Is Information-Centric Multi-Tree Routing Feasible?

Size: px
Start display at page:

Download "Is Information-Centric Multi-Tree Routing Feasible?"

Transcription

1 Is Information-Centric Multi-Tree Routing Feasible? ICN workshop 2013 Michele Papalini (University of Lugano) joint work with: Antonio Carzaniga (University of Lugano) Koorosh Khazaei (University of Lugano) Alexander L. Wolf (Imperial College London)

2 Traditional Networking Information-Centric Networking

3 Traditional Networking addressing end-points addressing information Information-Centric Networking

4 Traditional Networking How do we address information? How do we obtain information? (Architectural questions) Information-Centric Networking

5 Traditional Networking How do we address information? Tags How do we obtain information? Push/Pull Information-Centric Networking

6 Traditional Networking How do we address information? Tags Scalable Routing How do we get information? Push/Pull (System/Evaluation questions) Information-Centric Networking

7 How do we address information?

8 Solution I: name the data

9 Solution I: name the data flat, not human readable identifiers 1DB76EB8DFD6B0B92A293AADC BDE73CB6 hierarchical, meaningful structured names /ch/usi/inf/papalini/picture.jpg

10 /ch/usi/inf/papalini/picture.jpg

11 /ch/usi/inf/papalini/picture.jpg /nytimes/sport/baseball/mets /cnn/us/sport/baseball/mets

12 /ch/usi/inf/papalini/picture.jpg /nytimes/sport/baseball/mets /cnn/us/sport/baseball/mets /youtube/la dolce vita/hd

13 baseball scores for NY Mets

14 baseball scores for NY Mets la dolce vita in HD with english subtitles

15 Solution II: describe the data

16 Solution II: describe the data with set of tags baseball, new york, mets la dolce vita, HD, en-sub

17 Tags

18 Tags more expressivity /ch/usi/inf/papalini/picture.jpg 1#ch, 2#usi, 3#inf, 4#papalini, 5#picture.jpg

19 Tags more expressivity /ch/usi/inf/papalini/picture.jpg 1#ch, 2#usi, 3#inf, 4#papalini, 5#picture.jpg more aggregation sport, new, football Lugano, sport, activities sport

20 Tags more expressivity /ch/usi/inf/papalini/picture.jpg 1#ch, 2#usi, 3#inf, 4#papalini, 5#picture.jpg more aggregation sport, new, football Lugano, sport, activities sport sport

21

22 How do we obtain information?

23 PULL

24 PULL producer consumer

25 PULL producer register(descriptors) forwarding tables consumer

26 PULL producer register(descriptors) forwarding tables consumer interest: content-descriptor

27 PULL producer register(descriptors) data:content forwarding tables consumer interest: content-descriptor

28 PUSH

29 PUSH producer consumer

30 PUSH producer forwarding tables consumer subscribe(descriptors)

31 PUSH producer notification:descriptor forwarding tables consumer subscribe(descriptors)

32 PU LL SH

33 PU LL SH Node A Node B

34 PU LL SH Node A register(descriptors) forwarding tables Node B

35 PU LL SH Node A register(descriptors) forwarding tables Node B message: content-descriptor +data request: content-descriptor

36 PU LL SH Node A register(descriptors) reply:data forwarding tables Node B message: content-descriptor +data request: content-descriptor

37 Node A register(descriptors) reply:data forwarding tables PU LL SH Node B message: content-descriptor +data request: content-descriptor ICN 2011: Content-Based Publish/Subscribe Networking and Information-Centric Networking

38 Node A forwarding tables PU LL SH Node B register(descriptors) How do we route? message: content-descriptor +data reply:data request: content-descriptor

39 Routing schema based on multiple trees Main contribution

40 Main contribution Routing schema based on multiple trees Scalability analysis Additional cost (hops/state) using multiple trees FIBs size using a realistic workload

41 Routing

42 router b: tree T,next-hop w predicate P T,w (FIB) T 1, c p c p g p h T 1, f p f p j p k T 1, e p a p d p e p i T 2, c p c p h p g T 2, e p a p d p e p f p i p j p k a b c d e f g h i j k

43 router b: tree T,next-hop w predicate P T,w (FIB) T 1, c p c p g p h T 1, f p f p j p k T 1, e p a p d p e p i T 2, c p c p h p g T 2, e p a p d p e p f p i p j p k a b c d e f g h i j k

44 router b: tree T,next-hop w predicate P T,w (FIB) T 1, router c p c b: next-hop p g p h w predicate P w T 1,(FIB) f p f cp j p kc p g p h T 1, e p a fp d p ef p ij p k T 2, c p c ep h p ga p d p e p i T 2, e p a p d p e p f p i p j p k a b c b d e f g h i j k

45 router b: tree T,next-hop w predicate P T,w (FIB) T 1, router c p c b: next-hop p g p h w predicate P w T 1,(FIB) f p f cp j p kc p g p h T 1, e p a fp d p ef p ij p k T 2, c p c ep h p ga p d p e p i T 2, e p a p d p e p f p i p j p k a b c d e f g h i j k

46 router b: tree T,next-hop w predicate P T,w (FIB) T 1, c p c p g p h T 1, f p f p j p k T 1, e p a p d p e p i T 2, c p c p h p g T 2, e p a p d p e p f p i p j p k a b c d e f g h i j k

47 router b: tree T,next-hop w predicate P T,w (FIB) T 1, c p c p g p h T 1, f p f p j p k T 1, e p a p d p e p i T 2, c p c p h p g T 2, e p a p d p e p f p i p j p k Stretched Paths a b c d e f g h i j k

48 router b: tree T,next-hop w predicate P T,w (FIB) T 1, c p c p g p h T 1, f p f p j p Load k T 1, e p a p d p e p i T 2, c p c p h p g T 2, e p a p d p e p f p i p j p k a b c d e f g h i j k

49 router b: tree T,next-hop w predicate P T,w (FIB) T 1, c p c p g p h T 1, f p f p j p Multiple k T 1, etrees p a p d p e p i T 2, c p c p h p g T 2, e p a p d p e p f p i p j p k a b c d e f g h i j k

50 router b: tree T,next-hop w predicate P T,w (FIB) T 1, c p c p g p h T 1, f p f p j p k T 1, e p a p d p e p i T 2, c p c p h p g T 2, e p a p d p e p f p i p j p k a b c b d e f g h i j k

51 router b: tree T,next-hop w predicate P T,w (FIB) T 1, c p c p g p h T 1, f p f p j p Memory k T 1, ecomplexity p a p d p e p i Problem T 2, c p c p hg p gh T 2, e p a p d p e p f p i p j p k a b c b d e f g h i j k

52 router b: tree T,next-hop w predicate P T,w (FIB) T 1, c p c p g p h T 1, f p f p j p k T 1, e p a p d p e p i T 2, c p c p h p g T 2, e p a p d p e p f p i p j p k a b c b d e f g h i j k

53 router b: tree T,next-hop w predicate P T,w (FIB) T 1, c p c p g p h T 1, f p f p j p k T 1, e p a p d p e p i T 2, c p c p h p g T 2, e p a p d p e p f p i p j p k a b c b d e f g h i j k

54 router b: tree T,next-hop w predicate P T,w (FIB) T 1, c p c p g p h T 1, f p f p j p k T 1, e p a p d p e p i T 2, c p c p h p g T 2, e p a p d p e p f p i p j p k a b c b d e f g h i j k

55 router b: tree,next-hop predicate T,w router b: tree T,next-hop w predicate P T,w (FIB) T 1, c c g (FIB) c p h 1 c p f h p j g T k 1, f p 1 f p a j p d k e T i 1, e p 2 c a p c d p h e p i T g 2, e p 2 a p a d p d e p e f p f i p i j p j k k a b c b d e f g h i j k

56 router b: tree T,next-hop w predicate P T,w (FIB) T 1, c p c p g p h T 1, f p f p j p k T 1, e p a p d p e p i T 2, c p c p h p g T 2, e p a p d p e p f p i p j p k a b c b d e f g h i j k

57 router b: tree T,next-hop w predicate P T,w router b: next-hop w predicate P (FIB) T 1, c c g T,w (FIB) c p h 1 c p f h p j g T k 1, f p 1 f p a j p d k e T i 1, e p 2 c a p c d p h e p i T g 2, e p 2 a p a d p d e p e f p f i p i j p j k k a b c b d e f g h i j k

58 router router b: next-hop b: tree T w,next-hop predicate w predicate P T,w P T,w (FIB) (FIB) c pt c 1, cp h p gc p g p h f (TT 1, f p f ) p f (T 1 p j pp j ) k (T 1 p k ) e (TT 1, e p a ) p a (T 1 p d p d p) e (T p i 1 p e ) (T 1 p i ) (TT 2, c p a ) p c (T 2 p h p d p) g (T 2 p e ) (T 2 p i ) (TT 2, e p f ) p a (T 2 p d p j p) e (T p f2 p i k ) p j p k a b c b d e f g h i j k

59 router router b: next-hop b: tree T w,next-hop predicate w predicate P T,w P T,w (FIB) (FIB) c pt c 1, cp h p gc p g p h f (TT 1, f p f ) p f (T 1 p j pp j ) k (T 1 p k ) e (TT 1, e p a ) p a (T 1 p d p d p) e (T p i 1 p e ) (T 1 p i ) (TT 2, c p a ) p c (T 2 p h p d p) g (T 2 p e ) (T 2 p i ) (TT 2, e p f ) p a (T 2 p d p j p) e (T p f2 p i k ) p j p k a b c b d e f g h i j k

60 router b: tree T,next-hop w predicate P T,w router b: next-hop w predicate P (FIB) T 1, c p c p g p T,w (FIB) c p h T 1, f c p p f h p p j g p f (T k T 1, e 1 p p a f ) (T p d p 1 p e j ) (T 1 p k ) e p i T 2, c a p p c d p p h e p p i (T g T 2, e 2 p p a f ) (T p d p 2 p e j ) (T f p i 2 p p j k ) p k a b c b d e f g h i j k

61 router b: tree T,next-hop w predicate P T,w router b: next-hop w predicate P (FIB) T 1, c p c p g p T,w (FIB) c p h T 1, f c p p f h p p j g p f (T k T 1, e 1 p p a f ) (T p d p 1 p e j ) (T 1 p k ) e p i T 2, c a p p c d p p h e p p i (T g T 2, e 2 p p a f ) (T p d p 2 p e j ) (T f p i 2 p p j k ) p k a b c b d e f g h i j k

62 router b: tree T,next-hop w predicate P T,w router b: next-hop w predicate P (FIB) T 1, c p c p g p T,w (FIB) c p h T 1, f c p p f h p p j g p f (T k T 1, e 1 p p a f ) (T p d p 1 p e j ) (T 1 p k ) e p i T 2, c a p p c d p p h e p p i (T g T 2, e 2 p p a f ) (T p d p 2 p e j ) (T f p i 2 p p j k ) p k coming soon: new data structure a b c b d e f g h i j k

63 Evaluation

64 Evaluation Q 1: Is it possible to use trees to route traffic over the Internet?

65 Evaluation Q 1: Is it possible to use trees to route traffic over the Internet? Q 2: Do user-defined descriptor-based addresses aggregate?

66 Evaluation Q 1: Is it possible to use trees to route traffic over the Internet? Q 2: Do user-defined descriptor-based addresses aggregate? We need a workload

67 Topology What do we need?

68 What do we need? Topology Distribute users on the nodes

69 What do we need? Topology Distribute users on the nodes Assign applications to users

70 What do we need? Topology Distribute users on the nodes Assign applications to users Create the registrations

71 What do we need? Topology AS-level Internet topology Distribute users on the nodes Assign applications to users Create the registrations

72 What do we need? Topology Distribute users on the nodes assigned to each AS according to the estimated population Assign applications to users Create the registrations

73 What do we need? Topology Distribute users on the nodes Assign applications to users selected according to the real number of users Create the registrations

74 What do we need? Topology Distribute users on the nodes Assign applications to users Create the registrations???

75 Imagine the future Internet study the users behavior on different applications define registrations with actual tags used by users

76 Imagine the future Internet study the users behavior on different applications define registrations with actual tags used by users Push content web content and blog posts short messages (tweets)

77 Imagine the future Internet study the users behavior on different applications define registrations with actual tags used by users Push content web content and blog posts short messages (tweets) Pull content videos

78 Goal: Understand users interests Web Content

79 Web Content Goal: Understand users interests Users Bookmarks (Delicious) bookmarks = subscription

80 Application User Registration Delicious 1M 124M Blogs 60K 180K Video 1K 10K Twitter Graph 41M 1B Twitter Messages 400K 500K

81 Data Amplification

82 Data Amplification Multiple languages replicate the data for the 25 most spoken languages language is chosen according to the popularity

83 Data Amplification Multiple languages replicate the data for the 25 most spoken languages language is chosen according to the popularity Synonyms for each word we define synonyms synonyms are randomly chosen

84 Evaluation Q 1: Is it possible to use trees to route traffic over the Internet? Q 2: Do user-defined descriptor-based addresses aggregate?

85 Additional cost in using k trees on the actual AS-level topology with k = 8, 16, 32, 64, 128 trees 6 Avg/Max Additional Path Length (Hops)

86 Additional cost in using k trees on the actual AS-level topology with k = 8, 16, 32, 64, 128 trees 6 Avg/Max Additional Path Length (Hops)

87 Additional cost in using k trees on the actual AS-level topology with k = 8, 16, 32, 64, 128 trees 6 Avg/Max Additional Path Length (Hops)

88 Tree aggregation in FIBs with k = 8, 16, 32, 64, 128 trees Distinct Trees per Interface

89 Tree aggregation in FIBs with k = 8, 16, 32, 64, 128 trees Distinct Trees per Interface

90 Aggregation of tag-based addresses in FIBs memory requirements in a central node for a single tree 2.5M users All Interfaces Largest Interfaces Destinations 42,112 6,559 Tags 276,501,173 35,814,399 Original Descriptors 85,504,514 10,727,593 Actual Descriptors 10,880,657 1,145,713 Size (MB)

91 Aggregation of tag-based addresses in FIBs memory requirements in a central node for a single tree 2.5M users All Interfaces Largest Interfaces Destinations 42,112 6,559 Tags 276,501,173 35,814,399 Original Descriptors 85,504,514 10,727,593 Actual Descriptors 10,880,657 1,145,713 Size (MB)

92 Aggregation of tag-based addresses in FIBs memory requirements in a central node for a single tree 2.5M users All Interfaces Largest Interfaces Destinations 42,112 6,559 Tags 276,501,173 35,814,399 Original Descriptors 85,504,514 10,727,593 Actual Descriptors 10,880,657 1,145,713 Size (MB)

93 Aggregation of tag-based addresses in FIBs memory requirements in a central node for a single tree 2.5M users All Interfaces Largest Interfaces Destinations 42,112 6,559 Tags 276,501,173 35,814,399 Original Descriptors 85,504,514 10,727,593 Actual Descriptors 10,880,657 1,145,713 Size (MB)

94 Aggregation of tag-based addresses in FIBs memory requirements in a central node for a single tree 2.5M users All Interfaces Largest Interfaces Destinations 42,112 6,559 Tags 276,501,173 35,814,399 Original Descriptors 85,504,514 10,727,593 Actual Descriptors 10,880,657 1,145,713 Size (MB) Aggregation Factor

95 Aggregation of tag-based addresses in FIBs memory requirements in a central node for a single tree 2.5M users All Interfaces Largest Interfaces Destinations 42,112 6,559 Tags 276,501,173 35,814,399 Original Descriptors 85,504,514 10,727,593 Actual Descriptors 10,880,657 1,145,713 Size (MB) Bloom Filter size = 400 bits

96 Workload: 25M users, 513M descriptors, 8 trees Total descriptors: 4.1 billion Current Work

97 Workload: 25M users, 513M descriptors, 8 trees Total descriptors: 4.1 billion Compressed Table: 300M descriptors Current Work

98 Workload: 25M users, 513M descriptors, 8 trees Total descriptors: 4.1 billion Compressed Table: 300M descriptors Update time (average): 6 µsec per descriptor Current Work

99 Workload: 25M users, 513M descriptors, 8 trees Total descriptors: 4.1 billion Compressed Table: 300M descriptors Update time (average): 6 µsec per descriptor Matching time Current Work Time (us) Tags

100 Conclusion Routing scheme: tag-based address push-pull communication

101 Conclusion Routing scheme: tag-based address push-pull communication Scalability: AS-topology can be cover with few trees FIB size is reasonable

102 Conclusion Routing scheme: tag-based address push-pull communication Scalability: AS-topology can be cover with few trees FIB size is reasonable Workload

A Quantitative View: Delay, Throughput, Loss

A Quantitative View: Delay, Throughput, Loss A Quantitative View: Delay, Throughput, Loss Antonio Carzaniga Faculty of Informatics University of Lugano September 27, 2017 Outline Quantitative analysis of data transfer concepts for network applications

More information

On Content Indexing for Off-Path Caching in Information-Centric Networks

On Content Indexing for Off-Path Caching in Information-Centric Networks On Content Indexing for Off-Path Caching in Information-Centric Networks Suzan Bayhan, Liang Wang, Jörg Ott, Jussi Kangasharju, Arjuna Sathiaseelan, Jon Crowcroft University of Helsinki (Finland), TU Munich

More information

Probe Placement Problem

Probe Placement Problem Dimitri Papadimitriou (Alcatel-Lucent - Bell Labs) NMRG Meeting IETF 89 London (UK) Mar.2-7, 2014 Outline 1 Introduction 2 Model 3 Preliminary Results 4 Analysis and Conclusion imitri Papadimitriou (Alcatel-Lucent

More information

Impact of traffic mix on caching performance

Impact of traffic mix on caching performance Impact of traffic mix on caching performance Jim Roberts, INRIA/RAP joint work with Christine Fricker, Philippe Robert, Nada Sbihi BCAM, 27 June 2012 A content-centric future Internet most Internet traffic

More information

cs/ee/ids 143 Communication Networks

cs/ee/ids 143 Communication Networks cs/ee/ids 143 Communication Networks Chapter 5 Routing Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Warning These notes are not self-contained, probably not understandable, unless you also

More information

Telecommunication Services Engineering (TSE) Lab. Chapter IX Presence Applications and Services.

Telecommunication Services Engineering (TSE) Lab. Chapter IX Presence Applications and Services. Chapter IX Presence Applications and Services http://users.encs.concordia.ca/~glitho/ Outline 1. Basics 2. Interoperability 3. Presence service in clouds Basics 1 - IETF abstract model 2 - An example of

More information

7600 Series Routers Adjacency Allocation Method

7600 Series Routers Adjacency Allocation Method 7600 Series Routers Adjacency Allocation Method Document ID: 118393 Contributed by Amit Goyal and Ruchir Jain, Cisco TAC Engineers. Nov 06, 2014 Contents Introduction Background Information Adjacency Entry

More information

Impression Store: Compressive Sensing-based Storage for. Big Data Analytics

Impression Store: Compressive Sensing-based Storage for. Big Data Analytics Impression Store: Compressive Sensing-based Storage for Big Data Analytics Jiaxing Zhang, Ying Yan, Liang Jeff Chen, Minjie Wang, Thomas Moscibroda & Zheng Zhang Microsoft Research The Curse of O(N) in

More information

Routing. Topics: 6.976/ESD.937 1

Routing. Topics: 6.976/ESD.937 1 Routing Topics: Definition Architecture for routing data plane algorithm Current routing algorithm control plane algorithm Optimal routing algorithm known algorithms and implementation issues new solution

More information

CS6220: DATA MINING TECHNIQUES

CS6220: DATA MINING TECHNIQUES CS6220: DATA MINING TECHNIQUES Mining Graph/Network Data Instructor: Yizhou Sun yzsun@ccs.neu.edu November 16, 2015 Methods to Learn Classification Clustering Frequent Pattern Mining Matrix Data Decision

More information

Visualizing Big Data on Maps: Emerging Tools and Techniques. Ilir Bejleri, Sanjay Ranka

Visualizing Big Data on Maps: Emerging Tools and Techniques. Ilir Bejleri, Sanjay Ranka Visualizing Big Data on Maps: Emerging Tools and Techniques Ilir Bejleri, Sanjay Ranka Topics Web GIS Visualization Big Data GIS Performance Maps in Data Visualization Platforms Next: Web GIS Visualization

More information

CS249: ADVANCED DATA MINING

CS249: ADVANCED DATA MINING CS249: ADVANCED DATA MINING Graph and Network Instructor: Yizhou Sun yzsun@cs.ucla.edu May 31, 2017 Methods Learnt Classification Clustering Vector Data Text Data Recommender System Decision Tree; Naïve

More information

Real-time Sentiment-Based Anomaly Detection in Twitter Data Streams

Real-time Sentiment-Based Anomaly Detection in Twitter Data Streams Real-time Sentiment-Based Anomaly Detection in Twitter Data Streams Khantil Patel, Orland Hoeber, and Howard J. Hamilton Department of Computer Science University of Regina, Canada patel26k@uregina.ca,

More information

How to deal with uncertainties and dynamicity?

How to deal with uncertainties and dynamicity? How to deal with uncertainties and dynamicity? http://graal.ens-lyon.fr/ lmarchal/scheduling/ 19 novembre 2012 1/ 37 Outline 1 Sensitivity and Robustness 2 Analyzing the sensitivity : the case of Backfilling

More information

On Allocating Cache Resources to Content Providers

On Allocating Cache Resources to Content Providers On Allocating Cache Resources to Content Providers Weibo Chu, Mostafa Dehghan, Don Towsley, Zhi-Li Zhang wbchu@nwpu.edu.cn Northwestern Polytechnical University Why Resource Allocation in ICN? Resource

More information

Part 2: Random Routing and Load Balancing

Part 2: Random Routing and Load Balancing 1 Part 2: Random Routing and Load Balancing Sid C-K Chau Chi-Kin.Chau@cl.cam.ac.uk http://www.cl.cam.ac.uk/~ckc25/teaching Problem: Traffic Routing 2 Suppose you are in charge of transportation. What do

More information

CORRECTNESS OF A GOSSIP BASED MEMBERSHIP PROTOCOL BY (ANDRÉ ALLAVENA, ALAN DEMERS, JOHN E. HOPCROFT ) PRATIK TIMALSENA UNIVERSITY OF OSLO

CORRECTNESS OF A GOSSIP BASED MEMBERSHIP PROTOCOL BY (ANDRÉ ALLAVENA, ALAN DEMERS, JOHN E. HOPCROFT ) PRATIK TIMALSENA UNIVERSITY OF OSLO CORRECTNESS OF A GOSSIP BASED MEMBERSHIP PROTOCOL BY (ANDRÉ ALLAVENA, ALAN DEMERS, JOHN E. HOPCROFT ) PRATIK TIMALSENA UNIVERSITY OF OSLO OUTLINE q Contribution of the paper q Gossip algorithm q The corrected

More information

Content-based Publish/Subscribe using Distributed R-trees

Content-based Publish/Subscribe using Distributed R-trees Content-based Publish/Subscribe using Distributed R-trees Silvia Bianchi, Pascal Felber and Maria Gradinariu 2 University of Neuchâtel, Switzerland 2 LIP6, INRIA-Université Paris 6, France Abstract. Publish/subscribe

More information

How does Google rank webpages?

How does Google rank webpages? Linear Algebra Spring 016 How does Google rank webpages? Dept. of Internet and Multimedia Eng. Konkuk University leehw@konkuk.ac.kr 1 Background on search engines Outline HITS algorithm (Jon Kleinberg)

More information

An Early Traffic Sampling Algorithm

An Early Traffic Sampling Algorithm An Early Traffic Sampling Algorithm Hou Ying ( ), Huang Hai, Chen Dan, Wang ShengNan, and Li Peng National Digital Switching System Engineering & Techological R&D center, ZhengZhou, 450002, China ndschy@139.com,

More information

Utility Maximizing Routing to Data Centers

Utility Maximizing Routing to Data Centers 0-0 Utility Maximizing Routing to Data Centers M. Sarwat, J. Shin and S. Kapoor (Presented by J. Shin) Sep 26, 2011 Sep 26, 2011 1 Outline 1. Problem Definition - Data Center Allocation 2. How to construct

More information

CS6220: DATA MINING TECHNIQUES

CS6220: DATA MINING TECHNIQUES CS6220: DATA MINING TECHNIQUES Mining Graph/Network Data Instructor: Yizhou Sun yzsun@ccs.neu.edu March 16, 2016 Methods to Learn Classification Clustering Frequent Pattern Mining Matrix Data Decision

More information

UnSAID: Uncertainty and Structure in the Access to Intensional Data

UnSAID: Uncertainty and Structure in the Access to Intensional Data UnSAID: Uncertainty and Structure in the Access to Intensional Data Pierre Senellart 3 July 214, Univ. Rennes 1 Uncertain data is everywhere Numerous sources of uncertain data: Measurement errors Data

More information

Efficient Network-wide Available Bandwidth Estimation through Active Learning and Belief Propagation

Efficient Network-wide Available Bandwidth Estimation through Active Learning and Belief Propagation Efficient Network-wide Available Bandwidth Estimation through Active Learning and Belief Propagation mark.coates@mcgill.ca McGill University Department of Electrical and Computer Engineering Montreal,

More information

Discovering Geographical Topics in Twitter

Discovering Geographical Topics in Twitter Discovering Geographical Topics in Twitter Liangjie Hong, Lehigh University Amr Ahmed, Yahoo! Research Alexander J. Smola, Yahoo! Research Siva Gurumurthy, Twitter Kostas Tsioutsiouliklis, Twitter Overview

More information

Generalized DCell Structure for Load-Balanced Data Center Networks

Generalized DCell Structure for Load-Balanced Data Center Networks Generalized DCell Structure for Load-Balanced Data Center Networks Markus Kliegl, Jason Lee, Jun Li, Xinchao Zhang, Chuanxiong Guo, David Rincón Swarthmore College, Duke University, Fudan University, Shanghai

More information

Routing Algorithms. CS60002: Distributed Systems. Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur

Routing Algorithms. CS60002: Distributed Systems. Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur Routing Algorithms CS60002: Distributed Systems Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur Main Features Table Computation The routing tables must be computed

More information

The Bloom Paradox: When not to Use a Bloom Filter

The Bloom Paradox: When not to Use a Bloom Filter 1 The Bloom Paradox: When not to Use a Bloom Filter Ori Rottenstreich and Isaac Keslassy Abstract In this paper, we uncover the Bloom paradox in Bloom filters: sometimes, the Bloom filter is harmful and

More information

1/30/2012. Reasoning with uncertainty III

1/30/2012. Reasoning with uncertainty III Reasoning with uncertainty III 1 Temporal Models Assumptions 2 Example First-order: From d-separation, X t+1 is conditionally independent of X t-1 given X t No independence of measurements Yt Alternate

More information

MobiHoc 2014 MINIMUM-SIZED INFLUENTIAL NODE SET SELECTION FOR SOCIAL NETWORKS UNDER THE INDEPENDENT CASCADE MODEL

MobiHoc 2014 MINIMUM-SIZED INFLUENTIAL NODE SET SELECTION FOR SOCIAL NETWORKS UNDER THE INDEPENDENT CASCADE MODEL MobiHoc 2014 MINIMUM-SIZED INFLUENTIAL NODE SET SELECTION FOR SOCIAL NETWORKS UNDER THE INDEPENDENT CASCADE MODEL Jing (Selena) He Department of Computer Science, Kennesaw State University Shouling Ji,

More information

ECE 669 Parallel Computer Architecture

ECE 669 Parallel Computer Architecture ECE 669 Parallel Computer Architecture Lecture Interconnection Network Performance Performance Analysis of Interconnection Networks Bandwidth Latency Proportional to diameter Latency with contention Processor

More information

Using Social Media for Geodemographic Applications

Using Social Media for Geodemographic Applications Using Social Media for Geodemographic Applications Muhammad Adnan and Guy Lansley Department of Geography, University College London @gisandtech @GuyLansley Web: http://www.uncertaintyofidentity.com Outline

More information

SOCIAL MEDIA IN THE COMMUNICATIONS CENTRE

SOCIAL MEDIA IN THE COMMUNICATIONS CENTRE SOCIAL MEDIA IN THE COMMUNICATIONS CENTRE Karen Gordon Gordon Strategy www.gordonstrategy.ca v 1 WHAT WE ARE GOING TO TALK ABOUT TODAY T h e s o c i a l m e d i a i n c i d e n t W h a t c a n h a p p

More information

Innovation. The Push and Pull at ESRI. September Kevin Daugherty Cadastral/Land Records Industry Solutions Manager

Innovation. The Push and Pull at ESRI. September Kevin Daugherty Cadastral/Land Records Industry Solutions Manager Innovation The Push and Pull at ESRI September 2004 Kevin Daugherty Cadastral/Land Records Industry Solutions Manager The Push and The Pull The Push is the information technology that drives research and

More information

Your World is not Red or Green. Good Practice in Data Display and Dashboard Design

Your World is not Red or Green. Good Practice in Data Display and Dashboard Design Your World is not Red or Green Good Practice in Data Display and Dashboard Design References Tufte, E. R. (2). The visual display of quantitative information (2nd Ed.). Cheshire, CT: Graphics Press. Few,

More information

(P ) Minimize 4x 1 + 6x 2 + 5x 3 s.t. 2x 1 3x 3 3 3x 2 2x 3 6

(P ) Minimize 4x 1 + 6x 2 + 5x 3 s.t. 2x 1 3x 3 3 3x 2 2x 3 6 The exam is three hours long and consists of 4 exercises. The exam is graded on a scale 0-25 points, and the points assigned to each question are indicated in parenthesis within the text. Problem 1 Consider

More information

Network Design Problems Notation and Illustrations

Network Design Problems Notation and Illustrations B CHAPTER 2 Network Design Problems Notation and Illustrations In Chapter 1, we have presented basic ideas about communication and computer network design problems that a network provider is likely to

More information

Congestion Control In The Internet Part 1: Theory. JY Le Boudec 2018

Congestion Control In The Internet Part 1: Theory. JY Le Boudec 2018 Congestion Control In The Internet Part 1: Theory JY Le Boudec 2018 1 Contents 1. What is the problem; congestion collapse 2. Efficiency versus Fairness 3. Definitions of fairness 4. Additive Increase

More information

2.6 Complexity Theory for Map-Reduce. Star Joins 2.6. COMPLEXITY THEORY FOR MAP-REDUCE 51

2.6 Complexity Theory for Map-Reduce. Star Joins 2.6. COMPLEXITY THEORY FOR MAP-REDUCE 51 2.6. COMPLEXITY THEORY FOR MAP-REDUCE 51 Star Joins A common structure for data mining of commercial data is the star join. For example, a chain store like Walmart keeps a fact table whose tuples each

More information

AstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis

AstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis AstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis Ioan Raicu Distributed Systems Laboratory Computer Science Department University of Chicago Joint work with: Ian Foster: Univ. of

More information

Modeling Randomized Data Streams in Caching, Data Processing, and Crawling Applications

Modeling Randomized Data Streams in Caching, Data Processing, and Crawling Applications Modeling Randomized Data Streams in Caching, Data Processing, and Crawling Applications Sarker Tanzir Ahmed and Dmitri Loguinov Internet Research Lab Department of Computer Science and Engineering Texas

More information

Joint MISTRAL/CESI lunch workshop 15 th November 2017

Joint MISTRAL/CESI lunch workshop 15 th November 2017 MISTRAL@Newcastle Joint MISTRAL/CESI lunch workshop 15 th November 2017 ITRC at Newcastle ITRC at Newcastle MISTRAL at Newcastle New approach to infrastructure data management to open-up analytics, modelling

More information

IR: Information Retrieval

IR: Information Retrieval / 44 IR: Information Retrieval FIB, Master in Innovation and Research in Informatics Slides by Marta Arias, José Luis Balcázar, Ramon Ferrer-i-Cancho, Ricard Gavaldá Department of Computer Science, UPC

More information

Big Data Infrastructure CS 489/698 Big Data Infrastructure (Winter 2016)

Big Data Infrastructure CS 489/698 Big Data Infrastructure (Winter 2016) Big Data Infrastructure CS 489/698 Big Data Infrastructure (Winter 2016) Week 12: Real-Time Data Analytics (2/2) March 31, 2016 Jimmy Lin David R. Cheriton School of Computer Science University of Waterloo

More information

Analysis of Rate-distortion Functions and Congestion Control in Scalable Internet Video Streaming

Analysis of Rate-distortion Functions and Congestion Control in Scalable Internet Video Streaming Analysis of Rate-distortion Functions and Congestion Control in Scalable Internet Video Streaming Min Dai Electrical Engineering, Texas A&M University Dmitri Loguinov Computer Science, Texas A&M University

More information

Redesde Computadores(RCOMP)

Redesde Computadores(RCOMP) Redesde Computadores(RCOMP) Theoretical-Practical (TP) Lesson 12 2016/2017 Exam style practical exercise. (IPv4 networks dimensioning; static routeing tables design; CISCO IOS Access Control Lists) Instituto

More information

SPLITTING AND MERGING OF PACKET TRAFFIC: MEASUREMENT AND MODELLING

SPLITTING AND MERGING OF PACKET TRAFFIC: MEASUREMENT AND MODELLING SPLITTING AND MERGING OF PACKET TRAFFIC: MEASUREMENT AND MODELLING Nicolas Hohn 1 Darryl Veitch 1 Tao Ye 2 1 CUBIN, Department of Electrical & Electronic Engineering University of Melbourne, Vic 3010 Australia

More information

AstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis

AstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis AstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis Ioan Raicu Distributed Systems Laboratory Computer Science Department University of Chicago Joint work with: Ian Foster: Univ. of

More information

Part A. P (w 1 )P (w 2 w 1 )P (w 3 w 1 w 2 ) P (w M w 1 w 2 w M 1 ) P (w 1 )P (w 2 w 1 )P (w 3 w 2 ) P (w M w M 1 )

Part A. P (w 1 )P (w 2 w 1 )P (w 3 w 1 w 2 ) P (w M w 1 w 2 w M 1 ) P (w 1 )P (w 2 w 1 )P (w 3 w 2 ) P (w M w M 1 ) Part A 1. A Markov chain is a discrete-time stochastic process, defined by a set of states, a set of transition probabilities (between states), and a set of initial state probabilities; the process proceeds

More information

Modeling the dynamics of caching in. content-based publish/subscribe systems

Modeling the dynamics of caching in. content-based publish/subscribe systems Modeling the dynamics of caching in 1 content-based publish/subscribe systems Vasilis Sourlas, Georgios S. Paschos, Petteri Mannersalo, Paris Flegkas and Leandros Tassiulas Department of Computer & Communication

More information

Arcgis Enterprise Performance And Scalability Best Practices

Arcgis Enterprise Performance And Scalability Best Practices Arcgis Enterprise Performance And Scalability Best Practices We have made it easy for you to find a PDF Ebooks without any digging. And by having access to our ebooks online or by storing it on your computer,

More information

Min Congestion Control for High- Speed Heterogeneous Networks. JetMax: Scalable Max-Min

Min Congestion Control for High- Speed Heterogeneous Networks. JetMax: Scalable Max-Min JetMax: Scalable Max-Min Min Congestion Control for High- Speed Heterogeneous Networks Yueping Zhang Joint work with Derek Leonard and Dmitri Loguinov Internet Research Lab Department of Computer Science

More information

Self Similar (Scale Free, Power Law) Networks (I)

Self Similar (Scale Free, Power Law) Networks (I) Self Similar (Scale Free, Power Law) Networks (I) E6083: lecture 4 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA {predrag}@ee.columbia.edu February 7, 2007

More information

arxiv: v3 [cs.dc] 13 Oct 2016

arxiv: v3 [cs.dc] 13 Oct 2016 Correction to the article Dynamic power management in energy-aware computer networks and data intensive computing systems published in Future Generation Computer Systems journal arxiv:1610.02551v3 [cs.dc]

More information

Supplementary Technical Details and Results

Supplementary Technical Details and Results Supplementary Technical Details and Results April 6, 2016 1 Introduction This document provides additional details to augment the paper Efficient Calibration Techniques for Large-scale Traffic Simulators.

More information

Degree (k)

Degree (k) 0 1 Pr(X k) 0 0 1 Degree (k) Figure A1: Log-log plot of the complementary cumulative distribution function (CCDF) of the degree distribution for a sample month (January 0) network is shown (blue), along

More information

THE DESIGN AND IMPLEMENTATION OF A WEB SERVICES-BASED APPLICATION FRAMEWORK FOR SEA SURFACE TEMPERATURE INFORMATION

THE DESIGN AND IMPLEMENTATION OF A WEB SERVICES-BASED APPLICATION FRAMEWORK FOR SEA SURFACE TEMPERATURE INFORMATION THE DESIGN AND IMPLEMENTATION OF A WEB SERVICES-BASED APPLICATION FRAMEWORK FOR SEA SURFACE TEMPERATURE INFORMATION HE Ya-wen a,b,c, SU Fen-zhen a, DU Yun-yan a, Xiao Ru-lin a,c, Sun Xiaodan d a. Institute

More information

Semantic Web SPARQL. Gerd Gröner, Matthias Thimm. July 16,

Semantic Web SPARQL. Gerd Gröner, Matthias Thimm. July 16, Semantic Web SPARQL Gerd Gröner, Matthias Thimm {groener,thimm}@uni-koblenz.de Institute for Web Science and Technologies (WeST) University of Koblenz-Landau July 16, 2013 Gerd Gröner, Matthias Thimm Semantic

More information

Dynamic Power Allocation and Routing for Time Varying Wireless Networks

Dynamic Power Allocation and Routing for Time Varying Wireless Networks Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,

More information

4 : Exact Inference: Variable Elimination

4 : Exact Inference: Variable Elimination 10-708: Probabilistic Graphical Models 10-708, Spring 2014 4 : Exact Inference: Variable Elimination Lecturer: Eric P. ing Scribes: Soumya Batra, Pradeep Dasigi, Manzil Zaheer 1 Probabilistic Inference

More information

Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks

Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks Burst Scheduling Based on Time-slotting and Fragmentation in WDM Optical Burst Switched Networks G. Mohan, M. Ashish, and K. Akash Department of Electrical and Computer Engineering National University

More information

Random Target Lemma. Sucharita Jayanti. February 21, 2013

Random Target Lemma. Sucharita Jayanti. February 21, 2013 Random Target Lemma Sucharita Jayanti February 21, 2013 Abstract The well known Random Target Lemma states that if one starts at a node i in a connected graph, selects a target node at random (according

More information

Behavioral Simulations in MapReduce

Behavioral Simulations in MapReduce Behavioral Simulations in MapReduce Guozhang Wang, Marcos Vaz Salles, Benjamin Sowell, Xun Wang, Tuan Cao, Alan Demers, Johannes Gehrke, Walker White Cornell University 1 What are Behavioral Simulations?

More information

GENERALIZATION IN THE NEW GENERATION OF GIS. Dan Lee ESRI, Inc. 380 New York Street Redlands, CA USA Fax:

GENERALIZATION IN THE NEW GENERATION OF GIS. Dan Lee ESRI, Inc. 380 New York Street Redlands, CA USA Fax: GENERALIZATION IN THE NEW GENERATION OF GIS Dan Lee ESRI, Inc. 380 New York Street Redlands, CA 92373 USA dlee@esri.com Fax: 909-793-5953 Abstract In the research and development of automated map generalization,

More information

What Have We Learned from Reverse-Engineering the Internet s Inter-domain Routing Protocol?

What Have We Learned from Reverse-Engineering the Internet s Inter-domain Routing Protocol? What Have We Learned from Reverse-Engineering the Internet s Inter-domain Routing Protocol? Timothy G. Griffin Computer Laboratory University of Cambridge, UK timothy.griffin@cl.cam.ac.uk Advanced Networks

More information

Modeling population growth in online social networks

Modeling population growth in online social networks Zhu et al. Complex Adaptive Systems Modeling 3, :4 RESEARCH Open Access Modeling population growth in online social networks Konglin Zhu *,WenzhongLi, and Xiaoming Fu *Correspondence: zhu@cs.uni-goettingen.de

More information

Distributed Algorithmic Mechanism Design: Recent Results and Future Directions

Distributed Algorithmic Mechanism Design: Recent Results and Future Directions Distributed Algorithmic Mechanism Design: Recent Results and Future Directions Joan Feigenbaum Yale Scott Shenker ICSI Slides: http://www.cs.yale.edu/~jf/dialm02.{ppt,pdf} Paper: http://www.cs.yale.edu/~jf/fs.{ps,pdf}

More information

Spatial Analytics Workshop

Spatial Analytics Workshop Spatial Analytics Workshop Pete Skomoroch, LinkedIn (@peteskomoroch) Kevin Weil, Twitter (@kevinweil) Sean Gorman, FortiusOne (@seangorman) #spatialanalytics Introduction The Rise of Spatial Analytics

More information

Very Large Scale Integration (VLSI)

Very Large Scale Integration (VLSI) Very Large Scale Integration (VLSI) Lecture 4 Dr. Ahmed H. Madian Ah_madian@hotmail.com Dr. Ahmed H. Madian-VLSI Contents Delay estimation Simple RC model Penfield-Rubenstein Model Logical effort Delay

More information

Slides based on those in:

Slides based on those in: Spyros Kontogiannis & Christos Zaroliagis Slides based on those in: http://www.mmds.org High dim. data Graph data Infinite data Machine learning Apps Locality sensitive hashing PageRank, SimRank Filtering

More information

TAKING INFORMATION INTO ACCOUNTS

TAKING INFORMATION INTO ACCOUNTS MICHEL BIEZUNSKI, AI CAMP, UN NEW YORK JULY 12, 2016 TAKING INFORMATION INTO ACCOUNTS The Data Projection Model INTRO Information is abundant. Information is messy. There are multiple ways to view the

More information

Scalable Mesh Networks and The Address Space Balancing Problem. Andrea Lo Pumo Girton College

Scalable Mesh Networks and The Address Space Balancing Problem. Andrea Lo Pumo Girton College Scalable Mesh Networks and The Address Space Balancing Problem Andrea Lo Pumo Girton College A dissertation submitted to the University of Cambridge in partial fulfilment of the requirements for the degree

More information

Signalling Analysis for Adaptive TCD Routing in ISL Networks *

Signalling Analysis for Adaptive TCD Routing in ISL Networks * COST 272 Packet-Oriented Service delivery via Satellite Signalling Analysis for Adaptive TCD Routing in ISL Networks * Ales Svigelj, Mihael Mohorcic, Gorazd Kandus Jozef Stefan Institute, Ljubljana, Slovenia

More information

ECE Information theory Final (Fall 2008)

ECE Information theory Final (Fall 2008) ECE 776 - Information theory Final (Fall 2008) Q.1. (1 point) Consider the following bursty transmission scheme for a Gaussian channel with noise power N and average power constraint P (i.e., 1/n X n i=1

More information

Arup Nanda Starwood Hotels

Arup Nanda Starwood Hotels Arup Nanda Starwood Hotels Why Analyze The Database is Slow! Storage, CPU, memory, runqueues all affect the performance Know what specifically is causing them to be slow To build a profile of the application

More information

An Ins t Ins an t t an Primer

An Ins t Ins an t t an Primer An Instant Primer Links from Course Web Page Network Coding: An Instant Primer Fragouli, Boudec, and Widmer. Network Coding an Introduction Koetter and Medard On Randomized Network Coding Ho, Medard, Shi,

More information

Charter for the. Information Transfer and Services Architecture Focus Group

Charter for the. Information Transfer and Services Architecture Focus Group for the Information Transfer and Services Architecture Focus Group 1. PURPOSE 1.1. The purpose of this charter is to establish the Information Transfer and Services Architecture Focus Group (ITSAFG) as

More information

DM-Group Meeting. Subhodip Biswas 10/16/2014

DM-Group Meeting. Subhodip Biswas 10/16/2014 DM-Group Meeting Subhodip Biswas 10/16/2014 Papers to be discussed 1. Crowdsourcing Land Use Maps via Twitter Vanessa Frias-Martinez and Enrique Frias-Martinez in KDD 2014 2. Tracking Climate Change Opinions

More information

Asymptotics, asynchrony, and asymmetry in distributed consensus

Asymptotics, asynchrony, and asymmetry in distributed consensus DANCES Seminar 1 / Asymptotics, asynchrony, and asymmetry in distributed consensus Anand D. Information Theory and Applications Center University of California, San Diego 9 March 011 Joint work with Alex

More information

Online Dictionary Learning with Group Structure Inducing Norms

Online Dictionary Learning with Group Structure Inducing Norms Online Dictionary Learning with Group Structure Inducing Norms Zoltán Szabó 1, Barnabás Póczos 2, András Lőrincz 1 1 Eötvös Loránd University, Budapest, Hungary 2 Carnegie Mellon University, Pittsburgh,

More information

ECEN 689 Special Topics in Data Science for Communications Networks

ECEN 689 Special Topics in Data Science for Communications Networks ECEN 689 Special Topics in Data Science for Communications Networks Nick Duffield Department of Electrical & Computer Engineering Texas A&M University Lecture 13 Measuring and Inferring Traffic Matrices

More information

DESIGN, ANALYSIS AND OPTIMIZATION OF CACHE SYSTEMS

DESIGN, ANALYSIS AND OPTIMIZATION OF CACHE SYSTEMS University of Massachusetts Amherst ScholarWorks@UMass Amherst Doctoral Dissertations Dissertations and Theses 2017 DESIGN, ANALYSIS AND OPTIMIZATION OF CACHE SYSTEMS Mostafa Dehghan Shirehpaz University

More information

HW 3: Heavy-tails and Small Worlds. 1 When monkeys type... [20 points, collaboration allowed]

HW 3: Heavy-tails and Small Worlds. 1 When monkeys type... [20 points, collaboration allowed] CS/EE/CMS 144 Assigned: 01/18/18 HW 3: Heavy-tails and Small Worlds Guru: Yu Su/Rachael Due: 01/25/18 by 10:30am We encourage you to discuss collaboration problems with others, but you need to write up

More information

CHAPTER 2 LOAD FLOW ANALYSIS FOR RADIAL DISTRIBUTION SYSTEM

CHAPTER 2 LOAD FLOW ANALYSIS FOR RADIAL DISTRIBUTION SYSTEM 16 CHAPTER 2 LOAD FLOW ANALYSIS FOR RADIAL DISTRIBUTION SYSTEM 2.1 INTRODUCTION Load flow analysis of power system network is used to determine the steady state solution for a given set of bus loading

More information

Understanding Sharded Caching Systems

Understanding Sharded Caching Systems Understanding Sharded Caching Systems Lorenzo Saino l.saino@ucl.ac.uk Ioannis Paras i.psaras@ucl.ac.uk George Pavlov g.pavlou@ucl.ac.uk Department of Electronic and Electrical Engineering University College

More information

1 Introduction. 1.1 The Problem Domain. Self-Stablization UC Davis Earl Barr. Lecture 1 Introduction Winter 2007

1 Introduction. 1.1 The Problem Domain. Self-Stablization UC Davis Earl Barr. Lecture 1 Introduction Winter 2007 Lecture 1 Introduction 1 Introduction 1.1 The Problem Domain Today, we are going to ask whether a system can recover from perturbation. Consider a children s top: If it is perfectly vertically, you can

More information

An Efficient reconciliation algorithm for social networks

An Efficient reconciliation algorithm for social networks An Efficient reconciliation algorithm for social networks Silvio Lattanzi (Google Research NY) Joint work with: Nitish Korula (Google Research NY) ICERM Stochastic Graph Models Outline Graph reconciliation

More information

Coding for loss tolerant systems

Coding for loss tolerant systems Coding for loss tolerant systems Workshop APRETAF, 22 janvier 2009 Mathieu Cunche, Vincent Roca INRIA, équipe Planète INRIA Rhône-Alpes Mathieu Cunche, Vincent Roca The erasure channel Erasure codes Reed-Solomon

More information

ECS 253 / MAE 253, Lecture 11 May 3, Bipartite networks, trees, and cliques & Flows on spatial networks

ECS 253 / MAE 253, Lecture 11 May 3, Bipartite networks, trees, and cliques & Flows on spatial networks ECS 253 / MAE 253, Lecture 11 May 3, 2016 group 1 group group 2 Bipartite networks, trees, and cliques & Flows on spatial networks Bipartite networks Hypergraphs Trees Planar graphs Cliques Other important

More information

Exascale I/O challenges for Numerical Weather Prediction

Exascale I/O challenges for Numerical Weather Prediction Exascale I/O challenges for Numerical Weather Prediction A view from ECMWF Tiago Quintino, B. Raoult, S. Smart, A. Bonanni, F. Rathgeber, P. Bauer, N. Wedi ECMWF tiago.quintino@ecmwf.int SuperComputing

More information

SOFTWARE ARCHITECTURE DESIGN OF GIS WEB SERVICE AGGREGATION BASED ON SERVICE GROUP

SOFTWARE ARCHITECTURE DESIGN OF GIS WEB SERVICE AGGREGATION BASED ON SERVICE GROUP SOFTWARE ARCHITECTURE DESIGN OF GIS WEB SERVICE AGGREGATION BASED ON SERVICE GROUP LIU Jian-chuan*, YANG Jun, TAN Ming-jian, GAN Quan Sichuan Geomatics Center, Chengdu 610041, China Keywords: GIS; Web;

More information

Networks: space-time stochastic models for networks

Networks: space-time stochastic models for networks Mobile and Delay Tolerant Networks: space-time stochastic models for networks Philippe Jacquet Alcatel-Lucent Bell Labs France Plan of the talk Short history of wireless networking Information in space-time

More information

Run-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE

Run-length & Entropy Coding. Redundancy Removal. Sampling. Quantization. Perform inverse operations at the receiver EEE General e Image Coder Structure Motion Video x(s 1,s 2,t) or x(s 1,s 2 ) Natural Image Sampling A form of data compression; usually lossless, but can be lossy Redundancy Removal Lossless compression: predictive

More information

Congestion Control. Need to understand: What is congestion? How do we prevent or manage it?

Congestion Control. Need to understand: What is congestion? How do we prevent or manage it? Congestion Control Phenomenon: when too much traffic enters into system, performance degrades excessive traffic can cause congestion Problem: regulate traffic influx such that congestion does not occur

More information

The Giving Game: Google Page Rank

The Giving Game: Google Page Rank The Giving Game: Google Page Rank University of Utah Teachers Math Circle Nick Korevaar March, 009 Stage 1: The Game Imagine a game in which you repeatedly distribute something desirable to your friends,

More information

Introduction to Randomized Algorithms III

Introduction to Randomized Algorithms III Introduction to Randomized Algorithms III Joaquim Madeira Version 0.1 November 2017 U. Aveiro, November 2017 1 Overview Probabilistic counters Counting with probability 1 / 2 Counting with probability

More information

Flow-level performance of wireless data networks

Flow-level performance of wireless data networks Flow-level performance of wireless data networks Aleksi Penttinen Department of Communications and Networking, TKK Helsinki University of Technology CLOWN seminar 28.8.08 1/31 Outline 1. Flow-level model

More information

University of Illinois at Urbana-Champaign. Midterm Examination

University of Illinois at Urbana-Champaign. Midterm Examination University of Illinois at Urbana-Champaign Midterm Examination CS410 Introduction to Text Information Systems Professor ChengXiang Zhai TA: Azadeh Shakery Time: 2:00 3:15pm, Mar. 14, 2007 Place: Room 1105,

More information

Linear Programming Models for Traffic Engineering Under Combined IS-IS and MPLS-TE Protocols

Linear Programming Models for Traffic Engineering Under Combined IS-IS and MPLS-TE Protocols Linear Programming Models for Traffic Engineering Under Combined IS-IS and MPLS-TE Protocols D. Cherubini 1 A. Fanni 2 A. Frangioni 3 C. Murgia 4 M.G. Scutellà 3 P. Zuddas 5 A. Mereu 2 1 Tiscali International

More information

December 3, Dipartimento di Informatica, Università di Torino. Felicittà. Visualizing and Estimating Happiness in

December 3, Dipartimento di Informatica, Università di Torino. Felicittà. Visualizing and Estimating Happiness in : : Dipartimento di Informatica, Università di Torino December 3, 2013 : Outline : from social media Social media users generated contents represent the human behavior in everyday life, but... how to analyze

More information