Two-Level Iterative Queuing Modeling of Software Contention
|
|
- Ashlynn Wilson
- 6 years ago
- Views:
Transcription
1 Two-Level Iterative Queuing Modeling of Software Contention Daniel A. Menascé Dept. of Computer Science George Mason University D. Menascé. All Rigts Reserved. 1
2 Motivation ncs cs Software View CPU Hardware View 2002 D. Menascé. All Rigts Reserved. 2
3 % Software Contention Time vs. Multitreading Level 100% 90% % Software Contention Time 80% 70% 60% 50% 40% 30% 20% 10% 0% Multitreading Level 2002 D. Menascé. All Rigts Reserved. 3
4 %Sofware Contention Time vs Non-CS/CS Ratio 100% 90% % Software Contention Time 80% 70% 60% 50% 40% 30% 20% 10% 0% Non-CS/CS Ratio 2002 D. Menascé. All Rigts Reserved. N=2 N=5 N=10 N=15 N=20 N=25 N=50 4
5 Software Contention example: multitreaded software server Server Tread Pool Waiting Being Processed Daniel A. Menascé 5
6 QN Models tat Capture SW Contention 1. Carleton University s Layered Queuing Networks (LQN) Neilson, J.E., C.M. Woodside, D.C. Petriu, and S. Majumdar, Software bottlenecking in client-server systems and rendezvous networks, IEEE Tr. Software Engineering, 21(9), Rolia, J. and K.C. Sevcik, Te Metod of Layers, IEEE Tr. Software Engineering, 21(8), 1995, pp Franks, G., T. Al-Omari, C.M. Woodside, O. Das, and S. Derisavi, Enanced Modeling and Solution of Layered Queueing Networks, IEEE Tr. Software Engineering, 35(2), Menascé s two-level iterative SQN-HQN model Menascé, D.A., Two-level Iterative Queuing Modeling of Software Contention, Proc. Tent IEEE/ACM Intl. Symp. Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS 2002),Fort Wort, TX, Oct , Menascé, D.A., V.A.F. Almeida, and L.W. Dowdy. Performance by Design: Computer Capacity Planning By Example, Prentice Hall, Daniel A. Menascé Modeling and Optimization of Multitiered Server-Based Systems 6
7 QN Models tat Capture SW Contention 1. Carleton University s Layered Queuing Networks (LQN) Neilson, J.E., C.M. Woodside, D.C. Petriu, and S. Majumdar, Software bottlenecking in client-server systems and rendezvous networks, IEEE Tr. Software Engineering, 21(9), Rolia, J. and K.C. Sevcik, Te Metod of Layers, IEEE Tr. Software Engineering, 21(8), 1995, pp Franks, G., T. Al-Omari, C.M. Woodside, O. Das, and S. Derisavi, Enanced Modeling and Solution of Layered Queueing Networks, IEEE Tr. Software Engineering, 35(2), Menascé s two-level iterative SQN-HQN model Menascé, D.A., Two-level Iterative Queuing Modeling of Software Contention, Proc. Tent IEEE/ACM Intl. Symp. Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS 2002),Fort Wort, TX, Oct , Menascé, D.A., V.A.F. Almeida, and L.W. Dowdy. Performance by Design: Computer Capacity Planning By Example, Prentice Hall, Daniel A. Menascé Modeling and Optimization of Multitiered Server-Based Systems 7
8 If we just consider te SQN we are ignoring time spent at te software resources due to contention for ardware resources. ncs Approac cs1 cs2 Software QN 2002 D. Menascé. All Rigts Reserved. 8
9 If we just consider te SQN we are ignoring time spent at te software resources due to contention for ardware resources. ncs Approac cs1 cs2 Software QN Te HQN model must consider tat some processes are not using ardware resources because tey are blocked for software resources. CPU disk 1 disk 2 disk 3 Hardware QN 2002 D. Menascé. All Rigts Reserved. 9
10 SQN-HQN Sceme Software QN N D s j, i s D j Adjust demands - B ' R i ( N ) N j D i Hardware QN 2002 D. Menascé. All Rigts Reserved. 10
11 Input Service Demands Software Modules Hardware Devices ( ) NCS CS 1 CS 2 Hardware Demands CPU Disk Disk Disk Software Demands sum across a column sum across a row 2002 D. Menascé. All Rigts Reserved. 11
12 Service Demands Software Modules Hardware Devices ( ) NCS CS 1 CS 2 Hardware Demands CPU Disk Disk Disk Software Demands D s cs 1 (total service time of a software module) 2002 D. Menascé. All Rigts Reserved. D s cs1, disk 1 (total service time of a software module at a pysical device) D disk 1 (total service time of te application at a given device) 12
13 SQN-HQN Sceme Software QN Avg. number of processes blocked due to software contention. N D s j, i s D j Adjust demands - B ' R i ( N ) N j D i Hardware QN 2002 D. Menascé. All Rigts Reserved. 13
14 SQN-HQN Sceme Software QN Avg. number of processes blocked due to software contention. N D s j, i s D j Adjust demands - B ' R i ( N ) N j D i Hardware QN Adjusted population for HQN 2002 D. Menascé. All Rigts Reserved. 14
15 SQN-HQN Sceme Adjusted demands for SQN. Software QN Avg. number of processes blocked due to software contention. N D s j, i s D j Adjust demands - B ' R i ( N ) N j D i Hardware QN Adjusted population for HQN 2002 D. Menascé. All Rigts Reserved. 15
16 Basic Idea Iteration between solving te SQN and te HQN. Number B of processes blocked due to software contention computed troug te SQN. Population at HQN is reduced by B. Service demands at SQN are adjusted to account for pysical contention D. Menascé. All Rigts Reserved. 16
17 SQN-HQN: Initialization D s j, i No adjustment at initialization s D j Software QN Adjust demands - B N ' R i ( N ) N j D i Hardware QN 2002 D. Menascé. All Rigts Reserved. 17
18 SQN-HQN: Solve SQN No Hardware Contention Software QN N D s j, i s D j Adjust demands - B ' R i ( N ) N = N - B j D i Hardware QN 2002 D. Menascé. All Rigts Reserved. 18
19 SQN-HQN: Solve HQN Software QN N D s j, i s D j Adjust demands - B ' R i ( N ) N = N - B j D i Hardware QN 2002 D. Menascé. All Rigts Reserved. 19
20 SQN-HQN: Adjust demands for SQN Software QN N D s j, i s D j Adjust demands - B ' R i ( N ) N = N - B j D i Hardware QN 2002 D. Menascé. All Rigts Reserved. 20
21 SQN-HQN: Solve SQN Again Software QN N D s j, i s D j Adjust demands - B ' R i ( N ) N = N - B j D i Hardware QN 2002 D. Menascé. All Rigts Reserved. 21
22 SQN-HQN: Solve HQN Software QN N D s j, i s D j Adjust demands - B ' R i ( N ) N = N - B j D i Hardware QN 2002 D. Menascé. All Rigts Reserved. 22
23 SQN-HQN: Adjust demands for SQN Software QN N D s j, i s D j Adjust demands - B ' R i ( N ) N = N - B j D i Hardware QN 2002 D. Menascé. All Rigts Reserved. 23
24 and so on Convergence is cecked on absolute relative error on te number of blocked processes in te SQN D. Menascé. All Rigts Reserved. 24
25 Adjustment of SQN Demands Single class case: D s D j D Multiple class case: i s j, i ' Ri ( N i residence time at device i. ) residence time at device i. for class r. D s j; r i D D s j; i, r i; r R ' i; r! ( N ) 2002 D. Menascé. All Rigts Reserved. 25
26 Example ncs cs1 cs2 Software QN disk 1 CPU disk 2 disk 3 Hardware QN 2002 D. Menascé. All Rigts Reserved. 26
27 Comparison wit oter approaces Absolute % Error N SQN-HQN GB SQN_HQN ASM ASPA GB: global balance equations ASM: Aggregate Server Metod [Agrawal and Buzen 1983] ASPA: Avg. Subsystem Population Approximation [Jacobson & Lazowska 1983] SQN is consistently pessimistic. ASPA is muc more complex to implement. ASM only works for one class D. Menascé. All Rigts Reserved. 27
28 Modeling Non-Software Resources Client tink time ncs network cs1 cs2 disk 1 Software QN B is te avg. no. of processes in te software resource waiting lines. Client tink time network CPU disk 2 disk 3 Hardware QN 2002 D. Menascé. All Rigts Reserved. 28
29 Open QN at te Software Level λ ncs cs1 Software QN cs2 disk 1 CPU disk 2 disk 3 Hardware QN 2002 D. Menascé. All Rigts Reserved. 29
30 SQN-HQN Sceme: Open SQN Software QN λ D s j, i s D j Adjust demands - N, B R ' i ( N ) N = N B j D i Hardware QN 2002 D. Menascé. All Rigts Reserved. 30
31 Results of Iterations for Open SQN Case Adjusted SQN Demands Iteration N Resp. Time Ns B NCS CS1 CS D. Menascé. All Rigts Reserved. 31
32 Modeling and Optimization of Multitiered Server-based Systems
33 Te SQN-HQN Model SQN te software queueing network models te software application using a software network HQN te ardware queueing network models te ardware infrastructure on top of wic te software runs Software modules blocked at te SQN are not counted as active in te HQN. Contention computed by te HQN is used to elongate te execution time of software modules at te SQN. Daniel A. Menascé Modeling and Optimization of Multitiered Server-Based Systems 33
34 Te SQN-HQN Model N SQN - (1) HQN Daniel A. Menascé Modeling and Optimization of Multitiered Server-Based Systems 34
35 A 3-tiered Server-based System: te SQN single-queue multiple-servers / Open 1 λ 1 1 λ m n p WS AS DS Daniel A. Menascé 35
36 Seidmann s Approximation to Model Multi-server Queues load independent 1 Delay device m demand = D/m demand = D(m-1)/m demand = D Daniel A. Menascé 36
37 Residence time at SQN Daniel A. Menascé 37
38 A 3-tiered Server-based System: te HQN A Closed QN Models te ardware infrastructure (processors, storage devices, load balancers, etc.) on top of wic te software runs. Daniel A. Menascé 38
39 Mapping te SQN to te HQN Mapping te service demand at eac SW tier to te HW it uses. Example: Daniel A. Menascé 39
40 Mapping te service demand at eac SW tier to te HW it uses. Example: Mapping te SQN into te HQN f1, f2 and f3 [0,1] indicate te fraction of te demand of a software module spent at CPU. Daniel A. Menascé 40
41 Te SQN-HQN Model λ SQN N - B (1) HQN Daniel A. Menascé 41
42 Modeling te Mulitiered System using SQN-HQN Daniel A. Menascé 42
43 Modeling te Mulitiered System using SQN-HQN Daniel A. Menascé 43
44 Example used parameters Daniel A. Menascé 44
45 Example First iterations of te SQN-HQN metod - te SQN (ε = 0.01): Daniel A. Menascé 45
46 Example First iterations of te SQN-HQN metod - te HQN: Daniel A. Menascé 46
47 Example R SQN as a function of n and p m=30 λ= 3.6 tps Daniel A. Menascé 47
48 Near Optimal Number of Treads Problem: wat is te optimal number of web servers, application servers and database servers tat minimizes te response time? More precisely, find an exact optimization solver is not an option because tere is no closed form expression for R SQN. Instead, tere is an iterative algoritm. Daniel A. Menascé 48
49 Near Optimal Number of Treads A combinatorial searc tecnique can be used to searc te solution space for te near optimal tuple. We used ill-climbing, wic starts from an arbitrary point in te searc space, and builds a relatively small neigborood, N, by perturbing te values of eac element of (m, n, p) For example, Daniel A. Menascé 49
50 Near Optimal Number of Treads Additionally, te number of treads of eac type in eac point in te neigborood also as to satisfy te memory constraint in eac pysical macine. In oter words, were M ws, M as and M ds are te memory footprint for eac tread type, and AM M1 and AM M2 stand for te available memory on macines 1 and 2. Daniel A. Menascé 50
51 Hill Climbing Algoritm Daniel A. Menascé 51
52 Near Optimal Results for Varying Arrival Rates used parameters Daniel A. Menascé 52
53 Near Optimal Results for Varying Arrival Rates Daniel A. Menascé 53
54 Concluding Remarks Simple approac. Open, closed, and multiclass QNs can be used at te SQN. SQNs can include non-software resources tat are not mapped to ardware resources. HQNs are closed and can be multiclass. Any tecnique can be used to solve te SQN and HQN. Tis includes any known approximation to multiple-server devices, priorities, simultaneous resource possession, etc D. Menascé. All Rigts Reserved. 54
Invited: Modeling and Optimization of Multititiered Server-Based Systems
Invited: Modeling and Optimization of Multititiered Server-Based Systems Daniel A. Menascé and Noor Bajunaid Department of Computer Science George Mason University 4400 University Drive, Fairfax, VA 22030,
More informationTwo-Level Iterative Queuing Modeling of Software Contention
Two-Level Iterative Queuing Modeling of Software Contention Daniel A. Menacé Dept. of Computer Science George Maon Univerity www.c.gmu.edu/faculty/menace.tml In Proc. 2002 IEEE MASCOTS Conference, Fort
More informationA DEVS LIBRARY FOR LAYERED QUEUING NETWORKS
A DEVS LIBRARY FOR LAYERED QUEUING NETWORKS Dorin B. Petriu and Gabriel Wainer Department of Systems and Computer Engineering Carleton University, 1125 Colonel By Drive Ottawa, Ontario K1S 5B6, Canada.
More informationHash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring
Has-Based Indexes Capter 11 Comp 521 Files and Databases Spring 2010 1 Introduction As for any index, 3 alternatives for data entries k*: Data record wit key value k
More informationAnálise e Modelagem de Desempenho de Sistemas de Computação: Component Level Performance Models of Computer Systems
Análise e Modelagem de Desempenho de Sistemas de Computação: Component Level Performance Models of Computer Systems Virgilio ili A. F. Almeida 1 o Semestre de 2009 Introdução: Semana 5 Computer Science
More informationHash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall
Has-Based Indexes Capter 11 Comp 521 Files and Databases Fall 2012 1 Introduction Hasing maps a searc key directly to te pid of te containing page/page-overflow cain Doesn t require intermediate page fetces
More information4.1 Tangent Lines. y 2 y 1 = y 2 y 1
41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange
More informationFault Localization Using Tarantula
Class 20 Fault localization (cont d) Test-data generation Exam review: Nov 3, after class to :30 Responsible for all material up troug Nov 3 (troug test-data generation) Send questions beforeand so all
More informationLayered Analytic Performance Modelling of a Distributed Database System
Layered Analytic Performance Modelling of a Distributed Database System Fahim Sheikh, Murray Woodside Carleton University, Ottawa, CANADA, email: {sheikhf, cmw}@sce.carleton.ca copyright 1997 IEEE Abstract
More informationA Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science
A Cost Model for Distributed Sared Memory Using Competitive Update Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, Texas, 77843-3112, USA E-mail: fjkim,vaidyag@cs.tamu.edu
More informationCS 234. Module 6. October 16, CS 234 Module 6 ADT Dictionary 1 / 33
CS 234 Module 6 October 16, 2018 CS 234 Module 6 ADT Dictionary 1 / 33 Idea for an ADT Te ADT Dictionary stores pairs (key, element), were keys are distinct and elements can be any data. Notes: Tis is
More information19.2 Surface Area of Prisms and Cylinders
Name Class Date 19 Surface Area of Prisms and Cylinders Essential Question: How can you find te surface area of a prism or cylinder? Resource Locker Explore Developing a Surface Area Formula Surface area
More informationAnnouncements. Lilian s office hours rescheduled: Fri 2-4pm HW2 out tomorrow, due Thursday, 7/7. CSE373: Data Structures & Algorithms
Announcements Lilian s office ours resceduled: Fri 2-4pm HW2 out tomorrow, due Tursday, 7/7 CSE373: Data Structures & Algoritms Deletion in BST 2 5 5 2 9 20 7 0 7 30 Wy migt deletion be arder tan insertion?
More informationExtended Synchronization Signals for Eliminating PCI Confusion in Heterogeneous LTE
1 Extended Syncronization Signals for Eliminating PCI Confusion in Heterogeneous LTE Amed H. Zaran Department of Electronics and Electrical Communications Cairo University Egypt. azaran@eecu.cu.edu.eg
More informationSection 2.3: Calculating Limits using the Limit Laws
Section 2.3: Calculating Limits using te Limit Laws In previous sections, we used graps and numerics to approimate te value of a it if it eists. Te problem wit tis owever is tat it does not always give
More informationHaar Transform CS 430 Denbigh Starkey
Haar Transform CS Denbig Starkey. Background. Computing te transform. Restoring te original image from te transform 7. Producing te transform matrix 8 5. Using Haar for lossless compression 6. Using Haar
More informationUUV DEPTH MEASUREMENT USING CAMERA IMAGES
ABCM Symposium Series in Mecatronics - Vol. 3 - pp.292-299 Copyrigt c 2008 by ABCM UUV DEPTH MEASUREMENT USING CAMERA IMAGES Rogerio Yugo Takimoto Graduate Scool of Engineering Yokoama National University
More informationOn the Use of Performance Models in Autonomic Computing
On the Use of Performance Models in Autonomic Computing Daniel A. Menascé Department of Computer Science George Mason University 1 2012. D.A. Menasce. All Rights Reserved. 2 Motivation for AC main obstacle
More information2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically
2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use
More informationOur Calibrated Model has No Predictive Value: An Example from the Petroleum Industry
Our Calibrated Model as No Predictive Value: An Example from te Petroleum Industry J.N. Carter a, P.J. Ballester a, Z. Tavassoli a and P.R. King a a Department of Eart Sciences and Engineering, Imperial
More informationTwo Modifications of Weight Calculation of the Non-Local Means Denoising Method
Engineering, 2013, 5, 522-526 ttp://dx.doi.org/10.4236/eng.2013.510b107 Publised Online October 2013 (ttp://www.scirp.org/journal/eng) Two Modifications of Weigt Calculation of te Non-Local Means Denoising
More informationCSE 332: Data Structures & Parallelism Lecture 8: AVL Trees. Ruth Anderson Winter 2019
CSE 2: Data Structures & Parallelism Lecture 8: AVL Trees Rut Anderson Winter 29 Today Dictionaries AVL Trees /25/29 2 Te AVL Balance Condition: Left and rigt subtrees of every node ave eigts differing
More informationThe Euler and trapezoidal stencils to solve d d x y x = f x, y x
restart; Te Euler and trapezoidal stencils to solve d d x y x = y x Te purpose of tis workseet is to derive te tree simplest numerical stencils to solve te first order d equation y x d x = y x, and study
More informationData Structures and Programming Spring 2014, Midterm Exam.
Data Structures and Programming Spring 2014, Midterm Exam. 1. (10 pts) Order te following functions 2.2 n, log(n 10 ), 2 2012, 25n log(n), 1.1 n, 2n 5.5, 4 log(n), 2 10, n 1.02, 5n 5, 76n, 8n 5 + 5n 2
More informationWhen the dimensions of a solid increase by a factor of k, how does the surface area change? How does the volume change?
8.4 Surface Areas and Volumes of Similar Solids Wen te dimensions of a solid increase by a factor of k, ow does te surface area cange? How does te volume cange? 1 ACTIVITY: Comparing Surface Areas and
More informationAVL Trees Outline and Required Reading: AVL Trees ( 11.2) CSE 2011, Winter 2017 Instructor: N. Vlajic
1 AVL Trees Outline and Required Reading: AVL Trees ( 11.2) CSE 2011, Winter 2017 Instructor: N. Vlajic AVL Trees 2 Binary Searc Trees better tan linear dictionaries; owever, te worst case performance
More information13.5 DIRECTIONAL DERIVATIVES and the GRADIENT VECTOR
13.5 Directional Derivatives and te Gradient Vector Contemporary Calculus 1 13.5 DIRECTIONAL DERIVATIVES and te GRADIENT VECTOR Directional Derivatives In Section 13.3 te partial derivatives f x and f
More informationComputer Physics Communications. Multi-GPU acceleration of direct pore-scale modeling of fluid flow in natural porous media
Computer Pysics Communications 183 (2012) 1890 1898 Contents lists available at SciVerse ScienceDirect Computer Pysics Communications ournal omepage: www.elsevier.com/locate/cpc Multi-GPU acceleration
More informationMean Value Analysis and Related Techniques
Mean Value Analysis and Related Techniques 34-1 Overview 1. Analysis of Open Queueing Networks 2. Mean-Value Analysis 3. Approximate MVA 4. Balanced Job Bounds 34-2 Analysis of Open Queueing Networks Used
More information4.2 The Derivative. f(x + h) f(x) lim
4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially
More informationMean Shifting Gradient Vector Flow: An Improved External Force Field for Active Surfaces in Widefield Microscopy.
Mean Sifting Gradient Vector Flow: An Improved External Force Field for Active Surfaces in Widefield Microscopy. Margret Keuper Cair of Pattern Recognition and Image Processing Computer Science Department
More informationCS 234. Module 6. October 25, CS 234 Module 6 ADT Dictionary 1 / 22
CS 234 Module 6 October 25, 2016 CS 234 Module 6 ADT Dictionary 1 / 22 Case study Problem: Find a way to store student records for a course, wit unique IDs for eac student, were records can be accessed,
More informationAreas of Triangles and Parallelograms. Bases of a parallelogram. Height of a parallelogram THEOREM 11.3: AREA OF A TRIANGLE. a and its corresponding.
11.1 Areas of Triangles and Parallelograms Goal p Find areas of triangles and parallelograms. Your Notes VOCABULARY Bases of a parallelogram Heigt of a parallelogram POSTULATE 4: AREA OF A SQUARE POSTULATE
More information1.4 RATIONAL EXPRESSIONS
6 CHAPTER Fundamentals.4 RATIONAL EXPRESSIONS Te Domain of an Algebraic Epression Simplifying Rational Epressions Multiplying and Dividing Rational Epressions Adding and Subtracting Rational Epressions
More informationComparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method
International Journal of Statistics and Applications 0, (): -0 DOI: 0.9/j.statistics.000.0 Comparison of te Efficiency of te Various Algoritms in Stratified Sampling wen te Initial Solutions are Determined
More informationUtilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks
Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Okan Yilmaz and Ing-Ray Cen Computer Science Department Virginia Tec {oyilmaz, ircen}@vt.edu
More informationMaterials: Whiteboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector.
Adam Clinc Lesson: Deriving te Derivative Grade Level: 12 t grade, Calculus I class Materials: Witeboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector. Goals/Objectives:
More informationNumerical Derivatives
Lab 15 Numerical Derivatives Lab Objective: Understand and implement finite difference approximations of te derivative in single and multiple dimensions. Evaluate te accuracy of tese approximations. Ten
More information12.2 Techniques for Evaluating Limits
335_qd /4/5 :5 PM Page 863 Section Tecniques for Evaluating Limits 863 Tecniques for Evaluating Limits Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing
More informationNotes: Dimensional Analysis / Conversions
Wat is a unit system? A unit system is a metod of taking a measurement. Simple as tat. We ave units for distance, time, temperature, pressure, energy, mass, and many more. Wy is it important to ave a standard?
More informationMTH-112 Quiz 1 - Solutions
MTH- Quiz - Solutions Words in italics are for eplanation purposes onl (not necessar to write in te tests or. Determine weter te given relation is a function. Give te domain and range of te relation. {(,
More informationMean Waiting Time Analysis in Finite Storage Queues for Wireless Cellular Networks
Mean Waiting Time Analysis in Finite Storage ueues for Wireless ellular Networks J. YLARINOS, S. LOUVROS, K. IOANNOU, A. IOANNOU 3 A.GARMIS 2 and S.KOTSOOULOS Wireless Telecommunication Laboratory, Department
More informationLecture 7. Binary Search Trees / AVL Trees
Lecture 7. Binary Searc Trees / AVL Trees T. H. Cormen, C. E. Leiserson and R. L. Rivest Introduction to Algoritms, 3rd Edition, MIT Press, 2009 Sungkyunkwan University Hyunseung Coo coo@skku.edu Copyrigt
More informationDesign of PSO-based Fuzzy Classification Systems
Tamkang Journal of Science and Engineering, Vol. 9, No 1, pp. 6370 (006) 63 Design of PSO-based Fuzzy Classification Systems Cia-Cong Cen Department of Electronics Engineering, Wufeng Institute of Tecnology,
More informationMATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2
MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 Note: Tere will be a very sort online reading quiz (WebWork) on eac reading assignment due one our before class on its due date. Due dates can be found
More informationNOTES: A quick overview of 2-D geometry
NOTES: A quick overview of 2-D geometry Wat is 2-D geometry? Also called plane geometry, it s te geometry tat deals wit two dimensional sapes flat tings tat ave lengt and widt, suc as a piece of paper.
More information12.2 TECHNIQUES FOR EVALUATING LIMITS
Section Tecniques for Evaluating Limits 86 TECHNIQUES FOR EVALUATING LIMITS Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing tecnique to evaluate its of
More informationSection 1.2 The Slope of a Tangent
Section 1.2 Te Slope of a Tangent You are familiar wit te concept of a tangent to a curve. Wat geometric interpretation can be given to a tangent to te grap of a function at a point? A tangent is te straigt
More information, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result
RT. Complex Fractions Wen working wit algebraic expressions, sometimes we come across needing to simplify expressions like tese: xx 9 xx +, xx + xx + xx, yy xx + xx + +, aa Simplifying Complex Fractions
More informationBounding Tree Cover Number and Positive Semidefinite Zero Forcing Number
Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various
More informationTREES. General Binary Trees The Search Tree ADT Binary Search Trees AVL Trees Threaded trees Splay Trees B-Trees. UNIT -II
UNIT -II TREES General Binary Trees Te Searc Tree DT Binary Searc Trees VL Trees Treaded trees Splay Trees B-Trees. 2MRKS Q& 1. Define Tree tree is a data structure, wic represents ierarcical relationsip
More informationWrap up Amortized Analysis; AVL Trees. Riley Porter Winter CSE373: Data Structures & Algorithms
CSE 373: Data Structures & Wrap up Amortized Analysis; AVL Trees Riley Porter Course Logistics Symposium offered by CSE department today HW2 released, Big- O, Heaps (lecture slides ave pseudocode tat will
More informationClassify solids. Find volumes of prisms and cylinders.
11.4 Volumes of Prisms and Cylinders Essential Question How can you find te volume of a prism or cylinder tat is not a rigt prism or rigt cylinder? Recall tat te volume V of a rigt prism or a rigt cylinder
More informationAuthor's personal copy
Autor's personal copy Information Processing Letters 09 (009) 868 875 Contents lists available at ScienceDirect Information Processing Letters www.elsevier.com/locate/ipl Elastic tresold-based admission
More informationNetwork Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks
Downloaded from vbn.aau.dk on: April 7, 09 Aalborg Universitet etwork Coding to Enance Standard Routing Protocols in Wireless Mes etworks Palevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank;
More informationAlternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method
Te Open Plasma Pysics Journal, 2010, 3, 29-35 29 Open Access Alternating Direction Implicit Metods for FDTD Using te Dey-Mittra Embedded Boundary Metod T.M. Austin *, J.R. Cary, D.N. Smite C. Nieter Tec-X
More information3.6 Directional Derivatives and the Gradient Vector
288 CHAPTER 3. FUNCTIONS OF SEVERAL VARIABLES 3.6 Directional Derivatives and te Gradient Vector 3.6.1 Functions of two Variables Directional Derivatives Let us first quickly review, one more time, te
More informationeach node in the tree, the difference in height of its two subtrees is at the most p. AVL tree is a BST that is height-balanced-1-tree.
Data Structures CSC212 1 AVL Trees A binary tree is a eigt-balanced-p-tree if for eac node in te tree, te difference in eigt of its two subtrees is at te most p. AVL tree is a BST tat is eigt-balanced-tree.
More informationJava Method Modeling using Application Response Measurement (ARM)
Java Metod Modeling using Application Response Measurement (ARM) Dr. Carl J. De Pasquale College of Staten Island Staten Island, NY Abstract - Wat sould not be surprising, especially to anyone wo as attempted
More informationBinary Search Tree - Best Time. AVL Trees. Binary Search Tree - Worst Time. Balanced and unbalanced BST
AL Trees CSE Data Structures Unit Reading: Section 4.4 Binary Searc Tree - Best Time All BST operations are O(d), were d is tree dept minimum d is d = log for a binary tree N wit N nodes at is te best
More information2.3 Additional Relations
3 2.3 Additional Relations Figure 2.3 identiies additional relations, indicating te locations o te object and image, and te ratio o teir eigts (magniication) and orientations. Ray enters te lens parallel
More informationCESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm
Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer
More information1 Finding Trigonometric Derivatives
MTH 121 Fall 2008 Essex County College Division of Matematics Hanout Version 8 1 October 2, 2008 1 Fining Trigonometric Derivatives 1.1 Te Derivative as a Function Te efinition of te erivative as a function
More informationPiecewise Polynomial Interpolation, cont d
Jim Lambers MAT 460/560 Fall Semester 2009-0 Lecture 2 Notes Tese notes correspond to Section 4 in te text Piecewise Polynomial Interpolation, cont d Constructing Cubic Splines, cont d Having determined
More informationCoarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes
Coarticulation: An Approac for Generating Concurrent Plans in Markov Decision Processes Kasayar Roanimanes kas@cs.umass.edu Sridar Maadevan maadeva@cs.umass.edu Department of Computer Science, University
More informationComputation of Bounds and Performance Guarantees for Client-Server Systems Using a Queueing Network Model
Computation of Bounds and Performance Guarantees for Client-Server Systems Using a Queueing Network Model Shikharesh Majumdar, Alex Hubbard Department of Systems and Computer Engineering, Carleton University,
More informationMore on Functions and Their Graphs
More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in
More informationYou Try: A. Dilate the following figure using a scale factor of 2 with center of dilation at the origin.
1 G.SRT.1-Some Tings To Know Dilations affect te size of te pre-image. Te pre-image will enlarge or reduce by te ratio given by te scale factor. A dilation wit a scale factor of 1> x >1enlarges it. A dilation
More informationAsynchronous Power Flow on Graphic Processing Units
1 Asyncronous Power Flow on Grapic Processing Units Manuel Marin, Student Member, IEEE, David Defour, and Federico Milano, Senior Member, IEEE Abstract Asyncronous iterations can be used to implement fixed-point
More information12.2 Investigate Surface Area
Investigating g Geometry ACTIVITY Use before Lesson 12.2 12.2 Investigate Surface Area MATERIALS grap paper scissors tape Q U E S T I O N How can you find te surface area of a polyedron? A net is a pattern
More informationPYRAMID FILTERS BASED ON BILINEAR INTERPOLATION
PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION Martin Kraus Computer Grapics and Visualization Group, Tecnisce Universität Müncen, Germany krausma@in.tum.de Magnus Strengert Visualization and Interactive
More informationON THE USE OF PERFORMANCE MODELS TO DESIGN SELF-MANAGING COMPUTER SYSTEMS
2003 Menascé and Bennani. All ights eserved. In roc. 2003 Computer Measurement Group Conf., Dec. 7-2, 2003, Dallas, T. ON THE USE OF EFOMANCE MODELS TO DESIGN SELF-MANAGING COMUTE SYSTEMS Daniel A. Menascé
More informationMinimizing Memory Access By Improving Register Usage Through High-level Transformations
Minimizing Memory Access By Improving Register Usage Troug Hig-level Transformations San Li Scool of Computer Engineering anyang Tecnological University anyang Avenue, SIGAPORE 639798 Email: p144102711@ntu.edu.sg
More informationComputing geodesic paths on manifolds
Proc. Natl. Acad. Sci. USA Vol. 95, pp. 8431 8435, July 1998 Applied Matematics Computing geodesic pats on manifolds R. Kimmel* and J. A. Setian Department of Matematics and Lawrence Berkeley National
More informationAffine and Projective Transformations
CS 674: Intro to Computer Vision Affine and Projective Transformations Prof. Adriana Kovaska Universit of Pittsburg October 3, 26 Alignment problem We previousl discussed ow to matc features across images,
More informationA signature analysis based method for elliptical shape
A signature analysis based metod for elliptical sape Ivana Guarneri, Mirko Guarnera, Giuseppe Messina and Valeria Tomaselli STMicroelectronics - AST Imaging Lab, Stradale rimosole 50, Catania, Italy ABSTRACT
More informationHW 2 Bench Table. Hash Indexes: Chap. 11. Table Bench is in tablespace setq. Loading table bench. Then a bulk load
Has Indexes: Cap. CS64 Lecture 6 HW Benc Table Table of M rows, Columns of different cardinalities CREATE TABLE BENCH ( KSEQ integer primary key, K5K integer not null, K5K integer not null, KK integer
More informationCE 221 Data Structures and Algorithms
CE Data Structures and Algoritms Capter 4: Trees (AVL Trees) Text: Read Weiss, 4.4 Izmir University of Economics AVL Trees An AVL (Adelson-Velskii and Landis) tree is a binary searc tree wit a balance
More informationChapter K. Geometric Optics. Blinn College - Physics Terry Honan
Capter K Geometric Optics Blinn College - Pysics 2426 - Terry Honan K. - Properties of Ligt Te Speed of Ligt Te speed of ligt in a vacuum is approximately c > 3.0µ0 8 mês. Because of its most fundamental
More informationMulti-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art
Multi-Objective Particle Swarm Optimizers: A Survey of te State-of-te-Art Margarita Reyes-Sierra and Carlos A. Coello Coello CINVESTAV-IPN (Evolutionary Computation Group) Electrical Engineering Department,
More informationSome Handwritten Signature Parameters in Biometric Recognition Process
Some Handwritten Signature Parameters in Biometric Recognition Process Piotr Porwik Institute of Informatics, Silesian Uniersity, Bdziska 39, 41- Sosnowiec, Poland porwik@us.edu.pl Tomasz Para Institute
More informationImage Registration via Particle Movement
Image Registration via Particle Movement Zao Yi and Justin Wan Abstract Toug fluid model offers a good approac to nonrigid registration wit large deformations, it suffers from te blurring artifacts introduced
More informationDensity Estimation Over Data Stream
Density Estimation Over Data Stream Aoying Zou Dept. of Computer Science, Fudan University 22 Handan Rd. Sangai, 2433, P.R. Cina ayzou@fudan.edu.cn Ziyuan Cai Dept. of Computer Science, Fudan University
More informationOn the use of FHT, its modification for practical applications and the structure of Hough image
On te use of FHT, its modification for practical applications and te structure of Houg image M. Aliev 1,3, E.I. Ersov, D.P. Nikolaev,3 1 Federal Researc Center Computer Science and Control of Russian Academy
More informationEpochs: Trace-Driven Analytical Modeling of Job Execution Times
Department of Computer Science George Mason University Technical Reports 4400 University Drive MS#4A5 Fairfax, VA 22030-4444 USA http://cs.gmu.edu/ 703-993-1530 Epochs: Trace-Driven Analytical Modeling
More informationIntroduction to Computer Graphics 5. Clipping
Introduction to Computer Grapics 5. Clipping I-Cen Lin, Assistant Professor National Ciao Tung Univ., Taiwan Textbook: E.Angel, Interactive Computer Grapics, 5 t Ed., Addison Wesley Ref:Hearn and Baker,
More informationMAPI Computer Vision
MAPI Computer Vision Multiple View Geometry In tis module we intend to present several tecniques in te domain of te 3D vision Manuel Joao University of Mino Dep Industrial Electronics - Applications -
More informationConsolidating Windowing Transformations Discussion with Applications to Screen Savers Program in Computer Graphics
Int'l Conf. Frontiers in Education: CS and CE FECS'6 87 Consolidating Windoing Transformations Discussion it Applications to Screen Savers Program in Computer Grapics Hassan Farat Computer Science University
More informationCSCE476/876 Spring Homework 5
CSCE476/876 Spring 2016 Assigned on: Friday, Marc 11, 2016 Due: Monday, Marc 28, 2016 Homework 5 Programming assignment sould be submitted wit andin Te report can eiter be submitted wit andin as a PDF,
More informationθ R = θ 0 (1) -The refraction law says that: the direction of refracted ray (angle θ 1 from vertical) is (2)
LIGHT (Basic information) - Considering te ligt of a projector in a smoky room, one gets to geometrical optics model of ligt as a set of tiny particles tat travel along straigt lines called "optical rays.
More informationIntra- and Inter-Session Network Coding in Wireless Networks
Intra- and Inter-Session Network Coding in Wireless Networks Hulya Seferoglu, Member, IEEE, Atina Markopoulou, Member, IEEE, K K Ramakrisnan, Fellow, IEEE arxiv:857v [csni] 3 Feb Abstract In tis paper,
More informationPLK-B SERIES Technical Manual (USA Version) CLICK HERE FOR CONTENTS
PLK-B SERIES Technical Manual (USA Version) CLICK ERE FOR CONTENTS CONTROL BOX PANEL MOST COMMONLY USED FUNCTIONS INITIAL READING OF SYSTEM SOFTWARE/PAGES 1-2 RE-INSTALLATION OF TE SYSTEM SOFTWARE/PAGES
More informationCHAPTER The elevation can be determined as. The partial derivatives can be evaluated,
1 CHAPTER 14 14.1 Te elevation can be determined as (.8,1. (.81. 1.5(1. 1.5(.8 Te partial derivatives can be evaluated,.5 (1..5(.8.4 1.5 4 (.8 1.5 4(1. 1.7 (1. 5 5.4 wic can be used to determine te gradient
More informationInvestigating an automated method for the sensitivity analysis of functions
Investigating an automated metod for te sensitivity analysis of functions Sibel EKER s.eker@student.tudelft.nl Jill SLINGER j..slinger@tudelft.nl Delft University of Tecnology 2628 BX, Delft, te Neterlands
More informationAn Algorithm for Loopless Deflection in Photonic Packet-Switched Networks
An Algoritm for Loopless Deflection in Potonic Packet-Switced Networks Jason P. Jue Center for Advanced Telecommunications Systems and Services Te University of Texas at Dallas Ricardson, TX 75083-0688
More informationExperimental Studies on SMT-based Debugging
Experimental Studies on SMT-based Debugging Andre Sülflow Görscwin Fey Rolf Drecsler Institute of Computer Science University of Bremen 28359 Bremen, Germany {suelflow,fey,drecsle}@informatik.uni-bremen.de
More informationA Quantitative Model for Capacity Estimation of Products
A Quantitative Model for Capacity Estimation of Products RAJESHWARI G., RENUKA S.R. Software Engineering and Technology Laboratories Infosys Technologies Limited Bangalore 560 100 INDIA Abstract: - Sizing
More informationAn Interactive X-Ray Image Segmentation Technique for Bone Extraction
An Interactive X-Ray Image Segmentation Tecnique for Bone Extraction Cristina Stolojescu-Crisan and Stefan Holban Politenica University of Timisoara V. Parvan 2, 300223 Timisoara, Romania {cristina.stolojescu@etc.upt.ro
More informationLinear Interpolating Splines
Jim Lambers MAT 772 Fall Semester 2010-11 Lecture 17 Notes Tese notes correspond to Sections 112, 11, and 114 in te text Linear Interpolating Splines We ave seen tat ig-degree polynomial interpolation
More information2.8 The derivative as a function
CHAPTER 2. LIMITS 56 2.8 Te derivative as a function Definition. Te derivative of f(x) istefunction f (x) defined as follows f f(x + ) f(x) (x). 0 Note: tis differs from te definition in section 2.7 in
More information