Embedded Systems. 4. Aperiodic and Periodic Tasks
|
|
- Ambrose Chase
- 7 years ago
- Views:
Transcription
1 Embedded Systems 4. Aperodc and Perodc Tasks Lothar Thele 4-1
2 Contents of Course 1. Embedded Systems Introducton 2. Software Introducton 7. System Components 10. Models 3. Real-Tme Models 4. Perodc/Aperodc Tasks 5. Resource Sharng 8. Communcaton 9. Low Power Desgn 11. Archtecture Synthess 6. Real-Tme OS Software and Programmng 12. Model Based Desgn Processng and Communcaton Hardware 4-2
3 Overvew Schedulng of aperodc tasks wth real-tme constrants: Table wth some known algorthms: Equal arrval tmes non preemptve Arbtrary arrval tmes preemptve Independent tasks Dependent tasks EDD (Jackson) LDF (Lawler) EDF (Horn) EDF* (Chetto) 4-3
4 Earlest Deadlne Due (EDD) Jackson s rule: Gven a set of n tasks. Processng n order of non-decreasng deadlnes s optmal wth respect to mnmzng the maxmum lateness. Proof concept: 4-4
5 Earlest Deadlne Due (EDD) Example 1: 4-5
6 Earlest Deadlne Due (EDD) Example 2: 4-6
7 Earlest Deadlne Frst (EDF) Horn s rule: Gven a set of n ndependent tasks wth arbtrary arrval tmes, any algorthm that at any nstant executes the task wth the earlest absolute deadlne among the ready tasks s optmal wth respect to mnmzng the maxmum lateness. Concept of proof: For each tme nterval t, t 1 t s verfed, whether the actual runnng task s the one wth the earlest absolute deadlne. If ths s not the case, the task wth the earlest absolute deadlne s executed n ths nterval nstead. Ths operaton cannot ncrease the maxmum lateness. 4-7
8 Earlest Deadlne Frst (EDF) Used quanttes and terms: (t) E(t) dentfes the task executng n the slce dentfes the ready task that, at tme t, has the earlest deadlne t E (t) ( t) s the tme at whch the next slce of task begns ts executon n the current schedule t, t 1 E(t) 4-8
9 Earlest Deadlne Frst (EDF) whch task s executng? whch task has earlest deadlne? tme slce slce for nterchange stuaton after nterchange 4-9
10 Earlest Deadlne Frst (EDF) Guarantee: worst case fnshng tme of task : EDF guarantee condton: algorthm: Algorthm: EDF_guarantee (J, J new ) { J =J{J new }; /* ordered by deadlne */ t = current_tme(); f 0 = t; for (each J J ) { } f = f -1 + c (t); f (f > d ) return(infeasible); } return(feasible); f t k 1 c 1,..., n k ( t) t remanng worstcase executon tme of task k k 1 c k ( t) d 4-10
11 Earlest Deadlne Frst (EDF) Example: 4-11
12 Earlest Deadlne Frst (EDF*) The problem of schedulng a set of n tasks wth precedence constrants (concurrent actvaton) can be solved n polynomal tme complexty f tasks are preemptable. The EDF* algorthm determnes a feasble schedule n the case of tasks wth precedence constrants f there exsts one. By the modfcaton t s guaranteed that f there exsts a vald schedule at all then a task starts executon not earler than ts release tme and not earler than the fnshng tmes of ts predecessors (a task cannot preempt any predecessor) all tasks fnsh ther executon wthn ther deadlnes 4-12
13 Earlest Deadlne Frst (EDF*) Modfcaton of deadlnes: Task must fnsh the executon tme wthn ts deadlne Task must not fnsh the executon later than the maxmum start tme of ts successor task b depends on task a: Ja J b Soluton: d * mn d, mn d * C : j j J J j 4-13
14 Earlest Deadlne Frst (EDF*) Modfcaton of release tmes: Task must start the executon not earler than ts release tme. Task must not start the executon earler than the mnmum fnshng tme of ts predecessor. task b depends on task a: Ja J b Soluton: r j * max r,max r * C : j J J j 4-14
15 Earlest Deadlne Frst (EDF*) Algorthm for modfcaton of release tmes: 1. For any ntal node of the precedence graph set r 2. Select a task j such that ts release tme has not been modfed but the release tmes of all mmedate predecessors have been modfed. If no such task exsts, ext. 3. Set r j 4. Return to step 2 Algorthm for modfcaton of deadlnes: 1. For any termnal node of the precedence graph set d 2. Select a task such that ts deadlne has not been modfed but the deadlnes of all mmedate successors j have been modfed. If no such task exsts, ext. 3. Set 4. Return to step 2 * max r,max r * C : j d * mn d, mn d * C : J j j J J j J j r * d * 4-15
16 Earlest Deadlne Frst (EDF*) Proof concept Show that f there exsts a feasble schedule for the modfed task set under EDF then the orgnal task set s also schedulable (gnorng precedence relatons). To ths end, show that the orgnal task set meets the tmng constrants also. Ths can be done by usng d* d, r * r. Show the reverse also. In addton, show that the precedence relatons n the orgnal task set are not volated. In partcular, show that a task cannot start before ts predecessor and a task cannot preempt ts predecessor. 4-16
17 Overvew Table of some known preemptve schedulng algorthms for perodc tasks: Deadlne equals perod Deadlne smaller than perod statc prorty dynamc prorty RM (rate-monotonc) EDF DM (deadlne-monotonc) EDF* 4-17
18 Model of Perodc Tasks Examples: sensory data acquston, low-level servong, control loops, acton plannng and system montorng. When a control applcaton conssts of several concurrent perodc tasks wth ndvdual tmng constrants, the OS has to guarantee that each perodc nstance s regularly actvated at ts proper rate and s completed wthn ts deadlne. Defntons: : denotes a set of perodc tasks : denotes a generc perodc task : denotes the jth nstance of task, j r, j, s, f, d, D, j, j j : denotes the release tme, start tme, fnshng tme, absolute deadlne of the jth nstance of task : phase of task (release tme of ts frst nstance) : relatve deadlne of task 4-18
19 Model of Perodc Tasks The followng hypotheses are assumed on the tasks: The nstances of a perodc task are regularly actvated at a constant rate. The nterval T between two consecutve actvatons s called perod. The release tmes satsfy r 1, j j T All nstances have the same worst case executon tme All nstances of a perodc task have the same relatve deadlne. Therefore, the absolute deadlnes satsfy D d, j 1 j T D C 4-19
20 Model of Perodc Tasks The followng hypotheses are assumed on the tasks cont : D Often, the relatve deadlne equals the perod and therefore d, j jt T All perodc tasks are ndependent; that s, there are no precedence relatons and no resource constrants. No task can suspend tself, for example on I/O operatons. All tasks are released as soon as they arrve. All overheads n the OS kernel are assumed to be zero. 4-20
21 Model of Perodc Tasks Example: T D,3 r,1 r, 2 C s,3 f,
22 Rate Monotonc Schedulng (RM) Assumptons: Task prortes are assgned to tasks before executon and do not change over tme (statc prorty assgnment). RM s ntrnscally preemptve: the currently executng task s preempted by a task wth hgher prorty. Deadlnes equal the perods D. T Algorthm: Each task s assgned a prorty. Tasks wth hgher request rates (that s wth shorter perods) wll have hgher prortes. Tasks wth hgher prorty nterrupt tasks wth lower prorty. 4-22
23 Perodc Tasks Example: 2 tasks, deadlne = perods, U = 97% 4-23
24 Rate Monotonc Schedulng (RM) Optmalty: RM s optmal among all fxed-prorty assgnments n the sense that not other fxed-prorty algorthm can schedule a task set that cannot be scheduled by RM. The proof s done by consderng several cases that may occur, but the man deas are as follows: A crtcal nstant for any task occurs whenever the task s released smultaneously wth all hgher prorty tasks. The tasks schedulablty can easly be checked at ther crtcal nstances. If all tasks are feasble at ther crtcal nstants, then the task set s schedulable n any other condton. Show that, gven two perodc tasks, f the schedule s feasble by an arbtrary prorty assgnment, then t s also feasble by RM. Extend the result to a set of n perodc tasks. 4-24
25 Proof of Crtcal Instance Defnton: A crtcal nstant of a task s the tme at whch the release of a task wll produce the largest response tme. Lemma: For any task, the crtcal nstant occurs f that task s smultaneously released wth all hgher prorty tasks. Proof sketch: Start wth 2 tasks 1 and 2. Response tme of 2 s delayed by tasks 1 of hgher prorty: 2 1 C 2 +2C 1 t 4-25
26 Proof of Crtcal Instance Delay may ncrease f 1 starts earler: 2 1 C 2 +3C 1 t Maxmum delay acheved f 2 and 1 start smultaneously. Repeatng the argument for all hgher prorty tasks of some task 2 : The worst case response tme of a task occurs when t s released smultaneously wth all hgher-prorty tasks. 4-26
27 Proof of RM Optmalty (2 Tasks) We have two tasks 1, 2 wth perods T 1 < T 2. Defne F= T 2 /T 1 : number of perods of 1 fully contaned n T 2 Consder two cases A and B: A: Assume RM s not used pro( 2 ) s hghest: 1 T 1 2 C 2 C 1 t Schedule s feasble f C 1 +C 2 T 1 (A) 4-27
28 Proof of RM Optmalty (2 Tasks) B: Assume RM s used pro( 1 ) s hghest: 1 2 C 1 T 2 FT 1 FT 1 T 2 Schedulable f FC 1 +C 2 +mn(t 2 FT 1, C 1 ) T 2 and C 1 T 1 (B) t We need to show that (A) (B): C 1 +C 2 T 1 C 1 T 1 C 1 +C 2 T 1 FC 1 +C 2 FC 1 +FC 2 FT 1 FC 1 +C 2 +mn(t 2 FT 1, C 1 ) FT 1 +mn(t 2 FT 1, C 1 ) mn(t 2, C 1 +FT 1 ) T 2 Gven tasks 1 and 2 wth T 1 < T 2, then f the schedule s feasble by an arbtrary fxed prorty assgnment, t s also feasble by RM. 4-28
29 Rate Monotonc Schedulng (RM) Schedulablty analyss: A set of perodc tasks s schedulable wth RM f n 1 C T n 2 1/ n 1 Ths condton s suffcent but not necessary. The term n C U T 1 denotes the processor utlzaton factor U whch s the fracton of processor tme spent n the executon of the task set. 4-29
30 Proof of Utlzaton Bound (2 Tasks) We have two tasks 1, 2 wth perods T 1 < T 2. Defne F= T 2 /T 1 : number of perods of 1 fully contaned n T 2 Proof procedure: Compute upper bound on utlzaton U such that the task set s stll schedulable. assgn prortes accordng to RM; compute upper bound U up by settng computaton tmes to fully utlze processor (C 2 adjusted to fully utlze processor); mnmze upper bound wth respect to other task parameters. 4-30
31 Proof of Utlzaton Bound (2 Tasks) As before: 1 2 C 1 Utlzaton: T 2 FT 1 FT 1 T 2 Schedulable f FC 1 +C 2 +mn(t 2 FT 1, C 1 ) T 2 and C 1 T 1 t 4-31
32 Proof of Utlzaton Bound (2 Tasks) Mnmze utlzaton bound w.r.t C 1 : If C 1 T 2 FT 1 then U decreases wth ncreasng C 1 If T 2 FT 1 C 1 then U decreases wth decreasng C 1 Therefore, mnmum U s obtaned wth C 1 = T 2 FT 1 : We now need to mnmze w.r.t. G =T 2 /T 1 where F = T 2 /T 1 and T 1 < T 2. As F s nteger, we frst suppose that t s ndependent of G = T 2 /T 1. We obtan 4-32
33 Proof of Utlzaton Bound (2 Tasks) Mnmzng U wth respect to G yelds If we set F = 1, then we obtan It can easly be checked, that all other nteger values for F lead to a larger upper bound on the utlzaton. 4-33
34 Deadlne Monotonc Schedulng (DM) Assumptons are as n rate monotonc schedulng, but deadlnes may be smaller than the perodc,.e. C D T Algorthm: Each task s assgned a prorty. Tasks wth smaller relatve deadlnes wll have hgher prortes. Tasks wth hgher prorty nterrupt tasks wth lower prorty. Schedulablty analyss: A set of perodc tasks s schedulable wth DM f n C 2 1/ n n 1 D 1 Ths condton s suffcent but not necessary (n general). 4-34
35 Deadlne Monotonc Schedulng (DM) There s also a necessary and suffcent schedulablty test whch s computatonally more nvolved. It s based on the followng observatons: The worst-case processor demand occurs when all tasks are released smultaneously; that s, at ther crtcal nstances. For each task, the sum of ts processng tme and the nterference (preempton) mposed by hgher prorty tasks must be less than or equal to D. A measure of the worst case nterference for task can be computed as the sum of the processng tmes of all hgher prorty tasks released before some tme t where tasks are ordered accordng to m n D m D n : 1 t I T j j 1 C j 4-35
36 Deadlne Monotonc Schedulng (DM) The longest response tme R of a perodc task s computed, at the crtcal nstant, as the sum of ts computaton tme and the nterference due to preempton by hgher prorty tasks R C I Hence, the schedulablty test needs to compute the smallest that satsfes R 1 R C j T j 1 for all tasks. Then, R must hold for all tasks. It can be shown that ths condton s necessary and suffcent. D R C j 4-36
37 Deadlne Monotonc Schedulng (DM) The longest response tmes R of the perodc tasks can be computed teratvely by the followng algorthm: Algorthm: DM_guarantee () { for (each ){ I = 0; do { R = I + C ; f (R > D ) return(unschedulable); I = j=1,,(-1) R/T j C j ; } whle (I + C > R); } return(schedulable); } 4-37
38 DM Example Example: Task 1: Task 2: Task 3: Task 4: C1 1; T1 4; D1 C 1; T2 5; D2 C 2; T3 6; D3 C ; T 11; D Algorthm for task 4: Step 0: R 4 1 Step 1: R 4 5 Step 2: R 4 6 Step 3: R 4 7 Step 4: R 4 9 Step 5: R
39 DM Example U = n n 1 C D 1/ n
40 DM Example I
41 EDF Schedulng (earlest deadlne frst) Assumptons: dynamc prorty assgnment ntrnscally preemptve D T Algorthm: The currently executng task s preempted whenever another perodc nstance wth earler deadlne becomes actve. d j 1 T D, j Optmalty: No other algorthm can schedule a set of perodc tasks f the set that can not be scheduled by EDF. The proof s smple and follows that of the aperodc case. 4-41
42 EDF Schedulng A necessary and suffcent schedulablty test f D : A set of perodc tasks s schedulable wth EDF f and only f n 1 C T U 1 T The term U n 1 C T denotes the average processor utlzaton. 4-42
43 EDF Schedulng If the utlzaton satsfes U 1, then there s no vald schedule: The total demand of computaton tme n nterval T T1 T2... T n s n C T UT T T 1 and therefore, t exceeds the avalable processor tme. If the utlzaton satsfes U 1, then there s a vald schedule. We wll proof ths by contradcton: Assume that deadlne s mssed at some tme t 2. Then we wll show that the utlzaton was larger than
44 EDF Schedulng If the deadlne was mssed at t 2 then defne t 1 as the maxmal tme before t 2 where the processor s contnuously busy n [t 1, t 2 ] and the processor only executes tasks that have ther arrval tme AND deadlne n [t 1, t 2 ]. Why does such a tme t 1 exst? We fnd such a t 1 by startng at t 2 and gong backwards n tme, always ensurng that the processor only executed tasks that have ther deadlne before or at t 2 : Because of EDF, the processor wll be busy shortly before t 2 and t executes on the task that has deadlne at t 2. Suppose that we reach a tme when the processor gets dle, then we found t 1 : There s a task arrval at t 1 and the task queue s empty shortly before. Suppose that we reach a tme such that shortly before the processor works on a task wth deadlne after t 2, then we also found t 1 : Because of EDF, all tasks the processor processed n [t 1, t 2 ] arrved at or after t 1 (otherwse, the processor would not have operated before t 1 on a task wth deadlne after t 2 ). 4-44
45 EDF Schedulng t 1,t 2 Wthn the nterval the total computaton tme demanded by the perodc tasks s bounded by C n n t2 t 1 t2 t1 ( t1, t2) C C t 2 t 1 T 1 T p 1 number of complete perods of task I n the nterval U Snce the deadlne at tme s mssed, we must have: t t 2 t t t t U U 1 2 t1 C p 1,
46 Perodc Tasks Example: 2 tasks, deadlne = perods, U = 97% 4-46
47 Problem of Mxed Task Sets In many applcatons, there are as well aperodc as perodc tasks. Perodc tasks: tme-drven, execute crtcal control actvtes wth hard tmng constrants amed at guaranteeng regular actvaton rates. Aperodc tasks: event-drven, may have hard, soft, nonreal-tme requrements dependng on the specfc applcaton. Sporadc tasks: Offlne guarantee of event-drven aperodc tasks wth crtcal tmng constrants can be done only by makng proper assumptons on the envronment; that s by assumng a maxmum arrval rate for each crtcal event. Aperodc tasks characterzed by a mnmum nterarrval tme are called sporadc. 4-47
48 Background Schedulng Smple soluton for RM and EDF schedulng of perodc tasks: Processng of aperodc tasks n the background,.e. f there are no perodc request. Perodc tasks are not affected. Response of aperodc tasks may be prohbtvely long and there s no possblty to assgn a hgher prorty to them. 4-48
49 Background Schedulng Example (rate monotonc perodc schedule): 4-49
50 RM - Pollng Server Idea: Introduce an artfcal perodc task whose purpose s to servce aperodc requests as soon as possble (therefore, server ). Lke any perodc task, a server s characterzed by a perod and a computaton tme C s. The server s scheduled wth the same algorthm used for the perodc tasks and, once actve, t serves the aperodc requests wthn the lmt of ts server capacty. Its prorty (perod!) can be chosen to match the response tme requrement for the aperodc tasks. T s 4-50
51 RM - Pollng Server Functon of pollng server (PS) T s At regular ntervals equal to, a PS task s nstantated. When t has the hghest current prorty, t serves any pendng aperodc requests wthn the lmt of ts capacty C s. If no aperodc requests are pendng, PS suspends tself untl the begnnng of the next perod and the tme orgnally allocated for aperodc servce s not preserved for aperodc executon. Dsadvantage: If an aperodc requests arrves just after the server has suspended, t must wat untl the begnnng of the next pollng perod. 4-51
52 RM - Pollng Server Example server has current hghest prorty and checks the queue of tasks 4-52
53 RM - Pollng Server Schedulablty analyss of perodc tasks As n the case of RM as the nterference by a server task s the same as the one ntroduced by an equvalent perodc task. A set of perodc tasks and a server task can be executed wthn ther deadlnes f C T s s n 1 C T ( n 1) 2 1/( n1) 1 Agan, ths test s suffcent but not necessary. 4-53
54 RM - Pollng Server Aperodc guarantee of aperodc actvtes. Assumpton: An aperodc task s fnshed before a new aperodc request arrves. Computaton tme C, deadlne D. Suffcent schedulablty test: a Ca (1 T C ) s s D a a If the server task has the hghest prorty there s a necessary test also. The aperodc task arrves shortly after the actvaton of the server task. Maxmal number of necessary server perods. 4-54
55 EDF Total Bandwdth Server Total Bandwdth Server: When the kth aperodc request arrves at tme t = r k, t receves a deadlne d k C max( rk, dk 1 ) U where C k s the executon tme of the request and U s s the server utlzaton factor (that s, ts bandwdth). By defnton, d 0 =0. Once a deadlne s assgned, the request s nserted nto the ready queue of the system as any other perodc nstance. k s 4-55
56 EDF Total Bandwdth Server Example: U 0.75, U 0.25, U U 1 p s p s 4-56
57 EDF Total Bandwdth Server Schedulablty test: Gven a set of n perodc tasks wth processor utlzaton U p and a total bandwdth server wth utlzaton U s, the whole set s schedulable by EDF f and only f Proof: U p U [ t 1, t2] In each nterval of tme, f C ape s the total executon tme demanded by aperodc requests arrved at t 1 or later and served wth deadlnes less or equal to t 2, then s 1 C ) ape ( t2 t1 U s 4-57
58 4-58 EDF Total Bandwdth Server If ths has been proven, the proof of the schedulablty test follows closely that of the perodc case. Proof of lemma: ) ( ), max( )), max( ( t t U d r d U d r d U C C s k k k s k k k k k k s k k k k ape
59 EDF Total Bandwdth Server Example: U 0.75, U 0.25, U U 1 p s p s 4-59
Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process
Dsadvantages of cyclc TDDB47 Real Tme Systems Manual scheduler constructon Cannot deal wth any runtme changes What happens f we add a task to the set? Real-Tme Systems Laboratory Department of Computer
More informationReal-Time Process Scheduling
Real-Tme Process Schedulng ktw@cse.ntu.edu.tw (Real-Tme and Embedded Systems Laboratory) Independent Process Schedulng Processes share nothng but CPU Papers for dscussons: C.L. Lu and James. W. Layland,
More informationThe Greedy Method. Introduction. 0/1 Knapsack Problem
The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton
More informationPeriod and Deadline Selection for Schedulability in Real-Time Systems
Perod and Deadlne Selecton for Schedulablty n Real-Tme Systems Thdapat Chantem, Xaofeng Wang, M.D. Lemmon, and X. Sharon Hu Department of Computer Scence and Engneerng, Department of Electrcal Engneerng
More informationLuby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
More informationProject Networks With Mixed-Time Constraints
Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa
More informationPower Low Modified Dual Priority in Hard Real Time Systems with Resource Requirements
Power Low Modfed Dual Prorty n Hard Real Tme Systems wth Resource Requrements M.Angels Moncusí, Alex Arenas {amoncus,aarenas}@etse.urv.es Dpt d'engnyera Informàtca Matemàtques Unverstat Rovra Vrgl Campus
More informationAn MILP model for planning of batch plants operating in a campaign-mode
An MILP model for plannng of batch plants operatng n a campagn-mode Yanna Fumero Insttuto de Desarrollo y Dseño CONICET UTN yfumero@santafe-concet.gov.ar Gabrela Corsano Insttuto de Desarrollo y Dseño
More informationJ. Parallel Distrib. Comput.
J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n
More information1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)
6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes
More informationSchedulability Bound of Weighted Round Robin Schedulers for Hard Real-Time Systems
Schedulablty Bound of Weghted Round Robn Schedulers for Hard Real-Tme Systems Janja Wu, Jyh-Charn Lu, and We Zhao Department of Computer Scence, Texas A&M Unversty {janjaw, lu, zhao}@cs.tamu.edu Abstract
More informationFORMAL ANALYSIS FOR REAL-TIME SCHEDULING
FORMAL ANALYSIS FOR REAL-TIME SCHEDULING Bruno Dutertre and Vctora Stavrdou, SRI Internatonal, Menlo Park, CA Introducton In modern avoncs archtectures, applcaton software ncreasngly reles on servces provded
More informationQoS in the Linux Operating System. Technical Report
Unverstät Karlsruhe (H) Insttut für elematk QoS n the Lnux Operatng System echncal Report Marc Bechler and Hartmut Rtter Insttut für elematk Fakultät für Informatk Unverstät Karlsruhe (H) E-Mal: [mbechler
More informationModule 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
More informationQoS-based Scheduling of Workflow Applications on Service Grids
QoS-based Schedulng of Workflow Applcatons on Servce Grds Ja Yu, Rakumar Buyya and Chen Khong Tham Grd Computng and Dstrbuted System Laboratory Dept. of Computer Scence and Software Engneerng The Unversty
More informationCheckng and Testng in Nokia RMS Process
An Integrated Schedulng Mechansm for Fault-Tolerant Modular Avoncs Systems Yann-Hang Lee Mohamed Youns Jeff Zhou CISE Department Unversty of Florda Ganesvlle, FL 326 yhlee@cse.ufl.edu Advanced System Technology
More information1 Example 1: Axis-aligned rectangles
COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton
More informationDynamic Fleet Management for Cybercars
Proceedngs of the IEEE ITSC 2006 2006 IEEE Intellgent Transportaton Systems Conference Toronto, Canada, September 17-20, 2006 TC7.5 Dynamc Fleet Management for Cybercars Fenghu. Wang, Mng. Yang, Ruqng.
More informationEnabling P2P One-view Multi-party Video Conferencing
Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P
More informationPAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign
PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng
More informationAn Analysis of Task Scheduling for a Generic Avionics Mission Computer
An Analyss of ask chedulng for a Generc Avoncs sson Computer. B. Dodd Ar Operatons Dvson Defence cence and echnology Organsaton DO-N-69 ABAC ask schedulng s nvestgated for a set of generc tasks representatve
More informationExtending Probabilistic Dynamic Epistemic Logic
Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set
More informationEfficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. XX, MONTH 2XX 1 Effcent On-Demand Data Servce Delvery to Hgh-Speed Trans n Cellular/Infostaton Integrated Networks Hao Lang, Student Member,
More informationPower-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts
Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)
More informationbenefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
More informationConferencing protocols and Petri net analysis
Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre
More informationSurvey on Virtual Machine Placement Techniques in Cloud Computing Environment
Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center
More informationActivity Scheduling for Cost-Time Investment Optimization in Project Management
PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng
More informationLevel Annuities with Payments Less Frequent than Each Interest Period
Level Annutes wth Payments Less Frequent than Each Interest Perod 1 Annuty-mmedate 2 Annuty-due Level Annutes wth Payments Less Frequent than Each Interest Perod 1 Annuty-mmedate 2 Annuty-due Symoblc approach
More informationGeneralizing the degree sequence problem
Mddlebury College March 2009 Arzona State Unversty Dscrete Mathematcs Semnar The degree sequence problem Problem: Gven an nteger sequence d = (d 1,...,d n ) determne f there exsts a graph G wth d as ts
More informationSupport Vector Machines
Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.
More informationLinear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits
Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.
More informationANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING
ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,
More informationA New Quality of Service Metric for Hard/Soft Real-Time Applications
A New Qualty of Servce Metrc for Hard/Soft Real-Tme Applcatons Shaoxong Hua and Gang Qu Electrcal and Computer Engneerng Department and Insttute of Advanced Computer Study Unversty of Maryland, College
More informationA Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing
A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure
More informationEnergy Efficient Routing in Ad Hoc Disaster Recovery Networks
Energy Effcent Routng n Ad Hoc Dsaster Recovery Networks Gl Zussman and Adran Segall Department of Electrcal Engneerng Technon Israel Insttute of Technology Hafa 32000, Israel {glz@tx, segall@ee}.technon.ac.l
More informationJ. Parallel Distrib. Comput. Environment-conscious scheduling of HPC applications on distributed Cloud-oriented data centers
J. Parallel Dstrb. Comput. 71 (2011) 732 749 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. ournal homepage: www.elsever.com/locate/pdc Envronment-conscous schedulng of HPC applcatons
More informationJoint Scheduling of Processing and Shuffle Phases in MapReduce Systems
Jont Schedulng of Processng and Shuffle Phases n MapReduce Systems Fangfe Chen, Mural Kodalam, T. V. Lakshman Department of Computer Scence and Engneerng, The Penn State Unversty Bell Laboratores, Alcatel-Lucent
More informationRecurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
More informationA generalized hierarchical fair service curve algorithm for high network utilization and link-sharing
Computer Networks 43 (2003) 669 694 www.elsever.com/locate/comnet A generalzed herarchcal far servce curve algorthm for hgh network utlzaton and lnk-sharng Khyun Pyun *, Junehwa Song, Heung-Kyu Lee Department
More information2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet
2008/8 An ntegrated model for warehouse and nventory plannng Géraldne Strack and Yves Pochet CORE Voe du Roman Pays 34 B-1348 Louvan-la-Neuve, Belgum. Tel (32 10) 47 43 04 Fax (32 10) 47 43 01 E-mal: corestat-lbrary@uclouvan.be
More informationFeature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
More informationOpen Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1
Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,
More informationCompiling for Parallelism & Locality. Dependence Testing in General. Algorithms for Solving the Dependence Problem. Dependence Testing
Complng for Parallelsm & Localty Dependence Testng n General Assgnments Deadlne for proect 4 extended to Dec 1 Last tme Data dependences and loops Today Fnsh data dependence analyss for loops General code
More informationDEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
More information8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by
6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng
More informationResearch of concurrency control protocol based on the main memory database
Research of concurrency control protocol based on the man memory database Abstract Yonghua Zhang * Shjazhuang Unversty of economcs, Shjazhuang, Shjazhuang, Chna Receved 1 October 2014, www.cmnt.lv The
More informationComputer Networks 55 (2011) 3503 3516. Contents lists available at ScienceDirect. Computer Networks. journal homepage: www.elsevier.
Computer Networks 55 (2011) 3503 3516 Contents lsts avalable at ScenceDrect Computer Networks journal homepage: www.elsever.com/locate/comnet Bonded defct round robn schedulng for mult-channel networks
More informationHeuristic Static Load-Balancing Algorithm Applied to CESM
Heurstc Statc Load-Balancng Algorthm Appled to CESM 1 Yur Alexeev, 1 Sher Mckelson, 1 Sven Leyffer, 1 Robert Jacob, 2 Anthony Crag 1 Argonne Natonal Laboratory, 9700 S. Cass Avenue, Argonne, IL 60439,
More informationCloud Auto-Scaling with Deadline and Budget Constraints
Prelmnary verson. Fnal verson appears In Proceedngs of 11th ACM/IEEE Internatonal Conference on Grd Computng (Grd 21). Oct 25-28, 21. Brussels, Belgum. Cloud Auto-Scalng wth Deadlne and Budget Constrants
More informationPerformance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments
Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn
More informationAN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE
AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent
More informationA DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña
Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION
More informationAn Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks
An Adaptve Cross-layer Bandwdth Schedulng Strategy for the Speed-Senstve Strategy n erarchcal Cellular Networks Jong-Shn Chen #1, Me-Wen #2 Department of Informaton and Communcaton Engneerng ChaoYang Unversty
More informationAvailability-Based Path Selection and Network Vulnerability Assessment
Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl
More informationMulti-Resource Fair Allocation in Heterogeneous Cloud Computing Systems
1 Mult-Resource Far Allocaton n Heterogeneous Cloud Computng Systems We Wang, Student Member, IEEE, Ben Lang, Senor Member, IEEE, Baochun L, Senor Member, IEEE Abstract We study the mult-resource allocaton
More informationThe Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationOn the Interaction between Load Balancing and Speed Scaling
On the Interacton between Load Balancng and Speed Scalng Ljun Chen, Na L and Steven H. Low Engneerng & Appled Scence Dvson, Calforna Insttute of Technology, USA Abstract Speed scalng has been wdely adopted
More informationRetailers must constantly strive for excellence in operations; extremely narrow profit margins
Managng a Retaler s Shelf Space, Inventory, and Transportaton Gerard Cachon 300 SH/DH, The Wharton School, Unversty of Pennsylvana, Phladelpha, Pennsylvana 90 cachon@wharton.upenn.edu http://opm.wharton.upenn.edu/cachon/
More informationChapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT
Chapter 4 ECOOMIC DISATCH AD UIT COMMITMET ITRODUCTIO A power system has several power plants. Each power plant has several generatng unts. At any pont of tme, the total load n the system s met by the
More informationFault tolerance in cloud technologies presented as a service
Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance
More informationGeneral Auction Mechanism for Search Advertising
General Aucton Mechansm for Search Advertsng Gagan Aggarwal S. Muthukrshnan Dávd Pál Martn Pál Keywords game theory, onlne auctons, stable matchngs ABSTRACT Internet search advertsng s often sold by an
More informationv a 1 b 1 i, a 2 b 2 i,..., a n b n i.
SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are
More informationMethod for Production Planning and Inventory Control in Oil
Memors of the Faculty of Engneerng, Okayama Unversty, Vol.41, pp.20-30, January, 2007 Method for Producton Plannng and Inventory Control n Ol Refnery TakujImamura,MasamKonshandJunIma Dvson of Electronc
More informationINSTITUT FÜR INFORMATIK
INSTITUT FÜR INFORMATIK Schedulng jobs on unform processors revsted Klaus Jansen Chrstna Robene Bercht Nr. 1109 November 2011 ISSN 2192-6247 CHRISTIAN-ALBRECHTS-UNIVERSITÄT ZU KIEL Insttut für Informat
More informationHow To Solve A Problem In A Powerline (Powerline) With A Powerbook (Powerbook)
MIT 8.996: Topc n TCS: Internet Research Problems Sprng 2002 Lecture 7 March 20, 2002 Lecturer: Bran Dean Global Load Balancng Scrbe: John Kogel, Ben Leong In today s lecture, we dscuss global load balancng
More informationA Resource-trading Mechanism for Efficient Distribution of Large-volume Contents on Peer-to-Peer Networks
A Resource-tradng Mechansm for Effcent Dstrbuton of Large-volume Contents on Peer-to-Peer Networks SmonG.M.Koo,C.S.GeorgeLee, Karthk Kannan School of Electrcal and Computer Engneerng Krannet School of
More informationRelay Secrecy in Wireless Networks with Eavesdropper
Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,
More informationEqulbra Exst and Trade S effcent proportionally
On Compettve Nonlnear Prcng Andrea Attar Thomas Marott Franços Salané February 27, 2013 Abstract A buyer of a dvsble good faces several dentcal sellers. The buyer s preferences are her prvate nformaton,
More informationValue Driven Load Balancing
Value Drven Load Balancng Sherwn Doroud a, Esa Hyytä b,1, Mor Harchol-Balter c,2 a Tepper School of Busness, Carnege Mellon Unversty, 5000 Forbes Ave., Pttsburgh, PA 15213 b Department of Communcatons
More informationResearch Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization
Hndaw Publshng Corporaton Mathematcal Problems n Engneerng Artcle ID 867836 pages http://dxdoorg/055/204/867836 Research Artcle Enhanced Two-Step Method va Relaxed Order of α-satsfactory Degrees for Fuzzy
More informationEconomic-Robust Transmission Opportunity Auction in Multi-hop Wireless Networks
Economc-Robust Transmsson Opportunty Aucton n Mult-hop Wreless Networks Mng L, Pan L, Mao Pan, and Jnyuan Sun Department of Electrcal and Computer Engneerng, Msssspp State Unversty, Msssspp State, MS 39762
More informationAn Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
More informationHow To Solve An Onlne Control Polcy On A Vrtualzed Data Center
Dynamc Resource Allocaton and Power Management n Vrtualzed Data Centers Rahul Urgaonkar, Ulas C. Kozat, Ken Igarash, Mchael J. Neely urgaonka@usc.edu, {kozat, garash}@docomolabs-usa.com, mjneely@usc.edu
More informationExamensarbete. Rotating Workforce Scheduling. Caroline Granfeldt
Examensarbete Rotatng Workforce Schedulng Carolne Granfeldt LTH - MAT - EX - - 2015 / 08 - - SE Rotatng Workforce Schedulng Optmerngslära, Lnköpngs Unverstet Carolne Granfeldt LTH - MAT - EX - - 2015
More informationAn Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems
STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part
More informationCost-based Scheduling of Scientific Workflow Applications on Utility Grids
Cost-based Schedulng of Scentfc Workflow Applcatons on Utlty Grds Ja Yu, Rakumar Buyya and Chen Khong Tham Grd Computng and Dstrbuted Systems Laboratory Dept. of Computer Scence and Software Engneerng
More informationA Priority Queue Algorithm for the Replication Task in HBase
JURAL F SFTWARE, VL.,. 7, JULY 03 765 A Prort Queue Algorthm for the Replcaton Task n HBase Changlun Zhang Scence School, Bejng Unverst of Cvl Engneerng and Archtecture, Bejng, Chna Ke Laborator of Smbolc
More informationSelf-Adaptive SLA-Driven Capacity Management for Internet Services
Self-Adaptve SLA-Drven Capacty Management for Internet Servces Bruno Abrahao, Vrglo Almeda and Jussara Almeda Computer Scence Department Federal Unversty of Mnas Geras, Brazl Alex Zhang, Drk Beyer and
More informationA Lyapunov Optimization Approach to Repeated Stochastic Games
PROC. ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, OCT. 2013 1 A Lyapunov Optmzaton Approach to Repeated Stochastc Games Mchael J. Neely Unversty of Southern Calforna http://www-bcf.usc.edu/
More informationEfficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing
Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of
More informationA Generic and Compositional Framework for Multicore Response Time Analysis
A Generc and Compostonal Framework for Multcore Response Tme Analyss Sebastan Altmeyer Unversty of Luxembourg Unversty of Amsterdam Clare Maza Grenoble INP Vermag Robert I. Davs Unversty of York INRIA,
More informationSimple Interest Loans (Section 5.1) :
Chapter 5 Fnance The frst part of ths revew wll explan the dfferent nterest and nvestment equatons you learned n secton 5.1 through 5.4 of your textbook and go through several examples. The second part
More informationLogical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME, ISSUE, FEBRUARY ISSN 77-866 Logcal Development Of Vogel s Approxmaton Method (LD- An Approach To Fnd Basc Feasble Soluton Of Transportaton
More information1 OPTIMIZATION ISSUES IN WEB
1 OPTIMIZATIO ISSUES I WEB SEARCH EGIES Zhen Lu 1 and Phlppe an 2 1 IBM Research Hawthorne, Y 10532, USA zhenl@us.bm.com 2 IRIA B.P. 93, 06902, Sopha Antpols Cedex, France Phlppe.an@nra.fr Abstract: Crawlers
More informationEnd-to-end measurements of GPRS-EDGE networks have
End-to-end measurements over GPRS-EDGE networks Juan Andrés Negrera Facultad de Ingenería, Unversdad de la Repúblca Montevdeo, Uruguay Javer Perera Facultad de Ingenería, Unversdad de la Repúblca Montevdeo,
More informationPolitecnico di Torino. Porto Institutional Repository
Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve
More informationEfficient Project Portfolio as a tool for Enterprise Risk Management
Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse
More informationOnline Advertisement, Optimization and Stochastic Networks
Onlne Advertsement, Optmzaton and Stochastc Networks Bo (Rambo) Tan and R. Srkant Department of Electrcal and Computer Engneerng Unversty of Illnos at Urbana-Champagn Urbana, IL, USA 1 arxv:1009.0870v6
More informationOn the Interaction between Load Balancing and Speed Scaling
On the Interacton between Load Balancng and Speed Scalng Ljun Chen and Na L Abstract Speed scalng has been wdely adopted n computer and communcaton systems, n partcular, to reduce energy consumpton. An
More informationAnalysis of Energy-Conserving Access Protocols for Wireless Identification Networks
From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara
More informationWhat is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
More informationA New Task Scheduling Algorithm Based on Improved Genetic Algorithm
A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng Envronment Congcong Xong, Long Feng, Lxan Chen A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng
More informationCase Study: Load Balancing
Case Study: Load Balancng Thursday, 01 June 2006 Bertol Marco A.A. 2005/2006 Dmensonamento degl mpant Informatc LoadBal - 1 Introducton Optmze the utlzaton of resources to reduce the user response tme
More informationIWFMS: An Internal Workflow Management System/Optimizer for Hadoop
IWFMS: An Internal Workflow Management System/Optmzer for Hadoop Lan Lu, Yao Shen Department of Computer Scence and Engneerng Shangha JaoTong Unversty Shangha, Chna lustrve@gmal.com, yshen@cs.sjtu.edu.cn
More informationPreventive Maintenance and Replacement Scheduling: Models and Algorithms
Preventve Mantenance and Replacement Schedulng: Models and Algorthms By Kamran S. Moghaddam B.S. Unversty of Tehran 200 M.S. Tehran Polytechnc 2003 A Dssertaton Proposal Submtted to the Faculty of the
More informationRobust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School
Robust Desgn of Publc Storage Warehouses Yemng (Yale) Gong EMLYON Busness School Rene de Koster Rotterdam school of management, Erasmus Unversty Abstract We apply robust optmzaton and revenue management
More informationFigure 1. Inventory Level vs. Time - EOQ Problem
IEOR 54 Sprng, 009 rof Leahman otes on Eonom Lot Shedulng and Eonom Rotaton Cyles he Eonom Order Quantty (EOQ) Consder an nventory tem n solaton wth demand rate, holdng ost h per unt per unt tme, and replenshment
More information8 Algorithm for Binary Searching in Trees
8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the
More informationBandwdth Packng E. G. Coman, Jr. and A. L. Stolyar Bell Labs, Lucent Technologes Murray Hll, NJ 07974 fegc,stolyarg@research.bell-labs.com Abstract We model a server that allocates varyng amounts of bandwdth
More information