On-Line Load Balancing of Temporary Tasks on Identical Machines

Size: px
Start display at page:

Download "On-Line Load Balancing of Temporary Tasks on Identical Machines"

Transcription

1 On-Line Load Balancing of Teporary Tasks on Identical Machines Yossi Azar Tel-Aviv Univ. Leah Epstein y Tel-Aviv Univ. Abstract We prove an exact lower bound of 2 1 on the copetitive ratio of any deterinistic algorith for load balancing of teporary tasks on identical achines. We also show a lower bound of 2 1 for randoized algoriths for sall and 2 2 for general. If in addition, we +1 restrict the sequence to polynoial length, then the lower log log bound for randoized algoriths becoes 2 O( log ) for general. 1. Introduction We consider the proble of non-preeptive on-line load balancing of tasks on identical achines. Tasks (jobs) arrive at arbitrary ties, where each task has a weight and a duration. A task has to be assigned upon its arrival to exactly one of the achines, thereby increasing the load on this achine by its weight for the duration of the task. The duration of each task becoes known only upon its terination (this is called teporary tasks of unknown durations). Once a task has been assigned to a achine it cannot be reassigned to another achine. The goal is to iniize the axiu load over achines and tie. The proble of scheduling tasks on identical achines was first introduced by Graha [11, 12]. He gave a greedy algorith List Scheduling which is 2 1 copetitive, where is the nuber of achines. The upper bound was proved for peranent tasks, i.e., tasks that start at arbitrary ties but continue forever. Nevertheless, his 2 1 analysis of the upper bound holds also for teporary tasks. In this paper we show that his algorith is optial by proving a atching lower bound. We show a lower bound of on the copetitive ratio of any deterinistic on-line 2 1 Dept. of Coputer Science, Tel-Aviv University. Research supported in part by Allon Fellowship and by a grant fro the Israel Science Foundation. azar@ath.tau.ac.il y Dept. of Coputer Science, Tel-Aviv University. lea@ath.tau.ac.il algorith for load balancing of teporary tasks on identical achines. We also show a lower bound of on the copetitive ratio of any randoized on-line algorith for the proble. In fact, for = 2; 3; 4 we can iprove the lower bound to 2 1, which iplies that List Scheduling is also optial in these cases. The randoized lower bound for general requires a sequence of tasks of super-polynoial length in. If we restrict the sequence to have a polynoial length we prove a lower bound of 2 O( ) for any randoized algorith. log log log Recall that Graha [11, 12] considered only peranent tasks. He showed that the greedy algorith List Scheduling does not perfor better than 2 1. For = 2; 3 the algorith is optial [9]. However, the algorith of Graha is not optial (for all 4) [1, 8]. Bartal et al. [5] were the first to show an algorith whose copetitive ratio is strictly below c < 2 (for all ). More precisely, their algorith achieves a copetitive ratio of Later, the algorith was generalized by Karger, Phillips and Torng [13] to yield an upper bound of 1:945. Very recently, Albers [1] designed 1:923 copetitive algorith and iproved the lower bound to 1:852 (the previous lower bound for peranent tasks was 1:837 [6]). The best lower bound known for randoized algoriths is 1:582 (for large ) [7, 14]. For = 2 the randoized copetitive ratio is precisely 4=3 [5]. We show that in contrast to peranent tasks, the siple algorith of Graha turns out to be optial for teporary tasks. Moreover, even randoization cannot reduce the copetitive ratio below 2 o(1). Note that for = 2 our tight randoized lower bound is 3=2. We also prove the sae lower bound for the known duration case. This is in contrast to the copetitive ratio for peranent jobs that is 4=3. To prove our randoized lower bound we introduce a new technique that converts a lower bound for deterinistic algoriths to a lower bound for randoized algoriths. More precisely, we show that a lower bound for deterinistic algoriths that aintains a fixed value for the optial assignent is a lower bound for randoized algoriths. The proble of on-line load balancing of teporary

2 tasks was introduced by Azar, Broder and Karlin [2]. They studied the restricted assignent case, i.e. each task can be assigned only to a achine in a subset which ay depend on the task. They showed an ( p ) lower bound in contrast to the (log ) copetitive ratio for peranent tasks [4]. A atching upper bound was given in [3]. Load balancing of teporary tasks was also studied for the related achines odel. In this odel the increase of the load on a achine is the ratio of the weight of the task and the speed of that achine. An algorith which is 2 copetitive and a lower bound of 3 o(1) were given by [3]. 2. Notations We denote the input sequence by = 1 ; :::; r. Each event i is an arrival or a departure of a job (task). We view as a sequence of ties, the tie i is the oent after the i th event happened. We denote the weight of job j by w j, its arrival tie by a j and its departure tie (which is unknown until it departs) by d j. An on-line algorith has to assign a job upon its arrival without knowing the future jobs and the durations of jobs that have not departed yet. We copare the perforance of on-line algoriths and the optial off-line algorith that knows the sequence of jobs and their durations in advance. Let J i = fjja j i < d j g be the active jobs at tie i. For a given algorith A (on-line or off-line) let A j be the achine on which job j is assigned. Let l A k (i) = X fjja j=k;j2jig w j be the load on achine k at tie i, which is the su of weights of all jobs assigned to k, and active at this tie. The cost of an algorith A is the axiu load ever achieved by any of the achines, i.e., C A = ax i;k lk A (i). The copetitive ratio of A is r if for any sequence C A rc opt where C opt is the cost of the optial off-line algorith. 3. Lower bounds for deterinistic algoriths We start with a siple lower bound of The lower bound holds for the copetitive ratio of any deterinistic algorith even if the optial value is fixed and known in advance. Later we show the tight 2 1 lower bound. Theore 3.1 Any deterinistic on-line algorith for load balancing of teporary tasks has a copetitive ratio of at least 2 2. This is true even if the optial value is +1 known in advance (and is + 1). Proof: We consider the following sequence. First arrive 2 unit jobs (w j = 1). Since there are achines, there is at least one achine (say x) with a load of at least, (see figure 1). Now all jobs depart, except jobs on this achine, (figure 2). Figure 1. The on-line algorith after the arrival of the unit jobs Figure 2. The on-line algorith after the departure of the unit jobs except jobs on one achine Now jobs of weight arrive. Since achine x has load, the on-line has to assign two jobs of weight on one achine, or to assign one job of weight on the achine x. In both cases, the axiu load of the on-line is at least 2. The off-line distributes the large jobs and the unit jobs that reained fro the first phase evenly on the achines, and thus has a load of + 1. The other ( 1) unit jobs of the first phase are also distributed evenly on the achines. The ratio between the costs of 2 the two algoriths is at least +1 =

3 The above lower bound can be iproved as follows: Theore 3.2 Any deterinistic on-line algorith for load balancing of teporary tasks has the copetitive ratio of at least 2 1. Proof: We consider the following sequence. First ( 1) unit jobs arrive (w j = 1). Since there are achines, there is at least one achine (say x) with load at least 1. Then all jobs depart, except 1 jobs on this achine. Next 1 jobs of load 1 arrive. There are two possible cases: 1. The on-line algorith keeps at least one epty achine. In this case, the load of the on-line algorith on soe achine is at least 2( 1) since at least two jobs of load 1 were assigned to one achine, or a job of load 1 was assigned to the achine x, (see figure 3). -1 Figure 4. The off-line algorith after the arrival of the 1 jobs of load 1 Figure 3. The on-line state if it assigns two jobs of weight 1 on one achine At the first phase, the off-line assigns the 1 unit jobs which will not depart on one achine and distributes the ( 1) 2 unit jobs that will depart evenly on the other 1 achines. Then it assigns one job of weight 1 on each of the other achines (see figure 4), to have the axiu load of 1. In this case, the ratio between the costs of the on-line and the off-line algoriths is at least 2( 1)=( 1) = The on-line algorith does not keep an epty achine, i.e., there is now one job of weight 1 on -1 each achine except x, on which there are 1 units jobs. Now one additional (and final) job of weight arrives. The on-line ust assign it on one of the achines (figure 5), which results in a load of 2 1. We show that the off-line can assign the jobs, having a axiu load of. At the first phase, the unit jobs that do not depart, are assigned each to a different achine, the other jobs are distributed so that the load on each achine is exactly 1. At the second phase only 1 unit jobs, each on a different achine, have reained, and the jobs of load 1 are added to those achines yielding load of and keeping one achine epty. At last the job of load is assigned to the epty achine (figure 6). In this case, the copetitive ratio is at least (2 1)= = 2 1=. In both possible cases, the copetitive ratio is at least 2 1, and thus any on-line algorith has at least this ratio. 4. Lower bounds for randoized algoriths In this section we prove lower bounds for randoized on-line algoriths. We start by proving a general theore that converts lower bounds for deterinistic algoriths with a fixed value for the optial load to general lower bounds for randoized algoriths. We represent any lower bound for a deterinistic algorith by a tree. Each path in the tree is one possible lower bound sequence. Each node in the tree is a subsequence, and a child node of a node is one possible way to continue the sequence (see figure 7). The

4 -1-1 Figure 5. The on-line assigns the job of weight above a job of weight 1 Figure 6. The off-line assignent if the job of weight arrives size jt j of a tree T is defined to be the nuber of leaves in T (the nuber of possible sequences). We consider both the unknown duration case and the known duration case. In the first case the duration of a job is known only when it departs where in the second one the duration of a job is known upon its arrival. Theore 4.1 Let r 1 (r 2, respectively) be a deterinistic lower bound for teporary jobs with unknown (known, respectively) durations, when the optial value of the load is known in advance. Then, r 1 (r 2, respectively) is also a lower bound for randoized algoriths for teporary jobs with unknown (known, respectively) durations. Proof: Consider a lower bound tree T for deterinistic algoriths with a fixed optial load which is known in advance. We show how to convert it into a lower bound for randoized algoriths. A lower bound for teporary jobs with unknown durations, is converted into a lower bound for randoized unknown durations, and a lower bound for known durations is converted into a lower bound for randoized known durations. We first slightly odify the lower bound tree as follows: each possible sequence 2 T, is followed by the events that all the existing jobs depart. This can be done for unknown durations and also for known durations. Note that the new tree T satisfies jt j = jt j. Next we recall the adaptation of Yao s theore for on-line algoriths. It states that a lower bound for the copetitive ratio of deterinistic algoriths on any distribution on the input is also a lower bound for randoized algoriths and is given by E(C on =C opt ). The ain idea of the proof is to construct sequences in which on one hand the new value Copt is the sae as the known optial value C opt of the lower bound of the original tree T and on the other hand with high probability the new value of Con is also the sae as the value C on for T. To construct the lower bound we choose unifor at rando a leaf of the tree T that corresponds to a sequence. Define this short sequence as a segent. Repeat the choice of segents jt jk ties, and concatenate the sequences to one long sequence. This defines a distribution on the set of possible long sequences. Since the off-line costs of all possible segents are the sae, the off-line cost of every resulting sequence is C opt as well. For any deterinistic algorith, there exists a leaf in T that has the on-line cost C on. With probability at least 1 jt, the cost of the on-line algorith on a spe- j cific segent (and thus for the whole sequence) is C on. The probability that the cost C on would not be achieved in one segent is at ost (1 1 jt j )jt jk e k and thus with probability at least 1 e k the copetitive ratio is C on =C opt, where and otherwise it is at least 1. We calculate E C on Copt Copt,and Con, are respectively, the off-line and on-line costs of the long sequence. E C on C opt Since this is true for every k, (1 e k ) C on C opt + e k : E C on C opt C on C opt ;

5 leave -1 jobs on one achine (-1) unit jobs arrive o o o ((-1)) possibilities We can extend this lower bound for the known duration case, i.e., the duration of each job is known upon its arrival. Theore 4.4 Any randoized on-line algorith for load balancing of teporary tasks on two achines has a copetitive ratio of at least = 3 even if the durations of 2 the jobs are known upon its arrival. -1 jobs of weight -1 arrive two were placed on one achine (-1) ain possibilities the load on each achine is -1, a job of weight arrives cases can be reduced into two Figure 7. The tree for the lower bound in Theore 3.2 which is exactly the copetitive ratio of the lower bound of the tree T. Corollary 4.2 Any randoized on-line algorith for load balancing of teporary tasks has a copetitive ratio of at least Proof: The proof follows fro Theores 3.1 and 4.1. In this case, there are ( 2 ) = 2 different possibilities for the 2 unit jobs to be placed, and there are 2 leaves in the lower bound tree. We now iprove the lower bound for sall nubers of achines. Theore 4.3 Any randoized on-line algorith for load balancing of teporary tasks on two achines, has a copetitive ratio of at least = 3 2. Proof: We show a lower bound for deterinistic algoriths, for which the value of the optial load is 2. Theore 4.1 iplies the sae lower bound for randoized algoriths. We consider the following sequence. First three unit jobs arrive (w j = 1). The possible behaviors of the algorith can be divided into two cases. 1. All jobs are on one achine. In this case C on = 3 and thus the copetitive ratio is at least 1:5. 2. There is at least one job on each achine. In this case, there is one achine with two jobs. We pick one of these jobs and let it depart. Thus, we are left with one job on each achine. Now a final job of weight 2 arrives, and the current load on the achine on which it is assigned is 3. Again the copetitive ratio is 1:5. Proof: We again show a lower bound for deterinistic algoriths with fixed optial load which is 2. The randoized lower bound follows fro Theore 4.1. We consider the following sequence. At tie a unit job of duration 8 arrives. At tie 1 a unit job of duration 3 arrives. Now there are several cases. If the two jobs are on different achines, a job of weight 2 and duration 1 arrives at tie 2. Between tie 2 and tie 3 all the three jobs are present and the on-line load is 3, which yields the copetitive ratio of 3=2. Otherwise, the two jobs are on one achine. In this case a third unit job of duration 5 arrives at tie 2. If it is assigned to the sae achine, the on-line load is already 3. If it is assigned to the other achine, we wait to tie 5 that one unit job has already departed, and we have one unit job on each achine. At that tie a final job of weight 2 and duration 1 arrives, and the on-line load is 3. It is easy to check that the optial load in each case is 2 and thus the copetitive ratio is 3=2. We can extend the lower bound of Theore 4.3 for 3 and 4 achines. Theore 4.5 Any randoized on-line algorith for load balancing of teporary tasks on = 3; 4 achines has a copetitive ratio of at least 2 1, i.e., 5=3 for 3 achines, and 7=4 for 4 achines. Proof: We show lower bounds for deterinistic algoriths with fixed optial load as before. Let = 3. Consider the following sequence that aintains optial off-line load of 3. First eight unit jobs arrive. 1. If there is a achine with at least five jobs then the on-line load is at least 5. Thus we can assue that there are at ost four jobs on each achine. 2. If there are at least two jobs on each achine then we continue the sequence by a departure of two jobs so that exactly two jobs reain on each achine. Now one final job of size 3 arrives and the on-line load is If there is at least one achine with at ost one job then there ust be at least three jobs on each of the other two achines, since there are at ost four jobs on each achine. Now two jobs depart, so that there is one epty achine, and two achines, each with three jobs. Now one job of size 2 arrives.

6 If it is assigned to one of the non-epty achines then the on-line load is 5. If it is assigned to the epty achine then two unit jobs, one fro each of the other two achine, depart. This results in a load 2 on all three achines. One final job of weight 3 causes the on-line the load of 5. In each case the optial algorith can aintain axiu load 3 and thus the copetitive ratio is at least 5 3. We use the sae idea to prove the lower bound for = 4. Consider the following sequence that aintains an optial off-line load of 4. First 16 unit jobs arrive. There are several cases: 1. If there is a achine with at least seven jobs then the on-line load is at least If there are at least three jobs on each achine then four jobs depart, so that there are exactly three jobs on each achine. Then a final job of weight 4 arrives, which causes the load of 7 to the on-line. 3. If there is at least one job on each achine then we continue as follows. First note that there is at least one achine with four jobs or ore. Four jobs on this achine and one job on each of the other achines reain and all other jobs depart. Now three jobs of weight 3 arrive. If two jobs of weight 3 assigned to one achine, or a job of weight 3 assigned to the achine with load 4 then the on-line load is at least 7. Otherwise, there are three achines with the sae configuration: two jobs, one of which has weight 3, and the other has weight 1. The fourth achine contains four unit jobs. Now four unit job depart, one fro each achine, which results in load 3 to all achines. A final job of weight 4 arrives and creates on-line load of If there is one epty achine and there are at ost six jobs on each achine then there are three achines each with at least four jobs. Next, four jobs depart so that there are exactly four jobs on each of the three achines. Now one job of weight 3 arrives. It should be assigned to the epty achines in order not to create load 7. Now three unit jobs depart, one fro each of the achines with load 4. Consequently, every achine has load 3. Finally, one job of weight 4 arrives and creates load 7 for the on-line algorith. One can easily see that the optial off-line algorith can aintain load 4 in all the cases and thus the copetitive ratio is at least Sequences of polynoial length Theore 4.1 provides lower bounds that require jt j k large sequences. To get short sequences, we use the sae ethods, but we exaine the tree ore carefully. We first consider a base sequence. Let h be an integer h. 1. h unit jobs (w j = 1) arrive. 2. h unit jobs chosen uniforly at rando depart. Thus a rando set S of exactly unit jobs h reains. Note that all possible sets of reaining jobs are equally likely. 3. Now jobs of weight h arrive. 4. All jobs depart. The off-line can distribute evenly the unit jobs of S and the larger jobs on the achines. Thus it aintains load of h + 1 at the end of phase 3 and can easily aintain a load of h at the end of phase 1. Let us calculate the expected axiu load of the on-line algorith. In the first step, there are h unit jobs, thus there is (at least) one achine that contains at least h jobs. Denote the set of the first h jobs on that achine as T. If S T the load for the on-line algorith is at least 2h, at the end of phase 3. In this case, the ratio between the axiu load of the on-line and the off-line is 2h h+1 = 2 2. Note that S is a rando variable h+1 and T is a fixed set. Clearly, the probability of the event h h S T is h = h. We use this sequence to prove the polynoial length lower bound for randoized algoriths. Theore 5.1 Any randoized on-line algorith for load balancing of teporary tasks has a copetitive ratio of at log log least 2 O( ) even when the input sequence is of log polynoial length in. Proof: We choose h = ( log log ) such that 2hh and repeat the base sequence k ties. Let us calculate the probability that S never contains T. The probability that S does not contain T in one base sequence is 1 h h h h log (h h)!! = 1 ( h)! (h)! 1 1 h h h h 1 1 h h h 1 1 2h h : 2

7 The probability that S never contains T is at ost (1 1 2h h )k (1 1 )k e k : In this case the ratio is at least 1, otherwise the ratio is 2h h+1 = 2 2. This iplies as before that h+1 log log : E Con C opt 2 O log Note that the length of the sequence is polynoial in as required. 6. Concluding rearks We proved 2 o(1) lower bounds on the copetitive ratio of load balancing of teporary tasks. Note that there is a sall gap between the randoized lower bound and the optial deterinistic one. One would like to know the exact bound for randoized algoriths or at least if randoization helps at all to reduce the copetitive ratio in these probles. It follows fro our results that randoization ay help slightly only for 5. It is open if knowing the durations of the tasks can help in reducing the copetitive ratio strictly below 2 both for deterinistic and randoized algoriths. [7] B. Chen, A. van Vliet, and G. Woeginger. A lower bound for randoized on-line scheduling algoriths. Inforation Processing Letters, 51: , [8] B. Chen, A. van Vliet, and G. Woeginger. New lower and upper bounds for on-line scheduling. Operations Research Letters, 16:221 23, [9] U. Faigle, W. Kern, and G. Turan. On the perforance of online algoriths for partition probles. Acta Cybernetica, 9:17 119, [1] G. Galabos and G. Woeginger. An on-line scheduling heuristic with better worst case ratio than graha s list scheduling. Sia Journal on Coputing, 22(2): , [11] R. Graha. Bounds for certain ultiprocessor anoalies. Bell Syste Technical Journal, 45: , [12] R. Graha. Bounds on ultiprocessing tiing anoalies. SIAM J. Appl. Math, 17: , [13] D. Karger, S. Phillips, and E. Torng. A better algorith for an ancient scheduling proble. In Proc. 5th ACM-SIAM Syp. on Discrete Algoriths, [14] J. Sgall. On-line scheduling on parallel achines. Technical Report Technical Report CMU-CS , Carnegie- Mellon University, Pittsburgh, PA, USA, Acknowledgents We would like to thank Allan Borodin for any helpful discussions. References [1] S. Albers. Better bounds for on-line scheduling. In Proc. 29th ACM Syp. on Theory of Coputing, To appear. [2] Y. Azar, A. Broder, and A. Karlin. On-line load balancing. In Proc. 33rd IEEE Syp. on Found. of Cop. Science, pages , Oct [3] Y. Azar, B. Kalyanasundara, S. Plotkin, K. Pruhs, and O. Waarts. On-line load balancing of teporary tasks. In Proc. Workshop on Algoriths and Data Structures, pages , Aug [4] Y. Azar, J. Naor, and R. Ro. The copetitiveness of online assignent. In Proc. 3rd ACM-SIAM Syp. on Discrete Algoriths, pages 23 21, [5] Y. Bartal, A. Fiat, H. Karloff, and R. Vohra. New algoriths for an ancient scheduling proble. In Proc. 24th ACM Syposiu on Theory of Algoriths, pages 51 58, To appear in Journal of Coputer and Syste Sciences. [6] Y. Bartal, H. Karloff, and Y. Rabani. A better lower bound for on-line scheduling. Inforation Processing Letters, 5: , 1994.

Information Processing Letters

Information Processing Letters Inforation Processing Letters 111 2011) 178 183 Contents lists available at ScienceDirect Inforation Processing Letters www.elsevier.co/locate/ipl Offline file assignents for online load balancing Paul

More information

Load balancing of temporary tasks in the l p norm

Load balancing of temporary tasks in the l p norm Load balancing of temporary tasks in the l p norm Yossi Azar a,1, Amir Epstein a,2, Leah Epstein b,3 a School of Computer Science, Tel Aviv University, Tel Aviv, Israel. b School of Computer Science, The

More information

Models and Algorithms for Stochastic Online Scheduling 1

Models and Algorithms for Stochastic Online Scheduling 1 Models and Algoriths for Stochastic Online Scheduling 1 Nicole Megow Technische Universität Berlin, Institut für Matheatik, Strasse des 17. Juni 136, 10623 Berlin, Gerany. eail: negow@ath.tu-berlin.de

More information

Stochastic Online Scheduling on Parallel Machines

Stochastic Online Scheduling on Parallel Machines Stochastic Online Scheduling on Parallel Machines Nicole Megow 1, Marc Uetz 2, and Tark Vredeveld 3 1 Technische Universit at Berlin, Institut f ur Matheatik, Strasse des 17. Juni 136, 10623 Berlin, Gerany

More information

Halloween Costume Ideas for the Wii Game

Halloween Costume Ideas for the Wii Game Algorithica 2001) 30: 101 139 DOI: 101007/s00453-001-0003-0 Algorithica 2001 Springer-Verlag New York Inc Optial Search and One-Way Trading Online Algoriths R El-Yaniv, 1 A Fiat, 2 R M Karp, 3 and G Turpin

More information

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION Henrik Kure Dina, Danish Inforatics Network In the Agricultural Sciences Royal Veterinary and Agricultural University

More information

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128 ON SELF-ROUTING IN CLOS CONNECTION NETWORKS BARRY G. DOUGLASS Electrical Engineering Departent Texas A&M University College Station, TX 778-8 A. YAVUZ ORUÇ Electrical Engineering Departent and Institute

More information

Online Scheduling with Bounded Migration

Online Scheduling with Bounded Migration Online Scheduling with Bounded Migration Peter Sanders, Naveen Sivadasan, and Martin Skutella Max-Planck-Institut für Informatik, Saarbrücken, Germany, {sanders,ns,skutella}@mpi-sb.mpg.de Abstract. Consider

More information

An Innovate Dynamic Load Balancing Algorithm Based on Task

An Innovate Dynamic Load Balancing Algorithm Based on Task An Innovate Dynaic Load Balancing Algorith Based on Task Classification Hong-bin Wang,,a, Zhi-yi Fang, b, Guan-nan Qu,*,c, Xiao-dan Ren,d College of Coputer Science and Technology, Jilin University, Changchun

More information

Resource Allocation in Wireless Networks with Multiple Relays

Resource Allocation in Wireless Networks with Multiple Relays Resource Allocation in Wireless Networks with Multiple Relays Kağan Bakanoğlu, Stefano Toasin, Elza Erkip Departent of Electrical and Coputer Engineering, Polytechnic Institute of NYU, Brooklyn, NY, 0

More information

Considerations on Distributed Load Balancing for Fully Heterogeneous Machines: Two Particular Cases

Considerations on Distributed Load Balancing for Fully Heterogeneous Machines: Two Particular Cases Considerations on Distributed Load Balancing for Fully Heterogeneous Machines: Two Particular Cases Nathanaël Cheriere Departent of Coputer Science ENS Rennes Rennes, France nathanael.cheriere@ens-rennes.fr

More information

Data Set Generation for Rectangular Placement Problems

Data Set Generation for Rectangular Placement Problems Data Set Generation for Rectangular Placeent Probles Christine L. Valenzuela (Muford) Pearl Y. Wang School of Coputer Science & Inforatics Departent of Coputer Science MS 4A5 Cardiff University George

More information

Online Bagging and Boosting

Online Bagging and Boosting Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used

More information

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Vol. 9, No. 5 (2016), pp.303-312 http://dx.doi.org/10.14257/ijgdc.2016.9.5.26 Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou

More information

2. FINDING A SOLUTION

2. FINDING A SOLUTION The 7 th Balan Conference on Operational Research BACOR 5 Constanta, May 5, Roania OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS

More information

A quantum secret ballot. Abstract

A quantum secret ballot. Abstract A quantu secret ballot Shahar Dolev and Itaar Pitowsky The Edelstein Center, Levi Building, The Hebrerw University, Givat Ra, Jerusale, Israel Boaz Tair arxiv:quant-ph/060087v 8 Mar 006 Departent of Philosophy

More information

Preference-based Search and Multi-criteria Optimization

Preference-based Search and Multi-criteria Optimization Fro: AAAI-02 Proceedings. Copyright 2002, AAAI (www.aaai.org). All rights reserved. Preference-based Search and Multi-criteria Optiization Ulrich Junker ILOG 1681, route des Dolines F-06560 Valbonne ujunker@ilog.fr

More information

Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and migration algorithms

Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and migration algorithms Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and igration algoriths Chaia Ghribi, Makhlouf Hadji and Djaal Zeghlache Institut Mines-Téléco, Téléco SudParis UMR CNRS 5157 9, Rue

More information

Efficient Key Management for Secure Group Communications with Bursty Behavior

Efficient Key Management for Secure Group Communications with Bursty Behavior Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:

More information

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks Reliability Constrained acket-sizing for inear Multi-hop Wireless Networks Ning Wen, and Randall A. Berry Departent of Electrical Engineering and Coputer Science Northwestern University, Evanston, Illinois

More information

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network 2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona

More information

Approximately-Perfect Hashing: Improving Network Throughput through Efficient Off-chip Routing Table Lookup

Approximately-Perfect Hashing: Improving Network Throughput through Efficient Off-chip Routing Table Lookup Approxiately-Perfect ing: Iproving Network Throughput through Efficient Off-chip Routing Table Lookup Zhuo Huang, Jih-Kwon Peir, Shigang Chen Departent of Coputer & Inforation Science & Engineering, University

More information

arxiv:0805.1434v1 [math.pr] 9 May 2008

arxiv:0805.1434v1 [math.pr] 9 May 2008 Degree-distribution stability of scale-free networs Zhenting Hou, Xiangxing Kong, Dinghua Shi,2, and Guanrong Chen 3 School of Matheatics, Central South University, Changsha 40083, China 2 Departent of

More information

Applying Multiple Neural Networks on Large Scale Data

Applying Multiple Neural Networks on Large Scale Data 0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree

More information

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS PREDICTIO OF POSSIBLE COGESTIOS I SLA CREATIO PROCESS Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia Tel +385 20 445-739,

More information

MINIMUM VERTEX DEGREE THRESHOLD FOR LOOSE HAMILTON CYCLES IN 3-UNIFORM HYPERGRAPHS

MINIMUM VERTEX DEGREE THRESHOLD FOR LOOSE HAMILTON CYCLES IN 3-UNIFORM HYPERGRAPHS MINIMUM VERTEX DEGREE THRESHOLD FOR LOOSE HAMILTON CYCLES IN 3-UNIFORM HYPERGRAPHS JIE HAN AND YI ZHAO Abstract. We show that for sufficiently large n, every 3-unifor hypergraph on n vertices with iniu

More information

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol., No. 3, Suer 28, pp. 429 447 issn 523-464 eissn 526-5498 8 3 429 infors doi.287/so.7.8 28 INFORMS INFORMS holds copyright to this article and distributed

More information

Airline Yield Management with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN

Airline Yield Management with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN Airline Yield Manageent with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN Integral Developent Corporation, 301 University Avenue, Suite 200, Palo Alto, California 94301 SHALER STIDHAM

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srecko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing Real Tie Target Tracking with Binary Sensor Networks and Parallel Coputing Hong Lin, John Rushing, Sara J. Graves, Steve Tanner, and Evans Criswell Abstract A parallel real tie data fusion and target tracking

More information

Reconnect 04 Solving Integer Programs with Branch and Bound (and Branch and Cut)

Reconnect 04 Solving Integer Programs with Branch and Bound (and Branch and Cut) Sandia is a ultiprogra laboratory operated by Sandia Corporation, a Lockheed Martin Copany, Reconnect 04 Solving Integer Progras with Branch and Bound (and Branch and Cut) Cynthia Phillips (Sandia National

More information

Online Appendix I: A Model of Household Bargaining with Violence. In this appendix I develop a simple model of household bargaining that

Online Appendix I: A Model of Household Bargaining with Violence. In this appendix I develop a simple model of household bargaining that Online Appendix I: A Model of Household Bargaining ith Violence In this appendix I develop a siple odel of household bargaining that incorporates violence and shos under hat assuptions an increase in oen

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

An Approach to Combating Free-riding in Peer-to-Peer Networks

An Approach to Combating Free-riding in Peer-to-Peer Networks An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008

More information

Searching strategy for multi-target discovery in wireless networks

Searching strategy for multi-target discovery in wireless networks Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,

More information

Partitioned Elias-Fano Indexes

Partitioned Elias-Fano Indexes Partitioned Elias-ano Indexes Giuseppe Ottaviano ISTI-CNR, Pisa giuseppe.ottaviano@isti.cnr.it Rossano Venturini Dept. of Coputer Science, University of Pisa rossano@di.unipi.it ABSTRACT The Elias-ano

More information

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks Cooperative Caching for Adaptive Bit Rate Streaing in Content Delivery Networs Phuong Luu Vo Departent of Coputer Science and Engineering, International University - VNUHCM, Vietna vtlphuong@hciu.edu.vn

More information

Lecture L9 - Linear Impulse and Momentum. Collisions

Lecture L9 - Linear Impulse and Momentum. Collisions J. Peraire, S. Widnall 16.07 Dynaics Fall 009 Version.0 Lecture L9 - Linear Ipulse and Moentu. Collisions In this lecture, we will consider the equations that result fro integrating Newton s second law,

More information

ASIC Design Project Management Supported by Multi Agent Simulation

ASIC Design Project Management Supported by Multi Agent Simulation ASIC Design Project Manageent Supported by Multi Agent Siulation Jana Blaschke, Christian Sebeke, Wolfgang Rosenstiel Abstract The coplexity of Application Specific Integrated Circuits (ASICs) is continuously

More information

An Optimal Task Allocation Model for System Cost Analysis in Heterogeneous Distributed Computing Systems: A Heuristic Approach

An Optimal Task Allocation Model for System Cost Analysis in Heterogeneous Distributed Computing Systems: A Heuristic Approach An Optial Tas Allocation Model for Syste Cost Analysis in Heterogeneous Distributed Coputing Systes: A Heuristic Approach P. K. Yadav Central Building Research Institute, Rooree- 247667, Uttarahand (INDIA)

More information

Dynamic right-sizing for power-proportional data centers Extended version

Dynamic right-sizing for power-proportional data centers Extended version 1 Dynaic right-sizing for power-proportional data centers Extended version Minghong Lin, Ada Wieran, Lachlan L. H. Andrew and Eno Thereska Abstract Power consuption iposes a significant cost for data centers

More information

An Experimental Study of Online Scheduling Algorithms

An Experimental Study of Online Scheduling Algorithms An Experimental Study of Online Scheduling Algorithms Susanne Bianca Schröder Abstract We present the first comprehensive experimental study of online algorithms for s scheduling problem. s scheduling

More information

Dynamic Placement for Clustered Web Applications

Dynamic Placement for Clustered Web Applications Dynaic laceent for Clustered Web Applications A. Karve, T. Kibrel, G. acifici, M. Spreitzer, M. Steinder, M. Sviridenko, and A. Tantawi IBM T.J. Watson Research Center {karve,kibrel,giovanni,spreitz,steinder,sviri,tantawi}@us.ib.co

More information

Data Streaming Algorithms for Estimating Entropy of Network Traffic

Data Streaming Algorithms for Estimating Entropy of Network Traffic Data Streaing Algoriths for Estiating Entropy of Network Traffic Ashwin Lall University of Rochester Vyas Sekar Carnegie Mellon University Mitsunori Ogihara University of Rochester Jun (Ji) Xu Georgia

More information

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO Bulletin of the Transilvania University of Braşov Series I: Engineering Sciences Vol. 4 (53) No. - 0 PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO V. CAZACU I. SZÉKELY F. SANDU 3 T. BĂLAN Abstract:

More information

Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller

Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller Research Article International Journal of Current Engineering and Technology EISSN 77 46, PISSN 347 56 4 INPRESSCO, All Rights Reserved Available at http://inpressco.co/category/ijcet Design of Model Reference

More information

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY Y. T. Chen Departent of Industrial and Systes Engineering Hong Kong Polytechnic University, Hong Kong yongtong.chen@connect.polyu.hk

More information

Calculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance

Calculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance Calculating the Return on nvestent () for DMSMS Manageent Peter Sandborn CALCE, Departent of Mechanical Engineering (31) 45-3167 sandborn@calce.ud.edu www.ene.ud.edu/escml/obsolescence.ht October 28, 21

More information

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15), pp. 197-4 http://d.doi.org/1.1457/ijfgcn.15.8.6.19 An Integrated Approach for Monitoring Service Level Paraeters

More information

The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs

The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs Send Orders for Reprints to reprints@benthascience.ae 206 The Open Fuels & Energy Science Journal, 2015, 8, 206-210 Open Access The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic

More information

A Scalable Application Placement Controller for Enterprise Data Centers

A Scalable Application Placement Controller for Enterprise Data Centers W WWW 7 / Track: Perforance and Scalability A Scalable Application Placeent Controller for Enterprise Data Centers Chunqiang Tang, Malgorzata Steinder, Michael Spreitzer, and Giovanni Pacifici IBM T.J.

More information

Factored Models for Probabilistic Modal Logic

Factored Models for Probabilistic Modal Logic Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence (2008 Factored Models for Probabilistic Modal Logic Afsaneh Shirazi and Eyal Air Coputer Science Departent, University of Illinois

More information

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary

More information

Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks

Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks Protecting Sall Keys in Authentication Protocols for Wireless Sensor Networks Kalvinder Singh Australia Developent Laboratory, IBM and School of Inforation and Counication Technology, Griffith University

More information

Lecture L26-3D Rigid Body Dynamics: The Inertia Tensor

Lecture L26-3D Rigid Body Dynamics: The Inertia Tensor J. Peraire, S. Widnall 16.07 Dynaics Fall 008 Lecture L6-3D Rigid Body Dynaics: The Inertia Tensor Version.1 In this lecture, we will derive an expression for the angular oentu of a 3D rigid body. We shall

More information

A Fast Algorithm for Online Placement and Reorganization of Replicated Data

A Fast Algorithm for Online Placement and Reorganization of Replicated Data A Fast Algorith for Online Placeent and Reorganization of Replicated Data R. J. Honicky Storage Systes Research Center University of California, Santa Cruz Ethan L. Miller Storage Systes Research Center

More information

Position Auctions and Non-uniform Conversion Rates

Position Auctions and Non-uniform Conversion Rates Position Auctions and Non-unifor Conversion Rates Liad Blurosen Microsoft Research Mountain View, CA 944 liadbl@icrosoft.co Jason D. Hartline Shuzhen Nong Electrical Engineering and Microsoft AdCenter

More information

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel Recent Advances in Counications Adaptive odulation and Coding for Unanned Aerial Vehicle (UAV) Radio Channel Airhossein Fereidountabar,Gian Carlo Cardarilli, Rocco Fazzolari,Luca Di Nunzio Abstract In

More information

Image restoration for a rectangular poor-pixels detector

Image restoration for a rectangular poor-pixels detector Iage restoration for a rectangular poor-pixels detector Pengcheng Wen 1, Xiangjun Wang 1, Hong Wei 2 1 State Key Laboratory of Precision Measuring Technology and Instruents, Tianjin University, China 2

More information

A o(n)-competitive Deterministic Algorithm for Online Matching on a Line

A o(n)-competitive Deterministic Algorithm for Online Matching on a Line A o(n)-competitive Deterministic Algorithm for Online Matching on a Line Antonios Antoniadis 2, Neal Barcelo 1, Michael Nugent 1, Kirk Pruhs 1, and Michele Scquizzato 3 1 Department of Computer Science,

More information

6. Time (or Space) Series Analysis

6. Time (or Space) Series Analysis ATM 55 otes: Tie Series Analysis - Section 6a Page 8 6. Tie (or Space) Series Analysis In this chapter we will consider soe coon aspects of tie series analysis including autocorrelation, statistical prediction,

More information

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS 641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC arketa.zajarosova@vsb.cz Abstract Custoer relationship

More information

Driving Behavior Analysis Based on Vehicle OBD Information and AdaBoost Algorithms

Driving Behavior Analysis Based on Vehicle OBD Information and AdaBoost Algorithms , March 18-20, 2015, Hong Kong Driving Behavior Analysis Based on Vehicle OBD Inforation and AdaBoost Algoriths Shi-Huang Chen, Jeng-Shyang Pan, and Kaixuan Lu Abstract This paper proposes a novel driving

More information

Method of supply chain optimization in E-commerce

Method of supply chain optimization in E-commerce MPRA Munich Personal RePEc Archive Method of supply chain optiization in E-coerce Petr Suchánek and Robert Bucki Silesian University - School of Business Adinistration, The College of Inforatics and Manageent

More information

Markovian inventory policy with application to the paper industry

Markovian inventory policy with application to the paper industry Coputers and Cheical Engineering 26 (2002) 1399 1413 www.elsevier.co/locate/copcheeng Markovian inventory policy with application to the paper industry K. Karen Yin a, *, Hu Liu a,1, Neil E. Johnson b,2

More information

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.

More information

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State

More information

ADJUSTING FOR QUALITY CHANGE

ADJUSTING FOR QUALITY CHANGE ADJUSTING FOR QUALITY CHANGE 7 Introduction 7.1 The easureent of changes in the level of consuer prices is coplicated by the appearance and disappearance of new and old goods and services, as well as changes

More information

Basics of Counting. The product rule. Product rule example. 22C:19, Chapter 6 Hantao Zhang. Sample question. Total is 18 * 325 = 5850

Basics of Counting. The product rule. Product rule example. 22C:19, Chapter 6 Hantao Zhang. Sample question. Total is 18 * 325 = 5850 Basics of Counting 22C:19, Chapter 6 Hantao Zhang 1 The product rule Also called the multiplication rule If there are n 1 ways to do task 1, and n 2 ways to do task 2 Then there are n 1 n 2 ways to do

More information

Ronald Graham: Laying the Foundations of Online Optimization

Ronald Graham: Laying the Foundations of Online Optimization Documenta Math. 239 Ronald Graham: Laying the Foundations of Online Optimization Susanne Albers Abstract. This chapter highlights fundamental contributions made by Ron Graham in the area of online optimization.

More information

The Virtual Spring Mass System

The Virtual Spring Mass System The Virtual Spring Mass Syste J. S. Freudenberg EECS 6 Ebedded Control Systes Huan Coputer Interaction A force feedbac syste, such as the haptic heel used in the EECS 6 lab, is capable of exhibiting a

More information

Competitive Analysis of On line Randomized Call Control in Cellular Networks

Competitive Analysis of On line Randomized Call Control in Cellular Networks Competitive Analysis of On line Randomized Call Control in Cellular Networks Ioannis Caragiannis Christos Kaklamanis Evi Papaioannou Abstract In this paper we address an important communication issue arising

More information

The AGA Evaluating Model of Customer Loyalty Based on E-commerce Environment

The AGA Evaluating Model of Customer Loyalty Based on E-commerce Environment 6 JOURNAL OF SOFTWARE, VOL. 4, NO. 3, MAY 009 The AGA Evaluating Model of Custoer Loyalty Based on E-coerce Environent Shaoei Yang Econoics and Manageent Departent, North China Electric Power University,

More information

Use of extrapolation to forecast the working capital in the mechanical engineering companies

Use of extrapolation to forecast the working capital in the mechanical engineering companies ECONTECHMOD. AN INTERNATIONAL QUARTERLY JOURNAL 2014. Vol. 1. No. 1. 23 28 Use of extrapolation to forecast the working capital in the echanical engineering copanies A. Cherep, Y. Shvets Departent of finance

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1. Secure Wireless Multicast for Delay-Sensitive Data via Network Coding

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1. Secure Wireless Multicast for Delay-Sensitive Data via Network Coding IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1 Secure Wireless Multicast for Delay-Sensitive Data via Network Coding Tuan T. Tran, Meber, IEEE, Hongxiang Li, Senior Meber, IEEE,

More information

How To Find An Optimal Search Protocol For An Oblivious Cell

How To Find An Optimal Search Protocol For An Oblivious Cell The Conference Call Search Problem in Wireless Networks Leah Epstein 1, and Asaf Levin 2 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. lea@math.haifa.ac.il 2 Department of Statistics,

More information

Software Quality Characteristics Tested For Mobile Application Development

Software Quality Characteristics Tested For Mobile Application Development Thesis no: MGSE-2015-02 Software Quality Characteristics Tested For Mobile Application Developent Literature Review and Epirical Survey WALEED ANWAR Faculty of Coputing Blekinge Institute of Technology

More information

Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation

Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation Int J Counications, Network and Syste Sciences, 29, 5, 422-432 doi:14236/ijcns292547 Published Online August 29 (http://wwwscirporg/journal/ijcns/) Load Control for Overloaded MPLS/DiffServ Networks during

More information

How To Get A Loan From A Bank For Free

How To Get A Loan From A Bank For Free Finance 111 Finance We have to work with oney every day. While balancing your checkbook or calculating your onthly expenditures on espresso requires only arithetic, when we start saving, planning for retireent,

More information

Factor Model. Arbitrage Pricing Theory. Systematic Versus Non-Systematic Risk. Intuitive Argument

Factor Model. Arbitrage Pricing Theory. Systematic Versus Non-Systematic Risk. Intuitive Argument Ross [1],[]) presents the aritrage pricing theory. The idea is that the structure of asset returns leads naturally to a odel of risk preia, for otherwise there would exist an opportunity for aritrage profit.

More information

Online Community Detection for Large Complex Networks

Online Community Detection for Large Complex Networks Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence Online Counity Detection for Large Coplex Networks Wangsheng Zhang, Gang Pan, Zhaohui Wu, Shijian Li Departent

More information

Physics 211: Lab Oscillations. Simple Harmonic Motion.

Physics 211: Lab Oscillations. Simple Harmonic Motion. Physics 11: Lab Oscillations. Siple Haronic Motion. Reading Assignent: Chapter 15 Introduction: As we learned in class, physical systes will undergo an oscillatory otion, when displaced fro a stable equilibriu.

More information

Implementation of Active Queue Management in a Combined Input and Output Queued Switch

Implementation of Active Queue Management in a Combined Input and Output Queued Switch pleentation of Active Queue Manageent in a obined nput and Output Queued Switch Bartek Wydrowski and Moshe Zukeran AR Special Research entre for Ultra-Broadband nforation Networks, EEE Departent, The University

More information

Trading Regret for Efficiency: Online Convex Optimization with Long Term Constraints

Trading Regret for Efficiency: Online Convex Optimization with Long Term Constraints Journal of Machine Learning Research 13 2012) 2503-2528 Subitted 8/11; Revised 3/12; Published 9/12 rading Regret for Efficiency: Online Convex Optiization with Long er Constraints Mehrdad Mahdavi Rong

More information

Online Bipartite Perfect Matching With Augmentations

Online Bipartite Perfect Matching With Augmentations Online Bipartite Perfect Matching With Augmentations Kamalika Chaudhuri, Constantinos Daskalakis, Robert D. Kleinberg, and Henry Lin Information Theory and Applications Center, U.C. San Diego Email: kamalika@soe.ucsd.edu

More information

Optimal and nearly optimal online and semi-online algorithms for some scheduling problems

Optimal and nearly optimal online and semi-online algorithms for some scheduling problems Optimal and nearly optimal online and semi-online algorithms for some scheduling problems Ph.D. thesis Made by: Dósa György Supervisor: Vízvári Béla University of Szeged, Faculty of Science Doctoral School

More information

HW 2. Q v. kt Step 1: Calculate N using one of two equivalent methods. Problem 4.2. a. To Find:

HW 2. Q v. kt Step 1: Calculate N using one of two equivalent methods. Problem 4.2. a. To Find: HW 2 Proble 4.2 a. To Find: Nuber of vacancies per cubic eter at a given teperature. b. Given: T 850 degrees C 1123 K Q v 1.08 ev/ato Density of Fe ( ρ ) 7.65 g/cc Fe toic weight of iron ( c. ssuptions:

More information

Managing Complex Network Operation with Predictive Analytics

Managing Complex Network Operation with Predictive Analytics Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory

More information

ESTIMATING LIQUIDITY PREMIA IN THE SPANISH GOVERNMENT SECURITIES MARKET

ESTIMATING LIQUIDITY PREMIA IN THE SPANISH GOVERNMENT SECURITIES MARKET ESTIMATING LIQUIDITY PREMIA IN THE SPANISH GOVERNMENT SECURITIES MARKET Francisco Alonso, Roberto Blanco, Ana del Río and Alicia Sanchis Banco de España Banco de España Servicio de Estudios Docuento de

More information

A Study on the Chain Restaurants Dynamic Negotiation Games of the Optimization of Joint Procurement of Food Materials

A Study on the Chain Restaurants Dynamic Negotiation Games of the Optimization of Joint Procurement of Food Materials International Journal of Coputer Science & Inforation Technology (IJCSIT) Vol 6, No 1, February 2014 A Study on the Chain estaurants Dynaic Negotiation aes of the Optiization of Joint Procureent of Food

More information

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises Advance Journal of Food Science and Technology 9(2): 964-969, 205 ISSN: 2042-4868; e-issn: 2042-4876 205 Maxwell Scientific Publication Corp. Subitted: August 0, 205 Accepted: Septeber 3, 205 Published:

More information

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries

More information

Identifying Malicious Nodes in Network-Coding- Based Peer-to-Peer Streaming Networks

Identifying Malicious Nodes in Network-Coding- Based Peer-to-Peer Streaming Networks Identifying Malicious Nodes in Network-Coding- Based Peer-to-Peer Streaing Networks Qiyan Wang, Long Vu, Klara Nahrstedt, Hianshu Khurana University of Illinois at Urbana-Chapaign Chapaign, IL, 61801,

More information

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS Artificial Intelligence Methods and Techniques for Business and Engineering Applications 210 INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE

More information

Introduction to Unit Conversion: the SI

Introduction to Unit Conversion: the SI The Matheatics 11 Copetency Test Introduction to Unit Conversion: the SI In this the next docuent in this series is presented illustrated an effective reliable approach to carryin out unit conversions

More information

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2 Exploiting Hardware Heterogeneity within the Sae Instance Type of Aazon EC2 Zhonghong Ou, Hao Zhuang, Jukka K. Nurinen, Antti Ylä-Jääski, Pan Hui Aalto University, Finland; Deutsch Teleko Laboratories,

More information

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA Audio Engineering Society Convention Paper Presented at the 119th Convention 2005 October 7 10 New York, New York USA This convention paper has been reproduced fro the authors advance anuscript, without

More information

On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes

On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes On Coputing Nearest Neighbors with Applications to Decoding of Binary Linear Codes Alexander May and Ilya Ozerov Horst Görtz Institute for IT-Security Ruhr-University Bochu, Gerany Faculty of Matheatics

More information

High Performance Chinese/English Mixed OCR with Character Level Language Identification

High Performance Chinese/English Mixed OCR with Character Level Language Identification 2009 0th International Conference on Docuent Analysis and Recognition High Perforance Chinese/English Mixed OCR with Character Level Language Identification Kai Wang Institute of Machine Intelligence,

More information

Non-Price Equilibria in Markets of Discrete Goods

Non-Price Equilibria in Markets of Discrete Goods Non-Price Equilibria in Markets of Discrete Goods (working paper) Avinatan Hassidi Hai Kaplan Yishay Mansour Noa Nisan ABSTRACT We study arkets of indivisible ites in which price-based (Walrasian) equilibria

More information