45,763 research outputs found
Routing in Mobile Ad-Hoc Networks using Social Tie Strengths and Mobility Plans
We consider the problem of routing in a mobile ad-hoc network (MANET) for
which the planned mobilities of the nodes are partially known a priori and the
nodes travel in groups. This situation arises commonly in military and
emergency response scenarios. Optimal routes are computed using the most
reliable path principle in which the negative logarithm of a node pair's
adjacency probability is used as a link weight metric. This probability is
estimated using the mobility plan as well as dynamic information captured by
table exchanges, including a measure of the social tie strength between nodes.
The latter information is useful when nodes deviate from their plans or when
the plans are inaccurate. We compare the proposed routing algorithm with the
commonly-used optimized link state routing (OLSR) protocol in ns-3 simulations.
As the OLSR protocol does not exploit the mobility plans, it relies on link
state determination which suffers with increasing mobility. Our simulations
show considerably better throughput performance with the proposed approach as
compared with OLSR at the expense of increased overhead. However, in the
high-throughput regime, the proposed approach outperforms OLSR in terms of both
throughput and overhead
Automatic routing module
Automatic Routing Module (ARM) is a tool to partially automate Air Launched Cruise Missile (ALCM) routing. For any accessible launch point or target pair, ARM creates flyable routes that, within the fidelity of the models, are optimal in terms of threat avoidance, clobber avoidance, and adherence to vehicle and planning constraints. Although highly algorithmic, ARM is an expert system. Because of the heuristics applied, ARM generated routes closely resemble manually generated routes in routine cases. In more complex cases, ARM's ability to accumulate and assess threat danger in three dimensions and trade that danger off with the probability of ground clobber results in the safest path around or through difficult areas. The tools available prior to ARM did not provide the planner with enough information or present it in such a way that ensured he would select the safest path
Routing Optimization Under Uncertainty
We consider a class of routing optimization problems under uncertainty in which all decisions are made before the uncertainty is realized. The objective is to obtain optimal routing solutions that would, as much as possible, adhere to a set of specified requirements after the uncertainty is realized. These problems include finding an optimal routing solution to meet the soft time window requirements at a subset of nodes when the travel time is uncertain, and sending multiple capacitated vehicles to different nodes to meet the customers’ uncertain demands. We introduce a precise mathematical framework for defining and solving such routing problems. In particular, we propose a new decision criterion, called the Requirements Violation (RV) Index, which quantifies the risk associated with the violation of requirements taking into account both the frequency of violations and their magnitudes whenever they occur. The criterion can handle instances when probability distributions are known, and ambiguity when distributions are partially characterized through descriptive statistics such as moments. We develop practically efficient algorithms involving Benders decomposition to find the exact optimal routing solution in which the RV Index criterion is minimized, and we give numerical results from several computational studies that show the attractive performance of the solutions
Power Aware Routing for Sensor Databases
Wireless sensor networks offer the potential to span and monitor large
geographical areas inexpensively. Sensor network databases like TinyDB are the
dominant architectures to extract and manage data in such networks. Since
sensors have significant power constraints (battery life), and high
communication costs, design of energy efficient communication algorithms is of
great importance. The data flow in a sensor database is very different from
data flow in an ordinary network and poses novel challenges in designing
efficient routing algorithms. In this work we explore the problem of energy
efficient routing for various different types of database queries and show that
in general, this problem is NP-complete. We give a constant factor
approximation algorithm for one class of query, and for other queries give
heuristic algorithms. We evaluate the efficiency of the proposed algorithms by
simulation and demonstrate their near optimal performance for various network
sizes
NoCo: ILP-based worst-case contention estimation for mesh real-time manycores
Manycores are capable of providing the computational demands required by functionally-advanced critical applications in domains such as automotive and avionics. In manycores a network-on-chip (NoC) provides access to shared caches and memories and hence concentrates most of the contention that tasks suffer, with effects on the worst-case contention delay (WCD) of packets and tasks' WCET. While several proposals minimize the impact of individual NoC parameters on WCD, e.g. mapping and routing, there are strong dependences among these NoC parameters. Hence, finding the optimal NoC configurations requires optimizing all parameters simultaneously, which represents a multidimensional optimization problem. In this paper we propose NoCo, a novel approach that combines ILP and stochastic optimization to find NoC configurations in terms of packet routing, application mapping, and arbitration weight allocation. Our results show that NoCo improves other techniques that optimize a subset of NoC parameters.This work has been partially supported by the Spanish Ministry of Economy and Competitiveness under grant TIN2015-
65316-P and the HiPEAC Network of Excellence. It also received funding from the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (agreement No. 772773). Carles Hernández
is jointly supported by the MINECO and FEDER funds
through grant TIN2014-60404-JIN. Jaume Abella has been
partially supported by the Spanish Ministry of Economy and
Competitiveness under Ramon y Cajal postdoctoral fellowship
number RYC-2013-14717. Enrico Mezzetti has been partially
supported by the Spanish Ministry of Economy and Competitiveness
under Juan de la Cierva-Incorporaci´on postdoctoral
fellowship number IJCI-2016-27396.Peer ReviewedPostprint (author's final draft
Optimal Network Control in Partially-Controllable Networks
The effectiveness of many optimal network control algorithms (e.g.,
BackPressure) relies on the premise that all of the nodes are fully
controllable. However, these algorithms may yield poor performance in a
partially-controllable network where a subset of nodes are uncontrollable and
use some unknown policy. Such a partially-controllable model is of increasing
importance in real-world networked systems such as overlay-underlay networks.
In this paper, we design optimal network control algorithms that can stabilize
a partially-controllable network. We first study the scenario where
uncontrollable nodes use a queue-agnostic policy, and propose a low-complexity
throughput-optimal algorithm, called Tracking-MaxWeight (TMW), which enhances
the original MaxWeight algorithm with an explicit learning of the policy used
by uncontrollable nodes. Next, we investigate the scenario where uncontrollable
nodes use a queue-dependent policy and the problem is formulated as an MDP with
unknown queueing dynamics. We propose a new reinforcement learning algorithm,
called Truncated Upper Confidence Reinforcement Learning (TUCRL), and prove
that TUCRL achieves tunable three-way tradeoffs between throughput, delay and
convergence rate
Resilience of Traffic Networks with Partially Controlled Routing
This paper investigates the use of Infrastructure-To-Vehicle (I2V)
communication to generate routing suggestions for drivers in transportation
systems, with the goal of optimizing a measure of overall network congestion.
We define link-wise levels of trust to tolerate the non-cooperative behavior of
part of the driver population, and we propose a real-time optimization
mechanism that adapts to the instantaneous network conditions and to sudden
changes in the levels of trust. Our framework allows us to quantify the
improvement in travel time in relation to the degree at which drivers follow
the routing suggestions. We then study the resilience of the system, measured
as the smallest change in routing choices that results in roads reaching their
maximum capacity. Interestingly, our findings suggest that fluctuations in the
extent to which drivers follow the provided routing suggestions can cause
failures of certain links. These results imply that the benefits of using
Infrastructure-To-Vehicle communication come at the cost of new fragilities,
that should be appropriately addressed in order to guarantee the reliable
operation of the infrastructure.Comment: Accepted for presentation at the IEEE 2019 American Control
Conferenc
A Concurrency-Optimal Binary Search Tree
The paper presents the first \emph{concurrency-optimal} implementation of a
binary search tree (BST). The implementation, based on a standard sequential
implementation of an internal tree, ensures that every \emph{schedule} is
accepted, i.e., interleaving of steps of the sequential code, unless
linearizability is violated. To ensure this property, we use a novel read-write
locking scheme that protects tree \emph{edges} in addition to nodes.
Our implementation outperforms the state-of-the art BSTs on most basic
workloads, which suggests that optimizing the set of accepted schedules of the
sequential code can be an adequate design principle for efficient concurrent
data structures
Probability Distributions on Partially Ordered Sets and Network Interdiction Games
This article poses the following problem: Does there exist a probability
distribution over subsets of a finite partially ordered set (poset), such that
a set of constraints involving marginal probabilities of the poset's elements
and maximal chains is satisfied? We present a combinatorial algorithm to
positively resolve this question. The algorithm can be implemented in
polynomial time in the special case where maximal chain probabilities are
affine functions of their elements. This existence problem is relevant for the
equilibrium characterization of a generic strategic interdiction game on a
capacitated flow network. The game involves a routing entity that sends its
flow through the network while facing path transportation costs, and an
interdictor who simultaneously interdicts one or more edges while facing edge
interdiction costs. Using our existence result on posets and strict
complementary slackness in linear programming, we show that the Nash equilibria
of this game can be fully described using primal and dual solutions of a
minimum-cost circulation problem. Our analysis provides a new characterization
of the critical components in the interdiction game. It also leads to a
polynomial-time approach for equilibrium computation
- …