Cloud Storage for Small Cell Networks

Size: px
Start display at page:

Download "Cloud Storage for Small Cell Networks"

Transcription

1 Cloud Storage for Small Cell Network Ejder Baştuğ, Jean-Loui Guénégo, and Mérouane Debbah Alatel-Luent Chair - SUPÉLEC, Gif-ur-Yvette, Frane {ejder.batug, jean-loui.guenego, merouane.debbah}@upele.fr Abtrat The Maive dene deployment of Small Cell Network (SCN) i a promiing way of inreaing apaity. Interetingly, by having uh a huge amount of uer devie a well a mall ell deployed in indoor or outdoor area, one an take benefit of uh ditributed network for torage purpoe. Hene, Depending on the deployed enario, thee torage unit an alo be ued for ontent ahing to relieve the bakhaul ontraint and inreae the peak rate. In thi work, by extending onept of loud torage to SCN, we diu the theoretial hallenge in order to embed mall ell with torage apabilitie. We alo briefly introdue Open Cloud Protool (OCP) a a unified oftware torage framework. Index Term loud torage, private loud, ontent ahing, ditributed torage, Small Cell network, open loud protool. I. Introdution In the year of oial network, high demand of rih ontent treaming by the uer and/or mahine i puhing the apaity of the legay mobile wirele network up to the limit [1]. Beide advane in legay maro ell network (MCN), maively dene deployment of mall ell network (SCN) ha a partiular interet to overome thi iue [2]. Moreover, the market foreat expet almot fully SCN enario in the near future [3]. Although their attrativene, everal hallenge till exit. For intane, a the ell denity inreae, thee low-ot, energy-effiient, elf-onfigurable SCN beome more dependent to bakhaul ommuniation, due to their lower proeing ability ompared to MCN. Auming limited bakhaul apaity, even uing fiber-opti able, onneting all mall ell to the network i expenive. Therefore, by propoing SCN a a olution, one hould alo take into aount the apaity of the bakhaul. One novel approah for thi i to put high torage unit to mall ell and uing heap low-rate bakhaul, rather than highrate expenive alternative [4]. In thi work, we extend the idea of [4] by introduing onept of loud torage on SCN, and diu poible enario. We then give theoretial hallenge from the point of information theory, in the ontext of ditributed torage. We preent Open Cloud Protool (OCP) a a unified oftware framework, and we finally onlude. II. Senario Aording to National Intitute of Standard and Tehnology (NIST) definition of loud omputing [5], we an build up many enario depending on the deployment trategy (ee Fig. 1). A. Private loud It i a type of loud where a ingle organization erve multiple utomer in the network. In our ae, thi i typially a network operator that ue reoure of uer devie (i.e. mobile phone, laptop), mall ell, data enter or any ombination of them a a ditributed torage node. The operator an ue thi ditributed torage for ontent treaming or peritent torage purpoe. The work [4], [6] an be aumed a a private loud, where fixed number of mall ell are ued for the ontent treaming. B. Community loud Thi i the enario where peifi type of onumer in the ommunity make a loud for their miion. For intane, any uer in the mobile network an oially hare it mobile torage with other uer in order to join thi loud. C. Publi loud The loud i open to ue and it might be owned, managed, and operated by a buine, aademi or government organization or ombination of them. The loal information of a ity with augmented reality an be tored in the mall ell or in other type of node, and the publi uer an take benefit of thi ervie. D. Hybrid loud Any ombination of the loud above an alo be a loud. In ome ene, loud of loud might be alled a hybrid loud. III. Challenge By uing the notion of information theory, we an deribe poible hallenge into four ategorie: 1) ode deign, 2) erey, 3) ditributed torage alloation, and 4) proative heduling. Hereafter, we deribe them tep by tep. Note that the metri in the deign an hange depending on the mall ell and bakhaul deployment trategie. For example, we might have different metri with different variability for mall ell deployed in indoor, outdoor, hot-pot or rural area.

2 b) Community a) Private ) Publi d) Hybrid Figure 1: Poible enario on SCN. A. Code deign When we want to tore the information to a ditributed medium, ome of the node may be in fail and/or they may not be available. In order to be able to overome thee failure event, and be able to obtain thi ditributed information later on in a reliable way, we might need to introdue ome redundany. The mot redundant but reliable ae would be to tore that information between all the node, but in thi ae, the amount of the traffi overhead a well a torage effiieny might be non-deirable. Taking into aount thee ontraint, we need to deign the ode to ditribute the information among the network, and we need to be able to repair and/or deode it under the given performane. For the tate of art, maximum ditane eparable (MDS) ode offer uh a reliability by enoding k paket of the information into the n paket, where n > k. Then, we an uffiiently reover the original data. In the ontext of the ditributed torage, n enoded paket an be tored in n node ditributed in the network. After that, when a node fail, urrent node or inoming node an tart a repair proe in order to keep the ontant reliability. The repair proe i ategorized a funtional repair, exat repair and exat repair for the ytemati part [7]. The funtional repair ha been tudied theoretially in [8], but it ha ome pratial impliation due to the ontinuou update of the repairing and deoding funtion. Indeed, uh an operation may not be deirable, ine an eavedropper an detet the funtionality that dereae the onfidentiality of the private data. On the other hand, the exat repair problem i muh harder and yet open in general. Signifiant amount of work ha done in [8] and [7] aording to the different performane metri. The mot important metri are repair bandwidth and torage effiieny. For the olution thee extreme ae, exat minimum torage regenerating (MSR) ode [9] and exat minimum torage regenerating (MBR) ode [10], [11] have been propoed. B. Serey In the ditributed enario, an eavedropper an atively read the data tored in a ubet of torage node, or it may paively ae the information generated during enoding, repairing and deoding proee. For uh ae, the ditributed torage ytem hould be able to atify deired erey rate to protet the information. Previouly, [12], [13] have tudied a paive eavedropper ae, where it read the data tored in a ubet of l < k torage node, and it get the information from l < l node during the funtional repair proe. The work [12] haraterized the upper bound on the number of meage ymbol that we an tore eretly, and howed that the MSR ode an ahieve the erey under an appropriate etting. On the other hand, [13] extended the idea and gave an expliit ontrution way for both MSR and MBR ode. The reult of thee work are built on undeired funtional repair. Although, they are the firt tep toward the haraterization of the erey apaity in the ditributed torage. In ompliated enario, like onidering an open ditributed torage ytem where the information of intended node mut be kept eret to other, exiting ode annot be applied. Any information leakage from the intended node may reult with detetion of the determiniti enoding funtion from other node. Hene, one may ugget a eret key ommuniation on top of the regenerating ode. C. Ditributed torage alloation Conider a network where the node are not fully onneted to eah other, and the link between the node are apaity-limited. One a node requet it ditributed data

3 Crypt Split Send Figure 2: Storing and retrieving data in OCP. from another node in the network, there might be a ingle or everal link from the oure to the detination. In uh a ae, the bet option may not be the diret link -or the hortet path- due to the apaity ontraint and the random failure probability, where ubet of indiret path with ome ahing node may ahieve optimal information flow. Therefore, the ditributed torage alloation problem arie on how to pik the bet path and how to alloate the information on the temporary node during the flow. In [4], [6], the problem ha been tudied auming that a entral maro bae tation i ending information to it onneted uer, where a fixed amount of mall-ell are in harge of ahing the information to help the maro bae tation. The information ahed inide the high torage apaity mall ell i made of file with a given popularity ditribution, and the link from the uer to eah mall ell ha a finite tranmiion rate. Under thi etting, the optimal alloation to minimize the delay with repet to uer and file ha been found both for the oded and unoded file. On the other hand, for the apture of the burty and random behavior of the mall ell availability, the work [14], [15] have modeled the link between the uer and mall ell a an eraure hannel, i.e. the link i either withed on or withed off with ome probability, and the tati i known to the alloation ontroller. More peifially, [14] uppoe that only a random et of the mall ell are aeible, while [15] model eah link a the Bernoulli proe with a given eraure probability. D. Proative heduling We have deribed above the ditributed torage alloation problem for a given time intane auming that the loation of the node i fixed. However, in pratie, ome node may have mobility and make requet dynamially in different loation aro time intane. If mobility and requet pattern an be learned by the ytem [16] in a relatively long time ale (eaon, week, day, hour) and/or in a peifi event, then, we an deign our ahing and tranmiion mehanim more effiiently. Suh a ahing and heduling would offer a great flexibility in the network. A reent framework [17], [18] ignifiantly redue the outage apaity by prediting node requet and antiipating the data tranmiion prior to the atual requet ompared to a non-proative ae. Neverthele, the model i a implified queue ytem with aggregate apaity and doe not onider the torage problem. IV. Open Cloud Protool In thi etion, we introdue OCP a a unified oftware framework to eurely and reliably tore data in the network [19]. More preiely, eah OCP intalled devie in the network i alled a an OCP agent. The idea i to enable any eletroni devie with a memory and broadband internet ae to be a node of a ditributed ytem. Deired uer experiene ha to be ahieved through the following benefit: low ot torage, periteny, eurity, and performane of toring and retrieving data. OCP i deigned to allow an online torage market with many ator: onumer, provider and trader, it inlude billing funtionality. On the other hand, it target to have a flexible working arhiteture tarting from phyial layer to the top, inluding ability of working for different deployment enario a deribed above. A rough viualization of toring and retrieving data in OCP i hown in Fig. 2. A. Addre topology Every torage ytem ha the onept of addre, that allow it to know where an et an be tored inide it ontainer. Any ditributed torage ytem ha an addre topology, whih i a triplet(f, U, R) with F repreenting the addre format, U the et of all poible addree, alled the addre univere, and R being the repartition rule that peify for eah addre whih node i reponible for it and when. Any ditributed hah table (DHT) ha an addre topology. For intane CHORD [20], Kademlia [21] and Tapetry [22] have a ingle ring addre topology. The DHT ontent addreable network (CAN) ha a multidimenional box addre topology [23]. The partiularity of OCP i to have a multi-ring addre topology. B. Multiple Ring addre topology The multi-ring addre topology i a triplet(f, U, R) with F defined a a one field addre, U a a finite et,

4 n8 n7 n1 n2 n6 n10 n5 n3 n9 a a a Figure 3: Multiple Ring addre topology. and R a follow. Let u onider N ring, eah ring being a U repreentation a a ounter-lokwie direted ring. To eah node, i aigned a ring r and an element e of the ring whih ha an addre format. The ouple(r, e) i alled node id. Thi give to eah node a poition on one ring. A node B i ueor of a node A if and only if they are on the ame ring, and there i no node between them on thi ring, and node B i after A in the peified ring diretion. A node i reponible for all et with an addre between it and it ueor. The et of addree under the reponibility of a node i alled node reponibility area. Thi kind of topology allow to eaily manage redundany, and the ation to perform on node diappearing event. An example of thi topology i hown in Fig. 3. In the figure, we an ee a three ring addre topology with 10 node. The blak quare repreent an et loated at the addre a. Aording to the repartition rule R, a i under the reponibility of node n6, n5 and n9. The reponibility area of thee node are indiated with the arrow on the figure. C. Immutable et Client Cahe Storage Figure 4: Cahe on the road. n4 Owner agent OCP partiularity i to extenively ue immutable et and direted ayli graph (DAG) like GIT verioning ytem. An immutable et i an et that annot be modified. Thi i done by linking it ontent to it addre with a relation uh a addre = hah(ontent). An immutable et annot be updated while keeping it addre. So it beome diffiult for a node to modify an et. Another advantage of uing immutable et i that they an be ahed on any node. Thi allow a mehanim that we all a ahing on the road: when retrieving an et, the et an be ahed on all devie between the lient and the reponible node (ee Fig. 4). When a node reeive an et, it tore in it ahe if it i not reponible of it, ele it tore in it peritent torage area. Cahe poliie remove the et from the ahe when needed. Moreover, if the uer lient ha mobility, the ahing on the road mehanim will have an effet to keep data geographially loe to the lient. D. Mutable et OCP, however, ue mutable et for onnetion et. A onnetion et i an et tored at a peifi addre that an be retrieved by a uer without peifi information. For intane, OCP ue publi uer et. For a given uer with a login, the publi uer et i loated at addre = hah(login). OCP ue a well private uer et. For a given uer with a login and a paword, the private uer et i loated at addre = hah(f(login, paword)). The private uer et i a paword rypted et ontaining a pointer to the root of the uer ontainer, repreented and tored under a DAG. OCP mutable et annot be ahed. E. Uer et In OCP, all et belong to a peified uer. Thi allow the agent to publih billing report. All immutable et are enrypted with a uer eret key loated in the private uer et. When a uer tore a file, the file i plitted in many relatively mall blok that will be pread around the agent. F. Storing data To tore data on an OCP network, the uer tart an OCP agent ating a a lient. It reate an aount or ue it exiting one. The uer an login with an authentiation hallenge. The login tep onit to determine the addre of it publi and private uer et. Storing a data (file, tream, et.) onit of enrypting the data then plitting the enrypted data into blok and adding redundany through an eraure ode, and finally ending the blok on the OCP multiple ring addre topology DHT a immutable et organized in DAG (ee Fig. 2). Cahing on the road mehanim i ued. G. Retrieving data To retrieve data, the onneted uer retrieve all the addree of immutable et via the DAG root addre tored in the private uer et. Data i rebuilt from different blok uing eraure ode, and then derypted in order to be manipulated by the uer. H. Cahe and peritent torage OCP agent ha two kind of ontainer: one for toring data the agent i reponible for and another one for ahed immutable et. A a onequene, an OCP network an be ompoed of ahe oriented agent and peritent torage data agent. Thi help to have a torage network with independent peritene and performane apet.

5 V. Conluion By inreaing the apaity of wirele network with SCN, we have hown that we an take benefit of uh a huge network for ditributed torage. We have alled thi onept a loud torage on SCN. Giving thee poible enario and exiting tehnial hallenge, we believe that there will be extenive reearh and engineering work in thi diretion, in the near future. VI. Aknowledgment Thi reearh ha been upported by the ERC Starting Grant MORE (Advaned Mathematial Tool for Complex Network Engineering), and Alatel-Luent, within the Alatel-Luent Chair in Flexible Radio, Supéle. Referene [1] Cio, Cio viual networking index: Global mobile data traffi foreat update, , White Paper, [Online] [2] J. Hoydi, M. Kobayahi, and M. Debbah, Green mall-ell network, IEEE Vehiular Tehnology Magazine, vol. 6(1), pp , [3] Small Cell Forum, Small ell to make up almot 90% of all bae tation by 2016, [Online] [4] N. Golrezaei, K. Shanmugam, A. G. Dimaki, A. F. Molih, and G. Caire, Femtoahing: Wirele video ontent delivery through ditributed ahing helper, arxiv preprint: , [5] P. Mell and T. Grane, The nit definition of loud omputing, National Intitute of Standard and Tehnology, [6] N. Golrezaei, A. F. Molih, A. G. Dimaki, and G. Caire, Femtoahing and devie-to-devie ollaboration: A new arhiteture for wirele video ditribution, arxiv preprint: , [7] A. G. Dimaki, K. Ramhandran, Y. Wu, and C. Suh, A urvey on network ode for ditributed torage, Proeeding of the IEEE, vol. 99, [8] A. G. Dimaki, B. Godfrey, Y. Wu, M. J. Wainwright, and K. Ramhandran, Network oding for ditributed torage ytem, Information Theory, IEEE Tranation on, vol. 56, no. 9, pp , [9] K. V. Rahmi, N. B. Shah, P. V. Kumar, and K. Ramhandran, Exat regenerating ode for ditributed torage, in Communiation, Control, and Computing (Allerton 2009). 47th Annual Allerton Conferene on, pp , [10] C. Suh and K. Ramhandran, Exat regeneration ode for ditributed torage repair uing interferene alignment, arxiv preprint: , [11] Y. Wu and A. Dimaki, Reduing repair traffi for eraure oding-baed torage via interferene alignment, in Information Theory, (ISIT 2009). IEEE International Sympoium on, vol. 4, pp , [12] S. Pawar, S. Y. E. Rouayheb, and K. Ramhandran, On eure ditributed data torage under repair dynami, in Information Theory Proeeding (ISIT), 2010 IEEE International Sympoium on, p , [13] N. B. Shah, K. V. Rahmi, and P. V. Kumar, Informationtheoretially eure regenerating ode for ditributed torage, in GLOBECOM, Auiting, Texa, pp. 1 5, [14] D. Leong, A. G. Dimaki, and T. Ho, Ditributed torage alloation for high reliability, in Communiation (ICC), 2010 IEEE International Conferene on, pp. 1 6, [15] V. Ntrano, G. Caire, and A. G. Dimaki, Alloation for heterogenou ditributed torage, in Information Theory Proeeding (ISIT), 2012 IEEE International Sympoium on, pp , [16] V. Etter, M. Kafi, and E. Kazemi, Been There, Done That: What Your Mobility Trae Reveal about Your Behavior, in Mobile Data Challenge by Nokia Workhop, in onjuntion with Int. Conf. on Pervaive Computing, [17] H. E. Gamal, J. Tadrou, and A. Eryilmaz, Proative reoure alloation: Turning preditable behavior into petral gain, in Communiation, Control, and Computing (Allerton), th Annual Allerton Conferene on, pp , [18] J. Tadrou, A. Eryilmaz, and H. E. Gamal, Proative reoure alloation: Harneing the diverity and multiat gain, arxiv preprint: , [19] Open Cloud Protool, [Online] [20] I. Stoia, R. Morri, D. Karger, M. F. Kaahoek, and H. Balakrihnan, Chord: A alable peer-to-peer lookup ervie for internet appliation, SIGCOMM Comput. Commun. Rev., vol. 31, pp , Aug [21] P. Maymounkov and D. Mazière, Kademlia: A peer-to-peer information ytem baed on the xor metri, in Revied Paper from the Firt International Workhop on Peer-to-Peer Sytem, IPTPS 01, (London, UK, UK), pp , Springer- Verlag, [22] B. Zhao, L. Huang, J. Stribling, S. Rhea, A. Joeph, and J. Kubiatowiz, Tapetry: a reilient global-ale overlay for ervie deployment, vol. 22, pp , [23] S. Ratnaamy, P. Frani, M. Handley, R. Karp, and S. Shenker, A alable ontent-addreable network, SIGCOMM Comput. Commun. Rev., vol. 31, pp , Aug

An Incrementally Scalable Multiprocessor Interconnection Network with Flexible Topology and Low-Cost Distributed Switching.

An Incrementally Scalable Multiprocessor Interconnection Network with Flexible Topology and Low-Cost Distributed Switching. An Inrementally Salable Multiproeor Interonnetion Network with Flexible Topology and Low-Cot Ditributed Swithing. 1. Introdution Ronald Poe, Vinent Fazio, Jon Well Department of Computer Siene, Monah Univerity,

More information

The Branching Factor of Regular Search Spaces

The Branching Factor of Regular Search Spaces The Branhing Fator of Regular Searh Spae Stefan Edelkamp Intitut für Informatik Am Flughafen 17 79110 Freiburg edelkamp@informatik.uni-freiburg.de Rihard E. Korf Computer Siene Department Univerity of

More information

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF ' R :::i:. ATIONAL :'.:::::: RETENTION ':: Compliane with the way you work, PRODUCT BRIEF In-plae Management of Unstrutured Data The explosion of unstrutured data ombined with new laws and regulations

More information

Managing Exclusivity and Windowing in Digital Content Value Chain

Managing Exclusivity and Windowing in Digital Content Value Chain Exluivity and Windowing in Digital Content Ditribution Managing Exluivity and Windowing in Digital Content Value Chain Completed Reearh Paper I. Robert Chiang Gabelli Shool of Buine Fordham Univerity Bronx,

More information

Firms nowadays are increasingly proactive in trying to strategically capitalize on consumer networks and

Firms nowadays are increasingly proactive in trying to strategically capitalize on consumer networks and Information Sytem Reearh Vol. 24, No. 1, Marh 2013, pp. 164 185 ISSN 1047-7047 (print) ISSN 1526-5536 (online) http://dx.doi.org/10.1287/ire.1120.0463 2013 INFORMS Engineering Optimal Network Effet via

More information

A Holistic Method for Selecting Web Services in Design of Composite Applications

A Holistic Method for Selecting Web Services in Design of Composite Applications A Holisti Method for Seleting Web Servies in Design of Composite Appliations Mārtiņš Bonders, Jānis Grabis Institute of Information Tehnology, Riga Tehnial University, 1 Kalu Street, Riga, LV 1658, Latvia,

More information

THE USE OF FIBER WOOD AS EVAPORATIVE PAD PACKAGING MATERIAL

THE USE OF FIBER WOOD AS EVAPORATIVE PAD PACKAGING MATERIAL VI CONGRESSO NACIONAL DE ENGENHARIA MECÂNICA VI NAIONAL CONGRESS OF MECHANICAL ENGINEERING 18 a 21 de agoto de 2010 Campina Grande Paraíba - Brail Augut 18 21, 2010 Campina Grande Paraíba Brazil HE USE

More information

Name: SID: Instructions

Name: SID: Instructions CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/

More information

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks Performane Analysis of IEEE 80.11 in Multi-hop Wireless Networks Lan Tien Nguyen 1, Razvan Beuran,1, Yoihi Shinoda 1, 1 Japan Advaned Institute of Siene and Tehnology, 1-1 Asahidai, Nomi, Ishikawa, 93-19

More information

SAFE. Post-Tensioned Concrete Design Manual DESIGN OF SLABS, BEAMS AND FOUNDATIONIS REINFORCED AND POST-TENSIONED CONCRETE

SAFE. Post-Tensioned Concrete Design Manual DESIGN OF SLABS, BEAMS AND FOUNDATIONIS REINFORCED AND POST-TENSIONED CONCRETE SAFE DESIGN OF SLABS, BEAMS AND FOUNDATIONIS REINFORCED AND POST-TENSIONED CONCRETE Pot-Tenioned Conrete Deign Manual ISO SAF120108M5-Rev2 Berkeley, California, USA Verion 12 Deember 2010 Copyright Copyright

More information

Group Mutual Exclusion Based on Priorities

Group Mutual Exclusion Based on Priorities Group Mutual Excluion Baed on Prioritie Karina M. Cenci Laboratorio de Invetigación en Sitema Ditribuido Univeridad Nacional del Sur Bahía Blanca, Argentina kmc@c.un.edu.ar and Jorge R. Ardenghi Laboratorio

More information

Performance of Multiple TFRC in Heterogeneous Wireless Networks

Performance of Multiple TFRC in Heterogeneous Wireless Networks Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding

More information

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad

More information

Value of Reverse Factoring in Multi-stage Supply Chains

Value of Reverse Factoring in Multi-stage Supply Chains Value o Revere Fatoring in Multi-tage Supply Chain Abtrat: We preent a mathematial model or integration, analyi, and optimization o operational and inanial proee within a upply hain. Speiially, we onider

More information

Novel Cable-Suspended RoboCrane Support

Novel Cable-Suspended RoboCrane Support Novel Cable-Supene RoboCrane Support Robert L. William II Ohio Univerity Athen, Ohio R.L. William II, 5, Novel Cable-Supene RoboCrane Support, Inutrial Robot: An International Journal, (4): 6-. Keywor:

More information

Computer Networks Framing

Computer Networks Framing Computer Networks Framing Saad Mneimneh Computer Siene Hunter College of CUNY New York Introdution Who framed Roger rabbit? A detetive, a woman, and a rabbit in a network of trouble We will skip the physial

More information

Unit 12: Installing, Configuring and Administering Microsoft Server

Unit 12: Installing, Configuring and Administering Microsoft Server Unit 12: Installing, Configuring and Administering Mirosoft Server Learning Outomes A andidate following a programme of learning leading to this unit will be able to: Selet a suitable NOS to install for

More information

SZENT ISTVÁN UNIVERSITY

SZENT ISTVÁN UNIVERSITY SZENT ISTVÁN UNIVERSITY BLOCK-ORIENTED MODELING OF SOLAR THERMAL SYSTEMS Thei of the dotoral (Ph.D.) diertation Jáno Buzá Gödöllő 2009 Dotoral hool denomination: Mehanial Engineering PhD Shool iene: Energeti

More information

Green Cloud Computing

Green Cloud Computing International Journal of Information and Computation Tehnology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 431-436 International Researh Publiations House http://www. irphouse.om /ijit.htm Green Cloud

More information

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms Tap Into Smartphone Demand: Mobile-izing Enterprie Webite by Uing Flexible, Open Source Platform acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Tap Into Smartphone Demand:

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection

More information

Cluster-Aware Cache for Network Attached Storage *

Cluster-Aware Cache for Network Attached Storage * Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,

More information

CASE STUDY ALLOCATE SOFTWARE

CASE STUDY ALLOCATE SOFTWARE CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT

More information

Project Management Basics

Project Management Basics Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management

More information

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems, MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS

More information

A Keyword Filters Method for Spam via Maximum Independent Sets

A Keyword Filters Method for Spam via Maximum Independent Sets Vol. 7, No. 3, May, 213 A Keyword Filters Method for Spam via Maximum Independent Sets HaiLong Wang 1, FanJun Meng 1, HaiPeng Jia 2, JinHong Cheng 3 and Jiong Xie 3 1 Inner Mongolia Normal University 2

More information

A New Optimum Jitter Protection for Conversational VoIP

A New Optimum Jitter Protection for Conversational VoIP Proc. Int. Conf. Wirele Commun., Signal Proceing (Nanjing, China), 5 pp., Nov. 2009 A New Optimum Jitter Protection for Converational VoIP Qipeng Gong, Peter Kabal Electrical & Computer Engineering, McGill

More information

Information Security 201

Information Security 201 FAS Information Seurity 201 Desktop Referene Guide Introdution Harvard University is ommitted to proteting information resoures that are ritial to its aademi and researh mission. Harvard is equally ommitted

More information

FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts

FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts FOOD FOR THOUGHT Topial Insights from our Sujet Matter Experts DEGREE OF DIFFERENCE TESTING: AN ALTERNATIVE TO TRADITIONAL APPROACHES The NFL White Paper Series Volume 14, June 2014 Overview Differene

More information

Involute-Evolute Curve Couples in the Euclidean 4-Space

Involute-Evolute Curve Couples in the Euclidean 4-Space Int J Open Problem Compt Math Vol o June 9 Involute-volute Curve Couple in the ulidean -Spae min Özyılmaz Süha Yılmaz ge Univerity Faulty of Siene Dept of Math ornova-izmir urkey Dokuz ylül Univerity ua

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com

More information

Settlement Analysis of Geosynthetic Reinforced Soil Retaining Walls at Foundation Level

Settlement Analysis of Geosynthetic Reinforced Soil Retaining Walls at Foundation Level Settlement Analyi of Geoyntheti Reinfored Soil Retaining Wall at Foundation Level Halil Murat Algın Aoiate Profeor, Department of Civil Engineering, Faulty of Engineering, Harran Univerity, Omanbey Campu,

More information

SLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments

SLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments 2 th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing SLA-based Resoure Alloation for Software as a Servie Provider (SaaS) in Cloud Computing Environments Linlin Wu, Saurabh Kumar

More information

Henley Business School at Univ of Reading. Pre-Experience Postgraduate Programmes Chartered Institute of Personnel and Development (CIPD)

Henley Business School at Univ of Reading. Pre-Experience Postgraduate Programmes Chartered Institute of Personnel and Development (CIPD) MS in International Human Resoure Management For students entering in 2012/3 Awarding Institution: Teahing Institution: Relevant QAA subjet Benhmarking group(s): Faulty: Programme length: Date of speifiation:

More information

Bandwidth Allocation and Session Scheduling using SIP

Bandwidth Allocation and Session Scheduling using SIP JOURAL OF COUICAIS, VOL., O. 5, AUGUS 006 7 Bandwidth Alloation and Session Sheduling using SIP Hassan HASSA, Jean-arie GARCIA and Olivier BRU LAAS-CRS, oulouse, Frane Email: {hhassan}@laas.fr Abstrat

More information

A technical guide to 2014 key stage 2 to key stage 4 value added measures

A technical guide to 2014 key stage 2 to key stage 4 value added measures A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool

More information

Dataflow Features in Computer Networks

Dataflow Features in Computer Networks Magyar Kutatók 1. Nemzetközi Szimpóziuma 1 th International Symposium of Hungarian Researhers on Computational Intelligene and Informatis Gyula Max Budapest University of Tehnology and Eonomis, Department

More information

Deduplication with Block-Level Content-Aware Chunking for Solid State Drives (SSDs)

Deduplication with Block-Level Content-Aware Chunking for Solid State Drives (SSDs) 23 IEEE International Conferene on High Performane Computing and Communiations & 23 IEEE International Conferene on Embedded and Ubiquitous Computing Dedupliation with Blok-Level Content-Aware Chunking

More information

UNIVERSAL COMMAND GENERATOR FOR ROBOTICS AND CNC MACHINERY

UNIVERSAL COMMAND GENERATOR FOR ROBOTICS AND CNC MACHINERY UNIVERSAL COMMAND GENERATOR FOR ROBOTICS AND CNC MACHINERY A THESIS SUBMITTED TO THE GRADUATE SCHOOL OF NATURAL AND APPLIED SCIENCES OF MIDDLE EAST TECHNICAL UNIVERSITY BY ARDA AKINCI IN PARTIAL FULFILMENT

More information

Trade Information, Not Spectrum: A Novel TV White Space Information Market Model

Trade Information, Not Spectrum: A Novel TV White Space Information Market Model Trade Information, Not Spetrum: A Novel TV White Spae Information Market Model Yuan Luo, Lin Gao, and Jianwei Huang 1 Abstrat In this paper, we propose a novel information market for TV white spae networks,

More information

THE MODELLING AND CONTROL OF AN AUTOMOTIVE DRIVETRAIN

THE MODELLING AND CONTROL OF AN AUTOMOTIVE DRIVETRAIN THE MODELLNG AND CONTROL OF AN AUTOMOTVE DRVETRAN Thei preented in partial ulilment o the requirement or the degree MASTER OF SCENCE N ENGNEERNG By Nihola M. Northote Supervior Dr. A.B. Taylor Department

More information

Four Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations

Four Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations Four Way Companie Can Ue Open Source Social Publihing Tool to Enhance Their Buine Operation acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Four Way Companie Can Ue Open

More information

Channel Assignment Strategies for Cellular Phone Systems

Channel Assignment Strategies for Cellular Phone Systems Channel Assignment Strategies for Cellular Phone Systems Wei Liu Yiping Han Hang Yu Zhejiang University Hangzhou, P. R. China Contat: wliu5@ie.uhk.edu.hk 000 Mathematial Contest in Modeling (MCM) Meritorious

More information

Deadline-based Escalation in Process-Aware Information Systems

Deadline-based Escalation in Process-Aware Information Systems Deadline-based Esalation in Proess-Aware Information Systems Wil M.P. van der Aalst 1,2, Mihael Rosemann 2, Marlon Dumas 2 1 Department of Tehnology Management Eindhoven University of Tehnology, The Netherlands

More information

Hierarchical Clustering and Sampling Techniques for Network Monitoring

Hierarchical Clustering and Sampling Techniques for Network Monitoring S. Sindhuja Hierarhial Clustering and Sampling Tehniques for etwork Monitoring S. Sindhuja ME ABSTRACT: etwork monitoring appliations are used to monitor network traffi flows. Clustering tehniques are

More information

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC

More information

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu

More information

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation Proceeding on Privacy Enhancing Technologie 2015; 2015 (2):1 17 Reza Shokri* Privacy Game: Optimal Uer-Centric Data Obfucation Abtract: Conider uer who hare their data (e.g., location) with an untruted

More information

Parametric model of IP-networks in the form of colored Petri net

Parametric model of IP-networks in the form of colored Petri net Parametri model of IP-networks in the form of olored Petri net Shmeleva T.R. Abstrat A parametri model of IP-networks in the form of olored Petri net was developed; it onsists of a fixed number of Petri

More information

On the Characteristics of Spectrum-Agile Communication Networks

On the Characteristics of Spectrum-Agile Communication Networks 1 On the Charateristis of Spetrum-Agile Communiation Networks Xin Liu Wei Wang Department of Computer Siene University of California, Davis, CA 95616 Email:{liu,wangw}@s.udavis.edu Abstrat Preliminary

More information

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE RAVI KUMAR G 1, C.MUTHUSAMY 2 & A.VINAYA BABU 3 1 HP Bangalore, Reearch Scholar JNTUH, Hyderabad, India, 2 Yahoo, Bangalore,

More information

normally just an unencrypted channel over which plaintext early implementation has an implementation vulnerability

normally just an unencrypted channel over which plaintext early implementation has an implementation vulnerability CS530 Authentiation in Aliation Bill Cheng htt://merlot.u.edu/530-0 Authentiation in Aliation Unix login elnet Rh/rlogin Sh HP (web browing) FP Window login E-mail (SMP, POP, IMAP) NFS Network ae ervie

More information

CIS570 Lecture 4 Introduction to Data-flow Analysis 3

CIS570 Lecture 4 Introduction to Data-flow Analysis 3 Introdution to Data-flow Analysis Last Time Control flow analysis BT disussion Today Introdue iterative data-flow analysis Liveness analysis Introdue other useful onepts CIS570 Leture 4 Introdution to

More information

TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS

TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS ICSRiM - University of Leeds Shool of Computing & Shool of Musi Leeds LS2 9JT, UK +44-113-343-2583 kia@i-maestro.org www.i-maestro.org,

More information

A Spam Message Filtering Method: focus on run time

A Spam Message Filtering Method: focus on run time , pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department

More information

Learning Curves and Stochastic Models for Pricing and Provisioning Cloud Computing Services

Learning Curves and Stochastic Models for Pricing and Provisioning Cloud Computing Services T Learning Curves and Stohasti Models for Priing and Provisioning Cloud Computing Servies Amit Gera, Cathy H. Xia Dept. of Integrated Systems Engineering Ohio State University, Columbus, OH 4310 {gera.,

More information

Sebastián Bravo López

Sebastián Bravo López Transfinite Turing mahines Sebastián Bravo López 1 Introdution With the rise of omputers with high omputational power the idea of developing more powerful models of omputation has appeared. Suppose that

More information

OpenScape 4000 CSTA V7 Connectivity Adapter - CSTA III, Part 2, Version 4.1. Developer s Guide A31003-G9310-I200-1-76D1

OpenScape 4000 CSTA V7 Connectivity Adapter - CSTA III, Part 2, Version 4.1. Developer s Guide A31003-G9310-I200-1-76D1 OpenSape 4000 CSTA V7 Connetivity Adapter - CSTA III, Part 2, Version 4.1 Developer s Guide A31003-G9310-I200-1-76 Our Quality and Environmental Management Systems are implemented aording to the requirements

More information

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4

More information

Using Live Chat in your Call Centre

Using Live Chat in your Call Centre Using Live Chat in your Call Centre Otober Key Highlights Yesterday's all entres have beome today's ontat entres where agents deal with multiple queries from multiple hannels. Live Chat hat is one now

More information

Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS

Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS Chapter Stoc and Their Valuation ANSWERS TO EN-OF-CHAPTER QUESTIONS - a. A proxy i a document giving one peron the authority to act for another, typically the power to vote hare of common toc. If earning

More information

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism An Effiient Network Traffi Classifiation Based on Unknown and Anomaly Flow Detetion Mehanism G.Suganya.M.s.,B.Ed 1 1 Mphil.Sholar, Department of Computer Siene, KG College of Arts and Siene,Coimbatore.

More information

Price-based versus quantity-based approaches for stimulating the development of renewable electricity: new insights in an old debate

Price-based versus quantity-based approaches for stimulating the development of renewable electricity: new insights in an old debate Prie-based versus -based approahes for stimulating the development of renewable eletriity: new insights in an old debate uthors: Dominique FINON, Philippe MENNTEU, Marie-Laure LMY, Institut d Eonomie et

More information

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare

More information

Henley Business School at Univ of Reading. Chartered Institute of Personnel and Development (CIPD)

Henley Business School at Univ of Reading. Chartered Institute of Personnel and Development (CIPD) MS in International Human Resoure Management (full-time) For students entering in 2015/6 Awarding Institution: Teahing Institution: Relevant QAA subjet Benhmarking group(s): Faulty: Programme length: Date

More information

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada

More information

A Comparison of Service Quality between Private and Public Hospitals in Thailand

A Comparison of Service Quality between Private and Public Hospitals in Thailand International Journal of Business and Soial Siene Vol. 4 No. 11; September 2013 A Comparison of Servie Quality between Private and Hospitals in Thailand Khanhitpol Yousapronpaiboon, D.B.A. Assistant Professor

More information

From a strategic view to an engineering view in a digital enterprise

From a strategic view to an engineering view in a digital enterprise Digital Enterprise Design & Management 2013 February 11-12, 2013 Paris From a strategi view to an engineering view in a digital enterprise The ase of a multi-ountry Telo Hervé Paault Orange Abstrat In

More information

Emergency, Standby and Backup Power Connection Solutions

Emergency, Standby and Backup Power Connection Solutions Emergency, Standby and Backup Power Connection Solution Don t be in the dark. Enuring that you are open for buine i within your power. Blackout, hurricane, lightning, flood, high wind. Power outage caued

More information

INTELLIGENCE IN SWITCHED AND PACKET NETWORKS

INTELLIGENCE IN SWITCHED AND PACKET NETWORKS 22-24 Setember, Sozool, ULGRI INTELLIGENCE IN SWITCHED ND PCKET NETWORKS Ivaylo Ivanov tanasov Deartment of teleommuniations, Tehnial University of Sofia, 7 Kliment Ohridski st., 1000, hone: +359 2 965

More information

PROCEEDS OF CRIME (BUSINESS IN THE REGULATED SECTOR) ORDER 2015

PROCEEDS OF CRIME (BUSINESS IN THE REGULATED SECTOR) ORDER 2015 Proeeds of Crime (Business in the Regulated Setor) Order 2015 Artile 1 Statutory Doument No. 2015/0073 Proeeds of Crime At 2008 PROCEEDS OF CRIME (BUSINESS IN THE REGULATED SECTOR) ORDER 2015 Approved

More information

Chapter 1 Microeconomics of Consumer Theory

Chapter 1 Microeconomics of Consumer Theory Chapter 1 Miroeonomis of Consumer Theory The two broad ategories of deision-makers in an eonomy are onsumers and firms. Eah individual in eah of these groups makes its deisions in order to ahieve some

More information

INSIDE REPUTATION BULLETIN

INSIDE REPUTATION BULLETIN email@inidetory.com.au www.inidetory.com.au +61 (2) 9299 9979 The reputational impact of outourcing overea The global financial crii ha reulted in extra preure on Autralian buinee to tighten their belt.

More information

Software Engineering Management: strategic choices in a new decade

Software Engineering Management: strategic choices in a new decade Software Engineering : trategic choice in a new decade Barbara Farbey & Anthony Finkeltein Univerity College London, Department of Computer Science, Gower St. London WC1E 6BT, UK {b.farbey a.finkeltein}@ucl.ac.uk

More information

SHARESYNC SECURITY FEATURES

SHARESYNC SECURITY FEATURES www.kyboxinnovation.com SHARESYNC SECURITY FEATURES ShareSync provide a high degree of ecurity and protection which allow adminitrator to: Aure compliance with ecurity bet practice Get full viibility over

More information

THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES

THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES Proeedings of FEDSM 98 998 ASME Fluids Engineering Division Summer Meeting June 2-25, 998 Washington DC FEDSM98-529 THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES John D. Wright Proess

More information

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International

More information

Imagery Portal Workshop #2 Department of Administrative Services, Executive Building Salem, Oregon May 11, 2006

Imagery Portal Workshop #2 Department of Administrative Services, Executive Building Salem, Oregon May 11, 2006 ry Portal Workhop #2 Department of Adminitrative Service, Executive Building Salem, Oregon May 11, 2006 Workhop Purpoe: dicu the outcome of the phae 1 coping proce for development of an imagery portal

More information

Auction Mechanisms Toward Efficient Resource Sharing for Cloudlets in Mobile Cloud Computing

Auction Mechanisms Toward Efficient Resource Sharing for Cloudlets in Mobile Cloud Computing 1 Auction Mechanim Toward Efficient Reource Sharing for Cloudlet in Mobile Cloud Computing A-Long Jin, Wei Song, Ping Wang, Duit Niyato, and Peijian Ju Abtract Mobile cloud computing offer an appealing

More information

A Context-Aware Preference Database System

A Context-Aware Preference Database System J. PERVASIVE COMPUT. & COMM. (), MARCH 005. TROUBADOR PUBLISHING LTD) A Context-Aware Preferene Database System Kostas Stefanidis Department of Computer Siene, University of Ioannina,, kstef@s.uoi.gr Evaggelia

More information

ROBÓTICA Servoposicionamiento y Estimación de Pose Usando Sensores Visuales: Teoría y Aplicaciones

ROBÓTICA Servoposicionamiento y Estimación de Pose Usando Sensores Visuales: Teoría y Aplicaciones V ESCUELA DE INVIERNO PARA LA DIVULGACION DE LA ROBÓTICA, NANOTECNOLOGIA Y NEUROCIENCIA Univeridad Ténia Federio Santa María 5 julio 2 ROBÓTICA Servopoiionamiento y Etimaión de Poe Uando Senore Viuale:

More information

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test Report 4668-1b Meaurement report Sylomer - field tet Report 4668-1b 2(16) Contet 1 Introduction... 3 1.1 Cutomer... 3 1.2 The ite and purpoe of the meaurement... 3 2 Meaurement... 6 2.1 Attenuation of

More information

Research Data Management ANONYMISATION

Research Data Management ANONYMISATION ANONYMISATION Sensitive Data Sensitive Data is information overing: The raial or ethni origin of the Data Subjet Politial opinions Religious or other beliefs of a similar nature Membership of trade unions

More information

AngelCast: Cloud-based Peer-Assisted Live Streaming Using Optimized Multi-Tree Construction

AngelCast: Cloud-based Peer-Assisted Live Streaming Using Optimized Multi-Tree Construction AngelCast: Cloud-based Peer-Assisted Live Streaming Using Optimized Multi-Tree Constrution Raymond Sweha Boston University remos@s.bu.edu Vathe Ishakian Boston University visahak@s.bu.edu Azer Bestavros

More information

SCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto

More information

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE Progre In Electromagnetic Reearch Letter, Vol. 3, 51, 08 BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE S. H. Zainud-Deen Faculty of Electronic Engineering Menoufia

More information

MATE: MPLS Adaptive Traffic Engineering

MATE: MPLS Adaptive Traffic Engineering MATE: MPLS Adaptive Traffi Engineering Anwar Elwalid Cheng Jin Steven Low Indra Widjaja Bell Labs EECS Dept EE Dept Fujitsu Network Communiations Luent Tehnologies Univ. of Mihigan Calteh Pearl River,

More information

Computational Analysis of Two Arrangements of a Central Ground-Source Heat Pump System for Residential Buildings

Computational Analysis of Two Arrangements of a Central Ground-Source Heat Pump System for Residential Buildings Computational Analysis of Two Arrangements of a Central Ground-Soure Heat Pump System for Residential Buildings Abstrat Ehab Foda, Ala Hasan, Kai Sirén Helsinki University of Tehnology, HVAC Tehnology,

More information

A Reputation Management Approach for Resource Constrained Trustee Agents

A Reputation Management Approach for Resource Constrained Trustee Agents A Reputation Management Approah for Resoure Constrained rustee Agents Han Yu, Chunyan Miao, Bo An 2, Cyril Leung 3, and Vitor R. Lesser 4 Nanyang ehnologial University, Singapore 2 he Key Lab of Intelligent

More information

Electrician'sMathand BasicElectricalFormulas

Electrician'sMathand BasicElectricalFormulas Eletriian'sMathand BasiEletrialFormulas MikeHoltEnterprises,In. 1.888.NEC.CODE www.mikeholt.om Introdution Introdution This PDF is a free resoure from Mike Holt Enterprises, In. It s Unit 1 from the Eletrial

More information

Change Management Plan Blackboard Help Course 24/7

Change Management Plan Blackboard Help Course 24/7 MIT 530 Change Management Plan Help Coure 24/7 Submitted by: Sheri Anderon UNCW 4/20/2008 Introduction The Univerity of North Carolina Wilmington (UNCW) i a public comprehenive univerity, one of the ixteen

More information

Centralized and Decentralized Decision Making in Organizations

Centralized and Decentralized Decision Making in Organizations Centralize an Deentralize Deiion Making in Organization Ján Zábojník, Univerity of Southern California an Queen Univerity Thi artile ientifie a new type of ot aoiate with entralization. If worker are liquiity

More information

OpenSession: SDN-based Cross-layer Multi-stream Management Protocol for 3D Teleimmersion

OpenSession: SDN-based Cross-layer Multi-stream Management Protocol for 3D Teleimmersion : SN-based ross-layer Multi-stream Management Protool for 3 Teleimmersion hsan refin Raoul Rivas Rehana Tabassum Klara Nahrstedt University of Illinois at Urbana-hampaign, Urbana, IL {marefin2, trivas,

More information

RO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds

RO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds !111! 111!ttthhh IIIEEEEEEEEE///AAACCCMMM IIInnnttteeerrrnnnaaatttiiiooonnnaaalll SSSyyymmmpppoooiiiuuummm ooonnn CCCllluuuttteeerrr,,, CCClllooouuuddd aaannnddd GGGrrriiiddd CCCooommmpppuuutttiiinnnggg

More information

Lecture 13 Phonons: thermal properties

Lecture 13 Phonons: thermal properties Leture 1 Phonon: thermal propertie Lattie ontribution to the thermal propertie of olid, in -D Aim: Thermal propertie of a rytalline olid: Heat apaity: Debye treatment T law for low temperature heat apaity

More information

OPINION PIECE. It s up to the customer to ensure security of the Cloud

OPINION PIECE. It s up to the customer to ensure security of the Cloud OPINION PIECE It up to the cutomer to enure ecurity of the Cloud Content Don t outource what you don t undertand 2 The check lit 2 Step toward control 4 Due Diligence 4 Contract 4 E-dicovery 4 Standard

More information

Agile ALM White Paper: Redefining ALM with Five Key Practices

Agile ALM White Paper: Redefining ALM with Five Key Practices Agile ALM White Paper: Redefining ALM with Five Key Praties by Ethan Teng, Cyndi Mithell and Chad Wathington 2011 ThoughtWorks ln. All rights reserved www.studios.thoughtworks.om Introdution The pervasiveness

More information

Agent-Based Grid Load Balancing Using Performance-Driven Task Scheduling

Agent-Based Grid Load Balancing Using Performance-Driven Task Scheduling Agent-Based Grid Load Balaning Using Performane-Driven Task Sheduling Junwei Cao *1, Daniel P. Spooner, Stephen A. Jarvis, Subhash Saini and Graham R. Nudd * C&C Researh Laboratories, NEC Europe Ltd.,

More information

Partial optimal labeling search for a NP-hard subclass of (max,+) problems

Partial optimal labeling search for a NP-hard subclass of (max,+) problems Partial optimal labeling earch for a NP-hard ubcla of (max,+) problem Ivan Kovtun International Reearch and Training Center of Information Technologie and Sytem, Kiev, Uraine, ovtun@image.iev.ua Dreden

More information

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds Intelligent Measurement Proesses in 3D Optial Metrology: Produing More Aurate Point Clouds Charles Mony, Ph.D. 1 President Creaform in. mony@reaform3d.om Daniel Brown, Eng. 1 Produt Manager Creaform in.

More information