Partitioning vs. Replication for Token-Based Commodity Distribution

Size: px
Start display at page:

Download "Partitioning vs. Replication for Token-Based Commodity Distribution"

Transcription

1 Parttonng vs. Replcaton for Token-Based Commodty Dstrbuton 8 XUdHWLQWHPHO Insttute for Advanced Computer Studes, Department of Computer Scence, Unversty of Maryland, College Park ugur@cs.umd.edu Banu Özden Bell Laboratores, Lucent Technologes ozden@research.bell-labs.com Mchael J. Frankln Computer Scence Dvson, EECS Unversty of Calforna, Berkeley frankln@cs.berkeley.edu Av Slberschatz Bell Laboratores, Lucent Technologes av@research.bell-labs.com Abstract The prolferaton of e-commerce has enabled a new set of applcatons that allow globally dstrbuted purchasng of commodtes such as books, CDs, travel tckets, etc., over the Internet. These commodtes can be represented on lne by tokens, whch can be dstrbuted among servers to enhance the performance and avalablty of such applcatons. There are two man approaches for dstrbutng such tokens replcaton and parttonng. Token replcaton requres expensve dstrbuted synchronzaton protocols to provde data consstency, and s subject to both hgh latency and blockng n case of network parttons. On the other hand, token parttonng allows many transactons to execute locally wthout any global synchronzaton, whch results n low latency and mmunty aganst network parttons. In ths paper, we examne the Data-Value Parttonng (DVP) approach to token-based commodty dstrbuton. We propose novel DVP strateges that vary n the way they redstrbute tokens among the servers of the system. Usng a detaled smulaton model and real Internet message traces, we nvestgate the performance of our DVP strateges by comparng them aganst a prevously proposed scheme, Generalzed Ste Escrow (), whch s based on replcaton and escrow transactons. Our experments demonstrate that, for the types of applcatons and envronment we address, replcaton-based approaches are nether necessary nor desrable, as they nherently requre quorum synchronzaton to mantan consstency. We show that DVP, prmarly due to ts ablty to provde hgh server autonomy, performs favorably n all cases studed. 1 Introducton The prolferaton of e-commerce and wdespread access to the WWW have enabled a new set of applcatons that allow globally dstrbuted purchasng of commodtes and merchandse such as books, CDs, travel tckets, etc., over the Internet. Companes, such as Amazon.com, Expeda, etc., that support these types of applcatons are drastcally ncreasng n number and scale. As these applcatons become more popular, centralzed mplementatons wll fall short of meetng ther latency, scalablty, and avalablty demands, thereby requrng dstrbuted solutons. Conventonal dstrbuted mplementatons, however, are also not vable for these applcatons: they nherently requre tght global synchronzaton, and, thus, break down n envronments where the nature of the communcatons medum s falure-prone and unpredctable. More effectve dstrbuted solutons can be realzed by explotng two mportant characterstcs of these applcatons: Frst, they nvolve a set of commodty types wth a lmted nventory (e.g., the latest CD of Emnem, economy class tckets for a partcular flght, etc.). Second, the operatons of nterest on these tems Part of ths work was done whle the author was workng at Bell Laboratores, Lucent Technologes Inc. 7KHIXOODGGUHVVRIWKHFRQWDFWDXWKRULV8 XUdHWLQWHPHO'HSDUWPHQWRI&RPSXWHU6FLHQFH8QLYHUVLW\RIDU\ODQG&ROOHJH Park, MD 2742, USA. Tel: (31) Fax: (31) E-mal: ugur@cs.umd.edu 1

2 typcally nvolve ncremental updates (e.g., buyng two economy tckets for a flght). It s, therefore, possble to acheve dstrbuton by usng tokens to represent the nstances of commodtes for sale. Prevous work (e.g., [5, 7, 11]) exploted the noton of tokens to enable hgh-volume transacton processng for dstrbuted resource allocaton applcatons. There are two fundamentally dfferent approaches for dstrbutng tokens replcaton and parttonng. Token replcaton requres expensve dstrbuted synchronzaton protocols to provde data consstency, and s subject to both hgh latency and blockng n case of network parttons or long delays n communcatons between groups of stes (whch are ndstngushable from network parttons). Token parttonng allows many transactons to execute locally wthout any global synchronzaton, whch results n low latency and mmunty aganst network parttons. The effectveness of token parttonng, however, reles on token redstrbuton technques that allow dynamc mgraton of tokens to the servers where they are needed. In ths paper, we examne the Data-Value Parttonng (DVP) [11] approach to token-based commodty dstrbuton. We propose novel DVP strateges that vary n the way they redstrbute tokens across the servers of the system. Usng a detaled smulaton model and real Internet message traces, we nvestgate the performance of our DVP redstrbuton strateges by comparng them aganst a prevously proposed scheme, Generalzed Ste Escrow () [7], whch s based on replcaton and escrow transactons [1]. generalzes prevous escrow algorthms for replcated databases, provdng hgher server autonomy and throughput. The man contrbutons of the paper are twofold: Frst, we extend the prevous work on DVP by proposng new token redstrbuton strateges and evaluatng ther performance under a range of workload scenaros. Second, although the basc approaches, DVP and, were both developed a number of years ago, ths paper s the frst to drectly compare ther performance. Thus, ths paper provdes valuable nsght nto the fundamental tradeoffs between parttonng and replcaton for the ncreasngly mportant problem of token-based commodty dstrbuton. The remander of the paper s organzed as follows. In Secton 2, we brefly descrbe the system model and the base and DVP algorthms. In Secton 3, we propose several token redstrbuton strateges for DVP. We descrbe the expermental envronment and methodology n Secton 5 and present our expermental results n Secton 6. Fnally, we dscuss related work n Secton 7 and offer concludng remarks n Secton 8. clent clent clent www gu server clent 2 Overvew of token parttonng In ths secton, we frst defne our system model. We then brefly gve an overvew of the basc DVP algorthm. For brevty, we leave asde many sgnfcant propertes such as recovery and concurrency control, focusng mostly on the performance-related ssues. Detals of DVP can be found [11]. 2.1 System model clent www gu server www gu server clent clent Fgure 1: System model www gu server server-server: token request/response perod/aperodc state nfo. clent-server: commodty request/response Our reference system model, llustrated n Fgure 1, conssts of a set of servers and clents that communcate va message exchange over a wde-area network. We assume, for smplcty of exposton, that the system stores a sngle commodty wth a lmted number of ndstngushable nstances and we represent each such nstance wth a sngle token. Through a web-based nterface, clents submt transactons that allocate tokens or return (.e., deallocate) tokens that have prevously been allocated. Therefore, the types of transactons that we model nvolve ncremental updates to a data tem, aval, whch denotes the number of tokens globally avalable n the system. We also assume, wthout loss of generalty, that there s a lower-bound constrant on aval: the system must ensure that aval does not become negatve at any tme (e.g., tckets for a partcular show should not be oversold). Therefore, all token return transactons can potentally commt (as they cannot volate the lower-bound constrant), whereas only some of the token allocaton transactons can commt. 2

3 Borrower server s b : 1. Lock tok b. 2. If tok b < req(t) borrow_tokens() /* borrow_tokens() gathers tokens from other stes and updates tok b as t receves tokens. */ 3. Wat untl tok b req(t) or tmeout. 4. If tmeout 5. Abort; unlock tok b; and ext. 6. Set tok b = tok b req(t). 7. Commt; and unlock tok b. Lender server s l : 1. Lock tok l. 2. Calculate the number of tokens, resp(s l, s b), resp(s l, s b) tok l, to be lent to s b; Send resp(s l, s b) tokens to s b; Set tok l = tok l resp(s l, s b); 3. Unlock tok l. Fgure 2: The Generc DVP algorthm 2.2 The DVP approach to token parttonng DVP [11] s a non-tradtonal approach for representng and dstrbutng data. It essentally apples to data tems that can be parttoned nto smaller peces such that the peces can also be regarded as nstances of the orgnal data tem. The same operators that apply to the orgnal tem should also apply to the peces (e.g., ncrement, decrement, set to zero, etc.). The basc dea underlyng DVP s to splt up the values of database tems and store each of the consttuent values (.e., tokens) at dfferent servers. Transactons are then executed locally at each server usng the tokens locally avalable at that server. Only n the event that the number of tokens locally avalable s nsuffcent to execute the transacton, the server makes requests to other servers only to borrow some ther tokens. If responses from other servers fal to arrve for any reason wthn a specfed tmeout perod, the transacton s aborted. Tokens are locked before beng accessed, however, only at the server where they resde,.e., no lock requests are made to other servers. The basc DVP algorthm s presented n Fgure 2. We refer to the number of tokens avalable at s as tok. The number of tokens requred to execute transacton t s req(t), whch s a negatve value f t s a return transacton. DVP s a fully decentralzed scheme that does not requre global synchronzaton. Due to ts non-blockng behavor, t s mmune to network parttons, and s thus partcularly well-suted for envronments wth unpredctable and falure-prone communcatons (e.g., many servers on the Internet) due to the hgh server autonomy t enables. 3 Token redstrbuton strateges Token parttonng enables servers to execute transactons locally as long as they have suffcent tokens. When a server cannot execute a transacton locally due to nsuffcent number of tokens, t must be able to locate tokens avalable at other servers and acqure them n a tmely fashon n order to contnue transacton executon. The performance of DVP reles upon how effectvely ths token redstrbuton among servers s accomplshed. The man questons that a token redstrbuton strategy needs to answer are: 1. when to request tokens, 2. whch servers to request tokens from, and 3. how many tokens to request. It s possble to construct a cost functon wth a set of constrants and solve t to fnd the optmal token redstrbuton. Unfortunately, not only t s dffcult to construct a realstc cost functon due to the dynamc, dstrbuted nature of the system, and the fact that tokens are pershable resources (.e., they cease to exst after beng used), but also t s long known that even smpler formulatons of the problem are NP-hard [4, 5]. Snce optmal solutons are mpractcal, we focus on heurstcs-based solutons n the rest of the paper. In partcular we avod global strateges that requre tght synchronzaton, and concentrate only on decentralzed strateges that make progress usng only par-wse synchronzaton. Note that prevous work on DVP [11] focused on the basc features of parttonng and gnored token redstrbuton ssues. In the rest of the secton, we descrbe several token redstrbuton strateges. We refer to the number of tokens requested by s b from s l as req(s b, s l ), the number of tokens returned by s l to s b as resp(s l, s b ). 3.1 Random redstrbuton We begn by descrbng our baselne strategy, BASIC. In ths strategy, the borrower contacts a lender server, whch the borrower pcks randomly, and requests the exact number of tokens needed: req( sb, sl ) = req( t) tokb If s b does not receve the entre amount t needs, t then randomly chooses another lender server and requests the remanng amount. The lender computes the return amount as: req( sb, sl ), f req( sb, sl ) tokl ; resp( sl, sb ) = tokl, otherwse. The messages exchanged among servers are mnmal, and only nclude token requests and responses. 3.2 Token count-based redstrbuton The BASIC strategy makes blnd redstrbuton decsons, snce t does not mantan or utlze any nformaton about the states of other servers. The 3

4 strategy attempts to make more ntellgent decsons by ncorporatng knowledge of the token counts at other servers nto ths decson process. The state mantaned by a server s s bascally a token table (tt) that stores an estmate of the number of tokens avalable at all servers;.e., tt[j]=(tok j, tstamp j ), where tok j s the token count at s j at logcal tme tstamp j, j=1 n, and n s the number of servers. makes more ntellgent redstrbuton decsons at the expense of mantanng and dssemnatng token count nformaton. Servers dssemnate token count nformaton usng pggybackng and broadcastng. Each server, when sendng a message to another server, also ncorporates ts token table nto the message. In addton to ths pggybackng, servers broadcast ther states to other servers at the followng crtcal ponts: 1. when the number of tokens avalable at a server becomes less than a certan threshold value so that servers wth fewer tokens can be dfferentated from the ones wth many more tokens; 2. when a server runs out of tokens so that other servers do not make token requests to ths server anymore, and; 3. when tokens are returned at a server that prevously had run out of tokens so that other servers may resume requestng tokens from ths server. A server s updates ts token table when s commts a transacton t: tok = tok req( t) and tstamp = tstamp + 1 and, when s receves a token table from server s k, k : k tok = tok and tstamp = tstamp k, f tstamp k > tstamp j j j j j j j = 1... n, j. A borrower server, s b, consults ts state table when choosng a lender server. It (rank) orders the servers accordng to ther token counts. The lender servers are then chosen based on ther ranks: at each step, a mnmal set of lenders, L, that together have a suffcent number of tokens s chosen as lenders. Formally, L S { s b } s chosen such that: b tok req( t) tok, and l L l L s. t. L S { s }, tok b req( t) tok, and L < L b l b l L where S s the set of all servers (see Secton for the other lender selecton schemes). The borrower then contacts the lenders n parallel, wthout watng for reples. The borrower makes a pessmstc assumpton about the avalablty of tokens at lender servers and requests req(t)-tok tokens from each lender. If the estmated token count of a server s zero, then that server s not contacted at all. The redstrbuton at a lender proceeds smlar to that n the BASIC case. b 3.3 Token demand-based redstrbuton In the prevous strateges, token redstrbuton occurs as the result of a token request, whch s ntated only when the borrower has nsuffcent tokens to execute a transacton successfully. The strategy, on the other hand, contnually redstrbutes tokens across servers based on the token request rates at each server. Such a demand-based redstrbuton s lkely to be benefcal especally when there s a skew n server workloads. Each server mantans a smple token request rate value, rr j, for each server s j, j=1 n. Ths value ndcates the number of tokens requested from a partcular server durng a certan perod of tme. Each server updates ts own request rate value and dssemnate t along wth ts token table usng pggybackng and broadcastng as descrbed before. SHARE/PRETECH employs two key technques that utlze request rate values of the servers: 1. Token sharng refers to the redstrbuton of tokens based on the token request rates as observed by the nvolved servers. The borrower server s b sends ts token request rate, rr b, along wth ts token request. The lender server s l computes the number of tokens that t should share wth s b as: rr b share( sl, sb ) = c tokl rrb + rrl amng to acheve a balanced token redstrbuton accordng to relatve request rates (where c s the sharng constant). Server s l then returns: share( sl, sb ), f share( sl, sb ) req( sb, sl ); req( sl, sb ), f share( sl, sb) < req( sb, sl ) and resp( sl, sb ) = tokl req( sb, sl ); tokl, otherwse. 2. Token prefetchng refers to the perodc, request ratebased redstrbuton of tokens n the background. Prefetchng can potentally elmnate the need to search for tokens as part of transacton executon, thereby reducng response tme and ncreasng avalablty. Perodcally, each server contacts every other server n some prefxed order (n the background). When s contacts s j, the tokens avalable at s and s j are redstrbuted among the two servers as follows: rr tok = ( tok + tok j ) rr + rrj where tok and tok = ( tok + tok ) tok j j tok j are the respectve token counts at s and s j after redstrbuton. Although the token redstrbuton mechansm we descrbed operates n a par-wse fashon and uses only the nformaton that s avalable at the two servers redstrbutng ther tokens, t s qute robust n that t n- 4

5 crementally mgrates the exstng global token dstrbuton n the system to match the global relatve request rate dstrbuton. Furthermore, we expermentally proved that, usng ths par-wse mechansm, any exstng token dstrbuton converges to any desred global dstrbuton exponentally fast. Fgure 3 demonstrates ths exponental convergence by plottng the number of par-wse token exchanges (between randomly selected servers) versus the sum of errors between the global target token dstrbuton and the exstng token dstrbuton (averaged over 1 randomly selected target and ntal token dstrbutons for a system wth 1 servers). A smlar par-wse exchange mechansm has been proposed [2] n the context of Deno, an object replcaton system based on an epdemc weghted-votng protocol, n order to mgrate exstng weght dstrbutons to target weght dstrbutons. 3.4 Prmary-based, hybrd redstrbuton Our prelmnary experments revealed that, as the number of tokens n the system decreases, t becomes ncreasngly harder to locate and gather the necessary number of tokens n a dstrbuted fashon. Borrower servers typcally make several unsuccessful attempts untl they are able to gather the tokens they need. Even though there mght be suffcent tokens globally avalable n the system, dentfyng the servers that have the tokens can be very costly, especally f the system conssts of many servers. In such cases, transacton executon costs can become so hgh that the performance benefts of usng a dstrbuted system may be overshadowed. The strategy attempts to add the benefts of usng a centralzed model for stuatons where only a small number of tokens reman n the system. The system operates n regular, decentralzed mode (usng the strategy) as long as the number of tokens avalable s above a fxed threshold value, but swtches to a centralzed mode of operaton when the total number of tokens drops below ths threshold. In ths strategy, each commodty s assgned a prmary server that s responsble for satsfyng all the requests nvolvng the tokens of a partcular commodty when the system operates n the centralzed mode. Each server contnuously observes the global number of avalable tokens for the commodtes for whch t serves as the prmary. If the number of tokens drops below a partcular callback threshold value, the correspondng prmary ntates the swtch to the centralzed mode by broadcastng callback messages. Each server, havng receved a callback message for a commodty, sends all the tokens of that commodty to the prmary. After the callback, the prmary executes all requests nvolvng that commodty locally. When a non-prmary receves sum of errors a token request after a callback, t smply forwards the request to the prmary, whch executes the request and returns the result back to the clent. 1 If the number of tokens later ncreases above the callback threshold, the system swtches back to ts decentralzed operaton: the prmary redstrbutes the tokens t has to other servers (unformly or dependng on ts knowledge of the request rates at servers). 4 Algorthms for token replcaton exponentally ft curve 1 servers number of par-wse token redstrbuton sessons Fgure 3: Incrementally convergng to global target token dstrbutons va par-wse token exchanges We now brefly descrbe the Generalzed Ste Escrow () scheme [7], an effcent replcaton scheme based on escrow transactons [1], as the representatve replcaton-based approach to dstrbuted token mantenance. In, the number of tokens avalable n the system, referred to as aval, s replcated at all servers. The escrow quantty at s, whch represents the number of tokens that s can dspense wthout contactng other servers, s computed as: aval es = n where aval s s s vew of aval, and n s the number of servers. Each server perodcally broadcasts the token allocatons t performed to lmt the extent to whch vews of aval s out-of-date. The escrow quantty as each server, therefore, dynamcally decreases as tokens are allocated. Each server estmates the escrow quanttes at other servers, whch are then used to replensh ts own escrow quantty and allocate tokens wthout contactng other servers, f possble. In order to mplement ths scheme, reles on: (1) gossp messages, whch are perodc background 1 An alternatve model, whch assumes the exstence of a set of forwardng agents, such as cluster DNSs that translate logcal names nto the IP-addresses of one of the servers [3], enables clent requests to be submtted drectly to the correspondng prmary. Ths latter model elmnates the (useless) ntal request to a non-prmary server. 5

6 messages that nclude the token allocatons known by the sender server, n order to lmt the global token allocatons unknown to a server, and; (2) quorum lockng to lmt the number of token allocatons that can be performed concurrently at the quorum servers. A server s can perform token allocatons as long as es, whch s updates dynamcally t allocates tokens and receves gossp messages, s large enough. In case es s not suffcent, s needs to contact other servers and form a synchronous quorum of servers such that the combned escrow quanttes of the quorum servers are enough to execute the transacton. Formng a quorum of servers nvolves remotely lockng the aval values at the quorum servers by sendng lock/unlock messages. Such remote lockng nvolvng multple servers, as our results wll demonstrate, s relatvely expensve to perform n wde-area and s the man performance bottleneck of replcaton-based approaches such as. Fgure 4 depcts the basc algorthm. Intally, only s s n the quorum of t (denoted by Q t ). Step 2 computes the escrow quantty es. The tght synchronzaton among the servers n Q t enables s to use the escrow quanttes of the other servers n Q t. Snce s s not up-to-date regardng the token allocatons performed by the other servers n the system, t, thus, makes a conservatve estmate regardng ts escrow sze. Server s makes ths estmate by placng an upper bound on the escrow values assumed by non-quorum servers; thereby guaranteeng that smultaneous token allocatons do not cause a lower-bound constrant volaton. In order to make ths estmate, s computes U, whch denotes the set of token allocaton transactons t u such that t u s known to s, and s s not sure that t u s known to all the non-quorum servers. The sum req( t) + req( tu ) tu U provdes an upper bound on the number of token allocatons that mght be unknown to non-quorum servers. The nequalty n Step 4 checks whether all but (at most) the last es req(t) allocatons known to s are known to all the non-quorum servers. If ths nequalty evaluates to true, t means that es s nsuffcent; addtonal servers need to be added to Q t. Ths s accomplshed by makng (remote) lock requests to nvolved servers regardng ther vews of aval, aval j for s j ). Durng ths lockng phase, the vews of aval at the quorum servers are synchronzed (.e., the aval values at the quorum servers become equal). If es s stll not suffcent and all servers are already n the quorum (Step 4), the transacton s aborted. If es s suffcent, the executon of t can proceed. After all the necessary updates and loggng are performed, t commts and all local and remote locks are released. It s mportant to emphasze that the performance of heavly depends on how up-to-date each 1. Lock aval and set Q t ={s }. 2. Set es = aval / n Q t. 3. Compute U. 4. If es < req(t) + req( t ) If Q t < n server s regardng the global token allocatons performed and the cost of synchronzaton among servers 5 Expermental envronment 5.1 Smulaton model tu U In order to evaluate the performance of and the DVP strateges, we mplemented a detaled smulaton model usng CSIM [1]. The model conssts of components that model a dstrbuted set of servers, a populaton of clents makng commodty requests, and communcaton latences among servers Server module The server module s responsble for executng clent transactons usng ether DVP or. It conssts of: a resource manager, whch schedules the CPU and dsk (usng a non-preemptve FIFO polcy); a buffer manager, whch handles transfer of data between the dsk and buffer; a communcaton manager, whch handles the passng of messages to and from the network module usng a queue to mplement ordered message retreval and processng. Every message sent or receved by the server s charged a fxed CPU cost, specfed n terms of the number of nstructons executed. No per-message-byte cost s modeled snce we assume the use of short, fxed-szed control messages; and a transacton manager, whch coordnates the executon of transactons. We now descrbe the transacton manager n more detal. The transacton manager conssts of several components. One component s the lock manager, whch handles all lockng assocated wth a gven concurrency protocol. Deadlocks are handled usng a tmeout mechansm. The transacton manager also contans several algorthm-specfc components. The escrow manager mantans all necessary nformaton and makes all the quorum-based decsons when modelng the algorthm. It also contans a gossp manager component that coordnates the sendng of gossp mes- u Lock aval j of a server s j Q t and add s j to Q t Goto Step 2. Else abort; and for all s j Q t, unlock aval j. 5. Perform requste updates 6. Commt; and for s j Q t, unlock aval j Fgure 4: The algorthm mplemented by s to execute transacton t 6

7 sages to other servers. The other algorthm-specfc component s the DVP manager, whch s responsble for mplementng the redstrbuton strateges that we descrbed. The DVP manager also contans a gossp manager component that s responsble for dssemnatng state nformaton va message exchange. Every message sent or receved by a server s charged a fxed CPU cost. No per-message-byte cost s modeled snce we assume the use of short, fxed-szed control messages Clent transacton generator module The clent transacton generator models a populaton of clents submttng transactons to the system. The model generates transactons usng exponental nterarrval tmes and submts them to the network module for delvery to a server. We model the transactons based on common characterstcs of wde-area commodty dstrbuton applcatons we dscussed n Secton 1. A clent request nvolves a sngle commodty 2 wth a specfc number of tokens (e.g., buyng two tckets for a partcular show). Infrequently, the tokens obtaned from the system are returned (e.g., the return of a book, cancellaton of a tcket). The transactons we generate, therefore, specfy a partcular commodty and a value ndcatng the number of tokens requested of that commodty. The commodty to be requested s selected unformly among all the commodtes n the database, and the number of tokens to request s chosen unformly from a gven nterval. Each successfully executed transacton potentally has a return transacton that returns the tokens obtaned by the orgnal transacton. A return transacton s submtted to the system wth a gven probablty. Return transactons, f submtted, are ssued by the clent that prevously submtted the correspondng allocaton transacton Network module The network module models Internet communcaton latences among the servers. Rather than usng a synthetc model to generate communcaton latences and nject certan falure modes (e.g., message losses, network parttons, etc.), we sampled messagng latences over the Internet. For a perod of three days, we contnuously collected traces of par-wse ICMP (.e., png) message exchange among four servers, whch are located at College Park (Maryland), Murray Hll (New Jersey), Lexngton (Kentucky) and Santa Barbara (Calforna). The traces were then formatted nto lsts whose entres are the latences of each message exchange or an 2 We do not nvestgate transactons that nvolve multple commodtes n ths work. Although t s straghtforward to generalze the algorthms for that case, such a generalzaton s beyond the scope of ths paper. ndcaton that the message was lost (approxmately 2% of the messages were lost). The server-server traces are used to drve the network component of the smulatons as follows. At the begnnng of a smulaton run, one trace s randomly (unformly) chosen for each par of servers, and one entry s selected randomly (unformly) on each trace as a startng pont. Whenever a server sends a message to another server, the current latency value for the correspondng trace s read and the current entry s ncremented. The message s delayed by ths latency value and then nserted nto the message queue of the destnaton server. If the entry ndcates a message loss, then the message s re-sent after a tmeout perod of 2 ms (twce the average round-trp tme between any par of servers). In order to model the communcaton latences between servers and clents, we used a smlar approach. We used clent machnes whose IP addresses were obtaned from the web-server traces of a large telecommuncatons company. We chose 4 machnes that were scattered over the Internet. We sent control messages from our four servers to these clents for a perod of three days, and logged the latency values observed. The communcaton between the clents and the servers conssts of a short clent message that ncludes the transacton requested and a short response message from the server ndcatng the result of the transacton submtted. Thus, the sampled latences can reasonably be used n modelng the clent-server communcaton n our envronment. The use of a clent-server trace s smlar to that descrbed above for the server-server case. The use of wde-area ICMP traces as descrbed s a reasonable technque for our purposes, snce (a) our Parameter Settng Parameter Settng Number of 1 Database sze 2 servers (commodtes) Local lock 2 (ms) Number of tokens 2 tmeout Remote lock 5 (ms) Number of clents 4 tmeout CPU speed 2 (ms) Transacton nter-arrval tme exp(1.) (msec) Dsk latency.97 (s) Update transacton 1. probablty Dsk transfer rate 4 (MB/s) Transacton sze 1 (commodtes) Buffer ht.95 Tokens requested unform(1,5) rato per transacton (tokens) Item read 1 Return transacton.1 cost (nstr.) probablty Item wrte 2 Workload skew. or 1. cost (nstr.) (θ ) Message cost 1 (nstr.) Prefetch perod 1 (s) Control message sze 64 (bytes) Callback threshold 2 (tokens) Commodty tem sze 512 (bytes) Sharng constant 1. Table 1: Prmary expermental parameters and default settngs 7

8 BASIC Number of Commtted Transactons Mean Response Tme (msec) model conssts of servers communcatng va message exchange over a wde-area network, and (b) the protocols we study only requre the transfer of control messages but not any data messages. Table 1 shows the man smulaton parameters and ther default settngs. 5.2 Methodology Tme (msec) BASIC Fgure 5: Number of commtted transactons unform, 1 servers, 1 trans/s All the results reported n the followng secton are the averaged results of ten ndependent smulaton runs. For each set of runs, the same set of ten workloads (.e., the same clents submttng the same requests at the same tme) are used when comparng dfferent approaches to ensure farness. The only factor that results n dfferent loads for the dfferent approaches s the exstence of return transactons. Snce the schedulng of a return transacton s dependent on whether or not the correspondng allocaton transacton commts, dfferent approaches wll typcally see dfferent return transactons. In partcular, the hgher the commt rate for an approach, the more return transactons that approach wll observe. Note that there are two reasons why a transacton may not commt n our envronment. Frst, a transacton may tmeout watng for a local or remote lock and abort. Second, ether there may not be suffcent tokens n the system to execute the transacton successfully or there may be suffcent tokens but the system may not be able to locate them n a tmely manner. 6 Performance experments and results Ths secton present the results of our performance experments comparng our DVP strateges and the (extended) approach. We frst dscuss two modfcatons to the basc approach. Both modfcatons sgnfcantly mproved the performance of n our experments. The frst modfcaton addresses the parallel lockng of the quorum servers. As suggested n [7], rather than requrng each server to construct a quorum sequentally, t s possble to estmate an ntal quorum sze and lock the quorum servers n parallel. If the quorum Tme (msec) Fgure 6: Mean response tme unform, 1 servers, 1 trans/s needs to be enlarged, a new set of non-quorum servers are added to the quorum and locked n parallel. The detals about quorum sze estmaton can be found n [7]. The second modfcaton nvolves the use of background messages. Recall that the performance of depends heavly on the extent to whch servers are upto-date regardng the token allocatons performed n the system. In the basc approach, servers perodcally broadcast ther states to the other servers. In order to ensure that servers have the most up-to-date nformaton possble, we modfed the algorthm so that these background messages are sent whenever an update s commtted. When a server receves such an update notfcaton, t also notfes the other servers that t s aware of that update. Whle ths approach s not lkely to be practcal for a real mplementaton, t mproves the performance of n our experments because (1) the messages are sent n the background, not n the crtcal path of updates and (2) the messages are all short control messages. Thus, the messages have lttle or no negatve mpact on update performance, whle provdng the beneft of up-to-date nformaton to all of the servers 3. By mplementng ths aperodc strategy, we gve an unfar advantage over DVP, whch uses far fewer messages for dssemnatng state nformaton, for the purposes of these experments. 6.1 Basc performance The graphs we present n ths secton demonstrate how the performance changes over tme. As to be expected, the performance of all the approaches becomes worse as the number of tokens globally avalable n the system decreases. Most of the measurements shown are cumulatve measures. For example, the response tme 3 We also expermented wth ncreasng the frequency of the perodc messages of the basc approach. The results showed, however, that for ths envronment, the aperodc approach provdes better performance wth fewer messages than the perodc one. 8

9 Number of Commtted Transactons Mean Response Tme (msec) Tme (msec) Fgure 7: Number of commtted trans. (nstantaneous) unform, 1 servers, 1 trans/s value that s plotted at tme 1, ms s the mean of the response tmes for all transactons that have commtted n the frst 1 (smulated) seconds of the experment. Whenever nsghtful, we also present nstantaneous results that depct the performance of the approaches durng a certan executon wndow. In all the experments, we fx the number of servers at 1 and the mean nter-arrval tme for clent transactons at 1 ms. At ths nter-arrval rate, all of the approaches demonstrate stable behavor Unform workload We now show the results of the algorthms under a unform workload where the transacton requests are unformly dstrbuted across servers (.e., θ =). Fgure 5 presents num-commts, the number of commtted transactons, by and the DVP strateges. The fgure reveals that the DVP strateges delver a sgnfcantly hgher num-commts than does. For all the DVP strateges, num-commts ntally ncreases rapdly. Wth each commtted allocaton transacton, however, aval, the number of tokens globally avalable, decreases. num-commts, then, settles down as very few transactons can commt due to a lack of tokens n the system. The dfferences among dfferent DVP approaches here are not sgnfcant. Fgure 6 shows the complementary resp-tme, mean response tme, results. All the DVP strateges, except BASIC, outperform throughout the entre executon range. These DVP varants manage to keep ther resp-tme qute low, whereas the performance of deterorates quckly after several hundred transactons are executed. The resp-tme of BASIC drastcally ncreases as aval decreases snce t selects the lender servers randomly and cannot tell whether a server has any tokens or not. The other DVP strateges do not suffer from the same problem, achevng much better resptme values. The approach, as explaned n Secton 4, operates by formng a quorum of servers. It therefore requres tght synchronzaton among the quorum servers Tme (msec) Fgure 8: Mean response tme (nstantaneous) unform, 1 servers, 1 trans/s Such synchronzaton turns out to be qute costly n a wde-area envronment. The DVP approaches, however, do not requre synchronzaton: they can contnue executng transactons locally as long as they have suffcent tokens at ther dsposal. Even n the case when a server runs out of suffcent tokens and has to make requests to other servers, t never has to communcate synchronously wth multple servers. In order to gan more nsght, we present the nstantaneous num-commts results for,, and n Fgure 7. Each pont represents the number of commtted transactons durng a tme wndow (of length 3, ms) that s centered at the tme value on the x-axs. Ths fgure, n contrast to Fgure 5 that demonstrates the cumulatve behavor of the system over tme, presents the number of transactons commtted durng certan executon perods. Intally, num-commts for the DVP approaches are sgnfcantly larger than that of. As aval decreases rapdly, num-commts also decreases. After about 15 seconds, s able to commt more transactons than the DVP approaches. Ths s because, durng that executon range, aval for the DVP approaches s much smaller than aval for, makng t (relatvely) more dffcult for the DVP approaches to commt transac- Number of Messages BASIC Tme (msec) Fgure 9: Number of messages sent unform, 1 servers, 1 trans/s 9

10 Number of Commtted Transactons Number of Local Transactons Tme (msec) Fgure 1: Number of commtted transactons skewed, 1 servers, 1 trans/s tons. Eventually, num-commts for the DVP approaches drop close to zero, as aval goes to zero. At the end of the executon range shown, aval s stll hgh for, so can stll contnue to commt transactons. Correspondng nstantaneous resp-tme results are shown n Fgure 8. The fgure demonstrates that both DVP strateges delver better response tmes than durng all executon perods. Note the dfference between the shapes of the resp-tme curves of and the DVP approaches. The resp-tme of the DVP approaches ntally ncreases as the number of locally avalable tokens decreases, reachng a peak. The resptme values then begn to decrease as num-commts decrease and aval becomes so small that most of the transactons that commt are local ones (whch have low response tmes). It can be seen that performs slghtly better than. The resp-tme for, however, ncreases gradually as the quorum szes ncrease wth decreasng aval. A closer look at the raw results clearly demonstrates the fundamental drawbacks of : (1) cannot execute as many transactons locally as DVP approaches do, and (2) the sze of the quorum that a server has to form also ncreases as aval decreases., therefore, not only has to contact other servers most of the tme, but also has to lock more and more servers as aval decreases, aggravatng ts neffcency. The mean quorum sze for, whch s the average number of quorum servers per transacton, s 1.1 n the ntal 1 seconds, 2.1 n the perod of [9,1] seconds, and 3.7 n the perod of [19,2] seconds. Another problem of s ts hgh abort rate, whch occurs manly due to tmeout n lock wats. Lock wats tend to become a serous problem n a wde-area system as the communcaton latences are unpredctable. DVP approaches, on the other hand, can execute transactons locally most of the tme, achevng hgher commt rates and lower response tmes by avodng latences and delays typcally encountered durng nterserver communcaton Tme (msec) Fgure 11: Number of locally executed transactons skewed, 1 servers, 1 trans/s Fgure 9 presents num-msgs, the number of messages sent, for all of the approaches studed here. Note that ths metrc ncludes all messages exchanged durng the operaton of the system. sends a large number of messages compared to the DVP strateges. Even wth ths large volume of gosspng among servers, cannot perform comparably to DVP. BASIC ntally sends fewer messages than the other DVP strateges, as t does not dssemnate state nformaton. As aval decreases, however, BASIC begns to suffer from ts lack of nformaton about the states of other servers, havng to choose the servers to ask for tokens randomly. The other DVP strateges make smarter decsons about whch servers to contact (or not to contact) and succeed n lmtng ther num-msgs. Beyond a certan pont, uses slghtly fewer messages than the other DVP approaches because once the system swtches to centralzed mode, all the tokens are handled by a sngle server, avodng the need to contact multple servers to gather tokens Skewed workload In ths secton, we study the case where servers receve transactons accordng to a hghly-skewed Zpf dstrbuton (.e., θ =1), as opposed to the unform dstrbuton case studed before. We present the num-commts acheved by and the DVP strateges under the skewed workload n Fgure 1 (we drop BASIC from presentaton n the rest of the paper, as t s consstently outperformed by the other DVP approaches). Comparson of these results wth those for the balanced case mmedately shows that (1) all approaches are negatvely mpacted by the hgh skew n the workload, (2) DVP approaches stll sgnfcantly outperform, and (3) the strategy acheves the hghest num-commts. For all the approaches, a few popular servers perform most of the token allocatons due to the skew n the workload. In, although the escrow szes vary dynamcally, the popular servers exhaust the tokens n 1

11 Number of Commtted Transactons Mean Response Tme (msec) Number of Servers Fgure 12: Number of commtted transactons unform, vared servers, 1 trans/s ther local escrows rapdly, havng to form quorums most of the tme. In DVP, the popular servers consume ther local tokens quckly, and then have to contact the less popular servers n order to obtan tokens. Comparng the ndvdual DVP strateges, observe that acheves the hghest numcommts. Ths superor performance s due to ts ablty to redstrbute tokens dynamcally across servers va sharng and prefetchng based on request rates;.e., by contnuously transferrng tokens from the less popular servers to more popular ones. and provde vrtually equvalent performance. Fgure 11, whch shows the number of transactons that are executed locally wthout contactng other servers, further justfes ths behavor. In terms of response tme also outperforms the other approaches for most of the experment (not shown). The results of the experments presented so far reveal that: (1) the proposed DVP strateges sgnfcantly outperform under varous workloads; (2),, and outperform BASIC manly because they explot state nformaton; (3) when there s a balanced workload, and demonstrate the best performance, whle demonstrates somewhat better response tmes; and (4) under skewed workloads, compares favorably to other schemes as t adaptvely redstrbutes tokens based on the loads on servers. 6.2 Scalablty Varyng number of servers We now nvestgate how the approaches perform as we scale the number of servers n the system. All the results presented here are the mean values of the relevant metrcs at 2 seconds. The choce of 2 seconds s not arbtrary. In fact, at around 2 seconds, the results for the commt rate and response tme related metrcs tend to stablze for all approaches. As before, we fx Number of Servers Fgure 13: Mean response tme unform, vared servers, 1 trans/s the transacton nterarrval tme at 1 ms. We present only the num-commts and resp-tme results under the unform workload. Fgure 12 shows the num-commts when varyng the number of servers. All approaches presented are negatvely affected as the system sze s ncreased. The reasons for ths result are twofold. Frst, the workload conssts of update transactons only. Second, at the request rate for whch we present the results, the performance of the system s not CPU or I/O bound, but s largely synchronzaton bound. The well-known benefts of usng a dstrbuted system to dstrbute the workload, thus, are not apparent here. The num-commts value for drops drastcally wth ncreasng number of servers. We observe that num-commts for always les below those of the DVP strateges. The DVP strateges scale better; wth beng the one wth the best scalablty as t s qute robust for regons wth small aval regardless of the number of servers n the system. and perform smlarly to each other. Fgure 13, whch presents the resp-tme results, shows that has the best response tme for the case where there are two servers. Its performance, however, degrades and falls behnd those of the DVP approaches very rapdly wth ncreasng number of servers. In addton, ts num-commts s below those of the DVP strateges for all system szes shown (ncludng the two-server case). Ths s not surprsng because as the number of servers ncreases, synchronzaton among them becomes ncreasngly more dffcult and expensve. The DVP results are consstent wth the correspondng num-commts results Varyng transacton rate Next, we nvestgate the performance of the approaches as the transacton nterarrval tme s vared. Smlar to the prevous case, each pont plotted s the mean value of the correspondng metrc at 2 seconds. As before, we fx the number of servers at ten. 11

12 Number of Commtted Transactons Transacton Interarrval Tme (msec) Fgure 14: Number of commtted transactons unform, 1 servers, vared transacton rate We show the num-commts results for the and the DVP strateges n Fgure 14. It can be seen that for low transacton nterarrval tmes (.e., hgh transacton arrval rates), num-commts acheved by and the DVP approaches deterorates drastcally. The system cannot sustan nterarrval tmes lower than about twothree ms, below whch the performance worsens substantally. For these and lower values, the state of the system changes very rapdly and the state nformaton mantaned at each server becomes outdated quckly. Another factor contrbutng to low num-commts s the ncreased lock contenton at servers whch results n a hgh number of transacton aborts. All systems recover as the nterarrval tmes are ncreased, and, n fact, ther performance does not mprove sgnfcantly above an nterarrval tme of fve ms. We observe smlar results for all the DVP strateges. Examnng Fgure 15, we observe (relatvely) hgh resp-tme values for the DVP strateges for nterarrval tmes below three ms (for whch the system s not stable). Although seems to do a better job n lmtng ts resp-tme values for nterarrval tmes below three ms, ts num-commts s much lower than those of the DVP strateges for all the nterarrval values shown. 6.3 Other experments In the remander of the secton, we brefly dscuss addtonal experments that we conducted n order to explore potental mprovements to the parttonng strateges dscussed earler Load balancng Comparson of the results for the balanced and skewed workload cases reveal that the DVP approaches suffer, although not as much as, from load mbalance. We, therefore, nvestgated the potental benefts of employng a smple load balancng mechansm to dstrbute the load evenly across servers. In ths mechansm each clent, rather than submttng the transacton to ts closest server, randomly pcks a server to submt Mean Response Tme (msec) the transacton 4. Servers use the strategy or any other strategy for that matter wthout any modfcatons. The advantage of such load balancng s that the workload seen by each server wll (on average) be smlar. In such a case, as we observed from the unform workload results, the DVP approaches wll demonstrate sgnfcantly better performance. The downsde s that such a randomzed selecton elmnates the potental gans of submttng the transacton to the closest server. Ths restrcton potentally results n ncreased clent-sde response tmes. Expermental results demonstrate that ths s ndeed the case: Our smple load balancng technque acheves better server-sde response tmes than the no-load balancng strategy. In fact, t acheves results qute smlar to those of for the unform workload case. Clent-sde response tmes, however, turn out to be smlar, or slghtly better for the no-load balancng case, demonstratng the aforementoned tradeoff Non-determnstc selecton of lenders The DVP strateges presented are determnstc n that they use the estmated token counts at servers to choose the lender servers. Ths determnstc selecton may lead to a stuaton where, for a gven perod of tme, most of the token requests are targeted to the same server, makng that server a hot-spot. Our experments showed that, due to the dfferences among the vews at dfferent servers, such stuatons do not occur very frequently: the probablty s no more than 1% and 3% hgher than the random selecton case on average for the unform and skewed cases, respectvely. In order to elmnate such stuatons completely, we studed two randomzed schemes. The frst scheme chooses the lenders randomly wth equal probablty (among those wth a non-zero token count). The other 4 Note that ths s a very practcal and easy-to-mplement scheme Transacton Interarrval Tme (msec) Fgure 15: Mean response tme unform, 1 servers, vared transacton rate 12

13 scheme s based on the dea of lottery schedulng [13], where lenders are chosen wth a probablty proportonal to ther token counts. Experments reveal that the lottery-schedulng scheme performs somewhat better than the completely random scheme, achevng commt rates smlar to those of the determnstc scheme, whle sufferng less than a 2% deteroraton n response tme under both the unform and skewed workloads (usng ). 7 Related work Most prevous related work focused on explotng applcaton semantcs to mprove performance n certan classes of applcatons. O Nel proposed Escrow transactons [1] to enable concurrent access to hgh traffc aggregate felds on whch only a restrcted class of operatons (such as ncremental updates) are allowed. Ths technque utlzes the commutatvty property of such operatons;.e., two operatons can run n any order and stll produce the same fnal result provded that they do not volate upper/lower bound constrants on the nvolved data tems. Escrow transactons execute a specal escrow operaton that attempts to put n escrow (.e., reserve) some of the resources that t plans to acqure. All escrow operatons that succeed are logged. Transactons consult ths log before executng an escrow operaton and see the total amount of resources that are escrowed by all uncommtted transactons. If the total quantty of unescrowed resources s suffcent, the transacton proceeds; otherwse t aborts. Haerder extended the escrow transactonal model for centralzed database envronments to DB-sharng systems [6] where multple DBMSs share the database at the dsk level. He proposed the use of a herarchcal escrow scheme that conssts of a global escrow and local dstrbuted escrows. He dscussed a technque that enables the herarchcal scheme to behave lke a purely global scheme for only a crtcal margn of aggregate values. Kumar and Stonebraker generalzed the noton of escrow transactons for replcated data [9]. Each server s assgned an escrow quantty that can be used to execute transactons locally. The escrow quanttes at servers are readjusted by the use of a perodc global snapshot algorthm. Ths algorthm has to be executed suffcently frequently for servers to have an up-to-date vew of the global state. On the other hand, frequent executon of such a costly algorthm may tself degrade performance. Both DVP and employ mechansms that elmnate the need for a global snapshot algorthm. The work most closely related to our nvestgaton of varous redstrbuton strateges s [8], where Kumar dscussed several borrowng polces for escrow transactons n a replcated envronment. Kumar devsed four smple borrowng polces that (1) select lender servers ether randomly or accordng to a pre-specfed order, and (2) that borrow ether the exact amount they need or borrow an amount such that the fnal escrow quanttes at the nvolved servers become equal. Note that one of the polces, n whch the lender server s chosen randomly and the exact amount needed s requested, s smlar to our BASIC strategy. Unlke our strateges, however, Kumar s borrowng polces do not make use of the knowledge of the global state of the system to mprove ts effectveness and adapt dynamcally to workload. Golubchk and Thomasan dscussed demand-drven token allocaton schemes n the context of a fractonal data allocaton method (FDA) [5]. One such scheme they descrbe enables token parttonng between the nvolved servers based on demand (as n our SHARE strategy). In [12], Thomasan further dscussed FDA and proposed an abstract model for optmal ntal allocaton of tokens, whch we do not address n ths paper. It s worth notng that no prevous work has explored the fundamental tenson between replcaton and parttonng for token-based resource dstrbuton, whch s our man focus n ths paper. 8 Conclusons Token-based commodty dstrbuton can meet the demands of a class of newly emergng Internet-based e- commerce applcatons. In ths paper, we expermentally evaluated and compared two fundamentally dfferent approaches to token dstrbuton parttonng and replcaton usng real Internet message traces. We also proposed several par-wse token redstrbuton strateges for the parttonng-based approach and evaluated them under dfferent workloads. Our experments reveal a number of sgnfcant results for token-based commodty dstrbuton. Frst, replcaton-based approaches are nether necessary nor desrable for the knds of applcatons and envronment we address n ths study. Parttonng-based approaches perform and scale better prmarly due to ther ablty to provde hgher server autonomy. Second, the use of nformaton about the system state turns out to be crucal for makng token redstrbuton decsons. Thrd, when there s a balanced load on the servers, the use of complcated redstrbuton schemes does not mert ther complexty; smple strateges can be as effectve, provded that they utlze mnmal state nformaton. Fnally, n the case of skewed workloads, however, the use of extra nformaton about request rates may yeld notable performance mprovements. In terms of future work, we are plannng to nvestgate herarchcal server organzatons, whch can mprove the performance sgnfcantly when the number of servers s large. 13

Design and Evaluation of Redistribution Strategies for Wide-Area Commodity Distribution

Design and Evaluation of Redistribution Strategies for Wide-Area Commodity Distribution Submtted for publcaton Desgn and Evaluaton of Redstrbuton Strateges for Wde-Area Commodty Dstrbuton 8 XUdHWLQWHPHO Banu Özden Mchael J. Frankln Av Slberschatz Unversty of Maryland, College Park ugur@cs.umd.edu

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Shared Running Buffer Based Proxy Caching of Streaming Sessions

Shared Running Buffer Based Proxy Caching of Streaming Sessions Shared Runnng Buffer Based Proxy Cachng of Streamng Sessons Songqng Chen, Bo Shen, Yong Yan, Sujoy Basu Moble and Meda Systems Laboratory HP Laboratores Palo Alto HPL-23-47 March th, 23* E-mal: sqchen@cs.wm.edu,

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

Efficient Broadcast Disks Program Construction in Asymmetric Communication Environments

Efficient Broadcast Disks Program Construction in Asymmetric Communication Environments Effcent Broadcast Dsks Program Constructon n Asymmetrc Communcaton Envronments Eleftheros Takas, Stefanos Ougaroglou, Petros copoltds Department of Informatcs, Arstotle Unversty of Thessalonk Box 888,

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

EECS 730 Introduction to Bioinformatics Sequence Alignment. Luke Huan Electrical Engineering and Computer Science

EECS 730 Introduction to Bioinformatics Sequence Alignment. Luke Huan Electrical Engineering and Computer Science EECS 730 Introducton to Bonformatcs Sequence Algnment Luke Huan Electrcal Engneerng and Computer Scence http://people.eecs.ku.edu/~huan/ HMM Π s a set of states Transton Probabltes a kl Pr( l 1 k Probablty

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

ELEC 377 Operating Systems. Week 6 Class 3

ELEC 377 Operating Systems. Week 6 Class 3 ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

an assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han

an assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han UNITY as a Tool for Desgn and Valdaton of a Data Replcaton System Phlppe Quennec Gerard Padou CENA IRIT-ENSEEIHT y Nnth Internatonal Conference on Systems Engneerng Unversty of Nevada, Las Vegas { 14-16

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION 24 CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION The present chapter proposes an IPSO approach for multprocessor task schedulng problem wth two classfcatons, namely, statc ndependent tasks and

More information

Comparison of Heuristics for Scheduling Independent Tasks on Heterogeneous Distributed Environments

Comparison of Heuristics for Scheduling Independent Tasks on Heterogeneous Distributed Environments Comparson of Heurstcs for Schedulng Independent Tasks on Heterogeneous Dstrbuted Envronments Hesam Izakan¹, Ath Abraham², Senor Member, IEEE, Václav Snášel³ ¹ Islamc Azad Unversty, Ramsar Branch, Ramsar,

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

Cache Performance 3/28/17. Agenda. Cache Abstraction and Metrics. Direct-Mapped Cache: Placement and Access

Cache Performance 3/28/17. Agenda. Cache Abstraction and Metrics. Direct-Mapped Cache: Placement and Access Agenda Cache Performance Samra Khan March 28, 217 Revew from last lecture Cache access Assocatvty Replacement Cache Performance Cache Abstracton and Metrcs Address Tag Store (s the address n the cache?

More information

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach Dstrbuted Resource Schedulng n Grd Computng Usng Fuzzy Approach Shahram Amn, Mohammad Ahmad Computer Engneerng Department Islamc Azad Unversty branch Mahallat, Iran Islamc Azad Unversty branch khomen,

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Maintaining temporal validity of real-time data on non-continuously executing resources

Maintaining temporal validity of real-time data on non-continuously executing resources Mantanng temporal valdty of real-tme data on non-contnuously executng resources Tan Ba, Hong Lu and Juan Yang Hunan Insttute of Scence and Technology, College of Computer Scence, 44, Yueyang, Chna Wuhan

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Internet Traffic Managers

Internet Traffic Managers Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John

More information

A fair buffer allocation scheme

A fair buffer allocation scheme A far buffer allocaton scheme Juha Henanen and Kalev Klkk Telecom Fnland P.O. Box 228, SF-330 Tampere, Fnland E-mal: juha.henanen@tele.f Abstract An approprate servce for data traffc n ATM networks requres

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

CS 268: Lecture 8 Router Support for Congestion Control

CS 268: Lecture 8 Router Support for Congestion Control CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router

More information

SRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions

SRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions SRB: Shared Runnng Buffers n Proxy to Explot Memory Localty of Multple Streamng Meda Sessons Songqng Chen,BoShen, Yong Yan, Sujoy Basu, and Xaodong Zhang Department of Computer Scence Moble and Meda System

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

A Genetic Algorithm Based Dynamic Load Balancing Scheme for Heterogeneous Distributed Systems

A Genetic Algorithm Based Dynamic Load Balancing Scheme for Heterogeneous Distributed Systems Proceedngs of the Internatonal Conference on Parallel and Dstrbuted Processng Technques and Applcatons, PDPTA 2008, Las Vegas, Nevada, USA, July 14-17, 2008, 2 Volumes. CSREA Press 2008, ISBN 1-60132-084-1

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Scheduling and queue management. DigiComm II

Scheduling and queue management. DigiComm II Schedulng and queue management Tradtonal queung behavour n routers Data transfer: datagrams: ndvdual packets no recognton of flows connectonless: no sgnallng Forwardng: based on per-datagram forwardng

More information

Future Generation Computer Systems

Future Generation Computer Systems Future Generaton Computer Systems 29 (2013) 1631 1644 Contents lsts avalable at ScVerse ScenceDrect Future Generaton Computer Systems journal homepage: www.elsever.com/locate/fgcs Gosspng for resource

More information

Optimizing Document Scoring for Query Retrieval

Optimizing Document Scoring for Query Retrieval Optmzng Document Scorng for Query Retreval Brent Ellwen baellwe@cs.stanford.edu Abstract The goal of ths project was to automate the process of tunng a document query engne. Specfcally, I used machne learnng

More information

Solution Brief: Creating a Secure Base in a Virtual World

Solution Brief: Creating a Secure Base in a Virtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Abstract The adopton rate of Vrtual Machnes has exploded at most organzatons, drven by the mproved

More information

Adaptive Power-Aware Prefetch in Wireless Networks

Adaptive Power-Aware Prefetch in Wireless Networks Adaptve Power-Aware Prefetch n Wreless Networks Langzhong Yn, Student Member, IEEE, and Guohong Cao, Member, IEEE Abstract Most of the prefetch technques used n the current cache management schemes do

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated.

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated. Some Advanced SP Tools 1. umulatve Sum ontrol (usum) hart For the data shown n Table 9-1, the x chart can be generated. However, the shft taken place at sample #21 s not apparent. 92 For ths set samples,

More information

arxiv: v3 [cs.ds] 7 Feb 2017

arxiv: v3 [cs.ds] 7 Feb 2017 : A Two-stage Sketch for Data Streams Tong Yang 1, Lngtong Lu 2, Ybo Yan 1, Muhammad Shahzad 3, Yulong Shen 2 Xaomng L 1, Bn Cu 1, Gaogang Xe 4 1 Pekng Unversty, Chna. 2 Xdan Unversty, Chna. 3 North Carolna

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Channel 0. Channel 1 Channel 2. Channel 3 Channel 4. Channel 5 Channel 6 Channel 7

Channel 0. Channel 1 Channel 2. Channel 3 Channel 4. Channel 5 Channel 6 Channel 7 Optmzed Regonal Cachng for On-Demand Data Delvery Derek L. Eager Mchael C. Ferrs Mary K. Vernon Unversty of Saskatchewan Unversty of Wsconsn Madson Saskatoon, SK Canada S7N 5A9 Madson, WI 5376 eager@cs.usask.ca

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Learning-Based Top-N Selection Query Evaluation over Relational Databases

Learning-Based Top-N Selection Query Evaluation over Relational Databases Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **

More information

WIRELESS communication technology has gained widespread

WIRELESS communication technology has gained widespread 616 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 4, NO. 6, NOVEMBER/DECEMBER 2005 Dstrbuted Far Schedulng n a Wreless LAN Ntn Vadya, Senor Member, IEEE, Anurag Dugar, Seema Gupta, and Paramvr Bahl, Senor

More information

A New Transaction Processing Model Based on Optimistic Concurrency Control

A New Transaction Processing Model Based on Optimistic Concurrency Control A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,

More information

TripS: Automated Multi-tiered Data Placement in a Geo-distributed Cloud Environment

TripS: Automated Multi-tiered Data Placement in a Geo-distributed Cloud Environment TrpS: Automated Mult-tered Data Placement n a Geo-dstrbuted Cloud Envronment Kwangsung Oh, Abhshek Chandra, and Jon Wessman Department of Computer Scence and Engneerng Unversty of Mnnesota Twn Ctes Mnneapols,

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture

Goals and Approach Type of Resources Allocation Models Shared Non-shared Not in this Lecture In this Lecture Goals and Approach CS 194: Dstrbuted Systems Resource Allocaton Goal: acheve predcable performances Three steps: 1) Estmate applcaton s resource needs (not n ths lecture) 2) Admsson control 3) Resource

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics A Hybrd Genetc Algorthm for Routng Optmzaton n IP Networks Utlzng Bandwdth and Delay Metrcs Anton Redl Insttute of Communcaton Networks, Munch Unversty of Technology, Arcsstr. 21, 80290 Munch, Germany

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

AP PHYSICS B 2008 SCORING GUIDELINES

AP PHYSICS B 2008 SCORING GUIDELINES AP PHYSICS B 2008 SCORING GUIDELINES General Notes About 2008 AP Physcs Scorng Gudelnes 1. The solutons contan the most common method of solvng the free-response questons and the allocaton of ponts for

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Parameter estimation for incomplete bivariate longitudinal data in clinical trials

Parameter estimation for incomplete bivariate longitudinal data in clinical trials Parameter estmaton for ncomplete bvarate longtudnal data n clncal trals Naum M. Khutoryansky Novo Nordsk Pharmaceutcals, Inc., Prnceton, NJ ABSTRACT Bvarate models are useful when analyzng longtudnal data

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Self-tuning Histograms: Building Histograms Without Looking at Data

Self-tuning Histograms: Building Histograms Without Looking at Data Self-tunng Hstograms: Buldng Hstograms Wthout Lookng at Data Ashraf Aboulnaga Computer Scences Department Unversty of Wsconsn - Madson ashraf@cs.wsc.edu Surajt Chaudhur Mcrosoft Research surajtc@mcrosoft.com

More information

CACHE MEMORY DESIGN FOR INTERNET PROCESSORS

CACHE MEMORY DESIGN FOR INTERNET PROCESSORS CACHE MEMORY DESIGN FOR INTERNET PROCESSORS WE EVALUATE A SERIES OF THREE PROGRESSIVELY MORE AGGRESSIVE ROUTING-TABLE CACHE DESIGNS AND DEMONSTRATE THAT THE INCORPORATION OF HARDWARE CACHES INTO INTERNET

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Effectiveness of Information Retraction

Effectiveness of Information Retraction Effectveness of Informaton on Cndy Hu, Malk Magdon-Ismal, Mark Goldberg and Wllam A. Wallace Department of Industral and Systems Engneerng Rensselaer Polytechnc Insttute Troy, New York Emal: huc@rp.edu,

More information

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems S. J and D. Shn: An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems 2355 An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems Seunggu J and Dongkun Shn, Member,

More information

Verification by testing

Verification by testing Real-Tme Systems Specfcaton Implementaton System models Executon-tme analyss Verfcaton Verfcaton by testng Dad? How do they know how much weght a brdge can handle? They drve bgger and bgger trucks over

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

A Distributed Dynamic Bandwidth Allocation Algorithm in EPON

A Distributed Dynamic Bandwidth Allocation Algorithm in EPON www.ccsenet.org/mas Modern Appled Scence Vol. 4, o. 7; July 2010 A Dstrbuted Dynamc Bandwdth Allocaton Algorthm n EPO Feng Cao, Demng Lu, Mnmng Zhang, Kang Yang & Ynbo Qan School of Optoelectronc Scence

More information

Adaptive Load Shedding for Windowed Stream Joins

Adaptive Load Shedding for Windowed Stream Joins Adaptve Load Sheddng for Wndowed Stream Jons Bu gra Gedk College of Computng, GaTech bgedk@cc.gatech.edu Kun-Lung Wu, Phlp Yu T.J. Watson Research, IBM {klwu,psyu}@us.bm.com Lng Lu College of Computng,

More information

GSLM Operations Research II Fall 13/14

GSLM Operations Research II Fall 13/14 GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

On Achieving Fairness in the Joint Allocation of Buffer and Bandwidth Resources: Principles and Algorithms

On Achieving Fairness in the Joint Allocation of Buffer and Bandwidth Resources: Principles and Algorithms On Achevng Farness n the Jont Allocaton of Buffer and Bandwdth Resources: Prncples and Algorthms Yunka Zhou and Harsh Sethu (correspondng author) Abstract Farness n network traffc management can mprove

More information

SAO: A Stream Index for Answering Linear Optimization Queries

SAO: A Stream Index for Answering Linear Optimization Queries SAO: A Stream Index for Answerng near Optmzaton Queres Gang uo Kun-ung Wu Phlp S. Yu IBM T.J. Watson Research Center {luog, klwu, psyu}@us.bm.com Abstract near optmzaton queres retreve the top-k tuples

More information

Run-Time Operator State Spilling for Memory Intensive Long-Running Queries

Run-Time Operator State Spilling for Memory Intensive Long-Running Queries Run-Tme Operator State Spllng for Memory Intensve Long-Runnng Queres Bn Lu, Yal Zhu, and lke A. Rundenstener epartment of Computer Scence, Worcester Polytechnc Insttute Worcester, Massachusetts, USA {bnlu,

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty

More information

Achieving class-based QoS for transactional workloads

Achieving class-based QoS for transactional workloads Achevng class-based QoS for transactonal workloads Banca Schroeder Mor Harchol-Balter Carnege Mellon Unversty Department of Computer Scence Pttsburgh, PA USA @cs.cmu.edu Arun Iyengar Erch

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

An Investigation into Server Parameter Selection for Hierarchical Fixed Priority Pre-emptive Systems

An Investigation into Server Parameter Selection for Hierarchical Fixed Priority Pre-emptive Systems An Investgaton nto Server Parameter Selecton for Herarchcal Fxed Prorty Pre-emptve Systems R.I. Davs and A. Burns Real-Tme Systems Research Group, Department of omputer Scence, Unversty of York, YO10 5DD,

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

5 The Primal-Dual Method

5 The Primal-Dual Method 5 The Prmal-Dual Method Orgnally desgned as a method for solvng lnear programs, where t reduces weghted optmzaton problems to smpler combnatoral ones, the prmal-dual method (PDM) has receved much attenton

More information

y and the total sum of

y and the total sum of Lnear regresson Testng for non-lnearty In analytcal chemstry, lnear regresson s commonly used n the constructon of calbraton functons requred for analytcal technques such as gas chromatography, atomc absorpton

More information