Automated Planning for Open Network Architectures
|
|
- Patrick Pearson
- 6 years ago
- Views:
Transcription
1 UNIVERSITY OF CALIFORNIA Los Angeles Automated Planning for Open Network Architectures A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Computer Science by Alexey Rudenko 2002
2 The dissertation of Alexey Rudenko is approved. Gerald J. Popek D. Stott Parker Milos Ercegovac Greg J. Pottie Wesley W. Chu, Committee Co-chair Peter Reiher, Committee Co-chair University of California, Los Angeles 2002 ii
3 my mother Larisa my father Oliver and my sister Marina iii
4 Table of Contents Abstract. xvi 1. Introduction Motivation Deployment of new protocols Heterogeneous networks User application requirements Service for legacy applications Open Network Architectures Active networks Adaptation of data stream Planning for Active Networks Implementation of the Planner Road Map to the Dissertation Background on Active Networks Active Network Concept Architecture of Active Network Node Panda as an Active Network Middleware Panda Node Architecture Problems of Active Networks iv
5 3. Planning Alternatives The Requirements to Planning Temporal factor Consistency of adaptations Ordering of adapters User preferences as an element of planning Efficiency of the plan Extensibility of the system Resource management for planning Other problems Complexity of Planning Problem Physical model Observation on planning problem Estimation of the space of solutions NP-completeness Inefficiency of exhaustive search Naïve Planning Template Planning Heuristic Search Routing Around Network Resources Planning Automated Planning Incremental planning v
6 3.7.2 Central planning Distributed planning Where to run central planning Reuse of earlier computed plans Approach to planning for multicast communication Adapter Design Classes of adapters Adapters with flexible/rigid architecture Two-lever hierarchy of an access to adapters Summary Planning Protocol Requirements to the Planning Protocol Planning Protocol Design Where to Run the Plan Calculation Implementation of Planning Protocol in Panda User Preferences, Data Stream Characteristics, and Planning Data Planning Data Collection Calculation of a Plan Deployment of a Plan Incremental Planning Protocol Elements of Resource Management Assumptions on resource management. 67 vi
7 Detailed description of the resource management implementation Periodic decommissioning of inactive connections Replanning User Access to Resources Security in ONA Planning Classification of ONA planning insecurities Security of incremental planning protocol Untrustworthy ONA node for central planning protocol Secure central planning procedure Secure central planning protocol Poor quality and malicious design of adapters Security measures on adapter requests Electronic signatures with public key and key distribution Summary Planning Algorithm Heuristic Search Adapter selection in two-level adaptation database Adapter description data Adapter ordering Plan optimization Resources and temporal constraints Example of a Plan Calculation vii
8 5.2.1 Peer-to-peer communication session Adapter selection Adapter ordering Plan optimization Using Unary Model for the Plan Calculation Algorithm Summary The Measuremenst of Performance Performance of Heuristic Search-based Planning Costs of Incremental versus Central Planning Planning Process Test The testbed The latency of packet delivery and adaptation Planning procedure latency with the Connector application and null adapters Planning procedure latency with real life applications and adaptations Quality of service improvement The discussion on performance Related work ONA Implementations for ONA-aware Applications ONA Implementation for ONA-unaware Applications AI Planning Planning for ONA. 184 viii
9 8. Future work Change of Adapters Planning fails because no feasible or consistent plan found Connections failure Planning for Multicast Connection ONA Resource Management Secure Planning Protocol Alternative Path Planning Other Communication/Distributed Systems that will Benefit from Automated Planning Conclusion Contributions The Discussion. 195 Appendices 202 References. 218 ix
10 List of Figures 2.1 Active network node A Panda-enabled node Two-fold and four-fold data compression A unicast connection Estimation of solution space Peer-to-peer connection as a bunch of alternative plans Alternative plans for three-node connection Examples of naïve solutions Efficiency of planning Multicast tree planning Planning procedure Panda planning procedure Resource redistribution among sessions Add flow Reject flow Preemption flow Replanning of flow if another connection must be added Replan flow if extra resource are released Replanning if the network conditions changed Incremental planning procedure.. 82 x
11 4.11 The example of the exemption of an intermediate node(s) in planning data collection via tête-a-tête protocol Central planning procedure with UNC service UNC node does not approve a node as a trustworthy node The chain of signatures Selection of adapters, ordering of adapters, and location of adapters run sequentially Building a local plan The example of exhaustive search with evaluation The prototype partial order library plan for adapter ordering Resolution of a conflict between preconditions and postconditions Plan merging failures Peer-to peer communication through nodes A, B, C, D Adapting partial order plan for link AB Local plan for link AB Local plan for link BC and CD The chain of local plans on node A, B, C, and D ABC plan after merging AB and BC plans ABCD plan after merging ABC and CD plans Heuristic to exhaustive search time cost ration Heuristic search performance by adapters Heuristic search performance by nodes xi
12 6.4 Incremental versus central planning time cost Incremental versus central planning efficiency Panda peer-to-peer connection Packet delivery latency Adaptation latency Packet loss Throughput of Panda associated with packet size Sample of the distribution of packet latency on packet numbers Deployment without preloaded adapters Deployment with preloaded adapters Latency of the deployment protocol without adaptations Incremental planning and deployment latency Incremental versus central planning latency The number of packets sent under incremental plan before central plan is calculated and deployed The latency of pre-planning process Planning procedure latency for the Connector and WaveVideo applications Plan calculation latency for the Connector and WaveVideo applications Deployment latency for the Connector and WaveVideo applications Planning procedure latency on Dell Inspirons Plan calculation latency on Dell Inspirons Deployment latency on Dell Inspirons xii
13 6.25 Incremental planning latency on Dell Inspirons Incremental and central planning procedure (Resolution Drop only) on Dell Inspirons connection The number of packet sent under the incremental plan before the central plan is calculated and deployed Central replanning process on Dell Inspirons The comparison of adaptation latencies on Dell Inspirons and Hewlett Packard machines connections The planning procedure latency on Dell Inspirons and HPs The plan calculation latency on Dell Inspirons and HPs Deployment latency on Dell Inspirons and HPs The planning procedure latency on HPs Plan calculation latency on HPs Deployment latency on HPs Incremental planning latency for Resolution Drop for HPs Incremental planning latency for Resolution Drop and Encryption for HPs The number of packets sent under the incremental plan before the central plan was calculated and deployed Replanning procedure latency on HPs The plan calculation latency for Rat and VideoWave applications PSNR (luminance) on Dell Inspirons for 150 Kbps links PSNR (Cb) on Dell Inspirons connection for 150 Kbps 167 xiii
14 6.43 PSNR (luminace) on Dell Inspirons for 5000 Kbps PSNR (Cb) on Dell Inspirons for 5000 Kbps PSNR (luminace) on HPs for 150 Kbps PSNR (Cb) on HPs for 150 Kbps PSNR (luminace) on HPs for 5000 Kbps PSNR (Cb) on HPs for 5000 Kbps PSNR (luminance) on HPs The advantage of central planning over incremental planning PSNR (luminance) for incremental and central plans xiv
15 Acknowledgements This research would have not been possible without the expert guidance of my advisors, Dr. Peter Reiher and Dr. Gerald J. Popek. I also thank Dr. D. Stott Parker, Dr. Milos Ercegovac, Dr. Richard Muntz, Dr. Wesley Chu, and Dr. Greg J. Pottie for serving on my dissertation committee. I am also grateful for all the support provided by Dr. Richard Korf and Dr. Elias Koutsoupias and the members of LASR research group, especially Dr. Mark Yarvis, Vincent Ferreria, Scott Michel, Kevin Justice, and Li Jun. Generous financial support was provided by DARPA research contract N C I would also like to thank Janice Wheeler for helping me improve my writing style and for the careful proofreading of my papers and this dissertation. Of the many who encourage me, I especially want to thank Verra Morgan, Roberta Nelson, my mother Larisa, my father Oliver, my grandmother Anna, my sister Marina, and my friends. xv
16 Abstract of the Dissertation Automated Planning for Open Network Architectures by Alexey Rudenko Doctor of Philosophy University of California, Los Angeles, 2002 Professor Peter Reiher, Co-chair Professor Wesley W. Chu, Co-chair Open Network Architectures (ONA) is a relatively new technology for computer systems that allows dynamic deployment of services. The Internet is an obvious area that would benefit from fast deployment of protocols that can appropriately modify or reroute user data streams. ONA systems are meant to use the fast-growing computational resources of modern computer systems to lessen the load on the resources of network communication channels with their often-limited capacity. The balance between communication channels and execution resources depends on user application requirements and network conditions at the moment of the communication. Complex network conditions, in conjunction with temporal constraints, make the automatic choice of necessary measures for improving communications a highly desirable capability. Automatic planning of ONA services should be an important function of ONA. We propose an approach to the design of a planner for ONA. The approach is focused on the overwhelming number of problems of adaptation planning, such as feasibility and efficiency of a plan, extensibility and composability of adaptations, and temporal limits. The planner automatically calculates properly ordered sequences of xvi
17 adaptations that modify user data. The purpose of these modifications is to increase throughput, reliability, and safety of communication channels. The goal of the planner design is to be able to formulate a plan for real-time applications that are very sensitive to the latency of the handshaking phase of the connection. It uses the heuristic search for a plan calculation. The planner is targeted for use by ONA nodes. The actual implementation of this planner was done in Panda, active network middleware that serves adaptation-unaware applications. The latency of the planning algorithm is below 160 milliseconds for realistic cases, which is magnitudes faster than the exhaustive search. The planner was used to calculate plans equally as good as the heuristic search in at least 99% of tested cases. The resulting planning system can be used for adaptation planning in open network architectures, active networks, remote code invocation systems, etc. This dissertation describes the design, implementation, and performance of the ONA planner. xvii
FORMULATION AND BENEFIT ANALYSIS OF OPTIMIZATION MODELS FOR NETWORK RECOVERY DESIGN
FORMULATION AND BENEFIT ANALYSIS OF OPTIMIZATION MODELS FOR NETWORK RECOVERY DESIGN Approved by: Dr. Richard Barr Dr. Eli Olinick Dr. Marion Sobol Dr. Jerrell Stracener Dr. Stephen A. Szygenda FORMULATION
More informationALGORITHMIC ASPECTS OF DOMINATION AND ITS VARIATIONS ARTI PANDEY
ALGORITHMIC ASPECTS OF DOMINATION AND ITS VARIATIONS ARTI PANDEY DEPARTMENT OF MATHEMATICS INDIAN INSTITUTE OF TECHNOLOGY DELHI JUNE 2016 c Indian Institute of Technology Delhi (IITD), New Delhi, 2016.
More informationINTRODUCTION Background of the Problem Statement of the Problem Objectives of the Study Significance of the Study...
vii TABLE OF CONTENTS CHAPTER TITLE PAGE DECLARATION... ii DEDICATION... iii ACKNOWLEDGEMENTS... iv ABSTRACT... v ABSTRAK... vi TABLE OF CONTENTS... vii LIST OF TABLES... xii LIST OF FIGURES... xiii LIST
More informationCITY UNIVERSITY OF NEW YORK. Creating a New Project in IRBNet. i. After logging in, click Create New Project on left side of the page.
CITY UNIVERSITY OF NEW YORK Creating a New Project in IRBNet i. After logging in, click Create New Project on left side of the page. ii. Enter the title of the project, the principle investigator s (PI)
More informationPanda: Providing the Benefits of Active Network to Legacy Applications
Panda: Providing the Benefits of Active Network to Legacy Applications Abstract Kevin Eustice, Vincent Ferrerio, Richard Guy, V. Ramakrishna, Alexey Rudenko, and Peter Reiher 1. Introduction The continuing
More informationReport: A Comparison of Synchrophasor Protocols
J. Ritchie Carroll Grid Protection Alliance Report: A Comparison of Synchrophasor Protocols NASPI Fall Meeting Philadelphia, PA October 24, 2018 Abstract Paper compares three protocols used for continuous
More informationQ3. Where can I register DuitNow ID? Login to Bank Islam Internet Banking. Go to Settings > DuitNow ID and click on Add button. Refer to image below.
Q1. What is DuitNow? DuitNow is a new real-time online fund transfer service that allows consumers and business owners to transfer money using an ID called DuitNow ID instead of having to exchange bank
More informationContent distribution networks over shared infrastructure : a paradigm for future content network deployment
University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2005 Content distribution networks over shared infrastructure :
More informationCITY UNIVERSITY OF NEW YORK. i. Visit:
CITY UNIVERSITY OF NEW YORK I. ACCESSING IRB NET (New Registration) i. Visit: https://www.irbnet.org/release/index.html ii. New users: Click on New Registration in the top right corner iii. Fill-out the
More informationThe Automatic Design of Batch Processing Systems
The Automatic Design of Batch Processing Systems by Barry Dwyer, M.A., D.A.E., Grad.Dip. A thesis submitted for the degree of Doctor of Philosophy in the Department of Computer Science University of Adelaide
More informationBusiness Intelligence Roadmap HDT923 Three Days
Three Days Prerequisites Students should have experience with any relational database management system as well as experience with data warehouses and star schemas. It would be helpful if students are
More informationContents The Definition of a Fieldbus An Introduction to Industrial Systems Communications.
Contents Page List of Tables. List of Figures. List of Symbols. Dedication. Acknowledgment. Abstract. x xi xv xxi xxi xxii Chapter 1 Introduction to FieldBuses Systems. 1 1.1. The Definition of a Fieldbus.
More informationOn the Near-Optimality of List Scheduling Heuristics for Local and Global Instruction Scheduling
On the Near-Optimality of List Scheduling Heuristics for Local and Global Instruction Scheduling by John Michael Chase A thesis presented to the University of Waterloo in fulfillment of the thesis requirement
More informationTABLE OF CONTENTS CHAPTER TITLE PAGE
vii TABLE OF CONTENTS CHAPTER TITLE PAGE DECLARATION ACKNOWLEDGMENT ABSTRACT ABSTRAK TABLE OF CONTENTS LIST OF TABLES LIST OF FIGURES LIST OF APPENDICES ii iv v vi vii xiii xiv xvi 1 OVERVIEW 1 1.1 Introducation
More informationINTRUSION DETECTION AND CORRELATION. Challenges and Solutions
INTRUSION DETECTION AND CORRELATION Challenges and Solutions Advances in Information Security Sushil Jajodia Consulting editor Center for Secure Information Systems George Mason University Fairfax, VA
More informationAn Ontological Framework for Contextualising Information in Hypermedia Systems.
An Ontological Framework for Contextualising Information in Hypermedia Systems. by Andrew James Bucknell Thesis submitted for the degree of Doctor of Philosophy University of Technology, Sydney 2008 CERTIFICATE
More informationA Frequent Max Substring Technique for. Thai Text Indexing. School of Information Technology. Todsanai Chumwatana
School of Information Technology A Frequent Max Substring Technique for Thai Text Indexing Todsanai Chumwatana This thesis is presented for the Degree of Doctor of Philosophy of Murdoch University May
More informationThe Discovery and Retrieval of Temporal Rules in Interval Sequence Data
The Discovery and Retrieval of Temporal Rules in Interval Sequence Data by Edi Winarko, B.Sc., M.Sc. School of Informatics and Engineering, Faculty of Science and Engineering March 19, 2007 A thesis presented
More informationBuilding Self-configuring Services Using Service-specific Knowledge
Building Self-configuring Services Using Service-specific Knowledge An-Cheng Huang December 2004 CMU-CS-04-186 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 Thesis Committee:
More informationRemote Access Guide. https://remote.lghealth.org
Remote Access Guide https://remote.lghealth.org Created by: Joshua Steele Revision 1.0 7/14/2015 Table of Contents I. Remote Access using Internet Explorer... 2 II. Remote Access using Google Chrome...
More informationDISSEMINATING SECURITY UPDATES AT INTERNET SCALE
DISSEMINATING SECURITY UPDATES AT INTERNET SCALE Advances in Information Security Sushil Jajodia Consulting editor Center for Secure Information Systems George Mason University Fairfax, VA 22030-4444 email:
More informationGEO BASED ROUTING FOR BORDER GATEWAY PROTOCOL IN ISP MULTI-HOMING ENVIRONMENT
GEO BASED ROUTING FOR BORDER GATEWAY PROTOCOL IN ISP MULTI-HOMING ENVIRONMENT Duleep Thilakarathne (118473A) Degree of Master of Science Department of Electronic and Telecommunication Engineering University
More informationDissertation Formatting Rules. Basic Format
All doctoral students will follow APA (6 th edition) formatting for the narrative portion of the dissertation. Refer to this guide for rules specific to Missouri Baptist University dissertations. *Instructions
More informationCertificate Program. Introduction to Microsoft Excel 2013
Certificate Program We offer online education programs designed to provide the workforce skills necessary to enter a new field or advance your current career. Our Online Career Training Programs in the
More informationAN EFFICIENT FRAMEWORK FOR PERFORMING EXECUTION-CONSTRAINT-SENSITIVE TRANSFORMATIONS THAT INCREASE INSTRUCTION-LEVEL PARALLELISM
Copyright by John Christopher Gyllenhaal, 1997 AN EFFICIENT FRAMEWORK FOR PERFORMING EXECUTION-CONSTRAINT-SENSITIVE TRANSFORMATIONS THAT INCREASE INSTRUCTION-LEVEL PARALLELISM BY JOHN CHRISTOPHER GYLLENHAAL
More informationADAPTIVE VIDEO STREAMING FOR BANDWIDTH VARIATION WITH OPTIMUM QUALITY
ADAPTIVE VIDEO STREAMING FOR BANDWIDTH VARIATION WITH OPTIMUM QUALITY Joseph Michael Wijayantha Medagama (08/8015) Thesis Submitted in Partial Fulfillment of the Requirements for the Degree Master of Science
More informationTree Rule Firewall. A Thesis Submitted for the Degree of. Doctor of Philosophy. Thawatchai Chomsiri. Faculty of Engineering and Information Technology
Tree Rule Firewall A Thesis Submitted for the Degree of Doctor of Philosophy By Thawatchai Chomsiri in Faculty of Engineering and Information Technology UNIVERSITY OF TECHNOLOGY, SYDNEY 17 th November
More informationVERIFICATION AND VALIDATION FOR QUALITY OF UML 2.0 MODELS
VERIFICATION AND VALIDATION FOR QUALITY OF UML 2.0 MODELS BHUVAN UNHELKAR, PHD WILEY- INTERSCIENCE A Wiley-lnterscience Publication JOHN WILEY & SONS, INC. Contents Figures Foreword Preface Acknowledgments
More informationSocial Networks: Service Selection and Recommendation
Social Networks: Service Selection and Recommendation Jebrin Al-Sharawneh Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Information Systems) Faculty of Engineering
More informationSummary of Contents LIST OF FIGURES LIST OF TABLES
Summary of Contents LIST OF FIGURES LIST OF TABLES PREFACE xvii xix xxi PART 1 BACKGROUND Chapter 1. Introduction 3 Chapter 2. Standards-Makers 21 Chapter 3. Principles of the S2ESC Collection 45 Chapter
More informationStep 1: Download the Overdrive Media Console App
Step 1: Download the Overdrive Media Console App I. Tap the Play Store icon on your tablet. II. Using the Search Feature, Type Overdrive and select the first entry in the suggested apps list (it has an
More informationJAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).
JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An
More informationStorage Hierarchy Management for Scientific Computing
Storage Hierarchy Management for Scientific Computing by Ethan Leo Miller Sc. B. (Brown University) 1987 M.S. (University of California at Berkeley) 1990 A dissertation submitted in partial satisfaction
More informationIP Camera Installation Brief Manual
I IP Camera Installation Brief Manual The purpose of this manual is to give you basic help how to successfully connect your camera(s) to the network and make the initial configurations. There is a whole
More informationGraduate School of Library and Information Science Spring Document Processing (LIS 450 )
Graduate School of Library and Information Science Spring 2000 Document Processing (LIS 450 ) Section DP Wednesday, 8 10:50 AM Room 143, Henry Building David Dubin Office: LIS 222 Office hours: Tuesdays,
More informationRequirements for Model Validation
Draft Need Requirements Application for Model Validation Reporting Requirements for Model Validation Reporting for Generators and Generator Control Systems Revision 0 Wednesday 16 November 2005 Prepared
More informationVolume Reconstruction and Parallel Rendering Algorithms: A Comparative Analysis
Volume Reconstruction and Parallel Rendering Algorithms: A Comparative Analysis by Ulrich Neumann A dissertation submitted to the faculty of The University of North Carolina at Chapel Hill in partial fulfillment
More informationCorrective Action User Walkthrough: New Portal Login
Corrective Action User Walkthrough: New Portal Login The updated URL for the PST Portal is: https://apps.occeweb.com/pstportal There are five scenarios to consider if you are experiencing difficulty logging
More informationAlbertson AP Calculus AB AP CALCULUS AB SUMMER PACKET DUE DATE: The beginning of class on the last class day of the first week of school.
Albertson AP Calculus AB Name AP CALCULUS AB SUMMER PACKET 2017 DUE DATE: The beginning of class on the last class day of the first week of school. This assignment is to be done at you leisure during the
More informationDISTRIBUTED SYSTEMS. Second Edition. Andrew S. Tanenbaum Maarten Van Steen. Vrije Universiteit Amsterdam, 7'he Netherlands PEARSON.
DISTRIBUTED SYSTEMS 121r itac itple TAYAdiets Second Edition Andrew S. Tanenbaum Maarten Van Steen Vrije Universiteit Amsterdam, 7'he Netherlands PEARSON Prentice Hall Upper Saddle River, NJ 07458 CONTENTS
More informationNext Paradigm for Decentralized Apps. Table of Contents 1. Introduction 1. Color Spectrum Overview 3. Two-tier Architecture of Color Spectrum 4
Color Spectrum: Next Paradigm for Decentralized Apps Table of Contents Table of Contents 1 Introduction 1 Color Spectrum Overview 3 Two-tier Architecture of Color Spectrum 4 Clouds in Color Spectrum 4
More informationThis Document is intended as a user guide for providers who are planning to use the eligibility check system.
[ELIGIBILITY CHECK USER GUIDE] This Document is intended as a user guide for providers who are planning to use the eligibility check system. Contents I. Introduction... 2 II. Purpose of Document... 2 III.
More informationSecurity Standards for Information Systems
Security Standards for Information Systems Area: Information Technology Services Number: IT-3610-00 Subject: Information Systems Management Issued: 8/1/2012 Applies To: University Revised: 4/1/2015 Sources:
More informationTexConnect Online User Guide
TexConnect Online User Guide TexConnect Online User Guide I. Log on.. 2 A. Create Password. 3 B. Reset Password... 4 II. Disclaimer... 5 III. Pool Information.. 6 IV. Transactions A. Deposit... 7 B. Withdrawal.
More informationOracle RMAN for Absolute Beginners
Oracle RMAN for Absolute Beginners Darl Kuhn Apress Contents About the Author Acknowledgments Introduction xvii xix xxi Chapter 1: Getting Started... 1 Connecting to Your Database 1 Establishing OS Variables
More informationImproving the QOS in Video Streaming Multicast
Improving the QOS in Video Streaming Multicast Sujatha M. Assistant Professor, St. Joseph Engineering College, Vamanjoor,Mangalore, Karnataka, India-575028. Email: sujatha_msk@yahoo.co.in Abstract In a
More informationScheduling Algorithms for Input-Queued Cell Switches. Nicholas William McKeown
Scheduling Algorithms for Input-Queued Cell Switches by Nicholas William McKeown B.Eng (University of Leeds) 1986 M.S. (University of California at Berkeley) 1992 A thesis submitted in partial satisfaction
More informationIntroduction to PTC Windchill ProjectLink 11.0
Introduction to PTC Windchill ProjectLink 11.0 Overview Course Code Course Length TRN-4756-T 8 Hours In this course, you will learn how to participate in and manage projects using Windchill ProjectLink
More informationSupporting Quality of Service for Internet Applications A thesis presented for the degree of Master of Science Research
Supporting Quality of Service for Internet Applications A thesis presented for the degree of Master of Science Research Department of Computer Systems Faculty of Information Technology University of Technology,
More informationMeredith Lichtenstein Cone, MPH Manager, Surveillance and Informatics Program May 8, 2018
Meredith Lichtenstein Cone, MPH Manager, Surveillance and Informatics Program May 8, 2018 Overview POSITION STATEMENTS Position Statements Purpose To document and analyze policy and/or standardized surveillance
More informationAn agent-based peer-to-peer grid computing architecture
University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2005 An agent-based peer-to-peer grid computing architecture Jia
More informationADAPTIVE GRIDSTAT INFORMATION FLOW MECHANISMS AND MANAGEMENT FOR POWER GRID CONTINGENCIES
ADAPTIVE GRIDSTAT INFORMATION FLOW MECHANISMS AND MANAGEMENT FOR POWER GRID CONTINGENCIES By STIAN FEDJE ABELSEN A thesis submitted in partial fulfillment of the requirements for the degree of MASTER OF
More informationOracle BI 11g R1: Build Repositories
Oracle BI 11g R1: Build Repositories Volume I - Student Guide D63514GC11 Edition 1.1 June 2011 D73309 Author Jim Sarokin Technical Contributors and Reviewers Marla Azriel Roger Bolsius Bob Ertl Alan Lee
More informationMechanism Design using Creo Parametric 3.0
Mechanism Design using Creo Parametric 3.0 Overview Course Code Course Length TRN-4521-T 1 Day In this course, you will learn about creating mechanism connections, configuring the mechanism model, creating
More informationCONTENTS. Cisco Internet Streamer CDS 3.0 Software Configuration Guide iii OL CHAPTER 1 Product Overview 1-1
CONTENTS Preface xvii Document Revision History xvii Audience xvii Objective xviii Document Organization xviii Document Conventions xix Related Publications xx Obtaining Documentation and Submitting a
More informationChapter 1 Introduction Motivation Approach Significance of Research Overview of Material... 5
ACKNOWLEDGEMENT First and foremost, I would like to thank my thesis advisor, Dr. A. Lynn Abbott, for his invaluable guidance and patience throughout my entire study at Virginia Tech. Beyond gaining academic
More informationKnowledge libraries and information space
University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2009 Knowledge libraries and information space Eric Rayner University
More informationDOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING
DOTNET PROJECTS I. IEEE based IOT 1. A Fuzzy Model-based Integration Framework for Vision-based Intelligent Surveillance Systems 2. Learning communities in social networks and their relationship with the
More informationTABLE OF CONTENTS CHAPTER TITLE PAGE NO NO.
vi TABLE OF CONTENTS CHAPTER TITLE PAGE NO NO. ABSTRACT iii LIST OF TABLES xiii LIST OF FIGURES xiv LIST OF SYMBOLS AND ABBREVIATIONS xix 1 INTRODUCTION 1 1.1 CLOUD COMPUTING 1 1.1.1 Introduction to Cloud
More informationUSER GUIDE UTRADE ID Mobile for iphone & ipad
Table of Contents Recommended MOBILE TYPE... 2 DOWNLOAD UTRADE ID MOBILE FOR IPHONE & IPAD... 2 I How to run UTRADE Online Trading... 3 II How to sign OUT... 5 III How to monitor YOUR FAVORITE stocks...
More informationMathematics Shape and Space: Polygon Angles
a place of mind F A C U L T Y O F E D U C A T I O N Department of Curriculum and Pedagogy Mathematics Shape and Space: Polygon Angles Science and Mathematics Education Research Group Supported by UBC Teaching
More informationCOMPUTATIONAL CHALLENGES IN HIGH-RESOLUTION CRYO-ELECTRON MICROSCOPY. Thesis by. Peter Anthony Leong. In Partial Fulfillment of the Requirements
COMPUTATIONAL CHALLENGES IN HIGH-RESOLUTION CRYO-ELECTRON MICROSCOPY Thesis by Peter Anthony Leong In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy California Institute
More information"Charting the Course... SharePoint 2007 Hands-On Labs Course Summary
Course Summary Description This series of 33 hands-on labs allows students to explore the new features of Microsoft SharePoint Server, Microsoft Windows, Microsoft Office, including Microsoft Office Groove,
More information"Charting the Course to Your Success!" MOC A Developing High-performance Applications using Microsoft Windows HPC Server 2008
Description Course Summary This course provides students with the knowledge and skills to develop high-performance computing (HPC) applications for Microsoft. Students learn about the product Microsoft,
More informationEfficient Index Maintenance for Text Databases
Efficient Index Maintenance for Text Databases A thesis submitted for the degree of Doctor of Philosophy Nicholas Lester B.E. (Hons.), B.Sc, School of Computer Science and Information Technology, Science,
More informationCruiseSmarter PRIVACY POLICY. I. Acceptance of Terms
I. Acceptance of Terms This Privacy Policy describes CRUISE SMARTER policies and procedures on the collection, use and disclosure of your information. CRUISE SMARTER LLC (hereinafter referred to as "we",
More information"Charting the Course... Agile Database Design Techniques Course Summary
Course Summary Description This course provides students with the skills necessary to design databases using Agile design techniques. It is based on the Scott Ambler book Agile Database Techniques: Effective
More informationBob Kahn s Conclusions at a DoD Conference
Sep 12, BRUSSELS Bob Kahn s Conclusions at a DoD Conference IPv6 is under hyped (for what it really will do) Industry cannot make it happen DOD must return to leadership Richard Clarke, Special Advisor
More informationTECHNICAL TRANSLATION
TECHNICAL TRANSLATION Technical Translation Usability Strategies for Translating Technical Documentation JODY BYRNE University of Sheffield, UK A C.I.P. Catalogue record for this book is available from
More informationASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Systems. IS Ph.D. Program. Page 0
ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Systems Informatiio on Systems PhD Program IS Ph.D. Program Page 0 Assiut University Faculty of Computers & Informationn
More informationPrivacy Preserving Data Sharing in Data Mining Environment
Privacy Preserving Data Sharing in Data Mining Environment PH.D DISSERTATION BY SUN, XIAOXUN A DISSERTATION SUBMITTED TO THE UNIVERSITY OF SOUTHERN QUEENSLAND IN FULLFILLMENT OF THE REQUIREMENTS FOR THE
More informationOracle BPM 10g R3 Programming 1 Essentials
Oracle BPM 10g R3 Programming 1 Essentials Volume I Student Guide D55633GC10 Edition 1.0 March 2009 D58927 Authors Jill Moritz Kenny Somerville Technical Contributors and Reviewers Fernando Dobladez Carolina
More information"Charting the Course... JNCIP-SP Class of Service / Multicast Bundle. Course Summary
Course Summary Description This bundle combines Junos Class of Service (JCOS) and Junos Multicast Routing (JMR). JCOS COURSE OVERVIEW: This two-day course provides students with advanced class-of-service
More informationMy sample dissertation title. Jo Student. A dissertation [choose dissertation or thesis] submitted to the graduate faculty
My sample dissertation title by Jo Student A dissertation [choose dissertation or thesis] submitted to the graduate faculty in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY
More informationCROSS-REFERENCE TABLE ASME A Including A17.1a-1997 Through A17.1d 2000 vs. ASME A
CROSS-REFERENCE TABLE ASME Including A17.1a-1997 Through A17.1d 2000 vs. ASME 1 1.1 1.1 1.1.1 1.2 1.1.2 1.3 1.1.3 1.4 1.1.4 2 1.2 3 1.3 4 Part 9 100 2.1 100.1 2.1.1 100.1a 2.1.1.1 100.1b 2.1.1.2 100.1c
More informationTHE FLORIDA STATE UNIVERSITY COLLEGE OF ARTS AND SCIENCES
THE FLORIDA STATE UNIVERSITY COLLEGE OF ARTS AND SCIENCES AUTOMATIC EMPIRICAL TECHNIQUES FOR DEVELOPING EFFICIENT MPI COLLECTIVE COMMUNICATION ROUTINES By AHMAD FARAJ A Dissertation submitted to the Department
More informationContents. Preface. 1 An Introduction to Web Engineering 1 Gerti Kappel, Birgit Pröll, Siegfried Reich, Werner Retschitzegger. 1.1 Motivation...
Gerti Kappel ftoc.tex V2 - March 31, 2006 4:11 P.M. Page v v Preface Forward xv xvii 1 An Introduction to Web Engineering 1 Gerti Kappel, Birgit Pröll, Siegfried Reich, Werner Retschitzegger 1.1 Motivation...
More informationA RESOURCE AWARE SOFTWARE ARCHITECTURE FEATURING DEVICE SYNCHRONIZATION AND FAULT TOLERANCE
A RESOURCE AWARE SOFTWARE ARCHITECTURE FEATURING DEVICE SYNCHRONIZATION AND FAULT TOLERANCE Chris Mattmann University of Southern California University Park Campus, Los Angeles, CA 90007 mattmann@usc.edu
More informationOracle Data Integrator: Administration and Development Volume I Student Guide
Oracle Data Integrator: Administration and Development Volume I Student Guide D48459GC30 Edition 3.0 December 2007 D53463 Authors Laura Hofman Miquel FX Nicolas Technical Contributor and Reviewer Sharath
More informationContributions to image encryption and authentication
University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2003 Contributions to image encryption and authentication T. Uehara
More informationAn Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks
Georgia State University ScholarWorks @ Georgia State University Computer Science Theses Department of Computer Science 12-4-2006 An Enhanced Algorithm to Find Dominating Set Nodes in Ad Hoc Wireless Networks
More informationEnterprise JavaBeans 3.1
SIXTH EDITION Enterprise JavaBeans 3.1 Andrew Lee Rubinger and Bill Burke O'REILLY* Beijing Cambridge Farnham Kbln Sebastopol Tokyo Table of Contents Preface xv Part I. Why Enterprise JavaBeans? 1. Introduction
More informationACKNOWLEDGEMENT. my PhD Supervisor Dr. Vidhyacharan Bhaskar, Professor, Department of
iv ACKNOWLEDGEMENT It is my pleasant duty to thank a large number of people for the various forms of help, encouragement and support that they have provided during the time I have been working on this
More informationMULTIMEDIA COMMUNICATIONS
MULTIMEDIA COMMUNICATIONS Protocols and Applications Edited by: Franklin F. Kuo Wolfgang Effelsberg J.J. Garcia-Luna-Aceves To join a Prentice Hall PTR Internet mailing list, point to: http://www.prenhall.com/mailjists/
More informationPERFORMANCE ANALYSIS OF REAL-TIME EMBEDDED SOFTWARE
PERFORMANCE ANALYSIS OF REAL-TIME EMBEDDED SOFTWARE PERFORMANCE ANALYSIS OF REAL-TIME EMBEDDED SOFTWARE Yau-Tsun Steven Li Monterey Design Systems, Inc. Sharad Malik Princeton University ~. " SPRINGER
More informationAn Energy Efficient and Delay Aware Data Collection Protocol in Heterogeneous Wireless Sensor Networks A Review
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.934
More informationSub: Invitation of sealed quotations for Procurement of UPS systems for MDI Gurgaon
Ref. No. : MDI/PROCUREMENT OF UPS SYSTEMS/2016 Date: July 6, 2016 Kind Attn: Dear Sir, Sub: Invitation of sealed quotations for Procurement of UPS systems for MDI Gurgaon Sealed Quotations are invited
More informationITEC2620 Introduction to Data Structures
ITEC2620 Introduction to Data Structures Searching and Sorting It is faster to search a sorted array What happens if our data set changes? We have to keep the array in sorted order Lecture 3b Linked-Lists
More informationNAVAL POSTGRADUATE SCHOOL THESIS
NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS DETECTING A MULTI-HOMED DEVICE USING CLOCK SKEW by Bryan J. Martin September 2016 Co-Advisor: Co-Advisor: Murali Tummala John C. McEachen Approved
More informationIntroduction xvii. Assessment Test xxxiii
Contents at a Glance Introduction xvii Assessment Test xxxiii Chapter 1 The Components of a Juniper Networks Router 1 Chapter 2 Interfaces 61 Chapter 3 Protocol-Independent Routing 107 Chapter 4 Routing
More information4) Discuss on various types of software myths and the true aspects of these myths.
(DMSIT 21) ASSIGNMENT - 1, DEC - 2018. PAPER- I : SOFTWARE ENGINEERING 1) Explain the following: a) CMMI b) RAD model 2) Elaborate different requirement engineering tasks. 3) Discuss about class-based
More informationThesis in a Box. Mark Andrew Paskin. B.A. Hon. (Cornell University) 1998 M.S. (University of California, Berkeley) 2000
Thesis in a Box by Mark Andrew Paskin B.A. Hon. (Cornell University) 1998 M.S. (University of California, Berkeley) 2000 A dissertation submitted in partial satisfaction of the requirements for the degree
More informationBSynchro [E-AUTHORIZATION USER GUIDE] BSYNCHRO
BSynchro 2014 BSYNCHRO [E-AUTHORIZATION USER GUIDE] This Document is intended as a user guide for providers who are planning to use the e-authorization system. Contents I. Introduction... 2 II. Purpose
More informationDLS DEF1437. Case 2:13-cv Document Filed in TXSD on 11/19/14 Page 1 of 10 USE CASE SPECIFICATION. 2:13-cv /02/2014
Case 2:13-cv-00193 Document 774-33 Filed in TXSD on 11/19/14 Page 1 of 10 An USE CASE SPECIFICATION ISSUE ELECTION CERTIFICATE Texas Department of Public Safety September 13 2013 Version 10 2:13-cv-193
More informationContents. Excel 2013 Workbook... 1 Starting Excel The Startup Screen... 3 The Excel Screen... 4 Quick Access Toolbar...
Contents How to Use this Workbook... i BSBITU202A Create and use spreadsheets... ii BSBITU304A Produce spreadsheets... ix Files Used in this Workbook... xvi How to Download Exercise Files... xviii Office
More information"Charting the Course... WebSphere Portal 8 Development using Rational Application Developer 8.5. Course Summary
Course Summary Description This course will introduce attendees to Portlet development using Rational Application Developer 8.5 as their development platform. It will cover JSR 286 development, iwidget
More information2.) ilit Welcome Screen
1.) ilit Login Page a. Single Sign On (VPN) if you are logged in the VPN (getting emails, etc.), no password will be required when you launch I-Lit. You will be taken directly to the welcome screen. b.
More informationPT310M: Contents. Preface... xiii. Lesson 1. Pro Tools HD Hardware Configuration... 1
PT310M: Contents Preface... xiii Using the DVD... xiii Prerequisites for This Course... xiii System Requirements... xiv Becoming Avid Certified... xiv Pro Tools Certification... xiv User Certification...
More informationHIGH PERFORMANCE CACHE ARCHITECTURES FOR IP ROUTING: REPLACEMENT, COMPACTION AND SAMPLING SCHEMES RUIRUI GUO
HIGH PERFORMANCE CACHE ARCHITECTURES FOR IP ROUTING: REPLACEMENT, COMPACTION AND SAMPLING SCHEMES By RUIRUI GUO A dissertation submitted in partial fulfillment of the requirements for the degree of DOCTOR
More informationParticle Swarm Optimization Methods for Pattern. Recognition and Image Processing
Particle Swarm Optimization Methods for Pattern Recognition and Image Processing by Mahamed G. H. Omran Submitted in partial fulfillment of the requirements for the degree Philosophiae Doctor in the Faculty
More information