Markov Chains and Queueing Networks

Size: px
Start display at page:

Download "Markov Chains and Queueing Networks"

Transcription

1 CS 797 Independent Study Report on Markov Chains and Queueing Networks By: Vibhu Saujanya Sharma (Roll No. Y211165, CSE, IIT Kanpur) Under the supervision of: Prof. S. K. Iyer (Dept. Of Mathematics, IIT Kanpur)

2 Abstract Quantitative analysis of computer systems has become very important as they are being used to handle various mission critical and performance intensive applications. In this independent study I studied methods to model computer systems for analyzing them for reliability, availability, and performance metrics. The techniques that were covered include modeling using Discrete Time Markov Chains (DTMC), Continuous Time Markov Chains (CTMC) and Queueing Networks. Each of the topics, which were studied, are very extensive and have many books devoted solely to each one of them. Thus, in this report I present a summary of the important definitions, assumptions, and results pertaining to each one of these as well as provide some handle on using them practically. 1. Introduction Modeling of computer systems has become very necessary with quantitative analysis gaining importance these days. Almost in every related field the emphasis is now on concrete numbers rather than intuitive arguments in support of the system being built or sold. Ascertaining a number of desirable properties of computer systems such as reliability, availability, and performance metrics such as throughput, response times, etc. mandate the need for accurately modeling these systems. Queueing networks and Markov chains offer fairly simple yet effective and practical modeling solutions to such problems. The aim of this independent study was to study these topics in detail and also learn about their practical applications. The text Probability and Statistics with Reliability, Queuing, and Computer Science Applications by Dr. Kishor S. Trivedi [1] was used as the guiding reference for this study along with some reading from [2] and [3]. Discrete Time Markov Chains, Continuous Time Markov Chains, Stochastic Petri Nets, and Network of Queues, were studied as a part of this course along with some other paradigms and basics required for stochastic modeling. I also solved many problems given in the text as a part of this course. This report contains a gist of some of the important and basic topics, which were studied. I have tried to present the important results and techniques along with some intuition behind them. I have also included some examples showing the use of the techniques. The reader is suggested to refer to [1], for detailed derivations as well as other examples. 2 Discrete Time Markov Chains 2.1 Introduction A Markov Chain is a stochastic process whose state space I is discrete (finite or countably infinite) and the probability distributions for its future development depend only on the present state and not on the path (consisting of past states), that was followed to reach this state. If we further assume that the parameter space T is also discrete, then we have a discrete time Markov chain or a DTMC. We can state the Markov property as where X i s are random variables at time step i = {0,1,2 } and if X n =j, then the state of the system at time step n is j, X 0 being the initial state of the system. The transition probability of the Markov Chain is given by and if its value depends only on the difference n-m, i.e. the number of steps, then such chains are called homogenous Markov Chains. In such cases denotes the n-step transition probabilities if the Markov chain. The zero step transition probabilities are given by

3 The one step transition probabilities of a DTMC could be specified in the form of a transition probability matrix: This is a stochastic matrix as it is a square matrix with non-negative entries and the row sums equal to unity. An example of a discrete time Markov chain is: The n-step transition probabilities can be computed one form of the Chapman-Kolmogrov equation: Let P(n) be the n-step transition probability matrix, then we can write the above equation as: Hence, the one step transition probability matrix could be multiplied (n-1) times to itself to get the n-step transition probability matrix. Also using the theorem of total probability we have: Hence, the step-dependent probability vector of, denoting pmf of X n at time n could be expressed as 2.2 State Classification & Limiting Probabilities A state I is said to be transient (or nonrecurrent) iff there is a positive probability that the process will not return to this state. A state I is said to be recurrent iff, starting from state i, the process returns to state i eventually with probability 1. If a state I is recurrent, then it is said to be positive recurrent (recurrent nonnull) if starting in the expected time until the process returns to state i (mean recurrence time) is finite, otherwise it is said to be recurrent null. For a recurrent state i, the period d i is defined as the GCD of the set of positive integers such that p ii (n)>0. A state is said to be aperiodic if its period is 1, else is called periodic if it is greater than 1. A state is said to be absorbing iff p ii =1 If the Markov chain is irreducible, periodic, and recurrent nonnull, the following limit exists and is independent of initial probability: As Hence if In matrix form it is represented as Where v is the limiting probability vector

4 2.3 Discrete Time Birth Death Process If we consider a special case of the DTMCs with one-step transitions only to neighboring states, then we can visualize it as below: Where b i and d i represent the probabilities of birth and death respectively in state i, and are defined as: If the steady state probability vector exists, we use v=vp and get also as and we get the steady state probabilities as: where 2.4 Finite DTMCs with absorbing states Consider a Finite Discrete Time Markov Chain (DTMC), with the transition probability matrix as P. Let s 1 to s n-1 be the transient states. The transition probability from the n th state of this DTMC is zero to all other states and 1 to itself, and it is an absorbing state in the DTMC. Hence in the transition probability matrix the last row would contain all zeros except the last entry to be one. So we could represent this matrix as Q C P = 0 1 Now Q here is a (n-1) by (n-1) sub-stochastic matrix (with at least one row sum <1) describing the probabilities of transition only between transient states. Now the k step transition probability matrix will be given by P k as k k Q C' P = 0 1 The (i,j) th entry in Q k denotes the probability of arriving in state s j after exactly k steps, starting from t state s i. It could be shown that k k = Q converges as t approaches infinity. Hence the inverse matrix (I- 0 Q) -1 exists. This is called as the fundamental matrix M.

5 M = ( I Q) 1 = I + Q + Q = It can be proved that the expected number of visits to a state s j with the system starting from state s i before entering the absorbing state s n is given by the (i,j) th entry in the fundamental matrix M. If X ij is a random variable denoting the number of times a state s j is visited starting from s i, before entering the absorbing state, then k = 0 Q k The visit count to a particular state is very helpful for calculating other quantities such as the average time spent in the system, the overall reliability of the system, etc. by attaching suitable rewards with the states. Consider a software architecture, wherein a number of components participate in functioning of the whole system. Let us consider the number of components to be 5. Also define the architecture of the system using a DTMC as below with the associated transition probability matrix. We assume that each state s i represents that the flow of control has reached component i. The absorbing state s 5 represents that the computation has now ended, pertaining to the output being produced as the control flow finally reaches component 5. Now applying the technique as above, we can find out the average visits made to a component j starting from component 1, by using the (1,j) th element of the fundamental matrix M. If we know the average execution times of each of the components given by t 1,t 2,..,t 5, then we can find the total execution time of the system as t t t t 4 + t 5 time units. Note that the last component is visited only once. Similarly other metrics like the expected reliability of the whole system could also be calculated.

6 3. Continuous Time Markov Chains 3.1 Introduction Unlike DTMCs, Continuous Time Markov Chains (CTMCs) do not have discrete time or index. The state changes could occur at any instant of time. So if X(t) represents the random variable depicting the state at time t then: We define the transition probabilities similar to as in case of DTMCs as : where We could also denote the pmf of X(t) or the state probabilities as The transition probabilities of the CTMC satisfy the Chapman-Kolmogorov equation which states that for all i,j in the state space I, We can also define the infinitesimal generator matrix Q(t) =[q ij (t)] where Where, It can be shown that, If then, Hence for homogenous CTMCs (HCTMCs) wherein the transition probabilities depend on the time difference (t-v) rather than v and t, we have the following Consider that we define

7 Then it can be shown that L j (t) is the cumulative time spent in state j till time t. If we define the vector L(t)=[L j (t)] then by using integration and the above equations we have, The CTMCs do not have a concept of periodic or aperiodic states. A state i is said to be absorbing if q ij =0 for all j different from i. A state i is said to be reachable from a state j if for t>0, p ji (t)>0. If all states of a CTMC are reachable from all other states, the CTMC is said to be irreducible. For an irreducible continuous-time Markov chain, the limits always exist and are independent of the initial state i. If the limiting probabilities π j exist, then we have To determine a non zero unique solution to this equation we use Irreducible Markov chains that yield positive limiting probabilities {π j} in this way are called recurrent nonnull or positive recurrent, and these probabilities are called steady state probabilities. 3.2 The Birth Death Process The birth- death process is a CTMC with states {0,1, } for which transitions from state i may go only to state i-1 or i+1. We can further consider λ i and µ i, called the birth and death rates of state i, respectively defined as below: This could be shown as below : In steady state the rate of flow into and out of each state would be equal. Hence we get the set of balance equations for this CTMC as: Also for k=0, we have, so we get, And so, Hence,

8 The last expression comes from the fact that all limiting probabilities sum up to 1. In case of finite state space, k varies from 1 to n, and the corresponding sums in above expressions change accordingly. The birth death process can be used to model queues. Queues can form wherever, there is a serving station and customers arrive in to receive service at them. There could be many kinds of queues, based upon the arrival discipline, the service discipline, the number of servers, the number of jobs allowed in the system, etc. The M/M/1 Queue: Consider a system consisting of a single server and an associated queue, with jobs being sent by clients to this system. Assume that the arrival process is Poisson, with rate λ. The service times of jobs are independent identically distributed random variables, with exponential distribution with mean µ. Assume that FCFS scheduling is done at the server. If N(t) denotes the number of customers in the system, the {N(t), t>0} is a birth death process with λ k=λ (k 0) and µ k=µ (k>0). Using the expressions derived for a birth death process we have the following: and Here ρ = λ /µ is called the traffic intensity of the system and has units as Erlangs. A large number of measures can be calculated from the limiting probabilities. The expected number of jobs in the system is given by: We can use Little s Formula to calculate the response time E[R] of the system. It states that the mean number of jobs in a queuing system in the steady state is equal to the product of the arrival rate and the mean response time. In this scenario, Little s Formula gives : Using the expression for π k we get Other measures could also be found easily. If W denotes the random variable denotes the waiting time in the queue i.e W=R-S, then, Hence, Also by applying Little s Formula to the queue, we can get the expected number of jobsin the queue as E[Q] given by :

9 In a similar fashion many other queues such as the M/M/m, the M/M/1/n, etc can be analyzed. The reader can refer to [1] for the same. 3.3 Non Birth Death Processes There are many instances of CTMCs, which are not birth-death processes. These models are generally used to calculate the availability of the system (Availability Models), the performance metrics such as mean response time, mean number in the system, etc. of the system (Performance models), etc. Some times models, which take performance, and availability both into consideration, are also used. The method employed for steady state models is essentially to find the limiting probabilities from the balance equations and then proceed to calculate the metrics by using Little s Formula etc. 3.4 CTMCs with absorbing states by: If the CTMC is not irreducible and has an absorbing state,we have to solve the set of equations given for finding the different π j(t)s. Once these are found, one can then find metrics as the mean time to failure (MTTF) of the system. There is however another method that does not require solution of the above system of equations. Denote the set of all system failure states by set D (all the absorbing states belong to set D), and the set of all states in which the system is operational by set U. Let Q denote the sub matrix of Q pertaining to states in U only. Also, let π (0) be the sub vector of π (0) pertaining to states in U. Now, if then the set of equations become, Because τ i is the expected time the CTMC spends in (nonfailure) state i until system failure (entering D), the mean time to (system) failure (MTTF) is given by Hence this analysis is helpful in predicting the MTTFs of many real life systems which need to be modeled by CTMCs having absorbing state(s).

10 4. Network of Queues 4.1 Introduction We saw that in case of birth death processes, a product form solution for the probabilities exists. In practical systems one might consider a network of queues. These could model system with contention for a set of resources. However the pertinent question could be whether the product form applies to these or not. We can divide queueing networks into two broad categories: 1. Open Networks: One or more sources of incoming traffic and one or more sinks that absorb departing traffic. 2. Closed Networks: Does not have a source or a sink, and the total number of jobs in the system remains constant. Burke has shown that the output of an M/M/1 queue is also Poisson with rate λ [1]. So if we have a tandem network as shown below with ρ 0 = λ/µ 0, the second queue is also an M/M/1 queue with server utilization ρ 1 = λ/µ 1 (assumed to be < 1). Hence the probability of finding k 0 jobs at node 0 and k 1 at node 1 is given by This equation could also be derived by constructing the CTMC for this network, and solving it. However for complex networks such a CTMC will be very difficult to analyze. 4.2 Open Networks Jackson showed that the product-form solution also applies to open networks of Markovian queues with feedback [1]. Besides requiring that the distributions of job interarrival times and service times at all nodes be exponential, assume that the scheduling discipline at each node is FCFS. This result is very helpful in analyzing various practical systems. Consider an open queueing network with two nodes as below: In this example, let λ 0 and λ 1 are the arrival rates at the CPU and I/O node, respectively. The arrivals to CPU are either from outside at a rate λ or from the I/O node at rate λ 1, therefore, λ 0 =λ +λ 1 Also a job after completion of the CPU burst would go to the I/O node with probability p 1, therefore, λ 1 =λ 0 p 1 =λ 0 (1-p 0 ). Solving these two traffic equations, we get, Using Jackson s result, the product form solutio n for the 2-node network with feedback:

11 We next consider a Central Server system, with 1 CPU and m I/O nodes for the same. These are interconnected as shown below : This system difficult to analyze in general, however let us consider the behavior of a single tagged program as it traverses the system. We observe the system only at times when the job arrives at a node for service. The underlying stochastic process forms a DTMC, which is characterized by its transition probability matrix as below: Now we can find the visits Vj, the average number of visits made by a job to node j before leaving the system as: If λ jobs arrive per unit time in the system from outside then the arrival rate λj of jobs at node j is, According to Jackson s result th e steady state joint probability for finding k j customers at node j is given by, Where Once we have these steady state joint probabilities we can find measures like expected number in the system, expected response time etc. 4.3 Closed Networks In practical systems the main memory and other resources are limited therefore the number of jobs that can be allowed access to these has an upper limit. Usually a job scheduler does this regulatory job,

12 and we can assume that a job scheduler queue exists as shown below: This kind of network does not have a product form solution. However, the open network case we considered could be thought of as a light load approximation to this, wherein the value of λ is very small and this queue is always empty. For the conditions of very heavy load, we might notice that there are always jobs (in the scheduler queue) waiting to be scheduled when an existing job leaves the queueing network. Modeling using closed networks could then be used here. This is shown as: Gordon and Newell showed that a product form solution would exist for this network also [1]. If we again consider a tagged job through this network, we could model this as a DTMC again, and get the relative visit count to each node by using the system of equations We could chose v 0 as per our convenience. Gordon Newell showed that the steady-state probability p(k 0, k 1,..., k m ) of finding k i jobs at nodes i,( i = 0, 1,..., m), is given by The computation of C(n) could be cumbersome if the number of states if very high, but there are methods, which will allow the computations to be done easily. For more details on these methods one can refer to [1]. 4.4 General Service Distribution And Multiple Job Classes Many other queueing networks apart from the types mentioned earlier also have product form solutions. Moreover the scheduling discipline also does not need to be necessarily FCFS. Consider a closed

13 network with r classes of customers. A class t customer has a routing matrix X t, and its service rate at node i is denoted by µ it. Therefore we can get the visit counts at various nodded by solving the traffic equations for each job class. Assume that Node i is said to be a type 1 node if it has a single server with exponentially distributed service times, FCFS scheduling, and identical service rates for all job types (i.e., µ it = µ i for all t). A node is said to be of type 2 if it has a single server, PS scheduling, and a service time distribution that is differentiable. Each job type may have a distinct service time distribution. Node i is said to be a type 3 node if it has an enough servers so that no queue ever forms at the node. A node is said to be of type 4 if it has a single server with LCFS-PR scheduling. In case of both type 3 and 4 nodes, any differentiable service time distribution is allowed, and each job type may have a distinct service time distribution. Let k it be the number of jobs of type t at node i. Assume that there are n t jobs of type t in the network so that we have We define a vector Y i as (k i1, k i2,, k ir ). Then (Y 0, Y 1,, Y m ) is the state of the system. If k i is the total number of jobs at a node then the joint probability of such a state is given by: Again we can derive C(n 1, n 2,, n r ) using recursive techniques [1]. Thereby other measure like utilization of various nodes, etc. could also be computed. 4.5 Non Product Form Networks Notice that when we studied the central server model, we found approximate ways of modeling the system either in case of light load or very heavy load. But the system does not have a product form solution in general. We could either resolve the system using Stochastic Petri Nets [1], or we need to again approximate the system by using some equivalent representation. Consider that we represent the whole CPU-I/O system as an equivalent server with the queue being the scheduler queue, then we could try analyzing the system using birth-death process. The service rate of the equivalent server depends could be determined from the average throughput of the CPU-I/O system and it is given by

14 where n is the degree of multi-programming of the system. Hence we could the average throughput vector (E[T(1)], E[T(2)],..., E[T(n)]) of the inner model is and then the steady-state probability that i jobs reside in the queuing system could be found for this birth-death process as: We can thus determine the value of π 0 using equating the sum of all probabilities to 1. We can also determine the expected number of jobs in the system as : From this we can get the response time of the system using Little s law. This method is also called the equivalent flow server method. 5. Conclusion I introduced the basics of Discrete and Continuous Time Markov Chains (DTMCs and CTMCs) in this report along with Queueing Networks. The stress was on introducing the essential concepts regarding these topics. Moreover modeling of some practical systems such as the software composed of many individual components or the central system multi-programmed systems were also introduced in this report. 6. References [1] Kishor S. Trivedi : Probability and Statistics with Reliability, Queuing, and Computer Science Applications, John Wiley and Sons, [2] Sheldon M. Ross : Introduction to Probability Models, Academic Press, [3] Robin A. Sahner, Kishor S. Trivedi and Antonio Puliafito : Performance and Reliability Analysis of Computer Systems: An Example-Based Approach Using the SHARPE Software Package, Kluwer Academic Publishers, 1996.

M/M/1 and M/M/m Queueing Systems

M/M/1 and M/M/m Queueing Systems M/M/ and M/M/m Queueing Systems M. Veeraraghavan; March 20, 2004. Preliminaries. Kendall s notation: G/G/n/k queue G: General - can be any distribution. First letter: Arrival process; M: memoryless - exponential

More information

IEOR 6711: Stochastic Models, I Fall 2012, Professor Whitt, Final Exam SOLUTIONS

IEOR 6711: Stochastic Models, I Fall 2012, Professor Whitt, Final Exam SOLUTIONS IEOR 6711: Stochastic Models, I Fall 2012, Professor Whitt, Final Exam SOLUTIONS There are four questions, each with several parts. 1. Customers Coming to an Automatic Teller Machine (ATM) (30 points)

More information

QUEUING THEORY. 1. Introduction

QUEUING THEORY. 1. Introduction QUEUING THEORY RYAN BERRY Abstract. This paper defines the building blocks of and derives basic queuing systems. It begins with a review of some probability theory and then defines processes used to analyze

More information

LECTURE 4. Last time: Lecture outline

LECTURE 4. Last time: Lecture outline LECTURE 4 Last time: Types of convergence Weak Law of Large Numbers Strong Law of Large Numbers Asymptotic Equipartition Property Lecture outline Stochastic processes Markov chains Entropy rate Random

More information

Periodic Capacity Management under a Lead Time Performance Constraint

Periodic Capacity Management under a Lead Time Performance Constraint Periodic Capacity Management under a Lead Time Performance Constraint N.C. Buyukkaramikli 1,2 J.W.M. Bertrand 1 H.P.G. van Ooijen 1 1- TU/e IE&IS 2- EURANDOM INTRODUCTION Using Lead time to attract customers

More information

Analysis of a Production/Inventory System with Multiple Retailers

Analysis of a Production/Inventory System with Multiple Retailers Analysis of a Production/Inventory System with Multiple Retailers Ann M. Noblesse 1, Robert N. Boute 1,2, Marc R. Lambrecht 1, Benny Van Houdt 3 1 Research Center for Operations Management, University

More information

Queueing Networks. Page n. Queueing Networks

Queueing Networks. Page n. Queueing Networks Queueing Networks Simonetta Balsamo, Andrea Marin Università Ca Foscari di Venezia Dipartimento di Informatica, Venezia, Italy School on Formal Methods 2007: Performance Evaluation Bertinoro, 28/5/2007

More information

Basic Queuing Relationships

Basic Queuing Relationships Queueing Theory Basic Queuing Relationships Resident items Waiting items Residence time Single server Utilisation System Utilisation Little s formulae are the most important equation in queuing theory

More information

The Analysis of Dynamical Queueing Systems (Background)

The Analysis of Dynamical Queueing Systems (Background) The Analysis of Dynamical Queueing Systems (Background) Technological innovations are creating new types of communication systems. During the 20 th century, we saw the evolution of electronic communication

More information

Load Balancing and Switch Scheduling

Load Balancing and Switch Scheduling EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: liuxh@systems.stanford.edu Abstract Load

More information

4 The M/M/1 queue. 4.1 Time-dependent behaviour

4 The M/M/1 queue. 4.1 Time-dependent behaviour 4 The M/M/1 queue In this chapter we will analyze the model with exponential interarrival times with mean 1/λ, exponential service times with mean 1/µ and a single server. Customers are served in order

More information

Cumulative Diagrams: An Example

Cumulative Diagrams: An Example Cumulative Diagrams: An Example Consider Figure 1 in which the functions (t) and (t) denote, respectively, the demand rate and the service rate (or capacity ) over time at the runway system of an airport

More information

CS556 Course Project Performance Analysis of M-NET using GSPN

CS556 Course Project Performance Analysis of M-NET using GSPN Performance Analysis of M-NET using GSPN CS6 Course Project Jinchun Xia Jul 9 CS6 Course Project Performance Analysis of M-NET using GSPN Jinchun Xia. Introduction Performance is a crucial factor in software

More information

Development of dynamically evolving and self-adaptive software. 1. Background

Development of dynamically evolving and self-adaptive software. 1. Background Development of dynamically evolving and self-adaptive software 1. Background LASER 2013 Isola d Elba, September 2013 Carlo Ghezzi Politecnico di Milano Deep-SE Group @ DEIB 1 Requirements Functional requirements

More information

FEGYVERNEKI SÁNDOR, PROBABILITY THEORY AND MATHEmATICAL

FEGYVERNEKI SÁNDOR, PROBABILITY THEORY AND MATHEmATICAL FEGYVERNEKI SÁNDOR, PROBABILITY THEORY AND MATHEmATICAL STATIsTICs 4 IV. RANDOm VECTORs 1. JOINTLY DIsTRIBUTED RANDOm VARIABLEs If are two rom variables defined on the same sample space we define the joint

More information

The Joint Distribution of Server State and Queue Length of M/M/1/1 Retrial Queue with Abandonment and Feedback

The Joint Distribution of Server State and Queue Length of M/M/1/1 Retrial Queue with Abandonment and Feedback The Joint Distribution of Server State and Queue Length of M/M/1/1 Retrial Queue with Abandonment and Feedback Hamada Alshaer Université Pierre et Marie Curie - Lip 6 7515 Paris, France Hamada.alshaer@lip6.fr

More information

Random access protocols for channel access. Markov chains and their stability. Laurent Massoulié.

Random access protocols for channel access. Markov chains and their stability. Laurent Massoulié. Random access protocols for channel access Markov chains and their stability laurent.massoulie@inria.fr Aloha: the first random access protocol for channel access [Abramson, Hawaii 70] Goal: allow machines

More information

Programma della seconda parte del corso

Programma della seconda parte del corso Programma della seconda parte del corso Introduction Reliability Performance Risk Software Performance Engineering Layered Queueing Models Stochastic Petri Nets New trends in software modeling: Metamodeling,

More information

Software Performance and Scalability

Software Performance and Scalability Software Performance and Scalability A Quantitative Approach Henry H. Liu ^ IEEE )computer society WILEY A JOHN WILEY & SONS, INC., PUBLICATION Contents PREFACE ACKNOWLEDGMENTS xv xxi Introduction 1 Performance

More information

1. (First passage/hitting times/gambler s ruin problem:) Suppose that X has a discrete state space and let i be a fixed state. Let

1. (First passage/hitting times/gambler s ruin problem:) Suppose that X has a discrete state space and let i be a fixed state. Let Copyright c 2009 by Karl Sigman 1 Stopping Times 1.1 Stopping Times: Definition Given a stochastic process X = {X n : n 0}, a random time τ is a discrete random variable on the same probability space as

More information

Hydrodynamic Limits of Randomized Load Balancing Networks

Hydrodynamic Limits of Randomized Load Balancing Networks Hydrodynamic Limits of Randomized Load Balancing Networks Kavita Ramanan and Mohammadreza Aghajani Brown University Stochastic Networks and Stochastic Geometry a conference in honour of François Baccelli

More information

UNIT 2 QUEUING THEORY

UNIT 2 QUEUING THEORY UNIT 2 QUEUING THEORY LESSON 24 Learning Objective: Apply formulae to find solution that will predict the behaviour of the single server model II. Apply formulae to find solution that will predict the

More information

Performance Analysis of a Telephone System with both Patient and Impatient Customers

Performance Analysis of a Telephone System with both Patient and Impatient Customers Performance Analysis of a Telephone System with both Patient and Impatient Customers Yiqiang Quennel Zhao Department of Mathematics and Statistics University of Winnipeg Winnipeg, Manitoba Canada R3B 2E9

More information

Overview of Violations of the Basic Assumptions in the Classical Normal Linear Regression Model

Overview of Violations of the Basic Assumptions in the Classical Normal Linear Regression Model Overview of Violations of the Basic Assumptions in the Classical Normal Linear Regression Model 1 September 004 A. Introduction and assumptions The classical normal linear regression model can be written

More information

Queuing Theory. Long Term Averages. Assumptions. Interesting Values. Queuing Model

Queuing Theory. Long Term Averages. Assumptions. Interesting Values. Queuing Model Queuing Theory Queuing Theory Queuing theory is the mathematics of waiting lines. It is extremely useful in predicting and evaluating system performance. Queuing theory has been used for operations research.

More information

Master s Theory Exam Spring 2006

Master s Theory Exam Spring 2006 Spring 2006 This exam contains 7 questions. You should attempt them all. Each question is divided into parts to help lead you through the material. You should attempt to complete as much of each problem

More information

Fluid Approximation of a Priority Call Center With Time-Varying Arrivals

Fluid Approximation of a Priority Call Center With Time-Varying Arrivals Fluid Approximation of a Priority Call Center With Time-Varying Arrivals Ahmad D. Ridley, Ph.D. William Massey, Ph.D. Michael Fu, Ph.D. In this paper, we model a call center as a preemptive-resume priority

More information

QNAT. A Graphical Queuing Network Analysis Tool for General Open and Closed Queuing Networks. Sanjay K. Bose

QNAT. A Graphical Queuing Network Analysis Tool for General Open and Closed Queuing Networks. Sanjay K. Bose QNAT A Graphical Queuing Network Analysis Tool for General Open and Closed Queuing Networks Sanjay K. Bose QNAT developed at - Dept. Elect. Engg., I.I.T., Kanpur, INDIA by - Sanjay K. Bose skb@ieee.org

More information

Modeling and Performance Analysis of Telephony Gateway REgistration Protocol

Modeling and Performance Analysis of Telephony Gateway REgistration Protocol Modeling and Performance Analysis of Telephony Gateway REgistration Protocol Kushal Kumaran and Anirudha Sahoo Kanwal Rekhi School of Information Technology Indian Institute of Technology, Bombay, Powai,

More information

PART III. OPS-based wide area networks

PART III. OPS-based wide area networks PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity

More information

Tenth Problem Assignment

Tenth Problem Assignment EECS 40 Due on April 6, 007 PROBLEM (8 points) Dave is taking a multiple-choice exam. You may assume that the number of questions is infinite. Simultaneously, but independently, his conscious and subconscious

More information

Pull versus Push Mechanism in Large Distributed Networks: Closed Form Results

Pull versus Push Mechanism in Large Distributed Networks: Closed Form Results Pull versus Push Mechanism in Large Distributed Networks: Closed Form Results Wouter Minnebo, Benny Van Houdt Dept. Mathematics and Computer Science University of Antwerp - iminds Antwerp, Belgium Wouter

More information

a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2.

a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2. Chapter 1 LINEAR EQUATIONS 1.1 Introduction to linear equations A linear equation in n unknowns x 1, x,, x n is an equation of the form a 1 x 1 + a x + + a n x n = b, where a 1, a,..., a n, b are given

More information

Simple Markovian Queueing Systems

Simple Markovian Queueing Systems Chapter 4 Simple Markovian Queueing Systems Poisson arrivals and exponential service make queueing models Markovian that are easy to analyze and get usable results. Historically, these are also the models

More information

Fluid models in performance analysis

Fluid models in performance analysis Fluid models in performance analysis Marco Gribaudo 1, Miklós Telek 2 1 Dip. di Informatica, Università di Torino, marcog@di.unito.it 2 Dept. of Telecom., Technical University of Budapest telek@hitbme.hu

More information

Markov Chains for the RISK Board Game Revisited. Introduction. The Markov Chain. Jason A. Osborne North Carolina State University Raleigh, NC 27695

Markov Chains for the RISK Board Game Revisited. Introduction. The Markov Chain. Jason A. Osborne North Carolina State University Raleigh, NC 27695 Markov Chains for the RISK Board Game Revisited Jason A. Osborne North Carolina State University Raleigh, NC 27695 Introduction Probabilistic reasoning goes a long way in many popular board games. Abbott

More information

LECTURE 16. Readings: Section 5.1. Lecture outline. Random processes Definition of the Bernoulli process Basic properties of the Bernoulli process

LECTURE 16. Readings: Section 5.1. Lecture outline. Random processes Definition of the Bernoulli process Basic properties of the Bernoulli process LECTURE 16 Readings: Section 5.1 Lecture outline Random processes Definition of the Bernoulli process Basic properties of the Bernoulli process Number of successes Distribution of interarrival times The

More information

Tutorial: Stochastic Modeling in Biology Applications of Discrete- Time Markov Chains. NIMBioS Knoxville, Tennessee March 16-18, 2011

Tutorial: Stochastic Modeling in Biology Applications of Discrete- Time Markov Chains. NIMBioS Knoxville, Tennessee March 16-18, 2011 Tutorial: Stochastic Modeling in Biology Applications of Discrete- Time Markov Chains Linda J. S. Allen Texas Tech University Lubbock, Texas U.S.A. NIMBioS Knoxville, Tennessee March 16-18, 2011 OUTLINE

More information

1 Gambler s Ruin Problem

1 Gambler s Ruin Problem Coyright c 2009 by Karl Sigman 1 Gambler s Ruin Problem Let N 2 be an integer and let 1 i N 1. Consider a gambler who starts with an initial fortune of $i and then on each successive gamble either wins

More information

8 Primes and Modular Arithmetic

8 Primes and Modular Arithmetic 8 Primes and Modular Arithmetic 8.1 Primes and Factors Over two millennia ago already, people all over the world were considering the properties of numbers. One of the simplest concepts is prime numbers.

More information

On Admission Control Policy for Multi-tasking Live-chat Service Agents Research-in-progress Paper

On Admission Control Policy for Multi-tasking Live-chat Service Agents Research-in-progress Paper On Admission Control Policy for Multi-tasking Live-chat Service Agents Research-in-progress Paper Paulo Goes Dept. of Management Information Systems Eller College of Management, The University of Arizona,

More information

TRAFFIC ENGINEERING OF DISTRIBUTED CALL CENTERS: NOT AS STRAIGHT FORWARD AS IT MAY SEEM. M. J. Fischer D. A. Garbin A. Gharakhanian D. M.

TRAFFIC ENGINEERING OF DISTRIBUTED CALL CENTERS: NOT AS STRAIGHT FORWARD AS IT MAY SEEM. M. J. Fischer D. A. Garbin A. Gharakhanian D. M. TRAFFIC ENGINEERING OF DISTRIBUTED CALL CENTERS: NOT AS STRAIGHT FORWARD AS IT MAY SEEM M. J. Fischer D. A. Garbin A. Gharakhanian D. M. Masi January 1999 Mitretek Systems 7525 Colshire Drive McLean, VA

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES Contents 1. Random variables and measurable functions 2. Cumulative distribution functions 3. Discrete

More information

Performance Analysis for Shared Services

Performance Analysis for Shared Services Performance Analysis for Shared Services Hai Sobey School of Business, Saint Mary's University, Canada hwang@smu.ca ABSTRACT Shared services have widely spread in the government and private sectors as

More information

Robust Staff Level Optimisation in Call Centres

Robust Staff Level Optimisation in Call Centres Robust Staff Level Optimisation in Call Centres Sam Clarke Jesus College University of Oxford A thesis submitted for the degree of M.Sc. Mathematical Modelling and Scientific Computing Trinity 2007 Abstract

More information

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1. MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column

More information

Optimal Dynamic Resource Allocation in Multi-Class Queueing Networks

Optimal Dynamic Resource Allocation in Multi-Class Queueing Networks Imperial College London Department of Computing Optimal Dynamic Resource Allocation in Multi-Class Queueing Networks MEng Individual Project Report Diagoras Nicolaides Supervisor: Dr William Knottenbelt

More information

A Quantitative Approach to the Performance of Internet Telephony to E-business Sites

A Quantitative Approach to the Performance of Internet Telephony to E-business Sites A Quantitative Approach to the Performance of Internet Telephony to E-business Sites Prathiusha Chinnusamy TransSolutions Fort Worth, TX 76155, USA Natarajan Gautam Harold and Inge Marcus Department of

More information

Web Server Software Architectures

Web Server Software Architectures Web Server Software Architectures Author: Daniel A. Menascé Presenter: Noshaba Bakht Web Site performance and scalability 1.workload characteristics. 2.security mechanisms. 3. Web cluster architectures.

More information

Homework set 4 - Solutions

Homework set 4 - Solutions Homework set 4 - Solutions Math 495 Renato Feres Problems R for continuous time Markov chains The sequence of random variables of a Markov chain may represent the states of a random system recorded at

More information

A linear combination is a sum of scalars times quantities. Such expressions arise quite frequently and have the form

A linear combination is a sum of scalars times quantities. Such expressions arise quite frequently and have the form Section 1.3 Matrix Products A linear combination is a sum of scalars times quantities. Such expressions arise quite frequently and have the form (scalar #1)(quantity #1) + (scalar #2)(quantity #2) +...

More information

Network Design Performance Evaluation, and Simulation #6

Network Design Performance Evaluation, and Simulation #6 Network Design Performance Evaluation, and Simulation #6 1 Network Design Problem Goal Given QoS metric, e.g., Average delay Loss probability Characterization of the traffic, e.g., Average interarrival

More information

How To Balance In A Distributed System

How To Balance In A Distributed System 6 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 11, NO. 1, JANUARY 2000 How Useful Is Old Information? Michael Mitzenmacher AbstractÐWe consider the problem of load balancing in dynamic distributed

More information

A simple analysis of the TV game WHO WANTS TO BE A MILLIONAIRE? R

A simple analysis of the TV game WHO WANTS TO BE A MILLIONAIRE? R A simple analysis of the TV game WHO WANTS TO BE A MILLIONAIRE? R Federico Perea Justo Puerto MaMaEuSch Management Mathematics for European Schools 94342 - CP - 1-2001 - DE - COMENIUS - C21 University

More information

Structure Preserving Model Reduction for Logistic Networks

Structure Preserving Model Reduction for Logistic Networks Structure Preserving Model Reduction for Logistic Networks Fabian Wirth Institute of Mathematics University of Würzburg Workshop on Stochastic Models of Manufacturing Systems Einhoven, June 24 25, 2010.

More information

IEOR 6711: Stochastic Models I Fall 2012, Professor Whitt, Tuesday, September 11 Normal Approximations and the Central Limit Theorem

IEOR 6711: Stochastic Models I Fall 2012, Professor Whitt, Tuesday, September 11 Normal Approximations and the Central Limit Theorem IEOR 6711: Stochastic Models I Fall 2012, Professor Whitt, Tuesday, September 11 Normal Approximations and the Central Limit Theorem Time on my hands: Coin tosses. Problem Formulation: Suppose that I have

More information

6.263/16.37: Lectures 5 & 6 Introduction to Queueing Theory

6.263/16.37: Lectures 5 & 6 Introduction to Queueing Theory 6.263/16.37: Lectures 5 & 6 Introduction to Queueing Theory Massachusetts Institute of Technology Slide 1 Packet Switched Networks Messages broken into Packets that are routed To their destination PS PS

More information

Modelling the performance of computer mirroring with difference queues

Modelling the performance of computer mirroring with difference queues Modelling the performance of computer mirroring with difference queues Przemyslaw Pochec Faculty of Computer Science University of New Brunswick, Fredericton, Canada E3A 5A3 email pochec@unb.ca ABSTRACT

More information

uation of a Poisson Process for Emergency Care

uation of a Poisson Process for Emergency Care QUEUEING THEORY WITH APPLICATIONS AND SPECIAL CONSIDERATION TO EMERGENCY CARE JAMES KEESLING. Introduction Much that is essential in modern life would not be possible without queueing theory. All communication

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introduction 1.1. Motivation Network performance analysis, and the underlying queueing theory, was born at the beginning of the 20th Century when two Scandinavian engineers, Erlang 1 and Engset

More information

NOTES ON LINEAR TRANSFORMATIONS

NOTES ON LINEAR TRANSFORMATIONS NOTES ON LINEAR TRANSFORMATIONS Definition 1. Let V and W be vector spaces. A function T : V W is a linear transformation from V to W if the following two properties hold. i T v + v = T v + T v for all

More information

ECE 842 Report Implementation of Elliptic Curve Cryptography

ECE 842 Report Implementation of Elliptic Curve Cryptography ECE 842 Report Implementation of Elliptic Curve Cryptography Wei-Yang Lin December 15, 2004 Abstract The aim of this report is to illustrate the issues in implementing a practical elliptic curve cryptographic

More information

A Group based Time Quantum Round Robin Algorithm using Min-Max Spread Measure

A Group based Time Quantum Round Robin Algorithm using Min-Max Spread Measure A Group based Quantum Round Robin Algorithm using Min-Max Spread Measure Sanjaya Kumar Panda Department of CSE NIT, Rourkela Debasis Dash Department of CSE NIT, Rourkela Jitendra Kumar Rout Department

More information

Fluid Approximation of Smart Grid Systems: Optimal Control of Energy Storage Units

Fluid Approximation of Smart Grid Systems: Optimal Control of Energy Storage Units Fluid Approximation of Smart Grid Systems: Optimal Control of Energy Storage Units by Rasha Ibrahim Sakr, B.Sc. A thesis submitted to the Faculty of Graduate and Postdoctoral Affairs in partial fulfillment

More information

Continued Fractions and the Euclidean Algorithm

Continued Fractions and the Euclidean Algorithm Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction

More information

How To Find The Optimal Base Stock Level In A Supply Chain

How To Find The Optimal Base Stock Level In A Supply Chain Optimizing Stochastic Supply Chains via Simulation: What is an Appropriate Simulation Run Length? Arreola-Risa A 1, Fortuny-Santos J 2, Vintró-Sánchez C 3 Abstract The most common solution strategy for

More information

Tagging with Hidden Markov Models

Tagging with Hidden Markov Models Tagging with Hidden Markov Models Michael Collins 1 Tagging Problems In many NLP problems, we would like to model pairs of sequences. Part-of-speech (POS) tagging is perhaps the earliest, and most famous,

More information

MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS

MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS Systems of Equations and Matrices Representation of a linear system The general system of m equations in n unknowns can be written a x + a 2 x 2 + + a n x n b a

More information

6 Scalar, Stochastic, Discrete Dynamic Systems

6 Scalar, Stochastic, Discrete Dynamic Systems 47 6 Scalar, Stochastic, Discrete Dynamic Systems Consider modeling a population of sand-hill cranes in year n by the first-order, deterministic recurrence equation y(n + 1) = Ry(n) where R = 1 + r = 1

More information

Binomial lattice model for stock prices

Binomial lattice model for stock prices Copyright c 2007 by Karl Sigman Binomial lattice model for stock prices Here we model the price of a stock in discrete time by a Markov chain of the recursive form S n+ S n Y n+, n 0, where the {Y i }

More information

Process simulation. Enn Õunapuu enn.ounapuu@ttu.ee

Process simulation. Enn Õunapuu enn.ounapuu@ttu.ee Process simulation Enn Õunapuu enn.ounapuu@ttu.ee Content Problem How? Example Simulation Definition Modeling and simulation functionality allows for preexecution what-if modeling and simulation. Postexecution

More information

Keywords Backup and restore strategies, online backup, metrics, modelling methods, hourly backup.

Keywords Backup and restore strategies, online backup, metrics, modelling methods, hourly backup. Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance and

More information

QUALITY ENGINEERING PROGRAM

QUALITY ENGINEERING PROGRAM QUALITY ENGINEERING PROGRAM Production engineering deals with the practical engineering problems that occur in manufacturing planning, manufacturing processes and in the integration of the facilities and

More information

Probability and Random Variables. Generation of random variables (r.v.)

Probability and Random Variables. Generation of random variables (r.v.) Probability and Random Variables Method for generating random variables with a specified probability distribution function. Gaussian And Markov Processes Characterization of Stationary Random Process Linearly

More information

Self Organizing Maps: Fundamentals

Self Organizing Maps: Fundamentals Self Organizing Maps: Fundamentals Introduction to Neural Networks : Lecture 16 John A. Bullinaria, 2004 1. What is a Self Organizing Map? 2. Topographic Maps 3. Setting up a Self Organizing Map 4. Kohonen

More information

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding

More information

Numerical Methods for Option Pricing

Numerical Methods for Option Pricing Chapter 9 Numerical Methods for Option Pricing Equation (8.26) provides a way to evaluate option prices. For some simple options, such as the European call and put options, one can integrate (8.26) directly

More information

Performance of Cloud Computing Centers with Multiple Priority Classes

Performance of Cloud Computing Centers with Multiple Priority Classes 202 IEEE Fifth International Conference on Cloud Computing Performance of Cloud Computing Centers with Multiple Priority Classes Wendy Ellens, Miroslav Živković, Jacob Akkerboom, Remco Litjens, Hans van

More information

A QUEUEING-INVENTORY SYSTEM WITH DEFECTIVE ITEMS AND POISSON DEMAND. bhaji@usc.edu

A QUEUEING-INVENTORY SYSTEM WITH DEFECTIVE ITEMS AND POISSON DEMAND. bhaji@usc.edu A QUEUEING-INVENTORY SYSTEM WITH DEFECTIVE ITEMS AND POISSON DEMAND Rasoul Hai 1, Babak Hai 1 Industrial Engineering Department, Sharif University of Technology, +98-1-66165708, hai@sharif.edu Industrial

More information

Single item inventory control under periodic review and a minimum order quantity

Single item inventory control under periodic review and a minimum order quantity Single item inventory control under periodic review and a minimum order quantity G. P. Kiesmüller, A.G. de Kok, S. Dabia Faculty of Technology Management, Technische Universiteit Eindhoven, P.O. Box 513,

More information

Load Balancing with Memory

Load Balancing with Memory Load Balancing with Memory Michael Mitzenmacher Harvard University michaelm@eecs.harvard.edu Balaji Prabhakar Stanford University balaji@stanford.edu Devavrat Shah Stanford University devavrat@cs.stanford.edu

More information

D-Policy for a Production Inventory System with Perishable Items

D-Policy for a Production Inventory System with Perishable Items Chapter 6 D-Policy for a Production Inventory System with Perishable Items 6.1 Introduction So far we were concentrating on invenory with positive (random) service time. In this chapter we concentrate

More information

Dynamic Assignment of Dedicated and Flexible Servers in Tandem Lines

Dynamic Assignment of Dedicated and Flexible Servers in Tandem Lines Dynamic Assignment of Dedicated and Flexible Servers in Tandem Lines Sigrún Andradóttir and Hayriye Ayhan School of Industrial and Systems Engineering Georgia Institute of Technology Atlanta, GA 30332-0205,

More information

OPTIMIZED PERFORMANCE EVALUATIONS OF CLOUD COMPUTING SERVERS

OPTIMIZED PERFORMANCE EVALUATIONS OF CLOUD COMPUTING SERVERS OPTIMIZED PERFORMANCE EVALUATIONS OF CLOUD COMPUTING SERVERS K. Sarathkumar Computer Science Department, Saveetha School of Engineering Saveetha University, Chennai Abstract: The Cloud computing is one

More information

STABILITY OF LU-KUMAR NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING

STABILITY OF LU-KUMAR NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING Applied Probability Trust (28 December 2012) STABILITY OF LU-KUMAR NETWORKS UNDER LONGEST-QUEUE AND LONGEST-DOMINATING-QUEUE SCHEDULING RAMTIN PEDARSANI and JEAN WALRAND, University of California, Berkeley

More information

Reinforcement Learning

Reinforcement Learning Reinforcement Learning LU 2 - Markov Decision Problems and Dynamic Programming Dr. Martin Lauer AG Maschinelles Lernen und Natürlichsprachliche Systeme Albert-Ludwigs-Universität Freiburg martin.lauer@kit.edu

More information

Formal Languages and Automata Theory - Regular Expressions and Finite Automata -

Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Samarjit Chakraborty Computer Engineering and Networks Laboratory Swiss Federal Institute of Technology (ETH) Zürich March

More information

Queueing Systems. Ivo Adan and Jacques Resing

Queueing Systems. Ivo Adan and Jacques Resing Queueing Systems Ivo Adan and Jacques Resing Department of Mathematics and Computing Science Eindhoven University of Technology P.O. Box 513, 5600 MB Eindhoven, The Netherlands March 26, 2015 Contents

More information

Basic Queueing Theory

Basic Queueing Theory Basic Queueing Theory Dr. János Sztrik University of Debrecen, Faculty of Informatics Reviewers: Dr. József Bíró Doctor of the Hungarian Academy of Sciences, Full Professor Budapest University of Technology

More information

INTEGRATED OPTIMIZATION OF SAFETY STOCK

INTEGRATED OPTIMIZATION OF SAFETY STOCK INTEGRATED OPTIMIZATION OF SAFETY STOCK AND TRANSPORTATION CAPACITY Horst Tempelmeier Department of Production Management University of Cologne Albertus-Magnus-Platz D-50932 Koeln, Germany http://www.spw.uni-koeln.de/

More information

LECTURE - 1 INTRODUCTION TO QUEUING SYSTEM

LECTURE - 1 INTRODUCTION TO QUEUING SYSTEM LECTURE - 1 INTRODUCTION TO QUEUING SYSTEM Learning objective To introduce features of queuing system 9.1 Queue or Waiting lines Customers waiting to get service from server are represented by queue and

More information

How To Understand The Theory Of Computer Science

How To Understand The Theory Of Computer Science Theory of Computation Lecture Notes Abhijat Vichare August 2005 Contents 1 Introduction 2 What is Computation? 3 The λ Calculus 3.1 Conversions: 3.2 The calculus in use 3.3 Few Important Theorems 3.4 Worked

More information

LS.6 Solution Matrices

LS.6 Solution Matrices LS.6 Solution Matrices In the literature, solutions to linear systems often are expressed using square matrices rather than vectors. You need to get used to the terminology. As before, we state the definitions

More information

Solution to Homework 2

Solution to Homework 2 Solution to Homework 2 Olena Bormashenko September 23, 2011 Section 1.4: 1(a)(b)(i)(k), 4, 5, 14; Section 1.5: 1(a)(b)(c)(d)(e)(n), 2(a)(c), 13, 16, 17, 18, 27 Section 1.4 1. Compute the following, if

More information

Exponential Approximation of Multi-Skill Call Centers Architecture

Exponential Approximation of Multi-Skill Call Centers Architecture Exponential Approximation of Multi-Skill Call Centers Architecture Ger Koole and Jérôme Talim Vrije Universiteit - Division of Mathematics and Computer Science De Boelelaan 1081 a - 1081 HV Amsterdam -

More information

Partial Fractions. Combining fractions over a common denominator is a familiar operation from algebra:

Partial Fractions. Combining fractions over a common denominator is a familiar operation from algebra: Partial Fractions Combining fractions over a common denominator is a familiar operation from algebra: From the standpoint of integration, the left side of Equation 1 would be much easier to work with than

More information

Reinforcement Learning

Reinforcement Learning Reinforcement Learning LU 2 - Markov Decision Problems and Dynamic Programming Dr. Joschka Bödecker AG Maschinelles Lernen und Natürlichsprachliche Systeme Albert-Ludwigs-Universität Freiburg jboedeck@informatik.uni-freiburg.de

More information

Sensitivity Analysis 3.1 AN EXAMPLE FOR ANALYSIS

Sensitivity Analysis 3.1 AN EXAMPLE FOR ANALYSIS Sensitivity Analysis 3 We have already been introduced to sensitivity analysis in Chapter via the geometry of a simple example. We saw that the values of the decision variables and those of the slack and

More information

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

More information

MODELING CUSTOMER RELATIONSHIPS AS MARKOV CHAINS. Journal of Interactive Marketing, 14(2), Spring 2000, 43-55

MODELING CUSTOMER RELATIONSHIPS AS MARKOV CHAINS. Journal of Interactive Marketing, 14(2), Spring 2000, 43-55 MODELING CUSTOMER RELATIONSHIPS AS MARKOV CHAINS Phillip E. Pfeifer and Robert L. Carraway Darden School of Business 100 Darden Boulevard Charlottesville, VA 22903 Journal of Interactive Marketing, 14(2),

More information