• Title/Summary/Keyword: Tree Information

Search Result 4,185, Processing Time 0.028 seconds

The improvement of Tree-First algorithm on End Host Multicast (End Host Multicast : Tree-First 방식의 트리구성 알고리즘 개선 제안)

  • Pom, Choung-Ung;Kang, Mi-Young;Nam, Ji-Seung
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.751-752
    • /
    • 2006
  • In this paper, we propose a improved tree construction algorithm on End Host Multicast. By using concurrent connection information of nodes at RP, we could diminish the RDP and the amount of control messages used for tree construction at the same time.

  • PDF

ORB : R-tree Packing for better query performance (ORB : 효율적인 질의 성능을 위한 R-tree 대량로딩 기법)

  • 이태원;이석호
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.743-745
    • /
    • 2003
  • R-tree는 공간 데이터나 다차원 데이터의 효율적인 질의 처리를 위한 인덱스 구조이다. 다량의 데이터로부터 빠르게 인덱스를 생성하기 위해서 많은 다량로딩 기법들이 제안되었으나 이들은 공간이용률을 극대화하는 데에 초점을 맞춰 R-tree의 목적인 효율적인 질의 처리를 위한 개선의 여지가 남아 있다. 본 논문에서는 다량로딩 과정에서 인접한 노드들간의 겹치는 영역을 감소시켜 전체적으로 질의 처리 성능을 향상시킬 수 있는 기법을 제안한다. 실험 결과에서 보이듯이 지금까지 가장 효율적이라고 알려져 있는 STR 기법보다 질의 성능이 좋게 나오는 것을 확인할 수 있다.

  • PDF

Multicast Copy Network with Internet Buffered B-Tree(IBBT) Network (내부버퍼 B-Tree 네트워크를 사용한 멀티캐스트 복사망)

  • 신재구;손유익
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.490-492
    • /
    • 2001
  • 본 논문은 ATM 멀티캐스트 스위치를 위한 새로운 복사망을 제안하였다. Lee의 복사망과 그 이후 제안된 복사망에서 문제가 된 오버플로우와 충돌 문제를 해결하기 위해 다중경로와 다중출력을 갖는 B-tree 네트워크를 사용하였다. 또한 높은 부하에도 충돌을 줄이고 복사망의 성능을 높이기 위해 B-Tree 네트워크의 각 SE에 출력 및 공유 버퍼 성격을 지닌 크로스포인트 버퍼를 추가한 IBBT 네트워크를 제안하였다. 제안된 복사망은 Lee의 복사망의 특성을 유지하며, 이 IBBT 네트워크를 복사망의 BBN에 적용하고, 셀 분할 알고리즘을 사용하여 복사망의 성능을 향상 시켰다.

Key Management for Multicast Encryption using Unbalanced Tree (비대칭 트리 구조를 이용한 멀티캐스트 암호화 키 관리)

  • 박희안;공은배
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.835-837
    • /
    • 2001
  • 본 논문에서는 안전한 멀티캐스트를 위해 사용되는 암호화 키를 비대칭 Tree를 이용하여 관리하는 방법을 제안하였다. 기존의 대칭 Tree를 이용한 방법은 모든 사용자들을 같은 레벨에 위치시킴으로써 각 사용자들에 따라 다를 수 있는 Join/Remove 빈도수를 고려하지 않고 모두 똑 같은 확률을 가진 것으로 간주하여 그에 따른 불필요한 메시지 전송이 많았다. 그러나 본 논문에서 제안한 방법은 각 사용자의 빈도수를 고려하여 Tree를 비대칭으로 구성함으로써 키 관리를 위해 전송하는 메시지의 양을 효율적으로 줄일 수 있고 경우에 따라서는 Center와 사용자가 가진 키의 양도 기존 방법보다 상당히 작아질 수 있다.

  • PDF

Group Key Management using (2,4)-Tree ((2,4)-트리를 이용한 그룹키 관리)

  • 조태남;이상호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.4
    • /
    • pp.77-89
    • /
    • 2001
  • Recently, with the explosive growth of communication technologies, group oriented services such as teleconference and multi-player game are increasing. Access control to information is handled by secret communications with group keys shared among members, and efficient updating of group keys is vital to such secret communications of large and dynamic groups. In this paper, we employ (2,4)-tree as a key tree, which is one of height balanced trees, to reduce the number of key updates caused by join or leave of members. Especially, we use CBT(Core Based Tree) to gather network configurations of group members and reflect this information to key tree structure to update group keys efficiently when splitting or merging of subgroups occurs by network failure or recovery.

Implementation of Effective Dominator Trees Using Eager Reduction Algorithm and Delay Reduction Algorithm (순차감축 알고리즘과 지연감축 알고리즘을 이용한 효과적인 지배자 트리의 구현)

  • Lee, Dae-Sik
    • Journal of Internet Computing and Services
    • /
    • v.6 no.6
    • /
    • pp.117-125
    • /
    • 2005
  • The dominator tree presents the dominance frontier from directed graph to the tree. we present the effective algorithm for constructing the dominator tree from arbitrary directed graph. The reducible flow graph was reduced to dominator tree after dominator calculation. And the irreducible flow graph was constructed to dominator-join graph using join-edge information of information table. For reducing the dominator tree from dominator-join graph, we implement the effective sequency reducible algorithm and delay reducible algorithm. As a result of implementation, we can see that the delay reducible algorithm takes less execution time than the sequency reducible algorithm. Therefore, we can reduce the flow graph to dominator tree effectively.

  • PDF

Simplified Predicate Locking Scheme for Concurrency Control on R-tree

  • Ying Xia;Rim, Kee-Wook;Lee, Jae-Dong;Bae, Hae-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04b
    • /
    • pp.16-18
    • /
    • 2001
  • Despite extensive research on R-trees, most of the proposed schemes have not been integrated into existing DBMS due to the lack of protocol to provide consistency in concurrent environment. R-link tree is an acceptable data structure to deal with this issue., but still not enough. In this paper, we focus on a simplified predicate locking mechanism based on R-link tree for concurrency control and phantom protection. An in-memory operation control list (OCList) used to suspend some conflicting operations is designed here. The main features of this approach are (1) it can be implemented easily and do not need any extra information. (2) Only-one-lock is held when descending R-tree even when node split happens, while lock-coupling scheme is performed when ascending. No deadlocks are possible. (3) Searches and insertions are not unnecessarily restricted. (4) Insert and Delete phantom in R-link tree are avoid through beforehand predication.

  • PDF

Efficient Implementations of a Delay-Constrained Least-Cost Multicast Algorithm

  • Feng, Gang;Makki, Kia;Pissinou, Niki
    • Journal of Communications and Networks
    • /
    • v.4 no.3
    • /
    • pp.246-255
    • /
    • 2002
  • Constrained minimum Steiner tree (CMST) problem is a key issue in multicast routing with quality of service (QoS) support. Bounded shortest path algorithm (BSMA) has been recognized as one of the best algorithms for the CMST problem due to its excellent cost performance. This algorithm starts with a minimumdelay tree, and then iteratively uses a -shortest-path (KSP) algorithm to search for a better path to replace a “superedge” in the existing tree, and consequently reduces the cost of the tree. The major drawback of BSMA is its high time complexity because of the use of the KSP algorithm. For this reason, we investigate in this paper the possibility of more efficient implementations of BSMA by using different methods to locate the target path for replacing a superedge. Our experimental results indicate that our methods can significantly reduce the time complexity of BSMA without deteriorating the cost performance.

Performance and Convergence Analysis of Tree-LDPC codes on the Min-Sum Iterative Decoding Algorithm (Min-Sum 반복 복호 알고리즘을 사용한 Tree-LDPC의 성능과 수렴 분석)

  • Noh Kwang-seok;Heo Jun;Chung Kyuhyuk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.1C
    • /
    • pp.20-25
    • /
    • 2006
  • In this paper, the performance of Tree-LDPC code is presented based on the min-sum algorithm with scaling and the asymptotic performance in the water fall region is shown by density evolution. We presents that the Tree-LDPC code show a significant performance gain by scaling with the optimal scaling factor which is obtained by density evolution methods. We also show that the performance of min-sum with scaling is as good as the performance of sum-product while the decoding complexity of min-sum algorithm is much lower than that of sum-product algorithm. The Tree-LDPC decoder is implemented on a FPGA chip with a small interleaver size.

A Study on Bottom-Up Update of TPR-Tree for Target Indexing in Naval Combat Systems (함정전투체계 표적 색인을 위한 TPR-Tree 상향식 갱신 기법)

  • Go, Youngkeun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.2
    • /
    • pp.266-277
    • /
    • 2019
  • In modern warfare, securing time for preemptive response is recognized as an important factor of victory. The naval combat system, the core of naval forces, also strives to increase the effectiveness of engagement by improving its real-time information processing capabilities. As part of that, it is considered to use the TPR-tree in the naval combat system's target indexing because spatio-temporal searches can be performed quickly even as the number of target information increases. However, because the TPR-tree is slow to process updates, there is a limitation to handling frequent updates. In this paper, we present a method for improving the update performance of TPR-tree by applying the bottom-up update scheme, previously proposed for R-tree, to the TPR-tree. In particular, we analyze the causes of overlaps occurring when applying the bottom-up updates and propose ways to limit the MBR expansion to solve it. Our experimental results show that the proposed technique improves the update performance of TPR-tree from 3.5 times to 12 times while maintaining search performance.