Energy Efficient Cache Invalidation in a Mobile Environment

Size: px
Start display at page:

Download "Energy Efficient Cache Invalidation in a Mobile Environment"

Transcription

1 Enegy Efficient Cache Invalidation in a Mobile Envionment Naottam Chand, Ramesh Chanda Joshi, Manoj Misa Electonics & Compute Engineeing Depatment Indian Institute of Technology, Rookee INDIA {naotdec, joshifcc, manojfec@iit.enet.in Abstact: Caching in mobile computing envionment has emeged as a potential technique to impove data access pefomance and availability by educing the inteaction between the client and seve. A cache invalidation stategy ensues that cached item at a mobile client has same value as on the oigin seve. To maintain the cache consistency, the seve peiodically boadcasts an invalidation epot (IR so that each client can invalidate obsolete data items fom its cache. The IR stategy suffes fom long quey latency, lage tuning time and poo utilization of wieless bandwidth. Using updated invalidation epot (UIR, the long quey latency can be educed. This pape pesents a caching stategy that peseves the advantages of existing IR and UIR based stategies and impoves on thei disadvantages. Simulation esults pove that ou stategy yields bette pefomance than IR and UIR based stategies. Categoies and Subject Desciptos C.2.1 [Netwok Achitectue and Design]: Wieless Communication Geneal Tems Netwok Achitectue, Netwok Design, Mobile Computing Keywods: : Mobile computing, cache invalidation, wieless, data boadcast, invalidation epot, disconnection, failue. Received 30 Oct.2004; Reviewed and accepted 30 Jan Intoduction The advances in potable computing devices and wieless technology have damatically changed the way of infomation access. Wieless communication pemits uses to access global data fom any location by caying mobile devices. Howeve, the mobile computing paadigm pesents a damatic discepancy elative to cuently matued wied netwok computing. Mobile clients in wieless envionments suffe fom scace bandwidth, low-quality communication, fequent netwok disconnections (eithe voluntee o involuntee, and limited local esouces (computing powe, battey, stoage, display, etc. Caching of fequently accessed data items on the client side is an effective technique to educe netwok taffic and quey latency. Bandwidth and battey powe ae saved, as no tansmission is equied fo clients to access data fom thei caches. Futhemoe, the availability of data is impoved because even when a mobile client is disconnected fom the netwok, data stoed in its local cache is still accessible, making disconnection opeations a possibility. Data consistency must be ensued between client and seve to pevent clients fom answeing quey by out-of-date cached data items updated by seve. In ode to assist mobile clients in maintaining the consistency of thei caches, a numbe of cache invalidation techniques have been poposed [1-14]. In these appoaches, the seve peiodically boadcasts invalidation epots (IRs to infom the clients about which data items have been updated duing the most ecent past. When a mobile client eceives an IR, it can use the epot to identify out-dated data items in its cache and discad them befoe using the cache to answe queies. Howeve, the IR based scheme suffes fom long quey latency and they make poo utilization of available wieless bandwidth. Cao [1, 4, 5, 15] has poposed seveal updated invalidation epot (UIR based caching stategies to addess the poblem. Each UIR contains infomation about most ecently updated data items since the last IR. In case of cache hit, thee is no need to wait fo the next IR and hence the quey latency is educed. Howeve, if thee is a cache miss, the client still needs to wait fo the data to be deliveed. Thus, due to cache miss, the UIR stategy has same quey latency as IR stategy. To ovecome the limitations of existing cache invalidation stategies, this pape pesents a synchonous stateful caching stategy whee cache consistency is maintained by peiodically boadcasting update epots (URs and equest epots (RRs. The cente design of ou stategy includes educing the quey latency, impoving the cache hit atio, minimizing the client disconnection oveheads, bette utilization of wieless channel, and conseving the client enegy. The tack of cached items fo each client is maintained at the home mobile suppot station in the fom of cache state infomation (CSI. Use of CSI educes the size of IR by filteing out non-cached items and handles long disconnection [25]. In diffeent IR based stategies [2, 3, 6-11, 13, 14, 16], even though many clients cache the same updated data item, all of them have to quey the seve and get the data sepaately fom the seve. It misuses a lage amount of wieless bandwidth and client battey enegy. Ou stategy peiodically boadcasts update epot (UR [24], to minimize uplink equests and downlink boadcasts. To futhe educe quey latency, the stategy uses equest epots (RRs, whee all the ecently equested items ae boadcast afte the UIR. Selective tuning is used to conseve the client enegy. Anothe dawback common to IR based appoaches is that if the disconnection time of a client is lage than a fixed peiod of time, the client should discad its entie cache even if some of the cached items may still be valid. This pape demonstates a moe efficient handling of abitaily long client disconnection as compaed to IR and UIR appoaches. The est of the pape is oganized as follows. Section 2 gives a bief eview on some epesentative appoaches on cache invalidation. In section 3, we explain ou poposed caching stategy. Simulation esults ae pesented and discussed in Section 4. Concluding emaks ae given in section 5. 2 Related Wok A numbe of boadcast based cache invalidation stategies have been poposed fo mobile envionments. Existing stategies can be boadly classified into two types: stateful and stateless seves, distinguished by whethe clients cache infomation is maintained at the seve o not. Babaa and Imielinski [14] have poposed the basic stateless appoach called timestamp (TS, whee the seve boadcasts an IR evey L seconds, indicating which data items ae updated in the last w*l seconds, whee w is the boadcast window size. Advantages of IR based appoaches include high scalability and enegy efficiency because the size of each IR is independent of the numbe of clients, and IRs ae scheduled to be boadcast peiodically (synchonously. As such, clients can switch to doze mode opeation between successive IRs to save battey powe. The majo dawback, howeve, is: clients must flush thei entie caches afte long disconnection (> w*l, even if some of the cached items may still be valid. Anothe dawback is long quey latency, as clients must at least wait fo the next IR befoe answeing a quey to ensue consistency. Vaious appoaches have been poposed to addess the long disconnection poblem [3, 10]. Jing et al. [10] poposed a Bit-Sequence (BS scheme that uses a hieachical stuctue of binay bit sequences to epesent IRs. The scheme is good fo clients with long disconnections but has vey lage size of IR and assumes that update ate to the database is not high. Hu and Lee [3] have poposed a family of invalidation algoithms. The advantage of these algoithms is that the type of invalidation epot to be sent is detemined Jounal of Digital Infomation Management Volume 3 Numbe 2 June

2 dynamically based on system status. Tan [7] eexamined the BS method and studied diffeent oganizations of the invalidation epot. These oganizations facilitate clients to selectively tune to the potion of the epots. Hou et al. [12] poposed a scheme to educe the false invalidation ates based on BS epots. Wu et al. [6] poposed a scheme which modifies the IR algoithm to include cache validity checks afte econnection. The method has same basic poblem as in IR method (e.g. when the disconnection time is geate than W, nothing can be salvaged. Cao [4, 15] has done some pioneeing wok to educe the long quey delay associated with basic IR based stategy by intoducing the idea of updated invalidation epot (UIR. In this appoach, a small faction of the essential infomation (called UIR elated to cache invalidation is eplicated seveal times within an IR inteval, and hence the client can answe a quey without waiting until next IR. Howeve, if thee is a cache miss, the client still needs to wait fo the data to be deliveed. In [1, 15] autho intoduced a counte based method whee clients intelligently pefetch the data that ae most likely used in the futue. Kahol et al. [2, 9] pesent an asynchonous stateful (AS invalidation scheme whee each mobile client maintains its own Home Location Cache (HLC to deal with the disconnections. The stategy suffes fom lage numbe of uplink equests and downlink boadcasts fo the same updated item. Yuen et al. [8] poposed a scheme based on absolute validity inteval (AVI fo each data item. A mobile client can veify the validity of a cached item by compaing the last update time and its AVI. To solve the poblem of lage size invalidations epots and duplicate uplink equests, Lai et al. [18, 19], poposed two techniques: Validation- Invalidation Repots (VIR and Delayed Request Scheme (DRS. In VIR appoach when size of IR becomes lage, the validation epot can be used instead. Use of DRS educes the numbe of uplink equests. Chuang et al. [20] addess some of the cache invalidation issues like disconnection handling, enegy consumption in a synchonous stateless envionment. Wang et al. [21] poposed a hybid invalidation stategy called Scalable Asynchonous Cache Consistency Scheme (SACCS. Unlike stateful algoithms, SACCS maintains only one flag bit fo each data item in MSS and unlike the existing synchonous stateless appoaches, it does not equie peiodic boadcast of IRs. Because of asynchonous natue of SACCS appoach, it does not povide any guaantee on waiting time of clients and hence they can aely switch to powe save mode. Authos in [22] descibe the cache consistency maintenance fo inta- and inte-oaming clients. Thee stategies: homogenous IR, inhomogeneous IR without oaming check and inhomogeneous IR with oaming check ae applied to TS and SACCS stategies. 3 Poposed Caching Stategy In this section, we pesent ou synchonous stateful caching stategy. 3.1 Mobile Computing Envionment Figue 1 illustates the mobile computing envionment assumed in this study. The model consists of two distinct sets of entities: Mobile Hosts (MHs and Fixed Hosts (FHs. Some of the fixed hosts called Mobile Suppot Stations (MSSs, ae augmented with a wieless inteface in ode to communicate with the mobile hosts, which ae located within a adio coveage called a cell. We use the tems client and mobile host intechangeably. Wieless cells cove the entie suface of installation (e.g., a univesity campus, industy. MSSs ae also known as Base Stations (BSs and ae inteconnected by means of fixed LAN infastuctue. An MSS acts like a gateway between wied LAN and wieless netwok. Individual LANs ae inteconnected by means of outes; one of them is acting as an Intenet gateway. An MH communicates with the seve via an MSS ove a wieless communication link. A fixed netwok has a lage bandwidth (ode of Mbps o Gbps; while the bandwidth of the wieless channel is scace (19.2 Kbps 10 Mbps. An MH can move within a cell o between cells while etaining its netwok connection. When an MH moves fom one cell to anothe (called handoff, its wieless connection is switched to the new cell. An MH eithe connects to an MSS though a wieless link o disconnects fom the MSS by opeating in a powe save mode [2]. is of same size S data (in bits and has two timestamps: t i is the most ecent timestamp when d i got updated at the seve and t, called i latest equest time, epesents the most ecent time when d i was last equested by any client. Clients only issue simple equests to ead the most ecent copy of data items. In ode to seve a equest sent fom a client, the MSS needs to communicate with the database seve to etieve the database items. Caching techniques may also be applied at MSS. Since the communication between the MSS and the database seve is tanspaent to the clients, fom the client point of view, the MSS is the same as the database seve. Figue 1 Mobile computing envionment. Fequently accessed data items ae cached on the client side. Each client has same cache capacity of C items. When caching is used, data consistency issues must be addessed. We assume the latest value consistency model [9]. To ensue cache consistency, the seve boadcasts UR evey L seconds and it also boadcasts (m- 1 RRs between two URs. The stuctue of UR i at time T i is as follows: IR i UR_INDE i UR_DATA i IR I = {( d, T (D D ( n > 0 (T - W*L < T T I I UR_INDE i = {d x ((T i -1 < t x T i (n x >0 (T i 1,m-1 < t T x i UR_DATA i = {D x d x UR_INDE i IR contains the update histoy of past w boadcast intevals wheeas UR_DATA contains actual data value fo the items which have been updated duing pevious UR inteval and the items that have been equested duing the latest RR inteval. At inteval time T i,k, RR i,k is constucted as follows: UIR I,K RR_INDE I,K RR_DATA I,K UIR i,k = {d x (d x D (T i,0 < t x T i,k (n x > 0 (0 < k < m RR_INDE i,k = {d x (T i,k-1 < T i,k RR_DATA i,k = {D x d x RR_INDE i,k To enable selective tuning, the MSS boadcasts the index infomation befoe the boadcast of actual data. An index (UR_INDE/RR_INDE is list of the items boadcast as pat of UR_DATA/RR_DATA. It is notable that use of index in ou stategy does not incease size of the epot. Fo instance, fo an item d x, the numbe of bits in both the appoaches (with and without index emains S id +S data (whee S id = d x, is size of the item id and S data = D x, is numbe of bits in actual data of the item. Within index, the items ae aanged in nondeceasing ode of thei cache counts to futhe educe the quey latency [23]. To answe a quey, the client listens to the IR/UIR pat of epot (UR/ RR and uses it to decide cache validity. If thee is a valid cached copy of the equested item, the client etuns the item immediately; 3.2 Cache Invalidation Stategy Seve database D is a collection of N data items with ids: d 1, d 2,..., d N. D i denotes the actual data of an item with id d i. Each data item d i Jounal of Digital Infomation Management Volume 3 Numbe 2 June

3 othewise, it sends a quey equest to the seve. Fo each client MH x, the home MSS maintains cache state infomation CSI x (i.e. list of cached items and equest timestamp (i.e. last time the client communicated with the MSS. The MSS also maintains cache count n i fo each item d i. Fo a client equest, the MSS updates the elevant countes, coesponding CSI and timestamp, and fowads the equest to the seve. To save enegy a client may powe off and only tuns on duing the epot boadcast. Ou stategy educes the size of IR by filteing out non-cached items, thus enhancing the oveall pefomance [25]. Reduced size of IR/UIR epots impoves the downlink channel utilization. Futhe, it enhances the uplink channel utilization by adopting delayed uplink (DU technique [25]. To illustate the woking of poposed stategy conside an example as shown in Figue 2 fo the mobile scenaio of Figue 1. whole pocess is eflected in two algoithms: Algoithm 1 uns on the MSS and Algoithm 2 uns on the client side. Algoithm 1. The algoithm at the MSS The MSS eceives econnect(t l fom client MH j ; DIV j = 0; Set DR j to empty; T j = cuent_time; fo each item d x CSI j do if (t x > T l /* item has become invalid */ DIV j [k] = 1 whee CSI j [k] = d x ; /*d x is the kth cached item */ if all bits in DIV j ae same then DR j = DIV j [1]; /* DR j has one bit 0/1 */ else append DIV j to DR j ; send DRj to MHj; Algoithm 2. The algoithm at the client Figue 2 Woking of ou stategy In UIR scheme, the equested data ae boadcast afte the next IR, thus, due to cache miss the expected quey latency is L/2 seconds. To educe the quey latency due to cache miss, ou stategy boadcasts the ecently equested data items afte the next epot (IR/UIR as pat of UR/RR whicheve aives ealie, such that the expected quey latency is L/(2*m seconds instead of L/2 seconds. Fo example, when a client eceives a cache miss equest between T i,1 and T i,2, it cannot answe the quey until T i+1 in the UIR appoach, but it can answe the quey at T i,2 in ou appoach (see Figue 3. The MH j econnect afte the disconnection; if (disconnection time w*l eceive next UR to invalidate the cache; else /* long disconnection */ { send econnect(t l to the MSS; wait until eceiving DR j ; if DR j has single bit, use it to invalidate the cache; else { fo each kth bit b k (stating fom MSB in DR j if b k = 1 then d k = invalid else d k = valid; As compaed to UIR stategy [1, 4, 5, 15], which handles disconnection by sending the ids fo updated items, ou stategy uses only one bit fo an item, thus educing the econnection oveheads temendously. Fo ou stategy the maximum econnection ovehead is C bits which is vey low as compaed to UIR. Because of smalle size of ovehead, ou stategy is also vey much effective in tems of bandwidth utilization, client tuning time and enegy consumption. Conside a caching scenaio of Figue 2. Let client MH 5 disconnects at time 14 and econnects at time 47 as shown in Figue 4. Figue 3 Reducing the quey latency Handling client disconnection Since a UR boadcasts infomation about the items that have been updated duing past w*l time, ou stategy handles the client disconnection less than w*l without any additional ovehead. When a client econnects afte a disconnection time longe than w*l, it sends an uplink equest with the last eceived UR timestamp T l (befoe disconnection to the MSS. On eceipt, the MSS constucts a binay vecto DIV called disconnection infomation vecto. DIV is of size C bits and contains the validity infomation about the cached items by the client. In compaison to ou pevious disconnection handling stategy [25], hee we intoduce the idea of disconnection epot (DR, that futhe enhances the expected value of disconnection ovehead. The ationale behind the use of DR is that, thee may be two exteme cases of all the cached items being valid (DIV=0 o invalid (DIV=1 afte the long disconnection. When all the bits in DIV ae same (i.e. 0 o 1 then it is bette to send one bit to the client instead of C bits. The MSS computes DR (of size 1 o C bits fom DIV and sends it to the client. Afte downloading DR, the client invalidates the cache. The Figue 4 Disconnection example Disconnection peiod = 33 (i.e. > w*l. MH 5 has no infomation about updates between (12, 47], and it misses URs at 24 and 36. On wake up it sends T l = 12 to the MSS A. The MSS A constucts DR as shown below: d 1 d 2 d 8 d Jounal of Digital Infomation Management Volume 3 Numbe 2 June

4 When MH 5 eceives DR 5 = 0010, it is intepeted as: items d 1, d 2 & d 9 ae still valid, wheeas item d 8 has become invalid. The econnection ovehead fo ou stategy is 4 bits. Fo UIR, the ovehead = min {invalid items, valid items*item id size (S id. Geneally S id = 32 bits, theefoe the ovehead value = 32 bits Handling client failue Fom a client pespective a failue is teated as a long disconnection. When a client ecoves fom a failue longe than w*l seconds, it sends an uplink equest with the last eceived UR timestamp T l to the MSS. Due to client failue, the CSI may not epesent the actual state of client cache. Moeove, all cache countes may gow vey lage afte some amount of time and fail to epesent the numbe of caching clients. Fo a client MH x, the last equest timestamp T maintained x at the home MSS is used to handle such situation. If the value (cuent_time-tx is lage than some fail_theshold, the MSS ties to communicate with MH x. If the client does not espond in a cetain time peiod, the MSS assumes that it has failed. Hence, the MSS deceases the elevant countes and emoves the associated CSI x. On eceiving T l fom the client MH x, the MSS updates the T, ceates x a new CSI x list and esponds to the client with DR x =1 indicating that whole cache is invalid. 4 Pefomance Evaluation 4.1 Methodology To evaluate the pefomance of the poposed scheme, we have developed a simulation model. Table 1 shows system paametes and thei values. The model consists of a single seve seving multiple clients. The database can only be updated by the seve, while the queies ae geneated by the clients following an exponential distibution. The database items ae distibuted into two categoies: the hot data subset and the cold data subset. The hot data subset includes data items fom 1 to 50 and the cold data subset includes the emaining data items of the database. Clients have a lage pobability (80% to access the data in the hot subset and a low pobability (20% to access the data in the cold subset. The seve boadcasts IRs (URs in ou algoithm evey L seconds and UIRs (RRs in ou algoithm evey L/m seconds. The seve geneates a single steam of updates sepaated by an exponentially distibuted update aival time. All updates ae andomly distibuted inside the hot data subset and the cold data subset, while 40% of the updates ae applied to the hot data subset. The mean inteaival time of queies geneated by all clients is T q. The inte-aival time of updates at the seve is distibuted exponentially with a mean of T u. A client follows exponential distibuted disconnection with mean time T d and has pobability p d to ente the disconnection mode only when the outstanding quey has been seved.. The client pocesses geneate queies one by one. If the efeenced data items ae not cached on the client side, the data ids ae sent to the seve fo fetching. Once the equested data items appea on the channel, the client bings them into its cache. Client cache management follows I- LRU (invalid LRU eplacement policy, whee invalid cache items ae fist eplaced. If thee is no invalid cache item, the valid items ae eplaced in LRU fashion. Hot data items (D H 1-50 Cold data items (D c Remainde of D Pecentage of access on hot data subset 80 Pecentage of updates on hot data subset 40 Mean quey geneate time (T q sec Mean update aival time (T u sec Mean disconnection time (T d sec Client disconnection pobability (p d 0.10 Bandwidth of uplink channel (B up 19.2 Kbps Bandwidth of downlink channel (B down 100 Kbps Table 1 Simulation paametes 4.2 Results The effects of diffeent wokload paametes such as mean update aival time, mean quey geneate time, etc. on the elative pefomance of the IR (TS, UIR and ou stategy have been pesented The cache hit atio Figue 5 shows that the cache hit atio of ou stategy is always highe than IR and UIR stategies. In the IR algoithm, a client only downloads the data items that it has equested fom the seve, wheeas in UIR and ou stategy, a client also downloads the updated data items that ae boadcast by the seve, thus, inceasing the cache hit atio. Due to cache miss, the UIR stategy boadcasts the equested data items only afte the next IR, wheeas ou stategy also boadcasts the equested data items afte evey UIR (as pat of RR. Because of such distibuted quey eplies, cache hit atio of ou stategy is highe than UIR stategy. Figue 5a shows that cache hit atio dops with the decease in mean update aival time. As shown in Figue 5b, the cache hit atio educes due to client disconnections. All the thee stategies eact diffeently to the disconnections. In the IR algoithm, if a client disconnects longe than w*l, it invalidates all cached data items and deletes them fom the cache although some of them may be valid. This esults in many cache misses fo the client befoe it fills up the cache again. (a Paamete Value Seve database size (N 1000 items Item size (S data 4096 bits Client cache size (C items Numbe of clients (M 50 Item id size (S id 32 bits Update timestamp size (T data 32 bits Boadcast inteval (L 20 sec Numbe of UIR/RR boadcasts (m-1 4 Boadcast window (w 10 L (b Figue 5 Cache hit atio as a function of mean update aival time (T q = 100 sec, N = 1000 items, C = 50 items. (a no client disconnection (b client disconnection pobability (p d is 0.10 (T d = 400 sec. Jounal of Digital Infomation Management Volume 3 Numbe 2 June

5 4.2.2 The effect of mean update aival time We measue the quey latency and thoughput (the numbe of queies seved pe IR/UR inteval as a function of the mean update aival time. Figue 6a shows the effect of mean update aival time ove the quey latency. Ou stategy outpefoms the IR and UIR stategies, because a client only needs to wait fo the next RR to seve the queies and hence the quey latency is about 20/(2*5 = 2 seconds (L/(2*m. stategy has the highest uplink cost and the UIR stategy is in the middle. This can be explained by the fact that the thee stategies have diffeent cache miss atios. In the IR stategy, when a cached data item becomes invalid, the client has to send the uplink equest. Thus, a lage numbe of uplink equests ae also esulted due to the invalidation of cache contents. In ou stategy, thee is no uplink due to updates at the seve. As the mean quey geneate time inceases the numbe of uplink equests deceases because thee will be less numbe of cache misses. In Figue 8b, when the mean quey geneate time dops below 50 seconds, because of the use of DU technique ou stategy behaves significantly bette than IR and UIR stategies. (a (a (b Figue 6 The quey latency and thoughput as a function of the mean update aival time (T q = 100 sec, T d = 400 sec, N = 1000 items, C = 50 items. (b Figue 7 The quey latency and thoughput as a function of the mean quey geneate time (T u = 10 sec, N = 1000 items, C = 50 items, no client disconnection. In ou simulation model, a quey is geneated only when thee is no pending equest fom the client. As the quey latency dops, the next quey may aive ealie and be seved ealie. Thus, the seve can seve moe queies within one boadcast inteval. Since thee stategies have diffeent quey latencies, they have diffeent thoughput. As shown in Figue 6b, ou stategy has the highest thoughput, wheeas IR stategy has the lowest, and UIR stategy in the middle The effect of mean quey geneate time As shown in Figue 7a, the quey latency of the IR stategy gows longe than the IR inteval when the mean quey geneate time dops below 50 seconds. Due to the distibuted boadcast of equested data, ou stategy has always less quey latency as compaed to UIR stategy. Since ou stategy has highe cache hit atio than the IR and UIR stategies, it can seve moe queies locally. Due to delayed uplink (DU, ou stategy futhe educes the numbe of uplink equests as compaed to UIR and IR stategies. As a esult, it has always highe thoughput than the IR and UIR stategies when the mean quey geneate time is vey low. Fo example, as shown in Figue 7b, when the quey geneate time educes fom 20 seconds to 5, the thoughput of the IR algoithm emains at about 30, wheeas the thoughput of UIR stategy inceases fom about 70 to about 103. At the same time the thoughput of ou stategy inceases fom 82 to 122. When the mean quey geneate time is vey high i.e., aound 300 seconds, the boadcast channel has enough bandwidth to seve the client equest, and hence thee stategies have almost simila thoughput The numbe of uplink equests To evaluate the effectiveness of ou stategy to uplink bandwidth utilization, we study the effect of mean update aival time and mean quey geneate time ove numbe of uplink equests. As shown in Figue 8, ou stategy has the lowest uplink cost, wheeas the IR (a (b Figue 8 The numbe of uplink equests pe inteval (N = 1000 items, C = 50 items, no client disconnection. (a T q = 50 sec (b T u = 100 sec The disconnection ovehead Figue 9 shows the effect of diffeent disconnection times on the disconnection ovehead. The ovehead consideed is the additional numbe of bits tansmitted on downlink channel due to cached items those have become invalid duing the disconnection. Since ou stategy has no oveheads due to disconnection less than 200 Jounal of Digital Infomation Management Volume 3 Numbe 2 June

6 seconds (w*l, the compaison between UIR and ou stategies has been shown fo disconnection time longe than 200 seconds. The figue shows that the UIR stategy has always highe ovehead than ou stategy. As ou stategy uses disconnection epot (DR, the maximum ovehead is C bits. When disconnection time is slightly highe than w*l o has vey lage value, the ovehead is less than C bits as all the cached items may be valid/invalid. In UIR stategy, the numbe of invalid items inceases with the incease of disconnection time, thus inceasing the econnection ovehead. Fo IR stategy, if the disconnection time is longe than 200 seconds, a client assumes that all the cached data items have become invalid and deletes them fom the cache. To seve the futue equests the client will download the items fom the seve and thus, the ovehead is a vey lage value as compaed to ou scheme and hence not shown in the figue. Figue 9 Client disconnection ovehead as a function of the mean disconnection time (T u = 10 sec, T q = 50 sec, N = 1000 items, C = 50 items The effect of client disconnection time Figue 10 shows the effects of the client disconnection time. In ou stategy, the client keeps the valid cache items even though it has been disconnected fo a long time (lage than w*l seconds. Thus, the quey latency of ou stategy does not change too much as the client disconnection time changes. Since a client geneates less queies when the mean disconnection time inceases, the thoughput of UIR and ou stategies dops as the mean disconnection time inceases. In the IR stategy, if a client disconnects longe than w*l seconds, it has to discad the whole cache. Since the client disconnection time is exponentially distibuted, the cache hit atio of IR stategy dops as the disconnection time gows until w*l = 200 seconds. Since the quey latency inceases as the cache hit atio dops, the quey latency of the IR stategy gows to almost 20 seconds as the disconnection time inceases to 200 seconds. (b (a Figue 10 The quey latency and thoughput as a function of the mean disconnection time (T u = 100 sec, T q = 25 sec, N = 1000 items, C = 50 items. 5 Conclusions and Futue Wok With the inceased use of potable computing devices, the mobile computing has eached a stage that enables foeseeing easy access to infomation anywhee, anytime. Howeve, it demands solutions to mask unstable connectivity and limited enegy. Caching at mobile client can enhance the data access pefomance in such envionments. To ovecome the demeits of existing IR and UIR stategies, this pape pesents a synchonous stateful cache invalidation stategy that educes the quey latency, disconnection oveheads, use of wieless channel and conseve the client battey enegy. Simulation expeiments show that ou stategy pefoms bette than IR and UIR schemes. Use of pefetching in integation with caching is a consideation duing ou futue eseach. Acknowledgements The authos would like to thank the anonymous eviewes and guest editos whose insightful comments helped to impove the pesentation of the pape. Refeences 1. Cao, G. (2002. On Impoving the Pefomance of Cache Invalidation in Mobile Envionments. ACM/Kluwe Mobile Netwoks and Applications, 7(4, Kahol, A., Khuana, S., Gupta S.K.S., & Simani, P.K. (2001. A Stategy to Manage Cache Consistency in a Disconnected Distibuted Envionment. IEEE Tansaction on Paallel and Distibuted Systems, 12(7, Hu, Q., & Lee, D.K. (1998. Cache Algoithms Based on Adaptive Invalidation Repots fo Mobile Envionments. Cluste Computing, 1(1, Cao, G. (2001. A Scalable Low-Latency Cache Invalidation Stategy fo Mobile Envionments. ACM Intenational Confeence on Computing and Netwoking (Mobicom, Cao, G. (2002. Poactive Powe-Awae Cache Management fo Mobile Computing Systems. IEEE Tansactions on Computes, Vol. 51, No Wu, K.L., Yu, P.S., & Chen, M.S. (1998. Enegy-Efficient Mobile Cache Invalidation. Distibuted and Paallel Databases, Kluwe Academic Publishes, Vol. 6, Tan, K.L. (2001. Oganisation of Invalidation Repots fo Enegy- Efficient Cache Invalidation in Mobile Envionments. Mobile Netwoks and Applications, 6, Yuen, J.C., Chan, E., Lam, K., & Lueng, H.W. (2000. Cache Invalidation Scheme fo Mobile Computing Systems with Real-Time Data. SIGMOD. 9. Kahol, A., Khuana, S., Gupta S.K.S., & Simani, P.K. (2000. An Efficient Cache Maintenance Scheme fo Mobile Envionment. Poceedings of Int. Conf. on Distibuted Computing Systems, Jing, J., Elmagamid, A., Helal, A., & Alonso, R. (1997. Bit- Sequences: An Adaptive Cache Invalidation Method in Mobile Client/ Seve Envionments. Mobile Netwoks and Applications, Yao, J.F., & Dunham, M.H. (2001. Caching Management of Mobile DBMS. Jounal of Integated Compute-Aided Engineeing, Vol. 8, No Hou, W.C., Su, M., Zhang, H., & Wang, H. (2001. An Optimal Constuction of Invalidation Repots fo Mobile Databases. Poceedings of CIKM, Nam, S.H., Chung, Y., Cho, S.H., & Hwang, C.S. (2002. Asynchonous Cache Invalidation Stategy to Suppot Read-Only Tansactions in Mobile Envionments. IEICE Tans. Inf. and Syst., Vol. E85-D, No Babaa, D., & Imielinski, T. (1994. Sleepes an d Wokaholics: Caching Stategies in Mobile Envionments. Poceedings of the ACM SIGMOD Confeence on Management of Data, Cao, G. (2003. A Scalable Low-Latency Cache Invalidation Stategy fo Mobile Envionments. IEEE Tansactions on Knowledge and Data Engineeing, Vol. 15, No. 5, Lee, S.K. (2002. Caching and Concuency Contol in a Wieless Mobile Computing Envionment. IEICE Tans. Inf. and Syst., Vol. E85- D, No Tan, K.L., Cai, J., & Ooi, B.C. (2001. An Evaluation of Cache Invalidation Stategies in Wieless Envionments. IEEE Tansactions on Paallel and Distibuted Systems, Vol. 12, No Lai, K. Y., Tai, Z., & Betok, P. (2003. Cost Efficient Boadcast Based Cache Invalidation fo Mobile Envionments. SAC, Jounal of Digital Infomation Management Volume 3 Numbe 2 June

7 19. Lai, K. Y., Tai, Z., & Betok, P. (2003. An Analytical Study of Boadcast Based Cache Invalidation in Mobile Computing Netwoks. CoopIS/DOA/ODBASE, Chuang, P.J., & Hsu, C.Y. (2004. An Efficient Cache Invalidation Stategy in Mobile Envionments. IEEE Intenational Confeence on Advanced Infomation Netwoking and Application (AINA. 21. Wang, Z., Das, S. K., Che, H., & Kuma, M. (2003. Scalable Asynchonous Cache Consistency Scheme (SACCS fo Mobile Envionments. ICDCS Wokshops, Wang, Z., Kuma, M., Das, S. K., & Shen, H. (2003. Investigation of Cache Maintenance Stategies fo Multi-cell Envionments. Mobile Data Management (MDM, Chand, N., Joshi, R. C., & Misa, M. (2004. Boadcast Based Cache Invalidation and Pefetching in Mobile Envionment. Intl. Conf. on High Pefomance Computing (HiPC, Spinge LNCS 3296, Chand, N., Joshi, R. C., & Misa, M. (2005. Enegy Efficient Cache Invalidation in Wieless Mobile Envionment. Poceedings of IEEE Intenational Confeence on Pesonal Wieless Communications (ICPWC, Chand, N., Joshi, R. C., & Misa, M. Enegy Efficient Cache Invalidation in a Disconnected Wieless Mobile Envionment. Intenational Jounal of Ad Hoc and Ubiquitous Computing (IJAHUC, to appea. Jounal of Digital Infomation Management Volume 3 Numbe 2 June

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available

More information

Effect of Contention Window on the Performance of IEEE 802.11 WLANs

Effect of Contention Window on the Performance of IEEE 802.11 WLANs Effect of Contention Window on the Pefomance of IEEE 82.11 WLANs Yunli Chen and Dhama P. Agawal Cente fo Distibuted and Mobile Computing, Depatment of ECECS Univesity of Cincinnati, OH 45221-3 {ychen,

More information

Software Engineering and Development

Software Engineering and Development I T H E A 67 Softwae Engineeing and Development SOFTWARE DEVELOPMENT PROCESS DYNAMICS MODELING AS STATE MACHINE Leonid Lyubchyk, Vasyl Soloshchuk Abstact: Softwae development pocess modeling is gaining

More information

An Approach to Optimized Resource Allocation for Cloud Simulation Platform

An Approach to Optimized Resource Allocation for Cloud Simulation Platform An Appoach to Optimized Resouce Allocation fo Cloud Simulation Platfom Haitao Yuan 1, Jing Bi 2, Bo Hu Li 1,3, Xudong Chai 3 1 School of Automation Science and Electical Engineeing, Beihang Univesity,

More information

Optimizing Content Retrieval Delay for LT-based Distributed Cloud Storage Systems

Optimizing Content Retrieval Delay for LT-based Distributed Cloud Storage Systems Optimizing Content Retieval Delay fo LT-based Distibuted Cloud Stoage Systems Haifeng Lu, Chuan Heng Foh, Yonggang Wen, and Jianfei Cai School of Compute Engineeing, Nanyang Technological Univesity, Singapoe

More information

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo (

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo ( Hubs, Bidges, and Switches Used fo extending LANs in tems of geogaphical coveage, numbe of nodes, administation capabilities, etc. Diffe in egads to: m collision domain isolation m laye at which they opeate

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations By Victo Avela White Pape #48 Executive Summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance the availability

More information

Adaptive Queue Management with Restraint on Non-Responsive Flows

Adaptive Queue Management with Restraint on Non-Responsive Flows Adaptive Queue Management wi Restaint on Non-Responsive Flows Lan Li and Gyungho Lee Depatment of Electical and Compute Engineeing Univesity of Illinois at Chicago 85 S. Mogan Steet Chicago, IL 667 {lli,

More information

An Efficient Group Key Agreement Protocol for Ad hoc Networks

An Efficient Group Key Agreement Protocol for Ad hoc Networks An Efficient Goup Key Ageement Potocol fo Ad hoc Netwoks Daniel Augot, Raghav haska, Valéie Issany and Daniele Sacchetti INRIA Rocquencout 78153 Le Chesnay Fance {Daniel.Augot, Raghav.haska, Valéie.Issany,

More information

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION Page 1 STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION C. Alan Blaylock, Hendeson State Univesity ABSTRACT This pape pesents an intuitive appoach to deiving annuity fomulas fo classoom use and attempts

More information

Tracking/Fusion and Deghosting with Doppler Frequency from Two Passive Acoustic Sensors

Tracking/Fusion and Deghosting with Doppler Frequency from Two Passive Acoustic Sensors Tacking/Fusion and Deghosting with Dopple Fequency fom Two Passive Acoustic Sensos Rong Yang, Gee Wah Ng DSO National Laboatoies 2 Science Pak Dive Singapoe 11823 Emails: yong@dso.og.sg, ngeewah@dso.og.sg

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations White Pape 48 Revision by Victo Avela > Executive summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance

More information

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years.

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years. 9.2 Inteest Objectives 1. Undestand the simple inteest fomula. 2. Use the compound inteest fomula to find futue value. 3. Solve the compound inteest fomula fo diffeent unknowns, such as the pesent value,

More information

Cloud Service Reliability: Modeling and Analysis

Cloud Service Reliability: Modeling and Analysis Cloud Sevice eliability: Modeling and Analysis Yuan-Shun Dai * a c, Bo Yang b, Jack Dongaa a, Gewei Zhang c a Innovative Computing Laboatoy, Depatment of Electical Engineeing & Compute Science, Univesity

More information

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor > PNN05-P762 < Reduced Patten Taining Based on Task Decomposition Using Patten Distibuto Sheng-Uei Guan, Chunyu Bao, and TseNgee Neo Abstact Task Decomposition with Patten Distibuto (PD) is a new task

More information

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing M13914 Questions & Answes Chapte 10 Softwae Reliability Pediction, Allocation and Demonstation Testing 1. Homewok: How to deive the fomula of failue ate estimate. λ = χ α,+ t When the failue times follow

More information

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN*

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN* Automatic Testing of Neighbo Discovey Potocol Based on FSM and TTCN* Zhiliang Wang, Xia Yin, Haibin Wang, and Jianping Wu Depatment of Compute Science, Tsinghua Univesity Beijing, P. R. China, 100084 Email:

More information

Over-encryption: Management of Access Control Evolution on Outsourced Data

Over-encryption: Management of Access Control Evolution on Outsourced Data Ove-encyption: Management of Access Contol Evolution on Outsouced Data Sabina De Capitani di Vimecati DTI - Univesità di Milano 26013 Cema - Italy decapita@dti.unimi.it Stefano Paaboschi DIIMM - Univesità

More information

The transport performance evaluation system building of logistics enterprises

The transport performance evaluation system building of logistics enterprises Jounal of Industial Engineeing and Management JIEM, 213 6(4): 194-114 Online ISSN: 213-953 Pint ISSN: 213-8423 http://dx.doi.og/1.3926/jiem.784 The tanspot pefomance evaluation system building of logistics

More information

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request.

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request. Retiement Benefit 1 Things to Remembe Complete all of the sections on the Retiement Benefit fom that apply to you equest. If this is an initial equest, and not a change in a cuent distibution, emembe to

More information

An Epidemic Model of Mobile Phone Virus

An Epidemic Model of Mobile Phone Virus An Epidemic Model of Mobile Phone Vius Hui Zheng, Dong Li, Zhuo Gao 3 Netwok Reseach Cente, Tsinghua Univesity, P. R. China zh@tsinghua.edu.cn School of Compute Science and Technology, Huazhong Univesity

More information

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers Concept and Expeiences on using a Wiki-based System fo Softwae-elated Semina Papes Dominik Fanke and Stefan Kowalewski RWTH Aachen Univesity, 52074 Aachen, Gemany, {fanke, kowalewski}@embedded.wth-aachen.de,

More information

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS ON THE R POLICY IN PRODUCTION-INVENTORY SYSTEMS Saifallah Benjaafa and Joon-Seok Kim Depatment of Mechanical Engineeing Univesity of Minnesota Minneapolis MN 55455 Abstact We conside a poduction-inventoy

More information

Scheduling Hadoop Jobs to Meet Deadlines

Scheduling Hadoop Jobs to Meet Deadlines Scheduling Hadoop Jobs to Meet Deadlines Kamal Kc, Kemafo Anyanwu Depatment of Compute Science Noth Caolina State Univesity {kkc,kogan}@ncsu.edu Abstact Use constaints such as deadlines ae impotant equiements

More information

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN Modeling and Veifying a Pice Model fo Congestion Contol in Compute Netwoks Using PROMELA/SPIN Clement Yuen and Wei Tjioe Depatment of Compute Science Univesity of Toonto 1 King s College Road, Toonto,

More information

Research on Risk Assessment of the Transformer Based on Life Cycle Cost

Research on Risk Assessment of the Transformer Based on Life Cycle Cost ntenational Jounal of Smat Gid and lean Enegy eseach on isk Assessment of the Tansfome Based on Life ycle ost Hui Zhou a, Guowei Wu a, Weiwei Pan a, Yunhe Hou b, hong Wang b * a Zhejiang Electic Powe opoation,

More information

Chapter 3 Savings, Present Value and Ricardian Equivalence

Chapter 3 Savings, Present Value and Ricardian Equivalence Chapte 3 Savings, Pesent Value and Ricadian Equivalence Chapte Oveview In the pevious chapte we studied the decision of households to supply hous to the labo maket. This decision was a static decision,

More information

An application of stochastic programming in solving capacity allocation and migration planning problem under uncertainty

An application of stochastic programming in solving capacity allocation and migration planning problem under uncertainty An application of stochastic pogamming in solving capacity allocation and migation planning poblem unde uncetainty Yin-Yann Chen * and Hsiao-Yao Fan Depatment of Industial Management, National Fomosa Univesity,

More information

Efficient Redundancy Techniques for Latency Reduction in Cloud Systems

Efficient Redundancy Techniques for Latency Reduction in Cloud Systems Efficient Redundancy Techniques fo Latency Reduction in Cloud Systems 1 Gaui Joshi, Emina Soljanin, and Gegoy Wonell Abstact In cloud computing systems, assigning a task to multiple seves and waiting fo

More information

Optimal Peer Selection in a Free-Market Peer-Resource Economy

Optimal Peer Selection in a Free-Market Peer-Resource Economy Optimal Pee Selection in a Fee-Maket Pee-Resouce Economy Micah Adle, Rakesh Kuma, Keith Ross, Dan Rubenstein, David Tune and David D Yao Dept of Compute Science Univesity of Massachusetts Amhest, MA; Email:

More information

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM Main Golub Faculty of Electical Engineeing and Computing, Univesity of Zageb Depatment of Electonics, Micoelectonics,

More information

An Infrastructure Cost Evaluation of Single- and Multi-Access Networks with Heterogeneous Traffic Density

An Infrastructure Cost Evaluation of Single- and Multi-Access Networks with Heterogeneous Traffic Density An Infastuctue Cost Evaluation of Single- and Multi-Access Netwoks with Heteogeneous Taffic Density Andes Fuuskä and Magnus Almgen Wieless Access Netwoks Eicsson Reseach Kista, Sweden [andes.fuuska, magnus.almgen]@eicsson.com

More information

Towards Realizing a Low Cost and Highly Available Datacenter Power Infrastructure

Towards Realizing a Low Cost and Highly Available Datacenter Power Infrastructure Towads Realizing a Low Cost and Highly Available Datacente Powe Infastuctue Siam Govindan, Di Wang, Lydia Chen, Anand Sivasubamaniam, and Bhuvan Ugaonka The Pennsylvania State Univesity. IBM Reseach Zuich

More information

Memory-Aware Sizing for In-Memory Databases

Memory-Aware Sizing for In-Memory Databases Memoy-Awae Sizing fo In-Memoy Databases Kasten Molka, Giuliano Casale, Thomas Molka, Laua Mooe Depatment of Computing, Impeial College London, United Kingdom {k.molka3, g.casale}@impeial.ac.uk SAP HANA

More information

SUPPORT VECTOR MACHINE FOR BANDWIDTH ANALYSIS OF SLOTTED MICROSTRIP ANTENNA

SUPPORT VECTOR MACHINE FOR BANDWIDTH ANALYSIS OF SLOTTED MICROSTRIP ANTENNA Intenational Jounal of Compute Science, Systems Engineeing and Infomation Technology, 4(), 20, pp. 67-7 SUPPORT VECTOR MACHIE FOR BADWIDTH AALYSIS OF SLOTTED MICROSTRIP ATEA Venmathi A.R. & Vanitha L.

More information

Database Management Systems

Database Management Systems Contents Database Management Systems (COP 5725) D. Makus Schneide Depatment of Compute & Infomation Science & Engineeing (CISE) Database Systems Reseach & Development Cente Couse Syllabus 1 Sping 2012

More information

High Availability Replication Strategy for Deduplication Storage System

High Availability Replication Strategy for Deduplication Storage System Zhengda Zhou, Jingli Zhou College of Compute Science and Technology, Huazhong Univesity of Science and Technology, *, zhouzd@smail.hust.edu.cn jlzhou@mail.hust.edu.cn Abstact As the amount of digital data

More information

Timing Synchronization in High Mobility OFDM Systems

Timing Synchronization in High Mobility OFDM Systems Timing Synchonization in High Mobility OFDM Systems Yasamin Mostofi Depatment of Electical Engineeing Stanfod Univesity Stanfod, CA 94305, USA Email: yasi@wieless.stanfod.edu Donald C. Cox Depatment of

More information

THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION

THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION IADIS Intenational Confeence Applied Computing 2006 THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION Jög Roth Univesity of Hagen 58084 Hagen, Gemany Joeg.Roth@Fenuni-hagen.de ABSTRACT

More information

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates 9:6.4 INITIAL PUBLIC OFFERINGS 9:6.4 Sample Questions/Requests fo Managing Undewite Candidates Recent IPO Expeience Please povide a list of all completed o withdawn IPOs in which you fim has paticipated

More information

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods A famewok fo the selection of entepise esouce planning (ERP) system based on fuzzy decision making methods Omid Golshan Tafti M.s student in Industial Management, Univesity of Yazd Omidgolshan87@yahoo.com

More information

An Analysis of Manufacturer Benefits under Vendor Managed Systems

An Analysis of Manufacturer Benefits under Vendor Managed Systems An Analysis of Manufactue Benefits unde Vendo Managed Systems Seçil Savaşaneil Depatment of Industial Engineeing, Middle East Technical Univesity, 06531, Ankaa, TURKEY secil@ie.metu.edu.t Nesim Ekip 1

More information

Distributed Computing and Big Data: Hadoop and MapReduce

Distributed Computing and Big Data: Hadoop and MapReduce Distibuted Computing and Big Data: Hadoop and Map Bill Keenan, Diecto Tey Heinze, Achitect Thomson Reutes Reseach & Development Agenda R&D Oveview Hadoop and Map Oveview Use Case: Clusteing Legal Documents

More information

A Comparative Analysis of Data Center Network Architectures

A Comparative Analysis of Data Center Network Architectures A Compaative Analysis of Data Cente Netwok Achitectues Fan Yao, Jingxin Wu, Guu Venkataamani, Suesh Subamaniam Depatment of Electical and Compute Engineeing, The Geoge Washington Univesity, Washington,

More information

Self-Adaptive and Resource-Efficient SLA Enactment for Cloud Computing Infrastructures

Self-Adaptive and Resource-Efficient SLA Enactment for Cloud Computing Infrastructures 2012 IEEE Fifth Intenational Confeence on Cloud Computing Self-Adaptive and Resouce-Efficient SLA Enactment fo Cloud Computing Infastuctues Michael Maue, Ivona Bandic Distibuted Systems Goup Vienna Univesity

More information

Ilona V. Tregub, ScD., Professor

Ilona V. Tregub, ScD., Professor Investment Potfolio Fomation fo the Pension Fund of Russia Ilona V. egub, ScD., Pofesso Mathematical Modeling of Economic Pocesses Depatment he Financial Univesity unde the Govenment of the Russian Fedeation

More information

Continuous Compounding and Annualization

Continuous Compounding and Annualization Continuous Compounding and Annualization Philip A. Viton Januay 11, 2006 Contents 1 Intoduction 1 2 Continuous Compounding 2 3 Pesent Value with Continuous Compounding 4 4 Annualization 5 5 A Special Poblem

More information

Top K Nearest Keyword Search on Large Graphs

Top K Nearest Keyword Search on Large Graphs Top K Neaest Keywod Seach on Lage Gaphs Miao Qiao, Lu Qin, Hong Cheng, Jeffey Xu Yu, Wentao Tian The Chinese Univesity of Hong Kong, Hong Kong, China {mqiao,lqin,hcheng,yu,wttian}@se.cuhk.edu.hk ABSTRACT

More information

Towards Automatic Update of Access Control Policy

Towards Automatic Update of Access Control Policy Towads Automatic Update of Access Contol Policy Jinwei Hu, Yan Zhang, and Ruixuan Li Intelligent Systems Laboatoy, School of Computing and Mathematics Univesity of Westen Sydney, Sydney 1797, Austalia

More information

Uncertain Version Control in Open Collaborative Editing of Tree-Structured Documents

Uncertain Version Control in Open Collaborative Editing of Tree-Structured Documents Uncetain Vesion Contol in Open Collaboative Editing of Tee-Stuctued Documents M. Lamine Ba Institut Mines Télécom; Télécom PaisTech; LTCI Pais, Fance mouhamadou.ba@ telecom-paistech.f Talel Abdessalem

More information

IBM Research Smarter Transportation Analytics

IBM Research Smarter Transportation Analytics IBM Reseach Smate Tanspotation Analytics Laua Wynte PhD, Senio Reseach Scientist, IBM Watson Reseach Cente lwynte@us.ibm.com INSTRUMENTED We now have the ability to measue, sense and see the exact condition

More information

An Energy Efficient and Accurate Slot Synchronization Scheme for Wireless Sensor Networks

An Energy Efficient and Accurate Slot Synchronization Scheme for Wireless Sensor Networks An Enegy Efficient and Accuate Slot Synchonization Scheme fo Wieless Senso Netwoks Lillian Dai Pithwish asu Jason Redi N Technologies, 0 Moulton St., Cambidge, MA 038 ldai@bbn.com pbasu@bbn.com edi@bbn.com

More information

ENABLING INFORMATION GATHERING PATTERNS FOR EMERGENCY RESPONSE WITH THE OPENKNOWLEDGE SYSTEM

ENABLING INFORMATION GATHERING PATTERNS FOR EMERGENCY RESPONSE WITH THE OPENKNOWLEDGE SYSTEM Computing and Infomatics, Vol. 29, 2010, 537 555 ENABLING INFORMATION GATHERING PATTERNS FOR EMERGENCY RESPONSE WITH THE OPENKNOWLEDGE SYSTEM Gaia Tecaichi, Veonica Rizzi, Mauizio Machese Depatment of

More information

How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database

How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database AnswesThatWok TM Recoveing Emails and Mailboxes fom a PRIV1.EDB Exchange 2003 IS database How to ecove you Exchange 2003/2007 mailboxes and emails if all you have available ae you PRIV1.EDB and PRIV1.STM

More information

Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication

Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication I²MTC 2008 IEEE Intenational Instumentation and Measuement Technology Confeence Victoia, Vancouve Island, Canada, May 12 15, 2008 Powe Monitoing and Contol fo Electic Home Appliances Based on Powe Line

More information

Chapter 2 Valiant Load-Balancing: Building Networks That Can Support All Traffic Matrices

Chapter 2 Valiant Load-Balancing: Building Networks That Can Support All Traffic Matrices Chapte 2 Valiant Load-Balancing: Building etwoks That Can Suppot All Taffic Matices Rui Zhang-Shen Abstact This pape is a bief suvey on how Valiant load-balancing (VLB) can be used to build netwoks that

More information

Approximation Algorithms for Data Management in Networks

Approximation Algorithms for Data Management in Networks Appoximation Algoithms fo Data Management in Netwoks Chistof Kick Heinz Nixdof Institute and Depatment of Mathematics & Compute Science adebon Univesity Gemany kueke@upb.de Haald Räcke Heinz Nixdof Institute

More information

AMB111F Financial Maths Notes

AMB111F Financial Maths Notes AMB111F Financial Maths Notes Compound Inteest and Depeciation Compound Inteest: Inteest computed on the cuent amount that inceases at egula intevals. Simple inteest: Inteest computed on the oiginal fixed

More information

Chris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment

Chris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment Chis J. Skinne The pobability of identification: applying ideas fom foensic statistics to disclosue isk assessment Aticle (Accepted vesion) (Refeeed) Oiginal citation: Skinne, Chis J. (2007) The pobability

More information

Office of Family Assistance. Evaluation Resource Guide for Responsible Fatherhood Programs

Office of Family Assistance. Evaluation Resource Guide for Responsible Fatherhood Programs Office of Family Assistance Evaluation Resouce Guide fo Responsible Fathehood Pogams Contents Intoduction........................................................ 4 Backgound..........................................................

More information

Exam #1 Review Answers

Exam #1 Review Answers xam #1 Review Answes 1. Given the following pobability distibution, calculate the expected etun, vaiance and standad deviation fo Secuity J. State Pob (R) 1 0.2 10% 2 0.6 15 3 0.2 20 xpected etun = 0.2*10%

More information

Channel selection in e-commerce age: A strategic analysis of co-op advertising models

Channel selection in e-commerce age: A strategic analysis of co-op advertising models Jounal of Industial Engineeing and Management JIEM, 013 6(1):89-103 Online ISSN: 013-0953 Pint ISSN: 013-843 http://dx.doi.og/10.396/jiem.664 Channel selection in e-commece age: A stategic analysis of

More information

Development of Mathematical Model for Market-Oriented Cloud Computing

Development of Mathematical Model for Market-Oriented Cloud Computing Intenational Jounal of Compute Applications (0975 8887) Volume 9 No.11, Novembe 2010 Development of Mathematical Model fo Maket-Oiented Cloud Computing K.Mukhejee Depatment of Compute Science & Engineeing.

More information

Multiband Microstrip Patch Antenna for Microwave Applications

Multiband Microstrip Patch Antenna for Microwave Applications IOSR Jounal of Electonics and Communication Engineeing (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 3, Issue 5 (Sep. - Oct. 2012), PP 43-48 Multiband Micostip Patch Antenna fo Micowave Applications

More information

Ignorance is not bliss when it comes to knowing credit score

Ignorance is not bliss when it comes to knowing credit score NET GAIN Scoing points fo you financial futue AS SEEN IN USA TODAY SEPTEMBER 28, 2004 Ignoance is not bliss when it comes to knowing cedit scoe By Sanda Block USA TODAY Fom Alabama comes eassuing news

More information

Data Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation

Data Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation (213) 1 28 Data Cente Demand Response: Avoiding the Coincident Peak via Wokload Shifting and Local Geneation Zhenhua Liu 1, Adam Wieman 1, Yuan Chen 2, Benjamin Razon 1, Niangjun Chen 1 1 Califonia Institute

More information

Analyzing Ballistic Missile Defense System Effectiveness Based on Functional Dependency Network Analysis

Analyzing Ballistic Missile Defense System Effectiveness Based on Functional Dependency Network Analysis Send Odes fo Repints to epints@benthamscience.ae 678 The Open Cybenetics & Systemics Jounal, 2015, 9, 678-682 Open Access Analyzing Ballistic Missile Defense System Effectiveness Based on Functional Dependency

More information

Financial Derivatives for Computer Network Capacity Markets with Quality-of-Service Guarantees

Financial Derivatives for Computer Network Capacity Markets with Quality-of-Service Guarantees Financial Deivatives fo Compute Netwok Capacity Makets with Quality-of-Sevice Guaantees Pette Pettesson pp@kth.se Febuay 2003 SICS Technical Repot T2003:03 Keywods Netwoking and Intenet Achitectue. Abstact

More information

Mining Relatedness Graphs for Data Integration

Mining Relatedness Graphs for Data Integration Mining Relatedness Gaphs fo Data Integation Jeemy T. Engle (jtengle@indiana.edu) Ying Feng (yingfeng@indiana.edu) Robet L. Goldstone (goldsto@indiana.edu) Indiana Univesity Bloomington, IN. 47405 USA Abstact

More information

YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH

YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH nd INTERNATIONAL TEXTILE, CLOTHING & ESIGN CONFERENCE Magic Wold of Textiles Octobe 03 d to 06 th 004, UBROVNIK, CROATIA YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH Jana VOBOROVA; Ashish GARG; Bohuslav

More information

The Impact of Radio Propagation Models on Ad Hoc Networks Performances

The Impact of Radio Propagation Models on Ad Hoc Networks Performances Jounal of Compute Science 8 (5): 752-760, 2012 ISSN 1549-3636 2012 Science Publications The Impact of Radio Popagation Models on Ad Hoc Netwoks Pefomances 1 Rhattoy, A. and 2 A. Zatni 1 Depatment of Compute,

More information

Modal Characteristics study of CEM-1 Single-Layer Printed Circuit Board Using Experimental Modal Analysis

Modal Characteristics study of CEM-1 Single-Layer Printed Circuit Board Using Experimental Modal Analysis Available online at www.sciencediect.com Pocedia Engineeing 41 (2012 ) 1360 1366 Intenational Symposium on Robotics and Intelligent Sensos 2012 (IRIS 2012) Modal Chaacteistics study of CEM-1 Single-Laye

More information

The Detection of Obstacles Using Features by the Horizon View Camera

The Detection of Obstacles Using Features by the Horizon View Camera The Detection of Obstacles Using Featues b the Hoizon View Camea Aami Iwata, Kunihito Kato, Kazuhiko Yamamoto Depatment of Infomation Science, Facult of Engineeing, Gifu Univesit aa@am.info.gifu-u.ac.jp

More information

Supporting Efficient Top-k Queries in Type-Ahead Search

Supporting Efficient Top-k Queries in Type-Ahead Search Suppoting Efficient Top-k Queies in Type-Ahead Seach Guoliang Li Jiannan Wang Chen Li Jianhua Feng Depatment of Compute Science, Tsinghua National Laboatoy fo Infomation Science and Technology (TNList),

More information

Electricity transmission network optimization model of supply and demand the case in Taiwan electricity transmission system

Electricity transmission network optimization model of supply and demand the case in Taiwan electricity transmission system Electicity tansmission netwok optimization model of supply and demand the case in Taiwan electicity tansmission system Miao-Sheng Chen a Chien-Liang Wang b,c, Sheng-Chuan Wang d,e a Taichung Banch Gaduate

More information

Evaluating the impact of Blade Server and Virtualization Software Technologies on the RIT Datacenter

Evaluating the impact of Blade Server and Virtualization Software Technologies on the RIT Datacenter Evaluating the impact of and Vitualization Softwae Technologies on the RIT Datacente Chistophe M Butle Vitual Infastuctue Administato Rocheste Institute of Technology s Datacente Contact: chis.butle@it.edu

More information

Give me all I pay for Execution Guarantees in Electronic Commerce Payment Processes

Give me all I pay for Execution Guarantees in Electronic Commerce Payment Processes Give me all I pay fo Execution Guaantees in Electonic Commece Payment Pocesses Heiko Schuldt Andei Popovici Hans-Jög Schek Email: Database Reseach Goup Institute of Infomation Systems ETH Zentum, 8092

More information

The impact of migration on the provision. of UK public services (SRG.10.039.4) Final Report. December 2011

The impact of migration on the provision. of UK public services (SRG.10.039.4) Final Report. December 2011 The impact of migation on the povision of UK public sevices (SRG.10.039.4) Final Repot Decembe 2011 The obustness The obustness of the analysis of the is analysis the esponsibility is the esponsibility

More information

STABILITY ANALYSIS IN MILLING BASED ON OPERATIONAL MODAL DATA 1. INTRODUCTION

STABILITY ANALYSIS IN MILLING BASED ON OPERATIONAL MODAL DATA 1. INTRODUCTION Jounal of Machine Engineeing, Vol. 11, No. 4, 211 Batosz POWALKA 1 Macin CHODZKO 1 Kzysztof JEMIELNIAK 2 milling, chatte, opeational modal analysis STABILITY ANALYSIS IN MILLING BASED ON OPERATIONAL MODAL

More information

Gravitational Mechanics of the Mars-Phobos System: Comparing Methods of Orbital Dynamics Modeling for Exploratory Mission Planning

Gravitational Mechanics of the Mars-Phobos System: Comparing Methods of Orbital Dynamics Modeling for Exploratory Mission Planning Gavitational Mechanics of the Mas-Phobos System: Compaing Methods of Obital Dynamics Modeling fo Exploatoy Mission Planning Alfedo C. Itualde The Pennsylvania State Univesity, Univesity Pak, PA, 6802 This

More information

FXA 2008. Candidates should be able to : Describe how a mass creates a gravitational field in the space around it.

FXA 2008. Candidates should be able to : Describe how a mass creates a gravitational field in the space around it. Candidates should be able to : Descibe how a mass ceates a gavitational field in the space aound it. Define gavitational field stength as foce pe unit mass. Define and use the peiod of an object descibing

More information

Alarm transmission through Radio and GSM networks

Alarm transmission through Radio and GSM networks Alam tansmission though Radio and GSM netwoks 2015 Alam tansmission though Radio netwok RR-IP12 RL10 E10C E10C LAN RL1 0 R11 T10 (T10U) Windows MONAS MS NETWORK MCI > GNH > GND > +E > DATA POWER DATA BUS

More information

A Hybrid DCT-SVD Video Compression Technique (HDCTSVD)

A Hybrid DCT-SVD Video Compression Technique (HDCTSVD) A Hybid - Video Compession echnique (H) ong, Lin; Rao, K.R. Abstact A new hybid - (H) video compession technique is poposed in this pape. Discete cosine tansfom () is widely used in video coding due to

More information

Peer-to-Peer File Sharing Game using Correlated Equilibrium

Peer-to-Peer File Sharing Game using Correlated Equilibrium Pee-to-Pee File Shaing Game using Coelated Equilibium Beibei Wang, Zhu Han, and K. J. Ray Liu Depatment of Electical and Compute Engineeing and Institute fo Systems Reseach, Univesity of Mayland, College

More information

30 H. N. CHIU 1. INTRODUCTION. Recherche opérationnelle/operations Research

30 H. N. CHIU 1. INTRODUCTION. Recherche opérationnelle/operations Research RAIRO Rech. Opé. (vol. 33, n 1, 1999, pp. 29-45) A GOOD APPROXIMATION OF THE INVENTORY LEVEL IN A(Q ) PERISHABLE INVENTORY SYSTEM (*) by Huan Neng CHIU ( 1 ) Communicated by Shunji OSAKI Abstact. This

More information

who supply the system vectors for their JVM products. 1 HBench:Java will work best with support from JVM vendors

who supply the system vectors for their JVM products. 1 HBench:Java will work best with support from JVM vendors Appeaed in the ACM Java Gande 2000 Confeence, San Fancisco, Califonia, June 3-5, 2000 HBench:Java: An Application-Specific Benchmaking Famewok fo Java Vitual Machines Xiaolan Zhang Mago Seltze Division

More information

MATHEMATICAL SIMULATION OF MASS SPECTRUM

MATHEMATICAL SIMULATION OF MASS SPECTRUM MATHEMATICA SIMUATION OF MASS SPECTUM.Beánek, J.Knížek, Z. Pulpán 3, M. Hubálek 4, V. Novák Univesity of South Bohemia, Ceske Budejovice, Chales Univesity, Hadec Kalove, 3 Univesity of Hadec Kalove, Hadec

More information

Transmittal 198 Date: DECEMBER 9, 2005. SUBJECT: Termination of the Existing Eligibility-File Based Crossover Process at All Medicare Contractors

Transmittal 198 Date: DECEMBER 9, 2005. SUBJECT: Termination of the Existing Eligibility-File Based Crossover Process at All Medicare Contractors anual ystem Depatment of ealth & uman evices (D) entes fo edicae & Pub 100-20 One-Time Notification edicaid evices () Tansmittal 198 Date: DEEBE 9, 2005 hange equest 4231 UBJET: Temination of the Existing

More information

An Introduction to Omega

An Introduction to Omega An Intoduction to Omega Con Keating and William F. Shadwick These distibutions have the same mean and vaiance. Ae you indiffeent to thei isk-ewad chaacteistics? The Finance Development Cente 2002 1 Fom

More information

883 Brochure A5 GENE ss vernis.indd 1-2

883 Brochure A5 GENE ss vernis.indd 1-2 ess x a eu / u e a. p o.eu c e / :/ http EURAXESS Reseaches in Motion is the gateway to attactive eseach caees in Euope and to a pool of wold-class eseach talent. By suppoting the mobility of eseaches,

More information

Faithful Comptroller s Handbook

Faithful Comptroller s Handbook Faithful Comptolle s Handbook Faithful Comptolle s Handbook Selection of Faithful Comptolle The Laws govening the Fouth Degee povide that the faithful comptolle be elected, along with the othe offices

More information

Secure Smartcard-Based Fingerprint Authentication

Secure Smartcard-Based Fingerprint Authentication Secue Smatcad-Based Fingepint Authentication [full vesion] T. Chales Clancy Compute Science Univesity of Mayland, College Pak tcc@umd.edu Nega Kiyavash, Dennis J. Lin Electical and Compute Engineeing Univesity

More information

Lab #7: Energy Conservation

Lab #7: Energy Conservation Lab #7: Enegy Consevation Photo by Kallin http://www.bungeezone.com/pics/kallin.shtml Reading Assignment: Chapte 7 Sections 1,, 3, 5, 6 Chapte 8 Sections 1-4 Intoduction: Pehaps one of the most unusual

More information

Epdf Sulf petroleum, Eflecti and Eeflecti

Epdf Sulf petroleum, Eflecti and Eeflecti ANALYSIS OF GLOBAL WARMING MITIGATION BY WHITE REFLECTING SURFACES Fedeico Rossi, Andea Nicolini Univesity of Peugia, CIRIAF Via G.Duanti 67 0615 Peugia, Italy T: +9-075-585846; F: +9-075-5848470; E: fossi@unipg.it

More information

Research Article A Reputation-Based Identity Management Model for Cloud Computing

Research Article A Reputation-Based Identity Management Model for Cloud Computing Mathematical Poblems in Engineeing Volume 2015, Aticle ID 238245, 15 pages http://dx.doi.og/10.1155/2015/238245 Reseach Aticle A Reputation-Based Identity Management Model fo Cloud Computing Lifa Wu, 1

More information

A Two-Step Tabu Search Heuristic for Multi-Period Multi-Site Assignment Problem with Joint Requirement of Multiple Resource Types

A Two-Step Tabu Search Heuristic for Multi-Period Multi-Site Assignment Problem with Joint Requirement of Multiple Resource Types Aticle A Two-Step Tabu Seach Heuistic fo Multi-Peiod Multi-Site Assignment Poblem with Joint Requiement of Multiple Resouce Types Siavit Swangnop and Paveena Chaovalitwongse* Depatment of Industial Engineeing,

More information

Model-Driven Engineering of Adaptation Engines for Self-Adaptive Software: Executable Runtime Megamodels

Model-Driven Engineering of Adaptation Engines for Self-Adaptive Software: Executable Runtime Megamodels Model-Diven Engineeing of Adaptation Engines fo Self-Adaptive Softwae: Executable Runtime Megamodels Thomas Vogel, Holge Giese Technische Beichte N. 66 des Hasso-Plattne-Instituts fü Softwaesystemtechnik

More information

Promised Lead-Time Contracts Under Asymmetric Information

Promised Lead-Time Contracts Under Asymmetric Information OPERATIONS RESEARCH Vol. 56, No. 4, July August 28, pp. 898 915 issn 3-364X eissn 1526-5463 8 564 898 infoms doi 1.1287/ope.18.514 28 INFORMS Pomised Lead-Time Contacts Unde Asymmetic Infomation Holly

More information

Multicriteria analysis in telecommunications

Multicriteria analysis in telecommunications Poceedings of the 37th Hawaii Intenational Confeence on System Sciences - 2004 Multiciteia analysis in telecommunications Janusz Ganat and Andze P. Wiezbicki National Institute of Telecommunications Szachowa

More information

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it AnswesThatWok TM How to set up a RAID1 mio with a dive which aleady has Windows installed How to ceate RAID 1 mioing with a had disk that aleady has data o an opeating system on it Date Company PC / Seve

More information