CS556 Course Project Performance Analysis of M-NET using GSPN
|
|
|
- Eugene Evans
- 9 years ago
- Views:
Transcription
1 Performance Analysis of M-NET using GSPN CS6 Course Project Jinchun Xia Jul 9 CS6 Course Project Performance Analysis of M-NET using GSPN Jinchun Xia. Introduction Performance is a crucial factor in software system. For many software development groups, it remains easier to wait until a system has been built before evaluating its performance. Among the three most used techniques, measurement, simulation and analytic modeling [7], measurement is believed to be the most accurate method. But it is only feasible after system is implemented. Most organizations rely solely on performance testing and regularly incur the cost of redesign when performance problems arise. Situation would become better if we can evaluate system performance before we physically build up that system. That s why simulation and analytic modeling become useful. Simulation tends to be expensive due to large computation time and can t prove properties. Many analytic performance models are proposed by different researchers, including Queueing Network model, Markov chain model, and Markov reward models, etc. As a mathematical and graphic tool, Petri Net can be used to describe a large variety of different systems [9]. It has been proven to be able to model system behaviors [6]. Based on that model, Petri Net provides approaches for the formal analysis, including performance analysis. Because of those benefits, applications of Petri Net range from informal systems to formal systems, from software systems to hardware systems, and from systems with concurrent processes to systems without any concurrency. Various extensions to Petri net models have been proposed. Among them, we chose Generalized Stochastic Petri Nets (GSPN) over other techniques because of their ability to randomize arrival and processing delays and of their capacity to model complex interactions. A good property of GSPNs is they are isomorphic to continuous time Markov chains (MCs) []. This makes it easier to apply performance analysis based on GSPNs.. Work in this paper M-Net is a web based meeting net, which enables people in remote areas to hold virtual meetings through the internet [, 8]. This system has been developed by Professor Carl K. Chang s students. We intend to build up an analytic model for M-Net and analyze its performance. This paper is organized as follows: section gives a brief overview to GSPN, section introduces M-NET which will be modeled in this paper. In section, GSPN models for M-NET are described. Section /9
2 Performance Analysis of M-NET using GSPN CS6 Course Project Jinchun Xia Jul 9 applies some performance analysis based on those GSPN models. Section 6 evaluates and concludes this paper.. Generalized Stochastic Petri Net (GSPN). Introduction to GSPN Murata [] described Petri Nets (PN s) as a promising tool for describing and studying information processing systems that are characterized as being concurrent, asynchronous, distributed, parallel, nondeterministic, and/or stochastic. PN can be formally defined as [Peterson] : PN = (P, T, A, M) () where P, T, A, M are the sets of place, transition, arc, and marking. One of the important developments in the theory of PN s is the introduction of enhancements that make PN s more useful in performance evaluation studies. One such enhancement is the Stochastic Petri Net (SPN) which associates a random firing time to each transition. The reachability graph of an SPN can be turned into a continuous-time Markov chain (CTMC) by assigning to each edge a weight equal to the firing rate of the associated SPN transition. A SPN is defined formally as a tuple: SPN = (P, T. A, M, R) [] () where P, T, A, M are as in (), and R = {r, r,, r m } is the set of firing rates associated with the PN transitions. GSPN s [0] are timed Petri nets in which the transitions are classified into two groups: immediate and timed transitions. Immediate transitions have higher priority than timed transitions, fire in zero time and are labeled with a marking-dependent firing probability. Associated with timed transitions there are random, exponentially distributed firing times. A marking in which immediate transitions are enabled is known as a vanishing marking, while a marking in which only timed transitions are enabled is known as a tangible marking. Vanishing states have sojourn times which are zero, while tangible states have nonzero exponentially distributed sojourn times.. Performance analysis based on GSPN Smith defined performance [] as the degree to which a system or component accomplishes its designated functions within given constraints, such as speed, accuracy, or memory usage. What makes GSPN useful to performance analysis is that GSPN is isomorphic to Markov Chain. CTMC is one of the most useful tools for numerical analysis, but it s difficult to directly get CTMC for a big system. Compared to CTMC, GSPN model is more straightforward to build. So it s a normal way to build GSPN model first, then recognize its embedded CTMC. After that, we can analyze system performance based on numerical results gained from CTMC. Based on steady-state and /9
3 Performance Analysis of M-NET using GSPN CS6 Course Project Jinchun Xia Jul 9 transient-state distribution probability derived from CTMC, most performance analysis can be handled.. Introduction to M-NET. Overview of M-NET M-Net is a web based meeting net, which enables people in remote areas to hold virtual meetings through the internet. M-Net System was built on a communication platform which manages communication among different users. It also includes various applications to support collaborative meetings. These applications include chat, which supports test based discussions; slideshow, which displays slides; IxiFtp, which allows file operations and browser operations; layered whiteboard, which supports the exchange of the visual pictures drawn in the browser. M-Net also includes features like secure control, user registration, and so on. In the M-Net System, everybody can apply to be a member, and can then launch a meeting and invite other members to attend. In a meeting, all attendee can share ideas through M-Net applications, and those ideas are broadcasted to all the other meeting members.. M-NET system architecture M-Net can be considered as a three-tier client/server system. The three tiers are client, server, and database. M-Net client is actually a Java let that is downloaded from a Server, and run in any browser. It communicates directly with servers through socket connections. M-Net mainly includes interfaces that need to communicate with servers and applications. Figure shows how M-Net communicates [] : /9
4 Performance Analysis of M-NET using GSPN CS6 Course Project Jinchun Xia Jul 9 Side Server Side M-Net Server (Java lication) M-Net Server (Java lication) M-Net Server (Java lication) Central Central Server (Java application) Central Central Database Server (Java application) JDBC Central MS- Access Figure : Top level system architecture of M-Net. Modeling M-NET by scenarios Due to its client/server structure and its complex applications, it s very difficult and tedious to describe the whole M-NET system by GSPN. Also because M-NET is a real-time system with random user requests, it s very difficult to analyze performance for the whole system. In this case, performance analysis based on scenarios is alternative and can still be very useful. System behaviors can be divided into different scenarios. So it s possible to get whole system performance evaluation by systematic scenario performance analysis. This paper will use one scenario: Floor control as example to illustrate this procedure. Its state diagram and GSPN are depicted as below.. Floor Control In M-Net, applications Chat and WhiteBoard have Floor Control. For example, in a Chat room, only FloorHolder can speak. Users can ask for floor at any time, and the chairman will either grant him the floor or deny his request. Figure is a state diagram that models the behavior of meeting members requesting the floor to gain access to the whiteboard. In this example there are three states representing FloorHeld, FloorRequested, and FloorNeitherHeldNor- /9
5 Performance Analysis of M-NET using GSPN CS6 Course Project Jinchun Xia Jul 9 Requested. Transitions are represented as probability variables, which enables close integration with Petri Net modeling and Markov modeling. A delay is introduced into the FloorHeld state so that once a person enters the state they will remain in that state for a time period equal to TimeToWrite, unless the floor is prematurely removed by the chair. These transitions are all represented as variables that can be used to support numerical performance analysis. Figure : Floor Control represented as a State transition diagram Figure is a Petri Net that models the behavior of meeting members requesting the floor to gain access to the whiteboard. We assume that there re one chairman and five members in this meeting. In order to gain a Markovian model of this scenario, the following assumptions are made: Members request floor at exponentially distributed random rate with average ; Members cancel their requests at exponentially distributed random rate with average ; The request may not immediately served, either because the floor is held by another member, or because the chairman denies this request; Floor can be prematurely removed from a floor-holder by the chairman. Floor-holder writes to whiteboard for an exponentially distributed random rate with average before releasing the floor. /9
6 Performance Analysis of M-NET using GSPN CS6 Course Project Jinchun Xia Jul 9 t P P P P m t t t t P Figure : Floor Control represented as a GSPN Table : Legend for the GSPN in Figure P : Active member P : Member waiting for floor P : Chairman P : Floor free P : Member holds floor T : Member requests floor T : Member cancel floor request T : Chairman assign floor to member T : Chairman removes floor from member T : Member releases floor. Performance analysis based on GSPN models Response time is one of the most important performances, especially for network based applications. In this paper, only response time analysis is proposed.. Derive CTMC Based on the Petri Net in Figure, we can draw reachability graph as Figure : t t t t t t t t t t /t t t /t t t /t t t t /t t /t t t Figure : Reachability graph for GSPN in Figure 6/9
7 Performance Analysis of M-NET using GSPN CS6 Course Project Jinchun Xia Jul 9 It has been proved that there is a one-to-one correspondence between the reachability graph and the continuous-time Markov Chain (CTMC) []. Figure shows the CTMC corresponding to the GSPN of Figure. M : 00 M :0 M :0 M :0 M :0 M 6 : M 7 :00 M 8 :0 M 9 :0 M 0 :0 M :00 Figure : Continuous time Markov Chain for the GSPN in Figure Without loss of generality, we assume =, =, =, =, =. For this CTMC, we generate matrix: Q = Solve this CTMC, we can get π = [0.66, 0.86, 0.0, 0.0, 0.00, 0.00, 0.06, 0.078, 0.00, 0.00, 0.000]. Response time analysis Let n denote the average number of tokens in a place, λ denote the average arrival rate of tokens, and w denote the average wait of a token in a place. So we can derive n = λw () Our goal is to gain the mean response time t f that elapses from a floor request is generated until the floor is assigned to that member. If we can get the average number of token (by steady state) in a place, which is the n in (), we can easily compute w, which is the mean wait time of a token in that place. As for our goal, the response time t f is the time of waiting for floor. From Figure, we can see that is the waiting time in place. So we gain: t f = w. () Then n = 0* * *0.0 + *0.0 + * * * * * * * /9
8 Performance Analysis of M-NET using GSPN CS6 Course Project Jinchun Xia Jul 9 = 0.9 λ = = w = t f = Hereby we know that the mean response time from a member request the floor till the member release that floor is s.. Evaluate performance against original requirements After we calculate those numerical results, the next step is to evaluate those performances against the original requirements. According to the related requirement item Each floor request should be responded within second, obviously this requirement is satisfied. 6. Evaluation, Conclusion and Future work The example in this paper is a very simple one since only one scenario and only response time are considered. Values used in this example are fictitious. But from the numerical result, we can see that early performance evaluation is feasible. Actually GSPN can be very useful for most performance evaluation, like throughput, server load, CPU utilization, etc. All those work can be future work. Real-time Server- structure is difficult to model by even high-level Petri Net, but we can capture system behaviors by different scenarios, and analyze different system performances upon those scenarios. In doing this work, a major factor should be considered: those scenarios can completely capture system behaviors. References: [] Jian Zhang, M-Net Server Enhancement and NT Service, Master s Project Report, Apr. 00 [] Marco Ajmone, et al., A Class of Generalized Stochastic Petri Nets for the Performance Evaluation of Multiprocessor Systems, ACM Trans. Computer Systems, Vol., No., May 98, pp. 9- [] Kurt Jensen, An Introduction to the Theoretical Aspects of Coloured Petri Nets, de Bakker, J.W.; de Roever, W.-P.; Rozenberg, G.: Lecture Notes in Computer Science, vol. 80; A Decade of Concurrency, Springer-Verlag, Jun. 99, pp [] Murata, T. "Petri Nets: Properties, Analysis and lications", Proc. IEEE, Apr. 989, pp. -79 [] J.L. Peterson, Petri Net Theory and the Modeling of Systems, Prentice Hall PTR, 8/9
9 Performance Analysis of M-NET using GSPN CS6 Course Project Jinchun Xia Jul 9 Upper Saddle River, NJ, 98 [6] Kurt Jensen, An Introduction to the Theoretical Aspects of Coloured Petri Nets, de Bakker, J.W.; de Roever, W.-P.; Rozenberg, G.: Lecture Notes in Computer Science, vol. 80; A Decade of Concurrency, Springer-Verlag, Jun. 99, pp [7] O.C. Ibe, et al., Performance Evaluation of -Server Systems, IEEE Trans. Parallel & Distributed System, vol., no., Nov. 99, pp [8] Rong Qian, Meeting Net Real.0 Server Design and Implementation, Master Project Report. Int l Center for Software Eng., Computer Science Dept., Univ. of Illinois at Chicago, April 999. [9] J.L. Peterson, Petri nets. ACM Comput. Surv. 9, (Sept. 977), -. [0] M. A. Marsan, G. Balbo, and G. Conte, Performance Models of Multiprocessor Systems. Cambridge, MA: MIT Press, 986. [] C.M. Woodside and C. U. Smith, "Performance Validation at Early Stages of Development", Position paper, Performance 99, Istanbul, Turkey, October 99 9/9
Programma della seconda parte del corso
Programma della seconda parte del corso Introduction Reliability Performance Risk Software Performance Engineering Layered Queueing Models Stochastic Petri Nets New trends in software modeling: Metamodeling,
Keywords Backup and restore strategies, online backup, metrics, modelling methods, hourly backup.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance and
A Markovian Sensibility Analysis for Parallel Processing Scheduling on GNU/Linux
A Markovian Sensibility Analysis for Parallel Processing Scheduling on GNU/Linux Regiane Y. Kawasaki 1, Luiz Affonso Guedes 2, Diego L. Cardoso 1, Carlos R. L. Francês 1, Glaucio H. S. Carvalho 1, Solon
Test Coverage Criteria for Autonomous Mobile Systems based on Coloured Petri Nets
9th Symposium on Formal Methods for Automation and Safety in Railway and Automotive Systems Institut für Verkehrssicherheit und Automatisierungstechnik, TU Braunschweig, 2012 FORMS/FORMAT 2012 (http://www.forms-format.de)
Real-Time Billing Throughput Analysis of Wireless Telecommunication Systems
Real-Time Billing Throughput Analysis of Wireless Telecommunication Systems Jiacun Wang, Senior Member, IEEE Abstract Real-time billing is one of the most important functionalities in a telecommunication
Process Modelling from Insurance Event Log
Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R
Response time behavior of distributed voting algorithms for managing replicated data
Information Processing Letters 75 (2000) 247 253 Response time behavior of distributed voting algorithms for managing replicated data Ing-Ray Chen a,, Ding-Chau Wang b, Chih-Ping Chu b a Department of
ISSN 2319-8885 Vol.04,Issue.25, July-2015, Pages:4879-4883. www.ijsetr.com
ISSN 2319-8885 Vol.04,Issue.25, July-2015, Pages:4879-4883 www.ijsetr.com A Review of Disaster Recovery Techniques and Online Data Back-Up in Cloud Computing YOGESHWAR. CH 1, SATEESH NAGAVARAPU 2 1 PG
Modeling and Performance Evaluation of Internet of Things based on Petri Nets and Behavior Expression
Research Journal of Applied Sciences, Engineering and echnology (18): 3381-3385, 212 ISSN: 2-767 Maxwell Scientific Organization, 212 Submitted: March 26, 212 Accepted: April 17, 212 Published: September
Computer Science. General Education Students must complete the requirements shown in the General Education Requirements section of this catalog.
Computer Science Dr. Ilhyun Lee Professor Dr. Ilhyun Lee is a Professor of Computer Science. He received his Ph.D. degree from Illinois Institute of Technology, Chicago, Illinois (1996). He was selected
Introduction to Finite Automata
Introduction to Finite Automata Our First Machine Model Captain Pedro Ortiz Department of Computer Science United States Naval Academy SI-340 Theory of Computing Fall 2012 Captain Pedro Ortiz (US Naval
How To Understand The Difference Between Business Process And Process Model In Java.Java.Org (Programming)
Business Process Modeling and Workflow Automation Ivo Vondrak * [email protected] Abstract: Process modeling and workflow applications have become more an more important during last decade. The main reason
Modeling and Simulation Firewall Using Colored Petri Net
World Applied Sciences Journal 15 (6): 826-830, 2011 ISSN 1818-4952 IDOSI Publications, 2011 Modeling and Simulation Firewall Using Colored Petri Net 1 2 Behnam Barzegar and Homayun Motameni 1 Department
A Model-driven Approach to Predictive Non Functional Analysis of Component-based Systems
A Model-driven Approach to Predictive Non Functional Analysis of Component-based Systems Vincenzo Grassi Università di Roma Tor Vergata, Italy Raffaela Mirandola {vgrassi, mirandola}@info.uniroma2.it Abstract.
Voice Service Support over Cognitive Radio Networks
Voice Service Support over Cognitive Radio Networks Ping Wang, Dusit Niyato, and Hai Jiang Centre For Multimedia And Network Technology (CeMNeT), School of Computer Engineering, Nanyang Technological University,
Chapter 3. Internet Applications and Network Programming
Chapter 3 Internet Applications and Network Programming 1 Introduction The Internet offers users a rich diversity of services none of the services is part of the underlying communication infrastructure
Software Performance and Scalability
Software Performance and Scalability A Quantitative Approach Henry H. Liu ^ IEEE )computer society WILEY A JOHN WILEY & SONS, INC., PUBLICATION Contents PREFACE ACKNOWLEDGMENTS xv xxi Introduction 1 Performance
Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure
Survey on Models to Investigate Data Center Performance and QoS in Cloud Computing Infrastructure Chandrakala Department of Computer Science and Engineering Srinivas School of Engineering, Mukka Mangalore,
OPTIMIZED PERFORMANCE EVALUATIONS OF CLOUD COMPUTING SERVERS
OPTIMIZED PERFORMANCE EVALUATIONS OF CLOUD COMPUTING SERVERS K. Sarathkumar Computer Science Department, Saveetha School of Engineering Saveetha University, Chennai Abstract: The Cloud computing is one
DiPro - A Tool for Probabilistic Counterexample Generation
DiPro - A Tool for Probabilistic Counterexample Generation Husain Aljazzar, Florian Leitner-Fischer, Stefan Leue, and Dimitar Simeonov University of Konstanz, Germany Abstract. The computation of counterexamples
A novel load balancing algorithm for computational grid
International Journal of Computational Intelligence Techniques, ISSN: 0976 0466 & E-ISSN: 0976 0474 Volume 1, Issue 1, 2010, PP-20-26 A novel load balancing algorithm for computational grid Saravanakumar
Traffic Control by Influencing User Behavior
Traffic Control by Influencing User Behavior We examined a means of influencing user behavior to reduce the number of repeated calls by providing information to users and controlling the traffic before
Performance Modeling and Analysis of a Database Server with Write-Heavy Workload
Performance Modeling and Analysis of a Database Server with Write-Heavy Workload Manfred Dellkrantz, Maria Kihl 2, and Anders Robertsson Department of Automatic Control, Lund University 2 Department of
Web Server Software Architectures
Web Server Software Architectures Author: Daniel A. Menascé Presenter: Noshaba Bakht Web Site performance and scalability 1.workload characteristics. 2.security mechanisms. 3. Web cluster architectures.
TIME DEPENDENT PRIORITIES IN CALL CENTERS
TIME DEPENDENT PRIORITIES IN CALL CENTERS LASSAAD ESSAFI and GUNTER BOLCH Institute of Computer Science University of Erlangen-Nuremberg Martensstrasse 3, D-91058 Erlangen, Germany E-mail : [email protected],
Information Systems. Administered by the Department of Mathematical and Computing Sciences within the College of Arts and Sciences.
Information Systems Dr. Haesun Lee Professor Dr. Haesun Lee is a Professor of Computer Science. She received her Ph.D. degree from Illinois Institute of Technology, Chicago, Illinois (1997). Her primary
Logical Data Models for Cloud Computing Architectures
Logical Data Models for Cloud Computing Architectures Augustine (Gus) Samba, Kent State University Describing generic logical data models for two existing cloud computing architectures, the author helps
A QUEUEING-INVENTORY SYSTEM WITH DEFECTIVE ITEMS AND POISSON DEMAND. [email protected]
A QUEUEING-INVENTORY SYSTEM WITH DEFECTIVE ITEMS AND POISSON DEMAND Rasoul Hai 1, Babak Hai 1 Industrial Engineering Department, Sharif University of Technology, +98-1-66165708, [email protected] Industrial
Load Balancing and Switch Scheduling
EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: [email protected] Abstract Load
Modeling Agile Manufacturing Cell using Object-Oriented Timed Petri net
Modeling Agile Manufacturing Cell using Object-Oriented Timed Petri net Peigen Li, Ke Shi, Jie Zhang Intelligent Manufacturing Lab School of Mechanical Science and Engineering Huazhong University of Science
Layered Dependability Modeling of an Air Traffic Control System
Layered Dependability Modeling of an Air Traffic Control System Olivia Das, C. Murray Woodside Dept. of Systems and Computer Engineering, Carleton University, Ottawa, Canada email: [email protected],
PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM
PERFORMANCE ANALYSIS OF PaaS CLOUD COMPUTING SYSTEM Akmal Basha 1 Krishna Sagar 2 1 PG Student,Department of Computer Science and Engineering, Madanapalle Institute of Technology & Science, India. 2 Associate
M/M/1 and M/M/m Queueing Systems
M/M/ and M/M/m Queueing Systems M. Veeraraghavan; March 20, 2004. Preliminaries. Kendall s notation: G/G/n/k queue G: General - can be any distribution. First letter: Arrival process; M: memoryless - exponential
Possibilities and limitations of formal methods for business process analysis and design
Possibilities and limitations of formal methods for business process analysis and design Joseph Barjis PhD, Associate Professor Department of Systems Engineering Faculty of Technology, Policy and Management
Performance Modeling for Web based J2EE and.net Applications
Performance Modeling for Web based J2EE and.net Applications Shankar Kambhampaty, and Venkata Srinivas Modali Abstract When architecting an application, key nonfunctional requirements such as performance,
GOAL-BASED INTELLIGENT AGENTS
International Journal of Information Technology, Vol. 9 No. 1 GOAL-BASED INTELLIGENT AGENTS Zhiqi Shen, Robert Gay and Xuehong Tao ICIS, School of EEE, Nanyang Technological University, Singapore 639798
Workflow Automation and Management Services in Web 2.0: An Object-Based Approach to Distributed Workflow Enactment
Workflow Automation and Management Services in Web 2.0: An Object-Based Approach to Distributed Workflow Enactment Peter Y. Wu [email protected] Department of Computer & Information Systems Robert Morris University
Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications
Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Rouven Kreb 1 and Manuel Loesch 2 1 SAP AG, Walldorf, Germany 2 FZI Research Center for Information
A Scheme for Implementing Load Balancing of Web Server
Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public
PETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS. G. Mušič and D. Matko
PETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS G. Mušič and D. Matko Faculty of Electrical Engineering, University of Ljubljana, Slovenia. E-mail: [email protected] Abstract: The
There are a number of factors that increase the risk of performance problems in complex computer and software systems, such as e-commerce systems.
ASSURING PERFORMANCE IN E-COMMERCE SYSTEMS Dr. John Murphy Abstract Performance Assurance is a methodology that, when applied during the design and development cycle, will greatly increase the chances
Load Testing on Web Application using Automated Testing Tool: Load Complete
Load Testing on Web Application using Automated Testing Tool: Load Complete Neha Thakur, Dr. K.L. Bansal Research Scholar, Department of Computer Science, Himachal Pradesh University, Shimla, India Professor,
Analysis of a Production/Inventory System with Multiple Retailers
Analysis of a Production/Inventory System with Multiple Retailers Ann M. Noblesse 1, Robert N. Boute 1,2, Marc R. Lambrecht 1, Benny Van Houdt 3 1 Research Center for Operations Management, University
RESEARCH PAPER International Journal of Recent Trends in Engineering, Vol 1, No. 1, May 2009
An Algorithm for Dynamic Load Balancing in Distributed Systems with Multiple Supporting Nodes by Exploiting the Interrupt Service Parveen Jain 1, Daya Gupta 2 1,2 Delhi College of Engineering, New Delhi,
Scheduling Algorithms for Downlink Services in Wireless Networks: A Markov Decision Process Approach
Scheduling Algorithms for Downlink Services in Wireless Networks: A Markov Decision Process Approach William A. Massey ORFE Department Engineering Quadrangle, Princeton University Princeton, NJ 08544 K.
A STUDY OF WORKLOAD CHARACTERIZATION IN WEB BENCHMARKING TOOLS FOR WEB SERVER CLUSTERS
382 A STUDY OF WORKLOAD CHARACTERIZATION IN WEB BENCHMARKING TOOLS FOR WEB SERVER CLUSTERS Syed Mutahar Aaqib 1, Lalitsen Sharma 2 1 Research Scholar, 2 Associate Professor University of Jammu, India Abstract:
Excerpts from Chapter 4, Architectural Modeling -- UML for Mere Mortals by Eric J. Naiburg and Robert A. Maksimchuk
Excerpts from Chapter 4, Architectural Modeling -- UML for Mere Mortals by Eric J. Naiburg and Robert A. Maksimchuk Physical Architecture As stated earlier, architecture can be defined at both a logical
Parallel Data Selection Based on Neurodynamic Optimization in the Era of Big Data
Parallel Data Selection Based on Neurodynamic Optimization in the Era of Big Data Jun Wang Department of Mechanical and Automation Engineering The Chinese University of Hong Kong Shatin, New Territories,
Periodic Capacity Management under a Lead Time Performance Constraint
Periodic Capacity Management under a Lead Time Performance Constraint N.C. Buyukkaramikli 1,2 J.W.M. Bertrand 1 H.P.G. van Ooijen 1 1- TU/e IE&IS 2- EURANDOM INTRODUCTION Using Lead time to attract customers
Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services
Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services Ms. M. Subha #1, Mr. K. Saravanan *2 # Student, * Assistant Professor Department of Computer Science and Engineering Regional
A Comparative Performance Analysis of Load Balancing Algorithms in Distributed System using Qualitative Parameters
A Comparative Performance Analysis of Load Balancing Algorithms in Distributed System using Qualitative Parameters Abhijit A. Rajguru, S.S. Apte Abstract - A distributed system can be viewed as a collection
Automatic Stress and Load Testing for Embedded Systems
Automatic Stress and Load Testing for Embedded Systems Mohamad S. Bayan João W. Cangussu Department of Computer Science University of Texas at Dallas msb021000,cangussu @utdallas.edu Abstract Load and
CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING
Journal homepage: http://www.journalijar.com INTERNATIONAL JOURNAL OF ADVANCED RESEARCH RESEARCH ARTICLE CURTAIL THE EXPENDITURE OF BIG DATA PROCESSING USING MIXED INTEGER NON-LINEAR PROGRAMMING R.Kohila
CHAPTER 7 STOCHASTIC ANALYSIS OF MANPOWER LEVELS AFFECTING BUSINESS 7.1 Introduction
CHAPTER 7 STOCHASTIC ANALYSIS OF MANPOWER LEVELS AFFECTING BUSINESS 7.1 Introduction Consider in this chapter a business organization under fluctuating conditions of availability of manpower and business
PIPE The Great Re-Plumbing
Imperial College London Department of Computing PIPE The Great Re-Plumbing Author: Sarah Tattersall Supervisor: Dr. William Knottenbelt June 2014 Submitted in part fulfilment of the requirements for the
An Implementation of Software Project Scheduling and Planning using ACO & EBS
An Implementation of Software Project Scheduling and Planning using ACO & EBS 1 Prof. DadaramJadhav, 2 Akshada Paygude, 3 Aishwarya Bhosale, 4 Rahul Bhosale SavitribaiPhule Pune University, Dept. Of Computer
International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 36 An Efficient Approach for Load Balancing in Cloud Environment Balasundaram Ananthakrishnan Abstract Cloud computing
Component visualization methods for large legacy software in C/C++
Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University [email protected]
Resource Allocation Schemes for Gang Scheduling
Resource Allocation Schemes for Gang Scheduling B. B. Zhou School of Computing and Mathematics Deakin University Geelong, VIC 327, Australia D. Walsh R. P. Brent Department of Computer Science Australian
AN EFFICIENT DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
Telephone Traffic Queues in a Customer Call Center. A Thesis. Presented for the. Master of Science Degree. The University of Tennessee at Chattanooga
Telephone Traffic Queues in a Customer Call Center A Thesis Presented for the Master of Science Degree The University of Tennessee at Chattanooga Patrick Todd April 2009 Copyright 2009 by Patrick Todd
Radar Image Processing with Clusters of Computers
Radar Image Processing with Clusters of Computers Alois Goller Chalmers University Franz Leberl Institute for Computer Graphics and Vision ABSTRACT Some radar image processing algorithms such as shape-from-shading
A Comparison of General Approaches to Multiprocessor Scheduling
A Comparison of General Approaches to Multiprocessor Scheduling Jing-Chiou Liou AT&T Laboratories Middletown, NJ 0778, USA [email protected] Michael A. Palis Department of Computer Science Rutgers University
Load Balancing Algorithm Based on Services
Journal of Information & Computational Science 10:11 (2013) 3305 3312 July 20, 2013 Available at http://www.joics.com Load Balancing Algorithm Based on Services Yufang Zhang a, Qinlei Wei a,, Ying Zhao
How To Model A System
Web Applications Engineering: Performance Analysis: Operational Laws Service Oriented Computing Group, CSE, UNSW Week 11 Material in these Lecture Notes is derived from: Performance by Design: Computer
A Network Flow Approach in Cloud Computing
1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges
Module 1: Introduction to Computer System and Network Validation
Module 1: Introduction to Computer System and Network Validation Module 1, Slide 1 What is Validation? Definition: Valid (Webster s Third New International Dictionary) Able to effect or accomplish what
Performance Comparison of Database Access over the Internet - Java Servlets vs CGI. T. Andrew Yang Ralph F. Grove
Performance Comparison of Database Access over the Internet - Java Servlets vs CGI Corresponding Author: T. Andrew Yang T. Andrew Yang Ralph F. Grove [email protected] [email protected] Indiana University
Chapter 14 Managing Operational Risks with Bayesian Networks
Chapter 14 Managing Operational Risks with Bayesian Networks Carol Alexander This chapter introduces Bayesian belief and decision networks as quantitative management tools for operational risks. Bayesian
Moodle Integrated Synchronous Teaching/Conferencing: A Free Open-Source Synchronous Capability for Moodle
Moodle Integrated Synchronous Teaching/Conferencing: A Free Open-Source Synchronous Capability for Moodle Nicholas Clark, M.S. Research Associate, C4I Center J. Mark Pullen, D.Sc Professor of Computer
Aerospace Software Engineering
16.35 Aerospace Software Engineering Software Architecture The 4+1 view Patterns Prof. Kristina Lundqvist Dept. of Aero/Astro, MIT Why Care About Software Architecture? An architecture provides a vehicle
Introduction to Modelling Embedded Systems with Alvis
AUTOMATYKA 2011 Tom 15 Zeszyt 2 Marcin Szpyrka*, Piotr Matyasik*, Rafa³ Mrówka*, Wojciech Witalec*, Jaros³aw Baniewicz**, Leszek Kotulski* Introduction to Modelling Embedded Systems with Alvis 1. Introduction
IFS-8000 V2.0 INFORMATION FUSION SYSTEM
IFS-8000 V2.0 INFORMATION FUSION SYSTEM IFS-8000 V2.0 Overview IFS-8000 v2.0 is a flexible, scalable and modular IT system to support the processes of aggregation of information from intercepts to intelligence
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
Load Testing and Monitoring Web Applications in a Windows Environment
OpenDemand Systems, Inc. Load Testing and Monitoring Web Applications in a Windows Environment Introduction An often overlooked step in the development and deployment of Web applications on the Windows
UML Modeling of Network Topologies for Distributed Computer System
Journal of Computing and Information Technology - CIT 17, 2009, 4, 327 334 doi:10.2498/cit.1001319 327 UML Modeling of Network Topologies for Distributed Computer System Vipin Saxena and Deepak Arora Department
