Assigning Tasks for Efficiency in Hadoop
|
|
- Bernard Chambers
- 8 years ago
- Views:
Transcription
1 Aigning Tak for Efficiency in Hadoop [Extended Abtract] Michael J. Ficher Computer Science Yale Univerity P.O. Box New Haven, CT, USA Xueyuan Su Computer Science Yale Univerity P.O. Box New Haven, CT, USA Yitong Yin State Key Laboratory for Novel Software Technology Nanjing Univerity, China ABSTRACT In recent year Google MapReduce ha emerged a a leading large-cale data proceing architecture. Adopted by companie uch a Amazon, Facebook, Google, IBM and Yahoo! in daily ue, and more recently put in ue by everal univeritie, it allow parallel proceing of huge volume of data over cluter of machine. Hadoop i a free Java implementation of MapReduce. In Hadoop, file are plit into block and replicated and pread over all erver in a network. Each job i alo plit into many mall piece called tak. Several tak are proceed on a ingle erver, and a job i not completed until all the aigned tak are finihed. A crucial factor that affect the completion time of a job i the particular aignment of tak to erver. Given a placement of the input data over erver, one wihe to find the aignment that minimize the completion time. In thi paper, an idealized Hadoop model i propoed to invetigate the Hadoop tak aignment problem. It i hown that there i no feaible algorithm to find the optimal Hadoop tak aignment unle P = N P. Aignment that are computed by the round robin algorithm inpired by the current Hadoop cheduler are hown to deviate from optimum by a multiplicative factor in the wort cae. A flow-baed algorithm i preented that compute aignment that are optimal to within an additive contant. Categorie and Subject Decriptor D.3.2 [Programming Language]: Language Claification concurrent, ditributed, and parallel language; F..2 [Computation by Abtract Device]: Mode of Computation parallelim and concurrency; F..3 [Computation Supported by the Kempner Fellowhip from the Department of Computer Science at Yale Univerity. Supported by the National Science Foundation of China under Grant No Thi work wa done when Yitong Yin wa at Yale Univerity. Permiion to make digital or hard copie of all or part of thi work for peronal or claroom ue i granted without fee provided that copie are not made or ditributed for profit or commercial advantage and that copie bear thi notice and the full citation on the firt page. To copy otherwie, to republih, to pot on erver or to reditribute to lit, require prior pecific permiion and/or a fee. SPAA 0, June 3 5, 200, Thira, Santorini, Greece. Copyright 200 ACM /0/06...$0.00. by Abtract Device]: Complexity Meaure and Clae reducibility and completene; F.2.2 [Analyi of Algorithm and Problem Complexity]: Nonnumerical Algorithm and Problem equencing and cheduling General Term Algorithm, Performance, Theory Keyword tak aignment, load balancing, NP-completene, approximation algorithm, MapReduce, Hadoop. INTRODUCTION. Background The cloud computing paradigm ha recently received ignificant attention in the media. The cloud i a metaphor for the Internet, which i an abtraction for the complex infratructure it conceal. Cloud computing refer to both the application delivered a ervice over the Internet and the hardware and oftware that provide uch ervice. It enviion hifting data torage and computing power away from local erver, acro the network cloud, and into large cluter of machine hoted by companie uch a Amazon, Google, IBM, Microoft, Yahoo! and o on. Google MapReduce [8, 9, 6] parallel computing architecture, for example, plit workload over large cluter of commodity PC and enable automatic parallelization. By exploiting parallel proceing, it provide a oftware platform that let one eaily write and run application that proce vat amount of data. Apache Hadoop [4] i a free Java implementation of MapReduce in the open ource oftware community. It i originally deigned to efficiently proce large volume of data by parallel proceing over commodity computer in local network. In academia, reearcher have adapted Hadoop to everal different architecture. For example, Ranger et al. [8] evaluate MapReduce in multi-core and multi-proceor ytem, Kruijf et al. [7] implement MapReduce on the Cell B.E. proceor architecture, and He et al. [4] propoe a MapReduce framework on graphic proceor. Many related application uing Hadoop have alo been developed to olve variou practical problem.
2 .2 The MapReduce Framework A Hadoop ytem run on top of a ditributed file ytem, called the Hadoop Ditributed File Sytem (HDFS). HDFS uually run on networked commodity PC, where data are replicated and locally tored on hard dik of each machine. To tore and proce huge volume of data et, HDFS typically ue a block ize of 64MB. Therefore, moving computation cloe to the data i a deign goal in the MapReduce framework. In the MapReduce framework, any application i pecified by job. A MapReduce job plit the input data into independent block, which are proceed by the map tak in parallel. Each map tak procee a ingle block coniting of ome number of record. Each record in turn conit of a key/value pair. A map tak applie the uer defined map function to each input key/value pair and produce intermediate key/value pair. The framework then ort the intermediate data, and forward them to the reduce tak via interconnected network. After receiving all intermediate key/value pair with the ame key, a reduce tak execute the uer defined reduce function and produce the output data. Finally, thee output data are written back to the HDFS. In uch a framework, there i a ingle erver, called the mater, that keep track of all job in the whole ditributed ytem. The mater run a pecial proce, called the jobtracker, that i reponible for tak aignment and cheduling for the whole ytem. For the ret of erver that are called the lave, each of them run a proce called the taktracker. The taktracker chedule the everal tak aigned to the ingle erver in a way imilar to a normal operating ytem. The map tak aignment i a vital part that affect the completion time of the whole job. Firt, each reduce tak cannot begin until it receive the required intermediate data from all finihed map tak. Second, the aignment determine the location of intermediate data and the pattern of the communication traffic. Therefore, ome algorithm hould be in place to optimize the tak aignment..3 Related Work Since Kuhn [5] propoed the firt method for the claic aignment problem in 955, variation of the aignment problem have been under extenive tudy in many area [5]. In the claic aignment problem, there are identical number of job and peron. An aignment i a one-to-one mapping from tak to peron. Each job introduce a cot when it i aigned to a peron. Therefore, an optimal aignment minimize the total cot over all peron. In the area of parallel and ditributed computing, when job are proceed in parallel over everal machine, one i intereted in minimizing the maximum proceing time of any machine. Thi problem i ometime called the minimum makepan cheduling problem. Thi problem in general i known to be N P-complete []. Under the Strictly peaking, a map tak in Hadoop ometime procee data that come from two ucceive file block. Thi occur becaue file block do not repect logical record boundarie, o the lat logical record proceed by a map tak might lie partly in the current data block and partly in the ucceeding block, requiring the map tak to acce the ucceeding block in order to fetch the tail end of it lat logical record. identical-machine model, there are ome well-known approximation algorithm. For example, Graham [2] propoed a (2 /n)-approximation algorithm in 966, where n i the total number of machine. Graham [3] propoed another 4/3-approximation algorithm in 969. However, under the unrelated-machine model, thi problem i known to be APXhard, both in term of it offline [7] and online [, 2] approximability. A ome reearcher [3, 4] pointed out, the cheduling mechanim and police that aign tak to erver within the MapReduce framework can have a profound effect on efficiency. An early verion of Hadoop ue a imple heuritic algorithm that greedily exploit data locality. Zaharia, Konwinki and Joeph [9] propoed ome heuritic refinement baed on experimental reult..4 Our Contribution We invetigate tak aignment in Hadoop. In Section 2, we propoe an idealized Hadoop model to evaluate the cot of tak aignment. Baed on thi model, we how in Section 3 that there i no feaible algorithm to find the optimal aignment unle P = N P. In Section 4, we how that tak aignment computed by a imple greedy round-robin algorithm might deviate from the optimum by a multiplicative factor. In Section 5, we preent an algorithm that employ maximum flow and increaing threhold technique to compute tak aignment that are optimal to within an additive contant. 2. PROBLEM FORMALIZATION Definition. A Map-Reduce chema (MR-chema) i a pair (T, S), where T i a et of tak and S i a et of erver. Let m = T and n = S. A tak aignment i a function A: T S that aign each tak t to a erver A(t). 2 Let A = {T S} be the et of all poible tak aignment. An MR-ytem i a triple (T, S, w), where (T, S) i an MRchema and w : T A Q + i a cot function. Intuitively, w(t, A) i the time to perform tak t on erver A(t) in the context of the complete aignment A. The motivation for thi level of generality i that the time to execute a tak t in Hadoop depend not only on the tak and the erver peed, but alo on poible network congetion, which in turn i influenced by the other tak running on the cluter. Definition 2. The load of erver under aignment A i defined a L A = P t:a(t)= w(t, A). The maximum load under aignment A i defined a L A = max L A. The total load under aignment A i defined a H A = P LA. An MR-ytem model a cloud computer where all erver work in parallel. Tak aigned to the ame erver are proceed equentially, wherea tak aigned to different erver run in parallel. Thu, the total completion time of the cloud under tak aignment A i given by the maximum load L A. 2 In an MR-chema, it i common that T S. Therefore in thi paper, unlike the claic aignment problem where an aignment refer to a one-to-one mapping or a permutation [5, 5], we intead ue the notion of many-to-one mapping.
3 Our notion of an MR-ytem i very general and admit arbitrary cot function. To uefully model Hadoop a an MR-ytem, we need a realitic but implified cot model. In Hadoop, the cot of a map tak depend frequently on the location of it data. If the data i on the erver local dik, then the cot (execution time) i coniderably lower than if the data i located remotely and mut be fetched acro the network before being proceed. We make everal implifying aumption. We aume that all tak and all erver are identical, o that for any particular aignment of tak to erver, all tak whoe data i locally available take the ame amount of time w loc, and all tak whoe data i remote take the ame amount of time w rem. However, we do not aume that w rem i contant over all aignment. Rather, we let it grow with the total number of tak whoe data i remote. Thi reflect the increaed data fetch time due to overall network congetion. Thu, w rem(r) i the cot of each remote tak in every aignment with exactly r remote tak. We aume that w rem(r) w loc for all r and that w rem(r) i (weakly) monotone increaing in r. We formalize thee concept below. In each of the following, (T, S) i an MR-chema. Definition 3. A data placement i a relation ρ T S uch that for every tak t T, there exit at leat one erver S uch that ρ(t, ) hold. The placement relation decribe where the input data block are placed. If ρ(t, ) hold, then erver locally tore a replica of the data block that tak t need. Definition 4. We repreent the placement relation ρ by an unweighted bipartite graph, called the placement graph. In the placement graph G ρ = ((T, S), E), T conit of m tak node and S conit of n erver node. There i an edge (t, ) E iff ρ(t, ) hold. Definition 5. A partial aignment α i a partial function from T to S. We regard a partial aignment a a et of ordered pair with pairwie ditinct firt element, o for partial aignment β and α, β α mean β extend α. If S, the retriction of α to i the partial aignment α = α (T {}). Thu, α agree with α for thoe tak that α aign to, but all other tak are unaigned in α. Definition 6. Let ρ be a data placement and β be a partial aignment. A tak t T i local in β if β(t) i defined and ρ(t, β(t)). A tak t T i remote in α if β(t) i defined and ρ(t, β(t)). Otherwie t i unaigned in β. Let l β, r β and u β be the number of local tak, remote tak, and unaigned tak in β, repectively. For any S, let l β be the number of local tak aigned to by β. Let k β = max S l β. Definition 7. Let ρ be a data placement, β be a partial aignment, w loc Q +, and w rem : N Q + uch that w loc w rem(0) w rem() w rem(2).... Let wrem β = w rem(r β + u β ). The Hadoop cot function with parameter ρ, w loc, and w rem( ) i the function w defined by j wloc if t i local in β, w(t, β) = otherwie. w β rem We call ρ the placement of w, and w loc and w rem( ) the local and remote cot of w, repectively. Let K β = k β w loc. The definition of remote cot under a partial aignment β i peimitic. It aume that tak not aigned by β will eventually become remote, and each remote tak will eventually have cot w rem(r β + u β ). Thi definition agree with the definition of remote cot under a complete aignment A, becaue u A = 0 and thu wrem A = w rem(r A +u A ) = w rem(r A ). Since ρ i encoded by mn bit, w loc i encoded by one rational number, and w rem( ) i encoded by m + rational number, the Hadoop cot function w(ρ, w loc, w rem( )) i encoded by mn bit plu m + 2 rational number. Definition 8. A Hadoop MR-ytem (HMR-ytem) i the MR-ytem (T, S, w), where w i the Hadoop cot function with parameter ρ, w loc, and w rem( ). A HMR-ytem i defined by (T, S, ρ, w loc, w rem( )). Problem Hadoop Tak Aignment Problem (HTA). Intance: An HMR-ytem (T, S, ρ, w loc, w rem( )). 2. Objective: Find an aignment A that minimize L A. Sometime the cot of running a tak on a erver only depend on the placement relation and it data locality, but not on the aignment of other tak. Definition 9. A Hadoop cot function w i called uniform if w rem(r) = c for ome contant c and all r N. A uniform HMR-ytem (UHMR-ytem) i an HMR-ytem (T, S, ρ, w loc, w rem( )), where w i uniform. Problem 2 Uniform Hadoop Tak Aignment Problem (UHTA). Intance: A UHMR-ytem (T, S, ρ, w loc, w rem( )). 2. Objective: Find an aignment A that minimize L A. The number of replica of each data block may be bounded, often by a mall number uch a 2 or 3. Definition 0. Call a placement graph G = ((T, S), E) j- replica-bounded if the degree of t i at mot j for all t T. A j-replica-bounded-uhmr-ytem (j-uhmr-ytem) i a UHMR-ytem (T, S, ρ, w loc, w rem( )), where G ρ i j-replicabounded. Problem 3 j-uniform Hadoop Tak Aignment Problem (j-uhta). Intance: A j-uhmr-ytem (T, S, ρ, w loc, w rem( )). 2. Objective: Find an aignment A that minimize L A. 3. HARDNESS OF TASK ASSIGNMENT In thi ection, we analyze the hardne of the variou HTA optimization problem by howing the correponding deciion problem to be N P-complete.
4 3. Tak Aignment Deciion Problem Definition. Given a erver capacity k, a tak aignment A i k-feaible if L A k. An HMR-ytem i k- admiible if there exit a k-feaible tak aignment. The deciion problem correponding to a cla of HMRytem and capacity k ak whether a given HMR-ytem in the cla i k-admiible. Thu, the k-hta problem ak about arbitrary HMR-ytem, the k-uhta problem ak about arbitrary UHMR-ytem, and the k-j-uhta problem (which we write (j, k)-uhta) ak about arbitrary j- UHMR-ytem. 3.2 N P-completene of (2,3)-UHTA The (2,3)-UHTA problem i a very retricted ubcla of the general k-admiibility problem for HMR-ytem. In thi ection, we retrict even further by taking w loc = and w rem = 3. Thi problem repreent a imple cenario where the cot function aume only the two poible value and 3, each data block ha at mot 2 replica, and each erver ha capacity 3. Depite it obviou implicity, we how that (2,3)-UHTA i N P-complete. It follow that all of the le retritive deciion problem are alo N P-complete, and the correponding optimization problem do not have feaible olution unle P = N P. Theorem 3.. (2, 3)-UHTA with cot w loc = and w rem = 3 i N P-complete. The proof method i to contruct a polynomial-time reduction from 3SAT to (2,3)-UHTA. Let G be the et of all 2-replica-bounded placement graph. Given G ρ G, we define the HMR-ytem M G = (T, S, ρ, w loc, w rem( )), where w loc = and w rem(r) = 3 for all r. We ay that G i 3-admiible if M G i 3-admiible. We contruct a polynomial-time computable mapping f : 3CNF G, and how that a 3CNF formula φ i atifiable iff f(φ) i 3- admiible. We horten 3-admiible to admiible in the following dicuion. We firt decribe the contruction of f. Let φ = C C 2 C α be a 3CNF formula, where each C u = (l u l u2 l u3) i a claue and each l uv i a literal. Let x,, x β be the variable that appear in φ. Therefore, φ contain exactly 3α intance of literal, each of which i either x i or x i, where i [, β]. 3 Let ω be the maximum number of occurrence of any literal in φ. Table ummarize the parameter of φ. Table : Parameter of the 3CNF φ claue (C u) α variable (v i) β literal (l uv) 3α max-occur of any literal ω For example, in φ = (x x 2 x 3) (x x 4 x 5) ( x x 4 x 6), we have α = 3, β = 6, and ω = 2 ince x occur twice. Given φ, we contruct the correponding placement graph G which comprie everal dijoint copie of the three type of gadget decribed below, connected together with additional edge. The firt type of gadget i called a claue gadget. Each claue gadget u contain a claue erver C u, three literal 3 The notation [a,b] in our dicuion repreent the et of integer {a, a +,, b, b}. tak l u, l u2, l u3 and an auxiliary tak a u. There i an edge between each of thee tak and the claue erver. Since φ contain α claue, G contain α claue gadget. Thu, G contain α claue erver, 3α literal tak and α auxiliary tak. Figure decribe the tructure of the u-th claue gadget. We ue circle and boxe to repreent tak and erver, repectively. l u l u2 l u3 a u Figure : The tructure of the u-th claue gadget. The econd type of gadget i called a variable gadget. Each variable gadget contain 2ω ring erver placed around a circle. Let R (i) j denote the erver at poition j [, 2ω] in ring i. Define the et T i to be the erver in odd-numbered poition. Similarly, define the et F i to be the erver in even-numbered poition. Between each pair of ring erver R (i) j and R (i) j+, we place a ring tak r(i) j connected to it two neighboring erver. To complete the circle, r (i) 2ω i connected to R (i) 2ω and R(i). There are alo ω variable tak v(i) j : j [, ω] in ring i, but they do not connect to any ring erver. Since φ contain β variable, G contain β variable gadget. Thu, G contain 2βω ring erver, 2βω ring tak and βω variable tak. Figure 2 decribe the tructure of the i-th variable gadget. R2 T i r2 F i F i R T i T i r F i F i C u T i R 2 R 3 r 2 v v 2 (i) v Figure 2: The tructure of the i-th variable gadget. The third type of gadget i called a ink gadget. The ink gadget contain a ink erver P and three ink tak p, p 2, p 3. Each ink tak i connected to the ink erver. G only contain one ink gadget. Figure 3 decribe the tructure of the ink gadget. There are alo ome inter-gadget edge in G. We connect
5 p p 2 P auxiliary tak), and each tak i local to C u. Thu, the load i at mot 3. The ink erver i aigned three local ink tak and the load i exactly 3. Therefore, all contraint are atified and A i feaible. Thi complete the proof of Lemma 3.4. p 3 Figure 3: The tructure of the ink gadget. each variable tak v (i) j to the ink erver P. We alo connect each literal tak l uv to a unique ring erver R (i) j. To be more precie, if literal l uv i the j-th occurrence of x i in φ, connect the literal tak l uv to ring erver R (i) 2j Ti; if literal luv i the j-th occurrence of x i in φ, connect the literal tak l uv to ring erver R (i) 2j Fi. Thee inter-gadget edge complete the graph G. Table 2 ummarize the parameter of G. Table 2: Parameter of the HMR-graph G claue erver C u α literal tak l uv 3α auxiliary tak a u α ring erver R (i) j 2βω ring tak r (i) j 2βω variable tak v (i) j βω ink erver P ink tak p j 3 Lemma 3.2. For any φ 3CNF, the graph f(φ) i 2- replica-bounded. Proof. We count the number of edge from each tak node in f(φ). Each claue tak ha 2 edge, each auxiliary tak ha edge, each ring tak ha 2 edge, each variable tak ha edge, and each ink tak ha edge. Therefore, f(φ) i 2-replica-bounded. The following lemma i immediate. Lemma 3.3. The mapping f : 3CNF G i polynomialtime computable. Lemma 3.4. If φ i atifiable, then G = f(φ) i admiible. Proof. Let σ be a atifying truth aignment for φ, and we contruct a feaible aignment A in G = f(φ). Firt of all, aign each ink tak to the ink erver, i.e., let A(p i) = P for all i [, 3]. Then aign each auxiliary tak a u to the claue erver C u, i.e., let A(a u) = C u for all u [, α]. If σ(x i) = true, then aign ring tak r (i) j : j [, 2ω] to ring erver in T i, variable tak v (i) j : j [, ω] to ring erver in F i. If σ(x i) = fale, then aign ring tak r (i) j : j [, 2ω] to ring erver in F i, variable tak v (i) j : j [, ω] to ring erver in T i. If literal l uv = x i and σ(x i) = true, then aign tak l uv to it local ring erver in T i. If literal l uv = x i and σ(x i) = fale, then aign tak l uv to it local ring erver in F i. Otherwie, aign tak l uv to it local claue erver C u. We then check thi tak aignment i feaible. Each ring erver i aigned either at mot three local tak (two ring tak and one literal tak), or one remote variable tak. In either cae, the load doe not exceed the capacity 3. The number of tak aigned to each claue erver C u i exactly the number of fale literal in C u under σ plu one (the The proof of the convere of Lemma 3.4 i more involved. The method i given a feaible aignment A in G = f(φ), we firt contruct a feaible aignment B in G uch that B(t) P for all t T {p, p 2, p 3}. Then we remove the ink tak and the ink erver from further conideration and conider the reulting graph G. After that, we partition G into two ubgraph, and contruct a feaible aignment B uch that no tak from one partition are remotely aigned to erver in the other partition. Thi tep involve a cae analyi. Finally, a natural way of contructing the atifying truth aignment for φ follow. Lemma 3.5. Let A be a feaible tak aignment. Then there exit a feaible tak aignment B uch that B(t) P for all t T {p, p 2, p 3}. Proof. When A atifie that A(t) P for all t T {p, p 2, p 3}, let B = A. Otherwie, aume there exit a tak t uch that A(t ) = P and t T {p, p 2, p 3}. Since the capacity of P i 3, there i at leat one ink tak, ay p, i not aigned to P. Let A(p ) = Q. Since ρ(p, Q) doe not hold, Q ha only been aigned p and L A Q = 3. Let B(p ) = P and B(t ) = Q. Repeat the ame proce for all tak other than p, p 2, p 3 that are aigned to P in A. Then let B(t) = A(t) for the remaining tak t T. To ee B i feaible, note that L B L A 3 for all erver S. Let G be the ubgraph induced by (T {p, p 2, p 3}, S {P }) = (T, S ). We have the following lemma. Lemma 3.6. Let A be a feaible tak aignment in G. Then there exit a feaible tak aignment A in G. Proof. Given A, Lemma 3.5 tell u that there exit another feaible aignment B in G uch that B(t) P for all t T. Let A (t) = B(t) for all t T. Then A i an aignment in G ince A (t) S {P } for all t T. To ee A i feaible, note that L A L B 3 for all erver S. We further partition G into two ubgraph G C and G R. G C i induced by node {C u : u [, α]} {a u : u [, α]} {l uv : u [, α], v [, 3]} and G R i induced by node {R (i) j {v (i) j : i [, β], j [, 2ω]} {r (i) j : i [, β], j [, 2ω]} : i [, β], j [, ω]}. In other word, G C conit of all claue gadget while G R conit of all variable gadget. If a tak in one partition i remotely aigned to a erver in the other partition, we call thi tak a cro-boundary tak. Let n A c be the number of cro-boundary tak that are in G C and aigned to erver in G R by A, n A r be the number of cro-boundary tak that are in G R and aigned to erver in G C by A. We have the following lemma. Lemma 3.7. Let A be a feaible aignment in G uch that n A c > 0 and n A r > 0. Then there exit a feaible aignment B in G uch that one of n B c and n B r equal n A c n A r and the other one equal 0.
6 Proof. Aume t i G C, i G R and A(t i) = i; t i G R, i G C and A(t i) = i. Then each of i and i i aigned one remote tak. Let B(t i) = i and B(t i) = i, and then L B i L A i = 3 and L B LA i = 3. Thi proce decreae n c and n r each by one, and the reulting aignment i i alo feaible. Repeat the ame proce until the maller one of n c and n r become 0. Then let B(t) = A(t) for all the remaining tak t T. It i obviou that B i feaible, and one of n B c and n B r equal n A c n A r and the other one equal 0. Lemma 3.8. Let A be a feaible aignment in G uch that n A c = 0. Then n A r = 0. Proof. For the ake of contradiction, aume t i G R, i G C and A(t i) = i. For each erver j G C, there i one auxiliary tak a u : u [, α] uch that ρ(a u, j) hold. Since w loc = and w rem = 3, if A i feaible then A(a u) A(a v) for u v. Since there are α auxiliary tak and α erver in G C, one erver i aigned exactly one auxiliary tak. Since A(t i) = i, L A i + 3 > 3, contradicting the fact that A i feaible. Therefore, there i no t i G R and i G C uch that A(t i) = i. Thu, n A r = 0. Lemma 3.9. Let A be a feaible aignment in G uch that n A r = 0. Then n A c = 0. Proof. For the ake of contradiction, aume t i G C, i G R and A(t i) = i. Let k 0, k, k 2, k 3 denote the number of ring erver filled to load 0,, 2, 3, repectively. From the total number of erver in G R, we have k 0 + k + k 2 + k 3 = 2βω () Similarly, from the total number of tak in G R, we have 0 k 0 + k + 2 k 2 + k 3 = 3βω (2) Subtracting () from (2) give k 2 = βω + k 0. Aigning both neighboring ring tak to the ame ring erver fill it to load 2. Since there are only 2βω ring erver, we have k 2 βω. Hence, k 0 = 0 and k 2 = βω. Thi implie that all ring tak are aigned to ring erver in alternating poition in each ring. There are βω remaining ring erver and βω variable tak. Therefore, a variable tak i remotely aigned to one of the remaining ring erver by A. Now conider the erver i that ha been remotely aigned t i G C. If it i aigned two ring tak, it load i L A i = 2+3 > 3. If it i aigned one variable tak, it load i L A i = > 3. A i not feaible in either cae. Therefore, there i no t i G C and i G R uch that A(t i) = i. Thu, n A c = 0. Now we prove the following Lemma. Lemma 3.0. If G = f(φ) i admiible, then φ i atifiable. Proof. Given feaible tak aignment A in G = f(φ), we contruct the atifying truth aignment σ for φ. From Lemma 3.6, 3.7, 3.8 and 3.9, we contruct a feaible aignment B in G, uch that n B c = n B r = 0, and in each variable gadget i, either erver in T i or erver in F i are aturated by variable tak. If ring erver in F i are aturated by variable tak, let σ(x i) = true. If ring erver in T i are aturated by variable tak, let σ(x i) = fale. To check that thi truth aignment i a atifying aignment, note that for the three literal tak l u, l u2, l u3, at mot two of them are aigned to the claue erver C u. There mut be one literal tak, ay l uv, that i locally aigned to a ring erver. In thi cae, σ(l uv) = true and thu the claue σ(c u) = true. Thi fact hold for all claue and thu indicate that σ(φ) = σ( V C u) = true. Thi complete the proof of Lemma 3.0. Finally we prove the main theorem. Proof of Theorem 3.. Lemma 3.3, 3.4 and 3.0 etablih that 3SAT p (2,3)-UHTA via f. Therefore, (2,3)- UHTA i N P-hard. It i eay to ee that (2,3)-UHTA N P becaue in time O(mn) a nondeterminitic Turing machine could gue the aignment and accept iff the maximum load under the aignment doe not exceed 3. Therefore, (2, 3)- UHTA i N P-complete. 4. A ROUND ROBIN ALGORITHM In thi ection, we analyze a imple round robin algorithm for the UHTA problem. Algorithm i inpired by the Hadoop cheduler algorithm. It can over each erver in a round robin fahion. When aigning a new tak to a erver, Algorithm trie heuritically to exploit data locality. Since we have not pecified the order of aigned tak, Algorithm may produce many poible output (aignment). Algorithm The round robin algorithm exploring locality. : input: a et of unaigned tak T, a lit of erver {, 2,, n}, a placement relation ρ 2: define i a an index variable 3: define A a an aignment 4: A(t) = (tak t i unaigned) for all t 5: while exit unaigned tak do 6: if exit unaigned tak t uch that ρ(t, i ) hold then 7: update A by aigning A(t) = i 8: ele 9: pick any unaigned tak t, update A by aigning A(t ) = i 0: end if : i (i mod n) + 2: end while 3: output: aignment A Algorithm i analogou to the Hadoop cheduler algorithm up to core verion 0.9. There are three difference, though. Firt, the Hadoop algorithm aume three kind of placement: data-local, rack-local and rack-remote, wherea Algorithm aume only two: local and remote. Second, the Hadoop cheduler work incrementally rather than aigning all tak initially. Lat, the Hadoop algorithm i determinitic, wherea Algorithm i nondeterminitic. Theorem 4.. If w rem > w loc, increaing the number of data block replica may increae the maximum load of the aignment computed by Algorithm. Proof. The number of edge in the placement graph i equal to the number of data block replica, and thu adding a new edge in the placement graph i equivalent to adding a new replica in the ytem. Conider the imple placement graph G where m = n, and there i an edge between tak t i and i for all i n. Running Algorithm give an aignment A in which tak t i i aigned to i for all
7 i n, and thu L A = w loc. Now we add one edge between tak t n and erver. We run Algorithm on thi new placement graph G to get aignment A. It might aign tak t n to erver in the firt tep. Following that, it aign t i to i for 2 i n, and it finally aign t to n. Since t i remote to n, thi give L A = w rem. Therefore L A > L A. Theorem 4. indicate that increaing the number of data block replica i not alway beneficial for Algorithm. In the remaining part of thi ection, we how that the aignment computed by Algorithm might deviate from the optimum by a multiplicative factor. In the following, let O be an aignment that minimize L O. Theorem 4.2. Let A be an aignment computed by Algorithm. Then L A (w rem/w loc ) L O. Proof. On the one hand, pigeonhole principle ay there i a erver aigned at leat m/n tak. Since the cot of each tak i at leat w loc, the load of thi erver i at leat m/n w loc. Thu, L O m/n w loc. On the other hand, Algorithm run in a round robin fahion where one tak i aigned at a time. Therefore, the number of tak aigned to each erver i at mot m/n. Since the cot of each tak i at mot w rem, the load of a erver i at mot m/n w rem. Thu, L A m/n w rem. Combining the two, we have L A (w rem/w loc ) L O. Theorem 4.3. Let T and S be uch that m n(n 2). There exit a placement ρ and an aignment A uch that A i a poible output of Algorithm, L A m/n w rem, and L O = m/n w loc. Proof. We prove the theorem by contructing a placement graph G ρ. Partition the et T of tak into n dijoint ubet T i : i n, uch that m/n T i T j m/n for all i j n. Now in the placement graph G ρ, connect tak in T i to erver i, for all i n. Thee et of edge guarantee that L O = m/n w loc. We then connect each tak in T n to a different erver in the ubet S = {, 2,, n }. Since m n(n 2), we have m/n m/n + n, which guarantee S T n. Thi complete the placement graph G ρ. Now run Algorithm on G ρ. There i a poible output A where tak in T n are aigned to erver in S. In that cae, all tak that are local to erver n are aigned elewhere, and thu n i aigned remote tak. Since n i aigned at leat m/n tak, thi give L A m/n w rem. When n m, the lower bound in Theorem 4.3 matche the upper bound in Theorem A FLOW-BASED ALGORITHM Theorem 3. how that the problem of computing an optimal tak aignment for the HTA problem i N P-complete. Neverthele, it i feaible to find tak aignment whoe load i at mot an additive contant greater than the optimal load. We preent uch an algorithm in thi ection. For two partial aignment α and β uch that β α, we define a new notation called virtual load from α below. Definition 2. For any tak t and partial aignment β that extend α, let j v α wloc if t i local in β, (t, β) = otherwie. w α rem The P virtual load of erver under β from α i V β,α = t:β(t)= vα (t, β). The maximum virtual load under β from α i V β,α = max S V β,α. Thu, v aume peimitically that tak not aigned by β will eventually become remote, and each remote tak will eventully have cot wrem. α When α i clear from context, we omit α and write v(t, β), V β and V β, repectively. Note that v α (t, α) = w(t, α) a in Definition 7. Algorithm 2 work iteratively to produce a equence of aignment and then output the bet one, i.e., the one of leat maximum erver load. The iteration i controlled by an integer variable τ which i initialized to and incremented on each iteration. Each iteration conit of two phae, max-cover and bal-aign: Max-cover: Given a input a placement graph G ρ, an integer value τ, and a partial aignment α, max-cover return a partial aignment α of a ubet T of tak, uch that α aign no erver more than τ tak, every tak in T i local in α, and T i maximized over all uch aignment. Thu, α make a many tak local a i poible without aigning more than τ tak to any one erver. The name max-cover follow the intuition that we are actually trying to cover a many tak a poible by their local erver, ubject to the contraint that no erver i aigned more than τ tak. Bal-aign: Given a input a et of tak T, a et of erver S, a partial aignment α computed by maxcover, and a cot function w, bal-aign ue a imple greedy algorithm to extend α to a complete aignment B by repeatedly chooing a erver with minimal virtual load and aigning ome unaigned tak to it. Thi continue until all tak are aigned. It thu generate a equence of partial aignment α = α 0 α α u = B, where u = u α. Every tak t aigned in balaign contribute v α (t, B) w α rem to the virtual load of the erver that it i aigned to. At the end, w B rem w α rem, and equality hold only when r B = r α + u α. The atute reader might feel that it i intellectually attractive to ue real erver load a the criterion to chooe erver in bal-aign becaue it embed more accurate information. We do not know if thi change ever reult in a better aignment. We do know that it may require more computation. Whenever a local tak i aigned, r + u decreae by, o the remote cot w rem(r + u) may alo decreae. If it doe, the load of all erver that have been aigned remote tak mut be recomputed. In the current verion of the algorithm, we do not need to update virtual load when a local tak i aigned becaue the virtual cot of remote tak never change in the coure of bal-aign. 5. Algorithm Decription We decribe Algorithm 2 in greater detail here. 5.. Max-cover Max-cover (line 6 of Algorithm 2) augment the partial aignment α τ computed by the previou iteration to produce α τ. (We define α 0 to be the empty partial aignment.) Thu, α τ α τ, and α τ maximize the total number of local tak aigned ubject to the contraint that no erver i aigned more than τ tak in all.
8 Algorithm 2 A flow-baed algorithm for HTA. : input: an HMR-ytem (T, S, ρ, w loc, w rem( )) 2: define A, B a aignment 3: define α a a partial aignment 4: α(t) = (tak t i unaigned) for all t 5: for τ = to m do 6: α max-cover(g ρ, τ, α) 7: B bal-aign(t, S, α, w loc, w rem( )) 8: end for 9: et A equal to a B with leat maximum load 0: output: aignment A The core of the max-cover phae i an augmenting path algorithm by Ford and Fulkeron [0]. The Ford-Fulkeron algorithm take a input a network with edge capacitie and an exiting network flow, and output a maximum flow that repect the capacity contraint. A fact about thi algorithm i well-known [6, 0]. Fact 5.. Given a flow network with integral capacitie and an initial integral -t flow f, the Ford-Fulkeron algorithm compute an integral maximum -t flow f in time O( E ( f f )), where E i the number of edge in the network and f i the value of the flow f, i.e., the amount of flow paing from the ource to the ink. During the max-cover phae at iteration τ, the input placement graph G ρ i firt converted to a correponding flow network G ρ. G ρ include all node in G ρ and an extra ource u and an extra ink v. In G ρ, there i an edge (u, t) for all t T and an edge (, v) for all S. All of the original edge (t, ) in G ρ remain in G ρ. The edge capacity i defined a follow: edge (, v) ha capacity τ for all S, while all the other edge have capacity. Therefore, for any pair of (t, ), if there i a flow through the path u t v, the value of thi flow i no greater than. Then the input partial aignment α i converted into a network flow f α a follow: if tak t i aigned to erver in the partial aignment α, aign one unit of flow through the path u t v. The Ford-Fulkeron algorithm i then run on graph G ρ with flow f α to find a maximum flow f α. From Fact 5., we know that the Ford-Fulkeron algorithm take time O( E ( f α f α )) in thi iteration. Thi output flow f α at iteration τ will act a the input flow to the Ford-Fulkeron algorithm at iteration τ +. The flow network at iteration τ + i the ame a the one at iteration τ except that each edge (, v) ha capacity τ + for all S. Thi incremental ue of Ford-Fulkeron algorithm in ucceive iteration help reduce the time complexity of the whole algorithm. At the end of the max-cover phae, the augmented flow f α i converted back into a partial aignment α. If there i one unit of flow through the path u t v in f α, we aign tak t i to erver in α. Thi converion from a network flow to a partial aignment can alway be done, becaue the flow i integral and all edge between tak and erver have capacity. Therefore, there i a one-to-one correpondence between a unit flow through the path u t v and the aignment of tak t to it local erver. It follow that f α = l α. By Fact 5., the Ford-Fulkeron algorithm compute a maximum flow that repect the capacity contraint τ. Thu, the following lemma i immediate. Lemma 5.2. Let α τ be the partial aignment computed by max-cover at iteration τ, and β be any partial aignment uch that k β τ. Then l ατ l β Bal-aign Definition 3. Let β and β be partial aignment, t a tak and a erver. We ay that β t: β i a tep that aign t to if t i unaigned in β and β = β {(t, )}. We ay β β i a tep, if β t: β for ome t and. A equence of tep α = α 0 α... α u i a trace if for each i [, u], if α i t: α i i a tep, then V α i,α V α i,α for all. Given two partial aignment α i and α i in a trace uch t: that α i α i, it follow that V α i,α V α i,α + wrem α V α i,α = V α i,α for all The following lemma i immediate. Lemma 5.3. Let u = u ατ and α τ = α0 τ α τ αu τ be a equence of partial aignment generated by balaign at iteration τ. Thi equence i a trace that end in a complete aignment B τ = αu. τ 5.2 Main Reult It i obviou that Algorithm 2 i optimal for n = ince only one aignment i poible. Now we how that for n 2, Algorithm 2 compute, in polynomial time, aignment that are optimal to within an additive contant. The reult i formally tated a Theorem 5.4. Theorem 5.4. Let n 2. Given an HMR-ytem with m tak and n erver, Algorithm 2 compute an aignment A in time O(m 2 n) uch that L A L O + w O n rem. Lemma 5.5. Algorithm 2 run in time O(m 2 n). Proof. By Fact 5., we know that the Ford-Fulkeron algorithm take time O( E f ) to augment the network flow by f. At iteration τ =, max-cover take time O( E f ), where f n. Then at iteration τ = 2, max-cover take time O( E ( f 2 f )), where f 2 2n. The ame proce i repeated until f m = m. The total running time of max-cover for all iteration thu add up to O( E ( f + f 2 f + f 3 f f m )) = O( E f m ) = O( E m) = O(m 2 n). We implement the greedy algorithm in the bal-aign phae with a priority queue. Since there are n erver, each operation of the priority queue take O(log n) time. During the bal-aign phae at each iteration, at mot m tak need to be aigned. Thi take time O(m log n). The total running time of bal-aign for all iteration i thu O(m 2 log n). Combining the running time of the two phae for all iteration give time complexity O(m 2 n). Lemma 5.5 ugget the max-cover phae i the main contributor to the time complexity of Algorithm 2. However, in a typical Hadoop ytem, the number of replica for each data block i a mall contant, ay 2 or 3. Then the degree of each t G i bounded by thi contant. In thi cae, the placement graph G i pare and E = O(m + n). A a reult, max-cover run in time O(m(m + n)). Therefore the bal-aign phae might become the main contributor to the time complexity.
9 5.2. Propertie of optimal aignment In order to prove the approximation bound, we firt etablih ome propertie of optimal aignment. Definition 4. Given an HMR-ytem, let O be the et of all optimal aignment, i.e., thoe that minimize the maximum load. Let r min = min{r A A O} and let O = {O O r O = r min}. Lemma 5.6. Let O O. If l O = k O, then r O = 0 and L O = K O. Proof. Let l O = k O for ome erver. Aume to the contrary that r O. Then L O K O + wrem. O Let t be a remote tak aigned to by O. By definition 3, ρ(t, ) hold for at leat one erver. Cae : ha at leat one remote tak t. Then move t to and t to. Thi reult in another aignment B. B i till optimal becaue L B L O, L B LO, and LB = LO for any other erver S {, }. Cae 2: ha only local tak. By the definition of k O, ha at mot k O local tak aigned by O. Then move t to. Thi reult in another aignment B. B i till optimal becaue L B < L O, L B = KO + w loc K O + w rem L O, and L B = LO for any other erver S {, }. In either cae, we have hown the new aignment i in O. However, ince t become local in the new aignment, fewer remote tak are aigned than in O. Thi contradict that O O. Thu, i aigned no remote tak, o L O = k O w loc = K O. Definition 5. Let O O. Define M O = HO K O n. Lemma 5.7. L O M O. Proof. Let be a erver of maximal local load in O, o k O = k O. Let S 2 = S { }. By Lemma 5.6, L O = K O. The total load on S 2 i P S 2 L O = H O K O, o the average load on S 2 i M O. Hence, L O max S2 L O avg S2 L O = M O Analyzing the algorithm Aume throughout thi ection that O O and α = α 0 α... α u = B i a trace generated by iteration τ = k O of the algorithm. Virtual load are all baed on α, o we generally omit explicit mention of α in the upercript of v and V. Lemma 5.8. w loc w B rem w α rem w O rem. Proof. w loc w B rem follow from the definition of a Hadoop cot function. Becaue B α, r B r α + u α. By Lemma 5.2, l α l O, o r α + u α = m l α m l O = r O. Hence, w rem(r B ) w rem(r α + u α ) w rem(r O ) by monotonicity of w rem( ). It follow by definition of the w β rem notation that w B rem w α rem w O rem. Lemma 5.9. k α = k O. Proof. k α k O becaue no erver i aigned more than τ local tak by max-cover at iteration τ = k O. For ake of contradiction, aume k α < k O. Then u α > 0, becaue otherwie α = B and L B = k α w loc < K O L O, violating the optimality of O. Let t be an unaigned tak in α. By definition, ρ(t, ) hold for ome erver. Aign t to in α to obtain a new partial aignment β. We have k β k α + k O = τ. By Lemma 5.2, l α l β, contradicting the fact that l β = l α +. We conclude that k α = k O. Lemma 5.0. L B V B. Proof. By definition, L B = P B t:b(t)= w(t, B) and V = P t:b(t)= v(t, B). By Lemma 5.8, wb rem wrem, α and thu w(t, B) v(t, B). It follow that S, L B V B. Therefore L B V B, becaue L B = max L B and V B = V B = max V B. For the remainder of thi ection, let be a erver uch that l α = k O. Such a erver exit by Lemma 5.9. Let S 2 = S { } be the et of remaining erver. For a partial aignment β α, define N β to be the average virtual load under β of the erver in S 2. Formally, N β = P S 2 V β S 2 = lβ w loc + r β w α rem V β n To obtain the approximation bound, we compare N β with the imilar quantity M O for the optimal aignment. For convenience, we let δ = w O rem/(n ). Lemma 5.. Let β = α i t: α i+ = β. Then V β N β M O δ. Proof. Proof i by a counting argument. By Lemma 5.9, we have k α = k O, o l β l α = k O. Hence, V β K O. By Lemma 5.2, we have l α l O. Let d = l β l O. d 0 becaue l β l α l O. Becaue l β +r β +u β = m = l O +r O, we have r β +u β +d = r O. Alo, u β ince t i unaigned in β. Then by Lemma 5.8, (n )N β = l β w loc + r β wrem α V β = (l O + d)w loc + (r O u β d)wrem α V β l O w loc + (r O u β )wrem O K O (n )M O w O rem. Hence, N β M O δ. Now, ince β i part of a trace, we have V β V β for all S. In particular, V β N β, ince N β i the average virtual load of all erver in S 2. We conclude that V β N β M O δ. Proof of Theorem 5.4. Lemma 5.5 how that the time complexity of Algorithm 2 i O(m 2 n). Now we finih the proof for the approximation bound. Let be a erver of maximum virtual load in B, o V B = V B. Let i be the mallet integer uch that α i = B, that i, no more tak are aigned to in the ubtrace beginning with α i. Cae : i = 0: Then l α 0 k α 0 = k O by Lemma 5.9, and r α 0 = 0, o V B = V α 0 K O. Hence, V B K O L O. Cae 2: i > 0: Then β = α i α i = β for ome tak t. By lemma 5., V β M O δ, o uing Lemma 5.8, V β V β Then by Lemma 5.7, t: + w α rem M O δ + w O rem. V B = V B = V β M O + w O rem δ L O + w O rem δ. Both cae imply that V B L O + wrem O δ. By Lemma 5.0, we have L B V B. Becaue the algorithm chooe an aignment with leat maximum load a the output A, we have L A L B. Hence, L A L O + wrem O δ = L O + «wrem O n
10 6. CONCLUSION In thi paper, we preent an algorithmic tudy of the tak aignment problem in the Hadoop MapReduce framework and propoe a mathematical model to evaluate the cot of tak aignment. Baed on thi model, we how that it i infeaible to find the optimal aignment unle P = N P. Theorem 3. how that the tak aignment problem in Hadoop remain hard even if all erver have equal capacity of 3, the cot function only ha 2 value in it range, and each data block ha at mot 2 replica. Second, we analyze the imple round robin algorithm for the UHTA problem. Theorem 4. reveal that the intuition i wrong that increaing the number of replica alway help load balancing. Uing round robin tak aignment, adding more replica into the ytem can ometime reult in wore maximum load. Theorem 4.2 and 4.3 how there could be a multiplicative gap in maximum load between the optimal aignment and the aignment computed by Algorithm. Third, we preent Algorithm 2 for the general HTA problem. Thi algorithm employ maximum flow and increaing threhold technique. Theorem 5.4 how that the aignment computed by Algorithm 2 are optimal to within an additive contant that depend only on the number of erver and the remote cot function. There are many intereting direction for future work. We have ketched a proof of a matching lower bound to Theorem 5.4 for a cla of Hadoop cot function. We plan to preent thi reult in followup work. Sharing a MapReduce cluter between multiple uer i becoming popular and ha led to recent development of multi-uer multi-job cheduler uch a fair cheduler and capacity cheduler. We plan to analyze the performance of uch cheduler and ee if the optimization technique from thi paper can be applied to improve them. 7. ACKNOWLEDGMENTS We would like to thank Avi Silberchatz, Daniel Abadi, Kamil Bajda-Pawlikowki, and Azza Abouzeid for their inpiring dicuion. We are alo grateful to the anonymou referee for providing many ueful uggetion that ignificantly improved the quality of our preentation. 8. REFERENCES [] J. Apne, Y. Azar, A. Fiat, S. Plotkin, and O. Waart. On-line routing of virtual circuit with application to load balancing and machine cheduling. Journal of the ACM, 44(3): , 997. [2] Y. Azar, J. S. Naor, and R. Rom. The competitivene of on-line aignment. In Proceeding of the 3rd Annual ACM-SIAM ympoium on Dicrete algorithm, page SIAM Philadelphia, PA, USA, 992. [3] K. Birman, G. Chockler, and R. van Renee. Toward a cloud computing reearch agenda. SIGACT New, 40(2):68 80, [4] E. Bortnikov. Open-ource grid technologie for web-cale computing. SIGACT New, 40(2):87 93, [5] R. E. Burkard. Aignment problem: Recent olution method and application. In Sytem Modelling and Optimization: Proceeding of the 2th IFIP Conference, Budapet, Hungary, September 2-6, 985, page Springer, 986. [6] T. Cormen, C. Leieron, R. Rivet, and C. Stein. Introduction to algorithm, 2nd ed. MIT pre Cambridge, MA, 200. [7] M. de Kruijf and K. Sankaralingam. MapReduce for the Cell B. E. architecture. Univerity of Wiconin Computer Science Technical Report CS-TR-2007, 625, [8] J. Dean. Experience with MapReduce, an abtraction for large-cale computation. In Proceeding of the 5th International Conference on Parallel Architecture and Compilation Technique. ACM New York, NY, USA, [9] J. Dean and S. Ghemawat. MapReduce: Simplified data proceing on large cluter. Proceeding of the 6th Sympoium on Operating Sytem Deign and Implementation, San Francico, CA, page 37 50, [0] L. R. Ford and D. R. Fulkeron. Maximal flow through a network. Canadian Journal of Mathematic, 8(3): , 956. [] M. R. Garey, D. S. Johnon, et al. Computer and Intractability: A Guide to the Theory of NP-completene. Freeman San Francico, 979. [2] R. L. Graham. Bound for certain multiproceing anomalie. Bell Sytem Technical Journal, 45(9):563 58, 966. [3] R. L. Graham. Bound on multiproceing timing anomalie. SIAM Journal on Applied Mathematic, page , 969. [4] B. He, W. Fang, Q. Luo, N. K. Govindaraju, and T. Wang. Mar: A MapReduce framework on graphic proceor. In Proceeding of the 7th International Conference on Parallel Architecture and Compilation Technique, page ACM New York, NY, USA, [5] H. W. Kuhn. The Hungarian method for the aignment problem. Naval Reearch Logitic, 52(), Originally appeared in Naval Reearch Logitic Quarterly, 2, 955, [6] R. Lämmel. Google MapReduce programming model Reviited. Science of Computer Programming, 68(3): , [7] J. K. Lentra, D. B. Shmoy, and E. Tardo. Approximation algorithm for cheduling unrelated parallel machine. Mathematical Programming, 46():259 27, 990. [8] C. Ranger, R. Raghuraman, A. Penmeta, G. Bradki, and C. Kozyraki. Evaluating MapReduce for multi-core and multiproceor ytem. In Proceeding of the 2007 IEEE 3th International Sympoium on High Performance Computer Architecture, page IEEE Computer Society Wahington, DC, USA, [9] M. Zaharia, A. Konwinki, A. D. Joeph, R. Katz, and I. Stoica. Improving MapReduce performance in heterogeneou environment. In Proceeding of the 8th Sympoium on Operating Sytem Deign and Implementation, San Diego, CA, 2008.
Partial optimal labeling search for a NP-hard subclass of (max,+) problems
Partial optimal labeling earch for a NP-hard ubcla of (max,+) problem Ivan Kovtun International Reearch and Training Center of Information Technologie and Sytem, Kiev, Uraine, ovtun@image.iev.ua Dreden
More informationQueueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,
MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS
More informationDISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection
More informationA note on profit maximization and monotonicity for inbound call centers
A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an
More informationDISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com
More informationScheduling of Jobs and Maintenance Activities on Parallel Machines
Scheduling of Job and Maintenance Activitie on Parallel Machine Chung-Yee Lee* Department of Indutrial Engineering Texa A&M Univerity College Station, TX 77843-3131 cylee@ac.tamu.edu Zhi-Long Chen** Department
More informationA Note on Profit Maximization and Monotonicity for Inbound Call Centers
OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright
More informationControl of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling
Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada
More informationA Spam Message Filtering Method: focus on run time
, pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department
More informationEfficient Fault-Tolerant Infrastructure for Cloud Computing
Abstract Efficient Fault-Tolerant Infrastructure for Cloud Computing Xueyuan Su 2014 Cloud computing is playing a vital role for processing big data. The infrastructure is built on top of large-scale clusters
More informationFEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS
Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC
More informationCluster-Aware Cache for Network Attached Storage *
Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,
More informationOnline story scheduling in web advertising
Online tory cheduling in web advertiing Anirban Dagupta Arpita Ghoh Hamid Nazerzadeh Prabhakar Raghavan Abtract We tudy an online job cheduling problem motivated by toryboarding in web advertiing, where
More informationGroup Mutual Exclusion Based on Priorities
Group Mutual Excluion Baed on Prioritie Karina M. Cenci Laboratorio de Invetigación en Sitema Ditribuido Univeridad Nacional del Sur Bahía Blanca, Argentina kmc@c.un.edu.ar and Jorge R. Ardenghi Laboratorio
More informationA Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks
A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International
More informationA technical guide to 2014 key stage 2 to key stage 4 value added measures
A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool
More informationSCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto
More informationPerformance of Multiple TFRC in Heterogeneous Wireless Networks
Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding
More informationCASE STUDY BRIDGE. www.future-processing.com
CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION
More informationMaximizing Acceptance Probability for Active Friending in Online Social Networks
Maximizing for Active Friending in Online Social Network De-Nian Yang, Hui-Ju Hung, Wang-Chien Lee, Wei Chen Academia Sinica, Taipei, Taiwan The Pennylvania State Univerity, State College, Pennylvania,
More informationAlgorithms for Advance Bandwidth Reservation in Media Production Networks
Algorithm for Advance Bandwidth Reervation in Media Production Network Maryam Barhan 1, Hendrik Moen 1, Jeroen Famaey 2, Filip De Turck 1 1 Department of Information Technology, Ghent Univerity imind Gaton
More informationUnit 11 Using Linear Regression to Describe Relationships
Unit 11 Uing Linear Regreion to Decribe Relationhip Objective: To obtain and interpret the lope and intercept of the leat quare line for predicting a quantitative repone variable from a quantitative explanatory
More informationDUE to the small size and low cost of a sensor node, a
1992 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 10, OCTOBER 2015 A Networ Coding Baed Energy Efficient Data Bacup in Survivability-Heterogeneou Senor Networ Jie Tian, Tan Yan, and Guiling Wang
More informationINFORMATION Technology (IT) infrastructure management
IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, MAY 214 1 Buine-Driven Long-term Capacity Planning for SaaS Application David Candeia, Ricardo Araújo Santo and Raquel Lope Abtract Capacity Planning
More informationBi-Objective Optimization for the Clinical Trial Supply Chain Management
Ian David Lockhart Bogle and Michael Fairweather (Editor), Proceeding of the 22nd European Sympoium on Computer Aided Proce Engineering, 17-20 June 2012, London. 2012 Elevier B.V. All right reerved. Bi-Objective
More informationAssessing the Discriminatory Power of Credit Scores
Aeing the Dicriminatory Power of Credit Score Holger Kraft 1, Gerald Kroiandt 1, Marlene Müller 1,2 1 Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Gottlieb-Daimler-Str. 49, 67663 Kaierlautern,
More informationSocially Optimal Pricing of Cloud Computing Resources
Socially Optimal Pricing of Cloud Computing Reource Ihai Menache Microoft Reearch New England Cambridge, MA 02142 t-imena@microoft.com Auman Ozdaglar Laboratory for Information and Deciion Sytem Maachuett
More informationRedesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring
Redeigning Rating: Aeing the Dicriminatory Power of Credit Score under Cenoring Holger Kraft, Gerald Kroiandt, Marlene Müller Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Thi verion: June
More informationNETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET
Chapter 1 NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET S. Srivatava Univerity of Miouri Kana City, USA hekhar@conrel.ice.umkc.edu S. R. Thirumalaetty now
More informationEfficient Fault-Tolerant Infrastructure for Cloud Computing
Efficient Fault-Tolerant Infrastructure for Cloud Computing Xueyuan Su Candidate for Ph.D. in Computer Science, Yale University December 2013 Committee Michael J. Fischer (advisor) Dana Angluin James Aspnes
More informationGraph Analyi I Network Meaure of the Networked Adaptive Agents
Uing Graph Analyi to Study Network of Adaptive Agent Sherief Abdallah Britih Univerity in Dubai, United Arab Emirate Univerity of Edinburgh, United Kingdom hario@ieee.org ABSTRACT Experimental analyi of
More information1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation
Proceeding on Privacy Enhancing Technologie 2015; 2015 (2):1 17 Reza Shokri* Privacy Game: Optimal Uer-Centric Data Obfucation Abtract: Conider uer who hare their data (e.g., location) with an untruted
More informationProject Management Basics
Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management
More informationUtility-Based Flow Control for Sequential Imagery over Wireless Networks
Utility-Baed Flow Control for Sequential Imagery over Wirele Networ Tomer Kihoni, Sara Callaway, and Mar Byer Abtract Wirele enor networ provide a unique et of characteritic that mae them uitable for building
More informationRisk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms
Rik Management for a Global Supply Chain Planning under Uncertainty: Model and Algorithm Fengqi You 1, John M. Waick 2, Ignacio E. Gromann 1* 1 Dept. of Chemical Engineering, Carnegie Mellon Univerity,
More informationName: SID: Instructions
CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/
More informationREDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.
International Journal of Advanced Technology & Engineering Reearch (IJATER) REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND Abtract TAGUCHI METHODOLOGY Mr.
More informationQueueing Models for Multiclass Call Centers with Real-Time Anticipated Delays
Queueing Model for Multicla Call Center with Real-Time Anticipated Delay Oualid Jouini Yve Dallery Zeynep Akşin Ecole Centrale Pari Koç Univerity Laboratoire Génie Indutriel College of Adminitrative Science
More informationControl Theory based Approach for the Improvement of Integrated Business Process Interoperability
www.ijcsi.org 201 Control Theory baed Approach for the Improvement of Integrated Buine Proce Interoperability Abderrahim Taoudi 1, Bouchaib Bounabat 2 and Badr Elmir 3 1 Al-Qualadi Reearch & Development
More informationTRADING rules are widely used in financial market as
Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a
More informationDistributed Monitoring and Aggregation in Wireless Sensor Networks
Ditributed Monitoring and Aggregation in Wirele Senor Network Changlei Liu and Guohong Cao Department of Computer Science & Engineering The Pennylvania State Univerity E-mail: {chaliu, gcao}@ce.pu.edu
More informationTwo Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL
Excerpt from the Proceeding of the COMSO Conference 0 India Two Dimenional FEM Simulation of Ultraonic Wave Propagation in Iotropic Solid Media uing COMSO Bikah Ghoe *, Krihnan Balaubramaniam *, C V Krihnamurthy
More informationA Review On Software Testing In SDlC And Testing Tools
www.ijec.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Iue -9 September, 2014 Page No. 8188-8197 A Review On Software Teting In SDlC And Teting Tool T.Amruthavalli*,
More informationMobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN
Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic
More informationMANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) *
MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) * Praanna Padmanabhan School of Computer Science The Univerity of Oklahoma Norman OK, USA praannap@yahoo-inc.com Dr. Le Gruenwald
More informationMSc Financial Economics: International Finance. Bubbles in the Foreign Exchange Market. Anne Sibert. Revised Spring 2013. Contents
MSc Financial Economic: International Finance Bubble in the Foreign Exchange Market Anne Sibert Revied Spring 203 Content Introduction................................................. 2 The Mone Market.............................................
More informationTap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms
Tap Into Smartphone Demand: Mobile-izing Enterprie Webite by Uing Flexible, Open Source Platform acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Tap Into Smartphone Demand:
More informationRO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds
!111! 111!ttthhh IIIEEEEEEEEE///AAACCCMMM IIInnnttteeerrrnnnaaatttiiiooonnnaaalll SSSyyymmmpppoooiiiuuummm ooonnn CCCllluuuttteeerrr,,, CCClllooouuuddd aaannnddd GGGrrriiiddd CCCooommmpppuuutttiiinnnggg
More informationCHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY
Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad
More informationResearch Article An (s, S) Production Inventory Controlled Self-Service Queuing System
Probability and Statitic Volume 5, Article ID 558, 8 page http://dxdoiorg/55/5/558 Reearch Article An (, S) Production Inventory Controlled Self-Service Queuing Sytem Anoop N Nair and M J Jacob Department
More informationIn this paper, we investigate toll setting as a policy tool to regulate the use of roads for dangerous goods
Vol. 43, No. 2, May 2009, pp. 228 243 in 0041-1655 ein 1526-5447 09 4302 0228 inform doi 10.1287/trc.1080.0236 2009 INFORMS Toll Policie for Mitigating Hazardou Material Tranport Rik Patrice Marcotte,
More informationProfitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations
Proceeding of the 0 Indutrial Engineering Reearch Conference T. Doolen and E. Van Aken, ed. Profitability of Loyalty Program in the Preence of Uncertainty in Cutomer Valuation Amir Gandomi and Saeed Zolfaghari
More informationAuction-Based Resource Allocation for Sharing Cloudlets in Mobile Cloud Computing
1 Auction-Baed Reource Allocation for Sharing Cloudlet in Mobile Cloud Computing A-Long Jin, Wei Song, Senior Member, IEEE, and Weihua Zhuang, Fellow, IEEE Abtract Driven by pervaive mobile device and
More informationAvailability of WDM Multi Ring Networks
Paper Availability of WDM Multi Ring Network Ivan Rado and Katarina Rado H d.o.o. Motar, Motar, Bonia and Herzegovina Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, Univerity
More information2. METHOD DATA COLLECTION
Key to learning in pecific ubject area of engineering education an example from electrical engineering Anna-Karin Cartenen,, and Jonte Bernhard, School of Engineering, Jönköping Univerity, S- Jönköping,
More informationBidding for Representative Allocations for Display Advertising
Bidding for Repreentative Allocation for Diplay Advertiing Arpita Ghoh, Preton McAfee, Kihore Papineni, and Sergei Vailvitkii Yahoo! Reearch. {arpita, mcafee, kpapi, ergei}@yahoo-inc.com Abtract. Diplay
More informationPerformance of a Browser-Based JavaScript Bandwidth Test
Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further
More informationSELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE
SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE RAVI KUMAR G 1, C.MUTHUSAMY 2 & A.VINAYA BABU 3 1 HP Bangalore, Reearch Scholar JNTUH, Hyderabad, India, 2 Yahoo, Bangalore,
More informationOptical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng
Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare
More informationAbstract parsing: static analysis of dynamically generated string output using LR-parsing technology
Abtract paring: tatic analyi of dynamically generated tring output uing LR-paring technology Kyung-Goo Doh 1, Hyunha Kim 1, David A. Schmidt 2 1 Hanyang Univerity, Anan, South Korea 2 Kana State Univerity,
More informationApigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management
Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4
More informationAN OVERVIEW ON CLUSTERING METHODS
IOSR Journal Engineering AN OVERVIEW ON CLUSTERING METHODS T. Soni Madhulatha Aociate Preor, Alluri Intitute Management Science, Warangal. ABSTRACT Clutering i a common technique for tatitical data analyi,
More informationBenchmarking Bottom-Up and Top-Down Strategies for SPARQL-to-SQL Query Translation
Benchmarking Bottom-Up and Top-Down Strategie for SPARQL-to-SQL Query Tranlation Kahlev a, Chebotko b,c, John Abraham b, Pearl Brazier b, and Shiyong Lu a a Department of Computer Science, Wayne State
More informationTransmission Scheduling for Multi-Channel Satellite and Wireless Networks
Tranmiion Scheduling for ulti-channel Satellite and Wirele Network Anand Ganti, Eytan odiano, John N. Titikli aachuett Intitute of Technology e-mail: aganti@mit.edu, modiano@mit.edu, jnt@mit.edu Abtract
More informationChapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS
Chapter Stoc and Their Valuation ANSWERS TO EN-OF-CHAPTER QUESTIONS - a. A proxy i a document giving one peron the authority to act for another, typically the power to vote hare of common toc. If earning
More informationCASE STUDY ALLOCATE SOFTWARE
CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT
More informationDistributed, Secure Load Balancing with Skew, Heterogeneity, and Churn
Ditributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Jonathan Ledlie and Margo Seltzer Diviion of Engineering and Applied Science Harvard Univerity Abtract Numerou propoal exit for load
More informationSoftware Engineering Management: strategic choices in a new decade
Software Engineering : trategic choice in a new decade Barbara Farbey & Anthony Finkeltein Univerity College London, Department of Computer Science, Gower St. London WC1E 6BT, UK {b.farbey a.finkeltein}@ucl.ac.uk
More informationAuction Mechanisms Toward Efficient Resource Sharing for Cloudlets in Mobile Cloud Computing
1 Auction Mechanim Toward Efficient Reource Sharing for Cloudlet in Mobile Cloud Computing A-Long Jin, Wei Song, Ping Wang, Duit Niyato, and Peijian Ju Abtract Mobile cloud computing offer an appealing
More informationSHARESYNC SECURITY FEATURES
www.kyboxinnovation.com SHARESYNC SECURITY FEATURES ShareSync provide a high degree of ecurity and protection which allow adminitrator to: Aure compliance with ecurity bet practice Get full viibility over
More informationLinear energy-preserving integrators for Poisson systems
BIT manucript No. (will be inerted by the editor Linear energy-preerving integrator for Poion ytem David Cohen Ernt Hairer Received: date / Accepted: date Abtract For Hamiltonian ytem with non-canonical
More informationMECH 2110 - Statics & Dynamics
Chapter D Problem 3 Solution 1/7/8 1:8 PM MECH 11 - Static & Dynamic Chapter D Problem 3 Solution Page 7, Engineering Mechanic - Dynamic, 4th Edition, Meriam and Kraige Given: Particle moving along a traight
More informationMixed Method of Model Reduction for Uncertain Systems
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol 4 No June Mixed Method of Model Reduction for Uncertain Sytem N Selvaganean Abtract: A mixed method for reducing a higher order uncertain ytem to a table reduced
More informationTHE IMPACT OF MULTIFACTORIAL GENETIC DISORDERS ON CRITICAL ILLNESS INSURANCE: A SIMULATION STUDY BASED ON UK BIOBANK ABSTRACT KEYWORDS
THE IMPACT OF MULTIFACTORIAL GENETIC DISORDERS ON CRITICAL ILLNESS INSURANCE: A SIMULATION STUDY BASED ON UK BIOBANK BY ANGUS MACDONALD, DELME PRITCHARD AND PRADIP TAPADAR ABSTRACT The UK Biobank project
More informationManaging Customer Arrivals in Service Systems with Multiple Servers
Managing Cutomer Arrival in Service Sytem with Multiple Server Chrito Zacharia Department of Management Science, School of Buine Adminitration, Univerity of Miami, Coral Gable, FL 3346. czacharia@bu.miami.edu
More informationCost Models for Selecting Materialized Views in Public Clouds
International Journal of Data Warehouing and Mining, 0(4), -25, October-December 204 Cot Model for Selecting Materialized View in ublic Cloud Romain erriot, Clermont Univerité, Univerité Blaie acal, Aubière
More informationImproving the Performance of Web Service Recommenders Using Semantic Similarity
Improving the Performance of Web Service Recommender Uing Semantic Similarity Juan Manuel Adán-Coello, Carlo Miguel Tobar, Yang Yuming Faculdade de Engenharia de Computação, Pontifícia Univeridade Católica
More informationSector Concentration in Loan Portfolios and Economic Capital. Abstract
Sector Concentration in Loan Portfolio and Economic Capital Klau Düllmann and Nancy Machelein 2 Thi verion: September 2006 Abtract The purpoe of thi paper i to meaure the potential impact of buine-ector
More informationPekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T
Pekka Helkiö, 58490K Antti Seppälä, 63212W Oi Syd, 63513T Table of Content 1. Abtract...1 2. Introduction...2 2.1 Background... 2 2.2 Objective and Reearch Problem... 2 2.3 Methodology... 2 2.4 Scoping
More information! Search engines are highly profitable. n 99% of Google s revenue from ads. n Yahoo, bing also uses similar model
Search engine Advertiement The Economic of Web Search! Search engine are highly profitable Revenue come from elling ad related to querie 99% of Google revenue from ad Yahoo, bing alo ue imilar model CS315
More informationHealth Insurance and Social Welfare. Run Liang. China Center for Economic Research, Peking University, Beijing 100871, China,
Health Inurance and Social Welfare Run Liang China Center for Economic Reearch, Peking Univerity, Beijing 100871, China, Email: rliang@ccer.edu.cn and Hao Wang China Center for Economic Reearch, Peking
More informationNetwork Architecture for Joint Failure Recovery and Traffic Engineering
Network Architecture for Joint Failure Recovery and Traffic Engineering Martin Suchara Dept. of Computer Science Princeton Univerity, NJ 08544 muchara@princeton.edu Dahai Xu AT&T Lab Reearch Florham Park,
More informationGrowth and Sustainability of Managed Security Services Networks: An Economic Perspective
Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,
More informationA Duality Model of TCP and Queue Management Algorithms
A Duality Model of TCP and Queue Management Algorithm Steven H. Low CS and EE Department California Intitute of Technology Paadena, CA 95 low@caltech.edu May 4, Abtract We propoe a duality model of end-to-end
More informationLECTURE 2. TURÁN S THEOREM : BIPARTITE GRAPHS
LECTURE 2. TURÁN S THEOREM : BIPARTITE GRAPHS. Complete bipartite graph.. Kövari-Só-Turán theorem. When H i a bipartite graph, i.e., when χ(h) = 2, Erdő and Stone theorem aert that π H = 0. In other word,
More informationAcceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds
Acceleration-Diplacement Crah Pule Optimiation A New Methodology to Optimie Vehicle Repone for Multiple Impact Speed D. Gildfind 1 and D. Ree 2 1 RMIT Univerity, Department of Aeropace Engineering 2 Holden
More informationTIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME
TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME RADMILA KOCURKOVÁ Sileian Univerity in Opava School of Buine Adminitration in Karviná Department of Mathematical Method in Economic Czech Republic
More informationyour Rights Consumer Guarantees Understanding Consumer Electronic Devices, Home Appliances & Home Entertainment Products
Conumer Guarantee Undertanding your Right Conumer Electronic Device, Home Appliance & Home Entertainment Product Voluntary Warranty Guide February 2014 JB Hi-Fi Group Pty Ltd (ABN 37 093 II4 286) The Autralian
More informationHUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * Michael Spagat Royal Holloway, University of London, CEPR and Davidson Institute.
HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * By Michael Spagat Royal Holloway, Univerity of London, CEPR and Davidon Intitute Abtract Tranition economie have an initial condition of high human
More informationModule 8. Three-phase Induction Motor. Version 2 EE IIT, Kharagpur
Module 8 Three-phae Induction Motor Verion EE IIT, Kharagpur Leon 33 Different Type of Starter for Induction Motor (IM Verion EE IIT, Kharagpur Inructional Objective Need of uing arter for Induction motor
More informationComparison of Scheduling Algorithms for a Multi-Product Batch-Chemical Plant with a Generalized Serial Network
Comparion of Scheduling Algorithm for a Multi-Product Batch-Chemical Plant with a Generalized Serial Network Niem-Trung L. Tra Thei ubmitted to the faculty of the Virginia Polytechnic Intitute and State
More informationv = x t = x 2 x 1 t 2 t 1 The average speed of the particle is absolute value of the average velocity and is given Distance travelled t
Chapter 2 Motion in One Dimenion 2.1 The Important Stuff 2.1.1 Poition, Time and Diplacement We begin our tudy of motion by conidering object which are very mall in comparion to the ize of their movement
More informationA New Optimum Jitter Protection for Conversational VoIP
Proc. Int. Conf. Wirele Commun., Signal Proceing (Nanjing, China), 5 pp., Nov. 2009 A New Optimum Jitter Protection for Converational VoIP Qipeng Gong, Peter Kabal Electrical & Computer Engineering, McGill
More informationMobility Improves Coverage of Sensor Networks
Mobility Improve Coverage of Senor Networ Benyuan Liu Dept. of Computer Science Univerity of Maachuett-Lowell Lowell, MA 1854 Peter Bra Dept. of Computer Science City College of New Yor New Yor, NY 131
More informationHow Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal
How Enterprie Can Build Integrated Digital Marketing Experience Uing Drupal acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 How Enterprie Can Build Integrated Digital Marketing
More informationMulti-Objective Optimization for Sponsored Search
Multi-Objective Optimization for Sponored Search Yilei Wang 1,*, Bingzheng Wei 2, Jun Yan 2, Zheng Chen 2, Qiao Du 2,3 1 Yuanpei College Peking Univerity Beijing, China, 100871 (+86)15120078719 wangyileipku@gmail.com
More informationCLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON MAPREDUCE FRAMEWORK
CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON MAPREDUCE FRAMEWORK Sheela Gole 1 and Bharat Tidke 2 1 Department of Computer Engineering, Flora Intitute of Technology, Pune,
More informationA Life Contingency Approach for Physical Assets: Create Volatility to Create Value
A Life Contingency Approach for Phyical Aet: Create Volatility to Create Value homa Emil Wendling 2011 Enterprie Rik Management Sympoium Society of Actuarie March 14-16, 2011 Copyright 2011 by the Society
More informationBrand Equity Net Promoter Scores Versus Mean Scores. Which Presents a Clearer Picture For Action? A Non-Elite Branded University Example.
Brand Equity Net Promoter Score Veru Mean Score. Which Preent a Clearer Picture For Action? A Non-Elite Branded Univerity Example Ann Miti, Swinburne Univerity of Technology Patrick Foley, Victoria Univerity
More informationSupport Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data.
The Sixth International Power Engineering Conference (IPEC23, 27-29 November 23, Singapore Support Vector Machine Baed Electricity Price Forecating For Electricity Maret utiliing Projected Aement of Sytem
More information