WiMAX DBA Algorithm Using a 2-Tier Max-Min Fair Sharing Policy
|
|
|
- Jemimah Lang
- 10 years ago
- Views:
Transcription
1 WMAX DBA Algorthm Usng 2-Ter Mx-Mn Fr Shrng Polcy Pe-Chen Tseng 1, J-Yn Ts 2, nd Wen-Shyng Hwng 2,* 1 Deprtment of Informton Engneerng nd Informtcs, Tzu Ch College of Technology, Hulen, Twn [email protected] 2 Deprtment of Electrcl Engneerng, tonl Kohsung, Unversty of Appled Scences, Kohsung, Twn @kus.edu.tw, [email protected] Abstrct. IEEE leves mportnt ssues lke uplnk bndwdth llocton to vendors. Ths pper proposes WMAX DBA lgorthm usng 2-ter Mx- Mn Fr Shrng Polcy (2tMMFS-DBA). In the frst prt of the lgorthm, bndwdth reservtons re set frst for, then for n nd BE pplctons. ext, the mx-mn fr shrng polcy sets mxmum connecton demnds for bndwdth requests nd QoS provsonng. In the second prt, the IEEE MAC heder s modfed for pggybckng SS queue sttus messges to help bse sttons determne bndwdth llocton. 2tMMFS-DBA prortzes bndwdth provsonng. An opportunty cost functon bounds the cost of lloctng bndwdth to dfferent clsses so s to mntn selected revenue levels to the servce provder. Smulton shows the proposed dynmc provsonng scheme cn stsfy the bndwdth requrements for dfferent clsses of trffc wth overll mproved system throughput. Keywords: WMx, IEEE e, QoS, DBA. 1 Introducton The ncresng populrty of cellulr phones nd smlr devces s drvng the development of wreless communcton technology for voce, med nd hgh cpcty dt rte servces. Accordngly, IEEE e [1] s expected to support qulty of servce (QoS) for rel tme pplctons such s voce over IP (VoIP), vdeo stremng nd vdeo conferencng wth dfferent QoS requrements nd trnsmsson gurntee. IEEE e s Moble Brodbnd Wreless Access (A) s n extenson provdng for moble subscrber sttons (MSSs) nd cn even support MSSs movng t vehculr speeds. IEEE e lso provdes for combnng fxed nd moble brodbnd wreless ccess. Compred to wred nternet servce provders, A systems re cpble of fster deployment nd lower deployment cost. IEEE e s currently the most promsng medum ccess control (MAC) protocol for hgh-speed wreless ccess n both the developed nd developng world. At the MAC lyer, ech connecton belongs to sngle servce flow type nd s * Correspondng uthor. R.-S. Chng, T.-h. Km, nd S.-L. Peng (Eds.): SUComS 2011, CCIS 223, pp , Sprnger-Verlg Berln Hedelberg 2011
2 278 P.-C. Tseng, J.-Y. Ts, nd W.-S. Hwng chrcterzed by set of QoS prmeters. A number of uplnk schedulng mechnsms re defned, ncludng unsolcted bndwdth grnts, pollng nd contenton procedures. For uplnk schedulng servces, t supports fve servce flow types whch dentfy specfc sets of QoS prmeters: UGS (unsolcted grnt servce), e (extended rel-tme pollng servce), (rel-tme pollng servce), n (nonreltme pollng servce), nd BE (best effort). QoS n e s supported by lloctng ech connecton between the SS nd the BS (clled servce flow) to specfc QoS clss. Among them, UGS, e, re sutble for rel-tme multmed pplctons such s VoIP servces. Bsed on the IEEE stndrd [2], WMAX (Worldwde Interoperblty for Mcrowve Access) provdes hgh-speed dt ccess for vrous trnsmsson modes, e.g. pont-to-multpont lnks to portble nd fully moble Internet ccess. Two types of duplex methods seprte uplnk (UL) nd downlnk (DL) communcton sgnls: Tme Dvson Duplex (TDD) nd Frequency Dvson Duplex (FDD). IEEE defnes two operton modes: the mesh mode nd the pont-to-multpont (PMP) mode [3], [4]. In the mesh mode, drect communcton between SSs wthout the need of BS s supported. For the PMP mode (Fg. 1), multple SSs nd vrous publc networks re connected by BS. Fg. 1. Topology of WMAX PMP networks Implementton of the bndwdth llocton lgorthm ws not specfed n the stndrd [2]. A performnce chllenge n TDD systems s the determnton of the rto of downlnk to uplnk cpctes. TDD cn hndle flexbly both symmetrc nd symmetrc brodbnd trffc. Symmetrc trffc usng n equl splt between uplnk nd downlnk chnnels my led to neffcent bndwdth utlzton. Asymmetrc trffc, such s ADSL, more demnd for downlodng nd less for uplodng, mkes the bndwdth rto determnton problem even more complcted when the trnsport lyer ssue s tken nto ccount. The lst mle ccess for resdentl users tends to be symmetrc. Chng [5] proposed n Adptve Bndwdth Allocton Scheme (ABAS) nd Le [6] proposed CQQ scheme, dynmclly djust the Downlnk/Uplnk (DL/UL) bndwdth to mtch current DL/UL trffc n order to get better chnnel qulty, but the method requres more complcted computng, resultng n reduced prctcl pplcblty. Chou [7] proposed the UBAR protocol (uplnk bndwdth llocton nd recovery), whch employs proportonlly fr shrng scheme for effcent
3 WMAX DBA Algorthm Usng 2-Ter Mx-Mn Fr Shrng Polcy 279 bndwdth utlzton nd further dopts tmeout-bsed UL-MAP retrnsmsson scheme wth uplnk bndwdth rellocton lgorthms to solve smultneously bndwdth wste problems. But UBAR ncreses system complexty by modfyng the TDD ccess mode. Wth regrd to opportunty cost consderton, Bder [8] proposed wht cn be clled the Rev scheme, whch spns multple tme slots/frmes nd optmlly lloctes them to the dfferent clsses of trffc dependng on ther weghts, the rel-tme bndwdth requrements of ther connectons, the chnnel qulty condtons nd the expected obtned revenues, but ths scheme leds to lest prorty trffc BE strvton, therefore flng to cheve optmzed frness. Thus, Ts [9] proposed the MMFS-DBA lgorthm ( WMAX DBA lgorthm usng Mx-Mn Fr Shrng Polcy). Ths system results n rel-tme drop n clls due to nsuffcent rel-tme bndwdth reservton becuse no clssfcton of rel-tme nd non-reltme pplcton trffc s ncluded t the strt. The remnder of ths study wll focus on the ssue of mplementton of n effcent bndwdth llocton lgorthm, such s s not specfed n the IEEE stndrd. Ths pper proposes hgh performnce WMAX DBA (Dynmc Bndwdth Allocton) lgorthm usng 2-ter Mx-Mn Fr Shrng Polcy (2tMMFS-DBA). Ths lgorthm dopts bndwdth reservtons nd the mx-mn fr shrng polcy (MMFS) for effcent llocton of bndwdth. The rest of ths pper s structured s follows: secton 2 descrbes the proposed 2tMMFS-DBA lgorthm. Smulton results re found n secton 3. A fnl summry s presented n concludng secton. 2 2tMMFS-DBA Algorthm The presented 2tMMFS-DBA lgorthm s dvded nto two prts. In the frst prt of the lgorthm, trffc clssfcton, bndwdth reservton nd QoS provsonng re performed,.e. the dfferent bndwdth reservtons re set. The mx-mn fr shrng polcy (MMFS) s used for the mxmum connecton demnd for requested bndwdth, wth QoS provsonng for pplctons. The requested bndwdth s llocted frst to pplctons, then to n pplctons nd fnlly to BE pplctons. BE pplctons hve the lest prorty,.e they hve no QoS gurntee. To vod strvton of BE pplctons, ech pplctons hs weghtng fctor to mke sure ech cheves reltve QoS gurntee, wth BE chevng t lest mnmum vlble bndwdth to keep the BE lve n the WMAX network. In the second prt of the lgorthm, the two reserved felds of the IEEE generc MAC heder re modfed v montorng of the SS queue sttus for urgent pckets whch need to be trnsmtted before other pckets. It lso montors remnng pckets n the SS queue. SSs re lso llowed to sk for bndwdth v PggyBck messges to the BS. Under the condton no requrng ddtonl overhed, ths llows the BS to mke decsons for effcent llocton of bndwdth. The 2tMMFS-DBA scheme especlly consders QoS prorty for optml llocton of BS bndwdth to the SSs wth regrd to qulty nd system performnce for rel-tme pplcton servces. The 2tMMFS-DBA method of BS llocton of bndwdth to the SSs mproves the current IEEE network, provdng better QoS qulty for multmed servces.
4 280 P.-C. Tseng, J.-Y. Ts, nd W.-S. Hwng 2.1 Bndwdth Reservton for Connecton Ths pper proposes dynmc bndwdth provsonng scheme for future brodbnd wreless systems. The proposed scheme s desgned to ccommodte mult-clss trffc wth multple connectons hvng dfferent bndwdth requrements nd vryng chnnel qulty condtons. The mn objectve of our scheme s to optmlly llocte bndwdth or the correspondng tme frmes for ech clss of trffc n order to stsfy the bndwdth requrements of ther connectons. In ddton, the proposed scheme unquely ncorportes nd bounds the cost (n terms of revenue loss) of bndwdth provsonng through n opportunty cost functon. Ths provdes greter flexblty to servce provders for determnng the levels of bndwdth provsonng to dfferent trffc clsses so s to gurntee certn level of revenue. To gurntee the rel-tme pplcton servces hve hgher QoS prorty, ths pper frstly consders the proporton,.e. the number of connectons occupyng the number of totl connectons, thereby llowng determnton of reserve connecton bndwdth res _ s n equton (1). Ths ensures tht connectons hve hgher QoS gurntee. The notton n ths pper s s follows: W : the number of connectons : the system weghtng vlue for mxmum connectons c : the totl number of system connectons : the totl system bndwdth for the BS res _ : the bndwdth reservton for tot res_ mx : the mxmum bndwdth reservton for res _ = W res _ mx, tot, f f c c > W W (1) Mx-Mn Fr Bndwdth Shrng In order to stsfy the mxmum bndwdth request for the SS connecton, ths pper extends the Mx-Mn Fr Shrng Polcy (MMFS), frst usng equtons (2) nd (3) to obtn the verge bndwdth of the nd (n +BE) connectons, desgnted respectvely vg _ nd vg _ n + BE. Then the Mx-Mn Fr Bndwdth Shrng polcy s executed to stsfy the demnds of the mxmum bndwdth request of the nd (n +BE) connectons. = vg _ res _ ( 2) vg _ n + BE tot = c res _ (3)
5 WMAX DBA Algorthm Usng 2-Ter Mx-Mn Fr Shrng Polcy 281 It s frst determned whether the reserved bndwdth res _ for the connecton s equl to or greter thn the entre bndwdth request of the connecton ( req, ). If YES, then there s enough bndwdth for the entre bndwdth request of the connecton, so the reservton bndwdth s llocted to the connecton s n equton (4), where s the number of SS nd δ s the bndwdth llocted to SS. Otherwse, when the reserved bndwdth res _ s less thn the entre bndwdth request of the connecton ( ), then the reserved bndwdth s req, nsuffcent for the entre bndwdth request of the connecton. In ths cse,.e. req, > vg, so the MMFS scheme n equton (2) s executed to llocte the _ mnmum necessry bndwdth R to the connecton, otherwse lloctng the mn necessry bndwdth request to the connecton, s n equton (5). req, req,, f req, vg _ δ = (5) Rmn, f req, > vg _ Smlrly, bndwdth s llocted to the n, BE connecton usng the sme wy s n equtons (1) to (5). After llocton, the nformton must be updted s n equton (6). s the remnder of the vlble bndwdth. The 2nd prt wll execute f > 0 n the 1st run of 2tMMFS-DBA scheme. The frst prt of the 2tMMFS-DBA scheme s for pplcton servce wth the gretest QoS gurntee. Thus, the servce s hndled frst, clcultng the verge bndwdth vg for ech servce flow, then executng the MMFS scheme for fr llocton of the bndwdth. After servce trffc llocton s completed, smlr process s performed for non-rel-tme pplcton servce nd fnlly for the BE servce. 2.2 Evluton of SS Queue Sttus δ = req, A request my be corrupted due to collson when SSs perform bndwdth requests. Km [10] proposed modfng the IEEE generc MAC heder n order to let n SS pss the messge to the BS by trnsmttng dt, so the BS llows the SS bndwdth request f no collson occurs. Ths de s extended n the second prt of the 2tMMFS-DBA lgorthm, usng two reserved bts n the IEEE generc MAC heder, one for the Crtcl Dt bt ( CD), the other for the Bcklogged Dt bt ( BD ) s shown n Fg. 2. As result, wth no ddtonl SS overhed, the BS gets mportnt nformton v n SS Pggybck messge whch montors the pcket sttus of the SS queue, ncludng evluton of crtcl dt nd/or bcklogged dt pckets n the SS queue. The CD bt s for urgent pckets tht need to be trnsmtted n the SS queue. The BD bt s for pckets not yet trnsmtted n the SS queue. The BS cn use ths nformton to llocte bndwdth more effcently. = tot c 1 δ (4) (6)
6 282 P.-C. Tseng, J.-Y. Ts, nd W.-S. Hwng Fg. 2. IEEE generc MAC heder Becuse of rel-tme servce must tke more better cre of pcket dely tme, therefore need hgher QoS prorty to gurntee qulty. Accordngly, the second prt of the 2tMMFS-DBA system, wth reference to [9], [11], clcultes the pcket dely expry tme Dedlne s n equton (7) nd the expected Remn k Tme RemnTme t for pcket send-out s n equton (8). In equton (7), the r pcket dely expry tme Dedlne s the pcket rrvng tme k ArrvlTm e t plus 0 MxLtency. In equton (8), the expected Remn Tme RemnTme t for pcket k r to send out, s Dedlne mnus the system current tme k CurrentTm e t, where k s c the trnsmttng pcket number. The Crtcl Dt CD bt s set to 1 f RemnTme t r s not more thn one Frme Durton tme, s equton (9). Ths mens tht t s urgent tht the pcket be sent out. Dedlne k = ArrvlTme t 0 + MxLtency (7) RemnTmet = Dedlne CurrentTme t r If tr Frme Durton then CD bt = "1" k c (8) (9) After the full run (, n, BE) of the frst prt of the 2tMMFS-DBA lgorthm, the rest of the bndwdth s ssgned vergely to the crtcl servce flow n the SS queue. In equton (10), ns, ndctes the nsuffcent bndwdth request for servce connecton fter runnng of the frst prt of 2tMMFS-DBA. In equton (11), α s the verge proporton to the rest of the bndwdth for the nsuffcent request bndwdth for servce connecton. The gol of equton (12) s to lmt the obtned bndwdth so tht s not greter thn the orgnl request bndwdth for servce connecton. Then equton (13) s used to updte the rest of the bndwdth. Smlr methodology s used to llocte bndwdth to the crtcl n nd BE connectons s n equtons (10), (11) nd (12). α = = δ ns, req, ns, SS CDbt= " 1" ns, δ + α, f (δ + α ) < δ = req,, f (δ + α ) req, req, (10) (11) (12)
7 WMAX DBA Algorthm Usng 2-Ter Mx-Mn Fr Shrng Polcy 283 = 1 δ (13) After the bove process, the Bcklogged Dt BD bt n the IEEE generc MAC heder s chnged to 1 f there s servce stll left n SS queue, s n equton (14). For BSs recevng ths nformton (.e. BD mrked to 1 ), the rest of the bndwdth s ssgned vergely to the servce flow n the SS queue. ns, s the nsuffcent request bndwdth for servce connecton fter full run of the frst prt of 2tMMFS-DBA. In equton (15), β s the verge proporton to the rest of the bndwdth for the ns, for servce connecton. Equton (16) ensures the obtned bndwdth s not greter thn the orgnl request bndwdth for servce connecton. Then equton (17) s used to updte the rest of the bndwdth. Smlr methodology s used to llocte bndwdth to the crtcl n nd BE connectons s n equtons (14), (15) nd (16). If szeof ( SS ) > 0 then BD bt = " 1" (14) β = ns, = BDbt " 1" ns, (15) δ + β, f δ = req,, f (δ + β ) < (δ + β ) req, req, (16) = 1 δ (17) 3 Smulton Results Ths pper focuses on the IEEE pont-to-multpont (PMP) mode, whch s the prmry opertng mode of WMAX for resdentl users. Under PMP, the IEEE e wreless network wth centrl BS serves severl SSs nd ech SS communctes wth the BS drectly (Fg. 1). To evlute performnce, 2tMMFS-DBA functonlty s smulted by the SIMSCRIPT II.5 lnguge for numercl nlyss. The system weghtng vlue s 0.3. The BS bndwdth s 20 Mbps. The entry possblty of UGS,, n, BS s 30%, 50%, 70%, 100%, respectvely. Ths mens for exmple, f the number of the connectons =100, then UGS gets 30 (=100*30%), gets 35 (=(100-30)*50%), n gets 24.5(=(70-35)*70%) nd BE gets 10.5(=( )*100%). In order to obtn more detled smulton vlues, the number of SSs s ncresed by 5. Compred wth Bder s Rev scheme [8], Fg. 3 shows tht droppng rte of the proposed lgorthm s 12.44% lower (better) for connectons when the number of SSs s over 35. At the sme tme, t s 2% hgher (worse) for n connectons, 1.17% hgher (worse) for BE connectons. Fg. 5 shows tht the throughput of the proposed lgorthm s 1.2 Mbps hgher (better) when the number of SSs over 10.
8 284 P.-C. Tseng, J.-Y. Ts, nd W.-S. Hwng Fg. 3. Droppng rte for Rev vs 2tMMFS Fg. 4. Droppng rte for MMFS vs 2tMMFS Fg. 5. Throughput for Rev vs 2tMMFS Compred wth Ts s MMFS scheme [9], Fg. 4 shows tht droppng rte of the proposed lgorthm s 5.35% lower (better) for connectons when the number of SSs over 35. At the sme tme, t s 4.15% hgher (worse) for n connectons nd 10.57% hgher (worse) n BE connectons. Fg. 6 shows tht the throughput of the proposed lgorthm s 0.17 Mbps hgher (better) when the number of SSs over 10. The results show tht the proposed lgorthm delvers better QoS for the prortzed users, wth overll better system throughput.
9 WMAX DBA Algorthm Usng 2-Ter Mx-Mn Fr Shrng Polcy 285 Fg. 6. Throughput for MMFS vs 2tMMFS 4 Conclusons Future brodbnd wreless systems wll support wde rnge of multmed pplctons for moble users. However, to mxmze user experence, bndwdth provsonng s crtcl. In ths pper, novel bndwdth provsonng scheme for brodbnd wreless network s proposed. The proposed scheme llows for prortzed bndwdth provsonng to dfferent clsses of trffc for support of multple connectons wth dfferent bndwdth requrements. It lso ncorportes unque opportunty cost functon to bound the cost of lloctng bndwdth to dfferent clsses so s to mntn certn revenue levels to the servce provder. Smulton results revel the presented 2tMMFS-DBA lgorthm effcently lloctes bndwdth for mproved urgent multmed requrements nd provdes hgher QoS gurntees n IEEE e networks, wth overll enhnced system throughput. Fxed clss weghts, however, cnnot cheve optmzed frness snce the performnce of ech clss s not fxed due to the vryng bndwdth requrements nd vryng chnnel qulty condtons. Thus, our future work wll study dynmc weght updte scheme to compute dynmclly the weghts of dfferent clsses of trffc bsed on ther performnce hstory n order to mxmze nter-clss frness. Ths wy, the resultng frness wll be more dptve to the performnce of the clsses snce t s bsed on ther performnce hstory. Acknowledgments. Ths reserch ws supported by tonl Scence Councl of Twn under project number SC E References 1. IEEE Std eTM -2005: IEEE Stndrd for Locl nd Metropoltn Are etworks Prt 16: Ar Interfce for Fxed nd Moble Brodbnd Wreless Access Systems - Amendment 2: Physcl nd Medum Access Control Lyers for Combned Fxed nd Moble Operton n Lcensed Bnds (2006) 2. IEEE : IEEE stndrd for Locl nd Metropoltn Are etworks -Prt 16: Ar Interfce for Fxed Brodbnd Wreless Access Systems (2004) 3. L, B., Qn, Y., Low, C.P., Gwee, C.L.: A Survey on Moble WMAX. IEEE Communctons Mgzne 45(12), (2007)
10 286 P.-C. Tseng, J.-Y. Ts, nd W.-S. Hwng 4., Q., Vnel, A., Xo, Y., Turlkov, A., Jng, T.: Investgton of Bndwdth Request Mechnsm under Pont-to-Multpont Mode of WMAX etworks. IEEE Communctons Mgzne 45(5), (2007) 5. Chng, C.H., Lo, W.J., Lu, T.H.: Adptve Downlnk/Uplnk Bndwdth Allocton n IEEE (WMAX) Wreless etworks: A Cross-Lyer Approch. In: IEEE Globl Telecommunctons Conference, pp (2007) 6. L, Y.C., Chen, Y.H.: A Chnnel Qulty nd QoS Awre Bndwdth Allocton Algorthm for IEEE Bse Sttons. In: 22nd Interntonl Conference on Advnced Informton etworkng nd Applctons, pp (2008) 7. Chou, Z.T., Ln, Y.H.: Bndwdth Allocton nd Recovery for Uplnk Access n IEEE Brodbnd Wreless etworks. In: IEEE 66th Vehculr Technology Conference, pp (2007) 8. Bder, A.M., Abu, A.., dl,., Hossm, H.: Dynmc Bndwdth Provsonng wth Frness nd Revenue Consdertons for Brodbnd Wreless Communcton. In: IEEE Interntonl Conference on Communctons, pp (2008) 9. Ts, M.Y., Hwng, W.S.: A Hgh Performnce WMAX DBA Algorthm by Usng Mx- Mn Fr Shrng Polcy. In: 5th Workshop on Wreless, Ad Hoc nd Sensor etworks, D1-2 (2009) 10. Km, S.J., Km, W.J., Suh, Y.J.: An Effcent Bndwdth Request Mechnsm for on- Rel-Tme Servces n IEEE Systems. In: 2nd Interntonl Conference on Communcton Systems Softwre nd Mddlewre, pp. 1 9 (2007) 11. Lng, C.C., Sho, S.K., Yu, J.C., Wu, J.S.: A ewly Proposed Bndwdth Allocton Algorthm for IEEE Wreless Access Systems. In: Interntonl Symposum on Communctons nd Informton Technologes, pp (2008)
Optimal Pricing Scheme for Information Services
Optml rcng Scheme for Informton Servces Shn-y Wu Opertons nd Informton Mngement The Whrton School Unversty of ennsylvn E-ml: [email protected] e-yu (Shron) Chen Grdute School of Industrl Admnstrton
A Hadoop Job Scheduling Model Based on Uncategorized Slot
Journl of Communctons Vol. 10, No. 10, October 2015 A Hdoop Job Schedulng Model Bsed on Unctegored Slot To Xue nd Tng-tng L Deprtment of Computer Scence, X n Polytechnc Unversty, X n 710048, Chn Eml: [email protected];
Incorporating Negative Values in AHP Using Rule- Based Scoring Methodology for Ranking of Sustainable Chemical Process Design Options
20 th Europen ymposum on Computer Aded Process Engneerng ECAPE20. Perucc nd G. Buzz Ferrrs (Edtors) 2010 Elsever B.V. All rghts reserved. Incorportng Negtve Vlues n AHP Usng Rule- Bsed corng Methodology
ALABAMA ASSOCIATION of EMERGENCY MANAGERS
LBM SSOCTON of EMERGENCY MNGERS ON O PCE C BELLO MER E T R O CD NCY M N G L R PROFESSONL CERTFCTON PROGRM .. E. M. CERTFCTON PROGRM 2014 RULES ND REGULTONS 1. THERE WLL BE FOUR LEVELS OF CERTFCTON. BSC,
Irregular Repeat Accumulate Codes 1
Irregulr epet Accumulte Codes 1 Hu Jn, Amod Khndekr, nd obert McElece Deprtment of Electrcl Engneerng, Clforn Insttute of Technology Psden, CA 9115 USA E-ml: {hu, mod, rjm}@systems.cltech.edu Abstrct:
Fuzzy Clustering for TV Program Classification
Fuzzy Clusterng for TV rogrm Clssfcton Yu Zhwen Northwestern olytechncl Unversty X n,.r.chn, 7007 [email protected] Gu Jnhu Northwestern olytechncl Unversty X n,.r.chn, 7007 [email protected] Zhou Xngshe
YOU FINALLY FINISHED YOUR FILM. NOW WHAT? Distributor...? Sales agent...? GOT IT: SELF DISTRIBUTION
YOU FINALLY FINISHED YOUR FILM. NOW WHAT? Dstrbutor...? Sles gent...? GOT IT: SELF DISTRIBUTION THE ADVANTAGES OF SELF DISTRIBUTION: A gurnteed openng n NY / LA prme theter nd you keep 100% of the boxoffce.
Newton-Raphson Method of Solving a Nonlinear Equation Autar Kaw
Newton-Rphson Method o Solvng Nonlner Equton Autr Kw Ater redng ths chpter, you should be ble to:. derve the Newton-Rphson method ormul,. develop the lgorthm o the Newton-Rphson method,. use the Newton-Rphson
Operating Network Load Balancing with the Media Independent Information Service for Vehicular Based Systems
CHI MA et l: OPERATING NETWORK LOAD BALANCING WITH THE MEDIA INDEPENDENT... Opertng Network Lod Blncng wth the Med Independent Inforton Servce for Vehculr Bsed Systes Ch M, End Fllon, Yunsong Qo, Brn Lee
Fuzzy Logic Based Anomaly Detection for Embedded Network Security Cyber Sensor
INL/CON-10-20411 PREPRINT Fuzzy Logc Bsed Anomly Detecton for Embedded Network Securty Cyber Sensor 2011 IEEE Symposum on Computtonl Intellgence n Cyber Securty Ondre Lnd Mlos Mnc Todd Vollmer Json Wrght
Lesson 28 Psychrometric Processes
1 Lesson 28 Psychrometrc Processes Verson 1 ME, IIT Khrgpur 1 2 The specfc objectves of ths lecture re to: 1. Introducton to psychrometrc processes nd ther representton (Secton 28.1) 2. Importnt psychrometrc
Reasoning to Solve Equations and Inequalities
Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing
ORIGIN DESTINATION DISAGGREGATION USING FRATAR BIPROPORTIONAL LEAST SQUARES ESTIMATION FOR TRUCK FORECASTING
ORIGIN DESTINATION DISAGGREGATION USING FRATAR BIPROPORTIONAL LEAST SQUARES ESTIMATION FOR TRUCK FORECASTING Unversty of Wsconsn Mlwukee Pper No. 09-1 Ntonl Center for Freght & Infrstructure Reserch &
IMPACT ANALYSIS OF A CELLULAR PHONE
4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng
The CAT model: Predicting air temperature in city streets on the basis of measured reference data
The CAT model: Predctng r temperture n cty streets on the bss of mesured reference dt Evytr Erell 1 nd Terry Wllmson 2 1 The J. Blusten Insttute For Desert Reserch, Ben-Guron Unversty of the Negev, Sde
A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture
A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton
Joint Opaque booking systems for online travel agencies
Jont Opque bookng systems for onlne trvel gences Mlgorzt OGOOWSKA nd Domnque TORRE Mrch 2010 Abstrct Ths pper nlyzes the propertes of the dvnced Opque bookng systems used by the onlne trvel gences n conjuncton
Resistive Network Analysis. The Node Voltage Method - 1
esste Network Anlyss he nlyss of n electrcl network conssts of determnng ech of the unknown rnch currents nd node oltges. A numer of methods for network nlyss he een deeloped, sed on Ohm s Lw nd Krchoff
Research on performance evaluation in logistics service supply chain based unascertained measure
Suo Junun, L Yncng, Dong Humn Reserch on performnce evluton n logstcs servce suppl chn bsed unscertned mesure Abstrct Junun Suo *, Yncng L, Humn Dong Hebe Unverst of Engneerng, Hndn056038, Chn Receved
Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
QoS Mechanisms C HAPTER 3. 3.1 Introduction. 3.2 Classification
C HAPTER 3 QoS Mechnisms 3.1 Introduction In the previous chpter, we introduced the fundmentl QoS concepts. In this chpter we introduce number of key QoS mechnisms tht enble QoS services. At the end of
Luby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments
Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn
Study on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
MONITORING METHODOLOGY TO ASSESS THE PERFORMANCE OF GSM NETWORKS
Electronc Communcatons Commttee (ECC) wthn the European Conference of Postal and Telecommuncatons Admnstratons (CEPT) MONITORING METHODOLOGY TO ASSESS THE PERFORMANCE OF GSM NETWORKS Athens, February 2008
On the System Dynamics of the Logistic Risk of Marketing Channels
1194 JOURNAL OF SOFTWARE, VOL. 8, NO. 5, MAY 2013 On the System Dynmcs of the Logstc Rsk of Mrketng Chnnels Yng M School of Mngement, Wuhn Unversty of Technology, Wuhn, Chn Eml: [email protected] Fe Feng
A Performance Study of Uplink Scheduling Algorithms in Point to Multipoint WiMAX Networks
A Performance Study of Uplnk Schedulng Algorthms n Pont to Multpont WMAX Networks by Pratk Dhrona A thess submtted to the School of Computng n conformty wth the requrements for the degree of Master of
A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing
A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure
Vehicle Navigation System Integration with GPS/INS/GSM
Chun Hu Journl of Scence nd Enneern, ol.,no., pp.3-(3) ehcle Nvton System Interton wth GPS/INS/GSM Jum-Mn Ln Chen-Wen Hun, nd Fon-Lon Ts Insttute of Aeronutcs nd Astronutcs Chun-Hw Unversty Hsn-Chu 3,
Small Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
QoS-Aware Active Queue Management for Multimedia Services over the Internet
QoS-Aware Actve Queue Management for Multmeda Servces over the Internet I-Shyan Hwang, *Bor-Junn Hwang, Pen-Mng Chang, Cheng-Yu Wang Abstract Recently, the multmeda servces such as IPTV, vdeo conference
Small Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1
Send Orders for Reprnts to [email protected] The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,
Small Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
Experiment 6: Friction
Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht
Hosted Voice Self Service Installation Guide
Hosted Voce Self Servce Installaton Gude Contact us at 1-877-355-1501 [email protected] www.earthlnk.com 2015 EarthLnk. Trademarks are property of ther respectve owners. All rghts reserved. 1071-07629
M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS
M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty
LIFETIME INCOME OPTIONS
LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com
Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts
Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)
Loyalty Program and Customer Retention of Bank Credit Cards --an Logistic Regression Analysis based on Questionnaires
oylty Progrm nd Customer Retenton of Bnk Credt Crds --n ogstc Regresson nlyss sed on Questonnres ZHU Qn IN Runyo College of Economcs Zhejng Gongshng Unversty P.R.Chn 310014 strct To Chnese credt crd ssuers
DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report
DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of
Small Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
Network Services Definition and Deployment in a Differentiated Services Architecture
etwork Servces Defnton and Deployment n a Dfferentated Servces Archtecture E. kolouzou, S. Manats, P. Sampatakos,. Tsetsekas, I. S. Veners atonal Techncal Unversty of Athens, Department of Electrcal and
The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.
DEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
Quick Reference Guide: One-time Account Update
Quick Reference Guide: One-time Account Updte How to complete The Quick Reference Guide shows wht existing SingPss users need to do when logging in to the enhnced SingPss service for the first time. 1)
INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS
21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS
Rolf Baur, Raimund Herz & Ingo Kropp
COMPUTER AIDED REHABILITATION OF SEWER AND STORM WATER NETWORKS RESEARCH AND TECHNOLOGICAL DEVELOPMENT PROJECT OF EUROPEAN COMMUNITY Lehrstuhl Stdtbuwesen Technsche Unverstät Dresden (TUD) Nürnberger Str.
Small Business Cloud Services
Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly
Multi-Market Trading and Liquidity: Theory and Evidence
Mult-Mrket Trdng nd Lqudty: Theory nd Evdence Shmuel Bruch, G. Andrew Kroly, b* Mchel L. Lemmon Eccles School of Busness, Unversty of Uth, Slt Lke Cty, UT 84, USA b Fsher College of Busness, Oho Stte Unversty,
Graphs on Logarithmic and Semilogarithmic Paper
0CH_PHClter_TMSETE_ 3//00 :3 PM Pge Grphs on Logrithmic nd Semilogrithmic Pper OBJECTIVES When ou hve completed this chpter, ou should be ble to: Mke grphs on logrithmic nd semilogrithmic pper. Grph empiricl
AVR32723: Sensor Field Oriented Control for Brushless DC motors with AT32UC3B0256. 32-bit Microcontrollers. Application Note. Features.
AVR7: Sensor Feld Orented Control for Brushless DC motors wth ATUCB056 Fetures Stndlone Spce Vector Modulton lbrry for AVR UC mcrocontroller. Prk nd Clrke mthemtcl trnsformton lbrry for AVR UC mcrocontroller.
A Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
Boolean Algebra. ECE 152A Winter 2012
Boolen Algebr ECE 52A Wnter 22 Redng Assgnent Brown nd Vrnesc 2 Introducton to Logc Crcuts 2.5 Boolen Algebr 2.5. The Venn Dgr 2.5.2 Notton nd Ternology 2.5.3 Precedence of Opertons 2.6 Synthess Usng AND,
ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment
ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks
An Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks
An Adaptve Cross-layer Bandwdth Schedulng Strategy for the Speed-Senstve Strategy n erarchcal Cellular Networks Jong-Shn Chen #1, Me-Wen #2 Department of Informaton and Communcaton Engneerng ChaoYang Unversty
A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS
A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 [email protected]
Vendor Rating for Service Desk Selection
Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl
Math 135 Circles and Completing the Square Examples
Mth 135 Circles nd Completing the Squre Exmples A perfect squre is number such tht = b 2 for some rel number b. Some exmples of perfect squres re 4 = 2 2, 16 = 4 2, 169 = 13 2. We wish to hve method for
Health insurance marketplace What to expect in 2014
Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum
How To Set Up A Network For Your Business
Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer
Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions.
Lerning Objectives Loci nd Conics Lesson 3: The Ellipse Level: Preclculus Time required: 120 minutes In this lesson, students will generlize their knowledge of the circle to the ellipse. The prmetric nd
Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
Simple Interest Loans (Section 5.1) :
Chapter 5 Fnance The frst part of ths revew wll explan the dfferent nterest and nvestment equatons you learned n secton 5.1 through 5.4 of your textbook and go through several examples. The second part
How To Network A Smll Business
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
Complex Service Provisioning in Collaborative Cloud Markets
Melane Sebenhaar, Ulrch Lampe, Tm Lehrg, Sebastan Zöller, Stefan Schulte, Ralf Stenmetz: Complex Servce Provsonng n Collaboratve Cloud Markets. In: W. Abramowcz et al. (Eds.): Proceedngs of the 4th European
FOURTH Generation (4G) Wireless Networks are developed
2600 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 8, AUGUST 2010 Congeston-Based Prcng Resource Management n Broadband Wreless Networks Najah AbuAl, Mohammad Hayajneh, and Hossam Hassanen
VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
Vector Geometry for Computer Graphics
Vector Geometry for Computer Grphcs Bo Getz Jnury, 7 Contents Prt I: Bsc Defntons Coordnte Systems... Ponts nd Vectors Mtrces nd Determnnts.. 4 Prt II: Opertons Vector ddton nd sclr multplcton... 5 The
5 a LAN 6 a gateway 7 a modem
STARTER With the help of this digrm, try to descrie the function of these components of typicl network system: 1 file server 2 ridge 3 router 4 ckone 5 LAN 6 gtewy 7 modem Another Novell LAN Router Internet
Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )
Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +
Realistic Image Synthesis
Realstc Image Synthess - Combned Samplng and Path Tracng - Phlpp Slusallek Karol Myszkowsk Vncent Pegoraro Overvew: Today Combned Samplng (Multple Importance Samplng) Renderng and Measurng Equaton Random
WHAT HAPPENS WHEN YOU MIX COMPLEX NUMBERS WITH PRIME NUMBERS?
WHAT HAPPES WHE YOU MIX COMPLEX UMBERS WITH PRIME UMBERS? There s n ol syng, you n t pples n ornges. Mthemtns hte n t; they love to throw pples n ornges nto foo proessor n see wht hppens. Sometmes they
Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing
Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of
Dynamic Pricing for Smart Grid with Reinforcement Learning
Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,
Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,
Health insurance exchanges What to expect in 2014
Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount
A SYNCHRONIZATION CONTROL SCHEME FOR REAL-TIME STREAMING MULTIMEDIA APPLICATIONS
A SYNCHRONIZATION CONTROL SCHEME FOR REAL-TIME STREAMING MULTIMEDIA APPLICATIONS Hnn Lu, Md El Zrk School of Informton nd Computer Scence Unersty of Clforn, Irne Irne, CA 9697 {hnn, md}@cs.uc.edu ABSTRACT
AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence
Network Configuration Independence Mechanism
3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting
DBA-VM: Dynamic Bandwidth Allocator for Virtual Machines
DBA-VM: Dynamc Bandwdth Allocator for Vrtual Machnes Ahmed Amamou, Manel Bourguba, Kamel Haddadou and Guy Pujolle LIP6, Perre & Mare Cure Unversty, 4 Place Jusseu 755 Pars, France Gand SAS, 65 Boulevard
ivoip: an Intelligent Bandwidth Management Scheme for VoIP in WLANs
VoIP: an Intellgent Bandwdth Management Scheme for VoIP n WLANs Zhenhu Yuan and Gabrel-Mro Muntean Abstract Voce over Internet Protocol (VoIP) has been wdely used by many moble consumer devces n IEEE 802.11
Help is a tou ch of a button away. Telecare - keeping you safe and independent in your own home. i Personal emergency equipment
Help s a tou ch of a button away Telecare - keepng you safe and ndependent n your own home Personal emergency equpment 24/7 moble response - ncludng a dgnty savng lftng servce Professonal support Welcome
CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS
CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS Novella Bartoln 1, Imrch Chlamtac 2 1 Dpartmento d Informatca, Unverstà d Roma La Sapenza, Roma, Italy [email protected] 2 Center for Advanced
Watermark-based Provable Data Possession for Multimedia File in Cloud Storage
Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U
MULTI-CRITERIA DECISION AIDING IN PROJECT MANAGEMENT OUTRANKING APPROACH AND VERBAL DECISION ANALYSIS
Dorot Górec Deprtment of Econometrcs nd Sttstcs Ncolus Coperncus Unversty n Toruń MULTI-CRITERIA DECISION AIDING IN PROJECT MANAGEMENT OUTRANKING APPROACH AND VERBAL DECISION ANALYSIS Introducton A proect
Lecture 3 Gaussian Probability Distribution
Lecture 3 Gussin Probbility Distribution Introduction l Gussin probbility distribution is perhps the most used distribution in ll of science. u lso clled bell shped curve or norml distribution l Unlike
QoS-based Scheduling of Workflow Applications on Service Grids
QoS-based Schedulng of Workflow Applcatons on Servce Grds Ja Yu, Rakumar Buyya and Chen Khong Tham Grd Computng and Dstrbuted System Laboratory Dept. of Computer Scence and Software Engneerng The Unversty
What is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
Bayesian Updating with Continuous Priors Class 13, 18.05, Spring 2014 Jeremy Orloff and Jonathan Bloom
Byesin Updting with Continuous Priors Clss 3, 8.05, Spring 04 Jeremy Orloff nd Jonthn Bloom Lerning Gols. Understnd prmeterized fmily of distriutions s representing continuous rnge of hypotheses for the
On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network
On Fle Delay Mnmzaton for Content Uploadng to Meda Cloud va Collaboratve Wreless Network Ge Zhang and Yonggang Wen School of Computer Engneerng Nanyang Technologcal Unversty Sngapore Emal: {zh0001ge, ygwen}@ntu.edu.sg
Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3.
The nlysis of vrince (ANOVA) Although the t-test is one of the most commonly used sttisticl hypothesis tests, it hs limittions. The mjor limittion is tht the t-test cn be used to compre the mens of only
Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process
Dsadvantages of cyclc TDDB47 Real Tme Systems Manual scheduler constructon Cannot deal wth any runtme changes What happens f we add a task to the set? Real-Tme Systems Laboratory Department of Computer
