In this paper we study the k-station placement problem (k- SP problem, in short) on graphs. This problem has application to efficient multicasting in circuit-switched networks and to space efficient traversals. We sho...
详细信息
In this work, we address an issue of automatically segmenting video objects based on moving region tracking. The proposed algorithm gradually combines moving regions, and tries to automatically determine a whole movin...
详细信息
In this work, we address an issue of automatically segmenting video objects based on moving region tracking. The proposed algorithm gradually combines moving regions, and tries to automatically determine a whole moving object. Since the algorithm handles an object region-by-region, it preserves the object contour that has strong correlation in a spatio-temporal sense. Experimental results show the proposed algorithm can provide prospective results for automatic video object segmentation and tracking.
Three-dimensional circuits built upon multiple layers of polyimide are required for constructing Si/SiGe monolithic microwave/mm-wave integrated circuits on low resistivity Si wafers. However, the closely spaced trans...
详细信息
In this paper we propose a new channel allocation scheme for improving the quality of service in cellular mobile networks. The proposed algorithm prioritizes handoff call requests over new call requests. The goal is t...
详细信息
In this paper we propose a new channel allocation scheme for improving the quality of service in cellular mobile networks. The proposed algorithm prioritizes handoff call requests over new call requests. The goal is to reduce the handoff failures while still making efficient use of the network resources. A performance measure is formed as a weighted linear function of new call and handoff call blocking probabilities. This problem is formulated as a semi-Markov decision process with an average cost criterion. A simulation-based learning algorithm is then developed to approximate the optimal control policy online using the generated samples from direct interactions with the network. It is based on an approximate model that is estimated simultaneously while learning a control policy. The estimated model is used to direct the search for an optimum policy. Extensive simulations are provided to assess the effectiveness of the algorithm under a variety of traffic conditions. Comparisons with some well-known allocation policies are also presented. Simulation results show that for the traffic conditions considered in this paper, the proposed scheme has a comparable performance to the optimal guard channel approach.
We study the following Constrained Bipartite Edge Coloring (CBEC) problem: We are given a bipartite graph G(U, V, E) of maximum degree I with n vertices, in which some of the edges have been legally colored with c col...
详细信息
Probabilistic bandwidth guarantees on variable bit-rate network flows offer significant improvements in throughput for only modest decreases in guarantee level. We present a probabilistic bandwidth reservation scheme ...
详细信息
ISBN:
(纸本)0769511341
Probabilistic bandwidth guarantees on variable bit-rate network flows offer significant improvements in throughput for only modest decreases in guarantee level. We present a probabilistic bandwidth reservation scheme for variable bit-rate flows called resource priority multiplexing (RPM). The RPM algorithm uses packet marking on edge routers and selective dropping on core routers to provide per-flow specification of probabilistic QoS with guarantees ranging from best-effort to hard reservation. RPM also supports multiple metrics for probabilistic level of service specification. All flow tables are managed only by the edge routers enhancing scalability of the approach. Unlike existing statistical multiplexing approaches, RPM uses a time-multiplexed priority tagging algorithm which provides higher control over flows guarantee levels. The algorithm has been implemented in a live system as part of the IP protocol stack and experimental results are presented.
The article shows how to solve some computational problems in finite group theory using the software system "DSR Open Lab 1.0" designed and developed by authors. We consider such computational problems as fo...
详细信息
ISBN:
(纸本)9539676932
The article shows how to solve some computational problems in finite group theory using the software system "DSR Open Lab 1.0" designed and developed by authors. We consider such computational problems as follows: the construction of the group using given elements or a genetic code (generators and relations), the operations with the group elements as well as the calculations of subgroups and their powers, normal subgroup, factor-group, etc. We also give a comparison of the user interface implementation of our software with Maple V Release 5. The presented examples show that the process of problem solving and teaching in finite group theory has become easier and more interactive now, due to the visual user interface of the presented software.
A watermark embedding method, using an amplitude modulation technique, based on Gaussian pixel-weighting marks is proposed. The method utilizes a technique of weighting a mark by averaging the luminance of its own pix...
详细信息
A watermark embedding method, using an amplitude modulation technique, based on Gaussian pixel-weighting marks is proposed. The method utilizes a technique of weighting a mark by averaging the luminance of its own pixel and its neighboring pixels, and uses it as an additional scaling factor in existing watermark embedding methods. The watermark retrieval process is borrowed from the technique of image averaging from the cross-shaped neighboring pixels of the watermarked image, and hence has no need of the original image. The results show that improved performance is obtained when applying the Gaussian pixel-weighting marks technique, compared to other techniques, namely the equal gain pixel-weighting and the no pixel-weighting marks techniques.
We propose a distributed channel allocation algorithm based on a threshold scheme, called D-CAT, for cellular mobile networks. The D-CAT algorithm employs two thresholds: (i) a heavy threshold used for determining whe...
详细信息
ISBN:
(纸本)1581134215
We propose a distributed channel allocation algorithm based on a threshold scheme, called D-CAT, for cellular mobile networks. The D-CAT algorithm employs two thresholds: (i) a heavy threshold used for determining whether a cell is heavy, i.e., overloaded, and for triggering the channel allocation algorithm;and (ii) a target threshold used for indicating the target number of free channels that a heavy cell intends to acquire. We determine the optimal number of free channels as welt as the cell(s) from where a heavy cell should import to satisfy its channel demand. Simulation experiments and analyses show that the D-CAT algorithm incurs lower overhead for channel allocation and is more efficient in terms of channel utilization than other distributed channel allocation algorithms. It also outperforms other centralized and distributed algorithms in terms of call blocking probability.
暂无评论