• 沒有找到結果。

Analyze the Performance of the Cyclic Indexing Schemes for the Wireless Data Broadcast

N/A
N/A
Protected

Academic year: 2021

Share "Analyze the Performance of the Cyclic Indexing Schemes for the Wireless Data Broadcast"

Copied!
8
0
0

加載中.... (立即查看全文)

全文

(1)

Analyze the Performance of the Cyclic Indexing Schemes

for the Wireless Data Broadcast

Long-Sheng Li&Ming-Feng Chang&Gwo-Chuan Lee

Received: 30 April 2008 / Accepted: 2 September 2008 / Published online: 24 September 2008 # 2008 Springer Science + Business Media, LLC. Manufactured in The United States Abstract Wireless data broadcast is an effective approach

to disseminate information to a massive number of users. Indexing techniques for broadcasting data can reduce the battery power consumptions of mobile terminals by decreasing the tuning time. The organization of the indexes affects the efficiency of data searching. We investigate how the degree of the index node affects the tuning time, and thus minimize the power consumption of user’s terminals. We proposed a performance measurement for the tuning time and a cyclic indexing algorithm. The numerical results suggest the degree of an index node be 3 when the access probabilities of the data tend to be uniformly distributed so that the expected tuning time is minimal. When the access distribution of the data nodes is skewer, the tuning time can be minimized by setting the degree in the index node 2. Keywords Broadcast . Wireless . Tuning time . Tuning cost . Access time . The Hu–Tucker algorithm

1 Introduction

Wireless data broadcast is an efficient technology to overcome the limited bandwidth in the ubiquitous comput-ing. Wireless data broadcast over radio channels allows users to access data simultaneously at a cost independent of the number of users. It is a powerful way to disseminate data to a massive number of users in the ubiquitous computing. A centralized server periodically broadcasts the data to a large number of mobile terminals through a wireless medium. The mobile terminals receive the broad-casts and filter out the data that is not desired [2]. This service is especially useful for disseminating data that are commonly accessed, such as traffic information for navigation system and real-time stock information. The location-dependent web service can also utilize wireless data broad-cast. One disadvantage of the wireless data broadcast is that the mobile terminals can only wait for the requested data.

Power-efficient wireless communication is another impor-tant issue for the wireless data broadcast. A simple way to reduce the power consumption is to add auxiliary information to enable the mobile terminals to receive only the data the user needs. A mobile terminal can be three power modes: transmission mode, receiving mode, and doze mode.

There are two basic approaches for users to access data through radio channels [8]. One is push-based scheme, where the clients retrieve data by only listening to a certain channel in the receiving mode. The clients cannot inform the broadcast server about what they need due to the lack of uplink communication channels from the users to the server. The other approach is pull-based scheme where the clients send requests to retrieve data. There is an uplink channel through which a client can send requests for specific data items to the broadcast server. The broadcast server may arrange the broadcast sequence according to the DOI 10.1007/s11265-008-0269-4

L.-S. Li (*)

Department of Computer Science and Information Engineering, National Chiayi University,

No.300 Syuefu Rd.,

Chiayi 60004 Taiwan, Republic of China e-mail: sheng@mail.ncyu.edu.tw M.-F. Chang

Department of Computer Science and Information Engineering, National Chiao-Tung University,

No.1001 University Rd.,

Hsinchu 300 Taiwan, Republic of China e-mail: mfchang@csie.nctu.edu.tw G.-C. Lee

Department of Computer Science and Information Engineering, National United University,

1 Lienda,

Miaoli 36003 Taiwan, Republic of China e-mail: gclee@nuu.edu.tw

(2)

request received. In the power management view, the client saves power by avoiding transmissions and waking up from the doze mode only when necessary. The push-based scheme is a better strategy to overcome the limited battery power.

To evaluate the efficiency of the wireless broadcasting, two criteria are often used: access time and tuning time [1]. The access time is the average time from the moment a client requests data identified by a primary key to the point when the requested data are received by the client. The access time determines the response time of data access. The tuning time is the time spent by a client listening to the channel. The tuning time determines the power consumed by the client to retrieve the requested data. Indexing techniques insert auxiliary information indicating when each data item will be broadcasted to reduce the tuning time [1,2, 4, 5, 16]. After receiving the index, a client waits for the requested data most of time in the doze mode in which low power is consumed and only wakes up to receive data when the requested data is coming. Therefore, the tuning time can be reduced and the battery power is conserved.

2 The Relative Works

A broadcast server broadcasts the data to the clients by radio channels. The clients receive the broadcast data and the requested data are filtered. To consume less power of the clients, the broadcast server inserts indexes before the broadcast data to indicate the offsets to the requested data. The clients receive the indexes and go to doze mode. When the requested data are broadcasted, the client wakes up to the receiving mode and receives the requested data. Moreover, to provide efficient search of the indexes, an alphabetic Huffman tree is used for the indexing tree. The clients using this scheme should tune to the beginning of the indexes to get the offset to the requested data. The waiting time between the start of tuning and the beginning of the indexes is half of a broadcast cycle in average. This is referred to the distributed indexing scheme [1].

To reduce the access time of the distributed indexing scheme, the broadcast bandwidth is spilt into several physical channels or logical channels [9]. The use of multi-channeling and indexing scheme provides a way to retrieve efficient data [14,15]. All data are assigned into a data channel. The indexes of the same level are proposed to occupy on the same channel. Figure1 shows the indexing tree and the channel assignment of the broadcast data. For example, to retrieve data D4in data channel C4, one should

receive index I in channel C1, I2 in channel C2, and I3in

channel C3to obtain the time offset to D4.

The distributed indexing scheme assumed the access probabilities of the data items are the same. Shivakumar and Venkatasubramanian released the assumption [9]. Let n

be the number of data items. Every data item has the popularity probability to indicate the expected number of access to the data items. We assume the popularity probabilities of the data items be f1, f2,…, fn. If the tuning

time for the data item i is Ti, the average tuning time is

Xn

i¼1fi Ti

 . Xn

i¼1fi

 

The tuning time Ti is dependent on the depth of the

data item in the indexing tree. The problem to construct an indexing tree to minimize the average tuning time is similar to the Huffman coding, but the alphabetic ordering of the data items is preserved. Hu and Tucker proposed an algorithm to optimize the alphabetic-ordered Huffman code [11, 12]. Shivakumar and Venkatasubramanian suggested a k-ary Hu–Tucker algorithm to minimize the average tuning time, but didn’t describe the algorithm clearly [9].

An open problem is remained unsolved in the k-ary Hu– Tucker algorithm. For some n, it is impossible to construct a tree that the branches of all internal nodes are filled with k nodes. The k-ary Hu–Tucker algorithm constructs the internal nodes with 2 to k branches, but doesn’t specify exact rules to construct the internal nodes. A strategy to determine the branches of the internal nodes of an indexing tree to obtain the minimal average tuning time is needed for the k-ary Hu–Tucker algorithm.

The tuning time is determined only by the depth of the indexing tree. If we increase the branches of the index, the tuning time is reduced. However, increasing the branches should increase the capacity of the index. For the wireless broadcasting, the indexes can be broadcasted on the index channels. The size of the index represents the bandwidth requirement of the radio channel. In wireless communica-tions, a radio channel is partitioned into slots of constant size. The 3rd generation personal communication service provides the function to assign the fixed bandwidth of the channel to a dedicated service [8]. Therefore, the size of the indexes should be the same to fit in a time slot. The tuning time should count the number of indexes received and the size of the index. Assume the depth of the data node i is di,

and the degree of the index is k.β represents the length of

I I1 I2 I3 D1 D2 D3 D4 D5 I I I I I I I I I I2 I1 I2 I1 I2 I1 I1 I2 I1 I3 I3 I3 I3 I3 I3 I3 I3 I3 D4 D5 D1 D2 D3D4 D1 D2D3 C1 C2 C3 C4

Figure 1 The indexing tree and the channel assignment of the broadcast data.

(3)

the key and the offset. The average tuning time can be expressed as: T ¼kb Pn i¼1ðdi 1Þfi Pn i¼1fi ¼ kb Xn i¼1ðdi 1Þfi ð1Þ

3 The Cyclic Incomplete-Index First Alphabetic Huffman Algorithms

To minimize the average tuning time, an algorithm is proposed to construct the k-ary alphabetic Huffman tree. For n data nodes, it may not be possible to construct an index tree where all indexes have exact k downward branches. That is, empty branches are remained in some indexes. We call this category of indexes as the incomplete indexes. In our proposed algorithm, we gather those empty links in one index of the index tree, i.e., there is only an incomplete index in the tree. Under this assumption, the number of the non-empty links of the incomplete index can be determined from the number of data nodes, n, and the degree, k. Let a % b represent the remainder of a/b, and k1 be the number of the non-empty

links of the incomplete index. k1can be expressed as

k1¼

bþ k  1ð Þ; for n% kð  1Þ ¼ b and b ¼ 0or 1 b; for n% kð  1Þ ¼ b and b 6¼ 0; 1: (

ð2Þ Using the techniques of the binary Hu–Tucker tree, we construct the k-ary index tree by merging k nodes with the least access probability into an index node of the index tree. The access probability of the index is the sum of the access probabilities of its k children. The number of the non-empty links of the incomplete index is calculated first. It is due to that we reduce the average tuning time by merging nodes with less access probability into an index in the lower level of the tree. This algorithm will be referred to as the k-ary Incomplete-index First Alphabetic Huffman Algorithm (IFAH). The algorithm is shown in the following.

Step 1. Let S=(N1, N2,…, Nn), the ordered list consists of

all data nodes sorted by the search key in the increasing order. Ni=Di.

Step 2. Calculate the number of the non-empty links k1of

the incomplete index using Eq.2. Step 3. Construct the incomplete index node.

& Find k1 consecutive nodes in S whose sum of

access probabilities is minimum.

& Replace the k1 consecutive nodes with an index

node in S. The access probability of the index node equals to the sum of the access probabilities of the replaced nodes.

Step 4. If |S|=1, then go to Step 7.

Step 5. Construct the k-degree index nodes.

& Find the k “consecutive” nodes, but index nodes can be bypassed, in S that have the minimum sum of access probabilities.

& Replace the k “consecutive” nodes with a new index node in S.

Step 6. If |S|=1, then go to Step 7. Else go to Step 5.

Step 7. Determine the level of each data node in the index tree.

Step 8. Reconstruct the index tree according to the levels of the data nodes.

& Initialize the ordered list S as in Step 1.

& Find k1consecutive data nodes whose levels are the

same. The levels of k1consecutive data nodes must

be the maximum among the remaining nodes. & Combine the k1 consecutive nodes to an index

node. Replace the k1 consecutive nodes with the

index node in S.

& Find k consecutive nodes whose levels are the same and the maximum among the remaining nodes, and combine the k consecutive nodes at the highest level first. Then, the nodes on the next-to-highest level are combined.

& The process continues until there is only one node left and its level must be 0.

Figure 2 shows an example index tree obtained by the IFAH. The boxes represent the data nodes and the numbers in the boxes represent the access probabilities of the data nodes. The circles represent the index nodes and the numbers in the circles represent the combined access probabilities of the linked nodes. i is the key for the data node Di. The

degree k of the example in Fig. 2 is 3. The number of the data nodes is 8. Therefore, the number of the non-empty links k1is 2. We do Step 2 of IFAH to find two consecutive

nodes whose sum of access probabilities is minimum. Then, IFAH constructs index node I1first, because D2and D3have

the minimum sum of access probabilities. Then, go to Step 5 of IFAH. In constructing index node I2, index node I1 is

bypassed, because D1, D4, and D5 are the 3“consecutive”

nodes that have the minimum sum of access probabilities. The index nodes construction process continues until only one node is left in S. We assign level 0 to the root. According to the links of the indexes, we assign the level values to all index nodes and data nodes. Then, the index tree is reconstructed from the highest level of the data nodes.

The format of an index is as follows,

(4)

Key i is the boundary key value for searching requested data. If the key of the requested data is larger or equal to Key i and less than Key (i+1), Offset i is the offset for the index or data slot of the lower level in the index tree.

Note that the index tree in Fig. 3places D1in its

left-most leaf, i.e., the index tree starts from D1, the first data

node. However, the order of the broadcast data can be considered as the order of a cyclic link list. That is, the k-ary alphabetic tree does not necessarily start from D1; it

can starts from any data node. Figure 3 shows the index trees starting from different data nodes. The numbers on the links under the index nodes are the boundary key values of the index nodes. Figure3a is an example of k-ary alphabetic tree starting from D1. Figure 3b shows an

example of k-ary alphabetic tree starting from D2; the data

node before the D2is rotated to the end of the ordered list.

In the example of Fig. 3b, we show how to retrieve data node D1. The boundary key values of the root index are 2,

5, and 6. The key of D1is less than 2. Therefore, we chose

the offset of boundary key value 6 to obtain the index of the next level. The index of the next level shows the offset of the requested data node D1. This shows that a k-ary

alphabetic tree can start from any data nodes. That is, the alphabetic order of the data nodes in the index tree can be treated as a cycle. We use Eq. 1 to calculate the average tuning time. Consider the example of Fig. 3a, the degree of the index k is 3. The length of the key and the offsetβ is 1. Therefore, the average tuning time is:

T ¼ kbXni¼1ðdi 1Þfi¼ 3  1  1 127 2 þ 32 127 2 þ 4 127 2 þ 8 127 2 þ 64 127 2 þ 2 127 2 þ 16 127 1    5:62

Finally, we know that the average tuning times are 5.62 in Fig.3a and 4.49 in Fig. 3b, respectively. We apply the rotatability to improve the IFAH. The new algorithm will be referred to as the k-ary Cyclic Incomplete-index First

Alphabetic Huffman Algorithm (CIFAH). The CIFAH modifies Step 3 and 5 of the IFAH. In CIFAH, we treat the ordered list as a cycle and find the minimum sum of access probabilities. 1 1 4 2 2 6 127 1 127 32 127 4 127 8 127 64 127 2 127 16 (a) T=5.62 127 32 127 4 127 8 127 64 127 1 127 2 127 16 (b) T=4.49 D1 D2 D3 D4 D5 D6 D2 D3 D4 D6 D7 D1 D7 D 5 4 7 3 2 5 6 6 5 1 7 4 3 Figure 3 a, b The index trees

with different alphabetic orders.

47 5 47 3 47 4 47 6 47 1 47 7 47 8 47 13 47 5 47 3 47 4 47 6 47 1 47 7 47 8 47 13 D1 D2 D3 D4 D5 D6 D7 D8 47 7 47 12 47 22 47 47 reconstruction

a The index tree before reconstruction b The index tree after reconstruction D1 D2 D3 D4 D5 D6 D7 D8 level=2 3 3 2 2 2 2 1 level=0 level=1 level=1 level=2 I1 I2 I3 I4 Figure 2 An example of the

(5)

4 The Numerical Analysis

To simplify the analysis of the tuning cost of the proposed alphabetic Huffman algorithms, we made the following assumptions:

& There is no fault in the broadcasting or reception. & The initial probe is uniformly distributed in the

broadcast cycle.

First, consider a special case where the access probabil-ities of the data nodes are identical, and the optimal index tree is a full k-ary tree that has no incomplete index. Let k be the degree in each index, and d be the depth of the index tree. The number of data nodes is n¼ kd1. We use ln function for the both sides of the equation of the number of data nodes: lnn=(d−1)lnk. Therefore, d  1 ¼ln n

ln k . The average tuning time is T¼ k d  1ð Þ ¼ kln n

ln k ¼ k ln n

ln k . If k could be any real number, the average tuning time can be minimized whend Td k ¼ 0. dT dk ¼ d k ln n ln k   dk ¼ 0 ) k ¼ e ¼ 2:71828 . . .

Since k is a natural number, the result suggests that the average tuning time may be minimized when the degree of the index is 3.

Release the limitation of the full k-ary tree, we assume the probability distributions of all data nodes are uniformly distributed. That is, f1¼ f2¼ f3¼    ¼ fn¼ 1=n and d¼ logd kne. The index tree is a full k-ary tree when n=k

d

. For kd k þ 2  n < kd, all leaves are at the same level (level d). The average tuning time is T ¼ k d  1ð Þ. For kd 2k þ 3  n  kd k þ 1, there are one leaf at level (d−1) and (n−1) leaves at level d. The average tuning time is T ¼ k n d  1ð ð Þ  1Þ=n. For kd 3k þ 4  n  kd 2kþ 2, there are two leaves at level (d−1) and (n−2) leaves at level d. The average tuning time is T¼ k n d  1ð ð Þ  2Þ n= . F o r kd kd1kþ k d1þ 1 n  kd k d1 1

kd1 1

 

, there are k−1 leaves at level (d−1) and (n−k+1) leaves at level d. The average tuning time is

T ¼ k n d  1 ð Þ  k d1 1n. Therefore, if kd iþð 1Þk þ i þ 2ð Þ  n  kd ik þ i, we have

T ¼ k n d  1ð ð Þ  iÞ n; for i¼ 0; 1; . . . ; kd1 1: The average tuning time can be expressed as

T ¼ k n dð  1Þ  kdn k1 j k   n ; where d ¼ logd kne ð3Þ

Figure 4 shows the tuning time as functions of the number of data nodes and the degree of the index node. The access probabilities of the data nodes are all equal. The number of the data nodes varies from 2 to 1,000. The five curves, in the figure, represent the average tuning time for the cases where the degrees are 2, 3, 4, 5, and 6, respectively. The average tuning time increases as the number of data nodes increases due to the increasing height of the index tree. The tuning time increases as the degree of the index is larger than 3. Therefore, when the access probabilities are uniformly distributed, the index nodes of degree 3 tend to minimize the average tuning time.

Consider the case where the access probabilities are non-uniformly distributed. We assume the distribution of the access probabilities is Zipfian [9,13,17]. For n data nodes, the access probability of a data node Di is as

follows, fi¼

1 irPn

i¼11=ir

; where r is the rank of the distribution: Note that, the larger the rank r is, the skewer the probability distribution is. In addition, fi decreases as i

increases. In this section, we use the rank r to set the access probabilities of data nodes. Then, reorder the sequence of the data nodes using a random number generator. The number of possible sequence orders is n!. Therefore, it is impossible to evaluate all possible sequence orders for a large number of data nodes. To simplify the computation, the sequence order is randomly generated. In our

experi-0.0 5.0 10.0 15.0 20.0 25.0 0 10 0 20 0 30 0 40 0 50 0 60 0 70 0 80 0 90 0 10 00

The number of data items

The average tuning cost

branches =2 branches =3 branches =4 branches =5 branches =6

(6)

ments, we generate 10,000 random sequences for each Zipfian distribution, and then generate the index tree for each random sequence order, and calculate the average tuning time.

Figure5shows the results of the average tuning time for different ranks of Zipfian distribution. For a small rank (e. g., r=0.2) and a large number of data nodes, the minimum average tuning time can be obtained when the degree is 3.

The results are consistent with that of the uniform distribution. It is because that a smaller rank for Zipfian distribution results in the less skew probabilities distribu-tion. For a large rank (e.g., r=2) in Zipfian distribution, the minimal average tuning time is found when the degree is 2. This is because the large number of branches increases the tuning time of every data node in the index tree. Consider the index trees of a given degree. The skewer the access r=0.2 4 6 8 10 12 14 16 0 20 40 60 80 100 The number of data items

The average tuning time

2 3 4 5 r=1.0 4 6 8 10 12 14 16 0 20 40 60 80 100 The number of data items

The average tuning time

2 3 4 5 r=2.0 4 6 8 10 12 14 16 0 20 40 60 80 100 The number of data items

The average tuning time

2 3 4 5

Figure 5 The average tuning time the branches with r=0.2, 1.0, and 2.0 with the IFAH.

r=0.2 4 5 6 7 8 9 10 11 12 13 14 0 20 40 60 80 100 The number of data items

The average tuning time

IFAH,2 IFAH,3 CIFAH,2 CIFAH,3 r=1.0 4 5 6 7 8 9 10 11 12 13 14 0 20 40 60 80 100 The number of data items

The average tuning time

IFAH,2 IFAH,3 CIFAH,2 CIFAH,3 r=2.0 4 5 6 7 8 9 10 11 12 13 14 0 20 40 60 80 100 The number of data items

The average tuning time

IFAH,2 IFAH,3 CIFAH,2 CIFAH,3

(7)

probability distribution is, the less the tuning time is. This is because as the access distribution gets skewer, fewer data nodes commands more access probability. The data nodes of large access probabilities trend to be placed at the lower levels of the index tree. As a result, the tuning time decreases.

Figure 6 shows that the average tuning time of the CIFAH is less than that of the IFAH. The CIFAH is an efficient algorithm in reducing the average tuning time. It is because we can find the minimum tuning time from the selected nodes in the cycle sequence to build low cost indexes in the index tree. The improvement ratio of the CIFAH with large rank r is larger than that with small rank. This is because there are data nodes of larger access probabilities for the skewer access probabilities distribu-tions. The CIFAH has the capability to find an ordered list for the data nodes to construct an index tree that places those frequently accessed data nodes in the lower level. Therefore, the improvement ratio of the tuning time increases.

5 Conclusions

In this paper, we proposed indexing schemes to obtain minimal tuning time in the wireless broadcast system. The IFAH is an algorithm similar to the Hu–Tucker algorithm in organizing the indexes. To reduce the tuning time, the CIFAH can improve the IFAH by rotating the sequence of the data nodes.

From the experiments, we have the following results for the indexing schemes.

& If the access probabilities of the data are uniformly distributed, the tuning time is minimal when the degree of the index node is 3.

& For the data nodes whose access probabilities are Zipfian distributed, the tuning time increases as the number of the data nodes increases. It is because that the depth of the index tree increases as the number of the data nodes increases.

& The CIFAH can effectively reduce the tuning time when the access probabilities are of Zipfian distribution, since it is more likely to find consecutive nodes with less access probability to be merged into an index node in the rotatable data cycle.

& For the Zifian distribution, the improvement ratio of the CIFAH increases as rank r increases, i.e., the distribu-tion gets more distorted. It is because skewer access probabilities let the CIFAH have more chances to find k consecutive nodes of less tuning access probability in

the rotatable broadcast cycle to construct an index node in the index tree.

& The tuning time increases as the degree of the index increases, since index of large degree increases the tuning time of every data node in the index tree. We provide the cyclic indexing construction schemes to reduce the average tuning time. To reduce the tuning time, the degree of the index in the index tree is suggested to be 2 or 3. The frequencies of the broadcasted data may not be uniform in a broadcast cycle. In the future, we can schedule the broadcast sequence according the access probabilities and a new indexing scheme is required to reduce the tuning time.

References

1. Imielinski, T., Viswanathan, S., & Badrinath, B. R. (1994). Energy efficiency indexing on air. In Proceedings of the International Conference on SIGMOD (pp. 25–36).

2. Imielinski, T., Viswanathan, S., & Badrinath, B. R. (1997). Data on air: Organization and access. IEEE Transactions on Knowledge and Data Engineering, 9(3), 353–372. doi:10.1109/69.599926. 3. Su, C.-J., & Tassiulas, L. (2000). Joint broadcast scheduling and

user’s cache management for efficient information delivery. Wireless Networks, 6, 279–288. doi:10.1023/A:1019102017510. 4. Lee, W. C., & Lee, D. L. (1996). Using signature techniques for

information filtering in wireless and mobile environments. Distributed and Parallel Databases, 4(3), 205–227. doi:10.1007/ BF00140950.

5. Lee, C. K., Leong, H. V., & Si, A. (2000). A semantic broadcast scheme for a mobile environment based on dynamic chunking. 20th International Conference on Distributed Computing Systems (pp. 522–529).

6. Saran, H., Shorey, R., & Kumar, A. (2000). Policies for increasing throughput and decreasing power consumption in bluetooth MAC. 2000 IEEE International Conference on Personal Wireless Communications (pp. 90–94).

7. Lo, S.-C., & Chen, L. P. (2000). An adaptive access method for broadcast data under an error-prone mobile environment. IEEE Transactions on Knowledge and Data Engineering, 12(4), 609– 620. doi:10.1109/69.868910.

8. Hu, J.-H., Yeung, K.-L., Feng, G., & Leung, K.-F. (2000). A novel push-and-pull hybrid data broadcast scheme for wireless information networks. 2000 IEEE International Conference on Communications, 3, 1778–1782.

9. Shivakumar, N., & Venkatasubramanian, S. (1996). Energy-efficient indexing for information dissemination in wireless systems. ACM-Baltzer Journal of Mobile Networks and Nomadic Applications, 1, 433–446.

10. Peng, W.-C., & Chen, M.-S. (2000). Dynamic generation of data broadcasting programs for a broadcast disk array in a mobile computing environment. Proceedings of the ACM 9th Interna-tional Conference on Information and Knowledge Management (CIKM-00), Nov. (pp. 6–11).

11. Hu, T. C., & Tucker, A. C. (1971). Optimal computer search trees and variable-length alphabetic codes. SIAM Journal on Applied Mathematics, 21(4), 514–532. doi:10.1137/0121057.

(8)

12. Knuth, D. E. (1985). Dynamic Huffman encoding. Journal of Algorithms, 6(2), 163–180. doi:10.1016/0196-6774(85)90036-7. 13. Li, W. (1992). Random texts exhibit Zipf’s law-like word

frequency distribution. IEEE Transactions on Information Theory, 36(6), 1842–1845. doi:10.1109/18.165464.

14. Waluyo, A. B., Goh, G., Srinivasan, B., & Taniar, D. (2005). Applying multi-channelling and indexing scheme for efficient data retrieval in wireless broadcast environment, Proceedings of the 2005 International Conference on Intelligent Sensing and Information Processing, Jan. (pp. 32–37).

15. Wang, S., & Wang, H.-L. (2007). TMBT: An efficient index allocation method for multi-channel data broadcast. AINAW’07. 21st International Conference on Advanced Information Network-ing and Applications Workshops 2007, May (pp. 236–242). 16. Yao, Y., Tang, X., Lim, E.-P., & Sun, A. (2006). An

energy-efficient and access latency optimized indexing scheme for wireless data broadcast. IEEE Transactions on Knowledge and Data Engineering, 18(8), 1111–1124. Aug.

17. Zipf, G. K. (1949). Human behavior and the principle of least effort. Cambridge, Massachusetts: Addison-Wesley.

18. 3GPP TS 25.324: Radio interface for broadcast/multicast services.

Long-Sheng Li received the Ph.D. degree in the Department of Computer Science and Information Engineering, National Chiao-Tung University at Chiayi, Taiwan, ROC in 2002. He is currently an Assistant Professor in the Department of Computer Science and Information Engineering, National Chiayi University, Taiwan, Repub-lic of China. His current research interests include personal commu-nication systems and mobile computing.

Ming-Feng Chang received the Ph.D. degree in computer science from the University of Illinois at Urbana-Champaign in 1991. He is currently a Professor in the Department of Computer Science and Information Engineering, National Chiao-Tung University, Hsinchu, Taiwan, ROC. His research interests include Internet communication, mobile computing and VLSI system design.

Gwo-Chuan Lee is currently an associate professor in the Department of Computer Science and Information Engineering at National United University, Miao-Li, Taiwan. He received the B.S. degree in Computer Science and Information Engineering from National Chiao-Tung University, Hsinchu, Taiwan, in 1988; M.S. degree in Computer Science from National Taiwan University, Taipei, Taiwan, in 1990; Ph.D. degree in the Department of Computer Science and Information Engineering from National Chiao-Tung University, Hsinchu, Taiwan, in 2002. His research interests include mobile communications, wireless Internet, and VoIP.

數據

Figure 1 The indexing tree and the channel assignment of the broadcast data.
Figure 4 The average tuning time for data with the uniform distribution.
Figure 5 The average tuning time the branches with r=0.2, 1.0, and 2.0 with the IFAH.

參考文獻

相關文件

Salas, Hille, Etgen Calculus: One and Several Variables Copyright 2007 © John Wiley &amp; Sons, Inc.. All

For ex- ample, if every element in the image has the same colour, we expect the colour constancy sampler to pro- duce a very wide spread of samples for the surface

了⼀一個方案,用以尋找滿足 Calabi 方程的空 間,這些空間現在通稱為 Calabi-Yau 空間。.

You are given the wavelength and total energy of a light pulse and asked to find the number of photons it

• ‘ content teachers need to support support the learning of those parts of language knowledge that students are missing and that may be preventing them mastering the

• Examples of items NOT recognised for fee calculation*: staff gathering/ welfare/ meal allowances, expenses related to event celebrations without student participation,

volume suppressed mass: (TeV) 2 /M P ∼ 10 −4 eV → mm range can be experimentally tested for any number of extra dimensions - Light U(1) gauge bosons: no derivative couplings. =&gt;

incapable to extract any quantities from QCD, nor to tackle the most interesting physics, namely, the spontaneously chiral symmetry breaking and the color confinement.. 