Iterative Water-filling for Load-balancing in Wireless LAN or Microcellular Networks

Size: px
Start display at page:

Download "Iterative Water-filling for Load-balancing in Wireless LAN or Microcellular Networks"

Transcription

1 terative Water-fiing for Load-baancing in Wireess LAN or Microceuar Networks Jeremy K. Chen Theodore S. Rappaport Gustavo de Veciana Wireess Networking and Communications Group (WNCG), be University of Texas at Austin Abstract-This paper presents an efficient iterative oadbaancing agorithm for time and bandwidth aocation among access point4i (APs) and users subject to heterogeneous fairne4is and appication requirements. The agorithm can be car'ied out either at a centra network switch with site-specific propagation predictions, or in a decentraized manner. The agorithm converges to maximum network resource utiization from any sta'ting point, and usuay converges in 3 to 9 iterations in various network conditions incuding users joining, eaving, and moving within a network and various network sizes. Such a fast convergence aows rea-time impementations of our agorithm. Simuation resuts show that our agorithm bas merits over other schemes especiay when users exhibit custered patterns: Our agorithm, when assuming mutipe radios at each use1, achieves 48% gain of median throughput as compared with the max-min fair oad-baancing scheme (aso with the muti-radio assumption) whie osing 14% of fairness index; we aso achieve 26% gain of median throughput and 52% gain of fairness index ove.r the Strongest-Signa-First scheme (which assumes each user has ony a singe radio). When ony a singe radio is used, our agorithm is simiar to the max-min fairness scheme, and is sti better than SSF with 44% gain of 25-percentie throughput and 37% gain of fairness index.. NTRODUCTON Peope consider increasing the capacity of WLAN or microceuar networks by increasing AP density and assigning proper non-overapping frequency channes to APs. As the number of APs to which a user can connect increases, an agorithm that efficienty associates users to APs becomes critica for bandwidth and quaity of service (QoS) management. However, the defaut Strongest-Signa-First (SSP) approach used in products, in which each user chooses an AP with the strongest signa, resuts in uneveny distributed oads among APs and poor performance [1]. n order to better baance oads, vendors such as Cisco, Trapeze, Aruba, Meru, and Symbo have introduced centra switches to have networkayer contros (e.g. oad baancing and handoffs) over the AP's norma processing in physica ayers today. This paper presents a oad-baancing agorithm that can be carried out 'either in a decentraized way with some message exchange between APs and mobie users, or at a centra switch with site-specific predictions (such predictions can provide the centra switch with deta~ed RF parameters, the received signa-to-noise ratios (SNR), and estimate the achievabe capacity for each wireess ink; see [2]-[4] and references therein). Severa heuristic oad-baancing schemes have been presented. Baachandran et a [1] observed that APs with oad- 1 This work is supported by NSF Grant AC Fig. 1. A simpe network with 2 APs and 3 users. Different thicknesses of dashed ines signify different avaiabe ink capacity Ra 8, APs 1 and 2 use disjoint channes. T a,s denotes the time fraction aocat~d to user s over the RF channe of AP a. baancing functiomiities periodicay send beacons with current oad, captured by the number of users, bit error rates, and signa strengths. However, severa measurement studies have shown that the number of users is not a good metric to determine the oad [4], [5]. Baachandran et a proposes a better oad-baancing scheme where each arriving user expicity asks for a minimum and a maximum bound on bandwidth/throughput, and a centraized admission contro is performed to associate the arriving user to an AP that is within the user's radio range and has the most avaiabe capacity [1]. The work in [1] improves the degree of oad baancing by over 30% and user bandwidth aocation up to 52% in comparison with schemes with itte oad baancing. The work in [ 6] presents a decentraized oad baancing agorithm that can be appied to EEE a/b/g without modifying the standards whie being transparent to end users. t was shown by exampe that the throughput of a station increases from 1.5 to 2 Mbps, and packet deays can be reduced from 450 to 8 ms. Whie the work in [1], [6] outperforms schemes with itte or no oad baancing, they are not shown to be optima. To the best of our knowedge, the ony work that achieves some form of optimaity in oad baancing is [7], which achieves max-min fair bandwidth aocation. This paper considers a network with mutipe APs and users, as depicted in Fig. 1 and tries to answer a fundamenta question: which AP(s) shoud be connected with a particuar user, and how much time shoud the specific AP(s) aocate to this user in order to achieve optima network utiization subject to heterogeneous fairness and appication requirements. Section describes the system mode and notation in detai. Section presents the formuation and an iterative agorithm for the optima aocation of channe usage time. Simuation resuts are presented in Section V /06/$20.00 (c) 2006 EEE 117 Authorized icensed use imited to: University of Texas at Austin. Downoaded on December 4, 2009 at 13:11 from EEE Xpore. Restrictions appy.

2 .J. SYSTEM MODEL AND NOTATON We assume a muti-radio capabiity that aows mutipe channes to be received and decoded in - parae by each user (this mode has been proposed in [7]). Jt is suggested in this paper that the mutipe-radio assumption simpifies the computation to be efficient (the probem formuation is convex). Our approach can aso be used for muti-radio APs. Our agorithm aows up to an unimited number of radios on a user; however, 2 to 4 radios suffice in practice, since a user in an actua WLAN or microceuar network is usuay surrounded by at most 4 APs. We assume that users exhibit a quasi-static mobiity pattern (a mode that has been adopted in [7]) where users can move from pace to pace, but they tend to stay in the same physica paces for ong periods of time [5]. This mode aows us to consider ong-term averaged ink capacities over a time scae of about 2 seconds (denoted as TAvo), which is adequate for resource re-aocation and may- not be a noticeabe time interva for new users who are waiting to be associated with APs. The proposed oad-baancing agorithm is executed based on the predicted average capacities during every TAvo interva. Link capacities may change in successive TAvo intervas due to interference or changes in user appications or trans~ission states. The capacity Ra,s (e.g. throughput) between an AP a, and a user, s, is determined by the peak throughput for a singe ( unshared) user, and aso determined from predicted, measured, or optimized throughput estimates based on site specific information. For the case where mutipe users share a singe AP over an RF channe, the throughput between the AP, a, and a user, s, is a fraction (the time fraction of channe usage) of the ink capacity, that is, Throughputa,s = Ta,sRa,s, where Ta,s is the channe usage time between AP a and user s. During a TAvo interva, even though users may join/eave the network, or RF noise sources may emit interfering signas, the effects of these transient events on ink throughputs are quantized and samped every TAvo (e.g. bock processing is used). n the beginning of every TAvo interva, our iterative oad baancing agorithm re-adjusts the time/bandwidth resource aocation over a users and APs. The agorithm converges to optimum in merey 3 to 9 iterations regardess of network sizes, athough the computation time of each iteration grows ineary with the number of users mutipied by the number of APs controed by the switch. On a 20Hz nte Pentium computer with Windows XP, each iteration in Matab takes 30 miiseconds for a network with 36 APs and 300 users. Code impemented in assemby or C anguage woud be much faster and is very suitabe for reatime impementations of our agorithms on hardware/firmware, as contempated in [2], [3]. With the above mentioned assumptions, the rea throughput that a user experiences mainy depends on the channe usage time aocated from the APs to this user. For instance, in Fig. 1, suppose AP 1 and AP 2 aocate T1,1 = 20% and T2,1 = 40% of their time (over disjoint channes 1 and 2, respectivey) to user 1, respectivey. The tota bandwidth that user 1 obtains is b 1 = ( 0 0 R 1,1 + 1 ~ 0 R2,1; the bandwidths of users 2 and 3 can be computed in a simiar way. we consider an infinite backog of packets (fu and ready queues on every channe) for every user. Hence a user's throughput is the same as the bandwidth aocated to her. We maximize the sum utiity of throughput, which means maximizing Ei= Ui(bi) over the channe usage time in this exampe. f utiity functions are propery chosen, users wi be aocated different notions of fair aocation when the network reaches maximum sum utiity [8]. We made the assumption that a APs are under the contro of a network switch. However, some rogue APs or RF noise sources may emit interfering signas in the coverage area of the controed APs. n this case, some controed APs or overay sensors can detect signas from rogue APs. With detected signa parameters and site specific knowedge, position ocation techniques can ocate the rogue APs [2], [3]. Then, AP channe assignments are changed so that the APs near the rogue APs operate at orthogona RF channes in order to eiminate most interference from rogue APs. Then, the switch wi predict SNR and ink capacities between users and controed APs using site specific modes for the rogue ocations and transmit properties, and appy our agorithm to find the optima resource aocation accordingy. This paper assumes the frequency band of each AP has been propery assigned [2], [3], and focuses on finding the optima bandwidth/time aocation in a fuy-controed network. With an assigned aocated frequency channe, each AP serves its user by time sharing. The fraction of time resource dedicated for payoad transmissions between users and an AP, a, over an RF channe is denoted as T!rac (0 ::::; T!rac ::::; 1) (e.g., it ranges from 59% to 88% in 802.a). The subscript a in TJrac is used, since the payoad time fractions may differ from AP to AP. We suppose that each user shares her utiity function to a the APs that transmit signas strong enough to reach her. Then, each AP aocates its time resource (over its assigned RF channe) to users based on the information of the utiity functions of a the users within its coverage area, based on site specific knowedge [2]-[4]. n this paper, utiity functions are assumed to be concave, continuousy differentiabe, and stricty increasing [9] for simpicity of anaysis. Let n and m denote the numbers of APs and of users, respectivey. We use a or s as index when referring to a specific AP or user, and use j or i as dummy indices of APs or users when performing a summation. User s is said to be within the coverage of AP a if Ra,s > 0; otherwise, Ra 8 = 0. Each entry in the rate matrix can be predicted from a ste-specific prediction engine [2]-[4]. Within a unit time period, suppose AP a aocates a time fraction T a,s (over the assigned RF channe of AP a) to user s (0::::; T a,s ::::; 1). The actua bandwidth that user s gets from AP a is T a,sra,s. MAXMUM SUM UTLTY WTH TME ALLOCATON The optima AP-user association can be formuated as the sum utiity maximization probem in (1) over time resources 118 Authorized icensed use imited to: University oftexas at Austin. Downoaded on December 4, 2009 at 13:11 from EEE Xpore. Restrictions appy.

3 from APs on different RF channes to users. max """'U (""'T R ) L..,; ~ L..,; :;,~ :;,t subject to LTa,i ~ T!rac, Va, overt a,s ;::: 0, Va, s. (1) t is hard to find a cosed-form expression of the optima channe usage time aocation for (1). Nevertheess, if the optimization is over the time resources of ony a singe AP (over one channe), assuming the other APs' time aocations are fixed, cosed-form expressions for each AP's optima time aocation have cosed-form expressions, shown in (11) which are soutions to formuation (3). Theorem 3.1 discussed beow shows that the origina mutipe AP probem in (1) reaches the optimum if and ony if the time aocation from every AP simutaneousy has the cosed-form expressions as in (11). Hence, the optimization of the mutipe-ap probem can be done by successivey optimi~ing each AP's time resources, as presented in Agorithm 1 as an efficient iterative agorithm. Our derivation and proofs extend [10] to a wide cass of utiity functions (beyond ogarithmic) for different degrees of fairness and appication needs. The soe constraint in (1) means that the tota channe usage time used at each AP is upper bounded. The objective is to maximize the network utiity Li Ui(Lj Tj,iRj,i). Mo and Warand have proposed a cass of utiity functions that capture different degrees of fairness and mode appications with heterogeneous needs parameterized by qi [8]: The parameter Qi has an index i because each user i may have a different appication/fairness requirement. This famiy of utiity functions is concave, continuousy differentiabe, and stricty increasing [8]. The sum of concave functions is sti a concave function; hence, probem (1) is convex since a concave function is to be maximized over a convex constraint set [9]. The work in [8] shows that if qi ---+ oo, the formuation in (1) becomes a specia case that achieves max-min fairness, as studied in [7]. Within every TAvc, R remains constant after bock processing, and the optima sum utiity and T wi be determined accordingy. Suppose the sum utiity optimization is performed over the channe usage time resources of ony AP a, T a, = [T a,, T a,2,..., T a,m], assuming that the time aocations from the other APs to users are fixed. Then the formuation in (1) is reduced to max L Ui(Ta,iRa,i + Ca,i) i subject to LT a,i :::; T!rac' over T a,s ~ 0 v s, (3) where ca,i = L Tj,iRj,i are fixed. j:jia Denote by Aa the Lagrange mutipier for the constraint in (3). Then, the Lagrangian [9] is given by L(Ta,e, Aa) = L Ui(Ta,iRa,i+Ca,i)-Aa(LTa,i-T!rac). (4) Since utiity functions Us ( ) are increasing, it is natura to exhaust the time resource for maximizing sum utiity [9]; therefore, at the maximum of (3), we have Ei Ta,i = T~rac. Then, the sufficient and necessary optimaity conditions (KKT conditions) [9] for (3) can be written as: Ra.,sU8(Ta,sRa,.' +Ca.,.'!)= Aa if Ta, 8 > 0, Vs (5) < Aa if Ta, 8 = 0, Vs (6) ~T. = Tfrac L..J a,z a (7) Ta,8 ~ 0, Vs; Aa > 0. (8) t is obvious that no time is aocated to inks with zero capacity (i.e. T a,s = 0 if Ra,s = 0). Therefore, we focus on deriving the optima T a,s for Ra,s > 0. For genera utiity functions, the optima time fraction can be derived from (5): T = {-1-u'-(~) _ ca,s }+ a,s Ra s 8 Ra s Ra 8 ' Whie cosed~form soutions of T a,s do not exist for genera utiity functions, they can be obtained for the famiy of utiity functions in (2), for which (5) becomes ol 8Ta 1 8 Equating (10) with zero gives the optima time aocation: (-_.!._) (..L-1) Ca 8 T -,\ }+ qs R qs 1 a 1 8- { a a R a 1 8 (9) (10) (11) n (9) and (11), the notation {x}+ is needed because Ta 18 is nonnegative: { x} + = x if x ~ 0 and { x} + = 0 otherwise. By substituting (11) or (9) into 'Ei T a,i = T!rac in (7), Aa for each AP a can be numericay soved [9], [10]. n each iteration of our agorithm, finding the time resources of each AP requires soving a singe-variabe (.Aa) poynomia equation with m terms; hence, the time compexity of each iteration is 0( nm). f the parameter q 8 = 1, the expression of T a,s in (11) is the water-fiing expression, where the constant.a; 1 is known as the water-fiing eve [10]. Theorem 3.1: {Ta, 8, Va, s} is an optima soution to (1) if and ony if {Ta,, Ta,2,..., Ta,m} is the soution in (11) for AP a with the time aocation from the other APs {Tj, 8 : Vj =f a, V s} fixed, for a a = 1, 2,..., n. (The proof is omitted as it is a natura extension of Theorem 1 in [10].) As described in Theorem 3.1, the time aocations from each AP to users can be soved by (11), assuming time aocations from the other APs are fixed. Hence, the optima time aocation for the mutipe-ap optimization probem (1) can be found by an iterative agorithm (see Agorithm 1). Theorem 3. 2: Agorithm 1 resuts in an optima sum utiity and causes {Ta, 8, Va, s} to converge to an optima time 119 Authorized icensed use imited to: University of Texas at Austin. Downoaded on December 4, 2009 at13:11 from EEE Xpore. Restrictions appy.

4 Agorithm 1 An iterative agorithm to sove (1) Given a rate matrix {Ra,s, 'Va, s }. Start with a vaid time aocation {Ta, 8, 'Va, s}. repeat for each AP a = 1, 2,..., n do Compute {ca,s, \s} by (3). Compute {Ta., 8, \s} by (11) or (9). end for unti the sum utiity converges Output {Ta,s, 'Va, s}, aocation for Formuation (1). (The proof can be extended from the proof of Theorem 2 in [10]. Note that the optimum time aocation {Ta,s, 'Va, s} may not be unique.) Agorithm 1 can be carried out in a decentraized manner: each AP a computes the optima time aocation {T a,s, V s} ony for those users who are in the coverage of this AP. For the computation of each user's Ta 8, a constant ca 8 needs to be known, which in turn requir~s the knowedg~ of the bandwidth that this user s receives from APs other than AP a. n a reaistic WLAN setup, a user is under the coverage of no more than 4 APs; hence, the computation of ca,s at each user is efficient. APs sequentiay perform such decentraized computing. When the sum utiity converges, a contro message may be sent to APs to stop the decentraized computing. V. SMULATON RESULTS n this section, we compare the throughput and fairness performance of our maximum utiity (denoted as MaxUti) scheme with the max-min fairness scheme in [7], denoted as Ma.xMin, and the Strongest-Signa-First scheme in current impementations. We consider a simpified scenario of free-space propagation mode where no obstaces exist in the vicinity of APs. t is cear that our agorithm can utiize site specific information, which wi be considered in future work. We consider different percentages (between 1% and 5%) of users joining, eaving, or moving within the network; hence, the ink capacities change over time. We sampe R for every TAva, and within this time interva, R is fixed. Two kinds of user distributions, namey unifonn and custer (or hotspot), are considered. First, users are uniformy distributed in a 600 meters by 600 meters square that encompasses the 36 APs. Second, we consider that a hotspot at the center attracts more peope: users are distributed in a circe-shaped area centered at the midde of the APs with a radius of 250 meters. Users are randomy ocated on this circe based on their uniformy generated poar coordinates (the distance from the center and the poar ange are uniformy distributed between (0, 250) and (0, 21r), respectivey). From the viewpoint of the Cartesian coordinate, the user density is higher near the center than near the circumference of the circe. Each point on the figures is an average over 100 independent runs. n the SSF case, each user (whose transceiver can hande ony a singe channe) associates with the strongest AP, and then each AP eveny distributes its time resources to the associated users. Simuations show 120 that the number of iterations (mosty between 3 and 9) does not grow with the number of users. Our agorithm converges quicky even for arge networks. Figs. 2 and 3 show the medians and the 25-percenties of user throughputs, respectivey. Tabe presents fairness indices (see [11] for this metric) for cases with 400 users; scenarios with different number of APs and users are omitted, since their fairness index vaues are simiar to those in Tabe. Both MaxUti and MaxMin assume that each user has mutipe radios. For fair comparisons with SSF, we aso compute singeradio resuts by propery rounding muti-ap time aocation; MaxMin-R denotes the resuts produced by the rounding method in [7]. The MaxUti-R resuts were obtained by a different rounding method: we first compute norma mutiperadio time aocation; then, if any user indeed uses mutipe APs, this user simpy chooses the AP that suppies her with the most bandwidth. Finay, if any AP has any time resource remained not aocated, this AP aocates the remaining time proportionay to its associated users. For exampe, if the rate matrix R = [ ~ ~ ~! ] and a users' utiity parameters, q, are 1, then the optima time fraction (aowmg. mutt. ra d' tos ) 1s. T = [ Each user chooses ony one singe AP; then the time rna-. b T [ trtx ecomes = Then, since the first AP has time fraction (16.6%) remained, the remaining time is proportionay distributed to users 1 and 2; finay the time matrix for the singe-radio case is T = [ A trade-off between throughput and fairness can be seen in muti-radio cases MaxUti and MaxMin. Our MaxUti has very good performance in custer case: in Fig. 2(b), MaxUti exhibits about 48% higher median throughput over MaxMin whie sacrificing ony 14% of fairness as in Tabe. t is because MaxMin tends to achieve absoute fairness (its fairness index is amost 100% as in Tabe ) by sacrificing throughput (giving more time resource to users with poor ink capacities). Our MaxUti trades throughput with fairness; even in uniform case in Fig. 2(a), MaxUti yieds 9% higher median throughput than MaxMin whie osing 2% of fairness as in Tabe. Our agorithm, with mutipe radios at each user, outperforms SSF by 26% and 52% in terms of median throughput and fairness index, respectivey, as in Fig. 2(b) and Tabe. Surprisingy, the singe-radio scheme MaxUti-R yieds worse median throughput than SSF, mainy because our rounding method (as presented in the numerica exampe above) makes users choose stronger APs, thereby causing unbaanced oads on APs. The rounding method in [7] may be modified to be imposed upon MaxUti for better rounding performance; this is a subject for future research. Nevertheess, MaxUti R yieds simiar 25-percentie user throughputs as MaxMin-R, and is 44% and 17% higher than SSF in custer and uniform cases, respectivey (as seen in Fig. 3). Moreover, Tabe indicates that SSF has poor fairness indices as compared Authorized icensed use imited to: University of Texas at Austin. Downoaded on December 4, 2009 at 13:11 from EEE Xpore. Restrictions appy.

5 UnHorm Uniform emaxut -$-MaxUtii-R BMaxMin ~MaxMin-R -*SSF (a) Uniform user distribution Custer (/) ~ r '!! BMaxUti ::2! $-MaxUtii-R - "5!! BMaxMin _@ ~MaxMin-Rg>! -*"SSF ~ r : "" ii ~ : } :::3 : : ---~ &1.! 'g 0, ~ ::2! 0.2!: (b) Custered user distribution (/) _g (a) Uniform user distribution Custer :2 s! : 8MaxUti 0 - T T -$-MaxUtii-R. ;!! HMaxMin e ~MaxMin-R i : J ;:~~~ ~ ; , ~! 8? O (\J (b) Custered user distribution Fig. 2. The median of user throughput. Fig. 3. The 25-percentie of user throughput. TABLE FARNESS NDEX (CF. [11]) OF USBR THROUGHPUT ALLOCATON FOR TWO KNDS OF USER DSTRBUTONS (CLUSTER AND UNFORM) N A NETWORK WTH 36 APS AND 400 USERS. (UNT:%) with a other schemes (37% ower than MaxUti-R in custer case, for exampe). n summary, our method, MaxUti-R, outperforms SSF in terms of 25-percentie throughput and fairness index with sma sacr~fice of median throughput. V. CONCLUSONS We find anaytica expressions for the optima channe usage time aocation and present a fast iterative agorithm to achieve the optimum. Simuation resuts show that when users are custered, our utiity maximization formuation yieds substantia throughput gain over both the max-min scheme in [7] and the SSF scheme, which is currenty being used in WLAN products. When users are uniformy distributed in space, our max utiity scheme is simiar as the scheme in [7], and achieves better fairness than SSF. Regardess of the number of APs or users in a network, the convergence of the sum utiity is fast in various network conditions such as users joining, eaving, or moving within the network. Therefore, the iterative agorithm has good scaabiity and can be impemented in rea time. REFERENCES [1] A. Baachandran, P. Bah, and G. M. Voeker, "Hot-spot congestion reief in pubic-area wireess networks," in Proc. Fourth EEE Workshop on Mobie Computing Systems and Appications, June 2002, pp [2] T. S. Rappaport and R. R. Skidmore, "System and method for predicting network performance and position ocation using mutipe tabe ookups,'' U.S. Patent App., no , Dec [3] --, "System and method for automated pacement or configuration of equipment for obtaining desired network performance objectives and for security, RF tags, and bandwidth provisioning," U.S. Patent App., no , Nov [4] C. Na, J. K. Chen, and T. S. Rappaport, "Measured traffic statistics and throughput of EEE 802.b pubic WLAN hotspots with three different appications," EEE Trans. Wireess Commun., to appear. [5] D. Kotz and K. Essien, "Anaysis of a campus-wide wireess network," in Proc. the Eighth Annua nt. Conf. on Mobie Computing and Networking (MobiCom). ACM Press, September [6] H. Veayos, V. Aeo, and G. Karsson, ''Load baancing in overapping wireess LAN ces," in Proc. EEE nternationa Conference on Communications, vo. 7, June 2004, pp [7] Y. Bejerano, S.-J. Han, and L. E. Li, "Fairness and oad baancing in wireess LANs using association contro," in Proc. ACM MobiCom, Sept. 2004, pp [8] J. Mo and J. Warand, "Fair end-to-end window-based congestion contro," EEEACM Trans. Networking, vo. 8, no. 5, pp , Oct [9] S. P. Boyd and L. Vandenberghe, Convex Optimization. Cambridge University Press, [10] W. Yu, W. Rhee, S. Boyd, and J. M. Cioffi, "terative water-fiing for Gaussian vector mutipe-access channes,'' EEE Trans. nfomj. Theory, vo. 50, no. 1, pp , Jan [11] R. Jain, D. Chiu, and W. Hawe, "A quantitative measure of fairness and discrimination for resource aocation in shared computer systems," DEC, Research Report TR-301, Authorized icensed use imited to: University of Texas at Austin. Downoaded on December at 13:11 from EEE Xpore. Restrictions appy.

Secure Network Coding with a Cost Criterion

Secure Network Coding with a Cost Criterion Secure Network Coding with a Cost Criterion Jianong Tan, Murie Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technoogy Cambridge, MA 0239, USA E-mai: {jianong, medard}@mit.edu

More information

Simultaneous Routing and Power Allocation in CDMA Wireless Data Networks

Simultaneous Routing and Power Allocation in CDMA Wireless Data Networks Simutaneous Routing and Power Aocation in CDMA Wireess Data Networks Mikae Johansson *,LinXiao and Stephen Boyd * Department of Signas, Sensors and Systems Roya Institute of Technoogy, SE 00 Stockhom,

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 1

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 1 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 1 Scaabe Muti-Cass Traffic Management in Data Center Backbone Networks Amitabha Ghosh, Sangtae Ha, Edward Crabbe, and Jennifer

More information

GREEN: An Active Queue Management Algorithm for a Self Managed Internet

GREEN: An Active Queue Management Algorithm for a Self Managed Internet : An Active Queue Management Agorithm for a Sef Managed Internet Bartek Wydrowski and Moshe Zukerman ARC Specia Research Centre for Utra-Broadband Information Networks, EEE Department, The University of

More information

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures Lecture 7 Dataink Ethernet, Home Peter Steenkiste Schoo of Computer Science Department of Eectrica and Computer Engineering Carnegie Meon University 15-441 Networking, Spring 2004 http://www.cs.cmu.edu/~prs/15-441

More information

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 1 of 7 [Figures are not incuded in this sampe chapter] Advanced CodFusion 4.0 Appication Deveopment - 3 - Server

More information

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing.

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing. Fast Robust Hashing Manue Urueña, David Larrabeiti and Pabo Serrano Universidad Caros III de Madrid E-89 Leganés (Madrid), Spain Emai: {muruenya,darra,pabo}@it.uc3m.es Abstract As statefu fow-aware services

More information

Australian Bureau of Statistics Management of Business Providers

Australian Bureau of Statistics Management of Business Providers Purpose Austraian Bureau of Statistics Management of Business Providers 1 The principa objective of the Austraian Bureau of Statistics (ABS) in respect of business providers is to impose the owest oad

More information

Pricing and Revenue Sharing Strategies for Internet Service Providers

Pricing and Revenue Sharing Strategies for Internet Service Providers Pricing and Revenue Sharing Strategies for Internet Service Providers Linhai He and Jean Warand Department of Eectrica Engineering and Computer Sciences University of Caifornia at Berkeey {inhai,wr}@eecs.berkeey.edu

More information

COMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION

COMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION COMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION Františe Mojžíš Department of Computing and Contro Engineering, ICT Prague, Technicá, 8 Prague [email protected] Abstract This

More information

Enhanced continuous, real-time detection, alarming and analysis of partial discharge events

Enhanced continuous, real-time detection, alarming and analysis of partial discharge events DMS PDMG-RH DMS PDMG-RH Partia discharge monitor for GIS Partia discharge monitor for GIS Enhanced continuous, rea-time detection, aarming and anaysis of partia discharge events Unrivaed PDM feature set

More information

Load Balancing in Distributed Web Server Systems with Partial Document Replication *

Load Balancing in Distributed Web Server Systems with Partial Document Replication * Load Baancing in Distributed Web Server Systems with Partia Document Repication * Ling Zhuo Cho-Li Wang Francis C. M. Lau Department of Computer Science and Information Systems The University of Hong Kong

More information

Face Hallucination and Recognition

Face Hallucination and Recognition Face Haucination and Recognition Xiaogang Wang and Xiaoou Tang Department of Information Engineering, The Chinese University of Hong Kong {xgwang1, xtang}@ie.cuhk.edu.hk http://mmab.ie.cuhk.edu.hk Abstract.

More information

Multi-Robot Task Scheduling

Multi-Robot Task Scheduling Proc of IEEE Internationa Conference on Robotics and Automation, Karsruhe, Germany, 013 Muti-Robot Tas Scheduing Yu Zhang and Lynne E Parer Abstract The scheduing probem has been studied extensivey in

More information

eg Enterprise vs. a Big 4 Monitoring Soution: Comparing Tota Cost of Ownership Restricted Rights Legend The information contained in this document is confidentia and subject to change without notice. No

More information

Teamwork. Abstract. 2.1 Overview

Teamwork. Abstract. 2.1 Overview 2 Teamwork Abstract This chapter presents one of the basic eements of software projects teamwork. It addresses how to buid teams in a way that promotes team members accountabiity and responsibiity, and

More information

Hybrid Interface Solutions for next Generation Wireless Access Infrastructure

Hybrid Interface Solutions for next Generation Wireless Access Infrastructure tec. Connectivity & Networks Voker Sorhage Hybrid Interface Soutions for next Generation Wireess Access Infrastructure Broadband wireess communication wi revoutionize every aspect of peope s ives by enabing

More information

Chapter 3: JavaScript in Action Page 1 of 10. How to practice reading and writing JavaScript on a Web page

Chapter 3: JavaScript in Action Page 1 of 10. How to practice reading and writing JavaScript on a Web page Chapter 3: JavaScript in Action Page 1 of 10 Chapter 3: JavaScript in Action In this chapter, you get your first opportunity to write JavaScript! This chapter introduces you to JavaScript propery. In addition,

More information

Virtual trunk simulation

Virtual trunk simulation Virtua trunk simuation Samui Aato * Laboratory of Teecommunications Technoogy Hesinki University of Technoogy Sivia Giordano Laboratoire de Reseaux de Communication Ecoe Poytechnique Federae de Lausanne

More information

Betting Strategies, Market Selection, and the Wisdom of Crowds

Betting Strategies, Market Selection, and the Wisdom of Crowds Betting Strategies, Market Seection, and the Wisdom of Crowds Wiemien Kets Northwestern University [email protected] David M. Pennock Microsoft Research New York City [email protected]

More information

3.3 SOFTWARE RISK MANAGEMENT (SRM)

3.3 SOFTWARE RISK MANAGEMENT (SRM) 93 3.3 SOFTWARE RISK MANAGEMENT (SRM) Fig. 3.2 SRM is a process buit in five steps. The steps are: Identify Anayse Pan Track Resove The process is continuous in nature and handed dynamicay throughout ifecyce

More information

Chapter 3: e-business Integration Patterns

Chapter 3: e-business Integration Patterns Chapter 3: e-business Integration Patterns Page 1 of 9 Chapter 3: e-business Integration Patterns "Consistency is the ast refuge of the unimaginative." Oscar Wide In This Chapter What Are Integration Patterns?

More information

Application-Aware Data Collection in Wireless Sensor Networks

Application-Aware Data Collection in Wireless Sensor Networks Appication-Aware Data Coection in Wireess Sensor Networks Xiaoin Fang *, Hong Gao *, Jianzhong Li *, and Yingshu Li +* * Schoo of Computer Science and Technoogy, Harbin Institute of Technoogy, Harbin,

More information

Scheduling in Multi-Channel Wireless Networks

Scheduling in Multi-Channel Wireless Networks Scheduing in Muti-Channe Wireess Networks Vartika Bhandari and Nitin H. Vaidya University of Iinois at Urbana-Champaign, USA [email protected], [email protected] Abstract. The avaiabiity of mutipe orthogona

More information

Fixed income managers: evolution or revolution

Fixed income managers: evolution or revolution Fixed income managers: evoution or revoution Traditiona approaches to managing fixed interest funds rey on benchmarks that may not represent optima risk and return outcomes. New techniques based on separate

More information

Bite-Size Steps to ITIL Success

Bite-Size Steps to ITIL Success 7 Bite-Size Steps to ITIL Success Pus making a Business Case for ITIL! Do you want to impement ITIL but don t know where to start? 7 Bite-Size Steps to ITIL Success can hep you to decide whether ITIL can

More information

TERM INSURANCE CALCULATION ILLUSTRATED. This is the U.S. Social Security Life Table, based on year 2007.

TERM INSURANCE CALCULATION ILLUSTRATED. This is the U.S. Social Security Life Table, based on year 2007. This is the U.S. Socia Security Life Tabe, based on year 2007. This is avaiabe at http://www.ssa.gov/oact/stats/tabe4c6.htm. The ife eperiences of maes and femaes are different, and we usuay do separate

More information

CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS

CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS Dehi Business Review X Vo. 4, No. 2, Juy - December 2003 CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS John N.. Var arvatsouakis atsouakis DURING the present time,

More information

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements A Suppier Evauation System for Automotive Industry According To Iso/Ts 16949 Requirements DILEK PINAR ÖZTOP 1, ASLI AKSOY 2,*, NURSEL ÖZTÜRK 2 1 HONDA TR Purchasing Department, 41480, Çayırova - Gebze,

More information

Art of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0

Art of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0 IEEE DISTRIBUTED SYSTEMS ONLINE 1541-4922 2005 Pubished by the IEEE Computer Society Vo. 6, No. 5; May 2005 Editor: Marcin Paprzycki, http://www.cs.okstate.edu/%7emarcin/ Book Reviews: Java Toos and Frameworks

More information

Market Design & Analysis for a P2P Backup System

Market Design & Analysis for a P2P Backup System Market Design & Anaysis for a P2P Backup System Sven Seuken Schoo of Engineering & Appied Sciences Harvard University, Cambridge, MA [email protected] Denis Chares, Max Chickering, Sidd Puri Microsoft

More information

A Distributed MAC Scheme Supporting Voice Services in Mobile Ad Hoc Networks 1

A Distributed MAC Scheme Supporting Voice Services in Mobile Ad Hoc Networks 1 A Distributed MAC Scheme Supporting Voice Services in Mobie Ad Hoc Networks 1 Hai Jiang, Ping Wang, H. Vincent Poor, and Weihua Zhuang Department of Eectrica & Computer Engineering, University of Aberta,

More information

Telephony Trainers with Discovery Software

Telephony Trainers with Discovery Software Teephony Trainers 58 Series Teephony Trainers with Discovery Software 58-001 Teephony Training System 58-002 Digita Switching System 58-003 Digita Teephony Training System 58-004 Digita Trunk Network System

More information

Comparison of Traditional and Open-Access Appointment Scheduling for Exponentially Distributed Service Time

Comparison of Traditional and Open-Access Appointment Scheduling for Exponentially Distributed Service Time Journa of Heathcare Engineering Vo. 6 No. 3 Page 34 376 34 Comparison of Traditiona and Open-Access Appointment Scheduing for Exponentiay Distributed Service Chongjun Yan, PhD; Jiafu Tang *, PhD; Bowen

More information

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation Zhihua Xia, Yi Zhu, Xingming Sun, and Jin Wang Jiangsu Engineering Center o Network Monitoring, Nanjing University o Inormation

More information

Load Balance vs Energy Efficiency in Traffic Engineering: A Game Theoretical Perspective

Load Balance vs Energy Efficiency in Traffic Engineering: A Game Theoretical Perspective Load Baance vs Energy Efficiency in Traffic Engineering: A Game Theoretica Perspective Yangming Zhao, Sheng Wang, Shizhong Xu and Xiong Wang Schoo of Communication and Information Engineering University

More information

Take me to your leader! Online Optimization of Distributed Storage Configurations

Take me to your leader! Online Optimization of Distributed Storage Configurations Take me to your eader! Onine Optimization of Distributed Storage Configurations Artyom Sharov Aexander Shraer Arif Merchant Murray Stokey [email protected], {shraex, aamerchant, mstokey}@googe.com

More information

WHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization

WHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization Best Practices: Pushing Exce Beyond Its Limits with Information Optimization WHITE Best Practices: Pushing Exce Beyond Its Limits with Information Optimization Executive Overview Microsoft Exce is the

More information

An Idiot s guide to Support vector machines (SVMs)

An Idiot s guide to Support vector machines (SVMs) An Idiot s guide to Support vector machines (SVMs) R. Berwick, Viage Idiot SVMs: A New Generation of Learning Agorithms Pre 1980: Amost a earning methods earned inear decision surfaces. Linear earning

More information

Early access to FAS payments for members in poor health

Early access to FAS payments for members in poor health Financia Assistance Scheme Eary access to FAS payments for members in poor heath Pension Protection Fund Protecting Peope s Futures The Financia Assistance Scheme is administered by the Pension Protection

More information

RFID Radio Frequency IDentification

RFID Radio Frequency IDentification RFID Radio Frequency IDentification By: Jeremy Yager RFID - Overview RFID, as the name suggests, uses RF devices to communicate identification information. This is achieved by using sma devices known as

More information

Finance 360 Problem Set #6 Solutions

Finance 360 Problem Set #6 Solutions Finance 360 Probem Set #6 Soutions 1) Suppose that you are the manager of an opera house. You have a constant margina cost of production equa to $50 (i.e. each additiona person in the theatre raises your

More information

Pay-on-delivery investing

Pay-on-delivery investing Pay-on-deivery investing EVOLVE INVESTment range 1 EVOLVE INVESTMENT RANGE EVOLVE INVESTMENT RANGE 2 Picture a word where you ony pay a company once they have deivered Imagine striking oi first, before

More information

AA Fixed Rate ISA Savings

AA Fixed Rate ISA Savings AA Fixed Rate ISA Savings For the road ahead The Financia Services Authority is the independent financia services reguator. It requires us to give you this important information to hep you to decide whether

More information

On Capacity Scaling in Arbitrary Wireless Networks

On Capacity Scaling in Arbitrary Wireless Networks On Capacity Scaing in Arbitrary Wireess Networks Urs Niesen, Piyush Gupta, and Devavrat Shah 1 Abstract arxiv:07112745v3 [csit] 3 Aug 2009 In recent work, Özgür, Lévêque, and Tse 2007) obtained a compete

More information

An FDD Wideband CDMA MAC Protocol for Wireless Multimedia Networks

An FDD Wideband CDMA MAC Protocol for Wireless Multimedia Networks An FDD ideband CDMA MAC Protoco for ireess Mutimedia Networks Xudong ang Broadband and ireess Networking (BN) Lab Schoo of Eectrica and Computer Engineering Georgia Institute of Technoogy Atanta, GA 3332

More information

Life Contingencies Study Note for CAS Exam S. Tom Struppeck

Life Contingencies Study Note for CAS Exam S. Tom Struppeck Life Contingencies Study Note for CAS Eam S Tom Struppeck (Revised 9/19/2015) Introduction Life contingencies is a term used to describe surviva modes for human ives and resuting cash fows that start or

More information

Precise assessment of partial discharge in underground MV/HV power cables and terminations

Precise assessment of partial discharge in underground MV/HV power cables and terminations QCM-C-PD-Survey Service Partia discharge monitoring for underground power cabes Precise assessment of partia discharge in underground MV/HV power cabes and terminations Highy accurate periodic PD survey

More information

500 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 3, MARCH 2013

500 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 3, MARCH 2013 500 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 3, NO. 3, MARCH 203 Cognitive Radio Network Duaity Agorithms for Utiity Maximization Liang Zheng Chee Wei Tan, Senior Member, IEEE Abstract We

More information

Design Considerations

Design Considerations Chapter 2: Basic Virtua Private Network Depoyment Page 1 of 12 Chapter 2: Basic Virtua Private Network Depoyment Before discussing the features of Windows 2000 tunneing technoogy, it is important to estabish

More information

Betting on the Real Line

Betting on the Real Line Betting on the Rea Line Xi Gao 1, Yiing Chen 1,, and David M. Pennock 2 1 Harvard University, {xagao,yiing}@eecs.harvard.edu 2 Yahoo! Research, [email protected] Abstract. We study the probem of designing

More information

Wide-Area Traffic Management for. Cloud Services

Wide-Area Traffic Management for. Cloud Services Wide-Area Traffic Management for Coud Services Joe Wenjie Jiang A Dissertation Presented to the Facuty of Princeton University in Candidacy for the Degree of Doctor of Phiosophy Recommended for Acceptance

More information

European Journal of Operational Research

European Journal of Operational Research European Journa of Operationa Research 198 (2009) 435 446 Contents ists avaiabe at ScienceDirect European Journa of Operationa Research journa homepage: www.esevier.com/ocate/ejor Production, Manufacturing

More information

A Description of the California Partnership for Long-Term Care Prepared by the California Department of Health Care Services

A Description of the California Partnership for Long-Term Care Prepared by the California Department of Health Care Services 2012 Before You Buy A Description of the Caifornia Partnership for Long-Term Care Prepared by the Caifornia Department of Heath Care Services Page 1 of 13 Ony ong-term care insurance poicies bearing any

More information

The growth of online Internet services during the past decade has increased the

The growth of online Internet services during the past decade has increased the IEEE DS Onine, Voume 2, Number 3 March 2001 Strategies for CORBA Middeware-Based Load Baancing Ossama Othman, Caros O'Ryan, and Dougas C. Schmidt University of Caifornia, Irvine The growth of onine Internet

More information

Introduction the pressure for efficiency the Estates opportunity

Introduction the pressure for efficiency the Estates opportunity Heathy Savings? A study of the proportion of NHS Trusts with an in-house Buidings Repair and Maintenance workforce, and a discussion of eary experiences of Suppies efficiency initiatives Management Summary

More information

Minimizing the Total Weighted Completion Time of Coflows in Datacenter Networks

Minimizing the Total Weighted Completion Time of Coflows in Datacenter Networks Minimizing the Tota Weighted Competion Time of Cofows in Datacenter Networks Zhen Qiu Ciff Stein and Yuan Zhong ABSTRACT Communications in datacenter jobs (such as the shuffe operations in MapReduce appications

More information

Technical Support Guide for online instrumental lessons

Technical Support Guide for online instrumental lessons Technica Support Guide for onine instrumenta essons This is a technica guide for Music Education Hubs, Schoos and other organisations participating in onine music essons. The guidance is based on the technica

More information

Design and Analysis of a Hidden Peer-to-peer Backup Market

Design and Analysis of a Hidden Peer-to-peer Backup Market Design and Anaysis of a Hidden Peer-to-peer Backup Market Sven Seuken, Denis Chares, Max Chickering, Mary Czerwinski Kama Jain, David C. Parkes, Sidd Puri, and Desney Tan December, 2015 Abstract We present

More information

Business schools are the academic setting where. The current crisis has highlighted the need to redefine the role of senior managers in organizations.

Business schools are the academic setting where. The current crisis has highlighted the need to redefine the role of senior managers in organizations. c r o s os r oi a d s REDISCOVERING THE ROLE OF BUSINESS SCHOOLS The current crisis has highighted the need to redefine the roe of senior managers in organizations. JORDI CANALS Professor and Dean, IESE

More information

Lexmark ESF Applications Guide

Lexmark ESF Applications Guide Lexmark ESF Appications Guide Hep your customers bring out the fu potentia of their Lexmark soutions-enabed singe-function and mutifunction printers Lexmark Appications have been designed to hep businesses

More information

SAT Math Must-Know Facts & Formulas

SAT Math Must-Know Facts & Formulas SAT Mat Must-Know Facts & Formuas Numbers, Sequences, Factors Integers:..., -3, -2, -1, 0, 1, 2, 3,... Rationas: fractions, tat is, anyting expressabe as a ratio of integers Reas: integers pus rationas

More information

Avaya Remote Feature Activation (RFA) User Guide

Avaya Remote Feature Activation (RFA) User Guide Avaya Remote Feature Activation (RFA) User Guide 03-300149 Issue 5.0 September 2007 2007 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document

More information

The definition of insanity is doing the same thing over and over again and expecting different results

The definition of insanity is doing the same thing over and over again and expecting different results insurance services Sma Business Insurance a market opportunity being missed Einstein may not have known much about insurance, but if you appy his definition to the way existing brands are deveoping their

More information

Traffic classification-based spam filter

Traffic classification-based spam filter Traffic cassification-based spam fiter Ni Zhang 1,2, Yu Jiang 3, Binxing Fang 1, Xueqi Cheng 1, Li Guo 1 1 Software Division, Institute of Computing Technoogy, Chinese Academy of Sciences, 100080, Beijing,

More information

NCH Software FlexiServer

NCH Software FlexiServer NCH Software FexiServer This user guide has been created for use with FexiServer Version 1.xx NCH Software Technica Support If you have difficuties using FexiServer pease read the appicabe topic before

More information

Introduction to XSL. Max Froumentin - W3C

Introduction to XSL. Max Froumentin - W3C Introduction to XSL Max Froumentin - W3C Introduction to XSL XML Documents Stying XML Documents XSL Exampe I: Hamet Exampe II: Mixed Writing Modes Exampe III: database Other Exampes How do they do that?

More information

This paper considers an inventory system with an assembly structure. In addition to uncertain customer

This paper considers an inventory system with an assembly structure. In addition to uncertain customer MANAGEMENT SCIENCE Vo. 51, No. 8, August 2005, pp. 1250 1265 issn 0025-1909 eissn 1526-5501 05 5108 1250 informs doi 10.1287/mnsc.1050.0394 2005 INFORMS Inventory Management for an Assemby System wh Product

More information

IMPLEMENTING THE RATE STRUCTURE: TIERING IN THE FEE-FOR-SERVICE SYSTEM

IMPLEMENTING THE RATE STRUCTURE: TIERING IN THE FEE-FOR-SERVICE SYSTEM The New Jersey Department of Human Services Division of Deveopmenta Disabiities 1 IMPLEMENTING THE RATE STRUCTURE: TIERING IN THE FEE-FOR-SERVICE SYSTEM Eizabeth M. Shea Assistant Commissioner Thomas S.

More information

WINMAG Graphics Management System

WINMAG Graphics Management System SECTION 10: page 1 Section 10: by Honeywe WINMAG Graphics Management System Contents What is WINMAG? WINMAG Text and Graphics WINMAG Text Ony Scenarios Fire/Emergency Management of Fauts & Disabement Historic

More information

NCH Software Warp Speed PC Tune-up Software

NCH Software Warp Speed PC Tune-up Software NCH Software Warp Speed PC Tune-up Software This user guide has been created for use with Warp Speed PC Tune-up Software Version 1.xx NCH Software Technica Support If you have difficuties using Warp Speed

More information

Business Banking. A guide for franchises

Business Banking. A guide for franchises Business Banking A guide for franchises Hep with your franchise business, right on your doorstep A true understanding of the needs of your business: that s what makes RBS the right choice for financia

More information

An Integrated Data Management Framework of Wireless Sensor Network

An Integrated Data Management Framework of Wireless Sensor Network An Integrated Data Management Framework of Wireess Sensor Network for Agricutura Appications 1,2 Zhao Liang, 2 He Liyuan, 1 Zheng Fang, 1 Jin Xing 1 Coege of Science, Huazhong Agricutura University, Wuhan

More information

Cooperative Content Distribution and Traffic Engineering in an ISP Network

Cooperative Content Distribution and Traffic Engineering in an ISP Network Cooperative Content Distribution and Traffic Engineering in an ISP Network Wenjie Jiang, Rui Zhang-Shen, Jennifer Rexford, Mung Chiang Department of Computer Science, and Department of Eectrica Engineering

More information

arxiv:1506.05851v1 [cs.ai] 18 Jun 2015

arxiv:1506.05851v1 [cs.ai] 18 Jun 2015 Smart Pacing for Effective Onine Ad Campaign Optimization Jian Xu, Kuang-chih Lee, Wentong Li, Hang Qi, and Quan Lu Yahoo Inc. 7 First Avenue, Sunnyvae, Caifornia 9489 {xuian,kcee,wentong,hangqi,qu}@yahoo-inc.com

More information

Vendor Performance Measurement Using Fuzzy Logic Controller

Vendor Performance Measurement Using Fuzzy Logic Controller The Journa of Mathematics and Computer Science Avaiabe onine at http://www.tjmcs.com The Journa of Mathematics and Computer Science Vo.2 No.2 (2011) 311-318 Performance Measurement Using Fuzzy Logic Controer

More information

Subject: Corns of En gineers and Bureau of Reclamation: Information on Potential Budgetarv Reductions for Fiscal Year 1998

Subject: Corns of En gineers and Bureau of Reclamation: Information on Potential Budgetarv Reductions for Fiscal Year 1998 GAO United States Genera Accounting Office Washington, D.C. 20548 Resources, Community, and Economic Deveopment Division B-276660 Apri 25, 1997 The Honorabe Pete V. Domenici Chairman The Honorabe Harry

More information

Maintenance activities planning and grouping for complex structure systems

Maintenance activities planning and grouping for complex structure systems Maintenance activities panning and grouping for compex structure systems Hai Canh u, Phuc Do an, Anne Barros, Christophe Berenguer To cite this version: Hai Canh u, Phuc Do an, Anne Barros, Christophe

More information

TCP/IP Gateways and Firewalls

TCP/IP Gateways and Firewalls Gateways and Firewas 1 Gateways and Firewas Prof. Jean-Yves Le Boudec Prof. Andrzej Duda ICA, EPFL CH-1015 Ecubens http://cawww.epf.ch Gateways and Firewas Firewas 2 o architecture separates hosts and

More information

CLOUD service providers manage an enterprise-class

CLOUD service providers manage an enterprise-class IEEE TRANSACTIONS ON XXXXXX, VOL X, NO X, XXXX 201X 1 Oruta: Privacy-Preserving Pubic Auditing for Shared Data in the Coud Boyang Wang, Baochun Li, Member, IEEE, and Hui Li, Member, IEEE Abstract With

More information

New Features in Cisco IOS 12.4

New Features in Cisco IOS 12.4 Page 1 of 5 New Features in Cisco IOS 12.4 Peter J. Wecher Introduction I'm writing this in mid-august. Things have been hot (business, weather). That means its time for my more-or-ess annua artice about

More information

The Use of Cooling-Factor Curves for Coordinating Fuses and Reclosers

The Use of Cooling-Factor Curves for Coordinating Fuses and Reclosers he Use of ooing-factor urves for oordinating Fuses and Recosers arey J. ook Senior Member, IEEE S& Eectric ompany hicago, Iinois bstract his paper describes how to precisey coordinate distribution feeder

More information

Fast b-matching via Sufficient Selection Belief Propagation

Fast b-matching via Sufficient Selection Belief Propagation Fast b-matching via Sufficient Seection Beief Propagation Bert Huang Computer Science Department Coumbia University New York, NY 127 [email protected] Tony Jebara Computer Science Department Coumbia

More information

Order-to-Cash Processes

Order-to-Cash Processes TMI170 ING info pat 2:Info pat.qxt 01/12/2008 09:25 Page 1 Section Two: Order-to-Cash Processes Gregory Cronie, Head Saes, Payments and Cash Management, ING O rder-to-cash and purchase-topay processes

More information

TOPOLOGICAL DESIGN OF MULTIPLE VPNS OVER MPLS NETWORK Anotai Srikitja David Tipper

TOPOLOGICAL DESIGN OF MULTIPLE VPNS OVER MPLS NETWORK Anotai Srikitja David Tipper TOPOLOGICAL DESIGN OF MULTIPLE VPNS OVER MPLS NETWORK Anotai Sriitja David Tier Det. of Information Science and Teecommunications University of Pittsburgh N. Beefied Avenue, Pittsburgh, PA 60 ABSTRACT

More information

Chapter 2 Traditional Software Development

Chapter 2 Traditional Software Development Chapter 2 Traditiona Software Deveopment 2.1 History of Project Management Large projects from the past must aready have had some sort of project management, such the Pyramid of Giza or Pyramid of Cheops,

More information