PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS

Size: px
Start display at page:

Download "PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS"

Transcription

1 PREDICTIO OF POSSIBLE COGESTIOS I SLA CREATIO PROCESS Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, Dubrovnik, Croatia Tel , Fax , e-ail sreckokrile@uniduhr Ivana Pezelj CARet - Croatian Acadeic and Research etwork J Marohnica bb, 0000 Zagreb, Croatia Tel , Fax , e-ail ivanapezelj@carnethr Abstract - In our paper we propose efficient tool to predict possible traffic congestions caused by contracting of a new SLA (Service Level Agreeent) It could be an iportant part of adission control process in SLA creation (DiffServ networks) aturally, it is off-line algorith and we can use it only through negotiation process (SLA creation), just to ensure better QoS end-to-end routing in the oent of service invocation The proble is seen as an expansion proble of link capacities in given liits for given traffic deands (SLAs) Such explicit traffic engineering technique provides the possibility to intelligently tailor the route such that different parts of the network reain equally loaded It helps to avoid the creation of bottleneck links on the path and aintains high network resource utilization efficiency Also, it is capable to consider the ipact of end-toend delay on network resource provisioning, in the oent of SLA creation Index Ters - adission control in DiffServ networks, SLA creation, end-to-end QoS routing, traffic routing of aggregate flows I ITRODUCTIO In DiffServ networks the classification of the aggregated flows is perfored according to the SLA (Service Level Agreeent) signed between a custoer and the network operator (ISP) Each SLA contract specifies how uch traffic ay be sent (service class, bandwidth, delay liit etc) and defines a tie period for utilization of that service We know that such period can be very long soeties (eg for VoIP) To obtain quantitative end-toend guarantees in DiffServ architecture, based on traffic handling echaniss with aggregate flows, soe kind of congestion control in the phase of the negotiation process (SLA creation) is necessary Such approach we need in MPLS-based networks, too Multi-protocol label switching (MPLS) has gained popularity as a technology for anaging network resources and providing of perforance guarantees owadays, IP operators don't use any appropriate tool in that phase of adission control process They only use effective end-to-end routing technique in the oent of service invocation Such approach cannot help to prevent bottlenecks or ensure QoS In this paper we are looking for optial path provisioning in context of all existing traffic deands participating in the sae tie period (forer contracted SLAs); see fig and fig 2 The ain condition is: the sufficient network resources ust be available at any oent of that period In the worse case it ust be sufficient for the first service class (guaranteed QoS) So, in the process of SLA creation the proble of new SLA acceptance exists It eans that soe kind of congestion control ust be done, taking care of all existing flows in the sae tie If it is possible to find routing sequence without lack of capacity (shortage), the possibility of traffic congestion will be significantly reduced in the oent of service invocation The heuristic algorith we proposed in this paper is off-line algorith and we can use it only in the negotiation process of SLA creation, just to ensure better QoS end-to-end routing in the oent of service invocation The probles of new SLA creation and correlation with optial resource anageent are investigating in section II Explanation of the atheatical odel and heuristic approach for traffic routing technique is given in section III uerical exaples, testing results and algorith application are discussed in section IV II EW SLA CREATIO PROBLEM The network operator (eg ISP) wants to accept new SLA (traffic flow) that generates the traffic flow between s In DiffServ/MPLS architecture we call the

2 SLA_3 egress SLA_5 ingress ingress SLA_ ingress SLA_2 ingress 2 4 egress SLA_2 egress SLA_3 ingress SLA_4 egress s 6 d 3 core network 5 SLA_ egress SLA_4 ingress SLA_5 egress Figure An exaple of nuber of SLAs in context of new SLA creation In service specifications (service activation and duration) they share the sae period of tie; see fig 2 The optial routing sequence for new SLA need not to be the shortest path solution LER (Label Edge Router) Traffic deand on exit of LER represents the su of all ingress and egress flows Interior s in core network, capable to forward traffic in equivalent classes (FEC), are called LSR (Label Switching Routers) The network that is shown in figure can be a representation of such architecture Such aggregated flow is coing to LSR and has to be routed to destination Packets of the sae FEC are assigned the sae label and generally traverse trough the sae path across the MPLS network An FEC ay consist of packets that have coon ingress and egress nodes, or the sae service class and sae ingress/egress nodes or any other cobination In this case, the FEC of appropriate service class aggregates traffic deands (new SLA and forer contracted SLAs) of the sae QoS level A path traversed by an FEC is called a label switching path (LSP) In that sense network operator has to find optial path for the FEC but without any congestion in the network Possibility of congestion on soe link exists specially for definite period of tie; see fig 2 It should not be anaged anually so we need very effective tool to check such congestion possibility in the network We need congestion control algorith related on liited link resources and predicted traffic (caused with forer accepted SLAs) For each counication link in the network given traffic deands can be satisfied on different QoS levels (eg with different bandwidth) Fro exaples in fig and fig 2 we have three different QoS levels (service classes) Traffic can be satisfied on appropriate QoS level or higher, but not on lower QoS level Figure 2 An exaple of nuber of SLAs that participate in the sae period of tie Optial routing have to be done for that critical period (duration of new SLA)

3 In fact, we use different LSP for different service class But we don t want that physical network be divided into ultiple virtual networks, one per service class We strongly need the optial utilization of liited capacity The end effect is that we want to give to preiu traffic (fully satyisfied) ore resources, but exactly that is necessary, no less no ore The optial resource anageent proble can be seen as the link capacity expansion proble (CEP) fro the coon source with expansion values in allowed liits (link capacity); see [2] and [4] If the optial routing sequence has any link expansion with value that exceeds allowed liits, it eans that link capacity on the path is not sufficient for such traffic It eans that new SLA cannot be accepted or ust be redefined through negotiation process For exaple, the custoer can decide to take the adaptive QoS service class instead of fully satisfied (guaranteed) service class Soe iportant papers about that proble are [], [5] and [6] In the paper [7] we can see influence of delay to optial traffic engineering routing In the paper [3] such algorith is the part of service anageent architecture III THE MATHEMATICAL MODEL AD HEURISTIC APPROACH OF CEP Let G (A, E) denote a network topology, where A is the set of nodes and E the set of links The source and destination nodes (eg s in IP-doain) are denoted by s and d respectively Between the there are M interior s on the path; see fig 3 The nuber of QoS easures (eg bandwidth, delay) is denoted by z QoS easures can be roughly classified into additive (eg delay) and non-additive (eg available bandwidth) In case of an additive easure, the QoS value of the path is equal to the su of the corresponding weights of the link along that path For a non-additive easure, the QoS value of the path is the iniu (or axiu) link weight along the path In this atheatical odel it is assued that the network state inforation (eg traffic deands, link capacities, delay liits) are teporary static Consider a network G (A, E) where each link is characterized by z-diensional link weight vector, consisting of z nonnegative QoS weights {w n (s,d), i =,, z, (s,d) E, n =,, } as coponents We differentiate n service classes (QoS levels) For M interior s on the path we have: M links + 2 = M + links Given constraints for delay on the path for appropriate service class can be denoted by L,n Definition of the ulti-constrained (MCP) proble is to find a path P fro s to d such that: w i ( P ) = in wi, n ( s, d ) Li, n n= ( s, d ) P for i =,, z ; n =,, In this paper we dealt about one-diensional link weight vectors for M+ links, with delay constraints denoted with L,n The link weight (cost) is the function of used capacity and delay: lower used capacity (saller bandwidth and delay in acceptable liits) gives lower weight (cost) The ain condition is that given traffic deands ust be fully satisfied without shortages onlinear cost function is necessary if link weights are not positively correlated () O R, X, X,2 X,M I, =0, I,2,2 I,3 I,M,M I,M+ = 0 r, r,2 r,m QoS level I 2, =0 I, =0 y 2, 2, y 2, I 2,2 y 2,2 2,2 y 2,2 I,2,,2 I 2,3 r 2, y, r 2,2 y,2 r 2,M I,3 I 2,M I,M y 2,M 2,M y 2,M I,M+ = 0,M y,m I 2,M+ = 0 r, interior r,2 r,m link link 2 link M+ interior M Figure 3 A network flow representation of the CEP odel applied for congestion contol in SLA cration proces Service classses are differentiated but possible traffic conversion is possible only in direction toward higher QoS level

4 A Capacity Expansion Proble (CEP) The proble of the optial QoS routing for given traffic with different service classes can be seen as the iniu cost network flow proble in the ulticoodity single (coon) source ultiple destination network Such proble can be solved as the capacity expansion proble (CEP) without shortages Partially expansions for each link are ade fro coon source in given liits (existing link capacity) Transission link capacities on the path between s are capable to serve traffic deands for different QoS levels (service class) for i =,2,, Fig 3 gives an exaple of network flow representation for ultiple QoS levels () and M internal (core) s included in the path Link capacity that is capable to serve traffic deands of service class i we call facility It is used priarily to serve deands for QoS level but it can be used to satisfy traffic deands for QoS level j (j > i) Rerouting of traffic deands towards higher QoS level is the sae thing as facility conversion to lower QoS level In this odel conversion of traffic deand is peritted only in the direction toward higher QoS level It eans that alost satisfied service class (adaptive or best effort) can be treated as fully satisfied (guaranteed) service class, but not vice versa Explanation of diagra in fig 3: the -th row of nodes represents a possible link capacity state of each transission link between s for i-th QoS level Link capacity values are positive only and shortages are not allowed Horizontal links between the represent the traffic flow between s Coon node O is the source for used capacity (expansions), introducing the new traffic on the link Vertical links represent facility conversion that is equal to rerouting of traffic deands in opposite direction If the link expansion cost corresponds to weight of used capacity, the objective is to find optial routing policy that iniizes the total cost incurred over the whole path between s (M interior s and M + transission links) and to satisfy given traffic deands The flow theory enables separation of these extree flows, which can be a part of an optial expansion solution, fro those which cannot be With such heuristic approach we can obtain the optial result with significant coputational savings; see [4] In the atheatical odel of CEP the following notation is used: j and k = QoS level The levels are ranked fro i =,2,,, and quality level decreases with higher i = the order nuber of link on the path, connecting two successive LSR s Path consists of M + links ( =,, M+) connecting M interior s and s u,v = the order nuber of capacity points in the subproble, u,, v M+ r = traffic deand increent for additional capacity of facility i (appropriate QoS level) on link For convenience, the r are assued to be integer I = the relative aount of idle capacity of facility i on the link, related on the link before Initially there is no capacity shortage between and the interior outer, I i = 0, I M+ = 0 x = the aount of used capacity for facility i on the transission link y = the aount of capacity of facility i on the link, redirected to satisfy the traffic of lower level j CEP proble can be forulated as follows: in M + = i= c + ( ) + ( ) x h I + g y (2) D i x,u+ x,v x,u Guaranted (fully satisfied) I,u,u I,u+ I,u+2,u+,v I,v+ r,u r,u+ r,v+ QoS service classes y 2,u y 2,u+ y 2,v adaptive (alost satisfied) I 2,u 2,u I 2,u+ 2,u+ I 2,u+2 2,v I 2,v+ r 2,u y 3,u r 2,u+ y 3,u+ r 2,v+ y 3,v y 23,u y 23,u+ y 23,v best-effort I 3,u I 3,u+ 3,u 3,u+ I 3,u+2 3,v I 3,v+ r 3,u r 3,u+ r 3,v+ links Figure 4 A network flow representation of a sub-proble for =3

5 so that we have: I = I + x y ri, j= i+ + (3) I I 0 (4) = M + = for =, 2,, M; i =, 2,, ; j = i +,, In the objective function the total cost (weight) on the path fro to includes soe costs: the cost for capacity expansion c (x ), the idle capacity cost h (I + ) as penalty cost to force the usage of the iniu link capacity (prevention of unused/idle capacity) For the link expansion in allowed liits we can set the expansion cost to zero or we can introduce different cost to each service class Also we can introduce facility conversion cost g (y ) that can control non-effective usage of link capacity Costs are often represented by the fix-charge cost or with constant value We assue that all cost functions are concave and nondecreasing, reflecting econoies of scale, and they can change for appropriate link With different cost paraeters we can influence on the optiization process, looking for the ost appropriate routing solution Generalizing the concept of the capacity state for transission link in which the capacity state of each link is known within defined liits we define a capacity point - α In (5) α denotes the vector of capacities I for all QoS levels (facility types) on link, and we call it capacity point α = (I,, I 2,,, I, ) (5) α 0 = α M+ = (0, 0,, 0) (6) Let C be the nuber of capacity point values at position (link between core s), C = C M+ =, and the total nuber of capacity points is: M = + p C = C () In CEP we have to find any cost values d u,v (α u, α v+ ) that eanate two capacity points, fro each node (u, α u ) to node (v+, α v+ ) for v u The total nuber of all connections between capacity points is: = M d i M + Ci C j = j= i+ (2) The approach described in [4] requires solving repeatedly a certain single location expansion proble (SLEP) Many different expansions and rerouting solutions can be derived, depending on D i polarity Lot of the are not acceptable and are not part of the optial sequence, that is the key for the heuristic approach Most of the coputational effort is spent on coputing the subproble values Any of the, if it cannot be a part of the optial sequence, is set to infinity C Algorith coplexity Suppose that all links are known, the optial solution for CEP can be found by searching for the optial sequence of capacity points and their associated link state values of interior s The proble on that level can be forulated as a shortest path proble for an acyclic network in which the nodes represents all possible values of capacity points (states) Than Dijkstra s algorith or Each colun on the flow diagras (fro fig 3 and 4) represents a capacity point, consisting of capacity state values Forulation (6) iplies that idle capacities or capacity shortages are not allowed on the link between and interior B Sub-proble (CES) The expansion proble for facilities i =, 2,, on the path between s u, u +,, v is as follows (see fig 4): v in c ( x ) + hi, ( I + ) + g ( y ) (7) = u i= j= + Where I v+ = I u + Di ( u, v) Ri ( u, v) (8) v = u D i (u,v)= v R i u, v) = r i, = u ( (9) j = x i, y ; i j (0) for =, 2,, M+; i =, 2,, ; j = i +,, Associated value between two capacity points, that represents iniu cost d u,v (α u, α v+ ) we denoted as CES (Capacity Expansion Sub-proble) Figure 5 In this nuerical test-exaple link capacities are sufficient to satisfy traffic deands (SLAs)

6 can see that traffic deands can be fully satisfied and capacity surplus for all links are positive or zero There are no negative values; see lower diagra in fig 5 In exaple fro figure 6: we can notice the lack of capacity on the second link for second QoS level It eans that traffic deands cannot be fully satisfied although the surplus is obvious on third (lower) QoS level There is no free capacity on the first QoS level (for guaranteed service class) to be used instead In that case new SLA cannot be accepted or ust be redefined through negotiation process With such anageent tool we can predict possible congestion on the path very efficiently Figure 6 In this nuerical test-exaple the lack of capacity is obvious and new SLA cannot be accepted any siilar algorith can be applied It has to be noted that the optial routing sequence for traffic flow (new SLA) between s need not to be the shortest path solution On this level of algorith calculation it is very easy to introduce delay liits on the path The nuber of all possible d u,v values depends on the total nuber of capacity points It is very iportant to reduce that nuber (C p ) and that can be done through iposing of appropriate capacity bounds or by introduction of adding constraints The required effort for one sub-proble is O( 2 M) The nuber of all possible d u,v values depends on the total nuber of capacity points If there are no liitations on capacity state (WI ) and expansion aount (Wx ) the coplexity of such heuristic approach is pretty large and increases exponentially with Proble requires the coputation effort of O(M 3 4 R 2(-) i ) In real application we norally apply definite granularity of capacity values IV TESTIG RESULTS We tested our algorith on any nuerical testexaples, looking for optial routing sequence on the path Between s there are six LSR (core s) and they are connected with seven links Traffic deands (SLAs) are overlapping in tie The heuristic algorith in all test-exaples can achieve near-optial expansion sequence with inial total cost, with equal or very close value to that one we can get with algorith based on exact approach If the expansions of link capacities are in allowed liits and the capacity surplus is obvious, the traffic deands can be satisfied In exaple fro figure 5: we V COCLUSIOS In the process of new SLA creation in DiffServ networks possible congestion on the path can be checked with proposed heuristic algorith Algorith is based on atheatical odel for the capacity expansion proble (CEP) The first aspect of algorith is that load balancing leads to higher resource usage efficiency It can prevent critical network resources, not to be exhausted early and becoing a bottleneck for the network in the oent of service invocation The second unique aspect of this algorith is that it incorporates the ipact of end-to-end delay partitioning in network-level route selection decisions It eans that such heuristic approach can be successfully applied for adission control in the SLA creation process, that is in fir correlation with resource reservation echaniss and adission control process REFERECES [] Giordano, S, Salsano, S, Ventre, G, Advanced QoS Provisioning in IP etworks : The European Preiu IP Projects, IEEE Counications Mag, (2003), Vol4 o, pp30-36 [2] Krile, S, ew SLA Creation and Optial Resource Manageent, Proc of 3rd Conf CSDSP (Counication Systes, etworks and Digital Signal Processing), ew Castle (UK), 2004, pp [3] Kagklis, D, Tsakiris, C, Liapotis,, Quality of Service: A Mechanis for explicit activation of IP Services Based on RSVP, Journal of Electrical Engineering, Vol 54, o 90, Bratislava, 2003, pp [4] Krile, S, Kos, M, A Heuristic Approach for Path Provisioning in Diff-Serv etworks, Proc 7 th ISSSTA (Int Syp On Spread-Spectru Tech & Application) - IEEE, Prag, 2002, pp [5] Biswas, K, Ganguly, S and Izailov, R, Path provisioning for service level agreeents in differentiated services networks, ICC IEEE International Conference on Counications, vol 25, no, (2002), pp [6] Bouillet, E, Mitra, D, Raakrishnan, G K, The structure and anageent of service level agreeents in networks, IEEE Journal on Selected Areas in Counications, Vol 20, no 4, (2002), pp [7] Gopalan, K, Chiueh, Tzi-cker, Lin, Yow-Jian, Load Balancing Routing with Bandwidth-Delay Guarantees, IEEE Counicattion Mag, (2004), Vol42 o 6, pp08-3

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srecko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation

Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation Int J Counications, Network and Syste Sciences, 29, 5, 422-432 doi:14236/ijcns292547 Published Online August 29 (http://wwwscirporg/journal/ijcns/) Load Control for Overloaded MPLS/DiffServ Networks during

More information

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks Reliability Constrained acket-sizing for inear Multi-hop Wireless Networks Ning Wen, and Randall A. Berry Departent of Electrical Engineering and Coputer Science Northwestern University, Evanston, Illinois

More information

Resource Allocation in Wireless Networks with Multiple Relays

Resource Allocation in Wireless Networks with Multiple Relays Resource Allocation in Wireless Networks with Multiple Relays Kağan Bakanoğlu, Stefano Toasin, Elza Erkip Departent of Electrical and Coputer Engineering, Polytechnic Institute of NYU, Brooklyn, NY, 0

More information

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks Cooperative Caching for Adaptive Bit Rate Streaing in Content Delivery Networs Phuong Luu Vo Departent of Coputer Science and Engineering, International University - VNUHCM, Vietna vtlphuong@hciu.edu.vn

More information

Implementation of Active Queue Management in a Combined Input and Output Queued Switch

Implementation of Active Queue Management in a Combined Input and Output Queued Switch pleentation of Active Queue Manageent in a obined nput and Output Queued Switch Bartek Wydrowski and Moshe Zukeran AR Special Research entre for Ultra-Broadband nforation Networks, EEE Departent, The University

More information

Dynamic Placement for Clustered Web Applications

Dynamic Placement for Clustered Web Applications Dynaic laceent for Clustered Web Applications A. Karve, T. Kibrel, G. acifici, M. Spreitzer, M. Steinder, M. Sviridenko, and A. Tantawi IBM T.J. Watson Research Center {karve,kibrel,giovanni,spreitz,steinder,sviri,tantawi}@us.ib.co

More information

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network 2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona

More information

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol., No. 3, Suer 28, pp. 429 447 issn 523-464 eissn 526-5498 8 3 429 infors doi.287/so.7.8 28 INFORMS INFORMS holds copyright to this article and distributed

More information

Online Bagging and Boosting

Online Bagging and Boosting Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used

More information

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary

More information

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION Henrik Kure Dina, Danish Inforatics Network In the Agricultural Sciences Royal Veterinary and Agricultural University

More information

Impact of Processing Costs on Service Chain Placement in Network Functions Virtualization

Impact of Processing Costs on Service Chain Placement in Network Functions Virtualization Ipact of Processing Costs on Service Chain Placeent in Network Functions Virtualization Marco Savi, Massio Tornatore, Giacoo Verticale Dipartiento di Elettronica, Inforazione e Bioingegneria, Politecnico

More information

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries

More information

Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center

Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center Markov Models and Their Use for Calculations of Iportant Traffic Paraeters of Contact Center ERIK CHROMY, JAN DIEZKA, MATEJ KAVACKY Institute of Telecounications Slovak University of Technology Bratislava

More information

A Scalable Application Placement Controller for Enterprise Data Centers

A Scalable Application Placement Controller for Enterprise Data Centers W WWW 7 / Track: Perforance and Scalability A Scalable Application Placeent Controller for Enterprise Data Centers Chunqiang Tang, Malgorzata Steinder, Michael Spreitzer, and Giovanni Pacifici IBM T.J.

More information

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises Advance Journal of Food Science and Technology 9(2): 964-969, 205 ISSN: 2042-4868; e-issn: 2042-4876 205 Maxwell Scientific Publication Corp. Subitted: August 0, 205 Accepted: Septeber 3, 205 Published:

More information

Method of supply chain optimization in E-commerce

Method of supply chain optimization in E-commerce MPRA Munich Personal RePEc Archive Method of supply chain optiization in E-coerce Petr Suchánek and Robert Bucki Silesian University - School of Business Adinistration, The College of Inforatics and Manageent

More information

2. FINDING A SOLUTION

2. FINDING A SOLUTION The 7 th Balan Conference on Operational Research BACOR 5 Constanta, May 5, Roania OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS

More information

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128 ON SELF-ROUTING IN CLOS CONNECTION NETWORKS BARRY G. DOUGLASS Electrical Engineering Departent Texas A&M University College Station, TX 778-8 A. YAVUZ ORUÇ Electrical Engineering Departent and Institute

More information

An Approach to Combating Free-riding in Peer-to-Peer Networks

An Approach to Combating Free-riding in Peer-to-Peer Networks An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008

More information

SOME APPLICATIONS OF FORECASTING Prof. Thomas B. Fomby Department of Economics Southern Methodist University May 2008

SOME APPLICATIONS OF FORECASTING Prof. Thomas B. Fomby Department of Economics Southern Methodist University May 2008 SOME APPLCATONS OF FORECASTNG Prof. Thoas B. Foby Departent of Econoics Southern Methodist University May 8 To deonstrate the usefulness of forecasting ethods this note discusses four applications of forecasting

More information

- 265 - Part C. Property and Casualty Insurance Companies

- 265 - Part C. Property and Casualty Insurance Companies Part C. Property and Casualty Insurance Copanies This Part discusses proposals to curtail favorable tax rules for property and casualty ("P&C") insurance copanies. The syste of reserves for unpaid losses

More information

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY Y. T. Chen Departent of Industrial and Systes Engineering Hong Kong Polytechnic University, Hong Kong yongtong.chen@connect.polyu.hk

More information

arxiv:0805.1434v1 [math.pr] 9 May 2008

arxiv:0805.1434v1 [math.pr] 9 May 2008 Degree-distribution stability of scale-free networs Zhenting Hou, Xiangxing Kong, Dinghua Shi,2, and Guanrong Chen 3 School of Matheatics, Central South University, Changsha 40083, China 2 Departent of

More information

ASIC Design Project Management Supported by Multi Agent Simulation

ASIC Design Project Management Supported by Multi Agent Simulation ASIC Design Project Manageent Supported by Multi Agent Siulation Jana Blaschke, Christian Sebeke, Wolfgang Rosenstiel Abstract The coplexity of Application Specific Integrated Circuits (ASICs) is continuously

More information

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS 641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC arketa.zajarosova@vsb.cz Abstract Custoer relationship

More information

Presentation Safety Legislation and Standards

Presentation Safety Legislation and Standards levels in different discrete levels corresponding for each one to a probability of dangerous failure per hour: > > The table below gives the relationship between the perforance level (PL) and the Safety

More information

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO Bulletin of the Transilvania University of Braşov Series I: Engineering Sciences Vol. 4 (53) No. - 0 PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO V. CAZACU I. SZÉKELY F. SANDU 3 T. BĂLAN Abstract:

More information

Searching strategy for multi-target discovery in wireless networks

Searching strategy for multi-target discovery in wireless networks Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,

More information

Energy Proportionality for Disk Storage Using Replication

Energy Proportionality for Disk Storage Using Replication Energy Proportionality for Disk Storage Using Replication Jinoh Ki and Doron Rote Lawrence Berkeley National Laboratory University of California, Berkeley, CA 94720 {jinohki,d rote}@lbl.gov Abstract Energy

More information

Fuzzy Sets in HR Management

Fuzzy Sets in HR Management Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic blanka.zekova@sezna.cz Jana Talašová Faculty of Science, Palacký Univerzity,

More information

Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller

Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller Research Article International Journal of Current Engineering and Technology EISSN 77 46, PISSN 347 56 4 INPRESSCO, All Rights Reserved Available at http://inpressco.co/category/ijcet Design of Model Reference

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

An Innovate Dynamic Load Balancing Algorithm Based on Task

An Innovate Dynamic Load Balancing Algorithm Based on Task An Innovate Dynaic Load Balancing Algorith Based on Task Classification Hong-bin Wang,,a, Zhi-yi Fang, b, Guan-nan Qu,*,c, Xiao-dan Ren,d College of Coputer Science and Technology, Jilin University, Changchun

More information

How To Get A Loan From A Bank For Free

How To Get A Loan From A Bank For Free Finance 111 Finance We have to work with oney every day. While balancing your checkbook or calculating your onthly expenditures on espresso requires only arithetic, when we start saving, planning for retireent,

More information

Image restoration for a rectangular poor-pixels detector

Image restoration for a rectangular poor-pixels detector Iage restoration for a rectangular poor-pixels detector Pengcheng Wen 1, Xiangjun Wang 1, Hong Wei 2 1 State Key Laboratory of Precision Measuring Technology and Instruents, Tianjin University, China 2

More information

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State

More information

Markovian inventory policy with application to the paper industry

Markovian inventory policy with application to the paper industry Coputers and Cheical Engineering 26 (2002) 1399 1413 www.elsevier.co/locate/copcheeng Markovian inventory policy with application to the paper industry K. Karen Yin a, *, Hu Liu a,1, Neil E. Johnson b,2

More information

Applying Multiple Neural Networks on Large Scale Data

Applying Multiple Neural Networks on Large Scale Data 0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree

More information

Use of extrapolation to forecast the working capital in the mechanical engineering companies

Use of extrapolation to forecast the working capital in the mechanical engineering companies ECONTECHMOD. AN INTERNATIONAL QUARTERLY JOURNAL 2014. Vol. 1. No. 1. 23 28 Use of extrapolation to forecast the working capital in the echanical engineering copanies A. Cherep, Y. Shvets Departent of finance

More information

Optimal Resource-Constraint Project Scheduling with Overlapping Modes

Optimal Resource-Constraint Project Scheduling with Overlapping Modes Optial Resource-Constraint Proect Scheduling with Overlapping Modes François Berthaut Lucas Grèze Robert Pellerin Nathalie Perrier Adnène Hai February 20 CIRRELT-20-09 Bureaux de Montréal : Bureaux de

More information

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing Real Tie Target Tracking with Binary Sensor Networks and Parallel Coputing Hong Lin, John Rushing, Sara J. Graves, Steve Tanner, and Evans Criswell Abstract A parallel real tie data fusion and target tracking

More information

Airline Yield Management with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN

Airline Yield Management with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN Airline Yield Manageent with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN Integral Developent Corporation, 301 University Avenue, Suite 200, Palo Alto, California 94301 SHALER STIDHAM

More information

Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and migration algorithms

Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and migration algorithms Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and igration algoriths Chaia Ghribi, Makhlouf Hadji and Djaal Zeghlache Institut Mines-Téléco, Téléco SudParis UMR CNRS 5157 9, Rue

More information

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15), pp. 197-4 http://d.doi.org/1.1457/ijfgcn.15.8.6.19 An Integrated Approach for Monitoring Service Level Paraeters

More information

Machine Learning Applications in Grid Computing

Machine Learning Applications in Grid Computing Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA gvc@dartouth.edu, guofei.jiang@dartouth.edu

More information

Endogenous Market Structure and the Cooperative Firm

Endogenous Market Structure and the Cooperative Firm Endogenous Market Structure and the Cooperative Fir Brent Hueth and GianCarlo Moschini Working Paper 14-WP 547 May 2014 Center for Agricultural and Rural Developent Iowa State University Aes, Iowa 50011-1070

More information

Preference-based Search and Multi-criteria Optimization

Preference-based Search and Multi-criteria Optimization Fro: AAAI-02 Proceedings. Copyright 2002, AAAI (www.aaai.org). All rights reserved. Preference-based Search and Multi-criteria Optiization Ulrich Junker ILOG 1681, route des Dolines F-06560 Valbonne ujunker@ilog.fr

More information

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Vol. 9, No. 5 (2016), pp.303-312 http://dx.doi.org/10.14257/ijgdc.2016.9.5.26 Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou

More information

MENTER Overview. Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001

MENTER Overview. Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001 MENTER Overview Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001 MENTER Goal MPLS Event Notification Traffic Engineering and Restoration Develop an

More information

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1 International Journal of Manageent & Inforation Systes First Quarter 2012 Volue 16, Nuber 1 Proposal And Effectiveness Of A Highly Copelling Direct Mail Method - Establishent And Deployent Of PMOS-DM Hisatoshi

More information

A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS

A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS Isaac Zafrany and Sa BenYaakov Departent of Electrical and Coputer Engineering BenGurion University of the Negev P. O. Box

More information

An Optimal Task Allocation Model for System Cost Analysis in Heterogeneous Distributed Computing Systems: A Heuristic Approach

An Optimal Task Allocation Model for System Cost Analysis in Heterogeneous Distributed Computing Systems: A Heuristic Approach An Optial Tas Allocation Model for Syste Cost Analysis in Heterogeneous Distributed Coputing Systes: A Heuristic Approach P. K. Yadav Central Building Research Institute, Rooree- 247667, Uttarahand (INDIA)

More information

Halloween Costume Ideas for the Wii Game

Halloween Costume Ideas for the Wii Game Algorithica 2001) 30: 101 139 DOI: 101007/s00453-001-0003-0 Algorithica 2001 Springer-Verlag New York Inc Optial Search and One-Way Trading Online Algoriths R El-Yaniv, 1 A Fiat, 2 R M Karp, 3 and G Turpin

More information

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration International Journal of Hybrid Inforation Technology, pp. 339-350 http://dx.doi.org/10.14257/hit.2016.9.4.28 An Iproved Decision-aking Model of Huan Resource Outsourcing Based on Internet Collaboration

More information

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel Recent Advances in Counications Adaptive odulation and Coding for Unanned Aerial Vehicle (UAV) Radio Channel Airhossein Fereidountabar,Gian Carlo Cardarilli, Rocco Fazzolari,Luca Di Nunzio Abstract In

More information

New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints

New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints New QOS Routing Algorithm for MPLS Networks Using Delay and Bandwidth Constraints Santosh Kulkarni 1, Reema Sharma 2,Ishani Mishra 3 1 Department of ECE, KSSEM Bangalore,MIEEE, MIETE & ISTE 2 Department

More information

Software Quality Characteristics Tested For Mobile Application Development

Software Quality Characteristics Tested For Mobile Application Development Thesis no: MGSE-2015-02 Software Quality Characteristics Tested For Mobile Application Developent Literature Review and Epirical Survey WALEED ANWAR Faculty of Coputing Blekinge Institute of Technology

More information

Equivalent Tapped Delay Line Channel Responses with Reduced Taps

Equivalent Tapped Delay Line Channel Responses with Reduced Taps Equivalent Tapped Delay Line Channel Responses with Reduced Taps Shweta Sagari, Wade Trappe, Larry Greenstein {shsagari, trappe, ljg}@winlab.rutgers.edu WINLAB, Rutgers University, North Brunswick, NJ

More information

Dynamic right-sizing for power-proportional data centers Extended version

Dynamic right-sizing for power-proportional data centers Extended version 1 Dynaic right-sizing for power-proportional data centers Extended version Minghong Lin, Ada Wieran, Lachlan L. H. Andrew and Eno Thereska Abstract Power consuption iposes a significant cost for data centers

More information

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS Artificial Intelligence Methods and Techniques for Business and Engineering Applications 210 INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE

More information

ADJUSTING FOR QUALITY CHANGE

ADJUSTING FOR QUALITY CHANGE ADJUSTING FOR QUALITY CHANGE 7 Introduction 7.1 The easureent of changes in the level of consuer prices is coplicated by the appearance and disappearance of new and old goods and services, as well as changes

More information

Modeling Nurse Scheduling Problem Using 0-1 Goal Programming: A Case Study Of Tafo Government Hospital, Kumasi-Ghana

Modeling Nurse Scheduling Problem Using 0-1 Goal Programming: A Case Study Of Tafo Government Hospital, Kumasi-Ghana Modeling Nurse Scheduling Proble Using 0-1 Goal Prograing: A Case Study Of Tafo Governent Hospital, Kuasi-Ghana Wallace Agyei, Willia Obeng-Denteh, Eanuel A. Andaa Abstract: The proble of scheduling nurses

More information

Local Area Network Management

Local Area Network Management Technology Guidelines for School Coputer-based Technologies Local Area Network Manageent Local Area Network Manageent Introduction This docuent discusses the tasks associated with anageent of Local Area

More information

Recovery Modeling in MPLS Networks

Recovery Modeling in MPLS Networks Proceedings of the Int. Conf. on Computer and Communication Engineering, ICCCE 06 Vol. I, 9-11 May 2006, Kuala Lumpur, Malaysia Recovery Modeling in MPLS Networks Wajdi Al-Khateeb 1, Sufyan Al-Irhayim

More information

Approximately-Perfect Hashing: Improving Network Throughput through Efficient Off-chip Routing Table Lookup

Approximately-Perfect Hashing: Improving Network Throughput through Efficient Off-chip Routing Table Lookup Approxiately-Perfect ing: Iproving Network Throughput through Efficient Off-chip Routing Table Lookup Zhuo Huang, Jih-Kwon Peir, Shigang Chen Departent of Coputer & Inforation Science & Engineering, University

More information

Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects

Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects Lucas Grèze Robert Pellerin Nathalie Perrier Patrice Leclaire February 2011 CIRRELT-2011-11 Bureaux

More information

ESTIMATING LIQUIDITY PREMIA IN THE SPANISH GOVERNMENT SECURITIES MARKET

ESTIMATING LIQUIDITY PREMIA IN THE SPANISH GOVERNMENT SECURITIES MARKET ESTIMATING LIQUIDITY PREMIA IN THE SPANISH GOVERNMENT SECURITIES MARKET Francisco Alonso, Roberto Blanco, Ana del Río and Alicia Sanchis Banco de España Banco de España Servicio de Estudios Docuento de

More information

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2 Exploiting Hardware Heterogeneity within the Sae Instance Type of Aazon EC2 Zhonghong Ou, Hao Zhuang, Jukka K. Nurinen, Antti Ylä-Jääski, Pan Hui Aalto University, Finland; Deutsch Teleko Laboratories,

More information

The AGA Evaluating Model of Customer Loyalty Based on E-commerce Environment

The AGA Evaluating Model of Customer Loyalty Based on E-commerce Environment 6 JOURNAL OF SOFTWARE, VOL. 4, NO. 3, MAY 009 The AGA Evaluating Model of Custoer Loyalty Based on E-coerce Environent Shaoei Yang Econoics and Manageent Departent, North China Electric Power University,

More information

How To Balance Over Redundant Wireless Sensor Networks Based On Diffluent

How To Balance Over Redundant Wireless Sensor Networks Based On Diffluent Load balancing over redundant wireless sensor networks based on diffluent Abstract Xikui Gao Yan ai Yun Ju School of Control and Coputer Engineering North China Electric ower University 02206 China Received

More information

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.

More information

A Study on the Chain Restaurants Dynamic Negotiation Games of the Optimization of Joint Procurement of Food Materials

A Study on the Chain Restaurants Dynamic Negotiation Games of the Optimization of Joint Procurement of Food Materials International Journal of Coputer Science & Inforation Technology (IJCSIT) Vol 6, No 1, February 2014 A Study on the Chain estaurants Dynaic Negotiation aes of the Optiization of Joint Procureent of Food

More information

Lecture L9 - Linear Impulse and Momentum. Collisions

Lecture L9 - Linear Impulse and Momentum. Collisions J. Peraire, S. Widnall 16.07 Dynaics Fall 009 Version.0 Lecture L9 - Linear Ipulse and Moentu. Collisions In this lecture, we will consider the equations that result fro integrating Newton s second law,

More information

The individual neurons are complicated. They have a myriad of parts, subsystems and control mechanisms. They convey information via a host of

The individual neurons are complicated. They have a myriad of parts, subsystems and control mechanisms. They convey information via a host of CHAPTER 4 ARTIFICIAL NEURAL NETWORKS 4. INTRODUCTION Artificial Neural Networks (ANNs) are relatively crude electronic odels based on the neural structure of the brain. The brain learns fro experience.

More information

Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks

Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks Protecting Sall Keys in Authentication Protocols for Wireless Sensor Networks Kalvinder Singh Australia Developent Laboratory, IBM and School of Inforation and Counication Technology, Griffith University

More information

The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs

The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs Send Orders for Reprints to reprints@benthascience.ae 206 The Open Fuels & Energy Science Journal, 2015, 8, 206-210 Open Access The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic

More information

AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES

AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES Int. J. Appl. Math. Coput. Sci., 2014, Vol. 24, No. 1, 133 149 DOI: 10.2478/acs-2014-0011 AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES PIOTR KULCZYCKI,,

More information

SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS

SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS WHITE PAPER SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS Quanti Solutions. Advancing HIM through Innovation HEALTHCARE SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS Quanti Solutions. Advancing HIM through Innovation

More information

Efficient Key Management for Secure Group Communications with Bursty Behavior

Efficient Key Management for Secure Group Communications with Bursty Behavior Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:

More information

Introduction to the Microsoft Sync Framework. Michael Clark Development Manager Microsoft

Introduction to the Microsoft Sync Framework. Michael Clark Development Manager Microsoft Introduction to the Michael Clark Developent Manager Microsoft Agenda Why Is Sync both Interesting and Hard Sync Fraework Overview Using the Sync Fraework Future Directions Suary Why Is Sync Iportant Coputing

More information

Insurance Spirals and the Lloyd s Market

Insurance Spirals and the Lloyd s Market Insurance Spirals and the Lloyd s Market Andrew Bain University of Glasgow Abstract This paper presents a odel of reinsurance arket spirals, and applies it to the situation that existed in the Lloyd s

More information

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions

Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Steve Gennaoui, Jianhua Yin, Samuel Swinton, and * Vasil Hnatyshin Department of Computer Science Rowan University

More information

Geometrico-static Analysis of Under-constrained Cable-driven Parallel Robots

Geometrico-static Analysis of Under-constrained Cable-driven Parallel Robots Geoetrico-static Analysis of Under-constrained Cable-driven Parallel Robots M. Carricato and J.-P. Merlet 1 DIEM - Dept. of Mechanical Engineering, University of Bologna, Italy, e-ail: arco.carricato@ail.ing.unibo.it

More information

Multi Protocol Label Switching (MPLS) is a core networking technology that

Multi Protocol Label Switching (MPLS) is a core networking technology that MPLS and MPLS VPNs: Basics for Beginners Christopher Brandon Johnson Abstract Multi Protocol Label Switching (MPLS) is a core networking technology that operates essentially in between Layers 2 and 3 of

More information

Fuzzy Evaluation on Network Security Based on the New Algorithm of Membership Degree Transformation M(1,2,3)

Fuzzy Evaluation on Network Security Based on the New Algorithm of Membership Degree Transformation M(1,2,3) 324 JOURNAL OF NETWORKS, VOL. 4, NO. 5, JULY 29 Fuzzy Evaluation on Networ Security Based on the New Algorith of Mebership Degree Transforation M(,2,3) Hua Jiang School of Econoics and Manageent, Hebei

More information

Data Set Generation for Rectangular Placement Problems

Data Set Generation for Rectangular Placement Problems Data Set Generation for Rectangular Placeent Probles Christine L. Valenzuela (Muford) Pearl Y. Wang School of Coputer Science & Inforatics Departent of Coputer Science MS 4A5 Cardiff University George

More information

Information Processing Letters

Information Processing Letters Inforation Processing Letters 111 2011) 178 183 Contents lists available at ScienceDirect Inforation Processing Letters www.elsevier.co/locate/ipl Offline file assignents for online load balancing Paul

More information

A Soft Real-time Scheduling Server on the Windows NT

A Soft Real-time Scheduling Server on the Windows NT A Soft Real-tie Scheduling Server on the Windows NT Chih-han Lin, Hao-hua Chu, Klara Nahrstedt Departent of Coputer Science University of Illinois at Urbana Chapaign clin2, h-chu3, klara@cs.uiuc.edu Abstract

More information

Data Streaming Algorithms for Estimating Entropy of Network Traffic

Data Streaming Algorithms for Estimating Entropy of Network Traffic Data Streaing Algoriths for Estiating Entropy of Network Traffic Ashwin Lall University of Rochester Vyas Sekar Carnegie Mellon University Mitsunori Ogihara University of Rochester Jun (Ji) Xu Georgia

More information

REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES

REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES Charles Reynolds Christopher Fox reynolds @cs.ju.edu fox@cs.ju.edu Departent of Coputer

More information

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks

Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Analysis of traffic engineering parameters while using multi-protocol label switching (MPLS) and traditional IP networks Faiz Ahmed Electronic Engineering Institute of Communication Technologies, PTCL

More information

Partitioning Data on Features or Samples in Communication-Efficient Distributed Optimization?

Partitioning Data on Features or Samples in Communication-Efficient Distributed Optimization? Partitioning Data on Features or Saples in Counication-Efficient Distributed Optiization? Chenxin Ma Industrial and Systes Engineering Lehigh University, USA ch54@lehigh.edu Martin Taáč Industrial and

More information

Partitioned Elias-Fano Indexes

Partitioned Elias-Fano Indexes Partitioned Elias-ano Indexes Giuseppe Ottaviano ISTI-CNR, Pisa giuseppe.ottaviano@isti.cnr.it Rossano Venturini Dept. of Coputer Science, University of Pisa rossano@di.unipi.it ABSTRACT The Elias-ano

More information

Mathematical Model for Glucose-Insulin Regulatory System of Diabetes Mellitus

Mathematical Model for Glucose-Insulin Regulatory System of Diabetes Mellitus Advances in Applied Matheatical Biosciences. ISSN 8-998 Volue, Nuber (0), pp. 9- International Research Publication House http://www.irphouse.co Matheatical Model for Glucose-Insulin Regulatory Syste of

More information

The Fundamentals of Modal Testing

The Fundamentals of Modal Testing The Fundaentals of Modal Testing Application Note 243-3 Η(ω) = Σ n r=1 φ φ i j / 2 2 2 2 ( ω n - ω ) + (2ξωωn) Preface Modal analysis is defined as the study of the dynaic characteristics of a echanical

More information

( C) CLASS 10. TEMPERATURE AND ATOMS

( C) CLASS 10. TEMPERATURE AND ATOMS CLASS 10. EMPERAURE AND AOMS 10.1. INRODUCION Boyle s understanding of the pressure-volue relationship for gases occurred in the late 1600 s. he relationships between volue and teperature, and between

More information

Managing Complex Network Operation with Predictive Analytics

Managing Complex Network Operation with Predictive Analytics Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory

More information

Position Auctions and Non-uniform Conversion Rates

Position Auctions and Non-uniform Conversion Rates Position Auctions and Non-unifor Conversion Rates Liad Blurosen Microsoft Research Mountain View, CA 944 liadbl@icrosoft.co Jason D. Hartline Shuzhen Nong Electrical Engineering and Microsoft AdCenter

More information