Critical sections. Using semaphores. Using semaphores. Using semaphores. How long is blocking time? 17/10/2016. Problems caused by mutual exclusion
|
|
- Johnathan Charles
- 6 years ago
- Views:
Transcription
1 rtcal sectons Problems caused by mutual excluson crtcal secton wat(s) x = ; y = 5; sgnal(s) wrte global memory buffer nt x; nt y; read wat(s) a = x+; b = y+; c = x+y; crtcal secton sgnal(s) Usng semaphores Mae crtcal sectons as short as possble. nt x, y; // these are global shared varables mutex s; // ths s the semaphore to protect them tas reader() { nt ; // these are local varables float d, v[im];... an we shorten ths crtcal secton? wat(s); d = sqrt(x*x + y*y); for (=; ++; <IM) { v[] = *(x + y); f (v[] < x*y) v[] = x + y; sgnal(s);... crtcal secton length Usng semaphores possblty s to copy global varables nto local varables: tas reader() { nt ; // these are local varables float d, v[im]; float a, b; // two new local varables... wat(s); // copy global vars a = x; b = y; // to local vars sgnal(s); d = sqrt(a*a + b*b); // mae computaton for (=; ++; <IM) { // usng local vars v[] = *(a + b); f (v[] < a*b) v[\] = a + b; wat(s); x = a; y = b; sgnal(s);... // copy local vars // to global vars crtcal secton length crtcal secton length 4 Usng semaphores How long s blocng tme? Mae crtcal sectons as short as possble. Try to avod nested crtcal sectons. vod mang crtcal sectons across loops or condtonal statements. Ths code s very UNSFE, snce the... sgnal could never be executed, and wat(s); could be bloced forever! results = x + y; whle (result > ) { v[] = *(x + y); f (v[] < x*y) results = results - y; else sgnal(s); 5 S S P > P It seems that the maxmum blocng tme for s equal to the length of the crtcal secton (S )of, but 6
2 Schedule wth no conflcts onflct on a crtcal secton prorty prorty 7 8 onflct on a crtcal secton Prorty Inverson prorty hgh prorty tas s bloced by a lower prorty tas a for an unbounded nterval of tme Soluton Introduce a concurrency control protocol for accessng crtcal sectons. 9 Protocol ey aspects Rules for classcal semaphores ccess Rule: ecdes whether to bloc and when. The followng rules are normally used for classcal semaphores: Progress Rule: ecdes how to execute nsde a crtcal secton. Release Rule: ecdes how to order the pendng requests of the bloced tass. Other aspects nalyss: Implementaton: estmates the worst-case blocng tmes. fnds the smplest way to encode the protocol rules. ccess Rule (ecdes whether to bloc and when): Enter a crtcal secton f the resource s free, bloc f the resource s loced. Progress Rule (ecdes how to execute n a crtcal secton): Execute the crtcal secton wth the nomnal prorty. Release Rule (ecdes how to order pendng requests): Wae up the bloced tas n FIFO order. Wae up the bloced tas wth the hghest prorty.
3 Resource ccess Protocols lasscal semaphores (No protocol) ssumpton rtcal sectons are correctly accessed by tass: Non Preemptve Protocol (NPP) Hghest Locer Prorty (HLP) Prorty Inhertance Protocol (PIP) Prorty elng Protocol (PP) Stac Resource Polcy (SRP) wat(s ) wat(s ) sgnal(s ) sgnal(s ) wat(s ) wat(s ) sgnal(s ) sgnal(s ) 4 Non Preemptve Protocol onflct on a crtcal secton ccess Rule: tas never blocs at the entrance of a crtcal secton, but at ts actvaton tme. prorty (usng classcal semaphores) Progress Rule: sable preempton when executng nsde a crtcal secton. Release Rule: t ext, enable preempton so that the resource s assgned to the pendng tas wth the hghest prorty. 5 6 NPP: example NPP: mplementaton notes prorty Each tas must be assgned two prortes: a nomnal prorty P (fxed) assgned by the applcaton developer; a dynamc prorty p (ntalzed to P ) used to schedule the tas and affected by the protocol. 7 Then, the protocol can be mplemented by changng the behavor of the wat and sgnal prmtves: wat(s): p = max(p,, P n ) sgnal(s): p = P 8
4 NPP: pro & cons VNTGES: smplcty and effcency. Semaphores queues are not needed, because tass never bloc on a wat(s). Each tas can bloc at most on a sngle crtcal secton. It prevents deadlocs and allows stac sharng. It s transparent to the programmer. NPP: problem Long crtcal sectons delay all hgh prorty tass: prorty s useless: cannot preempt, although t could! PROLEMS:. Tass may bloc even f they do not use resources.. Snce tass are bloced at actvaton, blocng could be unnecessary (pessmstc assumpton). 9 Prorty assgned to nsde crtcal sectons: p = P max = max(p,, P n ) NPP: problem Hghest Locer Prorty tas could bloc even f not accessng a crtcal secton: blocs just n case... ccess Rule: tas never blocs at the entrance of a crtcal secton, but at ts actvaton tme. test Progress Rule: Insde resource R, a tas executes at the hghest prorty of the tass that use R. S S p Release Rule: t ext, the dynamc prorty of the tas s reset to ts nomnal prorty P. P max P HLP: example HLP: mplementaton notes prorty s bloced, but can preempt Each tas s assgned a nomnal prorty P and a dynamc prorty p. Each semaphore S s assgned a resource celng (S): (S) = max { P uses S p Then, the protocol can be mplemented by changng the behavor of the wat and sgnal prmtves: P P wat(s): sgnal(s): p = (S) p = P Prorty assgned to nsde a resource R: p (R) = max { P j j uses R Note: HLP s also nown as Immedate Prorty elng (IP). 4 4
5 HLP: pro & cons Prorty Inhertance Protocol VNTGES: smplcty and effcency. Semaphores queues are not needed, because tass never bloc on a wat(s). Each tas can bloc at most on a sngle crtcal secton. It prevents deadlocs. It allows stac sharng. PROLEMS: Snce tass are bloced at actvaton, blocng could be unnecessary (same pessmsm as for NPP). It s not transparent to programmers (due to celngs). 5 ccess Rule: Progress Rule: Release Rule: tas blocs at the entrance of a crtcal secton f the resource s loced. Insde resource R, a tas executes wth the hghest prorty of the tass bloced on R. t ext, the dynamc prorty of the tas s reset to ts nomnal prorty P. 6 PIP: example PIP: types of blocng prorty drect blocng push-through blocng rect blocng tas blocs on a loced semaphore Indrect blocng (Push-through blocng) tas blocs because a lower prorty tas nherted a hgher prorty. nherts the prorty of P LOKING: a delay caused by lower prorty tass P 7 8 PIP: mplementaton notes Insde a resource R the dynamc prorty p s set as p (R) = max { P h h bloced on R Identfyng blocng resources Under PIP, a tas can be bloced on a semaphore S only f: wat(s): f (s == ) { <suspend the callng tas exe n the semaphore queue> <fnd the tas that s locng the semaphore s> p = P exe // prorty nhertance <call the scheduler> else s = ; sgnal(s): f (there are bloced tass) { <awae the hghest prorty tas n the semaphore queue> p exe = P exe <call the scheduler>. S s drectly shared between and lower prorty tass (drect blocng) else s = ; 9 OR. S s shared between tass wth prorty lower than and tass havng prorty hgher than (push-through blocng). 5
6 Identfyng blocng resources Lemma : tas can be bloced at most once by a lower prorty tas. Identfyng blocng resources Lemma : tas can be bloced at most once on a semaphore S. If there are n tass wth prorty lower than, then can be bloced at most at most n tmes, ndependently of the number of crtcal sectons that can bloc. If there are m dstnct semaphores that can bloc atas, then can be bloced at most m tmes, ndependently of the number of crtcal sectons that can bloc. oundng blocng tmes Example theorem follows from the prevous lemmas: Theorem: can be bloced at most for the duraton of = mn(n,m ) crtcal sectons. prorty n = number of tass wth prorty less than m = number of semaphores that can bloc (ether drectly or ndrectly). can be bloced once by (on or ) and once by (on or ) can be bloced once by (on or ) cannot be bloced 4 prorty Example Example n whch s bloced on by push-through Identfyng blocng tmes To derve a general analyss, we defne the followng notaton: Z longest (external) crtcal secton used by protected by semaphore S. P worst-case duraton of Z set of the longest crtcal sectons used by for each semaphore S : ={Z S used by j set of crtcal sectons used by j that can bloc set of crtcal sectons that can bloc maxmum number of crtcal sectons that can bloc 5 worst-case blocng tme for 6 6
7 Identfyng blocng tmes For the other protocols.s. of j that can bloc for drect blocng: dr j j NPP j { Z j ( Z j j ) N ( Pj P ).S. of j that can bloc for push-through blocng:.s. of j that can bloc j dr j.s. that can bloc pt j pt j h { { h n h j j j h j 7 HLP j PIP j { Z ( Z ) N ( P P ) N { h j h j.s. that can bloc j j j n j j ( ( S ) P ) 8 Identfyng blocng tme Example. Identfy the set j for all lower prorty tass. Identfy the set. ompute 4. ompute as the hghest sum of the duratons of Z NOTE: The crtcal sectons selected from must belong to dfferent tass (for Lemma ); must refer to dfferent semaphores (for Lemma ); 9 onsder the followng applcaton: IN prorty E E (R ) E 4 4 OUT T Example Identfcaton of E E 4 4 T E From the tas code we can derve the followng table: 4 4 T E = {,,, 4 can only experence drect blocng because t s the hghest prorty tas. 4 7
8 Identfcaton of Identfcaton of 4 T E T E = {,,, 4 = {,,, 4 = {, 4, 4 = {, 4, 4 can be bloced drectly by 4 and 4, and ndrectly by and 4. 4 can be bloced = { 4, 4, E 4 drectly by E 4 and ndrectly by 4 and 4 44 Identfcaton of 4 Identfcaton of 4 4 T E T E n m {,,, {, 4, { 4, 4, E { = {,,, 4 = {, 4, 4 = { 4, 4, E 4 4 = { = mn(n, m ) number of tass wth prorty less than number of semaphores that can bloc (ether drectly or ndrectly) Identfcaton of PIP: pro & cons 4 T E {,,, {, 4, { 4, 4, E { VNTGES: It removes the pessmsms of NPP and HLP (a tas s bloced only when really needed). It s transparent to the programmer. NOTES For,fweselect, we cannot select 4, because each semaphore can bloc only once (Lemma ). For, we cannot select 4 and 4, because each tas can bloc only once (Lemma ). 47 PROLEMS: More complex to mplement (especally to support nested crtcal sectons). It s prone to chaned blocng. It does not avod deadlocs. 48 8
9 PIP: haned blocng Prorty elng Protocol,, prorty 4 ccess Rule: tas can access a resource only f t passes the PP access test. 4 Progress Rule: Release Rule: Insde resource R, a tas executes wth the hghest prorty of the tass bloced on R. t ext, the dynamc prorty of the tas s reset to ts nomnal prorty P. NOTE: can be bloced at most once for each lower prorty tas. NOTE: PP can be vewed as PIP + access test 49 5 vodng chaned blocng Resource elngs prorty 4 To eep trac of resource usage by hgh-prorty tass, each resource s assgned a resource celng: (s ) = max { P uses s 4 To avod multple blocng of we must prevent and to enter ther crtcal sectons (even f they are free), because a low prorty tas ( 4 ) s holdng a resource used by. 5 Then a tas can enter a crtcal secton only f ts prorty s hgher than the maxmum celng of the loced semaphores: PP access test P > max { (s ) : s loced by tass 5 PP: example PP: propertes s (s ) = P Theorem prorty s (s ) = P Under PP, a tas can bloc at most on a sngle crtcal secton. celng blocng Theorem PP prevents chaned blocng. t t : s bloced by the PP, snce P < (s ) Theorem PP prevents deadlocs
10 Typcal deadloc It can only occur wth nested crtcal sectons: PP: deadloc avodance It can only occur wth nested crtcal sectons: (S ) = P P > P P > P (S ) = P bloced bloced by PP bloced PP: pro & cons Questons VNTGES: It lmts blocng to the length of a sngle crtcal secton. It avods deadlocs when usng nested crtcal sectons. PROLEMS: It s complex to mplement (le PIP). It can create unnecessary blocng (t s pessmstc le HLP). It s not transparent to the programmer: resource celngs must be specfed n the source code.. If a tas uses several crtcal sectons, can t be bloced on the second one?. Each tas has a nomnal prorty (P ) and a dynamc prorty (p P ) changed by the protocol to prevent prorty nverson. If blocs because P max {(s ) : s loced by tass can t be that p > max {(s ) : s loced by tass? nalyss under shared resources nalyss under RM. Select a schedulng algorthm to manage tass and a protocol for accessng shared resources. preempton by HP tass. ompute the maxmum blocng tme for each tas. blocng by LP tass. Perform the guarantee test ncludng the blocng terms. T T / 59 6
11 Hyperbolc ound Response Tme nalyss preempton by HP tass R R T blocng by LP tass Iteratve soluton: T T R R ( s) terate whle R T ( s) s R R ( s) 6 6 Resource Sharng under EF The protocols analyzed so far have been orgnally developed for fxed prorty schedulng schemes. However: NPP can also be used under EF PIP has been extended under EF by Spur (997). PP has been extended under EF by hen-ln (99) In 99, aer proposed a new access protocol, called Stac Resource Polcy (SRP) that wors both under fxed prortes and EF. Stac Resource Polcy Ths protocol satsfes the same PP propertes: t avods unbounded prorty nverson; t prevents deadlocs and chaned blocng; each tas can be bloced at most once. In addton: It allows usng mult-unt resources; t can be used under fxed and dynamc prortes; t allows tass to share the same stac space Stac Resource Polcy Each resource R s characterzed by: a maxmum number of unts N a current number of avalable unts n Preempton level / Note that, under EF, a tas can preempt only f > (that s, f < ) Each tas s characterzed by: prortyp (statc or dynamc), e.g.: preempton level: / set of resource requrements: R (R ) specfes how many RM: p /T M: p / EF: p /d No preempton can occur f (that s, f ): unts of R are used by 65 66
12 Resource celng Each resource R s assgned a dynamc celng equal to the hghest preempton level of the tass that may bloc on R : R (n ) = max {, : n(r ) < (R ) elng property R (n ) = max {, : n(r ) < (R ) Lemma If > R (n ) then there exst enough unts of R NOTE: R (n ) ncreases only when a resource s loced R (n ) decreases only when a resource s released. to satsfy the requrements of. to satsfy the requrements of all tass that can mae preempton on Stac Resource Polcy omputng Resource elngs Fnally, a system celng s defned as: s = max { R (n ) R R N R () () () SRP preempton rule () ready tas can preempt the executng tas exe f and only f 5 p > p exe and > s 69 7 omputng Resource elngs SRP: example R R N R 5 () () () () N R R () R () R () R () R R - R () R () R () R () R s R - 7 tas blocs when attemptng to preempt 7
13 PP: example SRP: propertes P P P p () () () P () s (s ) = P s (s ) = P tas s bloced when accessng a resource 7 Theorem Under SRP, each tas can be bloced at most on a sngle crtcal secton. onsder the followng scenaro where blocs on two: t* Ths s not possble, because could not preempt because, at tme t*, < s 74 Theorem SRP: propertes Theorem SRP: propertes If > s then wll never bloc once started. SRP prevents deadlocs. Proof Snce s = max{ R (n ), then there are enough resources to satsfy the requrements of and those of all tass that can preempt. Proof From Theorem, f a tas can never bloc once started, then no deadloc can occur. Queston If a tas can never bloc once started, can we get rd of the wat / sgnal prmtves? SRP: deadloc avodance Schedulablty analyss under EF > When = T bloced by SRP tas set s schedulable f T T s can be computed as under PP and refers to the length of longest crtcal secton that can bloc
14 Schedulablty analyss under EF When T tas set s schedulable f U < and L n ( L) L T T L Stac sharng Each tas normally uses a prvate stac for savng context (regster values) managng functons storng local varables where: (L) = max { jh ( j > L) and ( h L) stac ponter PUSH = { d d max ( max, mn(h, L * )) POP max = max (,, n ) H = lcm(t,, T n ) * L n ( T ) U U 79 stac 8 Stac sharng Why stac cannot be normally shared? Stac sharng Why stac can be shared under SRP? Suppose tass share a resource: bloced bg problems SP SP stac SP SP SP stac 8 8 Savng stac memory To really save stac sze, we should use a small number of preempton levels. tass Kb stac per tas preempton levels tass per group stac sze = Mb stac sze = Kb stac savng = 9 % omparson Prot pro. pessm. bloc. nstant NPP any hgh HLP fxed medum PIP fxed low mn (n, m ) PP fxed medum SRP any medum on arrval on arrval on access on access on arrval transparent dloc avod. stac sharng mpl. YES YES YES easy NO YES YES easy YES NO NO hard NO YES NO hard NO YES YES easy
Last Time. Priority-based scheduling. Schedulable utilization Rate monotonic rule: Keep utilization below 69% Static priorities Dynamic priorities
Last Tme Prorty-based schedulng Statc prortes Dynamc prortes Schedulable utlzaton Rate monotonc rule: Keep utlzaton below 69% Today Response tme analyss Blockng terms Prorty nverson And solutons Release
More informationReal-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling
Real-Tme Systems Multprocessor schedulng Specfcaton Implementaton Verfcaton Multprocessor schedulng -- -- Global schedulng How are tasks assgned to processors? Statc assgnment The processor(s) used for
More informationResource Sharing. CSCE 990: Real-Time Systems. Steve Goddard. Resources & Resource Access Control (Chapter 8 of Liu)
CSCE 990: Real-Tme Systems Resource Sharng Steve Goddard goddard@cse.unl.edu http://www.cse.unl.edu/~goddard/courses/realtmesystems Resources & Resource Access Control (Chapter 8 of Lu) Real-Tme Systems
More informationEmbedded Systems. 4. Aperiodic and Periodic Tasks
Embedded Systems 4. Aperodc and Perodc Tasks Lothar Thele 4-1 Contents of Course 1. Embedded Systems Introducton 2. Software Introducton 7. System Components 10. Models 3. Real-Tme Models 4. Perodc/Aperodc
More informationComputer Control: Task Synchronisation in Dynamic Priority Scheduling
Computer Control: Task Synchronsaton n Dynamc Prorty Schedulng Sérgo Adrano Fernandes Lopes Department of Industral Electroncs Engneerng School Unversty of Mnho Campus de Azurém 4800 Gumarães - PORTUGAL
More informationfind (x): given element x, return the canonical element of the set containing x;
COS 43 Sprng, 009 Dsjont Set Unon Problem: Mantan a collecton of dsjont sets. Two operatons: fnd the set contanng a gven element; unte two sets nto one (destructvely). Approach: Canoncal element method:
More informationReal-Time Operating Systems M. 11. Real-Time: Periodic Task Scheduling
Real-Tme Operatng Systems M 11. Real-Tme: Perodc Task Schedulng Notce The course materal ncludes sldes downloaded from:! http://codex.cs.yale.edu/av/os-book/! and! (sldes by Slberschatz, Galvn, and Gagne,
More informationCHAPTER 17 Amortized Analysis
CHAPTER 7 Amortzed Analyss In an amortzed analyss, the tme requred to perform a sequence of data structure operatons s averaged over all the operatons performed. It can be used to show that the average
More information18.1 Introduction and Recap
CS787: Advanced Algorthms Scrbe: Pryananda Shenoy and Shjn Kong Lecturer: Shuch Chawla Topc: Streamng Algorthmscontnued) Date: 0/26/2007 We contnue talng about streamng algorthms n ths lecture, ncludng
More informationLecture 4: November 17, Part 1 Single Buffer Management
Lecturer: Ad Rosén Algorthms for the anagement of Networs Fall 2003-2004 Lecture 4: November 7, 2003 Scrbe: Guy Grebla Part Sngle Buffer anagement In the prevous lecture we taled about the Combned Input
More informationLimited Preemptive Scheduling for Real-Time Systems: a Survey
Lmted Preemptve Schedulng for Real-Tme Systems: a Survey Gorgo C. Buttazzo, Fellow Member, IEEE, Marko Bertogna, Senor Member, IEEE, and Gang Yao Abstract The queston whether preemptve algorthms are better
More informationECE559VV Project Report
ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate
More informationEmbedded Systems Development
Embedded Systems Development Leture eal-tme Shedulng Dr. Danel Kästner AbsInt Angewandte Informat GmbH aestner@absnt.om Leture Evaluaton Please do leture evaluaton Deadlne tomorrow! http://www.lx.un-saarland.de
More information3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X
Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number
More informationAN EXTENDIBLE APPROACH FOR ANALYSING FIXED PRIORITY HARD REAL-TIME TASKS
AN EXENDIBLE APPROACH FOR ANALYSING FIXED PRIORIY HARD REAL-IME ASKS K. W. ndell 1 Department of Computer Scence, Unversty of York, England YO1 5DD ABSRAC As the real-tme computng ndustry moves away from
More informationThe Expectation-Maximization Algorithm
The Expectaton-Maxmaton Algorthm Charles Elan elan@cs.ucsd.edu November 16, 2007 Ths chapter explans the EM algorthm at multple levels of generalty. Secton 1 gves the standard hgh-level verson of the algorthm.
More informationErrors for Linear Systems
Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch
More informationDynamic Programming. Preview. Dynamic Programming. Dynamic Programming. Dynamic Programming (Example: Fibonacci Sequence)
/24/27 Prevew Fbonacc Sequence Longest Common Subsequence Dynamc programmng s a method for solvng complex problems by breakng them down nto smpler sub-problems. It s applcable to problems exhbtng the propertes
More informationThe Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction
ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also
More informationLecture 3: Probability Distributions
Lecture 3: Probablty Dstrbutons Random Varables Let us begn by defnng a sample space as a set of outcomes from an experment. We denote ths by S. A random varable s a functon whch maps outcomes nto the
More informationOutline. Communication. Bellman Ford Algorithm. Bellman Ford Example. Bellman Ford Shortest Path [1]
DYNAMIC SHORTEST PATH SEARCH AND SYNCHRONIZED TASK SWITCHING Jay Wagenpfel, Adran Trachte 2 Outlne Shortest Communcaton Path Searchng Bellmann Ford algorthm Algorthm for dynamc case Modfcatons to our algorthm
More informationGrover s Algorithm + Quantum Zeno Effect + Vaidman
Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the
More informationFixed-Priority Multiprocessor Scheduling with Liu & Layland s Utilization Bound
Fxed-Prorty Multprocessor Schedulng wth Lu & Layland s Utlzaton Bound Nan Guan, Martn Stgge, Wang Y and Ge Yu Department of Informaton Technology, Uppsala Unversty, Sweden Department of Computer Scence
More informationEcon107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)
I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes
More informationNumerical Solution of Ordinary Differential Equations
Numercal Methods (CENG 00) CHAPTER-VI Numercal Soluton of Ordnar Dfferental Equatons 6 Introducton Dfferental equatons are equatons composed of an unknown functon and ts dervatves The followng are examples
More informationOn the Throughput of Clustered Photolithography Tools:
On the hroughput of lustered Photolthography ools: Wafer Advancement and Intrnsc Equpment Loss Maruth Kumar Mutnur James R. Morrson, Ph.D. September 23, 2007 Presentaton Outlne Motvaton Model : Synchronous
More informationFinding Dense Subgraphs in G(n, 1/2)
Fndng Dense Subgraphs n Gn, 1/ Atsh Das Sarma 1, Amt Deshpande, and Rav Kannan 1 Georga Insttute of Technology,atsh@cc.gatech.edu Mcrosoft Research-Bangalore,amtdesh,annan@mcrosoft.com Abstract. Fndng
More informationEconomics 101. Lecture 4 - Equilibrium and Efficiency
Economcs 0 Lecture 4 - Equlbrum and Effcency Intro As dscussed n the prevous lecture, we wll now move from an envronment where we looed at consumers mang decsons n solaton to analyzng economes full of
More informationPolynomial Regression Models
LINEAR REGRESSION ANALYSIS MODULE XII Lecture - 6 Polynomal Regresson Models Dr. Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur Test of sgnfcance To test the sgnfcance
More informationAdditional Codes using Finite Difference Method. 1 HJB Equation for Consumption-Saving Problem Without Uncertainty
Addtonal Codes usng Fnte Dfference Method Benamn Moll 1 HJB Equaton for Consumpton-Savng Problem Wthout Uncertanty Before consderng the case wth stochastc ncome n http://www.prnceton.edu/~moll/ HACTproect/HACT_Numercal_Appendx.pdf,
More informationAPPROXIMATE PRICES OF BASKET AND ASIAN OPTIONS DUPONT OLIVIER. Premia 14
APPROXIMAE PRICES OF BASKE AND ASIAN OPIONS DUPON OLIVIER Prema 14 Contents Introducton 1 1. Framewor 1 1.1. Baset optons 1.. Asan optons. Computng the prce 3. Lower bound 3.1. Closed formula for the prce
More informationx = , so that calculated
Stat 4, secton Sngle Factor ANOVA notes by Tm Plachowsk n chapter 8 we conducted hypothess tests n whch we compared a sngle sample s mean or proporton to some hypotheszed value Chapter 9 expanded ths to
More information6.842 Randomness and Computation February 18, Lecture 4
6.842 Randomness and Computaton February 18, 2014 Lecture 4 Lecturer: Rontt Rubnfeld Scrbe: Amartya Shankha Bswas Topcs 2-Pont Samplng Interactve Proofs Publc cons vs Prvate cons 1 Two Pont Samplng 1.1
More informationNotes on Frequency Estimation in Data Streams
Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to
More informationExpected Value and Variance
MATH 38 Expected Value and Varance Dr. Neal, WKU We now shall dscuss how to fnd the average and standard devaton of a random varable X. Expected Value Defnton. The expected value (or average value, or
More informationEEL 6266 Power System Operation and Control. Chapter 3 Economic Dispatch Using Dynamic Programming
EEL 6266 Power System Operaton and Control Chapter 3 Economc Dspatch Usng Dynamc Programmng Pecewse Lnear Cost Functons Common practce many utltes prefer to represent ther generator cost functons as sngle-
More informationA FAST HEURISTIC FOR TASKS ASSIGNMENT IN MANYCORE SYSTEMS WITH VOLTAGE-FREQUENCY ISLANDS
Shervn Haamn A FAST HEURISTIC FOR TASKS ASSIGNMENT IN MANYCORE SYSTEMS WITH VOLTAGE-FREQUENCY ISLANDS INTRODUCTION Increasng computatons n applcatons has led to faster processng. o Use more cores n a chp
More informationFixed-Priority Multiprocessor Scheduling with Liu & Layland s Utilization Bound
Fxed-Prorty Multprocessor Schedulng wth Lu & Layland s Utlzaton Bound Nan Guan, Martn Stgge, Wang Y and Ge Yu Department of Informaton Technology, Uppsala Unversty, Sweden Department of Computer Scence
More informationHashing. Alexandra Stefan
Hashng Alexandra Stefan 1 Hash tables Tables Drect access table (or key-ndex table): key => ndex Hash table: key => hash value => ndex Man components Hash functon Collson resoluton Dfferent keys mapped
More information4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA
4 Analyss of Varance (ANOVA) 5 ANOVA 51 Introducton ANOVA ANOVA s a way to estmate and test the means of multple populatons We wll start wth one-way ANOVA If the populatons ncluded n the study are selected
More informationLecture 4: Universal Hash Functions/Streaming Cont d
CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected
More informationCHAPTER 14 GENERAL PERTURBATION THEORY
CHAPTER 4 GENERAL PERTURBATION THEORY 4 Introducton A partcle n orbt around a pont mass or a sphercally symmetrc mass dstrbuton s movng n a gravtatonal potental of the form GM / r In ths potental t moves
More informationDepartment of Statistics University of Toronto STA305H1S / 1004 HS Design and Analysis of Experiments Term Test - Winter Solution
Department of Statstcs Unversty of Toronto STA35HS / HS Desgn and Analyss of Experments Term Test - Wnter - Soluton February, Last Name: Frst Name: Student Number: Instructons: Tme: hours. Ads: a non-programmable
More informationAn Integrated OR/CP Method for Planning and Scheduling
An Integrated OR/CP Method for Plannng and Schedulng John Hooer Carnege Mellon Unversty IT Unversty of Copenhagen June 2005 The Problem Allocate tass to facltes. Schedule tass assgned to each faclty. Subect
More informationImproved Worst-Case Response-Time Calculations by Upper-Bound Conditions
Improved Worst-Case Response-Tme Calculatons by Upper-Bound Condtons Vctor Pollex, Steffen Kollmann, Karsten Albers and Frank Slomka Ulm Unversty Insttute of Embedded Systems/Real-Tme Systems {frstname.lastname}@un-ulm.de
More informationChapter 8 Indicator Variables
Chapter 8 Indcator Varables In general, e explanatory varables n any regresson analyss are assumed to be quanttatve n nature. For example, e varables lke temperature, dstance, age etc. are quanttatve n
More informationLecture 10 Support Vector Machines II
Lecture 10 Support Vector Machnes II 22 February 2016 Taylor B. Arnold Yale Statstcs STAT 365/665 1/28 Notes: Problem 3 s posted and due ths upcomng Frday There was an early bug n the fake-test data; fxed
More informationE Tail Inequalities. E.1 Markov s Inequality. Non-Lecture E: Tail Inequalities
Algorthms Non-Lecture E: Tal Inequaltes If you hold a cat by the tal you learn thngs you cannot learn any other way. Mar Twan E Tal Inequaltes The smple recursve structure of sp lsts made t relatvely easy
More informationQueueing Networks II Network Performance
Queueng Networks II Network Performance Davd Tpper Assocate Professor Graduate Telecommuncatons and Networkng Program Unversty of Pttsburgh Sldes 6 Networks of Queues Many communcaton systems must be modeled
More informationThe strict priority scheduler
6. SP and GPS schedulers Pag. The strct prorty scheduler The strct prorty scheduler s very smple and effcent In the followng, we wll carry out the analyss of ths scheduler to determne the formulas for
More informationAffine transformations and convexity
Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/
More information10-701/ Machine Learning, Fall 2005 Homework 3
10-701/15-781 Machne Learnng, Fall 2005 Homework 3 Out: 10/20/05 Due: begnnng of the class 11/01/05 Instructons Contact questons-10701@autonlaborg for queston Problem 1 Regresson and Cross-valdaton [40
More informationParametric fractional imputation for missing data analysis. Jae Kwang Kim Survey Working Group Seminar March 29, 2010
Parametrc fractonal mputaton for mssng data analyss Jae Kwang Km Survey Workng Group Semnar March 29, 2010 1 Outlne Introducton Proposed method Fractonal mputaton Approxmaton Varance estmaton Multple mputaton
More informationProblem Set 9 Solutions
Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem
More informationComplete subgraphs in multipartite graphs
Complete subgraphs n multpartte graphs FLORIAN PFENDER Unverstät Rostock, Insttut für Mathematk D-18057 Rostock, Germany Floran.Pfender@un-rostock.de Abstract Turán s Theorem states that every graph G
More informationprinceton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg
prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there
More informationClock-Driven Scheduling (in-depth) Cyclic Schedules: General Structure
CPSC-663: Real-me Systems n-depth Precompute statc schedule o-lne e.g. at desgn tme: can aord expensve algorthms. Idle tmes can be used or aperodc jobs. Possble mplementaton: able-drven Schedulng table
More informationScheduling Motivation
76 eal-me & Embedded Systems 7 Uwe. Zmmer - he Australan Natonal Unversty 78 Motvaton n eal-me Systems Concurrency may lead to non-determnsm. Non-determnsm may make t harder to predct the tmng behavour.
More informationMarkov Chain Monte Carlo (MCMC), Gibbs Sampling, Metropolis Algorithms, and Simulated Annealing Bioinformatics Course Supplement
Markov Chan Monte Carlo MCMC, Gbbs Samplng, Metropols Algorthms, and Smulated Annealng 2001 Bonformatcs Course Supplement SNU Bontellgence Lab http://bsnuackr/ Outlne! Markov Chan Monte Carlo MCMC! Metropols-Hastngs
More informationOnline Appendix. t=1 (p t w)q t. Then the first order condition shows that
Artcle forthcomng to ; manuscrpt no (Please, provde the manuscrpt number!) 1 Onlne Appendx Appendx E: Proofs Proof of Proposton 1 Frst we derve the equlbrum when the manufacturer does not vertcally ntegrate
More informationUsing T.O.M to Estimate Parameter of distributions that have not Single Exponential Family
IOSR Journal of Mathematcs IOSR-JM) ISSN: 2278-5728. Volume 3, Issue 3 Sep-Oct. 202), PP 44-48 www.osrjournals.org Usng T.O.M to Estmate Parameter of dstrbutons that have not Sngle Exponental Famly Jubran
More information1 GSW Iterative Techniques for y = Ax
1 for y = A I m gong to cheat here. here are a lot of teratve technques that can be used to solve the general case of a set of smultaneous equatons (wrtten n the matr form as y = A), but ths chapter sn
More informationAnalysis of Discrete Time Queues (Section 4.6)
Analyss of Dscrete Tme Queues (Secton 4.6) Copyrght 2002, Sanjay K. Bose Tme axs dvded nto slots slot slot boundares Arrvals can only occur at slot boundares Servce to a job can only start at a slot boundary
More informationLecture 3. Ax x i a i. i i
18.409 The Behavor of Algorthms n Practce 2/14/2 Lecturer: Dan Spelman Lecture 3 Scrbe: Arvnd Sankar 1 Largest sngular value In order to bound the condton number, we need an upper bound on the largest
More informationSection 3.6 Complex Zeros
04 Chapter Secton 6 Comple Zeros When fndng the zeros of polynomals, at some pont you're faced wth the problem Whle there are clearly no real numbers that are solutons to ths equaton, leavng thngs there
More informationn α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0
MODULE 2 Topcs: Lnear ndependence, bass and dmenson We have seen that f n a set of vectors one vector s a lnear combnaton of the remanng vectors n the set then the span of the set s unchanged f that vector
More informationACTM State Calculus Competition Saturday April 30, 2011
ACTM State Calculus Competton Saturday Aprl 30, 2011 ACTM State Calculus Competton Sprng 2011 Page 1 Instructons: For questons 1 through 25, mark the best answer choce on the answer sheet provde Afterward
More informationModule 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:
More informationImproving the Sensitivity of Deadlines with a Specific Asynchronous Scenario for Harmonic Periodic Tasks scheduled by FP
Improvng the Senstvty of Deadlnes wth a Specfc Asynchronous Scenaro for Harmonc Perodc Tasks scheduled by FP P. Meumeu Yoms, Y. Sorel, D. de Rauglaudre AOSTE Project-team INRIA Pars-Rocquencourt Le Chesnay,
More informationChapter 2 - The Simple Linear Regression Model S =0. e i is a random error. S β2 β. This is a minimization problem. Solution is a calculus exercise.
Chapter - The Smple Lnear Regresson Model The lnear regresson equaton s: where y + = β + β e for =,..., y and are observable varables e s a random error How can an estmaton rule be constructed for the
More informationLogistic Regression. CAP 5610: Machine Learning Instructor: Guo-Jun QI
Logstc Regresson CAP 561: achne Learnng Instructor: Guo-Jun QI Bayes Classfer: A Generatve model odel the posteror dstrbuton P(Y X) Estmate class-condtonal dstrbuton P(X Y) for each Y Estmate pror dstrbuton
More informationA 2D Bounded Linear Program (H,c) 2D Linear Programming
A 2D Bounded Lnear Program (H,c) h 3 v h 8 h 5 c h 4 h h 6 h 7 h 2 2D Lnear Programmng C s a polygonal regon, the ntersecton of n halfplanes. (H, c) s nfeasble, as C s empty. Feasble regon C s unbounded
More informationORIGIN 1. PTC_CE_BSD_3.2_us_mp.mcdx. Mathcad Enabled Content 2011 Knovel Corp.
Clck to Vew Mathcad Document 2011 Knovel Corp. Buldng Structural Desgn. homas P. Magner, P.E. 2011 Parametrc echnology Corp. Chapter 3: Renforced Concrete Slabs and Beams 3.2 Renforced Concrete Beams -
More informationImproving the Quality of Control of Periodic Tasks Scheduled by FP with an Asynchronous Approach
Improvng the Qualty of Control of Perodc Tasks Scheduled by FP wth an Asynchronous Approach P. Meumeu Yoms, L. George, Y. Sorel, D. de Rauglaudre AOSTE Project-team INRIA Pars-Rocquencourt Le Chesnay,
More informationCHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE
CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE Analytcal soluton s usually not possble when exctaton vares arbtrarly wth tme or f the system s nonlnear. Such problems can be solved by numercal tmesteppng
More informationModule 9. Lecture 6. Duality in Assignment Problems
Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept
More informationHomework 9 Solutions. 1. (Exercises from the book, 6 th edition, 6.6, 1-3.) Determine the number of distinct orderings of the letters given:
Homework 9 Solutons PROBLEM ONE 1 (Exercses from the book, th edton,, 1-) Determne the number of dstnct orderngs of the letters gven: (a) GUIDE Soluton: 5! (b) SCHOOL Soluton:! (c) SALESPERSONS Soluton:
More informationp 1 c 2 + p 2 c 2 + p 3 c p m c 2
Where to put a faclty? Gven locatons p 1,..., p m n R n of m houses, want to choose a locaton c n R n for the fre staton. Want c to be as close as possble to all the house. We know how to measure dstance
More informationOn the Scheduling of Mixed-Criticality Real-Time Task Sets
On the Schedulng of Mxed-Crtcalty Real-Tme Task Sets Donso de Nz, Karthk Lakshmanan, and Ragunathan (Raj) Rajkumar Carnege Mellon Unversty, Pttsburgh, PA - 15232 Abstract The functonal consoldaton nduced
More informationTransfer Functions. Convenient representation of a linear, dynamic model. A transfer function (TF) relates one input and one output: ( ) system
Transfer Functons Convenent representaton of a lnear, dynamc model. A transfer functon (TF) relates one nput and one output: x t X s y t system Y s The followng termnology s used: x y nput output forcng
More informationExercises of Chapter 2
Exercses of Chapter Chuang-Cheh Ln Department of Computer Scence and Informaton Engneerng, Natonal Chung Cheng Unversty, Mng-Hsung, Chay 61, Tawan. Exercse.6. Suppose that we ndependently roll two standard
More informationIntroduction to Vapor/Liquid Equilibrium, part 2. Raoult s Law:
CE304, Sprng 2004 Lecture 4 Introducton to Vapor/Lqud Equlbrum, part 2 Raoult s Law: The smplest model that allows us do VLE calculatons s obtaned when we assume that the vapor phase s an deal gas, and
More informationNeuro-Adaptive Design - I:
Lecture 36 Neuro-Adaptve Desgn - I: A Robustfyng ool for Dynamc Inverson Desgn Dr. Radhakant Padh Asst. Professor Dept. of Aerospace Engneerng Indan Insttute of Scence - Bangalore Motvaton Perfect system
More informationComputing Correlated Equilibria in Multi-Player Games
Computng Correlated Equlbra n Mult-Player Games Chrstos H. Papadmtrou Presented by Zhanxang Huang December 7th, 2005 1 The Author Dr. Chrstos H. Papadmtrou CS professor at UC Berkley (taught at Harvard,
More informationPhysics 5153 Classical Mechanics. D Alembert s Principle and The Lagrangian-1
P. Guterrez Physcs 5153 Classcal Mechancs D Alembert s Prncple and The Lagrangan 1 Introducton The prncple of vrtual work provdes a method of solvng problems of statc equlbrum wthout havng to consder the
More informationFor now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results.
Neural Networks : Dervaton compled by Alvn Wan from Professor Jtendra Malk s lecture Ths type of computaton s called deep learnng and s the most popular method for many problems, such as computer vson
More informationLINEAR REGRESSION ANALYSIS. MODULE VIII Lecture Indicator Variables
LINEAR REGRESSION ANALYSIS MODULE VIII Lecture - 7 Indcator Varables Dr. Shalabh Department of Maematcs and Statstcs Indan Insttute of Technology Kanpur Indcator varables versus quanttatve explanatory
More informationCS 331 DESIGN AND ANALYSIS OF ALGORITHMS DYNAMIC PROGRAMMING. Dr. Daisy Tang
CS DESIGN ND NLYSIS OF LGORITHMS DYNMIC PROGRMMING Dr. Dasy Tang Dynamc Programmng Idea: Problems can be dvded nto stages Soluton s a sequence o decsons and the decson at the current stage s based on the
More informationParallel Real-Time Scheduling of DAGs
Washngton Unversty n St. Lous Washngton Unversty Open Scholarshp All Computer Scence and Engneerng Research Computer Scence and Engneerng Report Number: WUCSE-013-5 013 Parallel Real-Tme Schedulng of DAGs
More informationTracking with Kalman Filter
Trackng wth Kalman Flter Scott T. Acton Vrgna Image and Vdeo Analyss (VIVA), Charles L. Brown Department of Electrcal and Computer Engneerng Department of Bomedcal Engneerng Unversty of Vrgna, Charlottesvlle,
More informationInner Product. Euclidean Space. Orthonormal Basis. Orthogonal
Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,
More informationFREQUENCY DISTRIBUTIONS Page 1 of The idea of a frequency distribution for sets of observations will be introduced,
FREQUENCY DISTRIBUTIONS Page 1 of 6 I. Introducton 1. The dea of a frequency dstrbuton for sets of observatons wll be ntroduced, together wth some of the mechancs for constructng dstrbutons of data. Then
More informationAppendix for Causal Interaction in Factorial Experiments: Application to Conjoint Analysis
A Appendx for Causal Interacton n Factoral Experments: Applcaton to Conjont Analyss Mathematcal Appendx: Proofs of Theorems A. Lemmas Below, we descrbe all the lemmas, whch are used to prove the man theorems
More informationFeature Selection: Part 1
CSE 546: Machne Learnng Lecture 5 Feature Selecton: Part 1 Instructor: Sham Kakade 1 Regresson n the hgh dmensonal settng How do we learn when the number of features d s greater than the sample sze n?
More informationRandomness and Computation
Randomness and Computaton or, Randomzed Algorthms Mary Cryan School of Informatcs Unversty of Ednburgh RC 208/9) Lecture 0 slde Balls n Bns m balls, n bns, and balls thrown unformly at random nto bns usually
More informationWorst-case response time analysis of real-time tasks under fixed-priority scheduling with deferred preemption
Real-Tme Syst (2009) 42: 63 119 DOI 10.1007/s11241-009-9071-z Worst-case response tme analyss of real-tme tasks under fxed-prorty schedulng wth deferred preempton Render J. Brl Johan J. Lukken Wm F.J.
More informationNegative Binomial Regression
STATGRAPHICS Rev. 9/16/2013 Negatve Bnomal Regresson Summary... 1 Data Input... 3 Statstcal Model... 3 Analyss Summary... 4 Analyss Optons... 7 Plot of Ftted Model... 8 Observed Versus Predcted... 10 Predctons...
More informationStatistics for Managers Using Microsoft Excel/SPSS Chapter 14 Multiple Regression Models
Statstcs for Managers Usng Mcrosoft Excel/SPSS Chapter 14 Multple Regresson Models 1999 Prentce-Hall, Inc. Chap. 14-1 Chapter Topcs The Multple Regresson Model Contrbuton of Indvdual Independent Varables
More informationFoundations of Arithmetic
Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an
More informationA Simple Inventory System
A Smple Inventory System Lawrence M. Leems and Stephen K. Park, Dscrete-Event Smulaton: A Frst Course, Prentce Hall, 2006 Hu Chen Computer Scence Vrgna State Unversty Petersburg, Vrgna February 8, 2017
More information