Integrating Multimedia Applications in Hard Real-Time Systems
|
|
- Elmer May
- 6 years ago
- Views:
Transcription
1 Integrating Multimedia Applications in Hard Real-Time Systems Luca Abeni and Giorgio Buttazzo Scuola Superiore S. Anna, Pisa Abstract Tis paper focuses on te problem of providing efficient run-time support to multimedia applications in a real-time system, were two types of tass can coexist simultaneously: multimedia soft real-time tass and ard real-time tass. Hard tass are guaranteed based on worst case execution times and minimum interarrival times, wereas multimedia and soft tass are served based on mean parameters. Te paper describes a server-based mecanism for sceduling soft and multimedia tass witout jeopardizing te a priori guarantee of ard real-time activities. Te performance of te proposed metod is compared wit tat of similar service mecanisms troug extensive simulation experiments and several multimedia applications ave been implemented on te HARTIK ernel. 1. Introduction Continuous Media (CM) activities, suc as audio and video streams, need real-time support because of teir sensitivity to delay and jitter. On te oter and, owever, te use of a ard real-time system for andling CM applications can be inappropriate for te following reasons: If a multimedia tas manages compressed frames, te time for coding/decoding eac frame can vary significantly, ence te worst case execution time (WCET) of te tas can be muc bigger tan its mean execution time. Since ard real-time tass are guaranteed based on teir WCET (and not based on mean execution times), CM applications can cause a waste of te CPU resource. Providing a precise estimation of WCETs is very difficult even for tose applications always running on te same ardware. Tis problem is even more critical for multimedia applications, wic in general can run on a large number of different macines (tin of a video conferencing system running on several different PC worstations). Wen data are received from an external device (for instance, a communication networ) te interarrival time of te tass tat process suc data may not be deterministic, so it may be impossible to determine a minimum interarrival time for suc tass. As a consequence, no a priori guarantee can be performed. Advanced multimedia systems tend to be more dynamic tan classical real-time systems, so all te sceduling metodologies devised for static real-time systems are not suited for CM applications. For te reasons mentioned above, a large part of te multimedia community continues to use classical operating systems, as Unix or Windows, to manage CM. Recently, some sceduling algoritms ave been proposed [16, 6] to mix some form of real-time support wit a notion of fairness, but tey do not mae use of conventional real-time teory. Since we are interested in systems based on a conventional RT sceduler (suc as EDF or RM), we do not consider tis ind of solutions. In [8], Jeffay presents a ard real-time system based on EDF sceduling to be used as a test bed for video conference applications; te system can guarantee eac tas at its creation time based on its WCET and its minimum interarrival time. Wile a bound for te WCET can be found, te interarrival time may not ave a lower bound, because of te unpredictability of te networ (wic may even reverse te order of messages at te reception site). For tis reason, Jeffay in [7] introduces te Rate-Based Execution (RBE) tas model, wic is independent from te minimum interarrival time. Altoug tis ind of tas cannot be guaranteed to complete witin a given deadline, it is possible to guarantee tat it will not jeopardize te scedulability of oter ard real-time tass present in te system. In [12], Mercer, Savage, and Touda propose a sceme based on CPU capacity reserves, were a fraction of te CPU bandwidt is reserved to eac tas. A reserve is a couple (C i ;T i ) indicating tat a tas i can execute for at most C i units of time in eac period T i. Tis approac removes te need of nowing te WCET of eac tas, because it fixes te maximum time tat eac tas can execute in its X/98 $1. (c) 1998 IEEE
2 period. Since te periodic sceduler is based on te Rate Monotonic algoritm, te classical scedulability analysis can be applied to guarantee ard tass, if tey are present. Te only problem wit tis metod is tat overload situations on multimedia tass are not andled efficiently. In fact, if a tas instance executes for more tan C i units of time, te remaining portion of te instance is sceduled in bacground, prolonging its completion of an unpredictable time. In [9], Kaneo et al. propose a sceme based on a periodic process (te multimedia server) dedicated to te service of all multimedia requests. Tis allows to nicely integrate multimedia tass togeter wit ard real-time tass; owever, being te server only one, it is not easy to control te QoS of eac tas. In [3], Liu and Deng describe a sceduling ierarcy wic allows ard real-time, soft real-time, and non realtime applications to coexist in te same system, and to be created dynamically. According to tis approac, wic uses te EDF sceduling algoritm as a low-level sceduler, eac application is andled by a dedicated server, wic can be a Constant Utilization Server [4] for tass tat do not use nonpreemptable sections or global resources, and a Total Bandwidt Server [13, 15] for te oter tass. Tis solution can be used to isolate te effects of overloads at te application level, rater tan at te tas level. Moreover, te metod requires te nowledge of te WCET even for soft and non real-time tass. In tis paper, we propose a sceduling metodology based on reserving a fraction of te processor bandwidt to eac tas (in a way similar to processor capacity reserves of Mercer et al.[12]). However, to efficiently andle te problem of tas overloads, eac tas is sceduled by a dedicated server, wic does not require te nowledge of te WCET and assigns a suitable deadline to te served tas wenever te reserved time is consumed. Te rest of te paper is organized as follows: Section 2 specifies our notation, definitions and basic assumptions; Section 3 describes our sceduling sceme in detail and its formal properties; Section 4 compares te proposed algoritm wit oter server mecanisms, and presents some simulation results; Section 5 describes an implementation of te proposed algoritm on te HARTIK ernel and sows some experimental results; and, finally, Section 6 presents our conclusions and future wor. 2. Terminology and assumptions We consider a system consisting of tree types of tass: ard, soft, and non real-time tass. Any tas i consists of a sequence of jobs J i;j,werer i;j denotes te arrival time (or request time) of te j t job of tas i. A ard real-time tas is caracterized by two additional parameters, (C i ;T i ),werec i is te WCET of eac job and T i is te minimum interarrival time between successive jobs, so tat r i;j+1 r i;j +T i. Te system must provide an a priori guarantee tat all jobs of a ard tas must complete before a given deadline d i;j. In our model, te absolute deadline of eac ard job J i;j is implicitly set at te value d i;j r i;j + T i. A soft real-time tas is also caracterized by te parameters (C i ;T i ), owever te timing constraints are more relaxed. In particular, for a soft tas, C i represents te mean execution time of eac job, wereas T i represents te desired activation period between successive jobs. For eac soft job J i;j, a soft deadline is set at time d i;j r i;j + T i. Since mean values are used for te computation time and minimum interarrival times are not nown, soft tass cannot be guaranteed a priori. In multimedia applications, soft deadline misses may decrease te QoS, but do not cause critical system faults. Te objective of te system is to minimize te mean tardiness of soft tass, witout jeopardizing te scedulability of te ard tass. Te tardiness E i;j of a job J i;j is defined as E i;j maxf; f i;j, d i;j g (1) were f i;j is te finising time of job J i;j. Finally, a periodic tas is a tas (ard or soft) in wic te interarrival time between successive jobs is exactly equal to T i for all jobs (r i;j+1 r i;j + T i ). Periodic tass do not ave special treatment in tis model. Tass tat manage CM can be modeled as soft real-time tass, because missing deadlines may decrease te QoS witout causing catastropic consequences. Moreover, CM activities are typically caracterized by igly variable execution times, causing te WCET to be muc greater tan te mean execution time. For te reasons mentioned above, treating CM tass as ard real-time tass is not appropriate, firstly because an underestimation of te WCET would compromise te guarantee done on te oter tass, and secondly because it would be very inefficient, since trying to guarantee a tas wit a WCET muc greater tan its mean execution time would cause a waste of te CPU resource. Tis problem can be solved by a bandwidt reservation strategy, wic assigns eac soft tas a maximum bandwidt, calculated using te mean execution time and te desired activation period, in order to increase CPU utilization. If a tas needs more tan its reserved bandwidt, it may slow down, but it will not jeopardize te scedulability of te ard real-time tass. By isolating te effects of tas overloads, ard tass can be guaranteed using classical scedulability analysis [11]. To integrate ard and soft tass in te same system, ard tass are sceduled by te EDF algoritm based on teir absolute deadlines, wereas eac soft tas is andled by a ded-
3 icated server, te Constant Bandwidt Server (), wose beavior and properties are described in te next section. 3. Te Constant Bandwidt Server Te service mecanisms tat ave inspired tis wor are te Dynamic Sporadic Server (DSS) [13, 5] and te Total Bandwidt Server (TBS) [13, 15]. As te DSS, te guarantees tat, if U s is te fraction of processor time assigned to a server (i.e., its bandwidt), its contribution to te total utilization factor is no greater tan U s,eveninte presence of overloads. Notice tat tis property is not valid for a TBS, nor for a Constant Utilization Server (CUS) [4], wose actual contributions are limited by U s only under te assumption tat all te served jobs execute no more tan te declared WCET. Wit respect to te DSS, owever, te sows a muc better performance, comparable wit te one acievable by a TBS Definition of Te can be defined as follows: A is caracterized by a budget c s and by a ordered pair (Q s ;T s ),wereq s is te maximum budget and T s is te period of te server. Te ratio U s Q s T s is denoted as te server bandwidt. At eac instant, a fixed deadline d s; is associated wit te server. At te beginning d s;. Eac served job J i;j is assigned a dynamic deadline d i;j equal to te current server deadline d s;. Wenever a served job executes, te budget c s is decreased by te same amount. Wen c s, te server budget is recarged to te maximum value Q s and a new server deadline is generated as d s;+1 d s; + T s. Notice tat tere are no finite intervals of time in wic te budget is equal to zero. A is said to be active at time t if tere are pending jobs (remember te budget c s is always greater tan ); tat is, if tere exists a served job J i;j suc tat r i;j t<f i;j. A is said to be idle at time t if it is not active. Wen a job J i;j arrives and te server is active te request is enqueued in a queue of pending jobs according to a given (arbitrary) non-preemptive discipline (e.g., FIFO). Wen a job J i;j arrives and te server is idle, if c s (d s;, r i;j )U s te server generates a new deadline d s;+1 r i;j + T s and c s is recarged to te maximum value Q s, oterwise te job is served wit te last server deadline d s; using te current budget. Wen a job finises, te next pending job, if any, is served using te current budget and deadline. If tere are no pending jobs, te server becomes idle. At any instant, a job is assigned te last deadline generated by te server. Figure 1 illustrates an example in wic a ard periodic tas, 1, is sceduled togeter wit a soft tas, 2, served by a aving a budget Q s 2and a period T s 7.Te first job of 2 arrives at time r 1 2, wen te server is idle. Being c s (d s;, r 1 )U s, te job is assigned te deadline d s;1 r 1 + T s 9and c s is recarged at Q s 2. At time t 1 6, te budget is exausted, so a new deadline d s;2 d s;1 + T s 16isgenerated and c s is replenised. At time r 2, te second job arrives wen te server is active, so te request is enqueued. Wen te first job finises, te second job is served wit te actual server deadline (d s;2 16). At time t 2 12, te server budget is exausted so a new server deadline d s;3 d s;2 + t s 23isgenerated and c s is replenised to Q s. Te tird job arrives at time r 3 17, wen te server is idle and c s 1 < (d s;3, r 3 )U s (23, 17) 2 1:71, so it is sceduled wit te actual server 7 deadline d s;3 witout canging te budget. It is wort to notice tat under a a job J j is assigned an absolute time-varying deadline d j wic can be postponed if te tas requires more tan te reserved bandwidt. Tus, eac job J j can be tougt as consisting of a number of cuns H j;, eac caracterized by a release time a j; and a fixed deadline d j;. An example of cuns produced by a is sown in Figure 2. To simplify te notation, we will indicate all te cuns generated by a server wit an increasing index (in te example of Figure 2, H 1;1 H 1 ; H 1;2 H 2, H 2;1 H 3 andsoon). In order to provide a formal definition of te, let a and d be te release time and te deadline of te t cun generated by te server, and let c and n be te actual server budget and te number of pending requests in te server queue (including te request currently being served). Tese variables are initialized as follows: d c n Using tis notation, te server beavior can be described by te algoritm sown in Figure properties Te proposed service mecanism presents some interesting properties tat mae it suitable for supporting CM applications. Te most important one, te isolation property, is formally expressed by te following teorem.
4 τ1 (2,3) τ2 HARD SOFT (2,7) c13 c22 d1 d2 c31 r1 r2 r3 t d3 t t1 t2 t3 t Figure 1. An example of sceduling. H 1,1 d1,1 d1,2 d 2,1 d2,2 H 1,2 H 2,1 H 2,2 a 1,1 a 1,2 a 2,1 a 2,2 J1 c4 J2 c4 Figure 2. Example of jobs divided to cuns. Teorem 1 Given a set of n periodic ard tass wit processor utilization U p and a wit processor utilization U s, te wole set is scedulable by EDF if and only if U p + U s 1: and it is sceduled wit a budget Q s C i. Moreover, since c i;j Q s, eac job finises no later tan te budget is exausted, ence te deadline assigned to a job does not cange and is exactly te same as te one used by EDF. 2 Proof. See [1]. 2 Te isolation property allows us to use a bandwidt reservation strategy to allocate a fraction of te CPU time to soft tass wose computation time cannot be easily bounded. Te most important consequence of tis result is tat suc tass can be sceduled togeter wit ard tass witout affecting te a priori guarantee, even in te case in wic soft requests exceed te expected load. In addition to te isolation property, te as te following caracteristics. Te beaves as a plain EDF if te served tas i as parameters (C i ;T i ) suc tat C i Q s and T i T s. Tis is formally stated by te following lemma. Lemma 1 A ard tas i wit parameters (C i ;T i )is scedulable by a wit parameters Q s C i and T s T i if and only if i is scedulable wit EDF. Proof. For any job of a ard tas we ave tat r i;j+1, r i;j T i and c i;j Q s. Hence, by definition of te, eac ard job is assigned a deadline d i;j r i;j + T i Te automatically reclaims any spare time caused by early completions. Tis is due to te fact tat wenever te budget is exausted, it is always immediately replenised at its full value and te server deadline is postponed. In tis way, te server remains eligible and te budget can be exploited by te pending requests wit te current deadline. Tis is te main difference wit respect to te processor capacity reserves proposed by Mercer et al. [12]. Knowing te statistical distribution of te computation time of a tas served by a, it is possible to perform a statistical guarantee, expressed in terms of probability for eac served job to meet its deadline Statistical guarantee To perform a statistical guarantee on soft tass served by, we can model a as a queue, were eac arriving job J i;j can be viewed as a request of c i;j time units. At any time, te request at te ead of te queue is served using te current server deadline, so tat it is guaranteed tat Q s units of time can be consumed witin tis deadline. We analyze te following cases: a) variable computation time and constant inter-arrival time; and b) constant computation time and variable inter-arrival time.
5 Wen job J j arrives at time r j enqueue te request in te server queue; n n + 1; if (n 1) /* (te server is idle) */ if (r j + (c / Qs) * Ts > d ) /* Rule */ + 1; a r j ; d a + Ts; c Qs; else /* Rule */ + 1; a r j ; d d,1; /* c remains uncanged */ Wen job J j terminates dequeue J j from te server queue; n n - 1; if (n! ) serve te next job in te queue wit deadline d ; Wen job J j served by Ss executes for a time unit c c - 1; Wen (c ) /* Rule */ + 1; a actual time(); d d,1 + Ts; c Qs; Figure 3. Te algoritm. Case a. If job interarrival times are constant and equal to T s,and job execution times are randomly distributed wit a given probability distribution function, te can be modeled wit a D G D1 queue: every T s units of time, a request of c j units arrives and at most Q s units can be served. We can define a random process v j as follows: v1 c 1 v j maxf;v j,1, Q s g + c i;j were v j indicates te lengt of te queue (in time units) at time (j, 1)T s, tat is te unit of times tat are still to be served wen job J i;j arrives. Hence, since Q s units of time are served every period T s, te job will finis no later tan d j max r i;j + vj Q s T s wic is also te latest deadline assigned by te server to job J i;j. If P fv j g is te state probability of process v j and C P fc j g is te probability tat an arriving job requires units of time (since c j is time invariant, C does not depend on j), te value of can be calculated as follows: P fv j g P fmaxfv j,1, Q; g + c j g,1 P fmaxfv j,1,q; g+c j ^v j,1 g: Being v j greater tan by definition, te sum can be calculated for going from to infinity: Hence QX P fmaxf, Q; g + c j gp fv j,1 g C (j,1) + QX QX Q+1 C (j,1) + C (j,1) + P fc j, + Qg (j,1) Q+1 Q+1 C,+Q (j,1) : C,+Q (j,1) : (2) Using a matrix notation, equation (2) can be written as M (j,1) (3) were M and are described in Figure 4
6 M z Q+1 } { C C : : : C C 1 C 1 : : : C 1 C 2 C 2 : : : C 2 : : : : : : C : : : C 1 C : : : : : 1 C A and 1 2 : 1 C A Figure 4. Matrix describing te Marov cain for case a) Case b. In te case in wic jobs execution times are constant and equal to Q s (8j; c i;j Q s ) and jobs interarrival times are distributed according to a given distribution function, eac job is assigned a deadline d i;j maxfr i;j ;d i;j,1 g + T s, identical to tat assigned by a TBS. In tis situation, te can be modeled by a GD1 queue: jobs arrive in te queue wit a randomly distributed arrival time and te server can process a request eac T s time units. If we define a random process w j as w j d i;j, r i;j, T s,te distribution of te relative deadlines d i;j, r i;j of job J i;j can be computed from te distribution of w j, because d i;j, r i;j w i;j + T s : Since d i;j maxfr i;j ;d i;j,1 g + T s,weave w j+1 d i;j+1, T s, r i;j+1 maxfr i;j+1 ;d i;j g + T s, T s, r i;j+1 maxf;d i;j, r i;j+1 g maxf;r i;j + w j + T s, r i;j+1 g maxf;w j, a j+1 + T g aving defined a j+1 r i;j+1, r i;j. Being a j a stocastic stationary and time invariant process and w j a Marov process, te matrix M describing te w j Marov cain can be found. By defining P fw j g and A P fa j g,weave,1,1 P fw j g P fmaxf;w j,1, a j + T s g g P fmaxf;w j,1, a j + T g ^ w j,1 g P fmaxf;, a j + T g gp fw j,1 g In order to simplify te calculus, we distinguis two cases: and >:,1 P f, a j + T gp fw j,1 g 8 >;,1 r+t P fa j + T gp fw j,1 g r+t,1,1 P fa j rg (j,1) A r (j,1) P f, a j + T gp fw j,1 g P fa j, + T g (j,1) A,+T (j,1) Tus, matrix M describing te Marov cain is sown in Figure 5. For a generic queue, it is nown tat te queue is stable (i.e., te number of elements in te queue do not diverge to infinity) if mean interarrival rate mean service rate < 1: Hence, te stability can be acieved under te following conditions: 8 < : In general, c i;j < Q s in case a) r i;j+1, r i;j > T s in case b) c i;j < Q s : r i;j+1, r i;j T s If tis condition is not satisfied te difference between te deadline d i;j assigned by te server to a job J i;j and te job release time r i;j will increase indefinitely. Tis means tat, for preserving te scedulability of te oter tass, i will slow down in an unpredictable manner. If a queue is stable, a stationary solution of te Marov cain describing te queue can be found; tat is, tere exists
7 M 1 2 : : : : : : : : A T +1 A T A T,1 : : A : : : A T +2 A T +1 A T A T,1 : A 1 A : : A T +3 A T +2 A T +1 A T : A 2 C 1 A : : : : : : : : : : : 1 C A wit i ri+t A r : Figure 5. Matrix describing te Marov cain for case b) a solution suc tat lim j!1,and M. Tis solution can be approximated by truncating matrix M (aving infinite dimension) to an N N matrix M and solving te eigenvector problem M wit some numerical calculus tecnique. Te nowledge of te probability distribution function of te relative deadlines before wic a multimedia tas job is guaranteed to finis is useful for guaranteeing a QoS to eac tas and for coosing te rigt server parameters (Q s ;T s ) for eac soft tas. 4. Simulation results In tis section we compare te wit oter similar service mecanisms, namely te Total Bandwidt Server (TBS) and te Dynamic Sporadic Server (DSS). Te Constant Utilization Server (CUS) is not considered in te graps because it is very similar to te TBS (indeed, sligtly worse in performance). Te main difference between DSS and is visible wen te budget is exausted. In fact, wile te DSS becomes idle until te next replenising time (tat occurs at te server s deadline), te remains eligible by increasing its deadline and replenising te budget immediately. Tis difference in te replenising time, causes a big difference in te performance offered by te two servers to soft real-time tass. Te TBS does not suffer from tis problem, owever its correct beavior relies on te exact nowledge of job s WCETs, so it cannot be used for supporting CM applications. Moreover, since te automatically reclaims any available idle time coming from early completions, a reclaiming mecanism as also been added in te simulation of te TBS, as described in [14]. All te simulations presented in tis section ave been conducted on a ybrid tas set consisting of 5 periodic ard tass wit fixed parameters and 5 soft tass wit variable execution times and interarrival times. Te periods and te execution times of te periodic ard tass are randomly generated in order to acieve a desired processor utilization factor U ard, wile teir relative deadlines are equal to te periods. Te execution and interarrival times of te soft tass are uniformly P distributed in order to obtain a mean ci;j soft load U sof t wit U i sof t going from ri;j+1,ri;j to 1, U ard. All te soft tass ave te same relative deadline. Te metric used to measure te performance of te service algoritms is te mean tardiness E i computed over all instances of eac soft tas. Te reason for coosing suc a metric is motivated by te fact tat, as already mentioned above, in multimedia applications meeting all soft deadlines could be impossible or very inefficient. Tus, a more realistic objective is to guarantee all te ard tass and minimize te mean time tat soft tass execute after teir deadlines. Notice tat, since all te soft tass ave te same relative deadline, te tardiness is not dependent on tas s deadline. In te first experiment, we compare te mean tardiness experienced by soft tass wen tey are served by a, a TBS and a DSS. In tis test, te utilization factor of periodic ard tass is U ard :5. Te simulation results are illustrated in Figure 6, wic sows tat te performance of te DSS is dramatically worse tan te one acieved by te and TBS. Tis result was expected for te reasons explained above. Figure 7 sows te same results, but witout te DSS: te only difference is in te scale of te y-axis. In tis figure, te TBS and curves can be better distinguised, so we can see tat te tardiness experienced by soft tass under a is sligtly iger tan tat experienced using a TBS. However, te difference is so small tat can be neglected for any practical purposes. Figures 8 and 9 illustrate te results of similar experiments repeated wit U ard :7 and U ard :9 respectively. As we can see, te major difference in te performance between and TBS appears only for eavy ard loads. Fortunately, tis situation is of little interest for most practical multimedia applications. Wen WCET i >> c i;j te TBS can cause an underutilization of te processor. Tis fact can be observed in Figure 1, wic sows te results of a fourt experiment, in wic U ard :6, U sof t :4, te interarrival times are fixed, and te execution times of te soft tass are uniformly distributed wit an increasing variance. As can be seen from te grap, performs better tan TBS wen c i varies a lot among te jobs.
8 9 Hard tas load.5 8 Hard tas load.7 8 DSS TBS 7 TBS 7 6 Average soft tardiness Average soft tardiness Average soft load Average soft load Figure 6. First experiment (TBS, and DSS). 3 Hard tas load TBS Figure 8. Second experiment. Hard tas load.9 Average soft tardiness TBS Average soft tardiness Average soft load Average soft load Figure 9. Tird experiment. Figure 7. First experiment (TBS and ). 5. Implementation and experimental results Te proposed mecanism as been implemented on te HARTIK ernel [2, 1], to support some sample multimedia applications (see [1] for implementation details). For example, an MPEG player as been executed using EDF, wit and witout. Te application consists of two periodic tass: tas 1 wit a period T 1 125ms, corresponding to 8 frames per second (Fps), and tas 2 wit a period T 2 3ms (33 Fps). Figure 11 reports te number of decoded frames as a function of time, wen te two periodic tass are sceduled by EDF, activating 2 at t 2. Since C 1 49ms, C 2 53ms and :158 > 1, wen 2 is activated te system becomes overloaded. In fact, wen 1 is te only tas in te system, it runs at te required frame rate (8 Fps), but wen at time t 2 2 is activated, 1 slows down to 4:4Fps, wile 2 begins to execute at 17:96Fps. Wen 2 terminates, 1 increases its frame rate to its maximum value (23; 8Fps, tat corresponds to a period of about 42ms, wic is te mean execution time for 1 ). After tis transient interval, 1 returns to execute at 8Fps. Figure 12 sows te number of decoded frames as a function of time, wen te same periodic tass are sceduled by two s wit parameters (Q 1 ;T 1 ) (42; 125) and (Q 2 ;T 2 ) (19; 3). Being :969 < 1, te two servers are scedulable, and being Q 1 42' c 1, 1 will execute at a frame rate near to te required one. From te figure we can see tat te frame rate of 1 is about constant except for two little variations corresponding to te activation and te termination of 2 (remember tat Q c is a limit condition). Tis is obtained by slowing down te frame rate of 2 to 14:2 Fps: tis tas is clearly overloaded (T 2 < c 2 ), so it is penalized by te. Notice tat te proposed mecanism automatically arrange te tas periods witout using a-priori nowledge about te tass execution times. Te only information used
9 16 Hard tas load.6 2 Sceduler 14 TBS 18 Tas 1 Tas Average soft tardiness frame number Fps Fps Computation times variance Time (ms) 2 Figure 1. Fourt experiment. EDF Sceduler Figure 12. Two MPEG players sceduled by. frame number Tas 1 Tas Fps 4.44 Fps 23.8 Fps 8 Fps 8 Fps Time (ms) Figure 11. Two MPEG players sceduled by EDF. by te is te couple (Q i ;T i ) and te estimation of tas execution time given by te budget. Figure 11 sows anoter undesirable effect: wen 2 terminates, te frame rate of 1 increases to its maximum value (more tan te required rate), in order to terminate in te same time instant in wic it would terminate if 2 was not activated. Tis penomenon causes an acceleration of te movie tat appears unnatural and unpleasant. Tis problem can be solved using a sip strategy to serve soft tass: wen a job finises after its absolute deadline, te next job is sipped. As sown in Figure 13, a sip strategy eliminates accelerations in te movie, but it introduces anoter problem, wic is presented in te next experiment, were te same movie is decoded by two identical tass, wit U sof t 1. From Figure 14 it is easy to see tat, altoug te two tass ave te same period, tey proceed wit different speed. Tis is due to te fact tat te system is overloaded. frame number Tas 1 Tas 2 15 Fps EDF wit sip 8 Fps 4.51 Fps 2 8 Fps Time (ms) Figure 13. Two MPEG players sceduled by EDF wit sip. In fact, if U sof t ten U sof t C1 T 1 c 1;j c 2;j + 1 r 1;j+1, r 1;j r 2;j+1, r 2;j + C2 T 2 > 1. Serving te two tass by two identical s wit parameters Q s c 1;j c 2;j and T s 2Q s, tey proceed at te same rate (tass parameters are equal because te two tass play te same video). 6. Conclusions In tis paper, we presented a novel service mecanism, te Constant Bandwidt Server, for integrating ard realtime and soft multimedia computing in a single system, under te EDF sceduling algoritm. Te server as been
10 Decoded frames Tas 1 Tas 2 EDF wit sip Time (ms) Figure 14. Two identical MPEG players sceduled by EDF wit sip. formally analyzed and compared wit oter nown servers, obtaining very interesting results. Te proposed model as also been implemented on te HARTIK ernel and used to support typical multimedia applications. As a future wor, in order to extend te proposed model to more general situations, te following issues need to be investigated. A concurrency control protocol needs to be integrated wit te metod to avoid priority inversion wen accessing sared resources. Te difference between te first and te current deadline can be used as a ind of feedbac for evaluating te request in excess and react accordingly adjusting te QoS in overload conditions. Te mecanism can be used to safely partition te CPU bandwidt among different applications tat could coexist in te same system, as sown in [4]. A tas can be used as a QoS manager to dynamically cange te bandwidt reserved to eac multimedia tas. Te strategies for canging te parameters of eac still ave to be investigated. [6] P. Goyal, X. Guo, and H. M. Vin. A ierarcical cpu sceduler for multimedia operating systems. In 2nd OSDI Symposium, October [7] K. Jeffay and D. Bennet. A rate-based execution abstraction for multimedia computing. In Networ and Operating System Support for Digital Audio and Video, [8] K. Jeffay, D. L. Stone, and F. D. Smit. Kernel support for live digital audio and video. Computer Communications, 15(6), [9] H. Kaneo, J. A. Stanovic, S. Sen, and K. Ramamritam. Integrated sceduling of multimedia and ard real-time tass. In IEEE Real Time System Symposium, December [1] G. Lamastra, G. Lipari, G. Buttazzo, A. Casile, and F. Conticelli. Harti 3.: A portable system for developing real-time applications. In Real-Time Computing Systems and Applications, October [11] C. L. Liu and J. Layland. Sceduling algoritms for multiprogramming in a ard real-time environment. Journal of te ACM, 2(1), [12] C. W. Mercer, S. Savage, and H. Touda. Processor capacity reserves for multimedia operating systems. Tecnical Report CMU-CS , Carnegie Mellon University, Pittsburg, May [13] M. Spuri and G. Buttazzo. Sceduling aperiodic tass in dynamic priority systems. Real-Time Systems, 1(2), [14] M. Spuri, G. Buttazzo, and F. Sensini. Robust aperiodic sceduling under dynamic priority systems. In IEEE Real- Time Systems Symposium, December [15] M. Spuri and G. C. Buttazzo. Efficient aperiodic service under te earliest deadline sceduling. In IEEE Real-Time Systems Symposium, December [16] I. Stoica, H. Abdel-Waab, K. Jeffay, S. K. Barua, J. E. Gere, and C. G. Plaxton. A proportional sare resource allocation algoritm for real-time, time-sared systems. In IEEE Real Time System Symposium, December References [1] L. Abeni. Server mecanisms for multimedia applications. Tecnical Report RETIS TR98-1, Scuola Superiore S. Anna, [2] G. C. Buttazzo. Harti: A real-time ernel for robotics applications. In IEEE Real-Time Systems Symposium, December [3] Z. Deng and J. W. S. Liu. Sceduling real-time applications in open envirovment. In IEEE Real-Time Systems Symposium, December [4] Z. Deng, J. W. S. Liu, and J. Sun. A sceme for sceduling ard real-time applications in open system environment. In Nint Euromicro Worsop on Real-Time Systems, [5] T. M. Gazalie and T. Baer. Aperiodic servers in a deadline sceduling environment. Real-Time Systems, 9, 1995.
Integrating Multimedia Applications in Hard Real-Time Systems
Proceedings of IEEE Real-Time System Symposium, Madrid, Spain, 998 Integrating Multimedia Applications in Hard Real-Time Systems Luca Abeni and Giorgio Buttazzo Scuola Superiore S Anna, Pisa luca@hartiksssupit,
More informationConstant Bandwidth vs Proportional Share Resource Allocation
Proceedings of IEEE ICMCS, Florence, Italy, June 1999 1 Constant Bandwidth vs Proportional Share Resource Allocation Luca Abeni, Giuseppe Lipari and Giorgio Buttazzo Scuola Superiore S. Anna, Pisa luca,lipari,giorgio@sssup.it
More informationBounding Tree Cover Number and Positive Semidefinite Zero Forcing Number
Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various
More informationReal Time Operating Systems and Middleware
Real Time Operating Systems and Middleware Introduction to Real-Time Systems Luca Abeni abeni@disi.unitn.it Credits: Luigi Palopoli, Giuseppe Lipari, Marco Di Natale, and Giorgio Buttazzo Scuola Superiore
More informationHaar Transform CS 430 Denbigh Starkey
Haar Transform CS Denbig Starkey. Background. Computing te transform. Restoring te original image from te transform 7. Producing te transform matrix 8 5. Using Haar for lossless compression 6. Using Haar
More informationReal-Time Scheduling. Dynamic Priority Servers
Real-Time Scheduling Dynamic Priority Servers Objectives Schedule soft aperiodic and hard periodic tasks Reduce average response time of aperiodic requests without compromising schedulability of periodic
More informationMore on Functions and Their Graphs
More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in
More information3.6 Directional Derivatives and the Gradient Vector
288 CHAPTER 3. FUNCTIONS OF SEVERAL VARIABLES 3.6 Directional Derivatives and te Gradient Vector 3.6.1 Functions of two Variables Directional Derivatives Let us first quickly review, one more time, te
More informationMulti-Stack Boundary Labeling Problems
Multi-Stack Boundary Labeling Problems Micael A. Bekos 1, Micael Kaufmann 2, Katerina Potika 1 Antonios Symvonis 1 1 National Tecnical University of Atens, Scool of Applied Matematical & Pysical Sciences,
More informationSection 2.3: Calculating Limits using the Limit Laws
Section 2.3: Calculating Limits using te Limit Laws In previous sections, we used graps and numerics to approimate te value of a it if it eists. Te problem wit tis owever is tat it does not always give
More information2.8 The derivative as a function
CHAPTER 2. LIMITS 56 2.8 Te derivative as a function Definition. Te derivative of f(x) istefunction f (x) defined as follows f f(x + ) f(x) (x). 0 Note: tis differs from te definition in section 2.7 in
More information13.5 DIRECTIONAL DERIVATIVES and the GRADIENT VECTOR
13.5 Directional Derivatives and te Gradient Vector Contemporary Calculus 1 13.5 DIRECTIONAL DERIVATIVES and te GRADIENT VECTOR Directional Derivatives In Section 13.3 te partial derivatives f x and f
More informationSLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS. Hewlett-Packard Company East Mission Avenue. Bogazici University
SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS Sanuj V. Sarin 1, Hakan Delic 2 and Jung H. Kim 3 1 Hewlett-Packard Company 24001 East Mission Avenue Spokane, Wasington 99109, USA 2 Signal
More informationNumerical Derivatives
Lab 15 Numerical Derivatives Lab Objective: Understand and implement finite difference approximations of te derivative in single and multiple dimensions. Evaluate te accuracy of tese approximations. Ten
More informationOptimal In-Network Packet Aggregation Policy for Maximum Information Freshness
1 Optimal In-etwork Packet Aggregation Policy for Maimum Information Fresness Alper Sinan Akyurek, Tajana Simunic Rosing Electrical and Computer Engineering, University of California, San Diego aakyurek@ucsd.edu,
More informationOur Calibrated Model has No Predictive Value: An Example from the Petroleum Industry
Our Calibrated Model as No Predictive Value: An Example from te Petroleum Industry J.N. Carter a, P.J. Ballester a, Z. Tavassoli a and P.R. King a a Department of Eart Sciences and Engineering, Imperial
More informationrequests or displaying activities, hence they usually have soft deadlines, or no deadlines at all. Aperiodic tasks with hard deadlines are called spor
Scheduling Aperiodic Tasks in Dynamic Priority Systems Marco Spuri and Giorgio Buttazzo Scuola Superiore S.Anna, via Carducci 4, 561 Pisa, Italy Email: spuri@fastnet.it, giorgio@sssup.it Abstract In this
More informationUtilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks
Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Okan Yilmaz and Ing-Ray Cen Computer Science Department Virginia Tec {oyilmaz, ircen}@vt.edu
More information12.2 TECHNIQUES FOR EVALUATING LIMITS
Section Tecniques for Evaluating Limits 86 TECHNIQUES FOR EVALUATING LIMITS Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing tecnique to evaluate its of
More information2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically
2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use
More informationOn the Use of Radio Resource Tests in Wireless ad hoc Networks
Tecnical Report RT/29/2009 On te Use of Radio Resource Tests in Wireless ad oc Networks Diogo Mónica diogo.monica@gsd.inesc-id.pt João Leitão jleitao@gsd.inesc-id.pt Luis Rodrigues ler@ist.utl.pt Carlos
More informationA Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science
A Cost Model for Distributed Sared Memory Using Competitive Update Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, Texas, 77843-3112, USA E-mail: fjkim,vaidyag@cs.tamu.edu
More informationInvestigating an automated method for the sensitivity analysis of functions
Investigating an automated metod for te sensitivity analysis of functions Sibel EKER s.eker@student.tudelft.nl Jill SLINGER j..slinger@tudelft.nl Delft University of Tecnology 2628 BX, Delft, te Neterlands
More informationA UPnP-based Decentralized Service Discovery Improved Algorithm
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol.1, No.1, Marc 2013, pp. 21~26 ISSN: 2089-3272 21 A UPnP-based Decentralized Service Discovery Improved Algoritm Yu Si-cai*, Wu Yan-zi,
More information4.1 Tangent Lines. y 2 y 1 = y 2 y 1
41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange
More informationDynamic Voltage Scaling of Periodic and Aperiodic Tasks in Priority-Driven Systems Λ
Dynamic Voltage Scaling of Periodic and Aperiodic Tasks in Priority-Driven Systems Λ Dongkun Shin Jihong Kim School of CSE School of CSE Seoul National University Seoul National University Seoul, Korea
More informationAn Anchor Chain Scheme for IP Mobility Management
An Ancor Cain Sceme for IP Mobility Management Yigal Bejerano and Israel Cidon Department of Electrical Engineering Tecnion - Israel Institute of Tecnology Haifa 32000, Israel E-mail: bej@tx.tecnion.ac.il.
More information4.2 The Derivative. f(x + h) f(x) lim
4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially
More informationAn Algorithm for Loopless Deflection in Photonic Packet-Switched Networks
An Algoritm for Loopless Deflection in Potonic Packet-Switced Networks Jason P. Jue Center for Advanced Telecommunications Systems and Services Te University of Texas at Dallas Ricardson, TX 75083-0688
More informationTuning MAX MIN Ant System with off-line and on-line methods
Université Libre de Bruxelles Institut de Recerces Interdisciplinaires et de Développements en Intelligence Artificielle Tuning MAX MIN Ant System wit off-line and on-line metods Paola Pellegrini, Tomas
More informationParallel Simulation of Equation-Based Models on CUDA-Enabled GPUs
Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs Per Ostlund Department of Computer and Information Science Linkoping University SE-58183 Linkoping, Sweden per.ostlund@liu.se Kristian
More informationFaculty of Computer Science Institute of Systems Architecture, Operating Systems Group. vs. REAL-TIME SYSTEMS MICHAEL ROITZSCH
Faculty of Computer Science Institute of Systems Architecture, Operating Systems Group REAL-TIME vs. SYSTEMS MICHAEL ROITZSCH DEFINITION system whose quality depends on the functional correctness of computations
More informationIntra- and Inter-Session Network Coding in Wireless Networks
Intra- and Inter-Session Network Coding in Wireless Networks Hulya Seferoglu, Member, IEEE, Atina Markopoulou, Member, IEEE, K K Ramakrisnan, Fellow, IEEE arxiv:857v [csni] 3 Feb Abstract In tis paper,
More informationForward End-To-End delay Analysis for AFDX networks
Forward End-To-End delay Analysis for AFDX networks Nassima Benammar, Frederic Ridouard, Henri Bauer and Pascal Ricard e-mail: {nassima.benammar,frederic.ridouard, pascal.ricard}@univ-poitiers.fr enri.bauer@ensma.fr
More informationTwo Modifications of Weight Calculation of the Non-Local Means Denoising Method
Engineering, 2013, 5, 522-526 ttp://dx.doi.org/10.4236/eng.2013.510b107 Publised Online October 2013 (ttp://www.scirp.org/journal/eng) Two Modifications of Weigt Calculation of te Non-Local Means Denoising
More informationDensity Estimation Over Data Stream
Density Estimation Over Data Stream Aoying Zou Dept. of Computer Science, Fudan University 22 Handan Rd. Sangai, 2433, P.R. Cina ayzou@fudan.edu.cn Ziyuan Cai Dept. of Computer Science, Fudan University
More informationCubic smoothing spline
Cubic smooting spline Menu: QCExpert Regression Cubic spline e module Cubic Spline is used to fit any functional regression curve troug data wit one independent variable x and one dependent random variable
More informationA Capacity Sharing and Stealing Strategy for Open Real-time Systems
A Capacity Sharing and Stealing Strategy for Open Real-time Systems Luís Nogueira, Luís Miguel Pinho CISTER Research Centre School of Engineering of the Polytechnic Institute of Porto (ISEP/IPP) Rua Dr.
More informationAn Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks
Tis paper was presented as part of te main tecnical program at IEEE INFOCOM 20 An Analytical Approac to Real-Time Misbeavior Detection in IEEE 802. Based Wireless Networks Jin Tang, Yu Ceng Electrical
More informationChapter K. Geometric Optics. Blinn College - Physics Terry Honan
Capter K Geometric Optics Blinn College - Pysics 2426 - Terry Honan K. - Properties of Ligt Te Speed of Ligt Te speed of ligt in a vacuum is approximately c > 3.0µ0 8 mês. Because of its most fundamental
More informationExperimental Studies on SMT-based Debugging
Experimental Studies on SMT-based Debugging Andre Sülflow Görscwin Fey Rolf Drecsler Institute of Computer Science University of Bremen 28359 Bremen, Germany {suelflow,fey,drecsle}@informatik.uni-bremen.de
More informationA Novel QC-LDPC Code with Flexible Construction and Low Error Floor
A Novel QC-LDPC Code wit Flexile Construction and Low Error Floor Hanxin WANG,2, Saoping CHEN,2,CuitaoZHU,2 and Kaiyou SU Department of Electronics and Information Engineering, Sout-Central University
More informationMultimedia Systems 2011/2012
Multimedia Systems 2011/2012 System Architecture Prof. Dr. Paul Müller University of Kaiserslautern Department of Computer Science Integrated Communication Systems ICSY http://www.icsy.de Sitemap 2 Hardware
More informationUNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING
UNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING Raffaele Gaetano, Giuseppe Scarpa, Giovanni Poggi, and Josiane Zerubia Dip. Ing. Elettronica e Telecomunicazioni,
More informationRedundancy Awareness in SQL Queries
Redundancy Awareness in QL Queries Bin ao and Antonio Badia omputer Engineering and omputer cience Department University of Louisville bin.cao,abadia @louisville.edu Abstract In tis paper, we study QL
More informationThe Euler and trapezoidal stencils to solve d d x y x = f x, y x
restart; Te Euler and trapezoidal stencils to solve d d x y x = y x Te purpose of tis workseet is to derive te tree simplest numerical stencils to solve te first order d equation y x d x = y x, and study
More informationTraffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks
Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks Peyman Faizian, Md Safayat Raman, Md Atiqul Molla, Xin Yuan Department of Computer Science Florida State University
More informationCoarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes
Coarticulation: An Approac for Generating Concurrent Plans in Markov Decision Processes Kasayar Roanimanes kas@cs.umass.edu Sridar Maadevan maadeva@cs.umass.edu Department of Computer Science, University
More informationPiecewise Polynomial Interpolation, cont d
Jim Lambers MAT 460/560 Fall Semester 2009-0 Lecture 2 Notes Tese notes correspond to Section 4 in te text Piecewise Polynomial Interpolation, cont d Constructing Cubic Splines, cont d Having determined
More informationGeneralizing Timing Predictions to Set-Associative Caches. Frank Mueller. Humboldt-Universitat zu Berlin. Institut fur Informatik
Generalizing Timing Predictions to Set-Associative Caces Frank Mueller Humboldt-Universitat zu Berlin Institut fur Informatik 10099 Berlin (Germany) e-mail: mueller@informatik.u-berlin.de pone: (+49) (30)
More informationSoft sensor modelling by time difference, recursive partial least squares and adaptive model updating
Soft sensor modelling by time difference, recursive partial least squares adaptive model updating Y Fu 1, 2, W Yang 2, O Xu 1, L Zou 3, J Wang 4 1 Zijiang College, Zejiang University of ecnology, Hangzou
More informationSection 1.2 The Slope of a Tangent
Section 1.2 Te Slope of a Tangent You are familiar wit te concept of a tangent to a curve. Wat geometric interpretation can be given to a tangent to te grap of a function at a point? A tangent is te straigt
More informationMATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2
MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 Note: Tere will be a very sort online reading quiz (WebWork) on eac reading assignment due one our before class on its due date. Due dates can be found
More informationAuthors Abugchem, F. (Fathi); Short, M. (Michael); Xu, D. (Donglai)
TeesRep - Teesside's Research Repository A Note on the Suboptimality of Nonpreemptive Real-time Scheduling Item type Article Authors Abugchem, F. (Fathi); Short, M. (Michael); Xu, D. (Donglai) Citation
More informationBRICK: A Novel Exact Active Statistics Counter Architecture
BRICK: A ovel Exact Active Statistics Counter Arcitecture an Hua Bill Lin Jun (Jim) Xu Haiquan (Cuck) Zao College of Computing, Georgia Tec Dept of ECE, UCSD ABSTRACT In tis paper, we present an exact
More information, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result
RT. Complex Fractions Wen working wit algebraic expressions, sometimes we come across needing to simplify expressions like tese: xx 9 xx +, xx + xx + xx, yy xx + xx + +, aa Simplifying Complex Fractions
More information12.2 Techniques for Evaluating Limits
335_qd /4/5 :5 PM Page 863 Section Tecniques for Evaluating Limits 863 Tecniques for Evaluating Limits Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing
More informationPacket Switching Networks. Jonathan S. Turner. Computer and Communications Research Center. the result of user connections that pass through the
Fluid Flow Loading Analysis of Packet Switcing Networks Jonatan S. Turner Computer and Communications Researc Center Wasington University, St. Louis, MO 63130 Abstract Recent researc in switcing as concentrated
More informationFault Localization Using Tarantula
Class 20 Fault localization (cont d) Test-data generation Exam review: Nov 3, after class to :30 Responsible for all material up troug Nov 3 (troug test-data generation) Send questions beforeand so all
More informationNetwork Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks
Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks Hulya Seferoglu, Atina Markopoulou EECS Dept, University of California, Irvine {seferog, atina}@uci.edu Abstract We
More informationFast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation
P R E P R N T CPWS XV Berlin, September 8, 008 Fast Calculation of Termodynamic Properties of Water and Steam in Process Modelling using Spline nterpolation Mattias Kunick a, Hans-Joacim Kretzscmar a,
More informationYou should be able to visually approximate the slope of a graph. The slope m of the graph of f at the point x, f x is given by
Section. Te Tangent Line Problem 89 87. r 5 sin, e, 88. r sin sin Parabola 9 9 Hperbola e 9 9 9 89. 7,,,, 5 7 8 5 ortogonal 9. 5, 5,, 5, 5. Not multiples of eac oter; neiter parallel nor ortogonal 9.,,,
More informationMulti-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art
Multi-Objective Particle Swarm Optimizers: A Survey of te State-of-te-Art Margarita Reyes-Sierra and Carlos A. Coello Coello CINVESTAV-IPN (Evolutionary Computation Group) Electrical Engineering Department,
More informationAn Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng
An ffective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Ciming Huang and ei-heng Ceng 5 De c e mbe r0 International Journal of Advanced Information Tecnologies (IJAIT),
More informationAuthor's personal copy
Autor's personal copy Information Processing Letters 09 (009) 868 875 Contents lists available at ScienceDirect Information Processing Letters www.elsevier.com/locate/ipl Elastic tresold-based admission
More informationAsynchronous Power Flow on Graphic Processing Units
1 Asyncronous Power Flow on Grapic Processing Units Manuel Marin, Student Member, IEEE, David Defour, and Federico Milano, Senior Member, IEEE Abstract Asyncronous iterations can be used to implement fixed-point
More information15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes
15-122: Principles of Imperative Computation, Summer 2011 Assignment 6: Trees and Secret Codes William Lovas (wlovas@cs) Karl Naden Out: Tuesday, Friday, June 10, 2011 Due: Monday, June 13, 2011 (Written
More informationResource Partitioning among Real-Time Applications
Resource Partitioning among Real-Time Applications Giuseppe Lipari nrico Bini Scuola Superiore S Anna Pisa Italy -mail: lipari@sssupit ebini@sssupit Abstract When executing different real-time applications
More information1.4 RATIONAL EXPRESSIONS
6 CHAPTER Fundamentals.4 RATIONAL EXPRESSIONS Te Domain of an Algebraic Epression Simplifying Rational Epressions Multiplying and Dividing Rational Epressions Adding and Subtracting Rational Epressions
More informationTest Generation for Acyclic Sequential Circuits with Hold Registers
Test Generation for Acyclic Sequential Circuits wit Hold Registers Tomoo Inoue, Debes Kumar Das, Ciio Sano, Takairo Miara, and Hideo Fujiwara Faculty of Information Sciences Computer Science and Engineering
More informationMAPI Computer Vision
MAPI Computer Vision Multiple View Geometry In tis module we intend to present several tecniques in te domain of te 3D vision Manuel Joao University of Mino Dep Industrial Electronics - Applications -
More informationLesson 6 MA Nick Egbert
Overview From kindergarten we all know ow to find te slope of a line: rise over run, or cange in over cange in. We want to be able to determine slopes of functions wic are not lines. To do tis we use te
More informationA Finite Element Scheme for Calculating Inverse Dynamics of Link Mechanisms
WCCM V Fift World Congress on Computational Mecanics July -1,, Vienna, Austria Eds.: H.A. Mang, F.G. Rammerstorfer, J. Eberardsteiner A Finite Element Sceme for Calculating Inverse Dynamics of Link Mecanisms
More informationAlternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method
Te Open Plasma Pysics Journal, 2010, 3, 29-35 29 Open Access Alternating Direction Implicit Metods for FDTD Using te Dey-Mittra Embedded Boundary Metod T.M. Austin *, J.R. Cary, D.N. Smite C. Nieter Tec-X
More informationCE 221 Data Structures and Algorithms
CE Data Structures and Algoritms Capter 4: Trees (AVL Trees) Text: Read Weiss, 4.4 Izmir University of Economics AVL Trees An AVL (Adelson-Velskii and Landis) tree is a binary searc tree wit a balance
More informationTwo-Level Iterative Queuing Modeling of Software Contention
Two-Level Iterative Queuing Modeling of Software Contention Daniel A. Menascé Dept. of Computer Science George Mason University www.cs.gmu.edu/faculty/menasce.tml 2002 D. Menascé. All Rigts Reserved. 1
More informationComparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method
International Journal of Statistics and Applications 0, (): -0 DOI: 0.9/j.statistics.000.0 Comparison of te Efficiency of te Various Algoritms in Stratified Sampling wen te Initial Solutions are Determined
More informationCESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm
Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer
More informationFeature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes
Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganograpic Scemes Jessica Fridric Dept. of Electrical Engineering, SUNY Bingamton, Bingamton, NY 3902-6000, USA fridric@bingamton.edu
More informationCHAPTER 7: TRANSCENDENTAL FUNCTIONS
7.0 Introduction and One to one Functions Contemporary Calculus 1 CHAPTER 7: TRANSCENDENTAL FUNCTIONS Introduction In te previous capters we saw ow to calculate and use te derivatives and integrals of
More informationSEATTLE: A Scalable Ethernet Architecture for Large Enterprises
TRC00349 ACM (Typeset by SPi, Manila, Pilippines) 1 of 35 February 23, 2011 14:31 SEATTLE: A Scalable Eternet Arcitecture for Large Enterprises 1 CHANGHOON KIM, Microsoft MATTHEW CAESAR, University of
More informationMinimizing Memory Access By Improving Register Usage Through High-level Transformations
Minimizing Memory Access By Improving Register Usage Troug Hig-level Transformations San Li Scool of Computer Engineering anyang Tecnological University anyang Avenue, SIGAPORE 639798 Email: p144102711@ntu.edu.sg
More informationLinear Interpolating Splines
Jim Lambers MAT 772 Fall Semester 2010-11 Lecture 17 Notes Tese notes correspond to Sections 112, 11, and 114 in te text Linear Interpolating Splines We ave seen tat ig-degree polynomial interpolation
More informationUnsupervised Learning for Hierarchical Clustering Using Statistical Information
Unsupervised Learning for Hierarcical Clustering Using Statistical Information Masaru Okamoto, Nan Bu, and Tosio Tsuji Department of Artificial Complex System Engineering Hirosima University Kagamiyama
More informationComputing geodesic paths on manifolds
Proc. Natl. Acad. Sci. USA Vol. 95, pp. 8431 8435, July 1998 Applied Matematics Computing geodesic pats on manifolds R. Kimmel* and J. A. Setian Department of Matematics and Lawrence Berkeley National
More informationDistributed and Optimal Rate Allocation in Application-Layer Multicast
Distributed and Optimal Rate Allocation in Application-Layer Multicast Jinyao Yan, Martin May, Bernard Plattner, Wolfgang Mülbauer Computer Engineering and Networks Laboratory, ETH Zuric, CH-8092, Switzerland
More informationAn experimental framework to investigate context-aware schemes for content delivery
An experimental framework to investigate context-aware scemes for content delivery Pietro Lungaro +, Cristobal Viedma +, Zary Segall + and Pavan Kumar + Mobile Service Lab, Royal Institute of Tecnology
More informationMULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS
ULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS Nimmagadda Calamaia æ Dept. of CSE JNTU College of Engineering Kakinada, India 533 003. calm@cse.iitkgp.ernet.in Badrinat Ramamurty y Dept.
More informationSchedulability analysis of periodic and aperiodic tasks with resource constraints
Journal of Systems Architecture 46 (2000) 327±338 www.elsevier.com/locate/sysarc Schedulability analysis of periodic and aperiodic tasks with resource constraints Giuseppe Lipari *, Giorgio Buttazzo RETIS
More informationProtecting Storage Location Privacy in Sensor Networks
Protecting Storage Location Privacy in Sensor Networks Jianming Zou, Wenseng Zang, and Daji Qiao Iowa State University Ames, IA 511 Email: {jmzou,wzang,daji}@iastate.edu ASTAT Numerous scemes ave been
More informationProgramming Real-Time Applications with Signal
Programming Real-Time Applications wit Signal Paul Le Guernic, Tierry Gautier, Micel Le Borgne, Claude Le Maire To cite tis version: Paul Le Guernic, Tierry Gautier, Micel Le Borgne, Claude Le Maire. Programming
More informationMean Waiting Time Analysis in Finite Storage Queues for Wireless Cellular Networks
Mean Waiting Time Analysis in Finite Storage ueues for Wireless ellular Networks J. YLARINOS, S. LOUVROS, K. IOANNOU, A. IOANNOU 3 A.GARMIS 2 and S.KOTSOOULOS Wireless Telecommunication Laboratory, Department
More informationFast Global Kernel Density Mode Seeking with application to Localisation and Tracking
Fast Global Kernel Density Mode Seeking wit application to Localisation and Tracking Cunua Sen, Micael J. Brooks, Anton van den Hengel Scool of Computer Science, University of Adelaide, SA 55, Australia
More informationSoftware Fault Prediction using Machine Learning Algorithm Pooja Garg 1 Mr. Bhushan Dua 2
IJSRD - International Journal for Scientific Researc & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Software Fault Prediction using Macine Learning Algoritm Pooja Garg 1 Mr. Busan Dua 2
More informationHash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring
Has-Based Indexes Capter 11 Comp 521 Files and Databases Spring 2010 1 Introduction As for any index, 3 alternatives for data entries k*: Data record wit key value k
More informationEnergy efficient temporal load aware resource allocation in cloud computing datacenters
Vakilinia Journal of Cloud Computing: Advances, Systems and Applications (2018) 7:2 DOI 10.1186/s13677-017-0103-2 Journal of Cloud Computing: Advances, Systems and Applications RESEARCH Energy efficient
More informationA Statistical Approach for Target Counting in Sensor-Based Surveillance Systems
Proceedings IEEE INFOCOM A Statistical Approac for Target Counting in Sensor-Based Surveillance Systems Dengyuan Wu, Decang Cen,aiXing, Xiuzen Ceng Department of Computer Science, Te George Wasington University,
More informationA formal framework for the performance analysis of P2P networks protocols
A formal framework for te performance analysis of PP networks protocols Angelo Spognardi Roberto Di Pietro Università di Roma La Sapienza Dipartimento di Informatica Via Salaria, 3, 98-Roma, Italy {spognardi,dipietro}@diuniromait
More informationAVL Trees Outline and Required Reading: AVL Trees ( 11.2) CSE 2011, Winter 2017 Instructor: N. Vlajic
1 AVL Trees Outline and Required Reading: AVL Trees ( 11.2) CSE 2011, Winter 2017 Instructor: N. Vlajic AVL Trees 2 Binary Searc Trees better tan linear dictionaries; owever, te worst case performance
More informationScheduling Non-Preemptible Jobs to Minimize Peak Demand. Received: 22 September 2017; Accepted: 25 October 2017; Published: 28 October 2017
algoritms Article Sceduling Non-Preemptible Jobs to Minimize Peak Demand Sean Yaw 1 ID and Brendan Mumey 2, * ID 1 Los Alamos National Laboratoy, Los Alamos, NM 87545, USA; yaw@lanl.gov 2 Gianforte Scool
More information