Power Low Modified Dual Priority in Hard Real Time Systems with Resource Requirements

Size: px
Start display at page:

Download "Power Low Modified Dual Priority in Hard Real Time Systems with Resource Requirements"

Transcription

1 Power Low Modfed Dual Prorty n Hard Real Tme Systems wth Resource Requrements M.Angels Moncusí, Alex Arenas {amoncus,aarenas}@etse.urv.es Dpt d'engnyera Informàtca Matemàtques Unverstat Rovra Vrgl Campus Sescelades, Av dels Països Catalans, 26 E-437 Tarragona, Span Jesus Labarta jesus@ac.upc.es Dpt d Arqutectura de Computadors Unverstat Poltècnca de Catalunya Jord Grona, -3. D6 Campus Nord 834 Barcelona, Span Abstract We present an extenson of the Power Low Modfed Dual Prorty schedulng algorthm that allows hard real system to use shared resources wthout compromsng the tmng constrants of the applcatons whle keepng a low energy consumpton. We compare the energy savng of our algorthm wth a modfcaton of the Low Power Fxed Prorty algorthm that uses shared resources. The results n a Computerzed Numercal Control case study shown that the presented algorthm mproves LPFPSR energy savng. The total energy savng s closely related to the consumpton of the Worst Case Executon Tme (), the savng ranges from the 6% of the energy when the % of the s consumed, to the 98% of the energy when the % of the s consumed.. Introducton Real systems are often located n envronments where low energy consumpton s crucal from the operablty and lfelong of the systems pont of vew. A lot of efforts have been made durng the last decade to mnmze the power consumpton at dfferent levels of the desgn of real- systems rangng from sem-conductor level (the logc gate level and the chpset archtecture) [,2] to the operatng system and complaton level [3,4,5 and references theren]. The most powerful power aware technque nowadays, conssts n to reduce the clock along wth the voltage supply (Dynamc voltage scalng DVS) or even power down the processor whenever the system does not requre ts maxmum performance [5-8]. At the operatng system level, one of the most promsng approaches to save energy s the use of schedulng to perform correct DVS, especally when the constrants of hard real system must be consdered. Takng advantage of the dle of the processor due to the schedulng of task to reduce the has been shown to save sgnfcant amounts of energy [5,6,8,9]. Moreover, the schedulng technques n power savng have been studed n the off-lne and on-lne scenaros. In the frst the schedulng algorthm generates a pror a calendar and calculates clock s, after that, durng run the scheduler follows the marked steps [3]. In the onlne schedulng, the decson of whch task executes and the clock s run- determned [8,9]. However, n all these studes the framework usually gnores the specfcty of many real systems that use shared resources. In these systems tasks are not ndependent snce they nteract wth each other by sharng resources such as data or devces, and the schedulng becomes more complcated. To ensure consstency of these sharng resources, mutual excluson among compettve tasks must be guaranteed (the pece of code executed under mutual excluson constrant s called a crtcal secton). When usng prorty-drven polces to schedule ths real- task sets wth shared resources, we must cope wth the prorty nverson problem [] that occurs when a hgh prorty task s forced to wat for the executon of lower prorty task to preserve mutual excluson n a resource. Ths hgh prorty task s blocked untl the low prorty task releases the mentoned resource. Besdes, the determnaton of the worst blocked s not straghtforward because other tasks could pre-empt the task that holds the resource. So, the prorty nverson problem leads to unbounded worst case response that adversely affects the predctablty of the hard real system. A mechansm to coordnate the access to shared resources n fxed prorty schedulng reducng the prorty nverson problem consst n to use protocols that change the prorty of the tasks accordng wth the access to shared resources. For example, the Prorty Inhertance protocol [] forces the task that holds the resource to nhert the prorty of the hgher prorty task that wants to allocate the resource. Ths protocol bounds the worst blockng, but f a hgh prorty task uses several resources, t can be unfortunately blocked for every resource, ths phenomenon s know as channg blockng. To solve ths problem one can use the Prorty Celng protocol [], ths protocol avods deadlocks and chaned blockng.e. each nstance of each task only can be blocked once durng all ts executon. Ths behavor s obtaned by ncreasng the prorty of the current task to the hghest prorty of the tasks that want to allocate ths resource durng ts lfe (ths prorty s defned as the celng of the resource). In the present work we embedded the Prorty Celng protocol [] n two dfferent schedulng algorthms desgned to save energy. We wll present a comparson of the results obtaned wth the Low Power Fxed Prorty 8 -

2 Schedulng LPFPS proposed by Shn et al [8] wth shared resources versus the Power Low Modfed Dual Prorty Schedulng [9] wth shared resources. The power effcency of these two algorthms reles n to run the tasks at the lowest that makes possble that the actve task and the rest of tasks meet ther tmng constrants, and power-down the processor when there s a large enough dle nterval. Ths approach s especally nterestng because the quadratc dependency of the power dsspaton, n CMOS crcuts, on the voltage supply []. The power dsspaton satsfes approxmately the formula P p C t where p t s the probablty of swtchng n power transton, C L s the loadng capactance, V dd the voltage supply and f clk the clock frequency. That means that t s always energetcally favorable to perform slowly and at low voltage than quckly at hgh voltage. The rest of ths paper s organzed as follows, n the next secton we descrbe the framework and the basc deas of the Prorty Celng protocol. Secton 3 s devoted to the modfcaton of the algorthm to use shared resources reducng the energy consumpton. Fnally, n secton 4 we present the expermental results and the comparson wth Low Power Fxed Prorty schedulng wth Prorty Celng protocol, and fnally n secton 5 we draw the conclusons. 2. Framework and Prorty Celng protocol The general framework of the hard real- system we are gong to deal wth s made up of perodc tasks. These tasks numbered n are specfed by ther perods, worst case executon s and deadlnes (T, C and D respectvely). The use of shared resources mples that the tasks have crtcal sectons that could be smulated by atomc subtasks. Followng ths lne, these perodc tasks are dvded conceptually pre-run nto subtasks numbered j s wth the same perod T and deadlne D that the perodc task, but dfferent worst case executon C j assurng that ΣC j = C. Some of these subtasks can use shared resources durng all ther executon. Note that the proposed partton n subtasks of the real tasks s performed only at the logcal level of abstracton to deal wth the present problem theoretcally, ths partton has no mplcatons at the physcal level of the mplementaton. Once the problem wll be conceptually solved the mplementaton of the algorthms wll work perfectly wthout affectng the structure of the real tasks. The decomposton of every task n subtasks has been performed as follows: suppose that we have a task T wth a perod T=24 unts and a deadlne D=2 unts, a worst case executon of 7 unts and a prorty P=5 (the lower the number, the hgher prorty). We assume the executon of the worst case executon and, that task T, needs to access a shared resource R durng 4 unts after The results are not exclusve for perodc tasks. We have consdered only perodc tasks as a matter of smplcty. L V 2 dd f clk executng 2 unts and then releases the resource untl the next nstance. See Fgure. T P=5 C=2 T2 P=3 C=4 T3 P=5 C= T P=5 C=7 T=24, D=2 Allocate R Release R R P = 3 Fgure : Example of the dvson of one task nto subtasks. Task T wll be conceptually dvded nto three subtasks wth the followng characterzaton: same perod and deadlne as task T. The frst subtask T wll have a of 2 that corresponds to the executon before allocatng the resource. T 2 wll have a equal to 4, the executon nsde the resource (crtcal secton) and fnally the thrd subtask T 3 wll have a of, that corresponds to the rest of executon outsde the resource. To ensure the causal precedence, as soon as T fnshes t sends a message to provoke the ntaton of T 2. Once T 2 allocates the resource R ncreases ts prorty to the prorty of ths resource (we wll see later how t s determned), t executes, t releases the resource, and t sends a message to provoke the ntaton of T 3 and fnsh. At ths moment T 3 starts to execute normally. Ths process has been reproduced for every task n the task set. We assume that the messages are nstantaneous for the sake of smplcty. The computaton s for context swtchng and for the scheduler are assumed to be neglgble, ths enables us to perform the analyss straghtforward wthout danger of loosng generalty. The extent to whch these assumptons are realstc s dscussed n the analyss of the algorthm gven n [7], and t turns out to be practcal f the swtch s subsumed to the worst case executon s of the dfferent tasks. The whole system s organzed as concurrent tasks ruled by a pre-emptve statc prorty-based scheduler. Ths statc prorty can be volated when two tasks want to access a shared resource, a lower prorty task may block a hgher prorty task f t succeeds to access to the shared resource earler (prorty nverson). Ths problem can be avoded applyng the Prorty Celng protocol []. The Prorty Celng protocol modfes the calculaton of the worst case response (WCRT) accountng for the possble blockng caused by low prorty tasks to hgher prorty tasks. To apply the Prorty Celng protocol, we proceed calculatng frst the celng of each resource as the prorty of the hghest prorty task that can access ths resource. The worst case blockng that a task can experment due to the Prorty Celng protocol s determned by the longest crtcal secton of the lower 8-2

3 prorty task accessng to shared resources wth celngs equal or hgher than the prorty of task []. The schedulablty of the system can be tested off-lne usng the teratve technque proposed by Joseph and Pandya [] and later extended by Audsley et al. n [2] to deal wth shared resources. It compares the dfferent WCRT obtaned summng all the possble blockng contrbutons of the tasks that could preempt task assumng an ntal WCRT=. The teraton n+ s computed as follows, n n WCRT + WCRT = B + C + * C j T j hp() j where B s the longest blockng due to lower prorty tasks and hp() s the set of task that could preempt task,.e all tasks wth hgher prorty than task The teratve process starts wth WCRT n+ = and t stops when WCRT = WCRT n n+ or when WCRT > D, n ths latter case the system s not schedulable. We can apply ths formula straghtforward to our framework because the scheduler assures that the precedent subtask fnshes before the next subtask starts. The perod, deadlne and prorty of the subtasks of one task are the same. The calculaton of the longest blockng (B ) for a task T, based on [], s shown n Fgure 2. B = for all tasks T j wth lower prorty than T for all subtask Tjk Tj f Tjk accesses to any resource Rp and the celng of Rp prorty of T then B=max(B,wcet of Tjk) end f end for end for Fgure 2. Determnaton of the longest blockng 3. Power Low Modfed Dual Prorty wth Shared Resources Here we extend the Power Low Modfed Dual Prorty Schedulng algorthm (based on the Dual Prorty schedulng [3]) to deal wth shared resources n a hard real- system. The orgnal Power Low Dual Prorty Schedulng algorthm guarantees to meet the temporal constrants and sgnfcant energy consumpton reducton by slowng and voltage jontly (assumng a lnear relaton between and voltage supply decreasng). To extend ths behavor to real systems wth shared resources, we need frst to solve the problem of prorty nverson, because t can cause our algorthm to fnd false schedulablty stuatons. Our new approach determnes when and how to apply the Prorty Celng protocol n PLMDPR to avod the prorty nverson problem. The man dea s to apply the same algorthmc scheme presented n PLMDP, but dealng wth subtasks drectly nstead of wth the whole tasks, n ths way t s possble to reassgn prortes accordng to the Prorty Celng protocol when necessary. Intally, we have fxed prortes assgned to tasks accordng to a fxed prorty crteron. At ths moment, all subtask of the same task have the prorty of the task. The scheduler modfes the prorty of a subtask when t accesses to a shared resource, specfcally the scheduler apples the Prorty Celng protocol ncreasng the prorty of the subtask to the celng of the resource ths subtask accesses. The PLMDPR defnes two levels of prortes that are organzed as follows, the hghest level, or upper run queue (URQ) s for tasks that can no longer be delayed by less prorty tasks otherwse they wll mss ther deadlnes. The second level, or lower run queue (LRQ) s occuped by those perodc tasks whose executon can stll be delayed wthout compromsng the meetng of ther deadlnes. The celng of the resource n ths scheme corresponds to the prorty n the URQ of the hghest prorty task that could gan access to ths resource. The schedulng algorthm s drven by the followng events:. Actvaton of some perodc task. In ths case ths task s queued to the LRQ sorted by ts promoton nstant. At ths moment ths task can pre-empt a lower prorty task currently n executon. 2. Promoton nstant of some task (ths s explctly calculated n [9]). In ths case, ths task s promoted from the LRQ to the URQ, and at ths moment the task can pre-empt a lower prorty task currently n executon. 3. Allocaton of a shared resource. The executng subtask ncreases ts prorty to the celng of ths resource. After allocaton of the resource pre-empton by a hgher prorty task can occur. 4. Release of a shared resource. The subtask decreases ts prorty to the prorty of the task. At ths moment ths task can be pre-empted by a hgher prorty task. Fnally, when a task fnshes ts executon, the next executng task s selected by pckng the hghest prorty task from the hghest non-empty prorty levels (.e. URQ or LRQ, n ths order). Once the scheduler decdes whch task to execute, before start the executon t needs to fx the rato of processor accordng wth the maxmum spreadng n we are allowed. The rato s calculated followng the heurstcs proposed by Shn et al. [8] that s bult on the assumpton that the delay for the reducton s neglgble. The safeness of the system under these condtons s proved on theorem of the cted work. The of the processor s determned as follows:. If there s not any task n the system, then we set the r to the next arrvng task mnus the wake up delay, and power down the processor. 2. If there s more than one task n the URQ then t has to be executed at maxmum. 3. If there s only one task n the URQ then t can be executed at low where the rato s: 8-3

4 mn(tpk tc, remang(c )) Speed rato = mn(tpk,td ) tc where tp k s the promoton nstant of any task n the system excludng the current executng task, C s the worst executon of the current executng task, td s the deadlne of the current executng task, and fnally tc s the current. 4. If there are not any task n the URQ but there are some tasks n the LRQ then we can execute at low where the rato s calculate as follows: f ta k < tp and tp k < tp then Speed = - - mnmum ta tc k else f tp h< tp l+c then -- h hp(), l lp() mn(tp h tp, remanng(c )) Speed = mn(tp h, td ) tc else mn(tpl + C tp, remanng(c )) Speed = mn(tpl + C,td ) tc endf endf At practce only certan dscrete values of the frequency of the clock, and then, are attanable dependng on the accuracy of the tunng, n ths case the frequency selected should be a frequency equal or larger than the frequency obtaned by the calculatons to ensure constrants. A comprehensve example of the functonng of the algorthm n a toy model s presented n the appendx, n ths example we can observe the effects of coarse or fne granng of the of the processor. 4. Results and dscusson In ths secton we present the comparson results of the Low Power Fxed Prorty schedulng wth shared resources usng Prorty Celng (LPFPSR) versus the Power Low Modfed Dual Prorty schedulng wth shared resources (PLMDPR). LPFPSR s based on a fxed pre-emptve prorty schedulng wth power awareness. Ths algorthm conssts on executng tasks as slow as possble whle satsfyng constrants. LPFPSR reduces clock along wth voltage supply when there s a unque task ready to execute, otherwse the schedulng does not guarantee the constrants of the rest of tasks of system. It also powers down the processor when there are not ready tasks. The dfferences between LPFPS and the PLMDP are studed n [9]. To check the capabltes of both algorthms, we have smulated several stuatons of a Computerzed Numercal Control (CNC) task set [4], ths example represent a typcal benchmark of mult-taskng system sharng data n many nteractng and overlappng data paths. We compare the total energy consumpton results (per hyper-perod) obtaned. In Fgure 3 we present the task graph of ths system just to show the complexty of the real- applcaton. In ths fgure the oval objects represent tasks and the rectangular objects correspond to data tems (shared resources). The characterstcs (Worst Case Executon Tme, Perod, Deadlne and the prorty) of the task set s shown n the Table. We nvestgate dfferent confguratons related to the way n whch the dfferent tasks allocate and release resources. We have placed the non-crtcal secton of the task executon, whch n our approach s represented as a subtask (ncs), n three dfferent postons along the executon process. We assume that the tasks allocate the resource (or crtcal secton, cs) at the begnnng of the executon (cs-ncs), before termnaton (ncs-cs), or n the mddle of the executon process (cs-ncs-cs). Wth these three dfferent stuatons we obtan trends for the most general stuaton were the crtcal secton could appear anywhere, and several s, durng the executon process. Task Perod Deadlne Prorty T 35 µs 24 µs 24 µs T2 4 µs 24 µs 24 µs 2 T3 8 µs 48 µs 48 µs 3 T4 72 µs 48 µs 48 µs 4 T5 65µs 24 µs 24 µs 5 T6 65 µs 24 µs 24 µs 6 T7 57 µs 96 µs 4 µs 7 T8 57 µs 78 µs 4 µs 8 Table : Parameters of CNC task set. T5 T7 R9 R5 R R3 T T2 R,R2, R3,R4 T3 R,R2 R7,R8 T4 R Fgure 3: Task graph of the CNC control system. The a task s executng the crtcal secton,.e. t s nsde the shared resource s represented as a percentage of the total executon of the task. We vary ths from % to % of the worst case executon of the task to have a wde evaluaton of performance. The results of all the experments are represented n terms of the normalzed average energy consumpton. The lght gray column represents the results of the LPFPSR and R4 PLANT R2 T6 R6 T8 R 8-4

5 the dark gray column represents the results of the PLMDPR. The smulaton covers one hyper-perod (that s, the mnmum common multple of the tasks perods). In Fgures 4 to 6, we show the behavor of both algorthms when the the tasks execute nsde the shared resources vares from % to %. In fgure 4, the tasks exhaust the % of the, 6% n fgure 5 and 2 % n fgure 6. The average factor of mprovement of our algorthm n front of LPFPSR s 5 % f all tasks use the %, 48% f all tasks use the 6% of the and 75% f all tasks use the 2% of the. Normalzed energy consumpton,8,6,4,2 % of shared resources L PFPS PL MDP Fgure 4: Normalzed energy consumpton varyng the nsde the resource when the % of s exhausted Normalzed energy consumpton,8,6,4,2 % of shared resources L PFPS PL MDP Fgure 5: Normalzed energy consumpton varyng the nsde the resource when the 6% of s exhausted. Normalzed energy consumpton,8,6,4,2 % of shared resources L PFPS PL MDP Fgure 6: Normalzed energy consumpton varyng the nsde the resource when the 2% of s exhausted. In all these fgures, we observe a sgnfcant decreasng of the energy consumpton n both algorthms when the % of the executon of all tasks s exhausted nsde the shared resources. Here we present the analyss of ths partcular stuaton. See Fgures 7 and 8. Let us assume that we have three tasks: T, T2 and T3. The prorty of the tasks are T=3, T2=2 and T3= (the smaller the numbers the hgher the prortes). T and T2 both access to the same resource R, so the celng of R wll be the prorty of T2. The promoton of T s smaller than the promoton of T2 and ths s smaller than the promoton of T3, then, n the LRQ, the order was T, T2 and T3. URQ T T T2 2 LRQ T T2,T3 T TIME TP T A T3 T2 TP T2 R Fgure 7: Tasks do not consume all ts nsde shared resources. URQ T T T 2 3 LRQ T T2,T3 T TIME TP T A T3 T2 TP T2 Fgure 8: Tasks consume all ts nsde shared resources. In Fgure 7, ntally, the task T s executng n the LRQ, at promoton TP T, task T promotes to the URQ and contnues t executon. At promoton TP T2, task T2 promotes to the URQ. As T has allocated the resource ts prorty s the celng prorty of the resource (that s the same as T2). T2 could not pre-empt, and t must wat untl T releases the resource and returns to ts prorty base. Now T2 can pre-empt the CPU and t executes. As there are two tasks n the URQ the processor could not be reduced. After T2 fnshes there s only one task n the URQ and the can be reduced, but the remanng executon s small. In Fgure 8, as soon as T release the resource, t fnshes, so T2 can execute at low durng all ts executon. Ths latter stuaton s energetcally favorable,.e. the rato / s larger. Fnally, n Fgure 9, we represent the total energy savng n the three possble confguratons when the task consumes dfferent ranges of ts from % to %. Each pont n the graph represents the rato of the accumulated energy savng varyng the percentage of the exhausted n the shared resources from % to %. We observe that n the cs-ncs-cs case, where the B caused by the resource s the half value of the B of the cs-ncs and the ncs-cs, and t occurs twce, the PLMDPR algorthm mproves LPFPSR between a 23% and a 62%. On the case cs-ncs the mprovement of the PLMDPR vares between 6% and 98%, and fnally n the case ncs-cs the mprovement vares from 2% to 9%. The reason of the dfference behavor between cs-ncs-cs and cs-ncs or ncs-cs, s that n the former the pre-empton can occur when a task has stll not fnshed and another task, that pre-empts the executng task, comes to the URQ forcng the scheduler to ncrease the of the processor to the maxmum value. A R T2 2 T2 3 R,F,A T2 T2 2 F T 3 T2 3 TP T3 TP T3 F R,F 8-5

6 However, when there s a unque crtcal secton, the algorthms perform equvalently n both confguratons (csncs) and (ncs-cs). PLMDPR / LPFPSR,,9,8,7,6,5,4,3,2,, % 2% 3% 4% 5% 6% 7% 8% 9% % % of exhausted cs-ncs-cs cs-ncs ncs-cs Fgure 9: Energy consumpton rato PLMDPR/LPFPSR n functon of the nsde the resource for three dfferent confguratons of the access to the shared resources. 5. Conclusons We have presented an extenson of the Power Low Modfed Dual Prorty schedulng algorthm that allows hard real system to use shared resources wthout compromsng the tmng constrants of the applcatons whle keepng a low energy consumpton. Ths approach has been shown to over-perform the LPFPSR power savng by an average factor, n the case of a Computerzed Numercal Control task set, that range from 6% up to 98% dependng on the use of sharng resources and the consumpton of the worst case executon that does the applcaton. The algorthm does not ncrease the complexty of the LPFPSR and can be mplemented n most of the kernels. 6. References [] A.P. Chandrakasan, S. Sheng and R. W. Brodersen, Lowpower CMOS dgtal desgn, IEEE Journal of Sold-State crcuts, vol. 27, pp , Aprl 992. [2] J. Rabaey and M Pedram (Edtors). "Low Power Desgn Methodologes". Kluwer Academc Publshers, Norwell, May, 996. [3] S.T. Cheng, S.M. Chen and J.W. Hwang, "Low-Power Desgn for Real-Tme Systems", Real-Tme Systems,5, pp 3-48, 998. [4] D. Mosse, H. Aydn, B. Chlders and R. Melhem, Complerasssted power-aware schedulng for real- applcatons Workshop on Complers and Operatng systems for Low Power COLP 2, Chateau Lake Louse, Banff, Canada, October 2. [5] P. Plla and K.G. Shn, Real- dynamc voltage scalng for low-power embedded operatng systems 8th ACM Symposum on Operatng Systems Prncples, Phladelpha, Pennsylvana, October 2. [6] Transmeta Corporaton, Crusoe Processor Specfcaton, [7] H. Aydn, R. Melhem, D. Mosse and P. Meja-Alvarez, Determnng optmal processor s for perodc real- tasks wth dfferent power characterstcs 3th Euromcro Conference on Real-Tme Systems, Delft, Netherlands, June 2. [8] Y. Shn and K. Cho, Power conscous Fxed Prorty schedulng n hard real- systems DAC 99, New Orleans, Lousana, ACM /99/6, 999. [9] M.A. Moncusí, A. Arenas and J. Labarta, "Improvng Energy Savng n Hard Real Tme Systems va a Modfed Dual Prorty Schedulng", ACM SgArch Computer Archtecture Newsletter, Vol 29, No.5, pp 9-24, December. [] L. Sha, R. Rajkumar and J.P. Lehoczky. "Prorty Inhertance Protocols: An approach to Real-Tme Synchronzaton", IEEE Transactons on Computers, Vol 39, No 9, pp 75-85, September 9 [] M.Joseph and P.Pandya. "Fndng response s n a real system, The Computer Journal, vol 29, no 5 pp , October 86. [2] N.Audsley, A. Burns, M.Rchardson, K. Tndell and A.J. Wellngs. "Applyng new schedulng theory to statc prorty preemptve schedulng", Software Engneerng Journal, pp , September 93. [3] R. Davs and A.J. Wellngs, "Dual Prorty schedulng", Proceedng IEEE Real Tme Systems Symposum, pp. -9, December 995. [4] N. Km, M. Ryu, S. Hong, M. Saksena, C. Cho and H. Shn, "Vsual assessment of a real- system desgn: a case study on a CNC controller", Proceedngs IEEE Real-Tme Systems symposum, December 996. Appendx We present a toy model example to enlghten the functonng of the algorthms n the two man aspects.e. the reducton and allocaton and release of shared resources. The proposed task model s presented n Table 2. Name Perod Deadlne Share resource T 5 5 T T3 4 Table 2 Parameters of a toy model example. T T 2 T 3 T T 2 T 3 T T 2 T T 3 T T 2 T T T 2 T T T 3 T 2 T T T 2 T The task s nsde the resource Fgure : LPFPSR when tasks consume the % of the 8-6

7 Consder Fgure that represents the behavor of the LPFPSR when the tasks consume the % of the. The reducton can not be performed untl t=6, when there s only task T 2 at the system. We reduce the untl the arrval of T and T 3 to the system agan at t=2. Essentally the same occurs at t=26 and t=36. The resource allocaton works as follows: at t=5 T tres to allocate the resource but T 3 s nsde and must wat untl t releases the resource. At t=24 T 2 arrves wth a hgher prorty than T 3, but usng the prorty celng protocol (the celng s the prorty of T ) T 3 nherts the prorty of the celng so T 2 can not preempt T 3. The energy consumpton depends on the granng of the reducton as follows: consderng fractons the energy consumpton s unts, consderng fractons the energy consumpton s the same unts T T 2 T 3 T T 2 T 3 T T 2 T T 3 T T 2 T T T 2 T T T 3 T 2 T T T 2 T Fgure : PLMDPR when tasks consume the % of the The task s nsde the resource In Fgure we represent the behavor of the PLMDPR when the tasks consume the % of the. Let us see the reductons. Ths, T and T 2 promote to the URQ as they arrve to the system. T 3 promotes 2 tm e unts after ther arrval. At t=, we can reduce because the only task at the URQ s T and T 3 s at the LRQ. After promoton of T 3 at t=2 somethng nterestng happens. In prncple, the could be reduced but, due to that fact that at t=5 T wll promote agan, the dle s shorter than the T 3 needs to fnsh ts executon and then the s not reduced. The same scenaro occurs at t=2 and t=3. On the other hand, the resource allocaton works dentcally to the LPFPSR case. The energy consumpton depends on the granng of the reducton as follows: consderng fractons the energy consumpton s unts, consderng fractons the energy consumpton s unts. Fgure 2 represents the behavor of the LPFPSR when the tasks consume the 5% of the. At t=5, T 3 s the only task n the system, however we can not reduce the because t needs 4 unts, n the worst case, to execute and T wll arrve at t=5. At practce t executes only durng 2 unts and the rest 5 unts the system s free. The rest of reductons are straghtforward T T 2 T 3 T T 2 T 3 T T 2 T T 3 T T 2 T T T 2 T T T 3 T 2 T T T 2 T The task s nsde the resource Fgure 2: LPFPSR when tasks consume the 5% of the The prorty celng n ths example mples that T 2 must wat due to the prorty celng protocol at t=32. The energy consumpton depends on the granng of the reducton as follows: consderng fractons the energy consumpton s unts, consderng fractons the energy consumpton s unts. T T 2 T 3 T T 2 T 3 T T 2 T T 3 T T 2 T T T 2 T T T 3 T 2 T T T 2 T Fgure 3: PLMDPR when tasks consume the 5% of the The task s nsde the resource In Fgure 3 we represent the behavor of the PLMDPR when the tasks consume the 5% of the. In ths case the reducton take advantage of the dle The reducton occurs before the promoton of T 3 at t=2. At t=5 T s the only task at the system and the can be reduced agan. At t= T can reduce the untl T 3 promotes at t=2, that can reduce the agan untl t=5. The energy consumpton depends on the granng of the reducton as follows: consderng fractons the energy consumpton s 4.2 unts, consderng fractons the energy consumpton s unts. 8-7

Real-Time Process Scheduling

Real-Time Process Scheduling Real-Tme Process Schedulng ktw@cse.ntu.edu.tw (Real-Tme and Embedded Systems Laboratory) Independent Process Schedulng Processes share nothng but CPU Papers for dscussons: C.L. Lu and James. W. Layland,

More information

Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process

Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process Dsadvantages of cyclc TDDB47 Real Tme Systems Manual scheduler constructon Cannot deal wth any runtme changes What happens f we add a task to the set? Real-Tme Systems Laboratory Department of Computer

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Period and Deadline Selection for Schedulability in Real-Time Systems

Period and Deadline Selection for Schedulability in Real-Time Systems Perod and Deadlne Selecton for Schedulablty n Real-Tme Systems Thdapat Chantem, Xaofeng Wang, M.D. Lemmon, and X. Sharon Hu Department of Computer Scence and Engneerng, Department of Electrcal Engneerng

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Checkng and Testng in Nokia RMS Process

Checkng and Testng in Nokia RMS Process An Integrated Schedulng Mechansm for Fault-Tolerant Modular Avoncs Systems Yann-Hang Lee Mohamed Youns Jeff Zhou CISE Department Unversty of Florda Ganesvlle, FL 326 yhlee@cse.ufl.edu Advanced System Technology

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING FORMAL ANALYSIS FOR REAL-TIME SCHEDULING Bruno Dutertre and Vctora Stavrdou, SRI Internatonal, Menlo Park, CA Introducton In modern avoncs archtectures, applcaton software ncreasngly reles on servces provded

More information

J. Parallel Distrib. Comput. Environment-conscious scheduling of HPC applications on distributed Cloud-oriented data centers

J. Parallel Distrib. Comput. Environment-conscious scheduling of HPC applications on distributed Cloud-oriented data centers J. Parallel Dstrb. Comput. 71 (2011) 732 749 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. ournal homepage: www.elsever.com/locate/pdc Envronment-conscous schedulng of HPC applcatons

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center Dynamc Resource Allocaton and Power Management n Vrtualzed Data Centers Rahul Urgaonkar, Ulas C. Kozat, Ken Igarash, Mchael J. Neely urgaonka@usc.edu, {kozat, garash}@docomolabs-usa.com, mjneely@usc.edu

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT Chapter 4 ECOOMIC DISATCH AD UIT COMMITMET ITRODUCTIO A power system has several power plants. Each power plant has several generatng unts. At any pont of tme, the total load n the system s met by the

More information

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

A New Quality of Service Metric for Hard/Soft Real-Time Applications

A New Quality of Service Metric for Hard/Soft Real-Time Applications A New Qualty of Servce Metrc for Hard/Soft Real-Tme Applcatons Shaoxong Hua and Gang Qu Electrcal and Computer Engneerng Department and Insttute of Advanced Computer Study Unversty of Maryland, College

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent

More information

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE

More information

Research of concurrency control protocol based on the main memory database

Research of concurrency control protocol based on the main memory database Research of concurrency control protocol based on the man memory database Abstract Yonghua Zhang * Shjazhuang Unversty of economcs, Shjazhuang, Shjazhuang, Chna Receved 1 October 2014, www.cmnt.lv The

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告

行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告 行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告 畫 類 別 : 個 別 型 計 畫 半 導 體 產 業 大 型 廠 房 之 設 施 規 劃 計 畫 編 號 :NSC 96-2628-E-009-026-MY3 執 行 期 間 : 2007 年 8 月 1 日 至 2010 年 7 月 31 日 計 畫 主 持 人 : 巫 木 誠 共 同

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.

More information

Traffic-light a stress test for life insurance provisions

Traffic-light a stress test for life insurance provisions MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

Schedulability Bound of Weighted Round Robin Schedulers for Hard Real-Time Systems

Schedulability Bound of Weighted Round Robin Schedulers for Hard Real-Time Systems Schedulablty Bound of Weghted Round Robn Schedulers for Hard Real-Tme Systems Janja Wu, Jyh-Charn Lu, and We Zhao Department of Computer Scence, Texas A&M Unversty {janjaw, lu, zhao}@cs.tamu.edu Abstract

More information

On the Interaction between Load Balancing and Speed Scaling

On the Interaction between Load Balancing and Speed Scaling On the Interacton between Load Balancng and Speed Scalng Ljun Chen, Na L and Steven H. Low Engneerng & Appled Scence Dvson, Calforna Insttute of Technology, USA Abstract Speed scalng has been wdely adopted

More information

Multi-Resource Fair Allocation in Heterogeneous Cloud Computing Systems

Multi-Resource Fair Allocation in Heterogeneous Cloud Computing Systems 1 Mult-Resource Far Allocaton n Heterogeneous Cloud Computng Systems We Wang, Student Member, IEEE, Ben Lang, Senor Member, IEEE, Baochun L, Senor Member, IEEE Abstract We study the mult-resource allocaton

More information

Damage detection in composite laminates using coin-tap method

Damage detection in composite laminates using coin-tap method Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the

More information

An MILP model for planning of batch plants operating in a campaign-mode

An MILP model for planning of batch plants operating in a campaign-mode An MILP model for plannng of batch plants operatng n a campagn-mode Yanna Fumero Insttuto de Desarrollo y Dseño CONICET UTN yfumero@santafe-concet.gov.ar Gabrela Corsano Insttuto de Desarrollo y Dseño

More information

Lecture 3: Force of Interest, Real Interest Rate, Annuity

Lecture 3: Force of Interest, Real Interest Rate, Annuity Lecture 3: Force of Interest, Real Interest Rate, Annuty Goals: Study contnuous compoundng and force of nterest Dscuss real nterest rate Learn annuty-mmedate, and ts present value Study annuty-due, and

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and Ths artcle appeared n a journal publshed by Elsever. The attached copy s furnshed to the author for nternal non-commercal research and educaton use, ncludng for nstructon at the authors nsttuton and sharng

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

Efficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ

Efficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ Effcent Strpng Technques for Varable Bt Rate Contnuous Meda Fle Servers æ Prashant J. Shenoy Harrck M. Vn Department of Computer Scence, Department of Computer Scences, Unversty of Massachusetts at Amherst

More information

Activity Scheduling for Cost-Time Investment Optimization in Project Management

Activity Scheduling for Cost-Time Investment Optimization in Project Management PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng

More information

QoS in the Linux Operating System. Technical Report

QoS in the Linux Operating System. Technical Report Unverstät Karlsruhe (H) Insttut für elematk QoS n the Lnux Operatng System echncal Report Marc Bechler and Hartmut Rtter Insttut für elematk Fakultät für Informatk Unverstät Karlsruhe (H) E-Mal: [mbechler

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

Comparison of Control Strategies for Shunt Active Power Filter under Different Load Conditions

Comparison of Control Strategies for Shunt Active Power Filter under Different Load Conditions Comparson of Control Strateges for Shunt Actve Power Flter under Dfferent Load Condtons Sanjay C. Patel 1, Tushar A. Patel 2 Lecturer, Electrcal Department, Government Polytechnc, alsad, Gujarat, Inda

More information

Dynamic Pricing for Smart Grid with Reinforcement Learning

Dynamic Pricing for Smart Grid with Reinforcement Learning Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,

More information

Logical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem

Logical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME, ISSUE, FEBRUARY ISSN 77-866 Logcal Development Of Vogel s Approxmaton Method (LD- An Approach To Fnd Basc Feasble Soluton Of Transportaton

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

2. SYSTEM MODEL. the SLA (unlike the only other related mechanism [15] we can compare it is never able to meet the SLA).

2. SYSTEM MODEL. the SLA (unlike the only other related mechanism [15] we can compare it is never able to meet the SLA). Managng Server Energy and Operatonal Costs n Hostng Centers Yyu Chen Dept. of IE Penn State Unversty Unversty Park, PA 16802 yzc107@psu.edu Anand Svasubramanam Dept. of CSE Penn State Unversty Unversty

More information

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop IWFMS: An Internal Workflow Management System/Optmzer for Hadoop Lan Lu, Yao Shen Department of Computer Scence and Engneerng Shangha JaoTong Unversty Shangha, Chna lustrve@gmal.com, yshen@cs.sjtu.edu.cn

More information

On the Interaction between Load Balancing and Speed Scaling

On the Interaction between Load Balancing and Speed Scaling On the Interacton between Load Balancng and Speed Scalng Ljun Chen and Na L Abstract Speed scalng has been wdely adopted n computer and communcaton systems, n partcular, to reduce energy consumpton. An

More information

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers Journal of Computatonal Informaton Systems 7: 13 (2011) 4740-4747 Avalable at http://www.jofcs.com A Load-Balancng Algorthm for Cluster-based Mult-core Web Servers Guohua YOU, Yng ZHAO College of Informaton

More information

MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11

MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11 Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 MAC Layer Servce Tme Dstrbuton of a Fxed Prorty Real Tme Scheduler over 80. Inès El Korb Ecole Natonale des Scences de

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. XX, MONTH 2XX 1 Effcent On-Demand Data Servce Delvery to Hgh-Speed Trans n Cellular/Infostaton Integrated Networks Hao Lang, Student Member,

More information

QoS-based Scheduling of Workflow Applications on Service Grids

QoS-based Scheduling of Workflow Applications on Service Grids QoS-based Schedulng of Workflow Applcatons on Servce Grds Ja Yu, Rakumar Buyya and Chen Khong Tham Grd Computng and Dstrbuted System Laboratory Dept. of Computer Scence and Software Engneerng The Unversty

More information

Energy Efficient Routing in Ad Hoc Disaster Recovery Networks

Energy Efficient Routing in Ad Hoc Disaster Recovery Networks Energy Effcent Routng n Ad Hoc Dsaster Recovery Networks Gl Zussman and Adran Segall Department of Electrcal Engneerng Technon Israel Insttute of Technology Hafa 32000, Israel {glz@tx, segall@ee}.technon.ac.l

More information

Adaptive Fractal Image Coding in the Frequency Domain

Adaptive Fractal Image Coding in the Frequency Domain PROCEEDINGS OF INTERNATIONAL WORKSHOP ON IMAGE PROCESSING: THEORY, METHODOLOGY, SYSTEMS AND APPLICATIONS 2-22 JUNE,1994 BUDAPEST,HUNGARY Adaptve Fractal Image Codng n the Frequency Doman K AI UWE BARTHEL

More information

Dynamic Fleet Management for Cybercars

Dynamic Fleet Management for Cybercars Proceedngs of the IEEE ITSC 2006 2006 IEEE Intellgent Transportaton Systems Conference Toronto, Canada, September 17-20, 2006 TC7.5 Dynamc Fleet Management for Cybercars Fenghu. Wang, Mng. Yang, Ruqng.

More information

Section 5.4 Annuities, Present Value, and Amortization

Section 5.4 Annuities, Present Value, and Amortization Secton 5.4 Annutes, Present Value, and Amortzaton Present Value In Secton 5.2, we saw that the present value of A dollars at nterest rate per perod for n perods s the amount that must be deposted today

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA ) February 17, 2011 Andrew J. Hatnay ahatnay@kmlaw.ca Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs

More information

Intra-year Cash Flow Patterns: A Simple Solution for an Unnecessary Appraisal Error

Intra-year Cash Flow Patterns: A Simple Solution for an Unnecessary Appraisal Error Intra-year Cash Flow Patterns: A Smple Soluton for an Unnecessary Apprasal Error By C. Donald Wggns (Professor of Accountng and Fnance, the Unversty of North Florda), B. Perry Woodsde (Assocate Professor

More information

Kiel Institute for World Economics Duesternbrooker Weg 120 24105 Kiel (Germany) Kiel Working Paper No. 1120

Kiel Institute for World Economics Duesternbrooker Weg 120 24105 Kiel (Germany) Kiel Working Paper No. 1120 Kel Insttute for World Economcs Duesternbrooker Weg 45 Kel (Germany) Kel Workng Paper No. Path Dependences n enture Captal Markets by Andrea Schertler July The responsblty for the contents of the workng

More information

A Novel Auction Mechanism for Selling Time-Sensitive E-Services

A Novel Auction Mechanism for Selling Time-Sensitive E-Services A ovel Aucton Mechansm for Sellng Tme-Senstve E-Servces Juong-Sk Lee and Boleslaw K. Szymansk Optmaret Inc. and Department of Computer Scence Rensselaer Polytechnc Insttute 110 8 th Street, Troy, Y 12180,

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com

More information

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000 Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Availability-Based Path Selection and Network Vulnerability Assessment

Availability-Based Path Selection and Network Vulnerability Assessment Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl

More information

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School Robust Desgn of Publc Storage Warehouses Yemng (Yale) Gong EMLYON Busness School Rene de Koster Rotterdam school of management, Erasmus Unversty Abstract We apply robust optmzaton and revenue management

More information

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008 Rsk-based Fatgue Estmate of Deep Water Rsers -- Course Project for EM388F: Fracture Mechancs, Sprng 2008 Chen Sh Department of Cvl, Archtectural, and Envronmental Engneerng The Unversty of Texas at Austn

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks Fuzzy Set Approach To Asymmetrcal Load Balancng n Dstrbuton Networks Goran Majstrovc Energy nsttute Hrvoje Por Zagreb, Croata goran.majstrovc@ehp.hr Slavko Krajcar Faculty of electrcal engneerng and computng

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services When Network Effect Meets Congeston Effect: Leveragng Socal Servces for Wreless Servces aowen Gong School of Electrcal, Computer and Energy Engeerng Arzona State Unversty Tempe, AZ 8587, USA xgong9@asuedu

More information

Simple Interest Loans (Section 5.1) :

Simple Interest Loans (Section 5.1) : Chapter 5 Fnance The frst part of ths revew wll explan the dfferent nterest and nvestment equatons you learned n secton 5.1 through 5.4 of your textbook and go through several examples. The second part

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

The Load Balancing of Database Allocation in the Cloud

The Load Balancing of Database Allocation in the Cloud , March 3-5, 23, Hong Kong The Load Balancng of Database Allocaton n the Cloud Yu-lung Lo and Mn-Shan La Abstract Each database host n the cloud platform often has to servce more than one database applcaton

More information

In some supply chains, materials are ordered periodically according to local information. This paper investigates

In some supply chains, materials are ordered periodically according to local information. This paper investigates MANUFACTURING & SRVIC OPRATIONS MANAGMNT Vol. 12, No. 3, Summer 2010, pp. 430 448 ssn 1523-4614 essn 1526-5498 10 1203 0430 nforms do 10.1287/msom.1090.0277 2010 INFORMS Improvng Supply Chan Performance:

More information

) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance

) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance Calbraton Method Instances of the Cell class (one nstance for each FMS cell) contan ADC raw data and methods assocated wth each partcular FMS cell. The calbraton method ncludes event selecton (Class Cell

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet

2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet 2008/8 An ntegrated model for warehouse and nventory plannng Géraldne Strack and Yves Pochet CORE Voe du Roman Pays 34 B-1348 Louvan-la-Neuve, Belgum. Tel (32 10) 47 43 04 Fax (32 10) 47 43 01 E-mal: corestat-lbrary@uclouvan.be

More information

8 Algorithm for Binary Searching in Trees

8 Algorithm for Binary Searching in Trees 8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn

More information

An Analysis of Task Scheduling for a Generic Avionics Mission Computer

An Analysis of Task Scheduling for a Generic Avionics Mission Computer An Analyss of ask chedulng for a Generc Avoncs sson Computer. B. Dodd Ar Operatons Dvson Defence cence and echnology Organsaton DO-N-69 ABAC ask schedulng s nvestgated for a set of generc tasks representatve

More information

Thermal-aware relocation of servers in green data centers

Thermal-aware relocation of servers in green data centers Fronters of Informaton Technology & Electronc Engneerng www.zju.edu.cn/jzus; engneerng.cae.cn; www.sprngerlnk.com ISSN 295-9184 (prnt); ISSN 295-923 (onlne) E-mal: jzus@zju.edu.cn Chaudhry et al. / Front

More information

universitat Autónoma' de Barcelona

universitat Autónoma' de Barcelona unverstat Autónoma' de Barcelona A new dstrbuted dffuson algorthm for dynamc load-balancng n parallel systems Departament d'informàtca Untat d'arqutectura d'ordnadors Sstemes Operatus A thess submtted

More information

An Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks

An Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks An Adaptve Cross-layer Bandwdth Schedulng Strategy for the Speed-Senstve Strategy n erarchcal Cellular Networks Jong-Shn Chen #1, Me-Wen #2 Department of Informaton and Communcaton Engneerng ChaoYang Unversty

More information

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays VoIP Playout Buffer Adjustment usng Adaptve Estmaton of Network Delays Mroslaw Narbutt and Lam Murphy* Department of Computer Scence Unversty College Dubln, Belfeld, Dubln, IRELAND Abstract The poor qualty

More information