A Multistart Randomized Greedy Algorithm for Traffic Grooming on Mesh Logical Topologies

Size: px
Start display at page:

Download "A Multistart Randomized Greedy Algorithm for Traffic Grooming on Mesh Logical Topologies"

Transcription

1 Tehnial Report Università di Trento, Diembre A Multistart Randomized Greedy Algorithm for Traffi Grooming on Mesh Logial Topologies Mauro Brunato Roberto Battiti Deember 11, 001 Abstrat In this paper we onsider a logial topology design problem on DWDM optial networks where the traffi is quantized at sub-wavelength resolution and the ritial fator to determine the fitness of a solution is the number of lightpaths required, that is proportional to the number of hardware modules to handle the traffi. The problem has been shown to be NP-hard. We review some of the previous work in the field, examine a number of regular but unsatisfatory solutions and desribe a greedy-based iterated heuristi belonging to the GRASP family to minimize the number of lightpaths. At the end we present some experimental results that ompare our GRASP heuristi with other greedy-based methods and with regular topologies. Keywords Logial topology design, Traffi grooming, Optimization algorithms, GRASP 1 Introdution Signifiant advanes in optial ommuniations tehnology are leading to the reation of optial Wide Area Networks (WANs) with large link apaity. With the introdution of the Dense Wavelength Division Multiplexing (DWDM) tehnology, the whole bandwidth of every fiber is potentially available for transmission, as many independent signals an be aommodated on the same physial link by using densely paked adjaent wavelengths. The link between two nodes in a WAN is omposed of a thik bundle of fibers, usually in the hundreds; ommerial systems allowing a few hundreds of DWDM wavelength arriers per fiber have already beome available, and eah arrier has a data transmission speed of various Gigabits per seond. On the other hand, every single wavelength needs fairly expensive hardware equipment to be exploited (a tunable laser, a photodetetor, fast eletronis). Università di Trento Dipartimento di Matematia, via Sommarive 14 I Pantè di Povo (TN) ITALY brunato battiti@siene.unitn.it

2 b a 5 a b Photodiode Laser 4 a b a b 1 Node Eletroni Loal add/drop data router 3 a b Loal network / omputer Figure 1: A network node However, many low-bandwidth appliations do not require a whole wavelength arrier; to allow a better traffi optimization link traffi should be quantized below the wavelength level by using Time Division Multiplexing (TDM). Paking many traffi units into less wavelengths is an effetive way to redue the number of hardware omponents, hene to ut off the overall ost. As a onsequene, tehnologial onerns shift from improving the amount of bandwidth to the redution of hardware ost through areful resoure optimization. Another advantage of the DWDM tehnology is that it allows a limited amount of stati routing without eletroni onversion. Upon arriving into a node, the signal travelling through a fiber is split into its omposing wavelengths (see Fig. 1). Every wavelength an be treated in a different way: some of them are onverted into eletroni format for loal treatment or for traditional routing, some other wavelengths are relayed through an internal fiber diretly to an output fiber for retransmission. It is possible to set up a so-alled lightpath, i.e. a diret onnetion between nonadjaent nodes ating as a logial one-hop link, where all intermediate nodes are transparent to it. Transpareny of intermediate nodes is ruial in order to abstrat the atual data flow pattern, alled the logial or virtual topology and depending on lightpaths, from the physial fiber onnetion layer [6]. Traffi handling tehniques inluding multiplexing and onversions of signals are olletively known as grooming tehniques [1]. In partiular, in the following setions the term grooming will refer to the at of merging many low-bandwidth traffi onnetions into a single wavelength by way of TDM. Most studies about grooming tehniques are foused onto the urrent optial infrastruture based on SONET/SDH rings. Many problems are addressed in this ontext. Among them, the above ited ost redution problem has been introdued in [9, 8, 10] and a relevant researh effort is still being spent on the subjet with the proposal and

3 evaluation of heuristi methods [14, 18, 3, 5,, 19, 4] under various assumptions about tehnologial devie availability, ring flexibility and traffi requirements. Grooming methods for general topologies have been disussed in [11], where the problem is treated as an Integer Linear Program and solved as a multiommodity flow problem for limited dimensions of the instanes. The fous of this work is to study the effiay of greedy and iterated greedy algorithms in a simplified ontext. Therefore we shall only onsider logial topology design, with no onern about its implementation on the physial layer. In other words, we assume that mapping a logial topology onto the physial layer is always feasible as in [11]. In a pratial appliation this an be the ase if abundant fibers have been installed, whih is the ase of many wide and metropolitan area networks. In a future extension of this work we will present problem formulations where the atual realization of the logial topology on a given physial topology is also onsidered. The problem of logial topology design originates from the introdution of ATM networks and was reently boosted by introdution of an optial layer in digital paketswithed networks [7, 15] and, later, by the eventual introdution of all-optial systems [13, 1] and by the strong need of a speifi IP-aware optial infrastruture [17]. The proposed optimization tehnique, is based on GRASP (Greedy Randomized Adaptive Searh Proedure). GRASP is a metaheuristi for ombinatorial optimization. GRASP usually is implemented as a multistart proedure, where eah iteration is made up of a onstrution phase, where a randomized greedy solution is onstruted, and a loal searh phase whih starts at the onstruted solution and applies iterative improvement until a loally optimal solution is found [16]. In Setion we state the problem that we to onsider; in Setion 3 we provide a few simple theoretial results suh as lower bounds and values for regular topologies. Next, in Setion 4 we introdue and disuss some optimization heuristis and we analyze some experimental results in Setion 5. Traffi grooming in logial topologies Suppose we have a network with N nodes. We are not onerned with the physial topology of the network, although we assume that it is onneted, i.e. it is always possible to establish a ommuniation path between any two nodes. We are also given a stati traffi pattern in the form of a matrix (T ij ) whose entry T ij ontains the number of traffi units required for ommuniations from node i to node j. A traffi unit is the unit of bandwidth onsidered, and all ommuniation requirements are given as multiples of it. We want to set up a logial topology, i.e. a set of lightpaths between nodes, in order to satisfy all traffi requirements, onsidering that every lightpath an arry at most time-multiplexed traffi units. Given a lightpath P from node i to node j, we define node i as its soure, i = sr(p ), and the node j as its destination, j = dest(p ). Many different lightpaths may have the same soure and destination, to fulfill traffi requirements. A hain of lightpaths from node i to node j is a simple walk in the lightpath graph, i.e. a sequene of lightpaths P = (P 1,..., P n ) suh that: 3

4 a 1 b e d 3 4 Figure : A logial topology over 4 nodes the first lightpath originates from node i: sr(p 1 ) = i, the last lightpath ends into node j: dest(p n ) = j, and two subsequent lightpaths join at the same node: k = 1,..., n 1 dest(p k ) = sr(p k+1 ). A traffi unit from node i to node j an be routed diretly through a lightpath established from i to j, or it an be routed through a onatenation of lightpaths from i to j. For example, if N = 4 we ould design the topology in Fig., where two lightpaths are established through nodes 1 and. Traffi between nodes 1 and 4 may be routed through a onatenation of lightpaths, while traffi from to 4 may be routed in many different ways. Note that we are not onerned with the atual implementation of the lightpaths, i.e. the mapping of the logial topology onto the physial links. For example, the atual onfiguration ould be that shown in Fig. 3; however, we suppose that the physial link apaity is enough to arry any reasonable logial topology and that the intermediate nodes traversed by a lightpath in the physial layer are ompletely transparent to the lightpath. Given nodes i and j, the k-th traffi unit from i to j (k = 1,..., T ij ) shall be routed through a hain of lightpaths P ijk, made of one or more lightpaths, originating from i and ending in j. A routing assignment (P ijk ) i,j=1,...,n;k=1,...,tij is suitable if no lightpath appears more than times. Our objetive is to minimize the number of lightpaths needed by the logial topology: this is equivalent to minimizing the number of ritial eletroni omponents, whih is our main goal. The problem an be stated as follows. LOGICAL GROOMING PROBLEM given a set of N nodes, a traffi pattern (T ij ) and a lightpath apaity, find a suitable logial topology and a 4

5 3 1 a e d b 4 Figure 3: A mapping of the logial topology onto the physial layer routing assignment for eah traffi unit suh that the number of lightpaths is minimum. 3 Exat results In the following setion we derive a lower bound for the number of lightpaths in any problem instane. We also onsider some regular topologies and derive exat results for the number of lightpaths required in these ases. However, none of these solutions is near-optimal, and in Se. 4 we shall introdue heuristis to obtain more satisfatory topologies. 3.1 Lower bound The overall traffi arried by the network is, trivially, N i=1 j=1 N T ij. If every lightpath ould be ompletely filled with traffi units, and no traffi needed to be routed through more than 1 lightpath, then the number of lightpaths needed would be N N i=1 j=1 LB = T ij. This number represents a lower bound for the number of lightpaths. In fat, if less than LB lightpaths were used then at least one traffi unit ould not fit. In ase of uniform traffi T ij = T, i j, this means that the least number of wavelengths is T N(N 1) LB uniform =, 5

6 whih results in a lower bound of 1 lightpaths for T = 3, N = 8 and = Simple ases 3..1 Complete topology One lightpath per ouple of nodes, hop distane is 1 for every onnetion. Number of lightpaths for onnetion (i, j) is Tij L ij =. The total number of lightpaths is N N i=1 j=1 Tij For instane, if T ij = 3 for i j, = 8 and N = 8, the total number of lightpaths is 7 8 = Star topology All lightpaths having a speial node (e.g. node 1) as an endpoint. Edge (i, 1), i =,..., N, arries all traffi outgoing from node i, and thus requires N j=1 T ij lightpaths. Inoming traffi to node i is arried by edge (1, i), requiring N j=1 T ji lightpaths. In the ase of uniform traffi T, edge (i, 1) arries traffi T (N 1), thus requiring L i1 = T (N 1)/ outgoing lightpaths. For the same reason, eah of the N 1 peripheral nodes requires L 1i = L i1 inoming lightpaths, so the overall number of lightpaths is T (N 1) (N 1), whih leads to 4 lightpaths for 8 nodes and traffi equal to 3 units per node pair Unidiretional ring topology In this ase node i, i = 1,..., N 1, is onneted to node i + 1, while node N is onneted to node 1. Let us label the nodes with their soure edge labels; the overall traffi arried by edge i, i = 1,..., N, is C i = h=1 k=i+1. ( i N ) i 1 T hk + T hk + k=1 6 h 1 h=i+ k=i+1 T hk.

7 1. funtion assignpath (node i, node j) returns lightpathchain. find shortest existing lightpath hain LPC 3. from i to j with non-null spare load 4. if not found LPC 5. P new lightpath from i to j 6. LPC = single hop hain (P) 7. return LPC Figure 4: the basi Greedy move So the number of required lightpaths is Ci if j = (i mod N) + 1 L ij = 0 otherwise. In the ase with uniform traffi T ij = T, i j, every node (i, i + 1) is rossed by a path of length 1 (the ommuniations from node i to node i + 1), two paths of length and so on, up to N 1 paths of length N 1. So the total load of an edge is T ( (N 1)) = T N(N 1). Thus the omplete number of lightpaths required is T N(N 1) if j = (i mod N) + 1 L ij = 0 otherwise. There are exatly N edges on the ring, so the total number of lightpaths is T N(N 1) N, aounting for 88 lightpaths if T = 3, N = 8 and = 8. 4 Greedy and Iterated Greedy shemes In the following, every lightpath is assoiated to a load, an integer value reporting the number of traffi unit routed to that lightpath. The spare load of a lightpath is the apaity minus its urrent load, and aounts for the number of traffi units that an be added to the lightpath before saturating it. The spare load of a lightpath hain is the smallest spare load of its omponent lightpaths. The basi omponent of our greedy sheme is funtion assignpath, shown in Fig. 4, whih tries to alloate a hain of lightpaths to a traffi unit going from node i to node j. 7

8 1. funtion setgreedytopology. erase all lightpaths and all routing information 3. for eah ouple of nodes (i, j) in random order 4. for eah traffi unit t {1,..., T[i][j]} 5. LPC assignpath (i, j) 6. route traffi unit t from node i to node j through LPC 7. for eah lightpath P in LPC 8. inrease load in P by 1 Figure 5: the Greedy topology algorithm The funtion exeutes a breadth-first searh from node i through the logial topology graph that is under onstrution until it gets to node j. Only lightpaths having spare apaity of at least 1 are onsidered (lines -3). If no lightpath hain an be determined (line 4), a new lightpath is reated from node i to node j (line 5) and the lightpath hain is instantiated to that single path (line 6). The overall greedy algorithm, whih is shown in Fig. 5, begins by resetting all load and routing information (line ) in order to start the assignment from srath. Then for eah ouple of nodes and eah traffi unit it invokes funtion assignpath (line 5) to retrieve a lightpath hain suitable for routing that traffi unit. Then it sets all routing information needed to use the lightpath hain (line 6) and it inreases the load of every lightpath in it by 1 (lines 7-8). The basi idea of our greedy sheme is that, whenever we need to alloate a route for a traffi unit, we want to use residual traffi apaity if possible (so that no new lightpaths must be reated), otherwise we prefer a new lightpath with many spare units of traffi in the hope that future traffi alloations will use it. Of ourse this heuristi is not optimal. This an be seen experimentally (Se. 5) and theoretially, as the NP-hard multiommodity flow problem an be redued to this problem [11]. In partiular, earlier assignments annot take advantage of lightpaths that have been reated only later (this is the main problem with all greedy shemes), so some lightpaths are eventually underused. To allow older assignments to take advantage of all lightpaths that have been reated, we an repeatedly apply the same greedy sheme without restarting from srath eah time; as we an see in Fig. 6, for eah ouple of nodes we forget everything about their routing assignment while keeping all other lightpaths (lines 4-9), and rebuild it just as we did in the greedy sheme (lines 11-14). This time, however, all other ouples of nodes mintain their urrent assignment, so many lightpaths are available when a suitable route mst be found from i to j. By implementing the greedy sheme, followed by repeated appliation of the GRASPIteration funtion, we obtain an iterated optimization sheme similar to the GRASP tehnique [16]. In our ase the proedure starts in a feasible state obtained by a greedy funtion. This funtion s randomness lies in the order the nodes are onsidered. Also the iteration sheme has some amount of randomness beause of node ordering. 8

9 1. funtion GRASPIteration. for eah ouple of nodes (i, j) in random order 3. for eah traffi unit t {1,..., T[i][j]} 4. LPC routing of traffi unit t from node i to node j 5. for eah lightpath P in LPC 6. derease load of P by 1 7. if load of P is null 8. delete lightpath P 9. forget routing of traffi unit t from node i to node j 10. for eah traffi unit t {1,..., T[i][j]} 11. LPC assignpath (i, j) 1. route traffi unit t from node i to node j through LPC 13. for eah lightpath P in LPC 14. inrease load in P by 1 5 Experimental results Figure 6: the GRASP iteration algorithm We have implemented the greedy and GRASP algorithms as disussed in Se. 4 in C++, and we applied them to various types of traffi. In partiular, we hose to onsider a uniform pattern where traffi between eah pair of nodes is onstantly equal to 3 or 5, and a server-type traffi where all node pairs have a unit traffi requirement unless the soure node is one of three designated servers,in whih ase the required traffi is 10 units. In the first ase the traffi matrix is uniform; in the seond ase, all entries are equal to 1 with the exeption of three rows, equal to 10. In both ases the diagonal is null T uniform =.... T server = As a possible andidate for an alternate startup funtion we also implemented a random assignment funtion suh that for every ouple of nodes and every traffi unit a random lightpath hain was determined. In Figures 7 and 8 we show the omparison among the greedy and random setup shemes, the two orresponding GRASP tehniques (random- and greedy-initiated) and the regular star topology disussed in Se. 3. Eah value shown is the average of five runs; the iterated shemes were run times. The x axis represents the size of the network, while the y axis indiates the number of lightpaths that were established by the algorithm. In this ase, the algorithms had another onstraint: as traffi is symmetri, we also keep a symmetri routing sheme by iterating through node ouples (i, j) suh 9

10 Random Greedy Star Random-fed GRASP Greedy-fed GRASP Lower Bound Number of lightpaths Nodes Figure 7: Uniform traffi, 3 traffi units per node pair, symmetri routing that i < j. In fat, in the ase of symmetri traffi we ould use full-duplex optial links [11]. One run of GRASP iterations on a problem instane with uniform traffi equal to 5 and 0 nodes took 11 seonds on a Pentium III Windows mahine with a GNU ompiler and the Cygwin Unix API emulation libraries. However, we have no evidene that suh a large number of iterations is neessary: in fat, the minimum was always reahed in the first 100 iterations. Further investigation will allow us to identify a suitable number of iterations for eah ase. In both ases (traffi 3 and 5), the greedy algorithm performs better than the random sheme. However, when the GRASP sheme is used the initial assignment is not important and the two urves overlap almost perfetly. In partiular, when the traffi is equal to 5 the greedy-initiated GRASP sheme improves the solution by 10% in the 5-node ase, up to 3% in larger graphs. Even though the star topology allows a lower number of lightpaths when ompared to the greedy and random shemes, we have verified that, when used to initialize the GRASP algorithm, it does not lead to better results. Moreover, it has no randomness in it, so it is not suitable as a starting point for our searh proedure. In the ase of server traffi, the symmetry onstraint was not applied, and the results are shown in Fig. 9. In this ase, too, the greedy sheme outperforms random assignment, but this is ininfluent when the GRASP algorithm is applied. 10

11 10000 Random Greedy Star Random-fed GRASP Greedy-fed GRASP Lower Bound Number of lightpaths Nodes Figure 8: Uniform traffi, 5 traffi units per node pair, symmetri routing Conlusions We have onsidered a logial topology design problem where the lassial routing problem is omplemented with sub-wavelength resolution of traffi. As far as we know, this problem was onsidered for mesh networks only in [11], while the two separate problems have been vastly analyzed in the literature (see Se. 1). We have analyzed a few regular topologies and we have defined an iterated greedy sheme. Experimental analysis has shown a greater improvement over simple greedy, random and regular topologies when applied to regular traffi shemes and simple server traffi models. At present, the omplete network is revised at every step of our GRASP approah. Future work will be dediated to experimenting Loal Searh tehniques to allow a smoother transition of the network logial topology towards the minimum, and possibly the ability to serve dynamially haning traffi patterns while limiting the amount of lightpath reorganization required at every step. Referenes [1] Rihard Barr and Raymond A. Patterson. Grooming teleommuniations networks. Optial Networks Magazine, (3), 001. [] Roberto Battiti and Mauro Brunato. Reative searh for traffi grooming in WDM networks. In S. Palazzo, editor, Proeedings of IWDC001, Leture Notes in Computer Siene. Springer-Verlag, September

12 1000 Random Greedy Random-fed GRASP Greedy-fed GRASP Number of lightpaths Nodes Figure 9: Server traffi [3] Randall Berry and Eytan H. Modiano. Reduing eletroni multiplexing osts in SONET/WDM rings with dynamially hanging traffi. IEEE Journal on seleted areas in ommuniations, 18(10): , Otober 000. [4] Gruia Călinesu and Peng-Jun Wan. Traffi partition in WDM/SONET rings to minimize SONET ADMs. In IWST 001, 001, to appear. [5] Angela L. Chiu and Eytan H. Modiano. Traffi grooming algorithms for reduing eletroni multiplexing osts in WDM ring networks. IEEE Journal of Lightwave Tehnology, 18(1): 1, January 000. [6] I. Chlamta, A. Ganz, and G. Karmi. Lightpath ommuniations: A novel approah to high bandwidth optial WANs. IEEE Transations on Communiations, 40(7): , 199. [7] Aura Ganz and Xudong Wang. Effiient algorithm for virtual topology design in multihop lightwave networks. IEEE/ACM Transations on Networking, (3):17 5, June [8] Gerstel, Lin, and Sasaki. Wavelength assignment in a WDM ring to minimize the ost of embedded SONET rings. In INFOCOM1998, [9] Gerstel and Ramaswami. Cost effetive grooming in wdm rings. In INFO- COM1998, [10] Ornan Gerstel, Rajiv Ramaswami, and Galen H. Sasaki. Cost-effetive traffi grooming in WDM rings. IEEE/ACM Transations on Networking, 8(5): , Otober

13 [11] V. R. Konda and T. Y. Chow. Algorithm for traffi grooming in optial networks to minimize the number of transeivers. In IEEE HPSR001, 001. [1] Rajesh M. Krishnaswami and Kumar N Sivarajan. Design of logial topologies: A linear formulation for wavelength routers with no wavelength hangers. IEEE/ACM Transations on Networking, 9(): , April 001. [13] Emilio Leonardi, Maro Mellia, and Maro Ajmone Marsan. Algortihms for the topology design in WDM all-optial networks. Optial Networks Magazine, 1(1):35 46, January 000. [14] Liwu Liu, Xiangyang Li, Peng-Jun Wan, and Ophir Frieder. Wavelength assignment in WDM rings to minimize SONET ADMs. In INFOCOM 000, pages , 000. [15] Rajiv Ramaswami and Kumar N. Sivarajan. Design of logial topologies for wavelength-routed optial networks. In INFOCOM1995, [16] Mauriio G. C. Resende and Celso C. Ribeiro. Greedy randomized adaptive searh proedures. In F. Glover and G. Kohenberger, editors, State-of-the-Art Handbook in Metaheuristis. Kluwer Aademi Publisher, 001. To appear. [17] D. A. Shupke and D. Sellier. Lightpath onfiguration of transparent and stati WDM networks for IP traffi. In ICC001, 001. [18] Peng-Jun Wan, Gruia Călinesu, Liwu Liu, and Ophir Frieder. Grooming of arbitrary traffi in SONET/WDM BLSRs. IEEE Journal on Seleted Areas in Communiations, 18(10): , Otober 000. [19] Xijun Zhang and Chunming Qiao. An effetive and omprehensive approah for traffi grooming and wavelength assignment in SONET/WDM rings. IEEE/ACM Transations on Networking, 8(5): , Otober

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425) Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University

More information

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based

More information

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks

A Dual-Hamiltonian-Path-Based Multicasting Strategy for Wormhole-Routed Star Graph Interconnection Networks A Dual-Hamiltonian-Path-Based Multiasting Strategy for Wormhole-Routed Star Graph Interonnetion Networks Nen-Chung Wang Department of Information and Communiation Engineering Chaoyang University of Tehnology,

More information

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem

Calculation of typical running time of a branch-and-bound algorithm for the vertex-cover problem Calulation of typial running time of a branh-and-bound algorithm for the vertex-over problem Joni Pajarinen, Joni.Pajarinen@iki.fi Otober 21, 2007 1 Introdution The vertex-over problem is one of a olletion

More information

Multi-Channel Wireless Networks: Capacity and Protocols

Multi-Channel Wireless Networks: Capacity and Protocols Multi-Channel Wireless Networks: Capaity and Protools Tehnial Report April 2005 Pradeep Kyasanur Dept. of Computer Siene, and Coordinated Siene Laboratory, University of Illinois at Urbana-Champaign Email:

More information

Gray Codes for Reflectable Languages

Gray Codes for Reflectable Languages Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings

More information

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless

More information

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks

A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks A Partial Sorting Algorithm in Multi-Hop Wireless Sensor Networks Abouberine Ould Cheikhna Department of Computer Siene University of Piardie Jules Verne 80039 Amiens Frane Ould.heikhna.abouberine @u-piardie.fr

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

Particle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating

Particle Swarm Optimization for the Design of High Diffraction Efficient Holographic Grating Original Artile Partile Swarm Optimization for the Design of High Diffration Effiient Holographi Grating A.K. Tripathy 1, S.K. Das, M. Sundaray 3 and S.K. Tripathy* 4 1, Department of Computer Siene, Berhampur

More information

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis

More information

Approximate logic synthesis for error tolerant applications

Approximate logic synthesis for error tolerant applications Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu

More information

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer

More information

Chapter 2: Introduction to Maple V

Chapter 2: Introduction to Maple V Chapter 2: Introdution to Maple V 2-1 Working with Maple Worksheets Try It! (p. 15) Start a Maple session with an empty worksheet. The name of the worksheet should be Untitled (1). Use one of the standard

More information

This fact makes it difficult to evaluate the cost function to be minimized

This fact makes it difficult to evaluate the cost function to be minimized RSOURC LLOCTION N SSINMNT In the resoure alloation step the amount of resoures required to exeute the different types of proesses is determined. We will refer to the time interval during whih a proess

More information

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems

Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Methods for Multi-Dimensional Robustness Optimization in Complex Embedded Systems Arne Hamann, Razvan Rau, Rolf Ernst Institute of Computer and Communiation Network Engineering Tehnial University of Braunshweig,

More information

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking

Algorithms for External Memory Lecture 6 Graph Algorithms - Weighted List Ranking Algorithms for External Memory Leture 6 Graph Algorithms - Weighted List Ranking Leturer: Nodari Sithinava Sribe: Andi Hellmund, Simon Ohsenreither 1 Introdution & Motivation After talking about I/O-effiient

More information

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department

More information

Implementing Load-Balanced Switches With Fat-Tree Networks

Implementing Load-Balanced Switches With Fat-Tree Networks Implementing Load-Balaned Swithes With Fat-Tree Networks Hung-Shih Chueh, Ching-Min Lien, Cheng-Shang Chang, Jay Cheng, and Duan-Shin Lee Department of Eletrial Engineering & Institute of Communiations

More information

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY Dileep P, Bhondarkor Texas Instruments Inorporated Dallas, Texas ABSTRACT Charge oupled devies (CCD's) hove been mentioned as potential fast auxiliary

More information

Cluster-Based Cumulative Ensembles

Cluster-Based Cumulative Ensembles Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis

Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis Journal of Computer Siene 4 (): 9-97, 008 ISSN 549-3636 008 Siene Publiations Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis Deepti Gaur, Aditya Shastri and Ranjit Biswas Department of Computer

More information

Parametric Abstract Domains for Shape Analysis

Parametric Abstract Domains for Shape Analysis Parametri Abstrat Domains for Shape Analysis Xavier RIVAL (INRIA & Éole Normale Supérieure) Joint work with Bor-Yuh Evan CHANG (University of Maryland U University of Colorado) and George NECULA (University

More information

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm

More information

The Implementation of RRTs for a Remote-Controlled Mobile Robot

The Implementation of RRTs for a Remote-Controlled Mobile Robot ICCAS5 June -5, KINEX, Gyeonggi-Do, Korea he Implementation of RRs for a Remote-Controlled Mobile Robot Chi-Won Roh*, Woo-Sub Lee **, Sung-Chul Kang *** and Kwang-Won Lee **** * Intelligent Robotis Researh

More information

HEXA: Compact Data Structures for Faster Packet Processing

HEXA: Compact Data Structures for Faster Packet Processing Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for

More information

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1. Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,

More information

CleanUp: Improving Quadrilateral Finite Element Meshes

CleanUp: Improving Quadrilateral Finite Element Meshes CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)

More information

A {k, n}-secret Sharing Scheme for Color Images

A {k, n}-secret Sharing Scheme for Color Images A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University

More information

Exploring the Commonality in Feature Modeling Notations

Exploring the Commonality in Feature Modeling Notations Exploring the Commonality in Feature Modeling Notations Miloslav ŠÍPKA Slovak University of Tehnology Faulty of Informatis and Information Tehnologies Ilkovičova 3, 842 16 Bratislava, Slovakia miloslav.sipka@gmail.om

More information

Partial Character Decoding for Improved Regular Expression Matching in FPGAs

Partial Character Decoding for Improved Regular Expression Matching in FPGAs Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia

More information

Accommodations of QoS DiffServ Over IP and MPLS Networks

Accommodations of QoS DiffServ Over IP and MPLS Networks Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering

More information

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks 62 Uplink Channel Alloation Sheme and QoS Management Mehanism for Cognitive Cellular- Femtoell Networks Kien Du Nguyen 1, Hoang Nam Nguyen 1, Hiroaki Morino 2 and Iwao Sasase 3 1 University of Engineering

More information

A Wavelength Assignment Heuristic to Minimize SONET ADMs in WDM rings

A Wavelength Assignment Heuristic to Minimize SONET ADMs in WDM rings A Wavelength Assignment Heuristic to Minimize SONET ADMs in WDM rings Xin Yuan Amit Fulay Department of Computer Science Florida State University Tallahassee, FL 32306 {xyuan, fulay}@cs.fsu.edu Abstract

More information

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization Self-Adaptive Parent to Mean-Centri Reombination for Real-Parameter Optimization Kalyanmoy Deb and Himanshu Jain Department of Mehanial Engineering Indian Institute of Tehnology Kanpur Kanpur, PIN 86 {deb,hjain}@iitk.a.in

More information

Detection and Recognition of Non-Occluded Objects using Signature Map

Detection and Recognition of Non-Occluded Objects using Signature Map 6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,

More information

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive

More information

An Efficient and Scalable Approach to CNN Queries in a Road Network

An Efficient and Scalable Approach to CNN Queries in a Road Network An Effiient and Salable Approah to CNN Queries in a Road Network Hyung-Ju Cho Chin-Wan Chung Dept. of Eletrial Engineering & Computer Siene Korea Advaned Institute of Siene and Tehnology 373- Kusong-dong,

More information

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

1 The Knuth-Morris-Pratt Algorithm

1 The Knuth-Morris-Pratt Algorithm 5-45/65: Design & Analysis of Algorithms September 26, 26 Leture #9: String Mathing last hanged: September 26, 27 There s an entire field dediated to solving problems on strings. The book Algorithms on

More information

Cluster-based Cooperative Communication with Network Coding in Wireless Networks

Cluster-based Cooperative Communication with Network Coding in Wireless Networks Cluster-based Cooperative Communiation with Network Coding in Wireless Networks Zygmunt J. Haas Shool of Eletrial and Computer Engineering Cornell University Ithaa, NY 4850, U.S.A. Email: haas@ee.ornell.edu

More information

Improved flooding of broadcast messages using extended multipoint relaying

Improved flooding of broadcast messages using extended multipoint relaying Improved flooding of broadast messages using extended multipoint relaying Pere Montolio Aranda a, Joaquin Garia-Alfaro a,b, David Megías a a Universitat Oberta de Catalunya, Estudis d Informàtia, Mulimèdia

More information

Sequential Incremental-Value Auctions

Sequential Incremental-Value Auctions Sequential Inremental-Value Autions Xiaoming Zheng and Sven Koenig Department of Computer Siene University of Southern California Los Angeles, CA 90089-0781 {xiaominz,skoenig}@us.edu Abstrat We study the

More information

Performance Benchmarks for an Interactive Video-on-Demand System

Performance Benchmarks for an Interactive Video-on-Demand System Performane Benhmarks for an Interative Video-on-Demand System. Guo,P.G.Taylor,E.W.M.Wong,S.Chan,M.Zukerman andk.s.tang ARC Speial Researh Centre for Ultra-Broadband Information Networks (CUBIN) Department

More information

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University

More information

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering

A Novel Bit Level Time Series Representation with Implication of Similarity Search and Clustering A Novel Bit Level Time Series Representation with Impliation of Similarity Searh and lustering hotirat Ratanamahatana, Eamonn Keogh, Anthony J. Bagnall 2, and Stefano Lonardi Dept. of omputer Siene & Engineering,

More information

Making Light Work of the Future IP Network

Making Light Work of the Future IP Network Making Light Work of the Future IP Network HPSR 2002, Kobe Japan, May 28, 2002 Ken-ihi Sato NTT Network Innovation Laboratories Transmission apaity inrease has been signifiant sine the introdution of optial

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method 3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr

More information

Detection of RF interference to GPS using day-to-day C/No differences

Detection of RF interference to GPS using day-to-day C/No differences 1 International Symposium on GPS/GSS Otober 6-8, 1. Detetion of RF interferene to GPS using day-to-day /o differenes Ryan J. R. Thompson 1#, Jinghui Wu #, Asghar Tabatabaei Balaei 3^, and Andrew G. Dempster

More information

The AMDREL Project in Retrospective

The AMDREL Project in Retrospective The AMDREL Projet in Retrospetive K. Siozios 1, G. Koutroumpezis 1, K. Tatas 1, N. Vassiliadis 2, V. Kalenteridis 2, H. Pournara 2, I. Pappas 2, D. Soudris 1, S. Nikolaidis 2, S. Siskos 2, and A. Thanailakis

More information

Distributed Resource Allocation Strategies for Achieving Quality of Service in Server Clusters

Distributed Resource Allocation Strategies for Achieving Quality of Service in Server Clusters Proeedings of the 45th IEEE Conferene on Deision & Control Manhester Grand Hyatt Hotel an Diego, CA, UA, Deember 13-15, 2006 Distributed Resoure Alloation trategies for Ahieving Quality of ervie in erver

More information

Alleviating DFT cost using testability driven HLS

Alleviating DFT cost using testability driven HLS Alleviating DFT ost using testability driven HLS M.L.Flottes, R.Pires, B.Rouzeyre Laboratoire d Informatique, de Robotique et de Miroéletronique de Montpellier, U.M. CNRS 5506 6 rue Ada, 34392 Montpellier

More information

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT?

3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? 3-D IMAGE MODELS AND COMPRESSION - SYNTHETIC HYBRID OR NATURAL FIT? Bernd Girod, Peter Eisert, Marus Magnor, Ekehard Steinbah, Thomas Wiegand Te {girod eommuniations Laboratory, University of Erlangen-Nuremberg

More information

Make your process world

Make your process world Automation platforms Modion Quantum Safety System Make your proess world a safer plae You are faing omplex hallenges... Safety is at the heart of your proess In order to maintain and inrease your ompetitiveness,

More information

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,

More information

Automated System for the Study of Environmental Loads Applied to Production Risers Dustin M. Brandt 1, Celso K. Morooka 2, Ivan R.

Automated System for the Study of Environmental Loads Applied to Production Risers Dustin M. Brandt 1, Celso K. Morooka 2, Ivan R. EngOpt 2008 - International Conferene on Engineering Optimization Rio de Janeiro, Brazil, 01-05 June 2008. Automated System for the Study of Environmental Loads Applied to Prodution Risers Dustin M. Brandt

More information

Definitions Homework. Quine McCluskey Optimal solutions are possible for some large functions Espresso heuristic. Definitions Homework

Definitions Homework. Quine McCluskey Optimal solutions are possible for some large functions Espresso heuristic. Definitions Homework EECS 33 There be Dragons here http://ziyang.ees.northwestern.edu/ees33/ Teaher: Offie: Email: Phone: L477 Teh dikrp@northwestern.edu 847 467 2298 Today s material might at first appear diffiult Perhaps

More information

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah

More information

C 2 C 3 C 1 M S. f e. e f (3,0) (0,1) (2,0) (-1,1) (1,0) (-1,0) (1,-1) (0,-1) (-2,0) (-3,0) (0,-2)

C 2 C 3 C 1 M S. f e. e f (3,0) (0,1) (2,0) (-1,1) (1,0) (-1,0) (1,-1) (0,-1) (-2,0) (-3,0) (0,-2) SPECIAL ISSUE OF IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION: MULTI-ROBOT SSTEMS, 00 Distributed reonfiguration of hexagonal metamorphi robots Jennifer E. Walter, Jennifer L. Welh, and Nany M. Amato Abstrat

More information

the data. Structured Principal Component Analysis (SPCA)

the data. Structured Principal Component Analysis (SPCA) Strutured Prinipal Component Analysis Kristin M. Branson and Sameer Agarwal Department of Computer Siene and Engineering University of California, San Diego La Jolla, CA 9193-114 Abstrat Many tasks involving

More information

Graph-Based vs Depth-Based Data Representation for Multiview Images

Graph-Based vs Depth-Based Data Representation for Multiview Images Graph-Based vs Depth-Based Data Representation for Multiview Images Thomas Maugey, Antonio Ortega, Pasal Frossard Signal Proessing Laboratory (LTS), Eole Polytehnique Fédérale de Lausanne (EPFL) Email:

More information

PROJECT PERIODIC REPORT

PROJECT PERIODIC REPORT FP7-ICT-2007-1 Contrat no.: 215040 www.ative-projet.eu PROJECT PERIODIC REPORT Publishable Summary Grant Agreement number: ICT-215040 Projet aronym: Projet title: Enabling the Knowledge Powered Enterprise

More information

Tackling IPv6 Address Scalability from the Root

Tackling IPv6 Address Scalability from the Root Takling IPv6 Address Salability from the Root Mei Wang Ashish Goel Balaji Prabhakar Stanford University {wmei, ashishg, balaji}@stanford.edu ABSTRACT Internet address alloation shemes have a huge impat

More information

One Against One or One Against All : Which One is Better for Handwriting Recognition with SVMs?

One Against One or One Against All : Which One is Better for Handwriting Recognition with SVMs? One Against One or One Against All : Whih One is Better for Handwriting Reognition with SVMs? Jonathan Milgram, Mohamed Cheriet, Robert Sabourin To ite this version: Jonathan Milgram, Mohamed Cheriet,

More information

High-level synthesis under I/O Timing and Memory constraints

High-level synthesis under I/O Timing and Memory constraints Highlevel synthesis under I/O Timing and Memory onstraints Philippe Coussy, Gwenolé Corre, Pierre Bomel, Eri Senn, Eri Martin To ite this version: Philippe Coussy, Gwenolé Corre, Pierre Bomel, Eri Senn,

More information

Scheduling Multiple Independent Hard-Real-Time Jobs on a Heterogeneous Multiprocessor

Scheduling Multiple Independent Hard-Real-Time Jobs on a Heterogeneous Multiprocessor Sheduling Multiple Independent Hard-Real-Time Jobs on a Heterogeneous Multiproessor Orlando Moreira NXP Semiondutors Researh Eindhoven, Netherlands orlando.moreira@nxp.om Frederio Valente Universidade

More information

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Ho Wireless Networks Giorgio Quer, Federio Librino, Lua Canzian, Leonardo Badia, Mihele Zorzi, University of California San Diego La

More information

Introduction to Seismology Spring 2008

Introduction to Seismology Spring 2008 MIT OpenCourseWare http://ow.mit.edu 1.510 Introdution to Seismology Spring 008 For information about iting these materials or our Terms of Use, visit: http://ow.mit.edu/terms. 1.510 Leture Notes 3.3.007

More information

A Unified Subdivision Scheme for Polygonal Modeling

A Unified Subdivision Scheme for Polygonal Modeling EUROGRAPHICS 2 / A. Chalmers and T.-M. Rhyne (Guest Editors) Volume 2 (2), Number 3 A Unified Subdivision Sheme for Polygonal Modeling Jérôme Maillot Jos Stam Alias Wavefront Alias Wavefront 2 King St.

More information

Facility Location: Distributed Approximation

Facility Location: Distributed Approximation Faility Loation: Distributed Approximation Thomas Mosibroda Roger Wattenhofer Distributed Computing Group PODC 2005 Where to plae ahes in the Internet? A distributed appliation that has to dynamially plae

More information

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality

Multi-Piece Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality INTERNATIONAL CONFERENCE ON MANUFACTURING AUTOMATION (ICMA200) Multi-Piee Mold Design Based on Linear Mixed-Integer Program Toward Guaranteed Optimality Stephen Stoyan, Yong Chen* Epstein Department of

More information

INTERPOLATED AND WARPED 2-D DIGITAL WAVEGUIDE MESH ALGORITHMS

INTERPOLATED AND WARPED 2-D DIGITAL WAVEGUIDE MESH ALGORITHMS Proeedings of the COST G-6 Conferene on Digital Audio Effets (DAFX-), Verona, Italy, Deember 7-9, INTERPOLATED AND WARPED -D DIGITAL WAVEGUIDE MESH ALGORITHMS Vesa Välimäki Lab. of Aoustis and Audio Signal

More information

arxiv: v1 [cs.gr] 10 Apr 2015

arxiv: v1 [cs.gr] 10 Apr 2015 REAL-TIME TOOL FOR AFFINE TRANSFORMATIONS OF TWO DIMENSIONAL IFS FRACTALS ELENA HADZIEVA AND MARIJA SHUMINOSKA arxiv:1504.02744v1 s.gr 10 Apr 2015 Abstrat. This work introdues a novel tool for interative,

More information

arxiv: v1 [cs.db] 13 Sep 2017

arxiv: v1 [cs.db] 13 Sep 2017 An effiient lustering algorithm from the measure of loal Gaussian distribution Yuan-Yen Tai (Dated: May 27, 2018) In this paper, I will introdue a fast and novel lustering algorithm based on Gaussian distribution

More information

The Happy Ending Problem

The Happy Ending Problem The Happy Ending Problem Neeldhara Misra STATUTORY WARNING This doument is a draft version 1 Introdution The Happy Ending problem first manifested itself on a typial wintery evening in 1933 These evenings

More information

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks

A Multi-Head Clustering Algorithm in Vehicular Ad Hoc Networks International Journal of Computer Theory and Engineering, Vol. 5, No. 2, April 213 A Multi-Head Clustering Algorithm in Vehiular Ad Ho Networks Shou-Chih Lo, Yi-Jen Lin, and Jhih-Siao Gao Abstrat Clustering

More information

Semi-Supervised Affinity Propagation with Instance-Level Constraints

Semi-Supervised Affinity Propagation with Instance-Level Constraints Semi-Supervised Affinity Propagation with Instane-Level Constraints Inmar E. Givoni, Brendan J. Frey Probabilisti and Statistial Inferene Group University of Toronto 10 King s College Road, Toronto, Ontario,

More information

A Fast Kernel-based Multilevel Algorithm for Graph Clustering

A Fast Kernel-based Multilevel Algorithm for Graph Clustering A Fast Kernel-based Multilevel Algorithm for Graph Clustering Inderjit Dhillon Dept. of Computer Sienes University of Texas at Austin Austin, TX 78712 inderjit@s.utexas.edu Yuqiang Guan Dept. of Computer

More information

splitting tehniques that partition live ranges have been proposed to solve both the spilling problem[5][8] and the assignment problem[8][9]. The parti

splitting tehniques that partition live ranges have been proposed to solve both the spilling problem[5][8] and the assignment problem[8][9]. The parti Load/Store Range Analysis for Global Register Alloation Priyadarshan Kolte and Mary Jean Harrold Department of Computer Siene Clemson University Abstrat Live range splitting tehniques divide the live ranges

More information

Using Augmented Measurements to Improve the Convergence of ICP

Using Augmented Measurements to Improve the Convergence of ICP Using Augmented Measurements to Improve the onvergene of IP Jaopo Serafin, Giorgio Grisetti Dept. of omputer, ontrol and Management Engineering, Sapienza University of Rome, Via Ariosto 25, I-0085, Rome,

More information

Mining effective design solutions based on a model-driven approach

Mining effective design solutions based on a model-driven approach ata Mining VI 463 Mining effetive design solutions based on a model-driven approah T. Katsimpa 2, S. Sirmakessis 1,. Tsakalidis 1,2 & G. Tzimas 1,2 1 Researh ademi omputer Tehnology Institute, Hellas 2

More information

Recommendation Subgraphs for Web Discovery

Recommendation Subgraphs for Web Discovery Reommation Subgraphs for Web Disovery Arda Antikaioglu Department of Mathematis Carnegie Mellon University aantika@andrew.mu.edu R. Ravi Tepper Shool of Business Carnegie Mellon University ravi@mu.edu

More information

Hard-Potato Routing. Maurice Herlihy y Brown University Providence, Rhode Island packets.

Hard-Potato Routing. Maurice Herlihy y Brown University Providence, Rhode Island packets. Hard-Potato Routing Costas Bush Λ Brown University Providene, Rhode Island b@s.brown.edu Maurie Herlihy y Brown University Providene, Rhode Island herlihy@s.brown.edu Roger Wattenhofer z Brown University

More information

Improved Circuit-to-CNF Transformation for SAT-based ATPG

Improved Circuit-to-CNF Transformation for SAT-based ATPG Improved Ciruit-to-CNF Transformation for SAT-based ATPG Daniel Tille 1 René Krenz-Bååth 2 Juergen Shloeffel 2 Rolf Drehsler 1 1 Institute of Computer Siene, University of Bremen, 28359 Bremen, Germany

More information

\A CENTRAL FACILITIES LOCATION PROBLEM INVOLVING TRAVELING SALESMAN TOURS AND EXPECTED DISTANCES/ MASTER OF SCIENCE

\A CENTRAL FACILITIES LOCATION PROBLEM INVOLVING TRAVELING SALESMAN TOURS AND EXPECTED DISTANCES/ MASTER OF SCIENCE \A CENTRAL FACILITIES LOCATION PROBLEM INVOLVING TRAVELING SALESMAN TOURS AND EXPECTED DISTANCES/ by Thesis submitted to the Graduate Faulty of the Virginia Polytehni Institute and State University in

More information

Wavelength Assignment in a Ring Topology for Wavelength Routed WDM Optical Networks

Wavelength Assignment in a Ring Topology for Wavelength Routed WDM Optical Networks Wavelength Assignment in a Ring Topology for Wavelength Routed WDM Optical Networks Amit Shukla, L. Premjit Singh and Raja Datta, Dept. of Computer Science and Engineering, North Eastern Regional Institute

More information

13.1 Numerical Evaluation of Integrals Over One Dimension

13.1 Numerical Evaluation of Integrals Over One Dimension 13.1 Numerial Evaluation of Integrals Over One Dimension A. Purpose This olletion of subprograms estimates the value of the integral b a f(x) dx where the integrand f(x) and the limits a and b are supplied

More information

Gradient based progressive probabilistic Hough transform

Gradient based progressive probabilistic Hough transform Gradient based progressive probabilisti Hough transform C.Galambos, J.Kittler and J.Matas Abstrat: The authors look at the benefits of exploiting gradient information to enhane the progressive probabilisti

More information

Simultaneous image orientation in GRASS

Simultaneous image orientation in GRASS Simultaneous image orientation in GRASS Alessandro BERGAMINI, Alfonso VITTI, Paolo ATELLI Dipartimento di Ingegneria Civile e Ambientale, Università degli Studi di Trento, via Mesiano 77, 38 Trento, tel.

More information

The recursive decoupling method for solving tridiagonal linear systems

The recursive decoupling method for solving tridiagonal linear systems Loughborough University Institutional Repository The reursive deoupling method for solving tridiagonal linear systems This item was submitted to Loughborough University's Institutional Repository by the/an

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Improvement of low illumination image enhancement algorithm based on physical mode

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Improvement of low illumination image enhancement algorithm based on physical mode [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 22 BioTehnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(22), 2014 [13995-14001] Improvement of low illumination image enhanement

More information

Dynamic Algorithms Multiple Choice Test

Dynamic Algorithms Multiple Choice Test 3226 Dynami Algorithms Multiple Choie Test Sample test: only 8 questions 32 minutes (Real test has 30 questions 120 minutes) Årskort Name Eah of the following 8 questions has 4 possible answers of whih

More information