Asymptotically Exact TTL-Approximations of the Cache Replacement Algorithms LRU(m) and h-lru
|
|
- Stephanie Jones
- 5 years ago
- Views:
Transcription
1 Nicolas Gast 1 / 24 Asymptotically Exact TTL-Approximations of the Cache Replacement Algorithms LRU(m) and h-lru Nicolas Gast 1, Benny Van Houdt 2 ITC 2016 September 13-15, Würzburg, Germany 1 Inria 2 University of Antwerp
2 Nicolas Gast 2 / 24 Caches are everywhere User/Application slow cache fast Examples: Processor Database CDN Data source
3 3 started with [King 1971, Gelenbe 1973] 4 e.g., Fofack e al 2013, Berger et al Optimizing TTL Caches under Heavy-Tailed Demands (Ferragut et al. 2016) 6 Adaptive Caching Networks with Optimality Guarantees (Ioannidis and Yeh, 2016) Nicolas Gast 3 / 24 Caching policies Popularity-oblivious policies Cache-replacement policies 3 (LRU, RANDOM), TTL-caches 4. Popularity-aware policies / learning LFU and variants 5 Optimal policies for network of caches 6
4 3 started with [King 1971, Gelenbe 1973] 4 e.g., Fofack e al 2013, Berger et al Optimizing TTL Caches under Heavy-Tailed Demands (Ferragut et al. 2016) 6 Adaptive Caching Networks with Optimality Guarantees (Ioannidis and Yeh, 2016) Nicolas Gast 3 / 24 Caching policies Popularity-oblivious policies Cache-replacement policies 3 (LRU, RANDOM), TTL-caches 4. Popularity-aware policies / learning LFU and variants 5 Optimal policies for network of caches 6
5 Nicolas Gast 4 / 24 Contributions (and Outline) 1 Two cache replacement policies 2 Performance analysis via TTL approximation 3 Asymptotic exactness of the approximation 4 Comparison between LRU, LRU( m) and h-lru 5 Conclusion
6 Nicolas Gast 5 / 24 Outline 1 Two cache replacement policies 2 Performance analysis via TTL approximation 3 Asymptotic exactness of the approximation 4 Comparison between LRU, LRU( m) and h-lru 5 Conclusion
7 Nicolas Gast 6 / 24 The two policies generalize the LRU policy hit : do nothing LRU: miss : evict the LRU (least-recently used) item. cache Example with this stream of requests: (note: similar to RANDOM, FIFO) (Assumption: Object are assumed to have the same size.)
8 Nicolas Gast 6 / 24 The two policies generalize the LRU policy hit : do nothing LRU: miss : evict the LRU (least-recently used) item. copy cache Example with this stream of requests: (note: similar to RANDOM, FIFO) (Assumption: Object are assumed to have the same size.)
9 Nicolas Gast 6 / 24 The two policies generalize the LRU policy hit : do nothing LRU: miss : evict the LRU (least-recently used) item. copy cache Example with this stream of requests: (note: similar to RANDOM, FIFO) (Assumption: Object are assumed to have the same size.)
10 Nicolas Gast 6 / 24 The two policies generalize the LRU policy hit : do nothing LRU: miss : evict the LRU (least-recently used) item. (do nothing) cache Example with this stream of requests: (note: similar to RANDOM, FIFO) (Assumption: Object are assumed to have the same size.)
11 Nicolas Gast 6 / 24 The two policies generalize the LRU policy hit : do nothing LRU: miss : evict the LRU (least-recently used) item. (do nothing) cache Example with this stream of requests: (note: similar to RANDOM, FIFO) (Assumption: Object are assumed to have the same size.)
12 Nicolas Gast 6 / 24 The two policies generalize the LRU policy hit : do nothing LRU: miss : evict the LRU (least-recently used) item. copy cache Example with this stream of requests: (note: similar to RANDOM, FIFO) (Assumption: Object are assumed to have the same size.)
13 Nicolas Gast 6 / 24 The two policies generalize the LRU policy hit : do nothing LRU: miss : evict the LRU (least-recently used) item. copy cache Example with this stream of requests: (note: similar to RANDOM, FIFO) (Assumption: Object are assumed to have the same size.)
14 Nicolas Gast 6 / 24 The two policies generalize the LRU policy hit : do nothing LRU: miss : evict the LRU (least-recently used) item. (do nothing) cache Example with this stream of requests: (note: similar to RANDOM, FIFO) (Assumption: Object are assumed to have the same size.)
15 The LRU( m) and h-lru policies LRU( m) 7 : exchange the requested item with the LRU of next list virtual cache exchange h-lru 8 : copy the requested item in the next list (and evict the LRU) copy virtual cache 7 Variant of RAND( m) of [G, Van Houdt 2015] 8 Introduced as k-lru in [Martina et al. 2014] Nicolas Gast 7 / 24
16 The LRU( m) and h-lru policies LRU( m) 7 : exchange the requested item with the LRU of next list copy virtual cache h-lru 8 : copy the requested item in the next list (and evict the LRU) copy virtual cache 7 Variant of RAND( m) of [G, Van Houdt 2015] 8 Introduced as k-lru in [Martina et al. 2014] Nicolas Gast 7 / 24
17 The LRU( m) and h-lru policies LRU( m) 7 : exchange the requested item with the LRU of next list virtual cache copy h-lru 8 : copy the requested item in the next list (and evict the LRU) virtual cache copy 7 Variant of RAND( m) of [G, Van Houdt 2015] 8 Introduced as k-lru in [Martina et al. 2014] Nicolas Gast 7 / 24
18 The LRU( m) and h-lru policies LRU( m) 7 : exchange the requested item with the LRU of next list virtual cache exchange h-lru 8 : copy the requested item in the next list (and evict the LRU) copy virtual cache 7 Variant of RAND( m) of [G, Van Houdt 2015] 8 Introduced as k-lru in [Martina et al. 2014] Nicolas Gast 7 / 24
19 The LRU( m) and h-lru policies LRU( m) 7 : exchange the requested item with the LRU of next list virtual cache exchange h-lru 8 : copy the requested item in the next list (and evict the LRU) copy virtual cache 7 Variant of RAND( m) of [G, Van Houdt 2015] 8 Introduced as k-lru in [Martina et al. 2014] Nicolas Gast 7 / 24
20 The LRU( m) and h-lru policies LRU( m) 7 : exchange the requested item with the LRU of next list copy virtual cache h-lru 8 : copy the requested item in the next list (and evict the LRU) copy virtual cache 7 Variant of RAND( m) of [G, Van Houdt 2015] 8 Introduced as k-lru in [Martina et al. 2014] Nicolas Gast 7 / 24
21 Nicolas Gast 7 / 24 The LRU( m) and h-lru policies LRU( m) 7 : exchange the requested item with the LRU of next list virtual cache exchange h-lru 8 : copy the requested item in the next list (and evict the LRU) virtual cache copy copy 7 Variant of RAND( m) of [G, Van Houdt 2015] 8 Introduced as k-lru in [Martina et al. 2014]
22 Nicolas Gast 7 / 24 The LRU( m) and h-lru policies LRU( m) 7 : exchange the requested item with the LRU of next list virtual cache exchange h-lru 8 : copy the requested item in the next list (and evict the LRU) virtual cache 7 Variant of RAND( m) of [G, Van Houdt 2015] 8 Introduced as k-lru in [Martina et al. 2014]
23 Nicolas Gast 8 / 24 Outline 1 Two cache replacement policies 2 Performance analysis via TTL approximation 3 Asymptotic exactness of the approximation 4 Comparison between LRU, LRU( m) and h-lru 5 Conclusion
24 In this talk: Performance analysis and comparison Qualitatively: less popular popular items It takes time to adapt 9 (RAND( m) in [G, Van Houdt, 2015]) for which product form solution exist. 10 heuristic for h-lru [Martina et al. 2014] Nicolas Gast 9 / 24
25 In this talk: Performance analysis and comparison Qualitatively: less popular popular items It takes time to adapt Quantitatively: Related work: Variants 9 or less accurate approximation 10 We present TTL approximations for MAP arrival (in the talk: IRM). 9 (RAND( m) in [G, Van Houdt, 2015]) for which product form solution exist. 10 heuristic for h-lru [Martina et al. 2014] Nicolas Gast 9 / 24
26 Nicolas Gast 10 / 24 Pure LRU: the Che-approximation reset timer start new timer Cache eviction after T
27 Nicolas Gast 10 / 24 Pure LRU: the Che-approximation reset timer start new timer Cache eviction after T If the request of object k is a Poisson process of intensity λ k : Object k is in cache with probability π k (T ) = 1 e λ kt (TTL)
28 Nicolas Gast 10 / 24 Pure LRU: the Che-approximation reset timer start new timer Cache eviction after T If the request of object k is a Poisson process of intensity λ k : Object k is in cache with probability π k (T ) = 1 e λ kt (TTL) T satisfies k π k (T ) = cache size. (Fixed point)
29 Nicolas Gast 11 / 24 The TTL-approximation for LRU(m) exchange Cache 1 Cache 2 Cache 3
30 Nicolas Gast 11 / 24 The TTL-approximation for LRU(m) reset timer start new timer start new timer start new timer Cache 1 Cache 2 Cache 3 eviction after T 1 eviction after T 2 eviction after T 3 If the request of object k is a Poisson process of intensity λ k : l Object k is in cache l with probability π k,i (T 1... T h ) (e λ kt i 1) i=1 T 1... T h satisfy k π k,i (T 1... T h ) = size of list i.
31 Nicolas Gast 12 / 24 The TTL-approximation for h-lru copy Cache 1 Cache 2 Cache 3 First idea: track the lists in which an object are. [Martina et al. 14] Problem: number of states = 2 h.
32 Nicolas Gast 12 / 24 The TTL-approximation for h-lru reset timer start new timer start new timer start new timer Cache 1 Cache 2 Cache 3 eviction after T 1 eviction after T 2 eviction after T 3 Solution: change model (track the greatest ID of the list in which the item appears by assuming that T 1 T 2... T h ) The TTL model can be solved exactly (see paper). Once T 1... T k have been computed, T k+1 satisfies a fixed point equation.
33 Nicolas Gast 13 / 24 Outline 1 Two cache replacement policies 2 Performance analysis via TTL approximation 3 Asymptotic exactness of the approximation 4 Comparison between LRU, LRU( m) and h-lru 5 Conclusion
34 Nicolas Gast 14 / 24 Is the approximation accurate? Example (10-LRU, with a cache size n/10 and a Zipf popularity) Simulation (Our approximation) [Martina et al. 14]) n = (+0.088%) (-1.380%) n = (+0.012%) (-1.206%)
35 Nicolas Gast 14 / 24 Is the approximation accurate? Example (10-LRU, with a cache size n/10 and a Zipf popularity) Simulation (Our approximation) [Martina et al. 14]) n = (+0.088%) (-1.380%) n = (+0.012%) (-1.206%) Numerically, TTL approximation have proven to be very accurate [Dan and Towsley 1990, Martina at al. 14, Che, 2002] Theoretical guarantees exist for LRU [Fricker et al. 12] We prove that our approximation is asymptotically exact.
36 Nicolas Gast 15 / 24 Asymptotic exactness of the approximation probability in cache probability in cache simulation list (200) 4 lists (50/50/50/50) number of requests 0.10 ODE approx approx 1 list (200) approx 4 lists (50/50/50/50) number of requests Figure: Popularities of objects change every 2000 steps. We develop an ODE approximation We show that it is accurate This ODE has the same fixed point as the TTL approximation
37 Nicolas Gast 15 / 24 Asymptotic exactness of the approximation probability in cache probability in cache simulation list (200) 4 lists (50/50/50/50) number of requests list (200) ODE approx. 4 lists (50/50/50/50) 0.05 approx ode 1 list aprox (200)(1 list) approx ode 4 lists approx (50/50/50/50) (4 lists) number of requests Figure: Popularities of objects change every 2000 steps. We develop an ODE approximation We show that it is accurate This ODE has the same fixed point as the TTL approximation
38 Nicolas Gast 16 / 24 Convergence result and idea of the proof Idea of the proof. We study the empirical distribution of the request dates. We use stochastic approximation to prove the convergence to an infinite dimensional deterministic ODE.
39 Nicolas Gast 17 / 24 Outline 1 Two cache replacement policies 2 Performance analysis via TTL approximation 3 Asymptotic exactness of the approximation 4 Comparison between LRU, LRU( m) and h-lru 5 Conclusion
40 Nicolas Gast 18 / 24 Qualitative remarks less popular popular items In general, adding more lists: Improves the steady-state performance a, Decreases the response time. a This is not true in full generality, even for IRM. The same counter-example as in [G., Van Houdt 2015] works.
41 Nicolas Gast 19 / 24 Quantitative remark 1: On synthetic traces: LRU(m, m) and 2-LRU perform similarly exchange LRU(m, m): 2-LRU: copy
42 Quantitative remark 1: On synthetic traces: LRU(m, m) and 2-LRU perform similarly exchange LRU(m, m): 2-LRU: copy Zipf α=0.8, n = 1000, correlation in IRTs 0.8 Hit Probability Hypo2 LRU Hypo2 2 LRU 0.3 Hypo2 LRM(m,m) Hypo10 LRU 0.2 Hypo10 2 LRU Hypo10 LRU(m,m) Cache Size Nicolas Gast 19 / 24
43 Nicolas Gast 20 / 24 Quantitative remark 1: LRU is insensitive to correlations between requests time Zipf α=0.8, n = 1000, m = 100 hit probability LRU 2 LRU LRU(m,m) LRU(m/2,m/2) Lag 1 autocorrelation ρ 1
44 Nicolas Gast 20 / 24 Quantitative remark 1: LRU is insensitive to correlations between requests time Zipf α=0.8, n = 1000, m = 100 hit probability LRU 2 LRU LRU(m,m) LRU(m/2,m/2) Lag 1 autocorrelation ρ 1
45 Quantitative remark 1: We verified on a web trace 11 that having virtual list seems to improve performance. LRU(m,m) LRU(m/2,m/2) LRU(m,m/2,m/2) 11 [Bianchi et al. 2013] Nicolas Gast 21 / 24
46 Quantitative remark 1: We verified on a web trace 11 that having virtual list seems to improve performance. hit probability / LRU hit probability Cache Size m LRU LRU(m/2,m/2) LRU(m/3,m/3,m/3) LRU(m,m) LRU(m,m/2,m/2) LRU(m,m) LRU(m/2,m/2) LRU(m,m/2,m/2) 11 [Bianchi et al. 2013] Nicolas Gast 21 / 24
47 Nicolas Gast 22 / 24 Outline 1 Two cache replacement policies 2 Performance analysis via TTL approximation 3 Asymptotic exactness of the approximation 4 Comparison between LRU, LRU( m) and h-lru 5 Conclusion
48 Nicolas Gast 23 / 24 Conclusion Characterize list-based cache replacement policies We provide TTL approximation New or improved approximations Exact for large cache Theoretical interests: Prove equivalence between TTL and cache replacement policies Show that these approximation work for MAP Practical applications: Comparison of LRU(m) and h-lru. Our results can be used to tune such algorithms.
49 Nicolas Gast 24 / 24 Questions or comments? nicolas.gast@inria.fr Supported by EU project quan col....
50 Nicolas Gast 1 / 1 Hyperexponential qz/(1 + z) z qz/(1 + z) 1/z q/(1 + z) Fire rate: 0 1 q/(1 + z) Proba(0)=z/(1 + z). Fire rate = z. Proba(1)=1/(1 + z). Fire rate = 1/z. z 2 Coefficient of variation: 1 + z z z 2z2 1.
Asymptotically Exact TTL-Approximations of the Cache Replacement Algorithms LRU(m) and h-lru
206 28th International Teletraffic Congress Asymptotically Exact TTL-Approximations of the Cache Replacement Algorithms LRU(m) and h-lru Nicolas Gast Inria, France Benny Van Houdt University of Antwerp,
More informationAsymptotically Exact TTL-Approximations of the Cache Replacement Algorithms LRU(m) and h-lru
Asymptotically Exact TTL-Approximations of the Cache Replacement Algorithms LRUm and h-lru Nicolas Gast Inria, France Benny Van Houdt University of Antwerp, Belgium Abstract Computer system and network
More informationTTL Approximations of the Cache Replacement Algorithms LRU(m) and h-lru
TTL Approximations of the Cache Replacement Algorithms LRU(m) and h-lru Nicolas Gast a,, Benny Van Houdt b a Univ. Grenoble Alpes, CNRS, LIG, F-38000 Grenoble, France b Univ. of Antwerp, Depart. of Math.
More informationExact Analysis of TTL Cache Networks
Exact Analysis of TTL Cache Networks Daniel S. Berger, Philipp Gland, Sahil Singla, and Florin Ciucu IFIP WG 7.3 Performance October 7, 2014 Classes of Caching Classes of Caches capacity-driven eviction
More informationTTL Approximations of the Cache Replacement Algorithms LRU(m) and h-lru
TTL Approximations of the Cache Replacement Algorithms LRU(m) and h-lru Nicolas Gast, Benny Van Houdt To cite this version: Nicolas Gast, Benny Van Houdt. TTL Approximations of the Cache Replacement Algorithms
More informationPolitecnico di Torino. Porto Institutional Repository
Politecnico di Torino Porto Institutional Repository [Proceeding] A unified approach to the performance analysis of caching systems Original Citation: Martina V.; Garetto M.;Leonardi E. (214). A unified
More informationUnderstanding Sharded Caching Systems
Understanding Sharded Caching Systems Lorenzo Saino l.saino@ucl.ac.uk Ioannis Paras i.psaras@ucl.ac.uk George Pavlov g.pavlou@ucl.ac.uk Department of Electronic and Electrical Engineering University College
More informationImpact of traffic mix on caching performance
Impact of traffic mix on caching performance Jim Roberts, INRIA/RAP joint work with Christine Fricker, Philippe Robert, Nada Sbihi BCAM, 27 June 2012 A content-centric future Internet most Internet traffic
More informationAccurate Learning or Fast Mixing? Dynamic Adaptability of Caching Algorithms
Accurate Learning or Fast Mixing? Dynamic Adaptability of Caching Algorithms Jian Li, Srinivas Shakkottai, John C.S. Lui and Vijay Subramanian University of Massachusetts Amherst, Texas A&M University,
More informationOn Allocating Cache Resources to Content Providers
On Allocating Cache Resources to Content Providers Weibo Chu, Mostafa Dehghan, Don Towsley, Zhi-Li Zhang wbchu@nwpu.edu.cn Northwestern Polytechnical University Why Resource Allocation in ICN? Resource
More informationECE 571 Advanced Microprocessor-Based Design Lecture 10
ECE 571 Advanced Microprocessor-Based Design Lecture 10 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 23 February 2017 Announcements HW#5 due HW#6 will be posted 1 Oh No, More
More informationAccurate Learning or Fast Mixing? Dynamic Adaptability of Caching Algorithms
Accurate Learning or Fast Mixing? Dynamic Adaptability of Caching Algorithms Jian Li, Srinivas Shakkottai, John C.S. Lui and Vijay Subramanian University of Massachusetts Amherst, Texas A&M University,
More informationToward Precise PLRU Cache Analysis
Toward Precise PLRU Cache Analysis Daniel Grund Jan Reineke 2 Saarland University, Saarbrücken, Germany 2 University of California, Berkeley, USA Workshop on Worst-Case Execution-Time Analysis 2 Outline
More informationarxiv: v3 [cs.ni] 22 Jul 2017
Accurate Learning or Fast Mixing? Dynamic Adaptability of Caching Algorithms arxiv:70.04v3 [cs.ni] Jul 07 ABSTRACT Jian Li UMass Amherst, U.S.A. jianli@cs.umass.edu John C.S. Lui CUHK, Hong Kong cslui@cse.cuhk.edu.hk
More informationA Versatile and Accurate Approximation for LRU Cache Performance
A Versatile and Accurate Approximation for LRU Cache Performance Christine Fricker, Philippe Robert, James Roberts INRIA, France {Christine.Fricker,Philippe.Robert,James.Roberts}@inria.fr Abstract In a
More informationPawan Poojary, Sharayu Moharir and Krishna Jagannathan. Abstract
Caching under Content Freshness Constraints Pawan Poojary, Sharayu Moharir and Krishna Jagannathan Abstract Several real-time delay-sensitive applications pose varying degrees of freshness demands on the
More informationTransient and Steady-state Regime of a Family of List-based Cache Replacement Algorithms
Transient and Steady-state Regime of a Family of List-based Cace Replacement Algoritms Nicolas Gast Benny Van Houdt To cite tis version: Nicolas Gast Benny Van Houdt. Transient and Steady-state Regime
More informationarxiv: v1 [cs.pf] 24 Feb 2014
Exact Analysis of TTL Cache Networks The Case of Caching Policies driven by Stopping Times Daniel S Berger University of Kaiserslautern Sahil Singla Carnegie Mellon University Philipp Gland TU Berlin Florin
More informationCS612 Algorithm Design and Analysis
CS612 Algorithm Design and Analysis Lecture 16. Paging problem 1 Institute of Computing Technology Chinese Academy of Sciences, Beijing, China 1 The slides are made based on Algorithm Design, Randomized
More informationCatalog Dynamics: Impact of Content Publishing and Perishing on the Performance of a LRU Cache
Catalog Dynamics: Impact of Content Publishing and Perishing on the Performance of a LRU Cache Felipe Olmos, Bruno Kauffmann, Alain Simonian and Yannick Carlinet Orange Labs and CMAP, Email: luisfelipe.olmosmarchant@orange.com
More informationEstimation of DNS Source and Cache Dynamics under Interval-Censored Age Sampling
Estimation of DNS Source and Cache Dynamics under Interval-Censored Age Sampling Di Xiao, Xiaoyong Li, Daren B.H. Cline, Dmitri Loguinov Internet Research Lab Department of Computer Science and Engineering
More informationFair Service for Mice in the Presence of Elephants
Fair Service for Mice in the Presence of Elephants Seth Voorhies, Hyunyoung Lee, and Andreas Klappenecker Abstract We show how randomized caches can be used in resource-poor partial-state routers to provide
More informationPrioritized Garbage Collection Using the Garbage Collector to Support Caching
Prioritized Garbage Collection Using the Garbage Collector to Support Caching Diogenes Nunez, Samuel Z. Guyer, Emery D. Berger Tufts University, University of Massachusetts Amherst November 2, 2016 D.
More informationCache Policies for Linear Utility Maximization
Cache Policies for Linear Utility Maximization Giovanni Neglia, Damiano Carra, Pietro Michiardi RESEARCH REPORT N 9010 January 2017 Project-Team Neo ISSN 0249-6399 ISRN INRIA/RR--9010--FR+ENG Cache Policies
More informationDriving Cache Replacement with ML-based LeCaR
1 Driving Cache Replacement with ML-based LeCaR Giuseppe Vietri, Liana V. Rodriguez, Wendy A. Martinez, Steven Lyons, Jason Liu, Raju Rangaswami, Ming Zhao, Giri Narasimhan Florida International University
More informationGibbsian On-Line Distributed Content Caching Strategy for Cellular Networks
Gibbsian On-Line Distributed Content Caching Strategy for Cellular Networks Arpan Chattopadhyay, Bartłomiej Błaszczyszyn, H. Paul Keeler arxiv:1610.02318v2 [cs.ni] 6 Nov 2017 Abstract In this paper, we
More informationA Generic Mean Field Model for Optimization in Large-scale Stochastic Systems and Applications in Scheduling
A Generic Mean Field Model for Optimization in Large-scale Stochastic Systems and Applications in Scheduling Nicolas Gast Bruno Gaujal Grenoble University Knoxville, May 13th-15th 2009 N. Gast (LIG) Mean
More informationThe Relative Worst Order Ratio Applied to Paging
The Relative Worst Order Ratio Applied to Paging Joan Boyar, Lene M. Favrholdt, and Kim S. Larsen Department of Mathematics and Computer Science, University of Southern Denmark, Odense, Denmark, {joan,lenem,kslarsen}@imada.sdu.dk
More informationTHE ZCACHE: DECOUPLING WAYS AND ASSOCIATIVITY. Daniel Sanchez and Christos Kozyrakis Stanford University
THE ZCACHE: DECOUPLING WAYS AND ASSOCIATIVITY Daniel Sanchez and Christos Kozyrakis Stanford University MICRO-43, December 6 th 21 Executive Summary 2 Mitigating the memory wall requires large, highly
More informationCACHE MISS ESTIMATION FOR NON-STATIONARY REQUEST PROCESSES. Orange Labs and CMAP, École Polytechnique
CACHE MISS ESTIMATION FOR NON-STATIONARY REQUEST PROCESSES By Felipe Olmos,, Carl Graham and Alain Simonian arxiv:1511.7392v2 math.pr 29 Nov 217 Orange Labs and CMAP, École Polytechnique The goal of the
More informationNear optimality of the discrete persistent access caching algorithm
2005 International Conference on Analysis of Algorithms DMTCS proc. AD, 2005, 201 222 Near optimality of the discrete persistent access caching algorithm Predrag R. Jelenković 1 and Xiaozhu Kang 1 and
More informationA Virtual Queue Approach to Loss Estimation
A Virtual Queue Approach to Loss Estimation Guoqiang Hu, Yuming Jiang, Anne Nevin Centre for Quantifiable Quality of Service in Communication Systems Norwegian University of Science and Technology, Norway
More informationThe Applicability of Adaptive Control Theory to QoS Design: Limitations and Solutions
The Applicability of Adaptive Control Theory to QoS Design: Limitations and Solutions Keqiang Wu David J. Lilja Haowei Bai Electrical and Computer Engineering University of Minnesota Minneapolis, MN 55455,
More informationAnalyzing the Performance of LRU Caches under Non-Stationary Traffic Patterns
Analyzing the Performance of LRU Caches under Non-Stationary Traffic Patterns Mohamed Ahmed, Stefano Traverso, Paolo Giaccone, Emilio Leonardi and Saverio Niccolini NEC Laboratories Europe, Heidelberg,
More informationDESIGN, ANALYSIS AND OPTIMIZATION OF CACHE SYSTEMS
University of Massachusetts Amherst ScholarWorks@UMass Amherst Doctoral Dissertations Dissertations and Theses 2017 DESIGN, ANALYSIS AND OPTIMIZATION OF CACHE SYSTEMS Mostafa Dehghan Shirehpaz University
More informationarxiv:cs/ v1 [cs.ni] 18 Mar 2003
The measurements, parameters and construction of Web proxy cache Dmitry Dolgikh arxiv:cs/030302v [cs.ni] 8 Mar 2003 Samara State Aerospace University, Moscovskoe sh. 34a, Samara, 443086, Russia Andrei
More informationAstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis
AstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis Ioan Raicu Distributed Systems Laboratory Computer Science Department University of Chicago Joint work with: Ian Foster: Univ. of
More informationarxiv: v1 [cs.ds] 26 Mar 2015
Analyzing Adaptive Cache Replacement Strategies Leo Shao 1, Mario E. Consuegra 2, Raju Rangaswami 1, and Giri Narasimhan 1 1 School of Computing and Information Sciences, Florida International University,
More informationSharing LRU Cache Resources among Content Providers: A Utility-Based Approach
Sharing LRU Cache Resources among Content Providers: A Utility-Based Approach Mostafa Dehghan 1, Weibo Chu 2, Philippe Nain 3, Don Towsley 1 1 University of Massachusetts, Amherst, USA 2 Northwestern Polytechnical
More informationOptimal Geographical Caching in Heterogeneous Cellular Networks
1 Optimal Geographical Caching in Heterogeneous Cellular Networks Berksan Serbetci, and Jasper Goseling arxiv:1710.09626v2 [cs.ni] 22 Nov 2018 Abstract We investigate optimal geographical caching in heterogeneous
More informationCaches in WCET Analysis
Caches in WCET Analysis Jan Reineke Department of Computer Science Saarland University Saarbrücken, Germany ARTIST Summer School in Europe 2009 Autrans, France September 7-11, 2009 Jan Reineke Caches in
More informationSimulation. Where real stuff starts
Simulation Where real stuff starts March 2019 1 ToC 1. What is a simulation? 2. Accuracy of output 3. Random Number Generators 4. How to sample 5. Monte Carlo 6. Bootstrap 2 1. What is a simulation? 3
More informationAccess-time aware cache algorithms
Access-time aware cache algorithms Giovanni Neglia, Damiano Carra, Mingdong Feng, Vaishnav Janardhan, Pietro Michiardi, Dimitra Tsigkari To cite this version: Giovanni Neglia, Damiano Carra, Mingdong Feng,
More informationarxiv: v1 [cs.ds] 12 Oct 2015
On the Smoothness of Paging Algorithms Jan Reineke and Alejandro Salinger 2 Department of Computer Science, Saarland University, Saarbrücken, Germany reineke@cs.uni-saarland.de 2 SAP SE, Walldorf, Germany
More informationPerformance comparison of aggressive push and traditional pull strategies in large distributed systems
1 Performance comparison of aggressive push and traditional pull strategies in large distributed systems Benny Van Houdt Department of Mathematics and Computer Science University of Antwerp - IBBT Middelheimlaan
More informationCS264: Beyond Worst-Case Analysis Lecture #4: Parameterized Analysis of Online Paging
CS264: Beyond Worst-Case Analysis Lecture #4: Parameterized Analysis of Online Paging Tim Roughgarden January 19, 2017 1 Preamble Recall our three goals for the mathematical analysis of algorithms: the
More informationCPSC 531: System Modeling and Simulation. Carey Williamson Department of Computer Science University of Calgary Fall 2017
CPSC 531: System Modeling and Simulation Carey Williamson Department of Computer Science University of Calgary Fall 2017 Quote of the Day A person with one watch knows what time it is. A person with two
More informationTHE CACHE INFERENCE PROBLEM
THE CACHE INFERENCE PROBLEM and its Application to Content and Request Routing NIKOLAOS LAOUTARIS yz GEORGIOS ZERVAS y AZER BESTAVROS y GEORGE KOLLIOS y nlaout@cs.bu.edu zg@cs.bu.edu best@cs.bu.edu gkollios@cs.bu.edu
More informationModeling Randomized Data Streams in Caching, Data Processing, and Crawling Applications
Modeling Randomized Data Streams in Caching, Data Processing, and Crawling Applications Sarker Tanzir Ahmed and Dmitri Loguinov Internet Research Lab Department of Computer Science and Engineering Texas
More informationDistributed Systems Principles and Paradigms. Chapter 06: Synchronization
Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 06: Synchronization Version: November 16, 2009 2 / 39 Contents Chapter
More informationMarkov Chains and Computer Science
A not so Short Introduction Jean-Marc Vincent Laboratoire LIG, projet Inria-Mescal UniversitéJoseph Fourier Jean-Marc.Vincent@imag.fr Spring 2015 1 / 44 Outline 1 Markov Chain History Approaches 2 Formalisation
More informationDistributed Systems Principles and Paradigms
Distributed Systems Principles and Paradigms Chapter 6 (version April 7, 28) Maarten van Steen Vrije Universiteit Amsterdam, Faculty of Science Dept. Mathematics and Computer Science Room R4.2. Tel: (2)
More informationLecture 1: March 7, 2018
Reinforcement Learning Spring Semester, 2017/8 Lecture 1: March 7, 2018 Lecturer: Yishay Mansour Scribe: ym DISCLAIMER: Based on Learning and Planning in Dynamical Systems by Shie Mannor c, all rights
More informationDesigning load balancing and admission control policies: lessons from NDS regime
Designing load balancing and admission control policies: lessons from NDS regime VARUN GUPTA University of Chicago Based on works with : Neil Walton, Jiheng Zhang ρ K θ is a useful regime to study the
More informationPerformance Evaluation of Queuing Systems
Performance Evaluation of Queuing Systems Introduction to Queuing Systems System Performance Measures & Little s Law Equilibrium Solution of Birth-Death Processes Analysis of Single-Station Queuing Systems
More informationABHELSINKI UNIVERSITY OF TECHNOLOGY
Modelling the population dynamics and file availability of a P2P file sharing system Riikka Susitaival, Samuli Aalto and Jorma Virtamo Helsinki University of Technology PANNET Seminar, 16th March Slide
More informationNATCOR: Stochastic Modelling
NATCOR: Stochastic Modelling Queueing Theory II Chris Kirkbride Management Science 2017 Overview of Today s Sessions I Introduction to Queueing Modelling II Multiclass Queueing Models III Queueing Control
More informationOutline. Finite source queue M/M/c//K Queues with impatience (balking, reneging, jockeying, retrial) Transient behavior Advanced Queue.
Outline Finite source queue M/M/c//K Queues with impatience (balking, reneging, jockeying, retrial) Transient behavior Advanced Queue Batch queue Bulk input queue M [X] /M/1 Bulk service queue M/M [Y]
More informationTheoretical Evidence for the Superiority of LRU-2 over LRU for the Paging Problem
Theoretical Evidence for the Superiority of LRU-2 over LRU for the Paging Problem Joan Boyar, Martin R. Ehmsen, and Kim S. Larsen Department of Mathematics and Computer Science University of Southern Denmark,
More informationApproximate Analysis of LRU in the Case of. Short Term Correlations
Approximate Analysis of LRU in the Case of Short Term Correlations Antonis Panagakis, Athanasios Vaios, and Ioannis Stavrakakis Dept. of Informatics & Telecommunications National & Kapodistrian University
More informationSimulation. Where real stuff starts
1 Simulation Where real stuff starts ToC 1. What is a simulation? 2. Accuracy of output 3. Random Number Generators 4. How to sample 5. Monte Carlo 6. Bootstrap 2 1. What is a simulation? 3 What is a simulation?
More informationWorst-Case Execution Time Analysis. LS 12, TU Dortmund
Worst-Case Execution Time Analysis Prof. Dr. Jian-Jia Chen LS 12, TU Dortmund 02, 03 May 2016 Prof. Dr. Jian-Jia Chen (LS 12, TU Dortmund) 1 / 53 Most Essential Assumptions for Real-Time Systems Upper
More informationUnravelling the Impact of Temporal and Geographical Locality in Content Caching Systems
Unravelling the Impact of Temporal and Geographical Locality in Content Caching Systems Stefano Traverso, Mohamed Ahmed, Michele Garetto, Paolo Giaccone, Emilio Leonardi, Saverio Niccolini arxiv:5.3354v
More informationA POPULATION-MIX DRIVEN APPROXIMATION FOR QUEUEING NETWORKS WITH FINITE CAPACITY REGIONS
A POPULATION-MIX DRIVEN APPROXIMATION FOR QUEUEING NETWORKS WITH FINITE CAPACITY REGIONS J. Anselmi 1, G. Casale 2, P. Cremonesi 1 1 Politecnico di Milano, Via Ponzio 34/5, I-20133 Milan, Italy 2 Neptuny
More informationDistributed Learning based on Entropy-Driven Game Dynamics
Distributed Learning based on Entropy-Driven Game Dynamics Bruno Gaujal joint work with Pierre Coucheney and Panayotis Mertikopoulos Inria Aug., 2014 Model Shared resource systems (network, processors)
More information`First Come, First Served' can be unstable! Thomas I. Seidman. Department of Mathematics and Statistics. University of Maryland Baltimore County
revision2: 9/4/'93 `First Come, First Served' can be unstable! Thomas I. Seidman Department of Mathematics and Statistics University of Maryland Baltimore County Baltimore, MD 21228, USA e-mail: hseidman@math.umbc.edui
More informationOn the Impact of Garbage Collection on flash-based SSD Endurance
On the Impact of Garbage Collection on flash-based Robin Verschoren and Benny Van Houdt Dept. Math and Computer Science University of Antwerp, Belgium Abstract Garbage collection has a profound impact
More informationLarge Scale Semi-supervised Linear SVMs. University of Chicago
Large Scale Semi-supervised Linear SVMs Vikas Sindhwani and Sathiya Keerthi University of Chicago SIGIR 2006 Semi-supervised Learning (SSL) Motivation Setting Categorize x-billion documents into commercial/non-commercial.
More informationFrom Stochastic Processes to Stochastic Petri Nets
From Stochastic Processes to Stochastic Petri Nets Serge Haddad LSV CNRS & ENS Cachan & INRIA Saclay Advanced Course on Petri Nets, the 16th September 2010, Rostock 1 Stochastic Processes and Markov Chains
More informationPerformance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University
Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University Joint work with Jinbei Zhang (SJTU), Chih-Chun Wang (Purdue) and Xinbing Wang (SJTU)
More informationChapter 2 Queueing Theory and Simulation
Chapter 2 Queueing Theory and Simulation Based on the slides of Dr. Dharma P. Agrawal, University of Cincinnati and Dr. Hiroyuki Ohsaki Graduate School of Information Science & Technology, Osaka University,
More informationSAMPLING AND INVERSION
SAMPLING AND INVERSION Darryl Veitch dveitch@unimelb.edu.au CUBIN, Department of Electrical & Electronic Engineering University of Melbourne Workshop on Sampling the Internet, Paris 2005 A TALK WITH TWO
More informationTowards VM Consolidation Using Idle States
Towards Consolidation Using Idle States Rayman Preet Singh, Tim Brecht, S. Keshav University of Waterloo @AC EE 15 1 Traditional Consolidation Hypervisor Hardware Hypervisor Hardware Hypervisor Hardware
More informationTOWARDS BETTER MULTI-CLASS PARAMETRIC-DECOMPOSITION APPROXIMATIONS FOR OPEN QUEUEING NETWORKS
TOWARDS BETTER MULTI-CLASS PARAMETRIC-DECOMPOSITION APPROXIMATIONS FOR OPEN QUEUEING NETWORKS by Ward Whitt AT&T Bell Laboratories Murray Hill, NJ 07974-0636 March 31, 199 Revision: November 9, 199 ABSTRACT
More informationCS246: Mining Massive Datasets Jure Leskovec, Stanford University
CS246: Mining Massive Datasets Jure Leskovec, Stanford University http://cs246.stanford.edu 2/26/2013 Jure Leskovec, Stanford CS246: Mining Massive Datasets, http://cs246.stanford.edu 2 More algorithms
More informationSpace-optimal Heavy Hitters with Strong Error Bounds
Space-optimal Heavy Hitters with Strong Error Bounds Graham Cormode graham@research.att.com Radu Berinde(MIT) Piotr Indyk(MIT) Martin Strauss (U. Michigan) The Frequent Items Problem TheFrequent Items
More informationMulti-Armed Bandit: Learning in Dynamic Systems with Unknown Models
c Qing Zhao, UC Davis. Talk at Xidian Univ., September, 2011. 1 Multi-Armed Bandit: Learning in Dynamic Systems with Unknown Models Qing Zhao Department of Electrical and Computer Engineering University
More informationK-Lists. Anindya Sen and Corrie Scalisi. June 11, University of California, Santa Cruz. Anindya Sen and Corrie Scalisi (UCSC) K-Lists 1 / 25
K-Lists Anindya Sen and Corrie Scalisi University of California, Santa Cruz June 11, 2007 Anindya Sen and Corrie Scalisi (UCSC) K-Lists 1 / 25 Outline 1 Introduction 2 Experts 3 Noise-Free Case Deterministic
More informationMaximum Likelihood Estimation of the Flow Size Distribution Tail Index from Sampled Packet Data
Maximum Likelihood Estimation of the Flow Size Distribution Tail Index from Sampled Packet Data Patrick Loiseau 1, Paulo Gonçalves 1, Stéphane Girard 2, Florence Forbes 2, Pascale Vicat-Blanc Primet 1
More informationAn Optimal Algorithm for l 1 -Heavy Hitters in Insertion Streams and Related Problems
An Optimal Algorithm for l 1 -Heavy Hitters in Insertion Streams and Related Problems Arnab Bhattacharyya, Palash Dey, and David P. Woodruff Indian Institute of Science, Bangalore {arnabb,palash}@csa.iisc.ernet.in
More information4/26/2017. More algorithms for streams: Each element of data stream is a tuple Given a list of keys S Determine which tuples of stream are in S
Note to other teachers and users of these slides: We would be delighted if you found this our material useful in giving your own lectures. Feel free to use these slides verbatim, or to modify them to fit
More informationmodels, languages, dynamics Eugene Asarin PIMS/EQINOCS Workshop on Automata Theory and Symbolic Dynamics LIAFA - University Paris Diderot and CNRS
models, s, LIAFA - University Paris Diderot and CNRS PIMS/EQINOCS Workshop on Automata Theory and Symbolic Dynamics Context A model for verification of real-time systems Invented by Alur and Dill in early
More informationDesign and Analysis of Time-Critical Systems Response-time Analysis with a Focus on Shared Resources
Design and Analysis of Time-Critical Systems Response-time Analysis with a Focus on Shared Resources Jan Reineke @ saarland university ACACES Summer School 2017 Fiuggi, Italy computer science Fixed-Priority
More informationAstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis
AstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis Ioan Raicu Distributed Systems Laboratory Computer Science Department University of Chicago Joint work with: Ian Foster: Univ. of
More informationAsymptotically Optimal Inventory Control For Assemble-to-Order Systems
Asymptotically Optimal Inventory Control For Assemble-to-Order Systems Marty Reiman Columbia Univerisity joint work with Mustafa Dogru, Haohua Wan, and Qiong Wang May 16, 2018 Outline The Assemble-to-Order
More information6.207/14.15: Networks Lecture 12: Generalized Random Graphs
6.207/14.15: Networks Lecture 12: Generalized Random Graphs 1 Outline Small-world model Growing random networks Power-law degree distributions: Rich-Get-Richer effects Models: Uniform attachment model
More informationComputer Systems Modelling
Computer Systems Modelling Computer Laboratory Computer Science Tripos, Part II Michaelmas Term 2003 R. J. Gibbens Problem sheet William Gates Building JJ Thomson Avenue Cambridge CB3 0FD http://www.cl.cam.ac.uk/
More informationPoint Process Control
Point Process Control The following note is based on Chapters I, II and VII in Brémaud s book Point Processes and Queues (1981). 1 Basic Definitions Consider some probability space (Ω, F, P). A real-valued
More informationAdvanced Computer Networks Lecture 3. Models of Queuing
Advanced Computer Networks Lecture 3. Models of Queuing Husheng Li Min Kao Department of Electrical Engineering and Computer Science University of Tennessee, Knoxville Spring, 2016 1/13 Terminology of
More informationA Mechanism for Pricing Service Guarantees
A Mechanism for Pricing Service Guarantees Bruce Hajek Department of Electrical and Computer Engineering and the Coordinated Science Laboratory University of Illinois at Urbana-Champaign Sichao Yang Qualcomm
More informationQueueing Systems: Lecture 6. Lecture Outline
Queueing Systems: Lecture 6 Amedeo R. Odoni November 6, 2006 Lecture Outline Congestion pricing in transportation: the fundamental ideas Congestion pricing and queueing theory Numerical examples A real
More informationOn the static assignment to parallel servers
On the static assignment to parallel servers Ger Koole Vrije Universiteit Faculty of Mathematics and Computer Science De Boelelaan 1081a, 1081 HV Amsterdam The Netherlands Email: koole@cs.vu.nl, Url: www.cs.vu.nl/
More informationYEQT, , Eindhoven
in in YEQT, 11-11-2015, Eindhoven out 1 / 39 in in out What are vehicle sharing systems? 2 / 39 in Vehicle Sharing Systems in out Figure: Autolib and Velib stations in Paris. 3 / 39 in Vehicle Sharing
More informationQueueing Theory and Simulation. Introduction
Queueing Theory and Simulation Based on the slides of Dr. Dharma P. Agrawal, University of Cincinnati and Dr. Hiroyuki Ohsaki Graduate School of Information Science & Technology, Osaka University, Japan
More informationOn Content Indexing for Off-Path Caching in Information-Centric Networks
On Content Indexing for Off-Path Caching in Information-Centric Networks Suzan Bayhan, Liang Wang, Jörg Ott, Jussi Kangasharju, Arjuna Sathiaseelan, Jon Crowcroft University of Helsinki (Finland), TU Munich
More informationRandomized Algorithms Multiple Choice Test
4435 Randomized Algorithms Multiple Choice Test Sample test: only 8 questions 24 minutes (Real test has 30 questions 90 minutes) Årskort Name Each of the following 8 questions has 4 possible answers of
More informationModule 9: "Introduction to Shared Memory Multiprocessors" Lecture 17: "Introduction to Cache Coherence Protocols" Invalidation vs.
Invalidation vs. Update Sharing patterns Migratory hand-off States of a cache line Stores MSI protocol MSI example MESI protocol MESI example MOESI protocol Hybrid inval+update file:///e /parallel_com_arch/lecture17/17_1.htm[6/13/2012
More informationScheduling: Queues & Computation
Scheduling: Queues Computation achieving baseline performance efficiently Devavrat Shah LIDS, MIT Outline Two models switched network and bandwidth sharing Scheduling: desirable performance queue-size
More informationOn Joining and Caching Stochastic Streams
On Joining and Caching Stochastic Streams Junyi Xie, Jun Yang Department of Computer Science, Duke University {junyi,junyang}@cs.duke.edu Yuguo Chen Institute of Statistics and Decision Sciences, Duke
More informationIntroduction to Reinforcement Learning. CMPT 882 Mar. 18
Introduction to Reinforcement Learning CMPT 882 Mar. 18 Outline for the week Basic ideas in RL Value functions and value iteration Policy evaluation and policy improvement Model-free RL Monte-Carlo and
More information