Two-Level Iterative Queuing Modeling of Software Contention

Size: px
Start display at page:

Download "Two-Level Iterative Queuing Modeling of Software Contention"

Transcription

1 Two-Level Iterative Queuing Modeling of Software Contention Daniel A. Menascé Dept. of Computer Science George Mason University D. Menascé. All Rigts Reserved. 1

2 Motivation ncs cs Software View CPU Hardware View 2002 D. Menascé. All Rigts Reserved. 2

3 % Software Contention Time vs. Multitreading Level 100% 90% % Software Contention Time 80% 70% 60% 50% 40% 30% 20% 10% 0% Multitreading Level 2002 D. Menascé. All Rigts Reserved. 3

4 %Sofware Contention Time vs Non-CS/CS Ratio 100% 90% % Software Contention Time 80% 70% 60% 50% 40% 30% 20% 10% 0% Non-CS/CS Ratio 2002 D. Menascé. All Rigts Reserved. N=2 N=5 N=10 N=15 N=20 N=25 N=50 4

5 Software Contention example: multitreaded software server Server Tread Pool Waiting Being Processed Daniel A. Menascé 5

6 QN Models tat Capture SW Contention 1. Carleton University s Layered Queuing Networks (LQN) Neilson, J.E., C.M. Woodside, D.C. Petriu, and S. Majumdar, Software bottlenecking in client-server systems and rendezvous networks, IEEE Tr. Software Engineering, 21(9), Rolia, J. and K.C. Sevcik, Te Metod of Layers, IEEE Tr. Software Engineering, 21(8), 1995, pp Franks, G., T. Al-Omari, C.M. Woodside, O. Das, and S. Derisavi, Enanced Modeling and Solution of Layered Queueing Networks, IEEE Tr. Software Engineering, 35(2), Menascé s two-level iterative SQN-HQN model Menascé, D.A., Two-level Iterative Queuing Modeling of Software Contention, Proc. Tent IEEE/ACM Intl. Symp. Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS 2002),Fort Wort, TX, Oct , Menascé, D.A., V.A.F. Almeida, and L.W. Dowdy. Performance by Design: Computer Capacity Planning By Example, Prentice Hall, Daniel A. Menascé Modeling and Optimization of Multitiered Server-Based Systems 6

7 QN Models tat Capture SW Contention 1. Carleton University s Layered Queuing Networks (LQN) Neilson, J.E., C.M. Woodside, D.C. Petriu, and S. Majumdar, Software bottlenecking in client-server systems and rendezvous networks, IEEE Tr. Software Engineering, 21(9), Rolia, J. and K.C. Sevcik, Te Metod of Layers, IEEE Tr. Software Engineering, 21(8), 1995, pp Franks, G., T. Al-Omari, C.M. Woodside, O. Das, and S. Derisavi, Enanced Modeling and Solution of Layered Queueing Networks, IEEE Tr. Software Engineering, 35(2), Menascé s two-level iterative SQN-HQN model Menascé, D.A., Two-level Iterative Queuing Modeling of Software Contention, Proc. Tent IEEE/ACM Intl. Symp. Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS 2002),Fort Wort, TX, Oct , Menascé, D.A., V.A.F. Almeida, and L.W. Dowdy. Performance by Design: Computer Capacity Planning By Example, Prentice Hall, Daniel A. Menascé Modeling and Optimization of Multitiered Server-Based Systems 7

8 If we just consider te SQN we are ignoring time spent at te software resources due to contention for ardware resources. ncs Approac cs1 cs2 Software QN 2002 D. Menascé. All Rigts Reserved. 8

9 If we just consider te SQN we are ignoring time spent at te software resources due to contention for ardware resources. ncs Approac cs1 cs2 Software QN Te HQN model must consider tat some processes are not using ardware resources because tey are blocked for software resources. CPU disk 1 disk 2 disk 3 Hardware QN 2002 D. Menascé. All Rigts Reserved. 9

10 SQN-HQN Sceme Software QN N D s j, i s D j Adjust demands - B ' R i ( N ) N j D i Hardware QN 2002 D. Menascé. All Rigts Reserved. 10

11 Input Service Demands Software Modules Hardware Devices ( ) NCS CS 1 CS 2 Hardware Demands CPU Disk Disk Disk Software Demands sum across a column sum across a row 2002 D. Menascé. All Rigts Reserved. 11

12 Service Demands Software Modules Hardware Devices ( ) NCS CS 1 CS 2 Hardware Demands CPU Disk Disk Disk Software Demands D s cs 1 (total service time of a software module) 2002 D. Menascé. All Rigts Reserved. D s cs1, disk 1 (total service time of a software module at a pysical device) D disk 1 (total service time of te application at a given device) 12

13 SQN-HQN Sceme Software QN Avg. number of processes blocked due to software contention. N D s j, i s D j Adjust demands - B ' R i ( N ) N j D i Hardware QN 2002 D. Menascé. All Rigts Reserved. 13

14 SQN-HQN Sceme Software QN Avg. number of processes blocked due to software contention. N D s j, i s D j Adjust demands - B ' R i ( N ) N j D i Hardware QN Adjusted population for HQN 2002 D. Menascé. All Rigts Reserved. 14

15 SQN-HQN Sceme Adjusted demands for SQN. Software QN Avg. number of processes blocked due to software contention. N D s j, i s D j Adjust demands - B ' R i ( N ) N j D i Hardware QN Adjusted population for HQN 2002 D. Menascé. All Rigts Reserved. 15

16 Basic Idea Iteration between solving te SQN and te HQN. Number B of processes blocked due to software contention computed troug te SQN. Population at HQN is reduced by B. Service demands at SQN are adjusted to account for pysical contention D. Menascé. All Rigts Reserved. 16

17 SQN-HQN: Initialization D s j, i No adjustment at initialization s D j Software QN Adjust demands - B N ' R i ( N ) N j D i Hardware QN 2002 D. Menascé. All Rigts Reserved. 17

18 SQN-HQN: Solve SQN No Hardware Contention Software QN N D s j, i s D j Adjust demands - B ' R i ( N ) N = N - B j D i Hardware QN 2002 D. Menascé. All Rigts Reserved. 18

19 SQN-HQN: Solve HQN Software QN N D s j, i s D j Adjust demands - B ' R i ( N ) N = N - B j D i Hardware QN 2002 D. Menascé. All Rigts Reserved. 19

20 SQN-HQN: Adjust demands for SQN Software QN N D s j, i s D j Adjust demands - B ' R i ( N ) N = N - B j D i Hardware QN 2002 D. Menascé. All Rigts Reserved. 20

21 SQN-HQN: Solve SQN Again Software QN N D s j, i s D j Adjust demands - B ' R i ( N ) N = N - B j D i Hardware QN 2002 D. Menascé. All Rigts Reserved. 21

22 SQN-HQN: Solve HQN Software QN N D s j, i s D j Adjust demands - B ' R i ( N ) N = N - B j D i Hardware QN 2002 D. Menascé. All Rigts Reserved. 22

23 SQN-HQN: Adjust demands for SQN Software QN N D s j, i s D j Adjust demands - B ' R i ( N ) N = N - B j D i Hardware QN 2002 D. Menascé. All Rigts Reserved. 23

24 and so on Convergence is cecked on absolute relative error on te number of blocked processes in te SQN D. Menascé. All Rigts Reserved. 24

25 Adjustment of SQN Demands Single class case: D s D j D Multiple class case: i s j, i ' Ri ( N i residence time at device i. ) residence time at device i. for class r. D s j; r i D D s j; i, r i; r R ' i; r! ( N ) 2002 D. Menascé. All Rigts Reserved. 25

26 Example ncs cs1 cs2 Software QN disk 1 CPU disk 2 disk 3 Hardware QN 2002 D. Menascé. All Rigts Reserved. 26

27 Comparison wit oter approaces Absolute % Error N SQN-HQN GB SQN_HQN ASM ASPA GB: global balance equations ASM: Aggregate Server Metod [Agrawal and Buzen 1983] ASPA: Avg. Subsystem Population Approximation [Jacobson & Lazowska 1983] SQN is consistently pessimistic. ASPA is muc more complex to implement. ASM only works for one class D. Menascé. All Rigts Reserved. 27

28 Modeling Non-Software Resources Client tink time ncs network cs1 cs2 disk 1 Software QN B is te avg. no. of processes in te software resource waiting lines. Client tink time network CPU disk 2 disk 3 Hardware QN 2002 D. Menascé. All Rigts Reserved. 28

29 Open QN at te Software Level λ ncs cs1 Software QN cs2 disk 1 CPU disk 2 disk 3 Hardware QN 2002 D. Menascé. All Rigts Reserved. 29

30 SQN-HQN Sceme: Open SQN Software QN λ D s j, i s D j Adjust demands - N, B R ' i ( N ) N = N B j D i Hardware QN 2002 D. Menascé. All Rigts Reserved. 30

31 Results of Iterations for Open SQN Case Adjusted SQN Demands Iteration N Resp. Time Ns B NCS CS1 CS D. Menascé. All Rigts Reserved. 31

32 Modeling and Optimization of Multitiered Server-based Systems

33 Te SQN-HQN Model SQN te software queueing network models te software application using a software network HQN te ardware queueing network models te ardware infrastructure on top of wic te software runs Software modules blocked at te SQN are not counted as active in te HQN. Contention computed by te HQN is used to elongate te execution time of software modules at te SQN. Daniel A. Menascé Modeling and Optimization of Multitiered Server-Based Systems 33

34 Te SQN-HQN Model N SQN - (1) HQN Daniel A. Menascé Modeling and Optimization of Multitiered Server-Based Systems 34

35 A 3-tiered Server-based System: te SQN single-queue multiple-servers / Open 1 λ 1 1 λ m n p WS AS DS Daniel A. Menascé 35

36 Seidmann s Approximation to Model Multi-server Queues load independent 1 Delay device m demand = D/m demand = D(m-1)/m demand = D Daniel A. Menascé 36

37 Residence time at SQN Daniel A. Menascé 37

38 A 3-tiered Server-based System: te HQN A Closed QN Models te ardware infrastructure (processors, storage devices, load balancers, etc.) on top of wic te software runs. Daniel A. Menascé 38

39 Mapping te SQN to te HQN Mapping te service demand at eac SW tier to te HW it uses. Example: Daniel A. Menascé 39

40 Mapping te service demand at eac SW tier to te HW it uses. Example: Mapping te SQN into te HQN f1, f2 and f3 [0,1] indicate te fraction of te demand of a software module spent at CPU. Daniel A. Menascé 40

41 Te SQN-HQN Model λ SQN N - B (1) HQN Daniel A. Menascé 41

42 Modeling te Mulitiered System using SQN-HQN Daniel A. Menascé 42

43 Modeling te Mulitiered System using SQN-HQN Daniel A. Menascé 43

44 Example used parameters Daniel A. Menascé 44

45 Example First iterations of te SQN-HQN metod - te SQN (ε = 0.01): Daniel A. Menascé 45

46 Example First iterations of te SQN-HQN metod - te HQN: Daniel A. Menascé 46

47 Example R SQN as a function of n and p m=30 λ= 3.6 tps Daniel A. Menascé 47

48 Near Optimal Number of Treads Problem: wat is te optimal number of web servers, application servers and database servers tat minimizes te response time? More precisely, find an exact optimization solver is not an option because tere is no closed form expression for R SQN. Instead, tere is an iterative algoritm. Daniel A. Menascé 48

49 Near Optimal Number of Treads A combinatorial searc tecnique can be used to searc te solution space for te near optimal tuple. We used ill-climbing, wic starts from an arbitrary point in te searc space, and builds a relatively small neigborood, N, by perturbing te values of eac element of (m, n, p) For example, Daniel A. Menascé 49

50 Near Optimal Number of Treads Additionally, te number of treads of eac type in eac point in te neigborood also as to satisfy te memory constraint in eac pysical macine. In oter words, were M ws, M as and M ds are te memory footprint for eac tread type, and AM M1 and AM M2 stand for te available memory on macines 1 and 2. Daniel A. Menascé 50

51 Hill Climbing Algoritm Daniel A. Menascé 51

52 Near Optimal Results for Varying Arrival Rates used parameters Daniel A. Menascé 52

53 Near Optimal Results for Varying Arrival Rates Daniel A. Menascé 53

54 Concluding Remarks Simple approac. Open, closed, and multiclass QNs can be used at te SQN. SQNs can include non-software resources tat are not mapped to ardware resources. HQNs are closed and can be multiclass. Any tecnique can be used to solve te SQN and HQN. Tis includes any known approximation to multiple-server devices, priorities, simultaneous resource possession, etc D. Menascé. All Rigts Reserved. 54

Invited: Modeling and Optimization of Multititiered Server-Based Systems

Invited: Modeling and Optimization of Multititiered Server-Based Systems Invited: Modeling and Optimization of Multititiered Server-Based Systems Daniel A. Menascé and Noor Bajunaid Department of Computer Science George Mason University 4400 University Drive, Fairfax, VA 22030,

More information

Two-Level Iterative Queuing Modeling of Software Contention

Two-Level Iterative Queuing Modeling of Software Contention Two-Level Iterative Queuing Modeling of Software Contention Daniel A. Menacé Dept. of Computer Science George Maon Univerity www.c.gmu.edu/faculty/menace.tml In Proc. 2002 IEEE MASCOTS Conference, Fort

More information

A DEVS LIBRARY FOR LAYERED QUEUING NETWORKS

A DEVS LIBRARY FOR LAYERED QUEUING NETWORKS A DEVS LIBRARY FOR LAYERED QUEUING NETWORKS Dorin B. Petriu and Gabriel Wainer Department of Systems and Computer Engineering Carleton University, 1125 Colonel By Drive Ottawa, Ontario K1S 5B6, Canada.

More information

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Spring Has-Based Indexes Capter 11 Comp 521 Files and Databases Spring 2010 1 Introduction As for any index, 3 alternatives for data entries k*: Data record wit key value k

More information

Análise e Modelagem de Desempenho de Sistemas de Computação: Component Level Performance Models of Computer Systems

Análise e Modelagem de Desempenho de Sistemas de Computação: Component Level Performance Models of Computer Systems Análise e Modelagem de Desempenho de Sistemas de Computação: Component Level Performance Models of Computer Systems Virgilio ili A. F. Almeida 1 o Semestre de 2009 Introdução: Semana 5 Computer Science

More information

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall

Hash-Based Indexes. Chapter 11. Comp 521 Files and Databases Fall Has-Based Indexes Capter 11 Comp 521 Files and Databases Fall 2012 1 Introduction Hasing maps a searc key directly to te pid of te containing page/page-overflow cain Doesn t require intermediate page fetces

More information

4.1 Tangent Lines. y 2 y 1 = y 2 y 1

4.1 Tangent Lines. y 2 y 1 = y 2 y 1 41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange

More information

Fault Localization Using Tarantula

Fault Localization Using Tarantula Class 20 Fault localization (cont d) Test-data generation Exam review: Nov 3, after class to :30 Responsible for all material up troug Nov 3 (troug test-data generation) Send questions beforeand so all

More information

Layered Analytic Performance Modelling of a Distributed Database System

Layered Analytic Performance Modelling of a Distributed Database System Layered Analytic Performance Modelling of a Distributed Database System Fahim Sheikh, Murray Woodside Carleton University, Ottawa, CANADA, email: {sheikhf, cmw}@sce.carleton.ca copyright 1997 IEEE Abstract

More information

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science A Cost Model for Distributed Sared Memory Using Competitive Update Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, Texas, 77843-3112, USA E-mail: fjkim,vaidyag@cs.tamu.edu

More information

CS 234. Module 6. October 16, CS 234 Module 6 ADT Dictionary 1 / 33

CS 234. Module 6. October 16, CS 234 Module 6 ADT Dictionary 1 / 33 CS 234 Module 6 October 16, 2018 CS 234 Module 6 ADT Dictionary 1 / 33 Idea for an ADT Te ADT Dictionary stores pairs (key, element), were keys are distinct and elements can be any data. Notes: Tis is

More information

19.2 Surface Area of Prisms and Cylinders

19.2 Surface Area of Prisms and Cylinders Name Class Date 19 Surface Area of Prisms and Cylinders Essential Question: How can you find te surface area of a prism or cylinder? Resource Locker Explore Developing a Surface Area Formula Surface area

More information

Announcements. Lilian s office hours rescheduled: Fri 2-4pm HW2 out tomorrow, due Thursday, 7/7. CSE373: Data Structures & Algorithms

Announcements. Lilian s office hours rescheduled: Fri 2-4pm HW2 out tomorrow, due Thursday, 7/7. CSE373: Data Structures & Algorithms Announcements Lilian s office ours resceduled: Fri 2-4pm HW2 out tomorrow, due Tursday, 7/7 CSE373: Data Structures & Algoritms Deletion in BST 2 5 5 2 9 20 7 0 7 30 Wy migt deletion be arder tan insertion?

More information

Extended Synchronization Signals for Eliminating PCI Confusion in Heterogeneous LTE

Extended Synchronization Signals for Eliminating PCI Confusion in Heterogeneous LTE 1 Extended Syncronization Signals for Eliminating PCI Confusion in Heterogeneous LTE Amed H. Zaran Department of Electronics and Electrical Communications Cairo University Egypt. azaran@eecu.cu.edu.eg

More information

Section 2.3: Calculating Limits using the Limit Laws

Section 2.3: Calculating Limits using the Limit Laws Section 2.3: Calculating Limits using te Limit Laws In previous sections, we used graps and numerics to approimate te value of a it if it eists. Te problem wit tis owever is tat it does not always give

More information

Haar Transform CS 430 Denbigh Starkey

Haar Transform CS 430 Denbigh Starkey Haar Transform CS Denbig Starkey. Background. Computing te transform. Restoring te original image from te transform 7. Producing te transform matrix 8 5. Using Haar for lossless compression 6. Using Haar

More information

UUV DEPTH MEASUREMENT USING CAMERA IMAGES

UUV DEPTH MEASUREMENT USING CAMERA IMAGES ABCM Symposium Series in Mecatronics - Vol. 3 - pp.292-299 Copyrigt c 2008 by ABCM UUV DEPTH MEASUREMENT USING CAMERA IMAGES Rogerio Yugo Takimoto Graduate Scool of Engineering Yokoama National University

More information

On the Use of Performance Models in Autonomic Computing

On the Use of Performance Models in Autonomic Computing On the Use of Performance Models in Autonomic Computing Daniel A. Menascé Department of Computer Science George Mason University 1 2012. D.A. Menasce. All Rights Reserved. 2 Motivation for AC main obstacle

More information

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically 2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use

More information

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry Our Calibrated Model as No Predictive Value: An Example from te Petroleum Industry J.N. Carter a, P.J. Ballester a, Z. Tavassoli a and P.R. King a a Department of Eart Sciences and Engineering, Imperial

More information

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method Engineering, 2013, 5, 522-526 ttp://dx.doi.org/10.4236/eng.2013.510b107 Publised Online October 2013 (ttp://www.scirp.org/journal/eng) Two Modifications of Weigt Calculation of te Non-Local Means Denoising

More information

CSE 332: Data Structures & Parallelism Lecture 8: AVL Trees. Ruth Anderson Winter 2019

CSE 332: Data Structures & Parallelism Lecture 8: AVL Trees. Ruth Anderson Winter 2019 CSE 2: Data Structures & Parallelism Lecture 8: AVL Trees Rut Anderson Winter 29 Today Dictionaries AVL Trees /25/29 2 Te AVL Balance Condition: Left and rigt subtrees of every node ave eigts differing

More information

The Euler and trapezoidal stencils to solve d d x y x = f x, y x

The Euler and trapezoidal stencils to solve d d x y x = f x, y x restart; Te Euler and trapezoidal stencils to solve d d x y x = y x Te purpose of tis workseet is to derive te tree simplest numerical stencils to solve te first order d equation y x d x = y x, and study

More information

Data Structures and Programming Spring 2014, Midterm Exam.

Data Structures and Programming Spring 2014, Midterm Exam. Data Structures and Programming Spring 2014, Midterm Exam. 1. (10 pts) Order te following functions 2.2 n, log(n 10 ), 2 2012, 25n log(n), 1.1 n, 2n 5.5, 4 log(n), 2 10, n 1.02, 5n 5, 76n, 8n 5 + 5n 2

More information

When the dimensions of a solid increase by a factor of k, how does the surface area change? How does the volume change?

When the dimensions of a solid increase by a factor of k, how does the surface area change? How does the volume change? 8.4 Surface Areas and Volumes of Similar Solids Wen te dimensions of a solid increase by a factor of k, ow does te surface area cange? How does te volume cange? 1 ACTIVITY: Comparing Surface Areas and

More information

AVL Trees Outline and Required Reading: AVL Trees ( 11.2) CSE 2011, Winter 2017 Instructor: N. Vlajic

AVL Trees Outline and Required Reading: AVL Trees ( 11.2) CSE 2011, Winter 2017 Instructor: N. Vlajic 1 AVL Trees Outline and Required Reading: AVL Trees ( 11.2) CSE 2011, Winter 2017 Instructor: N. Vlajic AVL Trees 2 Binary Searc Trees better tan linear dictionaries; owever, te worst case performance

More information

13.5 DIRECTIONAL DERIVATIVES and the GRADIENT VECTOR

13.5 DIRECTIONAL DERIVATIVES and the GRADIENT VECTOR 13.5 Directional Derivatives and te Gradient Vector Contemporary Calculus 1 13.5 DIRECTIONAL DERIVATIVES and te GRADIENT VECTOR Directional Derivatives In Section 13.3 te partial derivatives f x and f

More information

Computer Physics Communications. Multi-GPU acceleration of direct pore-scale modeling of fluid flow in natural porous media

Computer Physics Communications. Multi-GPU acceleration of direct pore-scale modeling of fluid flow in natural porous media Computer Pysics Communications 183 (2012) 1890 1898 Contents lists available at SciVerse ScienceDirect Computer Pysics Communications ournal omepage: www.elsevier.com/locate/cpc Multi-GPU acceleration

More information

Mean Value Analysis and Related Techniques

Mean Value Analysis and Related Techniques Mean Value Analysis and Related Techniques 34-1 Overview 1. Analysis of Open Queueing Networks 2. Mean-Value Analysis 3. Approximate MVA 4. Balanced Job Bounds 34-2 Analysis of Open Queueing Networks Used

More information

4.2 The Derivative. f(x + h) f(x) lim

4.2 The Derivative. f(x + h) f(x) lim 4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially

More information

Mean Shifting Gradient Vector Flow: An Improved External Force Field for Active Surfaces in Widefield Microscopy.

Mean Shifting Gradient Vector Flow: An Improved External Force Field for Active Surfaces in Widefield Microscopy. Mean Sifting Gradient Vector Flow: An Improved External Force Field for Active Surfaces in Widefield Microscopy. Margret Keuper Cair of Pattern Recognition and Image Processing Computer Science Department

More information

CS 234. Module 6. October 25, CS 234 Module 6 ADT Dictionary 1 / 22

CS 234. Module 6. October 25, CS 234 Module 6 ADT Dictionary 1 / 22 CS 234 Module 6 October 25, 2016 CS 234 Module 6 ADT Dictionary 1 / 22 Case study Problem: Find a way to store student records for a course, wit unique IDs for eac student, were records can be accessed,

More information

Areas of Triangles and Parallelograms. Bases of a parallelogram. Height of a parallelogram THEOREM 11.3: AREA OF A TRIANGLE. a and its corresponding.

Areas of Triangles and Parallelograms. Bases of a parallelogram. Height of a parallelogram THEOREM 11.3: AREA OF A TRIANGLE. a and its corresponding. 11.1 Areas of Triangles and Parallelograms Goal p Find areas of triangles and parallelograms. Your Notes VOCABULARY Bases of a parallelogram Heigt of a parallelogram POSTULATE 4: AREA OF A SQUARE POSTULATE

More information

1.4 RATIONAL EXPRESSIONS

1.4 RATIONAL EXPRESSIONS 6 CHAPTER Fundamentals.4 RATIONAL EXPRESSIONS Te Domain of an Algebraic Epression Simplifying Rational Epressions Multiplying and Dividing Rational Epressions Adding and Subtracting Rational Epressions

More information

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method International Journal of Statistics and Applications 0, (): -0 DOI: 0.9/j.statistics.000.0 Comparison of te Efficiency of te Various Algoritms in Stratified Sampling wen te Initial Solutions are Determined

More information

Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks

Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Okan Yilmaz and Ing-Ray Cen Computer Science Department Virginia Tec {oyilmaz, ircen}@vt.edu

More information

Materials: Whiteboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector.

Materials: Whiteboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector. Adam Clinc Lesson: Deriving te Derivative Grade Level: 12 t grade, Calculus I class Materials: Witeboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector. Goals/Objectives:

More information

Numerical Derivatives

Numerical Derivatives Lab 15 Numerical Derivatives Lab Objective: Understand and implement finite difference approximations of te derivative in single and multiple dimensions. Evaluate te accuracy of tese approximations. Ten

More information

12.2 Techniques for Evaluating Limits

12.2 Techniques for Evaluating Limits 335_qd /4/5 :5 PM Page 863 Section Tecniques for Evaluating Limits 863 Tecniques for Evaluating Limits Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing

More information

Notes: Dimensional Analysis / Conversions

Notes: Dimensional Analysis / Conversions Wat is a unit system? A unit system is a metod of taking a measurement. Simple as tat. We ave units for distance, time, temperature, pressure, energy, mass, and many more. Wy is it important to ave a standard?

More information

MTH-112 Quiz 1 - Solutions

MTH-112 Quiz 1 - Solutions MTH- Quiz - Solutions Words in italics are for eplanation purposes onl (not necessar to write in te tests or. Determine weter te given relation is a function. Give te domain and range of te relation. {(,

More information

Mean Waiting Time Analysis in Finite Storage Queues for Wireless Cellular Networks

Mean Waiting Time Analysis in Finite Storage Queues for Wireless Cellular Networks Mean Waiting Time Analysis in Finite Storage ueues for Wireless ellular Networks J. YLARINOS, S. LOUVROS, K. IOANNOU, A. IOANNOU 3 A.GARMIS 2 and S.KOTSOOULOS Wireless Telecommunication Laboratory, Department

More information

Lecture 7. Binary Search Trees / AVL Trees

Lecture 7. Binary Search Trees / AVL Trees Lecture 7. Binary Searc Trees / AVL Trees T. H. Cormen, C. E. Leiserson and R. L. Rivest Introduction to Algoritms, 3rd Edition, MIT Press, 2009 Sungkyunkwan University Hyunseung Coo coo@skku.edu Copyrigt

More information

Design of PSO-based Fuzzy Classification Systems

Design of PSO-based Fuzzy Classification Systems Tamkang Journal of Science and Engineering, Vol. 9, No 1, pp. 6370 (006) 63 Design of PSO-based Fuzzy Classification Systems Cia-Cong Cen Department of Electronics Engineering, Wufeng Institute of Tecnology,

More information

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 Note: Tere will be a very sort online reading quiz (WebWork) on eac reading assignment due one our before class on its due date. Due dates can be found

More information

NOTES: A quick overview of 2-D geometry

NOTES: A quick overview of 2-D geometry NOTES: A quick overview of 2-D geometry Wat is 2-D geometry? Also called plane geometry, it s te geometry tat deals wit two dimensional sapes flat tings tat ave lengt and widt, suc as a piece of paper.

More information

12.2 TECHNIQUES FOR EVALUATING LIMITS

12.2 TECHNIQUES FOR EVALUATING LIMITS Section Tecniques for Evaluating Limits 86 TECHNIQUES FOR EVALUATING LIMITS Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing tecnique to evaluate its of

More information

Section 1.2 The Slope of a Tangent

Section 1.2 The Slope of a Tangent Section 1.2 Te Slope of a Tangent You are familiar wit te concept of a tangent to a curve. Wat geometric interpretation can be given to a tangent to te grap of a function at a point? A tangent is te straigt

More information

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result RT. Complex Fractions Wen working wit algebraic expressions, sometimes we come across needing to simplify expressions like tese: xx 9 xx +, xx + xx + xx, yy xx + xx + +, aa Simplifying Complex Fractions

More information

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various

More information

TREES. General Binary Trees The Search Tree ADT Binary Search Trees AVL Trees Threaded trees Splay Trees B-Trees. UNIT -II

TREES. General Binary Trees The Search Tree ADT Binary Search Trees AVL Trees Threaded trees Splay Trees B-Trees. UNIT -II UNIT -II TREES General Binary Trees Te Searc Tree DT Binary Searc Trees VL Trees Treaded trees Splay Trees B-Trees. 2MRKS Q& 1. Define Tree tree is a data structure, wic represents ierarcical relationsip

More information

Wrap up Amortized Analysis; AVL Trees. Riley Porter Winter CSE373: Data Structures & Algorithms

Wrap up Amortized Analysis; AVL Trees. Riley Porter Winter CSE373: Data Structures & Algorithms CSE 373: Data Structures & Wrap up Amortized Analysis; AVL Trees Riley Porter Course Logistics Symposium offered by CSE department today HW2 released, Big- O, Heaps (lecture slides ave pseudocode tat will

More information

Classify solids. Find volumes of prisms and cylinders.

Classify solids. Find volumes of prisms and cylinders. 11.4 Volumes of Prisms and Cylinders Essential Question How can you find te volume of a prism or cylinder tat is not a rigt prism or rigt cylinder? Recall tat te volume V of a rigt prism or a rigt cylinder

More information

Author's personal copy

Author's personal copy Autor's personal copy Information Processing Letters 09 (009) 868 875 Contents lists available at ScienceDirect Information Processing Letters www.elsevier.com/locate/ipl Elastic tresold-based admission

More information

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks Downloaded from vbn.aau.dk on: April 7, 09 Aalborg Universitet etwork Coding to Enance Standard Routing Protocols in Wireless Mes etworks Palevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank;

More information

Alternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method

Alternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method Te Open Plasma Pysics Journal, 2010, 3, 29-35 29 Open Access Alternating Direction Implicit Metods for FDTD Using te Dey-Mittra Embedded Boundary Metod T.M. Austin *, J.R. Cary, D.N. Smite C. Nieter Tec-X

More information

3.6 Directional Derivatives and the Gradient Vector

3.6 Directional Derivatives and the Gradient Vector 288 CHAPTER 3. FUNCTIONS OF SEVERAL VARIABLES 3.6 Directional Derivatives and te Gradient Vector 3.6.1 Functions of two Variables Directional Derivatives Let us first quickly review, one more time, te

More information

each node in the tree, the difference in height of its two subtrees is at the most p. AVL tree is a BST that is height-balanced-1-tree.

each node in the tree, the difference in height of its two subtrees is at the most p. AVL tree is a BST that is height-balanced-1-tree. Data Structures CSC212 1 AVL Trees A binary tree is a eigt-balanced-p-tree if for eac node in te tree, te difference in eigt of its two subtrees is at te most p. AVL tree is a BST tat is eigt-balanced-tree.

More information

Java Method Modeling using Application Response Measurement (ARM)

Java Method Modeling using Application Response Measurement (ARM) Java Metod Modeling using Application Response Measurement (ARM) Dr. Carl J. De Pasquale College of Staten Island Staten Island, NY Abstract - Wat sould not be surprising, especially to anyone wo as attempted

More information

Binary Search Tree - Best Time. AVL Trees. Binary Search Tree - Worst Time. Balanced and unbalanced BST

Binary Search Tree - Best Time. AVL Trees. Binary Search Tree - Worst Time. Balanced and unbalanced BST AL Trees CSE Data Structures Unit Reading: Section 4.4 Binary Searc Tree - Best Time All BST operations are O(d), were d is tree dept minimum d is d = log for a binary tree N wit N nodes at is te best

More information

2.3 Additional Relations

2.3 Additional Relations 3 2.3 Additional Relations Figure 2.3 identiies additional relations, indicating te locations o te object and image, and te ratio o teir eigts (magniication) and orientations. Ray enters te lens parallel

More information

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer

More information

1 Finding Trigonometric Derivatives

1 Finding Trigonometric Derivatives MTH 121 Fall 2008 Essex County College Division of Matematics Hanout Version 8 1 October 2, 2008 1 Fining Trigonometric Derivatives 1.1 Te Derivative as a Function Te efinition of te erivative as a function

More information

Piecewise Polynomial Interpolation, cont d

Piecewise Polynomial Interpolation, cont d Jim Lambers MAT 460/560 Fall Semester 2009-0 Lecture 2 Notes Tese notes correspond to Section 4 in te text Piecewise Polynomial Interpolation, cont d Constructing Cubic Splines, cont d Having determined

More information

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes Coarticulation: An Approac for Generating Concurrent Plans in Markov Decision Processes Kasayar Roanimanes kas@cs.umass.edu Sridar Maadevan maadeva@cs.umass.edu Department of Computer Science, University

More information

Computation of Bounds and Performance Guarantees for Client-Server Systems Using a Queueing Network Model

Computation of Bounds and Performance Guarantees for Client-Server Systems Using a Queueing Network Model Computation of Bounds and Performance Guarantees for Client-Server Systems Using a Queueing Network Model Shikharesh Majumdar, Alex Hubbard Department of Systems and Computer Engineering, Carleton University,

More information

More on Functions and Their Graphs

More on Functions and Their Graphs More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in

More information

You Try: A. Dilate the following figure using a scale factor of 2 with center of dilation at the origin.

You Try: A. Dilate the following figure using a scale factor of 2 with center of dilation at the origin. 1 G.SRT.1-Some Tings To Know Dilations affect te size of te pre-image. Te pre-image will enlarge or reduce by te ratio given by te scale factor. A dilation wit a scale factor of 1> x >1enlarges it. A dilation

More information

Asynchronous Power Flow on Graphic Processing Units

Asynchronous Power Flow on Graphic Processing Units 1 Asyncronous Power Flow on Grapic Processing Units Manuel Marin, Student Member, IEEE, David Defour, and Federico Milano, Senior Member, IEEE Abstract Asyncronous iterations can be used to implement fixed-point

More information

12.2 Investigate Surface Area

12.2 Investigate Surface Area Investigating g Geometry ACTIVITY Use before Lesson 12.2 12.2 Investigate Surface Area MATERIALS grap paper scissors tape Q U E S T I O N How can you find te surface area of a polyedron? A net is a pattern

More information

PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION

PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION Martin Kraus Computer Grapics and Visualization Group, Tecnisce Universität Müncen, Germany krausma@in.tum.de Magnus Strengert Visualization and Interactive

More information

ON THE USE OF PERFORMANCE MODELS TO DESIGN SELF-MANAGING COMPUTER SYSTEMS

ON THE USE OF PERFORMANCE MODELS TO DESIGN SELF-MANAGING COMPUTER SYSTEMS 2003 Menascé and Bennani. All ights eserved. In roc. 2003 Computer Measurement Group Conf., Dec. 7-2, 2003, Dallas, T. ON THE USE OF EFOMANCE MODELS TO DESIGN SELF-MANAGING COMUTE SYSTEMS Daniel A. Menascé

More information

Minimizing Memory Access By Improving Register Usage Through High-level Transformations

Minimizing Memory Access By Improving Register Usage Through High-level Transformations Minimizing Memory Access By Improving Register Usage Troug Hig-level Transformations San Li Scool of Computer Engineering anyang Tecnological University anyang Avenue, SIGAPORE 639798 Email: p144102711@ntu.edu.sg

More information

Computing geodesic paths on manifolds

Computing geodesic paths on manifolds Proc. Natl. Acad. Sci. USA Vol. 95, pp. 8431 8435, July 1998 Applied Matematics Computing geodesic pats on manifolds R. Kimmel* and J. A. Setian Department of Matematics and Lawrence Berkeley National

More information

Affine and Projective Transformations

Affine and Projective Transformations CS 674: Intro to Computer Vision Affine and Projective Transformations Prof. Adriana Kovaska Universit of Pittsburg October 3, 26 Alignment problem We previousl discussed ow to matc features across images,

More information

A signature analysis based method for elliptical shape

A signature analysis based method for elliptical shape A signature analysis based metod for elliptical sape Ivana Guarneri, Mirko Guarnera, Giuseppe Messina and Valeria Tomaselli STMicroelectronics - AST Imaging Lab, Stradale rimosole 50, Catania, Italy ABSTRACT

More information

HW 2 Bench Table. Hash Indexes: Chap. 11. Table Bench is in tablespace setq. Loading table bench. Then a bulk load

HW 2 Bench Table. Hash Indexes: Chap. 11. Table Bench is in tablespace setq. Loading table bench. Then a bulk load Has Indexes: Cap. CS64 Lecture 6 HW Benc Table Table of M rows, Columns of different cardinalities CREATE TABLE BENCH ( KSEQ integer primary key, K5K integer not null, K5K integer not null, KK integer

More information

CE 221 Data Structures and Algorithms

CE 221 Data Structures and Algorithms CE Data Structures and Algoritms Capter 4: Trees (AVL Trees) Text: Read Weiss, 4.4 Izmir University of Economics AVL Trees An AVL (Adelson-Velskii and Landis) tree is a binary searc tree wit a balance

More information

Chapter K. Geometric Optics. Blinn College - Physics Terry Honan

Chapter K. Geometric Optics. Blinn College - Physics Terry Honan Capter K Geometric Optics Blinn College - Pysics 2426 - Terry Honan K. - Properties of Ligt Te Speed of Ligt Te speed of ligt in a vacuum is approximately c > 3.0µ0 8 mês. Because of its most fundamental

More information

Multi-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art

Multi-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art Multi-Objective Particle Swarm Optimizers: A Survey of te State-of-te-Art Margarita Reyes-Sierra and Carlos A. Coello Coello CINVESTAV-IPN (Evolutionary Computation Group) Electrical Engineering Department,

More information

Some Handwritten Signature Parameters in Biometric Recognition Process

Some Handwritten Signature Parameters in Biometric Recognition Process Some Handwritten Signature Parameters in Biometric Recognition Process Piotr Porwik Institute of Informatics, Silesian Uniersity, Bdziska 39, 41- Sosnowiec, Poland porwik@us.edu.pl Tomasz Para Institute

More information

Image Registration via Particle Movement

Image Registration via Particle Movement Image Registration via Particle Movement Zao Yi and Justin Wan Abstract Toug fluid model offers a good approac to nonrigid registration wit large deformations, it suffers from te blurring artifacts introduced

More information

Density Estimation Over Data Stream

Density Estimation Over Data Stream Density Estimation Over Data Stream Aoying Zou Dept. of Computer Science, Fudan University 22 Handan Rd. Sangai, 2433, P.R. Cina ayzou@fudan.edu.cn Ziyuan Cai Dept. of Computer Science, Fudan University

More information

On the use of FHT, its modification for practical applications and the structure of Hough image

On the use of FHT, its modification for practical applications and the structure of Hough image On te use of FHT, its modification for practical applications and te structure of Houg image M. Aliev 1,3, E.I. Ersov, D.P. Nikolaev,3 1 Federal Researc Center Computer Science and Control of Russian Academy

More information

Epochs: Trace-Driven Analytical Modeling of Job Execution Times

Epochs: Trace-Driven Analytical Modeling of Job Execution Times Department of Computer Science George Mason University Technical Reports 4400 University Drive MS#4A5 Fairfax, VA 22030-4444 USA http://cs.gmu.edu/ 703-993-1530 Epochs: Trace-Driven Analytical Modeling

More information

Introduction to Computer Graphics 5. Clipping

Introduction to Computer Graphics 5. Clipping Introduction to Computer Grapics 5. Clipping I-Cen Lin, Assistant Professor National Ciao Tung Univ., Taiwan Textbook: E.Angel, Interactive Computer Grapics, 5 t Ed., Addison Wesley Ref:Hearn and Baker,

More information

MAPI Computer Vision

MAPI Computer Vision MAPI Computer Vision Multiple View Geometry In tis module we intend to present several tecniques in te domain of te 3D vision Manuel Joao University of Mino Dep Industrial Electronics - Applications -

More information

Consolidating Windowing Transformations Discussion with Applications to Screen Savers Program in Computer Graphics

Consolidating Windowing Transformations Discussion with Applications to Screen Savers Program in Computer Graphics Int'l Conf. Frontiers in Education: CS and CE FECS'6 87 Consolidating Windoing Transformations Discussion it Applications to Screen Savers Program in Computer Grapics Hassan Farat Computer Science University

More information

CSCE476/876 Spring Homework 5

CSCE476/876 Spring Homework 5 CSCE476/876 Spring 2016 Assigned on: Friday, Marc 11, 2016 Due: Monday, Marc 28, 2016 Homework 5 Programming assignment sould be submitted wit andin Te report can eiter be submitted wit andin as a PDF,

More information

θ R = θ 0 (1) -The refraction law says that: the direction of refracted ray (angle θ 1 from vertical) is (2)

θ R = θ 0 (1) -The refraction law says that: the direction of refracted ray (angle θ 1 from vertical) is (2) LIGHT (Basic information) - Considering te ligt of a projector in a smoky room, one gets to geometrical optics model of ligt as a set of tiny particles tat travel along straigt lines called "optical rays.

More information

Intra- and Inter-Session Network Coding in Wireless Networks

Intra- and Inter-Session Network Coding in Wireless Networks Intra- and Inter-Session Network Coding in Wireless Networks Hulya Seferoglu, Member, IEEE, Atina Markopoulou, Member, IEEE, K K Ramakrisnan, Fellow, IEEE arxiv:857v [csni] 3 Feb Abstract In tis paper,

More information

PLK-B SERIES Technical Manual (USA Version) CLICK HERE FOR CONTENTS

PLK-B SERIES Technical Manual (USA Version) CLICK HERE FOR CONTENTS PLK-B SERIES Technical Manual (USA Version) CLICK ERE FOR CONTENTS CONTROL BOX PANEL MOST COMMONLY USED FUNCTIONS INITIAL READING OF SYSTEM SOFTWARE/PAGES 1-2 RE-INSTALLATION OF TE SYSTEM SOFTWARE/PAGES

More information

CHAPTER The elevation can be determined as. The partial derivatives can be evaluated,

CHAPTER The elevation can be determined as. The partial derivatives can be evaluated, 1 CHAPTER 14 14.1 Te elevation can be determined as (.8,1. (.81. 1.5(1. 1.5(.8 Te partial derivatives can be evaluated,.5 (1..5(.8.4 1.5 4 (.8 1.5 4(1. 1.7 (1. 5 5.4 wic can be used to determine te gradient

More information

Investigating an automated method for the sensitivity analysis of functions

Investigating an automated method for the sensitivity analysis of functions Investigating an automated metod for te sensitivity analysis of functions Sibel EKER s.eker@student.tudelft.nl Jill SLINGER j..slinger@tudelft.nl Delft University of Tecnology 2628 BX, Delft, te Neterlands

More information

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks An Algoritm for Loopless Deflection in Potonic Packet-Switced Networks Jason P. Jue Center for Advanced Telecommunications Systems and Services Te University of Texas at Dallas Ricardson, TX 75083-0688

More information

Experimental Studies on SMT-based Debugging

Experimental Studies on SMT-based Debugging Experimental Studies on SMT-based Debugging Andre Sülflow Görscwin Fey Rolf Drecsler Institute of Computer Science University of Bremen 28359 Bremen, Germany {suelflow,fey,drecsle}@informatik.uni-bremen.de

More information

A Quantitative Model for Capacity Estimation of Products

A Quantitative Model for Capacity Estimation of Products A Quantitative Model for Capacity Estimation of Products RAJESHWARI G., RENUKA S.R. Software Engineering and Technology Laboratories Infosys Technologies Limited Bangalore 560 100 INDIA Abstract: - Sizing

More information

An Interactive X-Ray Image Segmentation Technique for Bone Extraction

An Interactive X-Ray Image Segmentation Technique for Bone Extraction An Interactive X-Ray Image Segmentation Tecnique for Bone Extraction Cristina Stolojescu-Crisan and Stefan Holban Politenica University of Timisoara V. Parvan 2, 300223 Timisoara, Romania {cristina.stolojescu@etc.upt.ro

More information

Linear Interpolating Splines

Linear Interpolating Splines Jim Lambers MAT 772 Fall Semester 2010-11 Lecture 17 Notes Tese notes correspond to Sections 112, 11, and 114 in te text Linear Interpolating Splines We ave seen tat ig-degree polynomial interpolation

More information

2.8 The derivative as a function

2.8 The derivative as a function CHAPTER 2. LIMITS 56 2.8 Te derivative as a function Definition. Te derivative of f(x) istefunction f (x) defined as follows f f(x + ) f(x) (x). 0 Note: tis differs from te definition in section 2.7 in

More information