Utility-based Optimal Service Selection for Business Processes in Service Oriented Architectures

Size: px
Start display at page:

Download "Utility-based Optimal Service Selection for Business Processes in Service Oriented Architectures"

Transcription

1 Utility-based Optimal Service Selection for Business Processes in Service Oriented Architectures Vinod K. Dubey Daniel A. Menascé Web Services (ICWS), 2010 IEEE International Conference on. IEEE, 2010 Summarized by: Noor Bajunaid 1

2 Introduction Service Oriented Architectures allow service providers to provide similar functionalities with different QoS and cost. There is a need for server provider selection algorithms that optimize a utility function under constraints, efficiently. 2

3 Problem definition A business process B, with N activities, a i,,a n subject to Maximize U(E[R(z)],A(z),X(z)) E[R(z)] R max A min A(z) 1 X(z) X min C(z) C max z Z 3

4 BPEL <sequence> <invoke a1> <switch> <case q1> <flow> <invoke a2> <sequence> <invoke a3> <invoke a4> </sequence> </flow> <case q2=(1-q1)> <invoke a5> </switch> <invoke a6> </sequence> 1: a1 0: sequence 2: switch 9: a6 q1 q2 3: flow 8: a5 4: a2 5: sequence 6: a3 7: a4 4

5 Utility Functions 5

6 Computation of End-to-End QoS Metrics 6

7 Availability 0: sequence 1: a1 2: switch 9: a6 4: a2 q1 3: flow q2 8: a5 5: sequence 6: a3 7: a4 A = A1 * {q1* A2 * [A3 * A4] + q2 * A5} * A6 7

8 Computation of End-to-End QoS Metrics 8

9 Throughput 0: sequence 1: a1 2: switch 9: a6 4: a2 q1 3: flow q2 8: a5 5: sequence 6: a3 7: a4 X = min{x1, (q1* min{x2, X3, X4}), q2 * X5}, X6} 9

10 Computation of End-to-End QoS Metrics **Menascé, Daniel A., Emiliano Casalicchio, and Vinod Dubey. "On optimal service selection in service oriented architectures." Performance Evaluation 67.8 (2010):

11 Execution Time 0: sequence 1: a1 2: switch 9: a6 4: a2 q1 3: flow q2 8: a5 5: sequence 6: a3 7: a4 R = R1 + q1 * max {R2, (R3 + R4)} + q2 * R5 + R6 11

12 Computation of End-to-End QoS Metrics **Menascé, Daniel A., Emiliano Casalicchio, and Vinod Dubey. "On optimal service selection in service oriented architectures." Performance Evaluation 67.8 (2010):

13 Cost 0: sequence 1: a1 2: switch 9: a6 4: a2 q1 3: flow q2 8: a5 5: sequence 6: a3 7: a4 C = C1 + q1 * (C2 + C3 + C4) + q2 * C5 + C6 13

14 Optimal Service Selection 1) Extended JOSeS Algorithm: optimal solution efficient for moderate complicity 2) HCB Heuristic Algorithm near-optimal solution efficient even for large set of services 14

15 Extended JOSeS Algorithm Extends Jensen-based Optimal Service Selection Jensen s inequality: E[max{R 1,, R n }] max{e[r 1 ],, E[R n ]} It is expensive to compute E[max{R 1,, R n }]. Jensens s inequality provides a lower bound that is easier to compute. If the lower bound exceeds the maximum execution time, we ignore the allocation and avoid the expensive computation. 15

16 Extended JOSeS Algorithm If sub-allocation (s1,, sk), k N, violates a constraint, it can be discarded without the need for selecting SPs for activities of order > k. 16

17 Extended JOSeS Algorithm 17 Let lk be the list of SPs for ak: next(k) returns the next, not yet evaluated, SP in lk, or returns null if all the SPs in lk were already evaluated. reset(k) sets all SPs in all lists lj (j = k,..., N ) as not-visited. **Menascé, Daniel A., Emiliano Casalicchio, and Vinod Dubey. "On optimal service selection in service oriented architectures." Performance Evaluation 67.8 (2010): **

18 Extended JOSeS Algorithm S1,1 S1,2 S1,3 S1,1 S1,2 S1,3 S1,1 S1,2 S1,3 S2,1 S2,2 S2,1 S2,2 S2,1 S2,2 S3,1 S3,2 S3,3 S3,1 S3,2 S3,3 S3,1 S3,2 S3,3 S1,1 S1,1 S2,1 violation 18

19 Extended JOSeS Algorithm S1,1 S1,2 S1,3 S1,1 S1,2 S1,3 S1,1 S1,2 S1,3 S2,1 S2,2 S2,1 S2,2 S2,1 S2,2 S3,1 S3,2 S3,3 S3,1 S3,2 S3,3 S3,1 S3,2 S3,3 S1,1 S2,2 S1,1 S2,2 S3,1 S1,1 S2,2 S3,2 19

20 Extended JOSeS Algorithm S1,1 S1,2 S1,3 S1,1 S1,2 S1,3 S2,1 S2,2 S2,1 S2,2 S3,1 S3,2 S3,3 S3,1 S3,2 S3,3 S1,1 S2,2 S3,3 S1,2 Allocations that violate constraint will reduce the number of examined points 20

21 HCB Heuristic Algorithm Hill-climbing based: Define a neighborhood of an allocation Move to the best allocation in the neighborhood Repeat until near-optimum solution is found or maximum number of starts 21

22 HCB Heuristic Algorithm Neighborhood: for each activity, replace the SP with the other SPs that will maximize improvement in each QoS metric 22

23 HCB Heuristic Algorithm 23

24 HCB Heuristic Algorithm 24

25 Experimental Evaluation 1. Determine how effective is the heuristic solution compared to the optimal. 2. Compare the number of points examined by each algorithm 3. Compare both algorithms over a wide range of parameters 25

26 Experimental Evaluation 50 BPEL business processes. 6-9 activities with different construct (sequence, flow, switch) 2-7 SPs per activity. Constraints strength varied from 10% to 40% each combination was ran through JeSOS once,and through HCB 30 times 26

27 Experimental Evaluation QoS metrics of each SP for each activity are given: (E[R],A, X) CTotal = C(r) + C(X) + C(A) 27

28 Experimental Evaluation stricter constraints reduce the size of the neighborhood and decrease the breadth of the search. 28

29 Experimental Evaluation As CS increases, more sub-allocations are prematurely declared unfeasible. JeSOS will examine significantly less points and take less time. 29

30 Experimental Evaluation For a complex Business process and 7 SPs, HCB achieved 99.97% of optimal utility by examining 100 points. JeSOS examined more than 10,000,000 points! 30

31 Experimental Evaluation HCB scalability for large number of SPs/activity (50-400). Regression shows that the number of examined points increases linearly with umber of SPs. 31

32 Conclusion The most important conditions for JeSOS to be efficient are: simple business process structure. limited number of server providers stronger constraints. HCB is potentially very efficient for autonomic nearoptimal resource allocation. 32

Prediction-Based Admission Control for IaaS Clouds with Multiple Service Classes

Prediction-Based Admission Control for IaaS Clouds with Multiple Service Classes Prediction-Based Admission Control for IaaS Clouds with Multiple Service Classes Marcus Carvalho, Daniel Menascé, Francisco Brasileiro 2015 IEEE Intl. Conf. Cloud Computing Technology and Science Summarized

More information

An Autonomic Framework for Integrating Security and Quality of Service Support in Databases

An Autonomic Framework for Integrating Security and Quality of Service Support in Databases An Autonomic Framework for Integrating Security and Quality of Service Support in Databases Firas Alomari The Volgenau School of Engineering George Mason University Daniel A. Menasce Department of Computer

More information

Quality of Service Aspects and Metrics in Grid Computing

Quality of Service Aspects and Metrics in Grid Computing Quality of Service Aspects and Metrics in Grid Computing Daniel A. Menascé Dept. of Computer Science George Mason University Fairfax, VA menasce@cs.gmu.edu Emiliano Casalicchio Dipt. InformaticaSistemi

More information

A Kruskal-Based Heuristic for the Rooted Delay-Constrained Minimum Spanning Tree Problem

A Kruskal-Based Heuristic for the Rooted Delay-Constrained Minimum Spanning Tree Problem A Kruskal-Based Heuristic for the Rooted Delay-Constrained Minimum Spanning Tree Problem Mario Ruthmair and Günther R. Raidl Institute of Computer Graphics and Algorithms Vienna University of Technology,

More information

DiPerF: automated DIstributed PERformance testing Framework

DiPerF: automated DIstributed PERformance testing Framework DiPerF: automated DIstributed PERformance testing Framework Catalin Dumitrescu, Ioan Raicu, Matei Ripeanu, Ian Foster Distributed Systems Laboratory Computer Science Department University of Chicago Introduction

More information

On the Use of Performance Models in Autonomic Computing

On the Use of Performance Models in Autonomic Computing On the Use of Performance Models in Autonomic Computing Daniel A. Menascé Department of Computer Science George Mason University 1 2012. D.A. Menasce. All Rights Reserved. 2 Motivation for AC main obstacle

More information

AUTONOMIC, OPTIMAL, AND NEAR-OPTIMAL RESOURCE ALLOCATION IN CLOUD COMPUTING

AUTONOMIC, OPTIMAL, AND NEAR-OPTIMAL RESOURCE ALLOCATION IN CLOUD COMPUTING AUTONOMIC, OPTIMAL, AND NEAR-OPTIMAL RESOURCE ALLOCATION IN CLOUD COMPUTING by Arwa Sulaiman Aldhalaan A Dissertation Submitted to the Graduate Faculty of George Mason University In Partial fulfillment

More information

Topic 6: SDN in practice: Microsoft's SWAN. Student: Miladinovic Djordje Date:

Topic 6: SDN in practice: Microsoft's SWAN. Student: Miladinovic Djordje Date: Topic 6: SDN in practice: Microsoft's SWAN Student: Miladinovic Djordje Date: 17.04.2015 1 SWAN at a glance Goal: Boost the utilization of inter-dc networks Overcome the problems of current traffic engineering

More information

A Framework for Utility-Based Service Oriented Design in SASSY

A Framework for Utility-Based Service Oriented Design in SASSY A Framework for Utility-Based Service Oriented Design in SASSY The material in these slides comes from the paper A Framework for Utility-Based Service Oriented Design in SASSY, D.A. Menasce, J. Ewing,

More information

UNIT 4 Branch and Bound

UNIT 4 Branch and Bound UNIT 4 Branch and Bound General method: Branch and Bound is another method to systematically search a solution space. Just like backtracking, we will use bounding functions to avoid generating subtrees

More information

15.082J and 6.855J. Lagrangian Relaxation 2 Algorithms Application to LPs

15.082J and 6.855J. Lagrangian Relaxation 2 Algorithms Application to LPs 15.082J and 6.855J Lagrangian Relaxation 2 Algorithms Application to LPs 1 The Constrained Shortest Path Problem (1,10) 2 (1,1) 4 (2,3) (1,7) 1 (10,3) (1,2) (10,1) (5,7) 3 (12,3) 5 (2,2) 6 Find the shortest

More information

Towards Self-Adaptation for Dependable Service Oriented Systems

Towards Self-Adaptation for Dependable Service Oriented Systems Towards Self-Adaptation for Dependable Service Oriented Systems Valeria Cardellini 1, Emiliano Casalicchio 1, Vincenzo Grassi 1, Francesco Lo Presti 1, and Raffaela Mirandola 2 1 Università di Roma Tor

More information

Notes for Lecture 18

Notes for Lecture 18 U.C. Berkeley CS17: Intro to CS Theory Handout N18 Professor Luca Trevisan November 6, 21 Notes for Lecture 18 1 Algorithms for Linear Programming Linear programming was first solved by the simplex method

More information

Parallel Query Optimisation

Parallel Query Optimisation Parallel Query Optimisation Contents Objectives of parallel query optimisation Parallel query optimisation Two-Phase optimisation One-Phase optimisation Inter-operator parallelism oriented optimisation

More information

3. Genetic local search for Earth observation satellites operations scheduling

3. Genetic local search for Earth observation satellites operations scheduling Distance preserving recombination operator for Earth observation satellites operations scheduling Andrzej Jaszkiewicz Institute of Computing Science, Poznan University of Technology ul. Piotrowo 3a, 60-965

More information

ON THE USE OF PERFORMANCE MODELS TO DESIGN SELF-MANAGING COMPUTER SYSTEMS

ON THE USE OF PERFORMANCE MODELS TO DESIGN SELF-MANAGING COMPUTER SYSTEMS 2003 Menascé and Bennani. All ights eserved. In roc. 2003 Computer Measurement Group Conf., Dec. 7-2, 2003, Dallas, T. ON THE USE OF EFOMANCE MODELS TO DESIGN SELF-MANAGING COMUTE SYSTEMS Daniel A. Menascé

More information

Invited: Modeling and Optimization of Multititiered Server-Based Systems

Invited: Modeling and Optimization of Multititiered Server-Based Systems Invited: Modeling and Optimization of Multititiered Server-Based Systems Daniel A. Menascé and Noor Bajunaid Department of Computer Science George Mason University 4400 University Drive, Fairfax, VA 22030,

More information

A Generalized Replica Placement Strategy to Optimize Latency in a Wide Area Distributed Storage System

A Generalized Replica Placement Strategy to Optimize Latency in a Wide Area Distributed Storage System A Generalized Replica Placement Strategy to Optimize Latency in a Wide Area Distributed Storage System John A. Chandy Department of Electrical and Computer Engineering Distributed Storage Local area network

More information

Recap Hill Climbing Randomized Algorithms SLS for CSPs. Local Search. CPSC 322 Lecture 12. January 30, 2006 Textbook 3.8

Recap Hill Climbing Randomized Algorithms SLS for CSPs. Local Search. CPSC 322 Lecture 12. January 30, 2006 Textbook 3.8 Local Search CPSC 322 Lecture 12 January 30, 2006 Textbook 3.8 Local Search CPSC 322 Lecture 12, Slide 1 Lecture Overview Recap Hill Climbing Randomized Algorithms SLS for CSPs Local Search CPSC 322 Lecture

More information

4 INFORMED SEARCH AND EXPLORATION. 4.1 Heuristic Search Strategies

4 INFORMED SEARCH AND EXPLORATION. 4.1 Heuristic Search Strategies 55 4 INFORMED SEARCH AND EXPLORATION We now consider informed search that uses problem-specific knowledge beyond the definition of the problem itself This information helps to find solutions more efficiently

More information

Linear Programming. Linear Programming. Linear Programming. Example: Profit Maximization (1/4) Iris Hui-Ru Jiang Fall Linear programming

Linear Programming. Linear Programming. Linear Programming. Example: Profit Maximization (1/4) Iris Hui-Ru Jiang Fall Linear programming Linear Programming 3 describes a broad class of optimization tasks in which both the optimization criterion and the constraints are linear functions. Linear Programming consists of three parts: A set of

More information

Today s s lecture. Lecture 3: Search - 2. Problem Solving by Search. Agent vs. Conventional AI View. Victor R. Lesser. CMPSCI 683 Fall 2004

Today s s lecture. Lecture 3: Search - 2. Problem Solving by Search. Agent vs. Conventional AI View. Victor R. Lesser. CMPSCI 683 Fall 2004 Today s s lecture Search and Agents Material at the end of last lecture Lecture 3: Search - 2 Victor R. Lesser CMPSCI 683 Fall 2004 Continuation of Simple Search The use of background knowledge to accelerate

More information

REAL-CODED GENETIC ALGORITHMS CONSTRAINED OPTIMIZATION. Nedim TUTKUN

REAL-CODED GENETIC ALGORITHMS CONSTRAINED OPTIMIZATION. Nedim TUTKUN REAL-CODED GENETIC ALGORITHMS CONSTRAINED OPTIMIZATION Nedim TUTKUN nedimtutkun@gmail.com Outlines Unconstrained Optimization Ackley s Function GA Approach for Ackley s Function Nonlinear Programming Penalty

More information

[This is not an article, chapter, of conference paper!]

[This is not an article, chapter, of conference paper!] http://www.diva-portal.org [This is not an article, chapter, of conference paper!] Performance Comparison between Scaling of Virtual Machines and Containers using Cassandra NoSQL Database Sogand Shirinbab,

More information

Star: Sla-Aware Autonomic Management of Cloud Resources

Star: Sla-Aware Autonomic Management of Cloud Resources Star: Sla-Aware Autonomic Management of Cloud Resources Sakshi Patil 1, Meghana N Rathod 2, S. A Madival 3, Vivekanand M Bonal 4 1, 2 Fourth Sem M. Tech Appa Institute of Engineering and Technology Karnataka,

More information

Adapting Mixed Workloads to Meet SLOs in Autonomic DBMSs

Adapting Mixed Workloads to Meet SLOs in Autonomic DBMSs Adapting Mixed Workloads to Meet SLOs in Autonomic DBMSs Baoning Niu, Patrick Martin, Wendy Powley School of Computing, Queen s University Kingston, Ontario, Canada, K7L 3N6 {niu martin wendy}@cs.queensu.ca

More information

Lecture: Analysis of Algorithms (CS )

Lecture: Analysis of Algorithms (CS ) Lecture: Analysis of Algorithms (CS483-001) Amarda Shehu Spring 2017 1 The Fractional Knapsack Problem Huffman Coding 2 Sample Problems to Illustrate The Fractional Knapsack Problem Variable-length (Huffman)

More information

Simplicial Global Optimization

Simplicial Global Optimization Simplicial Global Optimization Julius Žilinskas Vilnius University, Lithuania September, 7 http://web.vu.lt/mii/j.zilinskas Global optimization Find f = min x A f (x) and x A, f (x ) = f, where A R n.

More information

Resource allocation for autonomic data centers using analytic performance models.

Resource allocation for autonomic data centers using analytic performance models. Bennani, Mohamed N., and Daniel A. Menasce. "Resource allocation for autonomic data centers using analytic performance models." Autonomic Computing, 2005. ICAC 2005. Proceedings. Second International Conference

More information

Framework for replica selection in fault-tolerant distributed systems

Framework for replica selection in fault-tolerant distributed systems Framework for replica selection in fault-tolerant distributed systems Daniel Popescu Computer Science Department University of Southern California Los Angeles, CA 90089-0781 {dpopescu}@usc.edu Abstract.

More information

TELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling)

TELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling) TELE9751 - Switching Systems and Architecture Assignment Week 10 Lecture Summary - Traffic Management (including scheduling) Student Name and zid: Akshada Umesh Lalaye - z5140576 Lecturer: Dr. Tim Moors

More information

6.854 Advanced Algorithms. Scribes: Jay Kumar Sundararajan. Duality

6.854 Advanced Algorithms. Scribes: Jay Kumar Sundararajan. Duality 6.854 Advanced Algorithms Scribes: Jay Kumar Sundararajan Lecturer: David Karger Duality This lecture covers weak and strong duality, and also explains the rules for finding the dual of a linear program,

More information

Welcome to the IBM IIS Tech Talk

Welcome to the IBM IIS Tech Talk Dec 15 th, 2016 Welcome to the IBM IIS Tech Talk Data Quality in Information Analyzer 1 Dec 15 th, 2016 Information Analyzer Data Quality Deep Dive Yannick Saillet Software Architect 2 AGENDA - Data Quality

More information

Improving the QOS in Video Streaming Multicast

Improving the QOS in Video Streaming Multicast Improving the QOS in Video Streaming Multicast Sujatha M. Assistant Professor, St. Joseph Engineering College, Vamanjoor,Mangalore, Karnataka, India-575028. Email: sujatha_msk@yahoo.co.in Abstract In a

More information

CS 229 Midterm Review

CS 229 Midterm Review CS 229 Midterm Review Course Staff Fall 2018 11/2/2018 Outline Today: SVMs Kernels Tree Ensembles EM Algorithm / Mixture Models [ Focus on building intuition, less so on solving specific problems. Ask

More information

Midterm Examination CS540-2: Introduction to Artificial Intelligence

Midterm Examination CS540-2: Introduction to Artificial Intelligence Midterm Examination CS540-2: Introduction to Artificial Intelligence March 15, 2018 LAST NAME: FIRST NAME: Problem Score Max Score 1 12 2 13 3 9 4 11 5 8 6 13 7 9 8 16 9 9 Total 100 Question 1. [12] Search

More information

Heuristic (Informed) Search

Heuristic (Informed) Search Heuristic (Informed) Search (Where we try to choose smartly) R&N: Chap., Sect..1 3 1 Search Algorithm #2 SEARCH#2 1. INSERT(initial-node,Open-List) 2. Repeat: a. If empty(open-list) then return failure

More information

QoS Trade-off Analysis for Wireless Sensor Networks

QoS Trade-off Analysis for Wireless Sensor Networks QoS Trade-off Analysis for Wireless Sensor Networks Rob Hoes, Twan Basten Joint work with Phillip Stanley-Marbell, Marc Geilen, Chen Kong Tham, Henk Corporaal Department of Electrical Engineering Electronic

More information

Algorithm Design (4) Metaheuristics

Algorithm Design (4) Metaheuristics Algorithm Design (4) Metaheuristics Takashi Chikayama School of Engineering The University of Tokyo Formalization of Constraint Optimization Minimize (or maximize) the objective function f(x 0,, x n )

More information

Optimal Network Flow Allocation. EE 384Y Almir Mutapcic and Primoz Skraba 27/05/2004

Optimal Network Flow Allocation. EE 384Y Almir Mutapcic and Primoz Skraba 27/05/2004 Optimal Network Flow Allocation EE 384Y Almir Mutapcic and Primoz Skraba 27/05/2004 Problem Statement Optimal network flow allocation Find flow allocation which minimizes certain performance criterion

More information

Lecture: Iterative Search Methods

Lecture: Iterative Search Methods Lecture: Iterative Search Methods Overview Constructive Search is exponential. State-Space Search exhibits better performance on some problems. Research in understanding heuristic and iterative search

More information

An Overview of Routing Models for MPLS Networks

An Overview of Routing Models for MPLS Networks An Overview of Routing Models for MPLS Networks Rita Girão Silva, José Craveirinha DEEC-FCTUC / INESC-Coimbra An Overview of Routing Models for MPLS Networks 1 Presentation Presentation Overview of routing

More information

HARNESSING CERTAINTY TO SPEED TASK-ALLOCATION ALGORITHMS FOR MULTI-ROBOT SYSTEMS

HARNESSING CERTAINTY TO SPEED TASK-ALLOCATION ALGORITHMS FOR MULTI-ROBOT SYSTEMS HARNESSING CERTAINTY TO SPEED TASK-ALLOCATION ALGORITHMS FOR MULTI-ROBOT SYSTEMS An Undergraduate Research Scholars Thesis by DENISE IRVIN Submitted to the Undergraduate Research Scholars program at Texas

More information

CS 331: Artificial Intelligence Local Search 1. Tough real-world problems

CS 331: Artificial Intelligence Local Search 1. Tough real-world problems CS 331: Artificial Intelligence Local Search 1 1 Tough real-world problems Suppose you had to solve VLSI layout problems (minimize distance between components, unused space, etc.) Or schedule airlines

More information

A Short SVM (Support Vector Machine) Tutorial

A Short SVM (Support Vector Machine) Tutorial A Short SVM (Support Vector Machine) Tutorial j.p.lewis CGIT Lab / IMSC U. Southern California version 0.zz dec 004 This tutorial assumes you are familiar with linear algebra and equality-constrained optimization/lagrange

More information

An iteration of Branch and Bound One iteration of Branch and Bound consists of the following four steps: Some definitions. Branch and Bound.

An iteration of Branch and Bound One iteration of Branch and Bound consists of the following four steps: Some definitions. Branch and Bound. ranch and ound xamples and xtensions jesla@man.dtu.dk epartment of Management ngineering Technical University of enmark ounding ow do we get ourselves a bounding function? Relaxation. Leave out some constraints.

More information

/ Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang

/ Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang 600.469 / 600.669 Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang 9.1 Linear Programming Suppose we are trying to approximate a minimization

More information

1 Linear programming relaxation

1 Linear programming relaxation Cornell University, Fall 2010 CS 6820: Algorithms Lecture notes: Primal-dual min-cost bipartite matching August 27 30 1 Linear programming relaxation Recall that in the bipartite minimum-cost perfect matching

More information

1 Tree Search (12 points)

1 Tree Search (12 points) 1 Tree Search (12 points) Consider the tree shown below. The numbers on the arcs are the arc lengths. Assume that the nodes are expanded in alphabetical order when no other order is specified by the search,

More information

CS 416, Artificial Intelligence Midterm Examination Fall 2004

CS 416, Artificial Intelligence Midterm Examination Fall 2004 CS 416, Artificial Intelligence Midterm Examination Fall 2004 Name: This is a closed book, closed note exam. All questions and subquestions are equally weighted. Introductory Material 1) True or False:

More information

ROTATION SCHEDULING ON SYNCHRONOUS DATA FLOW GRAPHS. A Thesis Presented to The Graduate Faculty of The University of Akron

ROTATION SCHEDULING ON SYNCHRONOUS DATA FLOW GRAPHS. A Thesis Presented to The Graduate Faculty of The University of Akron ROTATION SCHEDULING ON SYNCHRONOUS DATA FLOW GRAPHS A Thesis Presented to The Graduate Faculty of The University of Akron In Partial Fulfillment of the Requirements for the Degree Master of Science Rama

More information

Device-to-Device Networking Meets Cellular via Network Coding

Device-to-Device Networking Meets Cellular via Network Coding Device-to-Device Networking Meets Cellular via Network Coding Yasaman Keshtkarjahromi, Student Member, IEEE, Hulya Seferoglu, Member, IEEE, Rashid Ansari, Fellow, IEEE, and Ashfaq Khokhar, Fellow, IEEE

More information

Vertex Cover Approximations

Vertex Cover Approximations CS124 Lecture 20 Heuristics can be useful in practice, but sometimes we would like to have guarantees. Approximation algorithms give guarantees. It is worth keeping in mind that sometimes approximation

More information

Applying Multi-Core Model Checking to Hardware-Software Partitioning in Embedded Systems

Applying Multi-Core Model Checking to Hardware-Software Partitioning in Embedded Systems V Brazilian Symposium on Computing Systems Engineering Applying Multi-Core Model Checking to Hardware-Software Partitioning in Embedded Systems Alessandro Trindade, Hussama Ismail, and Lucas Cordeiro Foz

More information

CS201: Lab #4 Writing a Dynamic Storage Allocator

CS201: Lab #4 Writing a Dynamic Storage Allocator CS201: Lab #4 Writing a Dynamic Storage Allocator In this lab you will write a dynamic storage allocator for C programs, i.e., your own version of the malloc, free and realloc routines. You are encouraged

More information

Fundamentals of Integer Programming

Fundamentals of Integer Programming Fundamentals of Integer Programming Di Yuan Department of Information Technology, Uppsala University January 2018 Outline Definition of integer programming Formulating some classical problems with integer

More information

Quality of Service. Create QoS Policy CHAPTER26. Create QoS Policy Tab. Edit QoS Policy Tab. Launch QoS Wizard Button

Quality of Service. Create QoS Policy CHAPTER26. Create QoS Policy Tab. Edit QoS Policy Tab. Launch QoS Wizard Button CHAPTER26 The (QoS) Wizard allows a network administrator to enable (QoS) on the router s WAN interfaces. QoS can also be enabled on IPSec VPN interfaces and tunnels. The QoS edit windows enables the administrator

More information

Network Support for Multimedia

Network Support for Multimedia Network Support for Multimedia Daniel Zappala CS 460 Computer Networking Brigham Young University Network Support for Multimedia 2/33 make the best of best effort use application-level techniques use CDNs

More information

11.1 Facility Location

11.1 Facility Location CS787: Advanced Algorithms Scribe: Amanda Burton, Leah Kluegel Lecturer: Shuchi Chawla Topic: Facility Location ctd., Linear Programming Date: October 8, 2007 Today we conclude the discussion of local

More information

Minimizing Roundtrip Response Time in Distributed Databases with Vertical Fragmentation

Minimizing Roundtrip Response Time in Distributed Databases with Vertical Fragmentation Minimizing Roundtrip Response Time in Distributed Databases with Vertical Fragmentation Rodolfo A. Pazos R., Graciela Vázquez A. 2 José A. Martínez F. 3 Joaquín Pérez O. 4 Juan J. Gonzalez B. 5 Instituto

More information

CS261: A Second Course in Algorithms Lecture #16: The Traveling Salesman Problem

CS261: A Second Course in Algorithms Lecture #16: The Traveling Salesman Problem CS61: A Second Course in Algorithms Lecture #16: The Traveling Salesman Problem Tim Roughgarden February 5, 016 1 The Traveling Salesman Problem (TSP) In this lecture we study a famous computational problem,

More information

Cost-Bounded Binary Decision Diagrams for 0-1 Programming

Cost-Bounded Binary Decision Diagrams for 0-1 Programming Cost-Bounded Binary Decision Diagrams for -1 Programming Tarik Hadžić 1 and J. N. Hooker 2 1 IT University of Copenhagen tarik@itu.dk 2 Carnegie Mellon University john@hooker.tepper.cmu.edu Abstract. In

More information

CHAPTER 4 HEURISTICS BASED ON OBJECT ORIENTED METRICS

CHAPTER 4 HEURISTICS BASED ON OBJECT ORIENTED METRICS CHAPTER 4 HEURISTICS BASED ON OBJECT ORIENTED METRICS Design evaluation is most critical activity during software development process. Design heuristics are proposed as a more accessible and informal means

More information

Midterm Examination CS 540-2: Introduction to Artificial Intelligence

Midterm Examination CS 540-2: Introduction to Artificial Intelligence Midterm Examination CS 54-2: Introduction to Artificial Intelligence March 9, 217 LAST NAME: FIRST NAME: Problem Score Max Score 1 15 2 17 3 12 4 6 5 12 6 14 7 15 8 9 Total 1 1 of 1 Question 1. [15] State

More information

How Humans Solve Complex Problems: The Case of the Knapsack Problem

How Humans Solve Complex Problems: The Case of the Knapsack Problem 1 2 How Humans Solve Complex Problems: The Case of the Knapsack Problem 3 4 Carsten Murawski 1 and Peter L.Bossaerts 1,2,3 5 6 7 8 1 Department of Finance, The University of Melbourne, Melbourne, Victoria

More information

Algorithms for Integer Programming

Algorithms for Integer Programming Algorithms for Integer Programming Laura Galli November 9, 2016 Unlike linear programming problems, integer programming problems are very difficult to solve. In fact, no efficient general algorithm is

More information

Hierarchical PLABs, CLABs, TLABs in Hotspot

Hierarchical PLABs, CLABs, TLABs in Hotspot Hierarchical s, CLABs, s in Hotspot Christoph M. Kirsch ck@cs.uni-salzburg.at Hannes Payer hpayer@cs.uni-salzburg.at Harald Röck hroeck@cs.uni-salzburg.at Abstract Thread-local allocation buffers (s) are

More information

Machine Learning. Topic 5: Linear Discriminants. Bryan Pardo, EECS 349 Machine Learning, 2013

Machine Learning. Topic 5: Linear Discriminants. Bryan Pardo, EECS 349 Machine Learning, 2013 Machine Learning Topic 5: Linear Discriminants Bryan Pardo, EECS 349 Machine Learning, 2013 Thanks to Mark Cartwright for his extensive contributions to these slides Thanks to Alpaydin, Bishop, and Duda/Hart/Stork

More information

D-Optimal Designs. Chapter 888. Introduction. D-Optimal Design Overview

D-Optimal Designs. Chapter 888. Introduction. D-Optimal Design Overview Chapter 888 Introduction This procedure generates D-optimal designs for multi-factor experiments with both quantitative and qualitative factors. The factors can have a mixed number of levels. For example,

More information

CS 268: Lecture 7 (Beyond TCP Congestion Control)

CS 268: Lecture 7 (Beyond TCP Congestion Control) Outline CS 68: Lecture 7 (Beyond TCP Congestion Control) TCP-Friendly Rate Control (TFRC) explicit Control Protocol Ion Stoica Computer Science Division Department of Electrical Engineering and Computer

More information

Module 1 Lecture Notes 2. Optimization Problem and Model Formulation

Module 1 Lecture Notes 2. Optimization Problem and Model Formulation Optimization Methods: Introduction and Basic concepts 1 Module 1 Lecture Notes 2 Optimization Problem and Model Formulation Introduction In the previous lecture we studied the evolution of optimization

More information

Semi-Independent Partitioning: A Method for Bounding the Solution to COP s

Semi-Independent Partitioning: A Method for Bounding the Solution to COP s Semi-Independent Partitioning: A Method for Bounding the Solution to COP s David Larkin University of California, Irvine Abstract. In this paper we introduce a new method for bounding the solution to constraint

More information

Conflict-based Statistics

Conflict-based Statistics Conflict-based Statistics Tomáš Müller 1, Roman Barták 1 and Hana Rudová 2 1 Faculty of Mathematics and Physics, Charles University Malostranské nám. 2/25, Prague, Czech Republic {muller bartak}@ktiml.mff.cuni.cz

More information

SPANNING TREES. Lecture 21 CS2110 Spring 2016

SPANNING TREES. Lecture 21 CS2110 Spring 2016 1 SPANNING TREES Lecture 1 CS110 Spring 016 Spanning trees What we do today: Calculating the shortest path in Dijkstra s algorithm Look at time complexity of shortest path Definitions Minimum spanning

More information

Programming, numerics and optimization

Programming, numerics and optimization Programming, numerics and optimization Lecture C-4: Constrained optimization Łukasz Jankowski ljank@ippt.pan.pl Institute of Fundamental Technological Research Room 4.32, Phone +22.8261281 ext. 428 June

More information

CS675: Convex and Combinatorial Optimization Spring 2018 The Simplex Algorithm. Instructor: Shaddin Dughmi

CS675: Convex and Combinatorial Optimization Spring 2018 The Simplex Algorithm. Instructor: Shaddin Dughmi CS675: Convex and Combinatorial Optimization Spring 2018 The Simplex Algorithm Instructor: Shaddin Dughmi Algorithms for Convex Optimization We will look at 2 algorithms in detail: Simplex and Ellipsoid.

More information

Data Replication in the Quality Space

Data Replication in the Quality Space Data Replication in the Quality Space Yicheng Tu April 1, 2008 At Commnet USF Roadmap Introduction Static data replication Dynamic data replication Experimental (simulation) results Summary Data Replication

More information

Transactum Business Process Manager with High-Performance Elastic Scaling. November 2011 Ivan Klianev

Transactum Business Process Manager with High-Performance Elastic Scaling. November 2011 Ivan Klianev Transactum Business Process Manager with High-Performance Elastic Scaling November 2011 Ivan Klianev Transactum BPM serves three primary objectives: To make it possible for developers unfamiliar with distributed

More information

Hill Climbing. Assume a heuristic value for each assignment of values to all variables. Maintain an assignment of a value to each variable.

Hill Climbing. Assume a heuristic value for each assignment of values to all variables. Maintain an assignment of a value to each variable. Hill Climbing Many search spaces are too big for systematic search. A useful method in practice for some consistency and optimization problems is hill climbing: Assume a heuristic value for each assignment

More information

Quality of Service Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9300 Switches)

Quality of Service Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9300 Switches) Quality of Service Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9300 Switches) First Published: 2017-07-31 Last Modified: 2017-11-03 Americas Headquarters Cisco Systems, Inc. 170 West Tasman

More information

Garbage-First Garbage Collection by David Detlefs, Christine Flood, Steve Heller & Tony Printezis. Presented by Edward Raff

Garbage-First Garbage Collection by David Detlefs, Christine Flood, Steve Heller & Tony Printezis. Presented by Edward Raff Garbage-First Garbage Collection by David Detlefs, Christine Flood, Steve Heller & Tony Printezis Presented by Edward Raff Motivational Setup Java Enterprise World High end multiprocessor servers Large

More information

Towards Practical Differential Privacy for SQL Queries. Noah Johnson, Joseph P. Near, Dawn Song UC Berkeley

Towards Practical Differential Privacy for SQL Queries. Noah Johnson, Joseph P. Near, Dawn Song UC Berkeley Towards Practical Differential Privacy for SQL Queries Noah Johnson, Joseph P. Near, Dawn Song UC Berkeley Outline 1. Discovering real-world requirements 2. Elastic sensitivity & calculating sensitivity

More information

and 6.855J Lagrangian Relaxation I never missed the opportunity to remove obstacles in the way of unity. Mohandas Gandhi

and 6.855J Lagrangian Relaxation I never missed the opportunity to remove obstacles in the way of unity. Mohandas Gandhi 15.082 and 6.855J Lagrangian Relaxation I never missed the opportunity to remove obstacles in the way of unity. Mohandas Gandhi On bounding in optimization In solving network flow problems, we not only

More information

CSE 417 Branch & Bound (pt 4) Branch & Bound

CSE 417 Branch & Bound (pt 4) Branch & Bound CSE 417 Branch & Bound (pt 4) Branch & Bound Reminders > HW8 due today > HW9 will be posted tomorrow start early program will be slow, so debugging will be slow... Review of previous lectures > Complexity

More information

Local Search. (Textbook Chpt 4.8) Computer Science cpsc322, Lecture 14. May, 30, CPSC 322, Lecture 14 Slide 1

Local Search. (Textbook Chpt 4.8) Computer Science cpsc322, Lecture 14. May, 30, CPSC 322, Lecture 14 Slide 1 Local Search Computer Science cpsc322, Lecture 14 (Textbook Chpt 4.8) May, 30, 2017 CPSC 322, Lecture 14 Slide 1 Announcements Assignment1 due now! Assignment2 out today CPSC 322, Lecture 10 Slide 2 Lecture

More information

15 212: Principles of Programming. Some Notes on Continuations

15 212: Principles of Programming. Some Notes on Continuations 15 212: Principles of Programming Some Notes on Continuations Michael Erdmann Spring 2011 These notes provide a brief introduction to continuations as a programming technique. Continuations have a rich

More information

CS 4700: Artificial Intelligence

CS 4700: Artificial Intelligence CS 4700: Foundations of Artificial Intelligence Fall 2017 Instructor: Prof. Haym Hirsh Lecture 7 Extra Credit Opportunity: Lecture Today 4:15pm Gates G01 Learning to See Without a Teacher Phillip Isola

More information

Programming II (CS300)

Programming II (CS300) 1 Programming II (CS300) Chapter 10 Recursion and Search MOUNA KACEM mouna@cs.wisc.edu Spring 2019 Recursion: General Overview 2 Recursion in Algorithms Recursion is the use of recursive algorithms to

More information

Notes for Lecture 20

Notes for Lecture 20 U.C. Berkeley CS170: Intro to CS Theory Handout N20 Professor Luca Trevisan November 13, 2001 Notes for Lecture 20 1 Duality As it turns out, the max-flow min-cut theorem is a special case of a more general

More information

Homework 3: Heuristics in Search

Homework 3: Heuristics in Search Graduate Artificial Intelligence 15-780 Homework 3: Heuristics in Search Out on February 15 Due on March 1 Problem 1: Exting Your SAT Solver (35 points) In the last homework, you constructed both a SAT

More information

Approximation Algorithms

Approximation Algorithms Presentation for use with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 Approximation Algorithms Tamassia Approximation Algorithms 1 Applications One of

More information

Static Batch Mode Heuristic Algorithm for Mapping Independent Tasks in Computational Grid

Static Batch Mode Heuristic Algorithm for Mapping Independent Tasks in Computational Grid Journal of Computer Science Original Research Paper Static Batch Mode Heuristic Algorithm for Mapping Independent Tasks in Computational Grid 1 R. Vijayalakshmi and 2 V. Vasudevan 1 Department of Computer

More information

Algorithms for Provisioning Virtual Private Networks in the Hose Model

Algorithms for Provisioning Virtual Private Networks in the Hose Model IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 4, AUGUST 2002 565 Algorithms for Provisioning Virtual Private Networks in the Hose Model Amit Kumar, Rajeev Rastogi, Avi Silberschatz, Fellow, IEEE, and

More information

M.Sc. (Final) DEGREE EXAMINATION, DEC Second Year INFORMATION TECHNOLOGY. Paper - I : Software Engineering. Time : 3 Hours Maximum Marks : 75

M.Sc. (Final) DEGREE EXAMINATION, DEC Second Year INFORMATION TECHNOLOGY. Paper - I : Software Engineering. Time : 3 Hours Maximum Marks : 75 (DMSIT21) M.Sc. (Final) DEGREE EXAMINATION, DEC. - 2014 Second Year INFORMATION TECHNOLOGY Paper - I : Software Engineering Time : 3 Hours Maximum Marks : 75 Section A (3 15 = 45) Answer any three questions

More information

A Scalable Scheduling Algorithm for Real-Time Distributed Systems

A Scalable Scheduling Algorithm for Real-Time Distributed Systems A Scalable Scheduling Algorithm for Real-Time Distributed Systems Yacine Atif School of Electrical & Electronic Engineering Nanyang Technological University Singapore E-mail: iayacine@ntu.edu.sg Babak

More information

Unit 2 Packet Switching Networks - II

Unit 2 Packet Switching Networks - II Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source

More information

Spring 2007 Midterm Exam

Spring 2007 Midterm Exam 15-381 Spring 2007 Midterm Exam Spring 2007 March 8 Name: Andrew ID: This is an open-book, open-notes examination. You have 80 minutes to complete this examination. Unless explicitly requested, we do not

More information

val(y, I) α (9.0.2) α (9.0.3)

val(y, I) α (9.0.2) α (9.0.3) CS787: Advanced Algorithms Lecture 9: Approximation Algorithms In this lecture we will discuss some NP-complete optimization problems and give algorithms for solving them that produce a nearly optimal,

More information

CMU-Q Lecture 8: Optimization I: Optimization for CSP Local Search. Teacher: Gianni A. Di Caro

CMU-Q Lecture 8: Optimization I: Optimization for CSP Local Search. Teacher: Gianni A. Di Caro CMU-Q 15-381 Lecture 8: Optimization I: Optimization for CSP Local Search Teacher: Gianni A. Di Caro LOCAL SEARCH FOR CSP Real-life CSPs can be very large and hard to solve Methods so far: construct a

More information

Data Preprocessing. Slides by: Shree Jaswal

Data Preprocessing. Slides by: Shree Jaswal Data Preprocessing Slides by: Shree Jaswal Topics to be covered Why Preprocessing? Data Cleaning; Data Integration; Data Reduction: Attribute subset selection, Histograms, Clustering and Sampling; Data

More information