An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks

Size: px
Start display at page:

Download "An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks"

Transcription

1 An Algoritm for Loopless Deflection in Potonic Packet-Switced Networks Jason P. Jue Center for Advanced Telecommunications Systems and Services Te University of Texas at Dallas Ricardson, TX Abstract In tis paper, we present a label-based approac for implementing deflection in a potonic packet network, and we introduce an algoritm for determining deflection options in a manner wic eliminates looping. A general analytical model is developed to evaluate packet loss probabilities in networks wit deflection. Te analysis may be applied to a wide class of deflection scemes and may be applied to networks wit any arbitrary topology. Te analysis is verified troug simulation. I. INTRODUCTION As telecommunication networks gradually evolve towards data-centric arcitectures, packet-based networks will be required to provide increasingly stringent quality of service requirements in order to support a growing number of ig-speed multimedia applications. Wile electronic packet-switcing tecnology is capable of providing differentiated services based on various priority and buffering scemes, te increasing transmission rates and ig wavelengt densities over eac fiber will eventually make it proibitively expensive to process eac packet electronically at eac node. Emerging all-optical switcing tecnologies will enable packets to traverse nodes transparently witout conversion to electronics. In particular, potonic packet switces ave te potential to offer te flexibility and statistical multiplexing benefits of existing packetswitced networks, wile also eliminating te cost of electronic conversion and processing at eac node. A significant issue in potonic packet switcing is contention resolution. Contention occurs wen two or more packets contend for te same output port at te same time. Typically, contention in traditional electronic packet-switced networks is andled troug buffering; owever, in te optical domain, it is more difficult to implement buffers, since tere is no optical equivalent of random-access memory. Instead, optical buffering is acieved troug te use of fiber delay lines [1]. Note tat, in any optical buffer arcitecture, te size of te buffers is severely limited, not only by signal quality concerns, but also by pysical space limitations. To delay a single packet for 5 µs requires over a kilometer of fiber. Because of tis size limitation of optical buffers, a node may be unable to effectively andle ig load or bursty traffic conditions. Anoter approac to resolving contention is to route te contending packets to an output port oter tan te intended output port. Tis approac is referred to as deflection routing or ot-potato routing [2], [3], [4]. Wile deflection routing is generally not favored in electronic packet-switced networks due to potential looping and out-of-sequence delivery of packets, it may be necessary to implement deflection in potonic packetswitced networks, were buffer capacity is limited, in order to maintain a low level of packet losses. For deflection to be practical in potonic packet networks, metods for overcoming te limitations of deflection must be developed and investigated. Deflection as been studied in a number of previous works. In [2], ot-potato routing is compared to store-and-forward routing in a SuffleNet topology. [3] and [4] compare otpotato and deflection routing in SuffleNet and Manattan street network topologies. In [5], deflection is studied in an unslotted packet network wit a Manattan Street Network topology, and a euristic for sceduling packets to minimize contention is presented. It is sown tat te euristic improves te performance of unslotted networks almost to te level of slotted networks. Since bot te SuffleNet and Manattan Street Network are two-connected (eac node as an outgoing degree of two), te coice of te deflection output port is obvious. Wen te nodal degree is greater tan two, a metod must be developed to select te alternate outgoing link wen a deflection occurs. In [6] and [7], deflection routing is studied in irregular mes networks. Rater tan coosing te deflection output port arbitrarily, priorities are assigned to eac output port, and te ports are cosen in te prioritized order. Wen deflection is implemented, a potential problem tat may arise is te introduction of routing loops. If no action is taken to prevent loops, ten a packet may return to nodes wic it as already visited and may remain in te network for an indefinite amount of time. Te looping of packets contributes to increased delays and degraded signal quality for te looping packets, as well as increased load for te entire network. Standard approaces for eliminating looping, suc as maintaining a op counter for eac packet, can lead to increased complexity wen processing packet eaders. An alternative approac to resolving routing loops is to define te deflection alternatives at eac node in a manner wic eliminates all possibility of routing loops. In [7], deflection is studied togeter wit optical buffering in irregular mes networks wit variable-lengt packets. Te nodes at wic deflection can occur, as well as te options for te deflection port, are limited in suc a way as to prevent routing loops in te given network; owever, a general metodology for selecting deflection options to avoiding looping in any arbitrary network is not given. Wile analytical models ave been developed to evaluate deflection in regular-topology networks [2], [3], [4], no previous

2 work as been done to develop analytical models for evaluating deflection in general mes-topology networks. In tis work, we investigate approaces for implementing deflection in a manner wic eliminates looping, and we present an analytical model for evaluating deflection scemes in arbitrary mes networks. Section II describes te basic network arcitecture and te deflection algoritms. Section III presents te analytical model for evaluating packet losses. Section IV provides numerical results for specific network topologies, and Section V concludes te paper Label switced pat Deflection alternatives 8 II. DEFLECTION ROUTING ALGORITHMS In tis work, we will assume tat deflection is implemented witin a label-switced environment. Eac node maintains a label database wit a number of label entries. Eac label entry indicates, for a given input port and a given label, te corresponding output port and outgoing label. Deflection options are defined by adding additional output-port/label pairs to eac entry in te label database. Wen a packet arrives to te node, te corresponding entry in te label database is referenced, te packet s label is updated to te new outgoing label, and te packet is sent to te appropriate output port. If te primary output port is occupied, ten te packet will be deflected to te alternate output port after updating te packet s label to te alternate outgoing label. In general, labels may be defined on a per-destination basis, on a source/destination pair basis, or on a per-flow basis. For simplicity, we will assume tat labels are defined on a perdestination basis. By utilizing destination-based labeling, te number of label entries at eac node can be kept to a minimum; owever, destination-based labeling also reduces te routing flexibility and traffic engineering options in te network. Figure 1 illustrates te label-switced pats for a given destination node 8, and Fig. 2 sows te corresponding label entry at node 2. Note tat, in destination-based labeling, te label of a packet will remain te same trougout te network. Furtermore, te primary label-switced pats specified for a given destination will define a spanning tree on te network, wit te destination node at te root of te tree. By examining te spanning tree for a given destination, we note tat deflectionalternative links may be added to te tree in a manner wic avoids routing loops. Te process of defining te label entries at eac node can be divided into two sub-problems. Te first problem is to determine te primary outgoing link for eac destination at eac node. In tis paper, we assume tat te link wic is on te sortest pat to te destination is cosen as te primary outgoing link at a node for tat destination. Tese links may be found by running Dijkstra s sortest-pat algoritm for eac source-destination pair in te network, and coosing te firstop link on eac of te sortest-pat routes. Te link weigts in te sortest-pat algoritm are determined by te pysical distance of eac link. An alternative approac for determining te primary links is to coose te links in a manner wic bal- Fig. 1. Label switced pats and deflection alternatives for destination node 8. input output deflect port label port label port label any Node 2 Fig. 2. Label entry at node 2 for destination node 8. ances te load in te network. Suc approaces are beyond te scope of tis paper. Te second problem is to find te set of deflection alternatives for eac destination at eac node, given te set of primary links defined in te previous problem. Te deflection alternatives at eac node must be defined in a way wic eliminates te possibility of routing loops. Te deflection-finding problem can be formulated in grap teoretic terms. Given a grap G(V,E), and a directed spanning tree, T v, rooted at vertex v, and wit edges, E Tv, directed towards te root, te problem is to find a set of edges E Dv E suc tat te directed grap R v = (V,E Tv E Dv ) is acyclic. Te following looplessdeflection algoritm is proposed to find a feasible set of deflection edges. We define δ(v) to be te nodal degree of a vertex v, and dist(u, v) to be te op distance from node u to node v. LOOPLESS-DEFLECTION: Given : A grap G=(V,E). V spanning trees, T v =(V Tv,E Tv ), eac wit a unique root vertex, v V. Find : E Dv, te set of deflection edges. Directed routing graps, R v =(V,E Rv ), v V. Step 0 : Set V = V. Set E Dv = { o}, v V. Step 1 : Select a vertex v V. Set E = {E E Tv }. Let d v be te dept of tree T v.

3 Let S i, i {1, 2,...,d v } be te set of vertices wic are distance i from te root node v. Set k = d v. Step 2 : Select vertex u S k suc tat δ(u) =min u S k δ(u ). Step 3 : Select a directed edge, e(u, w), suc tat dist(w, v) = min w :e(u,w ) E dist(w,v), if suc an edge exists. Set E Dv = E Dv e(u, w). Step 4 : Remove all edges e(i, u), i and e(u, j), j from E. Remove node u from S k.ifs k = { o},tenk = k 1. If k 0,tengotoStep2,oterwise,gotoStep5. Step 5 : Set R v =(V,E Tv E Dv ). Remove node v from V. If V { o}, ten go to Step 1, oterwise, stop. Te loopless-deflection algoritm selects nodes one at a time, and attempts to find a deflection output port at te selected node. By selecting leaf nodes wic are furtest from te root, and by deleting te node after its deflection output port as been selected, te algoritm ensures tat no deflections are made to nodes wic are furter from te destination tan te selected node, and tat packets, upon departing from te selected node, can never return to tat node. In Step 3, te algoritm attempts to coose te deflection edge wic results in te sortest pat to te destination. Te algoritm can be furter customized in Step 3 by coosing te deflection edges based on estimated link loads, or by allowing multiple deflection options for eac destination. If multiple deflection options are allowed, te options may be prioritized based on distance or load considerations. Since te proposed algoritm does not allow loops, it is possible tat a node will not ave any deflection alternatives for a given destination. In particular, tose nodes wic are closer to te destination are less likely to ave deflection alternatives tan nodes wic are furter from te destination. By restricting deflection at tese nodes, te packet losses may increase. For comparison, we also consider a deflection-finding algoritm wic allows looping. Te algoritm starts wit te grap G(V,E) and te directed tree, T v, rooted at destination v. Eac node is selected one at a time in any order. For eac node, te algoritm selects te deflection edge wic results in te sortest pysical-distance pat to destination v. Edges in te tree T v are used for primary-pat routing, terefore tese edges are not considered wen selecting te deflection edge. Unlike te loopless-deflection algoritm, nodes and edges are not deleted once a deflection edge as been cosen; tus, routing loops are possible. We will refer to tis algoritm as te sortest-pat deflection algoritm. III. ANALYTICAL MODEL In tis section, we develop an analytical model for evaluating te packet loss probabilities of te proposed deflection sceme. Te model is general, and can be applied to any irregular mes topology. Te analysis can also be used to evaluate any deflection sceme in wic te deflection alternatives at eac node are ordered and pre-defined. Te model assumes tat te network is asyncronous, and tat packet ave a fixed lengt of L seconds. Packets arrive to te network according to a Poisson process wit rate packets per second for source-destination pair sd. Eac link in te network is modeled as an M/D/1/1 queue wit no buffers. Te arrival rate, λ ij of packets to a link l ij is determined by aggregating te packet arrivals from all sourcedestination pairs wic route packets over te link. Te arrival rates will also depend on te probability of contention, P ij,on eac link in te network, and te deflection policy. To find te contention probabilities, we examine te time between packet departure instants and calculate te fraction of time tat a link is busy. Te expected cycle time, T, between two consecutive packet departures is found by adding te expected time until te next packet arrival to te expected packet transmission time: E[T ]= 1 + L. (1) λ ij Te probability tat a packet arriving to link ij encounters contention is equal to te probability tat te link is busy: P ij = L E[T ]. (2) Based on te link blocking probabilities, we can find te offered load, λ ij, on eac link l ij.wedefiner sd as te primary route from source s to destination d witout deflection. Te load on a link is te sum of te loads contributed by eac source-destination pair wic routes packets over te link: λ ij = s,d ij, (3) were ij is te rate at wic packets sourced at s and destined for d arrive to link l ij. Te load placed on a link l ij by traffic going from source s to destination d depends on weter link l ij is on a primary pat to destination d, or weter te link is a deflection link to destination d. If link l ij is on a primary pat to d, and node i is te source node s, te load applied to link l ij by sd traffic is simply. If link l ij is on a primary pat to d, but node i is not te source node, ten te applied load will be te load offered by previous-op links, l i, wic are sending packets to d troug link l ij. Te load is reduced by te amount of contention on te links l i. If link l ij is te deflection link for a primary link l sk at te source node s, ten packets will arrive to link l ij if te packets experienced contention on link l sk ; tus, te load on l ij will be P sk. If link l ij is a deflection link at an intermediate node, and link l ik is te corresponding primary link to destination d fromnodei, ten te applied load

4 on link l ij will be te incoming load from all previous-op links wic are sending traffic to d troug i, and wic encounter contention on link l ik. Tus, we ave: ij = if l ij r id, i = s (4) = i (1 P i) if l ij r sd, i s (5) = i(1 P i ) if l ij / r sd, i = s, l ij r id (6) = P sk if l ij / r sd, i = s, l sk r id (7) = i(1 P i )P ik if l ij / r sd, i s, l ik r id. (8) Once te above equations are solved to find P ij, te packet loss probability can be found for packets traveling from source s to destination d. A packetwill be lost if, on a givenop, bot te primary and deflection links are blocked. Let node i be te primarynext-opnode, andlet j be te deflection next-op node. Te packet loss probability for packets travelling from source node s to destination node d is given by: P sd loss = P sip sj +(1 P si )P id loss + P si(1 P sj )P jd loss. (9) Te packet loss probability for te entire network is found by calculating te weigted average of te packet losses for eac source-destination pair: P loss = s,d P sd loss ( s,d λs d ). (), te analysis will stop evaluating a pat if te additional load on te next link in te pat is less tan some small value ɛ. Wen evaluating te packet loss probabilities, te analysis will stop evaluating a pat once it reaces a certain number of ops. Altoug te analysis assumes tat tere is at most one deflection alternative for eac destination at eac node, te analysis can be extended in a straigtforward manner to accommodate te case in wic tere is an arbitrary number of ordered deflection alternatives for eac destination at eac node. Te analysis may also be applied to deflection scemes in wic looping is present; owever, te analysis must be modified sligtly in order to avoid infinite pat lengts. Wen calculating P ij and ij IV. NUMERICAL RESULTS In tis section, we evaluate te deflection algoritms in te 15-node network topology illustrated in Fig. 3, and in a bidirectional Manattan street network topology in wic te nodal degree at eac node is equal to 4. Packets are fixed in lengt, consisting of,000 bits eac, and te transmission rate is assumed to be Gb/s. Packets arrive to te network according Fig node network topology. to a Poisson process, and traffic is uniformly distributed over all source-destination pairs. Figure 4 sows te packet loss probability as a function of load for te 15-node network. We observe tat te loopless deflection sceme provides a sligt improvement in performance over te case wit no deflection, wile te deflection sceme witout any looping restrictions offers significantly lower packet loss probabilities tan eiter of te oter two cases. Te restrictions placed on deflections in te loopless deflection case limit te number of nodes at wic deflections can take place. Tese limitations lead to iger packet losses compared to te sortest-pat deflection sceme. Te packet loss probability for te bidirectional Manattan street network is sown in Fig. 5. In tis network, te iger nodal degree enables a larger number of nodes to ave deflection options in te loopless deflection case. Consequently, in a network wit a iger nodal degree, te loopless deflection case will provide greater benefits over te case in wic no deflections take place. In Fig. 6, we plot te packet loss probability for iger network loads in te 15-node network. We observe tat, for ig loads, te sortest-pat deflection sceme as te igest packet loss rate, wile te sceme wit no deflection as Fig. 4. Packet loss for 15-node network topology.

5 Fig. 5. Packet loss for Manattan street network topology. Average Hop Distance Fig. 7. Average op count for 15-node network topology Fig. 6. Packet loss for 15-node network topology under ig loads. te lowest packet loss rate. Under iger loads, te number of contentions will increase, resulting in a greater number of deflections in networks. Te increased deflections will increase te effective network load and cause iger blocking probabilities. Te same general results are found for te Manattan street network, wit te cross-over points occuring at iger loads tan in te 15-node network. Results for te Manattan street network are not sown due to space constraints. Figure 7 sows te average op distance traversed by eac packet as measured by simulation in te 15-node network. For te sortest-pat deflection sceme, as te load increases, more packets are being deflected, leading to iger average op distances; owever, packets are still reacing teir destinations, indicating tat deflection is successfully resolving contention. As te load increases furter, te average op distance begins to drop. Te drop indicates tat, wile packets are still being deflected, te deflected packets are not as likely to reac teir destination. At tis point, deflection starts to become detrimental rater tan beneficial. For bot te loopless deflection sceme and te sceme wit no deflection, te average op distance decreases as load increases. Tis effect indicates tat tere is some degree of unfairness in te network, since a packet wic must travel a greater number of ops to its destination as a iger cance of being dropped. V. CONCLUSION In tis paper, we investigated te use of deflection routing to resolve contentions in a label-switced potonic packet network, and we introduced an algoritm for determining te deflection alternatives in a manner wic eliminates te possiblity of routing loops. A general analytical model, wic can be applied to a wide range of deflection scemes and on arbitrary network topologies, was developed to evaluate te loopless deflection sceme. It was sown tat, under low loads, te loopless deflection sceme provides modest gains over te sceme wit no deflection, and tat te gains increase for networks wic ave a iger average nodal degree. An unrestricted deflection sceme, in wic loops are allowed, provides significantly lower packet losses at low loads, but results in iger average packet op distances. At ig loads, te deflection scemes result in iger packet losses. Overall, te loopless deflection sceme offers a reasonable trade-off between packet losses and average op distance. REFERENCES [1] I. Clamtac, A. Fumagalli, L. G. Kazovsky, et al., CORD: Contention Resolution by Delay Lines, IEEE Journal on Selected Areas in Communications, vol. 14, no. 5, pp , June [2] A. S. Acampora and I. A. Sa, Multiop Ligtwave Networks: A Comparison of Store-and-Forward and Hot-Potato Routing, IEEE Transactions on Communications, vol. 40, no. 6, pp , June [3] F. Forgieri, A. Bononi, and P. R. Prucnal, Analysis and Comparison of Hot-Potato and Single-Buffer Deflection Routing in Very Hig Bit Rate Optical Mes Networks, IEEE Transactions on Communications, vol. 43, no. 1, pp , Jan [4] A. Bononi, G. A. Castanon, and O. K. Tonguz, Analysis of Hot-Potato Optical Networks wit Wavelengt Conversion, IEEE Journal of Ligtwave Tecnology, vol. 17, no. 4, pp , April [5] T. Cic, J. Coen, and P. Fraigniaud, Unslotted Deflection Routing: A Practical and Efficient Protocol for Multiop Optical Networks, IEEE/ACM Transactions on Networking, vol. 9, no. 1, pp , Feb [6] G. Castanon, L. Tancevski, and L. Tamil, Routing in All-Optical Packet Switced Irregular Mes Networks, Proceedings, IEEE Globecom 99, Rio de Janeiro, Brazil, pp , Dec [7] S. Yao, B. Mukerjee, S.J.B. Yoo, and S. Dixit, All-Optical Packet- Switced Networks: A Study of Contention Resolution Scemes in an Irregular Mes Network wit Variable-Sized Packets, Proceedings, SPIE OptiComm 2000, Dallas, TX, pp , Oct

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various

More information

Real-Time Wireless Routing for Industrial Internet of Things

Real-Time Wireless Routing for Industrial Internet of Things Real-Time Wireless Routing for Industrial Internet of Tings Cengjie Wu, Dolvara Gunatilaka, Mo Sa, Cenyang Lu Cyber-Pysical Systems Laboratory, Wasington University in St. Louis Department of Computer

More information

MULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS

MULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS ULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS Nimmagadda Calamaia æ Dept. of CSE JNTU College of Engineering Kakinada, India 533 003. calm@cse.iitkgp.ernet.in Badrinat Ramamurty y Dept.

More information

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness 1 Optimal In-etwork Packet Aggregation Policy for Maimum Information Fresness Alper Sinan Akyurek, Tajana Simunic Rosing Electrical and Computer Engineering, University of California, San Diego aakyurek@ucsd.edu,

More information

Intra- and Inter-Session Network Coding in Wireless Networks

Intra- and Inter-Session Network Coding in Wireless Networks Intra- and Inter-Session Network Coding in Wireless Networks Hulya Seferoglu, Member, IEEE, Atina Markopoulou, Member, IEEE, K K Ramakrisnan, Fellow, IEEE arxiv:857v [csni] 3 Feb Abstract In tis paper,

More information

Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks

Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Okan Yilmaz and Ing-Ray Cen Computer Science Department Virginia Tec {oyilmaz, ircen}@vt.edu

More information

An Anchor Chain Scheme for IP Mobility Management

An Anchor Chain Scheme for IP Mobility Management An Ancor Cain Sceme for IP Mobility Management Yigal Bejerano and Israel Cidon Department of Electrical Engineering Tecnion - Israel Institute of Tecnology Haifa 32000, Israel E-mail: bej@tx.tecnion.ac.il.

More information

A UPnP-based Decentralized Service Discovery Improved Algorithm

A UPnP-based Decentralized Service Discovery Improved Algorithm Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol.1, No.1, Marc 2013, pp. 21~26 ISSN: 2089-3272 21 A UPnP-based Decentralized Service Discovery Improved Algoritm Yu Si-cai*, Wu Yan-zi,

More information

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science A Cost Model for Distributed Sared Memory Using Competitive Update Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, Texas, 77843-3112, USA E-mail: fjkim,vaidyag@cs.tamu.edu

More information

SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS. Hewlett-Packard Company East Mission Avenue. Bogazici University

SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS. Hewlett-Packard Company East Mission Avenue. Bogazici University SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS Sanuj V. Sarin 1, Hakan Delic 2 and Jung H. Kim 3 1 Hewlett-Packard Company 24001 East Mission Avenue Spokane, Wasington 99109, USA 2 Signal

More information

Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks

Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks Hulya Seferoglu, Atina Markopoulou EECS Dept, University of California, Irvine {seferog, atina}@uci.edu Abstract We

More information

Investigating an automated method for the sensitivity analysis of functions

Investigating an automated method for the sensitivity analysis of functions Investigating an automated metod for te sensitivity analysis of functions Sibel EKER s.eker@student.tudelft.nl Jill SLINGER j..slinger@tudelft.nl Delft University of Tecnology 2628 BX, Delft, te Neterlands

More information

Symmetric Tree Replication Protocol for Efficient Distributed Storage System*

Symmetric Tree Replication Protocol for Efficient Distributed Storage System* ymmetric Tree Replication Protocol for Efficient Distributed torage ystem* ung Cune Coi 1, Hee Yong Youn 1, and Joong up Coi 2 1 cool of Information and Communications Engineering ungkyunkwan University

More information

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result RT. Complex Fractions Wen working wit algebraic expressions, sometimes we come across needing to simplify expressions like tese: xx 9 xx +, xx + xx + xx, yy xx + xx + +, aa Simplifying Complex Fractions

More information

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation P R E P R N T CPWS XV Berlin, September 8, 008 Fast Calculation of Termodynamic Properties of Water and Steam in Process Modelling using Spline nterpolation Mattias Kunick a, Hans-Joacim Kretzscmar a,

More information

Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks

Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks Peyman Faizian, Md Safayat Raman, Md Atiqul Molla, Xin Yuan Department of Computer Science Florida State University

More information

Mean Waiting Time Analysis in Finite Storage Queues for Wireless Cellular Networks

Mean Waiting Time Analysis in Finite Storage Queues for Wireless Cellular Networks Mean Waiting Time Analysis in Finite Storage ueues for Wireless ellular Networks J. YLARINOS, S. LOUVROS, K. IOANNOU, A. IOANNOU 3 A.GARMIS 2 and S.KOTSOOULOS Wireless Telecommunication Laboratory, Department

More information

4.2 The Derivative. f(x + h) f(x) lim

4.2 The Derivative. f(x + h) f(x) lim 4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially

More information

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks Downloaded from vbn.aau.dk on: April 7, 09 Aalborg Universitet etwork Coding to Enance Standard Routing Protocols in Wireless Mes etworks Palevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank;

More information

George Xylomenos and George C. Polyzos. with existing protocols and their eæciency in terms of

George Xylomenos and George C. Polyzos. with existing protocols and their eæciency in terms of IP MULTICASTING FOR WIRELESS MOBILE OSTS George Xylomenos and George C. Polyzos fxgeorge,polyzosg@cs.ucsd.edu Computer Systems Laboratory Department of Computer Science and Engineering University of California,

More information

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer

More information

Cubic smoothing spline

Cubic smoothing spline Cubic smooting spline Menu: QCExpert Regression Cubic spline e module Cubic Spline is used to fit any functional regression curve troug data wit one independent variable x and one dependent random variable

More information

Computing geodesic paths on manifolds

Computing geodesic paths on manifolds Proc. Natl. Acad. Sci. USA Vol. 95, pp. 8431 8435, July 1998 Applied Matematics Computing geodesic pats on manifolds R. Kimmel* and J. A. Setian Department of Matematics and Lawrence Berkeley National

More information

Multi-Stack Boundary Labeling Problems

Multi-Stack Boundary Labeling Problems Multi-Stack Boundary Labeling Problems Micael A. Bekos 1, Micael Kaufmann 2, Katerina Potika 1 Antonios Symvonis 1 1 National Tecnical University of Atens, Scool of Applied Matematical & Pysical Sciences,

More information

More on Functions and Their Graphs

More on Functions and Their Graphs More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in

More information

Minimizing Memory Access By Improving Register Usage Through High-level Transformations

Minimizing Memory Access By Improving Register Usage Through High-level Transformations Minimizing Memory Access By Improving Register Usage Troug Hig-level Transformations San Li Scool of Computer Engineering anyang Tecnological University anyang Avenue, SIGAPORE 639798 Email: p144102711@ntu.edu.sg

More information

Author's personal copy

Author's personal copy Autor's personal copy Information Processing Letters 09 (009) 868 875 Contents lists available at ScienceDirect Information Processing Letters www.elsevier.com/locate/ipl Elastic tresold-based admission

More information

Chapter K. Geometric Optics. Blinn College - Physics Terry Honan

Chapter K. Geometric Optics. Blinn College - Physics Terry Honan Capter K Geometric Optics Blinn College - Pysics 2426 - Terry Honan K. - Properties of Ligt Te Speed of Ligt Te speed of ligt in a vacuum is approximately c > 3.0µ0 8 mês. Because of its most fundamental

More information

4.1 Tangent Lines. y 2 y 1 = y 2 y 1

4.1 Tangent Lines. y 2 y 1 = y 2 y 1 41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange

More information

An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng

An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng An ffective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Ciming Huang and ei-heng Ceng 5 De c e mbe r0 International Journal of Advanced Information Tecnologies (IJAIT),

More information

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry Our Calibrated Model as No Predictive Value: An Example from te Petroleum Industry J.N. Carter a, P.J. Ballester a, Z. Tavassoli a and P.R. King a a Department of Eart Sciences and Engineering, Imperial

More information

Density Estimation Over Data Stream

Density Estimation Over Data Stream Density Estimation Over Data Stream Aoying Zou Dept. of Computer Science, Fudan University 22 Handan Rd. Sangai, 2433, P.R. Cina ayzou@fudan.edu.cn Ziyuan Cai Dept. of Computer Science, Fudan University

More information

An Evaluation of Alternative Continuous Media Replication Techniques in Wireless Peer-to-Peer Networks

An Evaluation of Alternative Continuous Media Replication Techniques in Wireless Peer-to-Peer Networks An Evaluation of Alternative Continuous Media eplication Tecniques in Wireless Peer-to-Peer Networks Saram Gandearizade and Tooraj Helmi Department of Computer Science University of Soutern California

More information

Distributed and Optimal Rate Allocation in Application-Layer Multicast

Distributed and Optimal Rate Allocation in Application-Layer Multicast Distributed and Optimal Rate Allocation in Application-Layer Multicast Jinyao Yan, Martin May, Bernard Plattner, Wolfgang Mülbauer Computer Engineering and Networks Laboratory, ETH Zuric, CH-8092, Switzerland

More information

On the Use of Radio Resource Tests in Wireless ad hoc Networks

On the Use of Radio Resource Tests in Wireless ad hoc Networks Tecnical Report RT/29/2009 On te Use of Radio Resource Tests in Wireless ad oc Networks Diogo Mónica diogo.monica@gsd.inesc-id.pt João Leitão jleitao@gsd.inesc-id.pt Luis Rodrigues ler@ist.utl.pt Carlos

More information

Alternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method

Alternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method Te Open Plasma Pysics Journal, 2010, 3, 29-35 29 Open Access Alternating Direction Implicit Metods for FDTD Using te Dey-Mittra Embedded Boundary Metod T.M. Austin *, J.R. Cary, D.N. Smite C. Nieter Tec-X

More information

Haar Transform CS 430 Denbigh Starkey

Haar Transform CS 430 Denbigh Starkey Haar Transform CS Denbig Starkey. Background. Computing te transform. Restoring te original image from te transform 7. Producing te transform matrix 8 5. Using Haar for lossless compression 6. Using Haar

More information

Unsupervised Learning for Hierarchical Clustering Using Statistical Information

Unsupervised Learning for Hierarchical Clustering Using Statistical Information Unsupervised Learning for Hierarcical Clustering Using Statistical Information Masaru Okamoto, Nan Bu, and Tosio Tsuji Department of Artificial Complex System Engineering Hirosima University Kagamiyama

More information

12.2 TECHNIQUES FOR EVALUATING LIMITS

12.2 TECHNIQUES FOR EVALUATING LIMITS Section Tecniques for Evaluating Limits 86 TECHNIQUES FOR EVALUATING LIMITS Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing tecnique to evaluate its of

More information

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically 2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use

More information

MAP MOSAICKING WITH DISSIMILAR PROJECTIONS, SPATIAL RESOLUTIONS, DATA TYPES AND NUMBER OF BANDS 1. INTRODUCTION

MAP MOSAICKING WITH DISSIMILAR PROJECTIONS, SPATIAL RESOLUTIONS, DATA TYPES AND NUMBER OF BANDS 1. INTRODUCTION MP MOSICKING WITH DISSIMILR PROJECTIONS, SPTIL RESOLUTIONS, DT TYPES ND NUMBER OF BNDS Tyler J. lumbaug and Peter Bajcsy National Center for Supercomputing pplications 605 East Springfield venue, Campaign,

More information

A Novel QC-LDPC Code with Flexible Construction and Low Error Floor

A Novel QC-LDPC Code with Flexible Construction and Low Error Floor A Novel QC-LDPC Code wit Flexile Construction and Low Error Floor Hanxin WANG,2, Saoping CHEN,2,CuitaoZHU,2 and Kaiyou SU Department of Electronics and Information Engineering, Sout-Central University

More information

CE 221 Data Structures and Algorithms

CE 221 Data Structures and Algorithms CE Data Structures and Algoritms Capter 4: Trees (AVL Trees) Text: Read Weiss, 4.4 Izmir University of Economics AVL Trees An AVL (Adelson-Velskii and Landis) tree is a binary searc tree wit a balance

More information

Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs

Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs Per Ostlund Department of Computer and Information Science Linkoping University SE-58183 Linkoping, Sweden per.ostlund@liu.se Kristian

More information

Numerical Derivatives

Numerical Derivatives Lab 15 Numerical Derivatives Lab Objective: Understand and implement finite difference approximations of te derivative in single and multiple dimensions. Evaluate te accuracy of tese approximations. Ten

More information

Test Generation for Acyclic Sequential Circuits with Hold Registers

Test Generation for Acyclic Sequential Circuits with Hold Registers Test Generation for Acyclic Sequential Circuits wit Hold Registers Tomoo Inoue, Debes Kumar Das, Ciio Sano, Takairo Miara, and Hideo Fujiwara Faculty of Information Sciences Computer Science and Engineering

More information

Packet Switching Networks. Jonathan S. Turner. Computer and Communications Research Center. the result of user connections that pass through the

Packet Switching Networks. Jonathan S. Turner. Computer and Communications Research Center. the result of user connections that pass through the Fluid Flow Loading Analysis of Packet Switcing Networks Jonatan S. Turner Computer and Communications Researc Center Wasington University, St. Louis, MO 63130 Abstract Recent researc in switcing as concentrated

More information

Asynchronous Power Flow on Graphic Processing Units

Asynchronous Power Flow on Graphic Processing Units 1 Asyncronous Power Flow on Grapic Processing Units Manuel Marin, Student Member, IEEE, David Defour, and Federico Milano, Senior Member, IEEE Abstract Asyncronous iterations can be used to implement fixed-point

More information

Search-aware Conditions for Probably Approximately Correct Heuristic Search

Search-aware Conditions for Probably Approximately Correct Heuristic Search Searc-aware Conditions for Probably Approximately Correct Heuristic Searc Roni Stern Ariel Felner Information Systems Engineering Ben Gurion University Beer-Seva, Israel 85104 roni.stern@gmail.com, felner@bgu.ac.il

More information

Protecting Storage Location Privacy in Sensor Networks

Protecting Storage Location Privacy in Sensor Networks Protecting Storage Location Privacy in Sensor Networks Jianming Zou, Wenseng Zang, and Daji Qiao Iowa State University Ames, IA 511 Email: {jmzou,wzang,daji}@iastate.edu ASTAT Numerous scemes ave been

More information

Efficient Content-Based Indexing of Large Image Databases

Efficient Content-Based Indexing of Large Image Databases Efficient Content-Based Indexing of Large Image Databases ESSAM A. EL-KWAE University of Nort Carolina at Carlotte and MANSUR R. KABUKA University of Miami Large image databases ave emerged in various

More information

12.2 Techniques for Evaluating Limits

12.2 Techniques for Evaluating Limits 335_qd /4/5 :5 PM Page 863 Section Tecniques for Evaluating Limits 863 Tecniques for Evaluating Limits Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing

More information

An Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks

An Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks Tis paper was presented as part of te main tecnical program at IEEE INFOCOM 20 An Analytical Approac to Real-Time Misbeavior Detection in IEEE 802. Based Wireless Networks Jin Tang, Yu Ceng Electrical

More information

HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS

HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS N.G.Bardis Researc Associate Hellenic Ministry of te Interior, Public Administration and Decentralization 8, Dragatsaniou str., Klatmonos S. 0559, Greece

More information

Grid Adaptation for Functional Outputs: Application to Two-Dimensional Inviscid Flows

Grid Adaptation for Functional Outputs: Application to Two-Dimensional Inviscid Flows Journal of Computational Pysics 176, 40 69 (2002) doi:10.1006/jcp.2001.6967, available online at ttp://www.idealibrary.com on Grid Adaptation for Functional Outputs: Application to Two-Dimensional Inviscid

More information

Section 1.2 The Slope of a Tangent

Section 1.2 The Slope of a Tangent Section 1.2 Te Slope of a Tangent You are familiar wit te concept of a tangent to a curve. Wat geometric interpretation can be given to a tangent to te grap of a function at a point? A tangent is te straigt

More information

Redundancy Awareness in SQL Queries

Redundancy Awareness in SQL Queries Redundancy Awareness in QL Queries Bin ao and Antonio Badia omputer Engineering and omputer cience Department University of Louisville bin.cao,abadia @louisville.edu Abstract In tis paper, we study QL

More information

An experimental framework to investigate context-aware schemes for content delivery

An experimental framework to investigate context-aware schemes for content delivery An experimental framework to investigate context-aware scemes for content delivery Pietro Lungaro +, Cristobal Viedma +, Zary Segall + and Pavan Kumar + Mobile Service Lab, Royal Institute of Tecnology

More information

Tuning MAX MIN Ant System with off-line and on-line methods

Tuning MAX MIN Ant System with off-line and on-line methods Université Libre de Bruxelles Institut de Recerces Interdisciplinaires et de Développements en Intelligence Artificielle Tuning MAX MIN Ant System wit off-line and on-line metods Paola Pellegrini, Tomas

More information

Section 2.3: Calculating Limits using the Limit Laws

Section 2.3: Calculating Limits using the Limit Laws Section 2.3: Calculating Limits using te Limit Laws In previous sections, we used graps and numerics to approimate te value of a it if it eists. Te problem wit tis owever is tat it does not always give

More information

Vector Processing Contours

Vector Processing Contours Vector Processing Contours Andrey Kirsanov Department of Automation and Control Processes MAMI Moscow State Tecnical University Moscow, Russia AndKirsanov@yandex.ru A.Vavilin and K-H. Jo Department of

More information

Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes

Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganograpic Scemes Jessica Fridric Dept. of Electrical Engineering, SUNY Bingamton, Bingamton, NY 3902-6000, USA fridric@bingamton.edu

More information

Linear Interpolating Splines

Linear Interpolating Splines Jim Lambers MAT 772 Fall Semester 2010-11 Lecture 17 Notes Tese notes correspond to Sections 112, 11, and 114 in te text Linear Interpolating Splines We ave seen tat ig-degree polynomial interpolation

More information

ReVAMP : ReRAM based VLIW Architecture for in-memory computing

ReVAMP : ReRAM based VLIW Architecture for in-memory computing ReVAMP : ReRAM based VLIW Arcitecture for in-memory computing Debjyoti Battacarjee, Rajeswari Devadoss and Anupam Cattopadyay Scool of Computer Science and Engineering, Nanyang Tecnological University,

More information

Piecewise Polynomial Interpolation, cont d

Piecewise Polynomial Interpolation, cont d Jim Lambers MAT 460/560 Fall Semester 2009-0 Lecture 2 Notes Tese notes correspond to Section 4 in te text Piecewise Polynomial Interpolation, cont d Constructing Cubic Splines, cont d Having determined

More information

7. Graph Algorithms. 7.1 Depth-First Search

7. Graph Algorithms. 7.1 Depth-First Search 7. Grap Algoritms Te previous capters ave examined a numer o grap prolems and teir algoritms in te context o design tecniques. In tis capter, we examine additional undamental grap prolems. In te irst two

More information

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method Engineering, 2013, 5, 522-526 ttp://dx.doi.org/10.4236/eng.2013.510b107 Publised Online October 2013 (ttp://www.scirp.org/journal/eng) Two Modifications of Weigt Calculation of te Non-Local Means Denoising

More information

Multiconfiguration Multihop Protocols: A New Class of Protocols for Packet-Switched WDM Optical Networks

Multiconfiguration Multihop Protocols: A New Class of Protocols for Packet-Switched WDM Optical Networks Multiconfiguration Multihop Protocols: A New Class of Protocols for Packet-Switched WDM Optical Networks Jason P. Jue, Member, IEEE, and Biswanath Mukherjee, Member, IEEE Abstract Wavelength-division multiplexing

More information

Energy efficient temporal load aware resource allocation in cloud computing datacenters

Energy efficient temporal load aware resource allocation in cloud computing datacenters Vakilinia Journal of Cloud Computing: Advances, Systems and Applications (2018) 7:2 DOI 10.1186/s13677-017-0103-2 Journal of Cloud Computing: Advances, Systems and Applications RESEARCH Energy efficient

More information

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring Has-Based Indexes Capter 11 Comp 521 Files and Databases Spring 2010 1 Introduction As for any index, 3 alternatives for data entries k*: Data record wit key value k

More information

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes Coarticulation: An Approac for Generating Concurrent Plans in Markov Decision Processes Kasayar Roanimanes kas@cs.umass.edu Sridar Maadevan maadeva@cs.umass.edu Department of Computer Science, University

More information

Forward End-To-End delay Analysis for AFDX networks

Forward End-To-End delay Analysis for AFDX networks Forward End-To-End delay Analysis for AFDX networks Nassima Benammar, Frederic Ridouard, Henri Bauer and Pascal Ricard e-mail: {nassima.benammar,frederic.ridouard, pascal.ricard}@univ-poitiers.fr enri.bauer@ensma.fr

More information

PERFORMANCE OF A CONNECTIONLESS PROTOCOL OVER ATM

PERFORMANCE OF A CONNECTIONLESS PROTOCOL OVER ATM PERFORMANCE OF A CONNECTIONLESS PROTOCOL OVER ATM Geert J. Heijenk Aad P. A. van Moorsel Ignas G. Niemegeers University of Twente, Tele-Informatics and Open Systems P.O.Box 217,7500 AE Enscede, Te Neterlands

More information

Integrating Multimedia Applications in Hard Real-Time Systems

Integrating Multimedia Applications in Hard Real-Time Systems Integrating Multimedia Applications in Hard Real-Time Systems Luca Abeni and Giorgio Buttazzo Scuola Superiore S. Anna, Pisa luca@arti.sssup.it, giorgio@sssup.it Abstract Tis paper focuses on te problem

More information

Generalized Burst Assembly and Scheduling Techniques for QoS Support in Optical Burst-Switched Networks

Generalized Burst Assembly and Scheduling Techniques for QoS Support in Optical Burst-Switched Networks Generalized Assembly and cheduling Techniques for Qo upport in Optical -witched Networks Vinod M. Vokkarane, Qiong Zhang, Jason P. Jue, and Biao Chen Department of Computer cience, The University of Texas

More information

Multi-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art

Multi-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art Multi-Objective Particle Swarm Optimizers: A Survey of te State-of-te-Art Margarita Reyes-Sierra and Carlos A. Coello Coello CINVESTAV-IPN (Evolutionary Computation Group) Electrical Engineering Department,

More information

The Euler and trapezoidal stencils to solve d d x y x = f x, y x

The Euler and trapezoidal stencils to solve d d x y x = f x, y x restart; Te Euler and trapezoidal stencils to solve d d x y x = y x Te purpose of tis workseet is to derive te tree simplest numerical stencils to solve te first order d equation y x d x = y x, and study

More information

Abstract Application and System Model /DATE EDAA

Abstract Application and System Model /DATE EDAA Analysis and Optimization of Fault-Tolerant Embedded Systems wit Hardened Processors Viaceslav Izosimov, Ilia Polian, Paul Pop, Petru Eles, Zebo Peng {viaiz petel zebpe}@ida.liu.se Dept. of Computer and

More information

ITERNET of Things (IoT) envisages a future in which a large

ITERNET of Things (IoT) envisages a future in which a large IEEE TANSACTIONS ON VEHICULA TECHNOLOGY, VOL. 66, NO. 10, OCTOBE 2017 9381 An Accurate Security Game for Low-esource IoT Devices Hicem Sedjelmaci, Member, IEEE, Sidi Moamed Senouci, Member, IEEE, and Tarik

More information

Asynchronous Power Flow on Graphic Processing Units

Asynchronous Power Flow on Graphic Processing Units Asyncronous Power Flow on Grapic Processing Units Manuel Marin, David Defour, Federico Milano To cite tis version: Manuel Marin, David Defour, Federico Milano. Asyncronous Power Flow on Grapic Processing

More information

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall Has-Based Indexes Capter 11 Comp 521 Files and Databases Fall 2012 1 Introduction Hasing maps a searc key directly to te pid of te containing page/page-overflow cain Doesn t require intermediate page fetces

More information

Brief Contributions. A Hybrid Flash File System Based on NOR and NAND Flash Memories for Embedded Devices 1 INTRODUCTION

Brief Contributions. A Hybrid Flash File System Based on NOR and NAND Flash Memories for Embedded Devices 1 INTRODUCTION 1002 IEEE TRANSACTIONS ON COMPUTERS, VOL. 57, NO. 7, JULY 2008 Brief Contributions A Hybrid Flas File System Based on NOR and NAND Flas Memories for Embedded Devices Cul Lee, Student Member, IEEE, Sung

More information

Sensor Data Collection with Expected Reliability Guarantees

Sensor Data Collection with Expected Reliability Guarantees Sensor Data Collection wit Expected Reliability Guarantees Qi Han, Iosif Lazaridis, Sarad Merotra, Nalini Venkatasubramanian Department of Computer Science, University of California, Irvine, CA 9697 qan,iosif,sarad,nalini

More information

Communicator for Mac Quick Start Guide

Communicator for Mac Quick Start Guide Communicator for Mac Quick Start Guide 503-968-8908 sterling.net training@sterling.net Pone Support 503.968.8908, option 2 pone-support@sterling.net For te most effective support, please provide your main

More information

Cooperation in Wireless Ad Hoc Networks

Cooperation in Wireless Ad Hoc Networks Cooperation in Wireless Ad Hoc Networks Vikram Srinivasan, Pavan Nuggealli, Carla F. Ciasserini, Rames R. Rao Department of Electrical and Computer Engineering, University of California at San Diego email:

More information

TREES. General Binary Trees The Search Tree ADT Binary Search Trees AVL Trees Threaded trees Splay Trees B-Trees. UNIT -II

TREES. General Binary Trees The Search Tree ADT Binary Search Trees AVL Trees Threaded trees Splay Trees B-Trees. UNIT -II UNIT -II TREES General Binary Trees Te Searc Tree DT Binary Searc Trees VL Trees Treaded trees Splay Trees B-Trees. 2MRKS Q& 1. Define Tree tree is a data structure, wic represents ierarcical relationsip

More information

Modeling, Simulating and Configuring Programmable Wireless Environments for Multi-User Multi-Objective Networking

Modeling, Simulating and Configuring Programmable Wireless Environments for Multi-User Multi-Objective Networking 1 arxiv:1812.11429v1 [cs.ni] 29 Dec 218 Modeling, Simulating and Configuring Programmable Wireless Environments for Multi-User Multi-Objective Networking Cristos Liaskos, Ageliki Tsioliaridou, Suai Nie,

More information

2.8 The derivative as a function

2.8 The derivative as a function CHAPTER 2. LIMITS 56 2.8 Te derivative as a function Definition. Te derivative of f(x) istefunction f (x) defined as follows f f(x + ) f(x) (x). 0 Note: tis differs from te definition in section 2.7 in

More information

Classification of Osteoporosis using Fractal Texture Features

Classification of Osteoporosis using Fractal Texture Features Classification of Osteoporosis using Fractal Texture Features V.Srikant, C.Dines Kumar and A.Tobin Department of Electronics and Communication Engineering Panimalar Engineering College Cennai, Tamil Nadu,

More information

ANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS

ANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS NTNN SPHRICL COORDINT SSTMS ND THIR PPLICTION IN COMBINING RSULTS FROM DIFFRNT NTNN ORINTTIONS llen C. Newell, Greg Hindman Nearfield Systems Incorporated 133. 223 rd St. Bldg. 524 Carson, C 9745 US BSTRCT

More information

θ R = θ 0 (1) -The refraction law says that: the direction of refracted ray (angle θ 1 from vertical) is (2)

θ R = θ 0 (1) -The refraction law says that: the direction of refracted ray (angle θ 1 from vertical) is (2) LIGHT (Basic information) - Considering te ligt of a projector in a smoky room, one gets to geometrical optics model of ligt as a set of tiny particles tat travel along straigt lines called "optical rays.

More information

SEATTLE: A Scalable Ethernet Architecture for Large Enterprises

SEATTLE: A Scalable Ethernet Architecture for Large Enterprises TRC00349 ACM (Typeset by SPi, Manila, Pilippines) 1 of 35 February 23, 2011 14:31 SEATTLE: A Scalable Eternet Arcitecture for Large Enterprises 1 CHANGHOON KIM, Microsoft MATTHEW CAESAR, University of

More information

Proceedings of the 8th WSEAS International Conference on Neural Networks, Vancouver, British Columbia, Canada, June 19-21,

Proceedings of the 8th WSEAS International Conference on Neural Networks, Vancouver, British Columbia, Canada, June 19-21, Proceedings of te 8t WSEAS International Conference on Neural Networks, Vancouver, Britis Columbia, Canada, June 9-2, 2007 3 Neural Network Structures wit Constant Weigts to Implement Dis-Jointly Removed

More information

Obstacle Avoiding Real-Time Trajectory Generation and Control of Omnidirectional Vehicles

Obstacle Avoiding Real-Time Trajectory Generation and Control of Omnidirectional Vehicles 2009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 10-12, 2009 FrC10.6 Obstacle Avoiding Real-Time Trajectory Generation and Control of Omnidirectional Veicles Ji-wung Coi,

More information

BRICK: A Novel Exact Active Statistics Counter Architecture

BRICK: A Novel Exact Active Statistics Counter Architecture BRICK: A ovel Exact Active Statistics Counter Arcitecture an Hua Bill Lin Jun (Jim) Xu Haiquan (Cuck) Zao College of Computing, Georgia Tec Dept of ECE, UCSD ABSTRACT In tis paper, we present an exact

More information

ICES REPORT Isogeometric Analysis of Boundary Integral Equations

ICES REPORT Isogeometric Analysis of Boundary Integral Equations ICES REPORT 5-2 April 205 Isogeometric Analysis of Boundary Integral Equations by Mattias Taus, Gregory J. Rodin and Tomas J. R. Huges Te Institute for Computational Engineering and Sciences Te University

More information

Energy Efficient Caching for Phase-Change Memory

Energy Efficient Caching for Phase-Change Memory Energy Efficient Cacing for Pase-Cange Memory Neal Barcelo, Miao Zou, Daniel Cole, Micael Nugent, and Kirk Prus Department of Computer Science University of Pittsburg, Pittsburg, Pennsylvania 15260 Email:

More information

15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes

15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes 15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes William Lovas (wlovas@cs) Karl Naden Out: Tuesday, Friday, June 10, 2011 Due: Monday, June 13, 2011 (Written

More information

3.6 Directional Derivatives and the Gradient Vector

3.6 Directional Derivatives and the Gradient Vector 288 CHAPTER 3. FUNCTIONS OF SEVERAL VARIABLES 3.6 Directional Derivatives and te Gradient Vector 3.6.1 Functions of two Variables Directional Derivatives Let us first quickly review, one more time, te

More information

13.5 DIRECTIONAL DERIVATIVES and the GRADIENT VECTOR

13.5 DIRECTIONAL DERIVATIVES and the GRADIENT VECTOR 13.5 Directional Derivatives and te Gradient Vector Contemporary Calculus 1 13.5 DIRECTIONAL DERIVATIVES and te GRADIENT VECTOR Directional Derivatives In Section 13.3 te partial derivatives f x and f

More information