This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the ICC 2008 proceedings.

Energy Efficient Expanding Ring Search for Route Discovery in MANETs Ngoc Duy Pham and Hyunseung Choo School of Information and Communication Engineering Sungkyunkwan University, Korea Email: [email protected], [email protected]

Abstract—A mobile ad-hoc network is a self-configuring network of user devices that are connected by wireless links in infrastructure-less situation. These kinds of networks have many challenges such as unreliable links, lack of scalability, limited resources, etc. and energy consumption is a major issue in designing network protocols because of battery constraints. In on-demand multi-hop routing protocols e.g. AODV and DSR, the route discovery process uses Expanding Ring Search heuristic algorithm for reducing broadcast overhead and saving energy consumption. However, based on our observation we see that there are still some redundant broadcasts of this process that causes overhead, wasted energy, and increased collisions in the network. Here we propose a method which solves the redundant broadcasts of route discovery based on expanding ring search. The performance evaluation results show that by applying the proposed scheme, we can reduce the overhead of expanding ring search based route discovery up to about 20%, and therefore the total energy consumption of AODV is decreased by 15%.

I. I NTRODUCTION Mobile Ad hoc Networks (MANETs) [1]–[3] provide an infrastructure-less communication which is an alternative for conventional wired networks. Because of the infrastructureless characteristic, MANETs have many challenges and the success of the MANETs paradigm depends on the network sustainability. One of the greatest limitations of mobile computing environment is the finite power supplies inherent in mobile devices [3]. For extending the lifetime of mobile ad hoc hosts, many energy efficient protocols have been designed [2]. We continue those works by proposing an energy efficient scheme to improve the sustainability of MANETs. Mobile nodes cooperate for delivering a successful packet from a source to a destination through intermediate nodes in MANETs; therefore, routing protocols are used frequently. In reactive routing protocols [2], when having a packet to send the source node broadcasts a request message to query the route to the destination, and then all nodes in the network cooperate to re-transmit this message. This process is called route discovery and the re-transmitting message of all nodes in the network in some cases causes a large overhead with energy consumption. In order to reduce the overhead of the route discovery process, the Expanding Ring Search [4], [5] is applied. In this heuristic algorithm, non-destination nodes have a chance to reply to the route request (RREQ) that they have cached information about destination. Expanding Ring Search (ERS) is used for making the route discovery process be more efficient. However, it still has some

disadvantages that need to be alleviated in order to get better results. Historically, there have been some ideas proposed for improving ERS such as Optimising ERS [6] and Blocking ERS [7]. Optimizing ERS focuses on determining the threshold of ERS for a successive search before initiating a network wide broadcast. Blocking ERS is related to stopping searching as soon as possible when the needed information is found. In our study, we focus on the flooding mechanism of ERS. Because ERS uses pure flooding for broadcasting the query message to all nodes, we propose a new method to improve the flooding of ERS, and hence making it become more efficient. In this paper, we describe a method which makes the ERS based route discovery of traditional reactive routing protocols like AODV [8] and DSR [9] become more energy efficient. This method reduces the number of re-transmitting request messages in the route discovery process which means we can reduce the network overhead and save energy consumption. The performance results show that our proposal can make ERS based route discovery of AODV reduce the overhead of retransmitting control messages by 20%; therefore, up to 15% of the total energy consumption of this protocol can be saved. II. R ELATED W ORK The Time To Live Sequence based Expanding Ring Search (ERS) [5] algorithm is a technique that can avoid networkwide broadcasting by searching a larger area around the source of broadcast. The goal of this algorithm is to find nodes having information needed about the destination in their route caches. ERS is widely used especially in multi-hop wireless networks. The source node is the center of the search ring; ERS successively searches a larger area until the node having needed information being searched is found. The mechanism is: the searching process begins by sending out a query with a small Time To Live (TTL) value (usually taken as 1). Each time the query is relayed by an immediate node, the TTL value is decreased by 1. If the TTL value is greater than 0, the query will be forwarded; otherwise it is not forwarded any further. After sending out a query with a given TTL value, the source waits for a period of a timeout to receive the reply. If there is no reply within the timeout period, the source node increases the TTL by adding an incremental value (usually is 2) and starts searching again. Increasing the TTL value of the broadcast message means the source increases the radius of the searching ring. The searching process, as above, continues

978-1-4244-2075-9/08/$25.00 ©2008 IEEE

3002

This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the ICC 2008 proceedings.

until the information needed is found or the TTL value reaches a threshold T . At this time, if no reply is received, the source starts a broadcast to the entire network (TTL value is set to a very large number). Fig. 1 illustrates an example of an ERS. D

D

S source D destination

S

S

1st Ring 2nd Ring

(a) RREQ : T T L = 1 Fig. 1.

nodes in the 1st ring nodes have route to destination

(b) RREQ : T T L = 3

An example of an expanding ring search.

The efficiency of the ERS is that if some local nodes have information about the destination, then the source does not have to use a full flooding to search the entire network so that the far nodes from the source can save energy. But in some cases, if the nodes do not have information about the destination or if the destination is far from the source, after some expanding the search ring, source node will use a full flooding for the query process. This makes the nodes near the source have to re-broadcast the query many times, therefore, consuming energy and increasing the network overhead. III. T HE P ROPOSED S CHEME From our study, we observe that there are still many redundant transmissions of ERS which can be reduced for making ERS more efficient. The redundant transmissions appear when the source increases the search ring radius at least one time for finding information about the destination. Fig. 1(b) is an example of ERS that source node S expands the search ring one time. In the first ring, there is no node has information about the destination so the node S has to increase the radius of the search ring and start searching again. At the second searching, the nodes in the first ring (the striped one) have to relay RREQ messages twice: once in the first search and once for the second search. Similarly, if the third search occurs, nodes in the first ring have to relay a RREQ message three times; nodes in the second ring have to relay RREQ twice. A question is raised here that if the source uses more than one search then why do we not optimize the second search based on the first search, optimize the third search based on the second search, and so on. From those analyses, in this section, we introduce a new method for optimizing ERS. Our study in improving ERS focuses on the pure flooding mechanism of query messages where we reduce the overhead of flooding for making ERS more energy efficient. We describe our proposal as an Efficient Flooding Based on Overhearing scheme. The assumption for this scheme is that it is needed when more than two flooding events occur continuously. This scheme will reduce the overhead of the second flooding based on the information collected at the previous flooding.

A. Basic Idea When a node sends a message to the entire network, it first broadcasts the message to its neighbors. In pure flooding, every neighbor has to relay the message by continuously retransmitting the receiving message to its own neighbors if it receives the message the first time. If the node already has received this message before, it will drop the message immediately. However, if the message has some data regarding the sender then dropping the duplicate message will waste the neighbor’s information. Therefore, we propose a method that involves obtaining and utilizing the information of the incoming message before dropping; that data helps the node recognize its neighbors’ information. Information of neighbors somehow is considered as the network local topology and it is useful for reducing the overhead of floodings. From the idea described above, in order to make duplicate messages more useful, we modify the pure flooding by a node before sending a message out and that will add the predecessor address into the message data. The predecessor of one node is the node from which it receives the message; in this case, the predecessor is also called the previous node or the sender. When relaying a message, the node also adds a predecessor address (previous node address) into the message data before sending the message out to neighbors. On receiving that message, neighbors can collect the address of its sender and also the predecessor address of the sender by extracting this information from the incoming message data. This information is seen as the local topology information of 2-hop neighbors. In Fig. 2(a), A and B broadcast a message and D receives a message from A, so A is the predecessor of D. Likewise, B is the predecessor of C. When C and D relay the message by sending it out, they add the predecessor address into the message data before sending it. Assume that E receives a message from D first, so E knows that the predecessor address of D is A by obtaining this information from the message data. After that, E receives a message from C. It is a duplicate message but instead of dropping the message immediately, E extracts the predecessor address of C. At this time, E knows the predecessors of C and D respectively; somehow it knows that D has received the message from A and C has received from B. This knowledge cannot be known in the pure flooding.

A

D

A

D

E B

E

C

B

(a) Relaying message. Fig. 2.

C

(b) Getting information.

Improving pure flooding.

3003

This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the ICC 2008 proceedings.

Relay: false Predecessor address: A Relay: false B predAddr: A Relay: false O A D predAddr: C Relay: false Relay: false predAddr: predAddr: A

Relay: false predAddr: A O

(a) A broadcasts a message.

Relay: false predAddr: A O

A

D C Relay: false predAddr: A

Relay: false predAddr: B

Fig. 3.

A

Relay: true predAddr:

D C Relay: false predAddr: A

Relay: false predAddr: B

(c) O and C broadcast messages.

Relay: false predAddr: A O

Relay: true predAddr: A B A

D C Relay: false predAddr: A

Relay: false predAddr: B

(e) O, A, and B flooding messages.

Efficient flooding based on overhearing scheme.

B. Efficient Flooding Based on Overhearing Scheme We now discuss an overhearing based efficient flooding scheme for ad hoc networks. With the assumption that there are at least two floodings happening continuously, the proposed scheme reduces the overhead of flooding based on the neighbor information collected in the previous pure flooding. The proposed scheme is divided into two parts: the first is collecting local topology information and the second is reducing the overhead of pure flooding. The collecting local topology information step needs a process of pure flooding. When pure flooding occurs, every node collects neighbors’ information by overhearing sending messages out of its neighbors. Each node has a variable named ‘relay’ which means that the node relays the flooding message when the value of ‘relay’ is true and node receives this message for the first time. Otherwise, the node does not relay the flooding message. The initial value of the variable ‘relay’ is false and during the pure flooding, all nodes have to relay a message without considering the value of that variable. The process at each node occurs as in these steps:



Relay: false predAddr: B

Relay: true predAddr:

(d) D broadcasts a message.



D C Relay: false predAddr: A

(b) B broadcasts a message.

Relay: true predAddr: A B

Relay: true predAddr:

A

Relay: true predAddr:

Relay: false predAddr: A B

Relay: false predAddr: A O

Relay: false predAddr: A B

When receiving a flooding message, the node relays the message if it has not received this message before. But before sending the message out, the node adds the sender (predecessor) address into the message data and then broadcasts. The information about the sender address can be extracted easily from the received message because when broadcasting a message, a node has to add its address into the source field of the packet header. If a node has already received this flooding message before, it extracts the predecessor address of the sender in the message data before dropping the message. When the predecessor address has been extracted, the node compares the address with its own address. If the two addresses have the same value, the node sets the value of the variable ‘relay’ to true. The example in Fig. 3(a)-3(d) shows how each node works in the first step.

Fig. 3(a) shows the network topology. Each node has a variable name ‘relay’ whose initial value is false. Node A wants to send a message to an entire network; it broadcasts the message to its neighbors. Because B and C are in the transmission range of A, they receive the message. A becomes the predecessor of B and C in the message path. This is the first time B and C receive a flooding message so they participate in relaying the message. But before relaying the message, B and C add their predecessor addresses into the message data and send them out. Assume that B first relays the message received from A as in Fig. 3(b). A, C, and D receive the message of B. As this is the first time D receives a message, it relays the message by adding a predecessor address into the message data. A receives a duplicate message; it extracts the predecessor address in the message data and compares this to its address. They are same so A sets its variable ‘relay’ to true. C also receives a duplicate message but the predecessor address in the message is different to its address so C drops the duplicate message without changing anything. Likewise, O and C relay the message received from A (Fig. 3(c)). Each node receiving messages from O and C completes the same process as done in A and C above. Finally, D relays the message received from B (Fig. 3(d)). B overhears the sending message out of D, obtains the predecessor address, and then compares this address with its own one. They are same so B sets its variable ‘relay’ to true. C does nothing because the predecessor address is different to its address. After the pure flooding, in the network there are some nodes that have the variable ‘relay’ set to true and others have the value of false. From the principle above, we conclude that a value of true of the variable ‘relay’ means a node overhears its neighbor(s) continue relaying a message received from it and a value of false means there is no neighbor relaying its message. So if the message is not relayed by any neighbor, re-transmitting of this node is redundant.

3004

This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the ICC 2008 proceedings.

In the second phase, reducing the overhead of pure flooding step, if another pure flooding occurs then the overhead of this flooding can be reduced by using the value of the variable ‘relay’ at each node. Only nodes that have the variable ‘relay’ set to true relay the message received from its neighbor; nodes with ‘relay’ of false receive a message but do not relay. With the network in Fig. 3(a), after a pure flooding of A, assume that O wants to send a message to the entire network as in Fig. 3(e). At this time, only the nodes that have the variable ‘relay’ set to true (node A and B) can relay a message for O. So, in this case, there are only 3 broadcasts for sending a message to the entire network and that message is propagated to all of the nodes. C. ERS based Route Discovery The proposed scheme is an efficient way to reduce the overhead of the pure flooding based on the previous flooding. In ERS based route discovery, the source node uses continuous flooding with a larger searching area to find information about the destination. If the searching in the i−1st ring (called i−1st searching for short) cannot find the information needed, the source node will initiate an ith searching. As you see here, the mechanism of ERS satisfies the assumption of the proposed scheme, so in this part we present a way how to apply our scheme to reduce the overhead of the ith searching based on the information from the i−1st searching. Assume that a source node invokes the route discovery process to find a route to a destination, the application of the proposed scheme into ERS based route discovery is summarized as follow, 1) In the first search, the source node broadcasts a request to find a route to the destination within K-hop neighbors from it. Every node within the search ring collects the local topology information based on the pure flooding. They determine the value of the variable ‘relay’ by overhearing messages sent out by neighbors. 2) If there is no route for the destination, the source node increases the search ring radius and initiates searching again (the second search). Some nodes that participated in the first search can be silent by applying reducing the overhead of pure flooding step. Nodes that are not in the overlapping area of the first search and the second search have to perform pure flooding while collecting the local topology information for changing the value of the variable ‘relay’. 3) The third search happens if there is still no route for the destination, the source node continues to increase to ring radius and start searching again. Same as the second search, some nodes participating in the second search can be silent by applying reducing the overhead of pure flooding step. Nodes that are not in the overlapping area of the second and the third search have to perform pure flooding while collecting the local topology information. 4) The same process to the forth search, fifth search, etc. if the source node continues expanding the search ring for find information about the destination.

IV. P ERFORMANCE E VALUATION A. Simulation environment To analyze the efficiency of the proposed scheme, we compare the performance of ERS with that of ERS using the proposed scheme. We use ERS based route discovery of AODV for an instance of ERS. The modified ERS based route discovery of AODV is an instance of the proposed scheme. We also select pure route discovery of AODV as a basic protocol for comparisons. We develop the simulation in Qualnet simulator environment and perform the simulation until performance measures are converged; then we obtain average values. Hundred different networks are generated randomly in an area, 1500 × 1500 m2 . The transmission radius is set to 250 meter, each data packet with attached information has a constant length of 512 bytes, and the bandwidth of a wireless channel is set to 2M b/s as the default. The main objective of our proposed idea is to reduce the number of nodes forwarding the RREQ as much as possible. This means that redundant transmissions are minimized. The metric, the number of RREQs forwarded, is used for evaluating the efficiency of the proposed scheme. We also consider other performance measures such as: the number of route discovery successes, and the total energy consumption. The number of route discovery successes is the number of successful route discoveries divided by the number of route discoveries invoked. The energy consumption is the total energy consumed by all nodes in the network. B. Results and Discussion 1) Performance on the number of nodes: In this simulation, we place a certain number of nodes from 50 to 200 randomly on the network area. The network load is set to 50 active routes which means that during 30 seconds of simulation time, at random moments, one random source sends a packet to a random destination and this occurs 50 times. The simulation results are plotted in Fig. 4. Our observation from those figures is: •





The proposed idea makes AODV using ERS reduce by 20% of the number of RREQs forwarded. AODV using ERS is 20% better than pure AODV in term of the number of RREQs forwarded; therefore, in total the proposed scheme improves AODV up to about 40% for the reduced number of RREQs. Reducing the number of relaying messages has the same meaning as reducing energy consumption of nodes in the network. From Fig. 4(c), we see that the proposed scheme makes AODV using ERS reduce energy consumption up to 15% so it helps nodes live longer. Another important metric in the comparison is the successful route discovered. From the Figs. 4(b), the proposed scheme reduces the number of RREQs forwarded in the AODV route request process but does not affect the ratio of the routes discovered successfully.

3005

This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the ICC 2008 proceedings.

AODV d e d r a w r o f s Q E R R f o r e b m u n e h t

AODV-ERS

Our Scheme

AODV

15000 12500 10000 7500 5000 2500 0 50

100

150

200

) (% s s e c c u s y r e v o c is d e t u o r f o io t a r

AODV-ERS

Fig. 4. AODV-ERS

W m ( 0.3

80 60 40 20 0 50

100

AODV

12500 10000 7500 5000 2500 0 50

75

100

150

the number of active routes

(a) The number of RREQs forwarded. Fig. 5.

150

200

n o ti p m u s n o c y g r e n e l a t o t

0.2 0.1 0 50

100

150

200

the number of nodes

(b) The number of route discovery successes. (c) The total energy consumption (mWhr).

Our Scheme

15000

25

Our Scheme

The performance on a mobile network with a different number of nodes.

17500

15

AODV-ERS

0.4

the number of nodes

(a) The number of RREQs forwarded.

AODV

AODV ) r h

the number of nodes

d e d r a w r o f s Q E R R r e b m u n e h t

Our Scheme

100

) (% s s e c c u s y r e v o c s i d e t u o r f o io t a r

AODV-ERS

Our Scheme

AODV

100

) r h

AODV-ERS

Our Scheme

0.8

W m ( 0.6

80 60 40 20 0 15

25

50

75

100

the number of active routes

150

n o ti p m u s n o c y g r e n e l a t o t

0.4 0.2 0 15

25

50

75

100

150

the number of active routes

(b) The number of route discovery successes. (c) The total energy consumption (mWhr).

The performance on a mobile network with a different number of active routes.

2) Performance on the number of active routes: In this simulation, we maintain the number of nodes at 100 and the size of the network area, 1500×1500 m2 . We change the number of active routes in the network during the simulation time from 15 to 150. The Fig. 5 shows the comparison of results between 3 route request processes of 3 routing protocols. From that figure, once again, by applying the proposed scheme we make the route request of AODV reduce the number of route requests and save energy consumption of all nodes in the network. In these simulations, we show the efficiency of the proposed scheme in many networks with different topologies: from the sparse networks to dense ones by increasing the number of nodes in a fix area, in many networks with low to high loads (increasing the number of active routes). In all cases, the proposed scheme achieves better results. About other metrics for showing the efficiency of the proposed scheme, we consider memory overhead and the processing needed for applying this scheme. The proposed scheme uses only one variable ‘relay’ so the extra memory used is costless and in processing, we only check and compare the address in the message data with the node address; it is a primitive and trivial operator so the cost for this process is also very small. V. C ONCLUSION In this paper, we proposed an efficient way to improve the route request process of AODV in particular and an efficient way to improve the ERS algorithm in general. By using the proposed idea, many protocols using ERS such as AODV and DSR can reduce the overhead of the route request process by reducing the number of nodes relaying the query messages.

The result is energy saving which is an important issue in ad hoc area. Our performance evaluation demonstrates the efficiency of the AODV using the proposed idea as compared with AODV using ERS only. Acknowledgment. This research was supported by MIC, Korea under ITRC IITA-2008-(C1090-0801-0046). Dr. Choo is the corresponding author. R EFERENCES [1] C.E. Perkins, “Ad Hoc Networking,” Addison-Wesley, Reading, MA, 2000. [2] E.M. Royer and C.K. Toh, “A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks,” IEEE Personal Communications, vol. 6, no. 2, pp. 46-55, April 1999. [3] J. E. Wieselthier, G. D. Nguyen, and A. Ephremides, “Energy-Efficient Broadcast and Multicast Trees in Wireless Networks,” Mobile Networks and Applications, vol. 7, no. 6, pp. 481-492, 2002. [4] I. Park and I. Pu, “Energy Efficient Expanding Ring Search,” Proceedings of the First Asia International Conference on Modelling & Simulation, pp. 198-199, 2007. [5] J. Hassan and S. Jha, “Performance Analysis of Expanding Ring Search for Multi-Hop Wireless Networks,” IEEE Vehicular Technology Conference, vol. 5, pp. 3615-3619, 2004. [6] J. Hassan and S. Jha, “Optimising Expanding Ring Search for MultiHop Wireless Networks”, IEEE Global Telecommunications Conference, Dallas, TX, 2004. [7] I. Park, J. Kim, and I. Pu, “Blocking Expanding Ring Search Algorithm for Efficient Energy Consumption in Mobile Ad Hoc Networks”, Proceedings of the WONS, Les Menuires, France, pp. 185-190, 2006. [8] C.E. Perkins, E.M. Royer, and S.R. Das, “Ad-hoc On-Demand Distance Vector (AODV) Routing,” IETF Internet Draft (work in progress), draftperkins-manet-aodvbis-00.txt, October 2003. [9] D.B Johnson, D.A. Maltz, and Y.C. Hu, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks,” IETF Internet Draft (work in progress), draft-ietf-manet-dsr-09-txt, April 2003.

3006

Energy Efficient Expanding Ring Search for Route ...

work of user devices that are connected by wireless links in infrastructure-less situation. ... disadvantages that need to be alleviated in order to get better results.

346KB Sizes 0 Downloads 212 Views

Recommend Documents

An Enhanced Expanding Ring Search for Route ...
means we can reduce the network overhead and save ... dropping the duplicate message will waste the ... duplicate messages more useful, we modify the.

Efficient DES Key Search
operation for a small penalty in running time. The issues of development ... cost of the machine and the time required to find a DES key. There are no plans to ...

Energy-Efficient Protocol for Cooperative Networks - CiteSeerX
Apr 15, 2011 - model a cooperative transmission link in wireless networks as a transmitter cluster ... savings can be achieved for a grid topology, while for random node placement our ...... Comput., Pacific Grove, CA, Oct. 2006, pp. 814–818.

Efficient Search for Interactive Statistical Machine ... - Semantic Scholar
Efficient Search for Interactive Statistical Machine Translation. Franz Josef Och ... Current machine translation technology is not able ..... run on a small computer.

Efficient Indexing for Large Scale Visual Search
local feature-based image retrieval systems, “bag of visual terms” (BOV) model is ... with the same data structure, and answer a query in a few milliseconds [2].

Grid-based Local Feature Bundling for Efficient Object Search
ratios, in practice we fix the grid size when dividing up the images. We test 4 different grid sizes .... IEEE. Conf. on Computer Vision and Pattern Recognition, 2007.

An Efficient Pseudocodeword Search Algorithm for ...
next step. The iterations converge rapidly to a pseudocodeword neighboring the zero codeword ..... ever our working conjecture is that the right-hand side (RHS).

Fault Tolerant and Energy Efficient Routing for Sensor ...
Sep 1, 2004 - most common routing protocol for ad hoc wireless networks [1], including ... advantage of energy efficient routing over minimum hop routing.

Efficient Ranking in Sponsored Search
Sponsored search is today considered one of the most effective marketing vehicles available ... search market. ...... pooling in multilevel (hierarchical) models.

EFFICIENT SPEECH INDEXING AND SEARCH FOR ...
photos, videos, and voice mail, as well as weather forecasts, news, and device-specific commands and bookmarks. The purpose of speech search is to identify ...

An Energy-Efficient Heterogeneous System for ...
investigate the use of the Atom processor for web search ... accelerators, where the Atom functions as a host and control ... to extract K best .... operating at 10.

Exploiting Actuator Mobility for Energy-Efficient Data ...
energy consumption causes degraded network performance and shortened network ... gion of interest for object monitoring and target tracking. Once deployed, they ... proach, a mobile actuator visits (possibly at slow speed) data sources and ...

Energy efficient routing with delay guarantee for sensor ... - Springer Link
Jun 15, 2006 - shown in [2], most of the battery energy is consumed by the radio. A Time ..... can then prove that the head of each arc in G v is closer to the.

An Energy-Efficient Heterogeneous System for ...
Abstract—Embedded learning applications in automobiles, surveillance .... investigate the use of the Atom processor for web search ..... /products.php?pn=.

Energy efficient schemes for wireless sensor networks ...
Department of Computer Science. †. School of Management ... Abstract— One of the main design issues for a sensor network ..... in Sensor Information Systems.

A Regularized Line Search Tunneling for Efficient Neural Network ...
Efficient Neural Network Learning. Dae-Won Lee, Hyung-Jun Choi, and Jaewook Lee. Department of Industrial Engineering,. Pohang University of Science and ...

Efficient Search for Interactive Statistical Machine ...
Efficient Search for Interactive Statistical Machine Translation. Franz Josef ..... The domain of this corpus is ... have been made available by the Linguistic Data.

Memristors for Energy‐Efficient New ...
Jul 18, 2016 - The Energy Crisis and Information Technology. The amount of digital data worldwide ... limit (energy for one thermodynamic degree of freedom).

Efficient MAP approximation for dense energy functions - The Robotics ...
Appearing in Proceedings of the 23rd International Con- .... Lagrange multipliers we obtain the free energy as: ..... Conference on Computer Vision, 2005.

a simulation framework for energy efficient data grids
ing a data grid that can conserve energy for data-intensive ... Figure 1: A system architecture for data grids. 1418 .... distributed memory multiprocessors.

An Energy-Efficient Heterogeneous System for ... - Semantic Scholar
IV, we describe the system architecture. In Section V, we present the performance characteristics of the workloads. In. Section VI, we evaluate the energy ...

Energy-Efficient Protocol for Cooperative Networks - Research at Google
Apr 15, 2011 - resources and, consequently, protocols designed for sensor networks ... One recent technology that ... discovered, information about the energy required for transmis- ..... Next, the definition in (6) is generalized for use in (7) as.

Distributive Energy Efficient Adaptive Clustering Protocol for Wireless ...
Indian Institute of Technology, Kharagpur, India ... solutions to some of the conventional wireless ... routing protocol for wireless sensor networks, which uses a ...