Utility-based Optimal Service Selection for Business Processes in Service Oriented Architectures
|
|
- Jeffrey Maxwell
- 5 years ago
- Views:
Transcription
1 Utility-based Optimal Service Selection for Business Processes in Service Oriented Architectures Vinod K. Dubey Daniel A. Menascé Web Services (ICWS), 2010 IEEE International Conference on. IEEE, 2010 Summarized by: Noor Bajunaid 1
2 Introduction Service Oriented Architectures allow service providers to provide similar functionalities with different QoS and cost. There is a need for server provider selection algorithms that optimize a utility function under constraints, efficiently. 2
3 Problem definition A business process B, with N activities, a i,,a n subject to Maximize U(E[R(z)],A(z),X(z)) E[R(z)] R max A min A(z) 1 X(z) X min C(z) C max z Z 3
4 BPEL <sequence> <invoke a1> <switch> <case q1> <flow> <invoke a2> <sequence> <invoke a3> <invoke a4> </sequence> </flow> <case q2=(1-q1)> <invoke a5> </switch> <invoke a6> </sequence> 1: a1 0: sequence 2: switch 9: a6 q1 q2 3: flow 8: a5 4: a2 5: sequence 6: a3 7: a4 4
5 Utility Functions 5
6 Computation of End-to-End QoS Metrics 6
7 Availability 0: sequence 1: a1 2: switch 9: a6 4: a2 q1 3: flow q2 8: a5 5: sequence 6: a3 7: a4 A = A1 * {q1* A2 * [A3 * A4] + q2 * A5} * A6 7
8 Computation of End-to-End QoS Metrics 8
9 Throughput 0: sequence 1: a1 2: switch 9: a6 4: a2 q1 3: flow q2 8: a5 5: sequence 6: a3 7: a4 X = min{x1, (q1* min{x2, X3, X4}), q2 * X5}, X6} 9
10 Computation of End-to-End QoS Metrics **Menascé, Daniel A., Emiliano Casalicchio, and Vinod Dubey. "On optimal service selection in service oriented architectures." Performance Evaluation 67.8 (2010):
11 Execution Time 0: sequence 1: a1 2: switch 9: a6 4: a2 q1 3: flow q2 8: a5 5: sequence 6: a3 7: a4 R = R1 + q1 * max {R2, (R3 + R4)} + q2 * R5 + R6 11
12 Computation of End-to-End QoS Metrics **Menascé, Daniel A., Emiliano Casalicchio, and Vinod Dubey. "On optimal service selection in service oriented architectures." Performance Evaluation 67.8 (2010):
13 Cost 0: sequence 1: a1 2: switch 9: a6 4: a2 q1 3: flow q2 8: a5 5: sequence 6: a3 7: a4 C = C1 + q1 * (C2 + C3 + C4) + q2 * C5 + C6 13
14 Optimal Service Selection 1) Extended JOSeS Algorithm: optimal solution efficient for moderate complicity 2) HCB Heuristic Algorithm near-optimal solution efficient even for large set of services 14
15 Extended JOSeS Algorithm Extends Jensen-based Optimal Service Selection Jensen s inequality: E[max{R 1,, R n }] max{e[r 1 ],, E[R n ]} It is expensive to compute E[max{R 1,, R n }]. Jensens s inequality provides a lower bound that is easier to compute. If the lower bound exceeds the maximum execution time, we ignore the allocation and avoid the expensive computation. 15
16 Extended JOSeS Algorithm If sub-allocation (s1,, sk), k N, violates a constraint, it can be discarded without the need for selecting SPs for activities of order > k. 16
17 Extended JOSeS Algorithm 17 Let lk be the list of SPs for ak: next(k) returns the next, not yet evaluated, SP in lk, or returns null if all the SPs in lk were already evaluated. reset(k) sets all SPs in all lists lj (j = k,..., N ) as not-visited. **Menascé, Daniel A., Emiliano Casalicchio, and Vinod Dubey. "On optimal service selection in service oriented architectures." Performance Evaluation 67.8 (2010): **
18 Extended JOSeS Algorithm S1,1 S1,2 S1,3 S1,1 S1,2 S1,3 S1,1 S1,2 S1,3 S2,1 S2,2 S2,1 S2,2 S2,1 S2,2 S3,1 S3,2 S3,3 S3,1 S3,2 S3,3 S3,1 S3,2 S3,3 S1,1 S1,1 S2,1 violation 18
19 Extended JOSeS Algorithm S1,1 S1,2 S1,3 S1,1 S1,2 S1,3 S1,1 S1,2 S1,3 S2,1 S2,2 S2,1 S2,2 S2,1 S2,2 S3,1 S3,2 S3,3 S3,1 S3,2 S3,3 S3,1 S3,2 S3,3 S1,1 S2,2 S1,1 S2,2 S3,1 S1,1 S2,2 S3,2 19
20 Extended JOSeS Algorithm S1,1 S1,2 S1,3 S1,1 S1,2 S1,3 S2,1 S2,2 S2,1 S2,2 S3,1 S3,2 S3,3 S3,1 S3,2 S3,3 S1,1 S2,2 S3,3 S1,2 Allocations that violate constraint will reduce the number of examined points 20
21 HCB Heuristic Algorithm Hill-climbing based: Define a neighborhood of an allocation Move to the best allocation in the neighborhood Repeat until near-optimum solution is found or maximum number of starts 21
22 HCB Heuristic Algorithm Neighborhood: for each activity, replace the SP with the other SPs that will maximize improvement in each QoS metric 22
23 HCB Heuristic Algorithm 23
24 HCB Heuristic Algorithm 24
25 Experimental Evaluation 1. Determine how effective is the heuristic solution compared to the optimal. 2. Compare the number of points examined by each algorithm 3. Compare both algorithms over a wide range of parameters 25
26 Experimental Evaluation 50 BPEL business processes. 6-9 activities with different construct (sequence, flow, switch) 2-7 SPs per activity. Constraints strength varied from 10% to 40% each combination was ran through JeSOS once,and through HCB 30 times 26
27 Experimental Evaluation QoS metrics of each SP for each activity are given: (E[R],A, X) CTotal = C(r) + C(X) + C(A) 27
28 Experimental Evaluation stricter constraints reduce the size of the neighborhood and decrease the breadth of the search. 28
29 Experimental Evaluation As CS increases, more sub-allocations are prematurely declared unfeasible. JeSOS will examine significantly less points and take less time. 29
30 Experimental Evaluation For a complex Business process and 7 SPs, HCB achieved 99.97% of optimal utility by examining 100 points. JeSOS examined more than 10,000,000 points! 30
31 Experimental Evaluation HCB scalability for large number of SPs/activity (50-400). Regression shows that the number of examined points increases linearly with umber of SPs. 31
32 Conclusion The most important conditions for JeSOS to be efficient are: simple business process structure. limited number of server providers stronger constraints. HCB is potentially very efficient for autonomic nearoptimal resource allocation. 32
Prediction-Based Admission Control for IaaS Clouds with Multiple Service Classes
Prediction-Based Admission Control for IaaS Clouds with Multiple Service Classes Marcus Carvalho, Daniel Menascé, Francisco Brasileiro 2015 IEEE Intl. Conf. Cloud Computing Technology and Science Summarized
More informationAn Autonomic Framework for Integrating Security and Quality of Service Support in Databases
An Autonomic Framework for Integrating Security and Quality of Service Support in Databases Firas Alomari The Volgenau School of Engineering George Mason University Daniel A. Menasce Department of Computer
More informationQuality of Service Aspects and Metrics in Grid Computing
Quality of Service Aspects and Metrics in Grid Computing Daniel A. Menascé Dept. of Computer Science George Mason University Fairfax, VA menasce@cs.gmu.edu Emiliano Casalicchio Dipt. InformaticaSistemi
More informationA Kruskal-Based Heuristic for the Rooted Delay-Constrained Minimum Spanning Tree Problem
A Kruskal-Based Heuristic for the Rooted Delay-Constrained Minimum Spanning Tree Problem Mario Ruthmair and Günther R. Raidl Institute of Computer Graphics and Algorithms Vienna University of Technology,
More informationDiPerF: automated DIstributed PERformance testing Framework
DiPerF: automated DIstributed PERformance testing Framework Catalin Dumitrescu, Ioan Raicu, Matei Ripeanu, Ian Foster Distributed Systems Laboratory Computer Science Department University of Chicago Introduction
More informationOn the Use of Performance Models in Autonomic Computing
On the Use of Performance Models in Autonomic Computing Daniel A. Menascé Department of Computer Science George Mason University 1 2012. D.A. Menasce. All Rights Reserved. 2 Motivation for AC main obstacle
More informationAUTONOMIC, OPTIMAL, AND NEAR-OPTIMAL RESOURCE ALLOCATION IN CLOUD COMPUTING
AUTONOMIC, OPTIMAL, AND NEAR-OPTIMAL RESOURCE ALLOCATION IN CLOUD COMPUTING by Arwa Sulaiman Aldhalaan A Dissertation Submitted to the Graduate Faculty of George Mason University In Partial fulfillment
More informationTopic 6: SDN in practice: Microsoft's SWAN. Student: Miladinovic Djordje Date:
Topic 6: SDN in practice: Microsoft's SWAN Student: Miladinovic Djordje Date: 17.04.2015 1 SWAN at a glance Goal: Boost the utilization of inter-dc networks Overcome the problems of current traffic engineering
More informationA Framework for Utility-Based Service Oriented Design in SASSY
A Framework for Utility-Based Service Oriented Design in SASSY The material in these slides comes from the paper A Framework for Utility-Based Service Oriented Design in SASSY, D.A. Menasce, J. Ewing,
More informationUNIT 4 Branch and Bound
UNIT 4 Branch and Bound General method: Branch and Bound is another method to systematically search a solution space. Just like backtracking, we will use bounding functions to avoid generating subtrees
More information15.082J and 6.855J. Lagrangian Relaxation 2 Algorithms Application to LPs
15.082J and 6.855J Lagrangian Relaxation 2 Algorithms Application to LPs 1 The Constrained Shortest Path Problem (1,10) 2 (1,1) 4 (2,3) (1,7) 1 (10,3) (1,2) (10,1) (5,7) 3 (12,3) 5 (2,2) 6 Find the shortest
More informationTowards Self-Adaptation for Dependable Service Oriented Systems
Towards Self-Adaptation for Dependable Service Oriented Systems Valeria Cardellini 1, Emiliano Casalicchio 1, Vincenzo Grassi 1, Francesco Lo Presti 1, and Raffaela Mirandola 2 1 Università di Roma Tor
More informationNotes for Lecture 18
U.C. Berkeley CS17: Intro to CS Theory Handout N18 Professor Luca Trevisan November 6, 21 Notes for Lecture 18 1 Algorithms for Linear Programming Linear programming was first solved by the simplex method
More informationParallel Query Optimisation
Parallel Query Optimisation Contents Objectives of parallel query optimisation Parallel query optimisation Two-Phase optimisation One-Phase optimisation Inter-operator parallelism oriented optimisation
More information3. Genetic local search for Earth observation satellites operations scheduling
Distance preserving recombination operator for Earth observation satellites operations scheduling Andrzej Jaszkiewicz Institute of Computing Science, Poznan University of Technology ul. Piotrowo 3a, 60-965
More informationON THE USE OF PERFORMANCE MODELS TO DESIGN SELF-MANAGING COMPUTER SYSTEMS
2003 Menascé and Bennani. All ights eserved. In roc. 2003 Computer Measurement Group Conf., Dec. 7-2, 2003, Dallas, T. ON THE USE OF EFOMANCE MODELS TO DESIGN SELF-MANAGING COMUTE SYSTEMS Daniel A. Menascé
More informationInvited: Modeling and Optimization of Multititiered Server-Based Systems
Invited: Modeling and Optimization of Multititiered Server-Based Systems Daniel A. Menascé and Noor Bajunaid Department of Computer Science George Mason University 4400 University Drive, Fairfax, VA 22030,
More informationA Generalized Replica Placement Strategy to Optimize Latency in a Wide Area Distributed Storage System
A Generalized Replica Placement Strategy to Optimize Latency in a Wide Area Distributed Storage System John A. Chandy Department of Electrical and Computer Engineering Distributed Storage Local area network
More informationRecap Hill Climbing Randomized Algorithms SLS for CSPs. Local Search. CPSC 322 Lecture 12. January 30, 2006 Textbook 3.8
Local Search CPSC 322 Lecture 12 January 30, 2006 Textbook 3.8 Local Search CPSC 322 Lecture 12, Slide 1 Lecture Overview Recap Hill Climbing Randomized Algorithms SLS for CSPs Local Search CPSC 322 Lecture
More information4 INFORMED SEARCH AND EXPLORATION. 4.1 Heuristic Search Strategies
55 4 INFORMED SEARCH AND EXPLORATION We now consider informed search that uses problem-specific knowledge beyond the definition of the problem itself This information helps to find solutions more efficiently
More informationLinear Programming. Linear Programming. Linear Programming. Example: Profit Maximization (1/4) Iris Hui-Ru Jiang Fall Linear programming
Linear Programming 3 describes a broad class of optimization tasks in which both the optimization criterion and the constraints are linear functions. Linear Programming consists of three parts: A set of
More informationToday s s lecture. Lecture 3: Search - 2. Problem Solving by Search. Agent vs. Conventional AI View. Victor R. Lesser. CMPSCI 683 Fall 2004
Today s s lecture Search and Agents Material at the end of last lecture Lecture 3: Search - 2 Victor R. Lesser CMPSCI 683 Fall 2004 Continuation of Simple Search The use of background knowledge to accelerate
More informationREAL-CODED GENETIC ALGORITHMS CONSTRAINED OPTIMIZATION. Nedim TUTKUN
REAL-CODED GENETIC ALGORITHMS CONSTRAINED OPTIMIZATION Nedim TUTKUN nedimtutkun@gmail.com Outlines Unconstrained Optimization Ackley s Function GA Approach for Ackley s Function Nonlinear Programming Penalty
More information[This is not an article, chapter, of conference paper!]
http://www.diva-portal.org [This is not an article, chapter, of conference paper!] Performance Comparison between Scaling of Virtual Machines and Containers using Cassandra NoSQL Database Sogand Shirinbab,
More informationStar: Sla-Aware Autonomic Management of Cloud Resources
Star: Sla-Aware Autonomic Management of Cloud Resources Sakshi Patil 1, Meghana N Rathod 2, S. A Madival 3, Vivekanand M Bonal 4 1, 2 Fourth Sem M. Tech Appa Institute of Engineering and Technology Karnataka,
More informationAdapting Mixed Workloads to Meet SLOs in Autonomic DBMSs
Adapting Mixed Workloads to Meet SLOs in Autonomic DBMSs Baoning Niu, Patrick Martin, Wendy Powley School of Computing, Queen s University Kingston, Ontario, Canada, K7L 3N6 {niu martin wendy}@cs.queensu.ca
More informationLecture: Analysis of Algorithms (CS )
Lecture: Analysis of Algorithms (CS483-001) Amarda Shehu Spring 2017 1 The Fractional Knapsack Problem Huffman Coding 2 Sample Problems to Illustrate The Fractional Knapsack Problem Variable-length (Huffman)
More informationSimplicial Global Optimization
Simplicial Global Optimization Julius Žilinskas Vilnius University, Lithuania September, 7 http://web.vu.lt/mii/j.zilinskas Global optimization Find f = min x A f (x) and x A, f (x ) = f, where A R n.
More informationResource allocation for autonomic data centers using analytic performance models.
Bennani, Mohamed N., and Daniel A. Menasce. "Resource allocation for autonomic data centers using analytic performance models." Autonomic Computing, 2005. ICAC 2005. Proceedings. Second International Conference
More informationFramework for replica selection in fault-tolerant distributed systems
Framework for replica selection in fault-tolerant distributed systems Daniel Popescu Computer Science Department University of Southern California Los Angeles, CA 90089-0781 {dpopescu}@usc.edu Abstract.
More informationTELE Switching Systems and Architecture. Assignment Week 10 Lecture Summary - Traffic Management (including scheduling)
TELE9751 - Switching Systems and Architecture Assignment Week 10 Lecture Summary - Traffic Management (including scheduling) Student Name and zid: Akshada Umesh Lalaye - z5140576 Lecturer: Dr. Tim Moors
More information6.854 Advanced Algorithms. Scribes: Jay Kumar Sundararajan. Duality
6.854 Advanced Algorithms Scribes: Jay Kumar Sundararajan Lecturer: David Karger Duality This lecture covers weak and strong duality, and also explains the rules for finding the dual of a linear program,
More informationWelcome to the IBM IIS Tech Talk
Dec 15 th, 2016 Welcome to the IBM IIS Tech Talk Data Quality in Information Analyzer 1 Dec 15 th, 2016 Information Analyzer Data Quality Deep Dive Yannick Saillet Software Architect 2 AGENDA - Data Quality
More informationImproving the QOS in Video Streaming Multicast
Improving the QOS in Video Streaming Multicast Sujatha M. Assistant Professor, St. Joseph Engineering College, Vamanjoor,Mangalore, Karnataka, India-575028. Email: sujatha_msk@yahoo.co.in Abstract In a
More informationCS 229 Midterm Review
CS 229 Midterm Review Course Staff Fall 2018 11/2/2018 Outline Today: SVMs Kernels Tree Ensembles EM Algorithm / Mixture Models [ Focus on building intuition, less so on solving specific problems. Ask
More informationMidterm Examination CS540-2: Introduction to Artificial Intelligence
Midterm Examination CS540-2: Introduction to Artificial Intelligence March 15, 2018 LAST NAME: FIRST NAME: Problem Score Max Score 1 12 2 13 3 9 4 11 5 8 6 13 7 9 8 16 9 9 Total 100 Question 1. [12] Search
More informationHeuristic (Informed) Search
Heuristic (Informed) Search (Where we try to choose smartly) R&N: Chap., Sect..1 3 1 Search Algorithm #2 SEARCH#2 1. INSERT(initial-node,Open-List) 2. Repeat: a. If empty(open-list) then return failure
More informationQoS Trade-off Analysis for Wireless Sensor Networks
QoS Trade-off Analysis for Wireless Sensor Networks Rob Hoes, Twan Basten Joint work with Phillip Stanley-Marbell, Marc Geilen, Chen Kong Tham, Henk Corporaal Department of Electrical Engineering Electronic
More informationAlgorithm Design (4) Metaheuristics
Algorithm Design (4) Metaheuristics Takashi Chikayama School of Engineering The University of Tokyo Formalization of Constraint Optimization Minimize (or maximize) the objective function f(x 0,, x n )
More informationOptimal Network Flow Allocation. EE 384Y Almir Mutapcic and Primoz Skraba 27/05/2004
Optimal Network Flow Allocation EE 384Y Almir Mutapcic and Primoz Skraba 27/05/2004 Problem Statement Optimal network flow allocation Find flow allocation which minimizes certain performance criterion
More informationLecture: Iterative Search Methods
Lecture: Iterative Search Methods Overview Constructive Search is exponential. State-Space Search exhibits better performance on some problems. Research in understanding heuristic and iterative search
More informationAn Overview of Routing Models for MPLS Networks
An Overview of Routing Models for MPLS Networks Rita Girão Silva, José Craveirinha DEEC-FCTUC / INESC-Coimbra An Overview of Routing Models for MPLS Networks 1 Presentation Presentation Overview of routing
More informationHARNESSING CERTAINTY TO SPEED TASK-ALLOCATION ALGORITHMS FOR MULTI-ROBOT SYSTEMS
HARNESSING CERTAINTY TO SPEED TASK-ALLOCATION ALGORITHMS FOR MULTI-ROBOT SYSTEMS An Undergraduate Research Scholars Thesis by DENISE IRVIN Submitted to the Undergraduate Research Scholars program at Texas
More informationCS 331: Artificial Intelligence Local Search 1. Tough real-world problems
CS 331: Artificial Intelligence Local Search 1 1 Tough real-world problems Suppose you had to solve VLSI layout problems (minimize distance between components, unused space, etc.) Or schedule airlines
More informationA Short SVM (Support Vector Machine) Tutorial
A Short SVM (Support Vector Machine) Tutorial j.p.lewis CGIT Lab / IMSC U. Southern California version 0.zz dec 004 This tutorial assumes you are familiar with linear algebra and equality-constrained optimization/lagrange
More informationAn iteration of Branch and Bound One iteration of Branch and Bound consists of the following four steps: Some definitions. Branch and Bound.
ranch and ound xamples and xtensions jesla@man.dtu.dk epartment of Management ngineering Technical University of enmark ounding ow do we get ourselves a bounding function? Relaxation. Leave out some constraints.
More information/ Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang
600.469 / 600.669 Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang 9.1 Linear Programming Suppose we are trying to approximate a minimization
More information1 Linear programming relaxation
Cornell University, Fall 2010 CS 6820: Algorithms Lecture notes: Primal-dual min-cost bipartite matching August 27 30 1 Linear programming relaxation Recall that in the bipartite minimum-cost perfect matching
More information1 Tree Search (12 points)
1 Tree Search (12 points) Consider the tree shown below. The numbers on the arcs are the arc lengths. Assume that the nodes are expanded in alphabetical order when no other order is specified by the search,
More informationCS 416, Artificial Intelligence Midterm Examination Fall 2004
CS 416, Artificial Intelligence Midterm Examination Fall 2004 Name: This is a closed book, closed note exam. All questions and subquestions are equally weighted. Introductory Material 1) True or False:
More informationROTATION SCHEDULING ON SYNCHRONOUS DATA FLOW GRAPHS. A Thesis Presented to The Graduate Faculty of The University of Akron
ROTATION SCHEDULING ON SYNCHRONOUS DATA FLOW GRAPHS A Thesis Presented to The Graduate Faculty of The University of Akron In Partial Fulfillment of the Requirements for the Degree Master of Science Rama
More informationDevice-to-Device Networking Meets Cellular via Network Coding
Device-to-Device Networking Meets Cellular via Network Coding Yasaman Keshtkarjahromi, Student Member, IEEE, Hulya Seferoglu, Member, IEEE, Rashid Ansari, Fellow, IEEE, and Ashfaq Khokhar, Fellow, IEEE
More informationVertex Cover Approximations
CS124 Lecture 20 Heuristics can be useful in practice, but sometimes we would like to have guarantees. Approximation algorithms give guarantees. It is worth keeping in mind that sometimes approximation
More informationApplying Multi-Core Model Checking to Hardware-Software Partitioning in Embedded Systems
V Brazilian Symposium on Computing Systems Engineering Applying Multi-Core Model Checking to Hardware-Software Partitioning in Embedded Systems Alessandro Trindade, Hussama Ismail, and Lucas Cordeiro Foz
More informationCS201: Lab #4 Writing a Dynamic Storage Allocator
CS201: Lab #4 Writing a Dynamic Storage Allocator In this lab you will write a dynamic storage allocator for C programs, i.e., your own version of the malloc, free and realloc routines. You are encouraged
More informationFundamentals of Integer Programming
Fundamentals of Integer Programming Di Yuan Department of Information Technology, Uppsala University January 2018 Outline Definition of integer programming Formulating some classical problems with integer
More informationQuality of Service. Create QoS Policy CHAPTER26. Create QoS Policy Tab. Edit QoS Policy Tab. Launch QoS Wizard Button
CHAPTER26 The (QoS) Wizard allows a network administrator to enable (QoS) on the router s WAN interfaces. QoS can also be enabled on IPSec VPN interfaces and tunnels. The QoS edit windows enables the administrator
More informationNetwork Support for Multimedia
Network Support for Multimedia Daniel Zappala CS 460 Computer Networking Brigham Young University Network Support for Multimedia 2/33 make the best of best effort use application-level techniques use CDNs
More information11.1 Facility Location
CS787: Advanced Algorithms Scribe: Amanda Burton, Leah Kluegel Lecturer: Shuchi Chawla Topic: Facility Location ctd., Linear Programming Date: October 8, 2007 Today we conclude the discussion of local
More informationMinimizing Roundtrip Response Time in Distributed Databases with Vertical Fragmentation
Minimizing Roundtrip Response Time in Distributed Databases with Vertical Fragmentation Rodolfo A. Pazos R., Graciela Vázquez A. 2 José A. Martínez F. 3 Joaquín Pérez O. 4 Juan J. Gonzalez B. 5 Instituto
More informationCS261: A Second Course in Algorithms Lecture #16: The Traveling Salesman Problem
CS61: A Second Course in Algorithms Lecture #16: The Traveling Salesman Problem Tim Roughgarden February 5, 016 1 The Traveling Salesman Problem (TSP) In this lecture we study a famous computational problem,
More informationCost-Bounded Binary Decision Diagrams for 0-1 Programming
Cost-Bounded Binary Decision Diagrams for -1 Programming Tarik Hadžić 1 and J. N. Hooker 2 1 IT University of Copenhagen tarik@itu.dk 2 Carnegie Mellon University john@hooker.tepper.cmu.edu Abstract. In
More informationCHAPTER 4 HEURISTICS BASED ON OBJECT ORIENTED METRICS
CHAPTER 4 HEURISTICS BASED ON OBJECT ORIENTED METRICS Design evaluation is most critical activity during software development process. Design heuristics are proposed as a more accessible and informal means
More informationMidterm Examination CS 540-2: Introduction to Artificial Intelligence
Midterm Examination CS 54-2: Introduction to Artificial Intelligence March 9, 217 LAST NAME: FIRST NAME: Problem Score Max Score 1 15 2 17 3 12 4 6 5 12 6 14 7 15 8 9 Total 1 1 of 1 Question 1. [15] State
More informationHow Humans Solve Complex Problems: The Case of the Knapsack Problem
1 2 How Humans Solve Complex Problems: The Case of the Knapsack Problem 3 4 Carsten Murawski 1 and Peter L.Bossaerts 1,2,3 5 6 7 8 1 Department of Finance, The University of Melbourne, Melbourne, Victoria
More informationAlgorithms for Integer Programming
Algorithms for Integer Programming Laura Galli November 9, 2016 Unlike linear programming problems, integer programming problems are very difficult to solve. In fact, no efficient general algorithm is
More informationHierarchical PLABs, CLABs, TLABs in Hotspot
Hierarchical s, CLABs, s in Hotspot Christoph M. Kirsch ck@cs.uni-salzburg.at Hannes Payer hpayer@cs.uni-salzburg.at Harald Röck hroeck@cs.uni-salzburg.at Abstract Thread-local allocation buffers (s) are
More informationMachine Learning. Topic 5: Linear Discriminants. Bryan Pardo, EECS 349 Machine Learning, 2013
Machine Learning Topic 5: Linear Discriminants Bryan Pardo, EECS 349 Machine Learning, 2013 Thanks to Mark Cartwright for his extensive contributions to these slides Thanks to Alpaydin, Bishop, and Duda/Hart/Stork
More informationD-Optimal Designs. Chapter 888. Introduction. D-Optimal Design Overview
Chapter 888 Introduction This procedure generates D-optimal designs for multi-factor experiments with both quantitative and qualitative factors. The factors can have a mixed number of levels. For example,
More informationCS 268: Lecture 7 (Beyond TCP Congestion Control)
Outline CS 68: Lecture 7 (Beyond TCP Congestion Control) TCP-Friendly Rate Control (TFRC) explicit Control Protocol Ion Stoica Computer Science Division Department of Electrical Engineering and Computer
More informationModule 1 Lecture Notes 2. Optimization Problem and Model Formulation
Optimization Methods: Introduction and Basic concepts 1 Module 1 Lecture Notes 2 Optimization Problem and Model Formulation Introduction In the previous lecture we studied the evolution of optimization
More informationSemi-Independent Partitioning: A Method for Bounding the Solution to COP s
Semi-Independent Partitioning: A Method for Bounding the Solution to COP s David Larkin University of California, Irvine Abstract. In this paper we introduce a new method for bounding the solution to constraint
More informationConflict-based Statistics
Conflict-based Statistics Tomáš Müller 1, Roman Barták 1 and Hana Rudová 2 1 Faculty of Mathematics and Physics, Charles University Malostranské nám. 2/25, Prague, Czech Republic {muller bartak}@ktiml.mff.cuni.cz
More informationSPANNING TREES. Lecture 21 CS2110 Spring 2016
1 SPANNING TREES Lecture 1 CS110 Spring 016 Spanning trees What we do today: Calculating the shortest path in Dijkstra s algorithm Look at time complexity of shortest path Definitions Minimum spanning
More informationProgramming, numerics and optimization
Programming, numerics and optimization Lecture C-4: Constrained optimization Łukasz Jankowski ljank@ippt.pan.pl Institute of Fundamental Technological Research Room 4.32, Phone +22.8261281 ext. 428 June
More informationCS675: Convex and Combinatorial Optimization Spring 2018 The Simplex Algorithm. Instructor: Shaddin Dughmi
CS675: Convex and Combinatorial Optimization Spring 2018 The Simplex Algorithm Instructor: Shaddin Dughmi Algorithms for Convex Optimization We will look at 2 algorithms in detail: Simplex and Ellipsoid.
More informationData Replication in the Quality Space
Data Replication in the Quality Space Yicheng Tu April 1, 2008 At Commnet USF Roadmap Introduction Static data replication Dynamic data replication Experimental (simulation) results Summary Data Replication
More informationTransactum Business Process Manager with High-Performance Elastic Scaling. November 2011 Ivan Klianev
Transactum Business Process Manager with High-Performance Elastic Scaling November 2011 Ivan Klianev Transactum BPM serves three primary objectives: To make it possible for developers unfamiliar with distributed
More informationHill Climbing. Assume a heuristic value for each assignment of values to all variables. Maintain an assignment of a value to each variable.
Hill Climbing Many search spaces are too big for systematic search. A useful method in practice for some consistency and optimization problems is hill climbing: Assume a heuristic value for each assignment
More informationQuality of Service Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9300 Switches)
Quality of Service Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9300 Switches) First Published: 2017-07-31 Last Modified: 2017-11-03 Americas Headquarters Cisco Systems, Inc. 170 West Tasman
More informationGarbage-First Garbage Collection by David Detlefs, Christine Flood, Steve Heller & Tony Printezis. Presented by Edward Raff
Garbage-First Garbage Collection by David Detlefs, Christine Flood, Steve Heller & Tony Printezis Presented by Edward Raff Motivational Setup Java Enterprise World High end multiprocessor servers Large
More informationTowards Practical Differential Privacy for SQL Queries. Noah Johnson, Joseph P. Near, Dawn Song UC Berkeley
Towards Practical Differential Privacy for SQL Queries Noah Johnson, Joseph P. Near, Dawn Song UC Berkeley Outline 1. Discovering real-world requirements 2. Elastic sensitivity & calculating sensitivity
More informationand 6.855J Lagrangian Relaxation I never missed the opportunity to remove obstacles in the way of unity. Mohandas Gandhi
15.082 and 6.855J Lagrangian Relaxation I never missed the opportunity to remove obstacles in the way of unity. Mohandas Gandhi On bounding in optimization In solving network flow problems, we not only
More informationCSE 417 Branch & Bound (pt 4) Branch & Bound
CSE 417 Branch & Bound (pt 4) Branch & Bound Reminders > HW8 due today > HW9 will be posted tomorrow start early program will be slow, so debugging will be slow... Review of previous lectures > Complexity
More informationLocal Search. (Textbook Chpt 4.8) Computer Science cpsc322, Lecture 14. May, 30, CPSC 322, Lecture 14 Slide 1
Local Search Computer Science cpsc322, Lecture 14 (Textbook Chpt 4.8) May, 30, 2017 CPSC 322, Lecture 14 Slide 1 Announcements Assignment1 due now! Assignment2 out today CPSC 322, Lecture 10 Slide 2 Lecture
More information15 212: Principles of Programming. Some Notes on Continuations
15 212: Principles of Programming Some Notes on Continuations Michael Erdmann Spring 2011 These notes provide a brief introduction to continuations as a programming technique. Continuations have a rich
More informationCS 4700: Artificial Intelligence
CS 4700: Foundations of Artificial Intelligence Fall 2017 Instructor: Prof. Haym Hirsh Lecture 7 Extra Credit Opportunity: Lecture Today 4:15pm Gates G01 Learning to See Without a Teacher Phillip Isola
More informationProgramming II (CS300)
1 Programming II (CS300) Chapter 10 Recursion and Search MOUNA KACEM mouna@cs.wisc.edu Spring 2019 Recursion: General Overview 2 Recursion in Algorithms Recursion is the use of recursive algorithms to
More informationNotes for Lecture 20
U.C. Berkeley CS170: Intro to CS Theory Handout N20 Professor Luca Trevisan November 13, 2001 Notes for Lecture 20 1 Duality As it turns out, the max-flow min-cut theorem is a special case of a more general
More informationHomework 3: Heuristics in Search
Graduate Artificial Intelligence 15-780 Homework 3: Heuristics in Search Out on February 15 Due on March 1 Problem 1: Exting Your SAT Solver (35 points) In the last homework, you constructed both a SAT
More informationApproximation Algorithms
Presentation for use with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 Approximation Algorithms Tamassia Approximation Algorithms 1 Applications One of
More informationStatic Batch Mode Heuristic Algorithm for Mapping Independent Tasks in Computational Grid
Journal of Computer Science Original Research Paper Static Batch Mode Heuristic Algorithm for Mapping Independent Tasks in Computational Grid 1 R. Vijayalakshmi and 2 V. Vasudevan 1 Department of Computer
More informationAlgorithms for Provisioning Virtual Private Networks in the Hose Model
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 4, AUGUST 2002 565 Algorithms for Provisioning Virtual Private Networks in the Hose Model Amit Kumar, Rajeev Rastogi, Avi Silberschatz, Fellow, IEEE, and
More informationM.Sc. (Final) DEGREE EXAMINATION, DEC Second Year INFORMATION TECHNOLOGY. Paper - I : Software Engineering. Time : 3 Hours Maximum Marks : 75
(DMSIT21) M.Sc. (Final) DEGREE EXAMINATION, DEC. - 2014 Second Year INFORMATION TECHNOLOGY Paper - I : Software Engineering Time : 3 Hours Maximum Marks : 75 Section A (3 15 = 45) Answer any three questions
More informationA Scalable Scheduling Algorithm for Real-Time Distributed Systems
A Scalable Scheduling Algorithm for Real-Time Distributed Systems Yacine Atif School of Electrical & Electronic Engineering Nanyang Technological University Singapore E-mail: iayacine@ntu.edu.sg Babak
More informationUnit 2 Packet Switching Networks - II
Unit 2 Packet Switching Networks - II Dijkstra Algorithm: Finding shortest path Algorithm for finding shortest paths N: set of nodes for which shortest path already found Initialization: (Start with source
More informationSpring 2007 Midterm Exam
15-381 Spring 2007 Midterm Exam Spring 2007 March 8 Name: Andrew ID: This is an open-book, open-notes examination. You have 80 minutes to complete this examination. Unless explicitly requested, we do not
More informationval(y, I) α (9.0.2) α (9.0.3)
CS787: Advanced Algorithms Lecture 9: Approximation Algorithms In this lecture we will discuss some NP-complete optimization problems and give algorithms for solving them that produce a nearly optimal,
More informationCMU-Q Lecture 8: Optimization I: Optimization for CSP Local Search. Teacher: Gianni A. Di Caro
CMU-Q 15-381 Lecture 8: Optimization I: Optimization for CSP Local Search Teacher: Gianni A. Di Caro LOCAL SEARCH FOR CSP Real-life CSPs can be very large and hard to solve Methods so far: construct a
More informationData Preprocessing. Slides by: Shree Jaswal
Data Preprocessing Slides by: Shree Jaswal Topics to be covered Why Preprocessing? Data Cleaning; Data Integration; Data Reduction: Attribute subset selection, Histograms, Clustering and Sampling; Data
More information