Wireless Inter-Session Network Coding - An Approach Using Virtual Multicasts
|
|
|
- Merryl Harvey
- 10 years ago
- Views:
Transcription
1 Wreless Inter-Sesson Network Codng - An Approach Usng Vrtual Multcasts Mchael Hendlmaer,DesmondS.Lun,DanalTraskov,andMurelMédard Insttute for Communcatons Engneerng CCIB RLE Technsche Unverstät München Rutgers Unversty MIT Munch, Germany Camden, NJ Cambrdge, MA {mchael.hendlmaer, danal.traskov}@tum.de [email protected] [email protected] Abstract Ths paper addresses the problem of nter-sesson network codng to mamze throughput for multple communcaton sessons n wreless networks. We ntroduce vrtual multcast connectons whch can etract packets from orgnal sessons and code them together. Random lnear network codes can be used for these vrtual multcasts. The problem can be stated as a flowbased conve optmzaton problem wth sde constrants. The proposed formulaton provdes a rate regon whch s at least as large as the regon wthout nter-sesson network codng. We show the benefts of our technque for several scenaros by means of smulaton. I. INTRODUCTION Network codng [1] has been an actve feld of research n the past years. Its benefts for uncast and multcast traffc have been well studed [2] [4]. For sngle source network codng problems necessary condtons are also suffcent [1] and dstrbuted lnear codng schemes are avalable [5]. Mult-source network codng s a consderably more dffcult problem: The optmal soluton for nter-sesson network codng mght requre nonlnear encodng functons [6] and even decdng a lnear nter-sesson codng problem can be NP-complete [7]. Nonetheless, suboptmal lnear codng schemes have been proposed both for wrelne and wreless networks. Prevous work on nter-sesson codng for wrelne networks has focused on a graph-theoretc characterzaton of network codes [8], [9]. For eample, n [10], the authors present an approach to translate the soluton for the well-known butterfly network to larger networks. In [11] nter-sesson network codng s combned wth multple descrpton codng. Recent work [12] presented an nterference algnment approach to perform ntersesson codng. We focus on wreless networks, where the most promnent technque s the COPE protocol [13] whch eplots the broadcast nature of the wreless medum. As shown n Fg. 1a, the number of transmssons can be reduced compared to routng f packets from dfferent sessons are combned. Ths technque s called reverse carpoolng n [14] due to the fact that the combned nformaton has to travel n opposte drectons. The nterplay of the COPE protocol wth medum access has been analyzed n [15] and approaches to model ts performance were proposed n [16], [17]. COPE has been successfully mplemented and shows gans especally when the reverse carpoolng stuaton occurs. A A a R R B B A a b a b R B (a) The COPE eample b a a b a b (b) Butterfly eample Fg. 1: In the COPE eample, A and B want to echange the packets a and b. NodeAsendspacketa to the relay node R n the frst transmsson. So does B wth packet b n a second tme step. In the thrd tme step, the relay broadcasts the XOR-ed packet a b to both A and B, so b and a can be decoded, respectvely. Routng would requre four transmsson steps. Smlarly for the Butterfly network, where wants to communcate wth, and s 2 wth. The technque COPE reles on can also be nterpreted as alocalmultcasttoasetofneghbors.wepckupthedea of a vrtual multcast, however, n a dfferent way than COPE does. We are motvated by the Butterfly eample n Fg. 1b, where we can acheve hgher rates for two sessons by creatng avrtualmultcast.furthermore,randomlnearcodes[5]can be used as a codng scheme n ths setup [1]. The dea of our approach s to create vrtual multcast sessons, combne packets from orgnal sessons and delver them to a vrtual termnal set. Our technque s thus a carpoolng approach, as packets are travellng n the same drecton. In the Butterfly eample the vrtual multcast runs from the orgnal sources to both orgnal termnal nodes. However, our approach allows to establsh the vrtual multcast at an arbtrary poston n the network and we wll llustrate n Sec. IV that a multcast to the orgnal termnals s not always optmal. In general, unlke many other technques for nter-sesson codng, the dffculty of our approach s not the codng scheme tself but the proper choce of ths vrtual termnal set. We wll defne the vrtual multcast model precsely n Sec. III-C. The orgnal sessons and the vrtual multcast can be characterzed n terms of flows from sources to termnals, smlar to [3]. Therefore, the whole problem can be stated as a conve flow optmzaton problem. The man contrbuton of ths work s a formulaton that enables nter-sesson network codng by ntroducng vrtual multcast sessons. We evaluate the gans that can be epected wth ths technque compared to an uncoded approach for varous networks. b
2 We wll present the system model n Sec. II before we state the problem formulaton n Sec. III. The ntegraton of multple vrtual multcast sessons wll be dscussed n Sec. IV. Smulaton results are presented n Sec. V before we conclude the paper n Sec. VI. II. SYSTEM MODEL A wreless packet network s modeled by a hypergraph H =(N, A), N denotng the set of nodes and A denotng the set of hyperarcs. The demands are gven by a set of connectons, denoted C. Thepar(H, C) defnes the network problem. Ahyperarc(, N()) Amodels a lossy one-tomany broadcast connecton from a node Nto ts neghbors N() N.Throughoutthswork,weassumethatmedum access takes care of schedulng transmssons, so each tme node transmts a packet, all neghbors N() wll be able to hear t. Accordngly, there s one hyperarc per node n the network, so A = N. Aconnectonc C conssts of a par (s c,t c ),thatsasourcenodes c N and a set of destnaton nodes T c N.If T c = 1, c s a uncast connecton, f T c > 1, tsamultcastconnecton.theendto-end throughput of connecton c s denoted by R c.wtheach connecton we assocate a concave utlty functon U c (R c ) dependng on the throughput of that sesson. The rate at whch node njects packets nto ts outgong hyperarc s denoted by z.duetoerasuresthetransmtted packet mght be receved only by a subset K N() of the neghbors of. Wedenotethearrvalrateforpacketseactly receved by K N() by z K.So,z = K N() z K. Let P L N () L K zl b K = z be the probablty that a packet, sent out by node, srecevedbyatleastonenodentheset K N(). Noteverypackettransmttedbynode belongs to the same sesson, so we denote by y (c) the packet njecton rate at for packets of connecton c, soz = c C y(c).the regon Z specfes the set of feasble njecton rate vectors z =(z ) N. Z s assumed to be gven from lower layers. Varables j represent the nformaton flow of connecton c for termnal t T c between nodes N and j N(). III. FORMULATION OF THE DIFFERENT APPROACHES We formulate the problem n three dfferent ways as a utlty mamzaton problem. For smplcty, we consder the problem of mamzng the sum-utlty, c C U(R c). The frst two formulatons wll lead to our man descrpton n Sec. III-C whch bulds up on the latter ones. Frst, we state the network problem f no nter-sesson codng s allowed n Sec. III-A. In Sec. III-B, we present an approach whch combnes all the nformaton of all sources and multcasts t to every termnal n the network, lke n the Butterfly eample. Ths technque wll help us to descrbe the Vrtual Multcast formulaton n Sec. III-C, whch can do both - combne packets from dfferent sessons and delver t to a vrtual termnal set or stck to the non-codng approach. A. No Inter-sesson Codng (NIC) Each sesson c Cperforms ntra-sesson network codng but no nter-sesson network codng. So, flows of dfferent sessons cannot be combned and have to share the network resources. The problem can be wrtten as follows, etendng the formulaton n [3] for multple sessons: mamze c C z y (c) 0, c C N, (1) z =(z ) N Z, (2) y (c) b K j, N,K N(),t T c,c C, j K (3) j 0, N,j N(),t T c,c C, (4) j { R c = s c, j = 0 else, N\{t},t T c,c C. (5) Here, (3) relates the outgong nformaton flow to the packet njecton rates whle (5) assures flow conservaton for each destnaton of the connectons. B. Multsource Multcast (MSM): Completng the Multcast If we allow all connectons to be coded together, as each termnal wants to have all the data, mn-cut condtons are necessary and suffcent [1, Theorem 8]. Agan, t can be formulated as an optmzaton problem wth lnear constrants by ntroducng a super-source and vrtual edges connectng ths super-source wth the orgnal sources. The outgong rate at the vrtual source s c C R c,thecapactyofvrtualedgesfrom the super-source to the orgnal source s equal to R c.in[18] ths fact was used n the contet of correlated sources. In ths setup there s only one vrtual sesson from the super-source to the recever set T,whereT contans all destnatons of all sessons,.e. T = c C T c.tosmplfythenotaton,we can omt the vrtual source and edges and consder sesson c orgnatng at s c agan, knowng that there est codng technques to capture ths setup. The followng formulaton apples: mamze c C z 0, N, (6) z =(z ) N Z, (7) z b K j K (t) (t) j, N,K N(),t T, (8) j 0, N,j N(),t T, (9) (t) j { (t) R c = s c, j = 0 else, N\{t},t T. (10)
3 The Butterfly network n Fg. 1b s an eample where ths technque works well. By multcastng all source nformaton to every termnal we can do better than NIC. C. Vrtual Multcasts (VM) Nether NIC nor MSM s always better than the other strategy for general networks, so t s not clear whch technque to choose. The followng consderatons let us combne both deas: We ntroduce a new, vrtual multcast connecton c whch can etract flow from the other sessons. To dstngush ths new sesson from the prevous ones, we refer to C as the set of orgnal connectons. The vrtual sesson has a set of snk nodes T c,whchreceveallthetraffcabsorbedbythe vrtual sesson. At each node, λ (c) 0 denotes the amount of flow etracted from one of the orgnal connectons c and njected nto sesson c. Let 0 be the amount of traffc re-njected at node nto sesson c for snk t from sesson c. For all c Cand t T c,wehave =0for T c. That s, traffc can only be re-njected at the vrtual termnal nodes. Let C = C { c} denote the set of orgnal and vrtual connectons. mamze c C z y (c) 0 c C N, (11) z =(z ) N Z, (12) y (c) b K j, N,K N(),t T c,c C, j K (13) j 0 N,j N(),t T c,c C, (14) j { R c + λ (c) = s c, j = λ (c) else, N\{t},t T c,c C, (15) =0 T c,t T c,c C. (16) For the vrtual sesson c, we have to add the followng constrants: (t, c) j (t, c) j = λ (c), c C N\{t},t T c, (17) = λ (c), t T c,c C. (18) T c N The modfed flow conservaton constrants n (15) guarantee proper accountng of flow etracton and re-njecton for the vrtual sesson. Flow conservaton for the vrtual sesson s assured n (17). Those nodes, where c C λ(c) > 0 can be consdered as the vrtual sources for the vrtual multsource multcast. Note that each node can act as a vrtual source, however, the set of vrtual termnals T c has to be eplctly specfed. In (18), we make sure that all the collected flow from one sesson s re-njected nto the orgnal sesson at the vrtual termnals. T c (a) Network 1 s 3 t 3 (b) Network 2 Fg. 2: Wrelne eample networks The formulaton above accepts the vrtual termnal set T c as an arbtrary nput. We brefly address consderatons about ths selecton n Sec. IV. For now, we choose the vrtual termnal set to yeld T c = c C T c.thschoceallowsustoperform both the uncoded strategy and the multsource multcast. Let R NIC, R MSM and R VM denote the achevable rate regon of a network problem usng communcaton strategy NIC, MSM and VM, respectvely. Theorem 1: If T c = c C T c,everysolutonthatcanbe obtaned by NIC and by MSM can also be obtaned by VM. Therefore, R VM R NIC and R VM R MSM. Proof: R VM R NIC : If we set all varables related to the vrtual sesson to zero,.e. y ( c) = {y ( c) } N = 0, = { (t, c) j } N,,t T c = 0, λ = {λ (c) } N,c C = 0 and µ = { } N,t Tc,c C = 0, the constrants n VM are eactly the same as for NIC. NIC s thus a specal case of VM. R VM R MSM : If we set λ (c) s c = R c and zero elsewhere and t = N λ(c) = c C R c,zeroelsewhere,thevrtualsesson c carres all the flow of all sessons. The vrtual sesson then corresponds to the sngle sesson n MSM. MSM s thus a specal case of VM. It follows from Theorem 1 that VM acheves at least the throughput of NIC and MSM. As we wll see n Sec. V, VM can often do better than both. IV. MULTIPLE VIRTUAL SESSIONS AND CHOICE OF T c So far only the specal case of multcast of T c = c C T c was consdered. We brefly show that ths can be suboptmal. For smplcty, we use a wrelne network wth unt lnk capacty for the llustraton n ths secton. Consder the network n Fg. 2a, where NIC, MSM and VM wth the choce of T c = c C T c can only provde the rate regon R 1 + R 2 1. Ths s due to the fact that the only paths from to and from s 2 to are not edge-dsjont. However, f we choose the hghlghted nodes to be the vrtual termnal set, we can take advantage of VM and the followng rate regon s achevable: R 1 1, R 2 1. Both sources multcast nformaton wth R 1 = R 2 =1to the nodes n the vrtual termnal set. Then, these nodes forward the demanded nformaton to,,respectvely. The formulaton n Sec. III-C can be easly etended to addtonal vrtual sessons. In order to determne the best termnal set, vrtual sessons for each subset of nodes n the network
4 would have to be ntroduced, resultng n an eponental number of vrtual sessons. However, the computatonal complety already becomes too hgh for small networks, so we have to restrct us to use only a small number of vrtual connectons. As mentoned, VM wth T c = c C T c can combne NIC and multsource-multcast to all termnals. However, for many connectons n the network t mght restrct us too much requrng every termnal of all sessons to receve all data. Consder the network n Fg. 2b wth three uncast sessons (, ), (s 2, ), (s 3,t 3 ).Whletsusefultomultcastthe nformaton from and s 2 to both and,weshouldnot nclude t 3 to the vrtual termnal set as t would reduce R 3. To capture ths dffculty, we can ntroduce one vrtual sesson for each subset of termnal nodes. The orgnal sessons can nject flow to vrtual sessons f a multcast to the respectve termnal set s helpful. So, the number of vrtual sessons s eponental n the number of termnal nodes n the network whch s stll tractable for small networks. V. PERFORMANCE EVALUATION We smulate the algorthm for wreless networks to see what gans can be epected. In all the smulatons we used proportonal farness as utlty functon for each sesson,.e. U c (R c ) = log(r c ) c C.As c U c(r c ) s a concave functon and all constrants are lnear, all the presented optmzaton problems are conve. Note that whle the eamples n Sec. IV were wrelne networks, wreless networks wth broadcast transmssons are smulated here. We restrct the representaton of wreless networks to a connectvty graph. That s, nodes whch are n mutual rado range are connected. The hyperarcs presented n Sec. II have to be consdered as aone-to-manyconnectonfromeachnodetoalltsneghbors and are omtted for the sake of clarty n the followng fgures. The relaton of hyperarcs and connectvty model s brefly shown n a small network n Fg. 3b. We evaluate the performance of VM compared to NIC wth respect to two ndcators. Frst, f VM can mprove the optmal sum-utlty, the correspondng network problem s called utlty-mproved (UI). IfVMprovdesahgherratefor all sessons, that s R c,v M k R c,nic, c C,wecall the network problem rate-mproved (RI), wthk>1 denotng the gan factor. Of course, every rate-mproved problem s also utlty-mproved. A. Mesh Networks We consder the type of wreless mesh networks shown n Fg. 3a. Sources and termnals of two uncast connectons are placed on a crcle wth radus r 2 whereas the other nodes of the network are randomly placed wthn a crcle of radus r 1. Nodes are n mutual rado range f ther dstance s below a certan threshold value. The whole nformaton has to travel through the center of the network, so we assume that all center nodes are able to overhear all packets from all sessons anyway. So, we can multcast to the whole center network and let the nodes at the border of the center forward the nformaton demanded by connected snks, smlar to the r 2 r 1 s 2 (a) Connectvty graph of a mesh network. (b) Relaton between connectvty graph and hyperarcs. There s one outgong hyperarc per node. Fg. 3: Connectvty graph and hyperarcs. #nodes #smulaton #UInetworkproblems #RInetworkproblems average gan factor k for rate TABLE I: Smulaton results for mesh networks. eample n Fg. 2a. However, t turned out that ths choce of T c dd not lead to observable gans of VM over NIC. However, f the vrtual termnal set t chosen to be T c = c C T c,we obtan convncng results: For the partcular case of 6 nodes n the network,.e. two nodes n the center, VM returns a hgher sum-utlty n nearly 75% of the cases. For 282 out of 1000 network problems, VM provdes a hgher rate for both sessons. The average gan for the rate-mproved 6-node networks 4%. TableIsummarzesresultsforthssetupand networks of larger sze. The number of UI network problems decreases wth more nodes n the center. In that case, the center of the network has enough capacty to forward both sessons, so t s not the bottleneck anymore. In many of these cases the maflow bounds can acheved for both connectons wth NIC, whch essentally means that both sessons do not nterfere. B. Random Geometrc Wreless Networks In ths eperment we ask whether the gans observed for the mesh networks consdered before also translate to random networks wthout specal structure. Accordngly, nodes are randomly placed on a square wth constant node densty. Nodes can hear each other f ther dstance s smaller than a certan threshold. Sources and termnals are randomly chosen. For a network consstng of 10 nodes wth two multcast sessons and two termnals for each connecton, UI and RI network problems occur less frequently. However, for the average RI problem the rate regon s ncreased by 33%. The network n Fg. 4 wth two uncast sessons s an eample for such an RI network problem. Here, R 1,NIC =0.8 <R 1,MSM =0.91 <R 1,V M =0.92 and R 2,NIC =0.8 <R 2,MSM =0.91 <R 2,V M =0.97, whch corresponds to a gan of 15% and 21%, respectvely. We add further sessons to evaluate the behavor of VM f there s more nterference n the network. For a 12-node network wth three uncast sessons, VM can mprove the utlty for 259 out of 1000 network problems. As proposed n Sect. IV, one vrtual sesson s created for each subset of orgnal termnals. We count 37 RI network problems, wth an average gan of 38%. AssummarzednTableII,welose 9% on average f only one vrtual sesson s consdered. The
5 s 2 Fg. 4: Connectvty graph of an RI network problem wth 10 nodes. Arrows represent sources and termnals of sessons. #node #smulaton #sessons #UInetworkproblem #RInetworkproblems average gan factor k for rate average gan wthout recever subsets TABLE II: Smulaton results for random networks. more sessons are added, the more frequently UI network problems can be observed. For a 12-node network wth 4 uncast sessons, VM ncreases the utlty n more than 50% of the cases. Gans are shown n Table II. C. Wreless Grd Networks We are further nterested about how the postons of source and destnaton have an mpact on the performance of VM. Therefore, we analyze ts behavor on more structured wreless networks shown n Fg. 5. In ths setup, we are not partcularly nterested n the specfc gans of VM but rather at whch poston t turns out to be useful. Consder the network n Fg. 5a: One sesson (, )andthepostonofthetermnal for the second sesson,,arefed.wevarythepostonof the source for the second sesson and nvestgate f we can acheve hgher rates by usng VM wth T c = c C T c.we dstngush four cases: Postons of the source whch let all the sessons acheve the maflow bounds are marked gray. Postons leadng to UI network problems are marked wth acrosswhlepostonsleadngtorinetworkproblemsare marked by a square. Other postons are unchanged. In ths case, only two postons close to the termnal lead to auinetworkproblem.formostpostonswecanachevethe maflow bounds for each sesson ndvdually whch means that the sessons do not nterfere. In the network n Fg. 5b we consder four connectons. Three sessons (, ), (s 2, ), (s 3, t 3 )arefed,wevarythepostonofthesourceforthe fourth sesson, s 4.Now,astheresmorenterferencenthe network, we can do better wth VM for every possble poston n the network. We conclude that VM s partcularly useful f nterference reduces the rates achevable by NIC. VI. CONCLUSION AND FURTHER WORK We presented an approach for ntersesson network codng by creatng vrtual multcast sessons and leveragng the suffcency of random lnear network codng for ths setup. Vrtual sessons can be defned for an arbtrary vrtual termnal set, however, our smulatons showed that the unon of all orgnal termnals s a good choce. The technque turns out to be benefcal for many networks, wth a rate ncrease of more (a) Two sessons. t 4 t 3 s 3 (b) Four sessons. maflow bounds achevable utlty-mproved rate-mproved Fg. 5: Connectvty graphs of grd networks. than 30% for each connecton, at the cost of computatonal complety. There are elegant ways to solve the optmzaton problem by dual decomposton, whch wll be presented n future work. REFERENCES [1] R. Kötter and M. Médard. An algebrac approach to network codng. Networkng, IEEE/ACM Transactons on, 11(5): ,oct [2] D.S. Lun, M. Médard, and R. Kötter. Network codng for effcent wreless uncast. In 2006 Int. Zurch Semnar on Comm., pages [3] Desmond S. Lun, Nranjan Ratnakar, Murel Médard, Ralf Kötter, Davd R. Karger, Tracey Ho, Ebad Ahmed, and Fang Zhao. Mnmumcost multcast over coded packet networks. IEEE Trans. Netw., 14(SI): , [4] Y. Wu, P.A. Chou, and S.Y. Kung. Mnmum-energy multcast n moble ad hoc networks usng network codng. In IEEE Informaton Theory Workshop, 2004,pages ,2004. [5] T. Ho, M. Médard, R. Kötter, D.R. Karger, M. Effros, Jun Sh, and B. Leong. A random lnear network codng approach to multcast. Informaton Theory, IEEE Trans. on, 52(10): ,Oct [6] R. Dougherty, C. Frelng, and K. Zeger. Insuffcency of lnear codng n network nformaton flow. Informaton Theory, IEEE Transactons on, 51(8): ,aug [7] A.R. Lehman and E. Lehman. Complety classfcaton of network nformaton flow problems. In Proceedngs of the ffteenth annual ACM- SIAM symposum on Dscrete algorthms, pages Socetyfor Industral and Appled Mathematcs, [8] Yunnan Wu. On constructve mult-source network codng. Informaton Theory, 2006 IEEE Internatonal Symposum on, pages ,jul [9] Chh-Chun Wang and N.B. Shroff. Parwse ntersesson network codng on drected networks. Informaton Theory, IEEE Transactons on, 56(8): , aug [10] D. Traskov, N. Ratnakar, D.S. Lun, R. Kötter, and M. Médard. Network codng for multple uncasts: An approach based on lnear optmzaton. In 2006 IEEE Internatonal Symposum on Informaton Theory, pages , [11] Mngka Shao, Xaoln Wu, and N. Sarshar. Ranbow network flow wth network codng. Network Codng, Theory and Applcatons, NetCod Fourth Workshop on, pages1 6,jan [12] A. Das, S. Vshwanath, S. Jafar, anda. Markopoulou. Networkcodng for multple uncasts: An nterference algnment approach. Arv preprnt arxv: , [13] Sachn Katt, Harharan Rahul, Wenjun Hu, Dna Katab, Murel Médard, and Jon Crowcroft. Xors n the ar: practcal wreless network codng. IEEE/ACM Trans. Netw., 16(3): ,2008. [14] M. Effros, Tracey Ho, and Sukwon Km. A tlng approach to network code desgn for wreless networks. Informaton Theory Workshop, ITW 06 Punta del Este. IEEE, pages62 66,mar [15] F. Zhao and M. Médard. On analyzng and mprovng COPE performance. Informaton Theory and Applcatons Workshop, [16] S. Sengupta, S. Rayanchu, and S. Banerjee. An analyss of wreless network codng for uncast sessons: The case for codng-aware routng. INFOCOM th IEEE Internatonal Conference on Computer Communcatons. IEEE, pages ,may [17] A. ParandehGheb, A. Ozdaglar, M. Effros, and M. Médard. Optmal Reverse Carpoolng Over Wreless Networks - A Dstrbuted Optmzaton Approach. Arv preprnt arxv: , [18] Anna Lee and Murel Médard. Mnmum-cost subgraphs for jont dstrbuted source and network codng. n Proc. of Workshop on Network Codng, Theory and Applcatons, 2007.
Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures
Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng
INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS
21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS
Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node
Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He [email protected] Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate
What is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
Enabling P2P One-view Multi-party Video Conferencing
Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P
The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.
Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. XX, MONTH 2XX 1 Effcent On-Demand Data Servce Delvery to Hgh-Speed Trans n Cellular/Infostaton Integrated Networks Hao Lang, Student Member,
Luby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
An Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
Relay Secrecy in Wireless Networks with Eavesdropper
Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,
A Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
Traffic State Estimation in the Traffic Management Center of Berlin
Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal [email protected] Peter Möhl, PTV AG,
Multi-Source Video Multicast in Peer-to-Peer Networks
ult-source Vdeo ultcast n Peer-to-Peer Networks Francsco de Asís López-Fuentes*, Eckehard Stenbach Technsche Unverstät ünchen Insttute of Communcaton Networks, eda Technology Group 80333 ünchen, Germany
Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,
PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign
PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng
RequIn, a tool for fast web traffic inference
RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France [email protected], [email protected] Abstract As networked
J. Parallel Distrib. Comput.
J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n
Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing
Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;
Energy Conserving Routing in Wireless Ad-hoc Networks
Energy Conservng Routng n Wreless Ad-hoc Networks Jae-Hwan Chang and Leandros Tassulas Department of Electrcal and Computer Engneerng & Insttute for Systems Research Unversty of Maryland at College ark
Credit Limit Optimization (CLO) for Credit Cards
Credt Lmt Optmzaton (CLO) for Credt Cards Vay S. Desa CSCC IX, Ednburgh September 8, 2005 Copyrght 2003, SAS Insttute Inc. All rghts reserved. SAS Propretary Agenda Background Tradtonal approaches to credt
Project Networks With Mixed-Time Constraints
Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa
Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing
Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of
Support Vector Machines
Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada [email protected] Abstract Ths s a note to explan support vector machnes.
Availability-Based Path Selection and Network Vulnerability Assessment
Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl
"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET)
Renforcement Learnng for Qualty of Servce n Moble Ad Hoc Network (MANET) *T.KUMANAN AND **K.DURAISWAMY *Meenaksh College of Engneerng West K.K Nagar, Cheena-78 **Dean/academc,K.S.R College of Technology,Truchengode
How To Understand The Results Of The German Meris Cloud And Water Vapour Product
Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller
Implementation of Deutsch's Algorithm Using Mathcad
Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"
An Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
An Efficient Recovery Algorithm for Coverage Hole in WSNs
An Effcent Recover Algorthm for Coverage Hole n WSNs Song Ja 1,*, Wang Balng 1, Peng Xuan 1 School of Informaton an Electrcal Engneerng Harbn Insttute of Technolog at Weha, Shanong, Chna Automatc Test
On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network
On Fle Delay Mnmzaton for Content Uploadng to Meda Cloud va Collaboratve Wreless Network Ge Zhang and Yonggang Wen School of Computer Engneerng Nanyang Technologcal Unversty Sngapore Emal: {zh0001ge, ygwen}@ntu.edu.sg
The OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
An Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks
An Adaptve Cross-layer Bandwdth Schedulng Strategy for the Speed-Senstve Strategy n erarchcal Cellular Networks Jong-Shn Chen #1, Me-Wen #2 Department of Informaton and Communcaton Engneerng ChaoYang Unversty
Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems
Jont Schedulng of Processng and Shuffle Phases n MapReduce Systems Fangfe Chen, Mural Kodalam, T. V. Lakshman Department of Computer Scence and Engneerng, The Penn State Unversty Bell Laboratores, Alcatel-Lucent
Ad-Hoc Games and Packet Forwardng Networks
On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang
8 Algorithm for Binary Searching in Trees
8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the
+ + + - - This circuit than can be reduced to a planar circuit
MeshCurrent Method The meshcurrent s analog of the nodeoltage method. We sole for a new set of arables, mesh currents, that automatcally satsfy KCLs. As such, meshcurrent method reduces crcut soluton to
Sngle Snk Buy at Bulk Problem and the Access Network
A Constant Factor Approxmaton for the Sngle Snk Edge Installaton Problem Sudpto Guha Adam Meyerson Kamesh Munagala Abstract We present the frst constant approxmaton to the sngle snk buy-at-bulk network
THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek
HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks
: An Adaptve, Anycast MAC Protocol for Wreless Sensor Networks Hwee-Xan Tan and Mun Choon Chan Department of Computer Scence, School of Computng, Natonal Unversty of Sngapore {hweexan, chanmc}@comp.nus.edu.sg
How To Solve An Onlne Control Polcy On A Vrtualzed Data Center
Dynamc Resource Allocaton and Power Management n Vrtualzed Data Centers Rahul Urgaonkar, Ulas C. Kozat, Ken Igarash, Mchael J. Neely [email protected], {kozat, garash}@docomolabs-usa.com, [email protected]
On the Interaction between Load Balancing and Speed Scaling
On the Interacton between Load Balancng and Speed Scalng Ljun Chen and Na L Abstract Speed scalng has been wdely adopted n computer and communcaton systems, n partcular, to reduce energy consumpton. An
Rapid Estimation Method for Data Capacity and Spectrum Efficiency in Cellular Networks
Rapd Estmaton ethod for Data Capacty and Spectrum Effcency n Cellular Networs C.F. Ball, E. Humburg, K. Ivanov, R. üllner Semens AG, Communcatons oble Networs unch, Germany [email protected] Abstract
Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems
1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The
A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks
Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton
Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks
From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara
How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence
1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh
The Greedy Method. Introduction. 0/1 Knapsack Problem
The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton
Hosting Virtual Machines on Distributed Datacenters
Hostng Vrtual Machnes on Dstrbuted Datacenters Chuan Pham Scence and Engneerng, KyungHee Unversty, Korea [email protected] Jae Hyeok Son Scence and Engneerng, KyungHee Unversty, Korea [email protected]
An Introduction to 3G Monte-Carlo simulations within ProMan
An Introducton to 3G Monte-Carlo smulatons wthn ProMan responsble edtor: Hermann Buddendck AWE Communcatons GmbH Otto-Llenthal-Str. 36 D-71034 Böblngen Phone: +49 70 31 71 49 7-16 Fax: +49 70 31 71 49
Forecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye [email protected] [email protected] [email protected] Abstract - Stock market s one of the most complcated systems
VoIP over Multiple IEEE 802.11 Wireless LANs
SUBMITTED TO IEEE TRANSACTIONS ON MOBILE COMPUTING 1 VoIP over Multple IEEE 80.11 Wreless LANs An Chan, Graduate Student Member, IEEE, Soung Chang Lew, Senor Member, IEEE Abstract IEEE 80.11 WLAN has hgh
A Dynamic Load Balancing for Massive Multiplayer Online Game Server
A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,
On the Optimal Control of a Cascade of Hydro-Electric Power Stations
On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;
Calculation of Sampling Weights
Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample
Ring structure of splines on triangulations
www.oeaw.ac.at Rng structure of splnes on trangulatons N. Vllamzar RICAM-Report 2014-48 www.rcam.oeaw.ac.at RING STRUCTURE OF SPLINES ON TRIANGULATIONS NELLY VILLAMIZAR Introducton For a trangulated regon
8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by
6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng
VOLUME 5 BLAGOEVGRAD, BULGARIA SCIENTIFIC. Research ELECTRONIC ISSUE ISSN 1312-7535
VOLUME 5 007 BLAGOEVGRAD, BULGARIA SCIENTIFIC Research ISSN 131-7535 ELECTRONIC ISSUE IMPROVING FAIRNESS IN CDMA-HDR NETWORKS Valentn Hrstov Abstract. Improvng throughput and farness n Cellular Data Networks
A Lyapunov Optimization Approach to Repeated Stochastic Games
PROC. ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, OCT. 2013 1 A Lyapunov Optmzaton Approach to Repeated Stochastc Games Mchael J. Neely Unversty of Southern Calforna http://www-bcf.usc.edu/
How To Improve Delay Throughput In Wireless Networks With Multipath Routing And Channel Codeing
Delay-Throughput Enhancement n Wreless Networs wth Mult-path Routng and Channel Codng Kevan Ronas, Student Member, IEEE, Amr-Hamed Mohsenan-Rad, Member, IEEE, Vncent W.S. Wong, Senor Member, IEEE, Sathsh
Recurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)
6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes
Distributed Multi-Target Tracking In A Self-Configuring Camera Network
Dstrbuted Mult-Target Trackng In A Self-Confgurng Camera Network Crstan Soto, B Song, Amt K. Roy-Chowdhury Department of Electrcal Engneerng Unversty of Calforna, Rversde {cwlder,bsong,amtrc}@ee.ucr.edu
A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña
Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION
When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services
When Network Effect Meets Congeston Effect: Leveragng Socal Servces for Wreless Servces aowen Gong School of Electrcal, Computer and Energy Engeerng Arzona State Unversty Tempe, AZ 8587, USA xgong9@asuedu
Efficient Project Portfolio as a tool for Enterprise Risk Management
Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse
QoS-Aware Active Queue Management for Multimedia Services over the Internet
QoS-Aware Actve Queue Management for Multmeda Servces over the Internet I-Shyan Hwang, *Bor-Junn Hwang, Pen-Mng Chang, Cheng-Yu Wang Abstract Recently, the multmeda servces such as IPTV, vdeo conference
Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
Performance Analysis and Coding Strategy of ECOC SVMs
Internatonal Journal of Grd and Dstrbuted Computng Vol.7, No. (04), pp.67-76 http://dx.do.org/0.457/jgdc.04.7..07 Performance Analyss and Codng Strategy of ECOC SVMs Zhgang Yan, and Yuanxuan Yang, School
Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks
Master s Thess Ttle Confgurng robust vrtual wreless sensor networks for Internet of Thngs nspred by bran functonal networks Supervsor Professor Masayuk Murata Author Shnya Toyonaga February 10th, 2014
Cost Minimization using Renewable Cooling and Thermal Energy Storage in CDNs
Cost Mnmzaton usng Renewable Coolng and Thermal Energy Storage n CDNs Stephen Lee College of Informaton and Computer Scences UMass, Amherst [email protected] Rahul Urgaonkar IBM Research [email protected]
) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance
Calbraton Method Instances of the Cell class (one nstance for each FMS cell) contan ADC raw data and methods assocated wth each partcular FMS cell. The calbraton method ncludes event selecton (Class Cell
An MILP model for planning of batch plants operating in a campaign-mode
An MILP model for plannng of batch plants operatng n a campagn-mode Yanna Fumero Insttuto de Desarrollo y Dseño CONICET UTN [email protected] Gabrela Corsano Insttuto de Desarrollo y Dseño
M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS
M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty
Enterprise Master Patient Index
Enterprse Master Patent Index Healthcare data are captured n many dfferent settngs such as hosptals, clncs, labs, and physcan offces. Accordng to a report by the CDC, patents n the Unted States made an
Network Aware Load-Balancing via Parallel VM Migration for Data Centers
Network Aware Load-Balancng va Parallel VM Mgraton for Data Centers Kun-Tng Chen 2, Chen Chen 12, Po-Hsang Wang 2 1 Informaton Technology Servce Center, 2 Department of Computer Scence Natonal Chao Tung
Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy
Fnancal Tme Seres Analyss Patrck McSharry [email protected] www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton
IMPACT ANALYSIS OF A CELLULAR PHONE
4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng
DEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
Design and Development of a Security Evaluation Platform Based on International Standards
Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School
A New Paradigm for Load Balancing in Wireless Mesh Networks
A New Paradgm for Load Balancng n Wreless Mesh Networks Abstract: Obtanng maxmum throughput across a network or a mesh through optmal load balancng s known to be an NP-hard problem. Desgnng effcent load
Extending Probabilistic Dynamic Epistemic Logic
Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set
