Input Queued Switches: Cell Switching vs. Packet Switching
|
|
- Melvyn Warner
- 7 years ago
- Views:
Transcription
1 Input Queued Switches: Cell Switching vs. Pacet Switching Yashar Ganjali, Abtin Keshavarzian, Devavrat Shah Departents of EE and CS Stanford University Stanford, CA Abstract Input Queued(IQ) switches have been very well studied in the recent past. The ain proble in the IQ switches concerns scheduling. The ain focus of the research has been the fixed length pacet-nown as cells-case. The scheduling decision becoes relatively easier for cells copared to the variable length pacet case as scheduling needs to be done at a regular interval of fixed cell tie. In real traffic dividing the variable pacets into cells at the input side of the switch and then reassebling these cells into pacets on the output side achieve it. The disadvantages of this cell-based approach are the following: (a) bandwidth is lost as division of a pacet ay generate incoplete cells, and (b) additional overhead of segentation and reassebling cells into pacets. This otivates the pacet scheduling: scheduling is done in units of arriving pacet sizes and in non-preeptive fashion. In [7] the proble of pacet scheduling was first considered. They show that under any adissible Bernoulli i.i.d. arrival traffic a siple odification of Maxiu Weight Matching(MWM) algorith is stable, siilar to cell-based MWM [1-4]. In this paper, we study the stability properties of pacet based scheduling algorith for general adissible arrival traffic pattern. We first show that the result of [7] extends to general re-generative traffic odel instead of just adissible traffic, that is, pacet based MWM is stable. Next we show that there exists an adissible traffic pattern under which any wor-conserving (that is axial type) scheduling algorith will be unstable. This suggests that the pacet based MWM will be unstable too. To overcoe this difficulty we propose a new class of waiting algoriths. We show that waiting -MWM algorith is stable for any adissible traffic using fluid liit technique [6]. Keywords Pacet switching, scheduling, variable length pacets I. INTRODUCTION The two iportant design criteria for switching architectures are: (a) throughput of the syste, and (b) average delay. Aong different switching architectures Input Queued(IQ) switch architecture has been very attractive due to its low eory bandwidth requireents copared to other nown architectures. The crossbar constraints of an IQ switch requires it to schedule pacets to be transferred between inputs and outputs. The throughput and delay in IQ switch are heavily dependent on this scheduling decision. In past there has been a lot of research done to design good scheduling algoriths for IQ switches [1-3],[8]. In these studies there is an iplicit assuption that the switch wors with fixed-size cells. In other words, they all assue that whenever a pacet arrives to the syste, it is divided into equal-sized cells, and after the switching is done, the cells are re-assebled in the for of the original pacet before leaving the syste. Contrary to this coon assuption, we consider systes in which the switch directly wors on pacets without breaing the into cells. We call such a switching syste a pacet-based syste copared to the cell-based systes, which only deal with the fixed-size cells. Using fixed-size cells in the switch aes the ipleentation of the scheduling algorith of the switch uch easier copared to the variable-length pacets, but the following are the two ain disadvantages with fixedsized cell approach: (i) Pacets arriving at input side need to be segented into cells, requiring a special input segentation odule; and at the output side these cells need to be re-assebled. This induces significant ipleentation overhead. (ii) Pacets ay generate incoplete cells because a cell should not contain data belonging to two different pacets. This can result in significant bandwidth loss. For exaple, if cell size is 64 bytes and pacet size is 40 bytes then the aount of bandwidth lost is 24/64 37%!. This otivates the study of pacet scheduling algoriths. The pacet-based algoriths have been studied before in [7]. It is iportant to first understand the throughput region for the case of pacet-scheduling algoriths. Naturally there is soe siilarity between pacet-based and cell-based scheduling. For cell-based scheduling it is nown that Maxiu Weight Matching(MWM) algorith is stable [1-6] for any adissible traffic. In [7] it is shown that canonical odification of the cell-based MWM for pacet-based, which we denote as PB-MWM, achieves 100%
2 throughput for any adissible Bernoulli i.i.d. traffic with pacet lengths being bounded (rather probabilistically bounded and independen. In this paper we first study the PB-MWM algorith. We study the throughput properties of the PB-MWM algorith under general adissible traffic rather than restricting to the Bernoulli i.i.d. case. We first show that the PB-MWM is stable even for any for of regenerative adissible traffic, with the tie of regeneration being finite in ean(note: Bernoulli i.i.d. traffic is special case of regenerative traffic). We obtain this result using a different proof technique, which sees to be soewhat sipler. Next we consider general adissible traffic with Strong Law of Large Nubers property. We show that there exists a counter exaple for which the PB-MWM is not stable. In general, this counter exaple shows that any scheduling algorith that tries to schedule in worconserving fashion or in axial-sense every tie, will not be stable. This counterexaple suggests a fundaental difference between pacet-based and cellbased scheduling algoriths. Hence in general to obtain stability we need to design a different type of pacetbased scheduling algorith. We propose a new class of algoriths which is called waiting algoriths. In particular, we show that waiting odification of PB- MWM is stable for any adissible traffic with bounded pacet lengths using fluid technique siilar to [6] (note: in general ean pacet length should be bounded). The structure of this paper is as follows. In section II, we describe the input-queued switch architecture, the cell-based axiu weight atching (MWM) algorith and the fluid odel for the switch briefly. In Section III, the pacet-based switching algoriths are defined. The canonical extension of MWM algorith for the pacet-based scenario is defined. In section IV, we prove the stability of the pacet-based MWM for regenerative adissible traffic extending the proof of [7]. In section V we present the counter-exaple that otivates the classification of pacet-based algorith into two classes of waiting and non-waiting groups. In section VI, we introduce a siple waiting algorith, which is proved to be stable using fluid techniques. Finally in section VII we conclude the paper. II. INPUT-QUEUED SWITCH In this section we describe the odel of an Input Queued (IQ) switch that is the ain architecture studied in this paper. Figure 1 shows the logical structure of an IQ switch. Although it is not necessary, we assue that the switch has the sae nuber of input and output ports denoted by N. In fact, in practical designs, generally one input and output interface reside on the sae line card, thus the nuber of inputs and outputs is the sae. We assue that the tie is slotted and at each tie slot, at ost one data unit (of nown fixed size) can arrive to each input port. We call this data unit a cell. Cells arriving at input i and destined for output j are stored at input in a FIFO buffer called virtual output queue (VOQ), denoted here by VOQ. This queue separation avoids the loss of throughput due to the head-of-line blocing proble. The cross-bar fabric is assued to be eory-less. We say that a switch has speed up S, if at each tie slot at ost S cells can be reoved fro each input and at ost S cells can be transferred to each output. Input 1 Input N VOQ 11 VOQ 1N VOQ N1 VOQ NN Switching Fabric Figure 1. An Input Queued switch. Output 1 Output N The scheduling algorith decides which cells should be transferred between the inputs and outputs of the switch at every tie slot, i.e., it selects a atching between inputs and outputs in such a way that no input (respectively, outpu ay be atched to ore than one output (respectively, inpu. We say a scheduling algorith is "wor conserving" or "axial", if an input is never left un-atched when it has a pacet for an unatched output. We represent a atching by an N N atrix =[ ] where if input i is connected to output j, we have =1, otherwise =0. The set of all possible atchings is denoted by M. Let A (n) denote the nuber of cells that have arrived at input i destined for output j up to tie n. We adopt the convention that A (0)=0. We assue that the arrival processes A(n)=[A (n)] satisfy the Strong Law of Large Nubers (SLLN), that is, A li = λ i, j = 1,..., N a.s. (1) n n We call λ the arrival rate at VOQ. This assuption on the arrival process is very ild.
3 Definition : We say the arrival processes with arrival rate atrix Λ = [λ ], is adissible if the above condition holds and no input or output is overloaded, in other words, N λ 1 j = 1,..., N i= 1 N (2) λ 1 i = 1,..., N. (3) j= 1 Let D (n) show the nuber of departures fro VOQ up to tie n. Again let D (0)=0 and D(n)=[D (n)] Definition : A switch operating under a atching algorith is called stable (rate stable) if, with probability one, D = λ n li i, j = 1,..., N, (4) n for any adissible arrival process A (n) with rate λ. We say the traffic is i.i.d. if the arrival process is such that, (a) the arrivals to different input ports are independent, and (b) the arrival to the sae input port at different tie slots are also independent. We would lie to note that, a general adissible traffic, satisfying SLLN as above, does not need to have independence. Let Z (n) show the nuber of cells in VOQ at tie n, including any arrival at tie n, then the atrix Z(n)=[Z (n)] shows the queue occupancy at tie n. For any atching M the weight W (n) of the atching at tie n is defined as; where < A,B > = the sae size. W =<, Z( n) >, (5) i, j A B for two atrices A and B of A. Maxiu Weight Matching (MWM) Algorith At each tie slot, MWM algorith will select the atching with the axiu weight aong all atchings in M. If there are ultiple MWMs, one of the is selected arbitrarily. We denote the axiu weight atching and its corresponding weight at tie n by ( n ) and W ( n ) respectively. That is, ( ) = arg ax W, (6) n M W ( = M n) = ax W W. (7) In [1][3], it was shown that under any adissible Bernoulli i.i.d. traffic, MWM algorith is stable. In [6] using the fluid odel analysis it was shown that MWM is stable for any adissible traffic satisfying (1). The notion of stability(rate stability) in [6] is weaer than the notion of stability used in [1]-[3], but in [6] the stability is proved for a larger class of arrival traffic. In this paper also we adopt notion of rate stability as in (4). B. Fluid Model and Switch Dynaics This section describes the fluid odel of a discrete tie switch. For any M, let T (n) represent the cuulative aount of tie that the atching has been used up to tie n under the scheduling algorith used. We assue that T (0)=0. Note that T (n) is a nondecreasing function with respect to n. For a discrete-tie switch the following three equations govern the dynaics of the switch: D Z = A D, (8) ( T T ( n 1 ) = D ( n 1) + 1 Z > 0} ) M {, (9) T ( n = n. (10) ) M The first equation siply states that the nuber of cells in VOQ equals the total nuber of arrivals inus the total nuber of departures. The second equation obtains the nuber of departure by considering all the atchings that can connect the input i to output j. The third equation siply states that at each tie slot, exactly one of the possible atchings is used. In [6], the fluid odel of a discrete-tie switch was introduced. We will use this fluid odel in this paper without presenting any proofs or justification. An interested reader can refer to [6] for an elaborate exposition to this topic. Fro [6], the continuous equations governing the dynaics of the fluid odel of switch described above are as follows: for every i,j=1,,n D = Z = λ t D, (11) M M T ( t ) if Z > 0, (12) T ( t ) = t, (13) where the functions Z ( t ), D ( t ), and T ( t ) are called the fluid liits and are obtained fro the discrete rando processes Z (n), D (n), and T (. For
4 exaple the Z ( t ) is obtained as follows. First, a continuous version Zˆ of the discrete function Z (n) is created; Z ˆ = Z ( t ) + Z ( t + 1) Z( t ) ( t t ). (14) ( ) Then the fluid liit is obtained as follows; Z ( t ) Zˆ ( r = li. (15) r r All other fluid liit functions are obtained in a siilar anner, that is, the tie is scaled by r and the function is re-noralized by dividing by r. III. PACKET-BASED SWITCHING We described the structure of a cell-switch in the previous section, now we can define how a pacet-based switch perfors. Pacets with different sizes can arrive to the switch. However we assue that the fabric wors on fixed-size data units (cells). So in each tie slot only one cell can be sent to each output. Thus, the received pacets ust be segented into an integer nuber of cells. For siplicity, without loss of generality we will assue that each pacet is ade up of an integer nuber of cells. We constrain the scheduling algorith to deliver contiguously all the cells obtained fro the segentation of the sae pacet, i.e., at the output they are not interleaved by the cells fro another input port. More forally we can define a pacet-based scheduling algorith as follows: Definition: A pacet-based scheduling algorith is a scheduling algorith such that once it starts transitting the first cell of a pacet to an output port, it continues the transission until the whole pacet is copletely received at the corresponding output port. With this constraint of scheduling algorith being non-preeptive on pacets avoids the proble of segentation at input ports and reassebly of cells at output ports in a switch. In any cell-based switching syste, different cells of the sae pacet ay observe different delay values before leaving the syste. It is reasonable to assue that the delay seen by the user is sae as the delay observed by the last cell of any pacet. Therefore a scheduling algorith that transfers the last cell of a pacet with larger delay perfors poorly, even if it perfors well on all other cells of the pacet. Most of the nown cell-based scheduling are not aware of the existence of pacets, and therefore there is a chance that a pacet-based scheduling algorith which is aware of the entity of a pacet can use this inforation to do a better scheduling (in the sense of the waiting delay observed by the users). Siilar reasoning was given in [7] by authors in the favor of pacet scheduling. It is easy to convert a nown cell-based algorith into a pacet-based one. Let us consider any cell-based scheduling algorith X (e.g. MWM, axial atching, etc.). We can easily convert X into a pacet-based algorith as follows: At each tie slot, we divide the input-output ports into two disjoint sets: Busy ports: the set of input-output ports which have been atched to each other in the previous tie slot and are still in the iddle of sending a pacet. Free ports: the set of input-output ports which either have no pacets to send, or just finished sending a pacet. The scheduling algorith PB-X eeps the atching already used by busy ports and finds a new (sub- )atching for free ports using the cell-based scheduling algorith X. Initially all the ports are assued to be free. In [7] Marsan et al. considered pacet-based scheduling algoriths in the way defined as above. They described the odel of a pacet-based scheduling algorith, and highlighted the effect of considering pacet entity in designing the scheduling algoriths. They proved that the PB-MWM is stable for any adissible Bernoulli i.i.d. traffic. With the help of siulation results, they showed that pacet-based scheduling algoriths could outperfor a cell-based algorith for certain cases. In the next section we give a different proof for stability of PB-MWM using the fluid odel technique. This proof proves the stability of PB- MWM for a ore general class of arrival process. IV. PB-MWM STABILITY In this section we consider the stability of the pacetbased MWM algorith. First we define soe notations used in the proofs. Definition: A atching (n) used at tie n is called -iperfect atching, if = ( n ). (16) In other words, is -iperfect if it is equal to the axiu weight atching tie slots ago. Obviously, any axiu weight atching is a 0- iperfect atching at the tie it is chosen by the scheduler. The following Lea states a very siple but iportant property of -iperfect atchings. Lea 1: The weight of a -iperfect atching is at ost 2N different fro the weight of the axiu
5 weighted (0-iprefec atching at any given tie slot, i.e., if (n) is a -iperfect atching with weight W (n), used at tie slot n, then; W W 2N. (17) that the pacet lengths are bounded. For this section, we assue that arrival process is stationary. Let p T ( denote stationary probability of event {T=t}. Let W(n) denote the weight of atching obtained by scheduling algorith SA at tie n. Then, Proof: For any atching ' let W '( n ) be its weight at tie n and W (n) be its weight at tie n, then the following inequalities hold under any scheduling algorith: W n ) N W W ( n ) + N. (18) '( ' ' Thus; E{ W Z } t= 0 p T = 0 [ W 2Nt] = W ( n ) 2 N tp T ( t ). (22) This is true because of the following siple reason: during tie slots, at ost cells can arrive (depar at an input port, which in turn can increase (decrease) queue size at any input port by at ost. There are N input ports, and hence the net weight can increase (decrease) by at ost N. We now that (n) is -iperfect, thus, ( n) = ( n ), i.e., at tie n, has the largest weight aong all possible atchings; M W n n ) W ( n ). (19) ( )( ' ' Thus if we select = we have; W n ) W ( n ). (20) ( Furtherore, using the above inequities we can write; W + N W ( n ). (21) Cobining the last three inequalities, we obtain the result stated in lea 1. QED. Let us consider the following scheduling algorith, which we denote as SA: 1. Let s (n) be the schedule used by SA at tie n. 2. At tie n+1, if all ports are free then s ( n + 1) = ( n + 1) else s ( n + 1) = s( n). Let T be the tie between two successive occurrences of event that all ports becoe free. Note that the atching obtained by algorith SA is at worst T-iperfect, by definition. Now T is a rando variable which depends on the arrival process and the pacetlengths. For siplicity without loss of generality assue E{ W Z } W 2NE{ T}. (23) Now if E{T} is finite we say that the traffic pattern is regenerative. In other words, it has property that on average it requires a finite aount of tie to reach the state where all the input and output ports are free. Note that this property is related to the traffic pattern and not with the scheduling algorith SA. It is already shown in [7] that if the traffic is fored by variable length pacets with independent rando size with finite average and variance, and adissible Bernoulli i.i.d. traffic the average value of T is bounded. In general, traffic need not be Bernoulli i.i.d. to obtain this property and there is uch larger class of distribution under which this property holds true. For such regenerative traffic, we prove the stability of SA algorith. The following is a ey lea, which states a ore general result about stability. Lea 2: A scheduling algorith is rate-stable for any adissible traffic with property (1) if the average value of the weight of the atching it uses at each tie slot, is at ost away fro the axiu weight by a bounded constant value, i.e., if E{ W Z } W B, (24) then the algorith is stable. Proof: Let Z( t ) = [ Z ] and D = [ D ], then consider the Lyapunov function L( as; 2 L =< Z, Z( >= Z. (25) It was shown in [6] that for MWM L & 0 if any Z 0. This in turn iplies that if Z (0) = 0 then Z = 0 for all t. This proves the rate-stability of the switch. Hence, our interest is in showing L & 0 if any i, j
6 Z 0 under the scheduling algorith in consideration with property that the expected weight of the atching used is at ost a bounded constant away fro the weight of MWM. Consider all t such that the fluid quantities are differentiable and hence L & ( is well defined. By definition where W ( t ) = Z,. L( = 2 Now fro (12) we have; D t Z ( ), Z(, Z( D( = 2 Λ, Z( t = t Λ D ( ) 2 Z ( ), 2 Z(,. (26) = = Let us define (n) as the difference between the weight of the MWM and weight of the atching obtained by scheduling algorith at tie n. We now that E[ ( n)] is bounded by soe constant B which does not depend on n. Further (n) is a positive rando variable. Hence (n) is bounded alost surely. Thus, on the fluid liit scale we obtain that; M M Z, T T W, (27) ˆ ( r Bˆ ( = li li = 0. (28) r r r r atching. If we show the set of atchings used by the scheduling algorith by M, we have; D( Z(, = M T W T t = W t ( ) ( ). (30) M Note that although M M but since M is the set of atchings used by the scheduler, we can odify (13) to; M T = t. (31) changing the M to M. Now cobining this result with (30) we obtain; Thus the derivative of D( Z ( t ), = W ( t ). (32) L( is; L = 2 Z, Λ 2W ( t ). (33) By Biroff-von Neuann s Theore for the doubly sub-stochastic (adissible) traffic Λ, we obtain: Λ γ, γ 1 <. (34) By definition of the axiu weight atching; Z, ( t W ). (35) Thus, in the fluid scale the weight of the MWM and the weight of the atching used by scheduler will be the sae, i.e., W W ( t = ). (29) Therefore the algorith will only use the atchings that have the sae weight as the axiu weight Hence fro (33) and (34) we obtain; L 2 γ 1 W ( t ). (36) Hence if any Z > 0 then L & < 0. The rest of the proof for the rate-stability follows fro [6]. QED.
7 Now cobining this lea with the above result, we conclude that the algorith SA is stable. Note that, the above proof does not require the bounded pacet lengths, but requires only independent pacet lengths with bounded ean. Theore 3: The SA algorith is stable under regenerative adissible input traffic. We would lie to note that, under PB-MWM algorith the tie between successive occurrences of event when all ports becoe free will also have required property as in Lea 2 under Bernoulli i.i.d. traffic for independent pacet lengths with bounded ean. Hence the stability for PB-MWM will follow fro Lea 2. We would lie to note that as proved for SA, the PB- MWM algorith is stable for a ore general class of traffic. In the next section we show that there are adissible traffic patterns for which the algorith is unstable. V. PACKET-BASED ALGORITHM CLASSIFICATION It is proved in [6] that cell-based MWM algorith has strong stability property that it is stable as long as the input traffic is adissible with property (1). It does not require any other condition on distribution. In previous section we proved the stability for PB- MWM(and SA) for adissible traffic with additional condition that it should be regenerative. The question arises is: whether the PB-MWM(or SA) is stable for any adissible traffic under only (1). In this section, we show that it is not stable using a siple counter-exaple. A 11 A 12 Tie =, 2 =. (37) When the first pacet arrives to the switch, the PB- MWM uses parallel atching ( 1), and then the scheduler is forced to eep the sae atching for 3 tie slots till the pacet finishes. Before this pacet is finished, a pacet of length 2 coes to input 1 and it is scheduled for output 1 under scheduling algorith. In this way, under this traffic pattern, it is easy to see that whenever one input port becoes free, the other input port is busy serving a pacet. Hence both input ports are never free together. This forces the scheduling algorith to use the parallel schedule all the tie. Therefore none of the pacets arriving at VOQ 12 and VOQ 21 will ever get the chance to depart. Thus, the switch is unstable. Note that cell-based MWM will be able to handle this traffic. The counter-exaple described above also shows that any wor-conserving or axial algorith is not stable for that particular traffic pattern. This otivates us to classify the pacet-scheduling algorith in the following two classes: 1. Wor-conserving(non-waiting) algoriths: under these algoriths an input is never left un-atched when it has a pacet for any of unatched output. 2. Waiting algoriths: these algoriths are not always wor-conserving, that is, they do wait for an infinite nuber of tie slots. The above counter-exaple suggests the following general result about the wor-conserving (axial) algoriths. Theore 4: There is no wor-conserving scheduling algorith that is stable under any adissible traffic with condition (1). A 21 A 22 Figure 2. Traffic Pattern. Consider a switch operating under PB-MWM (or SA) with input traffic pattern as shown in Figure 2. A (i,j=1,2) shows the arrival to VOQ. The traffic pattern is periodic with period of length 10. Note that no input or output is overloaded. In fact, λ 1, 1 = 0.8, λ1,2 = 0.1, λ 2, 1 = 0. 1, and λ 2, 2 = The switch can use one of the two possible atchings, naely 1 which is called the parallel atching and 2 the cross atching, i.e., Note that even if an algorith is waiting for finite nuber of steps it becoes wor-conserving after that and hence fro above counter-exaple it becoes unstable. This requires that if algorith wants to be stable then it ust wait for infinitely any tie steps. VI. A GENERALLY STABLE WAITING PACKET-BASED ALGORITHM. In this section we describe a waiting algorith. We will show that the waiting -MWM algorith will achieve 100% throughput for any adissible traffic pattern and in particular, it will be stable for the traffic pattern described in previous section for which PB-
8 MWM or any pacet-based wor-conserving scheduling policy was unstable. The waiting algoriths are otivated fro the counter-exaple described in previous section for worconserving algoriths. The ain proble is that the wor-conserving algorith greedily atches the ports whenever possible, forcing it to always eep the parallel atching in the counter-exaple of figure 2. One way to overcoe this proble is the following: when a pacet gets served do not schedule the freed ports till all ports becoe free and schedule according to a full MWM schedule. The waiting, synchronizes the weight of schedule to the weight of MWM schedule. Hence if waiting is done frequently enough then the weight of schedule is always not ore than a bounded constant away fro MWM, by reasoning siilar to Lea 1. However note that waiting eans that during the waiting period soe ports are losing bandwidth. Hence if waiting is done too aggressively then the algorith can not utilize full bandwidth. These observations lead to the following waiting algorith which we denote as PBwMWM. PB-WMWM The switch runs at speedup (1+ ) for arbitrarily sall positive constant >0. Let the axiu length of any pacet be L (this assuption can be relaxed to ean pacet length being finite which will be described later). Divide the tie into period of length ( L / ) units. Thus tie is considered as [ 0, L / ], [ L / + 1,2 L / ], and so on. Scheduling decisions are ade only when any of scheduled pacets finishes its service and corresponding ports get epty. Let one or ore pacets get served at tie n [ L / + 1,( + 1) L / ]. Consider the following cases: n [ L + 1,( + 1) L L ] : use usual PB (1 + ) MWM to atch the free nodes as before. Otherwise wait on all the pacets till all scheduled pacets get over and all ports are free. After that, use full MWM to re-schedule all the ports and serve. Note that the above algorith at ost loses bandwidth of L per every ( L / ) tie slots. That is it loses bandwidth of per tie slot at ost. The algorith runs at ( 1+ ) speedup in order to ae up for this lost bandwidth. We state the following theore about stability of PB-wMWM: Theore 5: The PB-wMWM algorith is stable(rate stable) under any adissible traffic with property (1) at at speedup ( 1+ ) for any > 0. Proof: Note that the way algorith is defined, every ( L / ) tie the weight of atching is sae as weight of axiu weight atching. Thus any tie the algorith is at worst ( L / ) -iperfect. Hence by Lea 1, the weight of the atching is at ost B = 2NL / away fro MWM. The fraction of tie the algorith idles on any of the ports is bounded above by L (1 + ) L =. (38) 1+ Under speedup ( 1+ ) assuing the algorith is scheduling all the tie, the equation (13) changes to T = (1 + t. (39) ) M But in our algorith, since it is waiting, the above equation ay not be true. Fro above discussion, at worst fraction of the bandwidth is lost in waiting. That is, at least ( 1+ )(1 ) = 1, (40) 1+ is the effective speedup obtained. Thus, the equation (13) of the fluid odel changes to In other words, M M T ( t ) t T 1 (41) (42) Now the arguents siilar to ones used in proof of Lea 2, yield the desired result that PB-wMWM is stable. QED. The above algorith PB-wMWM, assues the pacet lengths to be bounded and bound L is nown. But in reality the L ight not be nown. Further we do not require the pacet lengths to be bounded, but only ean pacet length should be bounded. To address this issue we odify the PB-wMWM algorith as follows,
9 MODIFIED PB-WMWM (PB -WMWM) Initially start with the MWM algorith and start waiting iediately. Copute the axiu aount of idling done by any port. When the waiting starts, there are soe unfinished pacets. Note that the axiu waiting done by any port is at ost the axiu length of any pacet that was under schedule. Let L e (1) represent the axiu length of pacets under schedule. Set M ( 1) = Le (1) / and do the PB-MWM for M (1) tie slots and then start waiting after that. Now let L e (2) be the axiu length of the pacets under schedule when the waiting starts at the end of M (1) tie slots. Siilarly define M 2) = L (2) /. ( e Continue this process recursively over tie. In general we obtain the following recursive expression: Le ( l) M ( l) =. (43) The two ain properties required in the proof of Theore 5 are: (a) The effective speed is at least 1, and (b) the weight of schedule used by algorith is at ost bounded constant away fro the weight of MWM. In the above algorith, let s copute these two quantities as follows: (a) The effective bandwidth lost: In the l total idling per port is at ost for tie while the length of period is th L e period the ( l) /(1 + ) = Le ( l) Le ( l) Le ( l) P( l) M ( l) + = (44) + Thus the fraction of bandwidth lost is at ost: L e ( l) (1 + ) P( l) 1 = (45) Note that this bandwidth loss is sae as the loss in PB-wMWM coputed in proof of Theore 5. (b) The difference between the weight of MWM and the schedule will be at ost M ( l)(1 + ) that is L e (l)(1+ ). (46) Given that L e (l) has bounded ean and pacet lengths are independent we will obtain that the above quantity is bounded alost surely as required in Lea 2. Fro above discussion we obtain the following Theore: Theore 6: The PB -wmwm is rate-stable for any adissible traffic with property (1) and independent pacet lengths with bounded ean. A. Note on speedup In PB-wMWM and PB -wmwm we required speedup ( 1+ ) for arbitrary > 0. If we now that the γ = (1 α) (47) in (34), then in PB-wMWM (PB -wmwm) we can use < α / 2 in defining different quantities and have speedup of 1 only to achieve stability. VII. CONCLUSIONS In this paper we considered the pacet-scheduling algoriths for IQ switch architecture. The result of [7] showed that odification of cell-based MWM for pacet scheduling yields 100% throughput for any adissible Bernoulli i.i.d. traffic with independent pacet lengths of bounded ean. We generalized this result for soe what broader class of arrival traffic pattern. We showed that there exists adissible traffic pattern for which no worconserving or axial algorith is stable. To overcoe this proble we proposed a new class of waiting algoriths. Under the waiting algorith the switch becoes stable for any adissible traffic. This was proved using fluid liit technique. It is interesting to note that the wor-conservation for pacet scheduling is not always beneficial in this sense, unlie cell-based scheduling. This suggests that scheduling pacet-based is quite different fro the cell-based scheduling. ACKNOWLEDGMENT The authors than B. Prabhaar and N. McKeown for suggesting the proble and discussions.
10 REFERENCES [1] N.McKeown, V. Ananthara, J. Walrand: Achieving 100% throughput in an input-queued Switch, INFOCOM 1996, pp [2] L. Tassiulas, A. Ephreides, Stability Properties of constrained queuing systes and scheduling plicies for axiu throughput in ultihop radio networs, IEEE Trans. Autoatic Control, vol. 37, no. 12, Dec 1992, pp [3] N.McKeown, V. Ananthara, J. Walrand: Achieving 100% Throughput in an Input-Queued Switch, IEEE Transaction on Co., vol. 47, no. 8, Aug. 1999, pp [4] N. McKeown, islip: a scheduling algorith for input-queued switches, IEEE Transaction on Networing, vol. 7, no.2, April 1999, pp [5] N. McKeown, Scheduling algoriths for input-queued cell switches, PhD Thesis, University of California, Bereley, May [6] J.G. Dai, B. Prabhaar, The throughput of data switches with and without speedup, INFOCOM 2000, pp [7] MA. Marsan, A. Bianco, P. Giaccone, E. Leonardi, F. Neri, Pacet Scheduling in Input-Queued Cell-Based Swithces, INFOCOM 2001, pp [8] P. Giaccone, B. Prabhaar, D. Shah, Towards Siple, High- Perforance Schedulers for High-aggregate bandwidth Switches, New Yor, NY, INFOCOM 2002.
arxiv:0805.1434v1 [math.pr] 9 May 2008
Degree-distribution stability of scale-free networs Zhenting Hou, Xiangxing Kong, Dinghua Shi,2, and Guanrong Chen 3 School of Matheatics, Central South University, Changsha 40083, China 2 Departent of
More informationImplementation of Active Queue Management in a Combined Input and Output Queued Switch
pleentation of Active Queue Manageent in a obined nput and Output Queued Switch Bartek Wydrowski and Moshe Zukeran AR Special Research entre for Ultra-Broadband nforation Networks, EEE Departent, The University
More informationON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128
ON SELF-ROUTING IN CLOS CONNECTION NETWORKS BARRY G. DOUGLASS Electrical Engineering Departent Texas A&M University College Station, TX 778-8 A. YAVUZ ORUÇ Electrical Engineering Departent and Institute
More informationLoad Balancing and Switch Scheduling
EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: liuxh@systems.stanford.edu Abstract Load
More informationApplying Multiple Neural Networks on Large Scale Data
0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree
More informationReliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks
Reliability Constrained acket-sizing for inear Multi-hop Wireless Networks Ning Wen, and Randall A. Berry Departent of Electrical Engineering and Coputer Science Northwestern University, Evanston, Illinois
More informationRECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure
RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION Henrik Kure Dina, Danish Inforatics Network In the Agricultural Sciences Royal Veterinary and Agricultural University
More informationOnline Bagging and Boosting
Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used
More informationData Set Generation for Rectangular Placement Problems
Data Set Generation for Rectangular Placeent Probles Christine L. Valenzuela (Muford) Pearl Y. Wang School of Coputer Science & Inforatics Departent of Coputer Science MS 4A5 Cardiff University George
More informationThis paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive
MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol., No. 3, Suer 28, pp. 429 447 issn 523-464 eissn 526-5498 8 3 429 infors doi.287/so.7.8 28 INFORMS INFORMS holds copyright to this article and distributed
More informationAn Innovate Dynamic Load Balancing Algorithm Based on Task
An Innovate Dynaic Load Balancing Algorith Based on Task Classification Hong-bin Wang,,a, Zhi-yi Fang, b, Guan-nan Qu,*,c, Xiao-dan Ren,d College of Coputer Science and Technology, Jilin University, Changchun
More informationDynamic Placement for Clustered Web Applications
Dynaic laceent for Clustered Web Applications A. Karve, T. Kibrel, G. acifici, M. Spreitzer, M. Steinder, M. Sviridenko, and A. Tantawi IBM T.J. Watson Research Center {karve,kibrel,giovanni,spreitz,steinder,sviri,tantawi}@us.ib.co
More informationResource Allocation in Wireless Networks with Multiple Relays
Resource Allocation in Wireless Networks with Multiple Relays Kağan Bakanoğlu, Stefano Toasin, Elza Erkip Departent of Electrical and Coputer Engineering, Polytechnic Institute of NYU, Brooklyn, NY, 0
More informationAn Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking
International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15), pp. 197-4 http://d.doi.org/1.1457/ijfgcn.15.8.6.19 An Integrated Approach for Monitoring Service Level Paraeters
More informationCooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks
Cooperative Caching for Adaptive Bit Rate Streaing in Content Delivery Networs Phuong Luu Vo Departent of Coputer Science and Engineering, International University - VNUHCM, Vietna vtlphuong@hciu.edu.vn
More informationAnalyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy
Vol. 9, No. 5 (2016), pp.303-312 http://dx.doi.org/10.14257/ijgdc.2016.9.5.26 Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou
More informationDesign of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller
Research Article International Journal of Current Engineering and Technology EISSN 77 46, PISSN 347 56 4 INPRESSCO, All Rights Reserved Available at http://inpressco.co/category/ijcet Design of Model Reference
More informationSearching strategy for multi-target discovery in wireless networks
Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,
More informationFactored Models for Probabilistic Modal Logic
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence (2008 Factored Models for Probabilistic Modal Logic Afsaneh Shirazi and Eyal Air Coputer Science Departent, University of Illinois
More information6. Time (or Space) Series Analysis
ATM 55 otes: Tie Series Analysis - Section 6a Page 8 6. Tie (or Space) Series Analysis In this chapter we will consider soe coon aspects of tie series analysis including autocorrelation, statistical prediction,
More informationAn Optimal Task Allocation Model for System Cost Analysis in Heterogeneous Distributed Computing Systems: A Heuristic Approach
An Optial Tas Allocation Model for Syste Cost Analysis in Heterogeneous Distributed Coputing Systes: A Heuristic Approach P. K. Yadav Central Building Research Institute, Rooree- 247667, Uttarahand (INDIA)
More informationExtended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network
2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona
More informationMarkov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center
Markov Models and Their Use for Calculations of Iportant Traffic Paraeters of Contact Center ERIK CHROMY, JAN DIEZKA, MATEJ KAVACKY Institute of Telecounications Slovak University of Technology Bratislava
More informationMINIMUM VERTEX DEGREE THRESHOLD FOR LOOSE HAMILTON CYCLES IN 3-UNIFORM HYPERGRAPHS
MINIMUM VERTEX DEGREE THRESHOLD FOR LOOSE HAMILTON CYCLES IN 3-UNIFORM HYPERGRAPHS JIE HAN AND YI ZHAO Abstract. We show that for sufficiently large n, every 3-unifor hypergraph on n vertices with iniu
More informationModeling Parallel Applications Performance on Heterogeneous Systems
Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln
More informationGenerating Certification Authority Authenticated Public Keys in Ad Hoc Networks
SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.
More informationAn Approach to Combating Free-riding in Peer-to-Peer Networks
An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008
More informationEfficient Key Management for Secure Group Communications with Bursty Behavior
Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:
More informationCapacity of Multiple-Antenna Systems With Both Receiver and Transmitter Channel State Information
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO., OCTOBER 23 2697 Capacity of Multiple-Antenna Systes With Both Receiver and Transitter Channel State Inforation Sudharan K. Jayaweera, Student Meber,
More informationIntroduction to Unit Conversion: the SI
The Matheatics 11 Copetency Test Introduction to Unit Conversion: the SI In this the next docuent in this series is presented illustrated an effective reliable approach to carryin out unit conversions
More informationMachine Learning Applications in Grid Computing
Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA gvc@dartouth.edu, guofei.jiang@dartouth.edu
More informationResearch Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises
Advance Journal of Food Science and Technology 9(2): 964-969, 205 ISSN: 2042-4868; e-issn: 2042-4876 205 Maxwell Scientific Publication Corp. Subitted: August 0, 205 Accepted: Septeber 3, 205 Published:
More informationEnergy Proportionality for Disk Storage Using Replication
Energy Proportionality for Disk Storage Using Replication Jinoh Ki and Doron Rote Lawrence Berkeley National Laboratory University of California, Berkeley, CA 94720 {jinohki,d rote}@lbl.gov Abstract Energy
More informationStochastic Online Scheduling on Parallel Machines
Stochastic Online Scheduling on Parallel Machines Nicole Megow 1, Marc Uetz 2, and Tark Vredeveld 3 1 Technische Universit at Berlin, Institut f ur Matheatik, Strasse des 17. Juni 136, 10623 Berlin, Gerany
More informationAirline Yield Management with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN
Airline Yield Manageent with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN Integral Developent Corporation, 301 University Avenue, Suite 200, Palo Alto, California 94301 SHALER STIDHAM
More informationIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1. Secure Wireless Multicast for Delay-Sensitive Data via Network Coding
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1 Secure Wireless Multicast for Delay-Sensitive Data via Network Coding Tuan T. Tran, Meber, IEEE, Hongxiang Li, Senior Meber, IEEE,
More informationThe Application of Bandwidth Optimization Technique in SLA Negotiation Process
The Application of Bandwidth Optiization Technique in SLA egotiation Process Srecko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia
More informationFuzzy Sets in HR Management
Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic blanka.zekova@sezna.cz Jana Talašová Faculty of Science, Palacký Univerzity,
More informationPreference-based Search and Multi-criteria Optimization
Fro: AAAI-02 Proceedings. Copyright 2002, AAAI (www.aaai.org). All rights reserved. Preference-based Search and Multi-criteria Optiization Ulrich Junker ILOG 1681, route des Dolines F-06560 Valbonne ujunker@ilog.fr
More informationA Scalable Application Placement Controller for Enterprise Data Centers
W WWW 7 / Track: Perforance and Scalability A Scalable Application Placeent Controller for Enterprise Data Centers Chunqiang Tang, Malgorzata Steinder, Michael Spreitzer, and Giovanni Pacifici IBM T.J.
More informationA CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS
A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS Isaac Zafrany and Sa BenYaakov Departent of Electrical and Coputer Engineering BenGurion University of the Negev P. O. Box
More informationLecture L9 - Linear Impulse and Momentum. Collisions
J. Peraire, S. Widnall 16.07 Dynaics Fall 009 Version.0 Lecture L9 - Linear Ipulse and Moentu. Collisions In this lecture, we will consider the equations that result fro integrating Newton s second law,
More informationPosition Auctions and Non-uniform Conversion Rates
Position Auctions and Non-unifor Conversion Rates Liad Blurosen Microsoft Research Mountain View, CA 944 liadbl@icrosoft.co Jason D. Hartline Shuzhen Nong Electrical Engineering and Microsoft AdCenter
More informationHalloween Costume Ideas for the Wii Game
Algorithica 2001) 30: 101 139 DOI: 101007/s00453-001-0003-0 Algorithica 2001 Springer-Verlag New York Inc Optial Search and One-Way Trading Online Algoriths R El-Yaniv, 1 A Fiat, 2 R M Karp, 3 and G Turpin
More informationAudio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA
Audio Engineering Society Convention Paper Presented at the 119th Convention 2005 October 7 10 New York, New York USA This convention paper has been reproduced fro the authors advance anuscript, without
More informationExploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2
Exploiting Hardware Heterogeneity within the Sae Instance Type of Aazon EC2 Zhonghong Ou, Hao Zhuang, Jukka K. Nurinen, Antti Ylä-Jääski, Pan Hui Aalto University, Finland; Deutsch Teleko Laboratories,
More informationAn Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration
International Journal of Hybrid Inforation Technology, pp. 339-350 http://dx.doi.org/10.14257/hit.2016.9.4.28 An Iproved Decision-aking Model of Huan Resource Outsourcing Based on Internet Collaboration
More informationA framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries
Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries
More informationMedia Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation
Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State
More informationLocal Area Network Management
Technology Guidelines for School Coputer-based Technologies Local Area Network Manageent Local Area Network Manageent Introduction This docuent discusses the tasks associated with anageent of Local Area
More informationPartitioned Elias-Fano Indexes
Partitioned Elias-ano Indexes Giuseppe Ottaviano ISTI-CNR, Pisa giuseppe.ottaviano@isti.cnr.it Rossano Venturini Dept. of Coputer Science, University of Pisa rossano@di.unipi.it ABSTRACT The Elias-ano
More informationAdaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel
Recent Advances in Counications Adaptive odulation and Coding for Unanned Aerial Vehicle (UAV) Radio Channel Airhossein Fereidountabar,Gian Carlo Cardarilli, Rocco Fazzolari,Luca Di Nunzio Abstract In
More informationManaging Complex Network Operation with Predictive Analytics
Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory
More informationPREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS
PREDICTIO OF POSSIBLE COGESTIOS I SLA CREATIO PROCESS Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia Tel +385 20 445-739,
More informationInformation Processing Letters
Inforation Processing Letters 111 2011) 178 183 Contents lists available at ScienceDirect Inforation Processing Letters www.elsevier.co/locate/ipl Offline file assignents for online load balancing Paul
More informationApproximately-Perfect Hashing: Improving Network Throughput through Efficient Off-chip Routing Table Lookup
Approxiately-Perfect ing: Iproving Network Throughput through Efficient Off-chip Routing Table Lookup Zhuo Huang, Jih-Kwon Peir, Shigang Chen Departent of Coputer & Inforation Science & Engineering, University
More informationEnergy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and migration algorithms
Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and igration algoriths Chaia Ghribi, Makhlouf Hadji and Djaal Zeghlache Institut Mines-Téléco, Téléco SudParis UMR CNRS 5157 9, Rue
More informationImpact of Processing Costs on Service Chain Placement in Network Functions Virtualization
Ipact of Processing Costs on Service Chain Placeent in Network Functions Virtualization Marco Savi, Massio Tornatore, Giacoo Verticale Dipartiento di Elettronica, Inforazione e Bioingegneria, Politecnico
More informationASIC Design Project Management Supported by Multi Agent Simulation
ASIC Design Project Manageent Supported by Multi Agent Siulation Jana Blaschke, Christian Sebeke, Wolfgang Rosenstiel Abstract The coplexity of Application Specific Integrated Circuits (ASICs) is continuously
More informationUse of extrapolation to forecast the working capital in the mechanical engineering companies
ECONTECHMOD. AN INTERNATIONAL QUARTERLY JOURNAL 2014. Vol. 1. No. 1. 23 28 Use of extrapolation to forecast the working capital in the echanical engineering copanies A. Cherep, Y. Shvets Departent of finance
More informationImage restoration for a rectangular poor-pixels detector
Iage restoration for a rectangular poor-pixels detector Pengcheng Wen 1, Xiangjun Wang 1, Hong Wei 2 1 State Key Laboratory of Precision Measuring Technology and Instruents, Tianjin University, China 2
More informationHow To Get A Loan From A Bank For Free
Finance 111 Finance We have to work with oney every day. While balancing your checkbook or calculating your onthly expenditures on espresso requires only arithetic, when we start saving, planning for retireent,
More informationConstruction Economics & Finance. Module 3 Lecture-1
Depreciation:- Construction Econoics & Finance Module 3 Lecture- It represents the reduction in arket value of an asset due to age, wear and tear and obsolescence. The physical deterioration of the asset
More informationThe Benefit of SMT in the Multi-Core Era: Flexibility towards Degrees of Thread-Level Parallelism
The enefit of SMT in the Multi-Core Era: Flexibility towards Degrees of Thread-Level Parallelis Stijn Eyeran Lieven Eeckhout Ghent University, elgiu Stijn.Eyeran@elis.UGent.be, Lieven.Eeckhout@elis.UGent.be
More informationCalculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance
Calculating the Return on nvestent () for DMSMS Manageent Peter Sandborn CALCE, Departent of Mechanical Engineering (31) 45-3167 sandborn@calce.ud.edu www.ene.ud.edu/escml/obsolescence.ht October 28, 21
More informationOptimal Resource-Constraint Project Scheduling with Overlapping Modes
Optial Resource-Constraint Proect Scheduling with Overlapping Modes François Berthaut Lucas Grèze Robert Pellerin Nathalie Perrier Adnène Hai February 20 CIRRELT-20-09 Bureaux de Montréal : Bureaux de
More informationData Streaming Algorithms for Estimating Entropy of Network Traffic
Data Streaing Algoriths for Estiating Entropy of Network Traffic Ashwin Lall University of Rochester Vyas Sekar Carnegie Mellon University Mitsunori Ogihara University of Rochester Jun (Ji) Xu Georgia
More informationSoftware Quality Characteristics Tested For Mobile Application Development
Thesis no: MGSE-2015-02 Software Quality Characteristics Tested For Mobile Application Developent Literature Review and Epirical Survey WALEED ANWAR Faculty of Coputing Blekinge Institute of Technology
More informationThe Virtual Spring Mass System
The Virtual Spring Mass Syste J. S. Freudenberg EECS 6 Ebedded Control Systes Huan Coputer Interaction A force feedbac syste, such as the haptic heel used in the EECS 6 lab, is capable of exhibiting a
More informationReal Time Target Tracking with Binary Sensor Networks and Parallel Computing
Real Tie Target Tracking with Binary Sensor Networks and Parallel Coputing Hong Lin, John Rushing, Sara J. Graves, Steve Tanner, and Evans Criswell Abstract A parallel real tie data fusion and target tracking
More informationMarkovian inventory policy with application to the paper industry
Coputers and Cheical Engineering 26 (2002) 1399 1413 www.elsevier.co/locate/copcheeng Markovian inventory policy with application to the paper industry K. Karen Yin a, *, Hu Liu a,1, Neil E. Johnson b,2
More informationLoad Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation
Int J Counications, Network and Syste Sciences, 29, 5, 422-432 doi:14236/ijcns292547 Published Online August 29 (http://wwwscirporg/journal/ijcns/) Load Control for Overloaded MPLS/DiffServ Networks during
More informationPREDICTION OF MILKLINE FILL AND TRANSITION FROM STRATIFIED TO SLUG FLOW
PREDICTION OF MILKLINE FILL AND TRANSITION FROM STRATIFIED TO SLUG FLOW ABSTRACT: by Douglas J. Reineann, Ph.D. Assistant Professor of Agricultural Engineering and Graee A. Mein, Ph.D. Visiting Professor
More informationADJUSTING FOR QUALITY CHANGE
ADJUSTING FOR QUALITY CHANGE 7 Introduction 7.1 The easureent of changes in the level of consuer prices is coplicated by the appearance and disappearance of new and old goods and services, as well as changes
More informationCRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS
641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC arketa.zajarosova@vsb.cz Abstract Custoer relationship
More informationNote on a generalized wage rigidity result. Abstract
Note on a generalized age rigidity result Ariit Mukheree University of Nottingha Abstract Considering Cournot copetition, this note shos that, if the firs differ in labor productivities, the equilibriu
More informationOn Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes
On Coputing Nearest Neighbors with Applications to Decoding of Binary Linear Codes Alexander May and Ilya Ozerov Horst Görtz Institute for IT-Security Ruhr-University Bochu, Gerany Faculty of Matheatics
More informationProtecting Small Keys in Authentication Protocols for Wireless Sensor Networks
Protecting Sall Keys in Authentication Protocols for Wireless Sensor Networks Kalvinder Singh Australia Developent Laboratory, IBM and School of Inforation and Counication Technology, Griffith University
More informationCPU Animation. Introduction. CPU skinning. CPUSkin Scalar:
CPU Aniation Introduction The iportance of real-tie character aniation has greatly increased in odern gaes. Aniating eshes ia 'skinning' can be perfored on both a general purpose CPU and a ore specialized
More informationEvaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects
Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects Lucas Grèze Robert Pellerin Nathalie Perrier Patrice Leclaire February 2011 CIRRELT-2011-11 Bureaux
More informationAN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES
Int. J. Appl. Math. Coput. Sci., 2014, Vol. 24, No. 1, 133 149 DOI: 10.2478/acs-2014-0011 AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES PIOTR KULCZYCKI,,
More informationBudget-optimal Crowdsourcing using Low-rank Matrix Approximations
Budget-optial Crowdsourcing using Low-rank Matrix Approxiations David R. Karger, Sewoong Oh, and Devavrat Shah Departent of EECS, Massachusetts Institute of Technology Eail: {karger, swoh, devavrat}@it.edu
More informationA Multi-Core Pipelined Architecture for Parallel Computing
Parallel & Cloud Coputing PCC Vol, Iss A Multi-Core Pipelined Architecture for Parallel Coputing Duoduo Liao *1, Sion Y Berkovich Coputing for Geospatial Research Institute Departent of Coputer Science,
More informationEquivalent Tapped Delay Line Channel Responses with Reduced Taps
Equivalent Tapped Delay Line Channel Responses with Reduced Taps Shweta Sagari, Wade Trappe, Larry Greenstein {shsagari, trappe, ljg}@winlab.rutgers.edu WINLAB, Rutgers University, North Brunswick, NJ
More informationPERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO
Bulletin of the Transilvania University of Braşov Series I: Engineering Sciences Vol. 4 (53) No. - 0 PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO V. CAZACU I. SZÉKELY F. SANDU 3 T. BĂLAN Abstract:
More informationBinary Embedding: Fundamental Limits and Fast Algorithm
Binary Ebedding: Fundaental Liits and Fast Algorith Xinyang Yi The University of Texas at Austin yixy@utexas.edu Eric Price The University of Texas at Austin ecprice@cs.utexas.edu Constantine Caraanis
More informationPhysics 211: Lab Oscillations. Simple Harmonic Motion.
Physics 11: Lab Oscillations. Siple Haronic Motion. Reading Assignent: Chapter 15 Introduction: As we learned in class, physical systes will undergo an oscillatory otion, when displaced fro a stable equilibriu.
More informationAnalyzing Methods Study of Outer Loop Current Sharing Control for Paralleled DC/DC Converters
Analyzing Methods Study of Outer Loop Current Sharing Control for Paralleled DC/DC Conerters Yang Qiu, Ming Xu, Jinjun Liu, and Fred C. Lee Center for Power Electroni Systes The Bradley Departent of Electrical
More informationEvaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model
Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary
More informationPerformance Analysis of a Practical Load Balanced Switch
Performance Analysis of a Practical Balanced Switch Yanming Shen, Shivendra S Panwar, H Jonathan Chao Department of Electrical and Computer Engineering Polytechnic University Abstract The load balanced
More informationEntity Search Engine: Towards Agile Best-Effort Information Integration over the Web
Entity Search Engine: Towards Agile Best-Effort Inforation Integration over the Web Tao Cheng, Kevin Chen-Chuan Chang University of Illinois at Urbana-Chapaign {tcheng3, kcchang}@cs.uiuc.edu. INTRODUCTION
More informationBasics of Traditional Reliability
Basics of Traditional Reliability Where we are going Basic Definitions Life and ties of a Fault Reliability Models N-Modular redundant systes Definitions RELIABILITY: SURVIVAL PROBABILITY When repair is
More informationModeling operational risk data reported above a time-varying threshold
Modeling operational risk data reported above a tie-varying threshold Pavel V. Shevchenko CSIRO Matheatical and Inforation Sciences, Sydney, Locked bag 7, North Ryde, NSW, 670, Australia. e-ail: Pavel.Shevchenko@csiro.au
More informationPricing Asian Options using Monte Carlo Methods
U.U.D.M. Project Report 9:7 Pricing Asian Options using Monte Carlo Methods Hongbin Zhang Exaensarbete i ateatik, 3 hp Handledare och exainator: Johan Tysk Juni 9 Departent of Matheatics Uppsala University
More informationTrading Regret for Efficiency: Online Convex Optimization with Long Term Constraints
Journal of Machine Learning Research 13 2012) 2503-2528 Subitted 8/11; Revised 3/12; Published 9/12 rading Regret for Efficiency: Online Convex Optiization with Long er Constraints Mehrdad Mahdavi Rong
More informationHigh Performance Chinese/English Mixed OCR with Character Level Language Identification
2009 0th International Conference on Docuent Analysis and Recognition High Perforance Chinese/English Mixed OCR with Character Level Language Identification Kai Wang Institute of Machine Intelligence,
More informationSAMPLING METHODS LEARNING OBJECTIVES
6 SAMPLING METHODS 6 Using Statistics 6-6 2 Nonprobability Sapling and Bias 6-6 Stratified Rando Sapling 6-2 6 4 Cluster Sapling 6-4 6 5 Systeatic Sapling 6-9 6 6 Nonresponse 6-2 6 7 Suary and Review of
More information2. FINDING A SOLUTION
The 7 th Balan Conference on Operational Research BACOR 5 Constanta, May 5, Roania OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS
More informationThe AGA Evaluating Model of Customer Loyalty Based on E-commerce Environment
6 JOURNAL OF SOFTWARE, VOL. 4, NO. 3, MAY 009 The AGA Evaluating Model of Custoer Loyalty Based on E-coerce Environent Shaoei Yang Econoics and Manageent Departent, North China Electric Power University,
More informationCLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY
CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY Y. T. Chen Departent of Industrial and Systes Engineering Hong Kong Polytechnic University, Hong Kong yongtong.chen@connect.polyu.hk
More information