performance to the performance they can experience when they use the services from a xed location.

Size: px
Start display at page:

Download "performance to the performance they can experience when they use the services from a xed location."

Transcription

1 I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi ATR Media Itegratio & Commuicatios Research Laboratories Seika-cho, Soraku-gu, Kyoto 9-, Japa rieko@mic.atr.co.jp Masahiko Tsukamoto Dept. of Iformatio Systems Egieerig Faculty of Egieerig, Osaka Uiversity Yamadaoka, Suita, Osaka, Japa tuka@ise.eg.osaka-u.ac.jp Abstract This paper presets performace compariso amog ve strategies for mobile support. The major facilities that are required for a etwork protocol to support mobile hosts are locatio maagemet ad packet forwardig. Based o this observatio, we cosider ve basic strategies which use distict methods to achieve these facilities ad compare their performace. These ve strategies are Broadcast Noticatio (), Broadcast Forwardig (), Broadcast Query (), Default Forwardig (), ad Default Query (). As a result of aalytical evaluatio ad compariso, it is show that uder dieret etwork coditios, such as umber of routers, etwork topology, migratio/commuicatio ratio, data/cotrol packet size ratio, dieret strategies produce miimum etwork trac. I short, ad show the best performace i scalability, while ad are eciet for frequet migratio. O the other had, is suitable for a small etwork which has hosts with rare migratio. Itroductio I order to realize mobile commuicatio i computer etworks, two kids of trasparecy are required: operatioal trasparecy ad performace trasparecy []. The operatioal trasparecy meas that mobile users ca cotiuously access to etwork services without beig forced to operate ay additioal procedures durig or after their migratio. The performace trasparecy, o the other had, meas that mobile users ca use the etwork services with similar performace to the performace they ca experiece whe they use the services from a xed locatio. Focusig o the operatioal trasparecy, a umber of mobile host protocols have bee proposed [], [], [], [], [], [9], [], [], whereas performace trasparecy has ot yet bee fully discussed. Performace trasparecy ca be achieved through eciet use of etwork resources such as etwork badwidth. Notice that there are two basic fuctios that are essetial to mobility support: locatio maagemet ad packet forwardig. The eciet use of etwork badwidth is sigicatly aected by these fuctios, sice cotrol packet to exchage the locatio iformatio ad data packet routed via ooptimal path produce large trac. Hece, performace evaluatio ca be ivestigated through the observatio o the etwork trac produced by these two fuctios. We ca cosider several distict strategies based o how to implemet these fuctios. For example, oe possible solutio for locatio maagemet is that the router seds a oticatio packet to all other routers whe the router detects a ew mobile host. Aother possible solutio is that the router seds the packet to a particular router isted of all routers. Cosequetly, wehave ve basic strategies for mobile support: Broadcast Noticatio (), Broadcast Forwardig (), Broadcast Query (), Default Forwardig () ad Default Query (). Although the existig proposals have dierece i details, they ca be categorized ito these basic strategies. Ulike the approach i [] which compares mobile host protocols directly, we compare these basic strategies. Therefore, the fudametal characteristics cocerig the performace ca be observed more clearly. As a result of aalytical evaluatio ad compariso, it is show that uder dieret etwork coditios, such as umber of routers, etwork topology,, data/cotrol packet size ratio, dieret strategies produce miimum et-

2 H H H H R R H move R R H H H move router host Figure : Example of etwork coguratio. work trac. I short, ad show thebest performace i scalability, while ad are ef- ciet for frequet migratio. O the other had, is suitable for a small etwork which has hosts with rare migratio. I sectio, the etwork model ad the ve strategies are briey described. I sectio, we rst aalyze the trac of each strategy, ad the compare them usig two example etwork topologies. We also discuss the performace compariso i geeral topology etworks. Fially, we coclude the paper ad state future work i sectio. Mobile Support Strategies Cosider a simple etwork model as show i Figure. Routers are coected to each other via wired liks. They may have wireless iterface as well as wired iterface. I this model, all hosts ca potetially be mobile hosts, because they ca move freely from oe subetwork to aother. For example, host H ca move to the subetwork o which router R resides, ad ito the wireless cell of router R if it has a wireless iterface. A mobile host is served by at least oe router which hadles the data packets from/to the mobile host. We refer the router as curret router. I some cases, there is aother router which has dieret role for servig the mobile host. We refer the router as default router, which is resposible for advertisig the locatio of the mobile host. Note that this locatio is ot always the curret locatio. The default router may advertise the xed locatio which will ot chage despite the migratio. Of course, i some cases, oe router acts as both default router ad curret router. The curret router may choose to sed a oticatio packet to all routers, the default router or eve o router, whe it detects a ew mobile host. The oticatio packet icludes the ew locatio iformatio of the mobile host. I the latter two cases, o receivig a data packet destied to the mobile host, the router must select the way of forwardig packets. Oe way is that the router forwards the packet to the default router, ad the alterative is that the router seds a query packet to the default router so that it ca get the curret locatio to be used for forwardig. Cosequetly, we have ve basic strategies as described below:. Broadcast Noticatio () I a lik state routig protocol like IS-IS protocol [], wheever a router detects a ew mobile host, it becomes the default router ad broadcasts a oticatio packet, which icludes the curret locatio of the the mobile host, to all the other routers i the same etwork. I this case, the default router is also the curret router at the same time. The previous default router also broadcasts a oticatio packet to all the other routers to let them kow that it is o loger the default router. Sice a router lears a ew locatio wheever a host moves, it ca forward data packets to the curret locatio usig the optimal path.. Default Forwardig () I, havig detected a ew mobile host, a router becomes the curret router ad seds a oticatio packet oly to the default router, which will be ackowledged with a cormatio packet from the default router. If a router receives a data packet to the mobile host, it forwards the packet to the default router, sice the default router always advertises the xed locatio of the mobile host. The data packets are the forwarded by the default router to the curret router.. Default Query () There is similarity betwee ad cocerig the way of migratio oticatio, though there is a little dierece i the way of forwardig packets. Sice the curret router seds a oticatio packet oly to the default router, a router receivig a data packet eeds to get the curret locatio before it forwards the packet. This is doe by sedig a query packet to the default router. After that the router forwards the packet usig the same optimal path as used i.. Broadcast Query () We have already discussed the cases i which the curret router seds a oticatio packet to either all routers or the default router whe a mobile host moves. We the cosider how a router 9

3 Table : Strategies used i mobile support protocols. Mobile Broadcast Broadcast Broadcast Default Default Protocols Noticatio Forwardig Query Forwardig Query Carlberg [] [ Ioaidis et al. [] [ IS-IS protocol [] [ Mobile IP [] [ Perkis ad Bhagwat [] [ Taaka ad Tsukamoto [], [] [ [ Teraoka et al. [9] [ Wada et al. [] [ ca forward a data packet whe it does ot kow either the curret locatio or the default router of the mobile host. I such case, oe choice the router ca select is to ask all routers where the mobile host is. It broadcasts a query packet to all routers ad waits a respose from the curret router. After learig the curret locatio of the mobile host, the router forwards the data packet.. Broadcast Forwardig () The alterative way is to forward the data packet to all routers istead of sedig a query packet. The curret router itercepts the packet ad passes it to the mobile host, while the other routers merely discard it. Table shows which strategy is used i the existig proposals. Almost all protocols use oly oe strategy, while our proposals use two strategies. They discuss the improvemet i performace by usig two strategies i a hybrid way []. Although is ot used i these protocols, it has bee widely used i packet radio etworks to support commuicatio betwee hosts whose locatios are ot kow beforehad []. To our kowledge, is ot used i mobile support protocols. Performace Evaluatio. Trac Aalysis Amog may factors that aect performace trasparecy, we use etwork trac as performace measure. The trac produced by each strategy ca be calculated by packet size hop cout. We dee several parameters relevat to the etwork coguratio: N : Total umber of routers. L : Total umber of liks amog routers. H : Average distace betwee routers, i umbers of hops. Note that H icludes the distace betwee a give router ad itself, which is equal to zero. d : Average size of data packets. c : Average size of cotrol packets. : Commuicatio ratio. This is a umber of messages a mobile host receives per secod. : Migratio ratio. This is a umber ofmi- gratio per secod. First, we aalyze the trac per migratio of oe mobile host. The trac of is Lc sice the default router ad the previous default router idividually broadcast a oticatio packet to all routers i the same etwork whe a mobile host moves. We assume that uses the oodig method as deed i IS-IS protocol to broadcast the oticatio packets. I the oodig method the cotrol packets are trasmitted oce o every lik. The trac of ad that of are sice oticatio packets are ot used. I ad, the trac costs Hc because the cotrol packets are exchaged betwee the curret router ad the default router for oticatio ad ackowledgmet. We the aalyze the trac per commuicatio. For simplicity, we ca omit the trac betwee a sedig host ad its curret router ad betwee a receivig host ad its curret router sice the trac is the same i every strategy. I, the data packet ca be forwarded alog the optimal path, hece the trac is Hd. The trac of costs Hd, which is as twice as that of sice the data packet is forwarded to the curret router via the default router. I, the data packet is forwarded to all routers ad the the trac is NHd. To query the locatio of the mobile host,

4 Table : Trac aalysis for ve strategies. per commuicatio Hd NHd (N + )Hc + Hd Hd Hc + Hd per migratio Lc Hc Hc total trac Hd+Lc NHd (N +)Hc + Hd Hd +Hc Hc+ Hd+Hc Table : Trac compariso i grid topology. strategy trac (a) Figure : Network topologies: (a) grid topology ( = ); (b) depth biary tree topology ( =). ad eed (N +)Hc ad Hc, respectively. I additio to the cotrol trac, they eed Hd to forward the data packet. We assume that i ad broadcast is achieved by uicast to all destiatio. These aalytic results are summarized i Table. (b). Compariso i Grid Topology Based o the fudametal aalysis discussed above, we the compare the trac usig two examples of etwork topology. First, we cosider a grid topology as show i Figure (a). Assume that a mobile host ca move to ay of the routers. Here, we have N = ; L =( ); ( )( +) H =. Let k be = ad l be d=c. We assume l = for simplicity. The total trac of each strategy is the give i Table. The trac of ad that of icrease as O(), while the trac of ad that of icrease as O( ). I other words, ad have scalability, whereas ad show the worst performace regardig scalability. O the other had, sice ad are idepedet of k, they are eciet for frequet migratio. Figure shows the graphical results. The performace dierece amog strategies is well represeted ( )(k + +) ( )( +) ( )( + )( +) (k + )( )( +) (k +)( )( +) O( ) O( ) O( ) O() O() i this gure. I additio to the above observatio, we ca see from this gure that is applicable to oly such a etwork i which a host rarely moves.. Compariso i Biary Tree Topology Let us cosider aother example, depth biary tree topology as show i Figure (b). Assume that mobile hosts ca move to oly those routers which are leaves of the topology. Here, we have N = ; L = ; H = +( ). We assume l = to simplify the compariso, ad the the total trac of each strategy is give as show i Table. From this table, we obtai the similar results as i the case of grid topology. That is, ad are much better tha the rest i terms of scalability, while ad are eciet for frequet migratio. We also show the illustrative results i Figure. The same tred as i the gird topology ca be see i this gure. Hece, we ca say that the fudametal

5 , ad Figure : Compariso of total trac i a grid topology etwork: deotes the umber of routers o the edge , ad Figure : Compariso of total trac i a biary tree topology etwork: deotes the depth of the tree.

6 Table : Trac compariso i biary tree topology. strategy trac + k (k +)+ + O( ) ( ) + O( ) ( ) + + O( ) (k + )( + ) O() (k +)( + ) O() (a) Figure : Network topologies represetig the cases where H ad L are miimum or maximum: (a) liear; (b) complete graph. characteristics of each strategy are idepedet of the etwork topology.. Compariso i Geeral Topology Network To ascertai that whether the performace characteristics obtaied via previous compariso is true i ay etwork or ot, we eed further examiatio. Now we compare ve strategies without assumptio o etwork topology ad the data/cotrol packet size ratio. For that purpose, we dee a ew parameter, p, ad let p be L=H. Clearly p will chage as etwork topology chages. Usig p, we have ew formulas for total trac as show i Table. From this table, we ca see that selectio of a strategy depeds o the parameters available. depeds o p, i.e., the etwork topology, however the others do ot. ad deped o the umber of routers, however they are idepedet of k, i.e., the migratio/commuicatio ratio. ad deped k like, though they are idepedet of p. (b) I order to grasp the dierece amog strategies, it will be greatly helpful to show these formulas graphically as a fuctio of k ad l at dieret N. Ulike the graphs show i Figure ad Figure, we will show the performace of ve strategies i oe graph from aother poit of view. I short, the graph shows the optimal strategy regardig k ad l. The boudary betwee ad is determied by k which varies accordig to p, hece we start from examiig the rage of p. Sice p ca be calculated for give H ad L, we must cosider the case where H ad L show the smallest/largest value whe the give umber of routers are equal. Figure depicts such cases: liear topology ad complete graph topology. L is the miimum ad H is the maximum i the liear topology, where L = N, (N )(N +) H =, N hece the miimum value of p is N N +. L is the maximum ad H is the miimum, o the other had, i the complete graph topology, where N(N ) L =, H = N N, hece the maximum value of p is N. As a result, k is miimum i complete graph topology ad the value is N, while k is maximum i liear topology ad the value is N + N. Figure shows the regio of which strategy is optimal regardig give k, l ad N i the complete graph topology. Similarly, Figure shows the optimal strategy i the liear topology. Note that the other topologies except the lier topology ad the complete graph topology exist betwee these two extreme cases. It is easily see from these gures that the same tred as i the grid topology ad the biary tree topology exists i geeral. That is, ad are eciet for frequet migratio, whereas is suitable for the opposite case. ad have scalability ad wide applicability. Additioally, we ca see that ad gai advatage as the umber of liks icreases as compared with. It meas ad ca be used i a dese etwork by which we mea the multi-liked topology etwork.

7 Table : Trac compariso cosiderig etwork topology ad data/cotrol packet size ratio. total trac /Hc pk + l Nl l + N + k +l k + l + umber of routers = umber of routers = umber of routers = data/cotrol packet ratio Figure : Regio of the optimal strategy for give k ad l whe p is maximum. umber of routers = umber of routers = umber of routers = data/cotrol packet ratio Figure : Regio of the optimal strategy for give k ad l whe p is miimum.

8 Coclusio For each of the mobile support strategies, we have aalyzed the trac per migratio ad per commuicatio, ad thus the total trac. We have rst discussed their performace i two typical etwork topologies: grid topology ad biary tree topology. From these basic compariso, the fudametal characteristics of each strategy have become clear. is useful for small ad rare migratio etwork. ad are suitable if the migratio ratio is relatively high i small etworks. ad have advatage of scalability ad are applicable for the etworks i which the migratio ratio is ot so high. I additio, we have discussed the performace dierece amog the ve strategies i geeral etworks. As a result of compariso from wide variety of viewpoit, we have show that uder dieret etwork coditios, such as umber of routers, etwork topology,, data/cotrol packet size ratio, dieret strategy produces miimum etwork trac. This result leads us to a ew idea that the best performace is obtaied if the strategies are chaged dyamically accordig to the etwork coditio. As metioed i sectio, there are few proposals usig two or more strategies, however we should further study about this issue i order to provide mobile users with real performace trasparecy. Ackowledgemet The authors would like to thak Dr. R. Nakatsu ad Dr. K. Mase of ATR Media Itegratio & Commuicatios Research Laboratories for their valuable commets ad support. [] ISO, \9 Iformatio techology - Telecommuicatios ad Iformatio exchage betwee systems - Itermediate system to Itermediate system Itra-Domai routeig iformatio exchage protocol for use i cojuctio with the Protocol for providig the Coectioless-mode Network Service (ISO )," 99. [] Perkis, C. E., \IP Mobility Support, Iteret Draft," draft-ietf-mobileip-protocol-.txt, 99 (workig draft). [] Myles, A. ad Skeller, D., \Compariso of Mobile Host Protocols for IP," Iteretworkig: Research ad Experiece, Vol., pp. {9, 99. [] Perkis, C. E. ad Bhagwat, P., \A Mobile Networkig System Based o Iteret Protocol," IEEE Persoal Commuicatios, Vol., pp. -, 99. [] Taaka, R. ad Tsukamoto, M., \A CLNPbased Protocol for Mobile Ed Systems withi a Area," Proc. IEEE Iteratioal Coferece o Network Protocols, pp. {, 99. [9] Teraoka, F., Yokote, Y. ad Tokoro, M., \A Network Architecture Providig Host Migratio Trasparecy," Proc. ACM SIGCOMM 9, pp. 9{, 99. [] Tsukamoto, M. ad Taaka, R., \A Protocol for Wide-Area Mobile Commuicatio i CLNP Networks," Trasactios of Iformatio Processig Society of Japa, Vol., No., pp. {, 99 (i Japaese). [] Wada, H., Yozawa, T., Ohishi, T. ad Taaka, Y., \Mobile Computig Eviromet Based o Iteret Packet Forwardig," Proc. Witer USENIX, pp. {, 99. Refereces [] Carlberg, K. G., \A Routig Architecture That Supports Mobile Ed Systems," Proc. IEEE MILCOM, pp. 9{, 99. [] Hah, J. J. ad Stolle, D. M., \Packet Radio Network Routig Algorithms: A Survey," IEEE Commuicatios Magazie, Vol., No., pp. {, 9. [] Ioaidis, J., Duchamp, D. ad Maguire Jr., G. Q., \IP-based Protocols for Mobile Iteretworkig," Proc. ACM SIGCOMM 9, pp. -, 99.

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Introduction to OSPF. ISP Training Workshops

Introduction to OSPF. ISP Training Workshops Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged

More information

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 9, 85-0 (2003) Evaluatio of Distributed ad Replicated HLR for Locatio Maagemet i PCS Network Departmet of Computer Sciece ad Iformatio Egieerig Natioal Chiao

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB) F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Hashing Functions Performance in Packet Classification

Hashing Functions Performance in Packet Classification Hashig Fuctios Performace i Packet Classificatio Mahmood Ahmadi ad Stepha Wog Computer Egieerig Laboratory Faculty of Electrical Egieerig, Mathematics ad Computer Sciece Delft Uiversity of Techology {mahmadi,

More information

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs What are we goig to lear? CSC316-003 Data Structures Aalysis of Algorithms Computer Sciece North Carolia State Uiversity Need to say that some algorithms are better tha others Criteria for evaluatio Structure

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers * Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of

More information

AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS

AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Melisa Hajyvahabzadeh

More information

Lecture 5. Counting Sort / Radix Sort

Lecture 5. Counting Sort / Radix Sort Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

CORD Test Project in Okinawa Open Laboratory

CORD Test Project in Okinawa Open Laboratory CORD Test Project i Okiawa Ope Laboratory Fukumasa Morifuji NTT Commuicatios Trasform your busiess, trasced expectatios with our techologically advaced solutios. Ageda VxF platform i NTT Commuicatios Expectatio

More information

Polynomial Functions and Models. Learning Objectives. Polynomials. P (x) = a n x n + a n 1 x n a 1 x + a 0, a n 0

Polynomial Functions and Models. Learning Objectives. Polynomials. P (x) = a n x n + a n 1 x n a 1 x + a 0, a n 0 Polyomial Fuctios ad Models 1 Learig Objectives 1. Idetify polyomial fuctios ad their degree 2. Graph polyomial fuctios usig trasformatios 3. Idetify the real zeros of a polyomial fuctio ad their multiplicity

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y

More information

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,

More information

BASED ON ITERATIVE ERROR-CORRECTION

BASED ON ITERATIVE ERROR-CORRECTION A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity

More information

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology

More information

Chapter 9. Pointers and Dynamic Arrays. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 9. Pointers and Dynamic Arrays. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 9 Poiters ad Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 9.1 Poiters 9.2 Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Slide 9-3

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

Partition in mobile adhoc network with mobility-a new approach for effective use of fast IP address autoconfiguration

Partition in mobile adhoc network with mobility-a new approach for effective use of fast IP address autoconfiguration Mukesh Chad et al. / Iteratioal Joural of Egieerig ad Techology (IJET) Partitio i mobile adhoc etwork with mobility-a ew approach for effective use of fast IP address autocofiguratio Mukesh Chad *, HL

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

Identification of the Swiss Z24 Highway Bridge by Frequency Domain Decomposition Brincker, Rune; Andersen, P.

Identification of the Swiss Z24 Highway Bridge by Frequency Domain Decomposition Brincker, Rune; Andersen, P. Aalborg Uiversitet Idetificatio of the Swiss Z24 Highway Bridge by Frequecy Domai Decompositio Bricker, Rue; Aderse, P. Published i: Proceedigs of IMAC 2 Publicatio date: 22 Documet Versio Publisher's

More information

Dynamic Programming and Curve Fitting Based Road Boundary Detection

Dynamic Programming and Curve Fitting Based Road Boundary Detection Dyamic Programmig ad Curve Fittig Based Road Boudary Detectio SHYAM PRASAD ADHIKARI, HYONGSUK KIM, Divisio of Electroics ad Iformatio Egieerig Chobuk Natioal Uiversity 664-4 Ga Deokji-Dog Jeoju-City Jeobuk

More information

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks Iterferece Aware Chael Assigmet Scheme i Multichael Wireless Mesh Networks Sumyeg Kim Departmet of Computer Software Egieerig Kumoh Natioal Istitute of Techology Gum South Korea Abstract Wireless mesh

More information

IMP: Superposer Integrated Morphometrics Package Superposition Tool

IMP: Superposer Integrated Morphometrics Package Superposition Tool IMP: Superposer Itegrated Morphometrics Package Superpositio Tool Programmig by: David Lieber ( 03) Caisius College 200 Mai St. Buffalo, NY 4208 Cocept by: H. David Sheets, Dept. of Physics, Caisius College

More information

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

The Value of Peering

The Value of Peering The Value of Peerig ISP/IXP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 25 th

More information

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets Throughput-Delay Scalig i Wireless Networks with Costat-Size Packets Abbas El Gamal, James Mamme, Balaji Prabhakar, Devavrat Shah Departmets of EE ad CS Staford Uiversity, CA 94305 Email: {abbas, jmamme,

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

Quorum Based Data Replication in Grid Environment

Quorum Based Data Replication in Grid Environment Quorum Based Data Replicatio i Grid Eviromet Rohaya Latip, Hamidah Ibrahim, Mohamed Othma, Md Nasir Sulaima, ad Azizol Abdullah Faculty of Computer Sciece ad Iformatio Techology, Uiversiti Putra Malaysia

More information

Service Oriented Enterprise Architecture and Service Oriented Enterprise

Service Oriented Enterprise Architecture and Service Oriented Enterprise Approved for Public Release Distributio Ulimited Case Number: 09-2786 The 23 rd Ope Group Eterprise Practitioers Coferece Service Orieted Eterprise ad Service Orieted Eterprise Ya Zhao, PhD Pricipal, MITRE

More information

WEBSITE STRUCTURE IMPROVEMENT USING ANT COLONY TECHNIQUE

WEBSITE STRUCTURE IMPROVEMENT USING ANT COLONY TECHNIQUE WEBSITE STRUCTURE IMPROVEMENT USING ANT COLONY TECHNIQUE Wiwik Aggraei 1, Agyl Ardi Rahmadi 1, Radityo Prasetyo Wibowo 1 1 Iformatio System Departmet, Faculty of Iformatio Techology, Istitut Tekologi Sepuluh

More information

S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea

S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea S. Mehta ad K.S. Kwak UWB Wireless Commuicatios Research Ceter, Iha Uiversity Icheo, 402-75, Korea suryaad.m@gmail.com ABSTRACT I this paper, we propose a hybrid medium access cotrol protocol (H-MAC) for

More information

Examples and Applications of Binary Search

Examples and Applications of Binary Search Toy Gog ITEE Uiersity of Queeslad I the secod lecture last week we studied the biary search algorithm that soles the problem of determiig if a particular alue appears i a sorted list of iteger or ot. We

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13

CIS 121 Data Structures and Algorithms with Java Spring Stacks and Queues Monday, February 12 / Tuesday, February 13 CIS Data Structures ad Algorithms with Java Sprig 08 Stacks ad Queues Moday, February / Tuesday, February Learig Goals Durig this lab, you will: Review stacks ad queues. Lear amortized ruig time aalysis

More information

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i

More information

Performance Plus Software Parameter Definitions

Performance Plus Software Parameter Definitions Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

Improved Random Graph Isomorphism

Improved Random Graph Isomorphism Improved Radom Graph Isomorphism Tomek Czajka Gopal Paduraga Abstract Caoical labelig of a graph cosists of assigig a uique label to each vertex such that the labels are ivariat uder isomorphism. Such

More information

A Polynomial Interval Shortest-Route Algorithm for Acyclic Network

A Polynomial Interval Shortest-Route Algorithm for Acyclic Network A Polyomial Iterval Shortest-Route Algorithm for Acyclic Network Hossai M Akter Key words: Iterval; iterval shortest-route problem; iterval algorithm; ucertaity Abstract A method ad algorithm is preseted

More information

EFFECT OF QUERY FORMATION ON WEB SEARCH ENGINE RESULTS

EFFECT OF QUERY FORMATION ON WEB SEARCH ENGINE RESULTS Iteratioal Joural o Natural Laguage Computig (IJNLC) Vol. 2, No., February 203 EFFECT OF QUERY FORMATION ON WEB SEARCH ENGINE RESULTS Raj Kishor Bisht ad Ila Pat Bisht 2 Departmet of Computer Sciece &

More information

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only Edited: Yeh-Liag Hsu (998--; recommeded: Yeh-Liag Hsu (--9; last updated: Yeh-Liag Hsu (9--7. Note: This is the course material for ME55 Geometric modelig ad computer graphics, Yua Ze Uiversity. art of

More information

APPLICATION NOTE. Automated Gain Flattening. 1. Experimental Setup. Scope and Overview

APPLICATION NOTE. Automated Gain Flattening. 1. Experimental Setup. Scope and Overview APPLICATION NOTE Automated Gai Flatteig Scope ad Overview A flat optical power spectrum is essetial for optical telecommuicatio sigals. This stems from a eed to balace the chael powers across large distaces.

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045 Oe Brookigs Drive St. Louis, Missouri 63130-4899, USA jaegerg@cse.wustl.edu

More information

BGP Attributes and Path Selection. ISP Training Workshops

BGP Attributes and Path Selection. ISP Training Workshops BGP Attributes ad Path Selectio ISP Traiig Workshops 1 BGP Attributes The tools available for the job 2 What Is a Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes the characteristics

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

On Multicast Scheduling and Routing in Multistage Clos Networks

On Multicast Scheduling and Routing in Multistage Clos Networks O Multicast Schedulig ad Routig i Multistage Clos Networks Bi Tag Departmet of Computer Sciece Stoy Brook Uiversity Stoy Brook, NY 794 bitag@cs.suysb.edu Abstract Multicast commuicatio, which ivolves trasmittig

More information

Math Section 2.2 Polynomial Functions

Math Section 2.2 Polynomial Functions Math 1330 - Sectio. Polyomial Fuctios Our objectives i workig with polyomial fuctios will be, first, to gather iformatio about the graph of the fuctio ad, secod, to use that iformatio to geerate a reasoably

More information

Ontology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection

Ontology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection 2017 Asia-Pacific Egieerig ad Techology Coferece (APETC 2017) ISBN: 978-1-60595-443-1 Otology-based Decisio Support System with Aalytic Hierarchy Process for Tour Pacage Selectio Tie-We Sug, Chia-Jug Lee,

More information

Big-O Analysis. Asymptotics

Big-O Analysis. Asymptotics Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses

More information

A PREDICTION MODEL FOR USER S SHARE ANALYSIS IN DUAL- SIM ENVIRONMENT

A PREDICTION MODEL FOR USER S SHARE ANALYSIS IN DUAL- SIM ENVIRONMENT GSJ: Computer Sciece ad Telecommuicatios 03 No.3(39) ISSN 5-3 A PRDICTION MODL FOR USR S SHAR ANALYSIS IN DUAL- SIM NVIRONMNT Thakur Sajay, Jai Parag Orietal Uiversity, Idore, Idia sajaymca00@yahoo.com

More information

Empirical Validate C&K Suite for Predict Fault-Proneness of Object-Oriented Classes Developed Using Fuzzy Logic.

Empirical Validate C&K Suite for Predict Fault-Proneness of Object-Oriented Classes Developed Using Fuzzy Logic. Empirical Validate C&K Suite for Predict Fault-Proeess of Object-Orieted Classes Developed Usig Fuzzy Logic. Mohammad Amro 1, Moataz Ahmed 1, Kaaa Faisal 2 1 Iformatio ad Computer Sciece Departmet, Kig

More information

Cubic Polynomial Curves with a Shape Parameter

Cubic Polynomial Curves with a Shape Parameter roceedigs of the th WSEAS Iteratioal Coferece o Robotics Cotrol ad Maufacturig Techology Hagzhou Chia April -8 00 (pp5-70) Cubic olyomial Curves with a Shape arameter MO GUOLIANG ZHAO YANAN Iformatio ad

More information

Low Complexity H.265/HEVC Coding Unit Size Decision for a Videoconferencing System

Low Complexity H.265/HEVC Coding Unit Size Decision for a Videoconferencing System BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 6 Special Issue o Logistics, Iformatics ad Service Sciece Sofia 2015 Prit ISSN: 1311-9702; Olie ISSN: 1314-4081 DOI:

More information

Descriptive Statistics Summary Lists

Descriptive Statistics Summary Lists Chapter 209 Descriptive Statistics Summary Lists Itroductio This procedure is used to summarize cotiuous data. Large volumes of such data may be easily summarized i statistical lists of meas, couts, stadard

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis IOSR Joural of Egieerig Redudacy Allocatio for Series Parallel Systems with Multiple Costraits ad Sesitivity Aalysis S. V. Suresh Babu, D.Maheswar 2, G. Ragaath 3 Y.Viaya Kumar d G.Sakaraiah e (Mechaical

More information

THE WAY OF CALCULATING THE TRAFFIC AND SIGNALING NETWORK DIMENSION OF COMMON CHANNEL SIGNALING NO.7 (CCS7)

THE WAY OF CALCULATING THE TRAFFIC AND SIGNALING NETWORK DIMENSION OF COMMON CHANNEL SIGNALING NO.7 (CCS7) The Way of Calculatig The Traffic... THE WAY OF CALCULATIG THE TRAFFIC AD SIGALIG ETWORK DIMESIO OF COMMO CHAEL SIGALIG O.7 (CCS7) Departeme Tekik Elektro, Fakultas Tekik, Uiversitas Sumatera Utara Abstract:

More information

On Nonblocking Folded-Clos Networks in Computer Communication Environments

On Nonblocking Folded-Clos Networks in Computer Communication Environments O Noblockig Folded-Clos Networks i Computer Commuicatio Eviromets Xi Yua Departmet of Computer Sciece, Florida State Uiversity, Tallahassee, FL 3306 xyua@cs.fsu.edu Abstract Folded-Clos etworks, also referred

More information

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem Exact Miimum Lower Boud Algorithm for Travelig Salesma Problem Mohamed Eleiche GeoTiba Systems mohamed.eleiche@gmail.com Abstract The miimum-travel-cost algorithm is a dyamic programmig algorithm to compute

More information

Multiprocessors. HPC Prof. Robert van Engelen

Multiprocessors. HPC Prof. Robert van Engelen Multiprocessors Prof. Robert va Egele Overview The PMS model Shared memory multiprocessors Basic shared memory systems SMP, Multicore, ad COMA Distributed memory multicomputers MPP systems Network topologies

More information

The isoperimetric problem on the hypercube

The isoperimetric problem on the hypercube The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

CHAPTER 4 A METHODOLOGY FOR THE PERFORMANCE MODELLING OF. A.J. Field and P.G. Harrison

CHAPTER 4 A METHODOLOGY FOR THE PERFORMANCE MODELLING OF. A.J. Field and P.G. Harrison 55.71.31 CHAPTER 4 A METHODOLOGY FOR THE PERFORMANCE MODELLING OF DISTRIBUTED CACHE COHERENT MULTIPROCESSORS A.J. Field ad P.G. Harriso 4.1. INTRODUCTION AND BACKGROUND I this chapter we preset a geeral

More information

Heuristic Approaches for Solving the Multidimensional Knapsack Problem (MKP)

Heuristic Approaches for Solving the Multidimensional Knapsack Problem (MKP) Heuristic Approaches for Solvig the Multidimesioal Kapsack Problem (MKP) R. PARRA-HERNANDEZ N. DIMOPOULOS Departmet of Electrical ad Computer Eg. Uiversity of Victoria Victoria, B.C. CANADA Abstract: -

More information

cell router mobile host

cell router mobile host In Mobile Computing, T. Imielinski and H. F. Korth eds., Kluwer Academic Publishers, 1996 22 STRATEGIES FOR QUERY PROCESSING IN MOBILE COMPUTING Masahiko TSUKAMOTO, Rieko KADOBAYASHI* and Shojiro NISHIO

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

Properties and Embeddings of Interconnection Networks Based on the Hexcube

Properties and Embeddings of Interconnection Networks Based on the Hexcube JOURNAL OF INFORMATION PROPERTIES SCIENCE AND AND ENGINEERING EMBEDDINGS OF 16, THE 81-95 HEXCUBE (2000) 81 Short Paper Properties ad Embeddigs of Itercoectio Networks Based o the Hexcube JUNG-SING JWO,

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

The golden search method: Question 1

The golden search method: Question 1 1. Golde Sectio Search for the Mode of a Fuctio The golde search method: Questio 1 Suppose the last pair of poits at which we have a fuctio evaluatio is x(), y(). The accordig to the method, If f(x())

More information

A Boolean Query Processing with a Result Cache in Mediator Systems

A Boolean Query Processing with a Result Cache in Mediator Systems A Boolea Query Processig with a Result Cache i Mediator Systems Jae-heo Cheog ad Sag-goo Lee * Departmet of Computer Sciece Seoul Natioal Uiversity Sa 56-1 Shillim-dog Kwaak-gu, Seoul Korea {cjh, sglee}cygus.su.ac.kr

More information

Sectio 4, a prototype project of settig field weight with AHP method is developed ad the experimetal results are aalyzed. Fially, we coclude our work

Sectio 4, a prototype project of settig field weight with AHP method is developed ad the experimetal results are aalyzed. Fially, we coclude our work 200 2d Iteratioal Coferece o Iformatio ad Multimedia Techology (ICIMT 200) IPCSIT vol. 42 (202) (202) IACSIT Press, Sigapore DOI: 0.7763/IPCSIT.202.V42.0 Idex Weight Decisio Based o AHP for Iformatio Retrieval

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

Fast Fourier Transform (FFT) Algorithms

Fast Fourier Transform (FFT) Algorithms Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform

More information

Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links

Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links Secure Software Upload i a Itelliget Vehicle via Wireless Commuicatio Liks Syed Masud Mahmud, Member, IEEE, Shobhit Shaker, Studet Member, IEEE Iria Hossai, Studet Member, IEEE Abstract The demad for drive-by-wire,

More information

Throughput-Delay Tradeoffs in Large-Scale MANETs with Network Coding

Throughput-Delay Tradeoffs in Large-Scale MANETs with Network Coding Throughput-Delay Tradeoffs i Large-Scale MANETs with Network Codig Chi Zhag ad Yuguag Fag Departmet of Electrical ad Computer Egieerig Uiversity of Florida, Gaiesville, FL 326 Email: {zhagchi@, fag@ece.}ufl.edu

More information

Protected points in ordered trees

Protected points in ordered trees Applied Mathematics Letters 008 56 50 www.elsevier.com/locate/aml Protected poits i ordered trees Gi-Sag Cheo a, Louis W. Shapiro b, a Departmet of Mathematics, Sugkyukwa Uiversity, Suwo 440-746, Republic

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

DATA MINING II - 1DL460

DATA MINING II - 1DL460 DATA MINING II - 1DL460 Sprig 2017 A secod course i data miig http://www.it.uu.se/edu/course/homepage/ifoutv2/vt17/ Kjell Orsbor Uppsala Database Laboratory Departmet of Iformatio Techology, Uppsala Uiversity,

More information

n n B. How many subsets of C are there of cardinality n. We are selecting elements for such a

n n B. How many subsets of C are there of cardinality n. We are selecting elements for such a 4. [10] Usig a combiatorial argumet, prove that for 1: = 0 = Let A ad B be disjoit sets of cardiality each ad C = A B. How may subsets of C are there of cardiality. We are selectig elemets for such a subset

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

CSC165H1 Worksheet: Tutorial 8 Algorithm analysis (SOLUTIONS)

CSC165H1 Worksheet: Tutorial 8 Algorithm analysis (SOLUTIONS) CSC165H1, Witer 018 Learig Objectives By the ed of this worksheet, you will: Aalyse the ruig time of fuctios cotaiig ested loops. 1. Nested loop variatios. Each of the followig fuctios takes as iput a

More information

New HSL Distance Based Colour Clustering Algorithm

New HSL Distance Based Colour Clustering Algorithm The 4th Midwest Artificial Itelligece ad Cogitive Scieces Coferece (MAICS 03 pp 85-9 New Albay Idiaa USA April 3-4 03 New HSL Distace Based Colour Clusterig Algorithm Vasile Patrascu Departemet of Iformatics

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1 Adaptive Graph Partitioig Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, ad W. J. Dewar 1 1 School of Electrical Egieerig Uiversity of New South Wales, Australia 2 Divisio of Radiophysics

More information

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana

The Closest Line to a Data Set in the Plane. David Gurney Southeastern Louisiana University Hammond, Louisiana The Closest Lie to a Data Set i the Plae David Gurey Southeaster Louisiaa Uiversity Hammod, Louisiaa ABSTRACT This paper looks at three differet measures of distace betwee a lie ad a data set i the plae:

More information

Guaranteeing Hard Real Time End-to-End Communications Deadlines

Guaranteeing Hard Real Time End-to-End Communications Deadlines Guarateeig Hard Real Time Ed-to-Ed Commuicatios Deadlies K. W. Tidell A. Burs A. J. Welligs Real Time Systems Research Group Departmet of Computer Sciece Uiversity of York e-mail: ke@mister.york.ac.uk

More information