Information Processing Letters

Size: px
Start display at page:

Download "Information Processing Letters"

Transcription

1 Inforation Processing Letters ) Contents lists available at ScienceDirect Inforation Processing Letters Offline file assignents for online load balancing Paul Dütting a, Monika Henzinger b, Ingar Weber c, a Ecole Polytechnique Fédérale de Lausanne EPFL), Station 14, CH-1015 Lausanne, Switzerland b University of Vienna, Faculty of Coputer Science, Universitaetsstrasse 10, A-1090 Wien, Austria c Yahoo! Research Barcelona, Av. Diagonal 177, E Barcelona, Spain article info abstract Article history: Received 20 August 2009 Received in revised for 19 July 2010 Accepted 25 Noveber 2010 Available online 30 Noveber 2010 Counicated by Wen-Lian Hsu Keywords: Load balancing On-line algoriths Inforation retrieval File distribution We study a novel load balancing proble that arises in web search engines. The proble is a cobination of an offline assignent proble, where files need to be copied and) assigned to achines, and an online load balancing proble, where requests ask for specific files and need to be assigned to a corresponding achine, whose load is increased by this. We present siple deterinistic algoriths for this proble and exhibit an interesting trade-off between the available space to ake file copies and the obtainable akespan. We also give non-trivial lower bounds for a large class of deterinistic algoriths and present a randoized algorith that beats these bounds with high probability Elsevier B.V. All rights reserved. 1. Introduction In the online load balancing with restricted assignent proble a set of achines has to execute a sequence of requests, arriving one by one. Every request has a load and ust be placed on exactly one of a subset of achines. The assignent of a request to a achine increases the load on this achine by the load of the request. The goal is to iniize the akespan, i.e., the axiu load placed on any achine. When neither the load of each request nor the set of achines a request can be assigned to are under the control of the algorith, then no online load balancing algorith can achieve a copetitive ratio better than log 2, see [1]. In this paper we study the following variant of this proble which consists of two phases. In the offline phase, n files need to be assigned to identical achines with the possibility, given space, to copy soe or all of the files. In the online phase, a sequence of requests arrives. Each request t asks for one file f j and has to be placed on one of the achines i to which a copy of) this file was as- signed. That achine s load ML i is then increased by lt). FL j denotes the su of the loads of all the requests for file f j. The goal is still to iniize the akespan, i.e., the axiu achine load ML = ax i ML i. In this odel the position of the algorith is strengthened: by placing the files intelligently it can influence the set of achines a request can be assigned to. However, it still does not control the load of each request nor the file the request asks for. Also note that the akespan will generally depend on the nuber of file copies ade by the algorith. In our odel, each achine has s slots which can be used to store copies of) files. We require s n/ because if s < n/ it is ipossible to store all of the n files on the achines. We call an algorith for both the offline and the online phase a dual-phase algorith. To analyze the quality of a dual-phase algorith there are two sensible points of reference. First, one could copare ML to the akespan OPT s of the optial offline 1 algorith for the sae paraeter s. Such an analysis ephasizes the optiality gap while caring less about how good the optial solution * Corresponding author. E-ail address: ingar@yahoo-inc.co I. Weber). 1 By an offline algorith we ean an algorith which is given the sequence of requests tbeforeassigning files to achines /$ see front atter 2010 Elsevier B.V. All rights reserved. doi: /j.ipl

2 P. Dütting et al. / Inforation Processing Letters ) actually is. Second, one could copare ML to the average akespan AVG := t lt)/ = j FL j/ which corresponds to a perfect load balance. In this approach the ephasis is less on the optiality gap, as even the optial offline algorith ight not be able to achieve AVG. To see this, consider the following two exaples for the case s = n/ : 1)Forn = 2 and = 3OPT n/ can only copy one of the two files and cannot achieve a akespan of less than L := in j FL j, copared to AVG = 2L/3 for equal file loads. 2) For n = 5 and = 3 OPT n/ can again only copy one of the files and one achine has only unshared 2 files leading to a akespan of at least 2L, copared to AVG = 5L/3 for equal file loads. Of course, for any s we always have OPT s AVG and so copetitive ratios with respect to AVG lead to copetitive ratios with respect to OPT s. However, as far as lower bounds are concerned we still keep AVG as a reference point as we ultiately care ore about the quality of the solution = How far fro perfect load balance is it? ) than about the quality of the algorith = How far fro the optial solution for the given s is it? ). Even with the sequence of requests given in advance it is tricky to find an optial assignent as i) the loads for the different files can differ widely, leading to a packing proble to level out these differences, and ii) individual requests can be large, aking it difficult to spread one file s load across several achines. To factor out these two difficulties, we introduce the following paraeters: We define α to be the sallest value such that j, k : FL j 1 + α)fl k, or equivalently, such that j : L FL j 1 + α)l where L := in j FL j. We define β := ax t lt) to be the axiu request load. As a consequence we state the bounds on the akespan in ters of n,, α, and β. To suarize, the differences between our new odel and the previous odels are: 1) The online phase is preceded by an offline phase, where a file assignent is coputed. This assignent deterines where requests can be placed in the online phase. 2) The loads are paraetrized. Individual requests have load at ost β and the load of all requests for two distinct files differs by a factor of at ost 1 + α. The structure of the reaining paper is as follows. Section 1.1 discusses an application of the studied proble and Section 1.2 briefly discusses results concerning classical load balancing. In Section 2, we present soe observations related to the inherent difficulty of the proble. The following three sections, Sections 3 5, discuss algoriths for different values of s, going fro the inial s = n/ to a tunable value. Finally, in Section 6 we present two lower bounds for deterinistic dual-phase algoriths Application to web search engines One application for our proble arises in web search engines. Every web search engine builds a data structure, called inverted) index [2,3]. In current web search engines the size of this data structure is in the order of hundreds of TeraBytes. The index is broken into a large nuber n of equally-sized files f j which are distributed over ultiple achines. This split is usually done using a docuent-based partitioning where each file contains the inforation for a subset of docuents [3]. With this partitioning, each query has to access all the files. Thus one query is broken into n requests, each request having to access one specific file. The tie it takes to answer the request for a given file depends on the query ters in the request, but also on the file itself as soe files ight contain any atching docuents. However, search engines usually tie-out requests that cannot be answered in a fixed tie liit, e.g. a second. Thus, the axiu load β of an individual request for file f j is uch saller than the total file load FL j of f j. In addition, when a search engine splits the index into files it tries to build the files in a way so that over a long enough sequence of requests the different file loads differ only by a sall constant factor 1 + α with α < 1. We also coputed α experientally using the 05/2007 crawl of the Stanford WebBase project with about 20 illion pages. Fro this crawl we constructed an index for Lucene 3 of about 500 GB and divided it into 20, 40 and 80 equally-sized indices according to a rando docuentbased partitioning as described above. Afterwards, we ran two query logs, one fro AllTheWeb and one fro AltaVista, with 0.5 illion queries against each of the indices using a Quad-Core AMD Septron 280 with 2.4 GHz and 8 GB RAM. In average it took about 1230 s, 689 s, and 419 s to run all queries of one query log against a single index. This tie varied by at ost a factor of 1.08, 1.12, and 1.15 between two distinct indices and individual queries took at ost 12 s, 7 s, and 5 s. Thus, α was about 0.08, 0.12, and 0.15 while β was about 1% of the average file load Related work There is a large body of work on online load balancing. See [4 6] for excellent surveys. For space reasons we ention here only the results that are directly related to our proble. If the assignent of each request is unrestricted, i.e., each request can be assigned to every achine, then there exist constant upper and lower bounds. The earliest result is due to Graha [7,8] who showed that the Greedy algorith which always places the request on the least loaded achine) has a copetitive ratio of exactly 2 1. The best algorith known today is 1.92-copetitive [9]. The lower bound currently stands at 1.88 [10]. If the assignent of each request is restricted to a subset of the achines, then the Greedy algorith achieves a copetitive ratio of log 2 +1 and no online load balancing algorith can be better than log 2 copetitive [1]. 2 Afile f j is called unshared if it only resides on a single achine i. 3

3 180 P. Dütting et al. / Inforation Processing Letters ) Preliinaries Generally, the reason that an online load balancing algorith cannot achieve AVG is two-fold. The first reason is an integrality gap which rules out the possibility of leveling out the discrete loads across a sall set of slots. This proble also exists for OPT s see previous exaples). However, assuing that β is sall enough, this integrality gap disappears already for OPT n/ see the offline result of Theore 2) and it always vanishes asyptotically as n and and n/) becoe large as then β/avg 0. The second reason is a knowledge gap which suarizes the fact that an online algorith will not know in advance which files are big load equal to 1 + α)l) and which are sall load equal to L). Therefore it could end up with all big file loads on one achine and that all of these files are unshared. This proble can be avoided by OPT s which knows the whole input sequence before distributing the files. This proble also vanishes for a randoized algorith with an oblivious adversary, see Theore 1. As far as upper bounds are concerned, we ake the following observation. Observation. Any reasonable two-phase load balancing algorith achieves n ML 1 + α)/ n AVG 1 + ) 1 + α) AVG. n Even with the inial space per achine of s = n and without aking any copies at all we obtain the bound above which corresponds to the case where all files on one achine have the axial load 1 + α)l. Thisobservation shows that upper bounds on the akespan of an algorith are essentially only interesting if ii) they are of the for 1 + o1)α) AVG when n and get large or if ii) they are of the for 1 + α) AVG + O1) without requiring n and to be large. Our result in Theore 1 is of the first for, whereas Theores 2 and 3 give results of the second for. 3. Minial space: s = n/ To store all n files on the achines a iniu space of s = n/ per achine is required. When does not divide n then there are still n/ n spare slots which could be used to store copies of the files. If n then at least 2n n/ files are unshared and when n/ n < /2, i.e., there are less than /2 freeslots, then there will always be one achine without any shared files. If all files on this achine have a load of 1 + α)l while all other files have L, then no deterinistic algorith can be substantially better than 1 + α)avg, see Theore 4. However, with an oblivious adversary and a randoized algorith the case of inial space can still be solved asyptotically optially by the following algorith called Randoized. Randoized. Randoized sorts the n files randoly s.t. each perutation has equal probability. It then distributes the files in a round-robin anner to the achines. Requests are assigned to the unique achine storing the corresponding file. Theore 1. Let k N + be such that n/k = and k 2 ln). Then Randoized uses exactly s = n/ = kslots per achines and assigns requests to achines such that with probability at least 1 1 ML ) α AVG. The proof of Theore 1 akes use of the following lea [11]. Lea 1 Hoeffding s inequality). Let X 1,...,X k be independent rando variables such that X i [a i, b i ] for 1 i k. Let S = i X i. Then, for any positive value t, Pr S E[S] ) kt exp 2k 2 t 2 i b i a i ) 2 Proof of Theore 1. Instead of placing k = n/ randoly chosen files on each achine, we could conceptually first split the files randoly into k groups of size and then randoly place one file of each group on each achine. Let X i, j be the rando variable that represents the file load of the j-th file not necessarily f j ) that is placed on achine i.foragivenachine i the X i, j have different distributions for different values of j, depending on the rando split into k groups of size. However,once the distributions have been fixed by the rando split) X i,1,...,x i,k are independent. Note that X i, j [L,1+α)L] for all i and j. LetS i = j X i, j. We choose t = α 1 n E[S i], i.e., kt = α 1 E[S i], and apply Lea 1 to get Pr S i E[S i ] α 1 ) E[S i] exp 2k2 α 1 n E[S i]) 2 ) kαl) 2 exp ). 2k 1 n 2 E2 [S i ] L 2 Since E[S i ] kl and k 2 ln) we get PrS i E[S i ] α 1 E[S i]) exp 2k 3 1 ) = exp 2k 1 ) 1 n Now let E i be the event that S i E[S i ] α 1 E[S i] and let E = i E i. We get PrE) = Pr i E i) i PrE i) 1. Hence S i E[S i ] α 1 E[S i] for all achines i with probability at least 1 1. In that case ML = ax i ML i = ax i S i ax i 1 1 α)e[s i]. SinceOPT 1 i S i = 1 i E[S i] and E[S i ]=E[S j ] for all i and j, we have that OPT E[S i ] for all i. It follows that with probability at least 1 1 ML 1 1 α)opt. If does not divide n then we can introduce up to 1 duy files with a load of L. This artificially increases AVG to AVG AVG + L AVG 1 + /n) and one obtains the following corollary. Corollary 1. Let k N + be such that n/k = and k 2 ln). Then Randoized uses at ost s = n/ slots per ).

4 P. Dütting et al. / Inforation Processing Letters ) achines and assigns requests to achines such that with probability at least 1 1 ML ) α ln) 4. Slightly ore space: s = n/ +1 ) AVG. Even with only one additional slot per achine the proble already becoes easier and the following Fractional algorith can be applied. Fractional. Fractional associates with each file f j a projected load PFL j and tries to balance this projected load across all achines. When used as an offline algorith it sets the projected load PFL j of each file f j to FL j. When used as an online algorith it siply sets PFL j = 1forall files f j. Afterwards it assigns the files and their projected load to the achines such that 1) no achine is assigned ore than n/ +1 files, 2) the projected load of every file is assigned copletely, and 3) every achine is assigned the sae aount of projected load j PFL j/. If we use fr i j) [0, 1] to denote the fraction of f j s projected load PFL j that is assigned to i, then this can be foralized as follows: i) i fr i j) = 1forallfiles f j and ii) j fr i j) PFL j = 1 j PFL j for all achines i.inthe online phase, Fractional assigns the requests in a way such that the total load ML i j) placed on i by requests for f j is roughly equal to fr i j) FL j. Details of the offline phase: Assign the files in ascending order of FL j in a round-robin anner to the achines. At the end, soe achines will have n files and soe will have n files. Copute the projected load for each file where, initially, the projected load of a achine equals the total load of its assigned files. Split the achines into three groups. First, achines whose assigned projected load equals AVG. Call these achines closed. Second, achines whose assigned projected load surpassed AVG. Call these achines overloaded. And third, achines whose assigned projected load is saller than AVG. Call these achines underloaded. While there are any overloaded achines pick an arbitrary one i. Copy its largest file, i.e. the file that was assigned to it last, to an underloaded achine i. Here, pick an underloaded achine i which was previously overloaded itself, if one exists, or otherwise pick an arbitrary one. Then assign just enough of i s largest file load to i such that i reaches AVG and becoes closed. Details of the online phase: Fractional keeps track of the load FL t 1 of f j j generated during the first t 1requests and the part ML t 1 j) of FL t 1 that is placed on i j i.the t-th request for f j is assigned to a achine i storing f j s.t. i) lt) fr i j) ML t 1 i j) if such a achine exists, else ii) fr i j) >ML t 1 j) and i i stores no other shared files, or else iii) fr i j) FL t 1 is largest. j Theore 2. Fractional uses s = n +1 slots per achine and assigns requests to achines such that 1) ML AVG + β in offline ode, and 2) ML 1 + α) AVG + β in online ode. Proof. We will prove the result for the offline ode where PFL j = FL j. The result for the online ode then follows easily by considering the worst case where all files on one achinehavealoadof1 + α) L and all other files have aloadofl. Without loss of generality let us assue that files are already sorted by their load, i.e., FL 1 FL 2 FL n.let FL v,w be the coplete) load of the w-th file placed on achine v. Fro the round-robin assignent we know that FL v,w = FL w 1)+v.Letn i be the nuber of files assigned to achine i in the first part of the offline phase, before files are copied. We know that n i n i 1 and that i < i n i n i. Clai 1. At any tie during the offline phase any overloaded achine i can close any underloaded achine i. By close we ean that the reaining assigned load fr i j) of i s biggest/last file f j is bigger than AVG ni w=1 FL i,w. This clai then iplies that any achine has at ost two shared files as an initially overloaded achine can only becoe underloaded once. Clai 1 follows fro the following clai. Clai 2. At any tie during the offline phase the socket c i of any underloaded achine i is no lower than the socket c i of any overloaded achine i. Here the socket of an underloaded achine equals its total assigned file load c i = j fr i j) FL j and the socket of an overloaded achine is defined as c i = n i 1 w=1 FL i,w. This clai then proves Clai 1 as whenever the load of the last file on i was big enough to extend fro c i past AVG, then this load will certainly suffice to extend fro c i to AVG to close this achine. Proof of Clai 2. We will first show that the clai holds initially before any overloaded achine becoes underloaded. Until this happens we always have c i = ni w=1 FL i,w for all underloaded achines i and the relevant fr i j) are all 0 or 1. If n i = n i and i is overloaded, then we ust have i < i and c i = n i w=1 FL i,w > ni w=2 FL i,w n i 1 w=1 FL i,w = c i, using FL i,w+1 FL i,w. If n i = n i + 1, then we have c i = n i w=1 FL i,w ni 1 w=1 FL i,w = c i, using FL i,w FL i,w as i < i or otherwise n i n i ). Now when an overloaded achine i becoes underloaded itself the coputation of c i changes and we have c i = j fr i j) FL j > n i 1 w=1 FL i,w. In fact, if i is initially overloaded and i is underloaded we know that n i 1 w=1 FL i,w n i w=1 FL i,w = c i.butas i has enough additional load x reaining on top of this s.t. x + n i 1 w=1 FL i,w > AVG we obtain c i = n i 1 w=1 FL i,w + x

5 182 P. Dütting et al. / Inforation Processing Letters ) AVG c i )>c i. Here x AVG c i ) is exactly the additional reaining load of the top file on i after i is closed. Thus the clai follows for i since it held for i before the update. Clai 3. Any shared file is stored on at ost two achines storing another shared file. Proof of Clai 3. Observe that each tie an underloaded achine gets closed it gets closed in one chunk. As we preferentially close underloaded achines which were previously overloaded, at any tie there is at ost one underloaded achine which was previously overloaded. This ensures that any shared file is stored on at ost two achines storing other shared files. One of these two achines can be the achine which, after the round robin assignent, stores the single copy of the file and the second achine can be the achine that the initially overloaded achine closes first. Clai 4. 1) If achine i only stores a single shared file f j then for all t ML t i j) fr i j) + β. 2) If achine i stores f j as well as another shared file f j then for all t ML t i j) fr i j) + β/2. 3) ForunsharedfileswehaveforalltML t i j) fr i j), where equality holds at the end of the online phase. Proof of Clai 4. During the online phase, we first assign a request to a achine where it still fits. When we go above the projected file load we first pick achines without any other shared files. Here, in case 1) above, we can exceed the projected file load up to a factor β. Ifweexceed the projected file load for a achine which has two shared files then we only do this as a last resort, i.e. all other achines storing no other shared files are already full and the only reaining holes are, according to Clai 3, on the two achines with other shared files. Note that all holes cobined are always big enough to accoodate the reaining file load which is still to coe and so the bigger of the two holes will always be big enough to accoodate lt)/2. This ensures that in case 2) above whenever there is a request t with load lt) for file f j, there is a achine i s.t. ML t i j) + lt)/2 fr i j). 5. Variable space: n/ s n If the aount of space s per achine is not liited then by copying all files onto all achines one can obtain AVG + β by assigning each request to the least loaded achine. More generally, the following algorith called Cluster akes a certain space-perforance tradeoff possible, see Theore 3. Cluster. In addition to the regular input, Cluster is given q N + such that q and q n. In the offline phase, Cluster divides the set of files and the set of achines into q equally-sized clusters F 1,...,F q and M 1,...,M q. Afterwards, it assigns each of the n/q files in F l to each of the /q achines in M l. In the online phase, it assigns each request to the least-loaded perissible achine. Theore 3. If there exists q N + such that q n andq, then the deterinistic dual-phase algorith Cluster uses exactly s = n/q slots per achines and assigns requests to achines such that [ ML α q + α ) ] α AVG + β. Note that within each cluster c the assignent is unrestricted and so AVG c + β can be achieved by a greedy approach. Here AVG c denotes the average load of achines in the cluster. The worst case corresponds to the setting where one cluster has only files of size 1 + α)l whereas all other clusters have files of size L. An analysis of this case gives the bound above. If we assue that the desired q is constant then asyptotically as n, and n/ the condition that q divides both and n can be dropped in a siilar fashion to Corollary 1. Concretely, we can i) use duy files with load L to increase the nuber of files by at ost q to ensure q n and ii) choose not to use at ost q achines to ensure that q. This then leads to a new average satisfying AVG AVG+qL AVG+qAVG/n q q 1+q/n +n ) AVG = 1 + q ) AVG = 1 + o1)) AVG. 1 q/ n nq Corollary 2. Given any constant q N +, Cluster uses s = n/q slots per achine and, for large n and, has a akespan of [ ML Lower bounds α q + α ) ] α 1 + o1) ) AVG + β. Next we give lower bounds for any deterinistic dualphase algorith. Theore 3 with q = 1) showed that without any unshared files we can obtain ML AVG + β and so the bounds depend on the nuber of unshared files. Theore 4. Let A be a deterinistic dual-phase algorith that produces a file assignent where at least one achine stores n unshared files. Then, for all n and there exists a sequence of requests such that [ ML α ) ] α AVG. + α The proof follows in a straightforward way fro an analysis of the case where the n unshared files on one achinehaveafileloadof 1 + α)l, whereas all the other files have L. In this case ML = n 1 + α) L and AVG = n + n α ) L. Dividing these two expressions and using the bounds n n n n + 1 and n+ leads to the stated result. For settings where there are even ore unshared files, we can get lower bounds of the for 1 + Ω )) AVG for the typical case of α < n. n

6 P. Dütting et al. / Inforation Processing Letters ) Theore 5. Let A be a deterinistic dual-phase algorith that has at least ɛn unshared files, where 0 < ɛ 1. For all n 3 and α 0 there exists a sequence of requests such that 1) ML AVG if α n, 2 and 2) ML in1 + 12n α, ɛ ɛ α) AVG if α < n. 2n Proof. In this proof let k = n/ 1, which does not need to be an integer. Case 1. α n. SinceA uses less than 2n slots there exists an unshared file. The adversary gives a file load of 1 +α)l to this file and L to every other file. Then ML 1 + α)l and AVG = kl+αl/. Thus,ML /AVG 1+α)/k+α/), which is at least /2 forα n. Case 2. α < n. We consider two cases depending on the file assignent. Case 2.1. There exists a achine with k unshared files. By Theore 4, ML [ α 1+α )α] AVG, which is at least 1 + α/4k) for α < n and 3. Case 2.2. There does not exist a achine with k unshared files. It follows that every achine has at ost k 1 any unshared files. 4 Thus, at least ɛn/ k 1) achines have at least one unshared file. The adversary first sends a sequence of requests that gives equal load of L to all files. Depending on the achine loads after these requests the adversary proceeds as follows. Case There exists a achine with an unshared file f and total load of at least kl αl/2. In this case the adversary sends another sequence of requests, each requesting f and having a total load of αl. As a consequence has final load at least kl + αl/2 and AVG = kl + αl/. ThusML /AVG k + α/2)/k + α/) = 1 + α 2)/2n+2α), which is at least 1+α/12k) for 3 and α < n. Case Every achine with an unshared file has at this pointatotalloadofatostkl αl/2. In this case the adversary sends no further requests. Thus, AVG = kl. LetS be the set of achines with at least one unshared file. Then the total load on the achines in S is at ost S kl αl/2). Thus on the reaining S achines there is a load of at least nl S kl αl/2) = S )kl+ S αl/2. Thus there exists a achine not in S with load at least kl + S αl/2 S )). Since S ɛn/ k 1) and S / S ) increases onotonically in S, it follows that has a load of at least kl + ɛαl/21 ɛ)). Thus, ML /AVG 1 + α 1 ɛ ɛ 1 2k. References [1] Y. Azar, J. Naor, R. Ro, The copetiveness of online assignents, in: Proc. 3rd ACM SIAM Syposiu on Discrete Algoriths, 1992, pp [2] L.A. Barroso, J. Dean, U. Hoelzle, Web search for a planet: the Google cluster architecture, IEEE Micro ) [3] J. Zobel, A. Moffat, Inverted files for text search engines, ACM Coput. Surv. 38 2) 2006) 6. [4] Y. Azar, On-line load balancing, in: A. Fiat, G.J. Woeginger Eds.), Online Algoriths: The State of the Art, in: Lecture Notes in Coputer Science, vol. 1442, Springer-Verlag, Berlin, 1998, pp [5] S. Albers, Online algoriths: a survey, Matheatical Prograing ) [6] A. Borodin, R. El-Yaniv, Online Coputation and Copetitive Analysis, Cabridge University Press, Cabridge, [7] R. Graha, Bounds for certain ultiprocessing anoalies, Bell Syste Technical Journal ) [8] R. Graha, Bounds on ultiprocessing tiing anoalies, SIAM Journal of Applied Matheatics ) [9] R. Fleischer, M. Wahl, Online scheduling revisited, Journal of Scheduling ) [10] J.F. Rudin III, R. Chandrasekaran, Iproved bounds for the online scheduling proble, SIAM Journal on Coputing ) [11] W. Hoeffding, Probability inequalities for sus of bounded rando variables, Journal of the Aerican Statistical Association 1963) When k =1, then n = and Case 2.1 arises. Thus we can assue that k 2.

Models and Algorithms for Stochastic Online Scheduling 1

Models and Algorithms for Stochastic Online Scheduling 1 Models and Algoriths for Stochastic Online Scheduling 1 Nicole Megow Technische Universität Berlin, Institut für Matheatik, Strasse des 17. Juni 136, 10623 Berlin, Gerany. eail: negow@ath.tu-berlin.de

More information

Halloween Costume Ideas for the Wii Game

Halloween Costume Ideas for the Wii Game Algorithica 2001) 30: 101 139 DOI: 101007/s00453-001-0003-0 Algorithica 2001 Springer-Verlag New York Inc Optial Search and One-Way Trading Online Algoriths R El-Yaniv, 1 A Fiat, 2 R M Karp, 3 and G Turpin

More information

An Innovate Dynamic Load Balancing Algorithm Based on Task

An Innovate Dynamic Load Balancing Algorithm Based on Task An Innovate Dynaic Load Balancing Algorith Based on Task Classification Hong-bin Wang,,a, Zhi-yi Fang, b, Guan-nan Qu,*,c, Xiao-dan Ren,d College of Coputer Science and Technology, Jilin University, Changchun

More information

Online Bagging and Boosting

Online Bagging and Boosting Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used

More information

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks Reliability Constrained acket-sizing for inear Multi-hop Wireless Networks Ning Wen, and Randall A. Berry Departent of Electrical Engineering and Coputer Science Northwestern University, Evanston, Illinois

More information

Stochastic Online Scheduling on Parallel Machines

Stochastic Online Scheduling on Parallel Machines Stochastic Online Scheduling on Parallel Machines Nicole Megow 1, Marc Uetz 2, and Tark Vredeveld 3 1 Technische Universit at Berlin, Institut f ur Matheatik, Strasse des 17. Juni 136, 10623 Berlin, Gerany

More information

Data Set Generation for Rectangular Placement Problems

Data Set Generation for Rectangular Placement Problems Data Set Generation for Rectangular Placeent Probles Christine L. Valenzuela (Muford) Pearl Y. Wang School of Coputer Science & Inforatics Departent of Coputer Science MS 4A5 Cardiff University George

More information

MINIMUM VERTEX DEGREE THRESHOLD FOR LOOSE HAMILTON CYCLES IN 3-UNIFORM HYPERGRAPHS

MINIMUM VERTEX DEGREE THRESHOLD FOR LOOSE HAMILTON CYCLES IN 3-UNIFORM HYPERGRAPHS MINIMUM VERTEX DEGREE THRESHOLD FOR LOOSE HAMILTON CYCLES IN 3-UNIFORM HYPERGRAPHS JIE HAN AND YI ZHAO Abstract. We show that for sufficiently large n, every 3-unifor hypergraph on n vertices with iniu

More information

arxiv:0805.1434v1 [math.pr] 9 May 2008

arxiv:0805.1434v1 [math.pr] 9 May 2008 Degree-distribution stability of scale-free networs Zhenting Hou, Xiangxing Kong, Dinghua Shi,2, and Guanrong Chen 3 School of Matheatics, Central South University, Changsha 40083, China 2 Departent of

More information

Considerations on Distributed Load Balancing for Fully Heterogeneous Machines: Two Particular Cases

Considerations on Distributed Load Balancing for Fully Heterogeneous Machines: Two Particular Cases Considerations on Distributed Load Balancing for Fully Heterogeneous Machines: Two Particular Cases Nathanaël Cheriere Departent of Coputer Science ENS Rennes Rennes, France nathanael.cheriere@ens-rennes.fr

More information

Applying Multiple Neural Networks on Large Scale Data

Applying Multiple Neural Networks on Large Scale Data 0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree

More information

Partitioned Elias-Fano Indexes

Partitioned Elias-Fano Indexes Partitioned Elias-ano Indexes Giuseppe Ottaviano ISTI-CNR, Pisa giuseppe.ottaviano@isti.cnr.it Rossano Venturini Dept. of Coputer Science, University of Pisa rossano@di.unipi.it ABSTRACT The Elias-ano

More information

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128 ON SELF-ROUTING IN CLOS CONNECTION NETWORKS BARRY G. DOUGLASS Electrical Engineering Departent Texas A&M University College Station, TX 778-8 A. YAVUZ ORUÇ Electrical Engineering Departent and Institute

More information

Efficient Key Management for Secure Group Communications with Bursty Behavior

Efficient Key Management for Secure Group Communications with Bursty Behavior Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:

More information

An Approach to Combating Free-riding in Peer-to-Peer Networks

An Approach to Combating Free-riding in Peer-to-Peer Networks An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008

More information

Searching strategy for multi-target discovery in wireless networks

Searching strategy for multi-target discovery in wireless networks Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,

More information

Machine Learning Applications in Grid Computing

Machine Learning Applications in Grid Computing Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA gvc@dartouth.edu, guofei.jiang@dartouth.edu

More information

Resource Allocation in Wireless Networks with Multiple Relays

Resource Allocation in Wireless Networks with Multiple Relays Resource Allocation in Wireless Networks with Multiple Relays Kağan Bakanoğlu, Stefano Toasin, Elza Erkip Departent of Electrical and Coputer Engineering, Polytechnic Institute of NYU, Brooklyn, NY, 0

More information

The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs

The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs Send Orders for Reprints to reprints@benthascience.ae 206 The Open Fuels & Energy Science Journal, 2015, 8, 206-210 Open Access The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic

More information

Position Auctions and Non-uniform Conversion Rates

Position Auctions and Non-uniform Conversion Rates Position Auctions and Non-unifor Conversion Rates Liad Blurosen Microsoft Research Mountain View, CA 944 liadbl@icrosoft.co Jason D. Hartline Shuzhen Nong Electrical Engineering and Microsoft AdCenter

More information

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol., No. 3, Suer 28, pp. 429 447 issn 523-464 eissn 526-5498 8 3 429 infors doi.287/so.7.8 28 INFORMS INFORMS holds copyright to this article and distributed

More information

Approximately-Perfect Hashing: Improving Network Throughput through Efficient Off-chip Routing Table Lookup

Approximately-Perfect Hashing: Improving Network Throughput through Efficient Off-chip Routing Table Lookup Approxiately-Perfect ing: Iproving Network Throughput through Efficient Off-chip Routing Table Lookup Zhuo Huang, Jih-Kwon Peir, Shigang Chen Departent of Coputer & Inforation Science & Engineering, University

More information

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION Henrik Kure Dina, Danish Inforatics Network In the Agricultural Sciences Royal Veterinary and Agricultural University

More information

Dynamic Placement for Clustered Web Applications

Dynamic Placement for Clustered Web Applications Dynaic laceent for Clustered Web Applications A. Karve, T. Kibrel, G. acifici, M. Spreitzer, M. Steinder, M. Sviridenko, and A. Tantawi IBM T.J. Watson Research Center {karve,kibrel,giovanni,spreitz,steinder,sviri,tantawi}@us.ib.co

More information

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State

More information

Software Quality Characteristics Tested For Mobile Application Development

Software Quality Characteristics Tested For Mobile Application Development Thesis no: MGSE-2015-02 Software Quality Characteristics Tested For Mobile Application Developent Literature Review and Epirical Survey WALEED ANWAR Faculty of Coputing Blekinge Institute of Technology

More information

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Vol. 9, No. 5 (2016), pp.303-312 http://dx.doi.org/10.14257/ijgdc.2016.9.5.26 Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou

More information

REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES

REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES Charles Reynolds Christopher Fox reynolds @cs.ju.edu fox@cs.ju.edu Departent of Coputer

More information

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks Cooperative Caching for Adaptive Bit Rate Streaing in Content Delivery Networs Phuong Luu Vo Departent of Coputer Science and Engineering, International University - VNUHCM, Vietna vtlphuong@hciu.edu.vn

More information

Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects

Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects Lucas Grèze Robert Pellerin Nathalie Perrier Patrice Leclaire February 2011 CIRRELT-2011-11 Bureaux

More information

Preference-based Search and Multi-criteria Optimization

Preference-based Search and Multi-criteria Optimization Fro: AAAI-02 Proceedings. Copyright 2002, AAAI (www.aaai.org). All rights reserved. Preference-based Search and Multi-criteria Optiization Ulrich Junker ILOG 1681, route des Dolines F-06560 Valbonne ujunker@ilog.fr

More information

Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and migration algorithms

Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and migration algorithms Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and igration algoriths Chaia Ghribi, Makhlouf Hadji and Djaal Zeghlache Institut Mines-Téléco, Téléco SudParis UMR CNRS 5157 9, Rue

More information

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS 641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC arketa.zajarosova@vsb.cz Abstract Custoer relationship

More information

An Optimal Task Allocation Model for System Cost Analysis in Heterogeneous Distributed Computing Systems: A Heuristic Approach

An Optimal Task Allocation Model for System Cost Analysis in Heterogeneous Distributed Computing Systems: A Heuristic Approach An Optial Tas Allocation Model for Syste Cost Analysis in Heterogeneous Distributed Coputing Systes: A Heuristic Approach P. K. Yadav Central Building Research Institute, Rooree- 247667, Uttarahand (INDIA)

More information

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries

More information

Using Bloom Filters to Refine Web Search Results

Using Bloom Filters to Refine Web Search Results Using Bloo Filters to Refine Web Search Results Navendu Jain Departent of Coputer Sciences University of Texas at Austin Austin, TX, 78712 nav@cs.utexas.edu Mike Dahlin Departent of Coputer Sciences University

More information

Fuzzy Sets in HR Management

Fuzzy Sets in HR Management Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic blanka.zekova@sezna.cz Jana Talašová Faculty of Science, Palacký Univerzity,

More information

Energy Proportionality for Disk Storage Using Replication

Energy Proportionality for Disk Storage Using Replication Energy Proportionality for Disk Storage Using Replication Jinoh Ki and Doron Rote Lawrence Berkeley National Laboratory University of California, Berkeley, CA 94720 {jinohki,d rote}@lbl.gov Abstract Energy

More information

Airline Yield Management with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN

Airline Yield Management with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN Airline Yield Manageent with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN Integral Developent Corporation, 301 University Avenue, Suite 200, Palo Alto, California 94301 SHALER STIDHAM

More information

On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes

On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes On Coputing Nearest Neighbors with Applications to Decoding of Binary Linear Codes Alexander May and Ilya Ozerov Horst Görtz Institute for IT-Security Ruhr-University Bochu, Gerany Faculty of Matheatics

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

A quantum secret ballot. Abstract

A quantum secret ballot. Abstract A quantu secret ballot Shahar Dolev and Itaar Pitowsky The Edelstein Center, Levi Building, The Hebrerw University, Givat Ra, Jerusale, Israel Boaz Tair arxiv:quant-ph/060087v 8 Mar 006 Departent of Philosophy

More information

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing Real Tie Target Tracking with Binary Sensor Networks and Parallel Coputing Hong Lin, John Rushing, Sara J. Graves, Steve Tanner, and Evans Criswell Abstract A parallel real tie data fusion and target tracking

More information

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises Advance Journal of Food Science and Technology 9(2): 964-969, 205 ISSN: 2042-4868; e-issn: 2042-4876 205 Maxwell Scientific Publication Corp. Subitted: August 0, 205 Accepted: Septeber 3, 205 Published:

More information

Data Streaming Algorithms for Estimating Entropy of Network Traffic

Data Streaming Algorithms for Estimating Entropy of Network Traffic Data Streaing Algoriths for Estiating Entropy of Network Traffic Ashwin Lall University of Rochester Vyas Sekar Carnegie Mellon University Mitsunori Ogihara University of Rochester Jun (Ji) Xu Georgia

More information

Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation

Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation Int J Counications, Network and Syste Sciences, 29, 5, 422-432 doi:14236/ijcns292547 Published Online August 29 (http://wwwscirporg/journal/ijcns/) Load Control for Overloaded MPLS/DiffServ Networks during

More information

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2 Exploiting Hardware Heterogeneity within the Sae Instance Type of Aazon EC2 Zhonghong Ou, Hao Zhuang, Jukka K. Nurinen, Antti Ylä-Jääski, Pan Hui Aalto University, Finland; Deutsch Teleko Laboratories,

More information

Botnets Detection Based on IRC-Community

Botnets Detection Based on IRC-Community Botnets Detection Based on IRC-Counity Wei Lu and Ali A. Ghorbani Network Security Laboratory, Faculty of Coputer Science University of New Brunswick, Fredericton, NB E3B 5A3, Canada {wlu, ghorbani}@unb.ca

More information

Reconnect 04 Solving Integer Programs with Branch and Bound (and Branch and Cut)

Reconnect 04 Solving Integer Programs with Branch and Bound (and Branch and Cut) Sandia is a ultiprogra laboratory operated by Sandia Corporation, a Lockheed Martin Copany, Reconnect 04 Solving Integer Progras with Branch and Bound (and Branch and Cut) Cynthia Phillips (Sandia National

More information

6. Time (or Space) Series Analysis

6. Time (or Space) Series Analysis ATM 55 otes: Tie Series Analysis - Section 6a Page 8 6. Tie (or Space) Series Analysis In this chapter we will consider soe coon aspects of tie series analysis including autocorrelation, statistical prediction,

More information

SOME APPLICATIONS OF FORECASTING Prof. Thomas B. Fomby Department of Economics Southern Methodist University May 2008

SOME APPLICATIONS OF FORECASTING Prof. Thomas B. Fomby Department of Economics Southern Methodist University May 2008 SOME APPLCATONS OF FORECASTNG Prof. Thoas B. Foby Departent of Econoics Southern Methodist University May 8 To deonstrate the usefulness of forecasting ethods this note discusses four applications of forecasting

More information

How To Get A Loan From A Bank For Free

How To Get A Loan From A Bank For Free Finance 111 Finance We have to work with oney every day. While balancing your checkbook or calculating your onthly expenditures on espresso requires only arithetic, when we start saving, planning for retireent,

More information

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS PREDICTIO OF POSSIBLE COGESTIOS I SLA CREATIO PROCESS Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia Tel +385 20 445-739,

More information

( C) CLASS 10. TEMPERATURE AND ATOMS

( C) CLASS 10. TEMPERATURE AND ATOMS CLASS 10. EMPERAURE AND AOMS 10.1. INRODUCION Boyle s understanding of the pressure-volue relationship for gases occurred in the late 1600 s. he relationships between volue and teperature, and between

More information

Factored Models for Probabilistic Modal Logic

Factored Models for Probabilistic Modal Logic Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence (2008 Factored Models for Probabilistic Modal Logic Afsaneh Shirazi and Eyal Air Coputer Science Departent, University of Illinois

More information

- 265 - Part C. Property and Casualty Insurance Companies

- 265 - Part C. Property and Casualty Insurance Companies Part C. Property and Casualty Insurance Copanies This Part discusses proposals to curtail favorable tax rules for property and casualty ("P&C") insurance copanies. The syste of reserves for unpaid losses

More information

Optimal Resource-Constraint Project Scheduling with Overlapping Modes

Optimal Resource-Constraint Project Scheduling with Overlapping Modes Optial Resource-Constraint Proect Scheduling with Overlapping Modes François Berthaut Lucas Grèze Robert Pellerin Nathalie Perrier Adnène Hai February 20 CIRRELT-20-09 Bureaux de Montréal : Bureaux de

More information

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary

More information

ASIC Design Project Management Supported by Multi Agent Simulation

ASIC Design Project Management Supported by Multi Agent Simulation ASIC Design Project Manageent Supported by Multi Agent Siulation Jana Blaschke, Christian Sebeke, Wolfgang Rosenstiel Abstract The coplexity of Application Specific Integrated Circuits (ASICs) is continuously

More information

A Fast Algorithm for Online Placement and Reorganization of Replicated Data

A Fast Algorithm for Online Placement and Reorganization of Replicated Data A Fast Algorith for Online Placeent and Reorganization of Replicated Data R. J. Honicky Storage Systes Research Center University of California, Santa Cruz Ethan L. Miller Storage Systes Research Center

More information

Capacity of Multiple-Antenna Systems With Both Receiver and Transmitter Channel State Information

Capacity of Multiple-Antenna Systems With Both Receiver and Transmitter Channel State Information IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO., OCTOBER 23 2697 Capacity of Multiple-Antenna Systes With Both Receiver and Transitter Channel State Inforation Sudharan K. Jayaweera, Student Meber,

More information

Dynamic right-sizing for power-proportional data centers Extended version

Dynamic right-sizing for power-proportional data centers Extended version 1 Dynaic right-sizing for power-proportional data centers Extended version Minghong Lin, Ada Wieran, Lachlan L. H. Andrew and Eno Thereska Abstract Power consuption iposes a significant cost for data centers

More information

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1 International Journal of Manageent & Inforation Systes First Quarter 2012 Volue 16, Nuber 1 Proposal And Effectiveness Of A Highly Copelling Direct Mail Method - Establishent And Deployent Of PMOS-DM Hisatoshi

More information

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network 2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona

More information

Pricing Asian Options using Monte Carlo Methods

Pricing Asian Options using Monte Carlo Methods U.U.D.M. Project Report 9:7 Pricing Asian Options using Monte Carlo Methods Hongbin Zhang Exaensarbete i ateatik, 3 hp Handledare och exainator: Johan Tysk Juni 9 Departent of Matheatics Uppsala University

More information

A Scalable Application Placement Controller for Enterprise Data Centers

A Scalable Application Placement Controller for Enterprise Data Centers W WWW 7 / Track: Perforance and Scalability A Scalable Application Placeent Controller for Enterprise Data Centers Chunqiang Tang, Malgorzata Steinder, Michael Spreitzer, and Giovanni Pacifici IBM T.J.

More information

2. FINDING A SOLUTION

2. FINDING A SOLUTION The 7 th Balan Conference on Operational Research BACOR 5 Constanta, May 5, Roania OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS

More information

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS Artificial Intelligence Methods and Techniques for Business and Engineering Applications 210 INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE

More information

Binary Embedding: Fundamental Limits and Fast Algorithm

Binary Embedding: Fundamental Limits and Fast Algorithm Binary Ebedding: Fundaental Liits and Fast Algorith Xinyang Yi The University of Texas at Austin yixy@utexas.edu Eric Price The University of Texas at Austin ecprice@cs.utexas.edu Constantine Caraanis

More information

Online Appendix I: A Model of Household Bargaining with Violence. In this appendix I develop a simple model of household bargaining that

Online Appendix I: A Model of Household Bargaining with Violence. In this appendix I develop a simple model of household bargaining that Online Appendix I: A Model of Household Bargaining ith Violence In this appendix I develop a siple odel of household bargaining that incorporates violence and shos under hat assuptions an increase in oen

More information

The AGA Evaluating Model of Customer Loyalty Based on E-commerce Environment

The AGA Evaluating Model of Customer Loyalty Based on E-commerce Environment 6 JOURNAL OF SOFTWARE, VOL. 4, NO. 3, MAY 009 The AGA Evaluating Model of Custoer Loyalty Based on E-coerce Environent Shaoei Yang Econoics and Manageent Departent, North China Electric Power University,

More information

Implementation of Active Queue Management in a Combined Input and Output Queued Switch

Implementation of Active Queue Management in a Combined Input and Output Queued Switch pleentation of Active Queue Manageent in a obined nput and Output Queued Switch Bartek Wydrowski and Moshe Zukeran AR Special Research entre for Ultra-Broadband nforation Networks, EEE Departent, The University

More information

HOW CLOSE ARE THE OPTION PRICING FORMULAS OF BACHELIER AND BLACK-MERTON-SCHOLES?

HOW CLOSE ARE THE OPTION PRICING FORMULAS OF BACHELIER AND BLACK-MERTON-SCHOLES? HOW CLOSE ARE THE OPTION PRICING FORMULAS OF BACHELIER AND BLACK-MERTON-SCHOLES? WALTER SCHACHERMAYER AND JOSEF TEICHMANN Abstract. We copare the option pricing forulas of Louis Bachelier and Black-Merton-Scholes

More information

Non-Price Equilibria in Markets of Discrete Goods

Non-Price Equilibria in Markets of Discrete Goods Non-Price Equilibria in Markets of Discrete Goods (working paper) Avinatan Hassidi Hai Kaplan Yishay Mansour Noa Nisan ABSTRACT We study arkets of indivisible ites in which price-based (Walrasian) equilibria

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srecko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

ESTIMATING LIQUIDITY PREMIA IN THE SPANISH GOVERNMENT SECURITIES MARKET

ESTIMATING LIQUIDITY PREMIA IN THE SPANISH GOVERNMENT SECURITIES MARKET ESTIMATING LIQUIDITY PREMIA IN THE SPANISH GOVERNMENT SECURITIES MARKET Francisco Alonso, Roberto Blanco, Ana del Río and Alicia Sanchis Banco de España Banco de España Servicio de Estudios Docuento de

More information

Use of extrapolation to forecast the working capital in the mechanical engineering companies

Use of extrapolation to forecast the working capital in the mechanical engineering companies ECONTECHMOD. AN INTERNATIONAL QUARTERLY JOURNAL 2014. Vol. 1. No. 1. 23 28 Use of extrapolation to forecast the working capital in the echanical engineering copanies A. Cherep, Y. Shvets Departent of finance

More information

Managing Complex Network Operation with Predictive Analytics

Managing Complex Network Operation with Predictive Analytics Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory

More information

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel Recent Advances in Counications Adaptive odulation and Coding for Unanned Aerial Vehicle (UAV) Radio Channel Airhossein Fereidountabar,Gian Carlo Cardarilli, Rocco Fazzolari,Luca Di Nunzio Abstract In

More information

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15), pp. 197-4 http://d.doi.org/1.1457/ijfgcn.15.8.6.19 An Integrated Approach for Monitoring Service Level Paraeters

More information

Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks

Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks Protecting Sall Keys in Authentication Protocols for Wireless Sensor Networks Kalvinder Singh Australia Developent Laboratory, IBM and School of Inforation and Counication Technology, Griffith University

More information

Image restoration for a rectangular poor-pixels detector

Image restoration for a rectangular poor-pixels detector Iage restoration for a rectangular poor-pixels detector Pengcheng Wen 1, Xiangjun Wang 1, Hong Wei 2 1 State Key Laboratory of Precision Measuring Technology and Instruents, Tianjin University, China 2

More information

Endogenous Market Structure and the Cooperative Firm

Endogenous Market Structure and the Cooperative Firm Endogenous Market Structure and the Cooperative Fir Brent Hueth and GianCarlo Moschini Working Paper 14-WP 547 May 2014 Center for Agricultural and Rural Developent Iowa State University Aes, Iowa 50011-1070

More information

Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller

Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller Research Article International Journal of Current Engineering and Technology EISSN 77 46, PISSN 347 56 4 INPRESSCO, All Rights Reserved Available at http://inpressco.co/category/ijcet Design of Model Reference

More information

Endogenous Credit-Card Acceptance in a Model of Precautionary Demand for Money

Endogenous Credit-Card Acceptance in a Model of Precautionary Demand for Money Endogenous Credit-Card Acceptance in a Model of Precautionary Deand for Money Adrian Masters University of Essex and SUNY Albany Luis Raúl Rodríguez-Reyes University of Essex March 24 Abstract A credit-card

More information

Performance Evaluation of Machine Learning Techniques using Software Cost Drivers

Performance Evaluation of Machine Learning Techniques using Software Cost Drivers Perforance Evaluation of Machine Learning Techniques using Software Cost Drivers Manas Gaur Departent of Coputer Engineering, Delhi Technological University Delhi, India ABSTRACT There is a treendous rise

More information

The Benefit of SMT in the Multi-Core Era: Flexibility towards Degrees of Thread-Level Parallelism

The Benefit of SMT in the Multi-Core Era: Flexibility towards Degrees of Thread-Level Parallelism The enefit of SMT in the Multi-Core Era: Flexibility towards Degrees of Thread-Level Parallelis Stijn Eyeran Lieven Eeckhout Ghent University, elgiu Stijn.Eyeran@elis.UGent.be, Lieven.Eeckhout@elis.UGent.be

More information

Network delay-aware load balancing in selfish and cooperative distributed systems

Network delay-aware load balancing in selfish and cooperative distributed systems Network delay-aware load balancing in selfish and cooperative distributed systes Piotr Skowron Faculty of Matheatics, Inforatics and Mechanics University of Warsaw Eail: p.skowron@iuw.edu.pl Krzysztof

More information

The Model of Lines for Option Pricing with Jumps

The Model of Lines for Option Pricing with Jumps The Model of Lines for Option Pricing with Jups Claudio Albanese, Sebastian Jaiungal and Ditri H Rubisov January 17, 21 Departent of Matheatics, University of Toronto Abstract This article reviews a pricing

More information

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration International Journal of Hybrid Inforation Technology, pp. 339-350 http://dx.doi.org/10.14257/hit.2016.9.4.28 An Iproved Decision-aking Model of Huan Resource Outsourcing Based on Internet Collaboration

More information

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO Bulletin of the Transilvania University of Braşov Series I: Engineering Sciences Vol. 4 (53) No. - 0 PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO V. CAZACU I. SZÉKELY F. SANDU 3 T. BĂLAN Abstract:

More information

ADJUSTING FOR QUALITY CHANGE

ADJUSTING FOR QUALITY CHANGE ADJUSTING FOR QUALITY CHANGE 7 Introduction 7.1 The easureent of changes in the level of consuer prices is coplicated by the appearance and disappearance of new and old goods and services, as well as changes

More information

Leak detection in open water channels

Leak detection in open water channels Proceedings of the 17th World Congress The International Federation of Autoatic Control Seoul, Korea, July 6-11, 28 Leak detection in open water channels Erik Weyer Georges Bastin Departent of Electrical

More information

Modeling Cooperative Gene Regulation Using Fast Orthogonal Search

Modeling Cooperative Gene Regulation Using Fast Orthogonal Search 8 The Open Bioinforatics Journal, 28, 2, 8-89 Open Access odeling Cooperative Gene Regulation Using Fast Orthogonal Search Ian inz* and ichael J. Korenberg* Departent of Electrical and Coputer Engineering,

More information

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY Y. T. Chen Departent of Industrial and Systes Engineering Hong Kong Polytechnic University, Hong Kong yongtong.chen@connect.polyu.hk

More information

Impact of Processing Costs on Service Chain Placement in Network Functions Virtualization

Impact of Processing Costs on Service Chain Placement in Network Functions Virtualization Ipact of Processing Costs on Service Chain Placeent in Network Functions Virtualization Marco Savi, Massio Tornatore, Giacoo Verticale Dipartiento di Elettronica, Inforazione e Bioingegneria, Politecnico

More information

A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS

A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS Isaac Zafrany and Sa BenYaakov Departent of Electrical and Coputer Engineering BenGurion University of the Negev P. O. Box

More information

Method of supply chain optimization in E-commerce

Method of supply chain optimization in E-commerce MPRA Munich Personal RePEc Archive Method of supply chain optiization in E-coerce Petr Suchánek and Robert Bucki Silesian University - School of Business Adinistration, The College of Inforatics and Manageent

More information

SAMPLING METHODS LEARNING OBJECTIVES

SAMPLING METHODS LEARNING OBJECTIVES 6 SAMPLING METHODS 6 Using Statistics 6-6 2 Nonprobability Sapling and Bias 6-6 Stratified Rando Sapling 6-2 6 4 Cluster Sapling 6-4 6 5 Systeatic Sapling 6-9 6 6 Nonresponse 6-2 6 7 Suary and Review of

More information

Modeling operational risk data reported above a time-varying threshold

Modeling operational risk data reported above a time-varying threshold Modeling operational risk data reported above a tie-varying threshold Pavel V. Shevchenko CSIRO Matheatical and Inforation Sciences, Sydney, Locked bag 7, North Ryde, NSW, 670, Australia. e-ail: Pavel.Shevchenko@csiro.au

More information