FORMAL ANALYSIS FOR REAL-TIME SCHEDULING

Size: px
Start display at page:

Download "FORMAL ANALYSIS FOR REAL-TIME SCHEDULING"

Transcription

1 FORMAL ANALYSIS FOR REAL-TIME SCHEDULING Bruno Dutertre and Vctora Stavrdou, SRI Internatonal, Menlo Park, CA Introducton In modern avoncs archtectures, applcaton software ncreasngly reles on servces provded by a real-tme operatng system (RTOS). An applcaton s typcally structured n sets of processes that share common hardware resources va the RTOS. Such archtectures present numerous advantages for software development by decouplng the applcaton software from the specfcs of the underlyng hardware. However, they also present challengng certfcaton problems. The RTOS s a hghly crtcal component of the overall avoncs system and must be certfed to the hghest levels of assurance. In addton, new software ntegraton ssues have to be addressed such as ensurng that the processes that share common resources wll satsfy ther performance requrements. Schedulng and synchronzaton servces are among the most crtcal servces an RTOS must provde. These servces can be partcularly subtle, and t s dffcult to obtan strong evdence that they wll perform properly n all crcumstances. Testng and nspecton are not suffcent for ths purpose. Asde from the pure problem of showng that the RTOS behaves as expected, a second ssue s to determne whether an applcaton that reles on the schedulng dscplne and uses the communcaton servces provded by the RTOS satsfes ts tmng requrements. A well-establshed theory of real-tme schedulng does exst, that should provde a sound foundaton to the development and valdaton of real-tme system. Yet, the abundant theoretcal work may not by tself provde the degree of assurance requred n safety-crtcal domans such as avoncs. The lterature has tradtonally reled on nformal approaches, and proofs often rely more on ntutve explanatons than precse, rgorous arguments. Snce the problems are complex and subtle, there are examples of erroneous results and flawed proofs n the lterature. In addton, real operatng systems are often rcher and more complex than consdered n the lterature. In ntegrated avoncs, RTOS must provde strong parttonng guarantees to prevent nterference between processes sharng common hardware resources. Complex systems relyng on faulttolerant rate-monotonc schedulng are beng bult [1] or kernels employng a nontrval mxng of statc and prorty-based schedulng are beng consdered [2]. The general theory rarely apples drectly but often has to be adapted to a specfc context. We examne how formal methods can help address these ssues. Formal methods can be used to develop very precse, complete, and rgorous proofs that theoretcal results are correct and properly appled to a partcular context. Formal modelng and verfcaton can provde very strong evdence that an RTOS satsfes crtcal schedulng and synchronzaton propertes. As an llustraton, we dscuss the formalzaton and verfcaton of the prorty-celng protocol [3], a schedulng and synchronzaton protocol used n common real-tme operatng systems. We then dscuss extensons of ths work to more complex types of kernels and the benefts of formal methods n real-tme schedulng problems. Real-Tme Schedulng Issues n Safety-Crtcal Applcatons In tradtonal real-tme systems, an applcaton s decomposed nto a set of processes or tasks that run concurrently on one of more processors. A schedulng polcy determnes how the processng resources are shared between the dfferent tasks. Typcal RTOSs use fxed-prorty preemptve schedulng: each task s assgned a fxed prorty, and, at all tme, the task of hghest prorty that s ready to execute s allocated the processor. Other polces are also possble, such as earlest-deadlnefrst schedulng, table-drven schedulng, or other more complex schemes. The fundamental problem n ths context s to determne condtons under whch a gven set of 1

2 tasks satsfes ts tmng requrements. Many theoretcal results provde such guarantees for dfferent classes of systems, relyng on dfferent schedulng polces, and wth dfferent assumptons about tasks and tmng constrants. In partcular, fxed-prorty preemptve schedulng has been extensvely studed and schedulablty results are known for many types of task sets and tmng constrants. A smple stuaton s when the tasks are ndependent and perodc. In such a case, n tasks τ 1,,τ n are each characterzed by a computaton cost C and a perod T. Task τ s actvated at successve tmes t0, t0 + T, t0 + 2T, and so forth, and each nvocaton must termnate wthn a oneperod nterval. In other words, τ must be allocated a total amount of C tme unts of processng tme n every nterval [ t 0 + kt, t0 + kt + T ). In fxedprorty schedulng, t s known that, under the ratemonotonc prorty assgnment 1, the problem s feasble f the followng condton s satsfed n = 1 C T n(2 1/ n 1). Lu and Layland proved ths property n 1973 [4]. They also establshed other mportant results, such as the fact that the rate-monotonc prorty assgnment s optmal. The condton above s based on a worst-case analyss and many task sets that do not satsfy the nequalty are stll feasble. A better analyss technque conssts of computng the worstcase response tme of a task. The procedure s sketched n Fgure 1, where H s the set of tasks of hgher prorty than τ. The sequence ( W ) s computed untl ether t converges to a fxed pont k W T or t reaches a value W that s greater than T. In the former case, every nvocaton of task τ s guaranteed to termnate wthn a delay W. In the latter case, τ cannot be guaranteed to meet ts deadlnes. The approach sketched n Fgure 1 (as well as other approaches) generalze to many other task models, ncludng models where tasks can communcate wth each other and where deadlnes k are dfferent from the task perods [5,6]. Wth such analyss technques, the theory of real-tme schedulng, especally n the fxed-prorty context, s now mature and applcable to real-world systems. W W 0 k+ 1 = C = C + j H W C j T j Fgure 1. Computng the Worst-Case Response Tme of a Task However, n safety-crtcal applcatons, hgh assurance s requred, and the followng ssues have to be examned: Whch guarantees do we have that the results publshed n the lterature are actually correct? Whch guarantees do we have that a gven RTOS actually satsfes the assumptons of an abstract schedulng model? Correctness Issues Although the theory of real-tme schedulng can be developed usng rgorous mathematcs, results are often presented less formally. The assumptons made are not always carefully specfed. The proofs are often mprecse and based on ntutve explanatons rather than rgorous arguments. As the problems are subtle and complex, there are examples of erroneous results, and ncomplete or flawed proofs n the lterature. Even Lu and Layland s essental results rely on many propertes that all look ntutvely reasonable but are not rgorously proven [4]. More precse proofs of the same results have been gven snce, but there s an obvous rsk n relyng on propertes whose proof s based on ther authors ntuton. Ths rsk s exacerbated when one moves away from the smplest schedulng models. In many systems that are relevant for avoncs, process schedulng nteracts wth other crtcal mechansms, such as those supportng nter-process communcaton, parttonng, or fault-tolerance. In such contexts, our ntuton s much more lkely to be wrong than n the basc, fxed-prorty model. k j 1 The tasks wth lower perod are gven hgher prorty. 2

3 For example, Ghosh et al. [7] present a schedulng approach ntended to tolerate transent faults by reexecutng faulty tasks. Generalzng Lu and Layland s results, they gve condtons under whch perodc tasks are feasble usng ths scheme. In a subsequent paper, the same authors found a flaw n ther ntal analyss and proposed a dfferent fault-tolerant schedulng scheme [8]. Unfortunately, as dscovered by Snha and Sur [9], ther analyss of the new scheme s also flawed; there are task sets that satsfy the condtons n Ghosh et al. [8], but where deadlnes are not met f a fault occurs. Ths example llustrates the dffculty of correctly analyzng complex schedulng polces usng only nformal models and proofs. It also shows that the nformal revew process used n academc research may fal to spot serous errors. The example s also very relevant to the avoncs communty snce the fault-tolerant schedulng scheme of Ghosh et al. has been mplemented n an RTOS specfcally desgned for avoncs applcatons [1]. (The approach mght work n ths case because the RTOS n queston only supports harmonc task sets.) Valdty of Models Most results n real-tme schedulng are developed usng very abstract scheduler models. Typcally, only a few assumptons are made about the scheduler, such as whch job s actve when several are ready to execute. To apply theoretcal results n crtcal applcatons, one needs to ensure that the relevant assumptons are satsfed by the system at hand. Ths can be dffcult as there s usually a large gap between the abstract models used to derve schedulng results and the real schedulng algorthms used n an RTOS. Part of the dffcultes s due to the complex nteracton between schedulng and other servces provded by the RTOS. As a mnmum, nter-process communcaton requres synchronzaton servces that may cause a process to wat and be delayed by other processes. Other features of an RTOS, such as nterrupt handlng or ts clock frequency also have an mpact on task executon. Because of fault-tolerance requrements, RTOS for crtcal applcatons may also provde features, such as temporal parttonng [2], that mpose constrants on how a processng tme s allocated to tasks. Such systems do not follow exactly the smple prorty-based allocaton polcy that s the most commonly studed n theory. Furthermore, because of lmtatons of the smple approaches, more complex schedulng strateges are beng proposed. For example, maxmal-urgencyfrst schedulng [10] s a complex combnaton of prorty-based and deadlne-based schedulng. The approach ntends to ensure that crtcal tasks never mss a deadlne, whle achevng hgh processor utlzaton. Ths new approach has undenable performance advantages over more classc schedulng strateges and may be adopted by practcal systems, but t s also more complex to mplement and to analyze. To the best of our knowledge, ths approach has been evaluated only emprcally [10,11]. Even though many types of schedulng dscplnes and task sets have been nvestgated theoretcally, real systems may not always match any of the theoretcal models. Stll, the lterature provdes general analyss methodologes that can often be adapted to new contexts. The problem s to obtan hgh assurance that such general methods have been properly appled to the gven system. A Formal Analyss Methodology for Real-Tme Schedulng The lterature on real-tme schedulng contans many results that should provde sound bases for the engneerng of real-tme systems. For such results to be appled n safety-crtcal applcatons, one must obtan very hgh confdence that they are correct. Furthermore, as new schedulng strateges are ntroduced, there s a need for rapdly adaptng schedulng results to complex systems that do not necessarly match tradtonal models. As dscussed prevously, very rgorous approaches are necessary to catch potental errors or omssons n models and n proofs. Formal methods and tool-asssted verfcaton can provde the requred degree of precson and rgor, and as dscussed n the sequel, can be appled effectvely to nontrval examples. We propose a general methodology for modelng real-tme schedulers, provng that they satsfy crtcal propertes, and dervng schedulng propertes for dfferent types of tasks. Our objectve s an approach that supports 3

4 both the verfcaton of qualtatve propertes related to synchronzaton (e.g., the absence of deadlocks) and the dervaton of hgh-level real-tme results (e.g., condtons under whch deadlnes are met). To support the approach, we use the PVS theorem prover [12]. In partcular, we have developed a large lbrary of basc notons and results that are useful for modelng systems and verfyng hgh-level schedulng propertes. Ths PVS lbrary also ntroduces the basc concepts that are central to real-tme schedulng analyss. Applcaton to a specfc schedulng protocol conssts of buldng a state-machne model of the scheduler, examnng the executon traces of ths model, and relatng these traces to the basc notons and results provded by the lbrary. Support for Tmng Analyss Although schedulng algorthm can vary a lot, many generc notons and basc facts are useful for reasonng about dfferent approaches. The lterature also provdes some general analyss technques, such as computng worst-case response tmes, that are applcable n many contexts. To take advantage of these exstng results, we have developed a lbrary of PVS theores that formalze and prove many useful propertes. The lbrary s based on the basc concept of a dscrete-tme abstract schedule that represents the allocaton of a sngle resource (e.g., a processor) to dfferent jobs. Gven a set of jobs J, a schedule s an nfnte sequence u = u, u1,, u, 0 t where u t ndcates whch job, f any, owns the resource at tme t. Ether u t = j and j J s the job that s actve at tme t, or u t = f there s no job actve at that tme. Analyss of tmng propertes can then be based on measurng how much tme has been allocated to a partcular job or sets of jobs durng. Gven a set E J, the PVS functon process_tme(u, t1, t2, E) gves the amount of tme allocated to jobs of E n the nterval [ t 1, t2 ). A smlar functon gves the amount of dle tme n an nterval. These basc notons and ther propertes are mplctly used n many theoretcal works on real-tme schedulng. A set of PVS theores contans many useful propertes of these basc functons. Another part of our PVS lbrares ntroduces results that support tmng analyss va the computaton of worst-case response tmes. For example, we have formalzed n PVS a generalzaton of the algorthm descrbed n Fgure 1. These results are very useful snce they can be appled n general contexts. In partcular they are applcable to many prorty-based preemptve schemes. Modelng Schedulers To apply the results from the lbrary to a partcular system, the frst step s to buld a model of the schedulng algorthm used. A natural approach s to use state-machne models. Such models have the advantage of provdng operatonal specfcatons and are easy to understand, thus reducng the gap between mplementaton and model. There are also well-known verfcaton technques (some of whch can be fully automated) for provng propertes of such automata-based models. It s also mportant for our purpose to obtan models that convenently support tmng analyss. Snce tmng results depend as much on task characterstcs as on scheduler propertes, we need the ablty to ntroduce assumptons about sets of tasks. A common approach s to decompose a task nto a successon of jobs, each job beng characterzed by attrbutes such as ts dspatch tme and duraton. Tmng characterstcs of tasks can then be specfed as constrants on the length of jobs and the delays between successve jobs. Our modelng approach follows the same general prncples. We buld a state-machne model that s parameterzed by a fxed but arbtrary collecton of jobs. All the job attrbutes are assumed fxed and known n advance to smplfy the modelng. To obtan general models, we assume as lttle as possble about the jobs. Ths allows us to obtan results that are vald for very general classes of jobs and then largely ndependent of the type of tasks consdered. For example, synchronzaton propertes that are vald whatever the task characterstcs can be establshed n ths way. 4

5 For obtanng hgher-level schedulng results that depend on the tmng characterstcs of tasks, the general models can be specalzed by restrctng attenton to jobs that satsfy certan propertes. Ths amounts to nstantatng the state-machne model wth specfc parameters that satsfy adequate assumptons. Analyss of these specalzed nstances can stll rely on the propertes that are nherted from the generc model. From State Machnes to Abstract Schedules Once a state-machne specfcaton s constructed, we can study ts real-tme propertes by examnng ts executon traces. More precsely, the state-machne model s parameterzed by a set of jobs J wth attrbutes such as ther startng tme, ther prorty, and ther duraton. The traces of the machne are sequences of state-transtons performed by the system for ths partcular set of jobs. From such traces, t s trval to construct abstract schedules that can be analyzed usng the support lbrary. As prevously, tmng propertes can be very general or vald only for specal nstances of the job parameters that satsfy relevant assumptons. An Example: The Prorty-Celng Protocol We have performed a full PVS formalzaton and verfcaton of a nontrval schedulng algorthm. Ths shows that precse and rgorous analyss of farly complex schedulng approaches can be performed wth modern theorem provers. Our case study was the prorty-celng protocol, ntroduced by Sha et al. [3]. Ths protocol s a synchronzaton algorthm for real-tme systems that employ fxed-prorty preemptve schedulng. In ts basc form, the protocol s used to control access to common resources, such as shared varables or I/O devces, n mono-processor systems. Access to crtcal sectons s controlled va bnary semaphores. Ths protocol has many nterestng propertes: t ensures mutual excluson and absence of deadlocks, and t guarantees that blockng delays are mnmal. The latter property s essental n realtme applcatons. It means that a process P requestng access to a resource S wll wat only for a bounded tme before S becomes avalable. The protocol s also mportant n practce: the prortycelng protocol or one of ts varant s used n most commercal RTOSs. As s often the case n the lterature, the descrpton of the protocol gven by ts authors s qute nformal and mprecse. The key propertes are also proved n a farly nformal manner. As the protocol s subtle and reles on complex prortyadjustment rules, an nformal specfcaton s open to msnterpretaton. The prorty-adjustment rules and the nteractons between mutual excluson and schedulng make the detals of the protocol dffcult to understand and qute challengng to verfy. Our objectve was to develop complete and precse specfcatons of the protocol, and obtan rgorous proofs that the assocated results are vald. We wanted to prove both key synchronzaton propertes such as mutual excluson and absence of deadlocks, and sgnfcant schedulablty results. Detals of the PVS developments and verfcatons are avalable elsewhere [13]. We used the general methodology descrbed prevously: We constructed a parameterzed state-machne model of the prorty-celng protocol that specfes how semaphores are allocated to jobs and how jobs can be actvated n a gven state. We then proved that all reachable states of the protocol satsfy nvarant propertes that ensure mutual excluson, absence of deadlocks, and mply that at most one job can block another. The proofs use standard technques based on nducton. In a second step, we examned the executon traces and schedules that the protocol model can produce. From the basc state-nvarant propertes, we obtaned general bounds on blockng delays and on the processng tme allocated to jobs. These propertes are vald for arbtrary collectons of jobs and are the bass for further schedulng analyss. The proofs used the noton of schedules and the varous results developed n the support lbrary. We then appled the general results to derve a well-known schedulablty crteron for sporadc tasks [5,6]. A sporadc task can be thought of as a sequence of jobs of the same prorty, separated by a mnmal nterarrval delay. Sporadc tasks are useful for modelng both strctly perodc computatons and nterrupt-drven actvtes wth a 5

6 lmted nterrupt frequency. Knowng bounds on the length of each job of a task and the length of crtcal sectons of other jobs, one can compute the worstcase response tme for jobs of a task τ, usng an teratve algorthm smlar to the one of Fgure 1. From ths worst-case executon tme, t s easy to determne f a task meet ts deadlnes. The case study shows that a full formal specfcaton and verfcaton of nontrval schedulng mechansms and propertes s feasble. In the same framework, we establshed both lowlevel synchronzaton propertes and hgh-level schedulablty propertes. All the developments were performed wth tool support, usng the PVS specfcaton and verfcaton system. Ths provdes very hgh assurance of correctness and ensures a complete and rgorous analyss. The whole PVS formalzaton requred between two and three person months of effort, part of whch was spent on developng the general support lbrares. The formalzaton contans 417 lemmas and theorems, for around 2500 lnes of specfcatons. The support lbrary and other reusable results that are ndependent of the prorty-celng protocol represent around 40% of the developments (1000 lnes). In addton to gvng very strong evdence that the protocol and the assocated schedulng test are correct, the formalzaton also provded other useful nsghts: Our specfcaton of the protocol s more precse and smpler than the tradtonal nformal descrpton. In partcular, the protocol can be entrely specfed wthout any prorty adjustment by usng a slghtly modfed rule for selectng actve jobs. Ths may pont to new ways of mplementng the protocol and was essental for smplfyng the verfcaton. Some new results emerged from the analyss, such as the fact that the protocol works under weaker assumptons than orgnally made by ts authors. Sha et al. assume that crtcal secton are properly nested [3], but ths requrement s actually unnecessary. All the mportant propertes are satsfed even f crtcal sectons overlap. Our PVS proof of the schedulablty result for sporadc tasks s based on the noton of busy perods, but s smpler and more drect than the classc proofs. Many nformal proofs of smlar results refer to Lu and Layland s theorem 1, whch states that the worst-case response tme for a task τ occurs when all tasks of hgher prorty than τ are dspatched at the same tme as τ [4]. The worst-case scenaro s then when all tasks are released at the same tme, called a crtcal nstant. Informal proofs are usually based on fndng the worst-case scenaro for a gven context and determnng response tmes n ths worst case. However, provng that the dentfed scenaro s actually the worst possble case can be dffcult 2. Our proof shows that lookng for such worst-case scenaros s actually an unnecessary detour. Concluson A sound theory of real-tme schedulng s necessary to support the engneerng of real-tme software applcatons. Developng schedulng results usng formal methods helps provde the hgh level of assurance requred n safety-crtcal domans. We propose a formalzaton methodology relyng on state-machne models and on a lbrary of commonly applcable propertes. A case study has shown that rgorous and a detaled verfcaton of nontrval schedulng results can be performed wthn reasonable tme lmts, usng modern theorem-provng tools such as PVS. It s stll necessary to develop and extend such verfcaton efforts to the ncreasngly complex schedulng algorthms that may one day be used n safety-crtcal applcatons. Other aspects relevant to the avoncs doman reman nsuffcently explored by the formal methods communty. For example, lttle has been done n the analyss of dstrbuted real-tme systems, where dffcult problems mxng communcaton, processng, faulttolerance must be addressed. Formal methods are especally valuable n such complex settngs, where nformal proofs guded by ntuton are nsuffcent and where other valdaton approaches such as testng are ncomplete. Formal methods should become an essental tool for valdatng the most crtcal aspects of real-tme systems, such as the 2 The proof of theorem 1 gven by Lu and Layland s partcularly unconvncng. 6

7 parttonng mechansms requred for fault solaton n ntegrated avoncs. Real-tme schedulng problems are an deal applcaton area for formal methods snce they are subtle and complex, must be certfed to the hghest degrees of assurance for supportng crtcal applcatons, and thus requre very precse, detaled, and rgorous verfcaton. Acknowledgements The work descrbed n ths paper was partally funded by the Defense Advanced Research Project Agency and by the Ar Force Research Laboratory under contract F C References [1] Dong, Lbn, et al., 1999, Implementaton of a Transent-Fault-Tolerance Scheme on DEOS, In Proceedngs of the Real-Tme Technology and Applcaton Symposum (RTAS), Vancouver, Canada. [2] ARINC Specfcaton 653, Avoncs Applcaton Software Interface, Annapols, MD. [3] Sha, L., R. Rakjumar, and J. P. Lehoczky, 1990, Prorty Inhertance Protocols: An Approach to Real-Tme Synchronzaton, IEEE Transactons on Computers, Vol. 39, No. 9, pp [4] Lu, C. L. and James W. Layland, 1973, Schedulng Algorthms for Multprogrammng n a Hard-Real-Tme Envronment, Journal of the ACM, Vol. 20, No 1, pp [5] Audsley, N. C., A. Burns, M. F. Rchardson, and A. J. Wellngs, 1991, Hard Real-Tme Schedulng: The Deadlne Monotonc Approach, Proceedngs of the 8 th IEEE Workshop on Real-Tme Operatng Systems and Software, Atlanta, GA, pp [6] Sha, L., R. Rajkumar, and S. Sathaye, 1994, Generalzed Rate-Monotonc Schedulng Theory: A Framework for Developng Real-Tme Systems, Proceedngs of the IEEE, Vol. 82, No. 1, pp [7] Ghosh, S., R. Melhem, and D. Mossé, 1997, Fault-Tolerant Rate-Monotonc Schedulng, In Dependable Computng for Crtcal Applcatons (DCCA-6), IEEE Computer Socety. [8] Ghosh, S., R. Melhem, D. Mossé, and J. Sarma, 1998, Fault-Tolerant Rate-Monotonc Schedulng, Real-Tme Systems, Vol. 15, Kluwer Academc Publsher, pp [9] Snha, P. and N. Sur, 1999, On the Use of Formal Technques for Analyzng Dependable Real-Tme Protocols, In Proceedngs of the 20 th IEEE Real-Tme Systems Symposum (RTSS-99), Phoenx, AZ. [10] Steward, D. and P. Khosla, 1991, Real-Tme Schedulng of Sensor-Based Control Systems, Proceedngs of the 8 th IEEE Workshop on Real- Tme Operatng Systems and Software, Atlanta, GA, pp [11] Gll, C., D. Levne, and D. Schmdt, 2000, The Desgn and Performance of a Real-Tme CORBA Schedulng Servce, Internatonal Journal of Tme- Crtcal Computng Systems, Specal Issue on Real- Tme Mddleware, [12] Owre, S., J. Rushby, N. Shankar, and F. von Henke, 1995, Formal Verfcaton for Fault- Tolerant Archtectures: Prolegomena to the Desgn of PVS, IEEE Transactons on Software Engneerng, Vol. 21, No 2, pp [13] Dutertre, B., 1999, The Prorty-Celng Protocol: Formalzaton and Analyss usng PVS, Techncal Report, System Desgn Laboratory, SRI Internatonal, 7

Real-Time Process Scheduling

Real-Time Process Scheduling Real-Tme Process Schedulng [email protected] (Real-Tme and Embedded Systems Laboratory) Independent Process Schedulng Processes share nothng but CPU Papers for dscussons: C.L. Lu and James. W. Layland,

More information

Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process

Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process Dsadvantages of cyclc TDDB47 Real Tme Systems Manual scheduler constructon Cannot deal wth any runtme changes What happens f we add a task to the set? Real-Tme Systems Laboratory Department of Computer

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Activity Scheduling for Cost-Time Investment Optimization in Project Management

Activity Scheduling for Cost-Time Investment Optimization in Project Management PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.

More information

Schedulability Bound of Weighted Round Robin Schedulers for Hard Real-Time Systems

Schedulability Bound of Weighted Round Robin Schedulers for Hard Real-Time Systems Schedulablty Bound of Weghted Round Robn Schedulers for Hard Real-Tme Systems Janja Wu, Jyh-Charn Lu, and We Zhao Department of Computer Scence, Texas A&M Unversty {janjaw, lu, zhao}@cs.tamu.edu Abstract

More information

Checkng and Testng in Nokia RMS Process

Checkng and Testng in Nokia RMS Process An Integrated Schedulng Mechansm for Fault-Tolerant Modular Avoncs Systems Yann-Hang Lee Mohamed Youns Jeff Zhou CISE Department Unversty of Florda Ganesvlle, FL 326 [email protected] Advanced System Technology

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Multi-Resource Fair Allocation in Heterogeneous Cloud Computing Systems

Multi-Resource Fair Allocation in Heterogeneous Cloud Computing Systems 1 Mult-Resource Far Allocaton n Heterogeneous Cloud Computng Systems We Wang, Student Member, IEEE, Ben Lang, Senor Member, IEEE, Baochun L, Senor Member, IEEE Abstract We study the mult-resource allocaton

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE [email protected] Abstract: Durng a computer conference, users desre

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently. Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop IWFMS: An Internal Workflow Management System/Optmzer for Hadoop Lan Lu, Yao Shen Department of Computer Scence and Engneerng Shangha JaoTong Unversty Shangha, Chna [email protected], [email protected]

More information

Power Low Modified Dual Priority in Hard Real Time Systems with Resource Requirements

Power Low Modified Dual Priority in Hard Real Time Systems with Resource Requirements Power Low Modfed Dual Prorty n Hard Real Tme Systems wth Resource Requrements M.Angels Moncusí, Alex Arenas {amoncus,aarenas}@etse.urv.es Dpt d'engnyera Informàtca Matemàtques Unverstat Rovra Vrgl Campus

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

On the Interaction between Load Balancing and Speed Scaling

On the Interaction between Load Balancing and Speed Scaling On the Interacton between Load Balancng and Speed Scalng Ljun Chen, Na L and Steven H. Low Engneerng & Appled Scence Dvson, Calforna Insttute of Technology, USA Abstract Speed scalng has been wdely adopted

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School Robust Desgn of Publc Storage Warehouses Yemng (Yale) Gong EMLYON Busness School Rene de Koster Rotterdam school of management, Erasmus Unversty Abstract We apply robust optmzaton and revenue management

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT Chapter 4 ECOOMIC DISATCH AD UIT COMMITMET ITRODUCTIO A power system has several power plants. Each power plant has several generatng unts. At any pont of tme, the total load n the system s met by the

More information

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA ) February 17, 2011 Andrew J. Hatnay [email protected] Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs

More information

Overview of monitoring and evaluation

Overview of monitoring and evaluation 540 Toolkt to Combat Traffckng n Persons Tool 10.1 Overvew of montorng and evaluaton Overvew Ths tool brefly descrbes both montorng and evaluaton, and the dstncton between the two. What s montorng? Montorng

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

An Analysis of Task Scheduling for a Generic Avionics Mission Computer

An Analysis of Task Scheduling for a Generic Avionics Mission Computer An Analyss of ask chedulng for a Generc Avoncs sson Computer. B. Dodd Ar Operatons Dvson Defence cence and echnology Organsaton DO-N-69 ABAC ask schedulng s nvestgated for a set of generc tasks representatve

More information

Descriptive Models. Cluster Analysis. Example. General Applications of Clustering. Examples of Clustering Applications

Descriptive Models. Cluster Analysis. Example. General Applications of Clustering. Examples of Clustering Applications CMSC828G Prncples of Data Mnng Lecture #9 Today s Readng: HMS, chapter 9 Today s Lecture: Descrptve Modelng Clusterng Algorthms Descrptve Models model presents the man features of the data, a global summary

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal [email protected] Peter Möhl, PTV AG,

More information

QoS-based Scheduling of Workflow Applications on Service Grids

QoS-based Scheduling of Workflow Applications on Service Grids QoS-based Schedulng of Workflow Applcatons on Servce Grds Ja Yu, Rakumar Buyya and Chen Khong Tham Grd Computng and Dstrbuted System Laboratory Dept. of Computer Scence and Software Engneerng The Unversty

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

The Load Balancing of Database Allocation in the Cloud

The Load Balancing of Database Allocation in the Cloud , March 3-5, 23, Hong Kong The Load Balancng of Database Allocaton n the Cloud Yu-lung Lo and Mn-Shan La Abstract Each database host n the cloud platform often has to servce more than one database applcaton

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

v a 1 b 1 i, a 2 b 2 i,..., a n b n i.

v a 1 b 1 i, a 2 b 2 i,..., a n b n i. SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE

More information

Optimal resource capacity management for stochastic networks

Optimal resource capacity management for stochastic networks Submtted for publcaton. Optmal resource capacty management for stochastc networks A.B. Deker H. Mlton Stewart School of ISyE, Georga Insttute of Technology, Atlanta, GA 30332, [email protected]

More information

Enterprise Master Patient Index

Enterprise Master Patient Index Enterprse Master Patent Index Healthcare data are captured n many dfferent settngs such as hosptals, clncs, labs, and physcan offces. Accordng to a report by the CDC, patents n the Unted States made an

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

QoS in the Linux Operating System. Technical Report

QoS in the Linux Operating System. Technical Report Unverstät Karlsruhe (H) Insttut für elematk QoS n the Lnux Operatng System echncal Report Marc Bechler and Hartmut Rtter Insttut für elematk Fakultät für Informatk Unverstät Karlsruhe (H) E-Mal: [mbechler

More information

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1. HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher

More information

On the Interaction between Load Balancing and Speed Scaling

On the Interaction between Load Balancing and Speed Scaling On the Interacton between Load Balancng and Speed Scalng Ljun Chen and Na L Abstract Speed scalng has been wdely adopted n computer and communcaton systems, n partcular, to reduce energy consumpton. An

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve

More information

An Empirical Study of Search Engine Advertising Effectiveness

An Empirical Study of Search Engine Advertising Effectiveness An Emprcal Study of Search Engne Advertsng Effectveness Sanjog Msra, Smon School of Busness Unversty of Rochester Edeal Pnker, Smon School of Busness Unversty of Rochester Alan Rmm-Kaufman, Rmm-Kaufman

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

A generalized hierarchical fair service curve algorithm for high network utilization and link-sharing

A generalized hierarchical fair service curve algorithm for high network utilization and link-sharing Computer Networks 43 (2003) 669 694 www.elsever.com/locate/comnet A generalzed herarchcal far servce curve algorthm for hgh network utlzaton and lnk-sharng Khyun Pyun *, Junehwa Song, Heung-Kyu Lee Department

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

A Probabilistic Theory of Coherence

A Probabilistic Theory of Coherence A Probablstc Theory of Coherence BRANDEN FITELSON. The Coherence Measure C Let E be a set of n propostons E,..., E n. We seek a probablstc measure C(E) of the degree of coherence of E. Intutvely, we want

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

8 Algorithm for Binary Searching in Trees

8 Algorithm for Binary Searching in Trees 8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the

More information

Dynamic Scheduling of Emergency Department Resources

Dynamic Scheduling of Emergency Department Resources Dynamc Schedulng of Emergency Department Resources Junchao Xao Laboratory for Internet Software Technologes, Insttute of Software, Chnese Academy of Scences P.O.Box 8718, No. 4 South Fourth Street, Zhong

More information

Risk Model of Long-Term Production Scheduling in Open Pit Gold Mining

Risk Model of Long-Term Production Scheduling in Open Pit Gold Mining Rsk Model of Long-Term Producton Schedulng n Open Pt Gold Mnng R Halatchev 1 and P Lever 2 ABSTRACT Open pt gold mnng s an mportant sector of the Australan mnng ndustry. It uses large amounts of nvestments,

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems Jont Schedulng of Processng and Shuffle Phases n MapReduce Systems Fangfe Chen, Mural Kodalam, T. V. Lakshman Department of Computer Scence and Engneerng, The Penn State Unversty Bell Laboratores, Alcatel-Lucent

More information

An ILP Formulation for Task Mapping and Scheduling on Multi-core Architectures

An ILP Formulation for Task Mapping and Scheduling on Multi-core Architectures An ILP Formulaton for Task Mappng and Schedulng on Mult-core Archtectures Yng Y, We Han, Xn Zhao, Ahmet T. Erdogan and Tughrul Arslan Unversty of Ednburgh, The Kng's Buldngs, Mayfeld Road, Ednburgh, EH9

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

General Auction Mechanism for Search Advertising

General Auction Mechanism for Search Advertising General Aucton Mechansm for Search Advertsng Gagan Aggarwal S. Muthukrshnan Dávd Pál Martn Pál Keywords game theory, onlne auctons, stable matchngs ABSTRACT Internet search advertsng s often sold by an

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of

More information

Vembu StoreGrid Windows Client Installation Guide

Vembu StoreGrid Windows Client Installation Guide Ser v cepr ov dered t on Cl enti nst al l at ongu de W ndows Vembu StoreGrd Wndows Clent Installaton Gude Download the Wndows nstaller, VembuStoreGrd_4_2_0_SP_Clent_Only.exe To nstall StoreGrd clent on

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to [email protected] The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He [email protected] Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

Abstract. 260 Business Intelligence Journal July IDENTIFICATION OF DEMAND THROUGH STATISTICAL DISTRIBUTION MODELING FOR IMPROVED DEMAND FORECASTING

Abstract. 260 Business Intelligence Journal July IDENTIFICATION OF DEMAND THROUGH STATISTICAL DISTRIBUTION MODELING FOR IMPROVED DEMAND FORECASTING 260 Busness Intellgence Journal July IDENTIFICATION OF DEMAND THROUGH STATISTICAL DISTRIBUTION MODELING FOR IMPROVED DEMAND FORECASTING Murphy Choy Mchelle L.F. Cheong School of Informaton Systems, Sngapore

More information

Complex Service Provisioning in Collaborative Cloud Markets

Complex Service Provisioning in Collaborative Cloud Markets Melane Sebenhaar, Ulrch Lampe, Tm Lehrg, Sebastan Zöller, Stefan Schulte, Ralf Stenmetz: Complex Servce Provsonng n Collaboratve Cloud Markets. In: W. Abramowcz et al. (Eds.): Proceedngs of the 4th European

More information

Single and multiple stage classifiers implementing logistic discrimination

Single and multiple stage classifiers implementing logistic discrimination Sngle and multple stage classfers mplementng logstc dscrmnaton Hélo Radke Bttencourt 1 Dens Alter de Olvera Moraes 2 Vctor Haertel 2 1 Pontfíca Unversdade Católca do Ro Grande do Sul - PUCRS Av. Ipranga,

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

Towards Specialization of the Contract-Aware Software Development Process

Towards Specialization of the Contract-Aware Software Development Process Towards Specalzaton of the Contract-Aware Software Development Process Anna Derezńska, Przemysław Ołtarzewsk Insttute of Computer Scence, Warsaw Unversty of Technology, Nowowejska 5/9, 00-665 Warsaw, Poland

More information

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and

More information

A Programming Model for the Cloud Platform

A Programming Model for the Cloud Platform Internatonal Journal of Advanced Scence and Technology A Programmng Model for the Cloud Platform Xaodong Lu School of Computer Engneerng and Scence Shangha Unversty, Shangha 200072, Chna [email protected]

More information