte. Only packets arriving to an empty system are. In this case, the PDR is equal to that in an M/M// queue. By substituting an θ, these values follow from Equation (8). IV. NUMERICAL RESULTS FOR A SINGLE SENSOR In this section, we stuy the PDR numerically. In Fig. 4, we present γ(θ) for various values of θ, with = = =. We clearly see that the PDR of the system is inee increase by the threshol θ, as long as θ is chosen appropriately. Having establishe that an appropriately chosen threshol increases PDR, we stuy how much the PDR can be increase by this threshol. Note that γ() is the PDR of the system

4 Gain % Λ 3 Λ 4 Λ 6 Gain % Λ Fig. 6: PDR gain for values equal to 3, 4 an 6. Gain % (a). 4 Λ 6 (b). 8. Fig. : Maximal PDR improvement.. without thresholing. We efine θ as the threshol that maximizes the relative increase in PDR, i.e., we efine { } γ(θ) γ() θ = arg max : θ. γ() We efine the maximal PDR improvement as the maximal relative increase in PDR, i.e., as (γ(θ ) γ())/γ(). In the sequel, we set =. We can make this assumption without loss of generality; all parameters are relative to each other, so for any set of parameters, we can scale time in such a way that = without changing the PDR of the system. In Fig. (a) we isplay the maximal PDR improvement for between an, an between an. Fig (a) implies that, in this parameter region, we can obtain an increase of up to % in PDR by setting the threshol to its optimal value. Furthermore, we see that the relative increase in PDR is maximal if.3, but even for larger values of there can be a PDR enhancement. In aition to this, the maximal PDR improvement grows as grows, so the PDR policy is especially beneficial if the system is overloae. Likewise, in Fig. (b) we show the maximal PDR improve- ment for up to. In this region, the increase in PDR can be as much as 3%. Furthermore, the value of with the largest relative increase in PDR, as well as the range of for which gain is achieve become smaller. This is conveye by Fig. 6, which plots the gain for three increasing values of, equal to 3, 4 an 6. The narrower range of where gain is achieve is explaine by a shorter sojourn time of buffere packets that later enter service, ue to more frequent buffer overwriting for an increasing arrival rate. The shorter sojourn time reflects itself in a larger lea-time when the buffere packet is assesse, by the packet ropping mechanism, for ispatch to the transmitter. This in turn presents itself in a ecrease of the upper value of for which packet ropping still results in transmission enials for some packets, an as such, still results in PDR gain. We also present values of the improvement for specific values of an in Table I for a single sensor. We clearly see that, for this parameter region, the maximal PDR increase grows as becomes larger. Furthermore, given a fixe ealine, the maximal improvement increases up to a certain value of, an ecreases beyon that value. V. NUMERICAL RESULTS FOR A SENSOR CHAIN Accoring to our setup, each noe in the sensor chain generates locally a loa an also forwars the successfully receive ata packets from the previous noe. Here, we assume that this total loa follows again an exponential istribution. This assumption is necessary since if aopt a generalize istribution for the arrival rate at a noe, this will make the problem intractable. The close form analysis analysis was only possible for a single queue as we have seen in the previous sections. n= TABLE I: The maximal PDR improvement (%) for specific values of an.

5 n= noes n= noes TABLE II: The maximal PDR improvement (%) for specific values of an an for sensor chains of n= an n= noes. We now present values of the improvement for specific values of an in Table II for a chain of an sensors. Regaring the results, we see that as the number of noes in the chain is increase, the loa that must be forware naturally increases. Therefore, contrary to the case of low an n = (seen in Table I) where the PDR improvement of the propose scheme is not that important, in the case of n = it is. The reason is that each noe has to forwar an increase traffic loa an not only the low that is generate locally. As the number of noes becomes even higher, an in our case n becomes, the PDR improvement becomes even higher. Recall that the results are relative to the case that oes not apply proactive packet ropping. The same tren follows for higher where the significant performance benefits are preserve. The reason for the reuce importance of is ue to the fact that the ominates the system behavior. VI. CONCLUSIONS In this paper, we evelope an analytical moel that captures the impact of proactive packet ropping on the transmission of real-time packets from a single sensor noe. We showe that with the use of the analytical moel, an optimal ropping policy can be ientifie, leaing to PDR improvement of up to 3% for a single hop. When this moel is applie in the case of a multi-hop chain network of sensors, the PDR improvement is more significant. This is preominantly ue the ability of our moel to preict the elaye arrival of a packet an subsequently rop it before transmission. We plan to exten our moel to a system that exhibits ifferent service time istributions an larger buffer size. Nevertheless, as it seems from our current analysis these extensions are not trivial. REFERENCES [] Y. Liu, Y. He, M. Li, J. Wang, K. Liu, an L. Mo, Does wireless sensor network scale? a measurement stuy on greenorbs, in IEEE INFOCOM,. [] S. Olariu an I. Stojmenovic, Design guielines for maximizing lifetime an avoiing energy holes in sensor networks with uniform istribution an uniform reporting, in IEEE INFOCOM, 6. [3] X. Wu, G. Chen, an S. K. Das, Avoiing energy holes in wireless sensor networks with nonuniform noe istribution, IEEE TPDS, 8. [4] D. Barrer, Queueing with impatient customers an inifferent clerks, Operations Research, vol., no., pp , 97. [], Queueing with impatient customers an orere service, Operations Research, vol., no., pp. 6 66, 97. [6] A. Brant an M. Brant, On the m(n)/m(n)/s queue with impatient calls, Performance Evaluation, vol. 3, no. -, pp. 8, 999. [7], Asymptotic results an a Markovian approximation for the m(n)/m(n)/s+gi system, Queueing Systems, vol. 4, no. -, pp ,. [8] A. Movaghar, On queueing with customer impatience until the beginning of service, Queueing Systems, vol. 9, no. 4, pp , 998. [9], On queueing with customer impatience until the en of service, Stochastic Moels, vol., no., pp , 6. [] M. Kargahi an A. Movaghar, Non-preemptive earliest-ealine-first scheuling policy: A performance stuy, in IEEE International Symposium on Moeling, Analysis, an Simulation of Computer an Telecommunication Systems, Georgia, ATL, USA,, p.. [], A metho for performance analysis of earliest-ealine-first scheuling policy, Journal of Supercomputing, vol. 37, no., pp. 97, 6. [] S. Panwar, D. Towsley, an J. Wolf, Optimal scheuling policies for a class of queues with customer ealines to the beginning of service, Journal of the ACM, vol. 3, no. 4, pp , 988. [3] J. Lehoczky, Real-time queueing theory, in IEEE Real-Time Systems Symposium, Washington, DC, USA, 996, p [4], Using real-time queueing theory to control lateness in real-time systems, Performance Evaluation Review, vol., no., pp. 8 68, 997. [], Real-time queueing network theory, in IEEE Real-time Systems Symposium, San Francisco, CA, USA, 997, p [6] B. Doytchinov, J. Lehoczky, an S. Shreve, Real-time queues in heavy traffic with earliest-ealine-first queue iscipline, The Annals of Applie Probability, vol., no., pp ,. [7] L. Kruk, J. Lehoczky, S. Shreve, an S.-N. Yeung, Earliest-ealinefirst service in heavy-traffic acyclic networks, The Annals of Applie Probability, vol. 4, no. 3, pp. 36 3, 4. [8] R. Wolff, Poisson arrivals see time averages, Operations Research, vol. 3, no., pp. 3 3, 98. [9], Introuction to Queueing Theory. Prentice-Hall, Inc., 989.

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients

Probabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients Probabilistic Meium Access Control for 1 Full-Duplex Networks with Half-Duplex Clients arxiv:1608.08729v1 [cs.ni] 31 Aug 2016 Shih-Ying Chen, Ting-Feng Huang, Kate Ching-Ju Lin, Member, IEEE, Y.-W. Peter

More information

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA Preprint, August 5, 2018. 1 All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA Mikhail Ivanov, Frerik Brännström, Alexanre Graell i Amat, an Petar Popovski Department of Signals an Systems,

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Analytical approximation of transient joint queue-length distributions of a finite capacity queueing network

Analytical approximation of transient joint queue-length distributions of a finite capacity queueing network Analytical approximation of transient joint queue-length istributions of a finite capacity queueing network Gunnar Flötterö Carolina Osorio March 29, 2013 Problem statements This work contributes to the

More information

Supporting Fully Adaptive Routing in InfiniBand Networks

Supporting Fully Adaptive Routing in InfiniBand Networks XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information

Divide-and-Conquer Algorithms

Divide-and-Conquer Algorithms Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:

More information

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.

More information

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks Optimal Routing an Scheuling for Deterministic Delay Tolerant Networks Davi Hay Dipartimento i Elettronica olitecnico i Torino, Italy Email: hay@tlc.polito.it aolo Giaccone Dipartimento i Elettronica olitecnico

More information

Parallel Directionally Split Solver Based on Reformulation of Pipelined Thomas Algorithm

Parallel Directionally Split Solver Based on Reformulation of Pipelined Thomas Algorithm NASA/CR-1998-208733 ICASE Report No. 98-45 Parallel Directionally Split Solver Base on Reformulation of Pipeline Thomas Algorithm A. Povitsky ICASE, Hampton, Virginia Institute for Computer Applications

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly

More information

Performance Modelling of Necklace Hypercubes

Performance Modelling of Necklace Hypercubes erformance Moelling of ecklace ypercubes. Meraji,,. arbazi-aza,, A. atooghy, IM chool of Computer cience & harif University of Technology, Tehran, Iran {meraji, patooghy}@ce.sharif.eu, aza@ipm.ir a Abstract

More information

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks Hinawi Publishing Corporation International Journal of Distribute Sensor Networks Volume 2014, Article ID 936379, 17 pages http://x.oi.org/10.1155/2014/936379 Research Article REALFLOW: Reliable Real-Time

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

Chalmers Publication Library

Chalmers Publication Library Chalmers Publication Library All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA This ocument has been ownloae from Chalmers Publication Library (CPL). It is the author s version of a work

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

Optimal Oblivious Path Selection on the Mesh

Optimal Oblivious Path Selection on the Mesh Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract

More information

Inuence of Cross-Interferences on Blocked Loops: to know the precise gain brought by blocking. It is even dicult to determine for which problem

Inuence of Cross-Interferences on Blocked Loops: to know the precise gain brought by blocking. It is even dicult to determine for which problem Inuence of Cross-Interferences on Blocke Loops A Case Stuy with Matrix-Vector Multiply CHRISTINE FRICKER INRIA, France an OLIVIER TEMAM an WILLIAM JALBY University of Versailles, France State-of-the art

More information

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks Coorinating Distribute Algorithms for Feature Extraction Offloaing in Multi-Camera Visual Sensor Networks Emil Eriksson, György Dán, Viktoria Foor School of Electrical Engineering, KTH Royal Institute

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 0 0 0 0 0 0 0 0 on-uniform Sensor Deployment in Mobile Wireless Sensor etworks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University Boca Raton,

More information

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body International Engineering Mathematics Volume 04, Article ID 46593, 7 pages http://x.oi.org/0.55/04/46593 Research Article Invisci Uniform Shear Flow past a Smooth Concave Boy Abullah Mura Department of

More information

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stolyar Abstract Backpressure-base aaptive routing

More information

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao

More information

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,

More information

Kinematic Analysis of a Family of 3R Manipulators

Kinematic Analysis of a Family of 3R Manipulators Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,

More information

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach Nishi Sharma, Vanna Verma Abstract Wireless sensor networks (WSNs) is one of the emerging fiel of research in recent era

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

Performance Characterization of a Bluetooth Piconet with Multi Slot Packets

Performance Characterization of a Bluetooth Piconet with Multi Slot Packets Performance Characterization of a Bluetooth Piconet with Multi Slot Packets aniele Miorani Carlo Caimi Anrea anella To cite this version: aniele Miorani Carlo Caimi Anrea anella. Performance Characterization

More information

Characterizing Decoding Robustness under Parametric Channel Uncertainty

Characterizing Decoding Robustness under Parametric Channel Uncertainty Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric

More information

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance International Journal of Moern Communication Technologies & Research (IJMCTR) Impact of FTP Application file size an TCP Variants on MANET Protocols Performance Abelmuti Ahme Abbasher Ali, Dr.Amin Babkir

More information

6 Gradient Descent. 6.1 Functions

6 Gradient Descent. 6.1 Functions 6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stoylar arxiv:15.4984v1 [cs.ni] 27 May 21 Abstract

More information

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,

More information

ACE: And/Or-parallel Copying-based Execution of Logic Programs

ACE: And/Or-parallel Copying-based Execution of Logic Programs ACE: An/Or-parallel Copying-base Execution of Logic Programs Gopal GuptaJ Manuel Hermenegilo* Enrico PontelliJ an Vítor Santos Costa' Abstract In this paper we present a novel execution moel for parallel

More information

Optimal Link Capacity Dimensioning in Proportionally Fair Networks

Optimal Link Capacity Dimensioning in Proportionally Fair Networks Optimal Link Capacity Dimensioning in Proportionally Fair Networks Micha l Pióro 1,Gábor Malicskó 2, an Gábor Foor 3 1 Department of Communication Systems, Lun Institute of Technology, Sween, Michal.Pioro@telecom.lth.se

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter FDL sel. VOA SOA 100 Regular papers ONDM 2018 Scalable Deterministic Scheuling for WDM Slot Switching Xhaul with Zero-Jitter Bogan Uscumlic 1, Dominique Chiaroni 1, Brice Leclerc 1, Thierry Zami 2, Annie

More information

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle

More information

A Duality Based Approach for Realtime TV-L 1 Optical Flow

A Duality Based Approach for Realtime TV-L 1 Optical Flow A Duality Base Approach for Realtime TV-L 1 Optical Flow C. Zach 1, T. Pock 2, an H. Bischof 2 1 VRVis Research Center 2 Institute for Computer Graphics an Vision, TU Graz Abstract. Variational methos

More information

Congestion Control using Cross layer and Stochastic Approach in Distributed Networks

Congestion Control using Cross layer and Stochastic Approach in Distributed Networks Congestion Control using Cross layer an Stochastic Approach in Distribute Networks Selvarani R Department of Computer science an Engineering Alliance College of Engineering an Design Bangalore, Inia Vinoha

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

Fast Fractal Image Compression using PSO Based Optimization Techniques

Fast Fractal Image Compression using PSO Based Optimization Techniques Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting

More information

Modifying ROC Curves to Incorporate Predicted Probabilities

Modifying ROC Curves to Incorporate Predicted Probabilities Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,

More information

Image compression predicated on recurrent iterated function systems

Image compression predicated on recurrent iterated function systems 2n International Conference on Mathematics & Statistics 16-19 June, 2008, Athens, Greece Image compression preicate on recurrent iterate function systems Chol-Hui Yun *, Metzler W. a an Barski M. a * Faculty

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

Considering bounds for approximation of 2 M to 3 N

Considering bounds for approximation of 2 M to 3 N Consiering bouns for approximation of to (version. Abstract: Estimating bouns of best approximations of to is iscusse. In the first part I evelop a powerseries, which shoul give practicable limits for

More information

EXACT SIMULATION OF A BOOLEAN MODEL

EXACT SIMULATION OF A BOOLEAN MODEL Original Research Paper oi:10.5566/ias.v32.p101-105 EXACT SIMULATION OF A BOOLEAN MODEL CHRISTIAN LANTUÉJOULB MinesParisTech 35 rue Saint-Honoré 77305 Fontainebleau France e-mail: christian.lantuejoul@mines-paristech.fr

More information

Enabling Rollback Support in IT Change Management Systems

Enabling Rollback Support in IT Change Management Systems Enabling Rollback Support in IT Change Management Systems Guilherme Sperb Machao, Fábio Fabian Daitx, Weverton Luis a Costa Coreiro, Cristiano Bonato Both, Luciano Paschoal Gaspary, Lisanro Zambeneetti

More information

Investigation into a new incremental forming process using an adjustable punch set for the manufacture of a doubly curved sheet metal

Investigation into a new incremental forming process using an adjustable punch set for the manufacture of a doubly curved sheet metal 991 Investigation into a new incremental forming process using an ajustable punch set for the manufacture of a oubly curve sheet metal S J Yoon an D Y Yang* Department of Mechanical Engineering, Korea

More information

Optimizing the quality of scalable video streams on P2P Networks

Optimizing the quality of scalable video streams on P2P Networks Optimizing the quality of scalable vieo streams on PP Networks Paper #7 ASTRACT The volume of multimeia ata, incluing vieo, serve through Peer-to-Peer (PP) networks is growing rapily Unfortunately, high

More information

HOW DO SECURITY TECHNOLOGIES INTERACT WITH EACH OTHER TO CREATE VALUE? THE ANALYSIS OF FIREWALL AND INTRUSION DETECTION SYSTEM

HOW DO SECURITY TECHNOLOGIES INTERACT WITH EACH OTHER TO CREATE VALUE? THE ANALYSIS OF FIREWALL AND INTRUSION DETECTION SYSTEM HOW O SECURTY TECHNOLOGES NTERACT WTH EACH OTHER TO CREATE VALUE? THE ANALYSS O REWALL AN NTRUSON ETECTON SYSTEM Huseyin CAVUSOGLU Srinivasan RAGHUNATHAN Hasan CAVUSOGLU Tulane University University of

More information

The Journal of Systems and Software

The Journal of Systems and Software The Journal of Systems an Software 83 (010) 1864 187 Contents lists available at ScienceDirect The Journal of Systems an Software journal homepage: www.elsevier.com/locate/jss Embeing capacity raising

More information

Table-based division by small integer constants

Table-based division by small integer constants Table-base ivision by small integer constants Florent e Dinechin, Laurent-Stéphane Diier LIP, Université e Lyon (ENS-Lyon/CNRS/INRIA/UCBL) 46, allée Italie, 69364 Lyon Ceex 07 Florent.e.Dinechin@ens-lyon.fr

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

Handling missing values in kernel methods with application to microbiology data

Handling missing values in kernel methods with application to microbiology data an Machine Learning. Bruges (Belgium), 24-26 April 2013, i6oc.com publ., ISBN 978-2-87419-081-0. Available from http://www.i6oc.com/en/livre/?gcoi=28001100131010. Hanling missing values in kernel methos

More information

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis

More information

Bayesian localization microscopy reveals nanoscale podosome dynamics

Bayesian localization microscopy reveals nanoscale podosome dynamics Nature Methos Bayesian localization microscopy reveals nanoscale poosome ynamics Susan Cox, Ewar Rosten, James Monypenny, Tijana Jovanovic-Talisman, Dylan T Burnette, Jennifer Lippincott-Schwartz, Gareth

More information

2-connected graphs with small 2-connected dominating sets

2-connected graphs with small 2-connected dominating sets 2-connecte graphs with small 2-connecte ominating sets Yair Caro, Raphael Yuster 1 Department of Mathematics, University of Haifa at Oranim, Tivon 36006, Israel Abstract Let G be a 2-connecte graph. A

More information

TCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model

TCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model TCP Symbiosis: Congestion Control Mechanisms of TCP base on Lotka-Volterra Competition Moel Go Hasegawa Cybermeia Center Osaka University 1-3, Machikaneyama-cho, Toyonaka, Osaka 56-43, JAPAN Email: hasegawa@cmc.osaka-u.ac.jp

More information

Uninformed search methods

Uninformed search methods CS 1571 Introuction to AI Lecture 4 Uninforme search methos Milos Hauskrecht milos@cs.pitt.eu 539 Sennott Square Announcements Homework assignment 1 is out Due on Thursay, September 11, 014 before the

More information

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural

More information