A New Paradigm for Load Balancing in Wireless Mesh Networks

Size: px
Start display at page:

Download "A New Paradigm for Load Balancing in Wireless Mesh Networks"

Transcription

1 A New Paradgm for Load Balancng n Wreless Mesh Networks Abstract: Obtanng maxmum throughput across a network or a mesh through optmal load balancng s known to be an NP-hard problem. Desgnng effcent load balancng algorthms for networks n the wreless doman becomes an especally challengng task due to the lmted bandwdth avalable. In ths paper we present heurstc algorthms for load balancng and maxmum throughput schedulng n Wreless Mesh Networks wth statonary nodes. The goals are to (a) mprove the network throughput through admssbly optmal dstrbuton of the network traffc across the wreless lnks, (b) ensure that the scheme s secure, and (c) ensure farness to all nodes n the network for bandwdth allocaton. The man consderaton s the routng of non-local traffc between the nodes and the destnaton va multple Internet gateways. Our schemes splt an ndvdual node s traffc to the Internet across multple gateways that are accessble from t. Smulaton results show that ths approach results n marked ncrease n average network throughput n moderate to heavy traffc scenaros. We also prove that n our algorthm t s very dffcult for an adversary to block a fracton of a node s avalable paths, makng t extremely hard to compromse all traffc from a node. Smulaton results also show that our scheme s admssbly far n bandwdth allocaton even to nodes wth longest paths to the gateway nodes. Key Words: Farness, Load Balancng, Reslency, Traffc Splttng, Throughput, Wreless Mesh Networks 1. Introducton Optmal load balancng across a mesh or a network s a known hard problem. [1] Descrbes load balancng as an optmzaton problem. [2], [3], [4], [5], prove the NP-completeness of varous load-balancng problems and provde approxmaton algorthms. Effcent load balancng n wreless networks becomes an even more challengng problem due to the lmtatons on avalable bandwdth and unrelablty of wreless lnks. In ths paper we consder load balancng n wreless mesh networks wth statonary nodes. These nclude Wreless Mesh [6], [7] and Communty networks [8], such as the Self-Organzng Neghborhood Wreless Mesh Networks [9]. We provde heurstc algorthms for load balancng n wreless mesh networks wth the followng goals: (a) maxmze network throughput through admssbly optmal dstrbuton of the network traffc across the wreless lnks, (b) ensure the scheme s secure, and (c) ensure farness to all nodes n the network for bandwdth allocaton. Below we frst provde motvaton for snglng out these networks over other conventonal wreless networks n our study for desgnng load balancng heurstc algorthms Motvaton The statonary nature of the nodes n wreless mesh networks warrants the desgn of robust and effcent traffc management protocols for them. Exstng sngle path and multpath traffc protocols for wreless networks are desgned for sngle source-destnaton pars (see Sec. 2). Mesh and communty network nodes, by contrast, can have accessblty to multple Internet gateways connectng them to the Internet backbone and each node can ndvdually select the best gateway for ts non-local traffc (traffc to the Internet). Snce the bulk of node traffc n such networks would be non-local, ths wll lead to performance and farness ssues for the network. Load balancng n wreless mesh networks s an nterestng and unque problem dfferent from conventonal wreless networks due to several reasons: Nodes are statonary. Exstng wreless ad-hoc network protocols are desgned wth node moblty consderatons. Sensor network protocols have power and computaton constrants. Thus, nether ad-hoc, nor sensor network protocols would be sutable for mesh networks. Better network performance s n order through protocols desgned specfcally for mesh networks wth statonary wreless nodes. Multple gateways are avalable. Load balancng can be mproved by splttng network traffc across the accessble gateways and reassemblng ths traffc on the Dstrbuton System (wred backbone network). Ths may be a better approach ncase of some wreless lnks gettng loaded to capacty and others beng underutlzed. Ths s akn to IP [10] routng for the wred networks where dfferent packets between a source and destnaton may be routed along dfferent paths. 1

2 Clearly, above condtons are dfferent from ad-hoc and sensor networks and requre desgnng a traffc dstrbuton protocol specfcally for ths scenaro Summary of Contrbutons Ths paper proposes a new traffc dstrbuton and load balancng protocol for statonary mesh networks. The focus s on traffc between the nodes and the backbone Internet. We show that optmal load balancng and maxmum throughput schedulng for ths scenaro s NP complete through a smple reducton of the known NP complete Knapsack [11] problem. We present a heurstc algorthm for load balancng whch ams at maxmzng network throughput through effcent wreless-lnks utlzaton. The algorthm splts a node s non-local traffc across the multple gateways connected to t. The ratonale s that under heavy traffc load, f each node s able to send part of ts traffc on ts best avalable route, lnk utlzaton wll be unform throughout the network and average network performance wll mprove. We demonstrate the effcency of our algorthm through smulatons, evaluatng t aganst other popular approaches. In addton, sngle path node falures can be better dealt wth and network robustness and reslency aganst attacks can be enhanced through our scheme. We demonstrate that the problem of an adversary compromsng a subset of paths from a node (by compromsng some ntermedate nodes on those paths, wth each node havng an assocated cost to compromse t), such that the cost s less than some value K, s NP-complete. Fnally, through smulatons, we demonstrate that our scheme s admssbly far n bandwdth allocaton even to nodes wth longest paths to the gateway nodes. Thus, our scheme acheves three goals (a) effcent load balancng, (b) securty, and (c) farness. To the best of our knowledge, ths s the frst scheme to consder load-balancng by smultaneously splttng a node s traffc to all avalable destnatons gateways Paper Organzaton Ths paper s organzed as follows. Secton 2 descrbes related work and gves an overvew of our model. Secton 3 presents proof of NP completeness of maxmum throughput schedulng for mesh networks and detals our heurstc load balancng algorthms. Secton 4 talks about the securty of our scheme. Secton 5 demonstrates the farness of our scheme and presents applcablty analyss. Smulaton results are presented n Secton 6. Fnally, n Secton 7 we conclude the paper wth a dscusson of ts lmtatons and proposed future work. 2. Related Work and Model Overvew 2.1. Related Work Conventonal mult-hop wreless network traffc protocols are ether sngle path [12], [13] or multpath [14]. In [15] the authors present a multpath loadbalancng protocol for moble ad-hoc networks wth drectonal antennas for maxmally zone dsjont routes. Ganjal et al. [16] compare load balancng n ad-hoc networks for sngle path and multpath routng. Multpath protocols mantan multple paths, but use only one path at a gven tme. Only [17] researches smultaneous actvaton of multpaths, but n ther study a packet randomly chooses one of several avalable paths. In addton, they consder multple paths between sngle source-destnaton pars. Our protocol has a well defned (non-random) algorthm for splttng a node s traffc and we consder smultaneous nvocaton of multple paths between a node and multple Internet gateways. Moble Mesh protocol [18], [19] descrbes schemes for lnk dscovery, routng and border dscovery n wreless mesh networks, but does not consder load balancng. In [20] authors descrbe choosng a hgh throughput path between a source and a destnaton for communty wreless networks. Ranwala et al. [21] dscuss loadbalancng n wreless mesh networks wth nodes havng mult-channel rados, but these rados would requre multple cards and antennas for each node and would be expensve to deploy. Hespanha et al. [22] formulate secure load balanced routng n networks as a zero-sum game between the desgner of the routng algorthm and an adversary that attempts to ntersect packets. They show that for some versons of the game, the optmal routng polces also maxmze the throughput between the source and the destnaton node. There s extensve lterature on optmzaton problems on dynamc and statc load balancng across meshes [23]. Optmal load balancng across meshes s known to be a hard problem. Akyldz et al. [6] exhaustvely survey the research ssues assocated wth wreless mesh networks and dscuss the requrement to explore multpath routng for load balancng n these networks. However, maxmum throughput schedulng and load balancng n wreless mesh networks s an unexplored problem. 2

3 In ths paper we present for the frst tme, a load balancng scheme n wreless mesh networks by systematcally splttng each node s non-local traffc to avalable destnaton gateways and evaluate ts performance Assumptons and Model Overvew We consder a wreless mesh network model wth statonary nodes. An example s a communty network where buldngs wth wreless antennas mounted on them are the network nodes (Fg. 1) [9]. Nodes connect to the backbone Internet va gateways located n the communty. Traffc s forwarded to the gateways by the nodes n a hop-by-hop fashon. Thus, each node acts as both transmtter and router. Traffc across varous gateways n a regon can be effectvely reassembled at the Dstrbuton System. Snce the network s statonary, route changes are nfrequent, and occur only ncase of node falures or faults. As such, the network controller or a smlar entty on the Dstrbuton System mantans complete network nformaton ncludng the network topology, and can perform statc route computaton from any node to the gateways. Snce ths s an admnstered network, the network controller has an estmate of the upper lmt on bandwdth requred by each node for ts self-traffc. Nodes are assumed to be non-malcous and cooperate n routng others traffc. problem s NP-complete. We then present two heurstc algorthms amng at maxmum network throughput schedulng for load balancng. We call them Schedulng Schemes 1 and The Maxmum Throughput Schedulng Problem The maxmum throughput schedulng optmzaton problem can be defned as follows. Suppose n a graph every node has some bt rate traffc to send wth some specfed paths (maybe multple paths to the same destnaton), and every lnk has an upper bound on capacty, what knd schedulng (.e., the order to reserve bandwdth for the nodes) can acheve maxmum throughput? The correspondng decson problem s: s there a schedule such that the overall throughput of the network s greater than K? Theorem 1 The decson verson of the maxmum throughput schedulng problem s NP-complete. Proof: As a specal case, consder a star network wth center C. All nodes except for one destnaton node need to send traffc to the destnaton node va the center C. Now C needs to schedule all ts receved traffc to forward to the destnaton. Ths s a case of knapsack problem where one can consder the capacty of the lnk between C and destnaton as the capacty of the knapsack. Knapsack problem s NP-complete [11], so the maxmum throughput schedulng problem s NPcomplete Schedulng Scheme 1 Fg. 1. Communty Network 3. Maxmum Throughput Schedulng The prmary objectve of a Load Balancng scheme s to acheve maxmal network throughput through unform lnk utlzaton. The other goals nclude farness to the nodes and robustness aganst attacks and node falures. Thus maxmal throughput schedulng forms a subset of the larger Load Balancng problem. In ths secton we frst show that the decson verson of the maxmum throughput schedulng optmzaton Ths schedulng scheme computes the volume of traffc each node can send along ts routes to connected gateways. The scheme requres the nvocaton of the Traffc Dstrbuton Algorthm (TDA) shown n Fg. 2 (explaned n Sec ). Ths algorthm computes traffc dstrbuton for each node ahead of the actual routng based on lnk weghts and node prortes. Any changes n the network topology (due to node falures or new nodes beng added) would requre a rerun of the algorthm. Each round of TDA requres partal re-computaton of the current shortest path from each node to ts connected gateways. Instead of computng the shortest path from each node to all of ts connected gateways, a mnmum spannng tree s constructed rooted at each gateway. Ths gves the average shortest path from each gateway to the accessble nodes. Ths s an admssble approxmaton whch smplfes the 3

4 computaton and mproves the runnng tme. Below we frst present the notatons used n TDA and then descrbe the algorthm n detal Notatons N : Set of network nodes t x : The traffc sent on lnk by node x. T x : Total traffc to be sent by node x n kbps. r x : Number of routes from node x to ts connected gateways,.e., the number of gateways node x s connected to. P n : Prorty of node n. Equvalent to traffc routed by n for other nodes n kbps. For example, f node n routes 30 kbps traffc for another node, ts prorty becomes 30. RT n : Remanng traffc to be sent by node n. C j : Cost of lnk j. Equvalent to traffc routed on lnk j n kbps. For example, f lnk j s reserved for routng 30 kbps traffc, ts cost becomes 30. D : Max(r x ) for x = 1 to N. Ths s the maxmum number of gateways that any node n the network has paths to, from the set of all nodes. Ths fxes the number of teratons of the algorthm. Z : the array contanng RT n + P n values for all nodes n belongng to N. S x : The current shortest path to a gateway node from node x TDA Descrpton The TDA works by assgnng costs to lnks and prortes to nodes. The rato of the total traffc a node has to send, to the number of gateway nodes t s connected to (T / r ), s a metrc for dstrbutng the node s traffc to ts connected gateways. We assume Constant Bt Rate (CBR) traffc. The algorthm mantans k-shortest paths [24] from each node to gateway nodes. It runs teratvely to ensure farness to all the nodes. In each teraton, the node n wth the next hghest RT n + P n value has ts shortest path S n assgned to t successvely. If any lnk n ths present shortest path S n exceeds the lnk capacty c, that shortest path s not used and the next-shortest path s computed. Node n then routes (T n / r n ) of ts traffc along path S n. After n has been assgned ths route, the cost of all the lnks along ths route s ncremented by the amount of traffc they wll be routng for n.e., t n. All the nodes whch have not yet been assgned ther shortest paths n ths teraton, have to re-compute ther shortest paths for ths teraton, as the cost of lnks along ther orgnal shortest paths may have now ncreased. The cost of a path s the sum of the cost of each lnk along that path. In order to be far and to reward an ntermedate hop node (.e., a node that s nether the source nor destnaton n ths sesson) for routng traffc of other nodes, we ntroduce a prorty metrc P. N {all nodes} L {lnks} S {shortest paths} procedure TraffcDstrbute (N, L, S) { t x = [ T x / r x ] ; for each n ε N { P n = 0; RT n = T n ; } for each l ε L { C l = 1; } done_count = 0; for teratons = 1 to D { Sort ( Z ); //sort array Z n decreasng order new_count = N done_count for x = 0 to new_count { Choose node n x correspondng to Z [x]; check =0; whle (check ==0){ Compute S x // current shortest path for n x for each, s.t. l ε { S x } f( (c + t x ) c { check = 0; Remove present path from lst of k- shortest paths for node n x. } else { check = 1; } } // end of (whle check==0) loop S x n x ; //Assgn n x ts shortest path for each, s.t. l ε { S x } { c = c + t x ; RT x = T x t x ; f ( RT x = 0 ) done_count = done_count + 1; for each k, s.t. n k ε { S x } //nodes lyng on the path S x P k = P k + t x ; for each n q, s.t q s from x to ( N done_count ) Recompute S x ; } } Fg. 2. Traffc Dstrbuton Algorthm 4

5 The prorty of all ntermedate hop nodes on a path S n s ncremented for the next teraton, by the amount of traffc they wll be routng for source node n. At the begnnng of each teraton, array Z s sorted to determne the orderng of nodes accordng to ther current RT + P values. The number of teratons s determned by the value D. The algorthm splts each node s traffc accordng to the number of gateway nodes t s connected to and favors the nodes wth the hghest RT + P values n assgnng the shortest paths n each teraton Schedulng Scheme 2 In ths secton we present an alternate smple Traffc Schedulng scheme nvolvng less computaton. Ths s a greedy schedulng scheme and would perform coarse graned schedulng and load balancng as compared to the TDA. Consder a node that has paths to n gateway nodes. Let h 1, h 2, h 3, h., h n, be the number of hops along routes to gateway nodes 1 to n. The traffc from a source node s dstrbuted n nverse proporton to the number of hops along all ts routes: Hghest volume of traffc s sent along the route wth fewest hops. Fracton of traffc sent along a route ( T ) wll be computed as: T = { [ ( h 1 h 2 h 3.. h h n ) / ( h 2 h 3.. h.. h n + h 1 h 3.. h h n h 1 h 2 h 3.. h h n-1 ) ] * ( 1/ h ) } For example, consder a node whch s connected to three gateway nodes and ts dstance n number of hops from these gateway nodes s 2, 3 and 4, respectvely. So, t sends 12/26 th fracton of ts traffc to the closest gateway node, 8/26 th fracton to the next gateway node and 6/26 th fracton to the farthest gateway node. 4. Securty and Reslency In ths secton we show that our heurstc algorthms for maxmum throughput schedulng acheve robustness and reslency aganst attacks and node falures. The robustness and securty of a traffc scheme can be measured by how effectvely t can be compromsed or attacked by an adversary. An adversary can dsrupt functonng of the network by blockng traffc to the gateways va compromsng en-route nodes or localzed jammng. Ths s one of the chef reasons for mantanng dsjont or braded multpaths [25]. Intutvely, a scheme usng multple paths smultaneously should be more robust aganst such dsruptons than multpath (mantanng multple paths, usng one path at any tme) schemes, makng t harder for an adversary to block all actve paths from a node. Ths s proved below. We consder a more strngent threat model whch assumes that traffc from a node s compromsed f a subset of the node s actve paths s blocked or compromsed. Ths s based on the prncples of threshold cryptography [26], where a secret s compromsed f more than some percentage of shares s compromsed. In other words, a secret s correctly receved by the recpent, only f more than a certan percentage of shares are accurately receved. The localzed lnk jammng by an adversary scenaro s smlar to usng lnk cuts [27] to attack Internet routng [28]. For path blockng through en-route node compromse we present an optmzaton problem called the Mnmum Cost Blockng (MCB) Problem. The MCB problem pertans to a set of nodes n a network and a set of paths between the nodes, wth an assocated cost to compromse each node. It seeks to fnd the mnmum cost for an adversary to compromse a subset of the nodes n a network such that a certan percentage of the network paths are blocked? Here, we present two nstances of the MCB problem, a specal case and the general case The MCB Problem: Specal Case Ths s a specal case of the MCB problem. The optmzaton problem for the adversary can be defned as follows. Suppose n graph G (V, E), V = n and every node v n V has a cost c to be compromsed. Suppose there are m paths ( P 1, P 2,..., P m ) from some sources to some destnatons. Some paths may have the same source and destnaton as other paths (.e., multpaths exst n ths source and destnaton par). What s the mnmum cost to compromse a subset of the nodes such that a certan percentage of the paths are compromsed? The correspondng decson problem s: Gven graph G = (V, E) and every node v n V has a cost c to be compromsed. There are m paths ( P 1, P 2,..., P m ), and ntegers K and R. Is there a subset V of V such that V wll block R out of the m paths and the total cost of nodes n V s no greater than K? Theorem 2 The specal case of MCB problem s NPcomplete. Proof: If we consder every path ( P 1, P 2,..., P m ) as an element, then every node n the graph G can be 5

6 consdered to comprse of a subset of all paths. That s, all the paths on whch the node s located, consttute that node s subset. For example a node v n V may have a subset { P j, Pk, Pl } f v les on the paths P, P, P ). Now the problem to fnd the mnmum ( j k l weght subset of nodes that block a part of the paths s equvalent to weghted partal set cover problem, whch s NP-complete [29]. So the specal case of the MCB problem s NP-complete The MCB Problem: General Case Here we present the general case of the MCB problem for the adversary: Suppose n graph G(V,E), V = k, and every node v n V has a cost c to be compromsed. Suppose we have m = k = 1 n paths: ( P P, L, P, P, P, L, P, L, P, P, L, P ). 11, 12 1n n2 k1 k2 Here ( P 1, P 2, L, P ) are paths orgnatng from node n ( = 1,2,..., k ). What s the mnmum cost to compromse a subset of the nodes such that a certan percentage of paths that orgnate from a node are compromsed (f a path orgnates from a node, we say that the path belongs to that node)? That s, for every node, ( = 1,2,..., k ), there s a number R, 0 R n, and at least R paths out of all paths belongng to ths node (paths P 1, P 2, L, P ) are compromsed? Ths s a typcal optmzaton problem. The decson problem correspondng to t s: Gven graph G=(V,E) and cost of every node, and set k n = 1 11, P12, L, P1 n, P21, P22, L, P2 n, L, Pk 1, P 1 2 k 2 of nodes n m = P, L, P kn k n paths, and ntegers C and R, 0 R n, s there a subset of V of V such that V wll block at least R out of the paths P, P, 2, P 1 L n, for all ( 1,2, L, k total cost of nodes n V s no greater than C? kn k = ), and the Theorem 3 The general case of the MCB problem s NP-complete. Proof: The problem s a general case of the partal set cover problem [29], whch s NP complete. So the general case of MCB problem s NP-complete. Snce the specal and general cases of MCB problem are NP-complete, t wll not be easy for an adversary to block a certan percentage of a node s paths (or some percentage of any paths) n the network, makng our scheme reslent aganst attacks and falures. 5. Node Farness and Applcablty Ths secton (a) dscusses the farness of Schedulng Scheme 1 for all nodes beng able to reserve bandwdth for ther self-traffc, (b) dscusses farness and performance ssues of Schedulng Scheme 2, and (c) compares the runnng tme and applcablty of our schemes n qualtatve terms. Ths secton complements the Smulaton results n Sec. 6 for a better understandng of the performance of our schemes Farness to Nodes: Schedulng Scheme 1 In Schedulng Scheme 1, durng each teraton of TDA, every node s allowed to reserve bandwdth for a fracton of ts traffc. Ths has two outstandng consequences: (a) No node starves for bandwdth, and (b) Ths schedule doesn t result n bandwdth wastage for nodes wth less self-traffc. Thus, Schedulng Scheme 1 results n maxmal farness to the nodes n terms of opportunty to reserve bandwdth. Due to prorty assgnments for routng non-self traffc, nodes closer to the gateways (for example, nodes 1-hop away from a gateway: called G-1 nodes n the rest of ths paper) may eventually end up gettng hgher prortes n the later rounds of TDA. Ths results n such nodes beng able to reserve ther shortest paths before other nodes n later rounds. Consequently, these nodes can acheve hgher throughputs than say, a node that s stuated farther away from all gateways. Ths s further demonstrated by smulaton results n Sec. 6. Nevertheless ths dfference n throughput s not an ndcaton of lack of farness. It s natural for nodes n dfferent parts of the network to acheve non-unform throughputs due to the dfference n path-lengths. A node stuated n the centre of a network and unformly dstant from all avalable gateways wll have lower throughput than nodes closer to the gateways, regardless of the schedulng or route reservaton schemes used. The farness of Schedulng Scheme 1 s demonstrated by the smulaton results n Sec. 6 where t outperforms other well known schemes n terms of throughput for such a node. The farness s also demonstrated by the smulaton graphs showng unform lnk utlzaton n Sec. 6. Unform throughput 6

7 for all networks nodes, f desred, s achevable by a slght modfcaton to TDA: the G-1 nodes and other nodes close to the gateways need to be ntalzed to prorty values lower than 0 as opposed to other nodes Farness and Performance: Schedulng Scheme 2 Schedulng Scheme 2 s far to nodes n terms of bandwdth schedulng n that t splts every node s traffc to avalable paths, not favorng any nodes over others for traffc schedulng. Ths may result n nodes havng to compete for bandwdth, but the scheme does not provde any nherent advantage to some nodes over others. Scheme 2 selectvely loads shorter paths wth more traffc, causng lnks along shorter paths beng loaded to capacty, whle other lnks n the network may be lghtly loaded. It results n lower throughput for the network nodes when compared wth Scheme 1, though Scheme 2 stll outperforms other well known schemes (as shown by smulaton results). Performance vs. smplcty tradeoff for Scheme 2 s dscussed n Sec The reducton n throughput for Scheme 2 s partly attrbutable to and more pronounced for G-1 nodes. For G-1 and other nodes n the vcnty of gateways, small proporton of ther traffc may be routed on very long routes even though the nodes themselves are close to the gateways. Though a very small volume of traffc may be affected due to ths factor, t helps n keepng the desgn of the scheme smple (see Sec 5.3). A varant of the scheme could be to not assgn traffc to routes that are longer than some threshold Runnng Tme and Applcablty Analyss Schedulng Scheme 2 has a much lower computaton complexty and runnng tme as compared to Scheme 1. TDA has a computaton tme of O(N 3 ) where N s the number of nodes n the network. The algorthm has to perform O(N 2 ) computatons n each teraton and has to perform O(N) teratons n the worst case. Schedulng Scheme 2 has a worst case computaton tme of O(N 2 ). The hgher computaton tme of Scheme 1 s nconsequental for scenaros lke the communty networks because all the computatons are performed offlne and beforehand by the network controller or a smlar entty on the dstrbuton system. There would be very lttle change n topology for such networks, thus the load balancng computatons would be very nfrequent. However, f the network s dynamc due to node moblty, node sleep-tme, or frequent node falures, then Scheme 2 would be benefcal. Scheme 2 would be especally helpful n such scenaros where frequent route re-computatons are requred. An nherent assumpton for both the schemes s that the cost of re-assemblng the nodes traffc at the gateways (or the dstrbuton system) s offset by the savngs ncurred n terms of network bandwdth utlzaton and network throughput ncrease. Ths s a vald assumpton snce the wreless meda s a shared resource, whereas an arbtrarly powerful machne can be employed for reassemblng node traffc on the dstrbuton system. 6. Smulaton Results We conduct smulatons to nvestgate the performance of our schemes for each of the followng three objectves: (a) Maxmum Throughput Schedulng, (b) Mnmum Cost Blockng, and (c) Farness to nodes. We do a self-contaned evaluaton of the algorthms, transparent of underlyng network level ssues other than the capacty of wreless lnks. We develop two specfc schemes called Sngle Shortest Paths (SSP) algorthm and Fxed Shortest Path (FSP) algorthm so that we can evaluate TDA and Schedulng Scheme 2 aganst some basc benchmarks. In the SSP algorthm, each node determnes one shortest path to a gateway and sends all self traffc on ths shortest path. In the FSP algorthm, each node splts traffc equally on all ts paths to connected gateways. Ths s smlar to Scheme 2, except that a node s traffc s equally splt along ts avalable routes. Further, there are two varants for Scheme 2 and the FSP algorthm: large load-node frst (favorng nodes wth hgh volume of self-traffc) and small load-node frst (favorng nodes wth less self traffc). In the large load frst scheme, nodes wth the largest loads (heavest traffc) schedule traffc along all ther paths before nodes wth smaller loads. In small load frst, the order of schedulng s reversed from nodes wth least traffc to nodes wth heavest traffc. If any lnks along a node s path reach capacty, then no more traffc can be scheduled across those lnks, and the node has to use other paths. Our smulaton topology s 100 nodes evenly dstrbuted over a rectangular area of sdes 1000 meters 7

8 by 1000 meters. There are 4 gateways, one at each corner of the rectangle. There are 15 G-1 nodes. We used a pseudo-random functon for placng the nodes n the rectangular area and generatng the lnks between the nodes. Once generated, the topology was fxed. All data ponts are average of 100 runs. In the smulaton graphs, we refer to Schedulng Scheme 2 as Algorthm 2 for space conservaton Throughput Comparson We frst compare the throughput of TDA and Algorthm 2 wth SSP and FSP. In the smulaton graphs, X-axs represents the average of all nodes traffc n kbps. Y-axs represents the percentage throughput (1 corresponds to 100% throughput). Fgures 3, 4, 5 present total network throughput for network lnk capactes of 50, 100 and 150 kbps respectvely. It s evdent that TDA outperforms all other schemes n terms of network throughput under condtons of heavy traffc (hgh load, low lnk capacty), moderate traffc, and low traffc (low load, hgh lnk capacty); establshng that t s far superor to other schemes for network throughput. Ths s because TDA dynamcally adjusts shortest paths and node prortes. No other algorthm clearly domnates others n all scenaros; however the performance of SSP algorthm s consstently poor at all tmes. Performance of Algorthm 2 wth large load frst s only margnally better as schedulng nodes wth large loads frst results n shortest paths gettng loaded wth a few nodes traffc ntally. Subsequently a large number of nodes are forced to route most of ther traffc along generally longer routes due to a lot of lnks gettng loaded to capacty early on. However, Algorthm 2 wth small load frst s generally better than the FSP algorthm under constraned lnkbandwdth condtons as seen n Fg. 3. Wth the small load frst schedule, more nodes are able to schedule traffc on ther paths of frst-choce (lnks are loaded wth less traffc per node ntally) and shorter paths are able to carry traffc for hgher number of nodes. Only a few nodes wth heavy traffc may fnd lnks along ther shortest paths loaded to capacty later n the schedule. Thus the number of nodes affected by lnk congeston wll be less. Wth FSP, the nodes splt ther traffc equally, thus the advantage of small load-node frst becomes less promnent. Fgures 6, 7 and 8 show the throughput of a G-1 node for lnk capactes of 50, 100 and 150 kbps respectvely. As dscussed n Sec. 5, the performance of TDA s exceptonally hgher than other schemes because G-1 nodes attan hgh prortes for routng other nodes traffc. The performance of Algorthm 2 (small load frst) s also consstently better than BSP and SSP algorthms. Fgures 9, 10 and 11 present the throughput of a node located roughly n the center of the network for lnk bandwdths of 50, 100 and 150 kbps respectvely. Nodes stuated wthn a square of 300 meters by 300 meters n the center of the smulaton topology were consdered canddates. Agan the performance of TDA s better than other schemes. Performance of FSP (smallest load frst), Algorthm 2 (smallest load frst) and SSP are comparable: the dfference n path lengths between shorter and longer paths s less sgnfcant for a node almost unformly dstant from all gateways. Ths offsets the advantage that Algorthm 2 and FSP have over SSP Robustness As dscussed n Sec. 4, threshold cryptography schemes assume that a secret s correctly receved f a certan percentage of the shares are delvered accurately. Here we test our schemes for two dfferent cases: a secret s correctly receved f (a) 2 out of 4 and (b) 3 out of 4 shares from a node are receved at the gateways. Fgures 12, 13 and 14 represent the percentage of nodes that successfully sent t out of n (here 2 out of 4 and 3 out 4) threshold traffc for lnk bandwdth upper bounds 50, 100, 150 kbps respectvely. The X-axs n the plots represents the percentage of nodes and the Y- axs represents the average node load. Agan t s evdent from the fgures that TDA s the more robust scheme n both the cases Farness Fgures 15, 16 and 17 show average lnk utlzaton for lnk capactes 50, 100 and 150 kbps respectvely. The average lnk utlzaton s substantally hgher for TDA n all three scenaros. Ths ndcates that the TDA s able to load the lnks more effcently and unformly than the other schemes, representatve of homogeneous traffc dstrbuton across the network and enhanced node farness. Snce all the paths are dynamcally chosen, any unused lnk bandwdth may be utlzed after other lnks get congested. 8

9 Fg. 3. Network Throughput (50 kbps) Fg. 6. G-1 Node Throughput (50 kbps) Fg. 4. Network Throughput (100 kbps) Fg. 7. G-1 Node Throughput (100 kbps) Fg. 5. Network Throughput (150 kbps) Fg. 8. G-1 Node Throughput (150 kbps) 9

10 Fg. 9. Central Node Throughput (50 kbps) Fg. 12. Percentage Shares Receved (50 kbps) Fg. 13. Percentage Shares Receved (100 kbps) Fg. 10. Central Node Throughput (100 kbps) Fg. 14. Percentage Shares Receved (150 kbps) Fg. 11. Central Node Throughput (150 kbps) 10

11 7. Concluson Fg. 15. Average Lnk Utlzaton (50 kbps) Ths paper presents a new paradgm for load balancng n wreless mesh networks wth statc nodes. Ths s one of the frst papers to explore load balancng n wreless mesh networks as a maxmum throughput schedulng problem. The prmary contrbuton of ths paper s a new scheme whch smultaneously acheves three goals: mproved network throughput, securty and reslency, and farness to nodes. These are mportant and desrable characterstcs of any networkng protocols. Our scheme demonstrates that by splttng the nodes traffc across multple gateways through ntellgent traffc schedulng and node prorty assgnments, t s possble to substantally mprove the network performance n terms of throughput, reslency and farness. In ths paper, we proved some basc theoretcal ssues, proposed several heurstcs and verfed the performance of our schemes through extensve smulatons. The motvaton for ths research drves from the mportance of desgnng effcent load balancng algorthms for mprovng the performance of wreless networks, and the nherent dffculty n desgnng such schemes. Ths task becomes especally challengng due to the lmted avalablty of bandwdth n the wreless doman and the fact that obtanng maxmum throughput across a network or a mesh through optmal load balancng s a known NP-hard problem. Fg. 16. Average Lnk Utlzaton (100 kbps) Fg. 17. Average Lnk Utlzaton (150 kbps) IP routng nvolves packets between source and destnaton traversng ndependent paths. It s only natural to extend ths traffc-splttng dea to the wreless mesh doman. Our scheme would be benefcal for real-lfe communty wreless networks, whch have a promsng growth potental n the future of commercal wreless technology. The drecton of our contnung research s to ntegrate our scheme wth exstng wreless protocols. Ths wll enable us to study the effects of other wreless network parameters lke lnk unrelablty and transmsson delays. Further mprovement n the dynamcty of the scheme for changng network condtons s n order. For example, statonary wreless networks wth frequent node falures, or networks wth strctly synchronzed node sleep and wakeup cycles (due to power conservaton concerns) can utlze a varant of our scheme wth more dynamc route re-computatons. 11

12 Our contnung research also focuses on desgnng a smlar traffc splttng scheme for wreless mesh networks wth moble nodes. Incorporatng moblty would requre decsons to be made locally at the nodes. Part of our research nvolves theoretcal analyss of the dffculty of a moble node to establsh smultaneous multple paths versus the benefts of establshng these paths. A scheme nvolvng smultaneous multple paths for a moble node could be benefcal for node throughput f some old paths survve when the node moves. References [1] tml [2] O. Beaumont, V. Boudet, F. Rastello, Y. Robert, "Parttonng a square nto rectangles: NPcompleteness and approxmaton algorthms", Algorthmca, 34, 2002, pp [3] O. Beaumont, V. Boudet, F. Rastello, Y. Robert, "Matrx multplcaton on heterogeneous platforms", IEEE Trans. Parallel Dstrbuted Systems, 12(10), 2001, pp [4] O. Beaumont, A. Legrand, F. Rastello, Y. Robert, "Dense lnear algebra kernels on heterogeneous platforms: Redstrbuton ssues", Parallel Computng, 28, 2001, pp [5] O. Beaumont, A. Legrand, F. Rastello, Y. Robert, "Statc LU decomposton on heterogeneous platforms", Int. Journal of Hgh Performance Computng Applcatons, 15(3), 2001, pp [6] I. Akyldz, X. Wang, W. Wang, ``Wreless Mesh Networks: A Survey'', Computer Networks Journal 47, (Elsever), March pp [7] [8] [9] [10] [11] [KN] M. Garey, D. Johnson, "Computers and Intractablty: A Gude to the Theory of NP- Completeness", W. Freeman, ISBN , A6: MP9, 1979, pg. 247 [12] P. Pham, S. Perreau, Performance Analyss of Reactve Shortest Path and Mult-path Routng Mechansm wth Load Balance, IEEE INFOCOM 03, San Francsco, CA, [13] H. Hassanen, A. Zhou, Routng wth Load Balancng n Wreless Ad hoc Networks, 4th ACM Internatonal Workshop on Modelng, Analyss and Smulaton of Wreless and Moble Systems, Rome, Italy, 2001, pp [14] S. Lee, M. Gerla, AODV-BR: Backup Routng n Ad hoc Network, IEEE WCNC 00, pp [15] S. Roy, D. Saha, S. Bandyopadhyay, A Network- Aware MAC and Routng Protocol for Effectve Load Balancng n Ad Hoc Wreless Networks wth Drectonal Antenna, MobHoc 03, Annapols, MD. [16] Y. Ganjal, A. Keshavarzan, Load Balancng n Ad Hoc Networks: Sngle-path Routng vs. Mult-path Routng, IEEE Infocom, Mar 2003, Hong Kong. [17] [18] 2/wrelessmesh.html [19] [20] R. Draves, J. Padhye, B. Zll, Routng n Mult- Rado, Mult-Hop Wreless Mesh Networks, MobCom 04, Sept. 2004, Phladelpha, PA [21] A. Ranwala, T. Chueh, Archtecture and Algorthms for an IEEE Based Mult- Channel Wreless Mesh Network, IEEE Infocom Mar 2005, Mam, FL. [22] J. Hespanha, S. Bohacek, Prelmnary Results n Routng Games, Amercan Control Conference, Arlngton, VA, June 2001, vol. 3, pp [23] G. Horton, "A mult-level dffuson method for dynamc load balancng", Parallel Computng. 19 (1993), pp [24] D. Eppsten, Fndng the k shortest paths,35th IEEE Symposum on Foundatons of Computer Scence., Santa Fe, 1994, pp [25] D. Ganesan, R. Govndan, S. Shenker, D. Estrn, "Hghly-Reslent, Energy-Effcent Multpath Routng n Wreless Sensor Networks", Moble Computng and Communcatons Revew, Vol. 1, Number 2, [26] Y. Desmedt, Y. Frankel, Threshold Cryptosystems, Proceedngs on Advances n cryptology, 1989, ISBN: Santa Barbara, CA, pp [27] C. Chekur, A. Goldberg, D. Karger, M. Levne, C. Sten, Expermental Study of Mnmum Cut Algorthms, Tech. Rep., NEC Research Insttute, Inc., 1996, pp [28] S. Bellovn, E. Gansner, "Usng Lnk Cuts to Attack Internet Routng", Tech. Rep., ATT Research, 2004, Work n Progress 2003 USENIX [29] R. Gandh, S. Khuller, A. Srnvasan, Approxmaton Algorthms for Partal Coverng Problems, Lecture Notes n Computer Scence, Sprnger-Verlag GmbH, ISSN: , Vol. 2076, pp

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

Availability-Based Path Selection and Network Vulnerability Assessment

Availability-Based Path Selection and Network Vulnerability Assessment Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

How To Plan A Network Wide Load Balancing Route For A Network Wde Network (Network)

How To Plan A Network Wide Load Balancing Route For A Network Wde Network (Network) Network-Wde Load Balancng Routng Wth Performance Guarantees Kartk Gopalan Tz-cker Chueh Yow-Jan Ln Florda State Unversty Stony Brook Unversty Telcorda Research kartk@cs.fsu.edu chueh@cs.sunysb.edu yjln@research.telcorda.com

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

Energy Conserving Routing in Wireless Ad-hoc Networks

Energy Conserving Routing in Wireless Ad-hoc Networks Energy Conservng Routng n Wreless Ad-hoc Networks Jae-Hwan Chang and Leandros Tassulas Department of Electrcal and Computer Engneerng & Insttute for Systems Research Unversty of Maryland at College ark

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Energy Efficient Routing in Ad Hoc Disaster Recovery Networks

Energy Efficient Routing in Ad Hoc Disaster Recovery Networks Energy Effcent Routng n Ad Hoc Dsaster Recovery Networks Gl Zussman and Adran Segall Department of Electrcal Engneerng Technon Israel Insttute of Technology Hafa 32000, Israel {glz@tx, segall@ee}.technon.ac.l

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

Agile Traffic Merging for Data Center Networks. Qing Yi and Suresh Singh Portland State University, Oregon June 10 th, 2014

Agile Traffic Merging for Data Center Networks. Qing Yi and Suresh Singh Portland State University, Oregon June 10 th, 2014 Agle Traffc Mergng for Data Center Networks Qng Y and Suresh Sngh Portland State Unversty, Oregon June 10 th, 2014 Agenda Background and motvaton Power optmzaton model Smulated greedy algorthm Traffc mergng

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

Formulating & Solving Integer Problems Chapter 11 289

Formulating & Solving Integer Problems Chapter 11 289 Formulatng & Solvng Integer Problems Chapter 11 289 The Optonal Stop TSP If we drop the requrement that every stop must be vsted, we then get the optonal stop TSP. Ths mght correspond to a ob sequencng

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Economic-Robust Transmission Opportunity Auction in Multi-hop Wireless Networks

Economic-Robust Transmission Opportunity Auction in Multi-hop Wireless Networks Economc-Robust Transmsson Opportunty Aucton n Mult-hop Wreless Networks Mng L, Pan L, Mao Pan, and Jnyuan Sun Department of Electrcal and Computer Engneerng, Msssspp State Unversty, Msssspp State, MS 39762

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Optimization of network mesh topologies and link capacities for congestion relief

Optimization of network mesh topologies and link capacities for congestion relief Optmzaton of networ mesh topologes and ln capactes for congeston relef D. de Vllers * J.M. Hattngh School of Computer-, Statstcal- and Mathematcal Scences Potchefstroom Unversty for CHE * E-mal: rwddv@pu.ac.za

More information

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems Jont Schedulng of Processng and Shuffle Phases n MapReduce Systems Fangfe Chen, Mural Kodalam, T. V. Lakshman Department of Computer Scence and Engneerng, The Penn State Unversty Bell Laboratores, Alcatel-Lucent

More information

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center Dynamc Resource Allocaton and Power Management n Vrtualzed Data Centers Rahul Urgaonkar, Ulas C. Kozat, Ken Igarash, Mchael J. Neely urgaonka@usc.edu, {kozat, garash}@docomolabs-usa.com, mjneely@usc.edu

More information

Multi-Source Video Multicast in Peer-to-Peer Networks

Multi-Source Video Multicast in Peer-to-Peer Networks ult-source Vdeo ultcast n Peer-to-Peer Networks Francsco de Asís López-Fuentes*, Eckehard Stenbach Technsche Unverstät ünchen Insttute of Communcaton Networks, eda Technology Group 80333 ünchen, Germany

More information

LAMOR: Lifetime-Aware Multipath Optimized Routing Algorithm for Video Transmission over Ad Hoc Networks

LAMOR: Lifetime-Aware Multipath Optimized Routing Algorithm for Video Transmission over Ad Hoc Networks LAMOR: Lfetme-Aware Multpath Optmzed Routng Algorthm for Vdeo ransmsson over Ad Hoc Networks 1 Lansheng an, Lng Xe, Kng-m Ko, Mng Le and Moshe Zukerman Abstract Multpath routng s a key technque to support

More information

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING FORMAL ANALYSIS FOR REAL-TIME SCHEDULING Bruno Dutertre and Vctora Stavrdou, SRI Internatonal, Menlo Park, CA Introducton In modern avoncs archtectures, applcaton software ncreasngly reles on servces provded

More information

行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告

行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告 行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告 畫 類 別 : 個 別 型 計 畫 半 導 體 產 業 大 型 廠 房 之 設 施 規 劃 計 畫 編 號 :NSC 96-2628-E-009-026-MY3 執 行 期 間 : 2007 年 8 月 1 日 至 2010 年 7 月 31 日 計 畫 主 持 人 : 巫 木 誠 共 同

More information

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. XX, MONTH 2XX 1 Effcent On-Demand Data Servce Delvery to Hgh-Speed Trans n Cellular/Infostaton Integrated Networks Hao Lang, Student Member,

More information

A Dynamic Energy-Efficiency Mechanism for Data Center Networks

A Dynamic Energy-Efficiency Mechanism for Data Center Networks A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,

More information

On Multi-controller Placement Optimization in Software Defined Networking - based WANs

On Multi-controller Placement Optimization in Software Defined Networking - based WANs On Mult-controller Placement Optmzaton n Software Defned Networkng - based WANs Eugen Borcoc, Radu Badea, Serban Georgca Obreja, Marus Vochn Unversty POLITEHNICA of Bucharest - UPB Bucharest, Romana eugen.borcoc@elcom.pub.ro,

More information

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET)

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET) Renforcement Learnng for Qualty of Servce n Moble Ad Hoc Network (MANET) *T.KUMANAN AND **K.DURAISWAMY *Meenaksh College of Engneerng West K.K Nagar, Cheena-78 **Dean/academc,K.S.R College of Technology,Truchengode

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com G. G. Md. Nawaz Al 1,2, Rajb Chakraborty 2, Md. Shhabul Alam 2 and Edward Chan 1 1 Cty Unversty of Hong Kong, Hong Kong, Chna taposh_kuet20@yahoo.comcsedchan@ctyu.edu.hk 2 Khulna Unversty of Engneerng

More information

Financial Mathemetics

Financial Mathemetics Fnancal Mathemetcs 15 Mathematcs Grade 12 Teacher Gude Fnancal Maths Seres Overvew In ths seres we am to show how Mathematcs can be used to support personal fnancal decsons. In ths seres we jon Tebogo,

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

Cloud-based Social Application Deployment using Local Processing and Global Distribution

Cloud-based Social Application Deployment using Local Processing and Global Distribution Cloud-based Socal Applcaton Deployment usng Local Processng and Global Dstrbuton Zh Wang *, Baochun L, Lfeng Sun *, and Shqang Yang * * Bejng Key Laboratory of Networked Multmeda Department of Computer

More information

Network Aware Load-Balancing via Parallel VM Migration for Data Centers

Network Aware Load-Balancing via Parallel VM Migration for Data Centers Network Aware Load-Balancng va Parallel VM Mgraton for Data Centers Kun-Tng Chen 2, Chen Chen 12, Po-Hsang Wang 2 1 Informaton Technology Servce Center, 2 Department of Computer Scence Natonal Chao Tung

More information

Distributed Optimal Contention Window Control for Elastic Traffic in Wireless LANs

Distributed Optimal Contention Window Control for Elastic Traffic in Wireless LANs Dstrbuted Optmal Contenton Wndow Control for Elastc Traffc n Wreless LANs Yalng Yang, Jun Wang and Robn Kravets Unversty of Illnos at Urbana-Champagn { yyang8, junwang3, rhk@cs.uuc.edu} Abstract Ths paper

More information

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks : An Adaptve, Anycast MAC Protocol for Wreless Sensor Networks Hwee-Xan Tan and Mun Choon Chan Department of Computer Scence, School of Computng, Natonal Unversty of Sngapore {hweexan, chanmc}@comp.nus.edu.sg

More information

A Resource-trading Mechanism for Efficient Distribution of Large-volume Contents on Peer-to-Peer Networks

A Resource-trading Mechanism for Efficient Distribution of Large-volume Contents on Peer-to-Peer Networks A Resource-tradng Mechansm for Effcent Dstrbuton of Large-volume Contents on Peer-to-Peer Networks SmonG.M.Koo,C.S.GeorgeLee, Karthk Kannan School of Electrcal and Computer Engneerng Krannet School of

More information

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks 2007 Internatonal Conference on Convergence Informaton Technology An Adaptve and Dstrbuted Clusterng Scheme for Wreless Sensor Networs Xnguo Wang, Xnmng Zhang, Guolang Chen, Shuang Tan Department of Computer

More information

Enterprise Master Patient Index

Enterprise Master Patient Index Enterprse Master Patent Index Healthcare data are captured n many dfferent settngs such as hosptals, clncs, labs, and physcan offces. Accordng to a report by the CDC, patents n the Unted States made an

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

A generalized hierarchical fair service curve algorithm for high network utilization and link-sharing

A generalized hierarchical fair service curve algorithm for high network utilization and link-sharing Computer Networks 43 (2003) 669 694 www.elsever.com/locate/comnet A generalzed herarchcal far servce curve algorthm for hgh network utlzaton and lnk-sharng Khyun Pyun *, Junehwa Song, Heung-Kyu Lee Department

More information

Allocating Collaborative Profit in Less-than-Truckload Carrier Alliance

Allocating Collaborative Profit in Less-than-Truckload Carrier Alliance J. Servce Scence & Management, 2010, 3: 143-149 do:10.4236/jssm.2010.31018 Publshed Onlne March 2010 (http://www.scrp.org/journal/jssm) 143 Allocatng Collaboratve Proft n Less-than-Truckload Carrer Allance

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu

More information

A role based access in a hierarchical sensor network architecture to provide multilevel security

A role based access in a hierarchical sensor network architecture to provide multilevel security 1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty

More information

Network Services Definition and Deployment in a Differentiated Services Architecture

Network Services Definition and Deployment in a Differentiated Services Architecture etwork Servces Defnton and Deployment n a Dfferentated Servces Archtecture E. kolouzou, S. Manats, P. Sampatakos,. Tsetsekas, I. S. Veners atonal Techncal Unversty of Athens, Department of Electrcal and

More information

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks Master s Thess Ttle Confgurng robust vrtual wreless sensor networks for Internet of Thngs nspred by bran functonal networks Supervsor Professor Masayuk Murata Author Shnya Toyonaga February 10th, 2014

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop IWFMS: An Internal Workflow Management System/Optmzer for Hadoop Lan Lu, Yao Shen Department of Computer Scence and Engneerng Shangha JaoTong Unversty Shangha, Chna lustrve@gmal.com, yshen@cs.sjtu.edu.cn

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

An Ad Hoc Network Load Balancing Energy- Efficient Multipath Routing Protocol

An Ad Hoc Network Load Balancing Energy- Efficient Multipath Routing Protocol 246 JOURNA OF SOFTWAR, VO. 9, NO. 1, JANUARY 2014 An Ad Hoc Network oad alancng nergy- ffcent Multpath Routng Protocol De-jn Kong Shanx Fnance and Taxaton College, Tayuan, Chna mal: dejnkong@163.com Xao-lng

More information

Virtual Network Embedding with Coordinated Node and Link Mapping

Virtual Network Embedding with Coordinated Node and Link Mapping Vrtual Network Embeddng wth Coordnated Node and Lnk Mappng N. M. Mosharaf Kabr Chowdhury Cherton School of Computer Scence Unversty of Waterloo Waterloo, Canada Emal: nmmkchow@uwaterloo.ca Muntasr Rahan

More information

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

A FRAMEWORK FOR EFFICIENT BANDWIDTH MANAGEMENT IN BROADBAND WIRELESS ACCESS SYSTEMS

A FRAMEWORK FOR EFFICIENT BANDWIDTH MANAGEMENT IN BROADBAND WIRELESS ACCESS SYSTEMS A FRAMEWORK FOR EFFICIENT BANDWIDTH MANAGEMENT IN BROADBAND WIRELESS ACCESS SYSTEMS BY BADER S. AL-MANTHARI A thess submtted to the School of Computng n conformty wth the requrements for the degree of

More information

Schedulability Bound of Weighted Round Robin Schedulers for Hard Real-Time Systems

Schedulability Bound of Weighted Round Robin Schedulers for Hard Real-Time Systems Schedulablty Bound of Weghted Round Robn Schedulers for Hard Real-Tme Systems Janja Wu, Jyh-Charn Lu, and We Zhao Department of Computer Scence, Texas A&M Unversty {janjaw, lu, zhao}@cs.tamu.edu Abstract

More information

DBA-VM: Dynamic Bandwidth Allocator for Virtual Machines

DBA-VM: Dynamic Bandwidth Allocator for Virtual Machines DBA-VM: Dynamc Bandwdth Allocator for Vrtual Machnes Ahmed Amamou, Manel Bourguba, Kamel Haddadou and Guy Pujolle LIP6, Perre & Mare Cure Unversty, 4 Place Jusseu 755 Pars, France Gand SAS, 65 Boulevard

More information

Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks

Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks Coordnated Denal-of-Servce Attacks n IEEE 82.22 Networks Y Tan Department of ECE Stevens Insttute of Technology Hoboken, NJ Emal: ytan@stevens.edu Shamk Sengupta Department of Math. & Comp. Sc. John Jay

More information

Towards bandwidth guaranteed energy efficient data center networking

Towards bandwidth guaranteed energy efficient data center networking Wang et al. Journal of Cloud Computng: Advances, Systems and Applcatons (2015) 4:9 DOI 10.1186/s13677-015-0035-7 RESEARCH Open Access Towards bandwdth guaranteed energy effcent data center networkng Tng

More information

Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process

Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process Dsadvantages of cyclc TDDB47 Real Tme Systems Manual scheduler constructon Cannot deal wth any runtme changes What happens f we add a task to the set? Real-Tme Systems Laboratory Department of Computer

More information

How To Solve A Problem In A Powerline (Powerline) With A Powerbook (Powerbook)

How To Solve A Problem In A Powerline (Powerline) With A Powerbook (Powerbook) MIT 8.996: Topc n TCS: Internet Research Problems Sprng 2002 Lecture 7 March 20, 2002 Lecturer: Bran Dean Global Load Balancng Scrbe: John Kogel, Ben Leong In today s lecture, we dscuss global load balancng

More information

Checkng and Testng in Nokia RMS Process

Checkng and Testng in Nokia RMS Process An Integrated Schedulng Mechansm for Fault-Tolerant Modular Avoncs Systems Yann-Hang Lee Mohamed Youns Jeff Zhou CISE Department Unversty of Florda Ganesvlle, FL 326 yhlee@cse.ufl.edu Advanced System Technology

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;

More information

AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION

AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION The Medterranean Journal of Computers and Networks, Vol. 2, No. 1, 2006 57 AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION L. Bada 1,*, M. Zorz 2 1 Department of Engneerng,

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Logical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem

Logical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME, ISSUE, FEBRUARY ISSN 77-866 Logcal Development Of Vogel s Approxmaton Method (LD- An Approach To Fnd Basc Feasble Soluton Of Transportaton

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School Robust Desgn of Publc Storage Warehouses Yemng (Yale) Gong EMLYON Busness School Rene de Koster Rotterdam school of management, Erasmus Unversty Abstract We apply robust optmzaton and revenue management

More information

Descriptive Models. Cluster Analysis. Example. General Applications of Clustering. Examples of Clustering Applications

Descriptive Models. Cluster Analysis. Example. General Applications of Clustering. Examples of Clustering Applications CMSC828G Prncples of Data Mnng Lecture #9 Today s Readng: HMS, chapter 9 Today s Lecture: Descrptve Modelng Clusterng Algorthms Descrptve Models model presents the man features of the data, a global summary

More information

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information