A General Theory of Computational Scalability Based on Rational Functions

Size: px
Start display at page:

Download "A General Theory of Computational Scalability Based on Rational Functions"

Transcription

1 A General Theory of Comutational Scalability Based on Rational Functions Neil J. Gunther arxiv: v1 [cs.pf] 11 Aug 2008 August 25, 2008 Abstract The universal scalability law (USL) of comutational caacity is a rational function C = P ()/Q() with P () a linear olynomial and Q() a second-degree olynomial in the number of hysical rocessors, that has been long used for statistical modeling and rediction of comuter system erformance. We rove that C is equivalent to the synchronous throughut bound for a machine-reairman with state-deendent service rate. Simler rational functions, such as Amdahl s law and Gustafson seedu, are corollaries of this queue-theoretic bound. C is both necessary and sufficient for modeling all ractical characteristics of comutational scalability. 1 Introduction For several decades, a class of real functions called rational functions [1], has been used to reresent throughut scalability as a function of hysical rocessor configuration. In articular, Amdahl s law [2], its modification due to Gustafson [3] and the Universal Scalability Law (USL) [4] have found ubiquitous alication. In this context, the relative comuting caacity, C, is a rational function of the number of hysical rocessors. It is defined as the quotient of a olynomial P () in the numerator and Q() in the denominator, i.e., C = P ()/Q(). Each of the above-mentioned scalability models is distinguished by the number of coefficients or fitting arameters associated with the olynomials in P () and Q(). For examle, Amdahl s law and Gustafson s modification are single arameter models, whereas the USL model contains two arameters. Desite their historical utility, these models have stood in isolation without any deeer hysical interretation. Is has have been suggested that Amdahl s law is not fundamental [5]. More imortantly, the lack of a unified hysical interretation has led to the use of certain flawed scalability models [6]. In this note, Performance Dynamics Comany, 4061 East Castro Valley Blvd., Suite 110, Castro Valley, CA 94552, USA. nj erfdynamics. com 1

2 we demonstrate that the aforementioned class of rational functions corresonds to certain erformance bounds belonging to a queue-theoretic model. The idea that Amdahl s law, which has most frequently been associated with the scalability of massively arallel systems, can be considered from a queuetheoretic standoint, is not entirely new [See e.g., 7, 8]. However, quite aart from motivations entirely different from our own, those revious works emloyed oen queueing models with an unbounded number of requests (See Aendix C), whereas we shall use a closed queueing model with a finite number of requests corresonding to the number of hysical rocessors. The USL function is associated with a state-deendent generalization of the machine reairman [9]. The organization of this aer is as follows. We briefly review the scalability models of interest in Sect. 2. The aroriate queueing metrics associated with the standard machine reairman and its state-deendent extension are discussed in Sect. 3. The erformance characteristics associated with synchronous queueing are also resented there. The main theorem (Theorem 2) is established in Sect. 4. Amdahl s law and Gustafson s linear seedu are shown to be corollaries of this theorem. Finally, in Sect. 5 we rove an earlier conjecture that a rational function with Q() a second-degree olynomial is both necessary and sufficient to model all ractical cases of comutational scalability. 2 Parametric Models Although technically, we are discussing rational functions, we shall hereafter refer to them as arametric models, and the coefficients as arameters, since the rimary alication of these models is nonlinear statistical regression of erformance data [See e.g., 4, 10, 11, 12, and references therein]. Definition 1 (Seedu). If an amount of work N is comleted in time T 1 on a unirocessor, the same amount of work can be comleted in time T < T 1 on a -way multirocessor. The seedu S = T 1 /T is one measure of scalability. 2.1 Amdahl s law For a single task that takes time T 1 to execute on a unirocessor ( = 1), Amdahl s law [2] states that if the task can be equiartitioned onto rocessors, but contains an irreducible fraction of sequential work σ [0, 1], then only the remaining ortion of the execution time (1 σ)t 1 can be executed as arallel subtasks on hysical rocessors. The bound on the achievable equiartitioned seedu [13] is given by the ratio which simlifies to T 1 S (σ) = ( (1) 1 σ σt 1 + )T 1 S (σ) = 1 + σ( 1) ; (2) 2

3 Figure 1: Parametric models: USL (red), Amdahl (green), Gustafson (blue), with arameter values exaggerated to distinguish their tyical characteristic relative to ideal linear scaling (dashed). The horizontal line is the Amdahl asymtote at σ 1. a rational function with P () = and Q() a first-degree olynomial. As the rocessor configuration is increased, i.e.,, the number of concomitantly smaller subtasks also increases and the seedu (1) aroaches an asymtote, shown as the horizontal in Fig Gustafson s seedu S (σ) σ 1, (3) Amdahl s law assumes the size of the work is fixed. Gustafson s modification is based on the idea of scaling u the size of the work to match. This assumtion results in the theoretical recovery of linear seedu S G (σ) = σ + (1 σ) (4) Equation (4) is a rational function with Q() = 1 and P () a first-degree olynomial in. Although (4) has insired various efforts for imroving arallel rocessing efficiencies, achieving truly linear seedu has turned out to be difficult in ractice. Most recently, (4) has been roosed as a way to otimize the throughut of multicore rocessors [14]. Definition 2 (Relative Caacity). As an alternative to the seedu, scalability can also be defined as the relative caacity, C = X()/X(1), where X() is the throughut with rocessors, and X(1) the throughut of a single rocessor. 3

4 Table 1: Alication domains for the USL model A: Ideal concurrency (σ, κ = 0) B: Contention-limited (σ > 0, κ = 0) Single-threaded tasks Tasks requiring locking or sequencing Parallel text search Message-assing rotocols Read-only queries Polling rotocols (e.g., hyervisors) C: Coherency-limited (σ = 0, κ > 0) D: Worst case (σ, κ > 0) SMP cache inging Tasks acting on shared-writable data Incoherent alication state between Online reservation systems cluster nodes Udating database records 2.3 Universal Scalability Law (USL) The USL model [4, 10, 11] is a rational function with P () = and Q() a second-degree olynomial: C (σ, κ) = 1 + σ( 1) + κ ( 1) where the coefficients belonging to the terms in the denominator have been regroued into three terms with two arameters (σ, κ). These terms can be interreted as reresenting: 1. Ideal concurrency associated with linear scalability (σ, κ = 0) 2. Contention-limited scalability due to serialization or queueing (σ > 0, κ = 0) 3. Coherency-limited scalability due to inconsistent coies of data (σ, κ > 0) Table 1 summarized how these arameter values can be used to classify the scalability of different tyes of alications. Equation (5) subsumes (2) and (4). In articular, (2) is identical to (5) with κ = 0. The key distinction is that, unlike (2), (5) ossesses a maximum at 1 σ = (6) κ which is controlled by the arameter values according to: (a) 0 as κ (b) as κ 0 (c) κ 1/2 as σ 0 (d) 0 as σ 1 The imortant imlication is that beyond the throughut becomes retrograde. See Fig. 1. This effect is commonly observed in alications that involve sharedwritable data (Case D in Table 1). In the subsequent sections, we attemt to rovide deeer insight into the hysical significance of (5) by recognizing its association with queueing theory. (5) 4

5 3 Queueing Models The machine reairman (Fig. 2) is a well-known queueing model [15] which reresents an assembly line comrising a finite number of machines which break down after a mean lifetime Z. A reairman takes a mean time S to reair a broken machine and if multile machines fail, the additional machines must queue for service in FIFO order. The queue-theoretic notation, M/M/1//, imlies exonentially distributed lifetimes and service eriods with a finite oulation of requests and buffering., Z R() X() S Figure 2: Conventional machine reairman queueing model comrising machines with mean utime Z (to) and a reair queue (bottom) with mean service time S. 3.1 Queueing Metrics The erformance characteristics of interest for the subsequent discussion are the throughut X() and residence time R(). Definition 3 (Throughut). The throughut, X = N/T, is the number of tasks N comleted in time T. Definition 4 (Residence Time). The mean residence time R = W +S is the sum of the time sent waiting for service W lus the actual reair time S when the reairman services the machine. On average, the number of machines that are u is ZX, while Q are down (for reairs), such that the total number of machines in either state is given by = Q + ZX. Rearranging this exression roduces: Q = ZX and alying Little s law [15] (Q = XR) [15] XR = ZX 5

6 Table 2: Interretation of the queueing metrics in Fig. 2 Interretation Metric Reairman Multirocessor Time share machines rocessors users Z u time execution eriod think time S service time transmission time CPU time R() residence time interconnect latency run-queue time X() failure rate bandwidth throughut gives R() = X() Z (7) for the mean residence time at the reair station. Rearranging (7) rovides an exression for the mean throughut of the reairman as a function of : X() = R() + Z Definition 5 (Mean RTT). The denominator in (8), R() + Z, is the mean round-tri time (RTT) for M/M/1//. Since M/M/1// is an abstraction, it can be alied to different comutational contexts. In the subsequent sections, the machines will be taken to reresent hysical rocessors and the time sent at the reair station is taken to reresent the interconnect latency between the rocessors [16, 17]. See Table 2. This choice is merely to conform to the conventions most commonly used in discussions of arallel scalability [11], but the generic nature of queueing model means that any conclusions also hold for software scalability [See e.g., 10, Cha. 6]. 3.2 Synchronous Queueing We consider the secial case of synchronous queueing in M/M/1//. The queuetheoretic erformance metrics defined in Sect. 3.1 are for the steady-state case and therefore each corresonds to the statistical mean of the resective random variable. Moreover, as already mentioned, we cannot give an exlicit exression for R() since its value is deendent on the value of X(), which is also unknown in steady state. Definition 6 (Synchronized Requests). If all the machines in M/M/1// break down simultaneously, the queue length at the reairman is maximized such that the residence time in definition 4 becomes R() = S. This situation corresonds to one machine in service and ( 1) waiting for service and rovides a lower bound on (8) [18, 19, 20]: X() (9) S + Z (8) 6

7 In the context of multirocessor scalability (Table 2), it is tantamount to all rocessors simultaneously issuing requests across the interconnect. Remark 1 (A Paradox). Consider the case where all rocessors have the same deterministic Z eriod. At the end of the first Z eriod, all requests will enqueue at the interconnect (lower ortion of Fig. 2) simultaneously. By definition, however, the requests are serviced serially, so they will return to the arallel execution hase (to ortion of Fig. 2) searately and thereafter will always return to the interconnect at different times. In other words, even if the queueing system starts with synchronized visits to the interconnect, that synchronization is immediately lost after the first tour because it is destroyed by the serial queueing rocess. The resolution of this aradox is discussed in Aendix B. Definition 7 (Synchronous RTT). In the resence of synchronous queueing, the mean RTT of definition 5 becomes S + Z. Lemma 1. The relative caacity C and the seedu S give identical values for the same rocessor configuration. Proof. Let the unirocessor throughut is defined as X 1 = N/T 1 and the multirocessor throughut is X = N/T. Hence follows from definition 1. C = X() X(1) = N T T 1 N S Lemma 2 (Serial Fraction). The serial fraction (2.1) can be exressed in terms of M/M/1// metrics by the identity [6, 10, 11]: { σ = S S + Z 0 as S 0, Z = const., (10) 1 as Z 0, S = const. If σ = 0, then there is no communication between rocessors and the interconnect latency therefore vanishes (maximal execution time). Conversely, if σ = 1, then the execution time vanishes (maximal communication latency). Proof. The RTT for a single (unartitioned) task in Fig. 2 is T 1 = S + Z. The RTT for a equiartitioned subtasks is T = (S/) + Z/. From definition 1, the corresonding seedu is Equating (11) with (1), we find Eliminating T 1 roduces S = S + Z S + Z/ (11) S = σt 1 and Z = (1 σ)t 1. (12) S = which, uon solving for σ, roduces (10). ( ) σ Z (13) 1 σ 7

8 See Aendix B for another ersective. Definition 8. The quantity Z S = 1 σ σ is the service ratio for the M/M/1// model. (14) Theorem 1 (Seedu Duality). Let (σ, π) be a continuous dual-arameter air with σ is the serial fraction (10) and π = 1 σ. The Amdahl seedu (2) is invariant under scalings of (σ, π) by. Proof. Using definition 8, theorem 1 can be reresented diagrammatically as: Z Z/ S S π/σ = Z/S S (σ) Z Z S S (15) The ath on the left hand side of (15) corresonds to reducing the single task execution time by (subtasks) while the interconnect service time remains unchanged. This follows from definition 6, R = S, but the service time for each subtask is also reduced to S/. Hence, R = S. Conversely, the right hand ath of (15) corresonds to tasks, each with unchanged execution time Z, but scaled service time R = S. Both aths result in Amdahl s law (2), which can be seen by first rewriting (11) in terms of the service ratio Z/S (definition 8): S = 1 + Z/S ( ). (16) Z S (a) Interreting the denominator in (16) as belonging to the left hand ath of (15) leads to the exansion S + Z S = S + Z + S S (S + Z)/S = ( ) 1 S + Z + 1 S Collecting terms and simlifying roduces: S = 1 + ( S S + Z ) ( 1) (17) which is identical to (2) uon substituting (10). 8

9 (b) Following the right hand ath in (15) leads to the exansion S = = S(1 + Z/S) S + Z ( ) S + Z S + Z S + Z + S S + Z S S + Z Collecting terms in the denominator roduces: S = ( ) S + 1 S S + Z S + Z (18) which also yields (2) via (10). Remark 2. Theorem 1 anticiates the interretation of Gustafson s law as a consequence of scaling the work size Z Z in M/M/1//. See corollary State-Deendent Service We now consider a generalization of this machine reairman model in which the residence time R includes an additional time that is roortional to the load on the server, exressed as the number of enqueued requests. Since the queue-length is a canonical measure of the state of the system, the reairman becomes a statedeendent server [9, 15], denoted M/G/1//. Let the additional service time be S, then the state-deendent rogression is: = 1 : R = S = 2 : R = 2 S + S = 3 : R = 3 S + 2 S (19) = : R = S + ( 1)S In other words, the extra time sent at the reair station increases linearly with the number down machines. Remark 3. In general, it is exected that S < S. It could, however, be a multile of S, but that is clearly undesirable. Some examle alications of the load-deendent M/G/1// queueing model in a comutational context include: (a) Pairwise Exchange: Modeling the erformance degradation due to combinatoric airwise exchange of data between multirocessor caches or cluster nodes. See Sect. 5. As (19) shows, this effect does not aly to = 1. 9

10 (b) Broadcast Protocol: If any rocessor broadcasts a request for data, the other ( 1) rocessors must sto and resond before comutation can continue [11]. (c) Virtual Memory: Each task is a rogram with its own working set of memory ages. Page relacement relies on a higher latency device, such as a disk. As the number of rograms increases, age relacement latency causes the system to thrash such that the throughut to become retrograde [9]. Cf. Fig Parametric Models as Queueing Bounds In this section, we show that the arametric scalability models in Section 2 corresond to certain throughut bounds on the queueing models in Section 3. Theorem 2 (Main Result). The universal scalability law (5) is equivalent to synchronous relative throughut in M/G/1//. Proof. Let S = cs in (19), with c a ositive constant of roortionality. The residence time for synchronous-requests becomes From definition 2, the scalability function is: R() = S + c( 1)S (20) (S + Z) C = S + c ( 1)S + Z (S + Z) = ( 1)S + (S + Z) + c ( 1)S (S + Z) = (S + Z) [1 + ( 1)S(S + Z) 1 + c ( 1)S(S + Z) 1 ] Collecting terms and simlifying roduces C = 1 + σ( 1) + c σ( 1) (21) (22) where we have alied the σ-identity from lemma 2. Combining the coefficients of the third term in the denominator of (22) as κ = c σ, yields (5). Remark 4. Since c is an arbitrary constant, c > 0 imlies that the arameter κ = c σ in (5) can be unbounded, whereas σ < 1 always. Remark 5. The state-deendence of R() in (20) does not change lemma 2 since σ is determined by S and Z only and both of those queueing metrics are constants. Corollary 1 (Amdahl s law). Amdahl s law (2) is the synchronous bound on relative throughut in M/M/1//. Proof. Follows immediately from the roof of theorem 2 with c = 0 in (21). 10

11 Remark 6. Elsewhere [6, 10, 11], corollary 1 was roven as a searate theorem. Corollary 2 (Gustafson s law). Gustafson s law (4) corresonds to the rescaling Z Z in M/M/1//. Proof. Since Gustafson s result is a modification of Amdahl s law, we start with (21) and let c = 0. Under Z Z, the scalability function becomes: (S + Z) C = S + Z = S + Z S + Z S + (Z + S S) = S + Z Once again, after alication of lemma 2, this simlifies to which is identical to the linear seedu S G in (4). C = σ + σ (23) Remark 7. Rewriting (23) as C = σ/(1 σ) +, we note that the additive constant σ/(1 σ) = S/Z is the inverse of the service ratio in definition 8. In the context of M/M/1//, rescaling the execution time, Z Z, rior to artitioning, adds a fixed overhead (S/Z) to an otherwise linear function of, whereas the overhead in Amdahl s law is an increasing function of. The results of this section have also been confirmed using event-based simulations [12]. 5 Extrema and Universality Ideal linear scalability (C, for > 0) has a ositive and constant derivative. More realistically, large rocessor configurations ( ) are exected to aroach saturation, i.e., the asymtote C sat σ 1. Any hysical comutational system that develos a scalability maximum at in the ositive quadrant ( > 0), means that C must have a negative derivative for > and therefore relative comutational caacity falls below the saturation value or C < C sat, i.e., throughut erformance becomes retrograde. Since this behavior is undesirable, there is little virtue in characterizing the maximum beyond the ability to quantify its location ( ) using a given scalability model. This observation leads to the following conjecture [See also 10,. 65], which we now rove. Conjecture 1 (Universality). For a rational function C = P ()/Q() with P () =, a necessary and sufficient condition for C to be a model of comutational scalability is, Q() = 1 + a 1 + a 2 2 with coefficients a 1, a 2 > 0. The simlest line of roof comes from considering latency rather than throughut. See Section D for further discussion. 11

12 Proof. Ideal latency reduction, T = T 1 /, is a hyerbolic function and therefore has no extrema. The additional latency due to airwise interrocessor communication introduces the combinatoric term, ( 2) = ( 1)/2, such that the total latency becomes T (κ) = T 1 + κt 1 ( 1) (24) 2 with constant κ > 0. Equation(24) has a unique minimum for > 0 (Fig. 3). Substituting (24) into the seedu definition 1, roduces S (κ) = 1 + κ( 1) where we have absorbed the factor of 2 in κ. S (κ) now ossesses a unique maximum in the ositive quadrant ( > 0). Thus, the quadratic term in the denominator of (25) is necessary for the existence of a maximum but it is not sufficient because S (κ) does not exhibit the Amdahl asymtote σ 1 when κ = 0. However, the two-arameter latency T (σ, κ) = T ( ) σt 1 + κ T 1 ( 1) (26) 2 does introduce the required term into (25) and, by lemma 1, is identical to (5). (25) T Figure 3: A minimum occurs in the total latency T () due to an increasing airwiseexchange time being added to the initial latency reduction. The second term in (26) can be interreted as the fixed time it takes any one rocessor to broadcast a request for data and wait for the remaining fraction of rocessors, ( 1)/, to resond simultaneously. This is also another way to view synchronous queueing in M/M/1//. It simly introduces a lower bound, σt 1, on the latency reduction. The third term in (26) is analogous to Brook s law [21]: Adding more manower to a late software roject makes it later, with interreted as eole rather 12

13 than rocessors. Here, for examle, it can be interreted as the latency due to the airwise exchange of data to maintain cache coherency in a multirocessor. 6 Conclusion Several ubiquitous scalability models, viz., Amdahl s law, Gustafson s law and the universal scalability law (USL), belong to a class of rational functions. Treated as arametric models, they are neither ad hoc nor unhysical. Rather, they corresond to certain bounds on the relative throughut of the machine reairman queueing model. In the most general case, the main theorem 2 states that the USL model corresonds to the synchronous throughut bound of a load-deendent machine reairman. USL subsumes both Amdahl s law and Gustafson s law as corollaries of theorem 2. As well as roviding a more hysical basis for these scalability models, the queue-theoretic interretation has ractical significance in that it facilitates rediction of resonse time scalability using (7) and rovides deeer insight into otential erformance tuning oortunities. Aendices A Why Universal? The term universal is intended to convey the notion that the USL (defined in Sect. 2.3) can be alied to any comuter architecture; from multi-core to multi-tier. This follows from the fact that there is nothing in (5) that exlicitly reresents any articular system architecture or interconnect toology. That information is resent but it is encoded in the numeric value of the arameters σ and κ. The same could be said for Amdahl s law but the difference is that, being a rational function with linear Q(), Amdahl s law cannot redict the retrograde scalability commonly observed in erformance evaluation measurements [4, 10]. As roven in Sect. 5, the USL is both necessary and sufficient to model all these effects. The USL does not exclude defining a more general or more comlex scalability model to account for such details as, heterogeneous rocessors or the functional form of degradation beyond, but any such model must include the USL as a limiting case. The best analogy might be to regard the USL as being akin to Newton s universal law of gravitation. Here, universal means generally alicable to any gravitating bodies. Newton s theory has been suerseded by a more sohisticated theory of gravitation; Einstein s general theory of relativity. Einstein s theory, however, does not negate Newton s theory but rather, contains it as a limiting case, when sace-time is flat. Since sace-time is flat in all ractical alications, NASA uses Newton s equations to calculate the flight aths of all its missions. 13

14 B Synchronous Queueing The roofs of theorem 2 (USL) and corollary 1 (Amdahl) emloy mean value equations for metrics which characterize steady state conditions. As noted in remark 1, synchronized queueing cannot be maintained in steady state. Synchronization and steady state are not comatible concets because the former is an instantaneous effect, whereas the analytic solutions we seek are only valid in long-run equilibrium. Elsewhere [10, 12], we have shown that a necessary requirement for maintaining synchronous queueing is to introduce another buffer in addition to the waiting line (W 1 ) at the reairman. If the extra buffer reresents a ost-reair collection oint, such that each reaired machine (comleted request) is held offline until all machines are reaired then, synchronous queueing is maintained rovided the Z eriods are i.i.d. deterministic. The extra buffer acts as a barrier synchronizer. Unfortunately, this is a D/M/1// queue, whereas the roof of corollary 1 is based on M/M/1//. Moreover, the reairman erformance metrics are robust [22], so our results should also hold for G/M/1//. In more recent simulation exeriments [12], we have shown that this restriction on Z eriods can be lifted by ositioning the buffer as a re-reair waiting room. Instead of requiring all machines to break down and enqueue simultaneously, we allow any number, less than, to fail but with the added constraint that when any machine invokes service at the reairman, all other machines (or executing rocessors) must susend oerations as well, i.e., visit the susension buffer. Under these conditions, Z can be G-distributed. Because this intermittent synchronization occurs with much higher frequency and for much shorter average time eriods than barrier synchronization, the otential imact of the G-distributed tails on the Z eriods is truncated. Synchronization can be treated as a two-state Markov rocess, e.g., A: arallel and B: serial, where the B state includes those rocesses that are susended as well as waiting for service. If λ A is the transition rate for A B and λ B for B A, then the robability of being in state B is given by Pr(B) = λ B λ A + λ B (27) In the revious scenario it only takes a single machine to fail to susended all other machines. The failure rate is therefore λ A = 1/Z and the service rate is λ B = 1/S. Substituting these into (27) roduces and exression identical to the serial fraction σ in (10). In state B, some fraction 1 are enqueued and the remainder 2 = 1 are susended. On average, any machine can exect to send time R = ( )S to comlete reairs. Hence, the total serial time is R = S, which is the quantity that aears in the roofs. C Queueing Models of Amdahl s Law Others have also considered Amdahl s law from a queue-theoretic standoint [See, e.g., 7, 8]. Of these, [8] is closest to our discussion, so we briefly summarize the 14

15 differences. First, the motivations are quite different. The author of [8], like many other authors, seeks clever ways to defeat Amdahl s law; in the sense of Gustafson (Sect. 2.2), whereas we are trying to understand Amdahl s law by roviding it with a more fundamental hysical interretation. Ironically, both investigations invoke queue-theoretic models to gain more insight into the ertinent issues; an oen (M/M/m) queue in [8], a closed queue (Fig. 2) in this aer. Second, two stes are undertaken to define an alternative seedu function: 1. An attemt to unify both the Amdahl and Gustafson equations into a single seedu function. 2. Extend that unified seedu function to include waiting times. The overarching goal is to find waiting-time otima for this unified seedu function. The unification ste is achieved by urely algebraic maniulations and does not rest on any queue-theoretic arguments. The oen queueing model rovides an ad hoc means for incororating waiting times as a function of queue length. The subsequent analysis is based entirely on simulation results and thereafter dearts significantly from the analytic aroach of this aer. By virtue of our aroach, we have shown that both Amdahl and Gustafson scaling laws are unified by the same queueing model, viz., the machine-reairman model. Moreover, corollary 1 is a lower bound on throughut; synchronous throughut, and therefore reresents worst-case scalability. With this hysical interretation, it follows immediately that Amdahl s law can be defeated more conveniently than roosed in [8] by simly requiring that all requests be issued asynchronously [12]. D Remarks on the Proof of Conjecture 1 The roof in Section 5, is simlified by using the additive roerties of the latency function T rather than inverting the rational function f() = R()/Q() directly. Since Q() is quadratic in, the temtation is to consider the inverse of f 1 and use the fact that a general quadratic function has a minimum. To see why this aroach runs into difficulties, consider the simlified reresentation of (5): f() = (28) with all unit coefficients. Equation (28) is not invertible in the formal sense because f 1 is not a one-to-one maing, even in the ositive quadrant. We can, however, consider the full inverse with its branches, as shown in Fig. 4. The rincial branch is shown in light blue with the other branches occurring at the extrema of f 1. This corresonds to the extrema of of (28) occurring at = ±1 f(1) = ±1/3. Hence, f 1 C, > 1/3. Alternatively, choosing the denominator be a erfect square: (29) 15

16 Figure 4: The comlete rational function (28) (red) and its inverse (blue). (29) can be exressed either as a roduct of linear factors: ( )( ) = or a artial fraction exansion: = (1 + ) 2 Although such decomositions are suggestive of the need for two arameters (Fig. 5), they would seem to obscure the roof of Theorem 1 rather than illuminate it. Using the latency function T and then inverting it to roduce the corresonding throughut scaling using lemma 1, avoids these roblems. References [1] Wikiedia. Rational function. en.wikiedia.org/wiki/rational function, Aril [2] G. Amdahl. Validity of the single rocessor aroach to achieving large scale comuting caabilities. Proc. AFIPS Conf., 30: , Ar [3] J. L. Gustafson. Reevaluating Amdahl s law. Comm. ACM, 31(5): , [4] N. J. Gunther. A simle caacity model for massively arallel transaction systems. In Proc. CMG Conf., ages , San Diego, California, December

17 x Figure 5: Amdahl scaling (red), enveloe function (1 + ) 1 (green), their convolution (solid blue) and (28) (dashed blue). The difference in the latter two curves arises from the factor of 2 in the denominator of (29). [5] F. P. Prearata. Should Amdahl s law be reealed? In ISAAC 95: Proceedings of the 6th International Symosium on Algorithms and Comutation, age 311, London, UK, Dec Sringer-Verlag. [6] N. J. Gunther. A new interretation of Amdahl s law and Geometric scalability. arxiv.org/abs/cs/ , Oct [7] L. Kleinrock and J-H. Huang. On arallel rocessing systems: Amdahl s law generalized and some results on otimal design. IEEE Trans. Software Eng., 18(5): , [8] R. D. Nelson. Including queueing effects in Amdahl s law. Comm. ACM, 39(12es): , [9] N. J. Gunther. Path integral methods for comuter erformance analysis. Information Processing Letters, 32(1):7 13, [10] N. J. Gunther. Guerrilla Caacity Planning. Sringer-Verlag, Heidelberg, Germany, [11] N. J. Gunther. Unification of Amdahl s law, LogP and other erformance models for message-assing architectures. In PDCS 2005, International Conference on Parallel and Distributed Comuting Systems, ages , November 14 16, 2005, Phoenix, AZ, [12] J. Holtman and N. J. Gunther. Getting in the zone for successful scalability. Acceted for ublication in the Proc. CMG 08 Conference, Las Vegas, Nevada, 7 12 December, [13] W. Ware. The ultimate comuter. IEEE Sectrum, 9:89 91, March [14] H. Sutter. Break Amdahl s law! hc-high-erformance-comuting/ , Jan [15] D. Gross and C. Harris. Fundamentals of Queueing Theory. Wiley, [16] D. A. Reed and R. M. Fujimoto. Multicomuter Networks: Message Based 17

18 Parallel Processing. MIT Press, Boston, Mass., [17] M. Ajmone-Marsan, G. Balbo, and G. Conte. Performance Models of Multirocessor Systems. MIT Press, Boston, Mass., [18] R. R. Muntz and J. W. Wong. Asymtotic roerties of closed queueing network models. In Proc. Ann. Princeton Conf. on Inf. Sci. and Sys., ages , [19] J. C. S. Lui and R. R. Muntz. Comuting bounds on steady state availability of reairable comuter systems. Journal of the ACM, 41(4): , [20] J. Zahorjan, K. C. Sevcik, D. L. Eager, and B. Galler. Balanced job bound analysis of queueing networks. Comm. ACM, 25(2): , Feb [21] F. P. Brooks. The Mythical Man-Month. Addison-Wesley, Reading, MA, anniversary edition, [22] B. D. Bunday and R. E. Scraton. The G/M/r machine interference model. Euroean Journal of Oerations Research, 4: ,

Analysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel

Analysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel Performance Analysis Introduction Analysis of execution time for arallel algorithm to dertmine if it is worth the effort to code and debug in arallel Understanding barriers to high erformance and redict

More information

John Weatherwax. Analysis of Parallel Depth First Search Algorithms

John Weatherwax. Analysis of Parallel Depth First Search Algorithms Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel

More information

Positive decomposition of transfer functions with multiple poles

Positive decomposition of transfer functions with multiple poles Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.

More information

Characteristics of Beam-Based Flexure Modules

Characteristics of Beam-Based Flexure Modules Shorya Awtar e-mail: shorya@mit.edu Alexander H. Slocum e-mail: slocum@mit.edu Precision Engineering Research Grou, Massachusetts Institute of Technology, Cambridge, MA 039 Edi Sevincer Omega Advanced

More information

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms

More information

Understanding and Using Availability

Understanding and Using Availability Understanding and Using Availability Jorge Luis Romeu, Ph.D. ASQ CQE/CRE, & Senior Member Email: romeu@cortland.edu htt://myrofile.cos.com/romeu ASQ/RD Webinar Series Noviembre 5, J. L. Romeu - Consultant

More information

Linear diophantine equations for discrete tomography

Linear diophantine equations for discrete tomography Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

Feedback-error control

Feedback-error control Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition A Qualitative Event-based Aroach to Multile Fault Diagnosis in Continuous Systems using Structural Model Decomosition Matthew J. Daigle a,,, Anibal Bregon b,, Xenofon Koutsoukos c, Gautam Biswas c, Belarmino

More information

Understanding and Using Availability

Understanding and Using Availability Understanding and Using Availability Jorge Luis Romeu, Ph.D. ASQ CQE/CRE, & Senior Member C. Stat Fellow, Royal Statistical Society Past Director, Region II (NY & PA) Director: Juarez Lincoln Marti Int

More information

A generalization of Amdahl's law and relative conditions of parallelism

A generalization of Amdahl's law and relative conditions of parallelism A generalization of Amdahl's law and relative conditions of arallelism Author: Gianluca Argentini, New Technologies and Models, Riello Grou, Legnago (VR), Italy. E-mail: gianluca.argentini@riellogrou.com

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO) Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment

More information

State Estimation with ARMarkov Models

State Estimation with ARMarkov Models Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,

More information

Statics and dynamics: some elementary concepts

Statics and dynamics: some elementary concepts 1 Statics and dynamics: some elementary concets Dynamics is the study of the movement through time of variables such as heartbeat, temerature, secies oulation, voltage, roduction, emloyment, rices and

More information

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS #A13 INTEGERS 14 (014) ON THE LEAST SIGNIFICANT ADIC DIGITS OF CERTAIN LUCAS NUMBERS Tamás Lengyel Deartment of Mathematics, Occidental College, Los Angeles, California lengyel@oxy.edu Received: 6/13/13,

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

A Parallel Algorithm for Minimization of Finite Automata

A Parallel Algorithm for Minimization of Finite Automata A Parallel Algorithm for Minimization of Finite Automata B. Ravikumar X. Xiong Deartment of Comuter Science University of Rhode Island Kingston, RI 02881 E-mail: fravi,xiongg@cs.uri.edu Abstract In this

More information

CMSC 425: Lecture 4 Geometry and Geometric Programming

CMSC 425: Lecture 4 Geometry and Geometric Programming CMSC 425: Lecture 4 Geometry and Geometric Programming Geometry for Game Programming and Grahics: For the next few lectures, we will discuss some of the basic elements of geometry. There are many areas

More information

Multi-Operation Multi-Machine Scheduling

Multi-Operation Multi-Machine Scheduling Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job

More information

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces Abstract and Alied Analysis Volume 2012, Article ID 264103, 11 ages doi:10.1155/2012/264103 Research Article An iterative Algorithm for Hemicontractive Maings in Banach Saces Youli Yu, 1 Zhitao Wu, 2 and

More information

8 STOCHASTIC PROCESSES

8 STOCHASTIC PROCESSES 8 STOCHASTIC PROCESSES The word stochastic is derived from the Greek στoχαστικoς, meaning to aim at a target. Stochastic rocesses involve state which changes in a random way. A Markov rocess is a articular

More information

Computer arithmetic. Intensive Computation. Annalisa Massini 2017/2018

Computer arithmetic. Intensive Computation. Annalisa Massini 2017/2018 Comuter arithmetic Intensive Comutation Annalisa Massini 7/8 Intensive Comutation - 7/8 References Comuter Architecture - A Quantitative Aroach Hennessy Patterson Aendix J Intensive Comutation - 7/8 3

More information

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu

More information

Hidden Predictors: A Factor Analysis Primer

Hidden Predictors: A Factor Analysis Primer Hidden Predictors: A Factor Analysis Primer Ryan C Sanchez Western Washington University Factor Analysis is a owerful statistical method in the modern research sychologist s toolbag When used roerly, factor

More information

A randomized sorting algorithm on the BSP model

A randomized sorting algorithm on the BSP model A randomized sorting algorithm on the BSP model Alexandros V. Gerbessiotis a, Constantinos J. Siniolakis b a CS Deartment, New Jersey Institute of Technology, Newark, NJ 07102, USA b The American College

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

On Code Design for Simultaneous Energy and Information Transfer

On Code Design for Simultaneous Energy and Information Transfer On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Email: anshoo@nus.edu.sg Mehul Motani Electrical and Comuter

More information

Speedup for Multi-Level Parallel Computing

Speedup for Multi-Level Parallel Computing Seedu for Multi-Level Parallel Comuting Shaniang Tang, Bu-Sung Lee,2, Bingsheng He School of Comuter Engineering 2 Service Platform Lab Nanyang Technological University HP Labs Singaore {stang5, ebslee,

More information

Periodic scheduling 05/06/

Periodic scheduling 05/06/ Periodic scheduling T T or eriodic scheduling, the best that we can do is to design an algorithm which will always find a schedule if one exists. A scheduler is defined to be otimal iff it will find a

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

Intrinsic Approximation on Cantor-like Sets, a Problem of Mahler

Intrinsic Approximation on Cantor-like Sets, a Problem of Mahler Intrinsic Aroximation on Cantor-like Sets, a Problem of Mahler Ryan Broderick, Lior Fishman, Asaf Reich and Barak Weiss July 200 Abstract In 984, Kurt Mahler osed the following fundamental question: How

More information

1-way quantum finite automata: strengths, weaknesses and generalizations

1-way quantum finite automata: strengths, weaknesses and generalizations 1-way quantum finite automata: strengths, weaknesses and generalizations arxiv:quant-h/9802062v3 30 Se 1998 Andris Ambainis UC Berkeley Abstract Rūsiņš Freivalds University of Latvia We study 1-way quantum

More information

Calculation of MTTF values with Markov Models for Safety Instrumented Systems

Calculation of MTTF values with Markov Models for Safety Instrumented Systems 7th WEA International Conference on APPLIE COMPUTE CIENCE, Venice, Italy, November -3, 7 3 Calculation of MTTF values with Markov Models for afety Instrumented ystems BÖCÖK J., UGLJEA E., MACHMU. University

More information

DUAL NUMBERS, WEIGHTED QUIVERS, AND EXTENDED SOMOS AND GALE-ROBINSON SEQUENCES. To Alexandre Alexandrovich Kirillov on his 3 4 th anniversary

DUAL NUMBERS, WEIGHTED QUIVERS, AND EXTENDED SOMOS AND GALE-ROBINSON SEQUENCES. To Alexandre Alexandrovich Kirillov on his 3 4 th anniversary DUAL NUMBERS, WEIGHTED QUIVERS, AND EXTENDED SOMOS AND GALE-ROBINSON SEQUENCES VALENTIN OVSIENKO AND SERGE TABACHNIKOV Abstract. We investigate a general method that allows one to construct new integer

More information

CSE 599d - Quantum Computing When Quantum Computers Fall Apart

CSE 599d - Quantum Computing When Quantum Computers Fall Apart CSE 599d - Quantum Comuting When Quantum Comuters Fall Aart Dave Bacon Deartment of Comuter Science & Engineering, University of Washington In this lecture we are going to begin discussing what haens to

More information

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests 009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract

More information

A Social Welfare Optimal Sequential Allocation Procedure

A Social Welfare Optimal Sequential Allocation Procedure A Social Welfare Otimal Sequential Allocation Procedure Thomas Kalinowsi Universität Rostoc, Germany Nina Narodytsa and Toby Walsh NICTA and UNSW, Australia May 2, 201 Abstract We consider a simle sequential

More information

Analysis of M/M/n/K Queue with Multiple Priorities

Analysis of M/M/n/K Queue with Multiple Priorities Analysis of M/M/n/K Queue with Multile Priorities Coyright, Sanjay K. Bose For a P-riority system, class P of highest riority Indeendent, Poisson arrival rocesses for each class with i as average arrival

More information

On the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1

On the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 On the Relationshi Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 Imad Antonios antoniosi1@southernct.edu CS Deartment MO117 Southern Connecticut State University 501 Crescent St.

More information

Analysis of some entrance probabilities for killed birth-death processes

Analysis of some entrance probabilities for killed birth-death processes Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

An Overview of Witt Vectors

An Overview of Witt Vectors An Overview of Witt Vectors Daniel Finkel December 7, 2007 Abstract This aer offers a brief overview of the basics of Witt vectors. As an alication, we summarize work of Bartolo and Falcone to rove that

More information

COMMUNICATION BETWEEN SHAREHOLDERS 1

COMMUNICATION BETWEEN SHAREHOLDERS 1 COMMUNICATION BTWN SHARHOLDRS 1 A B. O A : A D Lemma B.1. U to µ Z r 2 σ2 Z + σ2 X 2r ω 2 an additive constant that does not deend on a or θ, the agents ayoffs can be written as: 2r rθa ω2 + θ µ Y rcov

More information

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca

More information

A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS. 1. Abstract

A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS. 1. Abstract A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS CASEY BRUCK 1. Abstract The goal of this aer is to rovide a concise way for undergraduate mathematics students to learn about how rime numbers behave

More information

On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm

On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm Gabriel Noriega, José Restreo, Víctor Guzmán, Maribel Giménez and José Aller Universidad Simón Bolívar Valle de Sartenejas,

More information

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their

More information

An Analysis of TCP over Random Access Satellite Links

An Analysis of TCP over Random Access Satellite Links An Analysis of over Random Access Satellite Links Chunmei Liu and Eytan Modiano Massachusetts Institute of Technology Cambridge, MA 0239 Email: mayliu, modiano@mit.edu Abstract This aer analyzes the erformance

More information

RUN-TO-RUN CONTROL AND PERFORMANCE MONITORING OF OVERLAY IN SEMICONDUCTOR MANUFACTURING. 3 Department of Chemical Engineering

RUN-TO-RUN CONTROL AND PERFORMANCE MONITORING OF OVERLAY IN SEMICONDUCTOR MANUFACTURING. 3 Department of Chemical Engineering Coyright 2002 IFAC 15th Triennial World Congress, Barcelona, Sain RUN-TO-RUN CONTROL AND PERFORMANCE MONITORING OF OVERLAY IN SEMICONDUCTOR MANUFACTURING C.A. Bode 1, B.S. Ko 2, and T.F. Edgar 3 1 Advanced

More information

Parallelism and Locality in Priority Queues. A. Ranade S. Cheng E. Deprit J. Jones S. Shih. University of California. Berkeley, CA 94720

Parallelism and Locality in Priority Queues. A. Ranade S. Cheng E. Deprit J. Jones S. Shih. University of California. Berkeley, CA 94720 Parallelism and Locality in Priority Queues A. Ranade S. Cheng E. Derit J. Jones S. Shih Comuter Science Division University of California Berkeley, CA 94720 Abstract We exlore two ways of incororating

More information

Use of Transformations and the Repeated Statement in PROC GLM in SAS Ed Stanek

Use of Transformations and the Repeated Statement in PROC GLM in SAS Ed Stanek Use of Transformations and the Reeated Statement in PROC GLM in SAS Ed Stanek Introduction We describe how the Reeated Statement in PROC GLM in SAS transforms the data to rovide tests of hyotheses of interest.

More information

SYMPLECTIC STRUCTURES: AT THE INTERFACE OF ANALYSIS, GEOMETRY, AND TOPOLOGY

SYMPLECTIC STRUCTURES: AT THE INTERFACE OF ANALYSIS, GEOMETRY, AND TOPOLOGY SYMPLECTIC STRUCTURES: AT THE INTERFACE OF ANALYSIS, GEOMETRY, AND TOPOLOGY FEDERICA PASQUOTTO 1. Descrition of the roosed research 1.1. Introduction. Symlectic structures made their first aearance in

More information

STABILITY ANALYSIS AND CONTROL OF STOCHASTIC DYNAMIC SYSTEMS USING POLYNOMIAL CHAOS. A Dissertation JAMES ROBERT FISHER

STABILITY ANALYSIS AND CONTROL OF STOCHASTIC DYNAMIC SYSTEMS USING POLYNOMIAL CHAOS. A Dissertation JAMES ROBERT FISHER STABILITY ANALYSIS AND CONTROL OF STOCHASTIC DYNAMIC SYSTEMS USING POLYNOMIAL CHAOS A Dissertation by JAMES ROBERT FISHER Submitted to the Office of Graduate Studies of Texas A&M University in artial fulfillment

More information

STABILITY ANALYSIS TOOL FOR TUNING UNCONSTRAINED DECENTRALIZED MODEL PREDICTIVE CONTROLLERS

STABILITY ANALYSIS TOOL FOR TUNING UNCONSTRAINED DECENTRALIZED MODEL PREDICTIVE CONTROLLERS STABILITY ANALYSIS TOOL FOR TUNING UNCONSTRAINED DECENTRALIZED MODEL PREDICTIVE CONTROLLERS Massimo Vaccarini Sauro Longhi M. Reza Katebi D.I.I.G.A., Università Politecnica delle Marche, Ancona, Italy

More information

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle]

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle] Chater 5 Model checking, verification of CTL One must verify or exel... doubts, and convert them into the certainty of YES or NO. [Thomas Carlyle] 5. The verification setting Page 66 We introduce linear

More information

Session 5: Review of Classical Astrodynamics

Session 5: Review of Classical Astrodynamics Session 5: Review of Classical Astrodynamics In revious lectures we described in detail the rocess to find the otimal secific imulse for a articular situation. Among the mission requirements that serve

More information

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems

Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various Families of R n Norms and Some Open Problems Int. J. Oen Problems Comt. Math., Vol. 3, No. 2, June 2010 ISSN 1998-6262; Coyright c ICSRS Publication, 2010 www.i-csrs.org Various Proofs for the Decrease Monotonicity of the Schatten s Power Norm, Various

More information

Developing A Deterioration Probabilistic Model for Rail Wear

Developing A Deterioration Probabilistic Model for Rail Wear International Journal of Traffic and Transortation Engineering 2012, 1(2): 13-18 DOI: 10.5923/j.ijtte.20120102.02 Develoing A Deterioration Probabilistic Model for Rail Wear Jabbar-Ali Zakeri *, Shahrbanoo

More information

δ(xy) = φ(x)δ(y) + y p δ(x). (1)

δ(xy) = φ(x)δ(y) + y p δ(x). (1) LECTURE II: δ-rings Fix a rime. In this lecture, we discuss some asects of the theory of δ-rings. This theory rovides a good language to talk about rings with a lift of Frobenius modulo. Some of the material

More information

A Bound on the Error of Cross Validation Using the Approximation and Estimation Rates, with Consequences for the Training-Test Split

A Bound on the Error of Cross Validation Using the Approximation and Estimation Rates, with Consequences for the Training-Test Split A Bound on the Error of Cross Validation Using the Aroximation and Estimation Rates, with Consequences for the Training-Test Slit Michael Kearns AT&T Bell Laboratories Murray Hill, NJ 7974 mkearns@research.att.com

More information

2-D Analysis for Iterative Learning Controller for Discrete-Time Systems With Variable Initial Conditions Yong FANG 1, and Tommy W. S.

2-D Analysis for Iterative Learning Controller for Discrete-Time Systems With Variable Initial Conditions Yong FANG 1, and Tommy W. S. -D Analysis for Iterative Learning Controller for Discrete-ime Systems With Variable Initial Conditions Yong FANG, and ommy W. S. Chow Abstract In this aer, an iterative learning controller alying to linear

More information

POINTS ON CONICS MODULO p

POINTS ON CONICS MODULO p POINTS ON CONICS MODULO TEAM 2: JONGMIN BAEK, ANAND DEOPURKAR, AND KATHERINE REDFIELD Abstract. We comute the number of integer oints on conics modulo, where is an odd rime. We extend our results to conics

More information

#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS

#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS #A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS Ramy F. Taki ElDin Physics and Engineering Mathematics Deartment, Faculty of Engineering, Ain Shams University, Cairo, Egyt

More information

MODULAR LINEAR TRANSVERSE FLUX RELUCTANCE MOTORS

MODULAR LINEAR TRANSVERSE FLUX RELUCTANCE MOTORS MODULAR LINEAR TRANSVERSE FLUX RELUCTANCE MOTORS Dan-Cristian POPA, Vasile IANCU, Loránd SZABÓ, Deartment of Electrical Machines, Technical University of Cluj-Naoca RO-400020 Cluj-Naoca, Romania; e-mail:

More information

Cryptanalysis of Pseudorandom Generators

Cryptanalysis of Pseudorandom Generators CSE 206A: Lattice Algorithms and Alications Fall 2017 Crytanalysis of Pseudorandom Generators Instructor: Daniele Micciancio UCSD CSE As a motivating alication for the study of lattice in crytograhy we

More information

Optimism, Delay and (In)Efficiency in a Stochastic Model of Bargaining

Optimism, Delay and (In)Efficiency in a Stochastic Model of Bargaining Otimism, Delay and In)Efficiency in a Stochastic Model of Bargaining Juan Ortner Boston University Setember 10, 2012 Abstract I study a bilateral bargaining game in which the size of the surlus follows

More information

An Ant Colony Optimization Approach to the Probabilistic Traveling Salesman Problem

An Ant Colony Optimization Approach to the Probabilistic Traveling Salesman Problem An Ant Colony Otimization Aroach to the Probabilistic Traveling Salesman Problem Leonora Bianchi 1, Luca Maria Gambardella 1, and Marco Dorigo 2 1 IDSIA, Strada Cantonale Galleria 2, CH-6928 Manno, Switzerland

More information

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction GOOD MODELS FOR CUBIC SURFACES ANDREAS-STEPHAN ELSENHANS Abstract. This article describes an algorithm for finding a model of a hyersurface with small coefficients. It is shown that the aroach works in

More information

HENSEL S LEMMA KEITH CONRAD

HENSEL S LEMMA KEITH CONRAD HENSEL S LEMMA KEITH CONRAD 1. Introduction In the -adic integers, congruences are aroximations: for a and b in Z, a b mod n is the same as a b 1/ n. Turning information modulo one ower of into similar

More information

Outline. EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Simple Error Detection Coding

Outline. EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Simple Error Detection Coding Outline EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Error detection using arity Hamming code for error detection/correction Linear Feedback Shift

More information

Using the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process

Using the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process Using the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process P. Mantalos a1, K. Mattheou b, A. Karagrigoriou b a.deartment of Statistics University of Lund

More information

ISOSCELES TRIANGLES IN Q 3. Matt Noble Department of Mathematics, Middle Georgia State University, Macon, Georgia

ISOSCELES TRIANGLES IN Q 3. Matt Noble Department of Mathematics, Middle Georgia State University, Macon, Georgia #A9 INTEGERS 18 (2018) ISOSCELES TRIANGLES IN Q Matt Noble Deartment of Mathematics, Middle Georgia State University, Macon, Georgia matthew.noble@mga.edu Received: 7/2/17, Acceted: 2//18, Published: 2/19/18

More information

Scaling Multiple Point Statistics for Non-Stationary Geostatistical Modeling

Scaling Multiple Point Statistics for Non-Stationary Geostatistical Modeling Scaling Multile Point Statistics or Non-Stationary Geostatistical Modeling Julián M. Ortiz, Steven Lyster and Clayton V. Deutsch Centre or Comutational Geostatistics Deartment o Civil & Environmental Engineering

More information

Estimation of component redundancy in optimal age maintenance

Estimation of component redundancy in optimal age maintenance EURO MAINTENANCE 2012, Belgrade 14-16 May 2012 Proceedings of the 21 st International Congress on Maintenance and Asset Management Estimation of comonent redundancy in otimal age maintenance Jorge ioa

More information

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning TNN-2009-P-1186.R2 1 Uncorrelated Multilinear Princial Comonent Analysis for Unsuervised Multilinear Subsace Learning Haiing Lu, K. N. Plataniotis and A. N. Venetsanooulos The Edward S. Rogers Sr. Deartment

More information

A Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression

A Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Journal of Modern Alied Statistical Methods Volume Issue Article 7 --03 A Comarison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Ghadban Khalaf King Khalid University, Saudi

More information

On split sample and randomized confidence intervals for binomial proportions

On split sample and randomized confidence intervals for binomial proportions On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have

More information

Research Article Controllability of Linear Discrete-Time Systems with Both Delayed States and Delayed Inputs

Research Article Controllability of Linear Discrete-Time Systems with Both Delayed States and Delayed Inputs Abstract and Alied Analysis Volume 203 Article ID 97546 5 ages htt://dxdoiorg/055/203/97546 Research Article Controllability of Linear Discrete-Time Systems with Both Delayed States and Delayed Inuts Hong

More information

Modeling and Estimation of Full-Chip Leakage Current Considering Within-Die Correlation

Modeling and Estimation of Full-Chip Leakage Current Considering Within-Die Correlation 6.3 Modeling and Estimation of Full-Chi Leaage Current Considering Within-Die Correlation Khaled R. eloue, Navid Azizi, Farid N. Najm Deartment of ECE, University of Toronto,Toronto, Ontario, Canada {haled,nazizi,najm}@eecg.utoronto.ca

More information

Paper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation

Paper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation Paer C Exact Volume Balance Versus Exact Mass Balance in Comositional Reservoir Simulation Submitted to Comutational Geosciences, December 2005. Exact Volume Balance Versus Exact Mass Balance in Comositional

More information

Fault Tolerant Quantum Computing Robert Rogers, Thomas Sylwester, Abe Pauls

Fault Tolerant Quantum Computing Robert Rogers, Thomas Sylwester, Abe Pauls CIS 410/510, Introduction to Quantum Information Theory Due: June 8th, 2016 Sring 2016, University of Oregon Date: June 7, 2016 Fault Tolerant Quantum Comuting Robert Rogers, Thomas Sylwester, Abe Pauls

More information

Improvement on the Decay of Crossing Numbers

Improvement on the Decay of Crossing Numbers Grahs and Combinatorics 2013) 29:365 371 DOI 10.1007/s00373-012-1137-3 ORIGINAL PAPER Imrovement on the Decay of Crossing Numbers Jakub Černý Jan Kynčl Géza Tóth Received: 24 Aril 2007 / Revised: 1 November

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell October 25, 2009 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

Positivity, local smoothing and Harnack inequalities for very fast diffusion equations

Positivity, local smoothing and Harnack inequalities for very fast diffusion equations Positivity, local smoothing and Harnack inequalities for very fast diffusion equations Dedicated to Luis Caffarelli for his ucoming 60 th birthday Matteo Bonforte a, b and Juan Luis Vázquez a, c Abstract

More information

Cubic Sieve Congruence of the Discrete Logarithm Problem, and Fractional Part Sequences

Cubic Sieve Congruence of the Discrete Logarithm Problem, and Fractional Part Sequences Cubic Sieve Congruence of the Discrete Logarithm Problem, and Fractional Part Sequences Srinivas Vivek University of Luxembourg, Luxembourg C. E. Veni Madhavan Deartment of Comuter Science and Automation,

More information

LINEAR SYSTEMS WITH POLYNOMIAL UNCERTAINTY STRUCTURE: STABILITY MARGINS AND CONTROL

LINEAR SYSTEMS WITH POLYNOMIAL UNCERTAINTY STRUCTURE: STABILITY MARGINS AND CONTROL LINEAR SYSTEMS WITH POLYNOMIAL UNCERTAINTY STRUCTURE: STABILITY MARGINS AND CONTROL Mohammad Bozorg Deatment of Mechanical Engineering University of Yazd P. O. Box 89195-741 Yazd Iran Fax: +98-351-750110

More information

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging 1 Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie, Member, IEEE, arxiv:1401.0340v3 [cs.it] 27 Ar 2014

More information

Estimating Time-Series Models

Estimating Time-Series Models Estimating ime-series Models he Box-Jenkins methodology for tting a model to a scalar time series fx t g consists of ve stes:. Decide on the order of di erencing d that is needed to roduce a stationary

More information

Online homotopy algorithm for a generalization of the LASSO

Online homotopy algorithm for a generalization of the LASSO This article has been acceted for ublication in a future issue of this journal, but has not been fully edited. Content may change rior to final ublication. Online homotoy algorithm for a generalization

More information

Asymptotically Optimal Simulation Allocation under Dependent Sampling

Asymptotically Optimal Simulation Allocation under Dependent Sampling Asymtotically Otimal Simulation Allocation under Deendent Samling Xiaoing Xiong The Robert H. Smith School of Business, University of Maryland, College Park, MD 20742-1815, USA, xiaoingx@yahoo.com Sandee

More information

End-to-End Delay Minimization in Thermally Constrained Distributed Systems

End-to-End Delay Minimization in Thermally Constrained Distributed Systems End-to-End Delay Minimization in Thermally Constrained Distributed Systems Pratyush Kumar, Lothar Thiele Comuter Engineering and Networks Laboratory (TIK) ETH Zürich, Switzerland {ratyush.kumar, lothar.thiele}@tik.ee.ethz.ch

More information

Research Note REGRESSION ANALYSIS IN MARKOV CHAIN * A. Y. ALAMUTI AND M. R. MESHKANI **

Research Note REGRESSION ANALYSIS IN MARKOV CHAIN * A. Y. ALAMUTI AND M. R. MESHKANI ** Iranian Journal of Science & Technology, Transaction A, Vol 3, No A3 Printed in The Islamic Reublic of Iran, 26 Shiraz University Research Note REGRESSION ANALYSIS IN MARKOV HAIN * A Y ALAMUTI AND M R

More information

The non-stochastic multi-armed bandit problem

The non-stochastic multi-armed bandit problem Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at

More information

Quantitative estimates of propagation of chaos for stochastic systems with W 1, kernels

Quantitative estimates of propagation of chaos for stochastic systems with W 1, kernels oname manuscrit o. will be inserted by the editor) Quantitative estimates of roagation of chaos for stochastic systems with W, kernels Pierre-Emmanuel Jabin Zhenfu Wang Received: date / Acceted: date Abstract

More information