TOFEC: Achieving Optimal Throughput-Delay Trade-off of Cloud Storage Using Erasure Codes

Size: px
Start display at page:

Download "TOFEC: Achieving Optimal Throughput-Delay Trade-off of Cloud Storage Using Erasure Codes"

Transcription

1 : Achevng Optmal Throughput-Delay Trade-off of Cloud Storage Usng Erasure Codes Guanfeng Lang and Ulaş C. Kozat DOCOMO Innovatons, Inc., Palo Alto, CA Emal: Abstract Our paper presents solutons usng erasure codng, parallel connectons to storage cloud and lmted chunkng (.e., dvdng the object nto a few smaller segments) together to sgnfcantly mprove the delay performance of uploadng and downloadng data n and out of cloud storage. s a strategy that helps front-end proxy adapt to level of workload by treatng scalable cloud storage (e.g. Amazon S3) as a shared resource requrng admsson control. Under lght workloads, creates more smaller chunks and uses more parallel connectons per fle, mnmzng servce delay. Under heavy workloads, automatcally reduces the level of chunkng (fewer chunks wth ncreased sze) and uses fewer parallel connectons to reduce overhead, resultng n hgher throughput and preventng queueng delay. Our trace-drven smulaton results show that s adaptaton mechansm converges to an approprate code that provdes the optmal delay-throughput trade-off wthout reducng system capacty. Compared to a non-adaptve strategy optmzed for throughput, delvers 2.5 lower latency under lght workloads; compared to a non-adaptve strategy optmzed for latency, can scale to support over 3 as many requests. Index Terms FEC, Cloud storage, Queueng, Delay I. INTRODUCTION Cloud storage has been ganng popularty rapdly as an economc, flexble and relable data storage servce that many cloud-based applcatons nowadays are mplemented on. Typcal cloud storage systems are mplemented as key-value stores n whch data objects are stored and retreved va ther unque keys. To provde hgh degree of avalablty, scalablty, and data durablty, each object s replcated several tmes wthn the nternal dstrbuted fle system and sometmes also further protected by erasure codes to more effcently use the storage capacty whle attanng very hgh durablty guarantees []. Cloud storage provders usually mplement a varety of optmzaton mechansms such as load balancng and cachng/prefetchng nternally to mprove performance. Despte all such efforts, stll evaluatons of large scale systems ndcate that there s a hgh degree of randomness n delay performance [2]. Thus, servces that requre more robust and predctable Qualty of Servce (QoS) must deploy ther own external solutons such as sendng multple/redundant requests (n parallel or sequentally), chunkng large objects nto smaller ones and read/wrte each chunk through parallel connectons, replcate the same object usng multple dstnct keys, etc. Fg.. Mean Total Delay (msec) (,) (2,) (2,2) (4,2) (3,3) (6,3) Arrval Rate (req/sec) Delay for downloadng 3MB fles usng fxed MDS codes In ths paper, we present an external strategy that can provde much better throughput-delay performance for fle accessng on cloud storage utlzng erasure codng that does not requre any modfcaton nor knowledge of the nternal mplementaton of storage cloud. Although we base our analyss and evaluaton on Amazon S3 servce and present as an external soluton, can be appled to many other cloud storage systems both externally and nternally wth small modfcatons. The latter can be accomplshed, for example, by makng a thn layer on top of the orgnal API. A. State of the Art /4/$3.00 c 204 IEEE Among the vast amount of research on mprovng cloud storage system s delay performance emerged n the past few years, two groups n partcular are closely related to our work presented n ths paper: Erasure Codng wth Redundant Requests: As proposed by authors of [3], [4], [5], fles are dvded nto a predetermned number of k chunks, each of whch s /k the sze of the orgnal fle, and encoded nto n > k of coded chunks usng an (n, k) Maxmum Dstance Separable (MDS) code, or more generally a Forward Error Correcton (FEC) code. Downloadng/uploadng of the orgnal fle s accomplshed by downloadng/uploadng n coded chunks usng parallel connectons smultaneously and s deemed served when download/upload of any k coded chunks complete. Such mechansms sgnfcantly mproves the delay performance under lght workload. However, as shown n our prevous work [3] and later reconfrmed by [5], system capacty s reduced due to the overhead for usng smaller chunks and redundant requests. Ths phenomenon s llustrated n Fg. where we plot the delay-throughput trade-off for usng dfferent MDS codes from /4/$ IEEE 826

2 827 2 our smulatons usng delays traces collected on Amazon S3. Codes wth dfferent k are grouped n dfferent colors. Usng a code wth hgh level of chunkng and redundancy, n ths case a (6,3) code, although delvers 2 gan n delay at lght workload, reduces system capacty to only 30% of the orgnal basc strategy wthout chunkng and redundancy,.e., (, ) code! Ths problem s partally addressed n [3] where we present strateges that adjust n accordng to workload level so that t acheves the near-optmal throughput-delay trade-off for the predetermned k. For example, f k = 3 s used, the strateges n [3] wll acheve the lower-envelop of the red curves n Fg.. Yet, t stll suffers from an almost 60% loss n system capacty. Dynamc Job Szng: It has been observed n [2], [6] that n key-value storage systems such as Amazon S3 and Mcrosoft s Azure Storage, throughput s dramatcally hgher when they receve a small number of storage access requests for large jobs (or objects) than f they receve a large number of requests for small jobs (or objects), because each storage request ncurs overheads such as networkng delay, protocol-processng, lock acqustons, transacton log commts, etc. Authors of [6] developed Stout n whch requests are dynamcally batched to mprove delay-throughput trade-off of key-value storage systems. Based on the observed congeston Stout ncrease or reduce the batchng sze. Thus, at hgh congeston, a larger batch sze s used to mprove the throughput whle at low congeston a smaller batch sze s adopted to reduce the delay. B. Man Contrbuton We ntroduce an adaptve strategy for accessng cloud storage systems va erasure codng, called (Throughput Optmal FEC Cloud), that mplements dynamc adjustment of chunkng and redundancy levels to provde the optmal delaythroughput trade-off. In other words, acheves the lower envelop of curves n all colors n Fg.. The prmary novelty of s ts backlog-based adaptve algorthm for dynamcally adjustng the chunk sze as well as the number of redundant requests ssued to fulfll storage access requests. Ths algorthm of varable chunk szng can be vewed as a novel ntegraton of pror observatons from the two bodes of works dscussed above. Based on the observed backlog level as an ndcator of the workload, ncreases or reduces the chunk sze, as well as the number of redundant requests. In our trace-drven smulaton evaluaton, we demonstrate that: () successfully adapts to full range of workloads, delverng 3 lower average delay than the basc statc strategy wthout chunkng under lght workloads, and under heavy workloads over 3 the throughput of a statc strategy wth hgh chunkng and redundancy levels optmzed for servce delay; and (2) provdes good QoS guarantees as t delvers low delay varatons. works wthout any explct nformaton from the back-end cloud storage mplementaton: ts adaptaton strategy s mplemented solely at the front-end applcaton server (the storage clent) and s based exclusvely on the measured latency from unmodfed cloud storage systems. Ths allows to be more easly deployed, as ndvdual cloud applcatons can adopt wthout beng ted-up wth any partcular cloud storage system, as long as a small number of APIs are provded by the storage system. II. SYSTEM MODELS A. Basc Archtecture and Functonalty The basc system archtecture of captures how web servces today utlze publc or prvate storage clouds. The archtecture conssts of proxy servers n the front-end and a key-value store, referred to as storage cloud, n the backend. Users nteract wth the proxy through a hgh-level API and/or user nterfaces. The proxy translates every hgh-level user request (to read or wrte a fle) nto a set of n tasks. Each task s essentally a basc storage access operaton such as put, get, delete, etc. that wll be accomplshed usng low-level APIs provded by the storage cloud. The proxy mantans a certan number of parallel connectons to the storage cloud and each task s executed over one of these connectons. After a certan number of tasks are completed successfully, the user request s consdered accomplshed and the proxy responds to the user wth an acknowledgment. The solutons we present are deployed on the proxy server sde transparent to the storage cloud. For read request, we assume the fle s pre-coded nto n max n coded chunks wth an (n max,k) MDS code and stored on the cloud. Completon of downloadng any k coded chunks provdes suffcent data to reconstruct the requested fle. For wrte request, the fle to be uploaded s dvded and encoded nto n coded chunks usng an (n,k) MDS code and hence completon of uploadng any k coded chunks means suffcent data have been stored onto the cloud. Thus, upon completon of a request, the n k un-started and/or unfnshed tasks are then preemptvely canceled and removed from the system. Fg. 2. System Model Accordngly, we model the proxy by the queueng system shown n Fg.2. There are two FIFO (frst-n-frst-out) queues: () the request queue that buffers all ncomng user requests, and () the task queue that s a mult-server queue and holds all tasks watng to beng executed. L threads 2, representng the set of parallel connectons to the storage cloud, are attached to the task queue. The adaptaton module of montors the state of the queues and the threads, and decdes what For wrte request, the remanng tasks can also be scheduled as background jobs dependng on the subsequent read profle of the fle. 2 We avod the term server that s commonly used n queueng theory lterature to prevent confuson.

3 828 3 codng parameter (n,k) to be used for each request. Wthout loss of generalty, we assume that the head-of-lne (HoL) request leave the request queue only when there s at least one dle thread and the task queue s empty. A batch of n tasks are then created for that request and njected nto the task queue. As soon as any k tasks complete successfully, the request s consdered completed. Such a queue system s work conservng snce no thread s left dle as long as there s any request or task pendng. B. Bascs of Erasure Codes An (n, k) MDS code (e.g., Reed-Soloman codes) encodes k data chunks each of B bts nto a codeword consstng of n B-bt long coded chunks. The coded chunks can sustan up to n k erasures such that the k orgnal data chunks can be effcently reconstructed from any subset of k coded chunks. n and k are called the length and dmenson of the MDS code. We also defne r = n/k as the redundancy rato of an (n,k) MDS code. Ths erasure resstant property of MDS codes has been utlzed n pror works [3], [4], [5], as well as n ths paper, to mprove delay of cloud storage systems. Essentally a coded chunk experencng long delay s treated as an erasure. Fg. 3. Example of supportng multple chunk szes wth Shared Key approach: the 3MB fle s dvded and encoded nto a coded fle of 6MB consstng 2 strps, each of 0.5MB. Download the fle usng a (2,) MDS code s accomplshed by creatng two read tasks: one for strps -6, and the other for strps 7-2. In ths paper, we make use of another nterestng property of MDS codes to mplement varable chunk szng of n a storage effcent manner: MDS code of hgh length and dmenson for small chunk sze can be used as MDS code of smaller code length and dmenson for larger chunk sze. To be more specfc, consder any (N,K) MDS code for chunks of b bts. To avod confuson, we wll refer to these b-bt chunks as strps. A dfferent MDS code of length n = N/m, dmenson k = K/m and chunk sze B = bm for some m > can be constructed by smply batchng every m data/coded strps nto one data/coded chunk. The resultng code s an (n,k) MDS code for B-bt chunks because any k coded chunks covers mk = K coded strps, whch s suffcent to reconstruct the orgnal fle of Bk = bm K/m = bk bts. Ths property s llustrated as an example n Fg. 3. In ths example, a 3MB fle s dvded nto 6 strps of 0.5MB and encoded nto 2 coded strps of total sze 6MB, usng a (2,6) MDS code. Ths code can then be used as a (2,) code for 3MB chunks, a (4,2) code for.5mb chunks and a (6,3) code for MB chunks smultaneously by batchng 6, 3 and 2 strps nto a chunk. C. Defntons of Dfferent Delays The delay experenced by a user request conssts of two components: queueng delay (D q ) and servce delay (D s ). Both are defned wth respect to the request queue: () the queueng delay s the amount of tme a request spends watng n the request queue and () the servce delay s the perod of tme between when the request leaves the request queue (.e., admtted nto the task queue and started beng served by at least one thread) and when t fnally leaves the system (.e., the frst tme when any k of the correspondng tasks complete). In addton, we also consder the task delays (D t ), whch s the tme t takes for a thread to serve a task assumng t s not termnated or canceled preemptvely. To clarfy these defntons of delays, consder a request served wth an (n, k) MDS code, wth T A ts arrval tme, T T 2 T n the startng tmes of the correspondng n tasks 3. Then the queueng delay s D q = T T A. Suppose D t,,,d t,n are the correspondng task delays, then the completon tmes of these task wll be X = {T + D t,,,t n + D t,n } f none s canceled. So the request wll leave the system at tme X (k), whch denotes the k-th smallest value n X,.e., the tme when k tasks complete. Then the servce delay of ths request s D s = X (k) T. III. VARIABLE CHUNK SIZING In ths secton, we dscuss mplementaton ssues as well as pros and cons of two potental approaches, namely Unque Key and Shared Key, for supportng erasure-code-based access to fles on the storage cloud wth a varety of chunk szes. Suppose the maxmum desred redundancy rato s r, then these approaches mplement varable chunk szng as follows: Unque Key: For every choce of chunk sze (or equvalently k), a separate batch of rk coded chunks are created and each coded chunk s stored as an ndvdual object wth ts unque key on the storage cloud. The access to dfferent chunks s mplemented through basc get, put storage cloud APIs. Shared Key: A coded fle s frst obtaned by stackng together the coded strps obtaned by applyng a hghdmenson (N = rk, K) MDS code to the orgnal fle, as descrbed n Secton II-B and llustrated n Fg.3. For read, the coded fle s stored on the cloud as one object. Access to chunks wth varable sze s realzed by downloadng segments n the coded fle correspondng to batches of a correspondng number of strps, usng a same key wth more advanced partal read storage cloud APIs. Smlarly, for wrte, the fle s uploaded n parts usng partal wrte APIs and then later merged nto one object n the cloud. A. Implementaton and Comparson of the two Approaches ) Storage cost: When the user request s to wrte a fle, storage cost of Unque Key and Shared Key s not so dfferent. However, to support varable chunk szng for read requests, Shared Key s sgnfcantly more cost-effcent than Unque Key. Wth Shared Key, a sngle coded fle stored on the cloud can be reused to support essentally an arbtrary number of 3 We assume T = f the -th task s never started.

4 829 4 dfferent chunk szes, as long as the strp sze s small enough. On the other hand, t seems mpossble to acheve smlar reusng wth the Unque Key approach where dfferent chunks of the same fle s treated as ndvdual objects. So wth Unque Key, every addtonal chunk sze to be supported requres an extra storage cost r fle sze. Such lnear growth of storage cost easly makes t prohbtvely expensve even to support a small number of chunk szes. 2) Dversty n delays: The success of and other proposals to use redundant requests (ether wth erasure codng or replcaton) for delay mprovement reles on dversty n cloud storage access delays. In partcular,, as well as [3], [4], [5], requres access delays for dfferent chunks of the same fle to be weakly correlated. Wth Unque Key, snce dfferent chunks are treated as ndvdual objects, there s no nherent connecton among them from the storage cloud system s perspectve. So dependng on the nternal mplementaton of object placement polcy of the storage cloud system, chunks of a fle can be stored on the cloud n dfferent storage unts (dsks or servers) on the same rack, or n dfferent racks n the same data center, or even to dfferent data centers at dstant geographcal locatons. Hence t s qute lkely that delays for accessng dfferent chunks of the same fle show very weak correlaton. On the other hand, wth Shared Key, snce coded chunks are combned nto one coded fle and stored as one object n the cloud, t s very lkely that the whole coded fle, hence all coded chunks/strps, s stored n the same storage unt, unless the storage cloud system nternally dvdes the coded fle nto peces and dstrbutes them to dfferent unts. Although many dstrbuted storage systems do dvde fles nto parts and store them separately, t s normally only for larger fles. For example, the popular Hadoop dstrbuted fle system by default does not dvde fles smaller than 64MB. When dfferent chunks are stored on the same storage unt, we can expect hgher correlaton n ther access delays. It then s to be verfed that the correlaton between dfferent chunks wth the Shared Key approach s stll weak enough for our codng soluton to be benefcal. 3) Unversal support: Unque Key s the approach adopted n our prevous work [3] to support erasure-code based fle accessng wth one predetermned chunk sze. A beneft of Unque Key s that t only requres basc get and put APIs that all storage cloud systems must provde. So t s readly supported by all storage cloud systems and can be mplemented on top of any one. On the other hand, Shared Key requres more advanced APIs that allow the proxy to download or upload only the targeted segment of an object. Such advanced APIs are not currently supported by all storage cloud systems. For example, to the best of our knowledge currently Mcrosoft s Azure Storage provdes only methods for partal read 4 but none for partal wrte. On the contrary, Amazon S3 provdes partal 4 E.g. DownloadRangeToStream(target, offset, length) downloads a segment of length bytes startng from the offset-th byte of the target object (or blob n Azure s jargon). CCDF Unque Key, thread Shared Key, thread Shared Key, thread 2 Shared Key, thread 3 Shared Key, thread 4 Shared Key, thread 5 Shared Key, thread Task Delay (msec) Fg. 4. CCDF of ndvdual threads wth MB chunks and n = 6 access for both read and wrte: the proxy can download a specfc nclusve byte range wthn an object stored on S3 by callng getobject(request,destnaton) 5 ; and for uploadng an uploadpart method to upload segments of an object and an completemultpartupload method to merge the uploaded segments are provded. We expect more servce provders to ntroduce both partal read and wrte APIs n the near future. B. Measurements on Amazon S3 To understand the trade-off between Unque Key and Shared Key, we run measurements over Amazon EC2 and S3. EC2 nstance served as the proxy n our system model. We nstantated an extra large EC2 nstance wth hgh I/O capablty n the same avalablty regon as the S3 bucket that stores our objects. We conducted experments on dfferent week days n May to July 203 wth varous chunk szes between 0.5MB to 3MB and up to n = 2 coded chunks per fle. For each value of n, we allow L = n smultaneously actve threads whle the -th thread beng responsble for downloadng the - th coded chunk of each fle. Each experment lasted longer than 24 hours. We alternated between dfferent settngs to capture smlar tme of day characterstcs across all settngs. The experments are conducted wthn all 8 avalablty regons n Amazon S3. Except for the US Standard avalablty regon, all other 7 regons demonstrate smlar performance statstcs that are consstent over dfferent tmes and days. We conjecture the dfferent and nconsstent behavor of US Standard mght be due to the fact that t targets a slghtly dfferent usage pattern and t may employ a dfferent mplementaton for that reason 6. We wll exclude US Standard from subsequent dscussons. Due to lack of space, we only show a lmted subset of fndngs for avalablty regon North Calforna that are representatve for regons other than US Standard : () In both Unque Key and Shared Key, the task delay dstrbuton observed by dfferent threads are almost dentcal. The two approaches are ndstngushable even beyond 99.9th percentle. Fg.4 show the complementary cumulatve dstrbuton functon (CCDF) of task delays observed by ndvdual threads for MB chunks and n = 6. Both approaches demonstrate large delay spread n all regons. 5 The byte range s set by callng request.setrange(start,end). 6 See regon

5 830 5 CCDF n=3 n=4 n=5 n= Servce Delay (msec) Fg. 5. (a) Unque Key CCDF n=3 n=4 n=5 n= Servce Delay (msec) (b) Shared Key CCDF of servce delay for readng 3MB fles wth MB chunks (2) Task delays for dfferent threads n Unque Key show close to zero correlaton, whle they demonstrate slghtly hgher correlaton n Shared Key, as t s expected. Wth all dfferent settngs, the cross correlaton coeffcent between dfferent threads stays below 0.05 n Unque Key and ranges from 0. to 0.7 n Shared Key. Both approaches acheve sgnfcant servce delay mprovements. Fg.5 plots the CCDF of servce delays for downloadng 3MB fles wth MB chunks (k = 3) wth n = 3 6, assumng all n tasks n a batch start at the same tme. In ths settng, both approaches reduce 99th percentle delays by roughly 50%, 65% and 80% by downloadng, 2 and 3 extra coded chunks. Although Shared Key demonstrates up to 3 tmes hgher cross correlaton coeffcent, there s no meanngful statstcal dstncton n servce delay between the two approaches untl beyond 99th percentle. All avalablty regons experence dfferent degrees of degradaton at hgh percentles wth Shared Key due to the hgher correlaton. Sgnfcant degradaton emerges from around 99.9th percentle and beyond n all regons except for Sao Paulo, n whch degradaton appears around 99th percentle. (3) Task delays are always lower bounded by some constant 0 that grows roughly lnearly as chunk sze ncreases. Ths constant part of delay cannot be reduced by usng more threads: see the flat segment at the begnnng of the CCDF curves n Fg.4 and Fg.5. Snce ths constant porton of task delays s unavodable, t leads to the negatve effect of usng larger n snce there s a mnmum cost of system resource of n (tme thread) that grows lnearly n n. Ths cost leads to a reduced capacty regon for usng more redundant tasks, as llustrated n the example of Fg.. We observe that the two approaches delver almost dentcal total delays (queueng + servce) for all arrval rates, n spte of the degraded servce delay wth Shared Key at very hgh percentle. So we only plot the results wth Shared Key n Fg.. (4) Both the mean and standard devaton of task delays grow roughly lnearly as chunk sze ncreases. Fg.6 plots the measured mean and standard devaton of task delays n both approaches at dfferent chunk szes. Also plotted n the fgures are least squares ftted lnes for the measurement results. Notce that the extrapolatons at chunk sze = 0 are all greater than zero. We beleve ths observaton reflects the costs of non-i/o-related operatons n the storage cloud that do not scale proportonally to object sze: for example, the cost to locate the requested object. We also beleve such costs contrbute partally to the mnmum task delay constant. Mean (msec) Unque Key Unque Key fttng Shared Key Shared Key fttng Chunk Sze (MB) (a) Mean Fg. 6. C. Model of Task Delays Standard devaton (msec) Unque Key Unque Key fttng Shared Key Shared Key fttng Chunk Sze (MB) (b) Standard Devaton Delay statstcs vs. chunk sze Based on the aforementoned observatons, we decde to use the Shared Key approach n snce ts outstandng storage effcency overweghts the mnmum degradaton n delay. For the analyss present n the next secton, we model the task delays as ndependently dstrbuted random varables whose mean and standard devaton grow lnearly as chunk sze B ncreases. More specfcally, we assume the task delay D t for chunk sze B followng dstrbuton n the form of D t (B) (B)+exp(µ(B)), () where (B) = + B captures the lower bound of task delays as n observaton (3), and exp(µ(b)) represents a exponental random varable that models the tal of the CCDF. The mean and standard devaton of the exponental tal both equal to µ(b) = Ψ+ ΨB. Wth ths model, constants and Ψ together capture the non-zero extrapolatons of the mean and standard devaton of task delays at chunk sze 0, and smlarly, constants and Ψ together capture the rate at whch the mean and standard devaton grow as chunk sze ncreases, as n observaton (4). IV. DESIGN OF For the analyss n ths secton, we group requests nto classes accordng to the tuple (type, sze). Here type can be read or wrte, and can potentally be other type of operatons supported by the cloud storage. Each type of operaton has ts own set of delay parameters {,,Ψ, Ψ}. Subscrpts wll be used to ndcate varables assocated wth each class. We frst ntroduce approxmatons for the expected queueng and servce delays, assumng the FEC code used to serve requests of each class s predetermned and fxed (Secton IV-A). Then we formulate an optmzaton problem whose objectve s to mnmze the expected total delay over all such statc strateges wth fxed FEC codes. We show that solutons to the non-convex optmzaton problem exhbt a nce property (Secton IV-B): The optmal values of n, k and r can all be expressed as functons solely determned by Q the expected length of the request queue: n = N (Q), k = K (Q) and r = R (Q). N, K and R are all strctly decreasng functons of Q. Ths fndng s then used as the gudelne n the desgn of our backlog-drven adaptve strategy (Secton IV-C).

6 83 6 A. Approxmated Analyss of Statc Strateges Denote J as the fle sze of class. Consder a request of class served wth an (n,k ) MDS code,.e., B = J /k. Frst suppose all n tasks start at the same tme,.e., T = T n. In ths case, gven our model for task delays, t s trval to show that the expected servce delay equals to k D s, = (J /k )+ µ (J /k ) n j=0 j (J /k )+ µ (J /k ) ln n n k ( ) = + J k + Ψ + Ψ J k ln r r. (2) Also defne the system usage (or smply cost) of a request as the sum of the amount of tme each of ts tasks beng served by a thread 7. When all tasks start at the same tme, ts expected system usage s (see Secton IV of [3] for detaled dervaton) U = n (J /k )+ k µ (J /k ) = k r + J r +Ψ k + Ψ J. (3) Suppose class contrbutes to p fracton of the total arrvals, then the average cost per request s U = p U. Wth L smultaneously actve threads, requests depart the system at rate L/U (request/unt tme). In lght of ths observaton, we approxmate the request queue wth an M/M/ queue wth servce rate L/U. In other words, gven the composton of requests {p } and the choce of code(s) {n,k }, the system capacty (the maxmum supportable throughput) s approxmated wth L/U. So the queueng delay n the orgnal system at total arrval rate λ s approxmated by D q = L/U λ 2 L/U = λu L(L λu), (4) and the expected length of the request queue s approxmately Q = λd q = (λu)2 2 L(L λu) = λ L(L λ). (5) Here λ = λu = λ p U = λ p ( k r + J r + Ψ k + Ψ J ). Notcng that gven {p }, L/U s maxmzed when n =, k =,, we call ths maxmum value the (approxmated) full capacty for that {p }. We acknowledge that the above approxmaton s qute coarse, especally because tasks of the same batch do not start at the same tme n general. However, remember the man objectve of ths paper s to develop a practcal soluton that can acheve the optmal delay-throughput trade-off. Accordng to the smulaton results, ths approxmaton s suffcently good for the purpose of ths paper. 7 The tme a task j beng served s D t,j f t completes successfully, X (k) T j f t starts but s termnated preemptvely, and 0 f t s canceled whle watng n the task queue. B. Optmal Statc Strategy Gven total arrval rate λ and composton of requests {p }, we want to fnd the best choce of FEC code for each class such that the total delay s mnmzed. Relaxng the requrement for n and k beng ntegers, ths s formulated as the followng mnmzaton problem 8 : mn {k,r } D q + p D s, s.t. k > 0, r, λ < L. Notce that ths s a non-convex optmzaton problem because the feasble regon s not a convex set, due to the k r terms n λ. In general, non-convex optmzaton problems are dffcult to solve. Fortunately, we are able to prove the followng theorem accordng to whch ths non-convex optmzaton problem can be solved numercally effcently. Theorem : For any gven λ and {p }, the non-convex optmzaton problem ( ) has a unque optmal soluton, whch satsfes the followng for all : k (Ψ k + ΨJ ) k + = J r (r ) J r +Ψ ( ) 2 L = L λ ( + Ψ ln ( ) ) r, (6) r 2L(Ψ k + Ψ J ) k r (r )( k + J ). (7) Proof: See Appendx. Observng that Eq.6 contans only delay parameters and fle sze of class, so t should be always satsfed no matter what arrval rate λ and request composton {p } are. Solvng Eq.6 alone gves a set of pars (k,r ) that are the optmal choce of code for class for some λ and {p }. Then solvng Eq.7 wthn ths set we obtan the optmal k and r as a functon of λ for all combnatons of λ and {p } such that λ = λ ) p U. Observng from Eq.5 that λ = L( Q2 +4Q Q /2, and wth some smple calculus, we conclude that Corollary : The optmal values of n, k and r can all be expressed as strctly decreasng functons of Q: n = N (Q), k = K (Q) and r = R (Q). (8) C. Adaptve Strategy The fndng of Corollary conforms to our ntuton: At lght workload (small λ), there should be lttle backlog n the request queue (small Q) and the servce delay domnates the total delay. In ths case, the system s not operatng n the capacty-lmted regme. So t s benefcal to ncrease the level of chunkng and redundancy to reduce delay. At heavy workload (larger λ), there wll be a large backlog n the request queue (large Q) and the queueng delay domnates the total delay. In ths case, the system operates n the capacty-lmted regme. So t s better to 8 Notce that all classes share the same queueng delay. Also, we requre k > 0 nstead of k for a techncalty to smplfy the proof of the unqueness of the optmal soluton. We requre r snce n k. λ < L s mposed for queue stablty.

7 832 7 reduce the level of chunkng and redundancy to support hgher throughput. More mportantly, t suggests that t s suffcent to choose the FEC code solely based on the length of the request queue. The basc dea of s to choose n = N (q) and k = K (q) for a request of class, where q s the queue length upon the arrval of the request. When ths s done to all requests arrve nto the system, t can be expected the average code lengths (dmensons) and expected queue length Q satsfy Eq.8, hence optmal delay s acheved. In, ths s mplemented wth a threshold based algorthm, whch can be performed very effcently. For each class, we frst compute the expected queue length f n =,...,n max s the optmal code length by Q N,n = N (n ). (9) Here n max s the maxmum number of tasks allowed for a class request. Snce N s a strctly decreasng functon, ts s a well-defned strctly decreasng functon. As a result, we have Q N, > QN,2 > > QN,n > 0. Remember max our goal s to use code length n f queue length q s around Q N,n, so we want a set of thresholds {HN,n } such that nversen H N, > Q N, > H N,2 > Q N,2 > > H N,n max > Q N,n max > H N,n max + = 0, and wll use n such that q [H,n+ N,HN,n ). In our current mplementaton of, we use H,n N = ( Q N,n,n ) +QN /2 and H, N =. A set of thresholds {H,k K } for adaptaton of k max s found n a smlar fashon. The adaptaton algorthm of s summarzed n pseudocodes as below: (Throughput Optmal FEC Cloud) Intalzaton: q = 0 request arrves : q queue length upon arrval of request 2: class that request belongs to 3: q αq +( α)q 4: Fnd k k max for n = 2,,n max such that q [H,k+ N,HN,k ) 5: Fnd n n max such that q [H,n+ N,HN,n ) 6: n mn(r max k,n) 7: Serve request wth an (n, k) code when t becomes HoL. Note that n Step 6 we reduce n to r max k f the redundancy rato of the code chosen n the prevous steps s hgher than r max the maxmum allowed redundancy rato for class. Also, nstead of comparng q drectly wth the thresholds, we compare an exponental movng average q = αq +( α)q, wth a memory factor 0 α <, aganst the thresholds to determne n and k. The movng average s used to mtgate the transent varaton n queue length so that n and k wll not change too frequently. It s obvous that we only need to set α = 0 n order to use nstantaneous queue length q for the adaptaton snce n ths case q = q. V. EVALUATION We now demonstrate the benefts of s adaptaton mechansm. We evaluate s adaptaton strategy and show that s outperforms statc strateges wth both constant and changng workloads, as well as a smple greedy heurstc that wll be ntroduced later. A. Smulaton Setup We conducted trace-drven smulatons for performance evaluaton for both sngle-class and mult-class scenaros wth both read and wrte requests of dfferent fle szes. Due to lack of space, we only show results for the scenaro wth one class (read,3mb). But we must emphasze that t s representatve enough so that the fndngs to be dscussed n ths secton are vald for other settngs (dfferent fle szes, wrte requests, and multple classes). We assume the system supports up to L = 6 smultaneously actve threads. We set the maxmum code dmenson and redundancy rato to be k max = 6 and r max = 2, because we observe neglgble gan n servce delay beyond ths chunkng and redundancy level from our measurements. We use traces collected n May and June n avalablty regon North Calforna. In order to compute the threshold for, we need estmatons of the delay parameters {,,Ψ, Ψ}. For ths, we frst flter out the worst 0% task delays n the traces, then we compute the delay parameters from the least squares lnear approxmaton for the mean and standard devaton of the remanng task delays. We use memory factor α = 0.99 n. In addton to the statc strateges, we develop a smple heurstc strategy for the purpose of comparson. Unlke the adaptve strategy n, does not requre pror-knowledge of the dstrbuton of task delays, yet t acheves compettve mean delay performance. In, the code to be used to serve a request n class s determned by the number of dle threads { upon ts arrval: suppose there, f l = 0 are l dle threads, then k = mn(k max,l), otherwse, and {, f l = 0 smlarly n = mn(r max. The dea of k,l), otherwse s to frst maxmze the level of chunkng wth the dle threads avalable, then ncrease the redundancy rato as long as there are dle threads reman. B. Throughput-Delay Trade-Off Fg.7 shows the mean, medan, 90th percentle and 99th percentle delays of and wth Posson arrvals at dfferent arrval rate λ. We also run smulatons wth statc strateges for all possble combnatons of (n, k) at every arrval rate. We brute-force fnd the best mean, medan, 90th and 99th percentle delays acheved wth statc strateges and use them as the baselne. Also plot n Fg.7(a) and Fg.7(b) are the mean and medan delay performance of the basc statc strategy wth no chunkng and no replcaton,.e., (, ) code; the smple replcaton statc strategy wth a (2, ) code; and

8 833 8 Best Statc 0 4 Best Statc delay (msec) Best Statc Statc (,) Statc (2,) Fxed k=6 arrval rate (req/sec) delay (msec) Best Statc Statc (,) Statc (2,) Fxed k=6 arrval rate (req/sec) delay (msec) arrval rate (req/sec) delay (msec) arrval rate (req/sec) (a) Mean Delay (b) Medan Delay Fg. 7. (c) 90th Percentle Delay Delay performance n read only scenaro (d) 99th Percentle Delay the backlog-based adaptve strategy from [3] wth fxed code dmenson k = 6 and n 2. As we can see, both and successfully support the full capacty regon the one supported by basc statc whle achevng almost optmal mean and medan delays throughout the full capacty regon. At lght workload, delvers about 2.5 mprovement n mean delay when compared wth the basc statc strategy, and about 2 when compared wth smple replcaton (from 205ms and 5ms to 84ms). It also reduces the medan delay by about 2 from that of basc and smple replcaton (from 56ms and 38ms to 74ms). Meanwhle acheve about 2 mprovement n both mean (89ms) and medan delays (79ms) over basc. Wth heaver workload, both and successfully adapt ther codes to keep track wth the best statc strateges, n terms of mean and medan delays. It s clear from the fgures that both and acheve our prmary goal of retanng full system capacty, as supported by basc statc strategy. On the contrary, although smple replcaton has slghtly better mean and medan delays than basc under lght workload, t fals to support arrval rates beyond 70% of the capacty of basc. Meanwhle, the adaptve strategy from [3] wth fxed code dmenson k = 6 can only support less than 30% of the orgnal capacty regon, although t acheves the best delay at very lght workload. Whle the two adaptve strateges have smlar performance n mean and medan, outperforms sgnfcantly at hgh percentles. As Fg.7(c) and Fg.7(d) demonstrate, matches wth the best statc strateges at 90th and 99th percentle delays throughout the whole capacty regon. On the other hand, fals to keep track of the best statc performance at lower arrval rates. At lght workload, s s over 2 and 2.5 better than at 90th and 99th percentles. Less nterestng s the case wth heavy workload when the system s capacty-lmted. Hence both strateges converge to the basc statc strategy usng mostly (,) code, whch s optmal at ths regme. C. Behavor of the Adaptaton Mechansms When we look nto the fracton of requests served by each choce of code, and turn out to behave qute dfferently. In Fg.8(a) we plot the compostons of requests served by dfferent code dmenson k s. At each arrval rate, the two bars represent and. For each bar, the colors represent the fracton of requests served wth code Fracton served wth each code dmenson arrval rate (req/msec) (a) Composton of k. Left:, Rght: Fg. 8. standard devaton of delay (msec) Best Statc 0 arrval rate (req/sec) (b) Standard Devaton Comparson of and dmenson through 6, from bottom to top. s choce of k demonstrates a hgh concentraton around the optmal value: at all arrval rate, over 80% requests are served by 2 neghborng values of k. Moreover, as arrval rate vares from low to hgh, s choce ofk transtons qute smoothly as (5,6) (3,4) (2,3) (,2) and eventually converges to a sngle value as workload approaches system capacty. On the contrary, tends to round-robn across all possble choces of k and majorty of requests are served by ether k = or 6. So s effectvely alternatng between the two extremes of no chunkng and very hgh chunkng, nstead of stayng around the optmal. Such all or nothng behavor results n 2 to 3 worse standard devaton as shown n Fg.8(b). So provdes much better QoS guarantee. We further examne how well the two adaptve strateges adjust to changes n workload. In Fg.9 we plot the total delay experenced by requests arrvng at dfferent tmes wthn a 600-second perod. The arrval rate s 0 request/second for the frst and last 200 seconds, and 70 request/second for the mddle 200 seconds. Both adaptve strateges turn out to be qute agle to changes n arrval rate and quckly converge to a good composton of codes that delvers optmal delays. On the contrary, the statc strategy usng (3,2) code bulds up a huge backlog durng mddle 200-second perod and takes over 00 seconds to clean t up. VI. RELATED WORK FEC n connecton wth multple paths and/or multple servers s a well nvestgated topc n the lterature [7], [8], [9], [0]. However, there s very lttle attenton devoted to the queueng delays. FEC n the context of network codng or coded schedulng has also been a popular topc from the perspectves of throughput (or network utlty) maxmzaton and throughput vs. servce delay trade-offs [], [2], [3],

9 834 9 Movng averaged delay (msec) Statc (3,2) λ = 0 λ = 70 λ = Tme (sec) Fg. 9. Adaptaton to changng workload [4]. Although some ncorporate queung delay analyss, the treatment s largely for broadcast wreless channels wth qute dfferent system characterstcs and constrants. FEC has also been extensvely studed n the context of dstrbuted storage from the ponts of hgh durablty and avalablty whle attanng hgh storage effcency [5], [6], [7]. Authors of [4] conducted theoretcal study of cloud storage systems usng FEC n a smlar fashon as we dd n our work [3]. Gven that exact mathematcal analyss of the general case s very dffcult, authors of [4] consdered a very smple case wth a fxed code of k = 2 tasks. Shah et al. [5] generalze the results from [4] to k > 2. Both works rely on the assumpton of exponental task delays, whch hardly captures the realty. Therefore, some of ther theoretcal results cannot be appled n practce. For example, under the assumpton of exponental task delays, Shah et al. have proved that usng larger n wll not reduce system capacty and wll always mprove delay, contradctng wth smulaton results usng realworld measurements n [3] and ths paper. VII. CONCLUSION s adaptaton mechansm s the frst technque for automatcally adjustng the level of both chunkng and redundancy for scalable key-value storage access usng erasure codes and parallel connectons. montors the local backlog and dynamcally adjust both the length and dmenson of the erasure code to be used. To evaluate s adaptaton mechansm, we run smulatons usng real-world traces obtaned on Amazon S3. We found that delvers the optmal delay-throughput tradeoff and dramatcally outperforms non-adaptve strateges and smple adaptve heurstcs. REFERENCES [] C. Huang, H. Smtc, Y. Xu, A. Ogus, B. Calder, P. Gopalan, J. L, and S. Yekhann, Erasure Codng n Wndows Azure Storage, n USENIX ATC, 202. [2] S. L. Garfnkel, An Evaluaton of Amazon s Grd Computng Servces: EC2, S3 and SQS, Harvard Unversty, Tech. Rep., [3] G. Lang and U. C. Kozat, FAST CLOUD: Pushng the Envelope on Delay Performance of Cloud Storage wth Codng, IEEE/ACM Trans. Networkng, preprnt, 3 Nov. 203, do: 0.09/TNET [4] L. Huang, S. Pawar, H. Zhang, and K. Ramchandran, Codes Can Reduce Queueng Delay n Data Centers, n IEEE ISIT, 202. [5] N. B. Shah, K. Lee, and K. Ramchandran, The MDS Queue: Analysng Latency Performance of Codes and Redundant Requests, arxv:2.5405, Apr [6] J. C. McCullough, J. Dunagan, A. Wolman, and A. C. Snoeren, Stout: an Adaptve Interface to Scalable Cloud Storage, n USENIX ATC, 200. [7] V. Sharma, S. Kalyanaraman, K. Kar, K. K. Ramakrshnan, and V. Subramanan, MPLOT: A Transport Protocol Explotng Multpath Dversty Usng Erasure Codes, n IEEE INFOCOM, [8] E. Gabrelyan, Fault-Tolerant Real-Tme Streamng wth FEC thanks to Capllary MultPath Routng, Computng Research Repostory, [9] J. W. Byers, M. Luby, and M. Mtzenmacher, Accessng Multple Mrror Stes n Parallel: Usng Tornado Codes to Speed Up Downloads, n IEEE INFOCOM, 999. [0] R. Saad, A. Serhrouchn, Y. Beglche, and K. Chen, Evaluatng Forward Error Correcton performance n BtTorrent protocol, n IEEE LCN, 200. [] A. Erylmaz, A. Ozdaglar, M. Medard, and E. Ahmed, On the Delay and Throughput Gans of Codng n Unrelable Networks, IEEE Trans. Inf. Theor., [2] W.-L. Yeow, A. T. Hoang, and C.-K. Tham, Mnmzng Delay for Multcast-Streamng n Wreless Networks wth Network Codng, n IEEE INFOCOM, [3] T. K. Dkalots, A. G. Dmaks, T. Ho, and M. Effros, On the Delay of Network Codng over Lne Networks, Computng Research Repostory, [4] U. C. Kozat, On the Throughput Capacty of Opportunstc Multcastng wth Erasure Codes, n IEEE INFOCOM, [5] A. G. Dmaks, P. B. Godfrey, Y. Wu, M. J. Wanwrght, and K. Ramchandran, Network Codng for Dstrbuted Storage Systems, IEEE Trans. Inf. Theor., 200. [6] R. Rodrgues and B. Lskov, Hgh Avalablty n DHTs: Erasure Codng vs. Replcaton, n 4th Internatonal Workshop, IPTPS, [7] J. L, S. Yang, X. Wang, and B. L, Tree-Structured Data Regeneraton n Dstrbuted Storage Systems wth Regeneratng Codes, n IEEE INFOCOM, 200. APPENDIX Proof: The objectve of ( ) s a lower-bounded contnuously dfferentable functon wthn the feasble regon. Its value goes to as (k,r) approaches the boundary of the feasble regon. As a result, there exst at least one global optmal soluton. At the global optmal, dervatves of the objectve over k and r both equal to 0. Equatng the partal dervatves to 0 can be rewrtten nto Eq.6 and Eq.7. It s trval to show that the left hand sde of Eq.6 s a strctly ncreasng functon of k and the rght hand sde s a strctly ncreasng functon of r as long as r. Ths mples that, r s a strctly ncreasng functon of k. The rght hand sde of Eq.7 becomes some functon π (k ) of k by substtutng r wth the soluton from Eq.6. It can be shown that π s a strctly decreasng functon. Notce that Eq.7 must be satsfed for all and the left hand sde remans unchanged. Then π (k ) = π j (k j ),,j =,,m,,j. (0) Recall that π and π j are strctly decreasng functons of k and k j, respectvely. Ths means that there s a one-to-one mappng between any k and k j at the optmal solutons, and k j s a strctly ncreasng functon of k. Notce that for any gven λ and {p } the left hand sde of Eq.7 s a strctly ncreasng functon of k f we replace all k j s and r j s wth the solutons of Eq.6 and Eq.0. The rght hand sde of Eq.7 s π (k ), whch s a strctly decreasng functon of k. As a result, these two functons can be equal for at most one value of k,.e., Eq.6 and Eq.7 have at most one soluton. Snce we have already proved the exstence of a soluton to these equatons va the exstence of global optmal, they have an unque soluton.

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada [email protected] Abstract Ths s a note to explan support vector machnes.

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Activity Scheduling for Cost-Time Investment Optimization in Project Management

Activity Scheduling for Cost-Time Investment Optimization in Project Management PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

8 Algorithm for Binary Searching in Trees

8 Algorithm for Binary Searching in Trees 8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the

More information

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays VoIP Playout Buffer Adjustment usng Adaptve Estmaton of Network Delays Mroslaw Narbutt and Lam Murphy* Department of Computer Scence Unversty College Dubln, Belfeld, Dubln, IRELAND Abstract The poor qualty

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

SPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background:

SPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background: SPEE Recommended Evaluaton Practce #6 efnton of eclne Curve Parameters Background: The producton hstores of ol and gas wells can be analyzed to estmate reserves and future ol and gas producton rates and

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

In some supply chains, materials are ordered periodically according to local information. This paper investigates

In some supply chains, materials are ordered periodically according to local information. This paper investigates MANUFACTURING & SRVIC OPRATIONS MANAGMNT Vol. 12, No. 3, Summer 2010, pp. 430 448 ssn 1523-4614 essn 1526-5498 10 1203 0430 nforms do 10.1287/msom.1090.0277 2010 INFORMS Improvng Supply Chan Performance:

More information

Dynamic Pricing for Smart Grid with Reinforcement Learning

Dynamic Pricing for Smart Grid with Reinforcement Learning Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,

More information

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center Dynamc Resource Allocaton and Power Management n Vrtualzed Data Centers Rahul Urgaonkar, Ulas C. Kozat, Ken Igarash, Mchael J. Neely [email protected], {kozat, garash}@docomolabs-usa.com, [email protected]

More information

Multi-Source Video Multicast in Peer-to-Peer Networks

Multi-Source Video Multicast in Peer-to-Peer Networks ult-source Vdeo ultcast n Peer-to-Peer Networks Francsco de Asís López-Fuentes*, Eckehard Stenbach Technsche Unverstät ünchen Insttute of Communcaton Networks, eda Technology Group 80333 ünchen, Germany

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany [email protected],

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT Chapter 4 ECOOMIC DISATCH AD UIT COMMITMET ITRODUCTIO A power system has several power plants. Each power plant has several generatng unts. At any pont of tme, the total load n the system s met by the

More information

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School Robust Desgn of Publc Storage Warehouses Yemng (Yale) Gong EMLYON Busness School Rene de Koster Rotterdam school of management, Erasmus Unversty Abstract We apply robust optmzaton and revenue management

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to [email protected] The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

Cloud Auto-Scaling with Deadline and Budget Constraints

Cloud Auto-Scaling with Deadline and Budget Constraints Prelmnary verson. Fnal verson appears In Proceedngs of 11th ACM/IEEE Internatonal Conference on Grd Computng (Grd 21). Oct 25-28, 21. Brussels, Belgum. Cloud Auto-Scalng wth Deadlne and Budget Constrants

More information

Multi-Resource Fair Allocation in Heterogeneous Cloud Computing Systems

Multi-Resource Fair Allocation in Heterogeneous Cloud Computing Systems 1 Mult-Resource Far Allocaton n Heterogeneous Cloud Computng Systems We Wang, Student Member, IEEE, Ben Lang, Senor Member, IEEE, Baochun L, Senor Member, IEEE Abstract We study the mult-resource allocaton

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

Availability-Based Path Selection and Network Vulnerability Assessment

Availability-Based Path Selection and Network Vulnerability Assessment Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

Outsourcing inventory management decisions in healthcare: Models and application

Outsourcing inventory management decisions in healthcare: Models and application European Journal of Operatonal Research 154 (24) 271 29 O.R. Applcatons Outsourcng nventory management decsons n healthcare: Models and applcaton www.elsever.com/locate/dsw Lawrence Ncholson a, Asoo J.

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal [email protected] Peter Möhl, PTV AG,

More information

Feasibility of Using Discriminate Pricing Schemes for Energy Trading in Smart Grid

Feasibility of Using Discriminate Pricing Schemes for Energy Trading in Smart Grid Feasblty of Usng Dscrmnate Prcng Schemes for Energy Tradng n Smart Grd Wayes Tushar, Chau Yuen, Bo Cha, Davd B. Smth, and H. Vncent Poor Sngapore Unversty of Technology and Desgn, Sngapore 138682. Emal:

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. XX, MONTH 2XX 1 Effcent On-Demand Data Servce Delvery to Hgh-Speed Trans n Cellular/Infostaton Integrated Networks Hao Lang, Student Member,

More information

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network On Fle Delay Mnmzaton for Content Uploadng to Meda Cloud va Collaboratve Wreless Network Ge Zhang and Yonggang Wen School of Computer Engneerng Nanyang Technologcal Unversty Sngapore Emal: {zh0001ge, ygwen}@ntu.edu.sg

More information

Cloud-based Social Application Deployment using Local Processing and Global Distribution

Cloud-based Social Application Deployment using Local Processing and Global Distribution Cloud-based Socal Applcaton Deployment usng Local Processng and Global Dstrbuton Zh Wang *, Baochun L, Lfeng Sun *, and Shqang Yang * * Bejng Key Laboratory of Networked Multmeda Department of Computer

More information

2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet

2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet 2008/8 An ntegrated model for warehouse and nventory plannng Géraldne Strack and Yves Pochet CORE Voe du Roman Pays 34 B-1348 Louvan-la-Neuve, Belgum. Tel (32 10) 47 43 04 Fax (32 10) 47 43 01 E-mal: [email protected]

More information

L10: Linear discriminants analysis

L10: Linear discriminants analysis L0: Lnear dscrmnants analyss Lnear dscrmnant analyss, two classes Lnear dscrmnant analyss, C classes LDA vs. PCA Lmtatons of LDA Varants of LDA Other dmensonalty reducton methods CSCE 666 Pattern Analyss

More information

) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance

) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance Calbraton Method Instances of the Cell class (one nstance for each FMS cell) contan ADC raw data and methods assocated wth each partcular FMS cell. The calbraton method ncludes event selecton (Class Cell

More information

A Lyapunov Optimization Approach to Repeated Stochastic Games

A Lyapunov Optimization Approach to Repeated Stochastic Games PROC. ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, OCT. 2013 1 A Lyapunov Optmzaton Approach to Repeated Stochastc Games Mchael J. Neely Unversty of Southern Calforna http://www-bcf.usc.edu/

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve

More information

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems Jont Schedulng of Processng and Shuffle Phases n MapReduce Systems Fangfe Chen, Mural Kodalam, T. V. Lakshman Department of Computer Scence and Engneerng, The Penn State Unversty Bell Laboratores, Alcatel-Lucent

More information

On the Interaction between Load Balancing and Speed Scaling

On the Interaction between Load Balancing and Speed Scaling On the Interacton between Load Balancng and Speed Scalng Ljun Chen, Na L and Steven H. Low Engneerng & Appled Scence Dvson, Calforna Insttute of Technology, USA Abstract Speed scalng has been wdely adopted

More information

Capacity Reservation for Time-Sensitive Service Providers: An Application in Seaport Management

Capacity Reservation for Time-Sensitive Service Providers: An Application in Seaport Management Capacty Reservaton for Tme-Senstve Servce Provders: An Applcaton n Seaport Management L. Jeff Hong Department of Industral Engneerng and Logstcs Management The Hong Kong Unversty of Scence and Technology

More information

QoS-Aware Active Queue Management for Multimedia Services over the Internet

QoS-Aware Active Queue Management for Multimedia Services over the Internet QoS-Aware Actve Queue Management for Multmeda Servces over the Internet I-Shyan Hwang, *Bor-Junn Hwang, Pen-Mng Chang, Cheng-Yu Wang Abstract Recently, the multmeda servces such as IPTV, vdeo conference

More information

Portfolio Loss Distribution

Portfolio Loss Distribution Portfolo Loss Dstrbuton Rsky assets n loan ortfolo hghly llqud assets hold-to-maturty n the bank s balance sheet Outstandngs The orton of the bank asset that has already been extended to borrowers. Commtment

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

Traffic-light a stress test for life insurance provisions

Traffic-light a stress test for life insurance provisions MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

Section C2: BJT Structure and Operational Modes

Section C2: BJT Structure and Operational Modes Secton 2: JT Structure and Operatonal Modes Recall that the semconductor dode s smply a pn juncton. Dependng on how the juncton s based, current may easly flow between the dode termnals (forward bas, v

More information

Intra-year Cash Flow Patterns: A Simple Solution for an Unnecessary Appraisal Error

Intra-year Cash Flow Patterns: A Simple Solution for an Unnecessary Appraisal Error Intra-year Cash Flow Patterns: A Smple Soluton for an Unnecessary Apprasal Error By C. Donald Wggns (Professor of Accountng and Fnance, the Unversty of North Florda), B. Perry Woodsde (Assocate Professor

More information

J. Parallel Distrib. Comput. Environment-conscious scheduling of HPC applications on distributed Cloud-oriented data centers

J. Parallel Distrib. Comput. Environment-conscious scheduling of HPC applications on distributed Cloud-oriented data centers J. Parallel Dstrb. Comput. 71 (2011) 732 749 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. ournal homepage: www.elsever.com/locate/pdc Envronment-conscous schedulng of HPC applcatons

More information

NPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6

NPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6 PAR TESTS If a WEIGHT varable s specfed, t s used to replcate a case as many tmes as ndcated by the weght value rounded to the nearest nteger. If the workspace requrements are exceeded and samplng has

More information

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services When Network Effect Meets Congeston Effect: Leveragng Socal Servces for Wreless Servces aowen Gong School of Electrcal, Computer and Energy Engeerng Arzona State Unversty Tempe, AZ 8587, USA xgong9@asuedu

More information

Cost Minimization using Renewable Cooling and Thermal Energy Storage in CDNs

Cost Minimization using Renewable Cooling and Thermal Energy Storage in CDNs Cost Mnmzaton usng Renewable Coolng and Thermal Energy Storage n CDNs Stephen Lee College of Informaton and Computer Scences UMass, Amherst [email protected] Rahul Urgaonkar IBM Research [email protected]

More information

A Self-Organized, Fault-Tolerant and Scalable Replication Scheme for Cloud Storage

A Self-Organized, Fault-Tolerant and Scalable Replication Scheme for Cloud Storage A Self-Organzed, Fault-Tolerant and Scalable Replcaton Scheme for Cloud Storage Ncolas Bonvn, Thanass G. Papaoannou and Karl Aberer School of Computer and Communcaton Scences École Polytechnque Fédérale

More information

Analysis of Premium Liabilities for Australian Lines of Business

Analysis of Premium Liabilities for Australian Lines of Business Summary of Analyss of Premum Labltes for Australan Lnes of Busness Emly Tao Honours Research Paper, The Unversty of Melbourne Emly Tao Acknowledgements I am grateful to the Australan Prudental Regulaton

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye [email protected] [email protected] [email protected] Abstract - Stock market s one of the most complcated systems

More information

An MILP model for planning of batch plants operating in a campaign-mode

An MILP model for planning of batch plants operating in a campaign-mode An MILP model for plannng of batch plants operatng n a campagn-mode Yanna Fumero Insttuto de Desarrollo y Dseño CONICET UTN [email protected] Gabrela Corsano Insttuto de Desarrollo y Dseño

More information

Logistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification

Logistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification Lecture 4: More classfers and classes C4B Machne Learnng Hlary 20 A. Zsserman Logstc regresson Loss functons revsted Adaboost Loss functons revsted Optmzaton Multple class classfcaton Logstc Regresson

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He [email protected] Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

Dominant Resource Fairness in Cloud Computing Systems with Heterogeneous Servers

Dominant Resource Fairness in Cloud Computing Systems with Heterogeneous Servers 1 Domnant Resource Farness n Cloud Computng Systems wth Heterogeneous Servers We Wang, Baochun L, Ben Lang Department of Electrcal and Computer Engneerng Unversty of Toronto arxv:138.83v1 [cs.dc] 1 Aug

More information

VoIP over Multiple IEEE 802.11 Wireless LANs

VoIP over Multiple IEEE 802.11 Wireless LANs SUBMITTED TO IEEE TRANSACTIONS ON MOBILE COMPUTING 1 VoIP over Multple IEEE 80.11 Wreless LANs An Chan, Graduate Student Member, IEEE, Soung Chang Lew, Senor Member, IEEE Abstract IEEE 80.11 WLAN has hgh

More information

The literature on many-server approximations provides significant simplifications toward the optimal capacity

The literature on many-server approximations provides significant simplifications toward the optimal capacity Publshed onlne ahead of prnt November 13, 2009 Copyrght: INFORMS holds copyrght to ths Artcles n Advance verson, whch s made avalable to nsttutonal subscrbers. The fle may not be posted on any other webste,

More information

Network Aware Load-Balancing via Parallel VM Migration for Data Centers

Network Aware Load-Balancing via Parallel VM Migration for Data Centers Network Aware Load-Balancng va Parallel VM Mgraton for Data Centers Kun-Tng Chen 2, Chen Chen 12, Po-Hsang Wang 2 1 Informaton Technology Servce Center, 2 Department of Computer Scence Natonal Chao Tung

More information

Heuristic Static Load-Balancing Algorithm Applied to CESM

Heuristic Static Load-Balancing Algorithm Applied to CESM Heurstc Statc Load-Balancng Algorthm Appled to CESM 1 Yur Alexeev, 1 Sher Mckelson, 1 Sven Leyffer, 1 Robert Jacob, 2 Anthony Crag 1 Argonne Natonal Laboratory, 9700 S. Cass Avenue, Argonne, IL 60439,

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

Staff Paper. Farm Savings Accounts: Examining Income Variability, Eligibility, and Benefits. Brent Gloy, Eddy LaDue, and Charles Cuykendall

Staff Paper. Farm Savings Accounts: Examining Income Variability, Eligibility, and Benefits. Brent Gloy, Eddy LaDue, and Charles Cuykendall SP 2005-02 August 2005 Staff Paper Department of Appled Economcs and Management Cornell Unversty, Ithaca, New York 14853-7801 USA Farm Savngs Accounts: Examnng Income Varablty, Elgblty, and Benefts Brent

More information