Iterative Water-filling for Load-balancing in Wireless LAN or Microcellular Networks
|
|
|
- Tyler Richards
- 10 years ago
- Views:
Transcription
1 terative Water-fiing for Load-baancing in Wireess LAN or Microceuar Networks Jeremy K. Chen Theodore S. Rappaport Gustavo de Veciana Wireess Networking and Communications Group (WNCG), be University of Texas at Austin Abstract-This paper presents an efficient iterative oadbaancing agorithm for time and bandwidth aocation among access point4i (APs) and users subject to heterogeneous fairne4is and appication requirements. The agorithm can be car'ied out either at a centra network switch with site-specific propagation predictions, or in a decentraized manner. The agorithm converges to maximum network resource utiization from any sta'ting point, and usuay converges in 3 to 9 iterations in various network conditions incuding users joining, eaving, and moving within a network and various network sizes. Such a fast convergence aows rea-time impementations of our agorithm. Simuation resuts show that our agorithm bas merits over other schemes especiay when users exhibit custered patterns: Our agorithm, when assuming mutipe radios at each use1, achieves 48% gain of median throughput as compared with the max-min fair oad-baancing scheme (aso with the muti-radio assumption) whie osing 14% of fairness index; we aso achieve 26% gain of median throughput and 52% gain of fairness index ove.r the Strongest-Signa-First scheme (which assumes each user has ony a singe radio). When ony a singe radio is used, our agorithm is simiar to the max-min fairness scheme, and is sti better than SSF with 44% gain of 25-percentie throughput and 37% gain of fairness index.. NTRODUCTON Peope consider increasing the capacity of WLAN or microceuar networks by increasing AP density and assigning proper non-overapping frequency channes to APs. As the number of APs to which a user can connect increases, an agorithm that efficienty associates users to APs becomes critica for bandwidth and quaity of service (QoS) management. However, the defaut Strongest-Signa-First (SSP) approach used in products, in which each user chooses an AP with the strongest signa, resuts in uneveny distributed oads among APs and poor performance [1]. n order to better baance oads, vendors such as Cisco, Trapeze, Aruba, Meru, and Symbo have introduced centra switches to have networkayer contros (e.g. oad baancing and handoffs) over the AP's norma processing in physica ayers today. This paper presents a oad-baancing agorithm that can be carried out 'either in a decentraized way with some message exchange between APs and mobie users, or at a centra switch with site-specific predictions (such predictions can provide the centra switch with deta~ed RF parameters, the received signa-to-noise ratios (SNR), and estimate the achievabe capacity for each wireess ink; see [2]-[4] and references therein). Severa heuristic oad-baancing schemes have been presented. Baachandran et a [1] observed that APs with oad- 1 This work is supported by NSF Grant AC Fig. 1. A simpe network with 2 APs and 3 users. Different thicknesses of dashed ines signify different avaiabe ink capacity Ra 8, APs 1 and 2 use disjoint channes. T a,s denotes the time fraction aocat~d to user s over the RF channe of AP a. baancing functiomiities periodicay send beacons with current oad, captured by the number of users, bit error rates, and signa strengths. However, severa measurement studies have shown that the number of users is not a good metric to determine the oad [4], [5]. Baachandran et a proposes a better oad-baancing scheme where each arriving user expicity asks for a minimum and a maximum bound on bandwidth/throughput, and a centraized admission contro is performed to associate the arriving user to an AP that is within the user's radio range and has the most avaiabe capacity [1]. The work in [1] improves the degree of oad baancing by over 30% and user bandwidth aocation up to 52% in comparison with schemes with itte oad baancing. The work in [ 6] presents a decentraized oad baancing agorithm that can be appied to EEE a/b/g without modifying the standards whie being transparent to end users. t was shown by exampe that the throughput of a station increases from 1.5 to 2 Mbps, and packet deays can be reduced from 450 to 8 ms. Whie the work in [1], [6] outperforms schemes with itte or no oad baancing, they are not shown to be optima. To the best of our knowedge, the ony work that achieves some form of optimaity in oad baancing is [7], which achieves max-min fair bandwidth aocation. This paper considers a network with mutipe APs and users, as depicted in Fig. 1 and tries to answer a fundamenta question: which AP(s) shoud be connected with a particuar user, and how much time shoud the specific AP(s) aocate to this user in order to achieve optima network utiization subject to heterogeneous fairness and appication requirements. Section describes the system mode and notation in detai. Section presents the formuation and an iterative agorithm for the optima aocation of channe usage time. Simuation resuts are presented in Section V /06/$20.00 (c) 2006 EEE 117 Authorized icensed use imited to: University of Texas at Austin. Downoaded on December 4, 2009 at 13:11 from EEE Xpore. Restrictions appy.
2 .J. SYSTEM MODEL AND NOTATON We assume a muti-radio capabiity that aows mutipe channes to be received and decoded in - parae by each user (this mode has been proposed in [7]). Jt is suggested in this paper that the mutipe-radio assumption simpifies the computation to be efficient (the probem formuation is convex). Our approach can aso be used for muti-radio APs. Our agorithm aows up to an unimited number of radios on a user; however, 2 to 4 radios suffice in practice, since a user in an actua WLAN or microceuar network is usuay surrounded by at most 4 APs. We assume that users exhibit a quasi-static mobiity pattern (a mode that has been adopted in [7]) where users can move from pace to pace, but they tend to stay in the same physica paces for ong periods of time [5]. This mode aows us to consider ong-term averaged ink capacities over a time scae of about 2 seconds (denoted as TAvo), which is adequate for resource re-aocation and may- not be a noticeabe time interva for new users who are waiting to be associated with APs. The proposed oad-baancing agorithm is executed based on the predicted average capacities during every TAvo interva. Link capacities may change in successive TAvo intervas due to interference or changes in user appications or trans~ission states. The capacity Ra,s (e.g. throughput) between an AP a, and a user, s, is determined by the peak throughput for a singe ( unshared) user, and aso determined from predicted, measured, or optimized throughput estimates based on site specific information. For the case where mutipe users share a singe AP over an RF channe, the throughput between the AP, a, and a user, s, is a fraction (the time fraction of channe usage) of the ink capacity, that is, Throughputa,s = Ta,sRa,s, where Ta,s is the channe usage time between AP a and user s. During a TAvo interva, even though users may join/eave the network, or RF noise sources may emit interfering signas, the effects of these transient events on ink throughputs are quantized and samped every TAvo (e.g. bock processing is used). n the beginning of every TAvo interva, our iterative oad baancing agorithm re-adjusts the time/bandwidth resource aocation over a users and APs. The agorithm converges to optimum in merey 3 to 9 iterations regardess of network sizes, athough the computation time of each iteration grows ineary with the number of users mutipied by the number of APs controed by the switch. On a 20Hz nte Pentium computer with Windows XP, each iteration in Matab takes 30 miiseconds for a network with 36 APs and 300 users. Code impemented in assemby or C anguage woud be much faster and is very suitabe for reatime impementations of our agorithms on hardware/firmware, as contempated in [2], [3]. With the above mentioned assumptions, the rea throughput that a user experiences mainy depends on the channe usage time aocated from the APs to this user. For instance, in Fig. 1, suppose AP 1 and AP 2 aocate T1,1 = 20% and T2,1 = 40% of their time (over disjoint channes 1 and 2, respectivey) to user 1, respectivey. The tota bandwidth that user 1 obtains is b 1 = ( 0 0 R 1,1 + 1 ~ 0 R2,1; the bandwidths of users 2 and 3 can be computed in a simiar way. we consider an infinite backog of packets (fu and ready queues on every channe) for every user. Hence a user's throughput is the same as the bandwidth aocated to her. We maximize the sum utiity of throughput, which means maximizing Ei= Ui(bi) over the channe usage time in this exampe. f utiity functions are propery chosen, users wi be aocated different notions of fair aocation when the network reaches maximum sum utiity [8]. We made the assumption that a APs are under the contro of a network switch. However, some rogue APs or RF noise sources may emit interfering signas in the coverage area of the controed APs. n this case, some controed APs or overay sensors can detect signas from rogue APs. With detected signa parameters and site specific knowedge, position ocation techniques can ocate the rogue APs [2], [3]. Then, AP channe assignments are changed so that the APs near the rogue APs operate at orthogona RF channes in order to eiminate most interference from rogue APs. Then, the switch wi predict SNR and ink capacities between users and controed APs using site specific modes for the rogue ocations and transmit properties, and appy our agorithm to find the optima resource aocation accordingy. This paper assumes the frequency band of each AP has been propery assigned [2], [3], and focuses on finding the optima bandwidth/time aocation in a fuy-controed network. With an assigned aocated frequency channe, each AP serves its user by time sharing. The fraction of time resource dedicated for payoad transmissions between users and an AP, a, over an RF channe is denoted as T!rac (0 ::::; T!rac ::::; 1) (e.g., it ranges from 59% to 88% in 802.a). The subscript a in TJrac is used, since the payoad time fractions may differ from AP to AP. We suppose that each user shares her utiity function to a the APs that transmit signas strong enough to reach her. Then, each AP aocates its time resource (over its assigned RF channe) to users based on the information of the utiity functions of a the users within its coverage area, based on site specific knowedge [2]-[4]. n this paper, utiity functions are assumed to be concave, continuousy differentiabe, and stricty increasing [9] for simpicity of anaysis. Let n and m denote the numbers of APs and of users, respectivey. We use a or s as index when referring to a specific AP or user, and use j or i as dummy indices of APs or users when performing a summation. User s is said to be within the coverage of AP a if Ra,s > 0; otherwise, Ra 8 = 0. Each entry in the rate matrix can be predicted from a ste-specific prediction engine [2]-[4]. Within a unit time period, suppose AP a aocates a time fraction T a,s (over the assigned RF channe of AP a) to user s (0::::; T a,s ::::; 1). The actua bandwidth that user s gets from AP a is T a,sra,s. MAXMUM SUM UTLTY WTH TME ALLOCATON The optima AP-user association can be formuated as the sum utiity maximization probem in (1) over time resources 118 Authorized icensed use imited to: University oftexas at Austin. Downoaded on December 4, 2009 at 13:11 from EEE Xpore. Restrictions appy.
3 from APs on different RF channes to users. max """'U (""'T R ) L..,; ~ L..,; :;,~ :;,t subject to LTa,i ~ T!rac, Va, overt a,s ;::: 0, Va, s. (1) t is hard to find a cosed-form expression of the optima channe usage time aocation for (1). Nevertheess, if the optimization is over the time resources of ony a singe AP (over one channe), assuming the other APs' time aocations are fixed, cosed-form expressions for each AP's optima time aocation have cosed-form expressions, shown in (11) which are soutions to formuation (3). Theorem 3.1 discussed beow shows that the origina mutipe AP probem in (1) reaches the optimum if and ony if the time aocation from every AP simutaneousy has the cosed-form expressions as in (11). Hence, the optimization of the mutipe-ap probem can be done by successivey optimi~ing each AP's time resources, as presented in Agorithm 1 as an efficient iterative agorithm. Our derivation and proofs extend [10] to a wide cass of utiity functions (beyond ogarithmic) for different degrees of fairness and appication needs. The soe constraint in (1) means that the tota channe usage time used at each AP is upper bounded. The objective is to maximize the network utiity Li Ui(Lj Tj,iRj,i). Mo and Warand have proposed a cass of utiity functions that capture different degrees of fairness and mode appications with heterogeneous needs parameterized by qi [8]: The parameter Qi has an index i because each user i may have a different appication/fairness requirement. This famiy of utiity functions is concave, continuousy differentiabe, and stricty increasing [8]. The sum of concave functions is sti a concave function; hence, probem (1) is convex since a concave function is to be maximized over a convex constraint set [9]. The work in [8] shows that if qi ---+ oo, the formuation in (1) becomes a specia case that achieves max-min fairness, as studied in [7]. Within every TAvc, R remains constant after bock processing, and the optima sum utiity and T wi be determined accordingy. Suppose the sum utiity optimization is performed over the channe usage time resources of ony AP a, T a, = [T a,, T a,2,..., T a,m], assuming that the time aocations from the other APs to users are fixed. Then the formuation in (1) is reduced to max L Ui(Ta,iRa,i + Ca,i) i subject to LT a,i :::; T!rac' over T a,s ~ 0 v s, (3) where ca,i = L Tj,iRj,i are fixed. j:jia Denote by Aa the Lagrange mutipier for the constraint in (3). Then, the Lagrangian [9] is given by L(Ta,e, Aa) = L Ui(Ta,iRa,i+Ca,i)-Aa(LTa,i-T!rac). (4) Since utiity functions Us ( ) are increasing, it is natura to exhaust the time resource for maximizing sum utiity [9]; therefore, at the maximum of (3), we have Ei Ta,i = T~rac. Then, the sufficient and necessary optimaity conditions (KKT conditions) [9] for (3) can be written as: Ra.,sU8(Ta,sRa,.' +Ca.,.'!)= Aa if Ta, 8 > 0, Vs (5) < Aa if Ta, 8 = 0, Vs (6) ~T. = Tfrac L..J a,z a (7) Ta,8 ~ 0, Vs; Aa > 0. (8) t is obvious that no time is aocated to inks with zero capacity (i.e. T a,s = 0 if Ra,s = 0). Therefore, we focus on deriving the optima T a,s for Ra,s > 0. For genera utiity functions, the optima time fraction can be derived from (5): T = {-1-u'-(~) _ ca,s }+ a,s Ra s 8 Ra s Ra 8 ' Whie cosed~form soutions of T a,s do not exist for genera utiity functions, they can be obtained for the famiy of utiity functions in (2), for which (5) becomes ol 8Ta 1 8 Equating (10) with zero gives the optima time aocation: (-_.!._) (..L-1) Ca 8 T -,\ }+ qs R qs 1 a 1 8- { a a R a 1 8 (9) (10) (11) n (9) and (11), the notation {x}+ is needed because Ta 18 is nonnegative: { x} + = x if x ~ 0 and { x} + = 0 otherwise. By substituting (11) or (9) into 'Ei T a,i = T!rac in (7), Aa for each AP a can be numericay soved [9], [10]. n each iteration of our agorithm, finding the time resources of each AP requires soving a singe-variabe (.Aa) poynomia equation with m terms; hence, the time compexity of each iteration is 0( nm). f the parameter q 8 = 1, the expression of T a,s in (11) is the water-fiing expression, where the constant.a; 1 is known as the water-fiing eve [10]. Theorem 3.1: {Ta, 8, Va, s} is an optima soution to (1) if and ony if {Ta,, Ta,2,..., Ta,m} is the soution in (11) for AP a with the time aocation from the other APs {Tj, 8 : Vj =f a, V s} fixed, for a a = 1, 2,..., n. (The proof is omitted as it is a natura extension of Theorem 1 in [10].) As described in Theorem 3.1, the time aocations from each AP to users can be soved by (11), assuming time aocations from the other APs are fixed. Hence, the optima time aocation for the mutipe-ap optimization probem (1) can be found by an iterative agorithm (see Agorithm 1). Theorem 3. 2: Agorithm 1 resuts in an optima sum utiity and causes {Ta, 8, Va, s} to converge to an optima time 119 Authorized icensed use imited to: University of Texas at Austin. Downoaded on December 4, 2009 at13:11 from EEE Xpore. Restrictions appy.
4 Agorithm 1 An iterative agorithm to sove (1) Given a rate matrix {Ra,s, 'Va, s }. Start with a vaid time aocation {Ta, 8, 'Va, s}. repeat for each AP a = 1, 2,..., n do Compute {ca,s, \s} by (3). Compute {Ta., 8, \s} by (11) or (9). end for unti the sum utiity converges Output {Ta,s, 'Va, s}, aocation for Formuation (1). (The proof can be extended from the proof of Theorem 2 in [10]. Note that the optimum time aocation {Ta,s, 'Va, s} may not be unique.) Agorithm 1 can be carried out in a decentraized manner: each AP a computes the optima time aocation {T a,s, V s} ony for those users who are in the coverage of this AP. For the computation of each user's Ta 8, a constant ca 8 needs to be known, which in turn requir~s the knowedg~ of the bandwidth that this user s receives from APs other than AP a. n a reaistic WLAN setup, a user is under the coverage of no more than 4 APs; hence, the computation of ca,s at each user is efficient. APs sequentiay perform such decentraized computing. When the sum utiity converges, a contro message may be sent to APs to stop the decentraized computing. V. SMULATON RESULTS n this section, we compare the throughput and fairness performance of our maximum utiity (denoted as MaxUti) scheme with the max-min fairness scheme in [7], denoted as Ma.xMin, and the Strongest-Signa-First scheme in current impementations. We consider a simpified scenario of free-space propagation mode where no obstaces exist in the vicinity of APs. t is cear that our agorithm can utiize site specific information, which wi be considered in future work. We consider different percentages (between 1% and 5%) of users joining, eaving, or moving within the network; hence, the ink capacities change over time. We sampe R for every TAva, and within this time interva, R is fixed. Two kinds of user distributions, namey unifonn and custer (or hotspot), are considered. First, users are uniformy distributed in a 600 meters by 600 meters square that encompasses the 36 APs. Second, we consider that a hotspot at the center attracts more peope: users are distributed in a circe-shaped area centered at the midde of the APs with a radius of 250 meters. Users are randomy ocated on this circe based on their uniformy generated poar coordinates (the distance from the center and the poar ange are uniformy distributed between (0, 250) and (0, 21r), respectivey). From the viewpoint of the Cartesian coordinate, the user density is higher near the center than near the circumference of the circe. Each point on the figures is an average over 100 independent runs. n the SSF case, each user (whose transceiver can hande ony a singe channe) associates with the strongest AP, and then each AP eveny distributes its time resources to the associated users. Simuations show 120 that the number of iterations (mosty between 3 and 9) does not grow with the number of users. Our agorithm converges quicky even for arge networks. Figs. 2 and 3 show the medians and the 25-percenties of user throughputs, respectivey. Tabe presents fairness indices (see [11] for this metric) for cases with 400 users; scenarios with different number of APs and users are omitted, since their fairness index vaues are simiar to those in Tabe. Both MaxUti and MaxMin assume that each user has mutipe radios. For fair comparisons with SSF, we aso compute singeradio resuts by propery rounding muti-ap time aocation; MaxMin-R denotes the resuts produced by the rounding method in [7]. The MaxUti-R resuts were obtained by a different rounding method: we first compute norma mutiperadio time aocation; then, if any user indeed uses mutipe APs, this user simpy chooses the AP that suppies her with the most bandwidth. Finay, if any AP has any time resource remained not aocated, this AP aocates the remaining time proportionay to its associated users. For exampe, if the rate matrix R = [ ~ ~ ~! ] and a users' utiity parameters, q, are 1, then the optima time fraction (aowmg. mutt. ra d' tos ) 1s. T = [ Each user chooses ony one singe AP; then the time rna-. b T [ trtx ecomes = Then, since the first AP has time fraction (16.6%) remained, the remaining time is proportionay distributed to users 1 and 2; finay the time matrix for the singe-radio case is T = [ A trade-off between throughput and fairness can be seen in muti-radio cases MaxUti and MaxMin. Our MaxUti has very good performance in custer case: in Fig. 2(b), MaxUti exhibits about 48% higher median throughput over MaxMin whie sacrificing ony 14% of fairness as in Tabe. t is because MaxMin tends to achieve absoute fairness (its fairness index is amost 100% as in Tabe ) by sacrificing throughput (giving more time resource to users with poor ink capacities). Our MaxUti trades throughput with fairness; even in uniform case in Fig. 2(a), MaxUti yieds 9% higher median throughput than MaxMin whie osing 2% of fairness as in Tabe. Our agorithm, with mutipe radios at each user, outperforms SSF by 26% and 52% in terms of median throughput and fairness index, respectivey, as in Fig. 2(b) and Tabe. Surprisingy, the singe-radio scheme MaxUti-R yieds worse median throughput than SSF, mainy because our rounding method (as presented in the numerica exampe above) makes users choose stronger APs, thereby causing unbaanced oads on APs. The rounding method in [7] may be modified to be imposed upon MaxUti for better rounding performance; this is a subject for future research. Nevertheess, MaxUti R yieds simiar 25-percentie user throughputs as MaxMin-R, and is 44% and 17% higher than SSF in custer and uniform cases, respectivey (as seen in Fig. 3). Moreover, Tabe indicates that SSF has poor fairness indices as compared Authorized icensed use imited to: University of Texas at Austin. Downoaded on December 4, 2009 at 13:11 from EEE Xpore. Restrictions appy.
5 UnHorm Uniform emaxut -$-MaxUtii-R BMaxMin ~MaxMin-R -*SSF (a) Uniform user distribution Custer (/) ~ r '!! BMaxUti ::2! $-MaxUtii-R - "5!! BMaxMin _@ ~MaxMin-Rg>! -*"SSF ~ r : "" ii ~ : } :::3 : : ---~ &1.! 'g 0, ~ ::2! 0.2!: (b) Custered user distribution (/) _g (a) Uniform user distribution Custer :2 s! : 8MaxUti 0 - T T -$-MaxUtii-R. ;!! HMaxMin e ~MaxMin-R i : J ;:~~~ ~ ; , ~! 8? O (\J (b) Custered user distribution Fig. 2. The median of user throughput. Fig. 3. The 25-percentie of user throughput. TABLE FARNESS NDEX (CF. [11]) OF USBR THROUGHPUT ALLOCATON FOR TWO KNDS OF USER DSTRBUTONS (CLUSTER AND UNFORM) N A NETWORK WTH 36 APS AND 400 USERS. (UNT:%) with a other schemes (37% ower than MaxUti-R in custer case, for exampe). n summary, our method, MaxUti-R, outperforms SSF in terms of 25-percentie throughput and fairness index with sma sacr~fice of median throughput. V. CONCLUSONS We find anaytica expressions for the optima channe usage time aocation and present a fast iterative agorithm to achieve the optimum. Simuation resuts show that when users are custered, our utiity maximization formuation yieds substantia throughput gain over both the max-min scheme in [7] and the SSF scheme, which is currenty being used in WLAN products. When users are uniformy distributed in space, our max utiity scheme is simiar as the scheme in [7], and achieves better fairness than SSF. Regardess of the number of APs or users in a network, the convergence of the sum utiity is fast in various network conditions such as users joining, eaving, or moving within the network. Therefore, the iterative agorithm has good scaabiity and can be impemented in rea time. REFERENCES [1] A. Baachandran, P. Bah, and G. M. Voeker, "Hot-spot congestion reief in pubic-area wireess networks," in Proc. Fourth EEE Workshop on Mobie Computing Systems and Appications, June 2002, pp [2] T. S. Rappaport and R. R. Skidmore, "System and method for predicting network performance and position ocation using mutipe tabe ookups,'' U.S. Patent App., no , Dec [3] --, "System and method for automated pacement or configuration of equipment for obtaining desired network performance objectives and for security, RF tags, and bandwidth provisioning," U.S. Patent App., no , Nov [4] C. Na, J. K. Chen, and T. S. Rappaport, "Measured traffic statistics and throughput of EEE 802.b pubic WLAN hotspots with three different appications," EEE Trans. Wireess Commun., to appear. [5] D. Kotz and K. Essien, "Anaysis of a campus-wide wireess network," in Proc. the Eighth Annua nt. Conf. on Mobie Computing and Networking (MobiCom). ACM Press, September [6] H. Veayos, V. Aeo, and G. Karsson, ''Load baancing in overapping wireess LAN ces," in Proc. EEE nternationa Conference on Communications, vo. 7, June 2004, pp [7] Y. Bejerano, S.-J. Han, and L. E. Li, "Fairness and oad baancing in wireess LANs using association contro," in Proc. ACM MobiCom, Sept. 2004, pp [8] J. Mo and J. Warand, "Fair end-to-end window-based congestion contro," EEEACM Trans. Networking, vo. 8, no. 5, pp , Oct [9] S. P. Boyd and L. Vandenberghe, Convex Optimization. Cambridge University Press, [10] W. Yu, W. Rhee, S. Boyd, and J. M. Cioffi, "terative water-fiing for Gaussian vector mutipe-access channes,'' EEE Trans. nfomj. Theory, vo. 50, no. 1, pp , Jan [11] R. Jain, D. Chiu, and W. Hawe, "A quantitative measure of fairness and discrimination for resource aocation in shared computer systems," DEC, Research Report TR-301, Authorized icensed use imited to: University of Texas at Austin. Downoaded on December at 13:11 from EEE Xpore. Restrictions appy.
Secure Network Coding with a Cost Criterion
Secure Network Coding with a Cost Criterion Jianong Tan, Murie Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technoogy Cambridge, MA 0239, USA E-mai: {jianong, medard}@mit.edu
Simultaneous Routing and Power Allocation in CDMA Wireless Data Networks
Simutaneous Routing and Power Aocation in CDMA Wireess Data Networks Mikae Johansson *,LinXiao and Stephen Boyd * Department of Signas, Sensors and Systems Roya Institute of Technoogy, SE 00 Stockhom,
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 1
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 1 Scaabe Muti-Cass Traffic Management in Data Center Backbone Networks Amitabha Ghosh, Sangtae Ha, Edward Crabbe, and Jennifer
GREEN: An Active Queue Management Algorithm for a Self Managed Internet
: An Active Queue Management Agorithm for a Sef Managed Internet Bartek Wydrowski and Moshe Zukerman ARC Specia Research Centre for Utra-Broadband Information Networks, EEE Department, The University of
Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures
Lecture 7 Dataink Ethernet, Home Peter Steenkiste Schoo of Computer Science Department of Eectrica and Computer Engineering Carnegie Meon University 15-441 Networking, Spring 2004 http://www.cs.cmu.edu/~prs/15-441
Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger
Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 1 of 7 [Figures are not incuded in this sampe chapter] Advanced CodFusion 4.0 Appication Deveopment - 3 - Server
Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing.
Fast Robust Hashing Manue Urueña, David Larrabeiti and Pabo Serrano Universidad Caros III de Madrid E-89 Leganés (Madrid), Spain Emai: {muruenya,darra,pabo}@it.uc3m.es Abstract As statefu fow-aware services
Australian Bureau of Statistics Management of Business Providers
Purpose Austraian Bureau of Statistics Management of Business Providers 1 The principa objective of the Austraian Bureau of Statistics (ABS) in respect of business providers is to impose the owest oad
Pricing and Revenue Sharing Strategies for Internet Service Providers
Pricing and Revenue Sharing Strategies for Internet Service Providers Linhai He and Jean Warand Department of Eectrica Engineering and Computer Sciences University of Caifornia at Berkeey {inhai,wr}@eecs.berkeey.edu
COMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION
COMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION Františe Mojžíš Department of Computing and Contro Engineering, ICT Prague, Technicá, 8 Prague [email protected] Abstract This
Enhanced continuous, real-time detection, alarming and analysis of partial discharge events
DMS PDMG-RH DMS PDMG-RH Partia discharge monitor for GIS Partia discharge monitor for GIS Enhanced continuous, rea-time detection, aarming and anaysis of partia discharge events Unrivaed PDM feature set
Load Balancing in Distributed Web Server Systems with Partial Document Replication *
Load Baancing in Distributed Web Server Systems with Partia Document Repication * Ling Zhuo Cho-Li Wang Francis C. M. Lau Department of Computer Science and Information Systems The University of Hong Kong
Face Hallucination and Recognition
Face Haucination and Recognition Xiaogang Wang and Xiaoou Tang Department of Information Engineering, The Chinese University of Hong Kong {xgwang1, xtang}@ie.cuhk.edu.hk http://mmab.ie.cuhk.edu.hk Abstract.
Multi-Robot Task Scheduling
Proc of IEEE Internationa Conference on Robotics and Automation, Karsruhe, Germany, 013 Muti-Robot Tas Scheduing Yu Zhang and Lynne E Parer Abstract The scheduing probem has been studied extensivey in
eg Enterprise vs. a Big 4 Monitoring Soution: Comparing Tota Cost of Ownership Restricted Rights Legend The information contained in this document is confidentia and subject to change without notice. No
Teamwork. Abstract. 2.1 Overview
2 Teamwork Abstract This chapter presents one of the basic eements of software projects teamwork. It addresses how to buid teams in a way that promotes team members accountabiity and responsibiity, and
Hybrid Interface Solutions for next Generation Wireless Access Infrastructure
tec. Connectivity & Networks Voker Sorhage Hybrid Interface Soutions for next Generation Wireess Access Infrastructure Broadband wireess communication wi revoutionize every aspect of peope s ives by enabing
Chapter 3: JavaScript in Action Page 1 of 10. How to practice reading and writing JavaScript on a Web page
Chapter 3: JavaScript in Action Page 1 of 10 Chapter 3: JavaScript in Action In this chapter, you get your first opportunity to write JavaScript! This chapter introduces you to JavaScript propery. In addition,
Virtual trunk simulation
Virtua trunk simuation Samui Aato * Laboratory of Teecommunications Technoogy Hesinki University of Technoogy Sivia Giordano Laboratoire de Reseaux de Communication Ecoe Poytechnique Federae de Lausanne
Betting Strategies, Market Selection, and the Wisdom of Crowds
Betting Strategies, Market Seection, and the Wisdom of Crowds Wiemien Kets Northwestern University [email protected] David M. Pennock Microsoft Research New York City [email protected]
3.3 SOFTWARE RISK MANAGEMENT (SRM)
93 3.3 SOFTWARE RISK MANAGEMENT (SRM) Fig. 3.2 SRM is a process buit in five steps. The steps are: Identify Anayse Pan Track Resove The process is continuous in nature and handed dynamicay throughout ifecyce
Chapter 3: e-business Integration Patterns
Chapter 3: e-business Integration Patterns Page 1 of 9 Chapter 3: e-business Integration Patterns "Consistency is the ast refuge of the unimaginative." Oscar Wide In This Chapter What Are Integration Patterns?
Application-Aware Data Collection in Wireless Sensor Networks
Appication-Aware Data Coection in Wireess Sensor Networks Xiaoin Fang *, Hong Gao *, Jianzhong Li *, and Yingshu Li +* * Schoo of Computer Science and Technoogy, Harbin Institute of Technoogy, Harbin,
Scheduling in Multi-Channel Wireless Networks
Scheduing in Muti-Channe Wireess Networks Vartika Bhandari and Nitin H. Vaidya University of Iinois at Urbana-Champaign, USA [email protected], [email protected] Abstract. The avaiabiity of mutipe orthogona
Fixed income managers: evolution or revolution
Fixed income managers: evoution or revoution Traditiona approaches to managing fixed interest funds rey on benchmarks that may not represent optima risk and return outcomes. New techniques based on separate
Bite-Size Steps to ITIL Success
7 Bite-Size Steps to ITIL Success Pus making a Business Case for ITIL! Do you want to impement ITIL but don t know where to start? 7 Bite-Size Steps to ITIL Success can hep you to decide whether ITIL can
TERM INSURANCE CALCULATION ILLUSTRATED. This is the U.S. Social Security Life Table, based on year 2007.
This is the U.S. Socia Security Life Tabe, based on year 2007. This is avaiabe at http://www.ssa.gov/oact/stats/tabe4c6.htm. The ife eperiences of maes and femaes are different, and we usuay do separate
CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS
Dehi Business Review X Vo. 4, No. 2, Juy - December 2003 CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS John N.. Var arvatsouakis atsouakis DURING the present time,
A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements
A Suppier Evauation System for Automotive Industry According To Iso/Ts 16949 Requirements DILEK PINAR ÖZTOP 1, ASLI AKSOY 2,*, NURSEL ÖZTÜRK 2 1 HONDA TR Purchasing Department, 41480, Çayırova - Gebze,
Art of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0
IEEE DISTRIBUTED SYSTEMS ONLINE 1541-4922 2005 Pubished by the IEEE Computer Society Vo. 6, No. 5; May 2005 Editor: Marcin Paprzycki, http://www.cs.okstate.edu/%7emarcin/ Book Reviews: Java Toos and Frameworks
Market Design & Analysis for a P2P Backup System
Market Design & Anaysis for a P2P Backup System Sven Seuken Schoo of Engineering & Appied Sciences Harvard University, Cambridge, MA [email protected] Denis Chares, Max Chickering, Sidd Puri Microsoft
A Distributed MAC Scheme Supporting Voice Services in Mobile Ad Hoc Networks 1
A Distributed MAC Scheme Supporting Voice Services in Mobie Ad Hoc Networks 1 Hai Jiang, Ping Wang, H. Vincent Poor, and Weihua Zhuang Department of Eectrica & Computer Engineering, University of Aberta,
Telephony Trainers with Discovery Software
Teephony Trainers 58 Series Teephony Trainers with Discovery Software 58-001 Teephony Training System 58-002 Digita Switching System 58-003 Digita Teephony Training System 58-004 Digita Trunk Network System
Comparison of Traditional and Open-Access Appointment Scheduling for Exponentially Distributed Service Time
Journa of Heathcare Engineering Vo. 6 No. 3 Page 34 376 34 Comparison of Traditiona and Open-Access Appointment Scheduing for Exponentiay Distributed Service Chongjun Yan, PhD; Jiafu Tang *, PhD; Bowen
A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation
A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation Zhihua Xia, Yi Zhu, Xingming Sun, and Jin Wang Jiangsu Engineering Center o Network Monitoring, Nanjing University o Inormation
Load Balance vs Energy Efficiency in Traffic Engineering: A Game Theoretical Perspective
Load Baance vs Energy Efficiency in Traffic Engineering: A Game Theoretica Perspective Yangming Zhao, Sheng Wang, Shizhong Xu and Xiong Wang Schoo of Communication and Information Engineering University
Take me to your leader! Online Optimization of Distributed Storage Configurations
Take me to your eader! Onine Optimization of Distributed Storage Configurations Artyom Sharov Aexander Shraer Arif Merchant Murray Stokey [email protected], {shraex, aamerchant, mstokey}@googe.com
WHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization
Best Practices: Pushing Exce Beyond Its Limits with Information Optimization WHITE Best Practices: Pushing Exce Beyond Its Limits with Information Optimization Executive Overview Microsoft Exce is the
An Idiot s guide to Support vector machines (SVMs)
An Idiot s guide to Support vector machines (SVMs) R. Berwick, Viage Idiot SVMs: A New Generation of Learning Agorithms Pre 1980: Amost a earning methods earned inear decision surfaces. Linear earning
Early access to FAS payments for members in poor health
Financia Assistance Scheme Eary access to FAS payments for members in poor heath Pension Protection Fund Protecting Peope s Futures The Financia Assistance Scheme is administered by the Pension Protection
RFID Radio Frequency IDentification
RFID Radio Frequency IDentification By: Jeremy Yager RFID - Overview RFID, as the name suggests, uses RF devices to communicate identification information. This is achieved by using sma devices known as
Finance 360 Problem Set #6 Solutions
Finance 360 Probem Set #6 Soutions 1) Suppose that you are the manager of an opera house. You have a constant margina cost of production equa to $50 (i.e. each additiona person in the theatre raises your
Pay-on-delivery investing
Pay-on-deivery investing EVOLVE INVESTment range 1 EVOLVE INVESTMENT RANGE EVOLVE INVESTMENT RANGE 2 Picture a word where you ony pay a company once they have deivered Imagine striking oi first, before
AA Fixed Rate ISA Savings
AA Fixed Rate ISA Savings For the road ahead The Financia Services Authority is the independent financia services reguator. It requires us to give you this important information to hep you to decide whether
On Capacity Scaling in Arbitrary Wireless Networks
On Capacity Scaing in Arbitrary Wireess Networks Urs Niesen, Piyush Gupta, and Devavrat Shah 1 Abstract arxiv:07112745v3 [csit] 3 Aug 2009 In recent work, Özgür, Lévêque, and Tse 2007) obtained a compete
An FDD Wideband CDMA MAC Protocol for Wireless Multimedia Networks
An FDD ideband CDMA MAC Protoco for ireess Mutimedia Networks Xudong ang Broadband and ireess Networking (BN) Lab Schoo of Eectrica and Computer Engineering Georgia Institute of Technoogy Atanta, GA 3332
Life Contingencies Study Note for CAS Exam S. Tom Struppeck
Life Contingencies Study Note for CAS Eam S Tom Struppeck (Revised 9/19/2015) Introduction Life contingencies is a term used to describe surviva modes for human ives and resuting cash fows that start or
Precise assessment of partial discharge in underground MV/HV power cables and terminations
QCM-C-PD-Survey Service Partia discharge monitoring for underground power cabes Precise assessment of partia discharge in underground MV/HV power cabes and terminations Highy accurate periodic PD survey
500 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 3, MARCH 2013
500 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 3, NO. 3, MARCH 203 Cognitive Radio Network Duaity Agorithms for Utiity Maximization Liang Zheng Chee Wei Tan, Senior Member, IEEE Abstract We
Design Considerations
Chapter 2: Basic Virtua Private Network Depoyment Page 1 of 12 Chapter 2: Basic Virtua Private Network Depoyment Before discussing the features of Windows 2000 tunneing technoogy, it is important to estabish
Betting on the Real Line
Betting on the Rea Line Xi Gao 1, Yiing Chen 1,, and David M. Pennock 2 1 Harvard University, {xagao,yiing}@eecs.harvard.edu 2 Yahoo! Research, [email protected] Abstract. We study the probem of designing
Wide-Area Traffic Management for. Cloud Services
Wide-Area Traffic Management for Coud Services Joe Wenjie Jiang A Dissertation Presented to the Facuty of Princeton University in Candidacy for the Degree of Doctor of Phiosophy Recommended for Acceptance
European Journal of Operational Research
European Journa of Operationa Research 198 (2009) 435 446 Contents ists avaiabe at ScienceDirect European Journa of Operationa Research journa homepage: www.esevier.com/ocate/ejor Production, Manufacturing
A Description of the California Partnership for Long-Term Care Prepared by the California Department of Health Care Services
2012 Before You Buy A Description of the Caifornia Partnership for Long-Term Care Prepared by the Caifornia Department of Heath Care Services Page 1 of 13 Ony ong-term care insurance poicies bearing any
The growth of online Internet services during the past decade has increased the
IEEE DS Onine, Voume 2, Number 3 March 2001 Strategies for CORBA Middeware-Based Load Baancing Ossama Othman, Caros O'Ryan, and Dougas C. Schmidt University of Caifornia, Irvine The growth of onine Internet
Introduction the pressure for efficiency the Estates opportunity
Heathy Savings? A study of the proportion of NHS Trusts with an in-house Buidings Repair and Maintenance workforce, and a discussion of eary experiences of Suppies efficiency initiatives Management Summary
Minimizing the Total Weighted Completion Time of Coflows in Datacenter Networks
Minimizing the Tota Weighted Competion Time of Cofows in Datacenter Networks Zhen Qiu Ciff Stein and Yuan Zhong ABSTRACT Communications in datacenter jobs (such as the shuffe operations in MapReduce appications
Technical Support Guide for online instrumental lessons
Technica Support Guide for onine instrumenta essons This is a technica guide for Music Education Hubs, Schoos and other organisations participating in onine music essons. The guidance is based on the technica
Design and Analysis of a Hidden Peer-to-peer Backup Market
Design and Anaysis of a Hidden Peer-to-peer Backup Market Sven Seuken, Denis Chares, Max Chickering, Mary Czerwinski Kama Jain, David C. Parkes, Sidd Puri, and Desney Tan December, 2015 Abstract We present
Business schools are the academic setting where. The current crisis has highlighted the need to redefine the role of senior managers in organizations.
c r o s os r oi a d s REDISCOVERING THE ROLE OF BUSINESS SCHOOLS The current crisis has highighted the need to redefine the roe of senior managers in organizations. JORDI CANALS Professor and Dean, IESE
Lexmark ESF Applications Guide
Lexmark ESF Appications Guide Hep your customers bring out the fu potentia of their Lexmark soutions-enabed singe-function and mutifunction printers Lexmark Appications have been designed to hep businesses
SAT Math Must-Know Facts & Formulas
SAT Mat Must-Know Facts & Formuas Numbers, Sequences, Factors Integers:..., -3, -2, -1, 0, 1, 2, 3,... Rationas: fractions, tat is, anyting expressabe as a ratio of integers Reas: integers pus rationas
Avaya Remote Feature Activation (RFA) User Guide
Avaya Remote Feature Activation (RFA) User Guide 03-300149 Issue 5.0 September 2007 2007 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document
The definition of insanity is doing the same thing over and over again and expecting different results
insurance services Sma Business Insurance a market opportunity being missed Einstein may not have known much about insurance, but if you appy his definition to the way existing brands are deveoping their
Traffic classification-based spam filter
Traffic cassification-based spam fiter Ni Zhang 1,2, Yu Jiang 3, Binxing Fang 1, Xueqi Cheng 1, Li Guo 1 1 Software Division, Institute of Computing Technoogy, Chinese Academy of Sciences, 100080, Beijing,
NCH Software FlexiServer
NCH Software FexiServer This user guide has been created for use with FexiServer Version 1.xx NCH Software Technica Support If you have difficuties using FexiServer pease read the appicabe topic before
Introduction to XSL. Max Froumentin - W3C
Introduction to XSL Max Froumentin - W3C Introduction to XSL XML Documents Stying XML Documents XSL Exampe I: Hamet Exampe II: Mixed Writing Modes Exampe III: database Other Exampes How do they do that?
This paper considers an inventory system with an assembly structure. In addition to uncertain customer
MANAGEMENT SCIENCE Vo. 51, No. 8, August 2005, pp. 1250 1265 issn 0025-1909 eissn 1526-5501 05 5108 1250 informs doi 10.1287/mnsc.1050.0394 2005 INFORMS Inventory Management for an Assemby System wh Product
IMPLEMENTING THE RATE STRUCTURE: TIERING IN THE FEE-FOR-SERVICE SYSTEM
The New Jersey Department of Human Services Division of Deveopmenta Disabiities 1 IMPLEMENTING THE RATE STRUCTURE: TIERING IN THE FEE-FOR-SERVICE SYSTEM Eizabeth M. Shea Assistant Commissioner Thomas S.
WINMAG Graphics Management System
SECTION 10: page 1 Section 10: by Honeywe WINMAG Graphics Management System Contents What is WINMAG? WINMAG Text and Graphics WINMAG Text Ony Scenarios Fire/Emergency Management of Fauts & Disabement Historic
NCH Software Warp Speed PC Tune-up Software
NCH Software Warp Speed PC Tune-up Software This user guide has been created for use with Warp Speed PC Tune-up Software Version 1.xx NCH Software Technica Support If you have difficuties using Warp Speed
Business Banking. A guide for franchises
Business Banking A guide for franchises Hep with your franchise business, right on your doorstep A true understanding of the needs of your business: that s what makes RBS the right choice for financia
An Integrated Data Management Framework of Wireless Sensor Network
An Integrated Data Management Framework of Wireess Sensor Network for Agricutura Appications 1,2 Zhao Liang, 2 He Liyuan, 1 Zheng Fang, 1 Jin Xing 1 Coege of Science, Huazhong Agricutura University, Wuhan
Cooperative Content Distribution and Traffic Engineering in an ISP Network
Cooperative Content Distribution and Traffic Engineering in an ISP Network Wenjie Jiang, Rui Zhang-Shen, Jennifer Rexford, Mung Chiang Department of Computer Science, and Department of Eectrica Engineering
arxiv:1506.05851v1 [cs.ai] 18 Jun 2015
Smart Pacing for Effective Onine Ad Campaign Optimization Jian Xu, Kuang-chih Lee, Wentong Li, Hang Qi, and Quan Lu Yahoo Inc. 7 First Avenue, Sunnyvae, Caifornia 9489 {xuian,kcee,wentong,hangqi,qu}@yahoo-inc.com
Vendor Performance Measurement Using Fuzzy Logic Controller
The Journa of Mathematics and Computer Science Avaiabe onine at http://www.tjmcs.com The Journa of Mathematics and Computer Science Vo.2 No.2 (2011) 311-318 Performance Measurement Using Fuzzy Logic Controer
Subject: Corns of En gineers and Bureau of Reclamation: Information on Potential Budgetarv Reductions for Fiscal Year 1998
GAO United States Genera Accounting Office Washington, D.C. 20548 Resources, Community, and Economic Deveopment Division B-276660 Apri 25, 1997 The Honorabe Pete V. Domenici Chairman The Honorabe Harry
Maintenance activities planning and grouping for complex structure systems
Maintenance activities panning and grouping for compex structure systems Hai Canh u, Phuc Do an, Anne Barros, Christophe Berenguer To cite this version: Hai Canh u, Phuc Do an, Anne Barros, Christophe
TCP/IP Gateways and Firewalls
Gateways and Firewas 1 Gateways and Firewas Prof. Jean-Yves Le Boudec Prof. Andrzej Duda ICA, EPFL CH-1015 Ecubens http://cawww.epf.ch Gateways and Firewas Firewas 2 o architecture separates hosts and
CLOUD service providers manage an enterprise-class
IEEE TRANSACTIONS ON XXXXXX, VOL X, NO X, XXXX 201X 1 Oruta: Privacy-Preserving Pubic Auditing for Shared Data in the Coud Boyang Wang, Baochun Li, Member, IEEE, and Hui Li, Member, IEEE Abstract With
New Features in Cisco IOS 12.4
Page 1 of 5 New Features in Cisco IOS 12.4 Peter J. Wecher Introduction I'm writing this in mid-august. Things have been hot (business, weather). That means its time for my more-or-ess annua artice about
The Use of Cooling-Factor Curves for Coordinating Fuses and Reclosers
he Use of ooing-factor urves for oordinating Fuses and Recosers arey J. ook Senior Member, IEEE S& Eectric ompany hicago, Iinois bstract his paper describes how to precisey coordinate distribution feeder
Fast b-matching via Sufficient Selection Belief Propagation
Fast b-matching via Sufficient Seection Beief Propagation Bert Huang Computer Science Department Coumbia University New York, NY 127 [email protected] Tony Jebara Computer Science Department Coumbia
Order-to-Cash Processes
TMI170 ING info pat 2:Info pat.qxt 01/12/2008 09:25 Page 1 Section Two: Order-to-Cash Processes Gregory Cronie, Head Saes, Payments and Cash Management, ING O rder-to-cash and purchase-topay processes
TOPOLOGICAL DESIGN OF MULTIPLE VPNS OVER MPLS NETWORK Anotai Srikitja David Tipper
TOPOLOGICAL DESIGN OF MULTIPLE VPNS OVER MPLS NETWORK Anotai Sriitja David Tier Det. of Information Science and Teecommunications University of Pittsburgh N. Beefied Avenue, Pittsburgh, PA 60 ABSTRACT
Chapter 2 Traditional Software Development
Chapter 2 Traditiona Software Deveopment 2.1 History of Project Management Large projects from the past must aready have had some sort of project management, such the Pyramid of Giza or Pyramid of Cheops,
