REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips

Size: px
Start display at page:

Download "REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS. M. Meulpolder, D.H.J. Epema, H.J. Sips"

Transcription

1 REPLICATION IN BANDWIDTH-SYMMETRIC BITTORRENT NETWORKS M. Melpolder, D.H.J. Epema, H.J. Sips Parallel and Distribted Systems Grop Department of Compter Science, Delft University of Technology, the Netherlands ABSTRACT The poplar and well-known BitTorrent peer-to-peer protocol offers fast file distribtion in a highly scalable way. Several stdies have investigated the properties of this protocol, mostly focsing on heterogeneos end-ser environments sch as the Internet, with asymmetric connections. In this paper however, we focs on the sage of the BitTorrent protocol in homogeneos local environments with symmetric bandwidth properties. Compared with a traditional client-server setp, the se of BitTorrent in sch settings can offer hge benefits in performance and scalability, allowing bandwidth sharing and high speed file distribtion. We aim to improve the performance of sch networks with a novel mechanism for replication sing so-called replicators, which replicate a sbset of the files in the system. A mathematical model of the reslting Replicated BitTorrent is presented and validated by emlation. Frthermore, we present simlation reslts that provide insight in the performance of Replicated BitTorrent networks with dynamic peer arrivals and departres. The reslts show that Replicated BitTorrent significantly improves download times in local bandwidth-symmetric BitTorrent networks. 1. INTRODUCTION Over the last few years, the BitTorrent [1] protocol has become widely sed and has grown into a topic of increasing interest in the research commnity. Among the present day peer-to-peer (P2P) protocols, BitTorrent is clearly the most poplar, especially for file sharing over the Internet. The most important reasons for its poplarity are its otstanding scalability characteristics, as well as its tit-for-tat mechanism [2] which ensres that while downloading a file, sers are atomatically sharing parts of the file with others. Recently, varios papers have been pblished [, 4, 5] which contain theoretical models, simlations, and measrements considering the BitTorrent protocol, its performance, and its sage patterns. Up ntil now, however, the focs regarding the application of BitTorrent and the research into its properties have been centered arond file sharing by heterogeneos end-sers on the Internet. A very important consideration in sch environments is the often asymmetric natre of Internet connections sch as ADSL. Since the BitTorrent protocol is based on the mtal exchange of file pieces by crrent downloaders, as well as on a certain amont of altrism by finished downloaders, the asymmetry in download and pload speeds of end-ser connections is an important assmption in the analysis of the performance and scalability of the protocol. Frthermore, the behavior of peers in a general file sharing context is very hard to predict. This paper is based on a different kind of environment for the application of BitTorrent: local environments with symmetric end-ser connections. Important examples are corporate and academic LANs, in which P2P techniqes have hardly been applied so far. Yet, in sch environments BitTorrent cold prove to be the ideal protocol for rapid local file distribtion in a highly scalable way. De to the BitTorrent protocol, sers who are downloading the same file at the same time gain a hge profit from each other. As presented in [6], the reslting download times are almost constant with respect to the nmber of downloaders. Even thogh there are no tailored implementations of BitTorrent for this context yet, many interesting possibilities can be imagined, sch as high-qality mltimedia services which se BitTorrent in the backgrond for the actal content distribtion. In or work, we consider local environments in which a collection of files is available for all sers in the network. In the case of a psh model, where a centralized athority decides at a specific point in time to distribte specific files, network-level mlticasting techniqes cold be applied. However, we focs on a pll model, where sers can decide when to download and what to download ot of the collection. A practical example is a niversity camps, where edcational materials

2 and mltimedia files have to be available for all stdents. Crrently, the common approach is to make all files available at a (collection of) central server(s), from where they can be downloaded sing the FTP or HTTP protocol. Instead, we consider the se of the BitTorrent protocol for sch transfers, in sch a way that both the server(s) and the end-ser machines transparently act as peers in the reslting peer-to-peer network. As or main contribtion, we present, analyze, and simlate a novel replication mechanism which highly improves the performance and scalability of sch bandwidth-symmetric BitTorrent networks: Replicated BitTorrent. We introdce the concept of replicators, which are special peers that replicate a sbset of the files in the system, thereby increasing system performance. A model is devised in order to analyze the inflence of these replicators, and is validated by emlation sing real BitTorrent clients. Frthermore, we provide insight in the performance of Replicated Bit- Torrent in networks with dynamic arrivals and departres of peers. We have simlated Replicated BitTorrent networks with both homogeneos and Zipf-distribted file poplarities. We have assessed varios network configrations in order to compare client-server, BitTorrent, and Replicated BitTorrent performance. The reslts show that replicators significantly increase the performance, leading to download speeds that are many times higher than those in a reglar BitTorrent system. 2. REPLICATED BITTORRENT In this section, we present or replication mechanism for bandwidth-symmetric BitTorrent networks. It has to be noted that throghot the rest of this paper, we make se of standard BitTorrent [1] terminology that can be fond in many other pblications on the sbject. We will briefly introdce the relevant concepts of BitTorrent to those not yet familiar with the sbject: in BitTorrent a file is divided into chnks, which are then bartered between peers that are interested in the file; a leecher is a peer who is in the process of downloading a file bt has not yet finished; a seeder is a peer in possession of the whole file and sharing it with the network; a swarm associated with a file is the collection of peers leeching or seeding that file. Peers discover other peers in the network by reqesting IP addresses from the tracker, the only central component in a BitTorrent network. The tracker keeps track of the seeders and leechers of each file. As mentioned in the introdction, we consider local BitTorrent environments in which a collection of files has to be available for all sers in the network. Some of the peers, the sorces, provide a central point for injecting content and ensre that at least one copy of every file is file A replicator file B sorces file C replicator Figre 1: Example of a simple Replicated BitTorrent system with a few sorces, three active swarms associated with three different files, and two replicators which seed varios files. available. We now distingish three types of seeders: (1) the sorces, that seed all files and are assmed to be always online, (2) the peers that have finished a download and remain online for a certain amont of time, and () replicators. A replicator is a peer that is manally added to the network, and that is seeding a sbset of the files that are available in the system. In Figre 1, an example of a simple Replicated BitTorrent system with replicators is displayed. At the BitTorrent level of a particlar file swarm, a replicator is not different from a general BitTorrent seeder. However, we focs on the system as a whole and seek to inflence the nmber of seeds of particlar files, in sch a way that the reslting download speeds in the system are as high as possible. The mechanism of replicators is designed to inflence which files are seeded by which nmber of seeders based on the file poplarity in the system, withot changing the BitTorrent protocol itself. In a small network, replicators can be sed to redce the load of the network as a whole. In a larger network, consisting of different segments with possibly different file poplarity characteristics, replicators can be placed in the different segments to specifically redce the load of the each segment in an optimal way. The contents of the replicators depend on the poplarity of files in the system or network segment. In or crrent implementation, replicators are notified of the file reqests in the system by the tracker, which is extended to provide this fnctionality (the overhead as compared to reglar tracker fnctionality is very small). Based on these file reqests replicators monitor the file poplarity and decide which files to seed according to their replication policy. We evalate different file poplarity distribtions with varying reqest arrival rates and different replication policies.

3 . ANALYSIS In this section we present a model to analyze the performance of Replicated BitTorrent in a given system with known swarm properties. We validate the model by emlation sing real BitTorrent clients..1. Model We consider a Replicated BitTorrent system with a fixed nmber of sorces and a fixed nmber of replicators. Each of the sorces seeds all of the files available in the system. Each of the replicators seeds a sbset of the available files. In the model, different replicators can seed different sbsets of files, thogh the nmber of files seeded is constant over all replicators. In Section.4, we discss the restricted case in which all of the replicators seed the same files. We introdce the following notation: F The set of files seeded by the sorces. F The size of F. S The nmber of sorces. N f The nmber of peers downloading file f. M f The nmber of finished peers still seeding f. R The nmber of replicators. Q The nmber of files seeded by each replicator (Q F ). c s The pload bandwidth of the sorces. c r The pload bandwidth of the replicators. c The pload/download bandwidth of reglar peers. β f The fraction of replicators seeding file f. We assme that a peer is downloading at most one file at a time so that its fll download bandwidth is available for each single download. Frthermore, we do not take bartering overhead into accont, that is, we assme that the bandwidth sed for bartering flly reslts in effective download bandwidth. Since we assme that each sorce seeds the same files, we can withot loss of generality assme that there is only one sorce (S = 1)..2. Scalability of the nmber of leechers We will show that in the case of bandwidth symmetry, the effective download bandwidth of a leecher is independent of the nmber of leechers in a swarm. Theorem 1 Let in a bandwidth-symmetric BitTorrent swarm of a file f the total available bandwidth of all seeders be. Sppose that the leechers of this file are not seeding or leeching any other files. Then the fol seeders Figre 2: Illstration of the proof of Theorem 1 for a swarm with leechers. lowing holds for the download speed d of any leecher: d = min{, c}. Theorem 1 makes sense intitively, since all bandwidth that is received by a leecher can be made available to other leechers. The proof is stated below. An illstration of the proof is displayed in Figre 2. Proof of Theorem 1 Sppose that the nmber of leechers in a particlar swarm is n, and that every leecher obtains a download speed of /n from the seeders. We assme first that c. Since there are only (n 1) leechers to barter with, not more than a bandwidth of (n 1)(/n) can be sed effectively for bartering with the other leechers. The maximm download speed then becomes d = n + (n 1) n =. When we do not take bartering overhead into accont, and when all peers have at least one chnk to share, we can assme this maximm is reached. It follows that when a total speed of c is obtained from the seeders, the download speed of a leecher is maximal. Hence, > c will always lead to an effective download speed of c... Analysis of the download speed In crrent BitTorrent implementations, the pload bandwidth of a peer is evenly shared among all files that it seeds or leeches. Since this also holds for the sorces, each sorce provides a bandwidth of c s /F to each swarm in the system. With S = 1, it follows from Theorem 1 that any leecher of any file obtains an effective download speed from the sorce of d = min{ c s /F, c }. The total available amont of bandwidth to a swarm of a specific file f consists of three contribtions. First

4 of all, the swarm receives its share of bandwidth from the sorce, which is c s /F. Secondly, there are M f peers that have finished downloading and are now seeding file f. Finally, there is the bandwidth contribtion from the replicators. For a file f, there are β f R replicators that are seeding f, each of which divides its bandwidth over the Q files that it is seeding. Becase of Theorem 1, each of the leechers in the swarm will obtain an effective download speed that eqals the total available bandwidth of all seeders. Hence, the effective download speed d f of a leecher in the swarm of file f is d f = min{ c s F + M f c + β f R c r, c }. (1) Q..1. Optimal nmber of replicators Since the download bandwidth of the downloading peers is bonded by c, the increase in bandwidth de to the replicators is maximized when ( β f R (1 M f )c c ) s Q. (2) F c r If the nmber of replicators is sch that given a certain β f, the reslting download bandwidth for file f is maximized, we call the replicator configration optimal for f. If the configration is optimal for all f, we call the configration optimal. We define the optimal nmber of replicators R opt as the minimm integer vale of R sch that Eq. (2) holds for all f with β f >...2. Speedp of a swarm We calclate the speedp s f of a leecher of file f as the fraction d f /(d f R= ). According to Eq. (1) this reslts in s f = min{ 1 + β f RF c r Q(c s + F M f c),... Speedp of the system F c }. () c s + F M f c If we want to consider the system as a whole, we have to take into accont all leechers in all swarms. The average speedp ŝ over all leechers in the system is then f F ŝ = N f s f f F N. (4) f.4. Special case In order to provide more insight into the practical implications of the model, we consider the special case in which all of the following assmptions hold: (1) all peers in the system have the same speeds (c s = c r = c); (2) finished downloaders immediately leave the system, which implies that M f = for all f; () the replicator configration is homogeneos, i.e., all replicators seed the same files. A file f is therefore seeded by all or by none of the replicators. Hence, for every f it holds that either β f = 1 or β f =. Let N be the total nmber of downloaders for all files. For the homogeneos configration, we define the replication fraction α Q/F as the fraction of the available files that is seeded by the replicators. Eq. (4) is now redced to ŝ = N {f:β f =1} { R } N f min α, F 1 (5) According to Eq. (2), the speedp in this case is maximal if R R opt = α(f 1)..5. Model validation In the previos sections we have analyzed the download speed in a single swarm of file f, and the speedp of the system achieved with the replicators. In order to validate the model, we have performed emlations of real swarms sing real BitTorrent clients. We have bilt a swarm emlator for this prpose, which is based on the simlator sed in [7]. The emlator creates an artificial BitTorrent swarm and initiates a BitTorrent download. We have emlated swarms with varios nmbers of replicators. In every emlation there is a single sorce (S = 1) that seeds 8 files (F = 8), and all speeds are homogeneos (c = c r = c s = 5 MB/s). Finished peers do not remain in the system (M f = for all f). We se only one leecher in every emlation, since the download speed in a swarm is independent of the nmber of leechers. The emlation reslts for different swarms are combined to determine the system speedp for α = 1/8, 1/4, 1/2 and 1, each with a varying nmber of replicators. The reslting vales are compared with the vales predicted by Eq. (5). In Figre, the system speedp is plotted, as well as the speed of leechers that reside in a swarm with replicators. The corresponding vales along with the theoretical predictions are displayed in Table 1. It can be observed in the table that the vales for the speedp reslting from the emlations are very close to the vales predicted by the model. It is reasonable to expect a small bartering overhead, as well as an error margin in the emlations. Note that when R R opt, the emlation vales remain practically constant, as predicted by the model.

5 Speedp alpha = 1/8 alpha = 2/8 alpha = 4/8 alpha = 1 System speedp nmber of replicators Speed (MB/s) Speeds in swarm with replicators alpha = 1/8 alpha = 2/8 alpha = 4/8 alpha = nmber of replicators Figre : The system speedp (left) and the download speed of leechers in a swarm with replicators (right) for varios vales of the replication fraction α. α 1/8 1/4 1/2 1 R sim model sim model sim model sim model Table 1: The system speedp with varying nmbers of replicators. The cases where the replicator configration is (theoretically) optimal are printed in boldface. 4. EVALUATION The validated model as presented in the previos section offers an accrate way to determine the speeds in a system where the specific swarm properties for every file f are known. We now want to provide insight in the behavior of a realistic system in which swarms and download speeds dynamically change de to arriving and departing peers. We have performed simlations of varios configrations of bandwidth-symmetric networks, both with and withot replicators. In this section we describe the simlation setp and we present the simlation reslts Simlation setp We have simlated a bandwidth-symmetric BitTorrent network with one sorce (S = 1) that has F = 4 files available. There are 1 replicators (R = 1) that seed a fraction α = 1/4 of these files. The replicators are homogeneos: each replicator seeds the same set of files. Given these parameters, the nmber of replicators is optimal (R = R opt ). All files have a size of 5 MB and all pload and download bandwidths in the system are set to 5 MB/s. In the system, peers reqesting a file arrive according to a Poisson process with arrival rate λ. We have performed simlations for vales of λ between 1 and 48 arrivals/hor. In each of the simlations we have measred the download time of a file as soon as a steady state was reached, i.e., a state in which the available download speed for the file no longer changed over time. Each incoming reqest is associated with a specific file according to a given file poplarity distribtion. We have simlated two different file poplarity scenarios: a homogeneos file poplarity where every file has an eqal probability of being reqested, and a Zipf-distribted file poplarity. In both cases, the file poplarity does not change over time. In the homogeneos case, the replicators seed the same set of 1 arbitrary files. In the Zipfdistribted case, we have evalated the system with varios replication policies. We have assessed five different network configrations: (1) A client-server network (CS); (2) A BitTorrent network withot replication where all peers leave immediately after finishing their download (BT); () A Replicated BitTorrent network where

6 Steady-state download time (homogeneos poplarity) Steady-state download time (zipf poplarity) Download time (s) CS BT RBT BT-15 RBT-15 Download time (s) CS BT RBT BT-15 RBT Reqest arrival rate (per hor) (a) Reqest arrival rate (per hor) (b) Figre 4: The download times in different bandwidth-symmetric BitTorrent networks with (a) homogeneos file poplarity, and (b) Zipf-distribted file poplarity. 5 4 no replication replicate most poplar files replicate medim poplar files replicate least poplar files 4 5 Download time (s) 2 System speedp Reqest arrival rate (per hor) % 1% 2% % 4% 5% 6% 7% 8% 9% 1% Replication fraction Figre 5: Comparison of different replication policies nder a Zipf-distribted poplarity distribtion. all peers leave immediately as well (RBT); (4) A BitTorrent network with 15 mintes seeding of each finished peer (BT-15); (5) A Replicated BitTorrent network with 15 mintes seeding of each finished peer (RBT-15) Reslts In Figre 4, the steady state download times are displayed for the two poplarity distribtions and the varios network configrations. In these reslts, the replication policy is sch that the 1 most poplar files are seeded by the replicators. It can be observed that the client-server download time stays low ntil the arrival rate reaches a certain threshold, after which it explodes. This is to be expected since if reqests arrive with a higher rate than the rate with which they can be finished by the server, the download speed drops to zero. The plain BitTorrent con- Figre 6: Inflence of the replication fraction on the speedp of a system with 1 replicators and a Zipf distribted file poplarity with 24 reqests per hor. The replicator policy is to seed the most poplar files. figration shows a far better scaling behavior in which the download time converges to 4 seconds. This again is intitive since with a high enogh arrival rate, swarms will be active for each of the 4 files continosly and the bandwidth of the sorce will be divided eqally over these swarms. With a reslting bandwidth of 5/4 MB/s, a download of 5 MB natrally takes 4 seconds. For both file poplarity distribtions, the configrations with replicators perform mch better than the other configrations. The most significant speedp is obtained in the Zipf case with immediate leave of finished peers, where replication leads to download times that are close to 25% of those in a network withot replication. If finished downloaders are seeding as well, download times are still only 5% of the times withot replication. In the

7 homogeneos case, the trends sggest that in a configration where finished downloaders remain in the system, the effect of replication will eventally diminish. This is intitive since replicators are seeders, and if the nmber of other seeders in the system grows, the relative contribtion of the replicators becomes less significant. Figre 4 (a) shows a decreasing download time when finished peers remain seeding, since the total contribtion in bandwidth of finished peers natrally grows with the arrival rate of new peers. In Figre 5, the download speeds for three different replication policies are displayed for a Zipf distribted file poplarity scenario with no seeding of finished peers: (1) replicating the most poplar files; (2) replicating medim poplar files; () replicating the least poplar files. As can be expected, replicating the most poplar files yields the best reslts. The swarms of more poplar files are bigger and therefore the speed with which these swarms are served benefits larger nmbers of peers. This policy performs far better than the others while there seems hardly a difference between replicating a set of medim poplar files or the set of least poplar files. This can be explained by the natre of the long tailed Zipf distribtion where the difference in poplarity between the most poplar files and medim poplar files will be far greater than the difference in poplarity between medim poplar files and the least poplar files. In Figre 6, the inflence of the replication fraction on the system speedp is displayed for a system with 1 replicators, a Zipf distribted file poplarity, and 24 reqest arrivals per hor. It is important to observe that when the replication fraction is larger than 5%, the 1 replicators case a speedp that exceeds 11, the vale that wold be expected at first sight. This can be explained by the fact that all reglar BitTorrent clients divide their bandwidth eqally over all files that they are seeding (instead of over all peers that are downloading from them). As a reslt, the bandwidth available for the most poplar swarm is eqal to the bandwidth available to the least poplar swarm. With 1 replicators, more swarms will obtain a maximm download speed which will case a more efficient overall BitTorrent distribtion. Overall, it is clear from the reslts that replication highly increases the performance of bandwidthsymmetric BitTorrent networks, both with homogeneos and Zipf-distribted file poplarity. 5. DISCUSSION In or model and experiments, we have taken varios assmptions of the network environment and file poplarity conditions. We will discss the most important assmptions and their implications in a more general way here Bandwidth homogeneity It is assmed throghot the model that all peers have bandwidth symmetry, and that this bandwidth is homogeneos throghot the system. Even thogh bandwidth symmetry is realistic for most LANs, there might in reality be bandwidth bottlenecks in the network. First of all, different segments of the network might be connected by backbones that form a bottleneck. Secondly, organizations might be spread over mltiple bildings or locations, connected via the Internet. In these sitations, the scalability of Theorem 1 will be limited by pper bonds depending on the location of the varios peers in a swarm. When a specific network strctre is known, the model can be adapted to this network by incorporating scalability limitations in the eqations. It follows natrally that as long as the pper bonds are not reached by the sorces and the downloaders, the download speeds can be increased by sing replicators Replicator contents Since we have analyzed the replicators in a general context, we have assmed homogeneos replicators which all seed the same files. In a real system however, it might be highly advantageos to allow different replicators to replicate different files. Especially when replicators have different locations in the network, replicators can be dedicated to replicate files that are poplar in specific network segments. Sch systems are hard to analyze a-priori withot knowing the details of the context, since many complex assmptions wold have to be made abot the network strctre, the poplarity of different files within different network segments, and the location of replicators throghot the system. However, when the environment and conditions are known in detail, or general model can first be applied separately to each segment of the network, after which the reslting sb-models can be joined in a more complex, system-wide model. Simlations can then be performed in order to determine optimal placement and policies of the replicators. 6. RELATED WORK As mentioned in the introdction, most papers on BitTorrent focs on heterogeneos end-sers sharing files on the Internet. A notable exception is the work presented in [6] and [8], where BitTorrent-based data distribtion on LAN-based desktop grids is stdied. The athors

8 show by experiments that BitTorrent clearly otperforms FTP for the dissemination of large files over a LAN, and present an enhancement of the protocol that improves the performance for small file distribtion as well. However, replication mechanisms sch as the one we present in this paper are not considered. Replication and caching have been widely researched in a variety of contexts. In the context of P2P however, research ntil now has focsed on (earlier) P2P protocols that are based on searching an instance of a reqested file and directly transferring it from a particlar location. In [9], the effect of the nmber of replicas on search performance in nstrctred P2P networks is investigated. This work is contined in [1] and [11], where it is arged that a proportional replication scheme minimizes the download time, the workload, and the sed network bandwidth. The athors frthermore show that near-proportional replication can be obtained by sing an LRU cache replacement policy. In [12], varios replication strategies are compared as well and a sqare-root replication strategy is presented, which is arged to be better than both niform and proportional replication. In [1] and [14], the effect of varios replication strategies on file availability and reliability is stdied. 7. CONCLUSIONS In this paper, we have presented a novel mechanism for replication in bandwidth-symmetric BitTorrent networks: Replicated BitTorrent. The concept of replicators is presented, which are peers that are added to a BitTorrent network, and that atomatically replicate a sbset of the files that are available in the system, thereby increasing the download speeds of downloaders in the system. We have presented and validated a mathematical model of Replicated BitTorrent which allows s to compte the download speeds and assess the benefit of replicators. Frthermore, we have simlated Replicated BitTorrent in a dynamic setting where download speeds and swarm properties change de to arriving and departing peers. The simlation reslts clearly demonstrate the significant speedp of Replicated BitTorrent over reglar BitTorrent. References [1] BitTorrent. [2] B. Cohen. Incentives bild robstness in bittorrent. In Workshop on Economics of Peer-to-Peer Systems, Berkeley, USA, May 2. [] D. Qi and R. Srikant. Modeling and performance analysis of bittorrent-like peer-to-peer networks. In Proc. of ACM SIGCOMM 24, Portland, Oregon, USA, Agst 24. [4] J.A. Powelse, P. Garbacki, D.H.J. Epema, and H.J. Sips. The bittorrent p2p file-sharing system: Measrements and analysis. In Proc. of the 4th Int l Workshop on Peer-to-Peer Systems (IPTPS 5), Febrary 25. [5] A.R. Bharambe, C. Herley, and V.N. Padmanabhan. Analyzing and improving a bittorrent network s performance mechanisms. In Proc. of IEEE Infocom 26, Barcelona, Spain, April 26. [6] B. Wei, G. Fedak, and F. Cappello. Collaborative data distribtion with bittorrent for comptational desktop grids. In Proc. of the The 4th International Symposim on Parallel and Distribted Compting (ISPDC 5), pages , Washington, DC, USA, 25. IEEE Compter Society. [7] P. Garbacki, A. Iosp, D. Epema, and M. van Steen. 2Fast: Collaborative downloads in p2p networks. In Proc. of the 6th IEEE International Conference on Peer-to-Peer Compting, Cambridge, September 26. [8] B. Wei, G. Fedak, and F. Cappello. Schedling independent tasks sharing large data distribted with bittorrent. In Grid Compting Workshop, pages IEEE Compter Society, 25. [9] S. Tewari and L. Kleinrock. Analysis of search and replication in nstrctred peer-to-peer networks. In Proc. of ACM SIGMETRICS 25, 25. [1] S. Tewari and L. Kleinrock. On fairness, optimal download performance and proportional replication in peer-to-peer networks. In Proc. of IFIP Networking 25, pages , 25. [11] S. Tewari and L. Kleinrock. Proportional replication in peer-to-peer networks. In Proc. of IEEE INFO- COM 26, 26. [12] E. Cohen and S. Shenker. Replication strategies in nstrctred peer-to-peer networks. In Proc. SIG- COMM 2, Pittsbrgh, USA, Agst 22. [1] G. On, J. Schmitt, and R. Steinmetz. The effectiveness of realistic replication strategies on qality of availability for peer-to-peer systems. In Proc. of the rd International Conference on Peer-to-Peer Compting (P2P ), 2. [14] R. Bhagwan, D. Moore, S. Savage, and G. Voelker. Replication strategies for highly available peer-topeer storage. In Proc. of FDiCo: Ftre directions in Distribted Compting, 22.

Evaluating Influence Diagrams

Evaluating Influence Diagrams Evalating Inflence Diagrams Where we ve been and where we re going Mark Crowley Department of Compter Science University of British Colmbia crowley@cs.bc.ca Agst 31, 2004 Abstract In this paper we will

More information

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing

On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing 1 On the Comptational Complexity and Effectiveness of N-hb Shortest-Path Roting Reven Cohen Gabi Nakibli Dept. of Compter Sciences Technion Israel Abstract In this paper we stdy the comptational complexity

More information

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast

An Adaptive Strategy for Maximizing Throughput in MAC layer Wireless Multicast University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering May 24 An Adaptive Strategy for Maximizing Throghpt in MAC layer Wireless Mlticast Prasanna

More information

Topic Continuity for Web Document Categorization and Ranking

Topic Continuity for Web Document Categorization and Ranking Topic Continity for Web ocment Categorization and Ranking B. L. Narayan, C. A. Mrthy and Sankar. Pal Machine Intelligence Unit, Indian Statistical Institte, 03, B. T. Road, olkata - 70008, India. E-mail:

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY On the Analysis of the Bluetooth Time Division Duplex Mechanism IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 5, MAY 2007 1 On the Analysis of the Bletooth Time Division Dplex Mechanism Gil Zssman Member, IEEE, Adrian Segall Fellow, IEEE, and Uri Yechiali

More information

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications

Pipelined van Emde Boas Tree: Algorithms, Analysis, and Applications This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 007 proceedings Pipelined van Emde Boas Tree: Algorithms, Analysis,

More information

Isilon InsightIQ. Version 2.5. User Guide

Isilon InsightIQ. Version 2.5. User Guide Isilon InsightIQ Version 2.5 User Gide Pblished March, 2014 Copyright 2010-2014 EMC Corporation. All rights reserved. EMC believes the information in this pblication is accrate as of its pblication date.

More information

Constructing and Comparing User Mobility Profiles for Location-based Services

Constructing and Comparing User Mobility Profiles for Location-based Services Constrcting and Comparing User Mobility Profiles for Location-based Services Xihi Chen Interdisciplinary Centre for Secrity, Reliability and Trst, University of Lxemborg Jn Pang Compter Science and Commnications,

More information

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks

A Hybrid Weight-Based Clustering Algorithm for Wireless Sensor Networks Open Access Library Jornal A Hybrid Weight-Based Clstering Algorithm for Wireless Sensor Networks Cheikh Sidy Mohamed Cisse, Cheikh Sarr * Faclty of Science and Technology, University of Thies, Thies,

More information

StaCo: Stackelberg-based Coverage Approach in Robotic Swarms

StaCo: Stackelberg-based Coverage Approach in Robotic Swarms Maastricht University Department of Knowledge Engineering Technical Report No.:... : Stackelberg-based Coverage Approach in Robotic Swarms Kateřina Staňková, Bijan Ranjbar-Sahraei, Gerhard Weiss, Karl

More information

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment

The Impact of Avatar Mobility on Distributed Server Assignment for Delivering Mobile Immersive Communication Environment This fll text paper was peer reviewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the ICC 27 proceedings. The Impact of Avatar Mobility on Distribted Server Assignment

More information

Networks An introduction to microcomputer networking concepts

Networks An introduction to microcomputer networking concepts Behavior Research Methods& Instrmentation 1978, Vol 10 (4),522-526 Networks An introdction to microcompter networking concepts RALPH WALLACE and RICHARD N. JOHNSON GA TX, Chicago, Illinois60648 and JAMES

More information

Tdb: A Source-level Debugger for Dynamically Translated Programs

Tdb: A Source-level Debugger for Dynamically Translated Programs Tdb: A Sorce-level Debgger for Dynamically Translated Programs Naveen Kmar, Brce R. Childers, and Mary Lo Soffa Department of Compter Science University of Pittsbrgh Pittsbrgh, Pennsylvania 15260 {naveen,

More information

Real-time mean-shift based tracker for thermal vision systems

Real-time mean-shift based tracker for thermal vision systems 9 th International Conference on Qantitative InfraRed Thermography Jly -5, 008, Krakow - Poland Real-time mean-shift based tracker for thermal vision systems G. Bieszczad* T. Sosnowski** * Military University

More information

Uncertainty Determination for Dimensional Measurements with Computed Tomography

Uncertainty Determination for Dimensional Measurements with Computed Tomography Uncertainty Determination for Dimensional Measrements with Compted Tomography Kim Kiekens 1,, Tan Ye 1,, Frank Welkenhyzen, Jean-Pierre Krth, Wim Dewlf 1, 1 Grop T even University College, KU even Association

More information

Master for Co-Simulation Using FMI

Master for Co-Simulation Using FMI Master for Co-Simlation Using FMI Jens Bastian Christoph Claß Ssann Wolf Peter Schneider Franhofer Institte for Integrated Circits IIS / Design Atomation Division EAS Zenerstraße 38, 69 Dresden, Germany

More information

Sensor-Based Fast Thermal Evaluation Model For Energy Efficient High-Performance Datacenters

Sensor-Based Fast Thermal Evaluation Model For Energy Efficient High-Performance Datacenters Sensor-ased Fast Thermal valation Model For nergy fficient High-Performance atacenters Qinghi Tang Tridib Mkherjee, Sandeep K. S. Gpta Phil ayton ept. of lectrical ng. ept. of ompter Science and ng. Intel

More information

CS224W Final Report. 1 Introduction. 3 Data Collection and Visualization. 2 Prior Work. Cyprien de Lichy, Renke Pan, Zheng Wu.

CS224W Final Report. 1 Introduction. 3 Data Collection and Visualization. 2 Prior Work. Cyprien de Lichy, Renke Pan, Zheng Wu. CS224W Final Report Cyprien de Lichy, Renke Pan, Zheng W 1 Introdction December 9, 2015 Recommender systems are information filtering systems that provide sers with personalized sggestions for prodcts

More information

What s New in AppSense Management Suite Version 7.0?

What s New in AppSense Management Suite Version 7.0? What s New in AMS V7.0 What s New in AppSense Management Site Version 7.0? AppSense Management Site Version 7.0 is the latest version of the AppSense prodct range and comprises three prodct components,

More information

Date: December 5, 1999 Dist'n: T1E1.4

Date: December 5, 1999 Dist'n: T1E1.4 12/4/99 1 T1E14/99-559 Project: T1E14: VDSL Title: Vectored VDSL (99-559) Contact: J Cioffi, G Ginis, W Y Dept of EE, Stanford U, Stanford, CA 945 Cioffi@stanforded, 1-65-723-215, F: 1-65-724-3652 Date:

More information

Alliances and Bisection Width for Planar Graphs

Alliances and Bisection Width for Planar Graphs Alliances and Bisection Width for Planar Graphs Martin Olsen 1 and Morten Revsbæk 1 AU Herning Aarhs University, Denmark. martino@hih.a.dk MADAGO, Department of Compter Science Aarhs University, Denmark.

More information

Maximum Weight Independent Sets in an Infinite Plane

Maximum Weight Independent Sets in an Infinite Plane Maximm Weight Independent Sets in an Infinite Plane Jarno Nosiainen, Jorma Virtamo, Pasi Lassila jarno.nosiainen@tkk.fi, jorma.virtamo@tkk.fi, pasi.lassila@tkk.fi Department of Commnications and Networking

More information

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods

Discrete Cost Multicommodity Network Optimization Problems and Exact Solution Methods Annals of Operations Research 106, 19 46, 2001 2002 Klwer Academic Pblishers. Manfactred in The Netherlands. Discrete Cost Mlticommodity Network Optimization Problems and Exact Soltion Methods MICHEL MINOUX

More information

Subgraph Matching with Set Similarity in a Large Graph Database

Subgraph Matching with Set Similarity in a Large Graph Database 1 Sbgraph Matching with Set Similarity in a Large Graph Database Liang Hong, Lei Zo, Xiang Lian, Philip S. Y Abstract In real-world graphs sch as social networks, Semantic Web and biological networks,

More information

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration

Bias of Higher Order Predictive Interpolation for Sub-pixel Registration Bias of Higher Order Predictive Interpolation for Sb-pixel Registration Donald G Bailey Institte of Information Sciences and Technology Massey University Palmerston North, New Zealand D.G.Bailey@massey.ac.nz

More information

Computer-Aided Mechanical Design Using Configuration Spaces

Computer-Aided Mechanical Design Using Configuration Spaces Compter-Aided Mechanical Design Using Configration Spaces Leo Joskowicz Institte of Compter Science The Hebrew University Jersalem 91904, Israel E-mail: josko@cs.hji.ac.il Elisha Sacks (corresponding athor)

More information

Minimal Edge Addition for Network Controllability

Minimal Edge Addition for Network Controllability This article has been accepted for pblication in a ftre isse of this jornal, bt has not been flly edited. Content may change prior to final pblication. Citation information: DOI 10.1109/TCNS.2018.2814841,

More information

The Disciplined Flood Protocol in Sensor Networks

The Disciplined Flood Protocol in Sensor Networks The Disciplined Flood Protocol in Sensor Networks Yong-ri Choi and Mohamed G. Goda Department of Compter Sciences The University of Texas at Astin, U.S.A. fyrchoi, godag@cs.texas.ed Hssein M. Abdel-Wahab

More information

EMC ViPR. User Guide. Version

EMC ViPR. User Guide. Version EMC ViPR Version 1.1.0 User Gide 302-000-481 01 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is accrate

More information

Chapter 7 TOPOLOGY CONTROL

Chapter 7 TOPOLOGY CONTROL Chapter TOPOLOGY CONTROL Oeriew Topology Control Gabriel Graph et al. XTC Interference SINR & Schedling Complexity Distribted Compting Grop Mobile Compting Winter 00 / 00 Distribted Compting Grop MOBILE

More information

Detecting Collective Attention Spam

Detecting Collective Attention Spam Detecting Collective Attention Spam Kymin Lee, James Caverlee, Krishna Y. Kamath, Zhiyan Cheng Department of Compter Science and Engineering Texas A&M University College Station, TX 77843 {kymin, caverlee,

More information

Optimal Sampling in Compressed Sensing

Optimal Sampling in Compressed Sensing Optimal Sampling in Compressed Sensing Joyita Dtta Introdction Compressed sensing allows s to recover objects reasonably well from highly ndersampled data, in spite of violating the Nyqist criterion. In

More information

A personalized search using a semantic distance measure in a graph-based ranking model

A personalized search using a semantic distance measure in a graph-based ranking model Article A personalized search sing a semantic distance measre in a graph-based ranking model Jornal of Information Science XX (X) pp. 1-23 The Athor(s) 2011 Reprints and Permissions: sagepb.co.k/jornalspermissions.nav

More information

ASSESSMENT OF DIGITAL IMAGE CORRELATION PERFORMANCES

ASSESSMENT OF DIGITAL IMAGE CORRELATION PERFORMANCES ASSESSMENT OF DIGITAL IMAGE CORRELATION PERFORMANCES Workgrop Metrology of CNRS research network 2519 a MCIMS, Presented by Larent Robert and Jean-José Orte b a http://www.ifma.fr/lami/gdr2519/ b CROMeP,

More information

Abstract 1 Introduction

Abstract 1 Introduction Combining Relevance Information in a Synchronos Collaborative Information Retrieval Environment Colm Foley, Alan F. Smeaton and Gareth J. F. Jones Centre for Digital Video Processing and Adaptive Information

More information

Millimeter-Wave Multi-Hop Wireless Backhauling for 5G Cellular Networks

Millimeter-Wave Multi-Hop Wireless Backhauling for 5G Cellular Networks 2017 IEEE 85th Vehiclar Technology Conference (VTC-Spring) Millimeter-Wave Mlti-Hop Wireless Backhaling for 5G Celllar Networks B. P. S. Sahoo, Chn-Han Yao, and Hng-Y Wei Gradate Institte of Electrical

More information

Appearance Based Tracking with Background Subtraction

Appearance Based Tracking with Background Subtraction The 8th International Conference on Compter Science & Edcation (ICCSE 213) April 26-28, 213. Colombo, Sri Lanka SD1.4 Appearance Based Tracking with Backgrond Sbtraction Dileepa Joseph Jayamanne Electronic

More information

Hardware-Accelerated Free-Form Deformation

Hardware-Accelerated Free-Form Deformation Hardware-Accelerated Free-Form Deformation Clint Cha and Ulrich Nemann Compter Science Department Integrated Media Systems Center University of Sothern California Abstract Hardware-acceleration for geometric

More information

A choice relation framework for supporting category-partition test case generation

A choice relation framework for supporting category-partition test case generation Title A choice relation framework for spporting category-partition test case generation Athor(s) Chen, TY; Poon, PL; Tse, TH Citation Ieee Transactions On Software Engineering, 2003, v. 29 n. 7, p. 577-593

More information

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems

Requirements Engineering. Objectives. System requirements. Types of requirements. FAQS about requirements. Requirements problems Reqirements Engineering Objectives An introdction to reqirements Gerald Kotonya and Ian Sommerville To introdce the notion of system reqirements and the reqirements process. To explain how reqirements

More information

IoT-Cloud Service Optimization in Next Generation Smart Environments

IoT-Cloud Service Optimization in Next Generation Smart Environments 1 IoT-Clod Service Optimization in Next Generation Smart Environments Marc Barcelo, Alejandro Correa, Jaime Llorca, Antonia M. Tlino, Jose Lopez Vicario, Antoni Morell Universidad Atonoma de Barcelona,

More information

Enhanced Performance with Pipelining

Enhanced Performance with Pipelining Chapter 6 Enhanced Performance with Pipelining Note: The slides being presented represent a mi. Some are created by ark Franklin, Washington University in St. Lois, Dept. of CSE. any are taken from the

More information

QoS-driven Runtime Adaptation of Service Oriented Architectures

QoS-driven Runtime Adaptation of Service Oriented Architectures Qo-driven Rntime Adaptation of ervice Oriented Architectres Valeria ardellini 1 Emiliano asalicchio 1 Vincenzo Grassi 1 Francesco Lo Presti 1 Raffaela Mirandola 2 1 Dipartimento di Informatica, istemi

More information

arxiv: v3 [math.co] 7 Sep 2018

arxiv: v3 [math.co] 7 Sep 2018 Cts in matchings of 3-connected cbic graphs Kolja Knaer Petr Valicov arxiv:1712.06143v3 [math.co] 7 Sep 2018 September 10, 2018 Abstract We discss conjectres on Hamiltonicity in cbic graphs (Tait, Barnette,

More information

Data/Metadata Data and Data Transformations

Data/Metadata Data and Data Transformations A Framework for Classifying Scientic Metadata Helena Galhardas, Eric Simon and Anthony Tomasic INRIA Domaine de Volcea - Rocqencort 7853 Le Chesnay France email: First-Name.Last-Name@inria.fr Abstract

More information

Image Compression Compression Fundamentals

Image Compression Compression Fundamentals Compression Fndamentals Data compression refers to the process of redcing the amont of data reqired to represent given qantity of information. Note that data and information are not the same. Data refers

More information

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003

Pavlin and Daniel D. Corkill. Department of Computer and Information Science University of Massachusetts Amherst, Massachusetts 01003 From: AAAI-84 Proceedings. Copyright 1984, AAAI (www.aaai.org). All rights reserved. SELECTIVE ABSTRACTION OF AI SYSTEM ACTIVITY Jasmina Pavlin and Daniel D. Corkill Department of Compter and Information

More information

Cautionary Aspects of Cross Layer Design: Context, Architecture and Interactions

Cautionary Aspects of Cross Layer Design: Context, Architecture and Interactions Cationary Aspects of Cross Layer Design: Context, Architectre and Interactions Vikas Kawadia and P. R. Kmar Dept. of Electrical and Compter Engineering, and Coordinated Science Lab University of Illinois,

More information

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks

Cost Based Local Forwarding Transmission Schemes for Two-hop Cellular Networks Cost Based Local Forwarding Transmission Schemes for Two-hop Celllar Networks Zhenggang Zhao, Xming Fang, Yan Long, Xiaopeng H, Ye Zhao Key Lab of Information Coding & Transmission Sothwest Jiaotong University,

More information

Towards Understanding Bilevel Multi-objective Optimization with Deterministic Lower Level Decisions

Towards Understanding Bilevel Multi-objective Optimization with Deterministic Lower Level Decisions Towards Understanding Bilevel Mlti-objective Optimization with Deterministic Lower Level Decisions Ankr Sinha Ankr.Sinha@aalto.fi Department of Information and Service Economy, Aalto University School

More information

Statistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem

Statistical Methods in functional MRI. Standard Analysis. Data Processing Pipeline. Multiple Comparisons Problem. Multiple Comparisons Problem Statistical Methods in fnctional MRI Lectre 7: Mltiple Comparisons 04/3/13 Martin Lindqist Department of Biostatistics Johns Hopkins University Data Processing Pipeline Standard Analysis Data Acqisition

More information

A Recovery Algorithm for Reliable Multicasting in Reliable Networks

A Recovery Algorithm for Reliable Multicasting in Reliable Networks A Recovery Algorithm for Reliable Mlticasting in Reliable Networks Danyang Zhang Sibabrata Ray Dept. of Compter Science University of Alabama Tscaloosa, AL 35487 {dzhang, sib}@cs.a.ed Ragopal Kannan S.

More information

Constructing Multiple Light Multicast Trees in WDM Optical Networks

Constructing Multiple Light Multicast Trees in WDM Optical Networks Constrcting Mltiple Light Mlticast Trees in WDM Optical Networks Weifa Liang Department of Compter Science Astralian National University Canberra ACT 0200 Astralia wliang@csaneda Abstract Mlticast roting

More information

Multiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET

Multiple-Choice Test Chapter Golden Section Search Method Optimization COMPLETE SOLUTION SET Mltiple-Choice Test Chapter 09.0 Golden Section Search Method Optimization COMPLETE SOLUTION SET. Which o the ollowing statements is incorrect regarding the Eqal Interval Search and Golden Section Search

More information

Comparison of memory write policies for NoC based Multicore Cache Coherent Systems

Comparison of memory write policies for NoC based Multicore Cache Coherent Systems Comparison of memory write policies for NoC based Mlticore Cache Coherent Systems Pierre Gironnet de Massas, Frederic Petrot System-Level Synthesis Grop TIMA Laboratory 46, Av Felix Viallet, 38031 Grenoble,

More information

Efficient and Accurate Delaunay Triangulation Protocols under Churn

Efficient and Accurate Delaunay Triangulation Protocols under Churn Efficient and Accrate Delanay Trianglation Protocols nder Chrn Dong-Yong Lee and Simon S. Lam Department of Compter Sciences The University of Texas at Astin {dylee, lam}@cs.texas.ed November 9, 2007 Technical

More information

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation

Maximal Cliques in Unit Disk Graphs: Polynomial Approximation Maximal Cliqes in Unit Disk Graphs: Polynomial Approximation Rajarshi Gpta, Jean Walrand, Oliier Goldschmidt 2 Department of Electrical Engineering and Compter Science Uniersity of California, Berkeley,

More information

FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES

FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES FINITE ELEMENT APPROXIMATION OF CONVECTION DIFFUSION PROBLEMS USING GRADED MESHES RICARDO G. DURÁN AND ARIEL L. LOMBARDI Abstract. We consider the nmerical approximation of a model convection-diffsion

More information

Neighbourhood Searches for the Bounded Diameter Minimum Spanning Tree Problem Embedded in a VNS, EA, and ACO

Neighbourhood Searches for the Bounded Diameter Minimum Spanning Tree Problem Embedded in a VNS, EA, and ACO Neighborhood Searches for the Bonded Diameter Minimm Spanning Tree Problem Embedded in a VNS, EA, and ACO Martin Grber Institte for Compter Graphics and Algorithms, Vienna University of Technology, Favoritenstraße

More information

The LS-STAG Method : A new Immersed Boundary / Level-Set Method for the Computation of Incompressible Viscous Flows in Complex Geometries

The LS-STAG Method : A new Immersed Boundary / Level-Set Method for the Computation of Incompressible Viscous Flows in Complex Geometries The LS-STAG Method : A new Immersed Bondary / Level-Set Method for the Comptation of Incompressible Viscos Flows in Complex Geometries Yoann Cheny & Olivier Botella Nancy Universités LEMTA - UMR 7563 (CNRS-INPL-UHP)

More information

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING

IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING IN GRID COMPUTING International Jornal of Modern Engineering Research (IJMER) www.imer.com Vol.1, Isse1, pp-134-139 ISSN: 2249-6645 IMPLEMENTATION OF OBJECT ORIENTED APPROACH TO MODIFIED ANT ALGORITHM FOR TASK SCHEDULING

More information

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT

PARAMETER OPTIMIZATION FOR TAKAGI-SUGENO FUZZY MODELS LESSONS LEARNT PAAMETE OPTIMIZATION FO TAKAGI-SUGENO FUZZY MODELS LESSONS LEANT Manfred Männle Inst. for Compter Design and Falt Tolerance Univ. of Karlsrhe, 768 Karlsrhe, Germany maennle@compter.org Brokat Technologies

More information

Computer User s Guide 4.0

Computer User s Guide 4.0 Compter User s Gide 4.0 2001 Glenn A. Miller, All rights reserved 2 The SASSI Compter User s Gide 4.0 Table of Contents Chapter 1 Introdction...3 Chapter 2 Installation and Start Up...5 System Reqirements

More information

Resolving Linkage Anomalies in Extracted Software System Models

Resolving Linkage Anomalies in Extracted Software System Models Resolving Linkage Anomalies in Extracted Software System Models Jingwei W and Richard C. Holt School of Compter Science University of Waterloo Waterloo, Canada j25w, holt @plg.waterloo.ca Abstract Program

More information

NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS

NETWORK PRESERVATION THROUGH A TOPOLOGY CONTROL ALGORITHM FOR WIRELESS MESH NETWORKS ETWORK PRESERVATIO THROUGH A TOPOLOGY COTROL ALGORITHM FOR WIRELESS MESH ETWORKS F. O. Aron, T. O. Olwal, A. Krien, Y. Hamam Tshwane University of Technology, Pretoria, Soth Africa. Dept of the French

More information

Blended Deformable Models

Blended Deformable Models Blended Deformable Models (In IEEE Trans. Pattern Analysis and Machine Intelligence, April 996, 8:4, pp. 443-448) Doglas DeCarlo and Dimitri Metaxas Department of Compter & Information Science University

More information

Constrained Routing Between Non-Visible Vertices

Constrained Routing Between Non-Visible Vertices Constrained Roting Between Non-Visible Vertices Prosenjit Bose 1, Matias Korman 2, André van Renssen 3,4, and Sander Verdonschot 1 1 School of Compter Science, Carleton University, Ottawa, Canada. jit@scs.carleton.ca,

More information

CS 153 Design of Operating Systems Spring 18

CS 153 Design of Operating Systems Spring 18 CS 53 Design of Operating Systems Spring 8 Lectre 2: Virtal Memory Instrctor: Chengy Song Slide contribtions from Nael Ab-Ghazaleh, Harsha Madhyvasta and Zhiyn Qian Recap: cache Well-written programs exhibit

More information

arxiv: v1 [cs.si] 12 Dec 2016

arxiv: v1 [cs.si] 12 Dec 2016 Connection Discovery sing Shared Images by Gassian Relational Topic Model Xiaopeng Li, Ming Cheng, James She HKUST-NIE Social Media Lab, Hong Kong University of Science & Technology, Hong Kong xlibo@connect.st.hk,

More information

Availability Analysis of Application Servers Using Software Rejuvenation and Virtualization

Availability Analysis of Application Servers Using Software Rejuvenation and Virtualization Thein T, Park J S. Availability analysis of application servers sing software rejvenation and virtalization. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 24(2): 339 346 Mar. 2009 Availability Analysis of

More information

DIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES

DIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES DIRECT AND PROGRESSIVE RECONSTRUCTION OF DUAL PHOTOGRAPHY IMAGES Binh-Son Ha 1 Imari Sato 2 Kok-Lim Low 1 1 National University of Singapore 2 National Institte of Informatics, Tokyo, Japan ABSTRACT Dal

More information

A sufficient condition for spiral cone beam long object imaging via backprojection

A sufficient condition for spiral cone beam long object imaging via backprojection A sfficient condition for spiral cone beam long object imaging via backprojection K. C. Tam Siemens Corporate Research, Inc., Princeton, NJ, USA Abstract The response of a point object in cone beam spiral

More information

IP Multicast Fault Recovery in PIM over OSPF

IP Multicast Fault Recovery in PIM over OSPF 1 IP Mlticast Falt Recovery in PIM over OSPF Abstract Relatively little attention has been given to nderstanding the falt recovery characteristics and performance tning of native IP mlticast networks.

More information

Multi-lingual Multi-media Information Retrieval System

Multi-lingual Multi-media Information Retrieval System Mlti-lingal Mlti-media Information Retrieval System Shoji Mizobchi, Sankon Lee, Fmihiko Kawano, Tsyoshi Kobayashi, Takahiro Komats Gradate School of Engineering, University of Tokshima 2-1 Minamijosanjima,

More information

Cohesive Subgraph Mining on Attributed Graph

Cohesive Subgraph Mining on Attributed Graph Cohesive Sbgraph Mining on Attribted Graph Fan Zhang, Ying Zhang, L Qin, Wenjie Zhang, Xemin Lin QCIS, University of Technology, Sydney, University of New Soth Wales fanzhang.cs@gmail.com, {Ying.Zhang,

More information

EMC AppSync. User Guide. Version REV 01

EMC AppSync. User Guide. Version REV 01 EMC AppSync Version 1.5.0 User Gide 300-999-948 REV 01 Copyright 2012-2013 EMC Corporation. All rights reserved. Pblished in USA. EMC believes the information in this pblication is accrate as of its pblication

More information

Discretized Approximations for POMDP with Average Cost

Discretized Approximations for POMDP with Average Cost Discretized Approximations for POMDP with Average Cost Hizhen Y Lab for Information and Decisions EECS Dept., MIT Cambridge, MA 0239 Dimitri P. Bertsekas Lab for Information and Decisions EECS Dept., MIT

More information

h-vectors of PS ear-decomposable graphs

h-vectors of PS ear-decomposable graphs h-vectors of PS ear-decomposable graphs Nima Imani 2, Lee Johnson 1, Mckenzie Keeling-Garcia 1, Steven Klee 1 and Casey Pinckney 1 1 Seattle University Department of Mathematics, 901 12th Avene, Seattle,

More information

Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN:

Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: Inteligencia Artificial. Revista Iberoamericana de Inteligencia Artificial ISSN: 1137-3601 revista@aepia.org Asociación Española para la Inteligencia Artificial España Zaballos, Lis J.; Henning, Gabriela

More information

Collision Avoidance and Resolution Multiple Access: First-Success Protocols

Collision Avoidance and Resolution Multiple Access: First-Success Protocols Collision Avoidance and Resoltion Mltiple Access: First-Sccess Protocols Rodrigo Garcés and J.J. Garcia-Lna-Aceves askin Center for Compter Engineering and Information Sciences University of California

More information

History Slicing: Assisting Code-Evolution Tasks

History Slicing: Assisting Code-Evolution Tasks History Slicing: Assisting Code-Evoltion Tasks Francisco Servant Department of Informatics University of California, Irvine Irvine, CA, U.S.A. 92697-3440 fservant@ics.ci.ed James A. Jones Department of

More information

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems

Congestion-adaptive Data Collection with Accuracy Guarantee in Cyber-Physical Systems Congestion-adaptive Data Collection with Accracy Garantee in Cyber-Physical Systems Nematollah Iri, Lei Y, Haiying Shen, Gregori Calfield Department of Electrical and Compter Engineering, Clemson University,

More information

Faster Random Walks By Rewiring Online Social Networks On-The-Fly

Faster Random Walks By Rewiring Online Social Networks On-The-Fly 1 Faster Random Walks By Rewiring Online ocial Networks On-The-Fly Zhojie Zho 1, Nan Zhang 2, Zhigo Gong 3, Gatam Das 4 1,2 Compter cience Department, George Washington Uniersity 1 rexzho@gw.ed 2 nzhang10@gw.ed

More information

Illumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY

Illumina LIMS. Software Guide. For Research Use Only. Not for use in diagnostic procedures. Document # June 2017 ILLUMINA PROPRIETARY Illmina LIMS Software Gide Jne 2017 ILLUMINA PROPRIETARY This docment and its contents are proprietary to Illmina, Inc. and its affiliates ("Illmina"), and are intended solely for the contractal se of

More information

POWER-OF-2 BOUNDARIES

POWER-OF-2 BOUNDARIES Warren.3.fm Page 5 Monday, Jne 17, 5:6 PM CHAPTER 3 POWER-OF- BOUNDARIES 3 1 Ronding Up/Down to a Mltiple of a Known Power of Ronding an nsigned integer down to, for eample, the net smaller mltiple of

More information

EMPOWERING SCIENTIFIC DISCOVERY BY DISTRIBUTED DATA MINING ON A GRID INFRASTRUCTURE

EMPOWERING SCIENTIFIC DISCOVERY BY DISTRIBUTED DATA MINING ON A GRID INFRASTRUCTURE EMPOWERING SCIENTIFIC DISCOVERY BY DISTRIBUTED DATA MINING ON A GRID INFRASTRUCTURE A PROPOSAL FOR DOCTORAL RESEARCH by Haimonti Dtta SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE

More information

COMPOSITION OF STABLE SET POLYHEDRA

COMPOSITION OF STABLE SET POLYHEDRA COMPOSITION OF STABLE SET POLYHEDRA Benjamin McClosky and Illya V. Hicks Department of Comptational and Applied Mathematics Rice University November 30, 2007 Abstract Barahona and Mahjob fond a defining

More information

Content Content Introduction

Content Content Introduction Content Content Introdction...................................................................... 3 Roles in the provisioning process............................................................... 4 Server

More information

ABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS

ABSOLUTE DEFORMATION PROFILE MEASUREMENT IN TUNNELS USING RELATIVE CONVERGENCE MEASUREMENTS Proceedings th FIG Symposim on Deformation Measrements Santorini Greece 00. ABSOUTE DEFORMATION PROFIE MEASUREMENT IN TUNNES USING REATIVE CONVERGENCE MEASUREMENTS Mahdi Moosai and Saeid Khazaei Mining

More information

A GENERIC MODEL OF A BASE-ISOLATED BUILDING

A GENERIC MODEL OF A BASE-ISOLATED BUILDING Chapter 5 A GENERIC MODEL OF A BASE-ISOLATED BUILDING This chapter draws together the work o Chapters 3 and 4 and describes the assembly o a generic model o a base-isolated bilding. The irst section describes

More information

STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWORK DYNAMICS FOR STATIC OPTIMIZATION

STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWORK DYNAMICS FOR STATIC OPTIMIZATION STABILITY OF SIMULTANEOUS RECURRENT NEURAL NETWOR DYNAMICS FOR STATIC OPTIMIZATION Grsel Serpen and Yifeng X Electrical Engineering and Compter Science Department, The University of Toledo, Toledo, OH

More information

Lecture 10. Diffraction. incident

Lecture 10. Diffraction. incident 1 Introdction Lectre 1 Diffraction It is qite often the case that no line-of-sight path exists between a cell phone and a basestation. In other words there are no basestations that the cstomer can see

More information

Nash Convergence of Gradient Dynamics in General-Sum Games. Michael Kearns.

Nash Convergence of Gradient Dynamics in General-Sum Games. Michael Kearns. Convergence of Gradient Dynamics in General-Sm Games Satinder Singh AT&T Labs Florham Park, NJ 7932 bavejaresearch.att.com Michael Kearns AT&T Labs Florham Park, NJ 7932 mkearnsresearch.att.com Yishay

More information

Pipelining. Chapter 4

Pipelining. Chapter 4 Pipelining Chapter 4 ake processor rns faster Pipelining is an implementation techniqe in which mltiple instrctions are overlapped in eection Key of making processor fast Pipelining Single cycle path we

More information

Tu P7 15 First-arrival Traveltime Tomography with Modified Total Variation Regularization

Tu P7 15 First-arrival Traveltime Tomography with Modified Total Variation Regularization T P7 15 First-arrival Traveltime Tomography with Modified Total Variation Reglarization W. Jiang* (University of Science and Technology of China) & J. Zhang (University of Science and Technology of China)

More information

This chapter is based on the following sources, which are all recommended reading:

This chapter is based on the following sources, which are all recommended reading: Bioinformatics I, WS 09-10, D. Hson, December 7, 2009 105 6 Fast String Matching This chapter is based on the following sorces, which are all recommended reading: 1. An earlier version of this chapter

More information

Fault Tolerance in Hypercubes

Fault Tolerance in Hypercubes Falt Tolerance in Hypercbes Shobana Balakrishnan, Füsn Özgüner, and Baback A. Izadi Department of Electrical Engineering, The Ohio State University, Colmbs, OH 40, USA Abstract: This paper describes different

More information

arxiv: v1 [cs.cg] 27 Nov 2015

arxiv: v1 [cs.cg] 27 Nov 2015 On Visibility Representations of Non-planar Graphs Therese Biedl 1, Giseppe Liotta 2, Fabrizio Montecchiani 2 David R. Cheriton School of Compter Science, University of Waterloo, Canada biedl@waterloo.ca

More information

OCIS codes: ( ) Microscopy; ( ) Partial coherence in imaging; ( ) Image reconstruction techniques

OCIS codes: ( ) Microscopy; ( ) Partial coherence in imaging; ( ) Image reconstruction techniques Sparsity based sb-wavelength imaging with partially incoherent light via qadratic compressed sensing Yoav Shechtman 1, Yonina C. Eldar, Alexander Szameit 1 and Mordechai Segev 1 1 Physics Department and

More information

Measurement Based Intelligent Prefetch and Cache Technique in Web

Measurement Based Intelligent Prefetch and Cache Technique in Web Measrement ased Intellient Prefetch and Cache Techniqe in Web Zhen Zhao, Jie Yan, Son Wan, Gan Zhan, Yantai Sh Department of Compter Science, Tianin University, Tianin 30007, P.R.China Tel.: +86--7404394,

More information