Asymptotically Exact TTL-Approximations of the Cache Replacement Algorithms LRU(m) and h-lru

Size: px
Start display at page:

Download "Asymptotically Exact TTL-Approximations of the Cache Replacement Algorithms LRU(m) and h-lru"

Transcription

1 Nicolas Gast 1 / 24 Asymptotically Exact TTL-Approximations of the Cache Replacement Algorithms LRU(m) and h-lru Nicolas Gast 1, Benny Van Houdt 2 ITC 2016 September 13-15, Würzburg, Germany 1 Inria 2 University of Antwerp

2 Nicolas Gast 2 / 24 Caches are everywhere User/Application slow cache fast Examples: Processor Database CDN Data source

3 3 started with [King 1971, Gelenbe 1973] 4 e.g., Fofack e al 2013, Berger et al Optimizing TTL Caches under Heavy-Tailed Demands (Ferragut et al. 2016) 6 Adaptive Caching Networks with Optimality Guarantees (Ioannidis and Yeh, 2016) Nicolas Gast 3 / 24 Caching policies Popularity-oblivious policies Cache-replacement policies 3 (LRU, RANDOM), TTL-caches 4. Popularity-aware policies / learning LFU and variants 5 Optimal policies for network of caches 6

4 3 started with [King 1971, Gelenbe 1973] 4 e.g., Fofack e al 2013, Berger et al Optimizing TTL Caches under Heavy-Tailed Demands (Ferragut et al. 2016) 6 Adaptive Caching Networks with Optimality Guarantees (Ioannidis and Yeh, 2016) Nicolas Gast 3 / 24 Caching policies Popularity-oblivious policies Cache-replacement policies 3 (LRU, RANDOM), TTL-caches 4. Popularity-aware policies / learning LFU and variants 5 Optimal policies for network of caches 6

5 Nicolas Gast 4 / 24 Contributions (and Outline) 1 Two cache replacement policies 2 Performance analysis via TTL approximation 3 Asymptotic exactness of the approximation 4 Comparison between LRU, LRU( m) and h-lru 5 Conclusion

6 Nicolas Gast 5 / 24 Outline 1 Two cache replacement policies 2 Performance analysis via TTL approximation 3 Asymptotic exactness of the approximation 4 Comparison between LRU, LRU( m) and h-lru 5 Conclusion

7 Nicolas Gast 6 / 24 The two policies generalize the LRU policy hit : do nothing LRU: miss : evict the LRU (least-recently used) item. cache Example with this stream of requests: (note: similar to RANDOM, FIFO) (Assumption: Object are assumed to have the same size.)

8 Nicolas Gast 6 / 24 The two policies generalize the LRU policy hit : do nothing LRU: miss : evict the LRU (least-recently used) item. copy cache Example with this stream of requests: (note: similar to RANDOM, FIFO) (Assumption: Object are assumed to have the same size.)

9 Nicolas Gast 6 / 24 The two policies generalize the LRU policy hit : do nothing LRU: miss : evict the LRU (least-recently used) item. copy cache Example with this stream of requests: (note: similar to RANDOM, FIFO) (Assumption: Object are assumed to have the same size.)

10 Nicolas Gast 6 / 24 The two policies generalize the LRU policy hit : do nothing LRU: miss : evict the LRU (least-recently used) item. (do nothing) cache Example with this stream of requests: (note: similar to RANDOM, FIFO) (Assumption: Object are assumed to have the same size.)

11 Nicolas Gast 6 / 24 The two policies generalize the LRU policy hit : do nothing LRU: miss : evict the LRU (least-recently used) item. (do nothing) cache Example with this stream of requests: (note: similar to RANDOM, FIFO) (Assumption: Object are assumed to have the same size.)

12 Nicolas Gast 6 / 24 The two policies generalize the LRU policy hit : do nothing LRU: miss : evict the LRU (least-recently used) item. copy cache Example with this stream of requests: (note: similar to RANDOM, FIFO) (Assumption: Object are assumed to have the same size.)

13 Nicolas Gast 6 / 24 The two policies generalize the LRU policy hit : do nothing LRU: miss : evict the LRU (least-recently used) item. copy cache Example with this stream of requests: (note: similar to RANDOM, FIFO) (Assumption: Object are assumed to have the same size.)

14 Nicolas Gast 6 / 24 The two policies generalize the LRU policy hit : do nothing LRU: miss : evict the LRU (least-recently used) item. (do nothing) cache Example with this stream of requests: (note: similar to RANDOM, FIFO) (Assumption: Object are assumed to have the same size.)

15 The LRU( m) and h-lru policies LRU( m) 7 : exchange the requested item with the LRU of next list virtual cache exchange h-lru 8 : copy the requested item in the next list (and evict the LRU) copy virtual cache 7 Variant of RAND( m) of [G, Van Houdt 2015] 8 Introduced as k-lru in [Martina et al. 2014] Nicolas Gast 7 / 24

16 The LRU( m) and h-lru policies LRU( m) 7 : exchange the requested item with the LRU of next list copy virtual cache h-lru 8 : copy the requested item in the next list (and evict the LRU) copy virtual cache 7 Variant of RAND( m) of [G, Van Houdt 2015] 8 Introduced as k-lru in [Martina et al. 2014] Nicolas Gast 7 / 24

17 The LRU( m) and h-lru policies LRU( m) 7 : exchange the requested item with the LRU of next list virtual cache copy h-lru 8 : copy the requested item in the next list (and evict the LRU) virtual cache copy 7 Variant of RAND( m) of [G, Van Houdt 2015] 8 Introduced as k-lru in [Martina et al. 2014] Nicolas Gast 7 / 24

18 The LRU( m) and h-lru policies LRU( m) 7 : exchange the requested item with the LRU of next list virtual cache exchange h-lru 8 : copy the requested item in the next list (and evict the LRU) copy virtual cache 7 Variant of RAND( m) of [G, Van Houdt 2015] 8 Introduced as k-lru in [Martina et al. 2014] Nicolas Gast 7 / 24

19 The LRU( m) and h-lru policies LRU( m) 7 : exchange the requested item with the LRU of next list virtual cache exchange h-lru 8 : copy the requested item in the next list (and evict the LRU) copy virtual cache 7 Variant of RAND( m) of [G, Van Houdt 2015] 8 Introduced as k-lru in [Martina et al. 2014] Nicolas Gast 7 / 24

20 The LRU( m) and h-lru policies LRU( m) 7 : exchange the requested item with the LRU of next list copy virtual cache h-lru 8 : copy the requested item in the next list (and evict the LRU) copy virtual cache 7 Variant of RAND( m) of [G, Van Houdt 2015] 8 Introduced as k-lru in [Martina et al. 2014] Nicolas Gast 7 / 24

21 Nicolas Gast 7 / 24 The LRU( m) and h-lru policies LRU( m) 7 : exchange the requested item with the LRU of next list virtual cache exchange h-lru 8 : copy the requested item in the next list (and evict the LRU) virtual cache copy copy 7 Variant of RAND( m) of [G, Van Houdt 2015] 8 Introduced as k-lru in [Martina et al. 2014]

22 Nicolas Gast 7 / 24 The LRU( m) and h-lru policies LRU( m) 7 : exchange the requested item with the LRU of next list virtual cache exchange h-lru 8 : copy the requested item in the next list (and evict the LRU) virtual cache 7 Variant of RAND( m) of [G, Van Houdt 2015] 8 Introduced as k-lru in [Martina et al. 2014]

23 Nicolas Gast 8 / 24 Outline 1 Two cache replacement policies 2 Performance analysis via TTL approximation 3 Asymptotic exactness of the approximation 4 Comparison between LRU, LRU( m) and h-lru 5 Conclusion

24 In this talk: Performance analysis and comparison Qualitatively: less popular popular items It takes time to adapt 9 (RAND( m) in [G, Van Houdt, 2015]) for which product form solution exist. 10 heuristic for h-lru [Martina et al. 2014] Nicolas Gast 9 / 24

25 In this talk: Performance analysis and comparison Qualitatively: less popular popular items It takes time to adapt Quantitatively: Related work: Variants 9 or less accurate approximation 10 We present TTL approximations for MAP arrival (in the talk: IRM). 9 (RAND( m) in [G, Van Houdt, 2015]) for which product form solution exist. 10 heuristic for h-lru [Martina et al. 2014] Nicolas Gast 9 / 24

26 Nicolas Gast 10 / 24 Pure LRU: the Che-approximation reset timer start new timer Cache eviction after T

27 Nicolas Gast 10 / 24 Pure LRU: the Che-approximation reset timer start new timer Cache eviction after T If the request of object k is a Poisson process of intensity λ k : Object k is in cache with probability π k (T ) = 1 e λ kt (TTL)

28 Nicolas Gast 10 / 24 Pure LRU: the Che-approximation reset timer start new timer Cache eviction after T If the request of object k is a Poisson process of intensity λ k : Object k is in cache with probability π k (T ) = 1 e λ kt (TTL) T satisfies k π k (T ) = cache size. (Fixed point)

29 Nicolas Gast 11 / 24 The TTL-approximation for LRU(m) exchange Cache 1 Cache 2 Cache 3

30 Nicolas Gast 11 / 24 The TTL-approximation for LRU(m) reset timer start new timer start new timer start new timer Cache 1 Cache 2 Cache 3 eviction after T 1 eviction after T 2 eviction after T 3 If the request of object k is a Poisson process of intensity λ k : l Object k is in cache l with probability π k,i (T 1... T h ) (e λ kt i 1) i=1 T 1... T h satisfy k π k,i (T 1... T h ) = size of list i.

31 Nicolas Gast 12 / 24 The TTL-approximation for h-lru copy Cache 1 Cache 2 Cache 3 First idea: track the lists in which an object are. [Martina et al. 14] Problem: number of states = 2 h.

32 Nicolas Gast 12 / 24 The TTL-approximation for h-lru reset timer start new timer start new timer start new timer Cache 1 Cache 2 Cache 3 eviction after T 1 eviction after T 2 eviction after T 3 Solution: change model (track the greatest ID of the list in which the item appears by assuming that T 1 T 2... T h ) The TTL model can be solved exactly (see paper). Once T 1... T k have been computed, T k+1 satisfies a fixed point equation.

33 Nicolas Gast 13 / 24 Outline 1 Two cache replacement policies 2 Performance analysis via TTL approximation 3 Asymptotic exactness of the approximation 4 Comparison between LRU, LRU( m) and h-lru 5 Conclusion

34 Nicolas Gast 14 / 24 Is the approximation accurate? Example (10-LRU, with a cache size n/10 and a Zipf popularity) Simulation (Our approximation) [Martina et al. 14]) n = (+0.088%) (-1.380%) n = (+0.012%) (-1.206%)

35 Nicolas Gast 14 / 24 Is the approximation accurate? Example (10-LRU, with a cache size n/10 and a Zipf popularity) Simulation (Our approximation) [Martina et al. 14]) n = (+0.088%) (-1.380%) n = (+0.012%) (-1.206%) Numerically, TTL approximation have proven to be very accurate [Dan and Towsley 1990, Martina at al. 14, Che, 2002] Theoretical guarantees exist for LRU [Fricker et al. 12] We prove that our approximation is asymptotically exact.

36 Nicolas Gast 15 / 24 Asymptotic exactness of the approximation probability in cache probability in cache simulation list (200) 4 lists (50/50/50/50) number of requests 0.10 ODE approx approx 1 list (200) approx 4 lists (50/50/50/50) number of requests Figure: Popularities of objects change every 2000 steps. We develop an ODE approximation We show that it is accurate This ODE has the same fixed point as the TTL approximation

37 Nicolas Gast 15 / 24 Asymptotic exactness of the approximation probability in cache probability in cache simulation list (200) 4 lists (50/50/50/50) number of requests list (200) ODE approx. 4 lists (50/50/50/50) 0.05 approx ode 1 list aprox (200)(1 list) approx ode 4 lists approx (50/50/50/50) (4 lists) number of requests Figure: Popularities of objects change every 2000 steps. We develop an ODE approximation We show that it is accurate This ODE has the same fixed point as the TTL approximation

38 Nicolas Gast 16 / 24 Convergence result and idea of the proof Idea of the proof. We study the empirical distribution of the request dates. We use stochastic approximation to prove the convergence to an infinite dimensional deterministic ODE.

39 Nicolas Gast 17 / 24 Outline 1 Two cache replacement policies 2 Performance analysis via TTL approximation 3 Asymptotic exactness of the approximation 4 Comparison between LRU, LRU( m) and h-lru 5 Conclusion

40 Nicolas Gast 18 / 24 Qualitative remarks less popular popular items In general, adding more lists: Improves the steady-state performance a, Decreases the response time. a This is not true in full generality, even for IRM. The same counter-example as in [G., Van Houdt 2015] works.

41 Nicolas Gast 19 / 24 Quantitative remark 1: On synthetic traces: LRU(m, m) and 2-LRU perform similarly exchange LRU(m, m): 2-LRU: copy

42 Quantitative remark 1: On synthetic traces: LRU(m, m) and 2-LRU perform similarly exchange LRU(m, m): 2-LRU: copy Zipf α=0.8, n = 1000, correlation in IRTs 0.8 Hit Probability Hypo2 LRU Hypo2 2 LRU 0.3 Hypo2 LRM(m,m) Hypo10 LRU 0.2 Hypo10 2 LRU Hypo10 LRU(m,m) Cache Size Nicolas Gast 19 / 24

43 Nicolas Gast 20 / 24 Quantitative remark 1: LRU is insensitive to correlations between requests time Zipf α=0.8, n = 1000, m = 100 hit probability LRU 2 LRU LRU(m,m) LRU(m/2,m/2) Lag 1 autocorrelation ρ 1

44 Nicolas Gast 20 / 24 Quantitative remark 1: LRU is insensitive to correlations between requests time Zipf α=0.8, n = 1000, m = 100 hit probability LRU 2 LRU LRU(m,m) LRU(m/2,m/2) Lag 1 autocorrelation ρ 1

45 Quantitative remark 1: We verified on a web trace 11 that having virtual list seems to improve performance. LRU(m,m) LRU(m/2,m/2) LRU(m,m/2,m/2) 11 [Bianchi et al. 2013] Nicolas Gast 21 / 24

46 Quantitative remark 1: We verified on a web trace 11 that having virtual list seems to improve performance. hit probability / LRU hit probability Cache Size m LRU LRU(m/2,m/2) LRU(m/3,m/3,m/3) LRU(m,m) LRU(m,m/2,m/2) LRU(m,m) LRU(m/2,m/2) LRU(m,m/2,m/2) 11 [Bianchi et al. 2013] Nicolas Gast 21 / 24

47 Nicolas Gast 22 / 24 Outline 1 Two cache replacement policies 2 Performance analysis via TTL approximation 3 Asymptotic exactness of the approximation 4 Comparison between LRU, LRU( m) and h-lru 5 Conclusion

48 Nicolas Gast 23 / 24 Conclusion Characterize list-based cache replacement policies We provide TTL approximation New or improved approximations Exact for large cache Theoretical interests: Prove equivalence between TTL and cache replacement policies Show that these approximation work for MAP Practical applications: Comparison of LRU(m) and h-lru. Our results can be used to tune such algorithms.

49 Nicolas Gast 24 / 24 Questions or comments? nicolas.gast@inria.fr Supported by EU project quan col....

50 Nicolas Gast 1 / 1 Hyperexponential qz/(1 + z) z qz/(1 + z) 1/z q/(1 + z) Fire rate: 0 1 q/(1 + z) Proba(0)=z/(1 + z). Fire rate = z. Proba(1)=1/(1 + z). Fire rate = 1/z. z 2 Coefficient of variation: 1 + z z z 2z2 1.

Asymptotically Exact TTL-Approximations of the Cache Replacement Algorithms LRU(m) and h-lru

Asymptotically Exact TTL-Approximations of the Cache Replacement Algorithms LRU(m) and h-lru 206 28th International Teletraffic Congress Asymptotically Exact TTL-Approximations of the Cache Replacement Algorithms LRU(m) and h-lru Nicolas Gast Inria, France Benny Van Houdt University of Antwerp,

More information

Asymptotically Exact TTL-Approximations of the Cache Replacement Algorithms LRU(m) and h-lru

Asymptotically Exact TTL-Approximations of the Cache Replacement Algorithms LRU(m) and h-lru Asymptotically Exact TTL-Approximations of the Cache Replacement Algorithms LRUm and h-lru Nicolas Gast Inria, France Benny Van Houdt University of Antwerp, Belgium Abstract Computer system and network

More information

TTL Approximations of the Cache Replacement Algorithms LRU(m) and h-lru

TTL Approximations of the Cache Replacement Algorithms LRU(m) and h-lru TTL Approximations of the Cache Replacement Algorithms LRU(m) and h-lru Nicolas Gast a,, Benny Van Houdt b a Univ. Grenoble Alpes, CNRS, LIG, F-38000 Grenoble, France b Univ. of Antwerp, Depart. of Math.

More information

Exact Analysis of TTL Cache Networks

Exact Analysis of TTL Cache Networks Exact Analysis of TTL Cache Networks Daniel S. Berger, Philipp Gland, Sahil Singla, and Florin Ciucu IFIP WG 7.3 Performance October 7, 2014 Classes of Caching Classes of Caches capacity-driven eviction

More information

TTL Approximations of the Cache Replacement Algorithms LRU(m) and h-lru

TTL Approximations of the Cache Replacement Algorithms LRU(m) and h-lru TTL Approximations of the Cache Replacement Algorithms LRU(m) and h-lru Nicolas Gast, Benny Van Houdt To cite this version: Nicolas Gast, Benny Van Houdt. TTL Approximations of the Cache Replacement Algorithms

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Politecnico di Torino Porto Institutional Repository [Proceeding] A unified approach to the performance analysis of caching systems Original Citation: Martina V.; Garetto M.;Leonardi E. (214). A unified

More information

Understanding Sharded Caching Systems

Understanding Sharded Caching Systems Understanding Sharded Caching Systems Lorenzo Saino l.saino@ucl.ac.uk Ioannis Paras i.psaras@ucl.ac.uk George Pavlov g.pavlou@ucl.ac.uk Department of Electronic and Electrical Engineering University College

More information

Impact of traffic mix on caching performance

Impact of traffic mix on caching performance Impact of traffic mix on caching performance Jim Roberts, INRIA/RAP joint work with Christine Fricker, Philippe Robert, Nada Sbihi BCAM, 27 June 2012 A content-centric future Internet most Internet traffic

More information

Accurate Learning or Fast Mixing? Dynamic Adaptability of Caching Algorithms

Accurate Learning or Fast Mixing? Dynamic Adaptability of Caching Algorithms Accurate Learning or Fast Mixing? Dynamic Adaptability of Caching Algorithms Jian Li, Srinivas Shakkottai, John C.S. Lui and Vijay Subramanian University of Massachusetts Amherst, Texas A&M University,

More information

On Allocating Cache Resources to Content Providers

On Allocating Cache Resources to Content Providers On Allocating Cache Resources to Content Providers Weibo Chu, Mostafa Dehghan, Don Towsley, Zhi-Li Zhang wbchu@nwpu.edu.cn Northwestern Polytechnical University Why Resource Allocation in ICN? Resource

More information

ECE 571 Advanced Microprocessor-Based Design Lecture 10

ECE 571 Advanced Microprocessor-Based Design Lecture 10 ECE 571 Advanced Microprocessor-Based Design Lecture 10 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 23 February 2017 Announcements HW#5 due HW#6 will be posted 1 Oh No, More

More information

Accurate Learning or Fast Mixing? Dynamic Adaptability of Caching Algorithms

Accurate Learning or Fast Mixing? Dynamic Adaptability of Caching Algorithms Accurate Learning or Fast Mixing? Dynamic Adaptability of Caching Algorithms Jian Li, Srinivas Shakkottai, John C.S. Lui and Vijay Subramanian University of Massachusetts Amherst, Texas A&M University,

More information

Toward Precise PLRU Cache Analysis

Toward Precise PLRU Cache Analysis Toward Precise PLRU Cache Analysis Daniel Grund Jan Reineke 2 Saarland University, Saarbrücken, Germany 2 University of California, Berkeley, USA Workshop on Worst-Case Execution-Time Analysis 2 Outline

More information

arxiv: v3 [cs.ni] 22 Jul 2017

arxiv: v3 [cs.ni] 22 Jul 2017 Accurate Learning or Fast Mixing? Dynamic Adaptability of Caching Algorithms arxiv:70.04v3 [cs.ni] Jul 07 ABSTRACT Jian Li UMass Amherst, U.S.A. jianli@cs.umass.edu John C.S. Lui CUHK, Hong Kong cslui@cse.cuhk.edu.hk

More information

A Versatile and Accurate Approximation for LRU Cache Performance

A Versatile and Accurate Approximation for LRU Cache Performance A Versatile and Accurate Approximation for LRU Cache Performance Christine Fricker, Philippe Robert, James Roberts INRIA, France {Christine.Fricker,Philippe.Robert,James.Roberts}@inria.fr Abstract In a

More information

Pawan Poojary, Sharayu Moharir and Krishna Jagannathan. Abstract

Pawan Poojary, Sharayu Moharir and Krishna Jagannathan. Abstract Caching under Content Freshness Constraints Pawan Poojary, Sharayu Moharir and Krishna Jagannathan Abstract Several real-time delay-sensitive applications pose varying degrees of freshness demands on the

More information

Transient and Steady-state Regime of a Family of List-based Cache Replacement Algorithms

Transient and Steady-state Regime of a Family of List-based Cache Replacement Algorithms Transient and Steady-state Regime of a Family of List-based Cace Replacement Algoritms Nicolas Gast Benny Van Houdt To cite tis version: Nicolas Gast Benny Van Houdt. Transient and Steady-state Regime

More information

arxiv: v1 [cs.pf] 24 Feb 2014

arxiv: v1 [cs.pf] 24 Feb 2014 Exact Analysis of TTL Cache Networks The Case of Caching Policies driven by Stopping Times Daniel S Berger University of Kaiserslautern Sahil Singla Carnegie Mellon University Philipp Gland TU Berlin Florin

More information

CS612 Algorithm Design and Analysis

CS612 Algorithm Design and Analysis CS612 Algorithm Design and Analysis Lecture 16. Paging problem 1 Institute of Computing Technology Chinese Academy of Sciences, Beijing, China 1 The slides are made based on Algorithm Design, Randomized

More information

Catalog Dynamics: Impact of Content Publishing and Perishing on the Performance of a LRU Cache

Catalog Dynamics: Impact of Content Publishing and Perishing on the Performance of a LRU Cache Catalog Dynamics: Impact of Content Publishing and Perishing on the Performance of a LRU Cache Felipe Olmos, Bruno Kauffmann, Alain Simonian and Yannick Carlinet Orange Labs and CMAP, Email: luisfelipe.olmosmarchant@orange.com

More information

Estimation of DNS Source and Cache Dynamics under Interval-Censored Age Sampling

Estimation of DNS Source and Cache Dynamics under Interval-Censored Age Sampling Estimation of DNS Source and Cache Dynamics under Interval-Censored Age Sampling Di Xiao, Xiaoyong Li, Daren B.H. Cline, Dmitri Loguinov Internet Research Lab Department of Computer Science and Engineering

More information

Fair Service for Mice in the Presence of Elephants

Fair Service for Mice in the Presence of Elephants Fair Service for Mice in the Presence of Elephants Seth Voorhies, Hyunyoung Lee, and Andreas Klappenecker Abstract We show how randomized caches can be used in resource-poor partial-state routers to provide

More information

Prioritized Garbage Collection Using the Garbage Collector to Support Caching

Prioritized Garbage Collection Using the Garbage Collector to Support Caching Prioritized Garbage Collection Using the Garbage Collector to Support Caching Diogenes Nunez, Samuel Z. Guyer, Emery D. Berger Tufts University, University of Massachusetts Amherst November 2, 2016 D.

More information

Cache Policies for Linear Utility Maximization

Cache Policies for Linear Utility Maximization Cache Policies for Linear Utility Maximization Giovanni Neglia, Damiano Carra, Pietro Michiardi RESEARCH REPORT N 9010 January 2017 Project-Team Neo ISSN 0249-6399 ISRN INRIA/RR--9010--FR+ENG Cache Policies

More information

Driving Cache Replacement with ML-based LeCaR

Driving Cache Replacement with ML-based LeCaR 1 Driving Cache Replacement with ML-based LeCaR Giuseppe Vietri, Liana V. Rodriguez, Wendy A. Martinez, Steven Lyons, Jason Liu, Raju Rangaswami, Ming Zhao, Giri Narasimhan Florida International University

More information

Gibbsian On-Line Distributed Content Caching Strategy for Cellular Networks

Gibbsian On-Line Distributed Content Caching Strategy for Cellular Networks Gibbsian On-Line Distributed Content Caching Strategy for Cellular Networks Arpan Chattopadhyay, Bartłomiej Błaszczyszyn, H. Paul Keeler arxiv:1610.02318v2 [cs.ni] 6 Nov 2017 Abstract In this paper, we

More information

A Generic Mean Field Model for Optimization in Large-scale Stochastic Systems and Applications in Scheduling

A Generic Mean Field Model for Optimization in Large-scale Stochastic Systems and Applications in Scheduling A Generic Mean Field Model for Optimization in Large-scale Stochastic Systems and Applications in Scheduling Nicolas Gast Bruno Gaujal Grenoble University Knoxville, May 13th-15th 2009 N. Gast (LIG) Mean

More information

The Relative Worst Order Ratio Applied to Paging

The Relative Worst Order Ratio Applied to Paging The Relative Worst Order Ratio Applied to Paging Joan Boyar, Lene M. Favrholdt, and Kim S. Larsen Department of Mathematics and Computer Science, University of Southern Denmark, Odense, Denmark, {joan,lenem,kslarsen}@imada.sdu.dk

More information

THE ZCACHE: DECOUPLING WAYS AND ASSOCIATIVITY. Daniel Sanchez and Christos Kozyrakis Stanford University

THE ZCACHE: DECOUPLING WAYS AND ASSOCIATIVITY. Daniel Sanchez and Christos Kozyrakis Stanford University THE ZCACHE: DECOUPLING WAYS AND ASSOCIATIVITY Daniel Sanchez and Christos Kozyrakis Stanford University MICRO-43, December 6 th 21 Executive Summary 2 Mitigating the memory wall requires large, highly

More information

CACHE MISS ESTIMATION FOR NON-STATIONARY REQUEST PROCESSES. Orange Labs and CMAP, École Polytechnique

CACHE MISS ESTIMATION FOR NON-STATIONARY REQUEST PROCESSES. Orange Labs and CMAP, École Polytechnique CACHE MISS ESTIMATION FOR NON-STATIONARY REQUEST PROCESSES By Felipe Olmos,, Carl Graham and Alain Simonian arxiv:1511.7392v2 math.pr 29 Nov 217 Orange Labs and CMAP, École Polytechnique The goal of the

More information

Near optimality of the discrete persistent access caching algorithm

Near optimality of the discrete persistent access caching algorithm 2005 International Conference on Analysis of Algorithms DMTCS proc. AD, 2005, 201 222 Near optimality of the discrete persistent access caching algorithm Predrag R. Jelenković 1 and Xiaozhu Kang 1 and

More information

A Virtual Queue Approach to Loss Estimation

A Virtual Queue Approach to Loss Estimation A Virtual Queue Approach to Loss Estimation Guoqiang Hu, Yuming Jiang, Anne Nevin Centre for Quantifiable Quality of Service in Communication Systems Norwegian University of Science and Technology, Norway

More information

The Applicability of Adaptive Control Theory to QoS Design: Limitations and Solutions

The Applicability of Adaptive Control Theory to QoS Design: Limitations and Solutions The Applicability of Adaptive Control Theory to QoS Design: Limitations and Solutions Keqiang Wu David J. Lilja Haowei Bai Electrical and Computer Engineering University of Minnesota Minneapolis, MN 55455,

More information

Analyzing the Performance of LRU Caches under Non-Stationary Traffic Patterns

Analyzing the Performance of LRU Caches under Non-Stationary Traffic Patterns Analyzing the Performance of LRU Caches under Non-Stationary Traffic Patterns Mohamed Ahmed, Stefano Traverso, Paolo Giaccone, Emilio Leonardi and Saverio Niccolini NEC Laboratories Europe, Heidelberg,

More information

DESIGN, ANALYSIS AND OPTIMIZATION OF CACHE SYSTEMS

DESIGN, ANALYSIS AND OPTIMIZATION OF CACHE SYSTEMS University of Massachusetts Amherst ScholarWorks@UMass Amherst Doctoral Dissertations Dissertations and Theses 2017 DESIGN, ANALYSIS AND OPTIMIZATION OF CACHE SYSTEMS Mostafa Dehghan Shirehpaz University

More information

arxiv:cs/ v1 [cs.ni] 18 Mar 2003

arxiv:cs/ v1 [cs.ni] 18 Mar 2003 The measurements, parameters and construction of Web proxy cache Dmitry Dolgikh arxiv:cs/030302v [cs.ni] 8 Mar 2003 Samara State Aerospace University, Moscovskoe sh. 34a, Samara, 443086, Russia Andrei

More information

AstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis

AstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis AstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis Ioan Raicu Distributed Systems Laboratory Computer Science Department University of Chicago Joint work with: Ian Foster: Univ. of

More information

arxiv: v1 [cs.ds] 26 Mar 2015

arxiv: v1 [cs.ds] 26 Mar 2015 Analyzing Adaptive Cache Replacement Strategies Leo Shao 1, Mario E. Consuegra 2, Raju Rangaswami 1, and Giri Narasimhan 1 1 School of Computing and Information Sciences, Florida International University,

More information

Sharing LRU Cache Resources among Content Providers: A Utility-Based Approach

Sharing LRU Cache Resources among Content Providers: A Utility-Based Approach Sharing LRU Cache Resources among Content Providers: A Utility-Based Approach Mostafa Dehghan 1, Weibo Chu 2, Philippe Nain 3, Don Towsley 1 1 University of Massachusetts, Amherst, USA 2 Northwestern Polytechnical

More information

Optimal Geographical Caching in Heterogeneous Cellular Networks

Optimal Geographical Caching in Heterogeneous Cellular Networks 1 Optimal Geographical Caching in Heterogeneous Cellular Networks Berksan Serbetci, and Jasper Goseling arxiv:1710.09626v2 [cs.ni] 22 Nov 2018 Abstract We investigate optimal geographical caching in heterogeneous

More information

Caches in WCET Analysis

Caches in WCET Analysis Caches in WCET Analysis Jan Reineke Department of Computer Science Saarland University Saarbrücken, Germany ARTIST Summer School in Europe 2009 Autrans, France September 7-11, 2009 Jan Reineke Caches in

More information

Simulation. Where real stuff starts

Simulation. Where real stuff starts Simulation Where real stuff starts March 2019 1 ToC 1. What is a simulation? 2. Accuracy of output 3. Random Number Generators 4. How to sample 5. Monte Carlo 6. Bootstrap 2 1. What is a simulation? 3

More information

Access-time aware cache algorithms

Access-time aware cache algorithms Access-time aware cache algorithms Giovanni Neglia, Damiano Carra, Mingdong Feng, Vaishnav Janardhan, Pietro Michiardi, Dimitra Tsigkari To cite this version: Giovanni Neglia, Damiano Carra, Mingdong Feng,

More information

arxiv: v1 [cs.ds] 12 Oct 2015

arxiv: v1 [cs.ds] 12 Oct 2015 On the Smoothness of Paging Algorithms Jan Reineke and Alejandro Salinger 2 Department of Computer Science, Saarland University, Saarbrücken, Germany reineke@cs.uni-saarland.de 2 SAP SE, Walldorf, Germany

More information

Performance comparison of aggressive push and traditional pull strategies in large distributed systems

Performance comparison of aggressive push and traditional pull strategies in large distributed systems 1 Performance comparison of aggressive push and traditional pull strategies in large distributed systems Benny Van Houdt Department of Mathematics and Computer Science University of Antwerp - IBBT Middelheimlaan

More information

CS264: Beyond Worst-Case Analysis Lecture #4: Parameterized Analysis of Online Paging

CS264: Beyond Worst-Case Analysis Lecture #4: Parameterized Analysis of Online Paging CS264: Beyond Worst-Case Analysis Lecture #4: Parameterized Analysis of Online Paging Tim Roughgarden January 19, 2017 1 Preamble Recall our three goals for the mathematical analysis of algorithms: the

More information

CPSC 531: System Modeling and Simulation. Carey Williamson Department of Computer Science University of Calgary Fall 2017

CPSC 531: System Modeling and Simulation. Carey Williamson Department of Computer Science University of Calgary Fall 2017 CPSC 531: System Modeling and Simulation Carey Williamson Department of Computer Science University of Calgary Fall 2017 Quote of the Day A person with one watch knows what time it is. A person with two

More information

THE CACHE INFERENCE PROBLEM

THE CACHE INFERENCE PROBLEM THE CACHE INFERENCE PROBLEM and its Application to Content and Request Routing NIKOLAOS LAOUTARIS yz GEORGIOS ZERVAS y AZER BESTAVROS y GEORGE KOLLIOS y nlaout@cs.bu.edu zg@cs.bu.edu best@cs.bu.edu gkollios@cs.bu.edu

More information

Modeling Randomized Data Streams in Caching, Data Processing, and Crawling Applications

Modeling Randomized Data Streams in Caching, Data Processing, and Crawling Applications Modeling Randomized Data Streams in Caching, Data Processing, and Crawling Applications Sarker Tanzir Ahmed and Dmitri Loguinov Internet Research Lab Department of Computer Science and Engineering Texas

More information

Distributed Systems Principles and Paradigms. Chapter 06: Synchronization

Distributed Systems Principles and Paradigms. Chapter 06: Synchronization Distributed Systems Principles and Paradigms Maarten van Steen VU Amsterdam, Dept. Computer Science Room R4.20, steen@cs.vu.nl Chapter 06: Synchronization Version: November 16, 2009 2 / 39 Contents Chapter

More information

Markov Chains and Computer Science

Markov Chains and Computer Science A not so Short Introduction Jean-Marc Vincent Laboratoire LIG, projet Inria-Mescal UniversitéJoseph Fourier Jean-Marc.Vincent@imag.fr Spring 2015 1 / 44 Outline 1 Markov Chain History Approaches 2 Formalisation

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distributed Systems Principles and Paradigms Chapter 6 (version April 7, 28) Maarten van Steen Vrije Universiteit Amsterdam, Faculty of Science Dept. Mathematics and Computer Science Room R4.2. Tel: (2)

More information

Lecture 1: March 7, 2018

Lecture 1: March 7, 2018 Reinforcement Learning Spring Semester, 2017/8 Lecture 1: March 7, 2018 Lecturer: Yishay Mansour Scribe: ym DISCLAIMER: Based on Learning and Planning in Dynamical Systems by Shie Mannor c, all rights

More information

Designing load balancing and admission control policies: lessons from NDS regime

Designing load balancing and admission control policies: lessons from NDS regime Designing load balancing and admission control policies: lessons from NDS regime VARUN GUPTA University of Chicago Based on works with : Neil Walton, Jiheng Zhang ρ K θ is a useful regime to study the

More information

Performance Evaluation of Queuing Systems

Performance Evaluation of Queuing Systems Performance Evaluation of Queuing Systems Introduction to Queuing Systems System Performance Measures & Little s Law Equilibrium Solution of Birth-Death Processes Analysis of Single-Station Queuing Systems

More information

ABHELSINKI UNIVERSITY OF TECHNOLOGY

ABHELSINKI UNIVERSITY OF TECHNOLOGY Modelling the population dynamics and file availability of a P2P file sharing system Riikka Susitaival, Samuli Aalto and Jorma Virtamo Helsinki University of Technology PANNET Seminar, 16th March Slide

More information

NATCOR: Stochastic Modelling

NATCOR: Stochastic Modelling NATCOR: Stochastic Modelling Queueing Theory II Chris Kirkbride Management Science 2017 Overview of Today s Sessions I Introduction to Queueing Modelling II Multiclass Queueing Models III Queueing Control

More information

Outline. Finite source queue M/M/c//K Queues with impatience (balking, reneging, jockeying, retrial) Transient behavior Advanced Queue.

Outline. Finite source queue M/M/c//K Queues with impatience (balking, reneging, jockeying, retrial) Transient behavior Advanced Queue. Outline Finite source queue M/M/c//K Queues with impatience (balking, reneging, jockeying, retrial) Transient behavior Advanced Queue Batch queue Bulk input queue M [X] /M/1 Bulk service queue M/M [Y]

More information

Theoretical Evidence for the Superiority of LRU-2 over LRU for the Paging Problem

Theoretical Evidence for the Superiority of LRU-2 over LRU for the Paging Problem Theoretical Evidence for the Superiority of LRU-2 over LRU for the Paging Problem Joan Boyar, Martin R. Ehmsen, and Kim S. Larsen Department of Mathematics and Computer Science University of Southern Denmark,

More information

Approximate Analysis of LRU in the Case of. Short Term Correlations

Approximate Analysis of LRU in the Case of. Short Term Correlations Approximate Analysis of LRU in the Case of Short Term Correlations Antonis Panagakis, Athanasios Vaios, and Ioannis Stavrakakis Dept. of Informatics & Telecommunications National & Kapodistrian University

More information

Simulation. Where real stuff starts

Simulation. Where real stuff starts 1 Simulation Where real stuff starts ToC 1. What is a simulation? 2. Accuracy of output 3. Random Number Generators 4. How to sample 5. Monte Carlo 6. Bootstrap 2 1. What is a simulation? 3 What is a simulation?

More information

Worst-Case Execution Time Analysis. LS 12, TU Dortmund

Worst-Case Execution Time Analysis. LS 12, TU Dortmund Worst-Case Execution Time Analysis Prof. Dr. Jian-Jia Chen LS 12, TU Dortmund 02, 03 May 2016 Prof. Dr. Jian-Jia Chen (LS 12, TU Dortmund) 1 / 53 Most Essential Assumptions for Real-Time Systems Upper

More information

Unravelling the Impact of Temporal and Geographical Locality in Content Caching Systems

Unravelling the Impact of Temporal and Geographical Locality in Content Caching Systems Unravelling the Impact of Temporal and Geographical Locality in Content Caching Systems Stefano Traverso, Mohamed Ahmed, Michele Garetto, Paolo Giaccone, Emilio Leonardi, Saverio Niccolini arxiv:5.3354v

More information

A POPULATION-MIX DRIVEN APPROXIMATION FOR QUEUEING NETWORKS WITH FINITE CAPACITY REGIONS

A POPULATION-MIX DRIVEN APPROXIMATION FOR QUEUEING NETWORKS WITH FINITE CAPACITY REGIONS A POPULATION-MIX DRIVEN APPROXIMATION FOR QUEUEING NETWORKS WITH FINITE CAPACITY REGIONS J. Anselmi 1, G. Casale 2, P. Cremonesi 1 1 Politecnico di Milano, Via Ponzio 34/5, I-20133 Milan, Italy 2 Neptuny

More information

Distributed Learning based on Entropy-Driven Game Dynamics

Distributed Learning based on Entropy-Driven Game Dynamics Distributed Learning based on Entropy-Driven Game Dynamics Bruno Gaujal joint work with Pierre Coucheney and Panayotis Mertikopoulos Inria Aug., 2014 Model Shared resource systems (network, processors)

More information

`First Come, First Served' can be unstable! Thomas I. Seidman. Department of Mathematics and Statistics. University of Maryland Baltimore County

`First Come, First Served' can be unstable! Thomas I. Seidman. Department of Mathematics and Statistics. University of Maryland Baltimore County revision2: 9/4/'93 `First Come, First Served' can be unstable! Thomas I. Seidman Department of Mathematics and Statistics University of Maryland Baltimore County Baltimore, MD 21228, USA e-mail: hseidman@math.umbc.edui

More information

On the Impact of Garbage Collection on flash-based SSD Endurance

On the Impact of Garbage Collection on flash-based SSD Endurance On the Impact of Garbage Collection on flash-based Robin Verschoren and Benny Van Houdt Dept. Math and Computer Science University of Antwerp, Belgium Abstract Garbage collection has a profound impact

More information

Large Scale Semi-supervised Linear SVMs. University of Chicago

Large Scale Semi-supervised Linear SVMs. University of Chicago Large Scale Semi-supervised Linear SVMs Vikas Sindhwani and Sathiya Keerthi University of Chicago SIGIR 2006 Semi-supervised Learning (SSL) Motivation Setting Categorize x-billion documents into commercial/non-commercial.

More information

From Stochastic Processes to Stochastic Petri Nets

From Stochastic Processes to Stochastic Petri Nets From Stochastic Processes to Stochastic Petri Nets Serge Haddad LSV CNRS & ENS Cachan & INRIA Saclay Advanced Course on Petri Nets, the 16th September 2010, Rostock 1 Stochastic Processes and Markov Chains

More information

Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University

Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University Joint work with Jinbei Zhang (SJTU), Chih-Chun Wang (Purdue) and Xinbing Wang (SJTU)

More information

Chapter 2 Queueing Theory and Simulation

Chapter 2 Queueing Theory and Simulation Chapter 2 Queueing Theory and Simulation Based on the slides of Dr. Dharma P. Agrawal, University of Cincinnati and Dr. Hiroyuki Ohsaki Graduate School of Information Science & Technology, Osaka University,

More information

SAMPLING AND INVERSION

SAMPLING AND INVERSION SAMPLING AND INVERSION Darryl Veitch dveitch@unimelb.edu.au CUBIN, Department of Electrical & Electronic Engineering University of Melbourne Workshop on Sampling the Internet, Paris 2005 A TALK WITH TWO

More information

Towards VM Consolidation Using Idle States

Towards VM Consolidation Using Idle States Towards Consolidation Using Idle States Rayman Preet Singh, Tim Brecht, S. Keshav University of Waterloo @AC EE 15 1 Traditional Consolidation Hypervisor Hardware Hypervisor Hardware Hypervisor Hardware

More information

TOWARDS BETTER MULTI-CLASS PARAMETRIC-DECOMPOSITION APPROXIMATIONS FOR OPEN QUEUEING NETWORKS

TOWARDS BETTER MULTI-CLASS PARAMETRIC-DECOMPOSITION APPROXIMATIONS FOR OPEN QUEUEING NETWORKS TOWARDS BETTER MULTI-CLASS PARAMETRIC-DECOMPOSITION APPROXIMATIONS FOR OPEN QUEUEING NETWORKS by Ward Whitt AT&T Bell Laboratories Murray Hill, NJ 07974-0636 March 31, 199 Revision: November 9, 199 ABSTRACT

More information

CS246: Mining Massive Datasets Jure Leskovec, Stanford University

CS246: Mining Massive Datasets Jure Leskovec, Stanford University CS246: Mining Massive Datasets Jure Leskovec, Stanford University http://cs246.stanford.edu 2/26/2013 Jure Leskovec, Stanford CS246: Mining Massive Datasets, http://cs246.stanford.edu 2 More algorithms

More information

Space-optimal Heavy Hitters with Strong Error Bounds

Space-optimal Heavy Hitters with Strong Error Bounds Space-optimal Heavy Hitters with Strong Error Bounds Graham Cormode graham@research.att.com Radu Berinde(MIT) Piotr Indyk(MIT) Martin Strauss (U. Michigan) The Frequent Items Problem TheFrequent Items

More information

Multi-Armed Bandit: Learning in Dynamic Systems with Unknown Models

Multi-Armed Bandit: Learning in Dynamic Systems with Unknown Models c Qing Zhao, UC Davis. Talk at Xidian Univ., September, 2011. 1 Multi-Armed Bandit: Learning in Dynamic Systems with Unknown Models Qing Zhao Department of Electrical and Computer Engineering University

More information

K-Lists. Anindya Sen and Corrie Scalisi. June 11, University of California, Santa Cruz. Anindya Sen and Corrie Scalisi (UCSC) K-Lists 1 / 25

K-Lists. Anindya Sen and Corrie Scalisi. June 11, University of California, Santa Cruz. Anindya Sen and Corrie Scalisi (UCSC) K-Lists 1 / 25 K-Lists Anindya Sen and Corrie Scalisi University of California, Santa Cruz June 11, 2007 Anindya Sen and Corrie Scalisi (UCSC) K-Lists 1 / 25 Outline 1 Introduction 2 Experts 3 Noise-Free Case Deterministic

More information

Maximum Likelihood Estimation of the Flow Size Distribution Tail Index from Sampled Packet Data

Maximum Likelihood Estimation of the Flow Size Distribution Tail Index from Sampled Packet Data Maximum Likelihood Estimation of the Flow Size Distribution Tail Index from Sampled Packet Data Patrick Loiseau 1, Paulo Gonçalves 1, Stéphane Girard 2, Florence Forbes 2, Pascale Vicat-Blanc Primet 1

More information

An Optimal Algorithm for l 1 -Heavy Hitters in Insertion Streams and Related Problems

An Optimal Algorithm for l 1 -Heavy Hitters in Insertion Streams and Related Problems An Optimal Algorithm for l 1 -Heavy Hitters in Insertion Streams and Related Problems Arnab Bhattacharyya, Palash Dey, and David P. Woodruff Indian Institute of Science, Bangalore {arnabb,palash}@csa.iisc.ernet.in

More information

4/26/2017. More algorithms for streams: Each element of data stream is a tuple Given a list of keys S Determine which tuples of stream are in S

4/26/2017. More algorithms for streams: Each element of data stream is a tuple Given a list of keys S Determine which tuples of stream are in S Note to other teachers and users of these slides: We would be delighted if you found this our material useful in giving your own lectures. Feel free to use these slides verbatim, or to modify them to fit

More information

models, languages, dynamics Eugene Asarin PIMS/EQINOCS Workshop on Automata Theory and Symbolic Dynamics LIAFA - University Paris Diderot and CNRS

models, languages, dynamics Eugene Asarin PIMS/EQINOCS Workshop on Automata Theory and Symbolic Dynamics LIAFA - University Paris Diderot and CNRS models, s, LIAFA - University Paris Diderot and CNRS PIMS/EQINOCS Workshop on Automata Theory and Symbolic Dynamics Context A model for verification of real-time systems Invented by Alur and Dill in early

More information

Design and Analysis of Time-Critical Systems Response-time Analysis with a Focus on Shared Resources

Design and Analysis of Time-Critical Systems Response-time Analysis with a Focus on Shared Resources Design and Analysis of Time-Critical Systems Response-time Analysis with a Focus on Shared Resources Jan Reineke @ saarland university ACACES Summer School 2017 Fiuggi, Italy computer science Fixed-Priority

More information

AstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis

AstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis AstroPortal: A Science Gateway for Large-scale Astronomy Data Analysis Ioan Raicu Distributed Systems Laboratory Computer Science Department University of Chicago Joint work with: Ian Foster: Univ. of

More information

Asymptotically Optimal Inventory Control For Assemble-to-Order Systems

Asymptotically Optimal Inventory Control For Assemble-to-Order Systems Asymptotically Optimal Inventory Control For Assemble-to-Order Systems Marty Reiman Columbia Univerisity joint work with Mustafa Dogru, Haohua Wan, and Qiong Wang May 16, 2018 Outline The Assemble-to-Order

More information

6.207/14.15: Networks Lecture 12: Generalized Random Graphs

6.207/14.15: Networks Lecture 12: Generalized Random Graphs 6.207/14.15: Networks Lecture 12: Generalized Random Graphs 1 Outline Small-world model Growing random networks Power-law degree distributions: Rich-Get-Richer effects Models: Uniform attachment model

More information

Computer Systems Modelling

Computer Systems Modelling Computer Systems Modelling Computer Laboratory Computer Science Tripos, Part II Michaelmas Term 2003 R. J. Gibbens Problem sheet William Gates Building JJ Thomson Avenue Cambridge CB3 0FD http://www.cl.cam.ac.uk/

More information

Point Process Control

Point Process Control Point Process Control The following note is based on Chapters I, II and VII in Brémaud s book Point Processes and Queues (1981). 1 Basic Definitions Consider some probability space (Ω, F, P). A real-valued

More information

Advanced Computer Networks Lecture 3. Models of Queuing

Advanced Computer Networks Lecture 3. Models of Queuing Advanced Computer Networks Lecture 3. Models of Queuing Husheng Li Min Kao Department of Electrical Engineering and Computer Science University of Tennessee, Knoxville Spring, 2016 1/13 Terminology of

More information

A Mechanism for Pricing Service Guarantees

A Mechanism for Pricing Service Guarantees A Mechanism for Pricing Service Guarantees Bruce Hajek Department of Electrical and Computer Engineering and the Coordinated Science Laboratory University of Illinois at Urbana-Champaign Sichao Yang Qualcomm

More information

Queueing Systems: Lecture 6. Lecture Outline

Queueing Systems: Lecture 6. Lecture Outline Queueing Systems: Lecture 6 Amedeo R. Odoni November 6, 2006 Lecture Outline Congestion pricing in transportation: the fundamental ideas Congestion pricing and queueing theory Numerical examples A real

More information

On the static assignment to parallel servers

On the static assignment to parallel servers On the static assignment to parallel servers Ger Koole Vrije Universiteit Faculty of Mathematics and Computer Science De Boelelaan 1081a, 1081 HV Amsterdam The Netherlands Email: koole@cs.vu.nl, Url: www.cs.vu.nl/

More information

YEQT, , Eindhoven

YEQT, , Eindhoven in in YEQT, 11-11-2015, Eindhoven out 1 / 39 in in out What are vehicle sharing systems? 2 / 39 in Vehicle Sharing Systems in out Figure: Autolib and Velib stations in Paris. 3 / 39 in Vehicle Sharing

More information

Queueing Theory and Simulation. Introduction

Queueing Theory and Simulation. Introduction Queueing Theory and Simulation Based on the slides of Dr. Dharma P. Agrawal, University of Cincinnati and Dr. Hiroyuki Ohsaki Graduate School of Information Science & Technology, Osaka University, Japan

More information

On Content Indexing for Off-Path Caching in Information-Centric Networks

On Content Indexing for Off-Path Caching in Information-Centric Networks On Content Indexing for Off-Path Caching in Information-Centric Networks Suzan Bayhan, Liang Wang, Jörg Ott, Jussi Kangasharju, Arjuna Sathiaseelan, Jon Crowcroft University of Helsinki (Finland), TU Munich

More information

Randomized Algorithms Multiple Choice Test

Randomized Algorithms Multiple Choice Test 4435 Randomized Algorithms Multiple Choice Test Sample test: only 8 questions 24 minutes (Real test has 30 questions 90 minutes) Årskort Name Each of the following 8 questions has 4 possible answers of

More information

Module 9: "Introduction to Shared Memory Multiprocessors" Lecture 17: "Introduction to Cache Coherence Protocols" Invalidation vs.

Module 9: Introduction to Shared Memory Multiprocessors Lecture 17: Introduction to Cache Coherence Protocols Invalidation vs. Invalidation vs. Update Sharing patterns Migratory hand-off States of a cache line Stores MSI protocol MSI example MESI protocol MESI example MOESI protocol Hybrid inval+update file:///e /parallel_com_arch/lecture17/17_1.htm[6/13/2012

More information

Scheduling: Queues & Computation

Scheduling: Queues & Computation Scheduling: Queues Computation achieving baseline performance efficiently Devavrat Shah LIDS, MIT Outline Two models switched network and bandwidth sharing Scheduling: desirable performance queue-size

More information

On Joining and Caching Stochastic Streams

On Joining and Caching Stochastic Streams On Joining and Caching Stochastic Streams Junyi Xie, Jun Yang Department of Computer Science, Duke University {junyi,junyang}@cs.duke.edu Yuguo Chen Institute of Statistics and Decision Sciences, Duke

More information

Introduction to Reinforcement Learning. CMPT 882 Mar. 18

Introduction to Reinforcement Learning. CMPT 882 Mar. 18 Introduction to Reinforcement Learning CMPT 882 Mar. 18 Outline for the week Basic ideas in RL Value functions and value iteration Policy evaluation and policy improvement Model-free RL Monte-Carlo and

More information