Response Time versus Utilization in Scheduler Overhead Accounting

Size: px
Start display at page:

Download "Response Time versus Utilization in Scheduler Overhead Accounting"

Transcription

1 Response Time versus Utiization in Scheduer Overhead Accounting Siviu S. Craciunas Christoph M. Kirsch Ana Sokoova Department of Computer Sciences University of Sazburg, Austria Emai: Abstract We propose two compementary methods to account for scheduer overhead in the scheduabiity anaysis of Variabe Bandwidth Servers (VBS), which contro process execution speed by aocating variabe CPU bandwidth to processes. Scheduer overhead in VBS may be accounted for either by decreasing process execution speed to maintain CPU utiization (caed response accounting), or by increasing CPU utiization to maintain process execution speed (caed utiization accounting). Both methods can be combined by handing an arbitrary fraction of the tota scheduer overhead with one method and the rest with the other. Distinguishing scheduer overhead due to reeasing and due to suspending processes aows us to further improve our anaysis by accounting for reeasing overhead in a separate, virtua VBS process. Athough our anaysis is based on the VBS mode, the genera idea of response and utiization accounting may aso be appied to other, reated scheduing methods. I. INTRODUCTION We study scheduer overhead accounting in the scheduabiity anaysis of Variabe Bandwidth Servers (VBS) [1], [2]. VBS are a generaization of Constant Bandwidth Servers (CBS) [3]. A CBS aocates a constant fraction of CPU time to a process (the server bandwidth) at a constant granuarity (the server period). Mutipe CBS processes are EDF-schedued using the server periods as deadines. A VBS is simiar to a CBS but aso aows the process to change its execution speed at any time, i.e., change both server bandwidth and server period, as ong as the resuting CPU utiization remains under a given bandwidth cap. The portion of process code from a change in speed to the next is caed an action. A VBS process is therefore a sequence of actions. The tota time to execute an action is expicity modeed and caed the response time of the action. The key resut of VBS is that, for each action of a VBS process, there exist ower and upper bounds on response times and thus aso on jitter that are independent of any other concurrenty executing VBS processes, as ong as system utiization (the sum of a bandwidth caps) is ess than or equa to 100% [1], [2] (Section III). This paper generaizes the VBS scheduing resut by incuding the overhead of scheduer execution. We first determine an upper bound on the number of scheduer invocations that may occur during a given amount of time (Section IV). This is possibe because process reease and suspend times are known in VBS. We then show that there are two compementary methods to account for scheduer overhead, either by Supported by the EU ArtistDesign Network of Exceence on Embedded Systems Design and the Austrian Science Funds P18913-N15 and V decreasing the speed at which processes run to maintain CPU utiization (caed response accounting), or by increasing CPU utiization to maintain the speed at which processes run (caed utiization accounting). Response accounting decreases the net server bandwidth avaiabe to a process by dedicating some of its bandwidth to the scheduer. Utiization accounting increases the server bandwidth to maintain the net bandwidth avaiabe to a process. In other words, with utiization accounting, the bounds on response times are maintained whie CPU utiization is increased whereas, with response accounting, the upper bounds on response times and thus on jitter are increased whie utiization is maintained. Both methods can be combined by handing an arbitrary fraction of the tota scheduer overhead with one method and the rest with the other. We aso show, by exampe, that the fraction may be chosen within server- and process-dependent intervas such that CPU utiization decreases whie the response-time bounds and thus the speed at which processes run remain the same (Section V). Next, we observe that there is a natura division of the VBS scheduer overhead into overhead due to reeasing and due to suspending processes. Moreover, we note that our previousy mentioned upper bound on the number of scheduer invocations can be improved for the scheduer invocations due to reeasing processes by accounting for them in a separate, virtua VBS process instead of the given VBS processes (Section VI). The virtua process is then accounted for in increased CPU utiization. The remaining overhead due to suspending processes may then be accounted for in either more increased CPU utiization, or increased response-time bounds and thus decreased speed at which processes run. The former method is pure utiization accounting, the atter method is combined accounting. Pure response accounting does not appy here. Up unti this point we have assumed that there is a constant upper bound on the execution time of any scheduer invocation. The VBS scheduing agorithm itsef is indeed constanttime. Even queue management in VBS can be done in constant time. However, our VBS impementation features a pugin architecture for queue management so that other pugins with non-constant-time compexity (but ess space compexity) can be used. In addition to the constant-time pugin, there are aso a ist-based, quadratic-time and an array-based, inear-time pugin (in the number of processes) [1], [2]. Our method can readiy be generaized to account for non-constant scheduer overhead.

2 We present the resuts of severa experiments that measure the accuracy of the estimated number of scheduer invocations (Section VII) and concude the paper (Section VIII). Note that, athough our anaysis is based on the VBS mode, the genera idea of response and utiization accounting may aso be appied to CBS as we as to RBED [4], which is another rate-based scheduer cosey reated to VBS. Reated work is discussed next in more detai. II. RELATED WORK We first put Variabe Bandwidth Servers (VBS) [1], [2] in the context of earier work on scheduing. We then identify exampes of response and utiization accounting in reated work on scheduer overhead. We aso acknowedge previous work on a wider range of issues deaing with genera system overhead. The Generaized Processor Sharing (GPS) approach introduced an ideaized mode of resources for fair scheduing based on the assumption that resource capacities are infinitey divisibe [5]. Proportiona-share agorithms (PSA) such as [6] approximate GPS using quantum-based CPU scheduing techniques. Constant Bandwidth Servers (CBS) [3] are reated to PSA [7] but aocate a constant fraction of CPU time to each process (server bandwidth) at a constant granuarity (server period). VBS is a generaization of CBS that aows processes to change their servers bandwidth and period (aso caed virtua periodic resource, or resource reservation [8]) at runtime as ong as the CPU capacity is not exceeded. VBS is cosey reated to RBED, which is a rate-based scheduer extending resource reservations for hard rea-time, soft rea-time, and best effort processes [4]. Like VBS, RBED uses EDF scheduing and aows dynamic bandwidth and rate adjustments. Whie the capabiities are simiar, RBED and VBS differ in the eve of abstraction they provide. In VBS we mode processes as sequences of actions to quantify the response times of portions of process code, where each transition from one action to the next marks an adjustment in bandwidth and rate. Other scheduing techniques reated to VBS incude eastic scheduing [9], handing of quaity of service [10] and overoad scenarios [11], and runtime server reconfiguration in CBS using benefit functions [12]. Next, we identify exampes of response and utiization accounting in reated work deaing with scheduer overhead. In [13], given a set of dynamicay schedued periodic interrupts and tasks, interrupt hander overhead is accounted for in the processor demand of the tasks (reated to utiization accounting). In [14], given a set of periodic tasks, so-caed expicit overhead through system cas invoked by task code is accounted for in the worst-case execution times of tasks (response accounting) and so-caed impicit overhead through scheduer invocations and interrupts is accounted for in CPU utiization (utiization accounting). In [15], given a set of periodic tasks, interrupt and fixed-priority scheduing overhead is accounted for in the response times of the tasks (response accounting). In [16], given a CBS system, scheduer overhead due to suspending processes is accounted for in response-time bounds of so-caed jobs (response accounting). The responsetime bounds are tighter than ours expoiting the fact that server parameters cannot be changed and scheduer invocations due to reeasing processes are not considered. Note that our contribution is not ony scheduer overhead accounting for VBS, but aso recognizing conceptua principes and trade-offs that have ead us to a unifying approach. In a wider context, exampes of previous work deaing with genera system overhead are an anaysis of event- and time-driven impementations of fixed-priority scheduing [17], agorithms to compute the number of preemptions in sets of periodic, DM- and EDF-schedued tasks [18], and a study of RM and EDF scheduing that incudes a comparison of context-switching overhead [19]. There is aso work on reducing context-switching overhead through a modified fixedpriority scheduer [20] and on reducing the number of preemptions in fixed-priority scheduing without modifying the scheduer [21]. The effects of cache-reated preemption deays on the execution time of processes are anayzed in [22] and [23]. III. VBS SCHEDULING We have introduced VBS scheduing in previous work [1], [2]. Here, we briefy reca the necessary definitions and resuts. A variabe bandwidth server (VBS) is an extension of a constant bandwidth server (CBS) where throughput and atency of process execution can vary in time under certain restrictions. Given a virtua periodic resource [24], defined as a pair of a period and a imit (with bandwidth equa to the ratio of imit over period), a CBS executes a singe process no more than the amount of time given by the resource imit in every time interva given by the resource period. A VBS may vary the virtua periodic resource (change the resource periods and imits), as ong as the bandwidth does not exceed a predefined bandwidth cap. A process running on a VBS can initiate a resource switch at any time. The process code from one switch to the next is caed a process action. The execution of a process is thus potentiay an unbounded sequence of actions. In practice each action can be seen as a piece of sequentia code that has a virtua resource associated with it. We impemented a VBS-based scheduing agorithm [1], [2], with four aternative queue management pugins based on ists, arrays, matrices, and trees. The pugins aow trading-off time and space compexity. A. Process Mode A process P (u) corresponding to a VBS with utiization u is a finite or infinite sequence of actions, P (u) α 0 α 1 α 2... for α i Act, where Act N R, with R being the finite set of virtua periodic resources [24], expained beow. An action α Act is a pair α (, R) where (for oad) is a natura number which denotes the exact amount of time the process wi perform the action on the virtua periodic resource R. The oad of an action can be understood as the worst-case execution time of the piece of code that constitutes

3 eary strategy ate strategy a i r i a i r c i i f i c i fi 24 ms ms Fig. 1. Scheduing an action α i with oad i 5 using both reease strategies, where i 2 and π i 4 the action. The virtua periodic resource R is a pair R (, π) of natura numbers with π, where denotes the imit and π the period of the resource. The imit specifies the maximum amount of time the process P can execute on the virtua periodic resource within the period π, whie performing the action α. The utiization of R is u R π u. B. Scheduabiity anaysis without overhead Let P be a finite set of processes. A schedue for P is a partia function σ : N P from the time domain to the set of processes. The function σ assigns to each moment in time a process that is running in the time interva [t, t + 1). If no process runs in the interva [t, t + 1) then σ(t) is undefined. Any scheduer σ of VBS processes determines a unique function σ R : N P R that specifies which virtua periodic resource is used by the running process. We are ony interested in we-behaved schedues with the property that for any process P P, any resource R R with R (, π), and any natura number k N {t [kπ, (k + 1)π) σ R (t) (P, R)}. Hence, in such a we-behaved schedue, the process P uses the resource R at most units of time per period of time π. Our scheduing agorithm produces we-behaved schedues. For each process action α i we denote the foowing absoute moments in time, which are aso depicted in Figure 1: Arriva time a i of the action α i is the time instant at which the previous action of the same process has finished. The first action of a process has zero arriva time. Competion time c i of the action α i is the time at which the action competes its execution. It is cacuated as c i min {c N i {t [a i, c) σ(t) P } }. Termination or finishing time f i of the action α i is the time at which the action terminates or finishes its execution, f i c i. We adopt the foowing termination strategy: The termination time is at the end of the period within which the action has competed. Reease time r i is the eariest time when α i can be schedued, r i a i. As shown in Figure 1, we consider two reease strategies. In the eary reease strategy r i a i, i.e., the process is reeased immediatey upon arriva with a fraction of its imit computed for the remaining interva unti the period ends. The ate reease strategy deays the reease of an action unti the beginning of the next period. The eary reease strategy may improve average response times. The schedued response time s i of the action α i under the scheduer σ is the difference between the finishing time and the arriva time, i.e., s i f i a i. We digress at this point for a brief eaboration on the type of tasks that are generated by VBS processes, which are used to prove the VBS scheduabiity resut. Let τ (r, e, d) be an aperiodic task with reease time r, execution duration e, and deadine d. We say that τ has type (, π) where and π are natura numbers, π, if the foowing conditions hod: d (n + 1)π for a natura number n such that r [nπ, (n + 1)π), and e (d r) π. The task type (, π) represents a virtua periodic task which we use in order to impose a bound on the aperiodic task τ. If the reease of τ is at time nπ, the execution duration e is imited by. Otherwise, if the reease is not at an instance of the period π, the execution duration is adjusted so that the task τ has utiization factor at most π over the interva [r, d]. Let S be a finite set of task types. Let I be a finite index set, and consider a set of tasks with the properties: {τ (r, e, d ) i I, j 0} Each τ has a type in S. We wi write (, ) for the type of τ. The tasks with the same first index are reeased in a sequence, i.e., r +1 d and r i,0 0. We refer to such a set as a typed set of tasks. Lemma 1 ([2]): Let {τ i I, j 0} be a typed set of tasks. If i I max j 0 1, then this set of tasks is scheduabe using the EDF strategy at any point of time, so that each task meets its deadine. The proof of Lemma 1 foows the standard periodic EDF proof of sufficiency with the addition that the periods of the tasks may change in time. The fu proof can be found in our previous work on VBS [2]. The same resut in a different formuation has aso been shown in [4]. Using the definition of VBS processes and actions we can give both response-time bounds for an action and a constanttime scheduabiity test for an idea system, i.e., a system without overhead. Let P {P i (u i ) 1 i n} be a finite set of n processes with corresponding actions α (, R ) for j 0. Each P i (u i ) α i,0 α i,1... corresponds to a VBS with utiization u i. Let R (, ) be the virtua periodic resource associated with the action α with,, and being the oad, the imit, and the period for the action α. The upper bound for the response time of action α is b u 1 +.

4 The ower response-time bound varies depending on the strategy used, namey, for ate reease b, for eary reease. Note that the ower bound in the eary reease strategy is achieved ony if divides, in which case. From these bounds we can derive that the responsetime jitter, i.e., the difference between the upper and ower bound on the response time, is at most 1 for the ate reease strategy and at most 2 1 for the eary reease strategy. It is possibe to give more precise bounds for the eary strategy (using (2) and (3) beow) and show that aso in that case the jitter is at most 1. We say that the set of VBS processes is scheduabe with respect to the response-time bounds b u and b if there exists a we-behaved schedue σ such that for every action α the schedued response time s satisfies b s b u. It is important to note that each action α of a process produces a sequence of tasks with type (, ) that are reeased at period instances of the virtua periodic resource used by the action. Scheduing VBS processes therefore amounts to scheduing typed sets of tasks. We ca the reease of such a task an activation of the action. Proposition 1 ([1], [2]): Given a set of VBS processes P {P i (u i ) 1 i n}, if i I u i 1, then the set of processes P is scheduabe with respect to the responsetime bounds b u and b. Proof: As mentioned above, each process P i provides a typed set of tasks since each action α of the process is spit into severa tasks that a have the type (, ). The tasks are reeased in a sequence, i.e. the reease time of the next task is aways greater than or equa to the deadine of the current task (aso due to the termination strategy). We can thus appy Lemma 1 and concude that the set of tasks is scheduabe. To check the upper bound, we distinguish a case for the eary reease strategy and one for the ate reease strategy in terms of the first task of an action. The detais can be found in [2]. We present the proof for the ower bounds which is not discussed in [2]. For each action α, according to the termination strategy and the ate reease strategy, we have f r + (1) where the reease times are given by r n j for some natura number n j such that the arriva times are a f 1 ((n j 1), n j ]. Therefore, for the ate strategy we have (1) s f a + r a b, for ate reease. For the eary reease strategy we distinguish two cases depending on whether the foowing inequaity hods m (2) where m n j r and r a f 1 ((n j 1), n j ]. The finishing time for the action α is f In both cases f a + + m, if (2) hods a + + m, otherwise + a, so s f a b, for eary reease. In the foowing sections we anayze VBS scheduabiity in the presence of scheduer overhead. In particuar, we define an upper bound on the number of scheduer invocations that occur within a period of an action, and perform an anaysis of the changes in the response-time bounds and utiization due to the scheduer overhead. IV. VBS SCHEDULING WITH OVERHEAD Our first aim is to bound the number of scheduer invocations over a time interva. In particuar, we need the worstcase number of preemptions, and hence scheduer invocations, that an action of a VBS process experiences during a period. Hence, by overhead we mean the overhead due to scheduer invocations (and not interrupts or other types of system overhead). Typicay the duration of a scheduer invocation is severa orders of magnitude ower than a unit execution of an action. Therefore, we assume that a periods beong to the set of discrete time instants M {c n n 0} N, for a constant vaue c N, c > 1. Hence, for any action α with its associated virtua periodic resource R (, ) we have that c with π N. We ca c the scae of the system. Intuitivey we can say that there are two different timeines, the fine-grained timeine given by the set of natura numbers and the coarse-grained timeine given by the set M. Resource periods are defined on the coarse-grained timeine, whie the execution time of the scheduer is defined on the fine-grained timeine. In VBS scheduing, a process P i is preempted at a time instant t if and ony if one of the foowing situations occurs: 1) Competion. P i has competed the entire work reated to its current action α (, R ). 2) Limit. P i uses up a resource imit of the current resource R. 3) Reease. A task of an action is reeased at time t, i.e., an action of another process is activated. Note that a preemptions due to reease occur at time instants on the coarse-grained timeine, the set M. (3)

5 P1 P2 P3 R L L R L R R,L C R,C Fig. 2. Exampe schedue for processes P 1, P 2, and P 3 Exampe 1: Consider the first action of three processes P 1, P 2, and P 3, with corresponding virtua periodic resources R 1,0 ( 1,0, π 1,0 ) (10, 40), R 2,0 ( 2,0, π 2,0 ) (10, 60), and R 3,0 ( 3,0, π 3,0 ) (50, 100), and oads 30, 20, and 100, respectivey. Figure 2 shows an exampe schedue of the three actions up to time 120 and the time instants at which preemptions occur. Preemptions that occur because of the reease of an action instance (action activation) are abeed with R, preemptions that occur because an action has finished its imit are abeed with L, and preemptions that are due to an action finishing its entire oad have the abe C. At time 0, 40, 60, 80, and 100 preemptions occur due to an activation of one of the three actions, whie at time 10, 20, 50, and 80 preemptions occur because an action has used a its imit for the current period. At times 90 and 100 preemptions occur due to competion of an action. At certain time instants such as 80 and 100 there is more than one reason for preemption. In this exampe the scae c of the system is 10. Let us first consider preemptions due to reease, i.e., activation of an action. Each activation happens when a new period of the used virtua periodic resource starts. Hence, an action α with a virtua periodic resource (, ) wi ony be activated at time instants k with k N. Therefore, in the worst-case scenario, the preemptions caused by action activations of a processes in the system occur at a time instants in the set {k gcd({ i I, j 0}) k N}. Note that, because the periods of a actions in the system are on the coarse-grained timeine, gcd({ i I, j 0}) c. We compute the scheduer overhead for each action using an upper bound on the number of preemptions during one period of the respective action. Lemma 2: Let P {P i (u i ) 1 i n} be a set of VBS processes with actions α and corresponding virtua periodic resources (, ). There are at most N N R + N L scheduer invocations every period for the action α, where N R (4) gcd({π m,n m I, n 0, m i}) and N L 1. Proof: There are scheduer invocations due to reease at most at every k gcd({π m,n m I, n 0}), for k N. An action α beonging to a process P i (u) can ony be preempted by task reeases of actions not beonging to P i (u). Hence, there can be at most N R preemptions due to reease over a period of the considered action. By design of the scheduing agorithm, there is exacty one more scheduer invocation due to the action using a its imit or competing its entire oad in each period, i.e., N L 1. This is a pessimistic approximation which coud be improved by running a runtime anaysis that considers ony the periods of the active actions at a specific time. Nevertheess, we take the pessimistic approach in order to be abe to anayze the system off-ine. Another bound on the number of preemptions due to reease for sets of periodic tasks has been given in [14]. For an action α, it cacuates the number of period instances from other actions that occur during the period. The worst-case number of scheduer invocations for a period of an action due to reease is thus π. (5) k I k i >0 π k, Depending on the periods in the system one of the two given bounds approximates the worst-case number better than the other. Consider for exampe a case where the periods in the system are 3, 5, and 7. In this case (5) approximates the number of preemptions better than (4). In another exampe, if the periods in the system are 2, 4, and 6, then (4) provides a more accurate bound than (5). We choose to consider (4) for a bound on the number of preemptions due to reease, for reasons that wi be expained in Section VI. V. SCHEDULABILITY ANALYSIS WITH OVERHEAD In a rea system the scheduer overhead manifests itsef as additiona oad which must be accounted for within the execution of a process in order not to invaidate the schedue of the system. Let ξ denote the duration of a singe scheduer invocation. The tota scheduer overhead for one period of action α is therefore δ N ξ. Hence, the tota overhead is made up of N pieces of ξ workoad. An important aspect in the anaysis is that a scheduer invocation with overhead ξ is nonpreemptabe. Note that N, and therefore δ, depends on the finitey many periods in the system and not on the oad of the action. As a resut, there are ony finitey many possibe vaues for δ even if there are infinitey many actions. Accounting for the overhead can be done in two ways. One way is to aow an action to execute for ess time than its actua imit within one period and use the remaining time to account for the scheduer overhead. The other way is to increase the imit such that the action wi be abe to execute its origina imit and the time spent on scheduer invocations within one period. Intuitivey, the first method increases the response-time bounds, and the second increases the utiization of an action. We recognize a fundamenta trade-off between an increase in response time versus utiization by distributing the amount of scheduer overhead. Namey, we write that the overhead is δ δ b + δ u, where δ b is the overhead that extends the response-time bounds of the respective action and δ u increases the utiization. Note that no scheduer invocation is divisibe, i.e., both δ b and δu are mutipes of ξ.

6 Case Overhead distribution Load Utiization Scheduabiity test m RA δ b δ, δ u 0 + δ δ u P i I π max j 0 1 m UA δ b 0, δu δ + δ ı ı RUA δ b, δu > 0 + δ b, + δ u δ b There are three cases: Response accounting (RA), δ δ b, when the entire overhead is executing within the imit of the action, keeping both the imit and period (and thus the utiization) of the actions constant but increasing the response-time bounds. Utiization accounting (UA), δ δ u, when the entire overhead increases the imit of the action, and thus the utiization, but the response-time bounds remain the same. Combined accounting (RUA), with δ δ b + δu, δ b > 0, and δu > 0, which offers the possibiity to trade-off utiization for response time, for each action, in the presence of scheduer overhead. For an action α, in the presence of overhead, we denote the new oad by, the new imit by, and the new utiization by u. Using these new parameters for an action we determine the new upper and ower response-time bounds which we denote with b u and b, respectivey. The upper response-time bound b u for action α is b u + 1. (6) TABLE I SCHEDULER OVERHEAD ACCOUNTING u + δ u + δ u P i I max j 0 P i I max j 0 + δ 1 + δ u 1 provide information on the actua number of scheduer invocations during one period. Hence, when determining the upper bound on response-time jitter, the assumption that an action aways experiences the worst-case number of preemptions is invaid. Therefore, the jitter is at most the difference between the new upper response-time bound b u and the idea ower response-time bound b, as shown in Figure 3. Tabe I summarizes the three cases which we discuss in detai in the remainder of this section. We eaborate on the change in response-time bounds, utiization, and jitter for each case. A. Response Accounting In the response accounting case each action executes for ess time than its actua imit so that enough time remains for the scheduer execution. As a resut, the action wi not execute more than its imit even when scheduer overhead is considered. In this way the utiization of the action remains the same but its response-time bounds increase. We have that δ δ b. R L R,L R L R R,L L R,L The ower response-time bound b for α using the ate reease strategy is b, (7) P1 P2 P whereas using the eary reease strategy is b. (8) In the previous section we have given an upper bound on the number of preemptions that an action wi experience during one period. This number is used to compute the scheduer overhead and hence the new response-time bounds for the respective action. As shown in Figure 3 and discussed in the remainder of this section, both the upper and the ower bounds increase if we assume that the worst-case number of preemptions actuay occurs. However, our anaysis does not Fig. 3. b b jitter b u b u Bounds and jitter with and without overhead response time Fig. 4. Exampe of response accounting of scheduer overhead Exampe 2: Consider the same processes as in Exampe 1. The schedue in Figure 4 shows how the scheduer overhead can be accounted for. At each scheduer invocation due to reease (abeed with R), the process that is schedued to run accounts for the overhead. Note that in our anaysis, unike in this exampe schedue, we account for an over-approximation of the number of scheduer invocations due to reease. In the case of preemptions due to imit or competion (abeed with L or C) the preempted process accounts for the overhead. This impies that in case of preemptions due to imit, the action has to be preempted before the imit is exhausted so that there is time for the scheduer to execute within the imit. The response-time bounds for each action differ from the ones given in Section III-B due to the fact that each action can execute ess of its own oad in the presence of scheduer overhead. We compute the new oad of the action α as + δ. δ

7 An obvious condition for the system to be feasibe is δ <. Intuitivey, if δ, the action α woud make no progress within one period as it wi just be executing the scheduer, and hence it wi never compete its oad. If δ >, given that the execution of the scheduer is nonpreemptabe, α wi exceed its imit, which may resut in process actions missing their deadines or processes not being scheduabe anymore. The new imit and utiization of the action are the same as without overhead, i.e. and u u. Since > and, we get that both the upper and the ower response-time bound increases in case of response accounting. Proposition 2: Let P {P i (u i ) 1 i n} be a set of VBS processes each with bandwidth cap u i. If i I u i 1 and δ <, with δ, as defined above, then the set of processes are scheduabe with respect to the new response-time bounds b u and b, in the presence of worstcase scheduer overhead. Proof: The proof foows from Proposition 1, and the discussion above, when substituting the oad with the new oad. The jitter for any action α in the response accounting case is at most b u b. For further reference, we write the new oad in the response accounting case as a function B. Utiization Accounting RA(,, δ) + δ δ. In the utiization accounting case an action is aowed to execute for more time than its origina imit within a period in order to account for scheduer overhead. Thus, we have that δ δ u. The new oad of action α becomes + δ. The new imit is + δ, and the new utiization is u + δ. Proposition 3: Given a set of processes P {P i (u i ) 1 i n}, et u + δ i max. j 0 If i I u i 1, then the set of processes P is scheduabe with respect to the origina response-time bounds b u and b defined in Section III-B, in the presence of worst-case scheduer overhead. Proof: We consider a modified set of processes P {Pi (u i ) 1 i n}. By Proposition 1, this set of processes is scheduabe with respect to the response-time bounds b u and b cacuated using the new oad and the new imit. We wi prove that the upper response-time bounds with the new oad and imit for action α origina upper bounds without overhead (b u bu are the same as the ), and the new ower bound is not ower than the od ower bound (b b ). We start by showing that. Let d R be the difference d. It suffices to estabish that d [0, 1) in order to prove our caim. We have, + δ d. + δ + δ Both If 0 and + δ > 0, so d 0., then d 0 and we are done. If, we can write + for 0 < <. Therefore, + δ < ( ), d < 1. + δ Hence we have estabished. We then show that. There are three cases to consider: 1) If does not divide, and does not divide, then. 2) If does not divide, but divides, then >. 3) The case when divides, but does not divide is not possibe, since if divides, then d 0 (see above) impying that divides. Hence, the set of processes is scheduabe with respect to the od upper bound and the new ower bound (which is greater than or equa to the od ower bound), which makes it scheduabe with respect to the od bounds. In the utiization accounting case, the jitter for any action is the same as in the anaysis without overhead, because the response-time bounds are the same. We write the new oad again as a function C. Combined Accounting UA(,, δ) + δ. In the combined accounting case, both the response-time bounds and the utiization of an action increase. We have that δ δ b + δu, δb > 0, and δu > 0. Given an action α with its associated virtua periodic resource R (, ), and oad, the new oad is computed in two steps. First we account for the overhead that increases the response time + δ b δ b

8 R L R,L R L R R L L R L 260 b b * b u b u* u u * ate strategy 50 response time [ms] jitter utiization (%) P P P PS δ b [µs] Fig. 5. Response time and utiization with δ b varying in [0µs, 100µs] for α (7300µs, (400µs, 1000µs)) using the ate strategy and then we add the overhead that increases the utiization + δ. u The oad function for the combined case is therefore RUA(,, δ b, δ u ) UA(RA(,, δ b ),, δ u ). The new imit for action α utiization becomes u + δ u. is + δ u, and the The upper response-time bound b u for action α is now RUA( b u,, δ b, δu ) + δ u + 1. The ower response-time bound b for the same action using the ate reease strategy is RUA( b,, δ b, δu ) + δ u, and using the eary reease strategy is RUA( b,, δ b, δu ) + δ u. Proposition 4: Given a set of processes P {P i (u i ) 1 i n}, et u + δ u i max. j 0 If i I u i 1, then the set of processes P is scheduabe with respect to the response-time bounds b u and b, in the presence of worst-case scheduer overhead. Proof: This scheduabiity resut is derived by combining Proposition 2 and Proposition 3 in the response accounting and utiization accounting case, respectivey. Figure 5 shows the effect of the scheduer overhead distribution on the response time and utiization for an exampe action. We consider the action α with imit 400µs, period π 1000µs, and oad 7300µs. The tota scheduer overhead of δ 100µs corresponds to 100 scheduer invocations, each with overhead ξ 1µs. If δ b 0 (utiization accounting), the ower and upper response-time bounds b and b u remain the same as the respective bounds b and b u without scheduer Fig. 6. Exampe of scheduer overhead as a separate, virtua VBS process P S for the combined accounting case overhead accounting but the utiization u is 10% higher than the utiization u without scheduer overhead accounting. If δ b δ (response accounting), we have that u u but b and b u are severa periods arger than b and b u, respectivey, aso resuting in a arger bound b u b on the response-time jitter. As δ b increases, u decreases whie b u increases aong with b and the jitter bound. Note that, depending on the invoved parameters, we can change the overhead distribution within some intervas such that the utiization decreases but the response-time bounds remain the same, for exampe, when δ b varies between 0µs and 16µs. VI. OPTIMIZATION There is a natura division of the VBS scheduer overhead into overhead due to reease δ R and overhead due to imit/- competion δ L. In Section IV we bounded the overhead due to reease for each period of an action as δ R N R ξ. In this estimate, each action accounts for the reease of each of the other actions in the system, or in other words, when an action is activated a other processes account for the overhead, athough at most one process is truy preempted. This is ceary an over-approximation. As aready discussed, a preemptions due to reease occur at time instants given by the set {k gcd({ i I, j 0}) k N}. Hence, instead of etting other processes account for the reease overhead, the overhead can be modeed as a separate, virtua VBS process with the same action repeated infinitey many times. We ca this process the scheduer process. Introducing a virtua process aows accounting for the overhead due to reease ony once, and not (as before) in every process. As a resut, the estimate on scheduer invocations may improve. A sufficient condition for improvement of the estimate is that there exists a process P m that accounts, in the origina estimate, for as many scheduer invocations as the scheduer process, i.e., gcd({ i I, j 0}) equas gcd({ i I, j 0, i m}). In addition to a set of VBS processes (as before) there is the scheduer process P S with a actions equa α S,j (ξ, R S ) where R S ( S, π S ) (ξ, gcd({ i I, j 0}). Thus, the utiization of the scheduer process is u S ξ gcd({ i I, j 0}). Note that the scheduer process accounts ony for the preemptions due to the reease of an action but not for the actions using a their imit or competing their oad.

9 Case Overhead distribution Load Utiization Scheduabiity test m RA δ b δl + δr, δu 0 + δ δ u P i I π max j 0 1 π m UA δ b 0, δu δl + δr + ξ u + ξ P i I π max + ξ j 0 RUA δ b δl, δu δr + ξ Exampe 3: Consider the same processes as in Exampe 1. The schedue in Figure 6 shows how the scheduer overhead resuting from reeases is integrated into the scheduer process. In cases where preemption can occur due to mutipe reasons, such as at time 20, we prioritize the reease and et the scheduer process run. Note that the non-optimized estimate on scheduer invocations for this exampe is arger than the optimized estimate, which happens to coincide with the actua number of scheduer invocations in this case. Tabe II summarizes the effect of the optimization to a cases. Note that the response accounting case cannot be optimized, since δ u 0 in this case. A. Combined accounting In the combined accounting case an optimization is possibe ony in the case δ u δr and δb δl ξ. The overhead due to imit/competion continues to add to the response time of each process and thus the new oad for action α is + ξ ξ and the utiization remains the same. The bounds b u m ξ TABLE II CASES WITH OPTIMIZATION and b are given by (6), (7) and (8), as before. The next resut presents an optimization to Proposition 4. Proposition 5: Given a set of processes P {P i (u i ) 1 i n}, if i I u i 1 u S, then the set of processes P is scheduabe with respect to the response-time bounds b u b and, in the presence of worst-case scheduer overhead. Proof: Let P {P i (u i ) 1 i n} be a set of VBS processes each with bandwidth cap u i. Let P S be the scheduer process as defined above. It is important to note that the scheduer process generates tasks that aways have the highest priority when reeased. This is because the action α S,k has the period π S gcd({ i I, j 0})), i I, j 0. Hence, at every invocation time of the action its deadine is earier or at the same time as any other deadine in the system and thus we can be sure it is never preempted by any other task using EDF. By Proposition 4 we get that the extended set of processes (together with the scheduer process) is scheduabe with respect to the new bounds if B. Utiization accounting u S + i I max j 0 1. In the case when the entire overhead increases the utiization of an action, optimization is possibe. For the preemptions due u P i I max j 0 1 u S 1 u S to imit or competion, the imit of the action α becomes + ξ and therefore the utiization is u + ξ. Note that it is not possibe to account for such preemptions in the scheduer process as that woud mean that the scheduer process coud execute at every time instant of the fine-grained timeine. The next resut presents the optimized version of Proposition 3. Proposition 6: Given a set of processes P {P i (u i ) 1 i n}, et u i max j 0 + ξ. If i I u i 1 u S, then the set of processes P is scheduabe with respect to the response-time bounds b u and b defined in Section III-B, in the presence of worst-case scheduer overhead. Proof: The proof is simiar to Proposition 3 and Proposition 5 with the difference that at any time the system consists of tasks with the type ( +ξ, ) generated by the processes in P and tasks generated by the scheduer process. The response-time bounds are proven to remain unchanged by substituting δ with ξ in Proposition 3. The set of processes is not scheduabe if ξ gcd({ i I, j 0}), since then the scheduer process has aready utiization at east 1. The utiization that can be used by processes may drop to 0 if ξ c. The system is thus better suited for vaues of c that respect the condition ξ c gcd({ i I, j 0}). VII. EXPERIMENTS We have conducted a series of experiments, using different simuated processes and actions, that show the accuracy of the estimate on scheduer invocations. First, we measure the number of scheduer invocations during a period of an action with a virtua periodic resource of (256, 512), averaged over the whoe execution of the action. We compare this to the estimate on scheduer invocations computed in Section IV. If the concurrenty running actions have periods that are harmonic to the period of the measured action, the estimate equas the actua number of scheduer invocations. We show the accuracy of the estimate for non-harmonic periods. The first experiment (Figure 7(a)) shows the estimate and the actua number of scheduer invocations (y-axis) when two other actions run concurrenty with the measured action. We vary the concurrent actions such that their periods resut in an increasing gcd (ogarithmic x-axis). The periods are chosen as mutipes of the gcd. As can be seen from the figure,

10 scheduer invocations estimate average for π 1 2 gcd, π 2 3 gcd average for π 1 3 gcd, π 2 5 gcd average for π 1 5 gcd, π 2 7 gcd average for π 1 7 gcd, π 2 11 gcd gcd (a) estimate vs. actua scheduer invocations π π (b) difference of estimate and actua scheduer invocations scheduer invocations non-optimized estimate optimized estimate actua scheduer invocations gcd (c) optimized vs. non-optimized estimate Fig. 7. Accuracy of the estimate on scheduer invocations the difference between the estimate and the actua number of scheduer invocations depends not ony on the gcd of the periods invoved but aso on their vaues, i.e., if smaer periods resut in the same gcd, then the approximation is better. The second experiment (Figure 7(b)) shows the difference between the estimate and the actua number of scheduer invocations (z-axis) when there are two actions running concurrenty with the measured action and the gcd of their periods is 1. We measure the difference for every combination of periods (ogarithmic x- and y-axis) that are chosen from a set of pairwise coprime numbers. This situation corresponds to the worst possibe scenario for the accuracy of the estimate. Again, it can be seen that smaer periods resut in a better approximation. In the third experiment (Figure 7(c)) we compare the goba optimized and non-optimized estimates, and the tota number of actua scheduer invocations measured for three concurrenty running actions over 100, 000 time units. The periods of the actions are chosen so that they resut in an increasing gcd (ogarithmic x-axis). The periods are actuay mutipes of the gcd by 2, 3, and 5. For sma vaues of the gcd the accuracy of the optimized estimate is consideraby better than the accuracy of the non-optimized estimate. For arge vaues of the gcd, the estimates converge. VIII. CONCLUSIONS We have introduced response and utiization accounting of scheduer overhead in the scheduabiity anaysis of VBS. Response accounting maintains CPU utiization at the expense of increased response-time bounds whereas utiization accounting maintains the bounds at the expense of increased utiization. Our anaysis may improve when accounting for scheduer overhead due to reeasing processes in a separate, virtua VBS process. Combined response and utiization accounting is possibe and may be used in future work to trade-off response time and utiization in soutions to finding appropriate server configurations that aso consider scheduer overhead (server design probem). REFERENCES [1] S. S. Craciunas, C. M. Kirsch, H. Payer, H. Röck, and A. Sokoova, Programmabe tempora isoation through variabe-bandwidth servers, in Proc. SIES. IEEE Computer Society, [2] S. S. Craciunas, C. M. Kirsch, H. Röck, and A. Sokoova, Rea-time scheduing for workoad-oriented programming, University of Sazburg, Tech. Rep , September [3] L. Abeni and G. Buttazzo, Resource reservation in dynamic rea-time systems, Rea-Time Systems, vo. 27, no. 2, pp , [4] S. A. Brandt, S. Banachowski, C. Lin, and T. Bisson, Dynamic integrated scheduing of hard rea-time, soft rea-time and non-rea-time processes, in Proc. RTSS. IEEE Computer Society, 2003, pp [5] A. K. Parekh and R. G. Gaager, A generaized processor sharing approach to fow contro in integrated services networks: the singenode case, IEEE/ACM Transactions on Networking, vo. 1, no. 3, pp , [6] A. Demers, S. Keshav, and S. Shenker, Anaysis and simuation of a fair queueing agorithm, in Proc. SIGCOMM. ACM, 1989, pp [7] L. Abeni, G. Lipari, and G. Buttazzo, Constant bandwidth vs. proportiona share resource aocation, in Proc. ICMCS, vo. 2. IEEE Computer Society, 1999, pp [8] R. Rajkumar, K. Juvva, A. Moano, and S. Oikawa, Resource kernes: A resource-centric approach to rea-time and mutimedia systems, in Proc. MMCN. ACM, 1998, pp [9] G. Buttazzo and L. Abeni, Adaptive workoad management through eastic scheduing, Rea-Time Systems, vo. 23, no. 1-2, pp. 7 24, [10] T. Nakajima, Resource reservation for adaptive QoS mapping in Rea- Time Mach, in Proc. WPDRTS. IEEE Computer Society, [11] G. Beccari, M. Reggiani, and F. Zanichei, Rate moduation of soft rea-time tasks in autonomous robot contro systems, in Proc. ECRTS. IEEE Computer Society, 1999, pp [12] M. A. C. Simoes, G. Lima, and E. Camponogara, A GA-based approach to dynamic reconfiguration of rea-time systems, in Proc. APRES. IEEE Computer Society, 2008, pp [13] K. Jeffay and D. Stone, Accounting for interrupt handing costs in dynamic priority task systems, in Proc. RTSS. IEEE Computer Society, 1993, pp [14] G. Buttazzo, Hard Rea-Time Computing Systems: Predictabe Scheduing Agorithms and Appications. Kuwer Academic Pubishers, [15] A. Burns, K. Tinde, and A. Weings, Effective anaysis for engineering rea-time fixed-priority scheduers, IEEE Transactions on Software Engineering, vo. 21, no. 5, pp , [16] G. Buttazzo and E. Bini, Optima dimensioning of a constant bandwidth server, in Proc. RTSS. IEEE Computer Society, 2006, pp [17] D. Katcher, H. Arakawa, and J. Strosnider, Engineering and anaysis of fixed-priority scheduers, IEEE Transactions on Software Engineering, vo. 19, no. 9, pp , [18] J. Echague, I. Ripo, and A. Crespo, Hard rea-time preemptivey scheduing with high context switch cost, in Proc. ECRTS. IEEE Computer Society, 1995, pp [19] G. Buttazzo, Rate monotonic vs. EDF: Judgment day, Rea-Time Systems, vo. 29, no. 1, pp. 5 26, [20] R. Gopaakrishnan and G. M. Parukar, Bringing rea-time scheduing theory and practice coser for mutimedia computing, in Proc. SIGMET- RICS. ACM, 1996, pp [21] R. Dobrin and G. Foher, Reducing the number of preemptions in fixedpriority scheduing, in Proc. ECRTS. IEEE Computer Society, 2004, pp [22] C.-G. Lee, J. Hahn, Y.-M. Seo, S. L. Min, R. Ha, S. Hong, C. Y. Park, M. Lee, and C. S. Kim, Anaysis of cache-reated preemption deay in fixed-priority preemptive scheduing, IEEE Transactions on Computers, vo. 47, no. 6, pp , [23] H. Ramaprasad and F. Mueer, Bounding preemption deay within data cache reference patterns for rea-time tasks, in Proc. RTAS. IEEE Computer Society, 2006, pp [24] I. Shin and I. Lee, Periodic resource mode for compositiona rea-time guarantees, in Proc. RTSS. IEEE Computer Society, 2003, pp

Pricing Internet Services With Multiple Providers

Pricing Internet Services With Multiple Providers Pricing Internet Services With Mutipe Providers Linhai He and Jean Warand Dept. of Eectrica Engineering and Computer Science University of Caifornia at Berkeey Berkeey, CA 94709 inhai, wr@eecs.berkeey.edu

More information

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing.

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing. Fast Robust Hashing Manue Urueña, David Larrabeiti and Pabo Serrano Universidad Caros III de Madrid E-89 Leganés (Madrid), Spain Emai: {muruenya,darra,pabo}@it.uc3m.es Abstract As statefu fow-aware services

More information

Simultaneous Routing and Power Allocation in CDMA Wireless Data Networks

Simultaneous Routing and Power Allocation in CDMA Wireless Data Networks Simutaneous Routing and Power Aocation in CDMA Wireess Data Networks Mikae Johansson *,LinXiao and Stephen Boyd * Department of Signas, Sensors and Systems Roya Institute of Technoogy, SE 00 Stockhom,

More information

Secure Network Coding with a Cost Criterion

Secure Network Coding with a Cost Criterion Secure Network Coding with a Cost Criterion Jianong Tan, Murie Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technoogy Cambridge, MA 0239, USA E-mai: {jianong, medard}@mit.edu

More information

GREEN: An Active Queue Management Algorithm for a Self Managed Internet

GREEN: An Active Queue Management Algorithm for a Self Managed Internet : An Active Queue Management Agorithm for a Sef Managed Internet Bartek Wydrowski and Moshe Zukerman ARC Specia Research Centre for Utra-Broadband Information Networks, EEE Department, The University of

More information

Teamwork. Abstract. 2.1 Overview

Teamwork. Abstract. 2.1 Overview 2 Teamwork Abstract This chapter presents one of the basic eements of software projects teamwork. It addresses how to buid teams in a way that promotes team members accountabiity and responsibiity, and

More information

Virtual trunk simulation

Virtual trunk simulation Virtua trunk simuation Samui Aato * Laboratory of Teecommunications Technoogy Hesinki University of Technoogy Sivia Giordano Laboratoire de Reseaux de Communication Ecoe Poytechnique Federae de Lausanne

More information

Early access to FAS payments for members in poor health

Early access to FAS payments for members in poor health Financia Assistance Scheme Eary access to FAS payments for members in poor heath Pension Protection Fund Protecting Peope s Futures The Financia Assistance Scheme is administered by the Pension Protection

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 1

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 1 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 1 Scaabe Muti-Cass Traffic Management in Data Center Backbone Networks Amitabha Ghosh, Sangtae Ha, Edward Crabbe, and Jennifer

More information

Multi-Robot Task Scheduling

Multi-Robot Task Scheduling Proc of IEEE Internationa Conference on Robotics and Automation, Karsruhe, Germany, 013 Muti-Robot Tas Scheduing Yu Zhang and Lynne E Parer Abstract The scheduing probem has been studied extensivey in

More information

Pricing and Revenue Sharing Strategies for Internet Service Providers

Pricing and Revenue Sharing Strategies for Internet Service Providers Pricing and Revenue Sharing Strategies for Internet Service Providers Linhai He and Jean Warand Department of Eectrica Engineering and Computer Sciences University of Caifornia at Berkeey {inhai,wr}@eecs.berkeey.edu

More information

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 1 of 7 [Figures are not incuded in this sampe chapter] Advanced CodFusion 4.0 Appication Deveopment - 3 - Server

More information

An FDD Wideband CDMA MAC Protocol for Wireless Multimedia Networks

An FDD Wideband CDMA MAC Protocol for Wireless Multimedia Networks An FDD ideband CDMA MAC Protoco for ireess Mutimedia Networks Xudong ang Broadband and ireess Networking (BN) Lab Schoo of Eectrica and Computer Engineering Georgia Institute of Technoogy Atanta, GA 3332

More information

Scheduling in Multi-Channel Wireless Networks

Scheduling in Multi-Channel Wireless Networks Scheduing in Muti-Channe Wireess Networks Vartika Bhandari and Nitin H. Vaidya University of Iinois at Urbana-Champaign, USA vartikab@acm.org, nhv@iinois.edu Abstract. The avaiabiity of mutipe orthogona

More information

Minimizing the Total Weighted Completion Time of Coflows in Datacenter Networks

Minimizing the Total Weighted Completion Time of Coflows in Datacenter Networks Minimizing the Tota Weighted Competion Time of Cofows in Datacenter Networks Zhen Qiu Ciff Stein and Yuan Zhong ABSTRACT Communications in datacenter jobs (such as the shuffe operations in MapReduce appications

More information

Load Balancing in Distributed Web Server Systems with Partial Document Replication *

Load Balancing in Distributed Web Server Systems with Partial Document Replication * Load Baancing in Distributed Web Server Systems with Partia Document Repication * Ling Zhuo Cho-Li Wang Francis C. M. Lau Department of Computer Science and Information Systems The University of Hong Kong

More information

Australian Bureau of Statistics Management of Business Providers

Australian Bureau of Statistics Management of Business Providers Purpose Austraian Bureau of Statistics Management of Business Providers 1 The principa objective of the Austraian Bureau of Statistics (ABS) in respect of business providers is to impose the owest oad

More information

Chapter 3: JavaScript in Action Page 1 of 10. How to practice reading and writing JavaScript on a Web page

Chapter 3: JavaScript in Action Page 1 of 10. How to practice reading and writing JavaScript on a Web page Chapter 3: JavaScript in Action Page 1 of 10 Chapter 3: JavaScript in Action In this chapter, you get your first opportunity to write JavaScript! This chapter introduces you to JavaScript propery. In addition,

More information

Capacity of Multi-service Cellular Networks with Transmission-Rate Control: A Queueing Analysis

Capacity of Multi-service Cellular Networks with Transmission-Rate Control: A Queueing Analysis Capacity of Muti-service Ceuar Networs with Transmission-Rate Contro: A Queueing Anaysis Eitan Atman INRIA, BP93, 2004 Route des Lucioes, 06902 Sophia-Antipois, France aso CESIMO, Facutad de Ingeniería,

More information

Comparison of Traditional and Open-Access Appointment Scheduling for Exponentially Distributed Service Time

Comparison of Traditional and Open-Access Appointment Scheduling for Exponentially Distributed Service Time Journa of Heathcare Engineering Vo. 6 No. 3 Page 34 376 34 Comparison of Traditiona and Open-Access Appointment Scheduing for Exponentiay Distributed Service Chongjun Yan, PhD; Jiafu Tang *, PhD; Bowen

More information

Betting Strategies, Market Selection, and the Wisdom of Crowds

Betting Strategies, Market Selection, and the Wisdom of Crowds Betting Strategies, Market Seection, and the Wisdom of Crowds Wiemien Kets Northwestern University w-kets@keogg.northwestern.edu David M. Pennock Microsoft Research New York City dpennock@microsoft.com

More information

SNMP Reference Guide for Avaya Communication Manager

SNMP Reference Guide for Avaya Communication Manager SNMP Reference Guide for Avaya Communication Manager 03-602013 Issue 1.0 Feburary 2007 2006 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this

More information

With the arrival of Java 2 Micro Edition (J2ME) and its industry

With the arrival of Java 2 Micro Edition (J2ME) and its industry Knowedge-based Autonomous Agents for Pervasive Computing Using AgentLight Fernando L. Koch and John-Jues C. Meyer Utrecht University Project AgentLight is a mutiagent system-buiding framework targeting

More information

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES The Eectronic Fund Transfers we are capabe of handing for consumers are indicated beow, some of which may not appy your account Some of these

More information

3.5 Pendulum period. 2009-02-10 19:40:05 UTC / rev 4d4a39156f1e. g = 4π2 l T 2. g = 4π2 x1 m 4 s 2 = π 2 m s 2. 3.5 Pendulum period 68

3.5 Pendulum period. 2009-02-10 19:40:05 UTC / rev 4d4a39156f1e. g = 4π2 l T 2. g = 4π2 x1 m 4 s 2 = π 2 m s 2. 3.5 Pendulum period 68 68 68 3.5 Penduum period 68 3.5 Penduum period Is it coincidence that g, in units of meters per second squared, is 9.8, very cose to 2 9.87? Their proximity suggests a connection. Indeed, they are connected

More information

Avaya Remote Feature Activation (RFA) User Guide

Avaya Remote Feature Activation (RFA) User Guide Avaya Remote Feature Activation (RFA) User Guide 03-300149 Issue 5.0 September 2007 2007 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document

More information

Chapter 3: e-business Integration Patterns

Chapter 3: e-business Integration Patterns Chapter 3: e-business Integration Patterns Page 1 of 9 Chapter 3: e-business Integration Patterns "Consistency is the ast refuge of the unimaginative." Oscar Wide In This Chapter What Are Integration Patterns?

More information

Online Supplement for The Robust Network Loading Problem under Hose Demand Uncertainty: Formulation, Polyhedral Analysis, and Computations

Online Supplement for The Robust Network Loading Problem under Hose Demand Uncertainty: Formulation, Polyhedral Analysis, and Computations Onine Suppement for The Robust Network Loading Probem under Hose Demand Uncertaint: Formuation, Pohedra Anasis, and Computations Aşegü Atın Department of Industria Engineering, TOBB Universit of Economics

More information

WINMAG Graphics Management System

WINMAG Graphics Management System SECTION 10: page 1 Section 10: by Honeywe WINMAG Graphics Management System Contents What is WINMAG? WINMAG Text and Graphics WINMAG Text Ony Scenarios Fire/Emergency Management of Fauts & Disabement Historic

More information

Chapter 1 Structural Mechanics

Chapter 1 Structural Mechanics Chapter Structura echanics Introduction There are many different types of structures a around us. Each structure has a specific purpose or function. Some structures are simpe, whie others are compex; however

More information

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation Zhihua Xia, Yi Zhu, Xingming Sun, and Jin Wang Jiangsu Engineering Center o Network Monitoring, Nanjing University o Inormation

More information

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures Lecture 7 Dataink Ethernet, Home Peter Steenkiste Schoo of Computer Science Department of Eectrica and Computer Engineering Carnegie Meon University 15-441 Networking, Spring 2004 http://www.cs.cmu.edu/~prs/15-441

More information

Cooperative Content Distribution and Traffic Engineering in an ISP Network

Cooperative Content Distribution and Traffic Engineering in an ISP Network Cooperative Content Distribution and Traffic Engineering in an ISP Network Wenjie Jiang, Rui Zhang-Shen, Jennifer Rexford, Mung Chiang Department of Computer Science, and Department of Eectrica Engineering

More information

DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS

DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS ASHER M. KACH, KAREN LANGE, AND REED SOLOMON Abstract. We show that if H is an effectivey competey decomposabe computabe torsion-free abeian group, then

More information

Face Hallucination and Recognition

Face Hallucination and Recognition Face Haucination and Recognition Xiaogang Wang and Xiaoou Tang Department of Information Engineering, The Chinese University of Hong Kong {xgwang1, xtang}@ie.cuhk.edu.hk http://mmab.ie.cuhk.edu.hk Abstract.

More information

Risk Margin for a Non-Life Insurance Run-Off

Risk Margin for a Non-Life Insurance Run-Off Risk Margin for a Non-Life Insurance Run-Off Mario V. Wüthrich, Pau Embrechts, Andreas Tsanakas February 2, 2011 Abstract For sovency purposes insurance companies need to cacuate so-caed best-estimate

More information

1B11 Operating Systems. Input/Output and Devices

1B11 Operating Systems. Input/Output and Devices University Coege London 1B11 Operating Systems Input/Output and s Prof. Steve R Wibur s.wibur@cs.uc.ac.uk Lecture Objectives How do the bits of the I/O story fit together? What is a device driver? 1B11-5

More information

Betting on the Real Line

Betting on the Real Line Betting on the Rea Line Xi Gao 1, Yiing Chen 1,, and David M. Pennock 2 1 Harvard University, {xagao,yiing}@eecs.harvard.edu 2 Yahoo! Research, pennockd@yahoo-inc.com Abstract. We study the probem of designing

More information

Risk Margin for a Non-Life Insurance Run-Off

Risk Margin for a Non-Life Insurance Run-Off Risk Margin for a Non-Life Insurance Run-Off Mario V. Wüthrich, Pau Embrechts, Andreas Tsanakas August 15, 2011 Abstract For sovency purposes insurance companies need to cacuate so-caed best-estimate reserves

More information

A Branch-and-Price Algorithm for Parallel Machine Scheduling with Time Windows and Job Priorities

A Branch-and-Price Algorithm for Parallel Machine Scheduling with Time Windows and Job Priorities A Branch-and-Price Agorithm for Parae Machine Scheduing with Time Windows and Job Priorities Jonathan F. Bard, 1 Siwate Rojanasoonthon 2 1 Graduate Program in Operations Research and Industria Engineering,

More information

eg Enterprise vs. a Big 4 Monitoring Soution: Comparing Tota Cost of Ownership Restricted Rights Legend The information contained in this document is confidentia and subject to change without notice. No

More information

Mean-field Dynamics of Load-Balancing Networks with General Service Distributions

Mean-field Dynamics of Load-Balancing Networks with General Service Distributions Mean-fied Dynamics of Load-Baancing Networks with Genera Service Distributions Reza Aghajani 1, Xingjie Li 2, and Kavita Ramanan 1 1 Division of Appied Mathematics, Brown University, Providence, RI, USA.

More information

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements A Suppier Evauation System for Automotive Industry According To Iso/Ts 16949 Requirements DILEK PINAR ÖZTOP 1, ASLI AKSOY 2,*, NURSEL ÖZTÜRK 2 1 HONDA TR Purchasing Department, 41480, Çayırova - Gebze,

More information

SABRe B2.1: Design & Development. Supplier Briefing Pack.

SABRe B2.1: Design & Development. Supplier Briefing Pack. SABRe B2.1: Design & Deveopment. Suppier Briefing Pack. 2013 Ros-Royce pc The information in this document is the property of Ros-Royce pc and may not be copied or communicated to a third party, or used

More information

(12) Patent Application Publication (10) Pub. N0.: US 2006/0105797 A1 Marsan et al. (43) Pub. Date: May 18, 2006

(12) Patent Application Publication (10) Pub. N0.: US 2006/0105797 A1 Marsan et al. (43) Pub. Date: May 18, 2006 (19) United States US 20060105797A (12) Patent Appication Pubication (10) Pub. N0.: US 2006/0105797 A1 Marsan et a. (43) Pub. Date: (54) METHOD AND APPARATUS FOR (52) US. C...... 455/522 ADJUSTING A MOBILE

More information

Pay-on-delivery investing

Pay-on-delivery investing Pay-on-deivery investing EVOLVE INVESTment range 1 EVOLVE INVESTMENT RANGE EVOLVE INVESTMENT RANGE 2 Picture a word where you ony pay a company once they have deivered Imagine striking oi first, before

More information

Discounted Cash Flow Analysis (aka Engineering Economy)

Discounted Cash Flow Analysis (aka Engineering Economy) Discounted Cash Fow Anaysis (aka Engineering Economy) Objective: To provide economic comparison of benefits and costs that occur over time Assumptions: Future benefits and costs can be predicted A Benefits,

More information

CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS

CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS Dehi Business Review X Vo. 4, No. 2, Juy - December 2003 CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS John N.. Var arvatsouakis atsouakis DURING the present time,

More information

Link Dimensioning and LSP Optimization for MPLS Networks Supporting DiffServ EF and BE traffic classes

Link Dimensioning and LSP Optimization for MPLS Networks Supporting DiffServ EF and BE traffic classes Link Dimensioning and LSP Optimization for MPLS Networks Supporting DiffServ EF and BE traffic casses Kehang Wu and Dougas S. Reeves Departments of Eectrica and Computer Engineering and Computer Science

More information

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES. l l

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES. l l ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES The Eectronic Fund Transfers we are capabe of handing for consumers are indicated beow some of which may not appy your account Some of these may

More information

Information Systems Technician Training Series

Information Systems Technician Training Series NONRESIDENT TRAINING COURSE Information Systems Technician Training Series Modue 1 Administration and Security NAVEDTRA 14222 IMPORTANT Any future change to this course can be found at https://www.advancement.cnet.navy.mi,

More information

WHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization

WHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization Best Practices: Pushing Exce Beyond Its Limits with Information Optimization WHITE Best Practices: Pushing Exce Beyond Its Limits with Information Optimization Executive Overview Microsoft Exce is the

More information

The Use of Cooling-Factor Curves for Coordinating Fuses and Reclosers

The Use of Cooling-Factor Curves for Coordinating Fuses and Reclosers he Use of ooing-factor urves for oordinating Fuses and Recosers arey J. ook Senior Member, IEEE S& Eectric ompany hicago, Iinois bstract his paper describes how to precisey coordinate distribution feeder

More information

Dynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud

Dynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud Dynamic Pricing Trade Market or Shared Resources in IIU Federated Coud Tongrang Fan 1, Jian Liu 1, Feng Gao 1 1Schoo o Inormation Science and Technoogy, Shiiazhuang Tiedao University, Shiiazhuang, 543,

More information

Big Data projects and use cases. Claus Samuelsen IBM Analytics, Europe csa@dk.ibm.com

Big Data projects and use cases. Claus Samuelsen IBM Analytics, Europe csa@dk.ibm.com Big projects and use cases Caus Samuesen IBM Anaytics, Europe csa@dk.ibm.com IBM Sofware Overview of BigInsights IBM BigInsights Scientist Free Quick Start (non production): IBM Open Patform BigInsights

More information

Order-to-Cash Processes

Order-to-Cash Processes TMI170 ING info pat 2:Info pat.qxt 01/12/2008 09:25 Page 1 Section Two: Order-to-Cash Processes Gregory Cronie, Head Saes, Payments and Cash Management, ING O rder-to-cash and purchase-topay processes

More information

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES. l l l

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES. l l l ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES The Eectronic Fund Transfers we are capabe of handing for consumers are indicated beow, some of which may not appy your account Some of these

More information

WIRELESS Mesh Networks (WMNs) have recently attracted

WIRELESS Mesh Networks (WMNs) have recently attracted 3968 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 2, NO. 8, AUGUST 23 A New MPLS-Based Forwarding Paradigm for Muti-Radio Wireess Mesh Networks Stefano Avaone and Giovanni Di Stasi Abstract Routing

More information

The growth of online Internet services during the past decade has increased the

The growth of online Internet services during the past decade has increased the IEEE DS Onine, Voume 2, Number 3 March 2001 Strategies for CORBA Middeware-Based Load Baancing Ossama Othman, Caros O'Ryan, and Dougas C. Schmidt University of Caifornia, Irvine The growth of onine Internet

More information

DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS

DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS 1 DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS 2 ASHER M. KACH, KAREN LANGE, AND REED SOLOMON Abstract. We show that if H is an effectivey competey decomposabe computabe torsion-free abeian group,

More information

Presented at the 107th Convention 1999 September 24-27 New York

Presented at the 107th Convention 1999 September 24-27 New York Room Simuation for Mutichanne Fim and Music 4993 (B-2) Knud Bank Christensen and Thomas Lund TC Eectronic A/S DK-8240 Risskov, Denmark Presented at the 107th Convention 1999 September 24-27 New York This

More information

Leakage detection in water pipe networks using a Bayesian probabilistic framework

Leakage detection in water pipe networks using a Bayesian probabilistic framework Probabiistic Engineering Mechanics 18 (2003) 315 327 www.esevier.com/ocate/probengmech Leakage detection in water pipe networks using a Bayesian probabiistic framework Z. Pouakis, D. Vaougeorgis, C. Papadimitriou*

More information

NCH Software MoneyLine

NCH Software MoneyLine NCH Software MoneyLine This user guide has been created for use with MoneyLine Version 2.xx NCH Software Technica Support If you have difficuties using MoneyLine pease read the appicabe topic before requesting

More information

Market Design & Analysis for a P2P Backup System

Market Design & Analysis for a P2P Backup System Market Design & Anaysis for a P2P Backup System Sven Seuken Schoo of Engineering & Appied Sciences Harvard University, Cambridge, MA seuken@eecs.harvard.edu Denis Chares, Max Chickering, Sidd Puri Microsoft

More information

Finance 360 Problem Set #6 Solutions

Finance 360 Problem Set #6 Solutions Finance 360 Probem Set #6 Soutions 1) Suppose that you are the manager of an opera house. You have a constant margina cost of production equa to $50 (i.e. each additiona person in the theatre raises your

More information

INDUSTRIAL AND COMMERCIAL

INDUSTRIAL AND COMMERCIAL Finance TM NEW YORK CITY DEPARTMENT OF FINANCE TAX & PARKING PROGRAM OPERATIONS DIVISION INDUSTRIAL AND COMMERCIAL ABATEMENT PROGRAM PRELIMINARY APPLICATION AND INSTRUCTIONS Mai to: NYC Department of Finance,

More information

Journal of Economic Behavior & Organization

Journal of Economic Behavior & Organization Journa of Economic Behavior & Organization 85 (23 79 96 Contents ists avaiabe at SciVerse ScienceDirect Journa of Economic Behavior & Organization j ourna ho me pag e: www.esevier.com/ocate/j ebo Heath

More information

PREFACE. Comptroller General of the United States. Page i

PREFACE. Comptroller General of the United States. Page i - I PREFACE T he (+nera Accounting Office (GAO) has ong beieved that the federa government urgenty needs to improve the financia information on which it bases many important decisions. To run our compex

More information

Oligopoly in Insurance Markets

Oligopoly in Insurance Markets Oigopoy in Insurance Markets June 3, 2008 Abstract We consider an oigopoistic insurance market with individuas who differ in their degrees of accident probabiities. Insurers compete in coverage and premium.

More information

Advantages and Disadvantages of Sampling. Vermont ASQ Meeting October 26, 2011

Advantages and Disadvantages of Sampling. Vermont ASQ Meeting October 26, 2011 Advantages and Disadvantages of Samping Vermont ASQ Meeting October 26, 2011 Jeffrey S. Soomon Genera Dynamics Armament and Technica Products, Inc. Wiiston, VT 05495 Outine I. Definition and Exampes II.

More information

Conference Paper Service Organizations: Customer Contact and Incentives of Knowledge Managers

Conference Paper Service Organizations: Customer Contact and Incentives of Knowledge Managers econstor www.econstor.eu Der Open-Access-Pubikationsserver der ZBW Leibniz-Informationszentrum Wirtschaft The Open Access Pubication Server of the ZBW Leibniz Information Centre for Economics Kirchmaier,

More information

PENALTY TAXES ON CORPORATE ACCUMULATIONS

PENALTY TAXES ON CORPORATE ACCUMULATIONS H Chapter Six H PENALTY TAXES ON CORPORATE ACCUMULATIONS INTRODUCTION AND STUDY OBJECTIVES The accumuated earnings tax and the persona hoding company tax are penaty taxes designed to prevent taxpayers

More information

CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society

CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY Course Offered By: Indian Environmenta Society INTRODUCTION The Indian Environmenta Society (IES) a dynamic and fexibe organization with a goba vision

More information

Example of Credit Card Agreement for Bank of America Visa Signature and World MasterCard accounts

Example of Credit Card Agreement for Bank of America Visa Signature and World MasterCard accounts Exampe of Credit Card Agreement for Bank of America Visa Signature and Word MasterCard accounts PRICING INFORMATION Actua pricing wi vary from one cardhoder to another Annua Percentage Rates for Purchases

More information

3.3 SOFTWARE RISK MANAGEMENT (SRM)

3.3 SOFTWARE RISK MANAGEMENT (SRM) 93 3.3 SOFTWARE RISK MANAGEMENT (SRM) Fig. 3.2 SRM is a process buit in five steps. The steps are: Identify Anayse Pan Track Resove The process is continuous in nature and handed dynamicay throughout ifecyce

More information

The eg Suite Enabing Rea-Time Monitoring and Proactive Infrastructure Triage White Paper Restricted Rights Legend The information contained in this document is confidentia and subject to change without

More information

A New Statistical Approach to Network Anomaly Detection

A New Statistical Approach to Network Anomaly Detection A New Statistica Approach to Network Anomay Detection Christian Caegari, Sandrine Vaton 2, and Michee Pagano Dept of Information Engineering, University of Pisa, ITALY E-mai: {christiancaegari,mpagano}@ietunipiit

More information

Breakeven analysis and short-term decision making

Breakeven analysis and short-term decision making Chapter 20 Breakeven anaysis and short-term decision making REAL WORLD CASE This case study shows a typica situation in which management accounting can be hepfu. Read the case study now but ony attempt

More information

Teaching fractions in elementary school: A manual for teachers

Teaching fractions in elementary school: A manual for teachers Teaching fractions in eementary schoo: A manua for teachers H. Wu Apri 0, 998 [Added December, 200] I have decided to resurrect this fie of 998 because, as a reativey short summary of the basic eements

More information

Chapter 2 Traditional Software Development

Chapter 2 Traditional Software Development Chapter 2 Traditiona Software Deveopment 2.1 History of Project Management Large projects from the past must aready have had some sort of project management, such the Pyramid of Giza or Pyramid of Cheops,

More information

Mapping of Secondary Virtual Networks onto Wireless Substrate based on. Cognitive Radio: multi-objective formulation and analysis

Mapping of Secondary Virtual Networks onto Wireless Substrate based on. Cognitive Radio: multi-objective formulation and analysis Mapping of Secondary Virtua Networks onto Wireess Substrate based on Cognitive Radio: muti-obective formuation and anaysis Andson Marreiros Baieiro 1 and Kevin Lopes Dias Center of Informatics (CIn) Federa

More information

Randomized Algorithms for Scheduling VMs in the Cloud

Randomized Algorithms for Scheduling VMs in the Cloud Randomized Agorithms for Scheduing VMs in the Coud Javad Ghaderi Coumbia University Abstract We consider the probem of scheduing VMs (Virtua Machines) in a muti-server system motivated by coud computing

More information

Let s get usable! Usability studies for indexes. Susan C. Olason. Study plan

Let s get usable! Usability studies for indexes. Susan C. Olason. Study plan Let s get usabe! Usabiity studies for indexes Susan C. Oason The artice discusses a series of usabiity studies on indexes from a systems engineering and human factors perspective. The purpose of these

More information

Energy Density / Energy Flux / Total Energy in 3D

Energy Density / Energy Flux / Total Energy in 3D Lecture 5 Phys 75 Energy Density / Energy Fux / Tota Energy in D Overview and Motivation: In this ecture we extend the discussion of the energy associated with wave otion to waves described by the D wave

More information

Load Balance vs Energy Efficiency in Traffic Engineering: A Game Theoretical Perspective

Load Balance vs Energy Efficiency in Traffic Engineering: A Game Theoretical Perspective Load Baance vs Energy Efficiency in Traffic Engineering: A Game Theoretica Perspective Yangming Zhao, Sheng Wang, Shizhong Xu and Xiong Wang Schoo of Communication and Information Engineering University

More information

Budgeting Loans from the Social Fund

Budgeting Loans from the Social Fund Budgeting Loans from the Socia Fund tes sheet Pease read these notes carefuy. They expain the circumstances when a budgeting oan can be paid. Budgeting Loans You may be abe to get a Budgeting Loan if:

More information

TERM INSURANCE CALCULATION ILLUSTRATED. This is the U.S. Social Security Life Table, based on year 2007.

TERM INSURANCE CALCULATION ILLUSTRATED. This is the U.S. Social Security Life Table, based on year 2007. This is the U.S. Socia Security Life Tabe, based on year 2007. This is avaiabe at http://www.ssa.gov/oact/stats/tabe4c6.htm. The ife eperiences of maes and femaes are different, and we usuay do separate

More information

Income Protection Solutions. Policy Wording

Income Protection Solutions. Policy Wording Income Protection Soutions Poicy Wording Wecome to Aviva This booket tes you a you need to know about your poicy, incuding: what to do if you need to caim what s covered, and expanations of some of the

More information

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES About ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES The Eectronic Fund Transfers we are capabe of handing for consumers are indicated beow, some of which may not appy your account. Some of

More information

Figure 1. A Simple Centrifugal Speed Governor.

Figure 1. A Simple Centrifugal Speed Governor. ENGINE SPEED CONTROL Peter Westead and Mark Readman, contro systems principes.co.uk ABSTRACT: This is one of a series of white papers on systems modeing, anaysis and contro, prepared by Contro Systems

More information

IMPLEMENTING THE RATE STRUCTURE: TIERING IN THE FEE-FOR-SERVICE SYSTEM

IMPLEMENTING THE RATE STRUCTURE: TIERING IN THE FEE-FOR-SERVICE SYSTEM The New Jersey Department of Human Services Division of Deveopmenta Disabiities 1 IMPLEMENTING THE RATE STRUCTURE: TIERING IN THE FEE-FOR-SERVICE SYSTEM Eizabeth M. Shea Assistant Commissioner Thomas S.

More information

VALUE TRANSFER OF PENSION RIGHTS IN THE NETHERLANDS. June 2004 - publication no. 8A/04

VALUE TRANSFER OF PENSION RIGHTS IN THE NETHERLANDS. June 2004 - publication no. 8A/04 STICHTING VAN DE ARBEID REVISION VALUE TRANSFER OF PENSION RIGHTS IN THE NETHERLANDS June 2004 - pubication no. 8A/04 Vaue transfer of pension rights in the Netherands 1. Introduction The opportunity to

More information

LADDER SAFETY Table of Contents

LADDER SAFETY Table of Contents Tabe of Contents SECTION 1. TRAINING PROGRAM INTRODUCTION..................3 Training Objectives...........................................3 Rationae for Training.........................................3

More information

802.11 Power-Saving Mode for Mobile Computing in Wi-Fi hotspots: Limitations, Enhancements and Open Issues

802.11 Power-Saving Mode for Mobile Computing in Wi-Fi hotspots: Limitations, Enhancements and Open Issues 802.11 Power-Saving Mode for Mobie Computing in Wi-Fi hotspots: Limitations, Enhancements and Open Issues G. Anastasi a, M. Conti b, E. Gregori b, A. Passarea b, Pervasive Computing & Networking Laboratory

More information

A Description of the California Partnership for Long-Term Care Prepared by the California Department of Health Care Services

A Description of the California Partnership for Long-Term Care Prepared by the California Department of Health Care Services 2012 Before You Buy A Description of the Caifornia Partnership for Long-Term Care Prepared by the Caifornia Department of Heath Care Services Page 1 of 13 Ony ong-term care insurance poicies bearing any

More information

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES. l l

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES. l l ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES The Eectronic Fund Transfers we are capabe of handing for consumers are indicated beow some of which may not appy your account Some of these may

More information

Introduction the pressure for efficiency the Estates opportunity

Introduction the pressure for efficiency the Estates opportunity Heathy Savings? A study of the proportion of NHS Trusts with an in-house Buidings Repair and Maintenance workforce, and a discussion of eary experiences of Suppies efficiency initiatives Management Summary

More information

Take me to your leader! Online Optimization of Distributed Storage Configurations

Take me to your leader! Online Optimization of Distributed Storage Configurations Take me to your eader! Onine Optimization of Distributed Storage Configurations Artyom Sharov Aexander Shraer Arif Merchant Murray Stokey sharov@cs.technion.ac.i, {shraex, aamerchant, mstokey}@googe.com

More information

Network/Communicational Vulnerability

Network/Communicational Vulnerability Automated teer machines (ATMs) are a part of most of our ives. The major appea of these machines is convenience The ATM environment is changing and that change has serious ramifications for the security

More information

Traffic classification-based spam filter

Traffic classification-based spam filter Traffic cassification-based spam fiter Ni Zhang 1,2, Yu Jiang 3, Binxing Fang 1, Xueqi Cheng 1, Li Guo 1 1 Software Division, Institute of Computing Technoogy, Chinese Academy of Sciences, 100080, Beijing,

More information