jitter Abstract Output jitter the variation in the inter-completion times of successive jobs of the same

Size: px
Start display at page:

Download "jitter Abstract Output jitter the variation in the inter-completion times of successive jobs of the same"

Transcription

1 Schedulng perodc task systems to mnmze output jtter Sanjoy Baruah Gorgo Buttazzo y Sergey Gornsky z Guseppe Lpar y Abstract Output jtter the varaton n the nter-completon tmes of successve jobs of the same task s studed n the context of the preemptve unprocessor schedulng of perodc real-tme tasks. A formal quanttatve model for output jtter s proposed. A lst of propertes that are desrable n any jtter-mnmzaton schedule s enumerated. Algorthms are presented for generatng such schedules, and bounds proved for the maxmum jtter n schedules generated by these algorthms. Keywords. Schedulng: unprocessor, preemptve perodc tasks output jtter. 1 Introducton In many real-tme control applcatons, perodc actvtes represent the major computatonal demand on the system. Such perodc actvtes typcally arse from sensory data acquston, low-level servong, control loops, acton plannng, and system montorng, whch need to be cyclcally executed at specc rates (derved from the applcaton requrements). These perodc actvtes are often formally modelled as perodc tasks: each perodc task T =(e p) scharacterzed by two parameters { an executon requrement e and a perod p { wth the nterpretaton that T generates an nnte sequence of jobs arrvng at tme-nstants 0 p 2p 3p : : :, respectvely, wth the job arrvng at tme-nstant k p needng to execute for e tme unts over the nterval [k p (k +1)p) (.e., we assume that each job has a deadlne p tme unts after ts arrval tme). In ths paper, we restrct our attenton to the unprocessor, preemptve, schedulng of systems of such tasks by unprocessor, we mean that all the jobs generated by all the tasks n the system are to execute on a sngle shared processor by preemptve, we mean that a job executng on the shared processor may be nterrupted at any nstant n tme, and ts executon resumed later, wth no cost or penalty. A schedule for a system of perodc tasks speces whch task executes on the shared processor at each nstant n tme. Let ; = ft 1 T 2 ::: T n g denote a system of n perodc tasks T =(e p ) for 1 n. Wth respect to a partcular schedule S for;,thecompleton tme c (k) of the k'th job of T s the earlest tme-nstant k p such that T has executed for e tme unts n S over the nterval [k p c (k) ). Schedule S s a correct schedule for ; f and only f for all T 2 ; and for all nteger k 0, c (k) (k +1)p.e., the completon tme of the k'th job of T s no larger than the assocated deadlne. Department of Computer Scence, The Unversty of North Carolna, Chapel Hll, NC 27599{3175, USA. Emal: baruah@cs.unc.edu y Scuola Superore S. Anna, Va Carducc, 40, Psa, Italy. Emal: fgorgo, lparg@sssup.t z Department of Computer Scence, The Unversty of Texas, Austn, TX 78712, USA. Emal: gornsky@cs.utexas.edu 1

2 The prmary goal of a schedulng algorthm s to generate correct schedules whenever possble. That s, a schedulng algorthm for schedulng systems of perodc tasks should accept as nput a system ; of perodc tasks, and attempt to generate as output a correct schedule S for ;. (In ths respect, the Earlest Deadlne Frst schedulng algorthm (EDF) [5, 9] s known to be optmal, n the sense that f there exsts a correct schedule for a system ; of perodc tasks, then t s guaranteed that EDF wll generate a correct schedule for ;.) Assumng that ths prmary goal of meetng all deadlnes can be met, we may n general desre that our schedulng algorthms be able to optmze certan secondary objectves. One such secondary objectve s the focus of ths paper: mnmzng output jtter. Output jtter refers to the varaton between the nter-completon tmes of successve jobs of the same task. More formally, wth respect to a partcular (correct) schedule for ; let p (mn) p (max) def = mn k0 def = max k0 n c (k+1) n c (k+1) ; c (k) ; c (k).e., p (mn) and p (max) denote the mnmum and maxmum separaton between successve completons of T,1 n. An output jtter-free (henceforth, smply \jtter-free") schedule s one n whch p (mn) = p (max) (n whch case t follows that p (mn) = p (max) = p ). Schedules that have as ther secondary objectve the mnmzaton of output jtter attempt to mnmze the varaton of p (mn) and p (max) from p. In a sense, schedulng to mnmze output jtter n perodc task systems s a non-ssue. Assumng that the system under study s feasble (.e., there exst correct schedules for the system), aschedule can be rendered vrtually jtter-free by postponng executon of the last unts of each job's executon requrement untl ts deadlne, for some very small! 0 (equvalently, by postponng notcaton of the completon of a job untl ts deadlne f t completes executon pror to ts deadlne, t s smply buered for the tme remanng untl ts deadlne s reached). Indeed, ths s the approach adopted n [6] to handle the jtter problem n packet-swtched networks each packet s held back n a specal buer by eachnternal node of the network for the maxmum possble delay nthatnode. From a real-tme systems pont ofvew, however, such a soluton s far from deal. As stated above, EDF s an optmal schedulng algorthm for schedulng systems of perodc real-tme tasks. In addton to ths desrable property of optmalty, EDF possesses many other features that render t partcularly sutable for schedulng unprocessor real-tme systems. These nclude: lowschedulng overhead a reasonable bound on the number of preemptons (no more than twce the number of jobs) satsfyng the ntegral boundary constrant (IBC) f all the executon requrements and perods are ntegers, then all processor preemptons must take place at nteger boundares only etc. We would lke any jtter-mnmzaton algorthm to possess these propertes as well below, we attempt to dentfy some of the propertes that we would lke any jtter-mnmzaton algorthm to satsfy (n addton to the prmary goal of meetng all deadlnes): 1. The scheme s not allowed to buer a job that s ready to execute. That s, f a job s ready to be released at tme t, we are NOT allowed to delay ts release to some tme after t. 2. Perhaps equvalently, we wll not allow for nserted dle tme n the schedule f there s some job ready to execute n the system, we are NOT allowed to dle the processor. 3. The scheme s not allowed to buer a job that has completed. That s, f a job has completed executon at tme t, we are NOT allowed to hold back from notfyng the external world of 2 o o

3 ths fact. 4. The schedule generated should satsfy the ntegral boundary constrant (IBC). 5. The scheme should not requre too many preemptons. We would lke to see no ncrease n the number of preemptons over current schedulng schemes, n the worst-case. That s, the bound on the number of preemptons proved for the Earlest Deadlne Frst schedulng algorthm (EDF) [9] the total number of preemptons s no more than twce the number of jobs should contnue to hold. 6. The on-lne schedulng overhead should contnue to be as small as n the case of EDF. Informally speakng, what we would lke to do s contnue to use EDF as our schedulng algorthm, but to perhaps change the \control" nformaton that we use n dong ths schedulng. To ths end, we descrbe n ths paper a transformaton on a system of perodc tasks such that the schedule generated by EDF on the transformed system has better jtter performance than the schedule generated by EDF on the orgnal system, whle contnung to be a correct schedule for the orgnal system. Related work. Consderable research has prevously been performed on the topc of jtter n a dynamc-schedulng context. For example, Ln and Herkert [8] have studed a dstance constraned task model n whch the derence between any two consecutve nshng tmes of the same task s requred to be bounded by a speced value. Ths approach attempts to mnmze the outgong jtter caused by the scheduler. Stankovc and D Natale [11] have studed jtter-mnmzaton n the context of provdng end-to-end tmng guarantees n dstrbuted real-tme systems. Researchers n network communcatons have also devoted consderable attenton to the phenomenon of jtter. They have consdered the problem of provdng determnstc tmng guarantees n crcut-swtched networks where the transmsson of a vdeo stream takes a route consstng of several hops, each of whch may add to the jtter. Jtter-control schemes to mnmze the end-to-end jtter n such networks have been proposed, for example by Ferrar [7] and Verma, Zhang, and Ferrar [6]. The research presented n [1, 3, 4, 12] addresses the problem of accomodatng nput jtter.e., schedulng systems of perodc tasks n whch the ready-tmes of jobs cannot be predcted exactly a pror, but are subject to tmng uncertantes at runtme. Organzaton. The remander of ths paper s organzed as follows. In Secton 2, we formally state our model of perodc tasks, and provde a quanttatve denton of output jtter. In Secton 3, we descrbe a polynomal-tme algorthm for transformng a perodc task system, such that the transformed task system can be scheduled by EDF to generate a schedule that exhbts sgncantly less jtter than would be exhbted by EDF-schedulng the orgnal task system. In Secton 4, we descrbe a pseudopolynomal-tme algorthm for transformng a perodc task system nto another that can be scheduled by EDF wth less jtter although ths algorthm s computatonally more expensve than the one n Secton 3, t can n general guarantee better jtter behavour. We have mplemented both our jtter-control algorthms, and have performed experments testng ther eectveness we descrbe these results n Secton 5. In Secton 6, we llustrate our technques by tracng ther behavour on some smple perodc task systems. 2 System model As stated n the ntroducton, we are concerned here wth the problem of mnmzng output jtter n EDF-generated schedules of systems of perodc tasks. We wll assume that each perodc task T 3

4 s characterzed by ajtter tolerance factor, wth the nterpretaton that tasks wth large are more tolerant to jtter, n addton to the executon requrement e and the perod p. Let;denote def a perodc task system consstng of n tasks T 1 T 2 ::: T n.let = e =p, and def = P n =1. It has been proved [9] that a necessary an sucent condton for EDF to generate a correct schedule for ; s that be at most one. Wth respect to a partcular schedule for ;, let p (mn) and p (max) denote the mnmum and maxmum separaton between successve completons of T,1n. Thequantty AbsJtter(T ) def =max p (max) ; p p ; p (mn) s dened to be the (absolute) jtter of task T observe that ths can also be computed as max k0 j(c (k+1) ; c (k) ) ; p j.e.,absjtter(t ) measures the maxmum varaton of the ntercompleton tme from the task perod. In the remander of ths paper, we wll make use of the followng nequalty: AbsJtter(T ) maxfc (k) ; k p g ; mnfc (k) ; k p g (1) k0 k0.e., the derence between the largest response tme 1 and the smallest response tme of a job of T s an upper bound on the varaton of ntercomplton tmes of jobs of T. (In general, ths bound need not be tght: consder, for example, a task T wth perod 5 and executo requrement 1,and = 19, and c (k) =5k +5forall k 4. Whle ; k p g;mn k0 fc (k) ; k p g equals 5 ; 1 = 4.) The (absolute) jtter of task system ; s dened to be largest absolute jtter of any task n ;: aschedule n whch c (0) =1,c (1) =7,c (2) =13,c (3) AbsJtter(T ) for ths schedule s 1, the bound max k0 fc (k) The weghted jtter of T s dened to be The weghted jtter of ; s dened to be AbsJtter(;) def = max fabsjtter(t )g T 2; WtdJtter(T ) def = AbsJtter(T ) : WtdJtter(;) def =maxf AbsJtter(T ) g : (2) T 2; The goal of ths research s to devse schedulng algorthms that accept as nput perodc task systems ;, and generate schedules for ; that meet all deadlnes and attempt to mnmze WtdJtter(;). The general model descrbed above can represent several nterestng forms of jtter whch may be of relevance to the applcaton system desgner. For nstance, f = 1 for all, then WtdJtter s the same as AbsJtter. Settng = p for all n Equaton 2, we obtan the noton of relatve jtter the jtter of a task s measured as a fracton of ts perod (as an example, a schedule wth a relatve jtter of 30 % guarantees that the ntercompleton tmes between successve jobs of T s at least 0:7p, and at most 1:3p,forall). Smlarly, we can model systems n whch only a subset of the tasks are jtter-senstve by settng the jtter-tolerance factor for the other (non jtter-senstve) tasks to nnty. 1 The response tme of the k'th job of T s dened to be the derence between the completon tme of the job c (k) and ts release tme k p. 4

5 3 Jtter control n polynomal tme 3.1 Computng jtter bounds Snce a job of T completes no sooner than e tme unts after ts ready tme and no later than ts deadlne n any correct schedule for ;, t s easly seen that e and 2p ; e are \quck-and-drty" bounds on the maxmum and mnmum ntercompleton tmes respectvely of T.e., the jtter for task T s clearly (p ; e ) equvalently, WtdJtter(;) max T 2; f p ; e g =maxf e ( 1 ; 1)g (3) T 2; Wth a lttle more eort, we can compute tghter bounds for the case when { the system utlzaton { s less than 1: Theorem 1 In an EDF-generated schedule for ;, the separaton between the completon tmes of successve jobsoftaskt les n the nterval [p ; e (= ; 1) p + e (= ; 1)].e., AbsJtter(T ) e ( ; 1) equvalently, WtdJtter(T ) e ( ; 1). Proof: Consder a scenaro where the k'th job of T arrves at tme t o and completes at the earlest possble tme, the (k + 1)'th job completes at the latest possble tme, and the (k +2)'th job completes, once agan, at the earlest possble tme. The completon tme of the k'th job s at least t o + e. Let the completon tme of the (k + 1)'th job be t 1, and let [t o +2p ; ` t 1 ] denote the longest contguous nterval precedng t 1 durng whch the processor only executes jobs wth deadlnes at or before t o +2p. Snce all such jobshave arrval-tmes t o +2p ; `, and deadlnes t o +2p, and they all complete by t 1, t follows that t 1 ; (t o +2p ; `) s at most `. Hence, t 1 t o +2p ; `(1 ; ) snce ` s at least p, ths mples that t 1 t o +2p ; p (1 ; ) : The completon tme of the (k + 2)'th job s, once agan, at least t o +2p + e. The maxmum ntercompleton tme, as dened by the derence between the completon tmes of the (k + 1)'th and k'th jobs, s thus at most t o +2p ; p (1 ; ) ; (t o + e ) = 2p ; p (1 ; ) ; e = p (1 + ) ; e = p + p ; e = p + e ( p e ; 1) = p + e ( ; 1) Smlarly, the mnmum ntercompleton tme, as dened by the derence between the completon tmes of the (k + 2)th and the (k + 1)'th jobs, s at least t o +2p + e ; (t o +2p ; p (1 ; )) 5

6 = e + p (1 ; ) = p ; (p ; e ) = p ; e ( p e ; 1) = p ; e ( ; 1) Thus, gven a system ; of perodc tasks, we can determne an upper bound on ts WtdJtter by the followng relatonshp: e WtdJtter(;) max ( ; 1) (4) T 2; Is ths bound tght? Unfortunately, no. Tghter bounds can be obtaned by actually smulatng EDF on the gven task-set, or by makng use of the actual parameters the executon requrements and perods of all the tasks n the system. However, such approaches take exponental (or at least pseudo-polynomal) tme as opposed to the computaton suggested by the above relatonshp, whch takes tme lnear n the number of tasks. 3.2 Jtter-mnmzaton n polynomal tme In attemptng to decrease AbsJtter(;), we can transform task system ; by ncreasng the processorshare reserved for the use of each task T to (whle ensurng that P n =1 1 holds). Havng done so, we cannow \assgn" a new deadlne to the job of T, released at k p,tobekp +(e = ) snce, ths assgned deadlne wll be no larger than the job's actual deadlne at (k +1)p. These assgned deadlnes are the ones that wll be used by EDF s schedulng ;, and t s guaranteed that each job wll complete by ts new assgned deadlne: ths follows from the fact [5] that EDF s an optmal unprocessor schedulng algorthm n the sense that f there s a correct schedule for a set of jobs, then EDF wll generate a correct schedule for ths set of jobs. The exstence of a correct schedule for the transformed system follows from the observaton that the task T can be assgned a fracton of the processor durng each tme-slot over the nterval [kp kp + e ), therefore, T s assgned the processor for a total of e = e slots. Indeed, f the nput parameters the e 's and the p 's are ntegers, t s easly seen that the \assgned" deadlne of the k'th job of T can n fact be set equal to bk p +(e = )c. Wth ths new assgned deadlne, t can be shown (usng technques vrtually dentcal to the ones used n the proof of Theorem 1) that the mnmum and maxmum separaton between successve jobs s now bounded by p e (= ; 1) (5) where def = P n =1.We therefore conclude the followng: Theorem 2 Let ; be a perodc task system wth processor-shares ( 1 2 ::: n ). The maxmum output jtter of ; s bounded as follows: WtdJtter(;) max f e ( ; 1)g (6) T 2; In order to mnmze the weghted jtter experenced by ;,we wll attempt to choose the processor-shares ( 1 2 ::: n )such that max T 2;f(e = ) (= ; 1)g s mnmzed. Of course, 6

7 any such choce wll have to preserve 1 (the total processor-shares allocated does not exceed unty) and for each (the processor-share allocated s at least as much as the amount the task needs). In addton, the resultng schedule should satsfy the lst of desrable propertes for jtter-control schemes enumerated n the Introducton. The above formulaton represents the problem as an optmzaton problem. We wll now prove some propertes about optmal solutons. But rst, a denton: Denton 1 Processor shares ( 1 2 ::: n ) are dened to be optmal processor shares for task system ;=ft 1 T 2 ::: T n g f and only f the followng condtons hold: P1: For each, 1 n,. P2: 1, where def = P n =1. P3: For any processor shares ( ::: 0 n) such that 1. for each, 1 n, 0,and , where 0 def = P n =1 0, t s the case that max f(e = ) (= ; 1)g max (e = ) ( 0 = 0 ; 1) T 2; Lemma 1 If ( 1 2 ::: n ) are optmal processor shares for ;, then so are ( 1 = 2 = : : : n =), where def = P n j=1 j. (Observe that P n j=1 ( j =) equals one.) Proof: Let ^ def def =( =), and let ^ = P n =1 ^. We wll prove belowthat(^ 1 ^ 2 ::: ^ n ) satses the propertes enumerated above for optmal processor shares. T 2; P1: Snce 1, t follows that ^ =( =). Therefore, ^. P2: ^ =( P n =1 ^ )=( P n =1 ( =)) = (( P n =1 )) =(=) =1. P3: Snce ^ = 1, t follows that (^=^ )=(1=^ )=(1=( =)) = =. Therefore, for all, from whch tfollows that max T 2; e ( ^ ; 1) = e ( ; 1) ^ ( e ( ^ ^ ; 1) ) e =max ( ; 1) T 2; Recall that our goal was to determne optmal processor shares, and hence to be able to generate EDF schedules whch mnmze output jtter. Lemma 1 above suggests that we can narrow our search to only those processor shares that sum to one.e., we need only look for ( 1 2 ::: n ) for whch P n =1 =1. But suppose an addtonal goal was to determne optmal processor shares n whch the cumulatve processor shares assgned to all the tasks.e., the quantty were as small as possblle. Lemma 2 below suggests how we can obtan such optmal processor shares from one n whch = 1. 7

8 Lemma 2 Let ( 1 2 ::: n ) be optmal processor shares, wth P n =1 =1.Let def =max n =1 ( = ). Then ( 1 2 ::: n ) are optmal processor shares. Proof: Let ^ def def =( ), and let ^ = P n =1 ^. We wll prove belowthat(^ 1 ^ 2 ::: ^ n ) satses the propertes enumerated above for optmal processor shares. P1: Snce, t follows that ^ =( ). Therefore, ^. P2: Observe rst that 1. Now, ^ =( P n =1 ^ )=( P n =1 ( )) = ( ( P n =1 )) =. Therefore ^ 1. P3: (^=^ )=(=( )) = (1= )==. Therefore, for all, from whch tfollows that max T 2; e ( ^ ; 1) = e ( ; 1) ^ ( e ( ^ ^ ; 1) ) e =max ( ; 1) T 2; Lemma 1 suggests that we can look for an optmal soluton wth the processor-shares assgned the varous tasks summng to one. Should we be lookng for an optmal soluton that uses the mnmum possble processor-shares, Lemma 2 tells us how we can get to such a soluton from a soluton n whch the processor-shares assgned equals one. We now descrbe how we can use the above results to determne processor-shares for a gven task system ;, such that these processor shares yeld the best jtter bounds obtanable usng our method. Suppose that WtdJtter(;) J when the processor-shares are ( 1 2 ::: n ). By Equaton 6, we have for all, 1 n, e ( 1 1 ; 1) J J +1 e e e + J : Snce we also requre,wehave max e e + J : (7) Hence, to determne whether a gven J can be a value for WtdJtter(;), we can compute each accordng to Equaton 7 above, and ensure that P n =1 does not exceed one. If the 's sum to at most one, then ths value of WtdJtter s achevable f not, then a jtter bound of J cannot be acheved usng ths partcular method. We can use a bnary search to determne the tghtest jtter bound obtanable by ths method. Let J nt denote the ntal jtter bound yelded by Inequalty 4 for the system: 1. J hgh J nt 2. J low 0 3. repeat 4. J md (J hgh + J low )=2 8

9 5. Compute the shares,1n, accordng to Equaton f ( P n =1 1) J hgh J md 7. else J low J md 8. untl (J hgh ; J low thres) (where thres s dened to be the degree of accuracy desred.) 4 Jtter control n pseudopolynomal tme A further generalzaton to the perodc task model has each task T =(e d p) characterzed by a relatve deadlne d p n addton to the perod p and the executon requrement e. The ssue of feasblty determnaton for a system of such tasks has been studed [2] for bounded-utlzaton task systems (systems where the ratos e=p of the executon-requrement to perod of all the tasks sum to no more than a constant strctly less than one), ths can be ecently done n tme pseudopolynomal n the sze of the problem nstance. Consder perodc task system ; = ft =(e p )g n =1. If we assgn a relatve deadlne d = e + J to each task T, and the resultng task system ; 0 = ft 0 =(e e + J p )g n =1 s feasble, then the maxmum separaton between successve completons of T 0 s at most p + J whle the mnmum separaton s at least p ; J, for each 1 n. Hence to obtan a run-tme schedule of ; wth a maxmum weghted jtter of J, t suces to Step 1: determne whether ; 0 s feasble, Step 2: f so, then schedule ; 0 rather than ; at run-tme. Usng the method of [2], Step 1 can be done n tme O(log n 1 ; n max fp ; d g) : (8) =1 Ths bound s pseudo-polynomal n the sze of the problem nstance. However, we expect to apply jtter-mnmzaton prmarly to systems wth a relatvely small value of (ntutvely speakng, ths s because systems wth a large value of are qute constraned and we have less freedom to modfy parameters to obtan better jtter behavor) consequently, wewould expect the tme bound of (8) to be qute reasonable n practce. For example, a of 0:9 would permt a processor utlzaton of 90 %, yet allow feasblty-analyss to be completed n tme proportonal to nne tmes the largest perod, multpled by the bnary logarthm of the number of tasks. In general, the jtter-mnmzaton procedure of ths secton yelds a tghter bound than the procedure n Secton 3.2, n the sense that the smallest jtter bound whch ths method can guarantee s smaller than the smallest bound obtanable usng the processor-share method of Secton 3.2. The downsde s that, due to the pseudo-polynomalty of (8), the tme-complexty s no longer polynomal. A reasonable approach n practce s to rst execute the method of Secton 3.2, and use the bound ^J thus obtaned as an upper bound for performng bnary search between 0 and ^J to determne the smallest J whch passes the pseudo-polynomal feasblty test of ths secton. A note on mplementaton. The feasblty testfrom[2]essentally conssts of smulatng the behavor of EDF on the perodc task system startng at tme zero, and termnatng when ether () a deadlne s mssed, at whch pont the system s known to be nfeasble, or () the processor s dled, whch would mply that the system s feasble. (See [2] for a proof of correctness.) The bound of (8) follows from the fact (proved n [2]) that one of these two events a mssed deadlne or an dle slot must occur wthn the rst 1; maxn =1 fp ; d g tme unts. 9

10 Implementng ths jtter-mnmzaton procedure therefore reduces to mplementng EDF for perodc task systems, for whch very ecent technques are known [10]. A note on ntal osets. The feasblty of a perodc task system n whch each task s characterzed by an executon requrement and a perod (no relatve deadlnes) s unaected by the presence of ntal osets {.e., f each taskt s characterzed by an addtonal oset parameter a wth the nterpretaton that the k'th job of T arrves at tme a + k p, and must receve servce by a +(k +1) p, for all nteger k 0. The jtter-mnmzaton procedure of Secton 3.2 enjoys the same property jtter analyss s unaected by whether tasks have ntal osets or not. Wth respect to the jtter mnmzaton procedure of ths secton, a slghtly weaker statement can be made. If the method outlned above guarantees a jtter bound of J, then ths jtter bound s obtanable even n the presence of osets. However, a system wth osets can sometmes be scheduled wth far smaller jtter than can be shown usng ths method. Attemptng to ncorporate osets nto the methodology of ths secton nvolves feasblty-analyss of perodc task systems n whch each task s characterzed by an oset, an executon requrement, a relatve deadlne, and a perod unfortunately, ths feasblty-analyss problem has been shown [2] to be co-np-complete n the strong sense, ndcatng that we are unlkely to be able to perform t n pseudopolynomal tme. We have therefore not attempted to take advantage of ntal osets to reduce jtter even when these osets are present. In related ongong research, we are however attemptng to mnmze jtter n task-systems of the model n [9] (where each taskscharacterzed by executon requrements and perods only), by ntroducng osets to ad n jtter-control when applcaton system semantcs would permt us to do so. The basc dea s to use the methodology proposed n ths paper to obtan an ntal jtter bound, and then to use heurstcs to search for phasngs whch may further reduce the jtter. Although such an approach would lkely prove ntractable n the worst case and may sometmes result n no mprovement n jtter-behavour, we expect that substantal mprovement may be obtaned on average. 5 Expermental evaluaton Gven a system ; of perodc tasks that are to be scheduled usng EDF, Equaton 3 represents a nave bound on the jtter experenced by the system WtdJtter(;) max T 2;f e ( 1 ; 1)g. In Theorem 1 (Equaton 4), we derved a somewhat tghter bound for systems where the utlzaton s strctly less than one WtdJtter(;) max T 2;f e ( ; 1)g. Then n Sectons 3 and 4, we presented algorthms for generatng EDF-schedules that exhbt lower jtter than mpled by these bounds the technque n Secton 3 takes tme polynomal n the representaton of ;, whle the one n Secton 4 takes pseudopolynomal tme but may n general result n schedules wth better jtter behavour. We have conducted a seres of experments to evaluate the eectveness of our jtter-mnmzaton schemes. We have mplemented both our jtter-mnmzaton schemes and have used them to mnmze the relatve jtter 2 of randomly-generated systems of perodc tasks some of the results are tabulated n Fgures 1{5. In each gure, the system jtter WtdJtter(;) s plotted as a functon of the total system utlzaton (also known as system load). For each value of the system load, we generated 900 task sets. Each task set was generated by randomly choosng the tasks' computaton 2 Recall that the relatve jtter of a perodc task measures ts jtter as a fracton of ts perod, and s obtaned by settng = p. 10

11 tmes as ntegers between 1 and 10, and then randomly choosng the perods such that the total system load be approxmately equal to the desred load. For each set we calculated the bound obtaned by Equaton 4 (the lne labelled \Bound" n the gures) then we appled both the polynomal-tme transformaton of Secton 3 (labelled \Method 1" n the gures) and the pseudopolynomal-tme transformaton of Secton 4 (labelled \Method 2" n the gures). Only average values are depcted n the gures. (For each pont we also calculated the 90% condence nterval these are not shown n the gures, but were small enough to conrm the valdty of our results.) The ve gures Fgures 1{5 represent the results of ve derent sets of experments: Number of tasks: 5/5 Bound Method 1 Method 2 Rel. Jtter Load Fgure 1: Fve tasks { mnmze jtter of the entre task set Fgure 1: ; conssts of ve tasks, and the goal s to mnmze the relatve jtter over the complete task set. Ths s obtaned by settng = p for all. Fgure 2: ; conssts of ten tasks, and the goal s to mnmze the relatve jtter over the complete task set. Ths s obtaned by settng = p for all. Fgure 3: ; conssts of ten tasks, and the goal s to mnmze the relatve jtter of just one of the tasks. Ths s obtaned by settng 1 = p 1,and = 1 for all >1. Fgure 4: ; conssts of ten tasks, and the goal s to mnmze the relatve jtters of three of the tasks. Ths s obtaned by settng = p for =1 2 3, and = 1 for all >3. Fgure 5: ; conssts of ten tasks, and the goal s to mnmze the relatve jtters of ve ofthe tasks. Ths s obtaned by settng = p for =1 2 ::: 5, and = 1 for all >5. Among the conclusons we are able to draw from our smulatons: For low system loads, EDF schedules wth reasonably low relatve jtter can be obtaned by both Method 1 and Method 2. As system load ncreases, Method 2 generally outperforms Method 1. If the relatve jtters of all tasks s to be mnmzed (as n Fgures 1 and 2), the methods presented n ths paper are not very eectve. In fact, f the system load s low, the results 11

12 1 0.8 Number of tasks: 10/10 Bound Method 1 Method 2 Rel. Jtter Load Fgure 2: Ten tasks { mnmze jtter of the entre task set Number of tasks: 1/10 Bound Method 1 Method 2 Rel. Jtter Load Fgure 3: Ten tasks { mnmze jtter of one task 12

13 1 0.8 Number of tasks: 3/10 Bound Method 1 Method 2 Rel. Jtter Load Fgure 4: Ten tasks { mnmze jtter of three tasks Number of tasks: 5/10 Bound Method 1 Method 2 Rel. Jtter Load Fgure 5: Ten tasks { mnmze jtter of ve tasks 13

14 obtaned by both methods are very close to the ntal bound (whch salreadylow) f the system load s hgh, Method 2 can obtan some mprovement over the ntal bound however the jtter remans hgh. Ths s not surprsng ntutvely speakng, mnmzng the jtter of an entre task system s a hghly-constraned optmzaton problem. Indeed, decreasng the jtter of some task can sgncantly ncrease the jtter of other tasks n the system. As Fgures 3{5 llustrate, jtter mnmzaton s more eectve when just a few of the tasks are jtter-senstve. Intutvely speakng, ths s because, once the prmary goal of meetng deadlnes have been satsed, all the freedom remanng n the schedule can be devoted to mnmzng the jtters of a few tasks. Especally n the case n whch we wsh to mnmze the jtter of only one task, Method 2 seems to provde a very low relatve jtter (Fgure 3) regardless of the overall system load. Ths s a potentally useful lesson n applcaton system desgn jtter mnmzaton s a precous resource, whch should be attempted only upon those perodc tasks that really need t. Although not llustrated by Fgures 1{5, another noteworthy observaton s that t s, n general, easer to mnmze relatve jtter of tasks wth low utlzaton. Once agan, ths lends tself to an ntutve explanaton: ncreasng the processor share of T k tmes (.e., k ), whle keepng every other task's processor shares the same, decreases WtdJtter(T )by a factor of k. Snce spare capacty (.e., 1 ; ) can be used to ncrease the processor shares of lowerutlzaton tasks by a larger factor than t can be used to ncrease the processor shares of hgher-utlzaton tasks, t s more ecent to use the excess capacty to nuence the jtter of lower-utlzaton tasks. 6 Examples In ths secton, we llustrate the technques presented n Sectons 3 and 4 by means of some examples. Example 1 Consder a system of three tasks: ; = ft 1 =(2 10) T 2 =(3 15) T 3 =(2 20)g wth 1 = 2 = 3 = 1 observe that 1 = 2 =0:2, 3 =0:1, and =0:5. Theorem 1 yelds a jtter bound WtdJtter(;) = 8. Ths s the ntal value for J hgh the ntal value for J low s zero. Observe that, snce 1 = 2 = 3 = 1, the nteger boundary constrant (IBC) guarantees that all jtter values wll be ntegers. Hence we may use nteger bnary search n ths example J hgh J md,and J low all need take onnteger values only. (Equvalently, the quantty thres n the pseudocode at the end of Secton 3.2 can be set equal to one.) Choosng J md =(8+0)=2 = 4 and pluggng nto Equaton 7, we determne that 1 =0:333, 2 =0:428, and 3 =0:333. Snce > 1, ths s an nfeasble soluton. Hence, J low s set equal to 4. Next, choosng J md =(8+4)=2 = 6 and applyng the same technques yelds ( )= (0:250 0:333 0:250), whch s a feasble soluton snce 0: : : Hence, J hgh s set equal to 6. Next, choosng J md =(6+4)=2 = 5 and applyng the same technques yelds ( )= (0:286 0:375 0:286), whch s once agan a feasble soluton snce 0: : : Hence, J hgh s set equal to 5. Next, we compute J md =(5+4)=2 =4. Butwe've already checked that ths results n an nfeasble soluton hence, the tghtest jtter bound obtanable usng the processor-share method s 5. 14

15 We now try usng the pseudo-polynomal tme test of Secton 4, performng bnary search wth ntal \hgh" of 5 and ntal \low" of 0. The test fals for J =(5+0)=2 = 2, and succeeds for J =(5+2)=2 = 3. Snce (3 + 2)=2 = 2 and we've already determned that the test fals for J =2, we can stop now, havng determned that the tghtest bound obtanable usng ths method s J = 3. Example 2 Consder a system of three tasks: ; = ft 1 =(2 9) T 2 =(4 15) T 3 =(2 12)g wth 1 = 2 = 3 = 1. Usng essentally the same approach asabove, Theorem 1 yelds an ntal jtter bound of 7 the polynomal-tme method of Secton 3.2 renes ths to 6 and the pseudopolynomaltme method of Secton 4 further mproves ths to 4. Example 3 Consder a system of three tasks: ; = ft 1 =(2 10) T 2 =(3 15) T 3 = (20 200)g wth 1 = 2 = 3 = 1. Once agan gong through the same steps as above, Theorem 1 yelds an ntal jtter bound of 80 the polynomal-tme method of Secton 3.2 renes ths to 14 and the pseudopolynomal-tme method of Secton 4 further mproves ths to 9. Example 4 Consder the same system of tasks ; = ft 1 =(2 10) T 2 =(3 15) T 3 =(2 20)g. Suppose that task T 3 s the only jtter-senstve task. Ths can be modelled by settng 1 = 2 = 1, and 3 = 1. Several knds of questons can now beasked for example: Is t possble to schedule ; such that the maxmum jtter for task T 3 never exceeds 3? Ths s equvalent to determnng a 3 such that e 3 ( 1 3 ; 1) 3 2( 1 3 ; 1) Snce assgnng a share of 2=5 to T 3 does not cause the total processor-share assgned to exceed 1, we conclude that t s possble to schedule ; such that T 3 's maxmum jtter does not exceed 3. What s the mnmum value for the maxmum jtter of task T 3? Snce the largest value that 3 can have s1:0 ; (0:2+0:2), ths s equvalent to computng e 3 ( 1 0:6 3 ; 1) = 2 10 ; 6 6 = 1:33 Snce the schedule wll obey the IBC, ths mples that the maxmum jtter of task T 3 wll be at most 1.e., the ntercompleton tme between consecutve jobs of task T 3 wll be ether 19, 20, or 21. Usng the method of Secton 4, we are reduced to determnng the smallest J such that the perodc task system f( ) ( ) (2 2+ J 20)g s feasble. Snce the utlzaton of ths perodc system s 0:5, we expect the pseudo-polynomal test to be qute ecent. 15

16 Ths turns out to ndeed be the case, and the smallest J satsfyng the desred condton s J = 0 (.e., the system f( ) ( ) (2 2 20)g s feasble). Ths permts us to conclude that the system can be scheduled such that T 3 suers absolutely no jtter.e., the ntercompleton tme between consecutve jobs of task T 3 wll always be exactly Conclusons As observed n the Introducton, output-jtter mnmzaton s not really an ssue n the schedulngtheoretcal sense, n that notcaton of the completon of jobs can always be postponed untl the jobs' deadlnes. In ths paper, we have decded that such an artcal soluton s unacceptable from a practcal pont of vew, and have enumerated a seres of condtons we beleve should be satsed by any reasonable jtter-mnmzaton scheme. Wthn the context of these condtons, we have proposed twoschedulng algorthms for mnmzng jtter. One scheme s polynomal-tme whle the other provdes better jtter bounds but takes tme pseudo-polynomal n the sze of the problem nstance however, even the pseudo-polynomal algorthm s very ecently mplementable. In practce, a reasonable approach to jtter mnmzaton seems to be to use the polynomal-tme algorthm to ecently obtan an upper bound on jtter, and then use the pseudo-polynomal algorthm to further mprove ths bound. We have mplemented and tested our schemes the algorthms are smple and easy to code, and the run-tme behavor s very satsfactory. References [1] N. Audsley, A. Burns, M. Rchardson, K. Tndell, and A. Wellngs. Applyng new schedulng theory to statc prorty preemptve schedulng. Software Engneerng Journal, 8(5):285{292, [2] S. Baruah, R. Howell, and L. Roser. Algorthms and complexty concernng the preemptve schedulng of perodc, real-tme tasks on one processor. Real-Tme Systems: The Internatonal Journal of Tme- Crtcal Computng, 2:301{324, [3] Sanjoy Baruah, Dej Chen, and Aloysus Mok. Jtter concerns n perodc task systems. In Proceedngs of the Eghteenth Real-Tme Systems Symposum, pages 68{77, San Francsco, CA, December IEEE Computer Socety Press. [4] A. Burns, M. Ncholson, K. Tndell, and N. Zhang. Allocatng and schedulng hard real-tme tasks on a pont-to-pont dstrbuted system. In Proceedngs of the Workshop on Parallel and Dstrbuted Real-Tme Systems, pages 11{20, Aprl [5] M. Dertouzos. Control robotcs : the procedural control of physcal processors. In Proceedngs of the IFIP Congress, pages 807{813, [6] D.Verma, H. Zhang, and Domenco Ferrar. Delay jtter control for real-tme communcaton n a packet swtchng network. In Proceedngs of the IEEE Conference on Communcatons Software: Communcatons for Dstrbuted Applcatons and Systems, pages 35{43, Chapel Hll, NC, [7] D. Ferrar. Clent requrements for real-tme communcatons servces. IEEE Communcatons, 28(11), November [8] K.J. Ln and A. Herkert. Jtter control n tme-trggered systems. In Proceedngs of the 29th Hawa Internatonal Conference on System Scences, Mau, Hawa, January [9] C. Lu and J. Layland. Schedulng algorthms for multprogrammng n a hard real-tme envronment. Journal of the ACM, 20(1):46{61, [10] A. Mok. Task management technques for enforcng ED schedulng on a perodc task set. In Proc. 5th IEEE Workshop on Real-Tme Software and Operatng Systems, pages 42{46, Washngton D.C., May

17 [11] J. Stankovc and M. DNatale. Dynamc end-to-end guarantees n dstrbuted real-tme systems. In Proceedngs of the Real-Tme Systems Symposum, San Juan, Puerto Rco, December [12] K. W. Tndell, A. Burns, and A. J. Wellngs. An extendble approach for analysng xed prorty hard real-tme tasks. Real-Tme Systems: The Internatonal Journal of Tme-Crtcal Computng, 6:133{151,

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling Real-Tme Systems Multprocessor schedulng Specfcaton Implementaton Verfcaton Multprocessor schedulng -- -- Global schedulng How are tasks assgned to processors? Statc assgnment The processor(s) used for

More information

Embedded Systems. 4. Aperiodic and Periodic Tasks

Embedded Systems. 4. Aperiodic and Periodic Tasks Embedded Systems 4. Aperodc and Perodc Tasks Lothar Thele 4-1 Contents of Course 1. Embedded Systems Introducton 2. Software Introducton 7. System Components 10. Models 3. Real-Tme Models 4. Perodc/Aperodc

More information

Improved Worst-Case Response-Time Calculations by Upper-Bound Conditions

Improved Worst-Case Response-Time Calculations by Upper-Bound Conditions Improved Worst-Case Response-Tme Calculatons by Upper-Bound Condtons Vctor Pollex, Steffen Kollmann, Karsten Albers and Frank Slomka Ulm Unversty Insttute of Embedded Systems/Real-Tme Systems {frstname.lastname}@un-ulm.de

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal

More information

Two Methods to Release a New Real-time Task

Two Methods to Release a New Real-time Task Two Methods to Release a New Real-tme Task Abstract Guangmng Qan 1, Xanghua Chen 2 College of Mathematcs and Computer Scence Hunan Normal Unversty Changsha, 410081, Chna qqyy@hunnu.edu.cn Gang Yao 3 Sebel

More information

EEL 6266 Power System Operation and Control. Chapter 3 Economic Dispatch Using Dynamic Programming

EEL 6266 Power System Operation and Control. Chapter 3 Economic Dispatch Using Dynamic Programming EEL 6266 Power System Operaton and Control Chapter 3 Economc Dspatch Usng Dynamc Programmng Pecewse Lnear Cost Functons Common practce many utltes prefer to represent ther generator cost functons as sngle-

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

Single-Facility Scheduling over Long Time Horizons by Logic-based Benders Decomposition

Single-Facility Scheduling over Long Time Horizons by Logic-based Benders Decomposition Sngle-Faclty Schedulng over Long Tme Horzons by Logc-based Benders Decomposton Elvn Coban and J. N. Hooker Tepper School of Busness, Carnege Mellon Unversty ecoban@andrew.cmu.edu, john@hooker.tepper.cmu.edu

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

Quantifying the Sub-optimality of Uniprocessor Fixed Priority Pre-emptive Scheduling for Sporadic Tasksets with Arbitrary Deadlines

Quantifying the Sub-optimality of Uniprocessor Fixed Priority Pre-emptive Scheduling for Sporadic Tasksets with Arbitrary Deadlines Quantfyng the Sub-optmalty of Unprocessor Fxed Prorty Pre-emptve Schedulng for Sporadc Tasksets wth Arbtrary Deadlnes Robert Davs, Sanjoy Baruah, Thomas Rothvoss, Alan Burns To cte ths verson: Robert Davs,

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

Chapter 11: Simple Linear Regression and Correlation

Chapter 11: Simple Linear Regression and Correlation Chapter 11: Smple Lnear Regresson and Correlaton 11-1 Emprcal Models 11-2 Smple Lnear Regresson 11-3 Propertes of the Least Squares Estmators 11-4 Hypothess Test n Smple Lnear Regresson 11-4.1 Use of t-tests

More information

Assortment Optimization under MNL

Assortment Optimization under MNL Assortment Optmzaton under MNL Haotan Song Aprl 30, 2017 1 Introducton The assortment optmzaton problem ams to fnd the revenue-maxmzng assortment of products to offer when the prces of products are fxed.

More information

A Robust Method for Calculating the Correlation Coefficient

A Robust Method for Calculating the Correlation Coefficient A Robust Method for Calculatng the Correlaton Coeffcent E.B. Nven and C. V. Deutsch Relatonshps between prmary and secondary data are frequently quantfed usng the correlaton coeffcent; however, the tradtonal

More information

O-line Temporary Tasks Assignment. Abstract. In this paper we consider the temporary tasks assignment

O-line Temporary Tasks Assignment. Abstract. In this paper we consider the temporary tasks assignment O-lne Temporary Tasks Assgnment Yoss Azar and Oded Regev Dept. of Computer Scence, Tel-Avv Unversty, Tel-Avv, 69978, Israel. azar@math.tau.ac.l??? Dept. of Computer Scence, Tel-Avv Unversty, Tel-Avv, 69978,

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003 Tornado and Luby Transform Codes Ashsh Khst 6.454 Presentaton October 22, 2003 Background: Erasure Channel Elas[956] studed the Erasure Channel β x x β β x 2 m x 2 k? Capacty of Noseless Erasure Channel

More information

Foundations of Arithmetic

Foundations of Arithmetic Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an

More information

Feature Selection: Part 1

Feature Selection: Part 1 CSE 546: Machne Learnng Lecture 5 Feature Selecton: Part 1 Instructor: Sham Kakade 1 Regresson n the hgh dmensonal settng How do we learn when the number of features d s greater than the sample sze n?

More information

Chapter 6. Supplemental Text Material

Chapter 6. Supplemental Text Material Chapter 6. Supplemental Text Materal S6-. actor Effect Estmates are Least Squares Estmates We have gven heurstc or ntutve explanatons of how the estmates of the factor effects are obtaned n the textboo.

More information

= z 20 z n. (k 20) + 4 z k = 4

= z 20 z n. (k 20) + 4 z k = 4 Problem Set #7 solutons 7.2.. (a Fnd the coeffcent of z k n (z + z 5 + z 6 + z 7 + 5, k 20. We use the known seres expanson ( n+l ( z l l z n below: (z + z 5 + z 6 + z 7 + 5 (z 5 ( + z + z 2 + z + 5 5

More information

Clock-Driven Scheduling (in-depth) Cyclic Schedules: General Structure

Clock-Driven Scheduling (in-depth) Cyclic Schedules: General Structure CPSC-663: Real-me Systems n-depth Precompute statc schedule o-lne e.g. at desgn tme: can aord expensve algorthms. Idle tmes can be used or aperodc jobs. Possble mplementaton: able-drven Schedulng table

More information

The Study of Teaching-learning-based Optimization Algorithm

The Study of Teaching-learning-based Optimization Algorithm Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute

More information

Lecture 4: November 17, Part 1 Single Buffer Management

Lecture 4: November 17, Part 1 Single Buffer Management Lecturer: Ad Rosén Algorthms for the anagement of Networs Fall 2003-2004 Lecture 4: November 7, 2003 Scrbe: Guy Grebla Part Sngle Buffer anagement In the prevous lecture we taled about the Combned Input

More information

On the Multicriteria Integer Network Flow Problem

On the Multicriteria Integer Network Flow Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 5, No 2 Sofa 2005 On the Multcrtera Integer Network Flow Problem Vassl Vasslev, Marana Nkolova, Maryana Vassleva Insttute of

More information

Kernel Methods and SVMs Extension

Kernel Methods and SVMs Extension Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general

More information

NP-Completeness : Proofs

NP-Completeness : Proofs NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem

More information

Endogenous timing in a mixed oligopoly consisting of a single public firm and foreign competitors. Abstract

Endogenous timing in a mixed oligopoly consisting of a single public firm and foreign competitors. Abstract Endogenous tmng n a mxed olgopoly consstng o a sngle publc rm and oregn compettors Yuanzhu Lu Chna Economcs and Management Academy, Central Unversty o Fnance and Economcs Abstract We nvestgate endogenous

More information

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there

More information

Lecture 12: Classification

Lecture 12: Classification Lecture : Classfcaton g Dscrmnant functons g The optmal Bayes classfer g Quadratc classfers g Eucldean and Mahalanobs metrcs g K Nearest Neghbor Classfers Intellgent Sensor Systems Rcardo Guterrez-Osuna

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

Improving the Sensitivity of Deadlines with a Specific Asynchronous Scenario for Harmonic Periodic Tasks scheduled by FP

Improving the Sensitivity of Deadlines with a Specific Asynchronous Scenario for Harmonic Periodic Tasks scheduled by FP Improvng the Senstvty of Deadlnes wth a Specfc Asynchronous Scenaro for Harmonc Perodc Tasks scheduled by FP P. Meumeu Yoms, Y. Sorel, D. de Rauglaudre AOSTE Project-team INRIA Pars-Rocquencourt Le Chesnay,

More information

COMPLETE BUFFER SHARING IN ATM NETWORKS UNDER BURSTY ARRIVALS

COMPLETE BUFFER SHARING IN ATM NETWORKS UNDER BURSTY ARRIVALS COMPLETE BUFFER SHARING WITH PUSHOUT THRESHOLDS IN ATM NETWORKS UNDER BURSTY ARRIVALS Ozgur Aras and Tugrul Dayar Abstract. Broadband Integrated Servces Dgtal Networks (B{ISDNs) are to support multple

More information

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals Smultaneous Optmzaton of Berth Allocaton, Quay Crane Assgnment and Quay Crane Schedulng Problems n Contaner Termnals Necat Aras, Yavuz Türkoğulları, Z. Caner Taşkın, Kuban Altınel Abstract In ths work,

More information

ILP models for the allocation of recurrent workloads upon heterogeneous multiprocessors

ILP models for the allocation of recurrent workloads upon heterogeneous multiprocessors Journal of Schedulng DOI 10.1007/s10951-018-0593-x ILP models for the allocaton of recurrent workloads upon heterogeneous multprocessors Sanjoy K. Baruah Vncenzo Bonfac Renato Brun Alberto Marchett-Spaccamela

More information

Some modelling aspects for the Matlab implementation of MMA

Some modelling aspects for the Matlab implementation of MMA Some modellng aspects for the Matlab mplementaton of MMA Krster Svanberg krlle@math.kth.se Optmzaton and Systems Theory Department of Mathematcs KTH, SE 10044 Stockholm September 2004 1. Consdered optmzaton

More information

Errors for Linear Systems

Errors for Linear Systems Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch

More information

Chapter Newton s Method

Chapter Newton s Method Chapter 9. Newton s Method After readng ths chapter, you should be able to:. Understand how Newton s method s dfferent from the Golden Secton Search method. Understand how Newton s method works 3. Solve

More information

Quantifying the Sub-optimality of Uniprocessor Fixed Priority Non-Pre-emptive Scheduling

Quantifying the Sub-optimality of Uniprocessor Fixed Priority Non-Pre-emptive Scheduling Quantfyng the Sub-optmalty of Unprocessor Fxed Prorty Non-Pre-emptve Schedulng Robert I Davs Real-Tme Systems Research Group, Department of Computer Scence, Unversty of York, York, UK robdavs@csyorkacuk

More information

Copyright 2017 by Taylor Enterprises, Inc., All Rights Reserved. Adjusted Control Limits for P Charts. Dr. Wayne A. Taylor

Copyright 2017 by Taylor Enterprises, Inc., All Rights Reserved. Adjusted Control Limits for P Charts. Dr. Wayne A. Taylor Taylor Enterprses, Inc. Control Lmts for P Charts Copyrght 2017 by Taylor Enterprses, Inc., All Rghts Reserved. Control Lmts for P Charts Dr. Wayne A. Taylor Abstract: P charts are used for count data

More information

Minimisation of the Average Response Time in a Cluster of Servers

Minimisation of the Average Response Time in a Cluster of Servers Mnmsaton of the Average Response Tme n a Cluster of Servers Valery Naumov Abstract: In ths paper, we consder task assgnment problem n a cluster of servers. We show that optmal statc task assgnment s tantamount

More information

Appendix B: Resampling Algorithms

Appendix B: Resampling Algorithms 407 Appendx B: Resamplng Algorthms A common problem of all partcle flters s the degeneracy of weghts, whch conssts of the unbounded ncrease of the varance of the mportance weghts ω [ ] of the partcles

More information

HMMT February 2016 February 20, 2016

HMMT February 2016 February 20, 2016 HMMT February 016 February 0, 016 Combnatorcs 1. For postve ntegers n, let S n be the set of ntegers x such that n dstnct lnes, no three concurrent, can dvde a plane nto x regons (for example, S = {3,

More information

Grover s Algorithm + Quantum Zeno Effect + Vaidman

Grover s Algorithm + Quantum Zeno Effect + Vaidman Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the

More information

Lecture 3. Ax x i a i. i i

Lecture 3. Ax x i a i. i i 18.409 The Behavor of Algorthms n Practce 2/14/2 Lecturer: Dan Spelman Lecture 3 Scrbe: Arvnd Sankar 1 Largest sngular value In order to bound the condton number, we need an upper bound on the largest

More information

multiprogrammed, hard real-time environments Giuseppe Lipari John Carpenter Sanjoy Baruah particular server.

multiprogrammed, hard real-time environments Giuseppe Lipari John Carpenter Sanjoy Baruah particular server. A framework for achevng nter-applcaton solaton n multprogrammed, hard real-tme envronments Guseppe Lpar John Carpenter Sanjoy Baruah Abstract A framework for schedulng a number of derent real-tme applcatons

More information

Lecture 4. Instructor: Haipeng Luo

Lecture 4. Instructor: Haipeng Luo Lecture 4 Instructor: Hapeng Luo In the followng lectures, we focus on the expert problem and study more adaptve algorthms. Although Hedge s proven to be worst-case optmal, one may wonder how well t would

More information

Economics 101. Lecture 4 - Equilibrium and Efficiency

Economics 101. Lecture 4 - Equilibrium and Efficiency Economcs 0 Lecture 4 - Equlbrum and Effcency Intro As dscussed n the prevous lecture, we wll now move from an envronment where we looed at consumers mang decsons n solaton to analyzng economes full of

More information

Real-Time Operating Systems M. 11. Real-Time: Periodic Task Scheduling

Real-Time Operating Systems M. 11. Real-Time: Periodic Task Scheduling Real-Tme Operatng Systems M 11. Real-Tme: Perodc Task Schedulng Notce The course materal ncludes sldes downloaded from:! http://codex.cs.yale.edu/av/os-book/! and! (sldes by Slberschatz, Galvn, and Gagne,

More information

AN EXTENDIBLE APPROACH FOR ANALYSING FIXED PRIORITY HARD REAL-TIME TASKS

AN EXTENDIBLE APPROACH FOR ANALYSING FIXED PRIORITY HARD REAL-TIME TASKS AN EXENDIBLE APPROACH FOR ANALYSING FIXED PRIORIY HARD REAL-IME ASKS K. W. ndell 1 Department of Computer Scence, Unversty of York, England YO1 5DD ABSRAC As the real-tme computng ndustry moves away from

More information

Global Sensitivity. Tuesday 20 th February, 2018

Global Sensitivity. Tuesday 20 th February, 2018 Global Senstvty Tuesday 2 th February, 28 ) Local Senstvty Most senstvty analyses [] are based on local estmates of senstvty, typcally by expandng the response n a Taylor seres about some specfc values

More information

Queueing Networks II Network Performance

Queueing Networks II Network Performance Queueng Networks II Network Performance Davd Tpper Assocate Professor Graduate Telecommuncatons and Networkng Program Unversty of Pttsburgh Sldes 6 Networks of Queues Many communcaton systems must be modeled

More information

FREQUENCY DISTRIBUTIONS Page 1 of The idea of a frequency distribution for sets of observations will be introduced,

FREQUENCY DISTRIBUTIONS Page 1 of The idea of a frequency distribution for sets of observations will be introduced, FREQUENCY DISTRIBUTIONS Page 1 of 6 I. Introducton 1. The dea of a frequency dstrbuton for sets of observatons wll be ntroduced, together wth some of the mechancs for constructng dstrbutons of data. Then

More information

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography CSc 6974 and ECSE 6966 Math. Tech. for Vson, Graphcs and Robotcs Lecture 21, Aprl 17, 2006 Estmatng A Plane Homography Overvew We contnue wth a dscusson of the major ssues, usng estmaton of plane projectve

More information

Finding Primitive Roots Pseudo-Deterministically

Finding Primitive Roots Pseudo-Deterministically Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

Snce h( q^; q) = hq ~ and h( p^ ; p) = hp, one can wrte ~ h hq hp = hq ~hp ~ (7) the uncertanty relaton for an arbtrary state. The states that mnmze t

Snce h( q^; q) = hq ~ and h( p^ ; p) = hp, one can wrte ~ h hq hp = hq ~hp ~ (7) the uncertanty relaton for an arbtrary state. The states that mnmze t 8.5: Many-body phenomena n condensed matter and atomc physcs Last moded: September, 003 Lecture. Squeezed States In ths lecture we shall contnue the dscusson of coherent states, focusng on ther propertes

More information

Generalized Linear Methods

Generalized Linear Methods Generalzed Lnear Methods 1 Introducton In the Ensemble Methods the general dea s that usng a combnaton of several weak learner one could make a better learner. More formally, assume that we have a set

More information

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers Psychology 282 Lecture #24 Outlne Regresson Dagnostcs: Outlers In an earler lecture we studed the statstcal assumptons underlyng the regresson model, ncludng the followng ponts: Formal statement of assumptons.

More information

CS : Algorithms and Uncertainty Lecture 17 Date: October 26, 2016

CS : Algorithms and Uncertainty Lecture 17 Date: October 26, 2016 CS 29-128: Algorthms and Uncertanty Lecture 17 Date: October 26, 2016 Instructor: Nkhl Bansal Scrbe: Mchael Denns 1 Introducton In ths lecture we wll be lookng nto the secretary problem, and an nterestng

More information

Global EDF Scheduling for Parallel Real-Time Tasks

Global EDF Scheduling for Parallel Real-Time Tasks Washngton Unversty n St. Lous Washngton Unversty Open Scholarshp Engneerng and Appled Scence Theses & Dssertatons Engneerng and Appled Scence Sprng 5-15-2014 Global EDF Schedulng for Parallel Real-Tme

More information

MMA and GCMMA two methods for nonlinear optimization

MMA and GCMMA two methods for nonlinear optimization MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons

More information

Last Time. Priority-based scheduling. Schedulable utilization Rate monotonic rule: Keep utilization below 69% Static priorities Dynamic priorities

Last Time. Priority-based scheduling. Schedulable utilization Rate monotonic rule: Keep utilization below 69% Static priorities Dynamic priorities Last Tme Prorty-based schedulng Statc prortes Dynamc prortes Schedulable utlzaton Rate monotonc rule: Keep utlzaton below 69% Today Response tme analyss Blockng terms Prorty nverson And solutons Release

More information

A LINEAR PROGRAM TO COMPARE MULTIPLE GROSS CREDIT LOSS FORECASTS. Dr. Derald E. Wentzien, Wesley College, (302) ,

A LINEAR PROGRAM TO COMPARE MULTIPLE GROSS CREDIT LOSS FORECASTS. Dr. Derald E. Wentzien, Wesley College, (302) , A LINEAR PROGRAM TO COMPARE MULTIPLE GROSS CREDIT LOSS FORECASTS Dr. Derald E. Wentzen, Wesley College, (302) 736-2574, wentzde@wesley.edu ABSTRACT A lnear programmng model s developed and used to compare

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

SINGLE EVENTS, TIME SERIES ANALYSIS, AND PLANETARY MOTION

SINGLE EVENTS, TIME SERIES ANALYSIS, AND PLANETARY MOTION SINGLE EVENTS, TIME SERIES ANALYSIS, AND PLANETARY MOTION John N. Harrs INTRODUCTION The advent of modern computng devces and ther applcaton to tme-seres analyses permts the nvestgaton of mathematcal and

More information

Lab 2e Thermal System Response and Effective Heat Transfer Coefficient

Lab 2e Thermal System Response and Effective Heat Transfer Coefficient 58:080 Expermental Engneerng 1 OBJECTIVE Lab 2e Thermal System Response and Effectve Heat Transfer Coeffcent Warnng: though the experment has educatonal objectves (to learn about bolng heat transfer, etc.),

More information

Limited Preemptive Scheduling for Real-Time Systems: a Survey

Limited Preemptive Scheduling for Real-Time Systems: a Survey Lmted Preemptve Schedulng for Real-Tme Systems: a Survey Gorgo C. Buttazzo, Fellow Member, IEEE, Marko Bertogna, Senor Member, IEEE, and Gang Yao Abstract The queston whether preemptve algorthms are better

More information

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of

More information

LOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin

LOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin Proceedngs of the 007 Wnter Smulaton Conference S G Henderson, B Bller, M-H Hseh, J Shortle, J D Tew, and R R Barton, eds LOW BIAS INTEGRATED PATH ESTIMATORS James M Calvn Department of Computer Scence

More information

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE Analytcal soluton s usually not possble when exctaton vares arbtrarly wth tme or f the system s nonlnear. Such problems can be solved by numercal tmesteppng

More information

Winter 2008 CS567 Stochastic Linear/Integer Programming Guest Lecturer: Xu, Huan

Winter 2008 CS567 Stochastic Linear/Integer Programming Guest Lecturer: Xu, Huan Wnter 2008 CS567 Stochastc Lnear/Integer Programmng Guest Lecturer: Xu, Huan Class 2: More Modelng Examples 1 Capacty Expanson Capacty expanson models optmal choces of the tmng and levels of nvestments

More information

Combining Constraint Programming and Integer Programming

Combining Constraint Programming and Integer Programming Combnng Constrant Programmng and Integer Programmng GLOBAL CONSTRAINT OPTIMIZATION COMPONENT Specal Purpose Algorthm mn c T x +(x- 0 ) x( + ()) =1 x( - ()) =1 FILTERING ALGORITHM COST-BASED FILTERING ALGORITHM

More information

find (x): given element x, return the canonical element of the set containing x;

find (x): given element x, return the canonical element of the set containing x; COS 43 Sprng, 009 Dsjont Set Unon Problem: Mantan a collecton of dsjont sets. Two operatons: fnd the set contanng a gven element; unte two sets nto one (destructvely). Approach: Canoncal element method:

More information

An Upper Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control

An Upper Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control An Upper Bound on SINR Threshold for Call Admsson Control n Multple-Class CDMA Systems wth Imperfect ower-control Mahmoud El-Sayes MacDonald, Dettwler and Assocates td. (MDA) Toronto, Canada melsayes@hotmal.com

More information

FUZZY GOAL PROGRAMMING VS ORDINARY FUZZY PROGRAMMING APPROACH FOR MULTI OBJECTIVE PROGRAMMING PROBLEM

FUZZY GOAL PROGRAMMING VS ORDINARY FUZZY PROGRAMMING APPROACH FOR MULTI OBJECTIVE PROGRAMMING PROBLEM Internatonal Conference on Ceramcs, Bkaner, Inda Internatonal Journal of Modern Physcs: Conference Seres Vol. 22 (2013) 757 761 World Scentfc Publshng Company DOI: 10.1142/S2010194513010982 FUZZY GOAL

More information

Lecture 4: Universal Hash Functions/Streaming Cont d

Lecture 4: Universal Hash Functions/Streaming Cont d CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected

More information

An identification algorithm of model kinetic parameters of the interfacial layer growth in fiber composites

An identification algorithm of model kinetic parameters of the interfacial layer growth in fiber composites IOP Conference Seres: Materals Scence and Engneerng PAPER OPE ACCESS An dentfcaton algorthm of model knetc parameters of the nterfacal layer growth n fber compostes o cte ths artcle: V Zubov et al 216

More information

CS 331 DESIGN AND ANALYSIS OF ALGORITHMS DYNAMIC PROGRAMMING. Dr. Daisy Tang

CS 331 DESIGN AND ANALYSIS OF ALGORITHMS DYNAMIC PROGRAMMING. Dr. Daisy Tang CS DESIGN ND NLYSIS OF LGORITHMS DYNMIC PROGRMMING Dr. Dasy Tang Dynamc Programmng Idea: Problems can be dvded nto stages Soluton s a sequence o decsons and the decson at the current stage s based on the

More information

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity LINEAR REGRESSION ANALYSIS MODULE IX Lecture - 30 Multcollnearty Dr. Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur 2 Remedes for multcollnearty Varous technques have

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

Improving the Quality of Control of Periodic Tasks Scheduled by FP with an Asynchronous Approach

Improving the Quality of Control of Periodic Tasks Scheduled by FP with an Asynchronous Approach Improvng the Qualty of Control of Perodc Tasks Scheduled by FP wth an Asynchronous Approach P. Meumeu Yoms, L. George, Y. Sorel, D. de Rauglaudre AOSTE Project-team INRIA Pars-Rocquencourt Le Chesnay,

More information

Analysis of Queuing Delay in Multimedia Gateway Call Routing

Analysis of Queuing Delay in Multimedia Gateway Call Routing Analyss of Queung Delay n Multmeda ateway Call Routng Qwe Huang UTtarcom Inc, 33 Wood Ave. outh Iseln, NJ 08830, U..A Errol Lloyd Computer Informaton cences Department, Unv. of Delaware, Newark, DE 976,

More information

Section 8.3 Polar Form of Complex Numbers

Section 8.3 Polar Form of Complex Numbers 80 Chapter 8 Secton 8 Polar Form of Complex Numbers From prevous classes, you may have encountered magnary numbers the square roots of negatve numbers and, more generally, complex numbers whch are the

More information

Overhead-Aware Compositional Analysis of Real-Time Systems

Overhead-Aware Compositional Analysis of Real-Time Systems Overhead-Aware ompostonal Analyss of Real-Tme Systems Lnh T.X. Phan, Meng Xu, Jaewoo Lee, nsup Lee, Oleg Sokolsky PRESE enter Department of omputer and nformaton Scence Unversty of Pennsylvana ompostonal

More information

Chapter 13: Multiple Regression

Chapter 13: Multiple Regression Chapter 13: Multple Regresson 13.1 Developng the multple-regresson Model The general model can be descrbed as: It smplfes for two ndependent varables: The sample ft parameter b 0, b 1, and b are used to

More information

An Admission Control Algorithm in Cloud Computing Systems

An Admission Control Algorithm in Cloud Computing Systems An Admsson Control Algorthm n Cloud Computng Systems Authors: Frank Yeong-Sung Ln Department of Informaton Management Natonal Tawan Unversty Tape, Tawan, R.O.C. ysln@m.ntu.edu.tw Yngje Lan Management Scence

More information

Integrated approach in solving parallel machine scheduling and location (ScheLoc) problem

Integrated approach in solving parallel machine scheduling and location (ScheLoc) problem Internatonal Journal of Industral Engneerng Computatons 7 (2016) 573 584 Contents lsts avalable at GrowngScence Internatonal Journal of Industral Engneerng Computatons homepage: www.growngscence.com/ec

More information

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,

More information

More metrics on cartesian products

More metrics on cartesian products More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of

More information

Edge Isoperimetric Inequalities

Edge Isoperimetric Inequalities November 7, 2005 Ross M. Rchardson Edge Isopermetrc Inequaltes 1 Four Questons Recall that n the last lecture we looked at the problem of sopermetrc nequaltes n the hypercube, Q n. Our noton of boundary

More information

PHYS 450 Spring semester Lecture 02: Dealing with Experimental Uncertainties. Ron Reifenberger Birck Nanotechnology Center Purdue University

PHYS 450 Spring semester Lecture 02: Dealing with Experimental Uncertainties. Ron Reifenberger Birck Nanotechnology Center Purdue University PHYS 45 Sprng semester 7 Lecture : Dealng wth Expermental Uncertantes Ron Refenberger Brck anotechnology Center Purdue Unversty Lecture Introductory Comments Expermental errors (really expermental uncertantes)

More information

Curve Fitting with the Least Square Method

Curve Fitting with the Least Square Method WIKI Document Number 5 Interpolaton wth Least Squares Curve Fttng wth the Least Square Method Mattheu Bultelle Department of Bo-Engneerng Imperal College, London Context We wsh to model the postve feedback

More information

Exercises. 18 Algorithms

Exercises. 18 Algorithms 18 Algorthms Exercses 0.1. In each of the followng stuatons, ndcate whether f = O(g), or f = Ω(g), or both (n whch case f = Θ(g)). f(n) g(n) (a) n 100 n 200 (b) n 1/2 n 2/3 (c) 100n + log n n + (log n)

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

CHAPTER 17 Amortized Analysis

CHAPTER 17 Amortized Analysis CHAPTER 7 Amortzed Analyss In an amortzed analyss, the tme requred to perform a sequence of data structure operatons s averaged over all the operatons performed. It can be used to show that the average

More information