Real-Time Process Scheduling
|
|
|
- Vanessa Ward
- 9 years ago
- Views:
Transcription
1 Real-Tme Process Schedulng (Real-Tme and Embedded Systems Laboratory) Independent Process Schedulng Processes share nothng but CPU Papers for dscussons: C.L. Lu and James. W. Layland, Schedulng Algorthms for Multprogrammng n a Hard Real-Tme Envronment, JACM, Vol. 20, No.1, January 1973, pp Major references: Aloysus K. Mok, Fundamental Desgn Problems of Dstrbuted Systems for the Hard Real-Tme Envronment, Ph.D. dssertaton, MIT, 1983 Te-We Kuo and Aloysus K, Mok, Incremental Reconfguraton and Load Adjustment n Adaptve Real-Tme Systems, IEEE Transactons on Computer, 1997, IEEE 12th Real-Tme System Symposum, 1991.
2 Motvaton: Studyng: 2 days per 4 days Playng Basketball: 1.5 days per 3 days Case 1: Playng basketball (or studyng) s more mportant! Case 2: Dong whatever s more urgent! Questons: Can we fnd an optmal scheduler, that always produces a feasble schedule, whenever t s possble to do so? What does optmal means? Can we fnd a quck schedulablty test for a set of processes? Is t smple and accurate? Processes whose perods are more harmoncally related s lkely to be schedulable? Why? More accurate schedulablty tests possble? Better system confguratons can be found? How do we model schedulng overheads, such as the cost of context swtchng?
3 Tentatve Assumptons: Processes are ndependent. Processes are all perodc. We wll show you how to model sporadc processes and solve ther schedulablty problem later. The deadlne of a request s ts next request tme. A scheduler conssts of a prorty assgnment polcy and a prorty-drven schedulng mechansm. The paper of the week: C.L. Lu and James. W. Layland, Schedulng Algorthms for Multprogrammng n a Hard Real-Tme Envronment, JACM, Vol. 20, No.1, January 1973, pp Defntons The response tme of a request for a process s the tme span between the request and the end of the response to that request. A crtcal nstant of a process s an nstant at whch a request of that process has the largest response tme. A crtcal tme zone for a process s the tme nterval between a crtcal nstant and the end of the response to the correspondng request of the process. A crtcal nterval for a process s the tme nterval between a crtcal nstant and the deadlne of the correspondng request of the process. An observaton: If a process can complete ts executon wthn ts crtcal nterval, t s schedulable at all tme!
4 Theorem 1 [LL73] A crtcal nstant for any process occurs whenever the process s requested smultaneously wth requests for all hgher prorty processes. Proof. Case 1: TL does not run at t. TH TL t Case 2: TL runs at t. Tme Tme TH TL t Tme Tme Rate Monotonc Schedulng The rate monotonc prorty assgnment (RMS) assgns processes prortes accordng to ther request rates. Theorem 2 [LL73] If a feasble fxed prorty assgnment exsts for some process set, then the rate monotonc prorty assgnment s feasble for that process set. Proof. Start the proof from = 1. Exchange the prortes of τ and τ +1 f ther prortes are out of RMS order. Hnt: before: HPC -1 + c +1 + c p p + 1 p + 1 p + 1 p + 1 mply HPC - 1 c + 1 c p p + p + p + p p => after: HPC -1 + floor(p +1 / p ) c + c +1 p +1 where HPC -1 = CPU tme consumed by {τ,..., τ -1 } = p c p j j 1
5 An RMS example: Two processes wth p1 = 4, p2 = 5, and c1 = 2, c2 = Tme An observaton: c2 can be ncreased based on the concept of crtcal nstant!! Defntons: The utlzaton factor of a process τ s c /p. The fracton of CPU tme spent n executng τ. The utlzaton factor of a set of m processes s U = m = 1 For a gven prorty assgnment, a process set fully utlzes the processor f the prorty assgnment s feasble for the set and f any ncrease n the run tme of any processes n the set wll make the prorty assgnment nfeasble. c p
6 The achevable utlzaton factor (least upper bound of utlzaton factor) of a schedulng polcy Ua s a real number such that for any process set T, U(T ) <= Ua mples the schedulablty of the process set T. Theorem 3[LL73] For a set of two processes wth a fxed prorty assgnment, the achevable utlzaton factor s Proof. 2(2 1/2 1) U C1 = P2 P1 * floor(p2/p1) The mnmum U occurs when 0 P1 P2 P1 & P2 = 1 & = 2 1/ 2 1 nfeasble schedules U = { process sets } feasble schedules wthout CPU fully utlzaton feasble schedules wth CPU fully utlzaton Let T be nfeasble but U(T) < Ua Create a feasble schedule T from such that the CPU s fully utlzed U(T ) < U(T) < Ua
7 Theorem 4 [LL73] For a set of m processes wth a fxed prorty order and the restrcton that the rato between any two request perods s less than 2, the achevable utlzaton factor s Proof. m(2 1/m 1) c 1 c m-1 0 p 1 p 2 p m-1 p m Tme Each process n { 1,, m-1 } executes twce wthn P m. Theorem 5 [LL73] For a set of m processes wth fxed prorty order, the achevable utlzaton factor s m(2 1/m 1) p m Proof. 1 If p m = q * p + r, q > 1, p 1 p 1 p 1 r then p = q * p and ncrease c m tll the process set fully utlzes the processor agan. (c m <= c m + c * (q 1)). U < U + [( q -1) c pm] + c p c p Show that U s reduced! or U U + c ( q -1)[ 1 ( qp + r) ( 1 qp ) ] An observaton: If a process set are fully harmoncally related, U = 100%; otherwse U -> ln2 -> 70%! q-1
8 Earlest Deadlne Frst The Earlest Deadlne Frst algorthm (EDF) assgns processes prortes accordng to the deadlnes of ther current request. An EDF example: Two processes wth p1 = 2, p2 = 7, and c1 = 1, c2 = Tme For a set of processes scheduled accordng to some schedulng algorthm, we say that an overflow occurs at tme t f t s the deadlne of an unfulflled request. Theorem 6[LL73] When the EDF algorthm s used to schedule a set of processes on a processor, there s no processor dle tme pror to an overflow. Proof. dle overflow Tme Tme 0 Θ overflow should happen earler. Tme
9 Theorem 7[LL73] For a gven set of m processes, the EDF algorthm s feasble f and only f U = (c 1 /p 1 ) + (c 2 /p 2 ) + + (c m /p m ) <= 1 The achevable utlzaton factor of the EDF algorthm s 100%.The EDF algorthm s an optmal dynamc prorty schedulng polcy n the sense that a process set s schedulable f ts CPU utlzaton s no larger than 100%. The achevable utlzaton factor of the RMS algorthm s about ln2. The RMS algorthm s an optmal fxed prorty schedulng polcy n the sense that f a process set s schedulable by some fxed prorty schedulng algorthm, then t s schedulable by the RMS algorthm. Another thought of the above results? Theorem For a set of m processes wth fxed prorty order, the th process s schedulable f j = 1 Can we extend Theorem 7 n the same way? No! What s the mplcaton? What s the prorty of a process not reflectng ts mportance/crtcalty properly n the real world? How far can we go from here? c p j j ( 2 1 / 1)
10 Bran Damage! Theorem Gven a set of m processes, t s schedulable by some fxed prorty scheduler f U 1. Proof. a tme slce a tme slce. Tme For every tme slce, τ receve a share of s c /p. Wthn p, τ receves c /p!! Schedulng Overheads Context Swtchng Needed ether when a process s preempted by another process, or when a process completes ts executon! Stack Dscplne If process A preempts process B, process A must complete before process B can resume. A B If t s obeyed, charge the cost of preempton (context swtchng cost) once to the preemptng process! B A B
11 Is there any other optmal dynamc prorty schedulng algorthm besde the EDF algorthm? The least slack tme algorthm (LST), whch assgns processes prortes nversely proportonal to ther slack tmes s also optmal f context swtchng cost can be gnored [Mok83]. The slack tme of a process s d(t) - t - c(t). d(t)-t d(t) t c(t) Proof. Swap the schedulng unts of processes out of LST order. An LST example: c1 = c2 = 2, p1 = p2 = 4 s1=2 s2=2 S1=2 S2=1 S1=1 S2= Summary: Defntons Crtcal nstant and crtcal nterval. Utlzaton factor, achevable utlzaton factor, and least upper bound of utlzaton factor. RMS and EDF. The achevable utlzaton factor of RMS and EDF are ln2 and 100%, respectvely. The propertes and applcatons of RMS and EDF. Modelng of context swtchng cost, stack dscplne, and the propertes of least slack tme (LST).
12 Process Synchronzaton (Real-Tme and Embedded Systems Laboratory) Alternatve Approaches (1) Fnd and adopt a suboptmal algorthms. Note that a scheduler derved by a schedulng algorthm shall guarantee the schedulablty of a process set. A suboptmal algorthm seems only for off-lne computatons. (Hard Real-Tme constrants) (2)Put as many restrctons on the use of the communcaton prmtves as t s deemed reasonable for programmng realtme systems and hope that the restrcted schedulng problem can be effcently solved. Qs: In general, nterprocess coordnaton by means of semaphores s far too unstructured for real-tme analyss. Shall we have a more abstract-level language construct or more structed usages of communcaton prmtves? Shall we provde a language construct for excluson and synchronzaton?
13 Process Synchronzaton Processes Mght Share Non-Preemptble Resources or Have Precedence Constrants! Papers for dscussons: L. Sha, R. Rajkumar, J.P. Lehoczky, Prorty Inhertance Protocols: An Approach to Real-Tme Synchronzaton, IEEE Transactons on Computers, A.K. Mok, The Desgn of Real-Tme Programmng Systems Based on Process Models, IEEE Real-Tme Systems Symposum, Dec Process Synchronzaton Motvaton Can we fnd an effcent way to analyze the schedulablty of a process set (systematcally)? What knds of restrctons on the use of communcaton prmtves are needed so as to effcently solve the restrcted schedulng problem? How can we control the prorty nverson problem? The lengths of crtcal sectons mght be qute dfferent.
14 The Prorty Inverson Problem Prorty Inverson: A phenomenon where a hgher-prorty process s forced to wat for the executon of a lower-prorty process. Example: blockng vs preempton lock S unlock S 1 Blocked! Approaches: No preempton of crtcal sectons s allowed! =>They must be short! If preempton may be allowed, what prorty we should assgn the executon of a crtcal secton? 3 lock S lock S many ntermedate prorty processes may preempt 1 Prorty Inhertance Protocols: An Approach to Real-Tme Synchronzaton L. Sha, R. Rajkumar, J.P. Lehoczky, IEEE Transactons on Computers, 1990.
15 Notatons and Assumptons Notaton: Z, j, k : the kth crtcal secton n job (process) J guarded by semaphore S j. P(S ) and V(S ) are ndvsble operatons wat and sgnal respectvely on the bnary semaphore S. Assumptons: Each shared data structure s guarded by a bnary semaphore. No job attempts to lock a semaphore that has already been locked. Locks on semaphores wll be released before or at the end of a job. A fxed set of jobs executes on a processor. The Basc Prorty Inhertance Protocol Prorty-Drven Schedulng The process whch has the hghest prorty among the ready processes s assgned the processor. Synchronzaton Process must obtan the lock on the semaphore guardng a crtcal secton before enters the crtcal secton. If obtans the requred lock, enters the correspondng crtcal secton ; otherwse, s blocked and sad to be blocked by the process holds the lock on the correspondng semaphore. Once exts a crtcal secton, unlocks the correspondng semaphore and makes ts blocked processes ready. Prorty Inhertance If a process blocks hgher prorty processes, nherts the hghest prorty of the process blocked by Prorty nhertance s transtve.
16 Blockng Propertes S 2 faces nhertance blockng S S lock S drect blockng Lemma 1 A semaphore S can be used to cause nhertance blockng to job J only f S s accessed by a job whch has a prorty lower than that of J and mght be accessed by a job whch has a prorty equal to or hgher than that of J. Propertes Lemma 2 A job J can be blocked by a lower prorty job J L only f J L has entered and remaned wthn a crtcal secton when J arrves. Lemma 3 A job J L can block a hgh prorty job J for at most the duraton of a crtcal secton regardless of the number of semaphores J and J L share.
17 Propertes Theorem 4 Under the basc prorty nhertance protocol, f there are n lower prorty jobs, a job J can be blocked for at most the duraton of n crtcal sectons. Lemma 5 A semaphore can be used by at most one lower prorty job s crtcal secton to block a hgher prorty process. Propertes Theorem 6 Under the basc prorty nhertance protocol, f there are m semaphores that can be used to block job J, then J can be blocked for at most the duraton of m crtcal sectons. Concerns: A chan of blockng s possble. A deadlock can be formed! 1 Request S 2 2 S2 3 S 1 Request S 1
18 The Prorty Celng Protocol The prorty celng of a semaphore s the prorty of the hghest prorty job that may lock the semaphore. The Basc Prorty Inhertance Protocol + Prorty Celng A job J may successfully lock a semaphore S f S s avalable, and the prorty of J s hgher than the hghest prorty celng of all semaphores currently locked by jobs other than J Prorty nhertance s transtve Example: Deadlock Avodance S 0 locked S 0 unlocked τ 0 τ 1 S 0 S 2 locked blocked by S 2 1 locked (attempt to lock S 1 ) S 1 S 1, S 2 S 2 unlocked S 1 S 1 unlocked S 1 locked S 1 unlocked τ 2 S 2 t 0 t 1 S 2 locked prorty nhertance S 2 S 2 S 1, S 2 S 2 t 2 t 3 t 4 t 5 t 6 t 7 t 8 Tme unlock S 2 and reset prorty
19 Example: Chan Blockng Avodance blocked by 2 (attempt to lock S 2 ) S 2 locked S 2 unlocked τ 0 τ 1 S 2 S 1 locked S blocked by 2 locked 2 (attempt to lock S 2 ) S 2 S 1, S 2 S 1 unlocked S 2 S 2 unlocked S 1 locked S 2 locked S 2 unlocked S 1 unlocked S τ 1 S 1 S 1, S 2 S 1, S 2 S 1 2 t 0 t 1 t 2 t 3 t 4 t 5 t 6 t 7 t 8 Tme Avodance blockng occurs! * Prce pad for deadlock avodance & chan blockng avodance! Propertes Lemma 7 A job J can be blocked by a lower prorty job J L only f the prorty of job J s no hgher than the hghest prorty celng of all the semaphores that are locked by job J L when J arrves. Lemma 8 Suppose that job J preempts job J j whch enters a crtcal secton. Under the prorty celng protocol, job J j cannot nhert a prorty level whch s hgher than or equal to that of J untl J completes.
20 Propertes Lemma 9 The prorty celng protocol prevents transtve blockngs. Proof. Follows Lemma 8. t 3 t 2 t 1 Theorem 10 The Prorty celng Protocol prevents deadlock. Proof. Lemma 9 shows that the number of jobs n the blockng cycle can only be 2. t2 t1 Propertes Lemma 11No job can be blocked for more than one crtcal secton of a lower prorty job J L. Proof. Follows Lemma 2 and Theorem 10. Theorem 12 No job can be blocked for more than one crtcal secton of any lower prorty job. Proof. Lemma 11 suggests that job J can only be blocked by n dfferent processes crtcal sectons f n > 1. The correctness of the proof them follows Lemma 7.
21 Propertes Theorem 15: A set of n perodc tasks under the prorty celng protocol can be scheduled by the rate monotonc algorthm f the followng condtons are satsfed:, 1 n, 1 cj c + B + ( 2 1/ 1) j= 1 pj p where B s the worst-case blockng tme for τ Proof. Consder B as an addtonal computaton requrement. Propertes B = Max crtcal secton β S = = τj β j, k { j j τj Pr( τ ) > Pr( τ ) & Max(Prorty - Celng( s)) Pr( τ )} s S { s Semaphore s s accesses by } j τj More accurate calculatons can be derved by consderng the relatonshp between crtcal sectons and ther correspondng semaphores.
22 Propertes Schedulablty Analyss Theorem 14 [Loc87] A set of n perodc tasks scheduled by the rate-monotonc algorthm wll meet all ther deadlnes (for all task phasngs) ff A, 1 n, mn ( k, l ) y j = 1 c j 1 lp = mn U ( k, l ) y j = 1 k j lp P k j P j lp lp k P j k 1 where P y = {(k, l) 1 k, l = 1,, P } k Propertes Schedulablty Analyss Another Thought: mn ( k, l ) y j = 1 c lp P j k j lp k 0 CPU requests of processes,, j are satsfed? 0 lp k P y = {(k, l) 1 k, l = 1,, P } k Check every request tme of processes,.e, lp k.
23 Propertes Schedulablty Analyss Theorem 16 A set of n perodc tasks usng the prorty celng protocol can be scheduled by the rate-monotonc algorthm for all task phasngs f A, 1 n, 1 + mn Pj lpk c B Uj + 1 k, l) y j= 1 lpk Pj lpk ( mn ( k, l ) y 1 j = 1 lp cj P k j + c + B lp k 0 Example Schedulablty Analyss block block 1 : C 1 = 40, P 1 = 100, B 1 = 20, U 1 = : C 2 = 40, P 2 = 150, B 2 = 30, U 2 = : C 3 = 100, P 3 = 350, B 3 = 0, U 3 = Apply Theorem 15. U 1 + B 1 / P 1 = = 0.6 < 1 U 2 + B 2 / P 2 + U 1 = = U = U 1 + U 2 + U 3 = s far too large!
24 Example Schedulablty Analyss 1. 1 y 1 = {(1, 1)} Apply Theorem 16. C 1 + B 1 P 1?? => < 100 schedulable! 2. 2 y 2 = {(1, 1), (2, 1)} C 1 + C 2 + B 2 P 1?? => > 100 2C 1 + C 2 + B 2 P 2?? => schedulable! 3. 3 y 3 = {(1, 1), (1, 2), (1, 3), (2, 1), (2, 2), (2, 3)} * B 3 = 0 C 1 + C 2 + C 3 P 1?? => > 100 2C 1 + 2C 2 + C 3 2P 1?? => > 200 3C 1 + 2C 2 + C 3 3P 1?? => C 1 + C 2 + C 3 P 2?? => > 150 3C 1 + 2C 2 + C 3 2P 2?? => schedulable! 4C 1 + 3C 2 + C 3 P 3?? => > 350 Other Issues Implementaton Consderatons Prorty Inhertance Protocol (PIP) Prorty queues: one for each semaphore P( ) & V( ) operatons must support prorty nhertance Prorty Celng Protocol (PCP) A sngle prorty queue avodance blockng A lst of blocked semaphores and ther respectve owners and celngs
25 Other Issues Other synchronzaton mechansms Montor (used for schedulng mutual excluson) Defne celng for each montor. Operatons on montors are executed n an order complyng wth PCP. Server-Clent Model Server runs at the lowest prorty unless t s servcng or requested by some clents. PCP s mplemented as usual, when servers are treated as montors! Other Issues ADA rendezvous Prorty queues: one per entry call. When there are multple entres for a server task, the server task must select the hghest prorty task watng on one of the entres. PCP s mplemented as usual.
26 Summary Defntons Crtcal nstant, crtcal nterval, achevable utlzaton factor Harmonc base, harmonc chan, adaptve process optmal scheduler, optmal partton of a process set, deferrable server, pollng RMS & EDF are optmal fxed-prorty & dynamcprorty schedulers, respectvely. RMS s stable, but EDF has a hgh achevable utlzaton factor. Process sets wth a smaller harmonc base tend to be more schedulable and have better achevable utlzaton factor. Summary Consder the trade-off between the mnmzaton of the prorty nverson problem & the maxmzaton of the concurrency level of a system. Consder the deas behnd the schedulablty tests of PCP. After all, we only have lmted peces of knowledge n predctng the schedulablty of a system. However, we begn to understand and fnd out better ways n allocatng resources for processes!
27 Process Synchronzaton Processes Mght Share Non-Preemptble Resources or Have Precedence Constrants! Papers for dscussons: L. Sha, R. Rajkumar, J.P. Lehoczky, Prorty Inhertance Protocols: An Approach to Real-Tme Synchronzaton, IEEE Transactons on Computers, A.K. Mok, The Desgn of Real-Tme Programmng Systems Based on Process Models, IEEE Real-Tme Systems Symposum, Dec The Desgn of Real-Tme Programmng Systems Based on Process Models A.K. Mok, IEEE Real-Tme Systems Symposum, Dec 1994.
28 Defntons A totally on-lne scheduler makes schedulng decsons ndependent from a pror knowledge of the future request-tmes of the processes. A run-tme scheduler s the code for allocatng resources n response to requests generated at run tme, e.g., tmer or external devce nterrupts. A run-tme scheduler s clarvoyant f t has an oracle whch can predct wth absolute certanty the future request tmes of all processes. A run-tme scheduler s optmal f t always generates a feasble schedule whenever t s possble for a clarvoyant scheduler to do so. Remark: Check defntons n prevous transparences. Theorem 2 [Mok84] When there are mutual excluson constrants, t s mpossble to fnd a totally on-lne optmal run-tme scheduler. Proof. Consder two mutually exclusve processes: s : c s =1, d s =1, p s =4 p : c p =2, d p =4, p p =4 Select the request tme of s to fal any totally on-lne optmal run-tme scheduler. Let p occur at tme 0, and s occur at tme 1. The result can be trvally generalzed to the cases of multprocessor by creatng a perodc process wth c = p for each addtonal processor.
29 Theorem 4 [Mok84] The problem of decdng whether t s possble to schedule a set of perodc processes whch use semaphores only to enforce mutual excluson s NPhard. Proof. A 3-partton problem: A = {a 1, a 2,, a 3m }, B a postve nteger, and w 1, w 2,, w 3m be ntegral weghts of elements of A respectvely such that B/4 w B/2, and the sum of w s equal to mb. The decson s whether A can be parttoned nto m dsjont sets such that each of whch has weght B. Create 3m processes, where the th process has computaton tme w, and perod (mb+m), deadlne (mb+m). In addton, we create a process 3m+1 wth perod (B+1), deadlne 1, and run-tme 1. The Determnstc Rendezvous Model The Prmary Purpose: Establsh precedence constrants between the schedulng blocks of processes. Issues: Rendezvous overheads Charge t n the schedulng blocks rght before the rendezvous. => Rendezvous can be preempted! No mutual excluson! Compatblty of processes that rendezvous wth each another. 1. Perodc processes Havng perods beng an exact multple of each another. 2. Otherwse Server s the made ready whenever t s needed.
30 Example EDF s not optmal for the process model Example: C 11 * = C 12 = 1, d 1 = 3, p 1 = 5 1 : C 21 * = 1, C 22 * = 3, d 2 = p 2 = 10 3 : C 3 = 1, d = 9, 3 p 3 = 10 2 : c 11 c 12 c 11 c 12 1 rendezvous rendezvous c 21 c 22 2 c 3 3 EDF c 11 c 21 c 12 c 13 c 22 c 11 c 22 C 12 fals! c 11 c 3 c 21 C 12 fals! Deadlne Modfcaton A deadlne-modfcaton technology Consder the computatons performed n the nterval [0, L] Sort the schedulng blocks generated n [0, L] n a reverse topologcal order. Set the deadlne of the kth nstant of j to (k-1) * p + d Revse the deadlnes n reverse topologcal order by the formula: d mn d, d c s s ( { }) s = s s s : Run-tme scheduler repeats the revsed deadlnes every L tme unts (L s the longest perod among processes that rendezvous wth each another.)
31 Deadlne Modfcaton Lemma 5 [Mok 84] The feasblty of an nstance of the process model s not volated by the above revsng technology. The technology wll not volate or damage the precedence constrants nvolvng any two processes. check the prevous example! Theorem 6 [Mok 84] If a feasble schedule exsts for an nstance of a process model restrcted by rendezvous constrants, then t can be scheduled by EDF modfed to schedule the ready process whch s not blocked by a rendezvous and whch has the nearest dynamc deadlne. Remarks: A pseudo-polynomal-tme approach s presented! The Kernelzed Montor Model Idea: Processes are gven processor tme n an unnterruptble quantum, say q. If sporadc processes are of length multple of q, and each q s treated as crtcal sectons, the process model s reduced to an ndependent process schedulng wth the provson that a process may be nterrupted only after t has receved an nteger number of q. Sporadc processes are called montors. EDF s stll not optmal!
32 The Kernelzed Montor Model An EDF Example: q = 2 1 : c 1 = 2, d 1 = 2, p 1 = 5 2 : c 21 = c 22 = 2, d 2 = p 2 = 10 τ 1 c 1 c 1 τ 2 forbdden regon?! c 21 c 22 c 1 c 21 c 22 c 1 fal How to fnd the forbdden regons n the nterval [0, L] where L s the longest perod among the compatble processes? ( L = LCM(p ) ) 1. Each process s consdered as a chan of mn schedulng blocks: each of whch s of a quantum. 2. Revse request tmes and deadlnes of the block. requesttme revsng deadlne revsng (1) Sort the blocks n [0, L] n a forward topologcal order. (2) Intalze the request tme of the kth nstance of each mn schedulng block of T to (k-1)*p. (3) Revse the request tmes n forward topologcal order by the formula: r s = Max(r s, {r s + q : s s}) (4) Sort the blocks n [0, L] n a reverse topologcal order. (5) Intalze the deadlne of the kth nstance of each mn schedulng block of T to (k-1)* p + d (6) Revse the deadlnes n reverse order by the followng formula: d s = Max(d s, {d s q : s s })
33 3. Compute the set of forbdden regons n [0, L] n the followng way: (1) Sort the request tmes n a reverse chronologcal order and determne the forbdden regon assocated wth each request tme as follows: Intally, there are no forbdden regons. (2) For each request tme r s and any deadlne d for whch L d d s, let n r,d be the number of mn blocks whch must be scheduled n [r s, d]. (r s r s and d s d) If S r,d s the latest tme at whch the frst mn blocks must be scheduled, (stack blocks close to each anothor from d) (I) S r,d < r s System fals (II) S r,d < r s + q (S r,d q, r s ) s a forbdden regon. (III) otherwse, no acton s taken! *Complexty: O(n) for each request tme There are no more than n forbdden regons when n s the number of mn schedulng blocks generated n [0, L] W = {(x, y ) : y s the revsed request-tme of some mn schedulng block n [0, L], and no process should start pass x before y } The kernelzed montor scheduler: At any tme t, f t does not le n a forbdden regon, the scheduler allocates the next quantum to the ready process whch s not blocked by a rendezvous and has the earlest deadlne. If t s n a forbdden regon, the process s allowed to be dle untl the end of regon. Theorem 7[Mok 84] If a feasble schedule exsts for a process set wth rendezvous and montor communcaton prmtves, the kernelzed montor scheduler can schedule t.
34 A Related Theorem Theorem [Mok, et al. 87] If EDF s appled to schedule a set of ndependent perodc processes whose utlzaton factor s not more than 1, and the scheduler s subject to restrcton that every process must be allowed to run for at least q tme unts before t can be preempted, then no process wll ever mss ts deadlne by more than q 1 tme unts. Schedulablty Test: Add q 1 tme unts to the computaton tme of each process & check the total utlzaton factor. Applcatons: Put conflctng resource accesses n the q-tme-unt code for applcatons based on dataflow graphs. Overload Detecton for Sporadc Processes A sporadc process s one whose request tmes are not known a pror. Model a sporadc process by a par (p, c, d) where c = computaton tme p = mnmum separaton tme between two nstances. d = deadlne How should we set the separaton parameter p for a sporadc process? It s a tradeoff. If p s too bg, we rsk havng two more requests wthn p tme unts. If p s set too small, we mght have large gaps between requests and waste CPU capacty.
35 Overload Detecton for Sporadc Processes Is there an analyss method to evaluate the hypothess of the choce of tmng parameters on system relablty? Theorem 1 [Baruah, Mok, Roser, RTSS90] A set T of n sporadc processes s not feasble ( or schedulable by EDF) f ether n c (1) or, p (2) = 1 t : t < mn P + max u 1 u { d }, max { p d } s.t. T fals at or before t, where P = lcm{ p } Overload Detecton for Sporadc Processes Defne h R n ( t) = c t d max{0, p = 1 + 1} T s feasble ff t h R ( t ) t Lemma 3 [Baruah, Mok, Roser, RTSS90] The mnmum t that fals the above formula s the earlest tme that the EDF algorthm can report a falure.
36 Modelng of Sporadc Processes Lemma 3[Mok, RTSS84]: Suppose we replace every sporadc process = (c, p, d ) wth a perodc process = (c', p', d' ) wth c' = c, p' = mn(p, (d c + 1)), and d' = c. If the result set of all perodc processes can be successfully scheduled, then the orgnal set of processes can be scheduled wthout a pror knowledge of the request tmes of the sporadc processes. Proof. p' = d c c d Tme Modelng of Sporadc Processes In general, we can replace each sporadc process = (c, p, d ) wth a perodc process ' = (c', p', d' ) f the followng condtons are satsfed: [Mok, RTSS84] (1) d d' c; (2) c' = c; (3) p' d - d' + 1 Proof. p' = d d' d' d Tme
37 Summary Defntons: totally on-lne scheduler, clarvoyant scheduler, optmal run-tme scheduler crtcal regon compatblty, rendezvous model montor model The dffculty n fndng a totally on-lne optmal runtme scheduler. The NP-hard nature of the problem n schedulng a set of perodc processes that use semaphores to enforce mutual excluson. EDF wth the deadlne-revsng technology for the determnstc rendezvous model. EDF wth forbdden regons technology for the kernelzed montor model.
Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process
Dsadvantages of cyclc TDDB47 Real Tme Systems Manual scheduler constructon Cannot deal wth any runtme changes What happens f we add a task to the set? Real-Tme Systems Laboratory Department of Computer
Project Networks With Mixed-Time Constraints
Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa
FORMAL ANALYSIS FOR REAL-TIME SCHEDULING
FORMAL ANALYSIS FOR REAL-TIME SCHEDULING Bruno Dutertre and Vctora Stavrdou, SRI Internatonal, Menlo Park, CA Introducton In modern avoncs archtectures, applcaton software ncreasngly reles on servces provded
Power Low Modified Dual Priority in Hard Real Time Systems with Resource Requirements
Power Low Modfed Dual Prorty n Hard Real Tme Systems wth Resource Requrements M.Angels Moncusí, Alex Arenas {amoncus,aarenas}@etse.urv.es Dpt d'engnyera Informàtca Matemàtques Unverstat Rovra Vrgl Campus
Schedulability Bound of Weighted Round Robin Schedulers for Hard Real-Time Systems
Schedulablty Bound of Weghted Round Robn Schedulers for Hard Real-Tme Systems Janja Wu, Jyh-Charn Lu, and We Zhao Department of Computer Scence, Texas A&M Unversty {janjaw, lu, zhao}@cs.tamu.edu Abstract
Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts
Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)
The Greedy Method. Introduction. 0/1 Knapsack Problem
The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton
Checkng and Testng in Nokia RMS Process
An Integrated Schedulng Mechansm for Fault-Tolerant Modular Avoncs Systems Yann-Hang Lee Mohamed Youns Jeff Zhou CISE Department Unversty of Florda Ganesvlle, FL 326 [email protected] Advanced System Technology
Luby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
DEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
QoS-based Scheduling of Workflow Applications on Service Grids
QoS-based Schedulng of Workflow Applcatons on Servce Grds Ja Yu, Rakumar Buyya and Chen Khong Tham Grd Computng and Dstrbuted System Laboratory Dept. of Computer Scence and Software Engneerng The Unversty
Recurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
Calculation of Sampling Weights
Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample
QoS in the Linux Operating System. Technical Report
Unverstät Karlsruhe (H) Insttut für elematk QoS n the Lnux Operatng System echncal Report Marc Bechler and Hartmut Rtter Insttut für elematk Fakultät für Informatk Unverstät Karlsruhe (H) E-Mal: [mbechler
PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign
PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng
8 Algorithm for Binary Searching in Trees
8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the
benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
Traffic State Estimation in the Traffic Management Center of Berlin
Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal [email protected] Peter Möhl, PTV AG,
An Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
Enabling P2P One-view Multi-party Video Conferencing
Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P
A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing
A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure
An Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks
An Adaptve Cross-layer Bandwdth Schedulng Strategy for the Speed-Senstve Strategy n erarchcal Cellular Networks Jong-Shn Chen #1, Me-Wen #2 Department of Informaton and Communcaton Engneerng ChaoYang Unversty
Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems
1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The
Availability-Based Path Selection and Network Vulnerability Assessment
Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl
An MILP model for planning of batch plants operating in a campaign-mode
An MILP model for plannng of batch plants operatng n a campagn-mode Yanna Fumero Insttuto de Desarrollo y Dseño CONICET UTN [email protected] Gabrela Corsano Insttuto de Desarrollo y Dseño
J. Parallel Distrib. Comput.
J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n
Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. XX, MONTH 2XX 1 Effcent On-Demand Data Servce Delvery to Hgh-Speed Trans n Cellular/Infostaton Integrated Networks Hao Lang, Student Member,
Multi-Resource Fair Allocation in Heterogeneous Cloud Computing Systems
1 Mult-Resource Far Allocaton n Heterogeneous Cloud Computng Systems We Wang, Student Member, IEEE, Ben Lang, Senor Member, IEEE, Baochun L, Senor Member, IEEE Abstract We study the mult-resource allocaton
Conferencing protocols and Petri net analysis
Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE [email protected] Abstract: Durng a computer conference, users desre
INSTITUT FÜR INFORMATIK
INSTITUT FÜR INFORMATIK Schedulng jobs on unform processors revsted Klaus Jansen Chrstna Robene Bercht Nr. 1109 November 2011 ISSN 2192-6247 CHRISTIAN-ALBRECHTS-UNIVERSITÄT ZU KIEL Insttut für Informat
Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments
Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn
An Analysis of Task Scheduling for a Generic Avionics Mission Computer
An Analyss of ask chedulng for a Generc Avoncs sson Computer. B. Dodd Ar Operatons Dvson Defence cence and echnology Organsaton DO-N-69 ABAC ask schedulng s nvestgated for a set of generc tasks representatve
1 Example 1: Axis-aligned rectangles
COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton
J. Parallel Distrib. Comput. Environment-conscious scheduling of HPC applications on distributed Cloud-oriented data centers
J. Parallel Dstrb. Comput. 71 (2011) 732 749 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. ournal homepage: www.elsever.com/locate/pdc Envronment-conscous schedulng of HPC applcatons
1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.
HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher
Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures
Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng
General Auction Mechanism for Search Advertising
General Aucton Mechansm for Search Advertsng Gagan Aggarwal S. Muthukrshnan Dávd Pál Martn Pál Keywords game theory, onlne auctons, stable matchngs ABSTRACT Internet search advertsng s often sold by an
Logical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME, ISSUE, FEBRUARY ISSN 77-866 Logcal Development Of Vogel s Approxmaton Method (LD- An Approach To Fnd Basc Feasble Soluton Of Transportaton
A Performance Analysis of View Maintenance Techniques for Data Warehouses
A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao
A generalized hierarchical fair service curve algorithm for high network utilization and link-sharing
Computer Networks 43 (2003) 669 694 www.elsever.com/locate/comnet A generalzed herarchcal far servce curve algorthm for hgh network utlzaton and lnk-sharng Khyun Pyun *, Junehwa Song, Heung-Kyu Lee Department
ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING
ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,
Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1
Send Orders for Reprnts to [email protected] The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,
Relay Secrecy in Wireless Networks with Eavesdropper
Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,
Computer Networks 55 (2011) 3503 3516. Contents lists available at ScienceDirect. Computer Networks. journal homepage: www.elsevier.
Computer Networks 55 (2011) 3503 3516 Contents lsts avalable at ScenceDrect Computer Networks journal homepage: www.elsever.com/locate/comnet Bonded defct round robn schedulng for mult-channel networks
Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
Extending Probabilistic Dynamic Epistemic Logic
Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set
8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by
6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng
Generalizing the degree sequence problem
Mddlebury College March 2009 Arzona State Unversty Dscrete Mathematcs Semnar The degree sequence problem Problem: Gven an nteger sequence d = (d 1,...,d n ) determne f there exsts a graph G wth d as ts
Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
Dominant Resource Fairness in Cloud Computing Systems with Heterogeneous Servers
1 Domnant Resource Farness n Cloud Computng Systems wth Heterogeneous Servers We Wang, Baochun L, Ben Lang Department of Electrcal and Computer Engneerng Unversty of Toronto arxv:138.83v1 [cs.dc] 1 Aug
Dynamic Pricing for Smart Grid with Reinforcement Learning
Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,
Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,
Support Vector Machines
Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada [email protected] Abstract Ths s a note to explan support vector machnes.
AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE
AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent
BERNSTEIN POLYNOMIALS
On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful
Credit Limit Optimization (CLO) for Credit Cards
Credt Lmt Optmzaton (CLO) for Credt Cards Vay S. Desa CSCC IX, Ednburgh September 8, 2005 Copyrght 2003, SAS Insttute Inc. All rghts reserved. SAS Propretary Agenda Background Tradtonal approaches to credt
Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems
Jont Schedulng of Processng and Shuffle Phases n MapReduce Systems Fangfe Chen, Mural Kodalam, T. V. Lakshman Department of Computer Scence and Engneerng, The Penn State Unversty Bell Laboratores, Alcatel-Lucent
Vasicek s Model of Distribution of Losses in a Large, Homogeneous Portfolio
Vascek s Model of Dstrbuton of Losses n a Large, Homogeneous Portfolo Stephen M Schaefer London Busness School Credt Rsk Electve Summer 2012 Vascek s Model Important method for calculatng dstrbuton of
PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12
14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed
2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet
2008/8 An ntegrated model for warehouse and nventory plannng Géraldne Strack and Yves Pochet CORE Voe du Roman Pays 34 B-1348 Louvan-la-Neuve, Belgum. Tel (32 10) 47 43 04 Fax (32 10) 47 43 01 E-mal: [email protected]
Cloud Auto-Scaling with Deadline and Budget Constraints
Prelmnary verson. Fnal verson appears In Proceedngs of 11th ACM/IEEE Internatonal Conference on Grd Computng (Grd 21). Oct 25-28, 21. Brussels, Belgum. Cloud Auto-Scalng wth Deadlne and Budget Constrants
Activity Scheduling for Cost-Time Investment Optimization in Project Management
PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng
denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node
Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He [email protected] Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate
A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
Implementation of Deutsch's Algorithm Using Mathcad
Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"
Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT
Chapter 4 ECOOMIC DISATCH AD UIT COMMITMET ITRODUCTIO A power system has several power plants. Each power plant has several generatng unts. At any pont of tme, the total load n the system s met by the
Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing
Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of
A Resource-trading Mechanism for Efficient Distribution of Large-volume Contents on Peer-to-Peer Networks
A Resource-tradng Mechansm for Effcent Dstrbuton of Large-volume Contents on Peer-to-Peer Networks SmonG.M.Koo,C.S.GeorgeLee, Karthk Kannan School of Electrcal and Computer Engneerng Krannet School of
Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School
Robust Desgn of Publc Storage Warehouses Yemng (Yale) Gong EMLYON Busness School Rene de Koster Rotterdam school of management, Erasmus Unversty Abstract We apply robust optmzaton and revenue management
A New Paradigm for Load Balancing in Wireless Mesh Networks
A New Paradgm for Load Balancng n Wreless Mesh Networks Abstract: Obtanng maxmum throughput across a network or a mesh through optmal load balancng s known to be an NP-hard problem. Desgnng effcent load
A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña
Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION
VoIP over Multiple IEEE 802.11 Wireless LANs
SUBMITTED TO IEEE TRANSACTIONS ON MOBILE COMPUTING 1 VoIP over Multple IEEE 80.11 Wreless LANs An Chan, Graduate Student Member, IEEE, Soung Chang Lew, Senor Member, IEEE Abstract IEEE 80.11 WLAN has hgh
Simple Interest Loans (Section 5.1) :
Chapter 5 Fnance The frst part of ths revew wll explan the dfferent nterest and nvestment equatons you learned n secton 5.1 through 5.4 of your textbook and go through several examples. The second part
Heuristic Static Load-Balancing Algorithm Applied to CESM
Heurstc Statc Load-Balancng Algorthm Appled to CESM 1 Yur Alexeev, 1 Sher Mckelson, 1 Sven Leyffer, 1 Robert Jacob, 2 Anthony Crag 1 Argonne Natonal Laboratory, 9700 S. Cass Avenue, Argonne, IL 60439,
CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS
CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS Novella Bartoln 1, Imrch Chlamtac 2 1 Dpartmento d Informatca, Unverstà d Roma La Sapenza, Roma, Italy [email protected] 2 Center for Advanced
IWFMS: An Internal Workflow Management System/Optimizer for Hadoop
IWFMS: An Internal Workflow Management System/Optmzer for Hadoop Lan Lu, Yao Shen Department of Computer Scence and Engneerng Shangha JaoTong Unversty Shangha, Chna [email protected], [email protected]
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL
NPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6
PAR TESTS If a WEIGHT varable s specfed, t s used to replcate a case as many tmes as ndcated by the weght value rounded to the nearest nteger. If the workspace requrements are exceeded and samplng has
Preventive Maintenance and Replacement Scheduling: Models and Algorithms
Preventve Mantenance and Replacement Schedulng: Models and Algorthms By Kamran S. Moghaddam B.S. Unversty of Tehran 200 M.S. Tehran Polytechnc 2003 A Dssertaton Proposal Submtted to the Faculty of the
1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)
6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes
How To Solve An Onlne Control Polcy On A Vrtualzed Data Center
Dynamc Resource Allocaton and Power Management n Vrtualzed Data Centers Rahul Urgaonkar, Ulas C. Kozat, Ken Igarash, Mchael J. Neely [email protected], {kozat, garash}@docomolabs-usa.com, [email protected]
Retailers must constantly strive for excellence in operations; extremely narrow profit margins
Managng a Retaler s Shelf Space, Inventory, and Transportaton Gerard Cachon 300 SH/DH, The Wharton School, Unversty of Pennsylvana, Phladelpha, Pennsylvana 90 [email protected] http://opm.wharton.upenn.edu/cachon/
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks
: An Adaptve, Anycast MAC Protocol for Wreless Sensor Networks Hwee-Xan Tan and Mun Choon Chan Department of Computer Scence, School of Computng, Natonal Unversty of Sngapore {hweexan, chanmc}@comp.nus.edu.sg
A Priority Queue Algorithm for the Replication Task in HBase
JURAL F SFTWARE, VL.,. 7, JULY 03 765 A Prort Queue Algorthm for the Replcaton Task n HBase Changlun Zhang Scence School, Bejng Unverst of Cvl Engneerng and Archtecture, Bejng, Chna Ke Laborator of Smbolc
In some supply chains, materials are ordered periodically according to local information. This paper investigates
MANUFACTURING & SRVIC OPRATIONS MANAGMNT Vol. 12, No. 3, Summer 2010, pp. 430 448 ssn 1523-4614 essn 1526-5498 10 1203 0430 nforms do 10.1287/msom.1090.0277 2010 INFORMS Improvng Supply Chan Performance:
RequIn, a tool for fast web traffic inference
RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France [email protected], [email protected] Abstract As networked
Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization
Hndaw Publshng Corporaton Mathematcal Problems n Engneerng Artcle ID 867836 pages http://dxdoorg/055/204/867836 Research Artcle Enhanced Two-Step Method va Relaxed Order of α-satsfactory Degrees for Fuzzy
