Cloud Storage for Small Cell Networks
|
|
- David James
- 8 years ago
- Views:
Transcription
1 Cloud Storage for Small Cell Network Ejder Baştuğ, Jean-Loui Guénégo, and Mérouane Debbah Alatel-Luent Chair - SUPÉLEC, Gif-ur-Yvette, Frane {ejder.batug, jean-loui.guenego, merouane.debbah}@upele.fr Abtrat The Maive dene deployment of Small Cell Network (SCN) i a promiing way of inreaing apaity. Interetingly, by having uh a huge amount of uer devie a well a mall ell deployed in indoor or outdoor area, one an take benefit of uh ditributed network for torage purpoe. Hene, Depending on the deployed enario, thee torage unit an alo be ued for ontent ahing to relieve the bakhaul ontraint and inreae the peak rate. In thi work, by extending onept of loud torage to SCN, we diu the theoretial hallenge in order to embed mall ell with torage apabilitie. We alo briefly introdue Open Cloud Protool (OCP) a a unified oftware torage framework. Index Term loud torage, private loud, ontent ahing, ditributed torage, Small Cell network, open loud protool. I. Introdution In the year of oial network, high demand of rih ontent treaming by the uer and/or mahine i puhing the apaity of the legay mobile wirele network up to the limit [1]. Beide advane in legay maro ell network (MCN), maively dene deployment of mall ell network (SCN) ha a partiular interet to overome thi iue [2]. Moreover, the market foreat expet almot fully SCN enario in the near future [3]. Although their attrativene, everal hallenge till exit. For intane, a the ell denity inreae, thee low-ot, energy-effiient, elf-onfigurable SCN beome more dependent to bakhaul ommuniation, due to their lower proeing ability ompared to MCN. Auming limited bakhaul apaity, even uing fiber-opti able, onneting all mall ell to the network i expenive. Therefore, by propoing SCN a a olution, one hould alo take into aount the apaity of the bakhaul. One novel approah for thi i to put high torage unit to mall ell and uing heap low-rate bakhaul, rather than highrate expenive alternative [4]. In thi work, we extend the idea of [4] by introduing onept of loud torage on SCN, and diu poible enario. We then give theoretial hallenge from the point of information theory, in the ontext of ditributed torage. We preent Open Cloud Protool (OCP) a a unified oftware framework, and we finally onlude. II. Senario Aording to National Intitute of Standard and Tehnology (NIST) definition of loud omputing [5], we an build up many enario depending on the deployment trategy (ee Fig. 1). A. Private loud It i a type of loud where a ingle organization erve multiple utomer in the network. In our ae, thi i typially a network operator that ue reoure of uer devie (i.e. mobile phone, laptop), mall ell, data enter or any ombination of them a a ditributed torage node. The operator an ue thi ditributed torage for ontent treaming or peritent torage purpoe. The work [4], [6] an be aumed a a private loud, where fixed number of mall ell are ued for the ontent treaming. B. Community loud Thi i the enario where peifi type of onumer in the ommunity make a loud for their miion. For intane, any uer in the mobile network an oially hare it mobile torage with other uer in order to join thi loud. C. Publi loud The loud i open to ue and it might be owned, managed, and operated by a buine, aademi or government organization or ombination of them. The loal information of a ity with augmented reality an be tored in the mall ell or in other type of node, and the publi uer an take benefit of thi ervie. D. Hybrid loud Any ombination of the loud above an alo be a loud. In ome ene, loud of loud might be alled a hybrid loud. III. Challenge By uing the notion of information theory, we an deribe poible hallenge into four ategorie: 1) ode deign, 2) erey, 3) ditributed torage alloation, and 4) proative heduling. Hereafter, we deribe them tep by tep. Note that the metri in the deign an hange depending on the mall ell and bakhaul deployment trategie. For example, we might have different metri with different variability for mall ell deployed in indoor, outdoor, hot-pot or rural area.
2 b) Community a) Private ) Publi d) Hybrid Figure 1: Poible enario on SCN. A. Code deign When we want to tore the information to a ditributed medium, ome of the node may be in fail and/or they may not be available. In order to be able to overome thee failure event, and be able to obtain thi ditributed information later on in a reliable way, we might need to introdue ome redundany. The mot redundant but reliable ae would be to tore that information between all the node, but in thi ae, the amount of the traffi overhead a well a torage effiieny might be non-deirable. Taking into aount thee ontraint, we need to deign the ode to ditribute the information among the network, and we need to be able to repair and/or deode it under the given performane. For the tate of art, maximum ditane eparable (MDS) ode offer uh a reliability by enoding k paket of the information into the n paket, where n > k. Then, we an uffiiently reover the original data. In the ontext of the ditributed torage, n enoded paket an be tored in n node ditributed in the network. After that, when a node fail, urrent node or inoming node an tart a repair proe in order to keep the ontant reliability. The repair proe i ategorized a funtional repair, exat repair and exat repair for the ytemati part [7]. The funtional repair ha been tudied theoretially in [8], but it ha ome pratial impliation due to the ontinuou update of the repairing and deoding funtion. Indeed, uh an operation may not be deirable, ine an eavedropper an detet the funtionality that dereae the onfidentiality of the private data. On the other hand, the exat repair problem i muh harder and yet open in general. Signifiant amount of work ha done in [8] and [7] aording to the different performane metri. The mot important metri are repair bandwidth and torage effiieny. For the olution thee extreme ae, exat minimum torage regenerating (MSR) ode [9] and exat minimum torage regenerating (MBR) ode [10], [11] have been propoed. B. Serey In the ditributed enario, an eavedropper an atively read the data tored in a ubet of torage node, or it may paively ae the information generated during enoding, repairing and deoding proee. For uh ae, the ditributed torage ytem hould be able to atify deired erey rate to protet the information. Previouly, [12], [13] have tudied a paive eavedropper ae, where it read the data tored in a ubet of l < k torage node, and it get the information from l < l node during the funtional repair proe. The work [12] haraterized the upper bound on the number of meage ymbol that we an tore eretly, and howed that the MSR ode an ahieve the erey under an appropriate etting. On the other hand, [13] extended the idea and gave an expliit ontrution way for both MSR and MBR ode. The reult of thee work are built on undeired funtional repair. Although, they are the firt tep toward the haraterization of the erey apaity in the ditributed torage. In ompliated enario, like onidering an open ditributed torage ytem where the information of intended node mut be kept eret to other, exiting ode annot be applied. Any information leakage from the intended node may reult with detetion of the determiniti enoding funtion from other node. Hene, one may ugget a eret key ommuniation on top of the regenerating ode. C. Ditributed torage alloation Conider a network where the node are not fully onneted to eah other, and the link between the node are apaity-limited. One a node requet it ditributed data
3 Crypt Split Send Figure 2: Storing and retrieving data in OCP. from another node in the network, there might be a ingle or everal link from the oure to the detination. In uh a ae, the bet option may not be the diret link -or the hortet path- due to the apaity ontraint and the random failure probability, where ubet of indiret path with ome ahing node may ahieve optimal information flow. Therefore, the ditributed torage alloation problem arie on how to pik the bet path and how to alloate the information on the temporary node during the flow. In [4], [6], the problem ha been tudied auming that a entral maro bae tation i ending information to it onneted uer, where a fixed amount of mall-ell are in harge of ahing the information to help the maro bae tation. The information ahed inide the high torage apaity mall ell i made of file with a given popularity ditribution, and the link from the uer to eah mall ell ha a finite tranmiion rate. Under thi etting, the optimal alloation to minimize the delay with repet to uer and file ha been found both for the oded and unoded file. On the other hand, for the apture of the burty and random behavior of the mall ell availability, the work [14], [15] have modeled the link between the uer and mall ell a an eraure hannel, i.e. the link i either withed on or withed off with ome probability, and the tati i known to the alloation ontroller. More peifially, [14] uppoe that only a random et of the mall ell are aeible, while [15] model eah link a the Bernoulli proe with a given eraure probability. D. Proative heduling We have deribed above the ditributed torage alloation problem for a given time intane auming that the loation of the node i fixed. However, in pratie, ome node may have mobility and make requet dynamially in different loation aro time intane. If mobility and requet pattern an be learned by the ytem [16] in a relatively long time ale (eaon, week, day, hour) and/or in a peifi event, then, we an deign our ahing and tranmiion mehanim more effiiently. Suh a ahing and heduling would offer a great flexibility in the network. A reent framework [17], [18] ignifiantly redue the outage apaity by prediting node requet and antiipating the data tranmiion prior to the atual requet ompared to a non-proative ae. Neverthele, the model i a implified queue ytem with aggregate apaity and doe not onider the torage problem. IV. Open Cloud Protool In thi etion, we introdue OCP a a unified oftware framework to eurely and reliably tore data in the network [19]. More preiely, eah OCP intalled devie in the network i alled a an OCP agent. The idea i to enable any eletroni devie with a memory and broadband internet ae to be a node of a ditributed ytem. Deired uer experiene ha to be ahieved through the following benefit: low ot torage, periteny, eurity, and performane of toring and retrieving data. OCP i deigned to allow an online torage market with many ator: onumer, provider and trader, it inlude billing funtionality. On the other hand, it target to have a flexible working arhiteture tarting from phyial layer to the top, inluding ability of working for different deployment enario a deribed above. A rough viualization of toring and retrieving data in OCP i hown in Fig. 2. A. Addre topology Every torage ytem ha the onept of addre, that allow it to know where an et an be tored inide it ontainer. Any ditributed torage ytem ha an addre topology, whih i a triplet(f, U, R) with F repreenting the addre format, U the et of all poible addree, alled the addre univere, and R being the repartition rule that peify for eah addre whih node i reponible for it and when. Any ditributed hah table (DHT) ha an addre topology. For intane CHORD [20], Kademlia [21] and Tapetry [22] have a ingle ring addre topology. The DHT ontent addreable network (CAN) ha a multidimenional box addre topology [23]. The partiularity of OCP i to have a multi-ring addre topology. B. Multiple Ring addre topology The multi-ring addre topology i a triplet(f, U, R) with F defined a a one field addre, U a a finite et,
4 n8 n7 n1 n2 n6 n10 n5 n3 n9 a a a Figure 3: Multiple Ring addre topology. and R a follow. Let u onider N ring, eah ring being a U repreentation a a ounter-lokwie direted ring. To eah node, i aigned a ring r and an element e of the ring whih ha an addre format. The ouple(r, e) i alled node id. Thi give to eah node a poition on one ring. A node B i ueor of a node A if and only if they are on the ame ring, and there i no node between them on thi ring, and node B i after A in the peified ring diretion. A node i reponible for all et with an addre between it and it ueor. The et of addree under the reponibility of a node i alled node reponibility area. Thi kind of topology allow to eaily manage redundany, and the ation to perform on node diappearing event. An example of thi topology i hown in Fig. 3. In the figure, we an ee a three ring addre topology with 10 node. The blak quare repreent an et loated at the addre a. Aording to the repartition rule R, a i under the reponibility of node n6, n5 and n9. The reponibility area of thee node are indiated with the arrow on the figure. C. Immutable et Client Cahe Storage Figure 4: Cahe on the road. n4 Owner agent OCP partiularity i to extenively ue immutable et and direted ayli graph (DAG) like GIT verioning ytem. An immutable et i an et that annot be modified. Thi i done by linking it ontent to it addre with a relation uh a addre = hah(ontent). An immutable et annot be updated while keeping it addre. So it beome diffiult for a node to modify an et. Another advantage of uing immutable et i that they an be ahed on any node. Thi allow a mehanim that we all a ahing on the road: when retrieving an et, the et an be ahed on all devie between the lient and the reponible node (ee Fig. 4). When a node reeive an et, it tore in it ahe if it i not reponible of it, ele it tore in it peritent torage area. Cahe poliie remove the et from the ahe when needed. Moreover, if the uer lient ha mobility, the ahing on the road mehanim will have an effet to keep data geographially loe to the lient. D. Mutable et OCP, however, ue mutable et for onnetion et. A onnetion et i an et tored at a peifi addre that an be retrieved by a uer without peifi information. For intane, OCP ue publi uer et. For a given uer with a login, the publi uer et i loated at addre = hah(login). OCP ue a well private uer et. For a given uer with a login and a paword, the private uer et i loated at addre = hah(f(login, paword)). The private uer et i a paword rypted et ontaining a pointer to the root of the uer ontainer, repreented and tored under a DAG. OCP mutable et annot be ahed. E. Uer et In OCP, all et belong to a peified uer. Thi allow the agent to publih billing report. All immutable et are enrypted with a uer eret key loated in the private uer et. When a uer tore a file, the file i plitted in many relatively mall blok that will be pread around the agent. F. Storing data To tore data on an OCP network, the uer tart an OCP agent ating a a lient. It reate an aount or ue it exiting one. The uer an login with an authentiation hallenge. The login tep onit to determine the addre of it publi and private uer et. Storing a data (file, tream, et.) onit of enrypting the data then plitting the enrypted data into blok and adding redundany through an eraure ode, and finally ending the blok on the OCP multiple ring addre topology DHT a immutable et organized in DAG (ee Fig. 2). Cahing on the road mehanim i ued. G. Retrieving data To retrieve data, the onneted uer retrieve all the addree of immutable et via the DAG root addre tored in the private uer et. Data i rebuilt from different blok uing eraure ode, and then derypted in order to be manipulated by the uer. H. Cahe and peritent torage OCP agent ha two kind of ontainer: one for toring data the agent i reponible for and another one for ahed immutable et. A a onequene, an OCP network an be ompoed of ahe oriented agent and peritent torage data agent. Thi help to have a torage network with independent peritene and performane apet.
5 V. Conluion By inreaing the apaity of wirele network with SCN, we have hown that we an take benefit of uh a huge network for ditributed torage. We have alled thi onept a loud torage on SCN. Giving thee poible enario and exiting tehnial hallenge, we believe that there will be extenive reearh and engineering work in thi diretion, in the near future. VI. Aknowledgment Thi reearh ha been upported by the ERC Starting Grant MORE (Advaned Mathematial Tool for Complex Network Engineering), and Alatel-Luent, within the Alatel-Luent Chair in Flexible Radio, Supéle. Referene [1] Cio, Cio viual networking index: Global mobile data traffi foreat update, , White Paper, [Online] [2] J. Hoydi, M. Kobayahi, and M. Debbah, Green mall-ell network, IEEE Vehiular Tehnology Magazine, vol. 6(1), pp , [3] Small Cell Forum, Small ell to make up almot 90% of all bae tation by 2016, [Online] [4] N. Golrezaei, K. Shanmugam, A. G. Dimaki, A. F. Molih, and G. Caire, Femtoahing: Wirele video ontent delivery through ditributed ahing helper, arxiv preprint: , [5] P. Mell and T. Grane, The nit definition of loud omputing, National Intitute of Standard and Tehnology, [6] N. Golrezaei, A. F. Molih, A. G. Dimaki, and G. Caire, Femtoahing and devie-to-devie ollaboration: A new arhiteture for wirele video ditribution, arxiv preprint: , [7] A. G. Dimaki, K. Ramhandran, Y. Wu, and C. Suh, A urvey on network ode for ditributed torage, Proeeding of the IEEE, vol. 99, [8] A. G. Dimaki, B. Godfrey, Y. Wu, M. J. Wainwright, and K. Ramhandran, Network oding for ditributed torage ytem, Information Theory, IEEE Tranation on, vol. 56, no. 9, pp , [9] K. V. Rahmi, N. B. Shah, P. V. Kumar, and K. Ramhandran, Exat regenerating ode for ditributed torage, in Communiation, Control, and Computing (Allerton 2009). 47th Annual Allerton Conferene on, pp , [10] C. Suh and K. Ramhandran, Exat regeneration ode for ditributed torage repair uing interferene alignment, arxiv preprint: , [11] Y. Wu and A. Dimaki, Reduing repair traffi for eraure oding-baed torage via interferene alignment, in Information Theory, (ISIT 2009). IEEE International Sympoium on, vol. 4, pp , [12] S. Pawar, S. Y. E. Rouayheb, and K. Ramhandran, On eure ditributed data torage under repair dynami, in Information Theory Proeeding (ISIT), 2010 IEEE International Sympoium on, p , [13] N. B. Shah, K. V. Rahmi, and P. V. Kumar, Informationtheoretially eure regenerating ode for ditributed torage, in GLOBECOM, Auiting, Texa, pp. 1 5, [14] D. Leong, A. G. Dimaki, and T. Ho, Ditributed torage alloation for high reliability, in Communiation (ICC), 2010 IEEE International Conferene on, pp. 1 6, [15] V. Ntrano, G. Caire, and A. G. Dimaki, Alloation for heterogenou ditributed torage, in Information Theory Proeeding (ISIT), 2012 IEEE International Sympoium on, pp , [16] V. Etter, M. Kafi, and E. Kazemi, Been There, Done That: What Your Mobility Trae Reveal about Your Behavior, in Mobile Data Challenge by Nokia Workhop, in onjuntion with Int. Conf. on Pervaive Computing, [17] H. E. Gamal, J. Tadrou, and A. Eryilmaz, Proative reoure alloation: Turning preditable behavior into petral gain, in Communiation, Control, and Computing (Allerton), th Annual Allerton Conferene on, pp , [18] J. Tadrou, A. Eryilmaz, and H. E. Gamal, Proative reoure alloation: Harneing the diverity and multiat gain, arxiv preprint: , [19] Open Cloud Protool, [Online] [20] I. Stoia, R. Morri, D. Karger, M. F. Kaahoek, and H. Balakrihnan, Chord: A alable peer-to-peer lookup ervie for internet appliation, SIGCOMM Comput. Commun. Rev., vol. 31, pp , Aug [21] P. Maymounkov and D. Mazière, Kademlia: A peer-to-peer information ytem baed on the xor metri, in Revied Paper from the Firt International Workhop on Peer-to-Peer Sytem, IPTPS 01, (London, UK, UK), pp , Springer- Verlag, [22] B. Zhao, L. Huang, J. Stribling, S. Rhea, A. Joeph, and J. Kubiatowiz, Tapetry: a reilient global-ale overlay for ervie deployment, vol. 22, pp , [23] S. Ratnaamy, P. Frani, M. Handley, R. Karp, and S. Shenker, A alable ontent-addreable network, SIGCOMM Comput. Commun. Rev., vol. 31, pp , Aug
An Incrementally Scalable Multiprocessor Interconnection Network with Flexible Topology and Low-Cost Distributed Switching.
An Inrementally Salable Multiproeor Interonnetion Network with Flexible Topology and Low-Cot Ditributed Swithing. 1. Introdution Ronald Poe, Vinent Fazio, Jon Well Department of Computer Siene, Monah Univerity,
More informationThe Branching Factor of Regular Search Spaces
The Branhing Fator of Regular Searh Spae Stefan Edelkamp Intitut für Informatik Am Flughafen 17 79110 Freiburg edelkamp@informatik.uni-freiburg.de Rihard E. Korf Computer Siene Department Univerity of
More information' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF
' R :::i:. ATIONAL :'.:::::: RETENTION ':: Compliane with the way you work, PRODUCT BRIEF In-plae Management of Unstrutured Data The explosion of unstrutured data ombined with new laws and regulations
More informationManaging Exclusivity and Windowing in Digital Content Value Chain
Exluivity and Windowing in Digital Content Ditribution Managing Exluivity and Windowing in Digital Content Value Chain Completed Reearh Paper I. Robert Chiang Gabelli Shool of Buine Fordham Univerity Bronx,
More informationFirms nowadays are increasingly proactive in trying to strategically capitalize on consumer networks and
Information Sytem Reearh Vol. 24, No. 1, Marh 2013, pp. 164 185 ISSN 1047-7047 (print) ISSN 1526-5536 (online) http://dx.doi.org/10.1287/ire.1120.0463 2013 INFORMS Engineering Optimal Network Effet via
More informationA Holistic Method for Selecting Web Services in Design of Composite Applications
A Holisti Method for Seleting Web Servies in Design of Composite Appliations Mārtiņš Bonders, Jānis Grabis Institute of Information Tehnology, Riga Tehnial University, 1 Kalu Street, Riga, LV 1658, Latvia,
More informationTHE USE OF FIBER WOOD AS EVAPORATIVE PAD PACKAGING MATERIAL
VI CONGRESSO NACIONAL DE ENGENHARIA MECÂNICA VI NAIONAL CONGRESS OF MECHANICAL ENGINEERING 18 a 21 de agoto de 2010 Campina Grande Paraíba - Brail Augut 18 21, 2010 Campina Grande Paraíba Brazil HE USE
More informationName: SID: Instructions
CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/
More informationPerformance Analysis of IEEE 802.11 in Multi-hop Wireless Networks
Performane Analysis of IEEE 80.11 in Multi-hop Wireless Networks Lan Tien Nguyen 1, Razvan Beuran,1, Yoihi Shinoda 1, 1 Japan Advaned Institute of Siene and Tehnology, 1-1 Asahidai, Nomi, Ishikawa, 93-19
More informationSAFE. Post-Tensioned Concrete Design Manual DESIGN OF SLABS, BEAMS AND FOUNDATIONIS REINFORCED AND POST-TENSIONED CONCRETE
SAFE DESIGN OF SLABS, BEAMS AND FOUNDATIONIS REINFORCED AND POST-TENSIONED CONCRETE Pot-Tenioned Conrete Deign Manual ISO SAF120108M5-Rev2 Berkeley, California, USA Verion 12 Deember 2010 Copyright Copyright
More informationGroup Mutual Exclusion Based on Priorities
Group Mutual Excluion Baed on Prioritie Karina M. Cenci Laboratorio de Invetigación en Sitema Ditribuido Univeridad Nacional del Sur Bahía Blanca, Argentina kmc@c.un.edu.ar and Jorge R. Ardenghi Laboratorio
More informationPerformance of Multiple TFRC in Heterogeneous Wireless Networks
Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding
More informationCHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY
Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad
More informationValue of Reverse Factoring in Multi-stage Supply Chains
Value o Revere Fatoring in Multi-tage Supply Chain Abtrat: We preent a mathematial model or integration, analyi, and optimization o operational and inanial proee within a upply hain. Speiially, we onider
More informationNovel Cable-Suspended RoboCrane Support
Novel Cable-Supene RoboCrane Support Robert L. William II Ohio Univerity Athen, Ohio R.L. William II, 5, Novel Cable-Supene RoboCrane Support, Inutrial Robot: An International Journal, (4): 6-. Keywor:
More informationComputer Networks Framing
Computer Networks Framing Saad Mneimneh Computer Siene Hunter College of CUNY New York Introdution Who framed Roger rabbit? A detetive, a woman, and a rabbit in a network of trouble We will skip the physial
More informationUnit 12: Installing, Configuring and Administering Microsoft Server
Unit 12: Installing, Configuring and Administering Mirosoft Server Learning Outomes A andidate following a programme of learning leading to this unit will be able to: Selet a suitable NOS to install for
More informationSZENT ISTVÁN UNIVERSITY
SZENT ISTVÁN UNIVERSITY BLOCK-ORIENTED MODELING OF SOLAR THERMAL SYSTEMS Thei of the dotoral (Ph.D.) diertation Jáno Buzá Gödöllő 2009 Dotoral hool denomination: Mehanial Engineering PhD Shool iene: Energeti
More informationGreen Cloud Computing
International Journal of Information and Computation Tehnology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 431-436 International Researh Publiations House http://www. irphouse.om /ijit.htm Green Cloud
More informationTap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms
Tap Into Smartphone Demand: Mobile-izing Enterprie Webite by Uing Flexible, Open Source Platform acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Tap Into Smartphone Demand:
More informationDISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection
More informationCluster-Aware Cache for Network Attached Storage *
Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,
More informationCASE STUDY ALLOCATE SOFTWARE
CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT
More informationProject Management Basics
Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management
More informationQueueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,
MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS
More informationA Keyword Filters Method for Spam via Maximum Independent Sets
Vol. 7, No. 3, May, 213 A Keyword Filters Method for Spam via Maximum Independent Sets HaiLong Wang 1, FanJun Meng 1, HaiPeng Jia 2, JinHong Cheng 3 and Jiong Xie 3 1 Inner Mongolia Normal University 2
More informationA New Optimum Jitter Protection for Conversational VoIP
Proc. Int. Conf. Wirele Commun., Signal Proceing (Nanjing, China), 5 pp., Nov. 2009 A New Optimum Jitter Protection for Converational VoIP Qipeng Gong, Peter Kabal Electrical & Computer Engineering, McGill
More informationInformation Security 201
FAS Information Seurity 201 Desktop Referene Guide Introdution Harvard University is ommitted to proteting information resoures that are ritial to its aademi and researh mission. Harvard is equally ommitted
More informationFOOD FOR THOUGHT Topical Insights from our Subject Matter Experts
FOOD FOR THOUGHT Topial Insights from our Sujet Matter Experts DEGREE OF DIFFERENCE TESTING: AN ALTERNATIVE TO TRADITIONAL APPROACHES The NFL White Paper Series Volume 14, June 2014 Overview Differene
More informationInvolute-Evolute Curve Couples in the Euclidean 4-Space
Int J Open Problem Compt Math Vol o June 9 Involute-volute Curve Couple in the ulidean -Spae min Özyılmaz Süha Yılmaz ge Univerity Faulty of Siene Dept of Math ornova-izmir urkey Dokuz ylül Univerity ua
More informationDISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com
More informationSettlement Analysis of Geosynthetic Reinforced Soil Retaining Walls at Foundation Level
Settlement Analyi of Geoyntheti Reinfored Soil Retaining Wall at Foundation Level Halil Murat Algın Aoiate Profeor, Department of Civil Engineering, Faulty of Engineering, Harran Univerity, Omanbey Campu,
More informationSLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments
2 th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing SLA-based Resoure Alloation for Software as a Servie Provider (SaaS) in Cloud Computing Environments Linlin Wu, Saurabh Kumar
More informationHenley Business School at Univ of Reading. Pre-Experience Postgraduate Programmes Chartered Institute of Personnel and Development (CIPD)
MS in International Human Resoure Management For students entering in 2012/3 Awarding Institution: Teahing Institution: Relevant QAA subjet Benhmarking group(s): Faulty: Programme length: Date of speifiation:
More informationBandwidth Allocation and Session Scheduling using SIP
JOURAL OF COUICAIS, VOL., O. 5, AUGUS 006 7 Bandwidth Alloation and Session Sheduling using SIP Hassan HASSA, Jean-arie GARCIA and Olivier BRU LAAS-CRS, oulouse, Frane Email: {hhassan}@laas.fr Abstrat
More informationA technical guide to 2014 key stage 2 to key stage 4 value added measures
A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool
More informationDataflow Features in Computer Networks
Magyar Kutatók 1. Nemzetközi Szimpóziuma 1 th International Symposium of Hungarian Researhers on Computational Intelligene and Informatis Gyula Max Budapest University of Tehnology and Eonomis, Department
More informationDeduplication with Block-Level Content-Aware Chunking for Solid State Drives (SSDs)
23 IEEE International Conferene on High Performane Computing and Communiations & 23 IEEE International Conferene on Embedded and Ubiquitous Computing Dedupliation with Blok-Level Content-Aware Chunking
More informationUNIVERSAL COMMAND GENERATOR FOR ROBOTICS AND CNC MACHINERY
UNIVERSAL COMMAND GENERATOR FOR ROBOTICS AND CNC MACHINERY A THESIS SUBMITTED TO THE GRADUATE SCHOOL OF NATURAL AND APPLIED SCIENCES OF MIDDLE EAST TECHNICAL UNIVERSITY BY ARDA AKINCI IN PARTIAL FULFILMENT
More informationTrade Information, Not Spectrum: A Novel TV White Space Information Market Model
Trade Information, Not Spetrum: A Novel TV White Spae Information Market Model Yuan Luo, Lin Gao, and Jianwei Huang 1 Abstrat In this paper, we propose a novel information market for TV white spae networks,
More informationTHE MODELLING AND CONTROL OF AN AUTOMOTIVE DRIVETRAIN
THE MODELLNG AND CONTROL OF AN AUTOMOTVE DRVETRAN Thei preented in partial ulilment o the requirement or the degree MASTER OF SCENCE N ENGNEERNG By Nihola M. Northote Supervior Dr. A.B. Taylor Department
More informationFour Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations
Four Way Companie Can Ue Open Source Social Publihing Tool to Enhance Their Buine Operation acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Four Way Companie Can Ue Open
More informationChannel Assignment Strategies for Cellular Phone Systems
Channel Assignment Strategies for Cellular Phone Systems Wei Liu Yiping Han Hang Yu Zhejiang University Hangzhou, P. R. China Contat: wliu5@ie.uhk.edu.hk 000 Mathematial Contest in Modeling (MCM) Meritorious
More informationDeadline-based Escalation in Process-Aware Information Systems
Deadline-based Esalation in Proess-Aware Information Systems Wil M.P. van der Aalst 1,2, Mihael Rosemann 2, Marlon Dumas 2 1 Department of Tehnology Management Eindhoven University of Tehnology, The Netherlands
More informationHierarchical Clustering and Sampling Techniques for Network Monitoring
S. Sindhuja Hierarhial Clustering and Sampling Tehniques for etwork Monitoring S. Sindhuja ME ABSTRACT: etwork monitoring appliations are used to monitor network traffi flows. Clustering tehniques are
More informationFEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS
Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC
More informationImproved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules
Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu
More information1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation
Proceeding on Privacy Enhancing Technologie 2015; 2015 (2):1 17 Reza Shokri* Privacy Game: Optimal Uer-Centric Data Obfucation Abtract: Conider uer who hare their data (e.g., location) with an untruted
More informationParametric model of IP-networks in the form of colored Petri net
Parametri model of IP-networks in the form of olored Petri net Shmeleva T.R. Abstrat A parametri model of IP-networks in the form of olored Petri net was developed; it onsists of a fixed number of Petri
More informationOn the Characteristics of Spectrum-Agile Communication Networks
1 On the Charateristis of Spetrum-Agile Communiation Networks Xin Liu Wei Wang Department of Computer Siene University of California, Davis, CA 95616 Email:{liu,wangw}@s.udavis.edu Abstrat Preliminary
More informationSELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE
SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE RAVI KUMAR G 1, C.MUTHUSAMY 2 & A.VINAYA BABU 3 1 HP Bangalore, Reearch Scholar JNTUH, Hyderabad, India, 2 Yahoo, Bangalore,
More informationnormally just an unencrypted channel over which plaintext early implementation has an implementation vulnerability
CS530 Authentiation in Aliation Bill Cheng htt://merlot.u.edu/530-0 Authentiation in Aliation Unix login elnet Rh/rlogin Sh HP (web browing) FP Window login E-mail (SMP, POP, IMAP) NFS Network ae ervie
More informationCIS570 Lecture 4 Introduction to Data-flow Analysis 3
Introdution to Data-flow Analysis Last Time Control flow analysis BT disussion Today Introdue iterative data-flow analysis Liveness analysis Introdue other useful onepts CIS570 Leture 4 Introdution to
More informationTECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS
TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS ICSRiM - University of Leeds Shool of Computing & Shool of Musi Leeds LS2 9JT, UK +44-113-343-2583 kia@i-maestro.org www.i-maestro.org,
More informationA Spam Message Filtering Method: focus on run time
, pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department
More informationLearning Curves and Stochastic Models for Pricing and Provisioning Cloud Computing Services
T Learning Curves and Stohasti Models for Priing and Provisioning Cloud Computing Servies Amit Gera, Cathy H. Xia Dept. of Integrated Systems Engineering Ohio State University, Columbus, OH 4310 {gera.,
More informationSebastián Bravo López
Transfinite Turing mahines Sebastián Bravo López 1 Introdution With the rise of omputers with high omputational power the idea of developing more powerful models of omputation has appeared. Suppose that
More informationOpenScape 4000 CSTA V7 Connectivity Adapter - CSTA III, Part 2, Version 4.1. Developer s Guide A31003-G9310-I200-1-76D1
OpenSape 4000 CSTA V7 Connetivity Adapter - CSTA III, Part 2, Version 4.1 Developer s Guide A31003-G9310-I200-1-76 Our Quality and Environmental Management Systems are implemented aording to the requirements
More informationApigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management
Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4
More informationUsing Live Chat in your Call Centre
Using Live Chat in your Call Centre Otober Key Highlights Yesterday's all entres have beome today's ontat entres where agents deal with multiple queries from multiple hannels. Live Chat hat is one now
More informationChapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS
Chapter Stoc and Their Valuation ANSWERS TO EN-OF-CHAPTER QUESTIONS - a. A proxy i a document giving one peron the authority to act for another, typically the power to vote hare of common toc. If earning
More informationAn Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism
An Effiient Network Traffi Classifiation Based on Unknown and Anomaly Flow Detetion Mehanism G.Suganya.M.s.,B.Ed 1 1 Mphil.Sholar, Department of Computer Siene, KG College of Arts and Siene,Coimbatore.
More informationPrice-based versus quantity-based approaches for stimulating the development of renewable electricity: new insights in an old debate
Prie-based versus -based approahes for stimulating the development of renewable eletriity: new insights in an old debate uthors: Dominique FINON, Philippe MENNTEU, Marie-Laure LMY, Institut d Eonomie et
More informationOptical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng
Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare
More informationHenley Business School at Univ of Reading. Chartered Institute of Personnel and Development (CIPD)
MS in International Human Resoure Management (full-time) For students entering in 2015/6 Awarding Institution: Teahing Institution: Relevant QAA subjet Benhmarking group(s): Faulty: Programme length: Date
More informationControl of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling
Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada
More informationA Comparison of Service Quality between Private and Public Hospitals in Thailand
International Journal of Business and Soial Siene Vol. 4 No. 11; September 2013 A Comparison of Servie Quality between Private and Hospitals in Thailand Khanhitpol Yousapronpaiboon, D.B.A. Assistant Professor
More informationFrom a strategic view to an engineering view in a digital enterprise
Digital Enterprise Design & Management 2013 February 11-12, 2013 Paris From a strategi view to an engineering view in a digital enterprise The ase of a multi-ountry Telo Hervé Paault Orange Abstrat In
More informationEmergency, Standby and Backup Power Connection Solutions
Emergency, Standby and Backup Power Connection Solution Don t be in the dark. Enuring that you are open for buine i within your power. Blackout, hurricane, lightning, flood, high wind. Power outage caued
More informationINTELLIGENCE IN SWITCHED AND PACKET NETWORKS
22-24 Setember, Sozool, ULGRI INTELLIGENCE IN SWITCHED ND PCKET NETWORKS Ivaylo Ivanov tanasov Deartment of teleommuniations, Tehnial University of Sofia, 7 Kliment Ohridski st., 1000, hone: +359 2 965
More informationPROCEEDS OF CRIME (BUSINESS IN THE REGULATED SECTOR) ORDER 2015
Proeeds of Crime (Business in the Regulated Setor) Order 2015 Artile 1 Statutory Doument No. 2015/0073 Proeeds of Crime At 2008 PROCEEDS OF CRIME (BUSINESS IN THE REGULATED SECTOR) ORDER 2015 Approved
More informationChapter 1 Microeconomics of Consumer Theory
Chapter 1 Miroeonomis of Consumer Theory The two broad ategories of deision-makers in an eonomy are onsumers and firms. Eah individual in eah of these groups makes its deisions in order to ahieve some
More informationINSIDE REPUTATION BULLETIN
email@inidetory.com.au www.inidetory.com.au +61 (2) 9299 9979 The reputational impact of outourcing overea The global financial crii ha reulted in extra preure on Autralian buinee to tighten their belt.
More informationSoftware Engineering Management: strategic choices in a new decade
Software Engineering : trategic choice in a new decade Barbara Farbey & Anthony Finkeltein Univerity College London, Department of Computer Science, Gower St. London WC1E 6BT, UK {b.farbey a.finkeltein}@ucl.ac.uk
More informationSHARESYNC SECURITY FEATURES
www.kyboxinnovation.com SHARESYNC SECURITY FEATURES ShareSync provide a high degree of ecurity and protection which allow adminitrator to: Aure compliance with ecurity bet practice Get full viibility over
More informationTHE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES
Proeedings of FEDSM 98 998 ASME Fluids Engineering Division Summer Meeting June 2-25, 998 Washington DC FEDSM98-529 THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES John D. Wright Proess
More informationA Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks
A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International
More informationImagery Portal Workshop #2 Department of Administrative Services, Executive Building Salem, Oregon May 11, 2006
ry Portal Workhop #2 Department of Adminitrative Service, Executive Building Salem, Oregon May 11, 2006 Workhop Purpoe: dicu the outcome of the phae 1 coping proce for development of an imagery portal
More informationAuction Mechanisms Toward Efficient Resource Sharing for Cloudlets in Mobile Cloud Computing
1 Auction Mechanim Toward Efficient Reource Sharing for Cloudlet in Mobile Cloud Computing A-Long Jin, Wei Song, Ping Wang, Duit Niyato, and Peijian Ju Abtract Mobile cloud computing offer an appealing
More informationA Context-Aware Preference Database System
J. PERVASIVE COMPUT. & COMM. (), MARCH 005. TROUBADOR PUBLISHING LTD) A Context-Aware Preferene Database System Kostas Stefanidis Department of Computer Siene, University of Ioannina,, kstef@s.uoi.gr Evaggelia
More informationROBÓTICA Servoposicionamiento y Estimación de Pose Usando Sensores Visuales: Teoría y Aplicaciones
V ESCUELA DE INVIERNO PARA LA DIVULGACION DE LA ROBÓTICA, NANOTECNOLOGIA Y NEUROCIENCIA Univeridad Ténia Federio Santa María 5 julio 2 ROBÓTICA Servopoiionamiento y Etimaión de Poe Uando Senore Viuale:
More informationReport 4668-1b 30.10.2010. Measurement report. Sylomer - field test
Report 4668-1b Meaurement report Sylomer - field tet Report 4668-1b 2(16) Contet 1 Introduction... 3 1.1 Cutomer... 3 1.2 The ite and purpoe of the meaurement... 3 2 Meaurement... 6 2.1 Attenuation of
More informationResearch Data Management ANONYMISATION
ANONYMISATION Sensitive Data Sensitive Data is information overing: The raial or ethni origin of the Data Subjet Politial opinions Religious or other beliefs of a similar nature Membership of trade unions
More informationAngelCast: Cloud-based Peer-Assisted Live Streaming Using Optimized Multi-Tree Construction
AngelCast: Cloud-based Peer-Assisted Live Streaming Using Optimized Multi-Tree Constrution Raymond Sweha Boston University remos@s.bu.edu Vathe Ishakian Boston University visahak@s.bu.edu Azer Bestavros
More informationSCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto
More informationBUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE
Progre In Electromagnetic Reearch Letter, Vol. 3, 51, 08 BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE S. H. Zainud-Deen Faculty of Electronic Engineering Menoufia
More informationMATE: MPLS Adaptive Traffic Engineering
MATE: MPLS Adaptive Traffi Engineering Anwar Elwalid Cheng Jin Steven Low Indra Widjaja Bell Labs EECS Dept EE Dept Fujitsu Network Communiations Luent Tehnologies Univ. of Mihigan Calteh Pearl River,
More informationComputational Analysis of Two Arrangements of a Central Ground-Source Heat Pump System for Residential Buildings
Computational Analysis of Two Arrangements of a Central Ground-Soure Heat Pump System for Residential Buildings Abstrat Ehab Foda, Ala Hasan, Kai Sirén Helsinki University of Tehnology, HVAC Tehnology,
More informationA Reputation Management Approach for Resource Constrained Trustee Agents
A Reputation Management Approah for Resoure Constrained rustee Agents Han Yu, Chunyan Miao, Bo An 2, Cyril Leung 3, and Vitor R. Lesser 4 Nanyang ehnologial University, Singapore 2 he Key Lab of Intelligent
More informationElectrician'sMathand BasicElectricalFormulas
Eletriian'sMathand BasiEletrialFormulas MikeHoltEnterprises,In. 1.888.NEC.CODE www.mikeholt.om Introdution Introdution This PDF is a free resoure from Mike Holt Enterprises, In. It s Unit 1 from the Eletrial
More informationChange Management Plan Blackboard Help Course 24/7
MIT 530 Change Management Plan Help Coure 24/7 Submitted by: Sheri Anderon UNCW 4/20/2008 Introduction The Univerity of North Carolina Wilmington (UNCW) i a public comprehenive univerity, one of the ixteen
More informationCentralized and Decentralized Decision Making in Organizations
Centralize an Deentralize Deiion Making in Organization Ján Zábojník, Univerity of Southern California an Queen Univerity Thi artile ientifie a new type of ot aoiate with entralization. If worker are liquiity
More informationOpenSession: SDN-based Cross-layer Multi-stream Management Protocol for 3D Teleimmersion
: SN-based ross-layer Multi-stream Management Protool for 3 Teleimmersion hsan refin Raoul Rivas Rehana Tabassum Klara Nahrstedt University of Illinois at Urbana-hampaign, Urbana, IL {marefin2, trivas,
More informationRO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds
!111! 111!ttthhh IIIEEEEEEEEE///AAACCCMMM IIInnnttteeerrrnnnaaatttiiiooonnnaaalll SSSyyymmmpppoooiiiuuummm ooonnn CCCllluuuttteeerrr,,, CCClllooouuuddd aaannnddd GGGrrriiiddd CCCooommmpppuuutttiiinnnggg
More informationLecture 13 Phonons: thermal properties
Leture 1 Phonon: thermal propertie Lattie ontribution to the thermal propertie of olid, in -D Aim: Thermal propertie of a rytalline olid: Heat apaity: Debye treatment T law for low temperature heat apaity
More informationOPINION PIECE. It s up to the customer to ensure security of the Cloud
OPINION PIECE It up to the cutomer to enure ecurity of the Cloud Content Don t outource what you don t undertand 2 The check lit 2 Step toward control 4 Due Diligence 4 Contract 4 E-dicovery 4 Standard
More informationAgile ALM White Paper: Redefining ALM with Five Key Practices
Agile ALM White Paper: Redefining ALM with Five Key Praties by Ethan Teng, Cyndi Mithell and Chad Wathington 2011 ThoughtWorks ln. All rights reserved www.studios.thoughtworks.om Introdution The pervasiveness
More informationAgent-Based Grid Load Balancing Using Performance-Driven Task Scheduling
Agent-Based Grid Load Balaning Using Performane-Driven Task Sheduling Junwei Cao *1, Daniel P. Spooner, Stephen A. Jarvis, Subhash Saini and Graham R. Nudd * C&C Researh Laboratories, NEC Europe Ltd.,
More informationPartial optimal labeling search for a NP-hard subclass of (max,+) problems
Partial optimal labeling earch for a NP-hard ubcla of (max,+) problem Ivan Kovtun International Reearch and Training Center of Information Technologie and Sytem, Kiev, Uraine, ovtun@image.iev.ua Dreden
More informationIntelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds
Intelligent Measurement Proesses in 3D Optial Metrology: Produing More Aurate Point Clouds Charles Mony, Ph.D. 1 President Creaform in. mony@reaform3d.om Daniel Brown, Eng. 1 Produt Manager Creaform in.
More information