Application-Aware Data Collection in Wireless Sensor Networks
|
|
- Loraine Holmes
- 8 years ago
- Views:
Transcription
1 This image cannot currently be displayed. Application-Aware Data Collection in Wireless Sensor Networks Fang Xiaolin, Gao Hong, Li Jianzhong Harbin Institute of Technology Li Yingshu Georgia State University
2 Outline Existing work Our problem An approximation algorithm A special instance Simulations 2
3 Existing work Multi-application based data collection Data sharing [9] Sample as less data as possible Existing work studies data point sampling Data point 3
4 Our problem Multi-application based data collection Sample data for a continuous interval Acoustic, video information [10], [11] Vibration measurement [12], [13], [14] Speed information [15] Sample an interval 4
5 Problem definition Given a set of n tasks T, each task Ti is denoted as Ti = <bi,ei,li> bi: beginning time ei: end time li: data sampling interval length Find a continuous sub-interval Ii for each task Ti so that 5
6 Problem complexity Non-linear non-convex optimization problem Nonlinear integer programming problem, If bi,ei,li are regarded as integers 6
7 Greedy algorithm overview 1. Sort by end times 2. Find task set P overlap with first 3. Find solution for P, and Remove 4. Back to step 2 7
8 Greedy algorithm overview 1. Sort by end times 2. Find task set P overlap with first 3. Find solution for P, and Remove 4. Back to step 2 8
9 Greedy algorithm overview 1. Sort by end times 2. Find task set P overlap with first 3. Find solution for P, and Remove 4. Back to step 2 9
10 Greedy algorithm overview 1. Sort by end times 2. Find task set P overlap with first 3. Find solution for P, and Remove 4. Back to step 2 10
11 Find solution for P Compute [s,e] for the tasks overlap with each other s=5 e=14 [s,e]=[5,14] 11
12 Approximation algorithm analysis Approximation ratio is 2 Time complexity is 12
13 A special instance General problem Ti = <bi,ei,li> Special instance Ti = <bi,ei,l> The data lengths are the same Can be solved in O(n 2 ) 13
14 Algorithm overview 1. Sort by the end times 2. Remove tasks cover other tasks 3. Dynamic programming Does not affect the result 14
15 Algorithm overview 1. Sort by the end times 2. Remove tasks cover other tasks 3. Dynamic programming 15
16 Algorithm overview 1. Sort by the end times 2. Remove tasks cover other tasks 3. Dynamic programming Computing x(i,j), then x(1,n) is the result [3,7] [5,9] [12,16] x(i,j) [s,e] x(1,1) [3,7] x(2,2) [5,9] x(3,3) [12,16] x(1,2) [3,8] x(2,3) [5,10] 16
17 Algorithm overview 1. Sort by the end times 2. Remove tasks cover other tasks 3. Dynamic programming Computing x(i,j), then x(1,n) is the result [3,8] x(i,j) [s,e] x(1,1) [3,7] x(2,2) [5,9] x(3,3) [12,16] x(1,2) [3,8] x(2,3) [5,10] 17
18 Algorithm overview 1. Sort by the end times 2. Remove tasks cover other tasks 3. Dynamic programming Computing x(i,j), then x(1,n) is the result [5,10] x(i,j) [s,e] x(1,1) [3,7] x(2,2) [5,9] x(3,3) [12,16] x(1,2) [3,8] x(2,3) [5,10] 18
19 Algorithm overview 1. Sort by the end times 2. Remove tasks cover other tasks 3. Dynamic programming x(1,3) = Computing x(i,j), then x(1,n) is the result min [3,10] x(1,1) U + x(2,3) x(1,2) U + x(3,3) x(i,j) [s,e] x(1,1) [3,7] x(2,2) [5,9] x(3,3) [12,16] x(1,2) [3,8] x(2,3) [5,10] 19
20 Tossim Four cases Simulation Tasks are from multi-applications Each application consists of periodical tasks 20
21 Simulation short sampling interval lengths 21
22 Simulation longer sampling interval lengths 22
23 Simulation Different Window size 23
24 Simulation Data loss 24
25 25
K-Cover of Binary sequence
K-Cover of Binary sequence Prof Amit Kumar Prof Smruti Sarangi Sahil Aggarwal Swapnil Jain Given a binary sequence, represent all the 1 s in it using at most k- covers, minimizing the total length of all
More informationSolutions to Homework 6
Solutions to Homework 6 Debasish Das EECS Department, Northwestern University ddas@northwestern.edu 1 Problem 5.24 We want to find light spanning trees with certain special properties. Given is one example
More informationReal-Time Scheduling (Part 1) (Working Draft) Real-Time System Example
Real-Time Scheduling (Part 1) (Working Draft) Insup Lee Department of Computer and Information Science School of Engineering and Applied Science University of Pennsylvania www.cis.upenn.edu/~lee/ CIS 41,
More informationGraduate School of Science and Technology
Contents Master's Course 2 Three Common Courses 2 Materials and Life Science Course 2 Computer and Information Science Course 3 Electrical and Mechanical Engineering Course 3 Doctor's Course 5 Materials
More informationCONTROL, COMMUNICATION & SIGNAL PROCESSING (CCSP)
CONTROL, COMMUNICATION & SIGNAL PROCESSING (CCSP) KEY RESEARCH AREAS Data compression for speech, audio, images, and video Digital and analog signal processing Image and video processing Computer vision
More informationEvaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network
Evaluation of Unlimited Storage: Towards Better Data Access Model for Sensor Network Sagar M Mane Walchand Institute of Technology Solapur. India. Solapur University, Solapur. S.S.Apte Walchand Institute
More information1 Simulating Brownian motion (BM) and geometric Brownian motion (GBM)
Copyright c 2013 by Karl Sigman 1 Simulating Brownian motion (BM) and geometric Brownian motion (GBM) For an introduction to how one can construct BM, see the Appendix at the end of these notes A stochastic
More informationResearch Article Cloud Platform Based on Mobile Internet Service Opportunistic Drive and Application Aware Data Mining
Electrical and Computer Engineering Volume 25, Article ID 357378, 7 pages http://dx.doi.org/.55/25/357378 Research Article Cloud Platform Based on Mobile Internet Service Opportunistic Drive and Application
More informationLoad-Balanced Virtual Backbone Construction for Wireless Sensor Networks
Load-Balanced Virtual Backbone Construction for Wireless Sensor Networks Jing (Selena) He, Shouling Ji, Yi Pan, Zhipeng Cai Department of Computer Science, Georgia State University, Atlanta, GA, USA, {jhe9,
More informationPlanning and Scheduling in Manufacturing and Services
Michael L. Pinedo Planning and Scheduling in Manufacturing and Services Second edition 4y Springer Preface Contents of CD-ROM vii xvii Part I Preliminaries 1 Introduction 3 1.1 Planning and Scheduling:
More informationDesign of a Bundle Shopbot. Abstract
Design of a Bundle Shopbot Robert Garfinkel 1 (Email: robert.garfinkel@business.uconn.edu) Ram Gopal 1 (Email: ram@business.uconn.edu) Arvind Tripathi 2 (Email: tripathi@u.washington.edu) Fang Yin 1 (Email:
More informationSDN-based Application-Aware Networking on the Example of YouTube Video Streaming
Institute of Computer Science Chair of Communication Networks Prof. Dr.-Ing. P. Tran-Gia SDN-based Application-Aware Networking on the Example of YouTube Video Streaming www3.informatik.uni-wuerzburg.de
More informationNear Optimal Solutions
Near Optimal Solutions Many important optimization problems are lacking efficient solutions. NP-Complete problems unlikely to have polynomial time solutions. Good heuristics important for such problems.
More informationJOB/scheduling system is one of the core and challenging. An Greedy-Based Job Scheduling Algorithm in Cloud Computing
JOURNAL OF SOFTWARE, VOL. 9, NO. 4, APRIL 2014 921 An Greedy-Based Job Scheduling Algorithm in Cloud Computing Ji Li a,b, Longhua Feng a,b, Shenglong Fang c a College of Computer Science, Chongqing University,
More informationAN ECONOMICS-BASED POWER-AWARE PROTOCOL FOR COMPUTATION DISTRIBUTION IN MOBILE AD-HOC NETWORKS
AN ECONOMICS-BASED POWER-AWARE PROTOCOL FOR COMPUTATION DISTRIBUTION IN MOBILE AD-HOC NETWORKS Li Shang, Robert P. Dick, and Nira K. Jha Department of Electrical Engineering Princeton University, Princeton,
More informationShare of Turnover in Percentage per 30-Min Intervals
CB(1)342/15-16(01) Annex For Information Update on Extension of Trading Hours in the Securities Market Purpose Further to the information paper dated 11 November 2013 on the extension of trading hours
More informationCloud Storage and Online Bin Packing
Cloud Storage and Online Bin Packing Doina Bein, Wolfgang Bein, and Swathi Venigella Abstract We study the problem of allocating memory of servers in a data center based on online requests for storage.
More informationBilevel Models of Transmission Line and Generating Unit Maintenance Scheduling
Bilevel Models of Transmission Line and Generating Unit Maintenance Scheduling Hrvoje Pandžić July 3, 2012 Contents 1. Introduction 2. Transmission Line Maintenance Scheduling 3. Generating Unit Maintenance
More informationResearch Article A Virtual-Ring-Based Data Storage and Retrieval Scheme in Wireless Sensor Networks
Distributed Sensor Networks Volume 212, Article ID 76315, 1 pages doi:1.1155/212/76315 Research Article A Virtual-Ring-Based Data Storage and Retrieval Scheme in Wireless Sensor Networks Xingpo Ma, Jianliang
More informationKeywords coverage holes, energy efficient, hole detection, hole healing
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Hole Detection and
More informationResearch Article Robust Monitor Assignment with Minimum Cost for Sensor Network Tomography
Distributed Sensor Networks Volume 2015, Article ID 512463, 6 pages http://dx.doi.org/10.1155/2015/512463 Research Article Robust Monitor Assignment with Minimum Cost for Sensor Network Tomography Xiaojin
More informationA CHAOS BASED SECURE CLUSTER PROTOCOL FOR WIRELESS SENSOR NETWORKS
K Y B E R N E T I K A V O L U M E 4 4 ( 2 0 0 8 ), N U M B E R 4, P A G E S 5 2 2 5 3 3 A CHAOS BASED SECURE CLUSTER PROTOCOL FOR WIRELESS SENSOR NETWORKS Qian Fang, Ying Liu and Xiaoqun Zhao Security
More informationSocial Network Generation and Friend Ranking Based on Mobile Phone Data
Social Network Generation and Friend Ranking Based on Mobile Phone Data Mustafa I lhan Akbas, Raghu Nandan Avula, Mostafa A. Bassiouni, Damla Turgut Department of Electrical Engineering and Computer Science
More informationDistributed Caching Algorithms for Content Distribution Networks
Distributed Caching Algorithms for Content Distribution Networks Sem Borst, Varun Gupta, Anwar Walid Alcatel-Lucent Bell Labs, CMU BCAM Seminar Bilbao, September 30, 2010 Introduction Scope: personalized/on-demand
More informationOnline Scheduling for Cloud Computing and Different Service Levels
2012 IEEE 201226th IEEE International 26th International Parallel Parallel and Distributed and Distributed Processing Processing Symposium Symposium Workshops Workshops & PhD Forum Online Scheduling for
More informationAccuracy of Homology based Approaches for Coverage Hole Detection in Wireless Sensor Networks
Accuracy of Homology based Approaches for Coverage Hole Detection in Wireless Sensor Networks Feng Yan, Philippe Martins, Laurent Decreusefond To cite this version: Feng Yan, Philippe Martins, Laurent
More informationVEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS
VEHICLE TRACKING USING ACOUSTIC AND VIDEO SENSORS Aswin C Sankaranayanan, Qinfen Zheng, Rama Chellappa University of Maryland College Park, MD - 277 {aswch, qinfen, rama}@cfar.umd.edu Volkan Cevher, James
More informationAnalysis of seismic response control for long-span cable-stayed. bridge under traveling wave input *
Analysis of seismic response control for long-span cable-stayed bridge under traveling wave input * QI ing-jun, LI iao-jun 2 ( Associate Professor, School of Civil Engineering, Shandong Jianzhu University,
More informationOffline sorting buffers on Line
Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: rkhandekar@gmail.com 2 IBM India Research Lab, New Delhi. email: pvinayak@in.ibm.com
More informationScan-Line Fill. Scan-Line Algorithm. Sort by scan line Fill each span vertex order generated by vertex list
Scan-Line Fill Can also fill by maintaining a data structure of all intersections of polygons with scan lines Sort by scan line Fill each span vertex order generated by vertex list desired order Scan-Line
More informationTronico Technology Company Limited. First step of IOT - DIY smart home
Tronico Technology Company Limited First step of IOT - DIY smart home What is IOT? 2 The Internet of Things (IoT) is the network of physical objects devices, vehicles, buildings and other items that enables
More informationE-Logistics Successes and Failures
E-Logistics Successes and Failures Copyright April 2002 H. Donald Ratliff H. Donald Ratliff 1 Executive Director Regents & UPS Professor don.ratliff@isye.gatech.edu President & CEO don.ratliff@velant.com
More informationEvaluation of an Algorithm used in Routing and Service Discovery Protocols of Wireless Sensor Networks The Trickle Algorithm
Evaluation of an Algorithm used in Routing and Service Discovery Protocols of Wireless Sensor Networks The Trickle Algorithm Markus Becker mab@comnets.uni-bremen.de ComNets, TZI, University Bremen, Germany
More informationContent Delivery Networks. Shaxun Chen April 21, 2009
Content Delivery Networks Shaxun Chen April 21, 2009 Outline Introduction to CDN An Industry Example: Akamai A Research Example: CDN over Mobile Networks Conclusion Outline Introduction to CDN An Industry
More informationMath 151. Rumbos Spring 2014 1. Solutions to Assignment #22
Math 151. Rumbos Spring 2014 1 Solutions to Assignment #22 1. An experiment consists of rolling a die 81 times and computing the average of the numbers on the top face of the die. Estimate the probability
More informationOn Video Content Delivery in Wireless Environments
, pp.81-85 http://dx.doi.org/10.14257/astl.2014.65.20 On Video Content Delivery in Wireless Environments Po-Jen Chuang and Hang-Li Chen Department of Electrical Engineering Tamkang University Tamsui, New
More informationIBM SPSS Neural Networks 22
IBM SPSS Neural Networks 22 Note Before using this information and the product it supports, read the information in Notices on page 21. Product Information This edition applies to version 22, release 0,
More informationA Bidding Protocol for Deploying Mobile Sensors
A Bidding Protocol for Deploying Mobile Sensors Guiling Wang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania State University, University Park, PA 1 Email: {guiwang,gcao,tlp}@cse.psu.edu
More informationWireless LAN Services for Hot-Spot
Wireless LAN Services for Hot-Spot Woo-Yong Choi Electronics and Telecommunications Research Institute wychoi53@etri.re.kr ETRI Contents Overview Wireless LAN Services Current IEEE 802.11 MAC Protocol
More informationScan Conversion of Filled Primitives Rectangles Polygons. Many concepts are easy in continuous space - Difficult in discrete space
Walters@buffalo.edu CSE 480/580 Lecture 7 Slide 1 2D Primitives I Point-plotting (Scan Conversion) Lines Circles Ellipses Scan Conversion of Filled Primitives Rectangles Polygons Clipping In graphics must
More informationPROVIDING STATISTICAL QOS GUARANTEE FOR VOICE OVER IP IN THE IEEE 802.11 WIRELESS LANS
V OICE OVER WIRELESS LOCAL AREA N ETWORK PROVIDING STATISTICAL QOS GUARANTEE FOR VOICE OVER IP IN THE IEEE 82.11 WIRELESS LANS HONGQIANG ZHAI, JIANFENG WANG, AND YUGUANG FANG, UNIVERSITY OF FLORIDA The
More informationParallel Data Selection Based on Neurodynamic Optimization in the Era of Big Data
Parallel Data Selection Based on Neurodynamic Optimization in the Era of Big Data Jun Wang Department of Mechanical and Automation Engineering The Chinese University of Hong Kong Shatin, New Territories,
More information3/25/2014. 3/25/2014 Sensor Network Security (Simon S. Lam) 1
Sensor Network Security 3/25/2014 Sensor Network Security (Simon S. Lam) 1 1 References R. Blom, An optimal class of symmetric key generation systems, Advances in Cryptology: Proceedings of EUROCRYPT 84,
More informationApproximability of Two-Machine No-Wait Flowshop Scheduling with Availability Constraints
Approximability of Two-Machine No-Wait Flowshop Scheduling with Availability Constraints T.C. Edwin Cheng 1, and Zhaohui Liu 1,2 1 Department of Management, The Hong Kong Polytechnic University Kowloon,
More informationCommon Approaches to Real-Time Scheduling
Common Approaches to Real-Time Scheduling Clock-driven time-driven schedulers Priority-driven schedulers Examples of priority driven schedulers Effective timing constraints The Earliest-Deadline-First
More informationConcurrent Optimization of Consumer s Electrical Energy Bill and Producer s Power Generation Cost under a Dynamic Pricing Model
Concurrent Optimization of Consumer s Electrical Energy Bill and Producer s Power Generation Cost under a Dynamic Pricing Model Tiansong Cui, Hadi Goudarzi, Safar Hatami, Shahin Nazarian, and Massoud Pedram
More informationHow To Balance Network Load In A Wireless Sensor Network
Balancing Network Traffic Load in Geographic Hash Table (GHT) R. Asha, V.Manju, Meka Sindhu & T. Subha Department of Information Technology, Sri Sai Ram Engineering College, Chennai. E-mail : ashaniteesh@gmail.com,
More informationARTIFICIAL NEURAL NETWORKS FOR ADAPTIVE MANAGEMENT TRAFFIC LIGHT OBJECTS AT THE INTERSECTION
The 10 th International Conference RELIABILITY and STATISTICS in TRANSPORTATION and COMMUNICATION - 2010 Proceedings of the 10th International Conference Reliability and Statistics in Transportation and
More informationAn Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks
An Efficient Hybrid Data Gathering Scheme in Wireless Sensor Networks Ayon Chakraborty 1, Swarup Kumar Mitra 2, and M.K. Naskar 3 1 Department of CSE, Jadavpur University, Kolkata, India 2 Department of
More informationA Dissertation. entitled. Data Warehouse Operational Design: View Selection and Performance Simulation. Vikas R. Agrawal. Co-Advisor: Dr.
A Dissertation entitled Data Warehouse Operational Design: View Selection and Performance Simulation by Vikas R. Agrawal Submitted as partial fulfillment of the requirements for the Doctor of Philosophy
More informationUsing Macro News Events in Automated FX Trading Strategy
Using Macro News Events in Automated FX Trading Strategy The Main Thesis The arrival of macroeconomic news from the world s largest economies brings additional volatility to the market. 2 Overall methodology
More informationACTIVITY THEORY (AT) REVIEW
ACTIVITY THEORY IN ACTION Brian Tran, CS 260 ACTIVITY THEORY (AT) REVIEW Activities are key structure in AT Composed of subjects, tools, and objective Ex. Bob (subject) is using the weights and treadmills
More informationLogistic Regression. Jia Li. Department of Statistics The Pennsylvania State University. Logistic Regression
Logistic Regression Department of Statistics The Pennsylvania State University Email: jiali@stat.psu.edu Logistic Regression Preserve linear classification boundaries. By the Bayes rule: Ĝ(x) = arg max
More informationMonte Carlo Methods in Finance
Author: Yiyang Yang Advisor: Pr. Xiaolin Li, Pr. Zari Rachev Department of Applied Mathematics and Statistics State University of New York at Stony Brook October 2, 2012 Outline Introduction 1 Introduction
More informationOptimization Problems in Infrastructure Security
Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1 Optimization Problems in Infrastructure Security Evangelos Kranakis Carleton University School of Computer Science Ottawa,
More informationPredictability of Non-Linear Trading Rules in the US Stock Market Chong & Lam 2010
Department of Mathematics QF505 Topics in quantitative finance Group Project Report Predictability of on-linear Trading Rules in the US Stock Market Chong & Lam 010 ame: Liu Min Qi Yichen Zhang Fengtian
More informationManual for SOA Exam MLC.
Chapter 4 Life Insurance Extract from: Arcones Manual for the SOA Exam MLC Fall 2009 Edition available at http://wwwactexmadrivercom/ 1/13 Non-level payments paid at the end of the year Suppose that a
More informationStructural Health Monitoring Tools (SHMTools)
Structural Health Monitoring Tools (SHMTools) Parameter Specifications LANL/UCSD Engineering Institute LA-CC-14-046 c Copyright 2014, Los Alamos National Security, LLC All rights reserved. May 30, 2014
More informationArithmetic Coding: Introduction
Data Compression Arithmetic coding Arithmetic Coding: Introduction Allows using fractional parts of bits!! Used in PPM, JPEG/MPEG (as option), Bzip More time costly than Huffman, but integer implementation
More informationOptimal Branch Exchange for Feeder Reconfiguration in Distribution Networks
Optimal Branch Exchange for Feeder Reconfiguration in Distribution Networks Qiuyu Peng and Steven H. Low Engr. & App. Sci., Caltech, CA Abstract The feeder reconfiguration problem chooses the on/off status
More informationA study of artificial bee colony variants for radar waveform design
Zhang and Zhang EURASIP Journal on Wireless Communications and Networking (2016) 2016:13 DOI 10.1186/s13638-015-0510-3 RESEARCH Open Access A study of artificial bee colony variants for radar waveform
More informationOn the Synchronization of Co-Located IEEE 802.15.4 Networks for IoT Applications
On the Synchronization of Co-Located IEEE 802.15.4 Networks for IoT Applications Falko Dressler and Noorsalwati Nordin Dept. of Computer Science, University of Paderborn, Germany Institute of Computer
More informationAlgorithm Design and Analysis
Algorithm Design and Analysis LECTURE 27 Approximation Algorithms Load Balancing Weighted Vertex Cover Reminder: Fill out SRTEs online Don t forget to click submit Sofya Raskhodnikova 12/6/2011 S. Raskhodnikova;
More informationAn Expressive Auction Design for Online Display Advertising. AUTHORS: Sébastien Lahaie, David C. Parkes, David M. Pennock
An Expressive Auction Design for Online Display Advertising AUTHORS: Sébastien Lahaie, David C. Parkes, David M. Pennock Li PU & Tong ZHANG Motivation Online advertisement allow advertisers to specify
More informationResearch Article Average Bandwidth Allocation Model of WFQ
Modelling and Simulation in Engineering Volume 2012, Article ID 301012, 7 pages doi:10.1155/2012/301012 Research Article Average Bandwidth Allocation Model of WFQ TomášBaloghandMartinMedvecký Institute
More informationDelay-Aware Big Data Collection Strategies for Sensor Cloud Services Dr. Chi-Tsun (Ben), Cheng
Delay-Aware Big Data Collection Strategies for Sensor Cloud Services Dr. Chi-Tsun (Ben), Cheng chi-tsun.cheng@polyu.edu.hk http://www.eie.polyu.edu.hk/~bcheng/ An Overview Introduction Wireless Sensor
More informationSingle machine parallel batch scheduling with unbounded capacity
Workshop on Combinatorics and Graph Theory 21th, April, 2006 Nankai University Single machine parallel batch scheduling with unbounded capacity Yuan Jinjiang Department of mathematics, Zhengzhou University
More informationLoad Balancing Hashing in Geographic Hash Tables
Load Balancing Hashing in Geographic Hash Tables M. Elena Renda, Giovanni Resta, and Paolo Santi Abstract In this paper, we address the problem of balancing the network traffic load when the data generated
More informationScheduling Aperiodic and Sporadic Jobs in Priority- Driven Systems
Scheduling Aperiodic and Sporadic Jobs in Priority- Driven Systems Ingo Sander ingo@kth.se Liu: Chapter 7 IL2212 Embedded Software 1 Outline l System Model and Assumptions l Scheduling Aperiodic Jobs l
More informationPEDAMACS: Power efficient and delay aware medium access protocol for sensor networks
PEDAMACS: Power efficient and delay aware medium access protocol for sensor networks Sinem Coleri and Pravin Varaiya Department of Electrical Engineering and Computer Science University of California,
More informationRobust Egress Interdomain Traffic Engineering
Robust Egress Interdomain Traffic Engineering Jian Qiu and Lixin Gao Department of ECE, University of Massachusetts, Amherst, MA 0003 {jqiu,lgao}@ecs.umass.edu Abstract BGP is traditionally configured
More informationPRODUCTION PLANNING AND SCHEDULING Part 1
PRODUCTION PLANNING AND SCHEDULING Part Andrew Kusiak 9 Seamans Center Iowa City, Iowa - 7 Tel: 9-9 Fax: 9-669 andrew-kusiak@uiowa.edu http://www.icaen.uiowa.edu/~ankusiak Forecasting Planning Hierarchy
More informationSpecification of the Bayesian CRM: Model and Sample Size. Ken Cheung Department of Biostatistics, Columbia University
Specification of the Bayesian CRM: Model and Sample Size Ken Cheung Department of Biostatistics, Columbia University Phase I Dose Finding Consider a set of K doses with labels d 1, d 2,, d K Study objective:
More informationSelecting Best Investment Opportunities from Stock Portfolios Optimized by a Multiobjective Evolutionary Algorithm
Selecting Best Investment Opportunities from Stock Portfolios Optimized by a Multiobjective Evolutionary Algorithm Krzysztof Michalak Department of Information Technologies, Institute of Business Informatics,
More informationAUTOMATIC ACCIDENT DETECTION AND AMBULANCE RESCUE WITH INTELLIGENT TRAFFIC LIGHT SYSTEM
AUTOMATIC ACCIDENT DETECTION AND AMBULANCE RESCUE WITH INTELLIGENT TRAFFIC LIGHT SYSTEM Mr.S.Iyyappan 1, Mr.V.Nandagopal 2 P.G Scholar, Dept. of EEE, Ganadipathy Tulis s Jain Engineering College, Vellore,
More informationA Simple Inventory System
A Simple Inventory System Section 1.3 Discrete-Event Simulation: A First Course Section 1.3: A Simple Inventory System customers. demand items.. facility. order items.. supplier Distributes items from
More informationScheduling Virtual Machines in Cloud Computing For Enhancing Income and Resource Utilization
Scheduling Virtual Machines in Cloud Computing For Enhancing Income and Resource Utilization Sanaz Yousefian 1 and Ahmad Habibi Zadnavin 1* 1 Department of Computer Engineering, Engineering Faculty, Azad
More informationFairness and Throughput Guarantees with Maximal Scheduling in Multi-hop Wireless Networks
Fairness and Throughput Guarantees with Maximal Scheduling in Multi-hop Wireless Networks Saswati Sarkar University of Pennsylvania Philadelphia, PA, USA swati@seas.upenn.edu Prasanna Chaporkar INRIA Paris,
More informationCompletion Time Scheduling and the WSRPT Algorithm
Completion Time Scheduling and the WSRPT Algorithm Bo Xiong, Christine Chung Department of Computer Science, Connecticut College, New London, CT {bxiong,cchung}@conncoll.edu Abstract. We consider the online
More informationESE 50 ISE 10 ESE - 50 20 - - 4 2 ISE -
Second Year B.Tech. Program in Electronics Semester I 1MA 203 201 202 203 204 252 253 Applied Mathematics III Circuits Theory L T P Credits Scheme Theory Marks Practical Marks -- Data Structures and Algorithms
More informationResource Allocation Modeling Techniques Applied to Air Force Crew Scheduling Problem
Kepler Research, Inc. Proprietary Resource Allocation Modeling Techniques Applied to Air Force Crew Scheduling Problem Submitted by: Kepler Research, Inc. February 2012 1. Introduction and Background The
More informationHY345 Operating Systems
HY345 Operating Systems Recitation 2 - Memory Management Solutions Panagiotis Papadopoulos panpap@csd.uoc.gr Problem 7 Consider the following C program: int X[N]; int step = M; //M is some predefined constant
More informationIndexing Spatio-Temporal archive As a Preprocessing Alsuccession
The VLDB Journal manuscript No. (will be inserted by the editor) Indexing Spatio-temporal Archives Marios Hadjieleftheriou 1, George Kollios 2, Vassilis J. Tsotras 1, Dimitrios Gunopulos 1 1 Computer Science
More informationEricsson T18s Voice Dialing Simulator
Ericsson T18s Voice Dialing Simulator Mauricio Aracena Kovacevic, Anna Dehlbom, Jakob Ekeberg, Guillaume Gariazzo, Eric Lästh and Vanessa Troncoso Dept. of Signals Sensors and Systems Royal Institute of
More informationHardware and Software Design of Mine Environmental Monitoring System
, pp.67-76 http://dx.doi.org/10.14257/ijmue.2014.9.1.07 Hardware and Software Design of Mine Environmental Monitoring System Dongjie Li and Jian Song School of Automation, Harbin University of Science
More informationScheduling Parallel Jobs with Linear Speedup
Scheduling Parallel Jobs with Linear Speedup Alexander Grigoriev and Marc Uetz Maastricht University, Quantitative Economics, P.O.Box 616, 6200 MD Maastricht, The Netherlands. Email: {a.grigoriev,m.uetz}@ke.unimaas.nl
More informationA Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique
A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique Jyoti Malhotra 1,Priya Ghyare 2 Associate Professor, Dept. of Information Technology, MIT College of
More informationAppendix: Simple Methods for Shift Scheduling in Multi-Skill Call Centers
MSOM.1070.0172 Appendix: Simple Methods for Shift Scheduling in Multi-Skill Call Centers In Bhulai et al. (2006) we presented a method for computing optimal schedules, separately, after the optimal staffing
More informationIndex tracking UNDER TRANSACTION COSTS:
MARKE REVIEWS Index tracking UNDER RANSACION COSS: rebalancing passive portfolios by Reinhold Hafner, Ansgar Puetz and Ralf Werner, RiskLab GmbH Portfolio managers must be able to estimate transaction
More information1/18/2013. 5.5-year Ph.D. student internships in. Done job hunting recently. Will join Yahoo! Labs soon. Interviewed with
Liangjie Hong Ph.D. Candidate Dept. of Computer Science and Engineering 5.5-year Ph.D. student internships in a local software company (2008, 2 months) Yahoo! Labs (2010, 3 months) Yahoo! Labs (2011, 3
More informationTowards Efficient Routing in Vehicular Ad Hoc Networks
Towards Efficient Routing in Vehicular Ad Hoc Networks Moez Jerbi*, Sidi-Mohammed Senouci* and Yacine Ghamri-Doudane** *France Telecom R&D, Core Network Laboratories, Lannion, France **Networks and Multimedia
More informationLoad Balanced Short Path Routing in Wireless Networks
Load Balanced Short Path Routing in Wireless Networks Jie Gao, IEEE member, Li Zhang Abstract We study routing algorithms on wireless networks that use only short paths, for minimizing latency, and achieve
More informationIn Flight ALS Point Cloud Georeferencing using RTK GPS Receiver
Integration of Geodetic Sensors In Flight ALS Point Cloud Georeferencing using RTK GPS Receiver Yannick Stebler, Philipp Schär, Jan Skaloud, Bertrand Merminod E mail: yannick.stebler@epfl.ch Web: http://topo.epfl.ch
More informationLearning in Abstract Memory Schemes for Dynamic Optimization
Fourth International Conference on Natural Computation Learning in Abstract Memory Schemes for Dynamic Optimization Hendrik Richter HTWK Leipzig, Fachbereich Elektrotechnik und Informationstechnik, Institut
More informationStreamStorage: High-throughput and Scalable Storage Technology for Streaming Data
: High-throughput and Scalable Storage Technology for Streaming Data Munenori Maeda Toshihiro Ozawa Real-time analytical processing (RTAP) of vast amounts of time-series data from sensors, server logs,
More informationRANKING OF CLOUD SERVICE PROVIDERS IN CLOUD
RANKING OF CLOUD SERVICE PROVIDERS IN CLOUD C.S. RAJARAJESWARI, M. ARAMUDHAN Research Scholar, Bharathiyar University,Coimbatore, Tamil Nadu, India. Assoc. Professor, Department of IT, PKIET, Karaikal,
More informationThree Effective Top-Down Clustering Algorithms for Location Database Systems
Three Effective Top-Down Clustering Algorithms for Location Database Systems Kwang-Jo Lee and Sung-Bong Yang Department of Computer Science, Yonsei University, Seoul, Republic of Korea {kjlee5435, yang}@cs.yonsei.ac.kr
More informationCourse overview Processamento de sinais 2009/10 LEA
Course overview Processamento de sinais 2009/10 LEA João Pedro Gomes jpg@isr.ist.utl.pt Instituto Superior Técnico Processamento de sinais MEAer (IST) Course overview 1 / 19 Course overview Motivation:
More informationC21 Model Predictive Control
C21 Model Predictive Control Mark Cannon 4 lectures Hilary Term 216-1 Lecture 1 Introduction 1-2 Organisation 4 lectures: week 3 week 4 { Monday 1-11 am LR5 Thursday 1-11 am LR5 { Monday 1-11 am LR5 Thursday
More information