Routing Protocols for Wireless Ad Hoc Networks Hybrid routing protocols Theofanis Kilinkaridis

Size: px
Start display at page:

Download "Routing Protocols for Wireless Ad Hoc Networks Hybrid routing protocols Theofanis Kilinkaridis"

Transcription

1 Routing Protools for Wireless Ad Ho Networks Hyrid routing protools Theofanis Kilinkaridis Astrat This paper presents a partiular group of routing protools that aim to omine the advantages of proative and reative protools. Hyrid protools try to exploit the advantages of oth these shemes and to provide etter routing solutions for moile ad ho networks. The partiular paper is more foused on their main onepts as well as on their performane. It analyzes five hyrid protools and presents their advantages and disadvantages. 1. Introdution Routing protools generally fall in two ategories: Proative protools and Reative protools. Proative protools estalish network route regardless of the demand for suh routes. While these protools periodially exhange routing information, they an provide routes quikly after soure s request. Reative protools, on the other hand, disover routes only when it s needed. While this on-demand operation may result in route disovery delay, the protool overhead is muh lower. An optimal routing protool depends on network harateristis whih may hange dynamially. A stati network where routes to all nodes are equal is more suitale for a proative protool. A dynami network however, where a few moile nodes are the most popular destinations might use a reative protool. Hyrid routing protools find the optimal mix of proative route dissemination and reative route disovery. 2. Hyrid Routing Protools Usually in hyrid protools nodes are grouped into zones, ased on their loation in the network. Inside these zones, proative sheme is used for routing while the reative one is used for the ommuniation etween zones. In this paper the following protools are presented: Core Extration Distriuted Ad Ho Routing Protool(CEDAR), Zone Routing Protool(ZRP), Zone-ased Hierarhial Link State Routing Protool(ZHLS), Preferred Link-ased Routing Protool(PLBR) and Optimized Link State Routing Protool(OSLR). 2.1 Core Extration Distriuted Ad Ho Routing Protool Core Extration Distriuted Ad Ho Routing(CEDAR) protool [1] [2] estalishes a ore of the network whih is used for effiient delivery of the transmitted pakets. Route estalishment uses reative routing sheme and is performed y ore nodes. CEDAR onsists of three main phases: Core extration, link state propagation and route omputation. During the ore extration a set of nodes is dynamially eleted to form the ore of the network. During the link state propagation the andwidth availaility information of stale high andwidth links is propagated to ore nodes, while information regarding low andwidth and unstale links is kept loal. Finally, during the last phase, the ore path is used to estalish a route from the soure to the destination. In CEDAR there is at least on ore node every three hops. The path etween two ore nodes is alled virtual path. Here, the seletion of ore nodes is done y distriuted algorithm. Core nodes are used to perform the paket transmission over the network in uniast mode. In order to ahieve this transmissions effiiently, eah ore node has to know its neighoring ore nodes. If the ore node moves away, all the nodes that were attahed to it have to find a new 1

2 ore node. Also in CEDAR, every node piks up a node within a distane not greater than one hop from it, as its dominator. During the route estalishment, a ore path has to e found from the soure to the destination and then QoS requirements have to e satisfied for the seletion of the path. First the soure heks the loal topology whether the destination is in the loal topology tale of soure s ore node. If it is, the path is estalished diretly. If it s not, the soure initiates a RouteRequest message whih is roadasted to all the ore nodes of the network. Eah of the ore nodes that reeive the message forwards it to its neighoring ore nodes if the destination is not among its ore memers. If it is among one of its ore memers, this ore node originates a reply message to the soure ore node. So the ore path is estalished. Let s see the Figure 1, where the soure is the node 1 and the destination is the node 15. The ore nodes are 3, 5, 11, 12 and 13. Node 5 is the dominator of nodes 1 and 6 and node 12 is the dominator of node 15. The aovementioned proedure is followed till one ore node finds the destination node among its ore memers. In this ase, ore node 12 finds it and replies to the ore node 5. One the path etween the nodes is estalished the last one to e heked is whether the required andwidth for the transmission is availale on this path. If its not availale, the ore path will e rejeted. Figure 1: Route estalishment in CEDAR As for the link reak ase, CEDAR deals with it quite effiiently. When a link reak ours, the node after whih the reak ourred(on the path from soure to destination) sends a notifiation of failure and egins to find a new path from it to the destination. The partiular node rejets every reeived paket till the moment it finds a new path to the destination. Meanwhile, as the soure reeives the notifiation message, it stops to transmit and tries to find a new route to the destination. If the new route is found y either of these two nodes, a new path from the soure to the destination is estalished. The main advantage of the CEDAR is that it utilizes the use of ore nodes to satisfy oth routing estalishment and QoS path omputation. It is also very flexile in ase of link reak restoring the onnetivity of the network quikly and effiiently. Its main disadvantage however, is that the route estalishment and omputation is relied on ore nodes. Due to the moility of ad ho networks, ore nodes may move. This movement affets the performane of the protool. 2

3 2.2 Zone Routing Protool As we know oth proative and reative protools have their advantages and disadvantages. Zone Routing Protool (ZRP) [1] [3] is a protool whih omines the advantages of oth approahes into a hyrid sheme. Its key feature is that it uses proative routing sheme within a node s loal neighorhood and reative sheme for ommuniation etween these neighorhoods. These loal neighorhoods are alled zones. An intra-zone routing protool (IARP) is used in the zone, where a partiular node estalishes a proative routing. However, routing eyond the zone is managed y a reative protool alled inter-zone routing protool (IERP). Eah zone of a given node is a suset of the network. Eah node may e in more than one zone and eah zone may e of a different size. The size of the zone is determined y the zone radius r, where r is the numer of hops to the perimeter of the zone. Figure 2 shows an example of routing zone with r = 2. Figure 2: routing zone of the node A with r = 2. With zone radius = 2, the nodes B, C, D, E, F, G, H, I and J omprise A s zone. Nodes C, G and I are interior nodes, while nodes B, D, E, F, H and J are alled peripheral nodes. Eah node maintains the information aout the routes to its zone nodes using proative routing sheme y exhanging periodi route update pakets. IARP is used for ommuniation etween a node and its zone s nodes. Sine the loal neighorhood is dynami with a lot of topology hanges, the IARP, as mentioned aove, is a proative, tale-driven protool. Due to its proative nature, the route seletion within the zone is very effiient y having availale all the possile routes to the loal destinations(zone nodes). IERP however, is responsile for route disovery to the nodes whih are not within the routing zone. In other words, IERP takes advantage of the known loal topology of a node s zone and using a reative routing sheme, estalishes ommuniation with nodes in other zones. When a node s wants to send a paket to the node d, it first heks whether the destination node is within its zone. If it is, the soure node delivers the paket diretly to it. Otherwise, it orderasts the RouteRequest to its peripheral nodes. More partiularly, this proedure is held y a protool alled the Borderast Resolution Protool (BRP) whih is used for optimizing the effiieny of the in-zone ommuniation. BRP is responsile for sending the RouteRequest message to all the peripheral nodes. Unlike IARP and IERP, BRP is more like a paket delivery servie and not a routing protool. If any of these peripheral nodes finds the destination node in its own routing zone, it sends a RouteReply ak to the soure node s 3

4 indiating the path. Otherwise, it orderasts the RouteRequest to the peripheral nodes of its zone. This proess is ontinued till the destination node d is loated. The nodes that find the destination node in their routing zone, initiate the sending of the RouteReply pakets to the soure. During the spread of the RouteRequest message, eah node appends its address to it whih an e used later for estalishing the path for RouteReply message, sent ak to the soure. When an intermediate node, detets a roken link in the path, it hooses another alternative path to ypass the roken link. This proess is alled loal path reonfiguration and during it, a path update message is sent to the sender to inform it aout the link failure. After that a new, su-optimal path is estalished etween the soure and the destination nodes. In order to estalish an optimal path, the soure node reinitiates the path finding proess. Generally, omining the advantages of oth proative and reative routing shemes, ZRP provides etter solutions than oth of them. Compared to them, it redues the ontrol traffi produed y periodi flooding of routing information pakets(proative sheme). It also redues the wastage of andwidth and ontrol overhead ompared to reative shemes where RouteRequest flooding mehanisms are used. The main disadvantage however of ZRP, is the large overlapping of routing zones. 2.3 Zone-ased Hierarhial Link State Routing Protool Zone-ased Hierarhial Link State (ZHLS) [1] [4], is a hyrid hierarhial routing protool that uses the geographial loation information of the nodes to divide the network into non-overlapping zones. ZHLS is ased on node ID and zone ID approah whereas eah node knows only the node onnetivity within its zone and the zone onnetivity of the whole network. A low level, within a zone, onnetivity is alled node-level topology while the high level zone onnetivity is alled zone-level topology. The node-level topologial information is distriuted only to the nodes of a partiular zone while the zone-level information is distriuted to all nodes of the network. No luster heads are defined in this protool. Routing is estalished ased on zone ID and node ID of the destination. No path ontaining the nodes etween the soure and the destination is required. Therefore, no link reak ould ause any prolem to the delivery of the information. In ZHLS, a node knows its physial loation(node ID) y loation tehniques like GPS. Using this information it an determine its zone ID y mapping its node ID to zone map. The zone map is done during the network design phase. Two types of link state pakets(lsp) are defined in ZHLS. A node LSP of a partiular node ontains a list of its onneted neighors. A zone LSP ontains a list of its onneted zones. At this point, having its node ID and zone ID, eah node an start the intra-zone lustering and then the inter-zone lustering proedures to uild its routing tales. In intra-zone lustering, eah node roadasts a link request. The nodes reply with a link response that ontains their node ID and their zone ID. After all link responses, every node generates a node LSP that ontains the node IDs of its neighors of the same zone, and the zone IDs of its neighors of different zones. 4

5 5 g 4 d a e f h i Soure a d e f Node LSP,,d,4 a,e a,3 a,f,2 e,2 J Figure 3: Node-level topology Figure 4: Node LSPs in zone 1 Then, every node roadasts its LSP to the nodes all over its zone. As a result, a list of node LSPs like in Figure 4 an e generated in every node and eah node knows now the node-level topology of its zone. The Shortest Path algorithm is used now for uilding intra-zone routing tales. Figure 5 shows the intra-zone routing tale of node a. Destination d e f Next node d g Figure 5: Intra-zone routing tale of node a. After the initial roadast of a link request from every node, some nodes reeive also responses from nodes whose loation is in neighor zones. These nodes are alled gateway nodes through whih the ommuniation with the neighor zones an e estalished. As it is mentioned aove, node LSPs ontain the zone IDs of the neighoring zones. So eah node knows whih zones are onneted to its zone. Just after reeiving all nodes LSPs, eah node of the same zone generates the same zone LSP. Then the gateway nodes roadast the zone LSP all over the network. As a result a list of zone LSPs is maintained y every node whih now knows the zone-level topology of the network. Finally the inter-zone routing tales are uilt in every node. If a soure node s wants to ommuniate with the destination node d, s heks whether d is loated in its zone. If it is, the paket is sent to the destination node ased on intra-zone routing tale. If it is not, then s initiates a loation request paket whih ontains soure s and destination s information. The loation request paket is sent to every zone. A gateway node of eah zone will reeive the paket and hek whether the requested node elongs to its zone. The gateway node to whih zone the destination node elongs will initiate a loation response paket indiating the zone information of d. After knowing the d s zone ID, node s will ommuniate with node d, ased on its inter-zone routing tale. 5

6 The main advantage of ZHLS against ZRP is that it does not have any overlapping zones. Also the fat that the zone-level topology information is distriuted to all nodes and that there is no luster head, redues the traffi and avoids single point of failure. The main disadvantage of the protool is additional traffi produed y the reation and maintaining of the zone-level topology. 3. Routing Protools with Effiient Flooding Mehanisms The main mehanism of reative protools is flooding the network with RouteRequest pakets in order to estalish a path from the soure node to the destination. These on-demand protools inrease the traffi overhead and derease the already limited, availale andwidth. A provision of effiient flooding mehanisms however, ould redue the overhead aused y different routing shemes. Two protools will e disussed further: Preferred Link-ased Routing Protool(PLBR) and Optimized Link State routing protool(olsr). 3.1 Preferred Link-ased Routing Protool The Preferred Link-ased Routing(PLBR) [1] [5] is a reative routing protool whih applies partiular mehanisms to avoid just flooding the network with RouteRequest pakets. It provides a mehanism where not all the nodes are allowed to forward the reeived RouteRequest paket. Hene, it redues the ontrol overhead. Here, every node maintains a tale if its neighors(nt) and of its neighor s neighors(nnt). A node selets always a suset of nodes from its neighor list(nl). This suset is alled the preferred list(pl). The determination of the PL is ased on nodes or links harateristis and will e disussed later. The RouteRequest paket ontains the PL of the sender and is roadasted to its neighors. The ones that are in the PL will forward the RouteRequest paket. The others will disard it. The size of the PL is K, where K is the maximum numer of nodes omprising the PL. PL is always a suset of PLT where PLT is the preferred list tale maintained y every node and whih ontains all neighor nodes in order of preferene. Any hange in neighors topology is maintained y sending a eaon that updates the tales. PLBR onsists of three different phases: route estalishment, route seletion and route maintenane. During the first phase of route estalishment, the soure node s is trying to estalish a route to the destination node d. If the node d is in soure s NNT, the route is estalished diretly and the information is forwarded to the destination. If it is not, the soure initiates a RouteRequest paket whih ontains: Soure node s address: SoureID Destination node s address: DestinationID Unique sequene numer: SeqNum, whih prevents the forwarding of multiple opies of the same RouteRequest paket reeived from different neighors. Traversed Path: TP, whih indiates the nodes that have een visited so far y the paket. Preferred List: PL whih, as already mentioned, is list of nodes determined y the sender node as eligile to forward the RouteRequest paket. Time to Live(TTL) field: a dereasing value whih determines the allowed duration of paket existene in the network. Every time, efore forwarding the RouteRequest paket, the node that reeives the RouteRequest paket updates its PLT and inserts in the PL field of the paket its own PL(whih ontains the first K nodes from its PLT). The PL of the reeived paket is always replaed y the one of the reeiver. The RouteRequest paket is always roadasted to all node s neighors. However, not all these nodes are onsidered to e eligile to forward the paket further. In order to e eligile 6

7 a reeiver node has to e in the PL of the reeived paket, not to have forwarded the same paket again and the TTL value must e greater than zero. If the node satisfies all these requirements, it an forward the paket to all its neighor nodes. Before roadasting the paker however, the node heks whether the destination node is in its NT or NTT. If it is, it uniasts the paket diretly to the neighor whih an e the destination node or an just have the destination node as a neighor in its NT. Otherwise, the paket will e roadasted with new PL and new parameters. As soon as the destination node is deteted, the route seletion proedure is followed. As it is ovious multiple RouteRequest pakets an reah the destination node. The est route is seleted ased on the shortest path, the least delay path or the most stale path. After reeiving the first RouteRequest paket, the destination node starts a timer whih indiates for how long it will e reeiving RouteRequest pakets from the network. After the expiration of the timer, no more RouteRequest pakets are reeived y the destination node and the route seletion phase an start. Finally in order to deal with link reaks, PLBR uses a partiular mehanism to ahieve optimal route maintenane. PLBR uses a quik route repair mehanism to ypass the roken link using information aout the next two hops from NNT. But how the preferred list(pl) is onstruted? Every time the node reeives RouteRequest paket, it has to determine its own preferred list of eligile nodes and to replae the reeived with the new one. Two different algorithms have een proposed for the seletion of eligile nodes. The first one is alled Neighor Degree-ased Preferred Link Algorithm and is ased on neighor nodes degree information. The seond one is alled Weight-ased Preferred Link algorithm. Here, the preferred list is alulated ased on the staility of the links indiated y the weight. Neighor Degree-ased Preferred Link Algorithm is ased on neighor nodes degree. Degree of a node is the numer of its neighors. The algorithm is exeuted for one node and takes under onsideration parameters that have to do with the degree of its neighor nodes. After the exeution of the algorithm, two lists are reated: INL and EXL The Inlude List(INL) ontains a set of neighor nodes whih are onsidered as reahale for forwarding the RouteRequest paket. EXL is the Exlude List whih ontains the set of neighor nodes whih are onsidered as unreahale. On the other hand, Weight-ased Preferred Link algorithm is ased on the weight given to a node, whih in turn is ased on its neighors temporal and spatial staility. Temporal staility has to do with a partiular time period in whih it is ommuniating with its neighors, while spatial staility has to do with the distane estimated from the strength of the signals reeived from its neighors. In oth algorithms a preferred list tale PLT is reated with nodes eing set in order of preferene. After this step, a node an hoose K first nodes from PLT and to reate its preferred list. The effiient flooding mehanism used in oth PLBR and WBPL redues the routing ontrol overhead and provides etter solutions than the other reative protools. A flooding effiient protool has higher salaility and dereases the network ollisions. However, oth PLBR and WBPL are muh more omputationally omplex than the other reative protools. 3.2 Optimized Link State Routing Protool The Optimized Link State Routing (OLSR) protool [1] [6] is a proative routing protool and is ased on the link state algorithm. It employs periodi information exhange keeping every node updated aout the topology of the network. OLSR is an optimization of a pure link state protool as it redues the size of information messages and the numer of retransmissions of these messages throughout the network. Its asi onept is the use of multipoint relaying tehnique to flood the network with ontrol messages. It an provide routes to the destination nodes in an effiient and quik manner. The partiular protool is more effiient in large and dense ad ho networks. 7

8 The idea of the multipoint relay is to redue the retransmissions and generally minimize pakets flooding in the network. Eah node in the network selets a set of its neighors whih are supposed to retransmit the pakets reeived from it. This set of seleted nodes, whih is suset of node s neighors, is alled the multipoint relays(mpr) of that node. Any neighor that is not in node s MPR, reeives the paket ut does not retransmit it. Similarly, eah node maintains a suset of its neighors whih is alled the MRP Seletors of the node. MRP Seletors is the set of node s neighors that have seleted the node as a multipoint relay. Thus, every roadast message that is oming from the MRP Seletors is supposed to e retransmitted y reeiver node. Eah node selets its own set of multipoint relays. Node s MPRset has to e onfigured in suh way to ontain the minimal suset of neighor nodes though whih the node an otain aess to all of its two-hop neighors. Sine eah node selets its MPRset independently, it knows the topology of its two-hop neighorhood. The MPRset is re-alulated only when a hange is deteted in the neighorhood: idiretional link reak or idiretional link appearane. Also, the MPRset is realulated when a hange in the two-hop neighor set is deteted. Multipoint relays are seleted among the one hop neighors with a idiretional link. In order to deide whih neighor nodes an e in the MPRset, eah node roadasts periodially HELLO messages whih ontain the information aout its neighors and their link status. These HELLO messages are reeived y all one-hop neighor nodes ut are not retransmitted to other nodes. A HELLO message originated from one node ontains a list of neighors with whih the node has idiretional link and a list of neighors from whih the node has reeived HELLO message ut their link is not yet onfirmed as idiretional. OLSR supposes i-diretional links and so the onnetivity must e heked in oth diretions. Every node maintains a topology tale aout the network topology in order to estalish routes to destination nodes. That s why every node roadasts topology ontrol (TC) messages that ontain topology information. Every TC message ontains the MPRSeletor set of every node. A node reords information aout the multipoint relays of other nodes in this topology tale. An entry in the topology tale onsists of an address of a potential destination node whih is the MPRSeletor and the address of a last-hop, whih is the node that originated the TC message. So using the topology tale a node an reah every other node in the network. The main advantage of OSLR against other proative protools is the redued numer of roadasts, due to the use of MPRs, whih leads to redued ontrol overhead. One of its main disadvantages is the overlapping MPRsets and MPRSeletors whih leads to dupliate messages. Conlusion In this paper few hyrid routing protools were presented. In most of the ases, hyrid solutions provide redued ontrol traffi overhead and redued routing message size. Hyrid protools provide flexile mehanisms for handling link reaks and restore quikly the onnetivity of the network. However, they have quite few disadvantages. Some of them are sujet to single point of failure, while others require additional traffi for reation and maintaining of their topology information. Sometimes they are just very omplex omputationally. 8

9 Referenes [1] C. Siva Ram Murthy and B.S. Manoj. Ad Ho Wireless Networks: Arhitetures and Protools. [2] R. Sivakumar, P. Sinha, and V. Bharghavan. CEDAR: A Core-Extration DistriutedAd Ho Routing Algorithm. IEEE journal on seleted areas in ommuniations, Vol. 17, No. 8, August1999. [3] Niklas Beijar. Zone Routing Protool(ZRP). Networking Laoratory, Helsinki University of Tehnology, Finland. [4] Mario Joa-Ng and I-Tai Lu. A GPS-ased Peer-to-Peer Hierarhial Link State Routing For Moile Ad Ho Networks. Polytehni University, IEEE, VTC2000. [5] R. S. Sisodia, Karthigeyan. I, B. S. Manoj, and C. Siva Ram Murthy. A Preferred Link Based Multiast Protool for Wireless Moile Ad ho Networks. Indian Institute of Tehnology, 2003 IEEE. [6] P. Jaquet, P. Muhlethaler, T. Clausen, A. Laouti, A. Qayynum and L. Viennot. Optimizes link state routing protool for ad ho networks. Hiperom Projet, Frane, 2001 IEEE. 9

Improved flooding of broadcast messages using extended multipoint relaying

Improved flooding of broadcast messages using extended multipoint relaying Improved flooding of broadast messages using extended multipoint relaying Pere Montolio Aranda a, Joaquin Garia-Alfaro a,b, David Megías a a Universitat Oberta de Catalunya, Estudis d Informàtia, Mulimèdia

More information

Displacement-based Route Update Strategies for Proactive Routing Protocols in Mobile Ad Hoc Networks

Displacement-based Route Update Strategies for Proactive Routing Protocols in Mobile Ad Hoc Networks Displaement-based Route Update Strategies for Proative Routing Protools in Mobile Ad Ho Networks Mehran Abolhasan 1 and Tadeusz Wysoki 1 1 University of Wollongong, NSW 2522, Australia E-mail: mehran@titr.uow.edu.au,

More information

Chapter 7 Routing Protocols for Ad Hoc Wireless Networks. Jang-Ping Sheu

Chapter 7 Routing Protocols for Ad Hoc Wireless Networks. Jang-Ping Sheu Chapter 7 Routing Protocols for Ad Hoc Wireless Networks Jang-Ping Sheu Introduction Routing protocols used in wired networks cannot be directly applied to ad hoc wireless networks Highly dynamic topology

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

Episode 12: TCP/IP & UbiComp

Episode 12: TCP/IP & UbiComp Episode 12: TCP/IP & UbiComp Hannes Frey and Peter Sturm University of Trier Outline Introdution Mobile IP TCP and Mobility Conlusion Referenes [1] James D. Solomon, Mobile IP: The Unplugged, Prentie Hall,

More information

Incremental Mining of Partial Periodic Patterns in Time-series Databases

Incremental Mining of Partial Periodic Patterns in Time-series Databases CERIAS Teh Report 2000-03 Inremental Mining of Partial Periodi Patterns in Time-series Dataases Mohamed G. Elfeky Center for Eduation and Researh in Information Assurane and Seurity Purdue University,

More information

An Experimental Study of Fractional Cooperation in Wireless Mesh Networks

An Experimental Study of Fractional Cooperation in Wireless Mesh Networks An Experimental tudy of Frational Cooperation in Wireless Mesh Networks Anthony Cale, Nariman Farsad, and Andrew W. Ekford Dept. of Computer iene and Engineering, York University 47 Keele treet, Toronto,

More information

Path Sharing and Predicate Evaluation for High-Performance XML Filtering*

Path Sharing and Predicate Evaluation for High-Performance XML Filtering* Path Sharing and Prediate Evaluation for High-Performane XML Filtering Yanlei Diao, Mihael J. Franklin, Hao Zhang, Peter Fisher EECS, University of California, Berkeley {diaoyl, franklin, nhz, fisherp}@s.erkeley.edu

More information

Performance Enhancement Techniques for InfiniBand TM Architecture

Performance Enhancement Techniques for InfiniBand TM Architecture Performane Enhanement Tehniques for InfiniBand TM Arhiteture Eun Jung Kim? Ki Hwan Yum y Chita R. Das? Mazin Yousif z JoséDuato x? Department of Computer Siene and Engineering The Pennsylvania State University

More information

Cluster-based Cooperative Communication with Network Coding in Wireless Networks

Cluster-based Cooperative Communication with Network Coding in Wireless Networks Cluster-based Cooperative Communiation with Network Coding in Wireless Networks Zygmunt J. Haas Shool of Eletrial and Computer Engineering Cornell University Ithaa, NY 4850, U.S.A. Email: haas@ee.ornell.edu

More information

Efficient and scalable trie-based algorithms for computing set containment relations

Efficient and scalable trie-based algorithms for computing set containment relations Effiient and salale trie-ased algorithms for omputing set ontainment relations Yongming Luo #1, George H. L. Flether #2, Jan Hidders 3, Paul De Bra #4 # Eindhoven University of Tehnology, The Netherlands

More information

New Channel Allocation Techniques for Power Efficient WiFi Networks

New Channel Allocation Techniques for Power Efficient WiFi Networks ew Channel Alloation Tehniques for Power Effiient WiFi etworks V. Miliotis, A. Apostolaras, T. Korakis, Z. Tao and L. Tassiulas Computer & Communiations Engineering Dept. University of Thessaly Centre

More information

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

Test Case Generation from UML State Machines

Test Case Generation from UML State Machines Test Case Generation from UML State Mahines Dirk Seifert Loria Université Nany 2 Campus Sientifique, BP 239 F-54506 Vandoeuvre lès Nany edex Dirk.Seifert@Loria.fr inria-00268864, version 2-23 Apr 2008

More information

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks A Dual-Hamiltonian-Path-Based Multiasting Strategy for Wormhole-Routed Star Graph Interonnetion Networks Nen-Chung Wang Department of Information and Communiation Engineering Chaoyang University of Tehnology,

More information

Multi-Channel Wireless Networks: Capacity and Protocols

Multi-Channel Wireless Networks: Capacity and Protocols Multi-Channel Wireless Networks: Capaity and Protools Tehnial Report April 2005 Pradeep Kyasanur Dept. of Computer Siene, and Coordinated Siene Laboratory, University of Illinois at Urbana-Champaign Email:

More information

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

DoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay

DoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay DoS-Resistant Broadast Authentiation Protool with Low End-to-end Delay Ying Huang, Wenbo He and Klara Nahrstedt {huang, wenbohe, klara}@s.uiu.edu Department of Computer Siene University of Illinois at

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments

Establishing Secure Ethernet LANs Using Intelligent Switching Hubs in Internet Environments Establishing Seure Ethernet LANs Using Intelligent Swithing Hubs in Internet Environments WOEIJIUNN TSAUR AND SHIJINN HORNG Department of Eletrial Engineering, National Taiwan University of Siene and Tehnology,

More information

Multi-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks

Multi-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks Multi-hop Fast Conflit Resolution Algorithm for Ad Ho Networks Shengwei Wang 1, Jun Liu 2,*, Wei Cai 2, Minghao Yin 2, Lingyun Zhou 2, and Hui Hao 3 1 Power Emergeny Center, Sihuan Eletri Power Corporation,

More information

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

1 Disjoint-set data structure.

1 Disjoint-set data structure. CS 124 Setion #4 Union-Fin, Greey Algorithms 2/20/17 1 Disjoint-set ata struture. 1.1 Operations Disjoint-set ata struture enale us to effiiently perform operations suh as plaing elements into sets, querying

More information

Menu. X + /X=1 and XY+X /Y = X(Y + /Y) = X

Menu. X + /X=1 and XY+X /Y = X(Y + /Y) = X Menu K-Maps and Boolean Algera >Don t ares >5 Variale Look into my... 1 Karnaugh Maps - Boolean Algera We have disovered that simplifiation/minimization is an art. If you see it, GREAT! Else, work at it,

More information

Mining Edge-Weighted Call Graphs to Localise Software Bugs

Mining Edge-Weighted Call Graphs to Localise Software Bugs Mining Edge-Weighted Call Graphs to Loalise Software Bugs Frank Eihinger, Klemens Böhm, and Matthias Huer Institute for Program Strutures and Data Organisation (IPD), Universität Karlsruhe (TH), Germany

More information

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks 62 Uplink Channel Alloation Sheme and QoS Management Mehanism for Cognitive Cellular- Femtoell Networks Kien Du Nguyen 1, Hoang Nam Nguyen 1, Hiroaki Morino 2 and Iwao Sasase 3 1 University of Engineering

More information

Automated Test Generation from Vulnerability Signatures

Automated Test Generation from Vulnerability Signatures Automated Test Generation from Vulneraility Signatures Adulaki Aydin, Muath Alkhalaf, and Tevfik Bultan Computer Siene Department University of California, Santa Barara Email: {aki,muath,ultan}@s.us.edu

More information

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr

More information

Batch Auditing for Multiclient Data in Multicloud Storage

Batch Auditing for Multiclient Data in Multicloud Storage Advaned Siene and Tehnology Letters, pp.67-73 http://dx.doi.org/0.4257/astl.204.50. Bath Auditing for Multilient Data in Multiloud Storage Zhihua Xia, Xinhui Wang, Xingming Sun, Yafeng Zhu, Peng Ji and

More information

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification

Performance Improvement of TCP on Wireless Cellular Networks by Adaptive FEC Combined with Explicit Loss Notification erformane Improvement of TC on Wireless Cellular Networks by Adaptive Combined with Expliit Loss tifiation Masahiro Miyoshi, Masashi Sugano, Masayuki Murata Department of Infomatis and Mathematial Siene,

More information

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communiations 1 RAC 2 E: Novel Rendezvous Protool for Asynhronous Cognitive Radios in Cooperative Environments Valentina Pavlovska,

More information

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes Deteting Outliers in High-Dimensional Datasets with Mixed Attributes A. Koufakou, M. Georgiopoulos, and G.C. Anagnostopoulos 2 Shool of EECS, University of Central Florida, Orlando, FL, USA 2 Dept. of

More information

Modeling Wireless Channel for Ad-Hoc Network Routing Protocol

Modeling Wireless Channel for Ad-Hoc Network Routing Protocol Modeling Wireless Channel for Ad-Ho Network Routing Protool Merlinda Drini, Tarek Saadawi Dept. ofeletrial Engineering, City College and Graduate Center ofcity University ofnew York New York, NY 10031,

More information

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425) Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University

More information

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks International Journal of Computer Theory and Engineering, Vol. 5, No. 2, April 213 A Multi-Head Clustering Algorithm in Vehiular Ad Ho Networks Shou-Chih Lo, Yi-Jen Lin, and Jhih-Siao Gao Abstrat Clustering

More information

Accommodations of QoS DiffServ Over IP and MPLS Networks

Accommodations of QoS DiffServ Over IP and MPLS Networks Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering

More information

Automated System for the Study of Environmental Loads Applied to Production Risers Dustin M. Brandt 1, Celso K. Morooka 2, Ivan R.

Automated System for the Study of Environmental Loads Applied to Production Risers Dustin M. Brandt 1, Celso K. Morooka 2, Ivan R. EngOpt 2008 - International Conferene on Engineering Optimization Rio de Janeiro, Brazil, 01-05 June 2008. Automated System for the Study of Environmental Loads Applied to Prodution Risers Dustin M. Brandt

More information

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Ho Wireless Networks Giorgio Quer, Federio Librino, Lua Canzian, Leonardo Badia, Mihele Zorzi, University of California San Diego La

More information

Fast Distribution of Replicated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon

Fast Distribution of Replicated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon ACEEE Int. J. on Information Tehnology, Vol. 3, No. 2, June 2013 Fast Distribution of Repliated Content to Multi- Homed Clients Mohammad Malli Arab Open University, Beirut, Lebanon Email: mmalli@aou.edu.lb

More information

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis

More information

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

Distributed Resource Allocation Strategies for Achieving Quality of Service in Server Clusters

Distributed Resource Allocation Strategies for Achieving Quality of Service in Server Clusters Proeedings of the 45th IEEE Conferene on Deision & Control Manhester Grand Hyatt Hotel an Diego, CA, UA, Deember 13-15, 2006 Distributed Resoure Alloation trategies for Ahieving Quality of ervie in erver

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,

More information

Dynamic Algorithms Multiple Choice Test

Dynamic Algorithms Multiple Choice Test 3226 Dynami Algorithms Multiple Choie Test Sample test: only 8 questions 32 minutes (Real test has 30 questions 120 minutes) Årskort Name Eah of the following 8 questions has 4 possible answers of whih

More information

Machine Vision. Laboratory Exercise Name: Student ID: S

Machine Vision. Laboratory Exercise Name: Student ID: S Mahine Vision 521466S Laoratory Eerise 2011 Name: Student D: General nformation To pass these laoratory works, you should answer all questions (Q.y) with an understandale handwriting either in English

More information

International Journal of Advancements in Research & Technology, Volume 3, Issue 3, March-2014 ISSN

International Journal of Advancements in Research & Technology, Volume 3, Issue 3, March-2014 ISSN International Journal of Advanements in Researh & Tehnology, Volume 3, Issue 3, Marh-204 ISSN 2278-773 47 Phrase Based Doument Retrieving y Comining Suffix Tree index data struture and Boyer- Moore faster

More information

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless

More information

Detection and Recognition of Non-Occluded Objects using Signature Map

Detection and Recognition of Non-Occluded Objects using Signature Map 6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,

More information

CleanUp: Improving Quadrilateral Finite Element Meshes

CleanUp: Improving Quadrilateral Finite Element Meshes CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)

More information

Intra- and Inter-Stream Synchronisation for Stored Multimedia Streams

Intra- and Inter-Stream Synchronisation for Stored Multimedia Streams IEEE International Conferene on Multimedia Computing & Systems, June 17-23, 1996, in Hiroshima, Japan, p 372-381 Intra- and Inter-Stream Synhronisation for Stored Multimedia Streams Ernst Biersak, Werner

More information

An Efficient and Scalable Approach to CNN Queries in a Road Network

An Efficient and Scalable Approach to CNN Queries in a Road Network An Effiient and Salable Approah to CNN Queries in a Road Network Hyung-Ju Cho Chin-Wan Chung Dept. of Eletrial Engineering & Computer Siene Korea Advaned Institute of Siene and Tehnology 373- Kusong-dong,

More information

DECT Module Installation Manual

DECT Module Installation Manual DECT Module Installation Manual Rev. 2.0 This manual desribes the DECT module registration method to the HUB and fan airflow settings. In order for the HUB to ommuniate with a ompatible fan, the DECT module

More information

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization Self-Adaptive Parent to Mean-Centri Reombination for Real-Parameter Optimization Kalyanmoy Deb and Himanshu Jain Department of Mehanial Engineering Indian Institute of Tehnology Kanpur Kanpur, PIN 86 {deb,hjain}@iitk.a.in

More information

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

Figure 1. LBP in the field of texture analysis operators.

Figure 1. LBP in the field of texture analysis operators. L MEHODOLOGY he loal inary pattern (L) texture analysis operator is defined as a gray-sale invariant texture measure, derived from a general definition of texture in a loal neighorhood. he urrent form

More information

The AMDREL Project in Retrospective

The AMDREL Project in Retrospective The AMDREL Projet in Retrospetive K. Siozios 1, G. Koutroumpezis 1, K. Tatas 1, N. Vassiliadis 2, V. Kalenteridis 2, H. Pournara 2, I. Pappas 2, D. Soudris 1, S. Nikolaidis 2, S. Siskos 2, and A. Thanailakis

More information

- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger.

- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger. - 1 - S 21 Diretory-based Administration of Virtual Private Networks: Poliy & Configuration Charles A Kunzinger kunzinge@us.ibm.om - 2 - Clik here Agenda to type page title What is a VPN? What is VPN Poliy?

More information

Announcements. Lecture Caching Issues for Multi-core Processors. Shared Vs. Private Caches for Small-scale Multi-core

Announcements. Lecture Caching Issues for Multi-core Processors. Shared Vs. Private Caches for Small-scale Multi-core Announements Your fous should be on the lass projet now Leture 17: Cahing Issues for Multi-ore Proessors This week: status update and meeting A short presentation on: projet desription (problem, importane,

More information

The Implementation of RRTs for a Remote-Controlled Mobile Robot

The Implementation of RRTs for a Remote-Controlled Mobile Robot ICCAS5 June -5, KINEX, Gyeonggi-Do, Korea he Implementation of RRs for a Remote-Controlled Mobile Robot Chi-Won Roh*, Woo-Sub Lee **, Sung-Chul Kang *** and Kwang-Won Lee **** * Intelligent Robotis Researh

More information

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah

More information

HEXA: Compact Data Structures for Faster Packet Processing

HEXA: Compact Data Structures for Faster Packet Processing Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

IN structured P2P overlay networks, each node and file key

IN structured P2P overlay networks, each node and file key 242 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 21, NO. 2, FEBRUARY 2010 Elasti Routing Table with Provable Performane for Congestion Control in DHT Networks Haiying Shen, Member, IEEE,

More information

Tracking Table Tennis Balls in Real Match Scenes for Umpiring Applications

Tracking Table Tennis Balls in Real Match Scenes for Umpiring Applications British Journal of Mathematis & Computer Siene 1(4): 228-241, 2011 SCIENCEDOMAIN international www.sienedomain.org Traking Tale Tennis Balls in Real Math Senes for Umpiring Appliations K. C. P. Wong 1*

More information

A Comparison of Hard-state and Soft-state Signaling Protocols

A Comparison of Hard-state and Soft-state Signaling Protocols University of Massahusetts Amherst SholarWorks@UMass Amherst Computer Siene Department Faulty Publiation Series Computer Siene 2003 A Comparison of Hard-state and Soft-state Signaling Protools Ping Ji

More information

Unsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks

Unsupervised Stereoscopic Video Object Segmentation Based on Active Contours and Retrainable Neural Networks Unsupervised Stereosopi Video Objet Segmentation Based on Ative Contours and Retrainable Neural Networks KLIMIS NTALIANIS, ANASTASIOS DOULAMIS, and NIKOLAOS DOULAMIS National Tehnial University of Athens

More information

Chapter 2: Introduction to Maple V

Chapter 2: Introduction to Maple V Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard

More information

A Dictionary based Efficient Text Compression Technique using Replacement Strategy

A Dictionary based Efficient Text Compression Technique using Replacement Strategy A based Effiient Text Compression Tehnique using Replaement Strategy Debashis Chakraborty Assistant Professor, Department of CSE, St. Thomas College of Engineering and Tehnology, Kolkata, 700023, India

More information

Abstract. We describe a parametric hybrid Bezier patch that, in addition. schemes are local in that changes to part of the data only aect portions of

Abstract. We describe a parametric hybrid Bezier patch that, in addition. schemes are local in that changes to part of the data only aect portions of A Parametri Hyrid Triangular Bezier Path Stephen Mann and Matthew Davidhuk Astrat. We desrie a parametri hyrid Bezier path that, in addition to lending interior ontrol points, lends oundary ontrol points.

More information

13.1 Numerical Evaluation of Integrals Over One Dimension

13.1 Numerical Evaluation of Integrals Over One Dimension 13.1 Numerial Evaluation of Integrals Over One Dimension A. Purpose This olletion of subprograms estimates the value of the integral b a f(x) dx where the integrand f(x) and the limits a and b are supplied

More information

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method 3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr

More information

CA Test Data Manager 4.x Implementation Proven Professional Exam (CAT-681) Study Guide Version 1.0

CA Test Data Manager 4.x Implementation Proven Professional Exam (CAT-681) Study Guide Version 1.0 Implementation Proven Professional Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer

More information

Acoustic Links. Maximizing Channel Utilization for Underwater

Acoustic Links. Maximizing Channel Utilization for Underwater Maximizing Channel Utilization for Underwater Aousti Links Albert F Hairris III Davide G. B. Meneghetti Adihele Zorzi Department of Information Engineering University of Padova, Italy Email: {harris,davide.meneghetti,zorzi}@dei.unipd.it

More information

Cluster-Based Cumulative Ensembles

Cluster-Based Cumulative Ensembles Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,

More information

The recursive decoupling method for solving tridiagonal linear systems

The recursive decoupling method for solving tridiagonal linear systems Loughborough University Institutional Repository The reursive deoupling method for solving tridiagonal linear systems This item was submitted to Loughborough University's Institutional Repository by the/an

More information

Exploring the Commonality in Feature Modeling Notations

Exploring the Commonality in Feature Modeling Notations Exploring the Commonality in Feature Modeling Notations Miloslav ŠÍPKA Slovak University of Tehnology Faulty of Informatis and Information Tehnologies Ilkovičova 3, 842 16 Bratislava, Slovakia miloslav.sipka@gmail.om

More information

Connection Guide. Installing the printer locally (Windows) What is local printing? Installing the printer using the Software and Documentation CD

Connection Guide. Installing the printer locally (Windows) What is local printing? Installing the printer using the Software and Documentation CD Page 1 of 7 Connetion Guide Installing the printer loally (Windows) Note: When installing a loally attahed printer, if the operating system is not supported y the Software and Doumentation CD, then the

More information

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department

More information

arxiv:cs/ v1 [cs.ni] 12 Dec 2006

arxiv:cs/ v1 [cs.ni] 12 Dec 2006 Optimal Filtering for DDoS Attaks Karim El Defrawy ICS Dept. UC Irvine keldefra@ui.edu Athina Markopoulou EECS Dept. UC Irvine athina@ui.edu Katerina Argyraki EE Dept. Stanford Univ. argyraki@stanford.edu

More information

Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations

Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations ABSTRACT Maitreya Natu University of Delaware 103 Smith Hall Newark, DE 19716, USA natu@is.udel.edu Reently proposed apability

More information

Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks

Crowd-GPS-Sec: Leveraging Crowdsourcing to Detect and Localize GPS Spoofing Attacks Crowd-GPS-Se: Leveraging Crowdsouring to Detet and Loalize GPS Spoofing Attaks Kai Jansen, Matthias Shäfer, Daniel Moser, Vinent Lenders, Christina Pöpper and Jens Shmitt Ruhr-University Bohum, Germany,

More information

Path Diversity for Overlay Multicast Streaming

Path Diversity for Overlay Multicast Streaming Path Diversity for Overlay Multiast Streaming Matulya Bansal and Avideh Zakhor Department of Eletrial Engineering and Computer Siene University of California, Berkeley Berkeley, CA 9472 {matulya, avz}@ees.berkeley.edu

More information

1. Introduction. 2. The Probable Stope Algorithm

1. Introduction. 2. The Probable Stope Algorithm 1. Introdution Optimization in underground mine design has reeived less attention than that in open pit mines. This is mostly due to the diversity o underground mining methods and omplexity o underground

More information

! g!gj. Observing TCP Dynamics in Real Networks. Abstract ,..

! g!gj. Observing TCP Dynamics in Real Networks. Abstract ,.. Observing TCP Dynamis in Real Networks Jeffrey C. Mogul mogul@ dewrl.de.om Digital Equipment Corporation Western Researh Laboratory 25 University Avenue Palo Alto, California, 9431 Abstrat 1. ntrodution

More information

Facility Location: Distributed Approximation

Facility Location: Distributed Approximation Faility Loation: Distributed Approximation Thomas Mosibroda Roger Wattenhofer Distributed Computing Group PODC 2005 Where to plae ahes in the Internet? A distributed appliation that has to dynamially plae

More information

Mining effective design solutions based on a model-driven approach

Mining effective design solutions based on a model-driven approach ata Mining VI 463 Mining effetive design solutions based on a model-driven approah T. Katsimpa 2, S. Sirmakessis 1,. Tsakalidis 1,2 & G. Tzimas 1,2 1 Researh ademi omputer Tehnology Institute, Hellas 2

More information

Multi-Level Modeling of Concurrent and Distributed Systems

Multi-Level Modeling of Concurrent and Distributed Systems Multi-Level Modeling of Conurrent and Distriuted Systems Peter Taeling Hasso-Plattner-Institute for Software Systems Engineering P.O. Box 90 04 60, 14440 Potsdam, Germany taeling@hpi.uni-potsdam.de strat

More information

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman

NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION. Ken Sauer and Charles A. Bouman NONLINEAR BACK PROJECTION FOR TOMOGRAPHIC IMAGE RECONSTRUCTION Ken Sauer and Charles A. Bouman Department of Eletrial Engineering, University of Notre Dame Notre Dame, IN 46556, (219) 631-6999 Shool of

More information

Backpressure with Adaptive Redundancy (BWAR)

Backpressure with Adaptive Redundancy (BWAR) Bakpressure with Adaptive Redundany (BWAR) Majed Alresaini alresain AT us. edu Maheswaran Sathiamoorthy msathiam AT us. edu Bhaskar Krishnamahari bkrishna AT us. edu Mihael J. Neely mjneely AT us. edu

More information

CS5984 Mobile Computing

CS5984 Mobile Computing CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Part II 1 Outline Routing Protocols for Ad hoc Networks DSDV: Highly Dynamic Destination-Sequenced Distance- Vector

More information

C 2 C 3 C 1 M S. f e. e f (3,0) (0,1) (2,0) (-1,1) (1,0) (-1,0) (1,-1) (0,-1) (-2,0) (-3,0) (0,-2)

C 2 C 3 C 1 M S. f e. e f (3,0) (0,1) (2,0) (-1,1) (1,0) (-1,0) (1,-1) (0,-1) (-2,0) (-3,0) (0,-2) SPECIAL ISSUE OF IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION: MULTI-ROBOT SSTEMS, 00 Distributed reonfiguration of hexagonal metamorphi robots Jennifer E. Walter, Jennifer L. Welh, and Nany M. Amato Abstrat

More information

OvidSP Quick Reference Card

OvidSP Quick Reference Card OvidSP Quik Referene Card Searh in any of several dynami modes, ombine results, apply limits, use improved researh tools, develop strategies, save searhes, set automati alerts and RSS feeds, share results...

More information

Connection Guide. Supported operating systems. Installing the printer using the Software and Documentation CD. Connection Guide

Connection Guide. Supported operating systems. Installing the printer using the Software and Documentation CD. Connection Guide Connetion Guide Page 1 of 6 Connetion Guide Supported operating systems Using the software CD, you an install the printer software on the following operating systems: Windows 8.1 Windows Server 2012 R2

More information

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm

More information

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints Smooth Trajetory Planning Along Bezier Curve for Mobile Robots with Veloity Constraints Gil Jin Yang and Byoung Wook Choi Department of Eletrial and Information Engineering Seoul National University of

More information

Connection Guide. Installing the printer locally (Windows) What is local printing? Installing the printer using the Software and Documentation CD

Connection Guide. Installing the printer locally (Windows) What is local printing? Installing the printer using the Software and Documentation CD Connetion Guide Page 1 of 5 Connetion Guide Installing the printer loally (Windows) Note: If the Software and Doumentation CD does not support the operating system, you must use the Add Printer Wizard.

More information

Exploiting Longer Cycles for Link Prediction in Signed Networks

Exploiting Longer Cycles for Link Prediction in Signed Networks Exploiting Longer Cyles for Link Predition in Signed Networks Kai-Yang Chiang kyhiang@s.utexas.edu Nagarajan Natarajan naga86@s.utexas.edu Inderjit S. Dhillon inderjit@s.utexas.edu Amuj Tewari amuj@s.utexas.edu

More information

Circular Pruning for Lazy Diagnosis of Active Systems

Circular Pruning for Lazy Diagnosis of Active Systems Cirular Pruning for Lazy Diagnosis of Ative Systems Andrea Duoli, Gianfrano Lamperti, Emanuele Piantoni, Marina Zanella Dipartimento di Elettronia per l Automazione, Università di Bresia, Italy Astrat:

More information