Real-Time Process Scheduling

Size: px
Start display at page:

Download "Real-Time Process Scheduling"

Transcription

1 Real-Tme Process Schedulng (Real-Tme and Embedded Systems Laboratory) Independent Process Schedulng Processes share nothng but CPU Papers for dscussons: C.L. Lu and James. W. Layland, Schedulng Algorthms for Multprogrammng n a Hard Real-Tme Envronment, JACM, Vol. 20, No.1, January 1973, pp Major references: Aloysus K. Mok, Fundamental Desgn Problems of Dstrbuted Systems for the Hard Real-Tme Envronment, Ph.D. dssertaton, MIT, 1983 Te-We Kuo and Aloysus K, Mok, Incremental Reconfguraton and Load Adjustment n Adaptve Real-Tme Systems, IEEE Transactons on Computer, 1997, IEEE 12th Real-Tme System Symposum, 1991.

2 Motvaton: Studyng: 2 days per 4 days Playng Basketball: 1.5 days per 3 days Case 1: Playng basketball (or studyng) s more mportant! Case 2: Dong whatever s more urgent! Questons: Can we fnd an optmal scheduler, that always produces a feasble schedule, whenever t s possble to do so? What does optmal means? Can we fnd a quck schedulablty test for a set of processes? Is t smple and accurate? Processes whose perods are more harmoncally related s lkely to be schedulable? Why? More accurate schedulablty tests possble? Better system confguratons can be found? How do we model schedulng overheads, such as the cost of context swtchng?

3 Tentatve Assumptons: Processes are ndependent. Processes are all perodc. We wll show you how to model sporadc processes and solve ther schedulablty problem later. The deadlne of a request s ts next request tme. A scheduler conssts of a prorty assgnment polcy and a prorty-drven schedulng mechansm. The paper of the week: C.L. Lu and James. W. Layland, Schedulng Algorthms for Multprogrammng n a Hard Real-Tme Envronment, JACM, Vol. 20, No.1, January 1973, pp Defntons The response tme of a request for a process s the tme span between the request and the end of the response to that request. A crtcal nstant of a process s an nstant at whch a request of that process has the largest response tme. A crtcal tme zone for a process s the tme nterval between a crtcal nstant and the end of the response to the correspondng request of the process. A crtcal nterval for a process s the tme nterval between a crtcal nstant and the deadlne of the correspondng request of the process. An observaton: If a process can complete ts executon wthn ts crtcal nterval, t s schedulable at all tme!

4 Theorem 1 [LL73] A crtcal nstant for any process occurs whenever the process s requested smultaneously wth requests for all hgher prorty processes. Proof. Case 1: TL does not run at t. TH TL t Case 2: TL runs at t. Tme Tme TH TL t Tme Tme Rate Monotonc Schedulng The rate monotonc prorty assgnment (RMS) assgns processes prortes accordng to ther request rates. Theorem 2 [LL73] If a feasble fxed prorty assgnment exsts for some process set, then the rate monotonc prorty assgnment s feasble for that process set. Proof. Start the proof from = 1. Exchange the prortes of τ and τ +1 f ther prortes are out of RMS order. Hnt: before: HPC -1 + c +1 + c p p + 1 p + 1 p + 1 p + 1 mply HPC - 1 c + 1 c p p + p + p + p p => after: HPC -1 + floor(p +1 / p ) c + c +1 p +1 where HPC -1 = CPU tme consumed by {τ,..., τ -1 } = p c p j j 1

5 An RMS example: Two processes wth p1 = 4, p2 = 5, and c1 = 2, c2 = Tme An observaton: c2 can be ncreased based on the concept of crtcal nstant!! Defntons: The utlzaton factor of a process τ s c /p. The fracton of CPU tme spent n executng τ. The utlzaton factor of a set of m processes s U = m = 1 For a gven prorty assgnment, a process set fully utlzes the processor f the prorty assgnment s feasble for the set and f any ncrease n the run tme of any processes n the set wll make the prorty assgnment nfeasble. c p

6 The achevable utlzaton factor (least upper bound of utlzaton factor) of a schedulng polcy Ua s a real number such that for any process set T, U(T ) <= Ua mples the schedulablty of the process set T. Theorem 3[LL73] For a set of two processes wth a fxed prorty assgnment, the achevable utlzaton factor s Proof. 2(2 1/2 1) U C1 = P2 P1 * floor(p2/p1) The mnmum U occurs when 0 P1 P2 P1 & P2 = 1 & = 2 1/ 2 1 nfeasble schedules U = { process sets } feasble schedules wthout CPU fully utlzaton feasble schedules wth CPU fully utlzaton Let T be nfeasble but U(T) < Ua Create a feasble schedule T from such that the CPU s fully utlzed U(T ) < U(T) < Ua

7 Theorem 4 [LL73] For a set of m processes wth a fxed prorty order and the restrcton that the rato between any two request perods s less than 2, the achevable utlzaton factor s Proof. m(2 1/m 1) c 1 c m-1 0 p 1 p 2 p m-1 p m Tme Each process n { 1,, m-1 } executes twce wthn P m. Theorem 5 [LL73] For a set of m processes wth fxed prorty order, the achevable utlzaton factor s m(2 1/m 1) p m Proof. 1 If p m = q * p + r, q > 1, p 1 p 1 p 1 r then p = q * p and ncrease c m tll the process set fully utlzes the processor agan. (c m <= c m + c * (q 1)). U < U + [( q -1) c pm] + c p c p Show that U s reduced! or U U + c ( q -1)[ 1 ( qp + r) ( 1 qp ) ] An observaton: If a process set are fully harmoncally related, U = 100%; otherwse U -> ln2 -> 70%! q-1

8 Earlest Deadlne Frst The Earlest Deadlne Frst algorthm (EDF) assgns processes prortes accordng to the deadlnes of ther current request. An EDF example: Two processes wth p1 = 2, p2 = 7, and c1 = 1, c2 = Tme For a set of processes scheduled accordng to some schedulng algorthm, we say that an overflow occurs at tme t f t s the deadlne of an unfulflled request. Theorem 6[LL73] When the EDF algorthm s used to schedule a set of processes on a processor, there s no processor dle tme pror to an overflow. Proof. dle overflow Tme Tme 0 Θ overflow should happen earler. Tme

9 Theorem 7[LL73] For a gven set of m processes, the EDF algorthm s feasble f and only f U = (c 1 /p 1 ) + (c 2 /p 2 ) + + (c m /p m ) <= 1 The achevable utlzaton factor of the EDF algorthm s 100%.The EDF algorthm s an optmal dynamc prorty schedulng polcy n the sense that a process set s schedulable f ts CPU utlzaton s no larger than 100%. The achevable utlzaton factor of the RMS algorthm s about ln2. The RMS algorthm s an optmal fxed prorty schedulng polcy n the sense that f a process set s schedulable by some fxed prorty schedulng algorthm, then t s schedulable by the RMS algorthm. Another thought of the above results? Theorem For a set of m processes wth fxed prorty order, the th process s schedulable f j = 1 Can we extend Theorem 7 n the same way? No! What s the mplcaton? What s the prorty of a process not reflectng ts mportance/crtcalty properly n the real world? How far can we go from here? c p j j ( 2 1 / 1)

10 Bran Damage! Theorem Gven a set of m processes, t s schedulable by some fxed prorty scheduler f U 1. Proof. a tme slce a tme slce. Tme For every tme slce, τ receve a share of s c /p. Wthn p, τ receves c /p!! Schedulng Overheads Context Swtchng Needed ether when a process s preempted by another process, or when a process completes ts executon! Stack Dscplne If process A preempts process B, process A must complete before process B can resume. A B If t s obeyed, charge the cost of preempton (context swtchng cost) once to the preemptng process! B A B

11 Is there any other optmal dynamc prorty schedulng algorthm besde the EDF algorthm? The least slack tme algorthm (LST), whch assgns processes prortes nversely proportonal to ther slack tmes s also optmal f context swtchng cost can be gnored [Mok83]. The slack tme of a process s d(t) - t - c(t). d(t)-t d(t) t c(t) Proof. Swap the schedulng unts of processes out of LST order. An LST example: c1 = c2 = 2, p1 = p2 = 4 s1=2 s2=2 S1=2 S2=1 S1=1 S2= Summary: Defntons Crtcal nstant and crtcal nterval. Utlzaton factor, achevable utlzaton factor, and least upper bound of utlzaton factor. RMS and EDF. The achevable utlzaton factor of RMS and EDF are ln2 and 100%, respectvely. The propertes and applcatons of RMS and EDF. Modelng of context swtchng cost, stack dscplne, and the propertes of least slack tme (LST).

12 Process Synchronzaton (Real-Tme and Embedded Systems Laboratory) Alternatve Approaches (1) Fnd and adopt a suboptmal algorthms. Note that a scheduler derved by a schedulng algorthm shall guarantee the schedulablty of a process set. A suboptmal algorthm seems only for off-lne computatons. (Hard Real-Tme constrants) (2)Put as many restrctons on the use of the communcaton prmtves as t s deemed reasonable for programmng realtme systems and hope that the restrcted schedulng problem can be effcently solved. Qs: In general, nterprocess coordnaton by means of semaphores s far too unstructured for real-tme analyss. Shall we have a more abstract-level language construct or more structed usages of communcaton prmtves? Shall we provde a language construct for excluson and synchronzaton?

13 Process Synchronzaton Processes Mght Share Non-Preemptble Resources or Have Precedence Constrants! Papers for dscussons: L. Sha, R. Rajkumar, J.P. Lehoczky, Prorty Inhertance Protocols: An Approach to Real-Tme Synchronzaton, IEEE Transactons on Computers, A.K. Mok, The Desgn of Real-Tme Programmng Systems Based on Process Models, IEEE Real-Tme Systems Symposum, Dec Process Synchronzaton Motvaton Can we fnd an effcent way to analyze the schedulablty of a process set (systematcally)? What knds of restrctons on the use of communcaton prmtves are needed so as to effcently solve the restrcted schedulng problem? How can we control the prorty nverson problem? The lengths of crtcal sectons mght be qute dfferent.

14 The Prorty Inverson Problem Prorty Inverson: A phenomenon where a hgher-prorty process s forced to wat for the executon of a lower-prorty process. Example: blockng vs preempton lock S unlock S 1 Blocked! Approaches: No preempton of crtcal sectons s allowed! =>They must be short! If preempton may be allowed, what prorty we should assgn the executon of a crtcal secton? 3 lock S lock S many ntermedate prorty processes may preempt 1 Prorty Inhertance Protocols: An Approach to Real-Tme Synchronzaton L. Sha, R. Rajkumar, J.P. Lehoczky, IEEE Transactons on Computers, 1990.

15 Notatons and Assumptons Notaton: Z, j, k : the kth crtcal secton n job (process) J guarded by semaphore S j. P(S ) and V(S ) are ndvsble operatons wat and sgnal respectvely on the bnary semaphore S. Assumptons: Each shared data structure s guarded by a bnary semaphore. No job attempts to lock a semaphore that has already been locked. Locks on semaphores wll be released before or at the end of a job. A fxed set of jobs executes on a processor. The Basc Prorty Inhertance Protocol Prorty-Drven Schedulng The process whch has the hghest prorty among the ready processes s assgned the processor. Synchronzaton Process must obtan the lock on the semaphore guardng a crtcal secton before enters the crtcal secton. If obtans the requred lock, enters the correspondng crtcal secton ; otherwse, s blocked and sad to be blocked by the process holds the lock on the correspondng semaphore. Once exts a crtcal secton, unlocks the correspondng semaphore and makes ts blocked processes ready. Prorty Inhertance If a process blocks hgher prorty processes, nherts the hghest prorty of the process blocked by Prorty nhertance s transtve.

16 Blockng Propertes S 2 faces nhertance blockng S S lock S drect blockng Lemma 1 A semaphore S can be used to cause nhertance blockng to job J only f S s accessed by a job whch has a prorty lower than that of J and mght be accessed by a job whch has a prorty equal to or hgher than that of J. Propertes Lemma 2 A job J can be blocked by a lower prorty job J L only f J L has entered and remaned wthn a crtcal secton when J arrves. Lemma 3 A job J L can block a hgh prorty job J for at most the duraton of a crtcal secton regardless of the number of semaphores J and J L share.

17 Propertes Theorem 4 Under the basc prorty nhertance protocol, f there are n lower prorty jobs, a job J can be blocked for at most the duraton of n crtcal sectons. Lemma 5 A semaphore can be used by at most one lower prorty job s crtcal secton to block a hgher prorty process. Propertes Theorem 6 Under the basc prorty nhertance protocol, f there are m semaphores that can be used to block job J, then J can be blocked for at most the duraton of m crtcal sectons. Concerns: A chan of blockng s possble. A deadlock can be formed! 1 Request S 2 2 S2 3 S 1 Request S 1

18 The Prorty Celng Protocol The prorty celng of a semaphore s the prorty of the hghest prorty job that may lock the semaphore. The Basc Prorty Inhertance Protocol + Prorty Celng A job J may successfully lock a semaphore S f S s avalable, and the prorty of J s hgher than the hghest prorty celng of all semaphores currently locked by jobs other than J Prorty nhertance s transtve Example: Deadlock Avodance S 0 locked S 0 unlocked τ 0 τ 1 S 0 S 2 locked blocked by S 2 1 locked (attempt to lock S 1 ) S 1 S 1, S 2 S 2 unlocked S 1 S 1 unlocked S 1 locked S 1 unlocked τ 2 S 2 t 0 t 1 S 2 locked prorty nhertance S 2 S 2 S 1, S 2 S 2 t 2 t 3 t 4 t 5 t 6 t 7 t 8 Tme unlock S 2 and reset prorty

19 Example: Chan Blockng Avodance blocked by 2 (attempt to lock S 2 ) S 2 locked S 2 unlocked τ 0 τ 1 S 2 S 1 locked S blocked by 2 locked 2 (attempt to lock S 2 ) S 2 S 1, S 2 S 1 unlocked S 2 S 2 unlocked S 1 locked S 2 locked S 2 unlocked S 1 unlocked S τ 1 S 1 S 1, S 2 S 1, S 2 S 1 2 t 0 t 1 t 2 t 3 t 4 t 5 t 6 t 7 t 8 Tme Avodance blockng occurs! * Prce pad for deadlock avodance & chan blockng avodance! Propertes Lemma 7 A job J can be blocked by a lower prorty job J L only f the prorty of job J s no hgher than the hghest prorty celng of all the semaphores that are locked by job J L when J arrves. Lemma 8 Suppose that job J preempts job J j whch enters a crtcal secton. Under the prorty celng protocol, job J j cannot nhert a prorty level whch s hgher than or equal to that of J untl J completes.

20 Propertes Lemma 9 The prorty celng protocol prevents transtve blockngs. Proof. Follows Lemma 8. t 3 t 2 t 1 Theorem 10 The Prorty celng Protocol prevents deadlock. Proof. Lemma 9 shows that the number of jobs n the blockng cycle can only be 2. t2 t1 Propertes Lemma 11No job can be blocked for more than one crtcal secton of a lower prorty job J L. Proof. Follows Lemma 2 and Theorem 10. Theorem 12 No job can be blocked for more than one crtcal secton of any lower prorty job. Proof. Lemma 11 suggests that job J can only be blocked by n dfferent processes crtcal sectons f n > 1. The correctness of the proof them follows Lemma 7.

21 Propertes Theorem 15: A set of n perodc tasks under the prorty celng protocol can be scheduled by the rate monotonc algorthm f the followng condtons are satsfed:, 1 n, 1 cj c + B + ( 2 1/ 1) j= 1 pj p where B s the worst-case blockng tme for τ Proof. Consder B as an addtonal computaton requrement. Propertes B = Max crtcal secton β S = = τj β j, k { j j τj Pr( τ ) > Pr( τ ) & Max(Prorty - Celng( s)) Pr( τ )} s S { s Semaphore s s accesses by } j τj More accurate calculatons can be derved by consderng the relatonshp between crtcal sectons and ther correspondng semaphores.

22 Propertes Schedulablty Analyss Theorem 14 [Loc87] A set of n perodc tasks scheduled by the rate-monotonc algorthm wll meet all ther deadlnes (for all task phasngs) ff A, 1 n, mn ( k, l ) y j = 1 c j 1 lp = mn U ( k, l ) y j = 1 k j lp P k j P j lp lp k P j k 1 where P y = {(k, l) 1 k, l = 1,, P } k Propertes Schedulablty Analyss Another Thought: mn ( k, l ) y j = 1 c lp P j k j lp k 0 CPU requests of processes,, j are satsfed? 0 lp k P y = {(k, l) 1 k, l = 1,, P } k Check every request tme of processes,.e, lp k.

23 Propertes Schedulablty Analyss Theorem 16 A set of n perodc tasks usng the prorty celng protocol can be scheduled by the rate-monotonc algorthm for all task phasngs f A, 1 n, 1 + mn Pj lpk c B Uj + 1 k, l) y j= 1 lpk Pj lpk ( mn ( k, l ) y 1 j = 1 lp cj P k j + c + B lp k 0 Example Schedulablty Analyss block block 1 : C 1 = 40, P 1 = 100, B 1 = 20, U 1 = : C 2 = 40, P 2 = 150, B 2 = 30, U 2 = : C 3 = 100, P 3 = 350, B 3 = 0, U 3 = Apply Theorem 15. U 1 + B 1 / P 1 = = 0.6 < 1 U 2 + B 2 / P 2 + U 1 = = U = U 1 + U 2 + U 3 = s far too large!

24 Example Schedulablty Analyss 1. 1 y 1 = {(1, 1)} Apply Theorem 16. C 1 + B 1 P 1?? => < 100 schedulable! 2. 2 y 2 = {(1, 1), (2, 1)} C 1 + C 2 + B 2 P 1?? => > 100 2C 1 + C 2 + B 2 P 2?? => schedulable! 3. 3 y 3 = {(1, 1), (1, 2), (1, 3), (2, 1), (2, 2), (2, 3)} * B 3 = 0 C 1 + C 2 + C 3 P 1?? => > 100 2C 1 + 2C 2 + C 3 2P 1?? => > 200 3C 1 + 2C 2 + C 3 3P 1?? => C 1 + C 2 + C 3 P 2?? => > 150 3C 1 + 2C 2 + C 3 2P 2?? => schedulable! 4C 1 + 3C 2 + C 3 P 3?? => > 350 Other Issues Implementaton Consderatons Prorty Inhertance Protocol (PIP) Prorty queues: one for each semaphore P( ) & V( ) operatons must support prorty nhertance Prorty Celng Protocol (PCP) A sngle prorty queue avodance blockng A lst of blocked semaphores and ther respectve owners and celngs

25 Other Issues Other synchronzaton mechansms Montor (used for schedulng mutual excluson) Defne celng for each montor. Operatons on montors are executed n an order complyng wth PCP. Server-Clent Model Server runs at the lowest prorty unless t s servcng or requested by some clents. PCP s mplemented as usual, when servers are treated as montors! Other Issues ADA rendezvous Prorty queues: one per entry call. When there are multple entres for a server task, the server task must select the hghest prorty task watng on one of the entres. PCP s mplemented as usual.

26 Summary Defntons Crtcal nstant, crtcal nterval, achevable utlzaton factor Harmonc base, harmonc chan, adaptve process optmal scheduler, optmal partton of a process set, deferrable server, pollng RMS & EDF are optmal fxed-prorty & dynamcprorty schedulers, respectvely. RMS s stable, but EDF has a hgh achevable utlzaton factor. Process sets wth a smaller harmonc base tend to be more schedulable and have better achevable utlzaton factor. Summary Consder the trade-off between the mnmzaton of the prorty nverson problem & the maxmzaton of the concurrency level of a system. Consder the deas behnd the schedulablty tests of PCP. After all, we only have lmted peces of knowledge n predctng the schedulablty of a system. However, we begn to understand and fnd out better ways n allocatng resources for processes!

27 Process Synchronzaton Processes Mght Share Non-Preemptble Resources or Have Precedence Constrants! Papers for dscussons: L. Sha, R. Rajkumar, J.P. Lehoczky, Prorty Inhertance Protocols: An Approach to Real-Tme Synchronzaton, IEEE Transactons on Computers, A.K. Mok, The Desgn of Real-Tme Programmng Systems Based on Process Models, IEEE Real-Tme Systems Symposum, Dec The Desgn of Real-Tme Programmng Systems Based on Process Models A.K. Mok, IEEE Real-Tme Systems Symposum, Dec 1994.

28 Defntons A totally on-lne scheduler makes schedulng decsons ndependent from a pror knowledge of the future request-tmes of the processes. A run-tme scheduler s the code for allocatng resources n response to requests generated at run tme, e.g., tmer or external devce nterrupts. A run-tme scheduler s clarvoyant f t has an oracle whch can predct wth absolute certanty the future request tmes of all processes. A run-tme scheduler s optmal f t always generates a feasble schedule whenever t s possble for a clarvoyant scheduler to do so. Remark: Check defntons n prevous transparences. Theorem 2 [Mok84] When there are mutual excluson constrants, t s mpossble to fnd a totally on-lne optmal run-tme scheduler. Proof. Consder two mutually exclusve processes: s : c s =1, d s =1, p s =4 p : c p =2, d p =4, p p =4 Select the request tme of s to fal any totally on-lne optmal run-tme scheduler. Let p occur at tme 0, and s occur at tme 1. The result can be trvally generalzed to the cases of multprocessor by creatng a perodc process wth c = p for each addtonal processor.

29 Theorem 4 [Mok84] The problem of decdng whether t s possble to schedule a set of perodc processes whch use semaphores only to enforce mutual excluson s NPhard. Proof. A 3-partton problem: A = {a 1, a 2,, a 3m }, B a postve nteger, and w 1, w 2,, w 3m be ntegral weghts of elements of A respectvely such that B/4 w B/2, and the sum of w s equal to mb. The decson s whether A can be parttoned nto m dsjont sets such that each of whch has weght B. Create 3m processes, where the th process has computaton tme w, and perod (mb+m), deadlne (mb+m). In addton, we create a process 3m+1 wth perod (B+1), deadlne 1, and run-tme 1. The Determnstc Rendezvous Model The Prmary Purpose: Establsh precedence constrants between the schedulng blocks of processes. Issues: Rendezvous overheads Charge t n the schedulng blocks rght before the rendezvous. => Rendezvous can be preempted! No mutual excluson! Compatblty of processes that rendezvous wth each another. 1. Perodc processes Havng perods beng an exact multple of each another. 2. Otherwse Server s the made ready whenever t s needed.

30 Example EDF s not optmal for the process model Example: C 11 * = C 12 = 1, d 1 = 3, p 1 = 5 1 : C 21 * = 1, C 22 * = 3, d 2 = p 2 = 10 3 : C 3 = 1, d = 9, 3 p 3 = 10 2 : c 11 c 12 c 11 c 12 1 rendezvous rendezvous c 21 c 22 2 c 3 3 EDF c 11 c 21 c 12 c 13 c 22 c 11 c 22 C 12 fals! c 11 c 3 c 21 C 12 fals! Deadlne Modfcaton A deadlne-modfcaton technology Consder the computatons performed n the nterval [0, L] Sort the schedulng blocks generated n [0, L] n a reverse topologcal order. Set the deadlne of the kth nstant of j to (k-1) * p + d Revse the deadlnes n reverse topologcal order by the formula: d mn d, d c s s ( { }) s = s s s : Run-tme scheduler repeats the revsed deadlnes every L tme unts (L s the longest perod among processes that rendezvous wth each another.)

31 Deadlne Modfcaton Lemma 5 [Mok 84] The feasblty of an nstance of the process model s not volated by the above revsng technology. The technology wll not volate or damage the precedence constrants nvolvng any two processes. check the prevous example! Theorem 6 [Mok 84] If a feasble schedule exsts for an nstance of a process model restrcted by rendezvous constrants, then t can be scheduled by EDF modfed to schedule the ready process whch s not blocked by a rendezvous and whch has the nearest dynamc deadlne. Remarks: A pseudo-polynomal-tme approach s presented! The Kernelzed Montor Model Idea: Processes are gven processor tme n an unnterruptble quantum, say q. If sporadc processes are of length multple of q, and each q s treated as crtcal sectons, the process model s reduced to an ndependent process schedulng wth the provson that a process may be nterrupted only after t has receved an nteger number of q. Sporadc processes are called montors. EDF s stll not optmal!

32 The Kernelzed Montor Model An EDF Example: q = 2 1 : c 1 = 2, d 1 = 2, p 1 = 5 2 : c 21 = c 22 = 2, d 2 = p 2 = 10 τ 1 c 1 c 1 τ 2 forbdden regon?! c 21 c 22 c 1 c 21 c 22 c 1 fal How to fnd the forbdden regons n the nterval [0, L] where L s the longest perod among the compatble processes? ( L = LCM(p ) ) 1. Each process s consdered as a chan of mn schedulng blocks: each of whch s of a quantum. 2. Revse request tmes and deadlnes of the block. requesttme revsng deadlne revsng (1) Sort the blocks n [0, L] n a forward topologcal order. (2) Intalze the request tme of the kth nstance of each mn schedulng block of T to (k-1)*p. (3) Revse the request tmes n forward topologcal order by the formula: r s = Max(r s, {r s + q : s s}) (4) Sort the blocks n [0, L] n a reverse topologcal order. (5) Intalze the deadlne of the kth nstance of each mn schedulng block of T to (k-1)* p + d (6) Revse the deadlnes n reverse order by the followng formula: d s = Max(d s, {d s q : s s })

33 3. Compute the set of forbdden regons n [0, L] n the followng way: (1) Sort the request tmes n a reverse chronologcal order and determne the forbdden regon assocated wth each request tme as follows: Intally, there are no forbdden regons. (2) For each request tme r s and any deadlne d for whch L d d s, let n r,d be the number of mn blocks whch must be scheduled n [r s, d]. (r s r s and d s d) If S r,d s the latest tme at whch the frst mn blocks must be scheduled, (stack blocks close to each anothor from d) (I) S r,d < r s System fals (II) S r,d < r s + q (S r,d q, r s ) s a forbdden regon. (III) otherwse, no acton s taken! *Complexty: O(n) for each request tme There are no more than n forbdden regons when n s the number of mn schedulng blocks generated n [0, L] W = {(x, y ) : y s the revsed request-tme of some mn schedulng block n [0, L], and no process should start pass x before y } The kernelzed montor scheduler: At any tme t, f t does not le n a forbdden regon, the scheduler allocates the next quantum to the ready process whch s not blocked by a rendezvous and has the earlest deadlne. If t s n a forbdden regon, the process s allowed to be dle untl the end of regon. Theorem 7[Mok 84] If a feasble schedule exsts for a process set wth rendezvous and montor communcaton prmtves, the kernelzed montor scheduler can schedule t.

34 A Related Theorem Theorem [Mok, et al. 87] If EDF s appled to schedule a set of ndependent perodc processes whose utlzaton factor s not more than 1, and the scheduler s subject to restrcton that every process must be allowed to run for at least q tme unts before t can be preempted, then no process wll ever mss ts deadlne by more than q 1 tme unts. Schedulablty Test: Add q 1 tme unts to the computaton tme of each process & check the total utlzaton factor. Applcatons: Put conflctng resource accesses n the q-tme-unt code for applcatons based on dataflow graphs. Overload Detecton for Sporadc Processes A sporadc process s one whose request tmes are not known a pror. Model a sporadc process by a par (p, c, d) where c = computaton tme p = mnmum separaton tme between two nstances. d = deadlne How should we set the separaton parameter p for a sporadc process? It s a tradeoff. If p s too bg, we rsk havng two more requests wthn p tme unts. If p s set too small, we mght have large gaps between requests and waste CPU capacty.

35 Overload Detecton for Sporadc Processes Is there an analyss method to evaluate the hypothess of the choce of tmng parameters on system relablty? Theorem 1 [Baruah, Mok, Roser, RTSS90] A set T of n sporadc processes s not feasble ( or schedulable by EDF) f ether n c (1) or, p (2) = 1 t : t < mn P + max u 1 u { d }, max { p d } s.t. T fals at or before t, where P = lcm{ p } Overload Detecton for Sporadc Processes Defne h R n ( t) = c t d max{0, p = 1 + 1} T s feasble ff t h R ( t ) t Lemma 3 [Baruah, Mok, Roser, RTSS90] The mnmum t that fals the above formula s the earlest tme that the EDF algorthm can report a falure.

36 Modelng of Sporadc Processes Lemma 3[Mok, RTSS84]: Suppose we replace every sporadc process = (c, p, d ) wth a perodc process = (c', p', d' ) wth c' = c, p' = mn(p, (d c + 1)), and d' = c. If the result set of all perodc processes can be successfully scheduled, then the orgnal set of processes can be scheduled wthout a pror knowledge of the request tmes of the sporadc processes. Proof. p' = d c c d Tme Modelng of Sporadc Processes In general, we can replace each sporadc process = (c, p, d ) wth a perodc process ' = (c', p', d' ) f the followng condtons are satsfed: [Mok, RTSS84] (1) d d' c; (2) c' = c; (3) p' d - d' + 1 Proof. p' = d d' d' d Tme

37 Summary Defntons: totally on-lne scheduler, clarvoyant scheduler, optmal run-tme scheduler crtcal regon compatblty, rendezvous model montor model The dffculty n fndng a totally on-lne optmal runtme scheduler. The NP-hard nature of the problem n schedulng a set of perodc processes that use semaphores to enforce mutual excluson. EDF wth the deadlne-revsng technology for the determnstc rendezvous model. EDF wth forbdden regons technology for the kernelzed montor model.

Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process

Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process Dsadvantages of cyclc TDDB47 Real Tme Systems Manual scheduler constructon Cannot deal wth any runtme changes What happens f we add a task to the set? Real-Tme Systems Laboratory Department of Computer

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING FORMAL ANALYSIS FOR REAL-TIME SCHEDULING Bruno Dutertre and Vctora Stavrdou, SRI Internatonal, Menlo Park, CA Introducton In modern avoncs archtectures, applcaton software ncreasngly reles on servces provded

More information

Power Low Modified Dual Priority in Hard Real Time Systems with Resource Requirements

Power Low Modified Dual Priority in Hard Real Time Systems with Resource Requirements Power Low Modfed Dual Prorty n Hard Real Tme Systems wth Resource Requrements M.Angels Moncusí, Alex Arenas {amoncus,aarenas}@etse.urv.es Dpt d'engnyera Informàtca Matemàtques Unverstat Rovra Vrgl Campus

More information

Schedulability Bound of Weighted Round Robin Schedulers for Hard Real-Time Systems

Schedulability Bound of Weighted Round Robin Schedulers for Hard Real-Time Systems Schedulablty Bound of Weghted Round Robn Schedulers for Hard Real-Tme Systems Janja Wu, Jyh-Charn Lu, and We Zhao Department of Computer Scence, Texas A&M Unversty {janjaw, lu, zhao}@cs.tamu.edu Abstract

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

Checkng and Testng in Nokia RMS Process

Checkng and Testng in Nokia RMS Process An Integrated Schedulng Mechansm for Fault-Tolerant Modular Avoncs Systems Yann-Hang Lee Mohamed Youns Jeff Zhou CISE Department Unversty of Florda Ganesvlle, FL 326 [email protected] Advanced System Technology

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

QoS-based Scheduling of Workflow Applications on Service Grids

QoS-based Scheduling of Workflow Applications on Service Grids QoS-based Schedulng of Workflow Applcatons on Servce Grds Ja Yu, Rakumar Buyya and Chen Khong Tham Grd Computng and Dstrbuted System Laboratory Dept. of Computer Scence and Software Engneerng The Unversty

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

QoS in the Linux Operating System. Technical Report

QoS in the Linux Operating System. Technical Report Unverstät Karlsruhe (H) Insttut für elematk QoS n the Lnux Operatng System echncal Report Marc Bechler and Hartmut Rtter Insttut für elematk Fakultät für Informatk Unverstät Karlsruhe (H) E-Mal: [mbechler

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

8 Algorithm for Binary Searching in Trees

8 Algorithm for Binary Searching in Trees 8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal [email protected] Peter Möhl, PTV AG,

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

An Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks

An Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks An Adaptve Cross-layer Bandwdth Schedulng Strategy for the Speed-Senstve Strategy n erarchcal Cellular Networks Jong-Shn Chen #1, Me-Wen #2 Department of Informaton and Communcaton Engneerng ChaoYang Unversty

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

Availability-Based Path Selection and Network Vulnerability Assessment

Availability-Based Path Selection and Network Vulnerability Assessment Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl

More information

An MILP model for planning of batch plants operating in a campaign-mode

An MILP model for planning of batch plants operating in a campaign-mode An MILP model for plannng of batch plants operatng n a campagn-mode Yanna Fumero Insttuto de Desarrollo y Dseño CONICET UTN [email protected] Gabrela Corsano Insttuto de Desarrollo y Dseño

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. XX, MONTH 2XX 1 Effcent On-Demand Data Servce Delvery to Hgh-Speed Trans n Cellular/Infostaton Integrated Networks Hao Lang, Student Member,

More information

Multi-Resource Fair Allocation in Heterogeneous Cloud Computing Systems

Multi-Resource Fair Allocation in Heterogeneous Cloud Computing Systems 1 Mult-Resource Far Allocaton n Heterogeneous Cloud Computng Systems We Wang, Student Member, IEEE, Ben Lang, Senor Member, IEEE, Baochun L, Senor Member, IEEE Abstract We study the mult-resource allocaton

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE [email protected] Abstract: Durng a computer conference, users desre

More information

INSTITUT FÜR INFORMATIK

INSTITUT FÜR INFORMATIK INSTITUT FÜR INFORMATIK Schedulng jobs on unform processors revsted Klaus Jansen Chrstna Robene Bercht Nr. 1109 November 2011 ISSN 2192-6247 CHRISTIAN-ALBRECHTS-UNIVERSITÄT ZU KIEL Insttut für Informat

More information

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn

More information

An Analysis of Task Scheduling for a Generic Avionics Mission Computer

An Analysis of Task Scheduling for a Generic Avionics Mission Computer An Analyss of ask chedulng for a Generc Avoncs sson Computer. B. Dodd Ar Operatons Dvson Defence cence and echnology Organsaton DO-N-69 ABAC ask schedulng s nvestgated for a set of generc tasks representatve

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

J. Parallel Distrib. Comput. Environment-conscious scheduling of HPC applications on distributed Cloud-oriented data centers

J. Parallel Distrib. Comput. Environment-conscious scheduling of HPC applications on distributed Cloud-oriented data centers J. Parallel Dstrb. Comput. 71 (2011) 732 749 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. ournal homepage: www.elsever.com/locate/pdc Envronment-conscous schedulng of HPC applcatons

More information

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1. HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

General Auction Mechanism for Search Advertising

General Auction Mechanism for Search Advertising General Aucton Mechansm for Search Advertsng Gagan Aggarwal S. Muthukrshnan Dávd Pál Martn Pál Keywords game theory, onlne auctons, stable matchngs ABSTRACT Internet search advertsng s often sold by an

More information

Logical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem

Logical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME, ISSUE, FEBRUARY ISSN 77-866 Logcal Development Of Vogel s Approxmaton Method (LD- An Approach To Fnd Basc Feasble Soluton Of Transportaton

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

A generalized hierarchical fair service curve algorithm for high network utilization and link-sharing

A generalized hierarchical fair service curve algorithm for high network utilization and link-sharing Computer Networks 43 (2003) 669 694 www.elsever.com/locate/comnet A generalzed herarchcal far servce curve algorthm for hgh network utlzaton and lnk-sharng Khyun Pyun *, Junehwa Song, Heung-Kyu Lee Department

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to [email protected] The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

Relay Secrecy in Wireless Networks with Eavesdropper

Relay Secrecy in Wireless Networks with Eavesdropper Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,

More information

Computer Networks 55 (2011) 3503 3516. Contents lists available at ScienceDirect. Computer Networks. journal homepage: www.elsevier.

Computer Networks 55 (2011) 3503 3516. Contents lists available at ScienceDirect. Computer Networks. journal homepage: www.elsevier. Computer Networks 55 (2011) 3503 3516 Contents lsts avalable at ScenceDrect Computer Networks journal homepage: www.elsever.com/locate/comnet Bonded defct round robn schedulng for mult-channel networks

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

Generalizing the degree sequence problem

Generalizing the degree sequence problem Mddlebury College March 2009 Arzona State Unversty Dscrete Mathematcs Semnar The degree sequence problem Problem: Gven an nteger sequence d = (d 1,...,d n ) determne f there exsts a graph G wth d as ts

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Dominant Resource Fairness in Cloud Computing Systems with Heterogeneous Servers

Dominant Resource Fairness in Cloud Computing Systems with Heterogeneous Servers 1 Domnant Resource Farness n Cloud Computng Systems wth Heterogeneous Servers We Wang, Baochun L, Ben Lang Department of Electrcal and Computer Engneerng Unversty of Toronto arxv:138.83v1 [cs.dc] 1 Aug

More information

Dynamic Pricing for Smart Grid with Reinforcement Learning

Dynamic Pricing for Smart Grid with Reinforcement Learning Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada [email protected] Abstract Ths s a note to explan support vector machnes.

More information

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

Credit Limit Optimization (CLO) for Credit Cards

Credit Limit Optimization (CLO) for Credit Cards Credt Lmt Optmzaton (CLO) for Credt Cards Vay S. Desa CSCC IX, Ednburgh September 8, 2005 Copyrght 2003, SAS Insttute Inc. All rghts reserved. SAS Propretary Agenda Background Tradtonal approaches to credt

More information

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems Jont Schedulng of Processng and Shuffle Phases n MapReduce Systems Fangfe Chen, Mural Kodalam, T. V. Lakshman Department of Computer Scence and Engneerng, The Penn State Unversty Bell Laboratores, Alcatel-Lucent

More information

Vasicek s Model of Distribution of Losses in a Large, Homogeneous Portfolio

Vasicek s Model of Distribution of Losses in a Large, Homogeneous Portfolio Vascek s Model of Dstrbuton of Losses n a Large, Homogeneous Portfolo Stephen M Schaefer London Busness School Credt Rsk Electve Summer 2012 Vascek s Model Important method for calculatng dstrbuton of

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet

2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet 2008/8 An ntegrated model for warehouse and nventory plannng Géraldne Strack and Yves Pochet CORE Voe du Roman Pays 34 B-1348 Louvan-la-Neuve, Belgum. Tel (32 10) 47 43 04 Fax (32 10) 47 43 01 E-mal: [email protected]

More information

Cloud Auto-Scaling with Deadline and Budget Constraints

Cloud Auto-Scaling with Deadline and Budget Constraints Prelmnary verson. Fnal verson appears In Proceedngs of 11th ACM/IEEE Internatonal Conference on Grd Computng (Grd 21). Oct 25-28, 21. Brussels, Belgum. Cloud Auto-Scalng wth Deadlne and Budget Constrants

More information

Activity Scheduling for Cost-Time Investment Optimization in Project Management

Activity Scheduling for Cost-Time Investment Optimization in Project Management PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He [email protected] Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Implementation of Deutsch's Algorithm Using Mathcad

Implementation of Deutsch's Algorithm Using Mathcad Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"

More information

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT Chapter 4 ECOOMIC DISATCH AD UIT COMMITMET ITRODUCTIO A power system has several power plants. Each power plant has several generatng unts. At any pont of tme, the total load n the system s met by the

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

A Resource-trading Mechanism for Efficient Distribution of Large-volume Contents on Peer-to-Peer Networks

A Resource-trading Mechanism for Efficient Distribution of Large-volume Contents on Peer-to-Peer Networks A Resource-tradng Mechansm for Effcent Dstrbuton of Large-volume Contents on Peer-to-Peer Networks SmonG.M.Koo,C.S.GeorgeLee, Karthk Kannan School of Electrcal and Computer Engneerng Krannet School of

More information

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School Robust Desgn of Publc Storage Warehouses Yemng (Yale) Gong EMLYON Busness School Rene de Koster Rotterdam school of management, Erasmus Unversty Abstract We apply robust optmzaton and revenue management

More information

A New Paradigm for Load Balancing in Wireless Mesh Networks

A New Paradigm for Load Balancing in Wireless Mesh Networks A New Paradgm for Load Balancng n Wreless Mesh Networks Abstract: Obtanng maxmum throughput across a network or a mesh through optmal load balancng s known to be an NP-hard problem. Desgnng effcent load

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

VoIP over Multiple IEEE 802.11 Wireless LANs

VoIP over Multiple IEEE 802.11 Wireless LANs SUBMITTED TO IEEE TRANSACTIONS ON MOBILE COMPUTING 1 VoIP over Multple IEEE 80.11 Wreless LANs An Chan, Graduate Student Member, IEEE, Soung Chang Lew, Senor Member, IEEE Abstract IEEE 80.11 WLAN has hgh

More information

Simple Interest Loans (Section 5.1) :

Simple Interest Loans (Section 5.1) : Chapter 5 Fnance The frst part of ths revew wll explan the dfferent nterest and nvestment equatons you learned n secton 5.1 through 5.4 of your textbook and go through several examples. The second part

More information

Heuristic Static Load-Balancing Algorithm Applied to CESM

Heuristic Static Load-Balancing Algorithm Applied to CESM Heurstc Statc Load-Balancng Algorthm Appled to CESM 1 Yur Alexeev, 1 Sher Mckelson, 1 Sven Leyffer, 1 Robert Jacob, 2 Anthony Crag 1 Argonne Natonal Laboratory, 9700 S. Cass Avenue, Argonne, IL 60439,

More information

CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS

CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS Novella Bartoln 1, Imrch Chlamtac 2 1 Dpartmento d Informatca, Unverstà d Roma La Sapenza, Roma, Italy [email protected] 2 Center for Advanced

More information

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop IWFMS: An Internal Workflow Management System/Optmzer for Hadoop Lan Lu, Yao Shen Department of Computer Scence and Engneerng Shangha JaoTong Unversty Shangha, Chna [email protected], [email protected]

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

NPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6

NPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6 PAR TESTS If a WEIGHT varable s specfed, t s used to replcate a case as many tmes as ndcated by the weght value rounded to the nearest nteger. If the workspace requrements are exceeded and samplng has

More information

Preventive Maintenance and Replacement Scheduling: Models and Algorithms

Preventive Maintenance and Replacement Scheduling: Models and Algorithms Preventve Mantenance and Replacement Schedulng: Models and Algorthms By Kamran S. Moghaddam B.S. Unversty of Tehran 200 M.S. Tehran Polytechnc 2003 A Dssertaton Proposal Submtted to the Faculty of the

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center Dynamc Resource Allocaton and Power Management n Vrtualzed Data Centers Rahul Urgaonkar, Ulas C. Kozat, Ken Igarash, Mchael J. Neely [email protected], {kozat, garash}@docomolabs-usa.com, [email protected]

More information

Retailers must constantly strive for excellence in operations; extremely narrow profit margins

Retailers must constantly strive for excellence in operations; extremely narrow profit margins Managng a Retaler s Shelf Space, Inventory, and Transportaton Gerard Cachon 300 SH/DH, The Wharton School, Unversty of Pennsylvana, Phladelpha, Pennsylvana 90 [email protected] http://opm.wharton.upenn.edu/cachon/

More information

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks : An Adaptve, Anycast MAC Protocol for Wreless Sensor Networks Hwee-Xan Tan and Mun Choon Chan Department of Computer Scence, School of Computng, Natonal Unversty of Sngapore {hweexan, chanmc}@comp.nus.edu.sg

More information

A Priority Queue Algorithm for the Replication Task in HBase

A Priority Queue Algorithm for the Replication Task in HBase JURAL F SFTWARE, VL.,. 7, JULY 03 765 A Prort Queue Algorthm for the Replcaton Task n HBase Changlun Zhang Scence School, Bejng Unverst of Cvl Engneerng and Archtecture, Bejng, Chna Ke Laborator of Smbolc

More information

In some supply chains, materials are ordered periodically according to local information. This paper investigates

In some supply chains, materials are ordered periodically according to local information. This paper investigates MANUFACTURING & SRVIC OPRATIONS MANAGMNT Vol. 12, No. 3, Summer 2010, pp. 430 448 ssn 1523-4614 essn 1526-5498 10 1203 0430 nforms do 10.1287/msom.1090.0277 2010 INFORMS Improvng Supply Chan Performance:

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France [email protected], [email protected] Abstract As networked

More information

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization Hndaw Publshng Corporaton Mathematcal Problems n Engneerng Artcle ID 867836 pages http://dxdoorg/055/204/867836 Research Artcle Enhanced Two-Step Method va Relaxed Order of α-satsfactory Degrees for Fuzzy

More information