A new Approach for Minimizing Buffer Capacities with Throughput Constraint for Embedded System Design
|
|
- Evan Newman
- 5 years ago
- Views:
Transcription
1 A new Approach for Minimizing Buffer Capacities with Throughput Constraint for Embedded System Design Mohamed Benazouz, Olivier Marchetti, Alix Munier-Kordon, Pascal Urard LIP6 Université P. et M. Curie Paris Montpellier, le 23 avril 2009
2 Outline 1 Model and Notations 2 3 4
3 Marked Timed Weighted Event Graph (MTWEG) Definition G = (T,P,l, M 0 ) is a Marked Timed Weighted Event Graph (MTWEG) where 1 T = {t 1,, t n } transitions; 2 P = {p 1,, p m } places; 3 l : T N duration function; 4 M 0 : P N initial marking;
4 Marked Timed Weighted Event Graph (MTWEG) t i p u(p) M 0 (p) v(p) t j Figure: A place p = (t i, t j ) of a MTWEG. 1 Each place p P is defined between two transitions t i and t j ; 2 p P u(p) and v(p) are integers called the marking functions.
5 Firing of a transition P + (t i ) = {p = (t i, t j ) P, t j T } if t i is fired at time τ: P (t i ) = {p = (t j, t i ) P, t j T } 1 At time τ, v(p) tokens are removed from every place p P (t i ). 2 At time τ + l(t i ), u(p) tokens are added to every place p P + (t i ). M(τ, p)= The instantaneaous marking of a place p P at time τ 0
6 Schedule and Periodic Schedule Definition Let G be a MTWEG. A schedule is a function s : T N Q + which associates, with any tuple (t i, q) T N, the starting time of the qth firing of t i. Definition A schedule s is periodic if there exists a vector w = (w 1,..., w n ) Q +n such that, for any couple (t i, q) T N, s(t i, q) = s(t i, 1) + (q 1)w i. w i is then the period of the transition t i and λ s (t i ) = 1 w i its throughput.
7 A car radio application (Wiggers et al.) MP3 Reader Cell Phone t 7 t 1 t 9 t 5 Out To Speaker Microphone t 10 t 3 Signal to eliminate Figure: Block diagram of a car-radio application
8 Modelling using a MTWEG 1 Transitions corresponds to treatments; 2 Places corresponds to buffered transfers. But...the size of the buffers should be limited!
9 Bounded capacity Definition A place p = (t i, t j ) has a bounded capacity F(p) > 0 if the number of tokens stored in p can not exceed F(p): τ 0, M(τ, p) F(p) Definition A MTWEG G = (T,P, M 0,l, F) is said to be a bounded capacity graph if the capacity of every place p P is bounded by F(p).
10 Bounded capacity (Marchetti, Munier 2009) t i u(p) p M 0 (p) M(p, τ) F(p) v(p) t j t i M 0 (p 1 ) = M 0 (p) u(p) p 1 p 2 v(p) M 0 (p 2 ) = F(p) M 0 (p) Figure: A place p with limited capacity F(p) and the couple of places (p 1, p 2 ) c without capacities that models place p. t j Definition G is a symmetric MTWEG if every place p = (t i, t j ) is associated with a backward place p = (t j, t i ) modelling the limited capacity.
11 Modelling of a car radio using a symmetric MTWEG p t 7 7 t 8 t 9 p p p 7 p 8 p p 80 t 6 6 p p t 1 t p 1 80 p 5 p 5 1 t p p 4 p p 2 2 p 10 p 80 3 t t 4 t p p 10 3 Figure: A MTWEG G modelling a car-radio application
12 Problem Formulation Let G be a symmetric (non marked) WTEG. p P, θ(p) is the size of a data stored in place p. The problem consists in computing an initial marking M 0 of G such that: 1 The weighted sum of initial marking p P θ(p)m 0(p) is minimum; 2 There exists a periodic schedule s such that λ s (t i ), t i T.
13 Unitary MTWEG (Karp, Miller 1966) Definition The weight (or gain) of every path µ of a MTWEG G by W(µ) = p P µ u(p) v(p). Definition A MTWEG G is unitary if every circuit c of G verifies W(c) = 1. Since our symmetric MTWEG must be live, we only consider unitary MTWEG.
14 Normalized MTWEG (Marchetti, Munier 2009) Definition A MTWEG is normalized if all adjacent marking functions of every transition t i T are equal to a single value denoted by Z i, i.e. p P + (t i ), u(p) = Z i and p P (t i ), v(p) = Z i. Note that the number of tokens in every circuit of a normalized MTWEG does not vary.
15 Theorem Every unitary MTWEG may be transformed into an equivalent normalized MTWEG. 1 For any value α Q +, the markings functions and the initial markings of any place p P may be replaced simultaneously by respectively αu(p), αv(p) and αm 0 (p) without any influence on the schedules; 2 Positive integer values α(p), p P such that, t i T, there exists an integer Z i with, p P + (t i ), α(p)u(p) = Z i and p P (t i ), α(p)v(p) = Z i may be computed in polynomial time.
16 Normalization of the MTWEG of the car Radio Z 1 = α(p 1 ) = α(p 6 ) = α(p 8 ) = α(p 9 ) Z 2 = 441α(p 1 ) = 80α(p 2 ) Z 3 = 80α(p 2 ) = 80α(p 3 ) = 80α(p 10 ) Z 4 = α(p 3 ) = α(p 4 ) Z 5 = α(p 4 ) = α(p 5 ) Z 6 = 80α(p 5 ) = 441α(p 6 ) Z 7 = 1152α(p 7 ) Z 8 = 480α(p 7 ) = 441α(p 8 ) Z 9 = α(p 9 ) Z 10 = α(p 10 )
17 Normalization of the MTWEG of the car Radio p 7 t 7 t 8 t 9 p p p 7 p 8 p t p 6 6 p p t 1 t p p 5 p 5 p p 2 2 p t p p t t 4 t p p p Figure: The normalized MTWEG associated to G.
18 Precedence constraints induced by a place (Munier 1993) Let G = (T,P,l, M 0 ) a MGTEG. For any (t i,ν i ) T N,(t i,ν i ) is the ν i th firing of t i. Theorem A place p = (t i, t j ) will induce a precedence constraint between (t i,ν i ) and (t j,ν j ) iff u(p) M 0 (p) > u(p)ν i v(p)ν j max(u(p) v(p), 0) M 0 (p)
19 Characterization of a periodic schedule (Benabid et al. 2008) Theorem Let G be a normalized MTWEG. For any feasible periodic schedule s of G, there exists K Q + called the normalized period of s such that, for any couple of transitions (t i, t j ) T 2, w i Z i = w j Z j = K. Moreover, s is feasible iff, for any place p = (t i, t j ) P, s(t j, 1) s(t i, 1) l(t i ) + K(Z j M 0 (p) gcd i,j ). where gcd i,j = gcd(z i, Z j ).
20 Computation of the maximum processing times for the car radio example The output (t 9 ) must have a frequency equal to 44.1kHz. l(t 9 ) = w 9 = Thus, K = w 9 Z 9 = sec; t i T {t 9 }, w i = Z i K and l(t i ) w i. Table: Upper bound w i of the processing times, t i T in milliseconds t 1, t 9 t 2, t 6, t 8 t 3 t 4, t 5, t 10 t 7 l
21 Computation of a periodic Schedule input A normalized MTWEG G; output Minimum normalized period K.
22 Computation of a periodic schedule t 2 p p 4 p t 3 2 t 1 2 p t p 2 15 Figure: A MTWEG with l(t 1 ) = 10, l(t 2 ) = 12, l(t 3 ) = 6 and l(t 4 ) = 5.
23 12 6 K σ K σ t K σ 12 t K σ t 1 t K σ 10 2 K σ 5 11 K σ 5 5 K σ Figure: Valued graph G = (X, A) associated with the normalized Marked WEG pictured by Figure 6.
24 Computation of a periodic schedule with a minimum period min K subject to s(t 4, 1) s(t 2, 1) 12 s(t 1, 1) s(t 4, 1) 5 11K s(t 2, 1) s(t 1, 1) K K K t i T, s(t i, 1) 0
25 Computation of a periodic schedule with a minimum period min K subject to p = (t i, t j ) P, s(t j, 1) s(t i, 1) l(t i )+ K (Z j M 0 (p) gcd i,j ) t i T, s(t i, 1) 0 Polynomially solved using Linear Programming or a variant of Bellman-Ford algorithm.
26 Computation of the minimum size of the buffers under for a given K G is a normalized symmetric MTWEG. System Π(K): ( ) min p P θ(p)m 0(p) subject to p = (t i, t j ) P, s(t j, 1) s(t i, 1) l(t i )+ K (Z j M 0 (p) gcd i,j ) p = (t i, t j ) P, M 0 (p) = k i,j gcd i,j p = (t i, t j ) P k i,j N t i T, s(t i, 1) 0
27 Study of a buffer p 2 Z 1 Z 2 t 1 t 2 Z 1 p 1 Z 2 Figure: A unitary WEG with two places. F(p 1, p 2 ) = M 0 (p 1 ) + M 0 (p 2 ) { K opt l(t1 ) = max, l(t } 2) l(t 1 ) + l(t 2 ), Z 1 Z 2 F(p 1, p 2 ) + 2gcd 1,2 (Z 1 + Z 2 )
28 K opt (p 7, p 7 ) gcd 7,8 17gcd 7,8 18gcd 7,8 19gcd 7,8 31gcd 7,8 32gcd 7,8 F(p 7 p 7 ) Figure: K opt according to F(p 7, p 7 ) = M 0(p 7 ) + M 0 (p 7 ). F min (p 7, p 7 ) = 16gcd 7,8, K min (p 7, p 7 ) = ms, F max (p 7, p 7 ) = 32gcd 7,8 and K max (p 7, p 7 ) = ms.
29 An optimal O(m log( max i {1,...,n} {Z i})) algorithm for a symmetric MWTEG without circuits of more than two transitions { } Let K max l(ti ) t i T Z i and (p, p ) c a couple of places corresponding to a buffer. F K (p, p ) = minimum capacity of buffer p to achieve a normalized period K. 1 If K K max (p, p ), set M 0 (p) = F K (p, p ) and M 0 (p ) = 0; 2 Else, K > K max (p, p ). Set M 0 (p) = F min (p, p ) and M 0 (p ) = 0. This solution is clearly minimum for every buffer. So, it minimizes the overall weighted capacity of G.
30 Example for the car radio Let G limited to the transitions T = {t 1, t 5, t 6, t 7, t 8, t 9 } corresponding to the mixing of the sounds coming from the MP3 reader and the cell phone to the output. The corresponding undirected graph defined as G = (T, {{t 7, t 8 }, {t 5, t 6 }, {t 6, t 1 }, {t 8, t 1 }, {t 1, t 9 }}) is clearly a tree (see Figure 10). t 9 t 5 t 6 t 1 t 8 t 7 Figure: The undirected graph G is a tree.
31 Example for the car radio Table: Optimal initial markings of the subgraph G for different processing time of t 8. l(t 8 ) = θ(p 6 )F(p 6, p 6 ) θ(p 7 )F(p 7, p 7 ) θ(p 8 )F(p 8, p 8 ) θ(p 9 )F(p 9, p 9 ) Sum
32 An Approximation Algorithm for the General Case Let K be a fixed value. Let us consider the Linear Program Π (K) obtained from Π(K) by replacing the condition k i,j N by k i,j Q +. 1 Compute an optimum solution M 0 (p) Q, p P of Π (K). This step can be done in polynomial time; 2 M 0 (p) = M0 (p) is then a feasible solution of Π(K).
33 An Approximation Algorithm for the General Case Theorem The competitive ratio of our algorithm is 2. Worst case may easily be achieved for a symmetric Timed Non Weighted Event graph (i.e., Z i = 1, t i T ).
34 Application to the car radio Table: Optimal buffers capacities for the MTWEG pictured by Figure 4 Buffers θ(p i )a K (p i, p i ) θ(p i)f App K (p i, p i ) (p 1, p 1 ) c (p 2, p 2 ) c (p 3, p 3 ) c (p 4, p 4 ) c 2 2 (p 5, p 5 ) c (p 6, p 6 ) c (p 7, p 7 ) c (p 8, p 8 ) c (p 9, p 9 ) c 2 2 (p 10, p 10 ) c Sum
35 Conclusion and Perspectives 1 First analytical and polynomial approach to compute the minimum size of the buffers; 2 Implementation in an industrial context; 3 Extension to cyclo-static Synchronous DataFlow Graphs.
36 Olivier Marchetti, Alix Munier Kordon A sufficient condition for the liveness of weighted event graphs. EJOR, vol 197, no 2, pp , Olivier Marchetti, Alix Munier Kordon Cyclic scheduling for the synthesis of embedded systems. Introduction to Scheduling, Y.Robert et F.Vivien Eds, à paraître. Mohamed Benazouz, Olivier Marchetti, Alix Munier Kordon, Pascal Urard A new Approach for Minimzing Buffer capacities with Throughput Constraint for Embedded System Design. submitted.
Mapping to Parallel Hardware
- Mapping to Parallel Hardware Bruno Bodin University of Edinburgh, United Kingdom 1 / 27 Context - Hardware Samsung Exynos ARM big-little (Heterogenenous), 4 ARM A15, 4 ARM A7, 2-16 cores GPU, 5 Watt.
More informationPeriodic Schedules For Linear Precedence Constraints
Periodic Schedules For Linear Precedence Constraints Claire Hanen and Alix Munier Kordon Laboratoire LIP6 4 place Jussieu 75 252 Paris cedex 05 {Claire.Hanen, Alix.Munier}@lip6.fr Abstract We consider
More informationCycle time optimization of deterministic timed weighted marked graphs by transformation
Cycle time optimization of deterministic timed weighted marked graphs by transformation Zhou He, Zhiwu Li, Alessandro Giua, Abstract Timed marked graphs, a special class of Petri nets, are extensively
More informationBuffer Capacity Computation for Throughput Constrained Streaming Applications with Data-Dependent Inter-Task Communication
IEEE Real-Time and Embedded Technology and Applications Symposium Buffer Capacity Computation for Throughput Constrained Streaming Applications with Data-Dependent Inter-Task Communication Maarten H. Wiggers
More informationFundamental Algorithms for System Modeling, Analysis, and Optimization
Fundamental Algorithms for System Modeling, Analysis, and Optimization Edward A. Lee, Jaijeet Roychowdhury, Sanjit A. Seshia UC Berkeley EECS 144/244 Fall 2010 Copyright 2010, E. A. Lee, J. Roydhowdhury,
More informationA Dynamic Programming algorithm for minimizing total cost of duplication in scheduling an outtree with communication delays and duplication
A Dynamic Programming algorithm for minimizing total cost of duplication in scheduling an outtree with communication delays and duplication Claire Hanen Laboratory LIP6 4, place Jussieu F-75 252 Paris
More informationTime Petri Nets. Miriam Zia School of Computer Science McGill University
Time Petri Nets Miriam Zia School of Computer Science McGill University Timing Specifications Why is time introduced in Petri nets? To model interaction between activities taking into account their start
More informationAlgorithms and Theory of Computation. Lecture 11: Network Flow
Algorithms and Theory of Computation Lecture 11: Network Flow Xiaohui Bei MAS 714 September 18, 2018 Nanyang Technological University MAS 714 September 18, 2018 1 / 26 Flow Network A flow network is a
More informationVIII. NP-completeness
VIII. NP-completeness 1 / 15 NP-Completeness Overview 1. Introduction 2. P and NP 3. NP-complete (NPC): formal definition 4. How to prove a problem is NPC 5. How to solve a NPC problem: approximate algorithms
More informationNetwork Flows. CTU FEE Department of control engineering. March 28, 2017
Network Flows Zdeněk Hanzálek, Přemysl Šůcha hanzalek@fel.cvut.cz CTU FEE Department of control engineering March 28, 2017 Z. Hanzálek (CTU FEE) Network Flows March 28, 2017 1 / 44 Table of contents 1
More informationAgenda. Soviet Rail Network, We ve done Greedy Method Divide and Conquer Dynamic Programming
Agenda We ve done Greedy Method Divide and Conquer Dynamic Programming Now Flow Networks, Max-flow Min-cut and Applications c Hung Q. Ngo (SUNY at Buffalo) CSE 531 Algorithm Analysis and Design 1 / 52
More information7.5 Bipartite Matching
7. Bipartite Matching Matching Matching. Input: undirected graph G = (V, E). M E is a matching if each node appears in at most edge in M. Max matching: find a max cardinality matching. Bipartite Matching
More informationChapter 7 Network Flow Problems, I
Chapter 7 Network Flow Problems, I Network flow problems are the most frequently solved linear programming problems. They include as special cases, the assignment, transportation, maximum flow, and shortest
More informationCSC2420: Algorithm Design, Analysis and Theory Spring (or Winter for pessimists) 2017
CSC2420: Algorithm Design, Analysis and Theory Spring (or Winter for pessimists) 2017 Allan Borodin January 30, 2017 1 / 32 Lecture 4 Announcements: I have posted all 7 questions for assignment 1. It is
More informationCHAPTER 3 FUNDAMENTALS OF COMPUTATIONAL COMPLEXITY. E. Amaldi Foundations of Operations Research Politecnico di Milano 1
CHAPTER 3 FUNDAMENTALS OF COMPUTATIONAL COMPLEXITY E. Amaldi Foundations of Operations Research Politecnico di Milano 1 Goal: Evaluate the computational requirements (this course s focus: time) to solve
More informationReal-Time Systems. Lecture 4. Scheduling basics. Task scheduling - basic taxonomy Basic scheduling techniques Static cyclic scheduling
Real-Time Systems Lecture 4 Scheduling basics Task scheduling - basic taxonomy Basic scheduling techniques Static cyclic scheduling 1 Last lecture (3) Real-time kernels The task states States and transition
More informationTime(d) Petri Net. Serge Haddad. Petri Nets 2016, June 20th LSV ENS Cachan, Université Paris-Saclay & CNRS & INRIA
Time(d) Petri Net Serge Haddad LSV ENS Cachan, Université Paris-Saclay & CNRS & INRIA haddad@lsv.ens-cachan.fr Petri Nets 2016, June 20th 2016 1 Time and Petri Nets 2 Time Petri Net: Syntax and Semantic
More informationEmbedded Systems Design: Optimization Challenges. Paul Pop Embedded Systems Lab (ESLAB) Linköping University, Sweden
of /4 4 Embedded Systems Design: Optimization Challenges Paul Pop Embedded Systems Lab (ESLAB) Linköping University, Sweden Outline! Embedded systems " Example area: automotive electronics " Embedded systems
More informationMaximum flow problem CE 377K. February 26, 2015
Maximum flow problem CE 377K February 6, 05 REVIEW HW due in week Review Label setting vs. label correcting Bellman-Ford algorithm Review MAXIMUM FLOW PROBLEM Maximum Flow Problem What is the greatest
More informationarxiv: v3 [cs.ds] 14 Sep 2014
A Framework for Automated Competitive Analysis of On-line Scheduling of Firm-Deadline Tasks Krishnendu Chatterjee 1, Andreas Pavlogiannis 1, Alexander Kößler 2, and Ulrich Schmid 2 1 IST Austria (Institute
More informationScheduling on Unrelated Parallel Machines. Approximation Algorithms, V. V. Vazirani Book Chapter 17
Scheduling on Unrelated Parallel Machines Approximation Algorithms, V. V. Vazirani Book Chapter 17 Nicolas Karakatsanis, 2008 Description of the problem Problem 17.1 (Scheduling on unrelated parallel machines)
More informationUniversity of Toronto Department of Electrical and Computer Engineering. Final Examination. ECE 345 Algorithms and Data Structures Fall 2016
University of Toronto Department of Electrical and Computer Engineering Final Examination ECE 345 Algorithms and Data Structures Fall 2016 Print your first name, last name, UTORid, and student number neatly
More informationIntroduction to Bin Packing Problems
Introduction to Bin Packing Problems Fabio Furini March 13, 2015 Outline Origins and applications Applications: Definition: Bin Packing Problem (BPP) Solution techniques for the BPP Heuristic Algorithms
More informationComplexity theory for fellow CS students
This document contains some basics of the complexity theory. It is mostly based on the lecture course delivered at CS dept. by Meran G. Furugyan. Differences are subtle. Disclaimer of warranties apply:
More informationCSC Design and Analysis of Algorithms. LP Shader Electronics Example
CSC 80- Design and Analysis of Algorithms Lecture (LP) LP Shader Electronics Example The Shader Electronics Company produces two products:.eclipse, a portable touchscreen digital player; it takes hours
More informationTime and Timed Petri Nets
Time and Timed Petri Nets Serge Haddad LSV ENS Cachan & CNRS & INRIA haddad@lsv.ens-cachan.fr DISC 11, June 9th 2011 1 Time and Petri Nets 2 Timed Models 3 Expressiveness 4 Analysis 1/36 Outline 1 Time
More information1. Introduction Recap
1. Introduction Recap 1. Tractable and intractable problems polynomial-boundness: O(n k ) 2. NP-complete problems informal definition 3. Examples of P vs. NP difference may appear only slightly 4. Optimization
More informationInteger Clocks and Local Time Scales
Integer Clocks and Local Time Scales Part I Part II Adrien Guatto ENS - PARKAS SYNCHRON 2014 Adrien Guatto (ENS - PARKAS) Integer Clocks and Local Time Scales SYNCHRON 2014 1 / 31 Part I Adrien Guatto
More informationDES. 4. Petri Nets. Introduction. Different Classes of Petri Net. Petri net properties. Analysis of Petri net models
4. Petri Nets Introduction Different Classes of Petri Net Petri net properties Analysis of Petri net models 1 Petri Nets C.A Petri, TU Darmstadt, 1962 A mathematical and graphical modeling method. Describe
More informationFINAL EXAM PRACTICE PROBLEMS CMSC 451 (Spring 2016)
FINAL EXAM PRACTICE PROBLEMS CMSC 451 (Spring 2016) The final exam will be on Thursday, May 12, from 8:00 10:00 am, at our regular class location (CSI 2117). It will be closed-book and closed-notes, except
More information1 Non-deterministic Turing Machine
1 Non-deterministic Turing Machine A nondeterministic Turing machine is a generalization of the standard TM for which every configuration may yield none, or one or more than one next configurations. In
More informationGraph. Supply Vertices and Demand Vertices. Supply Vertices. Demand Vertices
Partitioning Graphs of Supply and Demand Generalization of Knapsack Problem Takao Nishizeki Tohoku University Graph Supply Vertices and Demand Vertices Supply Vertices Demand Vertices Graph Each Supply
More informationFriday, September 21, Flows
Flows Building evacuation plan people to evacuate from the offices corridors and stairways capacity 10 10 5 50 15 15 15 60 60 50 15 10 60 10 60 15 15 50 For each person determine the path to follow to
More informationMax Flow: Algorithms and Applications
Max Flow: Algorithms and Applications Outline for today Quick review of the Max Flow problem Applications of Max Flow The Ford-Fulkerson (FF) algorithm for Max Flow Analysis of FF, and the Max Flow Min
More informationResearch Collection. Grid exploration. Master Thesis. ETH Library. Author(s): Wernli, Dino. Publication Date: 2012
Research Collection Master Thesis Grid exploration Author(s): Wernli, Dino Publication Date: 2012 Permanent Link: https://doi.org/10.3929/ethz-a-007343281 Rights / License: In Copyright - Non-Commercial
More informationDiscrete Optimization 2010 Lecture 1 Introduction / Algorithms & Spanning Trees
Discrete Optimization 2010 Lecture 1 Introduction / Algorithms & Spanning Trees Marc Uetz University of Twente m.uetz@utwente.nl Lecture 1: sheet 1 / 43 Marc Uetz Discrete Optimization Outline 1 Introduction
More informationMaximum Flow. Jie Wang. University of Massachusetts Lowell Department of Computer Science. J. Wang (UMass Lowell) Maximum Flow 1 / 27
Maximum Flow Jie Wang University of Massachusetts Lowell Department of Computer Science J. Wang (UMass Lowell) Maximum Flow 1 / 27 Flow Networks A flow network is a weighted digraph G = (V, E), where the
More informationAPTAS for Bin Packing
APTAS for Bin Packing Bin Packing has an asymptotic PTAS (APTAS) [de la Vega and Leuker, 1980] For every fixed ε > 0 algorithm outputs a solution of size (1+ε)OPT + 1 in time polynomial in n APTAS for
More informationMonotonic Optimization of Dataflow Buffer Sizes
Journal of Signal Processing Systems (2019) 91:21 32 https://doi.org/10.1007/s11265-018-1415-2 Monotonic Optimization of Dataflow Buffer Sizes Martijn Hendriks 1,2 Hadi Alizadeh Ara 2 Marc Geilen 2 Twan
More informationWorst-case Throughput Analysis for Parametric Rate and Parametric Actor Execution Time Scenario-Aware Dataflow Graphs. Mladen Skelin.
Worst-case Throughput Analysis for Parametric Rate and Parametric Actor Execution Time Scenario-Aware Dataflow Graphs Norwegian University of Science and Technology Department of Engineering Cybernetics
More informationCycle Time Analysis for Wafer Revisiting Process in Scheduling of Single-arm Cluster Tools
International Journal of Automation and Computing 8(4), November 2011, 437-444 DOI: 10.1007/s11633-011-0601-5 Cycle Time Analysis for Wafer Revisiting Process in Scheduling of Single-arm Cluster Tools
More informationRunning Time. Assumption. All capacities are integers between 1 and C.
Running Time Assumption. All capacities are integers between and. Invariant. Every flow value f(e) and every residual capacities c f (e) remains an integer throughout the algorithm. Theorem. The algorithm
More informationGRAPH ALGORITHMS Week 7 (13 Nov - 18 Nov 2017)
GRAPH ALGORITHMS Week 7 (13 Nov - 18 Nov 2017) C. Croitoru croitoru@info.uaic.ro FII November 12, 2017 1 / 33 OUTLINE Matchings Analytical Formulation of the Maximum Matching Problem Perfect Matchings
More informationNon-preemptive Fixed Priority Scheduling of Hard Real-Time Periodic Tasks
Non-preemptive Fixed Priority Scheduling of Hard Real-Time Periodic Tasks Moonju Park Ubiquitous Computing Lab., IBM Korea, Seoul, Korea mjupark@kr.ibm.com Abstract. This paper addresses the problem of
More information3. Scheduling issues. Common approaches 3. Common approaches 1. Preemption vs. non preemption. Common approaches 2. Further definitions
Common approaches 3 3. Scheduling issues Priority-driven (event-driven) scheduling This class of algorithms is greedy They never leave available processing resources unutilized An available resource may
More informationScheduling and Optimization Course (MPRI)
MPRI Scheduling and optimization: lecture p. /6 Scheduling and Optimization Course (MPRI) Leo Liberti LIX, École Polytechnique, France MPRI Scheduling and optimization: lecture p. /6 Teachers Christoph
More informationLecture 8 Network Optimization Algorithms
Advanced Algorithms Floriano Zini Free University of Bozen-Bolzano Faculty of Computer Science Academic Year 2013-2014 Lecture 8 Network Optimization Algorithms 1 21/01/14 Introduction Network models have
More informationDiscrete Optimization 2010 Lecture 8 Lagrangian Relaxation / P, N P and co-n P
Discrete Optimization 2010 Lecture 8 Lagrangian Relaxation / P, N P and co-n P Marc Uetz University of Twente m.uetz@utwente.nl Lecture 8: sheet 1 / 32 Marc Uetz Discrete Optimization Outline 1 Lagrangian
More informationExploring the Potential of Instruction-Level Parallelism of Exposed Datapath Architectures with Buffered Processing Units
Exploring the Potential of Instruction-Level Parallelism of Exposed Datapath Architectures with Buffered Processing Units Anoop Bhagyanath and Klaus Schneider Embedded Systems Chair University of Kaiserslautern
More informationWe say that a flow is feasible for G (or just feasible if the graph and capacity function in question are obvious) if
CS787: Advanced Algorithms Lecture 4: Network Flow We devote this lecture to the network flow problem and the max-flow min-cut theorem. A number of other problems can be cast into a maximum flow or minimum
More informationA REACHABLE THROUGHPUT UPPER BOUND FOR LIVE AND SAFE FREE CHOICE NETS VIA T-INVARIANTS
A REACHABLE THROUGHPUT UPPER BOUND FOR LIVE AND SAFE FREE CHOICE NETS VIA T-INVARIANTS Francesco Basile, Ciro Carbone, Pasquale Chiacchio Dipartimento di Ingegneria Elettrica e dell Informazione, Università
More informationNP-Completeness. NP-Completeness 1
NP-Completeness Reference: Computers and Intractability: A Guide to the Theory of NP-Completeness by Garey and Johnson, W.H. Freeman and Company, 1979. NP-Completeness 1 General Problems, Input Size and
More informationBinary Decision Diagrams
Binary Decision Diagrams Literature Some pointers: H.R. Andersen, An Introduction to Binary Decision Diagrams, Lecture notes, Department of Information Technology, IT University of Copenhagen Tools: URL:
More informationLinear Programming. Scheduling problems
Linear Programming Scheduling problems Linear programming (LP) ( )., 1, for 0 min 1 1 1 1 1 11 1 1 n i x b x a x a b x a x a x c x c x z i m n mn m n n n n! = + + + + + + = Extreme points x ={x 1,,x n
More informationMathematics for Decision Making: An Introduction. Lecture 13
Mathematics for Decision Making: An Introduction Lecture 13 Matthias Köppe UC Davis, Mathematics February 17, 2009 13 1 Reminder: Flows in networks General structure: Flows in networks In general, consider
More informationPreliminaries and Complexity Theory
Preliminaries and Complexity Theory Oleksandr Romanko CAS 746 - Advanced Topics in Combinatorial Optimization McMaster University, January 16, 2006 Introduction Book structure: 2 Part I Linear Algebra
More informationPreliminaries. Graphs. E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)}
Preliminaries Graphs G = (V, E), V : set of vertices E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) 1 2 3 5 4 V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)} 1 Directed Graph (Digraph)
More informationVehicle Routing and MIP
CORE, Université Catholique de Louvain 5th Porto Meeting on Mathematics for Industry, 11th April 2014 Contents: The Capacitated Vehicle Routing Problem Subproblems: Trees and the TSP CVRP Cutting Planes
More informationRO: Exercices Mixed Integer Programming
RO: Exercices Mixed Integer Programming N. Brauner Université Grenoble Alpes Exercice 1 : Knapsack A hiker wants to fill up his knapsack of capacity W = 6 maximizing the utility of the objects he takes.
More informationCS599: Convex and Combinatorial Optimization Fall 2013 Lecture 17: Combinatorial Problems as Linear Programs III. Instructor: Shaddin Dughmi
CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 17: Combinatorial Problems as Linear Programs III Instructor: Shaddin Dughmi Announcements Today: Spanning Trees and Flows Flexibility awarded
More informationApplications of Petri Nets
Applications of Petri Nets Presenter: Chung-Wei Lin 2010.10.28 Outline Revisiting Petri Nets Application 1: Software Syntheses Theory and Algorithm Application 2: Biological Networks Comprehensive Introduction
More informationCSE 202 Homework 4 Matthias Springer, A
CSE 202 Homework 4 Matthias Springer, A99500782 1 Problem 2 Basic Idea PERFECT ASSEMBLY N P: a permutation P of s i S is a certificate that can be checked in polynomial time by ensuring that P = S, and
More informationCS Algorithms and Complexity
CS 50 - Algorithms and Complexity Linear Programming, the Simplex Method, and Hard Problems Sean Anderson 2/15/18 Portland State University Table of contents 1. The Simplex Method 2. The Graph Problem
More informationDefinition of a Logarithm
Chapter 17 Logarithms Sec. 1 Definition of a Logarithm In the last chapter we solved and graphed exponential equations. The strategy we used to solve those was to make the bases the same, set the exponents
More informationThe Ellipsoid (Kachiyan) Method
Yinyu Ye, MS&E, Stanford MS&E310 Lecture Note: Ellipsoid Method 1 The Ellipsoid (Kachiyan) Method Yinyu Ye Department of Management Science and Engineering Stanford University Stanford, CA 94305, U.S.A.
More informationBranch-and-Bound. Leo Liberti. LIX, École Polytechnique, France. INF , Lecture p. 1
Branch-and-Bound Leo Liberti LIX, École Polytechnique, France INF431 2011, Lecture p. 1 Reminders INF431 2011, Lecture p. 2 Problems Decision problem: a question admitting a YES/NO answer Example HAMILTONIAN
More informationIII. Linear Programming
III. Linear Programming Thomas Sauerwald Easter 2017 Outline Introduction Standard and Slack Forms Formulating Problems as Linear Programs Simplex Algorithm Finding an Initial Solution III. Linear Programming
More informationThe Earlier the Better: A Theory of Timed Actor Interfaces
The Earlier the Better: A Theory of Timed Actor Interfaces Marc Geilen Stavros Tripakis Maarten Wiggers Electrical Engineering and Computer Sciences University of California at Berkeley Technical Report
More informationUniversity of New Mexico Department of Computer Science. Final Examination. CS 561 Data Structures and Algorithms Fall, 2006
University of New Mexico Department of Computer Science Final Examination CS 561 Data Structures and Algorithms Fall, 2006 Name: Email: Print your name and email, neatly in the space provided above; print
More information4/12/2011. Chapter 8. NP and Computational Intractability. Directed Hamiltonian Cycle. Traveling Salesman Problem. Directed Hamiltonian Cycle
Directed Hamiltonian Cycle Chapter 8 NP and Computational Intractability Claim. G has a Hamiltonian cycle iff G' does. Pf. Suppose G has a directed Hamiltonian cycle Γ. Then G' has an undirected Hamiltonian
More informationGraph Theory and Optimization Computational Complexity (in brief)
Graph Theory and Optimization Computational Complexity (in brief) Nicolas Nisse Inria, France Univ. Nice Sophia Antipolis, CNRS, I3S, UMR 7271, Sophia Antipolis, France September 2015 N. Nisse Graph Theory
More informationContents. Introduction
Introduction Contents Chapter 1. Network Flows 1 1.1. Graphs 1 1.2. Shortest Paths 8 1.3. Maximum Flow 17 1.4. Min Cost Flows 22 List of frequently used Symbols 31 Bibliography 33 Index 37 iii i Introduction
More informationLecture 2: Divide and conquer and Dynamic programming
Chapter 2 Lecture 2: Divide and conquer and Dynamic programming 2.1 Divide and Conquer Idea: - divide the problem into subproblems in linear time - solve subproblems recursively - combine the results in
More informationMATTHIAS GERDTS. COMBINATORIAL OPTIMISATION MSM 3M02b
MATTHIAS GERDTS COMBINATORIAL OPTIMISATION MSM M0b Address of the Author: Matthias Gerdts Computational Optimisation Group School of Mathematics University of Birmingham Edgbaston Birmingham B5 TT E-Mail:
More informationEmbedded Systems 14. Overview of embedded systems design
Embedded Systems 14-1 - Overview of embedded systems design - 2-1 Point of departure: Scheduling general IT systems In general IT systems, not much is known about the computational processes a priori The
More informationarxiv: v1 [cs.os] 6 Jun 2013
Partitioned scheduling of multimode multiprocessor real-time systems with temporal isolation Joël Goossens Pascal Richard arxiv:1306.1316v1 [cs.os] 6 Jun 2013 Abstract We consider the partitioned scheduling
More informationFlows and Cuts. 1 Concepts. CS 787: Advanced Algorithms. Instructor: Dieter van Melkebeek
CS 787: Advanced Algorithms Flows and Cuts Instructor: Dieter van Melkebeek This lecture covers the construction of optimal flows and cuts in networks, their relationship, and some applications. It paves
More informationCSE 431/531: Analysis of Algorithms. Dynamic Programming. Lecturer: Shi Li. Department of Computer Science and Engineering University at Buffalo
CSE 431/531: Analysis of Algorithms Dynamic Programming Lecturer: Shi Li Department of Computer Science and Engineering University at Buffalo Paradigms for Designing Algorithms Greedy algorithm Make a
More informationOutline. Outline. Outline DMP204 SCHEDULING, TIMETABLING AND ROUTING. 1. Scheduling CPM/PERT Resource Constrained Project Scheduling Model
Outline DMP204 SCHEDULING, TIMETABLING AND ROUTING Lecture 3 and Mixed Integer Programg Marco Chiarandini 1. Resource Constrained Project Model 2. Mathematical Programg 2 Outline Outline 1. Resource Constrained
More informationAlgorithms for MDPs and Their Convergence
MS&E338 Reinforcement Learning Lecture 2 - April 4 208 Algorithms for MDPs and Their Convergence Lecturer: Ben Van Roy Scribe: Matthew Creme and Kristen Kessel Bellman operators Recall from last lecture
More information- Well-characterized problems, min-max relations, approximate certificates. - LP problems in the standard form, primal and dual linear programs
LP-Duality ( Approximation Algorithms by V. Vazirani, Chapter 12) - Well-characterized problems, min-max relations, approximate certificates - LP problems in the standard form, primal and dual linear programs
More informationAn Exact Algorithm for the Steiner Tree Problem with Delays
Electronic Notes in Discrete Mathematics 36 (2010) 223 230 www.elsevier.com/locate/endm An Exact Algorithm for the Steiner Tree Problem with Delays Valeria Leggieri 1 Dipartimento di Matematica, Università
More information6. DYNAMIC PROGRAMMING I
6. DYNAMIC PROGRAMMING I weighted interval scheduling segmented least squares knapsack problem RNA secondary structure Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison Wesley Copyright 2013
More informationDiscrete Optimization 2010 Lecture 3 Maximum Flows
Remainder: Shortest Paths Maximum Flows Discrete Optimization 2010 Lecture 3 Maximum Flows Marc Uetz University of Twente m.uetz@utwente.nl Lecture 3: sheet 1 / 29 Marc Uetz Discrete Optimization Outline
More informationarxiv: v1 [cs.ds] 26 Feb 2016
On the computational complexity of minimum-concave-cost flow in a two-dimensional grid Shabbir Ahmed, Qie He, Shi Li, George L. Nemhauser arxiv:1602.08515v1 [cs.ds] 26 Feb 2016 Abstract We study the minimum-concave-cost
More informationWeek 4. (1) 0 f ij u ij.
Week 4 1 Network Flow Chapter 7 of the book is about optimisation problems on networks. Section 7.1 gives a quick introduction to the definitions of graph theory. In fact I hope these are already known
More informationNonlinear Discrete Optimization
Nonlinear Discrete Optimization Technion Israel Institute of Technology http://ie.technion.ac.il/~onn Billerafest 2008 - conference in honor of Lou Billera's 65th birthday (Update on Lecture Series given
More information3.4 Relaxations and bounds
3.4 Relaxations and bounds Consider a generic Discrete Optimization problem z = min{c(x) : x X} with an optimal solution x X. In general, the algorithms generate not only a decreasing sequence of upper
More informationCMSC 722, AI Planning. Planning and Scheduling
CMSC 722, AI Planning Planning and Scheduling Dana S. Nau University of Maryland 1:26 PM April 24, 2012 1 Scheduling Given: actions to perform set of resources to use time constraints» e.g., the ones computed
More informationEmbedded Systems 6 REVIEW. Place/transition nets. defaults: K = ω W = 1
Embedded Systems 6-1 - Place/transition nets REVIEW Def.: (P, T, F, K, W, M 0 ) is called a place/transition net (P/T net) iff 1. N=(P,T,F) is a net with places p P and transitions t T 2. K: P (N 0 {ω})
More informationPart V. Matchings. Matching. 19 Augmenting Paths for Matchings. 18 Bipartite Matching via Flows
Matching Input: undirected graph G = (V, E). M E is a matching if each node appears in at most one Part V edge in M. Maximum Matching: find a matching of maximum cardinality Matchings Ernst Mayr, Harald
More informationResource Constrained Project Scheduling Linear and Integer Programming (1)
DM204, 2010 SCHEDULING, TIMETABLING AND ROUTING Lecture 3 Resource Constrained Project Linear and Integer Programming (1) Marco Chiarandini Department of Mathematics & Computer Science University of Southern
More informationFlow Shop and Job Shop Models
Outline DM87 SCHEDULING, TIMETABLING AND ROUTING Lecture 11 Flow Shop and Job Shop Models 1. Flow Shop 2. Job Shop Marco Chiarandini DM87 Scheduling, Timetabling and Routing 2 Outline Resume Permutation
More informationCombinatorial optimization problems
Combinatorial optimization problems Heuristic Algorithms Giovanni Righini University of Milan Department of Computer Science (Crema) Optimization In general an optimization problem can be formulated as:
More informationEasy Problems vs. Hard Problems. CSE 421 Introduction to Algorithms Winter Is P a good definition of efficient? The class P
Easy Problems vs. Hard Problems CSE 421 Introduction to Algorithms Winter 2000 NP-Completeness (Chapter 11) Easy - problems whose worst case running time is bounded by some polynomial in the size of the
More informationIEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS 1
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS Modeling, Analysis, and Hard Real-time Scheduling of Adaptive Streaming Applications Jiali Teddy Zhai, Sobhan Niknam, and Todor
More informationChapter 7. Network Flow. Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved.
Chapter 7 Network Flow Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved. 7.5 Bipartite Matching Matching Matching. Input: undirected graph G = (V, E). M E is a matching
More informationOn Machine Dependency in Shop Scheduling
On Machine Dependency in Shop Scheduling Evgeny Shchepin Nodari Vakhania Abstract One of the main restrictions in scheduling problems are the machine (resource) restrictions: each machine can perform at
More informationLimits to Approximability: When Algorithms Won't Help You. Note: Contents of today s lecture won t be on the exam
Limits to Approximability: When Algorithms Won't Help You Note: Contents of today s lecture won t be on the exam Outline Limits to Approximability: basic results Detour: Provers, verifiers, and NP Graph
More information