Presentation prepared for IEEE International Conference on Communications 2009
Paper is online at http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5198761
Abstract: "This paper addresses the problem of traffic grooming in WDM rings in which all traffic emanates from a single node and all other nodes are destination nodes. This “one-to-many” scenario arises in metropolitan access networks in which one
node serves as a “hub” connecting the ring to a larger network as well as in video-on-demand and other multimedia services
where a single source node serves a collection of subscriber nodes. The ring comprises a given number of wavelengths of
uniform capacity and a variable number of tunable Add-Drop Multiplexers (ADMs) at each node. Given a set of requests at
the destination nodes, where each request comprises a bandwidth demand and a profit for fulfilling the request, our objective is
to select a subset of the requests and pack (“groom”) them onto the wavelengths such that no wavelength’s capacity is exceeded
and the total profit of the selected requests is maximized. Although this problem is NP-complete, we give polynomial time
approximation algorithms with excellent theoretical performance validated with experimental results."
dynamic traffic grooming in elastic optical network made from a reserch paperHamdard University
This document presents a dynamic traffic grooming approach for elastic optical networks. It proposes using a multi-layer auxiliary graph to solve the electrical layer routing and optical layer routing/spectrum assignment problems. It also proposes a Spectrum Reservation scheme to improve bandwidth utilization. The approach uses an auxiliary graph constructed for each connection request, with nodes representing physical nodes and edge types for lightpaths, spectrum, and transponders. It then runs Dijkstra's algorithm on the graph to find a path for the request.
The document provides an introduction to virtual reality including its history and various applications. It discusses how virtual reality has been used in education, healthcare, the military, and entertainment. Examples are given of early virtual reality technologies from the 1950s onward and how virtual reality has become more advanced and widely used over time. Benefits of virtual reality mentioned include cost savings, safety, skills training, and therapeutic applications.
This document describes a proposed web application for traffic police management. The objectives are to develop an application that allows citizens to easily report crimes online and check complaint status. It will replace the current manual system and reduce errors. The application will have features for registering complaints, login, viewing complaint status, and information on traffic signals and signs. A database will store user credentials and data. The overall goal is to create an efficient and effective police service for the public through better communication and leadership, while reducing crime and making crime reporting simpler.
Développer une stratégie socialmedia pour le e-commerce - #ECNTalks E-commerce Nation
Intervention d'Anthony Rochand, CEO de l'agence LEW, lors des #ECNTalks du 7 février 2017, dédiés au social commerce.
https://www.ecommerce-nation.fr/strategie-social-media-ecommerce/
https://www.ecommerce-nation.fr
Las proposiciones subordinadas adverbiales comparativas y consecutivas describen dos tipos de proposiciones adverbiales que comparan o indican consecuencias. Las proposiciones adverbiales comparativas y consecutivas ofrecen información sobre cómo una acción se compara con otra o cuáles son sus resultados.
El documento describe varias fotografías tomadas por una persona en un parque durante un paseo. No pudo completar el proyecto de fotografía asignado porque tuvo que viajar a casa de su abuela durante el fin de semana y terminó su paseo allí sin equipo.
St. Louis Urgent Care facility provides walk-in urgent care services for common illnesses and injuries for both adults and children with experienced emergency and family physicians. The facility is privately owned and operated by Dr. Matt Bruckel, who has 15 years of healthcare experience, including serving as chief resident in emergency medicine. The facility accepts all major insurances and treats patients with caring and professional staff.
dynamic traffic grooming in elastic optical network made from a reserch paperHamdard University
This document presents a dynamic traffic grooming approach for elastic optical networks. It proposes using a multi-layer auxiliary graph to solve the electrical layer routing and optical layer routing/spectrum assignment problems. It also proposes a Spectrum Reservation scheme to improve bandwidth utilization. The approach uses an auxiliary graph constructed for each connection request, with nodes representing physical nodes and edge types for lightpaths, spectrum, and transponders. It then runs Dijkstra's algorithm on the graph to find a path for the request.
The document provides an introduction to virtual reality including its history and various applications. It discusses how virtual reality has been used in education, healthcare, the military, and entertainment. Examples are given of early virtual reality technologies from the 1950s onward and how virtual reality has become more advanced and widely used over time. Benefits of virtual reality mentioned include cost savings, safety, skills training, and therapeutic applications.
This document describes a proposed web application for traffic police management. The objectives are to develop an application that allows citizens to easily report crimes online and check complaint status. It will replace the current manual system and reduce errors. The application will have features for registering complaints, login, viewing complaint status, and information on traffic signals and signs. A database will store user credentials and data. The overall goal is to create an efficient and effective police service for the public through better communication and leadership, while reducing crime and making crime reporting simpler.
Développer une stratégie socialmedia pour le e-commerce - #ECNTalks E-commerce Nation
Intervention d'Anthony Rochand, CEO de l'agence LEW, lors des #ECNTalks du 7 février 2017, dédiés au social commerce.
https://www.ecommerce-nation.fr/strategie-social-media-ecommerce/
https://www.ecommerce-nation.fr
Las proposiciones subordinadas adverbiales comparativas y consecutivas describen dos tipos de proposiciones adverbiales que comparan o indican consecuencias. Las proposiciones adverbiales comparativas y consecutivas ofrecen información sobre cómo una acción se compara con otra o cuáles son sus resultados.
El documento describe varias fotografías tomadas por una persona en un parque durante un paseo. No pudo completar el proyecto de fotografía asignado porque tuvo que viajar a casa de su abuela durante el fin de semana y terminó su paseo allí sin equipo.
St. Louis Urgent Care facility provides walk-in urgent care services for common illnesses and injuries for both adults and children with experienced emergency and family physicians. The facility is privately owned and operated by Dr. Matt Bruckel, who has 15 years of healthcare experience, including serving as chief resident in emergency medicine. The facility accepts all major insurances and treats patients with caring and professional staff.
This document provides examples of metaprogramming in Ruby. Metaprogramming allows writing programs that manipulate other programs as data. The examples demonstrate dynamically defining methods and attributes, generating code using templates, and building a domain-specific language for processing items. A key example shows how to build a rules engine that loads rules from a file and applies matching rules to items by evaluating code blocks in their context.
The document discusses heat protection products from JUTEC® including fabrics, spark protection covers, welding curtains, flame protection mats, thermal blockers, heat protection safety cases, pipe line construction mats, and welders cushions. The products provide protection from heat ranging from 600°C to 3000°C and are made from materials like glass, silicate, and ceramic fibers that produce no toxic fumes when heated. Custom sizes and options are available for many items.
Bill Elrick's presentation from the GNA/ACT Expo webinar on February 19, 2014. Bill gives an overview of hydrogen stations in California, commonly used equipment, and codes and standards information.
With web users often leaving a site if it doesn't load in less than three seconds, having a slow blog not only harms your traffic, but it can have a detrimental effect on your business too.
This presentation shows you three simple steps to optimize your blog's load time, to ensure you not only keep new visitors happy, but ensure they join your existing community and keep coming back.
The Earth is our planet, with 75% covered in water and 25% in land. The atmosphere surrounds the Earth and is a mixture of gases like oxygen that is necessary for life. Water exists in different states as ice, liquid, and vapor and is found in oceans, seas, rivers, lakes, and underground. The weather on Earth depends on factors like wind, sky conditions, temperature, and rainfall and differs between seasons.
This document is a user guide for the BT-Pusher STANDALONE Bluetooth marketing device. It describes the device's functions, applications, features, package contents and provides instructions for installation, powering the device, and using a flash disk for local content management.
The document discusses volunteering land for conservation in Australia's National Estate. It provides three case studies of land acquisitions that increased the size of national parks. It also describes a habitat conservation project that tracks koalas and their tree usage, and an environmental education program called Backyard Buddies that encourages protecting wildlife in backyards.
The Golden Weeks and a White Christmas - How do Chinese & British consumers s...The Added Value Group
Understanding the Golden Weeks phenomenon is critical to success in China. The Golden Weeks are similar to the retail frenzy of the West's Christmas, but with fundamental cultural differences.
To address these differences, and the opportunities available to brands, Magdalena Wong, non-executive chairman at Added Value China, recently spoke at the WPP, UKTI seminar on January 14, 2013. Watch Mag's presenation here: http://youtu.be/zXFpauAdEAo
Voki is a free online tool that allows users to create personalized animated avatars. Users can customize their avatar's appearance, voice, and background. Once created, a voki avatar can be published and embedded in blogs, profiles, emails or other online spaces. The presentation provides instructions on how to set up a voki avatar and suggests using it to advertise or share information in an engaging audio-visual format.
Mohamed Benmimoun, ika, Functions, research-questions, hypothesis defined for...euroFOT
The document summarizes research from a FOT-Net stakeholders meeting on defining functions, research questions, and hypotheses for a field operational test. It includes an agenda and discusses work being distributed across different packages to analyze user aspects and impacts on safety, traffic efficiency, and the environment. Hypotheses are defined for different intelligent vehicle functions being tested, with over 230 initial hypotheses identified. The goal is to prioritize and potentially exclude some hypotheses to limit the number being evaluated.
This document discusses different types of representations of the Earth including globes, maps of countries, and maps of the world. It also covers cardinal directions and asks where Greenland is located. The poles of the Earth are mentioned. The document discusses labeling parts of a map, including the atmosphere, seas and oceans, and land. It also covers states of water as solid, liquid, or gas and provides examples like ice, snow, lakes, oceans, rivers, underground water, fog, vapor, and clouds.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
This document provides examples of metaprogramming in Ruby. Metaprogramming allows writing programs that manipulate other programs as data. The examples demonstrate dynamically defining methods and attributes, generating code using templates, and building a domain-specific language for processing items. A key example shows how to build a rules engine that loads rules from a file and applies matching rules to items by evaluating code blocks in their context.
The document discusses heat protection products from JUTEC® including fabrics, spark protection covers, welding curtains, flame protection mats, thermal blockers, heat protection safety cases, pipe line construction mats, and welders cushions. The products provide protection from heat ranging from 600°C to 3000°C and are made from materials like glass, silicate, and ceramic fibers that produce no toxic fumes when heated. Custom sizes and options are available for many items.
Bill Elrick's presentation from the GNA/ACT Expo webinar on February 19, 2014. Bill gives an overview of hydrogen stations in California, commonly used equipment, and codes and standards information.
With web users often leaving a site if it doesn't load in less than three seconds, having a slow blog not only harms your traffic, but it can have a detrimental effect on your business too.
This presentation shows you three simple steps to optimize your blog's load time, to ensure you not only keep new visitors happy, but ensure they join your existing community and keep coming back.
The Earth is our planet, with 75% covered in water and 25% in land. The atmosphere surrounds the Earth and is a mixture of gases like oxygen that is necessary for life. Water exists in different states as ice, liquid, and vapor and is found in oceans, seas, rivers, lakes, and underground. The weather on Earth depends on factors like wind, sky conditions, temperature, and rainfall and differs between seasons.
This document is a user guide for the BT-Pusher STANDALONE Bluetooth marketing device. It describes the device's functions, applications, features, package contents and provides instructions for installation, powering the device, and using a flash disk for local content management.
The document discusses volunteering land for conservation in Australia's National Estate. It provides three case studies of land acquisitions that increased the size of national parks. It also describes a habitat conservation project that tracks koalas and their tree usage, and an environmental education program called Backyard Buddies that encourages protecting wildlife in backyards.
The Golden Weeks and a White Christmas - How do Chinese & British consumers s...The Added Value Group
Understanding the Golden Weeks phenomenon is critical to success in China. The Golden Weeks are similar to the retail frenzy of the West's Christmas, but with fundamental cultural differences.
To address these differences, and the opportunities available to brands, Magdalena Wong, non-executive chairman at Added Value China, recently spoke at the WPP, UKTI seminar on January 14, 2013. Watch Mag's presenation here: http://youtu.be/zXFpauAdEAo
Voki is a free online tool that allows users to create personalized animated avatars. Users can customize their avatar's appearance, voice, and background. Once created, a voki avatar can be published and embedded in blogs, profiles, emails or other online spaces. The presentation provides instructions on how to set up a voki avatar and suggests using it to advertise or share information in an engaging audio-visual format.
Mohamed Benmimoun, ika, Functions, research-questions, hypothesis defined for...euroFOT
The document summarizes research from a FOT-Net stakeholders meeting on defining functions, research questions, and hypotheses for a field operational test. It includes an agenda and discusses work being distributed across different packages to analyze user aspects and impacts on safety, traffic efficiency, and the environment. Hypotheses are defined for different intelligent vehicle functions being tested, with over 230 initial hypotheses identified. The goal is to prioritize and potentially exclude some hypotheses to limit the number being evaluated.
This document discusses different types of representations of the Earth including globes, maps of countries, and maps of the world. It also covers cardinal directions and asks where Greenland is located. The poles of the Earth are mentioned. The document discusses labeling parts of a map, including the atmosphere, seas and oceans, and land. It also covers states of water as solid, liquid, or gas and provides examples like ice, snow, lakes, oceans, rivers, underground water, fog, vapor, and clouds.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Essentials of Automations: Exploring Attributes & Automation ParametersSafe Software
Building automations in FME Flow can save time, money, and help businesses scale by eliminating data silos and providing data to stakeholders in real-time. One essential component to orchestrating complex automations is the use of attributes & automation parameters (both formerly known as “keys”). In fact, it’s unlikely you’ll ever build an Automation without using these components, but what exactly are they?
Attributes & automation parameters enable the automation author to pass data values from one automation component to the next. During this webinar, our FME Flow Specialists will cover leveraging the three types of these output attributes & parameters in FME Flow: Event, Custom, and Automation. As a bonus, they’ll also be making use of the Split-Merge Block functionality.
You’ll leave this webinar with a better understanding of how to maximize the potential of automations by making use of attributes & automation parameters, with the ultimate goal of setting your enterprise integration workflows up on autopilot.
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Approximation Algorithms for Traffic Grooming in WDM Rings
1. Problem Statement Theoretical Results Experimental Results
Approximation Algorithms for Traffic Grooming
in WDM Rings
K. Corcoran1 S. Flaxman2 M. Neyer3 C. Weidert4
P. Scherpelz5 R. Libeskind-Hadas6
1
University of Oregon, USA
2
Ecole Polytechnique F´d´rale de Lausanne, Switzerland
e e
3
University of North Carolina, USA
4
Simon Fraser University, Canada
5
University of Chicago, USA, Supported by the Hertz Foundation
6
Harvey Mudd College, USA. This work was supported by the National Science Foundation under grant
0451293 to Harvey Mudd College
2. Problem Statement Theoretical Results Experimental Results
Single-Source WDM Rings
3. Problem Statement Theoretical Results Experimental Results
Single-Source WDM Rings
ˆ WDM ring with given set of
wavelengths, each with fixed
capacity C
4. Problem Statement Theoretical Results Experimental Results
Single-Source WDM Rings
ˆ WDM ring with given set of
wavelengths, each with fixed
capacity C
ˆ Single source/hub from which all
other destination nodes receive
data
5. Problem Statement Theoretical Results Experimental Results
Single-Source WDM Rings
ˆ WDM ring with given set of
wavelengths, each with fixed
capacity C
ˆ Single source/hub from which all
other destination nodes receive
data
ˆ Source node can transmit on all
wavelengths
6. Problem Statement Theoretical Results Experimental Results
Single-Source WDM Rings
ˆ WDM ring with given set of
wavelengths, each with fixed
capacity C
ˆ Single source/hub from which all
other destination nodes receive
data
ˆ Source node can transmit on all
wavelengths
ˆ Each destination node has some
number of tunable ADMs
7. Problem Statement Theoretical Results Experimental Results
Single-Source WDM Rings
ˆ WDM ring with given set of
wavelengths, each with fixed
capacity C
ˆ Single source/hub from which all
other destination nodes receive
data
ˆ Source node can transmit on all
wavelengths
ˆ Each destination node has some
number of tunable ADMs
ˆ A path from the source to a
destination has a pre-determined
route (e.g. all clockwise)
8. Problem Statement Theoretical Results Experimental Results
The Tunable Ring Grooming Problem
ˆ Each node may make a request r for
personalized data to be sent from the
source
9. Problem Statement Theoretical Results Experimental Results
The Tunable Ring Grooming Problem
ˆ Each node may make a request r for
personalized data to be sent from the
source
ˆ request r consists of:
ˆ integer size: demand(r )
ˆ value: profit(r )
10. Problem Statement Theoretical Results Experimental Results
The Tunable Ring Grooming Problem
ˆ Each node may make a request r for
personalized data to be sent from the
source
ˆ request r consists of:
ˆ integer size: demand(r )
ˆ value: profit(r )
ˆ A request may be partitioned onto
multiple wavelengths in integral parts
11. Problem Statement Theoretical Results Experimental Results
The Tunable Ring Grooming Problem
ˆ Each node may make a request r for
personalized data to be sent from the
source
ˆ request r consists of:
ˆ integer size: demand(r )
ˆ value: profit(r )
ˆ A request may be partitioned onto
multiple wavelengths in integral parts
ˆ Multiple requests (or parts of requests)
can be “groomed” onto the same
wavelength
12. Problem Statement Theoretical Results Experimental Results
The Tunable Ring Grooming Problem
ˆ Each node may make a request r for
personalized data to be sent from the
source
ˆ request r consists of:
ˆ integer size: demand(r )
ˆ value: profit(r )
ˆ A request may be partitioned onto
multiple wavelengths in integral parts
ˆ Multiple requests (or parts of requests)
can be “groomed” onto the same
wavelength
ˆ Objective: Tune ADMs and groom
requests onto wavelengths to maximize
total profit of all satisfied requests
13. Problem Statement Theoretical Results Experimental Results
Sample Instance of the Tunable Ring Grooming Problem
Figure: Capacity C = 4 for each wavelength. Objective: Tune ADMs
and groom requests onto wavelengths to maximize total profit of all
satisfied requests.
14. Problem Statement Theoretical Results Experimental Results
Sample Instance of the Tunable Ring Grooming Problem
Figure: A solution. Profit = 650. Is it optimal?
15. Problem Statement Theoretical Results Experimental Results
Sample Instance of the Tunable Ring Grooming Problem
Figure: Profit = 650 Figure: Profit = 950
16. Problem Statement Theoretical Results Experimental Results
Overview of Results
ˆ The Tunable Ring Grooming Problem is NP-complete in the
strong sense
17. Problem Statement Theoretical Results Experimental Results
Overview of Results
ˆ The Tunable Ring Grooming Problem is NP-complete in the
strong sense
ˆ Problem remains NP-complete even for special cases
ˆ Only one wavelength, only one ADM per node, at least two
ADMs per node
18. Problem Statement Theoretical Results Experimental Results
Overview of Results
ˆ The Tunable Ring Grooming Problem is NP-complete in the
strong sense
ˆ Problem remains NP-complete even for special cases
ˆ Only one wavelength, only one ADM per node, at least two
ADMs per node
ˆ Polynomial time approximation schemes for these special
cases
19. Problem Statement Theoretical Results Experimental Results
Overview of Results
ˆ The Tunable Ring Grooming Problem is NP-complete in the
strong sense
ˆ Problem remains NP-complete even for special cases
ˆ Only one wavelength, only one ADM per node, at least two
ADMs per node
ˆ Polynomial time approximation schemes for these special
cases
ˆ The “general case” that the number of ADMs is one or more
appears to be the most challenging
20. Problem Statement Theoretical Results Experimental Results
Overview of Results
ˆ The Tunable Ring Grooming Problem is NP-complete in the
strong sense
ˆ Problem remains NP-complete even for special cases
ˆ Only one wavelength, only one ADM per node, at least two
ADMs per node
ˆ Polynomial time approximation schemes for these special
cases
ˆ The “general case” that the number of ADMs is one or more
appears to be the most challenging
ˆ New approximation algorithm for the general case
21. Problem Statement Theoretical Results Experimental Results
The General Case
ˆ Let C denote the capacity of a wavelength and let q be an
C
integer such that every request has demand at most q, i.e.
22. Problem Statement Theoretical Results Experimental Results
The General Case
ˆ Let C denote the capacity of a wavelength and let q be an
C
integer such that every request has demand at most q, i.e.
ˆ If a request can demand as much as capacity C , then q = 1
23. Problem Statement Theoretical Results Experimental Results
The General Case
ˆ Let C denote the capacity of a wavelength and let q be an
C
integer such that every request has demand at most q, i.e.
ˆ If a request can demand as much as capacity C , then q = 1
ˆ If every request demands at most 1 of C , then q = 2
2
24. Problem Statement Theoretical Results Experimental Results
The General Case
ˆ Let C denote the capacity of a wavelength and let q be an
C
integer such that every request has demand at most q, i.e.
ˆ If a request can demand as much as capacity C , then q = 1
ˆ If every request demands at most 1 of C , then q = 2
2
ˆ Main Result: A polynomial time approximation algorithm
q
that guarantees solutions within q+1 of optimal, i.e.
25. Problem Statement Theoretical Results Experimental Results
The General Case
ˆ Let C denote the capacity of a wavelength and let q be an
C
integer such that every request has demand at most q, i.e.
ˆ If a request can demand as much as capacity C , then q = 1
ˆ If every request demands at most 1 of C , then q = 2
2
ˆ Main Result: A polynomial time approximation algorithm
q
that guarantees solutions within q+1 of optimal, i.e.
ˆ If q = 1, profit is guaranteed to be within 1/2 of optimal
ˆ If q = 2, profit is guaranteed to be within 2/3 of optimal
ˆ If q = 10, profit is guaranteed to be within 10/11 of optimal
26. Problem Statement Theoretical Results Experimental Results
The General Case: The Algorithm
27. Problem Statement Theoretical Results Experimental Results
The General Case: The Algorithm
1 Sort requests by non-increasing density into a list S
28. Problem Statement Theoretical Results Experimental Results
The General Case: The Algorithm
1 Sort requests by non-increasing density into a list S
q
2 Let A = S if total demand ≤ CW q+1 , otherwise let A be the
q
minimal prefix of S with total demand > CW q+1
29. Problem Statement Theoretical Results Experimental Results
The General Case: The Algorithm
1 Sort requests by non-increasing density into a list S
q
2 Let A = S if total demand ≤ CW q+1 , otherwise let A be the
q
minimal prefix of S with total demand > CW q+1
3 Pack A onto wavelengths with First Fit Decreasing (FFD)
30. Problem Statement Theoretical Results Experimental Results
The General Case: The Algorithm
1 Sort requests by non-increasing density into a list S
q
2 Let A = S if total demand ≤ CW q+1 , otherwise let A be the
q
minimal prefix of S with total demand > CW q+1
3 Pack A onto wavelengths with First Fit Decreasing (FFD)
4 if some request in A was not packed then
5 Let r denote first request not packed by FFD
6 Let B be the set containing r and all requests which were
packed with demand ≥ demand(r )
7 Discard the request with the least profit from B
8 if r was not discarded then
9 Pack r in place of the discarded request
31. Problem Statement Theoretical Results Experimental Results
The General Case: Analysis
ˆ The approximation algorithm is proved correct and analyzed in
the paper
32. Problem Statement Theoretical Results Experimental Results
The General Case: Analysis
ˆ The approximation algorithm is proved correct and analyzed in
the paper
ˆ The running time is O(R log R + RW ) where R is the number
of requests and W is the number of wavelengths
33. Problem Statement Theoretical Results Experimental Results
Heuristics and Experiments
ˆ Heuristic “on top” of approximation algorithm
ˆ Performs q/(q + 1)-approximation algorithm for general case
ˆ Attempts to improve solution using heuristic rules, including
splitting
34. Problem Statement Theoretical Results Experimental Results
Heuristics and Experiments
ˆ Heuristic “on top” of approximation algorithm
ˆ Performs q/(q + 1)-approximation algorithm for general case
ˆ Attempts to improve solution using heuristic rules, including
splitting
ˆ Experiments using heuristic
ˆ Heuristic profit divided by optimal profit
ˆ Optimal found with linear programming
35. Problem Statement Theoretical Results Experimental Results
Experimental Results: Parameters
Parameter Possible values
Wavelength capacity C 4, 8, 16
Number of wavelengths 5
Number of requests 16, 32
Probability α that a request has α = 0, 4 , 1 , 4 , 1
1
2
3
two ADMs (one ADM other-
wise)
Demand limited to fraction 1/q q = 1, 2
of capacity
Density of request Constant or variable
(∈ U[1/2, 2))
Table: Parameters used in generating random instances
36. Problem Statement Theoretical Results Experimental Results
Sample Results
ˆ When q = 1, approximation algorithm guarantees ratio of 1
2
Tunable Results: Worst Case
0.6
0.5
0.4
Fraction of instances
0.3
0.2
0.1
0
<= .87 .88-.89 .90-.91 .92-.93 .94-.95 .96-.97 .99-1.00
Approximation ratio
Figure: Worst ratios found in experiments. Parameters: 5 wavelengths,
wavelength capacity C = 16, q = 1, 1 of nodes have 1 ADM and
2
remaining have 2 ADMs
37. Problem Statement Theoretical Results Experimental Results
Future Work
ˆ Generalizing to allow requests to demand more than a
wavelength’s capacity
ˆ Tighter approximation bounds
ˆ What if the direction of travel for a request is not
pre-determined? Can we still find good approximation
algorithms?
ˆ Using splitting in algorithm, not just heuristic