TWO TECHNIQUES FOR FAST COMPUTATION OF CONSTRAINED SHORTEST PATH
#1

TWO TECHNIQUES FOR FAST COMPUTATION OF CONSTRAINED SHORTEST PATH

Abstract: Computing constrained shortest paths is fundamental to some important network functions such as QoS routing, MPLS path selection, ATM circuit routing, and traffic engineering. The problem is to find the cheapest path that satisfies certain constraints. In particular, finding the cheapest delay-constrained path is critical for real-time data flows such as voice/video calls. Because it is NP-complete, much research has been designing heuristic algorithms that solve the -approximation of the problem with an adjustable accuracy. A common approach is to discretize (i.e., scale and round) the page link delay or page link cost, which transforms the original problem to a simpler one solvable in polynomial time. The efficiency of the algorithms directly relates to the magnitude of the errors introduced during discrimination. In this paper, we propose two techniques that reduce the discrimination errors, which allow faster algorithms to be designed. Reducing the overhead of computing constrained shortest paths is practically important for the successful design of a high-throughput QoS router, which is limited at both processing power and memory space. Our simulations show that the new algorithms reduce the execution time by an order of magnitude on power-law topologies with 1000 nodes.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: shortest path dijkstra, constrained shortest paths, two conferences nfl, shortest path using genetic algorithm source code java, open shortest path first, acyclic distributed path computation, shortest path algorithm,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  DESIGN AND CONSTRUCTION OF A TWO – WAY WIRED INTERCOM seminar class 8 19,246 08-07-2018, 06:37 PM
Last Post: Guest
  ULTRASONIC TECHNIQUES FOR HIDDEN CORROSION DETECTION IN AIRCRAFT WING SKIN smart paper boy 2 3,071 13-04-2017, 03:53 PM
Last Post: jaseela123d
  Brain Tumour Detection Using Water shedding and basic Image Processing Techniques smart paper boy 2 3,052 01-08-2015, 02:53 PM
Last Post: seminar report asees
  ANTI-THEFT ALERTING SYSTEM FOR VEHICLES (TWO WHEELER) seminar surveyer 3 5,280 27-02-2015, 12:11 AM
Last Post: [email protected]
  AUTO PATH FINDER ROBOT computer science technology 3 4,771 23-04-2014, 09:36 PM
Last Post: [email protected]
  IMAGE ENHANCEMENT TECHNIQUES USING FREQUENCY DOMAIN FILTERING project report tiger 1 6,267 18-01-2013, 04:45 PM
Last Post: Guest
  FAST HADAMARD TRANSFORMS computer science crazy 1 1,651 08-01-2013, 04:16 PM
Last Post: Guest
  ADAPTIVE TECHNIQUES BASED HIGH IMPULSIVE NOISE DETECTION AND REDUCTION OF A DIGITAL smart paper boy 1 1,927 05-12-2012, 03:58 PM
Last Post: seminar details
  INTRUSION DETECTION TECHNIQUES IN MOBILE AD HOC AND WIRELESS SENSOR NETWORKS seminar class 1 1,750 14-03-2012, 01:06 PM
Last Post: seminar paper
  AC MOTOR SPEED CONTROLLING SYSTEM USING PWM TECHNIQUES smart paper boy 1 2,257 20-02-2012, 04:37 PM
Last Post: seminar paper

Forum Jump: